tomaswolf commented on issue #686:
URL: https://github.com/apache/mina-sshd/issues/686#issuecomment-2717994703

   > the performance with the native provider got worse of about 20 percent
   
   That is surprising.
   
   So maybe back to the start: what SecurityProviders are available out of the 
box on the device? Is there one that already has native AES? (I would assume 
so.) If so, try forcing that one to be used for AES via a 
SecurityProviderRegistrar.
   
   Or: if there is no registrar supporting an algorithm and the 
SecurityProviderChoice is EMPTY (the default), then SecurityUtils.getCipher() 
should fall back to just calling Cipher.getInstance("AES"), which should give 
the one from whatever the default security provider on the device is. I would 
assume that that default provider would have an efficient implementation. So 
maybe the solution is to configure the server to not use the Bouncy Castle 
provider for ciphers. I think that could be done by defining system properties. 
For instance `-Dorg.apache.sshd.security.provider.BC.Cipher=none` should switch 
off using Bouncy Castle for any cipher. (And likewise for Macs via 
`-Dorg.apache.sshd.security.provider.BC.Mac=none`.)


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org
For additional commands, e-mail: dev-h...@mina.apache.org

Reply via email to