[Bug 3492] [IcedTea7] Run AES test to test intrinsics
bugzilla-daemon at icedtea.classpath.org
bugzilla-daemon at icedtea.classpath.org
Tue Nov 14 13:15:16 UTC 2017
https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3492
Andrew John Hughes <gnu.andrew at redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |ASSIGNED
Blocks| |2393
Target Milestone|--- |2.7.0
--- Comment #1 from Andrew John Hughes <gnu.andrew at redhat.com> ---
OpenJDK 64-Bit Server VM warning: AES intrinsics not available on this CPU
1000000 iterations
algorithm=AES, mode=CBC, msgSize=646, keySize=128, noReinit=false,
checkOutput=true
Algorithm: AES(128bit)
Encryption cipher provider: SunJCE version 1.7
Encryption cipher algorithm: AES/CBC/PKCS5Padding
key: [16]: f8 f9 fa fb fc fd fe ff 00 01 02 03 04 05 06 07
input: [646]: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13 14
15 16 17 18 19 1a 1b 1c 1d 1e 1f
encode: [656]: 4c d8 7d 61 57 30 6a f1 14 c3 d4 f9 85 2e 29 a1 a5 42 cc 2b 84
bb d1 8f 57 66 c8 9f 38 05 c3 9e
decode: [646]: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13 14
15 16 17 18 19 1a 1b 1c 1d 1e 1f
TestAESEncode runtime was 8.649928244 ms
algorithm=AES, mode=CBC, msgSize=646, keySize=128, noReinit=false,
checkOutput=true
Algorithm: AES(128bit)
Decryption cipher provider: SunJCE version 1.7
Decryption cipher algorithm: AES/CBC/PKCS5Padding
key: [16]: f8 f9 fa fb fc fd fe ff 00 01 02 03 04 05 06 07
input: [646]: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13 14
15 16 17 18 19 1a 1b 1c 1d 1e 1f
encode: [656]: 4c d8 7d 61 57 30 6a f1 14 c3 d4 f9 85 2e 29 a1 a5 42 cc 2b 84
bb d1 8f 57 66 c8 9f 38 05 c3 9e
decode: [646]: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13 14
15 16 17 18 19 1a 1b 1c 1d 1e 1f
TestAESDecode runtime was 8.540481795 ms
OpenJDK 64-Bit Server VM warning: AES intrinsics not available on this CPU
1000000 iterations
algorithm=AES, mode=ECB, msgSize=646, keySize=128, noReinit=false,
checkOutput=true
Algorithm: AES(128bit)
Encryption cipher provider: SunJCE version 1.7
Encryption cipher algorithm: AES/ECB/PKCS5Padding
key: [16]: f8 f9 fa fb fc fd fe ff 00 01 02 03 04 05 06 07
input: [646]: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13 14
15 16 17 18 19 1a 1b 1c 1d 1e 1f
encode: [656]: 4c d8 7d 61 57 30 6a f1 14 c3 d4 f9 85 2e 29 a1 48 af f7 ec cc
a7 47 38 7a bf 33 ee 41 3c 07 fd
decode: [646]: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13 14
15 16 17 18 19 1a 1b 1c 1d 1e 1f
TestAESEncode runtime was 7.293567882 ms
algorithm=AES, mode=ECB, msgSize=646, keySize=128, noReinit=false,
checkOutput=true
Algorithm: AES(128bit)
Decryption cipher provider: SunJCE version 1.7
Decryption cipher algorithm: AES/ECB/PKCS5Padding
key: [16]: f8 f9 fa fb fc fd fe ff 00 01 02 03 04 05 06 07
input: [646]: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13 14
15 16 17 18 19 1a 1b 1c 1d 1e 1f
encode: [656]: 4c d8 7d 61 57 30 6a f1 14 c3 d4 f9 85 2e 29 a1 48 af f7 ec cc
a7 47 38 7a bf 33 ee 41 3c 07 fd
decode: [646]: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13 14
15 16 17 18 19 1a 1b 1c 1d 1e 1f
TestAESDecode runtime was 7.688539847 ms
--
You are receiving this mail because:
You are on the CC list for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.openjdk.java.net/pipermail/distro-pkg-dev/attachments/20171114/218c3170/attachment.html>
More information about the distro-pkg-dev
mailing list