Date: Thu, 15 Apr 2004 11:05:30 -0400 From: Mike Tancsa <mike@sentex.net> To: andy@lewman.com Cc: freebsd-security@freebsd.org Subject: Re: recommended SSL-friendly crypto accelerator Message-ID: <6.0.3.0.0.20040415105459.0477f488@209.112.4.2> In-Reply-To: <20040415145148.GA99338@phobos.osem.com> References: <20040408144322.GA83448@bewilderbeast.blackhelicopters.org> <26486.1081437513@critter.freebsd.dk> <20040413181943.GA55219@bewilderbeast.blackhelicopters.org> <20040415030319.GA71038@phobos.osem.com> <6.0.3.0.0.20040414230754.07d7cf18@209.112.4.2> <20040415145148.GA99338@phobos.osem.com>
next in thread | previous in thread | raw e-mail | index | archive | help
At 10:51 AM 15/04/2004, andy@lewman.com wrote: >hifnstats shows decent amounts of traffic through it (at least >interrupts) however cryptokeytest doesn't work due to an unsupport call >apparently. > >Here's my hifnstats: > >input 476104224 bytes 1527365 packets >output 476104224 bytes 1527365 packets But is that your ssh session that is being accelerated ? To test, login via the console, or login using blowfish as the cipher. Then run hifnstats and make sure that the packet counters are not incrementing. Then do your https test. ---Mike
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?6.0.3.0.0.20040415105459.0477f488>