Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 25 Jul 2011 09:50:31 +0200
From: Ɓukasz Odzioba <lukas.odzioba@...il.com>
To: john-dev@...ts.openwall.com
Subject: Re: cryptmd5cuda

Hi!,
I found bug in cryptmd5cuda patch rev2.
The problem was in this functions:

static void *salt(char *ciphertext) - it was returning prefix and salt.
Everything have been ok during test because address returned by salt
was the same that was  set_salt() parameter.
During "normal cracking" salt has been shortend to SALT_SIZE, and
copied to another place in memory.

I have fixed that, and it works as it should.

I have also:
-added $apr1$ support
-tested your proposed F and G functions (there are around %1 slower, I
have already tried them earlier,i suppose that it may be faster for
AMD's)
-tested x[15]=0 situation +1.5%, thanks!

After some other changes I've got +11% comparing to rev2.
I still have got this "i%7" problem, but will dig more into MD5_std.c.
and try to figure out how to do it on gpu (with memory limitations).

I've done changes you proposed earlier (MIN macros,sse2 bulid).
Other patches seems to work properly.
Cryptmd5-cuda patch rev 3 for john 1.7.8 is on wiki.
I've tested it on corelogic 2010 $1$ hashes and got:
cpu (1 core of i3-2100):
guesses: 583  time: 0:00:25:18 100%  c/s: 9011  trying: hallo

gpu:
guesses: 583  time: 0:00:02:10 100%  c/s: 113948  trying: 12345fgh - hallo


Lukas

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ