OLD | NEW |
(Empty) | |
| 1 /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. |
| 2 * Use of this source code is governed by a BSD-style license that can be |
| 3 * found in the LICENSE file. |
| 4 * |
| 5 * Timing benchmark for verifying a firmware image. |
| 6 */ |
| 7 |
| 8 #include <stdio.h> |
| 9 #include <stdlib.h> |
| 10 |
| 11 #include "file_keys.h" |
| 12 #include "kernel_image.h" |
| 13 #include "padding.h" |
| 14 #include "rsa_utility.h" |
| 15 #include "timer_utils.h" |
| 16 #include "utility.h" |
| 17 |
| 18 #define FILE_NAME_SIZE 128 |
| 19 |
| 20 #define NUM_OPERATIONS 30 /* Number of verify operations to time. |
| 21 * We use a smaller number here (30 vs. 100) |
| 22 * since there are many more cases to consider |
| 23 * (one for each combination of firmware and kernel |
| 24 * signature algorithm. |
| 25 */ |
| 26 |
| 27 #define KERNEL_SIZE_SMALL 512000 |
| 28 #define KERNEL_SIZE_MEDIUM 1024000 |
| 29 #define KERNEL_SIZE_LARGE 4096000 |
| 30 const uint64_t g_kernel_sizes_to_test[] = { |
| 31 KERNEL_SIZE_SMALL, |
| 32 KERNEL_SIZE_MEDIUM, |
| 33 KERNEL_SIZE_LARGE |
| 34 }; |
| 35 const char* g_kernel_size_labels[] = { |
| 36 "small", |
| 37 "medium", |
| 38 "large" |
| 39 }; |
| 40 #define NUM_SIZES_TO_TEST (sizeof(g_kernel_sizes_to_test) / \ |
| 41 sizeof(g_kernel_sizes_to_test[0])) |
| 42 |
| 43 uint8_t* GenerateTestKernelBlob(int firmware_sign_algorithm, |
| 44 int kernel_sign_algorithm, |
| 45 int kernel_len, |
| 46 const uint8_t* kernel_sign_key, |
| 47 const char* firmware_key_file, |
| 48 const char* kernel_key_file) { |
| 49 KernelImage* image = KernelImageNew(); |
| 50 uint8_t* kernel_blob = NULL; |
| 51 uint64_t kernel_blob_len = 0; |
| 52 |
| 53 Memcpy(image->magic, KERNEL_MAGIC, KERNEL_MAGIC_SIZE); |
| 54 image->header_version = 1; |
| 55 image->firmware_sign_algorithm = firmware_sign_algorithm; |
| 56 image->kernel_sign_algorithm = kernel_sign_algorithm; |
| 57 image->kernel_key_version = 1; |
| 58 image->kernel_sign_key = (uint8_t*) Malloc( |
| 59 RSAProcessedKeySize(image->kernel_sign_algorithm)); |
| 60 Memcpy(image->kernel_sign_key, kernel_sign_key, |
| 61 RSAProcessedKeySize(image->kernel_sign_algorithm)); |
| 62 |
| 63 /* Update correct header length. */ |
| 64 image->header_len = GetKernelHeaderLen(image); |
| 65 |
| 66 /* Calculate SHA-512 digest on header and populate header_checksum. */ |
| 67 CalculateKernelHeaderChecksum(image, image->header_checksum); |
| 68 |
| 69 /* Populate kernel options and data with dummy data. */ |
| 70 image->kernel_version = 1; |
| 71 image->options.version[0] = 1; |
| 72 image->options.version[1] = 0; |
| 73 Memset(image->options.cmd_line, 0, sizeof(image->options.cmd_line)); |
| 74 image->options.kernel_len = kernel_len; |
| 75 image->options.kernel_load_addr = 0; |
| 76 image->options.kernel_entry_addr = 0; |
| 77 image->kernel_key_signature = image->kernel_signature = NULL; |
| 78 image->kernel_data = Malloc(kernel_len); |
| 79 /* TODO(gauravsh): Populate this with random data, to remove data-dependent |
| 80 * timing artificats. */ |
| 81 Memset(image->kernel_data, 'K', kernel_len); |
| 82 |
| 83 if (!AddKernelKeySignature(image, firmware_key_file)) { |
| 84 fprintf(stderr, "Couldn't create key signature.\n"); |
| 85 KernelImageFree(image); |
| 86 return NULL; |
| 87 } |
| 88 |
| 89 if (!AddKernelSignature(image, kernel_key_file)) { |
| 90 fprintf(stderr, "Couldn't create kernel option and kernel signature.\n"); |
| 91 KernelImageFree(image); |
| 92 return NULL; |
| 93 } |
| 94 |
| 95 kernel_blob = GetKernelBlob(image, &kernel_blob_len); |
| 96 KernelImageFree(image); |
| 97 return kernel_blob; |
| 98 } |
| 99 |
| 100 int SpeedTestAlgorithm(int firmware_sign_algorithm, |
| 101 int kernel_sign_algorithm) { |
| 102 int i, j, error_code = 0; |
| 103 int firmware_key_size, kernel_key_size; |
| 104 ClockTimerState ct; |
| 105 double msecs; |
| 106 uint64_t len; |
| 107 uint8_t* kernel_sign_key = NULL; |
| 108 uint8_t* firmware_key_blob = NULL; |
| 109 char firmware_sign_key_file[FILE_NAME_SIZE]; |
| 110 char kernel_sign_key_file[FILE_NAME_SIZE]; |
| 111 char file_name[FILE_NAME_SIZE]; /* Temp to hold a constructed file name */ |
| 112 char* sha_strings[] = { /* Maps algorithm->SHA algorithm. */ |
| 113 "sha1", "sha256", "sha512", /* RSA-1024 */ |
| 114 "sha1", "sha256", "sha512", /* RSA-2048 */ |
| 115 "sha1", "sha256", "sha512", /* RSA-4096 */ |
| 116 "sha1", "sha256", "sha512", /* RSA-8192 */ |
| 117 }; |
| 118 uint8_t* kernel_blobs[NUM_SIZES_TO_TEST]; |
| 119 for (i = 0; i < NUM_SIZES_TO_TEST; ++i) |
| 120 kernel_blobs[i] = NULL; |
| 121 |
| 122 /* Get all needed test keys. */ |
| 123 firmware_key_size = siglen_map[firmware_sign_algorithm] * 8; /* in bits. */ |
| 124 kernel_key_size = siglen_map[kernel_sign_algorithm] * 8; /* in bits. */ |
| 125 snprintf(firmware_sign_key_file, FILE_NAME_SIZE, "testkeys/key_rsa%d.pem", |
| 126 firmware_key_size); |
| 127 snprintf(kernel_sign_key_file, FILE_NAME_SIZE, "testkeys/key_rsa%d.pem", |
| 128 kernel_key_size); |
| 129 snprintf(file_name, FILE_NAME_SIZE, "testkeys/key_rsa%d.keyb", |
| 130 kernel_key_size); |
| 131 kernel_sign_key = BufferFromFile(file_name, &len); |
| 132 if (!kernel_sign_key) { |
| 133 fprintf(stderr, "Couldn't read pre-processed public kernel signing key.\n"); |
| 134 error_code = 1; |
| 135 goto cleanup; |
| 136 } |
| 137 |
| 138 /* Generate test images. */ |
| 139 for (i = 0; i < NUM_SIZES_TO_TEST; ++i) { |
| 140 kernel_blobs[i] = GenerateTestKernelBlob(firmware_sign_algorithm, |
| 141 kernel_sign_algorithm, |
| 142 g_kernel_sizes_to_test[i], |
| 143 kernel_sign_key, |
| 144 firmware_sign_key_file, |
| 145 kernel_sign_key_file); |
| 146 if (!kernel_blobs[i]) { |
| 147 fprintf(stderr, "Couldn't generate test firmware images.\n"); |
| 148 error_code = 1; |
| 149 goto cleanup; |
| 150 } |
| 151 } |
| 152 |
| 153 /* Get pre-processed key used for verification. */ |
| 154 snprintf(file_name, FILE_NAME_SIZE, "testkeys/key_rsa%d.keyb", |
| 155 firmware_key_size); |
| 156 firmware_key_blob = BufferFromFile(file_name, &len); |
| 157 if (!firmware_key_blob) { |
| 158 fprintf(stderr, "Couldn't read pre-processed firmware public key.\n"); |
| 159 error_code = 1; |
| 160 goto cleanup; |
| 161 } |
| 162 |
| 163 /* Now run the timing tests. */ |
| 164 for (i = 0; i < NUM_SIZES_TO_TEST; ++i) { |
| 165 StartTimer(&ct); |
| 166 for (j = 0; j < NUM_OPERATIONS; ++j) { |
| 167 if (VERIFY_KERNEL_SUCCESS != |
| 168 VerifyKernel(firmware_key_blob, kernel_blobs[i], 0)) |
| 169 fprintf(stderr, "Warning: Kernel Verification Failed.\n"); |
| 170 } |
| 171 StopTimer(&ct); |
| 172 msecs = (float) GetDurationMsecs(&ct) / NUM_OPERATIONS; |
| 173 fprintf(stderr, |
| 174 "# Kernel (%s, Algo = %s / %s):" |
| 175 "\t%.02f ms/verification\n", |
| 176 g_kernel_size_labels[i], |
| 177 algo_strings[firmware_sign_algorithm], |
| 178 algo_strings[kernel_sign_algorithm], |
| 179 msecs); |
| 180 fprintf(stdout, "ms_firmware_%s_rsa%d_%s_rsa%d_%s:%.02f\n", |
| 181 g_kernel_size_labels[i], |
| 182 firmware_key_size, |
| 183 sha_strings[firmware_sign_algorithm], |
| 184 kernel_key_size, |
| 185 sha_strings[kernel_sign_algorithm], |
| 186 msecs); |
| 187 } |
| 188 |
| 189 cleanup: |
| 190 for (i = 0; i < NUM_SIZES_TO_TEST; ++i) |
| 191 Free(kernel_blobs[i]); |
| 192 Free(firmware_key_blob); |
| 193 Free(kernel_sign_key); |
| 194 return error_code; |
| 195 } |
| 196 |
| 197 |
| 198 int main(int argc, char* argv[]) { |
| 199 int i, j, error_code = 0; |
| 200 for (i = 0; i < kNumAlgorithms; ++i) { /* Firmware Signing Algorithm. */ |
| 201 for (j = 0; j < kNumAlgorithms; ++j) { /* Kernel Signing Algorithm. */ |
| 202 /* Only measure if the kernel signing algorithm is weaker or equal to |
| 203 * the firmware signing algorithm. */ |
| 204 if (siglen_map[j] > siglen_map[i]) |
| 205 continue; |
| 206 if (siglen_map[j] == siglen_map[i] && hash_size_map[j] > hash_size_map[i]) |
| 207 continue; |
| 208 if (0 != (error_code = SpeedTestAlgorithm(i, j))) |
| 209 return error_code; |
| 210 } |
| 211 } |
| 212 return 0; |
| 213 } |
OLD | NEW |