Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 2 Apr 2015 21:09:22 +0200
From: Lukas Odzioba <>
Subject: Re: Advice on proposal: John the Ripper jumbo robustness

2015-04-02 12:08 GMT+02:00 Kai Zhao <>:
> The gprof also shows that the sevenzip_kdf() function spends a lot of time which almost 94.58%.

I guess your contain valid hash and 94.58% spent in kdf is expected.
Note "No password hashes loaded (see FAQ)" in Alexander's emails.
This means that his was empty (which can make sense for
fuzzing config file) or format's valid function rejected everything
from it.


Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ