On Thu, 4 Sep 2025 15:26:02 GMT, Jamil Nimeh <jni...@openjdk.org> wrote:

>> This fix resolves an issue where the `Cipher.updateAAD(ByteBuffer)` method, 
>> when used on a ChaCha20-Poly1305 Cipher, may throw an exception due to an 
>> offset calculation error.  This occurs when the ByteBuffer is array-backed, 
>> and when the buffer passed into the method is a slice of another 
>> array-backed buffer and that slice begins at a non-zero offset in the parent 
>> ByteBuffer.
>> 
>> Credit and thanks to @jaikiran for finding the issue and providing 
>> reproducer code.
>
> Jamil Nimeh has updated the pull request incrementally with one additional 
> commit since the last revision:
> 
>   Fix typo in exception message

test/jdk/com/sun/crypto/provider/Cipher/ChaCha20/UpdateAADTest.java line 56:

> 54: 
> 55:     public static void main(final String[] args) throws Exception {
> 56:         ByteBuffer twoKBuf = ByteBuffer.allocate(2048);

Is it relevant to include a test case for MemorySegment-backed ByteBuffers?

-------------

PR Review Comment: https://git.openjdk.org/jdk/pull/27081#discussion_r2325420966

Reply via email to