#define _OLDOFFICE01_
-#define NEW_SIMD_CODE
-
#include "include/constants.h"
#include "include/kernel_vendor.h"
rc4_key->S[j] = tmp;
}
-static void rc4_init_16 (__local RC4_KEY *rc4_key, const u32x data[4])
+static void rc4_init_16 (__local RC4_KEY *rc4_key, const u32 data[4])
{
- u32x v = 0x03020100;
- u32x a = 0x04040404;
+ u32 v = 0x03020100;
+ u32 a = 0x04040404;
__local u32 *ptr = (__local u32 *) rc4_key->S;
}
}
-static u8 rc4_next_16 (__local RC4_KEY *rc4_key, u8 i, u8 j, const u32x in[4], u32x out[4])
+static u8 rc4_next_16 (__local RC4_KEY *rc4_key, u8 i, u8 j, const u32 in[4], u32 out[4])
{
#pragma unroll
for (u32 k = 0; k < 4; k++)
return j;
}
-static void md5_transform (const u32x w0[4], const u32x w1[4], const u32x w2[4], const u32x w3[4], u32x digest[4])
+static void md5_transform (const u32 w0[4], const u32 w1[4], const u32 w2[4], const u32 w3[4], u32 digest[4])
{
- u32x a = digest[0];
- u32x b = digest[1];
- u32x c = digest[2];
- u32x d = digest[3];
-
- u32x w0_t = w0[0];
- u32x w1_t = w0[1];
- u32x w2_t = w0[2];
- u32x w3_t = w0[3];
- u32x w4_t = w1[0];
- u32x w5_t = w1[1];
- u32x w6_t = w1[2];
- u32x w7_t = w1[3];
- u32x w8_t = w2[0];
- u32x w9_t = w2[1];
- u32x wa_t = w2[2];
- u32x wb_t = w2[3];
- u32x wc_t = w3[0];
- u32x wd_t = w3[1];
- u32x we_t = w3[2];
- u32x wf_t = w3[3];
+ u32 a = digest[0];
+ u32 b = digest[1];
+ u32 c = digest[2];
+ u32 d = digest[3];
+
+ u32 w0_t = w0[0];
+ u32 w1_t = w0[1];
+ u32 w2_t = w0[2];
+ u32 w3_t = w0[3];
+ u32 w4_t = w1[0];
+ u32 w5_t = w1[1];
+ u32 w6_t = w1[2];
+ u32 w7_t = w1[3];
+ u32 w8_t = w2[0];
+ u32 w9_t = w2[1];
+ u32 wa_t = w2[2];
+ u32 wb_t = w2[3];
+ u32 wc_t = w3[0];
+ u32 wd_t = w3[1];
+ u32 we_t = w3[2];
+ u32 wf_t = w3[3];
MD5_STEP (MD5_Fo, a, b, c, d, w0_t, MD5C00, MD5S00);
MD5_STEP (MD5_Fo, d, a, b, c, w1_t, MD5C01, MD5S01);
for (u32 il_pos = 0; il_pos < bfs_cnt; il_pos += VECT_SIZE)
{
- const u32x w0r = w0r_create_bft (bfs_buf, il_pos);
+ const u32 w0r = w0r_create_bft (bfs_buf, il_pos);
- const u32x w0lr = w0l | w0r;
+ const u32 w0lr = w0l | w0r;
- u32x w0_t[4];
- u32x w1_t[4];
- u32x w2_t[4];
- u32x w3_t[4];
+ u32 w0_t[4];
+ u32 w1_t[4];
+ u32 w2_t[4];
+ u32 w3_t[4];
w0_t[0] = w0lr;
w0_t[1] = w0[1];
w3_t[2] = pw_len * 8;
w3_t[3] = 0;
- u32x digest_t0[4];
- u32x digest_t1[2]; // need only first 5 byte
- u32x digest_t2[2];
- u32x digest_t3[2];
+ u32 digest_t0[4];
+ u32 digest_t1[2]; // need only first 5 byte
+ u32 digest_t2[2];
+ u32 digest_t3[2];
digest_t0[0] = MD5M_A;
digest_t0[1] = MD5M_B;
// prepare 16 * 21 buffer stuff
- u32x digest[4];
+ u32 digest[4];
digest[0] = MD5M_A;
digest[1] = MD5M_B;
// now the RC4 part
- u32x key[4];
+ u32 key[4];
key[0] = digest[0];
key[1] = digest[1];
rc4_init_16 (rc4_key, key);
- u32x out[4];
+ u32 out[4];
u8 j = rc4_next_16 (rc4_key, 0, 0, encryptedVerifier, out);
for (u32 il_pos = 0; il_pos < bfs_cnt; il_pos += VECT_SIZE)
{
- const u32x w0r = w0r_create_bft (bfs_buf, il_pos);
+ const u32 w0r = w0r_create_bft (bfs_buf, il_pos);
- const u32x w0lr = w0l | w0r;
+ const u32 w0lr = w0l | w0r;
- u32x w0_t[4];
- u32x w1_t[4];
- u32x w2_t[4];
- u32x w3_t[4];
+ u32 w0_t[4];
+ u32 w1_t[4];
+ u32 w2_t[4];
+ u32 w3_t[4];
w0_t[0] = w0lr;
w0_t[1] = w0[1];
w3_t[2] = pw_len * 8;
w3_t[3] = 0;
- u32x digest_t0[4];
- u32x digest_t1[2]; // need only first 5 byte
- u32x digest_t2[2];
- u32x digest_t3[2];
+ u32 digest_t0[4];
+ u32 digest_t1[2]; // need only first 5 byte
+ u32 digest_t2[2];
+ u32 digest_t3[2];
digest_t0[0] = MD5M_A;
digest_t0[1] = MD5M_B;
// now the RC4 part
- u32x key[4];
+ u32 key[4];
key[0] = digest[0];
key[1] = digest[1];
rc4_init_16 (rc4_key, key);
- u32x out[4];
+ u32 out[4];
u8 j = rc4_next_16 (rc4_key, 0, 0, encryptedVerifier, out);
#define _OLDOFFICE01_
-#define NEW_SIMD_CODE
-
#include "include/constants.h"
#include "include/kernel_vendor.h"
rc4_key->S[j] = tmp;
}
-static void rc4_init_16 (__local RC4_KEY *rc4_key, const u32x data[4])
+static void rc4_init_16 (__local RC4_KEY *rc4_key, const u32 data[4])
{
- u32x v = 0x03020100;
- u32x a = 0x04040404;
+ u32 v = 0x03020100;
+ u32 a = 0x04040404;
__local u32 *ptr = (__local u32 *) rc4_key->S;
}
}
-static u8 rc4_next_16 (__local RC4_KEY *rc4_key, u8 i, u8 j, const u32x in[4], u32x out[4])
+static u8 rc4_next_16 (__local RC4_KEY *rc4_key, u8 i, u8 j, const u32 in[4], u32 out[4])
{
#pragma unroll
for (u32 k = 0; k < 4; k++)
return j;
}
-static void md5_transform (const u32x w0[4], const u32x w1[4], const u32x w2[4], const u32x w3[4], u32x digest[4])
+static void md5_transform (const u32 w0[4], const u32 w1[4], const u32 w2[4], const u32 w3[4], u32 digest[4])
{
- u32x a = digest[0];
- u32x b = digest[1];
- u32x c = digest[2];
- u32x d = digest[3];
-
- u32x w0_t = w0[0];
- u32x w1_t = w0[1];
- u32x w2_t = w0[2];
- u32x w3_t = w0[3];
- u32x w4_t = w1[0];
- u32x w5_t = w1[1];
- u32x w6_t = w1[2];
- u32x w7_t = w1[3];
- u32x w8_t = w2[0];
- u32x w9_t = w2[1];
- u32x wa_t = w2[2];
- u32x wb_t = w2[3];
- u32x wc_t = w3[0];
- u32x wd_t = w3[1];
- u32x we_t = w3[2];
- u32x wf_t = w3[3];
+ u32 a = digest[0];
+ u32 b = digest[1];
+ u32 c = digest[2];
+ u32 d = digest[3];
+
+ u32 w0_t = w0[0];
+ u32 w1_t = w0[1];
+ u32 w2_t = w0[2];
+ u32 w3_t = w0[3];
+ u32 w4_t = w1[0];
+ u32 w5_t = w1[1];
+ u32 w6_t = w1[2];
+ u32 w7_t = w1[3];
+ u32 w8_t = w2[0];
+ u32 w9_t = w2[1];
+ u32 wa_t = w2[2];
+ u32 wb_t = w2[3];
+ u32 wc_t = w3[0];
+ u32 wd_t = w3[1];
+ u32 we_t = w3[2];
+ u32 wf_t = w3[3];
MD5_STEP (MD5_Fo, a, b, c, d, w0_t, MD5C00, MD5S00);
MD5_STEP (MD5_Fo, d, a, b, c, w1_t, MD5C01, MD5S01);
for (u32 il_pos = 0; il_pos < bfs_cnt; il_pos += VECT_SIZE)
{
- const u32x w0r = w0r_create_bft (bfs_buf, il_pos);
+ const u32 w0r = w0r_create_bft (bfs_buf, il_pos);
- const u32x w0lr = w0l | w0r;
+ const u32 w0lr = w0l | w0r;
// first md5 to generate RC4 128 bit key
- u32x w0_t[4];
- u32x w1_t[4];
- u32x w2_t[4];
- u32x w3_t[4];
+ u32 w0_t[4];
+ u32 w1_t[4];
+ u32 w2_t[4];
+ u32 w3_t[4];
w0_t[0] = w0lr;
w0_t[1] = w0[1] & 0xff;
w3_t[2] = 9 * 8;
w3_t[3] = 0;
- u32x digest[4];
+ u32 digest[4];
digest[0] = MD5M_A;
digest[1] = MD5M_B;
// now the RC4 part
- u32x key[4];
+ u32 key[4];
key[0] = digest[0];
key[1] = digest[1];
rc4_init_16 (rc4_key, key);
- u32x out[4];
+ u32 out[4];
u8 j = rc4_next_16 (rc4_key, 0, 0, encryptedVerifier, out);
for (u32 il_pos = 0; il_pos < bfs_cnt; il_pos += VECT_SIZE)
{
- const u32x w0r = w0r_create_bft (bfs_buf, il_pos);
+ const u32 w0r = w0r_create_bft (bfs_buf, il_pos);
- const u32x w0lr = w0l | w0r;
+ const u32 w0lr = w0l | w0r;
// first md5 to generate RC4 128 bit key
- u32x w0_t[4];
- u32x w1_t[4];
- u32x w2_t[4];
- u32x w3_t[4];
+ u32 w0_t[4];
+ u32 w1_t[4];
+ u32 w2_t[4];
+ u32 w3_t[4];
w0_t[0] = w0lr;
w0_t[1] = w0[1] & 0xff;
w3_t[2] = 9 * 8;
w3_t[3] = 0;
- u32x digest[4];
+ u32 digest[4];
digest[0] = MD5M_A;
digest[1] = MD5M_B;
// now the RC4 part
- u32x key[4];
+ u32 key[4];
key[0] = digest[0];
key[1] = digest[1];
rc4_init_16 (rc4_key, key);
- u32x out[4];
+ u32 out[4];
u8 j = rc4_next_16 (rc4_key, 0, 0, encryptedVerifier, out);
#define _OLDOFFICE34_
-#define NEW_SIMD_CODE
-
#include "include/constants.h"
#include "include/kernel_vendor.h"
rc4_key->S[j] = tmp;
}
-static void rc4_init_16 (__local RC4_KEY *rc4_key, const u32x data[4])
+static void rc4_init_16 (__local RC4_KEY *rc4_key, const u32 data[4])
{
- u32x v = 0x03020100;
- u32x a = 0x04040404;
+ u32 v = 0x03020100;
+ u32 a = 0x04040404;
__local u32 *ptr = (__local u32 *) rc4_key->S;
{
u32 idx = i * 16;
- u32x v;
+ u32 v;
v = data[0];
}
}
-static u8 rc4_next_16 (__local RC4_KEY *rc4_key, u8 i, u8 j, const u32x in[4], u32x out[4])
+static u8 rc4_next_16 (__local RC4_KEY *rc4_key, u8 i, u8 j, const u32 in[4], u32 out[4])
{
#pragma unroll
for (u32 k = 0; k < 4; k++)
{
- u32x xor4 = 0;
+ u32 xor4 = 0;
u8 idx;
return j;
}
-static void sha1_transform (const u32x w0[4], const u32x w1[4], const u32x w2[4], const u32x w3[4], u32x digest[5])
+static void sha1_transform (const u32 w0[4], const u32 w1[4], const u32 w2[4], const u32 w3[4], u32 digest[5])
{
- u32x A = digest[0];
- u32x B = digest[1];
- u32x C = digest[2];
- u32x D = digest[3];
- u32x E = digest[4];
-
- u32x w0_t = w0[0];
- u32x w1_t = w0[1];
- u32x w2_t = w0[2];
- u32x w3_t = w0[3];
- u32x w4_t = w1[0];
- u32x w5_t = w1[1];
- u32x w6_t = w1[2];
- u32x w7_t = w1[3];
- u32x w8_t = w2[0];
- u32x w9_t = w2[1];
- u32x wa_t = w2[2];
- u32x wb_t = w2[3];
- u32x wc_t = w3[0];
- u32x wd_t = w3[1];
- u32x we_t = w3[2];
- u32x wf_t = w3[3];
+ u32 A = digest[0];
+ u32 B = digest[1];
+ u32 C = digest[2];
+ u32 D = digest[3];
+ u32 E = digest[4];
+
+ u32 w0_t = w0[0];
+ u32 w1_t = w0[1];
+ u32 w2_t = w0[2];
+ u32 w3_t = w0[3];
+ u32 w4_t = w1[0];
+ u32 w5_t = w1[1];
+ u32 w6_t = w1[2];
+ u32 w7_t = w1[3];
+ u32 w8_t = w2[0];
+ u32 w9_t = w2[1];
+ u32 wa_t = w2[2];
+ u32 wb_t = w2[3];
+ u32 wc_t = w3[0];
+ u32 wd_t = w3[1];
+ u32 we_t = w3[2];
+ u32 wf_t = w3[3];
#undef K
#define K SHA1C00
for (u32 il_pos = 0; il_pos < bfs_cnt; il_pos += VECT_SIZE)
{
- const u32x w0r = w0r_create_bft (bfs_buf, il_pos);
+ const u32 w0r = w0r_create_bft (bfs_buf, il_pos);
- const u32x w0lr = w0l | w0r;
+ const u32 w0lr = w0l | w0r;
- u32x w0_t[4];
- u32x w1_t[4];
- u32x w2_t[4];
- u32x w3_t[4];
+ u32 w0_t[4];
+ u32 w1_t[4];
+ u32 w2_t[4];
+ u32 w3_t[4];
w0_t[0] = salt_buf[0];
w0_t[1] = salt_buf[1];
w3_t[2] = 0;
w3_t[3] = pw_salt_len * 8;
- u32x digest[5];
+ u32 digest[5];
digest[0] = SHA1M_A;
digest[1] = SHA1M_B;
sha1_transform (w0_t, w1_t, w2_t, w3_t, digest);
- u32x key[4];
+ u32 key[4];
key[0] = swap32 (digest[0]);
key[1] = swap32 (digest[1]);
rc4_init_16 (rc4_key, key);
- u32x out[4];
+ u32 out[4];
u8 j = rc4_next_16 (rc4_key, 0, 0, encryptedVerifier, out);
for (u32 il_pos = 0; il_pos < bfs_cnt; il_pos += VECT_SIZE)
{
- const u32x w0r = w0r_create_bft (bfs_buf, il_pos);
+ const u32 w0r = w0r_create_bft (bfs_buf, il_pos);
- const u32x w0lr = w0l | w0r;
+ const u32 w0lr = w0l | w0r;
- u32x w0_t[4];
- u32x w1_t[4];
- u32x w2_t[4];
- u32x w3_t[4];
+ u32 w0_t[4];
+ u32 w1_t[4];
+ u32 w2_t[4];
+ u32 w3_t[4];
w0_t[0] = salt_buf[0];
w0_t[1] = salt_buf[1];
w3_t[2] = 0;
w3_t[3] = pw_salt_len * 8;
- u32x digest[5];
+ u32 digest[5];
digest[0] = SHA1M_A;
digest[1] = SHA1M_B;
sha1_transform (w0_t, w1_t, w2_t, w3_t, digest);
- u32x key[4];
+ u32 key[4];
key[0] = swap32 (digest[0]);
key[1] = swap32 (digest[1]);
rc4_init_16 (rc4_key, key);
- u32x out[4];
+ u32 out[4];
u8 j = rc4_next_16 (rc4_key, 0, 0, encryptedVerifier, out);
#define _OLDOFFICE34_
-#define NEW_SIMD_CODE
-
#include "include/constants.h"
#include "include/kernel_vendor.h"
rc4_key->S[j] = tmp;
}
-static void rc4_init_16 (__local RC4_KEY *rc4_key, const u32x data[4])
+static void rc4_init_16 (__local RC4_KEY *rc4_key, const u32 data[4])
{
- u32x v = 0x03020100;
- u32x a = 0x04040404;
+ u32 v = 0x03020100;
+ u32 a = 0x04040404;
__local u32 *ptr = (__local u32 *) rc4_key->S;
{
u32 idx = i * 16;
- u32x v;
+ u32 v;
v = data[0];
}
}
-static u8 rc4_next_16 (__local RC4_KEY *rc4_key, u8 i, u8 j, const u32x in[4], u32x out[4])
+static u8 rc4_next_16 (__local RC4_KEY *rc4_key, u8 i, u8 j, const u32 in[4], u32 out[4])
{
#pragma unroll
for (u32 k = 0; k < 4; k++)
{
- u32x xor4 = 0;
+ u32 xor4 = 0;
u8 idx;
return j;
}
-static void sha1_transform (const u32x w0[4], const u32x w1[4], const u32x w2[4], const u32x w3[4], u32x digest[5])
+static void sha1_transform (const u32 w0[4], const u32 w1[4], const u32 w2[4], const u32 w3[4], u32 digest[5])
{
- u32x A = digest[0];
- u32x B = digest[1];
- u32x C = digest[2];
- u32x D = digest[3];
- u32x E = digest[4];
-
- u32x w0_t = w0[0];
- u32x w1_t = w0[1];
- u32x w2_t = w0[2];
- u32x w3_t = w0[3];
- u32x w4_t = w1[0];
- u32x w5_t = w1[1];
- u32x w6_t = w1[2];
- u32x w7_t = w1[3];
- u32x w8_t = w2[0];
- u32x w9_t = w2[1];
- u32x wa_t = w2[2];
- u32x wb_t = w2[3];
- u32x wc_t = w3[0];
- u32x wd_t = w3[1];
- u32x we_t = w3[2];
- u32x wf_t = w3[3];
+ u32 A = digest[0];
+ u32 B = digest[1];
+ u32 C = digest[2];
+ u32 D = digest[3];
+ u32 E = digest[4];
+
+ u32 w0_t = w0[0];
+ u32 w1_t = w0[1];
+ u32 w2_t = w0[2];
+ u32 w3_t = w0[3];
+ u32 w4_t = w1[0];
+ u32 w5_t = w1[1];
+ u32 w6_t = w1[2];
+ u32 w7_t = w1[3];
+ u32 w8_t = w2[0];
+ u32 w9_t = w2[1];
+ u32 wa_t = w2[2];
+ u32 wb_t = w2[3];
+ u32 wc_t = w3[0];
+ u32 wd_t = w3[1];
+ u32 we_t = w3[2];
+ u32 wf_t = w3[3];
#undef K
#define K SHA1C00
for (u32 il_pos = 0; il_pos < bfs_cnt; il_pos += VECT_SIZE)
{
- const u32x w0r = w0r_create_bft (bfs_buf, il_pos);
+ const u32 w0r = w0r_create_bft (bfs_buf, il_pos);
- const u32x w0lr = w0l | w0r;
+ const u32 w0lr = w0l | w0r;
- u32x key[4];
+ u32 key[4];
key[0] = w0lr;
key[1] = w0[1] & 0xff;
rc4_init_16 (rc4_key, key);
- u32x out[4];
+ u32 out[4];
u8 j = rc4_next_16 (rc4_key, 0, 0, encryptedVerifier, out);
- u32x w0_t[4];
- u32x w1_t[4];
- u32x w2_t[4];
- u32x w3_t[4];
+ u32 w0_t[4];
+ u32 w1_t[4];
+ u32 w2_t[4];
+ u32 w3_t[4];
w0_t[0] = swap32 (out[0]);
w0_t[1] = swap32 (out[1]);
w3_t[2] = 0;
w3_t[3] = 16 * 8;
- u32x digest[5];
+ u32 digest[5];
digest[0] = SHA1M_A;
digest[1] = SHA1M_B;
for (u32 il_pos = 0; il_pos < bfs_cnt; il_pos += VECT_SIZE)
{
- const u32x w0r = w0r_create_bft (bfs_buf, il_pos);
+ const u32 w0r = w0r_create_bft (bfs_buf, il_pos);
- const u32x w0lr = w0l | w0r;
+ const u32 w0lr = w0l | w0r;
- u32x key[4];
+ u32 key[4];
key[0] = w0lr;
key[1] = w0[1] & 0xff;
rc4_init_16 (rc4_key, key);
- u32x out[4];
+ u32 out[4];
u8 j = rc4_next_16 (rc4_key, 0, 0, encryptedVerifier, out);
- u32x w0_t[4];
- u32x w1_t[4];
- u32x w2_t[4];
- u32x w3_t[4];
+ u32 w0_t[4];
+ u32 w1_t[4];
+ u32 w2_t[4];
+ u32 w3_t[4];
w0_t[0] = swap32 (out[0]);
w0_t[1] = swap32 (out[1]);
w3_t[2] = 0;
w3_t[3] = 16 * 8;
- u32x digest[5];
+ u32 digest[5];
digest[0] = SHA1M_A;
digest[1] = SHA1M_B;
#include "include/kernel_functions.c"
#include "OpenCL/types_ocl.c"
#include "OpenCL/common.c"
-
-#define COMPARE_S "OpenCL/check_single_comp4.c"
-#define COMPARE_M "OpenCL/check_multi_comp4.c"
+#include "OpenCL/simd.c"
__constant u32 padding[8] =
{
for (u32 il_pos = 0; il_pos < bfs_cnt; il_pos++)
{
- const u32 w0r = bfs_buf[il_pos].i;
+ const u32 w0r = w0r_create_bft (bfs_buf, il_pos);
w0[0] = w0l | w0r;
rc4_next_16 (rc4_key, 0, 0, padding, out);
- const u32 r0 = out[0];
- const u32 r1 = out[1];
- const u32 r2 = out[2];
- const u32 r3 = out[3];
-
- #include COMPARE_M
+ COMPARE_M_SIMD (out[0], out[1], out[2], out[3]);
}
}
for (u32 il_pos = 0; il_pos < bfs_cnt; il_pos++)
{
- const u32 w0r = bfs_buf[il_pos].i;
+ const u32 w0r = w0r_create_bft (bfs_buf, il_pos);
w0[0] = w0l | w0r;
rc4_next_16 (rc4_key, 0, 0, padding, out);
- const u32 r0 = out[0];
- const u32 r1 = out[1];
- const u32 r2 = out[2];
- const u32 r3 = out[3];
-
- #include COMPARE_S
+ COMPARE_S_SIMD (out[0], out[1], out[2], out[3]);
}
}
#define _MD5_
-#define NEW_SIMD_CODE
-
#include "include/constants.h"
#include "include/kernel_vendor.h"
rc4_key->S[j] = tmp;
}
-static void rc4_init_16 (__local RC4_KEY *rc4_key, const u32x data[4])
+static void rc4_init_16 (__local RC4_KEY *rc4_key, const u32 data[4])
{
- u32x v = 0x03020100;
- u32x a = 0x04040404;
+ u32 v = 0x03020100;
+ u32 a = 0x04040404;
__local u32 *ptr = (__local u32 *) rc4_key->S;
ptr[i] = v; v += a;
}
- const u32x d0 = data[0] >> 0;
- const u32x d1 = data[0] >> 8;
- const u32x d2 = data[0] >> 16;
- const u32x d3 = data[0] >> 24;
- const u32x d4 = data[1] >> 0;
+ const u32 d0 = data[0] >> 0;
+ const u32 d1 = data[0] >> 8;
+ const u32 d2 = data[0] >> 16;
+ const u32 d3 = data[0] >> 24;
+ const u32 d4 = data[1] >> 0;
u32 j = 0;
j += rc4_key->S[255] + d0; swap (rc4_key, 255, j);
}
-static u8 rc4_next_16 (__local RC4_KEY *rc4_key, u8 i, u8 j, __constant u32x in[4], u32x out[4])
+static u8 rc4_next_16 (__local RC4_KEY *rc4_key, u8 i, u8 j, __constant u32 in[4], u32 out[4])
{
for (u32 k = 0; k < 4; k++)
{
- u32x xor4 = 0;
+ u32 xor4 = 0;
u8 idx;
for (u32 il_pos = 0; il_pos < bfs_cnt; il_pos += VECT_SIZE)
{
- const u32x w0r = w0r_create_bft (bfs_buf, il_pos);
+ const u32 w0r = w0r_create_bft (bfs_buf, il_pos);
- const u32x w0lr = w0l | w0r;
+ const u32 w0lr = w0l | w0r;
// now the RC4 part
- u32x key[4];
+ u32 key[4];
key[0] = w0lr;
key[1] = w0[1];
rc4_init_16 (rc4_key, key);
- u32x out[4];
+ u32 out[4];
rc4_next_16 (rc4_key, 0, 0, padding, out);
for (u32 il_pos = 0; il_pos < bfs_cnt; il_pos += VECT_SIZE)
{
- const u32x w0r = w0r_create_bft (bfs_buf, il_pos);
+ const u32 w0r = w0r_create_bft (bfs_buf, il_pos);
- const u32x w0lr = w0l | w0r;
+ const u32 w0lr = w0l | w0r;
// now the RC4 part
- u32x key[4];
+ u32 key[4];
key[0] = w0lr;
key[1] = w0[1];
rc4_init_16 (rc4_key, key);
- u32x out[4];
+ u32 out[4];
rc4_next_16 (rc4_key, 0, 0, padding, out);