summaryrefslogtreecommitdiff
path: root/openssl_benchmark
diff options
context:
space:
mode:
authorJakob Unterwurzacher2015-09-06 11:54:50 +0200
committerJakob Unterwurzacher2015-09-06 11:54:50 +0200
commit0a35d0970e86efbc5ed494395de7b448d3e337d0 (patch)
tree2c1fbfa766ad1546d45ad3b1b93a11fd6d0665a9 /openssl_benchmark
parent5f4c9240ca1092b47553fe34b9cc1b7836222b6a (diff)
Add openssl_benchmark.bash script
Diffstat (limited to 'openssl_benchmark')
-rwxr-xr-xopenssl_benchmark/openssl_benchmark.bash5
-rw-r--r--openssl_benchmark/openssl_test.go140
2 files changed, 145 insertions, 0 deletions
diff --git a/openssl_benchmark/openssl_benchmark.bash b/openssl_benchmark/openssl_benchmark.bash
new file mode 100755
index 0000000..b328d24
--- /dev/null
+++ b/openssl_benchmark/openssl_benchmark.bash
@@ -0,0 +1,5 @@
+#!/bin/bash
+
+set -eux
+
+go test -bench=.
diff --git a/openssl_benchmark/openssl_test.go b/openssl_benchmark/openssl_test.go
new file mode 100644
index 0000000..f0b7bc5
--- /dev/null
+++ b/openssl_benchmark/openssl_test.go
@@ -0,0 +1,140 @@
+package benchmark
+
+// Benchmark go built-int GCM against spacemonkey openssl bindings
+//
+// Run benchmark:
+// go test -bench=.
+
+import (
+ "bytes"
+ "testing"
+ "github.com/spacemonkeygo/openssl"
+ "crypto/aes"
+ "crypto/cipher"
+)
+
+func BenchmarkAESGCMSeal4K(b *testing.B) {
+ buf := make([]byte, 1024*4)
+ b.SetBytes(int64(len(buf)))
+
+ var key [16]byte
+ var nonce [12]byte
+ aes, _ := aes.NewCipher(key[:])
+ aesgcm, _ := cipher.NewGCM(aes)
+ var out []byte
+
+ b.ResetTimer()
+ for i := 0; i < b.N; i++ {
+ out = aesgcm.Seal(out[:0], nonce[:], buf, nil)
+ }
+}
+
+func BenchmarkAESGCMOpen4K(b *testing.B) {
+ buf := make([]byte, 1024*4)
+ b.SetBytes(int64(len(buf)))
+
+ var key [16]byte
+ var nonce [12]byte
+ aes, _ := aes.NewCipher(key[:])
+ aesgcm, _ := cipher.NewGCM(aes)
+ var out []byte
+ out = aesgcm.Seal(out[:0], nonce[:], buf, nil)
+
+ b.ResetTimer()
+ for i := 0; i < b.N; i++ {
+ _, err := aesgcm.Open(buf[:0], nonce[:], out, nil)
+ if err != nil {
+ b.Errorf("Open: %v", err)
+ }
+ }
+}
+
+func BenchmarkOpensslGCMenc4K(b *testing.B) {
+ buf := make([]byte, 1024*4)
+ b.SetBytes(int64(len(buf)))
+
+ var key [16]byte
+ var nonce [12]byte
+
+ var ciphertext bytes.Buffer
+ var part []byte
+
+ b.ResetTimer()
+ for i := 0; i < b.N; i++ {
+ ciphertext.Reset()
+ ectx, err := openssl.NewGCMEncryptionCipherCtx(128, nil, key[:], nonce[:])
+ if err != nil {
+ b.FailNow()
+ }
+ part, err = ectx.EncryptUpdate(buf)
+ if err != nil {
+ b.FailNow()
+ }
+ ciphertext.Write(part)
+ part, err = ectx.EncryptFinal()
+ if err != nil {
+ b.FailNow()
+ }
+ ciphertext.Write(part)
+ part, err = ectx.GetTag()
+ if err != nil {
+ b.FailNow()
+ }
+ ciphertext.Write(part)
+ }
+}
+
+func BenchmarkOpensslGCMdec4K(b *testing.B) {
+ buf := makeOpensslCiphertext()
+ b.SetBytes(int64(1024*4))
+
+ tag := buf[4096:]
+ buf = buf[0:4096]
+
+ var key [16]byte
+ var nonce [12]byte
+
+ var plaintext bytes.Buffer
+ var part []byte
+
+ b.ResetTimer()
+ for i := 0; i < b.N; i++ {
+ plaintext.Reset()
+ dctx, err := openssl.NewGCMDecryptionCipherCtx(128, nil, key[:], nonce[:])
+ if err != nil {
+ b.FailNow()
+ }
+ part, err = dctx.DecryptUpdate(buf)
+ if err != nil {
+ b.FailNow()
+ }
+ plaintext.Write(part)
+ err = dctx.SetTag(tag)
+ if err != nil {
+ b.FailNow()
+ }
+ part, err = dctx.DecryptFinal()
+ if err != nil {
+ b.FailNow()
+ }
+ plaintext.Write(part)
+ }
+}
+
+func makeOpensslCiphertext() []byte {
+ buf := make([]byte, 1024*4)
+ var key [16]byte
+ var nonce [12]byte
+ var ciphertext bytes.Buffer
+ var part []byte
+
+ ectx, _ := openssl.NewGCMEncryptionCipherCtx(128, nil, key[:], nonce[:])
+ part, _ = ectx.EncryptUpdate(buf)
+ ciphertext.Write(part)
+ part, _ = ectx.EncryptFinal()
+ ciphertext.Write(part)
+ part, _ = ectx.GetTag()
+ ciphertext.Write(part)
+
+ return ciphertext.Bytes()
+}