Re: RFR: 8329538: Accelerate P256 on x86_64 using Montgomery intrinsic [v2]

2024-04-24 Thread Volodymyr Paprotski
On Tue, 9 Apr 2024 02:01:36 GMT, Anthony Scarpino wrote: >> Volodymyr Paprotski has updated the pull request incrementally with one >> additional commit since the last revision: >> >> remove use of jdk.crypto.ec > > src/java.base/share/classes/sun/security/ec/ECOperations.java line 308: > >>

Re: RFR: 8329538: Accelerate P256 on x86_64 using Montgomery intrinsic [v3]

2024-04-24 Thread Volodymyr Paprotski
On Tue, 23 Apr 2024 19:55:57 GMT, Anthony Scarpino wrote: >> Volodymyr Paprotski has updated the pull request incrementally with one >> additional commit since the last revision: >> >> Comments from Jatin and Tony > > src/java.base/share/classes/sun/security/ec/ECOperations.java line 204: >

Re: RFR: 8329538: Accelerate P256 on x86_64 using Montgomery intrinsic [v2]

2024-04-24 Thread Volodymyr Paprotski
On Tue, 16 Apr 2024 02:26:57 GMT, Jatin Bhateja wrote: >> Per-above, this is a switch statement (`UNLIKELY`) fallback. I can still add >> alignment and loop rotation, but being a fallback figured its more important >> to keep it small&readable... > > It's all part of intrinsic, no harm in polis

Re: RFR: 8329538: Accelerate P256 on x86_64 using Montgomery intrinsic [v4]

2024-04-24 Thread Volodymyr Paprotski
> Performance. Before: > > Benchmark(algorithm) (dataSize) (keyLength) > (provider) Mode Cnt ScoreError Units > SignatureBench.ECDSA.signSHA256withECDSA1024 256 > thrpt3 6443.934 ± 6.491 ops/s > SignatureBench.ECDSA.

Re: Bad exception message in SSLHandshakeException ?

2024-04-24 Thread Daniel Jeliński
Hi Simon, Thanks for reporting. The problem is already tracked under https://bugs.openjdk.org/browse/JDK-8325022. Cheers, Daniel śr., 24 kwi 2024 o 15:52 Simon Bernard napisał(a): > > Hi, > > I think that maybe I found a bad message for SSLHanshakeException in > sun.security.ssl.CertificateMessa

Re: Disable TLS Renegociation ?

2024-04-24 Thread Simon Bernard
Thx Sean, So just to be sure that I get you correctly, that means there is only a static way to disable that ? No way to configure it differently for each SslSocket or SslEngine? For example, If I have a java application with 1  socket for https (e.g. a REST API) and another socket on for co

Bad exception message in SSLHandshakeException ?

2024-04-24 Thread Simon Bernard
Hi, I think that maybe I found a bad message for SSLHanshakeException in sun.security.ssl.CertificateMessage. At server side configured with *CLIENT_AUTH_REQUIRED*, I get this SSLHanshakeException when trying to connect with a client sending an empty cert chain : |Caused by: javax.net.ssl.

Re: RFR: 8330842: Support AES CBC with Ciphertext Stealing (CTS) in SunPKCS11

2024-04-24 Thread Francisco Ferrari Bihurriet
On Wed, 24 Apr 2024 07:14:31 GMT, Andrew Haley wrote: >> Hi, >> >> I would like to propose an implementation to support AES CBC with Ciphertext >> Stealing (CTS) in SunPKCS11, according to what has been specified in >> [JDK-8330843 CSR](https://bugs.openjdk.org/browse/JDK-8330843). >> >> What

Re: RFR: 8330842: Support AES CBC with Ciphertext Stealing (CTS) in SunPKCS11

2024-04-24 Thread Andrew Haley
On Mon, 22 Apr 2024 18:31:37 GMT, Francisco Ferrari Bihurriet wrote: > Hi, > > I would like to propose an implementation to support AES CBC with Ciphertext > Stealing (CTS) in SunPKCS11, according to what has been specified in > [JDK-8330843 CSR](https://bugs.openjdk.org/browse/JDK-8330843).