// This file is dual-licensed. Choose whichever licence you want from // the two licences listed below. // // The first licence is a regular 2-clause BSD licence. The second licence // is the CC-0 from Creative Commons. It is intended to release Monocypher // to the public domain. The BSD licence serves as a fallback option. // // SPDX-License-Identifier: BSD-2-Clause OR CC0-1.0 // // ------------------------------------------------------------------------ // // Copyright (c) 2017-2019, Loup Vaillant // All rights reserved. // // // Redistribution and use in source and binary forms, with or without // modification, are permitted provided that the following conditions are // met: // // 1. Redistributions of source code must retain the above copyright // notice, this list of conditions and the following disclaimer. // // 2. Redistributions in binary form must reproduce the above copyright // notice, this list of conditions and the following disclaimer in the // documentation and/or other materials provided with the // distribution. // // THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS // "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT // LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR // A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT // HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, // SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT // LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, // DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY // THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT // (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE // OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. // // ------------------------------------------------------------------------ // // Written in 2017-2019 by Loup Vaillant // // To the extent possible under law, the author(s) have dedicated all copyright // and related neighboring rights to this software to the public domain // worldwide. This software is distributed without any warranty. // // You should have received a copy of the CC0 Public Domain Dedication along // with this software. If not, see // #include "speed.h" #include "monocypher.h" #include "monocypher-ed25519.h" #include "utils.h" static u64 chacha20(void) { u8 out[SIZE]; RANDOM_INPUT(in , SIZE); RANDOM_INPUT(key , 32); RANDOM_INPUT(nonce, 8); TIMING_START { crypto_chacha20(out, in, SIZE, key, nonce); } TIMING_END; } static u64 poly1305(void) { u8 out[16]; RANDOM_INPUT(in , SIZE); RANDOM_INPUT(key, 32); TIMING_START { crypto_poly1305(out, in, SIZE, key); } TIMING_END; } static u64 authenticated(void) { u8 out[SIZE]; u8 mac[ 16]; RANDOM_INPUT(in , SIZE); RANDOM_INPUT(key , 32); RANDOM_INPUT(nonce, 8); TIMING_START { crypto_lock(mac, out, key, nonce, in, SIZE); } TIMING_END; } static u64 blake2b(void) { u8 hash[64]; RANDOM_INPUT(in , SIZE); RANDOM_INPUT(key, 32); TIMING_START { crypto_blake2b_general(hash, 64, key, 32, in, SIZE); } TIMING_END; } static u64 sha512(void) { u8 hash[64]; RANDOM_INPUT(in, SIZE); TIMING_START { crypto_sha512(hash, in, SIZE); } TIMING_END; } static u64 argon2i(void) { u64 work_area[SIZE / 8]; u8 hash [32]; u32 nb_blocks = (u32)(SIZE / 1024); RANDOM_INPUT(password, 16); RANDOM_INPUT(salt , 16); TIMING_START { crypto_argon2i(hash, 32, work_area, nb_blocks, 3, password, 16, salt, 16); } TIMING_END; } static u64 x25519(void) { u8 in [32] = {9}; u8 out[32] = {9}; TIMING_START { crypto_x25519(out, out, in); } TIMING_END; } static u64 edDSA_sign(void) { u8 pk [32]; u8 signature[64]; RANDOM_INPUT(sk , 32); RANDOM_INPUT(message, 64); crypto_sign_public_key(pk, sk); TIMING_START { crypto_sign(signature, sk, pk, message, 64); } TIMING_END; } static u64 edDSA_check(void) { u8 pk [32]; u8 signature[64]; RANDOM_INPUT(sk , 32); RANDOM_INPUT(message, 64); crypto_sign_public_key(pk, sk); crypto_sign(signature, sk, pk, message, 64); TIMING_START { if (crypto_check(signature, pk, message, 64)) { printf("Monocypher verification failed\n"); } } TIMING_END; } static u64 x25519_inverse(void) { u8 in [32] = {9}; u8 out[32] = {9}; TIMING_START { crypto_x25519_inverse(out, out, in); } TIMING_END; } static u64 x25519_sp_fast(void) { RANDOM_INPUT(sk, 32); TIMING_START { crypto_x25519_dirty_fast(sk, sk); } TIMING_END; } static u64 x25519_sp_small(void) { RANDOM_INPUT(sk, 32); TIMING_START { crypto_x25519_dirty_small(sk, sk); } TIMING_END; } int main() { print("Chacha20 ",chacha20() *MUL ,"megabytes per second"); print("Poly1305 ",poly1305() *MUL ,"megabytes per second"); print("Auth'd encryption ",authenticated()*MUL ,"megabytes per second"); print("Blake2b ",blake2b() *MUL ,"megabytes per second"); print("Sha512 ",sha512() *MUL ,"megabytes per second"); print("Argon2i, 3 passes ",argon2i() *MUL ,"megabytes per second"); print("x25519 ",x25519() ,"exchanges per second"); print("EdDSA(sign) ",edDSA_sign() ,"signatures per second"); print("EdDSA(check) ",edDSA_check() ,"checks per second"); print("x25519 inverse ",x25519_inverse() ,"scalar inv per second"); print("x25519 dirty fast ",x25519_sp_fast() ,"scalar inv per second"); print("x25519 dirty small ",x25519_sp_small() ,"scalar inv per second"); printf("\n"); return 0; }