similar to: OpenSSH and Galois/Counter mode i.e. GCM

Displaying 20 results from an estimated 5000 matches similar to: "OpenSSH and Galois/Counter mode i.e. GCM"

2020 Jul 05
8
[RFC] carry-less multiplication instruction
<div> </div><div><div><p>Carry-less multiplication[1] instructions exist (at least optionally) on many architectures: armv8, RISC-V, x86_64, POWER, SPARC, C64x, and possibly more.</p><p>This proposal is to add a <code>llvm.clmul</code> instruction. Or if that is contentious, <code>llvm.experimental.bitmanip.clmul</code> instruction.
2020 Jul 09
2
[RFC] carry-less multiplication instruction
05.07.2020, 05:22, "Roman Lebedev" <lebedev.ri at gmail.com>: > On Sun, Jul 5, 2020 at 12:18 PM Shawn Landden via llvm-dev > <llvm-dev at lists.llvm.org> wrote: >>  Carry-less multiplication[1] instructions exist (at least optionally) on many architectures: armv8, RISC-V, x86_64, POWER, SPARC, C64x, and possibly more. >> >>  This proposal is to add a
2014 Feb 25
1
Any plans to support standardized authenticated encryption?
Hi, I've been using Tinc for a couple years to encrypt some Samba shares on my home LAN. Today, I've been thinking about using Tinc to set up a VPN for VOIP/SIP traffic. I have reviewed the following pages of the Tinc documentation. Link 1 - http://tinc-vpn.org/documentation/Encryption-of-network-packets.html Link 2 - http://tinc-vpn.org/documentation/The-UDP-tunnel.html Link 3 -
2013 Sep 10
4
[Bug 1647] Implement FIPS 186-3 for DSA keys
https://bugzilla.mindrot.org/show_bug.cgi?id=1647 mackyle at gmail.com changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |mackyle at gmail.com --- Comment #2 from mackyle at gmail.com --- RFC 6668 [1] (2012-07) updated RFC 4253 adding the SHA-256 data
2013 Sep 10
4
[Bug 1647] Implement FIPS 186-3 for DSA keys
https://bugzilla.mindrot.org/show_bug.cgi?id=1647 mackyle at gmail.com changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |mackyle at gmail.com --- Comment #2 from mackyle at gmail.com --- RFC 6668 [1] (2012-07) updated RFC 4253 adding the SHA-256 data
2015 Mar 14
6
[Bug 2366] New: ssh-keygen doesn't correctly decode new format GCM-encrypted keys
https://bugzilla.mindrot.org/show_bug.cgi?id=2366 Bug ID: 2366 Summary: ssh-keygen doesn't correctly decode new format GCM-encrypted keys Product: Portable OpenSSH Version: 6.7p1 Hardware: All OS: All Status: NEW Severity: normal Priority: P5 Component:
2013 Mar 22
4
Announce: OpenSSH 6.2 released
Changes since OpenSSH 6.1 ========================= This release introduces a number of new features: Features: * ssh(1)/sshd(8): Added support for AES-GCM authenticated encryption in SSH protocol 2. The new cipher is available as aes128-gcm at openssh.com and aes256-gcm at openssh.com. It uses an identical packet format to the AES-GCM mode specified in RFC 5647, but uses simpler and
2011 Jan 15
2
[LLVMdev] Fw: LLVM GC
Forgot to CC the list. ----- Forwarded Message ---- > From: Samuel Crow <samuraileumas at yahoo.com> > To: Trevor Elliott <trevor at galois.com> > Sent: Fri, January 14, 2011 7:33:15 PM > Subject: Re: [LLVMdev] LLVM GC > > Hi Trevor, > > Are you linking with LibStdC++ or LibC++? That is a requirement for running > code that has been compiled from C++
2011 Jan 17
0
[LLVMdev] Fw: LLVM GC
Hi Sam, I've not actually gotten to the linking process with my runtime, as I've compiled it with clang -emit-llvm -c, and then archived it with llvm-ar and llvm-ranlib. I'm also not producing a GC plugin, as I'm using the builtin "shadow-stack" strategy. My current build process looks like this: 1. build the compiler 2. build the runtime using clang -emit-llvm -c
2020 Jul 09
2
[RFC] carry-less multiplication instruction
(As per IRC discussion) I understand that the carry-less multiplication algorithm has it's uses since/and it is implemented as an instruction in many architectures and that adding it as a general-purpose intrinsic will allow us to drop target-specific intrinsics as by-product. What i do *NOT* understand is: what is the actual/main goal/driving factor of adding an LLVM intrinsic for it? The
2020 May 18
2
Use Galois field New Instructions (GFNI) to combine affine instructions
On 5/18/20 8:24 PM, Craig Topper wrote: > I can tell you that your avx512 issue is that v64i8 gfni instructions also > require avx512bw to be enabled to make v64i8 a supported type. The C > intrinsics handling in the front end know this rule. But since you > generated your own intrinsics you bypassed that. Indeed that's the issue... I was stick with what Intel announces here
2016 Oct 14
2
LLVM/CLANG: CUDA compilation fail for inline assembly code
Hi, I am sorry for sending this query again here, but maybe I sent it to wrong list yesterday. I am trying to compile LonestarGPU-rev2.0 <http://iss.ices.utexas.edu/?p=projects/galois/lonestargpu/download> benchmark suite with LLVM/CLANG. This suite has a following piece of code (more info here
1999 May 14
2
Parallel printer error
Hello folks: The introduction: Great product this Samba! The problem: I am trying to migrate an HP LaserJet 4 printer in our office off a VMS system and hang it directly off the back of a UNIX machine. I have created the new entry in the printcap (see below) file on that machine and can print from UNIX - no problem. I created the share in Samba with what I think works pretty well (see below).
2015 Sep 24
0
Configure NUT slaves for D-Link 320 ShareCenter NUT master
Hello, I have a UPS unit attached to the "D-Link 320 ShareCenter", a SOHO 2-bay NAS. I set up the UPS in "Master Mode". Unfortunately it doesn't supply any kind of useful info in the web interface, so I had to connect via ?nc' to port 3493 to get the proper UPS name. I manage to to issue a successful ?upsc? command: root at galois:~# upsc megatec at 192.168.3.6
2018 Sep 21
0
AES-GCM with AES-NI
This is in regards to: https://bugzilla.samba.org/show_bug.cgi?id=11451 https://bugzilla.samba.org/show_bug.cgi?id=13008 Would it be possible to find out the current state of AES-GCM mode for file shares? Outside of Samba, CCM is typically slower and considered inferior to GCM I apologize for formatting issues, I typically don’t use email lists. In /source3/smbd/smb2_negprot.c lines 494 to
2015 Sep 24
2
Configure NUT slaves for D-Link 320 ShareCenter NUT master
Hello, I have a UPS unit attached to the "D-Link 320 ShareCenter", a SOHO 2-bay NAS. I set up the UPS in "Master Mode". Unfortunately it doesn't supply any kind of useful info in the web interface, so I had to connect via ?nc' to port 3493 to get the proper UPS name. I manage to to issue a successful ?upsc? command: root at galois:~# upsc megatec at 192.168.3.6
2020 Jul 05
5
[RFC] carry-less multiplication instruction
On 05.07.20 12:21, Roman Lebedev via llvm-dev wrote: > On Sun, Jul 5, 2020 at 12:18 PM Shawn Landden via llvm-dev > <llvm-dev at lists.llvm.org> wrote: >> >> >> >> Carry-less multiplication[1] instructions exist (at least optionally) on many architectures: armv8, RISC-V, x86_64, POWER, SPARC, C64x, and possibly more. >> >> This proposal is to add a
2010 Nov 30
0
ANN: HaLVM 1.0: the Haskell Lightweight Virtual Machine
Galois, Inc. is pleased to announce the immediate release of the Haskell Lightweight Virtual Machine (or HaLVM), version 1.0. The HaLVM is a port of the GHC runtime system to the Xen hypervisor, allowing programmers to create Haskell programs that run directly on Xen''s "bare metal." Internally, Galois has used this system in several projects with much success, and we hope
2020 May 18
2
Use Galois field New Instructions (GFNI) to combine affine instructions
Hello everyone, On the last couple of days, I have been experimenting with teaching LLVM how to combine a set of affine instructions into an instruction that uses the GFNI [1] AVX512 extension, especially GF2P8AFFINEQB [2]. While the general idea seems to work, I have some questions about my current implementation (see below). FTR, I have named this transformation AffineCombineExpr (ACE).
2015 Sep 26
0
Configure NUT slaves for D-Link 320 ShareCenter NUT master
I was able to root the NAS using this howto[1] - from a rather sketchy blog, full of clickbaits - and found out the default configuration: [root] password = 123 upsmon master [client] password = 123 upsmon slave I bet these are the defaults for every DNS-3xx series out there. I wonder why they did not put the info on the manual. I?m posting this for the ?future generations?.. In case anyone