Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

8331008: Implement JEP 478: Key Derivation Function API (Preview) #20301

Closed
wants to merge 74 commits into from
Closed
Changes from 1 commit
Commits
Show all changes
74 commits
Select commit Hold shift + click to select a range
a113ee6
Provide a KDF API and accompanying implementation of RFC 5869. Squash…
driverkt Apr 23, 2024
26cffbf
refactor to change getInstance parameter type and deriveX methods par…
driverkt Jul 23, 2024
4fb2632
getter for KDFParameters
driverkt Jul 23, 2024
f30c4b6
change exception type
driverkt Jul 23, 2024
efa5246
initialize lock in alternate private constructor
driverkt Jul 25, 2024
5aa3aa6
add preview annotation to KDFParameters
driverkt Jul 25, 2024
fe1159c
update code snippet type in KDF
driverkt Jul 25, 2024
07d9405
review comments
driverkt Jul 26, 2024
442d1e9
review comments
driverkt Jul 29, 2024
30dd26e
threading refactor + code review comments
driverkt Jul 31, 2024
69e89fd
code review comments
driverkt Aug 1, 2024
783e8b4
change course on null return values from derive methods
driverkt Aug 2, 2024
d22febd
code review comment fix for javadoc specification
driverkt Aug 2, 2024
eba2b90
add engineGetKDFParameters to the KDFSpi
driverkt Aug 2, 2024
7911fa7
Update with latest from master
driverkt Aug 2, 2024
dd2ee48
update test to include Spi updates
driverkt Aug 2, 2024
59a3f02
addressed several review comments, namely: - renaming the getParamete…
driverkt Aug 13, 2024
c6f491c
numerous code review comment changes
driverkt Aug 16, 2024
48395b8
additional code review comment updates
driverkt Aug 19, 2024
c9c3bc6
addresses delayed provider selection where parameters are involved
driverkt Aug 20, 2024
9f050b6
code review comments and test renaming
driverkt Aug 23, 2024
a65dc9d
another round of code review comments
driverkt Aug 28, 2024
309a925
consistency with wording for addIKM and addSalt
driverkt Aug 28, 2024
deadc28
another round of review comments
driverkt Aug 29, 2024
6b7a75d
assorted review comment changes
driverkt Aug 30, 2024
4a0bc0e
use a delegate record to hold the spi and provider
driverkt Aug 30, 2024
e4400b6
review comments
driverkt Aug 30, 2024
1169688
updated delayed provider selection javadoc
driverkt Aug 30, 2024
25c17b2
change impl class to use byte arrays rather than SecretKey objects wh…
driverkt Aug 30, 2024
59b1743
several more review comments
driverkt Sep 5, 2024
a35e98c
Merge remote-tracking branch 'origin/master' into kdf-jep-wip
driverkt Sep 5, 2024
8ea51c7
Update src/java.base/share/classes/java/security/Provider.java
driverkt Sep 6, 2024
81318f2
Update src/java.base/share/classes/com/sun/crypto/provider/HkdfKeyDer…
driverkt Sep 6, 2024
5573558
updated comments around locking mechanism
driverkt Sep 6, 2024
dc0bd15
batch of review comments
driverkt Sep 10, 2024
82791ac
various review comments
driverkt Sep 11, 2024
856faa8
further review comment changes
driverkt Sep 11, 2024
0748061
further review comments
driverkt Sep 12, 2024
efde3bb
clarify KDFSpi spec on certain conditions of KDFParameters input
driverkt Sep 12, 2024
e7e5b3e
remove explicit zeroing in favor of finally blocks
driverkt Sep 13, 2024
f279c7f
cleanup of acronyms/abbreviations and additional finalizing
driverkt Sep 13, 2024
f513525
latest code review comments for HKDFParameterSpec
driverkt Sep 13, 2024
9a9d098
refine wording on DPS getInstance with params exception
driverkt Sep 13, 2024
e9c5f79
remove unused debug field
driverkt Sep 13, 2024
2c1176c
Merge remote-tracking branch 'origin/master' into kdf-jep-wip
driverkt Sep 16, 2024
ea5ba79
review comments
driverkt Sep 16, 2024
6e9a703
IDE formatting broke snippet
driverkt Sep 16, 2024
ed6132c
review comments and reverting some wording around getParameters/KDFSpi
driverkt Sep 17, 2024
1798541
remove backport commentary from impl class
driverkt Sep 17, 2024
b0e1110
refinement of addIKM and addSalt specifications
driverkt Sep 17, 2024
1edc431
DPS refactor to re-enable some declared exceptions in getInstance sig…
driverkt Sep 19, 2024
f786a38
spec wording changes and a few tweaks to DPS
driverkt Sep 20, 2024
315f90e
review comments
driverkt Sep 23, 2024
bd1f658
additional DPS tests, removal of private method
driverkt Sep 23, 2024
52ef5b0
additional synchronized verification and test rename
driverkt Sep 24, 2024
97feb83
additional synchronized verification and test rename
driverkt Sep 24, 2024
c0fa2f6
enhance debug messaging
driverkt Sep 26, 2024
9d2bc32
addition of another DPS threading test from @wangweij to verify 52ef5b0
driverkt Oct 2, 2024
1cfcc8d
revamped test to be a testng test and run 1 million iterations to try…
driverkt Oct 2, 2024
3399de1
remove testng from the test
driverkt Oct 3, 2024
888cda7
small phrasing adjusting to HKDFParameterSpec
driverkt Oct 3, 2024
5a4937a
specification clarifications about when clones are happening
driverkt Oct 9, 2024
de3b0bf
adding a more exhaustive test from @rhalade
driverkt Oct 11, 2024
98f7288
enable debug flag for exhaustive test @run
driverkt Oct 11, 2024
224c0d2
test case formatting changes, etc
driverkt Oct 14, 2024
5b44fad
running the Exhaustive test through a more ruthless formatter
driverkt Oct 15, 2024
7677c00
additional tests
driverkt Oct 16, 2024
3e6ee38
relocated new negative tests to Exhaustive test file
driverkt Oct 17, 2024
483ee9f
remove CCE tests from Exhaustive test, per @rhalade
driverkt Oct 17, 2024
e89b4f2
add corresponding negative tests to Exhaustive test for ExtractThenEx…
driverkt Oct 18, 2024
306a881
remove unused method
driverkt Oct 21, 2024
54d8069
changing the order of @implNote in a few javadoc headers; other minor…
driverkt Oct 28, 2024
4819d34
add @spec and change an @throws description for one exception in two …
driverkt Oct 31, 2024
739072c
remove @spec from framework classes, since this could become cumberso…
driverkt Oct 31, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
30 changes: 16 additions & 14 deletions src/java.base/share/classes/javax/crypto/KDF.java
Original file line number Diff line number Diff line change
@@ -208,6 +208,14 @@ public KDFParameters getParameters() {
/**
* Returns a {@code KDF} object that implements the specified algorithm.
*
* @implNote The JDK Reference Implementation additionally uses the
* {@code jdk.security.provider.preferred}
* {@link Security#getProperty(String) Security} property to
* determine the preferred provider order for the specified
* algorithm. This may be different than the order of providers
* returned by
* {@link Security#getProviders() Security.getProviders()}.
*
* @param algorithm
* the key derivation algorithm to use. See the {@code KDF} section
* in the <a href="{@docRoot}/../specs/security/standard-names.html#kdf-algorithms">
@@ -221,13 +229,6 @@ public KDFParameters getParameters() {
* the specified algorithm
* @throws NullPointerException
* if {@code algorithm} is {@code null}
* @implNote The JDK Reference Implementation additionally uses the
* {@code jdk.security.provider.preferred}
* {@link Security#getProperty(String) Security} property to
* determine the preferred provider order for the specified
* algorithm. This may be different than the order of providers
* returned by
* {@link Security#getProviders() Security.getProviders()}.
* @see <a href="#DelayedProviderSelection">Delayed Provider
* Selection</a>
*/
@@ -314,6 +315,14 @@ public static KDF getInstance(String algorithm, Provider provider)
* Returns a {@code KDF} object that implements the specified algorithm and
* is initialized with the specified parameters.
*
* @implNote The JDK Reference Implementation additionally uses the
* {@code jdk.security.provider.preferred}
* {@link Security#getProperty(String) Security} property to
* determine the preferred provider order for the specified
* algorithm. This may be different than the order of providers
* returned by
* {@link Security#getProviders() Security.getProviders()}.
*
* @param algorithm
* the key derivation algorithm to use. See the {@code KDF} section
* in the <a href="{@docRoot}/../specs/security/standard-names.html#kdf-algorithms">
@@ -334,13 +343,6 @@ public static KDF getInstance(String algorithm, Provider provider)
* support the specified parameters
* @throws NullPointerException
* if {@code algorithm} is {@code null}
* @implNote The JDK Reference Implementation additionally uses the
* {@code jdk.security.provider.preferred}
* {@link Security#getProperty(String) Security} property to
* determine the preferred provider order for the specified
* algorithm. This may be different than the order of providers
* returned by
* {@link Security#getProviders() Security.getProviders()}.
* @see <a href="#DelayedProviderSelection">Delayed Provider
* Selection</a>
*/
9 changes: 5 additions & 4 deletions src/java.base/share/classes/javax/crypto/KDFSpi.java
Original file line number Diff line number Diff line change
@@ -37,7 +37,7 @@
* <p>
* All the abstract methods in this class must be implemented by each
* cryptographic service provider who wishes to supply the implementation of a
* particular key derivation algorithm.
* particular key derivation function algorithm.
* <p>
* Implementations must provide a public constructor which accepts a {@code
* KDFParameters} object if they depend on the default implementation of
@@ -110,6 +110,10 @@ protected KDFSpi(KDFParameters kdfParameters)
/**
* Derives a key, returned as a {@code SecretKey} object.
*
* @implNote If the resultant key is extractable, then its
* {@code getEncoded} value should have the same content as the
* result of {@code deriveData}.
*
* @param alg
* the algorithm of the resultant {@code SecretKey} object
* @param derivationSpec
@@ -125,9 +129,6 @@ protected KDFSpi(KDFParameters kdfParameters)
* if {@code alg} is empty or invalid
* @throws NullPointerException
* if {@code alg} or {@code derivationSpec} is null
* @implNote If the resultant key is extractable, then its
* {@code getEncoded} value should have the same content as the
* result of {@code deriveData}.
*/
protected abstract SecretKey engineDeriveKey(String alg,
AlgorithmParameterSpec derivationSpec)
Original file line number Diff line number Diff line change
@@ -112,6 +112,11 @@ public Extract extractOnly() {
* Builds an {@code ExtractThenExpand} object from the current state of
* the {@code Builder}.
*
* @implNote HKDF implementations will enforce that the length
* is not greater than 255 * HMAC length. HKDF implementations
* will also enforce that a {code null} info value is treated as
* zero-length byte array.
*
* @param info
* the optional context and application specific information
* (may be {@code null}); the byte array is cloned to prevent
@@ -120,14 +125,10 @@ public Extract extractOnly() {
* the length of the output keying material (must be greater
* than 0)
*
* @return an {@code ExtractThenExpand} object
* @return an immutable {@code ExtractThenExpand} object
*
* @throws IllegalArgumentException
* if {@code length} is not greater than 0
* @implNote HKDF implementations will enforce that the length
* is not greater than 255 * HMAC length. HKDF implementations
* will also enforce that a {code null} info value is treated as
* zero-length byte array.
*/
public ExtractThenExpand thenExpand(byte[] info, int length) {
return new ExtractThenExpand(
@@ -259,6 +260,12 @@ static Builder ofExtract() {
/**
* Creates an {@code Expand} object.
*
* @implNote HKDF implementations will enforce that the length is
* not greater than 255 * HMAC length. Implementations will also
* enforce that the prk argument is at least as many bytes as the
* HMAC length. Implementations will also enforce that a {code null}
* info value is treated as zero-length byte array.
*
* @param prk
* the pseudorandom key (PRK); must not be {@code null}
* @param info
@@ -275,11 +282,6 @@ static Builder ofExtract() {
* if the {@code prk} argument is {@code null}
* @throws IllegalArgumentException
* if {@code length} is not greater than 0
* @implNote HKDF implementations will enforce that the length is
* not greater than 255 * HMAC length. Implementations will also
* enforce that the prk argument is at least as many bytes as the
* HMAC length. Implementations will also enforce that a {code null}
* info value is treated as zero-length byte array.
*/
static Expand expandOnly(SecretKey prk, byte[] info, int length) {
if (prk == null) {
@@ -313,12 +315,12 @@ private Extract(List<SecretKey> ikms, List<SecretKey> salts) {
* are converted to a {@code SecretKeySpec} object. Empty arrays are
* discarded.
*
* @return the unmodifiable {@code List} of input keying material
* values
*
* @implNote An HKDF implementation should concatenate the input
* keying materials into a single value to be used in
* HKDF-Extract.
*
* @return the unmodifiable {@code List} of input keying material
* values
*/
public List<SecretKey> ikms() {
return ikms;
@@ -331,10 +333,10 @@ public List<SecretKey> ikms() {
* Salt values added by {@link Builder#addSalt(byte[])} are converted to
* a {@code SecretKeySpec} object. Empty arrays are discarded.
*
* @return the unmodifiable {@code List} of salt values
*
* @implNote An HKDF implementation should concatenate the salt
* @implNote An HKDF implementation should concatenate the salts
* into a single value to be used in HKDF-Extract.
*
* @return the unmodifiable {@code List} of salt values
*/
public List<SecretKey> salts() {
return salts;
@@ -412,8 +414,8 @@ public int length() {
}

/**
* Defines the input parameters of an ExtractThenExpand operation as defined
* in <a href="http://tools.ietf.org/html/rfc5869">RFC 5869</a>.
* Defines the input parameters of an Extract-then-Expand operation as
* defined in <a href="http://tools.ietf.org/html/rfc5869">RFC 5869</a>.
*/
@PreviewFeature(feature = PreviewFeature.Feature.KEY_DERIVATION)
final class ExtractThenExpand implements HKDFParameterSpec {
@@ -454,12 +456,12 @@ private ExtractThenExpand(Extract ext, byte[] info, int length) {
* are converted to a {@code SecretKeySpec} object. Empty arrays are
* discarded.
*
* @return the unmodifiable {@code List} of input keying material
* values
*
* @implNote An HKDF implementation should concatenate the input
* keying materials into a single value to be used in the
* HKDF-Extract phase.
*
* @return the unmodifiable {@code List} of input keying material
* values
*/
public List<SecretKey> ikms() {
return ext.ikms();
@@ -472,10 +474,11 @@ public List<SecretKey> ikms() {
* Salt values added by {@link Builder#addSalt(byte[])} are converted to
* a {@code SecretKeySpec} object. Empty arrays are discarded.
*
* @implNote An HKDF implementation should concatenate the salts
* into a single value to be used in the HKDF-Extract phase.
*
* @return the unmodifiable {@code List} of salt values
*
* @implNote An HKDF implementation should concatenate the salt
* into a single value to be used in the HKDF-Extract phase.
*/
public List<SecretKey> salts() {
return ext.salts();