From mboxrd@z Thu Jan 1 00:00:00 1970 From: "Jason A. Donenfeld" Subject: Re: [kernel-hardening] Re: HalfSipHash Acceptable Usage Date: Wed, 21 Dec 2016 23:29:12 +0100 Message-ID: Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 To: kernel-hardening@lists.openwall.com, "Theodore Ts'o" , George Spelvin , Eric Dumazet , Jason , Andi Kleen , David Miller , David Laight , "Daniel J . Bernstein" , Eric Biggers , Hannes Frederic Sowa , Jean-Philippe Aumasson , Linux Crypto Mailing List , LKML , Andy Lutomirski , Netdev , Tom Herbert , Linus Torvalds , Vegard Nossum Return-path: Sender: linux-kernel-owner@vger.kernel.org List-Id: linux-crypto.vger.kernel.org On Wed, Dec 21, 2016 at 11:27 PM, Theodore Ts'o wrote: > And "with enough registers" includes ARM and MIPS, right? So the only > real problem is 32-bit x86, and you're right, at that point, only > people who might care are people who are using a space-radiation > hardened 386 --- and they're not likely to be doing high throughput > TCP connections. :-) Plus the benchmark was bogus anyway, and when I built a more specific harness -- actually comparing the TCP sequence number functions -- SipHash was faster than MD5, even on register starved x86. So I think we're fine and this chapter of the discussion can come to a close, in order to move on to more interesting things.