OLD | NEW |
1 /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. | 1 /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. |
2 * Use of this source code is governed by a BSD-style license that can be | 2 * Use of this source code is governed by a BSD-style license that can be |
3 * found in the LICENSE file. | 3 * found in the LICENSE file. |
4 * | 4 * |
5 * Timing benchmark for verifying a firmware image. | 5 * Timing benchmark for verifying a firmware image. |
6 */ | 6 */ |
7 | 7 |
8 #include <stdio.h> | 8 #include <stdio.h> |
9 #include <stdlib.h> | 9 #include <stdlib.h> |
10 | 10 |
11 #include "file_keys.h" | 11 #include "file_keys.h" |
12 #include "kernel_image.h" | 12 #include "kernel_image.h" |
13 #include "padding.h" | 13 #include "padding.h" |
14 #include "rsa_utility.h" | 14 #include "rsa_utility.h" |
| 15 #include "test_common.h" |
15 #include "timer_utils.h" | 16 #include "timer_utils.h" |
16 #include "utility.h" | 17 #include "utility.h" |
17 | 18 |
18 #define FILE_NAME_SIZE 128 | 19 #define FILE_NAME_SIZE 128 |
19 | 20 |
20 #define NUM_OPERATIONS 30 /* Number of verify operations to time. | 21 #define NUM_OPERATIONS 30 /* Number of verify operations to time. |
21 * We use a smaller number here (30 vs. 100) | 22 * We use a smaller number here (30 vs. 100) |
22 * since there are many more cases to consider | 23 * since there are many more cases to consider |
23 * (one for each combination of firmware and kernel | 24 * (one for each combination of firmware and kernel |
24 * signature algorithm. | 25 * signature algorithm. |
25 */ | 26 */ |
26 | 27 |
27 #define KERNEL_SIZE_SMALL 512000 | 28 #define KERNEL_SIZE_SMALL 512000 |
28 #define KERNEL_SIZE_MEDIUM 1024000 | 29 #define KERNEL_SIZE_MEDIUM 1024000 |
29 #define KERNEL_SIZE_LARGE 4096000 | 30 #define KERNEL_SIZE_LARGE 4096000 |
30 const uint64_t g_kernel_sizes_to_test[] = { | 31 const uint64_t g_kernel_sizes_to_test[] = { |
31 KERNEL_SIZE_SMALL, | 32 KERNEL_SIZE_SMALL, |
32 KERNEL_SIZE_MEDIUM, | 33 KERNEL_SIZE_MEDIUM, |
33 KERNEL_SIZE_LARGE | 34 KERNEL_SIZE_LARGE |
34 }; | 35 }; |
35 const char* g_kernel_size_labels[] = { | 36 const char* g_kernel_size_labels[] = { |
36 "small", | 37 "small", |
37 "medium", | 38 "medium", |
38 "large" | 39 "large" |
39 }; | 40 }; |
40 #define NUM_SIZES_TO_TEST (sizeof(g_kernel_sizes_to_test) / \ | 41 #define NUM_SIZES_TO_TEST (sizeof(g_kernel_sizes_to_test) / \ |
41 sizeof(g_kernel_sizes_to_test[0])) | 42 sizeof(g_kernel_sizes_to_test[0])) |
42 | 43 |
43 uint8_t* GenerateTestKernelBlob(int firmware_sign_algorithm, | |
44 int kernel_sign_algorithm, | |
45 int kernel_len, | |
46 const uint8_t* kernel_sign_key, | |
47 const char* firmware_key_file, | |
48 const char* kernel_key_file) { | |
49 KernelImage* image = KernelImageNew(); | |
50 uint8_t* kernel_blob = NULL; | |
51 uint64_t kernel_blob_len = 0; | |
52 | |
53 Memcpy(image->magic, KERNEL_MAGIC, KERNEL_MAGIC_SIZE); | |
54 image->header_version = 1; | |
55 image->firmware_sign_algorithm = firmware_sign_algorithm; | |
56 image->kernel_sign_algorithm = kernel_sign_algorithm; | |
57 image->kernel_key_version = 1; | |
58 image->kernel_sign_key = (uint8_t*) Malloc( | |
59 RSAProcessedKeySize(image->kernel_sign_algorithm)); | |
60 Memcpy(image->kernel_sign_key, kernel_sign_key, | |
61 RSAProcessedKeySize(image->kernel_sign_algorithm)); | |
62 | |
63 /* Update correct header length. */ | |
64 image->header_len = GetKernelHeaderLen(image); | |
65 | |
66 /* Calculate SHA-512 digest on header and populate header_checksum. */ | |
67 CalculateKernelHeaderChecksum(image, image->header_checksum); | |
68 | |
69 /* Populate kernel options and data with dummy data. */ | |
70 image->kernel_version = 1; | |
71 image->options.version[0] = 1; | |
72 image->options.version[1] = 0; | |
73 Memset(image->options.cmd_line, 0, sizeof(image->options.cmd_line)); | |
74 image->options.kernel_len = kernel_len; | |
75 image->options.kernel_load_addr = 0; | |
76 image->options.kernel_entry_addr = 0; | |
77 image->kernel_key_signature = image->kernel_signature = NULL; | |
78 image->kernel_data = Malloc(kernel_len); | |
79 /* TODO(gauravsh): Populate this with random data, to remove data-dependent | |
80 * timing artificats. */ | |
81 Memset(image->kernel_data, 'K', kernel_len); | |
82 | |
83 if (!AddKernelKeySignature(image, firmware_key_file)) { | |
84 fprintf(stderr, "Couldn't create key signature.\n"); | |
85 KernelImageFree(image); | |
86 return NULL; | |
87 } | |
88 | |
89 if (!AddKernelSignature(image, kernel_key_file)) { | |
90 fprintf(stderr, "Couldn't create kernel option and kernel signature.\n"); | |
91 KernelImageFree(image); | |
92 return NULL; | |
93 } | |
94 | |
95 kernel_blob = GetKernelBlob(image, &kernel_blob_len); | |
96 KernelImageFree(image); | |
97 return kernel_blob; | |
98 } | |
99 | |
100 int SpeedTestAlgorithm(int firmware_sign_algorithm, | 44 int SpeedTestAlgorithm(int firmware_sign_algorithm, |
101 int kernel_sign_algorithm) { | 45 int kernel_sign_algorithm) { |
102 int i, j, error_code = 0; | 46 int i, j, error_code = 0; |
103 int firmware_key_size, kernel_key_size; | 47 int firmware_key_size, kernel_key_size; |
104 ClockTimerState ct; | 48 ClockTimerState ct; |
105 double msecs; | 49 double msecs; |
106 uint64_t len; | 50 uint64_t len; |
107 uint8_t* kernel_sign_key = NULL; | 51 uint8_t* kernel_sign_key = NULL; |
108 uint8_t* firmware_key_blob = NULL; | 52 uint8_t* firmware_key_blob = NULL; |
109 char firmware_sign_key_file[FILE_NAME_SIZE]; | 53 char firmware_sign_key_file[FILE_NAME_SIZE]; |
(...skipping 22 matching lines...) Expand all Loading... |
132 if (!kernel_sign_key) { | 76 if (!kernel_sign_key) { |
133 fprintf(stderr, "Couldn't read pre-processed public kernel signing key.\n"); | 77 fprintf(stderr, "Couldn't read pre-processed public kernel signing key.\n"); |
134 error_code = 1; | 78 error_code = 1; |
135 goto cleanup; | 79 goto cleanup; |
136 } | 80 } |
137 | 81 |
138 /* Generate test images. */ | 82 /* Generate test images. */ |
139 for (i = 0; i < NUM_SIZES_TO_TEST; ++i) { | 83 for (i = 0; i < NUM_SIZES_TO_TEST; ++i) { |
140 kernel_blobs[i] = GenerateTestKernelBlob(firmware_sign_algorithm, | 84 kernel_blobs[i] = GenerateTestKernelBlob(firmware_sign_algorithm, |
141 kernel_sign_algorithm, | 85 kernel_sign_algorithm, |
| 86 kernel_sign_key, |
| 87 1, /* kernel key version. */ |
| 88 1, /* kernel version. */ |
142 g_kernel_sizes_to_test[i], | 89 g_kernel_sizes_to_test[i], |
143 kernel_sign_key, | |
144 firmware_sign_key_file, | 90 firmware_sign_key_file, |
145 kernel_sign_key_file); | 91 kernel_sign_key_file); |
146 if (!kernel_blobs[i]) { | 92 if (!kernel_blobs[i]) { |
147 fprintf(stderr, "Couldn't generate test firmware images.\n"); | 93 fprintf(stderr, "Couldn't generate test firmware images.\n"); |
148 error_code = 1; | 94 error_code = 1; |
149 goto cleanup; | 95 goto cleanup; |
150 } | 96 } |
151 } | 97 } |
152 | 98 |
153 /* Get pre-processed key used for verification. */ | 99 /* Get pre-processed key used for verification. */ |
(...skipping 50 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
204 if (siglen_map[j] > siglen_map[i]) | 150 if (siglen_map[j] > siglen_map[i]) |
205 continue; | 151 continue; |
206 if (siglen_map[j] == siglen_map[i] && hash_size_map[j] > hash_size_map[i]) | 152 if (siglen_map[j] == siglen_map[i] && hash_size_map[j] > hash_size_map[i]) |
207 continue; | 153 continue; |
208 if (0 != (error_code = SpeedTestAlgorithm(i, j))) | 154 if (0 != (error_code = SpeedTestAlgorithm(i, j))) |
209 return error_code; | 155 return error_code; |
210 } | 156 } |
211 } | 157 } |
212 return 0; | 158 return 0; |
213 } | 159 } |
OLD | NEW |