Adam Langley | c5c0c7e | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 1 | /* Copyright (c) 2014, Google Inc. |
| 2 | * |
| 3 | * Permission to use, copy, modify, and/or distribute this software for any |
| 4 | * purpose with or without fee is hereby granted, provided that the above |
| 5 | * copyright notice and this permission notice appear in all copies. |
| 6 | * |
| 7 | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES |
| 8 | * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF |
| 9 | * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY |
| 10 | * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES |
| 11 | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION |
| 12 | * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN |
| 13 | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ |
| 14 | |
Adam Langley | a0f1c8e | 2018-03-30 13:43:59 -0700 | [diff] [blame] | 15 | #include <algorithm> |
Adam Langley | c5c0c7e | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 16 | #include <functional> |
| 17 | #include <memory> |
Zola Bridges | f10ea55 | 2019-10-01 11:35:44 -0700 | [diff] [blame] | 18 | #include <string> |
Adam Langley | c5c0c7e | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 19 | #include <vector> |
| 20 | |
Adam Langley | a0f1c8e | 2018-03-30 13:43:59 -0700 | [diff] [blame] | 21 | #include <assert.h> |
David Benjamin | 6443173 | 2019-02-10 22:07:23 +0000 | [diff] [blame] | 22 | #include <errno.h> |
David Benjamin | 1a46f8f | 2022-11-23 13:10:15 -0500 | [diff] [blame] | 23 | #include <inttypes.h> |
Adam Langley | c5c0c7e | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 24 | #include <stdint.h> |
David Benjamin | bcb65b9 | 2016-08-14 22:06:49 -0400 | [diff] [blame] | 25 | #include <stdlib.h> |
Adam Langley | 2b2d66d | 2015-01-30 17:08:37 -0800 | [diff] [blame] | 26 | #include <string.h> |
Adam Langley | c5c0c7e | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 27 | |
Adam Langley | 92b6b02 | 2015-04-16 14:01:33 -0700 | [diff] [blame] | 28 | #include <openssl/aead.h> |
David Benjamin | 25e36da | 2019-08-31 13:25:15 -0400 | [diff] [blame] | 29 | #include <openssl/aes.h> |
David Benjamin | f958727 | 2021-09-21 16:33:15 -0400 | [diff] [blame] | 30 | #include <openssl/base64.h> |
Matt Braithwaite | d17d74d | 2016-08-17 20:10:28 -0700 | [diff] [blame] | 31 | #include <openssl/bn.h> |
Sophie Schmieg | 58472cc | 2023-03-07 00:39:31 +0000 | [diff] [blame] | 32 | #include <openssl/bytestring.h> |
David Benjamin | ab5edbe | 2021-01-27 16:49:50 -0500 | [diff] [blame] | 33 | #include <openssl/crypto.h> |
Sophie Schmieg | 58472cc | 2023-03-07 00:39:31 +0000 | [diff] [blame] | 34 | #include <openssl/curve25519.h> |
Adam Langley | 92b6b02 | 2015-04-16 14:01:33 -0700 | [diff] [blame] | 35 | #include <openssl/digest.h> |
Matt Braithwaite | d17d74d | 2016-08-17 20:10:28 -0700 | [diff] [blame] | 36 | #include <openssl/ec.h> |
Matt Braithwaite | d17d74d | 2016-08-17 20:10:28 -0700 | [diff] [blame] | 37 | #include <openssl/ec_key.h> |
Sophie Schmieg | 58472cc | 2023-03-07 00:39:31 +0000 | [diff] [blame] | 38 | #include <openssl/ecdsa.h> |
| 39 | #include <openssl/err.h> |
David Benjamin | b529253 | 2017-06-09 19:27:37 -0400 | [diff] [blame] | 40 | #include <openssl/evp.h> |
Adam Langley | 7b93593 | 2018-11-12 13:53:42 -0800 | [diff] [blame] | 41 | #include <openssl/hrss.h> |
Sophie Schmieg | 58472cc | 2023-03-07 00:39:31 +0000 | [diff] [blame] | 42 | #include <openssl/kyber.h> |
Steven Valdez | 188b65a | 2020-04-21 14:31:05 -0400 | [diff] [blame] | 43 | #include <openssl/mem.h> |
David Benjamin | 9819367 | 2016-03-25 18:07:11 -0400 | [diff] [blame] | 44 | #include <openssl/nid.h> |
Adam Langley | 92b6b02 | 2015-04-16 14:01:33 -0700 | [diff] [blame] | 45 | #include <openssl/rand.h> |
| 46 | #include <openssl/rsa.h> |
David Benjamin | 345c86b | 2022-01-23 11:11:17 -0500 | [diff] [blame] | 47 | #include <openssl/siphash.h> |
Steven Valdez | 188b65a | 2020-04-21 14:31:05 -0400 | [diff] [blame] | 48 | #include <openssl/trust_token.h> |
Adam Langley | 92b6b02 | 2015-04-16 14:01:33 -0700 | [diff] [blame] | 49 | |
Adam Langley | c5c0c7e | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 50 | #if defined(OPENSSL_WINDOWS) |
David Benjamin | a353cdb | 2016-06-09 16:48:33 -0400 | [diff] [blame] | 51 | OPENSSL_MSVC_PRAGMA(warning(push, 3)) |
Adam Langley | 3e71931 | 2015-03-20 16:32:23 -0700 | [diff] [blame] | 52 | #include <windows.h> |
David Benjamin | a353cdb | 2016-06-09 16:48:33 -0400 | [diff] [blame] | 53 | OPENSSL_MSVC_PRAGMA(warning(pop)) |
Adam Langley | 30eda1d | 2014-06-24 11:15:12 -0700 | [diff] [blame] | 54 | #elif defined(OPENSSL_APPLE) |
| 55 | #include <sys/time.h> |
David Benjamin | 2f401ec | 2016-09-09 19:49:35 -0400 | [diff] [blame] | 56 | #else |
| 57 | #include <time.h> |
Adam Langley | c5c0c7e | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 58 | #endif |
| 59 | |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 60 | #if defined(OPENSSL_THREADS) |
| 61 | #include <condition_variable> |
| 62 | #include <mutex> |
| 63 | #include <thread> |
| 64 | #endif |
| 65 | |
Steven Valdez | 188b65a | 2020-04-21 14:31:05 -0400 | [diff] [blame] | 66 | #include "../crypto/ec_extra/internal.h" |
| 67 | #include "../crypto/fipsmodule/ec/internal.h" |
David Benjamin | 17cf2cb | 2016-12-13 01:07:13 -0500 | [diff] [blame] | 68 | #include "../crypto/internal.h" |
Steven Valdez | 188b65a | 2020-04-21 14:31:05 -0400 | [diff] [blame] | 69 | #include "../crypto/trust_token/internal.h" |
David Benjamin | 58084af | 2015-06-07 00:25:15 -0400 | [diff] [blame] | 70 | #include "internal.h" |
Adam Langley | ad6b28e | 2015-04-14 12:07:44 -0700 | [diff] [blame] | 71 | |
Zola Bridges | f10ea55 | 2019-10-01 11:35:44 -0700 | [diff] [blame] | 72 | // g_print_json is true if printed output is JSON formatted. |
| 73 | static bool g_print_json = false; |
Adam Langley | 2b2d66d | 2015-01-30 17:08:37 -0800 | [diff] [blame] | 74 | |
Adam Langley | c5c0c7e | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 75 | // TimeResults represents the results of benchmarking a function. |
| 76 | struct TimeResults { |
| 77 | // num_calls is the number of function calls done in the time period. |
David Benjamin | 1a46f8f | 2022-11-23 13:10:15 -0500 | [diff] [blame] | 78 | uint64_t num_calls; |
Adam Langley | c5c0c7e | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 79 | // us is the number of microseconds that elapsed in the time period. |
David Benjamin | 1a46f8f | 2022-11-23 13:10:15 -0500 | [diff] [blame] | 80 | uint64_t us; |
Adam Langley | c5c0c7e | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 81 | |
Zola Bridges | f10ea55 | 2019-10-01 11:35:44 -0700 | [diff] [blame] | 82 | void Print(const std::string &description) const { |
| 83 | if (g_print_json) { |
| 84 | PrintJSON(description); |
| 85 | } else { |
David Benjamin | 1a46f8f | 2022-11-23 13:10:15 -0500 | [diff] [blame] | 86 | printf( |
| 87 | "Did %" PRIu64 " %s operations in %" PRIu64 "us (%.1f ops/sec)\n", |
| 88 | num_calls, description.c_str(), us, |
| 89 | (static_cast<double>(num_calls) / static_cast<double>(us)) * 1000000); |
Zola Bridges | f10ea55 | 2019-10-01 11:35:44 -0700 | [diff] [blame] | 90 | } |
Adam Langley | c5c0c7e | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 91 | } |
| 92 | |
Zola Bridges | f10ea55 | 2019-10-01 11:35:44 -0700 | [diff] [blame] | 93 | void PrintWithBytes(const std::string &description, |
| 94 | size_t bytes_per_call) const { |
| 95 | if (g_print_json) { |
| 96 | PrintJSON(description, bytes_per_call); |
| 97 | } else { |
David Benjamin | 1a46f8f | 2022-11-23 13:10:15 -0500 | [diff] [blame] | 98 | printf( |
| 99 | "Did %" PRIu64 " %s operations in %" PRIu64 |
| 100 | "us (%.1f ops/sec): %.1f MB/s\n", |
| 101 | num_calls, description.c_str(), us, |
| 102 | (static_cast<double>(num_calls) / static_cast<double>(us)) * 1000000, |
| 103 | static_cast<double>(bytes_per_call * num_calls) / |
| 104 | static_cast<double>(us)); |
Zola Bridges | f10ea55 | 2019-10-01 11:35:44 -0700 | [diff] [blame] | 105 | } |
Adam Langley | c5c0c7e | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 106 | } |
Zola Bridges | f10ea55 | 2019-10-01 11:35:44 -0700 | [diff] [blame] | 107 | |
| 108 | private: |
| 109 | void PrintJSON(const std::string &description, |
| 110 | size_t bytes_per_call = 0) const { |
| 111 | if (first_json_printed) { |
| 112 | puts(","); |
| 113 | } |
| 114 | |
David Benjamin | 1a46f8f | 2022-11-23 13:10:15 -0500 | [diff] [blame] | 115 | printf("{\"description\": \"%s\", \"numCalls\": %" PRIu64 |
| 116 | ", \"microseconds\": %" PRIu64, |
Zola Bridges | f10ea55 | 2019-10-01 11:35:44 -0700 | [diff] [blame] | 117 | description.c_str(), num_calls, us); |
| 118 | |
| 119 | if (bytes_per_call > 0) { |
| 120 | printf(", \"bytesPerCall\": %zu", bytes_per_call); |
| 121 | } |
| 122 | |
| 123 | printf("}"); |
| 124 | first_json_printed = true; |
| 125 | } |
| 126 | |
| 127 | // first_json_printed is true if |g_print_json| is true and the first item in |
| 128 | // the JSON results has been printed already. This is used to handle the |
| 129 | // commas between each item in the result list. |
| 130 | static bool first_json_printed; |
Adam Langley | c5c0c7e | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 131 | }; |
| 132 | |
Zola Bridges | f10ea55 | 2019-10-01 11:35:44 -0700 | [diff] [blame] | 133 | bool TimeResults::first_json_printed = false; |
| 134 | |
Adam Langley | c5c0c7e | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 135 | #if defined(OPENSSL_WINDOWS) |
| 136 | static uint64_t time_now() { return GetTickCount64() * 1000; } |
Adam Langley | 30eda1d | 2014-06-24 11:15:12 -0700 | [diff] [blame] | 137 | #elif defined(OPENSSL_APPLE) |
| 138 | static uint64_t time_now() { |
| 139 | struct timeval tv; |
| 140 | uint64_t ret; |
| 141 | |
| 142 | gettimeofday(&tv, NULL); |
| 143 | ret = tv.tv_sec; |
| 144 | ret *= 1000000; |
| 145 | ret += tv.tv_usec; |
| 146 | return ret; |
| 147 | } |
Adam Langley | c5c0c7e | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 148 | #else |
| 149 | static uint64_t time_now() { |
| 150 | struct timespec ts; |
| 151 | clock_gettime(CLOCK_MONOTONIC, &ts); |
| 152 | |
| 153 | uint64_t ret = ts.tv_sec; |
| 154 | ret *= 1000000; |
| 155 | ret += ts.tv_nsec / 1000; |
| 156 | return ret; |
| 157 | } |
| 158 | #endif |
| 159 | |
David Benjamin | bcb65b9 | 2016-08-14 22:06:49 -0400 | [diff] [blame] | 160 | static uint64_t g_timeout_seconds = 1; |
David Benjamin | 5501a26 | 2019-03-20 17:45:15 -0500 | [diff] [blame] | 161 | static std::vector<size_t> g_chunk_lengths = {16, 256, 1350, 8192, 16384}; |
David Benjamin | bcb65b9 | 2016-08-14 22:06:49 -0400 | [diff] [blame] | 162 | |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 163 | // IterationsBetweenTimeChecks returns the number of iterations of |func| to run |
| 164 | // in between checking the time, or zero on error. |
| 165 | static uint32_t IterationsBetweenTimeChecks(std::function<bool()> func) { |
| 166 | uint64_t start = time_now(); |
| 167 | if (!func()) { |
| 168 | return 0; |
| 169 | } |
| 170 | uint64_t delta = time_now() - start; |
| 171 | if (delta == 0) { |
| 172 | return 250; |
| 173 | } |
| 174 | |
| 175 | // Aim for about 100ms between time checks. |
| 176 | uint32_t ret = static_cast<double>(100000) / static_cast<double>(delta); |
| 177 | if (ret > 1000) { |
| 178 | ret = 1000; |
| 179 | } else if (ret < 1) { |
| 180 | ret = 1; |
| 181 | } |
| 182 | return ret; |
| 183 | } |
| 184 | |
| 185 | static bool TimeFunctionImpl(TimeResults *results, std::function<bool()> func, |
| 186 | uint32_t iterations_between_time_checks) { |
David Benjamin | bcb65b9 | 2016-08-14 22:06:49 -0400 | [diff] [blame] | 187 | // total_us is the total amount of time that we'll aim to measure a function |
Adam Langley | c5c0c7e | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 188 | // for. |
David Benjamin | bcb65b9 | 2016-08-14 22:06:49 -0400 | [diff] [blame] | 189 | const uint64_t total_us = g_timeout_seconds * 1000000; |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 190 | uint64_t start = time_now(), now; |
David Benjamin | 1a46f8f | 2022-11-23 13:10:15 -0500 | [diff] [blame] | 191 | uint64_t done = 0; |
Adam Langley | c5c0c7e | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 192 | for (;;) { |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 193 | for (uint32_t i = 0; i < iterations_between_time_checks; i++) { |
Adam Langley | c5c0c7e | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 194 | if (!func()) { |
| 195 | return false; |
| 196 | } |
| 197 | done++; |
| 198 | } |
| 199 | |
| 200 | now = time_now(); |
David Benjamin | bcb65b9 | 2016-08-14 22:06:49 -0400 | [diff] [blame] | 201 | if (now - start > total_us) { |
Adam Langley | c5c0c7e | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 202 | break; |
| 203 | } |
| 204 | } |
| 205 | |
| 206 | results->us = now - start; |
| 207 | results->num_calls = done; |
| 208 | return true; |
| 209 | } |
| 210 | |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 211 | static bool TimeFunction(TimeResults *results, std::function<bool()> func) { |
| 212 | uint32_t iterations_between_time_checks = IterationsBetweenTimeChecks(func); |
| 213 | if (iterations_between_time_checks == 0) { |
| 214 | return false; |
| 215 | } |
| 216 | |
| 217 | return TimeFunctionImpl(results, std::move(func), |
| 218 | iterations_between_time_checks); |
| 219 | } |
| 220 | |
| 221 | #if defined(OPENSSL_THREADS) |
| 222 | // g_threads is the number of threads to run in parallel benchmarks. |
| 223 | static int g_threads = 1; |
| 224 | |
| 225 | // Latch behaves like C++20 std::latch. |
| 226 | class Latch { |
| 227 | public: |
| 228 | explicit Latch(int expected) : expected_(expected) {} |
| 229 | Latch(const Latch &) = delete; |
| 230 | Latch &operator=(const Latch &) = delete; |
| 231 | |
| 232 | void ArriveAndWait() { |
| 233 | std::unique_lock<std::mutex> lock(lock_); |
| 234 | expected_--; |
| 235 | if (expected_ > 0) { |
| 236 | cond_.wait(lock, [&] { return expected_ == 0; }); |
| 237 | } else { |
| 238 | cond_.notify_all(); |
| 239 | } |
| 240 | } |
| 241 | |
| 242 | private: |
| 243 | int expected_; |
| 244 | std::mutex lock_; |
| 245 | std::condition_variable cond_; |
| 246 | }; |
| 247 | |
| 248 | static bool TimeFunctionParallel(TimeResults *results, |
| 249 | std::function<bool()> func) { |
| 250 | if (g_threads <= 1) { |
| 251 | return TimeFunction(results, std::move(func)); |
| 252 | } |
| 253 | |
| 254 | uint32_t iterations_between_time_checks = IterationsBetweenTimeChecks(func); |
| 255 | if (iterations_between_time_checks == 0) { |
| 256 | return false; |
| 257 | } |
| 258 | |
| 259 | struct ThreadResult { |
| 260 | TimeResults time_result; |
| 261 | bool ok = false; |
| 262 | }; |
| 263 | std::vector<ThreadResult> thread_results(g_threads); |
| 264 | Latch latch(g_threads); |
| 265 | std::vector<std::thread> threads; |
| 266 | for (int i = 0; i < g_threads; i++) { |
| 267 | threads.emplace_back([&, i] { |
| 268 | // Wait for all the threads to be ready before running the benchmark. |
| 269 | latch.ArriveAndWait(); |
| 270 | thread_results[i].ok = TimeFunctionImpl( |
| 271 | &thread_results[i].time_result, func, iterations_between_time_checks); |
| 272 | }); |
| 273 | } |
| 274 | |
| 275 | for (auto &thread : threads) { |
| 276 | thread.join(); |
| 277 | } |
| 278 | |
| 279 | results->num_calls = 0; |
| 280 | results->us = 0; |
| 281 | for (const auto& pair : thread_results) { |
| 282 | if (!pair.ok) { |
| 283 | return false; |
| 284 | } |
| 285 | results->num_calls += pair.time_result.num_calls; |
| 286 | results->us += pair.time_result.us; |
| 287 | } |
| 288 | return true; |
| 289 | } |
| 290 | |
| 291 | #else |
| 292 | static bool TimeFunctionParallel(TimeResults *results, |
| 293 | std::function<bool()> func) { |
| 294 | return TimeFunction(results, std::move(func)); |
| 295 | } |
| 296 | #endif |
| 297 | |
Daniel Hirche | 1414d86 | 2018-04-13 19:09:25 +0200 | [diff] [blame] | 298 | static bool SpeedRSA(const std::string &selected) { |
| 299 | if (!selected.empty() && selected.find("RSA") == std::string::npos) { |
Adam Langley | 90b5840 | 2015-04-13 11:04:18 -0700 | [diff] [blame] | 300 | return true; |
| 301 | } |
Adam Langley | c5c0c7e | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 302 | |
Daniel Hirche | 1414d86 | 2018-04-13 19:09:25 +0200 | [diff] [blame] | 303 | static const struct { |
| 304 | const char *name; |
| 305 | const uint8_t *key; |
| 306 | const size_t key_len; |
| 307 | } kRSAKeys[] = { |
| 308 | {"RSA 2048", kDERRSAPrivate2048, kDERRSAPrivate2048Len}, |
| 309 | {"RSA 4096", kDERRSAPrivate4096, kDERRSAPrivate4096Len}, |
| 310 | }; |
Adam Langley | c5c0c7e | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 311 | |
David Benjamin | 1a46f8f | 2022-11-23 13:10:15 -0500 | [diff] [blame] | 312 | for (size_t i = 0; i < OPENSSL_ARRAY_SIZE(kRSAKeys); i++) { |
Daniel Hirche | 1414d86 | 2018-04-13 19:09:25 +0200 | [diff] [blame] | 313 | const std::string name = kRSAKeys[i].name; |
Adam Langley | c5c0c7e | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 314 | |
Daniel Hirche | 1414d86 | 2018-04-13 19:09:25 +0200 | [diff] [blame] | 315 | bssl::UniquePtr<RSA> key( |
| 316 | RSA_private_key_from_bytes(kRSAKeys[i].key, kRSAKeys[i].key_len)); |
| 317 | if (key == nullptr) { |
| 318 | fprintf(stderr, "Failed to parse %s key.\n", name.c_str()); |
| 319 | ERR_print_errors_fp(stderr); |
| 320 | return false; |
| 321 | } |
David Benjamin | f11ea19 | 2018-04-09 20:17:20 -0400 | [diff] [blame] | 322 | |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 323 | static constexpr size_t kMaxSignature = 512; |
| 324 | if (RSA_size(key.get()) > kMaxSignature) { |
| 325 | abort(); |
| 326 | } |
Daniel Hirche | 1414d86 | 2018-04-13 19:09:25 +0200 | [diff] [blame] | 327 | const uint8_t fake_sha256_hash[32] = {0}; |
Daniel Hirche | 1414d86 | 2018-04-13 19:09:25 +0200 | [diff] [blame] | 328 | |
| 329 | TimeResults results; |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 330 | if (!TimeFunctionParallel(&results, [&key, &fake_sha256_hash]() -> bool { |
| 331 | // Usually during RSA signing we're using a long-lived |RSA| that |
| 332 | // has already had all of its |BN_MONT_CTX|s constructed, so it |
| 333 | // makes sense to use |key| directly here. |
| 334 | uint8_t out[kMaxSignature]; |
| 335 | unsigned out_len; |
| 336 | return RSA_sign(NID_sha256, fake_sha256_hash, |
| 337 | sizeof(fake_sha256_hash), out, &out_len, key.get()); |
Daniel Hirche | 1414d86 | 2018-04-13 19:09:25 +0200 | [diff] [blame] | 338 | })) { |
| 339 | fprintf(stderr, "RSA_sign failed.\n"); |
| 340 | ERR_print_errors_fp(stderr); |
| 341 | return false; |
| 342 | } |
| 343 | results.Print(name + " signing"); |
| 344 | |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 345 | uint8_t sig[kMaxSignature]; |
| 346 | unsigned sig_len; |
| 347 | if (!RSA_sign(NID_sha256, fake_sha256_hash, sizeof(fake_sha256_hash), sig, |
| 348 | &sig_len, key.get())) { |
| 349 | return false; |
| 350 | } |
| 351 | if (!TimeFunctionParallel( |
| 352 | &results, [&key, &fake_sha256_hash, &sig, sig_len]() -> bool { |
| 353 | return RSA_verify(NID_sha256, fake_sha256_hash, |
| 354 | sizeof(fake_sha256_hash), sig, sig_len, |
| 355 | key.get()); |
| 356 | })) { |
Daniel Hirche | 1414d86 | 2018-04-13 19:09:25 +0200 | [diff] [blame] | 357 | fprintf(stderr, "RSA_verify failed.\n"); |
| 358 | ERR_print_errors_fp(stderr); |
| 359 | return false; |
| 360 | } |
| 361 | results.Print(name + " verify (same key)"); |
| 362 | |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 363 | if (!TimeFunctionParallel( |
| 364 | &results, [&key, &fake_sha256_hash, &sig, sig_len]() -> bool { |
| 365 | // Usually during RSA verification we have to parse an RSA key |
| 366 | // from a certificate or similar, in which case we'd need to |
| 367 | // construct a new RSA key, with a new |BN_MONT_CTX| for the |
| 368 | // public modulus. If we were to use |key| directly instead, then |
| 369 | // these costs wouldn't be accounted for. |
David Benjamin | d4553e0 | 2023-06-03 01:11:16 -0400 | [diff] [blame^] | 370 | bssl::UniquePtr<RSA> verify_key(RSA_new_public_key( |
| 371 | RSA_get0_n(key.get()), RSA_get0_e(key.get()))); |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 372 | if (!verify_key) { |
| 373 | return false; |
| 374 | } |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 375 | return RSA_verify(NID_sha256, fake_sha256_hash, |
| 376 | sizeof(fake_sha256_hash), sig, sig_len, |
| 377 | verify_key.get()); |
| 378 | })) { |
Daniel Hirche | 1414d86 | 2018-04-13 19:09:25 +0200 | [diff] [blame] | 379 | fprintf(stderr, "RSA_verify failed.\n"); |
| 380 | ERR_print_errors_fp(stderr); |
| 381 | return false; |
| 382 | } |
| 383 | results.Print(name + " verify (fresh key)"); |
David Benjamin | 417010f | 2021-06-30 17:41:42 -0400 | [diff] [blame] | 384 | |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 385 | if (!TimeFunctionParallel(&results, [&]() -> bool { |
David Benjamin | 417010f | 2021-06-30 17:41:42 -0400 | [diff] [blame] | 386 | return bssl::UniquePtr<RSA>(RSA_private_key_from_bytes( |
| 387 | kRSAKeys[i].key, kRSAKeys[i].key_len)) != nullptr; |
| 388 | })) { |
| 389 | fprintf(stderr, "Failed to parse %s key.\n", name.c_str()); |
| 390 | ERR_print_errors_fp(stderr); |
| 391 | return false; |
| 392 | } |
| 393 | results.Print(name + " private key parse"); |
Adam Langley | c5c0c7e | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 394 | } |
Adam Langley | c5c0c7e | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 395 | |
| 396 | return true; |
| 397 | } |
| 398 | |
Adam Langley | a0f1c8e | 2018-03-30 13:43:59 -0700 | [diff] [blame] | 399 | static bool SpeedRSAKeyGen(const std::string &selected) { |
| 400 | // Don't run this by default because it's so slow. |
| 401 | if (selected != "RSAKeyGen") { |
| 402 | return true; |
| 403 | } |
| 404 | |
| 405 | bssl::UniquePtr<BIGNUM> e(BN_new()); |
| 406 | if (!BN_set_word(e.get(), 65537)) { |
| 407 | return false; |
| 408 | } |
| 409 | |
| 410 | const std::vector<int> kSizes = {2048, 3072, 4096}; |
| 411 | for (int size : kSizes) { |
| 412 | const uint64_t start = time_now(); |
David Benjamin | 1a46f8f | 2022-11-23 13:10:15 -0500 | [diff] [blame] | 413 | uint64_t num_calls = 0; |
| 414 | uint64_t us; |
| 415 | std::vector<uint64_t> durations; |
Adam Langley | a0f1c8e | 2018-03-30 13:43:59 -0700 | [diff] [blame] | 416 | |
| 417 | for (;;) { |
| 418 | bssl::UniquePtr<RSA> rsa(RSA_new()); |
| 419 | |
| 420 | const uint64_t iteration_start = time_now(); |
| 421 | if (!RSA_generate_key_ex(rsa.get(), size, e.get(), nullptr)) { |
| 422 | fprintf(stderr, "RSA_generate_key_ex failed.\n"); |
| 423 | ERR_print_errors_fp(stderr); |
| 424 | return false; |
| 425 | } |
| 426 | const uint64_t iteration_end = time_now(); |
| 427 | |
| 428 | num_calls++; |
| 429 | durations.push_back(iteration_end - iteration_start); |
| 430 | |
| 431 | us = iteration_end - start; |
| 432 | if (us > 30 * 1000000 /* 30 secs */) { |
| 433 | break; |
| 434 | } |
| 435 | } |
| 436 | |
| 437 | std::sort(durations.begin(), durations.end()); |
Zola Bridges | f10ea55 | 2019-10-01 11:35:44 -0700 | [diff] [blame] | 438 | const std::string description = |
| 439 | std::string("RSA ") + std::to_string(size) + std::string(" key-gen"); |
| 440 | const TimeResults results = {num_calls, us}; |
| 441 | results.Print(description); |
Adam Langley | a0f1c8e | 2018-03-30 13:43:59 -0700 | [diff] [blame] | 442 | const size_t n = durations.size(); |
| 443 | assert(n > 0); |
David Benjamin | 6443173 | 2019-02-10 22:07:23 +0000 | [diff] [blame] | 444 | |
Zola Bridges | f10ea55 | 2019-10-01 11:35:44 -0700 | [diff] [blame] | 445 | // Distribution information is useful, but doesn't fit into the standard |
| 446 | // format used by |g_print_json|. |
| 447 | if (!g_print_json) { |
David Benjamin | 1a46f8f | 2022-11-23 13:10:15 -0500 | [diff] [blame] | 448 | uint64_t min = durations[0]; |
| 449 | uint64_t median = n & 1 ? durations[n / 2] |
Zola Bridges | f10ea55 | 2019-10-01 11:35:44 -0700 | [diff] [blame] | 450 | : (durations[n / 2 - 1] + durations[n / 2]) / 2; |
David Benjamin | 1a46f8f | 2022-11-23 13:10:15 -0500 | [diff] [blame] | 451 | uint64_t max = durations[n - 1]; |
| 452 | printf(" min: %" PRIu64 "us, median: %" PRIu64 "us, max: %" PRIu64 |
| 453 | "us\n", |
| 454 | min, median, max); |
Zola Bridges | f10ea55 | 2019-10-01 11:35:44 -0700 | [diff] [blame] | 455 | } |
Adam Langley | a0f1c8e | 2018-03-30 13:43:59 -0700 | [diff] [blame] | 456 | } |
| 457 | |
| 458 | return true; |
| 459 | } |
| 460 | |
David Benjamin | 6443173 | 2019-02-10 22:07:23 +0000 | [diff] [blame] | 461 | static std::string ChunkLenSuffix(size_t chunk_len) { |
| 462 | char buf[32]; |
| 463 | snprintf(buf, sizeof(buf), " (%zu byte%s)", chunk_len, |
| 464 | chunk_len != 1 ? "s" : ""); |
| 465 | return buf; |
| 466 | } |
| 467 | |
| 468 | static bool SpeedAEADChunk(const EVP_AEAD *aead, std::string name, |
Adam Langley | ba9557d | 2017-02-27 13:53:23 -0800 | [diff] [blame] | 469 | size_t chunk_len, size_t ad_len, |
| 470 | evp_aead_direction_t direction) { |
Adam Langley | 2672534 | 2015-01-28 15:52:57 -0800 | [diff] [blame] | 471 | static const unsigned kAlignment = 16; |
| 472 | |
David Benjamin | 6443173 | 2019-02-10 22:07:23 +0000 | [diff] [blame] | 473 | name += ChunkLenSuffix(chunk_len); |
David Benjamin | 0cce863 | 2016-10-20 15:13:26 -0400 | [diff] [blame] | 474 | bssl::ScopedEVP_AEAD_CTX ctx; |
Adam Langley | c5c0c7e | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 475 | const size_t key_len = EVP_AEAD_key_length(aead); |
| 476 | const size_t nonce_len = EVP_AEAD_nonce_length(aead); |
| 477 | const size_t overhead_len = EVP_AEAD_max_overhead(aead); |
| 478 | |
| 479 | std::unique_ptr<uint8_t[]> key(new uint8_t[key_len]); |
David Benjamin | 17cf2cb | 2016-12-13 01:07:13 -0500 | [diff] [blame] | 480 | OPENSSL_memset(key.get(), 0, key_len); |
Adam Langley | c5c0c7e | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 481 | std::unique_ptr<uint8_t[]> nonce(new uint8_t[nonce_len]); |
David Benjamin | 17cf2cb | 2016-12-13 01:07:13 -0500 | [diff] [blame] | 482 | OPENSSL_memset(nonce.get(), 0, nonce_len); |
Brian Smith | 1d1562d | 2015-03-17 00:32:20 -1000 | [diff] [blame] | 483 | std::unique_ptr<uint8_t[]> in_storage(new uint8_t[chunk_len + kAlignment]); |
Martin Kreichgauer | dc110f5 | 2017-08-02 15:40:09 -0700 | [diff] [blame] | 484 | // N.B. for EVP_AEAD_CTX_seal_scatter the input and output buffers may be the |
| 485 | // same size. However, in the direction == evp_aead_open case we still use |
| 486 | // non-scattering seal, hence we add overhead_len to the size of this buffer. |
| 487 | std::unique_ptr<uint8_t[]> out_storage( |
| 488 | new uint8_t[chunk_len + overhead_len + kAlignment]); |
David Benjamin | c93724b | 2018-05-21 17:14:05 -0400 | [diff] [blame] | 489 | std::unique_ptr<uint8_t[]> in2_storage( |
| 490 | new uint8_t[chunk_len + overhead_len + kAlignment]); |
Adam Langley | e762434 | 2015-01-15 17:33:48 -0800 | [diff] [blame] | 491 | std::unique_ptr<uint8_t[]> ad(new uint8_t[ad_len]); |
David Benjamin | 17cf2cb | 2016-12-13 01:07:13 -0500 | [diff] [blame] | 492 | OPENSSL_memset(ad.get(), 0, ad_len); |
Martin Kreichgauer | dc110f5 | 2017-08-02 15:40:09 -0700 | [diff] [blame] | 493 | std::unique_ptr<uint8_t[]> tag_storage( |
| 494 | new uint8_t[overhead_len + kAlignment]); |
| 495 | |
Adam Langley | c5c0c7e | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 496 | |
David Benjamin | ecc301c | 2021-07-02 12:30:40 -0400 | [diff] [blame] | 497 | uint8_t *const in = |
| 498 | static_cast<uint8_t *>(align_pointer(in_storage.get(), kAlignment)); |
David Benjamin | 17cf2cb | 2016-12-13 01:07:13 -0500 | [diff] [blame] | 499 | OPENSSL_memset(in, 0, chunk_len); |
David Benjamin | ecc301c | 2021-07-02 12:30:40 -0400 | [diff] [blame] | 500 | uint8_t *const out = |
| 501 | static_cast<uint8_t *>(align_pointer(out_storage.get(), kAlignment)); |
David Benjamin | 17cf2cb | 2016-12-13 01:07:13 -0500 | [diff] [blame] | 502 | OPENSSL_memset(out, 0, chunk_len + overhead_len); |
David Benjamin | ecc301c | 2021-07-02 12:30:40 -0400 | [diff] [blame] | 503 | uint8_t *const tag = |
| 504 | static_cast<uint8_t *>(align_pointer(tag_storage.get(), kAlignment)); |
Martin Kreichgauer | dc110f5 | 2017-08-02 15:40:09 -0700 | [diff] [blame] | 505 | OPENSSL_memset(tag, 0, overhead_len); |
David Benjamin | ecc301c | 2021-07-02 12:30:40 -0400 | [diff] [blame] | 506 | uint8_t *const in2 = |
| 507 | static_cast<uint8_t *>(align_pointer(in2_storage.get(), kAlignment)); |
Adam Langley | 2672534 | 2015-01-28 15:52:57 -0800 | [diff] [blame] | 508 | |
David Benjamin | 0cce863 | 2016-10-20 15:13:26 -0400 | [diff] [blame] | 509 | if (!EVP_AEAD_CTX_init_with_direction(ctx.get(), aead, key.get(), key_len, |
David Benjamin | d434f28 | 2015-03-17 18:28:37 -0400 | [diff] [blame] | 510 | EVP_AEAD_DEFAULT_TAG_LENGTH, |
| 511 | evp_aead_seal)) { |
Adam Langley | c5c0c7e | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 512 | fprintf(stderr, "Failed to create EVP_AEAD_CTX.\n"); |
Brian Smith | 83a8298 | 2015-04-09 16:21:10 -1000 | [diff] [blame] | 513 | ERR_print_errors_fp(stderr); |
Adam Langley | c5c0c7e | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 514 | return false; |
| 515 | } |
| 516 | |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 517 | // TODO(davidben): In most cases, this can be |TimeFunctionParallel|, but a |
| 518 | // few stateful AEADs must be run serially. |
Adam Langley | c5c0c7e | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 519 | TimeResults results; |
Adam Langley | ba9557d | 2017-02-27 13:53:23 -0800 | [diff] [blame] | 520 | if (direction == evp_aead_seal) { |
Martin Kreichgauer | dc110f5 | 2017-08-02 15:40:09 -0700 | [diff] [blame] | 521 | if (!TimeFunction(&results, |
| 522 | [chunk_len, nonce_len, ad_len, overhead_len, in, out, tag, |
| 523 | &ctx, &nonce, &ad]() -> bool { |
| 524 | size_t tag_len; |
| 525 | return EVP_AEAD_CTX_seal_scatter( |
| 526 | ctx.get(), out, tag, &tag_len, overhead_len, |
| 527 | nonce.get(), nonce_len, in, chunk_len, nullptr, 0, |
| 528 | ad.get(), ad_len); |
| 529 | })) { |
Adam Langley | ba9557d | 2017-02-27 13:53:23 -0800 | [diff] [blame] | 530 | fprintf(stderr, "EVP_AEAD_CTX_seal failed.\n"); |
| 531 | ERR_print_errors_fp(stderr); |
| 532 | return false; |
| 533 | } |
| 534 | } else { |
| 535 | size_t out_len; |
| 536 | EVP_AEAD_CTX_seal(ctx.get(), out, &out_len, chunk_len + overhead_len, |
| 537 | nonce.get(), nonce_len, in, chunk_len, ad.get(), ad_len); |
| 538 | |
David Benjamin | c93724b | 2018-05-21 17:14:05 -0400 | [diff] [blame] | 539 | ctx.Reset(); |
| 540 | if (!EVP_AEAD_CTX_init_with_direction(ctx.get(), aead, key.get(), key_len, |
| 541 | EVP_AEAD_DEFAULT_TAG_LENGTH, |
| 542 | evp_aead_open)) { |
| 543 | fprintf(stderr, "Failed to create EVP_AEAD_CTX.\n"); |
| 544 | ERR_print_errors_fp(stderr); |
| 545 | return false; |
| 546 | } |
| 547 | |
Martin Kreichgauer | dc110f5 | 2017-08-02 15:40:09 -0700 | [diff] [blame] | 548 | if (!TimeFunction(&results, |
David Benjamin | c93724b | 2018-05-21 17:14:05 -0400 | [diff] [blame] | 549 | [chunk_len, overhead_len, nonce_len, ad_len, in2, out, |
| 550 | out_len, &ctx, &nonce, &ad]() -> bool { |
Martin Kreichgauer | dc110f5 | 2017-08-02 15:40:09 -0700 | [diff] [blame] | 551 | size_t in2_len; |
| 552 | // N.B. EVP_AEAD_CTX_open_gather is not implemented for |
| 553 | // all AEADs. |
David Benjamin | c93724b | 2018-05-21 17:14:05 -0400 | [diff] [blame] | 554 | return EVP_AEAD_CTX_open(ctx.get(), in2, &in2_len, |
| 555 | chunk_len + overhead_len, |
| 556 | nonce.get(), nonce_len, out, |
| 557 | out_len, ad.get(), ad_len); |
Martin Kreichgauer | dc110f5 | 2017-08-02 15:40:09 -0700 | [diff] [blame] | 558 | })) { |
Adam Langley | ba9557d | 2017-02-27 13:53:23 -0800 | [diff] [blame] | 559 | fprintf(stderr, "EVP_AEAD_CTX_open failed.\n"); |
| 560 | ERR_print_errors_fp(stderr); |
| 561 | return false; |
| 562 | } |
Adam Langley | c5c0c7e | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 563 | } |
| 564 | |
Adam Langley | ba9557d | 2017-02-27 13:53:23 -0800 | [diff] [blame] | 565 | results.PrintWithBytes( |
| 566 | name + (direction == evp_aead_seal ? " seal" : " open"), chunk_len); |
Adam Langley | c5c0c7e | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 567 | return true; |
| 568 | } |
| 569 | |
Adam Langley | e762434 | 2015-01-15 17:33:48 -0800 | [diff] [blame] | 570 | static bool SpeedAEAD(const EVP_AEAD *aead, const std::string &name, |
Adam Langley | 90b5840 | 2015-04-13 11:04:18 -0700 | [diff] [blame] | 571 | size_t ad_len, const std::string &selected) { |
| 572 | if (!selected.empty() && name.find(selected) == std::string::npos) { |
| 573 | return true; |
| 574 | } |
| 575 | |
David Benjamin | 6443173 | 2019-02-10 22:07:23 +0000 | [diff] [blame] | 576 | for (size_t chunk_len : g_chunk_lengths) { |
| 577 | if (!SpeedAEADChunk(aead, name, chunk_len, ad_len, evp_aead_seal)) { |
| 578 | return false; |
| 579 | } |
| 580 | } |
| 581 | return true; |
Adam Langley | c5c0c7e | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 582 | } |
| 583 | |
Adam Langley | ba9557d | 2017-02-27 13:53:23 -0800 | [diff] [blame] | 584 | static bool SpeedAEADOpen(const EVP_AEAD *aead, const std::string &name, |
| 585 | size_t ad_len, const std::string &selected) { |
| 586 | if (!selected.empty() && name.find(selected) == std::string::npos) { |
| 587 | return true; |
| 588 | } |
| 589 | |
David Benjamin | 6443173 | 2019-02-10 22:07:23 +0000 | [diff] [blame] | 590 | for (size_t chunk_len : g_chunk_lengths) { |
| 591 | if (!SpeedAEADChunk(aead, name, chunk_len, ad_len, evp_aead_open)) { |
| 592 | return false; |
| 593 | } |
| 594 | } |
| 595 | |
| 596 | return true; |
Adam Langley | ba9557d | 2017-02-27 13:53:23 -0800 | [diff] [blame] | 597 | } |
Adam Langley | ba9557d | 2017-02-27 13:53:23 -0800 | [diff] [blame] | 598 | |
David Benjamin | 25e36da | 2019-08-31 13:25:15 -0400 | [diff] [blame] | 599 | static bool SpeedAESBlock(const std::string &name, unsigned bits, |
| 600 | const std::string &selected) { |
| 601 | if (!selected.empty() && name.find(selected) == std::string::npos) { |
| 602 | return true; |
| 603 | } |
| 604 | |
| 605 | static const uint8_t kZero[32] = {0}; |
| 606 | |
| 607 | { |
| 608 | TimeResults results; |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 609 | if (!TimeFunctionParallel(&results, [&]() -> bool { |
David Benjamin | 25e36da | 2019-08-31 13:25:15 -0400 | [diff] [blame] | 610 | AES_KEY key; |
| 611 | return AES_set_encrypt_key(kZero, bits, &key) == 0; |
| 612 | })) { |
| 613 | fprintf(stderr, "AES_set_encrypt_key failed.\n"); |
| 614 | return false; |
| 615 | } |
| 616 | results.Print(name + " encrypt setup"); |
| 617 | } |
| 618 | |
| 619 | { |
| 620 | AES_KEY key; |
| 621 | if (AES_set_encrypt_key(kZero, bits, &key) != 0) { |
| 622 | return false; |
| 623 | } |
| 624 | uint8_t block[16] = {0}; |
| 625 | TimeResults results; |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 626 | if (!TimeFunctionParallel(&results, [&]() -> bool { |
David Benjamin | 25e36da | 2019-08-31 13:25:15 -0400 | [diff] [blame] | 627 | AES_encrypt(block, block, &key); |
| 628 | return true; |
| 629 | })) { |
| 630 | fprintf(stderr, "AES_encrypt failed.\n"); |
| 631 | return false; |
| 632 | } |
| 633 | results.Print(name + " encrypt"); |
| 634 | } |
| 635 | |
| 636 | { |
| 637 | TimeResults results; |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 638 | if (!TimeFunctionParallel(&results, [&]() -> bool { |
David Benjamin | 25e36da | 2019-08-31 13:25:15 -0400 | [diff] [blame] | 639 | AES_KEY key; |
| 640 | return AES_set_decrypt_key(kZero, bits, &key) == 0; |
| 641 | })) { |
| 642 | fprintf(stderr, "AES_set_decrypt_key failed.\n"); |
| 643 | return false; |
| 644 | } |
| 645 | results.Print(name + " decrypt setup"); |
| 646 | } |
| 647 | |
| 648 | { |
| 649 | AES_KEY key; |
| 650 | if (AES_set_decrypt_key(kZero, bits, &key) != 0) { |
| 651 | return false; |
| 652 | } |
| 653 | uint8_t block[16] = {0}; |
| 654 | TimeResults results; |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 655 | if (!TimeFunctionParallel(&results, [&]() -> bool { |
David Benjamin | 25e36da | 2019-08-31 13:25:15 -0400 | [diff] [blame] | 656 | AES_decrypt(block, block, &key); |
| 657 | return true; |
| 658 | })) { |
| 659 | fprintf(stderr, "AES_decrypt failed.\n"); |
| 660 | return false; |
| 661 | } |
| 662 | results.Print(name + " decrypt"); |
| 663 | } |
| 664 | |
| 665 | return true; |
| 666 | } |
| 667 | |
David Benjamin | 6443173 | 2019-02-10 22:07:23 +0000 | [diff] [blame] | 668 | static bool SpeedHashChunk(const EVP_MD *md, std::string name, |
Adam Langley | 006779a | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 669 | size_t chunk_len) { |
David Benjamin | 345c86b | 2022-01-23 11:11:17 -0500 | [diff] [blame] | 670 | uint8_t input[16384] = {0}; |
Adam Langley | 006779a | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 671 | |
David Benjamin | 345c86b | 2022-01-23 11:11:17 -0500 | [diff] [blame] | 672 | if (chunk_len > sizeof(input)) { |
Adam Langley | 006779a | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 673 | return false; |
| 674 | } |
| 675 | |
David Benjamin | 6443173 | 2019-02-10 22:07:23 +0000 | [diff] [blame] | 676 | name += ChunkLenSuffix(chunk_len); |
Adam Langley | 006779a | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 677 | TimeResults results; |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 678 | if (!TimeFunctionParallel(&results, [md, chunk_len, &input]() -> bool { |
Adam Langley | 006779a | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 679 | uint8_t digest[EVP_MAX_MD_SIZE]; |
| 680 | unsigned int md_len; |
| 681 | |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 682 | bssl::ScopedEVP_MD_CTX ctx; |
Daniel Hirche | 1414d86 | 2018-04-13 19:09:25 +0200 | [diff] [blame] | 683 | return EVP_DigestInit_ex(ctx.get(), md, NULL /* ENGINE */) && |
David Benjamin | 345c86b | 2022-01-23 11:11:17 -0500 | [diff] [blame] | 684 | EVP_DigestUpdate(ctx.get(), input, chunk_len) && |
Daniel Hirche | 1414d86 | 2018-04-13 19:09:25 +0200 | [diff] [blame] | 685 | EVP_DigestFinal_ex(ctx.get(), digest, &md_len); |
Adam Langley | 006779a | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 686 | })) { |
| 687 | fprintf(stderr, "EVP_DigestInit_ex failed.\n"); |
Brian Smith | 83a8298 | 2015-04-09 16:21:10 -1000 | [diff] [blame] | 688 | ERR_print_errors_fp(stderr); |
Adam Langley | 006779a | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 689 | return false; |
| 690 | } |
| 691 | |
| 692 | results.PrintWithBytes(name, chunk_len); |
Adam Langley | 006779a | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 693 | return true; |
| 694 | } |
David Benjamin | 6443173 | 2019-02-10 22:07:23 +0000 | [diff] [blame] | 695 | |
Adam Langley | 90b5840 | 2015-04-13 11:04:18 -0700 | [diff] [blame] | 696 | static bool SpeedHash(const EVP_MD *md, const std::string &name, |
| 697 | const std::string &selected) { |
| 698 | if (!selected.empty() && name.find(selected) == std::string::npos) { |
| 699 | return true; |
| 700 | } |
| 701 | |
David Benjamin | 6443173 | 2019-02-10 22:07:23 +0000 | [diff] [blame] | 702 | for (size_t chunk_len : g_chunk_lengths) { |
| 703 | if (!SpeedHashChunk(md, name, chunk_len)) { |
| 704 | return false; |
| 705 | } |
| 706 | } |
| 707 | |
| 708 | return true; |
Adam Langley | 006779a | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 709 | } |
| 710 | |
David Benjamin | 6443173 | 2019-02-10 22:07:23 +0000 | [diff] [blame] | 711 | static bool SpeedRandomChunk(std::string name, size_t chunk_len) { |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 712 | static constexpr size_t kMaxChunk = 16384; |
| 713 | if (chunk_len > kMaxChunk) { |
Adam Langley | 90b5840 | 2015-04-13 11:04:18 -0700 | [diff] [blame] | 714 | return false; |
| 715 | } |
| 716 | |
David Benjamin | 6443173 | 2019-02-10 22:07:23 +0000 | [diff] [blame] | 717 | name += ChunkLenSuffix(chunk_len); |
Adam Langley | 90b5840 | 2015-04-13 11:04:18 -0700 | [diff] [blame] | 718 | TimeResults results; |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 719 | if (!TimeFunctionParallel(&results, [chunk_len]() -> bool { |
| 720 | uint8_t scratch[kMaxChunk]; |
Adam Langley | 90b5840 | 2015-04-13 11:04:18 -0700 | [diff] [blame] | 721 | RAND_bytes(scratch, chunk_len); |
| 722 | return true; |
| 723 | })) { |
| 724 | return false; |
| 725 | } |
| 726 | |
| 727 | results.PrintWithBytes(name, chunk_len); |
| 728 | return true; |
| 729 | } |
| 730 | |
| 731 | static bool SpeedRandom(const std::string &selected) { |
| 732 | if (!selected.empty() && selected != "RNG") { |
| 733 | return true; |
| 734 | } |
| 735 | |
David Benjamin | 6443173 | 2019-02-10 22:07:23 +0000 | [diff] [blame] | 736 | for (size_t chunk_len : g_chunk_lengths) { |
| 737 | if (!SpeedRandomChunk("RNG", chunk_len)) { |
| 738 | return false; |
| 739 | } |
| 740 | } |
| 741 | |
| 742 | return true; |
Adam Langley | 90b5840 | 2015-04-13 11:04:18 -0700 | [diff] [blame] | 743 | } |
| 744 | |
Adam Langley | ad6b28e | 2015-04-14 12:07:44 -0700 | [diff] [blame] | 745 | static bool SpeedECDHCurve(const std::string &name, int nid, |
| 746 | const std::string &selected) { |
| 747 | if (!selected.empty() && name.find(selected) == std::string::npos) { |
| 748 | return true; |
| 749 | } |
| 750 | |
David Benjamin | 88b1a37 | 2018-03-31 23:56:13 -0400 | [diff] [blame] | 751 | bssl::UniquePtr<EC_KEY> peer_key(EC_KEY_new_by_curve_name(nid)); |
| 752 | if (!peer_key || |
| 753 | !EC_KEY_generate_key(peer_key.get())) { |
| 754 | return false; |
| 755 | } |
| 756 | |
| 757 | size_t peer_value_len = EC_POINT_point2oct( |
| 758 | EC_KEY_get0_group(peer_key.get()), EC_KEY_get0_public_key(peer_key.get()), |
| 759 | POINT_CONVERSION_UNCOMPRESSED, nullptr, 0, nullptr); |
| 760 | if (peer_value_len == 0) { |
| 761 | return false; |
| 762 | } |
| 763 | std::unique_ptr<uint8_t[]> peer_value(new uint8_t[peer_value_len]); |
| 764 | peer_value_len = EC_POINT_point2oct( |
| 765 | EC_KEY_get0_group(peer_key.get()), EC_KEY_get0_public_key(peer_key.get()), |
| 766 | POINT_CONVERSION_UNCOMPRESSED, peer_value.get(), peer_value_len, nullptr); |
| 767 | if (peer_value_len == 0) { |
| 768 | return false; |
| 769 | } |
| 770 | |
Adam Langley | ad6b28e | 2015-04-14 12:07:44 -0700 | [diff] [blame] | 771 | TimeResults results; |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 772 | if (!TimeFunctionParallel( |
| 773 | &results, [nid, peer_value_len, &peer_value]() -> bool { |
| 774 | bssl::UniquePtr<EC_KEY> key(EC_KEY_new_by_curve_name(nid)); |
| 775 | if (!key || !EC_KEY_generate_key(key.get())) { |
| 776 | return false; |
| 777 | } |
| 778 | const EC_GROUP *const group = EC_KEY_get0_group(key.get()); |
| 779 | bssl::UniquePtr<EC_POINT> point(EC_POINT_new(group)); |
| 780 | bssl::UniquePtr<EC_POINT> peer_point(EC_POINT_new(group)); |
| 781 | bssl::UniquePtr<BN_CTX> ctx(BN_CTX_new()); |
| 782 | bssl::UniquePtr<BIGNUM> x(BN_new()); |
| 783 | if (!point || !peer_point || !ctx || !x || |
| 784 | !EC_POINT_oct2point(group, peer_point.get(), peer_value.get(), |
| 785 | peer_value_len, ctx.get()) || |
| 786 | !EC_POINT_mul(group, point.get(), nullptr, peer_point.get(), |
| 787 | EC_KEY_get0_private_key(key.get()), ctx.get()) || |
| 788 | !EC_POINT_get_affine_coordinates_GFp( |
| 789 | group, point.get(), x.get(), nullptr, ctx.get())) { |
| 790 | return false; |
| 791 | } |
Adam Langley | ad6b28e | 2015-04-14 12:07:44 -0700 | [diff] [blame] | 792 | |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 793 | return true; |
| 794 | })) { |
Adam Langley | ad6b28e | 2015-04-14 12:07:44 -0700 | [diff] [blame] | 795 | return false; |
| 796 | } |
| 797 | |
| 798 | results.Print(name); |
| 799 | return true; |
| 800 | } |
| 801 | |
| 802 | static bool SpeedECDSACurve(const std::string &name, int nid, |
| 803 | const std::string &selected) { |
| 804 | if (!selected.empty() && name.find(selected) == std::string::npos) { |
| 805 | return true; |
| 806 | } |
| 807 | |
Matt Braithwaite | d17d74d | 2016-08-17 20:10:28 -0700 | [diff] [blame] | 808 | bssl::UniquePtr<EC_KEY> key(EC_KEY_new_by_curve_name(nid)); |
Adam Langley | ad6b28e | 2015-04-14 12:07:44 -0700 | [diff] [blame] | 809 | if (!key || |
| 810 | !EC_KEY_generate_key(key.get())) { |
| 811 | return false; |
| 812 | } |
| 813 | |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 814 | static constexpr size_t kMaxSignature = 256; |
| 815 | if (ECDSA_size(key.get()) > kMaxSignature) { |
| 816 | abort(); |
Adam Langley | ad6b28e | 2015-04-14 12:07:44 -0700 | [diff] [blame] | 817 | } |
| 818 | uint8_t digest[20]; |
David Benjamin | 17cf2cb | 2016-12-13 01:07:13 -0500 | [diff] [blame] | 819 | OPENSSL_memset(digest, 42, sizeof(digest)); |
Adam Langley | ad6b28e | 2015-04-14 12:07:44 -0700 | [diff] [blame] | 820 | |
| 821 | TimeResults results; |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 822 | if (!TimeFunctionParallel(&results, [&key, &digest]() -> bool { |
| 823 | uint8_t out[kMaxSignature]; |
| 824 | unsigned out_len; |
| 825 | return ECDSA_sign(0, digest, sizeof(digest), out, &out_len, |
Adam Langley | ad6b28e | 2015-04-14 12:07:44 -0700 | [diff] [blame] | 826 | key.get()) == 1; |
| 827 | })) { |
| 828 | return false; |
| 829 | } |
| 830 | |
| 831 | results.Print(name + " signing"); |
| 832 | |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 833 | uint8_t signature[kMaxSignature]; |
| 834 | unsigned sig_len; |
| 835 | if (!ECDSA_sign(0, digest, sizeof(digest), signature, &sig_len, key.get())) { |
| 836 | return false; |
| 837 | } |
| 838 | |
| 839 | if (!TimeFunctionParallel( |
| 840 | &results, [&key, &signature, &digest, sig_len]() -> bool { |
| 841 | return ECDSA_verify(0, digest, sizeof(digest), signature, sig_len, |
| 842 | key.get()) == 1; |
| 843 | })) { |
Adam Langley | ad6b28e | 2015-04-14 12:07:44 -0700 | [diff] [blame] | 844 | return false; |
| 845 | } |
| 846 | |
| 847 | results.Print(name + " verify"); |
| 848 | |
| 849 | return true; |
| 850 | } |
| 851 | |
| 852 | static bool SpeedECDH(const std::string &selected) { |
| 853 | return SpeedECDHCurve("ECDH P-224", NID_secp224r1, selected) && |
| 854 | SpeedECDHCurve("ECDH P-256", NID_X9_62_prime256v1, selected) && |
| 855 | SpeedECDHCurve("ECDH P-384", NID_secp384r1, selected) && |
| 856 | SpeedECDHCurve("ECDH P-521", NID_secp521r1, selected); |
| 857 | } |
| 858 | |
| 859 | static bool SpeedECDSA(const std::string &selected) { |
| 860 | return SpeedECDSACurve("ECDSA P-224", NID_secp224r1, selected) && |
| 861 | SpeedECDSACurve("ECDSA P-256", NID_X9_62_prime256v1, selected) && |
| 862 | SpeedECDSACurve("ECDSA P-384", NID_secp384r1, selected) && |
| 863 | SpeedECDSACurve("ECDSA P-521", NID_secp521r1, selected); |
| 864 | } |
| 865 | |
Adam Langley | 4fb0dc4 | 2015-11-13 13:09:47 -0800 | [diff] [blame] | 866 | static bool Speed25519(const std::string &selected) { |
| 867 | if (!selected.empty() && selected.find("25519") == std::string::npos) { |
| 868 | return true; |
| 869 | } |
| 870 | |
| 871 | TimeResults results; |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 872 | if (!TimeFunctionParallel(&results, []() -> bool { |
| 873 | uint8_t public_key[32], private_key[64]; |
Adam Langley | 4fb0dc4 | 2015-11-13 13:09:47 -0800 | [diff] [blame] | 874 | ED25519_keypair(public_key, private_key); |
| 875 | return true; |
| 876 | })) { |
| 877 | return false; |
| 878 | } |
| 879 | |
| 880 | results.Print("Ed25519 key generation"); |
| 881 | |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 882 | uint8_t public_key[32], private_key[64]; |
| 883 | ED25519_keypair(public_key, private_key); |
Adam Langley | 4fb0dc4 | 2015-11-13 13:09:47 -0800 | [diff] [blame] | 884 | static const uint8_t kMessage[] = {0, 1, 2, 3, 4, 5}; |
Adam Langley | 4fb0dc4 | 2015-11-13 13:09:47 -0800 | [diff] [blame] | 885 | |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 886 | if (!TimeFunctionParallel(&results, [&private_key]() -> bool { |
| 887 | uint8_t out[64]; |
| 888 | return ED25519_sign(out, kMessage, sizeof(kMessage), private_key) == 1; |
Adam Langley | 4fb0dc4 | 2015-11-13 13:09:47 -0800 | [diff] [blame] | 889 | })) { |
| 890 | return false; |
| 891 | } |
| 892 | |
| 893 | results.Print("Ed25519 signing"); |
| 894 | |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 895 | uint8_t signature[64]; |
| 896 | if (!ED25519_sign(signature, kMessage, sizeof(kMessage), private_key)) { |
| 897 | return false; |
| 898 | } |
| 899 | |
| 900 | if (!TimeFunctionParallel(&results, [&public_key, &signature]() -> bool { |
Adam Langley | 4fb0dc4 | 2015-11-13 13:09:47 -0800 | [diff] [blame] | 901 | return ED25519_verify(kMessage, sizeof(kMessage), signature, |
| 902 | public_key) == 1; |
| 903 | })) { |
| 904 | fprintf(stderr, "Ed25519 verify failed.\n"); |
| 905 | return false; |
| 906 | } |
| 907 | |
| 908 | results.Print("Ed25519 verify"); |
Adam Langley | 4fb0dc4 | 2015-11-13 13:09:47 -0800 | [diff] [blame] | 909 | |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 910 | if (!TimeFunctionParallel(&results, []() -> bool { |
Adam Langley | 4fb0dc4 | 2015-11-13 13:09:47 -0800 | [diff] [blame] | 911 | uint8_t out[32], in[32]; |
David Benjamin | 17cf2cb | 2016-12-13 01:07:13 -0500 | [diff] [blame] | 912 | OPENSSL_memset(in, 0, sizeof(in)); |
Adam Langley | 4fb0dc4 | 2015-11-13 13:09:47 -0800 | [diff] [blame] | 913 | X25519_public_from_private(out, in); |
| 914 | return true; |
| 915 | })) { |
| 916 | fprintf(stderr, "Curve25519 base-point multiplication failed.\n"); |
| 917 | return false; |
| 918 | } |
| 919 | |
| 920 | results.Print("Curve25519 base-point multiplication"); |
| 921 | |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 922 | if (!TimeFunctionParallel(&results, []() -> bool { |
Adam Langley | 4fb0dc4 | 2015-11-13 13:09:47 -0800 | [diff] [blame] | 923 | uint8_t out[32], in1[32], in2[32]; |
David Benjamin | 17cf2cb | 2016-12-13 01:07:13 -0500 | [diff] [blame] | 924 | OPENSSL_memset(in1, 0, sizeof(in1)); |
| 925 | OPENSSL_memset(in2, 0, sizeof(in2)); |
Adam Langley | 3ac32b1 | 2015-11-17 15:15:05 -0800 | [diff] [blame] | 926 | in1[0] = 1; |
| 927 | in2[0] = 9; |
Adam Langley | 4fb0dc4 | 2015-11-13 13:09:47 -0800 | [diff] [blame] | 928 | return X25519(out, in1, in2) == 1; |
| 929 | })) { |
| 930 | fprintf(stderr, "Curve25519 arbitrary point multiplication failed.\n"); |
| 931 | return false; |
| 932 | } |
| 933 | |
| 934 | results.Print("Curve25519 arbitrary point multiplication"); |
| 935 | |
| 936 | return true; |
| 937 | } |
| 938 | |
Arnar Birgisson | f27459e | 2016-02-09 18:09:00 -0800 | [diff] [blame] | 939 | static bool SpeedSPAKE2(const std::string &selected) { |
| 940 | if (!selected.empty() && selected.find("SPAKE2") == std::string::npos) { |
| 941 | return true; |
| 942 | } |
| 943 | |
| 944 | TimeResults results; |
| 945 | |
| 946 | static const uint8_t kAliceName[] = {'A'}; |
| 947 | static const uint8_t kBobName[] = {'B'}; |
| 948 | static const uint8_t kPassword[] = "password"; |
Matt Braithwaite | d17d74d | 2016-08-17 20:10:28 -0700 | [diff] [blame] | 949 | bssl::UniquePtr<SPAKE2_CTX> alice(SPAKE2_CTX_new(spake2_role_alice, |
| 950 | kAliceName, sizeof(kAliceName), kBobName, |
| 951 | sizeof(kBobName))); |
Arnar Birgisson | f27459e | 2016-02-09 18:09:00 -0800 | [diff] [blame] | 952 | uint8_t alice_msg[SPAKE2_MAX_MSG_SIZE]; |
| 953 | size_t alice_msg_len; |
| 954 | |
| 955 | if (!SPAKE2_generate_msg(alice.get(), alice_msg, &alice_msg_len, |
| 956 | sizeof(alice_msg), |
| 957 | kPassword, sizeof(kPassword))) { |
| 958 | fprintf(stderr, "SPAKE2_generate_msg failed.\n"); |
| 959 | return false; |
| 960 | } |
| 961 | |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 962 | if (!TimeFunctionParallel(&results, [&alice_msg, alice_msg_len]() -> bool { |
| 963 | bssl::UniquePtr<SPAKE2_CTX> bob( |
| 964 | SPAKE2_CTX_new(spake2_role_bob, kBobName, sizeof(kBobName), |
| 965 | kAliceName, sizeof(kAliceName))); |
Arnar Birgisson | f27459e | 2016-02-09 18:09:00 -0800 | [diff] [blame] | 966 | uint8_t bob_msg[SPAKE2_MAX_MSG_SIZE], bob_key[64]; |
| 967 | size_t bob_msg_len, bob_key_len; |
| 968 | if (!SPAKE2_generate_msg(bob.get(), bob_msg, &bob_msg_len, |
| 969 | sizeof(bob_msg), kPassword, |
| 970 | sizeof(kPassword)) || |
| 971 | !SPAKE2_process_msg(bob.get(), bob_key, &bob_key_len, |
| 972 | sizeof(bob_key), alice_msg, alice_msg_len)) { |
| 973 | return false; |
| 974 | } |
| 975 | |
| 976 | return true; |
| 977 | })) { |
| 978 | fprintf(stderr, "SPAKE2 failed.\n"); |
| 979 | } |
| 980 | |
| 981 | results.Print("SPAKE2 over Ed25519"); |
| 982 | |
| 983 | return true; |
| 984 | } |
| 985 | |
David Benjamin | b529253 | 2017-06-09 19:27:37 -0400 | [diff] [blame] | 986 | static bool SpeedScrypt(const std::string &selected) { |
| 987 | if (!selected.empty() && selected.find("scrypt") == std::string::npos) { |
| 988 | return true; |
| 989 | } |
| 990 | |
| 991 | TimeResults results; |
| 992 | |
| 993 | static const char kPassword[] = "password"; |
| 994 | static const uint8_t kSalt[] = "NaCl"; |
| 995 | |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 996 | if (!TimeFunctionParallel(&results, [&]() -> bool { |
David Benjamin | b529253 | 2017-06-09 19:27:37 -0400 | [diff] [blame] | 997 | uint8_t out[64]; |
| 998 | return !!EVP_PBE_scrypt(kPassword, sizeof(kPassword) - 1, kSalt, |
| 999 | sizeof(kSalt) - 1, 1024, 8, 16, 0 /* max_mem */, |
| 1000 | out, sizeof(out)); |
| 1001 | })) { |
| 1002 | fprintf(stderr, "scrypt failed.\n"); |
| 1003 | return false; |
| 1004 | } |
| 1005 | results.Print("scrypt (N = 1024, r = 8, p = 16)"); |
| 1006 | |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 1007 | if (!TimeFunctionParallel(&results, [&]() -> bool { |
David Benjamin | b529253 | 2017-06-09 19:27:37 -0400 | [diff] [blame] | 1008 | uint8_t out[64]; |
| 1009 | return !!EVP_PBE_scrypt(kPassword, sizeof(kPassword) - 1, kSalt, |
| 1010 | sizeof(kSalt) - 1, 16384, 8, 1, 0 /* max_mem */, |
| 1011 | out, sizeof(out)); |
| 1012 | })) { |
| 1013 | fprintf(stderr, "scrypt failed.\n"); |
| 1014 | return false; |
| 1015 | } |
| 1016 | results.Print("scrypt (N = 16384, r = 8, p = 1)"); |
| 1017 | |
| 1018 | return true; |
| 1019 | } |
| 1020 | |
Adam Langley | 7b93593 | 2018-11-12 13:53:42 -0800 | [diff] [blame] | 1021 | static bool SpeedHRSS(const std::string &selected) { |
| 1022 | if (!selected.empty() && selected != "HRSS") { |
| 1023 | return true; |
| 1024 | } |
| 1025 | |
| 1026 | TimeResults results; |
| 1027 | |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 1028 | if (!TimeFunctionParallel(&results, []() -> bool { |
Adam Langley | 7153013 | 2021-06-30 16:33:47 -0700 | [diff] [blame] | 1029 | struct HRSS_public_key pub; |
| 1030 | struct HRSS_private_key priv; |
| 1031 | uint8_t entropy[HRSS_GENERATE_KEY_BYTES]; |
| 1032 | RAND_bytes(entropy, sizeof(entropy)); |
| 1033 | return HRSS_generate_key(&pub, &priv, entropy); |
| 1034 | })) { |
Adam Langley | 7b93593 | 2018-11-12 13:53:42 -0800 | [diff] [blame] | 1035 | fprintf(stderr, "Failed to time HRSS_generate_key.\n"); |
| 1036 | return false; |
| 1037 | } |
| 1038 | |
| 1039 | results.Print("HRSS generate"); |
| 1040 | |
| 1041 | struct HRSS_public_key pub; |
| 1042 | struct HRSS_private_key priv; |
| 1043 | uint8_t key_entropy[HRSS_GENERATE_KEY_BYTES]; |
| 1044 | RAND_bytes(key_entropy, sizeof(key_entropy)); |
Adam Langley | 7153013 | 2021-06-30 16:33:47 -0700 | [diff] [blame] | 1045 | if (!HRSS_generate_key(&pub, &priv, key_entropy)) { |
| 1046 | return false; |
| 1047 | } |
Adam Langley | 7b93593 | 2018-11-12 13:53:42 -0800 | [diff] [blame] | 1048 | |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 1049 | if (!TimeFunctionParallel(&results, [&pub]() -> bool { |
Adam Langley | 7153013 | 2021-06-30 16:33:47 -0700 | [diff] [blame] | 1050 | uint8_t entropy[HRSS_ENCAP_BYTES]; |
| 1051 | uint8_t shared_key[HRSS_KEY_BYTES]; |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 1052 | uint8_t ciphertext[HRSS_CIPHERTEXT_BYTES]; |
Adam Langley | 7153013 | 2021-06-30 16:33:47 -0700 | [diff] [blame] | 1053 | RAND_bytes(entropy, sizeof(entropy)); |
| 1054 | return HRSS_encap(ciphertext, shared_key, &pub, entropy); |
| 1055 | })) { |
Adam Langley | 7b93593 | 2018-11-12 13:53:42 -0800 | [diff] [blame] | 1056 | fprintf(stderr, "Failed to time HRSS_encap.\n"); |
| 1057 | return false; |
| 1058 | } |
Adam Langley | 7b93593 | 2018-11-12 13:53:42 -0800 | [diff] [blame] | 1059 | results.Print("HRSS encap"); |
| 1060 | |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 1061 | uint8_t entropy[HRSS_ENCAP_BYTES]; |
| 1062 | uint8_t shared_key[HRSS_KEY_BYTES]; |
| 1063 | uint8_t ciphertext[HRSS_CIPHERTEXT_BYTES]; |
| 1064 | RAND_bytes(entropy, sizeof(entropy)); |
| 1065 | if (!HRSS_encap(ciphertext, shared_key, &pub, entropy)) { |
| 1066 | return false; |
| 1067 | } |
| 1068 | |
| 1069 | if (!TimeFunctionParallel(&results, [&priv, &ciphertext]() -> bool { |
| 1070 | uint8_t shared_key2[HRSS_KEY_BYTES]; |
| 1071 | return HRSS_decap(shared_key2, &priv, ciphertext, sizeof(ciphertext)); |
Adam Langley | 7153013 | 2021-06-30 16:33:47 -0700 | [diff] [blame] | 1072 | })) { |
Adam Langley | 7b93593 | 2018-11-12 13:53:42 -0800 | [diff] [blame] | 1073 | fprintf(stderr, "Failed to time HRSS_encap.\n"); |
| 1074 | return false; |
| 1075 | } |
| 1076 | |
| 1077 | results.Print("HRSS decap"); |
| 1078 | |
| 1079 | return true; |
| 1080 | } |
| 1081 | |
Sophie Schmieg | 58472cc | 2023-03-07 00:39:31 +0000 | [diff] [blame] | 1082 | static bool SpeedKyber(const std::string &selected) { |
| 1083 | if (!selected.empty() && selected != "Kyber") { |
| 1084 | return true; |
| 1085 | } |
| 1086 | |
| 1087 | TimeResults results; |
| 1088 | |
Sophie Schmieg | 58472cc | 2023-03-07 00:39:31 +0000 | [diff] [blame] | 1089 | uint8_t ciphertext[KYBER_CIPHERTEXT_BYTES]; |
| 1090 | // This ciphertext is nonsense, but Kyber decap is constant-time so, for the |
| 1091 | // purposes of timing, it's fine. |
| 1092 | memset(ciphertext, 42, sizeof(ciphertext)); |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 1093 | if (!TimeFunctionParallel(&results, [&]() -> bool { |
| 1094 | KYBER_private_key priv; |
| 1095 | uint8_t encoded_public_key[KYBER_PUBLIC_KEY_BYTES]; |
| 1096 | KYBER_generate_key(encoded_public_key, &priv); |
| 1097 | uint8_t shared_secret[32]; |
| 1098 | KYBER_decap(shared_secret, sizeof(shared_secret), ciphertext, &priv); |
| 1099 | return true; |
| 1100 | })) { |
Sophie Schmieg | 58472cc | 2023-03-07 00:39:31 +0000 | [diff] [blame] | 1101 | fprintf(stderr, "Failed to time KYBER_generate_key + KYBER_decap.\n"); |
| 1102 | return false; |
| 1103 | } |
| 1104 | |
| 1105 | results.Print("Kyber generate + decap"); |
| 1106 | |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 1107 | KYBER_private_key priv; |
| 1108 | uint8_t encoded_public_key[KYBER_PUBLIC_KEY_BYTES]; |
| 1109 | KYBER_generate_key(encoded_public_key, &priv); |
Sophie Schmieg | 58472cc | 2023-03-07 00:39:31 +0000 | [diff] [blame] | 1110 | KYBER_public_key pub; |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 1111 | if (!TimeFunctionParallel(&results, [&]() -> bool { |
| 1112 | CBS encoded_public_key_cbs; |
| 1113 | CBS_init(&encoded_public_key_cbs, encoded_public_key, |
| 1114 | sizeof(encoded_public_key)); |
| 1115 | if (!KYBER_parse_public_key(&pub, &encoded_public_key_cbs)) { |
| 1116 | return false; |
| 1117 | } |
| 1118 | uint8_t shared_secret[32]; |
| 1119 | KYBER_encap(ciphertext, shared_secret, sizeof(shared_secret), &pub); |
| 1120 | return true; |
| 1121 | })) { |
Sophie Schmieg | 58472cc | 2023-03-07 00:39:31 +0000 | [diff] [blame] | 1122 | fprintf(stderr, "Failed to time KYBER_encap.\n"); |
| 1123 | return false; |
| 1124 | } |
| 1125 | |
| 1126 | results.Print("Kyber parse + encap"); |
| 1127 | |
| 1128 | return true; |
| 1129 | } |
| 1130 | |
Steven Valdez | 188b65a | 2020-04-21 14:31:05 -0400 | [diff] [blame] | 1131 | static bool SpeedHashToCurve(const std::string &selected) { |
| 1132 | if (!selected.empty() && selected.find("hashtocurve") == std::string::npos) { |
| 1133 | return true; |
| 1134 | } |
| 1135 | |
Steven Valdez | 188b65a | 2020-04-21 14:31:05 -0400 | [diff] [blame] | 1136 | uint8_t input[64]; |
| 1137 | RAND_bytes(input, sizeof(input)); |
| 1138 | |
| 1139 | static const uint8_t kLabel[] = "label"; |
| 1140 | |
| 1141 | TimeResults results; |
Steven Valdez | 6a71840 | 2020-04-23 11:03:26 -0400 | [diff] [blame] | 1142 | { |
David Benjamin | 3950d6c | 2023-02-09 19:24:06 -0500 | [diff] [blame] | 1143 | const EC_GROUP *p256 = EC_GROUP_new_by_curve_name(NID_X9_62_prime256v1); |
| 1144 | if (p256 == NULL) { |
Steven Valdez | 6a71840 | 2020-04-23 11:03:26 -0400 | [diff] [blame] | 1145 | return false; |
| 1146 | } |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 1147 | if (!TimeFunctionParallel(&results, [&]() -> bool { |
David Benjamin | 5e988c4 | 2023-05-03 14:05:27 -0400 | [diff] [blame] | 1148 | EC_JACOBIAN out; |
David Benjamin | 3950d6c | 2023-02-09 19:24:06 -0500 | [diff] [blame] | 1149 | return ec_hash_to_curve_p256_xmd_sha256_sswu( |
| 1150 | p256, &out, kLabel, sizeof(kLabel), input, sizeof(input)); |
Steven Valdez | 6a71840 | 2020-04-23 11:03:26 -0400 | [diff] [blame] | 1151 | })) { |
| 1152 | fprintf(stderr, "hash-to-curve failed.\n"); |
| 1153 | return false; |
| 1154 | } |
David Benjamin | 3950d6c | 2023-02-09 19:24:06 -0500 | [diff] [blame] | 1155 | results.Print("hash-to-curve P256_XMD:SHA-256_SSWU_RO_"); |
| 1156 | |
| 1157 | const EC_GROUP *p384 = EC_GROUP_new_by_curve_name(NID_secp384r1); |
| 1158 | if (p384 == NULL) { |
| 1159 | return false; |
| 1160 | } |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 1161 | if (!TimeFunctionParallel(&results, [&]() -> bool { |
David Benjamin | 5e988c4 | 2023-05-03 14:05:27 -0400 | [diff] [blame] | 1162 | EC_JACOBIAN out; |
David Benjamin | 3950d6c | 2023-02-09 19:24:06 -0500 | [diff] [blame] | 1163 | return ec_hash_to_curve_p384_xmd_sha384_sswu( |
| 1164 | p384, &out, kLabel, sizeof(kLabel), input, sizeof(input)); |
| 1165 | })) { |
| 1166 | fprintf(stderr, "hash-to-curve failed.\n"); |
| 1167 | return false; |
| 1168 | } |
| 1169 | results.Print("hash-to-curve P384_XMD:SHA-384_SSWU_RO_"); |
Steven Valdez | 6a71840 | 2020-04-23 11:03:26 -0400 | [diff] [blame] | 1170 | |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 1171 | if (!TimeFunctionParallel(&results, [&]() -> bool { |
Steven Valdez | 6a71840 | 2020-04-23 11:03:26 -0400 | [diff] [blame] | 1172 | EC_SCALAR out; |
David Benjamin | eeb5bb35 | 2020-04-29 11:37:14 -0400 | [diff] [blame] | 1173 | return ec_hash_to_scalar_p384_xmd_sha512_draft07( |
David Benjamin | 3950d6c | 2023-02-09 19:24:06 -0500 | [diff] [blame] | 1174 | p384, &out, kLabel, sizeof(kLabel), input, sizeof(input)); |
Steven Valdez | 6a71840 | 2020-04-23 11:03:26 -0400 | [diff] [blame] | 1175 | })) { |
| 1176 | fprintf(stderr, "hash-to-scalar failed.\n"); |
| 1177 | return false; |
| 1178 | } |
| 1179 | results.Print("hash-to-scalar P384_XMD:SHA-512"); |
| 1180 | } |
Steven Valdez | 188b65a | 2020-04-21 14:31:05 -0400 | [diff] [blame] | 1181 | |
| 1182 | return true; |
| 1183 | } |
| 1184 | |
David Benjamin | f958727 | 2021-09-21 16:33:15 -0400 | [diff] [blame] | 1185 | static bool SpeedBase64(const std::string &selected) { |
| 1186 | if (!selected.empty() && selected.find("base64") == std::string::npos) { |
| 1187 | return true; |
| 1188 | } |
| 1189 | |
| 1190 | static const char kInput[] = |
| 1191 | "MIIDtTCCAp2gAwIBAgIJALW2IrlaBKUhMA0GCSqGSIb3DQEBCwUAMEUxCzAJBgNV" |
| 1192 | "BAYTAkFVMRMwEQYDVQQIEwpTb21lLVN0YXRlMSEwHwYDVQQKExhJbnRlcm5ldCBX" |
| 1193 | "aWRnaXRzIFB0eSBMdGQwHhcNMTYwNzA5MDQzODA5WhcNMTYwODA4MDQzODA5WjBF" |
| 1194 | "MQswCQYDVQQGEwJBVTETMBEGA1UECBMKU29tZS1TdGF0ZTEhMB8GA1UEChMYSW50" |
| 1195 | "ZXJuZXQgV2lkZ2l0cyBQdHkgTHRkMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB" |
| 1196 | "CgKCAQEAugvahBkSAUF1fC49vb1bvlPrcl80kop1iLpiuYoz4Qptwy57+EWssZBc" |
| 1197 | "HprZ5BkWf6PeGZ7F5AX1PyJbGHZLqvMCvViP6pd4MFox/igESISEHEixoiXCzepB" |
| 1198 | "rhtp5UQSjHD4D4hKtgdMgVxX+LRtwgW3mnu/vBu7rzpr/DS8io99p3lqZ1Aky+aN" |
| 1199 | "lcMj6MYy8U+YFEevb/V0lRY9oqwmW7BHnXikm/vi6sjIS350U8zb/mRzYeIs2R65" |
| 1200 | "LUduTL50+UMgat9ocewI2dv8aO9Dph+8NdGtg8LFYyTTHcUxJoMr1PTOgnmET19W" |
| 1201 | "JH4PrFwk7ZE1QJQQ1L4iKmPeQistuQIDAQABo4GnMIGkMB0GA1UdDgQWBBT5m6Vv" |
| 1202 | "zYjVYHG30iBE+j2XDhUE8jB1BgNVHSMEbjBsgBT5m6VvzYjVYHG30iBE+j2XDhUE" |
| 1203 | "8qFJpEcwRTELMAkGA1UEBhMCQVUxEzARBgNVBAgTClNvbWUtU3RhdGUxITAfBgNV" |
| 1204 | "BAoTGEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZIIJALW2IrlaBKUhMAwGA1UdEwQF" |
| 1205 | "MAMBAf8wDQYJKoZIhvcNAQELBQADggEBAD7Jg68SArYWlcoHfZAB90Pmyrt5H6D8" |
| 1206 | "LRi+W2Ri1fBNxREELnezWJ2scjl4UMcsKYp4Pi950gVN+62IgrImcCNvtb5I1Cfy" |
| 1207 | "/MNNur9ffas6X334D0hYVIQTePyFk3umI+2mJQrtZZyMPIKSY/sYGQHhGGX6wGK+" |
| 1208 | "GO/og0PQk/Vu6D+GU2XRnDV0YZg1lsAsHd21XryK6fDmNkEMwbIWrts4xc7scRrG" |
| 1209 | "HWy+iMf6/7p/Ak/SIicM4XSwmlQ8pPxAZPr+E2LoVd9pMpWUwpW2UbtO5wsGTrY5" |
| 1210 | "sO45tFNN/y+jtUheB1C2ijObG/tXELaiyCdM+S/waeuv0MXtI4xnn1A="; |
| 1211 | |
David Benjamin | f958727 | 2021-09-21 16:33:15 -0400 | [diff] [blame] | 1212 | TimeResults results; |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 1213 | if (!TimeFunctionParallel(&results, [&]() -> bool { |
| 1214 | uint8_t out[sizeof(kInput)]; |
| 1215 | size_t len; |
| 1216 | return EVP_DecodeBase64(out, &len, sizeof(out), |
David Benjamin | f958727 | 2021-09-21 16:33:15 -0400 | [diff] [blame] | 1217 | reinterpret_cast<const uint8_t *>(kInput), |
| 1218 | strlen(kInput)); |
| 1219 | })) { |
| 1220 | fprintf(stderr, "base64 decode failed.\n"); |
| 1221 | return false; |
| 1222 | } |
| 1223 | results.PrintWithBytes("base64 decode", strlen(kInput)); |
| 1224 | return true; |
| 1225 | } |
| 1226 | |
David Benjamin | 345c86b | 2022-01-23 11:11:17 -0500 | [diff] [blame] | 1227 | static bool SpeedSipHash(const std::string &selected) { |
| 1228 | if (!selected.empty() && selected.find("siphash") == std::string::npos) { |
| 1229 | return true; |
| 1230 | } |
| 1231 | |
| 1232 | uint64_t key[2] = {0}; |
| 1233 | for (size_t len : g_chunk_lengths) { |
| 1234 | std::vector<uint8_t> input(len); |
| 1235 | TimeResults results; |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 1236 | if (!TimeFunctionParallel(&results, [&]() -> bool { |
David Benjamin | 345c86b | 2022-01-23 11:11:17 -0500 | [diff] [blame] | 1237 | SIPHASH_24(key, input.data(), input.size()); |
| 1238 | return true; |
| 1239 | })) { |
| 1240 | fprintf(stderr, "SIPHASH_24 failed.\n"); |
| 1241 | ERR_print_errors_fp(stderr); |
| 1242 | return false; |
| 1243 | } |
| 1244 | results.PrintWithBytes("SipHash-2-4" + ChunkLenSuffix(len), len); |
| 1245 | } |
| 1246 | |
| 1247 | return true; |
| 1248 | } |
| 1249 | |
Steven Valdez | f2b2ef8 | 2020-09-21 11:39:22 -0400 | [diff] [blame] | 1250 | static TRUST_TOKEN_PRETOKEN *trust_token_pretoken_dup( |
David Benjamin | df8a55b | 2023-01-04 15:52:36 -0800 | [diff] [blame] | 1251 | const TRUST_TOKEN_PRETOKEN *in) { |
| 1252 | return static_cast<TRUST_TOKEN_PRETOKEN *>( |
| 1253 | OPENSSL_memdup(in, sizeof(TRUST_TOKEN_PRETOKEN))); |
Steven Valdez | 188b65a | 2020-04-21 14:31:05 -0400 | [diff] [blame] | 1254 | } |
| 1255 | |
David Benjamin | 239634d | 2020-04-29 11:17:51 -0400 | [diff] [blame] | 1256 | static bool SpeedTrustToken(std::string name, const TRUST_TOKEN_METHOD *method, |
| 1257 | size_t batchsize, const std::string &selected) { |
Steven Valdez | 188b65a | 2020-04-21 14:31:05 -0400 | [diff] [blame] | 1258 | if (!selected.empty() && selected.find("trusttoken") == std::string::npos) { |
| 1259 | return true; |
| 1260 | } |
| 1261 | |
| 1262 | TimeResults results; |
| 1263 | if (!TimeFunction(&results, [&]() -> bool { |
| 1264 | uint8_t priv_key[TRUST_TOKEN_MAX_PRIVATE_KEY_SIZE]; |
| 1265 | uint8_t pub_key[TRUST_TOKEN_MAX_PUBLIC_KEY_SIZE]; |
| 1266 | size_t priv_key_len, pub_key_len; |
| 1267 | return TRUST_TOKEN_generate_key( |
David Benjamin | 239634d | 2020-04-29 11:17:51 -0400 | [diff] [blame] | 1268 | method, priv_key, &priv_key_len, TRUST_TOKEN_MAX_PRIVATE_KEY_SIZE, |
| 1269 | pub_key, &pub_key_len, TRUST_TOKEN_MAX_PUBLIC_KEY_SIZE, 0); |
Steven Valdez | 188b65a | 2020-04-21 14:31:05 -0400 | [diff] [blame] | 1270 | })) { |
| 1271 | fprintf(stderr, "TRUST_TOKEN_generate_key failed.\n"); |
| 1272 | return false; |
| 1273 | } |
| 1274 | results.Print(name + " generate_key"); |
| 1275 | |
David Benjamin | 239634d | 2020-04-29 11:17:51 -0400 | [diff] [blame] | 1276 | bssl::UniquePtr<TRUST_TOKEN_CLIENT> client( |
| 1277 | TRUST_TOKEN_CLIENT_new(method, batchsize)); |
| 1278 | bssl::UniquePtr<TRUST_TOKEN_ISSUER> issuer( |
| 1279 | TRUST_TOKEN_ISSUER_new(method, batchsize)); |
Steven Valdez | 188b65a | 2020-04-21 14:31:05 -0400 | [diff] [blame] | 1280 | uint8_t priv_key[TRUST_TOKEN_MAX_PRIVATE_KEY_SIZE]; |
| 1281 | uint8_t pub_key[TRUST_TOKEN_MAX_PUBLIC_KEY_SIZE]; |
| 1282 | size_t priv_key_len, pub_key_len, key_index; |
David Benjamin | 239634d | 2020-04-29 11:17:51 -0400 | [diff] [blame] | 1283 | if (!client || !issuer || |
Steven Valdez | 188b65a | 2020-04-21 14:31:05 -0400 | [diff] [blame] | 1284 | !TRUST_TOKEN_generate_key( |
David Benjamin | 239634d | 2020-04-29 11:17:51 -0400 | [diff] [blame] | 1285 | method, priv_key, &priv_key_len, TRUST_TOKEN_MAX_PRIVATE_KEY_SIZE, |
| 1286 | pub_key, &pub_key_len, TRUST_TOKEN_MAX_PUBLIC_KEY_SIZE, 0) || |
Steven Valdez | 188b65a | 2020-04-21 14:31:05 -0400 | [diff] [blame] | 1287 | !TRUST_TOKEN_CLIENT_add_key(client.get(), &key_index, pub_key, |
| 1288 | pub_key_len) || |
| 1289 | !TRUST_TOKEN_ISSUER_add_key(issuer.get(), priv_key, priv_key_len)) { |
| 1290 | fprintf(stderr, "failed to generate trust token key.\n"); |
| 1291 | return false; |
| 1292 | } |
| 1293 | |
| 1294 | uint8_t public_key[32], private_key[64]; |
| 1295 | ED25519_keypair(public_key, private_key); |
| 1296 | bssl::UniquePtr<EVP_PKEY> priv( |
| 1297 | EVP_PKEY_new_raw_private_key(EVP_PKEY_ED25519, nullptr, private_key, 32)); |
| 1298 | bssl::UniquePtr<EVP_PKEY> pub( |
| 1299 | EVP_PKEY_new_raw_public_key(EVP_PKEY_ED25519, nullptr, public_key, 32)); |
| 1300 | if (!priv || !pub) { |
| 1301 | fprintf(stderr, "failed to generate trust token SRR key.\n"); |
| 1302 | return false; |
| 1303 | } |
| 1304 | |
| 1305 | TRUST_TOKEN_CLIENT_set_srr_key(client.get(), pub.get()); |
| 1306 | TRUST_TOKEN_ISSUER_set_srr_key(issuer.get(), priv.get()); |
| 1307 | uint8_t metadata_key[32]; |
| 1308 | RAND_bytes(metadata_key, sizeof(metadata_key)); |
| 1309 | if (!TRUST_TOKEN_ISSUER_set_metadata_key(issuer.get(), metadata_key, |
| 1310 | sizeof(metadata_key))) { |
| 1311 | fprintf(stderr, "failed to generate trust token metadata key.\n"); |
| 1312 | return false; |
| 1313 | } |
| 1314 | |
| 1315 | if (!TimeFunction(&results, [&]() -> bool { |
| 1316 | uint8_t *issue_msg = NULL; |
| 1317 | size_t msg_len; |
| 1318 | int ok = TRUST_TOKEN_CLIENT_begin_issuance(client.get(), &issue_msg, |
| 1319 | &msg_len, batchsize); |
| 1320 | OPENSSL_free(issue_msg); |
| 1321 | // Clear pretokens. |
Steven Valdez | f2b2ef8 | 2020-09-21 11:39:22 -0400 | [diff] [blame] | 1322 | sk_TRUST_TOKEN_PRETOKEN_pop_free(client->pretokens, |
| 1323 | TRUST_TOKEN_PRETOKEN_free); |
| 1324 | client->pretokens = sk_TRUST_TOKEN_PRETOKEN_new_null(); |
Steven Valdez | 188b65a | 2020-04-21 14:31:05 -0400 | [diff] [blame] | 1325 | return ok; |
| 1326 | })) { |
| 1327 | fprintf(stderr, "TRUST_TOKEN_CLIENT_begin_issuance failed.\n"); |
| 1328 | return false; |
| 1329 | } |
| 1330 | results.Print(name + " begin_issuance"); |
| 1331 | |
| 1332 | uint8_t *issue_msg = NULL; |
| 1333 | size_t msg_len; |
| 1334 | if (!TRUST_TOKEN_CLIENT_begin_issuance(client.get(), &issue_msg, &msg_len, |
| 1335 | batchsize)) { |
| 1336 | fprintf(stderr, "TRUST_TOKEN_CLIENT_begin_issuance failed.\n"); |
| 1337 | return false; |
| 1338 | } |
| 1339 | bssl::UniquePtr<uint8_t> free_issue_msg(issue_msg); |
| 1340 | |
Steven Valdez | f2b2ef8 | 2020-09-21 11:39:22 -0400 | [diff] [blame] | 1341 | bssl::UniquePtr<STACK_OF(TRUST_TOKEN_PRETOKEN)> pretokens( |
| 1342 | sk_TRUST_TOKEN_PRETOKEN_deep_copy(client->pretokens, |
| 1343 | trust_token_pretoken_dup, |
| 1344 | TRUST_TOKEN_PRETOKEN_free)); |
Steven Valdez | 188b65a | 2020-04-21 14:31:05 -0400 | [diff] [blame] | 1345 | |
| 1346 | if (!TimeFunction(&results, [&]() -> bool { |
| 1347 | uint8_t *issue_resp = NULL; |
David Benjamin | 17078f2 | 2020-04-28 17:50:13 -0400 | [diff] [blame] | 1348 | size_t resp_len, tokens_issued; |
Steven Valdez | 188b65a | 2020-04-21 14:31:05 -0400 | [diff] [blame] | 1349 | int ok = TRUST_TOKEN_ISSUER_issue(issuer.get(), &issue_resp, &resp_len, |
| 1350 | &tokens_issued, issue_msg, msg_len, |
| 1351 | /*public_metadata=*/0, |
| 1352 | /*private_metadata=*/0, |
| 1353 | /*max_issuance=*/batchsize); |
| 1354 | OPENSSL_free(issue_resp); |
| 1355 | return ok; |
| 1356 | })) { |
| 1357 | fprintf(stderr, "TRUST_TOKEN_ISSUER_issue failed.\n"); |
| 1358 | return false; |
| 1359 | } |
| 1360 | results.Print(name + " issue"); |
| 1361 | |
| 1362 | uint8_t *issue_resp = NULL; |
David Benjamin | 17078f2 | 2020-04-28 17:50:13 -0400 | [diff] [blame] | 1363 | size_t resp_len, tokens_issued; |
Steven Valdez | 188b65a | 2020-04-21 14:31:05 -0400 | [diff] [blame] | 1364 | if (!TRUST_TOKEN_ISSUER_issue(issuer.get(), &issue_resp, &resp_len, |
| 1365 | &tokens_issued, issue_msg, msg_len, |
| 1366 | /*public_metadata=*/0, /*private_metadata=*/0, |
| 1367 | /*max_issuance=*/batchsize)) { |
| 1368 | fprintf(stderr, "TRUST_TOKEN_ISSUER_issue failed.\n"); |
| 1369 | return false; |
| 1370 | } |
| 1371 | bssl::UniquePtr<uint8_t> free_issue_resp(issue_resp); |
| 1372 | |
| 1373 | if (!TimeFunction(&results, [&]() -> bool { |
| 1374 | size_t key_index2; |
| 1375 | bssl::UniquePtr<STACK_OF(TRUST_TOKEN)> tokens( |
| 1376 | TRUST_TOKEN_CLIENT_finish_issuance(client.get(), &key_index2, |
| 1377 | issue_resp, resp_len)); |
| 1378 | |
| 1379 | // Reset pretokens. |
Steven Valdez | f2b2ef8 | 2020-09-21 11:39:22 -0400 | [diff] [blame] | 1380 | client->pretokens = sk_TRUST_TOKEN_PRETOKEN_deep_copy( |
| 1381 | pretokens.get(), trust_token_pretoken_dup, |
| 1382 | TRUST_TOKEN_PRETOKEN_free); |
Steven Valdez | 188b65a | 2020-04-21 14:31:05 -0400 | [diff] [blame] | 1383 | return !!tokens; |
| 1384 | })) { |
| 1385 | fprintf(stderr, "TRUST_TOKEN_CLIENT_finish_issuance failed.\n"); |
| 1386 | return false; |
| 1387 | } |
| 1388 | results.Print(name + " finish_issuance"); |
| 1389 | |
| 1390 | bssl::UniquePtr<STACK_OF(TRUST_TOKEN)> tokens( |
| 1391 | TRUST_TOKEN_CLIENT_finish_issuance(client.get(), &key_index, issue_resp, |
| 1392 | resp_len)); |
| 1393 | if (!tokens || sk_TRUST_TOKEN_num(tokens.get()) < 1) { |
| 1394 | fprintf(stderr, "TRUST_TOKEN_CLIENT_finish_issuance failed.\n"); |
| 1395 | return false; |
| 1396 | } |
| 1397 | |
| 1398 | const TRUST_TOKEN *token = sk_TRUST_TOKEN_value(tokens.get(), 0); |
| 1399 | |
| 1400 | const uint8_t kClientData[] = "\x70TEST CLIENT DATA"; |
| 1401 | uint64_t kRedemptionTime = 13374242; |
| 1402 | |
| 1403 | if (!TimeFunction(&results, [&]() -> bool { |
| 1404 | uint8_t *redeem_msg = NULL; |
| 1405 | size_t redeem_msg_len; |
| 1406 | int ok = TRUST_TOKEN_CLIENT_begin_redemption( |
| 1407 | client.get(), &redeem_msg, &redeem_msg_len, token, kClientData, |
| 1408 | sizeof(kClientData) - 1, kRedemptionTime); |
| 1409 | OPENSSL_free(redeem_msg); |
| 1410 | return ok; |
| 1411 | })) { |
| 1412 | fprintf(stderr, "TRUST_TOKEN_CLIENT_begin_redemption failed.\n"); |
| 1413 | return false; |
| 1414 | } |
| 1415 | results.Print(name + " begin_redemption"); |
| 1416 | |
| 1417 | uint8_t *redeem_msg = NULL; |
| 1418 | size_t redeem_msg_len; |
| 1419 | if (!TRUST_TOKEN_CLIENT_begin_redemption( |
| 1420 | client.get(), &redeem_msg, &redeem_msg_len, token, kClientData, |
| 1421 | sizeof(kClientData) - 1, kRedemptionTime)) { |
| 1422 | fprintf(stderr, "TRUST_TOKEN_CLIENT_begin_redemption failed.\n"); |
| 1423 | return false; |
| 1424 | } |
| 1425 | bssl::UniquePtr<uint8_t> free_redeem_msg(redeem_msg); |
| 1426 | |
| 1427 | if (!TimeFunction(&results, [&]() -> bool { |
Steven Valdez | 80a243e | 2023-01-26 13:26:33 -0500 | [diff] [blame] | 1428 | uint32_t public_value; |
| 1429 | uint8_t private_value; |
| 1430 | TRUST_TOKEN *rtoken; |
Steven Valdez | 188b65a | 2020-04-21 14:31:05 -0400 | [diff] [blame] | 1431 | uint8_t *client_data = NULL; |
| 1432 | size_t client_data_len; |
Steven Valdez | 188b65a | 2020-04-21 14:31:05 -0400 | [diff] [blame] | 1433 | int ok = TRUST_TOKEN_ISSUER_redeem( |
Steven Valdez | 80a243e | 2023-01-26 13:26:33 -0500 | [diff] [blame] | 1434 | issuer.get(), &public_value, &private_value, &rtoken, &client_data, |
| 1435 | &client_data_len, redeem_msg, redeem_msg_len); |
Steven Valdez | 188b65a | 2020-04-21 14:31:05 -0400 | [diff] [blame] | 1436 | OPENSSL_free(client_data); |
| 1437 | TRUST_TOKEN_free(rtoken); |
| 1438 | return ok; |
| 1439 | })) { |
| 1440 | fprintf(stderr, "TRUST_TOKEN_ISSUER_redeem failed.\n"); |
| 1441 | return false; |
| 1442 | } |
| 1443 | results.Print(name + " redeem"); |
| 1444 | |
Steven Valdez | 80a243e | 2023-01-26 13:26:33 -0500 | [diff] [blame] | 1445 | uint32_t public_value; |
| 1446 | uint8_t private_value; |
| 1447 | TRUST_TOKEN *rtoken; |
Steven Valdez | 188b65a | 2020-04-21 14:31:05 -0400 | [diff] [blame] | 1448 | uint8_t *client_data = NULL; |
| 1449 | size_t client_data_len; |
Steven Valdez | 80a243e | 2023-01-26 13:26:33 -0500 | [diff] [blame] | 1450 | if (!TRUST_TOKEN_ISSUER_redeem(issuer.get(), &public_value, &private_value, |
Steven Valdez | 188b65a | 2020-04-21 14:31:05 -0400 | [diff] [blame] | 1451 | &rtoken, &client_data, &client_data_len, |
Steven Valdez | 80a243e | 2023-01-26 13:26:33 -0500 | [diff] [blame] | 1452 | redeem_msg, redeem_msg_len)) { |
Steven Valdez | 188b65a | 2020-04-21 14:31:05 -0400 | [diff] [blame] | 1453 | fprintf(stderr, "TRUST_TOKEN_ISSUER_redeem failed.\n"); |
| 1454 | return false; |
| 1455 | } |
Steven Valdez | 188b65a | 2020-04-21 14:31:05 -0400 | [diff] [blame] | 1456 | bssl::UniquePtr<uint8_t> free_client_data(client_data); |
| 1457 | bssl::UniquePtr<TRUST_TOKEN> free_rtoken(rtoken); |
| 1458 | |
Steven Valdez | 188b65a | 2020-04-21 14:31:05 -0400 | [diff] [blame] | 1459 | return true; |
| 1460 | } |
| 1461 | |
David Benjamin | ab5edbe | 2021-01-27 16:49:50 -0500 | [diff] [blame] | 1462 | #if defined(BORINGSSL_FIPS) |
| 1463 | static bool SpeedSelfTest(const std::string &selected) { |
| 1464 | if (!selected.empty() && selected.find("self-test") == std::string::npos) { |
| 1465 | return true; |
| 1466 | } |
| 1467 | |
| 1468 | TimeResults results; |
| 1469 | if (!TimeFunction(&results, []() -> bool { return BORINGSSL_self_test(); })) { |
| 1470 | fprintf(stderr, "BORINGSSL_self_test faileid.\n"); |
| 1471 | ERR_print_errors_fp(stderr); |
| 1472 | return false; |
| 1473 | } |
| 1474 | |
| 1475 | results.Print("self-test"); |
| 1476 | return true; |
| 1477 | } |
| 1478 | #endif |
| 1479 | |
David Benjamin | bcb65b9 | 2016-08-14 22:06:49 -0400 | [diff] [blame] | 1480 | static const struct argument kArguments[] = { |
| 1481 | { |
David Benjamin | 6443173 | 2019-02-10 22:07:23 +0000 | [diff] [blame] | 1482 | "-filter", |
| 1483 | kOptionalArgument, |
| 1484 | "A filter on the speed tests to run", |
David Benjamin | bcb65b9 | 2016-08-14 22:06:49 -0400 | [diff] [blame] | 1485 | }, |
| 1486 | { |
David Benjamin | 6443173 | 2019-02-10 22:07:23 +0000 | [diff] [blame] | 1487 | "-timeout", |
| 1488 | kOptionalArgument, |
| 1489 | "The number of seconds to run each test for (default is 1)", |
David Benjamin | bcb65b9 | 2016-08-14 22:06:49 -0400 | [diff] [blame] | 1490 | }, |
| 1491 | { |
David Benjamin | 6443173 | 2019-02-10 22:07:23 +0000 | [diff] [blame] | 1492 | "-chunks", |
| 1493 | kOptionalArgument, |
| 1494 | "A comma-separated list of input sizes to run tests at (default is " |
David Benjamin | 5501a26 | 2019-03-20 17:45:15 -0500 | [diff] [blame] | 1495 | "16,256,1350,8192,16384)", |
David Benjamin | 6443173 | 2019-02-10 22:07:23 +0000 | [diff] [blame] | 1496 | }, |
| 1497 | { |
Zola Bridges | f10ea55 | 2019-10-01 11:35:44 -0700 | [diff] [blame] | 1498 | "-json", |
| 1499 | kBooleanArgument, |
| 1500 | "If this flag is set, speed will print the output of each benchmark in " |
| 1501 | "JSON format as follows: \"{\"description\": " |
| 1502 | "\"descriptionOfOperation\", \"numCalls\": 1234, " |
| 1503 | "\"timeInMicroseconds\": 1234567, \"bytesPerCall\": 1234}\". When " |
| 1504 | "there is no information about the bytes per call for an operation, " |
| 1505 | "the JSON field for bytesPerCall will be omitted.", |
| 1506 | }, |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 1507 | #if defined(OPENSSL_THREADS) |
| 1508 | { |
| 1509 | "-threads", |
| 1510 | kOptionalArgument, |
| 1511 | "The number of threads to benchmark in parallel (default is 1)", |
| 1512 | }, |
| 1513 | #endif |
Zola Bridges | f10ea55 | 2019-10-01 11:35:44 -0700 | [diff] [blame] | 1514 | { |
David Benjamin | 6443173 | 2019-02-10 22:07:23 +0000 | [diff] [blame] | 1515 | "", |
| 1516 | kOptionalArgument, |
| 1517 | "", |
David Benjamin | bcb65b9 | 2016-08-14 22:06:49 -0400 | [diff] [blame] | 1518 | }, |
| 1519 | }; |
| 1520 | |
Adam Langley | c5c0c7e | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 1521 | bool Speed(const std::vector<std::string> &args) { |
David Benjamin | bcb65b9 | 2016-08-14 22:06:49 -0400 | [diff] [blame] | 1522 | std::map<std::string, std::string> args_map; |
| 1523 | if (!ParseKeyValueArguments(&args_map, args, kArguments)) { |
| 1524 | PrintUsage(kArguments); |
Adam Langley | 90b5840 | 2015-04-13 11:04:18 -0700 | [diff] [blame] | 1525 | return false; |
| 1526 | } |
David Benjamin | bcb65b9 | 2016-08-14 22:06:49 -0400 | [diff] [blame] | 1527 | |
| 1528 | std::string selected; |
| 1529 | if (args_map.count("-filter") != 0) { |
| 1530 | selected = args_map["-filter"]; |
| 1531 | } |
| 1532 | |
Zola Bridges | f10ea55 | 2019-10-01 11:35:44 -0700 | [diff] [blame] | 1533 | if (args_map.count("-json") != 0) { |
| 1534 | g_print_json = true; |
| 1535 | } |
| 1536 | |
David Benjamin | bcb65b9 | 2016-08-14 22:06:49 -0400 | [diff] [blame] | 1537 | if (args_map.count("-timeout") != 0) { |
| 1538 | g_timeout_seconds = atoi(args_map["-timeout"].c_str()); |
Adam Langley | 90b5840 | 2015-04-13 11:04:18 -0700 | [diff] [blame] | 1539 | } |
Adam Langley | c5c0c7e | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 1540 | |
David Benjamin | c1f5d79 | 2023-03-03 23:49:38 -0500 | [diff] [blame] | 1541 | #if defined(OPENSSL_THREADS) |
| 1542 | if (args_map.count("-threads") != 0) { |
| 1543 | g_threads = atoi(args_map["-threads"].c_str()); |
| 1544 | } |
| 1545 | #endif |
| 1546 | |
David Benjamin | 6443173 | 2019-02-10 22:07:23 +0000 | [diff] [blame] | 1547 | if (args_map.count("-chunks") != 0) { |
| 1548 | g_chunk_lengths.clear(); |
| 1549 | const char *start = args_map["-chunks"].data(); |
| 1550 | const char *end = start + args_map["-chunks"].size(); |
| 1551 | while (start != end) { |
| 1552 | errno = 0; |
| 1553 | char *ptr; |
| 1554 | unsigned long long val = strtoull(start, &ptr, 10); |
| 1555 | if (ptr == start /* no numeric characters found */ || |
| 1556 | errno == ERANGE /* overflow */ || |
| 1557 | static_cast<size_t>(val) != val) { |
| 1558 | fprintf(stderr, "Error parsing -chunks argument\n"); |
| 1559 | return false; |
| 1560 | } |
| 1561 | g_chunk_lengths.push_back(static_cast<size_t>(val)); |
| 1562 | start = ptr; |
| 1563 | if (start != end) { |
| 1564 | if (*start != ',') { |
| 1565 | fprintf(stderr, "Error parsing -chunks argument\n"); |
| 1566 | return false; |
| 1567 | } |
| 1568 | start++; |
| 1569 | } |
| 1570 | } |
| 1571 | } |
| 1572 | |
Adam Langley | e762434 | 2015-01-15 17:33:48 -0800 | [diff] [blame] | 1573 | // kTLSADLen is the number of bytes of additional data that TLS passes to |
| 1574 | // AEADs. |
| 1575 | static const size_t kTLSADLen = 13; |
| 1576 | // kLegacyADLen is the number of bytes that TLS passes to the "legacy" AEADs. |
| 1577 | // These are AEADs that weren't originally defined as AEADs, but which we use |
| 1578 | // via the AEAD interface. In order for that to work, they have some TLS |
| 1579 | // knowledge in them and construct a couple of the AD bytes internally. |
| 1580 | static const size_t kLegacyADLen = kTLSADLen - 2; |
| 1581 | |
Zola Bridges | f10ea55 | 2019-10-01 11:35:44 -0700 | [diff] [blame] | 1582 | if (g_print_json) { |
| 1583 | puts("["); |
| 1584 | } |
Daniel Hirche | 1414d86 | 2018-04-13 19:09:25 +0200 | [diff] [blame] | 1585 | if (!SpeedRSA(selected) || |
| 1586 | !SpeedAEAD(EVP_aead_aes_128_gcm(), "AES-128-GCM", kTLSADLen, selected) || |
Adam Langley | 90b5840 | 2015-04-13 11:04:18 -0700 | [diff] [blame] | 1587 | !SpeedAEAD(EVP_aead_aes_256_gcm(), "AES-256-GCM", kTLSADLen, selected) || |
David Benjamin | 8ffab72 | 2015-11-30 18:48:18 -0500 | [diff] [blame] | 1588 | !SpeedAEAD(EVP_aead_chacha20_poly1305(), "ChaCha20-Poly1305", kTLSADLen, |
| 1589 | selected) || |
David Benjamin | df57163 | 2015-12-07 19:48:16 -0500 | [diff] [blame] | 1590 | !SpeedAEAD(EVP_aead_des_ede3_cbc_sha1_tls(), "DES-EDE3-CBC-SHA1", |
| 1591 | kLegacyADLen, selected) || |
Adam Langley | 90b5840 | 2015-04-13 11:04:18 -0700 | [diff] [blame] | 1592 | !SpeedAEAD(EVP_aead_aes_128_cbc_sha1_tls(), "AES-128-CBC-SHA1", |
| 1593 | kLegacyADLen, selected) || |
| 1594 | !SpeedAEAD(EVP_aead_aes_256_cbc_sha1_tls(), "AES-256-CBC-SHA1", |
| 1595 | kLegacyADLen, selected) || |
David Benjamin | c93724b | 2018-05-21 17:14:05 -0400 | [diff] [blame] | 1596 | !SpeedAEADOpen(EVP_aead_aes_128_cbc_sha1_tls(), "AES-128-CBC-SHA1", |
| 1597 | kLegacyADLen, selected) || |
| 1598 | !SpeedAEADOpen(EVP_aead_aes_256_cbc_sha1_tls(), "AES-256-CBC-SHA1", |
| 1599 | kLegacyADLen, selected) || |
Adam Langley | df447ba | 2016-12-01 08:24:24 -0800 | [diff] [blame] | 1600 | !SpeedAEAD(EVP_aead_aes_128_gcm_siv(), "AES-128-GCM-SIV", kTLSADLen, |
| 1601 | selected) || |
| 1602 | !SpeedAEAD(EVP_aead_aes_256_gcm_siv(), "AES-256-GCM-SIV", kTLSADLen, |
| 1603 | selected) || |
Adam Langley | ba9557d | 2017-02-27 13:53:23 -0800 | [diff] [blame] | 1604 | !SpeedAEADOpen(EVP_aead_aes_128_gcm_siv(), "AES-128-GCM-SIV", kTLSADLen, |
| 1605 | selected) || |
| 1606 | !SpeedAEADOpen(EVP_aead_aes_256_gcm_siv(), "AES-256-GCM-SIV", kTLSADLen, |
| 1607 | selected) || |
Steven Valdez | f16cd42 | 2018-02-13 13:39:42 -0500 | [diff] [blame] | 1608 | !SpeedAEAD(EVP_aead_aes_128_ccm_bluetooth(), "AES-128-CCM-Bluetooth", |
| 1609 | kTLSADLen, selected) || |
David Benjamin | 25e36da | 2019-08-31 13:25:15 -0400 | [diff] [blame] | 1610 | !SpeedAESBlock("AES-128", 128, selected) || |
| 1611 | !SpeedAESBlock("AES-256", 256, selected) || |
Adam Langley | 90b5840 | 2015-04-13 11:04:18 -0700 | [diff] [blame] | 1612 | !SpeedHash(EVP_sha1(), "SHA-1", selected) || |
| 1613 | !SpeedHash(EVP_sha256(), "SHA-256", selected) || |
| 1614 | !SpeedHash(EVP_sha512(), "SHA-512", selected) || |
Adam Langley | e133345 | 2021-01-21 11:56:52 -0800 | [diff] [blame] | 1615 | !SpeedHash(EVP_blake2b256(), "BLAKE2b-256", selected) || |
Adam Langley | ad6b28e | 2015-04-14 12:07:44 -0700 | [diff] [blame] | 1616 | !SpeedRandom(selected) || |
| 1617 | !SpeedECDH(selected) || |
Adam Langley | 4fb0dc4 | 2015-11-13 13:09:47 -0800 | [diff] [blame] | 1618 | !SpeedECDSA(selected) || |
Arnar Birgisson | f27459e | 2016-02-09 18:09:00 -0800 | [diff] [blame] | 1619 | !Speed25519(selected) || |
David Benjamin | b529253 | 2017-06-09 19:27:37 -0400 | [diff] [blame] | 1620 | !SpeedSPAKE2(selected) || |
Adam Langley | a0f1c8e | 2018-03-30 13:43:59 -0700 | [diff] [blame] | 1621 | !SpeedScrypt(selected) || |
Adam Langley | 7b93593 | 2018-11-12 13:53:42 -0800 | [diff] [blame] | 1622 | !SpeedRSAKeyGen(selected) || |
Steven Valdez | 188b65a | 2020-04-21 14:31:05 -0400 | [diff] [blame] | 1623 | !SpeedHRSS(selected) || |
Sophie Schmieg | 58472cc | 2023-03-07 00:39:31 +0000 | [diff] [blame] | 1624 | !SpeedKyber(selected) || |
Steven Valdez | 188b65a | 2020-04-21 14:31:05 -0400 | [diff] [blame] | 1625 | !SpeedHashToCurve(selected) || |
David Benjamin | aa764c4 | 2020-04-29 12:39:10 -0400 | [diff] [blame] | 1626 | !SpeedTrustToken("TrustToken-Exp1-Batch1", TRUST_TOKEN_experiment_v1(), 1, |
| 1627 | selected) || |
| 1628 | !SpeedTrustToken("TrustToken-Exp1-Batch10", TRUST_TOKEN_experiment_v1(), |
Steven Valdez | f2b2ef8 | 2020-09-21 11:39:22 -0400 | [diff] [blame] | 1629 | 10, selected) || |
| 1630 | !SpeedTrustToken("TrustToken-Exp2VOPRF-Batch1", |
| 1631 | TRUST_TOKEN_experiment_v2_voprf(), 1, selected) || |
| 1632 | !SpeedTrustToken("TrustToken-Exp2VOPRF-Batch10", |
| 1633 | TRUST_TOKEN_experiment_v2_voprf(), 10, selected) || |
| 1634 | !SpeedTrustToken("TrustToken-Exp2PMB-Batch1", |
| 1635 | TRUST_TOKEN_experiment_v2_pmb(), 1, selected) || |
| 1636 | !SpeedTrustToken("TrustToken-Exp2PMB-Batch10", |
David Benjamin | f958727 | 2021-09-21 16:33:15 -0400 | [diff] [blame] | 1637 | TRUST_TOKEN_experiment_v2_pmb(), 10, selected) || |
David Benjamin | 345c86b | 2022-01-23 11:11:17 -0500 | [diff] [blame] | 1638 | !SpeedBase64(selected) || |
| 1639 | !SpeedSipHash(selected)) { |
Adam Langley | c5c0c7e | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 1640 | return false; |
| 1641 | } |
David Benjamin | ab5edbe | 2021-01-27 16:49:50 -0500 | [diff] [blame] | 1642 | #if defined(BORINGSSL_FIPS) |
| 1643 | if (!SpeedSelfTest(selected)) { |
| 1644 | return false; |
| 1645 | } |
| 1646 | #endif |
Zola Bridges | f10ea55 | 2019-10-01 11:35:44 -0700 | [diff] [blame] | 1647 | if (g_print_json) { |
| 1648 | puts("\n]"); |
| 1649 | } |
Adam Langley | c5c0c7e | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 1650 | |
Adam Langley | 90b5840 | 2015-04-13 11:04:18 -0700 | [diff] [blame] | 1651 | return true; |
Adam Langley | c5c0c7e | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 1652 | } |