mirror of
https://github.com/openjdk/jdk.git
synced 2025-08-27 06:45:07 +02:00
8179098: Crypto AES/ECB encryption/decryption performance regression (introduced in jdk9b73)
Do bounds check per encryption/decryption call instead of per block Reviewed-by: ascarpino, redestad
This commit is contained in:
parent
b8d80042d7
commit
b0af57a018
9 changed files with 137 additions and 73 deletions
|
@ -1,5 +1,5 @@
|
|||
/*
|
||||
* Copyright (c) 2013, 2017, Oracle and/or its affiliates. All rights reserved.
|
||||
* Copyright (c) 2013, 2018, Oracle and/or its affiliates. All rights reserved.
|
||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
*
|
||||
* This code is free software; you can redistribute it and/or modify it
|
||||
|
@ -30,6 +30,8 @@ import java.io.*;
|
|||
import java.security.*;
|
||||
import javax.crypto.*;
|
||||
import static com.sun.crypto.provider.AESConstants.AES_BLOCK_SIZE;
|
||||
import sun.security.util.ArrayUtil;
|
||||
|
||||
|
||||
/**
|
||||
* This class represents ciphers in GaloisCounter (GCM) mode.
|
||||
|
@ -406,8 +408,8 @@ final class GaloisCounterMode extends FeedbackCipher {
|
|||
/**
|
||||
* Performs encryption operation.
|
||||
*
|
||||
* <p>The input plain text <code>in</code>, starting at <code>inOff</code>
|
||||
* and ending at <code>(inOff + len - 1)</code>, is encrypted. The result
|
||||
* <p>The input plain text <code>in</code>, starting at <code>inOfs</code>
|
||||
* and ending at <code>(inOfs + len - 1)</code>, is encrypted. The result
|
||||
* is stored in <code>out</code>, starting at <code>outOfs</code>.
|
||||
*
|
||||
* @param in the buffer with the input data to be encrypted
|
||||
|
@ -420,18 +422,21 @@ final class GaloisCounterMode extends FeedbackCipher {
|
|||
* @return the number of bytes placed into the <code>out</code> buffer
|
||||
*/
|
||||
int encrypt(byte[] in, int inOfs, int len, byte[] out, int outOfs) {
|
||||
if ((len % blockSize) != 0) {
|
||||
throw new ProviderException("Internal error in input buffering");
|
||||
}
|
||||
ArrayUtil.blockSizeCheck(len, blockSize);
|
||||
|
||||
checkDataLength(processed, len);
|
||||
|
||||
processAAD();
|
||||
|
||||
if (len > 0) {
|
||||
ArrayUtil.nullAndBoundsCheck(in, inOfs, len);
|
||||
ArrayUtil.nullAndBoundsCheck(out, outOfs, len);
|
||||
|
||||
gctrPAndC.update(in, inOfs, len, out, outOfs);
|
||||
processed += len;
|
||||
ghashAllToS.update(out, outOfs, len);
|
||||
}
|
||||
|
||||
return len;
|
||||
}
|
||||
|
||||
|
@ -451,7 +456,10 @@ final class GaloisCounterMode extends FeedbackCipher {
|
|||
throw new ShortBufferException
|
||||
("Can't fit both data and tag into one buffer");
|
||||
}
|
||||
if (out.length - outOfs < (len + tagLenBytes)) {
|
||||
try {
|
||||
ArrayUtil.nullAndBoundsCheck(out, outOfs,
|
||||
(len + tagLenBytes));
|
||||
} catch (ArrayIndexOutOfBoundsException aiobe) {
|
||||
throw new ShortBufferException("Output buffer too small");
|
||||
}
|
||||
|
||||
|
@ -459,6 +467,8 @@ final class GaloisCounterMode extends FeedbackCipher {
|
|||
|
||||
processAAD();
|
||||
if (len > 0) {
|
||||
ArrayUtil.nullAndBoundsCheck(in, inOfs, len);
|
||||
|
||||
doLastBlock(in, inOfs, len, out, outOfs, true);
|
||||
}
|
||||
|
||||
|
@ -492,9 +502,7 @@ final class GaloisCounterMode extends FeedbackCipher {
|
|||
* @return the number of bytes placed into the <code>out</code> buffer
|
||||
*/
|
||||
int decrypt(byte[] in, int inOfs, int len, byte[] out, int outOfs) {
|
||||
if ((len % blockSize) != 0) {
|
||||
throw new ProviderException("Internal error in input buffering");
|
||||
}
|
||||
ArrayUtil.blockSizeCheck(len, blockSize);
|
||||
|
||||
checkDataLength(ibuffer.size(), len);
|
||||
|
||||
|
@ -504,6 +512,7 @@ final class GaloisCounterMode extends FeedbackCipher {
|
|||
// store internally until decryptFinal is called because
|
||||
// spec mentioned that only return recovered data after tag
|
||||
// is successfully verified
|
||||
ArrayUtil.nullAndBoundsCheck(in, inOfs, len);
|
||||
ibuffer.write(in, inOfs, len);
|
||||
}
|
||||
return 0;
|
||||
|
@ -532,22 +541,28 @@ final class GaloisCounterMode extends FeedbackCipher {
|
|||
if (len < tagLenBytes) {
|
||||
throw new AEADBadTagException("Input too short - need tag");
|
||||
}
|
||||
|
||||
// do this check here can also catch the potential integer overflow
|
||||
// scenario for the subsequent output buffer capacity check.
|
||||
checkDataLength(ibuffer.size(), (len - tagLenBytes));
|
||||
|
||||
if (out.length - outOfs < ((ibuffer.size() + len) - tagLenBytes)) {
|
||||
try {
|
||||
ArrayUtil.nullAndBoundsCheck(out, outOfs,
|
||||
(ibuffer.size() + len) - tagLenBytes);
|
||||
} catch (ArrayIndexOutOfBoundsException aiobe) {
|
||||
throw new ShortBufferException("Output buffer too small");
|
||||
}
|
||||
|
||||
processAAD();
|
||||
|
||||
ArrayUtil.nullAndBoundsCheck(in, inOfs, len);
|
||||
|
||||
// get the trailing tag bytes from 'in'
|
||||
byte[] tag = new byte[tagLenBytes];
|
||||
System.arraycopy(in, inOfs + len - tagLenBytes, tag, 0, tagLenBytes);
|
||||
len -= tagLenBytes;
|
||||
|
||||
if (len != 0) {
|
||||
if (len > 0) {
|
||||
ibuffer.write(in, inOfs, len);
|
||||
}
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue