RFR: 8366833: Poly1305 does not always correctly update position for array-backed ByteBuffers after processMultipleBlocks [v5]

Weijun Wang weijun at openjdk.org
Fri Sep 12 14:15:51 UTC 2025


On Thu, 11 Sep 2025 00:54:04 GMT, Jamil Nimeh <jnimeh at openjdk.org> wrote:

>> This fix resolves an issue where the `Cipher.updateAAD(ByteBuffer)` method, when used on a ChaCha20-Poly1305 Cipher, may throw an exception due to an offset calculation error.  This occurs when the ByteBuffer is array-backed, and when the buffer passed into the method is a slice of another array-backed buffer and that slice begins at a non-zero offset in the parent ByteBuffer.
>> 
>> Credit and thanks to @jaikiran for finding the issue and providing reproducer code.
>
> Jamil Nimeh has updated the pull request incrementally with one additional commit since the last revision:
> 
>   Add tests for encryption correctness, also add tests for MemorySegment ByteBuffers

test/jdk/com/sun/crypto/provider/Cipher/ChaCha20/UpdateAADTest.java line 74:

> 72: 
> 73:     public interface TestAction {
> 74:         void runTest(ByteBuffer buffer);

If you allow `runTest` to throw an exception, then there is no need to catch and rethrow in the 2 instances.

-------------

PR Review Comment: https://git.openjdk.org/jdk/pull/27081#discussion_r2344388738


More information about the security-dev mailing list