forked from hashcat/hashcat
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Added hash-mode: md5(sha1($salt.$pass))
- Loading branch information
Showing
10 changed files
with
3,871 additions
and
0 deletions.
There are no files selected for viewing
Large diffs are not rendered by default.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,266 @@ | ||
/** | ||
* Author......: See docs/credits.txt | ||
* License.....: MIT | ||
*/ | ||
|
||
//#define NEW_SIMD_CODE | ||
|
||
#ifdef KERNEL_STATIC | ||
#include M2S(INCLUDE_PATH/inc_vendor.h) | ||
#include M2S(INCLUDE_PATH/inc_types.h) | ||
#include M2S(INCLUDE_PATH/inc_platform.cl) | ||
#include M2S(INCLUDE_PATH/inc_common.cl) | ||
#include M2S(INCLUDE_PATH/inc_rp.h) | ||
#include M2S(INCLUDE_PATH/inc_rp.cl) | ||
#include M2S(INCLUDE_PATH/inc_scalar.cl) | ||
#include M2S(INCLUDE_PATH/inc_hash_md5.cl) | ||
#include M2S(INCLUDE_PATH/inc_hash_sha1.cl) | ||
#endif | ||
|
||
#if VECT_SIZE == 1 | ||
#define uint_to_hex_lower8(i) make_u32x (l_bin2asc[(i)]) | ||
#elif VECT_SIZE == 2 | ||
#define uint_to_hex_lower8(i) make_u32x (l_bin2asc[(i).s0], l_bin2asc[(i).s1]) | ||
#elif VECT_SIZE == 4 | ||
#define uint_to_hex_lower8(i) make_u32x (l_bin2asc[(i).s0], l_bin2asc[(i).s1], l_bin2asc[(i).s2], l_bin2asc[(i).s3]) | ||
#elif VECT_SIZE == 8 | ||
#define uint_to_hex_lower8(i) make_u32x (l_bin2asc[(i).s0], l_bin2asc[(i).s1], l_bin2asc[(i).s2], l_bin2asc[(i).s3], l_bin2asc[(i).s4], l_bin2asc[(i).s5], l_bin2asc[(i).s6], l_bin2asc[(i).s7]) | ||
#elif VECT_SIZE == 16 | ||
#define uint_to_hex_lower8(i) make_u32x (l_bin2asc[(i).s0], l_bin2asc[(i).s1], l_bin2asc[(i).s2], l_bin2asc[(i).s3], l_bin2asc[(i).s4], l_bin2asc[(i).s5], l_bin2asc[(i).s6], l_bin2asc[(i).s7], l_bin2asc[(i).s8], l_bin2asc[(i).s9], l_bin2asc[(i).sa], l_bin2asc[(i).sb], l_bin2asc[(i).sc], l_bin2asc[(i).sd], l_bin2asc[(i).se], l_bin2asc[(i).sf]) | ||
#endif | ||
|
||
KERNEL_FQ void m04430_mxx (KERN_ATTR_RULES ()) | ||
{ | ||
/** | ||
* modifier | ||
*/ | ||
|
||
const u64 gid = get_global_id (0); | ||
const u64 lid = get_local_id (0); | ||
const u64 lsz = get_local_size (0); | ||
|
||
/** | ||
* bin2asc table | ||
*/ | ||
|
||
LOCAL_VK u32 l_bin2asc[256]; | ||
|
||
for (u32 i = lid; i < 256; i += lsz) | ||
{ | ||
const u32 i0 = (i >> 0) & 15; | ||
const u32 i1 = (i >> 4) & 15; | ||
|
||
l_bin2asc[i] = ((i0 < 10) ? '0' + i0 : 'a' - 10 + i0) << 8 | ||
| ((i1 < 10) ? '0' + i1 : 'a' - 10 + i1) << 0; | ||
} | ||
|
||
SYNC_THREADS (); | ||
|
||
if (gid >= GID_CNT) return; | ||
|
||
/** | ||
* base | ||
*/ | ||
|
||
COPY_PW (pws[gid]); | ||
|
||
sha1_ctx_t ctx1; | ||
|
||
sha1_init (&ctx1); | ||
|
||
sha1_update_global_swap (&ctx1, salt_bufs[SALT_POS_HOST].salt_buf, salt_bufs[SALT_POS_HOST].salt_len); | ||
|
||
/** | ||
* loop | ||
*/ | ||
|
||
u32 w0[4]; | ||
u32 w1[4]; | ||
u32 w2[4]; | ||
u32 w3[4]; | ||
|
||
for (u32 il_pos = 0; il_pos < IL_CNT; il_pos++) | ||
{ | ||
pw_t tmp = PASTE_PW; | ||
|
||
tmp.pw_len = apply_rules (rules_buf[il_pos].cmds, tmp.i, tmp.pw_len); | ||
|
||
sha1_ctx_t ctx0 = ctx1; | ||
|
||
sha1_update_swap (&ctx0, tmp.i, tmp.pw_len); | ||
|
||
sha1_final (&ctx0); | ||
|
||
const u32 a = ctx0.h[0]; | ||
const u32 b = ctx0.h[1]; | ||
const u32 c = ctx0.h[2]; | ||
const u32 d = ctx0.h[3]; | ||
const u32 e = ctx0.h[4]; | ||
|
||
md5_ctx_t ctx; | ||
|
||
md5_init (&ctx); | ||
|
||
w0[0] = uint_to_hex_lower8 ((a >> 24) & 255) << 0 | ||
| uint_to_hex_lower8 ((a >> 16) & 255) << 16; | ||
w0[1] = uint_to_hex_lower8 ((a >> 8) & 255) << 0 | ||
| uint_to_hex_lower8 ((a >> 0) & 255) << 16; | ||
w0[2] = uint_to_hex_lower8 ((b >> 24) & 255) << 0 | ||
| uint_to_hex_lower8 ((b >> 16) & 255) << 16; | ||
w0[3] = uint_to_hex_lower8 ((b >> 8) & 255) << 0 | ||
| uint_to_hex_lower8 ((b >> 0) & 255) << 16; | ||
w1[0] = uint_to_hex_lower8 ((c >> 24) & 255) << 0 | ||
| uint_to_hex_lower8 ((c >> 16) & 255) << 16; | ||
w1[1] = uint_to_hex_lower8 ((c >> 8) & 255) << 0 | ||
| uint_to_hex_lower8 ((c >> 0) & 255) << 16; | ||
w1[2] = uint_to_hex_lower8 ((d >> 24) & 255) << 0 | ||
| uint_to_hex_lower8 ((d >> 16) & 255) << 16; | ||
w1[3] = uint_to_hex_lower8 ((d >> 8) & 255) << 0 | ||
| uint_to_hex_lower8 ((d >> 0) & 255) << 16; | ||
w2[0] = uint_to_hex_lower8 ((e >> 24) & 255) << 0 | ||
| uint_to_hex_lower8 ((e >> 16) & 255) << 16; | ||
w2[1] = uint_to_hex_lower8 ((e >> 8) & 255) << 0 | ||
| uint_to_hex_lower8 ((e >> 0) & 255) << 16; | ||
w2[2] = 0; | ||
w2[3] = 0; | ||
w3[0] = 0; | ||
w3[1] = 0; | ||
w3[2] = 0; | ||
w3[3] = 0; | ||
|
||
md5_update_64 (&ctx, w0, w1, w2, w3, 40); | ||
|
||
md5_final (&ctx); | ||
|
||
const u32 r0 = ctx.h[DGST_R0]; | ||
const u32 r1 = ctx.h[DGST_R1]; | ||
const u32 r2 = ctx.h[DGST_R2]; | ||
const u32 r3 = ctx.h[DGST_R3]; | ||
|
||
COMPARE_M_SCALAR (r0, r1, r2, r3); | ||
} | ||
} | ||
|
||
KERNEL_FQ void m04430_sxx (KERN_ATTR_RULES ()) | ||
{ | ||
/** | ||
* modifier | ||
*/ | ||
|
||
const u64 gid = get_global_id (0); | ||
const u64 lid = get_local_id (0); | ||
const u64 lsz = get_local_size (0); | ||
|
||
/** | ||
* bin2asc table | ||
*/ | ||
|
||
LOCAL_VK u32 l_bin2asc[256]; | ||
|
||
for (u32 i = lid; i < 256; i += lsz) | ||
{ | ||
const u32 i0 = (i >> 0) & 15; | ||
const u32 i1 = (i >> 4) & 15; | ||
|
||
l_bin2asc[i] = ((i0 < 10) ? '0' + i0 : 'a' - 10 + i0) << 8 | ||
| ((i1 < 10) ? '0' + i1 : 'a' - 10 + i1) << 0; | ||
} | ||
|
||
SYNC_THREADS (); | ||
|
||
if (gid >= GID_CNT) return; | ||
|
||
/** | ||
* digest | ||
*/ | ||
|
||
const u32 search[4] = | ||
{ | ||
digests_buf[DIGESTS_OFFSET_HOST].digest_buf[DGST_R0], | ||
digests_buf[DIGESTS_OFFSET_HOST].digest_buf[DGST_R1], | ||
digests_buf[DIGESTS_OFFSET_HOST].digest_buf[DGST_R2], | ||
digests_buf[DIGESTS_OFFSET_HOST].digest_buf[DGST_R3] | ||
}; | ||
|
||
/** | ||
* base | ||
*/ | ||
|
||
COPY_PW (pws[gid]); | ||
|
||
sha1_ctx_t ctx1; | ||
|
||
sha1_init (&ctx1); | ||
|
||
sha1_update_global_swap (&ctx1, salt_bufs[SALT_POS_HOST].salt_buf, salt_bufs[SALT_POS_HOST].salt_len); | ||
|
||
/** | ||
* loop | ||
*/ | ||
|
||
u32 w0[4]; | ||
u32 w1[4]; | ||
u32 w2[4]; | ||
u32 w3[4]; | ||
|
||
for (u32 il_pos = 0; il_pos < IL_CNT; il_pos++) | ||
{ | ||
pw_t tmp = PASTE_PW; | ||
|
||
tmp.pw_len = apply_rules (rules_buf[il_pos].cmds, tmp.i, tmp.pw_len); | ||
|
||
sha1_ctx_t ctx0 = ctx1; | ||
|
||
sha1_update_swap (&ctx0, tmp.i, tmp.pw_len); | ||
|
||
sha1_final (&ctx0); | ||
|
||
const u32 a = ctx0.h[0]; | ||
const u32 b = ctx0.h[1]; | ||
const u32 c = ctx0.h[2]; | ||
const u32 d = ctx0.h[3]; | ||
const u32 e = ctx0.h[4]; | ||
|
||
md5_ctx_t ctx; | ||
|
||
md5_init (&ctx); | ||
|
||
w0[0] = uint_to_hex_lower8 ((a >> 24) & 255) << 0 | ||
| uint_to_hex_lower8 ((a >> 16) & 255) << 16; | ||
w0[1] = uint_to_hex_lower8 ((a >> 8) & 255) << 0 | ||
| uint_to_hex_lower8 ((a >> 0) & 255) << 16; | ||
w0[2] = uint_to_hex_lower8 ((b >> 24) & 255) << 0 | ||
| uint_to_hex_lower8 ((b >> 16) & 255) << 16; | ||
w0[3] = uint_to_hex_lower8 ((b >> 8) & 255) << 0 | ||
| uint_to_hex_lower8 ((b >> 0) & 255) << 16; | ||
w1[0] = uint_to_hex_lower8 ((c >> 24) & 255) << 0 | ||
| uint_to_hex_lower8 ((c >> 16) & 255) << 16; | ||
w1[1] = uint_to_hex_lower8 ((c >> 8) & 255) << 0 | ||
| uint_to_hex_lower8 ((c >> 0) & 255) << 16; | ||
w1[2] = uint_to_hex_lower8 ((d >> 24) & 255) << 0 | ||
| uint_to_hex_lower8 ((d >> 16) & 255) << 16; | ||
w1[3] = uint_to_hex_lower8 ((d >> 8) & 255) << 0 | ||
| uint_to_hex_lower8 ((d >> 0) & 255) << 16; | ||
w2[0] = uint_to_hex_lower8 ((e >> 24) & 255) << 0 | ||
| uint_to_hex_lower8 ((e >> 16) & 255) << 16; | ||
w2[1] = uint_to_hex_lower8 ((e >> 8) & 255) << 0 | ||
| uint_to_hex_lower8 ((e >> 0) & 255) << 16; | ||
w2[2] = 0; | ||
w2[3] = 0; | ||
w3[0] = 0; | ||
w3[1] = 0; | ||
w3[2] = 0; | ||
w3[3] = 0; | ||
|
||
md5_update_64 (&ctx, w0, w1, w2, w3, 40); | ||
|
||
md5_final (&ctx); | ||
|
||
const u32 r0 = ctx.h[DGST_R0]; | ||
const u32 r1 = ctx.h[DGST_R1]; | ||
const u32 r2 = ctx.h[DGST_R2]; | ||
const u32 r3 = ctx.h[DGST_R3]; | ||
|
||
COMPARE_S_SCALAR (r0, r1, r2, r3); | ||
} | ||
} |
Oops, something went wrong.