jdk-24/test/micro/org/openjdk/bench/java/security/Signatures.java
Claes Redestad 90bd544512 8342958: Use jvmArgs consistently in microbenchmarks
Reviewed-by: ecaspole, jvernee
2024-10-28 22:40:25 +00:00

198 lines
6.9 KiB
Java

/*
* Copyright (C) 2022 THL A29 Limited, a Tencent company. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License version 2 only, as
* published by the Free Software Foundation.
*
* This code is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* version 2 for more details (a copy is included in the LICENSE file that
* accompanied this code).
*
* You should have received a copy of the GNU General Public License version
* 2 along with this work; if not, write to the Free Software Foundation,
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
* or visit www.oracle.com if you need additional information or have any
* questions.
*/
package org.openjdk.bench.java.security;
import org.openjdk.jmh.annotations.*;
import java.security.*;
import java.security.spec.*;
import java.util.Random;
import java.util.concurrent.TimeUnit;
@BenchmarkMode(Mode.Throughput)
@OutputTimeUnit(TimeUnit.SECONDS)
@State(Scope.Thread)
@Warmup(iterations = 5, time = 1)
@Measurement(iterations = 5, time = 1)
@Fork(jvmArgs = {"-Xms1024m", "-Xmx1024m", "-Xmn768m", "-XX:+UseParallelGC"}, value = 3)
public class Signatures {
private static Signature signer;
@Param({"64", "512", "2048", "16384"})
private static int messageLength;
@Param({"secp256r1", "secp384r1", "secp521r1"})
private String algorithm;
private static byte[] message;
@Setup
public void setup() throws Exception {
message = new byte[messageLength];
(new Random(System.nanoTime())).nextBytes(message);
String signName = switch (algorithm) {
case "secp256r1" -> "SHA256withECDSA";
case "secp384r1" -> "SHA384withECDSA";
case "secp521r1" -> "SHA512withECDSA";
default -> throw new RuntimeException();
};
AlgorithmParameters params =
AlgorithmParameters.getInstance("EC", "SunEC");
params.init(new ECGenParameterSpec(algorithm));
ECGenParameterSpec ecParams =
params.getParameterSpec(ECGenParameterSpec.class);
KeyPairGenerator kpg =
KeyPairGenerator.getInstance("EC", "SunEC");
kpg.initialize(ecParams);
KeyPair kp = kpg.generateKeyPair();
signer = Signature.getInstance(signName, "SunEC");
signer.initSign(kp.getPrivate());
}
@Benchmark
public byte[] sign() throws SignatureException {
signer.update(message);
return signer.sign();
}
public static class EdDSA extends Signatures {
@Param({"Ed25519", "Ed448"})
private String algorithm;
@Setup
public void setup() throws Exception {
message = new byte[messageLength];
(new Random(System.nanoTime())).nextBytes(message);
KeyPairGenerator kpg =
KeyPairGenerator.getInstance(algorithm, "SunEC");
NamedParameterSpec spec = new NamedParameterSpec(algorithm);
kpg.initialize(spec);
KeyPair kp = kpg.generateKeyPair();
signer = Signature.getInstance(algorithm, "SunEC");
signer.initSign(kp.getPrivate());
}
}
public static class DSA extends Signatures {
@Param({"SHA256withDSA", "SHA384withDSA", "SHA512withDSA"})
private String algorithm;
@Setup
public void setup() throws Exception {
message = new byte[messageLength];
(new Random(System.nanoTime())).nextBytes(message);
int keyLength = switch (algorithm) {
case "SHA256withDSA" -> 2048;
case "SHA384withDSA" -> 3072;
case "SHA512withDSA" -> 3072;
default -> throw new RuntimeException();
};
KeyPairGenerator kpg = KeyPairGenerator.getInstance("DSA");
kpg.initialize(keyLength);
KeyPair kp = kpg.generateKeyPair();
signer = Signature.getInstance(algorithm);
signer.initSign(kp.getPrivate());
}
}
public static class RSA extends Signatures {
@Param({"SHA256withRSA", "SHA384withRSA", "SHA512withRSA"})
private String algorithm;
@Setup
public void setup() throws Exception {
message = new byte[messageLength];
(new Random(System.nanoTime())).nextBytes(message);
int keyLength = switch (algorithm) {
case "SHA256withRSA" -> 2048;
case "SHA384withRSA" -> 3072;
case "SHA512withRSA" -> 4096;
default -> throw new RuntimeException();
};
KeyPairGenerator kpg = KeyPairGenerator.getInstance("RSA");
kpg.initialize(keyLength);
KeyPair kp = kpg.generateKeyPair();
signer = Signature.getInstance(algorithm);
signer.initSign(kp.getPrivate());
}
}
public static class RSASSAPSS extends Signatures {
@Param({"SHA256", "SHA384", "SHA512"})
private String algorithm;
@Setup
public void setup() throws Exception {
message = new byte[messageLength];
(new Random(System.nanoTime())).nextBytes(message);
int keyLength = switch (algorithm) {
case "SHA256" -> 2048;
case "SHA384" -> 3072;
case "SHA512" -> 4096;
default -> throw new RuntimeException();
};
PSSParameterSpec spec = switch (algorithm) {
case "SHA256" ->
new PSSParameterSpec(
"SHA-256", "MGF1",
MGF1ParameterSpec.SHA256,
32, PSSParameterSpec.TRAILER_FIELD_BC);
case "SHA384" ->
new PSSParameterSpec(
"SHA-384", "MGF1",
MGF1ParameterSpec.SHA384,
48, PSSParameterSpec.TRAILER_FIELD_BC);
case "SHA512" ->
new PSSParameterSpec(
"SHA-512", "MGF1",
MGF1ParameterSpec.SHA512,
64, PSSParameterSpec.TRAILER_FIELD_BC);
default -> throw new RuntimeException();
};
KeyPairGenerator kpg = KeyPairGenerator.getInstance("RSASSA-PSS");
kpg.initialize(keyLength);
KeyPair kp = kpg.generateKeyPair();
signer = Signature.getInstance("RSASSA-PSS");
signer.setParameter(spec);
signer.initSign(kp.getPrivate());
}
}
}