-add benchmark for RSA crypto
[oweals/gnunet.git] / src / util / perf_crypto_rsa.c
diff --git a/src/util/perf_crypto_rsa.c b/src/util/perf_crypto_rsa.c
new file mode 100644 (file)
index 0000000..b2cf5cb
--- /dev/null
@@ -0,0 +1,204 @@
+/*
+     This file is part of GNUnet.
+     Copyright (C) 2014 Christian Grothoff (and other contributing authors)
+
+     GNUnet is free software; you can redistribute it and/or modify
+     it under the terms of the GNU General Public License as published
+     by the Free Software Foundation; either version 3, or (at your
+     option) any later version.
+
+     GNUnet is distributed in the hope that it will be useful, but
+     WITHOUT ANY WARRANTY; without even the implied warranty of
+     MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
+     General Public License for more details.
+
+     You should have received a copy of the GNU General Public License
+     along with GNUnet; see the file COPYING.  If not, write to the
+     Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
+     Boston, MA 02110-1301, USA.
+*/
+
+/**
+ * @author Christian Grothoff
+ * @file util/perf_crypto_rsa.c
+ * @brief measure performance of RSA signing
+ */
+#include "platform.h"
+#include "gnunet_util_lib.h"
+#include <gauger.h>
+
+
+/**
+ * Evaluate RSA performance.
+ *
+ * @param len keylength to evaluate with
+ */
+static void
+eval (unsigned int len)
+{
+  struct GNUNET_TIME_Absolute start;
+  struct GNUNET_CRYPTO_rsa_Signature *sig;
+  struct GNUNET_CRYPTO_rsa_Signature *rsig;
+  struct GNUNET_CRYPTO_rsa_PublicKey *public_key;
+  struct GNUNET_CRYPTO_rsa_PrivateKey *private_key;
+  struct GNUNET_CRYPTO_rsa_BlindingKey *bkey;
+  unsigned int i;
+  char sbuf[128];
+  char *bbuf;
+  size_t bbuf_len;
+  struct GNUNET_HashCode hc;
+
+  start = GNUNET_TIME_absolute_get ();
+  for (i=0;i<10;i++)
+  {
+    private_key = GNUNET_CRYPTO_rsa_private_key_create (len);
+    GNUNET_CRYPTO_rsa_private_key_free (private_key);
+  }
+  printf ("10x %u-key generation took %s\n",
+          len,
+          GNUNET_STRINGS_relative_time_to_string (GNUNET_TIME_absolute_get_duration (start),
+                                                  GNUNET_YES));
+  GNUNET_snprintf (sbuf,
+                   sizeof (sbuf),
+                   "RSA %u-key generation",
+                   len);
+  GAUGER ("UTIL", sbuf,
+          64 * 1024 / (1 +
+                       GNUNET_TIME_absolute_get_duration
+                       (start).rel_value_us / 1000LL), "keys/ms");
+  private_key = GNUNET_CRYPTO_rsa_private_key_create (len);
+  public_key = GNUNET_CRYPTO_rsa_private_key_get_public (private_key);
+  start = GNUNET_TIME_absolute_get ();
+  for (i=0;i<10;i++)
+  {
+    bkey = GNUNET_CRYPTO_rsa_blinding_key_create (len);
+    GNUNET_CRYPTO_rsa_blinding_key_free (bkey);
+  }
+  printf ("10x %u-blinding key generation took %s\n",
+          len,
+          GNUNET_STRINGS_relative_time_to_string (GNUNET_TIME_absolute_get_duration (start),
+                                                  GNUNET_YES));
+  GNUNET_snprintf (sbuf,
+                   sizeof (sbuf),
+                   "RSA %u-blinding key generation",
+                   len);
+  GAUGER ("UTIL", sbuf,
+          64 * 1024 / (1 +
+                       GNUNET_TIME_absolute_get_duration
+                       (start).rel_value_us / 1000LL), "keys/ms");
+  bkey = GNUNET_CRYPTO_rsa_blinding_key_create (len);
+  start = GNUNET_TIME_absolute_get ();
+  GNUNET_CRYPTO_hash ("test", 4, &hc);
+  for (i=0;i<10;i++)
+  {
+    bbuf_len = GNUNET_CRYPTO_rsa_blind (&hc,
+                                        bkey,
+                                        public_key,
+                                        &bbuf);
+    GNUNET_free (bbuf);
+  }
+  printf ("10x %u-blinding took %s\n",
+          len,
+          GNUNET_STRINGS_relative_time_to_string (GNUNET_TIME_absolute_get_duration (start),
+                                                 GNUNET_YES));
+  GNUNET_snprintf (sbuf,
+                   sizeof (sbuf),
+                   "RSA %u-blinding",
+                   len);
+  GAUGER ("UTIL",
+          sbuf,
+          64 * 1024 / (1 +
+                      GNUNET_TIME_absolute_get_duration
+                      (start).rel_value_us / 1000LL), "ops/ms");
+  bbuf_len = GNUNET_CRYPTO_rsa_blind (&hc,
+                                      bkey,
+                                      public_key,
+                                      &bbuf);
+  start = GNUNET_TIME_absolute_get ();
+  for (i=0;i<10;i++)
+  {
+    sig = GNUNET_CRYPTO_rsa_sign (private_key,
+                                  bbuf,
+                                  bbuf_len);
+    GNUNET_CRYPTO_rsa_signature_free (sig);
+  }
+  printf ("10x %u-signing took %s\n",
+          len,
+          GNUNET_STRINGS_relative_time_to_string (GNUNET_TIME_absolute_get_duration (start),
+                                                 GNUNET_YES));
+  GNUNET_snprintf (sbuf,
+                   sizeof (sbuf),
+                   "RSA %u-signing",
+                   len);
+  GAUGER ("UTIL",
+          sbuf,
+          64 * 1024 / (1 +
+                      GNUNET_TIME_absolute_get_duration
+                      (start).rel_value_us / 1000LL), "ops/ms");
+  sig = GNUNET_CRYPTO_rsa_sign (private_key,
+                                bbuf,
+                                bbuf_len);
+  start = GNUNET_TIME_absolute_get ();
+  for (i=0;i<10;i++)
+  {
+    rsig = GNUNET_CRYPTO_rsa_unblind (sig,
+                                      bkey,
+                                      public_key);
+    GNUNET_CRYPTO_rsa_signature_free (rsig);
+  }
+  printf ("10x %u-unblinding took %s\n",
+          len,
+          GNUNET_STRINGS_relative_time_to_string (GNUNET_TIME_absolute_get_duration (start),
+                                                 GNUNET_YES));
+  GNUNET_snprintf (sbuf,
+                   sizeof (sbuf),
+                   "RSA %u-unblinding",
+                   len);
+  GAUGER ("UTIL",
+          sbuf,
+          64 * 1024 / (1 +
+                      GNUNET_TIME_absolute_get_duration
+                      (start).rel_value_us / 1000LL), "ops/ms");
+  rsig = GNUNET_CRYPTO_rsa_unblind (sig,
+                                    bkey,
+                                    public_key);
+  start = GNUNET_TIME_absolute_get ();
+  for (i=0;i<10;i++)
+  {
+    GNUNET_assert (GNUNET_OK ==
+                   GNUNET_CRYPTO_rsa_verify (&hc,
+                                             rsig,
+                                             public_key));
+  }
+  printf ("10x %u-verifying took %s\n",
+          len,
+          GNUNET_STRINGS_relative_time_to_string (GNUNET_TIME_absolute_get_duration (start),
+                                                 GNUNET_YES));
+  GNUNET_snprintf (sbuf,
+                   sizeof (sbuf),
+                   "RSA %u-verification",
+                   len);
+  GAUGER ("UTIL",
+          sbuf,
+          64 * 1024 / (1 +
+                      GNUNET_TIME_absolute_get_duration
+                      (start).rel_value_us / 1000LL), "ops/ms");
+  GNUNET_CRYPTO_rsa_signature_free (sig);
+  GNUNET_CRYPTO_rsa_public_key_free (public_key);
+  GNUNET_CRYPTO_rsa_private_key_free (private_key);
+  GNUNET_CRYPTO_rsa_blinding_key_free (bkey);
+  GNUNET_free (bbuf);
+}
+
+
+int
+main (int argc, char *argv[])
+{
+  eval (1024);
+  eval (2048);
+  /* eval (4096); */
+  return 0;
+}
+
+
+/* end of perf_crypto_rsa.c */