Blame SOURCES/pr2934-sunec_provider_throwing_keyexception_withine.separator_current_nss_thus_initialise_the_random_number_generator_and_feed_the_seed_to_it.patch

2d54fe
# HG changeset patch
2d54fe
# User andrew
2d54fe
# Date 1461349033 -3600
2d54fe
#      Fri Apr 22 19:17:13 2016 +0100
2d54fe
# Node ID dab76de2f91cf1791c03560a3f45aaa69f8351fd
2d54fe
# Parent  3fa42705acab6d69b6141f47ebba4f85739a338c
2d54fe
PR2934: SunEC provider throwing KeyException with current NSS
2d54fe
Summary: Initialise the random number generator and feed the seed to it.
2d54fe
Updated 2017/07/04 to accomodate 8175110
2d54fe
2d54fe
diff -r 8aed1e903a4c src/share/native/sun/security/ec/ECC_JNI.cpp
2d54fe
--- openjdk/jdk/src/share/native/sun/security/ec/ECC_JNI.cpp
2d54fe
+++ openjdk/jdk/src/share/native/sun/security/ec/ECC_JNI.cpp
2d54fe
@@ -134,8 +134,17 @@
2d54fe
     env->GetByteArrayRegion(seed, 0, jSeedLength, pSeedBuffer);
2d54fe
 
2d54fe
     // Generate the new keypair (using the supplied seed)
2d54fe
+#ifdef SYSTEM_NSS
2d54fe
+    if (RNG_RandomUpdate((unsigned char *) pSeedBuffer, jSeedLength)
2d54fe
+	!= SECSuccess) {
2d54fe
+	ThrowException(env, KEY_EXCEPTION);
2d54fe
+	goto cleanup;
2d54fe
+    }
2d54fe
+    if (EC_NewKey(ecparams, &privKey) != SECSuccess) {
2d54fe
+#else
2d54fe
     if (EC_NewKey(ecparams, &privKey, (unsigned char *) pSeedBuffer,
2d54fe
         jSeedLength, 0) != SECSuccess) {
2d54fe
+#endif
2d54fe
         ThrowException(env, KEY_EXCEPTION);
2d54fe
         goto cleanup;
2d54fe
     }
2d54fe
@@ -267,8 +276,18 @@
2d54fe
     env->GetByteArrayRegion(seed, 0, jSeedLength, pSeedBuffer);
2d54fe
 
2d54fe
     // Sign the digest (using the supplied seed)
2d54fe
+#ifdef SYSTEM_NSS
2d54fe
+    if (RNG_RandomUpdate((unsigned char *) pSeedBuffer, jSeedLength)
2d54fe
+	!= SECSuccess) {
2d54fe
+	ThrowException(env, KEY_EXCEPTION);
2d54fe
+	goto cleanup;
2d54fe
+    }
2d54fe
+    if (ECDSA_SignDigest(&privKey, &signature_item, &digest_item)
2d54fe
+	!= SECSuccess) {
2d54fe
+#else
2d54fe
     if (ECDSA_SignDigest(&privKey, &signature_item, &digest_item,
2d54fe
         (unsigned char *) pSeedBuffer, jSeedLength, 0, timing) != SECSuccess) {
2d54fe
+#endif
2d54fe
         ThrowException(env, KEY_EXCEPTION);
2d54fe
         goto cleanup;
2d54fe
     }
2d54fe
@@ -499,6 +518,9 @@
2d54fe
     if (SECOID_Init() != SECSuccess) {
2d54fe
 	ThrowException(env, INTERNAL_ERROR);
2d54fe
     }
2d54fe
+    if (RNG_RNGInit() != SECSuccess) {
2d54fe
+	ThrowException(env, INTERNAL_ERROR);
2d54fe
+    }
2d54fe
 #endif
2d54fe
 }
2d54fe
 
2d54fe
@@ -507,6 +529,7 @@
2d54fe
   (JNIEnv *env, jclass UNUSED(clazz))
2d54fe
 {
2d54fe
 #ifdef SYSTEM_NSS
2d54fe
+    RNG_RNGShutdown();
2d54fe
     if (SECOID_Shutdown() != SECSuccess) {
2d54fe
 	ThrowException(env, INTERNAL_ERROR);
2d54fe
     }
2d54fe
diff -r 8aed1e903a4c src/share/native/sun/security/ec/ecc_impl.h
2d54fe
--- openjdk/jdk/src/share/native/sun/security/ec/ecc_impl.h
2d54fe
+++ openjdk/jdk/src/share/native/sun/security/ec/ecc_impl.h
2d54fe
@@ -254,8 +254,10 @@
2d54fe
  This function is no longer required because the random bytes are now
2d54fe
  supplied by the caller. Force a failure.
2d54fe
 */
2d54fe
+#ifndef SYSTEM_NSS
2d54fe
 #define RNG_GenerateGlobalRandomBytes(p,l) SECFailure
2d54fe
 #endif
2d54fe
+#endif
2d54fe
 #define CHECK_MPI_OK(func) if (MP_OKAY > (err = func)) goto cleanup
2d54fe
 #define MP_TO_SEC_ERROR(err)
2d54fe
 
2d54fe
@@ -267,8 +269,6 @@
2d54fe
 
2d54fe
 #ifdef SYSTEM_NSS
2d54fe
 #define EC_DecodeParams(a,b,c) EC_DecodeParams(a,b)
2d54fe
-#define EC_NewKey(a,b,c,d,e) EC_NewKey(a,b)
2d54fe
-#define ECDSA_SignDigest(a,b,c,d,e,f,g) ECDSA_SignDigest(a,b,c)
2d54fe
 #define ECDSA_VerifyDigest(a,b,c,d) ECDSA_VerifyDigest(a,b,c)
2d54fe
 #define ECDH_Derive(a,b,c,d,e,f) ECDH_Derive(a,b,c,d,e)
2d54fe
 #else