spot-the-bug/stream-ciphers/monocypher-3.1.1/tests/speed/speed.c

222 lines
6.0 KiB
C

// This file is dual-licensed. Choose whichever licence you want from
// the two licences listed below.
//
// The first licence is a regular 2-clause BSD licence. The second licence
// is the CC-0 from Creative Commons. It is intended to release Monocypher
// to the public domain. The BSD licence serves as a fallback option.
//
// SPDX-License-Identifier: BSD-2-Clause OR CC0-1.0
//
// ------------------------------------------------------------------------
//
// Copyright (c) 2017-2019, Loup Vaillant
// All rights reserved.
//
//
// Redistribution and use in source and binary forms, with or without
// modification, are permitted provided that the following conditions are
// met:
//
// 1. Redistributions of source code must retain the above copyright
// notice, this list of conditions and the following disclaimer.
//
// 2. Redistributions in binary form must reproduce the above copyright
// notice, this list of conditions and the following disclaimer in the
// documentation and/or other materials provided with the
// distribution.
//
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
// "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
// LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
// A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
// HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
// LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
// DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
// THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
// (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
// OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
//
// ------------------------------------------------------------------------
//
// Written in 2017-2019 by Loup Vaillant
//
// To the extent possible under law, the author(s) have dedicated all copyright
// and related neighboring rights to this software to the public domain
// worldwide. This software is distributed without any warranty.
//
// You should have received a copy of the CC0 Public Domain Dedication along
// with this software. If not, see
// <https://creativecommons.org/publicdomain/zero/1.0/>
#include "speed.h"
#include "monocypher.h"
#include "monocypher-ed25519.h"
#include "utils.h"
static u64 chacha20(void)
{
u8 out[SIZE];
RANDOM_INPUT(in , SIZE);
RANDOM_INPUT(key , 32);
RANDOM_INPUT(nonce, 8);
TIMING_START {
crypto_chacha20(out, in, SIZE, key, nonce);
}
TIMING_END;
}
static u64 poly1305(void)
{
u8 out[16];
RANDOM_INPUT(in , SIZE);
RANDOM_INPUT(key, 32);
TIMING_START {
crypto_poly1305(out, in, SIZE, key);
}
TIMING_END;
}
static u64 authenticated(void)
{
u8 out[SIZE];
u8 mac[ 16];
RANDOM_INPUT(in , SIZE);
RANDOM_INPUT(key , 32);
RANDOM_INPUT(nonce, 8);
TIMING_START {
crypto_lock(mac, out, key, nonce, in, SIZE);
}
TIMING_END;
}
static u64 blake2b(void)
{
u8 hash[64];
RANDOM_INPUT(in , SIZE);
RANDOM_INPUT(key, 32);
TIMING_START {
crypto_blake2b_general(hash, 64, key, 32, in, SIZE);
}
TIMING_END;
}
static u64 sha512(void)
{
u8 hash[64];
RANDOM_INPUT(in, SIZE);
TIMING_START {
crypto_sha512(hash, in, SIZE);
}
TIMING_END;
}
static u64 argon2i(void)
{
u64 work_area[SIZE / 8];
u8 hash [32];
u32 nb_blocks = (u32)(SIZE / 1024);
RANDOM_INPUT(password, 16);
RANDOM_INPUT(salt , 16);
TIMING_START {
crypto_argon2i(hash, 32, work_area, nb_blocks, 3,
password, 16, salt, 16);
}
TIMING_END;
}
static u64 x25519(void)
{
u8 in [32] = {9};
u8 out[32] = {9};
TIMING_START {
crypto_x25519(out, out, in);
}
TIMING_END;
}
static u64 edDSA_sign(void)
{
u8 pk [32];
u8 signature[64];
RANDOM_INPUT(sk , 32);
RANDOM_INPUT(message, 64);
crypto_sign_public_key(pk, sk);
TIMING_START {
crypto_sign(signature, sk, pk, message, 64);
}
TIMING_END;
}
static u64 edDSA_check(void)
{
u8 pk [32];
u8 signature[64];
RANDOM_INPUT(sk , 32);
RANDOM_INPUT(message, 64);
crypto_sign_public_key(pk, sk);
crypto_sign(signature, sk, pk, message, 64);
TIMING_START {
if (crypto_check(signature, pk, message, 64)) {
printf("Monocypher verification failed\n");
}
}
TIMING_END;
}
static u64 x25519_inverse(void)
{
u8 in [32] = {9};
u8 out[32] = {9};
TIMING_START {
crypto_x25519_inverse(out, out, in);
}
TIMING_END;
}
static u64 x25519_sp_fast(void)
{
RANDOM_INPUT(sk, 32);
TIMING_START {
crypto_x25519_dirty_fast(sk, sk);
}
TIMING_END;
}
static u64 x25519_sp_small(void)
{
RANDOM_INPUT(sk, 32);
TIMING_START {
crypto_x25519_dirty_small(sk, sk);
}
TIMING_END;
}
int main()
{
print("Chacha20 ",chacha20() *MUL ,"megabytes per second");
print("Poly1305 ",poly1305() *MUL ,"megabytes per second");
print("Auth'd encryption ",authenticated()*MUL ,"megabytes per second");
print("Blake2b ",blake2b() *MUL ,"megabytes per second");
print("Sha512 ",sha512() *MUL ,"megabytes per second");
print("Argon2i, 3 passes ",argon2i() *MUL ,"megabytes per second");
print("x25519 ",x25519() ,"exchanges per second");
print("EdDSA(sign) ",edDSA_sign() ,"signatures per second");
print("EdDSA(check) ",edDSA_check() ,"checks per second");
print("x25519 inverse ",x25519_inverse() ,"scalar inv per second");
print("x25519 dirty fast ",x25519_sp_fast() ,"scalar inv per second");
print("x25519 dirty small ",x25519_sp_small() ,"scalar inv per second");
printf("\n");
return 0;
}