1.1T is Huge. That file would cover every possible combination that regular people use for wifi and demonstrate to my friends how bad password they have.
I can delete 150 000 since I covered every year from 1900 until 2000. Plus I wanted to have all combinetions even smoler then 8 char. But I will add to script to remove every combination that have less then 8.
File have 45 000 lines only with names, surnames, middlenames and words that people generaly use. Everything else is birthday combinations and numbers with special simbols.
I literally can't think of a WPA implementation that would even accept password lengths of 7 or less, so if your focusing on WPA, you might as well cut those lengths out. Also keep in mind that many tools have issues with opening large files like that, so when you go to generate it, split it into numbered chunks so you can feed them into your tools incrementally.
File most def wouldn't cover every possible password used by regular people. More and more APs are setup with a default semi-unique password that you are simply not going to reliably get in a generated password list(outside of flukes or abusing vendor specific bad pseudo-random passwords). Just something to keep in mind. Not to mention as per WPA specification, the ssid is mixed into the crypto, making rainbow tables unfeasible except for some very common ssids, with that in mind remember that its gunna take some serious horsepower to power through a terabyte plus sized list.
You may be better off collecting a few different raw lists and mixing and sorting them manually, so that way you test real world passwords first. Essentially assume that if someone has been proven to use a given password once, someone else is using the same password elsewhere. Far easier to guess that then to try and generate a bunch of 'unique' passwords. Of course the exception being for targeted password generation. However, in the context of wifi security targeted password generation is only reliably useful against business, companies, etc that are more likely to standardize their passwords for easy employee use. Home users are gunna be using either the default complex password, or using a common password you can find in other lists. Thats just assuming they aren't picking out good secure passwords in the first place.
All this being said, theres a good reason why a lot of serious wifi security research goes into avoiding passwords whenever possible
or abuse implementations.