Reviewed-on: https://go-review.googlesource.com/c/158019 gotools/: * Makefile.am (go_cmd_vet_files): Update for Go1.12beta2 release. (GOTOOLS_TEST_TIMEOUT): Increase to 600. (check-runtime): Export LD_LIBRARY_PATH before computing GOARCH and GOOS. (check-vet): Copy golang.org/x/tools into check-vet-dir. * Makefile.in: Regenerate. gcc/testsuite/: * go.go-torture/execute/names-1.go: Stop using debug/xcoff, which is no longer externally visible. From-SVN: r268084
154 lines
3.5 KiB
Go
154 lines
3.5 KiB
Go
// Copyright 2013 The Go Authors. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style
|
|
// license that can be found in the LICENSE file.
|
|
|
|
package cipher_test
|
|
|
|
import (
|
|
"crypto/aes"
|
|
"crypto/cipher"
|
|
"testing"
|
|
)
|
|
|
|
func benchmarkAESGCMSign(b *testing.B, buf []byte) {
|
|
b.SetBytes(int64(len(buf)))
|
|
|
|
var key [16]byte
|
|
var nonce [12]byte
|
|
aes, _ := aes.NewCipher(key[:])
|
|
aesgcm, _ := cipher.NewGCM(aes)
|
|
var out []byte
|
|
|
|
b.ResetTimer()
|
|
for i := 0; i < b.N; i++ {
|
|
out = aesgcm.Seal(out[:0], nonce[:], nil, buf)
|
|
}
|
|
}
|
|
|
|
func benchmarkAESGCMSeal(b *testing.B, buf []byte) {
|
|
b.SetBytes(int64(len(buf)))
|
|
|
|
var key [16]byte
|
|
var nonce [12]byte
|
|
var ad [13]byte
|
|
aes, _ := aes.NewCipher(key[:])
|
|
aesgcm, _ := cipher.NewGCM(aes)
|
|
var out []byte
|
|
|
|
b.ResetTimer()
|
|
for i := 0; i < b.N; i++ {
|
|
out = aesgcm.Seal(out[:0], nonce[:], buf, ad[:])
|
|
}
|
|
}
|
|
|
|
func benchmarkAESGCMOpen(b *testing.B, buf []byte) {
|
|
b.SetBytes(int64(len(buf)))
|
|
|
|
var key [16]byte
|
|
var nonce [12]byte
|
|
var ad [13]byte
|
|
aes, _ := aes.NewCipher(key[:])
|
|
aesgcm, _ := cipher.NewGCM(aes)
|
|
var out []byte
|
|
out = aesgcm.Seal(out[:0], nonce[:], buf, ad[:])
|
|
|
|
b.ResetTimer()
|
|
for i := 0; i < b.N; i++ {
|
|
_, err := aesgcm.Open(buf[:0], nonce[:], out, ad[:])
|
|
if err != nil {
|
|
b.Errorf("Open: %v", err)
|
|
}
|
|
}
|
|
}
|
|
|
|
func BenchmarkAESGCMSeal1K(b *testing.B) {
|
|
benchmarkAESGCMSeal(b, make([]byte, 1024))
|
|
}
|
|
|
|
func BenchmarkAESGCMOpen1K(b *testing.B) {
|
|
benchmarkAESGCMOpen(b, make([]byte, 1024))
|
|
}
|
|
|
|
func BenchmarkAESGCMSign8K(b *testing.B) {
|
|
benchmarkAESGCMSign(b, make([]byte, 8*1024))
|
|
}
|
|
|
|
func BenchmarkAESGCMSeal8K(b *testing.B) {
|
|
benchmarkAESGCMSeal(b, make([]byte, 8*1024))
|
|
}
|
|
|
|
func BenchmarkAESGCMOpen8K(b *testing.B) {
|
|
benchmarkAESGCMOpen(b, make([]byte, 8*1024))
|
|
}
|
|
|
|
func benchmarkAESStream(b *testing.B, mode func(cipher.Block, []byte) cipher.Stream, buf []byte) {
|
|
b.SetBytes(int64(len(buf)))
|
|
|
|
var key [16]byte
|
|
var iv [16]byte
|
|
aes, _ := aes.NewCipher(key[:])
|
|
stream := mode(aes, iv[:])
|
|
|
|
b.ResetTimer()
|
|
for i := 0; i < b.N; i++ {
|
|
stream.XORKeyStream(buf, buf)
|
|
}
|
|
}
|
|
|
|
// If we test exactly 1K blocks, we would generate exact multiples of
|
|
// the cipher's block size, and the cipher stream fragments would
|
|
// always be wordsize aligned, whereas non-aligned is a more typical
|
|
// use-case.
|
|
const almost1K = 1024 - 5
|
|
const almost8K = 8*1024 - 5
|
|
|
|
func BenchmarkAESCFBEncrypt1K(b *testing.B) {
|
|
benchmarkAESStream(b, cipher.NewCFBEncrypter, make([]byte, almost1K))
|
|
}
|
|
|
|
func BenchmarkAESCFBDecrypt1K(b *testing.B) {
|
|
benchmarkAESStream(b, cipher.NewCFBDecrypter, make([]byte, almost1K))
|
|
}
|
|
|
|
func BenchmarkAESCFBDecrypt8K(b *testing.B) {
|
|
benchmarkAESStream(b, cipher.NewCFBDecrypter, make([]byte, almost8K))
|
|
}
|
|
|
|
func BenchmarkAESOFB1K(b *testing.B) {
|
|
benchmarkAESStream(b, cipher.NewOFB, make([]byte, almost1K))
|
|
}
|
|
|
|
func BenchmarkAESCTR1K(b *testing.B) {
|
|
benchmarkAESStream(b, cipher.NewCTR, make([]byte, almost1K))
|
|
}
|
|
|
|
func BenchmarkAESCTR8K(b *testing.B) {
|
|
benchmarkAESStream(b, cipher.NewCTR, make([]byte, almost8K))
|
|
}
|
|
|
|
func BenchmarkAESCBCEncrypt1K(b *testing.B) {
|
|
buf := make([]byte, 1024)
|
|
b.SetBytes(int64(len(buf)))
|
|
|
|
var key [16]byte
|
|
var iv [16]byte
|
|
aes, _ := aes.NewCipher(key[:])
|
|
cbc := cipher.NewCBCEncrypter(aes, iv[:])
|
|
for i := 0; i < b.N; i++ {
|
|
cbc.CryptBlocks(buf, buf)
|
|
}
|
|
}
|
|
|
|
func BenchmarkAESCBCDecrypt1K(b *testing.B) {
|
|
buf := make([]byte, 1024)
|
|
b.SetBytes(int64(len(buf)))
|
|
|
|
var key [16]byte
|
|
var iv [16]byte
|
|
aes, _ := aes.NewCipher(key[:])
|
|
cbc := cipher.NewCBCDecrypter(aes, iv[:])
|
|
for i := 0; i < b.N; i++ {
|
|
cbc.CryptBlocks(buf, buf)
|
|
}
|
|
}
|