blob: eb5b351ba2d3ee58d86fcef7dd33bfdd9fd0a384 [file] [log] [blame]
// Copyright 2025 The BoringSSL Authors
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// https://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
#include <openssl/base.h>
#include <openssl/bn.h>
#include <openssl/ec.h>
#include <openssl/ecdsa.h>
#include <openssl/err.h>
#include <openssl/evp.h>
#include <openssl/mem.h>
#include <benchmark/benchmark.h>
#include "../crypto/internal.h"
#include "./internal.h"
namespace {
void BM_SpeedECDSASign(benchmark::State &state, const EC_GROUP *group) {
bssl::UniquePtr<EC_KEY> key(EC_KEY_new());
if (!key || !EC_KEY_set_group(key.get(), group) ||
!EC_KEY_generate_key(key.get())) {
state.SkipWithError("keygen failed");
return;
}
static constexpr size_t kMaxSignature = 256;
if (ECDSA_size(key.get()) > kMaxSignature) {
state.SkipWithError("key is too large.");
return;
}
uint8_t digest[20];
OPENSSL_memset(digest, 42, sizeof(digest));
uint8_t out[kMaxSignature];
for (auto _ : state) {
unsigned out_len;
if (!ECDSA_sign(0, digest, sizeof(digest), out, &out_len, key.get())) {
state.SkipWithError("signing failed.");
return;
}
}
}
void BM_SpeedECDSAVerify(benchmark::State &state, const EC_GROUP *group) {
bssl::UniquePtr<EC_KEY> key(EC_KEY_new());
if (!key || !EC_KEY_set_group(key.get(), group) ||
!EC_KEY_generate_key(key.get())) {
state.SkipWithError("keygen failed");
return;
}
static constexpr size_t kMaxSignature = 256;
if (ECDSA_size(key.get()) > kMaxSignature) {
state.SkipWithError("key is too large.");
return;
}
uint8_t digest[20];
OPENSSL_memset(digest, 42, sizeof(digest));
uint8_t signature[kMaxSignature];
unsigned sig_len;
if (!ECDSA_sign(0, digest, sizeof(digest), signature, &sig_len, key.get())) {
state.SkipWithError("signing failed");
return;
}
for (auto _ : state) {
if (!ECDSA_verify(0, digest, sizeof(digest), signature, sig_len,
key.get())) {
state.SkipWithError("verification failed.");
return;
}
}
}
BSSL_BENCH_LAZY_REGISTER() {
BENCHMARK_CAPTURE(BM_SpeedECDSASign, p224, EC_group_p224())
->Apply(bssl::bench::SetThreads);
BENCHMARK_CAPTURE(BM_SpeedECDSASign, p256, EC_group_p256())
->Apply(bssl::bench::SetThreads);
BENCHMARK_CAPTURE(BM_SpeedECDSASign, p384, EC_group_p384())
->Apply(bssl::bench::SetThreads);
BENCHMARK_CAPTURE(BM_SpeedECDSASign, p521, EC_group_p521())
->Apply(bssl::bench::SetThreads);
BENCHMARK_CAPTURE(BM_SpeedECDSAVerify, p224, EC_group_p224())
->Apply(bssl::bench::SetThreads);
BENCHMARK_CAPTURE(BM_SpeedECDSAVerify, p256, EC_group_p256())
->Apply(bssl::bench::SetThreads);
BENCHMARK_CAPTURE(BM_SpeedECDSAVerify, p384, EC_group_p384())
->Apply(bssl::bench::SetThreads);
BENCHMARK_CAPTURE(BM_SpeedECDSAVerify, p521, EC_group_p521())
->Apply(bssl::bench::SetThreads);
}
} // namespace