Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <02fc01cc7228$28af7ef0$7a0e7cd0$@net>
Date: Tue, 13 Sep 2011 10:16:48 -0500
From: "jfoug" <jfoug@....net>
To: <john-users@...ts.openwall.com>
Subject: RE: Speed of jtr on your machine?

Hmm,

Shouldn't linux-x86-64 build with sse-intrinsic code?  It appears (from the
[gen] signature), that this is building a 'generic' build of john (for the
md5_gen).

Jim.

>From: Bugtrace [mailto:bugtrace@...il.com]
>
> # ./john | grep 'ver:'
>John the Ripper password cracker, ver: 1.7.8-jumbo-5 [linux-x86-64]
> # ./john --format=raw-md5 --test
>Benchmarking: Raw MD5 [gen]... Using raw-md5 mode, by linking to
>md5_gen(0) functions DONE
>Raw:	5898K c/s real, 5957K c/s virtual
>
> # ./john --format=phpass-md5 --test
>Benchmarking: PHPass MD5 [phpass-md5]... Using phpass mode, by linking
>to md5_gen(17) functions DONE
>Raw:	3552 c/s real, 3552 c/s virtual
>
>
>
>It looks like not as fast as jtr 1.7.6_jumbo_12 x86 with sse2 .
>
> $ ./john | grep version
>John the Ripper password cracker, version 1.7.6-jumbo-12
> $ ./john --format=raw-md5 --test
>Benchmarking: Raw MD5 SSE2 [raw-md5 SSE2 16x4]... DONE
>Raw:	9668K c/s real, 9668K c/s virtual
> $ ./john --format=phpass-md5 --test
>Benchmarking: PHPass MD5 SSE2 [phpass-MD5 SSE2]... Using phpass mode,
>by linking to md5_gen(17) functions DONE
>Many salts:	6144 c/s real, 6144 c/s virtual
>Only one salt:	6083 c/s real, 6144 c/s virtual

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.