Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <7929b4c1f60419dd3552c50f4d5e0481@smtp.hushmail.com>
Date: Sun, 25 Mar 2012 20:13:40 +0200
From: magnum <john.magnum@...hmail.com>
To: john-dev@...ts.openwall.com
Subject: Re: [JtR patch] Fast cracker for Mozilla Firefox, Thunderbird
 and SeaMonkey master passwords.

On 03/25/2012 07:57 PM, Dhiru Kholia wrote:
> Hi,
> 
> I have tried to fix memory leaks in the new mozilla format but I am
> still getting one particular leak:
> 
> ==15356== 28,192 (23,056 direct, 5,136 indirect) bytes in 262 blocks
> are definitely lost in loss record 24 of 33
> ==15356==    at 0x4C28F9F: malloc (vg_replace_malloc.c:236)
> ==15356==    by 0x4822DA: nsspkcs5_NewParam (lowpbe.c:186)
> ==15356==    by 0x47EAA7: set_salt (mozilla_fmt.c:96)
> ==15356==    by 0x4B8DC8: crk_process_salt (cracker.c:362)
> ...
> 
> Can someone (magnum?) take a look? The code is now OMP friendly and
> OMP support is next item in my TODO list.

Maybe later. Is this for every invocation of set_salt()?

magnum


Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.