222 lines
6.0 KiB
C
222 lines
6.0 KiB
C
// This file is dual-licensed. Choose whichever licence you want from
|
|
// the two licences listed below.
|
|
//
|
|
// The first licence is a regular 2-clause BSD licence. The second licence
|
|
// is the CC-0 from Creative Commons. It is intended to release Monocypher
|
|
// to the public domain. The BSD licence serves as a fallback option.
|
|
//
|
|
// SPDX-License-Identifier: BSD-2-Clause OR CC0-1.0
|
|
//
|
|
// ------------------------------------------------------------------------
|
|
//
|
|
// Copyright (c) 2017-2019, Loup Vaillant
|
|
// All rights reserved.
|
|
//
|
|
//
|
|
// Redistribution and use in source and binary forms, with or without
|
|
// modification, are permitted provided that the following conditions are
|
|
// met:
|
|
//
|
|
// 1. Redistributions of source code must retain the above copyright
|
|
// notice, this list of conditions and the following disclaimer.
|
|
//
|
|
// 2. Redistributions in binary form must reproduce the above copyright
|
|
// notice, this list of conditions and the following disclaimer in the
|
|
// documentation and/or other materials provided with the
|
|
// distribution.
|
|
//
|
|
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
// "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
// LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
|
// A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
|
// HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
|
// LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
// DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
// THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
// (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
// OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
//
|
|
// ------------------------------------------------------------------------
|
|
//
|
|
// Written in 2017-2019 by Loup Vaillant
|
|
//
|
|
// To the extent possible under law, the author(s) have dedicated all copyright
|
|
// and related neighboring rights to this software to the public domain
|
|
// worldwide. This software is distributed without any warranty.
|
|
//
|
|
// You should have received a copy of the CC0 Public Domain Dedication along
|
|
// with this software. If not, see
|
|
// <https://creativecommons.org/publicdomain/zero/1.0/>
|
|
|
|
#include "speed.h"
|
|
#include "monocypher.h"
|
|
#include "monocypher-ed25519.h"
|
|
#include "utils.h"
|
|
|
|
static u64 chacha20(void)
|
|
{
|
|
u8 out[SIZE];
|
|
RANDOM_INPUT(in , SIZE);
|
|
RANDOM_INPUT(key , 32);
|
|
RANDOM_INPUT(nonce, 8);
|
|
|
|
TIMING_START {
|
|
crypto_chacha20(out, in, SIZE, key, nonce);
|
|
}
|
|
TIMING_END;
|
|
}
|
|
|
|
static u64 poly1305(void)
|
|
{
|
|
u8 out[16];
|
|
RANDOM_INPUT(in , SIZE);
|
|
RANDOM_INPUT(key, 32);
|
|
|
|
TIMING_START {
|
|
crypto_poly1305(out, in, SIZE, key);
|
|
}
|
|
TIMING_END;
|
|
}
|
|
|
|
static u64 authenticated(void)
|
|
{
|
|
u8 out[SIZE];
|
|
u8 mac[ 16];
|
|
RANDOM_INPUT(in , SIZE);
|
|
RANDOM_INPUT(key , 32);
|
|
RANDOM_INPUT(nonce, 8);
|
|
|
|
TIMING_START {
|
|
crypto_lock(mac, out, key, nonce, in, SIZE);
|
|
}
|
|
TIMING_END;
|
|
}
|
|
|
|
static u64 blake2b(void)
|
|
{
|
|
u8 hash[64];
|
|
RANDOM_INPUT(in , SIZE);
|
|
RANDOM_INPUT(key, 32);
|
|
|
|
TIMING_START {
|
|
crypto_blake2b_general(hash, 64, key, 32, in, SIZE);
|
|
}
|
|
TIMING_END;
|
|
}
|
|
|
|
static u64 sha512(void)
|
|
{
|
|
u8 hash[64];
|
|
RANDOM_INPUT(in, SIZE);
|
|
|
|
TIMING_START {
|
|
crypto_sha512(hash, in, SIZE);
|
|
}
|
|
TIMING_END;
|
|
}
|
|
|
|
static u64 argon2i(void)
|
|
{
|
|
u64 work_area[SIZE / 8];
|
|
u8 hash [32];
|
|
u32 nb_blocks = (u32)(SIZE / 1024);
|
|
RANDOM_INPUT(password, 16);
|
|
RANDOM_INPUT(salt , 16);
|
|
|
|
TIMING_START {
|
|
crypto_argon2i(hash, 32, work_area, nb_blocks, 3,
|
|
password, 16, salt, 16);
|
|
}
|
|
TIMING_END;
|
|
}
|
|
|
|
static u64 x25519(void)
|
|
{
|
|
u8 in [32] = {9};
|
|
u8 out[32] = {9};
|
|
|
|
TIMING_START {
|
|
crypto_x25519(out, out, in);
|
|
}
|
|
TIMING_END;
|
|
}
|
|
|
|
static u64 edDSA_sign(void)
|
|
{
|
|
u8 pk [32];
|
|
u8 signature[64];
|
|
RANDOM_INPUT(sk , 32);
|
|
RANDOM_INPUT(message, 64);
|
|
crypto_sign_public_key(pk, sk);
|
|
|
|
TIMING_START {
|
|
crypto_sign(signature, sk, pk, message, 64);
|
|
}
|
|
TIMING_END;
|
|
}
|
|
|
|
static u64 edDSA_check(void)
|
|
{
|
|
u8 pk [32];
|
|
u8 signature[64];
|
|
RANDOM_INPUT(sk , 32);
|
|
RANDOM_INPUT(message, 64);
|
|
crypto_sign_public_key(pk, sk);
|
|
crypto_sign(signature, sk, pk, message, 64);
|
|
|
|
TIMING_START {
|
|
if (crypto_check(signature, pk, message, 64)) {
|
|
printf("Monocypher verification failed\n");
|
|
}
|
|
}
|
|
TIMING_END;
|
|
}
|
|
|
|
static u64 x25519_inverse(void)
|
|
{
|
|
u8 in [32] = {9};
|
|
u8 out[32] = {9};
|
|
|
|
TIMING_START {
|
|
crypto_x25519_inverse(out, out, in);
|
|
}
|
|
TIMING_END;
|
|
}
|
|
|
|
static u64 x25519_sp_fast(void)
|
|
{
|
|
RANDOM_INPUT(sk, 32);
|
|
TIMING_START {
|
|
crypto_x25519_dirty_fast(sk, sk);
|
|
}
|
|
TIMING_END;
|
|
}
|
|
|
|
static u64 x25519_sp_small(void)
|
|
{
|
|
RANDOM_INPUT(sk, 32);
|
|
TIMING_START {
|
|
crypto_x25519_dirty_small(sk, sk);
|
|
}
|
|
TIMING_END;
|
|
}
|
|
|
|
int main()
|
|
{
|
|
print("Chacha20 ",chacha20() *MUL ,"megabytes per second");
|
|
print("Poly1305 ",poly1305() *MUL ,"megabytes per second");
|
|
print("Auth'd encryption ",authenticated()*MUL ,"megabytes per second");
|
|
print("Blake2b ",blake2b() *MUL ,"megabytes per second");
|
|
print("Sha512 ",sha512() *MUL ,"megabytes per second");
|
|
print("Argon2i, 3 passes ",argon2i() *MUL ,"megabytes per second");
|
|
print("x25519 ",x25519() ,"exchanges per second");
|
|
print("EdDSA(sign) ",edDSA_sign() ,"signatures per second");
|
|
print("EdDSA(check) ",edDSA_check() ,"checks per second");
|
|
print("x25519 inverse ",x25519_inverse() ,"scalar inv per second");
|
|
print("x25519 dirty fast ",x25519_sp_fast() ,"scalar inv per second");
|
|
print("x25519 dirty small ",x25519_sp_small() ,"scalar inv per second");
|
|
printf("\n");
|
|
return 0;
|
|
}
|