Index: src/platform/vboot_reference/tests/kernel_verify_benchmark.c |
diff --git a/src/platform/vboot_reference/tests/kernel_verify_benchmark.c b/src/platform/vboot_reference/tests/kernel_verify_benchmark.c |
new file mode 100644 |
index 0000000000000000000000000000000000000000..16453f0ba3c41b712a4c67e56a6d57ea4fa6f688 |
--- /dev/null |
+++ b/src/platform/vboot_reference/tests/kernel_verify_benchmark.c |
@@ -0,0 +1,213 @@ |
+/* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. |
+ * Use of this source code is governed by a BSD-style license that can be |
+ * found in the LICENSE file. |
+ * |
+ * Timing benchmark for verifying a firmware image. |
+ */ |
+ |
+#include <stdio.h> |
+#include <stdlib.h> |
+ |
+#include "file_keys.h" |
+#include "kernel_image.h" |
+#include "padding.h" |
+#include "rsa_utility.h" |
+#include "timer_utils.h" |
+#include "utility.h" |
+ |
+#define FILE_NAME_SIZE 128 |
+ |
+#define NUM_OPERATIONS 30 /* Number of verify operations to time. |
+ * We use a smaller number here (30 vs. 100) |
+ * since there are many more cases to consider |
+ * (one for each combination of firmware and kernel |
+ * signature algorithm. |
+ */ |
+ |
+#define KERNEL_SIZE_SMALL 512000 |
+#define KERNEL_SIZE_MEDIUM 1024000 |
+#define KERNEL_SIZE_LARGE 4096000 |
+const uint64_t g_kernel_sizes_to_test[] = { |
+ KERNEL_SIZE_SMALL, |
+ KERNEL_SIZE_MEDIUM, |
+ KERNEL_SIZE_LARGE |
+}; |
+const char* g_kernel_size_labels[] = { |
+ "small", |
+ "medium", |
+ "large" |
+}; |
+#define NUM_SIZES_TO_TEST (sizeof(g_kernel_sizes_to_test) / \ |
+ sizeof(g_kernel_sizes_to_test[0])) |
+ |
+uint8_t* GenerateTestKernelBlob(int firmware_sign_algorithm, |
+ int kernel_sign_algorithm, |
+ int kernel_len, |
+ const uint8_t* kernel_sign_key, |
+ const char* firmware_key_file, |
+ const char* kernel_key_file) { |
+ KernelImage* image = KernelImageNew(); |
+ uint8_t* kernel_blob = NULL; |
+ uint64_t kernel_blob_len = 0; |
+ |
+ Memcpy(image->magic, KERNEL_MAGIC, KERNEL_MAGIC_SIZE); |
+ image->header_version = 1; |
+ image->firmware_sign_algorithm = firmware_sign_algorithm; |
+ image->kernel_sign_algorithm = kernel_sign_algorithm; |
+ image->kernel_key_version = 1; |
+ image->kernel_sign_key = (uint8_t*) Malloc( |
+ RSAProcessedKeySize(image->kernel_sign_algorithm)); |
+ Memcpy(image->kernel_sign_key, kernel_sign_key, |
+ RSAProcessedKeySize(image->kernel_sign_algorithm)); |
+ |
+ /* Update correct header length. */ |
+ image->header_len = GetKernelHeaderLen(image); |
+ |
+ /* Calculate SHA-512 digest on header and populate header_checksum. */ |
+ CalculateKernelHeaderChecksum(image, image->header_checksum); |
+ |
+ /* Populate kernel options and data with dummy data. */ |
+ image->kernel_version = 1; |
+ image->options.version[0] = 1; |
+ image->options.version[1] = 0; |
+ Memset(image->options.cmd_line, 0, sizeof(image->options.cmd_line)); |
+ image->options.kernel_len = kernel_len; |
+ image->options.kernel_load_addr = 0; |
+ image->options.kernel_entry_addr = 0; |
+ image->kernel_key_signature = image->kernel_signature = NULL; |
+ image->kernel_data = Malloc(kernel_len); |
+ /* TODO(gauravsh): Populate this with random data, to remove data-dependent |
+ * timing artificats. */ |
+ Memset(image->kernel_data, 'K', kernel_len); |
+ |
+ if (!AddKernelKeySignature(image, firmware_key_file)) { |
+ fprintf(stderr, "Couldn't create key signature.\n"); |
+ KernelImageFree(image); |
+ return NULL; |
+ } |
+ |
+ if (!AddKernelSignature(image, kernel_key_file)) { |
+ fprintf(stderr, "Couldn't create kernel option and kernel signature.\n"); |
+ KernelImageFree(image); |
+ return NULL; |
+ } |
+ |
+ kernel_blob = GetKernelBlob(image, &kernel_blob_len); |
+ KernelImageFree(image); |
+ return kernel_blob; |
+} |
+ |
+int SpeedTestAlgorithm(int firmware_sign_algorithm, |
+ int kernel_sign_algorithm) { |
+ int i, j, error_code = 0; |
+ int firmware_key_size, kernel_key_size; |
+ ClockTimerState ct; |
+ double msecs; |
+ uint64_t len; |
+ uint8_t* kernel_sign_key = NULL; |
+ uint8_t* firmware_key_blob = NULL; |
+ char firmware_sign_key_file[FILE_NAME_SIZE]; |
+ char kernel_sign_key_file[FILE_NAME_SIZE]; |
+ char file_name[FILE_NAME_SIZE]; /* Temp to hold a constructed file name */ |
+ char* sha_strings[] = { /* Maps algorithm->SHA algorithm. */ |
+ "sha1", "sha256", "sha512", /* RSA-1024 */ |
+ "sha1", "sha256", "sha512", /* RSA-2048 */ |
+ "sha1", "sha256", "sha512", /* RSA-4096 */ |
+ "sha1", "sha256", "sha512", /* RSA-8192 */ |
+ }; |
+ uint8_t* kernel_blobs[NUM_SIZES_TO_TEST]; |
+ for (i = 0; i < NUM_SIZES_TO_TEST; ++i) |
+ kernel_blobs[i] = NULL; |
+ |
+ /* Get all needed test keys. */ |
+ firmware_key_size = siglen_map[firmware_sign_algorithm] * 8; /* in bits. */ |
+ kernel_key_size = siglen_map[kernel_sign_algorithm] * 8; /* in bits. */ |
+ snprintf(firmware_sign_key_file, FILE_NAME_SIZE, "testkeys/key_rsa%d.pem", |
+ firmware_key_size); |
+ snprintf(kernel_sign_key_file, FILE_NAME_SIZE, "testkeys/key_rsa%d.pem", |
+ kernel_key_size); |
+ snprintf(file_name, FILE_NAME_SIZE, "testkeys/key_rsa%d.keyb", |
+ kernel_key_size); |
+ kernel_sign_key = BufferFromFile(file_name, &len); |
+ if (!kernel_sign_key) { |
+ fprintf(stderr, "Couldn't read pre-processed public kernel signing key.\n"); |
+ error_code = 1; |
+ goto cleanup; |
+ } |
+ |
+ /* Generate test images. */ |
+ for (i = 0; i < NUM_SIZES_TO_TEST; ++i) { |
+ kernel_blobs[i] = GenerateTestKernelBlob(firmware_sign_algorithm, |
+ kernel_sign_algorithm, |
+ g_kernel_sizes_to_test[i], |
+ kernel_sign_key, |
+ firmware_sign_key_file, |
+ kernel_sign_key_file); |
+ if (!kernel_blobs[i]) { |
+ fprintf(stderr, "Couldn't generate test firmware images.\n"); |
+ error_code = 1; |
+ goto cleanup; |
+ } |
+ } |
+ |
+ /* Get pre-processed key used for verification. */ |
+ snprintf(file_name, FILE_NAME_SIZE, "testkeys/key_rsa%d.keyb", |
+ firmware_key_size); |
+ firmware_key_blob = BufferFromFile(file_name, &len); |
+ if (!firmware_key_blob) { |
+ fprintf(stderr, "Couldn't read pre-processed firmware public key.\n"); |
+ error_code = 1; |
+ goto cleanup; |
+ } |
+ |
+ /* Now run the timing tests. */ |
+ for (i = 0; i < NUM_SIZES_TO_TEST; ++i) { |
+ StartTimer(&ct); |
+ for (j = 0; j < NUM_OPERATIONS; ++j) { |
+ if (VERIFY_KERNEL_SUCCESS != |
+ VerifyKernel(firmware_key_blob, kernel_blobs[i], 0)) |
+ fprintf(stderr, "Warning: Kernel Verification Failed.\n"); |
+ } |
+ StopTimer(&ct); |
+ msecs = (float) GetDurationMsecs(&ct) / NUM_OPERATIONS; |
+ fprintf(stderr, |
+ "# Kernel (%s, Algo = %s / %s):" |
+ "\t%.02f ms/verification\n", |
+ g_kernel_size_labels[i], |
+ algo_strings[firmware_sign_algorithm], |
+ algo_strings[kernel_sign_algorithm], |
+ msecs); |
+ fprintf(stdout, "ms_firmware_%s_rsa%d_%s_rsa%d_%s:%.02f\n", |
+ g_kernel_size_labels[i], |
+ firmware_key_size, |
+ sha_strings[firmware_sign_algorithm], |
+ kernel_key_size, |
+ sha_strings[kernel_sign_algorithm], |
+ msecs); |
+ } |
+ |
+ cleanup: |
+ for (i = 0; i < NUM_SIZES_TO_TEST; ++i) |
+ Free(kernel_blobs[i]); |
+ Free(firmware_key_blob); |
+ Free(kernel_sign_key); |
+ return error_code; |
+} |
+ |
+ |
+int main(int argc, char* argv[]) { |
+ int i, j, error_code = 0; |
+ for (i = 0; i < kNumAlgorithms; ++i) { /* Firmware Signing Algorithm. */ |
+ for (j = 0; j < kNumAlgorithms; ++j) { /* Kernel Signing Algorithm. */ |
+ /* Only measure if the kernel signing algorithm is weaker or equal to |
+ * the firmware signing algorithm. */ |
+ if (siglen_map[j] > siglen_map[i]) |
+ continue; |
+ if (siglen_map[j] == siglen_map[i] && hash_size_map[j] > hash_size_map[i]) |
+ continue; |
+ if (0 != (error_code = SpeedTestAlgorithm(i, j))) |
+ return error_code; |
+ } |
+ } |
+ return 0; |
+} |