RFR: 8318756 Create better internal buffer for AEADs

Anthony Scarpino ascarpino at openjdk.org
Wed Nov 29 19:47:11 UTC 2023

On Tue, 28 Nov 2023 08:35:29 GMT, Daniel Jeliński <djelinski at openjdk.org> wrote:

>> Hi,
>> I need a review for a new internal buffer class called AEADBufferStream.  AEADBufferStream extends ByteArrayOutputStream, but eliminates some data checking and copying that are not necessary for what GaloisCounterMode.java and ChaCha20Cipher.java need.  
>> The changes greatest benefit is with decryption operations.  ChaCha20-Poly1305 had larger performance gains by adopting similar techniques that AES/GCM already uses. 
>> The new buffer shows up to 21% bytes/sec performance increase for decryption for ChaCha20-Poly1305 and 12% for AES/GCM.  16K data sizes saw a memory usage reduction of 46% with and 83% with ChaCha20-Poly1305.  These results come from the JMH tests updated in this request and memory usage using the JMH gc profile gc.alloc.rate.norm entry
>> thanks
>> Tony
> src/java.base/share/classes/com/sun/crypto/provider/ChaCha20Cipher.java line 859:
>> 857:                     try {
>> 858:                         outArray = engineDoFinal(inArray, inOfs, inLen);
>> 859:                     } catch (BadPaddingException e) {
> Should we really be hiding the `BadPaddingException` here and in other places in this method? `AEADBadTagException` extends `BadPaddingException`, and I'm pretty sure we don't want to hide it.

CipherSpi:engineUpdate() only throws ShortBufferException.  That forces many exceptions into a ProviderException with extends RuntimeException.  The BadPaddingException doesn't matter because CC20 doesn't have padding.  AEADTagException should be specified and thrown, not wrapped.


PR Review Comment: https://git.openjdk.org/jdk/pull/16487#discussion_r1409787566

More information about the security-dev mailing list