Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 19 Apr 2015 21:06:20 +0200
From: magnum <john.magnum@...hmail.com>
To: john-dev@...ts.openwall.com
Subject: Re: [GSoC] John the Ripper support for PHC finalists

On 2015-04-18 23:59, Agnieszka Bielec wrote:
> I think that there are 3 possible solutions
> 1). modify bench.c like I've modified (but, are there a hashes which
> cannot receive some specific password values? )
> 2). spefify more tests cases for fmt_tests (but, sometimes we will
> need to pass 100 tests cases and sometimes more)
> 3). make fmt_main to generate password values if the answer in question is yes

We are in (slow) progress of changing self-tests and benchmarks to
optionally include keys generated by mask mode, and this will likely
solve your problems too. Until then, perhaps you can use temporary hacks
(like what you did) for your experiments that we won't include in the
main repo.

magnum


Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ