On 10/27/2021 2:54 PM, Lukas Tribus wrote:
I'd be surprised if the OpenSSL API calls we are using doesn't support AES-NI.

Honestly that would surprise me too. But I have no idea how to find out whether it's using the acceleration or not, and the limited (and possibly incorrect) evidence I had suggested that maybe it was disabled by default, so I wanted to ask the question. I have almost zero knowledge about openssl API or code, so I can't discern the answer from haproxy code.

Thanks for the improved commands for testing purposes.

On openssl 1.1.1 from ubuntu, first with acceleration disabled and then with it enabled:

type 16 bytes 64 bytes 256 bytes 1024 bytes 8192 bytes 16384 bytes aes-128-cbc 175183.68k 218351.02k 242778.28k 251637.42k 231298.39k 251587.24k

type 16 bytes 64 bytes 256 bytes 1024 bytes 8192 bytes 16384 bytes aes-128-cbc 302331.09k 443021.42k 475877.63k 486907.90k 487268.35k 489406.46k


The same with openssl 3.0.1-dev:

type 16 bytes 64 bytes 256 bytes 1024 bytes 8192 bytes 16384 bytes AES-128-CBC 190766.02k 216849.62k 245917.61k 202468.01k 250989.23k 225902.59k

type 16 bytes 64 bytes 256 bytes 1024 bytes 8192 bytes 16384 bytes AES-128-CBC 348296.06k 404943.64k 480815.70k 485857.96k 423469.06k 480007.51k

That is great data, but doesn't tell me whether openssl uses acceleration in haproxy.

---

Separate but indirectly related: I would like to know if there is a timeline for when openssl 3.x will be supported by haproxy. The 2.4.7 version won't even compile against my local install of 3.0.1-dev. The 2.5-dev11 version compiles, but fails to link. I would imagine that it's going to be a lot of work to support it.

Thanks,
Shawn

Reply via email to