Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20130716134017.GA8711@openwall.com>
Date: Tue, 16 Jul 2013 17:40:17 +0400
From: Solar Designer <solar@...nwall.com>
To: john-dev@...ts.openwall.com
Subject: Re: Parallella: bcrypt

On Tue, Jul 16, 2013 at 03:12:02PM +0200, Katja Malvoni wrote:
> Self test - 822 c/s, with password.lst and pw-fake-unix 01:49:18, 820.9
> c/s, 3059 password hashes cracked, 9531 left (Loaded 3107 password hashes
> with 3107 different salts)

I just ran a quick test on the bsdicrypt hashes in the same file, and
got these same numbers above.  These hashes are supposed to use the
exact same plaintexts that the bcrypt hashes use.  So it looks like your
Parallella code is working right. :-)

Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.