/* * Copyright (c) 2005, 2007, Oracle and/or its affiliates. All rights reserved. * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. * * This code is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License version 2 only, as * published by the Free Software Foundation. Oracle designates this * particular file as subject to the "Classpath" exception as provided * by Oracle in the LICENSE file that accompanied this code. * * This code is distributed in the hope that it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * version 2 for more details (a copy is included in the LICENSE file that * accompanied this code). * * You should have received a copy of the GNU General Public License version * 2 along with this work; if not, write to the Free Software Foundation, * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. * * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA * or visit www.oracle.com if you need additional information or have any * questions. */ package com.sun.crypto.provider; import java.security.*; import java.security.spec.AlgorithmParameterSpec; import javax.crypto.*; import javax.crypto.spec.*; import sun.security.internal.interfaces.TlsMasterSecret; import sun.security.internal.spec.*; import static com.sun.crypto.provider.TlsPrfGenerator.*; /** * KeyGenerator implementation for the SSL/TLS master secret derivation. * * @author Andreas Sterbenz * @since 1.6 */ public final class TlsKeyMaterialGenerator extends KeyGeneratorSpi { private final static String MSG = "TlsKeyMaterialGenerator must be " + "initialized using a TlsKeyMaterialParameterSpec"; private TlsKeyMaterialParameterSpec spec; private int protocolVersion; public TlsKeyMaterialGenerator() { SunJCE.ensureIntegrity(getClass()); } protected void engineInit(SecureRandom random) { throw new InvalidParameterException(MSG); } protected void engineInit(AlgorithmParameterSpec params, SecureRandom random) throws InvalidAlgorithmParameterException { if (params instanceof TlsKeyMaterialParameterSpec == false) { throw new InvalidAlgorithmParameterException(MSG); } this.spec = (TlsKeyMaterialParameterSpec)params; if ("RAW".equals(spec.getMasterSecret().getFormat()) == false) { throw new InvalidAlgorithmParameterException("Key format must be RAW"); } protocolVersion = (spec.getMajorVersion() << 8) | spec.getMinorVersion(); if ((protocolVersion < 0x0300) || (protocolVersion > 0x0302)) { throw new InvalidAlgorithmParameterException ("Only SSL 3.0, TLS 1.0, and TLS 1.1 supported"); } } protected void engineInit(int keysize, SecureRandom random) { throw new InvalidParameterException(MSG); } protected SecretKey engineGenerateKey() { if (spec == null) { throw new IllegalStateException ("TlsKeyMaterialGenerator must be initialized"); } try { return engineGenerateKey0(); } catch (GeneralSecurityException e) { throw new ProviderException(e); } } private SecretKey engineGenerateKey0() throws GeneralSecurityException { byte[] masterSecret = spec.getMasterSecret().getEncoded(); byte[] clientRandom = spec.getClientRandom(); byte[] serverRandom = spec.getServerRandom(); SecretKey clientMacKey = null; SecretKey serverMacKey = null; SecretKey clientCipherKey = null; IvParameterSpec clientIv = null; SecretKey serverCipherKey = null; IvParameterSpec serverIv = null; int macLength = spec.getMacKeyLength(); int expandedKeyLength = spec.getExpandedCipherKeyLength(); boolean isExportable = (expandedKeyLength != 0); int keyLength = spec.getCipherKeyLength(); int ivLength = spec.getIvLength(); int keyBlockLen = macLength + keyLength + (isExportable ? 0 : ivLength); keyBlockLen <<= 1; byte[] keyBlock = new byte[keyBlockLen]; MessageDigest md5 = MessageDigest.getInstance("MD5"); MessageDigest sha = MessageDigest.getInstance("SHA1"); // generate key block if (protocolVersion >= 0x0301) { // TLS byte[] seed = concat(serverRandom, clientRandom); keyBlock = doPRF(masterSecret, LABEL_KEY_EXPANSION, seed, keyBlockLen, md5, sha); } else { // SSL keyBlock = new byte[keyBlockLen]; byte[] tmp = new byte[20]; for (int i = 0, remaining = keyBlockLen; remaining > 0; i++, remaining -= 16) { sha.update(SSL3_CONST[i]); sha.update(masterSecret); sha.update(serverRandom); sha.update(clientRandom); sha.digest(tmp, 0, 20); md5.update(masterSecret); md5.update(tmp); if (remaining >= 16) { md5.digest(keyBlock, i << 4, 16); } else { md5.digest(tmp, 0, 16); System.arraycopy(tmp, 0, keyBlock, i << 4, remaining); } } } // partition keyblock into individual secrets int ofs = 0; byte[] tmp = new byte[macLength]; // mac keys System.arraycopy(keyBlock, ofs, tmp, 0, macLength); ofs += macLength; clientMacKey = new SecretKeySpec(tmp, "Mac"); System.arraycopy(keyBlock, ofs, tmp, 0, macLength); ofs += macLength; serverMacKey = new SecretKeySpec(tmp, "Mac"); if (keyLength == 0) { // SSL_RSA_WITH_NULL_* ciphersuites return new TlsKeyMaterialSpec(clientMacKey, serverMacKey); } String alg = spec.getCipherAlgorithm(); byte[] clientKeyBytes = new byte[keyLength]; System.arraycopy(keyBlock, ofs, clientKeyBytes, 0, keyLength); ofs += keyLength; byte[] serverKeyBytes = new byte[keyLength]; System.arraycopy(keyBlock, ofs, serverKeyBytes, 0, keyLength); ofs += keyLength; if (isExportable == false) { // cipher keys clientCipherKey = new SecretKeySpec(clientKeyBytes, alg); serverCipherKey = new SecretKeySpec(serverKeyBytes, alg); if (ivLength != 0) { tmp = new byte[ivLength]; System.arraycopy(keyBlock, ofs, tmp, 0, ivLength); ofs += ivLength; clientIv = new IvParameterSpec(tmp); System.arraycopy(keyBlock, ofs, tmp, 0, ivLength); ofs += ivLength; serverIv = new IvParameterSpec(tmp); } } else { // cipher key expansion and IV generation if (protocolVersion >= 0x0301) { byte[] seed = concat(clientRandom, serverRandom); tmp = doPRF(clientKeyBytes, LABEL_CLIENT_WRITE_KEY, seed, expandedKeyLength, md5, sha); clientCipherKey = new SecretKeySpec(tmp, alg); tmp = doPRF(serverKeyBytes, LABEL_SERVER_WRITE_KEY, seed, expandedKeyLength, md5, sha); serverCipherKey = new SecretKeySpec(tmp, alg); if (ivLength != 0) { tmp = new byte[ivLength]; byte[] block = doPRF(null, LABEL_IV_BLOCK, seed, ivLength << 1, md5, sha); System.arraycopy(block, 0, tmp, 0, ivLength); clientIv = new IvParameterSpec(tmp); System.arraycopy(block, ivLength, tmp, 0, ivLength); serverIv = new IvParameterSpec(tmp); } } else { tmp = new byte[expandedKeyLength]; md5.update(clientKeyBytes); md5.update(clientRandom); md5.update(serverRandom); System.arraycopy(md5.digest(), 0, tmp, 0, expandedKeyLength); clientCipherKey = new SecretKeySpec(tmp, alg); md5.update(serverKeyBytes); md5.update(serverRandom); md5.update(clientRandom); System.arraycopy(md5.digest(), 0, tmp, 0, expandedKeyLength); serverCipherKey = new SecretKeySpec(tmp, alg); if (ivLength != 0) { tmp = new byte[ivLength]; md5.update(clientRandom); md5.update(serverRandom); System.arraycopy(md5.digest(), 0, tmp, 0, ivLength); clientIv = new IvParameterSpec(tmp); md5.update(serverRandom); md5.update(clientRandom); System.arraycopy(md5.digest(), 0, tmp, 0, ivLength); serverIv = new IvParameterSpec(tmp); } } } return new TlsKeyMaterialSpec(clientMacKey, serverMacKey, clientCipherKey, clientIv, serverCipherKey, serverIv); } }