Bug 1837501

Summary: OpenJDK PKCS11 provider does not support Signature mode NONEwithRSA
Product: [Fedora] Fedora Reporter: matti aarnio <matti.aarnio>
Component: java-1.8.0-openjdkAssignee: Martin Balao <mbalao>
Status: CLOSED EOL QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 33CC: ahughes, dbhole, jerboaa, jvanek, msrb, mvala
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: All   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-11-30 17:17:14 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Attachments:
Description Flags
Modified OpenJDK PKCS11 provider none

Description matti aarnio 2020-05-19 14:57:30 UTC
Created attachment 1689911 [details]
Modified OpenJDK PKCS11 provider

Description of problem:
   I need to instantiate Signature algorithm on PKCS11 driven HSM:

     Signature sig = Signature.getInstance("NONEwithRSA", provider);

   This issues an error of unsupported algorthm.
   The basic JCE supports this mode.


Version-Release number of selected component (if applicable):
  java-1.8.0-openjdk-1.8.0.252.b09-0.fc31.x86_64
  java-11-openjdk-11.0.7.10-0.fc31.x86_64


How reproducible:
  Every time.

Actual results:

Expected results:

Additional info:

   I need to instantiate Signature algorithm on PKCS11 driven HSM:

     Signature sig = Signature.getInstance("NONEwithRSA", provider);

   This issues an error of unsupported algorthm.
   The basic JCE supports this mode.
   So does also e.g. BouncyCastle.

   This shall do identical processing to what Cipher  RSA/ECB/PKCS1
   does when encrypting using private key.

   Specifically this Signature mode shall not do input data digesting,
   nor RSA PKCS1 encapsulation.  (PKCS1 padding is normal thing.)

   This shall use PKCS11 mechanism constant:  CKM_RSA_PKCS.

   Compare this with support of  Signature  NONEwithECDSA.

- - -

   To see if it is possible to do this fix, I created a forked copy
   of the SunPKCS11 driver to package name "openjdk.pkcs11".
   Indeed it is.

   See attached file.
   It compiles with "ant" and latest OpenJDK-1.8.0-252-devel.

   This source has also implementation of [1836275].

   Due to plentiful addition of "this.", it will be somewhat hard to diff
   the original and this fork.

Comment 1 Ben Cotton 2020-11-03 16:42:23 UTC
This message is a reminder that Fedora 31 is nearing its end of life.
Fedora will stop maintaining and issuing updates for Fedora 31 on 2020-11-24.
It is Fedora's policy to close all bug reports from releases that are no longer
maintained. At that time this bug will be closed as EOL if it remains open with a
Fedora 'version' of '31'.

Package Maintainer: If you wish for this bug to remain open because you
plan to fix it in a currently maintained version, simply change the 'version' 
to a later Fedora version.

Thank you for reporting this issue and we are sorry that we were not 
able to fix it before Fedora 31 is end of life. If you would still like 
to see this bug fixed and are able to reproduce it against a later version 
of Fedora, you are encouraged  change the 'version' to a later Fedora 
version prior this bug is closed as described in the policy above.

Although we aim to fix as many bugs as possible during every release's 
lifetime, sometimes those efforts are overtaken by events. Often a 
more recent Fedora release includes newer upstream software that fixes 
bugs or makes them obsolete.

Comment 2 matti aarnio 2020-11-28 15:16:07 UTC
Situation is the same on  java-1.8.0-openjdk-1.8.0.272.b10

Comment 3 Ben Cotton 2021-11-04 16:54:02 UTC
This message is a reminder that Fedora 33 is nearing its end of life.
Fedora will stop maintaining and issuing updates for Fedora 33 on 2021-11-30.
It is Fedora's policy to close all bug reports from releases that are no longer
maintained. At that time this bug will be closed as EOL if it remains open with a
Fedora 'version' of '33'.

Package Maintainer: If you wish for this bug to remain open because you
plan to fix it in a currently maintained version, simply change the 'version' 
to a later Fedora version.

Thank you for reporting this issue and we are sorry that we were not 
able to fix it before Fedora 33 is end of life. If you would still like 
to see this bug fixed and are able to reproduce it against a later version 
of Fedora, you are encouraged  change the 'version' to a later Fedora 
version prior this bug is closed as described in the policy above.

Although we aim to fix as many bugs as possible during every release's 
lifetime, sometimes those efforts are overtaken by events. Often a 
more recent Fedora release includes newer upstream software that fixes 
bugs or makes them obsolete.

Comment 4 Ben Cotton 2021-11-30 17:17:14 UTC
Fedora 33 changed to end-of-life (EOL) status on 2021-11-30. Fedora 33 is
no longer maintained, which means that it will not receive any further
security or bug fix updates. As a result we are closing this bug.

If you can reproduce this bug against a currently maintained version of
Fedora please feel free to reopen this bug against that version. If you
are unable to reopen this bug, please file a new report against the
current release. If you experience problems, please add a comment to this
bug.

Thank you for reporting this bug and we are sorry it could not be fixed.