// Proof that brute force is mostly useless. Especially over the web. It can crack the word retoor in 8 seconds in best conditions. 
// If it takes 8 seconds locally for such a small word like 'retoor', how long would it take for web? Exactly.
// I wouldn't worry too much about your password at all. Just don't let it be a wordbook think to be sure. Even then, wouldn't be worried much.
// Imagine that it had to generate uuid4's. ugh.


#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include "rlib.h"

unsigned long gen(char *str, int position, int length, char * expect, unsigned long attempt) {
    if (position == length) {
        str[position] = '\0'; 
        return attempt;
    }

    for (char c = 'a'; c <= 'z'; c++) {
        str[position] = c; 
        attempt = gen(str, position + 1, length,expect, attempt + 1);  
        if(!strcmp(str,expect))
        { 
            return attempt;
        }
    }
    return attempt;
}

int main(int argc, char *argv[]) {

    char *str = (char *)malloc((1337) * sizeof(char));

    if (str == NULL) {
        printf("Memory allocation failed!\n");
        return 1;
    }

    char * needle = argc == 2 ? argv[1] :  "retoor";
    size_t length = strlen(needle);
    RBENCH(1, {
        unsigned long attempt = gen(str, 0, length, needle, 0);
        printf("Resolved \"%s\" within %zd combinations.\n",needle, attempt);
    })

    free(str);

    return 0;
}