| /* |
| * Copyright (c) 2003, 2019, Oracle and/or its affiliates. All rights reserved. |
| */ |
| |
| /* Copyright (c) 2002 Graz University of Technology. All rights reserved. |
| * |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions are met: |
| * |
| * 1. Redistributions of source code must retain the above copyright notice, |
| * this list of conditions and the following disclaimer. |
| * |
| * 2. Redistributions in binary form must reproduce the above copyright notice, |
| * this list of conditions and the following disclaimer in the documentation |
| * and/or other materials provided with the distribution. |
| * |
| * 3. The end-user documentation included with the redistribution, if any, must |
| * include the following acknowledgment: |
| * |
| * "This product includes software developed by IAIK of Graz University of |
| * Technology." |
| * |
| * Alternately, this acknowledgment may appear in the software itself, if |
| * and wherever such third-party acknowledgments normally appear. |
| * |
| * 4. The names "Graz University of Technology" and "IAIK of Graz University of |
| * Technology" must not be used to endorse or promote products derived from |
| * this software without prior written permission. |
| * |
| * 5. Products derived from this software may not be called |
| * "IAIK PKCS Wrapper", nor may "IAIK" appear in their name, without prior |
| * written permission of Graz University of Technology. |
| * |
| * THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESSED OR IMPLIED |
| * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED |
| * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR |
| * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE LICENSOR BE |
| * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, |
| * OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, |
| * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, |
| * OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON |
| * ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, |
| * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE |
| * POSSIBILITY OF SUCH DAMAGE. |
| */ |
| |
| #include "pkcs11wrapper.h" |
| |
| #include <stdio.h> |
| #include <stdlib.h> |
| #include <string.h> |
| #include <assert.h> |
| |
| #include "sun_security_pkcs11_wrapper_PKCS11.h" |
| |
| #ifdef P11_ENABLE_GETNATIVEKEYINFO |
| |
| #define CK_ATTRIBUTES_TEMPLATE_LENGTH (CK_ULONG)61U |
| |
| static CK_ATTRIBUTE ckpAttributesTemplate[CK_ATTRIBUTES_TEMPLATE_LENGTH] = { |
| {CKA_CLASS, 0, 0}, |
| {CKA_TOKEN, 0, 0}, |
| {CKA_PRIVATE, 0, 0}, |
| {CKA_LABEL, 0, 0}, |
| {CKA_APPLICATION, 0, 0}, |
| {CKA_VALUE, 0, 0}, |
| {CKA_OBJECT_ID, 0, 0}, |
| {CKA_CERTIFICATE_TYPE, 0, 0}, |
| {CKA_ISSUER, 0, 0}, |
| {CKA_SERIAL_NUMBER, 0, 0}, |
| {CKA_AC_ISSUER, 0, 0}, |
| {CKA_OWNER, 0, 0}, |
| {CKA_ATTR_TYPES, 0, 0}, |
| {CKA_TRUSTED, 0, 0}, |
| {CKA_KEY_TYPE, 0, 0}, |
| {CKA_SUBJECT, 0, 0}, |
| {CKA_ID, 0, 0}, |
| {CKA_SENSITIVE, 0, 0}, |
| {CKA_ENCRYPT, 0, 0}, |
| {CKA_DECRYPT, 0, 0}, |
| {CKA_WRAP, 0, 0}, |
| {CKA_UNWRAP, 0, 0}, |
| {CKA_SIGN, 0, 0}, |
| {CKA_SIGN_RECOVER, 0, 0}, |
| {CKA_VERIFY, 0, 0}, |
| {CKA_VERIFY_RECOVER, 0, 0}, |
| {CKA_DERIVE, 0, 0}, |
| {CKA_START_DATE, 0, 0}, |
| {CKA_END_DATE, 0, 0}, |
| {CKA_MODULUS, 0, 0}, |
| {CKA_MODULUS_BITS, 0, 0}, |
| {CKA_PUBLIC_EXPONENT, 0, 0}, |
| {CKA_PRIVATE_EXPONENT, 0, 0}, |
| {CKA_PRIME_1, 0, 0}, |
| {CKA_PRIME_2, 0, 0}, |
| {CKA_EXPONENT_1, 0, 0}, |
| {CKA_EXPONENT_2, 0, 0}, |
| {CKA_COEFFICIENT, 0, 0}, |
| {CKA_PRIME, 0, 0}, |
| {CKA_SUBPRIME, 0, 0}, |
| {CKA_BASE, 0, 0}, |
| {CKA_PRIME_BITS, 0, 0}, |
| {CKA_SUB_PRIME_BITS, 0, 0}, |
| {CKA_VALUE_BITS, 0, 0}, |
| {CKA_VALUE_LEN, 0, 0}, |
| {CKA_EXTRACTABLE, 0, 0}, |
| {CKA_LOCAL, 0, 0}, |
| {CKA_NEVER_EXTRACTABLE, 0, 0}, |
| {CKA_ALWAYS_SENSITIVE, 0, 0}, |
| {CKA_KEY_GEN_MECHANISM, 0, 0}, |
| {CKA_MODIFIABLE, 0, 0}, |
| {CKA_ECDSA_PARAMS, 0, 0}, |
| {CKA_EC_PARAMS, 0, 0}, |
| {CKA_EC_POINT, 0, 0}, |
| {CKA_SECONDARY_AUTH, 0, 0}, |
| {CKA_AUTH_PIN_FLAGS, 0, 0}, |
| {CKA_HW_FEATURE_TYPE, 0, 0}, |
| {CKA_RESET_ON_INIT, 0, 0}, |
| {CKA_HAS_RESET, 0, 0}, |
| {CKA_VENDOR_DEFINED, 0, 0}, |
| {CKA_NETSCAPE_DB, 0, 0}, |
| }; |
| |
| /* |
| * Class: sun_security_pkcs11_wrapper_PKCS11 |
| * Method: getNativeKeyInfo |
| * Signature: (JJJLsun/security/pkcs11/wrapper/CK_MECHANISM;)[B |
| * Parametermapping: *PKCS11* |
| * @param jlong jSessionHandle CK_SESSION_HANDLE hSession |
| * @param jlong jKeyHandle CK_OBJECT_HANDLE hObject |
| * @param jlong jWrappingKeyHandle CK_OBJECT_HANDLE hObject |
| * @param jobject jWrappingMech CK_MECHANISM_PTR pMechanism |
| * @return jbyteArray jNativeKeyInfo - |
| */ |
| JNIEXPORT jbyteArray JNICALL |
| Java_sun_security_pkcs11_wrapper_PKCS11_getNativeKeyInfo |
| (JNIEnv *env, jobject obj, jlong jSessionHandle, jlong jKeyHandle, |
| jlong jWrappingKeyHandle, jobject jWrappingMech) |
| { |
| jbyteArray returnValue = NULL; |
| CK_SESSION_HANDLE ckSessionHandle = jLongToCKULong(jSessionHandle); |
| CK_OBJECT_HANDLE ckObjectHandle = jLongToCKULong(jKeyHandle); |
| CK_ATTRIBUTE_PTR ckpAttributes = NULL; |
| CK_RV rv; |
| jbyteArray nativeKeyInfoArray = NULL; |
| jbyteArray nativeKeyInfoWrappedKeyArray = NULL; |
| jbyte* nativeKeyInfoArrayRaw = NULL; |
| jbyte* nativeKeyInfoWrappedKeyArrayRaw = NULL; |
| unsigned int sensitiveAttributePosition = (unsigned int)-1; |
| unsigned int i = 0U; |
| unsigned long totalDataSize = 0UL, attributesCount = 0UL; |
| unsigned long totalCkAttributesSize = 0UL, totalNativeKeyInfoArraySize = 0UL; |
| jbyte* wrappedKeySizePtr = NULL; |
| jbyte* nativeKeyInfoArrayRawCkAttributes = NULL; |
| jbyte* nativeKeyInfoArrayRawCkAttributesPtr = NULL; |
| jbyte* nativeKeyInfoArrayRawDataPtr = NULL; |
| CK_MECHANISM_PTR ckpMechanism = NULL; |
| char iv[16] = {0x0}; |
| CK_ULONG ckWrappedKeyLength = 0U; |
| jbyte* wrappedKeySizeWrappedKeyArrayPtr = NULL; |
| CK_BYTE_PTR wrappedKeyBufferPtr = NULL; |
| CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj); |
| CK_OBJECT_CLASS class; |
| CK_KEY_TYPE keyType; |
| CK_BBOOL sensitive; |
| CK_BBOOL netscapeAttributeValueNeeded = CK_FALSE; |
| CK_ATTRIBUTE ckNetscapeAttributesTemplate[4]; |
| ckNetscapeAttributesTemplate[0].type = CKA_CLASS; |
| ckNetscapeAttributesTemplate[1].type = CKA_KEY_TYPE; |
| ckNetscapeAttributesTemplate[2].type = CKA_SENSITIVE; |
| ckNetscapeAttributesTemplate[3].type = CKA_NETSCAPE_DB; |
| ckNetscapeAttributesTemplate[0].pValue = &class; |
| ckNetscapeAttributesTemplate[1].pValue = &keyType; |
| ckNetscapeAttributesTemplate[2].pValue = &sensitive; |
| ckNetscapeAttributesTemplate[3].pValue = 0; |
| ckNetscapeAttributesTemplate[0].ulValueLen = sizeof(class); |
| ckNetscapeAttributesTemplate[1].ulValueLen = sizeof(keyType); |
| ckNetscapeAttributesTemplate[2].ulValueLen = sizeof(sensitive); |
| ckNetscapeAttributesTemplate[3].ulValueLen = 0; |
| |
| if (ckpFunctions == NULL) { goto cleanup; } |
| |
| // If key is private and of DSA or EC type, NSS may require CKA_NETSCAPE_DB |
| // attribute to unwrap it. |
| rv = (*ckpFunctions->C_GetAttributeValue)(ckSessionHandle, ckObjectHandle, |
| ckNetscapeAttributesTemplate, |
| sizeof(ckNetscapeAttributesTemplate)/sizeof(CK_ATTRIBUTE)); |
| |
| if (rv == CKR_OK && class == CKO_PRIVATE_KEY && |
| (keyType == CKK_EC || keyType == CKK_DSA) && |
| sensitive == CK_TRUE && |
| ckNetscapeAttributesTemplate[3].ulValueLen == CK_UNAVAILABLE_INFORMATION) { |
| // We cannot set the attribute through C_SetAttributeValue here |
| // because it might be read-only. However, we can add it to |
| // the extracted buffer. |
| netscapeAttributeValueNeeded = CK_TRUE; |
| TRACE0("DEBUG: override CKA_NETSCAPE_DB attr value to TRUE\n"); |
| } |
| |
| ckpAttributes = (CK_ATTRIBUTE_PTR)malloc( |
| CK_ATTRIBUTES_TEMPLATE_LENGTH * sizeof(CK_ATTRIBUTE)); |
| if (ckpAttributes == NULL) { |
| throwOutOfMemoryError(env, 0); |
| goto cleanup; |
| } |
| memcpy(ckpAttributes, ckpAttributesTemplate, |
| CK_ATTRIBUTES_TEMPLATE_LENGTH * sizeof(CK_ATTRIBUTE)); |
| |
| // Get sizes for value buffers |
| // NOTE: may return an error code but length values are filled anyways |
| (*ckpFunctions->C_GetAttributeValue)(ckSessionHandle, ckObjectHandle, |
| ckpAttributes, CK_ATTRIBUTES_TEMPLATE_LENGTH); |
| |
| for (i = 0; i < CK_ATTRIBUTES_TEMPLATE_LENGTH; i++) { |
| if ((ckpAttributes+i)->ulValueLen != CK_UNAVAILABLE_INFORMATION) { |
| totalDataSize += (ckpAttributes+i)->ulValueLen; |
| if ((ckpAttributes+i)->type == CKA_SENSITIVE) { |
| sensitiveAttributePosition = attributesCount; |
| TRACE0("DEBUG: GetNativeKeyInfo key is sensitive"); |
| } |
| attributesCount++; |
| } |
| } |
| |
| if (netscapeAttributeValueNeeded) { |
| attributesCount++; |
| } |
| |
| // Allocate a single buffer to hold valid attributes and attribute's values |
| // Buffer structure: [ attributes-size, [ ... attributes ... ], |
| // values-size, [ ... values ... ], wrapped-key-size, |
| // [ ... wrapped-key ... ] ] |
| // * sizes are expressed in bytes and data type is unsigned long |
| totalCkAttributesSize = attributesCount * sizeof(CK_ATTRIBUTE); |
| TRACE1("DEBUG: GetNativeKeyInfo attributesCount = %lu\n", attributesCount); |
| TRACE1("DEBUG: GetNativeKeyInfo sizeof CK_ATTRIBUTE = %zu\n", sizeof(CK_ATTRIBUTE)); |
| TRACE1("DEBUG: GetNativeKeyInfo totalCkAttributesSize = %lu\n", totalCkAttributesSize); |
| TRACE1("DEBUG: GetNativeKeyInfo totalDataSize = %lu\n", totalDataSize); |
| |
| totalNativeKeyInfoArraySize = |
| totalCkAttributesSize + sizeof(unsigned long) * 3 + totalDataSize; |
| |
| TRACE1("DEBUG: GetNativeKeyInfo totalNativeKeyInfoArraySize = %lu\n", totalNativeKeyInfoArraySize); |
| |
| nativeKeyInfoArray = (*env)->NewByteArray(env, totalNativeKeyInfoArraySize); |
| if (nativeKeyInfoArray == NULL) { |
| goto cleanup; |
| } |
| |
| nativeKeyInfoArrayRaw = (*env)->GetByteArrayElements(env, nativeKeyInfoArray, |
| NULL); |
| if (nativeKeyInfoArrayRaw == NULL) { |
| goto cleanup; |
| } |
| |
| wrappedKeySizePtr = nativeKeyInfoArrayRaw + |
| sizeof(unsigned long)*2 + totalCkAttributesSize + totalDataSize; |
| memcpy(nativeKeyInfoArrayRaw, &totalCkAttributesSize, sizeof(unsigned long)); |
| |
| memcpy(nativeKeyInfoArrayRaw + sizeof(unsigned long) + totalCkAttributesSize, |
| &totalDataSize, sizeof(unsigned long)); |
| |
| memset(wrappedKeySizePtr, 0, sizeof(unsigned long)); |
| |
| nativeKeyInfoArrayRawCkAttributes = nativeKeyInfoArrayRaw + |
| sizeof(unsigned long); |
| nativeKeyInfoArrayRawCkAttributesPtr = nativeKeyInfoArrayRawCkAttributes; |
| nativeKeyInfoArrayRawDataPtr = nativeKeyInfoArrayRaw + |
| totalCkAttributesSize + sizeof(unsigned long) * 2; |
| |
| for (i = 0; i < CK_ATTRIBUTES_TEMPLATE_LENGTH; i++) { |
| if ((ckpAttributes+i)->ulValueLen != CK_UNAVAILABLE_INFORMATION) { |
| (*(CK_ATTRIBUTE_PTR)nativeKeyInfoArrayRawCkAttributesPtr).type = |
| (ckpAttributes+i)->type; |
| (*(CK_ATTRIBUTE_PTR)nativeKeyInfoArrayRawCkAttributesPtr).ulValueLen = |
| (ckpAttributes+i)->ulValueLen; |
| if ((ckpAttributes+i)->ulValueLen != 0) { |
| (*(CK_ATTRIBUTE_PTR)nativeKeyInfoArrayRawCkAttributesPtr).pValue = |
| nativeKeyInfoArrayRawDataPtr; |
| } else { |
| (*(CK_ATTRIBUTE_PTR)nativeKeyInfoArrayRawCkAttributesPtr).pValue = 0; |
| } |
| nativeKeyInfoArrayRawDataPtr += |
| (*(CK_ATTRIBUTE_PTR)nativeKeyInfoArrayRawCkAttributesPtr).ulValueLen; |
| nativeKeyInfoArrayRawCkAttributesPtr += sizeof(CK_ATTRIBUTE); |
| } |
| } |
| |
| TRACE0("DEBUG: GetNativeKeyInfo finished prepping nativeKeyInfoArray\n"); |
| |
| // Get attribute's values |
| rv = (*ckpFunctions->C_GetAttributeValue)(ckSessionHandle, ckObjectHandle, |
| (CK_ATTRIBUTE_PTR)nativeKeyInfoArrayRawCkAttributes, |
| attributesCount); |
| if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) { |
| goto cleanup; |
| } |
| |
| TRACE0("DEBUG: GetNativeKeyInfo 1st C_GetAttributeValue call passed\n"); |
| |
| if (netscapeAttributeValueNeeded) { |
| (*(CK_ATTRIBUTE_PTR)nativeKeyInfoArrayRawCkAttributesPtr).type = CKA_NETSCAPE_DB; |
| // Value is not needed, public key is not used |
| } |
| |
| if ((sensitiveAttributePosition != (unsigned int)-1) && |
| *(CK_BBOOL*)(((CK_ATTRIBUTE_PTR)(((CK_ATTRIBUTE_PTR)nativeKeyInfoArrayRawCkAttributes) |
| +sensitiveAttributePosition))->pValue) == CK_TRUE) { |
| // Key is sensitive. Need to extract it wrapped. |
| if (jWrappingKeyHandle != 0) { |
| |
| ckpMechanism = jMechanismToCKMechanismPtr(env, jWrappingMech); |
| rv = (*ckpFunctions->C_WrapKey)(ckSessionHandle, ckpMechanism, |
| jLongToCKULong(jWrappingKeyHandle), ckObjectHandle, |
| NULL_PTR, &ckWrappedKeyLength); |
| if (ckWrappedKeyLength != 0) { |
| // Allocate space for getting the wrapped key |
| nativeKeyInfoWrappedKeyArray = (*env)->NewByteArray(env, |
| totalNativeKeyInfoArraySize + ckWrappedKeyLength); |
| if (nativeKeyInfoWrappedKeyArray == NULL) { |
| goto cleanup; |
| } |
| nativeKeyInfoWrappedKeyArrayRaw = |
| (*env)->GetByteArrayElements(env, |
| nativeKeyInfoWrappedKeyArray, NULL); |
| if (nativeKeyInfoWrappedKeyArrayRaw == NULL) { |
| goto cleanup; |
| } |
| memcpy(nativeKeyInfoWrappedKeyArrayRaw, nativeKeyInfoArrayRaw, |
| totalNativeKeyInfoArraySize); |
| wrappedKeySizeWrappedKeyArrayPtr = |
| nativeKeyInfoWrappedKeyArrayRaw + |
| sizeof(unsigned long)*2 + totalCkAttributesSize + |
| totalDataSize; |
| memcpy(wrappedKeySizeWrappedKeyArrayPtr, &ckWrappedKeyLength, sizeof(unsigned long)); |
| TRACE1("DEBUG: GetNativeKeyInfo 1st C_WrapKey wrappedKeyLength = %lu\n", ckWrappedKeyLength); |
| |
| wrappedKeyBufferPtr = |
| (CK_BYTE_PTR) (wrappedKeySizeWrappedKeyArrayPtr + |
| sizeof(unsigned long)); |
| rv = (*ckpFunctions->C_WrapKey)(ckSessionHandle, ckpMechanism, |
| jLongToCKULong(jWrappingKeyHandle),ckObjectHandle, |
| wrappedKeyBufferPtr, &ckWrappedKeyLength); |
| if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) { |
| goto cleanup; |
| } |
| memcpy(wrappedKeySizeWrappedKeyArrayPtr, &ckWrappedKeyLength, sizeof(unsigned long)); |
| TRACE1("DEBUG: GetNativeKeyInfo 2nd C_WrapKey wrappedKeyLength = %lu\n", ckWrappedKeyLength); |
| } else { |
| goto cleanup; |
| } |
| } else { |
| ckAssertReturnValueOK(env, CKR_KEY_HANDLE_INVALID); |
| goto cleanup; |
| } |
| returnValue = nativeKeyInfoWrappedKeyArray; |
| } else { |
| returnValue = nativeKeyInfoArray; |
| } |
| |
| cleanup: |
| if (ckpAttributes != NULL) { |
| free(ckpAttributes); |
| } |
| |
| if (nativeKeyInfoArrayRaw != NULL) { |
| (*env)->ReleaseByteArrayElements(env, nativeKeyInfoArray, |
| nativeKeyInfoArrayRaw, 0); |
| } |
| |
| if (nativeKeyInfoWrappedKeyArrayRaw != NULL) { |
| (*env)->ReleaseByteArrayElements(env, nativeKeyInfoWrappedKeyArray, |
| nativeKeyInfoWrappedKeyArrayRaw, 0); |
| } |
| |
| if (nativeKeyInfoArray != NULL && returnValue != nativeKeyInfoArray) { |
| (*env)->DeleteLocalRef(env, nativeKeyInfoArray); |
| } |
| |
| if (nativeKeyInfoWrappedKeyArray != NULL |
| && returnValue != nativeKeyInfoWrappedKeyArray) { |
| (*env)->DeleteLocalRef(env, nativeKeyInfoWrappedKeyArray); |
| } |
| freeCKMechanismPtr(ckpMechanism); |
| |
| return returnValue; |
| } |
| #endif |
| |
| #ifdef P11_ENABLE_CREATENATIVEKEY |
| /* |
| * Class: sun_security_pkcs11_wrapper_PKCS11 |
| * Method: createNativeKey |
| * Signature: (J[BJLsun/security/pkcs11/wrapper/CK_MECHANISM;)J |
| * Parametermapping: *PKCS11* |
| * @param jlong jSessionHandle CK_SESSION_HANDLE hSession |
| * @param jbyteArray jNativeKeyInfo - |
| * @param jlong jWrappingKeyHandle CK_OBJECT_HANDLE hObject |
| * @param jobject jWrappingMech CK_MECHANISM_PTR pMechanism |
| * @return jlong jKeyHandle CK_OBJECT_HANDLE hObject |
| */ |
| JNIEXPORT jlong JNICALL |
| Java_sun_security_pkcs11_wrapper_PKCS11_createNativeKey |
| (JNIEnv *env, jobject obj, jlong jSessionHandle, jbyteArray jNativeKeyInfo, |
| jlong jWrappingKeyHandle, jobject jWrappingMech) |
| { |
| CK_OBJECT_HANDLE ckObjectHandle; |
| CK_RV rv; |
| CK_SESSION_HANDLE ckSessionHandle = jLongToCKULong(jSessionHandle); |
| jbyte* nativeKeyInfoArrayRaw = NULL; |
| jlong jObjectHandle = 0L; |
| unsigned long totalCkAttributesSize = 0UL; |
| unsigned long nativeKeyInfoCkAttributesCount = 0UL; |
| jbyte* nativeKeyInfoArrayRawCkAttributes = NULL; |
| jbyte* nativeKeyInfoArrayRawCkAttributesPtr = NULL; |
| jbyte* nativeKeyInfoArrayRawDataPtr = NULL; |
| unsigned long totalDataSize = 0UL; |
| jbyte* wrappedKeySizePtr = NULL; |
| unsigned int i = 0U; |
| CK_MECHANISM_PTR ckpMechanism = NULL; |
| char iv[16] = {0x0}; |
| CK_ULONG ckWrappedKeyLength = 0UL; |
| CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj); |
| |
| if (ckpFunctions == NULL) { goto cleanup; } |
| |
| nativeKeyInfoArrayRaw = |
| (*env)->GetByteArrayElements(env, jNativeKeyInfo, NULL); |
| if (nativeKeyInfoArrayRaw == NULL) { |
| goto cleanup; |
| } |
| |
| memcpy(&totalCkAttributesSize, nativeKeyInfoArrayRaw, sizeof(unsigned long)); |
| TRACE1("DEBUG: createNativeKey totalCkAttributesSize = %lu\n", totalCkAttributesSize); |
| nativeKeyInfoCkAttributesCount = totalCkAttributesSize/sizeof(CK_ATTRIBUTE); |
| TRACE1("DEBUG: createNativeKey nativeKeyInfoCkAttributesCount = %lu\n", nativeKeyInfoCkAttributesCount); |
| |
| nativeKeyInfoArrayRawCkAttributes = nativeKeyInfoArrayRaw + |
| sizeof(unsigned long); |
| nativeKeyInfoArrayRawCkAttributesPtr = nativeKeyInfoArrayRawCkAttributes; |
| nativeKeyInfoArrayRawDataPtr = nativeKeyInfoArrayRaw + |
| totalCkAttributesSize + sizeof(unsigned long) * 2; |
| memcpy(&totalDataSize, (nativeKeyInfoArrayRaw + totalCkAttributesSize + sizeof(unsigned long)), |
| sizeof(unsigned long)); |
| TRACE1("DEBUG: createNativeKey totalDataSize = %lu\n", totalDataSize); |
| |
| wrappedKeySizePtr = nativeKeyInfoArrayRaw + |
| sizeof(unsigned long)*2 + totalCkAttributesSize + totalDataSize; |
| |
| memcpy(&ckWrappedKeyLength, wrappedKeySizePtr, sizeof(unsigned long)); |
| TRACE1("DEBUG: createNativeKey wrappedKeyLength = %lu\n", ckWrappedKeyLength); |
| |
| for (i = 0; i < nativeKeyInfoCkAttributesCount; i++) { |
| if ((*(CK_ATTRIBUTE_PTR)nativeKeyInfoArrayRawCkAttributesPtr).ulValueLen |
| > 0) { |
| (*(CK_ATTRIBUTE_PTR)nativeKeyInfoArrayRawCkAttributesPtr).pValue = |
| nativeKeyInfoArrayRawDataPtr; |
| } |
| nativeKeyInfoArrayRawDataPtr += |
| (*(CK_ATTRIBUTE_PTR)nativeKeyInfoArrayRawCkAttributesPtr).ulValueLen; |
| nativeKeyInfoArrayRawCkAttributesPtr += sizeof(CK_ATTRIBUTE); |
| } |
| |
| if (ckWrappedKeyLength == 0) { |
| // Not a wrapped key |
| rv = (*ckpFunctions->C_CreateObject)(ckSessionHandle, |
| (CK_ATTRIBUTE_PTR)nativeKeyInfoArrayRawCkAttributes, |
| jLongToCKULong(nativeKeyInfoCkAttributesCount), &ckObjectHandle); |
| } else { |
| // Wrapped key |
| ckpMechanism = jMechanismToCKMechanismPtr(env, jWrappingMech); |
| rv = (*ckpFunctions->C_UnwrapKey)(ckSessionHandle, ckpMechanism, |
| jLongToCKULong(jWrappingKeyHandle), |
| (CK_BYTE_PTR)(wrappedKeySizePtr + sizeof(unsigned long)), |
| ckWrappedKeyLength, |
| (CK_ATTRIBUTE_PTR)nativeKeyInfoArrayRawCkAttributes, |
| jLongToCKULong(nativeKeyInfoCkAttributesCount), |
| &ckObjectHandle); |
| } |
| if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) { |
| goto cleanup; |
| } |
| |
| jObjectHandle = ckULongToJLong(ckObjectHandle); |
| |
| cleanup: |
| |
| if (nativeKeyInfoArrayRaw != NULL) { |
| (*env)->ReleaseByteArrayElements(env, jNativeKeyInfo, |
| nativeKeyInfoArrayRaw, JNI_ABORT); |
| } |
| |
| freeCKMechanismPtr(ckpMechanism); |
| return jObjectHandle; |
| } |
| #endif |
| |
| #ifdef P11_ENABLE_C_GENERATEKEY |
| /* |
| * Class: sun_security_pkcs11_wrapper_PKCS11 |
| * Method: C_GenerateKey |
| * Signature: (JLsun/security/pkcs11/wrapper/CK_MECHANISM;[Lsun/security/pkcs11/wrapper/CK_ATTRIBUTE;)J |
| * Parametermapping: *PKCS11* |
| * @param jlong jSessionHandle CK_SESSION_HANDLE hSession |
| * @param jobject jMechanism CK_MECHANISM_PTR pMechanism |
| * @param jobjectArray jTemplate CK_ATTRIBUTE_PTR pTemplate |
| * CK_ULONG ulCount |
| * @return jlong jKeyHandle CK_OBJECT_HANDLE_PTR phKey |
| */ |
| JNIEXPORT jlong JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1GenerateKey |
| (JNIEnv *env, jobject obj, jlong jSessionHandle, jobject jMechanism, jobjectArray jTemplate) |
| { |
| CK_SESSION_HANDLE ckSessionHandle; |
| CK_MECHANISM_PTR ckpMechanism = NULL; |
| CK_ATTRIBUTE_PTR ckpAttributes = NULL_PTR; |
| CK_ULONG ckAttributesLength = 0; |
| CK_OBJECT_HANDLE ckKeyHandle = 0; |
| jlong jKeyHandle = 0L; |
| CK_RV rv; |
| |
| CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj); |
| if (ckpFunctions == NULL) { return 0L; } |
| |
| ckSessionHandle = jLongToCKULong(jSessionHandle); |
| ckpMechanism = jMechanismToCKMechanismPtr(env, jMechanism); |
| if ((*env)->ExceptionCheck(env)) { return 0L ; } |
| |
| jAttributeArrayToCKAttributeArray(env, jTemplate, &ckpAttributes, &ckAttributesLength); |
| if ((*env)->ExceptionCheck(env)) { |
| goto cleanup; |
| } |
| |
| rv = (*ckpFunctions->C_GenerateKey)(ckSessionHandle, ckpMechanism, ckpAttributes, ckAttributesLength, &ckKeyHandle); |
| |
| if (ckAssertReturnValueOK(env, rv) == CK_ASSERT_OK) { |
| jKeyHandle = ckULongToJLong(ckKeyHandle); |
| |
| /* cheack, if we must give a initialization vector back to Java */ |
| switch (ckpMechanism->mechanism) { |
| case CKM_PBE_MD2_DES_CBC: |
| case CKM_PBE_MD5_DES_CBC: |
| case CKM_PBE_MD5_CAST_CBC: |
| case CKM_PBE_MD5_CAST3_CBC: |
| case CKM_PBE_MD5_CAST128_CBC: |
| /* case CKM_PBE_MD5_CAST5_CBC: the same as CKM_PBE_MD5_CAST128_CBC */ |
| case CKM_PBE_SHA1_CAST128_CBC: |
| /* case CKM_PBE_SHA1_CAST5_CBC: the same as CKM_PBE_SHA1_CAST128_CBC */ |
| /* we must copy back the initialization vector to the jMechanism object */ |
| copyBackPBEInitializationVector(env, ckpMechanism, jMechanism); |
| break; |
| } |
| } |
| cleanup: |
| freeCKMechanismPtr(ckpMechanism); |
| freeCKAttributeArray(ckpAttributes, ckAttributesLength); |
| |
| return jKeyHandle ; |
| } |
| #endif |
| |
| #ifdef P11_ENABLE_C_GENERATEKEYPAIR |
| /* |
| * Class: sun_security_pkcs11_wrapper_PKCS11 |
| * Method: C_GenerateKeyPair |
| * Signature: (JLsun/security/pkcs11/wrapper/CK_MECHANISM;[Lsun/security/pkcs11/wrapper/CK_ATTRIBUTE;[Lsun/security/pkcs11/wrapper/CK_ATTRIBUTE;)[J |
| * Parametermapping: *PKCS11* |
| * @param jlong jSessionHandle CK_SESSION_HANDLE hSession |
| * @param jobject jMechanism CK_MECHANISM_PTR pMechanism |
| * @param jobjectArray jPublicKeyTemplate CK_ATTRIBUTE_PTR pPublicKeyTemplate |
| * CK_ULONG ulPublicKeyAttributeCount |
| * @param jobjectArray jPrivateKeyTemplate CK_ATTRIBUTE_PTR pPrivateKeyTemplate |
| * CK_ULONG ulPrivateKeyAttributeCount |
| * @return jlongArray jKeyHandles CK_OBJECT_HANDLE_PTR phPublicKey |
| * CK_OBJECT_HANDLE_PTR phPublicKey |
| */ |
| JNIEXPORT jlongArray JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1GenerateKeyPair |
| (JNIEnv *env, jobject obj, jlong jSessionHandle, jobject jMechanism, |
| jobjectArray jPublicKeyTemplate, jobjectArray jPrivateKeyTemplate) |
| { |
| CK_SESSION_HANDLE ckSessionHandle; |
| CK_MECHANISM_PTR ckpMechanism = NULL; |
| CK_ATTRIBUTE_PTR ckpPublicKeyAttributes = NULL_PTR; |
| CK_ATTRIBUTE_PTR ckpPrivateKeyAttributes = NULL_PTR; |
| CK_ULONG ckPublicKeyAttributesLength = 0; |
| CK_ULONG ckPrivateKeyAttributesLength = 0; |
| CK_OBJECT_HANDLE_PTR ckpPublicKeyHandle; /* pointer to Public Key */ |
| CK_OBJECT_HANDLE_PTR ckpPrivateKeyHandle; /* pointer to Private Key */ |
| CK_OBJECT_HANDLE_PTR ckpKeyHandles = NULL; /* pointer to array with Public and Private Key */ |
| jlongArray jKeyHandles = NULL; |
| CK_RV rv; |
| int attempts; |
| const int MAX_ATTEMPTS = 3; |
| |
| CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj); |
| if (ckpFunctions == NULL) { return NULL; } |
| |
| ckSessionHandle = jLongToCKULong(jSessionHandle); |
| ckpMechanism = jMechanismToCKMechanismPtr(env, jMechanism); |
| if ((*env)->ExceptionCheck(env)) { return NULL; } |
| |
| ckpKeyHandles = (CK_OBJECT_HANDLE_PTR) malloc(2 * sizeof(CK_OBJECT_HANDLE)); |
| if (ckpKeyHandles == NULL) { |
| throwOutOfMemoryError(env, 0); |
| goto cleanup; |
| } |
| ckpPublicKeyHandle = ckpKeyHandles; /* first element of array is Public Key */ |
| ckpPrivateKeyHandle = (ckpKeyHandles + 1); /* second element of array is Private Key */ |
| |
| jAttributeArrayToCKAttributeArray(env, jPublicKeyTemplate, &ckpPublicKeyAttributes, &ckPublicKeyAttributesLength); |
| if ((*env)->ExceptionCheck(env)) { |
| goto cleanup; |
| } |
| |
| jAttributeArrayToCKAttributeArray(env, jPrivateKeyTemplate, &ckpPrivateKeyAttributes, &ckPrivateKeyAttributesLength); |
| if ((*env)->ExceptionCheck(env)) { |
| goto cleanup; |
| } |
| |
| /* |
| * Workaround for NSS bug 1012786: |
| * |
| * Key generation may fail with CKR_FUNCTION_FAILED error |
| * if there is insufficient entropy to generate a random key. |
| * |
| * PKCS11 spec says the following about CKR_FUNCTION_FAILED error |
| * (see section 11.1.1): |
| * |
| * ... In any event, although the function call failed, the situation |
| * is not necessarily totally hopeless, as it is likely to be |
| * when CKR_GENERAL_ERROR is returned. Depending on what the root cause of |
| * the error actually was, it is possible that an attempt |
| * to make the exact same function call again would succeed. |
| * |
| * Call C_GenerateKeyPair() several times if CKR_FUNCTION_FAILED occurs. |
| */ |
| for (attempts = 0; attempts < MAX_ATTEMPTS; attempts++) { |
| rv = (*ckpFunctions->C_GenerateKeyPair)(ckSessionHandle, ckpMechanism, |
| ckpPublicKeyAttributes, ckPublicKeyAttributesLength, |
| ckpPrivateKeyAttributes, ckPrivateKeyAttributesLength, |
| ckpPublicKeyHandle, ckpPrivateKeyHandle); |
| if (rv == CKR_FUNCTION_FAILED) { |
| printDebug("C_1GenerateKeyPair(): C_GenerateKeyPair() failed \ |
| with CKR_FUNCTION_FAILED error, try again\n"); |
| } else { |
| break; |
| } |
| } |
| |
| if (ckAssertReturnValueOK(env, rv) == CK_ASSERT_OK) { |
| jKeyHandles = ckULongArrayToJLongArray(env, ckpKeyHandles, 2); |
| } |
| |
| cleanup: |
| freeCKMechanismPtr(ckpMechanism); |
| free(ckpKeyHandles); |
| freeCKAttributeArray(ckpPublicKeyAttributes, ckPublicKeyAttributesLength); |
| freeCKAttributeArray(ckpPrivateKeyAttributes, ckPrivateKeyAttributesLength); |
| return jKeyHandles ; |
| } |
| #endif |
| |
| #ifdef P11_ENABLE_C_WRAPKEY |
| /* |
| * Class: sun_security_pkcs11_wrapper_PKCS11 |
| * Method: C_WrapKey |
| * Signature: (JLsun/security/pkcs11/wrapper/CK_MECHANISM;JJ)[B |
| * Parametermapping: *PKCS11* |
| * @param jlong jSessionHandle CK_SESSION_HANDLE hSession |
| * @param jobject jMechanism CK_MECHANISM_PTR pMechanism |
| * @param jlong jWrappingKeyHandle CK_OBJECT_HANDLE hWrappingKey |
| * @param jlong jKeyHandle CK_OBJECT_HANDLE hKey |
| * @return jbyteArray jWrappedKey CK_BYTE_PTR pWrappedKey |
| * CK_ULONG_PTR pulWrappedKeyLen |
| */ |
| JNIEXPORT jbyteArray JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1WrapKey |
| (JNIEnv *env, jobject obj, jlong jSessionHandle, jobject jMechanism, jlong jWrappingKeyHandle, jlong jKeyHandle) |
| { |
| CK_SESSION_HANDLE ckSessionHandle; |
| CK_MECHANISM_PTR ckpMechanism = NULL; |
| CK_OBJECT_HANDLE ckWrappingKeyHandle; |
| CK_OBJECT_HANDLE ckKeyHandle; |
| jbyteArray jWrappedKey = NULL; |
| CK_RV rv; |
| CK_BYTE BUF[MAX_STACK_BUFFER_LEN]; |
| CK_BYTE_PTR ckpWrappedKey = BUF; |
| CK_ULONG ckWrappedKeyLength = MAX_STACK_BUFFER_LEN; |
| |
| CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj); |
| if (ckpFunctions == NULL) { return NULL; } |
| |
| ckSessionHandle = jLongToCKULong(jSessionHandle); |
| ckpMechanism = jMechanismToCKMechanismPtr(env, jMechanism); |
| if ((*env)->ExceptionCheck(env)) { return NULL; } |
| |
| ckWrappingKeyHandle = jLongToCKULong(jWrappingKeyHandle); |
| ckKeyHandle = jLongToCKULong(jKeyHandle); |
| |
| rv = (*ckpFunctions->C_WrapKey)(ckSessionHandle, ckpMechanism, ckWrappingKeyHandle, ckKeyHandle, ckpWrappedKey, &ckWrappedKeyLength); |
| if (rv == CKR_BUFFER_TOO_SMALL) { |
| ckpWrappedKey = (CK_BYTE_PTR) malloc(ckWrappedKeyLength); |
| if (ckpWrappedKey == NULL) { |
| throwOutOfMemoryError(env, 0); |
| goto cleanup; |
| } |
| |
| rv = (*ckpFunctions->C_WrapKey)(ckSessionHandle, ckpMechanism, ckWrappingKeyHandle, ckKeyHandle, ckpWrappedKey, &ckWrappedKeyLength); |
| } |
| if (ckAssertReturnValueOK(env, rv) == CK_ASSERT_OK) { |
| jWrappedKey = ckByteArrayToJByteArray(env, ckpWrappedKey, ckWrappedKeyLength); |
| } |
| |
| cleanup: |
| if (ckpWrappedKey != BUF) { free(ckpWrappedKey); } |
| freeCKMechanismPtr(ckpMechanism); |
| |
| return jWrappedKey ; |
| } |
| #endif |
| |
| #ifdef P11_ENABLE_C_UNWRAPKEY |
| /* |
| * Class: sun_security_pkcs11_wrapper_PKCS11 |
| * Method: C_UnwrapKey |
| * Signature: (JLsun/security/pkcs11/wrapper/CK_MECHANISM;J[B[Lsun/security/pkcs11/wrapper/CK_ATTRIBUTE;)J |
| * Parametermapping: *PKCS11* |
| * @param jlong jSessionHandle CK_SESSION_HANDLE hSession |
| * @param jobject jMechanism CK_MECHANISM_PTR pMechanism |
| * @param jlong jUnwrappingKeyHandle CK_OBJECT_HANDLE hUnwrappingKey |
| * @param jbyteArray jWrappedKey CK_BYTE_PTR pWrappedKey |
| * CK_ULONG_PTR pulWrappedKeyLen |
| * @param jobjectArray jTemplate CK_ATTRIBUTE_PTR pTemplate |
| * CK_ULONG ulCount |
| * @return jlong jKeyHandle CK_OBJECT_HANDLE_PTR phKey |
| */ |
| JNIEXPORT jlong JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1UnwrapKey |
| (JNIEnv *env, jobject obj, jlong jSessionHandle, jobject jMechanism, jlong jUnwrappingKeyHandle, |
| jbyteArray jWrappedKey, jobjectArray jTemplate) |
| { |
| CK_SESSION_HANDLE ckSessionHandle; |
| CK_MECHANISM_PTR ckpMechanism = NULL; |
| CK_OBJECT_HANDLE ckUnwrappingKeyHandle; |
| CK_BYTE_PTR ckpWrappedKey = NULL_PTR; |
| CK_ULONG ckWrappedKeyLength; |
| CK_ATTRIBUTE_PTR ckpAttributes = NULL_PTR; |
| CK_ULONG ckAttributesLength = 0; |
| CK_OBJECT_HANDLE ckKeyHandle = 0; |
| jlong jKeyHandle = 0L; |
| CK_RV rv; |
| |
| CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj); |
| if (ckpFunctions == NULL) { return 0L; } |
| |
| ckSessionHandle = jLongToCKULong(jSessionHandle); |
| ckpMechanism = jMechanismToCKMechanismPtr(env, jMechanism); |
| if ((*env)->ExceptionCheck(env)) { return 0L; } |
| |
| ckUnwrappingKeyHandle = jLongToCKULong(jUnwrappingKeyHandle); |
| jByteArrayToCKByteArray(env, jWrappedKey, &ckpWrappedKey, &ckWrappedKeyLength); |
| if ((*env)->ExceptionCheck(env)) { |
| goto cleanup; |
| } |
| |
| jAttributeArrayToCKAttributeArray(env, jTemplate, &ckpAttributes, &ckAttributesLength); |
| if ((*env)->ExceptionCheck(env)) { |
| goto cleanup; |
| } |
| |
| |
| rv = (*ckpFunctions->C_UnwrapKey)(ckSessionHandle, ckpMechanism, ckUnwrappingKeyHandle, |
| ckpWrappedKey, ckWrappedKeyLength, |
| ckpAttributes, ckAttributesLength, &ckKeyHandle); |
| |
| if (ckAssertReturnValueOK(env, rv) == CK_ASSERT_OK) { |
| jKeyHandle = ckLongToJLong(ckKeyHandle); |
| |
| #if 0 |
| /* cheack, if we must give a initialization vector back to Java */ |
| if (ckpMechanism->mechanism == CKM_KEY_WRAP_SET_OAEP) { |
| /* we must copy back the unwrapped key info to the jMechanism object */ |
| copyBackSetUnwrappedKey(env, ckpMechanism, jMechanism); |
| } |
| #endif |
| } |
| cleanup: |
| freeCKMechanismPtr(ckpMechanism); |
| freeCKAttributeArray(ckpAttributes, ckAttributesLength); |
| free(ckpWrappedKey); |
| |
| return jKeyHandle ; |
| } |
| #endif |
| |
| #ifdef P11_ENABLE_C_DERIVEKEY |
| |
| static void freeMasterKeyDeriveParams(CK_SSL3_RANDOM_DATA *RandomInfo, CK_VERSION_PTR pVersion) { |
| if (RandomInfo->pClientRandom != NULL) { |
| free(RandomInfo->pClientRandom); |
| } |
| if (RandomInfo->pServerRandom != NULL) { |
| free(RandomInfo->pServerRandom); |
| } |
| if (pVersion != NULL) { |
| free(pVersion); |
| } |
| } |
| |
| void ssl3FreeMasterKeyDeriveParams(CK_MECHANISM_PTR ckpMechanism) { |
| CK_SSL3_MASTER_KEY_DERIVE_PARAMS *params = |
| (CK_SSL3_MASTER_KEY_DERIVE_PARAMS *) ckpMechanism->pParameter; |
| if (params == NULL) { |
| return; |
| } |
| freeMasterKeyDeriveParams(&(params->RandomInfo), params->pVersion); |
| } |
| |
| void tls12FreeMasterKeyDeriveParams(CK_MECHANISM_PTR ckpMechanism) { |
| CK_TLS12_MASTER_KEY_DERIVE_PARAMS *params = |
| (CK_TLS12_MASTER_KEY_DERIVE_PARAMS *)ckpMechanism->pParameter; |
| if (params == NULL) { |
| return; |
| } |
| freeMasterKeyDeriveParams(&(params->RandomInfo), params->pVersion); |
| } |
| |
| void freeEcdh1DeriveParams(CK_MECHANISM_PTR ckpMechanism) { |
| CK_ECDH1_DERIVE_PARAMS *params = |
| (CK_ECDH1_DERIVE_PARAMS *)ckpMechanism->pParameter; |
| if (params == NULL) { |
| return; |
| } |
| |
| if (params->pSharedData != NULL) { |
| free(params->pSharedData); |
| } |
| if (params->pPublicData != NULL) { |
| free(params->pPublicData); |
| } |
| } |
| |
| /* |
| * Copy back the PRF output to Java. |
| */ |
| void copyBackTLSPrfParams(JNIEnv *env, CK_MECHANISM_PTR ckpMechanism, jobject jMechanism) |
| { |
| jclass jMechanismClass, jTLSPrfParamsClass; |
| CK_TLS_PRF_PARAMS *ckTLSPrfParams; |
| jobject jTLSPrfParams; |
| jfieldID fieldID; |
| CK_MECHANISM_TYPE ckMechanismType; |
| jlong jMechanismType; |
| CK_BYTE_PTR output; |
| jobject jOutput; |
| jint jLength; |
| jbyte* jBytes; |
| int i; |
| |
| /* get mechanism */ |
| jMechanismClass = (*env)->FindClass(env, CLASS_MECHANISM); |
| if (jMechanismClass == NULL) { return; } |
| fieldID = (*env)->GetFieldID(env, jMechanismClass, "mechanism", "J"); |
| if (fieldID == NULL) { return; } |
| jMechanismType = (*env)->GetLongField(env, jMechanism, fieldID); |
| ckMechanismType = jLongToCKULong(jMechanismType); |
| if (ckMechanismType != ckpMechanism->mechanism) { |
| /* we do not have maching types, this should not occur */ |
| return; |
| } |
| |
| /* get the native CK_TLS_PRF_PARAMS */ |
| ckTLSPrfParams = (CK_TLS_PRF_PARAMS *) ckpMechanism->pParameter; |
| if (ckTLSPrfParams != NULL_PTR) { |
| /* get the Java CK_TLS_PRF_PARAMS object (pParameter) */ |
| fieldID = (*env)->GetFieldID(env, jMechanismClass, "pParameter", "Ljava/lang/Object;"); |
| if (fieldID == NULL) { return; } |
| jTLSPrfParams = (*env)->GetObjectField(env, jMechanism, fieldID); |
| |
| /* copy back the client IV */ |
| jTLSPrfParamsClass = (*env)->FindClass(env, CLASS_TLS_PRF_PARAMS); |
| if (jTLSPrfParamsClass == NULL) { return; } |
| fieldID = (*env)->GetFieldID(env, jTLSPrfParamsClass, "pOutput", "[B"); |
| if (fieldID == NULL) { return; } |
| jOutput = (*env)->GetObjectField(env, jTLSPrfParams, fieldID); |
| output = ckTLSPrfParams->pOutput; |
| |
| // Note: we assume that the token returned exactly as many bytes as we |
| // requested. Anything else would not make sense. |
| if (jOutput != NULL) { |
| jLength = (*env)->GetArrayLength(env, jOutput); |
| jBytes = (*env)->GetByteArrayElements(env, jOutput, NULL); |
| if (jBytes == NULL) { return; } |
| |
| /* copy the bytes to the Java buffer */ |
| for (i=0; i < jLength; i++) { |
| jBytes[i] = ckByteToJByte(output[i]); |
| } |
| /* copy back the Java buffer to the object */ |
| (*env)->ReleaseByteArrayElements(env, jOutput, jBytes, 0); |
| } |
| |
| // free malloc'd data |
| free(ckTLSPrfParams->pSeed); |
| free(ckTLSPrfParams->pLabel); |
| free(ckTLSPrfParams->pulOutputLen); |
| free(ckTLSPrfParams->pOutput); |
| } |
| } |
| |
| /* |
| * Class: sun_security_pkcs11_wrapper_PKCS11 |
| * Method: C_DeriveKey |
| * Signature: (JLsun/security/pkcs11/wrapper/CK_MECHANISM;J[Lsun/security/pkcs11/wrapper/CK_ATTRIBUTE;)J |
| * Parametermapping: *PKCS11* |
| * @param jlong jSessionHandle CK_SESSION_HANDLE hSession |
| * @param jobject jMechanism CK_MECHANISM_PTR pMechanism |
| * @param jlong jBaseKeyHandle CK_OBJECT_HANDLE hBaseKey |
| * @param jobjectArray jTemplate CK_ATTRIBUTE_PTR pTemplate |
| * CK_ULONG ulCount |
| * @return jlong jKeyHandle CK_OBJECT_HANDLE_PTR phKey |
| */ |
| JNIEXPORT jlong JNICALL Java_sun_security_pkcs11_wrapper_PKCS11_C_1DeriveKey |
| (JNIEnv *env, jobject obj, jlong jSessionHandle, jobject jMechanism, jlong jBaseKeyHandle, jobjectArray jTemplate) |
| { |
| CK_SESSION_HANDLE ckSessionHandle; |
| CK_MECHANISM_PTR ckpMechanism = NULL; |
| CK_OBJECT_HANDLE ckBaseKeyHandle; |
| CK_ATTRIBUTE_PTR ckpAttributes = NULL_PTR; |
| CK_ULONG ckAttributesLength = 0; |
| CK_OBJECT_HANDLE ckKeyHandle = 0; |
| jlong jKeyHandle = 0L; |
| CK_RV rv; |
| CK_OBJECT_HANDLE_PTR phKey = &ckKeyHandle; |
| |
| CK_FUNCTION_LIST_PTR ckpFunctions = getFunctionList(env, obj); |
| if (ckpFunctions == NULL) { return 0L; } |
| |
| ckSessionHandle = jLongToCKULong(jSessionHandle); |
| ckpMechanism = jMechanismToCKMechanismPtr(env, jMechanism); |
| if ((*env)->ExceptionCheck(env)) { return 0L; } |
| |
| ckBaseKeyHandle = jLongToCKULong(jBaseKeyHandle); |
| jAttributeArrayToCKAttributeArray(env, jTemplate, &ckpAttributes, &ckAttributesLength); |
| if ((*env)->ExceptionCheck(env)) { |
| goto cleanup; |
| } |
| |
| switch (ckpMechanism->mechanism) { |
| case CKM_SSL3_KEY_AND_MAC_DERIVE: |
| case CKM_TLS_KEY_AND_MAC_DERIVE: |
| case CKM_TLS12_KEY_AND_MAC_DERIVE: |
| case CKM_TLS_PRF: |
| // these mechanism do not return a key handle via phKey |
| // set to NULL in case pedantic implementations check for it |
| phKey = NULL; |
| break; |
| default: |
| // empty |
| break; |
| } |
| |
| rv = (*ckpFunctions->C_DeriveKey)(ckSessionHandle, ckpMechanism, ckBaseKeyHandle, |
| ckpAttributes, ckAttributesLength, phKey); |
| |
| jKeyHandle = ckLongToJLong(ckKeyHandle); |
| |
| switch (ckpMechanism->mechanism) { |
| case CKM_SSL3_MASTER_KEY_DERIVE: |
| case CKM_TLS_MASTER_KEY_DERIVE: |
| /* we must copy back the client version */ |
| ssl3CopyBackClientVersion(env, ckpMechanism, jMechanism); |
| ssl3FreeMasterKeyDeriveParams(ckpMechanism); |
| break; |
| case CKM_TLS12_MASTER_KEY_DERIVE: |
| tls12CopyBackClientVersion(env, ckpMechanism, jMechanism); |
| tls12FreeMasterKeyDeriveParams(ckpMechanism); |
| break; |
| case CKM_SSL3_MASTER_KEY_DERIVE_DH: |
| case CKM_TLS_MASTER_KEY_DERIVE_DH: |
| ssl3FreeMasterKeyDeriveParams(ckpMechanism); |
| break; |
| case CKM_TLS12_MASTER_KEY_DERIVE_DH: |
| tls12FreeMasterKeyDeriveParams(ckpMechanism); |
| break; |
| case CKM_SSL3_KEY_AND_MAC_DERIVE: |
| case CKM_TLS_KEY_AND_MAC_DERIVE: |
| /* we must copy back the unwrapped key info to the jMechanism object */ |
| ssl3CopyBackKeyMatParams(env, ckpMechanism, jMechanism); |
| break; |
| case CKM_TLS12_KEY_AND_MAC_DERIVE: |
| /* we must copy back the unwrapped key info to the jMechanism object */ |
| tls12CopyBackKeyMatParams(env, ckpMechanism, jMechanism); |
| break; |
| case CKM_TLS_PRF: |
| copyBackTLSPrfParams(env, ckpMechanism, jMechanism); |
| break; |
| case CKM_ECDH1_DERIVE: |
| freeEcdh1DeriveParams(ckpMechanism); |
| break; |
| default: |
| // empty |
| break; |
| } |
| if (ckAssertReturnValueOK(env, rv) != CK_ASSERT_OK) { |
| jKeyHandle =0L; |
| } |
| |
| cleanup: |
| freeCKMechanismPtr(ckpMechanism); |
| freeCKAttributeArray(ckpAttributes, ckAttributesLength); |
| |
| return jKeyHandle ; |
| } |
| |
| static void copyBackClientVersion(JNIEnv *env, CK_MECHANISM_PTR ckpMechanism, jobject jMechanism, |
| CK_VERSION *ckVersion, const char *class_master_key_derive_params) |
| { |
| jclass jMasterKeyDeriveParamsClass, jMechanismClass, jVersionClass; |
| jobject jMasterKeyDeriveParams; |
| jfieldID fieldID; |
| CK_MECHANISM_TYPE ckMechanismType; |
| jlong jMechanismType; |
| jobject jVersion; |
| |
| /* get mechanism */ |
| jMechanismClass = (*env)->FindClass(env, CLASS_MECHANISM); |
| if (jMechanismClass == NULL) { return; } |
| fieldID = (*env)->GetFieldID(env, jMechanismClass, "mechanism", "J"); |
| if (fieldID == NULL) { return; } |
| jMechanismType = (*env)->GetLongField(env, jMechanism, fieldID); |
| ckMechanismType = jLongToCKULong(jMechanismType); |
| if (ckMechanismType != ckpMechanism->mechanism) { |
| /* we do not have maching types, this should not occur */ |
| return; |
| } |
| |
| if (ckVersion != NULL_PTR) { |
| /* get the Java CK_SSL3_MASTER_KEY_DERIVE_PARAMS (pParameter) */ |
| fieldID = (*env)->GetFieldID(env, jMechanismClass, "pParameter", "Ljava/lang/Object;"); |
| if (fieldID == NULL) { return; } |
| |
| jMasterKeyDeriveParams = (*env)->GetObjectField(env, jMechanism, fieldID); |
| |
| /* get the Java CK_VERSION */ |
| jMasterKeyDeriveParamsClass = (*env)->FindClass(env, class_master_key_derive_params); |
| if (jMasterKeyDeriveParamsClass == NULL) { return; } |
| fieldID = (*env)->GetFieldID(env, jMasterKeyDeriveParamsClass, |
| "pVersion", "L"CLASS_VERSION";"); |
| if (fieldID == NULL) { return; } |
| jVersion = (*env)->GetObjectField(env, jMasterKeyDeriveParams, fieldID); |
| |
| /* now copy back the version from the native structure to the Java structure */ |
| |
| /* copy back the major version */ |
| jVersionClass = (*env)->FindClass(env, CLASS_VERSION); |
| if (jVersionClass == NULL) { return; } |
| fieldID = (*env)->GetFieldID(env, jVersionClass, "major", "B"); |
| if (fieldID == NULL) { return; } |
| (*env)->SetByteField(env, jVersion, fieldID, ckByteToJByte(ckVersion->major)); |
| |
| /* copy back the minor version */ |
| fieldID = (*env)->GetFieldID(env, jVersionClass, "minor", "B"); |
| if (fieldID == NULL) { return; } |
| (*env)->SetByteField(env, jVersion, fieldID, ckByteToJByte(ckVersion->minor)); |
| } |
| } |
| |
| /* |
| * Copy back the client version information from the native |
| * structure to the Java object. This is only used for |
| * CKM_SSL3_MASTER_KEY_DERIVE and CKM_TLS_MASTER_KEY_DERIVE |
| * mechanisms when used for deriving a key. |
| * |
| */ |
| void ssl3CopyBackClientVersion(JNIEnv *env, CK_MECHANISM_PTR ckpMechanism, |
| jobject jMechanism) |
| { |
| CK_SSL3_MASTER_KEY_DERIVE_PARAMS *ckSSL3MasterKeyDeriveParams; |
| ckSSL3MasterKeyDeriveParams = |
| (CK_SSL3_MASTER_KEY_DERIVE_PARAMS *)ckpMechanism->pParameter; |
| if (ckSSL3MasterKeyDeriveParams != NULL_PTR) { |
| copyBackClientVersion(env, ckpMechanism, jMechanism, |
| ckSSL3MasterKeyDeriveParams->pVersion, |
| CLASS_SSL3_MASTER_KEY_DERIVE_PARAMS); |
| } |
| } |
| |
| /* |
| * Copy back the client version information from the native |
| * structure to the Java object. This is only used for |
| * CKM_TLS12_MASTER_KEY_DERIVE mechanism when used for deriving a key. |
| * |
| */ |
| void tls12CopyBackClientVersion(JNIEnv *env, CK_MECHANISM_PTR ckpMechanism, |
| jobject jMechanism) |
| { |
| CK_TLS12_MASTER_KEY_DERIVE_PARAMS *ckTLS12MasterKeyDeriveParams; |
| ckTLS12MasterKeyDeriveParams = |
| (CK_TLS12_MASTER_KEY_DERIVE_PARAMS *)ckpMechanism->pParameter; |
| if (ckTLS12MasterKeyDeriveParams != NULL_PTR) { |
| copyBackClientVersion(env, ckpMechanism, jMechanism, |
| ckTLS12MasterKeyDeriveParams->pVersion, |
| CLASS_TLS12_MASTER_KEY_DERIVE_PARAMS); |
| } |
| } |
| |
| static void copyBackKeyMatParams(JNIEnv *env, CK_MECHANISM_PTR ckpMechanism, |
| jobject jMechanism, CK_SSL3_RANDOM_DATA *RandomInfo, |
| CK_SSL3_KEY_MAT_OUT_PTR ckSSL3KeyMatOut, const char *class_key_mat_params) |
| { |
| jclass jMechanismClass, jKeyMatParamsClass, jSSL3KeyMatOutClass; |
| jfieldID fieldID; |
| CK_MECHANISM_TYPE ckMechanismType; |
| jlong jMechanismType; |
| CK_BYTE_PTR iv; |
| jobject jKeyMatParam; |
| jobject jSSL3KeyMatOut; |
| jobject jIV; |
| jint jLength; |
| jbyte* jBytes; |
| int i; |
| |
| /* get mechanism */ |
| jMechanismClass= (*env)->FindClass(env, CLASS_MECHANISM); |
| if (jMechanismClass == NULL) { return; } |
| fieldID = (*env)->GetFieldID(env, jMechanismClass, "mechanism", "J"); |
| if (fieldID == NULL) { return; } |
| jMechanismType = (*env)->GetLongField(env, jMechanism, fieldID); |
| ckMechanismType = jLongToCKULong(jMechanismType); |
| if (ckMechanismType != ckpMechanism->mechanism) { |
| /* we do not have maching types, this should not occur */ |
| return; |
| } |
| |
| // free malloc'd data |
| if (RandomInfo->pClientRandom != NULL) { |
| free(RandomInfo->pClientRandom); |
| } |
| if (RandomInfo->pServerRandom != NULL) { |
| free(RandomInfo->pServerRandom); |
| } |
| |
| if (ckSSL3KeyMatOut != NULL_PTR) { |
| /* get the Java params object (pParameter) */ |
| fieldID = (*env)->GetFieldID(env, jMechanismClass, "pParameter", |
| "Ljava/lang/Object;"); |
| if (fieldID == NULL) { return; } |
| jKeyMatParam = (*env)->GetObjectField(env, jMechanism, fieldID); |
| |
| /* get the Java CK_SSL3_KEY_MAT_OUT */ |
| jKeyMatParamsClass = (*env)->FindClass(env, class_key_mat_params); |
| if (jKeyMatParamsClass == NULL) { return; } |
| fieldID = (*env)->GetFieldID(env, jKeyMatParamsClass, |
| "pReturnedKeyMaterial", "L"CLASS_SSL3_KEY_MAT_OUT";"); |
| if (fieldID == NULL) { return; } |
| jSSL3KeyMatOut = (*env)->GetObjectField(env, jKeyMatParam, fieldID); |
| |
| /* now copy back all the key handles and the initialization vectors */ |
| /* copy back client MAC secret handle */ |
| jSSL3KeyMatOutClass = (*env)->FindClass(env, CLASS_SSL3_KEY_MAT_OUT); |
| if (jSSL3KeyMatOutClass == NULL) { return; } |
| fieldID = (*env)->GetFieldID(env, jSSL3KeyMatOutClass, |
| "hClientMacSecret", "J"); |
| if (fieldID == NULL) { return; } |
| (*env)->SetLongField(env, jSSL3KeyMatOut, fieldID, |
| ckULongToJLong(ckSSL3KeyMatOut->hClientMacSecret)); |
| |
| /* copy back server MAC secret handle */ |
| fieldID = (*env)->GetFieldID(env, jSSL3KeyMatOutClass, |
| "hServerMacSecret", "J"); |
| if (fieldID == NULL) { return; } |
| (*env)->SetLongField(env, jSSL3KeyMatOut, fieldID, |
| ckULongToJLong(ckSSL3KeyMatOut->hServerMacSecret)); |
| |
| /* copy back client secret key handle */ |
| fieldID = (*env)->GetFieldID(env, jSSL3KeyMatOutClass, "hClientKey", "J"); |
| if (fieldID == NULL) { return; } |
| (*env)->SetLongField(env, jSSL3KeyMatOut, fieldID, |
| ckULongToJLong(ckSSL3KeyMatOut->hClientKey)); |
| |
| /* copy back server secret key handle */ |
| fieldID = (*env)->GetFieldID(env, jSSL3KeyMatOutClass, "hServerKey", "J"); |
| if (fieldID == NULL) { return; } |
| (*env)->SetLongField(env, jSSL3KeyMatOut, fieldID, |
| ckULongToJLong(ckSSL3KeyMatOut->hServerKey)); |
| |
| /* copy back the client IV */ |
| fieldID = (*env)->GetFieldID(env, jSSL3KeyMatOutClass, "pIVClient", "[B"); |
| if (fieldID == NULL) { return; } |
| jIV = (*env)->GetObjectField(env, jSSL3KeyMatOut, fieldID); |
| iv = ckSSL3KeyMatOut->pIVClient; |
| |
| if (jIV != NULL) { |
| jLength = (*env)->GetArrayLength(env, jIV); |
| jBytes = (*env)->GetByteArrayElements(env, jIV, NULL); |
| if (jBytes == NULL) { return; } |
| /* copy the bytes to the Java buffer */ |
| for (i=0; i < jLength; i++) { |
| jBytes[i] = ckByteToJByte(iv[i]); |
| } |
| /* copy back the Java buffer to the object */ |
| (*env)->ReleaseByteArrayElements(env, jIV, jBytes, 0); |
| } |
| // free malloc'd data |
| free(ckSSL3KeyMatOut->pIVClient); |
| |
| /* copy back the server IV */ |
| fieldID = (*env)->GetFieldID(env, jSSL3KeyMatOutClass, "pIVServer", "[B"); |
| if (fieldID == NULL) { return; } |
| jIV = (*env)->GetObjectField(env, jSSL3KeyMatOut, fieldID); |
| iv = ckSSL3KeyMatOut->pIVServer; |
| |
| if (jIV != NULL) { |
| jLength = (*env)->GetArrayLength(env, jIV); |
| jBytes = (*env)->GetByteArrayElements(env, jIV, NULL); |
| if (jBytes == NULL) { return; } |
| /* copy the bytes to the Java buffer */ |
| for (i=0; i < jLength; i++) { |
| jBytes[i] = ckByteToJByte(iv[i]); |
| } |
| /* copy back the Java buffer to the object */ |
| (*env)->ReleaseByteArrayElements(env, jIV, jBytes, 0); |
| } |
| // free malloc'd data |
| free(ckSSL3KeyMatOut->pIVServer); |
| free(ckSSL3KeyMatOut); |
| } |
| } |
| |
| /* |
| * Copy back the derived keys and initialization vectors from the native |
| * structure to the Java object. This is only used for |
| * CKM_SSL3_KEY_AND_MAC_DERIVE and CKM_TLS_KEY_AND_MAC_DERIVE mechanisms |
| * when used for deriving a key. |
| * |
| */ |
| void ssl3CopyBackKeyMatParams(JNIEnv *env, CK_MECHANISM_PTR ckpMechanism, |
| jobject jMechanism) |
| { |
| CK_SSL3_KEY_MAT_PARAMS *ckSSL3KeyMatParam; |
| ckSSL3KeyMatParam = (CK_SSL3_KEY_MAT_PARAMS *)ckpMechanism->pParameter; |
| if (ckSSL3KeyMatParam != NULL_PTR) { |
| copyBackKeyMatParams(env, ckpMechanism, jMechanism, |
| &(ckSSL3KeyMatParam->RandomInfo), |
| ckSSL3KeyMatParam->pReturnedKeyMaterial, |
| CLASS_SSL3_KEY_MAT_PARAMS); |
| } |
| } |
| |
| /* |
| * Copy back the derived keys and initialization vectors from the native |
| * structure to the Java object. This is only used for |
| * CKM_TLS12_KEY_AND_MAC_DERIVE mechanism when used for deriving a key. |
| * |
| */ |
| void tls12CopyBackKeyMatParams(JNIEnv *env, CK_MECHANISM_PTR ckpMechanism, |
| jobject jMechanism) |
| { |
| CK_TLS12_KEY_MAT_PARAMS *ckTLS12KeyMatParam; |
| ckTLS12KeyMatParam = (CK_TLS12_KEY_MAT_PARAMS *)ckpMechanism->pParameter; |
| if (ckTLS12KeyMatParam != NULL_PTR) { |
| copyBackKeyMatParams(env, ckpMechanism, jMechanism, |
| &(ckTLS12KeyMatParam->RandomInfo), |
| ckTLS12KeyMatParam->pReturnedKeyMaterial, |
| CLASS_TLS12_KEY_MAT_PARAMS); |
| } |
| } |
| |
| #endif |