2019-04-09 14:13:35 +01:00
|
|
|
// Copyright 2009 The Go Authors. All rights reserved.
|
|
|
|
// Use of this source code is governed by a BSD-style
|
|
|
|
// license that can be found in the LICENSE file.
|
add basic support for ppc64le, riscv64 (#48)
This change set modifies build metadata to add support for ppc64le
(POWER9) and riscv64 (RISC-V). The arm64 and amd64 assembler
implementations are architecture specific and do not support ppc64le or
riscv64. On ppc64le or riscv64 a generic implementation is chosen. The
drbg/internal/aes/cipher_noasm.go file was written by @mixmasala and
myself.
The csidh and sidh tests are extremely slow (>30m) on RISC-V using the
sifive,u54-mc (HiFive Unleashed) development board. The test timeout is
set to infinity on RISC-V by the top level Makefile as at least one test
does not finish within the default 10 minutes on RISC-V. On RISC-V the
csidh test finishes after around 30 minutes, the sidh test finishes
after around 71 minutes.
These changes were tested with amd64 (Intel Core i7), arm64 (Raspberry
Pi 4b), ppc64le (Talos POWER9, PowerNV T2P9D01 REV 1.00), and riscv64
(HighFive Unleashed, rv64imafdc,sifive,u54-mc).
The kernel versions of those systems follows:
Linux rpi4 5.13.0-1009-raspi #10-Ubuntu SMP PREEMPT Mon Oct 25 13:58:43
UTC 2021 aarch64 aarch64 aarch64 GNU/Linux
Linux i7 5.8.0-63-generic #71-Ubuntu SMP Tue Jul 13 15:59:12 UTC 2021
x86_64 x86_64 x86_64 GNU/Linux
Linux power9 5.11.0-34-generic #36-Ubuntu SMP Thu Aug 26 19:19:54 UTC
2021 ppc64le ppc64le ppc64le GNU/Linux
Linux risc-v-unleashed-000 5.11.0-1022-generic #23~20.04.1-Ubuntu SMP
Thu Oct 21 10:16:27 UTC 2021 riscv64 riscv64 riscv64 GNU/Linux
2023-03-13 23:12:45 +00:00
|
|
|
// +build noasm amd64 arm64 ppc64le riscv64
|
|
|
|
|
2019-04-09 14:13:35 +01:00
|
|
|
|
|
|
|
package aes
|
|
|
|
|
|
|
|
import (
|
|
|
|
"testing"
|
|
|
|
)
|
|
|
|
|
|
|
|
// See const.go for overview of math here.
|
|
|
|
|
|
|
|
// Test that powx is initialized correctly.
|
|
|
|
// (Can adapt this code to generate it too.)
|
|
|
|
func TestPowx(t *testing.T) {
|
|
|
|
p := 1
|
|
|
|
for i := 0; i < len(powx); i++ {
|
|
|
|
if powx[i] != byte(p) {
|
|
|
|
t.Errorf("powx[%d] = %#x, want %#x", i, powx[i], p)
|
|
|
|
}
|
|
|
|
p <<= 1
|
|
|
|
if p&0x100 != 0 {
|
|
|
|
p ^= poly
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Multiply b and c as GF(2) polynomials modulo poly
|
|
|
|
func mul(b, c uint32) uint32 {
|
|
|
|
i := b
|
|
|
|
j := c
|
|
|
|
s := uint32(0)
|
|
|
|
for k := uint32(1); k < 0x100 && j != 0; k <<= 1 {
|
|
|
|
// Invariant: k == 1<<n, i == b * xⁿ
|
|
|
|
|
|
|
|
if j&k != 0 {
|
|
|
|
// s += i in GF(2); xor in binary
|
|
|
|
s ^= i
|
|
|
|
j ^= k // turn off bit to end loop early
|
|
|
|
}
|
|
|
|
|
|
|
|
// i *= x in GF(2) modulo the polynomial
|
|
|
|
i <<= 1
|
|
|
|
if i&0x100 != 0 {
|
|
|
|
i ^= poly
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return s
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test all mul inputs against bit-by-bit n² algorithm.
|
|
|
|
func TestMul(t *testing.T) {
|
|
|
|
for i := uint32(0); i < 256; i++ {
|
|
|
|
for j := uint32(0); j < 256; j++ {
|
|
|
|
// Multiply i, j bit by bit.
|
|
|
|
s := uint8(0)
|
|
|
|
for k := uint(0); k < 8; k++ {
|
|
|
|
for l := uint(0); l < 8; l++ {
|
|
|
|
if i&(1<<k) != 0 && j&(1<<l) != 0 {
|
|
|
|
s ^= powx[k+l]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if x := mul(i, j); x != uint32(s) {
|
|
|
|
t.Fatalf("mul(%#x, %#x) = %#x, want %#x", i, j, x, s)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check that S-boxes are inverses of each other.
|
|
|
|
// They have more structure that we could test,
|
|
|
|
// but if this sanity check passes, we'll assume
|
|
|
|
// the cut and paste from the FIPS PDF worked.
|
|
|
|
func TestSboxes(t *testing.T) {
|
|
|
|
for i := 0; i < 256; i++ {
|
|
|
|
if j := sbox0[sbox1[i]]; j != byte(i) {
|
|
|
|
t.Errorf("sbox0[sbox1[%#x]] = %#x", i, j)
|
|
|
|
}
|
|
|
|
if j := sbox1[sbox0[i]]; j != byte(i) {
|
|
|
|
t.Errorf("sbox1[sbox0[%#x]] = %#x", i, j)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test that encryption tables are correct.
|
|
|
|
// (Can adapt this code to generate them too.)
|
|
|
|
func TestTe(t *testing.T) {
|
|
|
|
for i := 0; i < 256; i++ {
|
|
|
|
s := uint32(sbox0[i])
|
|
|
|
s2 := mul(s, 2)
|
|
|
|
s3 := mul(s, 3)
|
|
|
|
w := s2<<24 | s<<16 | s<<8 | s3
|
|
|
|
te := [][256]uint32{te0, te1, te2, te3}
|
|
|
|
for j := 0; j < 4; j++ {
|
|
|
|
if x := te[j][i]; x != w {
|
|
|
|
t.Fatalf("te[%d][%d] = %#x, want %#x", j, i, x, w)
|
|
|
|
}
|
|
|
|
w = w<<24 | w>>8
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test that decryption tables are correct.
|
|
|
|
// (Can adapt this code to generate them too.)
|
|
|
|
func TestTd(t *testing.T) {
|
|
|
|
for i := 0; i < 256; i++ {
|
|
|
|
s := uint32(sbox1[i])
|
|
|
|
s9 := mul(s, 0x9)
|
|
|
|
sb := mul(s, 0xb)
|
|
|
|
sd := mul(s, 0xd)
|
|
|
|
se := mul(s, 0xe)
|
|
|
|
w := se<<24 | s9<<16 | sd<<8 | sb
|
|
|
|
td := [][256]uint32{td0, td1, td2, td3}
|
|
|
|
for j := 0; j < 4; j++ {
|
|
|
|
if x := td[j][i]; x != w {
|
|
|
|
t.Fatalf("td[%d][%d] = %#x, want %#x", j, i, x, w)
|
|
|
|
}
|
|
|
|
w = w<<24 | w>>8
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test vectors are from FIPS 197:
|
|
|
|
// https://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
|
|
|
|
|
|
|
|
// Appendix A of FIPS 197: Key expansion examples
|
|
|
|
type KeyTest struct {
|
|
|
|
key []byte
|
|
|
|
enc []uint32
|
|
|
|
dec []uint32 // decryption expansion; not in FIPS 197, computed from C implementation.
|
|
|
|
}
|
|
|
|
|
|
|
|
var keyTests = []KeyTest{
|
|
|
|
{
|
|
|
|
// A.1. Expansion of a 128-bit Cipher Key
|
|
|
|
[]byte{0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c},
|
|
|
|
[]uint32{
|
|
|
|
0x2b7e1516, 0x28aed2a6, 0xabf71588, 0x09cf4f3c,
|
|
|
|
0xa0fafe17, 0x88542cb1, 0x23a33939, 0x2a6c7605,
|
|
|
|
0xf2c295f2, 0x7a96b943, 0x5935807a, 0x7359f67f,
|
|
|
|
0x3d80477d, 0x4716fe3e, 0x1e237e44, 0x6d7a883b,
|
|
|
|
0xef44a541, 0xa8525b7f, 0xb671253b, 0xdb0bad00,
|
|
|
|
0xd4d1c6f8, 0x7c839d87, 0xcaf2b8bc, 0x11f915bc,
|
|
|
|
0x6d88a37a, 0x110b3efd, 0xdbf98641, 0xca0093fd,
|
|
|
|
0x4e54f70e, 0x5f5fc9f3, 0x84a64fb2, 0x4ea6dc4f,
|
|
|
|
0xead27321, 0xb58dbad2, 0x312bf560, 0x7f8d292f,
|
|
|
|
0xac7766f3, 0x19fadc21, 0x28d12941, 0x575c006e,
|
|
|
|
0xd014f9a8, 0xc9ee2589, 0xe13f0cc8, 0xb6630ca6,
|
|
|
|
},
|
|
|
|
[]uint32{
|
|
|
|
0xd014f9a8, 0xc9ee2589, 0xe13f0cc8, 0xb6630ca6,
|
|
|
|
0xc7b5a63, 0x1319eafe, 0xb0398890, 0x664cfbb4,
|
|
|
|
0xdf7d925a, 0x1f62b09d, 0xa320626e, 0xd6757324,
|
|
|
|
0x12c07647, 0xc01f22c7, 0xbc42d2f3, 0x7555114a,
|
|
|
|
0x6efcd876, 0xd2df5480, 0x7c5df034, 0xc917c3b9,
|
|
|
|
0x6ea30afc, 0xbc238cf6, 0xae82a4b4, 0xb54a338d,
|
|
|
|
0x90884413, 0xd280860a, 0x12a12842, 0x1bc89739,
|
|
|
|
0x7c1f13f7, 0x4208c219, 0xc021ae48, 0x969bf7b,
|
|
|
|
0xcc7505eb, 0x3e17d1ee, 0x82296c51, 0xc9481133,
|
|
|
|
0x2b3708a7, 0xf262d405, 0xbc3ebdbf, 0x4b617d62,
|
|
|
|
0x2b7e1516, 0x28aed2a6, 0xabf71588, 0x9cf4f3c,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
// A.2. Expansion of a 192-bit Cipher Key
|
|
|
|
[]byte{
|
|
|
|
0x8e, 0x73, 0xb0, 0xf7, 0xda, 0x0e, 0x64, 0x52, 0xc8, 0x10, 0xf3, 0x2b, 0x80, 0x90, 0x79, 0xe5,
|
|
|
|
0x62, 0xf8, 0xea, 0xd2, 0x52, 0x2c, 0x6b, 0x7b,
|
|
|
|
},
|
|
|
|
[]uint32{
|
|
|
|
0x8e73b0f7, 0xda0e6452, 0xc810f32b, 0x809079e5,
|
|
|
|
0x62f8ead2, 0x522c6b7b, 0xfe0c91f7, 0x2402f5a5,
|
|
|
|
0xec12068e, 0x6c827f6b, 0x0e7a95b9, 0x5c56fec2,
|
|
|
|
0x4db7b4bd, 0x69b54118, 0x85a74796, 0xe92538fd,
|
|
|
|
0xe75fad44, 0xbb095386, 0x485af057, 0x21efb14f,
|
|
|
|
0xa448f6d9, 0x4d6dce24, 0xaa326360, 0x113b30e6,
|
|
|
|
0xa25e7ed5, 0x83b1cf9a, 0x27f93943, 0x6a94f767,
|
|
|
|
0xc0a69407, 0xd19da4e1, 0xec1786eb, 0x6fa64971,
|
|
|
|
0x485f7032, 0x22cb8755, 0xe26d1352, 0x33f0b7b3,
|
|
|
|
0x40beeb28, 0x2f18a259, 0x6747d26b, 0x458c553e,
|
|
|
|
0xa7e1466c, 0x9411f1df, 0x821f750a, 0xad07d753,
|
|
|
|
0xca400538, 0x8fcc5006, 0x282d166a, 0xbc3ce7b5,
|
|
|
|
0xe98ba06f, 0x448c773c, 0x8ecc7204, 0x01002202,
|
|
|
|
},
|
|
|
|
nil,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
// A.3. Expansion of a 256-bit Cipher Key
|
|
|
|
[]byte{
|
|
|
|
0x60, 0x3d, 0xeb, 0x10, 0x15, 0xca, 0x71, 0xbe, 0x2b, 0x73, 0xae, 0xf0, 0x85, 0x7d, 0x77, 0x81,
|
|
|
|
0x1f, 0x35, 0x2c, 0x07, 0x3b, 0x61, 0x08, 0xd7, 0x2d, 0x98, 0x10, 0xa3, 0x09, 0x14, 0xdf, 0xf4,
|
|
|
|
},
|
|
|
|
[]uint32{
|
|
|
|
0x603deb10, 0x15ca71be, 0x2b73aef0, 0x857d7781,
|
|
|
|
0x1f352c07, 0x3b6108d7, 0x2d9810a3, 0x0914dff4,
|
|
|
|
0x9ba35411, 0x8e6925af, 0xa51a8b5f, 0x2067fcde,
|
|
|
|
0xa8b09c1a, 0x93d194cd, 0xbe49846e, 0xb75d5b9a,
|
|
|
|
0xd59aecb8, 0x5bf3c917, 0xfee94248, 0xde8ebe96,
|
|
|
|
0xb5a9328a, 0x2678a647, 0x98312229, 0x2f6c79b3,
|
|
|
|
0x812c81ad, 0xdadf48ba, 0x24360af2, 0xfab8b464,
|
|
|
|
0x98c5bfc9, 0xbebd198e, 0x268c3ba7, 0x09e04214,
|
|
|
|
0x68007bac, 0xb2df3316, 0x96e939e4, 0x6c518d80,
|
|
|
|
0xc814e204, 0x76a9fb8a, 0x5025c02d, 0x59c58239,
|
|
|
|
0xde136967, 0x6ccc5a71, 0xfa256395, 0x9674ee15,
|
|
|
|
0x5886ca5d, 0x2e2f31d7, 0x7e0af1fa, 0x27cf73c3,
|
|
|
|
0x749c47ab, 0x18501dda, 0xe2757e4f, 0x7401905a,
|
|
|
|
0xcafaaae3, 0xe4d59b34, 0x9adf6ace, 0xbd10190d,
|
|
|
|
0xfe4890d1, 0xe6188d0b, 0x046df344, 0x706c631e,
|
|
|
|
},
|
|
|
|
nil,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test key expansion against FIPS 197 examples.
|
|
|
|
func TestExpandKey(t *testing.T) {
|
|
|
|
L:
|
|
|
|
for i, tt := range keyTests {
|
|
|
|
enc := make([]uint32, len(tt.enc))
|
|
|
|
var dec []uint32
|
|
|
|
if tt.dec != nil {
|
|
|
|
dec = make([]uint32, len(tt.dec))
|
|
|
|
}
|
|
|
|
// This test could only test Go version of expandKey because asm
|
|
|
|
// version might use different memory layout for expanded keys
|
|
|
|
// This is OK because we don't expose expanded keys to the outside
|
|
|
|
expandKeyGo(tt.key, enc, dec)
|
|
|
|
for j, v := range enc {
|
|
|
|
if v != tt.enc[j] {
|
|
|
|
t.Errorf("key %d: enc[%d] = %#x, want %#x", i, j, v, tt.enc[j])
|
|
|
|
continue L
|
|
|
|
}
|
|
|
|
}
|
|
|
|
for j, v := range dec {
|
|
|
|
if v != tt.dec[j] {
|
|
|
|
t.Errorf("key %d: dec[%d] = %#x, want %#x", i, j, v, tt.dec[j])
|
|
|
|
continue L
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Appendix B, C of FIPS 197: Cipher examples, Example vectors.
|
|
|
|
type CryptTest struct {
|
|
|
|
key []byte
|
|
|
|
in []byte
|
|
|
|
out []byte
|
|
|
|
}
|
|
|
|
|
|
|
|
var encryptTests = []CryptTest{
|
|
|
|
{
|
|
|
|
// Appendix B.
|
|
|
|
[]byte{0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c},
|
|
|
|
[]byte{0x32, 0x43, 0xf6, 0xa8, 0x88, 0x5a, 0x30, 0x8d, 0x31, 0x31, 0x98, 0xa2, 0xe0, 0x37, 0x07, 0x34},
|
|
|
|
[]byte{0x39, 0x25, 0x84, 0x1d, 0x02, 0xdc, 0x09, 0xfb, 0xdc, 0x11, 0x85, 0x97, 0x19, 0x6a, 0x0b, 0x32},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
// Appendix C.1. AES-128
|
|
|
|
[]byte{0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f},
|
|
|
|
[]byte{0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff},
|
|
|
|
[]byte{0x69, 0xc4, 0xe0, 0xd8, 0x6a, 0x7b, 0x04, 0x30, 0xd8, 0xcd, 0xb7, 0x80, 0x70, 0xb4, 0xc5, 0x5a},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
// Appendix C.2. AES-192
|
|
|
|
[]byte{0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f,
|
|
|
|
0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17,
|
|
|
|
},
|
|
|
|
[]byte{0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff},
|
|
|
|
[]byte{0xdd, 0xa9, 0x7c, 0xa4, 0x86, 0x4c, 0xdf, 0xe0, 0x6e, 0xaf, 0x70, 0xa0, 0xec, 0x0d, 0x71, 0x91},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
// Appendix C.3. AES-256
|
|
|
|
[]byte{0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f,
|
|
|
|
0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f,
|
|
|
|
},
|
|
|
|
[]byte{0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff},
|
|
|
|
[]byte{0x8e, 0xa2, 0xb7, 0xca, 0x51, 0x67, 0x45, 0xbf, 0xea, 0xfc, 0x49, 0x90, 0x4b, 0x49, 0x60, 0x89},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test Cipher Encrypt method against FIPS 197 examples.
|
|
|
|
func TestCipherEncrypt(t *testing.T) {
|
|
|
|
c := NewCipher()
|
|
|
|
for i, tt := range encryptTests {
|
|
|
|
err := c.SetKey(tt.key)
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("NewCipher(%d bytes) = %s", len(tt.key), err)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
out := make([]byte, len(tt.in))
|
|
|
|
c.Encrypt(out, tt.in)
|
|
|
|
for j, v := range out {
|
|
|
|
if v != tt.out[j] {
|
|
|
|
t.Errorf("Cipher.Encrypt %d: out[%d] = %#x, want %#x", i, j, v, tt.out[j])
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test Cipher Decrypt against FIPS 197 examples.
|
|
|
|
func TestCipherDecrypt(t *testing.T) {
|
|
|
|
for i, tt := range encryptTests {
|
|
|
|
c := NewCipher()
|
|
|
|
err := c.SetKey(tt.key)
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("NewCipher(%d bytes) = %s", len(tt.key), err)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
plain := make([]byte, len(tt.in))
|
|
|
|
c.Decrypt(plain, tt.out)
|
|
|
|
for j, v := range plain {
|
|
|
|
if v != tt.in[j] {
|
|
|
|
t.Errorf("decryptBlock %d: plain[%d] = %#x, want %#x", i, j, v, tt.in[j])
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test short input/output.
|
|
|
|
// Assembly used to not notice.
|
|
|
|
// See issue 7928.
|
|
|
|
func TestShortBlocks(t *testing.T) {
|
|
|
|
bytes := func(n int) []byte { return make([]byte, n) }
|
|
|
|
|
|
|
|
c := NewCipher()
|
|
|
|
c.SetKey(bytes(16))
|
|
|
|
|
|
|
|
mustPanic(t, "crypto/aes: input not full block", func() { c.Encrypt(bytes(1), bytes(1)) })
|
|
|
|
mustPanic(t, "crypto/aes: input not full block", func() { c.Decrypt(bytes(1), bytes(1)) })
|
|
|
|
mustPanic(t, "crypto/aes: input not full block", func() { c.Encrypt(bytes(100), bytes(1)) })
|
|
|
|
mustPanic(t, "crypto/aes: input not full block", func() { c.Decrypt(bytes(100), bytes(1)) })
|
|
|
|
mustPanic(t, "crypto/aes: output not full block", func() { c.Encrypt(bytes(1), bytes(100)) })
|
|
|
|
mustPanic(t, "crypto/aes: output not full block", func() { c.Decrypt(bytes(1), bytes(100)) })
|
|
|
|
}
|
|
|
|
|
|
|
|
func mustPanic(t *testing.T, msg string, f func()) {
|
|
|
|
defer func() {
|
|
|
|
err := recover()
|
|
|
|
if err == nil {
|
|
|
|
t.Errorf("function did not panic, wanted %q", msg)
|
|
|
|
} else if err != msg {
|
|
|
|
t.Errorf("got panic %v, wanted %q", err, msg)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
f()
|
|
|
|
}
|
|
|
|
|
|
|
|
func BenchmarkEncrypt(b *testing.B) {
|
|
|
|
tt := encryptTests[0]
|
|
|
|
c := NewCipher()
|
|
|
|
err := c.SetKey(tt.key)
|
|
|
|
if err != nil {
|
|
|
|
b.Fatal("NewCipher:", err)
|
|
|
|
}
|
|
|
|
out := make([]byte, len(tt.in))
|
|
|
|
b.SetBytes(int64(len(out)))
|
|
|
|
b.ResetTimer()
|
|
|
|
for i := 0; i < b.N; i++ {
|
|
|
|
c.Encrypt(out, tt.in)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func BenchmarkDecrypt(b *testing.B) {
|
|
|
|
tt := encryptTests[0]
|
|
|
|
c := NewCipher()
|
|
|
|
err := c.SetKey(tt.key)
|
|
|
|
if err != nil {
|
|
|
|
b.Fatal("NewCipher:", err)
|
|
|
|
}
|
|
|
|
out := make([]byte, len(tt.out))
|
|
|
|
b.SetBytes(int64(len(out)))
|
|
|
|
b.ResetTimer()
|
|
|
|
for i := 0; i < b.N; i++ {
|
|
|
|
c.Decrypt(out, tt.out)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func BenchmarkExpand(b *testing.B) {
|
|
|
|
tt := encryptTests[0]
|
|
|
|
c := NewCipher()
|
|
|
|
c.SetKey(tt.key)
|
|
|
|
b.ResetTimer()
|
|
|
|
for i := 0; i < b.N; i++ {
|
|
|
|
expandKey(tt.key, c.enc[:], c.dec[:])
|
|
|
|
}
|
|
|
|
}
|