You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
hashcat/amd/markov_be_v2.cl

179 lines
5.2 KiB

/**
* Author......: Jens Steube <jens.steube@gmail.com>
* License.....: MIT
*/
#include "include/kernel_vendor.h"
#define CHARSIZ 256
#define VECT_SIZE2
#include "types_amd.c"
static void generate_pw (u32 pw_buf[16], __global cs_t *root_css_buf, __global cs_t *markov_css_buf, const u32 pw_l_len, const u32 pw_r_len, const u32 mask80, const u32 bits14, const u32 bits15, u64 val)
{
pw_buf[ 0] = 0;
pw_buf[ 1] = 0;
pw_buf[ 2] = 0;
pw_buf[ 3] = 0;
pw_buf[ 4] = 0;
pw_buf[ 5] = 0;
pw_buf[ 6] = 0;
pw_buf[ 7] = 0;
pw_buf[ 8] = 0;
pw_buf[ 9] = 0;
pw_buf[10] = 0;
pw_buf[11] = 0;
pw_buf[12] = 0;
pw_buf[13] = 0;
pw_buf[14] = 0;
pw_buf[15] = 0;
__global cs_t *cs = &root_css_buf[pw_r_len];
u32 i;
u32 j;
for (i = 0, j = pw_r_len; i < pw_l_len; i++, j++)
{
const u32 len = cs->cs_len;
const u64 next = val / len;
const u64 pos = val % len;
val = next;
const u32 key = cs->cs_buf[pos];
const u32 jd4 = j / 4;
const u32 jm4 = j % 4;
pw_buf[jd4] |= key << ((3 - jm4) * 8);
cs = &markov_css_buf[(j * CHARSIZ) + key];
}
const u32 jd4 = j / 4;
const u32 jm4 = j % 4;
pw_buf[jd4] |= (0xff << ((3 - jm4) * 8)) & mask80;
if (bits14) pw_buf[14] = (pw_l_len + pw_r_len) * 8;
if (bits15) pw_buf[15] = (pw_l_len + pw_r_len) * 8;
}
__kernel void __attribute__((reqd_work_group_size (64, 1, 1))) l_markov (__global pw_t *pws_buf_l, __global cs_t *root_css_buf, __global cs_t *markov_css_buf, const u64 off, const u32 pw_l_len, const u32 pw_r_len, const u32 mask80, const u32 bits14, const u32 bits15, const u32 gid_max)
{
const u32 gid = get_global_id (0);
if (gid >= gid_max) return;
const u32 gid2 = gid * 2;
u32 pw_buf0[16];
u32 pw_buf1[16];
generate_pw (pw_buf0, root_css_buf, markov_css_buf, pw_l_len, pw_r_len, mask80, bits14, bits15, off + gid2 + 0);
generate_pw (pw_buf1, root_css_buf, markov_css_buf, pw_l_len, pw_r_len, mask80, bits14, bits15, off + gid2 + 1);
#pragma unroll 16
for (int i = 0; i < 16; i++)
{
pws_buf_l[gid].i[i].s0 = pw_buf0[i];
pws_buf_l[gid].i[i].s1 = pw_buf1[i];
}
pws_buf_l[gid].pw_len = pw_l_len + pw_r_len;
}
__kernel void __attribute__((reqd_work_group_size (64, 1, 1))) r_markov (__global bf_t *pws_buf_r, __global cs_t *root_css_buf, __global cs_t *markov_css_buf, const u64 off, const u32 pw_r_len, const u32 mask80, const u32 bits14, const u32 bits15, const u32 gid_max)
{
const u32 gid = get_global_id (0);
if (gid >= gid_max) return;
const u32 gid2 = gid * 2;
u32 pw_buf[16];
generate_pw (pw_buf, root_css_buf, markov_css_buf, pw_r_len, 0, 0, 0, 0, off + gid2 + 0);
pws_buf_r[gid2 + 0].i = pw_buf[0];
generate_pw (pw_buf, root_css_buf, markov_css_buf, pw_r_len, 0, 0, 0, 0, off + gid2 + 1);
pws_buf_r[gid2 + 1].i = pw_buf[0];
generate_pw (pw_buf, root_css_buf, markov_css_buf, pw_r_len, 0, 0, 0, 0, off + gid2 + 2);
pws_buf_r[gid2 + 2].i = pw_buf[0];
generate_pw (pw_buf, root_css_buf, markov_css_buf, pw_r_len, 0, 0, 0, 0, off + gid2 + 3);
pws_buf_r[gid2 + 3].i = pw_buf[0];
}
__kernel void __attribute__((reqd_work_group_size (64, 1, 1))) C_markov (__global comb_t *pws_buf, __global cs_t *root_css_buf, __global cs_t *markov_css_buf, const u64 off, const u32 pw_len, const u32 mask80, const u32 bits14, const u32 bits15, const u32 gid_max)
{
const u32 gid = get_global_id (0);
if (gid >= gid_max) return;
const u32 gid2 = gid * 2;
u32 pw_buf[16];
generate_pw (pw_buf, root_css_buf, markov_css_buf, pw_len, 0, mask80, bits14, bits15, off + gid2 + 0);
pws_buf[gid2 + 0].i[ 0] = pw_buf[ 0];
pws_buf[gid2 + 0].i[ 1] = pw_buf[ 1];
pws_buf[gid2 + 0].i[ 2] = pw_buf[ 2];
pws_buf[gid2 + 0].i[ 3] = pw_buf[ 3];
pws_buf[gid2 + 0].i[ 4] = pw_buf[ 4];
pws_buf[gid2 + 0].i[ 5] = pw_buf[ 5];
pws_buf[gid2 + 0].i[ 6] = pw_buf[ 6];
pws_buf[gid2 + 0].i[ 7] = pw_buf[ 7];
pws_buf[gid2 + 0].pw_len = pw_len;
generate_pw (pw_buf, root_css_buf, markov_css_buf, pw_len, 0, mask80, bits14, bits15, off + gid2 + 1);
pws_buf[gid2 + 1].i[ 0] = pw_buf[ 0];
pws_buf[gid2 + 1].i[ 1] = pw_buf[ 1];
pws_buf[gid2 + 1].i[ 2] = pw_buf[ 2];
pws_buf[gid2 + 1].i[ 3] = pw_buf[ 3];
pws_buf[gid2 + 1].i[ 4] = pw_buf[ 4];
pws_buf[gid2 + 1].i[ 5] = pw_buf[ 5];
pws_buf[gid2 + 1].i[ 6] = pw_buf[ 6];
pws_buf[gid2 + 1].i[ 7] = pw_buf[ 7];
pws_buf[gid2 + 1].pw_len = pw_len;
generate_pw (pw_buf, root_css_buf, markov_css_buf, pw_len, 0, mask80, bits14, bits15, off + gid2 + 2);
pws_buf[gid2 + 2].i[ 0] = pw_buf[ 0];
pws_buf[gid2 + 2].i[ 1] = pw_buf[ 1];
pws_buf[gid2 + 2].i[ 2] = pw_buf[ 2];
pws_buf[gid2 + 2].i[ 3] = pw_buf[ 3];
pws_buf[gid2 + 2].i[ 4] = pw_buf[ 4];
pws_buf[gid2 + 2].i[ 5] = pw_buf[ 5];
pws_buf[gid2 + 2].i[ 6] = pw_buf[ 6];
pws_buf[gid2 + 2].i[ 7] = pw_buf[ 7];
pws_buf[gid2 + 2].pw_len = pw_len;
generate_pw (pw_buf, root_css_buf, markov_css_buf, pw_len, 0, mask80, bits14, bits15, off + gid2 + 3);
pws_buf[gid2 + 3].i[ 0] = pw_buf[ 0];
pws_buf[gid2 + 3].i[ 1] = pw_buf[ 1];
pws_buf[gid2 + 3].i[ 2] = pw_buf[ 2];
pws_buf[gid2 + 3].i[ 3] = pw_buf[ 3];
pws_buf[gid2 + 3].i[ 4] = pw_buf[ 4];
pws_buf[gid2 + 3].i[ 5] = pw_buf[ 5];
pws_buf[gid2 + 3].i[ 6] = pw_buf[ 6];
pws_buf[gid2 + 3].i[ 7] = pw_buf[ 7];
pws_buf[gid2 + 3].pw_len = pw_len;
}