2 * Author......: Jens Steube <jens.steube@gmail.com>
10 #include "include/constants.h"
11 #include "include/kernel_vendor.h"
18 #include "include/kernel_functions.c"
19 #include "OpenCL/types_ocl.c"
20 #include "OpenCL/common.c"
21 #include "OpenCL/simd.c"
23 static void m04900m (u32 w0[4], u32 w1[4], u32 w2[4], u32 w3[4], const u32 pw_len, __global pw_t *pws, __global kernel_rule_t *rules_buf, __global comb_t *combs_buf, __global bf_t *bfs_buf, __global void *tmps, __global void *hooks, __global u32 *bitmaps_buf_s1_a, __global u32 *bitmaps_buf_s1_b, __global u32 *bitmaps_buf_s1_c, __global u32 *bitmaps_buf_s1_d, __global u32 *bitmaps_buf_s2_a, __global u32 *bitmaps_buf_s2_b, __global u32 *bitmaps_buf_s2_c, __global u32 *bitmaps_buf_s2_d, __global plain_t *plains_buf, __global digest_t *digests_buf, __global u32 *hashes_shown, __global salt_t *salt_bufs, __global void *esalt_bufs, __global u32 *d_return_buf, __global u32 *d_scryptV_buf, const u32 bitmap_mask, const u32 bitmap_shift1, const u32 bitmap_shift2, const u32 salt_pos, const u32 loop_pos, const u32 loop_cnt, const u32 il_cnt, const u32 digests_cnt, const u32 digests_offset)
29 const u32 gid = get_global_id (0);
30 const u32 lid = get_local_id (0);
38 salt_buf0_t[0] = salt_bufs[salt_pos].salt_buf[0];
39 salt_buf0_t[1] = salt_bufs[salt_pos].salt_buf[1];
40 salt_buf0_t[2] = salt_bufs[salt_pos].salt_buf[2];
41 salt_buf0_t[3] = salt_bufs[salt_pos].salt_buf[3];
45 salt_buf1_t[0] = salt_bufs[salt_pos].salt_buf[4];
46 salt_buf1_t[1] = salt_bufs[salt_pos].salt_buf[5];
47 salt_buf1_t[2] = salt_bufs[salt_pos].salt_buf[6];
48 salt_buf1_t[3] = salt_bufs[salt_pos].salt_buf[7];
64 const u32 salt_len = salt_bufs[salt_pos].salt_len;
66 const u32 pw_salt_len = salt_len + pw_len + salt_len;
68 // first we need to switch the right-hand salt to the correct position (2nd salt)
70 switch_buffer_by_offset_le_S (salt_buf0_t, salt_buf1_t, salt_buf2_t, salt_buf3_t, salt_len + pw_len);
74 salt_buf0[0] = salt_bufs[salt_pos].salt_buf[0];
75 salt_buf0[1] = salt_bufs[salt_pos].salt_buf[1];
76 salt_buf0[2] = salt_bufs[salt_pos].salt_buf[2];
77 salt_buf0[3] = salt_bufs[salt_pos].salt_buf[3];
81 salt_buf1[0] = salt_bufs[salt_pos].salt_buf[4];
82 salt_buf1[1] = salt_bufs[salt_pos].salt_buf[5];
83 salt_buf1[2] = salt_bufs[salt_pos].salt_buf[6];
84 salt_buf1[3] = salt_bufs[salt_pos].salt_buf[7];
100 // concatenate the 1st and 2nd instance of the salt
102 salt_buf0[0] |= salt_buf0_t[0];
103 salt_buf0[1] |= salt_buf0_t[1];
104 salt_buf0[2] |= salt_buf0_t[2];
105 salt_buf0[3] |= salt_buf0_t[3];
107 salt_buf1[0] |= salt_buf1_t[0];
108 salt_buf1[1] |= salt_buf1_t[1];
109 salt_buf1[2] |= salt_buf1_t[2];
110 salt_buf1[3] |= salt_buf1_t[3];
112 salt_buf2[0] |= salt_buf2_t[0];
113 salt_buf2[1] |= salt_buf2_t[1];
114 salt_buf2[2] |= salt_buf2_t[2];
115 salt_buf2[3] |= salt_buf2_t[3];
117 salt_buf3[0] |= salt_buf3_t[0];
118 salt_buf3[1] |= salt_buf3_t[1];
119 salt_buf3[2] |= salt_buf3_t[2];
120 salt_buf3[3] |= salt_buf3_t[3];
122 append_0x80_4x4_S (salt_buf0, salt_buf1, salt_buf2, salt_buf3, pw_salt_len);
130 for (u32 il_pos = 0; il_pos < il_cnt; il_pos += VECT_SIZE)
132 const u32x w0r = ix_create_bft (bfs_buf, il_pos);
134 const u32x w0lr = w0l | w0r;
165 * put the password after the first salt but before the second salt
168 switch_buffer_by_offset_le (w0_t, w1_t, w2_t, w3_t, salt_len);
170 w0_t[0] |= salt_buf0[0];
171 w0_t[1] |= salt_buf0[1];
172 w0_t[2] |= salt_buf0[2];
173 w0_t[3] |= salt_buf0[3];
174 w1_t[0] |= salt_buf1[0];
175 w1_t[1] |= salt_buf1[1];
176 w1_t[2] |= salt_buf1[2];
177 w1_t[3] |= salt_buf1[3];
178 w2_t[0] |= salt_buf2[0];
179 w2_t[1] |= salt_buf2[1];
180 w2_t[2] |= salt_buf2[2];
181 w2_t[3] |= salt_buf2[3];
182 w3_t[0] |= salt_buf3[0];
183 w3_t[1] |= salt_buf3[1];
184 w3_t[2] |= salt_buf3[2];
186 u32x w0 = swap32 (w0_t[0]);
187 u32x w1 = swap32 (w0_t[1]);
188 u32x w2 = swap32 (w0_t[2]);
189 u32x w3 = swap32 (w0_t[3]);
190 u32x w4 = swap32 (w1_t[0]);
191 u32x w5 = swap32 (w1_t[1]);
192 u32x w6 = swap32 (w1_t[2]);
193 u32x w7 = swap32 (w1_t[3]);
194 u32x w8 = swap32 (w2_t[0]);
195 u32x w9 = swap32 (w2_t[1]);
196 u32x wa = swap32 (w2_t[2]);
197 u32x wb = swap32 (w2_t[3]);
198 u32x wc = swap32 (w3_t[0]);
199 u32x wd = swap32 (w3_t[1]);
200 u32x we = swap32 (w3_t[2]);
201 u32x wf = pw_salt_len * 8;
216 SHA1_STEP (SHA1_F0o, a, b, c, d, e, w0);
217 SHA1_STEP (SHA1_F0o, e, a, b, c, d, w1);
218 SHA1_STEP (SHA1_F0o, d, e, a, b, c, w2);
219 SHA1_STEP (SHA1_F0o, c, d, e, a, b, w3);
220 SHA1_STEP (SHA1_F0o, b, c, d, e, a, w4);
221 SHA1_STEP (SHA1_F0o, a, b, c, d, e, w5);
222 SHA1_STEP (SHA1_F0o, e, a, b, c, d, w6);
223 SHA1_STEP (SHA1_F0o, d, e, a, b, c, w7);
224 SHA1_STEP (SHA1_F0o, c, d, e, a, b, w8);
225 SHA1_STEP (SHA1_F0o, b, c, d, e, a, w9);
226 SHA1_STEP (SHA1_F0o, a, b, c, d, e, wa);
227 SHA1_STEP (SHA1_F0o, e, a, b, c, d, wb);
228 SHA1_STEP (SHA1_F0o, d, e, a, b, c, wc);
229 SHA1_STEP (SHA1_F0o, c, d, e, a, b, wd);
230 SHA1_STEP (SHA1_F0o, b, c, d, e, a, we);
231 SHA1_STEP (SHA1_F0o, a, b, c, d, e, wf);
232 w0 = rotl32 ((wd ^ w8 ^ w2 ^ w0), 1u); SHA1_STEP (SHA1_F0o, e, a, b, c, d, w0);
233 w1 = rotl32 ((we ^ w9 ^ w3 ^ w1), 1u); SHA1_STEP (SHA1_F0o, d, e, a, b, c, w1);
234 w2 = rotl32 ((wf ^ wa ^ w4 ^ w2), 1u); SHA1_STEP (SHA1_F0o, c, d, e, a, b, w2);
235 w3 = rotl32 ((w0 ^ wb ^ w5 ^ w3), 1u); SHA1_STEP (SHA1_F0o, b, c, d, e, a, w3);
240 w4 = rotl32 ((w1 ^ wc ^ w6 ^ w4), 1u); SHA1_STEP (SHA1_F1, a, b, c, d, e, w4);
241 w5 = rotl32 ((w2 ^ wd ^ w7 ^ w5), 1u); SHA1_STEP (SHA1_F1, e, a, b, c, d, w5);
242 w6 = rotl32 ((w3 ^ we ^ w8 ^ w6), 1u); SHA1_STEP (SHA1_F1, d, e, a, b, c, w6);
243 w7 = rotl32 ((w4 ^ wf ^ w9 ^ w7), 1u); SHA1_STEP (SHA1_F1, c, d, e, a, b, w7);
244 w8 = rotl32 ((w5 ^ w0 ^ wa ^ w8), 1u); SHA1_STEP (SHA1_F1, b, c, d, e, a, w8);
245 w9 = rotl32 ((w6 ^ w1 ^ wb ^ w9), 1u); SHA1_STEP (SHA1_F1, a, b, c, d, e, w9);
246 wa = rotl32 ((w7 ^ w2 ^ wc ^ wa), 1u); SHA1_STEP (SHA1_F1, e, a, b, c, d, wa);
247 wb = rotl32 ((w8 ^ w3 ^ wd ^ wb), 1u); SHA1_STEP (SHA1_F1, d, e, a, b, c, wb);
248 wc = rotl32 ((w9 ^ w4 ^ we ^ wc), 1u); SHA1_STEP (SHA1_F1, c, d, e, a, b, wc);
249 wd = rotl32 ((wa ^ w5 ^ wf ^ wd), 1u); SHA1_STEP (SHA1_F1, b, c, d, e, a, wd);
250 we = rotl32 ((wb ^ w6 ^ w0 ^ we), 1u); SHA1_STEP (SHA1_F1, a, b, c, d, e, we);
251 wf = rotl32 ((wc ^ w7 ^ w1 ^ wf), 1u); SHA1_STEP (SHA1_F1, e, a, b, c, d, wf);
252 w0 = rotl32 ((wd ^ w8 ^ w2 ^ w0), 1u); SHA1_STEP (SHA1_F1, d, e, a, b, c, w0);
253 w1 = rotl32 ((we ^ w9 ^ w3 ^ w1), 1u); SHA1_STEP (SHA1_F1, c, d, e, a, b, w1);
254 w2 = rotl32 ((wf ^ wa ^ w4 ^ w2), 1u); SHA1_STEP (SHA1_F1, b, c, d, e, a, w2);
255 w3 = rotl32 ((w0 ^ wb ^ w5 ^ w3), 1u); SHA1_STEP (SHA1_F1, a, b, c, d, e, w3);
256 w4 = rotl32 ((w1 ^ wc ^ w6 ^ w4), 1u); SHA1_STEP (SHA1_F1, e, a, b, c, d, w4);
257 w5 = rotl32 ((w2 ^ wd ^ w7 ^ w5), 1u); SHA1_STEP (SHA1_F1, d, e, a, b, c, w5);
258 w6 = rotl32 ((w3 ^ we ^ w8 ^ w6), 1u); SHA1_STEP (SHA1_F1, c, d, e, a, b, w6);
259 w7 = rotl32 ((w4 ^ wf ^ w9 ^ w7), 1u); SHA1_STEP (SHA1_F1, b, c, d, e, a, w7);
264 w8 = rotl32 ((w5 ^ w0 ^ wa ^ w8), 1u); SHA1_STEP (SHA1_F2o, a, b, c, d, e, w8);
265 w9 = rotl32 ((w6 ^ w1 ^ wb ^ w9), 1u); SHA1_STEP (SHA1_F2o, e, a, b, c, d, w9);
266 wa = rotl32 ((w7 ^ w2 ^ wc ^ wa), 1u); SHA1_STEP (SHA1_F2o, d, e, a, b, c, wa);
267 wb = rotl32 ((w8 ^ w3 ^ wd ^ wb), 1u); SHA1_STEP (SHA1_F2o, c, d, e, a, b, wb);
268 wc = rotl32 ((w9 ^ w4 ^ we ^ wc), 1u); SHA1_STEP (SHA1_F2o, b, c, d, e, a, wc);
269 wd = rotl32 ((wa ^ w5 ^ wf ^ wd), 1u); SHA1_STEP (SHA1_F2o, a, b, c, d, e, wd);
270 we = rotl32 ((wb ^ w6 ^ w0 ^ we), 1u); SHA1_STEP (SHA1_F2o, e, a, b, c, d, we);
271 wf = rotl32 ((wc ^ w7 ^ w1 ^ wf), 1u); SHA1_STEP (SHA1_F2o, d, e, a, b, c, wf);
272 w0 = rotl32 ((wd ^ w8 ^ w2 ^ w0), 1u); SHA1_STEP (SHA1_F2o, c, d, e, a, b, w0);
273 w1 = rotl32 ((we ^ w9 ^ w3 ^ w1), 1u); SHA1_STEP (SHA1_F2o, b, c, d, e, a, w1);
274 w2 = rotl32 ((wf ^ wa ^ w4 ^ w2), 1u); SHA1_STEP (SHA1_F2o, a, b, c, d, e, w2);
275 w3 = rotl32 ((w0 ^ wb ^ w5 ^ w3), 1u); SHA1_STEP (SHA1_F2o, e, a, b, c, d, w3);
276 w4 = rotl32 ((w1 ^ wc ^ w6 ^ w4), 1u); SHA1_STEP (SHA1_F2o, d, e, a, b, c, w4);
277 w5 = rotl32 ((w2 ^ wd ^ w7 ^ w5), 1u); SHA1_STEP (SHA1_F2o, c, d, e, a, b, w5);
278 w6 = rotl32 ((w3 ^ we ^ w8 ^ w6), 1u); SHA1_STEP (SHA1_F2o, b, c, d, e, a, w6);
279 w7 = rotl32 ((w4 ^ wf ^ w9 ^ w7), 1u); SHA1_STEP (SHA1_F2o, a, b, c, d, e, w7);
280 w8 = rotl32 ((w5 ^ w0 ^ wa ^ w8), 1u); SHA1_STEP (SHA1_F2o, e, a, b, c, d, w8);
281 w9 = rotl32 ((w6 ^ w1 ^ wb ^ w9), 1u); SHA1_STEP (SHA1_F2o, d, e, a, b, c, w9);
282 wa = rotl32 ((w7 ^ w2 ^ wc ^ wa), 1u); SHA1_STEP (SHA1_F2o, c, d, e, a, b, wa);
283 wb = rotl32 ((w8 ^ w3 ^ wd ^ wb), 1u); SHA1_STEP (SHA1_F2o, b, c, d, e, a, wb);
288 wc = rotl32 ((w9 ^ w4 ^ we ^ wc), 1u); SHA1_STEP (SHA1_F1, a, b, c, d, e, wc);
289 wd = rotl32 ((wa ^ w5 ^ wf ^ wd), 1u); SHA1_STEP (SHA1_F1, e, a, b, c, d, wd);
290 we = rotl32 ((wb ^ w6 ^ w0 ^ we), 1u); SHA1_STEP (SHA1_F1, d, e, a, b, c, we);
291 wf = rotl32 ((wc ^ w7 ^ w1 ^ wf), 1u); SHA1_STEP (SHA1_F1, c, d, e, a, b, wf);
292 w0 = rotl32 ((wd ^ w8 ^ w2 ^ w0), 1u); SHA1_STEP (SHA1_F1, b, c, d, e, a, w0);
293 w1 = rotl32 ((we ^ w9 ^ w3 ^ w1), 1u); SHA1_STEP (SHA1_F1, a, b, c, d, e, w1);
294 w2 = rotl32 ((wf ^ wa ^ w4 ^ w2), 1u); SHA1_STEP (SHA1_F1, e, a, b, c, d, w2);
295 w3 = rotl32 ((w0 ^ wb ^ w5 ^ w3), 1u); SHA1_STEP (SHA1_F1, d, e, a, b, c, w3);
296 w4 = rotl32 ((w1 ^ wc ^ w6 ^ w4), 1u); SHA1_STEP (SHA1_F1, c, d, e, a, b, w4);
297 w5 = rotl32 ((w2 ^ wd ^ w7 ^ w5), 1u); SHA1_STEP (SHA1_F1, b, c, d, e, a, w5);
298 w6 = rotl32 ((w3 ^ we ^ w8 ^ w6), 1u); SHA1_STEP (SHA1_F1, a, b, c, d, e, w6);
299 w7 = rotl32 ((w4 ^ wf ^ w9 ^ w7), 1u); SHA1_STEP (SHA1_F1, e, a, b, c, d, w7);
300 w8 = rotl32 ((w5 ^ w0 ^ wa ^ w8), 1u); SHA1_STEP (SHA1_F1, d, e, a, b, c, w8);
301 w9 = rotl32 ((w6 ^ w1 ^ wb ^ w9), 1u); SHA1_STEP (SHA1_F1, c, d, e, a, b, w9);
302 wa = rotl32 ((w7 ^ w2 ^ wc ^ wa), 1u); SHA1_STEP (SHA1_F1, b, c, d, e, a, wa);
303 wb = rotl32 ((w8 ^ w3 ^ wd ^ wb), 1u); SHA1_STEP (SHA1_F1, a, b, c, d, e, wb);
304 wc = rotl32 ((w9 ^ w4 ^ we ^ wc), 1u); SHA1_STEP (SHA1_F1, e, a, b, c, d, wc);
305 wd = rotl32 ((wa ^ w5 ^ wf ^ wd), 1u); SHA1_STEP (SHA1_F1, d, e, a, b, c, wd);
306 we = rotl32 ((wb ^ w6 ^ w0 ^ we), 1u); SHA1_STEP (SHA1_F1, c, d, e, a, b, we);
307 wf = rotl32 ((wc ^ w7 ^ w1 ^ wf), 1u); SHA1_STEP (SHA1_F1, b, c, d, e, a, wf);
309 COMPARE_M_SIMD (d, e, c, b);
313 static void m04900s (u32 w0[4], u32 w1[4], u32 w2[4], u32 w3[4], const u32 pw_len, __global pw_t *pws, __global kernel_rule_t *rules_buf, __global comb_t *combs_buf, __global bf_t *bfs_buf, __global void *tmps, __global void *hooks, __global u32 *bitmaps_buf_s1_a, __global u32 *bitmaps_buf_s1_b, __global u32 *bitmaps_buf_s1_c, __global u32 *bitmaps_buf_s1_d, __global u32 *bitmaps_buf_s2_a, __global u32 *bitmaps_buf_s2_b, __global u32 *bitmaps_buf_s2_c, __global u32 *bitmaps_buf_s2_d, __global plain_t *plains_buf, __global digest_t *digests_buf, __global u32 *hashes_shown, __global salt_t *salt_bufs, __global void *esalt_bufs, __global u32 *d_return_buf, __global u32 *d_scryptV_buf, const u32 bitmap_mask, const u32 bitmap_shift1, const u32 bitmap_shift2, const u32 salt_pos, const u32 loop_pos, const u32 loop_cnt, const u32 il_cnt, const u32 digests_cnt, const u32 digests_offset)
319 const u32 gid = get_global_id (0);
320 const u32 lid = get_local_id (0);
326 const u32 search[4] =
328 digests_buf[digests_offset].digest_buf[DGST_R0],
329 digests_buf[digests_offset].digest_buf[DGST_R1],
330 digests_buf[digests_offset].digest_buf[DGST_R2],
331 digests_buf[digests_offset].digest_buf[DGST_R3]
338 const u32 e_rev = rotl32_S (search[1], 2u);
346 salt_buf0_t[0] = salt_bufs[salt_pos].salt_buf[0];
347 salt_buf0_t[1] = salt_bufs[salt_pos].salt_buf[1];
348 salt_buf0_t[2] = salt_bufs[salt_pos].salt_buf[2];
349 salt_buf0_t[3] = salt_bufs[salt_pos].salt_buf[3];
353 salt_buf1_t[0] = salt_bufs[salt_pos].salt_buf[4];
354 salt_buf1_t[1] = salt_bufs[salt_pos].salt_buf[5];
355 salt_buf1_t[2] = salt_bufs[salt_pos].salt_buf[6];
356 salt_buf1_t[3] = salt_bufs[salt_pos].salt_buf[7];
372 const u32 salt_len = salt_bufs[salt_pos].salt_len;
374 const u32 pw_salt_len = salt_len + pw_len + salt_len;
376 // first we need to switch the right-hand salt to the correct position (2nd salt)
378 switch_buffer_by_offset_le_S (salt_buf0_t, salt_buf1_t, salt_buf2_t, salt_buf3_t, salt_len + pw_len);
382 salt_buf0[0] = salt_bufs[salt_pos].salt_buf[0];
383 salt_buf0[1] = salt_bufs[salt_pos].salt_buf[1];
384 salt_buf0[2] = salt_bufs[salt_pos].salt_buf[2];
385 salt_buf0[3] = salt_bufs[salt_pos].salt_buf[3];
389 salt_buf1[0] = salt_bufs[salt_pos].salt_buf[4];
390 salt_buf1[1] = salt_bufs[salt_pos].salt_buf[5];
391 salt_buf1[2] = salt_bufs[salt_pos].salt_buf[6];
392 salt_buf1[3] = salt_bufs[salt_pos].salt_buf[7];
408 // concatenate the 1st and 2nd instance of the salt
410 salt_buf0[0] |= salt_buf0_t[0];
411 salt_buf0[1] |= salt_buf0_t[1];
412 salt_buf0[2] |= salt_buf0_t[2];
413 salt_buf0[3] |= salt_buf0_t[3];
415 salt_buf1[0] |= salt_buf1_t[0];
416 salt_buf1[1] |= salt_buf1_t[1];
417 salt_buf1[2] |= salt_buf1_t[2];
418 salt_buf1[3] |= salt_buf1_t[3];
420 salt_buf2[0] |= salt_buf2_t[0];
421 salt_buf2[1] |= salt_buf2_t[1];
422 salt_buf2[2] |= salt_buf2_t[2];
423 salt_buf2[3] |= salt_buf2_t[3];
425 salt_buf3[0] |= salt_buf3_t[0];
426 salt_buf3[1] |= salt_buf3_t[1];
427 salt_buf3[2] |= salt_buf3_t[2];
428 salt_buf3[3] |= salt_buf3_t[3];
430 append_0x80_4x4_S (salt_buf0, salt_buf1, salt_buf2, salt_buf3, pw_salt_len);
438 for (u32 il_pos = 0; il_pos < il_cnt; il_pos += VECT_SIZE)
440 const u32x w0r = ix_create_bft (bfs_buf, il_pos);
442 const u32x w0lr = w0l | w0r;
473 * put the password after the first salt but before the second salt
476 switch_buffer_by_offset_le (w0_t, w1_t, w2_t, w3_t, salt_len);
478 w0_t[0] |= salt_buf0[0];
479 w0_t[1] |= salt_buf0[1];
480 w0_t[2] |= salt_buf0[2];
481 w0_t[3] |= salt_buf0[3];
482 w1_t[0] |= salt_buf1[0];
483 w1_t[1] |= salt_buf1[1];
484 w1_t[2] |= salt_buf1[2];
485 w1_t[3] |= salt_buf1[3];
486 w2_t[0] |= salt_buf2[0];
487 w2_t[1] |= salt_buf2[1];
488 w2_t[2] |= salt_buf2[2];
489 w2_t[3] |= salt_buf2[3];
490 w3_t[0] |= salt_buf3[0];
491 w3_t[1] |= salt_buf3[1];
492 w3_t[2] |= salt_buf3[2];
494 u32x w0 = swap32 (w0_t[0]);
495 u32x w1 = swap32 (w0_t[1]);
496 u32x w2 = swap32 (w0_t[2]);
497 u32x w3 = swap32 (w0_t[3]);
498 u32x w4 = swap32 (w1_t[0]);
499 u32x w5 = swap32 (w1_t[1]);
500 u32x w6 = swap32 (w1_t[2]);
501 u32x w7 = swap32 (w1_t[3]);
502 u32x w8 = swap32 (w2_t[0]);
503 u32x w9 = swap32 (w2_t[1]);
504 u32x wa = swap32 (w2_t[2]);
505 u32x wb = swap32 (w2_t[3]);
506 u32x wc = swap32 (w3_t[0]);
507 u32x wd = swap32 (w3_t[1]);
508 u32x we = swap32 (w3_t[2]);
509 u32x wf = pw_salt_len * 8;
524 SHA1_STEP (SHA1_F0o, a, b, c, d, e, w0);
525 SHA1_STEP (SHA1_F0o, e, a, b, c, d, w1);
526 SHA1_STEP (SHA1_F0o, d, e, a, b, c, w2);
527 SHA1_STEP (SHA1_F0o, c, d, e, a, b, w3);
528 SHA1_STEP (SHA1_F0o, b, c, d, e, a, w4);
529 SHA1_STEP (SHA1_F0o, a, b, c, d, e, w5);
530 SHA1_STEP (SHA1_F0o, e, a, b, c, d, w6);
531 SHA1_STEP (SHA1_F0o, d, e, a, b, c, w7);
532 SHA1_STEP (SHA1_F0o, c, d, e, a, b, w8);
533 SHA1_STEP (SHA1_F0o, b, c, d, e, a, w9);
534 SHA1_STEP (SHA1_F0o, a, b, c, d, e, wa);
535 SHA1_STEP (SHA1_F0o, e, a, b, c, d, wb);
536 SHA1_STEP (SHA1_F0o, d, e, a, b, c, wc);
537 SHA1_STEP (SHA1_F0o, c, d, e, a, b, wd);
538 SHA1_STEP (SHA1_F0o, b, c, d, e, a, we);
539 SHA1_STEP (SHA1_F0o, a, b, c, d, e, wf);
540 w0 = rotl32 ((wd ^ w8 ^ w2 ^ w0), 1u); SHA1_STEP (SHA1_F0o, e, a, b, c, d, w0);
541 w1 = rotl32 ((we ^ w9 ^ w3 ^ w1), 1u); SHA1_STEP (SHA1_F0o, d, e, a, b, c, w1);
542 w2 = rotl32 ((wf ^ wa ^ w4 ^ w2), 1u); SHA1_STEP (SHA1_F0o, c, d, e, a, b, w2);
543 w3 = rotl32 ((w0 ^ wb ^ w5 ^ w3), 1u); SHA1_STEP (SHA1_F0o, b, c, d, e, a, w3);
548 w4 = rotl32 ((w1 ^ wc ^ w6 ^ w4), 1u); SHA1_STEP (SHA1_F1, a, b, c, d, e, w4);
549 w5 = rotl32 ((w2 ^ wd ^ w7 ^ w5), 1u); SHA1_STEP (SHA1_F1, e, a, b, c, d, w5);
550 w6 = rotl32 ((w3 ^ we ^ w8 ^ w6), 1u); SHA1_STEP (SHA1_F1, d, e, a, b, c, w6);
551 w7 = rotl32 ((w4 ^ wf ^ w9 ^ w7), 1u); SHA1_STEP (SHA1_F1, c, d, e, a, b, w7);
552 w8 = rotl32 ((w5 ^ w0 ^ wa ^ w8), 1u); SHA1_STEP (SHA1_F1, b, c, d, e, a, w8);
553 w9 = rotl32 ((w6 ^ w1 ^ wb ^ w9), 1u); SHA1_STEP (SHA1_F1, a, b, c, d, e, w9);
554 wa = rotl32 ((w7 ^ w2 ^ wc ^ wa), 1u); SHA1_STEP (SHA1_F1, e, a, b, c, d, wa);
555 wb = rotl32 ((w8 ^ w3 ^ wd ^ wb), 1u); SHA1_STEP (SHA1_F1, d, e, a, b, c, wb);
556 wc = rotl32 ((w9 ^ w4 ^ we ^ wc), 1u); SHA1_STEP (SHA1_F1, c, d, e, a, b, wc);
557 wd = rotl32 ((wa ^ w5 ^ wf ^ wd), 1u); SHA1_STEP (SHA1_F1, b, c, d, e, a, wd);
558 we = rotl32 ((wb ^ w6 ^ w0 ^ we), 1u); SHA1_STEP (SHA1_F1, a, b, c, d, e, we);
559 wf = rotl32 ((wc ^ w7 ^ w1 ^ wf), 1u); SHA1_STEP (SHA1_F1, e, a, b, c, d, wf);
560 w0 = rotl32 ((wd ^ w8 ^ w2 ^ w0), 1u); SHA1_STEP (SHA1_F1, d, e, a, b, c, w0);
561 w1 = rotl32 ((we ^ w9 ^ w3 ^ w1), 1u); SHA1_STEP (SHA1_F1, c, d, e, a, b, w1);
562 w2 = rotl32 ((wf ^ wa ^ w4 ^ w2), 1u); SHA1_STEP (SHA1_F1, b, c, d, e, a, w2);
563 w3 = rotl32 ((w0 ^ wb ^ w5 ^ w3), 1u); SHA1_STEP (SHA1_F1, a, b, c, d, e, w3);
564 w4 = rotl32 ((w1 ^ wc ^ w6 ^ w4), 1u); SHA1_STEP (SHA1_F1, e, a, b, c, d, w4);
565 w5 = rotl32 ((w2 ^ wd ^ w7 ^ w5), 1u); SHA1_STEP (SHA1_F1, d, e, a, b, c, w5);
566 w6 = rotl32 ((w3 ^ we ^ w8 ^ w6), 1u); SHA1_STEP (SHA1_F1, c, d, e, a, b, w6);
567 w7 = rotl32 ((w4 ^ wf ^ w9 ^ w7), 1u); SHA1_STEP (SHA1_F1, b, c, d, e, a, w7);
572 w8 = rotl32 ((w5 ^ w0 ^ wa ^ w8), 1u); SHA1_STEP (SHA1_F2o, a, b, c, d, e, w8);
573 w9 = rotl32 ((w6 ^ w1 ^ wb ^ w9), 1u); SHA1_STEP (SHA1_F2o, e, a, b, c, d, w9);
574 wa = rotl32 ((w7 ^ w2 ^ wc ^ wa), 1u); SHA1_STEP (SHA1_F2o, d, e, a, b, c, wa);
575 wb = rotl32 ((w8 ^ w3 ^ wd ^ wb), 1u); SHA1_STEP (SHA1_F2o, c, d, e, a, b, wb);
576 wc = rotl32 ((w9 ^ w4 ^ we ^ wc), 1u); SHA1_STEP (SHA1_F2o, b, c, d, e, a, wc);
577 wd = rotl32 ((wa ^ w5 ^ wf ^ wd), 1u); SHA1_STEP (SHA1_F2o, a, b, c, d, e, wd);
578 we = rotl32 ((wb ^ w6 ^ w0 ^ we), 1u); SHA1_STEP (SHA1_F2o, e, a, b, c, d, we);
579 wf = rotl32 ((wc ^ w7 ^ w1 ^ wf), 1u); SHA1_STEP (SHA1_F2o, d, e, a, b, c, wf);
580 w0 = rotl32 ((wd ^ w8 ^ w2 ^ w0), 1u); SHA1_STEP (SHA1_F2o, c, d, e, a, b, w0);
581 w1 = rotl32 ((we ^ w9 ^ w3 ^ w1), 1u); SHA1_STEP (SHA1_F2o, b, c, d, e, a, w1);
582 w2 = rotl32 ((wf ^ wa ^ w4 ^ w2), 1u); SHA1_STEP (SHA1_F2o, a, b, c, d, e, w2);
583 w3 = rotl32 ((w0 ^ wb ^ w5 ^ w3), 1u); SHA1_STEP (SHA1_F2o, e, a, b, c, d, w3);
584 w4 = rotl32 ((w1 ^ wc ^ w6 ^ w4), 1u); SHA1_STEP (SHA1_F2o, d, e, a, b, c, w4);
585 w5 = rotl32 ((w2 ^ wd ^ w7 ^ w5), 1u); SHA1_STEP (SHA1_F2o, c, d, e, a, b, w5);
586 w6 = rotl32 ((w3 ^ we ^ w8 ^ w6), 1u); SHA1_STEP (SHA1_F2o, b, c, d, e, a, w6);
587 w7 = rotl32 ((w4 ^ wf ^ w9 ^ w7), 1u); SHA1_STEP (SHA1_F2o, a, b, c, d, e, w7);
588 w8 = rotl32 ((w5 ^ w0 ^ wa ^ w8), 1u); SHA1_STEP (SHA1_F2o, e, a, b, c, d, w8);
589 w9 = rotl32 ((w6 ^ w1 ^ wb ^ w9), 1u); SHA1_STEP (SHA1_F2o, d, e, a, b, c, w9);
590 wa = rotl32 ((w7 ^ w2 ^ wc ^ wa), 1u); SHA1_STEP (SHA1_F2o, c, d, e, a, b, wa);
591 wb = rotl32 ((w8 ^ w3 ^ wd ^ wb), 1u); SHA1_STEP (SHA1_F2o, b, c, d, e, a, wb);
596 wc = rotl32 ((w9 ^ w4 ^ we ^ wc), 1u); SHA1_STEP (SHA1_F1, a, b, c, d, e, wc);
597 wd = rotl32 ((wa ^ w5 ^ wf ^ wd), 1u); SHA1_STEP (SHA1_F1, e, a, b, c, d, wd);
598 we = rotl32 ((wb ^ w6 ^ w0 ^ we), 1u); SHA1_STEP (SHA1_F1, d, e, a, b, c, we);
599 wf = rotl32 ((wc ^ w7 ^ w1 ^ wf), 1u); SHA1_STEP (SHA1_F1, c, d, e, a, b, wf);
600 w0 = rotl32 ((wd ^ w8 ^ w2 ^ w0), 1u); SHA1_STEP (SHA1_F1, b, c, d, e, a, w0);
601 w1 = rotl32 ((we ^ w9 ^ w3 ^ w1), 1u); SHA1_STEP (SHA1_F1, a, b, c, d, e, w1);
602 w2 = rotl32 ((wf ^ wa ^ w4 ^ w2), 1u); SHA1_STEP (SHA1_F1, e, a, b, c, d, w2);
603 w3 = rotl32 ((w0 ^ wb ^ w5 ^ w3), 1u); SHA1_STEP (SHA1_F1, d, e, a, b, c, w3);
604 w4 = rotl32 ((w1 ^ wc ^ w6 ^ w4), 1u); SHA1_STEP (SHA1_F1, c, d, e, a, b, w4);
605 w5 = rotl32 ((w2 ^ wd ^ w7 ^ w5), 1u); SHA1_STEP (SHA1_F1, b, c, d, e, a, w5);
606 w6 = rotl32 ((w3 ^ we ^ w8 ^ w6), 1u); SHA1_STEP (SHA1_F1, a, b, c, d, e, w6);
607 w7 = rotl32 ((w4 ^ wf ^ w9 ^ w7), 1u); SHA1_STEP (SHA1_F1, e, a, b, c, d, w7);
608 w8 = rotl32 ((w5 ^ w0 ^ wa ^ w8), 1u); SHA1_STEP (SHA1_F1, d, e, a, b, c, w8);
609 w9 = rotl32 ((w6 ^ w1 ^ wb ^ w9), 1u); SHA1_STEP (SHA1_F1, c, d, e, a, b, w9);
610 wa = rotl32 ((w7 ^ w2 ^ wc ^ wa), 1u); SHA1_STEP (SHA1_F1, b, c, d, e, a, wa);
611 wb = rotl32 ((w8 ^ w3 ^ wd ^ wb), 1u); SHA1_STEP (SHA1_F1, a, b, c, d, e, wb);
613 if (MATCHES_NONE_VS (e, e_rev)) continue;
615 wc = rotl32 ((w9 ^ w4 ^ we ^ wc), 1u); SHA1_STEP (SHA1_F1, e, a, b, c, d, wc);
616 wd = rotl32 ((wa ^ w5 ^ wf ^ wd), 1u); SHA1_STEP (SHA1_F1, d, e, a, b, c, wd);
617 we = rotl32 ((wb ^ w6 ^ w0 ^ we), 1u); SHA1_STEP (SHA1_F1, c, d, e, a, b, we);
618 wf = rotl32 ((wc ^ w7 ^ w1 ^ wf), 1u); SHA1_STEP (SHA1_F1, b, c, d, e, a, wf);
620 COMPARE_S_SIMD (d, e, c, b);
624 __kernel void m04900_m04 (__global pw_t *pws, __global kernel_rule_t *rules_buf, __global comb_t *combs_buf, __global bf_t *bfs_buf, __global void *tmps, __global void *hooks, __global u32 *bitmaps_buf_s1_a, __global u32 *bitmaps_buf_s1_b, __global u32 *bitmaps_buf_s1_c, __global u32 *bitmaps_buf_s1_d, __global u32 *bitmaps_buf_s2_a, __global u32 *bitmaps_buf_s2_b, __global u32 *bitmaps_buf_s2_c, __global u32 *bitmaps_buf_s2_d, __global plain_t *plains_buf, __global digest_t *digests_buf, __global u32 *hashes_shown, __global salt_t *salt_bufs, __global void *esalt_bufs, __global u32 *d_return_buf, __global u32 *d_scryptV_buf, const u32 bitmap_mask, const u32 bitmap_shift1, const u32 bitmap_shift2, const u32 salt_pos, const u32 loop_pos, const u32 loop_cnt, const u32 il_cnt, const u32 digests_cnt, const u32 digests_offset, const u32 combs_mode, const u32 gid_max)
630 const u32 gid = get_global_id (0);
632 if (gid >= gid_max) return;
638 const u32 lid = get_local_id (0);
642 w0[0] = pws[gid].i[ 0];
643 w0[1] = pws[gid].i[ 1];
644 w0[2] = pws[gid].i[ 2];
645 w0[3] = pws[gid].i[ 3];
665 w3[2] = pws[gid].i[14];
668 const u32 pw_len = pws[gid].pw_len;
674 m04900m (w0, w1, w2, w3, pw_len, pws, rules_buf, combs_buf, bfs_buf, tmps, hooks, bitmaps_buf_s1_a, bitmaps_buf_s1_b, bitmaps_buf_s1_c, bitmaps_buf_s1_d, bitmaps_buf_s2_a, bitmaps_buf_s2_b, bitmaps_buf_s2_c, bitmaps_buf_s2_d, plains_buf, digests_buf, hashes_shown, salt_bufs, esalt_bufs, d_return_buf, d_scryptV_buf, bitmap_mask, bitmap_shift1, bitmap_shift2, salt_pos, loop_pos, loop_cnt, il_cnt, digests_cnt, digests_offset);
677 __kernel void m04900_m08 (__global pw_t *pws, __global kernel_rule_t *rules_buf, __global comb_t *combs_buf, __global bf_t *bfs_buf, __global void *tmps, __global void *hooks, __global u32 *bitmaps_buf_s1_a, __global u32 *bitmaps_buf_s1_b, __global u32 *bitmaps_buf_s1_c, __global u32 *bitmaps_buf_s1_d, __global u32 *bitmaps_buf_s2_a, __global u32 *bitmaps_buf_s2_b, __global u32 *bitmaps_buf_s2_c, __global u32 *bitmaps_buf_s2_d, __global plain_t *plains_buf, __global digest_t *digests_buf, __global u32 *hashes_shown, __global salt_t *salt_bufs, __global void *esalt_bufs, __global u32 *d_return_buf, __global u32 *d_scryptV_buf, const u32 bitmap_mask, const u32 bitmap_shift1, const u32 bitmap_shift2, const u32 salt_pos, const u32 loop_pos, const u32 loop_cnt, const u32 il_cnt, const u32 digests_cnt, const u32 digests_offset, const u32 combs_mode, const u32 gid_max)
683 const u32 gid = get_global_id (0);
685 if (gid >= gid_max) return;
691 const u32 lid = get_local_id (0);
695 w0[0] = pws[gid].i[ 0];
696 w0[1] = pws[gid].i[ 1];
697 w0[2] = pws[gid].i[ 2];
698 w0[3] = pws[gid].i[ 3];
702 w1[0] = pws[gid].i[ 4];
703 w1[1] = pws[gid].i[ 5];
704 w1[2] = pws[gid].i[ 6];
705 w1[3] = pws[gid].i[ 7];
718 w3[2] = pws[gid].i[14];
721 const u32 pw_len = pws[gid].pw_len;
727 m04900m (w0, w1, w2, w3, pw_len, pws, rules_buf, combs_buf, bfs_buf, tmps, hooks, bitmaps_buf_s1_a, bitmaps_buf_s1_b, bitmaps_buf_s1_c, bitmaps_buf_s1_d, bitmaps_buf_s2_a, bitmaps_buf_s2_b, bitmaps_buf_s2_c, bitmaps_buf_s2_d, plains_buf, digests_buf, hashes_shown, salt_bufs, esalt_bufs, d_return_buf, d_scryptV_buf, bitmap_mask, bitmap_shift1, bitmap_shift2, salt_pos, loop_pos, loop_cnt, il_cnt, digests_cnt, digests_offset);
730 __kernel void m04900_m16 (__global pw_t *pws, __global kernel_rule_t *rules_buf, __global comb_t *combs_buf, __global bf_t *bfs_buf, __global void *tmps, __global void *hooks, __global u32 *bitmaps_buf_s1_a, __global u32 *bitmaps_buf_s1_b, __global u32 *bitmaps_buf_s1_c, __global u32 *bitmaps_buf_s1_d, __global u32 *bitmaps_buf_s2_a, __global u32 *bitmaps_buf_s2_b, __global u32 *bitmaps_buf_s2_c, __global u32 *bitmaps_buf_s2_d, __global plain_t *plains_buf, __global digest_t *digests_buf, __global u32 *hashes_shown, __global salt_t *salt_bufs, __global void *esalt_bufs, __global u32 *d_return_buf, __global u32 *d_scryptV_buf, const u32 bitmap_mask, const u32 bitmap_shift1, const u32 bitmap_shift2, const u32 salt_pos, const u32 loop_pos, const u32 loop_cnt, const u32 il_cnt, const u32 digests_cnt, const u32 digests_offset, const u32 combs_mode, const u32 gid_max)
736 const u32 gid = get_global_id (0);
738 if (gid >= gid_max) return;
744 const u32 lid = get_local_id (0);
748 w0[0] = pws[gid].i[ 0];
749 w0[1] = pws[gid].i[ 1];
750 w0[2] = pws[gid].i[ 2];
751 w0[3] = pws[gid].i[ 3];
755 w1[0] = pws[gid].i[ 4];
756 w1[1] = pws[gid].i[ 5];
757 w1[2] = pws[gid].i[ 6];
758 w1[3] = pws[gid].i[ 7];
762 w2[0] = pws[gid].i[ 8];
763 w2[1] = pws[gid].i[ 9];
764 w2[2] = pws[gid].i[10];
765 w2[3] = pws[gid].i[11];
769 w3[0] = pws[gid].i[12];
770 w3[1] = pws[gid].i[13];
771 w3[2] = pws[gid].i[14];
772 w3[3] = pws[gid].i[15];
774 const u32 pw_len = pws[gid].pw_len;
780 m04900m (w0, w1, w2, w3, pw_len, pws, rules_buf, combs_buf, bfs_buf, tmps, hooks, bitmaps_buf_s1_a, bitmaps_buf_s1_b, bitmaps_buf_s1_c, bitmaps_buf_s1_d, bitmaps_buf_s2_a, bitmaps_buf_s2_b, bitmaps_buf_s2_c, bitmaps_buf_s2_d, plains_buf, digests_buf, hashes_shown, salt_bufs, esalt_bufs, d_return_buf, d_scryptV_buf, bitmap_mask, bitmap_shift1, bitmap_shift2, salt_pos, loop_pos, loop_cnt, il_cnt, digests_cnt, digests_offset);
783 __kernel void m04900_s04 (__global pw_t *pws, __global kernel_rule_t *rules_buf, __global comb_t *combs_buf, __global bf_t *bfs_buf, __global void *tmps, __global void *hooks, __global u32 *bitmaps_buf_s1_a, __global u32 *bitmaps_buf_s1_b, __global u32 *bitmaps_buf_s1_c, __global u32 *bitmaps_buf_s1_d, __global u32 *bitmaps_buf_s2_a, __global u32 *bitmaps_buf_s2_b, __global u32 *bitmaps_buf_s2_c, __global u32 *bitmaps_buf_s2_d, __global plain_t *plains_buf, __global digest_t *digests_buf, __global u32 *hashes_shown, __global salt_t *salt_bufs, __global void *esalt_bufs, __global u32 *d_return_buf, __global u32 *d_scryptV_buf, const u32 bitmap_mask, const u32 bitmap_shift1, const u32 bitmap_shift2, const u32 salt_pos, const u32 loop_pos, const u32 loop_cnt, const u32 il_cnt, const u32 digests_cnt, const u32 digests_offset, const u32 combs_mode, const u32 gid_max)
789 const u32 gid = get_global_id (0);
791 if (gid >= gid_max) return;
797 const u32 lid = get_local_id (0);
801 w0[0] = pws[gid].i[ 0];
802 w0[1] = pws[gid].i[ 1];
803 w0[2] = pws[gid].i[ 2];
804 w0[3] = pws[gid].i[ 3];
824 w3[2] = pws[gid].i[14];
827 const u32 pw_len = pws[gid].pw_len;
833 m04900s (w0, w1, w2, w3, pw_len, pws, rules_buf, combs_buf, bfs_buf, tmps, hooks, bitmaps_buf_s1_a, bitmaps_buf_s1_b, bitmaps_buf_s1_c, bitmaps_buf_s1_d, bitmaps_buf_s2_a, bitmaps_buf_s2_b, bitmaps_buf_s2_c, bitmaps_buf_s2_d, plains_buf, digests_buf, hashes_shown, salt_bufs, esalt_bufs, d_return_buf, d_scryptV_buf, bitmap_mask, bitmap_shift1, bitmap_shift2, salt_pos, loop_pos, loop_cnt, il_cnt, digests_cnt, digests_offset);
836 __kernel void m04900_s08 (__global pw_t *pws, __global kernel_rule_t *rules_buf, __global comb_t *combs_buf, __global bf_t *bfs_buf, __global void *tmps, __global void *hooks, __global u32 *bitmaps_buf_s1_a, __global u32 *bitmaps_buf_s1_b, __global u32 *bitmaps_buf_s1_c, __global u32 *bitmaps_buf_s1_d, __global u32 *bitmaps_buf_s2_a, __global u32 *bitmaps_buf_s2_b, __global u32 *bitmaps_buf_s2_c, __global u32 *bitmaps_buf_s2_d, __global plain_t *plains_buf, __global digest_t *digests_buf, __global u32 *hashes_shown, __global salt_t *salt_bufs, __global void *esalt_bufs, __global u32 *d_return_buf, __global u32 *d_scryptV_buf, const u32 bitmap_mask, const u32 bitmap_shift1, const u32 bitmap_shift2, const u32 salt_pos, const u32 loop_pos, const u32 loop_cnt, const u32 il_cnt, const u32 digests_cnt, const u32 digests_offset, const u32 combs_mode, const u32 gid_max)
842 const u32 gid = get_global_id (0);
844 if (gid >= gid_max) return;
850 const u32 lid = get_local_id (0);
854 w0[0] = pws[gid].i[ 0];
855 w0[1] = pws[gid].i[ 1];
856 w0[2] = pws[gid].i[ 2];
857 w0[3] = pws[gid].i[ 3];
861 w1[0] = pws[gid].i[ 4];
862 w1[1] = pws[gid].i[ 5];
863 w1[2] = pws[gid].i[ 6];
864 w1[3] = pws[gid].i[ 7];
877 w3[2] = pws[gid].i[14];
880 const u32 pw_len = pws[gid].pw_len;
886 m04900s (w0, w1, w2, w3, pw_len, pws, rules_buf, combs_buf, bfs_buf, tmps, hooks, bitmaps_buf_s1_a, bitmaps_buf_s1_b, bitmaps_buf_s1_c, bitmaps_buf_s1_d, bitmaps_buf_s2_a, bitmaps_buf_s2_b, bitmaps_buf_s2_c, bitmaps_buf_s2_d, plains_buf, digests_buf, hashes_shown, salt_bufs, esalt_bufs, d_return_buf, d_scryptV_buf, bitmap_mask, bitmap_shift1, bitmap_shift2, salt_pos, loop_pos, loop_cnt, il_cnt, digests_cnt, digests_offset);
889 __kernel void m04900_s16 (__global pw_t *pws, __global kernel_rule_t *rules_buf, __global comb_t *combs_buf, __global bf_t *bfs_buf, __global void *tmps, __global void *hooks, __global u32 *bitmaps_buf_s1_a, __global u32 *bitmaps_buf_s1_b, __global u32 *bitmaps_buf_s1_c, __global u32 *bitmaps_buf_s1_d, __global u32 *bitmaps_buf_s2_a, __global u32 *bitmaps_buf_s2_b, __global u32 *bitmaps_buf_s2_c, __global u32 *bitmaps_buf_s2_d, __global plain_t *plains_buf, __global digest_t *digests_buf, __global u32 *hashes_shown, __global salt_t *salt_bufs, __global void *esalt_bufs, __global u32 *d_return_buf, __global u32 *d_scryptV_buf, const u32 bitmap_mask, const u32 bitmap_shift1, const u32 bitmap_shift2, const u32 salt_pos, const u32 loop_pos, const u32 loop_cnt, const u32 il_cnt, const u32 digests_cnt, const u32 digests_offset, const u32 combs_mode, const u32 gid_max)
895 const u32 gid = get_global_id (0);
897 if (gid >= gid_max) return;
903 const u32 lid = get_local_id (0);
907 w0[0] = pws[gid].i[ 0];
908 w0[1] = pws[gid].i[ 1];
909 w0[2] = pws[gid].i[ 2];
910 w0[3] = pws[gid].i[ 3];
914 w1[0] = pws[gid].i[ 4];
915 w1[1] = pws[gid].i[ 5];
916 w1[2] = pws[gid].i[ 6];
917 w1[3] = pws[gid].i[ 7];
921 w2[0] = pws[gid].i[ 8];
922 w2[1] = pws[gid].i[ 9];
923 w2[2] = pws[gid].i[10];
924 w2[3] = pws[gid].i[11];
928 w3[0] = pws[gid].i[12];
929 w3[1] = pws[gid].i[13];
930 w3[2] = pws[gid].i[14];
931 w3[3] = pws[gid].i[15];
933 const u32 pw_len = pws[gid].pw_len;
939 m04900s (w0, w1, w2, w3, pw_len, pws, rules_buf, combs_buf, bfs_buf, tmps, hooks, bitmaps_buf_s1_a, bitmaps_buf_s1_b, bitmaps_buf_s1_c, bitmaps_buf_s1_d, bitmaps_buf_s2_a, bitmaps_buf_s2_b, bitmaps_buf_s2_c, bitmaps_buf_s2_d, plains_buf, digests_buf, hashes_shown, salt_bufs, esalt_bufs, d_return_buf, d_scryptV_buf, bitmap_mask, bitmap_shift1, bitmap_shift2, salt_pos, loop_pos, loop_cnt, il_cnt, digests_cnt, digests_offset);