2020-12-29 17:15:51 +00:00
|
|
|
/***********************************************************************
|
|
|
|
* Copyright (c) 2014 Pieter Wuille *
|
|
|
|
* Distributed under the MIT software license, see the accompanying *
|
|
|
|
* file COPYING or https://www.opensource.org/licenses/mit-license.php.*
|
|
|
|
***********************************************************************/
|
2015-10-26 14:54:21 +00:00
|
|
|
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <string.h>
|
|
|
|
|
|
|
|
#include "include/secp256k1.h"
|
|
|
|
#include "util.h"
|
|
|
|
#include "bench.h"
|
|
|
|
|
2016-01-14 18:35:54 +00:00
|
|
|
#ifdef ENABLE_OPENSSL_TESTS
|
|
|
|
#include <openssl/bn.h>
|
|
|
|
#include <openssl/ecdsa.h>
|
|
|
|
#include <openssl/obj_mac.h>
|
|
|
|
#endif
|
|
|
|
|
2020-08-26 17:35:27 +00:00
|
|
|
|
2015-10-26 14:54:21 +00:00
|
|
|
typedef struct {
|
2020-12-29 17:15:51 +00:00
|
|
|
rustsecp256k1_v0_4_0_context *ctx;
|
2015-10-26 14:54:21 +00:00
|
|
|
unsigned char msg[32];
|
|
|
|
unsigned char key[32];
|
|
|
|
unsigned char sig[72];
|
|
|
|
size_t siglen;
|
|
|
|
unsigned char pubkey[33];
|
|
|
|
size_t pubkeylen;
|
2016-01-14 18:35:54 +00:00
|
|
|
#ifdef ENABLE_OPENSSL_TESTS
|
|
|
|
EC_GROUP* ec_group;
|
|
|
|
#endif
|
2020-12-29 17:15:51 +00:00
|
|
|
} bench_verify_data;
|
2015-10-26 14:54:21 +00:00
|
|
|
|
2020-12-29 17:15:51 +00:00
|
|
|
static void bench_verify(void* arg, int iters) {
|
2015-10-26 14:54:21 +00:00
|
|
|
int i;
|
2020-12-29 17:15:51 +00:00
|
|
|
bench_verify_data* data = (bench_verify_data*)arg;
|
2015-10-26 14:54:21 +00:00
|
|
|
|
2020-08-26 17:35:27 +00:00
|
|
|
for (i = 0; i < iters; i++) {
|
2020-12-29 17:15:51 +00:00
|
|
|
rustsecp256k1_v0_4_0_pubkey pubkey;
|
|
|
|
rustsecp256k1_v0_4_0_ecdsa_signature sig;
|
2015-10-26 14:54:21 +00:00
|
|
|
data->sig[data->siglen - 1] ^= (i & 0xFF);
|
|
|
|
data->sig[data->siglen - 2] ^= ((i >> 8) & 0xFF);
|
|
|
|
data->sig[data->siglen - 3] ^= ((i >> 16) & 0xFF);
|
2020-12-29 17:15:51 +00:00
|
|
|
CHECK(rustsecp256k1_v0_4_0_ec_pubkey_parse(data->ctx, &pubkey, data->pubkey, data->pubkeylen) == 1);
|
|
|
|
CHECK(rustsecp256k1_v0_4_0_ecdsa_signature_parse_der(data->ctx, &sig, data->sig, data->siglen) == 1);
|
|
|
|
CHECK(rustsecp256k1_v0_4_0_ecdsa_verify(data->ctx, &sig, data->msg, &pubkey) == (i == 0));
|
2015-10-26 14:54:21 +00:00
|
|
|
data->sig[data->siglen - 1] ^= (i & 0xFF);
|
|
|
|
data->sig[data->siglen - 2] ^= ((i >> 8) & 0xFF);
|
|
|
|
data->sig[data->siglen - 3] ^= ((i >> 16) & 0xFF);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-01-14 18:35:54 +00:00
|
|
|
#ifdef ENABLE_OPENSSL_TESTS
|
2020-12-29 17:15:51 +00:00
|
|
|
static void bench_verify_openssl(void* arg, int iters) {
|
2016-01-14 18:35:54 +00:00
|
|
|
int i;
|
2020-12-29 17:15:51 +00:00
|
|
|
bench_verify_data* data = (bench_verify_data*)arg;
|
2016-01-14 18:35:54 +00:00
|
|
|
|
2020-08-26 17:35:27 +00:00
|
|
|
for (i = 0; i < iters; i++) {
|
2016-01-14 18:35:54 +00:00
|
|
|
data->sig[data->siglen - 1] ^= (i & 0xFF);
|
|
|
|
data->sig[data->siglen - 2] ^= ((i >> 8) & 0xFF);
|
|
|
|
data->sig[data->siglen - 3] ^= ((i >> 16) & 0xFF);
|
|
|
|
{
|
|
|
|
EC_KEY *pkey = EC_KEY_new();
|
|
|
|
const unsigned char *pubkey = &data->pubkey[0];
|
|
|
|
int result;
|
|
|
|
|
|
|
|
CHECK(pkey != NULL);
|
|
|
|
result = EC_KEY_set_group(pkey, data->ec_group);
|
|
|
|
CHECK(result);
|
|
|
|
result = (o2i_ECPublicKey(&pkey, &pubkey, data->pubkeylen)) != NULL;
|
|
|
|
CHECK(result);
|
|
|
|
result = ECDSA_verify(0, &data->msg[0], sizeof(data->msg), &data->sig[0], data->siglen, pkey) == (i == 0);
|
|
|
|
CHECK(result);
|
|
|
|
EC_KEY_free(pkey);
|
|
|
|
}
|
|
|
|
data->sig[data->siglen - 1] ^= (i & 0xFF);
|
|
|
|
data->sig[data->siglen - 2] ^= ((i >> 8) & 0xFF);
|
|
|
|
data->sig[data->siglen - 3] ^= ((i >> 16) & 0xFF);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2015-10-26 14:54:21 +00:00
|
|
|
int main(void) {
|
|
|
|
int i;
|
2020-12-29 17:15:51 +00:00
|
|
|
rustsecp256k1_v0_4_0_pubkey pubkey;
|
|
|
|
rustsecp256k1_v0_4_0_ecdsa_signature sig;
|
|
|
|
bench_verify_data data;
|
2015-10-26 14:54:21 +00:00
|
|
|
|
2020-08-26 17:35:27 +00:00
|
|
|
int iters = get_iters(20000);
|
|
|
|
|
2020-12-29 17:15:51 +00:00
|
|
|
data.ctx = rustsecp256k1_v0_4_0_context_create(SECP256K1_CONTEXT_SIGN | SECP256K1_CONTEXT_VERIFY);
|
2015-10-26 14:54:21 +00:00
|
|
|
|
|
|
|
for (i = 0; i < 32; i++) {
|
|
|
|
data.msg[i] = 1 + i;
|
|
|
|
}
|
|
|
|
for (i = 0; i < 32; i++) {
|
|
|
|
data.key[i] = 33 + i;
|
|
|
|
}
|
|
|
|
data.siglen = 72;
|
2020-12-29 17:15:51 +00:00
|
|
|
CHECK(rustsecp256k1_v0_4_0_ecdsa_sign(data.ctx, &sig, data.msg, data.key, NULL, NULL));
|
|
|
|
CHECK(rustsecp256k1_v0_4_0_ecdsa_signature_serialize_der(data.ctx, data.sig, &data.siglen, &sig));
|
|
|
|
CHECK(rustsecp256k1_v0_4_0_ec_pubkey_create(data.ctx, &pubkey, data.key));
|
2016-01-14 18:35:54 +00:00
|
|
|
data.pubkeylen = 33;
|
2020-12-29 17:15:51 +00:00
|
|
|
CHECK(rustsecp256k1_v0_4_0_ec_pubkey_serialize(data.ctx, data.pubkey, &data.pubkeylen, &pubkey, SECP256K1_EC_COMPRESSED) == 1);
|
2015-10-26 14:54:21 +00:00
|
|
|
|
2020-12-29 17:15:51 +00:00
|
|
|
run_benchmark("ecdsa_verify", bench_verify, NULL, NULL, &data, 10, iters);
|
2016-01-14 18:35:54 +00:00
|
|
|
#ifdef ENABLE_OPENSSL_TESTS
|
|
|
|
data.ec_group = EC_GROUP_new_by_curve_name(NID_secp256k1);
|
2020-12-29 17:15:51 +00:00
|
|
|
run_benchmark("ecdsa_verify_openssl", bench_verify_openssl, NULL, NULL, &data, 10, iters);
|
2016-01-14 18:35:54 +00:00
|
|
|
EC_GROUP_free(data.ec_group);
|
|
|
|
#endif
|
2015-10-26 14:54:21 +00:00
|
|
|
|
2020-12-29 17:15:51 +00:00
|
|
|
rustsecp256k1_v0_4_0_context_destroy(data.ctx);
|
2015-10-26 14:54:21 +00:00
|
|
|
return 0;
|
|
|
|
}
|