On 18/06/12 20:39, Werner Koch wrote:
FWIW, Libgcrypt uses this RNG directly in addition to other sources.
Actually... I just checked git.gnupg.org, and I see these lines in Libgcrypt,
file random/rndhw.c:
# if defined (__i386__) SIZEOF_UNSIGNED_LONG == 4 defined (__GNUC__)
# define
On Mon, 18 Jun 2012 05:31, r...@sixdemonbag.org said:
results can check for themselves. Warning: if you ever write Python
code like this in the real world your programming team will beat you to
death.
To me this awk script is more readable, although most other will
disagree:
$ gpg2
On Mon, 18 Jun 2012 10:49, w...@gnupg.org said:
I actually found a bug in GPG: If a key has been disabled, it is not
flagged as disabled in the --with-colons key listing. I need to
Ooops, the API provided to be pretty complicated. I forgot the
condition term $12!~/D/. Thus using
$ gpg2
On 06/18/2012 04:49 AM, Werner Koch wrote:
To me this awk script is more readable, although most other will
disagree:
My secret shame is that I know neither sed nor awk, which is why I do so
many of these tasks in Python. :)
___
Gnupg-users mailing
On Sat, Jun 16, 2012 at 03:44:04PM -0400 Also sprach Robert J. Hansen:
... unless he's running on an Ivy Bridge or later, in which case it
already has a hardware RNG built in.
If he's currently running on hardware later than Ivy Bridge, then he's
either an Intel engineer or a time traveler, and
On 18/06/12 10:49, Werner Koch wrote:
On Mon, 18 Jun 2012 05:31, r...@sixdemonbag.org said:
results can check for themselves. Warning: if you ever write Python
code like this in the real world your programming team will beat you to
death.
To me this awk script is more readable, although
On Sun, Jun 17, 2012 at 07:26:27PM +0200, Hauke Laging wrote:
This are the result (with a caches passphrase, of course). It's the same for
a
zeros file and a urandom file. And this is on a power efficient CPU...
(E-450,
which I guess doesn't have AES acceleration) probably without
On Mon, 18 Jun 2012 17:37, pe...@digitalbrains.com said:
Just as a datapoint: I have a VIA Nano L2200 @ 1.6 GHz, which is a slow
processor (competition for the Intel Atom), but which has a hardware RNG
hooked
up to /dev/random through rngd. I'm fairly sure that it's configured correctly
On Sat, Jun 16, 2012 at 07:54:46PM +0200, Hauke Laging wrote:
Are these files huge? It's hard for me to believe that this takes seconds.
What I would easily believe is that the system gets an entropy problem. The
delay would not be related to CPU performance then. So maybe a hardware RNG
Am So 17.06.2012, 08:04:09 schrieb Aaron Toponce:
These files are about 200KB in size. We have a Perl script that handles the
encryption/decryption for us. It could be the RNG slowing the process down.
I won't disagree with that, but each time I need to encrypt the file, it
takes about 2s.
On 17/06/12 19:26, Hauke Laging wrote:
start cmd: time gpg --encrypt --sign 200k-file
Sie benötigen eine Passphrase, um den geheimen Schlüssel zu entsperren.
Benutzer: Hauke Laging ha...@laging.de
2048-Bit RSA Schlüssel, ID 0x3A403251, erzeugt 2010-03-04 (Hauptschlüssel-ID
0xECCB5814)
On 06/17/2012 01:26 PM, Hauke Laging wrote:
start cmd: time gpg --encrypt --sign 200k-file
Unless you're testing with 50 certificates, this isn't exactly a fair
comparison. Here's what I came up with:
System: Intel i7-2600K @ 3.4GHz, 32Gb RAM
Methodology:
* A 256k random file was
I'm curious what progress, if any, has been made towards supporting GPUs
for encryption, decryption, signatures and verifications. I recently just
purchased two Zotac 32-bit PCI cards with 96 CUDA cores (I'm out of PCIe
slots) for the sole purpose of GPGPU research and sandboxing.
We use GPG at
Am Sa 16.06.2012, 08:15:05 schrieb Aaron Toponce:
We use GPG at work for internal passwords. There are 3 XML files based on
the role that they employee fills at work (techs, domains, admins). With
about 50 exmployees' GPG keys, encrypting the 3 files is a bit daunting. It
takes a few seconds
On 06/16/2012 01:54 PM, Hauke Laging wrote:
Are these files huge? It's hard for me to believe that this takes
seconds. What I would easily believe is that the system gets an
entropy problem... So maybe a hardware RNG improves your situation.
Be careful about saying this without learning what
15 matches
Mail list logo