Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 16 Aug 2013 03:00:58 +0200
From: Lukas Odzioba <lukas.odzioba@...il.com>
To: john-dev@...ts.openwall.com
Subject: Re: Re: Daniel's weekly report #9

2013/8/16 Dániel Bali <balijanosdaniel@...il.com>:
> I tried to patch the binary with the microcode (generated by
> KernelAnalyzer) of the following opencl code:
>
> __kernel void blowfish(constant uint *buf1, constant uint *buf2, __global
> uint *buf3, __global uint *buf4, __global uint *buf5, uint rounds, constant
> uint *buf6) {
>     buf3[0] = 111;
>     buf4[0] = 222;
>     buf5[0] = 333;
> }

Can you post this isa code?

I am affraid you're still missing the point of this test. If using bf
kernel to test ds instructions is hard, maybe it will be faster/easier
to write simple opencl code that will utilize ds instructions itself,
and will be easier to modify.

Lukas

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ