In message [EMAIL PROTECTED] on Fri, 19 Nov 2004 00:45:01 +0100, Dr. Stephen
Henson [EMAIL PROTECTED] said:
steve I'd agree with that assessment now that I've analysed the patch
steve in more detail so I've no complaints on that score any more.
steve
steve The only case remaining is an
Marc Bevand wrote:
| dean gaudet wrote:
| | On Sat, 27 Nov 2004, Marc Bevand wrote:
| |http://epita.fr/~bevand_m/papers/md5-amd64.html
|
| (note: the page is temporarily unavailable, I have informed the sysadm)
The page is now available:
http://epita.fr/~bevand_m/papers/md5-amd64.html
Jack Lloyd sed:
On Wed, Nov 24, 2004 at 10:06:10PM +, Ben Laurie wrote:
victor sherbinin wrote:
I'm wondering whether generation of SSL session ID has to be based on
random numbers. In my system, it would be more comfortable for me to
generate a sequentially incrementing 64-bit or
Marc Bevand wrote:
|
| The page is now available:
|
| http://epita.fr/~bevand_m/papers/md5-amd64.html
The server is down, again :-( So, here is a tarball containing the
html file as well as the code (see attached file).
--
Marc Bevand http://epita.fr/~bevand_m
But given the performance swing amplitude (2.5x one way or another) we
most likely would have to detect P4 at run-time and fall down to
alternative code path... In *both* 32- and 64-bit cases...
I failed to compose blended code which would perform satisfactory on
both P4 and non-P4 cores and
On Mon Nov 29 14:34:33 2004, Andy Polyakov wrote:
[snip]
Note that 32-bit code delivers almost 80% of 64-bit performance on
AMD. As mentioned in commentary section in rc4-586.pl it's actually
possible to achieve 224MBps in 32-bit mode, but I chose to stop at the
above figure in order to
Hello Stephen,
Thanks forthe fix.It works fine.
I have a question related to OpenSSL 0.9.7e serial file issue with out this fix, the command
# openssl x509 -req -in ksb_cert_req.pem -CA ca_cert.pem -CAkey ca_priv_key.pem -CAcreateserial -out ksb_cert.pem -days 365
creates a random serial