Date: Tue, 16 Jul 2013 17:40:17 +0400 From: Solar Designer <solar@...nwall.com> To: john-dev@...ts.openwall.com Subject: Re: Parallella: bcrypt On Tue, Jul 16, 2013 at 03:12:02PM +0200, Katja Malvoni wrote: > Self test - 822 c/s, with password.lst and pw-fake-unix 01:49:18, 820.9 > c/s, 3059 password hashes cracked, 9531 left (Loaded 3107 password hashes > with 3107 different salts) I just ran a quick test on the bsdicrypt hashes in the same file, and got these same numbers above. These hashes are supposed to use the exact same plaintexts that the bcrypt hashes use. So it looks like your Parallella code is working right. :-) Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.