Date: Tue, 27 Mar 2012 10:27:13 +0400 From: Solar Designer <solar@...nwall.com> To: john-dev@...ts.openwall.com Subject: Re: [JtR patch] Fast cracker for Mozilla Firefox, Thunderbird and SeaMonkey master passwords. On Mon, Mar 26, 2012 at 10:56:09AM +0200, magnum wrote: > I can't see any obvious reason it doesn't scale better either - it > spends 95% in (and below) crypt_all() where everything should be MT. But > I only get 161% when running on two threads. I think this format is slow > enough to scale much better than that. I haven't looked into this at all, but the above suggests that the problem is in memory access patterns (maybe false sharing) or/and in too frequent thread synchronization (busy waiting). http://en.wikipedia.org/wiki/False_sharing Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.