Max,

Please find comments in line...

On 06/12/13 18:27, Weijun Wang wrote:
Hi Valerie

Not sure if we really need to fix the equals() method here. Is there a spec saying the equality is based on internal fields instead of encoded bytes?
There is no spec saying the equality check should be based on encoded bytes neither. DH keys are different from other keys in that its parameters contains an optional field. Thus, even for 2 DH public keys whose internal fields are identical (including the optional one), they could still have different ASN.1 encodings, i.e. one includes the optional value vs one does not. I think the reasonable expectation would be that if all non-optional fields match, then the 2 keys are equal. Otherwise, it's hard to predict the behavior since DH keys can be constructed w/ or w/o the optional field and there are mixed usages in our JDK code base.

I am saying this because it's not easy to get equals() correct here. In DHPrivateKey.java, the new equals() requires the other object to be instanceof javax.crypto.interfaces.DHPrivateKey. I see that another class P11DHPrivateKey also implements this interface but has not overridden equals, so it looks like a com/sun/crypto/provider/DHPrivateKey could equals() to a P11DHPrivateKey, but a P11DHPrivateKey will not equals() to a com/sun/crypto/provider/DHPrivateKey.

Same with DHPublicKey.java.
I will also apply the same change to P11DHPrivateKey/P11DHPublicKey then. Equality check using ASN.1 encoding is fine for non-DH algorithms but not for DH.


BTW, the hashCode() methods in these 2 classes use <<2 and <<4 which looks not as cool as the normal "*31+". I would simply use Objects.hash(....) method.
Ok, I am fine with just using Objects.hash(Object... values) method.


For DHKeyPairGenerator.java, it looks like you don't want the first octet being zero. Is this related to this bug? Is that required in the "Handbook of Applied Cryptography" book? I understand it could be necessary for interop.
The change is for conforming to the description under section 7.1 "Private-value generation" of PKCS#3 DH Key Agreement Standard ftp://ftp.rsasecurity.com/pub/pkcs/ascii/pkcs-3.asc , i.e.

An integer x, the private value, shall be generated
privately and randomly. This integer shall satisfy 0<  x<
p-1, unless the central authority specifies a private-value
length l, in which case the integer shall satisfy 2^(l-1)<=
x<  2^l.

I will re-test everything and let you know once I have the webrev updated.
Thanks,
Valerie

Thanks
Max

On 5/29/13 9:25 AM, Valerie (Yu-Ching) Peng wrote:
Vinnie,

Can you help reviewing my fix for 7196805 "DH Key interoperability
testing between SunJCE and JsafeJCE not successful"?

In SunJCE provider, the equality check for DH private/public keys is
based on DER encoding which may not be correct all the time due to the
optional L value defined in the DER syntax. In addition, JsafeJCE
provider sometimes encode the optional L value incorrectly which leads
to unexpected IOException when parsing the DER bytes.
I have changed the comparison to based on component values rather than
DER encodings which may vary due to the presence or missing of optional
values. In addition, I made the changes to DHKeyPairGenerator to ensure
that generated private value has the requested length/size.

Webrev: http://cr.openjdk.java.net/~valeriep/7196805/webrev.00/

Thanks,
Valerie

Reply via email to