2 * QEMU Crypto akcipher speed benchmark
4 * Copyright (c) 2022 Bytedance
7 * lei he <helei.sig11@bytedance.com>
9 * This work is licensed under the terms of the GNU GPL, version 2 or
10 * (at your option) any later version. See the COPYING file in the
11 * top-level directory.
14 #include "qemu/osdep.h"
15 #include "crypto/init.h"
16 #include "crypto/akcipher.h"
17 #include "standard-headers/linux/virtio_crypto.h"
19 #include "test_akcipher_keys.inc"
21 static QCryptoAkCipher
*create_rsa_akcipher(const uint8_t *priv_key
,
23 QCryptoRSAPaddingAlgorithm padding
,
24 QCryptoHashAlgorithm hash
)
26 QCryptoAkCipherOptions opt
;
28 opt
.alg
= QCRYPTO_AKCIPHER_ALG_RSA
;
29 opt
.u
.rsa
.padding_alg
= padding
;
30 opt
.u
.rsa
.hash_alg
= hash
;
31 return qcrypto_akcipher_new(&opt
, QCRYPTO_AKCIPHER_KEY_TYPE_PRIVATE
,
32 priv_key
, keylen
, &error_abort
);
35 static void test_rsa_speed(const uint8_t *priv_key
, size_t keylen
,
39 #define SHA1_DGST_LEN 20
40 #define SIGN_TIMES 10000
41 #define VERIFY_TIMES 100000
42 #define PADDING QCRYPTO_RSA_PADDING_ALG_PKCS1
43 #define HASH QCRYPTO_HASH_ALG_SHA1
45 g_autoptr(QCryptoAkCipher
) rsa
=
46 create_rsa_akcipher(priv_key
, keylen
, PADDING
, HASH
);
47 g_autofree
uint8_t *dgst
= NULL
;
48 g_autofree
uint8_t *signature
= NULL
;
51 dgst
= g_new0(uint8_t, SHA1_DGST_LEN
);
52 memset(dgst
, g_test_rand_int(), SHA1_DGST_LEN
);
53 signature
= g_new0(uint8_t, key_size
/ BYTE
);
55 g_test_message("benchmark rsa%zu (%s-%s) sign...", key_size
,
56 QCryptoRSAPaddingAlgorithm_str(PADDING
),
57 QCryptoHashAlgorithm_str(HASH
));
59 for (count
= 0; count
< SIGN_TIMES
; ++count
) {
60 g_assert(qcrypto_akcipher_sign(rsa
, dgst
, SHA1_DGST_LEN
,
61 signature
, key_size
/ BYTE
,
64 g_test_timer_elapsed();
65 g_test_message("rsa%zu (%s-%s) sign %zu times in %.2f seconds,"
67 key_size
, QCryptoRSAPaddingAlgorithm_str(PADDING
),
68 QCryptoHashAlgorithm_str(HASH
),
69 count
, g_test_timer_last(),
70 (double)count
/ g_test_timer_last());
72 g_test_message("benchmark rsa%zu (%s-%s) verification...", key_size
,
73 QCryptoRSAPaddingAlgorithm_str(PADDING
),
74 QCryptoHashAlgorithm_str(HASH
));
76 for (count
= 0; count
< VERIFY_TIMES
; ++count
) {
77 g_assert(qcrypto_akcipher_verify(rsa
, signature
, key_size
/ BYTE
,
81 g_test_timer_elapsed();
82 g_test_message("rsa%zu (%s-%s) verify %zu times in %.2f seconds,"
84 key_size
, QCryptoRSAPaddingAlgorithm_str(PADDING
),
85 QCryptoHashAlgorithm_str(HASH
),
86 count
, g_test_timer_last(),
87 (double)count
/ g_test_timer_last());
90 static void test_rsa_1024_speed(const void *opaque
)
92 size_t key_size
= (size_t)opaque
;
93 test_rsa_speed(rsa1024_priv_key
, sizeof(rsa1024_priv_key
), key_size
);
96 static void test_rsa_2048_speed(const void *opaque
)
98 size_t key_size
= (size_t)opaque
;
99 test_rsa_speed(rsa2048_priv_key
, sizeof(rsa2048_priv_key
), key_size
);
102 static void test_rsa_4096_speed(const void *opaque
)
104 size_t key_size
= (size_t)opaque
;
105 test_rsa_speed(rsa4096_priv_key
, sizeof(rsa4096_priv_key
), key_size
);
108 int main(int argc
, char **argv
)
112 g_test_init(&argc
, &argv
, NULL
);
113 g_assert(qcrypto_init(NULL
) == 0);
115 #define ADD_TEST(asym_alg, keysize) \
116 if ((!alg || g_str_equal(alg, #asym_alg)) && \
117 (!size || g_str_equal(size, #keysize))) \
118 g_test_add_data_func( \
119 "/crypto/akcipher/" #asym_alg "-" #keysize, \
121 test_ ## asym_alg ## _ ## keysize ## _speed)