|
| 1 | + |
| 2 | +#ifndef SECP256K1_MODULE_EXTRAKEYS_BENCH_H |
| 3 | +#define SECP256K1_MODULE_EXTRAKEYS_BENCH_H |
| 4 | + |
| 5 | +#include "../../../include/secp256k1_extrakeys.h" |
| 6 | +#ifdef ENABLE_MODULE_BATCH |
| 7 | +# include "../../../include/secp256k1_batch.h" |
| 8 | +# include "../../../include/secp256k1_tweak_check_batch.h" |
| 9 | +#endif |
| 10 | + |
| 11 | +typedef struct { |
| 12 | + secp256k1_context *ctx; |
| 13 | +#ifdef ENABLE_MODULE_BATCH |
| 14 | + secp256k1_batch *batch; |
| 15 | + /* number of tweak checks to batch verify. |
| 16 | + * it varies from 1 to iters with 20% increments */ |
| 17 | + int n; |
| 18 | +#endif |
| 19 | + |
| 20 | + const secp256k1_keypair **keypairs; |
| 21 | + const unsigned char **pks; |
| 22 | + const unsigned char **tweaked_pks; |
| 23 | + const int **tweaked_pk_parities; |
| 24 | + const unsigned char **tweaks; |
| 25 | +} bench_tweak_check_data; |
| 26 | + |
| 27 | +void bench_xonly_pubkey_tweak_add_check(void* arg, int iters) { |
| 28 | + bench_tweak_check_data *data = (bench_tweak_check_data *)arg; |
| 29 | + int i; |
| 30 | + |
| 31 | + for (i = 0; i < iters; i++) { |
| 32 | + secp256k1_xonly_pubkey pk; |
| 33 | + CHECK(secp256k1_xonly_pubkey_parse(data->ctx, &pk, data->pks[i]) == 1); |
| 34 | + CHECK(secp256k1_xonly_pubkey_tweak_add_check(data->ctx, data->tweaked_pks[i], *data->tweaked_pk_parities[i], &pk, data->tweaks[i]) == 1); |
| 35 | + } |
| 36 | +} |
| 37 | + |
| 38 | +#ifdef ENABLE_MODULE_BATCH |
| 39 | +void bench_xonly_pubkey_tweak_add_check_n(void* arg, int iters) { |
| 40 | + bench_tweak_check_data *data = (bench_tweak_check_data *)arg; |
| 41 | + int i, j; |
| 42 | + |
| 43 | + for (j = 0; j < iters/data->n; j++) { |
| 44 | + for (i = 0; i < data->n; i++) { |
| 45 | + secp256k1_xonly_pubkey pk; |
| 46 | + CHECK(secp256k1_xonly_pubkey_parse(data->ctx, &pk, data->pks[j+i]) == 1); |
| 47 | + CHECK(secp256k1_batch_usable(data->ctx, data->batch) == 1); |
| 48 | + CHECK(secp256k1_batch_add_xonlypub_tweak_check(data->ctx, data->batch, data->tweaked_pks[j+i], *data->tweaked_pk_parities[j+i], &pk, data->tweaks[j+i]) == 1); |
| 49 | + } |
| 50 | + CHECK(secp256k1_batch_verify(data->ctx, data->batch) == 1); |
| 51 | + } |
| 52 | +} |
| 53 | +#endif |
| 54 | + |
| 55 | +void run_extrakeys_bench(int iters, int argc, char** argv) { |
| 56 | + int i; |
| 57 | + bench_tweak_check_data data; |
| 58 | + int d = argc == 1; |
| 59 | + |
| 60 | + data.ctx = secp256k1_context_create(SECP256K1_CONTEXT_NONE); |
| 61 | + data.keypairs = (const secp256k1_keypair **)malloc(iters * sizeof(secp256k1_keypair *)); |
| 62 | + data.pks = (const unsigned char **)malloc(iters * sizeof(unsigned char *)); |
| 63 | + data.tweaked_pks = (const unsigned char **)malloc(iters * sizeof(unsigned char *)); |
| 64 | + data.tweaked_pk_parities = (const int **)malloc(iters * sizeof(int *)); |
| 65 | + data.tweaks = (const unsigned char **)malloc(iters * sizeof(unsigned char *)); |
| 66 | +#ifdef ENABLE_MODULE_BATCH |
| 67 | + data.batch = secp256k1_batch_create(data.ctx, iters, NULL); |
| 68 | + CHECK(data.batch != NULL); |
| 69 | +#endif |
| 70 | + |
| 71 | + for (i = 0; i < iters; i++) { |
| 72 | + unsigned char sk[32]; |
| 73 | + unsigned char *tweaked_pk_char = (unsigned char *)malloc(32); |
| 74 | + int *tweaked_pk_parity = (int *)malloc(sizeof(int)); /*todo: use sizeof(*twk_parity) instead?*/ |
| 75 | + unsigned char *tweak = (unsigned char *)malloc(32); |
| 76 | + secp256k1_keypair *keypair = (secp256k1_keypair *)malloc(sizeof(*keypair)); |
| 77 | + unsigned char *pk_char = (unsigned char *)malloc(32); |
| 78 | + secp256k1_xonly_pubkey pk; |
| 79 | + secp256k1_pubkey output_pk; |
| 80 | + secp256k1_xonly_pubkey output_pk_xonly; |
| 81 | + tweak[0] = sk[0] = i; |
| 82 | + tweak[1] = sk[1] = i >> 8; |
| 83 | + tweak[2] = sk[2] = i >> 16; |
| 84 | + tweak[3] = sk[3] = i >> 24; |
| 85 | + memset(&tweak[4], 't', 28); |
| 86 | + memset(&sk[4], 's', 28); |
| 87 | + |
| 88 | + data.keypairs[i] = keypair; |
| 89 | + data.pks[i] = pk_char; |
| 90 | + data.tweaked_pks[i] = tweaked_pk_char; |
| 91 | + data.tweaked_pk_parities[i] = tweaked_pk_parity; |
| 92 | + data.tweaks[i] = tweak; |
| 93 | + |
| 94 | + CHECK(secp256k1_keypair_create(data.ctx, keypair, sk)); |
| 95 | + CHECK(secp256k1_keypair_xonly_pub(data.ctx, &pk, NULL, keypair)); |
| 96 | + CHECK(secp256k1_xonly_pubkey_tweak_add(data.ctx, &output_pk, &pk, tweak)); |
| 97 | + CHECK(secp256k1_xonly_pubkey_from_pubkey(data.ctx, &output_pk_xonly, tweaked_pk_parity, &output_pk)); |
| 98 | + CHECK(secp256k1_xonly_pubkey_serialize(data.ctx, tweaked_pk_char, &output_pk_xonly) == 1); |
| 99 | + CHECK(secp256k1_xonly_pubkey_serialize(data.ctx, pk_char, &pk) == 1); |
| 100 | + } |
| 101 | + |
| 102 | + if (d || have_flag(argc, argv, "extrakeys") || have_flag(argc, argv, "tweak_add_check")) run_benchmark("tweak_add_check", bench_xonly_pubkey_tweak_add_check, NULL, NULL, (void *) &data, 10, iters); |
| 103 | +#ifdef ENABLE_MODULE_BATCH |
| 104 | + if (d || have_flag(argc, argv, "extrakeys") || have_flag(argc, argv, "batch_verify") || have_flag(argc, argv, "tweak_check_batch_verify")) { |
| 105 | + for (i = 1; i <= iters; i = (int)(i*1.2 + 1)) { |
| 106 | + char name[64]; |
| 107 | + int divisible_iters; |
| 108 | + sprintf(name, "tweak_check_batch_verify_%d", (int) i); |
| 109 | + |
| 110 | + data.n = i; |
| 111 | + divisible_iters = iters - (iters % data.n); |
| 112 | + run_benchmark(name, bench_xonly_pubkey_tweak_add_check_n, NULL, NULL, (void *) &data, 3, divisible_iters); |
| 113 | + fflush(stdout); |
| 114 | + } |
| 115 | + } |
| 116 | +#endif |
| 117 | + |
| 118 | + for (i = 0; i < iters; i++) { |
| 119 | + free((void *)data.keypairs[i]); |
| 120 | + free((void *)data.pks[i]); |
| 121 | + free((void *)data.tweaked_pks[i]); |
| 122 | + free((void *)data.tweaked_pk_parities[i]); |
| 123 | + free((void *)data.tweaks[i]); |
| 124 | + } |
| 125 | + |
| 126 | + /* Casting to (void *) avoids a stupid warning in MSVC. */ |
| 127 | + free((void *)data.keypairs); |
| 128 | + free((void *)data.pks); |
| 129 | + free((void *)data.tweaked_pks); |
| 130 | + free((void *)data.tweaked_pk_parities); |
| 131 | + free((void *)data.tweaks); |
| 132 | + |
| 133 | +#ifdef ENABLE_MODULE_BATCH |
| 134 | + secp256k1_batch_destroy(data.ctx, data.batch); |
| 135 | +#endif |
| 136 | + secp256k1_context_destroy(data.ctx); |
| 137 | +} |
| 138 | + |
| 139 | +#endif /* SECP256K1_MODULE_EXTRAKEYS_BENCH_H */ |
0 commit comments