提交 28fc5783 编写于 作者: A andrew

6946830: javax.crypto.Cipher.doFinal behavior differs depending on platform

Summary: Updated SunPKCS11 provider with SunJCE provider behavior
Reviewed-by: xuelei
上级 73ab5ffe
/* /*
* Copyright (c) 2003, 2013, Oracle and/or its affiliates. All rights reserved. * Copyright (c) 2003, 2016, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
* *
* This code is free software; you can redistribute it and/or modify it * This code is free software; you can redistribute it and/or modify it
...@@ -344,7 +344,7 @@ final class P11Cipher extends CipherSpi { ...@@ -344,7 +344,7 @@ final class P11Cipher extends CipherSpi {
private void implInit(int opmode, Key key, byte[] iv, private void implInit(int opmode, Key key, byte[] iv,
SecureRandom random) SecureRandom random)
throws InvalidKeyException, InvalidAlgorithmParameterException { throws InvalidKeyException, InvalidAlgorithmParameterException {
cancelOperation(); reset(true);
if (fixedKeySize != -1 && key.getEncoded().length != fixedKeySize) { if (fixedKeySize != -1 && key.getEncoded().length != fixedKeySize) {
throw new InvalidKeyException("Key size is invalid"); throw new InvalidKeyException("Key size is invalid");
} }
...@@ -404,23 +404,26 @@ final class P11Cipher extends CipherSpi { ...@@ -404,23 +404,26 @@ final class P11Cipher extends CipherSpi {
if (initialized == false) { if (initialized == false) {
return; return;
} }
initialized = false;
if ((session == null) || (token.explicitCancel == false)) { if ((session == null) || (token.explicitCancel == false)) {
return; return;
} }
// cancel operation by finishing it
int bufLen = doFinalLength(0);
byte[] buffer = new byte[bufLen];
try { try {
if (encrypt) { if (session.hasObjects() == false) {
token.p11.C_EncryptFinal(session.id(), 0, buffer, 0, bufLen); session = token.killSession(session);
return;
} else { } else {
token.p11.C_DecryptFinal(session.id(), 0, buffer, 0, bufLen); // cancel operation by finishing it
int bufLen = doFinalLength(0);
byte[] buffer = new byte[bufLen];
if (encrypt) {
token.p11.C_EncryptFinal(session.id(), 0, buffer, 0, bufLen);
} else {
token.p11.C_DecryptFinal(session.id(), 0, buffer, 0, bufLen);
}
} }
} catch (PKCS11Exception e) { } catch (PKCS11Exception e) {
throw new ProviderException("Cancel failed", e); throw new ProviderException("Cancel failed", e);
} finally {
reset();
} }
} }
...@@ -483,7 +486,9 @@ final class P11Cipher extends CipherSpi { ...@@ -483,7 +486,9 @@ final class P11Cipher extends CipherSpi {
} }
// reset the states to the pre-initialized values // reset the states to the pre-initialized values
private void reset() { private void reset(boolean doCancel) {
if (doCancel) cancelOperation();
initialized = false; initialized = false;
bytesBuffered = 0; bytesBuffered = 0;
padBufferLen = 0; padBufferLen = 0;
...@@ -610,7 +615,7 @@ final class P11Cipher extends CipherSpi { ...@@ -610,7 +615,7 @@ final class P11Cipher extends CipherSpi {
throw (ShortBufferException) throw (ShortBufferException)
(new ShortBufferException().initCause(e)); (new ShortBufferException().initCause(e));
} }
reset(); reset(false);
throw new ProviderException("update() failed", e); throw new ProviderException("update() failed", e);
} }
} }
...@@ -728,7 +733,7 @@ final class P11Cipher extends CipherSpi { ...@@ -728,7 +733,7 @@ final class P11Cipher extends CipherSpi {
throw (ShortBufferException) throw (ShortBufferException)
(new ShortBufferException().initCause(e)); (new ShortBufferException().initCause(e));
} }
reset(); reset(false);
throw new ProviderException("update() failed", e); throw new ProviderException("update() failed", e);
} }
} }
...@@ -740,6 +745,7 @@ final class P11Cipher extends CipherSpi { ...@@ -740,6 +745,7 @@ final class P11Cipher extends CipherSpi {
if (outLen < requiredOutLen) { if (outLen < requiredOutLen) {
throw new ShortBufferException(); throw new ShortBufferException();
} }
boolean doCancel = true;
try { try {
ensureInitialized(); ensureInitialized();
int k = 0; int k = 0;
...@@ -753,7 +759,12 @@ final class P11Cipher extends CipherSpi { ...@@ -753,7 +759,12 @@ final class P11Cipher extends CipherSpi {
} }
k += token.p11.C_EncryptFinal(session.id(), k += token.p11.C_EncryptFinal(session.id(),
0, out, (outOfs + k), (outLen - k)); 0, out, (outOfs + k), (outLen - k));
doCancel = false;
} else { } else {
// Special handling to match SunJCE provider behavior
if (bytesBuffered == 0 && padBufferLen == 0) {
return 0;
}
if (paddingObj != null) { if (paddingObj != null) {
if (padBufferLen != 0) { if (padBufferLen != 0) {
k = token.p11.C_DecryptUpdate(session.id(), 0, k = token.p11.C_DecryptUpdate(session.id(), 0,
...@@ -762,20 +773,24 @@ final class P11Cipher extends CipherSpi { ...@@ -762,20 +773,24 @@ final class P11Cipher extends CipherSpi {
} }
k += token.p11.C_DecryptFinal(session.id(), 0, padBuffer, k, k += token.p11.C_DecryptFinal(session.id(), 0, padBuffer, k,
padBuffer.length - k); padBuffer.length - k);
doCancel = false;
int actualPadLen = paddingObj.unpad(padBuffer, k); int actualPadLen = paddingObj.unpad(padBuffer, k);
k -= actualPadLen; k -= actualPadLen;
System.arraycopy(padBuffer, 0, out, outOfs, k); System.arraycopy(padBuffer, 0, out, outOfs, k);
} else { } else {
k = token.p11.C_DecryptFinal(session.id(), 0, out, outOfs, k = token.p11.C_DecryptFinal(session.id(), 0, out, outOfs,
outLen); outLen);
doCancel = false;
} }
} }
return k; return k;
} catch (PKCS11Exception e) { } catch (PKCS11Exception e) {
doCancel = false;
handleException(e); handleException(e);
throw new ProviderException("doFinal() failed", e); throw new ProviderException("doFinal() failed", e);
} finally { } finally {
reset(); reset(doCancel);
} }
} }
...@@ -788,6 +803,7 @@ final class P11Cipher extends CipherSpi { ...@@ -788,6 +803,7 @@ final class P11Cipher extends CipherSpi {
throw new ShortBufferException(); throw new ShortBufferException();
} }
boolean doCancel = true;
try { try {
ensureInitialized(); ensureInitialized();
...@@ -818,7 +834,13 @@ final class P11Cipher extends CipherSpi { ...@@ -818,7 +834,13 @@ final class P11Cipher extends CipherSpi {
} }
k += token.p11.C_EncryptFinal(session.id(), k += token.p11.C_EncryptFinal(session.id(),
outAddr, outArray, (outOfs + k), (outLen - k)); outAddr, outArray, (outOfs + k), (outLen - k));
doCancel = false;
} else { } else {
// Special handling to match SunJCE provider behavior
if (bytesBuffered == 0 && padBufferLen == 0) {
return 0;
}
if (paddingObj != null) { if (paddingObj != null) {
if (padBufferLen != 0) { if (padBufferLen != 0) {
k = token.p11.C_DecryptUpdate(session.id(), k = token.p11.C_DecryptUpdate(session.id(),
...@@ -828,6 +850,8 @@ final class P11Cipher extends CipherSpi { ...@@ -828,6 +850,8 @@ final class P11Cipher extends CipherSpi {
} }
k += token.p11.C_DecryptFinal(session.id(), k += token.p11.C_DecryptFinal(session.id(),
0, padBuffer, k, padBuffer.length - k); 0, padBuffer, k, padBuffer.length - k);
doCancel = false;
int actualPadLen = paddingObj.unpad(padBuffer, k); int actualPadLen = paddingObj.unpad(padBuffer, k);
k -= actualPadLen; k -= actualPadLen;
outArray = padBuffer; outArray = padBuffer;
...@@ -835,6 +859,7 @@ final class P11Cipher extends CipherSpi { ...@@ -835,6 +859,7 @@ final class P11Cipher extends CipherSpi {
} else { } else {
k = token.p11.C_DecryptFinal(session.id(), k = token.p11.C_DecryptFinal(session.id(),
outAddr, outArray, outOfs, outLen); outAddr, outArray, outOfs, outLen);
doCancel = false;
} }
} }
if ((!encrypt && paddingObj != null) || if ((!encrypt && paddingObj != null) ||
...@@ -846,10 +871,11 @@ final class P11Cipher extends CipherSpi { ...@@ -846,10 +871,11 @@ final class P11Cipher extends CipherSpi {
} }
return k; return k;
} catch (PKCS11Exception e) { } catch (PKCS11Exception e) {
doCancel = false;
handleException(e); handleException(e);
throw new ProviderException("doFinal() failed", e); throw new ProviderException("doFinal() failed", e);
} finally { } finally {
reset(); reset(doCancel);
} }
} }
......
/*
* Copyright (c) 2016, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License version 2 only, as
* published by the Free Software Foundation.
*
* This code is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* version 2 for more details (a copy is included in the LICENSE file that
* accompanied this code).
*
* You should have received a copy of the GNU General Public License version
* 2 along with this work; if not, write to the Free Software Foundation,
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
* or visit www.oracle.com if you need additional information or have any
* questions.
*/
/**
* @test
* @bug 6946830
* @summary Test the Cipher.doFinal() with 0-length buffer
* @key randomness
*/
import java.util.*;
import java.nio.*;
import java.security.*;
import javax.crypto.*;
import javax.crypto.spec.*;
public class EmptyFinalBuffer {
private static final String[] ALGOS = {
"AES/ECB/PKCS5Padding", "AES/CBC/PKCS5Padding"
};
public static void main(String[] args) throws Exception {
Provider[] provs = Security.getProviders();
SecretKey key = new SecretKeySpec(new byte[16], "AES");
boolean testFailed = false;
for (Provider p : provs) {
System.out.println("Testing: " + p.getName());
for (String algo : ALGOS) {
System.out.print("Algo: " + algo);
Cipher c;
try {
c = Cipher.getInstance(algo, p);
} catch (NoSuchAlgorithmException nsae) {
// skip
System.out.println("=> No Support");
continue;
}
c.init(Cipher.ENCRYPT_MODE, key);
AlgorithmParameters params = c.getParameters();
c.init(Cipher.DECRYPT_MODE, key, params);
try {
byte[] out = c.doFinal(new byte[0]);
System.out.println("=> Accepted w/ " +
(out == null? "null" : (out.length + "-byte")) +
" output");
} catch (Exception e) {
testFailed = true;
System.out.println("=> Rejected w/ Exception");
e.printStackTrace();
}
}
}
if (testFailed) {
throw new Exception("One or more tests failed");
} else {
System.out.println("All tests passed");
}
}
}
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册