author | chegar |
Thu, 17 Oct 2019 20:54:25 +0100 | |
branch | datagramsocketimpl-branch |
changeset 58679 | 9c3209ff7550 |
parent 58678 | 9cf78a70fa4f |
parent 58489 | 2faeaa5933a6 |
permissions | -rw-r--r-- |
2 | 1 |
/* |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
2 |
* Copyright (c) 2003, 2019, Oracle and/or its affiliates. All rights reserved. |
2 | 3 |
*/ |
4 |
||
5 |
/* Copyright (c) 2002 Graz University of Technology. All rights reserved. |
|
6 |
* |
|
7 |
* Redistribution and use in source and binary forms, with or without |
|
8 |
* modification, are permitted provided that the following conditions are met: |
|
9 |
* |
|
10 |
* 1. Redistributions of source code must retain the above copyright notice, |
|
11 |
* this list of conditions and the following disclaimer. |
|
12 |
* |
|
13 |
* 2. Redistributions in binary form must reproduce the above copyright notice, |
|
14 |
* this list of conditions and the following disclaimer in the documentation |
|
15 |
* and/or other materials provided with the distribution. |
|
16 |
* |
|
17 |
* 3. The end-user documentation included with the redistribution, if any, must |
|
18 |
* include the following acknowledgment: |
|
19 |
* |
|
20 |
* "This product includes software developed by IAIK of Graz University of |
|
21 |
* Technology." |
|
22 |
* |
|
23 |
* Alternately, this acknowledgment may appear in the software itself, if |
|
24 |
* and wherever such third-party acknowledgments normally appear. |
|
25 |
* |
|
26 |
* 4. The names "Graz University of Technology" and "IAIK of Graz University of |
|
27 |
* Technology" must not be used to endorse or promote products derived from |
|
28 |
* this software without prior written permission. |
|
29 |
* |
|
30 |
* 5. Products derived from this software may not be called |
|
31 |
* "IAIK PKCS Wrapper", nor may "IAIK" appear in their name, without prior |
|
32 |
* written permission of Graz University of Technology. |
|
33 |
* |
|
34 |
* THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESSED OR IMPLIED |
|
35 |
* WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED |
|
36 |
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR |
|
37 |
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE LICENSOR BE |
|
38 |
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, |
|
39 |
* OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, |
|
40 |
* PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, |
|
41 |
* OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON |
|
42 |
* ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, |
|
43 |
* OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
|
44 |
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE |
|
45 |
* POSSIBILITY OF SUCH DAMAGE. |
|
46 |
*/ |
|
47 |
||
48 |
/* |
|
49 |
* pkcs11wrapper.c |
|
50 |
* 18.05.2001 |
|
51 |
* |
|
52 |
* This is the implementation of the native functions of the Java to PKCS#11 interface. |
|
53 |
* All function use some helper functions to convert the JNI types to PKCS#11 types. |
|
54 |
* |
|
55 |
* @author Karl Scheibelhofer <Karl.Scheibelhofer@iaik.at> |
|
56 |
* @author Martin Schlaeffer <schlaeff@sbox.tugraz.at> |
|
57 |
*/ |
|
58 |
||
59 |
||
60 |
#include "pkcs11wrapper.h" |
|
61 |
||
62 |
#include <stdio.h> |
|
63 |
#include <stdlib.h> |
|
64 |
#include <string.h> |
|
65 |
#include <assert.h> |
|
66 |
||
67 |
#include "sun_security_pkcs11_wrapper_PKCS11.h" |
|
68 |
||
69 |
/* declare file private functions */ |
|
70 |
||
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
71 |
CK_VOID_PTR jMechParamToCKMechParamPtrSlow(JNIEnv *env, jobject jParam, |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
72 |
CK_MECHANISM_TYPE ckMech, CK_ULONG *ckpLength); |
2 | 73 |
|
74 |
||
75 |
/* |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
76 |
* converts a CK_DATE pointer into a Java CK_DATE Object. |
2 | 77 |
* |
78 |
* @param env - used to call JNI funktions to create the new Java object |
|
79 |
* @param ckpValue - the pointer to the CK_DATE structure |
|
80 |
* @return - the new Java CK_DATE object |
|
81 |
*/ |
|
82 |
jobject ckDatePtrToJDateObject(JNIEnv *env, const CK_DATE *ckpDate) |
|
83 |
{ |
|
84 |
jclass jDateClass; |
|
85 |
jmethodID jCtrId; |
|
86 |
jobject jDateObject; |
|
87 |
jcharArray jYear; |
|
88 |
jcharArray jMonth; |
|
89 |
jcharArray jDay; |
|
90 |
||
91 |
/* load CK_DATE class */ |
|
92 |
jDateClass = (*env)->FindClass(env, CLASS_DATE); |
|
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
93 |
if (jDateClass == NULL) { return NULL; } |
2 | 94 |
|
95 |
/* load CK_DATE constructor */ |
|
96 |
jCtrId = (*env)->GetMethodID(env, jDateClass, "<init>", "([C[C[C)V"); |
|
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
97 |
if (jCtrId == NULL) { return NULL; } |
2 | 98 |
|
99 |
/* prep all fields */ |
|
100 |
jYear = ckCharArrayToJCharArray(env, (CK_CHAR_PTR)(ckpDate->year), 4); |
|
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
101 |
if (jYear == NULL) { return NULL; } |
2 | 102 |
jMonth = ckCharArrayToJCharArray(env, (CK_CHAR_PTR)(ckpDate->month), 2); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
103 |
if (jMonth == NULL) { return NULL; } |
2 | 104 |
jDay = ckCharArrayToJCharArray(env, (CK_CHAR_PTR)(ckpDate->day), 2); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
105 |
if (jDay == NULL) { return NULL; } |
2 | 106 |
|
107 |
/* create new CK_DATE object */ |
|
108 |
jDateObject = |
|
109 |
(*env)->NewObject(env, jDateClass, jCtrId, jYear, jMonth, jDay); |
|
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
110 |
if (jDateObject == NULL) { return NULL; } |
2 | 111 |
|
112 |
/* free local references */ |
|
113 |
(*env)->DeleteLocalRef(env, jDateClass); |
|
114 |
(*env)->DeleteLocalRef(env, jYear); |
|
115 |
(*env)->DeleteLocalRef(env, jMonth); |
|
116 |
(*env)->DeleteLocalRef(env, jDay); |
|
117 |
||
118 |
return jDateObject ; |
|
119 |
} |
|
120 |
||
121 |
/* |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
122 |
* converts a CK_VERSION pointer into a Java CK_VERSION Object. |
2 | 123 |
* |
124 |
* @param env - used to call JNI funktions to create the new Java object |
|
125 |
* @param ckpVersion - the pointer to the CK_VERSION structure |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
126 |
* @return the new Java CK_VERSION object |
2 | 127 |
*/ |
128 |
jobject ckVersionPtrToJVersion(JNIEnv *env, const CK_VERSION_PTR ckpVersion) |
|
129 |
{ |
|
130 |
jclass jVersionClass; |
|
131 |
jmethodID jCtrId; |
|
132 |
jobject jVersionObject; |
|
133 |
jint jMajor; |
|
134 |
jint jMinor; |
|
135 |
||
136 |
/* load CK_VERSION class */ |
|
137 |
jVersionClass = (*env)->FindClass(env, CLASS_VERSION); |
|
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
138 |
if (jVersionClass == NULL) { return NULL; } |
2 | 139 |
|
140 |
/* load CK_VERSION constructor */ |
|
141 |
jCtrId = (*env)->GetMethodID(env, jVersionClass, "<init>", "(II)V"); |
|
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
142 |
if (jCtrId == NULL) { return NULL; } |
2 | 143 |
|
144 |
/* prep both fields */ |
|
145 |
jMajor = ckpVersion->major; |
|
146 |
jMinor = ckpVersion->minor; |
|
147 |
||
148 |
/* create new CK_VERSION object */ |
|
149 |
jVersionObject = |
|
150 |
(*env)->NewObject(env, jVersionClass, jCtrId, jMajor, jMinor); |
|
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
151 |
if (jVersionObject == NULL) { return NULL; } |
2 | 152 |
|
153 |
/* free local references */ |
|
154 |
(*env)->DeleteLocalRef(env, jVersionClass); |
|
155 |
||
156 |
return jVersionObject ; |
|
157 |
} |
|
158 |
||
159 |
/* |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
160 |
* converts a CK_SESSION_INFO pointer into a Java CK_SESSION_INFO Object. |
2 | 161 |
* |
162 |
* @param env - used to call JNI funktions to create the new Java object |
|
163 |
* @param ckpSessionInfo - the pointer to the CK_SESSION_INFO structure |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
164 |
* @return the new Java CK_SESSION_INFO object |
2 | 165 |
*/ |
166 |
jobject ckSessionInfoPtrToJSessionInfo(JNIEnv *env, const CK_SESSION_INFO_PTR ckpSessionInfo) |
|
167 |
{ |
|
168 |
jclass jSessionInfoClass; |
|
169 |
jmethodID jCtrId; |
|
170 |
jobject jSessionInfoObject; |
|
171 |
jlong jSlotID; |
|
172 |
jlong jState; |
|
173 |
jlong jFlags; |
|
174 |
jlong jDeviceError; |
|
175 |
||
176 |
/* load CK_SESSION_INFO class */ |
|
177 |
jSessionInfoClass = (*env)->FindClass(env, CLASS_SESSION_INFO); |
|
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
178 |
if (jSessionInfoClass == NULL) { return NULL; } |
2 | 179 |
|
180 |
/* load CK_SESSION_INFO constructor */ |
|
181 |
jCtrId = (*env)->GetMethodID(env, jSessionInfoClass, "<init>", "(JJJJ)V"); |
|
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
182 |
if (jCtrId == NULL) { return NULL; } |
2 | 183 |
|
184 |
/* prep all fields */ |
|
185 |
jSlotID = ckULongToJLong(ckpSessionInfo->slotID); |
|
186 |
jState = ckULongToJLong(ckpSessionInfo->state); |
|
187 |
jFlags = ckULongToJLong(ckpSessionInfo->flags); |
|
188 |
jDeviceError = ckULongToJLong(ckpSessionInfo->ulDeviceError); |
|
189 |
||
190 |
/* create new CK_SESSION_INFO object */ |
|
191 |
jSessionInfoObject = |
|
192 |
(*env)->NewObject(env, jSessionInfoClass, jCtrId, jSlotID, jState, |
|
193 |
jFlags, jDeviceError); |
|
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
194 |
if (jSessionInfoObject == NULL) { return NULL; } |
2 | 195 |
|
196 |
/* free local references */ |
|
197 |
(*env)->DeleteLocalRef(env, jSessionInfoClass); |
|
198 |
||
199 |
return jSessionInfoObject ; |
|
200 |
} |
|
201 |
||
202 |
/* |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
203 |
* converts a CK_ATTRIBUTE pointer into a Java CK_ATTRIBUTE Object. |
2 | 204 |
* |
205 |
* @param env - used to call JNI funktions to create the new Java object |
|
206 |
* @param ckpAttribute - the pointer to the CK_ATTRIBUTE structure |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
207 |
* @return the new Java CK_ATTRIBUTE object |
2 | 208 |
*/ |
209 |
jobject ckAttributePtrToJAttribute(JNIEnv *env, const CK_ATTRIBUTE_PTR ckpAttribute) |
|
210 |
{ |
|
211 |
jclass jAttributeClass; |
|
212 |
jmethodID jCtrId; |
|
213 |
jobject jAttributeObject; |
|
214 |
jlong jType; |
|
215 |
jobject jPValue = NULL; |
|
216 |
||
217 |
jAttributeClass = (*env)->FindClass(env, CLASS_ATTRIBUTE); |
|
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
218 |
if (jAttributeClass == NULL) { return NULL; } |
2 | 219 |
|
220 |
/* load CK_INFO constructor */ |
|
221 |
jCtrId = (*env)->GetMethodID(env, jAttributeClass, "<init>", "(JLjava/lang/Object;)V"); |
|
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
222 |
if (jCtrId == NULL) { return NULL; } |
2 | 223 |
|
224 |
/* prep both fields */ |
|
225 |
jType = ckULongToJLong(ckpAttribute->type); |
|
226 |
jPValue = ckAttributeValueToJObject(env, ckpAttribute); |
|
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
227 |
if ((*env)->ExceptionCheck(env)) { return NULL; } |
2 | 228 |
|
229 |
/* create new CK_ATTRIBUTE object */ |
|
230 |
jAttributeObject = |
|
231 |
(*env)->NewObject(env, jAttributeClass, jCtrId, jType, jPValue); |
|
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
232 |
if (jAttributeObject == NULL) { return NULL; } |
2 | 233 |
|
234 |
/* free local references */ |
|
235 |
(*env)->DeleteLocalRef(env, jAttributeClass); |
|
236 |
(*env)->DeleteLocalRef(env, jPValue); |
|
237 |
||
238 |
return jAttributeObject; |
|
239 |
} |
|
240 |
||
241 |
||
242 |
/* |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
243 |
* converts a Java CK_VERSION object into a CK_VERSION pointer |
2 | 244 |
* |
245 |
* @param env - used to call JNI funktions to get the values out of the Java object |
|
246 |
* @param jVersion - the Java CK_VERSION object to convert |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
247 |
* @return pointer to the new CK_VERSION structure |
2 | 248 |
*/ |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
249 |
CK_VERSION_PTR |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
250 |
jVersionToCKVersionPtr(JNIEnv *env, jobject jVersion) |
2 | 251 |
{ |
252 |
CK_VERSION_PTR ckpVersion; |
|
253 |
jclass jVersionClass; |
|
254 |
jfieldID jFieldID; |
|
255 |
jbyte jMajor, jMinor; |
|
256 |
||
257 |
if (jVersion == NULL) { |
|
258 |
return NULL; |
|
259 |
} |
|
260 |
||
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
261 |
// retrieve java values |
2 | 262 |
jVersionClass = (*env)->GetObjectClass(env, jVersion); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
263 |
if (jVersionClass == NULL) { return NULL; } |
2 | 264 |
jFieldID = (*env)->GetFieldID(env, jVersionClass, "major", "B"); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
265 |
if (jFieldID == NULL) { return NULL; } |
2 | 266 |
jMajor = (*env)->GetByteField(env, jVersion, jFieldID); |
267 |
jFieldID = (*env)->GetFieldID(env, jVersionClass, "minor", "B"); |
|
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
268 |
if (jFieldID == NULL) { return NULL; } |
2 | 269 |
jMinor = (*env)->GetByteField(env, jVersion, jFieldID); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
270 |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
271 |
// allocate memory for CK_VERSION pointer |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
272 |
ckpVersion = (CK_VERSION_PTR) calloc(1, sizeof(CK_VERSION)); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
273 |
if (ckpVersion == NULL) { |
10798
413b731e1818
7103549: Remove dependencies on libjava and libjvm from security libraries
chegar
parents:
8542
diff
changeset
|
274 |
throwOutOfMemoryError(env, 0); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
275 |
return NULL; |
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
276 |
} |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
277 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
278 |
// populate using java values |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
279 |
ckpVersion->major = jByteToCKByte(jMajor); |
2 | 280 |
ckpVersion->minor = jByteToCKByte(jMinor); |
281 |
||
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
282 |
return ckpVersion; |
2 | 283 |
} |
284 |
||
285 |
||
286 |
/* |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
287 |
* converts a Java CK_DATE object into a CK_DATE pointer |
2 | 288 |
* |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
289 |
* @param env - used to call JNI functions to get the values out of the Java object |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
290 |
* @param jDate - the Java CK_DATE object to convert |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
291 |
* @return pointer to the new CK_DATE structure |
2 | 292 |
*/ |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
293 |
CK_DATE * jDateObjectToCKDatePtr(JNIEnv *env, jobject jDate) |
2 | 294 |
{ |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
295 |
CK_DATE * ckpDate = NULL; |
2 | 296 |
CK_ULONG ckLength; |
297 |
jclass jDateClass; |
|
298 |
jfieldID jFieldID; |
|
299 |
jobject jYear, jMonth, jDay; |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
300 |
jchar *jTempChars = NULL; |
2 | 301 |
CK_ULONG i; |
302 |
||
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
303 |
if (jDate == NULL) { |
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
304 |
return NULL; |
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
305 |
} |
2 | 306 |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
307 |
// retrieve java values |
2 | 308 |
jDateClass = (*env)->FindClass(env, CLASS_DATE); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
309 |
if (jDateClass == NULL) { return NULL; } |
2 | 310 |
jFieldID = (*env)->GetFieldID(env, jDateClass, "year", "[C"); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
311 |
if (jFieldID == NULL) { return NULL; } |
2 | 312 |
jYear = (*env)->GetObjectField(env, jDate, jFieldID); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
313 |
jFieldID = (*env)->GetFieldID(env, jDateClass, "month", "[C"); |
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
314 |
if (jFieldID == NULL) { return NULL; } |
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
315 |
jMonth = (*env)->GetObjectField(env, jDate, jFieldID); |
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
316 |
jFieldID = (*env)->GetFieldID(env, jDateClass, "day", "[C"); |
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
317 |
if (jFieldID == NULL) { return NULL; } |
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
318 |
jDay = (*env)->GetObjectField(env, jDate, jFieldID); |
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
319 |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
320 |
// allocate memory for CK_DATE pointer |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
321 |
ckpDate = (CK_DATE *) calloc(1, sizeof(CK_DATE)); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
322 |
if (ckpDate == NULL) { |
10798
413b731e1818
7103549: Remove dependencies on libjava and libjvm from security libraries
chegar
parents:
8542
diff
changeset
|
323 |
throwOutOfMemoryError(env, 0); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
324 |
return NULL; |
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
325 |
} |
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
326 |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
327 |
// populate using java values |
2 | 328 |
if (jYear == NULL) { |
329 |
ckpDate->year[0] = 0; |
|
330 |
ckpDate->year[1] = 0; |
|
331 |
ckpDate->year[2] = 0; |
|
332 |
ckpDate->year[3] = 0; |
|
333 |
} else { |
|
334 |
ckLength = (*env)->GetArrayLength(env, jYear); |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
335 |
jTempChars = (jchar*) calloc(ckLength, sizeof(jchar)); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
336 |
if (jTempChars == NULL) { |
10798
413b731e1818
7103549: Remove dependencies on libjava and libjvm from security libraries
chegar
parents:
8542
diff
changeset
|
337 |
throwOutOfMemoryError(env, 0); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
338 |
goto cleanup; |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
339 |
} |
2 | 340 |
(*env)->GetCharArrayRegion(env, jYear, 0, ckLength, jTempChars); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
341 |
if ((*env)->ExceptionCheck(env)) { |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
342 |
goto cleanup; |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
343 |
} |
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
344 |
|
2 | 345 |
for (i = 0; (i < ckLength) && (i < 4) ; i++) { |
346 |
ckpDate->year[i] = jCharToCKChar(jTempChars[i]); |
|
347 |
} |
|
348 |
free(jTempChars); |
|
349 |
} |
|
350 |
||
351 |
if (jMonth == NULL) { |
|
352 |
ckpDate->month[0] = 0; |
|
353 |
ckpDate->month[1] = 0; |
|
354 |
} else { |
|
355 |
ckLength = (*env)->GetArrayLength(env, jMonth); |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
356 |
jTempChars = (jchar*) calloc(ckLength, sizeof(jchar)); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
357 |
if (jTempChars == NULL) { |
10798
413b731e1818
7103549: Remove dependencies on libjava and libjvm from security libraries
chegar
parents:
8542
diff
changeset
|
358 |
throwOutOfMemoryError(env, 0); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
359 |
goto cleanup; |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
360 |
} |
2 | 361 |
(*env)->GetCharArrayRegion(env, jMonth, 0, ckLength, jTempChars); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
362 |
if ((*env)->ExceptionCheck(env)) { |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
363 |
goto cleanup; |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
364 |
} |
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
365 |
|
11356 | 366 |
for (i = 0; (i < ckLength) && (i < 2) ; i++) { |
2 | 367 |
ckpDate->month[i] = jCharToCKChar(jTempChars[i]); |
368 |
} |
|
369 |
free(jTempChars); |
|
370 |
} |
|
371 |
||
372 |
if (jDay == NULL) { |
|
373 |
ckpDate->day[0] = 0; |
|
374 |
ckpDate->day[1] = 0; |
|
375 |
} else { |
|
376 |
ckLength = (*env)->GetArrayLength(env, jDay); |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
377 |
jTempChars = (jchar*) calloc(ckLength, sizeof(jchar)); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
378 |
if (jTempChars == NULL) { |
10798
413b731e1818
7103549: Remove dependencies on libjava and libjvm from security libraries
chegar
parents:
8542
diff
changeset
|
379 |
throwOutOfMemoryError(env, 0); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
380 |
goto cleanup; |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
381 |
} |
2 | 382 |
(*env)->GetCharArrayRegion(env, jDay, 0, ckLength, jTempChars); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
383 |
if ((*env)->ExceptionCheck(env)) { |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
384 |
goto cleanup; |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
385 |
} |
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
386 |
|
11356 | 387 |
for (i = 0; (i < ckLength) && (i < 2) ; i++) { |
2 | 388 |
ckpDate->day[i] = jCharToCKChar(jTempChars[i]); |
389 |
} |
|
390 |
free(jTempChars); |
|
391 |
} |
|
392 |
||
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
393 |
return ckpDate; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
394 |
cleanup: |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
395 |
free(jTempChars); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
396 |
free(ckpDate); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
397 |
return NULL; |
2 | 398 |
} |
399 |
||
400 |
||
401 |
/* |
|
402 |
* converts a Java CK_ATTRIBUTE object into a CK_ATTRIBUTE structure |
|
403 |
* |
|
404 |
* @param env - used to call JNI funktions to get the values out of the Java object |
|
405 |
* @param jAttribute - the Java CK_ATTRIBUTE object to convert |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
406 |
* @return the new CK_ATTRIBUTE structure |
2 | 407 |
*/ |
408 |
CK_ATTRIBUTE jAttributeToCKAttribute(JNIEnv *env, jobject jAttribute) |
|
409 |
{ |
|
410 |
CK_ATTRIBUTE ckAttribute; |
|
411 |
jclass jAttributeClass; |
|
412 |
jfieldID jFieldID; |
|
413 |
jlong jType; |
|
414 |
jobject jPValue; |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
415 |
|
14414
f338be3ef659
8001579: Cleanup warnings in security native code
jzavgren
parents:
11356
diff
changeset
|
416 |
memset(&ckAttribute, 0, sizeof(CK_ATTRIBUTE)); |
2 | 417 |
|
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
418 |
// TBD: what if jAttribute == NULL?! |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
419 |
TRACE0("\nDEBUG: jAttributeToCKAttribute"); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
420 |
|
2 | 421 |
/* get CK_ATTRIBUTE class */ |
422 |
TRACE0(", getting attribute object class"); |
|
423 |
jAttributeClass = (*env)->GetObjectClass(env, jAttribute); |
|
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
424 |
if (jAttributeClass == NULL) { return ckAttribute; } |
2 | 425 |
|
426 |
/* get type */ |
|
427 |
TRACE0(", getting type field"); |
|
428 |
jFieldID = (*env)->GetFieldID(env, jAttributeClass, "type", "J"); |
|
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
429 |
if (jFieldID == NULL) { return ckAttribute; } |
2 | 430 |
jType = (*env)->GetLongField(env, jAttribute, jFieldID); |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
431 |
TRACE1(", type=0x%lX", jType); |
2 | 432 |
|
433 |
/* get pValue */ |
|
434 |
TRACE0(", getting pValue field"); |
|
435 |
jFieldID = (*env)->GetFieldID(env, jAttributeClass, "pValue", "Ljava/lang/Object;"); |
|
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
436 |
if (jFieldID == NULL) { return ckAttribute; } |
2 | 437 |
jPValue = (*env)->GetObjectField(env, jAttribute, jFieldID); |
438 |
TRACE1(", pValue=%p", jPValue); |
|
439 |
||
440 |
ckAttribute.type = jLongToCKULong(jType); |
|
441 |
TRACE0(", converting pValue to primitive object"); |
|
442 |
||
443 |
/* convert the Java pValue object to a CK-type pValue pointer */ |
|
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
444 |
ckAttribute.pValue = jObjectToPrimitiveCKObjectPtr(env, jPValue, &(ckAttribute.ulValueLen)); |
2 | 445 |
|
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
446 |
TRACE0("\nDEBUG: jAttributeToCKAttribute FINISHED\n"); |
2 | 447 |
|
448 |
return ckAttribute ; |
|
449 |
} |
|
450 |
||
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
451 |
void masterKeyDeriveParamToCKMasterKeyDeriveParam(JNIEnv *env, jobject jParam, |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
452 |
jclass masterKeyDeriveParamClass, |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
453 |
CK_VERSION_PTR* cKMasterKeyDeriveParamVersion, |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
454 |
CK_SSL3_RANDOM_DATA* cKMasterKeyDeriveParamRandomInfo) { |
2 | 455 |
jfieldID fieldID; |
456 |
jclass jSsl3RandomDataClass; |
|
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
457 |
jobject jRandomInfo, jRIClientRandom, jRIServerRandom, jVersion; |
2 | 458 |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
459 |
// retrieve java values |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
460 |
fieldID = (*env)->GetFieldID(env, masterKeyDeriveParamClass, "RandomInfo", |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
461 |
"Lsun/security/pkcs11/wrapper/CK_SSL3_RANDOM_DATA;"); |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
462 |
if (fieldID == NULL) { return; } |
2 | 463 |
jRandomInfo = (*env)->GetObjectField(env, jParam, fieldID); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
464 |
jSsl3RandomDataClass = (*env)->FindClass(env, CLASS_SSL3_RANDOM_DATA); |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
465 |
if (jSsl3RandomDataClass == NULL) { return; } |
2 | 466 |
fieldID = (*env)->GetFieldID(env, jSsl3RandomDataClass, "pClientRandom", "[B"); |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
467 |
if (fieldID == NULL) { return; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
468 |
jRIClientRandom = (*env)->GetObjectField(env, jRandomInfo, fieldID); |
2 | 469 |
fieldID = (*env)->GetFieldID(env, jSsl3RandomDataClass, "pServerRandom", "[B"); |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
470 |
if (fieldID == NULL) { return; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
471 |
jRIServerRandom = (*env)->GetObjectField(env, jRandomInfo, fieldID); |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
472 |
fieldID = (*env)->GetFieldID(env, masterKeyDeriveParamClass, "pVersion", |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
473 |
"Lsun/security/pkcs11/wrapper/CK_VERSION;"); |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
474 |
if (fieldID == NULL) { return; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
475 |
jVersion = (*env)->GetObjectField(env, jParam, fieldID); |
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
476 |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
477 |
// populate using java values |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
478 |
*cKMasterKeyDeriveParamVersion = jVersionToCKVersionPtr(env, jVersion); |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
479 |
if ((*env)->ExceptionCheck(env)) { return; } |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
480 |
jByteArrayToCKByteArray(env, jRIClientRandom, |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
481 |
&(cKMasterKeyDeriveParamRandomInfo->pClientRandom), |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
482 |
&(cKMasterKeyDeriveParamRandomInfo->ulClientRandomLen)); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
483 |
if ((*env)->ExceptionCheck(env)) { |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
484 |
goto cleanup; |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
485 |
} |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
486 |
jByteArrayToCKByteArray(env, jRIServerRandom, |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
487 |
&(cKMasterKeyDeriveParamRandomInfo->pServerRandom), |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
488 |
&(cKMasterKeyDeriveParamRandomInfo->ulServerRandomLen)); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
489 |
if ((*env)->ExceptionCheck(env)) { |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
490 |
goto cleanup; |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
491 |
} |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
492 |
return; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
493 |
cleanup: |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
494 |
free(*cKMasterKeyDeriveParamVersion); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
495 |
free(cKMasterKeyDeriveParamRandomInfo->pClientRandom); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
496 |
cKMasterKeyDeriveParamRandomInfo->ulClientRandomLen = 0L; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
497 |
free(cKMasterKeyDeriveParamRandomInfo->pServerRandom); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
498 |
cKMasterKeyDeriveParamRandomInfo->ulServerRandomLen = 0L; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
499 |
// explicitly set to NULL to ensure no double free possible |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
500 |
*cKMasterKeyDeriveParamVersion = NULL; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
501 |
cKMasterKeyDeriveParamRandomInfo->pClientRandom = NULL; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
502 |
cKMasterKeyDeriveParamRandomInfo->pServerRandom = NULL; |
2 | 503 |
} |
504 |
||
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
505 |
/* |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
506 |
* converts the Java CK_SSL3_MASTER_KEY_DERIVE_PARAMS object to a |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
507 |
* CK_SSL3_MASTER_KEY_DERIVE_PARAMS pointer |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
508 |
* |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
509 |
* @param env - used to call JNI functions to get the Java classes and objects |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
510 |
* @param jParam - the Java CK_SSL3_MASTER_KEY_DERIVE_PARAMS object to convert |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
511 |
* @param pLength - length of the allocated memory of the returned pointer |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
512 |
* @return pointer to the new CK_SSL3_MASTER_KEY_DERIVE_PARAMS structure |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
513 |
*/ |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
514 |
CK_SSL3_MASTER_KEY_DERIVE_PARAMS_PTR |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
515 |
jSsl3MasterKeyDeriveParamToCKSsl3MasterKeyDeriveParamPtr(JNIEnv *env, |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
516 |
jobject jParam, CK_ULONG *pLength) |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
517 |
{ |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
518 |
CK_SSL3_MASTER_KEY_DERIVE_PARAMS_PTR ckParamPtr; |
51802
15094d12a632
8210912: Build error in src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_convert.c after JDK-8029661
mikael
parents:
51800
diff
changeset
|
519 |
jclass jSsl3MasterKeyDeriveParamsClass; |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
520 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
521 |
if (pLength != NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
522 |
*pLength = 0L; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
523 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
524 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
525 |
// allocate memory for CK_SSL3_MASTER_KEY_DERIVE_PARAMS pointer |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
526 |
ckParamPtr = calloc(1, sizeof(CK_SSL3_MASTER_KEY_DERIVE_PARAMS)); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
527 |
if (ckParamPtr == NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
528 |
throwOutOfMemoryError(env, 0); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
529 |
return NULL; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
530 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
531 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
532 |
// retrieve and populate using java values |
51802
15094d12a632
8210912: Build error in src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_convert.c after JDK-8029661
mikael
parents:
51800
diff
changeset
|
533 |
jSsl3MasterKeyDeriveParamsClass = |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
534 |
(*env)->FindClass(env, CLASS_SSL3_MASTER_KEY_DERIVE_PARAMS); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
535 |
if (jSsl3MasterKeyDeriveParamsClass == NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
536 |
goto cleanup; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
537 |
} |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
538 |
masterKeyDeriveParamToCKMasterKeyDeriveParam(env, jParam, |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
539 |
jSsl3MasterKeyDeriveParamsClass, |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
540 |
&(ckParamPtr->pVersion), &(ckParamPtr->RandomInfo)); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
541 |
if ((*env)->ExceptionCheck(env)) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
542 |
goto cleanup; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
543 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
544 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
545 |
if (pLength != NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
546 |
*pLength = sizeof(CK_SSL3_MASTER_KEY_DERIVE_PARAMS); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
547 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
548 |
return ckParamPtr; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
549 |
cleanup: |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
550 |
free(ckParamPtr); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
551 |
return NULL; |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
552 |
} |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
553 |
|
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
554 |
/* |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
555 |
* converts the Java CK_TLS12_MASTER_KEY_DERIVE_PARAMS object to a |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
556 |
* CK_TLS12_MASTER_KEY_DERIVE_PARAMS pointer |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
557 |
* |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
558 |
* @param env - used to call JNI functions to get the Java classes and objects |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
559 |
* @param jParam - the Java CK_TLS12_MASTER_KEY_DERIVE_PARAMS object to convert |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
560 |
* @param pLength - length of the allocated memory of the returned pointer |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
561 |
* @return pointer to the new CK_TLS12_MASTER_KEY_DERIVE_PARAMS structure |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
562 |
*/ |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
563 |
CK_TLS12_MASTER_KEY_DERIVE_PARAMS_PTR |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
564 |
jTls12MasterKeyDeriveParamToCKTls12MasterKeyDeriveParamPtr(JNIEnv *env, |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
565 |
jobject jParam, CK_ULONG *pLength) |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
566 |
{ |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
567 |
CK_TLS12_MASTER_KEY_DERIVE_PARAMS_PTR ckParamPtr; |
51802
15094d12a632
8210912: Build error in src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_convert.c after JDK-8029661
mikael
parents:
51800
diff
changeset
|
568 |
jclass jTls12MasterKeyDeriveParamsClass; |
15094d12a632
8210912: Build error in src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_convert.c after JDK-8029661
mikael
parents:
51800
diff
changeset
|
569 |
jfieldID fieldID; |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
570 |
jlong prfHashMechanism; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
571 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
572 |
if (pLength != NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
573 |
*pLength = 0L; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
574 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
575 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
576 |
// retrieve java values |
51802
15094d12a632
8210912: Build error in src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_convert.c after JDK-8029661
mikael
parents:
51800
diff
changeset
|
577 |
jTls12MasterKeyDeriveParamsClass = |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
578 |
(*env)->FindClass(env, CLASS_TLS12_MASTER_KEY_DERIVE_PARAMS); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
579 |
if (jTls12MasterKeyDeriveParamsClass == NULL) { return NULL; } |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
580 |
fieldID = (*env)->GetFieldID(env, |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
581 |
jTls12MasterKeyDeriveParamsClass, "prfHashMechanism", "J"); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
582 |
if (fieldID == NULL) { return NULL; } |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
583 |
prfHashMechanism = (*env)->GetLongField(env, jParam, fieldID); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
584 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
585 |
// allocate memory for CK_TLS12_MASTER_KEY_DERIVE_PARAMS pointer |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
586 |
ckParamPtr = calloc(1, sizeof(CK_TLS12_MASTER_KEY_DERIVE_PARAMS)); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
587 |
if (ckParamPtr == NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
588 |
throwOutOfMemoryError(env, 0); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
589 |
return NULL; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
590 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
591 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
592 |
// populate using java values |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
593 |
masterKeyDeriveParamToCKMasterKeyDeriveParam(env, jParam, |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
594 |
jTls12MasterKeyDeriveParamsClass, &ckParamPtr->pVersion, |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
595 |
&ckParamPtr->RandomInfo); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
596 |
if ((*env)->ExceptionCheck(env)) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
597 |
goto cleanup; |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
598 |
} |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
599 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
600 |
ckParamPtr->prfHashMechanism = (CK_MECHANISM_TYPE) prfHashMechanism; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
601 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
602 |
if (pLength != NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
603 |
*pLength = sizeof(CK_TLS12_MASTER_KEY_DERIVE_PARAMS); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
604 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
605 |
return ckParamPtr; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
606 |
cleanup: |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
607 |
free(ckParamPtr); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
608 |
return NULL; |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
609 |
} |
2 | 610 |
|
611 |
/* |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
612 |
* converts the Java CK_TLS_PRF_PARAMS object to a CK_TLS_PRF_PARAMS pointer |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
613 |
* |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
614 |
* @param env - used to call JNI functions to get the Java classes and objects |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
615 |
* @param jParam - the Java CK_TLS_PRF_PARAMS object to convert |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
616 |
* @param pLength - length of the allocated memory of the returned pointer |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
617 |
* @return pointer to the new CK_TLS_PRF_PARAMS structure |
2 | 618 |
*/ |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
619 |
CK_TLS_PRF_PARAMS_PTR |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
620 |
jTlsPrfParamsToCKTlsPrfParamPtr(JNIEnv *env, jobject jParam, CK_ULONG *pLength) |
2 | 621 |
{ |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
622 |
CK_TLS_PRF_PARAMS_PTR ckParamPtr; |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
623 |
jclass jTlsPrfParamsClass; |
2 | 624 |
jfieldID fieldID; |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
625 |
jobject jSeed, jLabel, jOutput; |
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
626 |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
627 |
if (pLength != NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
628 |
*pLength = 0; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
629 |
} |
2 | 630 |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
631 |
// retrieve java values |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
632 |
jTlsPrfParamsClass = (*env)->FindClass(env, CLASS_TLS_PRF_PARAMS); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
633 |
if (jTlsPrfParamsClass == NULL) { return NULL; } |
2 | 634 |
fieldID = (*env)->GetFieldID(env, jTlsPrfParamsClass, "pSeed", "[B"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
635 |
if (fieldID == NULL) { return NULL; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
636 |
jSeed = (*env)->GetObjectField(env, jParam, fieldID); |
2 | 637 |
fieldID = (*env)->GetFieldID(env, jTlsPrfParamsClass, "pLabel", "[B"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
638 |
if (fieldID == NULL) { return NULL; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
639 |
jLabel = (*env)->GetObjectField(env, jParam, fieldID); |
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
640 |
fieldID = (*env)->GetFieldID(env, jTlsPrfParamsClass, "pOutput", "[B"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
641 |
if (fieldID == NULL) { return NULL; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
642 |
jOutput = (*env)->GetObjectField(env, jParam, fieldID); |
2 | 643 |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
644 |
// allocate memory for CK_TLS_PRF_PARAMS pointer |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
645 |
ckParamPtr = calloc(1, sizeof(CK_TLS_PRF_PARAMS)); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
646 |
if (ckParamPtr == NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
647 |
throwOutOfMemoryError(env, 0); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
648 |
return NULL; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
649 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
650 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
651 |
// populate using java values |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
652 |
jByteArrayToCKByteArray(env, jSeed, &(ckParamPtr->pSeed), &(ckParamPtr->ulSeedLen)); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
653 |
if ((*env)->ExceptionCheck(env)) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
654 |
goto cleanup; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
655 |
} |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
656 |
jByteArrayToCKByteArray(env, jLabel, &(ckParamPtr->pLabel), &(ckParamPtr->ulLabelLen)); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
657 |
if ((*env)->ExceptionCheck(env)) { |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
658 |
goto cleanup; |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
659 |
} |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
660 |
ckParamPtr->pulOutputLen = calloc(1, sizeof(CK_ULONG)); |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
661 |
if (ckParamPtr->pulOutputLen == NULL) { |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
662 |
goto cleanup; |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
663 |
} |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
664 |
jByteArrayToCKByteArray(env, jOutput, &(ckParamPtr->pOutput), ckParamPtr->pulOutputLen); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
665 |
if ((*env)->ExceptionCheck(env)) { |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
666 |
goto cleanup; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
667 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
668 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
669 |
if (pLength != NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
670 |
*pLength = sizeof(CK_TLS_PRF_PARAMS); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
671 |
} |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
672 |
return ckParamPtr; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
673 |
cleanup: |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
674 |
free(ckParamPtr->pSeed); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
675 |
free(ckParamPtr->pLabel); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
676 |
free(ckParamPtr->pOutput); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
677 |
free(ckParamPtr->pulOutputLen); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
678 |
free(ckParamPtr); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
679 |
return NULL; |
2 | 680 |
} |
681 |
||
682 |
/* |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
683 |
* converts the Java CK_TLS_MAC_PARAMS object to a CK_TLS_MAC_PARAMS pointer |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
684 |
* |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
685 |
* @param env - used to call JNI functions to get the Java classes and objects |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
686 |
* @param jParam - the Java CK_TLS_MAC_PARAMS object to convert |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
687 |
* @param pLength - length of the allocated memory of the returned pointer |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
688 |
* @return pointer to the new CK_TLS_MAC_PARAMS structure |
2 | 689 |
*/ |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
690 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
691 |
CK_TLS_MAC_PARAMS_PTR |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
692 |
jTlsMacParamsToCKTlsMacParamPtr(JNIEnv *env, jobject jParam, CK_ULONG *pLength) |
2 | 693 |
{ |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
694 |
CK_TLS_MAC_PARAMS_PTR ckParamPtr; |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
695 |
jclass jTlsMacParamsClass; |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
696 |
jfieldID fieldID; |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
697 |
jlong jPrfMechanism, jUlMacLength, jUlServerOrClient; |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
698 |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
699 |
if (pLength != NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
700 |
*pLength = 0L; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
701 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
702 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
703 |
// retrieve java values |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
704 |
jTlsMacParamsClass = (*env)->FindClass(env, CLASS_TLS_MAC_PARAMS); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
705 |
if (jTlsMacParamsClass == NULL) { return NULL; } |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
706 |
fieldID = (*env)->GetFieldID(env, jTlsMacParamsClass, "prfMechanism", "J"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
707 |
if (fieldID == NULL) { return NULL; } |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
708 |
jPrfMechanism = (*env)->GetLongField(env, jParam, fieldID); |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
709 |
fieldID = (*env)->GetFieldID(env, jTlsMacParamsClass, "ulMacLength", "J"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
710 |
if (fieldID == NULL) { return NULL; } |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
711 |
jUlMacLength = (*env)->GetLongField(env, jParam, fieldID); |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
712 |
fieldID = (*env)->GetFieldID(env, jTlsMacParamsClass, "ulServerOrClient", "J"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
713 |
if (fieldID == NULL) { return NULL; } |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
714 |
jUlServerOrClient = (*env)->GetLongField(env, jParam, fieldID); |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
715 |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
716 |
// allocate memory for CK_TLS_MAC_PARAMS pointer |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
717 |
ckParamPtr = calloc(1, sizeof(CK_TLS_MAC_PARAMS)); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
718 |
if (ckParamPtr == NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
719 |
throwOutOfMemoryError(env, 0); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
720 |
return NULL; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
721 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
722 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
723 |
// populate using java values |
58489
2faeaa5933a6
8229243: SunPKCS11-Solaris provider tests failing on Solaris 11.4
valeriep
parents:
58281
diff
changeset
|
724 |
ckParamPtr->prfHashMechanism = jLongToCKULong(jPrfMechanism); |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
725 |
ckParamPtr->ulMacLength = jLongToCKULong(jUlMacLength); |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
726 |
ckParamPtr->ulServerOrClient = jLongToCKULong(jUlServerOrClient); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
727 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
728 |
if (pLength != NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
729 |
*pLength = sizeof(CK_TLS_MAC_PARAMS); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
730 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
731 |
return ckParamPtr; |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
732 |
} |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
733 |
|
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
734 |
void keyMatParamToCKKeyMatParam(JNIEnv *env, jobject jParam, |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
735 |
jclass jKeyMatParamClass, |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
736 |
CK_ULONG* cKKeyMatParamUlMacSizeInBits, |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
737 |
CK_ULONG* cKKeyMatParamUlKeySizeInBits, |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
738 |
CK_ULONG* cKKeyMatParamUlIVSizeInBits, |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
739 |
CK_BBOOL* cKKeyMatParamBIsExport, |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
740 |
CK_SSL3_RANDOM_DATA* cKKeyMatParamRandomInfo, |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
741 |
CK_SSL3_KEY_MAT_OUT_PTR* cKKeyMatParamPReturnedKeyMaterial) |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
742 |
{ |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
743 |
jclass jSsl3RandomDataClass, jSsl3KeyMatOutClass; |
2 | 744 |
jfieldID fieldID; |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
745 |
jlong jMacSizeInBits, jKeySizeInBits, jIVSizeInBits; |
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
746 |
jboolean jIsExport; |
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
747 |
jobject jRandomInfo, jRIClientRandom, jRIServerRandom; |
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
748 |
jobject jReturnedKeyMaterial, jRMIvClient, jRMIvServer; |
2 | 749 |
CK_ULONG ckTemp; |
750 |
||
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
751 |
// the pointer arguments should already be initialized by caller |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
752 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
753 |
// retrieve java values |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
754 |
fieldID = (*env)->GetFieldID(env, jKeyMatParamClass, "ulMacSizeInBits", "J"); |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
755 |
if (fieldID == NULL) { return; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
756 |
jMacSizeInBits = (*env)->GetLongField(env, jParam, fieldID); |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
757 |
fieldID = (*env)->GetFieldID(env, jKeyMatParamClass, "ulKeySizeInBits", "J"); |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
758 |
if (fieldID == NULL) { return; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
759 |
jKeySizeInBits = (*env)->GetLongField(env, jParam, fieldID); |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
760 |
fieldID = (*env)->GetFieldID(env, jKeyMatParamClass, "ulIVSizeInBits", "J"); |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
761 |
if (fieldID == NULL) { return; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
762 |
jIVSizeInBits = (*env)->GetLongField(env, jParam, fieldID); |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
763 |
fieldID = (*env)->GetFieldID(env, jKeyMatParamClass, "bIsExport", "Z"); |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
764 |
if (fieldID == NULL) { return; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
765 |
jIsExport = (*env)->GetBooleanField(env, jParam, fieldID); |
2 | 766 |
jSsl3RandomDataClass = (*env)->FindClass(env, CLASS_SSL3_RANDOM_DATA); |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
767 |
if (jSsl3RandomDataClass == NULL) { return; } |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
768 |
fieldID = (*env)->GetFieldID(env, jKeyMatParamClass, "RandomInfo", |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
769 |
"Lsun/security/pkcs11/wrapper/CK_SSL3_RANDOM_DATA;"); |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
770 |
if (fieldID == NULL) { return; } |
2 | 771 |
jRandomInfo = (*env)->GetObjectField(env, jParam, fieldID); |
772 |
fieldID = (*env)->GetFieldID(env, jSsl3RandomDataClass, "pClientRandom", "[B"); |
|
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
773 |
if (fieldID == NULL) { return; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
774 |
jRIClientRandom = (*env)->GetObjectField(env, jRandomInfo, fieldID); |
2 | 775 |
fieldID = (*env)->GetFieldID(env, jSsl3RandomDataClass, "pServerRandom", "[B"); |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
776 |
if (fieldID == NULL) { return; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
777 |
jRIServerRandom = (*env)->GetObjectField(env, jRandomInfo, fieldID); |
2 | 778 |
jSsl3KeyMatOutClass = (*env)->FindClass(env, CLASS_SSL3_KEY_MAT_OUT); |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
779 |
if (jSsl3KeyMatOutClass == NULL) { return; } |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
780 |
fieldID = (*env)->GetFieldID(env, jKeyMatParamClass, "pReturnedKeyMaterial", |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
781 |
"Lsun/security/pkcs11/wrapper/CK_SSL3_KEY_MAT_OUT;"); |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
782 |
if (fieldID == NULL) { return; } |
2 | 783 |
jReturnedKeyMaterial = (*env)->GetObjectField(env, jParam, fieldID); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
784 |
fieldID = (*env)->GetFieldID(env, jSsl3KeyMatOutClass, "pIVClient", "[B"); |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
785 |
if (fieldID == NULL) { return; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
786 |
jRMIvClient = (*env)->GetObjectField(env, jReturnedKeyMaterial, fieldID); |
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
787 |
fieldID = (*env)->GetFieldID(env, jSsl3KeyMatOutClass, "pIVServer", "[B"); |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
788 |
if (fieldID == NULL) { return; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
789 |
jRMIvServer = (*env)->GetObjectField(env, jReturnedKeyMaterial, fieldID); |
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
790 |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
791 |
// populate the specified pointers using java values |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
792 |
*cKKeyMatParamUlMacSizeInBits = jLongToCKULong(jMacSizeInBits); |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
793 |
*cKKeyMatParamUlKeySizeInBits = jLongToCKULong(jKeySizeInBits); |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
794 |
*cKKeyMatParamUlIVSizeInBits = jLongToCKULong(jIVSizeInBits); |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
795 |
*cKKeyMatParamBIsExport = jBooleanToCKBBool(jIsExport); |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
796 |
jByteArrayToCKByteArray(env, jRIClientRandom, |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
797 |
&(cKKeyMatParamRandomInfo->pClientRandom), |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
798 |
&(cKKeyMatParamRandomInfo->ulClientRandomLen)); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
799 |
if ((*env)->ExceptionCheck(env)) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
800 |
// just return as no memory allocation yet |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
801 |
return; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
802 |
} |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
803 |
jByteArrayToCKByteArray(env, jRIServerRandom, |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
804 |
&(cKKeyMatParamRandomInfo->pServerRandom), |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
805 |
&(cKKeyMatParamRandomInfo->ulServerRandomLen)); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
806 |
if ((*env)->ExceptionCheck(env)) { |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
807 |
goto cleanup; |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
808 |
} |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
809 |
/* allocate memory for pReturnedKeyMaterial */ |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
810 |
*cKKeyMatParamPReturnedKeyMaterial = |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
811 |
(CK_SSL3_KEY_MAT_OUT_PTR) calloc(1, sizeof(CK_SSL3_KEY_MAT_OUT)); |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
812 |
if (*cKKeyMatParamPReturnedKeyMaterial == NULL) { |
10798
413b731e1818
7103549: Remove dependencies on libjava and libjvm from security libraries
chegar
parents:
8542
diff
changeset
|
813 |
throwOutOfMemoryError(env, 0); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
814 |
goto cleanup; |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
815 |
} |
2 | 816 |
|
817 |
// the handles are output params only, no need to fetch them from Java |
|
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
818 |
(*cKKeyMatParamPReturnedKeyMaterial)->hClientMacSecret = 0; |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
819 |
(*cKKeyMatParamPReturnedKeyMaterial)->hServerMacSecret = 0; |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
820 |
(*cKKeyMatParamPReturnedKeyMaterial)->hClientKey = 0; |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
821 |
(*cKKeyMatParamPReturnedKeyMaterial)->hServerKey = 0; |
2 | 822 |
|
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
823 |
jByteArrayToCKByteArray(env, jRMIvClient, |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
824 |
&((*cKKeyMatParamPReturnedKeyMaterial)->pIVClient), &ckTemp); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
825 |
if ((*env)->ExceptionCheck(env)) { |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
826 |
goto cleanup; |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
827 |
} |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
828 |
jByteArrayToCKByteArray(env, jRMIvServer, |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
829 |
&((*cKKeyMatParamPReturnedKeyMaterial)->pIVServer), &ckTemp); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
830 |
if ((*env)->ExceptionCheck(env)) { |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
831 |
goto cleanup; |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
832 |
} |
2 | 833 |
|
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
834 |
return; |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
835 |
cleanup: |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
836 |
free(cKKeyMatParamRandomInfo->pClientRandom); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
837 |
free(cKKeyMatParamRandomInfo->pServerRandom); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
838 |
if ((*cKKeyMatParamPReturnedKeyMaterial) != NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
839 |
free((*cKKeyMatParamPReturnedKeyMaterial)->pIVClient); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
840 |
free(*cKKeyMatParamPReturnedKeyMaterial); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
841 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
842 |
// explicitly set to NULL to ensure no double free possible |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
843 |
cKKeyMatParamRandomInfo->pClientRandom = NULL; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
844 |
cKKeyMatParamRandomInfo->pServerRandom = NULL; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
845 |
*cKKeyMatParamPReturnedKeyMaterial = NULL; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
846 |
return; |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
847 |
} |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
848 |
/* |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
849 |
* converts the Java CK_SSL3_KEY_MAT_PARAMS object to a |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
850 |
* CK_SSL3_KEY_MAT_PARAMS pointer |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
851 |
* |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
852 |
* @param env - used to call JNI funktions to get the Java classes and objects |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
853 |
* @param jParam - the Java CK_SSL3_KEY_MAT_PARAMS object to convert |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
854 |
* @param pLength - length of the allocated memory of the returned pointer |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
855 |
* @return pointer to the new CK_SSL3_KEY_MAT_PARAMS structure |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
856 |
*/ |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
857 |
CK_SSL3_KEY_MAT_PARAMS_PTR |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
858 |
jSsl3KeyMatParamToCKSsl3KeyMatParamPtr(JNIEnv *env, jobject jParam, CK_ULONG *pLength) |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
859 |
{ |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
860 |
CK_SSL3_KEY_MAT_PARAMS_PTR ckParamPtr; |
51802
15094d12a632
8210912: Build error in src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_convert.c after JDK-8029661
mikael
parents:
51800
diff
changeset
|
861 |
jclass jSsl3KeyMatParamsClass; |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
862 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
863 |
if (pLength != NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
864 |
*pLength = 0; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
865 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
866 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
867 |
// allocate memory for CK_SSL3_KEY_MAT_PARAMS pointer |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
868 |
ckParamPtr = calloc(1, sizeof(CK_SSL3_KEY_MAT_PARAMS)); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
869 |
if (ckParamPtr == NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
870 |
throwOutOfMemoryError(env, 0); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
871 |
return NULL; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
872 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
873 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
874 |
// retrieve and populate using java values |
51802
15094d12a632
8210912: Build error in src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_convert.c after JDK-8029661
mikael
parents:
51800
diff
changeset
|
875 |
jSsl3KeyMatParamsClass = (*env)->FindClass(env, |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
876 |
CLASS_SSL3_KEY_MAT_PARAMS); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
877 |
if (jSsl3KeyMatParamsClass == NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
878 |
goto cleanup; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
879 |
} |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
880 |
keyMatParamToCKKeyMatParam(env, jParam, jSsl3KeyMatParamsClass, |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
881 |
&(ckParamPtr->ulMacSizeInBits), &(ckParamPtr->ulKeySizeInBits), |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
882 |
&(ckParamPtr->ulIVSizeInBits), &(ckParamPtr->bIsExport), |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
883 |
&(ckParamPtr->RandomInfo), &(ckParamPtr->pReturnedKeyMaterial)); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
884 |
if ((*env)->ExceptionCheck(env)) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
885 |
goto cleanup; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
886 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
887 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
888 |
if (pLength != NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
889 |
*pLength = sizeof(CK_SSL3_KEY_MAT_PARAMS); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
890 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
891 |
return ckParamPtr; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
892 |
cleanup: |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
893 |
free(ckParamPtr); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
894 |
return NULL; |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
895 |
} |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
896 |
|
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
897 |
/* |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
898 |
* converts the Java CK_TLS12_KEY_MAT_PARAMS object to a |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
899 |
* CK_TLS12_KEY_MAT_PARAMS pointer |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
900 |
* |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
901 |
* @param env - used to call JNI functions to get the Java classes and objects |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
902 |
* @param jParam - the Java CK_TLS12_KEY_MAT_PARAMS object to convert |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
903 |
* @param pLength - length of the allocated memory of the returned pointer |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
904 |
* @return pointer to the new CK_TLS12_KEY_MAT_PARAMS structure |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
905 |
*/ |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
906 |
CK_TLS12_KEY_MAT_PARAMS_PTR jTls12KeyMatParamToCKTls12KeyMatParamPtr(JNIEnv *env, |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
907 |
jobject jParam, CK_ULONG *pLength) |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
908 |
{ |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
909 |
CK_TLS12_KEY_MAT_PARAMS_PTR ckParamPtr; |
51802
15094d12a632
8210912: Build error in src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_convert.c after JDK-8029661
mikael
parents:
51800
diff
changeset
|
910 |
jclass jTls12KeyMatParamsClass; |
15094d12a632
8210912: Build error in src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_convert.c after JDK-8029661
mikael
parents:
51800
diff
changeset
|
911 |
jfieldID fieldID; |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
912 |
jlong prfHashMechanism; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
913 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
914 |
if (pLength != NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
915 |
*pLength = 0; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
916 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
917 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
918 |
// retrieve java values |
51802
15094d12a632
8210912: Build error in src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_convert.c after JDK-8029661
mikael
parents:
51800
diff
changeset
|
919 |
jTls12KeyMatParamsClass = (*env)->FindClass(env, |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
920 |
CLASS_TLS12_KEY_MAT_PARAMS); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
921 |
if (jTls12KeyMatParamsClass == NULL) { return NULL; } |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
922 |
fieldID = (*env)->GetFieldID(env, jTls12KeyMatParamsClass, |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
923 |
"prfHashMechanism", "J"); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
924 |
if (fieldID == NULL) { return NULL; } |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
925 |
prfHashMechanism = (*env)->GetLongField(env, jParam, fieldID); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
926 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
927 |
// allocate memory for CK_TLS12_KEY_MAT_PARAMS pointer |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
928 |
ckParamPtr = calloc(1, sizeof(CK_TLS12_KEY_MAT_PARAMS)); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
929 |
if (ckParamPtr == NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
930 |
throwOutOfMemoryError(env, 0); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
931 |
return NULL; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
932 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
933 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
934 |
// populate using java values |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
935 |
keyMatParamToCKKeyMatParam(env, jParam, jTls12KeyMatParamsClass, |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
936 |
&(ckParamPtr->ulMacSizeInBits), &(ckParamPtr->ulKeySizeInBits), |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
937 |
&(ckParamPtr->ulIVSizeInBits), &(ckParamPtr->bIsExport), |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
938 |
&(ckParamPtr->RandomInfo), &(ckParamPtr->pReturnedKeyMaterial)); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
939 |
if ((*env)->ExceptionCheck(env)) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
940 |
goto cleanup; |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
941 |
} |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
942 |
ckParamPtr->prfHashMechanism = (CK_MECHANISM_TYPE)prfHashMechanism; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
943 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
944 |
if (pLength != NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
945 |
*pLength = sizeof(CK_TLS12_KEY_MAT_PARAMS); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
946 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
947 |
return ckParamPtr; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
948 |
cleanup: |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
949 |
free(ckParamPtr); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
950 |
return NULL; |
2 | 951 |
} |
952 |
||
953 |
/* |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
954 |
* converts the Java CK_AES_CTR_PARAMS object to a CK_AES_CTR_PARAMS pointer |
8542 | 955 |
* |
956 |
* @param env - used to call JNI funktions to get the Java classes and objects |
|
957 |
* @param jParam - the Java CK_AES_CTR_PARAMS object to convert |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
958 |
* @param pLength - length of the allocated memory of the returned pointer |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
959 |
* @return pointer to the new CK_AES_CTR_PARAMS structure |
8542 | 960 |
*/ |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
961 |
CK_AES_CTR_PARAMS_PTR |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
962 |
jAesCtrParamsToCKAesCtrParamPtr(JNIEnv *env, jobject jParam, CK_ULONG *pLength) |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
963 |
{ |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
964 |
CK_AES_CTR_PARAMS_PTR ckParamPtr; |
8542 | 965 |
jclass jAesCtrParamsClass; |
966 |
jfieldID fieldID; |
|
967 |
jlong jCounterBits; |
|
968 |
jobject jCb; |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
969 |
CK_BYTE_PTR ckBytes = NULL; |
8542 | 970 |
CK_ULONG ckTemp; |
971 |
||
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
972 |
if (pLength != NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
973 |
*pLength = 0L; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
974 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
975 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
976 |
// retrieve java values |
8542 | 977 |
jAesCtrParamsClass = (*env)->FindClass(env, CLASS_AES_CTR_PARAMS); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
978 |
if (jAesCtrParamsClass == NULL) { return NULL; } |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
979 |
if (!(*env)->IsInstanceOf(env, jParam, jAesCtrParamsClass)) { |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
980 |
return NULL; |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
981 |
} |
8542 | 982 |
fieldID = (*env)->GetFieldID(env, jAesCtrParamsClass, "ulCounterBits", "J"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
983 |
if (fieldID == NULL) { return NULL; } |
8542 | 984 |
jCounterBits = (*env)->GetLongField(env, jParam, fieldID); |
985 |
fieldID = (*env)->GetFieldID(env, jAesCtrParamsClass, "cb", "[B"); |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
986 |
if (fieldID == NULL) { return NULL; } |
8542 | 987 |
jCb = (*env)->GetObjectField(env, jParam, fieldID); |
988 |
||
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
989 |
// allocate memory for CK_AES_CTR_PARAMS pointer |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
990 |
ckParamPtr = calloc(1, sizeof(CK_AES_CTR_PARAMS)); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
991 |
if (ckParamPtr == NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
992 |
throwOutOfMemoryError(env, 0); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
993 |
return NULL; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
994 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
995 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
996 |
// populate using java values |
8542 | 997 |
jByteArrayToCKByteArray(env, jCb, &ckBytes, &ckTemp); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
998 |
if ((*env)->ExceptionCheck(env) || ckTemp != 16) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
999 |
goto cleanup; |
8542 | 1000 |
} |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1001 |
memcpy(ckParamPtr->cb, ckBytes, ckTemp); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1002 |
free(ckBytes); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1003 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1004 |
ckParamPtr->ulCounterBits = jLongToCKULong(jCounterBits); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1005 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1006 |
if (pLength != NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1007 |
*pLength = sizeof(CK_AES_CTR_PARAMS); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1008 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1009 |
return ckParamPtr; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1010 |
cleanup: |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1011 |
free(ckBytes); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1012 |
free(ckParamPtr); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1013 |
return NULL; |
8542 | 1014 |
} |
1015 |
||
1016 |
/* |
|
58489
2faeaa5933a6
8229243: SunPKCS11-Solaris provider tests failing on Solaris 11.4
valeriep
parents:
58281
diff
changeset
|
1017 |
* converts the Java CK_GCM_PARAMS object to a CK_GCM_PARAMS_NO_IVBITS pointer |
2faeaa5933a6
8229243: SunPKCS11-Solaris provider tests failing on Solaris 11.4
valeriep
parents:
58281
diff
changeset
|
1018 |
* Note: Need to try NSS definition first to avoid SIGSEGV. |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1019 |
* |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1020 |
* @param env - used to call JNI funktions to get the Java classes and objects |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1021 |
* @param jParam - the Java CK_GCM_PARAMS object to convert |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1022 |
* @param pLength - length of the allocated memory of the returned pointer |
58489
2faeaa5933a6
8229243: SunPKCS11-Solaris provider tests failing on Solaris 11.4
valeriep
parents:
58281
diff
changeset
|
1023 |
* @return pointer to the new CK_GCM_PARAMS_NO_IVBITS structure |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1024 |
*/ |
58489
2faeaa5933a6
8229243: SunPKCS11-Solaris provider tests failing on Solaris 11.4
valeriep
parents:
58281
diff
changeset
|
1025 |
CK_GCM_PARAMS_NO_IVBITS_PTR |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1026 |
jGCMParamsToCKGCMParamPtr(JNIEnv *env, jobject jParam, CK_ULONG *pLength) |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1027 |
{ |
58489
2faeaa5933a6
8229243: SunPKCS11-Solaris provider tests failing on Solaris 11.4
valeriep
parents:
58281
diff
changeset
|
1028 |
CK_GCM_PARAMS_NO_IVBITS_PTR ckParamPtr; |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1029 |
jclass jGcmParamsClass; |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1030 |
jfieldID fieldID; |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1031 |
jobject jIv, jAad; |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1032 |
jlong jTagLen; |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1033 |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1034 |
TRACE0("DEBUG jGCMParamsToCKGCMParam is called\n"); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1035 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1036 |
if (pLength != NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1037 |
*pLength = 0L; |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1038 |
} |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1039 |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1040 |
// retrieve java values |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1041 |
jGcmParamsClass = (*env)->FindClass(env, CLASS_GCM_PARAMS); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1042 |
if (jGcmParamsClass == NULL) { return NULL; } |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1043 |
if (!(*env)->IsInstanceOf(env, jParam, jGcmParamsClass)) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1044 |
return NULL; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1045 |
} |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1046 |
fieldID = (*env)->GetFieldID(env, jGcmParamsClass, "iv", "[B"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1047 |
if (fieldID == NULL) { return NULL; } |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1048 |
jIv = (*env)->GetObjectField(env, jParam, fieldID); |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1049 |
fieldID = (*env)->GetFieldID(env, jGcmParamsClass, "aad", "[B"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1050 |
if (fieldID == NULL) { return NULL; } |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1051 |
jAad = (*env)->GetObjectField(env, jParam, fieldID); |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1052 |
fieldID = (*env)->GetFieldID(env, jGcmParamsClass, "tagBits", "J"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1053 |
if (fieldID == NULL) { return NULL; } |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1054 |
jTagLen = (*env)->GetLongField(env, jParam, fieldID); |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1055 |
|
58489
2faeaa5933a6
8229243: SunPKCS11-Solaris provider tests failing on Solaris 11.4
valeriep
parents:
58281
diff
changeset
|
1056 |
// allocate memory for CK_GCM_PARAMS_NO_IVBITS pointer |
2faeaa5933a6
8229243: SunPKCS11-Solaris provider tests failing on Solaris 11.4
valeriep
parents:
58281
diff
changeset
|
1057 |
ckParamPtr = calloc(1, sizeof(CK_GCM_PARAMS_NO_IVBITS)); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1058 |
if (ckParamPtr == NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1059 |
throwOutOfMemoryError(env, 0); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1060 |
return NULL; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1061 |
} |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1062 |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1063 |
// populate using java values |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1064 |
jByteArrayToCKByteArray(env, jIv, &(ckParamPtr->pIv), &(ckParamPtr->ulIvLen)); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1065 |
if ((*env)->ExceptionCheck(env)) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1066 |
goto cleanup; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1067 |
} |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1068 |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1069 |
jByteArrayToCKByteArray(env, jAad, &(ckParamPtr->pAAD), &(ckParamPtr->ulAADLen)); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1070 |
if ((*env)->ExceptionCheck(env)) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1071 |
goto cleanup; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1072 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1073 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1074 |
ckParamPtr->ulTagBits = jLongToCKULong(jTagLen); |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1075 |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1076 |
if (pLength != NULL) { |
58489
2faeaa5933a6
8229243: SunPKCS11-Solaris provider tests failing on Solaris 11.4
valeriep
parents:
58281
diff
changeset
|
1077 |
*pLength = sizeof(CK_GCM_PARAMS_NO_IVBITS); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1078 |
} |
58489
2faeaa5933a6
8229243: SunPKCS11-Solaris provider tests failing on Solaris 11.4
valeriep
parents:
58281
diff
changeset
|
1079 |
TRACE1("Created inner GCM_PARAMS PTR w/o ulIvBits %p\n", ckParamPtr); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1080 |
return ckParamPtr; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1081 |
cleanup: |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1082 |
free(ckParamPtr->pIv); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1083 |
free(ckParamPtr->pAAD); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1084 |
free(ckParamPtr); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1085 |
return NULL; |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1086 |
} |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1087 |
|
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1088 |
/* |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1089 |
* converts the Java CK_CCM_PARAMS object to a CK_CCM_PARAMS pointer |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1090 |
* |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1091 |
* @param env - used to call JNI functions to get the Java classes and objects |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1092 |
* @param jParam - the Java CK_CCM_PARAMS object to convert |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1093 |
* @param pLength - length of the allocated memory of the returned pointer |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1094 |
* @return pointer to the new CK_CCM_PARAMS structure |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1095 |
*/ |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1096 |
CK_CCM_PARAMS_PTR |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1097 |
jCCMParamsToCKCCMParamPtr(JNIEnv *env, jobject jParam, CK_ULONG *pLength) |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1098 |
{ |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1099 |
CK_CCM_PARAMS_PTR ckParamPtr; |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1100 |
jclass jCcmParamsClass; |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1101 |
jfieldID fieldID; |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1102 |
jobject jNonce, jAad; |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1103 |
jlong jDataLen, jMacLen; |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1104 |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1105 |
if (pLength != NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1106 |
*pLength = 0; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1107 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1108 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1109 |
// retrieve java values |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1110 |
jCcmParamsClass = (*env)->FindClass(env, CLASS_CCM_PARAMS); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1111 |
if (jCcmParamsClass == NULL) { return NULL; } |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1112 |
if (!(*env)->IsInstanceOf(env, jParam, jCcmParamsClass)) { |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1113 |
return NULL; |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1114 |
} |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1115 |
fieldID = (*env)->GetFieldID(env, jCcmParamsClass, "dataLen", "J"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1116 |
if (fieldID == NULL) { return NULL; } |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1117 |
jDataLen = (*env)->GetLongField(env, jParam, fieldID); |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1118 |
fieldID = (*env)->GetFieldID(env, jCcmParamsClass, "nonce", "[B"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1119 |
if (fieldID == NULL) { return NULL; } |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1120 |
jNonce = (*env)->GetObjectField(env, jParam, fieldID); |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1121 |
fieldID = (*env)->GetFieldID(env, jCcmParamsClass, "aad", "[B"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1122 |
if (fieldID == NULL) { return NULL; } |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1123 |
jAad = (*env)->GetObjectField(env, jParam, fieldID); |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1124 |
fieldID = (*env)->GetFieldID(env, jCcmParamsClass, "macLen", "J"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1125 |
if (fieldID == NULL) { return NULL; } |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1126 |
jMacLen = (*env)->GetLongField(env, jParam, fieldID); |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1127 |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1128 |
// allocate memory for CK_CCM_PARAMS pointer |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1129 |
ckParamPtr = calloc(1, sizeof(CK_CCM_PARAMS)); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1130 |
if (ckParamPtr == NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1131 |
throwOutOfMemoryError(env, 0); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1132 |
return NULL; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1133 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1134 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1135 |
// populate using java values |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1136 |
ckParamPtr->ulDataLen = jLongToCKULong(jDataLen); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1137 |
jByteArrayToCKByteArray(env, jNonce, &(ckParamPtr->pNonce), |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1138 |
&(ckParamPtr->ulNonceLen)); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1139 |
if ((*env)->ExceptionCheck(env)) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1140 |
goto cleanup; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1141 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1142 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1143 |
jByteArrayToCKByteArray(env, jAad, &(ckParamPtr->pAAD), |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1144 |
&(ckParamPtr->ulAADLen)); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1145 |
if ((*env)->ExceptionCheck(env)) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1146 |
goto cleanup; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1147 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1148 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1149 |
ckParamPtr->ulMACLen = jLongToCKULong(jMacLen); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1150 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1151 |
if (pLength != NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1152 |
*pLength = sizeof(CK_CCM_PARAMS); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1153 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1154 |
return ckParamPtr; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1155 |
cleanup: |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1156 |
free(ckParamPtr->pNonce); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1157 |
free(ckParamPtr->pAAD); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1158 |
free(ckParamPtr); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1159 |
return NULL; |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1160 |
} |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1161 |
|
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1162 |
/* |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1163 |
* converts a Java CK_MECHANISM object into a CK_MECHANISM pointer |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1164 |
* pointer. |
2 | 1165 |
* |
1166 |
* @param env - used to call JNI funktions to get the values out of the Java object |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1167 |
* @param jMech - the Java CK_MECHANISM object to convert |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1168 |
* @return pointer to the new CK_MECHANISM structure |
2 | 1169 |
*/ |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1170 |
CK_MECHANISM_PTR jMechanismToCKMechanismPtr(JNIEnv *env, jobject jMech) |
2 | 1171 |
{ |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1172 |
CK_MECHANISM_PTR ckpMech; |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1173 |
jlong jMechType = (*env)->GetLongField(env, jMech, mech_mechanismID); |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1174 |
jobject jParam = (*env)->GetObjectField(env, jMech, mech_pParameterID); |
2 | 1175 |
|
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1176 |
/* allocate memory for CK_MECHANISM_PTR */ |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1177 |
ckpMech = (CK_MECHANISM_PTR) calloc(1, sizeof(CK_MECHANISM)); |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1178 |
if (ckpMech == NULL) { |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1179 |
throwOutOfMemoryError(env, 0); |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1180 |
return NULL; |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1181 |
} |
58489
2faeaa5933a6
8229243: SunPKCS11-Solaris provider tests failing on Solaris 11.4
valeriep
parents:
58281
diff
changeset
|
1182 |
TRACE1("DEBUG jMechanismToCKMechanismPtr: allocated mech %p\n", ckpMech); |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1183 |
|
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1184 |
ckpMech->mechanism = jLongToCKULong(jMechType); |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1185 |
|
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1186 |
/* convert the specific Java mechanism parameter object to a pointer to a |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1187 |
* CK-type mechanism structure |
2 | 1188 |
*/ |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1189 |
if (jParam == NULL) { |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1190 |
ckpMech->pParameter = NULL; |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1191 |
ckpMech->ulParameterLen = 0; |
2 | 1192 |
} else { |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1193 |
ckpMech->pParameter = jMechParamToCKMechParamPtr(env, jParam, |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1194 |
ckpMech->mechanism, &(ckpMech->ulParameterLen)); |
2 | 1195 |
} |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1196 |
return ckpMech; |
2 | 1197 |
} |
1198 |
||
1199 |
/* |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1200 |
* converts the pValue of a CK_ATTRIBUTE structure into a Java Object by |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1201 |
* checking the type of the attribute. A PKCS#11 attribute value can |
2 | 1202 |
* be a CK_ULONG, CK_BYTE[], CK_CHAR[], big integer, CK_BBOOL, CK_UTF8CHAR[], |
1203 |
* CK_DATE or CK_FLAGS that gets converted to a corresponding Java object. |
|
1204 |
* |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1205 |
* @param env - used to call JNI functions to create the new Java object |
2 | 1206 |
* @param ckpAttribute - the pointer to the CK_ATTRIBUTE structure that contains the type |
1207 |
* and the pValue to convert |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1208 |
* @return the new Java object of the CK-type pValue |
2 | 1209 |
*/ |
1210 |
jobject ckAttributeValueToJObject(JNIEnv *env, const CK_ATTRIBUTE_PTR ckpAttribute) |
|
1211 |
{ |
|
1212 |
jint jValueLength; |
|
1213 |
jobject jValueObject = NULL; |
|
1214 |
||
1215 |
jValueLength = ckULongToJInt(ckpAttribute->ulValueLen); |
|
1216 |
||
1217 |
if ((jValueLength <= 0) || (ckpAttribute->pValue == NULL)) { |
|
1218 |
return NULL ; |
|
1219 |
} |
|
1220 |
||
1221 |
switch(ckpAttribute->type) { |
|
1222 |
case CKA_CLASS: |
|
1223 |
/* value CK_OBJECT_CLASS, defacto a CK_ULONG */ |
|
1224 |
case CKA_KEY_TYPE: |
|
1225 |
/* value CK_KEY_TYPE, defacto a CK_ULONG */ |
|
1226 |
case CKA_CERTIFICATE_TYPE: |
|
1227 |
/* value CK_CERTIFICATE_TYPE, defacto a CK_ULONG */ |
|
1228 |
case CKA_HW_FEATURE_TYPE: |
|
1229 |
/* value CK_HW_FEATURE_TYPE, defacto a CK_ULONG */ |
|
1230 |
case CKA_MODULUS_BITS: |
|
1231 |
case CKA_VALUE_BITS: |
|
1232 |
case CKA_VALUE_LEN: |
|
1233 |
case CKA_KEY_GEN_MECHANISM: |
|
1234 |
case CKA_PRIME_BITS: |
|
1235 |
case CKA_SUB_PRIME_BITS: |
|
1236 |
/* value CK_ULONG */ |
|
1237 |
jValueObject = ckULongPtrToJLongObject(env, (CK_ULONG*) ckpAttribute->pValue); |
|
1238 |
break; |
|
1239 |
||
1240 |
/* can be CK_BYTE[],CK_CHAR[] or big integer; defacto always CK_BYTE[] */ |
|
1241 |
case CKA_VALUE: |
|
1242 |
case CKA_OBJECT_ID: |
|
1243 |
case CKA_SUBJECT: |
|
1244 |
case CKA_ID: |
|
1245 |
case CKA_ISSUER: |
|
1246 |
case CKA_SERIAL_NUMBER: |
|
1247 |
case CKA_OWNER: |
|
1248 |
case CKA_AC_ISSUER: |
|
1249 |
case CKA_ATTR_TYPES: |
|
1250 |
case CKA_ECDSA_PARAMS: |
|
1251 |
/* CKA_EC_PARAMS is the same, these two are equivalent */ |
|
1252 |
case CKA_EC_POINT: |
|
1253 |
case CKA_PRIVATE_EXPONENT: |
|
1254 |
case CKA_PRIME_1: |
|
1255 |
case CKA_PRIME_2: |
|
1256 |
case CKA_EXPONENT_1: |
|
1257 |
case CKA_EXPONENT_2: |
|
1258 |
case CKA_COEFFICIENT: |
|
1259 |
/* value CK_BYTE[] */ |
|
1260 |
jValueObject = ckByteArrayToJByteArray(env, (CK_BYTE*) ckpAttribute->pValue, jValueLength); |
|
1261 |
break; |
|
1262 |
||
1263 |
case CKA_RESET_ON_INIT: |
|
1264 |
case CKA_HAS_RESET: |
|
1265 |
case CKA_TOKEN: |
|
1266 |
case CKA_PRIVATE: |
|
1267 |
case CKA_MODIFIABLE: |
|
1268 |
case CKA_DERIVE: |
|
1269 |
case CKA_LOCAL: |
|
1270 |
case CKA_ENCRYPT: |
|
1271 |
case CKA_VERIFY: |
|
1272 |
case CKA_VERIFY_RECOVER: |
|
1273 |
case CKA_WRAP: |
|
1274 |
case CKA_SENSITIVE: |
|
1275 |
case CKA_SECONDARY_AUTH: |
|
1276 |
case CKA_DECRYPT: |
|
1277 |
case CKA_SIGN: |
|
1278 |
case CKA_SIGN_RECOVER: |
|
1279 |
case CKA_UNWRAP: |
|
1280 |
case CKA_EXTRACTABLE: |
|
1281 |
case CKA_ALWAYS_SENSITIVE: |
|
1282 |
case CKA_NEVER_EXTRACTABLE: |
|
1283 |
case CKA_TRUSTED: |
|
1284 |
/* value CK_BBOOL */ |
|
1285 |
jValueObject = ckBBoolPtrToJBooleanObject(env, (CK_BBOOL*) ckpAttribute->pValue); |
|
1286 |
break; |
|
1287 |
||
1288 |
case CKA_LABEL: |
|
1289 |
case CKA_APPLICATION: |
|
1290 |
/* value RFC 2279 (UTF-8) string */ |
|
1291 |
jValueObject = ckUTF8CharArrayToJCharArray(env, (CK_UTF8CHAR*) ckpAttribute->pValue, jValueLength); |
|
1292 |
break; |
|
1293 |
||
1294 |
case CKA_START_DATE: |
|
1295 |
case CKA_END_DATE: |
|
1296 |
/* value CK_DATE */ |
|
1297 |
jValueObject = ckDatePtrToJDateObject(env, (CK_DATE*) ckpAttribute->pValue); |
|
1298 |
break; |
|
1299 |
||
1300 |
case CKA_MODULUS: |
|
1301 |
case CKA_PUBLIC_EXPONENT: |
|
1302 |
case CKA_PRIME: |
|
1303 |
case CKA_SUBPRIME: |
|
1304 |
case CKA_BASE: |
|
1305 |
/* value big integer, i.e. CK_BYTE[] */ |
|
1306 |
jValueObject = ckByteArrayToJByteArray(env, (CK_BYTE*) ckpAttribute->pValue, jValueLength); |
|
1307 |
break; |
|
1308 |
||
1309 |
case CKA_AUTH_PIN_FLAGS: |
|
1310 |
jValueObject = ckULongPtrToJLongObject(env, (CK_ULONG*) ckpAttribute->pValue); |
|
1311 |
/* value FLAGS, defacto a CK_ULONG */ |
|
1312 |
break; |
|
1313 |
||
1314 |
case CKA_VENDOR_DEFINED: |
|
1315 |
/* we make a CK_BYTE[] out of this */ |
|
1316 |
jValueObject = ckByteArrayToJByteArray(env, (CK_BYTE*) ckpAttribute->pValue, jValueLength); |
|
1317 |
break; |
|
1318 |
||
1319 |
// Netscape trust attributes |
|
1320 |
case CKA_NETSCAPE_TRUST_SERVER_AUTH: |
|
1321 |
case CKA_NETSCAPE_TRUST_CLIENT_AUTH: |
|
1322 |
case CKA_NETSCAPE_TRUST_CODE_SIGNING: |
|
1323 |
case CKA_NETSCAPE_TRUST_EMAIL_PROTECTION: |
|
1324 |
/* value CK_ULONG */ |
|
1325 |
jValueObject = ckULongPtrToJLongObject(env, (CK_ULONG*) ckpAttribute->pValue); |
|
1326 |
break; |
|
1327 |
||
1328 |
default: |
|
1329 |
/* we make a CK_BYTE[] out of this */ |
|
1330 |
jValueObject = ckByteArrayToJByteArray(env, (CK_BYTE*) ckpAttribute->pValue, jValueLength); |
|
1331 |
break; |
|
1332 |
} |
|
1333 |
||
1334 |
return jValueObject ; |
|
1335 |
} |
|
1336 |
||
1337 |
/* |
|
1338 |
* the following functions convert a Java mechanism parameter object to a PKCS#11 |
|
1339 |
* mechanism parameter structure |
|
1340 |
* |
|
1341 |
* CK_<Param>_PARAMS j<Param>ParamToCK<Param>Param(JNIEnv *env, |
|
1342 |
* jobject jParam); |
|
1343 |
* |
|
1344 |
* These functions get a Java object, that must be the right Java mechanism |
|
1345 |
* object and they return the new PKCS#11 mechanism parameter structure. |
|
1346 |
* Every field of the Java object is retrieved, gets converted to a corresponding |
|
1347 |
* PKCS#11 type and is set in the new PKCS#11 structure. |
|
1348 |
*/ |
|
1349 |
||
1350 |
/* |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1351 |
* converts the given Java mechanism parameter to a CK mechanism parameter |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1352 |
* pointer and store the length in bytes in the length variable. |
2 | 1353 |
* |
1354 |
* @param env - used to call JNI funktions to get the Java classes and objects |
|
1355 |
* @param jParam - the Java mechanism parameter object to convert |
|
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1356 |
* @param ckMech - the PKCS#11 mechanism type |
2 | 1357 |
* @param ckpLength - the reference of the length in bytes of the new CK mechanism parameter |
1358 |
* structure |
|
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1359 |
* @return pointer to the new CK mechanism parameter structure |
2 | 1360 |
*/ |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1361 |
CK_VOID_PTR jMechParamToCKMechParamPtr(JNIEnv *env, jobject jParam, |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1362 |
CK_MECHANISM_TYPE ckMech, CK_ULONG *ckpLength) |
2 | 1363 |
{ |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1364 |
CK_VOID_PTR ckpParamPtr; |
2 | 1365 |
if (jParam == NULL) { |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1366 |
ckpParamPtr = NULL; |
2 | 1367 |
*ckpLength = 0; |
1368 |
} else if ((*env)->IsInstanceOf(env, jParam, jByteArrayClass)) { |
|
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1369 |
jByteArrayToCKByteArray(env, jParam, (CK_BYTE_PTR *) &ckpParamPtr, ckpLength); |
2 | 1370 |
} else if ((*env)->IsInstanceOf(env, jParam, jLongClass)) { |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1371 |
ckpParamPtr = jLongObjectToCKULongPtr(env, jParam); |
2 | 1372 |
*ckpLength = sizeof(CK_ULONG); |
1373 |
} else { |
|
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1374 |
ckpParamPtr = jMechParamToCKMechParamPtrSlow(env, jParam, ckMech, ckpLength); |
2 | 1375 |
} |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1376 |
return ckpParamPtr; |
2 | 1377 |
} |
1378 |
||
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1379 |
CK_VOID_PTR jMechParamToCKMechParamPtrSlow(JNIEnv *env, jobject jParam, |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1380 |
CK_MECHANISM_TYPE ckMech, CK_ULONG *ckpLength) |
2 | 1381 |
{ |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1382 |
CK_VOID_PTR ckpParamPtr = NULL; |
2 | 1383 |
|
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1384 |
/* |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1385 |
* Most common cases, i.e. NULL/byte[]/long, are already handled by |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1386 |
* jMechParamToCKMechParam before calling this method. |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1387 |
*/ |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1388 |
TRACE1("\nDEBUG: jMechParamToCKMechParamPtrSlow, mech=0x%lX\n", ckMech); |
2 | 1389 |
|
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1390 |
switch (ckMech) { |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1391 |
case CKM_SSL3_PRE_MASTER_KEY_GEN: |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1392 |
case CKM_TLS_PRE_MASTER_KEY_GEN: |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1393 |
ckpParamPtr = jVersionToCKVersionPtr(env, jParam); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1394 |
if (ckpParamPtr != NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1395 |
*ckpLength = sizeof(CK_VERSION); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1396 |
} else { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1397 |
*ckpLength = 0; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1398 |
} |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1399 |
break; |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1400 |
case CKM_SSL3_MASTER_KEY_DERIVE: |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1401 |
case CKM_TLS_MASTER_KEY_DERIVE: |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1402 |
case CKM_SSL3_MASTER_KEY_DERIVE_DH: |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1403 |
case CKM_TLS_MASTER_KEY_DERIVE_DH: |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1404 |
ckpParamPtr = jSsl3MasterKeyDeriveParamToCKSsl3MasterKeyDeriveParamPtr(env, jParam, |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1405 |
ckpLength); |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1406 |
break; |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1407 |
case CKM_SSL3_KEY_AND_MAC_DERIVE: |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1408 |
case CKM_TLS_KEY_AND_MAC_DERIVE: |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1409 |
ckpParamPtr = jSsl3KeyMatParamToCKSsl3KeyMatParamPtr(env, jParam, |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1410 |
ckpLength); |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1411 |
break; |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1412 |
case CKM_TLS12_KEY_AND_MAC_DERIVE: |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1413 |
ckpParamPtr = jTls12KeyMatParamToCKTls12KeyMatParamPtr(env, jParam, |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1414 |
ckpLength); |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1415 |
break; |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1416 |
case CKM_TLS12_MASTER_KEY_DERIVE: |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1417 |
case CKM_TLS12_MASTER_KEY_DERIVE_DH: |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1418 |
ckpParamPtr = jTls12MasterKeyDeriveParamToCKTls12MasterKeyDeriveParamPtr(env, jParam, |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1419 |
ckpLength); |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1420 |
break; |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1421 |
case CKM_TLS_PRF: |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1422 |
case CKM_NSS_TLS_PRF_GENERAL: |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1423 |
ckpParamPtr = jTlsPrfParamsToCKTlsPrfParamPtr(env, jParam, |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1424 |
ckpLength); |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1425 |
break; |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1426 |
case CKM_TLS_MAC: |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1427 |
ckpParamPtr = jTlsMacParamsToCKTlsMacParamPtr(env, jParam, |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1428 |
ckpLength); |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1429 |
break; |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1430 |
case CKM_AES_CTR: |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1431 |
ckpParamPtr = jAesCtrParamsToCKAesCtrParamPtr(env, jParam, |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1432 |
ckpLength); |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1433 |
break; |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1434 |
case CKM_AES_GCM: |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1435 |
ckpParamPtr = jGCMParamsToCKGCMParamPtr(env, jParam, ckpLength); |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1436 |
break; |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1437 |
case CKM_AES_CCM: |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1438 |
ckpParamPtr = jCCMParamsToCKCCMParamPtr(env, jParam, ckpLength); |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1439 |
break; |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1440 |
case CKM_RSA_PKCS_OAEP: |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1441 |
ckpParamPtr = jRsaPkcsOaepParamToCKRsaPkcsOaepParamPtr(env, jParam, ckpLength); |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1442 |
break; |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1443 |
case CKM_PBE_SHA1_DES3_EDE_CBC: |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1444 |
case CKM_PBE_SHA1_DES2_EDE_CBC: |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1445 |
case CKM_PBA_SHA1_WITH_SHA1_HMAC: |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1446 |
ckpParamPtr = jPbeParamToCKPbeParamPtr(env, jParam, ckpLength); |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1447 |
break; |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1448 |
case CKM_PKCS5_PBKD2: |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1449 |
ckpParamPtr = jPkcs5Pbkd2ParamToCKPkcs5Pbkd2ParamPtr(env, jParam, ckpLength); |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1450 |
break; |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1451 |
case CKM_RSA_PKCS_PSS: |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1452 |
case CKM_SHA1_RSA_PKCS_PSS: |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1453 |
case CKM_SHA256_RSA_PKCS_PSS: |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1454 |
case CKM_SHA384_RSA_PKCS_PSS: |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1455 |
case CKM_SHA512_RSA_PKCS_PSS: |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1456 |
case CKM_SHA224_RSA_PKCS_PSS: |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1457 |
ckpParamPtr = jRsaPkcsPssParamToCKRsaPkcsPssParamPtr(env, jParam, ckpLength); |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1458 |
break; |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1459 |
case CKM_ECDH1_DERIVE: |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1460 |
case CKM_ECDH1_COFACTOR_DERIVE: |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1461 |
ckpParamPtr = jEcdh1DeriveParamToCKEcdh1DeriveParamPtr(env, jParam, ckpLength); |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1462 |
break; |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1463 |
case CKM_ECMQV_DERIVE: |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1464 |
ckpParamPtr = jEcdh2DeriveParamToCKEcdh2DeriveParamPtr(env, jParam, ckpLength); |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1465 |
break; |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1466 |
case CKM_X9_42_DH_DERIVE: |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1467 |
ckpParamPtr = jX942Dh1DeriveParamToCKX942Dh1DeriveParamPtr(env, jParam, ckpLength); |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1468 |
break; |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1469 |
case CKM_X9_42_DH_HYBRID_DERIVE: |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1470 |
case CKM_X9_42_MQV_DERIVE: |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1471 |
ckpParamPtr = jX942Dh2DeriveParamToCKX942Dh2DeriveParamPtr(env, jParam, ckpLength); |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1472 |
break; |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1473 |
// defined by pkcs11.h but we don't support |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1474 |
case CKM_KEA_DERIVE: // CK_KEA_DERIVE_PARAMS |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1475 |
case CKM_RC2_CBC: // CK_RC2_CBC_PARAMS |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1476 |
case CKM_RC2_MAC_GENERAL: // CK_RC2_MAC_GENERAL_PARAMS |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1477 |
case CKM_RC5_ECB: // CK_RC5_PARAMS |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1478 |
case CKM_RC5_MAC: // CK_RC5_PARAMS |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1479 |
case CKM_RC5_CBC: // CK_RC5_CBC_PARAMS |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1480 |
case CKM_RC5_MAC_GENERAL: // CK_RC5_MAC_GENERAL_PARAMS |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1481 |
case CKM_SKIPJACK_PRIVATE_WRAP: // CK_SKIPJACK_PRIVATE_WRAP_PARAMS |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1482 |
case CKM_SKIPJACK_RELAYX: // CK_SKIPJACK_RELAYX_PARAMS |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1483 |
case CKM_KEY_WRAP_SET_OAEP: // CK_KEY_WRAP_SET_OAEP_PARAMS |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1484 |
throwPKCS11RuntimeException(env, "No parameter support for this mchanism"); |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1485 |
break; |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1486 |
default: |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1487 |
/* if everything faild up to here */ |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1488 |
/* try if the parameter is a primitive Java type */ |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1489 |
ckpParamPtr = jObjectToPrimitiveCKObjectPtr(env, jParam, ckpLength); |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1490 |
/* *ckpParamPtr = jObjectToCKVoidPtr(jParam); */ |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1491 |
/* *ckpLength = 1; */ |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1492 |
} |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1493 |
TRACE0("\nDEBUG: jMechParamToCKMechParamPtrSlow FINISHED\n"); |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
1494 |
|
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1495 |
if ((*env)->ExceptionCheck(env)) { |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1496 |
return NULL; |
51800
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
1497 |
} |
bccd9966f1ed
8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents:
47216
diff
changeset
|
1498 |
|
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1499 |
return ckpParamPtr; |
2 | 1500 |
} |
1501 |
||
1502 |
/* |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1503 |
* converts the Java CK_RSA_PKCS_OAEP_PARAMS object to a |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1504 |
* CK_RSA_PKCS_OAEP_PARAMS pointer |
2 | 1505 |
* |
1506 |
* @param env - used to call JNI funktions to get the Java classes and objects |
|
1507 |
* @param jParam - the Java CK_RSA_PKCS_OAEP_PARAMS object to convert |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1508 |
* @param pLength - length of the allocated memory of the returned pointer |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1509 |
* @return pointer to the new CK_RSA_PKCS_OAEP_PARAMS structure |
2 | 1510 |
*/ |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1511 |
CK_RSA_PKCS_OAEP_PARAMS_PTR |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1512 |
jRsaPkcsOaepParamToCKRsaPkcsOaepParamPtr(JNIEnv *env, jobject jParam, CK_ULONG *pLength) |
2 | 1513 |
{ |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1514 |
CK_RSA_PKCS_OAEP_PARAMS_PTR ckParamPtr; |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1515 |
jclass jRsaPkcsOaepParamsClass; |
2 | 1516 |
jfieldID fieldID; |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1517 |
jlong jHashAlg, jMgf, jSource; |
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1518 |
jobject jSourceData; |
2 | 1519 |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1520 |
if (pLength!= NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1521 |
*pLength = 0L; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1522 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1523 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1524 |
// retrieve java values |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1525 |
jRsaPkcsOaepParamsClass = (*env)->FindClass(env, CLASS_RSA_PKCS_OAEP_PARAMS); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1526 |
if (jRsaPkcsOaepParamsClass == NULL) { return NULL; } |
2 | 1527 |
fieldID = (*env)->GetFieldID(env, jRsaPkcsOaepParamsClass, "hashAlg", "J"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1528 |
if (fieldID == NULL) { return NULL; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1529 |
jHashAlg = (*env)->GetLongField(env, jParam, fieldID); |
2 | 1530 |
fieldID = (*env)->GetFieldID(env, jRsaPkcsOaepParamsClass, "mgf", "J"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1531 |
if (fieldID == NULL) { return NULL; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1532 |
jMgf = (*env)->GetLongField(env, jParam, fieldID); |
2 | 1533 |
fieldID = (*env)->GetFieldID(env, jRsaPkcsOaepParamsClass, "source", "J"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1534 |
if (fieldID == NULL) { return NULL; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1535 |
jSource = (*env)->GetLongField(env, jParam, fieldID); |
2 | 1536 |
fieldID = (*env)->GetFieldID(env, jRsaPkcsOaepParamsClass, "pSourceData", "[B"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1537 |
if (fieldID == NULL) { return NULL; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1538 |
jSourceData = (*env)->GetObjectField(env, jParam, fieldID); |
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1539 |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1540 |
// allocate memory for CK_RSA_PKCS_OAEP_PARAMS pointer |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1541 |
ckParamPtr = calloc(1, sizeof(CK_RSA_PKCS_OAEP_PARAMS)); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1542 |
if (ckParamPtr == NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1543 |
throwOutOfMemoryError(env, 0); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1544 |
return NULL; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1545 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1546 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1547 |
// populate using java values |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1548 |
ckParamPtr->hashAlg = jLongToCKULong(jHashAlg); |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1549 |
ckParamPtr->mgf = jLongToCKULong(jMgf); |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1550 |
ckParamPtr->source = jLongToCKULong(jSource); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1551 |
jByteArrayToCKByteArray(env, jSourceData, (CK_BYTE_PTR*) &(ckParamPtr->pSourceData), |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1552 |
&(ckParamPtr->ulSourceDataLen)); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1553 |
if ((*env)->ExceptionCheck(env)) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1554 |
free(ckParamPtr); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1555 |
return NULL; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1556 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1557 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1558 |
if (pLength!= NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1559 |
*pLength = sizeof(CK_RSA_PKCS_OAEP_PARAMS); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1560 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1561 |
return ckParamPtr; |
2 | 1562 |
} |
1563 |
||
1564 |
/* |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1565 |
* converts the Java CK_PBE_PARAMS object to a CK_PBE_PARAMS pointer |
2 | 1566 |
* |
1567 |
* @param env - used to call JNI funktions to get the Java classes and objects |
|
1568 |
* @param jParam - the Java CK_PBE_PARAMS object to convert |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1569 |
* @param pLength - length of the allocated memory of the returned pointer |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1570 |
* @return pointer to the new CK_PBE_PARAMS structure |
2 | 1571 |
*/ |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1572 |
CK_PBE_PARAMS_PTR |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1573 |
jPbeParamToCKPbeParamPtr(JNIEnv *env, jobject jParam, CK_ULONG *pLength) |
2 | 1574 |
{ |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1575 |
CK_PBE_PARAMS_PTR ckParamPtr; |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1576 |
jclass jPbeParamsClass; |
2 | 1577 |
jfieldID fieldID; |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1578 |
jlong jIteration; |
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1579 |
jobject jInitVector, jPassword, jSalt; |
2 | 1580 |
CK_ULONG ckTemp; |
1581 |
||
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1582 |
if (pLength != NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1583 |
*pLength = 0; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1584 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1585 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1586 |
// retrieve java values |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1587 |
jPbeParamsClass = (*env)->FindClass(env, CLASS_PBE_PARAMS); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1588 |
if (jPbeParamsClass == NULL) { return NULL; } |
2 | 1589 |
fieldID = (*env)->GetFieldID(env, jPbeParamsClass, "pInitVector", "[C"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1590 |
if (fieldID == NULL) { return NULL; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1591 |
jInitVector = (*env)->GetObjectField(env, jParam, fieldID); |
2 | 1592 |
fieldID = (*env)->GetFieldID(env, jPbeParamsClass, "pPassword", "[C"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1593 |
if (fieldID == NULL) { return NULL; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1594 |
jPassword = (*env)->GetObjectField(env, jParam, fieldID); |
2 | 1595 |
fieldID = (*env)->GetFieldID(env, jPbeParamsClass, "pSalt", "[C"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1596 |
if (fieldID == NULL) { return NULL; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1597 |
jSalt = (*env)->GetObjectField(env, jParam, fieldID); |
2 | 1598 |
fieldID = (*env)->GetFieldID(env, jPbeParamsClass, "ulIteration", "J"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1599 |
if (fieldID == NULL) { return NULL; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1600 |
jIteration = (*env)->GetLongField(env, jParam, fieldID); |
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1601 |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1602 |
// allocate memory for CK_PBE_PARAMS pointer |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1603 |
ckParamPtr = calloc(1, sizeof(CK_PBE_PARAMS)); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1604 |
if (ckParamPtr == NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1605 |
throwOutOfMemoryError(env, 0); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1606 |
return NULL; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1607 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1608 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1609 |
// populate using java values |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1610 |
ckParamPtr->ulIteration = jLongToCKULong(jIteration); |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1611 |
jCharArrayToCKCharArray(env, jInitVector, &(ckParamPtr->pInitVector), &ckTemp); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1612 |
if ((*env)->ExceptionCheck(env)) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1613 |
goto cleanup; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1614 |
} |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1615 |
jCharArrayToCKCharArray(env, jPassword, &(ckParamPtr->pPassword), &(ckParamPtr->ulPasswordLen)); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1616 |
if ((*env)->ExceptionCheck(env)) { |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1617 |
goto cleanup; |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1618 |
} |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1619 |
jCharArrayToCKCharArray(env, jSalt, &(ckParamPtr->pSalt), &(ckParamPtr->ulSaltLen)); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1620 |
if ((*env)->ExceptionCheck(env)) { |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1621 |
goto cleanup; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1622 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1623 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1624 |
if (pLength != NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1625 |
*pLength = sizeof(CK_PBE_PARAMS); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1626 |
} |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1627 |
return ckParamPtr; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1628 |
cleanup: |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1629 |
free(ckParamPtr->pInitVector); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1630 |
free(ckParamPtr->pPassword); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1631 |
free(ckParamPtr->pSalt); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1632 |
free(ckParamPtr); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1633 |
return NULL; |
2 | 1634 |
} |
1635 |
||
1636 |
/* |
|
1637 |
* Copy back the initialization vector from the native structure to the |
|
1638 |
* Java object. This is only used for CKM_PBE_* mechanisms and their |
|
1639 |
* CK_PBE_PARAMS parameters. |
|
1640 |
* |
|
1641 |
*/ |
|
1642 |
void copyBackPBEInitializationVector(JNIEnv *env, CK_MECHANISM *ckMechanism, jobject jMechanism) |
|
1643 |
{ |
|
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1644 |
jclass jMechanismClass, jPbeParamsClass; |
2 | 1645 |
CK_PBE_PARAMS *ckParam; |
1646 |
jfieldID fieldID; |
|
1647 |
CK_MECHANISM_TYPE ckMechanismType; |
|
1648 |
jlong jMechanismType; |
|
1649 |
jobject jParameter; |
|
1650 |
jobject jInitVector; |
|
1651 |
jint jInitVectorLength; |
|
1652 |
CK_CHAR_PTR initVector; |
|
1653 |
int i; |
|
1654 |
jchar* jInitVectorChars; |
|
1655 |
||
1656 |
/* get mechanism */ |
|
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1657 |
jMechanismClass = (*env)->FindClass(env, CLASS_MECHANISM); |
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1658 |
if (jMechanismClass == NULL) { return; } |
2 | 1659 |
fieldID = (*env)->GetFieldID(env, jMechanismClass, "mechanism", "J"); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1660 |
if (fieldID == NULL) { return; } |
2 | 1661 |
jMechanismType = (*env)->GetLongField(env, jMechanism, fieldID); |
1662 |
ckMechanismType = jLongToCKULong(jMechanismType); |
|
1663 |
if (ckMechanismType != ckMechanism->mechanism) { |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1664 |
/* we do not have matching types, this should not occur */ |
2 | 1665 |
return; |
1666 |
} |
|
1667 |
||
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1668 |
jPbeParamsClass = (*env)->FindClass(env, CLASS_PBE_PARAMS); |
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1669 |
if (jPbeParamsClass == NULL) { return; } |
2 | 1670 |
ckParam = (CK_PBE_PARAMS *) ckMechanism->pParameter; |
1671 |
if (ckParam != NULL_PTR) { |
|
1672 |
initVector = ckParam->pInitVector; |
|
1673 |
if (initVector != NULL_PTR) { |
|
1674 |
/* get pParameter */ |
|
1675 |
fieldID = (*env)->GetFieldID(env, jMechanismClass, "pParameter", "Ljava/lang/Object;"); |
|
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1676 |
if (fieldID == NULL) { return; } |
2 | 1677 |
jParameter = (*env)->GetObjectField(env, jMechanism, fieldID); |
1678 |
fieldID = (*env)->GetFieldID(env, jPbeParamsClass, "pInitVektor", "[C"); |
|
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1679 |
if (fieldID == NULL) { return; } |
2 | 1680 |
jInitVector = (*env)->GetObjectField(env, jParameter, fieldID); |
1681 |
||
1682 |
if (jInitVector != NULL) { |
|
1683 |
jInitVectorLength = (*env)->GetArrayLength(env, jInitVector); |
|
1684 |
jInitVectorChars = (*env)->GetCharArrayElements(env, jInitVector, NULL); |
|
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1685 |
if (jInitVectorChars == NULL) { return; } |
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1686 |
|
2 | 1687 |
/* copy the chars to the Java buffer */ |
1688 |
for (i=0; i < jInitVectorLength; i++) { |
|
1689 |
jInitVectorChars[i] = ckCharToJChar(initVector[i]); |
|
1690 |
} |
|
1691 |
/* copy back the Java buffer to the object */ |
|
1692 |
(*env)->ReleaseCharArrayElements(env, jInitVector, jInitVectorChars, 0); |
|
1693 |
} |
|
1694 |
} |
|
1695 |
} |
|
1696 |
} |
|
1697 |
||
1698 |
/* |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1699 |
* converts the Java CK_PKCS5_PBKD2_PARAMS object to a CK_PKCS5_PBKD2_PARAMS |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1700 |
* pointer |
2 | 1701 |
* |
1702 |
* @param env - used to call JNI funktions to get the Java classes and objects |
|
1703 |
* @param jParam - the Java CK_PKCS5_PBKD2_PARAMS object to convert |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1704 |
* @param pLength - length of the allocated memory of the returned pointer |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1705 |
* @return pointer to the new CK_PKCS5_PBKD2_PARAMS structure |
2 | 1706 |
*/ |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1707 |
CK_PKCS5_PBKD2_PARAMS_PTR |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1708 |
jPkcs5Pbkd2ParamToCKPkcs5Pbkd2ParamPtr(JNIEnv *env, jobject jParam, CK_ULONG *pLength) |
2 | 1709 |
{ |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1710 |
CK_PKCS5_PBKD2_PARAMS_PTR ckParamPtr; |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1711 |
jclass jPkcs5Pbkd2ParamsClass; |
2 | 1712 |
jfieldID fieldID; |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1713 |
jlong jSaltSource, jIteration, jPrf; |
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1714 |
jobject jSaltSourceData, jPrfData; |
2 | 1715 |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1716 |
if (pLength != NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1717 |
*pLength = 0L; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1718 |
} |
2 | 1719 |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1720 |
// retrieve java values |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1721 |
jPkcs5Pbkd2ParamsClass = (*env)->FindClass(env, CLASS_PKCS5_PBKD2_PARAMS); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1722 |
if (jPkcs5Pbkd2ParamsClass == NULL) { return NULL; } |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1723 |
fieldID = (*env)->GetFieldID(env, jPkcs5Pbkd2ParamsClass, "saltSource", "J"); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1724 |
if (fieldID == NULL) { return NULL; } |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1725 |
jSaltSource = (*env)->GetLongField(env, jParam, fieldID); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1726 |
fieldID = (*env)->GetFieldID(env, jPkcs5Pbkd2ParamsClass, "pSaltSourceData", "[B"); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1727 |
if (fieldID == NULL) { return NULL; } |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1728 |
jSaltSourceData = (*env)->GetObjectField(env, jParam, fieldID); |
2 | 1729 |
fieldID = (*env)->GetFieldID(env, jPkcs5Pbkd2ParamsClass, "iterations", "J"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1730 |
if (fieldID == NULL) { return NULL; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1731 |
jIteration = (*env)->GetLongField(env, jParam, fieldID); |
2 | 1732 |
fieldID = (*env)->GetFieldID(env, jPkcs5Pbkd2ParamsClass, "prf", "J"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1733 |
if (fieldID == NULL) { return NULL; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1734 |
jPrf = (*env)->GetLongField(env, jParam, fieldID); |
2 | 1735 |
fieldID = (*env)->GetFieldID(env, jPkcs5Pbkd2ParamsClass, "pPrfData", "[B"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1736 |
if (fieldID == NULL) { return NULL; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1737 |
jPrfData = (*env)->GetObjectField(env, jParam, fieldID); |
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1738 |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1739 |
// allocate memory for CK_PKCS5_PBKD2_PARAMS pointer |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1740 |
ckParamPtr = calloc(1, sizeof(CK_PKCS5_PBKD2_PARAMS)); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1741 |
if (ckParamPtr == NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1742 |
throwOutOfMemoryError(env, 0); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1743 |
return NULL; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1744 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1745 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1746 |
// populate using java values |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1747 |
ckParamPtr->saltSource = jLongToCKULong(jSaltSource); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1748 |
jByteArrayToCKByteArray(env, jSaltSourceData, (CK_BYTE_PTR *) |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1749 |
&(ckParamPtr->pSaltSourceData), &(ckParamPtr->ulSaltSourceDataLen)); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1750 |
if ((*env)->ExceptionCheck(env)) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1751 |
goto cleanup; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1752 |
} |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1753 |
ckParamPtr->iterations = jLongToCKULong(jIteration); |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1754 |
ckParamPtr->prf = jLongToCKULong(jPrf); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1755 |
jByteArrayToCKByteArray(env, jPrfData, (CK_BYTE_PTR *) |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1756 |
&(ckParamPtr->pPrfData), &(ckParamPtr->ulPrfDataLen)); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1757 |
if ((*env)->ExceptionCheck(env)) { |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1758 |
goto cleanup; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1759 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1760 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1761 |
if (pLength != NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1762 |
*pLength = sizeof(CK_PKCS5_PBKD2_PARAMS); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1763 |
} |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1764 |
return ckParamPtr; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1765 |
cleanup: |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1766 |
free(ckParamPtr->pSaltSourceData); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1767 |
free(ckParamPtr->pPrfData); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1768 |
free(ckParamPtr); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1769 |
return NULL; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1770 |
|
2 | 1771 |
} |
1772 |
||
1773 |
/* |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1774 |
* converts the Java CK_RSA_PKCS_PSS_PARAMS object to a CK_RSA_PKCS_PSS_PARAMS |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1775 |
* pointer |
2 | 1776 |
* |
1777 |
* @param env - used to call JNI funktions to get the Java classes and objects |
|
1778 |
* @param jParam - the Java CK_RSA_PKCS_PSS_PARAMS object to convert |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1779 |
* @param pLength - length of the allocated memory of the returned pointer |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1780 |
* @return pointer to the new CK_RSA_PKCS_PSS_PARAMS structure |
2 | 1781 |
*/ |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1782 |
CK_RSA_PKCS_PSS_PARAMS_PTR |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1783 |
jRsaPkcsPssParamToCKRsaPkcsPssParamPtr(JNIEnv *env, jobject jParam, CK_ULONG *pLength) |
2 | 1784 |
{ |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1785 |
CK_RSA_PKCS_PSS_PARAMS_PTR ckParamPtr; |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1786 |
jclass jRsaPkcsPssParamsClass; |
2 | 1787 |
jfieldID fieldID; |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1788 |
jlong jHashAlg, jMgf, jSLen; |
2 | 1789 |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1790 |
if (pLength != NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1791 |
*pLength = 0; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1792 |
} |
2 | 1793 |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1794 |
// retrieve java values |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1795 |
jRsaPkcsPssParamsClass = (*env)->FindClass(env, CLASS_RSA_PKCS_PSS_PARAMS); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1796 |
if (jRsaPkcsPssParamsClass == NULL) { return NULL; } |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1797 |
fieldID = (*env)->GetFieldID(env, jRsaPkcsPssParamsClass, "hashAlg", "J"); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1798 |
if (fieldID == NULL) { return NULL; } |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1799 |
jHashAlg = (*env)->GetLongField(env, jParam, fieldID); |
2 | 1800 |
fieldID = (*env)->GetFieldID(env, jRsaPkcsPssParamsClass, "mgf", "J"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1801 |
if (fieldID == NULL) { return NULL; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1802 |
jMgf = (*env)->GetLongField(env, jParam, fieldID); |
2 | 1803 |
fieldID = (*env)->GetFieldID(env, jRsaPkcsPssParamsClass, "sLen", "J"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1804 |
if (fieldID == NULL) { return NULL; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1805 |
jSLen = (*env)->GetLongField(env, jParam, fieldID); |
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1806 |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1807 |
// allocate memory for CK_RSA_PKCS_PSS_PARAMS pointer |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1808 |
ckParamPtr = calloc(1, sizeof(CK_RSA_PKCS_PSS_PARAMS)); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1809 |
if (ckParamPtr == NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1810 |
throwOutOfMemoryError(env, 0); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1811 |
return NULL; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1812 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1813 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1814 |
// populate using java values |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1815 |
ckParamPtr->hashAlg = jLongToCKULong(jHashAlg); |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1816 |
ckParamPtr->mgf = jLongToCKULong(jMgf); |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1817 |
ckParamPtr->sLen = jLongToCKULong(jSLen); |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1818 |
TRACE1("DEBUG: jRsaPkcsPssParamToCKRsaPkcsPssParam, hashAlg=0x%lX\n", ckParamPtr->hashAlg); |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1819 |
TRACE1("DEBUG: jRsaPkcsPssParamToCKRsaPkcsPssParam, mgf=0x%lX\n", ckParamPtr->mgf); |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1820 |
TRACE1("DEBUG: jRsaPkcsPssParamToCKRsaPkcsPssParam, sLen=%lu\n", ckParamPtr->sLen); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1821 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1822 |
if (pLength != NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1823 |
*pLength = sizeof(CK_RSA_PKCS_PSS_PARAMS); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1824 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1825 |
return ckParamPtr; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1826 |
|
2 | 1827 |
} |
1828 |
||
1829 |
/* |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1830 |
* converts the Java CK_ECDH1_DERIVE_PARAMS object to a CK_ECDH1_DERIVE_PARAMS |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1831 |
* pointer |
2 | 1832 |
* |
1833 |
* @param env - used to call JNI funktions to get the Java classes and objects |
|
1834 |
* @param jParam - the Java CK_ECDH1_DERIVE_PARAMS object to convert |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1835 |
* @param pLength - length of the allocated memory of the returned pointer |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1836 |
* @retur pointer to nthe new CK_ECDH1_DERIVE_PARAMS structure |
2 | 1837 |
*/ |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1838 |
CK_ECDH1_DERIVE_PARAMS_PTR |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1839 |
jEcdh1DeriveParamToCKEcdh1DeriveParamPtr(JNIEnv *env, jobject jParam, CK_ULONG *pLength) |
2 | 1840 |
{ |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1841 |
CK_ECDH1_DERIVE_PARAMS_PTR ckParamPtr; |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1842 |
jclass jEcdh1DeriveParamsClass; |
2 | 1843 |
jfieldID fieldID; |
1844 |
jlong jLong; |
|
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1845 |
jobject jSharedData, jPublicData; |
2 | 1846 |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1847 |
if (pLength != NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1848 |
*pLength = 0; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1849 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1850 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1851 |
// retrieve java values |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1852 |
jEcdh1DeriveParamsClass = (*env)->FindClass(env, CLASS_ECDH1_DERIVE_PARAMS); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1853 |
if (jEcdh1DeriveParamsClass == NULL) { return NULL; } |
2 | 1854 |
fieldID = (*env)->GetFieldID(env, jEcdh1DeriveParamsClass, "kdf", "J"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1855 |
if (fieldID == NULL) { return NULL; } |
2 | 1856 |
jLong = (*env)->GetLongField(env, jParam, fieldID); |
1857 |
fieldID = (*env)->GetFieldID(env, jEcdh1DeriveParamsClass, "pSharedData", "[B"); |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1858 |
if (fieldID == NULL) { return NULL; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1859 |
jSharedData = (*env)->GetObjectField(env, jParam, fieldID); |
2 | 1860 |
fieldID = (*env)->GetFieldID(env, jEcdh1DeriveParamsClass, "pPublicData", "[B"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1861 |
if (fieldID == NULL) { return NULL; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1862 |
jPublicData = (*env)->GetObjectField(env, jParam, fieldID); |
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1863 |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1864 |
// allocate memory for CK_ECDH1_DERIVE_PARAMS pointer |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1865 |
ckParamPtr = calloc(1, sizeof(CK_ECDH1_DERIVE_PARAMS)); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1866 |
if (ckParamPtr == NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1867 |
throwOutOfMemoryError(env, 0); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1868 |
return NULL; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1869 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1870 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1871 |
// populate using java values |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1872 |
ckParamPtr->kdf = jLongToCKULong(jLong); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1873 |
jByteArrayToCKByteArray(env, jSharedData, &(ckParamPtr->pSharedData), |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1874 |
&(ckParamPtr->ulSharedDataLen)); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1875 |
if ((*env)->ExceptionCheck(env)) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1876 |
goto cleanup; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1877 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1878 |
jByteArrayToCKByteArray(env, jPublicData, &(ckParamPtr->pPublicData), |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1879 |
&(ckParamPtr->ulPublicDataLen)); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1880 |
if ((*env)->ExceptionCheck(env)) { |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1881 |
goto cleanup; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1882 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1883 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1884 |
if (pLength != NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1885 |
*pLength = sizeof(CK_ECDH1_DERIVE_PARAMS); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1886 |
} |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1887 |
return ckParamPtr; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1888 |
cleanup: |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1889 |
free(ckParamPtr->pSharedData); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1890 |
free(ckParamPtr->pPublicData); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1891 |
free(ckParamPtr); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1892 |
return NULL; |
2 | 1893 |
} |
1894 |
||
1895 |
/* |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1896 |
* converts the Java CK_ECDH2_DERIVE_PARAMS object to a CK_ECDH2_DERIVE_PARAMS |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1897 |
* pointer |
2 | 1898 |
* |
1899 |
* @param env - used to call JNI funktions to get the Java classes and objects |
|
1900 |
* @param jParam - the Java CK_ECDH2_DERIVE_PARAMS object to convert |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1901 |
* @param pLength - length of the allocated memory of the returned pointer |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1902 |
* @return pointer to the new CK_ECDH2_DERIVE_PARAMS structure |
2 | 1903 |
*/ |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1904 |
CK_ECDH2_DERIVE_PARAMS_PTR |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1905 |
jEcdh2DeriveParamToCKEcdh2DeriveParamPtr(JNIEnv *env, jobject jParam, CK_ULONG *pLength) |
2 | 1906 |
{ |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1907 |
CK_ECDH2_DERIVE_PARAMS_PTR ckParamPtr; |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1908 |
jclass jEcdh2DeriveParamsClass; |
2 | 1909 |
jfieldID fieldID; |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1910 |
jlong jKdf, jPrivateDataLen, jPrivateData; |
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1911 |
jobject jSharedData, jPublicData, jPublicData2; |
2 | 1912 |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1913 |
// retrieve java values |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1914 |
jEcdh2DeriveParamsClass = (*env)->FindClass(env, CLASS_ECDH2_DERIVE_PARAMS); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1915 |
if (jEcdh2DeriveParamsClass == NULL) { return NULL; } |
2 | 1916 |
fieldID = (*env)->GetFieldID(env, jEcdh2DeriveParamsClass, "kdf", "J"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1917 |
if (fieldID == NULL) { return NULL; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1918 |
jKdf = (*env)->GetLongField(env, jParam, fieldID); |
2 | 1919 |
fieldID = (*env)->GetFieldID(env, jEcdh2DeriveParamsClass, "pSharedData", "[B"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1920 |
if (fieldID == NULL) { return NULL; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1921 |
jSharedData = (*env)->GetObjectField(env, jParam, fieldID); |
2 | 1922 |
fieldID = (*env)->GetFieldID(env, jEcdh2DeriveParamsClass, "pPublicData", "[B"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1923 |
if (fieldID == NULL) { return NULL; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1924 |
jPublicData = (*env)->GetObjectField(env, jParam, fieldID); |
2 | 1925 |
fieldID = (*env)->GetFieldID(env, jEcdh2DeriveParamsClass, "ulPrivateDataLen", "J"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1926 |
if (fieldID == NULL) { return NULL; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1927 |
jPrivateDataLen = (*env)->GetLongField(env, jParam, fieldID); |
2 | 1928 |
fieldID = (*env)->GetFieldID(env, jEcdh2DeriveParamsClass, "hPrivateData", "J"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1929 |
if (fieldID == NULL) { return NULL; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1930 |
jPrivateData = (*env)->GetLongField(env, jParam, fieldID); |
2 | 1931 |
fieldID = (*env)->GetFieldID(env, jEcdh2DeriveParamsClass, "pPublicData2", "[B"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1932 |
if (fieldID == NULL) { return NULL; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1933 |
jPublicData2 = (*env)->GetObjectField(env, jParam, fieldID); |
2 | 1934 |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1935 |
// allocate memory for CK_ECDH2_DERIVE_PARAMS pointer |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1936 |
ckParamPtr = calloc(1, sizeof(CK_ECDH2_DERIVE_PARAMS)); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1937 |
if (ckParamPtr == NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1938 |
throwOutOfMemoryError(env, 0); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1939 |
return NULL; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1940 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1941 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1942 |
// populate using java values |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1943 |
ckParamPtr->kdf = jLongToCKULong(jKdf); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1944 |
jByteArrayToCKByteArray(env, jSharedData, &(ckParamPtr->pSharedData), |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1945 |
&(ckParamPtr->ulSharedDataLen)); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1946 |
if ((*env)->ExceptionCheck(env)) { |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1947 |
goto cleanup; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1948 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1949 |
jByteArrayToCKByteArray(env, jPublicData, &(ckParamPtr->pPublicData), |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1950 |
&(ckParamPtr->ulPublicDataLen)); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1951 |
if ((*env)->ExceptionCheck(env)) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1952 |
goto cleanup; |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1953 |
} |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1954 |
ckParamPtr->ulPrivateDataLen = jLongToCKULong(jPrivateDataLen); |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
1955 |
ckParamPtr->hPrivateData = jLongToCKULong(jPrivateData); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1956 |
jByteArrayToCKByteArray(env, jPublicData2, &(ckParamPtr->pPublicData2), |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1957 |
&(ckParamPtr->ulPublicDataLen2)); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1958 |
if ((*env)->ExceptionCheck(env)) { |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1959 |
goto cleanup; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1960 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1961 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1962 |
if (pLength != NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1963 |
*pLength = sizeof(CK_ECDH2_DERIVE_PARAMS); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1964 |
} |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1965 |
return ckParamPtr; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1966 |
cleanup: |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1967 |
free(ckParamPtr->pSharedData); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1968 |
free(ckParamPtr->pPublicData); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1969 |
free(ckParamPtr->pPublicData2); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1970 |
free(ckParamPtr); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1971 |
return NULL; |
2 | 1972 |
} |
1973 |
||
1974 |
/* |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1975 |
* converts the Java CK_X9_42_DH1_DERIVE_PARAMS object to a |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1976 |
* CK_X9_42_DH1_DERIVE_PARAMS pointer |
2 | 1977 |
* |
1978 |
* @param env - used to call JNI funktions to get the Java classes and objects |
|
1979 |
* @param jParam - the Java CK_X9_42_DH1_DERIVE_PARAMS object to convert |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1980 |
* @param pLength - length of the allocated memory of the returned pointer |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1981 |
* @return pointer to the new CK_X9_42_DH1_DERIVE_PARAMS structure |
2 | 1982 |
*/ |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1983 |
CK_X9_42_DH1_DERIVE_PARAMS_PTR |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1984 |
jX942Dh1DeriveParamToCKX942Dh1DeriveParamPtr(JNIEnv *env, jobject jParam, CK_ULONG *pLength) |
2 | 1985 |
{ |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1986 |
CK_X9_42_DH1_DERIVE_PARAMS_PTR ckParamPtr; |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1987 |
jclass jX942Dh1DeriveParamsClass; |
2 | 1988 |
jfieldID fieldID; |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1989 |
jlong jKdf; |
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
1990 |
jobject jOtherInfo, jPublicData; |
2 | 1991 |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1992 |
if (pLength != NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1993 |
*pLength = 0; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1994 |
} |
2 | 1995 |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1996 |
// retrieve java values |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1997 |
jX942Dh1DeriveParamsClass = (*env)->FindClass(env, CLASS_X9_42_DH1_DERIVE_PARAMS); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1998 |
if (jX942Dh1DeriveParamsClass == NULL) { return NULL; } |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
1999 |
fieldID = (*env)->GetFieldID(env, jX942Dh1DeriveParamsClass, "kdf", "J"); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2000 |
if (fieldID == NULL) { return NULL; } |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2001 |
jKdf = (*env)->GetLongField(env, jParam, fieldID); |
2 | 2002 |
fieldID = (*env)->GetFieldID(env, jX942Dh1DeriveParamsClass, "pOtherInfo", "[B"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2003 |
if (fieldID == NULL) { return NULL; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
2004 |
jOtherInfo = (*env)->GetObjectField(env, jParam, fieldID); |
2 | 2005 |
fieldID = (*env)->GetFieldID(env, jX942Dh1DeriveParamsClass, "pPublicData", "[B"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2006 |
if (fieldID == NULL) { return NULL; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
2007 |
jPublicData = (*env)->GetObjectField(env, jParam, fieldID); |
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
2008 |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2009 |
// allocate memory for CK_X9_42_DH1_DERIVE_PARAMS pointer |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2010 |
ckParamPtr = calloc(1, sizeof(CK_X9_42_DH1_DERIVE_PARAMS)); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2011 |
if (ckParamPtr == NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2012 |
throwOutOfMemoryError(env, 0); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2013 |
return NULL; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2014 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2015 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2016 |
// populate using java values |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
2017 |
ckParamPtr->kdf = jLongToCKULong(jKdf); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2018 |
jByteArrayToCKByteArray(env, jOtherInfo, &(ckParamPtr->pOtherInfo), |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2019 |
&(ckParamPtr->ulOtherInfoLen)); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2020 |
if ((*env)->ExceptionCheck(env)) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2021 |
goto cleanup; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2022 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2023 |
jByteArrayToCKByteArray(env, jPublicData, &(ckParamPtr->pPublicData), |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2024 |
&(ckParamPtr->ulPublicDataLen)); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
2025 |
if ((*env)->ExceptionCheck(env)) { |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2026 |
goto cleanup; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2027 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2028 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2029 |
if (pLength != NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2030 |
*pLength = sizeof(CK_X9_42_DH1_DERIVE_PARAMS); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
2031 |
} |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2032 |
return ckParamPtr; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2033 |
cleanup: |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2034 |
free(ckParamPtr->pOtherInfo); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2035 |
free(ckParamPtr->pPublicData); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2036 |
free(ckParamPtr); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2037 |
return NULL; |
2 | 2038 |
} |
2039 |
||
2040 |
/* |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2041 |
* converts the Java CK_X9_42_DH2_DERIVE_PARAMS object to a |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2042 |
* CK_X9_42_DH2_DERIVE_PARAMS pointer |
2 | 2043 |
* |
2044 |
* @param env - used to call JNI funktions to get the Java classes and objects |
|
2045 |
* @param jParam - the Java CK_X9_42_DH2_DERIVE_PARAMS object to convert |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2046 |
* @param pLength - length of the allocated memory of the returned pointer |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2047 |
* @return pointer to the new CK_X9_42_DH2_DERIVE_PARAMS structure |
2 | 2048 |
*/ |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2049 |
CK_X9_42_DH2_DERIVE_PARAMS_PTR |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2050 |
jX942Dh2DeriveParamToCKX942Dh2DeriveParamPtr(JNIEnv *env, jobject jParam, CK_ULONG *pLength) |
2 | 2051 |
{ |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2052 |
CK_X9_42_DH2_DERIVE_PARAMS_PTR ckParamPtr; |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
2053 |
jclass jX942Dh2DeriveParamsClass; |
2 | 2054 |
jfieldID fieldID; |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
2055 |
jlong jKdf, jPrivateDataLen, jPrivateData; |
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
2056 |
jobject jOtherInfo, jPublicData, jPublicData2; |
2 | 2057 |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2058 |
if (pLength != NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2059 |
*pLength = 0L; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2060 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2061 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2062 |
// retrieve java values |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
2063 |
jX942Dh2DeriveParamsClass = (*env)->FindClass(env, CLASS_X9_42_DH2_DERIVE_PARAMS); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2064 |
if (jX942Dh2DeriveParamsClass == NULL) { return NULL; } |
2 | 2065 |
fieldID = (*env)->GetFieldID(env, jX942Dh2DeriveParamsClass, "kdf", "J"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2066 |
if (fieldID == NULL) { return NULL; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
2067 |
jKdf = (*env)->GetLongField(env, jParam, fieldID); |
2 | 2068 |
fieldID = (*env)->GetFieldID(env, jX942Dh2DeriveParamsClass, "pOtherInfo", "[B"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2069 |
if (fieldID == NULL) { return NULL; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
2070 |
jOtherInfo = (*env)->GetObjectField(env, jParam, fieldID); |
2 | 2071 |
fieldID = (*env)->GetFieldID(env, jX942Dh2DeriveParamsClass, "pPublicData", "[B"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2072 |
if (fieldID == NULL) { return NULL; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
2073 |
jPublicData = (*env)->GetObjectField(env, jParam, fieldID); |
2 | 2074 |
fieldID = (*env)->GetFieldID(env, jX942Dh2DeriveParamsClass, "ulPrivateDataLen", "J"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2075 |
if (fieldID == NULL) { return NULL; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
2076 |
jPrivateDataLen = (*env)->GetLongField(env, jParam, fieldID); |
2 | 2077 |
fieldID = (*env)->GetFieldID(env, jX942Dh2DeriveParamsClass, "hPrivateData", "J"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2078 |
if (fieldID == NULL) { return NULL; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
2079 |
jPrivateData = (*env)->GetLongField(env, jParam, fieldID); |
2 | 2080 |
fieldID = (*env)->GetFieldID(env, jX942Dh2DeriveParamsClass, "pPublicData2", "[B"); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2081 |
if (fieldID == NULL) { return NULL; } |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
2082 |
jPublicData2 = (*env)->GetObjectField(env, jParam, fieldID); |
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
2083 |
|
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2084 |
// allocate memory for CK_DATE pointer |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2085 |
ckParamPtr = calloc(1, sizeof(CK_X9_42_DH2_DERIVE_PARAMS)); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2086 |
if (ckParamPtr == NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2087 |
throwOutOfMemoryError(env, 0); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2088 |
return NULL; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2089 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2090 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2091 |
// populate using java values |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
2092 |
ckParamPtr->kdf = jLongToCKULong(jKdf); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2093 |
jByteArrayToCKByteArray(env, jOtherInfo, &(ckParamPtr->pOtherInfo), |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2094 |
&(ckParamPtr->ulOtherInfoLen)); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
2095 |
if ((*env)->ExceptionCheck(env)) { |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2096 |
goto cleanup; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2097 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2098 |
jByteArrayToCKByteArray(env, jPublicData, &(ckParamPtr->pPublicData), |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2099 |
&(ckParamPtr->ulPublicDataLen)); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2100 |
if ((*env)->ExceptionCheck(env)) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2101 |
goto cleanup; |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
2102 |
} |
55332
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
2103 |
ckParamPtr->ulPrivateDataLen = jLongToCKULong(jPrivateDataLen); |
f492567244ab
8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents:
51802
diff
changeset
|
2104 |
ckParamPtr->hPrivateData = jLongToCKULong(jPrivateData); |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2105 |
jByteArrayToCKByteArray(env, jPublicData2, &(ckParamPtr->pPublicData2), |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2106 |
&(ckParamPtr->ulPublicDataLen2)); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
2107 |
if ((*env)->ExceptionCheck(env)) { |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2108 |
goto cleanup; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2109 |
} |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2110 |
|
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2111 |
if (pLength != NULL) { |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2112 |
*pLength = sizeof(CK_X9_42_DH2_DERIVE_PARAMS); |
2180
9994f4f08a59
6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents:
2
diff
changeset
|
2113 |
} |
57737
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2114 |
return ckParamPtr; |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2115 |
cleanup: |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2116 |
free(ckParamPtr->pOtherInfo); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2117 |
free(ckParamPtr->pPublicData); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2118 |
free(ckParamPtr->pPublicData2); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2119 |
free(ckParamPtr); |
6bbb4af131e3
8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents:
55332
diff
changeset
|
2120 |
return NULL; |
2 | 2121 |
} |