Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 16 Jul 2013 17:40:17 +0400
From: Solar Designer <solar@...nwall.com>
To: john-dev@...ts.openwall.com
Subject: Re: Parallella: bcrypt

On Tue, Jul 16, 2013 at 03:12:02PM +0200, Katja Malvoni wrote:
> Self test - 822 c/s, with password.lst and pw-fake-unix 01:49:18, 820.9
> c/s, 3059 password hashes cracked, 9531 left (Loaded 3107 password hashes
> with 3107 different salts)

I just ran a quick test on the bsdicrypt hashes in the same file, and
got these same numbers above.  These hashes are supposed to use the
exact same plaintexts that the bcrypt hashes use.  So it looks like your
Parallella code is working right. :-)

Alexander

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ