foundationdb/flowbench/BenchEncrypt.cpp

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

238 lines
9.2 KiB
C++
Raw Normal View History

2021-01-26 05:44:55 +08:00
/*
* BenchEncrypt.cpp
*
* This source file is part of the FoundationDB open source project
*
2022-03-22 04:36:23 +08:00
* Copyright 2013-2022 Apple Inc. and the FoundationDB project authors
2021-01-26 05:44:55 +08:00
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "benchmark/benchmark.h"
2023-03-14 03:12:24 +08:00
#include "fdbclient/BlobCipher.h"
#include "flow/EncryptUtils.h"
2021-01-26 05:44:55 +08:00
#include "flow/StreamCipher.h"
#include "flowbench/GlobalData.h"
static StreamCipher::IV getRandomIV() {
StreamCipher::IV iv;
deterministicRandom()->randomBytes(iv.data(), iv.size());
2021-01-26 05:44:55 +08:00
return iv;
}
static inline Standalone<StringRef> encrypt(const StreamCipherKey* const key,
2021-01-26 05:44:55 +08:00
const StreamCipher::IV& iv,
unsigned char const* data,
size_t len) {
EncryptionStreamCipher encryptor(key, iv);
Arena arena;
auto encrypted = encryptor.encrypt(data, len, arena);
return Standalone<StringRef>(encrypted, arena);
}
static void bench_encrypt(benchmark::State& state) {
auto bytes = state.range(0);
auto chunks = state.range(1);
auto chunkSize = bytes / chunks;
StreamCipherKey::initializeGlobalRandomTestKey();
auto key = StreamCipherKey::getGlobalCipherKey();
2021-01-26 05:44:55 +08:00
auto iv = getRandomIV();
auto data = getKey(bytes);
for (auto _ : state) {
2021-01-26 05:44:55 +08:00
for (int chunk = 0; chunk < chunks; ++chunk) {
benchmark::DoNotOptimize(encrypt(key, iv, data.begin() + chunk * chunkSize, chunkSize));
}
}
state.SetBytesProcessed(bytes * static_cast<long>(state.iterations()));
}
static void bench_decrypt(benchmark::State& state) {
auto bytes = state.range(0);
auto chunks = state.range(1);
auto chunkSize = bytes / chunks;
StreamCipherKey::initializeGlobalRandomTestKey();
auto key = StreamCipherKey::getGlobalCipherKey();
2021-01-26 05:44:55 +08:00
auto iv = getRandomIV();
auto data = getKey(bytes);
auto encrypted = encrypt(key, iv, data.begin(), data.size());
for (auto _ : state) {
2021-01-26 05:44:55 +08:00
Arena arena;
DecryptionStreamCipher decryptor(key, iv);
for (int chunk = 0; chunk < chunks; ++chunk) {
benchmark::DoNotOptimize(
Standalone<StringRef>(decryptor.decrypt(encrypted.begin() + chunk * chunkSize, chunkSize, arena)));
}
}
state.SetBytesProcessed(bytes * static_cast<long>(state.iterations()));
}
BENCHMARK(bench_encrypt)->Ranges({ { 1 << 12, 1 << 20 }, { 1, 1 << 12 } });
BENCHMARK(bench_decrypt)->Ranges({ { 1 << 12, 1 << 20 }, { 1, 1 << 12 } });
2023-03-14 03:12:24 +08:00
// DEPRECATED -- Use EncryptionOps for benchmarking purposes.
2023-03-14 03:12:24 +08:00
// blob_chipher* benchmarks are following the encrypt and decrypt unittests from BlobCipher.cpp
// Construct a dummy External Key Manager representation and populate with some keys
class BaseCipher : public ReferenceCounted<BaseCipher>, NonCopyable {
public:
EncryptCipherDomainId domainId;
int len;
EncryptCipherBaseKeyId keyId;
EncryptCipherKeyCheckValue kcv;
2023-03-14 03:12:24 +08:00
std::unique_ptr<uint8_t[]> key;
int64_t refreshAt;
int64_t expireAt;
EncryptCipherRandomSalt generatedSalt;
BaseCipher(const EncryptCipherDomainId& dId,
const EncryptCipherBaseKeyId& kId,
const int64_t rAt,
const int64_t eAt)
: domainId(dId), len(deterministicRandom()->randomInt(4, MAX_BASE_CIPHER_LEN + 1)), keyId(kId),
key(std::make_unique<uint8_t[]>(len)), refreshAt(rAt), expireAt(eAt) {
2023-03-14 03:12:24 +08:00
deterministicRandom()->randomBytes(key.get(), len);
kcv = Sha256KCV().computeKCV(key.get(), len);
2023-03-14 03:12:24 +08:00
}
};
using BaseKeyMap = std::unordered_map<EncryptCipherBaseKeyId, Reference<BaseCipher>>;
using DomainKeyMap = std::unordered_map<EncryptCipherDomainId, BaseKeyMap>;
void static SetupEncryptCipher() {
DomainKeyMap domainKeyMap;
const EncryptCipherDomainId minDomainId = 1;
const EncryptCipherDomainId maxDomainId = deterministicRandom()->randomInt(minDomainId, minDomainId + 10) + 5;
const EncryptCipherBaseKeyId minBaseCipherKeyId = 100;
const EncryptCipherBaseKeyId maxBaseCipherKeyId =
deterministicRandom()->randomInt(minBaseCipherKeyId, minBaseCipherKeyId + 50) + 15;
for (int dId = minDomainId; dId <= maxDomainId; dId++) {
for (int kId = minBaseCipherKeyId; kId <= maxBaseCipherKeyId; kId++) {
domainKeyMap[dId].emplace(
kId,
makeReference<BaseCipher>(
dId, kId, std::numeric_limits<int64_t>::max(), std::numeric_limits<int64_t>::max()));
}
}
ASSERT_EQ(domainKeyMap.size(), maxDomainId);
Reference<BlobCipherKeyCache> cipherKeyCache = BlobCipherKeyCache::getInstance();
for (auto& domainItr : domainKeyMap) {
for (auto& baseKeyItr : domainItr.second) {
Reference<BaseCipher> baseCipher = baseKeyItr.second;
cipherKeyCache->insertCipherKey(baseCipher->domainId,
baseCipher->keyId,
baseCipher->key.get(),
baseCipher->len,
baseCipher->kcv,
2023-03-14 03:12:24 +08:00
baseCipher->refreshAt,
baseCipher->expireAt);
Reference<BlobCipherKey> fetchedKey = cipherKeyCache->getLatestCipherKey(baseCipher->domainId);
baseCipher->generatedSalt = fetchedKey->getSalt();
}
}
}
static void blob_chipher_encrypt(benchmark::State& state) {
const EncryptCipherDomainId minDomainId = 1;
const int pageLen = state.range(0);
const bool isInplace = state.range(1);
SetupEncryptCipher();
Reference<BlobCipherKeyCache> cipherKeyCache = BlobCipherKeyCache::getInstance();
Reference<BlobCipherKey> cipherKey = cipherKeyCache->getLatestCipherKey(minDomainId);
Reference<BlobCipherKey> headerCipherKey = cipherKeyCache->getLatestCipherKey(ENCRYPT_HEADER_DOMAIN_ID);
Arena arena;
uint8_t iv[AES_256_IV_LENGTH];
deterministicRandom()->randomBytes(&iv[0], AES_256_IV_LENGTH);
uint8_t orgData[pageLen];
deterministicRandom()->randomBytes(&orgData[0], pageLen);
for (auto _ : state) {
// create a new encryptor for each encrypt operation to simulate AESEncryptionEncoder.encode()
EncryptBlobCipherAes265Ctr encryptor(cipherKey,
headerCipherKey,
iv,
AES_256_IV_LENGTH,
EncryptAuthTokenMode::ENCRYPT_HEADER_AUTH_TOKEN_MODE_NONE,
BlobCipherMetrics::TEST);
BlobCipherEncryptHeader header;
if (isInplace) {
encryptor.encryptInplace(&orgData[0], pageLen, &header);
} else {
StringRef ciphertext = encryptor.encrypt(&orgData[0], pageLen, &header, arena)->toStringRef();
memcpy(orgData, ciphertext.begin(), pageLen);
}
}
}
static void blob_chipher_decrypt(benchmark::State& state) {
const EncryptCipherDomainId minDomainId = 1;
const int pageLen = state.range(0);
const bool isInplace = state.range(1);
SetupEncryptCipher();
Reference<BlobCipherKeyCache> cipherKeyCache = BlobCipherKeyCache::getInstance();
Reference<BlobCipherKey> cipherKey = cipherKeyCache->getLatestCipherKey(minDomainId);
Reference<BlobCipherKey> headerCipherKey = cipherKeyCache->getLatestCipherKey(ENCRYPT_HEADER_DOMAIN_ID);
Arena arena;
uint8_t iv[AES_256_IV_LENGTH];
deterministicRandom()->randomBytes(&iv[0], AES_256_IV_LENGTH);
uint8_t orgData[pageLen];
deterministicRandom()->randomBytes(&orgData[0], pageLen);
EncryptBlobCipherAes265Ctr encryptor(cipherKey,
headerCipherKey,
iv,
AES_256_IV_LENGTH,
EncryptAuthTokenMode::ENCRYPT_HEADER_AUTH_TOKEN_MODE_NONE,
BlobCipherMetrics::TEST);
BlobCipherEncryptHeaderRef headerRef;
encryptor.encryptInplace(&orgData[0], pageLen, &headerRef);
AesCtrNoAuth noAuth = std::get<AesCtrNoAuth>(headerRef.algoHeader);
Reference<BlobCipherKey> tCipherKeyKey = cipherKeyCache->getCipherKey(noAuth.v1.cipherTextDetails.encryptDomainId,
noAuth.v1.cipherTextDetails.baseCipherId,
noAuth.v1.cipherTextDetails.salt);
for (auto _ : state) {
// create decryptor for every decrypt operation to simulate AESEncryptionEncoder.decode()
DecryptBlobCipherAes256Ctr decryptor(
tCipherKeyKey, Reference<BlobCipherKey>(), &noAuth.v1.iv[0], BlobCipherMetrics::TEST);
if (isInplace) {
decryptor.decryptInplace(&orgData[0], pageLen, headerRef);
} else {
StringRef decrypted = decryptor.decrypt(&orgData[0], pageLen, headerRef, arena);
memcpy(orgData, decrypted.begin(), pageLen);
}
}
}
static void blob_chipher_args(benchmark::internal::Benchmark* b) {
for (int pageLen : { 8000, 16000 }) {
for (bool isInplace : { false, true }) {
b->Args({ pageLen, isInplace });
}
}
b->ArgNames({ "pageLen", "isInplace" });
}
BENCHMARK(blob_chipher_encrypt)->Apply(blob_chipher_args);
BENCHMARK(blob_chipher_decrypt)->Apply(blob_chipher_args);