|
Message-ID: <CABob6ir9KkA0z+f2LiuCft3fcQg06BpT5mAb7+ZcV8OVkqO+Hg@mail.gmail.com> Date: Mon, 25 Jul 2011 09:50:31 +0200 From: Ćukasz Odzioba <lukas.odzioba@...il.com> To: john-dev@...ts.openwall.com Subject: Re: cryptmd5cuda Hi!, I found bug in cryptmd5cuda patch rev2. The problem was in this functions: static void *salt(char *ciphertext) - it was returning prefix and salt. Everything have been ok during test because address returned by salt was the same that was set_salt() parameter. During "normal cracking" salt has been shortend to SALT_SIZE, and copied to another place in memory. I have fixed that, and it works as it should. I have also: -added $apr1$ support -tested your proposed F and G functions (there are around %1 slower, I have already tried them earlier,i suppose that it may be faster for AMD's) -tested x[15]=0 situation +1.5%, thanks! After some other changes I've got +11% comparing to rev2. I still have got this "i%7" problem, but will dig more into MD5_std.c. and try to figure out how to do it on gpu (with memory limitations). I've done changes you proposed earlier (MIN macros,sse2 bulid). Other patches seems to work properly. Cryptmd5-cuda patch rev 3 for john 1.7.8 is on wiki. I've tested it on corelogic 2010 $1$ hashes and got: cpu (1 core of i3-2100): guesses: 583 time: 0:00:25:18 100% c/s: 9011 trying: hallo gpu: guesses: 583 time: 0:00:02:10 100% c/s: 113948 trying: 12345fgh - hallo Lukas
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.