-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
How to enable/configure BCFIPS to use AES NI for TLS data transfer #1961
Comments
Hi, BCFIPS 2.0 has no native code support. You can use the DumpInfo command to get more information: 2.0:
vs 2.1.0:
MW |
Oh! Great thanks! We will try BCFIPS 2.1 |
Is there a way to get the 2.1.0 version using maven ? |
2.1.0 is in the process of getting a certificate, as that is the case it's only available under the support early access program at the moment. See https://www.keyfactor.com/open-source/bouncy-castle-support/ for details. |
Any expectation when 2.1.0 might be publicly available ? Meanwhile, are there other options of fixing the performance issue ? |
Not at the moment, owing to the change in administration (I guess), things seem to be in a state of flux right now. |
We are hitting a performance issue with BCFIPS when downloading files using HTTPS. Profiling reveals high cpu usage in the following call chain. This is some AES code in BCFIPS. The performance is 10x times slower than the linux wget command.
We are not sure that BCFIPS is leveraging the AES NI or not. This BCFIPS 2.0 on a Intel system.
Can you confirm/suggest ways to make BCFIPS use AES NI for TLS while keeping the FIPS compliance ? Some google search suggests to indirectly use the default java security provider for AES, but that would lose the FIPS compliance ?
The text was updated successfully, but these errors were encountered: