Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <BANLkTinmc8Yvo_AuZ4ypYLbyaA4yXYUEPg@mail.gmail.com>
Date: Mon, 27 Jun 2011 20:07:37 -0300
From: Yuri Gonzaga <yuriggc@...il.com>
To: crypt-dev@...ts.openwall.com
Subject: Yuri's Status Report - #7 of 15

Hi, there!

I am happy to seeing communication working between host and our bflike
module throught USB.

   - Accomplishments:
      - Improvements in Eksblowfish loop implementation, as reported in
      another email;
      - Bfilke running on the board and communicating to host PC
         - I used a Windows XP 32 bits virtual machine, once my OS is 64
         bits and the drivers provided are to 32 bits.
         - A group of 10 tests was performed for niter = 1022, 650, 700,
         832, 915, 1023, 1020, 988, 799 and 1002
         - The hardware result was compared to software one and everything
         was correct
         - It wasted 3.781 seconds to perform all the tests sequentially
         (including software calculation part)
         - I don't why, but it needs a first "dummy" reading operation in
         the USB channel. It returns zero. Then, the others start to return the
         correct data
         - The hardware code and result, and C++ code will be uploaded in
         the wiki right now.
         - I used the original pcadd version in verilog
      - Priorities:
      - Do the same to the bcrypt's eksblowfish loop;


Thank you!

---
Yuri Gonzaga Gonçalves da Costa

Content of type "text/html" skipped

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.