CC: | racke [...] linuxia.de |
Subject: | Failing darwin tests |
Hello,
Crypt::Password not passing on darwing. Test result bellow. Let me know
if I can give you some more info.
Cheers
---- HORNBURG/Nitesi-0.0031.tar.gz ----
Crypt::Password [requires]
Running make test
Delayed until after prerequisites
Running make install
Delayed until after prerequisites
Running install for module 'Crypt::Password'
Running make for D/DR/DRSTEVE/Crypt-Password-0.05.tar.gz
Checksum for
/Users/ambs/.cpan/sources/authors/id/D/DR/DRSTEVE/Crypt-Password-0.05.tar.gz
ok
Crypt-Password-0.05/
Crypt-Password-0.05/Makefile.PL
Crypt-Password-0.05/SubmittingPatches
Crypt-Password-0.05/inc/
Crypt-Password-0.05/inc/Module/
Crypt-Password-0.05/inc/Module/Install.pm
Crypt-Password-0.05/inc/Module/Install/
Crypt-Password-0.05/inc/Module/Install/WriteAll.pm
Crypt-Password-0.05/inc/Module/Install/Win32.pm
Crypt-Password-0.05/inc/Module/Install/Fetch.pm
Crypt-Password-0.05/inc/Module/Install/Base.pm
Crypt-Password-0.05/inc/Module/Install/Can.pm
Crypt-Password-0.05/inc/Module/Install/Metadata.pm
Crypt-Password-0.05/inc/Module/Install/Makefile.pm
Crypt-Password-0.05/CHANGES
Crypt-Password-0.05/COPYING.txt
Crypt-Password-0.05/META.yml
Crypt-Password-0.05/lib/
Crypt-Password-0.05/lib/Crypt/
Crypt-Password-0.05/lib/Crypt/Password.pm
Crypt-Password-0.05/MANIFEST
Crypt-Password-0.05/t/
Crypt-Password-0.05/t/90-pod-syntax.t
Crypt-Password-0.05/t/01-crypt-password.t
Crypt-Password-0.05/t/92-license.t
Crypt-Password-0.05/t/93-perltidy.t
Crypt-Password-0.05/README
CPAN.pm: Building D/DR/DRSTEVE/Crypt-Password-0.05.tar.gz
Checking if your kit is complete...
Looks good
Writing Makefile for Crypt::Password
Writing MYMETA.yml and MYMETA.json
(/opt/local/bin/perl Makefile.PL exited with 0)
CPAN::Reporter: Makefile.PL result is 'pass', No errors.
cp lib/Crypt/Password.pm blib/lib/Crypt/Password.pm
Manifying blib/man3/Crypt::Password.3
(/usr/bin/make exited with 0)
CPAN::Reporter: make result is 'pass', No errors.
DRSTEVE/Crypt-Password-0.05.tar.gz
/usr/bin/make -- OK
Running make test
PERL_DL_NONLAZY=1 /opt/local/bin/perl "-MExtUtils::Command::MM" "-e"
"test_harness(0, 'inc', 'blib/lib', 'blib/arch')" t/*.t
# set algorithm
# generate salt
# crypt some text
# Failed test 'crypted'
# at t/01-crypt-password.t line 55.
# Failed test 'another crypted'
# at t/01-crypt-password.t line 58.
# documented stuff
# Failed test 'Default algorithm, supplied salt'
# at t/01-crypt-password.t line 68.
# Failed test 'md5, no salt'
# at t/01-crypt-password.t line 73.
# Failed test 'sha512, invented salt'
# at t/01-crypt-password.t line 78.
# CRYPT(3) BSD Library Functions Manual
CRYPT(3)
#
# NAME
# crypt, encrypt, setkey -- DES encryption
#
# SYNOPSIS
# #include <unistd.h>
#
# char *
# crypt(const char *key, const char *salt);
#
# void
# encrypt(char *block, int edflag);
#
# #include <stdlib.h>
#
# void
# setkey(const char *key);
#
# DESCRIPTION
# The crypt() function performs password encryption, based on the
NBS Data
# Encryption Standard (DES). Additional code has been added to
deter key
# search attempts. The first argument to crypt() is a null-terminated
# string, typically a user's typed password. The second is in one
of two
# forms: if it begins with an underscore (``_''), an extended format is
# used in interpreting both the key and the salt value, as outlined
below.
#
# Extended crypt:
# The key is divided into groups of 8 characters (the last group is
null-
# padded) and the low-order 7 bits of each each character (56 bits per
# group) are used to form the DES key as follows: the first group of 56
# bits becomes the initial DES key. For each additional group, the
XOR of
# the encryption of the current DES key with itself and the group bits
# becomes the next DES key.
#
# The salt is a 9-character array consisting of an underscore,
followed by
# 4 bytes of iteration count and 4 bytes of salt. These are encoded as
# printable characters, 6 bits per character, least significant
character
# first. The values 0 to 63 are encoded as ``./0-9A-Za-z''. This
allows
# 24 bits for both count and salt.
#
# Traditional crypt:
# The first 8 bytes of the key are null-padded, and the low-order 7
bits of
# each character is used to form the 56-bit DES key.
#
# The salt is a 2-character array of the ASCII-encoded salt. Thus,
only 12
# bits of salt are used. count is set to 25.
#
# Algorithm:
# The salt introduces disorder in the DES algorithm in one of
16777216 or
# 4096 possible ways (ie. with 24 or 12 bits: if bit i of the salt
is set,
# then bits i and i+24 are swapped in the DES E-box output).
#
# The DES key is used to encrypt a 64-bit constant, using count
iterations
# of DES. The value returned is a null-terminated string, 20 or 13
bytes
# (plus null) in length, consisting of the salt, followed by the
encoded
# 64-bit encryption.
#
# The functions, encrypt() and setkey() provide access to the DES
algorithm
# itself. setkey() is passed a 64-byte array of binary values
(numeric 0
# or 1). A 56-bit key is extracted from this array by dividing the
array
# into groups of 8 and ignoring the last bit in each group. That
bit is
# reserved for a byte parity check by DES, but is ignored by these
func-
# tions.
#
# The block argument to encrypt() is also a 64-byte array of binary
values.
# If the value of edflag is 0, block is encrypted; otherwise, it is
# decrypted. The result is returned in the original array block, after
# using the key specified by setkey() to process it.
#
# The function crypt() returns a pointer to the encrypted value on
success,
# and NULL on failure.
#
# The crypt() and setkey() functions all manipulate the same key space.
#
# SEE ALSO
# login(1), passwd(1), getpass(3), compat(5), passwd(5)
#
# LEGACY SYNOPSIS
# #include <unistd.h>
#
# int
# encrypt(char *block, int edflag);
#
# The function encrypt() returns 0 on success and 1 on failure.
#
# void
# setkey(const char *key);
#
# The include file <unistd.h> is necessary and sufficient for the
setkey()
# function.
#
# BUGS
# The crypt() function returns a pointer to static data, and subsequent
# calls to crypt() will modify the same object.
#
# HISTORY
# A rotor-based crypt() function appeared in Version 6 AT&T UNIX.
The cur-
# rent style crypt() first appeared in Version 7 AT&T UNIX.
#
# This library (FreeSec 1.0) was developed outside the United States of
# America as an unencumbered replacement for the U.S.-only libcrypt
encryp-
# tion library. Programs linked against the crypt() interface may be
# exported from the U.S.A. only if they use crypt() solely for
authentica-
# tion purposes and avoid use of the other programmer interfaces listed
# above. Special care has been taken in the library so that
programs which
# only use the crypt() interface do not pull in the other components.
#
# AUTHOR
# David Burren <davidb@werj.com.au>
#
# FreeSec 1.0 March 9, 1994
FreeSec 1.0
# Looks like you failed 5 tests of 28.
t/01-crypt-password.t ..
Dubious, test returned 5 (wstat 1280, 0x500)
Failed 5/28 subtests
t/90-pod-syntax.t ...... skipped: set TEST_POD or TEST_ALL to enable
this test
t/92-license.t ......... skipped: set TEST_LICENSE or TEST_ALL to enable
this test
t/93-perltidy.t ........ skipped: set TEST_TIDY or TEST_ALL to enable
this test
Test Summary Report
-------------------
t/01-crypt-password.t (Wstat: 1280 Tests: 28 Failed: 5)
Failed tests: 21-22, 26-28
Non-zero exit status: 5
Files=4, Tests=28, 1 wallclock secs ( 0.04 usr 0.02 sys + 0.23 cusr
0.08 csys = 0.37 CPU)
Result: FAIL
Failed 1/4 test programs. 5/28 subtests failed.