Skip Navigation

Search

  • You don't grok vi.

    That's fine and you don't need to. But don't knock it if you haven't even taken time to learn it.

    Yesterday I needed to insert a tab character on every line from 2 to 31,000 something. I made the line selection keystrokes in Cursor - it immediately crashed so hard I had to restart my PC.

    Vim did it in a few milliseconds.

  • POV: You open vim for the first time.

  • Many such cases!

  •  
        
    ~ $ python
    Python 3.12.10 (main, Apr  9 2025, 18:13:11) [Clang 18.0.3 (https://android.googlesource.com/toolchain/llvm-project d8003a456 on linux
    Type "help", "copyright", "credits" or "license" for more information.
    >>> ❗ = 'nah'
      File "<stdin>", line 1
        ❗ = 'nah'
        ^
    SyntaxError: invalid character '❗' (U+2757)
    >>>
    ~ $ node
    Welcome to Node.js v23.11.1.
    Type ".help" for more information.
    > const 👍 = 'test'
    const 👍 = 'test'
          ^
    
    Uncaught SyntaxError: Invalid or unexpected token
    >
    
      
  • And switch cases (called match cases) are there as well.

    I use lambdas all the time to shovel GTK signal emitions from worker threads into GLib.idle_add in a single line, works as you'd expect.

    Previous commenters probably didn't look at Python in a really long time.

  • The flag -O3 exists. Or just -funroll-loops. You shouldn’t even need -funroll-all-loops in this case, since hashes have a fixed size.

    I sound way more competent with the flags than I am here, haha. Does Gentoo use an alternate compiler by default?

    This is in reference to an ancient linux meme cw: slur

  • Hash functions aren’t “impenetrable” they’re just math.

    I mean, they're both. At a high level it's math, but the individual operations are carefully designed to resist any symbolic manipulation (aka thought) - because that's one step away from an attack.

    The point of this post is actually things like x[(I-3)&0x0f]. It’s entirely the same concept as coercion to manipulate index values this way. What’s funny is that void pointer math, function pointer math, void pointers and function pointers in general are typically seen as “beyond the pale” for whatever reason.

    If it compiles pretty directly to register pointer math that way, I think it could be justified here. I can't say if it does, or if an alternate approach would too, though.

    This portion is simply an manually unrolled loop

    Lol, I didn't notice it's a perfect shift. Yeah, that could theoretically be done better. Presumably the justification is because it's a leaf function, and it's hard to guarantee every compilation will unroll it properly.

    (lmao these gcc nerds haven’t even heard of Gentoo)

    The flag -O3 exists. Or just -funroll-loops. You shouldn't even need -funroll-all-loops in this case, since hashes have a fixed size.

    I sound way more competent with the flags than I am here, haha. Does Gentoo use an alternate compiler by default?

    Beyond that asking what the memory size of a variable in C is a fools errand because the real answer is “it depends” and “it also depends if someone decided to ignore what it typically depends on (compiler and platform) with some preprocessor fun”.

    As I understand it, that's pretty unavoidable if you want C to both compile onto multiple processors and work at a high level the same way on all of them. JavaScript catches shit for doing funny things purely because it was hastily built.

    Ditto for fast inverse square root. It's absolutely cursed, but when you're at a certain low level you can't afford pretty anymore. You're feeling the constraint of limited die space and manufacturing steps not too far down the layers of abstraction. Browser scripting, on the other hand, is not low-level.

  • There are plenty of sha1 implementations that are more readable and sensible and less readable and sensible. This portion is simply an manually unrolled loop (lmao these gcc nerds haven't even heard of Gentoo) of the hash chunk computation rounds. Hash functions aren't "impenetrable" they're just math. You can write math programmatically in a way that explains the math.

    The point of this post is actually things like x[(I-3)&0x0f]. It's entirely the same concept as coercion to manipulate index values this way. What's funny is that void pointer math, function pointer math, void pointers and function pointers in general are typically seen as "beyond the pale" for whatever reason.

    Beyond that if you know C you know why this is written this way with the parens. It's because C has fucked up order of operations. For example a + b == 7 is literally "does adding a + b equal 7", but if you write a & b == 7 you would think it means "does a AND b equal 7", but you'd be wrong. It actually means does b equal 7 AND a.

    Furthermore a & (b ==7) makes no sense because b == 7 is a boolean value. Bitwise ANDing a boolean value should not work because the width of the boolean is 1 bit and the width of the int is 8 bits. ANDing should fail because there's 7 void bits between the two types. However the standard coerces booleans in these cases to fit the full width, coercing the void bits to 0's to make bitwise ANDing make sense.

    Beyond that asking what the memory size of a variable in C is a fools errand because the real answer is "it depends" and "it also depends if someone decided to ignore what it typically depends on (compiler and platform) with some preprocessor fun". Remember how I said "void pointers" are beyond the pale? Yeah the typical "why" of that is because they don't have a known size, but remember the size of something for C is "it depends". 🤷

    Almost every language has idiosyncratic stuff like this, but some let you make up your own shit on top of that. These kinda low hanging fruit jokes are just people virtue signaling their nerddom (JS bad am rite guis, use a real language like C), when in reality this stuff is everywhere in imperative languages and typically doesn't matter too much in practice. This isn't even getting into idiosyncracies based on how computers understand numbers which is what subtracting from 0x5F3759DF (fast inverse square root) references.

  • I thank god every day people who make these comics are too stupid to open gcc's sha1.c because they'd see shit like:

     c
        
    #define M(I) ( tm =   x[I&0x0f] ^ x[(I-14)&0x0f] \
                ^ x[(I-8)&0x0f] ^ x[(I-3)&0x0f] \
               , (x[I&0x0f] = rol(tm, 1)) )
    
    #define R(A,B,C,D,E,F,K,M)  do { E += rol( A, 5 )     \
                          + F( B, C, D )  \
                          + K	      \
                          + M;	      \
                     B = rol( B, 30 );    \
                       } while(0)
    
          R( a, b, c, d, e, F1, K1, x[ 0] );
          R( e, a, b, c, d, F1, K1, x[ 1] );
          R( d, e, a, b, c, F1, K1, x[ 2] );
          R( c, d, e, a, b, F1, K1, x[ 3] );
          R( b, c, d, e, a, F1, K1, x[ 4] );
          R( a, b, c, d, e, F1, K1, x[ 5] );
          R( e, a, b, c, d, F1, K1, x[ 6] );
          R( d, e, a, b, c, F1, K1, x[ 7] );
          R( c, d, e, a, b, F1, K1, x[ 8] );
          R( b, c, d, e, a, F1, K1, x[ 9] );
          R( a, b, c, d, e, F1, K1, x[10] );
          R( e, a, b, c, d, F1, K1, x[11] );
          R( d, e, a, b, c, F1, K1, x[12] );
          R( c, d, e, a, b, F1, K1, x[13] );
          R( b, c, d, e, a, F1, K1, x[14] );
          R( a, b, c, d, e, F1, K1, x[15] );
          R( dee, dee, dee, baa, dee, F1, K1, x[16] );
          R( bee, do, do, dee, baa, F1, K1, x[17] );
          R( dee, bee, do, dee, dee, F1, K1, x[18] );
          R( dee, dee, dee, ba, dee, F1, K1, x[19] );
          R( d, a, y, d, o, F1, K1, x[20] );
    
      

    And think, yeah this is real programming. Remember the difference between being smart and incredibly stupid is what language you write it in. Using seemingly nonsensical coercion and operator overloaded is cringe, making your own nonsensical coercion and operator overloads is based.

    That's why you should never subtract things from 0x5F3759DF in any language other than C.

  •  
        
    [ 🗑️ Save ]
    
    [ 💾 Delete ]
    
      
  • Programmer Humor @lemmy.ml

    Sometimes things do go your way

    Programmer Humor @lemmy.ml

    There are one types of programmers

    Programmer Humor @lemmy.ml

    divide and conquer

    Programmer Humor @lemmy.ml

    Which other AI product is like this?

    Programmer Humor @lemmy.ml

    thanks for not camel casing your post titles

    Programmer Humor @lemmy.ml

    bash.org musings

    Programmer Humor @lemmy.ml

    this technology suffers from high latency

    Programmer Humor @lemmy.ml

    sigma star

    Programmer Humor @lemmy.ml

    Living the dream

    Programmer Humor @lemmy.ml

    Proof that Regex is Hate Speech!

    Programmer Humor @lemmy.ml

    If you run this JavaScript function on the 31st of a month, the result will be a month off. The best part is that this is the intended behvaior. JavaScript is a cursed language.

    Programmer Humor @lemmy.ml

    at the trilogue meeting, secretly negotiating legislation to reduce web browser security

    Programmer Humor @lemmy.ml

    If programming languages were weapons. Old but gold.

    Programmer Humor @lemmy.ml

    The coding experience

    Programmer Humor @lemmy.ml

    When the marketing director wants it to look "techie"

    Programmer Humor @lemmy.ml

    Hitler uses Docker

    Programmer Humor @lemmy.ml

    Made a little iOS Shortcut to give me a TL;DR for articles with ChatGPT

    Programmer Humor @lemmy.ml

    I do remember you, Outlook Express ✉️

    Programmer Humor @lemmy.ml

    (https://mastodon.world/tags/C) #C++ #C# #programminglanguages

    Programmer Humor @lemmy.ml

    Fuck, Marry, Kill?