tech-userlevel archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: crypt_r()?
On 2/15/2022 5:04 PM, Mouse wrote:
(2) Hashing password, which takes the password and the settings and
returns an allocated string with the resulting hash. [...]
I really don't like making them depend on malloc, though I have a hard
time articulating what bothers me about it.
I can't say what bothers *you* about it :^) but what bothers me is that
it makes it impossible to pre-allocate memory for the purpose. This
might be a concern, for example, on a system with no swap.
Combine that with a need for thread safety, say for a threaded login
daemon on a system with no swap, and you get crypt_r(3) as described.
Of course the clearest use-case for crypt_r(3) is a password cracker:
each thread sets up its own local memory and blasts through calls to
crypt_r(3) as fast as it can. I've run a cracker as a white-hat. But I
can see not wanting to add the capability to base if that's the only
convincing use case.
Take care,
Konrad Schroder
perseant%hhhh.org@localhost
Home |
Main Index |
Thread Index |
Old Index