Girocco/HashUtil.pm: increase maximum password rounds
Each time a password is converted for storage in the Girocco
project password file, a random number of iterations will be
chosen (up to a maximum number) and a random password "salt"
will be selected.
Together they help make it computationally much more expensive
to "crack" any of the stored passwords as pre-computing all the
possible "rainbow tables" starts to take up an inordinate amount
of space with the number of possible "salt" values combined with
the number of possible iterations.
With the recent order of magnitude speed up of the computation,
it's now possible to increase the maximum number of iterations
by roughly the same order of magnitude without requiring any
more CPU time than was required before the computation speed up.
Therefore go ahead and increase the maximum number of possible
iterations to make any brute force "crack" attempts just that
little bit more expensive to perform.
Signed-off-by: Kyle J. McKay <mackyle@gmail.com>