-
Notifications
You must be signed in to change notification settings - Fork 0
/
SignatureBenchmark.java
128 lines (114 loc) · 4.38 KB
/
SignatureBenchmark.java
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
/*
* Copyright (C) 2010 Google Inc.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package benchmarks.regression;
import com.google.caliper.Param;
import com.google.caliper.SimpleBenchmark;
import java.security.KeyPair;
import java.security.KeyPairGenerator;
import java.security.PrivateKey;
import java.security.PublicKey;
import java.security.Signature;
import java.util.HashMap;
import java.util.Map;
import org.apache.harmony.xnet.provider.jsse.OpenSSLSignature;
/**
* Tests RSA and DSA signature creation and verification.
*/
public class SignatureBenchmark extends SimpleBenchmark {
private static final int DATA_SIZE = 8192;
private static final byte[] DATA = new byte[DATA_SIZE];
static {
for (int i = 0; i < DATA_SIZE; i++) {
DATA[i] = (byte)i;
}
}
@Param private Algorithm algorithm;
public enum Algorithm {
MD5WithRSA,
SHA1WithRSA,
SHA256WithRSA,
SHA384WithRSA,
SHA512WithRSA,
SHA1withDSA
};
@Param private Implementation implementation;
public enum Implementation { OpenSSL, BouncyCastle };
// Key generation and signing aren't part of the benchmark for verification
// so cache the results
private static Map<String,KeyPair> KEY_PAIRS = new HashMap<String,KeyPair>();
private static Map<String,byte[]> SIGNATURES = new HashMap<String,byte[]>();
private String signatureAlgorithm;
private byte[] signature;
private PrivateKey privateKey;
private PublicKey publicKey;
@Override protected void setUp() throws Exception {
this.signatureAlgorithm = algorithm.toString();
String keyAlgorithm = signatureAlgorithm.substring(signatureAlgorithm.length() - 3 ,
signatureAlgorithm.length());
KeyPair keyPair = KEY_PAIRS.get(keyAlgorithm);
if (keyPair == null) {
KeyPairGenerator generator = KeyPairGenerator.getInstance(keyAlgorithm);
keyPair = generator.generateKeyPair();
KEY_PAIRS.put(keyAlgorithm, keyPair);
}
this.privateKey = keyPair.getPrivate();
this.publicKey = keyPair.getPublic();
this.signature = SIGNATURES.get(signatureAlgorithm);
if (this.signature == null) {
Signature signer = Signature.getInstance(signatureAlgorithm);
signer.initSign(keyPair.getPrivate());
signer.update(DATA);
this.signature = signer.sign();
SIGNATURES.put(signatureAlgorithm, signature);
}
}
public void timeSign(int reps) throws Exception {
for (int i = 0; i < reps; ++i) {
Signature signer;
switch (implementation) {
case OpenSSL:
signer = Signature.getInstance(signatureAlgorithm, "AndroidOpenSSL");
break;
case BouncyCastle:
signer = Signature.getInstance(signatureAlgorithm, "BC");
break;
default:
throw new RuntimeException(implementation.toString());
}
signer.initSign(privateKey);
signer.update(DATA);
signer.sign();
}
}
public void timeVerify(int reps) throws Exception {
for (int i = 0; i < reps; ++i) {
Signature verifier;
switch (implementation) {
case OpenSSL:
verifier = Signature.getInstance(signatureAlgorithm, "AndroidOpenSSL");
break;
case BouncyCastle:
verifier = Signature.getInstance(signatureAlgorithm, "BC");
break;
default:
throw new RuntimeException(implementation.toString());
}
verifier.initVerify(publicKey);
verifier.update(DATA);
verifier.verify(signature);
}
}
}