|
Message-ID: <7929b4c1f60419dd3552c50f4d5e0481@smtp.hushmail.com> Date: Sun, 25 Mar 2012 20:13:40 +0200 From: magnum <john.magnum@...hmail.com> To: john-dev@...ts.openwall.com Subject: Re: [JtR patch] Fast cracker for Mozilla Firefox, Thunderbird and SeaMonkey master passwords. On 03/25/2012 07:57 PM, Dhiru Kholia wrote: > Hi, > > I have tried to fix memory leaks in the new mozilla format but I am > still getting one particular leak: > > ==15356== 28,192 (23,056 direct, 5,136 indirect) bytes in 262 blocks > are definitely lost in loss record 24 of 33 > ==15356== at 0x4C28F9F: malloc (vg_replace_malloc.c:236) > ==15356== by 0x4822DA: nsspkcs5_NewParam (lowpbe.c:186) > ==15356== by 0x47EAA7: set_salt (mozilla_fmt.c:96) > ==15356== by 0x4B8DC8: crk_process_salt (cracker.c:362) > ... > > Can someone (magnum?) take a look? The code is now OMP friendly and > OMP support is next item in my TODO list. Maybe later. Is this for every invocation of set_salt()? magnum
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.