2018-10-27 13:00:14 +00:00
|
|
|
import
|
|
|
|
./bench_common,
|
2018-10-27 13:39:45 +00:00
|
|
|
milagro_crypto,
|
|
|
|
nimcrypto, endians, sequtils, times, strformat,
|
|
|
|
random
|
2018-10-27 13:00:14 +00:00
|
|
|
|
|
|
|
func attestation_signed_data(
|
|
|
|
fork_version: int,
|
|
|
|
slot: int64,
|
|
|
|
shard_id: int16,
|
|
|
|
parent_hashes: seq[array[32, byte]],
|
|
|
|
shard_block_hash: array[32, byte],
|
|
|
|
justified_slot: int64
|
|
|
|
): MDigest[256]=
|
|
|
|
|
|
|
|
var ctx: blake2_512
|
|
|
|
ctx.init()
|
|
|
|
|
|
|
|
var be_slot: array[8, byte]
|
|
|
|
bigEndian64(be_slot[0].addr, slot.unsafeAddr)
|
|
|
|
ctx.update be_slot
|
|
|
|
|
|
|
|
let size_p_hashes = uint parent_hashes.len * sizeof(array[32, byte])
|
|
|
|
ctx.update(cast[ptr byte](parent_hashes[0].unsafeAddr), size_p_hashes)
|
|
|
|
|
|
|
|
var be_shard_id: array[2, byte]
|
|
|
|
bigEndian16(be_shard_id.addr, shard_id.unsafeAddr)
|
|
|
|
ctx.update be_shard_id
|
|
|
|
|
|
|
|
ctx.update shard_block_hash
|
|
|
|
|
|
|
|
var be_justified_slot: array[8, byte]
|
|
|
|
bigEndian64(be_justified_slot[0].addr, justified_slot.unsafeAddr)
|
|
|
|
ctx.update be_justified_slot
|
|
|
|
|
|
|
|
result.data[0 ..< 32] = ctx.finish().data.toOpenArray(0, 31)
|
|
|
|
ctx.clear()
|
2018-10-27 13:39:45 +00:00
|
|
|
|
|
|
|
proc randBytes32(): array[32, byte] =
|
|
|
|
for b in result.mitems:
|
|
|
|
b = byte rand(0..255)
|
|
|
|
|
2018-10-27 15:58:36 +00:00
|
|
|
proc main(nb_samples: Natural) =
|
2018-10-27 13:39:45 +00:00
|
|
|
warmup()
|
|
|
|
randomize(42) # Random seed for reproducibility
|
|
|
|
|
|
|
|
#####################
|
|
|
|
# Randomize block and attestation parameters
|
|
|
|
# so that compiler does not optimize them away
|
|
|
|
let
|
2018-10-27 15:58:36 +00:00
|
|
|
fork_version = rand(1 .. 10)
|
2018-10-27 13:39:45 +00:00
|
|
|
num_validators = rand(128 .. 1024)
|
|
|
|
num_parent_hashes = rand(2 .. 16)
|
|
|
|
justified_slot = rand(4096)
|
|
|
|
slot = rand(4096 .. 4096 + 256) # 256 slots = 1.1 hour
|
2018-10-27 15:58:36 +00:00
|
|
|
shard_id = int16 rand(high(int16))
|
2018-10-27 13:39:45 +00:00
|
|
|
parent_hashes = newSeqWith(num_parent_hashes, randBytes32())
|
|
|
|
shard_block_hash = randBytes32()
|
|
|
|
|
2018-11-08 10:37:34 +00:00
|
|
|
echo '\n'
|
|
|
|
echo "######################"
|
|
|
|
echo "#"
|
|
|
|
echo "# Benchmark parameters"
|
|
|
|
echo "#"
|
|
|
|
echo "######################"
|
|
|
|
echo '\n'
|
2018-10-27 13:39:45 +00:00
|
|
|
echo &"Number of validators: {num_validators:>64}"
|
|
|
|
echo &"Number of block parent hashes: {num_parent_hashes:>64}"
|
2018-10-27 15:58:36 +00:00
|
|
|
echo &"Fork version: {fork_version:>64}"
|
2018-10-27 13:39:45 +00:00
|
|
|
echo &"Slot: {slot:>64}"
|
|
|
|
echo &"Shard_id: {shard_id:>64}"
|
|
|
|
echo &"Parent_hash[0]: {parent_hashes[0].toHex:>64}"
|
|
|
|
echo &"Shard_block_hash: {shard_block_hash.toHex:>64}"
|
|
|
|
echo &"justified_slot: {justified_slot:>64}"
|
|
|
|
|
2018-11-08 10:37:34 +00:00
|
|
|
echo '\n'
|
|
|
|
echo "######################"
|
|
|
|
echo "#"
|
|
|
|
echo "# Benchmark prologue"
|
|
|
|
echo "#"
|
|
|
|
echo "######################"
|
|
|
|
echo '\n'
|
|
|
|
|
2018-10-27 13:39:45 +00:00
|
|
|
var start = cpuTime()
|
|
|
|
let secret_public_keypairs = newSeqWith(num_validators, newKeyPair())
|
|
|
|
var stop = cpuTime()
|
2018-11-08 10:37:34 +00:00
|
|
|
echo "#### Message crypto keys, signatures and proofs of possession"
|
2018-10-27 15:58:36 +00:00
|
|
|
echo &"{num_validators} secret and public keys pairs generated in {stop - start :>4.3f} s"
|
|
|
|
echo &"Throughput: {num_validators.float / (stop - start) :>4.3f} kps/s (key pairs/second)"
|
|
|
|
|
2018-11-08 10:37:34 +00:00
|
|
|
start = cpuTime()
|
|
|
|
let proof_of_possessions = secret_public_keypairs.mapIt(it.generatePoP())
|
|
|
|
stop = cpuTime()
|
|
|
|
echo &"{num_validators} proof of possessions in {stop - start :>4.3f} s"
|
|
|
|
echo &"Throughput: {num_validators.float / (stop - start) :>4.3f} pops/s (proofs-of-possession/second)"
|
|
|
|
|
2018-10-27 15:58:36 +00:00
|
|
|
start = cpuTime()
|
|
|
|
let msg = attestation_signed_data(
|
2018-11-08 10:37:34 +00:00
|
|
|
fork_version,
|
|
|
|
slot,
|
|
|
|
shard_id,
|
|
|
|
parent_hashes,
|
|
|
|
shard_block_hash,
|
|
|
|
justified_slot
|
2018-10-27 15:58:36 +00:00
|
|
|
)
|
|
|
|
stop = cpuTime()
|
|
|
|
echo &"Message generated in {(stop - start) * 1_000 :>4.3f} ms"
|
|
|
|
|
|
|
|
echo '\n'
|
2018-11-08 10:37:34 +00:00
|
|
|
var pubkeys: seq[VerKey]
|
|
|
|
var signatures: seq[Signature]
|
2018-10-27 15:58:36 +00:00
|
|
|
start = cpuTime()
|
|
|
|
for kp in secret_public_keypairs:
|
2018-11-08 10:37:34 +00:00
|
|
|
pubkeys.add kp.verkey
|
|
|
|
signatures.add kp.sigkey.signMessage(msg.data) # toOpenArray?
|
2018-10-27 15:58:36 +00:00
|
|
|
stop = cpuTime()
|
|
|
|
echo &"{num_validators} public key and message signature pairs generated in {stop - start :>4.3f} s"
|
|
|
|
echo &"Throughput: {num_validators.float / (stop - start) :>4.3f} kps/s (keysig pairs/second)"
|
2018-11-08 10:37:34 +00:00
|
|
|
echo "Note: message is re-hashed through Blake2B-384."
|
|
|
|
echo " Eth2.0 spec mentions hashing with Blake2b-512 and slicing the first 256-bit."
|
|
|
|
echo " However message signing is unspecified, and Milagro BLS12-384 requires a 384-bit input."
|
|
|
|
|
|
|
|
echo '\n'
|
|
|
|
echo "######################"
|
|
|
|
echo "#"
|
|
|
|
echo "# Benchmark main body"
|
|
|
|
echo "#"
|
|
|
|
echo "######################"
|
|
|
|
echo '\n'
|
|
|
|
|
|
|
|
echo '\n'
|
|
|
|
echo "#### Benchmark: proofs-of-possessions verification"
|
|
|
|
var pop_valid: bool
|
|
|
|
bench "Benchmarking proofs-of-possessions verification", pop_valid:
|
|
|
|
for i in 0 ..< proof_of_possessions.len:
|
|
|
|
pop_valid = pop_valid and proof_of_possessions[i].verifyPoP(pubkeys[i])
|
2018-10-27 15:58:36 +00:00
|
|
|
|
2018-10-27 16:04:43 +00:00
|
|
|
### Bench stuck in ECP2 multiplication at the moment
|
2018-11-08 10:37:34 +00:00
|
|
|
echo '\n'
|
|
|
|
echo "#### Benchmark: public keys aggregation"
|
|
|
|
var agg_pubkey: VerKey
|
|
|
|
bench "Benchmarking public key aggregation", agg_pubkey:
|
|
|
|
agg_pubkey = combine(pubkeys)
|
2018-10-27 15:58:36 +00:00
|
|
|
|
|
|
|
echo '\n'
|
|
|
|
echo "#### Benchmark: signature aggregation"
|
2018-11-08 10:37:34 +00:00
|
|
|
var agg_sig: Signature
|
2018-10-27 16:04:43 +00:00
|
|
|
bench "Benchmarking signature aggregation", agg_sig:
|
2018-11-08 10:37:34 +00:00
|
|
|
agg_sig = combine(signatures)
|
|
|
|
|
|
|
|
echo '\n'
|
|
|
|
echo "#### Benchmark: message verification"
|
|
|
|
var msg_verif: bool
|
|
|
|
bench "Benchmarking message verification", msg_verif:
|
|
|
|
msg_verif = agg_sig.verifyMessage(msg.data, agg_pubkey)
|
2018-10-27 15:58:36 +00:00
|
|
|
|
2018-11-08 10:37:34 +00:00
|
|
|
#####################
|
|
|
|
#
|
|
|
|
# Benchmark epilogue
|
|
|
|
#
|
|
|
|
#####################
|
|
|
|
discard
|
2018-10-27 13:39:45 +00:00
|
|
|
|
|
|
|
when isMainModule:
|
2018-10-27 16:04:43 +00:00
|
|
|
main(100)
|