summaryrefslogtreecommitdiffstats
path: root/doc/pacman-key.8.txt
diff options
context:
space:
mode:
authorDan McGee <dan@archlinux.org>2011-09-28 11:06:43 +0200
committerDan McGee <dan@archlinux.org>2011-09-28 11:48:42 +0200
commit98e0371ae38d748fb04cec4759addb54e3a618ea (patch)
treef452b924402f271e77a41776ce11895f57d1510f /doc/pacman-key.8.txt
parentf66f9f11cd010a05efe28d0607abbf29ff8dffa5 (diff)
downloadpacman-98e0371ae38d748fb04cec4759addb54e3a618ea.tar.gz
pacman-98e0371ae38d748fb04cec4759addb54e3a618ea.tar.xz
Use the full buffer when computing md5/sha256 sums
No wonder these were slower than expected. We were only reading 4 (32-bit) or 8 (64-bit) bytes at a time and feeding it to the hash functions. Define a buffer size constant and use it correctly so we feed 8K at a time into the hashing algorithm. This cut one larger `-Sw --noconfirm` operation, with nothing to actually download so only timing integrity, from 3.3s to 1.7s. This has been broken since the original commit eba521913d6 introducing OpenSSL usage for crypto hash functions. Boy do I feel stupid. Signed-off-by: Dan McGee <dan@archlinux.org>
Diffstat (limited to 'doc/pacman-key.8.txt')
0 files changed, 0 insertions, 0 deletions