2025-02-06 00:00:00 +00:00
|
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
|
|
|
|
|
|
#include <stdlib.h>
|
|
|
|
|
#include <string.h>
|
|
|
|
|
#include <stdio.h>
|
|
|
|
|
#include <inttypes.h>
|
|
|
|
|
|
|
|
|
|
#include <api.h>
|
|
|
|
|
#include <rng.h>
|
|
|
|
|
#include <bench.h>
|
|
|
|
|
#include <bench_test_arguments.h>
|
|
|
|
|
#if defined(TARGET_BIG_ENDIAN)
|
|
|
|
|
#include <tutil.h>
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
void
|
|
|
|
|
bench(size_t runs)
|
|
|
|
|
{
|
|
|
|
|
const size_t m_len = 32;
|
|
|
|
|
const size_t sm_len = CRYPTO_BYTES + m_len;
|
|
|
|
|
|
|
|
|
|
unsigned char *pkbuf = calloc(runs, CRYPTO_PUBLICKEYBYTES);
|
|
|
|
|
unsigned char *skbuf = calloc(runs, CRYPTO_SECRETKEYBYTES);
|
|
|
|
|
unsigned char *smbuf = calloc(runs, sm_len);
|
|
|
|
|
unsigned char *mbuf = calloc(runs, m_len);
|
|
|
|
|
|
|
|
|
|
unsigned char *pk[runs], *sk[runs], *sm[runs], *m[runs];
|
|
|
|
|
for (size_t i = 0; i < runs; ++i) {
|
|
|
|
|
pk[i] = pkbuf + i * CRYPTO_PUBLICKEYBYTES;
|
|
|
|
|
sk[i] = skbuf + i * CRYPTO_SECRETKEYBYTES;
|
|
|
|
|
sm[i] = smbuf + i * sm_len;
|
|
|
|
|
m[i] = mbuf + i * m_len;
|
|
|
|
|
if (randombytes(m[i], m_len))
|
|
|
|
|
abort();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
unsigned long long len;
|
|
|
|
|
|
|
|
|
|
printf("%s (%zu iterations)\n", CRYPTO_ALGNAME, runs);
|
|
|
|
|
|
|
|
|
|
BENCH_CODE_1(runs);
|
|
|
|
|
crypto_sign_keypair(pk[i], sk[i]);
|
|
|
|
|
BENCH_CODE_2("keypair");
|
|
|
|
|
|
|
|
|
|
BENCH_CODE_1(runs);
|
|
|
|
|
len = sm_len;
|
|
|
|
|
crypto_sign(sm[i], &len, m[i], m_len, sk[i]);
|
|
|
|
|
if (len != sm_len)
|
|
|
|
|
abort();
|
|
|
|
|
BENCH_CODE_2("sign");
|
|
|
|
|
|
|
|
|
|
int ret;
|
|
|
|
|
BENCH_CODE_1(runs);
|
|
|
|
|
len = m_len;
|
|
|
|
|
ret = crypto_sign_open(m[i], &len, sm[i], sm_len, pk[i]);
|
|
|
|
|
if (ret)
|
|
|
|
|
abort();
|
|
|
|
|
BENCH_CODE_2("verify");
|
|
|
|
|
|
|
|
|
|
free(pkbuf);
|
|
|
|
|
free(skbuf);
|
|
|
|
|
free(smbuf);
|
|
|
|
|
free(mbuf);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int
|
|
|
|
|
main(int argc, char *argv[])
|
|
|
|
|
{
|
2025-11-26 09:23:47 +08:00
|
|
|
uint32_t seed[12] = { 0x9c9c486d, 0xdee450ff, 0x59e7c0c5, 0xfb4cbe06, 0xfd92f011, 0x3af36b27, 0x86b2837c, 0xa63f4891, 0x25b7bdad, 0xe67e94a3, 0x6c32f51a, 0x9bc1d896 };
|
2025-02-06 00:00:00 +00:00
|
|
|
int iterations = SQISIGN_TEST_REPS;
|
|
|
|
|
int help = 0;
|
2025-11-26 09:23:47 +08:00
|
|
|
int seed_set = 1;
|
2025-02-06 00:00:00 +00:00
|
|
|
|
|
|
|
|
#ifndef NDEBUG
|
|
|
|
|
fprintf(stderr,
|
|
|
|
|
"\x1b[31mIt looks like SQIsign was compiled with assertions enabled.\n"
|
|
|
|
|
"This will severely impact performance measurements.\x1b[0m\n");
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
for (int i = 1; i < argc; i++) {
|
|
|
|
|
if (!help && strcmp(argv[i], "--help") == 0) {
|
|
|
|
|
help = 1;
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!seed_set && !parse_seed(argv[i], seed)) {
|
|
|
|
|
seed_set = 1;
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (sscanf(argv[i], "--iterations=%d", &iterations) == 1) {
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (help || iterations <= 0) {
|
|
|
|
|
printf("Usage: %s [--iterations=<iterations>] [--seed=<seed>]\n", argv[0]);
|
|
|
|
|
printf("Where <iterations> is the number of iterations used for benchmarking; if not "
|
|
|
|
|
"present, uses the default: %d)\n",
|
|
|
|
|
iterations);
|
|
|
|
|
printf("Where <seed> is the random seed to be used; if not present, a random seed is "
|
|
|
|
|
"generated\n");
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!seed_set) {
|
|
|
|
|
randombytes_select((unsigned char *)seed, sizeof(seed));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
print_seed(seed);
|
|
|
|
|
|
|
|
|
|
#if defined(TARGET_BIG_ENDIAN)
|
|
|
|
|
for (int i = 0; i < 12; i++) {
|
|
|
|
|
seed[i] = BSWAP32(seed[i]);
|
|
|
|
|
}
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
randombytes_init((unsigned char *)seed, NULL, 256);
|
|
|
|
|
cpucycles_init();
|
|
|
|
|
|
|
|
|
|
bench(iterations);
|
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|