| Index: openssl/test/times
|
| ===================================================================
|
| --- openssl/test/times (revision 105093)
|
| +++ openssl/test/times (working copy)
|
| @@ -1,7 +1,7 @@
|
|
|
| More number for the questions about SSL overheads....
|
|
|
| -The following numbers were generated on a pentium pro 200, running linux.
|
| +The following numbers were generated on a Pentium pro 200, running Linux.
|
| They give an indication of the SSL protocol and encryption overheads.
|
|
|
| The program that generated them is an unreleased version of ssl/ssltest.c
|
| @@ -11,7 +11,7 @@
|
|
|
| How do I read this? The protocol and cipher are reasonable obvious.
|
| The next number is the number of connections being made. The next is the
|
| -number of bytes exchanged bewteen the client and server side of the protocol.
|
| +number of bytes exchanged between the client and server side of the protocol.
|
| This is the number of bytes that the client sends to the server, and then
|
| the server sends back. Because this is all happening in one process,
|
| the data is being encrypted, decrypted, encrypted and then decrypted again.
|
| @@ -55,10 +55,10 @@
|
|
|
| What does this all mean? Well for a server, with no session-id reuse, with
|
| a transfer size of 10240 bytes, using RC4-MD5 and a 512bit server key,
|
| -a pentium pro 200 running linux can handle the SSLv3 protocol overheads of
|
| +a Pentium pro 200 running Linux can handle the SSLv3 protocol overheads of
|
| about 49 connections a second. Reality will be quite different :-).
|
|
|
| -Remeber the first number is 1000 full ssl handshakes, the second is
|
| +Remember the first number is 1000 full ssl handshakes, the second is
|
| 1 full and 999 with session-id reuse. The RSA overheads for each exchange
|
| would be one public and one private operation, but the protocol/MAC/cipher
|
| cost would be quite similar in both the client and server.
|
| @@ -72,21 +72,21 @@
|
| killer in SSL. Often delays in the TCP protocol will make session-id
|
| reuse look slower that new sessions, but this would not be the case on
|
| a loaded server.
|
| -- The TCP round trip latencies, while slowing indervidual connections,
|
| +- The TCP round trip latencies, while slowing individual connections,
|
| would have minimal impact on throughput.
|
| - Instead of sending one 102400 byte buffer, one 8k buffer is sent until
|
| - the required number of bytes are processed.
|
| -- The SSLv3 connections were actually SSLv2 compatable SSLv3 headers.
|
| +- The SSLv3 connections were actually SSLv2 compatible SSLv3 headers.
|
| - A 512bit server key was being used except where noted.
|
| - No server key verification was being performed on the client side of the
|
| protocol. This would slow things down very little.
|
| - The library being used is SSLeay 0.8.x.
|
| -- The normal mesauring system was commands of the form
|
| +- The normal measuring system was commands of the form
|
| time ./ssltest -num 1000 -bytes 102400 -cipher DES-CBC-SHA -reuse
|
| This modified version of ssltest should be in the next public release of
|
| SSLeay.
|
|
|
| -The general cipher performace number for this platform are
|
| +The general cipher performance number for this platform are
|
|
|
| SSLeay 0.8.2a 04-Sep-1997
|
| built on Fri Sep 5 17:37:05 EST 1997
|
|
|