Date: Mon, 12 Mar 2001 20:55:39 +0200 From: Mark Murray <mark@grondar.za> To: Bruce Evans <bde@zeta.org.au> Cc: Maxim Sobolev <sobomax@FreeBSD.ORG>, current@FreeBSD.ORG Subject: Re: Ethernet entropy harvesting seriously pessimizes performance Message-ID: <200103121854.f2CIsff91075@gratis.grondar.za> In-Reply-To: <Pine.BSF.4.21.0103130357490.719-100000@besplex.bde.org> ; from Bruce Evans <bde@zeta.org.au> "Tue, 13 Mar 2001 04:00:10 %2B1100." References: <Pine.BSF.4.21.0103130357490.719-100000@besplex.bde.org>
next in thread | previous in thread | raw e-mail | index | archive | help
> > Even with the Rijndael code and kern.random.sys.burst=$SMALLNUMBER ?? > > Rijndael stops it showing up much in top -S. I'm wondering where it is > hiding :-). kern.random.sys.burst=$SMALLNUMBER had very little effect. The Rijndael code makes a 2-orders-of-magnitude difference to the speed of the Davies-Meyer hash in hash.c. In order for the random kthread to show me numbers (I got paranoid when it didn't seem to show up), I slowed it down by looping the hashing "guts" 100 times :). This very clearly shows the superior key agility of Rijndael over Blowfish. Now kern.random.sys.burst is still available for those very slow, very high interrupt cases. M -- Mark Murray Warning: this .sig is umop ap!sdn To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200103121854.f2CIsff91075>