src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_convert.c
author chegar
Thu, 17 Oct 2019 20:54:25 +0100
branchdatagramsocketimpl-branch
changeset 58679 9c3209ff7550
parent 58678 9cf78a70fa4f
parent 58489 2faeaa5933a6
permissions -rw-r--r--
datagramsocketimpl-branch: merge with default
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     1
/*
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
     2
 * Copyright (c) 2003, 2019, Oracle and/or its affiliates. All rights reserved.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     3
 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
     4
90ce3da70b43 Initial load
duke
parents:
diff changeset
     5
/* Copyright  (c) 2002 Graz University of Technology. All rights reserved.
90ce3da70b43 Initial load
duke
parents:
diff changeset
     6
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
     7
 * Redistribution and use in  source and binary forms, with or without
90ce3da70b43 Initial load
duke
parents:
diff changeset
     8
 * modification, are permitted  provided that the following conditions are met:
90ce3da70b43 Initial load
duke
parents:
diff changeset
     9
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    10
 * 1. Redistributions of  source code must retain the above copyright notice,
90ce3da70b43 Initial load
duke
parents:
diff changeset
    11
 *    this list of conditions and the following disclaimer.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    12
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    13
 * 2. Redistributions in  binary form must reproduce the above copyright notice,
90ce3da70b43 Initial load
duke
parents:
diff changeset
    14
 *    this list of conditions and the following disclaimer in the documentation
90ce3da70b43 Initial load
duke
parents:
diff changeset
    15
 *    and/or other materials provided with the distribution.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    16
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    17
 * 3. The end-user documentation included with the redistribution, if any, must
90ce3da70b43 Initial load
duke
parents:
diff changeset
    18
 *    include the following acknowledgment:
90ce3da70b43 Initial load
duke
parents:
diff changeset
    19
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    20
 *    "This product includes software developed by IAIK of Graz University of
90ce3da70b43 Initial load
duke
parents:
diff changeset
    21
 *     Technology."
90ce3da70b43 Initial load
duke
parents:
diff changeset
    22
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    23
 *    Alternately, this acknowledgment may appear in the software itself, if
90ce3da70b43 Initial load
duke
parents:
diff changeset
    24
 *    and wherever such third-party acknowledgments normally appear.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    25
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    26
 * 4. The names "Graz University of Technology" and "IAIK of Graz University of
90ce3da70b43 Initial load
duke
parents:
diff changeset
    27
 *    Technology" must not be used to endorse or promote products derived from
90ce3da70b43 Initial load
duke
parents:
diff changeset
    28
 *    this software without prior written permission.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    29
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    30
 * 5. Products derived from this software may not be called
90ce3da70b43 Initial load
duke
parents:
diff changeset
    31
 *    "IAIK PKCS Wrapper", nor may "IAIK" appear in their name, without prior
90ce3da70b43 Initial load
duke
parents:
diff changeset
    32
 *    written permission of Graz University of Technology.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    33
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    34
 *  THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESSED OR IMPLIED
90ce3da70b43 Initial load
duke
parents:
diff changeset
    35
 *  WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
90ce3da70b43 Initial load
duke
parents:
diff changeset
    36
 *  WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
90ce3da70b43 Initial load
duke
parents:
diff changeset
    37
 *  PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE LICENSOR BE
90ce3da70b43 Initial load
duke
parents:
diff changeset
    38
 *  LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
90ce3da70b43 Initial load
duke
parents:
diff changeset
    39
 *  OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
90ce3da70b43 Initial load
duke
parents:
diff changeset
    40
 *  PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,
90ce3da70b43 Initial load
duke
parents:
diff changeset
    41
 *  OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
90ce3da70b43 Initial load
duke
parents:
diff changeset
    42
 *  ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
90ce3da70b43 Initial load
duke
parents:
diff changeset
    43
 *  OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
90ce3da70b43 Initial load
duke
parents:
diff changeset
    44
 *  OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
90ce3da70b43 Initial load
duke
parents:
diff changeset
    45
 *  POSSIBILITY  OF SUCH DAMAGE.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    46
 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
    47
90ce3da70b43 Initial load
duke
parents:
diff changeset
    48
/*
90ce3da70b43 Initial load
duke
parents:
diff changeset
    49
 * pkcs11wrapper.c
90ce3da70b43 Initial load
duke
parents:
diff changeset
    50
 * 18.05.2001
90ce3da70b43 Initial load
duke
parents:
diff changeset
    51
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    52
 * This is the implementation of the native functions of the Java to PKCS#11 interface.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    53
 * All function use some helper functions to convert the JNI types to PKCS#11 types.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    54
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    55
 * @author Karl Scheibelhofer <Karl.Scheibelhofer@iaik.at>
90ce3da70b43 Initial load
duke
parents:
diff changeset
    56
 * @author Martin Schlaeffer <schlaeff@sbox.tugraz.at>
90ce3da70b43 Initial load
duke
parents:
diff changeset
    57
 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
    58
90ce3da70b43 Initial load
duke
parents:
diff changeset
    59
90ce3da70b43 Initial load
duke
parents:
diff changeset
    60
#include "pkcs11wrapper.h"
90ce3da70b43 Initial load
duke
parents:
diff changeset
    61
90ce3da70b43 Initial load
duke
parents:
diff changeset
    62
#include <stdio.h>
90ce3da70b43 Initial load
duke
parents:
diff changeset
    63
#include <stdlib.h>
90ce3da70b43 Initial load
duke
parents:
diff changeset
    64
#include <string.h>
90ce3da70b43 Initial load
duke
parents:
diff changeset
    65
#include <assert.h>
90ce3da70b43 Initial load
duke
parents:
diff changeset
    66
90ce3da70b43 Initial load
duke
parents:
diff changeset
    67
#include "sun_security_pkcs11_wrapper_PKCS11.h"
90ce3da70b43 Initial load
duke
parents:
diff changeset
    68
90ce3da70b43 Initial load
duke
parents:
diff changeset
    69
/* declare file private functions */
90ce3da70b43 Initial load
duke
parents:
diff changeset
    70
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
    71
CK_VOID_PTR jMechParamToCKMechParamPtrSlow(JNIEnv *env, jobject jParam,
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
    72
        CK_MECHANISM_TYPE ckMech, CK_ULONG *ckpLength);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    73
90ce3da70b43 Initial load
duke
parents:
diff changeset
    74
90ce3da70b43 Initial load
duke
parents:
diff changeset
    75
/*
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
    76
 * converts a CK_DATE pointer into a Java CK_DATE Object.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    77
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    78
 * @param env - used to call JNI funktions to create the new Java object
90ce3da70b43 Initial load
duke
parents:
diff changeset
    79
 * @param ckpValue - the pointer to the CK_DATE structure
90ce3da70b43 Initial load
duke
parents:
diff changeset
    80
 * @return - the new Java CK_DATE object
90ce3da70b43 Initial load
duke
parents:
diff changeset
    81
 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
    82
jobject ckDatePtrToJDateObject(JNIEnv *env, const CK_DATE *ckpDate)
90ce3da70b43 Initial load
duke
parents:
diff changeset
    83
{
90ce3da70b43 Initial load
duke
parents:
diff changeset
    84
    jclass jDateClass;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    85
    jmethodID jCtrId;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    86
    jobject jDateObject;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    87
    jcharArray jYear;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    88
    jcharArray jMonth;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    89
    jcharArray jDay;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    90
90ce3da70b43 Initial load
duke
parents:
diff changeset
    91
    /* load CK_DATE class */
90ce3da70b43 Initial load
duke
parents:
diff changeset
    92
    jDateClass = (*env)->FindClass(env, CLASS_DATE);
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
    93
    if (jDateClass == NULL) { return NULL; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    94
90ce3da70b43 Initial load
duke
parents:
diff changeset
    95
    /* load CK_DATE constructor */
90ce3da70b43 Initial load
duke
parents:
diff changeset
    96
    jCtrId = (*env)->GetMethodID(env, jDateClass, "<init>", "([C[C[C)V");
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
    97
    if (jCtrId == NULL) { return NULL; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    98
90ce3da70b43 Initial load
duke
parents:
diff changeset
    99
    /* prep all fields */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   100
    jYear = ckCharArrayToJCharArray(env, (CK_CHAR_PTR)(ckpDate->year), 4);
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   101
    if (jYear == NULL) { return NULL; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   102
    jMonth = ckCharArrayToJCharArray(env, (CK_CHAR_PTR)(ckpDate->month), 2);
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   103
    if (jMonth == NULL) { return NULL; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   104
    jDay = ckCharArrayToJCharArray(env, (CK_CHAR_PTR)(ckpDate->day), 2);
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   105
    if (jDay == NULL) { return NULL; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   106
90ce3da70b43 Initial load
duke
parents:
diff changeset
   107
    /* create new CK_DATE object */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   108
    jDateObject =
90ce3da70b43 Initial load
duke
parents:
diff changeset
   109
      (*env)->NewObject(env, jDateClass, jCtrId, jYear, jMonth, jDay);
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   110
    if (jDateObject == NULL) { return NULL; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   111
90ce3da70b43 Initial load
duke
parents:
diff changeset
   112
    /* free local references */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   113
    (*env)->DeleteLocalRef(env, jDateClass);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   114
    (*env)->DeleteLocalRef(env, jYear);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   115
    (*env)->DeleteLocalRef(env, jMonth);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   116
    (*env)->DeleteLocalRef(env, jDay);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   117
90ce3da70b43 Initial load
duke
parents:
diff changeset
   118
    return jDateObject ;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   119
}
90ce3da70b43 Initial load
duke
parents:
diff changeset
   120
90ce3da70b43 Initial load
duke
parents:
diff changeset
   121
/*
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   122
 * converts a CK_VERSION pointer into a Java CK_VERSION Object.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   123
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   124
 * @param env - used to call JNI funktions to create the new Java object
90ce3da70b43 Initial load
duke
parents:
diff changeset
   125
 * @param ckpVersion - the pointer to the CK_VERSION structure
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   126
 * @return the new Java CK_VERSION object
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   127
 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   128
jobject ckVersionPtrToJVersion(JNIEnv *env, const CK_VERSION_PTR ckpVersion)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   129
{
90ce3da70b43 Initial load
duke
parents:
diff changeset
   130
    jclass jVersionClass;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   131
    jmethodID jCtrId;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   132
    jobject jVersionObject;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   133
    jint jMajor;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   134
    jint jMinor;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   135
90ce3da70b43 Initial load
duke
parents:
diff changeset
   136
    /* load CK_VERSION class */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   137
    jVersionClass = (*env)->FindClass(env, CLASS_VERSION);
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   138
    if (jVersionClass == NULL) { return NULL; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   139
90ce3da70b43 Initial load
duke
parents:
diff changeset
   140
    /* load CK_VERSION constructor */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   141
    jCtrId = (*env)->GetMethodID(env, jVersionClass, "<init>", "(II)V");
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   142
    if (jCtrId == NULL) { return NULL; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   143
90ce3da70b43 Initial load
duke
parents:
diff changeset
   144
    /* prep both fields */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   145
    jMajor = ckpVersion->major;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   146
    jMinor = ckpVersion->minor;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   147
90ce3da70b43 Initial load
duke
parents:
diff changeset
   148
    /* create new CK_VERSION object */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   149
    jVersionObject =
90ce3da70b43 Initial load
duke
parents:
diff changeset
   150
      (*env)->NewObject(env, jVersionClass, jCtrId, jMajor, jMinor);
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   151
    if (jVersionObject == NULL) { return NULL; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   152
90ce3da70b43 Initial load
duke
parents:
diff changeset
   153
    /* free local references */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   154
    (*env)->DeleteLocalRef(env, jVersionClass);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   155
90ce3da70b43 Initial load
duke
parents:
diff changeset
   156
    return jVersionObject ;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   157
}
90ce3da70b43 Initial load
duke
parents:
diff changeset
   158
90ce3da70b43 Initial load
duke
parents:
diff changeset
   159
/*
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   160
 * converts a CK_SESSION_INFO pointer into a Java CK_SESSION_INFO Object.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   161
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   162
 * @param env - used to call JNI funktions to create the new Java object
90ce3da70b43 Initial load
duke
parents:
diff changeset
   163
 * @param ckpSessionInfo - the pointer to the CK_SESSION_INFO structure
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   164
 * @return the new Java CK_SESSION_INFO object
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   165
 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   166
jobject ckSessionInfoPtrToJSessionInfo(JNIEnv *env, const CK_SESSION_INFO_PTR ckpSessionInfo)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   167
{
90ce3da70b43 Initial load
duke
parents:
diff changeset
   168
    jclass jSessionInfoClass;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   169
    jmethodID jCtrId;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   170
    jobject jSessionInfoObject;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   171
    jlong jSlotID;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   172
    jlong jState;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   173
    jlong jFlags;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   174
    jlong jDeviceError;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   175
90ce3da70b43 Initial load
duke
parents:
diff changeset
   176
    /* load CK_SESSION_INFO class */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   177
    jSessionInfoClass = (*env)->FindClass(env, CLASS_SESSION_INFO);
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   178
    if (jSessionInfoClass == NULL) { return NULL; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   179
90ce3da70b43 Initial load
duke
parents:
diff changeset
   180
    /* load CK_SESSION_INFO constructor */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   181
    jCtrId = (*env)->GetMethodID(env, jSessionInfoClass, "<init>", "(JJJJ)V");
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   182
    if (jCtrId == NULL) { return NULL; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   183
90ce3da70b43 Initial load
duke
parents:
diff changeset
   184
    /* prep all fields */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   185
    jSlotID = ckULongToJLong(ckpSessionInfo->slotID);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   186
    jState = ckULongToJLong(ckpSessionInfo->state);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   187
    jFlags = ckULongToJLong(ckpSessionInfo->flags);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   188
    jDeviceError = ckULongToJLong(ckpSessionInfo->ulDeviceError);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   189
90ce3da70b43 Initial load
duke
parents:
diff changeset
   190
    /* create new CK_SESSION_INFO object */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   191
    jSessionInfoObject =
90ce3da70b43 Initial load
duke
parents:
diff changeset
   192
      (*env)->NewObject(env, jSessionInfoClass, jCtrId, jSlotID, jState,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   193
                        jFlags, jDeviceError);
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   194
    if (jSessionInfoObject == NULL) { return NULL; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   195
90ce3da70b43 Initial load
duke
parents:
diff changeset
   196
    /* free local references */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   197
    (*env)->DeleteLocalRef(env, jSessionInfoClass);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   198
90ce3da70b43 Initial load
duke
parents:
diff changeset
   199
    return jSessionInfoObject ;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   200
}
90ce3da70b43 Initial load
duke
parents:
diff changeset
   201
90ce3da70b43 Initial load
duke
parents:
diff changeset
   202
/*
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   203
 * converts a CK_ATTRIBUTE pointer into a Java CK_ATTRIBUTE Object.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   204
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   205
 * @param env - used to call JNI funktions to create the new Java object
90ce3da70b43 Initial load
duke
parents:
diff changeset
   206
 * @param ckpAttribute - the pointer to the CK_ATTRIBUTE structure
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   207
 * @return the new Java CK_ATTRIBUTE object
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   208
 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   209
jobject ckAttributePtrToJAttribute(JNIEnv *env, const CK_ATTRIBUTE_PTR ckpAttribute)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   210
{
90ce3da70b43 Initial load
duke
parents:
diff changeset
   211
    jclass jAttributeClass;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   212
    jmethodID jCtrId;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   213
    jobject jAttributeObject;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   214
    jlong jType;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   215
    jobject jPValue = NULL;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   216
90ce3da70b43 Initial load
duke
parents:
diff changeset
   217
    jAttributeClass = (*env)->FindClass(env, CLASS_ATTRIBUTE);
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   218
    if (jAttributeClass == NULL) { return NULL; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   219
90ce3da70b43 Initial load
duke
parents:
diff changeset
   220
    /* load CK_INFO constructor */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   221
    jCtrId = (*env)->GetMethodID(env, jAttributeClass, "<init>", "(JLjava/lang/Object;)V");
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   222
    if (jCtrId == NULL) { return NULL; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   223
90ce3da70b43 Initial load
duke
parents:
diff changeset
   224
    /* prep both fields */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   225
    jType = ckULongToJLong(ckpAttribute->type);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   226
    jPValue = ckAttributeValueToJObject(env, ckpAttribute);
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   227
    if ((*env)->ExceptionCheck(env)) { return NULL; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   228
90ce3da70b43 Initial load
duke
parents:
diff changeset
   229
    /* create new CK_ATTRIBUTE object */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   230
    jAttributeObject =
90ce3da70b43 Initial load
duke
parents:
diff changeset
   231
      (*env)->NewObject(env, jAttributeClass, jCtrId, jType, jPValue);
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   232
    if (jAttributeObject == NULL) { return NULL; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   233
90ce3da70b43 Initial load
duke
parents:
diff changeset
   234
    /* free local references */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   235
    (*env)->DeleteLocalRef(env, jAttributeClass);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   236
    (*env)->DeleteLocalRef(env, jPValue);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   237
90ce3da70b43 Initial load
duke
parents:
diff changeset
   238
    return jAttributeObject;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   239
}
90ce3da70b43 Initial load
duke
parents:
diff changeset
   240
90ce3da70b43 Initial load
duke
parents:
diff changeset
   241
90ce3da70b43 Initial load
duke
parents:
diff changeset
   242
/*
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   243
 * converts a Java CK_VERSION object into a CK_VERSION pointer
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   244
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   245
 * @param env - used to call JNI funktions to get the values out of the Java object
90ce3da70b43 Initial load
duke
parents:
diff changeset
   246
 * @param jVersion - the Java CK_VERSION object to convert
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   247
 * @return pointer to the new CK_VERSION structure
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   248
 */
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   249
CK_VERSION_PTR
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   250
jVersionToCKVersionPtr(JNIEnv *env, jobject jVersion)
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   251
{
90ce3da70b43 Initial load
duke
parents:
diff changeset
   252
    CK_VERSION_PTR ckpVersion;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   253
    jclass jVersionClass;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   254
    jfieldID jFieldID;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   255
    jbyte jMajor, jMinor;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   256
90ce3da70b43 Initial load
duke
parents:
diff changeset
   257
    if (jVersion == NULL) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   258
        return NULL;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   259
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   260
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   261
    // retrieve java values
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   262
    jVersionClass = (*env)->GetObjectClass(env, jVersion);
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   263
    if (jVersionClass == NULL) { return NULL; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   264
    jFieldID = (*env)->GetFieldID(env, jVersionClass, "major", "B");
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   265
    if (jFieldID == NULL) { return NULL; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   266
    jMajor = (*env)->GetByteField(env, jVersion, jFieldID);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   267
    jFieldID = (*env)->GetFieldID(env, jVersionClass, "minor", "B");
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   268
    if (jFieldID == NULL) { return NULL; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   269
    jMinor = (*env)->GetByteField(env, jVersion, jFieldID);
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   270
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   271
    // allocate memory for CK_VERSION pointer
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   272
    ckpVersion = (CK_VERSION_PTR) calloc(1, sizeof(CK_VERSION));
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   273
    if (ckpVersion == NULL) {
10798
413b731e1818 7103549: Remove dependencies on libjava and libjvm from security libraries
chegar
parents: 8542
diff changeset
   274
        throwOutOfMemoryError(env, 0);
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   275
        return NULL;
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   276
    }
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   277
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   278
    // populate using java values
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   279
    ckpVersion->major = jByteToCKByte(jMajor);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   280
    ckpVersion->minor = jByteToCKByte(jMinor);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   281
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   282
    return ckpVersion;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   283
}
90ce3da70b43 Initial load
duke
parents:
diff changeset
   284
90ce3da70b43 Initial load
duke
parents:
diff changeset
   285
90ce3da70b43 Initial load
duke
parents:
diff changeset
   286
/*
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   287
 * converts a Java CK_DATE object into a CK_DATE pointer
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   288
 *
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   289
 * @param env - used to call JNI functions to get the values out of the Java object
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   290
 * @param jDate - the Java CK_DATE object to convert
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   291
 * @return pointer to the new CK_DATE structure
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   292
 */
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   293
CK_DATE * jDateObjectToCKDatePtr(JNIEnv *env, jobject jDate)
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   294
{
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   295
    CK_DATE * ckpDate = NULL;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   296
    CK_ULONG ckLength;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   297
    jclass jDateClass;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   298
    jfieldID jFieldID;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   299
    jobject jYear, jMonth, jDay;
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   300
    jchar *jTempChars = NULL;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   301
    CK_ULONG i;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   302
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   303
    if (jDate == NULL) {
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   304
        return NULL;
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   305
    }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   306
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   307
    // retrieve java values
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   308
    jDateClass = (*env)->FindClass(env, CLASS_DATE);
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   309
    if (jDateClass == NULL) { return NULL; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   310
    jFieldID = (*env)->GetFieldID(env, jDateClass, "year", "[C");
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   311
    if (jFieldID == NULL) { return NULL; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   312
    jYear = (*env)->GetObjectField(env, jDate, jFieldID);
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   313
    jFieldID = (*env)->GetFieldID(env, jDateClass, "month", "[C");
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   314
    if (jFieldID == NULL) { return NULL; }
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   315
    jMonth = (*env)->GetObjectField(env, jDate, jFieldID);
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   316
    jFieldID = (*env)->GetFieldID(env, jDateClass, "day", "[C");
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   317
    if (jFieldID == NULL) { return NULL; }
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   318
    jDay = (*env)->GetObjectField(env, jDate, jFieldID);
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   319
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   320
    // allocate memory for CK_DATE pointer
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   321
    ckpDate = (CK_DATE *) calloc(1, sizeof(CK_DATE));
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   322
    if (ckpDate == NULL) {
10798
413b731e1818 7103549: Remove dependencies on libjava and libjvm from security libraries
chegar
parents: 8542
diff changeset
   323
        throwOutOfMemoryError(env, 0);
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   324
        return NULL;
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   325
    }
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   326
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   327
    // populate using java values
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   328
    if (jYear == NULL) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   329
        ckpDate->year[0] = 0;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   330
        ckpDate->year[1] = 0;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   331
        ckpDate->year[2] = 0;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   332
        ckpDate->year[3] = 0;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   333
    } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   334
        ckLength = (*env)->GetArrayLength(env, jYear);
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   335
        jTempChars = (jchar*) calloc(ckLength, sizeof(jchar));
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   336
        if (jTempChars == NULL) {
10798
413b731e1818 7103549: Remove dependencies on libjava and libjvm from security libraries
chegar
parents: 8542
diff changeset
   337
            throwOutOfMemoryError(env, 0);
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   338
            goto cleanup;
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   339
        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   340
        (*env)->GetCharArrayRegion(env, jYear, 0, ckLength, jTempChars);
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   341
        if ((*env)->ExceptionCheck(env)) {
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   342
            goto cleanup;
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   343
        }
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   344
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   345
        for (i = 0; (i < ckLength) && (i < 4) ; i++) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   346
            ckpDate->year[i] = jCharToCKChar(jTempChars[i]);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   347
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   348
        free(jTempChars);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   349
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   350
90ce3da70b43 Initial load
duke
parents:
diff changeset
   351
    if (jMonth == NULL) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   352
        ckpDate->month[0] = 0;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   353
        ckpDate->month[1] = 0;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   354
    } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   355
        ckLength = (*env)->GetArrayLength(env, jMonth);
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   356
        jTempChars = (jchar*) calloc(ckLength, sizeof(jchar));
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   357
        if (jTempChars == NULL) {
10798
413b731e1818 7103549: Remove dependencies on libjava and libjvm from security libraries
chegar
parents: 8542
diff changeset
   358
            throwOutOfMemoryError(env, 0);
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   359
            goto cleanup;
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   360
        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   361
        (*env)->GetCharArrayRegion(env, jMonth, 0, ckLength, jTempChars);
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   362
        if ((*env)->ExceptionCheck(env)) {
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   363
            goto cleanup;
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   364
        }
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   365
11356
898d37526be1 6839886: Array overrun in pkcs11
valeriep
parents: 10798
diff changeset
   366
        for (i = 0; (i < ckLength) && (i < 2) ; i++) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   367
            ckpDate->month[i] = jCharToCKChar(jTempChars[i]);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   368
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   369
        free(jTempChars);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   370
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   371
90ce3da70b43 Initial load
duke
parents:
diff changeset
   372
    if (jDay == NULL) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   373
        ckpDate->day[0] = 0;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   374
        ckpDate->day[1] = 0;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   375
    } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   376
        ckLength = (*env)->GetArrayLength(env, jDay);
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   377
        jTempChars = (jchar*) calloc(ckLength, sizeof(jchar));
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   378
        if (jTempChars == NULL) {
10798
413b731e1818 7103549: Remove dependencies on libjava and libjvm from security libraries
chegar
parents: 8542
diff changeset
   379
            throwOutOfMemoryError(env, 0);
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   380
            goto cleanup;
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   381
        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   382
        (*env)->GetCharArrayRegion(env, jDay, 0, ckLength, jTempChars);
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   383
        if ((*env)->ExceptionCheck(env)) {
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   384
            goto cleanup;
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   385
        }
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   386
11356
898d37526be1 6839886: Array overrun in pkcs11
valeriep
parents: 10798
diff changeset
   387
        for (i = 0; (i < ckLength) && (i < 2) ; i++) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   388
            ckpDate->day[i] = jCharToCKChar(jTempChars[i]);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   389
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   390
        free(jTempChars);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   391
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   392
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   393
    return ckpDate;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   394
cleanup:
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   395
    free(jTempChars);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   396
    free(ckpDate);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   397
    return NULL;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   398
}
90ce3da70b43 Initial load
duke
parents:
diff changeset
   399
90ce3da70b43 Initial load
duke
parents:
diff changeset
   400
90ce3da70b43 Initial load
duke
parents:
diff changeset
   401
/*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   402
 * converts a Java CK_ATTRIBUTE object into a CK_ATTRIBUTE structure
90ce3da70b43 Initial load
duke
parents:
diff changeset
   403
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   404
 * @param env - used to call JNI funktions to get the values out of the Java object
90ce3da70b43 Initial load
duke
parents:
diff changeset
   405
 * @param jAttribute - the Java CK_ATTRIBUTE object to convert
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   406
 * @return the new CK_ATTRIBUTE structure
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   407
 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   408
CK_ATTRIBUTE jAttributeToCKAttribute(JNIEnv *env, jobject jAttribute)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   409
{
90ce3da70b43 Initial load
duke
parents:
diff changeset
   410
    CK_ATTRIBUTE ckAttribute;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   411
    jclass jAttributeClass;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   412
    jfieldID jFieldID;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   413
    jlong jType;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   414
    jobject jPValue;
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   415
14414
f338be3ef659 8001579: Cleanup warnings in security native code
jzavgren
parents: 11356
diff changeset
   416
    memset(&ckAttribute, 0, sizeof(CK_ATTRIBUTE));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   417
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   418
    // TBD: what if jAttribute == NULL?!
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
   419
    TRACE0("\nDEBUG: jAttributeToCKAttribute");
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   420
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   421
    /* get CK_ATTRIBUTE class */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   422
    TRACE0(", getting attribute object class");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   423
    jAttributeClass = (*env)->GetObjectClass(env, jAttribute);
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   424
    if (jAttributeClass == NULL) { return ckAttribute; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   425
90ce3da70b43 Initial load
duke
parents:
diff changeset
   426
    /* get type */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   427
    TRACE0(", getting type field");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   428
    jFieldID = (*env)->GetFieldID(env, jAttributeClass, "type", "J");
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   429
    if (jFieldID == NULL) { return ckAttribute; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   430
    jType = (*env)->GetLongField(env, jAttribute, jFieldID);
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
   431
    TRACE1(", type=0x%lX", jType);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   432
90ce3da70b43 Initial load
duke
parents:
diff changeset
   433
    /* get pValue */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   434
    TRACE0(", getting pValue field");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   435
    jFieldID = (*env)->GetFieldID(env, jAttributeClass, "pValue", "Ljava/lang/Object;");
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   436
    if (jFieldID == NULL) { return ckAttribute; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   437
    jPValue = (*env)->GetObjectField(env, jAttribute, jFieldID);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   438
    TRACE1(", pValue=%p", jPValue);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   439
90ce3da70b43 Initial load
duke
parents:
diff changeset
   440
    ckAttribute.type = jLongToCKULong(jType);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   441
    TRACE0(", converting pValue to primitive object");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   442
90ce3da70b43 Initial load
duke
parents:
diff changeset
   443
    /* convert the Java pValue object to a CK-type pValue pointer */
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
   444
    ckAttribute.pValue = jObjectToPrimitiveCKObjectPtr(env, jPValue, &(ckAttribute.ulValueLen));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   445
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
   446
    TRACE0("\nDEBUG: jAttributeToCKAttribute FINISHED\n");
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   447
90ce3da70b43 Initial load
duke
parents:
diff changeset
   448
    return ckAttribute ;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   449
}
90ce3da70b43 Initial load
duke
parents:
diff changeset
   450
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   451
void masterKeyDeriveParamToCKMasterKeyDeriveParam(JNIEnv *env, jobject jParam,
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   452
        jclass masterKeyDeriveParamClass,
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   453
        CK_VERSION_PTR* cKMasterKeyDeriveParamVersion,
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   454
        CK_SSL3_RANDOM_DATA* cKMasterKeyDeriveParamRandomInfo) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   455
    jfieldID fieldID;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   456
    jclass jSsl3RandomDataClass;
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   457
    jobject jRandomInfo, jRIClientRandom, jRIServerRandom, jVersion;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   458
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   459
    // retrieve java values
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   460
    fieldID = (*env)->GetFieldID(env, masterKeyDeriveParamClass, "RandomInfo",
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   461
            "Lsun/security/pkcs11/wrapper/CK_SSL3_RANDOM_DATA;");
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   462
    if (fieldID == NULL) { return; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   463
    jRandomInfo = (*env)->GetObjectField(env, jParam, fieldID);
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   464
    jSsl3RandomDataClass = (*env)->FindClass(env, CLASS_SSL3_RANDOM_DATA);
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   465
    if (jSsl3RandomDataClass == NULL) { return; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   466
    fieldID = (*env)->GetFieldID(env, jSsl3RandomDataClass, "pClientRandom", "[B");
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   467
    if (fieldID == NULL) { return; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   468
    jRIClientRandom = (*env)->GetObjectField(env, jRandomInfo, fieldID);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   469
    fieldID = (*env)->GetFieldID(env, jSsl3RandomDataClass, "pServerRandom", "[B");
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   470
    if (fieldID == NULL) { return; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   471
    jRIServerRandom = (*env)->GetObjectField(env, jRandomInfo, fieldID);
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   472
    fieldID = (*env)->GetFieldID(env, masterKeyDeriveParamClass, "pVersion",
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   473
            "Lsun/security/pkcs11/wrapper/CK_VERSION;");
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   474
    if (fieldID == NULL) { return; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   475
    jVersion = (*env)->GetObjectField(env, jParam, fieldID);
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   476
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   477
    // populate using java values
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   478
    *cKMasterKeyDeriveParamVersion = jVersionToCKVersionPtr(env, jVersion);
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   479
    if ((*env)->ExceptionCheck(env)) { return; }
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   480
    jByteArrayToCKByteArray(env, jRIClientRandom,
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   481
            &(cKMasterKeyDeriveParamRandomInfo->pClientRandom),
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   482
            &(cKMasterKeyDeriveParamRandomInfo->ulClientRandomLen));
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   483
    if ((*env)->ExceptionCheck(env)) {
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   484
        goto cleanup;
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   485
    }
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   486
    jByteArrayToCKByteArray(env, jRIServerRandom,
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   487
            &(cKMasterKeyDeriveParamRandomInfo->pServerRandom),
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   488
            &(cKMasterKeyDeriveParamRandomInfo->ulServerRandomLen));
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   489
    if ((*env)->ExceptionCheck(env)) {
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   490
        goto cleanup;
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   491
    }
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   492
    return;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   493
cleanup:
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   494
    free(*cKMasterKeyDeriveParamVersion);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   495
    free(cKMasterKeyDeriveParamRandomInfo->pClientRandom);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   496
    cKMasterKeyDeriveParamRandomInfo->ulClientRandomLen = 0L;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   497
    free(cKMasterKeyDeriveParamRandomInfo->pServerRandom);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   498
    cKMasterKeyDeriveParamRandomInfo->ulServerRandomLen = 0L;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   499
    // explicitly set to NULL to ensure no double free possible
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   500
    *cKMasterKeyDeriveParamVersion = NULL;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   501
    cKMasterKeyDeriveParamRandomInfo->pClientRandom = NULL;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   502
    cKMasterKeyDeriveParamRandomInfo->pServerRandom = NULL;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   503
}
90ce3da70b43 Initial load
duke
parents:
diff changeset
   504
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   505
/*
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   506
 * converts the Java CK_SSL3_MASTER_KEY_DERIVE_PARAMS object to a
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   507
 * CK_SSL3_MASTER_KEY_DERIVE_PARAMS pointer
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   508
 *
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   509
 * @param env - used to call JNI functions to get the Java classes and objects
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   510
 * @param jParam - the Java CK_SSL3_MASTER_KEY_DERIVE_PARAMS object to convert
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   511
 * @param pLength - length of the allocated memory of the returned pointer
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   512
 * @return pointer to the new CK_SSL3_MASTER_KEY_DERIVE_PARAMS structure
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   513
 */
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   514
CK_SSL3_MASTER_KEY_DERIVE_PARAMS_PTR
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   515
jSsl3MasterKeyDeriveParamToCKSsl3MasterKeyDeriveParamPtr(JNIEnv *env,
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   516
        jobject jParam, CK_ULONG *pLength)
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   517
{
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   518
    CK_SSL3_MASTER_KEY_DERIVE_PARAMS_PTR ckParamPtr;
51802
15094d12a632 8210912: Build error in src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_convert.c after JDK-8029661
mikael
parents: 51800
diff changeset
   519
    jclass jSsl3MasterKeyDeriveParamsClass;
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   520
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   521
    if (pLength != NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   522
        *pLength = 0L;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   523
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   524
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   525
    // allocate memory for CK_SSL3_MASTER_KEY_DERIVE_PARAMS pointer
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   526
    ckParamPtr = calloc(1, sizeof(CK_SSL3_MASTER_KEY_DERIVE_PARAMS));
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   527
    if (ckParamPtr == NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   528
        throwOutOfMemoryError(env, 0);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   529
        return NULL;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   530
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   531
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   532
    // retrieve and populate using java values
51802
15094d12a632 8210912: Build error in src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_convert.c after JDK-8029661
mikael
parents: 51800
diff changeset
   533
    jSsl3MasterKeyDeriveParamsClass =
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   534
            (*env)->FindClass(env, CLASS_SSL3_MASTER_KEY_DERIVE_PARAMS);
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   535
    if (jSsl3MasterKeyDeriveParamsClass == NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   536
        goto cleanup;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   537
    }
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   538
    masterKeyDeriveParamToCKMasterKeyDeriveParam(env, jParam,
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   539
            jSsl3MasterKeyDeriveParamsClass,
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
   540
            &(ckParamPtr->pVersion), &(ckParamPtr->RandomInfo));
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   541
    if ((*env)->ExceptionCheck(env)) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   542
        goto cleanup;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   543
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   544
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   545
    if (pLength != NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   546
        *pLength = sizeof(CK_SSL3_MASTER_KEY_DERIVE_PARAMS);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   547
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   548
    return ckParamPtr;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   549
cleanup:
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   550
    free(ckParamPtr);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   551
    return NULL;
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   552
}
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   553
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   554
/*
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   555
 * converts the Java CK_TLS12_MASTER_KEY_DERIVE_PARAMS object to a
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   556
 * CK_TLS12_MASTER_KEY_DERIVE_PARAMS pointer
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   557
 *
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   558
 * @param env - used to call JNI functions to get the Java classes and objects
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   559
 * @param jParam - the Java CK_TLS12_MASTER_KEY_DERIVE_PARAMS object to convert
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   560
 * @param pLength - length of the allocated memory of the returned pointer
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   561
 * @return pointer to the new CK_TLS12_MASTER_KEY_DERIVE_PARAMS structure
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   562
 */
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   563
CK_TLS12_MASTER_KEY_DERIVE_PARAMS_PTR
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   564
jTls12MasterKeyDeriveParamToCKTls12MasterKeyDeriveParamPtr(JNIEnv *env,
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   565
        jobject jParam, CK_ULONG *pLength)
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   566
{
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   567
    CK_TLS12_MASTER_KEY_DERIVE_PARAMS_PTR ckParamPtr;
51802
15094d12a632 8210912: Build error in src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_convert.c after JDK-8029661
mikael
parents: 51800
diff changeset
   568
    jclass jTls12MasterKeyDeriveParamsClass;
15094d12a632 8210912: Build error in src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_convert.c after JDK-8029661
mikael
parents: 51800
diff changeset
   569
    jfieldID fieldID;
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   570
    jlong prfHashMechanism;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   571
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   572
    if (pLength != NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   573
        *pLength = 0L;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   574
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   575
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   576
    // retrieve java values
51802
15094d12a632 8210912: Build error in src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_convert.c after JDK-8029661
mikael
parents: 51800
diff changeset
   577
    jTls12MasterKeyDeriveParamsClass =
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   578
        (*env)->FindClass(env, CLASS_TLS12_MASTER_KEY_DERIVE_PARAMS);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   579
    if (jTls12MasterKeyDeriveParamsClass == NULL) { return NULL; }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   580
    fieldID = (*env)->GetFieldID(env,
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   581
            jTls12MasterKeyDeriveParamsClass, "prfHashMechanism", "J");
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   582
    if (fieldID == NULL) { return NULL; }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   583
    prfHashMechanism = (*env)->GetLongField(env, jParam, fieldID);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   584
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   585
    // allocate memory for CK_TLS12_MASTER_KEY_DERIVE_PARAMS pointer
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   586
    ckParamPtr = calloc(1, sizeof(CK_TLS12_MASTER_KEY_DERIVE_PARAMS));
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   587
    if (ckParamPtr == NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   588
        throwOutOfMemoryError(env, 0);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   589
        return NULL;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   590
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   591
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   592
    // populate using java values
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   593
    masterKeyDeriveParamToCKMasterKeyDeriveParam(env, jParam,
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
   594
            jTls12MasterKeyDeriveParamsClass, &ckParamPtr->pVersion,
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
   595
            &ckParamPtr->RandomInfo);
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   596
    if ((*env)->ExceptionCheck(env)) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   597
        goto cleanup;
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   598
    }
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   599
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   600
    ckParamPtr->prfHashMechanism = (CK_MECHANISM_TYPE) prfHashMechanism;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   601
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   602
    if (pLength != NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   603
        *pLength = sizeof(CK_TLS12_MASTER_KEY_DERIVE_PARAMS);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   604
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   605
    return ckParamPtr;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   606
cleanup:
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   607
    free(ckParamPtr);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   608
    return NULL;
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   609
}
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   610
90ce3da70b43 Initial load
duke
parents:
diff changeset
   611
/*
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   612
 * converts the Java CK_TLS_PRF_PARAMS object to a CK_TLS_PRF_PARAMS pointer
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   613
 *
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   614
 * @param env - used to call JNI functions to get the Java classes and objects
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   615
 * @param jParam - the Java CK_TLS_PRF_PARAMS object to convert
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   616
 * @param pLength - length of the allocated memory of the returned pointer
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   617
 * @return pointer to the new CK_TLS_PRF_PARAMS structure
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   618
 */
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   619
CK_TLS_PRF_PARAMS_PTR
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   620
jTlsPrfParamsToCKTlsPrfParamPtr(JNIEnv *env, jobject jParam, CK_ULONG *pLength)
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   621
{
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   622
    CK_TLS_PRF_PARAMS_PTR ckParamPtr;
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   623
    jclass jTlsPrfParamsClass;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   624
    jfieldID fieldID;
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   625
    jobject jSeed, jLabel, jOutput;
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   626
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   627
    if (pLength != NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   628
        *pLength = 0;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   629
    }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   630
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   631
    // retrieve java values
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   632
    jTlsPrfParamsClass = (*env)->FindClass(env, CLASS_TLS_PRF_PARAMS);
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   633
    if (jTlsPrfParamsClass == NULL) { return NULL; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   634
    fieldID = (*env)->GetFieldID(env, jTlsPrfParamsClass, "pSeed", "[B");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   635
    if (fieldID == NULL) { return NULL; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   636
    jSeed = (*env)->GetObjectField(env, jParam, fieldID);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   637
    fieldID = (*env)->GetFieldID(env, jTlsPrfParamsClass, "pLabel", "[B");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   638
    if (fieldID == NULL) { return NULL; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   639
    jLabel = (*env)->GetObjectField(env, jParam, fieldID);
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   640
    fieldID = (*env)->GetFieldID(env, jTlsPrfParamsClass, "pOutput", "[B");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   641
    if (fieldID == NULL) { return NULL; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   642
    jOutput = (*env)->GetObjectField(env, jParam, fieldID);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   643
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   644
    // allocate memory for CK_TLS_PRF_PARAMS pointer
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   645
    ckParamPtr = calloc(1, sizeof(CK_TLS_PRF_PARAMS));
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   646
    if (ckParamPtr == NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   647
        throwOutOfMemoryError(env, 0);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   648
        return NULL;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   649
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   650
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   651
    // populate using java values
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
   652
    jByteArrayToCKByteArray(env, jSeed, &(ckParamPtr->pSeed), &(ckParamPtr->ulSeedLen));
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   653
    if ((*env)->ExceptionCheck(env)) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   654
        goto cleanup;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   655
    }
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
   656
    jByteArrayToCKByteArray(env, jLabel, &(ckParamPtr->pLabel), &(ckParamPtr->ulLabelLen));
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   657
    if ((*env)->ExceptionCheck(env)) {
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   658
        goto cleanup;
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   659
    }
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   660
    ckParamPtr->pulOutputLen = calloc(1, sizeof(CK_ULONG));
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
   661
    if (ckParamPtr->pulOutputLen == NULL) {
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   662
        goto cleanup;
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   663
    }
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
   664
    jByteArrayToCKByteArray(env, jOutput, &(ckParamPtr->pOutput), ckParamPtr->pulOutputLen);
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   665
    if ((*env)->ExceptionCheck(env)) {
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   666
        goto cleanup;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   667
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   668
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   669
    if (pLength != NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   670
        *pLength = sizeof(CK_TLS_PRF_PARAMS);
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   671
    }
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   672
    return ckParamPtr;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   673
cleanup:
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   674
    free(ckParamPtr->pSeed);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   675
    free(ckParamPtr->pLabel);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   676
    free(ckParamPtr->pOutput);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   677
    free(ckParamPtr->pulOutputLen);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   678
    free(ckParamPtr);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   679
    return NULL;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   680
}
90ce3da70b43 Initial load
duke
parents:
diff changeset
   681
90ce3da70b43 Initial load
duke
parents:
diff changeset
   682
/*
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   683
 * converts the Java CK_TLS_MAC_PARAMS object to a CK_TLS_MAC_PARAMS pointer
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   684
 *
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   685
 * @param env - used to call JNI functions to get the Java classes and objects
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   686
 * @param jParam - the Java CK_TLS_MAC_PARAMS object to convert
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   687
 * @param pLength - length of the allocated memory of the returned pointer
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   688
 * @return pointer to the new CK_TLS_MAC_PARAMS structure
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   689
 */
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   690
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   691
CK_TLS_MAC_PARAMS_PTR
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   692
jTlsMacParamsToCKTlsMacParamPtr(JNIEnv *env, jobject jParam, CK_ULONG *pLength)
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   693
{
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   694
    CK_TLS_MAC_PARAMS_PTR ckParamPtr;
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   695
    jclass jTlsMacParamsClass;
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   696
    jfieldID fieldID;
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   697
    jlong jPrfMechanism, jUlMacLength, jUlServerOrClient;
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   698
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   699
    if (pLength != NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   700
        *pLength = 0L;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   701
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   702
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   703
    // retrieve java values
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   704
    jTlsMacParamsClass = (*env)->FindClass(env, CLASS_TLS_MAC_PARAMS);
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   705
    if (jTlsMacParamsClass == NULL) { return NULL; }
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   706
    fieldID = (*env)->GetFieldID(env, jTlsMacParamsClass, "prfMechanism", "J");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   707
    if (fieldID == NULL) { return NULL; }
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   708
    jPrfMechanism = (*env)->GetLongField(env, jParam, fieldID);
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   709
    fieldID = (*env)->GetFieldID(env, jTlsMacParamsClass, "ulMacLength", "J");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   710
    if (fieldID == NULL) { return NULL; }
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   711
    jUlMacLength = (*env)->GetLongField(env, jParam, fieldID);
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   712
    fieldID = (*env)->GetFieldID(env, jTlsMacParamsClass, "ulServerOrClient", "J");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   713
    if (fieldID == NULL) { return NULL; }
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   714
    jUlServerOrClient = (*env)->GetLongField(env, jParam, fieldID);
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   715
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   716
    // allocate memory for CK_TLS_MAC_PARAMS pointer
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   717
    ckParamPtr = calloc(1, sizeof(CK_TLS_MAC_PARAMS));
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   718
    if (ckParamPtr == NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   719
        throwOutOfMemoryError(env, 0);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   720
        return NULL;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   721
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   722
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   723
    // populate using java values
58489
2faeaa5933a6 8229243: SunPKCS11-Solaris provider tests failing on Solaris 11.4
valeriep
parents: 58281
diff changeset
   724
    ckParamPtr->prfHashMechanism = jLongToCKULong(jPrfMechanism);
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
   725
    ckParamPtr->ulMacLength = jLongToCKULong(jUlMacLength);
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
   726
    ckParamPtr->ulServerOrClient = jLongToCKULong(jUlServerOrClient);
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   727
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   728
    if (pLength != NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   729
        *pLength = sizeof(CK_TLS_MAC_PARAMS);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   730
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   731
    return ckParamPtr;
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   732
}
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   733
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   734
void keyMatParamToCKKeyMatParam(JNIEnv *env, jobject jParam,
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   735
        jclass jKeyMatParamClass,
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   736
        CK_ULONG* cKKeyMatParamUlMacSizeInBits,
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   737
        CK_ULONG* cKKeyMatParamUlKeySizeInBits,
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   738
        CK_ULONG* cKKeyMatParamUlIVSizeInBits,
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   739
        CK_BBOOL* cKKeyMatParamBIsExport,
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   740
        CK_SSL3_RANDOM_DATA* cKKeyMatParamRandomInfo,
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   741
        CK_SSL3_KEY_MAT_OUT_PTR* cKKeyMatParamPReturnedKeyMaterial)
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   742
{
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   743
    jclass jSsl3RandomDataClass, jSsl3KeyMatOutClass;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   744
    jfieldID fieldID;
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   745
    jlong jMacSizeInBits, jKeySizeInBits, jIVSizeInBits;
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   746
    jboolean jIsExport;
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   747
    jobject jRandomInfo, jRIClientRandom, jRIServerRandom;
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   748
    jobject jReturnedKeyMaterial, jRMIvClient, jRMIvServer;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   749
    CK_ULONG ckTemp;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   750
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   751
    // the pointer arguments should already be initialized by caller
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   752
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   753
    // retrieve java values
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   754
    fieldID = (*env)->GetFieldID(env, jKeyMatParamClass, "ulMacSizeInBits", "J");
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   755
    if (fieldID == NULL) { return; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   756
    jMacSizeInBits = (*env)->GetLongField(env, jParam, fieldID);
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   757
    fieldID = (*env)->GetFieldID(env, jKeyMatParamClass, "ulKeySizeInBits", "J");
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   758
    if (fieldID == NULL) { return; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   759
    jKeySizeInBits = (*env)->GetLongField(env, jParam, fieldID);
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   760
    fieldID = (*env)->GetFieldID(env, jKeyMatParamClass, "ulIVSizeInBits", "J");
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   761
    if (fieldID == NULL) { return; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   762
    jIVSizeInBits = (*env)->GetLongField(env, jParam, fieldID);
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   763
    fieldID = (*env)->GetFieldID(env, jKeyMatParamClass, "bIsExport", "Z");
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   764
    if (fieldID == NULL) { return; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   765
    jIsExport = (*env)->GetBooleanField(env, jParam, fieldID);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   766
    jSsl3RandomDataClass = (*env)->FindClass(env, CLASS_SSL3_RANDOM_DATA);
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   767
    if (jSsl3RandomDataClass == NULL) { return; }
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   768
    fieldID = (*env)->GetFieldID(env, jKeyMatParamClass, "RandomInfo",
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   769
            "Lsun/security/pkcs11/wrapper/CK_SSL3_RANDOM_DATA;");
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   770
    if (fieldID == NULL) { return; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   771
    jRandomInfo = (*env)->GetObjectField(env, jParam, fieldID);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   772
    fieldID = (*env)->GetFieldID(env, jSsl3RandomDataClass, "pClientRandom", "[B");
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   773
    if (fieldID == NULL) { return; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   774
    jRIClientRandom = (*env)->GetObjectField(env, jRandomInfo, fieldID);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   775
    fieldID = (*env)->GetFieldID(env, jSsl3RandomDataClass, "pServerRandom", "[B");
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   776
    if (fieldID == NULL) { return; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   777
    jRIServerRandom = (*env)->GetObjectField(env, jRandomInfo, fieldID);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   778
    jSsl3KeyMatOutClass = (*env)->FindClass(env, CLASS_SSL3_KEY_MAT_OUT);
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   779
    if (jSsl3KeyMatOutClass == NULL) { return; }
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   780
    fieldID = (*env)->GetFieldID(env, jKeyMatParamClass, "pReturnedKeyMaterial",
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   781
            "Lsun/security/pkcs11/wrapper/CK_SSL3_KEY_MAT_OUT;");
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   782
    if (fieldID == NULL) { return; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   783
    jReturnedKeyMaterial = (*env)->GetObjectField(env, jParam, fieldID);
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   784
    fieldID = (*env)->GetFieldID(env, jSsl3KeyMatOutClass, "pIVClient", "[B");
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   785
    if (fieldID == NULL) { return; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   786
    jRMIvClient = (*env)->GetObjectField(env, jReturnedKeyMaterial, fieldID);
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   787
    fieldID = (*env)->GetFieldID(env, jSsl3KeyMatOutClass, "pIVServer", "[B");
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   788
    if (fieldID == NULL) { return; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   789
    jRMIvServer = (*env)->GetObjectField(env, jReturnedKeyMaterial, fieldID);
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   790
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   791
    // populate the specified pointers using java values
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   792
    *cKKeyMatParamUlMacSizeInBits = jLongToCKULong(jMacSizeInBits);
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   793
    *cKKeyMatParamUlKeySizeInBits = jLongToCKULong(jKeySizeInBits);
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   794
    *cKKeyMatParamUlIVSizeInBits = jLongToCKULong(jIVSizeInBits);
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   795
    *cKKeyMatParamBIsExport = jBooleanToCKBBool(jIsExport);
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   796
    jByteArrayToCKByteArray(env, jRIClientRandom,
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   797
            &(cKKeyMatParamRandomInfo->pClientRandom),
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   798
            &(cKKeyMatParamRandomInfo->ulClientRandomLen));
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   799
    if ((*env)->ExceptionCheck(env)) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   800
        // just return as no memory allocation yet
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   801
        return;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   802
    }
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   803
    jByteArrayToCKByteArray(env, jRIServerRandom,
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   804
            &(cKKeyMatParamRandomInfo->pServerRandom),
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   805
            &(cKKeyMatParamRandomInfo->ulServerRandomLen));
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   806
    if ((*env)->ExceptionCheck(env)) {
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   807
        goto cleanup;
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   808
    }
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
   809
    /* allocate memory for pReturnedKeyMaterial */
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   810
    *cKKeyMatParamPReturnedKeyMaterial =
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   811
            (CK_SSL3_KEY_MAT_OUT_PTR) calloc(1, sizeof(CK_SSL3_KEY_MAT_OUT));
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   812
    if (*cKKeyMatParamPReturnedKeyMaterial == NULL) {
10798
413b731e1818 7103549: Remove dependencies on libjava and libjvm from security libraries
chegar
parents: 8542
diff changeset
   813
        throwOutOfMemoryError(env, 0);
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   814
        goto cleanup;
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   815
    }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   816
90ce3da70b43 Initial load
duke
parents:
diff changeset
   817
    // the handles are output params only, no need to fetch them from Java
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   818
    (*cKKeyMatParamPReturnedKeyMaterial)->hClientMacSecret = 0;
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   819
    (*cKKeyMatParamPReturnedKeyMaterial)->hServerMacSecret = 0;
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   820
    (*cKKeyMatParamPReturnedKeyMaterial)->hClientKey = 0;
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   821
    (*cKKeyMatParamPReturnedKeyMaterial)->hServerKey = 0;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   822
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   823
    jByteArrayToCKByteArray(env, jRMIvClient,
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   824
            &((*cKKeyMatParamPReturnedKeyMaterial)->pIVClient), &ckTemp);
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   825
    if ((*env)->ExceptionCheck(env)) {
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   826
        goto cleanup;
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   827
    }
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   828
    jByteArrayToCKByteArray(env, jRMIvServer,
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   829
            &((*cKKeyMatParamPReturnedKeyMaterial)->pIVServer), &ckTemp);
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   830
    if ((*env)->ExceptionCheck(env)) {
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   831
        goto cleanup;
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
   832
    }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   833
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   834
    return;
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   835
cleanup:
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   836
    free(cKKeyMatParamRandomInfo->pClientRandom);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   837
    free(cKKeyMatParamRandomInfo->pServerRandom);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   838
    if ((*cKKeyMatParamPReturnedKeyMaterial) != NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   839
        free((*cKKeyMatParamPReturnedKeyMaterial)->pIVClient);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   840
        free(*cKKeyMatParamPReturnedKeyMaterial);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   841
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   842
    // explicitly set to NULL to ensure no double free possible
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   843
    cKKeyMatParamRandomInfo->pClientRandom = NULL;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   844
    cKKeyMatParamRandomInfo->pServerRandom = NULL;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   845
    *cKKeyMatParamPReturnedKeyMaterial = NULL;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   846
    return;
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   847
}
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   848
/*
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   849
 * converts the Java CK_SSL3_KEY_MAT_PARAMS object to a
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   850
 * CK_SSL3_KEY_MAT_PARAMS pointer
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   851
 *
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   852
 * @param env - used to call JNI funktions to get the Java classes and objects
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   853
 * @param jParam - the Java CK_SSL3_KEY_MAT_PARAMS object to convert
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   854
 * @param pLength - length of the allocated memory of the returned pointer
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   855
 * @return pointer to the new CK_SSL3_KEY_MAT_PARAMS structure
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   856
 */
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   857
CK_SSL3_KEY_MAT_PARAMS_PTR
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   858
jSsl3KeyMatParamToCKSsl3KeyMatParamPtr(JNIEnv *env, jobject jParam, CK_ULONG *pLength)
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   859
{
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   860
    CK_SSL3_KEY_MAT_PARAMS_PTR ckParamPtr;
51802
15094d12a632 8210912: Build error in src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_convert.c after JDK-8029661
mikael
parents: 51800
diff changeset
   861
    jclass jSsl3KeyMatParamsClass;
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   862
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   863
    if (pLength != NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   864
        *pLength = 0;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   865
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   866
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   867
    // allocate memory for CK_SSL3_KEY_MAT_PARAMS pointer
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   868
    ckParamPtr = calloc(1, sizeof(CK_SSL3_KEY_MAT_PARAMS));
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   869
    if (ckParamPtr == NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   870
        throwOutOfMemoryError(env, 0);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   871
        return NULL;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   872
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   873
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   874
    // retrieve and  populate using java values
51802
15094d12a632 8210912: Build error in src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_convert.c after JDK-8029661
mikael
parents: 51800
diff changeset
   875
    jSsl3KeyMatParamsClass = (*env)->FindClass(env,
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   876
            CLASS_SSL3_KEY_MAT_PARAMS);
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   877
    if (jSsl3KeyMatParamsClass == NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   878
        goto cleanup;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   879
    }
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   880
    keyMatParamToCKKeyMatParam(env, jParam, jSsl3KeyMatParamsClass,
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
   881
            &(ckParamPtr->ulMacSizeInBits), &(ckParamPtr->ulKeySizeInBits),
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
   882
            &(ckParamPtr->ulIVSizeInBits), &(ckParamPtr->bIsExport),
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
   883
            &(ckParamPtr->RandomInfo), &(ckParamPtr->pReturnedKeyMaterial));
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   884
    if ((*env)->ExceptionCheck(env)) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   885
        goto cleanup;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   886
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   887
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   888
    if (pLength != NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   889
        *pLength = sizeof(CK_SSL3_KEY_MAT_PARAMS);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   890
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   891
    return ckParamPtr;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   892
cleanup:
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   893
    free(ckParamPtr);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   894
    return NULL;
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   895
}
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   896
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   897
/*
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   898
 * converts the Java CK_TLS12_KEY_MAT_PARAMS object to a
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   899
 * CK_TLS12_KEY_MAT_PARAMS pointer
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   900
 *
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   901
 * @param env - used to call JNI functions to get the Java classes and objects
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   902
 * @param jParam - the Java CK_TLS12_KEY_MAT_PARAMS object to convert
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   903
 * @param pLength - length of the allocated memory of the returned pointer
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   904
 * @return pointer to the new CK_TLS12_KEY_MAT_PARAMS structure
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   905
 */
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   906
CK_TLS12_KEY_MAT_PARAMS_PTR jTls12KeyMatParamToCKTls12KeyMatParamPtr(JNIEnv *env,
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   907
        jobject jParam, CK_ULONG *pLength)
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   908
{
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   909
    CK_TLS12_KEY_MAT_PARAMS_PTR ckParamPtr;
51802
15094d12a632 8210912: Build error in src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_convert.c after JDK-8029661
mikael
parents: 51800
diff changeset
   910
    jclass jTls12KeyMatParamsClass;
15094d12a632 8210912: Build error in src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_convert.c after JDK-8029661
mikael
parents: 51800
diff changeset
   911
    jfieldID fieldID;
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   912
    jlong prfHashMechanism;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   913
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   914
    if (pLength != NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   915
        *pLength = 0;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   916
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   917
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   918
    // retrieve java values
51802
15094d12a632 8210912: Build error in src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_convert.c after JDK-8029661
mikael
parents: 51800
diff changeset
   919
    jTls12KeyMatParamsClass = (*env)->FindClass(env,
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   920
            CLASS_TLS12_KEY_MAT_PARAMS);
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   921
    if (jTls12KeyMatParamsClass == NULL) { return NULL; }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   922
    fieldID = (*env)->GetFieldID(env, jTls12KeyMatParamsClass,
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   923
            "prfHashMechanism", "J");
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   924
    if (fieldID == NULL) { return NULL; }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   925
    prfHashMechanism = (*env)->GetLongField(env, jParam, fieldID);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   926
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   927
    // allocate memory for CK_TLS12_KEY_MAT_PARAMS pointer
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   928
    ckParamPtr = calloc(1, sizeof(CK_TLS12_KEY_MAT_PARAMS));
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   929
    if (ckParamPtr == NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   930
        throwOutOfMemoryError(env, 0);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   931
        return NULL;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   932
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   933
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   934
    // populate using java values
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   935
    keyMatParamToCKKeyMatParam(env, jParam, jTls12KeyMatParamsClass,
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
   936
            &(ckParamPtr->ulMacSizeInBits), &(ckParamPtr->ulKeySizeInBits),
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
   937
            &(ckParamPtr->ulIVSizeInBits), &(ckParamPtr->bIsExport),
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
   938
            &(ckParamPtr->RandomInfo), &(ckParamPtr->pReturnedKeyMaterial));
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   939
    if ((*env)->ExceptionCheck(env)) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   940
        goto cleanup;
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
   941
    }
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   942
    ckParamPtr->prfHashMechanism = (CK_MECHANISM_TYPE)prfHashMechanism;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   943
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   944
    if (pLength != NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   945
        *pLength = sizeof(CK_TLS12_KEY_MAT_PARAMS);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   946
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   947
    return ckParamPtr;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   948
cleanup:
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   949
    free(ckParamPtr);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   950
    return NULL;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   951
}
90ce3da70b43 Initial load
duke
parents:
diff changeset
   952
90ce3da70b43 Initial load
duke
parents:
diff changeset
   953
/*
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   954
 * converts the Java CK_AES_CTR_PARAMS object to a CK_AES_CTR_PARAMS pointer
8542
62c7b10ce177 6604496: Support for CKM_AES_CTR (counter mode)
valeriep
parents: 5506
diff changeset
   955
 *
62c7b10ce177 6604496: Support for CKM_AES_CTR (counter mode)
valeriep
parents: 5506
diff changeset
   956
 * @param env - used to call JNI funktions to get the Java classes and objects
62c7b10ce177 6604496: Support for CKM_AES_CTR (counter mode)
valeriep
parents: 5506
diff changeset
   957
 * @param jParam - the Java CK_AES_CTR_PARAMS object to convert
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   958
 * @param pLength - length of the allocated memory of the returned pointer
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   959
 * @return pointer to the new CK_AES_CTR_PARAMS structure
8542
62c7b10ce177 6604496: Support for CKM_AES_CTR (counter mode)
valeriep
parents: 5506
diff changeset
   960
 */
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   961
CK_AES_CTR_PARAMS_PTR
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   962
jAesCtrParamsToCKAesCtrParamPtr(JNIEnv *env, jobject jParam, CK_ULONG *pLength)
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   963
{
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   964
    CK_AES_CTR_PARAMS_PTR ckParamPtr;
8542
62c7b10ce177 6604496: Support for CKM_AES_CTR (counter mode)
valeriep
parents: 5506
diff changeset
   965
    jclass jAesCtrParamsClass;
62c7b10ce177 6604496: Support for CKM_AES_CTR (counter mode)
valeriep
parents: 5506
diff changeset
   966
    jfieldID fieldID;
62c7b10ce177 6604496: Support for CKM_AES_CTR (counter mode)
valeriep
parents: 5506
diff changeset
   967
    jlong jCounterBits;
62c7b10ce177 6604496: Support for CKM_AES_CTR (counter mode)
valeriep
parents: 5506
diff changeset
   968
    jobject jCb;
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   969
    CK_BYTE_PTR ckBytes = NULL;
8542
62c7b10ce177 6604496: Support for CKM_AES_CTR (counter mode)
valeriep
parents: 5506
diff changeset
   970
    CK_ULONG ckTemp;
62c7b10ce177 6604496: Support for CKM_AES_CTR (counter mode)
valeriep
parents: 5506
diff changeset
   971
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   972
    if (pLength != NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   973
        *pLength = 0L;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   974
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   975
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   976
    // retrieve java values
8542
62c7b10ce177 6604496: Support for CKM_AES_CTR (counter mode)
valeriep
parents: 5506
diff changeset
   977
    jAesCtrParamsClass = (*env)->FindClass(env, CLASS_AES_CTR_PARAMS);
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   978
    if (jAesCtrParamsClass == NULL) { return NULL; }
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
   979
    if (!(*env)->IsInstanceOf(env, jParam, jAesCtrParamsClass)) {
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   980
        return NULL;
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
   981
    }
8542
62c7b10ce177 6604496: Support for CKM_AES_CTR (counter mode)
valeriep
parents: 5506
diff changeset
   982
    fieldID = (*env)->GetFieldID(env, jAesCtrParamsClass, "ulCounterBits", "J");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   983
    if (fieldID == NULL) { return NULL; }
8542
62c7b10ce177 6604496: Support for CKM_AES_CTR (counter mode)
valeriep
parents: 5506
diff changeset
   984
    jCounterBits = (*env)->GetLongField(env, jParam, fieldID);
62c7b10ce177 6604496: Support for CKM_AES_CTR (counter mode)
valeriep
parents: 5506
diff changeset
   985
    fieldID = (*env)->GetFieldID(env, jAesCtrParamsClass, "cb", "[B");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   986
    if (fieldID == NULL) { return NULL; }
8542
62c7b10ce177 6604496: Support for CKM_AES_CTR (counter mode)
valeriep
parents: 5506
diff changeset
   987
    jCb = (*env)->GetObjectField(env, jParam, fieldID);
62c7b10ce177 6604496: Support for CKM_AES_CTR (counter mode)
valeriep
parents: 5506
diff changeset
   988
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   989
    // allocate memory for CK_AES_CTR_PARAMS pointer
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   990
    ckParamPtr = calloc(1, sizeof(CK_AES_CTR_PARAMS));
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   991
    if (ckParamPtr == NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   992
        throwOutOfMemoryError(env, 0);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   993
        return NULL;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   994
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   995
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   996
    // populate using java values
8542
62c7b10ce177 6604496: Support for CKM_AES_CTR (counter mode)
valeriep
parents: 5506
diff changeset
   997
    jByteArrayToCKByteArray(env, jCb, &ckBytes, &ckTemp);
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   998
    if ((*env)->ExceptionCheck(env) || ckTemp != 16) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
   999
        goto cleanup;
8542
62c7b10ce177 6604496: Support for CKM_AES_CTR (counter mode)
valeriep
parents: 5506
diff changeset
  1000
    }
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1001
    memcpy(ckParamPtr->cb, ckBytes, ckTemp);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1002
    free(ckBytes);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1003
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1004
    ckParamPtr->ulCounterBits = jLongToCKULong(jCounterBits);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1005
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1006
    if (pLength != NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1007
        *pLength = sizeof(CK_AES_CTR_PARAMS);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1008
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1009
    return ckParamPtr;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1010
cleanup:
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1011
    free(ckBytes);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1012
    free(ckParamPtr);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1013
    return NULL;
8542
62c7b10ce177 6604496: Support for CKM_AES_CTR (counter mode)
valeriep
parents: 5506
diff changeset
  1014
}
62c7b10ce177 6604496: Support for CKM_AES_CTR (counter mode)
valeriep
parents: 5506
diff changeset
  1015
62c7b10ce177 6604496: Support for CKM_AES_CTR (counter mode)
valeriep
parents: 5506
diff changeset
  1016
/*
58489
2faeaa5933a6 8229243: SunPKCS11-Solaris provider tests failing on Solaris 11.4
valeriep
parents: 58281
diff changeset
  1017
 * converts the Java CK_GCM_PARAMS object to a CK_GCM_PARAMS_NO_IVBITS pointer
2faeaa5933a6 8229243: SunPKCS11-Solaris provider tests failing on Solaris 11.4
valeriep
parents: 58281
diff changeset
  1018
 * Note: Need to try NSS definition first to avoid SIGSEGV.
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1019
 *
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1020
 * @param env - used to call JNI funktions to get the Java classes and objects
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1021
 * @param jParam - the Java CK_GCM_PARAMS object to convert
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1022
 * @param pLength - length of the allocated memory of the returned pointer
58489
2faeaa5933a6 8229243: SunPKCS11-Solaris provider tests failing on Solaris 11.4
valeriep
parents: 58281
diff changeset
  1023
 * @return pointer to the new CK_GCM_PARAMS_NO_IVBITS structure
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1024
 */
58489
2faeaa5933a6 8229243: SunPKCS11-Solaris provider tests failing on Solaris 11.4
valeriep
parents: 58281
diff changeset
  1025
CK_GCM_PARAMS_NO_IVBITS_PTR
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1026
jGCMParamsToCKGCMParamPtr(JNIEnv *env, jobject jParam, CK_ULONG *pLength)
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1027
{
58489
2faeaa5933a6 8229243: SunPKCS11-Solaris provider tests failing on Solaris 11.4
valeriep
parents: 58281
diff changeset
  1028
    CK_GCM_PARAMS_NO_IVBITS_PTR ckParamPtr;
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1029
    jclass jGcmParamsClass;
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1030
    jfieldID fieldID;
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1031
    jobject jIv, jAad;
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1032
    jlong jTagLen;
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1033
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1034
    TRACE0("DEBUG jGCMParamsToCKGCMParam is called\n");
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1035
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1036
    if (pLength != NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1037
        *pLength = 0L;
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1038
    }
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1039
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1040
    // retrieve java values
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1041
    jGcmParamsClass = (*env)->FindClass(env, CLASS_GCM_PARAMS);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1042
    if (jGcmParamsClass == NULL) { return NULL; }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1043
    if (!(*env)->IsInstanceOf(env, jParam, jGcmParamsClass)) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1044
        return NULL;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1045
    }
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1046
    fieldID = (*env)->GetFieldID(env, jGcmParamsClass, "iv", "[B");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1047
    if (fieldID == NULL) { return NULL; }
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1048
    jIv = (*env)->GetObjectField(env, jParam, fieldID);
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1049
    fieldID = (*env)->GetFieldID(env, jGcmParamsClass, "aad", "[B");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1050
    if (fieldID == NULL) { return NULL; }
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1051
    jAad = (*env)->GetObjectField(env, jParam, fieldID);
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1052
    fieldID = (*env)->GetFieldID(env, jGcmParamsClass, "tagBits", "J");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1053
    if (fieldID == NULL) { return NULL; }
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1054
    jTagLen = (*env)->GetLongField(env, jParam, fieldID);
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1055
58489
2faeaa5933a6 8229243: SunPKCS11-Solaris provider tests failing on Solaris 11.4
valeriep
parents: 58281
diff changeset
  1056
    // allocate memory for CK_GCM_PARAMS_NO_IVBITS pointer
2faeaa5933a6 8229243: SunPKCS11-Solaris provider tests failing on Solaris 11.4
valeriep
parents: 58281
diff changeset
  1057
    ckParamPtr = calloc(1, sizeof(CK_GCM_PARAMS_NO_IVBITS));
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1058
    if (ckParamPtr == NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1059
        throwOutOfMemoryError(env, 0);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1060
        return NULL;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1061
    }
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1062
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1063
    // populate using java values
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1064
    jByteArrayToCKByteArray(env, jIv, &(ckParamPtr->pIv), &(ckParamPtr->ulIvLen));
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1065
    if ((*env)->ExceptionCheck(env)) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1066
        goto cleanup;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1067
    }
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1068
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1069
    jByteArrayToCKByteArray(env, jAad, &(ckParamPtr->pAAD), &(ckParamPtr->ulAADLen));
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1070
    if ((*env)->ExceptionCheck(env)) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1071
        goto cleanup;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1072
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1073
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1074
    ckParamPtr->ulTagBits = jLongToCKULong(jTagLen);
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1075
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1076
    if (pLength != NULL) {
58489
2faeaa5933a6 8229243: SunPKCS11-Solaris provider tests failing on Solaris 11.4
valeriep
parents: 58281
diff changeset
  1077
        *pLength = sizeof(CK_GCM_PARAMS_NO_IVBITS);
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1078
    }
58489
2faeaa5933a6 8229243: SunPKCS11-Solaris provider tests failing on Solaris 11.4
valeriep
parents: 58281
diff changeset
  1079
    TRACE1("Created inner GCM_PARAMS PTR w/o ulIvBits %p\n", ckParamPtr);
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1080
    return ckParamPtr;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1081
cleanup:
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1082
    free(ckParamPtr->pIv);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1083
    free(ckParamPtr->pAAD);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1084
    free(ckParamPtr);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1085
    return NULL;
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1086
}
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1087
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1088
/*
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1089
 * converts the Java CK_CCM_PARAMS object to a CK_CCM_PARAMS pointer
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1090
 *
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1091
 * @param env - used to call JNI functions to get the Java classes and objects
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1092
 * @param jParam - the Java CK_CCM_PARAMS object to convert
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1093
 * @param pLength - length of the allocated memory of the returned pointer
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1094
 * @return pointer to the new CK_CCM_PARAMS structure
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1095
 */
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1096
CK_CCM_PARAMS_PTR
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1097
jCCMParamsToCKCCMParamPtr(JNIEnv *env, jobject jParam, CK_ULONG *pLength)
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1098
{
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1099
    CK_CCM_PARAMS_PTR ckParamPtr;
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1100
    jclass jCcmParamsClass;
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1101
    jfieldID fieldID;
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1102
    jobject jNonce, jAad;
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1103
    jlong jDataLen, jMacLen;
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1104
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1105
    if (pLength != NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1106
        *pLength = 0;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1107
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1108
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1109
    // retrieve java values
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1110
    jCcmParamsClass = (*env)->FindClass(env, CLASS_CCM_PARAMS);
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1111
    if (jCcmParamsClass == NULL) { return NULL; }
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1112
    if (!(*env)->IsInstanceOf(env, jParam, jCcmParamsClass)) {
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1113
        return NULL;
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1114
    }
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1115
    fieldID = (*env)->GetFieldID(env, jCcmParamsClass, "dataLen", "J");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1116
    if (fieldID == NULL) { return NULL; }
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1117
    jDataLen = (*env)->GetLongField(env, jParam, fieldID);
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1118
    fieldID = (*env)->GetFieldID(env, jCcmParamsClass, "nonce", "[B");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1119
    if (fieldID == NULL) { return NULL; }
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1120
    jNonce = (*env)->GetObjectField(env, jParam, fieldID);
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1121
    fieldID = (*env)->GetFieldID(env, jCcmParamsClass, "aad", "[B");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1122
    if (fieldID == NULL) { return NULL; }
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1123
    jAad = (*env)->GetObjectField(env, jParam, fieldID);
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1124
    fieldID = (*env)->GetFieldID(env, jCcmParamsClass, "macLen", "J");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1125
    if (fieldID == NULL) { return NULL; }
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1126
    jMacLen = (*env)->GetLongField(env, jParam, fieldID);
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1127
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1128
    // allocate memory for CK_CCM_PARAMS pointer
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1129
    ckParamPtr = calloc(1, sizeof(CK_CCM_PARAMS));
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1130
    if (ckParamPtr == NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1131
        throwOutOfMemoryError(env, 0);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1132
        return NULL;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1133
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1134
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1135
    // populate using java values
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1136
    ckParamPtr->ulDataLen = jLongToCKULong(jDataLen);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1137
    jByteArrayToCKByteArray(env, jNonce, &(ckParamPtr->pNonce),
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1138
            &(ckParamPtr->ulNonceLen));
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1139
    if ((*env)->ExceptionCheck(env)) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1140
        goto cleanup;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1141
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1142
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1143
    jByteArrayToCKByteArray(env, jAad, &(ckParamPtr->pAAD),
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1144
            &(ckParamPtr->ulAADLen));
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1145
    if ((*env)->ExceptionCheck(env)) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1146
        goto cleanup;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1147
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1148
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1149
    ckParamPtr->ulMACLen = jLongToCKULong(jMacLen);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1150
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1151
    if (pLength != NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1152
        *pLength = sizeof(CK_CCM_PARAMS);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1153
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1154
    return ckParamPtr;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1155
cleanup:
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1156
    free(ckParamPtr->pNonce);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1157
    free(ckParamPtr->pAAD);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1158
    free(ckParamPtr);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1159
    return NULL;
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1160
}
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1161
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1162
/*
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1163
 * converts a Java CK_MECHANISM object into a CK_MECHANISM pointer
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1164
 * pointer.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1165
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1166
 * @param env - used to call JNI funktions to get the values out of the Java object
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1167
 * @param jMech - the Java CK_MECHANISM object to convert
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1168
 * @return pointer to the new CK_MECHANISM structure
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1169
 */
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1170
CK_MECHANISM_PTR jMechanismToCKMechanismPtr(JNIEnv *env, jobject jMech)
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1171
{
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1172
    CK_MECHANISM_PTR ckpMech;
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1173
    jlong jMechType = (*env)->GetLongField(env, jMech, mech_mechanismID);
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1174
    jobject jParam = (*env)->GetObjectField(env, jMech, mech_pParameterID);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1175
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1176
    /* allocate memory for CK_MECHANISM_PTR */
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1177
    ckpMech =  (CK_MECHANISM_PTR) calloc(1, sizeof(CK_MECHANISM));
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1178
    if (ckpMech == NULL) {
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1179
        throwOutOfMemoryError(env, 0);
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1180
        return NULL;
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1181
    }
58489
2faeaa5933a6 8229243: SunPKCS11-Solaris provider tests failing on Solaris 11.4
valeriep
parents: 58281
diff changeset
  1182
    TRACE1("DEBUG jMechanismToCKMechanismPtr: allocated mech %p\n", ckpMech);
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1183
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1184
    ckpMech->mechanism = jLongToCKULong(jMechType);
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1185
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1186
    /* convert the specific Java mechanism parameter object to a pointer to a
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1187
     *  CK-type mechanism structure
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1188
     */
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1189
    if (jParam == NULL) {
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1190
        ckpMech->pParameter = NULL;
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1191
        ckpMech->ulParameterLen = 0;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1192
    } else {
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1193
        ckpMech->pParameter = jMechParamToCKMechParamPtr(env, jParam,
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1194
            ckpMech->mechanism, &(ckpMech->ulParameterLen));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1195
    }
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1196
    return ckpMech;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1197
}
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1198
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1199
/*
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1200
 * converts the pValue of a CK_ATTRIBUTE structure into a Java Object by
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1201
 * checking the type of the attribute. A PKCS#11 attribute value can
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1202
 * be a CK_ULONG, CK_BYTE[], CK_CHAR[], big integer, CK_BBOOL, CK_UTF8CHAR[],
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1203
 * CK_DATE or CK_FLAGS that gets converted to a corresponding Java object.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1204
 *
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1205
 * @param env - used to call JNI functions to create the new Java object
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1206
 * @param ckpAttribute - the pointer to the CK_ATTRIBUTE structure that contains the type
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1207
 *                       and the pValue to convert
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1208
 * @return the new Java object of the CK-type pValue
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1209
 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1210
jobject ckAttributeValueToJObject(JNIEnv *env, const CK_ATTRIBUTE_PTR ckpAttribute)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1211
{
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1212
    jint jValueLength;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1213
    jobject jValueObject = NULL;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1214
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1215
    jValueLength = ckULongToJInt(ckpAttribute->ulValueLen);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1216
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1217
    if ((jValueLength <= 0) || (ckpAttribute->pValue == NULL)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1218
        return NULL ;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1219
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1220
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1221
    switch(ckpAttribute->type) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1222
        case CKA_CLASS:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1223
            /* value CK_OBJECT_CLASS, defacto a CK_ULONG */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1224
        case CKA_KEY_TYPE:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1225
            /* value CK_KEY_TYPE, defacto a CK_ULONG */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1226
        case CKA_CERTIFICATE_TYPE:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1227
            /* value CK_CERTIFICATE_TYPE, defacto a CK_ULONG */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1228
        case CKA_HW_FEATURE_TYPE:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1229
            /* value CK_HW_FEATURE_TYPE, defacto a CK_ULONG */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1230
        case CKA_MODULUS_BITS:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1231
        case CKA_VALUE_BITS:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1232
        case CKA_VALUE_LEN:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1233
        case CKA_KEY_GEN_MECHANISM:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1234
        case CKA_PRIME_BITS:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1235
        case CKA_SUB_PRIME_BITS:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1236
            /* value CK_ULONG */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1237
            jValueObject = ckULongPtrToJLongObject(env, (CK_ULONG*) ckpAttribute->pValue);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1238
            break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1239
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1240
            /* can be CK_BYTE[],CK_CHAR[] or big integer; defacto always CK_BYTE[] */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1241
        case CKA_VALUE:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1242
        case CKA_OBJECT_ID:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1243
        case CKA_SUBJECT:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1244
        case CKA_ID:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1245
        case CKA_ISSUER:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1246
        case CKA_SERIAL_NUMBER:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1247
        case CKA_OWNER:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1248
        case CKA_AC_ISSUER:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1249
        case CKA_ATTR_TYPES:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1250
        case CKA_ECDSA_PARAMS:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1251
            /* CKA_EC_PARAMS is the same, these two are equivalent */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1252
        case CKA_EC_POINT:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1253
        case CKA_PRIVATE_EXPONENT:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1254
        case CKA_PRIME_1:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1255
        case CKA_PRIME_2:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1256
        case CKA_EXPONENT_1:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1257
        case CKA_EXPONENT_2:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1258
        case CKA_COEFFICIENT:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1259
            /* value CK_BYTE[] */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1260
            jValueObject = ckByteArrayToJByteArray(env, (CK_BYTE*) ckpAttribute->pValue, jValueLength);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1261
            break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1262
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1263
        case CKA_RESET_ON_INIT:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1264
        case CKA_HAS_RESET:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1265
        case CKA_TOKEN:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1266
        case CKA_PRIVATE:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1267
        case CKA_MODIFIABLE:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1268
        case CKA_DERIVE:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1269
        case CKA_LOCAL:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1270
        case CKA_ENCRYPT:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1271
        case CKA_VERIFY:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1272
        case CKA_VERIFY_RECOVER:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1273
        case CKA_WRAP:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1274
        case CKA_SENSITIVE:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1275
        case CKA_SECONDARY_AUTH:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1276
        case CKA_DECRYPT:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1277
        case CKA_SIGN:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1278
        case CKA_SIGN_RECOVER:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1279
        case CKA_UNWRAP:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1280
        case CKA_EXTRACTABLE:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1281
        case CKA_ALWAYS_SENSITIVE:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1282
        case CKA_NEVER_EXTRACTABLE:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1283
        case CKA_TRUSTED:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1284
            /* value CK_BBOOL */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1285
            jValueObject = ckBBoolPtrToJBooleanObject(env, (CK_BBOOL*) ckpAttribute->pValue);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1286
            break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1287
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1288
        case CKA_LABEL:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1289
        case CKA_APPLICATION:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1290
            /* value RFC 2279 (UTF-8) string */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1291
            jValueObject = ckUTF8CharArrayToJCharArray(env, (CK_UTF8CHAR*) ckpAttribute->pValue, jValueLength);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1292
            break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1293
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1294
        case CKA_START_DATE:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1295
        case CKA_END_DATE:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1296
            /* value CK_DATE */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1297
            jValueObject = ckDatePtrToJDateObject(env, (CK_DATE*) ckpAttribute->pValue);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1298
            break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1299
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1300
        case CKA_MODULUS:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1301
        case CKA_PUBLIC_EXPONENT:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1302
        case CKA_PRIME:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1303
        case CKA_SUBPRIME:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1304
        case CKA_BASE:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1305
            /* value big integer, i.e. CK_BYTE[] */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1306
            jValueObject = ckByteArrayToJByteArray(env, (CK_BYTE*) ckpAttribute->pValue, jValueLength);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1307
            break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1308
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1309
        case CKA_AUTH_PIN_FLAGS:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1310
            jValueObject = ckULongPtrToJLongObject(env, (CK_ULONG*) ckpAttribute->pValue);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1311
            /* value FLAGS, defacto a CK_ULONG */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1312
            break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1313
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1314
        case CKA_VENDOR_DEFINED:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1315
            /* we make a CK_BYTE[] out of this */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1316
            jValueObject = ckByteArrayToJByteArray(env, (CK_BYTE*) ckpAttribute->pValue, jValueLength);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1317
            break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1318
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1319
        // Netscape trust attributes
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1320
        case CKA_NETSCAPE_TRUST_SERVER_AUTH:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1321
        case CKA_NETSCAPE_TRUST_CLIENT_AUTH:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1322
        case CKA_NETSCAPE_TRUST_CODE_SIGNING:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1323
        case CKA_NETSCAPE_TRUST_EMAIL_PROTECTION:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1324
            /* value CK_ULONG */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1325
            jValueObject = ckULongPtrToJLongObject(env, (CK_ULONG*) ckpAttribute->pValue);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1326
            break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1327
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1328
        default:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1329
            /* we make a CK_BYTE[] out of this */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1330
            jValueObject = ckByteArrayToJByteArray(env, (CK_BYTE*) ckpAttribute->pValue, jValueLength);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1331
            break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1332
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1333
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1334
    return jValueObject ;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1335
}
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1336
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1337
/*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1338
 * the following functions convert a Java mechanism parameter object to a PKCS#11
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1339
 * mechanism parameter structure
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1340
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1341
 * CK_<Param>_PARAMS j<Param>ParamToCK<Param>Param(JNIEnv *env,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1342
 *                                                 jobject jParam);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1343
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1344
 * These functions get a Java object, that must be the right Java mechanism
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1345
 * object and they return the new PKCS#11 mechanism parameter structure.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1346
 * Every field of the Java object is retrieved, gets converted to a corresponding
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1347
 * PKCS#11 type and is set in the new PKCS#11 structure.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1348
 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1349
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1350
/*
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1351
 * converts the given Java mechanism parameter to a CK mechanism parameter
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1352
 * pointer and store the length in bytes in the length variable.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1353
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1354
 * @param env - used to call JNI funktions to get the Java classes and objects
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1355
 * @param jParam - the Java mechanism parameter object to convert
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1356
 * @param ckMech - the PKCS#11 mechanism type
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1357
 * @param ckpLength - the reference of the length in bytes of the new CK mechanism parameter
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1358
 *                    structure
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1359
 * @return pointer to the new CK mechanism parameter structure
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1360
 */
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1361
CK_VOID_PTR jMechParamToCKMechParamPtr(JNIEnv *env, jobject jParam,
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1362
        CK_MECHANISM_TYPE ckMech, CK_ULONG *ckpLength)
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1363
{
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1364
    CK_VOID_PTR ckpParamPtr;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1365
    if (jParam == NULL) {
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1366
        ckpParamPtr = NULL;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1367
        *ckpLength = 0;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1368
    } else if ((*env)->IsInstanceOf(env, jParam, jByteArrayClass)) {
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1369
        jByteArrayToCKByteArray(env, jParam, (CK_BYTE_PTR *) &ckpParamPtr, ckpLength);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1370
    } else if ((*env)->IsInstanceOf(env, jParam, jLongClass)) {
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1371
        ckpParamPtr = jLongObjectToCKULongPtr(env, jParam);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1372
        *ckpLength = sizeof(CK_ULONG);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1373
    } else {
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1374
        ckpParamPtr = jMechParamToCKMechParamPtrSlow(env, jParam, ckMech, ckpLength);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1375
    }
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1376
    return ckpParamPtr;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1377
}
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1378
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1379
CK_VOID_PTR jMechParamToCKMechParamPtrSlow(JNIEnv *env, jobject jParam,
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1380
        CK_MECHANISM_TYPE ckMech, CK_ULONG *ckpLength)
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1381
{
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1382
    CK_VOID_PTR ckpParamPtr = NULL;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1383
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1384
    /*
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1385
     * Most common cases, i.e. NULL/byte[]/long, are already handled by
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1386
     * jMechParamToCKMechParam before calling this method.
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1387
     */
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1388
    TRACE1("\nDEBUG: jMechParamToCKMechParamPtrSlow, mech=0x%lX\n", ckMech);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1389
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1390
    switch (ckMech) {
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1391
        case CKM_SSL3_PRE_MASTER_KEY_GEN:
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1392
        case CKM_TLS_PRE_MASTER_KEY_GEN:
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1393
            ckpParamPtr = jVersionToCKVersionPtr(env, jParam);
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1394
            if (ckpParamPtr != NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1395
                *ckpLength = sizeof(CK_VERSION);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1396
            } else {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1397
                *ckpLength = 0;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1398
            }
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1399
            break;
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1400
        case CKM_SSL3_MASTER_KEY_DERIVE:
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1401
        case CKM_TLS_MASTER_KEY_DERIVE:
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1402
        case CKM_SSL3_MASTER_KEY_DERIVE_DH:
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1403
        case CKM_TLS_MASTER_KEY_DERIVE_DH:
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1404
            ckpParamPtr = jSsl3MasterKeyDeriveParamToCKSsl3MasterKeyDeriveParamPtr(env, jParam,
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1405
                    ckpLength);
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1406
            break;
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1407
        case CKM_SSL3_KEY_AND_MAC_DERIVE:
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1408
        case CKM_TLS_KEY_AND_MAC_DERIVE:
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1409
            ckpParamPtr = jSsl3KeyMatParamToCKSsl3KeyMatParamPtr(env, jParam,
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1410
                    ckpLength);
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1411
            break;
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1412
        case CKM_TLS12_KEY_AND_MAC_DERIVE:
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1413
            ckpParamPtr = jTls12KeyMatParamToCKTls12KeyMatParamPtr(env, jParam,
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1414
                    ckpLength);
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1415
            break;
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1416
        case CKM_TLS12_MASTER_KEY_DERIVE:
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1417
        case CKM_TLS12_MASTER_KEY_DERIVE_DH:
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1418
            ckpParamPtr = jTls12MasterKeyDeriveParamToCKTls12MasterKeyDeriveParamPtr(env, jParam,
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1419
                    ckpLength);
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1420
            break;
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1421
        case CKM_TLS_PRF:
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1422
        case CKM_NSS_TLS_PRF_GENERAL:
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1423
            ckpParamPtr = jTlsPrfParamsToCKTlsPrfParamPtr(env, jParam,
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1424
                    ckpLength);
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1425
            break;
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1426
        case CKM_TLS_MAC:
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1427
            ckpParamPtr = jTlsMacParamsToCKTlsMacParamPtr(env, jParam,
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1428
                    ckpLength);
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1429
            break;
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1430
        case CKM_AES_CTR:
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1431
            ckpParamPtr = jAesCtrParamsToCKAesCtrParamPtr(env, jParam,
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1432
                    ckpLength);
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1433
            break;
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1434
        case CKM_AES_GCM:
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1435
            ckpParamPtr = jGCMParamsToCKGCMParamPtr(env, jParam, ckpLength);
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1436
            break;
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1437
        case CKM_AES_CCM:
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1438
            ckpParamPtr = jCCMParamsToCKCCMParamPtr(env, jParam, ckpLength);
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1439
            break;
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1440
        case CKM_RSA_PKCS_OAEP:
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1441
            ckpParamPtr = jRsaPkcsOaepParamToCKRsaPkcsOaepParamPtr(env, jParam, ckpLength);
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1442
            break;
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1443
        case CKM_PBE_SHA1_DES3_EDE_CBC:
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1444
        case CKM_PBE_SHA1_DES2_EDE_CBC:
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1445
        case CKM_PBA_SHA1_WITH_SHA1_HMAC:
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1446
            ckpParamPtr = jPbeParamToCKPbeParamPtr(env, jParam, ckpLength);
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1447
            break;
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1448
        case CKM_PKCS5_PBKD2:
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1449
            ckpParamPtr = jPkcs5Pbkd2ParamToCKPkcs5Pbkd2ParamPtr(env, jParam, ckpLength);
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1450
            break;
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1451
        case CKM_RSA_PKCS_PSS:
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1452
        case CKM_SHA1_RSA_PKCS_PSS:
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1453
        case CKM_SHA256_RSA_PKCS_PSS:
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1454
        case CKM_SHA384_RSA_PKCS_PSS:
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1455
        case CKM_SHA512_RSA_PKCS_PSS:
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1456
        case CKM_SHA224_RSA_PKCS_PSS:
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1457
            ckpParamPtr = jRsaPkcsPssParamToCKRsaPkcsPssParamPtr(env, jParam, ckpLength);
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1458
            break;
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1459
        case CKM_ECDH1_DERIVE:
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1460
        case CKM_ECDH1_COFACTOR_DERIVE:
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1461
            ckpParamPtr = jEcdh1DeriveParamToCKEcdh1DeriveParamPtr(env, jParam, ckpLength);
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1462
            break;
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1463
        case CKM_ECMQV_DERIVE:
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1464
            ckpParamPtr = jEcdh2DeriveParamToCKEcdh2DeriveParamPtr(env, jParam, ckpLength);
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1465
            break;
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1466
        case CKM_X9_42_DH_DERIVE:
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1467
            ckpParamPtr = jX942Dh1DeriveParamToCKX942Dh1DeriveParamPtr(env, jParam, ckpLength);
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1468
            break;
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1469
        case CKM_X9_42_DH_HYBRID_DERIVE:
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1470
        case CKM_X9_42_MQV_DERIVE:
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1471
            ckpParamPtr = jX942Dh2DeriveParamToCKX942Dh2DeriveParamPtr(env, jParam, ckpLength);
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1472
            break;
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1473
        // defined by pkcs11.h but we don't support
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1474
        case CKM_KEA_DERIVE: // CK_KEA_DERIVE_PARAMS
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1475
        case CKM_RC2_CBC: // CK_RC2_CBC_PARAMS
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1476
        case CKM_RC2_MAC_GENERAL: // CK_RC2_MAC_GENERAL_PARAMS
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1477
        case CKM_RC5_ECB: // CK_RC5_PARAMS
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1478
        case CKM_RC5_MAC: // CK_RC5_PARAMS
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1479
        case CKM_RC5_CBC: // CK_RC5_CBC_PARAMS
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1480
        case CKM_RC5_MAC_GENERAL: // CK_RC5_MAC_GENERAL_PARAMS
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1481
        case CKM_SKIPJACK_PRIVATE_WRAP: // CK_SKIPJACK_PRIVATE_WRAP_PARAMS
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1482
        case CKM_SKIPJACK_RELAYX: // CK_SKIPJACK_RELAYX_PARAMS
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1483
        case CKM_KEY_WRAP_SET_OAEP: // CK_KEY_WRAP_SET_OAEP_PARAMS
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1484
            throwPKCS11RuntimeException(env, "No parameter support for this mchanism");
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1485
            break;
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1486
        default:
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1487
            /* if everything faild up to here */
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1488
            /* try if the parameter is a primitive Java type */
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1489
            ckpParamPtr = jObjectToPrimitiveCKObjectPtr(env, jParam, ckpLength);
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1490
            /* *ckpParamPtr = jObjectToCKVoidPtr(jParam); */
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1491
            /* *ckpLength = 1; */
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1492
    }
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1493
    TRACE0("\nDEBUG: jMechParamToCKMechParamPtrSlow FINISHED\n");
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
  1494
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1495
    if ((*env)->ExceptionCheck(env)) {
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1496
        return NULL;
51800
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
  1497
    }
bccd9966f1ed 8029661: Support TLS v1.2 algorithm in SunPKCS11 provider
mbalao
parents: 47216
diff changeset
  1498
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1499
    return ckpParamPtr;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1500
}
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1501
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1502
/*
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1503
 * converts the Java CK_RSA_PKCS_OAEP_PARAMS object to a
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1504
 * CK_RSA_PKCS_OAEP_PARAMS pointer
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1505
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1506
 * @param env - used to call JNI funktions to get the Java classes and objects
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1507
 * @param jParam - the Java CK_RSA_PKCS_OAEP_PARAMS object to convert
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1508
 * @param pLength - length of the allocated memory of the returned pointer
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1509
 * @return pointer to the new CK_RSA_PKCS_OAEP_PARAMS structure
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1510
 */
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1511
CK_RSA_PKCS_OAEP_PARAMS_PTR
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1512
jRsaPkcsOaepParamToCKRsaPkcsOaepParamPtr(JNIEnv *env, jobject jParam, CK_ULONG *pLength)
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1513
{
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1514
    CK_RSA_PKCS_OAEP_PARAMS_PTR ckParamPtr;
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1515
    jclass jRsaPkcsOaepParamsClass;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1516
    jfieldID fieldID;
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1517
    jlong jHashAlg, jMgf, jSource;
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1518
    jobject jSourceData;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1519
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1520
    if (pLength!= NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1521
        *pLength = 0L;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1522
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1523
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1524
    // retrieve java values
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1525
    jRsaPkcsOaepParamsClass = (*env)->FindClass(env, CLASS_RSA_PKCS_OAEP_PARAMS);
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1526
    if (jRsaPkcsOaepParamsClass == NULL) { return NULL; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1527
    fieldID = (*env)->GetFieldID(env, jRsaPkcsOaepParamsClass, "hashAlg", "J");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1528
    if (fieldID == NULL) { return NULL; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1529
    jHashAlg = (*env)->GetLongField(env, jParam, fieldID);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1530
    fieldID = (*env)->GetFieldID(env, jRsaPkcsOaepParamsClass, "mgf", "J");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1531
    if (fieldID == NULL) { return NULL; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1532
    jMgf = (*env)->GetLongField(env, jParam, fieldID);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1533
    fieldID = (*env)->GetFieldID(env, jRsaPkcsOaepParamsClass, "source", "J");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1534
    if (fieldID == NULL) { return NULL; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1535
    jSource = (*env)->GetLongField(env, jParam, fieldID);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1536
    fieldID = (*env)->GetFieldID(env, jRsaPkcsOaepParamsClass, "pSourceData", "[B");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1537
    if (fieldID == NULL) { return NULL; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1538
    jSourceData = (*env)->GetObjectField(env, jParam, fieldID);
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1539
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1540
    // allocate memory for CK_RSA_PKCS_OAEP_PARAMS pointer
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1541
    ckParamPtr = calloc(1, sizeof(CK_RSA_PKCS_OAEP_PARAMS));
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1542
    if (ckParamPtr == NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1543
        throwOutOfMemoryError(env, 0);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1544
        return NULL;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1545
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1546
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1547
    // populate using java values
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1548
    ckParamPtr->hashAlg = jLongToCKULong(jHashAlg);
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1549
    ckParamPtr->mgf = jLongToCKULong(jMgf);
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1550
    ckParamPtr->source = jLongToCKULong(jSource);
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1551
    jByteArrayToCKByteArray(env, jSourceData, (CK_BYTE_PTR*) &(ckParamPtr->pSourceData),
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1552
            &(ckParamPtr->ulSourceDataLen));
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1553
    if ((*env)->ExceptionCheck(env)) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1554
        free(ckParamPtr);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1555
        return NULL;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1556
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1557
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1558
    if (pLength!= NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1559
        *pLength = sizeof(CK_RSA_PKCS_OAEP_PARAMS);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1560
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1561
    return ckParamPtr;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1562
}
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1563
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1564
/*
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1565
 * converts the Java CK_PBE_PARAMS object to a CK_PBE_PARAMS pointer
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1566
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1567
 * @param env - used to call JNI funktions to get the Java classes and objects
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1568
 * @param jParam - the Java CK_PBE_PARAMS object to convert
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1569
 * @param pLength - length of the allocated memory of the returned pointer
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1570
 * @return pointer to the new CK_PBE_PARAMS structure
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1571
 */
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1572
CK_PBE_PARAMS_PTR
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1573
jPbeParamToCKPbeParamPtr(JNIEnv *env, jobject jParam, CK_ULONG *pLength)
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1574
{
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1575
    CK_PBE_PARAMS_PTR ckParamPtr;
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1576
    jclass jPbeParamsClass;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1577
    jfieldID fieldID;
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1578
    jlong jIteration;
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1579
    jobject jInitVector, jPassword, jSalt;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1580
    CK_ULONG ckTemp;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1581
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1582
    if (pLength != NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1583
        *pLength = 0;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1584
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1585
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1586
    // retrieve java values
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1587
    jPbeParamsClass = (*env)->FindClass(env, CLASS_PBE_PARAMS);
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1588
    if (jPbeParamsClass == NULL) { return NULL; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1589
    fieldID = (*env)->GetFieldID(env, jPbeParamsClass, "pInitVector", "[C");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1590
    if (fieldID == NULL) { return NULL; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1591
    jInitVector = (*env)->GetObjectField(env, jParam, fieldID);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1592
    fieldID = (*env)->GetFieldID(env, jPbeParamsClass, "pPassword", "[C");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1593
    if (fieldID == NULL) { return NULL; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1594
    jPassword = (*env)->GetObjectField(env, jParam, fieldID);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1595
    fieldID = (*env)->GetFieldID(env, jPbeParamsClass, "pSalt", "[C");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1596
    if (fieldID == NULL) { return NULL; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1597
    jSalt = (*env)->GetObjectField(env, jParam, fieldID);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1598
    fieldID = (*env)->GetFieldID(env, jPbeParamsClass, "ulIteration", "J");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1599
    if (fieldID == NULL) { return NULL; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1600
    jIteration = (*env)->GetLongField(env, jParam, fieldID);
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1601
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1602
    // allocate memory for CK_PBE_PARAMS pointer
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1603
    ckParamPtr = calloc(1, sizeof(CK_PBE_PARAMS));
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1604
    if (ckParamPtr == NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1605
        throwOutOfMemoryError(env, 0);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1606
        return NULL;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1607
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1608
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1609
    // populate using java values
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1610
    ckParamPtr->ulIteration = jLongToCKULong(jIteration);
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1611
    jCharArrayToCKCharArray(env, jInitVector, &(ckParamPtr->pInitVector), &ckTemp);
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1612
    if ((*env)->ExceptionCheck(env)) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1613
        goto cleanup;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1614
    }
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1615
    jCharArrayToCKCharArray(env, jPassword, &(ckParamPtr->pPassword), &(ckParamPtr->ulPasswordLen));
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1616
    if ((*env)->ExceptionCheck(env)) {
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1617
        goto cleanup;
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1618
    }
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1619
    jCharArrayToCKCharArray(env, jSalt, &(ckParamPtr->pSalt), &(ckParamPtr->ulSaltLen));
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1620
    if ((*env)->ExceptionCheck(env)) {
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1621
        goto cleanup;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1622
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1623
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1624
    if (pLength != NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1625
        *pLength = sizeof(CK_PBE_PARAMS);
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1626
    }
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1627
    return ckParamPtr;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1628
cleanup:
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1629
    free(ckParamPtr->pInitVector);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1630
    free(ckParamPtr->pPassword);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1631
    free(ckParamPtr->pSalt);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1632
    free(ckParamPtr);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1633
    return NULL;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1634
}
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1635
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1636
/*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1637
 * Copy back the initialization vector from the native structure to the
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1638
 * Java object. This is only used for CKM_PBE_* mechanisms and their
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1639
 * CK_PBE_PARAMS parameters.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1640
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1641
 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1642
void copyBackPBEInitializationVector(JNIEnv *env, CK_MECHANISM *ckMechanism, jobject jMechanism)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1643
{
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1644
    jclass jMechanismClass, jPbeParamsClass;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1645
    CK_PBE_PARAMS *ckParam;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1646
    jfieldID fieldID;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1647
    CK_MECHANISM_TYPE ckMechanismType;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1648
    jlong jMechanismType;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1649
    jobject jParameter;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1650
    jobject jInitVector;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1651
    jint jInitVectorLength;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1652
    CK_CHAR_PTR initVector;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1653
    int i;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1654
    jchar* jInitVectorChars;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1655
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1656
    /* get mechanism */
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1657
    jMechanismClass = (*env)->FindClass(env, CLASS_MECHANISM);
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1658
    if (jMechanismClass == NULL) { return; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1659
    fieldID = (*env)->GetFieldID(env, jMechanismClass, "mechanism", "J");
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1660
    if (fieldID == NULL) { return; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1661
    jMechanismType = (*env)->GetLongField(env, jMechanism, fieldID);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1662
    ckMechanismType = jLongToCKULong(jMechanismType);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1663
    if (ckMechanismType != ckMechanism->mechanism) {
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1664
        /* we do not have matching types, this should not occur */
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1665
        return;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1666
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1667
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1668
    jPbeParamsClass = (*env)->FindClass(env, CLASS_PBE_PARAMS);
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1669
    if (jPbeParamsClass == NULL) { return; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1670
    ckParam = (CK_PBE_PARAMS *) ckMechanism->pParameter;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1671
    if (ckParam != NULL_PTR) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1672
        initVector = ckParam->pInitVector;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1673
        if (initVector != NULL_PTR) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1674
            /* get pParameter */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1675
            fieldID = (*env)->GetFieldID(env, jMechanismClass, "pParameter", "Ljava/lang/Object;");
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1676
            if (fieldID == NULL) { return; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1677
            jParameter = (*env)->GetObjectField(env, jMechanism, fieldID);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1678
            fieldID = (*env)->GetFieldID(env, jPbeParamsClass, "pInitVektor", "[C");
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1679
            if (fieldID == NULL) { return; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1680
            jInitVector = (*env)->GetObjectField(env, jParameter, fieldID);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1681
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1682
            if (jInitVector != NULL) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1683
                jInitVectorLength = (*env)->GetArrayLength(env, jInitVector);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1684
                jInitVectorChars = (*env)->GetCharArrayElements(env, jInitVector, NULL);
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1685
                if (jInitVectorChars == NULL) { return; }
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1686
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1687
                /* copy the chars to the Java buffer */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1688
                for (i=0; i < jInitVectorLength; i++) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1689
                    jInitVectorChars[i] = ckCharToJChar(initVector[i]);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1690
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1691
                /* copy back the Java buffer to the object */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1692
                (*env)->ReleaseCharArrayElements(env, jInitVector, jInitVectorChars, 0);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1693
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1694
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1695
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1696
}
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1697
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1698
/*
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1699
 * converts the Java CK_PKCS5_PBKD2_PARAMS object to a CK_PKCS5_PBKD2_PARAMS
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1700
 * pointer
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1701
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1702
 * @param env - used to call JNI funktions to get the Java classes and objects
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1703
 * @param jParam - the Java CK_PKCS5_PBKD2_PARAMS object to convert
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1704
 * @param pLength - length of the allocated memory of the returned pointer
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1705
 * @return pointer to the new CK_PKCS5_PBKD2_PARAMS structure
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1706
 */
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1707
CK_PKCS5_PBKD2_PARAMS_PTR
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1708
jPkcs5Pbkd2ParamToCKPkcs5Pbkd2ParamPtr(JNIEnv *env, jobject jParam, CK_ULONG *pLength)
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1709
{
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1710
    CK_PKCS5_PBKD2_PARAMS_PTR ckParamPtr;
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1711
    jclass jPkcs5Pbkd2ParamsClass;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1712
    jfieldID fieldID;
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1713
    jlong jSaltSource, jIteration, jPrf;
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1714
    jobject jSaltSourceData, jPrfData;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1715
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1716
    if (pLength != NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1717
        *pLength = 0L;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1718
    }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1719
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1720
    // retrieve java values
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1721
    jPkcs5Pbkd2ParamsClass = (*env)->FindClass(env, CLASS_PKCS5_PBKD2_PARAMS);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1722
    if (jPkcs5Pbkd2ParamsClass == NULL) { return NULL; }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1723
    fieldID = (*env)->GetFieldID(env, jPkcs5Pbkd2ParamsClass, "saltSource", "J");
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1724
    if (fieldID == NULL) { return NULL; }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1725
    jSaltSource = (*env)->GetLongField(env, jParam, fieldID);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1726
    fieldID = (*env)->GetFieldID(env, jPkcs5Pbkd2ParamsClass, "pSaltSourceData", "[B");
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1727
    if (fieldID == NULL) { return NULL; }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1728
    jSaltSourceData = (*env)->GetObjectField(env, jParam, fieldID);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1729
    fieldID = (*env)->GetFieldID(env, jPkcs5Pbkd2ParamsClass, "iterations", "J");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1730
    if (fieldID == NULL) { return NULL; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1731
    jIteration = (*env)->GetLongField(env, jParam, fieldID);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1732
    fieldID = (*env)->GetFieldID(env, jPkcs5Pbkd2ParamsClass, "prf", "J");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1733
    if (fieldID == NULL) { return NULL; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1734
    jPrf = (*env)->GetLongField(env, jParam, fieldID);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1735
    fieldID = (*env)->GetFieldID(env, jPkcs5Pbkd2ParamsClass, "pPrfData", "[B");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1736
    if (fieldID == NULL) { return NULL; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1737
    jPrfData = (*env)->GetObjectField(env, jParam, fieldID);
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1738
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1739
    // allocate memory for CK_PKCS5_PBKD2_PARAMS pointer
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1740
    ckParamPtr = calloc(1, sizeof(CK_PKCS5_PBKD2_PARAMS));
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1741
    if (ckParamPtr == NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1742
        throwOutOfMemoryError(env, 0);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1743
        return NULL;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1744
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1745
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1746
    // populate using java values
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1747
    ckParamPtr->saltSource = jLongToCKULong(jSaltSource);
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1748
    jByteArrayToCKByteArray(env, jSaltSourceData, (CK_BYTE_PTR *)
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1749
            &(ckParamPtr->pSaltSourceData), &(ckParamPtr->ulSaltSourceDataLen));
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1750
    if ((*env)->ExceptionCheck(env)) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1751
        goto cleanup;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1752
    }
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1753
    ckParamPtr->iterations = jLongToCKULong(jIteration);
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1754
    ckParamPtr->prf = jLongToCKULong(jPrf);
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1755
    jByteArrayToCKByteArray(env, jPrfData, (CK_BYTE_PTR *)
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1756
            &(ckParamPtr->pPrfData), &(ckParamPtr->ulPrfDataLen));
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1757
    if ((*env)->ExceptionCheck(env)) {
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1758
        goto cleanup;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1759
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1760
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1761
    if (pLength != NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1762
        *pLength = sizeof(CK_PKCS5_PBKD2_PARAMS);
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1763
    }
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1764
    return ckParamPtr;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1765
cleanup:
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1766
    free(ckParamPtr->pSaltSourceData);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1767
    free(ckParamPtr->pPrfData);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1768
    free(ckParamPtr);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1769
    return NULL;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1770
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1771
}
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1772
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1773
/*
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1774
 * converts the Java CK_RSA_PKCS_PSS_PARAMS object to a CK_RSA_PKCS_PSS_PARAMS
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1775
 * pointer
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1776
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1777
 * @param env - used to call JNI funktions to get the Java classes and objects
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1778
 * @param jParam - the Java CK_RSA_PKCS_PSS_PARAMS object to convert
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1779
 * @param pLength - length of the allocated memory of the returned pointer
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1780
 * @return pointer to the new CK_RSA_PKCS_PSS_PARAMS structure
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1781
 */
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1782
CK_RSA_PKCS_PSS_PARAMS_PTR
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1783
jRsaPkcsPssParamToCKRsaPkcsPssParamPtr(JNIEnv *env, jobject jParam, CK_ULONG *pLength)
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1784
{
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1785
    CK_RSA_PKCS_PSS_PARAMS_PTR ckParamPtr;
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1786
    jclass jRsaPkcsPssParamsClass;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1787
    jfieldID fieldID;
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1788
    jlong jHashAlg, jMgf, jSLen;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1789
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1790
    if (pLength != NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1791
        *pLength = 0;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1792
    }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1793
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1794
    // retrieve java values
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1795
    jRsaPkcsPssParamsClass = (*env)->FindClass(env, CLASS_RSA_PKCS_PSS_PARAMS);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1796
    if (jRsaPkcsPssParamsClass == NULL) { return NULL; }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1797
    fieldID = (*env)->GetFieldID(env, jRsaPkcsPssParamsClass, "hashAlg", "J");
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1798
    if (fieldID == NULL) { return NULL; }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1799
    jHashAlg = (*env)->GetLongField(env, jParam, fieldID);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1800
    fieldID = (*env)->GetFieldID(env, jRsaPkcsPssParamsClass, "mgf", "J");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1801
    if (fieldID == NULL) { return NULL; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1802
    jMgf = (*env)->GetLongField(env, jParam, fieldID);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1803
    fieldID = (*env)->GetFieldID(env, jRsaPkcsPssParamsClass, "sLen", "J");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1804
    if (fieldID == NULL) { return NULL; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1805
    jSLen = (*env)->GetLongField(env, jParam, fieldID);
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1806
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1807
    // allocate memory for CK_RSA_PKCS_PSS_PARAMS pointer
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1808
    ckParamPtr = calloc(1, sizeof(CK_RSA_PKCS_PSS_PARAMS));
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1809
    if (ckParamPtr == NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1810
        throwOutOfMemoryError(env, 0);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1811
        return NULL;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1812
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1813
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1814
    // populate using java values
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1815
    ckParamPtr->hashAlg = jLongToCKULong(jHashAlg);
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1816
    ckParamPtr->mgf = jLongToCKULong(jMgf);
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1817
    ckParamPtr->sLen = jLongToCKULong(jSLen);
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1818
    TRACE1("DEBUG: jRsaPkcsPssParamToCKRsaPkcsPssParam, hashAlg=0x%lX\n", ckParamPtr->hashAlg);
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1819
    TRACE1("DEBUG: jRsaPkcsPssParamToCKRsaPkcsPssParam, mgf=0x%lX\n", ckParamPtr->mgf);
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1820
    TRACE1("DEBUG: jRsaPkcsPssParamToCKRsaPkcsPssParam, sLen=%lu\n", ckParamPtr->sLen);
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1821
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1822
    if (pLength != NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1823
        *pLength = sizeof(CK_RSA_PKCS_PSS_PARAMS);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1824
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1825
    return ckParamPtr;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1826
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1827
}
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1828
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1829
/*
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1830
 * converts the Java CK_ECDH1_DERIVE_PARAMS object to a CK_ECDH1_DERIVE_PARAMS
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1831
 * pointer
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1832
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1833
 * @param env - used to call JNI funktions to get the Java classes and objects
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1834
 * @param jParam - the Java CK_ECDH1_DERIVE_PARAMS object to convert
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1835
 * @param pLength - length of the allocated memory of the returned pointer
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1836
 * @retur pointer to nthe new CK_ECDH1_DERIVE_PARAMS structure
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1837
 */
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1838
CK_ECDH1_DERIVE_PARAMS_PTR
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1839
jEcdh1DeriveParamToCKEcdh1DeriveParamPtr(JNIEnv *env, jobject jParam, CK_ULONG *pLength)
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1840
{
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1841
    CK_ECDH1_DERIVE_PARAMS_PTR ckParamPtr;
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1842
    jclass jEcdh1DeriveParamsClass;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1843
    jfieldID fieldID;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1844
    jlong jLong;
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1845
    jobject jSharedData, jPublicData;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1846
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1847
    if (pLength != NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1848
        *pLength = 0;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1849
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1850
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1851
    // retrieve java values
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1852
    jEcdh1DeriveParamsClass = (*env)->FindClass(env, CLASS_ECDH1_DERIVE_PARAMS);
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1853
    if (jEcdh1DeriveParamsClass == NULL) { return NULL; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1854
    fieldID = (*env)->GetFieldID(env, jEcdh1DeriveParamsClass, "kdf", "J");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1855
    if (fieldID == NULL) { return NULL; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1856
    jLong = (*env)->GetLongField(env, jParam, fieldID);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1857
    fieldID = (*env)->GetFieldID(env, jEcdh1DeriveParamsClass, "pSharedData", "[B");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1858
    if (fieldID == NULL) { return NULL; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1859
    jSharedData = (*env)->GetObjectField(env, jParam, fieldID);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1860
    fieldID = (*env)->GetFieldID(env, jEcdh1DeriveParamsClass, "pPublicData", "[B");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1861
    if (fieldID == NULL) { return NULL; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1862
    jPublicData = (*env)->GetObjectField(env, jParam, fieldID);
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1863
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1864
    // allocate memory for CK_ECDH1_DERIVE_PARAMS pointer
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1865
    ckParamPtr = calloc(1, sizeof(CK_ECDH1_DERIVE_PARAMS));
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1866
    if (ckParamPtr == NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1867
        throwOutOfMemoryError(env, 0);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1868
        return NULL;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1869
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1870
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1871
    // populate using java values
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1872
    ckParamPtr->kdf = jLongToCKULong(jLong);
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1873
    jByteArrayToCKByteArray(env, jSharedData, &(ckParamPtr->pSharedData),
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1874
            &(ckParamPtr->ulSharedDataLen));
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1875
    if ((*env)->ExceptionCheck(env)) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1876
        goto cleanup;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1877
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1878
    jByteArrayToCKByteArray(env, jPublicData, &(ckParamPtr->pPublicData),
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1879
            &(ckParamPtr->ulPublicDataLen));
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1880
    if ((*env)->ExceptionCheck(env)) {
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1881
        goto cleanup;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1882
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1883
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1884
    if (pLength != NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1885
        *pLength = sizeof(CK_ECDH1_DERIVE_PARAMS);
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1886
    }
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1887
    return ckParamPtr;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1888
cleanup:
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1889
    free(ckParamPtr->pSharedData);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1890
    free(ckParamPtr->pPublicData);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1891
    free(ckParamPtr);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1892
    return NULL;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1893
}
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1894
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1895
/*
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1896
 * converts the Java CK_ECDH2_DERIVE_PARAMS object to a CK_ECDH2_DERIVE_PARAMS
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1897
 * pointer
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1898
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1899
 * @param env - used to call JNI funktions to get the Java classes and objects
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1900
 * @param jParam - the Java CK_ECDH2_DERIVE_PARAMS object to convert
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1901
 * @param pLength - length of the allocated memory of the returned pointer
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1902
 * @return pointer to the new CK_ECDH2_DERIVE_PARAMS structure
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1903
 */
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1904
CK_ECDH2_DERIVE_PARAMS_PTR
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1905
jEcdh2DeriveParamToCKEcdh2DeriveParamPtr(JNIEnv *env, jobject jParam, CK_ULONG *pLength)
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1906
{
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1907
    CK_ECDH2_DERIVE_PARAMS_PTR ckParamPtr;
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1908
    jclass jEcdh2DeriveParamsClass;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1909
    jfieldID fieldID;
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1910
    jlong jKdf, jPrivateDataLen, jPrivateData;
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1911
    jobject jSharedData, jPublicData, jPublicData2;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1912
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1913
    // retrieve java values
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1914
    jEcdh2DeriveParamsClass = (*env)->FindClass(env, CLASS_ECDH2_DERIVE_PARAMS);
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1915
    if (jEcdh2DeriveParamsClass == NULL) { return NULL; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1916
    fieldID = (*env)->GetFieldID(env, jEcdh2DeriveParamsClass, "kdf", "J");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1917
    if (fieldID == NULL) { return NULL; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1918
    jKdf = (*env)->GetLongField(env, jParam, fieldID);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1919
    fieldID = (*env)->GetFieldID(env, jEcdh2DeriveParamsClass, "pSharedData", "[B");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1920
    if (fieldID == NULL) { return NULL; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1921
    jSharedData = (*env)->GetObjectField(env, jParam, fieldID);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1922
    fieldID = (*env)->GetFieldID(env, jEcdh2DeriveParamsClass, "pPublicData", "[B");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1923
    if (fieldID == NULL) { return NULL; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1924
    jPublicData = (*env)->GetObjectField(env, jParam, fieldID);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1925
    fieldID = (*env)->GetFieldID(env, jEcdh2DeriveParamsClass, "ulPrivateDataLen", "J");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1926
    if (fieldID == NULL) { return NULL; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1927
    jPrivateDataLen = (*env)->GetLongField(env, jParam, fieldID);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1928
    fieldID = (*env)->GetFieldID(env, jEcdh2DeriveParamsClass, "hPrivateData", "J");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1929
    if (fieldID == NULL) { return NULL; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1930
    jPrivateData = (*env)->GetLongField(env, jParam, fieldID);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1931
    fieldID = (*env)->GetFieldID(env, jEcdh2DeriveParamsClass, "pPublicData2", "[B");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1932
    if (fieldID == NULL) { return NULL; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1933
    jPublicData2 = (*env)->GetObjectField(env, jParam, fieldID);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1934
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1935
    // allocate memory for CK_ECDH2_DERIVE_PARAMS pointer
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1936
    ckParamPtr = calloc(1, sizeof(CK_ECDH2_DERIVE_PARAMS));
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1937
    if (ckParamPtr == NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1938
        throwOutOfMemoryError(env, 0);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1939
        return NULL;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1940
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1941
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1942
    // populate using java values
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1943
    ckParamPtr->kdf = jLongToCKULong(jKdf);
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1944
    jByteArrayToCKByteArray(env, jSharedData, &(ckParamPtr->pSharedData),
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1945
            &(ckParamPtr->ulSharedDataLen));
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1946
    if ((*env)->ExceptionCheck(env)) {
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1947
        goto cleanup;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1948
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1949
    jByteArrayToCKByteArray(env, jPublicData, &(ckParamPtr->pPublicData),
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1950
            &(ckParamPtr->ulPublicDataLen));
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1951
    if ((*env)->ExceptionCheck(env)) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1952
        goto cleanup;
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1953
    }
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1954
    ckParamPtr->ulPrivateDataLen = jLongToCKULong(jPrivateDataLen);
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  1955
    ckParamPtr->hPrivateData = jLongToCKULong(jPrivateData);
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1956
    jByteArrayToCKByteArray(env, jPublicData2, &(ckParamPtr->pPublicData2),
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1957
            &(ckParamPtr->ulPublicDataLen2));
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1958
    if ((*env)->ExceptionCheck(env)) {
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1959
        goto cleanup;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1960
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1961
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1962
    if (pLength != NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1963
        *pLength = sizeof(CK_ECDH2_DERIVE_PARAMS);
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1964
    }
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1965
    return ckParamPtr;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1966
cleanup:
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1967
    free(ckParamPtr->pSharedData);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1968
    free(ckParamPtr->pPublicData);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1969
    free(ckParamPtr->pPublicData2);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1970
    free(ckParamPtr);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1971
    return NULL;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1972
}
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1973
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1974
/*
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1975
 * converts the Java CK_X9_42_DH1_DERIVE_PARAMS object to a
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1976
 * CK_X9_42_DH1_DERIVE_PARAMS pointer
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1977
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1978
 * @param env - used to call JNI funktions to get the Java classes and objects
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1979
 * @param jParam - the Java CK_X9_42_DH1_DERIVE_PARAMS object to convert
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1980
 * @param pLength - length of the allocated memory of the returned pointer
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1981
 * @return pointer to the new CK_X9_42_DH1_DERIVE_PARAMS structure
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1982
 */
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1983
CK_X9_42_DH1_DERIVE_PARAMS_PTR
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1984
jX942Dh1DeriveParamToCKX942Dh1DeriveParamPtr(JNIEnv *env, jobject jParam, CK_ULONG *pLength)
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1985
{
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1986
    CK_X9_42_DH1_DERIVE_PARAMS_PTR ckParamPtr;
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1987
    jclass jX942Dh1DeriveParamsClass;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1988
    jfieldID fieldID;
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1989
    jlong jKdf;
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  1990
    jobject jOtherInfo, jPublicData;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1991
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1992
    if (pLength != NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1993
        *pLength = 0;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1994
    }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1995
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1996
    // retrieve java values
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1997
    jX942Dh1DeriveParamsClass = (*env)->FindClass(env, CLASS_X9_42_DH1_DERIVE_PARAMS);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1998
    if (jX942Dh1DeriveParamsClass == NULL) { return NULL; }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  1999
    fieldID = (*env)->GetFieldID(env, jX942Dh1DeriveParamsClass, "kdf", "J");
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2000
    if (fieldID == NULL) { return NULL; }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2001
    jKdf = (*env)->GetLongField(env, jParam, fieldID);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2002
    fieldID = (*env)->GetFieldID(env, jX942Dh1DeriveParamsClass, "pOtherInfo", "[B");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2003
    if (fieldID == NULL) { return NULL; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  2004
    jOtherInfo = (*env)->GetObjectField(env, jParam, fieldID);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2005
    fieldID = (*env)->GetFieldID(env, jX942Dh1DeriveParamsClass, "pPublicData", "[B");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2006
    if (fieldID == NULL) { return NULL; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  2007
    jPublicData = (*env)->GetObjectField(env, jParam, fieldID);
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  2008
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2009
    // allocate memory for CK_X9_42_DH1_DERIVE_PARAMS pointer
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2010
    ckParamPtr = calloc(1, sizeof(CK_X9_42_DH1_DERIVE_PARAMS));
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2011
    if (ckParamPtr == NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2012
        throwOutOfMemoryError(env, 0);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2013
        return NULL;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2014
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2015
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2016
    // populate using java values
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  2017
    ckParamPtr->kdf = jLongToCKULong(jKdf);
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2018
    jByteArrayToCKByteArray(env, jOtherInfo, &(ckParamPtr->pOtherInfo),
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2019
            &(ckParamPtr->ulOtherInfoLen));
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2020
    if ((*env)->ExceptionCheck(env)) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2021
        goto cleanup;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2022
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2023
    jByteArrayToCKByteArray(env, jPublicData, &(ckParamPtr->pPublicData),
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2024
            &(ckParamPtr->ulPublicDataLen));
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  2025
    if ((*env)->ExceptionCheck(env)) {
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2026
        goto cleanup;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2027
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2028
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2029
    if (pLength != NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2030
        *pLength = sizeof(CK_X9_42_DH1_DERIVE_PARAMS);
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  2031
    }
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2032
    return ckParamPtr;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2033
cleanup:
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2034
    free(ckParamPtr->pOtherInfo);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2035
    free(ckParamPtr->pPublicData);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2036
    free(ckParamPtr);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2037
    return NULL;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2038
}
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2039
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2040
/*
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2041
 * converts the Java CK_X9_42_DH2_DERIVE_PARAMS object to a
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2042
 * CK_X9_42_DH2_DERIVE_PARAMS pointer
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2043
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2044
 * @param env - used to call JNI funktions to get the Java classes and objects
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2045
 * @param jParam - the Java CK_X9_42_DH2_DERIVE_PARAMS object to convert
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2046
 * @param pLength - length of the allocated memory of the returned pointer
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2047
 * @return pointer to the new CK_X9_42_DH2_DERIVE_PARAMS structure
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2048
 */
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2049
CK_X9_42_DH2_DERIVE_PARAMS_PTR
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2050
jX942Dh2DeriveParamToCKX942Dh2DeriveParamPtr(JNIEnv *env, jobject jParam, CK_ULONG *pLength)
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2051
{
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2052
    CK_X9_42_DH2_DERIVE_PARAMS_PTR ckParamPtr;
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  2053
    jclass jX942Dh2DeriveParamsClass;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2054
    jfieldID fieldID;
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  2055
    jlong jKdf, jPrivateDataLen, jPrivateData;
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  2056
    jobject jOtherInfo, jPublicData, jPublicData2;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2057
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2058
    if (pLength != NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2059
        *pLength = 0L;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2060
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2061
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2062
    // retrieve java values
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  2063
    jX942Dh2DeriveParamsClass = (*env)->FindClass(env, CLASS_X9_42_DH2_DERIVE_PARAMS);
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2064
    if (jX942Dh2DeriveParamsClass == NULL) { return NULL; }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2065
    fieldID = (*env)->GetFieldID(env, jX942Dh2DeriveParamsClass, "kdf", "J");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2066
    if (fieldID == NULL) { return NULL; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  2067
    jKdf = (*env)->GetLongField(env, jParam, fieldID);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2068
    fieldID = (*env)->GetFieldID(env, jX942Dh2DeriveParamsClass, "pOtherInfo", "[B");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2069
    if (fieldID == NULL) { return NULL; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  2070
    jOtherInfo = (*env)->GetObjectField(env, jParam, fieldID);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2071
    fieldID = (*env)->GetFieldID(env, jX942Dh2DeriveParamsClass, "pPublicData", "[B");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2072
    if (fieldID == NULL) { return NULL; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  2073
    jPublicData = (*env)->GetObjectField(env, jParam, fieldID);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2074
    fieldID = (*env)->GetFieldID(env, jX942Dh2DeriveParamsClass, "ulPrivateDataLen", "J");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2075
    if (fieldID == NULL) { return NULL; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  2076
    jPrivateDataLen = (*env)->GetLongField(env, jParam, fieldID);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2077
    fieldID = (*env)->GetFieldID(env, jX942Dh2DeriveParamsClass, "hPrivateData", "J");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2078
    if (fieldID == NULL) { return NULL; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  2079
    jPrivateData = (*env)->GetLongField(env, jParam, fieldID);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2080
    fieldID = (*env)->GetFieldID(env, jX942Dh2DeriveParamsClass, "pPublicData2", "[B");
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2081
    if (fieldID == NULL) { return NULL; }
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  2082
    jPublicData2 = (*env)->GetObjectField(env, jParam, fieldID);
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  2083
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2084
    // allocate memory for CK_DATE pointer
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2085
    ckParamPtr = calloc(1, sizeof(CK_X9_42_DH2_DERIVE_PARAMS));
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2086
    if (ckParamPtr == NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2087
        throwOutOfMemoryError(env, 0);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2088
        return NULL;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2089
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2090
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2091
    // populate using java values
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  2092
    ckParamPtr->kdf = jLongToCKULong(jKdf);
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2093
    jByteArrayToCKByteArray(env, jOtherInfo, &(ckParamPtr->pOtherInfo),
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2094
            &(ckParamPtr->ulOtherInfoLen));
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  2095
    if ((*env)->ExceptionCheck(env)) {
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2096
        goto cleanup;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2097
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2098
    jByteArrayToCKByteArray(env, jPublicData, &(ckParamPtr->pPublicData),
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2099
            &(ckParamPtr->ulPublicDataLen));
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2100
    if ((*env)->ExceptionCheck(env)) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2101
        goto cleanup;
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  2102
    }
55332
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  2103
    ckParamPtr->ulPrivateDataLen = jLongToCKULong(jPrivateDataLen);
f492567244ab 8080462: Update SunPKCS11 provider with PKCS11 v2.40 support
valeriep
parents: 51802
diff changeset
  2104
    ckParamPtr->hPrivateData = jLongToCKULong(jPrivateData);
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2105
    jByteArrayToCKByteArray(env, jPublicData2, &(ckParamPtr->pPublicData2),
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2106
            &(ckParamPtr->ulPublicDataLen2));
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  2107
    if ((*env)->ExceptionCheck(env)) {
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2108
        goto cleanup;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2109
    }
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2110
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2111
    if (pLength != NULL) {
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2112
        *pLength = sizeof(CK_X9_42_DH2_DERIVE_PARAMS);
2180
9994f4f08a59 6812738: SSL stress test with GF leads to 32 bit max process size in less than 5 minutes with PCKS11 provider
valeriep
parents: 2
diff changeset
  2113
    }
57737
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2114
    return ckParamPtr;
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2115
cleanup:
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2116
    free(ckParamPtr->pOtherInfo);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2117
    free(ckParamPtr->pPublicData);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2118
    free(ckParamPtr->pPublicData2);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2119
    free(ckParamPtr);
6bbb4af131e3 8228835: Memory leak in PKCS11 provider when using AES GCM
valeriep
parents: 55332
diff changeset
  2120
    return NULL;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2121
}