Mirror von
https://github.com/PaperMC/Velocity.git
synchronisiert 2024-11-06 00:00:47 +01:00
Merge pull request #254 from Ichbinjoe/aes-nocopy
Make AES crypto operations no-copy
Dieser Commit ist enthalten in:
Commit
523cea529e
@ -35,50 +35,25 @@ public class JavaVelocityCipher implements VelocityCipher {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void process(ByteBuf source, ByteBuf destination) throws ShortBufferException {
|
public void process(ByteBuf source) {
|
||||||
ensureNotDisposed();
|
ensureNotDisposed();
|
||||||
|
Preconditions.checkArgument(source.hasArray(), "No source array");
|
||||||
|
|
||||||
int inBytes = source.readableBytes();
|
int inBytes = source.readableBytes();
|
||||||
byte[] asBytes = ByteBufUtil.getBytes(source);
|
|
||||||
|
|
||||||
int outputSize = cipher.getOutputSize(inBytes);
|
|
||||||
byte[] outBuf = new byte[outputSize];
|
|
||||||
cipher.update(asBytes, 0, inBytes, outBuf);
|
|
||||||
destination.writeBytes(outBuf);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public ByteBuf process(ChannelHandlerContext ctx, ByteBuf source) throws ShortBufferException {
|
|
||||||
ensureNotDisposed();
|
|
||||||
|
|
||||||
int inBytes = source.readableBytes();
|
|
||||||
ByteBuf asHeapBuf = toHeap(source);
|
|
||||||
ByteBuf out = ctx.alloc().heapBuffer(cipher.getOutputSize(inBytes));
|
|
||||||
try {
|
try {
|
||||||
out.writerIndex(
|
cipher.update(source.array(), source.arrayOffset(), inBytes, source.array(),
|
||||||
cipher.update(asHeapBuf.array(), asHeapBuf.arrayOffset() + asHeapBuf.readerIndex(),
|
source.arrayOffset());
|
||||||
inBytes, out.array(), out.arrayOffset() + out.writerIndex()));
|
} catch (ShortBufferException ex) {
|
||||||
return out;
|
/* This _really_ shouldn't happen - AES CFB8 will work in place.
|
||||||
} catch (ShortBufferException e) {
|
If you run into this, that means that for whatever reason the Java Runtime has determined
|
||||||
out.release();
|
that the output buffer needs more bytes than the input buffer. When we are working with
|
||||||
throw e;
|
AES-CFB8, the output size is equal to the input size. See the problem? */
|
||||||
} finally {
|
throw new AssertionError("Cipher update did not operate in place and requested a larger "
|
||||||
asHeapBuf.release();
|
+ "buffer than the source buffer");
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
private static ByteBuf toHeap(ByteBuf src) {
|
|
||||||
if (src.hasArray()) {
|
|
||||||
return src.retain();
|
|
||||||
}
|
|
||||||
|
|
||||||
// Copy into a temporary heap buffer. We could use a local buffer, but Netty pools all buffers,
|
|
||||||
// so we'd lose more than we gain.
|
|
||||||
ByteBuf asHeapBuf = src.alloc().heapBuffer(src.readableBytes());
|
|
||||||
asHeapBuf.writeBytes(src);
|
|
||||||
return asHeapBuf;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void dispose() {
|
public void dispose() {
|
||||||
disposed = true;
|
disposed = true;
|
||||||
@ -90,6 +65,6 @@ public class JavaVelocityCipher implements VelocityCipher {
|
|||||||
|
|
||||||
@Override
|
@Override
|
||||||
public BufferPreference preferredBufferType() {
|
public BufferPreference preferredBufferType() {
|
||||||
return BufferPreference.HEAP_PREFERRED;
|
return BufferPreference.HEAP_REQUIRED;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -33,40 +33,14 @@ public class NativeVelocityCipher implements VelocityCipher {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void process(ByteBuf source, ByteBuf destination) throws ShortBufferException {
|
public void process(ByteBuf source) {
|
||||||
ensureNotDisposed();
|
ensureNotDisposed();
|
||||||
source.memoryAddress();
|
source.memoryAddress();
|
||||||
destination.memoryAddress();
|
|
||||||
|
|
||||||
// The exact amount we read in is also the amount we write out.
|
long base = source.memoryAddress() + source.readerIndex();
|
||||||
int len = source.readableBytes();
|
int len = source.readableBytes();
|
||||||
destination.ensureWritable(len);
|
|
||||||
|
|
||||||
impl.process(ctx, source.memoryAddress() + source.readerIndex(), len,
|
impl.process(ctx, base, len, base, encrypt);
|
||||||
destination.memoryAddress() + destination.writerIndex(), encrypt);
|
|
||||||
|
|
||||||
source.skipBytes(len);
|
|
||||||
destination.writerIndex(destination.writerIndex() + len);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public ByteBuf process(ChannelHandlerContext ctx, ByteBuf source) throws ShortBufferException {
|
|
||||||
ensureNotDisposed();
|
|
||||||
source.memoryAddress(); // sanity check
|
|
||||||
|
|
||||||
int len = source.readableBytes();
|
|
||||||
ByteBuf out = ctx.alloc().directBuffer(len);
|
|
||||||
|
|
||||||
try {
|
|
||||||
impl.process(this.ctx, source.memoryAddress() + source.readerIndex(), len,
|
|
||||||
out.memoryAddress(), encrypt);
|
|
||||||
source.skipBytes(len);
|
|
||||||
out.writerIndex(len);
|
|
||||||
return out;
|
|
||||||
} catch (Exception e) {
|
|
||||||
out.release();
|
|
||||||
throw e;
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
@ -7,8 +7,5 @@ import io.netty.channel.ChannelHandlerContext;
|
|||||||
import javax.crypto.ShortBufferException;
|
import javax.crypto.ShortBufferException;
|
||||||
|
|
||||||
public interface VelocityCipher extends Disposable, Native {
|
public interface VelocityCipher extends Disposable, Native {
|
||||||
|
void process(ByteBuf source);
|
||||||
void process(ByteBuf source, ByteBuf destination) throws ShortBufferException;
|
|
||||||
|
|
||||||
ByteBuf process(ChannelHandlerContext ctx, ByteBuf source) throws ShortBufferException;
|
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,10 @@
|
|||||||
package com.velocitypowered.natives.util;
|
package com.velocitypowered.natives.util;
|
||||||
|
|
||||||
public enum BufferPreference {
|
public enum BufferPreference {
|
||||||
|
/**
|
||||||
|
* A heap buffer is required.
|
||||||
|
*/
|
||||||
|
HEAP_REQUIRED,
|
||||||
/**
|
/**
|
||||||
* A heap buffer is preferred (but not required).
|
* A heap buffer is preferred (but not required).
|
||||||
*/
|
*/
|
||||||
|
@ -20,28 +20,30 @@ public class MoreByteBufUtils {
|
|||||||
* @return a buffer compatible with the native
|
* @return a buffer compatible with the native
|
||||||
*/
|
*/
|
||||||
public static ByteBuf ensureCompatible(ByteBufAllocator alloc, Native nativeStuff, ByteBuf buf) {
|
public static ByteBuf ensureCompatible(ByteBufAllocator alloc, Native nativeStuff, ByteBuf buf) {
|
||||||
if (nativeStuff.preferredBufferType() != BufferPreference.DIRECT_REQUIRED
|
if (isCompatible(nativeStuff, buf)) {
|
||||||
|| buf.hasMemoryAddress()) {
|
|
||||||
return buf.retain();
|
return buf.retain();
|
||||||
}
|
}
|
||||||
|
|
||||||
// It's not, so we must make a direct copy.
|
// It's not, so we must make a direct copy.
|
||||||
ByteBuf newBuf = alloc.directBuffer(buf.readableBytes());
|
ByteBuf newBuf = preferredBuffer(alloc, nativeStuff, buf.readableBytes());
|
||||||
newBuf.writeBytes(buf);
|
newBuf.writeBytes(buf);
|
||||||
return newBuf;
|
return newBuf;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
private static boolean isCompatible(Native nativeStuff, ByteBuf buf) {
|
||||||
* Creates a {@link ByteBuf} that will have the best performance with the specified
|
BufferPreference preferred = nativeStuff.preferredBufferType();
|
||||||
* {@code nativeStuff}.
|
switch (preferred) {
|
||||||
*
|
case DIRECT_PREFERRED:
|
||||||
* @param alloc the {@link ByteBufAllocator} to use
|
case HEAP_PREFERRED:
|
||||||
* @param nativeStuff the native we are working with
|
// The native prefers this type, but doesn't strictly require we provide it.
|
||||||
* @return a buffer compatible with the native
|
return true;
|
||||||
*/
|
case DIRECT_REQUIRED:
|
||||||
public static ByteBuf preferredBuffer(ByteBufAllocator alloc, Native nativeStuff) {
|
return buf.hasMemoryAddress();
|
||||||
return nativeStuff.preferredBufferType() != BufferPreference.HEAP_PREFERRED
|
case HEAP_REQUIRED:
|
||||||
? alloc.directBuffer() : alloc.heapBuffer();
|
return buf.hasArray();
|
||||||
|
default:
|
||||||
|
throw new AssertionError("Preferred buffer type unknown");
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -55,7 +57,15 @@ public class MoreByteBufUtils {
|
|||||||
*/
|
*/
|
||||||
public static ByteBuf preferredBuffer(ByteBufAllocator alloc, Native nativeStuff,
|
public static ByteBuf preferredBuffer(ByteBufAllocator alloc, Native nativeStuff,
|
||||||
int initialCapacity) {
|
int initialCapacity) {
|
||||||
return nativeStuff.preferredBufferType() != BufferPreference.HEAP_PREFERRED
|
switch (nativeStuff.preferredBufferType()) {
|
||||||
? alloc.directBuffer(initialCapacity) : alloc.heapBuffer(initialCapacity);
|
case HEAP_REQUIRED:
|
||||||
|
case HEAP_PREFERRED:
|
||||||
|
return alloc.heapBuffer(initialCapacity);
|
||||||
|
case DIRECT_PREFERRED:
|
||||||
|
case DIRECT_REQUIRED:
|
||||||
|
return alloc.directBuffer(initialCapacity);
|
||||||
|
default:
|
||||||
|
throw new AssertionError("Preferred buffer type unknown");
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -56,20 +56,18 @@ class VelocityCipherTest {
|
|||||||
VelocityCipher encrypt = factory.forEncryption(new SecretKeySpec(AES_KEY, "AES"));
|
VelocityCipher encrypt = factory.forEncryption(new SecretKeySpec(AES_KEY, "AES"));
|
||||||
|
|
||||||
ByteBuf source = bufSupplier.get();
|
ByteBuf source = bufSupplier.get();
|
||||||
ByteBuf dest = bufSupplier.get();
|
|
||||||
ByteBuf decryptionBuf = bufSupplier.get();
|
|
||||||
|
|
||||||
source.writeBytes(TEST_DATA);
|
source.writeBytes(TEST_DATA);
|
||||||
|
|
||||||
|
ByteBuf workingBuf = source.copy();
|
||||||
|
|
||||||
try {
|
try {
|
||||||
encrypt.process(source, dest);
|
encrypt.process(workingBuf);
|
||||||
decrypt.process(dest, decryptionBuf);
|
decrypt.process(workingBuf);
|
||||||
source.readerIndex(0);
|
assertTrue(ByteBufUtil.equals(source, workingBuf));
|
||||||
assertTrue(ByteBufUtil.equals(source, decryptionBuf));
|
|
||||||
} finally {
|
} finally {
|
||||||
source.release();
|
source.release();
|
||||||
dest.release();
|
workingBuf.release();
|
||||||
decryptionBuf.release();
|
|
||||||
decrypt.dispose();
|
decrypt.dispose();
|
||||||
encrypt.dispose();
|
encrypt.dispose();
|
||||||
}
|
}
|
||||||
|
@ -18,11 +18,14 @@ public class MinecraftCipherDecoder extends ByteToMessageDecoder {
|
|||||||
|
|
||||||
@Override
|
@Override
|
||||||
protected void decode(ChannelHandlerContext ctx, ByteBuf in, List<Object> out) throws Exception {
|
protected void decode(ChannelHandlerContext ctx, ByteBuf in, List<Object> out) throws Exception {
|
||||||
ByteBuf compatible = MoreByteBufUtils.ensureCompatible(ctx.alloc(), cipher, in);
|
ByteBuf compatible = MoreByteBufUtils.ensureCompatible(ctx.alloc(), cipher, in).slice();
|
||||||
try {
|
try {
|
||||||
out.add(cipher.process(ctx, compatible));
|
cipher.process(compatible);
|
||||||
} finally {
|
out.add(compatible);
|
||||||
compatible.release();
|
in.skipBytes(in.readableBytes());
|
||||||
|
} catch (Exception e) {
|
||||||
|
compatible.release(); // compatible will never be used if we throw an exception
|
||||||
|
throw e;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -20,9 +20,11 @@ public class MinecraftCipherEncoder extends MessageToMessageEncoder<ByteBuf> {
|
|||||||
protected void encode(ChannelHandlerContext ctx, ByteBuf msg, List<Object> out) throws Exception {
|
protected void encode(ChannelHandlerContext ctx, ByteBuf msg, List<Object> out) throws Exception {
|
||||||
ByteBuf compatible = MoreByteBufUtils.ensureCompatible(ctx.alloc(), cipher, msg);
|
ByteBuf compatible = MoreByteBufUtils.ensureCompatible(ctx.alloc(), cipher, msg);
|
||||||
try {
|
try {
|
||||||
out.add(cipher.process(ctx, compatible));
|
cipher.process(compatible);
|
||||||
} finally {
|
out.add(compatible);
|
||||||
compatible.release();
|
} catch (Exception e) {
|
||||||
|
compatible.release(); // compatible will never be used if we throw an exception
|
||||||
|
throw e;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Laden…
In neuem Issue referenzieren
Einen Benutzer sperren