|
Message-ID: <20120630164833.YAF8V.309852.imail@eastrmwml113> Date: Sat, 30 Jun 2012 16:48:33 -0400 From: <jfoug@....net> To: john-dev@...ts.openwall.com Subject: Re: SHA2 added to bleeding ---- jfoug <jfoug@....net> wrote: > I have added sha2.c and sha2.h and modified a lot of formats, to remove the > oSSL version dependency for SHA224/256/384/512 from JtR. > Here are some quick and dirty 'speed' tests: Speed tests for new JtR sha2.c code (generic vs oSSL) All tests on: AMD Atholon64-3400 dual core, non OMP build. linux-x86-64 build raw-sha256 384 512 OpenSSL 2517K 1999k 2086k Generic 2303k 1751k 1808k Percent 91.5% 87.6% 86.7% win32-cygwin-x86-sse2i build (old 3.4.4 gcc) raw-sha256 384 512 OpenSSL 1910K 920k 949k Generic 1807k 205k 209k Percent 94.6% 22% 22% VC 2005 build (32 bit release) raw-sha256 384 512 OpenSSL 1804K 937k 973k Generic 1807k 427k 437k Percent 100% 45.5% 44.8% Hopefully the above formats somewhat OK. I did this from a smart phone, VPN'd in to my desktop. I was glad to see that the 64 bit SHA2 formats did acceptable on a 64 bit build. They suck on 32 bit, but I am pretty sure that the ossl code is all in asm on the 32 bit stuff (or at least they must have asm for ror64(x) ) All tests were done on the same older Athlon 64, fully idle. Jim.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.