Martin Balao 4a75fd462c 8301553: Support Password-Based Cryptography in SunPKCS11
Co-authored-by: Francisco Ferrari Bihurriet <fferrari@redhat.com>
Co-authored-by: Martin Balao <mbalao@openjdk.org>
Reviewed-by: valeriep
2023-06-06 19:39:34 +00:00

229 lines
8.6 KiB
Java

/*
* Copyright (c) 2023, Red Hat, Inc.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License version 2 only, as
* published by the Free Software Foundation. Oracle designates this
* particular file as subject to the "Classpath" exception as provided
* by Oracle in the LICENSE file that accompanied this code.
*
* This code is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* version 2 for more details (a copy is included in the LICENSE file that
* accompanied this code).
*
* You should have received a copy of the GNU General Public License version
* 2 along with this work; if not, write to the Free Software Foundation,
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
* or visit www.oracle.com if you need additional information or have any
* questions.
*/
package sun.security.pkcs11;
import java.security.AlgorithmParameters;
import java.security.InvalidAlgorithmParameterException;
import java.security.InvalidKeyException;
import java.security.Key;
import java.security.NoSuchAlgorithmException;
import java.security.SecureRandom;
import java.security.spec.AlgorithmParameterSpec;
import java.security.spec.InvalidKeySpecException;
import javax.crypto.BadPaddingException;
import javax.crypto.CipherSpi;
import javax.crypto.IllegalBlockSizeException;
import javax.crypto.NoSuchPaddingException;
import javax.crypto.ShortBufferException;
import javax.crypto.spec.PBEKeySpec;
import javax.crypto.spec.PBEParameterSpec;
import sun.security.jca.JCAUtil;
import static sun.security.pkcs11.wrapper.PKCS11Constants.*;
import sun.security.pkcs11.wrapper.PKCS11Exception;
import sun.security.util.PBEUtil;
final class P11PBECipher extends CipherSpi {
private final Token token;
private final String pbeAlg;
private final P11Cipher cipher;
private final int blkSize;
private final P11SecretKeyFactory.PBEKeyInfo svcPbeKi;
private final PBEUtil.PBES2Params pbes2Params = new PBEUtil.PBES2Params();
P11PBECipher(Token token, String pbeAlg, long cipherMech)
throws PKCS11Exception, NoSuchAlgorithmException {
super();
String cipherTrans;
if (cipherMech == CKM_AES_CBC_PAD || cipherMech == CKM_AES_CBC) {
cipherTrans = "AES/CBC/PKCS5Padding";
} else {
throw new NoSuchAlgorithmException(
"Cipher transformation not supported.");
}
cipher = new P11Cipher(token, cipherTrans, cipherMech);
blkSize = cipher.engineGetBlockSize();
this.pbeAlg = pbeAlg;
svcPbeKi = P11SecretKeyFactory.getPBEKeyInfo(pbeAlg);
assert svcPbeKi != null : "algorithm must be in KeyInfo map";
this.token = token;
}
// see JCE spec
@Override
protected void engineSetMode(String mode)
throws NoSuchAlgorithmException {
cipher.engineSetMode(mode);
}
// see JCE spec
@Override
protected void engineSetPadding(String padding)
throws NoSuchPaddingException {
cipher.engineSetPadding(padding);
}
// see JCE spec
@Override
protected int engineGetBlockSize() {
return cipher.engineGetBlockSize();
}
// see JCE spec
@Override
protected int engineGetOutputSize(int inputLen) {
return cipher.engineGetOutputSize(inputLen);
}
// see JCE spec
@Override
protected byte[] engineGetIV() {
return cipher.engineGetIV();
}
// see JCE spec
@Override
protected AlgorithmParameters engineGetParameters() {
return pbes2Params.getAlgorithmParameters(blkSize, pbeAlg,
P11Util.getSunJceProvider(), JCAUtil.getSecureRandom());
}
// see JCE spec
@Override
protected void engineInit(int opmode, Key key,
SecureRandom random) throws InvalidKeyException {
try {
engineInit(opmode, key, (AlgorithmParameterSpec) null, random);
} catch (InvalidAlgorithmParameterException e) {
throw new InvalidKeyException("requires PBE parameters", e);
}
}
// see JCE spec
@Override
protected void engineInit(int opmode, Key key,
AlgorithmParameterSpec params, SecureRandom random)
throws InvalidKeyException,
InvalidAlgorithmParameterException {
if (key instanceof P11Key) {
// If the key is a P11Key, it must come from a PBE derivation
// because this is a PBE Cipher service. In addition to checking the
// key, check that params (if passed) are consistent.
PBEUtil.checkKeyAndParams(key, params, pbeAlg);
// At this point, we know that the key is a P11PBEKey.
P11Key.P11PBEKey p11PBEKey = (P11Key.P11PBEKey) key;
// PBE services require a PBE key of the same algorithm and the
// underlying service (non-PBE) won't check it.
if (!pbeAlg.equals(p11PBEKey.getAlgorithm())) {
throw new InvalidKeyException("Cannot use a " +
p11PBEKey.getAlgorithm() + " key for a " + pbeAlg +
" service");
}
if (params instanceof PBEParameterSpec pbeParams) {
params = pbeParams.getParameterSpec();
}
pbes2Params.initialize(blkSize, opmode,
p11PBEKey.getIterationCount(), p11PBEKey.getSalt(), params,
random);
} else {
// If the key is not a P11Key, a derivation is needed. Data for
// derivation has to be carried either as part of the key or params.
// Use SunPKCS11 PBE key derivation to obtain a P11Key.
PBEKeySpec pbeSpec = pbes2Params.getPBEKeySpec(
blkSize, svcPbeKi.keyLen, opmode, key, params, random);
try {
P11Key.P11PBEKey p11PBEKey = P11SecretKeyFactory.derivePBEKey(
token, pbeSpec, svcPbeKi);
// The internal Cipher service uses the token where the
// derived key lives so there won't be any need to re-derive
// and use the password. The key cannot be accessed out of this
// class.
p11PBEKey.clearPassword();
key = p11PBEKey;
} catch (InvalidKeySpecException e) {
throw new InvalidKeyException(e);
} finally {
pbeSpec.clearPassword();
}
}
cipher.engineInit(opmode, key, pbes2Params.getIvSpec(), random);
}
// see JCE spec
@Override
protected void engineInit(int opmode, Key key,
AlgorithmParameters params, SecureRandom random)
throws InvalidKeyException,
InvalidAlgorithmParameterException {
engineInit(opmode, key, PBEUtil.PBES2Params.getParameterSpec(params),
random);
}
// see JCE spec
@Override
protected byte[] engineUpdate(byte[] input, int inputOffset,
int inputLen) {
return cipher.engineUpdate(input, inputOffset, inputLen);
}
// see JCE spec
@Override
protected int engineUpdate(byte[] input, int inputOffset,
int inputLen, byte[] output, int outputOffset)
throws ShortBufferException {
return cipher.engineUpdate(input, inputOffset, inputLen,
output, outputOffset);
}
// see JCE spec
@Override
protected byte[] engineDoFinal(byte[] input, int inputOffset,
int inputLen)
throws IllegalBlockSizeException, BadPaddingException {
return cipher.engineDoFinal(input, inputOffset, inputLen);
}
// see JCE spec
@Override
protected int engineDoFinal(byte[] input, int inputOffset,
int inputLen, byte[] output, int outputOffset)
throws ShortBufferException, IllegalBlockSizeException,
BadPaddingException {
return cipher.engineDoFinal(input, inputOffset, inputLen, output,
outputOffset);
}
// see JCE spec
@Override
protected int engineGetKeySize(Key key) {
// It's guaranteed that when engineInit succeeds, the key length
// for the underlying cipher is equal to the PBE service key length.
// Otherwise, initialization fails.
return svcPbeKi.keyLen;
}
}