Re: RFR: 8261355: No data buffering in SunPKCS11 Cipher encryption when the underlying mechanism has no padding [v2]

2021-04-07 Thread Valerie Peng
On Tue, 6 Apr 2021 14:26:00 GMT, Martin Balao  wrote:

>> src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/P11Cipher.java 
>> line 265:
>> 
>>> 263: // NSS requires block-sized updates in multi-part 
>>> operations.
>>> 264: reqBlockUpdates = ((tokenLabel[0] == 'N' && 
>>> tokenLabel[1] == 'S'
>>> 265: && tokenLabel[2] == 'S') ? true : false);
>> 
>> IIRC, depending on how the impl is registered, engineSetPadding(String) may 
>> not always be called. It's probably safer to set this in engineInit(...)?
>
> Looks to me that engineSetPadding is always called from the P11Cipher 
> constructor. I thought that was a good location to set the reqBlockUpdates 
> variable because it's next to the paddingObj initialization; which is a 
> pre-requisite for reqBlockUpdates to be used. In other words, if we have no 
> Java-side padding (paddingObj == null), reqBlockUpdates won't be used and we 
> don't even pay the price of setting it.

Ok.

-

PR: https://git.openjdk.java.net/jdk/pull/2510


Re: RFR: 8261355: No data buffering in SunPKCS11 Cipher encryption when the underlying mechanism has no padding [v2]

2021-04-06 Thread Martin Balao
On Tue, 6 Apr 2021 16:56:49 GMT, Martin Balao  wrote:

>> test/jdk/sun/security/pkcs11/Cipher/EncryptionPadding.java line 97:
>> 
>>> 95: throw new Exception("Cross-provider cipher test failed.");
>>> 96: }
>>> 97: }
>> 
>> Why not just use the byte[] forms for the Cipher.doFinal() and simplify this 
>> part, i.e. line 86-96?
>
> We are accumulating cipher text in the cipherText local variable while doing 
> updates, both for the 'update(byte[]...' and 'update(ByteBuffer...' cases. 
> The last call to doFinal will return the last block of cipher text, which we 
> need to append. In regards to Cipher::doFinal, we are using the byte[] form 
> of it. Please let me know if I'm not understanding your comment correctly.

I've just realized that the test is not exercising the 'doFinal(ByteBuffer..' 
path. Thus, why it did not catch the previous sync bugs. I'll fix that.

-

PR: https://git.openjdk.java.net/jdk/pull/2510


Re: RFR: 8261355: No data buffering in SunPKCS11 Cipher encryption when the underlying mechanism has no padding [v2]

2021-04-06 Thread Martin Balao
On Wed, 31 Mar 2021 00:16:28 GMT, Valerie Peng  wrote:

>> Martin Balao has updated the pull request with a new target base due to a 
>> merge or a rebase. The pull request now contains three commits:
>> 
>>  - Avoid overriding buffered bytes with padding in the doFinal call.
>>  - Only do encryption block-size buffering for NSS
>>  - 8261355: No data buffering in SunPKCS11 Cipher encryption when the 
>> underlying mechanism has no padding
>
> src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/P11Cipher.java line 
> 912:
> 
>> 910: 0, requiredOutLen - bytesBuffered);
>> 911: k = token.p11.C_EncryptUpdate(session.id(),
>> 912: 0, padBuffer, 0, actualPadLen,
> 
> actualPadLen => actualPadLen + startOfs?

Yes, I forgot to synchronize with the byte[] path. Thanks.

-

PR: https://git.openjdk.java.net/jdk/pull/2510


Re: RFR: 8261355: No data buffering in SunPKCS11 Cipher encryption when the underlying mechanism has no padding [v2]

2021-04-06 Thread Martin Balao
On Wed, 31 Mar 2021 00:07:14 GMT, Valerie Peng  wrote:

>> Martin Balao has updated the pull request with a new target base due to a 
>> merge or a rebase. The pull request now contains three commits:
>> 
>>  - Avoid overriding buffered bytes with padding in the doFinal call.
>>  - Only do encryption block-size buffering for NSS
>>  - 8261355: No data buffering in SunPKCS11 Cipher encryption when the 
>> underlying mechanism has no padding
>
> src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/P11Cipher.java line 
> 910:
> 
>> 908: if (paddingObj != null) {
>> 909: int actualPadLen = 
>> paddingObj.setPaddingBytes(padBuffer,
>> 910: 0, requiredOutLen - bytesBuffered);
> 
> Shouldn't the starting offset be 'padBufferLen'?

Oh, yes, well spotted.. I forgot to synchronize with the byte[] path.

-

PR: https://git.openjdk.java.net/jdk/pull/2510


Re: RFR: 8261355: No data buffering in SunPKCS11 Cipher encryption when the underlying mechanism has no padding [v2]

2021-04-06 Thread Martin Balao
On Wed, 31 Mar 2021 17:00:26 GMT, Valerie Peng  wrote:

>> Martin Balao has updated the pull request with a new target base due to a 
>> merge or a rebase. The pull request now contains three commits:
>> 
>>  - Avoid overriding buffered bytes with padding in the doFinal call.
>>  - Only do encryption block-size buffering for NSS
>>  - 8261355: No data buffering in SunPKCS11 Cipher encryption when the 
>> underlying mechanism has no padding
>
> test/jdk/sun/security/pkcs11/Cipher/EncryptionPadding.java line 97:
> 
>> 95: throw new Exception("Cross-provider cipher test failed.");
>> 96: }
>> 97: }
> 
> Why not just use the byte[] forms for the Cipher.doFinal() and simplify this 
> part, i.e. line 86-96?

We are accumulating cipher text in the cipherText local variable while doing 
updates, both for the 'update(byte[]...' and 'update(ByteBuffer...' cases. The 
last call to doFinal will return the last block of cipher text, which we need 
to append. In regards to Cipher::doFinal, we are using the byte[] form of it. 
Please let me know if I'm not understanding your comment correctly.

-

PR: https://git.openjdk.java.net/jdk/pull/2510


Re: RFR: 8261355: No data buffering in SunPKCS11 Cipher encryption when the underlying mechanism has no padding [v2]

2021-04-06 Thread Martin Balao
On Wed, 31 Mar 2021 16:51:31 GMT, Valerie Peng  wrote:

>> Martin Balao has updated the pull request with a new target base due to a 
>> merge or a rebase. The pull request now contains three commits:
>> 
>>  - Avoid overriding buffered bytes with padding in the doFinal call.
>>  - Only do encryption block-size buffering for NSS
>>  - 8261355: No data buffering in SunPKCS11 Cipher encryption when the 
>> underlying mechanism has no padding
>
> test/jdk/sun/security/pkcs11/Cipher/EncryptionPadding.java line 68:
> 
>> 66: ByteBuffer cipherText =
>> 67: ByteBuffer.allocate(((inputSize / 16 ) + 1) * 16);
>> 68: byte[] tmp = new byte[16];
> 
> Seems no need to do new byte[] given how it's used.

Right. That was probably a vestige of an intermediate version.

> test/jdk/sun/security/pkcs11/Cipher/EncryptionPadding.java line 78:
> 
>> 76: updateLength);
>> 77: if (tmp != null)
>> 78: cipherText.put(tmp);
> 
> nit: either use "{ }" or move cipherText.put() call to the same line as 
> if-check.

Ok

-

PR: https://git.openjdk.java.net/jdk/pull/2510


Re: RFR: 8261355: No data buffering in SunPKCS11 Cipher encryption when the underlying mechanism has no padding [v2]

2021-04-06 Thread Martin Balao
On Tue, 30 Mar 2021 22:12:16 GMT, Valerie Peng  wrote:

>> src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/P11Cipher.java 
>> line 819:
>> 
>>> 817: int startOff = 0;
>>> 818: if (reqBlockUpdates) {
>>> 819: startOff = bytesBuffered;
>> 
>> Shouldn't the starting offset be the number of bytes in padBuffer, i.e. 
>> padBufferLen?
>
> Then no need for the assert(...) to check the starting offset value.

padBufferLen and bytesBuffered look a bit confusing to me. My suspicion is that 
they have the same value every time we need them. I'll make the change you 
suggested and check that we have no regressions. If you believe the assertions 
are trivial, I'll remove them.

-

PR: https://git.openjdk.java.net/jdk/pull/2510


Re: RFR: 8261355: No data buffering in SunPKCS11 Cipher encryption when the underlying mechanism has no padding [v2]

2021-04-06 Thread Martin Balao
On Tue, 30 Mar 2021 21:49:57 GMT, Valerie Peng  wrote:

>> Martin Balao has updated the pull request with a new target base due to a 
>> merge or a rebase. The pull request now contains three commits:
>> 
>>  - Avoid overriding buffered bytes with padding in the doFinal call.
>>  - Only do encryption block-size buffering for NSS
>>  - 8261355: No data buffering in SunPKCS11 Cipher encryption when the 
>> underlying mechanism has no padding
>
> src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/P11Cipher.java line 
> 606:
> 
>> 604: // NSS throws up when called with data not in 
>> multiple
>> 605: // of blocks. Try to work around this by holding the
>> 606: // extra data in padBuffer.
> 
> nit: The comment looks a little bit strange. This particular block of code is 
> for handling existing buffered data buffered in earlier update() calls. The 
> comment however is more about 'reqBlockUpdates' itself. How about merging 
> this with the comment for 'reqBlockUpdates' field and then changing this 
> comment to what this particular block of code does.

Yes, you are right. I merged the comment with the field description. I believe 
there is not much to say about that block, though. At least there is nothing 
new there, except that we may buffer for reqBlockUpdates reasons. If you still 
want a comment there, let me know and I try to figure out something.

-

PR: https://git.openjdk.java.net/jdk/pull/2510


Re: RFR: 8261355: No data buffering in SunPKCS11 Cipher encryption when the underlying mechanism has no padding [v2]

2021-04-06 Thread Martin Balao
On Tue, 30 Mar 2021 21:24:37 GMT, Valerie Peng  wrote:

>> Martin Balao has updated the pull request with a new target base due to a 
>> merge or a rebase. The pull request now contains three commits:
>> 
>>  - Avoid overriding buffered bytes with padding in the doFinal call.
>>  - Only do encryption block-size buffering for NSS
>>  - 8261355: No data buffering in SunPKCS11 Cipher encryption when the 
>> underlying mechanism has no padding
>
> src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/P11Cipher.java line 
> 654:
> 
>> 652: }
>> 653: // update 'padBuffer' if using our own padding impl.
>> 654: if (paddingObj != null) {
> 
> nit: if (paddingObj != null && newPadBufferLen > 0)?

Yes, makes sense. I've replaced the other " newPadBufferLen != 0" with 
"newPadBufferLen > 0" to be consistent.

-

PR: https://git.openjdk.java.net/jdk/pull/2510


Re: RFR: 8261355: No data buffering in SunPKCS11 Cipher encryption when the underlying mechanism has no padding [v2]

2021-04-06 Thread Martin Balao
On Tue, 30 Mar 2021 21:19:38 GMT, Valerie Peng  wrote:

>> Martin Balao has updated the pull request with a new target base due to a 
>> merge or a rebase. The pull request now contains three commits:
>> 
>>  - Avoid overriding buffered bytes with padding in the doFinal call.
>>  - Only do encryption block-size buffering for NSS
>>  - 8261355: No data buffering in SunPKCS11 Cipher encryption when the 
>> underlying mechanism has no padding
>
> src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/P11Cipher.java line 
> 639:
> 
>> 637: // returned to the caller. None of this is 
>> necessary for
>> 638: // encryption: encrypted data can be safely 
>> returned upon a
>> 639: // implUpdate call.
> 
> nit: all of the "unencrypted" -> "decrypted". I think this is a bit too 
> verbose? Could we trim it down more, e.g. for decrypting with update() calls, 
> up to a block of input is held inside padBuffer as it may contain padding 
> bytes when no more data is supplied when doFinal() is called.
> 
> It should be clear that this does not apply for encryption, so there should 
> be no need to state that.

I'll replace "unencrypted" with "decrypted" and remove the comment about this 
not being necessary for encryption. I've also trimmed and improved my comment a 
bit: "While decrypting with implUpdate, the current encrypted block is always 
held in a buffer. If it's the last one (unknown at this point), it may contain 
padding bytes and need further processing. In implDoFinal (where we know it's 
the last one) the buffer is decrypted, unpadded and returned.". One comment 
about your suggestion: it's block-sized, not 'up to a block size'. But sounded 
a bit confusing to me overall, so if possible I'd stick to something along the 
lines above.

-

PR: https://git.openjdk.java.net/jdk/pull/2510


Re: RFR: 8261355: No data buffering in SunPKCS11 Cipher encryption when the underlying mechanism has no padding [v2]

2021-04-06 Thread Martin Balao
On Tue, 30 Mar 2021 20:51:26 GMT, Valerie Peng  wrote:

>> Martin Balao has updated the pull request with a new target base due to a 
>> merge or a rebase. The incremental webrev excludes the unrelated changes 
>> brought in by the merge/rebase. The pull request contains three additional 
>> commits since the last revision:
>> 
>>  - Avoid overriding buffered bytes with padding in the doFinal call.
>>  - Only do encryption block-size buffering for NSS
>>  - 8261355: No data buffering in SunPKCS11 Cipher encryption when the 
>> underlying mechanism has no padding
>
> src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/P11Cipher.java line 
> 265:
> 
>> 263: // NSS requires block-sized updates in multi-part 
>> operations.
>> 264: reqBlockUpdates = ((tokenLabel[0] == 'N' && 
>> tokenLabel[1] == 'S'
>> 265: && tokenLabel[2] == 'S') ? true : false);
> 
> IIRC, depending on how the impl is registered, engineSetPadding(String) may 
> not always be called. It's probably safer to set this in engineInit(...)?

Looks to me that engineSetPadding is always called from the P11Cipher 
constructor. I thought that was a good location to set the reqBlockUpdates 
variable because it's next to the paddingObj initialization; which is a 
pre-requisite for reqBlockUpdates to be used. In other words, if we have no 
Java-side padding (paddingObj == null), reqBlockUpdates won't be used and we 
don't even pay the price of setting it.

-

PR: https://git.openjdk.java.net/jdk/pull/2510


Re: RFR: 8261355: No data buffering in SunPKCS11 Cipher encryption when the underlying mechanism has no padding [v2]

2021-03-31 Thread Valerie Peng
On Thu, 25 Mar 2021 22:13:42 GMT, Martin Balao  wrote:

>> Hi,
>> 
>> I'd like to propose a fix for JDK-8261355 [1].
>> 
>> The scheme used for holding data and padding while performing encryption 
>> operations is almost the same than the existing one for decryption. The only 
>> difference is that encryption does not require a block-sized buffer to be 
>> always held because there is no need, upon an update call, to determine 
>> which bytes are real output for the caller and which are padding -as it's 
>> required for decryption-. I added a couple of comments in implUpdate to 
>> explain this.
>> 
>> No regressions observed in jdk/sun/security/pkcs11.
>> 
>> Thanks,
>> Martin.-
>> 
>> --
>> [1] - https://bugs.openjdk.java.net/browse/JDK-8261355
>
> Martin Balao has updated the pull request with a new target base due to a 
> merge or a rebase. The pull request now contains three commits:
> 
>  - Avoid overriding buffered bytes with padding in the doFinal call.
>  - Only do encryption block-size buffering for NSS
>  - 8261355: No data buffering in SunPKCS11 Cipher encryption when the 
> underlying mechanism has no padding

test/jdk/sun/security/pkcs11/Cipher/EncryptionPadding.java line 97:

> 95: throw new Exception("Cross-provider cipher test failed.");
> 96: }
> 97: }

Why not just use the byte[] forms for the Cipher.doFinal() and simplify this 
part, i.e. line 86-96?

-

PR: https://git.openjdk.java.net/jdk/pull/2510


Re: RFR: 8261355: No data buffering in SunPKCS11 Cipher encryption when the underlying mechanism has no padding [v2]

2021-03-31 Thread Valerie Peng
On Thu, 25 Mar 2021 22:13:42 GMT, Martin Balao  wrote:

>> Hi,
>> 
>> I'd like to propose a fix for JDK-8261355 [1].
>> 
>> The scheme used for holding data and padding while performing encryption 
>> operations is almost the same than the existing one for decryption. The only 
>> difference is that encryption does not require a block-sized buffer to be 
>> always held because there is no need, upon an update call, to determine 
>> which bytes are real output for the caller and which are padding -as it's 
>> required for decryption-. I added a couple of comments in implUpdate to 
>> explain this.
>> 
>> No regressions observed in jdk/sun/security/pkcs11.
>> 
>> Thanks,
>> Martin.-
>> 
>> --
>> [1] - https://bugs.openjdk.java.net/browse/JDK-8261355
>
> Martin Balao has updated the pull request with a new target base due to a 
> merge or a rebase. The pull request now contains three commits:
> 
>  - Avoid overriding buffered bytes with padding in the doFinal call.
>  - Only do encryption block-size buffering for NSS
>  - 8261355: No data buffering in SunPKCS11 Cipher encryption when the 
> underlying mechanism has no padding

test/jdk/sun/security/pkcs11/Cipher/EncryptionPadding.java line 68:

> 66: ByteBuffer cipherText =
> 67: ByteBuffer.allocate(((inputSize / 16 ) + 1) * 16);
> 68: byte[] tmp = new byte[16];

Seems no need to do new byte[] given how it's used.

test/jdk/sun/security/pkcs11/Cipher/EncryptionPadding.java line 78:

> 76: updateLength);
> 77: if (tmp != null)
> 78: cipherText.put(tmp);

nit: either use "{ }" or move cipherText.put() call to the same line as 
if-check.

-

PR: https://git.openjdk.java.net/jdk/pull/2510


Re: RFR: 8261355: No data buffering in SunPKCS11 Cipher encryption when the underlying mechanism has no padding [v2]

2021-03-30 Thread Valerie Peng
On Thu, 25 Mar 2021 22:13:42 GMT, Martin Balao  wrote:

>> Hi,
>> 
>> I'd like to propose a fix for JDK-8261355 [1].
>> 
>> The scheme used for holding data and padding while performing encryption 
>> operations is almost the same than the existing one for decryption. The only 
>> difference is that encryption does not require a block-sized buffer to be 
>> always held because there is no need, upon an update call, to determine 
>> which bytes are real output for the caller and which are padding -as it's 
>> required for decryption-. I added a couple of comments in implUpdate to 
>> explain this.
>> 
>> No regressions observed in jdk/sun/security/pkcs11.
>> 
>> Thanks,
>> Martin.-
>> 
>> --
>> [1] - https://bugs.openjdk.java.net/browse/JDK-8261355
>
> Martin Balao has updated the pull request with a new target base due to a 
> merge or a rebase. The pull request now contains three commits:
> 
>  - Avoid overriding buffered bytes with padding in the doFinal call.
>  - Only do encryption block-size buffering for NSS
>  - 8261355: No data buffering in SunPKCS11 Cipher encryption when the 
> underlying mechanism has no padding

src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/P11Cipher.java line 
912:

> 910: 0, requiredOutLen - bytesBuffered);
> 911: k = token.p11.C_EncryptUpdate(session.id(),
> 912: 0, padBuffer, 0, actualPadLen,

actualPadLen => actualPadLen + startOfs?

-

PR: https://git.openjdk.java.net/jdk/pull/2510


Re: RFR: 8261355: No data buffering in SunPKCS11 Cipher encryption when the underlying mechanism has no padding [v2]

2021-03-30 Thread Valerie Peng
On Thu, 25 Mar 2021 22:13:42 GMT, Martin Balao  wrote:

>> Hi,
>> 
>> I'd like to propose a fix for JDK-8261355 [1].
>> 
>> The scheme used for holding data and padding while performing encryption 
>> operations is almost the same than the existing one for decryption. The only 
>> difference is that encryption does not require a block-sized buffer to be 
>> always held because there is no need, upon an update call, to determine 
>> which bytes are real output for the caller and which are padding -as it's 
>> required for decryption-. I added a couple of comments in implUpdate to 
>> explain this.
>> 
>> No regressions observed in jdk/sun/security/pkcs11.
>> 
>> Thanks,
>> Martin.-
>> 
>> --
>> [1] - https://bugs.openjdk.java.net/browse/JDK-8261355
>
> Martin Balao has updated the pull request with a new target base due to a 
> merge or a rebase. The pull request now contains three commits:
> 
>  - Avoid overriding buffered bytes with padding in the doFinal call.
>  - Only do encryption block-size buffering for NSS
>  - 8261355: No data buffering in SunPKCS11 Cipher encryption when the 
> underlying mechanism has no padding

src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/P11Cipher.java line 
910:

> 908: if (paddingObj != null) {
> 909: int actualPadLen = 
> paddingObj.setPaddingBytes(padBuffer,
> 910: 0, requiredOutLen - bytesBuffered);

Shouldn't the starting offset be 'padBufferLen'?

-

PR: https://git.openjdk.java.net/jdk/pull/2510


Re: RFR: 8261355: No data buffering in SunPKCS11 Cipher encryption when the underlying mechanism has no padding [v2]

2021-03-30 Thread Valerie Peng
On Tue, 30 Mar 2021 22:10:11 GMT, Valerie Peng  wrote:

>> Martin Balao has updated the pull request with a new target base due to a 
>> merge or a rebase. The pull request now contains three commits:
>> 
>>  - Avoid overriding buffered bytes with padding in the doFinal call.
>>  - Only do encryption block-size buffering for NSS
>>  - 8261355: No data buffering in SunPKCS11 Cipher encryption when the 
>> underlying mechanism has no padding
>
> src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/P11Cipher.java line 
> 819:
> 
>> 817: int startOff = 0;
>> 818: if (reqBlockUpdates) {
>> 819: startOff = bytesBuffered;
> 
> Shouldn't the starting offset be the number of bytes in padBuffer, i.e. 
> padBufferLen?

Then no need for the assert(...) to check the starting offset value.

-

PR: https://git.openjdk.java.net/jdk/pull/2510


Re: RFR: 8261355: No data buffering in SunPKCS11 Cipher encryption when the underlying mechanism has no padding [v2]

2021-03-30 Thread Valerie Peng
On Thu, 25 Mar 2021 22:13:42 GMT, Martin Balao  wrote:

>> Hi,
>> 
>> I'd like to propose a fix for JDK-8261355 [1].
>> 
>> The scheme used for holding data and padding while performing encryption 
>> operations is almost the same than the existing one for decryption. The only 
>> difference is that encryption does not require a block-sized buffer to be 
>> always held because there is no need, upon an update call, to determine 
>> which bytes are real output for the caller and which are padding -as it's 
>> required for decryption-. I added a couple of comments in implUpdate to 
>> explain this.
>> 
>> No regressions observed in jdk/sun/security/pkcs11.
>> 
>> Thanks,
>> Martin.-
>> 
>> --
>> [1] - https://bugs.openjdk.java.net/browse/JDK-8261355
>
> Martin Balao has updated the pull request with a new target base due to a 
> merge or a rebase. The pull request now contains three commits:
> 
>  - Avoid overriding buffered bytes with padding in the doFinal call.
>  - Only do encryption block-size buffering for NSS
>  - 8261355: No data buffering in SunPKCS11 Cipher encryption when the 
> underlying mechanism has no padding

src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/P11Cipher.java line 
819:

> 817: int startOff = 0;
> 818: if (reqBlockUpdates) {
> 819: startOff = bytesBuffered;

Shouldn't the starting offset be the number of bytes in padBuffer, i.e. 
padBufferLen?

-

PR: https://git.openjdk.java.net/jdk/pull/2510


Re: RFR: 8261355: No data buffering in SunPKCS11 Cipher encryption when the underlying mechanism has no padding [v2]

2021-03-30 Thread Valerie Peng
On Thu, 25 Mar 2021 22:13:42 GMT, Martin Balao  wrote:

>> Hi,
>> 
>> I'd like to propose a fix for JDK-8261355 [1].
>> 
>> The scheme used for holding data and padding while performing encryption 
>> operations is almost the same than the existing one for decryption. The only 
>> difference is that encryption does not require a block-sized buffer to be 
>> always held because there is no need, upon an update call, to determine 
>> which bytes are real output for the caller and which are padding -as it's 
>> required for decryption-. I added a couple of comments in implUpdate to 
>> explain this.
>> 
>> No regressions observed in jdk/sun/security/pkcs11.
>> 
>> Thanks,
>> Martin.-
>> 
>> --
>> [1] - https://bugs.openjdk.java.net/browse/JDK-8261355
>
> Martin Balao has updated the pull request with a new target base due to a 
> merge or a rebase. The pull request now contains three commits:
> 
>  - Avoid overriding buffered bytes with padding in the doFinal call.
>  - Only do encryption block-size buffering for NSS
>  - 8261355: No data buffering in SunPKCS11 Cipher encryption when the 
> underlying mechanism has no padding

src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/P11Cipher.java line 
606:

> 604: // NSS throws up when called with data not in 
> multiple
> 605: // of blocks. Try to work around this by holding the
> 606: // extra data in padBuffer.

nit: The comment looks a little bit strange. This particular block of code is 
for handling existing buffered data buffered in earlier update() calls. The 
comment however is more about 'reqBlockUpdates' itself. How about merging this 
with the comment for 'reqBlockUpdates' field and then changing this comment to 
what this particular block of code does.

-

PR: https://git.openjdk.java.net/jdk/pull/2510


Re: RFR: 8261355: No data buffering in SunPKCS11 Cipher encryption when the underlying mechanism has no padding [v2]

2021-03-30 Thread Valerie Peng
On Thu, 25 Mar 2021 22:13:42 GMT, Martin Balao  wrote:

>> Hi,
>> 
>> I'd like to propose a fix for JDK-8261355 [1].
>> 
>> The scheme used for holding data and padding while performing encryption 
>> operations is almost the same than the existing one for decryption. The only 
>> difference is that encryption does not require a block-sized buffer to be 
>> always held because there is no need, upon an update call, to determine 
>> which bytes are real output for the caller and which are padding -as it's 
>> required for decryption-. I added a couple of comments in implUpdate to 
>> explain this.
>> 
>> No regressions observed in jdk/sun/security/pkcs11.
>> 
>> Thanks,
>> Martin.-
>> 
>> --
>> [1] - https://bugs.openjdk.java.net/browse/JDK-8261355
>
> Martin Balao has updated the pull request with a new target base due to a 
> merge or a rebase. The pull request now contains three commits:
> 
>  - Avoid overriding buffered bytes with padding in the doFinal call.
>  - Only do encryption block-size buffering for NSS
>  - 8261355: No data buffering in SunPKCS11 Cipher encryption when the 
> underlying mechanism has no padding

src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/P11Cipher.java line 
654:

> 652: }
> 653: // update 'padBuffer' if using our own padding impl.
> 654: if (paddingObj != null) {

nit: if (paddingObj != null && newPadBufferLen > 0)?

-

PR: https://git.openjdk.java.net/jdk/pull/2510


Re: RFR: 8261355: No data buffering in SunPKCS11 Cipher encryption when the underlying mechanism has no padding [v2]

2021-03-30 Thread Valerie Peng
On Thu, 25 Mar 2021 22:13:42 GMT, Martin Balao  wrote:

>> Hi,
>> 
>> I'd like to propose a fix for JDK-8261355 [1].
>> 
>> The scheme used for holding data and padding while performing encryption 
>> operations is almost the same than the existing one for decryption. The only 
>> difference is that encryption does not require a block-sized buffer to be 
>> always held because there is no need, upon an update call, to determine 
>> which bytes are real output for the caller and which are padding -as it's 
>> required for decryption-. I added a couple of comments in implUpdate to 
>> explain this.
>> 
>> No regressions observed in jdk/sun/security/pkcs11.
>> 
>> Thanks,
>> Martin.-
>> 
>> --
>> [1] - https://bugs.openjdk.java.net/browse/JDK-8261355
>
> Martin Balao has updated the pull request with a new target base due to a 
> merge or a rebase. The pull request now contains three commits:
> 
>  - Avoid overriding buffered bytes with padding in the doFinal call.
>  - Only do encryption block-size buffering for NSS
>  - 8261355: No data buffering in SunPKCS11 Cipher encryption when the 
> underlying mechanism has no padding

src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/P11Cipher.java line 
639:

> 637: // returned to the caller. None of this is necessary 
> for
> 638: // encryption: encrypted data can be safely returned 
> upon a
> 639: // implUpdate call.

nit: all of the "unencrypted" -> "decrypted". I think this is a bit too 
verbose? Could we trim it down more, e.g. for decrypting with update() calls, 
up to a block of input is held inside padBuffer as it may contain padding bytes 
when no more data is supplied when doFinal() is called.

It should be clear that this does not apply for encryption, so there should be 
no need to state that.

-

PR: https://git.openjdk.java.net/jdk/pull/2510


Re: RFR: 8261355: No data buffering in SunPKCS11 Cipher encryption when the underlying mechanism has no padding [v2]

2021-03-30 Thread Valerie Peng
On Thu, 25 Mar 2021 22:13:42 GMT, Martin Balao  wrote:

>> Hi,
>> 
>> I'd like to propose a fix for JDK-8261355 [1].
>> 
>> The scheme used for holding data and padding while performing encryption 
>> operations is almost the same than the existing one for decryption. The only 
>> difference is that encryption does not require a block-sized buffer to be 
>> always held because there is no need, upon an update call, to determine 
>> which bytes are real output for the caller and which are padding -as it's 
>> required for decryption-. I added a couple of comments in implUpdate to 
>> explain this.
>> 
>> No regressions observed in jdk/sun/security/pkcs11.
>> 
>> Thanks,
>> Martin.-
>> 
>> --
>> [1] - https://bugs.openjdk.java.net/browse/JDK-8261355
>
> Martin Balao has updated the pull request with a new target base due to a 
> merge or a rebase. The incremental webrev excludes the unrelated changes 
> brought in by the merge/rebase. The pull request contains three additional 
> commits since the last revision:
> 
>  - Avoid overriding buffered bytes with padding in the doFinal call.
>  - Only do encryption block-size buffering for NSS
>  - 8261355: No data buffering in SunPKCS11 Cipher encryption when the 
> underlying mechanism has no padding

src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/P11Cipher.java line 
265:

> 263: // NSS requires block-sized updates in multi-part 
> operations.
> 264: reqBlockUpdates = ((tokenLabel[0] == 'N' && 
> tokenLabel[1] == 'S'
> 265: && tokenLabel[2] == 'S') ? true : false);

IIRC, depending on how the impl is registered, engineSetPadding(String) may not 
always be called. It's probably safer to set this in engineInit(...)?

-

PR: https://git.openjdk.java.net/jdk/pull/2510


Re: RFR: 8261355: No data buffering in SunPKCS11 Cipher encryption when the underlying mechanism has no padding [v2]

2021-03-25 Thread Martin Balao
On Tue, 2 Mar 2021 13:16:24 GMT, Valerie Peng  wrote:

>> Martin Balao has updated the pull request with a new target base due to a 
>> merge or a rebase. The pull request now contains three commits:
>> 
>>  - Avoid overriding buffered bytes with padding in the doFinal call.
>>  - Only do encryption block-size buffering for NSS
>>  - 8261355: No data buffering in SunPKCS11 Cipher encryption when the 
>> underlying mechanism has no padding
>
> src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/P11Cipher.java line 
> 595:
> 
>> 593: // NSS throws up when called with data not in 
>> multiple
>> 594: // of blocks. Try to work around this by holding the
>> 595: // extra data in padBuffer.
> 
> Well, I am not sure if other PKCS#11 libraries are like NSS which requires 
> input size to be multiple of blocks for every multi-part 
> encryption/decryption calls. We are paying the cost of buffering 
> non-blocksize data ourselves and the associated byte copying as a result. 
> Oh-well.
> 
> With this change, you should also update the implDoFinal() impl which calls 
> paddingObj.setPaddingBytes(byte[], int) for encryption and writes the padding 
> bytes "after" the existing buffered bytes, i.e. padBufferLen. Otherwise, the 
> existing buffered bytes may be overwritten w/ padding bytes and things will 
> fail. The new regression test should cover this scenario also. It currently 
> only tests the changes made to update() calls.

I've pushed a new proposal to limit the performance impact of Java-side 
buffering to the NSS library. This adds to the previous conditions: the 
operation has to be encryption and the mechanism must not have native padding. 
If we realize in the future that other libraries are affected as well, we can 
easily extend the scope.

In regards to the implDoFinal bug, well spotted! Fixed in this new proposal and 
the test has been enhanced to cover not only this case but also different 
padding sizes and different block numbers.

Branch rebased (today) to the latest master.

Look forward to your comments.

-

PR: https://git.openjdk.java.net/jdk/pull/2510


Re: RFR: 8261355: No data buffering in SunPKCS11 Cipher encryption when the underlying mechanism has no padding [v2]

2021-03-25 Thread Martin Balao
> Hi,
> 
> I'd like to propose a fix for JDK-8261355 [1].
> 
> The scheme used for holding data and padding while performing encryption 
> operations is almost the same than the existing one for decryption. The only 
> difference is that encryption does not require a block-sized buffer to be 
> always held because there is no need, upon an update call, to determine which 
> bytes are real output for the caller and which are padding -as it's required 
> for decryption-. I added a couple of comments in implUpdate to explain this.
> 
> No regressions observed in jdk/sun/security/pkcs11.
> 
> Thanks,
> Martin.-
> 
> --
> [1] - https://bugs.openjdk.java.net/browse/JDK-8261355

Martin Balao has updated the pull request with a new target base due to a merge 
or a rebase. The pull request now contains three commits:

 - Avoid overriding buffered bytes with padding in the doFinal call.
 - Only do encryption block-size buffering for NSS
 - 8261355: No data buffering in SunPKCS11 Cipher encryption when the 
underlying mechanism has no padding

-

Changes: https://git.openjdk.java.net/jdk/pull/2510/files
 Webrev: https://webrevs.openjdk.java.net/?repo=jdk&pr=2510&range=01
  Stats: 245 lines in 2 files changed: 164 ins; 23 del; 58 mod
  Patch: https://git.openjdk.java.net/jdk/pull/2510.diff
  Fetch: git fetch https://git.openjdk.java.net/jdk pull/2510/head:pull/2510

PR: https://git.openjdk.java.net/jdk/pull/2510