Re: [9] Review Request: 8072663: Remove the sun.security.acl package which is not used in the JDK

2015-02-17 Thread Alan Bateman
On 17/02/2015 20:59, Jason Uh wrote: Please review this fix, which removes the sun.security.acl package. webrev: http://cr.openjdk.java.net/~juh/8072663/00/ jbs: http://bugs.openjdk.java.net/browse/JDK-8072663 The sun.security.acl package is the default implementation of java.security.acl but

[PATCH] CipherStream produces new byte array on every update or doFinal operation

2015-02-17 Thread Dai Nakanishi
Hi, CipherInputStream and CipherOutputStream call the Cipher methods update and doFinal which produce new byte array. It may consume a large amount of memory. The purpose of my patch is to avoid this. Could you review the patch? Thanks, Dai --- old/src/share/classes/javax/crypto/CipherInputStre

Re: RFR: 8073108: GHASH Intrinsics

2015-02-17 Thread Anthony Scarpino
On 02/17/2015 03:52 PM, Florian Weimer wrote: On 02/17/2015 11:30 PM, Vladimir Kozlov wrote: The concern was about java code and not intrinsic. If intrinsic is not used we will get additional range checks which were not present before. By indirect load I mean object->array_oop->element instead

Re: RFR: 8073108: GHASH Intrinsics

2015-02-17 Thread Anthony Scarpino
Ok, I'll add these checks.. Thanks for looking through this. Tony On 02/17/2015 02:30 PM, Vladimir Kozlov wrote: The concern was about java code and not intrinsic. If intrinsic is not used we will get additional range checks which were not present before. By indirect load I mean object->array_

Re: RFR: 8073108: GHASH Intrinsics

2015-02-17 Thread Florian Weimer
On 02/17/2015 11:30 PM, Vladimir Kozlov wrote: > The concern was about java code and not intrinsic. If intrinsic is not > used we will get additional range checks which were not present before. > > By indirect load I mean object->array_oop->element instead of > object->field. > > But in blockMult

Re: RFR: 8073108: GHASH Intrinsics

2015-02-17 Thread Vladimir Kozlov
The concern was about java code and not intrinsic. If intrinsic is not used we will get additional range checks which were not present before. By indirect load I mean object->array_oop->element instead of object->field. But in blockMult() you access them outside main loops. As result the code

Re: RFR: 8073108: GHASH Intrinsics

2015-02-17 Thread Anthony Scarpino
On 02/17/2015 01:14 PM, Vladimir Kozlov wrote: Florian's concern is valid. "Range check elimination" means that C2 moves checks from a loop. Checks are still present. Since 'state' array is not final we can't eliminate range check. I don't understand the concern here. The arrays are private a

Re: [9] Review Request: 8072663: Remove the sun.security.acl package which is not used in the JDK

2015-02-17 Thread Sean Mullan
Looks fine to me (pending CCC approval). --Sean On 02/17/2015 03:59 PM, Jason Uh wrote: Please review this fix, which removes the sun.security.acl package. webrev: http://cr.openjdk.java.net/~juh/8072663/00/ jbs: http://bugs.openjdk.java.net/browse/JDK-8072663 The sun.security.acl package is

Re: RFR: 8073108: GHASH Intrinsics

2015-02-17 Thread Vladimir Kozlov
Florian's concern is valid. "Range check elimination" means that C2 moves checks from a loop. Checks are still present. Since 'state' array is not final we can't eliminate range check. An other thing is an additional indirect load to access arrays elements. I would suggest to keep original c

Re: RFR: 8073108: GHASH Intrinsics

2015-02-17 Thread Anthony Scarpino
On 02/17/2015 12:05 PM, Florian Weimer wrote: On 02/17/2015 08:59 PM, Anthony Scarpino wrote: On 02/17/2015 12:57 AM, Florian Weimer wrote: On 02/16/2015 10:11 PM, Anthony Scarpino wrote: http://cr.openjdk.java.net/~ascarpino/8073108/jdk/webrev/ I think the “state” field in GHASH should be f

[9] Review Request: 8072663: Remove the sun.security.acl package which is not used in the JDK

2015-02-17 Thread Jason Uh
Please review this fix, which removes the sun.security.acl package. webrev: http://cr.openjdk.java.net/~juh/8072663/00/ jbs: http://bugs.openjdk.java.net/browse/JDK-8072663 The sun.security.acl package is the default implementation of java.security.acl but it's not used in JDK. The JCK tests fo

Re: RFR: 8073108: GHASH Intrinsics

2015-02-17 Thread Florian Weimer
On 02/17/2015 09:03 PM, Anthony Scarpino wrote: > On 02/17/2015 02:59 AM, Florian Weimer wrote: >> On 02/16/2015 10:11 PM, Anthony Scarpino wrote: >>> Hi, >>> >>> I'm requesting a code review to intrinsify the GHASH operations for both >>> x86 and SPARC platforms. This greatly increases performanc

Re: RFR: 8073108: GHASH Intrinsics

2015-02-17 Thread Florian Weimer
On 02/17/2015 08:59 PM, Anthony Scarpino wrote: > On 02/17/2015 12:57 AM, Florian Weimer wrote: >> On 02/16/2015 10:11 PM, Anthony Scarpino wrote: >>> http://cr.openjdk.java.net/~ascarpino/8073108/jdk/webrev/ >> >> I think the “state” field in GHASH should be final. Is C2 able to >> eliminate the

Re: RFR: 8073108: GHASH Intrinsics

2015-02-17 Thread Anthony Scarpino
On 02/17/2015 02:59 AM, Florian Weimer wrote: On 02/16/2015 10:11 PM, Anthony Scarpino wrote: Hi, I'm requesting a code review to intrinsify the GHASH operations for both x86 and SPARC platforms. This greatly increases performance over software for AES/GCM crypto operations, details are in the

Re: RFR: 8073108: GHASH Intrinsics

2015-02-17 Thread Anthony Scarpino
On 02/17/2015 12:57 AM, Florian Weimer wrote: On 02/16/2015 10:11 PM, Anthony Scarpino wrote: http://cr.openjdk.java.net/~ascarpino/8073108/jdk/webrev/ I think the “state” field in GHASH should be final. Is C2 able to eliminate the array bounds checks? (Although it's not in the inner loop an

Re: RFR: 8073108: GHASH Intrinsics

2015-02-17 Thread Anthony Scarpino
On 02/17/2015 10:41 AM, Vladimir Kozlov wrote: On 2/17/15 10:31 AM, Anthony Scarpino wrote: On 02/16/2015 06:01 PM, Vladimir Kozlov wrote: There is #ifdef _WIN64 in stubGenerator_x86_32.cpp. It is not needed since it is 32-bit code. Sure.. Do I still need to save the xmm6 and xmm7 on 32bit co

Re: RFR 8073182: keytool may generate duplicate extensions

2015-02-17 Thread Sean Mullan
You should probably update the keytool doc to say that if duplicate extensions are specified, only the last one is added. Also, unrelated to you fix but can you break up that really long line (1213) in KeyToolTest? Looks fine otherwise. --Sean On 02/16/2015 02:56 AM, Weijun Wang wrote: Ple

Re: RFR: 8073108: GHASH Intrinsics

2015-02-17 Thread Anthony Scarpino
On 02/16/2015 06:47 PM, John Rose wrote: Cool stuff. I'm glad to see SPARC xmulx getting some play. This is not a review, but I have a small and a big comment. You don't need the argument vmIntrinsics::ID id unless you are going to do something with it, such as expand one of a family of intrin

Re: RFR: 8073108: GHASH Intrinsics

2015-02-17 Thread Vladimir Kozlov
On 2/17/15 10:31 AM, Anthony Scarpino wrote: On 02/16/2015 06:01 PM, Vladimir Kozlov wrote: On 2/16/15 5:23 PM, David Holmes wrote: Hi Tony, Not a review as hotspot compiler folk need to review this. On 17/02/2015 7:11 AM, Anthony Scarpino wrote: Hi, I'm requesting a code review to intrinsi

Re: [9] RFR: 8042967: Add variant of DSA Signature algorithms that do not ASN.1 encode the signature bytes

2015-02-17 Thread Sean Mullan
Looks good. --Sean On 02/16/2015 01:53 PM, Jason Uh wrote: Thanks Sean. Here it is with your suggested changes: http://cr.openjdk.java.net/~juh/8042967/04/ Opened an issue to track the docs changes: https://bugs.openjdk.java.net/browse/JDK-8073261 Jason On 02/16/2015 10:22 AM, Sean Mullan

Re: RFR: 8073108: GHASH Intrinsics

2015-02-17 Thread Anthony Scarpino
On 02/16/2015 06:01 PM, Vladimir Kozlov wrote: On 2/16/15 5:23 PM, David Holmes wrote: Hi Tony, Not a review as hotspot compiler folk need to review this. On 17/02/2015 7:11 AM, Anthony Scarpino wrote: Hi, I'm requesting a code review to intrinsify the GHASH operations for both x86 and SPARC

RFR 8072394: java.security.cert.PolicyQualifierInfo needs value-based equality

2015-02-17 Thread Florian Weimer
On 02/16/2015 11:13 PM, Sean Mullan wrote: >> Based on that, PolicyQualifierInfo should have implemented value-based >> equals() and hashCode(), and the identity-based set is just a bug. (But >> the requirement I cited is a stronger requirement the Set would not >> enforce.) >> >> However, I thin

Re: RFR 8073113: sun/security/pkcs11/MessageDigest/TestCloning.java failed due to CloneNotSupportedException: SHA-256

2015-02-17 Thread Sean Mullan
On 02/16/2015 06:32 PM, Anthony Scarpino wrote: On 02/16/2015 02:48 PM, Sean Mullan wrote: On 02/16/2015 02:57 PM, Anthony Scarpino wrote: FYI, the bug number should be JDK-8043951. The one I listed was the backport ID. The link below is still valid Normally, the bug in the comment above a

Re: RFR: 8073108: GHASH Intrinsics

2015-02-17 Thread Florian Weimer
On 02/16/2015 10:11 PM, Anthony Scarpino wrote: > Hi, > > I'm requesting a code review to intrinsify the GHASH operations for both > x86 and SPARC platforms. This greatly increases performance over > software for AES/GCM crypto operations, details are in the bug. > > The review is for two repos,

Re: RFR: 8073108: GHASH Intrinsics

2015-02-17 Thread Florian Weimer
On 02/16/2015 10:11 PM, Anthony Scarpino wrote: > http://cr.openjdk.java.net/~ascarpino/8073108/jdk/webrev/ I think the “state” field in GHASH should be final. Is C2 able to eliminate the array bounds checks? (Although it's not in the inner loop and thus probably not relevant for performance.)