mirror of
https://github.com/hashcat/hashcat.git
synced 2025-07-05 06:12:35 +00:00

Updated kernel declarations from "KERNEL_FQ void HC_ATTR_SEQ" to "KERNEL_FQ KERNEL_FA void". Please update your custom plugin kernels accordingly. Added spilling size as a factor in calculating usable memory per device. This is based on undocumented variables and may not be 100% accurate, but it works well in practice. Added a compiler hint to scrypt-based kernels indicating the guaranteed maximum thread count per kernel invocation. Removed redundant kernel code 29800, as it is identical to 27700, and updated the plugin.
839 lines
20 KiB
Common Lisp
839 lines
20 KiB
Common Lisp
/**
|
|
* Author......: See docs/credits.txt
|
|
* License.....: MIT
|
|
*/
|
|
|
|
#ifdef KERNEL_STATIC
|
|
#include M2S(INCLUDE_PATH/inc_vendor.h)
|
|
#include M2S(INCLUDE_PATH/inc_types.h)
|
|
#include M2S(INCLUDE_PATH/inc_platform.cl)
|
|
#include M2S(INCLUDE_PATH/inc_common.cl)
|
|
#include M2S(INCLUDE_PATH/inc_simd.cl)
|
|
#include M2S(INCLUDE_PATH/inc_hash_sha1.cl)
|
|
#include M2S(INCLUDE_PATH/inc_cipher_rc4.cl)
|
|
#endif
|
|
|
|
#define MIN_NULL_BYTES 10
|
|
|
|
typedef struct oldoffice34
|
|
{
|
|
u32 version;
|
|
u32 encryptedVerifier[4];
|
|
u32 encryptedVerifierHash[5];
|
|
u32 secondBlockData[8];
|
|
u32 secondBlockLen;
|
|
u32 rc4key[2];
|
|
|
|
} oldoffice34_t;
|
|
|
|
DECLSPEC void m09800m (LOCAL_AS u32 *S, PRIVATE_AS u32 *w0, PRIVATE_AS u32 *w1, PRIVATE_AS u32 *w2, PRIVATE_AS u32 *w3, const u32 pw_len, KERN_ATTR_FUNC_ESALT (oldoffice34_t))
|
|
{
|
|
/**
|
|
* modifiers are taken from args
|
|
*/
|
|
|
|
/**
|
|
* salt
|
|
*/
|
|
|
|
u32 salt_buf[4];
|
|
|
|
salt_buf[0] = salt_bufs[SALT_POS_HOST].salt_buf[0];
|
|
salt_buf[1] = salt_bufs[SALT_POS_HOST].salt_buf[1];
|
|
salt_buf[2] = salt_bufs[SALT_POS_HOST].salt_buf[2];
|
|
salt_buf[3] = salt_bufs[SALT_POS_HOST].salt_buf[3];
|
|
|
|
/**
|
|
* esalt
|
|
*/
|
|
|
|
const u32 version = esalt_bufs[DIGESTS_OFFSET_HOST].version;
|
|
|
|
u32 encryptedVerifier[4];
|
|
|
|
encryptedVerifier[0] = esalt_bufs[DIGESTS_OFFSET_HOST].encryptedVerifier[0];
|
|
encryptedVerifier[1] = esalt_bufs[DIGESTS_OFFSET_HOST].encryptedVerifier[1];
|
|
encryptedVerifier[2] = esalt_bufs[DIGESTS_OFFSET_HOST].encryptedVerifier[2];
|
|
encryptedVerifier[3] = esalt_bufs[DIGESTS_OFFSET_HOST].encryptedVerifier[3];
|
|
|
|
/**
|
|
* loop
|
|
*/
|
|
|
|
u32 w0l = w0[0];
|
|
|
|
for (u32 il_pos = 0; il_pos < IL_CNT; il_pos += VECT_SIZE)
|
|
{
|
|
const u32 w0r = ix_create_bft (bfs_buf, il_pos);
|
|
|
|
const u32 w0lr = w0l | w0r;
|
|
|
|
/**
|
|
* sha1
|
|
*/
|
|
|
|
const u32 pw_salt_len = pw_len + 16;
|
|
|
|
u32 w0_t[4];
|
|
u32 w1_t[4];
|
|
u32 w2_t[4];
|
|
u32 w3_t[4];
|
|
|
|
w0_t[0] = salt_buf[0];
|
|
w0_t[1] = salt_buf[1];
|
|
w0_t[2] = salt_buf[2];
|
|
w0_t[3] = salt_buf[3];
|
|
w1_t[0] = w0lr;
|
|
w1_t[1] = w0[1];
|
|
w1_t[2] = w0[2];
|
|
w1_t[3] = w0[3];
|
|
w2_t[0] = w1[0];
|
|
w2_t[1] = w1[1];
|
|
w2_t[2] = w1[2];
|
|
w2_t[3] = w1[3];
|
|
w3_t[0] = w2[0];
|
|
w3_t[1] = w2[1];
|
|
w3_t[2] = 0;
|
|
w3_t[3] = pw_salt_len * 8;
|
|
|
|
u32 pass_hash[5];
|
|
|
|
pass_hash[0] = SHA1M_A;
|
|
pass_hash[1] = SHA1M_B;
|
|
pass_hash[2] = SHA1M_C;
|
|
pass_hash[3] = SHA1M_D;
|
|
pass_hash[4] = SHA1M_E;
|
|
|
|
sha1_transform (w0_t, w1_t, w2_t, w3_t, pass_hash);
|
|
|
|
w0_t[0] = pass_hash[0];
|
|
w0_t[1] = pass_hash[1];
|
|
w0_t[2] = pass_hash[2];
|
|
w0_t[3] = pass_hash[3];
|
|
w1_t[0] = pass_hash[4];
|
|
w1_t[1] = 0;
|
|
w1_t[2] = 0x80000000;
|
|
w1_t[3] = 0;
|
|
w2_t[0] = 0;
|
|
w2_t[1] = 0;
|
|
w2_t[2] = 0;
|
|
w2_t[3] = 0;
|
|
w3_t[0] = 0;
|
|
w3_t[1] = 0;
|
|
w3_t[2] = 0;
|
|
w3_t[3] = (20 + 4) * 8;
|
|
|
|
u32 digest[5];
|
|
|
|
digest[0] = SHA1M_A;
|
|
digest[1] = SHA1M_B;
|
|
digest[2] = SHA1M_C;
|
|
digest[3] = SHA1M_D;
|
|
digest[4] = SHA1M_E;
|
|
|
|
sha1_transform (w0_t, w1_t, w2_t, w3_t, digest);
|
|
|
|
digest[0] = hc_swap32_S (digest[0]);
|
|
digest[1] = hc_swap32_S (digest[1]);
|
|
digest[2] = hc_swap32_S (digest[2]);
|
|
digest[3] = hc_swap32_S (digest[3]);
|
|
|
|
if (version == 3)
|
|
{
|
|
digest[1] &= 0xff;
|
|
digest[2] = 0;
|
|
digest[3] = 0;
|
|
}
|
|
|
|
rc4_init_128 (S, digest, lid);
|
|
|
|
u32 out[4];
|
|
|
|
u8 j = rc4_next_16 (S, 0, 0, encryptedVerifier, out, lid);
|
|
|
|
w0_t[0] = hc_swap32_S (out[0]);
|
|
w0_t[1] = hc_swap32_S (out[1]);
|
|
w0_t[2] = hc_swap32_S (out[2]);
|
|
w0_t[3] = hc_swap32_S (out[3]);
|
|
w1_t[0] = 0x80000000;
|
|
w1_t[1] = 0;
|
|
w1_t[2] = 0;
|
|
w1_t[3] = 0;
|
|
w2_t[0] = 0;
|
|
w2_t[1] = 0;
|
|
w2_t[2] = 0;
|
|
w2_t[3] = 0;
|
|
w3_t[0] = 0;
|
|
w3_t[1] = 0;
|
|
w3_t[2] = 0;
|
|
w3_t[3] = 16 * 8;
|
|
|
|
digest[0] = SHA1M_A;
|
|
digest[1] = SHA1M_B;
|
|
digest[2] = SHA1M_C;
|
|
digest[3] = SHA1M_D;
|
|
digest[4] = SHA1M_E;
|
|
|
|
sha1_transform (w0_t, w1_t, w2_t, w3_t, digest);
|
|
|
|
digest[0] = hc_swap32_S (digest[0]);
|
|
digest[1] = hc_swap32_S (digest[1]);
|
|
digest[2] = hc_swap32_S (digest[2]);
|
|
digest[3] = hc_swap32_S (digest[3]);
|
|
|
|
rc4_next_16 (S, 16, j, digest, out, lid);
|
|
|
|
// initial compare
|
|
|
|
int digest_pos = find_hash (out, DIGESTS_CNT, &digests_buf[DIGESTS_OFFSET_HOST]);
|
|
|
|
if (digest_pos == -1) continue;
|
|
|
|
if (esalt_bufs[DIGESTS_OFFSET_HOST].secondBlockLen != 0)
|
|
{
|
|
w0[0] = pass_hash[0];
|
|
w0[1] = pass_hash[1];
|
|
w0[2] = pass_hash[2];
|
|
w0[3] = pass_hash[3];
|
|
w1[0] = pass_hash[4];
|
|
w1[1] = 0x01000000;
|
|
w1[2] = 0x80000000;
|
|
w1[3] = 0;
|
|
w2[0] = 0;
|
|
w2[1] = 0;
|
|
w2[2] = 0;
|
|
w2[3] = 0;
|
|
w3[0] = 0;
|
|
w3[1] = 0;
|
|
w3[2] = 0;
|
|
w3[3] = (20 + 4) * 8;
|
|
|
|
digest[0] = SHA1M_A;
|
|
digest[1] = SHA1M_B;
|
|
digest[2] = SHA1M_C;
|
|
digest[3] = SHA1M_D;
|
|
digest[4] = SHA1M_E;
|
|
|
|
sha1_transform (w0, w1, w2, w3, digest);
|
|
|
|
digest[0] = hc_swap32_S (digest[0]);
|
|
digest[1] = hc_swap32_S (digest[1]);
|
|
digest[2] = 0;
|
|
digest[3] = 0;
|
|
|
|
digest[1] &= 0xff; // only 40-bit key
|
|
|
|
// second block decrypt:
|
|
|
|
rc4_init_128 (S, digest, lid);
|
|
|
|
u32 secondBlockData[4];
|
|
|
|
secondBlockData[0] = esalt_bufs[DIGESTS_OFFSET_HOST].secondBlockData[0];
|
|
secondBlockData[1] = esalt_bufs[DIGESTS_OFFSET_HOST].secondBlockData[1];
|
|
secondBlockData[2] = esalt_bufs[DIGESTS_OFFSET_HOST].secondBlockData[2];
|
|
secondBlockData[3] = esalt_bufs[DIGESTS_OFFSET_HOST].secondBlockData[3];
|
|
|
|
j = rc4_next_16 (S, 0, 0, secondBlockData, out, lid);
|
|
|
|
int null_bytes = 0;
|
|
|
|
for (int k = 0; k < 4; k++)
|
|
{
|
|
if ((out[k] & 0x000000ff) == 0) null_bytes++;
|
|
if ((out[k] & 0x0000ff00) == 0) null_bytes++;
|
|
if ((out[k] & 0x00ff0000) == 0) null_bytes++;
|
|
if ((out[k] & 0xff000000) == 0) null_bytes++;
|
|
}
|
|
|
|
secondBlockData[0] = esalt_bufs[DIGESTS_OFFSET_HOST].secondBlockData[4];
|
|
secondBlockData[1] = esalt_bufs[DIGESTS_OFFSET_HOST].secondBlockData[5];
|
|
secondBlockData[2] = esalt_bufs[DIGESTS_OFFSET_HOST].secondBlockData[6];
|
|
secondBlockData[3] = esalt_bufs[DIGESTS_OFFSET_HOST].secondBlockData[7];
|
|
|
|
rc4_next_16 (S, 16, j, secondBlockData, out, lid);
|
|
|
|
for (int k = 0; k < 4; k++)
|
|
{
|
|
if ((out[k] & 0x000000ff) == 0) null_bytes++;
|
|
if ((out[k] & 0x0000ff00) == 0) null_bytes++;
|
|
if ((out[k] & 0x00ff0000) == 0) null_bytes++;
|
|
if ((out[k] & 0xff000000) == 0) null_bytes++;
|
|
}
|
|
|
|
if (null_bytes < MIN_NULL_BYTES) continue;
|
|
}
|
|
|
|
const u32 final_hash_pos = DIGESTS_OFFSET_HOST + digest_pos;
|
|
|
|
if (hc_atomic_inc (&hashes_shown[final_hash_pos]) == 0)
|
|
{
|
|
mark_hash (plains_buf, d_return_buf, SALT_POS_HOST, DIGESTS_CNT, digest_pos, final_hash_pos, gid, il_pos, 0, 0);
|
|
}
|
|
}
|
|
}
|
|
|
|
DECLSPEC void m09800s (LOCAL_AS u32 *S, PRIVATE_AS u32 *w0, PRIVATE_AS u32 *w1, PRIVATE_AS u32 *w2, PRIVATE_AS u32 *w3, const u32 pw_len, KERN_ATTR_FUNC_ESALT (oldoffice34_t))
|
|
{
|
|
/**
|
|
* modifiers are taken from args
|
|
*/
|
|
|
|
/**
|
|
* salt
|
|
*/
|
|
|
|
u32 salt_buf[4];
|
|
|
|
salt_buf[0] = salt_bufs[SALT_POS_HOST].salt_buf[0];
|
|
salt_buf[1] = salt_bufs[SALT_POS_HOST].salt_buf[1];
|
|
salt_buf[2] = salt_bufs[SALT_POS_HOST].salt_buf[2];
|
|
salt_buf[3] = salt_bufs[SALT_POS_HOST].salt_buf[3];
|
|
|
|
/**
|
|
* esalt
|
|
*/
|
|
|
|
const u32 version = esalt_bufs[DIGESTS_OFFSET_HOST].version;
|
|
|
|
u32 encryptedVerifier[4];
|
|
|
|
encryptedVerifier[0] = esalt_bufs[DIGESTS_OFFSET_HOST].encryptedVerifier[0];
|
|
encryptedVerifier[1] = esalt_bufs[DIGESTS_OFFSET_HOST].encryptedVerifier[1];
|
|
encryptedVerifier[2] = esalt_bufs[DIGESTS_OFFSET_HOST].encryptedVerifier[2];
|
|
encryptedVerifier[3] = esalt_bufs[DIGESTS_OFFSET_HOST].encryptedVerifier[3];
|
|
|
|
/**
|
|
* digest
|
|
*/
|
|
|
|
const u32 search[4] =
|
|
{
|
|
digests_buf[DIGESTS_OFFSET_HOST].digest_buf[DGST_R0],
|
|
digests_buf[DIGESTS_OFFSET_HOST].digest_buf[DGST_R1],
|
|
digests_buf[DIGESTS_OFFSET_HOST].digest_buf[DGST_R2],
|
|
digests_buf[DIGESTS_OFFSET_HOST].digest_buf[DGST_R3]
|
|
};
|
|
|
|
/**
|
|
* loop
|
|
*/
|
|
|
|
u32 w0l = w0[0];
|
|
|
|
for (u32 il_pos = 0; il_pos < IL_CNT; il_pos += VECT_SIZE)
|
|
{
|
|
const u32 w0r = ix_create_bft (bfs_buf, il_pos);
|
|
|
|
const u32 w0lr = w0l | w0r;
|
|
|
|
/**
|
|
* sha1
|
|
*/
|
|
|
|
const u32 pw_salt_len = pw_len + 16;
|
|
|
|
u32 w0_t[4];
|
|
u32 w1_t[4];
|
|
u32 w2_t[4];
|
|
u32 w3_t[4];
|
|
|
|
w0_t[0] = salt_buf[0];
|
|
w0_t[1] = salt_buf[1];
|
|
w0_t[2] = salt_buf[2];
|
|
w0_t[3] = salt_buf[3];
|
|
w1_t[0] = w0lr;
|
|
w1_t[1] = w0[1];
|
|
w1_t[2] = w0[2];
|
|
w1_t[3] = w0[3];
|
|
w2_t[0] = w1[0];
|
|
w2_t[1] = w1[1];
|
|
w2_t[2] = w1[2];
|
|
w2_t[3] = w1[3];
|
|
w3_t[0] = w2[0];
|
|
w3_t[1] = w2[1];
|
|
w3_t[2] = 0;
|
|
w3_t[3] = pw_salt_len * 8;
|
|
|
|
u32 pass_hash[5];
|
|
|
|
pass_hash[0] = SHA1M_A;
|
|
pass_hash[1] = SHA1M_B;
|
|
pass_hash[2] = SHA1M_C;
|
|
pass_hash[3] = SHA1M_D;
|
|
pass_hash[4] = SHA1M_E;
|
|
|
|
sha1_transform (w0_t, w1_t, w2_t, w3_t, pass_hash);
|
|
|
|
w0_t[0] = pass_hash[0];
|
|
w0_t[1] = pass_hash[1];
|
|
w0_t[2] = pass_hash[2];
|
|
w0_t[3] = pass_hash[3];
|
|
w1_t[0] = pass_hash[4];
|
|
w1_t[1] = 0;
|
|
w1_t[2] = 0x80000000;
|
|
w1_t[3] = 0;
|
|
w2_t[0] = 0;
|
|
w2_t[1] = 0;
|
|
w2_t[2] = 0;
|
|
w2_t[3] = 0;
|
|
w3_t[0] = 0;
|
|
w3_t[1] = 0;
|
|
w3_t[2] = 0;
|
|
w3_t[3] = (20 + 4) * 8;
|
|
|
|
u32 digest[5];
|
|
|
|
digest[0] = SHA1M_A;
|
|
digest[1] = SHA1M_B;
|
|
digest[2] = SHA1M_C;
|
|
digest[3] = SHA1M_D;
|
|
digest[4] = SHA1M_E;
|
|
|
|
sha1_transform (w0_t, w1_t, w2_t, w3_t, digest);
|
|
|
|
digest[0] = hc_swap32_S (digest[0]);
|
|
digest[1] = hc_swap32_S (digest[1]);
|
|
digest[2] = hc_swap32_S (digest[2]);
|
|
digest[3] = hc_swap32_S (digest[3]);
|
|
|
|
if (version == 3)
|
|
{
|
|
digest[1] &= 0xff;
|
|
digest[2] = 0;
|
|
digest[3] = 0;
|
|
}
|
|
|
|
rc4_init_128 (S, digest, lid);
|
|
|
|
u32 out[4];
|
|
|
|
u8 j = rc4_next_16 (S, 0, 0, encryptedVerifier, out, lid);
|
|
|
|
w0_t[0] = hc_swap32_S (out[0]);
|
|
w0_t[1] = hc_swap32_S (out[1]);
|
|
w0_t[2] = hc_swap32_S (out[2]);
|
|
w0_t[3] = hc_swap32_S (out[3]);
|
|
w1_t[0] = 0x80000000;
|
|
w1_t[1] = 0;
|
|
w1_t[2] = 0;
|
|
w1_t[3] = 0;
|
|
w2_t[0] = 0;
|
|
w2_t[1] = 0;
|
|
w2_t[2] = 0;
|
|
w2_t[3] = 0;
|
|
w3_t[0] = 0;
|
|
w3_t[1] = 0;
|
|
w3_t[2] = 0;
|
|
w3_t[3] = 16 * 8;
|
|
|
|
digest[0] = SHA1M_A;
|
|
digest[1] = SHA1M_B;
|
|
digest[2] = SHA1M_C;
|
|
digest[3] = SHA1M_D;
|
|
digest[4] = SHA1M_E;
|
|
|
|
sha1_transform (w0_t, w1_t, w2_t, w3_t, digest);
|
|
|
|
digest[0] = hc_swap32_S (digest[0]);
|
|
digest[1] = hc_swap32_S (digest[1]);
|
|
digest[2] = hc_swap32_S (digest[2]);
|
|
digest[3] = hc_swap32_S (digest[3]);
|
|
|
|
rc4_next_16 (S, 16, j, digest, out, lid);
|
|
|
|
// initial compare
|
|
|
|
if (out[0] != search[0]) continue;
|
|
if (out[1] != search[1]) continue;
|
|
if (out[2] != search[2]) continue;
|
|
if (out[3] != search[3]) continue;
|
|
|
|
if (esalt_bufs[DIGESTS_OFFSET_HOST].secondBlockLen != 0)
|
|
{
|
|
w0[0] = pass_hash[0];
|
|
w0[1] = pass_hash[1];
|
|
w0[2] = pass_hash[2];
|
|
w0[3] = pass_hash[3];
|
|
w1[0] = pass_hash[4];
|
|
w1[1] = 0x01000000;
|
|
w1[2] = 0x80000000;
|
|
w1[3] = 0;
|
|
w2[0] = 0;
|
|
w2[1] = 0;
|
|
w2[2] = 0;
|
|
w2[3] = 0;
|
|
w3[0] = 0;
|
|
w3[1] = 0;
|
|
w3[2] = 0;
|
|
w3[3] = (20 + 4) * 8;
|
|
|
|
digest[0] = SHA1M_A;
|
|
digest[1] = SHA1M_B;
|
|
digest[2] = SHA1M_C;
|
|
digest[3] = SHA1M_D;
|
|
digest[4] = SHA1M_E;
|
|
|
|
sha1_transform (w0, w1, w2, w3, digest);
|
|
|
|
digest[0] = hc_swap32_S (digest[0]);
|
|
digest[1] = hc_swap32_S (digest[1]);
|
|
digest[2] = 0;
|
|
digest[3] = 0;
|
|
|
|
digest[1] &= 0xff; // only 40-bit key
|
|
|
|
// second block decrypt:
|
|
|
|
rc4_init_128 (S, digest, lid);
|
|
|
|
u32 secondBlockData[4];
|
|
|
|
secondBlockData[0] = esalt_bufs[DIGESTS_OFFSET_HOST].secondBlockData[0];
|
|
secondBlockData[1] = esalt_bufs[DIGESTS_OFFSET_HOST].secondBlockData[1];
|
|
secondBlockData[2] = esalt_bufs[DIGESTS_OFFSET_HOST].secondBlockData[2];
|
|
secondBlockData[3] = esalt_bufs[DIGESTS_OFFSET_HOST].secondBlockData[3];
|
|
|
|
j = rc4_next_16 (S, 0, 0, secondBlockData, out, lid);
|
|
|
|
int null_bytes = 0;
|
|
|
|
for (int k = 0; k < 4; k++)
|
|
{
|
|
if ((out[k] & 0x000000ff) == 0) null_bytes++;
|
|
if ((out[k] & 0x0000ff00) == 0) null_bytes++;
|
|
if ((out[k] & 0x00ff0000) == 0) null_bytes++;
|
|
if ((out[k] & 0xff000000) == 0) null_bytes++;
|
|
}
|
|
|
|
secondBlockData[0] = esalt_bufs[DIGESTS_OFFSET_HOST].secondBlockData[4];
|
|
secondBlockData[1] = esalt_bufs[DIGESTS_OFFSET_HOST].secondBlockData[5];
|
|
secondBlockData[2] = esalt_bufs[DIGESTS_OFFSET_HOST].secondBlockData[6];
|
|
secondBlockData[3] = esalt_bufs[DIGESTS_OFFSET_HOST].secondBlockData[7];
|
|
|
|
rc4_next_16 (S, 16, j, secondBlockData, out, lid);
|
|
|
|
for (int k = 0; k < 4; k++)
|
|
{
|
|
if ((out[k] & 0x000000ff) == 0) null_bytes++;
|
|
if ((out[k] & 0x0000ff00) == 0) null_bytes++;
|
|
if ((out[k] & 0x00ff0000) == 0) null_bytes++;
|
|
if ((out[k] & 0xff000000) == 0) null_bytes++;
|
|
}
|
|
|
|
if (null_bytes < MIN_NULL_BYTES) continue;
|
|
}
|
|
|
|
if (hc_atomic_inc (&hashes_shown[DIGESTS_OFFSET_HOST]) == 0)
|
|
{
|
|
mark_hash (plains_buf, d_return_buf, SALT_POS_HOST, DIGESTS_CNT, 0, DIGESTS_OFFSET_HOST + 0, gid, il_pos, 0, 0);
|
|
}
|
|
}
|
|
}
|
|
|
|
KERNEL_FQ KERNEL_FA void m09800_m04 (KERN_ATTR_ESALT (oldoffice34_t))
|
|
{
|
|
/**
|
|
* base
|
|
*/
|
|
|
|
const u64 lid = get_local_id (0);
|
|
const u64 gid = get_global_id (0);
|
|
const u64 lsz = get_local_size (0);
|
|
|
|
if (gid >= GID_CNT) return;
|
|
|
|
u32 w0[4];
|
|
|
|
w0[0] = pws[gid].i[ 0];
|
|
w0[1] = pws[gid].i[ 1];
|
|
w0[2] = pws[gid].i[ 2];
|
|
w0[3] = pws[gid].i[ 3];
|
|
|
|
u32 w1[4];
|
|
|
|
w1[0] = 0;
|
|
w1[1] = 0;
|
|
w1[2] = 0;
|
|
w1[3] = 0;
|
|
|
|
u32 w2[4];
|
|
|
|
w2[0] = 0;
|
|
w2[1] = 0;
|
|
w2[2] = 0;
|
|
w2[3] = 0;
|
|
|
|
u32 w3[4];
|
|
|
|
w3[0] = 0;
|
|
w3[1] = 0;
|
|
w3[2] = 0;
|
|
w3[3] = 0;
|
|
|
|
const u32 pw_len = pws[gid].pw_len & 63;
|
|
|
|
/**
|
|
* main
|
|
*/
|
|
|
|
LOCAL_VK u32 S[64 * FIXED_LOCAL_SIZE];
|
|
|
|
m09800m (S, w0, w1, w2, w3, pw_len, pws, rules_buf, combs_buf, bfs_buf, tmps, hooks, bitmaps_buf_s1_a, bitmaps_buf_s1_b, bitmaps_buf_s1_c, bitmaps_buf_s1_d, bitmaps_buf_s2_a, bitmaps_buf_s2_b, bitmaps_buf_s2_c, bitmaps_buf_s2_d, plains_buf, digests_buf, hashes_shown, salt_bufs, esalt_bufs, d_return_buf, d_extra0_buf, d_extra1_buf, d_extra2_buf, d_extra3_buf, kernel_param, gid, lid, lsz);
|
|
}
|
|
|
|
KERNEL_FQ KERNEL_FA void m09800_m08 (KERN_ATTR_ESALT (oldoffice34_t))
|
|
{
|
|
/**
|
|
* base
|
|
*/
|
|
|
|
const u64 lid = get_local_id (0);
|
|
const u64 gid = get_global_id (0);
|
|
const u64 lsz = get_local_size (0);
|
|
|
|
if (gid >= GID_CNT) return;
|
|
|
|
u32 w0[4];
|
|
|
|
w0[0] = pws[gid].i[ 0];
|
|
w0[1] = pws[gid].i[ 1];
|
|
w0[2] = pws[gid].i[ 2];
|
|
w0[3] = pws[gid].i[ 3];
|
|
|
|
u32 w1[4];
|
|
|
|
w1[0] = pws[gid].i[ 4];
|
|
w1[1] = pws[gid].i[ 5];
|
|
w1[2] = pws[gid].i[ 6];
|
|
w1[3] = pws[gid].i[ 7];
|
|
|
|
u32 w2[4];
|
|
|
|
w2[0] = 0;
|
|
w2[1] = 0;
|
|
w2[2] = 0;
|
|
w2[3] = 0;
|
|
|
|
u32 w3[4];
|
|
|
|
w3[0] = 0;
|
|
w3[1] = 0;
|
|
w3[2] = 0;
|
|
w3[3] = 0;
|
|
|
|
const u32 pw_len = pws[gid].pw_len & 63;
|
|
|
|
/**
|
|
* main
|
|
*/
|
|
|
|
LOCAL_VK u32 S[64 * FIXED_LOCAL_SIZE];
|
|
|
|
m09800m (S, w0, w1, w2, w3, pw_len, pws, rules_buf, combs_buf, bfs_buf, tmps, hooks, bitmaps_buf_s1_a, bitmaps_buf_s1_b, bitmaps_buf_s1_c, bitmaps_buf_s1_d, bitmaps_buf_s2_a, bitmaps_buf_s2_b, bitmaps_buf_s2_c, bitmaps_buf_s2_d, plains_buf, digests_buf, hashes_shown, salt_bufs, esalt_bufs, d_return_buf, d_extra0_buf, d_extra1_buf, d_extra2_buf, d_extra3_buf, kernel_param, gid, lid, lsz);
|
|
}
|
|
|
|
KERNEL_FQ KERNEL_FA void m09800_m16 (KERN_ATTR_ESALT (oldoffice34_t))
|
|
{
|
|
/**
|
|
* base
|
|
*/
|
|
|
|
const u64 lid = get_local_id (0);
|
|
const u64 gid = get_global_id (0);
|
|
const u64 lsz = get_local_size (0);
|
|
|
|
if (gid >= GID_CNT) return;
|
|
|
|
u32 w0[4];
|
|
|
|
w0[0] = pws[gid].i[ 0];
|
|
w0[1] = pws[gid].i[ 1];
|
|
w0[2] = pws[gid].i[ 2];
|
|
w0[3] = pws[gid].i[ 3];
|
|
|
|
u32 w1[4];
|
|
|
|
w1[0] = pws[gid].i[ 4];
|
|
w1[1] = pws[gid].i[ 5];
|
|
w1[2] = pws[gid].i[ 6];
|
|
w1[3] = pws[gid].i[ 7];
|
|
|
|
u32 w2[4];
|
|
|
|
w2[0] = pws[gid].i[ 8];
|
|
w2[1] = pws[gid].i[ 9];
|
|
w2[2] = pws[gid].i[10];
|
|
w2[3] = pws[gid].i[11];
|
|
|
|
u32 w3[4];
|
|
|
|
w3[0] = pws[gid].i[12];
|
|
w3[1] = pws[gid].i[13];
|
|
w3[2] = 0;
|
|
w3[3] = 0;
|
|
|
|
const u32 pw_len = pws[gid].pw_len & 63;
|
|
|
|
/**
|
|
* main
|
|
*/
|
|
|
|
LOCAL_VK u32 S[64 * FIXED_LOCAL_SIZE];
|
|
|
|
m09800m (S, w0, w1, w2, w3, pw_len, pws, rules_buf, combs_buf, bfs_buf, tmps, hooks, bitmaps_buf_s1_a, bitmaps_buf_s1_b, bitmaps_buf_s1_c, bitmaps_buf_s1_d, bitmaps_buf_s2_a, bitmaps_buf_s2_b, bitmaps_buf_s2_c, bitmaps_buf_s2_d, plains_buf, digests_buf, hashes_shown, salt_bufs, esalt_bufs, d_return_buf, d_extra0_buf, d_extra1_buf, d_extra2_buf, d_extra3_buf, kernel_param, gid, lid, lsz);
|
|
}
|
|
|
|
KERNEL_FQ KERNEL_FA void m09800_s04 (KERN_ATTR_ESALT (oldoffice34_t))
|
|
{
|
|
/**
|
|
* base
|
|
*/
|
|
|
|
const u64 lid = get_local_id (0);
|
|
const u64 gid = get_global_id (0);
|
|
const u64 lsz = get_local_size (0);
|
|
|
|
if (gid >= GID_CNT) return;
|
|
|
|
u32 w0[4];
|
|
|
|
w0[0] = pws[gid].i[ 0];
|
|
w0[1] = pws[gid].i[ 1];
|
|
w0[2] = pws[gid].i[ 2];
|
|
w0[3] = pws[gid].i[ 3];
|
|
|
|
u32 w1[4];
|
|
|
|
w1[0] = 0;
|
|
w1[1] = 0;
|
|
w1[2] = 0;
|
|
w1[3] = 0;
|
|
|
|
u32 w2[4];
|
|
|
|
w2[0] = 0;
|
|
w2[1] = 0;
|
|
w2[2] = 0;
|
|
w2[3] = 0;
|
|
|
|
u32 w3[4];
|
|
|
|
w3[0] = 0;
|
|
w3[1] = 0;
|
|
w3[2] = 0;
|
|
w3[3] = 0;
|
|
|
|
const u32 pw_len = pws[gid].pw_len & 63;
|
|
|
|
/**
|
|
* main
|
|
*/
|
|
|
|
LOCAL_VK u32 S[64 * FIXED_LOCAL_SIZE];
|
|
|
|
m09800s (S, w0, w1, w2, w3, pw_len, pws, rules_buf, combs_buf, bfs_buf, tmps, hooks, bitmaps_buf_s1_a, bitmaps_buf_s1_b, bitmaps_buf_s1_c, bitmaps_buf_s1_d, bitmaps_buf_s2_a, bitmaps_buf_s2_b, bitmaps_buf_s2_c, bitmaps_buf_s2_d, plains_buf, digests_buf, hashes_shown, salt_bufs, esalt_bufs, d_return_buf, d_extra0_buf, d_extra1_buf, d_extra2_buf, d_extra3_buf, kernel_param, gid, lid, lsz);
|
|
}
|
|
|
|
KERNEL_FQ KERNEL_FA void m09800_s08 (KERN_ATTR_ESALT (oldoffice34_t))
|
|
{
|
|
/**
|
|
* base
|
|
*/
|
|
|
|
const u64 lid = get_local_id (0);
|
|
const u64 gid = get_global_id (0);
|
|
const u64 lsz = get_local_size (0);
|
|
|
|
if (gid >= GID_CNT) return;
|
|
|
|
u32 w0[4];
|
|
|
|
w0[0] = pws[gid].i[ 0];
|
|
w0[1] = pws[gid].i[ 1];
|
|
w0[2] = pws[gid].i[ 2];
|
|
w0[3] = pws[gid].i[ 3];
|
|
|
|
u32 w1[4];
|
|
|
|
w1[0] = pws[gid].i[ 4];
|
|
w1[1] = pws[gid].i[ 5];
|
|
w1[2] = pws[gid].i[ 6];
|
|
w1[3] = pws[gid].i[ 7];
|
|
|
|
u32 w2[4];
|
|
|
|
w2[0] = 0;
|
|
w2[1] = 0;
|
|
w2[2] = 0;
|
|
w2[3] = 0;
|
|
|
|
u32 w3[4];
|
|
|
|
w3[0] = 0;
|
|
w3[1] = 0;
|
|
w3[2] = 0;
|
|
w3[3] = 0;
|
|
|
|
const u32 pw_len = pws[gid].pw_len & 63;
|
|
|
|
/**
|
|
* main
|
|
*/
|
|
|
|
LOCAL_VK u32 S[64 * FIXED_LOCAL_SIZE];
|
|
|
|
m09800s (S, w0, w1, w2, w3, pw_len, pws, rules_buf, combs_buf, bfs_buf, tmps, hooks, bitmaps_buf_s1_a, bitmaps_buf_s1_b, bitmaps_buf_s1_c, bitmaps_buf_s1_d, bitmaps_buf_s2_a, bitmaps_buf_s2_b, bitmaps_buf_s2_c, bitmaps_buf_s2_d, plains_buf, digests_buf, hashes_shown, salt_bufs, esalt_bufs, d_return_buf, d_extra0_buf, d_extra1_buf, d_extra2_buf, d_extra3_buf, kernel_param, gid, lid, lsz);
|
|
}
|
|
|
|
KERNEL_FQ KERNEL_FA void m09800_s16 (KERN_ATTR_ESALT (oldoffice34_t))
|
|
{
|
|
/**
|
|
* base
|
|
*/
|
|
|
|
const u64 lid = get_local_id (0);
|
|
const u64 gid = get_global_id (0);
|
|
const u64 lsz = get_local_size (0);
|
|
|
|
if (gid >= GID_CNT) return;
|
|
|
|
u32 w0[4];
|
|
|
|
w0[0] = pws[gid].i[ 0];
|
|
w0[1] = pws[gid].i[ 1];
|
|
w0[2] = pws[gid].i[ 2];
|
|
w0[3] = pws[gid].i[ 3];
|
|
|
|
u32 w1[4];
|
|
|
|
w1[0] = pws[gid].i[ 4];
|
|
w1[1] = pws[gid].i[ 5];
|
|
w1[2] = pws[gid].i[ 6];
|
|
w1[3] = pws[gid].i[ 7];
|
|
|
|
u32 w2[4];
|
|
|
|
w2[0] = pws[gid].i[ 8];
|
|
w2[1] = pws[gid].i[ 9];
|
|
w2[2] = pws[gid].i[10];
|
|
w2[3] = pws[gid].i[11];
|
|
|
|
u32 w3[4];
|
|
|
|
w3[0] = pws[gid].i[12];
|
|
w3[1] = pws[gid].i[13];
|
|
w3[2] = 0;
|
|
w3[3] = 0;
|
|
|
|
const u32 pw_len = pws[gid].pw_len & 63;
|
|
|
|
/**
|
|
* main
|
|
*/
|
|
|
|
LOCAL_VK u32 S[64 * FIXED_LOCAL_SIZE];
|
|
|
|
m09800s (S, w0, w1, w2, w3, pw_len, pws, rules_buf, combs_buf, bfs_buf, tmps, hooks, bitmaps_buf_s1_a, bitmaps_buf_s1_b, bitmaps_buf_s1_c, bitmaps_buf_s1_d, bitmaps_buf_s2_a, bitmaps_buf_s2_b, bitmaps_buf_s2_c, bitmaps_buf_s2_d, plains_buf, digests_buf, hashes_shown, salt_bufs, esalt_bufs, d_return_buf, d_extra0_buf, d_extra1_buf, d_extra2_buf, d_extra3_buf, kernel_param, gid, lid, lsz);
|
|
}
|