Skip to content

Commit d6b40d3

Browse files
Volodymyr PaprotskiAnthony Scarpino
Volodymyr Paprotski
authored and
Anthony Scarpino
committedNov 21, 2024
8344144: AES/CBC slow at big payloads
Reviewed-by: sviswanathan, abarashev, ascarpino
1 parent 93d4ad4 commit d6b40d3

File tree

2 files changed

+51
-5
lines changed

2 files changed

+51
-5
lines changed
 

‎src/java.base/share/classes/com/sun/crypto/provider/CipherBlockChaining.java

+29-3
Original file line numberDiff line numberDiff line change
@@ -59,10 +59,15 @@ class CipherBlockChaining extends FeedbackCipher {
5959
// variables for save/restore calls
6060
private byte[] rSave = null;
6161

62+
// chunkSize is a multiple of block size and used to divide up
63+
// input data to trigger the intrinsic.
64+
private final int chunkSize;
65+
6266
CipherBlockChaining(SymmetricCipher embeddedCipher) {
6367
super(embeddedCipher);
6468
k = new byte[blockSize];
6569
r = new byte[blockSize];
70+
chunkSize = blockSize * 6400;
6671
}
6772

6873
/**
@@ -148,8 +153,18 @@ int encrypt(byte[] plain, int plainOffset, int plainLen,
148153
ArrayUtil.blockSizeCheck(plainLen, blockSize);
149154
ArrayUtil.nullAndBoundsCheck(plain, plainOffset, plainLen);
150155
ArrayUtil.nullAndBoundsCheck(cipher, cipherOffset, plainLen);
151-
return implEncrypt(plain, plainOffset, plainLen,
152-
cipher, cipherOffset);
156+
int processed = 0;
157+
for (; plainLen > chunkSize; cipherOffset += chunkSize,
158+
plainOffset += chunkSize, plainLen -= chunkSize) {
159+
processed +=
160+
implEncrypt(plain, plainOffset, chunkSize, cipher, cipherOffset);
161+
}
162+
// note: above loop always leaves some data to process (more than zero,
163+
// less than or equal to chunkSize) so this last call can be
164+
// unconditional
165+
processed +=
166+
implEncrypt(plain, plainOffset, plainLen, cipher, cipherOffset);
167+
return processed;
153168
}
154169

155170
@IntrinsicCandidate
@@ -199,7 +214,18 @@ int decrypt(byte[] cipher, int cipherOffset, int cipherLen,
199214
ArrayUtil.blockSizeCheck(cipherLen, blockSize);
200215
ArrayUtil.nullAndBoundsCheck(cipher, cipherOffset, cipherLen);
201216
ArrayUtil.nullAndBoundsCheck(plain, plainOffset, cipherLen);
202-
return implDecrypt(cipher, cipherOffset, cipherLen, plain, plainOffset);
217+
int processed = 0;
218+
for (; cipherLen > chunkSize; cipherOffset += chunkSize,
219+
plainOffset += chunkSize, cipherLen -= chunkSize) {
220+
processed +=
221+
implDecrypt(cipher, cipherOffset, chunkSize, plain, plainOffset);
222+
}
223+
// note: above loop always leaves some data to process (more than zero,
224+
// less than or equal to chunkSize) so this last call can be
225+
// unconditional
226+
processed +=
227+
implDecrypt(cipher, cipherOffset, cipherLen, plain, plainOffset);
228+
return processed;
203229
}
204230

205231
@IntrinsicCandidate

‎test/micro/org/openjdk/bench/javax/crypto/full/AESBench.java

+22-2
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright (c) 2015, 2018, Oracle and/or its affiliates. All rights reserved.
2+
* Copyright (c) 2015, 2024, Oracle and/or its affiliates. All rights reserved.
33
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
44
*
55
* This code is free software; you can redistribute it and/or modify it
@@ -25,6 +25,9 @@
2525
import org.openjdk.jmh.annotations.Benchmark;
2626
import org.openjdk.jmh.annotations.Param;
2727
import org.openjdk.jmh.annotations.Setup;
28+
import org.openjdk.jmh.infra.Blackhole;
29+
import java.security.GeneralSecurityException;
30+
import org.openjdk.jmh.annotations.Fork;
2831

2932
import javax.crypto.BadPaddingException;
3033
import javax.crypto.Cipher;
@@ -36,9 +39,10 @@
3639
import java.security.NoSuchAlgorithmException;
3740
import java.security.spec.InvalidParameterSpecException;
3841

42+
@Fork(jvmArgsAppend = {"-Xms20g", "-Xmx20g", "-XX:+UseZGC"})
3943
public class AESBench extends CryptoBase {
4044

41-
public static final int SET_SIZE = 128;
45+
public static final int SET_SIZE = 8;
4246

4347
@Param({"AES/ECB/NoPadding", "AES/ECB/PKCS5Padding", "AES/CBC/NoPadding", "AES/CBC/PKCS5Padding"})
4448
private String algorithm;
@@ -53,6 +57,7 @@ public class AESBench extends CryptoBase {
5357
byte[][] encryptedData;
5458
private Cipher encryptCipher;
5559
private Cipher decryptCipher;
60+
private byte[] outBuffer;
5661
int index = 0;
5762

5863
@Setup
@@ -66,6 +71,7 @@ public void setup() throws NoSuchAlgorithmException, NoSuchPaddingException, Inv
6671
decryptCipher.init(Cipher.DECRYPT_MODE, ks, encryptCipher.getParameters());
6772
data = fillRandom(new byte[SET_SIZE][dataSize]);
6873
encryptedData = fillEncrypted(data, encryptCipher);
74+
outBuffer = new byte[dataSize + 128]; // extra space for tag, etc
6975
}
7076

7177
@Benchmark
@@ -75,11 +81,25 @@ public byte[] encrypt() throws BadPaddingException, IllegalBlockSizeException {
7581
return encryptCipher.doFinal(d);
7682
}
7783

84+
@Benchmark
85+
public void encrypt2(Blackhole bh) throws GeneralSecurityException {
86+
byte[] d = data[index];
87+
index = (index +1) % SET_SIZE;
88+
bh.consume(encryptCipher.doFinal(d, 0, d.length, outBuffer));
89+
}
90+
7891
@Benchmark
7992
public byte[] decrypt() throws BadPaddingException, IllegalBlockSizeException {
8093
byte[] e = encryptedData[index];
8194
index = (index +1) % SET_SIZE;
8295
return decryptCipher.doFinal(e);
8396
}
8497

98+
@Benchmark
99+
public void decrypt2(Blackhole bh) throws GeneralSecurityException {
100+
byte[] e = encryptedData[index];
101+
index = (index +1) % SET_SIZE;
102+
bh.consume(decryptCipher.doFinal(e, 0, e.length, outBuffer));
103+
}
104+
85105
}

0 commit comments

Comments
 (0)
Please sign in to comment.