aboutsummaryrefslogtreecommitdiffstats
path: root/crypto/secp256k1/libsecp256k1/src/bench_verify.c
diff options
context:
space:
mode:
authorGustav Simonsson <gustav.simonsson@gmail.com>2015-09-28 23:46:17 +0800
committerGustav Simonsson <gustav.simonsson@gmail.com>2015-09-28 23:46:38 +0800
commit1d20b0247c35f440d3fdc3d21de19b2d5256c3cf (patch)
treebe0bce533d5d476e4f408d1d7757b9ac416463ae /crypto/secp256k1/libsecp256k1/src/bench_verify.c
parent7977e87ce1e9ec46a8e8275f4cf53b6281c412c7 (diff)
downloadgo-tangerine-1d20b0247c35f440d3fdc3d21de19b2d5256c3cf.tar
go-tangerine-1d20b0247c35f440d3fdc3d21de19b2d5256c3cf.tar.gz
go-tangerine-1d20b0247c35f440d3fdc3d21de19b2d5256c3cf.tar.bz2
go-tangerine-1d20b0247c35f440d3fdc3d21de19b2d5256c3cf.tar.lz
go-tangerine-1d20b0247c35f440d3fdc3d21de19b2d5256c3cf.tar.xz
go-tangerine-1d20b0247c35f440d3fdc3d21de19b2d5256c3cf.tar.zst
go-tangerine-1d20b0247c35f440d3fdc3d21de19b2d5256c3cf.zip
Update libsecp256k1
Diffstat (limited to 'crypto/secp256k1/libsecp256k1/src/bench_verify.c')
-rw-r--r--crypto/secp256k1/libsecp256k1/src/bench_verify.c67
1 files changed, 67 insertions, 0 deletions
diff --git a/crypto/secp256k1/libsecp256k1/src/bench_verify.c b/crypto/secp256k1/libsecp256k1/src/bench_verify.c
new file mode 100644
index 000000000..0cafbdc4e
--- /dev/null
+++ b/crypto/secp256k1/libsecp256k1/src/bench_verify.c
@@ -0,0 +1,67 @@
+/**********************************************************************
+ * Copyright (c) 2014 Pieter Wuille *
+ * Distributed under the MIT software license, see the accompanying *
+ * file COPYING or http://www.opensource.org/licenses/mit-license.php.*
+ **********************************************************************/
+
+#include <stdio.h>
+#include <string.h>
+
+#include "include/secp256k1.h"
+#include "util.h"
+#include "bench.h"
+
+typedef struct {
+ secp256k1_context *ctx;
+ unsigned char msg[32];
+ unsigned char key[32];
+ unsigned char sig[72];
+ size_t siglen;
+ unsigned char pubkey[33];
+ size_t pubkeylen;
+} benchmark_verify_t;
+
+static void benchmark_verify(void* arg) {
+ int i;
+ benchmark_verify_t* data = (benchmark_verify_t*)arg;
+
+ for (i = 0; i < 20000; i++) {
+ secp256k1_pubkey pubkey;
+ secp256k1_ecdsa_signature sig;
+ data->sig[data->siglen - 1] ^= (i & 0xFF);
+ data->sig[data->siglen - 2] ^= ((i >> 8) & 0xFF);
+ data->sig[data->siglen - 3] ^= ((i >> 16) & 0xFF);
+ CHECK(secp256k1_ec_pubkey_parse(data->ctx, &pubkey, data->pubkey, data->pubkeylen) == 1);
+ CHECK(secp256k1_ecdsa_signature_parse_der(data->ctx, &sig, data->sig, data->siglen) == 1);
+ CHECK(secp256k1_ecdsa_verify(data->ctx, &sig, data->msg, &pubkey) == (i == 0));
+ data->sig[data->siglen - 1] ^= (i & 0xFF);
+ data->sig[data->siglen - 2] ^= ((i >> 8) & 0xFF);
+ data->sig[data->siglen - 3] ^= ((i >> 16) & 0xFF);
+ }
+}
+
+int main(void) {
+ int i;
+ secp256k1_pubkey pubkey;
+ secp256k1_ecdsa_signature sig;
+ benchmark_verify_t data;
+
+ data.ctx = secp256k1_context_create(SECP256K1_CONTEXT_SIGN | SECP256K1_CONTEXT_VERIFY);
+
+ for (i = 0; i < 32; i++) {
+ data.msg[i] = 1 + i;
+ }
+ for (i = 0; i < 32; i++) {
+ data.key[i] = 33 + i;
+ }
+ data.siglen = 72;
+ CHECK(secp256k1_ecdsa_sign(data.ctx, &sig, data.msg, data.key, NULL, NULL));
+ CHECK(secp256k1_ecdsa_signature_serialize_der(data.ctx, data.sig, &data.siglen, &sig));
+ CHECK(secp256k1_ec_pubkey_create(data.ctx, &pubkey, data.key));
+ CHECK(secp256k1_ec_pubkey_serialize(data.ctx, data.pubkey, &data.pubkeylen, &pubkey, SECP256K1_EC_COMPRESSED) == 1);
+
+ run_benchmark("ecdsa_verify", benchmark_verify, NULL, NULL, &data, 10, 20000);
+
+ secp256k1_context_destroy(data.ctx);
+ return 0;
+}