Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 3 Sep 2013 18:29:37 +0400
From: Solar Designer <solar@...nwall.com>
To: john-dev@...ts.openwall.com
Subject: Re: crk_timestamps

On Tue, Sep 03, 2013 at 03:18:45PM +0200, magnum wrote:
> So basically we revert to the original allocation of crk_timestamps, and then we skip the dupe check in crk_process_key() [setting dupe=0] whenever index > max_keys_per_crypt and that's it, right?

Right, except that you meant ">=" and crk_process_guess().

Alexander

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ