|
Message-ID: <aed5aa4795e06aafdf4f740e614f8996@smtp.hushmail.com> Date: Thu, 7 Mar 2013 00:19:47 +0100 From: magnum <john.magnum@...hmail.com> To: john-dev@...ts.openwall.com Subject: Re: NetNTLMv1 and MSCHAPv2 On 6 Mar, 2013, at 19:58 , magnum <john.magnum@...hmail.com> wrote: > By the way, are we not very vulnerable to false sharing now, with this tiny crypt_key array? Maybe I can expect OpenMP to do the right things as long as I use a high enough keys_per_crypt? Let's say I have 4 cores running but the work load per core is 32 keys. Assuming 64 byte cache line size, if core one gets indexes 0-31 and core two 32-63 and so on, they would not fight over cache lines at all. Then again, we should ideally align the array to MEM_ALIGN_CACHE. magnum
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.