On 5/12/2016 10:38 AM, Anthony Scarpino wrote:
On 05/04/2016 07:08 PM, Valerie Peng wrote:
Hi,
Can someone help reviewing the changes for SHA-3?
The result has been validated against the NIST test vectors (for
BYTE-ONLY impls, i.g. input which are multiples of bytes).
The feature complete date is coming up in a week or two. So, if this can
be reviewed in a week or so, that'd be great.
The changes for SUN providers are quite straight-forward, e.g. SHA-3
digest impls based on FIPS PUB 202.
As for OracleUcrypto provider, Solaris SHA-3 support is through new
libucrypto digest APIs (added in Solaris 12) instead of the libmd.
When running on Solaris 12, the new libucrypto APIs will be used.
Otherwise, libmd will be used.
Changes for OracleUcrypto providers:
- add JNI code for the new libucrypto digest APIs
- code refactoring, e.g. move the libmd-related code to classes with MD
suffix
- run-time mechanism number assignment (used to be hardcoded values)
- better error reporting
RFE: https://bugs.openjdk.java.net/browse/JDK-8000415
Webrev: http://cr.openjdk.java.net/~valeriep/8000415/webrev.00/
Thanks,
Valerie
Just a few minor things.
UcryptoProvider.java:161
Did you mean to only comment it out and not delete it?
nativeFunc.c:
I noticed it is checking the library functions via dlsym. You could
have a conditional check on the version of the library via
ucrypto_version, then do the dlsym calls if it is supported.
I think there is a performance enhancement that I would not hold up
for this changeset. Changing the byte[]'s to long[] might give a good
performance gain. A similar change was done to GHASH.java which
resulted in a 10x performance increase. Given the internal methods
appear to use long[][], and lanes are in longs it would probably help.
But it most likely require a change to add
DigestBase.implCompress(long[], int) and DigestBase.and
implDigest(long[], int). Probably a low priority RFE.
Tony
Hi Valerie, just a few additional nits - not a big deal either way:
* nativeCryptoMD.c:
o 47, 53, 59, 65, etc.: You don't need to cast the pointer from
malloc since you're assigning it to a void *. The casting only
needs to happen when you go to use the pointer with a function
that expects a concrete type. I tried it with gcc and cc with
full warnings just to be sure. But it's no problem to leave it
in there as-is.
o 123, 125: I think these may be unnecessary casts, too.
o 133,135,137: pretty sure free doesn't need casts. It likes all
pointers regardless of type.
* nativeCrypto.c:
o 40,42: I'm surprised you're not getting warnings on these, as
"0x0x" isn't a valid format specifier so you have a mismatch in
terms of arguments vs format specifiers. Do you mean 0x%0x?
The latter works ok.
o 357: Just a question, does ucryptoDigestFinal automatically free
the context as part of the finalize? Otherwise you're only
freeing the context on a non-zero return value from that
function. I'm assuming that the context should be freed
regardless of the outcome given the header comment.
o 362: Since context is a pointer, better to use NULL rather than
zero.
--Jamil