updated, thanks. changes will propagate to website in an hour or so.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
> I noticed that you integrated the bit-sliced version of AES in 2012 for
> ARMv7, probably following the work of Bernstein.
Quoting bsaes-armv7 commentary section:
# This implementation is direct adaptation of bsaes-x86_64 module for
# ARM NEON.
Then bsaes-x86_64:
### AES-128 [originally in CT
Hi Andy,
I am very happy that my email caught your attention, and I thank you very
much for the detailed answers!I will come back to you in 1 day or 2 on the
technical questions, I will try to do more home works, as you said ;)In the
meanwhile, I can just say that of course, I saw the code in Op
Hi,
Regarding per connection memory usage, the 1.0.1 release stream appears to
utilize slightly more memory when compared to 0.9.8.
The design has evolved (ameth_lib, pmeth_lib etc) so likely working as
designed, but is there any measurements/observations published in this area
(or tips bey
> As it can be seen OpenSSL GHASH is slower on Cortex A57 (but not sum of
> CTR and GHASH) and Apple A7. There is explanation for that. One of GHASH
> implementations parameters is "aggregate factor" that denotes amount of
> multiplications that are performed prior reduction. OpenSSL uses factor
>
Hi,
> What is the status of the improvements on security and performance for
> AES-GCM on ARM published recently by Conrado P. L. Gouvêa, Julio López ?
>
> Implementing GCM on ARMv8. Conrado P. L. Gouvêa, Julio López. 2015 [1]
> Which details also the ARMv7 case, and was presented at the RSA
> Co
Hello!
Content of the page at https://www.openssl.org/news/state.html seems to be
deprecated.
--
SY, Dmitry Belyavsky
___
openssl-bugs-mod mailing list
openssl-bugs-...@openssl.org
https://mta.openssl.org/mailman/listinfo/openssl-bugs-mod_