Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 2 Feb 2012 04:16:33 +0400
From: Solar Designer <>
Subject: Re: strange behaviour of c/s on raw-md5 and raw-md5-opencl

On Wed, Feb 01, 2012 at 03:43:09PM +0100, Samuele Giovanni Tonon wrote:
> same password file, same incremental mode on CPU it last for 7:13 at
> at 192911M c/s , on GPU it last for 5:12 at 48408 M c/s ? should'nt
> the c/s be higher ?

This sounds like the integer overflow issue that I fixed in the CVS tree
a while ago.  It's triggered when you use a format that buffers a lot of
passwords (thousands) and at the same time you load a lot of hashes for
a certain salt (or total if saltless).

Here are the relevant changes:;r2=1.10;r2=1.3;r2=1.10


Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ