[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #28839 [Core Tor/Tor]: Speed up parsing RSA onion keys from microdescriptors
#28839: Speed up parsing RSA onion keys from microdescriptors
------------------------------+---------------------------------
Reporter: nickm | Owner: (none)
Type: defect | Status: new
Priority: Medium | Milestone: Tor: 0.4.0.x-final
Component: Core Tor/Tor | Version: Tor: 0.3.4.9
Severity: Normal | Keywords: startup performance
Actual Points: | Parent ID: #28481
Points: | Reviewer:
Sponsor: Sponsor8-can |
------------------------------+---------------------------------
The two functions `crypto_pk_read_public_key_from_string()` is about 9% of
our startup time when we have directory information, and
`router_set_rsa_onion_pkey()` is about 2.4%. There is a probably a good
chance to save time here, in a few ways:
* Maybe pem_decode() could be faster. Right now it seems to be eating
3.53% of the startup time, and most of its energy is going into
tor_asprintf().
* We possibly save a decode/encode cycle, since we are parsing asn1 into
an RSA key, and then re-encoding that key into an asn1 string in
router_set_rsa_onion_pkey().
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/28839>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs