mirror of
https://github.com/hashcat/hashcat.git
synced 2025-07-24 15:38:47 +00:00

Updated kernel declarations from "KERNEL_FQ void HC_ATTR_SEQ" to "KERNEL_FQ KERNEL_FA void". Please update your custom plugin kernels accordingly. Added spilling size as a factor in calculating usable memory per device. This is based on undocumented variables and may not be 100% accurate, but it works well in practice. Added a compiler hint to scrypt-based kernels indicating the guaranteed maximum thread count per kernel invocation. Removed redundant kernel code 29800, as it is identical to 27700, and updated the plugin.
470 lines
10 KiB
Common Lisp
470 lines
10 KiB
Common Lisp
/**
|
|
* Author......: See docs/credits.txt
|
|
* License.....: MIT
|
|
*/
|
|
|
|
#define NEW_SIMD_CODE
|
|
|
|
#ifdef KERNEL_STATIC
|
|
#include M2S(INCLUDE_PATH/inc_vendor.h)
|
|
#include M2S(INCLUDE_PATH/inc_types.h)
|
|
#include M2S(INCLUDE_PATH/inc_platform.cl)
|
|
#include M2S(INCLUDE_PATH/inc_common.cl)
|
|
#include M2S(INCLUDE_PATH/inc_simd.cl)
|
|
#include M2S(INCLUDE_PATH/inc_hash_sha256.cl)
|
|
#endif
|
|
|
|
typedef struct aws4_sig_v4
|
|
{
|
|
u32 date[3];
|
|
u32 date_len;
|
|
|
|
u32 longdate[4];
|
|
u32 longdate_len;
|
|
|
|
u32 region[4];
|
|
u32 region_len;
|
|
|
|
u32 service[4];
|
|
u32 service_len;
|
|
|
|
u32 canonical[8];
|
|
u32 canonical_len;
|
|
|
|
u32 stringtosign[64];
|
|
u32 stringtosign_len;
|
|
|
|
} aws4_sig_v4_t;
|
|
|
|
KERNEL_FQ KERNEL_FA void m28700_mxx (KERN_ATTR_VECTOR_ESALT (aws4_sig_v4_t))
|
|
{
|
|
/**
|
|
* modifier
|
|
*/
|
|
|
|
const u64 lid = get_local_id (0);
|
|
const u64 gid = get_global_id (0);
|
|
const u64 lsz = get_local_size (0);
|
|
|
|
if (gid >= GID_CNT) return;
|
|
|
|
/**
|
|
* base
|
|
*/
|
|
|
|
const u32 pw_len = pws[gid].pw_len;
|
|
|
|
u32x w[64] = { 0 };
|
|
|
|
for (u32 i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
|
|
{
|
|
w[idx] = pws[gid].i[idx];
|
|
}
|
|
|
|
const u32 date_len = esalt_bufs[DIGESTS_OFFSET_HOST].date_len;
|
|
|
|
u32x date_buf[64] = { 0 };
|
|
|
|
for (u32 i = 0, idx = 0; i < date_len; i += 4, idx += 1)
|
|
{
|
|
date_buf[idx] = hc_swap32_S (esalt_bufs[DIGESTS_OFFSET_HOST].date[idx]);
|
|
}
|
|
|
|
const u32 region_len = esalt_bufs[DIGESTS_OFFSET_HOST].region_len;
|
|
|
|
u32x region_buf[64] = { 0 };
|
|
|
|
for (u32 i = 0, idx = 0; i < region_len; i += 4, idx += 1)
|
|
{
|
|
region_buf[idx] = hc_swap32_S (esalt_bufs[DIGESTS_OFFSET_HOST].region[idx]);
|
|
}
|
|
|
|
const u32 service_len = esalt_bufs[DIGESTS_OFFSET_HOST].service_len;
|
|
|
|
u32x service_buf[64] = { 0 };
|
|
|
|
for (u32 i = 0, idx = 0; i < service_len; i += 4, idx += 1)
|
|
{
|
|
service_buf[idx] = hc_swap32_S (esalt_bufs[DIGESTS_OFFSET_HOST].service[idx]);
|
|
}
|
|
|
|
const u32 stringtosign_len = esalt_bufs[DIGESTS_OFFSET_HOST].stringtosign_len;
|
|
|
|
u32x stringtosign_buf[64] = { 0 };
|
|
|
|
for (u32 i = 0, idx = 0; i < stringtosign_len; i += 4, idx += 1)
|
|
{
|
|
stringtosign_buf[idx] = hc_swap32_S (esalt_bufs[DIGESTS_OFFSET_HOST].stringtosign[idx]);
|
|
}
|
|
|
|
/**
|
|
* loop
|
|
*/
|
|
|
|
u32x w0l = w[0];
|
|
|
|
for (u32 il_pos = 0; il_pos < IL_CNT; il_pos += VECT_SIZE)
|
|
{
|
|
const u32x w0r = words_buf_r[il_pos / VECT_SIZE];
|
|
|
|
const u32x w0 = w0l | w0r;
|
|
|
|
w[0] = w0;
|
|
|
|
// kdate
|
|
|
|
u32x w_t[64];
|
|
|
|
w_t[0] = 0x41575334;
|
|
|
|
for (u32 i = 1; i < 64; i++)
|
|
{
|
|
w_t[i] = w[i - 1];
|
|
}
|
|
|
|
sha256_hmac_ctx_vector_t ctx_kdate;
|
|
|
|
sha256_hmac_init_vector (&ctx_kdate, w_t, pw_len + 4);
|
|
|
|
sha256_hmac_update_vector (&ctx_kdate, date_buf, date_len);
|
|
|
|
sha256_hmac_final_vector (&ctx_kdate);
|
|
|
|
// kregion
|
|
|
|
w_t[0] = ctx_kdate.opad.h[0];
|
|
w_t[1] = ctx_kdate.opad.h[1];
|
|
w_t[2] = ctx_kdate.opad.h[2];
|
|
w_t[3] = ctx_kdate.opad.h[3];
|
|
w_t[4] = ctx_kdate.opad.h[4];
|
|
w_t[5] = ctx_kdate.opad.h[5];
|
|
w_t[6] = ctx_kdate.opad.h[6];
|
|
w_t[7] = ctx_kdate.opad.h[7];
|
|
|
|
for (u32 i = 8; i < 64; i++)
|
|
{
|
|
w_t[i] = 0;
|
|
}
|
|
|
|
sha256_hmac_ctx_vector_t ctx_kregion;
|
|
|
|
sha256_hmac_init_vector (&ctx_kregion, w_t, 32);
|
|
|
|
sha256_hmac_update_vector (&ctx_kregion, region_buf, region_len);
|
|
|
|
sha256_hmac_final_vector (&ctx_kregion);
|
|
|
|
// kservice
|
|
|
|
w_t[0] = ctx_kregion.opad.h[0];
|
|
w_t[1] = ctx_kregion.opad.h[1];
|
|
w_t[2] = ctx_kregion.opad.h[2];
|
|
w_t[3] = ctx_kregion.opad.h[3];
|
|
w_t[4] = ctx_kregion.opad.h[4];
|
|
w_t[5] = ctx_kregion.opad.h[5];
|
|
w_t[6] = ctx_kregion.opad.h[6];
|
|
w_t[7] = ctx_kregion.opad.h[7];
|
|
|
|
for (u32 i = 8; i < 64; i++)
|
|
{
|
|
w_t[i] = 0;
|
|
}
|
|
|
|
sha256_hmac_ctx_vector_t ctx_kservice;
|
|
|
|
sha256_hmac_init_vector (&ctx_kservice, w_t, 32);
|
|
|
|
sha256_hmac_update_vector (&ctx_kservice, service_buf, service_len);
|
|
|
|
sha256_hmac_final_vector (&ctx_kservice);
|
|
|
|
// signingkey
|
|
|
|
w_t[0] = ctx_kservice.opad.h[0];
|
|
w_t[1] = ctx_kservice.opad.h[1];
|
|
w_t[2] = ctx_kservice.opad.h[2];
|
|
w_t[3] = ctx_kservice.opad.h[3];
|
|
w_t[4] = ctx_kservice.opad.h[4];
|
|
w_t[5] = ctx_kservice.opad.h[5];
|
|
w_t[6] = ctx_kservice.opad.h[6];
|
|
w_t[7] = ctx_kservice.opad.h[7];
|
|
|
|
for (u32 i = 8; i < 64; i++)
|
|
{
|
|
w_t[i] = 0;
|
|
}
|
|
|
|
sha256_hmac_ctx_vector_t ctx_signingkey;
|
|
|
|
sha256_hmac_init_vector (&ctx_signingkey, w_t, 32);
|
|
|
|
// aws4_request
|
|
|
|
w_t[0] = 0x61777334;
|
|
w_t[1] = 0x5f726571;
|
|
w_t[2] = 0x75657374;
|
|
|
|
for (u32 i = 3; i < 64; i++)
|
|
{
|
|
w_t[i] = 0;
|
|
}
|
|
|
|
sha256_hmac_update_vector (&ctx_signingkey, w_t, 12);
|
|
|
|
sha256_hmac_final_vector (&ctx_signingkey);
|
|
|
|
// signature
|
|
|
|
w_t[0] = ctx_signingkey.opad.h[0];
|
|
w_t[1] = ctx_signingkey.opad.h[1];
|
|
w_t[2] = ctx_signingkey.opad.h[2];
|
|
w_t[3] = ctx_signingkey.opad.h[3];
|
|
w_t[4] = ctx_signingkey.opad.h[4];
|
|
w_t[5] = ctx_signingkey.opad.h[5];
|
|
w_t[6] = ctx_signingkey.opad.h[6];
|
|
w_t[7] = ctx_signingkey.opad.h[7];
|
|
|
|
for (u32 i = 8; i < 64; i++)
|
|
{
|
|
w_t[i] = 0;
|
|
}
|
|
|
|
sha256_hmac_ctx_vector_t ctx_signature;
|
|
|
|
sha256_hmac_init_vector (&ctx_signature, w_t, 32);
|
|
|
|
sha256_hmac_update_vector (&ctx_signature, stringtosign_buf, stringtosign_len);
|
|
|
|
sha256_hmac_final_vector (&ctx_signature);
|
|
|
|
const u32x r0 = ctx_signature.opad.h[DGST_R0];
|
|
const u32x r1 = ctx_signature.opad.h[DGST_R1];
|
|
const u32x r2 = ctx_signature.opad.h[DGST_R2];
|
|
const u32x r3 = ctx_signature.opad.h[DGST_R3];
|
|
|
|
COMPARE_M_SIMD (r0, r1, r2, r3);
|
|
}
|
|
}
|
|
|
|
KERNEL_FQ KERNEL_FA void m28700_sxx (KERN_ATTR_VECTOR_ESALT (aws4_sig_v4_t))
|
|
{
|
|
/**
|
|
* modifier
|
|
*/
|
|
|
|
const u64 lid = get_local_id (0);
|
|
const u64 gid = get_global_id (0);
|
|
const u64 lsz = get_local_size (0);
|
|
|
|
if (gid >= GID_CNT) return;
|
|
|
|
/**
|
|
* digest
|
|
*/
|
|
|
|
const u32 search[4] =
|
|
{
|
|
digests_buf[DIGESTS_OFFSET_HOST].digest_buf[DGST_R0],
|
|
digests_buf[DIGESTS_OFFSET_HOST].digest_buf[DGST_R1],
|
|
digests_buf[DIGESTS_OFFSET_HOST].digest_buf[DGST_R2],
|
|
digests_buf[DIGESTS_OFFSET_HOST].digest_buf[DGST_R3]
|
|
};
|
|
|
|
/**
|
|
* base
|
|
*/
|
|
|
|
const u32 pw_len = pws[gid].pw_len;
|
|
|
|
u32x w[64] = { 0 };
|
|
|
|
for (u32 i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
|
|
{
|
|
w[idx] = pws[gid].i[idx];
|
|
}
|
|
|
|
const u32 date_len = esalt_bufs[DIGESTS_OFFSET_HOST].date_len;
|
|
|
|
u32x date_buf[64] = { 0 };
|
|
|
|
for (u32 i = 0, idx = 0; i < date_len; i += 4, idx += 1)
|
|
{
|
|
date_buf[idx] = hc_swap32_S (esalt_bufs[DIGESTS_OFFSET_HOST].date[idx]);
|
|
}
|
|
|
|
const u32 region_len = esalt_bufs[DIGESTS_OFFSET_HOST].region_len;
|
|
|
|
u32x region_buf[64] = { 0 };
|
|
|
|
for (u32 i = 0, idx = 0; i < region_len; i += 4, idx += 1)
|
|
{
|
|
region_buf[idx] = hc_swap32_S (esalt_bufs[DIGESTS_OFFSET_HOST].region[idx]);
|
|
}
|
|
|
|
const u32 service_len = esalt_bufs[DIGESTS_OFFSET_HOST].service_len;
|
|
|
|
u32x service_buf[64] = { 0 };
|
|
|
|
for (u32 i = 0, idx = 0; i < service_len; i += 4, idx += 1)
|
|
{
|
|
service_buf[idx] = hc_swap32_S (esalt_bufs[DIGESTS_OFFSET_HOST].service[idx]);
|
|
}
|
|
|
|
const u32 stringtosign_len = esalt_bufs[DIGESTS_OFFSET_HOST].stringtosign_len;
|
|
|
|
u32x stringtosign_buf[64] = { 0 };
|
|
|
|
for (u32 i = 0, idx = 0; i < stringtosign_len; i += 4, idx += 1)
|
|
{
|
|
stringtosign_buf[idx] = hc_swap32_S (esalt_bufs[DIGESTS_OFFSET_HOST].stringtosign[idx]);
|
|
}
|
|
|
|
/**
|
|
* loop
|
|
*/
|
|
|
|
u32x w0l = w[0];
|
|
|
|
for (u32 il_pos = 0; il_pos < IL_CNT; il_pos += VECT_SIZE)
|
|
{
|
|
const u32x w0r = words_buf_r[il_pos / VECT_SIZE];
|
|
|
|
const u32x w0 = w0l | w0r;
|
|
|
|
w[0] = w0;
|
|
|
|
u32x w_t[64];
|
|
|
|
w_t[0] = 0x41575334;
|
|
|
|
for (u32 i = 1; i < 64; i++)
|
|
{
|
|
w_t[i] = w[i - 1];
|
|
}
|
|
|
|
// kdate
|
|
|
|
sha256_hmac_ctx_vector_t ctx_kdate;
|
|
|
|
sha256_hmac_init_vector (&ctx_kdate, w_t, pw_len + 4);
|
|
|
|
sha256_hmac_update_vector (&ctx_kdate, date_buf, date_len);
|
|
|
|
sha256_hmac_final_vector (&ctx_kdate);
|
|
|
|
// kregion
|
|
|
|
w_t[0] = ctx_kdate.opad.h[0];
|
|
w_t[1] = ctx_kdate.opad.h[1];
|
|
w_t[2] = ctx_kdate.opad.h[2];
|
|
w_t[3] = ctx_kdate.opad.h[3];
|
|
w_t[4] = ctx_kdate.opad.h[4];
|
|
w_t[5] = ctx_kdate.opad.h[5];
|
|
w_t[6] = ctx_kdate.opad.h[6];
|
|
w_t[7] = ctx_kdate.opad.h[7];
|
|
|
|
for (u32 i = 8; i < 64; i++)
|
|
{
|
|
w_t[i] = 0;
|
|
}
|
|
|
|
sha256_hmac_ctx_vector_t ctx_kregion;
|
|
|
|
sha256_hmac_init_vector (&ctx_kregion, w_t, 32);
|
|
|
|
sha256_hmac_update_vector (&ctx_kregion, region_buf, region_len);
|
|
|
|
sha256_hmac_final_vector (&ctx_kregion);
|
|
|
|
// kservice
|
|
|
|
w_t[0] = ctx_kregion.opad.h[0];
|
|
w_t[1] = ctx_kregion.opad.h[1];
|
|
w_t[2] = ctx_kregion.opad.h[2];
|
|
w_t[3] = ctx_kregion.opad.h[3];
|
|
w_t[4] = ctx_kregion.opad.h[4];
|
|
w_t[5] = ctx_kregion.opad.h[5];
|
|
w_t[6] = ctx_kregion.opad.h[6];
|
|
w_t[7] = ctx_kregion.opad.h[7];
|
|
|
|
for (u32 i = 8; i < 64; i++)
|
|
{
|
|
w_t[i] = 0;
|
|
}
|
|
|
|
sha256_hmac_ctx_vector_t ctx_kservice;
|
|
|
|
sha256_hmac_init_vector (&ctx_kservice, w_t, 32);
|
|
|
|
sha256_hmac_update_vector (&ctx_kservice, service_buf, service_len);
|
|
|
|
sha256_hmac_final_vector (&ctx_kservice);
|
|
|
|
// signingkey
|
|
|
|
w_t[0] = ctx_kservice.opad.h[0];
|
|
w_t[1] = ctx_kservice.opad.h[1];
|
|
w_t[2] = ctx_kservice.opad.h[2];
|
|
w_t[3] = ctx_kservice.opad.h[3];
|
|
w_t[4] = ctx_kservice.opad.h[4];
|
|
w_t[5] = ctx_kservice.opad.h[5];
|
|
w_t[6] = ctx_kservice.opad.h[6];
|
|
w_t[7] = ctx_kservice.opad.h[7];
|
|
|
|
for (u32 i = 8; i < 64; i++)
|
|
{
|
|
w_t[i] = 0;
|
|
}
|
|
|
|
sha256_hmac_ctx_vector_t ctx_signingkey;
|
|
|
|
sha256_hmac_init_vector (&ctx_signingkey, w_t, 32);
|
|
|
|
// aws4_request
|
|
|
|
w_t[0] = 0x61777334;
|
|
w_t[1] = 0x5f726571;
|
|
w_t[2] = 0x75657374;
|
|
|
|
for (u32 i = 3; i < 64; i++)
|
|
{
|
|
w_t[i] = 0;
|
|
}
|
|
|
|
sha256_hmac_update_vector (&ctx_signingkey, w_t, 12);
|
|
|
|
sha256_hmac_final_vector (&ctx_signingkey);
|
|
|
|
// signature
|
|
|
|
w_t[0] = ctx_signingkey.opad.h[0];
|
|
w_t[1] = ctx_signingkey.opad.h[1];
|
|
w_t[2] = ctx_signingkey.opad.h[2];
|
|
w_t[3] = ctx_signingkey.opad.h[3];
|
|
w_t[4] = ctx_signingkey.opad.h[4];
|
|
w_t[5] = ctx_signingkey.opad.h[5];
|
|
w_t[6] = ctx_signingkey.opad.h[6];
|
|
w_t[7] = ctx_signingkey.opad.h[7];
|
|
|
|
for (u32 i = 8; i < 64; i++)
|
|
{
|
|
w_t[i] = 0;
|
|
}
|
|
|
|
sha256_hmac_ctx_vector_t ctx_signature;
|
|
|
|
sha256_hmac_init_vector (&ctx_signature, w_t, 32);
|
|
|
|
sha256_hmac_update_vector (&ctx_signature, stringtosign_buf, stringtosign_len);
|
|
|
|
sha256_hmac_final_vector (&ctx_signature);
|
|
|
|
const u32x r0 = ctx_signature.opad.h[DGST_R0];
|
|
const u32x r1 = ctx_signature.opad.h[DGST_R1];
|
|
const u32x r2 = ctx_signature.opad.h[DGST_R2];
|
|
const u32x r3 = ctx_signature.opad.h[DGST_R3];
|
|
|
|
COMPARE_S_SIMD (r0, r1, r2, r3);
|
|
}
|
|
}
|