On 18/06/12 20:39, Werner Koch wrote:
> FWIW, Libgcrypt uses this RNG directly in addition to other sources.
Actually... I just checked git.gnupg.org, and I see these lines in Libgcrypt,
file random/rndhw.c:
# if defined (__i386__) && SIZEOF_UNSIGNED_LONG == 4 && defined (__GNUC__)
# define USE_P
On Mon, 18 Jun 2012 17:37, pe...@digitalbrains.com said:
> Just as a datapoint: I have a VIA Nano L2200 @ 1.6 GHz, which is a slow
> processor (competition for the Intel Atom), but which has a hardware RNG
> hooked
> up to /dev/random through rngd. I'm fairly sure that it's configured correctly
On Sun, Jun 17, 2012 at 07:26:27PM +0200, Hauke Laging wrote:
> This are the result (with a caches passphrase, of course). It's the same for
> a
> zeros file and a urandom file. And this is on a power efficient CPU...
> (E-450,
> which I guess doesn't have AES acceleration) probably without par
On 18/06/12 10:49, Werner Koch wrote:
> On Mon, 18 Jun 2012 05:31, r...@sixdemonbag.org said:
>
>> results can check for themselves. Warning: if you ever write Python
>> code like this in the real world your programming team will beat you to
>> death.
>
> To me this awk script is more readable,
On Sat, Jun 16, 2012 at 03:44:04PM -0400 Also sprach Robert J. Hansen:
> ... unless he's running on an Ivy Bridge or later, in which case it
> already has a hardware RNG built in.
If he's currently running on hardware later than Ivy Bridge, then he's
either an Intel engineer or a time traveler, an
On 06/18/2012 04:49 AM, Werner Koch wrote:
> To me this awk script is more readable, although most other will
> disagree:
My secret shame is that I know neither sed nor awk, which is why I do so
many of these tasks in Python. :)
___
Gnupg-users mailing
On Mon, 18 Jun 2012 10:49, w...@gnupg.org said:
> I actually found a bug in GPG: If a key has been disabled, it is not
> flagged as disabled in the --with-colons key listing. I need to
Ooops, the API provided to be pretty complicated. I forgot the
condition term "$12!~/D/". Thus using
$ gpg
On Mon, 18 Jun 2012 05:31, r...@sixdemonbag.org said:
> results can check for themselves. Warning: if you ever write Python
> code like this in the real world your programming team will beat you to
> death.
To me this awk script is more readable, although most other will
disagree:
$ gpg2 --ge
On 06/17/2012 01:26 PM, Hauke Laging wrote:
> start cmd:> time gpg --encrypt --sign 200k-file
Unless you're testing with 50 certificates, this isn't exactly a fair
comparison. Here's what I came up with:
System: Intel i7-2600K @ 3.4GHz, 32Gb RAM
Methodology:
* A 256k random file was c
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 2012-06-17 20:50, Peter Lebbing wrote:
> On 17/06/12 19:26, Hauke Laging wrote:
>> start cmd:> time gpg --encrypt --sign 200k-file
>>
>> Sie benötigen eine Passphrase, um den geheimen Schlüssel zu
>> entsperren. Benutzer: "Hauke Laging " 2048-Bit
On 17/06/12 19:26, Hauke Laging wrote:
> start cmd:> time gpg --encrypt --sign 200k-file
>
> Sie benötigen eine Passphrase, um den geheimen Schlüssel zu entsperren.
> Benutzer: "Hauke Laging "
> 2048-Bit RSA Schlüssel, ID 0x3A403251, erzeugt 2010-03-04 (Hauptschlüssel-ID
> 0xECCB5814)
>
>
> re
Am So 17.06.2012, 08:04:09 schrieb Aaron Toponce:
> These files are about 200KB in size. We have a Perl script that handles the
> encryption/decryption for us. It could be the RNG slowing the process down.
> I won't disagree with that, but each time I need to encrypt the file, it
> takes about 2s.
On Sat, Jun 16, 2012 at 07:54:46PM +0200, Hauke Laging wrote:
> Are these files huge? It's hard for me to believe that this takes seconds.
> What I would easily believe is that the system gets an entropy problem. The
> delay would not be related to CPU performance then. So maybe a hardware RNG
>
On 06/16/2012 01:54 PM, Hauke Laging wrote:
> Are these files huge? It's hard for me to believe that this takes
> seconds. What I would easily believe is that the system gets an
> entropy problem... So maybe a hardware RNG improves your situation.
Be careful about saying this without learning what
Am Sa 16.06.2012, 08:15:05 schrieb Aaron Toponce:
> We use GPG at work for internal passwords. There are 3 XML files based on
> the role that they employee fills at work (techs, domains, admins). With
> about 50 exmployees' GPG keys, encrypting the 3 files is a bit daunting. It
> takes a few secon
I'm curious what progress, if any, has been made towards supporting GPUs
for encryption, decryption, signatures and verifications. I recently just
purchased two Zotac 32-bit PCI cards with 96 CUDA cores (I'm out of PCIe
slots) for the sole purpose of GPGPU research and sandboxing.
We use GPG at wo
16 matches
Mail list logo