Open
Bug 286640
Opened 20 years ago
Updated 2 years ago
performance optimizations in pk11wrap
Categories
(NSS :: Libraries, defect, P2)
Tracking
(Not tracked)
NEW
People
(Reporter: julien.pierre, Unassigned)
Details
Attachments
(3 files)
|
749 bytes,
patch
|
Details | Diff | Splinter Review | |
|
1.79 KB,
patch
|
Details | Diff | Splinter Review | |
|
2.15 KB,
patch
|
Details | Diff | Splinter Review |
After analyzing runtime code paths with dtrace, I came up with some quick and dirty optimizations to accelerate pk11wrap for purposes of SSL benchmarking . I will attach a set of patches for them. Most of those patches delete code that I deemed unnecessary for benchmarking. They would need to be cleaned up to make that code optional. They are not currently ready for checkin by any means, but I wanted to have a record of them.
| Reporter | ||
Comment 1•20 years ago
|
||
Assumes token never logs itself out. Should be possible to configure if user knows this for a fact.
| Reporter | ||
Comment 2•20 years ago
|
||
This lock appears to be unnecessary for SSL purposes . This is one of 4 PR_Lock operations that happens for every PKCS#11 hashing and encryption calls. The other 3 are in the softoken.
| Reporter | ||
Comment 3•20 years ago
|
||
This patch caches the slot used for 2 operations used frequently in SSL handshakes. It's clearly wrong to do this in pk11wrap. The caching of slot configuration should happen at a higher level, in libssl. See bug 285538 . But this quick and dirty hack works when benchmarking SSL with NSS softoken .
Updated•20 years ago
|
QA Contact: bishakhabanerjee → jason.m.reid
Comment 4•20 years ago
|
||
These patches appear to be experiments in looking for bottle necks, and most should (obviously) not go into the tree as is. I'm reassigning to Julien, and adding myself to the CC list. If the experiments produce the need for additional work, we can spin off additional bugs that refer back to this one. bob
Assignee: rrelyea → julien.pierre.bugs
| Reporter | ||
Comment 5•20 years ago
|
||
I'm reassigning this performance bug to Nelson . I'm setting a target for 3.11, since this is our "performance release". However, we are getting most our benefits in SSL from bypassing PKCS#11, except for the RSA op. Because of this, it may be that some of these optimizations don't need to get in after all - at least not urgently. Nelson, feel free to lower the priority.
Assignee: julien.pierre.bugs → nelson
Priority: -- → P2
Target Milestone: --- → 3.11
Updated•19 years ago
|
QA Contact: jason.m.reid → libraries
Comment 6•18 years ago
|
||
remove target milestone, since the target was missed.
Target Milestone: 3.11 → ---
Updated•2 years ago
|
Severity: normal → S3
Comment 7•2 years ago
|
||
The bug assignee is inactive on Bugzilla, and this bug has priority 'P2'.
:beurdouche, could you have a look please?
For more information, please visit auto_nag documentation.
Assignee: nelson → nobody
Flags: needinfo?(bbeurdouche)
Comment 8•2 years ago
|
||
We have modified the bot to only consider P1 as high priority, so I'm cancelling the needinfo here.
Flags: needinfo?(bbeurdouche)
You need to log in
before you can comment on or make changes to this bug.
Description
•