mirror of
https://github.com/hashcat/hashcat.git
synced 2025-07-23 06:58:31 +00:00

Updated kernel declarations from "KERNEL_FQ void HC_ATTR_SEQ" to "KERNEL_FQ KERNEL_FA void". Please update your custom plugin kernels accordingly. Added spilling size as a factor in calculating usable memory per device. This is based on undocumented variables and may not be 100% accurate, but it works well in practice. Added a compiler hint to scrypt-based kernels indicating the guaranteed maximum thread count per kernel invocation. Removed redundant kernel code 29800, as it is identical to 27700, and updated the plugin.
183 lines
3.9 KiB
Common Lisp
183 lines
3.9 KiB
Common Lisp
/**
|
|
* Author......: See docs/credits.txt
|
|
* License.....: MIT
|
|
*/
|
|
|
|
//#define NEW_SIMD_CODE
|
|
|
|
#ifdef KERNEL_STATIC
|
|
#include M2S(INCLUDE_PATH/inc_vendor.h)
|
|
#include M2S(INCLUDE_PATH/inc_types.h)
|
|
#include M2S(INCLUDE_PATH/inc_platform.cl)
|
|
#include M2S(INCLUDE_PATH/inc_common.cl)
|
|
#include M2S(INCLUDE_PATH/inc_simd.cl)
|
|
#include M2S(INCLUDE_PATH/inc_hash_sha1.cl)
|
|
#else
|
|
#include "inc_vendor.h"
|
|
#include "inc_types.h"
|
|
#include "inc_platform.h"
|
|
#include "inc_common.h"
|
|
#include "inc_simd.h"
|
|
#include "inc_hash_sha1.h"
|
|
#endif
|
|
|
|
#define COMPARE_S M2S(INCLUDE_PATH/inc_comp_single.cl)
|
|
#define COMPARE_M M2S(INCLUDE_PATH/inc_comp_multi.cl)
|
|
|
|
typedef struct wpa_pmk_tmp
|
|
{
|
|
u32 out[8];
|
|
|
|
} wpa_pmk_tmp_t;
|
|
|
|
typedef struct wpa_pmkid
|
|
{
|
|
u32 pmkid[4];
|
|
u32 pmkid_data[16];
|
|
u8 orig_mac_ap[6];
|
|
u8 orig_mac_sta[6];
|
|
u8 essid_len;
|
|
u32 essid_buf[16];
|
|
|
|
} wpa_pmkid_t;
|
|
|
|
#ifdef KERNEL_STATIC
|
|
DECLSPEC u8 hex_convert (const u8 c)
|
|
{
|
|
return (c & 15) + (c >> 6) * 9;
|
|
}
|
|
|
|
DECLSPEC u8 hex_to_u8 (const u8 *hex)
|
|
{
|
|
u8 v = 0;
|
|
|
|
v |= ((u8) hex_convert (hex[1]) << 0);
|
|
v |= ((u8) hex_convert (hex[0]) << 4);
|
|
|
|
return (v);
|
|
}
|
|
#endif
|
|
|
|
KERNEL_FQ KERNEL_FA void m16801_init (KERN_ATTR_TMPS_ESALT (wpa_pmk_tmp_t, wpa_pmkid_t))
|
|
{
|
|
const u64 gid = get_global_id (0);
|
|
|
|
if (gid >= GID_CNT) return;
|
|
|
|
u32 in[16];
|
|
|
|
in[ 0] = pws[gid].i[ 0];
|
|
in[ 1] = pws[gid].i[ 1];
|
|
in[ 2] = pws[gid].i[ 2];
|
|
in[ 3] = pws[gid].i[ 3];
|
|
in[ 4] = pws[gid].i[ 4];
|
|
in[ 5] = pws[gid].i[ 5];
|
|
in[ 6] = pws[gid].i[ 6];
|
|
in[ 7] = pws[gid].i[ 7];
|
|
in[ 8] = pws[gid].i[ 8];
|
|
in[ 9] = pws[gid].i[ 9];
|
|
in[10] = pws[gid].i[10];
|
|
in[11] = pws[gid].i[11];
|
|
in[12] = pws[gid].i[12];
|
|
in[13] = pws[gid].i[13];
|
|
in[14] = pws[gid].i[14];
|
|
in[15] = pws[gid].i[15];
|
|
|
|
u8 *in_ptr = (u8 *) in;
|
|
|
|
u32 out[8];
|
|
|
|
u8 *out_ptr = (u8 *) out;
|
|
|
|
for (int i = 0, j = 0; i < 32; i += 1, j += 2)
|
|
{
|
|
out_ptr[i] = hex_to_u8 (in_ptr + j);
|
|
}
|
|
|
|
tmps[gid].out[0] = hc_swap32_S (out[0]);
|
|
tmps[gid].out[1] = hc_swap32_S (out[1]);
|
|
tmps[gid].out[2] = hc_swap32_S (out[2]);
|
|
tmps[gid].out[3] = hc_swap32_S (out[3]);
|
|
tmps[gid].out[4] = hc_swap32_S (out[4]);
|
|
tmps[gid].out[5] = hc_swap32_S (out[5]);
|
|
tmps[gid].out[6] = hc_swap32_S (out[6]);
|
|
tmps[gid].out[7] = hc_swap32_S (out[7]);
|
|
}
|
|
|
|
KERNEL_FQ KERNEL_FA void m16801_loop (KERN_ATTR_TMPS_ESALT (wpa_pmk_tmp_t, wpa_pmkid_t))
|
|
{
|
|
const u64 gid = get_global_id (0);
|
|
|
|
if (gid >= GID_CNT) return;
|
|
}
|
|
|
|
KERNEL_FQ KERNEL_FA void m16801_comp (KERN_ATTR_TMPS_ESALT (wpa_pmk_tmp_t, wpa_pmkid_t))
|
|
{
|
|
// not in use here, special case...
|
|
}
|
|
|
|
KERNEL_FQ KERNEL_FA void m16801_aux1 (KERN_ATTR_TMPS_ESALT (wpa_pmk_tmp_t, wpa_pmkid_t))
|
|
{
|
|
const u64 gid = get_global_id (0);
|
|
|
|
if (gid >= GID_CNT) return;
|
|
|
|
u32 w[16];
|
|
|
|
w[ 0] = tmps[gid].out[0];
|
|
w[ 1] = tmps[gid].out[1];
|
|
w[ 2] = tmps[gid].out[2];
|
|
w[ 3] = tmps[gid].out[3];
|
|
w[ 4] = tmps[gid].out[4];
|
|
w[ 5] = tmps[gid].out[5];
|
|
w[ 6] = tmps[gid].out[6];
|
|
w[ 7] = tmps[gid].out[7];
|
|
w[ 8] = 0;
|
|
w[ 9] = 0;
|
|
w[10] = 0;
|
|
w[11] = 0;
|
|
w[12] = 0;
|
|
w[13] = 0;
|
|
w[14] = 0;
|
|
w[15] = 0;
|
|
|
|
const u32 digest_pos = LOOP_POS;
|
|
|
|
const u32 digest_cur = DIGESTS_OFFSET_HOST + digest_pos;
|
|
|
|
GLOBAL_AS const wpa_pmkid_t *wpa_pmkid = &esalt_bufs[digest_cur];
|
|
|
|
sha1_hmac_ctx_t sha1_hmac_ctx;
|
|
|
|
sha1_hmac_init (&sha1_hmac_ctx, w, 32);
|
|
|
|
sha1_hmac_update_global_swap (&sha1_hmac_ctx, wpa_pmkid->pmkid_data, 20);
|
|
|
|
sha1_hmac_final (&sha1_hmac_ctx);
|
|
|
|
const u32 r0 = sha1_hmac_ctx.opad.h[0];
|
|
const u32 r1 = sha1_hmac_ctx.opad.h[1];
|
|
const u32 r2 = sha1_hmac_ctx.opad.h[2];
|
|
const u32 r3 = sha1_hmac_ctx.opad.h[3];
|
|
|
|
#ifdef KERNEL_STATIC
|
|
|
|
#define il_pos 0
|
|
#include COMPARE_M
|
|
|
|
#else
|
|
|
|
if ((hc_swap32_S (r0) == wpa_pmkid->pmkid[0])
|
|
&& (hc_swap32_S (r1) == wpa_pmkid->pmkid[1])
|
|
&& (hc_swap32_S (r2) == wpa_pmkid->pmkid[2])
|
|
&& (hc_swap32_S (r3) == wpa_pmkid->pmkid[3]))
|
|
{
|
|
if (hc_atomic_inc (&hashes_shown[digest_cur]) == 0)
|
|
{
|
|
mark_hash (plains_buf, d_return_buf, SALT_POS_HOST, DIGESTS_CNT, digest_pos, digest_cur, gid, 0, 0, 0);
|
|
}
|
|
}
|
|
|
|
#endif
|
|
}
|