/** * Author......: See docs/credits.txt * License.....: MIT */ #define NEW_SIMD_CODE #ifdef KERNEL_STATIC #include M2S(INCLUDE_PATH/inc_vendor.h) #include M2S(INCLUDE_PATH/inc_types.h) #include M2S(INCLUDE_PATH/inc_platform.cl) #include M2S(INCLUDE_PATH/inc_common.cl) #include M2S(INCLUDE_PATH/inc_simd.cl) #include M2S(INCLUDE_PATH/inc_hash_sha1.cl) #endif KERNEL_FQ void m29500_mxx (KERN_ATTR_BASIC ()) { /** * modifier */ const u32 fixed[16] = { 0x636f6f6b, 0x69652d73, 0x65737369, 0x6f6e0000, 0x00000000, 0x00000000, 0x00000000, 0x00000000, 0x00000000, 0x00000000, 0x00000000, 0x00000000, 0x00000000, 0x00000000, 0x00000000, 0x00000000 }; const u64 lid = get_local_id (0); const u64 gid = get_global_id (0); if (gid >= GID_CNT) return; /** * digest */ const u32 search[4] = { digests_buf[DIGESTS_OFFSET_HOST].digest_buf[DGST_R0], digests_buf[DIGESTS_OFFSET_HOST].digest_buf[DGST_R1], digests_buf[DIGESTS_OFFSET_HOST].digest_buf[DGST_R2], digests_buf[DIGESTS_OFFSET_HOST].digest_buf[DGST_R3] }; /** * base */ const u32 pw_len = pws[gid].pw_len; u32 w[64] = { 0 }; #pragma unroll for (u32 i = 0, idx = 0; i < pw_len; i += 4, idx += 1) { w[idx] = pws[gid].i[idx]; } const u32 salt_len = salt_bufs[SALT_POS_HOST].salt_len; u32 s[16] = { 0 }; #pragma unroll for (u32 id = 0; id < 16; id++) { s[id] = hc_swap32_S(salt_bufs[SALT_POS_HOST].salt_buf[id]); }; /** * loop */ u32 w0l = w[0]; for (u32 il_pos = 0; il_pos < IL_CNT; il_pos += 1) { const u32 w0r = ix_create_bft (bfs_buf, il_pos); const u32 w0 = w0l | w0r; w[0] = w0; sha1_hmac_ctx_t ctx; sha1_hmac_init (&ctx, w, pw_len); sha1_hmac_update (&ctx, fixed, 14); sha1_hmac_final (&ctx); u32 intermediate[16] = {0}; intermediate[0] = ctx.opad.h[0]; intermediate[1] = ctx.opad.h[1]; intermediate[2] = ctx.opad.h[2]; intermediate[3] = ctx.opad.h[3]; intermediate[4] = ctx.opad.h[4]; sha1_hmac_init (&ctx, intermediate, 16); sha1_hmac_update (&ctx, s, salt_len); sha1_hmac_final (&ctx); const u32 r0 = ctx.opad.h[0]; const u32 r1 = ctx.opad.h[1]; const u32 r2 = ctx.opad.h[2]; const u32 r3 = ctx.opad.h[3]; COMPARE_S_SIMD (r0, r1, r2, r3); } } KERNEL_FQ void m29500_sxx (KERN_ATTR_BASIC ()) { /** * modifier */ const u32 fixed[16] = { 0x636f6f6b, 0x69652d73, 0x65737369, 0x6f6e0000, 0x00000000, 0x00000000, 0x00000000, 0x00000000, 0x00000000, 0x00000000, 0x00000000, 0x00000000, 0x00000000, 0x00000000, 0x00000000, 0x00000000 }; const u64 lid = get_local_id (0); const u64 gid = get_global_id (0); if (gid >= GID_CNT) return; /** * digest */ const u32 search[4] = { digests_buf[DIGESTS_OFFSET_HOST].digest_buf[DGST_R0], digests_buf[DIGESTS_OFFSET_HOST].digest_buf[DGST_R1], digests_buf[DIGESTS_OFFSET_HOST].digest_buf[DGST_R2], digests_buf[DIGESTS_OFFSET_HOST].digest_buf[DGST_R3] }; /** * base */ const u32 pw_len = pws[gid].pw_len; u32 w[64] = { 0 }; #pragma unroll for (u32 i = 0, idx = 0; i < pw_len; i += 4, idx += 1) { w[idx] = pws[gid].i[idx]; } const u32 salt_len = salt_bufs[SALT_POS_HOST].salt_len; u32 s[16] = { 0 }; #pragma unroll for (u32 id = 0; id < 16; id++) { s[id] = hc_swap32_S(salt_bufs[SALT_POS_HOST].salt_buf[id]); }; /** * loop */ u32 w0l = w[0]; for (u32 il_pos = 0; il_pos < IL_CNT; il_pos += 1) { const u32 w0r = ix_create_bft (bfs_buf, il_pos); const u32 w0 = w0l | w0r; w[0] = w0; sha1_hmac_ctx_t ctx; sha1_hmac_init (&ctx, w, pw_len); sha1_hmac_update (&ctx, fixed, 14); sha1_hmac_final (&ctx); u32 intermediate[16] = {0}; intermediate[0] = ctx.opad.h[0]; intermediate[1] = ctx.opad.h[1]; intermediate[2] = ctx.opad.h[2]; intermediate[3] = ctx.opad.h[3]; intermediate[4] = ctx.opad.h[4]; sha1_hmac_init (&ctx, intermediate, 16); sha1_hmac_update (&ctx, s, salt_len); sha1_hmac_final (&ctx); const u32 r0 = ctx.opad.h[0]; const u32 r1 = ctx.opad.h[1]; const u32 r2 = ctx.opad.h[2]; const u32 r3 = ctx.opad.h[3]; COMPARE_S_SIMD (r0, r1, r2, r3); } }