<html>
<head>
<base href="https://bugs.freedesktop.org/">
</head>
<body>
<p>
<div>
<b><a class="bz_bug_link
bz_status_NEW "
title="NEW - OpenCL enqueueReadBuffer returns trash"
href="https://bugs.freedesktop.org/show_bug.cgi?id=101952#c10">Comment # 10</a>
on <a class="bz_bug_link
bz_status_NEW "
title="NEW - OpenCL enqueueReadBuffer returns trash"
href="https://bugs.freedesktop.org/show_bug.cgi?id=101952">bug 101952</a>
from <span class="vcard"><a class="email" href="mailto:janpieter.sollie@dommel.be" title="Janpieter Sollie <janpieter.sollie@dommel.be>"> <span class="fn">Janpieter Sollie</span></a>
</span></b>
<pre>Created <span class=""><a href="attachment.cgi?id=133112" name="attach_133112" title="the dump file as requested by mr Vesely.">attachment 133112</a> <a href="attachment.cgi?id=133112&action=edit" title="the dump file as requested by mr Vesely.">[details]</a></span>
the dump file as requested by mr Vesely.
I will explain what this program does:
I tried to create a program which proves that wpa/wpa2 can easily be
brute-forced if you have a WiFi password of only 8 chars (and you have a GPU
miner), and that the minimal requirement should be 12 ... I know my targets can
easily be put to the wrong side, but please take my word for it: if I really
had bad intentions, I would not have posted it ;)</pre>
</div>
</p>
<hr>
<span>You are receiving this mail because:</span>
<ul>
<li>You are the QA Contact for the bug.</li>
<li>You are the assignee for the bug.</li>
</ul>
</body>
</html>