RFR: JDK-8216437 : PPC64: Add intrinsic for GHASH algorithm [v26]

Martin Doerr mdoerr at openjdk.org
Fri Feb 21 16:06:57 UTC 2025


On Thu, 20 Feb 2025 15:41:12 GMT, Suchismith Roy <sroy at openjdk.org> wrote:

>> JBS Issue : [JDK-8216437](https://bugs.openjdk.org/browse/JDK-8216437)
>> 
>> Currently acceleration code for GHASH is missing for PPC64. 
>> 
>> The current implementation utlilises SIMD instructions on Power and uses Karatsuba multiplication for obtaining the final result.
>
> Suchismith Roy has updated the pull request incrementally with two additional commits since the last revision:
> 
>  - change branch and remove not needed variables
>  - change branch and remove not needed variables

I'm getting test error on AIX: TestAESMain algorithm=AES, mode=GCM, paddingStr=nopadding, msgSize=646, keySize=128, noReinit=false, checkOutput=false, encInputOffset=0, encOutputOffset=0, decOutputOffset=0, lastChunkSize=32

Algorithm: AES(128bit)
Decryption cipher provider: SunJCE version 25
Decryption cipher algorithm: AES/GCM/nopadding
javax.crypto.AEADBadTagException: Tag mismatch
        at java.base/com.sun.crypto.provider.GaloisCounterMode$GCMDecrypt.doFinal(GaloisCounterMode.java:1504)
        at java.base/com.sun.crypto.provider.GaloisCounterMode.engineDoFinal(GaloisCounterMode.java:427)
        at java.base/javax.crypto.Cipher.doFinal(Cipher.java:2478)
        at TestAESBase.prepare(TestAESBase.java:158)
        at TestAESMain.main(TestAESMain.java:154)

The same test works on linuxppc64le.

-------------

PR Comment: https://git.openjdk.org/jdk/pull/20235#issuecomment-2674939633


More information about the hotspot-dev mailing list