8073108: Use x86 and SPARC CPU instructions for GHASH acceleration

Reviewed-by: kvn, jrose
This commit is contained in:
Anthony Scarpino 2015-06-17 17:41:04 -07:00
parent bd1fbafc35
commit 57a503e4fc
2 changed files with 127 additions and 68 deletions

View File

@ -1,5 +1,5 @@
/* /*
* Copyright (c) 2013, Oracle and/or its affiliates. All rights reserved. * Copyright (c) 2013, 2015, Oracle and/or its affiliates. All rights reserved.
* Copyright (c) 2015 Red Hat, Inc. * Copyright (c) 2015 Red Hat, Inc.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
* *
@ -62,14 +62,16 @@ final class GHASH {
private static final int AES_BLOCK_SIZE = 16; private static final int AES_BLOCK_SIZE = 16;
// Multiplies state0, state1 by V0, V1. // Multiplies state[0], state[1] by subkeyH[0], subkeyH[1].
private void blockMult(long V0, long V1) { private static void blockMult(long[] st, long[] subH) {
long Z0 = 0; long Z0 = 0;
long Z1 = 0; long Z1 = 0;
long V0 = subH[0];
long V1 = subH[1];
long X; long X;
// Separate loops for processing state0 and state1. // Separate loops for processing state[0] and state[1].
X = state0; X = st[0];
for (int i = 0; i < 64; i++) { for (int i = 0; i < 64; i++) {
// Zi+1 = Zi if bit i of x is 0 // Zi+1 = Zi if bit i of x is 0
long mask = X >> 63; long mask = X >> 63;
@ -89,7 +91,7 @@ final class GHASH {
X <<= 1; X <<= 1;
} }
X = state1; X = st[1];
for (int i = 64; i < 127; i++) { for (int i = 64; i < 127; i++) {
// Zi+1 = Zi if bit i of x is 0 // Zi+1 = Zi if bit i of x is 0
long mask = X >> 63; long mask = X >> 63;
@ -115,15 +117,18 @@ final class GHASH {
Z1 ^= V1 & mask; Z1 ^= V1 & mask;
// Save result. // Save result.
state0 = Z0; st[0] = Z0;
state1 = Z1; st[1] = Z1;
} }
/* subkeyH and state are stored in long[] for GHASH intrinsic use */
// hash subkey H; should not change after the object has been constructed // hash subkey H; should not change after the object has been constructed
private final long subkeyH0, subkeyH1; private final long[] subkeyH;
// buffer for storing hash // buffer for storing hash
private long state0, state1; private final long[] state;
// variables for save/restore calls // variables for save/restore calls
private long stateSave0, stateSave1; private long stateSave0, stateSave1;
@ -141,8 +146,10 @@ final class GHASH {
if ((subkeyH == null) || subkeyH.length != AES_BLOCK_SIZE) { if ((subkeyH == null) || subkeyH.length != AES_BLOCK_SIZE) {
throw new ProviderException("Internal error"); throw new ProviderException("Internal error");
} }
this.subkeyH0 = getLong(subkeyH, 0); state = new long[2];
this.subkeyH1 = getLong(subkeyH, 8); this.subkeyH = new long[2];
this.subkeyH[0] = getLong(subkeyH, 0);
this.subkeyH[1] = getLong(subkeyH, 8);
} }
/** /**
@ -151,33 +158,30 @@ final class GHASH {
* this object for different data w/ the same H. * this object for different data w/ the same H.
*/ */
void reset() { void reset() {
state0 = 0; state[0] = 0;
state1 = 0; state[1] = 0;
} }
/** /**
* Save the current snapshot of this GHASH object. * Save the current snapshot of this GHASH object.
*/ */
void save() { void save() {
stateSave0 = state0; stateSave0 = state[0];
stateSave1 = state1; stateSave1 = state[1];
} }
/** /**
* Restores this object using the saved snapshot. * Restores this object using the saved snapshot.
*/ */
void restore() { void restore() {
state0 = stateSave0; state[0] = stateSave0;
state1 = stateSave1; state[1] = stateSave1;
} }
private void processBlock(byte[] data, int ofs) { private static void processBlock(byte[] data, int ofs, long[] st, long[] subH) {
if (data.length - ofs < AES_BLOCK_SIZE) { st[0] ^= getLong(data, ofs);
throw new RuntimeException("need complete block"); st[1] ^= getLong(data, ofs + 8);
} blockMult(st, subH);
state0 ^= getLong(data, ofs);
state1 ^= getLong(data, ofs + 8);
blockMult(subkeyH0, subkeyH1);
} }
void update(byte[] in) { void update(byte[] in) {
@ -185,22 +189,57 @@ final class GHASH {
} }
void update(byte[] in, int inOfs, int inLen) { void update(byte[] in, int inOfs, int inLen) {
if (inLen - inOfs > in.length) { if (inLen == 0) {
throw new RuntimeException("input length out of bound"); return;
}
ghashRangeCheck(in, inOfs, inLen, state, subkeyH);
processBlocks(in, inOfs, inLen/AES_BLOCK_SIZE, state, subkeyH);
}
private static void ghashRangeCheck(byte[] in, int inOfs, int inLen, long[] st, long[] subH) {
if (inLen < 0) {
throw new RuntimeException("invalid input length: " + inLen);
}
if (inOfs < 0) {
throw new RuntimeException("invalid offset: " + inOfs);
}
if (inLen > in.length - inOfs) {
throw new RuntimeException("input length out of bound: " +
inLen + " > " + (in.length - inOfs));
} }
if (inLen % AES_BLOCK_SIZE != 0) { if (inLen % AES_BLOCK_SIZE != 0) {
throw new RuntimeException("input length unsupported"); throw new RuntimeException("input length/block size mismatch: " +
inLen);
} }
for (int i = inOfs; i < (inOfs + inLen); i += AES_BLOCK_SIZE) { // These two checks are for C2 checking
processBlock(in, i); if (st.length != 2) {
throw new RuntimeException("internal state has invalid length: " +
st.length);
}
if (subH.length != 2) {
throw new RuntimeException("internal subkeyH has invalid length: " +
subH.length);
}
}
/*
* This is an intrinsified method. The method's argument list must match
* the hotspot signature. This method and methods called by it, cannot
* throw exceptions or allocate arrays as it will breaking intrinsics
*/
private static void processBlocks(byte[] data, int inOfs, int blocks, long[] st, long[] subH) {
int offset = inOfs;
while (blocks > 0) {
processBlock(data, offset, st, subH);
blocks--;
offset += AES_BLOCK_SIZE;
} }
} }
byte[] digest() { byte[] digest() {
byte[] result = new byte[AES_BLOCK_SIZE]; byte[] result = new byte[AES_BLOCK_SIZE];
putLong(result, 0, state0); putLong(result, 0, state[0]);
putLong(result, 8, state1); putLong(result, 8, state[1]);
reset(); reset();
return result; return result;
} }

View File

@ -1,5 +1,6 @@
/* /*
* Copyright (c) 2015, Red Hat, Inc. * Copyright (c) 2015, Red Hat, Inc.
* Copyright (c) 2015, Oracle, Inc.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
* *
* This code is free software; you can redistribute it and/or modify it * This code is free software; you can redistribute it and/or modify it
@ -24,7 +25,14 @@
/* /*
* @test * @test
* @bug 8069072 * @bug 8069072
* @summary Test vectors for com.sun.crypto.provider.GHASH * @summary Test vectors for com.sun.crypto.provider.GHASH.
*
* Single iteration to verify software-only GHASH algorithm.
* @run main TestGHASH
*
* Multi-iteration to verify test intrinsics GHASH, if available.
* Many iterations are needed so we are sure hotspot will use intrinsic
* @run main TestGHASH -n 10000
*/ */
import java.lang.reflect.Constructor; import java.lang.reflect.Constructor;
import java.lang.reflect.Method; import java.lang.reflect.Method;
@ -124,43 +132,55 @@ public class TestGHASH {
public static void main(String[] args) throws Exception { public static void main(String[] args) throws Exception {
TestGHASH test; TestGHASH test;
if (args.length == 0) { String test_class = "com.sun.crypto.provider.GHASH";
test = new TestGHASH("com.sun.crypto.provider.GHASH"); int i = 0;
} else { int num_of_loops = 1;
test = new TestGHASH(args[0]); while (args.length > i) {
if (args[i].compareTo("-c") == 0) {
test_class = args[++i];
} else if (args[i].compareTo("-n") == 0) {
num_of_loops = Integer.parseInt(args[++i]);
}
i++;
} }
// Test vectors from David A. McGrew, John Viega, System.out.println("Running " + num_of_loops + " iterations.");
// "The Galois/Counter Mode of Operation (GCM)", 2005. test = new TestGHASH(test_class);
// <http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/gcm/gcm-revised-spec.pdf> i = 0;
test.check(1, "66e94bd4ef8a2c3b884cfa59ca342b2e", "", "", while (num_of_loops > i) {
"00000000000000000000000000000000"); // Test vectors from David A. McGrew, John Viega,
test.check(2, // "The Galois/Counter Mode of Operation (GCM)", 2005.
"66e94bd4ef8a2c3b884cfa59ca342b2e", "", // <http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/gcm/gcm-revised-spec.pdf>
"0388dace60b6a392f328c2b971b2fe78", test.check(1, "66e94bd4ef8a2c3b884cfa59ca342b2e", "", "",
"f38cbb1ad69223dcc3457ae5b6b0f885"); "00000000000000000000000000000000");
test.check(3, test.check(2,
"b83b533708bf535d0aa6e52980d53b78", "", "66e94bd4ef8a2c3b884cfa59ca342b2e", "",
"42831ec2217774244b7221b784d0d49c" + "0388dace60b6a392f328c2b971b2fe78",
"e3aa212f2c02a4e035c17e2329aca12e" + "f38cbb1ad69223dcc3457ae5b6b0f885");
"21d514b25466931c7d8f6a5aac84aa05" + test.check(3,
"1ba30b396a0aac973d58e091473f5985", "b83b533708bf535d0aa6e52980d53b78", "",
"7f1b32b81b820d02614f8895ac1d4eac"); "42831ec2217774244b7221b784d0d49c" +
test.check(4, "e3aa212f2c02a4e035c17e2329aca12e" +
"b83b533708bf535d0aa6e52980d53b78", "21d514b25466931c7d8f6a5aac84aa05" +
"feedfacedeadbeeffeedfacedeadbeef" + "abaddad2", "1ba30b396a0aac973d58e091473f5985",
"42831ec2217774244b7221b784d0d49c" + "7f1b32b81b820d02614f8895ac1d4eac");
"e3aa212f2c02a4e035c17e2329aca12e" + test.check(4,
"21d514b25466931c7d8f6a5aac84aa05" + "b83b533708bf535d0aa6e52980d53b78",
"1ba30b396a0aac973d58e091", "feedfacedeadbeeffeedfacedeadbeef" + "abaddad2",
"698e57f70e6ecc7fd9463b7260a9ae5f"); "42831ec2217774244b7221b784d0d49c" +
test.check(5, "b83b533708bf535d0aa6e52980d53b78", "e3aa212f2c02a4e035c17e2329aca12e" +
"feedfacedeadbeeffeedfacedeadbeef" + "abaddad2", "21d514b25466931c7d8f6a5aac84aa05" +
"61353b4c2806934a777ff51fa22a4755" + "1ba30b396a0aac973d58e091",
"699b2a714fcdc6f83766e5f97b6c7423" + "698e57f70e6ecc7fd9463b7260a9ae5f");
"73806900e49f24b22b097544d4896b42" + test.check(5, "b83b533708bf535d0aa6e52980d53b78",
"4989b5e1ebac0f07c23f4598", "feedfacedeadbeeffeedfacedeadbeef" + "abaddad2",
"df586bb4c249b92cb6922877e444d37b"); "61353b4c2806934a777ff51fa22a4755" +
"699b2a714fcdc6f83766e5f97b6c7423" +
"73806900e49f24b22b097544d4896b42" +
"4989b5e1ebac0f07c23f4598",
"df586bb4c249b92cb6922877e444d37b");
i++;
}
} }
} }