// This file is dual-licensed. Choose whichever licence you want from // the two licences listed below. // // The first licence is a regular 2-clause BSD licence. The second licence // is the CC-0 from Creative Commons. It is intended to release Monocypher // to the public domain. The BSD licence serves as a fallback option. // // SPDX-License-Identifier: BSD-2-Clause OR CC0-1.0 // // ------------------------------------------------------------------------ // // Copyright (c) 2017-2019, Loup Vaillant // All rights reserved. // // // Redistribution and use in source and binary forms, with or without // modification, are permitted provided that the following conditions are // met: // // 1. Redistributions of source code must retain the above copyright // notice, this list of conditions and the following disclaimer. // // 2. Redistributions in binary form must reproduce the above copyright // notice, this list of conditions and the following disclaimer in the // documentation and/or other materials provided with the // distribution. // // THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS // "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT // LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR // A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT // HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, // SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT // LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, // DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY // THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT // (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE // OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. // // ------------------------------------------------------------------------ // // Written in 2017-2019 by Loup Vaillant // // To the extent possible under law, the author(s) have dedicated all copyright // and related neighboring rights to this software to the public domain // worldwide. This software is distributed without any warranty. // // You should have received a copy of the CC0 Public Domain Dedication along // with this software. If not, see // #include "speed.h" #include "monocypher.h" #include "monocypher-ed25519.h" #include "utils.h" static u64 chacha20(void) { u8 out[SIZE]; RANDOM_INPUT(in , SIZE); RANDOM_INPUT(key , 32); RANDOM_INPUT(nonce, 8); TIMING_START { crypto_chacha20_djb(out, in, SIZE, key, nonce, 0); } TIMING_END; } static u64 poly1305(void) { u8 out[16]; RANDOM_INPUT(in , SIZE); RANDOM_INPUT(key, 32); TIMING_START { crypto_poly1305(out, in, SIZE, key); } TIMING_END; } static u64 authenticated(void) { u8 out[SIZE]; u8 mac[ 16]; RANDOM_INPUT(in , SIZE); RANDOM_INPUT(key , 32); RANDOM_INPUT(nonce, 24); TIMING_START { crypto_aead_lock(mac, out, key, nonce, 0, 0, in, SIZE); } TIMING_END; } static u64 blake2b(void) { u8 hash[64]; RANDOM_INPUT(in , SIZE); RANDOM_INPUT(key, 32); TIMING_START { crypto_blake2b_keyed(hash, 64, key, 32, in, SIZE); } TIMING_END; } static u64 blake2b_small(void) { u8 hash[64]; RANDOM_INPUT(input, 128*2); TIMING_START { FOR (i, 0, 128*2) { crypto_blake2b_ctx ctx; crypto_blake2b_init (&ctx, 64); crypto_blake2b_update(&ctx, input , i); crypto_blake2b_update(&ctx, input + i, 128*2 - i); crypto_blake2b_final (&ctx, hash); } } TIMING_END; } static u64 sha512(void) { u8 hash[64]; RANDOM_INPUT(in, SIZE); TIMING_START { crypto_sha512(hash, in, SIZE); } TIMING_END; } static u64 sha512_small(void) { u8 hash[64]; RANDOM_INPUT(input, 128*2); TIMING_START { FOR (i, 0, 128*2) { crypto_sha512_ctx ctx; crypto_sha512_init (&ctx); crypto_sha512_update(&ctx, input , i); crypto_sha512_update(&ctx, input + i, 128*2 - i); crypto_sha512_final (&ctx, hash); } } TIMING_END; } static u64 argon2i(void) { u64 work_area[SIZE / 8]; u8 hash [32]; RANDOM_INPUT(pass, 16); RANDOM_INPUT(salt, 16); crypto_argon2_config config; config.algorithm = CRYPTO_ARGON2_I; config.nb_blocks = (u32)(SIZE / 1024); config.nb_passes = 3; config.nb_lanes = 1; crypto_argon2_inputs inputs; inputs.pass = pass; inputs.salt = salt; inputs.pass_size = sizeof(pass); inputs.salt_size = sizeof(salt); TIMING_START { crypto_argon2(hash, sizeof(hash), work_area, config, inputs, crypto_argon2_no_extras); } TIMING_END; } static u64 x25519(void) { u8 in [32] = {9}; u8 out[32] = {9}; TIMING_START { crypto_x25519(out, out, in); } TIMING_END; } static u64 edDSA_sign(void) { u8 sk [64]; u8 pk [32]; u8 signature[64]; RANDOM_INPUT(seed , 32); RANDOM_INPUT(message, 64); crypto_eddsa_key_pair(sk, pk, seed); TIMING_START { crypto_eddsa_sign(signature, sk, message, 64); } TIMING_END; } static u64 edDSA_check(void) { u8 sk [64]; u8 pk [32]; u8 signature[64]; RANDOM_INPUT(seed , 32); RANDOM_INPUT(message, 64); crypto_eddsa_key_pair(sk, pk, seed); crypto_eddsa_sign(signature, sk, message, 64); TIMING_START { if (crypto_eddsa_check(signature, pk, message, 64)) { printf("Monocypher verification failed\n"); } } TIMING_END; } static u64 x25519_inverse(void) { u8 in [32] = {9}; u8 out[32] = {9}; TIMING_START { crypto_x25519_inverse(out, out, in); } TIMING_END; } static u64 x25519_sp_fast(void) { RANDOM_INPUT(sk, 32); TIMING_START { crypto_x25519_dirty_fast(sk, sk); } TIMING_END; } static u64 x25519_sp_small(void) { RANDOM_INPUT(sk, 32); TIMING_START { crypto_x25519_dirty_small(sk, sk); } TIMING_END; } int main() { print("Chacha20 ",chacha20() *MUL ,"megabytes per second"); print("Poly1305 ",poly1305() *MUL ,"megabytes per second"); print("Auth'd encryption ",authenticated()*MUL ,"megabytes per second"); print("BLAKE2b ",blake2b() *MUL ,"megabytes per second"); print("BLAKE2b (small) ",blake2b_small() ,"cycles per second"); print("SHA-512 ",sha512() *MUL ,"megabytes per second"); print("SHA-512 (small) ",sha512_small() ,"cycles per second"); print("Argon2i, 3 passes ",argon2i() *MUL ,"megabytes per second"); print("x25519 ",x25519() ,"exchanges per second"); print("EdDSA(sign) ",edDSA_sign() ,"signatures per second"); print("EdDSA(check) ",edDSA_check() ,"checks per second"); print("x25519 inverse ",x25519_inverse() ,"scalar inv per second"); print("x25519 dirty fast ",x25519_sp_fast() ,"scalar inv per second"); print("x25519 dirty small ",x25519_sp_small() ,"scalar inv per second"); printf("\n"); return 0; }