Detects Weak Passwords
John the Ripper is a fast password cracker (password security auditing
tool). Its primary purpose is to detect weak Unix passwords, but a
number of other hash types are supported as well.
- Developed at security
-
2
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Factory/john && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
john-1.7.9-jumbo-7.tar.bz2 | 0001595514 1.52 MB | |
john-1.7.9-jumbo-7.tar.bz2.sign | 0000000353 353 Bytes | |
john-1.7.9-powerpc_BE_need_rhash_u32_swap_copy.pat |
0000000922 922 Bytes | |
john-1.8.0.tar.xz | 0004468704 4.26 MB | |
john-1.8.0.tar.xz.sign | 0000000353 353 Bytes | |
john-rpmlintrc | 0000000186 186 Bytes | |
john.8.gz | 0000004230 4.13 KB | |
john.changes | 0000016574 16.2 KB | |
john.keyring | 0044973074 42.9 MB | |
john.spec | 0000005036 4.92 KB | |
mailer.8 | 0000001330 1.3 KB | |
ppc64le.patch | 0000000488 488 Bytes | |
relbench.8 | 0000001994 1.95 KB |
Revision 28 (latest revision is 40)
Dominique Leuenberger (dimstar_suse)
accepted
request 360152
from
Marcus Meissner (msmeissn)
(revision 28)
- as follow on of previous "jumbo patch" need two powerpc changes: new john-1.7.9-powerpc_BE_need_rhash_u32_swap_copy.patch place ppc64le.patch after application of "jumbo patch" in spec allow to solve partially boo #940498 for ppc64le but still have 4 FAILED tests for ppc64 tracked upstream by http://www.openwall.com/lists/john-dev/2016/02/16/1
Comments 1
Can we put this into Leap?