|  | // Copyright 2013 The Go Authors. All rights reserved. | 
|  | // Use of this source code is governed by a BSD-style | 
|  | // license that can be found in the LICENSE file. | 
|  |  | 
|  | package cipher_test | 
|  |  | 
|  | import ( | 
|  | "crypto/aes" | 
|  | "crypto/cipher" | 
|  | "testing" | 
|  | ) | 
|  |  | 
|  | func benchmarkAESGCMSign(b *testing.B, buf []byte) { | 
|  | b.SetBytes(int64(len(buf))) | 
|  |  | 
|  | var key [16]byte | 
|  | var nonce [12]byte | 
|  | aes, _ := aes.NewCipher(key[:]) | 
|  | aesgcm, _ := cipher.NewGCM(aes) | 
|  | var out []byte | 
|  |  | 
|  | b.ResetTimer() | 
|  | for i := 0; i < b.N; i++ { | 
|  | out = aesgcm.Seal(out[:0], nonce[:], nil, buf) | 
|  | } | 
|  | } | 
|  |  | 
|  | func benchmarkAESGCMSeal(b *testing.B, buf []byte) { | 
|  | b.SetBytes(int64(len(buf))) | 
|  |  | 
|  | var key [16]byte | 
|  | var nonce [12]byte | 
|  | var ad [13]byte | 
|  | aes, _ := aes.NewCipher(key[:]) | 
|  | aesgcm, _ := cipher.NewGCM(aes) | 
|  | var out []byte | 
|  |  | 
|  | b.ResetTimer() | 
|  | for i := 0; i < b.N; i++ { | 
|  | out = aesgcm.Seal(out[:0], nonce[:], buf, ad[:]) | 
|  | } | 
|  | } | 
|  |  | 
|  | func benchmarkAESGCMOpen(b *testing.B, buf []byte) { | 
|  | b.SetBytes(int64(len(buf))) | 
|  |  | 
|  | var key [16]byte | 
|  | var nonce [12]byte | 
|  | var ad [13]byte | 
|  | aes, _ := aes.NewCipher(key[:]) | 
|  | aesgcm, _ := cipher.NewGCM(aes) | 
|  | var out []byte | 
|  | out = aesgcm.Seal(out[:0], nonce[:], buf, ad[:]) | 
|  |  | 
|  | b.ResetTimer() | 
|  | for i := 0; i < b.N; i++ { | 
|  | _, err := aesgcm.Open(buf[:0], nonce[:], out, ad[:]) | 
|  | if err != nil { | 
|  | b.Errorf("Open: %v", err) | 
|  | } | 
|  | } | 
|  | } | 
|  |  | 
|  | func BenchmarkAESGCMSeal1K(b *testing.B) { | 
|  | benchmarkAESGCMSeal(b, make([]byte, 1024)) | 
|  | } | 
|  |  | 
|  | func BenchmarkAESGCMOpen1K(b *testing.B) { | 
|  | benchmarkAESGCMOpen(b, make([]byte, 1024)) | 
|  | } | 
|  |  | 
|  | func BenchmarkAESGCMSign8K(b *testing.B) { | 
|  | benchmarkAESGCMSign(b, make([]byte, 8*1024)) | 
|  | } | 
|  |  | 
|  | func BenchmarkAESGCMSeal8K(b *testing.B) { | 
|  | benchmarkAESGCMSeal(b, make([]byte, 8*1024)) | 
|  | } | 
|  |  | 
|  | func BenchmarkAESGCMOpen8K(b *testing.B) { | 
|  | benchmarkAESGCMOpen(b, make([]byte, 8*1024)) | 
|  | } | 
|  |  | 
|  | func benchmarkAESStream(b *testing.B, mode func(cipher.Block, []byte) cipher.Stream, buf []byte) { | 
|  | b.SetBytes(int64(len(buf))) | 
|  |  | 
|  | var key [16]byte | 
|  | var iv [16]byte | 
|  | aes, _ := aes.NewCipher(key[:]) | 
|  | stream := mode(aes, iv[:]) | 
|  |  | 
|  | b.ResetTimer() | 
|  | for i := 0; i < b.N; i++ { | 
|  | stream.XORKeyStream(buf, buf) | 
|  | } | 
|  | } | 
|  |  | 
|  | // If we test exactly 1K blocks, we would generate exact multiples of | 
|  | // the cipher's block size, and the cipher stream fragments would | 
|  | // always be wordsize aligned, whereas non-aligned is a more typical | 
|  | // use-case. | 
|  | const almost1K = 1024 - 5 | 
|  | const almost8K = 8*1024 - 5 | 
|  |  | 
|  | func BenchmarkAESCFBEncrypt1K(b *testing.B) { | 
|  | benchmarkAESStream(b, cipher.NewCFBEncrypter, make([]byte, almost1K)) | 
|  | } | 
|  |  | 
|  | func BenchmarkAESCFBDecrypt1K(b *testing.B) { | 
|  | benchmarkAESStream(b, cipher.NewCFBDecrypter, make([]byte, almost1K)) | 
|  | } | 
|  |  | 
|  | func BenchmarkAESCFBDecrypt8K(b *testing.B) { | 
|  | benchmarkAESStream(b, cipher.NewCFBDecrypter, make([]byte, almost8K)) | 
|  | } | 
|  |  | 
|  | func BenchmarkAESOFB1K(b *testing.B) { | 
|  | benchmarkAESStream(b, cipher.NewOFB, make([]byte, almost1K)) | 
|  | } | 
|  |  | 
|  | func BenchmarkAESCTR1K(b *testing.B) { | 
|  | benchmarkAESStream(b, cipher.NewCTR, make([]byte, almost1K)) | 
|  | } | 
|  |  | 
|  | func BenchmarkAESCTR8K(b *testing.B) { | 
|  | benchmarkAESStream(b, cipher.NewCTR, make([]byte, almost8K)) | 
|  | } | 
|  |  | 
|  | func BenchmarkAESCBCEncrypt1K(b *testing.B) { | 
|  | buf := make([]byte, 1024) | 
|  | b.SetBytes(int64(len(buf))) | 
|  |  | 
|  | var key [16]byte | 
|  | var iv [16]byte | 
|  | aes, _ := aes.NewCipher(key[:]) | 
|  | cbc := cipher.NewCBCEncrypter(aes, iv[:]) | 
|  | for i := 0; i < b.N; i++ { | 
|  | cbc.CryptBlocks(buf, buf) | 
|  | } | 
|  | } | 
|  |  | 
|  | func BenchmarkAESCBCDecrypt1K(b *testing.B) { | 
|  | buf := make([]byte, 1024) | 
|  | b.SetBytes(int64(len(buf))) | 
|  |  | 
|  | var key [16]byte | 
|  | var iv [16]byte | 
|  | aes, _ := aes.NewCipher(key[:]) | 
|  | cbc := cipher.NewCBCDecrypter(aes, iv[:]) | 
|  | for i := 0; i < b.N; i++ { | 
|  | cbc.CryptBlocks(buf, buf) | 
|  | } | 
|  | } |