Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(47)

Side by Side Diff: src/platform/vboot_reference/tests/kernel_verify_benchmark.c

Issue 1079009: Vboot Reference: Add kernel image verification benchmark. (Closed)
Patch Set: Review fixes. Created 10 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
(Empty)
1 /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
2 * Use of this source code is governed by a BSD-style license that can be
3 * found in the LICENSE file.
4 *
5 * Timing benchmark for verifying a firmware image.
6 */
7
8 #include <stdio.h>
9 #include <stdlib.h>
10
11 #include "file_keys.h"
12 #include "kernel_image.h"
13 #include "padding.h"
14 #include "rsa_utility.h"
15 #include "timer_utils.h"
16 #include "utility.h"
17
18 #define FILE_NAME_SIZE 128
19
20 #define NUM_OPERATIONS 30 /* Number of verify operations to time.
21 * We use a smaller number here (30 vs. 100)
22 * since there are many more cases to consider
23 * (one for each combination of firmware and kernel
24 * signature algorithm.
25 */
26
27 #define KERNEL_SIZE_SMALL 512000
28 #define KERNEL_SIZE_MEDIUM 1024000
29 #define KERNEL_SIZE_LARGE 4096000
30 const uint64_t g_kernel_sizes_to_test[] = {
31 KERNEL_SIZE_SMALL,
32 KERNEL_SIZE_MEDIUM,
33 KERNEL_SIZE_LARGE
34 };
35 const char* g_kernel_size_labels[] = {
36 "small",
37 "medium",
38 "large"
39 };
40 #define NUM_SIZES_TO_TEST (sizeof(g_kernel_sizes_to_test) / \
41 sizeof(g_kernel_sizes_to_test[0]))
42
43 uint8_t* GenerateTestKernelBlob(int firmware_sign_algorithm,
44 int kernel_sign_algorithm,
45 int kernel_len,
46 const uint8_t* kernel_sign_key,
47 const char* firmware_key_file,
48 const char* kernel_key_file) {
49 KernelImage* image = KernelImageNew();
50 uint8_t* kernel_blob = NULL;
51 uint64_t kernel_blob_len = 0;
52
53 Memcpy(image->magic, KERNEL_MAGIC, KERNEL_MAGIC_SIZE);
54 image->header_version = 1;
55 image->firmware_sign_algorithm = firmware_sign_algorithm;
56 image->kernel_sign_algorithm = kernel_sign_algorithm;
57 image->kernel_key_version = 1;
58 image->kernel_sign_key = (uint8_t*) Malloc(
59 RSAProcessedKeySize(image->kernel_sign_algorithm));
60 Memcpy(image->kernel_sign_key, kernel_sign_key,
61 RSAProcessedKeySize(image->kernel_sign_algorithm));
62
63 /* Update correct header length. */
64 image->header_len = GetKernelHeaderLen(image);
65
66 /* Calculate SHA-512 digest on header and populate header_checksum. */
67 CalculateKernelHeaderChecksum(image, image->header_checksum);
68
69 /* Populate kernel options and data with dummy data. */
70 image->kernel_version = 1;
71 image->options.version[0] = 1;
72 image->options.version[1] = 0;
73 Memset(image->options.cmd_line, 0, sizeof(image->options.cmd_line));
74 image->options.kernel_len = kernel_len;
75 image->options.kernel_load_addr = 0;
76 image->options.kernel_entry_addr = 0;
77 image->kernel_key_signature = image->kernel_signature = NULL;
78 image->kernel_data = Malloc(kernel_len);
79 /* TODO(gauravsh): Populate this with random data, to remove data-dependent
80 * timing artificats. */
81 Memset(image->kernel_data, 'K', kernel_len);
82
83 if (!AddKernelKeySignature(image, firmware_key_file)) {
84 fprintf(stderr, "Couldn't create key signature.\n");
85 KernelImageFree(image);
86 return NULL;
87 }
88
89 if (!AddKernelSignature(image, kernel_key_file)) {
90 fprintf(stderr, "Couldn't create kernel option and kernel signature.\n");
91 KernelImageFree(image);
92 return NULL;
93 }
94
95 kernel_blob = GetKernelBlob(image, &kernel_blob_len);
96 KernelImageFree(image);
97 return kernel_blob;
98 }
99
100 int SpeedTestAlgorithm(int firmware_sign_algorithm,
101 int kernel_sign_algorithm) {
102 int i, j, error_code = 0;
103 int firmware_key_size, kernel_key_size;
104 ClockTimerState ct;
105 double msecs;
106 uint64_t len;
107 uint8_t* kernel_sign_key = NULL;
108 uint8_t* firmware_key_blob = NULL;
109 char firmware_sign_key_file[FILE_NAME_SIZE];
110 char kernel_sign_key_file[FILE_NAME_SIZE];
111 char file_name[FILE_NAME_SIZE]; /* Temp to hold a constructed file name */
112 char* sha_strings[] = { /* Maps algorithm->SHA algorithm. */
113 "sha1", "sha256", "sha512", /* RSA-1024 */
114 "sha1", "sha256", "sha512", /* RSA-2048 */
115 "sha1", "sha256", "sha512", /* RSA-4096 */
116 "sha1", "sha256", "sha512", /* RSA-8192 */
117 };
118 uint8_t* kernel_blobs[NUM_SIZES_TO_TEST];
119 for (i = 0; i < NUM_SIZES_TO_TEST; ++i)
120 kernel_blobs[i] = NULL;
121
122 /* Get all needed test keys. */
123 firmware_key_size = siglen_map[firmware_sign_algorithm] * 8; /* in bits. */
124 kernel_key_size = siglen_map[kernel_sign_algorithm] * 8; /* in bits. */
125 snprintf(firmware_sign_key_file, FILE_NAME_SIZE, "testkeys/key_rsa%d.pem",
126 firmware_key_size);
127 snprintf(kernel_sign_key_file, FILE_NAME_SIZE, "testkeys/key_rsa%d.pem",
128 kernel_key_size);
129 snprintf(file_name, FILE_NAME_SIZE, "testkeys/key_rsa%d.keyb",
130 kernel_key_size);
131 kernel_sign_key = BufferFromFile(file_name, &len);
132 if (!kernel_sign_key) {
133 fprintf(stderr, "Couldn't read pre-processed public kernel signing key.\n");
134 error_code = 1;
135 goto cleanup;
136 }
137
138 /* Generate test images. */
139 for (i = 0; i < NUM_SIZES_TO_TEST; ++i) {
140 kernel_blobs[i] = GenerateTestKernelBlob(firmware_sign_algorithm,
141 kernel_sign_algorithm,
142 g_kernel_sizes_to_test[i],
143 kernel_sign_key,
144 firmware_sign_key_file,
145 kernel_sign_key_file);
146 if (!kernel_blobs[i]) {
147 fprintf(stderr, "Couldn't generate test firmware images.\n");
148 error_code = 1;
149 goto cleanup;
150 }
151 }
152
153 /* Get pre-processed key used for verification. */
154 snprintf(file_name, FILE_NAME_SIZE, "testkeys/key_rsa%d.keyb",
155 firmware_key_size);
156 firmware_key_blob = BufferFromFile(file_name, &len);
157 if (!firmware_key_blob) {
158 fprintf(stderr, "Couldn't read pre-processed firmware public key.\n");
159 error_code = 1;
160 goto cleanup;
161 }
162
163 /* Now run the timing tests. */
164 for (i = 0; i < NUM_SIZES_TO_TEST; ++i) {
165 StartTimer(&ct);
166 for (j = 0; j < NUM_OPERATIONS; ++j) {
167 if (VERIFY_KERNEL_SUCCESS !=
168 VerifyKernel(firmware_key_blob, kernel_blobs[i], 0))
169 fprintf(stderr, "Warning: Kernel Verification Failed.\n");
170 }
171 StopTimer(&ct);
172 msecs = (float) GetDurationMsecs(&ct) / NUM_OPERATIONS;
173 fprintf(stderr,
174 "# Kernel (%s, Algo = %s / %s):"
175 "\t%.02f ms/verification\n",
176 g_kernel_size_labels[i],
177 algo_strings[firmware_sign_algorithm],
178 algo_strings[kernel_sign_algorithm],
179 msecs);
180 fprintf(stdout, "ms_firmware_%s_rsa%d_%s_rsa%d_%s:%.02f\n",
181 g_kernel_size_labels[i],
182 firmware_key_size,
183 sha_strings[firmware_sign_algorithm],
184 kernel_key_size,
185 sha_strings[kernel_sign_algorithm],
186 msecs);
187 }
188
189 cleanup:
190 for (i = 0; i < NUM_SIZES_TO_TEST; ++i)
191 Free(kernel_blobs[i]);
192 Free(firmware_key_blob);
193 Free(kernel_sign_key);
194 return error_code;
195 }
196
197
198 int main(int argc, char* argv[]) {
199 int i, j, error_code = 0;
200 for (i = 0; i < kNumAlgorithms; ++i) { /* Firmware Signing Algorithm. */
201 for (j = 0; j < kNumAlgorithms; ++j) { /* Kernel Signing Algorithm. */
202 /* Only measure if the kernel signing algorithm is weaker or equal to
203 * the firmware signing algorithm. */
204 if (siglen_map[j] > siglen_map[i])
205 continue;
206 if (siglen_map[j] == siglen_map[i] && hash_size_map[j] > hash_size_map[i])
207 continue;
208 if (0 != (error_code = SpeedTestAlgorithm(i, j)))
209 return error_code;
210 }
211 }
212 return 0;
213 }
OLDNEW
« no previous file with comments | « src/platform/vboot_reference/tests/kernel_image_tests.c ('k') | src/platform/vboot_reference/utils/kernel_image.c » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698