RFR: JDK-8216437 : PPC64: Add intrinsic for GHASH algorithm [v26]
Martin Doerr
mdoerr at openjdk.org
Fri Feb 21 16:06:57 UTC 2025
On Thu, 20 Feb 2025 15:41:12 GMT, Suchismith Roy <sroy at openjdk.org> wrote:
>> JBS Issue : [JDK-8216437](https://bugs.openjdk.org/browse/JDK-8216437)
>>
>> Currently acceleration code for GHASH is missing for PPC64.
>>
>> The current implementation utlilises SIMD instructions on Power and uses Karatsuba multiplication for obtaining the final result.
>
> Suchismith Roy has updated the pull request incrementally with two additional commits since the last revision:
>
> - change branch and remove not needed variables
> - change branch and remove not needed variables
I'm getting test error on AIX: TestAESMain algorithm=AES, mode=GCM, paddingStr=nopadding, msgSize=646, keySize=128, noReinit=false, checkOutput=false, encInputOffset=0, encOutputOffset=0, decOutputOffset=0, lastChunkSize=32
Algorithm: AES(128bit)
Decryption cipher provider: SunJCE version 25
Decryption cipher algorithm: AES/GCM/nopadding
javax.crypto.AEADBadTagException: Tag mismatch
at java.base/com.sun.crypto.provider.GaloisCounterMode$GCMDecrypt.doFinal(GaloisCounterMode.java:1504)
at java.base/com.sun.crypto.provider.GaloisCounterMode.engineDoFinal(GaloisCounterMode.java:427)
at java.base/javax.crypto.Cipher.doFinal(Cipher.java:2478)
at TestAESBase.prepare(TestAESBase.java:158)
at TestAESMain.main(TestAESMain.java:154)
The same test works on linuxppc64le.
-------------
PR Comment: https://git.openjdk.org/jdk/pull/20235#issuecomment-2674939633
More information about the hotspot-dev
mailing list