Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 15 Sep 2015 21:57:44 +0300
From: Solar Designer <solar@...nwall.com>
To: john-dev@...ts.openwall.com
Subject: Re: Judy array

On Tue, Sep 15, 2015 at 08:47:26PM +0200, magnum wrote:
> On 2015-09-15 20:20, Solar Designer wrote:
> >There's significant risk of my cracker.c changes breaking something.
> 
> What should we test/look for? Just cracking in general (like the TS does)?

Yes, but also with other cracking modes and other formats (in
particular, across a wide range of max_keys_per_crypt, from 1 to some
large number).  We should also test that --single mode not only cracks
the same passwords, but also has no performance regression (which it
might if I broke its handling of removal of cracked hashes).  And batch
mode (I think my check is good enough to detect the single crack phase
of batch as well, but it's worth testing).

Alexander

Powered by blists - more mailing lists

Your e-mail address:

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.