mirror of
https://github.com/hashcat/hashcat.git
synced 2024-12-22 22:58:30 +00:00
187 lines
4.9 KiB
Common Lisp
187 lines
4.9 KiB
Common Lisp
/**
|
|
* Author......: hansvh
|
|
* License.....: MIT
|
|
*/
|
|
|
|
#ifdef KERNEL_STATIC
|
|
#include M2S(INCLUDE_PATH/inc_vendor.h)
|
|
#include M2S(INCLUDE_PATH/inc_types.h)
|
|
#include M2S(INCLUDE_PATH/inc_platform.cl)
|
|
#include M2S(INCLUDE_PATH/inc_common.cl)
|
|
#include M2S(INCLUDE_PATH/inc_hash_sha1.cl)
|
|
#endif
|
|
|
|
#define COMPARE_S M2S(INCLUDE_PATH/inc_comp_single.cl)
|
|
#define COMPARE_M M2S(INCLUDE_PATH/inc_comp_multi.cl)
|
|
|
|
typedef struct sha1_tmp
|
|
{
|
|
u32 salt[2];
|
|
u32 newdes_key[15];
|
|
|
|
} sha1_tmp_t;
|
|
|
|
CONSTANT_VK uchar newdes_rotor[256] =
|
|
{
|
|
32, 137, 239, 188, 102, 125, 221, 72, 212, 68, 81, 37, 86, 237, 147, 149,
|
|
70, 229, 17, 124, 115, 207, 33, 20, 122, 143, 25, 215, 51, 183, 138, 142,
|
|
146, 211, 110, 173, 1, 228, 189, 14, 103, 78, 162, 36, 253, 167, 116, 255,
|
|
158, 45, 185, 50, 98, 168, 250, 235, 54, 141, 195, 247, 240, 63, 148, 2,
|
|
224, 169, 214, 180, 62, 22, 117, 108, 19, 172, 161, 159, 160, 47, 43, 171,
|
|
194, 175, 178, 56, 196, 112, 23, 220, 89, 21, 164, 130, 157, 8, 85, 251,
|
|
216, 44, 94, 179, 226, 38, 90, 119, 40, 202, 34, 206, 35, 69, 231, 246,
|
|
29, 109, 74, 71, 176, 6, 60, 145, 65, 13, 77, 151, 12, 127, 95, 199,
|
|
57, 101, 5, 232, 150, 210, 129, 24, 181, 10, 121, 187, 48, 193, 139, 252,
|
|
219, 64, 88, 233, 96, 128, 80, 53, 191, 144, 218, 11, 106, 132, 155, 104,
|
|
91, 136, 31, 42, 243, 66, 126, 135, 30, 26, 87, 186, 182, 154, 242, 123,
|
|
82, 166, 208, 39, 152, 190, 113, 205, 114, 105, 225, 84, 73, 163, 99, 111,
|
|
204, 61, 200, 217, 170, 15, 198, 28, 192, 254, 134, 234, 222, 7, 236, 248,
|
|
201, 41, 177, 156, 92, 131, 67, 249, 245, 184, 203, 9, 241, 0, 27, 46,
|
|
133, 174, 75, 18, 93, 209, 100, 120, 76, 213, 16, 83, 4, 107, 140, 52,
|
|
58, 55, 3, 244, 97, 197, 238, 227, 118, 49, 79, 230, 223, 165, 153, 59
|
|
};
|
|
|
|
DECLSPEC void new_des (uchar * block, uchar * newdes_key)
|
|
{
|
|
#define B0 (*(block+0))
|
|
#define B1 (*(block+1))
|
|
#define B2 (*(block+2))
|
|
#define B3 (*(block+3))
|
|
#define B4 (*(block+4))
|
|
#define B5 (*(block+5))
|
|
#define B6 (*(block+6))
|
|
#define B7 (*(block+7))
|
|
|
|
for (int count = 0; count < 8; count++)
|
|
{
|
|
B4 = B4 ^ newdes_rotor[B0 ^ *(newdes_key++)];
|
|
B5 = B5 ^ newdes_rotor[B1 ^ *(newdes_key++)];
|
|
B6 = B6 ^ newdes_rotor[B2 ^ *(newdes_key++)];
|
|
B7 = B7 ^ newdes_rotor[B3 ^ *(newdes_key++)];
|
|
|
|
B1 = B1 ^ newdes_rotor[B4 ^ *(newdes_key++)];
|
|
B2 = B2 ^ newdes_rotor[B4 ^ B5];
|
|
B3 = B3 ^ newdes_rotor[B6 ^ *(newdes_key++)];
|
|
B0 = B0 ^ newdes_rotor[B7 ^ *(newdes_key++)];
|
|
}
|
|
|
|
B4 = B4 ^ newdes_rotor[B0 ^ *(newdes_key++)];
|
|
B5 = B5 ^ newdes_rotor[B1 ^ *(newdes_key++)];
|
|
B6 = B6 ^ newdes_rotor[B2 ^ *(newdes_key++)];
|
|
B7 = B7 ^ newdes_rotor[B3 ^ *(newdes_key++)];
|
|
}
|
|
|
|
DECLSPEC void key_expansion (uchar * sha1sum, uchar * result)
|
|
{
|
|
uchar *shi = sha1sum;
|
|
|
|
for (int count = 0; count < 15; count++)
|
|
{
|
|
*result = *shi;
|
|
*(result + 1) = *shi ^ sha1sum[7];
|
|
*(result + 2) = *shi ^ sha1sum[8];
|
|
*(result + 3) = *shi++ ^ sha1sum[9];
|
|
|
|
result += 4;
|
|
}
|
|
}
|
|
|
|
KERNEL_FQ void m32700_init (KERN_ATTR_TMPS (sha1_tmp_t))
|
|
{
|
|
const u64 gid = get_global_id (0);
|
|
|
|
if (gid >= GID_CNT) return;
|
|
|
|
// Initial "SHA-1" (with endianness bug)
|
|
sha1_ctx_t ctx;
|
|
|
|
sha1_init (&ctx);
|
|
sha1_update_global_swap (&ctx, pws[gid].i, pws[gid].pw_len);
|
|
sha1_final (&ctx);
|
|
|
|
ctx.h[0] = hc_swap32_S (ctx.h[0]);
|
|
ctx.h[1] = hc_swap32_S (ctx.h[1]);
|
|
ctx.h[2] = hc_swap32_S (ctx.h[2]);
|
|
ctx.h[3] = hc_swap32_S (ctx.h[3]);
|
|
ctx.h[4] = hc_swap32_S (ctx.h[4]);
|
|
|
|
// Crate a NewDES key
|
|
u32 newdes_key[15];
|
|
|
|
key_expansion ((uchar *) ctx.h, (uchar *) newdes_key);
|
|
|
|
for (int i = 0; i < 15; i++)
|
|
{
|
|
tmps[gid].newdes_key[i] = newdes_key[i];
|
|
}
|
|
|
|
// Run NewDES on salt using the expanded key
|
|
tmps[gid].salt[0] = salt_bufs[SALT_POS_HOST].salt_buf[0];
|
|
tmps[gid].salt[1] = salt_bufs[SALT_POS_HOST].salt_buf[1];
|
|
}
|
|
|
|
KERNEL_FQ void m32700_loop (KERN_ATTR_TMPS (sha1_tmp_t))
|
|
{
|
|
const u64 gid = get_global_id (0);
|
|
|
|
if (gid >= GID_CNT) return;
|
|
|
|
u32 newdes_key[15];
|
|
|
|
for (int i = 0; i < 15; i++)
|
|
{
|
|
newdes_key[i] = tmps[gid].newdes_key[i];
|
|
}
|
|
|
|
u32 salt[2];
|
|
|
|
salt[0] = tmps[gid].salt[0];
|
|
salt[1] = tmps[gid].salt[1];
|
|
|
|
// Run 1000 iterations of NewDES on the derived salt
|
|
for (int i = 0; i < LOOP_CNT; i++)
|
|
{
|
|
new_des ((uchar *) salt, (uchar *) newdes_key);
|
|
}
|
|
|
|
for (int i = 0; i < 15; i++)
|
|
{
|
|
tmps[gid].newdes_key[i] = newdes_key[i];
|
|
}
|
|
|
|
// Run NewDES on salt using the expanded key
|
|
tmps[gid].salt[0] = salt[0];
|
|
tmps[gid].salt[1] = salt[1];
|
|
}
|
|
|
|
KERNEL_FQ void m32700_comp (KERN_ATTR_TMPS (sha1_tmp_t))
|
|
{
|
|
const u64 gid = get_global_id (0);
|
|
|
|
if (gid >= GID_CNT) return;
|
|
|
|
u32 salt[16] = { 0 };
|
|
|
|
salt[0] = tmps[gid].salt[0];
|
|
salt[1] = tmps[gid].salt[1];
|
|
|
|
// Final "SHA-1" (with endianness bug)
|
|
sha1_ctx_t ctx;
|
|
|
|
sha1_init (&ctx);
|
|
sha1_update_swap (&ctx, salt, 8);
|
|
sha1_update_global_swap (&ctx, pws[gid].i, pws[gid].pw_len);
|
|
sha1_final (&ctx);
|
|
|
|
const u32 r0 = ctx.h[0];
|
|
const u32 r1 = ctx.h[1];
|
|
const u32 r2 = ctx.h[2];
|
|
const u32 r3 = ctx.h[3];
|
|
|
|
#define il_pos 0
|
|
|
|
#ifdef KERNEL_STATIC
|
|
#include COMPARE_M
|
|
#endif
|
|
}
|