Hi all,
I'm running an SSL script on JMeter and after upgrading from 2.1.1 to
2.2 I get these outputs to the console (running jmeter on Linux in batch
mode):
%% Client cached [Session-1, SSL_RSA_WITH_RC4_128_MD5]
%% Try resuming [Session-1, SSL_RSA_WITH_RC4_128_MD5] from port 57936
*** ClientHello, TLSv1
RandomCookie: GMT: 1136997456 bytes = { 105, 254, 111, 97, 62, 124,
215, 255, 1, 195, 110, 245, 125, 227, 87, 178, 150, 5, 60, 92, 229, 121,
111, 189, 210, 4, 164, 189 }
Session ID: {99, 14, 0, 0, 64, 134, 19, 115, 189, 144, 26, 111, 59, 20,
45, 140, 12, 43, 136, 4, 117, 160, 155, 7, 212, 189, 61, 242, 67, 36,
75, 235}
Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA,
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA,
TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA,
SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA,
SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA,
SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_RC4_40_MD5,
SSL_RSA_EXPORT_WITH_DES40_CBC_SHA,
SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA,
SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA]
Compression Methods: { 0 }
***
[write] MD5 and SHA1 hashes: len = 105
0000: 01 00 00 65 03 01 44 C5 34 50 69 FE 6F 61 3E 7C
...e..D.4Pi.oa>.
0010: D7 FF 01 C3 6E F5 7D E3 57 B2 96 05 3C 5C E5 79
....n...W...<\.y
0020: 6F BD D2 04 A4 BD 20 63 0E 00 00 40 86 13 73 BD o.....
[EMAIL PROTECTED]
0030: 90 1A 6F 3B 14 2D 8C 0C 2B 88 04 75 A0 9B 07 D4
..o;.-..+..u....
0040: BD 3D F2 43 24 4B EB 00 1E 00 04 00 05 00 2F 00
.=.C$K......../.
0050: 33 00 32 00 0A 00 16 00 13 00 09 00 15 00 12 00
3.2.............
0060: 03 00 08 00 14 00 11 01 00 .........
Mainflow Group 1-2, WRITE: TLSv1 Handshake, length = 105
[Raw write]: length = 110
0000: 16 03 01 00 69 01 00 00 65 03 01 44 C5 34 50 69
....i...e..D.4Pi
0010: FE 6F 61 3E 7C D7 FF 01 C3 6E F5 7D E3 57 B2 96
.oa>.....n...W..
0020: 05 3C 5C E5 79 6F BD D2 04 A4 BD 20 63 0E 00 00 .<\.yo.....
c...
0030: 40 86 13 73 BD 90 1A 6F 3B 14 2D 8C 0C 2B 88 04
@..s...o;.-..+..
0040: 75 A0 9B 07 D4 BD 3D F2 43 24 4B EB 00 1E 00 04
u.....=.C$K.....
0050: 00 05 00 2F 00 33 00 32 00 0A 00 16 00 13 00 09
.../.3.2........
0060: 00 15 00 12 00 03 00 08 00 14 00 11 01 00 ..............
[Raw read]: length = 5
0000: 14 03 01 00 01 .....
[Raw read]: length = 1
0000: 01 .
Mainflow Group 1-5, READ: TLSv1 Change Cipher Spec, length = 1
[Raw read]: length = 5
0000: 16 03 01 00 20 ....
[Raw read]: length = 32
0000: C7 FE 56 BE 2E 35 AA CE CA DB 28 7D B3 5A 3C 76
..V..5....(..Z<v
0010: ED ED 75 AA 70 A7 5F 87 A6 32 8F 06 ED F1 5B 01
..u.p._..2....[.
Mainflow Group 1-5, READ: TLSv1 Handshake, length = 32
Padded plaintext after DECRYPTION: len = 32
0000: 14 00 00 0C 6E E8 01 2F 70 39 16 43 D4 E4 E7 71
....n../p9.C...q
0010: 0B 36 6D 47 60 1D DD EA BB A2 2F E4 5A C1 46 5F
.6mG`...../.Z.F_
*** Finished
verify_data: { 110, 232, 1, 47, 112, 57, 22, 67, 212, 228, 231, 113 }
...
There's a whole lot of this stuff being output. This affects my
measurements. Does anybody know how to turn this off?
Best Regards
Oliver
---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]