1
0
mirror of https://github.com/hashcat/hashcat.git synced 2024-12-22 14:48:12 +00:00
hashcat/nv/markov_le_v4.cu
2015-12-04 15:47:52 +01:00

183 lines
5.4 KiB
Plaintext

/**
* Author......: Jens Steube <jens.steube@gmail.com>
* License.....: MIT
*/
#define CHARSIZ 256
#define VECT_SIZE4
#include "types_nv.c"
__device__ static void generate_pw (u32 pw_buf[16], cs_t *root_css_buf, cs_t *markov_css_buf, const u32 pw_l_len, const u32 pw_r_len, const u32 mask80, const u32 bits14, const u32 bits15, u64 val)
{
pw_buf[ 0] = 0;
pw_buf[ 1] = 0;
pw_buf[ 2] = 0;
pw_buf[ 3] = 0;
pw_buf[ 4] = 0;
pw_buf[ 5] = 0;
pw_buf[ 6] = 0;
pw_buf[ 7] = 0;
pw_buf[ 8] = 0;
pw_buf[ 9] = 0;
pw_buf[10] = 0;
pw_buf[11] = 0;
pw_buf[12] = 0;
pw_buf[13] = 0;
pw_buf[14] = 0;
pw_buf[15] = 0;
cs_t *cs = &root_css_buf[pw_r_len];
u32 i;
u32 j;
for (i = 0, j = pw_r_len; i < pw_l_len; i++, j++)
{
const u32 len = cs->cs_len;
const u64 next = val / len;
const u64 pos = val % len;
val = next;
const u32 key = cs->cs_buf[pos];
const u32 jd4 = j / 4;
const u32 jm4 = j % 4;
pw_buf[jd4] |= key << (jm4 * 8);
cs = &markov_css_buf[(j * CHARSIZ) + key];
}
const u32 jd4 = j / 4;
const u32 jm4 = j % 4;
pw_buf[jd4] |= (0xff << (jm4 * 8)) & mask80;
if (bits14) pw_buf[14] = (pw_l_len + pw_r_len) * 8;
if (bits15) pw_buf[15] = (pw_l_len + pw_r_len) * 8;
}
extern "C" __global__ void __launch_bounds__ (256, 1) l_markov (pw_t *pws_buf_l, cs_t *root_css_buf, cs_t *markov_css_buf, const u64 off, const u32 pw_l_len, const u32 pw_r_len, const u32 mask80, const u32 bits14, const u32 bits15, const u32 gid_max)
{
const u32 gid = (blockIdx.x * blockDim.x) + threadIdx.x;
if (gid >= gid_max) return;
const u32 gid4 = gid * 4;
u32 pw_buf0[16];
u32 pw_buf1[16];
u32 pw_buf2[16];
u32 pw_buf3[16];
generate_pw (pw_buf0, root_css_buf, markov_css_buf, pw_l_len, pw_r_len, mask80, bits14, bits15, off + gid4 + 0);
generate_pw (pw_buf1, root_css_buf, markov_css_buf, pw_l_len, pw_r_len, mask80, bits14, bits15, off + gid4 + 1);
generate_pw (pw_buf2, root_css_buf, markov_css_buf, pw_l_len, pw_r_len, mask80, bits14, bits15, off + gid4 + 2);
generate_pw (pw_buf3, root_css_buf, markov_css_buf, pw_l_len, pw_r_len, mask80, bits14, bits15, off + gid4 + 3);
#pragma unroll 16
for (int i = 0; i < 16; i++)
{
pws_buf_l[gid].i[i].x = pw_buf0[i];
pws_buf_l[gid].i[i].y = pw_buf1[i];
pws_buf_l[gid].i[i].z = pw_buf2[i];
pws_buf_l[gid].i[i].w = pw_buf3[i];
}
pws_buf_l[gid].pw_len = pw_l_len + pw_r_len;
}
extern "C" __global__ void __launch_bounds__ (256, 1) r_markov (bf_t *pws_buf_r, cs_t *root_css_buf, cs_t *markov_css_buf, const u64 off, const u32 pw_r_len, const u32 mask80, const u32 bits14, const u32 bits15, const u32 gid_max)
{
const u32 gid = (blockIdx.x * blockDim.x) + threadIdx.x;
if (gid >= gid_max) return;
const u32 gid4 = gid * 4;
u32 pw_buf[16];
generate_pw (pw_buf, root_css_buf, markov_css_buf, pw_r_len, 0, 0, 0, 0, off + gid4 + 0);
pws_buf_r[gid4 + 0].i = pw_buf[0];
generate_pw (pw_buf, root_css_buf, markov_css_buf, pw_r_len, 0, 0, 0, 0, off + gid4 + 1);
pws_buf_r[gid4 + 1].i = pw_buf[0];
generate_pw (pw_buf, root_css_buf, markov_css_buf, pw_r_len, 0, 0, 0, 0, off + gid4 + 2);
pws_buf_r[gid4 + 2].i = pw_buf[0];
generate_pw (pw_buf, root_css_buf, markov_css_buf, pw_r_len, 0, 0, 0, 0, off + gid4 + 3);
pws_buf_r[gid4 + 3].i = pw_buf[0];
}
extern "C" __global__ void __launch_bounds__ (256, 1) C_markov (comb_t *pws_buf, cs_t *root_css_buf, cs_t *markov_css_buf, const u64 off, const u32 pw_len, const u32 mask80, const u32 bits14, const u32 bits15, const u32 gid_max)
{
const u32 gid = (blockIdx.x * blockDim.x) + threadIdx.x;
if (gid >= gid_max) return;
const u32 gid4 = gid * 4;
u32 pw_buf[16];
generate_pw (pw_buf, root_css_buf, markov_css_buf, pw_len, 0, mask80, bits14, bits15, off + gid4 + 0);
pws_buf[gid4 + 0].i[ 0] = pw_buf[ 0];
pws_buf[gid4 + 0].i[ 1] = pw_buf[ 1];
pws_buf[gid4 + 0].i[ 2] = pw_buf[ 2];
pws_buf[gid4 + 0].i[ 3] = pw_buf[ 3];
pws_buf[gid4 + 0].i[ 4] = pw_buf[ 4];
pws_buf[gid4 + 0].i[ 5] = pw_buf[ 5];
pws_buf[gid4 + 0].i[ 6] = pw_buf[ 6];
pws_buf[gid4 + 0].i[ 7] = pw_buf[ 7];
pws_buf[gid4 + 0].pw_len = pw_len;
generate_pw (pw_buf, root_css_buf, markov_css_buf, pw_len, 0, mask80, bits14, bits15, off + gid4 + 1);
pws_buf[gid4 + 1].i[ 0] = pw_buf[ 0];
pws_buf[gid4 + 1].i[ 1] = pw_buf[ 1];
pws_buf[gid4 + 1].i[ 2] = pw_buf[ 2];
pws_buf[gid4 + 1].i[ 3] = pw_buf[ 3];
pws_buf[gid4 + 1].i[ 4] = pw_buf[ 4];
pws_buf[gid4 + 1].i[ 5] = pw_buf[ 5];
pws_buf[gid4 + 1].i[ 6] = pw_buf[ 6];
pws_buf[gid4 + 1].i[ 7] = pw_buf[ 7];
pws_buf[gid4 + 1].pw_len = pw_len;
generate_pw (pw_buf, root_css_buf, markov_css_buf, pw_len, 0, mask80, bits14, bits15, off + gid4 + 2);
pws_buf[gid4 + 2].i[ 0] = pw_buf[ 0];
pws_buf[gid4 + 2].i[ 1] = pw_buf[ 1];
pws_buf[gid4 + 2].i[ 2] = pw_buf[ 2];
pws_buf[gid4 + 2].i[ 3] = pw_buf[ 3];
pws_buf[gid4 + 2].i[ 4] = pw_buf[ 4];
pws_buf[gid4 + 2].i[ 5] = pw_buf[ 5];
pws_buf[gid4 + 2].i[ 6] = pw_buf[ 6];
pws_buf[gid4 + 2].i[ 7] = pw_buf[ 7];
pws_buf[gid4 + 2].pw_len = pw_len;
generate_pw (pw_buf, root_css_buf, markov_css_buf, pw_len, 0, mask80, bits14, bits15, off + gid4 + 3);
pws_buf[gid4 + 3].i[ 0] = pw_buf[ 0];
pws_buf[gid4 + 3].i[ 1] = pw_buf[ 1];
pws_buf[gid4 + 3].i[ 2] = pw_buf[ 2];
pws_buf[gid4 + 3].i[ 3] = pw_buf[ 3];
pws_buf[gid4 + 3].i[ 4] = pw_buf[ 4];
pws_buf[gid4 + 3].i[ 5] = pw_buf[ 5];
pws_buf[gid4 + 3].i[ 6] = pw_buf[ 6];
pws_buf[gid4 + 3].i[ 7] = pw_buf[ 7];
pws_buf[gid4 + 3].pw_len = pw_len;
}