blob: e7a3c80305d5c965aec7f6d0075f535bc9a0f437 [file] [log] [blame]
/*
* Copyright (C) 2010 Google Inc.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package benchmarks.regression;
import com.google.caliper.BeforeExperiment;
import com.google.caliper.Param;
import java.security.KeyPair;
import java.security.KeyPairGenerator;
import java.security.PrivateKey;
import java.security.PublicKey;
import java.security.Signature;
import java.util.HashMap;
import java.util.Map;
/**
* Tests RSA and DSA signature creation and verification.
*/
public class SignatureBenchmark {
private static final int DATA_SIZE = 8192;
private static final byte[] DATA = new byte[DATA_SIZE];
static {
for (int i = 0; i < DATA_SIZE; i++) {
DATA[i] = (byte)i;
}
}
@Param private Algorithm algorithm;
public enum Algorithm {
MD5WithRSA,
SHA1WithRSA,
SHA256WithRSA,
SHA384WithRSA,
SHA512WithRSA,
SHA1withDSA
};
@Param private Implementation implementation;
public enum Implementation { OpenSSL, BouncyCastle };
// Key generation and signing aren't part of the benchmark for verification
// so cache the results
private static Map<String,KeyPair> KEY_PAIRS = new HashMap<String,KeyPair>();
private static Map<String,byte[]> SIGNATURES = new HashMap<String,byte[]>();
private String signatureAlgorithm;
private byte[] signature;
private PrivateKey privateKey;
private PublicKey publicKey;
@BeforeExperiment
protected void setUp() throws Exception {
this.signatureAlgorithm = algorithm.toString();
String keyAlgorithm = signatureAlgorithm.substring(signatureAlgorithm.length() - 3 ,
signatureAlgorithm.length());
KeyPair keyPair = KEY_PAIRS.get(keyAlgorithm);
if (keyPair == null) {
KeyPairGenerator generator = KeyPairGenerator.getInstance(keyAlgorithm);
keyPair = generator.generateKeyPair();
KEY_PAIRS.put(keyAlgorithm, keyPair);
}
this.privateKey = keyPair.getPrivate();
this.publicKey = keyPair.getPublic();
this.signature = SIGNATURES.get(signatureAlgorithm);
if (this.signature == null) {
Signature signer = Signature.getInstance(signatureAlgorithm);
signer.initSign(keyPair.getPrivate());
signer.update(DATA);
this.signature = signer.sign();
SIGNATURES.put(signatureAlgorithm, signature);
}
}
public void timeSign(int reps) throws Exception {
for (int i = 0; i < reps; ++i) {
Signature signer;
switch (implementation) {
case OpenSSL:
signer = Signature.getInstance(signatureAlgorithm, "AndroidOpenSSL");
break;
case BouncyCastle:
signer = Signature.getInstance(signatureAlgorithm, "BC");
break;
default:
throw new RuntimeException(implementation.toString());
}
signer.initSign(privateKey);
signer.update(DATA);
signer.sign();
}
}
public void timeVerify(int reps) throws Exception {
for (int i = 0; i < reps; ++i) {
Signature verifier;
switch (implementation) {
case OpenSSL:
verifier = Signature.getInstance(signatureAlgorithm, "AndroidOpenSSL");
break;
case BouncyCastle:
verifier = Signature.getInstance(signatureAlgorithm, "BC");
break;
default:
throw new RuntimeException(implementation.toString());
}
verifier.initVerify(publicKey);
verifier.update(DATA);
verifier.verify(signature);
}
}
}