/** * Author......: See docs/credits.txt * License.....: MIT */ #ifdef KERNEL_STATIC #include "inc_vendor.h" #include "inc_types.h" #include "inc_platform.cl" #include "inc_common.cl" #include "inc_hash_sha1.cl" #include "inc_cipher_aes.cl" #endif #define COMPARE_S "inc_comp_single.cl" #define COMPARE_M "inc_comp_multi.cl" #define ROUNDS 0x40000 #define PUTCHAR(a,p,c) ((u8 *)(a))[(p)] = (u8) (c) #define GETCHAR(a,p) ((u8 *)(a))[(p)] #define PUTCHAR_BE(a,p,c) ((u8 *)(a))[(p) ^ 3] = (u8) (c) #define GETCHAR_BE(a,p) ((u8 *)(a))[(p) ^ 3] #define MIN(a,b) (((a) < (b)) ? (a) : (b)) typedef struct rar3 { u32 data[81920]; u32 pack_size; u32 unpack_size; } rar3_t; typedef struct rar3_tmp { u32 dgst[17][5]; } rar3_tmp_t; CONSTANT_VK u32a crc32tab[0x100] = { 0x00000000, 0x77073096, 0xee0e612c, 0x990951ba, 0x076dc419, 0x706af48f, 0xe963a535, 0x9e6495a3, 0x0edb8832, 0x79dcb8a4, 0xe0d5e91e, 0x97d2d988, 0x09b64c2b, 0x7eb17cbd, 0xe7b82d07, 0x90bf1d91, 0x1db71064, 0x6ab020f2, 0xf3b97148, 0x84be41de, 0x1adad47d, 0x6ddde4eb, 0xf4d4b551, 0x83d385c7, 0x136c9856, 0x646ba8c0, 0xfd62f97a, 0x8a65c9ec, 0x14015c4f, 0x63066cd9, 0xfa0f3d63, 0x8d080df5, 0x3b6e20c8, 0x4c69105e, 0xd56041e4, 0xa2677172, 0x3c03e4d1, 0x4b04d447, 0xd20d85fd, 0xa50ab56b, 0x35b5a8fa, 0x42b2986c, 0xdbbbc9d6, 0xacbcf940, 0x32d86ce3, 0x45df5c75, 0xdcd60dcf, 0xabd13d59, 0x26d930ac, 0x51de003a, 0xc8d75180, 0xbfd06116, 0x21b4f4b5, 0x56b3c423, 0xcfba9599, 0xb8bda50f, 0x2802b89e, 0x5f058808, 0xc60cd9b2, 0xb10be924, 0x2f6f7c87, 0x58684c11, 0xc1611dab, 0xb6662d3d, 0x76dc4190, 0x01db7106, 0x98d220bc, 0xefd5102a, 0x71b18589, 0x06b6b51f, 0x9fbfe4a5, 0xe8b8d433, 0x7807c9a2, 0x0f00f934, 0x9609a88e, 0xe10e9818, 0x7f6a0dbb, 0x086d3d2d, 0x91646c97, 0xe6635c01, 0x6b6b51f4, 0x1c6c6162, 0x856530d8, 0xf262004e, 0x6c0695ed, 0x1b01a57b, 0x8208f4c1, 0xf50fc457, 0x65b0d9c6, 0x12b7e950, 0x8bbeb8ea, 0xfcb9887c, 0x62dd1ddf, 0x15da2d49, 0x8cd37cf3, 0xfbd44c65, 0x4db26158, 0x3ab551ce, 0xa3bc0074, 0xd4bb30e2, 0x4adfa541, 0x3dd895d7, 0xa4d1c46d, 0xd3d6f4fb, 0x4369e96a, 0x346ed9fc, 0xad678846, 0xda60b8d0, 0x44042d73, 0x33031de5, 0xaa0a4c5f, 0xdd0d7cc9, 0x5005713c, 0x270241aa, 0xbe0b1010, 0xc90c2086, 0x5768b525, 0x206f85b3, 0xb966d409, 0xce61e49f, 0x5edef90e, 0x29d9c998, 0xb0d09822, 0xc7d7a8b4, 0x59b33d17, 0x2eb40d81, 0xb7bd5c3b, 0xc0ba6cad, 0xedb88320, 0x9abfb3b6, 0x03b6e20c, 0x74b1d29a, 0xead54739, 0x9dd277af, 0x04db2615, 0x73dc1683, 0xe3630b12, 0x94643b84, 0x0d6d6a3e, 0x7a6a5aa8, 0xe40ecf0b, 0x9309ff9d, 0x0a00ae27, 0x7d079eb1, 0xf00f9344, 0x8708a3d2, 0x1e01f268, 0x6906c2fe, 0xf762575d, 0x806567cb, 0x196c3671, 0x6e6b06e7, 0xfed41b76, 0x89d32be0, 0x10da7a5a, 0x67dd4acc, 0xf9b9df6f, 0x8ebeeff9, 0x17b7be43, 0x60b08ed5, 0xd6d6a3e8, 0xa1d1937e, 0x38d8c2c4, 0x4fdff252, 0xd1bb67f1, 0xa6bc5767, 0x3fb506dd, 0x48b2364b, 0xd80d2bda, 0xaf0a1b4c, 0x36034af6, 0x41047a60, 0xdf60efc3, 0xa867df55, 0x316e8eef, 0x4669be79, 0xcb61b38c, 0xbc66831a, 0x256fd2a0, 0x5268e236, 0xcc0c7795, 0xbb0b4703, 0x220216b9, 0x5505262f, 0xc5ba3bbe, 0xb2bd0b28, 0x2bb45a92, 0x5cb36a04, 0xc2d7ffa7, 0xb5d0cf31, 0x2cd99e8b, 0x5bdeae1d, 0x9b64c2b0, 0xec63f226, 0x756aa39c, 0x026d930a, 0x9c0906a9, 0xeb0e363f, 0x72076785, 0x05005713, 0x95bf4a82, 0xe2b87a14, 0x7bb12bae, 0x0cb61b38, 0x92d28e9b, 0xe5d5be0d, 0x7cdcefb7, 0x0bdbdf21, 0x86d3d2d4, 0xf1d4e242, 0x68ddb3f8, 0x1fda836e, 0x81be16cd, 0xf6b9265b, 0x6fb077e1, 0x18b74777, 0x88085ae6, 0xff0f6a70, 0x66063bca, 0x11010b5c, 0x8f659eff, 0xf862ae69, 0x616bffd3, 0x166ccf45, 0xa00ae278, 0xd70dd2ee, 0x4e048354, 0x3903b3c2, 0xa7672661, 0xd06016f7, 0x4969474d, 0x3e6e77db, 0xaed16a4a, 0xd9d65adc, 0x40df0b66, 0x37d83bf0, 0xa9bcae53, 0xdebb9ec5, 0x47b2cf7f, 0x30b5ffe9, 0xbdbdf21c, 0xcabac28a, 0x53b39330, 0x24b4a3a6, 0xbad03605, 0xcdd70693, 0x54de5729, 0x23d967bf, 0xb3667a2e, 0xc4614ab8, 0x5d681b02, 0x2a6f2b94, 0xb40bbe37, 0xc30c8ea1, 0x5a05df1b, 0x2d02ef8d }; DECLSPEC u32 round_crc32 (const u32 a, const u32 v, LOCAL_AS u32 *l_crc32tab) { const u32 k = (a ^ v) & 0xff; const u32 s = a >> 8; return l_crc32tab[k] ^ s; } DECLSPEC u32 round_crc32_16 (const u32 crc32, const u32 *buf, const u32 len, LOCAL_AS u32 *l_crc32tab) { const int crc_len = MIN (len, 16); u32 c = crc32; for (int i = 0; i < crc_len; i++) { const u32 idx = i / 4; const u32 mod = i % 4; const u32 sht = (3 - mod) * 8; const u32 b = buf[idx] >> sht; // b & 0xff (but already done in round_crc32 ()) c = round_crc32 (c, b, l_crc32tab); } return c; } KERNEL_FQ void m23700_init (KERN_ATTR_TMPS_ESALT (rar3_tmp_t, rar3_t)) { /** * base */ const u64 gid = get_global_id (0); if (gid >= gid_max) return; tmps[gid].dgst[0][0] = SHA1M_A; tmps[gid].dgst[0][1] = SHA1M_B; tmps[gid].dgst[0][2] = SHA1M_C; tmps[gid].dgst[0][3] = SHA1M_D; tmps[gid].dgst[0][4] = SHA1M_E; } KERNEL_FQ void m23700_loop (KERN_ATTR_TMPS_ESALT (rar3_tmp_t, rar3_t)) { const u64 gid = get_global_id (0); if (gid >= gid_max) return; u32 pw_buf[5]; pw_buf[0] = pws[gid].i[0]; pw_buf[1] = pws[gid].i[1]; pw_buf[2] = pws[gid].i[2]; pw_buf[3] = pws[gid].i[3]; pw_buf[4] = pws[gid].i[4]; const u32 pw_len = MIN (pws[gid].pw_len, 20); u32 salt_buf[2]; salt_buf[0] = salt_bufs[salt_pos].salt_buf[0]; salt_buf[1] = salt_bufs[salt_pos].salt_buf[1]; const u32 salt_len = 8; // this is large enough to hold all possible w[] arrays for 64 iterations #define LARGEBLOCK_ELEMS ((40 + 8 + 3) * 16) u32 largeblock[LARGEBLOCK_ELEMS]; for (u32 i = 0; i < LARGEBLOCK_ELEMS; i++) largeblock[i] = 0; for (u32 i = 0, p = 0; i < 64; i++) { for (u32 j = 0; j < pw_len; j++, p += 2) { PUTCHAR_BE (largeblock, p, GETCHAR (pw_buf, j)); } for (u32 j = 0; j < salt_len; j++, p += 1) { PUTCHAR_BE (largeblock, p, GETCHAR (salt_buf, j)); } PUTCHAR_BE (largeblock, p + 2, (loop_pos >> 16) & 0xff); p += 3; } const u32 p3 = (pw_len * 2) + salt_len + 3; const u32 init_pos = loop_pos / (ROUNDS / 16); u32 dgst[5]; dgst[0] = tmps[gid].dgst[init_pos][0]; dgst[1] = tmps[gid].dgst[init_pos][1]; dgst[2] = tmps[gid].dgst[init_pos][2]; dgst[3] = tmps[gid].dgst[init_pos][3]; dgst[4] = tmps[gid].dgst[init_pos][4]; u32 iter = loop_pos; for (u32 i = 0; i < 256; i += 4) { for (u32 j = 0; j < 64; j++) { const u32 p = ((j + 1) * p3) - 2; PUTCHAR_BE (largeblock, p, iter >> 8); } for (u32 k = 0; k < 4; k++) { for (u32 j = 0; j < 64; j++) { const u32 p = ((j + 1) * p3) - 3; PUTCHAR_BE (largeblock, p, iter >> 0); iter++; } for (u32 j = 0; j < p3; j++) { const u32 j16 = j * 16; u32 w0[4]; u32 w1[4]; u32 w2[4]; u32 w3[4]; w0[0] = largeblock[j16 + 0]; w0[1] = largeblock[j16 + 1]; w0[2] = largeblock[j16 + 2]; w0[3] = largeblock[j16 + 3]; w1[0] = largeblock[j16 + 4]; w1[1] = largeblock[j16 + 5]; w1[2] = largeblock[j16 + 6]; w1[3] = largeblock[j16 + 7]; w2[0] = largeblock[j16 + 8]; w2[1] = largeblock[j16 + 9]; w2[2] = largeblock[j16 + 10]; w2[3] = largeblock[j16 + 11]; w3[0] = largeblock[j16 + 12]; w3[1] = largeblock[j16 + 13]; w3[2] = largeblock[j16 + 14]; w3[3] = largeblock[j16 + 15]; sha1_transform (w0, w1, w2, w3, dgst); } } } tmps[gid].dgst[init_pos + 1][0] = dgst[0]; tmps[gid].dgst[init_pos + 1][1] = dgst[1]; tmps[gid].dgst[init_pos + 1][2] = dgst[2]; tmps[gid].dgst[init_pos + 1][3] = dgst[3]; tmps[gid].dgst[init_pos + 1][4] = dgst[4]; } KERNEL_FQ void m23700_comp (KERN_ATTR_TMPS_ESALT (rar3_tmp_t, rar3_t)) { const u64 gid = get_global_id (0); const u64 lid = get_local_id (0); const u64 lsz = get_local_size (0); /** * aes shared */ #ifdef REAL_SHM LOCAL_VK u32 s_td0[256]; LOCAL_VK u32 s_td1[256]; LOCAL_VK u32 s_td2[256]; LOCAL_VK u32 s_td3[256]; LOCAL_VK u32 s_td4[256]; LOCAL_VK u32 s_te0[256]; LOCAL_VK u32 s_te1[256]; LOCAL_VK u32 s_te2[256]; LOCAL_VK u32 s_te3[256]; LOCAL_VK u32 s_te4[256]; for (u32 i = lid; i < 256; i += lsz) { s_td0[i] = td0[i]; s_td1[i] = td1[i]; s_td2[i] = td2[i]; s_td3[i] = td3[i]; s_td4[i] = td4[i]; s_te0[i] = te0[i]; s_te1[i] = te1[i]; s_te2[i] = te2[i]; s_te3[i] = te3[i]; s_te4[i] = te4[i]; } #else CONSTANT_AS u32a *s_td0 = td0; CONSTANT_AS u32a *s_td1 = td1; CONSTANT_AS u32a *s_td2 = td2; CONSTANT_AS u32a *s_td3 = td3; CONSTANT_AS u32a *s_td4 = td4; CONSTANT_AS u32a *s_te0 = te0; CONSTANT_AS u32a *s_te1 = te1; CONSTANT_AS u32a *s_te2 = te2; CONSTANT_AS u32a *s_te3 = te3; CONSTANT_AS u32a *s_te4 = te4; #endif LOCAL_VK u32 l_crc32tab[256]; for (int i = lid; i < 256; i += lsz) { l_crc32tab[i] = crc32tab[i]; } SYNC_THREADS (); if (gid >= gid_max) return; /** * base */ const u32 pw_len = MIN (pws[gid].pw_len, 20); const u32 salt_len = 8; const u32 p3 = (pw_len * 2) + salt_len + 3; u32 w0[4]; u32 w1[4]; u32 w2[4]; u32 w3[4]; w0[0] = 0x80000000; w0[1] = 0; w0[2] = 0; w0[3] = 0; w1[0] = 0; w1[1] = 0; w1[2] = 0; w1[3] = 0; w2[0] = 0; w2[1] = 0; w2[2] = 0; w2[3] = 0; w3[0] = 0; w3[1] = 0; w3[2] = 0; w3[3] = (p3 * ROUNDS) * 8; u32 dgst[5]; dgst[0] = tmps[gid].dgst[16][0]; dgst[1] = tmps[gid].dgst[16][1]; dgst[2] = tmps[gid].dgst[16][2]; dgst[3] = tmps[gid].dgst[16][3]; dgst[4] = tmps[gid].dgst[16][4]; sha1_transform (w0, w1, w2, w3, dgst); u32 ukey[4]; ukey[0] = hc_swap32_S (dgst[0]); ukey[1] = hc_swap32_S (dgst[1]); ukey[2] = hc_swap32_S (dgst[2]); ukey[3] = hc_swap32_S (dgst[3]); u32 ks[44]; AES128_set_decrypt_key (ks, ukey, s_te0, s_te1, s_te2, s_te3, s_td0, s_td1, s_td2, s_td3); u32 iv[4]; iv[0] = 0; iv[1] = 0; iv[2] = 0; iv[3] = 0; for (int i = 0; i < 16; i++) { u32 pw_buf[5]; pw_buf[0] = pws[gid].i[0]; pw_buf[1] = pws[gid].i[1]; pw_buf[2] = pws[gid].i[2]; pw_buf[3] = pws[gid].i[3]; pw_buf[4] = pws[gid].i[4]; //const u32 pw_len = pws[gid].pw_len; u32 salt_buf[2]; salt_buf[0] = salt_bufs[salt_pos].salt_buf[0]; salt_buf[1] = salt_bufs[salt_pos].salt_buf[1]; //const u32 salt_len = 8; //const u32 p3 = (pw_len * 2) + salt_len + 3; u32 w[16]; w[ 0] = 0; w[ 1] = 0; w[ 2] = 0; w[ 3] = 0; w[ 4] = 0; w[ 5] = 0; w[ 6] = 0; w[ 7] = 0; w[ 8] = 0; w[ 9] = 0; w[10] = 0; w[11] = 0; w[12] = 0; w[13] = 0; w[14] = 0; w[15] = 0; u32 p = 0; for (u32 j = 0; j < pw_len; j++, p += 2) { PUTCHAR_BE (w, p, GETCHAR (pw_buf, j)); } for (u32 j = 0; j < salt_len; j++, p += 1) { PUTCHAR_BE (w, p, GETCHAR (salt_buf, j)); } const u32 iter_pos = i * (ROUNDS / 16); PUTCHAR_BE (w, p + 0, (iter_pos >> 0) & 0xff); PUTCHAR_BE (w, p + 1, (iter_pos >> 8) & 0xff); PUTCHAR_BE (w, p + 2, (iter_pos >> 16) & 0xff); PUTCHAR_BE (w, p3, 0x80); w[15] = ((iter_pos + 1) * p3) * 8; u32 dgst[5]; dgst[0] = tmps[gid].dgst[i][0]; dgst[1] = tmps[gid].dgst[i][1]; dgst[2] = tmps[gid].dgst[i][2]; dgst[3] = tmps[gid].dgst[i][3]; dgst[4] = tmps[gid].dgst[i][4]; sha1_transform (w + 0, w + 4, w + 8, w + 12, dgst); PUTCHAR (iv, i, dgst[4] & 0xff); } iv[0] = hc_swap32_S (iv[0]); iv[1] = hc_swap32_S (iv[1]); iv[2] = hc_swap32_S (iv[2]); iv[3] = hc_swap32_S (iv[3]); const u32 pack_size = esalt_bufs[digests_offset].pack_size; const u32 unpack_size = esalt_bufs[digests_offset].unpack_size; if (pack_size > unpack_size) // could be aligned { if (pack_size >= 32) // otherwise IV... { const u32 pack_size_elements = pack_size / 4; u32 last_block_encrypted[4]; last_block_encrypted[0] = esalt_bufs[digests_offset].data[pack_size_elements - 4 + 0]; last_block_encrypted[1] = esalt_bufs[digests_offset].data[pack_size_elements - 4 + 1]; last_block_encrypted[2] = esalt_bufs[digests_offset].data[pack_size_elements - 4 + 2]; last_block_encrypted[3] = esalt_bufs[digests_offset].data[pack_size_elements - 4 + 3]; u32 last_block_decrypted[4]; AES128_decrypt (ks, last_block_encrypted, last_block_decrypted, s_td0, s_td1, s_td2, s_td3, s_td4); u32 last_block_iv[4]; last_block_iv[0] = esalt_bufs[digests_offset].data[pack_size_elements - 8 + 0]; last_block_iv[1] = esalt_bufs[digests_offset].data[pack_size_elements - 8 + 1]; last_block_iv[2] = esalt_bufs[digests_offset].data[pack_size_elements - 8 + 2]; last_block_iv[3] = esalt_bufs[digests_offset].data[pack_size_elements - 8 + 3]; last_block_decrypted[0] ^= last_block_iv[0]; last_block_decrypted[1] ^= last_block_iv[1]; last_block_decrypted[2] ^= last_block_iv[2]; last_block_decrypted[3] ^= last_block_iv[3]; if ((last_block_decrypted[3] & 0xff) != 0) return; } } u32 data_left = unpack_size; u32 crc32 = ~0; for (u32 i = 0, j = 0; i < pack_size / 16; i += 1, j += 4) { u32 data[4]; data[0] = esalt_bufs[digests_offset].data[j + 0]; data[1] = esalt_bufs[digests_offset].data[j + 1]; data[2] = esalt_bufs[digests_offset].data[j + 2]; data[3] = esalt_bufs[digests_offset].data[j + 3]; u32 out[4]; AES128_decrypt (ks, data, out, s_td0, s_td1, s_td2, s_td3, s_td4); out[0] ^= iv[0]; out[1] ^= iv[1]; out[2] ^= iv[2]; out[3] ^= iv[3]; crc32 = round_crc32_16 (crc32, out, data_left, l_crc32tab); iv[0] = data[0]; iv[1] = data[1]; iv[2] = data[2]; iv[3] = data[3]; data_left -= 16; } const u32 r0 = crc32; const u32 r1 = 0; const u32 r2 = 0; const u32 r3 = 0; #define il_pos 0 #ifdef KERNEL_STATIC #include COMPARE_M #endif }