|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
*/ |
|
|
|
package sun.security.pkcs11; |
|
|
|
import java.security.*; |
|
import java.security.spec.AlgorithmParameterSpec; |
|
|
|
import javax.crypto.*; |
|
import javax.crypto.spec.*; |
|
|
|
import sun.security.internal.spec.TlsMasterSecretParameterSpec; |
|
|
|
import static sun.security.pkcs11.TemplateManager.*; |
|
import sun.security.pkcs11.wrapper.*; |
|
import static sun.security.pkcs11.wrapper.PKCS11Constants.*; |
|
|
|
|
|
|
|
|
|
|
|
|
|
*/ |
|
public final class P11TlsMasterSecretGenerator extends KeyGeneratorSpi { |
|
|
|
private final static String MSG = "TlsMasterSecretGenerator must be " |
|
+ "initialized using a TlsMasterSecretParameterSpec"; |
|
|
|
|
|
private final Token token; |
|
|
|
|
|
private final String algorithm; |
|
|
|
|
|
private long mechanism; |
|
|
|
private TlsMasterSecretParameterSpec spec; |
|
private P11Key p11Key; |
|
|
|
int version; |
|
|
|
P11TlsMasterSecretGenerator(Token token, String algorithm, long mechanism) |
|
throws PKCS11Exception { |
|
super(); |
|
this.token = token; |
|
this.algorithm = algorithm; |
|
this.mechanism = mechanism; |
|
} |
|
|
|
protected void engineInit(SecureRandom random) { |
|
throw new InvalidParameterException(MSG); |
|
} |
|
|
|
protected void engineInit(AlgorithmParameterSpec params, |
|
SecureRandom random) throws InvalidAlgorithmParameterException { |
|
if (params instanceof TlsMasterSecretParameterSpec == false) { |
|
throw new InvalidAlgorithmParameterException(MSG); |
|
} |
|
this.spec = (TlsMasterSecretParameterSpec)params; |
|
SecretKey key = spec.getPremasterSecret(); |
|
// algorithm should be either TlsRsaPremasterSecret or TlsPremasterSecret, |
|
|
|
try { |
|
p11Key = P11SecretKeyFactory.convertKey(token, key, null); |
|
} catch (InvalidKeyException e) { |
|
throw new InvalidAlgorithmParameterException("init() failed", e); |
|
} |
|
version = (spec.getMajorVersion() << 8) | spec.getMinorVersion(); |
|
if ((version < 0x0300) && (version > 0x0303)) { |
|
throw new InvalidAlgorithmParameterException("Only SSL 3.0," + |
|
" TLS 1.0, TLS 1.1, and TLS 1.2 are supported"); |
|
} |
|
// We assume the token supports the required mechanism. If it does not, |
|
// generateKey() will fail and the failover should take care of us. |
|
} |
|
|
|
protected void engineInit(int keysize, SecureRandom random) { |
|
throw new InvalidParameterException(MSG); |
|
} |
|
|
|
protected SecretKey engineGenerateKey() { |
|
if (spec == null) { |
|
throw new IllegalStateException |
|
("TlsMasterSecretGenerator must be initialized"); |
|
} |
|
final boolean isTlsRsaPremasterSecret = |
|
p11Key.getAlgorithm().equals("TlsRsaPremasterSecret"); |
|
if (version == 0x0300) { |
|
mechanism = isTlsRsaPremasterSecret ? |
|
CKM_SSL3_MASTER_KEY_DERIVE : CKM_SSL3_MASTER_KEY_DERIVE_DH; |
|
} else if (version == 0x0301 || version == 0x0302) { |
|
mechanism = isTlsRsaPremasterSecret ? |
|
CKM_TLS_MASTER_KEY_DERIVE : CKM_TLS_MASTER_KEY_DERIVE_DH; |
|
} else if (version == 0x0303) { |
|
mechanism = isTlsRsaPremasterSecret ? |
|
CKM_TLS12_MASTER_KEY_DERIVE : CKM_TLS12_MASTER_KEY_DERIVE_DH; |
|
} |
|
CK_VERSION ckVersion; |
|
if (isTlsRsaPremasterSecret) { |
|
ckVersion = new CK_VERSION(0, 0); |
|
} else { |
|
// Note: we use DH for all non-RSA premaster secrets. That includes |
|
// Kerberos. That should not be a problem because master secret |
|
// calculation is always a straightforward application of the |
|
// TLS PRF (or the SSL equivalent). |
|
// The only thing special about RSA master secret calculation is |
|
|
|
ckVersion = null; |
|
} |
|
byte[] clientRandom = spec.getClientRandom(); |
|
byte[] serverRandom = spec.getServerRandom(); |
|
CK_SSL3_RANDOM_DATA random = |
|
new CK_SSL3_RANDOM_DATA(clientRandom, serverRandom); |
|
CK_MECHANISM ckMechanism = null; |
|
if (version < 0x0303) { |
|
CK_SSL3_MASTER_KEY_DERIVE_PARAMS params = |
|
new CK_SSL3_MASTER_KEY_DERIVE_PARAMS(random, ckVersion); |
|
ckMechanism = new CK_MECHANISM(mechanism, params); |
|
} else if (version == 0x0303) { |
|
CK_TLS12_MASTER_KEY_DERIVE_PARAMS params = |
|
new CK_TLS12_MASTER_KEY_DERIVE_PARAMS(random, ckVersion, |
|
Functions.getHashMechId(spec.getPRFHashAlg())); |
|
ckMechanism = new CK_MECHANISM(mechanism, params); |
|
} |
|
|
|
Session session = null; |
|
long p11KeyID = p11Key.getKeyID(); |
|
try { |
|
session = token.getObjSession(); |
|
CK_ATTRIBUTE[] attributes = token.getAttributes(O_GENERATE, |
|
CKO_SECRET_KEY, CKK_GENERIC_SECRET, new CK_ATTRIBUTE[0]); |
|
long keyID = token.p11.C_DeriveKey(session.id(), |
|
ckMechanism, p11KeyID, attributes); |
|
int major, minor; |
|
if (ckVersion == null) { |
|
major = -1; |
|
minor = -1; |
|
} else { |
|
major = ckVersion.major; |
|
minor = ckVersion.minor; |
|
} |
|
return P11Key.masterSecretKey(session, keyID, |
|
"TlsMasterSecret", 48 << 3, attributes, major, minor); |
|
} catch (Exception e) { |
|
throw new ProviderException("Could not generate key", e); |
|
} finally { |
|
p11Key.releaseKeyID(); |
|
token.releaseSession(session); |
|
} |
|
} |
|
|
|
} |