blob: 136ea5f2ae98ba1b0b945d48ceaaa4700bcac0b2 [file] [edit]
// Copyright 2025 The BoringSSL Authors
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// https://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
#include <string_view>
#include <benchmark/benchmark.h>
#include <openssl/evp.h>
#include <openssl/mldsa.h>
#include <openssl/span.h>
#include "./internal.h"
BSSL_NAMESPACE_BEGIN
namespace {
constexpr size_t kMaxPublicKeyBytes = MLDSA87_PUBLIC_KEY_BYTES;
constexpr size_t kMaxSignatureBytes = MLDSA87_SIGNATURE_BYTES;
void BM_SpeedMLDSAKeyGen(benchmark::State &state, const EVP_PKEY_ALG *alg) {
for (auto _ : state) {
UniquePtr<EVP_PKEY> pkey(EVP_PKEY_generate_from_alg(alg));
if (pkey == nullptr) {
state.SkipWithError("Error generating ML-DSA key.");
return;
}
}
}
void BM_SpeedMLDSASign(benchmark::State &state, const EVP_PKEY_ALG *alg) {
UniquePtr<EVP_PKEY> pkey(EVP_PKEY_generate_from_alg(alg));
if (pkey == nullptr) {
state.SkipWithError("Error generating ML-DSA key.");
return;
}
const auto message = bssl::StringAsBytes("Hello world");
for (auto _ : state) {
uint8_t sig[kMaxSignatureBytes];
size_t sig_len = sizeof(sig);
ScopedEVP_MD_CTX ctx;
if (!EVP_DigestSignInit(ctx.get(), nullptr, nullptr, nullptr, pkey.get()) ||
!EVP_DigestSign(ctx.get(), sig, &sig_len, message.data(),
message.size())) {
state.SkipWithError("Error generating ML-DSA signature.");
return;
}
}
}
void BM_SpeedMLDSAParsePubKey(benchmark::State &state,
const EVP_PKEY_ALG *alg) {
UniquePtr<EVP_PKEY> pkey(EVP_PKEY_generate_from_alg(alg));
if (pkey == nullptr) {
state.SkipWithError("Error generating ML-DSA key.");
return;
}
uint8_t pub[kMaxPublicKeyBytes];
size_t pub_len = sizeof(pub);
if (!EVP_PKEY_get_raw_public_key(pkey.get(), pub, &pub_len)) {
state.SkipWithError("Error serializing public key.");
return;
}
for (auto _ : state) {
UniquePtr<EVP_PKEY> parsed(
EVP_PKEY_from_raw_public_key(alg, pub, pub_len));
if (parsed == nullptr) {
state.SkipWithError("Error parsing public key.");
return;
}
}
}
void BM_SpeedMLDSAVerify(benchmark::State &state, const EVP_PKEY_ALG *alg) {
UniquePtr<EVP_PKEY> priv(EVP_PKEY_generate_from_alg(alg));
if (priv == nullptr) {
state.SkipWithError("Error generating ML-DSA key.");
return;
}
const auto message = bssl::StringAsBytes("Hello world");
uint8_t sig[kMaxSignatureBytes];
size_t sig_len = sizeof(sig);
ScopedEVP_MD_CTX sign_ctx;
if (!EVP_DigestSignInit(sign_ctx.get(), nullptr, nullptr, nullptr,
priv.get()) ||
!EVP_DigestSign(sign_ctx.get(), sig, &sig_len, message.data(),
message.size())) {
state.SkipWithError("Error generating ML-DSA signature.");
}
UniquePtr<EVP_PKEY> pub(EVP_PKEY_copy_public(priv.get()));
if (priv == nullptr) {
state.SkipWithError("Error copying public key.");
return;
}
for (auto _ : state) {
ScopedEVP_MD_CTX verify_ctx;
if (!EVP_DigestVerifyInit(verify_ctx.get(), nullptr, nullptr, nullptr,
priv.get()) ||
!EVP_DigestVerify(verify_ctx.get(), sig, sig_len, message.data(),
message.size())) {
state.SkipWithError("Error verifying ML-DSA signature.");
return;
}
}
}
void BM_SpeedMLDSAVerifyBadSignature(benchmark::State &state,
const EVP_PKEY_ALG *alg) {
UniquePtr<EVP_PKEY> priv(EVP_PKEY_generate_from_alg(alg));
if (priv == nullptr) {
state.SkipWithError("Error generating ML-DSA key.");
return;
}
const auto message = bssl::StringAsBytes("Hello world");
uint8_t sig[kMaxSignatureBytes];
size_t sig_len = sizeof(sig);
ScopedEVP_MD_CTX sign_ctx;
if (!EVP_DigestSignInit(sign_ctx.get(), nullptr, nullptr, nullptr,
priv.get()) ||
!EVP_DigestSign(sign_ctx.get(), sig, &sig_len, message.data(),
message.size())) {
state.SkipWithError("Error generating ML-DSA signature.");
}
sig[42] ^= 0x42;
UniquePtr<EVP_PKEY> pub(EVP_PKEY_copy_public(priv.get()));
if (priv == nullptr) {
state.SkipWithError("Error copying public key.");
return;
}
for (auto _ : state) {
ScopedEVP_MD_CTX verify_ctx;
if (!EVP_DigestVerifyInit(verify_ctx.get(), nullptr, nullptr, nullptr,
priv.get())) {
state.SkipWithError("EVP_DigestVerifyInit failed.");
return;
}
if (EVP_DigestVerify(verify_ctx.get(), sig, sig_len, message.data(),
message.size())) {
state.SkipWithError("MLDSA signature unexpectedly verified.");
return;
}
}
}
BSSL_BENCH_LAZY_REGISTER() {
#define MAKE_MLDSA_BENCHMARKS(kl) \
BENCHMARK_CAPTURE(BM_SpeedMLDSAKeyGen, ml_dsa_##kl, EVP_pkey_ml_dsa_##kl()) \
->Apply(bssl::bench::SetThreads); \
BENCHMARK_CAPTURE(BM_SpeedMLDSASign, ml_dsa_##kl, EVP_pkey_ml_dsa_##kl()) \
->Apply(bssl::bench::SetThreads); \
BENCHMARK_CAPTURE(BM_SpeedMLDSAParsePubKey, ml_dsa_##kl, \
EVP_pkey_ml_dsa_##kl()) \
->Apply(bssl::bench::SetThreads); \
BENCHMARK_CAPTURE(BM_SpeedMLDSAVerify, ml_dsa_##kl, EVP_pkey_ml_dsa_##kl()) \
->Apply(bssl::bench::SetThreads); \
BENCHMARK_CAPTURE(BM_SpeedMLDSAVerifyBadSignature, ml_dsa_##kl, \
EVP_pkey_ml_dsa_##kl()) \
->Apply(bssl::bench::SetThreads)
MAKE_MLDSA_BENCHMARKS(44);
MAKE_MLDSA_BENCHMARKS(65);
MAKE_MLDSA_BENCHMARKS(87);
}
} // namespace
BSSL_NAMESPACE_END