On Thu, 30 Sep 2021 19:14:10 GMT, Anthony Scarpino <ascarp...@openjdk.org> 
wrote:

>> Anyone has time to review this RFE for adding AES cipher with KW, KWP modes 
>> support to SunPKCS11 provider?
>> 
>> The main changes are in only one new class, i.e. P11KeyWrapCipher.java, 
>> which is the CipherSpi impl for the native PKCS11 key wrap mechanisms. When 
>> testing against NSS library, it seems that they only support the single part 
>> enc/dec PKCS11 APIs, so have to use a new class as existing P11Cipher class 
>> relies on the multi part enc/dec PKCS11 APIs and do not support key 
>> wrapping/unwrapping.
>> 
>> The rest are minor code refactoring and updates for the PKCS11 Exception 
>> class.
>> The new regression tests are adapted from existing key wrap regression tests 
>> for SunJCE provider.
>> 
>> Thanks,
>> Valerie
>
> src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/P11KeyWrapCipher.java
>  line 437:
> 
>> 435:     protected byte[] engineDoFinal(byte[] in, int inOfs, int inLen)
>> 436:             throws IllegalBlockSizeException, BadPaddingException {
>> 437:         int minOutLen = doFinalLength(inLen);
> 
> nit: seems like this could be maxOutLen given it's the length used to 
> allocate out[].  It can't be any larger, otherwise the operations would fail

Sure, I will rename it to maxOutLen

-------------

PR: https://git.openjdk.java.net/jdk/pull/5569

Reply via email to