Skip to content

Commit

Permalink
Merge pull request #35 from vipulnsward/pretify_bms
Browse files Browse the repository at this point in the history
Prettify BM printing
  • Loading branch information
vipulnsward committed Jun 20, 2013
2 parents dff173c + b6dc593 commit d04b2de
Show file tree
Hide file tree
Showing 6 changed files with 35 additions and 35 deletions.
28 changes: 14 additions & 14 deletions bm/bm_asn1_encode.rb
Original file line number Diff line number Diff line change
Expand Up @@ -73,9 +73,9 @@ def krypt_content
ossl_cert = OpenSSL::ASN1.decode(Resources.certificate)
ossl_x509 = OpenSSL::X509::Certificate.new(Resources.certificate)

bm.report("X509 encode parsed certificate(n=#{n})") { n.times { ossl_x509.to_der } }
bm.report("OpenSSL encode parsed certificate(n=#{n})") { n.times { ossl_cert.to_der } }
bm.report("Krypt encode parsed certificate(n=#{n})") { n.times { krypt_cert.to_der } }
bm.report("X509 encode parsed certificate(n=#{n}) ") { n.times { ossl_x509.to_der } }
bm.report("OpenSSL encode parsed certificate(n=#{n}) ") { n.times { ossl_cert.to_der } }
bm.report("Krypt encode parsed certificate(n=#{n}) ") { n.times { krypt_cert.to_der } }

krypt_seq = Krypt::ASN1::Sequence.new(krypt_content)
krypt_set = Krypt::ASN1::Set.new(krypt_content)
Expand All @@ -85,46 +85,46 @@ def krypt_content
ossl_set = OpenSSL::ASN1::Set.new(ossl_content)
ossl_asn1 = OpenSSL::ASN1::Sequence.new([ossl_seq, ossl_set])

bm.report("OpenSSL encode generated once(n=#{n})") { n.times { ossl_asn1.to_der } }
bm.report("Krypt encode generated once(n=#{n})") { n.times { krypt_asn1.to_der } }
bm.report("OpenSSL encode generated once(n=#{n}) ") { n.times { ossl_asn1.to_der } }
bm.report("Krypt encode generated once(n=#{n}) ") { n.times { krypt_asn1.to_der } }

bm.report("OpenSSL encode generated n times(n=#{n})") do
bm.report("OpenSSL encode generated n times(n=#{n}) ") do
n.times do
ossl_seq = OpenSSL::ASN1::Sequence.new(ossl_content)
ossl_set = OpenSSL::ASN1::Set.new(ossl_content)
OpenSSL::ASN1::Sequence.new([ossl_seq, ossl_set]).to_der
end
end

bm.report("Krypt encode generated n times(n=#{n})") do
bm.report("Krypt encode generated n times(n=#{n}) ") do
n.times do
krypt_seq = Krypt::ASN1::Sequence.new(krypt_content)
krypt_set = Krypt::ASN1::Set.new(krypt_content)
Krypt::ASN1::Sequence.new([krypt_seq, krypt_set]).to_der
end
end

bm.report("Krypt encode generated n times SEQ(n=#{n})") do
bm.report("Krypt encode generated n times SEQ(n=#{n}) ") do
n.times do
krypt_seq1 = Krypt::ASN1::Sequence.new(krypt_content)
krypt_seq2 = Krypt::ASN1::Sequence.new(krypt_content)
Krypt::ASN1::Sequence.new([krypt_seq1, krypt_seq2]).to_der
end
end

bm.report("Krypt encode generated n times SET(n=#{n})") do
bm.report("Krypt encode generated n times SET(n=#{n}) ") do
n.times do
krypt_set1 = Krypt::ASN1::Set.new(krypt_content)
krypt_set2 = Krypt::ASN1::Set.new(krypt_content)
Krypt::ASN1::Sequence.new([krypt_set1, krypt_set2]).to_der
end
end

bm.report("Krypt encode parsed certificate to file(n=#{n})") { n.times { krypt_cert.encode_to(file) } }
bm.report("Krypt encode parsed certificate to file(n=#{n}) ") { n.times { krypt_cert.encode_to(file) } }
file.rewind
bm.report("Krypt encode generated once to file(n=#{n})") { n.times { krypt_asn1.encode_to(file) } }
bm.report("Krypt encode generated once to file(n=#{n}) ") { n.times { krypt_asn1.encode_to(file) } }
file.rewind
bm.report("Krypt encode generated n times to file(n=#{n})") do
bm.report("Krypt encode generated n times to file(n=#{n}) ") do
n.times do
krypt_seq = Krypt::ASN1::Sequence.new(krypt_content)
krypt_set = Krypt::ASN1::Set.new(krypt_content)
Expand All @@ -133,8 +133,8 @@ def krypt_content
end

bm.report("Krypt encode parsed certificate to StringIO(n=#{n})") { n.times { krypt_cert.encode_to(StringIO.new) } }
bm.report("Krypt encode generated once to StringIO(n=#{n})") { n.times { krypt_asn1.encode_to(StringIO.new) } }
bm.report("Krypt encode generated n times to StringIO(n=#{n})") do
bm.report("Krypt encode generated once to StringIO(n=#{n}) ") { n.times { krypt_asn1.encode_to(StringIO.new) } }
bm.report("Krypt encode generated n times to StringIO(n=#{n}) ") do
n.times do
krypt_seq = Krypt::ASN1::Sequence.new(krypt_content)
krypt_set = Krypt::ASN1::Set.new(krypt_content)
Expand Down
14 changes: 7 additions & 7 deletions bm/bm_asn1_parse.rb
Original file line number Diff line number Diff line change
Expand Up @@ -8,25 +8,25 @@

cert = Resources.certificate
[1000, 10_000, 100_000].each do |n|
bm.report("Krypt::ASN1.decode String(n=#{n})") { n.times { Krypt::ASN1.decode(cert) } }
bm.report("OpenSSL::ASN1.decode String(n=#{n})") { n.times { OpenSSL::ASN1.decode(cert) } }
bm.report("Krypt::ASN1.decode File IO(n=#{n})") do
bm.report("Krypt::ASN1.decode String(n=#{n}) ") { n.times { Krypt::ASN1.decode(cert) } }
bm.report("OpenSSL::ASN1.decode String(n=#{n}) ") { n.times { OpenSSL::ASN1.decode(cert) } }
bm.report("Krypt::ASN1.decode File IO(n=#{n}) ") do
n.times do
io = Resources.certificate_io
Krypt::ASN1.decode(io)
io.close
end
end
bm.report("Krypt::ASN1.decode String from File IO(n=#{n})") do
bm.report("Krypt::ASN1.decode String from File IO(n=#{n}) ") do
n.times do
io = Resources.certificate_io
Krypt::ASN1.decode(io.read)
io.close
end
end
bm.report("OpenSSL::X509::Certificate String(n=#{n})") { n.times { OpenSSL::X509::Certificate.new(Resources.certificate) } }
bm.report("Krypt::ASN1.decode_der String(n=#{n})") { n.times { Krypt::ASN1.decode_der(cert) } }
bm.report("Krypt::ASN1.decode_der File IO(n=#{n})") do
bm.report("OpenSSL::X509::Certificate String(n=#{n}) ") { n.times { OpenSSL::X509::Certificate.new(Resources.certificate) } }
bm.report("Krypt::ASN1.decode_der String(n=#{n}) ") { n.times { Krypt::ASN1.decode_der(cert) } }
bm.report("Krypt::ASN1.decode_der File IO(n=#{n}) ") do
n.times do
io = Resources.certificate_io
Krypt::ASN1.decode_der(io)
Expand Down
12 changes: 6 additions & 6 deletions bm/bm_digest.rb
Original file line number Diff line number Diff line change
Expand Up @@ -6,35 +6,35 @@

n = 100000

bm.report("Krypt::Digest (SHA1) empty string") do
bm.report("Krypt::Digest (SHA1) empty string ") do
n.times do
Krypt::Digest::new("SHA1").digest("")
end
end

bm.report("Krypt::Digest::SHA1 empty string") do
bm.report("Krypt::Digest::SHA1 empty string ") do
n.times do
Krypt::Digest::SHA1.new.digest("")
end
end

bm.report("OpenSSL::Digest (SHA1) empty string") do
bm.report("OpenSSL::Digest (SHA1) empty string ") do
n.times do
OpenSSL::Digest.new("SHA1").digest("")
end
end

n = 1_000_000

bm.report("Krypt::Digest::SHA1 million times 'a'") do
bm.report("Krypt::Digest::SHA1 million times 'a' ") do
digest = Krypt::Digest::SHA1.new
n.times do
digest << "a"
end
digest.digest
end

bm.report("OpenSSL::Digest::SHA1 million times 'a'") do
bm.report("OpenSSL::Digest::SHA1 million times 'a' ") do
digest = OpenSSL::Digest::SHA1.new
n.times do
digest << "a"
Expand All @@ -44,7 +44,7 @@

n = 1000

bm.report("Krypt::Digest::SHA1 million times 'a' at once") do
bm.report("Krypt::Digest::SHA1 million times 'a' at once ") do
n.times do
digest = Krypt::Digest::SHA1.new
digest << ("a" * 1_000_000)
Expand Down
2 changes: 1 addition & 1 deletion bm/bm_hmac.rb
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@
data = "Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum."

Benchmark.bmbm do |results|
results.report('krypt-hmac') do
results.report('krypt-hmac ') do
md = Krypt::Digest.new("SHA1")
iter.times do
Krypt::HMAC.digest(md, key, data)
Expand Down
12 changes: 6 additions & 6 deletions bm/bm_pem.rb
Original file line number Diff line number Diff line change
Expand Up @@ -34,31 +34,31 @@

bytes = Krypt::PEM.decode(pem)[0]

bm.report("Krypt::ASN1.decode_der") do
bm.report("Krypt::ASN1.decode_der ") do
n.times do
Krypt::ASN1.decode_der(bytes)
end
end

bm.report("Krypt::ASN1.decode_pem") do
bm.report("Krypt::ASN1.decode_pem ") do
n.times do
Krypt::ASN1.decode_pem(pem)
end
end

bm.report("Krypt::ASN1.decode with der") do
bm.report("Krypt::ASN1.decode with der ") do
n.times do
Krypt::ASN1.decode(bytes)
end
end

bm.report("Krypt::ASN1.decode with pem") do
bm.report("Krypt::ASN1.decode with pem ") do
n.times do
Krypt::ASN1.decode(pem)
end
end

bm.report("Krypt::PEM.decode only") do
bm.report("Krypt::PEM.decode only ") do
n.times do
Krypt::PEM.decode(pem)
end
Expand All @@ -71,7 +71,7 @@
end
end

bm.report("OpenSSL::X509") do
bm.report("OpenSSL::X509 ") do
n.times do
OpenSSL::X509::Certificate.new(pem)
end
Expand Down
2 changes: 1 addition & 1 deletion bm/bm_template_parse.rb
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@

cert = Resources.certificate
[1000, 10_000, 100_000].each do |n|
bm.report("Krypt::X509.parse_der String(n=#{n})") { n.times { Krypt::X509::Certificate.parse_der(cert) } }
bm.report("Krypt::X509.parse_der String(n=#{n}) ") { n.times { Krypt::X509::Certificate.parse_der(cert) } }
bm.report("OpenSSL::X509::Certificate String(n=#{n})") { n.times { OpenSSL::X509::Certificate.new(Resources.certificate) } }
puts
end
Expand Down

0 comments on commit d04b2de

Please sign in to comment.