[11u] RFR: 8208698: Improved ECC Implementation
Langer, Christoph
christoph.langer at sap.com
Fri May 31 15:09:29 UTC 2019
Hi Martin,
thanks for the review. Makes sense to take the fix regarding the overflow check along. I requested approval for JDK-8217344, too, and will push both patches together.
Best regards
Christoph
> -----Original Message-----
> From: Doerr, Martin
> Sent: Freitag, 31. Mai 2019 14:40
> To: Langer, Christoph <christoph.langer at sap.com>; jdk-updates-
> dev at openjdk.java.net
> Cc: security-dev <security-dev at openjdk.java.net>
> Subject: RE: [11u] RFR: 8208698: Improved ECC Implementation
>
> Hi Christoph,
>
> looks like quite some manual resolution just because of a small conflicting
> change in one file.
> Backport looks good, but please backport it together with JDK-8217344.
> After that, ECDHKeyAgreement.java should be identical to the jdk13 version.
>
> Best regards,
> Martin
>
>
> > -----Original Message-----
> > From: jdk-updates-dev <jdk-updates-dev-bounces at openjdk.java.net> On
> > Behalf Of Langer, Christoph
> > Sent: Dienstag, 28. Mai 2019 09:21
> > To: jdk-updates-dev at openjdk.java.net
> > Cc: security-dev <security-dev at openjdk.java.net>
> > Subject: [11u] RFR: 8208698: Improved ECC Implementation
> >
> > Hi,
> >
> > please review this backport of JDK-8208698: Improved ECC
> Implementation.
> >
> > Bug: https://bugs.openjdk.java.net/browse/JDK-8208698
> > Original Change: http://hg.openjdk.java.net/jdk/jdk/rev/752e57845ad2
> > Webrev: http://cr.openjdk.java.net/~clanger/webrevs/8208698.11u/
> >
> > The patch did not apply cleanly because there were conflicts in
> > src/jdk.crypto.ec/share/classes/sun/security/ec/ECDHKeyAgreement.java
> > due to JDK-8205476 which is part of jdk/jdk but not of jdk11u-dev.
> > Unfortunately, JDK-8205476 can not be downported as prerequisite
> because
> > it brings a behavioral change and is associated with a CSR. So I resolved the
> > rejects manually. I add the rejects below.
> >
> > Thanks
> > Christoph
> >
> >
> > --- ECDHKeyAgreement.java
> > +++ ECDHKeyAgreement.java
> > @@ -99,42 +104,74 @@
> > ("Key must be a PublicKey with algorithm EC");
> > }
> > - ECPublicKey ecKey = (ECPublicKey)key;
> > - ECParameterSpec params = ecKey.getParams();
> > + this.publicKey = (ECPublicKey) key;
> > - if (ecKey instanceof ECPublicKeyImpl) {
> > - publicValue = ((ECPublicKeyImpl)ecKey).getEncodedPublicValue();
> > - } else { // instanceof ECPublicKey
> > - publicValue =
> > - ECUtil.encodePoint(ecKey.getW(), params.getCurve());
> > - }
> > + ECParameterSpec params = publicKey.getParams();
> > int keyLenBits = params.getCurve().getField().getFieldSize();
> > secretLen = (keyLenBits + 7) >> 3;
> > return null;
> > }
> > + private static void validateCoordinate(BigInteger c, BigInteger mod) {
> > + if (c.compareTo(BigInteger.ZERO) < 0) {
> > + throw new ProviderException("invalid coordinate");
> > + }
> > +
> > + if (c.compareTo(mod) >= 0) {
> > + throw new ProviderException("invalid coordinate");
> > + }
> > + }
> > +
> > + /*
> > + * Check whether a public key is valid. Throw ProviderException
> > + * if it is not valid or could not be validated.
> > + */
> > + private static void validate(ECOperations ops, ECPublicKey key) {
> > +
> > + // ensure that integers are in proper range
> > + BigInteger x = key.getW().getAffineX();
> > + BigInteger y = key.getW().getAffineY();
> > +
> > + BigInteger p = ops.getField().getSize();
> > + validateCoordinate(x, p);
> > + validateCoordinate(y, p);
> > +
> > + // ensure the point is on the curve
> > + EllipticCurve curve = key.getParams().getCurve();
> > + BigInteger rhs = x.modPow(BigInteger.valueOf(3),
> p).add(curve.getA()
> > + .multiply(x)).add(curve.getB()).mod(p);
> > + BigInteger lhs = y.modPow(BigInteger.valueOf(2), p).mod(p);
> > + if (!rhs.equals(lhs)) {
> > + throw new ProviderException("point is not on curve");
> > + }
> > +
> > + // check the order of the point
> > + ImmutableIntegerModuloP xElem = ops.getField().getElement(x);
> > + ImmutableIntegerModuloP yElem = ops.getField().getElement(y);
> > + AffinePoint affP = new AffinePoint(xElem, yElem);
> > + byte[] order = key.getParams().getOrder().toByteArray();
> > + ArrayUtil.reverse(order);
> > + Point product = ops.multiply(affP, order);
> > + if (!ops.isNeutral(product)) {
> > + throw new ProviderException("point has incorrect order");
> > + }
> > +
> > + }
> > +
> > // see JCE spec
> > @Override
> > protected byte[] engineGenerateSecret() throws IllegalStateException {
> > - if ((privateKey == null) || (publicValue == null)) {
> > + if ((privateKey == null) || (publicKey == null)) {
> > throw new IllegalStateException("Not initialized correctly");
> > }
> > - byte[] s = privateKey.getS().toByteArray();
> > - byte[] encodedParams = // DER OID
> > - ECUtil.encodeECParameterSpec(null, privateKey.getParams());
> > -
> > - try {
> > -
> > - byte[] result = deriveKey(s, publicValue, encodedParams);
> > - publicValue = null;
> > - return result;
> > -
> > - } catch (GeneralSecurityException e) {
> > - throw new ProviderException("Could not derive key", e);
> > - }
> > -
> > + Optional<byte[]> resultOpt = deriveKeyImpl(privateKey, publicKey);
> > + byte[] result = resultOpt.orElseGet(
> > + () -> deriveKeyNative(privateKey, publicKey)
> > + );
> > + publicKey = null;
> > + return result;
> > }
> > // see JCE spec
More information about the security-dev
mailing list