[kismac] Re: Growl Links Not Maintained by SVN

  • From: "John Warren" <xaive1@xxxxxxxxx>
  • To: kismac@xxxxxxxxxxxxx
  • Date: Thu, 2 Mar 2006 14:47:07 -0800

Are you talking about a wordlist file.  If so i have one that is 30
megs that has about 3 million words.  I don't remeber where i got it,
but I could supply it to you if you are interested.

On 3/2/06, Geoffrey Kruse <gkruse@xxxxxxxxxxxxxx> wrote:
> I take back my statement, with the fixed code, altivec is about 2.5 x as
> fast.  I will be committing the fix shortly, thanks for looking.  Intel will
> default to the non accelerated code until we can find replacements for
> vec_step and vec_rl.  It seems the ppc is better for rc5 type cracking
> because it has hardware rotate that the intel does not.
>
> Geoff
>
> P.S.  Do you know of a good password dictionary?
>
>
>
> On Mar 2, 2006, at 2:46 PM, Erik Winkler wrote:
> In the past, the altivec code was much faster when comparing a G3 to a G4 of
> similar speeds.
>
> Erik
>
>
> On Mar 2, 2006, at 4:23 PM, Geoffrey Kruse wrote:
>
> On Mar 2, 2006, at 2:07 PM, Erik Winkler wrote:
> Geoff,
>
> Found the WPA problem.  I replaced all occurrences of vL128Rotate with
> vec_rl in the file WaveNetWPACrackAltivec.m.  Not sure why you were using
> vL128Rotate.
>
> I will take a look... I was using vL128Rotate because there is vec_rl is not
> defined for i386;
>
> My initial benchmarking also shows that the non altivec version is faster,
> but I'll get back to you on that.
>
> Geoff
>
>
>
>
> WPA Crack works fine now.
>
> Erik
> On Mar 2, 2006, at 10:20 AM, Geoffrey Kruse wrote:
>
>
> On Mar 2, 2006, at 5:46 AM, Erik Winkler wrote:
>
>
> The build is flawless now.  That did the trick.  WPA cracking still broken.
> May want to look at any changes made to the WPA code to make it i386
> compatible.  I will compare an older version of the WPA code to the new code
> when I get a chance.
>
>
>
> The code is i386 compatible, its just not executed on i386 because of a
> check for alttvec before the code is called.  What I need to debug:   A dump
> with a WPA net that can be cracked using r90 or earlier but fails with the
> new code.  The only dump I have at the moment does not crack using r90 or
> earlier.  This vectorized code is pretty far outside my understanding, I
> directly translated it function call for function call.  If you get a chance
> take a look at Crypto/WaveNetWPACrackAltivec.m.  The other
> alternative would be to #ifdef out all of the code for i386 and change it
> back to the way it was.  This would however leave us without an mmx / sse
> version of this crack.
>
> Geoff
>
>
>
>
>

Other related posts: