summaryrefslogtreecommitdiff
path: root/test/benchmark_tests/security_tests/bm_is_client_allowed.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'test/benchmark_tests/security_tests/bm_is_client_allowed.cpp')
-rw-r--r--test/benchmark_tests/security_tests/bm_is_client_allowed.cpp195
1 files changed, 195 insertions, 0 deletions
diff --git a/test/benchmark_tests/security_tests/bm_is_client_allowed.cpp b/test/benchmark_tests/security_tests/bm_is_client_allowed.cpp
new file mode 100644
index 0000000..fbbbde3
--- /dev/null
+++ b/test/benchmark_tests/security_tests/bm_is_client_allowed.cpp
@@ -0,0 +1,195 @@
+#include <benchmark/benchmark.h>
+
+#include "../../common/utility.hpp"
+
+namespace {
+ vsomeip_v3::client_t client = 1;
+
+ vsomeip_v3::uid_t uid_1 = 4003031;
+ vsomeip_v3::gid_t gid_1 = 4003031;
+ vsomeip_v3::service_t service_1 = 0xf913;
+
+ vsomeip_v3::instance_t instance = 0x03;
+ vsomeip_v3::method_t method = 0x04;
+
+ vsomeip_v3::gid_t invalid_uid = 1;
+ vsomeip_v3::gid_t invalid_gid = 1;
+
+ vsomeip_v3::gid_t deny_uid = 9999;
+ vsomeip_v3::gid_t deny_gid = 9999;
+ vsomeip_v3::service_t deny_service = 0x40;
+}
+
+static void BM_is_client_allowed_policies_not_loaded(benchmark::State& state) {
+ std::unique_ptr<vsomeip_v3::policy_manager_impl> its_manager(new vsomeip_v3::policy_manager_impl);
+
+ vsomeip_sec_client_t its_sec_client_invalid = utility::create_uds_client(invalid_uid, invalid_gid);
+
+ for (auto _ : state)
+ {
+ its_manager->is_client_allowed(&its_sec_client_invalid, service_1, instance, method);
+ }
+}
+
+static void BM_is_client_allowed_policies_loaded_valid_values(benchmark::State& state) {
+ std::unique_ptr<vsomeip_v3::policy_manager_impl> its_manager(new vsomeip_v3::policy_manager_impl);
+ //force load of some policies
+ std::set<std::string> its_failed;
+ std::vector<vsomeip_v3::configuration_element> policy_elements;
+ std::vector<std::string> dir_skip;
+ utility::read_data(utility::get_all_files_in_dir(utility::get_policies_path(), dir_skip), policy_elements, its_failed);
+
+ for (const auto& e : policy_elements) {
+ its_manager->load(e, false);
+ }
+
+ vsomeip_sec_client_t its_sec_client = utility::create_uds_client(uid_1, gid_1);
+
+ for (auto _ : state) {
+ its_manager->is_client_allowed(&its_sec_client, service_1, instance, method);
+ }
+}
+
+static void BM_is_client_allowed_cache_policies_loaded(benchmark::State& state) {
+ std::unique_ptr<vsomeip_v3::policy_manager_impl> its_manager(new vsomeip_v3::policy_manager_impl);
+ //force load of some policies
+ std::set<std::string> its_failed;
+ std::vector<vsomeip_v3::configuration_element> policy_elements;
+ std::vector<std::string> dir_skip;
+ utility::read_data(utility::get_all_files_in_dir(utility::get_policies_path(), dir_skip), policy_elements, its_failed);
+ for (const auto& e : policy_elements) {
+ its_manager->load(e, false);
+ }
+
+ vsomeip_sec_client_t its_sec_client = utility::create_uds_client(uid_1, gid_1);
+
+ its_manager->is_client_allowed(&its_sec_client, service_1, instance, method);
+
+ for (auto _ : state) {
+ its_manager->is_client_allowed(&its_sec_client, service_1, instance, method);
+ }
+}
+
+static void BM_is_client_allowed_policies_loaded_invalid_values(benchmark::State& state) {
+ std::unique_ptr<vsomeip_v3::policy_manager_impl> its_manager(new vsomeip_v3::policy_manager_impl);
+ //force load of some policies
+ std::set<std::string> its_failed;
+ std::vector<vsomeip_v3::configuration_element> policy_elements;
+ std::vector<std::string> dir_skip;
+ utility::read_data(utility::get_all_files_in_dir(utility::get_policies_path(), dir_skip), policy_elements, its_failed);
+ for (const auto& e : policy_elements) {
+ its_manager->load(e, false);
+ }
+
+ vsomeip_sec_client_t its_sec_client_invalid = utility::create_uds_client(invalid_uid, invalid_gid);
+
+ for (auto _ : state) {
+ its_manager->is_client_allowed(&its_sec_client_invalid, service_1, instance, method);
+ }
+}
+
+static void BM_is_client_allowed_policies_loaded_deny_valid_values(benchmark::State& state) {
+ std::unique_ptr<vsomeip_v3::policy_manager_impl> its_manager(new vsomeip_v3::policy_manager_impl);
+ //force load of some policies
+ std::set<std::string> its_failed;
+ std::vector<vsomeip_v3::configuration_element> policy_elements;
+ std::vector<std::string> dir_skip;
+ utility::read_data(utility::get_all_files_in_dir(utility::get_policies_path(), dir_skip), policy_elements, its_failed);
+ for (const auto& e : policy_elements) {
+ its_manager->load(e, false);
+ }
+
+ vsomeip_sec_client_t its_sec_client_deny = utility::create_uds_client(deny_uid, deny_gid);
+
+ for (auto _ : state) {
+ its_manager->is_client_allowed(&its_sec_client_deny, deny_service, instance, method);
+ }
+}
+
+static void BM_is_client_allowed_policies_loaded_audit_mode_valid_values(benchmark::State& state) {
+ std::unique_ptr<vsomeip_v3::policy_manager_impl> its_manager(new vsomeip_v3::policy_manager_impl);
+ //force load of some policies
+ std::set<std::string> its_failed;
+ std::vector<vsomeip_v3::configuration_element> policy_elements;
+ std::vector<std::string> dir_skip;
+ utility::read_data(utility::get_all_files_in_dir(utility::get_policies_path(), dir_skip), policy_elements, its_failed);
+ utility::force_check_credentials(policy_elements, "false");
+ for (const auto& e : policy_elements) {
+ its_manager->load(e, false);
+ }
+
+ vsomeip_sec_client_t its_sec_client = utility::create_uds_client(uid_1, gid_1);
+
+ for (auto _ : state) {
+ its_manager->is_client_allowed(&its_sec_client, client, service_1, instance, method);
+ }
+}
+
+static void BM_is_client_allowed_cache_policies_loaded_audit_mode(benchmark::State& state) {
+ std::unique_ptr<vsomeip_v3::policy_manager_impl> its_manager(new vsomeip_v3::policy_manager_impl);
+ //force load of some policies
+ std::set<std::string> its_failed;
+ std::vector<vsomeip_v3::configuration_element> policy_elements;
+ std::vector<std::string> dir_skip;
+ utility::read_data(utility::get_all_files_in_dir(utility::get_policies_path(), dir_skip), policy_elements, its_failed);
+ utility::force_check_credentials(policy_elements, "false");
+ for (const auto& e : policy_elements) {
+ its_manager->load(e, false);
+ }
+
+ vsomeip_sec_client_t its_sec_client = utility::create_uds_client(uid_1, gid_1);
+
+ its_manager->is_client_allowed(&its_sec_client, service_1, instance, method);
+
+ for (auto _ : state) {
+ its_manager->is_client_allowed(&its_sec_client, service_1, instance, method);
+ }
+}
+
+static void BM_is_client_allowed_policies_loaded_audit_mode_invalid_values(benchmark::State& state) {
+ std::unique_ptr<vsomeip_v3::policy_manager_impl> its_manager(new vsomeip_v3::policy_manager_impl);
+ //force load of some policies
+ std::set<std::string> its_failed;
+ std::vector<vsomeip_v3::configuration_element> policy_elements;
+ std::vector<std::string> dir_skip;
+ utility::read_data(utility::get_all_files_in_dir(utility::get_policies_path(), dir_skip), policy_elements, its_failed);
+ utility::force_check_credentials(policy_elements, "false");
+ for (const auto& e : policy_elements) {
+ its_manager->load(e, false);
+ }
+
+ vsomeip_sec_client_t its_sec_client_invalid = utility::create_uds_client(invalid_uid, invalid_gid);
+
+ for (auto _ : state) {
+ its_manager->is_client_allowed(&its_sec_client_invalid, service_1, instance, method);
+ }
+}
+
+static void BM_is_client_allowed_policies_loaded_audit_mode_deny_valid_values(benchmark::State& state) {
+ std::unique_ptr<vsomeip_v3::policy_manager_impl> its_manager(new vsomeip_v3::policy_manager_impl);
+ //force load of some policies
+ std::set<std::string> its_failed;
+ std::vector<vsomeip_v3::configuration_element> policy_elements;
+ std::vector<std::string> dir_skip;
+ utility::read_data(utility::get_all_files_in_dir(utility::get_policies_path(), dir_skip), policy_elements, its_failed);
+ utility::force_check_credentials(policy_elements, "false");
+ for (const auto& e : policy_elements) {
+ its_manager->load(e, false);
+ }
+
+ vsomeip_sec_client_t its_sec_client_deny = utility::create_uds_client(deny_uid, deny_gid);
+
+ for (auto _ : state) {
+ its_manager->is_client_allowed(&its_sec_client_deny, deny_service, instance, method);
+ }
+}
+
+BENCHMARK(BM_is_client_allowed_policies_not_loaded);
+BENCHMARK(BM_is_client_allowed_policies_loaded_valid_values);
+BENCHMARK(BM_is_client_allowed_cache_policies_loaded);
+BENCHMARK(BM_is_client_allowed_policies_loaded_invalid_values);
+BENCHMARK(BM_is_client_allowed_policies_loaded_deny_valid_values);
+BENCHMARK(BM_is_client_allowed_policies_loaded_audit_mode_valid_values);
+BENCHMARK(BM_is_client_allowed_cache_policies_loaded_audit_mode);
+BENCHMARK(BM_is_client_allowed_policies_loaded_audit_mode_invalid_values);
+BENCHMARK(BM_is_client_allowed_policies_loaded_audit_mode_deny_valid_values); \ No newline at end of file