1
0
mirror of https://github.com/hashcat/hashcat.git synced 2024-12-22 06:38:11 +00:00
hashcat/OpenCL/m07700_a3.cl
jsteube 3daf0af480 Added docs/credits.txt
Added docs/team.txt
2016-09-11 22:20:15 +02:00

973 lines
36 KiB
Common Lisp

/**
* Author......: See docs/credits.txt
* License.....: MIT
*/
#define _SAPB_
//too much register pressure
//#define NEW_SIMD_CODE
#include "inc_vendor.cl"
#include "inc_hash_constants.h"
#include "inc_hash_functions.cl"
#include "inc_types.cl"
#include "inc_common.cl"
#include "inc_simd.cl"
#define GETCHAR(a,p) (((a)[(p) / 4] >> (((p) & 3) * 8)) & 0xff)
#define PUTCHAR(a,p,c) ((a)[(p) / 4] = (((a)[(p) / 4] & ~(0xff << (((p) & 3) * 8))) | ((c) << (((p) & 3) * 8))))
#define SETSHIFTEDINT(a,n,v) \
{ \
const u32 s = ((n) & 3) * 8; \
const u64 x = (u64) (v) << s; \
(a)[((n)/4)+0] &= ~(0xff << ((n & 3) * 8)); \
(a)[((n)/4)+0] |= x; \
(a)[((n)/4)+1] = x >> 32; \
}
__constant u32 sapb_trans_tbl[256] =
{
// first value hack for 0 byte as part of an optimization
0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
0x3f, 0x40, 0x41, 0x50, 0x43, 0x44, 0x45, 0x4b, 0x47, 0x48, 0x4d, 0x4e, 0x54, 0x51, 0x53, 0x46,
0x35, 0x36, 0x37, 0x38, 0x39, 0x3a, 0x3b, 0x3c, 0x3d, 0x3e, 0x56, 0x55, 0x5c, 0x49, 0x5d, 0x4a,
0x42, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f,
0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x58, 0x5b, 0x59, 0xff, 0x52,
0x4c, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f,
0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x57, 0x5e, 0x5a, 0x4f, 0xff,
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff
};
__constant u32 bcodeArray[48] =
{
0x14, 0x77, 0xf3, 0xd4, 0xbb, 0x71, 0x23, 0xd0, 0x03, 0xff, 0x47, 0x93, 0x55, 0xaa, 0x66, 0x91,
0xf2, 0x88, 0x6b, 0x99, 0xbf, 0xcb, 0x32, 0x1a, 0x19, 0xd9, 0xa7, 0x82, 0x22, 0x49, 0xa2, 0x51,
0xe2, 0xb7, 0x33, 0x71, 0x8b, 0x9f, 0x5d, 0x01, 0x44, 0x70, 0xae, 0x11, 0xef, 0x28, 0xf0, 0x0d
};
u32 sapb_trans (const u32 in)
{
u32 out = 0;
out |= (sapb_trans_tbl[(in >> 0) & 0xff]) << 0;
out |= (sapb_trans_tbl[(in >> 8) & 0xff]) << 8;
out |= (sapb_trans_tbl[(in >> 16) & 0xff]) << 16;
out |= (sapb_trans_tbl[(in >> 24) & 0xff]) << 24;
return out;
}
u32 walld0rf_magic (const u32 w0[4], const u32 pw_len, const u32 salt_buf0[4], const u32 salt_len, const u32 a, const u32 b, const u32 c, const u32 d, u32 t[16])
{
t[ 0] = 0;
t[ 1] = 0;
t[ 2] = 0;
t[ 3] = 0;
t[ 4] = 0;
t[ 5] = 0;
t[ 6] = 0;
t[ 7] = 0;
t[ 8] = 0;
t[ 9] = 0;
t[10] = 0;
t[11] = 0;
t[12] = 0;
t[13] = 0;
t[14] = 0;
t[15] = 0;
u32 sum20 = ((a >> 24) & 3)
+ ((a >> 16) & 3)
+ ((a >> 8) & 3)
+ ((a >> 0) & 3)
+ ((b >> 8) & 3);
sum20 |= 0x20;
const u32 w[2] = { w0[0], w0[1] };
const u32 s[3] = { salt_buf0[0], salt_buf0[1], salt_buf0[2] };
u32 saved_key[4] = { a, b, c, d };
u32 i1 = 0;
u32 i2 = 0;
u32 i3 = 0;
// we can assume this because the password must be at least 3
// and the username must be at least 1 so we can save the if ()
u32 t0 = 0;
if ((d >> 24) & 1)
{
t0 |= bcodeArray[47] << 0;
t0 |= (w[0] & 0xff) << 8;
t0 |= (s[0] & 0xff) << 16;
t0 |= bcodeArray[ 1] << 24;
i1 = 1;
i2 = 5;
i3 = 1;
}
else
{
t0 |= (w[0] & 0xff) << 0;
t0 |= (s[0] & 0xff) << 8;
t0 |= bcodeArray[ 0] << 16;
i1 = 1;
i2 = 4;
i3 = 1;
}
t[0] = t0;
// because the following code can increase i2 by a maximum of 5,
// there is an overflow potential of 4 before it comes to the next test for i2 >= sum20
// we need to truncate in that case
while ((i1 < pw_len) && (i3 < salt_len))
{
u32 x0 = 0;
u32 i2_sav = i2;
if (GETCHAR (saved_key, 15 - i1) & 1)
{
x0 |= bcodeArray[48 - 1 - i1] << 0; i2++;
x0 |= GETCHAR (w, i1) << 8; i2++; i1++;
x0 |= GETCHAR (s, i3) << 16; i2++; i3++;
x0 |= bcodeArray[i2 - i1 - i3] << 24; i2++; i2++;
}
else
{
x0 |= GETCHAR (w, i1) << 0; i2++; i1++;
x0 |= GETCHAR (s, i3) << 8; i2++; i3++;
x0 |= bcodeArray[i2 - i1 - i3] << 16; i2++; i2++;
}
SETSHIFTEDINT (t, i2_sav, x0);
if (i2 >= sum20)
{
return sum20;
}
}
while ((i1 < pw_len) || (i3 < salt_len))
{
if (i1 < pw_len) // max 8
{
if (GETCHAR (saved_key, 15 - i1) & 1)
{
PUTCHAR (t, i2, bcodeArray[48 - 1 - i1]);
i2++;
}
PUTCHAR (t, i2, GETCHAR (w, i1));
i1++;
i2++;
}
else
{
PUTCHAR (t, i2, GETCHAR (s, i3));
i2++;
i3++;
}
PUTCHAR (t, i2, bcodeArray[i2 - i1 - i3]);
i2++;
i2++;
if (i2 >= sum20)
{
return sum20;
}
}
while (i2 < sum20)
{
PUTCHAR (t, i2, bcodeArray[i2 - i1 - i3]);
i2++;
i2++;
}
return sum20;
}
void m07700m (u32 w0[4], u32 w1[4], u32 w2[4], u32 w3[4], const u32 pw_len, __global pw_t *pws, __global kernel_rule_t *rules_buf, __global comb_t *combs_buf, __global bf_t *bfs_buf, __global void *tmps, __global void *hooks, __global u32 *bitmaps_buf_s1_a, __global u32 *bitmaps_buf_s1_b, __global u32 *bitmaps_buf_s1_c, __global u32 *bitmaps_buf_s1_d, __global u32 *bitmaps_buf_s2_a, __global u32 *bitmaps_buf_s2_b, __global u32 *bitmaps_buf_s2_c, __global u32 *bitmaps_buf_s2_d, __global plain_t *plains_buf, __global digest_t *digests_buf, __global u32 *hashes_shown, __global salt_t *salt_bufs, __global void *esalt_bufs, __global u32 *d_return_buf, __global u32 *d_scryptV0_buf, __global u32 *d_scryptV1_buf, __global u32 *d_scryptV2_buf, __global u32 *d_scryptV3_buf, const u32 bitmap_mask, const u32 bitmap_shift1, const u32 bitmap_shift2, const u32 salt_pos, const u32 loop_pos, const u32 loop_cnt, const u32 il_cnt, const u32 digests_cnt, const u32 digests_offset)
{
/**
* modifier
*/
const u32 gid = get_global_id (0);
const u32 lid = get_local_id (0);
w0[0] = sapb_trans (w0[0]);
w0[1] = sapb_trans (w0[1]);
/**
* salt
*/
u32 salt_buf0[3];
salt_buf0[0] = salt_bufs[salt_pos].salt_buf[0];
salt_buf0[1] = salt_bufs[salt_pos].salt_buf[1];
salt_buf0[2] = salt_bufs[salt_pos].salt_buf[2];
salt_buf0[0] = sapb_trans (salt_buf0[0]);
salt_buf0[1] = sapb_trans (salt_buf0[1]);
salt_buf0[2] = sapb_trans (salt_buf0[2]);
const u32 salt_len = salt_bufs[salt_pos].salt_len;
u32 s0[4];
u32 s1[4];
u32 s2[4];
u32 s3[4];
s0[0] = salt_buf0[0];
s0[1] = salt_buf0[1];
s0[2] = salt_buf0[2];
s0[3] = 0;
s1[0] = 0;
s1[1] = 0;
s1[2] = 0;
s1[3] = 0;
s2[0] = 0;
s2[1] = 0;
s2[2] = 0;
s2[3] = 0;
s3[0] = 0;
s3[1] = 0;
s3[2] = 0;
s3[3] = 0;
switch_buffer_by_offset_le (s0, s1, s2, s3, pw_len);
const u32 pw_salt_len = pw_len + salt_len;
/**
* loop
*/
u32 w0l = w0[0];
for (u32 il_pos = 0; il_pos < il_cnt; il_pos += VECT_SIZE)
{
const u32x w0r = sapb_trans (ix_create_bft (bfs_buf, il_pos));
const u32x w0lr = w0l | w0r;
w0[0] = w0lr;
u32 t[16];
t[ 0] = s0[0] | w0[0];
t[ 1] = s0[1] | w0[1];
t[ 2] = s0[2];
t[ 3] = s0[3];
t[ 4] = s1[0];
t[ 5] = 0;
t[ 6] = 0;
t[ 7] = 0;
t[ 8] = 0;
t[ 9] = 0;
t[10] = 0;
t[11] = 0;
t[12] = 0;
t[13] = 0;
t[14] = pw_salt_len * 8;
t[15] = 0;
PUTCHAR (t, pw_salt_len, 0x80);
/**
* md5
*/
u32 a = MD5M_A;
u32 b = MD5M_B;
u32 c = MD5M_C;
u32 d = MD5M_D;
MD5_STEP (MD5_Fo, a, b, c, d, t[ 0], MD5C00, MD5S00);
MD5_STEP (MD5_Fo, d, a, b, c, t[ 1], MD5C01, MD5S01);
MD5_STEP (MD5_Fo, c, d, a, b, t[ 2], MD5C02, MD5S02);
MD5_STEP (MD5_Fo, b, c, d, a, t[ 3], MD5C03, MD5S03);
MD5_STEP (MD5_Fo, a, b, c, d, t[ 4], MD5C04, MD5S00);
MD5_STEP (MD5_Fo, d, a, b, c, t[ 5], MD5C05, MD5S01);
MD5_STEP (MD5_Fo, c, d, a, b, t[ 6], MD5C06, MD5S02);
MD5_STEP (MD5_Fo, b, c, d, a, t[ 7], MD5C07, MD5S03);
MD5_STEP (MD5_Fo, a, b, c, d, t[ 8], MD5C08, MD5S00);
MD5_STEP (MD5_Fo, d, a, b, c, t[ 9], MD5C09, MD5S01);
MD5_STEP (MD5_Fo, c, d, a, b, t[10], MD5C0a, MD5S02);
MD5_STEP (MD5_Fo, b, c, d, a, t[11], MD5C0b, MD5S03);
MD5_STEP (MD5_Fo, a, b, c, d, t[12], MD5C0c, MD5S00);
MD5_STEP (MD5_Fo, d, a, b, c, t[13], MD5C0d, MD5S01);
MD5_STEP (MD5_Fo, c, d, a, b, t[14], MD5C0e, MD5S02);
MD5_STEP (MD5_Fo, b, c, d, a, t[15], MD5C0f, MD5S03);
MD5_STEP (MD5_Go, a, b, c, d, t[ 1], MD5C10, MD5S10);
MD5_STEP (MD5_Go, d, a, b, c, t[ 6], MD5C11, MD5S11);
MD5_STEP (MD5_Go, c, d, a, b, t[11], MD5C12, MD5S12);
MD5_STEP (MD5_Go, b, c, d, a, t[ 0], MD5C13, MD5S13);
MD5_STEP (MD5_Go, a, b, c, d, t[ 5], MD5C14, MD5S10);
MD5_STEP (MD5_Go, d, a, b, c, t[10], MD5C15, MD5S11);
MD5_STEP (MD5_Go, c, d, a, b, t[15], MD5C16, MD5S12);
MD5_STEP (MD5_Go, b, c, d, a, t[ 4], MD5C17, MD5S13);
MD5_STEP (MD5_Go, a, b, c, d, t[ 9], MD5C18, MD5S10);
MD5_STEP (MD5_Go, d, a, b, c, t[14], MD5C19, MD5S11);
MD5_STEP (MD5_Go, c, d, a, b, t[ 3], MD5C1a, MD5S12);
MD5_STEP (MD5_Go, b, c, d, a, t[ 8], MD5C1b, MD5S13);
MD5_STEP (MD5_Go, a, b, c, d, t[13], MD5C1c, MD5S10);
MD5_STEP (MD5_Go, d, a, b, c, t[ 2], MD5C1d, MD5S11);
MD5_STEP (MD5_Go, c, d, a, b, t[ 7], MD5C1e, MD5S12);
MD5_STEP (MD5_Go, b, c, d, a, t[12], MD5C1f, MD5S13);
MD5_STEP (MD5_H , a, b, c, d, t[ 5], MD5C20, MD5S20);
MD5_STEP (MD5_H , d, a, b, c, t[ 8], MD5C21, MD5S21);
MD5_STEP (MD5_H , c, d, a, b, t[11], MD5C22, MD5S22);
MD5_STEP (MD5_H , b, c, d, a, t[14], MD5C23, MD5S23);
MD5_STEP (MD5_H , a, b, c, d, t[ 1], MD5C24, MD5S20);
MD5_STEP (MD5_H , d, a, b, c, t[ 4], MD5C25, MD5S21);
MD5_STEP (MD5_H , c, d, a, b, t[ 7], MD5C26, MD5S22);
MD5_STEP (MD5_H , b, c, d, a, t[10], MD5C27, MD5S23);
MD5_STEP (MD5_H , a, b, c, d, t[13], MD5C28, MD5S20);
MD5_STEP (MD5_H , d, a, b, c, t[ 0], MD5C29, MD5S21);
MD5_STEP (MD5_H , c, d, a, b, t[ 3], MD5C2a, MD5S22);
MD5_STEP (MD5_H , b, c, d, a, t[ 6], MD5C2b, MD5S23);
MD5_STEP (MD5_H , a, b, c, d, t[ 9], MD5C2c, MD5S20);
MD5_STEP (MD5_H , d, a, b, c, t[12], MD5C2d, MD5S21);
MD5_STEP (MD5_H , c, d, a, b, t[15], MD5C2e, MD5S22);
MD5_STEP (MD5_H , b, c, d, a, t[ 2], MD5C2f, MD5S23);
MD5_STEP (MD5_I , a, b, c, d, t[ 0], MD5C30, MD5S30);
MD5_STEP (MD5_I , d, a, b, c, t[ 7], MD5C31, MD5S31);
MD5_STEP (MD5_I , c, d, a, b, t[14], MD5C32, MD5S32);
MD5_STEP (MD5_I , b, c, d, a, t[ 5], MD5C33, MD5S33);
MD5_STEP (MD5_I , a, b, c, d, t[12], MD5C34, MD5S30);
MD5_STEP (MD5_I , d, a, b, c, t[ 3], MD5C35, MD5S31);
MD5_STEP (MD5_I , c, d, a, b, t[10], MD5C36, MD5S32);
MD5_STEP (MD5_I , b, c, d, a, t[ 1], MD5C37, MD5S33);
MD5_STEP (MD5_I , a, b, c, d, t[ 8], MD5C38, MD5S30);
MD5_STEP (MD5_I , d, a, b, c, t[15], MD5C39, MD5S31);
MD5_STEP (MD5_I , c, d, a, b, t[ 6], MD5C3a, MD5S32);
MD5_STEP (MD5_I , b, c, d, a, t[13], MD5C3b, MD5S33);
MD5_STEP (MD5_I , a, b, c, d, t[ 4], MD5C3c, MD5S30);
MD5_STEP (MD5_I , d, a, b, c, t[11], MD5C3d, MD5S31);
MD5_STEP (MD5_I , c, d, a, b, t[ 2], MD5C3e, MD5S32);
MD5_STEP (MD5_I , b, c, d, a, t[ 9], MD5C3f, MD5S33);
a += MD5M_A;
b += MD5M_B;
c += MD5M_C;
d += MD5M_D;
const u32 sum20 = walld0rf_magic (w0, pw_len, salt_buf0, salt_len, a, b, c, d, t);
SETSHIFTEDINT (t, sum20, 0x80);
t[14] = sum20 * 8;
a = MD5M_A;
b = MD5M_B;
c = MD5M_C;
d = MD5M_D;
MD5_STEP (MD5_Fo, a, b, c, d, t[ 0], MD5C00, MD5S00);
MD5_STEP (MD5_Fo, d, a, b, c, t[ 1], MD5C01, MD5S01);
MD5_STEP (MD5_Fo, c, d, a, b, t[ 2], MD5C02, MD5S02);
MD5_STEP (MD5_Fo, b, c, d, a, t[ 3], MD5C03, MD5S03);
MD5_STEP (MD5_Fo, a, b, c, d, t[ 4], MD5C04, MD5S00);
MD5_STEP (MD5_Fo, d, a, b, c, t[ 5], MD5C05, MD5S01);
MD5_STEP (MD5_Fo, c, d, a, b, t[ 6], MD5C06, MD5S02);
MD5_STEP (MD5_Fo, b, c, d, a, t[ 7], MD5C07, MD5S03);
MD5_STEP (MD5_Fo, a, b, c, d, t[ 8], MD5C08, MD5S00);
MD5_STEP (MD5_Fo, d, a, b, c, t[ 9], MD5C09, MD5S01);
MD5_STEP (MD5_Fo, c, d, a, b, t[10], MD5C0a, MD5S02);
MD5_STEP (MD5_Fo, b, c, d, a, t[11], MD5C0b, MD5S03);
MD5_STEP (MD5_Fo, a, b, c, d, t[12], MD5C0c, MD5S00);
MD5_STEP (MD5_Fo, d, a, b, c, t[13], MD5C0d, MD5S01);
MD5_STEP (MD5_Fo, c, d, a, b, t[14], MD5C0e, MD5S02);
MD5_STEP (MD5_Fo, b, c, d, a, t[15], MD5C0f, MD5S03);
MD5_STEP (MD5_Go, a, b, c, d, t[ 1], MD5C10, MD5S10);
MD5_STEP (MD5_Go, d, a, b, c, t[ 6], MD5C11, MD5S11);
MD5_STEP (MD5_Go, c, d, a, b, t[11], MD5C12, MD5S12);
MD5_STEP (MD5_Go, b, c, d, a, t[ 0], MD5C13, MD5S13);
MD5_STEP (MD5_Go, a, b, c, d, t[ 5], MD5C14, MD5S10);
MD5_STEP (MD5_Go, d, a, b, c, t[10], MD5C15, MD5S11);
MD5_STEP (MD5_Go, c, d, a, b, t[15], MD5C16, MD5S12);
MD5_STEP (MD5_Go, b, c, d, a, t[ 4], MD5C17, MD5S13);
MD5_STEP (MD5_Go, a, b, c, d, t[ 9], MD5C18, MD5S10);
MD5_STEP (MD5_Go, d, a, b, c, t[14], MD5C19, MD5S11);
MD5_STEP (MD5_Go, c, d, a, b, t[ 3], MD5C1a, MD5S12);
MD5_STEP (MD5_Go, b, c, d, a, t[ 8], MD5C1b, MD5S13);
MD5_STEP (MD5_Go, a, b, c, d, t[13], MD5C1c, MD5S10);
MD5_STEP (MD5_Go, d, a, b, c, t[ 2], MD5C1d, MD5S11);
MD5_STEP (MD5_Go, c, d, a, b, t[ 7], MD5C1e, MD5S12);
MD5_STEP (MD5_Go, b, c, d, a, t[12], MD5C1f, MD5S13);
MD5_STEP (MD5_H , a, b, c, d, t[ 5], MD5C20, MD5S20);
MD5_STEP (MD5_H , d, a, b, c, t[ 8], MD5C21, MD5S21);
MD5_STEP (MD5_H , c, d, a, b, t[11], MD5C22, MD5S22);
MD5_STEP (MD5_H , b, c, d, a, t[14], MD5C23, MD5S23);
MD5_STEP (MD5_H , a, b, c, d, t[ 1], MD5C24, MD5S20);
MD5_STEP (MD5_H , d, a, b, c, t[ 4], MD5C25, MD5S21);
MD5_STEP (MD5_H , c, d, a, b, t[ 7], MD5C26, MD5S22);
MD5_STEP (MD5_H , b, c, d, a, t[10], MD5C27, MD5S23);
MD5_STEP (MD5_H , a, b, c, d, t[13], MD5C28, MD5S20);
MD5_STEP (MD5_H , d, a, b, c, t[ 0], MD5C29, MD5S21);
MD5_STEP (MD5_H , c, d, a, b, t[ 3], MD5C2a, MD5S22);
MD5_STEP (MD5_H , b, c, d, a, t[ 6], MD5C2b, MD5S23);
MD5_STEP (MD5_H , a, b, c, d, t[ 9], MD5C2c, MD5S20);
MD5_STEP (MD5_H , d, a, b, c, t[12], MD5C2d, MD5S21);
MD5_STEP (MD5_H , c, d, a, b, t[15], MD5C2e, MD5S22);
MD5_STEP (MD5_H , b, c, d, a, t[ 2], MD5C2f, MD5S23);
MD5_STEP (MD5_I , a, b, c, d, t[ 0], MD5C30, MD5S30);
MD5_STEP (MD5_I , d, a, b, c, t[ 7], MD5C31, MD5S31);
MD5_STEP (MD5_I , c, d, a, b, t[14], MD5C32, MD5S32);
MD5_STEP (MD5_I , b, c, d, a, t[ 5], MD5C33, MD5S33);
MD5_STEP (MD5_I , a, b, c, d, t[12], MD5C34, MD5S30);
MD5_STEP (MD5_I , d, a, b, c, t[ 3], MD5C35, MD5S31);
MD5_STEP (MD5_I , c, d, a, b, t[10], MD5C36, MD5S32);
MD5_STEP (MD5_I , b, c, d, a, t[ 1], MD5C37, MD5S33);
MD5_STEP (MD5_I , a, b, c, d, t[ 8], MD5C38, MD5S30);
MD5_STEP (MD5_I , d, a, b, c, t[15], MD5C39, MD5S31);
MD5_STEP (MD5_I , c, d, a, b, t[ 6], MD5C3a, MD5S32);
MD5_STEP (MD5_I , b, c, d, a, t[13], MD5C3b, MD5S33);
MD5_STEP (MD5_I , a, b, c, d, t[ 4], MD5C3c, MD5S30);
MD5_STEP (MD5_I , d, a, b, c, t[11], MD5C3d, MD5S31);
MD5_STEP (MD5_I , c, d, a, b, t[ 2], MD5C3e, MD5S32);
MD5_STEP (MD5_I , b, c, d, a, t[ 9], MD5C3f, MD5S33);
a += MD5M_A;
b += MD5M_B;
c += MD5M_C;
d += MD5M_D;
a ^= c;
b ^= d;
c = 0;
d = 0;
COMPARE_M_SIMD (a, b, c, d);
}
}
void m07700s (u32 w0[4], u32 w1[4], u32 w2[4], u32 w3[4], const u32 pw_len, __global pw_t *pws, __global kernel_rule_t *rules_buf, __global comb_t *combs_buf, __global bf_t *bfs_buf, __global void *tmps, __global void *hooks, __global u32 *bitmaps_buf_s1_a, __global u32 *bitmaps_buf_s1_b, __global u32 *bitmaps_buf_s1_c, __global u32 *bitmaps_buf_s1_d, __global u32 *bitmaps_buf_s2_a, __global u32 *bitmaps_buf_s2_b, __global u32 *bitmaps_buf_s2_c, __global u32 *bitmaps_buf_s2_d, __global plain_t *plains_buf, __global digest_t *digests_buf, __global u32 *hashes_shown, __global salt_t *salt_bufs, __global void *esalt_bufs, __global u32 *d_return_buf, __global u32 *d_scryptV0_buf, __global u32 *d_scryptV1_buf, __global u32 *d_scryptV2_buf, __global u32 *d_scryptV3_buf, const u32 bitmap_mask, const u32 bitmap_shift1, const u32 bitmap_shift2, const u32 salt_pos, const u32 loop_pos, const u32 loop_cnt, const u32 il_cnt, const u32 digests_cnt, const u32 digests_offset)
{
/**
* modifier
*/
const u32 gid = get_global_id (0);
const u32 lid = get_local_id (0);
w0[0] = sapb_trans (w0[0]);
w0[1] = sapb_trans (w0[1]);
/**
* salt
*/
u32 salt_buf0[3];
salt_buf0[0] = salt_bufs[salt_pos].salt_buf[0];
salt_buf0[1] = salt_bufs[salt_pos].salt_buf[1];
salt_buf0[2] = salt_bufs[salt_pos].salt_buf[2];
salt_buf0[0] = sapb_trans (salt_buf0[0]);
salt_buf0[1] = sapb_trans (salt_buf0[1]);
salt_buf0[2] = sapb_trans (salt_buf0[2]);
const u32 salt_len = salt_bufs[salt_pos].salt_len;
u32 s0[4];
u32 s1[4];
u32 s2[4];
u32 s3[4];
s0[0] = salt_buf0[0];
s0[1] = salt_buf0[1];
s0[2] = salt_buf0[2];
s0[3] = 0;
s1[0] = 0;
s1[1] = 0;
s1[2] = 0;
s1[3] = 0;
s2[0] = 0;
s2[1] = 0;
s2[2] = 0;
s2[3] = 0;
s3[0] = 0;
s3[1] = 0;
s3[2] = 0;
s3[3] = 0;
switch_buffer_by_offset_le (s0, s1, s2, s3, pw_len);
const u32 pw_salt_len = pw_len + salt_len;
/**
* digest
*/
const u32 search[4] =
{
digests_buf[digests_offset].digest_buf[DGST_R0],
digests_buf[digests_offset].digest_buf[DGST_R1],
0,
0
};
/**
* loop
*/
u32 w0l = w0[0];
for (u32 il_pos = 0; il_pos < il_cnt; il_pos += VECT_SIZE)
{
const u32x w0r = sapb_trans (ix_create_bft (bfs_buf, il_pos));
const u32x w0lr = w0l | w0r;
w0[0] = w0lr;
u32 t[16];
t[ 0] = s0[0] | w0[0];
t[ 1] = s0[1] | w0[1];
t[ 2] = s0[2];
t[ 3] = s0[3];
t[ 4] = s1[0];
t[ 5] = 0;
t[ 6] = 0;
t[ 7] = 0;
t[ 8] = 0;
t[ 9] = 0;
t[10] = 0;
t[11] = 0;
t[12] = 0;
t[13] = 0;
t[14] = pw_salt_len * 8;
t[15] = 0;
PUTCHAR (t, pw_salt_len, 0x80);
/**
* md5
*/
u32 a = MD5M_A;
u32 b = MD5M_B;
u32 c = MD5M_C;
u32 d = MD5M_D;
MD5_STEP (MD5_Fo, a, b, c, d, t[ 0], MD5C00, MD5S00);
MD5_STEP (MD5_Fo, d, a, b, c, t[ 1], MD5C01, MD5S01);
MD5_STEP (MD5_Fo, c, d, a, b, t[ 2], MD5C02, MD5S02);
MD5_STEP (MD5_Fo, b, c, d, a, t[ 3], MD5C03, MD5S03);
MD5_STEP (MD5_Fo, a, b, c, d, t[ 4], MD5C04, MD5S00);
MD5_STEP (MD5_Fo, d, a, b, c, t[ 5], MD5C05, MD5S01);
MD5_STEP (MD5_Fo, c, d, a, b, t[ 6], MD5C06, MD5S02);
MD5_STEP (MD5_Fo, b, c, d, a, t[ 7], MD5C07, MD5S03);
MD5_STEP (MD5_Fo, a, b, c, d, t[ 8], MD5C08, MD5S00);
MD5_STEP (MD5_Fo, d, a, b, c, t[ 9], MD5C09, MD5S01);
MD5_STEP (MD5_Fo, c, d, a, b, t[10], MD5C0a, MD5S02);
MD5_STEP (MD5_Fo, b, c, d, a, t[11], MD5C0b, MD5S03);
MD5_STEP (MD5_Fo, a, b, c, d, t[12], MD5C0c, MD5S00);
MD5_STEP (MD5_Fo, d, a, b, c, t[13], MD5C0d, MD5S01);
MD5_STEP (MD5_Fo, c, d, a, b, t[14], MD5C0e, MD5S02);
MD5_STEP (MD5_Fo, b, c, d, a, t[15], MD5C0f, MD5S03);
MD5_STEP (MD5_Go, a, b, c, d, t[ 1], MD5C10, MD5S10);
MD5_STEP (MD5_Go, d, a, b, c, t[ 6], MD5C11, MD5S11);
MD5_STEP (MD5_Go, c, d, a, b, t[11], MD5C12, MD5S12);
MD5_STEP (MD5_Go, b, c, d, a, t[ 0], MD5C13, MD5S13);
MD5_STEP (MD5_Go, a, b, c, d, t[ 5], MD5C14, MD5S10);
MD5_STEP (MD5_Go, d, a, b, c, t[10], MD5C15, MD5S11);
MD5_STEP (MD5_Go, c, d, a, b, t[15], MD5C16, MD5S12);
MD5_STEP (MD5_Go, b, c, d, a, t[ 4], MD5C17, MD5S13);
MD5_STEP (MD5_Go, a, b, c, d, t[ 9], MD5C18, MD5S10);
MD5_STEP (MD5_Go, d, a, b, c, t[14], MD5C19, MD5S11);
MD5_STEP (MD5_Go, c, d, a, b, t[ 3], MD5C1a, MD5S12);
MD5_STEP (MD5_Go, b, c, d, a, t[ 8], MD5C1b, MD5S13);
MD5_STEP (MD5_Go, a, b, c, d, t[13], MD5C1c, MD5S10);
MD5_STEP (MD5_Go, d, a, b, c, t[ 2], MD5C1d, MD5S11);
MD5_STEP (MD5_Go, c, d, a, b, t[ 7], MD5C1e, MD5S12);
MD5_STEP (MD5_Go, b, c, d, a, t[12], MD5C1f, MD5S13);
MD5_STEP (MD5_H , a, b, c, d, t[ 5], MD5C20, MD5S20);
MD5_STEP (MD5_H , d, a, b, c, t[ 8], MD5C21, MD5S21);
MD5_STEP (MD5_H , c, d, a, b, t[11], MD5C22, MD5S22);
MD5_STEP (MD5_H , b, c, d, a, t[14], MD5C23, MD5S23);
MD5_STEP (MD5_H , a, b, c, d, t[ 1], MD5C24, MD5S20);
MD5_STEP (MD5_H , d, a, b, c, t[ 4], MD5C25, MD5S21);
MD5_STEP (MD5_H , c, d, a, b, t[ 7], MD5C26, MD5S22);
MD5_STEP (MD5_H , b, c, d, a, t[10], MD5C27, MD5S23);
MD5_STEP (MD5_H , a, b, c, d, t[13], MD5C28, MD5S20);
MD5_STEP (MD5_H , d, a, b, c, t[ 0], MD5C29, MD5S21);
MD5_STEP (MD5_H , c, d, a, b, t[ 3], MD5C2a, MD5S22);
MD5_STEP (MD5_H , b, c, d, a, t[ 6], MD5C2b, MD5S23);
MD5_STEP (MD5_H , a, b, c, d, t[ 9], MD5C2c, MD5S20);
MD5_STEP (MD5_H , d, a, b, c, t[12], MD5C2d, MD5S21);
MD5_STEP (MD5_H , c, d, a, b, t[15], MD5C2e, MD5S22);
MD5_STEP (MD5_H , b, c, d, a, t[ 2], MD5C2f, MD5S23);
MD5_STEP (MD5_I , a, b, c, d, t[ 0], MD5C30, MD5S30);
MD5_STEP (MD5_I , d, a, b, c, t[ 7], MD5C31, MD5S31);
MD5_STEP (MD5_I , c, d, a, b, t[14], MD5C32, MD5S32);
MD5_STEP (MD5_I , b, c, d, a, t[ 5], MD5C33, MD5S33);
MD5_STEP (MD5_I , a, b, c, d, t[12], MD5C34, MD5S30);
MD5_STEP (MD5_I , d, a, b, c, t[ 3], MD5C35, MD5S31);
MD5_STEP (MD5_I , c, d, a, b, t[10], MD5C36, MD5S32);
MD5_STEP (MD5_I , b, c, d, a, t[ 1], MD5C37, MD5S33);
MD5_STEP (MD5_I , a, b, c, d, t[ 8], MD5C38, MD5S30);
MD5_STEP (MD5_I , d, a, b, c, t[15], MD5C39, MD5S31);
MD5_STEP (MD5_I , c, d, a, b, t[ 6], MD5C3a, MD5S32);
MD5_STEP (MD5_I , b, c, d, a, t[13], MD5C3b, MD5S33);
MD5_STEP (MD5_I , a, b, c, d, t[ 4], MD5C3c, MD5S30);
MD5_STEP (MD5_I , d, a, b, c, t[11], MD5C3d, MD5S31);
MD5_STEP (MD5_I , c, d, a, b, t[ 2], MD5C3e, MD5S32);
MD5_STEP (MD5_I , b, c, d, a, t[ 9], MD5C3f, MD5S33);
a += MD5M_A;
b += MD5M_B;
c += MD5M_C;
d += MD5M_D;
const u32 sum20 = walld0rf_magic (w0, pw_len, salt_buf0, salt_len, a, b, c, d, t);
SETSHIFTEDINT (t, sum20, 0x80);
t[14] = sum20 * 8;
a = MD5M_A;
b = MD5M_B;
c = MD5M_C;
d = MD5M_D;
MD5_STEP (MD5_Fo, a, b, c, d, t[ 0], MD5C00, MD5S00);
MD5_STEP (MD5_Fo, d, a, b, c, t[ 1], MD5C01, MD5S01);
MD5_STEP (MD5_Fo, c, d, a, b, t[ 2], MD5C02, MD5S02);
MD5_STEP (MD5_Fo, b, c, d, a, t[ 3], MD5C03, MD5S03);
MD5_STEP (MD5_Fo, a, b, c, d, t[ 4], MD5C04, MD5S00);
MD5_STEP (MD5_Fo, d, a, b, c, t[ 5], MD5C05, MD5S01);
MD5_STEP (MD5_Fo, c, d, a, b, t[ 6], MD5C06, MD5S02);
MD5_STEP (MD5_Fo, b, c, d, a, t[ 7], MD5C07, MD5S03);
MD5_STEP (MD5_Fo, a, b, c, d, t[ 8], MD5C08, MD5S00);
MD5_STEP (MD5_Fo, d, a, b, c, t[ 9], MD5C09, MD5S01);
MD5_STEP (MD5_Fo, c, d, a, b, t[10], MD5C0a, MD5S02);
MD5_STEP (MD5_Fo, b, c, d, a, t[11], MD5C0b, MD5S03);
MD5_STEP (MD5_Fo, a, b, c, d, t[12], MD5C0c, MD5S00);
MD5_STEP (MD5_Fo, d, a, b, c, t[13], MD5C0d, MD5S01);
MD5_STEP (MD5_Fo, c, d, a, b, t[14], MD5C0e, MD5S02);
MD5_STEP (MD5_Fo, b, c, d, a, t[15], MD5C0f, MD5S03);
MD5_STEP (MD5_Go, a, b, c, d, t[ 1], MD5C10, MD5S10);
MD5_STEP (MD5_Go, d, a, b, c, t[ 6], MD5C11, MD5S11);
MD5_STEP (MD5_Go, c, d, a, b, t[11], MD5C12, MD5S12);
MD5_STEP (MD5_Go, b, c, d, a, t[ 0], MD5C13, MD5S13);
MD5_STEP (MD5_Go, a, b, c, d, t[ 5], MD5C14, MD5S10);
MD5_STEP (MD5_Go, d, a, b, c, t[10], MD5C15, MD5S11);
MD5_STEP (MD5_Go, c, d, a, b, t[15], MD5C16, MD5S12);
MD5_STEP (MD5_Go, b, c, d, a, t[ 4], MD5C17, MD5S13);
MD5_STEP (MD5_Go, a, b, c, d, t[ 9], MD5C18, MD5S10);
MD5_STEP (MD5_Go, d, a, b, c, t[14], MD5C19, MD5S11);
MD5_STEP (MD5_Go, c, d, a, b, t[ 3], MD5C1a, MD5S12);
MD5_STEP (MD5_Go, b, c, d, a, t[ 8], MD5C1b, MD5S13);
MD5_STEP (MD5_Go, a, b, c, d, t[13], MD5C1c, MD5S10);
MD5_STEP (MD5_Go, d, a, b, c, t[ 2], MD5C1d, MD5S11);
MD5_STEP (MD5_Go, c, d, a, b, t[ 7], MD5C1e, MD5S12);
MD5_STEP (MD5_Go, b, c, d, a, t[12], MD5C1f, MD5S13);
MD5_STEP (MD5_H , a, b, c, d, t[ 5], MD5C20, MD5S20);
MD5_STEP (MD5_H , d, a, b, c, t[ 8], MD5C21, MD5S21);
MD5_STEP (MD5_H , c, d, a, b, t[11], MD5C22, MD5S22);
MD5_STEP (MD5_H , b, c, d, a, t[14], MD5C23, MD5S23);
MD5_STEP (MD5_H , a, b, c, d, t[ 1], MD5C24, MD5S20);
MD5_STEP (MD5_H , d, a, b, c, t[ 4], MD5C25, MD5S21);
MD5_STEP (MD5_H , c, d, a, b, t[ 7], MD5C26, MD5S22);
MD5_STEP (MD5_H , b, c, d, a, t[10], MD5C27, MD5S23);
MD5_STEP (MD5_H , a, b, c, d, t[13], MD5C28, MD5S20);
MD5_STEP (MD5_H , d, a, b, c, t[ 0], MD5C29, MD5S21);
MD5_STEP (MD5_H , c, d, a, b, t[ 3], MD5C2a, MD5S22);
MD5_STEP (MD5_H , b, c, d, a, t[ 6], MD5C2b, MD5S23);
MD5_STEP (MD5_H , a, b, c, d, t[ 9], MD5C2c, MD5S20);
MD5_STEP (MD5_H , d, a, b, c, t[12], MD5C2d, MD5S21);
MD5_STEP (MD5_H , c, d, a, b, t[15], MD5C2e, MD5S22);
MD5_STEP (MD5_H , b, c, d, a, t[ 2], MD5C2f, MD5S23);
MD5_STEP (MD5_I , a, b, c, d, t[ 0], MD5C30, MD5S30);
MD5_STEP (MD5_I , d, a, b, c, t[ 7], MD5C31, MD5S31);
MD5_STEP (MD5_I , c, d, a, b, t[14], MD5C32, MD5S32);
MD5_STEP (MD5_I , b, c, d, a, t[ 5], MD5C33, MD5S33);
MD5_STEP (MD5_I , a, b, c, d, t[12], MD5C34, MD5S30);
MD5_STEP (MD5_I , d, a, b, c, t[ 3], MD5C35, MD5S31);
MD5_STEP (MD5_I , c, d, a, b, t[10], MD5C36, MD5S32);
MD5_STEP (MD5_I , b, c, d, a, t[ 1], MD5C37, MD5S33);
MD5_STEP (MD5_I , a, b, c, d, t[ 8], MD5C38, MD5S30);
MD5_STEP (MD5_I , d, a, b, c, t[15], MD5C39, MD5S31);
MD5_STEP (MD5_I , c, d, a, b, t[ 6], MD5C3a, MD5S32);
MD5_STEP (MD5_I , b, c, d, a, t[13], MD5C3b, MD5S33);
MD5_STEP (MD5_I , a, b, c, d, t[ 4], MD5C3c, MD5S30);
MD5_STEP (MD5_I , d, a, b, c, t[11], MD5C3d, MD5S31);
MD5_STEP (MD5_I , c, d, a, b, t[ 2], MD5C3e, MD5S32);
MD5_STEP (MD5_I , b, c, d, a, t[ 9], MD5C3f, MD5S33);
a += MD5M_A;
b += MD5M_B;
c += MD5M_C;
d += MD5M_D;
a ^= c;
b ^= d;
c = 0;
d = 0;
COMPARE_S_SIMD (a, b, c, d);
}
}
__kernel void m07700_m04 (__global pw_t *pws, __global kernel_rule_t *rules_buf, __global comb_t *combs_buf, __global bf_t *bfs_buf, __global void *tmps, __global void *hooks, __global u32 *bitmaps_buf_s1_a, __global u32 *bitmaps_buf_s1_b, __global u32 *bitmaps_buf_s1_c, __global u32 *bitmaps_buf_s1_d, __global u32 *bitmaps_buf_s2_a, __global u32 *bitmaps_buf_s2_b, __global u32 *bitmaps_buf_s2_c, __global u32 *bitmaps_buf_s2_d, __global plain_t *plains_buf, __global digest_t *digests_buf, __global u32 *hashes_shown, __global salt_t *salt_bufs, __global void *esalt_bufs, __global u32 *d_return_buf, __global u32 *d_scryptV0_buf, __global u32 *d_scryptV1_buf, __global u32 *d_scryptV2_buf, __global u32 *d_scryptV3_buf, const u32 bitmap_mask, const u32 bitmap_shift1, const u32 bitmap_shift2, const u32 salt_pos, const u32 loop_pos, const u32 loop_cnt, const u32 il_cnt, const u32 digests_cnt, const u32 digests_offset, const u32 combs_mode, const u32 gid_max)
{
/**
* base
*/
const u32 gid = get_global_id (0);
if (gid >= gid_max) return;
/**
* modifier
*/
//const u32 lid = get_local_id (0);
u32 w0[4];
w0[0] = pws[gid].i[ 0];
w0[1] = pws[gid].i[ 1];
w0[2] = pws[gid].i[ 2];
w0[3] = pws[gid].i[ 3];
u32 w1[4];
w1[0] = 0;
w1[1] = 0;
w1[2] = 0;
w1[3] = 0;
u32 w2[4];
w2[0] = 0;
w2[1] = 0;
w2[2] = 0;
w2[3] = 0;
u32 w3[4];
w3[0] = 0;
w3[1] = 0;
w3[2] = 0;
w3[3] = 0;
const u32 pw_len = pws[gid].pw_len;
/**
* main
*/
m07700m (w0, w1, w2, w3, pw_len, pws, rules_buf, combs_buf, bfs_buf, tmps, hooks, bitmaps_buf_s1_a, bitmaps_buf_s1_b, bitmaps_buf_s1_c, bitmaps_buf_s1_d, bitmaps_buf_s2_a, bitmaps_buf_s2_b, bitmaps_buf_s2_c, bitmaps_buf_s2_d, plains_buf, digests_buf, hashes_shown, salt_bufs, esalt_bufs, d_return_buf, d_scryptV0_buf, d_scryptV1_buf, d_scryptV2_buf, d_scryptV3_buf, bitmap_mask, bitmap_shift1, bitmap_shift2, salt_pos, loop_pos, loop_cnt, il_cnt, digests_cnt, digests_offset);
}
__kernel void m07700_m08 (__global pw_t *pws, __global kernel_rule_t *rules_buf, __global comb_t *combs_buf, __global bf_t *bfs_buf, __global void *tmps, __global void *hooks, __global u32 *bitmaps_buf_s1_a, __global u32 *bitmaps_buf_s1_b, __global u32 *bitmaps_buf_s1_c, __global u32 *bitmaps_buf_s1_d, __global u32 *bitmaps_buf_s2_a, __global u32 *bitmaps_buf_s2_b, __global u32 *bitmaps_buf_s2_c, __global u32 *bitmaps_buf_s2_d, __global plain_t *plains_buf, __global digest_t *digests_buf, __global u32 *hashes_shown, __global salt_t *salt_bufs, __global void *esalt_bufs, __global u32 *d_return_buf, __global u32 *d_scryptV0_buf, __global u32 *d_scryptV1_buf, __global u32 *d_scryptV2_buf, __global u32 *d_scryptV3_buf, const u32 bitmap_mask, const u32 bitmap_shift1, const u32 bitmap_shift2, const u32 salt_pos, const u32 loop_pos, const u32 loop_cnt, const u32 il_cnt, const u32 digests_cnt, const u32 digests_offset, const u32 combs_mode, const u32 gid_max)
{
/**
* base
*/
const u32 gid = get_global_id (0);
if (gid >= gid_max) return;
/**
* modifier
*/
//const u32 lid = get_local_id (0);
u32 w0[4];
w0[0] = pws[gid].i[ 0];
w0[1] = pws[gid].i[ 1];
w0[2] = pws[gid].i[ 2];
w0[3] = pws[gid].i[ 3];
u32 w1[4];
w1[0] = pws[gid].i[ 4];
w1[1] = pws[gid].i[ 5];
w1[2] = pws[gid].i[ 6];
w1[3] = pws[gid].i[ 7];
u32 w2[4];
w2[0] = 0;
w2[1] = 0;
w2[2] = 0;
w2[3] = 0;
u32 w3[4];
w3[0] = 0;
w3[1] = 0;
w3[2] = 0;
w3[3] = 0;
const u32 pw_len = pws[gid].pw_len;
/**
* main
*/
m07700m (w0, w1, w2, w3, pw_len, pws, rules_buf, combs_buf, bfs_buf, tmps, hooks, bitmaps_buf_s1_a, bitmaps_buf_s1_b, bitmaps_buf_s1_c, bitmaps_buf_s1_d, bitmaps_buf_s2_a, bitmaps_buf_s2_b, bitmaps_buf_s2_c, bitmaps_buf_s2_d, plains_buf, digests_buf, hashes_shown, salt_bufs, esalt_bufs, d_return_buf, d_scryptV0_buf, d_scryptV1_buf, d_scryptV2_buf, d_scryptV3_buf, bitmap_mask, bitmap_shift1, bitmap_shift2, salt_pos, loop_pos, loop_cnt, il_cnt, digests_cnt, digests_offset);
}
__kernel void m07700_m16 (__global pw_t *pws, __global kernel_rule_t *rules_buf, __global comb_t *combs_buf, __global bf_t *bfs_buf, __global void *tmps, __global void *hooks, __global u32 *bitmaps_buf_s1_a, __global u32 *bitmaps_buf_s1_b, __global u32 *bitmaps_buf_s1_c, __global u32 *bitmaps_buf_s1_d, __global u32 *bitmaps_buf_s2_a, __global u32 *bitmaps_buf_s2_b, __global u32 *bitmaps_buf_s2_c, __global u32 *bitmaps_buf_s2_d, __global plain_t *plains_buf, __global digest_t *digests_buf, __global u32 *hashes_shown, __global salt_t *salt_bufs, __global void *esalt_bufs, __global u32 *d_return_buf, __global u32 *d_scryptV0_buf, __global u32 *d_scryptV1_buf, __global u32 *d_scryptV2_buf, __global u32 *d_scryptV3_buf, const u32 bitmap_mask, const u32 bitmap_shift1, const u32 bitmap_shift2, const u32 salt_pos, const u32 loop_pos, const u32 loop_cnt, const u32 il_cnt, const u32 digests_cnt, const u32 digests_offset, const u32 combs_mode, const u32 gid_max)
{
}
__kernel void m07700_s04 (__global pw_t *pws, __global kernel_rule_t *rules_buf, __global comb_t *combs_buf, __global bf_t *bfs_buf, __global void *tmps, __global void *hooks, __global u32 *bitmaps_buf_s1_a, __global u32 *bitmaps_buf_s1_b, __global u32 *bitmaps_buf_s1_c, __global u32 *bitmaps_buf_s1_d, __global u32 *bitmaps_buf_s2_a, __global u32 *bitmaps_buf_s2_b, __global u32 *bitmaps_buf_s2_c, __global u32 *bitmaps_buf_s2_d, __global plain_t *plains_buf, __global digest_t *digests_buf, __global u32 *hashes_shown, __global salt_t *salt_bufs, __global void *esalt_bufs, __global u32 *d_return_buf, __global u32 *d_scryptV0_buf, __global u32 *d_scryptV1_buf, __global u32 *d_scryptV2_buf, __global u32 *d_scryptV3_buf, const u32 bitmap_mask, const u32 bitmap_shift1, const u32 bitmap_shift2, const u32 salt_pos, const u32 loop_pos, const u32 loop_cnt, const u32 il_cnt, const u32 digests_cnt, const u32 digests_offset, const u32 combs_mode, const u32 gid_max)
{
/**
* base
*/
const u32 gid = get_global_id (0);
if (gid >= gid_max) return;
/**
* modifier
*/
//const u32 lid = get_local_id (0);
u32 w0[4];
w0[0] = pws[gid].i[ 0];
w0[1] = pws[gid].i[ 1];
w0[2] = pws[gid].i[ 2];
w0[3] = pws[gid].i[ 3];
u32 w1[4];
w1[0] = 0;
w1[1] = 0;
w1[2] = 0;
w1[3] = 0;
u32 w2[4];
w2[0] = 0;
w2[1] = 0;
w2[2] = 0;
w2[3] = 0;
u32 w3[4];
w3[0] = 0;
w3[1] = 0;
w3[2] = 0;
w3[3] = 0;
const u32 pw_len = pws[gid].pw_len;
/**
* main
*/
m07700s (w0, w1, w2, w3, pw_len, pws, rules_buf, combs_buf, bfs_buf, tmps, hooks, bitmaps_buf_s1_a, bitmaps_buf_s1_b, bitmaps_buf_s1_c, bitmaps_buf_s1_d, bitmaps_buf_s2_a, bitmaps_buf_s2_b, bitmaps_buf_s2_c, bitmaps_buf_s2_d, plains_buf, digests_buf, hashes_shown, salt_bufs, esalt_bufs, d_return_buf, d_scryptV0_buf, d_scryptV1_buf, d_scryptV2_buf, d_scryptV3_buf, bitmap_mask, bitmap_shift1, bitmap_shift2, salt_pos, loop_pos, loop_cnt, il_cnt, digests_cnt, digests_offset);
}
__kernel void m07700_s08 (__global pw_t *pws, __global kernel_rule_t *rules_buf, __global comb_t *combs_buf, __global bf_t *bfs_buf, __global void *tmps, __global void *hooks, __global u32 *bitmaps_buf_s1_a, __global u32 *bitmaps_buf_s1_b, __global u32 *bitmaps_buf_s1_c, __global u32 *bitmaps_buf_s1_d, __global u32 *bitmaps_buf_s2_a, __global u32 *bitmaps_buf_s2_b, __global u32 *bitmaps_buf_s2_c, __global u32 *bitmaps_buf_s2_d, __global plain_t *plains_buf, __global digest_t *digests_buf, __global u32 *hashes_shown, __global salt_t *salt_bufs, __global void *esalt_bufs, __global u32 *d_return_buf, __global u32 *d_scryptV0_buf, __global u32 *d_scryptV1_buf, __global u32 *d_scryptV2_buf, __global u32 *d_scryptV3_buf, const u32 bitmap_mask, const u32 bitmap_shift1, const u32 bitmap_shift2, const u32 salt_pos, const u32 loop_pos, const u32 loop_cnt, const u32 il_cnt, const u32 digests_cnt, const u32 digests_offset, const u32 combs_mode, const u32 gid_max)
{
/**
* base
*/
const u32 gid = get_global_id (0);
if (gid >= gid_max) return;
/**
* modifier
*/
//const u32 lid = get_local_id (0);
u32 w0[4];
w0[0] = pws[gid].i[ 0];
w0[1] = pws[gid].i[ 1];
w0[2] = pws[gid].i[ 2];
w0[3] = pws[gid].i[ 3];
u32 w1[4];
w1[0] = pws[gid].i[ 4];
w1[1] = pws[gid].i[ 5];
w1[2] = pws[gid].i[ 6];
w1[3] = pws[gid].i[ 7];
u32 w2[4];
w2[0] = 0;
w2[1] = 0;
w2[2] = 0;
w2[3] = 0;
u32 w3[4];
w3[0] = 0;
w3[1] = 0;
w3[2] = 0;
w3[3] = 0;
const u32 pw_len = pws[gid].pw_len;
/**
* main
*/
m07700s (w0, w1, w2, w3, pw_len, pws, rules_buf, combs_buf, bfs_buf, tmps, hooks, bitmaps_buf_s1_a, bitmaps_buf_s1_b, bitmaps_buf_s1_c, bitmaps_buf_s1_d, bitmaps_buf_s2_a, bitmaps_buf_s2_b, bitmaps_buf_s2_c, bitmaps_buf_s2_d, plains_buf, digests_buf, hashes_shown, salt_bufs, esalt_bufs, d_return_buf, d_scryptV0_buf, d_scryptV1_buf, d_scryptV2_buf, d_scryptV3_buf, bitmap_mask, bitmap_shift1, bitmap_shift2, salt_pos, loop_pos, loop_cnt, il_cnt, digests_cnt, digests_offset);
}
__kernel void m07700_s16 (__global pw_t *pws, __global kernel_rule_t *rules_buf, __global comb_t *combs_buf, __global bf_t *bfs_buf, __global void *tmps, __global void *hooks, __global u32 *bitmaps_buf_s1_a, __global u32 *bitmaps_buf_s1_b, __global u32 *bitmaps_buf_s1_c, __global u32 *bitmaps_buf_s1_d, __global u32 *bitmaps_buf_s2_a, __global u32 *bitmaps_buf_s2_b, __global u32 *bitmaps_buf_s2_c, __global u32 *bitmaps_buf_s2_d, __global plain_t *plains_buf, __global digest_t *digests_buf, __global u32 *hashes_shown, __global salt_t *salt_bufs, __global void *esalt_bufs, __global u32 *d_return_buf, __global u32 *d_scryptV0_buf, __global u32 *d_scryptV1_buf, __global u32 *d_scryptV2_buf, __global u32 *d_scryptV3_buf, const u32 bitmap_mask, const u32 bitmap_shift1, const u32 bitmap_shift2, const u32 salt_pos, const u32 loop_pos, const u32 loop_cnt, const u32 il_cnt, const u32 digests_cnt, const u32 digests_offset, const u32 combs_mode, const u32 gid_max)
{
}