RFR: 8333583: Crypto-XDH.generateSecret regression after JDK-8329538 [v3]

Volodymyr Paprotski duke at openjdk.org
Mon Jun 17 18:55:16 UTC 2024


On Mon, 17 Jun 2024 18:12:16 GMT, Vladimir Kozlov <kvn at openjdk.org> wrote:

> What causes regression in P256 "(~-8-14%)"? From what I see, you re-arranged code to not execute some code ("reducePositive()") when it is not needed. How this affects P256?

Actually, the other way around; reducePositive is now an unconditionally executed for both pure java and the intrinsic paths. Perhaps that's what is misleading, it was only the mult() intrinsic that was taking advantage of this 'skip reduction' before. (pure java did not benefit from removing reduction, so I kept it. Now 'keeping it' for both paths)

-------------

PR Comment: https://git.openjdk.org/jdk/pull/19728#issuecomment-2174201539



More information about the security-dev mailing list