#define _OLDOFFICE34_
+#define NEW_SIMD_CODE
+
#include "include/constants.h"
#include "include/kernel_vendor.h"
#include "include/kernel_functions.c"
#include "OpenCL/types_ocl.c"
#include "OpenCL/common.c"
-
-#define COMPARE_S "OpenCL/check_single_comp4.c"
-#define COMPARE_M "OpenCL/check_multi_comp4.c"
+#include "OpenCL/simd.c"
typedef struct
{
rc4_key->S[j] = tmp;
}
-static void rc4_init_16 (__local RC4_KEY *rc4_key, const u32 data[4])
+static void rc4_init_16 (__local RC4_KEY *rc4_key, const u32x data[4])
{
- u32 v = 0x03020100;
- u32 a = 0x04040404;
+ u32x v = 0x03020100;
+ u32x a = 0x04040404;
__local u32 *ptr = (__local u32 *) rc4_key->S;
{
u32 idx = i * 16;
- u32 v;
+ u32x v;
v = data[0];
}
}
-static u8 rc4_next_16 (__local RC4_KEY *rc4_key, u8 i, u8 j, const u32 in[4], u32 out[4])
+static u8 rc4_next_16 (__local RC4_KEY *rc4_key, u8 i, u8 j, const u32x in[4], u32x out[4])
{
#pragma unroll
for (u32 k = 0; k < 4; k++)
{
- u32 xor4 = 0;
+ u32x xor4 = 0;
u8 idx;
return j;
}
-static void sha1_transform (const u32 w0[4], const u32 w1[4], const u32 w2[4], const u32 w3[4], u32 digest[5])
+static void sha1_transform (const u32x w0[4], const u32x w1[4], const u32x w2[4], const u32x w3[4], u32x digest[5])
{
- u32 A = digest[0];
- u32 B = digest[1];
- u32 C = digest[2];
- u32 D = digest[3];
- u32 E = digest[4];
-
- u32 w0_t = w0[0];
- u32 w1_t = w0[1];
- u32 w2_t = w0[2];
- u32 w3_t = w0[3];
- u32 w4_t = w1[0];
- u32 w5_t = w1[1];
- u32 w6_t = w1[2];
- u32 w7_t = w1[3];
- u32 w8_t = w2[0];
- u32 w9_t = w2[1];
- u32 wa_t = w2[2];
- u32 wb_t = w2[3];
- u32 wc_t = w3[0];
- u32 wd_t = w3[1];
- u32 we_t = w3[2];
- u32 wf_t = w3[3];
+ u32x A = digest[0];
+ u32x B = digest[1];
+ u32x C = digest[2];
+ u32x D = digest[3];
+ u32x E = digest[4];
+
+ u32x w0_t = w0[0];
+ u32x w1_t = w0[1];
+ u32x w2_t = w0[2];
+ u32x w3_t = w0[3];
+ u32x w4_t = w1[0];
+ u32x w5_t = w1[1];
+ u32x w6_t = w1[2];
+ u32x w7_t = w1[3];
+ u32x w8_t = w2[0];
+ u32x w9_t = w2[1];
+ u32x wa_t = w2[2];
+ u32x wb_t = w2[3];
+ u32x wc_t = w3[0];
+ u32x wd_t = w3[1];
+ u32x we_t = w3[2];
+ u32x wf_t = w3[3];
#undef K
#define K SHA1C00
u32 w0l = w0[0];
- for (u32 il_pos = 0; il_pos < bfs_cnt; il_pos++)
+ for (u32 il_pos = 0; il_pos < bfs_cnt; il_pos += VECT_SIZE)
{
- const u32 w0r = bfs_buf[il_pos].i;
+ const u32x w0r = w0r_create_bft (bfs_buf, il_pos);
- w0[0] = w0l | w0r;
+ const u32x w0lr = w0l | w0r;
- u32 w0_t[4];
- u32 w1_t[4];
- u32 w2_t[4];
- u32 w3_t[4];
+ u32x w0_t[4];
+ u32x w1_t[4];
+ u32x w2_t[4];
+ u32x w3_t[4];
w0_t[0] = salt_buf[0];
w0_t[1] = salt_buf[1];
w0_t[2] = salt_buf[2];
w0_t[3] = salt_buf[3];
- w1_t[0] = w0[0];
+ w1_t[0] = w0lr;
w1_t[1] = w0[1];
w1_t[2] = w0[2];
w1_t[3] = w0[3];
w3_t[2] = 0;
w3_t[3] = pw_salt_len * 8;
- u32 digest[5];
+ u32x digest[5];
digest[0] = SHA1M_A;
digest[1] = SHA1M_B;
sha1_transform (w0_t, w1_t, w2_t, w3_t, digest);
- u32 key[4];
+ u32x key[4];
key[0] = swap32 (digest[0]);
key[1] = swap32 (digest[1]);
rc4_init_16 (rc4_key, key);
- u32 out[4];
+ u32x out[4];
u8 j = rc4_next_16 (rc4_key, 0, 0, encryptedVerifier, out);
rc4_next_16 (rc4_key, 16, j, digest, out);
- const u32 r0 = out[0];
- const u32 r1 = out[1];
- const u32 r2 = out[2];
- const u32 r3 = out[3];
-
- #include COMPARE_M
+ COMPARE_M_SIMD (out[0], out[1], out[2], out[3]);
}
}
u32 w0l = w0[0];
- for (u32 il_pos = 0; il_pos < bfs_cnt; il_pos++)
+ for (u32 il_pos = 0; il_pos < bfs_cnt; il_pos += VECT_SIZE)
{
- const u32 w0r = bfs_buf[il_pos].i;
+ const u32x w0r = w0r_create_bft (bfs_buf, il_pos);
- w0[0] = w0l | w0r;
+ const u32x w0lr = w0l | w0r;
- u32 w0_t[4];
- u32 w1_t[4];
- u32 w2_t[4];
- u32 w3_t[4];
+ u32x w0_t[4];
+ u32x w1_t[4];
+ u32x w2_t[4];
+ u32x w3_t[4];
w0_t[0] = salt_buf[0];
w0_t[1] = salt_buf[1];
w0_t[2] = salt_buf[2];
w0_t[3] = salt_buf[3];
- w1_t[0] = w0[0];
+ w1_t[0] = w0lr;
w1_t[1] = w0[1];
w1_t[2] = w0[2];
w1_t[3] = w0[3];
w3_t[2] = 0;
w3_t[3] = pw_salt_len * 8;
- u32 digest[5];
+ u32x digest[5];
digest[0] = SHA1M_A;
digest[1] = SHA1M_B;
sha1_transform (w0_t, w1_t, w2_t, w3_t, digest);
- u32 key[4];
+ u32x key[4];
key[0] = swap32 (digest[0]);
key[1] = swap32 (digest[1]);
rc4_init_16 (rc4_key, key);
- u32 out[4];
+ u32x out[4];
u8 j = rc4_next_16 (rc4_key, 0, 0, encryptedVerifier, out);
rc4_next_16 (rc4_key, 16, j, digest, out);
- const u32 r0 = out[0];
- const u32 r1 = out[1];
- const u32 r2 = out[2];
- const u32 r3 = out[3];
-
- #include COMPARE_S
+ COMPARE_S_SIMD (out[0], out[1], out[2], out[3]);
}
}