[kismac] Re: [binaervarianz] r169 - trunk/Sources/Crypto

  • From: Jorge Laranjo <jorge.laranjo@xxxxxxxxx>
  • To: kismac@xxxxxxxxxxxxx
  • Date: Sat, 26 Aug 2006 16:46:41 +0100

Where can we download this "Revision 169" for testing?

Em 2006/08/26, às 16:28, svn@xxxxxxxxxxxxxxxx escreveu:

Author: gkruse
Date: 2006-08-26 17:28:38 +0200 (Sat, 26 Aug 2006)
New Revision: 169

Modified:
trunk/Sources/Crypto/WaveNetWPACrack.m
Log:
Fixed wpa crack on intel thanks to cowaptty. Seems that might be where our alg came from in the first place. There is also some asm optimizations we should use in the future. Closes #48


Modified: trunk/Sources/Crypto/WaveNetWPACrack.m
===================================================================
--- trunk/Sources/Crypto/WaveNetWPACrack.m 2006-08-23 02:20:24 UTC (rev 168)
+++ trunk/Sources/Crypto/WaveNetWPACrack.m 2006-08-26 15:28:38 UTC (rev 169)
@@ -54,12 +54,18 @@


/* blk0() and blk() perform the initial expand. */
/* I got the idea of expanding during the round function from SSLeay */
+#if BYTE_ORDER == BIG_ENDIAN
#define blk0(i) buffer[i]
+#else
+#define blk0(i) (buffer[i] = (rol(buffer[i], 24) & 0xFF00FF00) | \
+ (rol(buffer[i], 8) & 0x00FF00FF))
+#endif


 #define blk(i) (buffer[i & 15] = rol(buffer[(i + 13) & 15] ^ \
        buffer[(i + 8) & 15] ^ buffer[(i + 2) & 15] ^ buffer[i & 15], 1))

/* (R0+R1), R2, R3, R4 are the different operations used in SHA1 */
+//there are some intel asm versions of these we should use from cowpatty
#define R0(v,w,x,y,z,i) \
z += ((w & (x ^ y)) ^ y) + blk0(i) + 0x5A827999 + rol(v, 5); \
w = rol(w, 30);




-- Atentamente, Jorge Laranjo

email> jorge.laranjo@xxxxxxxxx
gTalk > jorge.laranjo@xxxxxxxxx
msn > jorgelaranjo@xxxxxxxxxxx
aim > jorge.laranjo@xxxxxxx
skype> jorge.laranjo
http://www.olhares.com/fueg0/
http://www.flickr.com/photos/fueg0/
http://concursosdefotografia.blogspot.com/




Other related posts: