From owner-freebsd-current Mon Mar 12 10:55:10 2001 Delivered-To: freebsd-current@freebsd.org Received: from gratis.grondar.za (grouter.grondar.za [196.7.18.65]) by hub.freebsd.org (Postfix) with ESMTP id 0FDE037B719; Mon, 12 Mar 2001 10:55:02 -0800 (PST) (envelope-from mark@grondar.za) Received: from grondar.za (root@gratis.grondar.za [196.7.18.133]) by gratis.grondar.za (8.11.1/8.11.1) with ESMTP id f2CIsff91075; Mon, 12 Mar 2001 20:54:47 +0200 (SAST) (envelope-from mark@grondar.za) Message-Id: <200103121854.f2CIsff91075@gratis.grondar.za> To: Bruce Evans Cc: Maxim Sobolev , current@FreeBSD.ORG Subject: Re: Ethernet entropy harvesting seriously pessimizes performance References: In-Reply-To: ; from Bruce Evans "Tue, 13 Mar 2001 04:00:10 +1100." Date: Mon, 12 Mar 2001 20:55:39 +0200 From: Mark Murray Sender: owner-freebsd-current@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG > > Even with the Rijndael code and kern.random.sys.burst=$SMALLNUMBER ?? > > Rijndael stops it showing up much in top -S. I'm wondering where it is > hiding :-). kern.random.sys.burst=$SMALLNUMBER had very little effect. The Rijndael code makes a 2-orders-of-magnitude difference to the speed of the Davies-Meyer hash in hash.c. In order for the random kthread to show me numbers (I got paranoid when it didn't seem to show up), I slowed it down by looping the hashing "guts" 100 times :). This very clearly shows the superior key agility of Rijndael over Blowfish. Now kern.random.sys.burst is still available for those very slow, very high interrupt cases. M -- Mark Murray Warning: this .sig is umop ap!sdn To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message