2014-12-04 20:26:54 +01:00
|
|
|
/**********************************************************************
|
|
|
|
* Copyright (c) 2014 Pieter Wuille *
|
|
|
|
* Distributed under the MIT software license, see the accompanying *
|
|
|
|
* file COPYING or http://www.opensource.org/licenses/mit-license.php.*
|
|
|
|
**********************************************************************/
|
|
|
|
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <string.h>
|
|
|
|
|
|
|
|
#include "include/secp256k1.h"
|
|
|
|
#include "util.h"
|
|
|
|
#include "bench.h"
|
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
unsigned char msg[32];
|
|
|
|
unsigned char key[32];
|
|
|
|
unsigned char sig[72];
|
|
|
|
int siglen;
|
|
|
|
unsigned char pubkey[33];
|
|
|
|
int pubkeylen;
|
|
|
|
} benchmark_verify_t;
|
|
|
|
|
2014-12-12 18:11:39 +01:00
|
|
|
/** Very fast but insecure nonce generation function. Do not use for production code. */
|
|
|
|
static int insecure_nonce_function(unsigned char *nonce32, const unsigned char *msg32, const unsigned char *key32, unsigned int count, const void *data) {
|
|
|
|
(void)data;
|
|
|
|
for (int i = 0; i < 8; i++) {
|
|
|
|
((uint32_t*)nonce32)[i] = ((uint32_t*)msg32)[i] + ((uint32_t*)key32)[i] + count;
|
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2014-12-04 20:26:54 +01:00
|
|
|
static void benchmark_verify(void* arg) {
|
|
|
|
benchmark_verify_t* data = (benchmark_verify_t*)arg;
|
|
|
|
|
|
|
|
for (int i=0; i<20000; i++) {
|
|
|
|
data->sig[data->siglen - 1] ^= (i & 0xFF);
|
|
|
|
data->sig[data->siglen - 2] ^= ((i >> 8) & 0xFF);
|
|
|
|
data->sig[data->siglen - 3] ^= ((i >> 16) & 0xFF);
|
2014-12-09 12:50:47 +01:00
|
|
|
CHECK(secp256k1_ecdsa_verify(data->msg, data->sig, data->siglen, data->pubkey, data->pubkeylen) == (i == 0));
|
2014-12-04 20:26:54 +01:00
|
|
|
data->sig[data->siglen - 1] ^= (i & 0xFF);
|
|
|
|
data->sig[data->siglen - 2] ^= ((i >> 8) & 0xFF);
|
|
|
|
data->sig[data->siglen - 3] ^= ((i >> 16) & 0xFF);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
int main(void) {
|
|
|
|
secp256k1_start(SECP256K1_START_VERIFY | SECP256K1_START_SIGN);
|
|
|
|
|
|
|
|
benchmark_verify_t data;
|
|
|
|
|
|
|
|
for (int i = 0; i < 32; i++) data.msg[i] = 1 + i;
|
|
|
|
for (int i = 0; i < 32; i++) data.key[i] = 33 + i;
|
|
|
|
data.siglen = 72;
|
2014-12-12 18:11:39 +01:00
|
|
|
secp256k1_ecdsa_sign(data.msg, data.sig, &data.siglen, data.key, insecure_nonce_function, NULL);
|
2014-12-04 20:26:54 +01:00
|
|
|
data.pubkeylen = 33;
|
|
|
|
CHECK(secp256k1_ec_pubkey_create(data.pubkey, &data.pubkeylen, data.key, 1));
|
|
|
|
|
|
|
|
run_benchmark(benchmark_verify, NULL, NULL, &data, 10, 20000);
|
|
|
|
|
|
|
|
secp256k1_stop();
|
|
|
|
return 0;
|
|
|
|
}
|