- Use defined constants instead of hard-coding their integer value. - Allocate secp256k1 structs on the C stack instead of converting []byte - Remove dead code
		
			
				
	
	
		
			113 lines
		
	
	
		
			3.8 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			113 lines
		
	
	
		
			3.8 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /**********************************************************************
 | |
|  * Copyright (c) 2014 Pieter Wuille                                   *
 | |
|  * Distributed under the MIT software license, see the accompanying   *
 | |
|  * file COPYING or http://www.opensource.org/licenses/mit-license.php.*
 | |
|  **********************************************************************/
 | |
| 
 | |
| #include <stdio.h>
 | |
| #include <string.h>
 | |
| 
 | |
| #include "include/secp256k1.h"
 | |
| #include "util.h"
 | |
| #include "bench.h"
 | |
| 
 | |
| #ifdef ENABLE_OPENSSL_TESTS
 | |
| #include <openssl/bn.h>
 | |
| #include <openssl/ecdsa.h>
 | |
| #include <openssl/obj_mac.h>
 | |
| #endif
 | |
| 
 | |
| typedef struct {
 | |
|     secp256k1_context *ctx;
 | |
|     unsigned char msg[32];
 | |
|     unsigned char key[32];
 | |
|     unsigned char sig[72];
 | |
|     size_t siglen;
 | |
|     unsigned char pubkey[33];
 | |
|     size_t pubkeylen;
 | |
| #ifdef ENABLE_OPENSSL_TESTS
 | |
|     EC_GROUP* ec_group;
 | |
| #endif
 | |
| } benchmark_verify_t;
 | |
| 
 | |
| static void benchmark_verify(void* arg) {
 | |
|     int i;
 | |
|     benchmark_verify_t* data = (benchmark_verify_t*)arg;
 | |
| 
 | |
|     for (i = 0; i < 20000; i++) {
 | |
|         secp256k1_pubkey pubkey;
 | |
|         secp256k1_ecdsa_signature sig;
 | |
|         data->sig[data->siglen - 1] ^= (i & 0xFF);
 | |
|         data->sig[data->siglen - 2] ^= ((i >> 8) & 0xFF);
 | |
|         data->sig[data->siglen - 3] ^= ((i >> 16) & 0xFF);
 | |
|         CHECK(secp256k1_ec_pubkey_parse(data->ctx, &pubkey, data->pubkey, data->pubkeylen) == 1);
 | |
|         CHECK(secp256k1_ecdsa_signature_parse_der(data->ctx, &sig, data->sig, data->siglen) == 1);
 | |
|         CHECK(secp256k1_ecdsa_verify(data->ctx, &sig, data->msg, &pubkey) == (i == 0));
 | |
|         data->sig[data->siglen - 1] ^= (i & 0xFF);
 | |
|         data->sig[data->siglen - 2] ^= ((i >> 8) & 0xFF);
 | |
|         data->sig[data->siglen - 3] ^= ((i >> 16) & 0xFF);
 | |
|     }
 | |
| }
 | |
| 
 | |
| #ifdef ENABLE_OPENSSL_TESTS
 | |
| static void benchmark_verify_openssl(void* arg) {
 | |
|     int i;
 | |
|     benchmark_verify_t* data = (benchmark_verify_t*)arg;
 | |
| 
 | |
|     for (i = 0; i < 20000; i++) {
 | |
|         data->sig[data->siglen - 1] ^= (i & 0xFF);
 | |
|         data->sig[data->siglen - 2] ^= ((i >> 8) & 0xFF);
 | |
|         data->sig[data->siglen - 3] ^= ((i >> 16) & 0xFF);
 | |
|         {
 | |
|             EC_KEY *pkey = EC_KEY_new();
 | |
|             const unsigned char *pubkey = &data->pubkey[0];
 | |
|             int result;
 | |
| 
 | |
|             CHECK(pkey != NULL);
 | |
|             result = EC_KEY_set_group(pkey, data->ec_group);
 | |
|             CHECK(result);
 | |
|             result = (o2i_ECPublicKey(&pkey, &pubkey, data->pubkeylen)) != NULL;
 | |
|             CHECK(result);
 | |
|             result = ECDSA_verify(0, &data->msg[0], sizeof(data->msg), &data->sig[0], data->siglen, pkey) == (i == 0);
 | |
|             CHECK(result);
 | |
|             EC_KEY_free(pkey);
 | |
|         }
 | |
|         data->sig[data->siglen - 1] ^= (i & 0xFF);
 | |
|         data->sig[data->siglen - 2] ^= ((i >> 8) & 0xFF);
 | |
|         data->sig[data->siglen - 3] ^= ((i >> 16) & 0xFF);
 | |
|     }
 | |
| }
 | |
| #endif
 | |
| 
 | |
| int main(void) {
 | |
|     int i;
 | |
|     secp256k1_pubkey pubkey;
 | |
|     secp256k1_ecdsa_signature sig;
 | |
|     benchmark_verify_t data;
 | |
| 
 | |
|     data.ctx = secp256k1_context_create(SECP256K1_CONTEXT_SIGN | SECP256K1_CONTEXT_VERIFY);
 | |
| 
 | |
|     for (i = 0; i < 32; i++) {
 | |
|         data.msg[i] = 1 + i;
 | |
|     }
 | |
|     for (i = 0; i < 32; i++) {
 | |
|         data.key[i] = 33 + i;
 | |
|     }
 | |
|     data.siglen = 72;
 | |
|     CHECK(secp256k1_ecdsa_sign(data.ctx, &sig, data.msg, data.key, NULL, NULL));
 | |
|     CHECK(secp256k1_ecdsa_signature_serialize_der(data.ctx, data.sig, &data.siglen, &sig));
 | |
|     CHECK(secp256k1_ec_pubkey_create(data.ctx, &pubkey, data.key));
 | |
|     data.pubkeylen = 33;
 | |
|     CHECK(secp256k1_ec_pubkey_serialize(data.ctx, data.pubkey, &data.pubkeylen, &pubkey, SECP256K1_EC_COMPRESSED) == 1);
 | |
| 
 | |
|     run_benchmark("ecdsa_verify", benchmark_verify, NULL, NULL, &data, 10, 20000);
 | |
| #ifdef ENABLE_OPENSSL_TESTS
 | |
|     data.ec_group = EC_GROUP_new_by_curve_name(NID_secp256k1);
 | |
|     run_benchmark("ecdsa_verify_openssl", benchmark_verify_openssl, NULL, NULL, &data, 10, 20000);
 | |
|     EC_GROUP_free(data.ec_group);
 | |
| #endif
 | |
| 
 | |
|     secp256k1_context_destroy(data.ctx);
 | |
|     return 0;
 | |
| }
 |