235 lines
8.0 KiB
C
235 lines
8.0 KiB
C
/***********************************************************************
|
|
* Copyright (c) 2014 Pieter Wuille *
|
|
* Distributed under the MIT software license, see the accompanying *
|
|
* file COPYING or https://www.opensource.org/licenses/mit-license.php.*
|
|
***********************************************************************/
|
|
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
|
|
#include "../include/secp256k1.h"
|
|
#include "util.h"
|
|
#include "bench.h"
|
|
|
|
void help(int default_iters) {
|
|
printf("Benchmarks the following algorithms:\n");
|
|
printf(" - ECDSA signing/verification\n");
|
|
|
|
#ifdef ENABLE_MODULE_ECDH
|
|
printf(" - ECDH key exchange (optional module)\n");
|
|
#endif
|
|
|
|
#ifdef ENABLE_MODULE_RECOVERY
|
|
printf(" - Public key recovery (optional module)\n");
|
|
#endif
|
|
|
|
#ifdef ENABLE_MODULE_SCHNORRSIG
|
|
printf(" - Schnorr signatures (optional module)\n");
|
|
#endif
|
|
|
|
printf("\n");
|
|
printf("The default number of iterations for each benchmark is %d. This can be\n", default_iters);
|
|
printf("customized using the SECP256K1_BENCH_ITERS environment variable.\n");
|
|
printf("\n");
|
|
printf("Usage: ./bench [args]\n");
|
|
printf("By default, all benchmarks will be run.\n");
|
|
printf("args:\n");
|
|
printf(" help : display this help and exit\n");
|
|
printf(" ecdsa : all ECDSA algorithms--sign, verify, recovery (if enabled)\n");
|
|
printf(" ecdsa_sign : ECDSA siging algorithm\n");
|
|
printf(" ecdsa_verify : ECDSA verification algorithm\n");
|
|
|
|
#ifdef ENABLE_MODULE_RECOVERY
|
|
printf(" ecdsa_recover : ECDSA public key recovery algorithm\n");
|
|
#endif
|
|
|
|
#ifdef ENABLE_MODULE_ECDH
|
|
printf(" ecdh : ECDH key exchange algorithm\n");
|
|
#endif
|
|
|
|
#ifdef ENABLE_MODULE_SCHNORRSIG
|
|
printf(" schnorrsig : all Schnorr signature algorithms (sign, verify)\n");
|
|
printf(" schnorrsig_sign : Schnorr sigining algorithm\n");
|
|
printf(" schnorrsig_verify : Schnorr verification algorithm\n");
|
|
#endif
|
|
|
|
printf("\n");
|
|
}
|
|
|
|
typedef struct {
|
|
rustsecp256k1_v0_6_1_context *ctx;
|
|
unsigned char msg[32];
|
|
unsigned char key[32];
|
|
unsigned char sig[72];
|
|
size_t siglen;
|
|
unsigned char pubkey[33];
|
|
size_t pubkeylen;
|
|
} bench_verify_data;
|
|
|
|
static void bench_verify(void* arg, int iters) {
|
|
int i;
|
|
bench_verify_data* data = (bench_verify_data*)arg;
|
|
|
|
for (i = 0; i < iters; i++) {
|
|
rustsecp256k1_v0_6_1_pubkey pubkey;
|
|
rustsecp256k1_v0_6_1_ecdsa_signature sig;
|
|
data->sig[data->siglen - 1] ^= (i & 0xFF);
|
|
data->sig[data->siglen - 2] ^= ((i >> 8) & 0xFF);
|
|
data->sig[data->siglen - 3] ^= ((i >> 16) & 0xFF);
|
|
CHECK(rustsecp256k1_v0_6_1_ec_pubkey_parse(data->ctx, &pubkey, data->pubkey, data->pubkeylen) == 1);
|
|
CHECK(rustsecp256k1_v0_6_1_ecdsa_signature_parse_der(data->ctx, &sig, data->sig, data->siglen) == 1);
|
|
CHECK(rustsecp256k1_v0_6_1_ecdsa_verify(data->ctx, &sig, data->msg, &pubkey) == (i == 0));
|
|
data->sig[data->siglen - 1] ^= (i & 0xFF);
|
|
data->sig[data->siglen - 2] ^= ((i >> 8) & 0xFF);
|
|
data->sig[data->siglen - 3] ^= ((i >> 16) & 0xFF);
|
|
}
|
|
}
|
|
|
|
typedef struct {
|
|
rustsecp256k1_v0_6_1_context* ctx;
|
|
unsigned char msg[32];
|
|
unsigned char key[32];
|
|
} bench_sign_data;
|
|
|
|
static void bench_sign_setup(void* arg) {
|
|
int i;
|
|
bench_sign_data *data = (bench_sign_data*)arg;
|
|
|
|
for (i = 0; i < 32; i++) {
|
|
data->msg[i] = i + 1;
|
|
}
|
|
for (i = 0; i < 32; i++) {
|
|
data->key[i] = i + 65;
|
|
}
|
|
}
|
|
|
|
static void bench_sign_run(void* arg, int iters) {
|
|
int i;
|
|
bench_sign_data *data = (bench_sign_data*)arg;
|
|
|
|
unsigned char sig[74];
|
|
for (i = 0; i < iters; i++) {
|
|
size_t siglen = 74;
|
|
int j;
|
|
rustsecp256k1_v0_6_1_ecdsa_signature signature;
|
|
CHECK(rustsecp256k1_v0_6_1_ecdsa_sign(data->ctx, &signature, data->msg, data->key, NULL, NULL));
|
|
CHECK(rustsecp256k1_v0_6_1_ecdsa_signature_serialize_der(data->ctx, sig, &siglen, &signature));
|
|
for (j = 0; j < 32; j++) {
|
|
data->msg[j] = sig[j];
|
|
data->key[j] = sig[j + 32];
|
|
}
|
|
}
|
|
}
|
|
|
|
#ifdef ENABLE_MODULE_ECDH
|
|
# include "modules/ecdh/bench_impl.h"
|
|
#endif
|
|
|
|
#ifdef ENABLE_MODULE_RECOVERY
|
|
# include "modules/recovery/bench_impl.h"
|
|
#endif
|
|
|
|
#ifdef ENABLE_MODULE_SCHNORRSIG
|
|
# include "modules/schnorrsig/bench_impl.h"
|
|
#endif
|
|
|
|
int main(int argc, char** argv) {
|
|
int i;
|
|
rustsecp256k1_v0_6_1_pubkey pubkey;
|
|
rustsecp256k1_v0_6_1_ecdsa_signature sig;
|
|
bench_verify_data data;
|
|
|
|
int d = argc == 1;
|
|
int default_iters = 20000;
|
|
int iters = get_iters(default_iters);
|
|
|
|
/* Check for invalid user arguments */
|
|
char* valid_args[] = {"ecdsa", "verify", "ecdsa_verify", "sign", "ecdsa_sign", "ecdh", "recover",
|
|
"ecdsa_recover", "schnorrsig", "schnorrsig_verify", "schnorrsig_sign"};
|
|
size_t valid_args_size = sizeof(valid_args)/sizeof(valid_args[0]);
|
|
int invalid_args = have_invalid_args(argc, argv, valid_args, valid_args_size);
|
|
|
|
if (argc > 1) {
|
|
if (have_flag(argc, argv, "-h")
|
|
|| have_flag(argc, argv, "--help")
|
|
|| have_flag(argc, argv, "help")) {
|
|
help(default_iters);
|
|
return 0;
|
|
} else if (invalid_args) {
|
|
fprintf(stderr, "./bench: unrecognized argument.\n\n");
|
|
help(default_iters);
|
|
return 1;
|
|
}
|
|
}
|
|
|
|
/* Check if the user tries to benchmark optional module without building it */
|
|
#ifndef ENABLE_MODULE_ECDH
|
|
if (have_flag(argc, argv, "ecdh")) {
|
|
fprintf(stderr, "./bench: ECDH module not enabled.\n");
|
|
fprintf(stderr, "Use ./configure --enable-module-ecdh.\n\n");
|
|
return 1;
|
|
}
|
|
#endif
|
|
|
|
#ifndef ENABLE_MODULE_RECOVERY
|
|
if (have_flag(argc, argv, "recover") || have_flag(argc, argv, "ecdsa_recover")) {
|
|
fprintf(stderr, "./bench: Public key recovery module not enabled.\n");
|
|
fprintf(stderr, "Use ./configure --enable-module-recovery.\n\n");
|
|
return 1;
|
|
}
|
|
#endif
|
|
|
|
#ifndef ENABLE_MODULE_SCHNORRSIG
|
|
if (have_flag(argc, argv, "schnorrsig") || have_flag(argc, argv, "schnorrsig_sign") || have_flag(argc, argv, "schnorrsig_verify")) {
|
|
fprintf(stderr, "./bench: Schnorr signatures module not enabled.\n");
|
|
fprintf(stderr, "Use ./configure --enable-module-schnorrsig.\n\n");
|
|
return 1;
|
|
}
|
|
#endif
|
|
|
|
/* ECDSA verification benchmark */
|
|
data.ctx = rustsecp256k1_v0_6_1_context_create(SECP256K1_CONTEXT_SIGN | SECP256K1_CONTEXT_VERIFY);
|
|
|
|
for (i = 0; i < 32; i++) {
|
|
data.msg[i] = 1 + i;
|
|
}
|
|
for (i = 0; i < 32; i++) {
|
|
data.key[i] = 33 + i;
|
|
}
|
|
data.siglen = 72;
|
|
CHECK(rustsecp256k1_v0_6_1_ecdsa_sign(data.ctx, &sig, data.msg, data.key, NULL, NULL));
|
|
CHECK(rustsecp256k1_v0_6_1_ecdsa_signature_serialize_der(data.ctx, data.sig, &data.siglen, &sig));
|
|
CHECK(rustsecp256k1_v0_6_1_ec_pubkey_create(data.ctx, &pubkey, data.key));
|
|
data.pubkeylen = 33;
|
|
CHECK(rustsecp256k1_v0_6_1_ec_pubkey_serialize(data.ctx, data.pubkey, &data.pubkeylen, &pubkey, SECP256K1_EC_COMPRESSED) == 1);
|
|
|
|
print_output_table_header_row();
|
|
if (d || have_flag(argc, argv, "ecdsa") || have_flag(argc, argv, "verify") || have_flag(argc, argv, "ecdsa_verify")) run_benchmark("ecdsa_verify", bench_verify, NULL, NULL, &data, 10, iters);
|
|
|
|
rustsecp256k1_v0_6_1_context_destroy(data.ctx);
|
|
|
|
/* ECDSA signing benchmark */
|
|
data.ctx = rustsecp256k1_v0_6_1_context_create(SECP256K1_CONTEXT_SIGN);
|
|
|
|
if (d || have_flag(argc, argv, "ecdsa") || have_flag(argc, argv, "sign") || have_flag(argc, argv, "ecdsa_sign")) run_benchmark("ecdsa_sign", bench_sign_run, bench_sign_setup, NULL, &data, 10, iters);
|
|
|
|
rustsecp256k1_v0_6_1_context_destroy(data.ctx);
|
|
|
|
#ifdef ENABLE_MODULE_ECDH
|
|
/* ECDH benchmarks */
|
|
run_ecdh_bench(iters, argc, argv);
|
|
#endif
|
|
|
|
#ifdef ENABLE_MODULE_RECOVERY
|
|
/* ECDSA recovery benchmarks */
|
|
run_recovery_bench(iters, argc, argv);
|
|
#endif
|
|
|
|
#ifdef ENABLE_MODULE_SCHNORRSIG
|
|
/* Schnorr signature benchmarks */
|
|
run_schnorrsig_bench(iters, argc, argv);
|
|
#endif
|
|
|
|
return 0;
|
|
}
|