archive-info.com » INFO » O » OPENWALL.INFO

Total: 226

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • john:sha256-crypt-opencl_rev0.png [Openwall Community Wiki]
    crypt opencl rev0 png sha256 crypt opencl rev0 png Back to GPU development Date 2011 08 01 12 27 Filename sha256 crypt opencl rev0 png Format PNG Size 13KB Width

    Original URL path: http://openwall.info/wiki/_detail/john/sha256-crypt-opencl_rev0.png?id=john%3Adevelopment%3AGPU (2016-04-26)
    Open archived version from archive


  • john:sha512-crypt.png [Openwall Community Wiki]
    john sha512 crypt png sha512 crypt png Back to GPU development Date 2011 07 06 06 56 Filename sha512 crypt png Format PNG Size 15KB Width 664 Height 246

    Original URL path: http://openwall.info/wiki/_detail/john/sha512-crypt.png?id=john%3Adevelopment%3AGPU (2016-04-26)
    Open archived version from archive

  • john:john-1.7.8:md5-crypt_rev3.png [Openwall Community Wiki]
    7 8 md5 crypt rev3 png md5 crypt rev3 png Back to GPU development Date 2011 07 25 01 13 Filename md5 crypt rev3 png Format PNG Size 17KB Width

    Original URL path: http://openwall.info/wiki/_detail/john/john-1.7.8/md5-crypt_rev3.png?id=john%3Adevelopment%3AGPU (2016-04-26)
    Open archived version from archive

  • Low-level GPU programming [Openwall Community Wiki]
    servers Cracking WPA PSK WPA2 PSK with John the Ripper Procedure to add a new code page to john Cracking Mac OS X salted SHA 1 passwords Patches that have since been integrated into the official JtR Markov generator Parallella Welcome to the Openwall Community Wiki Backlinks This is a list of pages that seem to link back to the current page Archived ideas John the Ripper user community resources

    Original URL path: http://openwall.info/wiki/john/development/GPU-low-level?do=backlink (2016-04-26)
    Open archived version from archive

  • AMD GCN ISA assembler [Openwall Community Wiki]
    questions in the ISA architecture documentation VOPC format VOPC can be represented as VOP3b and the VOP3b format is used often in the ISA generated by OpenCL However operands in the ISA format don t follow the usual VOP3b order which is VDST SDST SRC0 SRC1 SRC2 Example v cmp eq i32 s 6 7 v5 0 D1040006 00010105 The v5 VGPR is used as SRC0 here The microcode shows that the unspecified SDST value becomes s0 It is probably not used by the instruction but the fact that it is skipped by the ISA code makes parsing much harder Right now the example above cannot be parsed by gcnasm Issues See all the issues on GitHub Links Complete list of supported instructions GCN instruction format spreadsheet GCN instruction format backup pdf gcnasm quickstart guide Setting up the environment Note Make sure OpenCL is installed before trying to build the binary gen tool git clone https github com balidani gcnasm git cd gcnasm src make cd tools opencl kernel binary gen make cd chmod x tools assemble sh Loading a simple example Now that the environment is ready we can run the simplest example dummy test isa It contains a single instruction V MOV B32 v0 42 v0 42 VOP1 This will be patched into our dummy ELF which was generated from the following OpenCL kernel kernel void sample global uint in constant uint salt global uint out int num get global id 0 int x 0 The patch will come here out num x After we patch the kernel the value of the v0 VGPR will be used as the output Let s see what happens when we run the assembler shell script that automates everything First we have to find the appropriate OpenCL platform and device IDs though run binary gen Usage run binary gen platform id device id binary path kernel path Available platform IDs and devices Platform 0 NVIDIA CUDA Device 0 GeForce GTX 570 Platform 1 AMD Accelerated Parallel Processing Device 0 Tahiti Device 1 AMD FX tm 8120 Eight Core Processor We will use Tahiti which is device 0 of platform 1 Let s run the script tools assemble sh 1 0 test dummy test isa Input salt 0 0 1 0 2 0 3 0 4 0 5 0 6 0 7 0 8 0 9 0 10 0 11 0 12 0 13 0 14 0 15 0 16 0 17 0 18 0 19 0 20 0 21 0 22 0 23 0 24 0 25 0 26 0 27 0 28 0 29 0 30 0 31 0 32 0 33 0 34 0 35 0 36 0 37 0 38 0 39 0 40 0 41 0 42 0 43 0 44 0 45 0 46 0 47 0 48 0 49 0 50 0 51 0 52 0 53 0 54 0 55 0 56 0 57 0 58 0 59 0 60 0 61 0 62 0 63 0 Output 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 42 It works Feel free to try and create new isa files and add more instructions OpenCL ELF binaries OpenCL generates ELF binaries from the kernel s source code These binaries can be read and optionally saved with clGetProgramInfo using the CL PROGRAM BINARIES flag The binaries can later be loaded without compiling the kernel again using the clCreateProgramWithBinary function Sample program I created a utility to save the binaries generated by OpenCL The program lists the usage and the available OpenCL platform and device names if it is run without parameters Usage binary gen platform id device id binary path kernel path The binary path parameter specifies the path where the generated binary will be saved The kernel path parameter specifies the path where the kernel s source code will be loaded from If a file in the path of the binary path parameter already exists it will be loaded instead Tool directory in the GitHub repository ELF structure The generated ELF contains the following sections shstrtab strtab symtab llvmir LLVM IR comment unrecognized binary data rodata contains OpenCL information flags SDK version etc text contains an inner ELF The text section contains another ELF file This is where the microcode GCN bytecode is actually stored These are the sections of the inner ELF shstrtab text contains the microcode data this was completely empty in a sample binary we should check out more binaries symtab strtab AMD Developer Central question about ELF structure AMD CAL programming guide ELF patching To be able to add arbitrary GCN microcode to a previously generated OpenCL binary we need to patch the inner ELF s text section with new data To achieve this we are creating an ELF patching tool that uses libelf Since this is not a priority we will use a special binary for now This binary has a lot of NOP instructions that we can change to valid microcode This assures that we won t overwrite other sections in the ELF and we won t have to change the information in section headers Libelf by example GitHub repository of the elf patching tool this needs a lot of work and will be updated later Inner ELF extraction tool offset readelf S sample bin grep text awk F print 6 offset printf d 0x offset dd if sample bin of sample text ibs 1 skip offset GCN microcode tutorial This tutorial will show how to Generate save OpenCL binaries Extract the GCN microcode Change this microcode by hand Note when the assembler will work I should create a different tutorial that explains how to use

    Original URL path: http://openwall.info/wiki/john/development/GCN-ISA (2016-04-26)
    Open archived version from archive

  • AMD IL [Openwall Community Wiki]
    Generate default AMD binaries AMD binaries are ELF objects having the following major sections amdil This section contains the default IL codes text This section contains the default ISA source This section contains the default cl source llvmir This section contains the intermediate representaion If the target device is CPU the LLVMIR is converted to x86 codes by LLVM AS If the target device is a GPU then LLVM IR is converted AMD IL All of the above the section except amdil are unnecessary So to generate binaries without them we need to specify the option fno bin llvmir fno bin source fno bin exe fbin amdil to the clBuildProgram This will generate a binary containg only the amdil section ii Update the amdil section in the binaries generated in previous step using libelf API In this step we replace the original AMD IL codes with our own implemntation iii Update the symtab section in the same binary using libelf API This is for maintaing the integrity of the binary file so that it can be recognized by openCL compiler iv Build the program from generarted openCL binaries using clCreateProgramWithBinary Program to generate and modify the binary clbingenerate c To compile this program you need to have libelf devel installed in your sytem This is the syntax for generating the executable using gcc gcc o clbingenerate clbingenerate c lelf usr lib libOpenCL so I AMDAPPSDKROOT include Program to build from binaries clbinuse c To compile the program syntax is gcc o clbinuse clbinuse c usr lib libOpenCL so I AMDAPPSDKROOT include How to Use I will explain how to use the above two programs using an example data tar gz Extract the files in above archive in the same folder as the above two programs Inside the the archive there is one simple program to multiply 0 100 numbers by 2 The kernel cl contains the program and default il is the default IL generated from this kernel However in test il I have modified one instruction and also added one extra instruction to give a net result of multiplication by 8 The changes are at line number 72 and 73 in the IL codes Using clbingenerate c to generate the binaries generateAmdBin unsigned int platform id unsigned int dev id char clFile char binFile char ilFile platform id platform id of target platform i e choose a platform For ex 0 will choose platform 0 dev id device id of taget platform i e choose a device in the platform clFile Source file which will be used to generate default AMD binaries For ex kernel cl binFile Name of the binary file to be genearted For ex kernel bin 0 ilFile name of the modified IL file If this field is NULL a default binary will be generated conating the default IL codes But if you specify an il file the amdil section of the binay will be modified by this file For ex test il Note The above

    Original URL path: http://openwall.info/wiki/john/development/AMD-IL (2016-04-26)
    Open archived version from archive

  • Wish-list for JtR [Openwall Community Wiki]
    code page to john Cracking Mac OS X salted SHA 1 passwords Patches that have since been integrated into the official JtR Markov generator Parallella AMD GCN ISA assembler AMD IL Welcome to the Openwall Community Wiki Backlinks This is a list of pages that seem to link back to the current page John the Ripper user community resources Contributed patches for John the Ripper Wish list for JtR john

    Original URL path: http://openwall.info/wiki/john/wishlist?do=backlink (2016-04-26)
    Open archived version from archive

  • Effect of password policies on keyspace reduction [Openwall Community Wiki]
    the Ripper Procedure to add a new code page to john Cracking Mac OS X salted SHA 1 passwords Patches that have since been integrated into the official JtR Markov generator Parallella AMD GCN ISA assembler AMD IL Welcome to the Openwall Community Wiki Backlinks This is a list of pages that seem to link back to the current page John the Ripper user community resources john policy txt Last

    Original URL path: http://openwall.info/wiki/john/policy?do=backlink (2016-04-26)
    Open archived version from archive