Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 11 May 2011 01:00:40 +0200
From: Samuele Giovanni Tonon <samu@...uxasylum.net>
To: john-dev <john-dev@...ts.openwall.com>
Subject: single mode problem

hello,
while trying to trace some memory problem in single mode with
ssha-opencl format, i finally found the culprit.

in single.c:

salt = single_db->salts;
do {
    single_alloc_keys(&salt->keys);
} while ((salt = salt->next));

so single_alloc_keys is called for every password found
in the file and it allocates max_keys_per_crypt * password length which
for opencl is SSHA_NUM_KEYS * PLAINTEXT_LENGTH  so
1024 * 2048 * 32 bytes for each key .

i could lower ssha_num_keys but this would hurt performance.
Any suggestion on how to fix this problem ?

this doesn't happen in incremental or wordlist mode.

N.B. i noted that, when single mode is gone memory is still allocated
cause there is no free(salt) : is it intended ?

Cheers
Samuele 


-- 
While various networks have become deeply rooted, and thoughts have been
sent out as light and electrons in a singular direction, this era has
yet to digitize/computerize to the degree necessary for individuals to
become a singular complex entity.
  KOUKAKU KIDOUTAI Stand Alone Complex


Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ