summaryrefslogtreecommitdiff
path: root/tests/rsa_verify_benchmark.c
diff options
context:
space:
mode:
Diffstat (limited to 'tests/rsa_verify_benchmark.c')
-rw-r--r--tests/rsa_verify_benchmark.c95
1 files changed, 0 insertions, 95 deletions
diff --git a/tests/rsa_verify_benchmark.c b/tests/rsa_verify_benchmark.c
deleted file mode 100644
index 7b27f9e8..00000000
--- a/tests/rsa_verify_benchmark.c
+++ /dev/null
@@ -1,95 +0,0 @@
-/* Copyright (c) 2011 The Chromium OS Authors. All rights reserved.
- * Use of this source code is governed by a BSD-style license that can be
- * found in the LICENSE file.
- */
-
-#include <stdint.h>
-#include <stdio.h>
-#include <stdlib.h>
-
-#include "cryptolib.h"
-#include "file_keys.h"
-#include "host_common.h"
-#include "timer_utils.h"
-
-#define FILE_NAME_SIZE 128
-#define NUM_OPERATIONS 100 /* Number of signature operations to time. */
-
-int SpeedTestAlgorithm(int algorithm) {
- int i, key_size;
- int error_code = 0;
- double speed, msecs;
- char file_name[FILE_NAME_SIZE];
- uint8_t* digest = NULL;
- uint8_t* signature = NULL;
- uint64_t digest_len, sig_len;
- RSAPublicKey* key = NULL;
- ClockTimerState ct;
- char* sha_strings[] = { /* Maps algorithm->SHA algorithm. */
- "sha1", "sha256", "sha512", /* RSA-1024 */
- "sha1", "sha256", "sha512", /* RSA-2048 */
- "sha1", "sha256", "sha512", /* RSA-4096 */
- "sha1", "sha256", "sha512", /* RSA-8192 */
- };
-
- key_size = siglen_map[algorithm] * 8; /* in bits. */
- /* Get key. */
- snprintf(file_name, FILE_NAME_SIZE, "testkeys/key_rsa%d.keyb", key_size);
- key = RSAPublicKeyFromFile(file_name);
- if (!key) {
- VBDEBUG(("Couldn't read RSA Public key from file: %s\n", file_name));
- error_code = 1;
- goto failure;
- }
-
- /* Get expected digest. */
- snprintf(file_name, FILE_NAME_SIZE, "testcases/test_file.%s.digest",
- sha_strings[algorithm]);
- digest = BufferFromFile(file_name, &digest_len);
- if (!digest) {
- VBDEBUG(("Couldn't read digest file.\n"));
- error_code = 1;
- goto failure;
- }
-
- /* Get signature to verify against. */
- snprintf(file_name, FILE_NAME_SIZE, "testcases/test_file.rsa%d_%s.sig",
- key_size, sha_strings[algorithm]);
- signature = BufferFromFile(file_name, &sig_len);
- if (!signature) {
- VBDEBUG(("Couldn't read signature file.\n"));
- error_code = 1;
- goto failure;
- }
-
- StartTimer(&ct);
- for (i = 0; i < NUM_OPERATIONS; i++) {
- if (!RSAVerify(key, signature, sig_len, algorithm, digest))
- VBDEBUG(("Warning: Signature Check Failed.\n"));
- }
- StopTimer(&ct);
-
- msecs = (float) GetDurationMsecs(&ct) / NUM_OPERATIONS;
- speed = 1000.0 / msecs ;
- fprintf(stderr, "# rsa%d/%s:\tTime taken per verification = %.02f ms,"
- " Speed = %.02f verifications/s\n", key_size, sha_strings[algorithm],
- msecs, speed);
- fprintf(stdout, "ms_rsa%d_%s:%.02f\n", key_size, sha_strings[algorithm],
- msecs);
-
-failure:
- free(signature);
- free(digest);
- RSAPublicKeyFree(key);
- return error_code;
-}
-
-int main(int argc, char* argv[]) {
- int i;
- int error_code = 0;
- for (i = 0; i < kNumAlgorithms; ++i) {
- if(SpeedTestAlgorithm(i))
- error_code = 1;
- }
- return error_code;
-}