tech-userlevel archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: crypt_r()?

Am Tue, Feb 15, 2022 at 05:25:10PM -0800 schrieb Konrad Schroder:
> Of course the clearest use-case for crypt_r(3) is a password cracker: each
> thread sets up its own local memory and blasts through calls to crypt_r(3)
> as fast as it can.  I've run a cracker as a white-hat.  But I can see not
> wanting to add the capability to base if that's the only convincing use
> case.

If you are using a general CPU to do password cracking, you don't care
about performance or efficiency anyway. It's a micro-optimisation for a
use case that is not that relevant anyway. Given that malloc will cache
any reasonable small allocation anyway, we are talking about a few dozen
or 100 cpu cycles for an operation that is expected to take several
orders of magnitude more. It's not even background noise.


Home | Main Index | Thread Index | Old Index