1a2f01efa6
Update the Go library to the 1.10beta1 release. Requires a few changes to the compiler for modifications to the map runtime code, and to handle some nowritebarrier cases in the runtime. Reviewed-on: https://go-review.googlesource.com/86455 gotools/: * Makefile.am (go_cmd_vet_files): New variable. (go_cmd_buildid_files, go_cmd_test2json_files): New variables. (s-zdefaultcc): Change from constants to functions. (noinst_PROGRAMS): Add vet, buildid, and test2json. (cgo$(EXEEXT)): Link against $(LIBGOTOOL). (vet$(EXEEXT)): New target. (buildid$(EXEEXT)): New target. (test2json$(EXEEXT)): New target. (install-exec-local): Install all $(noinst_PROGRAMS). (uninstall-local): Uninstasll all $(noinst_PROGRAMS). (check-go-tool): Depend on $(noinst_PROGRAMS). Copy down objabi.go. (check-runtime): Depend on $(noinst_PROGRAMS). (check-cgo-test, check-carchive-test): Likewise. (check-vet): New target. (check): Depend on check-vet. Look at cmd_vet-testlog. (.PHONY): Add check-vet. * Makefile.in: Rebuild. From-SVN: r256365
175 lines
3.6 KiB
Go
175 lines
3.6 KiB
Go
// Copyright 2013 The Go Authors. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style
|
|
// license that can be found in the LICENSE file.
|
|
|
|
package cipher_test
|
|
|
|
import (
|
|
"crypto/aes"
|
|
"crypto/cipher"
|
|
"testing"
|
|
)
|
|
|
|
func benchmarkAESGCMSign(b *testing.B, buf []byte) {
|
|
b.SetBytes(int64(len(buf)))
|
|
|
|
var key [16]byte
|
|
var nonce [12]byte
|
|
aes, _ := aes.NewCipher(key[:])
|
|
aesgcm, _ := cipher.NewGCM(aes)
|
|
var out []byte
|
|
|
|
b.ResetTimer()
|
|
for i := 0; i < b.N; i++ {
|
|
out = aesgcm.Seal(out[:0], nonce[:], nil, buf)
|
|
}
|
|
}
|
|
|
|
func benchmarkAESGCMSeal(b *testing.B, buf []byte) {
|
|
b.SetBytes(int64(len(buf)))
|
|
|
|
var key [16]byte
|
|
var nonce [12]byte
|
|
var ad [13]byte
|
|
aes, _ := aes.NewCipher(key[:])
|
|
aesgcm, _ := cipher.NewGCM(aes)
|
|
var out []byte
|
|
|
|
b.ResetTimer()
|
|
for i := 0; i < b.N; i++ {
|
|
out = aesgcm.Seal(out[:0], nonce[:], buf, ad[:])
|
|
}
|
|
}
|
|
|
|
func benchmarkAESGCMOpen(b *testing.B, buf []byte) {
|
|
b.SetBytes(int64(len(buf)))
|
|
|
|
var key [16]byte
|
|
var nonce [12]byte
|
|
var ad [13]byte
|
|
aes, _ := aes.NewCipher(key[:])
|
|
aesgcm, _ := cipher.NewGCM(aes)
|
|
var out []byte
|
|
out = aesgcm.Seal(out[:0], nonce[:], buf, ad[:])
|
|
|
|
b.ResetTimer()
|
|
for i := 0; i < b.N; i++ {
|
|
_, err := aesgcm.Open(buf[:0], nonce[:], out, ad[:])
|
|
if err != nil {
|
|
b.Errorf("Open: %v", err)
|
|
}
|
|
}
|
|
}
|
|
|
|
func BenchmarkAESGCMSeal1K(b *testing.B) {
|
|
benchmarkAESGCMSeal(b, make([]byte, 1024))
|
|
}
|
|
|
|
func BenchmarkAESGCMOpen1K(b *testing.B) {
|
|
benchmarkAESGCMOpen(b, make([]byte, 1024))
|
|
}
|
|
|
|
func BenchmarkAESGCMSign8K(b *testing.B) {
|
|
benchmarkAESGCMSign(b, make([]byte, 8*1024))
|
|
}
|
|
|
|
func BenchmarkAESGCMSeal8K(b *testing.B) {
|
|
benchmarkAESGCMSeal(b, make([]byte, 8*1024))
|
|
}
|
|
|
|
func BenchmarkAESGCMOpen8K(b *testing.B) {
|
|
benchmarkAESGCMOpen(b, make([]byte, 8*1024))
|
|
}
|
|
|
|
// If we test exactly 1K blocks, we would generate exact multiples of
|
|
// the cipher's block size, and the cipher stream fragments would
|
|
// always be wordsize aligned, whereas non-aligned is a more typical
|
|
// use-case.
|
|
const almost1K = 1024 - 5
|
|
|
|
func BenchmarkAESCFBEncrypt1K(b *testing.B) {
|
|
buf := make([]byte, almost1K)
|
|
b.SetBytes(int64(len(buf)))
|
|
|
|
var key [16]byte
|
|
var iv [16]byte
|
|
aes, _ := aes.NewCipher(key[:])
|
|
ctr := cipher.NewCFBEncrypter(aes, iv[:])
|
|
|
|
b.ResetTimer()
|
|
for i := 0; i < b.N; i++ {
|
|
ctr.XORKeyStream(buf, buf)
|
|
}
|
|
}
|
|
|
|
func BenchmarkAESCFBDecrypt1K(b *testing.B) {
|
|
buf := make([]byte, almost1K)
|
|
b.SetBytes(int64(len(buf)))
|
|
|
|
var key [16]byte
|
|
var iv [16]byte
|
|
aes, _ := aes.NewCipher(key[:])
|
|
ctr := cipher.NewCFBDecrypter(aes, iv[:])
|
|
|
|
b.ResetTimer()
|
|
for i := 0; i < b.N; i++ {
|
|
ctr.XORKeyStream(buf, buf)
|
|
}
|
|
}
|
|
|
|
func BenchmarkAESOFB1K(b *testing.B) {
|
|
buf := make([]byte, almost1K)
|
|
b.SetBytes(int64(len(buf)))
|
|
|
|
var key [16]byte
|
|
var iv [16]byte
|
|
aes, _ := aes.NewCipher(key[:])
|
|
ctr := cipher.NewOFB(aes, iv[:])
|
|
|
|
b.ResetTimer()
|
|
for i := 0; i < b.N; i++ {
|
|
ctr.XORKeyStream(buf, buf)
|
|
}
|
|
}
|
|
|
|
func BenchmarkAESCTR1K(b *testing.B) {
|
|
buf := make([]byte, almost1K)
|
|
b.SetBytes(int64(len(buf)))
|
|
|
|
var key [16]byte
|
|
var iv [16]byte
|
|
aes, _ := aes.NewCipher(key[:])
|
|
ctr := cipher.NewCTR(aes, iv[:])
|
|
|
|
b.ResetTimer()
|
|
for i := 0; i < b.N; i++ {
|
|
ctr.XORKeyStream(buf, buf)
|
|
}
|
|
}
|
|
|
|
func BenchmarkAESCBCEncrypt1K(b *testing.B) {
|
|
buf := make([]byte, 1024)
|
|
b.SetBytes(int64(len(buf)))
|
|
|
|
var key [16]byte
|
|
var iv [16]byte
|
|
aes, _ := aes.NewCipher(key[:])
|
|
cbc := cipher.NewCBCEncrypter(aes, iv[:])
|
|
for i := 0; i < b.N; i++ {
|
|
cbc.CryptBlocks(buf, buf)
|
|
}
|
|
}
|
|
|
|
func BenchmarkAESCBCDecrypt1K(b *testing.B) {
|
|
buf := make([]byte, 1024)
|
|
b.SetBytes(int64(len(buf)))
|
|
|
|
var key [16]byte
|
|
var iv [16]byte
|
|
aes, _ := aes.NewCipher(key[:])
|
|
cbc := cipher.NewCBCDecrypter(aes, iv[:])
|
|
for i := 0; i < b.N; i++ {
|
|
cbc.CryptBlocks(buf, buf)
|
|
}
|
|
}
|