Linux vmi284606.contaboserver.net 4.15.0-213-generic #224-Ubuntu SMP Mon Jun 19 13:30:12 UTC 2023 x86_64
Apache/2.4.57 (Ubuntu)
: 167.86.127.34 | : 216.73.217.31
Cant Read [ /etc/named.conf ]
7.2.24-0ubuntu0.18.04.17
root
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
local /
go /
src /
crypto /
cipher /
[ HOME SHELL ]
Name
Size
Permission
Action
benchmark_test.go
3.46
KB
-rw-r--r--
cbc.go
4.42
KB
-rw-r--r--
cbc_aes_test.go
2.93
KB
-rw-r--r--
cfb.go
1.94
KB
-rw-r--r--
cfb_test.go
2.77
KB
-rw-r--r--
cipher.go
2.49
KB
-rw-r--r--
cipher_test.go
2.2
KB
-rw-r--r--
common_test.go
1.24
KB
-rw-r--r--
ctr.go
2.12
KB
-rw-r--r--
ctr_aes_test.go
2.98
KB
-rw-r--r--
ctr_test.go
1.13
KB
-rw-r--r--
example_test.go
11.78
KB
-rw-r--r--
export_test.go
242
B
-rw-r--r--
gcm.go
13.82
KB
-rw-r--r--
gcm_test.go
21.3
KB
-rw-r--r--
io.go
1.46
KB
-rw-r--r--
ofb.go
1.6
KB
-rw-r--r--
ofb_test.go
2.95
KB
-rw-r--r--
xor_amd64.go
642
B
-rw-r--r--
xor_amd64.s
1.31
KB
-rw-r--r--
xor_generic.go
2.33
KB
-rw-r--r--
xor_ppc64x.go
641
B
-rw-r--r--
xor_ppc64x.s
2.03
KB
-rw-r--r--
xor_test.go
1.6
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : benchmark_test.go
// Copyright 2013 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. package cipher_test import ( "crypto/aes" "crypto/cipher" "testing" ) func benchmarkAESGCMSign(b *testing.B, buf []byte) { b.SetBytes(int64(len(buf))) var key [16]byte var nonce [12]byte aes, _ := aes.NewCipher(key[:]) aesgcm, _ := cipher.NewGCM(aes) var out []byte b.ResetTimer() for i := 0; i < b.N; i++ { out = aesgcm.Seal(out[:0], nonce[:], nil, buf) } } func benchmarkAESGCMSeal(b *testing.B, buf []byte) { b.SetBytes(int64(len(buf))) var key [16]byte var nonce [12]byte var ad [13]byte aes, _ := aes.NewCipher(key[:]) aesgcm, _ := cipher.NewGCM(aes) var out []byte b.ResetTimer() for i := 0; i < b.N; i++ { out = aesgcm.Seal(out[:0], nonce[:], buf, ad[:]) } } func benchmarkAESGCMOpen(b *testing.B, buf []byte) { b.SetBytes(int64(len(buf))) var key [16]byte var nonce [12]byte var ad [13]byte aes, _ := aes.NewCipher(key[:]) aesgcm, _ := cipher.NewGCM(aes) var out []byte out = aesgcm.Seal(out[:0], nonce[:], buf, ad[:]) b.ResetTimer() for i := 0; i < b.N; i++ { _, err := aesgcm.Open(buf[:0], nonce[:], out, ad[:]) if err != nil { b.Errorf("Open: %v", err) } } } func BenchmarkAESGCMSeal1K(b *testing.B) { benchmarkAESGCMSeal(b, make([]byte, 1024)) } func BenchmarkAESGCMOpen1K(b *testing.B) { benchmarkAESGCMOpen(b, make([]byte, 1024)) } func BenchmarkAESGCMSign8K(b *testing.B) { benchmarkAESGCMSign(b, make([]byte, 8*1024)) } func BenchmarkAESGCMSeal8K(b *testing.B) { benchmarkAESGCMSeal(b, make([]byte, 8*1024)) } func BenchmarkAESGCMOpen8K(b *testing.B) { benchmarkAESGCMOpen(b, make([]byte, 8*1024)) } func benchmarkAESStream(b *testing.B, mode func(cipher.Block, []byte) cipher.Stream, buf []byte) { b.SetBytes(int64(len(buf))) var key [16]byte var iv [16]byte aes, _ := aes.NewCipher(key[:]) stream := mode(aes, iv[:]) b.ResetTimer() for i := 0; i < b.N; i++ { stream.XORKeyStream(buf, buf) } } // If we test exactly 1K blocks, we would generate exact multiples of // the cipher's block size, and the cipher stream fragments would // always be wordsize aligned, whereas non-aligned is a more typical // use-case. const almost1K = 1024 - 5 const almost8K = 8*1024 - 5 func BenchmarkAESCFBEncrypt1K(b *testing.B) { benchmarkAESStream(b, cipher.NewCFBEncrypter, make([]byte, almost1K)) } func BenchmarkAESCFBDecrypt1K(b *testing.B) { benchmarkAESStream(b, cipher.NewCFBDecrypter, make([]byte, almost1K)) } func BenchmarkAESCFBDecrypt8K(b *testing.B) { benchmarkAESStream(b, cipher.NewCFBDecrypter, make([]byte, almost8K)) } func BenchmarkAESOFB1K(b *testing.B) { benchmarkAESStream(b, cipher.NewOFB, make([]byte, almost1K)) } func BenchmarkAESCTR1K(b *testing.B) { benchmarkAESStream(b, cipher.NewCTR, make([]byte, almost1K)) } func BenchmarkAESCTR8K(b *testing.B) { benchmarkAESStream(b, cipher.NewCTR, make([]byte, almost8K)) } func BenchmarkAESCBCEncrypt1K(b *testing.B) { buf := make([]byte, 1024) b.SetBytes(int64(len(buf))) var key [16]byte var iv [16]byte aes, _ := aes.NewCipher(key[:]) cbc := cipher.NewCBCEncrypter(aes, iv[:]) for i := 0; i < b.N; i++ { cbc.CryptBlocks(buf, buf) } } func BenchmarkAESCBCDecrypt1K(b *testing.B) { buf := make([]byte, 1024) b.SetBytes(int64(len(buf))) var key [16]byte var iv [16]byte aes, _ := aes.NewCipher(key[:]) cbc := cipher.NewCBCDecrypter(aes, iv[:]) for i := 0; i < b.N; i++ { cbc.CryptBlocks(buf, buf) } }
Close