Date: 25 Jan 2003 13:52:26 +1030 From: "Daniel O'Connor" <doconnor@gsoft.com.au> To: Sam Leffler <sam@errno.com> Cc: Mike Tancsa <mike@sentex.net>, freebsd-stable@freebsd.org Subject: Re: HEADS UP: fast ipsec committed Message-ID: <1043464945.85148.51.camel@chowder.dons.net.au> In-Reply-To: <1bdc01c2c41f$eff0ef50$52557f42@errno.com> References: <5.2.0.9.0.20030124073321.07012c88@192.168.0.12> <187f01c2c3cb$9eb22e50$52557f42@errno.com> <1043462918.85148.28.camel@chowder.dons.net.au> <1bdc01c2c41f$eff0ef50$52557f42@errno.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, 2003-01-25 at 13:44, Sam Leffler wrote: > Right. If the crypto h/w has a RNG on it then the entropy is automatically > fed to the system PRNG. This can be a big win since it allows you to > disable IRQ entropy harvesting which is too expensive for a production > environment. Ahh, very nice. Maybe I should just read the code 8-) -- Daniel O'Connor software and network engineer for Genesis Software - http://www.gsoft.com.au "The nice thing about standards is that there are so many of them to choose from." -- Andrew Tanenbaum GPG Fingerprint - 9A8C 569F 685A D928 5140 AE4B 319B 41F4 5D17 FDD5 To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-stable" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1043464945.85148.51.camel>