Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sat, 23 Jun 2012 18:30:36 +0400
From: Solar Designer <solar@...nwall.com>
To: john-dev@...ts.openwall.com
Subject: Re: 1.7.9-jumbo-6

Robert -

On Sat, Jun 23, 2012 at 01:28:44AM -0400, Robert B. Harris wrote:
> My test results for solaris-x86-64i-gcc.

Thanks!

> - Testing:  John the Ripper password cracker, ver: 1.7.9-jumbo-5+unstable [solaris-x86-64i-gcc]
> --------------------------------------------------------------------------------
> 
> form=hdaa                         guesses:    0 unk unk : Expected count(s) (1500)  [!!!FAILED!!!]

Does the built-in self-test for hdaa pass or fail?

./john --test --format=hdaa

> - Testing:  John the Ripper password cracker, version 1.7.9.4-bleeding-jumbo [solaris-x86-64i-gcc]
> --------------------------------------------------------------------------------
> John Jumbo build detected.
> testing: john -test=0  
> Benchmarking: wpapsk [OpenSSL]... FAILED (method get_source NULL) 
> 1 out of 137 tests have FAILED 

Jim will need to pull a newer revision of that format and add get_source().
Luckily, this is irrelevant to our upcoming release.

Thanks again,

Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.