John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix systems, supported out of the box are Windows LM hashes, plus lots of other hashes and ciphers in the community-enhanced version.
This release has supported added for the Parallella board, with implementation of bcrypt on the Epiphany accelerator and in the Zynq programmable logic.
For Epiphany support:
$ cd src
$ make linux-parallella
To test bcrypt on Epiphany run:
$ cd run
$ ./john -te -form=bcrypt-parallella
Note that the Zynq PL bitstreams do not have Epiphany support!
For Zynq support:
$ make linux-arm32le-neon
To load bitstream (src/fpga/bcrypt_60instances.bit.bin) on Zynq FPGA execute following commands as root:
$ mknod /dev/xdevcfg c 250 0 > /dev/null
$ cat bcrypt_60instances.bit.bin > /dev/xdevcfg
To test bcrypt on Zynq-7020 run:
$ sudo ./john -te -form=bcrypt
Due to ZedBoard power issues (suspecting voltage drop), designs with multiple bcrypt instances aren't always reliable. To test other bitstream (src/fpga/bcrypt_70instances.bit.bin), change the line #define BF_Nmin 60 in BF_std.h into #define BF_Nmin 70 and recompile.
Slower but reliable code (with bitstream) can be found in src/fpga/JohnTheRipper_Zynq_reliable.tar.gz
GPL v2
Parallella support contributed by Katja Malvoni.
John the Ripper copyright Solar Designer et al. For details see the file doc/CREDITS.