--- /dev/null
+/**
+ * Author......: Jens Steube <jens.steube@gmail.com>
+ * License.....: MIT
+ */
+
+#define _SAPB_
+
+#include "include/constants.h"
+#include "include/kernel_vendor.h"
+
+#define DGST_R0 0
+#define DGST_R1 1
+#define DGST_R2 2
+#define DGST_R3 3
+
+#include "include/kernel_functions.c"
+#include "types_ocl.c"
+#include "common.c"
+
+#define COMPARE_S "check_single_comp4.c"
+#define COMPARE_M "check_multi_comp4.c"
+
+#define GETCHAR(a,p) (((a)[(p) / 4] >> (((p) & 3) * 8)) & 0xff)
+#define PUTCHAR(a,p,c) ((a)[(p) / 4] = (((a)[(p) / 4] & ~(0xff << (((p) & 3) * 8))) | ((c) << (((p) & 3) * 8))))
+
+#define SETSHIFTEDINT(a,n,v) \
+{ \
+ const u32 s = ((n) & 3) * 8; \
+ const u64 x = (u64) (v) << s; \
+ (a)[((n)/4)+0] &= ~(0xff << ((n & 3) * 8)); \
+ (a)[((n)/4)+0] |= x; \
+ (a)[((n)/4)+1] = x >> 32; \
+}
+
+__constant u32 sapb_trans_tbl[256] =
+{
+ // first value hack for 0 byte as part of an optimization
+ 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0x3f, 0x40, 0x41, 0x50, 0x43, 0x44, 0x45, 0x4b, 0x47, 0x48, 0x4d, 0x4e, 0x54, 0x51, 0x53, 0x46,
+ 0x35, 0x36, 0x37, 0x38, 0x39, 0x3a, 0x3b, 0x3c, 0x3d, 0x3e, 0x56, 0x55, 0x5c, 0x49, 0x5d, 0x4a,
+ 0x42, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f,
+ 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x58, 0x5b, 0x59, 0xff, 0x52,
+ 0x4c, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f,
+ 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x57, 0x5e, 0x5a, 0x4f, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
+ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff
+};
+
+__constant u32 bcodeArray[48] =
+{
+ 0x14, 0x77, 0xf3, 0xd4, 0xbb, 0x71, 0x23, 0xd0, 0x03, 0xff, 0x47, 0x93, 0x55, 0xaa, 0x66, 0x91,
+ 0xf2, 0x88, 0x6b, 0x99, 0xbf, 0xcb, 0x32, 0x1a, 0x19, 0xd9, 0xa7, 0x82, 0x22, 0x49, 0xa2, 0x51,
+ 0xe2, 0xb7, 0x33, 0x71, 0x8b, 0x9f, 0x5d, 0x01, 0x44, 0x70, 0xae, 0x11, 0xef, 0x28, 0xf0, 0x0d
+};
+
+static u32 sapb_trans (const u32 in)
+{
+ u32 out = 0;
+
+ #ifdef VECT_SIZE1
+ out |= (sapb_trans_tbl[(in >> 0) & 0xff]) << 0;
+ out |= (sapb_trans_tbl[(in >> 8) & 0xff]) << 8;
+ out |= (sapb_trans_tbl[(in >> 16) & 0xff]) << 16;
+ out |= (sapb_trans_tbl[(in >> 24) & 0xff]) << 24;
+ #endif
+
+ return out;
+}
+
+static u32 walld0rf_magic (const u32 w0[4], const u32 pw_len, const u32 salt_buf0[4], const u32 salt_len, const u32 a, const u32 b, const u32 c, const u32 d, u32 t[16])
+{
+ t[ 0] = 0;
+ t[ 1] = 0;
+ t[ 2] = 0;
+ t[ 3] = 0;
+ t[ 4] = 0;
+ t[ 5] = 0;
+ t[ 6] = 0;
+ t[ 7] = 0;
+ t[ 8] = 0;
+ t[ 9] = 0;
+ t[10] = 0;
+ t[11] = 0;
+ t[12] = 0;
+ t[13] = 0;
+ t[14] = 0;
+ t[15] = 0;
+
+ u32 sum20 = ((a >> 24) & 3)
+ + ((a >> 16) & 3)
+ + ((a >> 8) & 3)
+ + ((a >> 0) & 3)
+ + ((b >> 8) & 3);
+
+ sum20 |= 0x20;
+
+ const u32 w[2] = { w0[0], w0[1] };
+
+ const u32 s[3] = { salt_buf0[0], salt_buf0[1], salt_buf0[2] };
+
+ u32 saved_key[4] = { a, b, c, d };
+
+ u32 i1 = 0;
+ u32 i2 = 0;
+ u32 i3 = 0;
+
+ // we can assume this because the password must be at least 3
+ // and the username must be at least 1 so we can save the if ()
+
+ u32 t0 = 0;
+
+ if ((d >> 24) & 1)
+ {
+ t0 |= bcodeArray[47] << 0;
+ t0 |= (w[0] & 0xff) << 8;
+ t0 |= (s[0] & 0xff) << 16;
+ t0 |= bcodeArray[ 1] << 24;
+
+ i1 = 1;
+ i2 = 5;
+ i3 = 1;
+ }
+ else
+ {
+ t0 |= (w[0] & 0xff) << 0;
+ t0 |= (s[0] & 0xff) << 8;
+ t0 |= bcodeArray[ 0] << 16;
+
+ i1 = 1;
+ i2 = 4;
+ i3 = 1;
+ }
+
+ t[0] = t0;
+
+ // because the following code can increase i2 by a maximum of 5,
+ // there is an overflow potential of 4 before it comes to the next test for i2 >= sum20
+ // we need to truncate in that case
+
+ while ((i1 < pw_len) && (i3 < salt_len))
+ {
+ u32 x0 = 0;
+
+ u32 i2_sav = i2;
+
+ if (GETCHAR (saved_key, 15 - i1) & 1)
+ {
+ x0 |= bcodeArray[48 - 1 - i1] << 0; i2++;
+ x0 |= GETCHAR (w, i1) << 8; i2++; i1++;
+ x0 |= GETCHAR (s, i3) << 16; i2++; i3++;
+ x0 |= bcodeArray[i2 - i1 - i3] << 24; i2++; i2++;
+ }
+ else
+ {
+ x0 |= GETCHAR (w, i1) << 0; i2++; i1++;
+ x0 |= GETCHAR (s, i3) << 8; i2++; i3++;
+ x0 |= bcodeArray[i2 - i1 - i3] << 16; i2++; i2++;
+ }
+
+ SETSHIFTEDINT (t, i2_sav, x0);
+
+ if (i2 >= sum20)
+ {
+ return sum20;
+ }
+ }
+
+ while ((i1 < pw_len) || (i3 < salt_len))
+ {
+ if (i1 < pw_len) // max 8
+ {
+ if (GETCHAR (saved_key, 15 - i1) & 1)
+ {
+ PUTCHAR (t, i2, bcodeArray[48 - 1 - i1]);
+
+ i2++;
+ }
+
+ PUTCHAR (t, i2, GETCHAR (w, i1));
+
+ i1++;
+ i2++;
+ }
+ else
+ {
+ PUTCHAR (t, i2, GETCHAR (s, i3));
+
+ i2++;
+ i3++;
+ }
+
+ PUTCHAR (t, i2, bcodeArray[i2 - i1 - i3]);
+
+ i2++;
+ i2++;
+
+ if (i2 >= sum20)
+ {
+ return sum20;
+ }
+ }
+
+ while (i2 < sum20)
+ {
+ PUTCHAR (t, i2, bcodeArray[i2 - i1 - i3]);
+
+ i2++;
+ i2++;
+ }
+
+ return sum20;
+}
+
+__kernel void __attribute__((reqd_work_group_size (64, 1, 1))) m07700_m04 (__global pw_t *pws, __global gpu_rule_t *rules_buf, __global comb_t *combs_buf, __global bf_t *bfs_buf, __global void *tmps, __global void *hooks, __global u32 *bitmaps_buf_s1_a, __global u32 *bitmaps_buf_s1_b, __global u32 *bitmaps_buf_s1_c, __global u32 *bitmaps_buf_s1_d, __global u32 *bitmaps_buf_s2_a, __global u32 *bitmaps_buf_s2_b, __global u32 *bitmaps_buf_s2_c, __global u32 *bitmaps_buf_s2_d, __global plain_t *plains_buf, __global digest_t *digests_buf, __global u32 *hashes_shown, __global salt_t *salt_bufs, __global void *esalt_bufs, __global u32 *d_return_buf, __global u32 *d_scryptV_buf, const u32 bitmap_mask, const u32 bitmap_shift1, const u32 bitmap_shift2, const u32 salt_pos, const u32 loop_pos, const u32 loop_cnt, const u32 combs_cnt, const u32 digests_cnt, const u32 digests_offset, const u32 combs_mode, const u32 gid_max)
+{
+ /**
+ * modifier
+ */
+
+ const u32 lid = get_local_id (0);
+
+ /**
+ * base
+ */
+
+ const u32 gid = get_global_id (0);
+
+ if (gid >= gid_max) return;
+
+ u32 wordl0[4];
+
+ wordl0[0] = pws[gid].i[ 0];
+ wordl0[1] = pws[gid].i[ 1];
+ wordl0[2] = 0;
+ wordl0[3] = 0;
+
+ u32 wordl1[4];
+
+ wordl1[0] = 0;
+ wordl1[1] = 0;
+ wordl1[2] = 0;
+ wordl1[3] = 0;
+
+ u32 wordl2[4];
+
+ wordl2[0] = 0;
+ wordl2[1] = 0;
+ wordl2[2] = 0;
+ wordl2[3] = 0;
+
+ u32 wordl3[4];
+
+ wordl3[0] = 0;
+ wordl3[1] = 0;
+ wordl3[2] = 0;
+ wordl3[3] = 0;
+
+ const u32 pw_l_len = pws[gid].pw_len;
+
+ if (combs_mode == COMBINATOR_MODE_BASE_RIGHT)
+ {
+ switch_buffer_by_offset (wordl0, wordl1, wordl2, wordl3, combs_buf[0].pw_len);
+ }
+
+ /**
+ * salt
+ */
+
+ u32 salt_buf0[4];
+
+ salt_buf0[0] = salt_bufs[salt_pos].salt_buf[0];
+ salt_buf0[1] = salt_bufs[salt_pos].salt_buf[1];
+ salt_buf0[2] = salt_bufs[salt_pos].salt_buf[2];
+ salt_buf0[3] = 0;
+
+ const u32 salt_len = salt_bufs[salt_pos].salt_len;
+
+ salt_buf0[0] = sapb_trans (salt_buf0[0]);
+ salt_buf0[1] = sapb_trans (salt_buf0[1]);
+ salt_buf0[2] = sapb_trans (salt_buf0[2]);
+
+ /**
+ * digest
+ */
+
+ /**
+ * loop
+ */
+
+ for (u32 il_pos = 0; il_pos < combs_cnt; il_pos++)
+ {
+ const u32 pw_r_len = combs_buf[il_pos].pw_len;
+
+ const u32 pw_len = pw_l_len + pw_r_len;
+
+ u32 wordr0[4];
+
+ wordr0[0] = combs_buf[il_pos].i[0];
+ wordr0[1] = combs_buf[il_pos].i[1];
+ wordr0[2] = 0;
+ wordr0[3] = 0;
+
+ u32 wordr1[4];
+
+ wordr1[0] = 0;
+ wordr1[1] = 0;
+ wordr1[2] = 0;
+ wordr1[3] = 0;
+
+ u32 wordr2[4];
+
+ wordr2[0] = 0;
+ wordr2[1] = 0;
+ wordr2[2] = 0;
+ wordr2[3] = 0;
+
+ u32 wordr3[4];
+
+ wordr3[0] = 0;
+ wordr3[1] = 0;
+ wordr3[2] = 0;
+ wordr3[3] = 0;
+
+ if (combs_mode == COMBINATOR_MODE_BASE_LEFT)
+ {
+ switch_buffer_by_offset (wordr0, wordr1, wordr2, wordr3, pw_l_len);
+ }
+
+ u32 w0[4];
+
+ w0[0] = sapb_trans (wordl0[0] | wordr0[0]);
+ w0[1] = sapb_trans (wordl0[1] | wordr0[1]);
+ w0[2] = 0;
+ w0[3] = 0;
+
+ /**
+ * append salt
+ */
+
+ u32 s0[4];
+
+ s0[0] = salt_buf0[0];
+ s0[1] = salt_buf0[1];
+ s0[2] = salt_buf0[2];
+ s0[3] = 0;
+
+ u32 s1[4];
+
+ s1[0] = 0;
+ s1[1] = 0;
+ s1[2] = 0;
+ s1[3] = 0;
+
+ u32 s2[4];
+
+ s2[0] = 0;
+ s2[1] = 0;
+ s2[2] = 0;
+ s2[3] = 0;
+
+ u32 s3[4];
+
+ s3[0] = 0;
+ s3[1] = 0;
+ s3[2] = 0;
+ s3[3] = 0;
+
+ switch_buffer_by_offset (s0, s1, s2, s3, pw_len);
+
+ const u32 pw_salt_len = pw_len + salt_len;
+
+ u32 t[16];
+
+ t[ 0] = s0[0] | w0[0];
+ t[ 1] = s0[1] | w0[1];
+ t[ 2] = s0[2];
+ t[ 3] = s0[3];
+ t[ 4] = s1[0];
+ t[ 5] = 0;
+ t[ 6] = 0;
+ t[ 7] = 0;
+ t[ 8] = 0;
+ t[ 9] = 0;
+ t[10] = 0;
+ t[11] = 0;
+ t[12] = 0;
+ t[13] = 0;
+ t[14] = pw_salt_len * 8;
+ t[15] = 0;
+
+ PUTCHAR (t, pw_salt_len, 0x80);
+
+ /**
+ * md5
+ */
+
+ u32 a = MD5M_A;
+ u32 b = MD5M_B;
+ u32 c = MD5M_C;
+ u32 d = MD5M_D;
+
+ MD5_STEP (MD5_Fo, a, b, c, d, t[ 0], MD5C00, MD5S00);
+ MD5_STEP (MD5_Fo, d, a, b, c, t[ 1], MD5C01, MD5S01);
+ MD5_STEP (MD5_Fo, c, d, a, b, t[ 2], MD5C02, MD5S02);
+ MD5_STEP (MD5_Fo, b, c, d, a, t[ 3], MD5C03, MD5S03);
+ MD5_STEP (MD5_Fo, a, b, c, d, t[ 4], MD5C04, MD5S00);
+ MD5_STEP (MD5_Fo, d, a, b, c, t[ 5], MD5C05, MD5S01);
+ MD5_STEP (MD5_Fo, c, d, a, b, t[ 6], MD5C06, MD5S02);
+ MD5_STEP (MD5_Fo, b, c, d, a, t[ 7], MD5C07, MD5S03);
+ MD5_STEP (MD5_Fo, a, b, c, d, t[ 8], MD5C08, MD5S00);
+ MD5_STEP (MD5_Fo, d, a, b, c, t[ 9], MD5C09, MD5S01);
+ MD5_STEP (MD5_Fo, c, d, a, b, t[10], MD5C0a, MD5S02);
+ MD5_STEP (MD5_Fo, b, c, d, a, t[11], MD5C0b, MD5S03);
+ MD5_STEP (MD5_Fo, a, b, c, d, t[12], MD5C0c, MD5S00);
+ MD5_STEP (MD5_Fo, d, a, b, c, t[13], MD5C0d, MD5S01);
+ MD5_STEP (MD5_Fo, c, d, a, b, t[14], MD5C0e, MD5S02);
+ MD5_STEP (MD5_Fo, b, c, d, a, t[15], MD5C0f, MD5S03);
+
+ MD5_STEP (MD5_Go, a, b, c, d, t[ 1], MD5C10, MD5S10);
+ MD5_STEP (MD5_Go, d, a, b, c, t[ 6], MD5C11, MD5S11);
+ MD5_STEP (MD5_Go, c, d, a, b, t[11], MD5C12, MD5S12);
+ MD5_STEP (MD5_Go, b, c, d, a, t[ 0], MD5C13, MD5S13);
+ MD5_STEP (MD5_Go, a, b, c, d, t[ 5], MD5C14, MD5S10);
+ MD5_STEP (MD5_Go, d, a, b, c, t[10], MD5C15, MD5S11);
+ MD5_STEP (MD5_Go, c, d, a, b, t[15], MD5C16, MD5S12);
+ MD5_STEP (MD5_Go, b, c, d, a, t[ 4], MD5C17, MD5S13);
+ MD5_STEP (MD5_Go, a, b, c, d, t[ 9], MD5C18, MD5S10);
+ MD5_STEP (MD5_Go, d, a, b, c, t[14], MD5C19, MD5S11);
+ MD5_STEP (MD5_Go, c, d, a, b, t[ 3], MD5C1a, MD5S12);
+ MD5_STEP (MD5_Go, b, c, d, a, t[ 8], MD5C1b, MD5S13);
+ MD5_STEP (MD5_Go, a, b, c, d, t[13], MD5C1c, MD5S10);
+ MD5_STEP (MD5_Go, d, a, b, c, t[ 2], MD5C1d, MD5S11);
+ MD5_STEP (MD5_Go, c, d, a, b, t[ 7], MD5C1e, MD5S12);
+ MD5_STEP (MD5_Go, b, c, d, a, t[12], MD5C1f, MD5S13);
+
+ MD5_STEP (MD5_H , a, b, c, d, t[ 5], MD5C20, MD5S20);
+ MD5_STEP (MD5_H , d, a, b, c, t[ 8], MD5C21, MD5S21);
+ MD5_STEP (MD5_H , c, d, a, b, t[11], MD5C22, MD5S22);
+ MD5_STEP (MD5_H , b, c, d, a, t[14], MD5C23, MD5S23);
+ MD5_STEP (MD5_H , a, b, c, d, t[ 1], MD5C24, MD5S20);
+ MD5_STEP (MD5_H , d, a, b, c, t[ 4], MD5C25, MD5S21);
+ MD5_STEP (MD5_H , c, d, a, b, t[ 7], MD5C26, MD5S22);
+ MD5_STEP (MD5_H , b, c, d, a, t[10], MD5C27, MD5S23);
+ MD5_STEP (MD5_H , a, b, c, d, t[13], MD5C28, MD5S20);
+ MD5_STEP (MD5_H , d, a, b, c, t[ 0], MD5C29, MD5S21);
+ MD5_STEP (MD5_H , c, d, a, b, t[ 3], MD5C2a, MD5S22);
+ MD5_STEP (MD5_H , b, c, d, a, t[ 6], MD5C2b, MD5S23);
+ MD5_STEP (MD5_H , a, b, c, d, t[ 9], MD5C2c, MD5S20);
+ MD5_STEP (MD5_H , d, a, b, c, t[12], MD5C2d, MD5S21);
+ MD5_STEP (MD5_H , c, d, a, b, t[15], MD5C2e, MD5S22);
+ MD5_STEP (MD5_H , b, c, d, a, t[ 2], MD5C2f, MD5S23);
+
+ MD5_STEP (MD5_I , a, b, c, d, t[ 0], MD5C30, MD5S30);
+ MD5_STEP (MD5_I , d, a, b, c, t[ 7], MD5C31, MD5S31);
+ MD5_STEP (MD5_I , c, d, a, b, t[14], MD5C32, MD5S32);
+ MD5_STEP (MD5_I , b, c, d, a, t[ 5], MD5C33, MD5S33);
+ MD5_STEP (MD5_I , a, b, c, d, t[12], MD5C34, MD5S30);
+ MD5_STEP (MD5_I , d, a, b, c, t[ 3], MD5C35, MD5S31);
+ MD5_STEP (MD5_I , c, d, a, b, t[10], MD5C36, MD5S32);
+ MD5_STEP (MD5_I , b, c, d, a, t[ 1], MD5C37, MD5S33);
+ MD5_STEP (MD5_I , a, b, c, d, t[ 8], MD5C38, MD5S30);
+ MD5_STEP (MD5_I , d, a, b, c, t[15], MD5C39, MD5S31);
+ MD5_STEP (MD5_I , c, d, a, b, t[ 6], MD5C3a, MD5S32);
+ MD5_STEP (MD5_I , b, c, d, a, t[13], MD5C3b, MD5S33);
+ MD5_STEP (MD5_I , a, b, c, d, t[ 4], MD5C3c, MD5S30);
+ MD5_STEP (MD5_I , d, a, b, c, t[11], MD5C3d, MD5S31);
+ MD5_STEP (MD5_I , c, d, a, b, t[ 2], MD5C3e, MD5S32);
+ MD5_STEP (MD5_I , b, c, d, a, t[ 9], MD5C3f, MD5S33);
+
+ a += MD5M_A;
+ b += MD5M_B;
+ c += MD5M_C;
+ d += MD5M_D;
+
+ const u32 sum20 = walld0rf_magic (w0, pw_len, salt_buf0, salt_len, a, b, c, d, t);
+
+ SETSHIFTEDINT (t, sum20, 0x80);
+
+ t[14] = sum20 * 8;
+
+ a = MD5M_A;
+ b = MD5M_B;
+ c = MD5M_C;
+ d = MD5M_D;
+
+ MD5_STEP (MD5_Fo, a, b, c, d, t[ 0], MD5C00, MD5S00);
+ MD5_STEP (MD5_Fo, d, a, b, c, t[ 1], MD5C01, MD5S01);
+ MD5_STEP (MD5_Fo, c, d, a, b, t[ 2], MD5C02, MD5S02);
+ MD5_STEP (MD5_Fo, b, c, d, a, t[ 3], MD5C03, MD5S03);
+ MD5_STEP (MD5_Fo, a, b, c, d, t[ 4], MD5C04, MD5S00);
+ MD5_STEP (MD5_Fo, d, a, b, c, t[ 5], MD5C05, MD5S01);
+ MD5_STEP (MD5_Fo, c, d, a, b, t[ 6], MD5C06, MD5S02);
+ MD5_STEP (MD5_Fo, b, c, d, a, t[ 7], MD5C07, MD5S03);
+ MD5_STEP (MD5_Fo, a, b, c, d, t[ 8], MD5C08, MD5S00);
+ MD5_STEP (MD5_Fo, d, a, b, c, t[ 9], MD5C09, MD5S01);
+ MD5_STEP (MD5_Fo, c, d, a, b, t[10], MD5C0a, MD5S02);
+ MD5_STEP (MD5_Fo, b, c, d, a, t[11], MD5C0b, MD5S03);
+ MD5_STEP (MD5_Fo, a, b, c, d, t[12], MD5C0c, MD5S00);
+ MD5_STEP (MD5_Fo, d, a, b, c, t[13], MD5C0d, MD5S01);
+ MD5_STEP (MD5_Fo, c, d, a, b, t[14], MD5C0e, MD5S02);
+ MD5_STEP (MD5_Fo, b, c, d, a, t[15], MD5C0f, MD5S03);
+
+ MD5_STEP (MD5_Go, a, b, c, d, t[ 1], MD5C10, MD5S10);
+ MD5_STEP (MD5_Go, d, a, b, c, t[ 6], MD5C11, MD5S11);
+ MD5_STEP (MD5_Go, c, d, a, b, t[11], MD5C12, MD5S12);
+ MD5_STEP (MD5_Go, b, c, d, a, t[ 0], MD5C13, MD5S13);
+ MD5_STEP (MD5_Go, a, b, c, d, t[ 5], MD5C14, MD5S10);
+ MD5_STEP (MD5_Go, d, a, b, c, t[10], MD5C15, MD5S11);
+ MD5_STEP (MD5_Go, c, d, a, b, t[15], MD5C16, MD5S12);
+ MD5_STEP (MD5_Go, b, c, d, a, t[ 4], MD5C17, MD5S13);
+ MD5_STEP (MD5_Go, a, b, c, d, t[ 9], MD5C18, MD5S10);
+ MD5_STEP (MD5_Go, d, a, b, c, t[14], MD5C19, MD5S11);
+ MD5_STEP (MD5_Go, c, d, a, b, t[ 3], MD5C1a, MD5S12);
+ MD5_STEP (MD5_Go, b, c, d, a, t[ 8], MD5C1b, MD5S13);
+ MD5_STEP (MD5_Go, a, b, c, d, t[13], MD5C1c, MD5S10);
+ MD5_STEP (MD5_Go, d, a, b, c, t[ 2], MD5C1d, MD5S11);
+ MD5_STEP (MD5_Go, c, d, a, b, t[ 7], MD5C1e, MD5S12);
+ MD5_STEP (MD5_Go, b, c, d, a, t[12], MD5C1f, MD5S13);
+
+ MD5_STEP (MD5_H , a, b, c, d, t[ 5], MD5C20, MD5S20);
+ MD5_STEP (MD5_H , d, a, b, c, t[ 8], MD5C21, MD5S21);
+ MD5_STEP (MD5_H , c, d, a, b, t[11], MD5C22, MD5S22);
+ MD5_STEP (MD5_H , b, c, d, a, t[14], MD5C23, MD5S23);
+ MD5_STEP (MD5_H , a, b, c, d, t[ 1], MD5C24, MD5S20);
+ MD5_STEP (MD5_H , d, a, b, c, t[ 4], MD5C25, MD5S21);
+ MD5_STEP (MD5_H , c, d, a, b, t[ 7], MD5C26, MD5S22);
+ MD5_STEP (MD5_H , b, c, d, a, t[10], MD5C27, MD5S23);
+ MD5_STEP (MD5_H , a, b, c, d, t[13], MD5C28, MD5S20);
+ MD5_STEP (MD5_H , d, a, b, c, t[ 0], MD5C29, MD5S21);
+ MD5_STEP (MD5_H , c, d, a, b, t[ 3], MD5C2a, MD5S22);
+ MD5_STEP (MD5_H , b, c, d, a, t[ 6], MD5C2b, MD5S23);
+ MD5_STEP (MD5_H , a, b, c, d, t[ 9], MD5C2c, MD5S20);
+ MD5_STEP (MD5_H , d, a, b, c, t[12], MD5C2d, MD5S21);
+ MD5_STEP (MD5_H , c, d, a, b, t[15], MD5C2e, MD5S22);
+ MD5_STEP (MD5_H , b, c, d, a, t[ 2], MD5C2f, MD5S23);
+
+ MD5_STEP (MD5_I , a, b, c, d, t[ 0], MD5C30, MD5S30);
+ MD5_STEP (MD5_I , d, a, b, c, t[ 7], MD5C31, MD5S31);
+ MD5_STEP (MD5_I , c, d, a, b, t[14], MD5C32, MD5S32);
+ MD5_STEP (MD5_I , b, c, d, a, t[ 5], MD5C33, MD5S33);
+ MD5_STEP (MD5_I , a, b, c, d, t[12], MD5C34, MD5S30);
+ MD5_STEP (MD5_I , d, a, b, c, t[ 3], MD5C35, MD5S31);
+ MD5_STEP (MD5_I , c, d, a, b, t[10], MD5C36, MD5S32);
+ MD5_STEP (MD5_I , b, c, d, a, t[ 1], MD5C37, MD5S33);
+ MD5_STEP (MD5_I , a, b, c, d, t[ 8], MD5C38, MD5S30);
+ MD5_STEP (MD5_I , d, a, b, c, t[15], MD5C39, MD5S31);
+ MD5_STEP (MD5_I , c, d, a, b, t[ 6], MD5C3a, MD5S32);
+ MD5_STEP (MD5_I , b, c, d, a, t[13], MD5C3b, MD5S33);
+ MD5_STEP (MD5_I , a, b, c, d, t[ 4], MD5C3c, MD5S30);
+ MD5_STEP (MD5_I , d, a, b, c, t[11], MD5C3d, MD5S31);
+ MD5_STEP (MD5_I , c, d, a, b, t[ 2], MD5C3e, MD5S32);
+ MD5_STEP (MD5_I , b, c, d, a, t[ 9], MD5C3f, MD5S33);
+
+ a += MD5M_A;
+ b += MD5M_B;
+ c += MD5M_C;
+ d += MD5M_D;
+
+ a ^= c;
+ b ^= d;
+
+ const u32 r0 = a;
+ const u32 r1 = b;
+ const u32 r2 = 0;
+ const u32 r3 = 0;
+
+ #include COMPARE_M
+ }
+}
+
+__kernel void __attribute__((reqd_work_group_size (64, 1, 1))) m07700_m08 (__global pw_t *pws, __global gpu_rule_t *rules_buf, __global comb_t *combs_buf, __global bf_t *bfs_buf, __global void *tmps, __global void *hooks, __global u32 *bitmaps_buf_s1_a, __global u32 *bitmaps_buf_s1_b, __global u32 *bitmaps_buf_s1_c, __global u32 *bitmaps_buf_s1_d, __global u32 *bitmaps_buf_s2_a, __global u32 *bitmaps_buf_s2_b, __global u32 *bitmaps_buf_s2_c, __global u32 *bitmaps_buf_s2_d, __global plain_t *plains_buf, __global digest_t *digests_buf, __global u32 *hashes_shown, __global salt_t *salt_bufs, __global void *esalt_bufs, __global u32 *d_return_buf, __global u32 *d_scryptV_buf, const u32 bitmap_mask, const u32 bitmap_shift1, const u32 bitmap_shift2, const u32 salt_pos, const u32 loop_pos, const u32 loop_cnt, const u32 combs_cnt, const u32 digests_cnt, const u32 digests_offset, const u32 combs_mode, const u32 gid_max)
+{
+}
+
+__kernel void __attribute__((reqd_work_group_size (64, 1, 1))) m07700_m16 (__global pw_t *pws, __global gpu_rule_t *rules_buf, __global comb_t *combs_buf, __global bf_t *bfs_buf, __global void *tmps, __global void *hooks, __global u32 *bitmaps_buf_s1_a, __global u32 *bitmaps_buf_s1_b, __global u32 *bitmaps_buf_s1_c, __global u32 *bitmaps_buf_s1_d, __global u32 *bitmaps_buf_s2_a, __global u32 *bitmaps_buf_s2_b, __global u32 *bitmaps_buf_s2_c, __global u32 *bitmaps_buf_s2_d, __global plain_t *plains_buf, __global digest_t *digests_buf, __global u32 *hashes_shown, __global salt_t *salt_bufs, __global void *esalt_bufs, __global u32 *d_return_buf, __global u32 *d_scryptV_buf, const u32 bitmap_mask, const u32 bitmap_shift1, const u32 bitmap_shift2, const u32 salt_pos, const u32 loop_pos, const u32 loop_cnt, const u32 combs_cnt, const u32 digests_cnt, const u32 digests_offset, const u32 combs_mode, const u32 gid_max)
+{
+}
+
+__kernel void __attribute__((reqd_work_group_size (64, 1, 1))) m07700_s04 (__global pw_t *pws, __global gpu_rule_t *rules_buf, __global comb_t *combs_buf, __global bf_t *bfs_buf, __global void *tmps, __global void *hooks, __global u32 *bitmaps_buf_s1_a, __global u32 *bitmaps_buf_s1_b, __global u32 *bitmaps_buf_s1_c, __global u32 *bitmaps_buf_s1_d, __global u32 *bitmaps_buf_s2_a, __global u32 *bitmaps_buf_s2_b, __global u32 *bitmaps_buf_s2_c, __global u32 *bitmaps_buf_s2_d, __global plain_t *plains_buf, __global digest_t *digests_buf, __global u32 *hashes_shown, __global salt_t *salt_bufs, __global void *esalt_bufs, __global u32 *d_return_buf, __global u32 *d_scryptV_buf, const u32 bitmap_mask, const u32 bitmap_shift1, const u32 bitmap_shift2, const u32 salt_pos, const u32 loop_pos, const u32 loop_cnt, const u32 combs_cnt, const u32 digests_cnt, const u32 digests_offset, const u32 combs_mode, const u32 gid_max)
+{
+ /**
+ * modifier
+ */
+
+ const u32 lid = get_local_id (0);
+
+ /**
+ * base
+ */
+
+ const u32 gid = get_global_id (0);
+
+ if (gid >= gid_max) return;
+
+ u32 wordl0[4];
+
+ wordl0[0] = pws[gid].i[ 0];
+ wordl0[1] = pws[gid].i[ 1];
+ wordl0[2] = 0;
+ wordl0[3] = 0;
+
+ u32 wordl1[4];
+
+ wordl1[0] = 0;
+ wordl1[1] = 0;
+ wordl1[2] = 0;
+ wordl1[3] = 0;
+
+ u32 wordl2[4];
+
+ wordl2[0] = 0;
+ wordl2[1] = 0;
+ wordl2[2] = 0;
+ wordl2[3] = 0;
+
+ u32 wordl3[4];
+
+ wordl3[0] = 0;
+ wordl3[1] = 0;
+ wordl3[2] = 0;
+ wordl3[3] = 0;
+
+ const u32 pw_l_len = pws[gid].pw_len;
+
+ if (combs_mode == COMBINATOR_MODE_BASE_RIGHT)
+ {
+ switch_buffer_by_offset (wordl0, wordl1, wordl2, wordl3, combs_buf[0].pw_len);
+ }
+
+ /**
+ * salt
+ */
+
+ u32 salt_buf0[4];
+
+ salt_buf0[0] = salt_bufs[salt_pos].salt_buf[0];
+ salt_buf0[1] = salt_bufs[salt_pos].salt_buf[1];
+ salt_buf0[2] = salt_bufs[salt_pos].salt_buf[2];
+ salt_buf0[3] = 0;
+
+ const u32 salt_len = salt_bufs[salt_pos].salt_len;
+
+ salt_buf0[0] = sapb_trans (salt_buf0[0]);
+ salt_buf0[1] = sapb_trans (salt_buf0[1]);
+ salt_buf0[2] = sapb_trans (salt_buf0[2]);
+
+ /**
+ * digest
+ */
+
+ const u32 search[4] =
+ {
+ digests_buf[digests_offset].digest_buf[DGST_R0],
+ digests_buf[digests_offset].digest_buf[DGST_R1],
+ digests_buf[digests_offset].digest_buf[DGST_R2],
+ digests_buf[digests_offset].digest_buf[DGST_R3]
+ };
+
+ /**
+ * loop
+ */
+
+ for (u32 il_pos = 0; il_pos < combs_cnt; il_pos++)
+ {
+ const u32 pw_r_len = combs_buf[il_pos].pw_len;
+
+ const u32 pw_len = pw_l_len + pw_r_len;
+
+ u32 wordr0[4];
+
+ wordr0[0] = combs_buf[il_pos].i[0];
+ wordr0[1] = combs_buf[il_pos].i[1];
+ wordr0[2] = 0;
+ wordr0[3] = 0;
+
+ u32 wordr1[4];
+
+ wordr1[0] = 0;
+ wordr1[1] = 0;
+ wordr1[2] = 0;
+ wordr1[3] = 0;
+
+ u32 wordr2[4];
+
+ wordr2[0] = 0;
+ wordr2[1] = 0;
+ wordr2[2] = 0;
+ wordr2[3] = 0;
+
+ u32 wordr3[4];
+
+ wordr3[0] = 0;
+ wordr3[1] = 0;
+ wordr3[2] = 0;
+ wordr3[3] = 0;
+
+ if (combs_mode == COMBINATOR_MODE_BASE_LEFT)
+ {
+ switch_buffer_by_offset (wordr0, wordr1, wordr2, wordr3, pw_l_len);
+ }
+
+ u32 w0[4];
+
+ w0[0] = sapb_trans (wordl0[0] | wordr0[0]);
+ w0[1] = sapb_trans (wordl0[1] | wordr0[1]);
+ w0[2] = 0;
+ w0[3] = 0;
+
+ /**
+ * append salt
+ */
+
+ u32 s0[4];
+
+ s0[0] = salt_buf0[0];
+ s0[1] = salt_buf0[1];
+ s0[2] = salt_buf0[2];
+ s0[3] = 0;
+
+ u32 s1[4];
+
+ s1[0] = 0;
+ s1[1] = 0;
+ s1[2] = 0;
+ s1[3] = 0;
+
+ u32 s2[4];
+
+ s2[0] = 0;
+ s2[1] = 0;
+ s2[2] = 0;
+ s2[3] = 0;
+
+ u32 s3[4];
+
+ s3[0] = 0;
+ s3[1] = 0;
+ s3[2] = 0;
+ s3[3] = 0;
+
+ switch_buffer_by_offset (s0, s1, s2, s3, pw_len);
+
+ const u32 pw_salt_len = pw_len + salt_len;
+
+ u32 t[16];
+
+ t[ 0] = s0[0] | w0[0];
+ t[ 1] = s0[1] | w0[1];
+ t[ 2] = s0[2];
+ t[ 3] = s0[3];
+ t[ 4] = s1[0];
+ t[ 5] = 0;
+ t[ 6] = 0;
+ t[ 7] = 0;
+ t[ 8] = 0;
+ t[ 9] = 0;
+ t[10] = 0;
+ t[11] = 0;
+ t[12] = 0;
+ t[13] = 0;
+ t[14] = pw_salt_len * 8;
+ t[15] = 0;
+
+ PUTCHAR (t, pw_salt_len, 0x80);
+
+ /**
+ * md5
+ */
+
+ u32 a = MD5M_A;
+ u32 b = MD5M_B;
+ u32 c = MD5M_C;
+ u32 d = MD5M_D;
+
+ MD5_STEP (MD5_Fo, a, b, c, d, t[ 0], MD5C00, MD5S00);
+ MD5_STEP (MD5_Fo, d, a, b, c, t[ 1], MD5C01, MD5S01);
+ MD5_STEP (MD5_Fo, c, d, a, b, t[ 2], MD5C02, MD5S02);
+ MD5_STEP (MD5_Fo, b, c, d, a, t[ 3], MD5C03, MD5S03);
+ MD5_STEP (MD5_Fo, a, b, c, d, t[ 4], MD5C04, MD5S00);
+ MD5_STEP (MD5_Fo, d, a, b, c, t[ 5], MD5C05, MD5S01);
+ MD5_STEP (MD5_Fo, c, d, a, b, t[ 6], MD5C06, MD5S02);
+ MD5_STEP (MD5_Fo, b, c, d, a, t[ 7], MD5C07, MD5S03);
+ MD5_STEP (MD5_Fo, a, b, c, d, t[ 8], MD5C08, MD5S00);
+ MD5_STEP (MD5_Fo, d, a, b, c, t[ 9], MD5C09, MD5S01);
+ MD5_STEP (MD5_Fo, c, d, a, b, t[10], MD5C0a, MD5S02);
+ MD5_STEP (MD5_Fo, b, c, d, a, t[11], MD5C0b, MD5S03);
+ MD5_STEP (MD5_Fo, a, b, c, d, t[12], MD5C0c, MD5S00);
+ MD5_STEP (MD5_Fo, d, a, b, c, t[13], MD5C0d, MD5S01);
+ MD5_STEP (MD5_Fo, c, d, a, b, t[14], MD5C0e, MD5S02);
+ MD5_STEP (MD5_Fo, b, c, d, a, t[15], MD5C0f, MD5S03);
+
+ MD5_STEP (MD5_Go, a, b, c, d, t[ 1], MD5C10, MD5S10);
+ MD5_STEP (MD5_Go, d, a, b, c, t[ 6], MD5C11, MD5S11);
+ MD5_STEP (MD5_Go, c, d, a, b, t[11], MD5C12, MD5S12);
+ MD5_STEP (MD5_Go, b, c, d, a, t[ 0], MD5C13, MD5S13);
+ MD5_STEP (MD5_Go, a, b, c, d, t[ 5], MD5C14, MD5S10);
+ MD5_STEP (MD5_Go, d, a, b, c, t[10], MD5C15, MD5S11);
+ MD5_STEP (MD5_Go, c, d, a, b, t[15], MD5C16, MD5S12);
+ MD5_STEP (MD5_Go, b, c, d, a, t[ 4], MD5C17, MD5S13);
+ MD5_STEP (MD5_Go, a, b, c, d, t[ 9], MD5C18, MD5S10);
+ MD5_STEP (MD5_Go, d, a, b, c, t[14], MD5C19, MD5S11);
+ MD5_STEP (MD5_Go, c, d, a, b, t[ 3], MD5C1a, MD5S12);
+ MD5_STEP (MD5_Go, b, c, d, a, t[ 8], MD5C1b, MD5S13);
+ MD5_STEP (MD5_Go, a, b, c, d, t[13], MD5C1c, MD5S10);
+ MD5_STEP (MD5_Go, d, a, b, c, t[ 2], MD5C1d, MD5S11);
+ MD5_STEP (MD5_Go, c, d, a, b, t[ 7], MD5C1e, MD5S12);
+ MD5_STEP (MD5_Go, b, c, d, a, t[12], MD5C1f, MD5S13);
+
+ MD5_STEP (MD5_H , a, b, c, d, t[ 5], MD5C20, MD5S20);
+ MD5_STEP (MD5_H , d, a, b, c, t[ 8], MD5C21, MD5S21);
+ MD5_STEP (MD5_H , c, d, a, b, t[11], MD5C22, MD5S22);
+ MD5_STEP (MD5_H , b, c, d, a, t[14], MD5C23, MD5S23);
+ MD5_STEP (MD5_H , a, b, c, d, t[ 1], MD5C24, MD5S20);
+ MD5_STEP (MD5_H , d, a, b, c, t[ 4], MD5C25, MD5S21);
+ MD5_STEP (MD5_H , c, d, a, b, t[ 7], MD5C26, MD5S22);
+ MD5_STEP (MD5_H , b, c, d, a, t[10], MD5C27, MD5S23);
+ MD5_STEP (MD5_H , a, b, c, d, t[13], MD5C28, MD5S20);
+ MD5_STEP (MD5_H , d, a, b, c, t[ 0], MD5C29, MD5S21);
+ MD5_STEP (MD5_H , c, d, a, b, t[ 3], MD5C2a, MD5S22);
+ MD5_STEP (MD5_H , b, c, d, a, t[ 6], MD5C2b, MD5S23);
+ MD5_STEP (MD5_H , a, b, c, d, t[ 9], MD5C2c, MD5S20);
+ MD5_STEP (MD5_H , d, a, b, c, t[12], MD5C2d, MD5S21);
+ MD5_STEP (MD5_H , c, d, a, b, t[15], MD5C2e, MD5S22);
+ MD5_STEP (MD5_H , b, c, d, a, t[ 2], MD5C2f, MD5S23);
+
+ MD5_STEP (MD5_I , a, b, c, d, t[ 0], MD5C30, MD5S30);
+ MD5_STEP (MD5_I , d, a, b, c, t[ 7], MD5C31, MD5S31);
+ MD5_STEP (MD5_I , c, d, a, b, t[14], MD5C32, MD5S32);
+ MD5_STEP (MD5_I , b, c, d, a, t[ 5], MD5C33, MD5S33);
+ MD5_STEP (MD5_I , a, b, c, d, t[12], MD5C34, MD5S30);
+ MD5_STEP (MD5_I , d, a, b, c, t[ 3], MD5C35, MD5S31);
+ MD5_STEP (MD5_I , c, d, a, b, t[10], MD5C36, MD5S32);
+ MD5_STEP (MD5_I , b, c, d, a, t[ 1], MD5C37, MD5S33);
+ MD5_STEP (MD5_I , a, b, c, d, t[ 8], MD5C38, MD5S30);
+ MD5_STEP (MD5_I , d, a, b, c, t[15], MD5C39, MD5S31);
+ MD5_STEP (MD5_I , c, d, a, b, t[ 6], MD5C3a, MD5S32);
+ MD5_STEP (MD5_I , b, c, d, a, t[13], MD5C3b, MD5S33);
+ MD5_STEP (MD5_I , a, b, c, d, t[ 4], MD5C3c, MD5S30);
+ MD5_STEP (MD5_I , d, a, b, c, t[11], MD5C3d, MD5S31);
+ MD5_STEP (MD5_I , c, d, a, b, t[ 2], MD5C3e, MD5S32);
+ MD5_STEP (MD5_I , b, c, d, a, t[ 9], MD5C3f, MD5S33);
+
+ a += MD5M_A;
+ b += MD5M_B;
+ c += MD5M_C;
+ d += MD5M_D;
+
+ const u32 sum20 = walld0rf_magic (w0, pw_len, salt_buf0, salt_len, a, b, c, d, t);
+
+ SETSHIFTEDINT (t, sum20, 0x80);
+
+ t[14] = sum20 * 8;
+
+ a = MD5M_A;
+ b = MD5M_B;
+ c = MD5M_C;
+ d = MD5M_D;
+
+ MD5_STEP (MD5_Fo, a, b, c, d, t[ 0], MD5C00, MD5S00);
+ MD5_STEP (MD5_Fo, d, a, b, c, t[ 1], MD5C01, MD5S01);
+ MD5_STEP (MD5_Fo, c, d, a, b, t[ 2], MD5C02, MD5S02);
+ MD5_STEP (MD5_Fo, b, c, d, a, t[ 3], MD5C03, MD5S03);
+ MD5_STEP (MD5_Fo, a, b, c, d, t[ 4], MD5C04, MD5S00);
+ MD5_STEP (MD5_Fo, d, a, b, c, t[ 5], MD5C05, MD5S01);
+ MD5_STEP (MD5_Fo, c, d, a, b, t[ 6], MD5C06, MD5S02);
+ MD5_STEP (MD5_Fo, b, c, d, a, t[ 7], MD5C07, MD5S03);
+ MD5_STEP (MD5_Fo, a, b, c, d, t[ 8], MD5C08, MD5S00);
+ MD5_STEP (MD5_Fo, d, a, b, c, t[ 9], MD5C09, MD5S01);
+ MD5_STEP (MD5_Fo, c, d, a, b, t[10], MD5C0a, MD5S02);
+ MD5_STEP (MD5_Fo, b, c, d, a, t[11], MD5C0b, MD5S03);
+ MD5_STEP (MD5_Fo, a, b, c, d, t[12], MD5C0c, MD5S00);
+ MD5_STEP (MD5_Fo, d, a, b, c, t[13], MD5C0d, MD5S01);
+ MD5_STEP (MD5_Fo, c, d, a, b, t[14], MD5C0e, MD5S02);
+ MD5_STEP (MD5_Fo, b, c, d, a, t[15], MD5C0f, MD5S03);
+
+ MD5_STEP (MD5_Go, a, b, c, d, t[ 1], MD5C10, MD5S10);
+ MD5_STEP (MD5_Go, d, a, b, c, t[ 6], MD5C11, MD5S11);
+ MD5_STEP (MD5_Go, c, d, a, b, t[11], MD5C12, MD5S12);
+ MD5_STEP (MD5_Go, b, c, d, a, t[ 0], MD5C13, MD5S13);
+ MD5_STEP (MD5_Go, a, b, c, d, t[ 5], MD5C14, MD5S10);
+ MD5_STEP (MD5_Go, d, a, b, c, t[10], MD5C15, MD5S11);
+ MD5_STEP (MD5_Go, c, d, a, b, t[15], MD5C16, MD5S12);
+ MD5_STEP (MD5_Go, b, c, d, a, t[ 4], MD5C17, MD5S13);
+ MD5_STEP (MD5_Go, a, b, c, d, t[ 9], MD5C18, MD5S10);
+ MD5_STEP (MD5_Go, d, a, b, c, t[14], MD5C19, MD5S11);
+ MD5_STEP (MD5_Go, c, d, a, b, t[ 3], MD5C1a, MD5S12);
+ MD5_STEP (MD5_Go, b, c, d, a, t[ 8], MD5C1b, MD5S13);
+ MD5_STEP (MD5_Go, a, b, c, d, t[13], MD5C1c, MD5S10);
+ MD5_STEP (MD5_Go, d, a, b, c, t[ 2], MD5C1d, MD5S11);
+ MD5_STEP (MD5_Go, c, d, a, b, t[ 7], MD5C1e, MD5S12);
+ MD5_STEP (MD5_Go, b, c, d, a, t[12], MD5C1f, MD5S13);
+
+ MD5_STEP (MD5_H , a, b, c, d, t[ 5], MD5C20, MD5S20);
+ MD5_STEP (MD5_H , d, a, b, c, t[ 8], MD5C21, MD5S21);
+ MD5_STEP (MD5_H , c, d, a, b, t[11], MD5C22, MD5S22);
+ MD5_STEP (MD5_H , b, c, d, a, t[14], MD5C23, MD5S23);
+ MD5_STEP (MD5_H , a, b, c, d, t[ 1], MD5C24, MD5S20);
+ MD5_STEP (MD5_H , d, a, b, c, t[ 4], MD5C25, MD5S21);
+ MD5_STEP (MD5_H , c, d, a, b, t[ 7], MD5C26, MD5S22);
+ MD5_STEP (MD5_H , b, c, d, a, t[10], MD5C27, MD5S23);
+ MD5_STEP (MD5_H , a, b, c, d, t[13], MD5C28, MD5S20);
+ MD5_STEP (MD5_H , d, a, b, c, t[ 0], MD5C29, MD5S21);
+ MD5_STEP (MD5_H , c, d, a, b, t[ 3], MD5C2a, MD5S22);
+ MD5_STEP (MD5_H , b, c, d, a, t[ 6], MD5C2b, MD5S23);
+ MD5_STEP (MD5_H , a, b, c, d, t[ 9], MD5C2c, MD5S20);
+ MD5_STEP (MD5_H , d, a, b, c, t[12], MD5C2d, MD5S21);
+ MD5_STEP (MD5_H , c, d, a, b, t[15], MD5C2e, MD5S22);
+ MD5_STEP (MD5_H , b, c, d, a, t[ 2], MD5C2f, MD5S23);
+
+ MD5_STEP (MD5_I , a, b, c, d, t[ 0], MD5C30, MD5S30);
+ MD5_STEP (MD5_I , d, a, b, c, t[ 7], MD5C31, MD5S31);
+ MD5_STEP (MD5_I , c, d, a, b, t[14], MD5C32, MD5S32);
+ MD5_STEP (MD5_I , b, c, d, a, t[ 5], MD5C33, MD5S33);
+ MD5_STEP (MD5_I , a, b, c, d, t[12], MD5C34, MD5S30);
+ MD5_STEP (MD5_I , d, a, b, c, t[ 3], MD5C35, MD5S31);
+ MD5_STEP (MD5_I , c, d, a, b, t[10], MD5C36, MD5S32);
+ MD5_STEP (MD5_I , b, c, d, a, t[ 1], MD5C37, MD5S33);
+ MD5_STEP (MD5_I , a, b, c, d, t[ 8], MD5C38, MD5S30);
+ MD5_STEP (MD5_I , d, a, b, c, t[15], MD5C39, MD5S31);
+ MD5_STEP (MD5_I , c, d, a, b, t[ 6], MD5C3a, MD5S32);
+ MD5_STEP (MD5_I , b, c, d, a, t[13], MD5C3b, MD5S33);
+ MD5_STEP (MD5_I , a, b, c, d, t[ 4], MD5C3c, MD5S30);
+ MD5_STEP (MD5_I , d, a, b, c, t[11], MD5C3d, MD5S31);
+ MD5_STEP (MD5_I , c, d, a, b, t[ 2], MD5C3e, MD5S32);
+ MD5_STEP (MD5_I , b, c, d, a, t[ 9], MD5C3f, MD5S33);
+
+ a += MD5M_A;
+ b += MD5M_B;
+ c += MD5M_C;
+ d += MD5M_D;
+
+ a ^= c;
+ b ^= d;
+
+ const u32 r0 = a;
+ const u32 r1 = b;
+ const u32 r2 = 0;
+ const u32 r3 = 0;
+
+ #include COMPARE_S
+ }
+}
+
+__kernel void __attribute__((reqd_work_group_size (64, 1, 1))) m07700_s08 (__global pw_t *pws, __global gpu_rule_t *rules_buf, __global comb_t *combs_buf, __global bf_t *bfs_buf, __global void *tmps, __global void *hooks, __global u32 *bitmaps_buf_s1_a, __global u32 *bitmaps_buf_s1_b, __global u32 *bitmaps_buf_s1_c, __global u32 *bitmaps_buf_s1_d, __global u32 *bitmaps_buf_s2_a, __global u32 *bitmaps_buf_s2_b, __global u32 *bitmaps_buf_s2_c, __global u32 *bitmaps_buf_s2_d, __global plain_t *plains_buf, __global digest_t *digests_buf, __global u32 *hashes_shown, __global salt_t *salt_bufs, __global void *esalt_bufs, __global u32 *d_return_buf, __global u32 *d_scryptV_buf, const u32 bitmap_mask, const u32 bitmap_shift1, const u32 bitmap_shift2, const u32 salt_pos, const u32 loop_pos, const u32 loop_cnt, const u32 combs_cnt, const u32 digests_cnt, const u32 digests_offset, const u32 combs_mode, const u32 gid_max)
+{
+}
+
+__kernel void __attribute__((reqd_work_group_size (64, 1, 1))) m07700_s16 (__global pw_t *pws, __global gpu_rule_t *rules_buf, __global comb_t *combs_buf, __global bf_t *bfs_buf, __global void *tmps, __global void *hooks, __global u32 *bitmaps_buf_s1_a, __global u32 *bitmaps_buf_s1_b, __global u32 *bitmaps_buf_s1_c, __global u32 *bitmaps_buf_s1_d, __global u32 *bitmaps_buf_s2_a, __global u32 *bitmaps_buf_s2_b, __global u32 *bitmaps_buf_s2_c, __global u32 *bitmaps_buf_s2_d, __global plain_t *plains_buf, __global digest_t *digests_buf, __global u32 *hashes_shown, __global salt_t *salt_bufs, __global void *esalt_bufs, __global u32 *d_return_buf, __global u32 *d_scryptV_buf, const u32 bitmap_mask, const u32 bitmap_shift1, const u32 bitmap_shift2, const u32 salt_pos, const u32 loop_pos, const u32 loop_cnt, const u32 combs_cnt, const u32 digests_cnt, const u32 digests_offset, const u32 combs_mode, const u32 gid_max)
+{
+}