/** * Author......: See docs/credits.txt * License.....: MIT */ //incompatible to simd //#define NEW_SIMD_CODE #include "inc_vendor.cl" #include "inc_hash_constants.h" #include "inc_hash_functions.cl" #include "inc_types.cl" #include "inc_common.cl" #include "inc_rp_optimized.h" #include "inc_rp_optimized.cl" #include "inc_simd.cl" #define SIPROUND(v0,v1,v2,v3) \ (v0) += (v1); \ (v1) = rotl64 ((v1), 13); \ (v1) ^= (v0); \ (v0) = rotl64 ((v0), 32); \ (v2) += (v3); \ (v3) = rotl64 ((v3), 16); \ (v3) ^= (v2); \ (v0) += (v3); \ (v3) = rotl64 ((v3), 21); \ (v3) ^= (v0); \ (v2) += (v1); \ (v1) = rotl64 ((v1), 17); \ (v1) ^= (v2); \ (v2) = rotl64 ((v2), 32) __kernel void m10100_m04 (KERN_ATTR_RULES ()) { /** * modifier */ const u64 lid = get_local_id (0); /** * base */ const u64 gid = get_global_id (0); if (gid >= gid_max) return; u32 pw_buf0[4]; u32 pw_buf1[4]; pw_buf0[0] = pws[gid].i[ 0]; pw_buf0[1] = pws[gid].i[ 1]; pw_buf0[2] = pws[gid].i[ 2]; pw_buf0[3] = pws[gid].i[ 3]; pw_buf1[0] = pws[gid].i[ 4]; pw_buf1[1] = pws[gid].i[ 5]; pw_buf1[2] = pws[gid].i[ 6]; pw_buf1[3] = pws[gid].i[ 7]; const u32 pw_len = pws[gid].pw_len; /** * salt */ u64x v0p = SIPHASHM_0; u64x v1p = SIPHASHM_1; u64x v2p = SIPHASHM_2; u64x v3p = SIPHASHM_3; v0p ^= hl32_to_64 (salt_bufs[salt_pos].salt_buf[1], salt_bufs[salt_pos].salt_buf[0]); v1p ^= hl32_to_64 (salt_bufs[salt_pos].salt_buf[3], salt_bufs[salt_pos].salt_buf[2]); v2p ^= hl32_to_64 (salt_bufs[salt_pos].salt_buf[1], salt_bufs[salt_pos].salt_buf[0]); v3p ^= hl32_to_64 (salt_bufs[salt_pos].salt_buf[3], salt_bufs[salt_pos].salt_buf[2]); /** * loop */ for (u32 il_pos = 0; il_pos < il_cnt; il_pos += VECT_SIZE) { u32x w0[4] = { 0 }; u32x w1[4] = { 0 }; u32x w2[4] = { 0 }; u32x w3[4] = { 0 }; const u32x out_len = apply_rules_vect (pw_buf0, pw_buf1, pw_len, rules_buf, il_pos, w0, w1); /** * siphash */ switch (out_len / 8) { case 0: w0[1] |= out_len << 24; break; case 1: w0[3] |= out_len << 24; break; case 2: w1[1] |= out_len << 24; break; case 3: w1[3] |= out_len << 24; break; } u64x v0 = v0p; u64x v1 = v1p; u64x v2 = v2p; u64x v3 = v3p; int i; int j; for (i = 0, j = 0; i <= out_len && i < 16; i += 8, j += 2) { u64x m = hl32_to_64 (w0[j + 1], w0[j + 0]); v3 ^= m; SIPROUND (v0, v1, v2, v3); SIPROUND (v0, v1, v2, v3); v0 ^= m; } for ( j = 0; i <= out_len && i < 32; i += 8, j += 2) { u64x m = hl32_to_64 (w1[j + 1], w1[j + 0]); v3 ^= m; SIPROUND (v0, v1, v2, v3); SIPROUND (v0, v1, v2, v3); v0 ^= m; } v2 ^= 0xff; SIPROUND (v0, v1, v2, v3); SIPROUND (v0, v1, v2, v3); SIPROUND (v0, v1, v2, v3); SIPROUND (v0, v1, v2, v3); const u64x v = v0 ^ v1 ^ v2 ^ v3; const u32x a = l32_from_64 (v); const u32x b = h32_from_64 (v); const u32x z = 0; COMPARE_M_SIMD (a, b, z, z); } } __kernel void m10100_m08 (KERN_ATTR_RULES ()) { } __kernel void m10100_m16 (KERN_ATTR_RULES ()) { } __kernel void m10100_s04 (KERN_ATTR_RULES ()) { /** * modifier */ const u64 lid = get_local_id (0); /** * base */ const u64 gid = get_global_id (0); if (gid >= gid_max) return; u32 pw_buf0[4]; u32 pw_buf1[4]; pw_buf0[0] = pws[gid].i[ 0]; pw_buf0[1] = pws[gid].i[ 1]; pw_buf0[2] = pws[gid].i[ 2]; pw_buf0[3] = pws[gid].i[ 3]; pw_buf1[0] = pws[gid].i[ 4]; pw_buf1[1] = pws[gid].i[ 5]; pw_buf1[2] = pws[gid].i[ 6]; pw_buf1[3] = pws[gid].i[ 7]; const u32 pw_len = pws[gid].pw_len; /** * salt */ u64x v0p = SIPHASHM_0; u64x v1p = SIPHASHM_1; u64x v2p = SIPHASHM_2; u64x v3p = SIPHASHM_3; v0p ^= hl32_to_64 (salt_bufs[salt_pos].salt_buf[1], salt_bufs[salt_pos].salt_buf[0]); v1p ^= hl32_to_64 (salt_bufs[salt_pos].salt_buf[3], salt_bufs[salt_pos].salt_buf[2]); v2p ^= hl32_to_64 (salt_bufs[salt_pos].salt_buf[1], salt_bufs[salt_pos].salt_buf[0]); v3p ^= hl32_to_64 (salt_bufs[salt_pos].salt_buf[3], salt_bufs[salt_pos].salt_buf[2]); /** * digest */ const u32 search[4] = { digests_buf[digests_offset].digest_buf[DGST_R0], digests_buf[digests_offset].digest_buf[DGST_R1], 0, 0 }; /** * loop */ for (u32 il_pos = 0; il_pos < il_cnt; il_pos += VECT_SIZE) { u32x w0[4] = { 0 }; u32x w1[4] = { 0 }; u32x w2[4] = { 0 }; u32x w3[4] = { 0 }; const u32x out_len = apply_rules_vect (pw_buf0, pw_buf1, pw_len, rules_buf, il_pos, w0, w1); /** * siphash */ switch (out_len / 8) { case 0: w0[1] |= out_len << 24; break; case 1: w0[3] |= out_len << 24; break; case 2: w1[1] |= out_len << 24; break; case 3: w1[3] |= out_len << 24; break; } u64x v0 = v0p; u64x v1 = v1p; u64x v2 = v2p; u64x v3 = v3p; int i; int j; for (i = 0, j = 0; i <= out_len && i < 16; i += 8, j += 2) { u64x m = hl32_to_64 (w0[j + 1], w0[j + 0]); v3 ^= m; SIPROUND (v0, v1, v2, v3); SIPROUND (v0, v1, v2, v3); v0 ^= m; } for ( j = 0; i <= out_len && i < 32; i += 8, j += 2) { u64x m = hl32_to_64 (w1[j + 1], w1[j + 0]); v3 ^= m; SIPROUND (v0, v1, v2, v3); SIPROUND (v0, v1, v2, v3); v0 ^= m; } v2 ^= 0xff; SIPROUND (v0, v1, v2, v3); SIPROUND (v0, v1, v2, v3); SIPROUND (v0, v1, v2, v3); SIPROUND (v0, v1, v2, v3); const u64x v = v0 ^ v1 ^ v2 ^ v3; const u32x a = l32_from_64 (v); const u32x b = h32_from_64 (v); const u32x z = 0; COMPARE_S_SIMD (a, b, z, z); } } __kernel void m10100_s08 (KERN_ATTR_RULES ()) { } __kernel void m10100_s16 (KERN_ATTR_RULES ()) { }