|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
*/ |
|
|
|
package sun.security.pkcs11; |
|
|
|
import java.util.*; |
|
import java.nio.ByteBuffer; |
|
|
|
import java.security.*; |
|
|
|
import javax.crypto.SecretKey; |
|
|
|
import sun.nio.ch.DirectBuffer; |
|
|
|
import sun.security.util.MessageDigestSpi2; |
|
|
|
import sun.security.pkcs11.wrapper.*; |
|
import static sun.security.pkcs11.wrapper.PKCS11Constants.*; |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
*/ |
|
final class P11Digest extends MessageDigestSpi implements Cloneable, |
|
MessageDigestSpi2 { |
|
|
|
|
|
private final static int S_BLANK = 1; |
|
|
|
|
|
private final static int S_BUFFERED = 2; |
|
|
|
|
|
private final static int S_INIT = 3; |
|
|
|
private final static int BUFFER_SIZE = 96; |
|
|
|
|
|
private final Token token; |
|
|
|
|
|
private final String algorithm; |
|
|
|
|
|
private final CK_MECHANISM mechanism; |
|
|
|
|
|
private final int digestLength; |
|
|
|
|
|
private Session session; |
|
|
|
|
|
private int state; |
|
|
|
|
|
private byte[] buffer; |
|
|
|
|
|
private int bufOfs; |
|
|
|
P11Digest(Token token, String algorithm, long mechanism) { |
|
super(); |
|
this.token = token; |
|
this.algorithm = algorithm; |
|
this.mechanism = new CK_MECHANISM(mechanism); |
|
switch ((int)mechanism) { |
|
case (int)CKM_MD2: |
|
case (int)CKM_MD5: |
|
digestLength = 16; |
|
break; |
|
case (int)CKM_SHA_1: |
|
digestLength = 20; |
|
break; |
|
case (int)CKM_SHA224: |
|
digestLength = 28; |
|
break; |
|
case (int)CKM_SHA256: |
|
digestLength = 32; |
|
break; |
|
case (int)CKM_SHA384: |
|
digestLength = 48; |
|
break; |
|
case (int)CKM_SHA512: |
|
digestLength = 64; |
|
break; |
|
default: |
|
throw new ProviderException("Unknown mechanism: " + mechanism); |
|
} |
|
buffer = new byte[BUFFER_SIZE]; |
|
state = S_BLANK; |
|
} |
|
|
|
|
|
protected int engineGetDigestLength() { |
|
return digestLength; |
|
} |
|
|
|
private void fetchSession() { |
|
token.ensureValid(); |
|
if (state == S_BLANK) { |
|
try { |
|
session = token.getOpSession(); |
|
state = S_BUFFERED; |
|
} catch (PKCS11Exception e) { |
|
throw new ProviderException("No more session available", e); |
|
} |
|
} |
|
} |
|
|
|
|
|
protected void engineReset() { |
|
token.ensureValid(); |
|
|
|
if (session != null) { |
|
if (state == S_INIT && token.explicitCancel == true |
|
&& session.hasObjects() == false) { |
|
session = token.killSession(session); |
|
} else { |
|
session = token.releaseSession(session); |
|
} |
|
} |
|
state = S_BLANK; |
|
bufOfs = 0; |
|
} |
|
|
|
|
|
protected byte[] engineDigest() { |
|
try { |
|
byte[] digest = new byte[digestLength]; |
|
int n = engineDigest(digest, 0, digestLength); |
|
return digest; |
|
} catch (DigestException e) { |
|
throw new ProviderException("internal error", e); |
|
} |
|
} |
|
|
|
|
|
protected int engineDigest(byte[] digest, int ofs, int len) |
|
throws DigestException { |
|
if (len < digestLength) { |
|
throw new DigestException("Length must be at least " + |
|
digestLength); |
|
} |
|
|
|
fetchSession(); |
|
try { |
|
int n; |
|
if (state == S_BUFFERED) { |
|
n = token.p11.C_DigestSingle(session.id(), mechanism, buffer, 0, |
|
bufOfs, digest, ofs, len); |
|
bufOfs = 0; |
|
} else { |
|
if (bufOfs != 0) { |
|
token.p11.C_DigestUpdate(session.id(), 0, buffer, 0, |
|
bufOfs); |
|
bufOfs = 0; |
|
} |
|
n = token.p11.C_DigestFinal(session.id(), digest, ofs, len); |
|
} |
|
if (n != digestLength) { |
|
throw new ProviderException("internal digest length error"); |
|
} |
|
return n; |
|
} catch (PKCS11Exception e) { |
|
throw new ProviderException("digest() failed", e); |
|
} finally { |
|
engineReset(); |
|
} |
|
} |
|
|
|
|
|
protected void engineUpdate(byte in) { |
|
byte[] temp = { in }; |
|
engineUpdate(temp, 0, 1); |
|
} |
|
|
|
|
|
protected void engineUpdate(byte[] in, int ofs, int len) { |
|
if (len <= 0) { |
|
return; |
|
} |
|
|
|
fetchSession(); |
|
try { |
|
if (state == S_BUFFERED) { |
|
token.p11.C_DigestInit(session.id(), mechanism); |
|
state = S_INIT; |
|
} |
|
if ((bufOfs != 0) && (bufOfs + len > buffer.length)) { |
|
|
|
token.p11.C_DigestUpdate(session.id(), 0, buffer, 0, bufOfs); |
|
bufOfs = 0; |
|
} |
|
if (bufOfs + len > buffer.length) { |
|
|
|
token.p11.C_DigestUpdate(session.id(), 0, in, ofs, len); |
|
} else { |
|
|
|
System.arraycopy(in, ofs, buffer, bufOfs, len); |
|
bufOfs += len; |
|
} |
|
} catch (PKCS11Exception e) { |
|
engineReset(); |
|
throw new ProviderException("update() failed", e); |
|
} |
|
} |
|
|
|
// Called by SunJSSE via reflection during the SSL 3.0 handshake if |
|
// the master secret is sensitive. |
|
// Note: Change to protected after this method is moved from |
|
// sun.security.util.MessageSpi2 interface to |
|
|
|
public void engineUpdate(SecretKey key) throws InvalidKeyException { |
|
// SunJSSE calls this method only if the key does not have a RAW |
|
// encoding, i.e. if it is sensitive. Therefore, no point in calling |
|
|
|
if (key instanceof P11Key == false) { |
|
throw new InvalidKeyException("Not a P11Key: " + key); |
|
} |
|
P11Key p11Key = (P11Key)key; |
|
if (p11Key.token != token) { |
|
throw new InvalidKeyException("Not a P11Key of this provider: " + |
|
key); |
|
} |
|
|
|
fetchSession(); |
|
long p11KeyID = p11Key.getKeyID(); |
|
try { |
|
if (state == S_BUFFERED) { |
|
token.p11.C_DigestInit(session.id(), mechanism); |
|
state = S_INIT; |
|
} |
|
|
|
if (bufOfs != 0) { |
|
token.p11.C_DigestUpdate(session.id(), 0, buffer, 0, bufOfs); |
|
bufOfs = 0; |
|
} |
|
token.p11.C_DigestKey(session.id(), p11KeyID); |
|
} catch (PKCS11Exception e) { |
|
engineReset(); |
|
throw new ProviderException("update(SecretKey) failed", e); |
|
} finally { |
|
p11Key.releaseKeyID(); |
|
} |
|
} |
|
|
|
|
|
protected void engineUpdate(ByteBuffer byteBuffer) { |
|
int len = byteBuffer.remaining(); |
|
if (len <= 0) { |
|
return; |
|
} |
|
|
|
if (byteBuffer instanceof DirectBuffer == false) { |
|
super.engineUpdate(byteBuffer); |
|
return; |
|
} |
|
|
|
fetchSession(); |
|
long addr = ((DirectBuffer)byteBuffer).address(); |
|
int ofs = byteBuffer.position(); |
|
try { |
|
if (state == S_BUFFERED) { |
|
token.p11.C_DigestInit(session.id(), mechanism); |
|
state = S_INIT; |
|
} |
|
if (bufOfs != 0) { |
|
token.p11.C_DigestUpdate(session.id(), 0, buffer, 0, bufOfs); |
|
bufOfs = 0; |
|
} |
|
token.p11.C_DigestUpdate(session.id(), addr + ofs, null, 0, len); |
|
byteBuffer.position(ofs + len); |
|
} catch (PKCS11Exception e) { |
|
engineReset(); |
|
throw new ProviderException("update() failed", e); |
|
} |
|
} |
|
|
|
public Object clone() throws CloneNotSupportedException { |
|
P11Digest copy = (P11Digest) super.clone(); |
|
copy.buffer = buffer.clone(); |
|
try { |
|
if (session != null) { |
|
copy.session = copy.token.getOpSession(); |
|
} |
|
if (state == S_INIT) { |
|
byte[] stateValues = |
|
token.p11.C_GetOperationState(session.id()); |
|
token.p11.C_SetOperationState(copy.session.id(), |
|
stateValues, 0, 0); |
|
} |
|
} catch (PKCS11Exception e) { |
|
throw (CloneNotSupportedException) |
|
(new CloneNotSupportedException(algorithm).initCause(e)); |
|
} |
|
return copy; |
|
} |
|
} |