Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <4F8043290200009900005BC0@mail.memphisemail.com>
Date: Sat, 07 Apr 2012 13:37:45 -0500
From: "Jimmy Blakeney" <jblakeney@...phisemail.com>
To: <john-users@...ts.openwall.com>
Subject: Re: Restore to mpi

Thanks for the info.  It is for a basic Unix crypt password set.  Looks like 1.7.9 supports it?? I recompiled and it appears to run.  Looks much easier than MPI.  It looks like the status is cumulative for c/s??  I will keep an eye on it to see if it update.  Is there a verbose switch to show what is being tried.  I thought an older version would show what is currently being tested.
Thanks for all the help.
Jimmy

>>> Solar Designer <solar@...nwall.com> 04/07/12 12:51 PM >>>
Jimmy,

On Sat, Apr 07, 2012 at 12:45:30PM -0500, Jimmy Blakeney wrote:
> I have been running an incremental process for a while now.  It is possible to "migrate" the recovery file to an MPI?  I am able to run the jumbo-5 version on my SuSE linux box and it appears to function fine.  I would like to incorporate the recovery that has been running on a single processor, instead of starting over.

You can easily switch to an OpenMP-enabled build and back, but you can't
reasonably easily and reliably do that with MPI (technically maybe you
could, but that's not something we support and it might not work right).

Hashes of what type are you cracking?  If we have reasonably efficient
OpenMP code for them, then just use that.

Alexander


Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.