aboutsummaryrefslogtreecommitdiffstats
path: root/src/benchmark
diff options
context:
space:
mode:
authorlloyd <[email protected]>2013-04-17 16:43:58 +0000
committerlloyd <[email protected]>2013-04-17 16:43:58 +0000
commita084169e019eecb867c2cc7e28f7bc7c47e1e532 (patch)
tree3b6bdb10a1e0b567a7176465b15adaa02310c803 /src/benchmark
parent77f0c643c0a575842fda1891f68bebc4bb8d2697 (diff)
Add more generalized runtime performance test, can check AEAD modes
and for block ciphers will time both encrypt and decrypt.
Diffstat (limited to 'src/benchmark')
-rw-r--r--src/benchmark/benchmark.cpp226
-rw-r--r--src/benchmark/benchmark.h18
2 files changed, 109 insertions, 135 deletions
diff --git a/src/benchmark/benchmark.cpp b/src/benchmark/benchmark.cpp
index a9b84f252..771654234 100644
--- a/src/benchmark/benchmark.cpp
+++ b/src/benchmark/benchmark.cpp
@@ -1,6 +1,6 @@
/*
* Runtime benchmarking
-* (C) 2008-2009 Jack Lloyd
+* (C) 2008-2009,2013 Jack Lloyd
*
* Distributed under the terms of the Botan license
*/
@@ -9,6 +9,7 @@
#include <botan/buf_comp.h>
#include <botan/block_cipher.h>
#include <botan/stream_cipher.h>
+#include <botan/aead.h>
#include <botan/hash.h>
#include <botan/mac.h>
#include <memory>
@@ -19,117 +20,119 @@ namespace Botan {
namespace {
-typedef std::chrono::high_resolution_clock benchmark_clock;
-
-/**
-* Benchmark Buffered_Computation (hash or MAC)
-*/
-std::pair<u64bit, u64bit> bench_buf_comp(Buffered_Computation* buf_comp,
- std::chrono::nanoseconds max_time,
- const byte buf[], size_t buf_len)
+double time_op(std::chrono::nanoseconds runtime, std::function<void ()> op)
{
- u64bit reps = 0;
-
std::chrono::nanoseconds time_used(0);
+ size_t reps = 0;
- while(time_used < max_time)
- {
- auto start = benchmark_clock::now();
- buf_comp->update(buf, buf_len);
- time_used += std::chrono::duration_cast<std::chrono::nanoseconds>(benchmark_clock::now() - start);
+ auto start = std::chrono::high_resolution_clock::now();
+ while(time_used < runtime)
+ {
+ op();
++reps;
+ time_used = std::chrono::high_resolution_clock::now() - start;
}
- u64bit ns_taken =
- std::chrono::duration_cast<std::chrono::nanoseconds>(time_used).count();
+ const u64bit nsec_used = std::chrono::duration_cast<std::chrono::nanoseconds>(time_used).count();
+
+ const double seconds_used = static_cast<double>(nsec_used) / 1000000000;
- return std::make_pair(reps * buf_len, ns_taken);
+ return reps / seconds_used; // ie, return ops per second
}
-/**
-* Benchmark block cipher
-*/
-std::pair<u64bit, u64bit>
-bench_block_cipher(BlockCipher* block_cipher,
- std::chrono::nanoseconds max_time,
- byte buf[], size_t buf_len)
+}
+
+std::map<std::string, double>
+time_algorithm_ops(const std::string& name,
+ Algorithm_Factory& af,
+ const std::string& provider,
+ RandomNumberGenerator& rng,
+ std::chrono::nanoseconds runtime,
+ size_t buf_size)
{
- const size_t in_blocks = buf_len / block_cipher->block_size();
+ const size_t Mebibyte = 1024*1024;
- u64bit reps = 0;
+ secure_vector<byte> buffer(buf_size * 1024);
+ rng.randomize(&buffer[0], buffer.size());
- std::chrono::nanoseconds time_used(0);
+ const double mb_mult = buffer.size() / static_cast<double>(Mebibyte);
- block_cipher->set_key(buf, block_cipher->maximum_keylength());
-
- while(time_used < max_time)
+ if(const BlockCipher* proto = af.prototype_block_cipher(name, provider))
{
- auto start = benchmark_clock::now();
- block_cipher->encrypt_n(buf, buf, in_blocks);
- time_used += std::chrono::duration_cast<std::chrono::nanoseconds>(benchmark_clock::now() - start);
- //time_used += benchmark_clock::now() - start;
+ std::unique_ptr<BlockCipher> bc(proto->clone());
- ++reps;
- }
+ const SymmetricKey key(rng, bc->maximum_keylength());
- u64bit ns_taken =
- std::chrono::duration_cast<std::chrono::nanoseconds>(time_used).count();
+ return std::map<std::string, double>({
+ { "key schedule", time_op(runtime / 8, [&]() { bc->set_key(key); }) },
+ { "encrypt", mb_mult * time_op(runtime / 2, [&]() { bc->encrypt(buffer); }) },
+ { "decrypt", mb_mult * time_op(runtime / 2, [&]() { bc->decrypt(buffer); }) },
+ });
+ }
+ else if(const StreamCipher* proto = af.prototype_stream_cipher(name, provider))
+ {
+ std::unique_ptr<StreamCipher> sc(proto->clone());
- return std::make_pair(reps * in_blocks * block_cipher->block_size(),
- ns_taken);
- }
+ const SymmetricKey key(rng, sc->maximum_keylength());
-/**
-* Benchmark stream
-*/
-std::pair<u64bit, u64bit>
-bench_stream_cipher(StreamCipher* stream_cipher,
- std::chrono::nanoseconds max_time,
- byte buf[], size_t buf_len)
- {
- u64bit reps = 0;
+ return std::map<std::string, double>({
+ { "key schedule", time_op(runtime / 8, [&]() { sc->set_key(key); }) },
+ { "", mb_mult * time_op(runtime, [&]() { sc->encipher(buffer); }) },
+ });
+ }
+ else if(const HashFunction* proto = af.prototype_hash_function(name, provider))
+ {
+ std::unique_ptr<HashFunction> h(proto->clone());
- stream_cipher->set_key(buf, stream_cipher->maximum_keylength());
+ return std::map<std::string, double>({
+ { "", mb_mult * time_op(runtime, [&]() { h->update(buffer); }) },
+ });
+ }
+ else if(const MessageAuthenticationCode* proto = af.prototype_mac(name, provider))
+ {
+ std::unique_ptr<MessageAuthenticationCode> mac(proto->clone());
- std::chrono::nanoseconds time_used(0);
+ const SymmetricKey key(rng, mac->maximum_keylength());
- while(time_used < max_time)
+ return std::map<std::string, double>({
+ { "key schedule", time_op(runtime / 8, [&]() { mac->set_key(key); }) },
+ { "", mb_mult * time_op(runtime, [&]() { mac->update(buffer); }) },
+ });
+ }
+ else
{
- auto start = benchmark_clock::now();
- stream_cipher->cipher1(buf, buf_len);
- time_used += benchmark_clock::now() - start;
+ std::unique_ptr<AEAD_Mode> enc(get_aead(name, ENCRYPTION));
+ std::unique_ptr<AEAD_Mode> dec(get_aead(name, DECRYPTION));
- ++reps;
- }
+ if(enc && dec)
+ {
+ const SymmetricKey key(rng, enc->maximum_keylength());
- u64bit ns_taken =
- std::chrono::duration_cast<std::chrono::nanoseconds>(time_used).count();
+ return std::map<std::string, double>({
+ { "key schedule", time_op(runtime / 4, [&]() { enc->set_key(key); dec->set_key(key); }) / 2 },
+ { "encrypt", mb_mult * time_op(runtime / 2, [&]() { enc->update(buffer, 0); buffer.resize(buf_size*1024); }) },
+ { "decrypt", mb_mult * time_op(runtime / 2, [&]() { dec->update(buffer, 0); buffer.resize(buf_size*1024); }) },
+ });
+ }
+ }
- return std::make_pair(reps * buf_len, ns_taken);
+ return std::map<std::string, double>();
}
-/**
-* Benchmark hash
-*/
-std::pair<u64bit, u64bit>
-bench_hash(HashFunction* hash,
- std::chrono::nanoseconds max_time,
- const byte buf[], size_t buf_len)
- {
- return bench_buf_comp(hash, max_time, buf, buf_len);
- }
+namespace {
-/**
-* Benchmark MAC
-*/
-std::pair<u64bit, u64bit>
-bench_mac(MessageAuthenticationCode* mac,
- std::chrono::nanoseconds max_time,
- const byte buf[], size_t buf_len)
+double find_first_in(const std::map<std::string, double>& m,
+ const std::vector<std::string>& keys)
{
- mac->set_key(buf, mac->maximum_keylength());
- return bench_buf_comp(mac, max_time, buf, buf_len);
+ for(auto key : keys)
+ {
+ auto i = m.find(key);
+ if(i != m.end())
+ return i->second;
+ }
+
+ throw std::runtime_error("algorithm_factory no usable keys found in result");
}
}
@@ -141,62 +144,15 @@ algorithm_benchmark(const std::string& name,
std::chrono::milliseconds milliseconds,
size_t buf_size)
{
- std::vector<std::string> providers = af.providers_of(name);
- std::map<std::string, double> all_results;
-
- if(providers.empty()) // no providers, nothing to do
- return all_results;
-
- std::chrono::nanoseconds ns_per_provider = milliseconds / providers.size();
+ const std::vector<std::string> providers = af.providers_of(name);
+ const std::chrono::nanoseconds ns_per_provider = milliseconds / providers.size();
- std::vector<byte> buf(buf_size * 1024);
- rng.randomize(&buf[0], buf.size());
+ std::map<std::string, double> all_results; // provider -> ops/sec
- for(size_t i = 0; i != providers.size(); ++i)
+ for(auto provider : providers)
{
- const std::string provider = providers[i];
-
- std::pair<u64bit, u64bit> results(0, 0);
-
- if(const BlockCipher* proto =
- af.prototype_block_cipher(name, provider))
- {
- std::unique_ptr<BlockCipher> block_cipher(proto->clone());
- results = bench_block_cipher(block_cipher.get(),
- ns_per_provider,
- &buf[0], buf.size());
- }
- else if(const StreamCipher* proto =
- af.prototype_stream_cipher(name, provider))
- {
- std::unique_ptr<StreamCipher> stream_cipher(proto->clone());
- results = bench_stream_cipher(stream_cipher.get(),
- ns_per_provider,
- &buf[0], buf.size());
- }
- else if(const HashFunction* proto =
- af.prototype_hash_function(name, provider))
- {
- std::unique_ptr<HashFunction> hash(proto->clone());
- results = bench_hash(hash.get(), ns_per_provider,
- &buf[0], buf.size());
- }
- else if(const MessageAuthenticationCode* proto =
- af.prototype_mac(name, provider))
- {
- std::unique_ptr<MessageAuthenticationCode> mac(proto->clone());
- results = bench_mac(mac.get(), ns_per_provider,
- &buf[0], buf.size());
- }
-
- if(results.first && results.second)
- {
- /* 953.67 == 1000 * 1000 * 1000 / 1024 / 1024 - the conversion
- factor from bytes per nanosecond to mebibytes per second.
- */
- double speed = (953.67 * results.first) / results.second;
- all_results[provider] = speed;
- }
+ auto results = time_algorithm_ops(name, af, provider, rng, ns_per_provider, buf_size);
+ all_results[provider] = find_first_in(results, { "", "update", "encrypt" });
}
return all_results;
diff --git a/src/benchmark/benchmark.h b/src/benchmark/benchmark.h
index 17df85e4e..93224dd2e 100644
--- a/src/benchmark/benchmark.h
+++ b/src/benchmark/benchmark.h
@@ -17,6 +17,24 @@
namespace Botan {
/**
+* Time aspects of an algorithm/provider
+* @param name the name of the algorithm to test
+* @param af the algorithm factory used to create objects
+* @param provider the provider to use
+* @param rng the rng to use to generate random inputs
+* @param runtime total time for the benchmark to run
+* @param buf_size size of buffer to benchmark against, in KiB
+* @return results a map from op type to operations per second
+*/
+std::map<std::string, double>
+BOTAN_DLL time_algorithm_ops(const std::string& name,
+ Algorithm_Factory& af,
+ const std::string& provider,
+ RandomNumberGenerator& rng,
+ std::chrono::nanoseconds runtime,
+ size_t buf_size);
+
+/**
* Algorithm benchmark
* @param name the name of the algorithm to test (cipher, hash, or MAC)
* @param af the algorithm factory used to create objects