Oh, one other thing in case you weren't talking about this in the context of Cipher and instead were talking about the AlgorithmParameters object itself.  If that's all you've got in scope one approach is to call getParameterSpec(IvParameterSpec.class).getIV();  That will give you the byte array as well.  Now that I think about it, I should probably do that in my test code because I went and manually parsed the DER encoding.  :)  Glad you brought it up.

--Jamil

On 12/7/2020 5:39 PM, Jamil Nimeh wrote:

Hi Bernd, it's not a stupid question at all.  I think what you might be looking for is Cipher.getIV()?  In the case of ChaCha20-Poly1305, that method returns the nonce as a byte array where getParameters() returns an AlgorithmParameters object where the encoding is consistent with RFC 8103.

But both getParameters() and getIV() were doing the wrong thing (chucking NPE) when they should've either come up with a random param or null, respectively when in a pre-initialized state.

--Jamil

On 12/7/2020 5:19 PM, Bernd Eckenfels wrote:
BTW stupid - somewhat related - question, why does the nonce to be parsed out of a DER blob, shouldn’t there be an getter on the Parameter Spec object? Many protocols would need the raw array, is there a matching spec - or should we add one?

Gruss
Bernd
--
http://bernd.eckenfels.net
------------------------------------------------------------------------
*Von:* security-dev <security-dev-r...@openjdk.java.net> im Auftrag von Jamil Nimeh <jni...@openjdk.java.net>
*Gesendet:* Monday, December 7, 2020 9:05:16 PM
*An:* security-dev@openjdk.java.net <security-dev@openjdk.java.net>
*Betreff:* Re: RFR: 8257769: Cipher.getParameters() throws NPE for ChaCha20-Poly1305 [v2] On Mon, 7 Dec 2020 19:53:27 GMT, Valerie Peng <valer...@openjdk.org> wrote:

>> Jamil Nimeh has updated the pull request incrementally with one additional commit since the last revision:
>>
>>   pre-init getParameters nonce data is now a local variable
>
> src/java.base/share/classes/com/sun/crypto/provider/ChaCha20Cipher.java line 232:
>
>> 230:             // this call should cause a random nonce to be generated, but
>> 231:             // not attached to the object.
>> 232:             byte[] nonceData = initialized ? nonce : createRandomNonce(null);
>
> The "initialized" variable is set to false in engineDoFinal() call. So, if users call getParameters() after finish cipher operation, this will return random nonces instead of the one used in previous doFinal operation. Will this be a little un-intuitive?

Unintuitive is a charitable way to put it.  After doFinal the Cipher technically isn't in an uninitialized state per the spec, it's supposed to be in the state it would be immediately following init().  So the wrong behavior would happen in this use case.  Will fix.

-------------

PR: https://git.openjdk.java.net/jdk/pull/1644 <https://git.openjdk.java.net/jdk/pull/1644>

Reply via email to