Skip Menu |

This queue is for tickets about the Crypt-Password CPAN distribution.

Report information
The Basics
Id: 72255
Status: open
Priority: 0/
Queue: Crypt-Password

People
Owner: Nobody in particular
Requestors: ambs [...] cpan.org
Cc: racke [...] linuxia.de
AdminCc:

Bug Information
Severity: Critical
Broken in: 0.05
Fixed in: (no value)



CC: racke [...] linuxia.de
Subject: Failing darwin tests
Hello, Crypt::Password not passing on darwing. Test result bellow. Let me know if I can give you some more info. Cheers ---- HORNBURG/Nitesi-0.0031.tar.gz ---- Crypt::Password [requires] Running make test Delayed until after prerequisites Running make install Delayed until after prerequisites Running install for module 'Crypt::Password' Running make for D/DR/DRSTEVE/Crypt-Password-0.05.tar.gz Checksum for /Users/ambs/.cpan/sources/authors/id/D/DR/DRSTEVE/Crypt-Password-0.05.tar.gz ok Crypt-Password-0.05/ Crypt-Password-0.05/Makefile.PL Crypt-Password-0.05/SubmittingPatches Crypt-Password-0.05/inc/ Crypt-Password-0.05/inc/Module/ Crypt-Password-0.05/inc/Module/Install.pm Crypt-Password-0.05/inc/Module/Install/ Crypt-Password-0.05/inc/Module/Install/WriteAll.pm Crypt-Password-0.05/inc/Module/Install/Win32.pm Crypt-Password-0.05/inc/Module/Install/Fetch.pm Crypt-Password-0.05/inc/Module/Install/Base.pm Crypt-Password-0.05/inc/Module/Install/Can.pm Crypt-Password-0.05/inc/Module/Install/Metadata.pm Crypt-Password-0.05/inc/Module/Install/Makefile.pm Crypt-Password-0.05/CHANGES Crypt-Password-0.05/COPYING.txt Crypt-Password-0.05/META.yml Crypt-Password-0.05/lib/ Crypt-Password-0.05/lib/Crypt/ Crypt-Password-0.05/lib/Crypt/Password.pm Crypt-Password-0.05/MANIFEST Crypt-Password-0.05/t/ Crypt-Password-0.05/t/90-pod-syntax.t Crypt-Password-0.05/t/01-crypt-password.t Crypt-Password-0.05/t/92-license.t Crypt-Password-0.05/t/93-perltidy.t Crypt-Password-0.05/README CPAN.pm: Building D/DR/DRSTEVE/Crypt-Password-0.05.tar.gz Checking if your kit is complete... Looks good Writing Makefile for Crypt::Password Writing MYMETA.yml and MYMETA.json (/opt/local/bin/perl Makefile.PL exited with 0) CPAN::Reporter: Makefile.PL result is 'pass', No errors. cp lib/Crypt/Password.pm blib/lib/Crypt/Password.pm Manifying blib/man3/Crypt::Password.3 (/usr/bin/make exited with 0) CPAN::Reporter: make result is 'pass', No errors. DRSTEVE/Crypt-Password-0.05.tar.gz /usr/bin/make -- OK Running make test PERL_DL_NONLAZY=1 /opt/local/bin/perl "-MExtUtils::Command::MM" "-e" "test_harness(0, 'inc', 'blib/lib', 'blib/arch')" t/*.t # set algorithm # generate salt # crypt some text # Failed test 'crypted' # at t/01-crypt-password.t line 55. # Failed test 'another crypted' # at t/01-crypt-password.t line 58. # documented stuff # Failed test 'Default algorithm, supplied salt' # at t/01-crypt-password.t line 68. # Failed test 'md5, no salt' # at t/01-crypt-password.t line 73. # Failed test 'sha512, invented salt' # at t/01-crypt-password.t line 78. # CRYPT(3) BSD Library Functions Manual CRYPT(3) # # NAME # crypt, encrypt, setkey -- DES encryption # # SYNOPSIS # #include <unistd.h> # # char * # crypt(const char *key, const char *salt); # # void # encrypt(char *block, int edflag); # # #include <stdlib.h> # # void # setkey(const char *key); # # DESCRIPTION # The crypt() function performs password encryption, based on the NBS Data # Encryption Standard (DES). Additional code has been added to deter key # search attempts. The first argument to crypt() is a null-terminated # string, typically a user's typed password. The second is in one of two # forms: if it begins with an underscore (``_''), an extended format is # used in interpreting both the key and the salt value, as outlined below. # # Extended crypt: # The key is divided into groups of 8 characters (the last group is null- # padded) and the low-order 7 bits of each each character (56 bits per # group) are used to form the DES key as follows: the first group of 56 # bits becomes the initial DES key. For each additional group, the XOR of # the encryption of the current DES key with itself and the group bits # becomes the next DES key. # # The salt is a 9-character array consisting of an underscore, followed by # 4 bytes of iteration count and 4 bytes of salt. These are encoded as # printable characters, 6 bits per character, least significant character # first. The values 0 to 63 are encoded as ``./0-9A-Za-z''. This allows # 24 bits for both count and salt. # # Traditional crypt: # The first 8 bytes of the key are null-padded, and the low-order 7 bits of # each character is used to form the 56-bit DES key. # # The salt is a 2-character array of the ASCII-encoded salt. Thus, only 12 # bits of salt are used. count is set to 25. # # Algorithm: # The salt introduces disorder in the DES algorithm in one of 16777216 or # 4096 possible ways (ie. with 24 or 12 bits: if bit i of the salt is set, # then bits i and i+24 are swapped in the DES E-box output). # # The DES key is used to encrypt a 64-bit constant, using count iterations # of DES. The value returned is a null-terminated string, 20 or 13 bytes # (plus null) in length, consisting of the salt, followed by the encoded # 64-bit encryption. # # The functions, encrypt() and setkey() provide access to the DES algorithm # itself. setkey() is passed a 64-byte array of binary values (numeric 0 # or 1). A 56-bit key is extracted from this array by dividing the array # into groups of 8 and ignoring the last bit in each group. That bit is # reserved for a byte parity check by DES, but is ignored by these func- # tions. # # The block argument to encrypt() is also a 64-byte array of binary values. # If the value of edflag is 0, block is encrypted; otherwise, it is # decrypted. The result is returned in the original array block, after # using the key specified by setkey() to process it. # # The function crypt() returns a pointer to the encrypted value on success, # and NULL on failure. # # The crypt() and setkey() functions all manipulate the same key space. # # SEE ALSO # login(1), passwd(1), getpass(3), compat(5), passwd(5) # # LEGACY SYNOPSIS # #include <unistd.h> # # int # encrypt(char *block, int edflag); # # The function encrypt() returns 0 on success and 1 on failure. # # void # setkey(const char *key); # # The include file <unistd.h> is necessary and sufficient for the setkey() # function. # # BUGS # The crypt() function returns a pointer to static data, and subsequent # calls to crypt() will modify the same object. # # HISTORY # A rotor-based crypt() function appeared in Version 6 AT&T UNIX. The cur- # rent style crypt() first appeared in Version 7 AT&T UNIX. # # This library (FreeSec 1.0) was developed outside the United States of # America as an unencumbered replacement for the U.S.-only libcrypt encryp- # tion library. Programs linked against the crypt() interface may be # exported from the U.S.A. only if they use crypt() solely for authentica- # tion purposes and avoid use of the other programmer interfaces listed # above. Special care has been taken in the library so that programs which # only use the crypt() interface do not pull in the other components. # # AUTHOR # David Burren <davidb@werj.com.au> # # FreeSec 1.0 March 9, 1994 FreeSec 1.0 # Looks like you failed 5 tests of 28. t/01-crypt-password.t .. Dubious, test returned 5 (wstat 1280, 0x500) Failed 5/28 subtests t/90-pod-syntax.t ...... skipped: set TEST_POD or TEST_ALL to enable this test t/92-license.t ......... skipped: set TEST_LICENSE or TEST_ALL to enable this test t/93-perltidy.t ........ skipped: set TEST_TIDY or TEST_ALL to enable this test Test Summary Report ------------------- t/01-crypt-password.t (Wstat: 1280 Tests: 28 Failed: 5) Failed tests: 21-22, 26-28 Non-zero exit status: 5 Files=4, Tests=28, 1 wallclock secs ( 0.04 usr 0.02 sys + 0.23 cusr 0.08 csys = 0.37 CPU) Result: FAIL Failed 1/4 test programs. 5/28 subtests failed.
Subject: Re: [rt.cpan.org #72255] Failing darwin tests
Date: Tue, 8 Nov 2011 10:28:41 +1300
To: bug-Crypt-Password [...] rt.cpan.org
From: Steevo Wymzelico <nostrasteve [...] gmail.com>
Hi, cheers, would you be able to chuck me 'perldoc -f crypt' from this Darwin? On Tue, Nov 8, 2011 at 8:53 AM, Alberto Simões via RT <bug-Crypt-Password@rt.cpan.org> wrote: Show quoted text
> Mon Nov 07 14:53:19 2011: Request 72255 was acted upon. > Transaction: Ticket created by AMBS >       Queue: Crypt-Password >     Subject: Failing darwin tests >   Broken in: 0.05 >    Severity: Critical >       Owner: Nobody >  Requestors: ambs@cpan.org >      Status: new >  Ticket <URL: https://rt.cpan.org/Ticket/Display.html?id=72255 > > > > Hello, > Crypt::Password not passing on darwing. Test result bellow. Let me know > if I can give you some more info. > Cheers > > ----       HORNBURG/Nitesi-0.0031.tar.gz      ---- >    Crypt::Password [requires] > Running make test >  Delayed until after prerequisites > Running make install >  Delayed until after prerequisites > Running install for module 'Crypt::Password' > Running make for D/DR/DRSTEVE/Crypt-Password-0.05.tar.gz > Checksum for > /Users/ambs/.cpan/sources/authors/id/D/DR/DRSTEVE/Crypt-Password-0.05.tar.gz > ok > Crypt-Password-0.05/ > Crypt-Password-0.05/Makefile.PL > Crypt-Password-0.05/SubmittingPatches > Crypt-Password-0.05/inc/ > Crypt-Password-0.05/inc/Module/ > Crypt-Password-0.05/inc/Module/Install.pm > Crypt-Password-0.05/inc/Module/Install/ > Crypt-Password-0.05/inc/Module/Install/WriteAll.pm > Crypt-Password-0.05/inc/Module/Install/Win32.pm > Crypt-Password-0.05/inc/Module/Install/Fetch.pm > Crypt-Password-0.05/inc/Module/Install/Base.pm > Crypt-Password-0.05/inc/Module/Install/Can.pm > Crypt-Password-0.05/inc/Module/Install/Metadata.pm > Crypt-Password-0.05/inc/Module/Install/Makefile.pm > Crypt-Password-0.05/CHANGES > Crypt-Password-0.05/COPYING.txt > Crypt-Password-0.05/META.yml > Crypt-Password-0.05/lib/ > Crypt-Password-0.05/lib/Crypt/ > Crypt-Password-0.05/lib/Crypt/Password.pm > Crypt-Password-0.05/MANIFEST > Crypt-Password-0.05/t/ > Crypt-Password-0.05/t/90-pod-syntax.t > Crypt-Password-0.05/t/01-crypt-password.t > Crypt-Password-0.05/t/92-license.t > Crypt-Password-0.05/t/93-perltidy.t > Crypt-Password-0.05/README > >  CPAN.pm: Building D/DR/DRSTEVE/Crypt-Password-0.05.tar.gz > > Checking if your kit is complete... > Looks good > Writing Makefile for Crypt::Password > Writing MYMETA.yml and MYMETA.json > (/opt/local/bin/perl Makefile.PL exited with 0) > CPAN::Reporter: Makefile.PL result is 'pass', No errors. > cp lib/Crypt/Password.pm blib/lib/Crypt/Password.pm > Manifying blib/man3/Crypt::Password.3 > (/usr/bin/make exited with 0) > CPAN::Reporter: make result is 'pass', No errors. >  DRSTEVE/Crypt-Password-0.05.tar.gz >  /usr/bin/make -- OK > Running make test > PERL_DL_NONLAZY=1 /opt/local/bin/perl "-MExtUtils::Command::MM" "-e" > "test_harness(0, 'inc', 'blib/lib', 'blib/arch')" t/*.t > # set algorithm > # generate salt > # crypt some text > > #   Failed test 'crypted' > #   at t/01-crypt-password.t line 55. > > #   Failed test 'another crypted' > #   at t/01-crypt-password.t line 58. > # documented stuff > > #   Failed test 'Default algorithm, supplied salt' > #   at t/01-crypt-password.t line 68. > > #   Failed test 'md5, no salt' > #   at t/01-crypt-password.t line 73. > > #   Failed test 'sha512, invented salt' > #   at t/01-crypt-password.t line 78. > # CRYPT(3)                 BSD Library Functions Manual > CRYPT(3) > # > # NAME > #      crypt, encrypt, setkey -- DES encryption > # > # SYNOPSIS > #      #include <unistd.h> > # > #      char * > #      crypt(const char *key, const char *salt); > # > #      void > #      encrypt(char *block, int edflag); > # > #      #include <stdlib.h> > # > #      void > #      setkey(const char *key); > # > # DESCRIPTION > #      The crypt() function performs password encryption, based on the > NBS Data > #      Encryption Standard (DES).  Additional code has been added to > deter key > #      search attempts.  The first argument to crypt() is a null-terminated > #      string, typically a user's typed password.  The second is in one > of two > #      forms: if it begins with an underscore (``_''), an extended format is > #      used in interpreting both the key and the salt value, as outlined > below. > # > #    Extended crypt: > #      The key is divided into groups of 8 characters (the last group is > null- > #      padded) and the low-order 7 bits of each each character (56 bits per > #      group) are used to form the DES key as follows: the first group of 56 > #      bits becomes the initial DES key.  For each additional group, the > XOR of > #      the encryption of the current DES key with itself and the group bits > #      becomes the next DES key. > # > #      The salt is a 9-character array consisting of an underscore, > followed by > #      4 bytes of iteration count and 4 bytes of salt.  These are encoded as > #      printable characters, 6 bits per character, least significant > character > #      first.  The values 0 to 63 are encoded as ``./0-9A-Za-z''.  This > allows > #      24 bits for both count and salt. > # > #    Traditional crypt: > #      The first 8 bytes of the key are null-padded, and the low-order 7 > bits of > #      each character is used to form the 56-bit DES key. > # > #      The salt is a 2-character array of the ASCII-encoded salt.  Thus, > only 12 > #      bits of salt are used.  count is set to 25. > # > #    Algorithm: > #      The salt introduces disorder in the DES algorithm in one of > 16777216 or > #      4096 possible ways (ie. with 24 or 12 bits: if bit i of the salt > is set, > #      then bits i and i+24 are swapped in the DES E-box output). > # > #      The DES key is used to encrypt a 64-bit constant, using count > iterations > #      of DES.  The value returned is a null-terminated string, 20 or 13 > bytes > #      (plus null) in length, consisting of the salt, followed by the > encoded > #      64-bit encryption. > # > #      The functions, encrypt() and setkey() provide access to the DES > algorithm > #      itself.  setkey() is passed a 64-byte array of binary values > (numeric 0 > #      or 1).  A 56-bit key is extracted from this array by dividing the > array > #      into groups of 8 and ignoring the last bit in each group.  That > bit is > #      reserved for a byte parity check by DES, but is ignored by these > func- > #      tions. > # > #      The block argument to encrypt() is also a 64-byte array of binary > values. > #      If the value of edflag is 0, block is encrypted; otherwise, it is > #      decrypted.  The result is returned in the original array block, after > #      using the key specified by setkey() to process it. > # > #      The function crypt() returns a pointer to the encrypted value on > success, > #      and NULL on failure. > # > #      The crypt() and setkey() functions all manipulate the same key space. > # > # SEE ALSO > #      login(1), passwd(1), getpass(3), compat(5), passwd(5) > # > # LEGACY SYNOPSIS > #      #include <unistd.h> > # > #      int > #      encrypt(char *block, int edflag); > # > #      The function encrypt() returns 0 on success and 1 on failure. > # > #      void > #      setkey(const char *key); > # > #      The include file <unistd.h> is necessary and sufficient for the > setkey() > #      function. > # > # BUGS > #      The crypt() function returns a pointer to static data, and subsequent > #      calls to crypt() will modify the same object. > # > # HISTORY > #      A rotor-based crypt() function appeared in Version 6 AT&T UNIX. > The cur- > #      rent style crypt() first appeared in Version 7 AT&T UNIX. > # > #      This library (FreeSec 1.0) was developed outside the United States of > #      America as an unencumbered replacement for the U.S.-only libcrypt > encryp- > #      tion library.  Programs linked against the crypt() interface may be > #      exported from the U.S.A. only if they use crypt() solely for > authentica- > #      tion purposes and avoid use of the other programmer interfaces listed > #      above. Special care has been taken in the library so that > programs which > #      only use the crypt() interface do not pull in the other components. > # > # AUTHOR > #      David Burren <davidb@werj.com.au> > # > # FreeSec 1.0                      March 9, 1994 > FreeSec 1.0 > # Looks like you failed 5 tests of 28. > t/01-crypt-password.t .. > Dubious, test returned 5 (wstat 1280, 0x500) > Failed 5/28 subtests > t/90-pod-syntax.t ...... skipped: set TEST_POD or TEST_ALL to enable > this test > t/92-license.t ......... skipped: set TEST_LICENSE or TEST_ALL to enable > this test > t/93-perltidy.t ........ skipped: set TEST_TIDY or TEST_ALL to enable > this test > > Test Summary Report > ------------------- > t/01-crypt-password.t (Wstat: 1280 Tests: 28 Failed: 5) >  Failed tests:  21-22, 26-28 >  Non-zero exit status: 5 > Files=4, Tests=28,  1 wallclock secs ( 0.04 usr  0.02 sys +  0.23 cusr > 0.08 csys =  0.37 CPU) > Result: FAIL > Failed 1/4 test programs. 5/28 subtests failed. > >
On Mon Nov 07 16:34:44 2011, DRSTEVE wrote: Show quoted text
> Hi, cheers, would you be able to chuck me 'perldoc -f crypt' from this > Darwin?
hmms... it is perl 5.14.2, so, should be equal to all perls... but... crypt PLAINTEXT,SALT Creates a digest string exactly like the crypt(3) function in the C library (assuming that you actually have a version there that has not been extirpated as a potential munition). crypt() is a one-way hash function. The PLAINTEXT and SALT are turned into a short string, called a digest, which is returned. The same PLAINTEXT and SALT will always return the same string, but there is no (known) way to get the original PLAINTEXT from the hash. Small changes in the PLAINTEXT or SALT will result in large changes in the digest. There is no decrypt function. This function isn't all that useful for cryptography (for that, look for Crypt modules on your nearby CPAN mirror) and the name "crypt" is a bit of a misnomer. Instead it is primarily used to check if two pieces of text are the same without having to transmit or store the text itself. An example is checking if a correct password is given. The digest of the password is stored, not the password itself. The user types in a password that is crypt()'d with the same salt as the stored digest. If the two digests match, the password is correct. When verifying an existing digest string you should use the digest as the salt (like "crypt($plain, $digest) eq $digest"). The SALT used to create the digest is visible as part of the digest. This ensures crypt() will hash the new string with the same salt as the digest. This allows your code to work with the standard crypt and with more exotic implementations. In other words, assume nothing about the returned string itself nor about how many bytes of SALT may matter. Traditionally the result is a string of 13 bytes: two first bytes of the salt, followed by 11 bytes from the set "[./0-9A-Za-z]", and only the first eight bytes of PLAINTEXT mattered. But alternative hashing schemes (like MD5), higher level security schemes (like C2), and implementations on non- Unix platforms may produce different strings. When choosing a new salt create a random two character string whose characters come from the set "[./0-9A-Za-z]" (like "join '', ('.', '/', 0..9, 'A'..'Z', 'a'..'z')[rand 64, rand 64]"). This set of characters is just a recommendation; the characters allowed in the salt depend solely on your system's crypt library, and Perl can't restrict what salts "crypt()" accepts. Here's an example that makes sure that whoever runs this program knows their password: $pwd = (getpwuid($<))[1]; system "stty -echo"; print "Password: "; chomp($word = <STDIN>); print "\n"; system "stty echo"; if (crypt($word, $pwd) ne $pwd) { die "Sorry...\n"; } else { print "ok\n"; } Of course, typing in your own password to whoever asks you for it is unwise. The crypt function is unsuitable for hashing large quantities of data, not least of all because you can't get the information back. Look at the Digest module for more robust algorithms. If using crypt() on a Unicode string (which potentially has characters with codepoints above 255), Perl tries to make sense of the situation by trying to downgrade (a copy of) the string back to an eight-bit byte string before calling crypt() (on that copy). If that works, good. If not, crypt() dies with "Wide character in crypt".
Subject: Re: [rt.cpan.org #72255] Failing darwin tests
Date: Tue, 8 Nov 2011 11:10:30 +1300
To: bug-Crypt-Password [...] rt.cpan.org
From: Steevo Wymzelico <nostrasteve [...] gmail.com>
Hmm.. Subtle. I get the feeling that $hashed =~ /^\$/ means glibc crypt, with the dollar delimitation, or it's from the DES machine. Need to make it work both ways. Would you mind attaching output of the improved test script from: git://github.com/st3vil/Crypt-Password.git Ta On Tue, Nov 8, 2011 at 10:37 AM, Alberto Simões via RT <bug-Crypt-Password@rt.cpan.org> wrote: Show quoted text
>       Queue: Crypt-Password >  Ticket <URL: https://rt.cpan.org/Ticket/Display.html?id=72255 > > > On Mon Nov 07 16:34:44 2011, DRSTEVE wrote:
>> Hi, cheers, would you be able to chuck me 'perldoc -f crypt' from this >> Darwin?
> > hmms... it is perl 5.14.2, so, should be equal to all perls... but... > > >       crypt PLAINTEXT,SALT >               Creates a digest string exactly like the crypt(3) function in >               the C library (assuming that you actually have a version > there >               that has not been extirpated as a potential munition). > >               crypt() is a one-way hash function.  The PLAINTEXT and > SALT are >               turned into a short string, called a digest, which is > returned. >               The same PLAINTEXT and SALT will always return the same > string, >               but there is no (known) way to get the original PLAINTEXT > from >               the hash.  Small changes in the PLAINTEXT or SALT will result >               in large changes in the digest. > >               There is no decrypt function.  This function isn't all that >               useful for cryptography (for that, look for Crypt modules on >               your nearby CPAN mirror) and the name "crypt" is a bit of a >               misnomer.  Instead it is primarily used to check if two > pieces >               of text are the same without having to transmit or store the >               text itself.  An example is checking if a correct password is >               given.  The digest of the password is stored, not the > password >               itself.  The user types in a password that is crypt()'d with >               the same salt as the stored digest.  If the two digests > match, >               the password is correct. > >               When verifying an existing digest string you should use the >               digest as the salt (like "crypt($plain, $digest) eq > $digest"). >               The SALT used to create the digest is visible as part of the >               digest.  This ensures crypt() will hash the new string > with the >               same salt as the digest.  This allows your code to work with >               the standard crypt and with more exotic implementations.  In >               other words, assume nothing about the returned string itself >               nor about how many bytes of SALT may matter. > >               Traditionally the result is a string of 13 bytes: two first >               bytes of the salt, followed by 11 bytes from the set >               "[./0-9A-Za-z]", and only the first eight bytes of PLAINTEXT >               mattered. But alternative hashing schemes (like MD5), higher >               level security schemes (like C2), and implementations on non- >               Unix platforms may produce different strings. > >               When choosing a new salt create a random two character string >               whose characters come from the set "[./0-9A-Za-z]" (like > "join >               '', ('.', '/', 0..9, 'A'..'Z', 'a'..'z')[rand 64, rand 64]"). >               This set of characters is just a recommendation; the > characters >               allowed in the salt depend solely on your system's crypt >               library, and Perl can't restrict what salts "crypt()" > accepts. > >               Here's an example that makes sure that whoever runs this >               program knows their password: > >                   $pwd = (getpwuid($<))[1]; > >                   system "stty -echo"; >                   print "Password: "; >                   chomp($word = <STDIN>); >                   print "\n"; >                   system "stty echo"; > >                   if (crypt($word, $pwd) ne $pwd) { >                       die "Sorry...\n"; >                   } else { >                       print "ok\n"; >                   } > >               Of course, typing in your own password to whoever asks > you for >               it is unwise. > >               The crypt function is unsuitable for hashing large quantities >               of data, not least of all because you can't get the > information >               back.  Look at the Digest module for more robust algorithms. > >               If using crypt() on a Unicode string (which potentially has >               characters with codepoints above 255), Perl tries to make > sense >               of the situation by trying to downgrade (a copy of) the > string >               back to an eight-bit byte string before calling crypt() (on >               that copy).  If that works, good.  If not, crypt() dies with >               "Wide character in crypt". >
Here it goes :) t/01-crypt-password.t .. 1/? # set algorithm # generate salt # crypt some text # Failed test 'crypted' # at t/01-crypt-password.t line 54. # '$58OMBIIlz/H2' # doesn't match '(?^:^\$5\$(........)\$...........+$)' # Failed test 'another crypted' # at t/01-crypt-password.t line 57. # '$58OMBIIlz/H2' # doesn't match '(?^:^\$5\$(........)\$...........+$)' # documented stuff # Failed test 'Default algorithm, supplied salt' # at t/01-crypt-password.t line 67. # '$5vvFjbkJCcrk' # doesn't match '(?^:^\$5\$salt\$.{43}$)' # Failed test 'md5, no salt' # at t/01-crypt-password.t line 72. # '$1d2n7Q0.r54s' # doesn't match '(?^:^\$1\$\$.{22}$)' # Failed test 'sha512, invented salt' # at t/01-crypt-password.t line 77. # '$6FMi11BJFsAc' # doesn't match '(?^:^\$6\$(.{8})\$.{86}$)' # CRYPT(3) BSD Library Functions Manual CRYPT(3) # # NAME # crypt, encrypt, setkey -- DES encryption # # SYNOPSIS
Subject: Re: [rt.cpan.org #72255] Failing darwin tests
Date: Tue, 8 Nov 2011 11:26:25 +1300
To: bug-Crypt-Password [...] rt.cpan.org
From: Steevo Wymzelico <nostrasteve [...] gmail.com>
One more bunch of experiments and I think I might be ready to refactor... Cactus man. On Tue, Nov 8, 2011 at 11:12 AM, Alberto Simões via RT <bug-Crypt-Password@rt.cpan.org> wrote: Show quoted text
>       Queue: Crypt-Password >  Ticket <URL: https://rt.cpan.org/Ticket/Display.html?id=72255 > > > > Here it goes :) > > t/01-crypt-password.t .. 1/? # set algorithm > # generate salt > # crypt some text > > #   Failed test 'crypted' > #   at t/01-crypt-password.t line 54. > #                   '$58OMBIIlz/H2' > #     doesn't match '(?^:^\$5\$(........)\$...........+$)' > > #   Failed test 'another crypted' > #   at t/01-crypt-password.t line 57. > #                   '$58OMBIIlz/H2' > #     doesn't match '(?^:^\$5\$(........)\$...........+$)' > # documented stuff > > #   Failed test 'Default algorithm, supplied salt' > #   at t/01-crypt-password.t line 67. > #                   '$5vvFjbkJCcrk' > #     doesn't match '(?^:^\$5\$salt\$.{43}$)' > > #   Failed test 'md5, no salt' > #   at t/01-crypt-password.t line 72. > #                   '$1d2n7Q0.r54s' > #     doesn't match '(?^:^\$1\$\$.{22}$)' > > #   Failed test 'sha512, invented salt' > #   at t/01-crypt-password.t line 77. > #                   '$6FMi11BJFsAc' > #     doesn't match '(?^:^\$6\$(.{8})\$.{86}$)' > # CRYPT(3)                 BSD Library Functions Manual > CRYPT(3) > # > # NAME > #      crypt, encrypt, setkey -- DES encryption > # > # SYNOPSIS >
big oops: e[ambs@rachmaninoff Crypt-Password]$ make test Skip blib/lib/Crypt/Password.pm (unchanged) PERL_DL_NONLAZY=1 /opt/local/bin/perl "-MExtUtils::Command::MM" "-e" "test_harness(0, 'inc', 'blib/lib', 'blib/arch')" t/*.t t/01-crypt-password.t .. Missing right curly or square bracket at t/01-crypt-password.t line 98, at end of line syntax error at t/01-crypt-password.t line 98, at EOF Execution of t/01-crypt-password.t aborted due to compilation errors. # Looks like your test exited with 255 before it could output anything. t/01-crypt-password.t .. Dubious, test returned 255 (wstat 65280, 0xff00) No subtests run t/90-pod-syntax.t ...... skipped: set TEST_POD or TEST_ALL to enable this test t/92-license.t ......... skipped: set TEST_LICENSE or TEST_ALL to enable this test t/93-perltidy.t ........ skipped: set TEST_TIDY or TEST_ALL to enable this test
Subject: Re: [rt.cpan.org #72255] Failing darwin tests
Date: Tue, 8 Nov 2011 11:29:19 +1300
To: bug-Crypt-Password [...] rt.cpan.org
From: Steevo Wymzelico <nostrasteve [...] gmail.com>
Pushed fix On Tue, Nov 8, 2011 at 11:28 AM, Alberto Simões via RT <bug-Crypt-Password@rt.cpan.org> wrote: Show quoted text
>       Queue: Crypt-Password >  Ticket <URL: https://rt.cpan.org/Ticket/Display.html?id=72255 > > > big oops: > > e[ambs@rachmaninoff Crypt-Password]$ make test > Skip blib/lib/Crypt/Password.pm (unchanged) > PERL_DL_NONLAZY=1 /opt/local/bin/perl "-MExtUtils::Command::MM" "-e" > "test_harness(0, 'inc', 'blib/lib', 'blib/arch')" t/*.t > t/01-crypt-password.t .. Missing right curly or square bracket at > t/01-crypt-password.t line 98, at end of line > syntax error at t/01-crypt-password.t line 98, at EOF > Execution of t/01-crypt-password.t aborted due to compilation errors. > # Looks like your test exited with 255 before it could output anything. > t/01-crypt-password.t .. Dubious, test returned 255 (wstat 65280, 0xff00) > No subtests run > t/90-pod-syntax.t ...... skipped: set TEST_POD or TEST_ALL to enable > this test > t/92-license.t ......... skipped: set TEST_LICENSE or TEST_ALL to enable > this test > t/93-perltidy.t ........ skipped: set TEST_TIDY or TEST_ALL to enable > this test > >
and here it goes: t/01-crypt-password.t .. 1/? # set algorithm # generate salt # crypt some text # Failed test 'crypted' # at t/01-crypt-password.t line 54. # '$58OMBIIlz/H2' # doesn't match '(?^:^\$5\$(........)\$...........+$)' # Failed test 'another crypted' # at t/01-crypt-password.t line 57. # '$58OMBIIlz/H2' # doesn't match '(?^:^\$5\$(........)\$...........+$)' # documented stuff # Failed test 'Default algorithm, supplied salt' # at t/01-crypt-password.t line 67. # '$5vvFjbkJCcrk' # doesn't match '(?^:^\$5\$salt\$.{43}$)' # Failed test 'md5, no salt' # at t/01-crypt-password.t line 72. # '$1d2n7Q0.r54s' # doesn't match '(?^:^\$1\$\$.{22}$)' # Failed test 'sha512, invented salt' # at t/01-crypt-password.t line 77. # '$6FMi11BJFsAc' # doesn't match '(?^:^\$6\$(.{8})\$.{86}$)' # experiments # $5vvFjbkJCcrk # $5vvFjbkJCcrk # $5vvFjbkJCcrk # $5vvFjbkJCcrk # $5vvFjbkJCcrk # $5vvFjbkJCcrk # $5vvFjbkJCcrk # $5vvFjbkJCcrk # $5vvFjbkJCcrk # $5vvFjbkJCcrk # $5vvFjbkJCcrk # $5vvFjbkJCcrk # on darwin
Subject: Re: [rt.cpan.org #72255] Failing darwin tests
Date: Tue, 8 Nov 2011 11:32:18 +1300
To: bug-Crypt-Password [...] rt.cpan.org
From: Steevo Wymzelico <nostrasteve [...] gmail.com>
Spooky. Thanks for your help I'll wind myself up and do some hacking soon. On Tue, Nov 8, 2011 at 11:30 AM, Alberto Simões via RT <bug-Crypt-Password@rt.cpan.org> wrote: Show quoted text
>       Queue: Crypt-Password >  Ticket <URL: https://rt.cpan.org/Ticket/Display.html?id=72255 > > > and here it goes: > > t/01-crypt-password.t .. 1/? # set algorithm > # generate salt > # crypt some text > > #   Failed test 'crypted' > #   at t/01-crypt-password.t line 54. > #                   '$58OMBIIlz/H2' > #     doesn't match '(?^:^\$5\$(........)\$...........+$)' > > #   Failed test 'another crypted' > #   at t/01-crypt-password.t line 57. > #                   '$58OMBIIlz/H2' > #     doesn't match '(?^:^\$5\$(........)\$...........+$)' > # documented stuff > > #   Failed test 'Default algorithm, supplied salt' > #   at t/01-crypt-password.t line 67. > #                   '$5vvFjbkJCcrk' > #     doesn't match '(?^:^\$5\$salt\$.{43}$)' > > #   Failed test 'md5, no salt' > #   at t/01-crypt-password.t line 72. > #                   '$1d2n7Q0.r54s' > #     doesn't match '(?^:^\$1\$\$.{22}$)' > > #   Failed test 'sha512, invented salt' > #   at t/01-crypt-password.t line 77. > #                   '$6FMi11BJFsAc' > #     doesn't match '(?^:^\$6\$(.{8})\$.{86}$)' > # experiments > # $5vvFjbkJCcrk > # $5vvFjbkJCcrk > # $5vvFjbkJCcrk > # $5vvFjbkJCcrk > # $5vvFjbkJCcrk > # $5vvFjbkJCcrk > # $5vvFjbkJCcrk > # $5vvFjbkJCcrk > # $5vvFjbkJCcrk > # $5vvFjbkJCcrk > # $5vvFjbkJCcrk > # $5vvFjbkJCcrk > # on darwin >
On Mon Nov 07 17:32:25 2011, DRSTEVE wrote: Show quoted text
> Spooky. Thanks for your help I'll wind myself up and do some hacking soon.
Great, thanks me -> bed, now :)
Subject: Re: [rt.cpan.org #72255] Failing darwin tests
Date: Wed, 9 Nov 2011 01:10:32 +1300
To: bug-Crypt-Password [...] rt.cpan.org
From: Steevo Wymzelico <nostrasteve [...] gmail.com>
Pushed some more changes. It might work now. PureSec's crypt() looks pretty crap, though. On Tue, Nov 8, 2011 at 11:33 AM, Alberto Simões via RT <bug-Crypt-Password@rt.cpan.org> wrote: Show quoted text
> Great, thanks
Hey, this is what I get (not that nice :( ) t/01-crypt-password.t .. 1/? # testing Crypt::Password (glib=yes) # os is darwin # /usr/share/doc/libc6 is not present Subroutine Crypt::Password::nothing redefined at t/01-crypt-password.t line 19. # set algorithm # generate salt # crypt some text # $58OMBIIlz/H2 = crypt('hello0', '$5$OmSi6jGu'); # Failed test 'crypted' # at t/01-crypt-password.t line 63. # '$58OMBIIlz/H2' # doesn't match '(?^:^\$5\$(........)\$[a-zA-Z0-9\./]{43}$)' # $58OMBIIlz/H2 = crypt('hello0', '$5$FBr5yq3p'); # Failed test 'another crypted' # at t/01-crypt-password.t line 66. # '$58OMBIIlz/H2' # doesn't match '(?^:^\$5\$(........)\$[a-zA-Z0-9\./]{43}$)' # $58OMBIIlz/H2 = crypt('hello0', '$5$OmSi6jGu'); # documented stuff # $5vvFjbkJCcrk = crypt('password', '$5$salt'); # Failed test 'Default algorithm, supplied salt' # at t/01-crypt-password.t line 97. # '$5vvFjbkJCcrk' # doesn't match '(?^:^\$5\$salt\$.{43}$)' # $1d2n7Q0.r54s = crypt('password', '$1$'); # Failed test 'md5, no salt' # at t/01-crypt-password.t line 102. # '$1d2n7Q0.r54s' # doesn't match '(?^:^\$1\$\$.{22}$)' # $6FMi11BJFsAc = crypt('password', '$6$D\oQz54m'); # Failed test 'sha512, invented salt' # at t/01-crypt-password.t line 107. # '$6FMi11BJFsAc' # doesn't match '(?^:^\$6\$(.{8})\$.{86}$)' Subroutine Crypt::Password::nothing redefined at t/01-crypt-password.t line 112. # experiments # $5vvFjbkJCcrk # $5vvFjbkJCcrk # $5vvFjbkJCcrk # $5vvFjbkJCcrk # $5vvFjbkJCcrk # $5vvFjbkJCcrk # $5vvFjbkJCcrk # $5vvFjbkJCcrk # $5vvFjbkJCcrk # $5vvFjbkJCcrk # $5vvFjbkJCcrk # $5vvFjbkJCcrk # on darwin # `man crypt`:
Subject: Re: [rt.cpan.org #72255] Failing darwin tests
Date: Wed, 9 Nov 2011 01:40:47 +1300
To: bug-Crypt-Password [...] rt.cpan.org
From: Steevo Wymzelico <nostrasteve [...] gmail.com>
And again On Wed, Nov 9, 2011 at 1:18 AM, Alberto Simões via RT <bug-Crypt-Password@rt.cpan.org> wrote: Show quoted text
>       Queue: Crypt-Password >  Ticket <URL: https://rt.cpan.org/Ticket/Display.html?id=72255 >]
Few complains: t/01-crypt-password.t .. 1/? # testing Crypt::Password (glib=no) # os is darwin # /usr/share/doc/libc6 is not present Subroutine Crypt::Password::nothing redefined at t/01-crypt-password.t line 19. # \D3jFzE4KpInM = crypt('hello0', '\D7dG#Wr'); # non-glib password: \D3jFzE4KpInM # Failed test 'password is totally not understood' # at t/01-crypt-password.t line 85. # TyML28sArur.E = crypt('hello0', 'Ty%S#2Dg'); # DFDkLhMbQ7wZ. = crypt('hello0', 'DF'); # _aa.#2Dg.adrP2dILfrE = crypt('hello0', '_aa'); Subroutine Crypt::Password::nothing redefined at t/01-crypt-password.t line 112. # experiments # sa3tHJ3/KuYvI # sa3tHJ3/KuYvI # sa3tHJ3/KuYvI # s.Y8S37dUtYo. # ..UZoIyj/Hy/c # _3333saltQ7L0d6Forhw # _2222saltn4StEHCZFqs # _2222saltn4StEHCZFqs # a2MEKOIcmCijA # a2MEKOIcmCijA # _2222saltn4StEHCZFqs # _2222sult4w.eRGUscoo # on darwin
Subject: Re: [rt.cpan.org #72255] Failing darwin tests
Date: Wed, 9 Nov 2011 02:27:15 +1300
To: bug-Crypt-Password [...] rt.cpan.org
From: Steevo Wymzelico <nostrasteve [...] gmail.com>
Things are getting better, please try again On Wed, Nov 9, 2011 at 1:42 AM, Alberto Simões via RT <bug-Crypt-Password@rt.cpan.org> wrote: Show quoted text
>       Queue: Crypt-Password >  Ticket <URL: https://rt.cpan.org/Ticket/Display.html?id=72255 >
Hey! Tests now take some time to run, but the result looks promising (All tests successful.). There is some junk printed that you might clean up now. Also, not sure why you print the manpage for crypt. Someway to get the manpage on different operating systems through cpantesters? (is just that it is confusing to see a manpage getting printed there). Enough talk, follow the test suite output. [ambs@rachmaninoff Crypt-Password]$ make test PERL_DL_NONLAZY=1 /opt/local/bin/perl "-MExtUtils::Command::MM" "-e" "test_harness(0, 'inc', 'blib/lib', 'blib/arch')" t/*.t t/01-crypt-password.t .. 1/? # testing Crypt::Password (glib=no) # os is darwin # /usr/share/doc/libc6 is not present # _JWGglcOCYTuG.LP4.uA = crypt('hello0', '_JWGglcOC'); # non-glib password: _JWGglcOCYTuG.LP4.uA t/01-crypt-password.t .. 4/? # _NbQalYtpIzm3GoL4XfM = crypt('hello0', '_NbQalYtp'); t/01-crypt-password.t .. 6/? # _DF.alYtpXD9rMlccNQk = crypt('hello0', '_DF'); # __aa.lYtpPAdWnevBWsw = crypt('hello0', '__aa'); # _o5YpH4Ze4v2qY99ugcc = crypt('hello0', '_o5YpH4Ze'); # _DF.pH4ZeeLW6jD4kS2A = crypt('hello0', '_DF'); # __aa.H4ZerMmt75Sgky6 = crypt('hello0', '__aa'); # Yeah: # _o5YpH4Ze4v2qY99ugcc # _DF.pH4ZeeLW6jD4kS2A # __aa.H4ZerMmt75Sgky6 # _JWGglcOCYTuG.LP4.uA # experiments # not the same salt: _salt vs salt.4Ze # _salt.4ZeDJ/7l.nS8RQ # not the same salt: _sal vs sal..4Ze # _sal..4ZePcVPhSd6rOM # not the same salt: _sa vs sa...4Ze # _sa...4Zey827brKJddU # not the same salt: _s vs s....4Ze # _s....4Zepi09KZWd23w # not the same salt: _s vs s....4Ze # _s....4Zepi09KZWd23w # not the same salt: _a vs a....4Ze # _a....4ZevJTbWRp.tfA # not the same salt: _a vs a....4Ze # _a....4ZevJTbWRp.tfA # not the same salt: _a vs a....4Ze # _a....4ZeS4GGeoNTfDk # not the same salt: _ vs .....4Ze # _.....4Ze........... # not the same salt: __3333salt vs _3333sal # __3333salzEJ33DQdM0Q # not the same salt: __2222salt vs _2222sal # __2222sal/BvFFpLe/EA # not the same salt: __2222salt vs _2222sal # __2222sal/BvFFpLe/EA # not the same salt: _a2222salt vs a2222sal # _a2222salkcVqKKYO4UA # not the same salt: _a2222salt vs a2222sal # _a2222salkcVqKKYO4UA # not the same salt: __2222salt vs _2222sal # __2222sal/BvFFpLe/EA # not the same salt: __2222sult vs _2222sul # __2222sulKjsU4wq5o/s # on darwin # `man crypt`: # CRYPT(3) BSD Library Functions Manual CRYPT(3) # # NAME # crypt, encrypt, setkey -- DES encryption # # SYNOPSIS # #include <unistd.h> # # char * # crypt(const char *key, const char *salt); # # void # encrypt(char *block, int edflag); # # #include <stdlib.h> # # void # setkey(const char *key); # # DESCRIPTION # The crypt() function performs password encryption, based on the NBS Data # Encryption Standard (DES). Additional code has been added to deter key # search attempts. The first argument to crypt() is a null-terminated # string, typically a user's typed password. The second is in one of two # forms: if it begins with an underscore (``_''), an extended format is # used in interpreting both the key and the salt value, as outlined below. # # Extended crypt: # The key is divided into groups of 8 characters (the last group is null- # padded) and the low-order 7 bits of each each character (56 bits per # group) are used to form the DES key as follows: the first group of 56 # bits becomes the initial DES key. For each additional group, the XOR of # the encryption of the current DES key with itself and the group bits # becomes the next DES key. # # The salt is a 9-character array consisting of an underscore, followed by # 4 bytes of iteration count and 4 bytes of salt. These are encoded as # printable characters, 6 bits per character, least significant character # first. The values 0 to 63 are encoded as ``./0-9A-Za-z''. This allows # 24 bits for both count and salt. # # Traditional crypt: # The first 8 bytes of the key are null-padded, and the low-order 7 bits of # each character is used to form the 56-bit DES key. # # The salt is a 2-character array of the ASCII-encoded salt. Thus, only 12 # bits of salt are used. count is set to 25. # # Algorithm: # The salt introduces disorder in the DES algorithm in one of 16777216 or # 4096 possible ways (ie. with 24 or 12 bits: if bit i of the salt is set, # then bits i and i+24 are swapped in the DES E-box output). # # The DES key is used to encrypt a 64-bit constant, using count iterations # of DES. The value returned is a null-terminated string, 20 or 13 bytes # (plus null) in length, consisting of the salt, followed by the encoded # 64-bit encryption. # # The functions, encrypt() and setkey() provide access to the DES algorithm # itself. setkey() is passed a 64-byte array of binary values (numeric 0 # or 1). A 56-bit key is extracted from this array by dividing the array # into groups of 8 and ignoring the last bit in each group. That bit is # reserved for a byte parity check by DES, but is ignored by these func- # tions. # # The block argument to encrypt() is also a 64-byte array of binary values. # If the value of edflag is 0, block is encrypted; otherwise, it is # decrypted. The result is returned in the original array block, after # using the key specified by setkey() to process it. # # The function crypt() returns a pointer to the encrypted value on success, # and NULL on failure. # # The crypt() and setkey() functions all manipulate the same key space. # # SEE ALSO # login(1), passwd(1), getpass(3), compat(5), passwd(5) # # LEGACY SYNOPSIS # #include <unistd.h> # # int # encrypt(char *block, int edflag); # # The function encrypt() returns 0 on success and 1 on failure. # # void # setkey(const char *key); # # The include file <unistd.h> is necessary and sufficient for the setkey() # function. # # BUGS # The crypt() function returns a pointer to static data, and subsequent # calls to crypt() will modify the same object. # # HISTORY # A rotor-based crypt() function appeared in Version 6 AT&T UNIX. The cur- # rent style crypt() first appeared in Version 7 AT&T UNIX. # # This library (FreeSec 1.0) was developed outside the United States of # America as an unencumbered replacement for the U.S.-only libcrypt encryp- # tion library. Programs linked against the crypt() interface may be # exported from the U.S.A. only if they use crypt() solely for authentica- # tion purposes and avoid use of the other programmer interfaces listed # above. Special care has been taken in the library so that programs which # only use the crypt() interface do not pull in the other components. # # AUTHOR # David Burren <davidb@werj.com.au> # # FreeSec 1.0 March 9, 1994 FreeSec 1.0 t/01-crypt-password.t .. ok t/90-pod-syntax.t ...... skipped: set TEST_POD or TEST_ALL to enable this test t/92-license.t ......... skipped: set TEST_LICENSE or TEST_ALL to enable this test t/93-perltidy.t ........ skipped: set TEST_TIDY or TEST_ALL to enable this test All tests successful. Files=4, Tests=7, 59 wallclock secs ( 0.04 usr 0.02 sys + 55.05 cusr 0.52 csys = 55.63 CPU) Result: PASS
Subject: Re: [rt.cpan.org #72255] Failing darwin tests
Date: Wed, 9 Nov 2011 03:27:46 +1300
To: bug-Crypt-Password [...] rt.cpan.org
From: Steevo Wymzelico <nostrasteve [...] gmail.com>
heh, weird. We are still at about 30% insanity. Please pull/test again. On Wed, Nov 9, 2011 at 2:47 AM, Alberto Simões via RT <bug-Crypt-Password@rt.cpan.org> wrote: Show quoted text
>       Queue: Crypt-Password >  Ticket <URL: https://rt.cpan.org/Ticket/Display.html?id=72255 > >
easy one: t/01-crypt-password.t .. syntax error at t/01-crypt-password.t line 120, near "unless $p" Execution of t/01-crypt-password.t aborted due to compilation errors. After fixing: a[ambs@rachmaninoff Crypt-Password]$ make test PERL_DL_NONLAZY=1 /opt/local/bin/perl "-MExtUtils::Command::MM" "-e" "test_harness(0, 'inc', 'blib/lib', 'blib/arch')" t/*.t t/01-crypt-password.t .. 1/? # testing Crypt::Password (glib=no) # os is darwin # /usr/share/doc/libc6 is not present # _Bz.Nfyc3EmXYTtIxxfE = crypt('hello0', '_Bz.Nfyc3'); # non-glib password: _Bz.Nfyc3EmXYTtIxxfE t/01-crypt-password.t .. 4/? # _/JwEUc3OvCfYTspO/jk = crypt('hello0', '_/JwEUc3O'); t/01-crypt-password.t .. 5/? # DFDkLhMbQ7wZ. = crypt('hello0', 'DF'); # _aa.o0.?rjfLQI7i9Gok = crypt('hello0', '_aa'); t/01-crypt-password.t .. 7/? # _fkhbDuP1KEgnLdLSiHs = crypt('hello0', '_fkhbDuP1'); # DFDkLhMbQ7wZ. = crypt('hello0', 'DF'); # _aa.o0.?.2hqjM5q.6uE = crypt('hello0', '_aa'); # Yeah: # _fkhbDuP1KEgnLdLSiHs # DFDkLhMbQ7wZ. # _aa.o0.?.2hqjM5q.6uE # _Bz.Nfyc3EmXYTtIxxfE # experiments # not _looks_crypted(): _salt..?Qwnf7dS6ukyQ # not _looks_crypted(): _frNt/tXkCRxp9HpEJCs # not _looks_crypted(): _sgYQI8YKW3GrHtn7ATA # not _looks_crypted(): _11bN8HJzBuFpkFneFRg # not _looks_crypted(): _Ux1X2XNENDLcv8XvbNk # not _looks_crypted(): _6r48uWn21kNFndEHlcQ # not _looks_crypted(): _0Bhbrfbo31XvJ5UQooQ # not _looks_crypted(): _NnyC0Su43z4q07Az3TQ # not _looks_crypted(): _QjJhdcNZWjLClYb6Onk # not _looks_crypted(): _2VoIefiBTCrHMG07i/Y # not _looks_crypted(): _6X4mvZ2cjidmGR06x0M # not _looks_crypted(): _dZZhyvNgESIqX3wRXeY # not _looks_crypted(): _289auIKqVvDl3vs7tGc # not _looks_crypted(): _StwkdT7/q7qMquPdwrs # not _looks_crypted(): _ar82uwUwASHdsO/s5UY # not _looks_crypted(): _MvfdsSRmD19RfljJr1I # not _looks_crypted(): _64KHhnKRvin1d5TMw96 # not _looks_crypted(): _rRf1FEoOZD6aVdcwnek # not _looks_crypted(): _jgQ8CE9rtxluA8W.64A # not _looks_crypted(): _2pXELy79yKQlOs7A1xE # not _looks_crypted(): _NtuwETAzxwDBc3sy4f2 # not _looks_crypted(): _w09N2cSC8PpJn0.6ke. # not _looks_crypted(): _Nxy3UT8Bv3y8RTcMjjk # not _looks_crypted(): _G94ykuWpjID3BvRt7r. # not _looks_crypted(): _yyycP8dJ4I0XjNC5V5g # not _looks_crypted(): _lqSFPGqCIlSQYXssZE2 # not _looks_crypted(): _7K/SYfv3q457DjJp/RM # not _looks_crypted(): _lMGzBo8WR5FiiTsDzco # not _looks_crypted(): _ACwgKdwZ4I4vzzPszkI # not _looks_crypted(): _kqPzN8yJGEVJSltHtw. # not _looks_crypted(): _J4ABRYb4RrHD4dAOzVM # not _looks_crypted(): _LO7aXrrbnX4LqufdXMo # not _looks_crypted(): _NzLUYZOwZcM69hZtYM6 # not _looks_crypted(): _opg05nXD984jCdaSZZs # not _looks_crypted(): _92GnvnbmwBfrwvNfXNY # not _looks_crypted(): _MiMZflaRrxdKgkun1RE # not _looks_crypted(): _vRfFeJWDK9HMSIDYWW. # not _looks_crypted(): _q6MTVFgHhsmwoKbleRQ # not _looks_crypted(): _x2IYgam/HdVlj0ZoXuI # not _looks_crypted(): _0/LcfCGVmbUFB22Fy.6 # not _looks_crypted(): _1ICRyD7aJtZPXZamyys # not _looks_crypted(): _qRi2cxrPDsbVMAGl2ms # not _looks_crypted(): _YgdR0M3l5VrI3Cr702A # not _looks_crypted(): _2K1h4mRCm5kCppb7b8. # not _looks_crypted(): _GXpMVu6ZHm51KGUeX/s # not _looks_crypted(): _LZoNyFGcMjwNyDE4/Nc # not _looks_crypted(): _4yRWbHoV8CtvNJMAaM. # not _looks_crypted(): _lJfIh7G6jPEfkqxtHmw # not _looks_crypted(): _6QNwBSk2mNjnnk6MlG2 # not _looks_crypted(): _40.oiOigCuIJeCB4kOs # not _looks_crypted(): _as9FUxXlT7i3q6G6FIk # not _looks_crypted(): _XdDTCaGEc6xIyyXgYZU # not _looks_crypted(): _KJxX4QmqJkpiBECVuY2 # not _looks_crypted(): _iQmlZSnerAAk31s0ir. # not _looks_crypted(): _froHlEw.6FU2sV3yw/o # not _looks_crypted(): _l6MkQisYPiLPi08X/bI # not _looks_crypted(): _GFa0hV6t6KjoC8KI2tQ # not _looks_crypted(): _ukbBIVR7njeHpw.OtNc # not _looks_crypted(): _V.ThCqtw6u6FfSfYFUU # not _looks_crypted(): _EzYTbA5G5v1NBhK9GyM # not _looks_crypted(): _ILEc0Ks.C5SY6sdNwh2 # not _looks_crypted(): _wlaQbnK8K895ZpZAA2A # not _looks_crypted(): _lXwTXvwXd0IWK53EIBo # not _looks_crypted(): _O9x.uAA99Ct67tbu1vc # not _looks_crypted(): _GB3I4V7Zq8Hj9rO7KgQ # not _looks_crypted(): _EaUopfKHwbOggXqSzvM # not _looks_crypted(): _AnbBWlxbBl3LNo5kPdQ # not _looks_crypted(): _VFj8g6sp/ypoOc3GCgk # not _looks_crypted(): _5kR/Ts4/nmge0S2AHBg # not _looks_crypted(): _8MHo0kRTPvKRnnl2h9s # not _looks_crypted(): _eUHXISa76puQCQZt0mE # not _looks_crypted(): _SIoRRQ1tkRbRgYqblII # not _looks_crypted(): _WUll2FF9DcKHqwgCPec # not _looks_crypted(): _s/evtEx9b3l9.IJZIgU # not _looks_crypted(): _VM5hGirGRAJyqbhrJ7w # not _looks_crypted(): _QeZpqMLGO12PfjSUSbI # not _looks_crypted(): _0MqQGmBv4FrEHmmi08g # not _looks_crypted(): _VA8P0MLQrgVQvFPe5BA # not _looks_crypted(): _3VDJlkW9S9RmWO1awCw # not _looks_crypted(): _hqu11x2gqKqh0ggCVoY # not _looks_crypted(): _72v1zEW.XisB5b6rrWI # not _looks_crypted(): _v8bvXqDWxYomIFzJ/P. # not _looks_crypted(): _a7mALkbbU3fyzENIKd2 # not _looks_crypted(): _IQG6rl5xHKk8OaFpiGU # not _looks_crypted(): _YQ5ds7oZygeV.Zj9iLY # not _looks_crypted(): _bD8y9RYolmLdHnG5Jb2 # not _looks_crypted(): _23bkZLHiOf8iGiFoi8U # not _looks_crypted(): _YKdPg1HAClbx0mf0Cr. # not _looks_crypted(): _Yf9AhhIA1j0zW6ox9Y2 # not _looks_crypted(): _Pqu9PEkWC0eMorC7epg # not _looks_crypted(): _FTndeVW/uBn0h2752iU # not _looks_crypted(): _eV8EGxuWvzC7rcl/Zd6 # not _looks_crypted(): _zxnBR01Ox6n84OG5fNk # not _looks_crypted(): _3jf/id.bvibFN9xTeEM # not _looks_crypted(): _GwRc3E53yFQsk143D5k # not _looks_crypted(): _JjyWaNiTTFOfkZT7kzg # not _looks_crypted(): _IBfs6to7aXQudmCG/vU # not _looks_crypted(): _1bHynJczIcNH5SFlW.o # not _looks_crypted(): _rlQHVwODYJ9q83GIwic Deep recursion on subroutine "Crypt::Password::password" at t/01-crypt-password.t line 113. Deep recursion on subroutine "Crypt::Password::crypt" at /Users/ambs/tmp/Crypt-Password/t/../lib/Crypt/Password.pm line 39. Deep recursion on subroutine "Crypt::Password::_crypt" at /Users/ambs/tmp/Crypt-Password/t/../lib/Crypt/Password.pm line 48. Deep recursion on anonymous subroutine at /Users/ambs/tmp/Crypt-Password/t/../lib/Crypt/Password.pm line 129. # not _looks_crypted(): _TsOTCGsoN5si7SjrDtE # not _looks_crypted(): _A8EnTFIIwgzTZGC8EvU # not _looks_crypted(): _9.GEjJck6TwHVIVGm9k # not _looks_crypted(): _bR.vjUJvVXjqAMy/vec # not _looks_crypted(): _kBmyGse0b2ykClIYSZU # not _looks_crypted(): _IODnzgaNwGYrpPZqFEc # not _looks_crypted(): _z3ucK.Lior9Mmh1Iu4I # not _looks_crypted(): _oB6HYsW6rUcHjjwAWlE # not _looks_crypted(): _wBb3Oz44xm1jU0BQ0uw # not _looks_crypted(): _edNbVUrdCNfw6Z4Tmbw # not _looks_crypted(): _IzYA1fp3v2XAaI8otfA # not _looks_crypted(): _W6DCkH4rHak56HpaKN2 # not _looks_crypted(): _OEfQEzWbS2KuW/13vHM # not _looks_crypted(): _tQsDI1uwB0c9yk2HKZI # not _looks_crypted(): _uV/GzA.kAlu8m4SPK9. # not _looks_crypted(): _p2yOPREn5NH4iHnFACg # not _looks_crypted(): _pA4lTAGYL50zZNH7/EQ # not _looks_crypted(): _OxI6ZQRfpRqyZMoBDWQ # not _looks_crypted(): _KRjUG2Yrt/D5tXWJOUQ # not _looks_crypted(): _poL7QK1mzSkjMvqyJWE # not _looks_crypted(): _ScxyBThD0siUink3OMU # not _looks_crypted(): _KsbrHpKF0qH8MR7vxVA # not _looks_crypted(): _8hqSd4zubUXh4PMEET6 # not _looks_crypted(): _T2nzx78YqcIrsNP53LI # not _looks_crypted(): _e20O006uEIje0CDz4rQ # not _looks_crypted(): _nmI8cgAP4pXwwwhxcWQ and it continues... I'll post the remainder if I have the cpu for it :)
Subject: Re: [rt.cpan.org #72255] Failing darwin tests
Date: Wed, 9 Nov 2011 03:52:48 +1300
To: bug-Crypt-Password [...] rt.cpan.org
From: Steevo Wymzelico <nostrasteve [...] gmail.com>
Okay let's try again. Could you run the script with `perl t/01...`, there are some questionmarks in worrying places... On Wed, Nov 9, 2011 at 3:43 AM, Alberto Simões via RT <bug-Crypt-Password@rt.cpan.org> wrote: Show quoted text
>       Queue: Crypt-Password >  Ticket <URL: https://rt.cpan.org/Ticket/Display.html?id=72255 >
Sorry for the delay. Back for some hours :) [ambs@rachmaninoff Crypt-Password]$ perl -Ilib t/01-crypt-password.t ok 1 - use Crypt::Password; # testing Crypt::Password (glib=no) # os is darwin # /usr/share/doc/libc6 is not present # _9xSfDLI5LjkO0jIAqVc = crypt('hello0', '_9xSfDLI5'); # non-glib password: _9xSfDLI5LjkO0jIAqVc ok 2 - salt comes out in semi-understandable format ok 3 - check the correct password ok 4 - check the wrong password # _hSMvtRO21eZpiVUQy7M = crypt('hello0', '_hSMvtRO2'); ok 5 - check a new password # DFDkLhMbQ7wZ. = crypt('hello0', 'DF'); ok 6 - password with different salt? TODO # _aa.o0.?.2hqjM5q.6uE = crypt('hello0', '_aa'); ok 7 - password with different salt? TODO # _2ESmIpdXwyuenO5OsA. = crypt('hello0', '_2ESmIpdX'); # DFDkLhMbQ7wZ. = crypt('hello0', 'DF'); # _aa.o0.?rjfLQI7i9Gok = crypt('hello0', '_aa'); # Yeah: # _2ESmIpdXwyuenO5OsA. # DFDkLhMbQ7wZ. # _aa.o0.?rjfLQI7i9Gok # _9xSfDLI5LjkO0jIAqVc # experiments # not _looks_crypted(): _salt..?ZpSVegDRS6o # not the same salt: salt vs G7d336sE # doesn't validate: _G7d336sEVSRgEhDtvNc password # _salt..?ZpSVegDRS6o # not _looks_crypted(): _sal.ord.NkblEkUsdoI # not the same salt: sal vs 1BTqsqj9 # doesn't validate: _1BTqsqj9dx8wZtzrsK6 password # _sal.ord.NkblEkUsdoI # sa3tHJ3/KuYvI # not _looks_crypted(): _s.sword.vsaxGkgD5hA # not the same salt: s vs zDo/PrQV # doesn't validate: _zDo/PrQVpl1mBngTJq. password # _s.sword.vsaxGkgD5hA # not _looks_crypted(): _s.sword.vsaxGkgD5hA # not the same salt: s vs rF7yM2gb # doesn't validate: _rF7yM2gbbNFBM3ddzlQ password # _s.sword.vsaxGkgD5hA # not _looks_crypted(): _a.sword.oNs0qRvI11o # not the same salt: a vs Y.Q32LCM # doesn't validate: _Y.Q32LCMCArLp0JpHtg password # _a.sword.oNs0qRvI11o # not _looks_crypted(): _a.sword.oNs0qRvI11o # not the same salt: a vs MtBWfl5y # doesn't validate: _MtBWfl5yfrwUUwNPdXs password # _a.sword.oNs0qRvI11o # not _looks_crypted(): _a.sword.6j9xh1BFt82 # not the same salt: a vs O1R/exLD # doesn't validate: _O1R/exLDqhb4ubpToM6 passwod # _a.sword.6j9xh1BFt82 # not _looks_crypted(): _.sswod.QmTgQRvKZ7Ww # not the same salt: vs m9fe.q7t # doesn't validate: _m9fe.q7tKRqFCnbPVAQ password # _.sswod.QmTgQRvKZ7Ww # not _looks_crypted(): _3333saltQ7L0d6Forhw # not the same salt: 3333salt vs 133GivMY # doesn't validate: _133GivMYF5QLB7ZqWDA password # _3333saltQ7L0d6Forhw # not _looks_crypted(): _2222saltn4StEHCZFqs # not the same salt: 2222salt vs wcGfYnvG # doesn't validate: _wcGfYnvGNetV7LdsgKY password # _2222saltn4StEHCZFqs # not _looks_crypted(): _2222saltn4StEHCZFqs # not the same salt: 2222salt vs e4wVW1Gw # doesn't validate: _e4wVW1GwGxiY1Sv0Ozw password # _2222saltn4StEHCZFqs # not _looks_crypted(): _a2222salkcVqKKYO4UA # not the same salt: a2222salt vs sJjTuoyS # doesn't validate: _sJjTuoySoRDluUmB2QU password # _a2222salkcVqKKYO4UA # not _looks_crypted(): _a2222salkcVqKKYO4UA # not the same salt: a2222salt vs AP7Nhmu/ # doesn't validate: _AP7Nhmu/HU6JDwQ7Kt. password # _a2222salkcVqKKYO4UA # not _looks_crypted(): _2222saltn4StEHCZFqs # not the same salt: 2222salt vs XHN81BsX # doesn't validate: _XHN81BsXo0jM5QKcbyM password # _2222saltn4StEHCZFqs # not _looks_crypted(): _2222sult4w.eRGUscoo # not the same salt: 2222sult vs Mph9D.ua # doesn't validate: _Mph9D.ua9e8L9JlZQr6 password # _2222sult4w.eRGUscoo # on darwin 1..7 [ambs@rachmaninoff Crypt-Password]$
Subject: Re: [rt.cpan.org #72255] Failing darwin tests
Date: Wed, 9 Nov 2011 09:56:12 +1300
To: bug-Crypt-Password [...] rt.cpan.org
From: Steevo Wymzelico <nostrasteve [...] gmail.com>
Yeah I should go to sleep too... By the power vested in me by Jack Daniels I have some more experiments for you. Down to 10% insanity. On Wed, Nov 9, 2011 at 6:25 AM, Alberto Simões via RT <bug-Crypt-Password@rt.cpan.org> wrote: Show quoted text
>       Queue: Crypt-Password >  Ticket <URL: https://rt.cpan.org/Ticket/Display.html?id=72255 >
And here it goes... [ambs@rachmaninoff Crypt-Password]$ make test PERL_DL_NONLAZY=1 /opt/local/bin/perl "-MExtUtils::Command::MM" "-e" "test_harness(0, 'inc', 'blib/lib', 'blib/arch')" t/*.t t/01-crypt-password.t .. 1/? # testing Crypt::Password (glib=no) # os is darwin # /usr/share/doc/libc6 is not present # _m.IXgTEnAaBuDK0AmT6 = crypt('hello0', '_m.IXgTEn'); # non-glib password: _m.IXgTEnAaBuDK0AmT6 t/01-crypt-password.t .. 2/? checking: m.msA7KZuFYCM against: _m.IXgTEnAaBuDK0AmT6 at t/01-crypt-password.t line 81 checking: m.bnP8c5uQKuA against: _m.IXgTEnAaBuDK0AmT6 at t/01-crypt-password.t line 82 # Failed test 'check the wrong password' # at t/01-crypt-password.t line 82. # _garble..Bwv822DD0Hc = crypt('hello0', '_garble'); t/01-crypt-password.t .. 5/? # DFDkLhMbQ7wZ. = crypt('hello0', 'DF'); # _aa.o0.?rjfLQI7i9Gok = crypt('hello0', '_aa'); t/01-crypt-password.t .. 7/? # _m.IXgTEnAaBuDK0AmT6 = crypt('hello0', '_m.IXgTEn'); t/01-crypt-password.t .. 8/? # _blah..?vgz6W3flrXE = crypt('007', '_blah'); # _BLAH.En.lsB8JQSdQGQ = crypt('007', '_BLAH'); t/01-crypt-password.t .. 9/? # _123.??.oSWSMtrBlSU = crypt('123', '_123'); # _123.??.vyR02oTVVPA = crypt('123', '_123'); checking: 12IbR.gJ8wcpc against: _123.??.oSWSMtrBlSU at t/01-crypt-password.t line 89 Failed to match: _123.??.oSWSMtrBlSU at t/01-crypt-password.t line 91 checking: 1.pvRXtsuyNiI against: _123.??.oSWSMtrBlSU at t/01-crypt-password.t line 91 Failed to match: _123.??.oSWSMtrBlSU at t/01-crypt-password.t line 92 checking: 1.zPBSCqJ80/Y against: _123.??.oSWSMtrBlSU at t/01-crypt-password.t line 92 # Failed test 'stringified and back, check incorrect' # at t/01-crypt-password.t line 92. Can't locate object method "check" via package "_123.??.oSWSMtrBlSU" (perhaps you forgot to load "_123.??.oSWSMtrBlSU"?) at t/01-crypt-password.t line 93. # Looks like you failed 2 tests of 13. # Looks like your test exited with 2 just after 13. t/01-crypt-password.t .. Dubious, test returned 2 (wstat 512, 0x200) Failed 2/13 subtests t/90-pod-syntax.t ...... skipped: set TEST_POD or TEST_ALL to enable this test t/92-license.t ......... skipped: set TEST_LICENSE or TEST_ALL to enable this test t/93-perltidy.t ........ skipped: set TEST_TIDY or TEST_ALL to enable this test Test Summary Report ------------------- t/01-crypt-password.t (Wstat: 512 Tests: 13 Failed: 2) Failed tests: 4, 13 Non-zero exit status: 2 Files=4, Tests=13, 32 wallclock secs ( 0.03 usr 0.02 sys + 30.99 cusr 0.27 csys = 31.31 CPU) Result: FAIL Failed 1/4 test programs. 2/13 subtests failed. make: *** [test_dynamic] Error 255 [ambs@rachmaninoff Crypt-Password]$
Subject: Re: [rt.cpan.org #72255] Failing darwin tests
Date: Thu, 10 Nov 2011 03:15:56 +1300
To: bug-Crypt-Password [...] rt.cpan.org
From: Steevo Wymzelico <nostrasteve [...] gmail.com>
yet again. might be the last time, I can't remember. On Wed, Nov 9, 2011 at 10:03 AM, Alberto Simões via RT <bug-Crypt-Password@rt.cpan.org> wrote: Show quoted text
>       Queue: Crypt-Password >  Ticket <URL: https://rt.cpan.org/Ticket/Display.html?id=72255 >
On Wed Nov 09 09:16:11 2011, DRSTEVE wrote: Show quoted text
> yet again. might be the last time, I can't remember.
no problem :) [ambs@rachmaninoff Crypt-Password]$ make cp lib/Crypt/Password.pm blib/lib/Crypt/Password.pm Manifying blib/man3/Crypt::Password.3 [ambs@rachmaninoff Crypt-Password]$ make test PERL_DL_NONLAZY=1 /opt/local/bin/perl "-MExtUtils::Command::MM" "-e" "test_harness(0, 'inc', 'blib/lib', 'blib/arch')" t/*.t t/01-crypt-password.t .. 1/? # testing Crypt::Password (glib=no) # os is darwin # /usr/share/doc/libc6 is not present # _sbX3PyHl7TcA.8RLqZc = crypt('hello0', '_sbX3PyHl'); # non-glib password: _sbX3PyHl7TcA.8RLqZc t/01-crypt-password.t .. 2/? checking: _sbX3PyHl7TcA.8RLqZc against: _sbX3PyHl7TcA.8RLqZc at t/01-crypt-password.t line 81 checking: _sbX3PyHlTWv5JTVyays against: _sbX3PyHl7TcA.8RLqZc at t/01-crypt-password.t line 82 t/01-crypt-password.t .. 4/? # Failed test 'check the wrong password' # at t/01-crypt-password.t line 82. # _garble.?aUzoR8hi9ws = crypt('hello0', '_garble'); t/01-crypt-password.t .. 5/? # DFDkLhMbQ7wZ. = crypt('hello0', 'DF'); # __aa.0.?rVr2Z643sebw = crypt('hello0', '__aa'); # _sbX3PyHl7TcA.8RLqZc = crypt('hello0', '_sbX3PyHl'); t/01-crypt-password.t .. 8/? # _blah..?UN0esbtjX/Ww = crypt('007', '_blah'); # _BLAH.Hl.K4RDcph9rFU = crypt('007', '_BLAH'); t/01-crypt-password.t .. 9/? # _123.??rs.2uz2ibBas = crypt('123', '_123'); # _123.??.RC5J950bE1g = crypt('123', '_123'); checking: _123.??RC5J950bE1g against: _123.??rs.2uz2ibBas at t/01-crypt-password.t line 89 undef salt!? at t/01-crypt-password.t line 91 # Looks like you failed 1 test of 11. # Looks like your test exited with 2 just after 11. t/01-crypt-password.t .. Dubious, test returned 2 (wstat 512, 0x200) Failed 1/11 subtests t/90-pod-syntax.t ...... skipped: set TEST_POD or TEST_ALL to enable this test t/92-license.t ......... skipped: set TEST_LICENSE or TEST_ALL to enable this test t/93-perltidy.t ........ skipped: set TEST_TIDY or TEST_ALL to enable this test Test Summary Report ------------------- t/01-crypt-password.t (Wstat: 512 Tests: 11 Failed: 1) Failed test: 4 Non-zero exit status: 2 Files=4, Tests=11, 22 wallclock secs ( 0.04 usr 0.02 sys + 17.53 cusr 0.25 csys = 17.84 CPU) Result: FAIL Failed 1/4 test programs. 1/11 subtests failed. make: *** [test_dynamic] Error 255 [ambs@rachmaninoff Crypt-Password]$
Subject: Re: [rt.cpan.org #72255] Failing darwin tests
Date: Thu, 10 Nov 2011 05:25:04 +1300
To: bug-Crypt-Password [...] rt.cpan.org
From: Steevo Wymzelico <nostrasteve [...] gmail.com>
Nearly there. On Thu, Nov 10, 2011 at 4:21 AM, Alberto Simões via RT <bug-Crypt-Password@rt.cpan.org> wrote: Show quoted text
>       Queue: Crypt-Password >  Ticket <URL: https://rt.cpan.org/Ticket/Display.html?id=72255 >
different failed test :D sorry. [ambs@rachmaninoff Crypt-Password]$ make test cp lib/Crypt/Password.pm blib/lib/Crypt/Password.pm PERL_DL_NONLAZY=1 /opt/local/bin/perl "-MExtUtils::Command::MM" "-e" "test_harness(0, 'inc', 'blib/lib', 'blib/arch')" t/*.t t/01-crypt-password.t .. 1/? # testing Crypt::Password (glib=no) # os is darwin # /usr/share/doc/libc6 is not present Got args: hello0 at t/01-crypt-password.t line 77 # _Okz5Gqmf5a3hR4DJ5wY = crypt('hello0', '_Okz5Gqmf'); # non-glib password: _Okz5Gqmf5a3hR4DJ5wY t/01-crypt-password.t .. 2/? formed salt: _Okz5Gqmf at t/01-crypt-password.t line 82 checking: _Okz5Gqmf5a3hR4DJ5wY against: _Okz5Gqmf5a3hR4DJ5wY at t/01-crypt-password.t line 82 ?: 1 at t/01-crypt-password.t line 82 "": 1 at t/01-crypt-password.t line 82 : _Okz5Gqmf5a3hR4DJ5wY at t/01-crypt-password.t line 82 t/01-crypt-password.t .. 3/? formed salt: _Okz5Gqmf at t/01-crypt-password.t line 83 checking: _Okz5GqmfhqIxXNGIYXI against: _Okz5Gqmf5a3hR4DJ5wY at t/01-crypt-password.t line 83 ?: 1 at t/01-crypt-password.t line 83 "": at t/01-crypt-password.t line 83 : _Okz5Gqmf5a3hR4DJ5wY at t/01-crypt-password.t line 83 t/01-crypt-password.t .. 4/? Got args: hello0 garble at t/01-crypt-password.t line 84 # _garble.n.YjZpZsMAwY = crypt('hello0', '_garble'); t/01-crypt-password.t .. 5/? Got args: hello0 DF at t/01-crypt-password.t line 85 # DFDkLhMbQ7wZ. = crypt('hello0', 'DF'); Got args: hello0 _aa at t/01-crypt-password.t line 86 # __aa.0.?pVr2Z643sebw = crypt('hello0', '__aa'); Got args: hello0 Okz5Gqmf at t/01-crypt-password.t line 87 # _Okz5Gqmf5a3hR4DJ5wY = crypt('hello0', '_Okz5Gqmf'); t/01-crypt-password.t .. 8/? Got args: 007 blah at t/01-crypt-password.t line 89 # _blah..?`vgz6W3flrXE = crypt('007', '_blah'); Got args: 007 BLAH at t/01-crypt-password.t line 89 # _BLAH.?HMjHeYds3p6 = crypt('007', '_BLAH'); t/01-crypt-password.t .. 9/? Got args: 123 123 at t/01-crypt-password.t line 90 # _123.?03f87tBV2Wvw = crypt('123', '_123'); Got args: 123 123 at t/01-crypt-password.t line 90 # _123.???aZhKmURyKKU = crypt('123', '_123'); formed salt: _123 at t/01-crypt-password.t line 91 checking: _123.?UkfUk0B5Ub2U against: _123.?03f87tBV2Wvw at t/01-crypt-password.t line 91 ?: 1 at t/01-crypt-password.t line 91 "": at t/01-crypt-password.t line 91 : _123.?03f87tBV2Wvw at t/01-crypt-password.t line 91 # Failed test 'check the correct password' # at t/01-crypt-password.t line 91. Got args: _123.?03f87tBV2Wvw at t/01-crypt-password.t line 93 undef salt!? at t/01-crypt-password.t line 95 # Looks like you failed 1 test of 12. # Looks like your test exited with 2 just after 12. t/01-crypt-password.t .. Dubious, test returned 2 (wstat 512, 0x200) Failed 1/12 subtests t/90-pod-syntax.t ...... skipped: set TEST_POD or TEST_ALL to enable this test t/92-license.t ......... skipped: set TEST_LICENSE or TEST_ALL to enable this test t/93-perltidy.t ........ skipped: set TEST_TIDY or TEST_ALL to enable this test Test Summary Report ------------------- t/01-crypt-password.t (Wstat: 512 Tests: 12 Failed: 1) Failed test: 11 Non-zero exit status: 2 Files=4, Tests=12, 24 wallclock secs ( 0.05 usr 0.02 sys + 18.92 cusr 0.25 csys = 19.24 CPU) Result: FAIL Failed 1/4 test programs. 1/12 subtests failed. make: *** [test_dynamic] Error 255
Subject: Re: [rt.cpan.org #72255] Failing darwin tests
Date: Thu, 10 Nov 2011 06:54:41 +1300
To: bug-Crypt-Password [...] rt.cpan.org
From: Steevo Wymzelico <nostrasteve [...] gmail.com>
Hi, one more little tweak. Could you also perl just the one test file... The output looks mixed up. On Thu, Nov 10, 2011 at 6:45 AM, Alberto Simões via RT <bug-Crypt-Password@rt.cpan.org> wrote: Show quoted text
>       Queue: Crypt-Password >  Ticket <URL: https://rt.cpan.org/Ticket/Display.html?id=72255 > > > different failed test :D sorry. > > [ambs@rachmaninoff Crypt-Password]$ make test > cp lib/Crypt/Password.pm blib/lib/Crypt/Password.pm > PERL_DL_NONLAZY=1 /opt/local/bin/perl "-MExtUtils::Command::MM" "-e" > "test_harness(0, 'inc', 'blib/lib', 'blib/arch')" t/*.t > t/01-crypt-password.t .. 1/? # testing Crypt::Password (glib=no) > # os is darwin > # /usr/share/doc/libc6 is not present > Got args: hello0 >  at t/01-crypt-password.t line 77 > # _Okz5Gqmf5a3hR4DJ5wY = crypt('hello0', '_Okz5Gqmf'); > # non-glib password: _Okz5Gqmf5a3hR4DJ5wY > t/01-crypt-password.t .. 2/? formed salt: _Okz5Gqmf at > t/01-crypt-password.t line 82 > > > checking: _Okz5Gqmf5a3hR4DJ5wY > against:  _Okz5Gqmf5a3hR4DJ5wY >  at t/01-crypt-password.t line 82 > ?: 1 at t/01-crypt-password.t line 82 > "": 1 at t/01-crypt-password.t line 82 > : _Okz5Gqmf5a3hR4DJ5wY at t/01-crypt-password.t line 82 > t/01-crypt-password.t .. 3/? formed salt: _Okz5Gqmf at > t/01-crypt-password.t line 83 > > > checking: _Okz5GqmfhqIxXNGIYXI > against:  _Okz5Gqmf5a3hR4DJ5wY >  at t/01-crypt-password.t line 83 > ?: 1 at t/01-crypt-password.t line 83 > "":  at t/01-crypt-password.t line 83 > : _Okz5Gqmf5a3hR4DJ5wY at t/01-crypt-password.t line 83 > t/01-crypt-password.t .. 4/? Got args: hello0 garble >  at t/01-crypt-password.t line 84 > # _garble.n.YjZpZsMAwY = crypt('hello0', '_garble'); > t/01-crypt-password.t .. 5/? Got args: hello0 DF >  at t/01-crypt-password.t line 85 > # DFDkLhMbQ7wZ. = crypt('hello0', 'DF'); > Got args: hello0 _aa >  at t/01-crypt-password.t line 86 > # __aa.0.?pVr2Z643sebw = crypt('hello0', '__aa'); > Got args: hello0 Okz5Gqmf >  at t/01-crypt-password.t line 87 > # _Okz5Gqmf5a3hR4DJ5wY = crypt('hello0', '_Okz5Gqmf'); > t/01-crypt-password.t .. 8/? Got args: 007 blah >  at t/01-crypt-password.t line 89 > # _blah..?`vgz6W3flrXE = crypt('007', '_blah'); > Got args: 007 BLAH >  at t/01-crypt-password.t line 89 > # _BLAH.?HMjHeYds3p6 = crypt('007', '_BLAH'); > t/01-crypt-password.t .. 9/? Got args: 123 123 >  at t/01-crypt-password.t line 90 > # _123.?03f87tBV2Wvw = crypt('123', '_123'); > Got args: 123 123 >  at t/01-crypt-password.t line 90 > # _123.???aZhKmURyKKU = crypt('123', '_123'); > formed salt: _123 at t/01-crypt-password.t line 91 > > > checking: _123.?UkfUk0B5Ub2U > against:  _123.?03f87tBV2Wvw >  at t/01-crypt-password.t line 91 > ?: 1 at t/01-crypt-password.t line 91 > "":  at t/01-crypt-password.t line 91 > : _123.?03f87tBV2Wvw at t/01-crypt-password.t line 91 > > #   Failed test 'check the correct password' > #   at t/01-crypt-password.t line 91. > Got args: _123.?03f87tBV2Wvw >  at t/01-crypt-password.t line 93 > undef salt!? at t/01-crypt-password.t line 95 > # Looks like you failed 1 test of 12. > # Looks like your test exited with 2 just after 12. > t/01-crypt-password.t .. Dubious, test returned 2 (wstat 512, 0x200) > Failed 1/12 subtests > t/90-pod-syntax.t ...... skipped: set TEST_POD or TEST_ALL to enable > this test > t/92-license.t ......... skipped: set TEST_LICENSE or TEST_ALL to enable > this test > t/93-perltidy.t ........ skipped: set TEST_TIDY or TEST_ALL to enable > this test > > Test Summary Report > ------------------- > t/01-crypt-password.t (Wstat: 512 Tests: 12 Failed: 1) >  Failed test:  11 >  Non-zero exit status: 2 > Files=4, Tests=12, 24 wallclock secs ( 0.05 usr  0.02 sys + 18.92 cusr > 0.25 csys = 19.24 CPU) > Result: FAIL > Failed 1/4 test programs. 1/12 subtests failed. > make: *** [test_dynamic] Error 255 >
Noticed a new push, so... [ambs@rachmaninoff Crypt-Password]$ make test cp lib/Crypt/Password.pm blib/lib/Crypt/Password.pm PERL_DL_NONLAZY=1 /opt/local/bin/perl "-MExtUtils::Command::MM" "-e" "test_harness(0, 'inc', 'blib/lib', 'blib/arch')" t/*.t t/01-crypt-password.t .. 1/? # testing Crypt::Password (glib=no) # os is darwin # /usr/share/doc/libc6 is not present Got args: hello0 at t/01-crypt-password.t line 77 t/01-crypt-password.t .. 2/? # _UcoGET9Qckov0XkB0mw = crypt('hello0', '_UcoGET9Q'); # non-glib password: _UcoGET9Qckov0XkB0mw plaintext: hello0 salt: _UcoGET9Q at t/01-crypt-password.t line 82 checking: _UcoGET9Qckov0XkB0mw against: _UcoGET9Qckov0XkB0mw at t/01-crypt-password.t line 82 ?: 1 at t/01-crypt-password.t line 82 "": 1 at t/01-crypt-password.t line 82 : _UcoGET9Qckov0XkB0mw at t/01-crypt-password.t line 82 t/01-crypt-password.t .. 3/? plaintext: helow salt: _UcoGET9Q at t/01-crypt-password.t line 83 t/01-crypt-password.t .. 4/? checking: _UcoGET9Ql3SVDxDWRJ6 against: _UcoGET9Qckov0XkB0mw at t/01-crypt-password.t line 83 ?: 1 at t/01-crypt-password.t line 83 "": at t/01-crypt-password.t line 83 : _UcoGET9Qckov0XkB0mw at t/01-crypt-password.t line 83 Got args: hello0 garble at t/01-crypt-password.t line 84 # _garble.n.YjZpZsMAwY = crypt('hello0', '_garble'); t/01-crypt-password.t .. 5/? Got args: hello0 DF at t/01-crypt-password.t line 85 # DFDkLhMbQ7wZ. = crypt('hello0', 'DF'); Got args: hello0 _aa at t/01-crypt-password.t line 86 # __aa.0.?YHuReHEUBS6 = crypt('hello0', '__aa'); Got args: hello0 UcoGET9Q at t/01-crypt-password.t line 87 # _UcoGET9Qckov0XkB0mw = crypt('hello0', '_UcoGET9Q'); t/01-crypt-password.t .. 8/? Got args: 007 blah at t/01-crypt-password.t line 89 # _blah..?0E1r97FYMW6 = crypt('007', '_blah'); Got args: 007 BLAH at t/01-crypt-password.t line 89 # _BLAH.??XEhxs1/g.Xw = crypt('007', '_BLAH'); t/01-crypt-password.t .. 9/? Got args: 123 123 at t/01-crypt-password.t line 90 # _123.??pwmkiKz2b9AA = crypt('123', '_123'); Got args: 123 123 at t/01-crypt-password.t line 90 # _123.??.RC5J950bE1g = crypt('123', '_123'); plaintext: 123 salt: _123 at t/01-crypt-password.t line 91 checking: _123.??AdL12Nt8W7U6 against: _123.??pwmkiKz2b9AA at t/01-crypt-password.t line 91 ?: 1 at t/01-crypt-password.t line 91 "": at t/01-crypt-password.t line 91 : _123.??pwmkiKz2b9AA at t/01-crypt-password.t line 91 # Failed test 'check the correct password' # at t/01-crypt-password.t line 91. Got args: _123.??pwmkiKz2b9AA at t/01-crypt-password.t line 93 undef salt!? at t/01-crypt-password.t line 95 # Looks like you failed 1 test of 12. # Looks like your test exited with 2 just after 12. t/01-crypt-password.t .. Dubious, test returned 2 (wstat 512, 0x200) Failed 1/12 subtests t/90-pod-syntax.t ...... skipped: set TEST_POD or TEST_ALL to enable this test t/92-license.t ......... skipped: set TEST_LICENSE or TEST_ALL to enable this test t/93-perltidy.t ........ skipped: set TEST_TIDY or TEST_ALL to enable this test Test Summary Report ------------------- t/01-crypt-password.t (Wstat: 512 Tests: 12 Failed: 1) Failed test: 11 Non-zero exit status: 2 Files=4, Tests=12, 27 wallclock secs ( 0.04 usr 0.03 sys + 24.65 cusr 0.24 csys = 24.96 CPU) Result: FAIL Failed 1/4 test programs. 1/12 subtests failed. make: *** [test_dynamic] Error 255
Subject: Re: [rt.cpan.org #72255] Failing darwin tests
Date: Thu, 10 Nov 2011 10:04:23 +1300
To: bug-Crypt-Password [...] rt.cpan.org
From: Steevo Wymzelico <nostrasteve [...] gmail.com>
Cool, try again. I'm nearly at a loss but we're down to just one thing it seems. On Thu, Nov 10, 2011 at 9:48 AM, Alberto Simões via RT <bug-Crypt-Password@rt.cpan.org> wrote: Show quoted text
>       Queue: Crypt-Password >  Ticket <URL: https://rt.cpan.org/Ticket/Display.html?id=72255 > > > Noticed a new push, so... > > [ambs@rachmaninoff Crypt-Password]$ make test > cp lib/Crypt/Password.pm blib/lib/Crypt/Password.pm > PERL_DL_NONLAZY=1 /opt/local/bin/perl "-MExtUtils::Command::MM" "-e" > "test_harness(0, 'inc', 'blib/lib', 'blib/arch')" t/*.t > t/01-crypt-password.t .. 1/? # testing Crypt::Password (glib=no) > # os is darwin > # /usr/share/doc/libc6 is not present > Got args: hello0 >  at t/01-crypt-password.t line 77 > t/01-crypt-password.t .. 2/? # _UcoGET9Qckov0XkB0mw = crypt('hello0', > '_UcoGET9Q'); > # non-glib password: _UcoGET9Qckov0XkB0mw > plaintext: hello0    salt: _UcoGET9Q at t/01-crypt-password.t line 82 > > > checking: _UcoGET9Qckov0XkB0mw > against:  _UcoGET9Qckov0XkB0mw >  at t/01-crypt-password.t line 82 > ?: 1 at t/01-crypt-password.t line 82 > "": 1 at t/01-crypt-password.t line 82 > : _UcoGET9Qckov0XkB0mw at t/01-crypt-password.t line 82 > t/01-crypt-password.t .. 3/? plaintext: helow    salt: _UcoGET9Q at > t/01-crypt-password.t line 83 > t/01-crypt-password.t .. 4/? > > checking: _UcoGET9Ql3SVDxDWRJ6 > against:  _UcoGET9Qckov0XkB0mw >  at t/01-crypt-password.t line 83 > ?: 1 at t/01-crypt-password.t line 83 > "":  at t/01-crypt-password.t line 83 > : _UcoGET9Qckov0XkB0mw at t/01-crypt-password.t line 83 > Got args: hello0 garble >  at t/01-crypt-password.t line 84 > # _garble.n.YjZpZsMAwY = crypt('hello0', '_garble'); > t/01-crypt-password.t .. 5/? Got args: hello0 DF >  at t/01-crypt-password.t line 85 > # DFDkLhMbQ7wZ. = crypt('hello0', 'DF'); > Got args: hello0 _aa >  at t/01-crypt-password.t line 86 > # __aa.0.?YHuReHEUBS6 = crypt('hello0', '__aa'); > Got args: hello0 UcoGET9Q >  at t/01-crypt-password.t line 87 > # _UcoGET9Qckov0XkB0mw = crypt('hello0', '_UcoGET9Q'); > t/01-crypt-password.t .. 8/? Got args: 007 blah >  at t/01-crypt-password.t line 89 > # _blah..?0E1r97FYMW6 = crypt('007', '_blah'); > Got args: 007 BLAH >  at t/01-crypt-password.t line 89 > # _BLAH.??XEhxs1/g.Xw = crypt('007', '_BLAH'); > t/01-crypt-password.t .. 9/? Got args: 123 123 >  at t/01-crypt-password.t line 90 > # _123.??pwmkiKz2b9AA = crypt('123', '_123'); > Got args: 123 123 >  at t/01-crypt-password.t line 90 > # _123.??.RC5J950bE1g = crypt('123', '_123'); > plaintext: 123    salt: _123 at t/01-crypt-password.t line 91 > > > checking: _123.??AdL12Nt8W7U6 > against:  _123.??pwmkiKz2b9AA >  at t/01-crypt-password.t line 91 > ?: 1 at t/01-crypt-password.t line 91 > "":  at t/01-crypt-password.t line 91 > : _123.??pwmkiKz2b9AA at t/01-crypt-password.t line 91 > > #   Failed test 'check the correct password' > #   at t/01-crypt-password.t line 91. > Got args: _123.??pwmkiKz2b9AA >  at t/01-crypt-password.t line 93 > undef salt!? at t/01-crypt-password.t line 95 > # Looks like you failed 1 test of 12. > # Looks like your test exited with 2 just after 12. > t/01-crypt-password.t .. Dubious, test returned 2 (wstat 512, 0x200) > Failed 1/12 subtests > t/90-pod-syntax.t ...... skipped: set TEST_POD or TEST_ALL to enable > this test > t/92-license.t ......... skipped: set TEST_LICENSE or TEST_ALL to enable > this test > t/93-perltidy.t ........ skipped: set TEST_TIDY or TEST_ALL to enable > this test > > Test Summary Report > ------------------- > t/01-crypt-password.t (Wstat: 512 Tests: 12 Failed: 1) >  Failed test:  11 >  Non-zero exit status: 2 > Files=4, Tests=12, 27 wallclock secs ( 0.04 usr  0.03 sys + 24.65 cusr > 0.24 csys = 24.96 CPU) > Result: FAIL > Failed 1/4 test programs. 1/12 subtests failed. > make: *** [test_dynamic] Error 255 >
Subject: Re: [rt.cpan.org #72255] Failing darwin tests
Date: Thu, 10 Nov 2011 10:08:58 +1300
To: bug-Crypt-Password [...] rt.cpan.org
From: Steevo Wymzelico <nostrasteve [...] gmail.com>
Pushed again some more testing. What's happening on line 142-144 if the 2 < salt < 5 is interesting. On Thu, Nov 10, 2011 at 10:04 AM, Steevo Wymzelico <nostrasteve@gmail.com> wrote: Show quoted text
> Cool, try again. I'm nearly at a loss but we're down to just one thing it seems. > > On Thu, Nov 10, 2011 at 9:48 AM, Alberto Simões via RT > <bug-Crypt-Password@rt.cpan.org> wrote:
>>       Queue: Crypt-Password >>  Ticket <URL: https://rt.cpan.org/Ticket/Display.html?id=72255 >>>
Be careful, as you are using 'say' and you didn't 'use feature 'say'' and, probably, you do not want to use say in the final release :) [ambs@rachmaninoff Crypt-Password]$ perl t/01-crypt-password.t ok 1 - use Crypt::Password; # testing Crypt::Password (glib=no) # os is darwin # /usr/share/doc/libc6 is not present Got args: hello0 at t/01-crypt-password.t line 77 # _3AkGbgNNa6UTxXfnHEA = crypt('hello0', '_3AkGbgNN'); # non-glib password: _3AkGbgNNa6UTxXfnHEA ok 2 - salt comes out in understandable format check: hello0 _3AkGbgNN at t/01-crypt-password.t line 82 checking: _3AkGbgNNa6UTxXfnHEA against: _3AkGbgNNa6UTxXfnHEA at t/01-crypt-password.t line 82 orded: 88 orded: 88 ok 3 - check the correct password check: helow _3AkGbgNN at t/01-crypt-password.t line 83 checking: _3AkGbgNN9xVxMxjjh2o against: _3AkGbgNNa6UTxXfnHEA at t/01-crypt-password.t line 83 orded: 120 orded: 88 ok 4 - check the wrong password Got args: hello0 garble at t/01-crypt-password.t line 84 # _garble.Bwv822DD0Hc = crypt('hello0', '_garble'); ok 5 - compare a password - wrong salt Got args: hello0 DF at t/01-crypt-password.t line 85 # DFDkLhMbQ7wZ. = crypt('hello0', 'DF'); ok 6 - compare a password - wrong salt Got args: hello0 _aa at t/01-crypt-password.t line 86 # __aa.0.?8UyJQnFkRv6 = crypt('hello0', '__aa'); ok 7 - compare a password - wrong salt Got args: hello0 3AkGbgNN at t/01-crypt-password.t line 87 # _3AkGbgNNa6UTxXfnHEA = crypt('hello0', '_3AkGbgNN'); ok 8 - compare a password - correct salt Got args: 007 blah at t/01-crypt-password.t line 89 # _blah..?DkQi0k.Kaxc = crypt('007', '_blah'); Got args: 007 BLAH at t/01-crypt-password.t line 89 # _BLAH. ?pZuVo0X2QJ6. = crypt('007', '_BLAH'); ok 9 - compare a password - wrong salt Got args: 123 123 at t/01-crypt-password.t line 90 # _123.?@RC5J950bE1g = crypt('123', '_123'); Got args: 123 123 at t/01-crypt-password.t line 90 # _123. ?RC5J950bE1g = crypt('123', '_123'); ok 10 - compare a password - correct salt check: 123 _123 at t/01-crypt-password.t line 91 checking: _123.??@1RpOUNaAGBY against: _123.?@RC5J950bE1g at t/01-crypt-password.t line 91 orded: 78 orded: 53 not ok 11 - check the correct password # Failed test 'check the correct password' # at t/01-crypt-password.t line 91. # # # Got args: abcd abcd at t/01-crypt-password.t line 94 # _abcd.??D7mH.Jv9qG. = crypt('abcd', '_abcd'); # _abcd.??D7mH.Jv9qG. check: abcd _abcd at t/01-crypt-password.t line 96 checking: _abcd.??D7mH.Jv9qG. against: _abcd.??D7mH.Jv9qG. at t/01-crypt-password.t line 96 orded: 74 orded: 74 not ok 12 - check correct # Failed test 'check correct' # at t/01-crypt-password.t line 96. check: gbbbg _abcd at t/01-crypt-password.t line 97 checking: _abcd.? 9NF1kVzVV56 against: _abcd.??D7mH.Jv9qG. at t/01-crypt-password.t line 97 orded: 86 orded: 74 ok 13 - check incorrect Got args: aa b at t/01-crypt-password.t line 99 # _b.d.?UymJebxYNK6o = crypt('aa', '_b'); check: aa _b at t/01-crypt-password.t line 99 checking: _b.?[??O4YXMZE117. against: _b.d.?UymJebxYNK6o at t/01-crypt-password.t line 99 orded: 90 orded: 120 not ok 14 - -b # Failed test '-b' # at t/01-crypt-password.t line 99. Got args: aa bb at t/01-crypt-password.t line 100 # bbxItEcT3CSMs = crypt('aa', 'bb'); check: aa bb at t/01-crypt-password.t line 100 checking: bbxItEcT3CSMs against: bbxItEcT3CSMs at t/01-crypt-password.t line 100 orded: 84 orded: 84 ok 15 - -b Got args: aa bbb at t/01-crypt-password.t line 101 # _bbb. ?uWkJWLoI7H6 = crypt('aa', '_bbb'); check: aa _bbb at t/01-crypt-password.t line 101 checking: _bbb.?@n/niHcNVjlk against: _bbb. ?uWkJWLoI7H6 at t/01-crypt-password.t line 101 orded: 99 orded: 76 not ok 16 - -b # Failed test '-b' # at t/01-crypt-password.t line 101. Got args: aa bbbb at t/01-crypt-password.t line 102 # _bbbb.?p4osQuyzWAoA = crypt('aa', '_bbbb'); check: aa _bbbb at t/01-crypt-password.t line 102 checking: _bbbb.??eN2JE46HJY6 against: _bbbb.?p4osQuyzWAoA at t/01-crypt-password.t line 102 orded: 52 orded: 121 not ok 17 - -b # Failed test '-b' # at t/01-crypt-password.t line 102. Got args: aa bbbbb at t/01-crypt-password.t line 103 # _bbbbb.?0/JvUmcbhADM = crypt('aa', '_bbbbb'); check: aa _bbbbb at t/01-crypt-password.t line 103 checking: _bbbbb.?0/JvUmcbhADM against: _bbbbb.?0/JvUmcbhADM at t/01-crypt-password.t line 103 orded: 99 orded: 99 ok 18 - -b Got args: aa bbbbbb at t/01-crypt-password.t line 104 # _bbbbbb.?SxdMPruCo9E = crypt('aa', '_bbbbbb'); check: aa _bbbbbb at t/01-crypt-password.t line 104 checking: _bbbbbb.phmD4EuCSadY against: _bbbbbb.?SxdMPruCo9E at t/01-crypt-password.t line 104 orded: 117 orded: 114 not ok 19 - -b # Failed test '-b' # at t/01-crypt-password.t line 104. Got args: aa bbbbbbb at t/01-crypt-password.t line 105 # _bbbbbbb.hT80un9yvLs = crypt('aa', '_bbbbbbb'); check: aa _bbbbbbb at t/01-crypt-password.t line 105 checking: _bbbbbbb.hT80un9yvLs against: _bbbbbbb.hT80un9yvLs at t/01-crypt-password.t line 105 orded: 110 orded: 110 ok 20 - -b Got args: aa bbbbbbbb at t/01-crypt-password.t line 106 # _bbbbbbbbB5GuuBxB5uk = crypt('aa', '_bbbbbbbb'); check: aa _bbbbbbbb at t/01-crypt-password.t line 106 checking: _bbbbbbbbB5GuuBxB5uk against: _bbbbbbbbB5GuuBxB5uk at t/01-crypt-password.t line 106 orded: 66 orded: 66 ok 21 - -b Got args: aa bbbbbbbbb at t/01-crypt-password.t line 107 # _bbbbbbbbB5GuuBxB5uk = crypt('aa', '_bbbbbbbbb'); check: aa _bbbbbbbbb at t/01-crypt-password.t line 107 checking: _bbbbbbbbB5GuuBxB5uk against: _bbbbbbbbB5GuuBxB5uk at t/01-crypt-password.t line 107 orded: 66 orded: 66 ok 22 - -b Got args: _123.?@RC5J950bE1g at t/01-crypt-password.t line 109 ok 23 - stringified and back undef salt!? at t/01-crypt-password.t line 111 1..23 # Looks like you failed 6 tests of 23. # Looks like your test exited with 2 just after 23. [ambs@rachmaninoff Crypt-Password]$
Subject: Re: [rt.cpan.org #72255] Failing darwin tests
Date: Thu, 10 Nov 2011 10:41:21 +1300
To: bug-Crypt-Password [...] rt.cpan.org
From: Steevo Wymzelico <nostrasteve [...] gmail.com>
Right, I think it wants a salt to be either 2 or 5 characters... Try again? On Thu, Nov 10, 2011 at 10:20 AM, Alberto Simões via RT <bug-Crypt-Password@rt.cpan.org> wrote: Show quoted text
>       Queue: Crypt-Password >  Ticket <URL: https://rt.cpan.org/Ticket/Display.html?id=72255 > > > Be careful, as you are using 'say' and you didn't 'use feature 'say'' > and, probably, you do not want to use say in the final release :) > > > [ambs@rachmaninoff Crypt-Password]$ perl t/01-crypt-password.t > ok 1 - use Crypt::Password; > # testing Crypt::Password (glib=no) > # os is darwin > # /usr/share/doc/libc6 is not present > Got args: hello0 >  at t/01-crypt-password.t line 77 > # _3AkGbgNNa6UTxXfnHEA = crypt('hello0', '_3AkGbgNN'); > # non-glib password: _3AkGbgNNa6UTxXfnHEA > ok 2 - salt comes out in understandable format > check: hello0 _3AkGbgNN at t/01-crypt-password.t line 82 > > > checking: _3AkGbgNNa6UTxXfnHEA > against:  _3AkGbgNNa6UTxXfnHEA >  at t/01-crypt-password.t line 82 > orded: 88 > orded: 88 > ok 3 - check the correct password > check: helow _3AkGbgNN at t/01-crypt-password.t line 83 > > > checking: _3AkGbgNN9xVxMxjjh2o > against:  _3AkGbgNNa6UTxXfnHEA >  at t/01-crypt-password.t line 83 > orded: 120 > orded: 88 > ok 4 - check the wrong password > Got args: hello0 garble >  at t/01-crypt-password.t line 84 > # _garble.Bwv822DD0Hc = crypt('hello0', '_garble'); > ok 5 - compare a password - wrong salt > Got args: hello0 DF >  at t/01-crypt-password.t line 85 > # DFDkLhMbQ7wZ. = crypt('hello0', 'DF'); > ok 6 - compare a password - wrong salt > Got args: hello0 _aa >  at t/01-crypt-password.t line 86 > # __aa.0.?8UyJQnFkRv6 = crypt('hello0', '__aa'); > ok 7 - compare a password - wrong salt > Got args: hello0 3AkGbgNN >  at t/01-crypt-password.t line 87 > # _3AkGbgNNa6UTxXfnHEA = crypt('hello0', '_3AkGbgNN'); > ok 8 - compare a password - correct salt > Got args: 007 blah >  at t/01-crypt-password.t line 89 > # _blah..?DkQi0k.Kaxc = crypt('007', '_blah'); > Got args: 007 BLAH >  at t/01-crypt-password.t line 89 > # _BLAH. >        ?pZuVo0X2QJ6. = crypt('007', '_BLAH'); > ok 9 - compare a password - wrong salt > Got args: 123 123 >  at t/01-crypt-password.t line 90 > # _123.?@RC5J950bE1g = crypt('123', '_123'); > Got args: 123 123 >  at t/01-crypt-password.t line 90 > # _123. >       ?RC5J950bE1g = crypt('123', '_123'); > ok 10 - compare a password - correct salt > check: 123 _123 at t/01-crypt-password.t line 91 > > > checking: _123.??@1RpOUNaAGBY > against:  _123.?@RC5J950bE1g >  at t/01-crypt-password.t line 91 > orded: 78 > orded: 53 > not ok 11 - check the correct password > #   Failed test 'check the correct password' > #   at t/01-crypt-password.t line 91. > # > # > # > Got args: abcd abcd >  at t/01-crypt-password.t line 94 > # _abcd.??D7mH.Jv9qG. = crypt('abcd', '_abcd'); > # _abcd.??D7mH.Jv9qG. > check: abcd _abcd at t/01-crypt-password.t line 96 > > > checking: _abcd.??D7mH.Jv9qG. > against:  _abcd.??D7mH.Jv9qG. >  at t/01-crypt-password.t line 96 > orded: 74 > orded: 74 > not ok 12 - check correct > #   Failed test 'check correct' > #   at t/01-crypt-password.t line 96. > check: gbbbg _abcd at t/01-crypt-password.t line 97 > > > checking: _abcd.? 9NF1kVzVV56 > against:  _abcd.??D7mH.Jv9qG. >  at t/01-crypt-password.t line 97 > orded: 86 > orded: 74 > ok 13 - check incorrect > Got args: aa b >  at t/01-crypt-password.t line 99 > # _b.d.?UymJebxYNK6o = crypt('aa', '_b'); > check: aa _b at t/01-crypt-password.t line 99 > > > checking: _b.?[??O4YXMZE117. > against:  _b.d.?UymJebxYNK6o >  at t/01-crypt-password.t line 99 > orded: 90 > orded: 120 > not ok 14 - -b > #   Failed test '-b' > #   at t/01-crypt-password.t line 99. > Got args: aa bb >  at t/01-crypt-password.t line 100 > # bbxItEcT3CSMs = crypt('aa', 'bb'); > check: aa bb at t/01-crypt-password.t line 100 > > > checking: bbxItEcT3CSMs > against:  bbxItEcT3CSMs >  at t/01-crypt-password.t line 100 > orded: 84 > orded: 84 > ok 15 - -b > Got args: aa bbb >  at t/01-crypt-password.t line 101 > # _bbb. >       ?uWkJWLoI7H6 = crypt('aa', '_bbb'); > check: aa _bbb at t/01-crypt-password.t line 101 > > > checking: _bbb.?@n/niHcNVjlk > against:  _bbb. >               ?uWkJWLoI7H6 >  at t/01-crypt-password.t line 101 > orded: 99 > orded: 76 > not ok 16 - -b > #   Failed test '-b' > #   at t/01-crypt-password.t line 101. > Got args: aa bbbb >  at t/01-crypt-password.t line 102 > # _bbbb.?p4osQuyzWAoA = crypt('aa', '_bbbb'); > check: aa _bbbb at t/01-crypt-password.t line 102 > > > checking: _bbbb.??eN2JE46HJY6 > against:  _bbbb.?p4osQuyzWAoA >  at t/01-crypt-password.t line 102 > orded: 52 > orded: 121 > not ok 17 - -b > #   Failed test '-b' > #   at t/01-crypt-password.t line 102. > Got args: aa bbbbb >  at t/01-crypt-password.t line 103 > # _bbbbb.?0/JvUmcbhADM = crypt('aa', '_bbbbb'); > check: aa _bbbbb at t/01-crypt-password.t line 103 > > > checking: _bbbbb.?0/JvUmcbhADM > against:  _bbbbb.?0/JvUmcbhADM >  at t/01-crypt-password.t line 103 > orded: 99 > orded: 99 > ok 18 - -b > Got args: aa bbbbbb >  at t/01-crypt-password.t line 104 > # _bbbbbb.?SxdMPruCo9E = crypt('aa', '_bbbbbb'); > check: aa _bbbbbb at t/01-crypt-password.t line 104 > > > checking: _bbbbbb.phmD4EuCSadY > against:  _bbbbbb.?SxdMPruCo9E >  at t/01-crypt-password.t line 104 > orded: 117 > orded: 114 > not ok 19 - -b > #   Failed test '-b' > #   at t/01-crypt-password.t line 104. > Got args: aa bbbbbbb >  at t/01-crypt-password.t line 105 > # _bbbbbbb.hT80un9yvLs = crypt('aa', '_bbbbbbb'); > check: aa _bbbbbbb at t/01-crypt-password.t line 105 > > > checking: _bbbbbbb.hT80un9yvLs > against:  _bbbbbbb.hT80un9yvLs >  at t/01-crypt-password.t line 105 > orded: 110 > orded: 110 > ok 20 - -b > Got args: aa bbbbbbbb >  at t/01-crypt-password.t line 106 > # _bbbbbbbbB5GuuBxB5uk = crypt('aa', '_bbbbbbbb'); > check: aa _bbbbbbbb at t/01-crypt-password.t line 106 > > > checking: _bbbbbbbbB5GuuBxB5uk > against:  _bbbbbbbbB5GuuBxB5uk >  at t/01-crypt-password.t line 106 > orded: 66 > orded: 66 > ok 21 - -b > Got args: aa bbbbbbbbb >  at t/01-crypt-password.t line 107 > # _bbbbbbbbB5GuuBxB5uk = crypt('aa', '_bbbbbbbbb'); > check: aa _bbbbbbbbb at t/01-crypt-password.t line 107 > > > checking: _bbbbbbbbB5GuuBxB5uk > against:  _bbbbbbbbB5GuuBxB5uk >  at t/01-crypt-password.t line 107 > orded: 66 > orded: 66 > ok 22 - -b > Got args: _123.?@RC5J950bE1g >  at t/01-crypt-password.t line 109 > ok 23 - stringified and back > undef salt!? at t/01-crypt-password.t line 111 > 1..23 > # Looks like you failed 6 tests of 23. > # Looks like your test exited with 2 just after 23. > [ambs@rachmaninoff Crypt-Password]$ >

Message body is not shown because it is too large.

Subject: Re: [rt.cpan.org #72255] Failing darwin tests
Date: Thu, 10 Nov 2011 23:08:39 +1300
To: bug-Crypt-Password [...] rt.cpan.org
From: Steevo Wymzelico <nostrasteve [...] gmail.com>
Hmm that was a bit casual. Was really tired by then. In to the fourth day, though. New tests! On Thu, Nov 10, 2011 at 10:53 AM, Alberto Simões via RT <bug-Crypt-Password@rt.cpan.org> wrote: Show quoted text
>       Queue: Crypt-Password >  Ticket <URL: https://rt.cpan.org/Ticket/Display.html?id=72255 >
Attach... too big output :)
Subject: _.txt

Message body is not shown because it is too large.

Subject: Re: [rt.cpan.org #72255] Failing darwin tests
Date: Fri, 11 Nov 2011 00:47:34 +1300
To: bug-Crypt-Password [...] rt.cpan.org
From: Steevo Wymzelico <nostrasteve [...] gmail.com>
Woops. Try again. On Fri, Nov 11, 2011 at 12:32 AM, Alberto Simões via RT <bug-Crypt-Password@rt.cpan.org> wrote: Show quoted text
>       Queue: Crypt-Password >  Ticket <URL: https://rt.cpan.org/Ticket/Display.html?id=72255 >
This was taking forever. If you want me to continue let me know :)
Subject: _.txt

Message body is not shown because it is too large.

Subject: Re: [rt.cpan.org #72255] Failing darwin tests
Date: Fri, 11 Nov 2011 06:29:16 +1300
To: bug-Crypt-Password [...] rt.cpan.org
From: Steevo Wymzelico <nostrasteve [...] gmail.com>

Message body is not shown because it is too large.

you deserve the drink. Hope it contains coffee... [ambs@rachmaninoff Crypt-Password]$ perl -Ilib t/01-crypt-password.t syntax error at t/01-crypt-password.t line 96, near "$p eval " Global symbol "$p" requires explicit package name at t/01-crypt-password.t line 96. Global symbol "$p" requires explicit package name at t/01-crypt-password.t line 98. Global symbol "$p" requires explicit package name at t/01-crypt-password.t line 101. Global symbol "$p" requires explicit package name at t/01-crypt-password.t line 103. Global symbol "$c" requires explicit package name at t/01-crypt-password.t line 107. Global symbol "$c" requires explicit package name at t/01-crypt-password.t line 108. Global symbol "$c" requires explicit package name at t/01-crypt-password.t line 109. Global symbol "$c" requires explicit package name at t/01-crypt-password.t line 110. Global symbol "$c" requires explicit package name at t/01-crypt-password.t line 111. Global symbol "$c" requires explicit package name at t/01-crypt-password.t line 112. Global symbol "$c" requires explicit package name at t/01-crypt-password.t line 112. Global symbol "$c" requires explicit package name at t/01-crypt-password.t line 113. Global symbol "$c" requires explicit package name at t/01-crypt-password.t line 113. syntax error at t/01-crypt-password.t line 136, near "}" t/01-crypt-password.t has too many errors. # Looks like your test exited with 2 before it could output anything. [ambs@rachmaninoff Crypt-Password]$ trying to fix :)
and the test results are... [ambs@rachmaninoff Crypt-Password]$ perl -Ilib t/01-crypt-password.t ok 1 - use Crypt::Password; # testing Crypt::Password (glib=no) # os is darwin # /usr/share/doc/libc6 is not present # $_G56hF38/$gYNPhaNByz6 = crypt('hello0', '_G56hF38/'); not ok 2 - crypted: looks good # Failed test 'crypted: looks good' # at t/01-crypt-password.t line 78. # '$_G56hF38/$gYNPhaNByz6' # doesn't match '(?^:^\$_\S{7}\$\S{11}$)' Salt 'dg' doesn't look right at t/01-crypt-password.t line 79 # $dg$WneTwydfM06 = crypt('hello0', 'dg'); ok 3 - crypted: 2char supplied salt # various salt inputs not ok 4 - wrong sized salt # Failed test 'wrong sized salt' # at t/01-crypt-password.t line 85. # 'Bad salt input: salt must be 2 or 8 characters long at t/01-crypt-password.t line 84 # ' # doesn't match '(?^:Bad salt input.+2 or 7 characters)' not ok 5 - wrong sized salt # Failed test 'wrong sized salt' # at t/01-crypt-password.t line 85. # 'Bad salt input: salt must be 2 or 8 characters long at t/01-crypt-password.t line 84 # ' # doesn't match '(?^:Bad salt input.+2 or 7 characters)' not ok 6 - wrong sized salt # Failed test 'wrong sized salt' # at t/01-crypt-password.t line 85. # 'Bad salt input: salt must be 2 or 8 characters long at t/01-crypt-password.t line 84 # ' # doesn't match '(?^:Bad salt input.+2 or 7 characters)' # $_12345678$XP1s45ULQpI = crypt('hello0', '_12345678'); not ok 7 - wrong sized salt # Failed test 'wrong sized salt' # at t/01-crypt-password.t line 85. # '' # doesn't match '(?^:Bad salt input.+2 or 7 characters)' ok 8 - can't start with _ ok 9 - can't start with _ # $_bbbbbbbb$DJEHexiq9NI = crypt('a', '_bbbbbbbb'); not ok 10 - salt=8 no error # Failed test 'salt=8 no error' # at t/01-crypt-password.t line 97. # got: '' # expected: undef ok 11 - salt=8 crypt Salt 'cc' doesn't look right at t/01-crypt-password.t line 101 # $cc$IxmriBVsviU = crypt('a', 'cc'); not ok 12 - salt=2 no error # Failed test 'salt=2 no error' # at t/01-crypt-password.t line 102. # got: '' # expected: undef ok 13 - salt=2 crypt # checks, comparisons check: hello0 _G56hF38/ at t/01-crypt-password.t line 107 checking: $_G56hF38/$gYNPhaNByz6 against: $_G56hF38/$gYNPhaNByz6 at t/01-crypt-password.t line 107 ok 14 - check the correct password check: helow _G56hF38/ at t/01-crypt-password.t line 108 checking: $_G56hF38/$R7CJeBHqb2I against: $_G56hF38/$gYNPhaNByz6 at t/01-crypt-password.t line 108 ok 15 - check the wrong password Salt 'ga' doesn't look right at t/01-crypt-password.t line 109 # $ga$NOPZpvFpI1U = crypt('hello0', 'ga'); ok 16 - compare a password - wrong salt # $_DADAdada$LASg2sXIXlI = crypt('hello0', '_DADAdada'); ok 17 - compare a password - wrong salt # $_etcetcet$.zJDkRP9Res = crypt('hello0', '_etcetcet'); ok 18 - compare a password - wrong salt # $_G56hF38/$gYNPhaNByz6 = crypt('hello0', '_G56hF38/'); ok 19 - compare a password - correct salt # $_G56hF38/$zgxfpxSikSM = crypt('hello1', '_G56hF38/'); ok 20 - wrong password # $_blahblah$2ZtvPvnOO/w = crypt('007', '_blahblah'); # $_BLAHblah$Y8YHRJXwFLE = crypt('007', '_BLAHblah'); ok 21 - compare a password - wrong salt # $_12341234$zPVAQUxtWss = crypt('123', '_12341234'); # $_12341234$zPVAQUxtWss = crypt('123', '_12341234'); ok 22 - compare a password - correct salt check: 123 _12341234 at t/01-crypt-password.t line 117 checking: $_12341234$zPVAQUxtWss against: $_12341234$zPVAQUxtWss at t/01-crypt-password.t line 117 ok 23 - check the correct password check: 12341234 _12341234 at t/01-crypt-password.t line 118 checking: $_12341234$04M1RoADg6k against: $_12341234$zPVAQUxtWss at t/01-crypt-password.t line 118 ok 24 - check the wrong password check: $_12341234$zPVAQUxtWss _12341234 at t/01-crypt-password.t line 119 checking: $_12341234$BZBDwEGBisI against: $_12341234$zPVAQUxtWss at t/01-crypt-password.t line 119 ok 25 - can't just pass crypted stuff into check() # $_12341234$zPVAQUxtWss = crypt('123', '_12341234'); check: $_12341234$zPVAQUxtWss _12341234 at t/01-crypt-password.t line 120 checking: $_12341234$BZBDwEGBisI against: $_12341234$zPVAQUxtWss at t/01-crypt-password.t line 120 ok 26 - can't just pass crypted stuff into check() # $_12345555$V4oENXvTMYk = crypt('ambiente', '_12345555'); # ambiente $_12345555$V4oENXvTMYk Salt 'gi' doesn't look right at t/01-crypt-password.t line 124 # $gi$CZewZaJV4pk = crypt('ambiente', 'gi'); # ambiente $gi$CZewZaJV4pk # $_12345555$JacsOKd1xTo = crypt('lampshade', '_12345555'); # lampshade $_12345555$JacsOKd1xTo Salt 'gi' doesn't look right at t/01-crypt-password.t line 124 # $gi$zi7R25ah3Zw = crypt('lampshade', 'gi'); # lampshade $gi$zi7R25ah3Zw # $_12345555$2yFp.wqJEF. = crypt('guitar', '_12345555'); # guitar $_12345555$2yFp.wqJEF. Salt 'gi' doesn't look right at t/01-crypt-password.t line 124 # $gi$4tl8fx6Anh. = crypt('guitar', 'gi'); # guitar $gi$4tl8fx6Anh. # reinstating a crypt object ok 27 - stringified and back ok 28 - stringified and back check: 123 _12341234 at t/01-crypt-password.t line 131 checking: $_12341234$zPVAQUxtWss against: $_12341234$zPVAQUxtWss at t/01-crypt-password.t line 131 ok 29 - stringified and back, check correct check: 23 _12341234 at t/01-crypt-password.t line 132 checking: $_12341234$L9OUpvBQq/6 against: $_12341234$zPVAQUxtWss at t/01-crypt-password.t line 132 ok 30 - stringified and back, check incorrect check: 123 _12341234 at t/01-crypt-password.t line 133 checking: $_12341234$zPVAQUxtWss against: $_12341234$zPVAQUxtWss at t/01-crypt-password.t line 133 ok 31 - 123 still good not ok 32 - can extract the salt # Failed test 'can extract the salt' # at t/01-crypt-password.t line 134. # got: '_12341234' # expected: '123' check: $_12341234$123 _12341234 at t/01-crypt-password.t line 135 checking: $_12341234$5NxZ/iclVGA against: $_12341234$zPVAQUxtWss at t/01-crypt-password.t line 135 ok 33 - can't just pass crypted stuff into check() Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt 'aa' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 Salt '12341234' doesn't look right at t/01-crypt-password.t line 190 # on darwin 1..33 # Looks like you failed 8 tests of 33. [ambs@rachmaninoff Crypt-Password]$
Subject: Re: [rt.cpan.org #72255] Failing darwin tests
Date: Fri, 11 Nov 2011 11:53:27 +1300
To: bug-Crypt-Password [...] rt.cpan.org
From: Steevo Wymzelico <nostrasteve [...] gmail.com>
Pushed... On Fri, Nov 11, 2011 at 6:51 AM, Alberto Simões via RT <bug-Crypt-Password@rt.cpan.org> wrote: Show quoted text
>       Queue: Crypt-Password >  Ticket <URL: https://rt.cpan.org/Ticket/Display.html?id=72255 >
Hey! Long day without proper network connectivity. Back to the testing routine :) First, needed to add a semicolon somewhere on the .pm file. Then, [ambs@rachmaninoff Crypt-Password]$ perl -Ilib t/01-crypt-password.t ok 1 - use Crypt::Password; # testing Crypt::Password (glib=no) # os is darwin ok 2 - crypted: looks good ok 3 - crypted: 2char supplied salt # various salt inputs ok 4 - wrong sized salt ok 5 - wrong sized salt ok 6 - wrong sized salt not ok 7 - wrong sized salt # Failed test 'wrong sized salt' # at t/01-crypt-password.t line 80. # '' # doesn't match '(?^:Bad salt input.+2 or 8 characters)' ok 8 - can't start with _ ok 9 - can't start with _ ok 10 - salt=8 no error ok 11 - salt=8 crypt ok 12 - salt=2 no error ok 13 - salt=2 crypt # checks, comparisons ok 14 - check the correct password ok 15 - check the wrong password ok 16 - compare a password - wrong salt ok 17 - compare a password - wrong salt ok 18 - compare a password - wrong salt ok 19 - compare a password - correct salt ok 20 - wrong password ok 21 - compare a password - wrong salt ok 22 - compare a password - correct salt ok 23 - check the correct password ok 24 - check the wrong password ok 25 - can't just pass crypted stuff into check() ok 26 - can't just pass crypted stuff into check() # remake some known crypts ok 27 - test ambiente salt=8 ok 28 - test ambiente salt=2 ok 29 - test lampshade salt=8 ok 30 - test lampshade salt=2 ok 31 - test guitar salt=8 ok 32 - test guitar salt=2 # reinstating a crypt object ok 33 - stringified and back ok 34 - stringified and back ok 35 - stringified and back, check correct ok 36 - stringified and back, check incorrect ok 37 - 123 still good not ok 38 - can extract the salt # Failed test 'can extract the salt' # at t/01-crypt-password.t line 137. # got: '_12341234' # expected: '123' ok 39 - can't just pass crypted stuff into check() 1..39 # Looks like you failed 2 tests of 39.
Subject: Re: [rt.cpan.org #72255] Failing darwin tests
Date: Sat, 12 Nov 2011 10:24:17 +1300
To: bug-Crypt-Password [...] rt.cpan.org
From: Steevo Wymzelico <nostrasteve [...] gmail.com>
hah. try again. On Sat, Nov 12, 2011 at 9:59 AM, Alberto Simões via RT <bug-Crypt-Password@rt.cpan.org> wrote: Show quoted text
>       Queue: Crypt-Password >  Ticket <URL: https://rt.cpan.org/Ticket/Display.html?id=72255 >
Are we there? ok 1 - use Crypt::Password; # testing Crypt::Password (glib=no) # os is darwin ok 2 - crypted: looks good ok 3 - crypted: 2char supplied salt # various salt inputs ok 4 - wrong sized salt ok 5 - wrong sized salt ok 6 - wrong sized salt ok 7 - wrong sized salt ok 8 - wrong sized salt ok 9 - can't start with _ ok 10 - can't start with _ ok 11 - salt=8 no error ok 12 - salt=8 crypt ok 13 - salt=2 no error ok 14 - salt=2 crypt # checks, comparisons ok 15 - check the correct password ok 16 - check the wrong password ok 17 - compare a password - wrong salt ok 18 - compare a password - wrong salt ok 19 - compare a password - wrong salt ok 20 - compare a password - correct salt ok 21 - wrong password ok 22 - compare a password - wrong salt ok 23 - compare a password - correct salt ok 24 - check the correct password ok 25 - check the wrong password ok 26 - can't just pass crypted stuff into check() ok 27 - can't just pass crypted stuff into check() # remake some known crypts ok 28 - test ambiente salt=8 ok 29 - test ambiente salt=2 ok 30 - test lampshade salt=8 ok 31 - test lampshade salt=2 ok 32 - test guitar salt=8 ok 33 - test guitar salt=2 # reinstating a crypt object ok 34 - stringified and back ok 35 - stringified and back ok 36 - stringified and back, check correct ok 37 - stringified and back, check incorrect ok 38 - 123 still good ok 39 - can extract the salt ok 40 - can't just pass crypted stuff into check() 1..40
Subject: Re: [rt.cpan.org #72255] Failing darwin tests
Date: Sat, 12 Nov 2011 10:59:20 +1300
To: bug-Crypt-Password [...] rt.cpan.org
From: Steevo Wymzelico <nostrasteve [...] gmail.com>
woo hoo. On Sat, Nov 12, 2011 at 10:57 AM, Alberto Simões via RT <bug-Crypt-Password@rt.cpan.org> wrote: Show quoted text
>       Queue: Crypt-Password >  Ticket <URL: https://rt.cpan.org/Ticket/Display.html?id=72255 >
Subject: Re: [rt.cpan.org #72255] Failing darwin tests
Date: Sat, 12 Nov 2011 11:54:00 +1300
To: bug-Crypt-Password [...] rt.cpan.org
From: Steevo Wymzelico <nostrasteve [...] gmail.com>
I have just uploaded version 0.06. You are a legend for doing all that testing for me. Thanks! On Sat, Nov 12, 2011 at 10:59 AM, Steevo Wymzelico <nostrasteve@gmail.com> wrote: Show quoted text
> woo hoo. > > On Sat, Nov 12, 2011 at 10:57 AM, Alberto Simões via RT > <bug-Crypt-Password@rt.cpan.org> wrote:
>>       Queue: Crypt-Password >>  Ticket <URL: https://rt.cpan.org/Ticket/Display.html?id=72255 >
>
CC: ambs [...] cpan.org
Subject: Re: [rt.cpan.org #72255] Failing darwin tests
Date: Sat, 12 Nov 2011 11:14:34 +0100
To: bug-Crypt-Password [...] rt.cpan.org
From: "Stefan Hornburg (Racke)" <racke [...] linuxia.de>
On 11/11/2011 11:54 PM, Steve Eirium via RT wrote: Show quoted text
> <URL: https://rt.cpan.org/Ticket/Display.html?id=72255> > > I have just uploaded version 0.06. You are a legend for doing all that > testing for me. > > Thanks! >
Great, thanks a lot to you both to track down this nasty problem! Regards Racke -- LinuXia Systems => http://www.linuxia.de/ Expert Interchange Consulting and System Administration ICDEVGROUP => http://www.icdevgroup.org/ Interchange Development Team
CC: ambs [...] cpan.org
Subject: Re: [rt.cpan.org #72255] Failing darwin tests
Date: Sun, 13 Nov 2011 10:45:05 +0100
To: bug-Crypt-Password [...] rt.cpan.org
From: "Stefan Hornburg (Racke)" <racke [...] linuxia.de>
On 11/11/2011 11:54 PM, Steve Eirium via RT wrote: Show quoted text
> <URL: https://rt.cpan.org/Ticket/Display.html?id=72255> > > I have just uploaded version 0.06. You are a legend for doing all that > testing for me. > > Thanks! >
I found a glitch in 0.06: it misses the inc/ subdirectory and therefore fails to build: Can't locate inc/Module/Install.pm in @INC Regards Racke -- LinuXia Systems => http://www.linuxia.de/ Expert Interchange Consulting and System Administration ICDEVGROUP => http://www.icdevgroup.org/ Interchange Development Team
CC: ambs [...] cpan.org
Subject: Re: [rt.cpan.org #72255] Failing darwin tests
Date: Sun, 13 Nov 2011 17:03:21 +0100
To: bug-Crypt-Password [...] rt.cpan.org
From: "Stefan Hornburg (Racke)" <racke [...] linuxia.de>
On 11/13/2011 10:45 AM, Stefan Hornburg (Racke) wrote: Show quoted text
> On 11/11/2011 11:54 PM, Steve Eirium via RT wrote:
>> <URL: https://rt.cpan.org/Ticket/Display.html?id=72255> >> >> I have just uploaded version 0.06. You are a legend for doing all that >> testing for me. >> >> Thanks! >>
> > I found a glitch in 0.06: it misses the inc/ subdirectory > and therefore fails to build: > > Can't locate inc/Module/Install.pm in @INC >
You got a pull request for this. Regards Racke -- LinuXia Systems => http://www.linuxia.de/ Expert Interchange Consulting and System Administration ICDEVGROUP => http://www.icdevgroup.org/ Interchange Development Team