| Index: src/platform/vboot_reference/tests/firmware_verify_benchmark.c
|
| diff --git a/src/platform/vboot_reference/tests/firmware_verify_benchmark.c b/src/platform/vboot_reference/tests/firmware_verify_benchmark.c
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..278cb2961fc784a787333d1e005d7b6e05fa6143
|
| --- /dev/null
|
| +++ b/src/platform/vboot_reference/tests/firmware_verify_benchmark.c
|
| @@ -0,0 +1,203 @@
|
| +/* Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
|
| + * Use of this source code is governed by a BSD-style license that can be
|
| + * found in the LICENSE file.
|
| + *
|
| + * Timing benchmark for verifying a firmware image.
|
| + */
|
| +
|
| +#include <stdio.h>
|
| +#include <stdlib.h>
|
| +
|
| +#include "file_keys.h"
|
| +#include "firmware_image.h"
|
| +#include "padding.h"
|
| +#include "rsa_utility.h"
|
| +#include "timer_utils.h"
|
| +#include "utility.h"
|
| +
|
| +#define FILE_NAME_SIZE 128
|
| +#define NUM_OPERATIONS 100 /* Number of verify operations to time. */
|
| +#define FIRMWARE_SIZE_SMALL 512000
|
| +#define FIRMWARE_SIZE_MEDIUM 1024000
|
| +#define FIRMWARE_SIZE_LARGE 4096000
|
| +
|
| +uint8_t* GenerateTestFirmwareBlob(int algorithm,
|
| + int firmware_len,
|
| + const uint8_t* firmware_sign_key,
|
| + const char* root_key_file,
|
| + const char* firmware_sign_key_file) {
|
| + FirmwareImage* image = FirmwareImageNew();
|
| + uint8_t* firmware_blob = NULL;
|
| + uint64_t firmware_blob_len = 0;
|
| +
|
| + Memcpy(image->magic, FIRMWARE_MAGIC, FIRMWARE_MAGIC_SIZE);
|
| + image->firmware_sign_algorithm = algorithm;
|
| + image->firmware_sign_key = (uint8_t*) Malloc(
|
| + RSAProcessedKeySize(image->firmware_sign_algorithm));
|
| + Memcpy(image->firmware_sign_key, firmware_sign_key,
|
| + RSAProcessedKeySize(image->firmware_sign_algorithm));
|
| + image->firmware_key_version = 1;
|
| +
|
| + /* Update correct header length. */
|
| + image->header_len = GetFirmwareHeaderLen(image);
|
| +
|
| + /* Calculate SHA-512 digest on header and populate header_checksum. */
|
| + CalculateFirmwareHeaderChecksum(image, image->header_checksum);
|
| +
|
| + /* Populate firmware and preamble with dummy data. */
|
| + image->firmware_version = 1;
|
| + image->firmware_len = firmware_len;
|
| + image->preamble_signature = image->firmware_signature = NULL;
|
| + Memset(image->preamble, 'P', FIRMWARE_PREAMBLE_SIZE);
|
| + image->firmware_data = Malloc(image->firmware_len);
|
| + Memset(image->firmware_data, 'F', image->firmware_len);
|
| +
|
| + if (!AddFirmwareKeySignature(image, root_key_file)) {
|
| + fprintf(stderr, "Couldn't create key signature.\n");
|
| + FirmwareImageFree(image);
|
| + return NULL;
|
| + }
|
| +
|
| + if (!AddFirmwareSignature(image, firmware_sign_key_file)) {
|
| + fprintf(stderr, "Couldn't create firmware and preamble signature.\n");
|
| + FirmwareImageFree(image);
|
| + return NULL;
|
| + }
|
| + firmware_blob = GetFirmwareBlob(image, &firmware_blob_len);
|
| + FirmwareImageFree(image);
|
| + return firmware_blob;
|
| +}
|
| +
|
| +int SpeedTestAlgorithm(int algorithm) {
|
| + int i, key_size, error_code = 0;
|
| + ClockTimerState ct;
|
| + double msecs;
|
| + uint64_t len;
|
| + uint8_t* firmware_sign_key = NULL;
|
| + uint8_t* root_key_blob = NULL;
|
| + char firmware_sign_key_file[FILE_NAME_SIZE];
|
| + char file_name[FILE_NAME_SIZE];
|
| + char* sha_strings[] = { /* Maps algorithm->SHA algorithm. */
|
| + "sha1", "sha256", "sha512", /* RSA-1024 */
|
| + "sha1", "sha256", "sha512", /* RSA-2048 */
|
| + "sha1", "sha256", "sha512", /* RSA-4096 */
|
| + "sha1", "sha256", "sha512", /* RSA-8192 */
|
| + };
|
| + /* Test for three different firmware sizes. */
|
| + uint8_t* firmware_blob_small = NULL;
|
| + uint8_t* firmware_blob_medium = NULL;
|
| + uint8_t* firmware_blob_large = NULL;
|
| +
|
| + key_size = siglen_map[algorithm] * 8; /* in bits. */
|
| + snprintf(firmware_sign_key_file, FILE_NAME_SIZE, "testkeys/key_rsa%d.pem",
|
| + key_size);
|
| +
|
| + snprintf(file_name, FILE_NAME_SIZE, "testkeys/key_rsa%d.keyb", key_size);
|
| + firmware_sign_key = BufferFromFile(file_name, &len);
|
| + if (!firmware_sign_key) {
|
| + fprintf(stderr, "Couldn't read pre-processed firmware signing key.\n");
|
| + error_code = 1;
|
| + goto cleanup;
|
| + }
|
| +
|
| + /* Generate test images. */
|
| + firmware_blob_small = GenerateTestFirmwareBlob(algorithm,
|
| + FIRMWARE_SIZE_SMALL,
|
| + firmware_sign_key,
|
| + "testkeys/key_rsa8192.pem",
|
| + firmware_sign_key_file);
|
| + firmware_blob_medium = GenerateTestFirmwareBlob(algorithm,
|
| + FIRMWARE_SIZE_MEDIUM,
|
| + firmware_sign_key,
|
| + "testkeys/key_rsa8192.pem",
|
| + firmware_sign_key_file);
|
| + firmware_blob_large = GenerateTestFirmwareBlob(algorithm,
|
| + FIRMWARE_SIZE_LARGE,
|
| + firmware_sign_key,
|
| + "testkeys/key_rsa8192.pem",
|
| + firmware_sign_key_file);
|
| + if (!firmware_blob_small || !firmware_blob_medium || !firmware_blob_large) {
|
| + fprintf(stderr, "Couldn't generate test firmware images.\n");
|
| + error_code = 1;
|
| + goto cleanup;
|
| + }
|
| +
|
| + root_key_blob = BufferFromFile("testkeys/key_rsa8192.keyb", &len);
|
| + if (!root_key_blob) {
|
| + fprintf(stderr, "Couldn't read pre-processed rootkey.\n");
|
| + error_code = 1;
|
| + goto cleanup;
|
| + }
|
| +
|
| + /* Small.*/
|
| + StartTimer(&ct);
|
| + for (i = 0; i < NUM_OPERATIONS; ++i) {
|
| + if (VERIFY_FIRMWARE_SUCCESS !=
|
| + VerifyFirmware(root_key_blob, firmware_blob_small, 0))
|
| + fprintf(stderr, "Warning: Firmware Verification Failed.\n");
|
| + }
|
| + StopTimer(&ct);
|
| + msecs = (float) GetDurationMsecs(&ct) / NUM_OPERATIONS;
|
| + fprintf(stderr,
|
| + "# Firmware (Small, Algo = %s):"
|
| + "\t%.02f ms/verification\n",
|
| + algo_strings[algorithm], msecs);
|
| + fprintf(stdout, "ms_firmware_sm_rsa%d_%s:%.02f\n",
|
| + key_size,
|
| + sha_strings[algorithm],
|
| + msecs);
|
| +
|
| + /* Medium. */
|
| + StartTimer(&ct);
|
| + for (i = 0; i < NUM_OPERATIONS; ++i) {
|
| + if (VERIFY_FIRMWARE_SUCCESS !=
|
| + VerifyFirmware(root_key_blob, firmware_blob_medium, 0))
|
| + fprintf(stderr, "Warning: Firmware Verification Failed.\n");
|
| + }
|
| + StopTimer(&ct);
|
| + msecs = (float) GetDurationMsecs(&ct) / NUM_OPERATIONS;
|
| + fprintf(stderr,
|
| + "# Firmware (Medium, Algo = %s):"
|
| + "\t%.02f ms/verification\n",
|
| + algo_strings[algorithm], msecs);
|
| + fprintf(stdout, "ms_firmware_med_rsa%d_%s:%.02f\n",
|
| + key_size,
|
| + sha_strings[algorithm],
|
| + msecs);
|
| +
|
| +
|
| + /* Large */
|
| + StartTimer(&ct);
|
| + for (i = 0; i < NUM_OPERATIONS; ++i) {
|
| + if (VERIFY_FIRMWARE_SUCCESS !=
|
| + VerifyFirmware(root_key_blob, firmware_blob_large, 0))
|
| + fprintf(stderr, "Warning: Firmware Verification Failed.\n");
|
| + }
|
| + StopTimer(&ct);
|
| + msecs = (float) GetDurationMsecs(&ct) / NUM_OPERATIONS;
|
| + fprintf(stderr,
|
| + "# Firmware (Large, Algorithm = %s):"
|
| + "\t%.02f ms/verification\n",
|
| + algo_strings[algorithm], msecs);
|
| + fprintf(stdout, "ms_firmware_large_rsa%d_%s:%.02f\n",
|
| + key_size,
|
| + sha_strings[algorithm],
|
| + msecs);
|
| +
|
| + cleanup:
|
| + Free(root_key_blob);
|
| + Free(firmware_blob_large);
|
| + Free(firmware_blob_medium);
|
| + Free(firmware_blob_small);
|
| + return error_code;
|
| +}
|
| +
|
| +
|
| +int main(int argc, char* argv[]) {
|
| + int i, error_code = 0;
|
| + for (i = 0; i < kNumAlgorithms; ++i) {
|
| + if (0 != (error_code = SpeedTestAlgorithm(i)))
|
| + return error_code;
|
| + }
|
| + return 0;
|
| +}
|
|
|