summaryrefslogtreecommitdiffstats
path: root/openpgp/benches/parse_cert.rs
blob: 05e9970ff08c24130fe0fedd233e6f64172d7d3a (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
use criterion::{
    criterion_group, BenchmarkGroup, BenchmarkId, Criterion, Throughput,
};

use sequoia_openpgp as openpgp;
use openpgp::cert::{Cert, CertBuilder};
use openpgp::packet::prelude::*;
use openpgp::packet::{Signature, UserID};
use openpgp::parse::Parse;
use openpgp::serialize::SerializeInto;
use openpgp::types::{Curve, KeyFlags, SignatureType};
use openpgp::Result;

use std::convert::TryInto;

fn generate_certifications<'a>(
    userid: &'a UserID,
    cert: &'a Cert,
    count: usize,
) -> Result<impl Iterator<Item = Signature> + 'a> {

    let k: Key<key::SecretParts, key::PrimaryRole> =
        Key4::generate_ecc(true, Curve::Ed25519)?.into();
    let mut keypair = k.into_keypair()?;

    let iter = (0..count).map(move |_| {
        userid
            .certify(
                &mut keypair,
                cert,
                SignatureType::PositiveCertification,
                None,
                None,
            )
            .unwrap()
    });
    Ok(iter)
}

fn generate_flooded_cert(
    key_count: usize,
    sigs_per_key: usize,
) -> Result<Vec<u8>> {
    // Generate a Cert for to be flooded
    let (mut floodme, _) = CertBuilder::new()
        .set_primary_key_flags(KeyFlags::empty().set_certification())
        .add_userid("flood.me@example.org")
        .generate()?;

    let floodme_cloned = floodme.clone();
    let userid = floodme_cloned.userids().next().unwrap();

    let certifications = (0..key_count).flat_map(|_| {
        generate_certifications(&userid, &floodme_cloned, sigs_per_key)
            .unwrap()
    });

    floodme = floodme.insert_packets(certifications)?;
    floodme.export_to_vec()
}

/// Parse the cert, unwrap to notice errors
fn read_cert(bytes: &[u8]) {
    Cert::from_bytes(bytes).unwrap();
}

/// Generate the cert and benchmark parsing.
/// The generated cert is signed by multiple other keys, 1 signature per key.
fn parse_cert_generated(
    group: &mut BenchmarkGroup<'_, criterion::measurement::WallTime>,
    name: &str,
    signature_count: usize,
) {
    let bytes = generate_flooded_cert(signature_count, 1).unwrap();

    group.throughput(Throughput::Bytes(bytes.len().try_into().unwrap()));

    group.bench_with_input(
        BenchmarkId::new(name, signature_count),
        &bytes,
        |b, bytes| b.iter(|| read_cert(bytes)),
    );
}

/// Benchmark parsing a generated cert with a given number of signatures
fn bench_parse_certs_generated(c: &mut Criterion) {
    let mut group = c.benchmark_group("parse flooded cert");
    parse_cert_generated(&mut group, "flooded", 100);
    parse_cert_generated(&mut group, "flooded", 316);
    parse_cert_generated(&mut group, "flooded", 1000);
    parse_cert_generated(&mut group, "flooded", 3162);
    group.finish();
}

/// Benchmark parsing a typical cert
fn bench_parse_certs(c: &mut Criterion) {
    let mut group = c.benchmark_group("parse typical cert");
    let bytes = include_bytes!("../tests/data/keys/neal.pgp");
    group.throughput(Throughput::Bytes(bytes.len().try_into().unwrap()));
    group.bench_function("neal.pgp", |b| b.iter(|| read_cert(bytes)));
    group.finish();
}

criterion_group!(benches, bench_parse_certs, bench_parse_certs_generated);