mirror of
https://github.com/bitcoin/bitcoin.git
synced 2026-01-21 15:50:07 +01:00
8225239Merge #433: Make the libcrypto detection fail the newer API.12de863Make the libcrypto detection fail the newer API.2928420Merge #427: Remove Schnorr from travis as well8eecc4aRemove Schnorr from travis as wella8abae7Merge #310: Add exhaustive test for group functions on a low-order subgroupb4ceedfAdd exhaustive test for verification83836a9Add exhaustive tests for group arithmetic, signing, and ecmult on a small group20b8877Add exhaustive test for group functions on a low-order subgroup80773a6Merge #425: Remove Schnorr experimente06e878Remove Schnorr experiment04c8ef3Merge #407: Modify parameter order of internal functions to match API parameter order6e06696Merge #411: Remove guarantees about memcmp-ability40c8d7eMerge #421: Update scalar_4x64_impl.ha922365Merge #422: Restructure nonce clearing3769783Restructure nonce clearing0f9e69dRestructure nonce clearing9d67afaUpdate scalar_4x64_impl.h7d15cd7Merge #413: fix auto-enabled static precompuatation00c5d2efix auto-enabled static precompuatation91219a1Remove guarantees about memcmp-ability7a49cacMerge #410: Add string.h include to ecmult_impl0bbd5d4Add string.h include to ecmult_impl353c1bfFix secp256k1_ge_set_table_gej_var parameter order541b783Fix secp256k1_ge_set_all_gej_var parameter order7d893f4Fix secp256k1_fe_inv_all_var parameter orderc5b32e1Merge #405: Make secp256k1_fe_sqrt constant time926836aMake secp256k1_fe_sqrt constant timee2a8e92Merge #404: Replace 3M + 4S doubling formula with 2M + 5S one8ec49d8Add note about 2M + 5S doubling formula5a91bd7Merge #400: A couple minor cleanupsac01378build: add -DSECP256K1_BUILD to benchmark_internal build flagsa6c6f99Remove a bunch of unused stdlib #includes65285a6Merge #403: configure: add flag to disable OpenSSL testsa9b2a5dconfigure: add flag to disable OpenSSL testsb340123Merge #402: Add support for testing quadratic residuese6e9805Add function for testing quadratic residue field/group elements.efd953aAdd Jacobi symbol test via GMPfa36a0dMerge #401: ecmult_const: unify endomorphism and non-endomorphism skew casesc6191fdecmult_const: unify endomorphism and non-endomorphism skew cases0b3e618Merge #378: .gitignore build-aux cleanup6042217Merge #384: JNI: align shared files copyright/comments to bitcoinj's24ad20fMerge #399: build: verify that the native compiler works for static precompb3be852Merge #398: Test whether ECDH and Schnorr are enabled for JNIaa0b1fdbuild: verify that the native compiler works for static precompeee808dTest whether ECDH and Schnorr are enabled for JNI7b0fb18Merge #366: ARM assembly implementation of field_10x26 inner (rebase of #173)001f176ARM assembly implementation of field_10x26 inner0172be9Merge #397: Small fixes for sha2563f8b78eFix undefs in hash_impl.h2ab4695Fix state size in sha256 struct6875b01Merge #386: Add some missing `VERIFY_CHECK(ctx != NULL)`2c52b5dMerge #389: Cast pointers through uintptr_t under JNI43097a4Merge #390: Update bitcoin-core GitHub links31c9c12Merge #391: JNI: Only call ecdsa_verify if its inputs parsed correctly1cb2302Merge #392: Add testcase which hits additional branch in secp256k1_scalar_sqrd2ee340Merge #388: bench_ecdh: fix call to secp256k1_context_create093a497Add testcase which hits additional branch in secp256k1_scalar_sqra40c701JNI: Only call ecdsa_verify if its inputs parsed correctlyfaa2a11Update bitcoin-core GitHub links47b9e78Cast pointers through uintptr_t under JNIf36f9c6bench_ecdh: fix call to secp256k1_context_createbcc4881Add some missing `VERIFY_CHECK(ctx != NULL)` for functions that use `ARG_CHECK`6ceea2calign shared files copyright/comments to bitcoinj's70141a8Update .gitignore7b549b1Merge #373: build: fix x86_64 asm detection for some compilersbc7c93cMerge #374: Add note about y=0 being possible on one of the sextic twistse457018Merge #364: JNI rebased86e2d07JNI library: cleanup, removed unimplemented code3093576aJNI librarybd2895fMerge pull request #371e72e93aAdd note about y=0 being possible on one of the sextic twists3f8fdfbbuild: fix x86_64 asm detection for some compilerse5a9047[Trivial] Remove double semicolonsc18b869Merge pull request #3603026daaMerge pull request #30203d4611Add sage verification script for the group lawsa965937Merge pull request #36183221ecAdd experimental features to configure5d4c5a3Prevent damage_array in the signature test from going out of bounds.419bf7fMerge pull request #35603d84a4Benchmark against OpenSSL verification git-subtree-dir: src/secp256k1 git-subtree-split:8225239f49
383 lines
13 KiB
C
383 lines
13 KiB
C
/**********************************************************************
|
|
* Copyright (c) 2014-2015 Pieter Wuille *
|
|
* Distributed under the MIT software license, see the accompanying *
|
|
* file COPYING or http://www.opensource.org/licenses/mit-license.php.*
|
|
**********************************************************************/
|
|
#include <stdio.h>
|
|
|
|
#include "include/secp256k1.h"
|
|
|
|
#include "util.h"
|
|
#include "hash_impl.h"
|
|
#include "num_impl.h"
|
|
#include "field_impl.h"
|
|
#include "group_impl.h"
|
|
#include "scalar_impl.h"
|
|
#include "ecmult_const_impl.h"
|
|
#include "ecmult_impl.h"
|
|
#include "bench.h"
|
|
#include "secp256k1.c"
|
|
|
|
typedef struct {
|
|
secp256k1_scalar scalar_x, scalar_y;
|
|
secp256k1_fe fe_x, fe_y;
|
|
secp256k1_ge ge_x, ge_y;
|
|
secp256k1_gej gej_x, gej_y;
|
|
unsigned char data[64];
|
|
int wnaf[256];
|
|
} bench_inv_t;
|
|
|
|
void bench_setup(void* arg) {
|
|
bench_inv_t *data = (bench_inv_t*)arg;
|
|
|
|
static const unsigned char init_x[32] = {
|
|
0x02, 0x03, 0x05, 0x07, 0x0b, 0x0d, 0x11, 0x13,
|
|
0x17, 0x1d, 0x1f, 0x25, 0x29, 0x2b, 0x2f, 0x35,
|
|
0x3b, 0x3d, 0x43, 0x47, 0x49, 0x4f, 0x53, 0x59,
|
|
0x61, 0x65, 0x67, 0x6b, 0x6d, 0x71, 0x7f, 0x83
|
|
};
|
|
|
|
static const unsigned char init_y[32] = {
|
|
0x82, 0x83, 0x85, 0x87, 0x8b, 0x8d, 0x81, 0x83,
|
|
0x97, 0xad, 0xaf, 0xb5, 0xb9, 0xbb, 0xbf, 0xc5,
|
|
0xdb, 0xdd, 0xe3, 0xe7, 0xe9, 0xef, 0xf3, 0xf9,
|
|
0x11, 0x15, 0x17, 0x1b, 0x1d, 0xb1, 0xbf, 0xd3
|
|
};
|
|
|
|
secp256k1_scalar_set_b32(&data->scalar_x, init_x, NULL);
|
|
secp256k1_scalar_set_b32(&data->scalar_y, init_y, NULL);
|
|
secp256k1_fe_set_b32(&data->fe_x, init_x);
|
|
secp256k1_fe_set_b32(&data->fe_y, init_y);
|
|
CHECK(secp256k1_ge_set_xo_var(&data->ge_x, &data->fe_x, 0));
|
|
CHECK(secp256k1_ge_set_xo_var(&data->ge_y, &data->fe_y, 1));
|
|
secp256k1_gej_set_ge(&data->gej_x, &data->ge_x);
|
|
secp256k1_gej_set_ge(&data->gej_y, &data->ge_y);
|
|
memcpy(data->data, init_x, 32);
|
|
memcpy(data->data + 32, init_y, 32);
|
|
}
|
|
|
|
void bench_scalar_add(void* arg) {
|
|
int i;
|
|
bench_inv_t *data = (bench_inv_t*)arg;
|
|
|
|
for (i = 0; i < 2000000; i++) {
|
|
secp256k1_scalar_add(&data->scalar_x, &data->scalar_x, &data->scalar_y);
|
|
}
|
|
}
|
|
|
|
void bench_scalar_negate(void* arg) {
|
|
int i;
|
|
bench_inv_t *data = (bench_inv_t*)arg;
|
|
|
|
for (i = 0; i < 2000000; i++) {
|
|
secp256k1_scalar_negate(&data->scalar_x, &data->scalar_x);
|
|
}
|
|
}
|
|
|
|
void bench_scalar_sqr(void* arg) {
|
|
int i;
|
|
bench_inv_t *data = (bench_inv_t*)arg;
|
|
|
|
for (i = 0; i < 200000; i++) {
|
|
secp256k1_scalar_sqr(&data->scalar_x, &data->scalar_x);
|
|
}
|
|
}
|
|
|
|
void bench_scalar_mul(void* arg) {
|
|
int i;
|
|
bench_inv_t *data = (bench_inv_t*)arg;
|
|
|
|
for (i = 0; i < 200000; i++) {
|
|
secp256k1_scalar_mul(&data->scalar_x, &data->scalar_x, &data->scalar_y);
|
|
}
|
|
}
|
|
|
|
#ifdef USE_ENDOMORPHISM
|
|
void bench_scalar_split(void* arg) {
|
|
int i;
|
|
bench_inv_t *data = (bench_inv_t*)arg;
|
|
|
|
for (i = 0; i < 20000; i++) {
|
|
secp256k1_scalar l, r;
|
|
secp256k1_scalar_split_lambda(&l, &r, &data->scalar_x);
|
|
secp256k1_scalar_add(&data->scalar_x, &data->scalar_x, &data->scalar_y);
|
|
}
|
|
}
|
|
#endif
|
|
|
|
void bench_scalar_inverse(void* arg) {
|
|
int i;
|
|
bench_inv_t *data = (bench_inv_t*)arg;
|
|
|
|
for (i = 0; i < 2000; i++) {
|
|
secp256k1_scalar_inverse(&data->scalar_x, &data->scalar_x);
|
|
secp256k1_scalar_add(&data->scalar_x, &data->scalar_x, &data->scalar_y);
|
|
}
|
|
}
|
|
|
|
void bench_scalar_inverse_var(void* arg) {
|
|
int i;
|
|
bench_inv_t *data = (bench_inv_t*)arg;
|
|
|
|
for (i = 0; i < 2000; i++) {
|
|
secp256k1_scalar_inverse_var(&data->scalar_x, &data->scalar_x);
|
|
secp256k1_scalar_add(&data->scalar_x, &data->scalar_x, &data->scalar_y);
|
|
}
|
|
}
|
|
|
|
void bench_field_normalize(void* arg) {
|
|
int i;
|
|
bench_inv_t *data = (bench_inv_t*)arg;
|
|
|
|
for (i = 0; i < 2000000; i++) {
|
|
secp256k1_fe_normalize(&data->fe_x);
|
|
}
|
|
}
|
|
|
|
void bench_field_normalize_weak(void* arg) {
|
|
int i;
|
|
bench_inv_t *data = (bench_inv_t*)arg;
|
|
|
|
for (i = 0; i < 2000000; i++) {
|
|
secp256k1_fe_normalize_weak(&data->fe_x);
|
|
}
|
|
}
|
|
|
|
void bench_field_mul(void* arg) {
|
|
int i;
|
|
bench_inv_t *data = (bench_inv_t*)arg;
|
|
|
|
for (i = 0; i < 200000; i++) {
|
|
secp256k1_fe_mul(&data->fe_x, &data->fe_x, &data->fe_y);
|
|
}
|
|
}
|
|
|
|
void bench_field_sqr(void* arg) {
|
|
int i;
|
|
bench_inv_t *data = (bench_inv_t*)arg;
|
|
|
|
for (i = 0; i < 200000; i++) {
|
|
secp256k1_fe_sqr(&data->fe_x, &data->fe_x);
|
|
}
|
|
}
|
|
|
|
void bench_field_inverse(void* arg) {
|
|
int i;
|
|
bench_inv_t *data = (bench_inv_t*)arg;
|
|
|
|
for (i = 0; i < 20000; i++) {
|
|
secp256k1_fe_inv(&data->fe_x, &data->fe_x);
|
|
secp256k1_fe_add(&data->fe_x, &data->fe_y);
|
|
}
|
|
}
|
|
|
|
void bench_field_inverse_var(void* arg) {
|
|
int i;
|
|
bench_inv_t *data = (bench_inv_t*)arg;
|
|
|
|
for (i = 0; i < 20000; i++) {
|
|
secp256k1_fe_inv_var(&data->fe_x, &data->fe_x);
|
|
secp256k1_fe_add(&data->fe_x, &data->fe_y);
|
|
}
|
|
}
|
|
|
|
void bench_field_sqrt(void* arg) {
|
|
int i;
|
|
bench_inv_t *data = (bench_inv_t*)arg;
|
|
|
|
for (i = 0; i < 20000; i++) {
|
|
secp256k1_fe_sqrt(&data->fe_x, &data->fe_x);
|
|
secp256k1_fe_add(&data->fe_x, &data->fe_y);
|
|
}
|
|
}
|
|
|
|
void bench_group_double_var(void* arg) {
|
|
int i;
|
|
bench_inv_t *data = (bench_inv_t*)arg;
|
|
|
|
for (i = 0; i < 200000; i++) {
|
|
secp256k1_gej_double_var(&data->gej_x, &data->gej_x, NULL);
|
|
}
|
|
}
|
|
|
|
void bench_group_add_var(void* arg) {
|
|
int i;
|
|
bench_inv_t *data = (bench_inv_t*)arg;
|
|
|
|
for (i = 0; i < 200000; i++) {
|
|
secp256k1_gej_add_var(&data->gej_x, &data->gej_x, &data->gej_y, NULL);
|
|
}
|
|
}
|
|
|
|
void bench_group_add_affine(void* arg) {
|
|
int i;
|
|
bench_inv_t *data = (bench_inv_t*)arg;
|
|
|
|
for (i = 0; i < 200000; i++) {
|
|
secp256k1_gej_add_ge(&data->gej_x, &data->gej_x, &data->ge_y);
|
|
}
|
|
}
|
|
|
|
void bench_group_add_affine_var(void* arg) {
|
|
int i;
|
|
bench_inv_t *data = (bench_inv_t*)arg;
|
|
|
|
for (i = 0; i < 200000; i++) {
|
|
secp256k1_gej_add_ge_var(&data->gej_x, &data->gej_x, &data->ge_y, NULL);
|
|
}
|
|
}
|
|
|
|
void bench_group_jacobi_var(void* arg) {
|
|
int i;
|
|
bench_inv_t *data = (bench_inv_t*)arg;
|
|
|
|
for (i = 0; i < 20000; i++) {
|
|
secp256k1_gej_has_quad_y_var(&data->gej_x);
|
|
}
|
|
}
|
|
|
|
void bench_ecmult_wnaf(void* arg) {
|
|
int i;
|
|
bench_inv_t *data = (bench_inv_t*)arg;
|
|
|
|
for (i = 0; i < 20000; i++) {
|
|
secp256k1_ecmult_wnaf(data->wnaf, 256, &data->scalar_x, WINDOW_A);
|
|
secp256k1_scalar_add(&data->scalar_x, &data->scalar_x, &data->scalar_y);
|
|
}
|
|
}
|
|
|
|
void bench_wnaf_const(void* arg) {
|
|
int i;
|
|
bench_inv_t *data = (bench_inv_t*)arg;
|
|
|
|
for (i = 0; i < 20000; i++) {
|
|
secp256k1_wnaf_const(data->wnaf, data->scalar_x, WINDOW_A);
|
|
secp256k1_scalar_add(&data->scalar_x, &data->scalar_x, &data->scalar_y);
|
|
}
|
|
}
|
|
|
|
|
|
void bench_sha256(void* arg) {
|
|
int i;
|
|
bench_inv_t *data = (bench_inv_t*)arg;
|
|
secp256k1_sha256_t sha;
|
|
|
|
for (i = 0; i < 20000; i++) {
|
|
secp256k1_sha256_initialize(&sha);
|
|
secp256k1_sha256_write(&sha, data->data, 32);
|
|
secp256k1_sha256_finalize(&sha, data->data);
|
|
}
|
|
}
|
|
|
|
void bench_hmac_sha256(void* arg) {
|
|
int i;
|
|
bench_inv_t *data = (bench_inv_t*)arg;
|
|
secp256k1_hmac_sha256_t hmac;
|
|
|
|
for (i = 0; i < 20000; i++) {
|
|
secp256k1_hmac_sha256_initialize(&hmac, data->data, 32);
|
|
secp256k1_hmac_sha256_write(&hmac, data->data, 32);
|
|
secp256k1_hmac_sha256_finalize(&hmac, data->data);
|
|
}
|
|
}
|
|
|
|
void bench_rfc6979_hmac_sha256(void* arg) {
|
|
int i;
|
|
bench_inv_t *data = (bench_inv_t*)arg;
|
|
secp256k1_rfc6979_hmac_sha256_t rng;
|
|
|
|
for (i = 0; i < 20000; i++) {
|
|
secp256k1_rfc6979_hmac_sha256_initialize(&rng, data->data, 64);
|
|
secp256k1_rfc6979_hmac_sha256_generate(&rng, data->data, 32);
|
|
}
|
|
}
|
|
|
|
void bench_context_verify(void* arg) {
|
|
int i;
|
|
(void)arg;
|
|
for (i = 0; i < 20; i++) {
|
|
secp256k1_context_destroy(secp256k1_context_create(SECP256K1_CONTEXT_VERIFY));
|
|
}
|
|
}
|
|
|
|
void bench_context_sign(void* arg) {
|
|
int i;
|
|
(void)arg;
|
|
for (i = 0; i < 200; i++) {
|
|
secp256k1_context_destroy(secp256k1_context_create(SECP256K1_CONTEXT_SIGN));
|
|
}
|
|
}
|
|
|
|
#ifndef USE_NUM_NONE
|
|
void bench_num_jacobi(void* arg) {
|
|
int i;
|
|
bench_inv_t *data = (bench_inv_t*)arg;
|
|
secp256k1_num nx, norder;
|
|
|
|
secp256k1_scalar_get_num(&nx, &data->scalar_x);
|
|
secp256k1_scalar_order_get_num(&norder);
|
|
secp256k1_scalar_get_num(&norder, &data->scalar_y);
|
|
|
|
for (i = 0; i < 200000; i++) {
|
|
secp256k1_num_jacobi(&nx, &norder);
|
|
}
|
|
}
|
|
#endif
|
|
|
|
int have_flag(int argc, char** argv, char *flag) {
|
|
char** argm = argv + argc;
|
|
argv++;
|
|
if (argv == argm) {
|
|
return 1;
|
|
}
|
|
while (argv != NULL && argv != argm) {
|
|
if (strcmp(*argv, flag) == 0) {
|
|
return 1;
|
|
}
|
|
argv++;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
int main(int argc, char **argv) {
|
|
bench_inv_t data;
|
|
if (have_flag(argc, argv, "scalar") || have_flag(argc, argv, "add")) run_benchmark("scalar_add", bench_scalar_add, bench_setup, NULL, &data, 10, 2000000);
|
|
if (have_flag(argc, argv, "scalar") || have_flag(argc, argv, "negate")) run_benchmark("scalar_negate", bench_scalar_negate, bench_setup, NULL, &data, 10, 2000000);
|
|
if (have_flag(argc, argv, "scalar") || have_flag(argc, argv, "sqr")) run_benchmark("scalar_sqr", bench_scalar_sqr, bench_setup, NULL, &data, 10, 200000);
|
|
if (have_flag(argc, argv, "scalar") || have_flag(argc, argv, "mul")) run_benchmark("scalar_mul", bench_scalar_mul, bench_setup, NULL, &data, 10, 200000);
|
|
#ifdef USE_ENDOMORPHISM
|
|
if (have_flag(argc, argv, "scalar") || have_flag(argc, argv, "split")) run_benchmark("scalar_split", bench_scalar_split, bench_setup, NULL, &data, 10, 20000);
|
|
#endif
|
|
if (have_flag(argc, argv, "scalar") || have_flag(argc, argv, "inverse")) run_benchmark("scalar_inverse", bench_scalar_inverse, bench_setup, NULL, &data, 10, 2000);
|
|
if (have_flag(argc, argv, "scalar") || have_flag(argc, argv, "inverse")) run_benchmark("scalar_inverse_var", bench_scalar_inverse_var, bench_setup, NULL, &data, 10, 2000);
|
|
|
|
if (have_flag(argc, argv, "field") || have_flag(argc, argv, "normalize")) run_benchmark("field_normalize", bench_field_normalize, bench_setup, NULL, &data, 10, 2000000);
|
|
if (have_flag(argc, argv, "field") || have_flag(argc, argv, "normalize")) run_benchmark("field_normalize_weak", bench_field_normalize_weak, bench_setup, NULL, &data, 10, 2000000);
|
|
if (have_flag(argc, argv, "field") || have_flag(argc, argv, "sqr")) run_benchmark("field_sqr", bench_field_sqr, bench_setup, NULL, &data, 10, 200000);
|
|
if (have_flag(argc, argv, "field") || have_flag(argc, argv, "mul")) run_benchmark("field_mul", bench_field_mul, bench_setup, NULL, &data, 10, 200000);
|
|
if (have_flag(argc, argv, "field") || have_flag(argc, argv, "inverse")) run_benchmark("field_inverse", bench_field_inverse, bench_setup, NULL, &data, 10, 20000);
|
|
if (have_flag(argc, argv, "field") || have_flag(argc, argv, "inverse")) run_benchmark("field_inverse_var", bench_field_inverse_var, bench_setup, NULL, &data, 10, 20000);
|
|
if (have_flag(argc, argv, "field") || have_flag(argc, argv, "sqrt")) run_benchmark("field_sqrt", bench_field_sqrt, bench_setup, NULL, &data, 10, 20000);
|
|
|
|
if (have_flag(argc, argv, "group") || have_flag(argc, argv, "double")) run_benchmark("group_double_var", bench_group_double_var, bench_setup, NULL, &data, 10, 200000);
|
|
if (have_flag(argc, argv, "group") || have_flag(argc, argv, "add")) run_benchmark("group_add_var", bench_group_add_var, bench_setup, NULL, &data, 10, 200000);
|
|
if (have_flag(argc, argv, "group") || have_flag(argc, argv, "add")) run_benchmark("group_add_affine", bench_group_add_affine, bench_setup, NULL, &data, 10, 200000);
|
|
if (have_flag(argc, argv, "group") || have_flag(argc, argv, "add")) run_benchmark("group_add_affine_var", bench_group_add_affine_var, bench_setup, NULL, &data, 10, 200000);
|
|
if (have_flag(argc, argv, "group") || have_flag(argc, argv, "jacobi")) run_benchmark("group_jacobi_var", bench_group_jacobi_var, bench_setup, NULL, &data, 10, 20000);
|
|
|
|
if (have_flag(argc, argv, "ecmult") || have_flag(argc, argv, "wnaf")) run_benchmark("wnaf_const", bench_wnaf_const, bench_setup, NULL, &data, 10, 20000);
|
|
if (have_flag(argc, argv, "ecmult") || have_flag(argc, argv, "wnaf")) run_benchmark("ecmult_wnaf", bench_ecmult_wnaf, bench_setup, NULL, &data, 10, 20000);
|
|
|
|
if (have_flag(argc, argv, "hash") || have_flag(argc, argv, "sha256")) run_benchmark("hash_sha256", bench_sha256, bench_setup, NULL, &data, 10, 20000);
|
|
if (have_flag(argc, argv, "hash") || have_flag(argc, argv, "hmac")) run_benchmark("hash_hmac_sha256", bench_hmac_sha256, bench_setup, NULL, &data, 10, 20000);
|
|
if (have_flag(argc, argv, "hash") || have_flag(argc, argv, "rng6979")) run_benchmark("hash_rfc6979_hmac_sha256", bench_rfc6979_hmac_sha256, bench_setup, NULL, &data, 10, 20000);
|
|
|
|
if (have_flag(argc, argv, "context") || have_flag(argc, argv, "verify")) run_benchmark("context_verify", bench_context_verify, bench_setup, NULL, &data, 10, 20);
|
|
if (have_flag(argc, argv, "context") || have_flag(argc, argv, "sign")) run_benchmark("context_sign", bench_context_sign, bench_setup, NULL, &data, 10, 200);
|
|
|
|
#ifndef USE_NUM_NONE
|
|
if (have_flag(argc, argv, "num") || have_flag(argc, argv, "jacobi")) run_benchmark("num_jacobi", bench_num_jacobi, bench_setup, NULL, &data, 10, 200000);
|
|
#endif
|
|
return 0;
|
|
}
|