Hi, Alternatively you can use the wireshark or tcpudmp to capture the packet and decode the SSL - Client Hello and Sever Hello That also may help to identify which protocol and cipher we use
regards, James Arivazhagan Ponnusamy On Sat, Nov 22, 2014 at 7:12 AM, Chris Bare <chris.b...@gmail.com> wrote: > Thanks, that's just what I needed. > > By performance I mean the initial connection speed. It spends 4-5 seconds > in ssl3_send_client_key_exchange () in the slow case, vs about 0.1 sec in > the fast case. > This is on a 200Mhz arm, so it's not a fast machine. > > On Fri, Nov 21, 2014 at 7:03 PM, Dr. Stephen Henson <st...@openssl.org> > wrote: > >> On Fri, Nov 21, 2014, Chris Bare wrote: >> >> > Is there a way to query the BIO or SSL object to see which cipher is >> being >> > used? >> > I have a case where my openssl client's performance is significantly >> slower >> > when talking to server A vs server B. AFAIK, the only difference >> between A >> > and B is the level of Windows updates, so I'm suspicious that Windows >> has >> > started to favor the slower ECC ciphers, but I need a way to prove it. >> > >> >> SSL_get_cipher_name(). >> >> What do you mean by "peformance" the initial connection speed or the data >> transfer rate? With ECC the curve used is also significant: you can query >> that >> using OpenSSL 1.0.2+ which allows you to get details of the server >> temporary >> key. >> >> Steve. >> -- >> Dr Stephen N. Henson. OpenSSL project core developer. >> Commercial tech support now available see: http://www.openssl.org >> ______________________________________________________________________ >> OpenSSL Project http://www.openssl.org >> User Support Mailing List openssl-users@openssl.org >> Automated List Manager majord...@openssl.org >> > > > > -- > Chris Bare >