From owner-freebsd-chat Sun Mar 2 19:19:10 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id TAA24410 for chat-outgoing; Sun, 2 Mar 1997 19:19:10 -0800 (PST) Received: from thelab.hub.org (hal-ns1-36.netcom.ca [207.181.94.100]) by freefall.freebsd.org (8.8.5/8.8.5) with ESMTP id TAA24404 for ; Sun, 2 Mar 1997 19:19:06 -0800 (PST) Received: from thelab.hub.org (localhost.hub.org [127.0.0.1]) by thelab.hub.org (8.8.5/8.8.2) with SMTP id XAA00767; Sun, 2 Mar 1997 23:18:11 -0400 (AST) Date: Sun, 2 Mar 1997 23:18:11 -0400 (AST) From: The Hermit Hacker To: Jake Hamby cc: henrich@crh.cl.msu.edu, freebsd-chat@FreeBSD.ORG, ghelmer@cs.iastate.edu Subject: Re: RSA 56-bit key challenge In-Reply-To: <199703030242.SAA01253@hamby1> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-chat@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk On Sun, 2 Mar 1997, Jake Hamby wrote: > Maybe this has to do with the patch in 2.7.2.1 to disable certain kinds of > strength reduction (-fstrength-reduce) because of buggy code generation. Recall > that this bug was why FreeBSD changed from using -O2 to -O optimization > (although some people used "-O2 -fno-strength-reduce). Here's a quote from I notice that 2.7.2.2 is available on prep...has anyone looked into that yet?