Skip to content
Snippets Groups Projects
Select Git revision
  • 985acb56fefe2d5007d74f0ffd82a74c649a2a47
  • release default protected
  • 11-22-implement-kv-interface-defined-in-collectiveversionedkvgo
  • hotfix/TestHostPool_UpdateNdf_AddFilter
  • XX-4719/announcementChannels
  • xx-4717/logLevel
  • jonah/noob-channel
  • master protected
  • XX-4707/tagDiskJson
  • xx-4698/notification-retry
  • hotfix/notifylockup
  • syncNodes
  • hotfix/localCB
  • XX-4677/NewChanManagerMobile
  • XX-4689/DmSync
  • duplicatePrefix
  • XX-4601/HavenInvites
  • finalizedUICallbacks
  • XX-4673/AdminKeySync
  • debugNotifID
  • anne/test
  • v4.7.5
  • v4.7.4
  • v4.7.3
  • v4.7.2
  • v4.7.1
  • v4.6.3
  • v4.6.1
  • v4.5.0
  • v4.4.4
  • v4.3.11
  • v4.3.8
  • v4.3.7
  • v4.3.6
  • v4.3.5
  • v4.2.0
  • v4.3.0
  • v4.3.4
  • v4.3.3
  • v4.3.2
  • v4.3.1
41 results

sentRoundTracker_test.go

Blame
  • cryptobench_test.go 6.27 KiB
    ////////////////////////////////////////////////////////////////////////////////
    // Copyright © 2022 xx foundation                                             //
    //                                                                            //
    // Use of this source code is governed by a license that can be found in the  //
    // LICENSE file.                                                              //
    ////////////////////////////////////////////////////////////////////////////////
    
    package main
    
    import (
    	"testing"
    
    	"crypto/rand"
    	"strconv"
    
    	"gitlab.com/elixxir/crypto/cyclic"
    	dh "gitlab.com/elixxir/crypto/diffieHellman"
    	"gitlab.com/elixxir/crypto/rsa"
    	"gitlab.com/xx_network/crypto/csprng"
    	"gitlab.com/xx_network/crypto/large"
    )
    
    // //tests Session keys are generated correctly
    // func TestGenerateSessionKey(t *testing.T) {
    // 	const numTests = 50
    
    // 	primeString := "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7EDEE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3DC2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F83655D23DCA3AD961C62F356208552BB9ED529077096966D670C354E4ABC9804F1746C08CA18217C32905E462E36CE3BE39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9DE2BCBF6955817183995497CEA956AE515D2261898FA051015728E5A8AAAC42DAD33170D04507A33A85521ABDF1CBA64ECFB850458DBEF0A8AEA71575D060C7DB3970F85A6E1E4C7ABF5AE8CDB0933D71E8C94E04A25619DCEE3D2261AD2EE6BF12FFA06D98A0864D87602733EC86A64521F2B18177B200CBBE117577A615D6C770988C0BAD946E208E24FA074E5AB3143DB5BFCE0FD108E4B82D120A93AD2CAFFFFFFFFFFFFFFFF"
    // 	p := large.NewInt(1)
    // 	p.SetString(primeString, 16)
    // 	g := large.NewInt(2)
    // 	grp := cyclic.NewGroup(p, g)
    
    // 	rng := csprng.NewSystemRNG()
    
    // 	for i := 0; i < numTests; i++ {
    // 		//create session key
    // 		privKey := dh.GeneratePrivateKey(dh.DefaultPrivateKeyLength, grp, rng)
    // 		publicKey := dh.GeneratePublicKey(privKey, grp)
    // 		session := dh.GenerateSessionKey(privKey, publicKey, grp)
    
    // 		//create public key manually
    // 		sessionExpected := grp.NewInt(1)
    // 		grp.Exp(publicKey, privKey, sessionExpected)
    
    // 		if session.Cmp(sessionExpected) != 0 {
    // 			t.Errorf("Session key generated on attempt %v incorrect;"+
    // 				"\n\tExpected: %s \n\tReceived: %s \n\tPrivate key: %s", i,
    // 				sessionExpected.TextVerbose(16, 0),
    // 				session.TextVerbose(16, 0),
    // 				privKey.TextVerbose(16, 0))
    // 		}
    // 	}
    // }
    
    // Benchmarks session key creation
    func BenchmarkCreateDHSessionKey(b *testing.B) {
    	// primeString := "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7EDEE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3DC2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F83655D23DCA3AD961C62F356208552BB9ED529077096966D670C354E4ABC9804F1746C08CA18217C32905E462E36CE3BE39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9DE2BCBF6955817183995497CEA956AE515D2261898FA051015728E5A8AAAC42DAD33170D04507A33A85521ABDF1CBA64ECFB850458DBEF0A8AEA71575D060C7DB3970F85A6E1E4C7ABF5AE8CDB0933D71E8C94E04A25619DCEE3D2261AD2EE6BF12FFA06D98A0864D87602733EC86A64521F2B18177B200CBBE117577A615D6C770988C0BAD946E208E24FA074E5AB3143DB5BFCE0FD108E4B82D120A93AD2CAFFFFFFFFFFFFFFFF"
    	primeString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
    	p := large.NewInt(1)
    	p.SetString(primeString, 16)
    	g := large.NewInt(2)
    	grp := cyclic.NewGroup(p, g)
    
    	pubKeys := make([]*cyclic.Int, b.N)
    	privKeys := make([]*cyclic.Int, b.N)
    
    	rng := csprng.NewSystemRNG()
    
    	for i := 0; i < b.N; i++ {
    		// Creation of two different DH Key Pairs with valid parameters
    		privKeys[i] = dh.GeneratePrivateKey(dh.DefaultPrivateKeyLength, grp, rng)
    		tmpPrivKey := dh.GeneratePrivateKey(dh.DefaultPrivateKeyLength, grp, rng)
    		pubKeys[i] = dh.GeneratePublicKey(tmpPrivKey, grp)
    	}
    
    	b.ResetTimer()
    	for i := 0; i < b.N; i++ {
    		dh.GenerateSessionKey(privKeys[i], pubKeys[i], grp)
    	}
    }
    
    func BenchmarkRSASigCreate(b *testing.B) {
    	// Generate keys
    	sLocal := rsa.GetScheme()
    	rng := rand.Reader
    
    	privKey, err := sLocal.GenerateDefault(rng)
    	if err != nil {
    		b.Errorf("GenerateDefault: %v", err)
    	}
    
    	// pubKey := privKey.Public()
    
    	// Construct signing options
    	opts := rsa.NewDefaultPSSOptions()
    	hashFunc := opts.HashFunc()
    
    	for i := 0; i < b.N; i++ {
    		// Create hash
    		h := hashFunc.New()
    		h.Write([]byte(strconv.Itoa(i) + "test12345"))
    		hashed := h.Sum(nil)
    
    		// Construct signature
    		_, err := privKey.SignPSS(rng, hashFunc, hashed, opts)
    		if err != nil {
    			b.Fatalf("SignPSS error: %+v", err)
    		}
    	}
    }
    
    func BenchmarkRSASigVerify(b *testing.B) {
    	// Generate keys
    	sLocal := rsa.GetScheme()
    	rng := rand.Reader
    
    	privKey, err := sLocal.GenerateDefault(rng)
    	if err != nil {
    		b.Errorf("GenerateDefault: %v", err)
    	}
    
    	pubKey := privKey.Public()
    
    	// Construct signing options
    	opts := rsa.NewDefaultPSSOptions()
    	hashFunc := opts.HashFunc()
    	// Create hash
    	h := hashFunc.New()
    	h.Write([]byte(strconv.Itoa(0) + "test12345"))
    	hashed := h.Sum(nil)
    
    	// Construct signature
    	signed, err := privKey.SignPSS(rng, hashFunc, hashed, opts)
    	if err != nil {
    		b.Fatalf("SignPSS error: %+v", err)
    	}
    
    	for i := 0; i < b.N; i++ {
    		// Verify signature
    		err = pubKey.VerifyPSS(hashFunc, hashed, signed, opts)
    		if err != nil {
    			b.Fatalf("VerifyPSS error: %+v", err)
    		}
    	}
    }