192 lines
5.4 KiB
C
192 lines
5.4 KiB
C
// This file is dual-licensed. Choose whichever licence you want from
|
|
// the two licences listed below.
|
|
//
|
|
// The first licence is a regular 2-clause BSD licence. The second licence
|
|
// is the CC-0 from Creative Commons. It is intended to release Monocypher
|
|
// to the public domain. The BSD licence serves as a fallback option.
|
|
//
|
|
// SPDX-License-Identifier: BSD-2-Clause OR CC0-1.0
|
|
//
|
|
// ------------------------------------------------------------------------
|
|
//
|
|
// Copyright (c) 2017-2019, Loup Vaillant
|
|
// All rights reserved.
|
|
//
|
|
//
|
|
// Redistribution and use in source and binary forms, with or without
|
|
// modification, are permitted provided that the following conditions are
|
|
// met:
|
|
//
|
|
// 1. Redistributions of source code must retain the above copyright
|
|
// notice, this list of conditions and the following disclaimer.
|
|
//
|
|
// 2. Redistributions in binary form must reproduce the above copyright
|
|
// notice, this list of conditions and the following disclaimer in the
|
|
// documentation and/or other materials provided with the
|
|
// distribution.
|
|
//
|
|
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
// "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
// LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
|
// A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
|
// HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
|
// LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
// DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
// THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
// (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
// OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
//
|
|
// ------------------------------------------------------------------------
|
|
//
|
|
// Written in 2017-2019 by Loup Vaillant
|
|
//
|
|
// To the extent possible under law, the author(s) have dedicated all copyright
|
|
// and related neighboring rights to this software to the public domain
|
|
// worldwide. This software is distributed without any warranty.
|
|
//
|
|
// You should have received a copy of the CC0 Public Domain Dedication along
|
|
// with this software. If not, see
|
|
// <https://creativecommons.org/publicdomain/zero/1.0/>
|
|
|
|
#include "speed.h"
|
|
#include "sodium.h"
|
|
|
|
static u64 chacha20(void)
|
|
{
|
|
u8 out[SIZE];
|
|
RANDOM_INPUT(in , SIZE);
|
|
RANDOM_INPUT(key , 32);
|
|
RANDOM_INPUT(nonce, 8);
|
|
|
|
TIMING_START {
|
|
crypto_stream_chacha20_xor(out, in, SIZE, nonce, key);
|
|
}
|
|
TIMING_END;
|
|
}
|
|
|
|
static u64 poly1305(void)
|
|
{
|
|
u8 out[16];
|
|
RANDOM_INPUT(in , SIZE);
|
|
RANDOM_INPUT(key, 32);
|
|
|
|
TIMING_START {
|
|
crypto_onetimeauth(out, in, SIZE, key);
|
|
}
|
|
TIMING_END;
|
|
}
|
|
|
|
static u64 authenticated(void)
|
|
{
|
|
u8 out[SIZE];
|
|
u8 mac[crypto_aead_xchacha20poly1305_ietf_ABYTES];
|
|
RANDOM_INPUT(in , SIZE);
|
|
RANDOM_INPUT(key , 32);
|
|
RANDOM_INPUT(nonce, 8);
|
|
|
|
TIMING_START {
|
|
crypto_aead_xchacha20poly1305_ietf_encrypt_detached(
|
|
out, mac, 0, in, SIZE, 0, 0, 0, nonce, key);
|
|
}
|
|
TIMING_END;
|
|
}
|
|
|
|
static u64 blake2b(void)
|
|
{
|
|
u8 hash[64];
|
|
RANDOM_INPUT(in , SIZE);
|
|
RANDOM_INPUT(key, 32);
|
|
|
|
TIMING_START {
|
|
crypto_generichash(hash, 64, in, SIZE, key, 32);
|
|
}
|
|
TIMING_END;
|
|
}
|
|
|
|
static u64 sha512(void)
|
|
{
|
|
u8 hash[64];
|
|
RANDOM_INPUT(in, SIZE);
|
|
|
|
TIMING_START {
|
|
crypto_hash_sha512(hash, in, SIZE);
|
|
}
|
|
TIMING_END;
|
|
}
|
|
|
|
static u64 argon2i(void)
|
|
{
|
|
u8 hash [32];
|
|
RANDOM_INPUT(password, 16);
|
|
RANDOM_INPUT(salt , 16);
|
|
|
|
TIMING_START {
|
|
if (crypto_pwhash(hash, 32, (char*)password, 16, salt,
|
|
3, SIZE, crypto_pwhash_ALG_ARGON2I13)) {
|
|
fprintf(stderr, "Argon2i failed.\n");
|
|
}
|
|
}
|
|
TIMING_END;
|
|
}
|
|
|
|
static u64 x25519(void)
|
|
{
|
|
u8 in [32] = {9};
|
|
u8 out[32] = {9};
|
|
|
|
TIMING_START {
|
|
if (crypto_scalarmult(out, out, in)) {
|
|
fprintf(stderr, "Libsodium rejected the public key\n");
|
|
}
|
|
}
|
|
TIMING_END;
|
|
}
|
|
|
|
static u64 edDSA_sign(void)
|
|
{
|
|
u8 sk [64];
|
|
u8 pk [32];
|
|
u8 signature[64];
|
|
RANDOM_INPUT(message, 64);
|
|
crypto_sign_keypair(pk, sk);
|
|
|
|
TIMING_START {
|
|
crypto_sign_detached(signature, 0, message, 64, sk);
|
|
}
|
|
TIMING_END;
|
|
}
|
|
|
|
static u64 edDSA_check(void)
|
|
{
|
|
u8 sk [64];
|
|
u8 pk [32];
|
|
u8 signature[64];
|
|
RANDOM_INPUT(message, 64);
|
|
crypto_sign_keypair(pk, sk);
|
|
crypto_sign_detached(signature, 0, message, 64, sk);
|
|
|
|
TIMING_START {
|
|
if (crypto_sign_verify_detached(signature, message, 64, pk)) {
|
|
printf("Monocypher verification failed\n");
|
|
}
|
|
}
|
|
TIMING_END;
|
|
}
|
|
|
|
int main()
|
|
{
|
|
SODIUM_INIT;
|
|
print("Chacha20 ",chacha20() *MUL,"megabytes per second");
|
|
print("Poly1305 ",poly1305() *MUL,"megabytes per second");
|
|
print("Auth'd encryption",authenticated()*MUL,"megabytes per second");
|
|
print("Blake2b ",blake2b() *MUL,"megabytes per second");
|
|
print("Sha512 ",sha512() *MUL,"megabytes per second");
|
|
print("Argon2i, 3 passes",argon2i() *MUL,"megabytes per second");
|
|
print("x25519 ",x25519() ,"exchanges per second");
|
|
print("EdDSA(sign) ",edDSA_sign() ,"signatures per second");
|
|
print("EdDSA(check) ",edDSA_check() ,"checks per second");
|
|
printf("\n");
|
|
return 0;
|
|
}
|