Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 02 Feb 2012 01:39:37 +0100
From: magnum <john.magnum@...hmail.com>
To: john-dev@...ts.openwall.com
Subject: Re: strange behaviour of c/s on raw-md5 and raw-md5-opencl

On 02/02/2012 01:16 AM, Solar Designer wrote:
> On Wed, Feb 01, 2012 at 03:43:09PM +0100, Samuele Giovanni Tonon wrote:
>> same password file, same incremental mode on CPU it last for 7:13 at
>> at 192911M c/s , on GPU it last for 5:12 at 48408 M c/s ? should'nt
>> the c/s be higher ?
> 
> This sounds like the integer overflow issue that I fixed in the CVS tree
> a while ago.  It's triggered when you use a format that buffers a lot of
> passwords (thousands) and at the same time you load a lot of hashes for
> a certain salt (or total if saltless).

Samuele, the "bleeding-jumbo" branch on github includes these changes.

magnum

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ