Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:35292 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 42875 invoked by uid 1010); 7 Feb 2008 11:26:05 -0000 Delivered-To: ezmlm-scan-internals@lists.php.net Delivered-To: ezmlm-internals@lists.php.net Received: (qmail 42859 invoked from network); 7 Feb 2008 11:26:04 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 7 Feb 2008 11:26:04 -0000 Authentication-Results: pb1.pair.com smtp.mail=solar@openwall.com; spf=pass; sender-id=pass Authentication-Results: pb1.pair.com header.from=solar@openwall.com; sender-id=pass Received-SPF: pass (pb1.pair.com: domain openwall.com designates 195.42.179.200 as permitted sender) X-PHP-List-Original-Sender: solar@openwall.com X-Host-Fingerprint: 195.42.179.200 mother.openwall.net Received: from [195.42.179.200] ([195.42.179.200:3072] helo=mother.openwall.net) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 73/C9-10179-CCAEAA74 for ; Thu, 07 Feb 2008 06:26:04 -0500 Received: (qmail 24232 invoked from network); 7 Feb 2008 11:26:01 -0000 Received: from localhost (HELO pvt.openwall.com) (127.0.0.1) by localhost with SMTP; 7 Feb 2008 11:26:01 -0000 Received: by pvt.openwall.com (Postfix, from userid 503) id 156322FD0E; Thu, 7 Feb 2008 14:21:09 +0300 (MSK) Date: Thu, 7 Feb 2008 14:21:09 +0300 To: Dmitry Stogov Cc: Sara Golemon , Stanislav Malyshev , Andi Gutmans , PHP Internals List Message-ID: <20080207112109.GA30558@openwall.com> References: <20071209010552.GA12561@openwall.com> <47A849D0.8050508@zend.com> <20080205235055.GA19309@openwall.com> <47AAD95A.8010109@zend.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <47AAD95A.8010109@zend.com> User-Agent: Mutt/1.4.2.3i Subject: Re: [PHP-DEV] faster & public domain MD5 implementation From: solar@openwall.com (Solar Designer) On Thu, Feb 07, 2008 at 01:11:38PM +0300, Dmitry Stogov wrote: > However new version breaks ext/hash md4. (ext/hash/tests/md4.phpt is > broken). Oh, I am able to reproduce this with my original patch: PASS hmac-md5 algorithm [ext/hash/tests/hmac-md5.phpt] PASS md2 algorithm [ext/hash/tests/md2.phpt] FAIL md4 algorithm [ext/hash/tests/md4.phpt] PASS md5 algorithm [ext/hash/tests/md5.phpt] PASS ripemd128 algorithm [ext/hash/tests/ripemd128.phpt] It didn't occur to me to pay attention to the MD4 test after patching MD5. Really weird. I'll look into it. Alexander