RFR: 8318756 Create better internal buffer for AEADs

Daniel Jeliński djelinski at openjdk.org
Tue Nov 28 08:43:10 UTC 2023

On Fri, 3 Nov 2023 04:08:27 GMT, Anthony Scarpino <ascarpino at openjdk.org> wrote:

> Hi,
> I need a review for a new internal buffer class called AEADBufferStream.  AEADBufferStream extends ByteArrayOutputStream, but eliminates some data checking and copying that are not necessary for what GaloisCounterMode.java and ChaCha20Cipher.java need.  
> The changes greatest benefit is with decryption operations.  ChaCha20-Poly1305 had larger performance gains by adopting similar techniques that AES/GCM already uses. 
> The new buffer shows up to 21% bytes/sec performance increase for decryption for ChaCha20-Poly1305 and 12% for AES/GCM.  16K data sizes saw a memory usage reduction of 46% with and 83% with ChaCha20-Poly1305.  These results come from the JMH tests updated in this request and memory usage using the JMH gc profile gc.alloc.rate.norm entry
> thanks
> Tony

src/java.base/share/classes/com/sun/crypto/provider/ChaCha20Cipher.java line 859:

> 857:                     try {
> 858:                         outArray = engineDoFinal(inArray, inOfs, inLen);
> 859:                     } catch (BadPaddingException e) {

Should we really be hiding the `BadPaddingException` here and in other places in this method? `AEADBadTagException` extends `BadPaddingException`, and I'm pretty sure we don't want to hide it.


PR Review Comment: https://git.openjdk.org/jdk/pull/16487#discussion_r1407397841

More information about the security-dev mailing list