jdk/src/jdk.crypto.token/share/classes/sun/security/pkcs11/Token.java
changeset 43248 5e15de85a1a0
parent 43247 8d242299a219
child 43249 b017b10f62ab
equal deleted inserted replaced
43247:8d242299a219 43248:5e15de85a1a0
     1 /*
       
     2  * Copyright (c) 2003, 2013, Oracle and/or its affiliates. All rights reserved.
       
     3  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
       
     4  *
       
     5  * This code is free software; you can redistribute it and/or modify it
       
     6  * under the terms of the GNU General Public License version 2 only, as
       
     7  * published by the Free Software Foundation.  Oracle designates this
       
     8  * particular file as subject to the "Classpath" exception as provided
       
     9  * by Oracle in the LICENSE file that accompanied this code.
       
    10  *
       
    11  * This code is distributed in the hope that it will be useful, but WITHOUT
       
    12  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
       
    13  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
       
    14  * version 2 for more details (a copy is included in the LICENSE file that
       
    15  * accompanied this code).
       
    16  *
       
    17  * You should have received a copy of the GNU General Public License version
       
    18  * 2 along with this work; if not, write to the Free Software Foundation,
       
    19  * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
       
    20  *
       
    21  * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
       
    22  * or visit www.oracle.com if you need additional information or have any
       
    23  * questions.
       
    24  */
       
    25 
       
    26 package sun.security.pkcs11;
       
    27 
       
    28 import java.util.*;
       
    29 import java.util.concurrent.ConcurrentHashMap;
       
    30 import java.io.*;
       
    31 import java.lang.ref.*;
       
    32 
       
    33 import java.security.*;
       
    34 import javax.security.auth.login.LoginException;
       
    35 
       
    36 import sun.security.jca.JCAUtil;
       
    37 
       
    38 import sun.security.pkcs11.wrapper.*;
       
    39 import static sun.security.pkcs11.TemplateManager.*;
       
    40 import static sun.security.pkcs11.wrapper.PKCS11Constants.*;
       
    41 
       
    42 /**
       
    43  * PKCS#11 token.
       
    44  *
       
    45  * @author  Andreas Sterbenz
       
    46  * @since   1.5
       
    47  */
       
    48 class Token implements Serializable {
       
    49 
       
    50     // need to be serializable to allow SecureRandom to be serialized
       
    51     private static final long serialVersionUID = 2541527649100571747L;
       
    52 
       
    53     // how often to check if the token is still present (in ms)
       
    54     // this is different from checking if a token has been inserted,
       
    55     // that is done in SunPKCS11. Currently 50 ms.
       
    56     private final static long CHECK_INTERVAL = 50;
       
    57 
       
    58     final SunPKCS11 provider;
       
    59 
       
    60     final PKCS11 p11;
       
    61 
       
    62     final Config config;
       
    63 
       
    64     final CK_TOKEN_INFO tokenInfo;
       
    65 
       
    66     // session manager to pool sessions
       
    67     final SessionManager sessionManager;
       
    68 
       
    69     // template manager to customize the attributes used when creating objects
       
    70     private final TemplateManager templateManager;
       
    71 
       
    72     // flag indicating whether we need to explicitly cancel operations
       
    73     // we started on the token. If false, we assume operations are
       
    74     // automatically cancelled once we start another one
       
    75     final boolean explicitCancel;
       
    76 
       
    77     // translation cache for secret keys
       
    78     final KeyCache secretCache;
       
    79 
       
    80     // translation cache for asymmetric keys (public and private)
       
    81     final KeyCache privateCache;
       
    82 
       
    83     // cached instances of the various key factories, initialized on demand
       
    84     private volatile P11KeyFactory rsaFactory, dsaFactory, dhFactory, ecFactory;
       
    85 
       
    86     // table which maps mechanisms to the corresponding cached
       
    87     // MechanismInfo objects
       
    88     private final Map<Long, CK_MECHANISM_INFO> mechInfoMap;
       
    89 
       
    90     // single SecureRandomSpi instance we use per token
       
    91     // initialized on demand (if supported)
       
    92     private volatile P11SecureRandom secureRandom;
       
    93 
       
    94     // single KeyStoreSpi instance we use per provider
       
    95     // initialized on demand
       
    96     private volatile P11KeyStore keyStore;
       
    97 
       
    98     // whether this token is a removable token
       
    99     private final boolean removable;
       
   100 
       
   101     // for removable tokens: whether this token is valid or has been removed
       
   102     private volatile boolean valid;
       
   103 
       
   104     // for removable tokens: time last checked for token presence
       
   105     private long lastPresentCheck;
       
   106 
       
   107     // unique token id, used for serialization only
       
   108     private byte[] tokenId;
       
   109 
       
   110     // flag indicating whether the token is write protected
       
   111     private boolean writeProtected;
       
   112 
       
   113     // flag indicating whether we are logged in
       
   114     private volatile boolean loggedIn;
       
   115 
       
   116     // time we last checked login status
       
   117     private long lastLoginCheck;
       
   118 
       
   119     // mutex for token-present-check
       
   120     private final static Object CHECK_LOCK = new Object();
       
   121 
       
   122     // object for indicating unsupported mechanism in 'mechInfoMap'
       
   123     private final static CK_MECHANISM_INFO INVALID_MECH =
       
   124         new CK_MECHANISM_INFO(0, 0, 0);
       
   125 
       
   126     // flag indicating whether the token supports raw secret key material import
       
   127     private Boolean supportsRawSecretKeyImport;
       
   128 
       
   129     Token(SunPKCS11 provider) throws PKCS11Exception {
       
   130         this.provider = provider;
       
   131         this.removable = provider.removable;
       
   132         this.valid = true;
       
   133         p11 = provider.p11;
       
   134         config = provider.config;
       
   135         tokenInfo = p11.C_GetTokenInfo(provider.slotID);
       
   136         writeProtected = (tokenInfo.flags & CKF_WRITE_PROTECTED) != 0;
       
   137         // create session manager and open a test session
       
   138         SessionManager sessionManager;
       
   139         try {
       
   140             sessionManager = new SessionManager(this);
       
   141             Session s = sessionManager.getOpSession();
       
   142             sessionManager.releaseSession(s);
       
   143         } catch (PKCS11Exception e) {
       
   144             if (writeProtected) {
       
   145                 throw e;
       
   146             }
       
   147             // token might not permit RW sessions even though
       
   148             // CKF_WRITE_PROTECTED is not set
       
   149             writeProtected = true;
       
   150             sessionManager = new SessionManager(this);
       
   151             Session s = sessionManager.getOpSession();
       
   152             sessionManager.releaseSession(s);
       
   153         }
       
   154         this.sessionManager = sessionManager;
       
   155         secretCache = new KeyCache();
       
   156         privateCache = new KeyCache();
       
   157         templateManager = config.getTemplateManager();
       
   158         explicitCancel = config.getExplicitCancel();
       
   159         mechInfoMap =
       
   160             new ConcurrentHashMap<Long, CK_MECHANISM_INFO>(10);
       
   161     }
       
   162 
       
   163     boolean isWriteProtected() {
       
   164         return writeProtected;
       
   165     }
       
   166 
       
   167     // return whether the token supports raw secret key material import
       
   168     boolean supportsRawSecretKeyImport() {
       
   169         if (supportsRawSecretKeyImport == null) {
       
   170             SecureRandom random = JCAUtil.getSecureRandom();
       
   171             byte[] encoded = new byte[48];
       
   172             random.nextBytes(encoded);
       
   173 
       
   174             CK_ATTRIBUTE[] attributes = new CK_ATTRIBUTE[3];
       
   175             attributes[0] = new CK_ATTRIBUTE(CKA_CLASS, CKO_SECRET_KEY);
       
   176             attributes[1] = new CK_ATTRIBUTE(CKA_KEY_TYPE, CKK_GENERIC_SECRET);
       
   177             attributes[2] = new CK_ATTRIBUTE(CKA_VALUE, encoded);
       
   178 
       
   179             Session session = null;
       
   180             try {
       
   181                 attributes = getAttributes(O_IMPORT,
       
   182                         CKO_SECRET_KEY, CKK_GENERIC_SECRET, attributes);
       
   183                 session = getObjSession();
       
   184                 long keyID = p11.C_CreateObject(session.id(), attributes);
       
   185 
       
   186                 supportsRawSecretKeyImport = Boolean.TRUE;
       
   187             } catch (PKCS11Exception e) {
       
   188                 supportsRawSecretKeyImport = Boolean.FALSE;
       
   189             } finally {
       
   190                 releaseSession(session);
       
   191             }
       
   192         }
       
   193 
       
   194         return supportsRawSecretKeyImport;
       
   195     }
       
   196 
       
   197     // return whether we are logged in
       
   198     // uses cached result if current. session is optional and may be null
       
   199     boolean isLoggedIn(Session session) throws PKCS11Exception {
       
   200         // volatile load first
       
   201         boolean loggedIn = this.loggedIn;
       
   202         long time = System.currentTimeMillis();
       
   203         if (time - lastLoginCheck > CHECK_INTERVAL) {
       
   204             loggedIn = isLoggedInNow(session);
       
   205             lastLoginCheck = time;
       
   206         }
       
   207         return loggedIn;
       
   208     }
       
   209 
       
   210     // return whether we are logged in now
       
   211     // does not use cache
       
   212     boolean isLoggedInNow(Session session) throws PKCS11Exception {
       
   213         boolean allocSession = (session == null);
       
   214         try {
       
   215             if (allocSession) {
       
   216                 session = getOpSession();
       
   217             }
       
   218             CK_SESSION_INFO info = p11.C_GetSessionInfo(session.id());
       
   219             boolean loggedIn = (info.state == CKS_RO_USER_FUNCTIONS) ||
       
   220                                 (info.state == CKS_RW_USER_FUNCTIONS);
       
   221             this.loggedIn = loggedIn;
       
   222             return loggedIn;
       
   223         } finally {
       
   224             if (allocSession) {
       
   225                 releaseSession(session);
       
   226             }
       
   227         }
       
   228     }
       
   229 
       
   230     // ensure that we are logged in
       
   231     // call provider.login() if not
       
   232     void ensureLoggedIn(Session session) throws PKCS11Exception, LoginException {
       
   233         if (isLoggedIn(session) == false) {
       
   234             provider.login(null, null);
       
   235         }
       
   236     }
       
   237 
       
   238     // return whether this token object is valid (i.e. token not removed)
       
   239     // returns value from last check, does not perform new check
       
   240     boolean isValid() {
       
   241         if (removable == false) {
       
   242             return true;
       
   243         }
       
   244         return valid;
       
   245     }
       
   246 
       
   247     void ensureValid() {
       
   248         if (isValid() == false) {
       
   249             throw new ProviderException("Token has been removed");
       
   250         }
       
   251     }
       
   252 
       
   253     // return whether a token is present (i.e. token not removed)
       
   254     // returns cached value if current, otherwise performs new check
       
   255     boolean isPresent(long sessionID) {
       
   256         if (removable == false) {
       
   257             return true;
       
   258         }
       
   259         if (valid == false) {
       
   260             return false;
       
   261         }
       
   262         long time = System.currentTimeMillis();
       
   263         if ((time - lastPresentCheck) >= CHECK_INTERVAL) {
       
   264             synchronized (CHECK_LOCK) {
       
   265                 if ((time - lastPresentCheck) >= CHECK_INTERVAL) {
       
   266                     boolean ok = false;
       
   267                     try {
       
   268                         // check if token still present
       
   269                         CK_SLOT_INFO slotInfo =
       
   270                                 provider.p11.C_GetSlotInfo(provider.slotID);
       
   271                         if ((slotInfo.flags & CKF_TOKEN_PRESENT) != 0) {
       
   272                             // if the token has been removed and re-inserted,
       
   273                             // the token should return an error
       
   274                             CK_SESSION_INFO sessInfo =
       
   275                                     provider.p11.C_GetSessionInfo
       
   276                                     (sessionID);
       
   277                             ok = true;
       
   278                         }
       
   279                     } catch (PKCS11Exception e) {
       
   280                         // empty
       
   281                     }
       
   282                     valid = ok;
       
   283                     lastPresentCheck = System.currentTimeMillis();
       
   284                     if (ok == false) {
       
   285                         destroy();
       
   286                     }
       
   287                 }
       
   288             }
       
   289         }
       
   290         return valid;
       
   291     }
       
   292 
       
   293     void destroy() {
       
   294         valid = false;
       
   295         provider.uninitToken(this);
       
   296     }
       
   297 
       
   298     Session getObjSession() throws PKCS11Exception {
       
   299         return sessionManager.getObjSession();
       
   300     }
       
   301 
       
   302     Session getOpSession() throws PKCS11Exception {
       
   303         return sessionManager.getOpSession();
       
   304     }
       
   305 
       
   306     Session releaseSession(Session session) {
       
   307         return sessionManager.releaseSession(session);
       
   308     }
       
   309 
       
   310     Session killSession(Session session) {
       
   311         return sessionManager.killSession(session);
       
   312     }
       
   313 
       
   314     CK_ATTRIBUTE[] getAttributes(String op, long type, long alg,
       
   315             CK_ATTRIBUTE[] attrs) throws PKCS11Exception {
       
   316         CK_ATTRIBUTE[] newAttrs =
       
   317                     templateManager.getAttributes(op, type, alg, attrs);
       
   318         for (CK_ATTRIBUTE attr : newAttrs) {
       
   319             if (attr.type == CKA_TOKEN) {
       
   320                 if (attr.getBoolean()) {
       
   321                     try {
       
   322                         ensureLoggedIn(null);
       
   323                     } catch (LoginException e) {
       
   324                         throw new ProviderException("Login failed", e);
       
   325                     }
       
   326                 }
       
   327                 // break once we have found a CKA_TOKEN attribute
       
   328                 break;
       
   329             }
       
   330         }
       
   331         return newAttrs;
       
   332     }
       
   333 
       
   334     P11KeyFactory getKeyFactory(String algorithm) {
       
   335         P11KeyFactory f;
       
   336         if (algorithm.equals("RSA")) {
       
   337             f = rsaFactory;
       
   338             if (f == null) {
       
   339                 f = new P11RSAKeyFactory(this, algorithm);
       
   340                 rsaFactory = f;
       
   341             }
       
   342         } else if (algorithm.equals("DSA")) {
       
   343             f = dsaFactory;
       
   344             if (f == null) {
       
   345                 f = new P11DSAKeyFactory(this, algorithm);
       
   346                 dsaFactory = f;
       
   347             }
       
   348         } else if (algorithm.equals("DH")) {
       
   349             f = dhFactory;
       
   350             if (f == null) {
       
   351                 f = new P11DHKeyFactory(this, algorithm);
       
   352                 dhFactory = f;
       
   353             }
       
   354         } else if (algorithm.equals("EC")) {
       
   355             f = ecFactory;
       
   356             if (f == null) {
       
   357                 f = new P11ECKeyFactory(this, algorithm);
       
   358                 ecFactory = f;
       
   359             }
       
   360         } else {
       
   361             throw new ProviderException("Unknown algorithm " + algorithm);
       
   362         }
       
   363         return f;
       
   364     }
       
   365 
       
   366     P11SecureRandom getRandom() {
       
   367         if (secureRandom == null) {
       
   368             secureRandom = new P11SecureRandom(this);
       
   369         }
       
   370         return secureRandom;
       
   371     }
       
   372 
       
   373     P11KeyStore getKeyStore() {
       
   374         if (keyStore == null) {
       
   375             keyStore = new P11KeyStore(this);
       
   376         }
       
   377         return keyStore;
       
   378     }
       
   379 
       
   380     CK_MECHANISM_INFO getMechanismInfo(long mechanism) throws PKCS11Exception {
       
   381         CK_MECHANISM_INFO result = mechInfoMap.get(mechanism);
       
   382         if (result == null) {
       
   383             try {
       
   384                 result = p11.C_GetMechanismInfo(provider.slotID,
       
   385                                                 mechanism);
       
   386                 mechInfoMap.put(mechanism, result);
       
   387             } catch (PKCS11Exception e) {
       
   388                 if (e.getErrorCode() != PKCS11Constants.CKR_MECHANISM_INVALID) {
       
   389                     throw e;
       
   390                 } else {
       
   391                     mechInfoMap.put(mechanism, INVALID_MECH);
       
   392                 }
       
   393             }
       
   394         } else if (result == INVALID_MECH) {
       
   395             result = null;
       
   396         }
       
   397         return result;
       
   398     }
       
   399 
       
   400     private synchronized byte[] getTokenId() {
       
   401         if (tokenId == null) {
       
   402             SecureRandom random = JCAUtil.getSecureRandom();
       
   403             tokenId = new byte[20];
       
   404             random.nextBytes(tokenId);
       
   405             serializedTokens.add(new WeakReference<Token>(this));
       
   406         }
       
   407         return tokenId;
       
   408     }
       
   409 
       
   410     // list of all tokens that have been serialized within this VM
       
   411     // NOTE that elements are never removed from this list
       
   412     // the assumption is that the number of tokens that are serialized
       
   413     // is relatively small
       
   414     private static final List<Reference<Token>> serializedTokens =
       
   415         new ArrayList<Reference<Token>>();
       
   416 
       
   417     private Object writeReplace() throws ObjectStreamException {
       
   418         if (isValid() == false) {
       
   419             throw new NotSerializableException("Token has been removed");
       
   420         }
       
   421         return new TokenRep(this);
       
   422     }
       
   423 
       
   424     // serialized representation of a token
       
   425     // tokens can only be de-serialized within the same VM invocation
       
   426     // and if the token has not been removed in the meantime
       
   427     private static class TokenRep implements Serializable {
       
   428 
       
   429         private static final long serialVersionUID = 3503721168218219807L;
       
   430 
       
   431         private final byte[] tokenId;
       
   432 
       
   433         TokenRep(Token token) {
       
   434             tokenId = token.getTokenId();
       
   435         }
       
   436 
       
   437         private Object readResolve() throws ObjectStreamException {
       
   438             for (Reference<Token> tokenRef : serializedTokens) {
       
   439                 Token token = tokenRef.get();
       
   440                 if ((token != null) && token.isValid()) {
       
   441                     if (Arrays.equals(token.getTokenId(), tokenId)) {
       
   442                         return token;
       
   443                     }
       
   444                 }
       
   445             }
       
   446             throw new NotSerializableException("Could not find token");
       
   447         }
       
   448     }
       
   449 
       
   450 }