github.com/luckypickle/go-ethereum-vet@v1.14.2/crypto/secp256k1/libsecp256k1/src/bench_verify.c (about) 1 /********************************************************************** 2 * Copyright (c) 2014 Pieter Wuille * 3 * Distributed under the MIT software license, see the accompanying * 4 * file COPYING or http://www.opensource.org/licenses/mit-license.php.* 5 **********************************************************************/ 6 7 #include <stdio.h> 8 #include <string.h> 9 10 #include "include/secp256k1.h" 11 #include "util.h" 12 #include "bench.h" 13 14 #ifdef ENABLE_OPENSSL_TESTS 15 #include <openssl/bn.h> 16 #include <openssl/ecdsa.h> 17 #include <openssl/obj_mac.h> 18 #endif 19 20 typedef struct { 21 vet_secp256k1_context *ctx; 22 unsigned char msg[32]; 23 unsigned char key[32]; 24 unsigned char sig[72]; 25 size_t siglen; 26 unsigned char pubkey[33]; 27 size_t pubkeylen; 28 #ifdef ENABLE_OPENSSL_TESTS 29 EC_GROUP* ec_group; 30 #endif 31 } benchmark_verify_t; 32 33 static void benchmark_verify(void* arg) { 34 int i; 35 benchmark_verify_t* data = (benchmark_verify_t*)arg; 36 37 for (i = 0; i < 20000; i++) { 38 vet_secp256k1_pubkey pubkey; 39 vet_secp256k1_ecdsa_signature sig; 40 data->sig[data->siglen - 1] ^= (i & 0xFF); 41 data->sig[data->siglen - 2] ^= ((i >> 8) & 0xFF); 42 data->sig[data->siglen - 3] ^= ((i >> 16) & 0xFF); 43 CHECK(vet_secp256k1_ec_pubkey_parse(data->ctx, &pubkey, data->pubkey, data->pubkeylen) == 1); 44 CHECK(vet_secp256k1_ecdsa_signature_parse_der(data->ctx, &sig, data->sig, data->siglen) == 1); 45 CHECK(vet_secp256k1_ecdsa_verify(data->ctx, &sig, data->msg, &pubkey) == (i == 0)); 46 data->sig[data->siglen - 1] ^= (i & 0xFF); 47 data->sig[data->siglen - 2] ^= ((i >> 8) & 0xFF); 48 data->sig[data->siglen - 3] ^= ((i >> 16) & 0xFF); 49 } 50 } 51 52 #ifdef ENABLE_OPENSSL_TESTS 53 static void benchmark_verify_openssl(void* arg) { 54 int i; 55 benchmark_verify_t* data = (benchmark_verify_t*)arg; 56 57 for (i = 0; i < 20000; i++) { 58 data->sig[data->siglen - 1] ^= (i & 0xFF); 59 data->sig[data->siglen - 2] ^= ((i >> 8) & 0xFF); 60 data->sig[data->siglen - 3] ^= ((i >> 16) & 0xFF); 61 { 62 EC_KEY *pkey = EC_KEY_new(); 63 const unsigned char *pubkey = &data->pubkey[0]; 64 int result; 65 66 CHECK(pkey != NULL); 67 result = EC_KEY_set_group(pkey, data->ec_group); 68 CHECK(result); 69 result = (o2i_ECPublicKey(&pkey, &pubkey, data->pubkeylen)) != NULL; 70 CHECK(result); 71 result = ECDSA_verify(0, &data->msg[0], sizeof(data->msg), &data->sig[0], data->siglen, pkey) == (i == 0); 72 CHECK(result); 73 EC_KEY_free(pkey); 74 } 75 data->sig[data->siglen - 1] ^= (i & 0xFF); 76 data->sig[data->siglen - 2] ^= ((i >> 8) & 0xFF); 77 data->sig[data->siglen - 3] ^= ((i >> 16) & 0xFF); 78 } 79 } 80 #endif 81 82 int main(void) { 83 int i; 84 vet_secp256k1_pubkey pubkey; 85 vet_secp256k1_ecdsa_signature sig; 86 benchmark_verify_t data; 87 88 data.ctx = vet_secp256k1_context_create(SECP256K1_CONTEXT_SIGN | SECP256K1_CONTEXT_VERIFY); 89 90 for (i = 0; i < 32; i++) { 91 data.msg[i] = 1 + i; 92 } 93 for (i = 0; i < 32; i++) { 94 data.key[i] = 33 + i; 95 } 96 data.siglen = 72; 97 CHECK(vet_secp256k1_ecdsa_sign(data.ctx, &sig, data.msg, data.key, NULL, NULL)); 98 CHECK(vet_secp256k1_ecdsa_signature_serialize_der(data.ctx, data.sig, &data.siglen, &sig)); 99 CHECK(vet_secp256k1_ec_pubkey_create(data.ctx, &pubkey, data.key)); 100 data.pubkeylen = 33; 101 CHECK(vet_secp256k1_ec_pubkey_serialize(data.ctx, data.pubkey, &data.pubkeylen, &pubkey, SECP256K1_EC_COMPRESSED) == 1); 102 103 run_benchmark("ecdsa_verify", benchmark_verify, NULL, NULL, &data, 10, 20000); 104 #ifdef ENABLE_OPENSSL_TESTS 105 data.ec_group = EC_GROUP_new_by_curve_name(NID_secp256k1); 106 run_benchmark("ecdsa_verify_openssl", benchmark_verify_openssl, NULL, NULL, &data, 10, 20000); 107 EC_GROUP_free(data.ec_group); 108 #endif 109 110 vet_secp256k1_context_destroy(data.ctx); 111 return 0; 112 }