aboutsummaryrefslogtreecommitdiffstats
path: root/checks/pk_bench.cpp
Commit message (Collapse)AuthorAgeFilesLines
* Modify the self test program to use the builtin runtime benchmarking goop.lloyd2009-09-241-0/+14
| | | | | | | | | Features dropped: RNG benchmarking, the --bench-type option. New feature: Anything the library understands can be benchmarked using --bench-algo. Use 3DES and Serpent for mode benchmarking along with AES-128.
* Wrap benchmark_rw call in BOTAN_HAS_RW macro checklloyd2009-09-041-0/+2
|
* Remove support for HTML benchmark output. Easier/simpler to parse thelloyd2009-08-141-1/+1
| | | | | output with a script after the fact to generate such things, especially as often for HTML I want to do multiple side-by-side results.
* Remove lookup.h use from DLIES, PK key agreement, DSA param gen, get_enc.cpplloyd2008-11-111-2/+10
|
* Add DLIES benchmarklloyd2008-11-091-10/+72
|
* More useful PK benchmark output (also a bit easier to parse)lloyd2008-10-221-32/+46
|
* Add ECKAEG benchmark. Fix several problems found in ECKAEG key (had pure ↵lloyd2008-10-131-5/+73
| | | | virtuals)
* Add a simplistic ECDSA benchmarklloyd2008-10-121-0/+58
|
* Handle building Botan with almost all public key code disabled (though onlylloyd2008-10-011-8/+11
| | | | | | | with the aid of macro hackery, at the moment). Change DH feature macro to BOTAN_HAS_DIFFIE_HELLMAN Change NR feature macro to BOTAN_HAS_NYBERG_RUEPPEL
* Compliation fixeslloyd2008-09-281-1/+1
|
* Modularize the public key algorithms, though currently a great deal oflloyd2008-09-281-8/+50
| | | | | | the underlying implementation goop remains in the core library instead of being shunted off, due to various dependencies it has (most of which it shouldn't).
* Time RSA key generation againlloyd2008-09-151-1/+5
|
* Oops disable part of previous, was for testinglloyd2008-09-141-1/+7
|
* Only randomize inputs every 100 runs to minimize overhead (makes profiling ↵lloyd2008-09-141-31/+40
| | | | easier)
* Split RSA and RW benchmarks. Benchmark RSA encryption and signatures.lloyd2008-09-141-16/+87
|
* Padding changes in the PK benchmarks:lloyd2008-09-121-3/+3
| | | | | | RSA: EMSA4(SHA-1) -> EMSA1(SHA-1) RW: EMSA4(SHA-1) -> EMSA2(SHA-1) ELG: Raw -> EME1(SHA-1)
* Disable extensive testing during benchmark key generation: throws off profilerlloyd2008-09-071-0/+3
|
* Reduce how often DSA and DH keys are generated during benchmarkslloyd2008-09-071-2/+2
|
* Use the Timer class for all benchmarkinglloyd2008-09-051-15/+0
|
* New DH benchmark, much more reflective of real usage as well.lloyd2008-09-051-114/+64
|
* Delete dead code. New shared benchmark framework for RSA/RW. RSA benchmarklloyd2008-09-021-250/+155
| | | | now uses signing instead of encryption.
* Inline some methods of Timerlloyd2008-08-311-31/+19
| | | | Randomly generate the RW keys as well, removing all need for the keys/ dir
* Rewrite the RSA and DSA benchmarks to be much more readable and flexible,lloyd2008-08-311-51/+158
| | | | also now reporting key generation and (for DSA) parameter generation times.
* Benchmark change: Skip RSA 1536, DH 1536. Add DSA 2048/256 and 3072/256, RSA ↵lloyd2008-08-301-6/+16
| | | | 8192, DH 8192
* Remove most of the direct references to the global_rng() calllloyd2008-06-281-37/+50
|
* Remove uses of global PRNG from self-test and benchmark code. Assumeslloyd2008-06-271-15/+14
| | | | access to /dev/random (will be cleaned up shortly)
* Similiar combining transform for the ElGamal, DSA, and NR private keylloyd2008-06-201-9/+8
| | | | constructors.
* Consolidate the two DH_PrivateKey constructors into a single one takinglloyd2008-06-201-2/+2
| | | | | a RNG reference, a group, and an (optional) private key. The public key is now always rederived from the private.
* Convert pkcs8_decoder() and x509_decoder() to take a RandomNumberGenerator&lloyd2008-06-201-2/+2
| | | | | | | | reference, along with PKCS8::load_key get_pbe no longer calls new_params() on the newly instantiated instance, which is not backwards compatible (you have to either call new_params yourself, or explicitly set the iteration count, salt, etc)
* Fix remaining -Wmissing-declarations warnings in self-test/benchmark codelloyd2008-06-201-0/+5
|
* Change PK_Signer::signature to take a RandomNumberGenerator referencelloyd2008-06-101-3/+3
| | | | instead of always using the global PRNG.
* PK_Encryptor::encrypt now takes a RandomNumberGenerator reference, insteadlloyd2008-06-101-3/+5
| | | | of using the global RNG object.
* Previously random_integer and friends used the global PRNG object to getlloyd2008-05-241-4/+8
| | | | | | | | | | | | | random bits. Now they take a reference to a RandomNumberGenerator object. This was applied several times out, so now the constructors to private key objects also take a RandomNumberGenerator& argument. This is also true for a number of randomized algorithms (Miller-Rabin, for instance). You can get a reference to the global PRNG with global_state().prng_reference() This is a provisional thing: and warning: it is not thread safe! If this is a problem instead keep per-thread PRNGs and pass them were needed.
* Remove the Global_RNG namespace, along with rng.h and rng.cpp. This waslloyd2008-04-071-8/+8
| | | | | | | | | essentially a facade for the RNG object living in the global library state. Rewrite all callers to directly invoke the global state object: this makes it more clear what functions are actually accessing mutable state outside of the normal reference graph (and thus, which functions will have to be altered in order to remove this dependency). Other facades remain in place for the configuration object and the memory allocator factory.
* Fix pk_bench.cpp compilation (remove a stray try statement)lloyd2008-01-171-3/+2
|
* merge of '3d9e9476c5b2a2ee125eee7e0dd10bfe460d0546'lloyd2007-12-241-187/+95
|\ | | | | | | and '9fe0310805932b889bdfa17c9213f2b97d47ab6a'
| * Replace C-style casts with static_cast (found by GCC's -Wold-style-cast)lloyd2007-11-171-2/+1
| |
| * Wrap lines in pk_bench and passhash to keep them under 80 columns.lloyd2007-10-191-3/+4
| |
| * Cleanup the public key benchmark code: avoid macros, use PEM/PKCSlloyd2007-09-131-184/+93
| | | | | | | | | | | | | | | | | | #8 format to store Rabin-Williams keys, inline small functions that are only called once into their caller. Reduces overall length of the file from 458 to 367 lines. Rename all the key files in keys/ to use a .pem suffix since they are all now in PEM format (the RSA keys had been for a long time but were never renamed).
| * Remove code checking the BOTAN_NO_ macros for if particular public keylloyd2007-09-131-28/+5
| | | | | | | | | | algorithms exist. They haven't been used since the 'minimal' module was removed in Botan 1.3.14
* | Remove the BOTAN_NO_ macroslloyd2007-09-131-28/+5
|/
* DSA-2048 and DSA-3072 benchmarks, disabled for a while due to lack oflloyd2007-03-091-4/+6
| | | | 'standard' groups (I may just go ahead and do this).
* Decide to print ms/op or ops/second at runtime instead of compile time.lloyd2006-11-121-10/+8
|
* Add (very basic) HTML output for public key benchmarking.lloyd2006-09-271-11/+26
|
* Rename X509_PublicKey and PKCS8_PrivateKey to the new types within thelloyd2006-09-061-1/+1
| | | | self-test sources
* Initial checkin1.5.6lloyd2006-05-181-0/+466