8256507: Add a micro benchmark for JDK-8153005
Reviewed-by: shade
This commit is contained in:
parent
8d9cf48e81
commit
b21b96df21
186
test/micro/org/openjdk/bench/java/security/PKCS12KeyStores.java
Normal file
186
test/micro/org/openjdk/bench/java/security/PKCS12KeyStores.java
Normal file
@ -0,0 +1,186 @@
|
||||
/*
|
||||
* Copyright (c) 2020, Oracle and/or its affiliates. All rights reserved.
|
||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
*
|
||||
* This code is free software; you can redistribute it and/or modify it
|
||||
* under the terms of the GNU General Public License version 2 only, as
|
||||
* published by the Free Software Foundation.
|
||||
*
|
||||
* This code is distributed in the hope that it will be useful, but WITHOUT
|
||||
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
||||
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||
* version 2 for more details (a copy is included in the LICENSE file that
|
||||
* accompanied this code).
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License version
|
||||
* 2 along with this work; if not, write to the Free Software Foundation,
|
||||
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||
*
|
||||
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
|
||||
* or visit www.oracle.com if you need additional information or have any
|
||||
* questions.
|
||||
*/
|
||||
package org.openjdk.bench.java.security;
|
||||
|
||||
import java.io.ByteArrayInputStream;
|
||||
import java.io.ByteArrayOutputStream;
|
||||
import java.math.BigInteger;
|
||||
import java.security.*;
|
||||
import java.security.cert.Certificate;
|
||||
import java.security.cert.CertificateFactory;
|
||||
import java.security.spec.PKCS8EncodedKeySpec;
|
||||
import java.util.concurrent.TimeUnit;
|
||||
|
||||
import org.openjdk.jmh.annotations.*;
|
||||
|
||||
/**
|
||||
* Tests various algorithm settings for PKCS12 keystores.
|
||||
*/
|
||||
@State(Scope.Benchmark)
|
||||
@OutputTimeUnit(TimeUnit.MILLISECONDS)
|
||||
@Warmup(iterations = 2)
|
||||
@Measurement(iterations = 10)
|
||||
@BenchmarkMode(Mode.AverageTime)
|
||||
@Fork(jvmArgsAppend = {"-Xms1024m", "-Xmx1024m", "-Xmn768m", "-XX:+UseParallelGC"}, value = 5)
|
||||
public class PKCS12KeyStores {
|
||||
|
||||
private static final char[] PASS = "changeit".toCharArray();
|
||||
|
||||
private Key pk;
|
||||
private Certificate[] certs;
|
||||
|
||||
// Several pkcs12 keystores in byte arrays
|
||||
private byte[] bw2048;
|
||||
private byte[] bw50000; // Default old
|
||||
private byte[] bs50000;
|
||||
private byte[] bs10000; // Default new
|
||||
private byte[] bs2048;
|
||||
|
||||
// Decodes HEX string to byte array
|
||||
private static byte[] xeh(String in) {
|
||||
return new BigInteger(in, 16).toByteArray();
|
||||
}
|
||||
|
||||
@Setup
|
||||
public void setup() throws Exception {
|
||||
// Just generate a keypair and dump getEncoded() of key and cert.
|
||||
byte[] x1 = xeh("3041020100301306072A8648CE3D020106082A8648CE3D03" +
|
||||
"0107042730250201010420B561D1FBE150488508BBE8FF4540F09057" +
|
||||
"58712F5D2D3CC80F9A15BA5D481117");
|
||||
byte[] x2 = xeh("3082012D3081D5A00302010202084EE6ECC5585640A7300A" +
|
||||
"06082A8648CE3D040302300C310A30080603550403130161301E170D" +
|
||||
"3230313131373230343730355A170D3233303831343230343730355A" +
|
||||
"300C310A300806035504031301613059301306072A8648CE3D020106" +
|
||||
"082A8648CE3D030107034200041E761F511841602E272B40A021995D" +
|
||||
"1BD828DDC7F71412D6A66CC0CB858C856D32C58273E494676D1D2B05" +
|
||||
"B8E9B08207A122265C2AA5FCBDCE19E5E88CA7A1B6A321301F301D06" +
|
||||
"03551D0E04160414173F278D77096E5C8EA182D12F147694587B5D9A" +
|
||||
"300A06082A8648CE3D04030203470030440220760CEAF1FA7041CB8C" +
|
||||
"1CA80AF60E4F9C9D5136D96B2AF0AAA9440F79561C44E502205D5C72" +
|
||||
"886C92B95A681C4393C67AAEC8DA9FD7910FF9BF2BCB721AE71D1B6F88");
|
||||
KeyFactory kf = KeyFactory.getInstance("EC");
|
||||
pk = kf.generatePrivate(new PKCS8EncodedKeySpec(x1));
|
||||
CertificateFactory cf = CertificateFactory.getInstance("X.509");
|
||||
certs = new Certificate[]{cf.generateCertificate(new ByteArrayInputStream(x2))};
|
||||
|
||||
bw2048 = outweak2048();
|
||||
bw50000 = outweak50000_Old();
|
||||
bs50000 = outstrong50000();
|
||||
bs10000 = outstrong10000_New();
|
||||
bs2048 = outstrong2048();
|
||||
}
|
||||
|
||||
// Reads in a pkcs12 keystore
|
||||
private KeyStore in(byte[] b) throws Exception {
|
||||
KeyStore ks = KeyStore.getInstance("pkcs12");
|
||||
ks.load(new ByteArrayInputStream(b), PASS);
|
||||
if (!ks.getCertificate("a").getPublicKey().getAlgorithm().equals(
|
||||
ks.getKey("a", PASS).getAlgorithm())) {
|
||||
throw new RuntimeException("Not same alg");
|
||||
}
|
||||
return ks;
|
||||
}
|
||||
|
||||
// Generates a pkcs12 keystore with the specified algorithm/ic
|
||||
private byte[] out(String cAlg, String cIc, String kAlg, String kIc,
|
||||
String mAlg, String mIc) throws Exception {
|
||||
System.setProperty("keystore.pkcs12.certProtectionAlgorithm", cAlg);
|
||||
System.setProperty("keystore.pkcs12.certPbeIterationCount", cIc);
|
||||
System.setProperty("keystore.pkcs12.keyProtectionAlgorithm", kAlg);
|
||||
System.setProperty("keystore.pkcs12.keyPbeIterationCount", kIc);
|
||||
System.setProperty("keystore.pkcs12.macAlgorithm", mAlg);
|
||||
System.setProperty("keystore.pkcs12.macIterationCount", mIc);
|
||||
KeyStore ks = KeyStore.getInstance("pkcs12");
|
||||
ks.load(null, null);
|
||||
ks.setKeyEntry("a", pk, PASS, certs);
|
||||
ByteArrayOutputStream bout = new ByteArrayOutputStream();
|
||||
ks.store(bout, PASS);
|
||||
return bout.toByteArray();
|
||||
}
|
||||
|
||||
// Benchmark methods start here:
|
||||
|
||||
// Reading a keystore
|
||||
@Benchmark
|
||||
public KeyStore inweak2048() throws Exception {
|
||||
return in(bw2048);
|
||||
}
|
||||
|
||||
@Benchmark
|
||||
public KeyStore inweak50000_Old() throws Exception {
|
||||
return in(bw50000);
|
||||
}
|
||||
|
||||
@Benchmark
|
||||
public KeyStore instrong50000() throws Exception {
|
||||
return in(bs50000);
|
||||
}
|
||||
|
||||
@Benchmark
|
||||
public KeyStore instrong10000_New() throws Exception {
|
||||
return in(bs10000);
|
||||
}
|
||||
|
||||
@Benchmark
|
||||
public KeyStore instrong2048() throws Exception {
|
||||
return in(bs2048);
|
||||
}
|
||||
|
||||
// Writing a keystore
|
||||
@Benchmark
|
||||
public byte[] outweak2048() throws Exception {
|
||||
return out("PBEWithSHA1AndRC2_40", "2048",
|
||||
"PBEWithSHA1AndDESede", "2048",
|
||||
"HmacPBESHA1", "2048");
|
||||
}
|
||||
|
||||
@Benchmark
|
||||
public byte[] outweak50000_Old() throws Exception {
|
||||
return out("PBEWithSHA1AndRC2_40", "50000",
|
||||
"PBEWithSHA1AndDESede", "50000",
|
||||
"HmacPBESHA1", "100000");
|
||||
// Attention: 100000 is old default Mac ic
|
||||
}
|
||||
|
||||
@Benchmark
|
||||
public byte[] outstrong50000() throws Exception {
|
||||
return out("PBEWithHmacSHA256AndAES_256", "50000",
|
||||
"PBEWithHmacSHA256AndAES_256", "50000",
|
||||
"HmacPBESHA256", "100000");
|
||||
// Attention: 100000 is old default Mac ic
|
||||
}
|
||||
|
||||
@Benchmark
|
||||
public byte[] outstrong10000_New() throws Exception {
|
||||
return out("PBEWithHmacSHA256AndAES_256", "10000",
|
||||
"PBEWithHmacSHA256AndAES_256", "10000",
|
||||
"HmacPBESHA256", "10000");
|
||||
}
|
||||
|
||||
@Benchmark
|
||||
public byte[] outstrong2048() throws Exception {
|
||||
return out("PBEWithHmacSHA256AndAES_256", "2048",
|
||||
"PBEWithHmacSHA256AndAES_256", "2048",
|
||||
"HmacPBESHA256", "2048");
|
||||
}
|
||||
}
|
Loading…
Reference in New Issue
Block a user