31680b2bcf
Reviewed-by: weijun
112 lines
4.2 KiB
Java
112 lines
4.2 KiB
Java
/*
|
|
* Copyright (c) 2015, 2023, Oracle and/or its affiliates. All rights reserved.
|
|
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
|
*
|
|
* This code is free software; you can redistribute it and/or modify it
|
|
* under the terms of the GNU General Public License version 2 only, as
|
|
* published by the Free Software Foundation.
|
|
*
|
|
* This code is distributed in the hope that it will be useful, but WITHOUT
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
|
* version 2 for more details (a copy is included in the LICENSE file that
|
|
* accompanied this code).
|
|
*
|
|
* You should have received a copy of the GNU General Public License version
|
|
* 2 along with this work; if not, write to the Free Software Foundation,
|
|
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
*
|
|
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
|
|
* or visit www.oracle.com if you need additional information or have any
|
|
* questions.
|
|
*/
|
|
|
|
/**
|
|
* @test
|
|
* @bug 8056174 8242260
|
|
* @summary Make sure the jarsigner tool still works after it's modified to
|
|
* be based on JarSigner API
|
|
* @library /test/lib
|
|
* @modules java.base/sun.security.pkcs
|
|
* java.base/sun.security.x509
|
|
*/
|
|
|
|
import jdk.test.lib.Asserts;
|
|
import jdk.test.lib.SecurityTools;
|
|
import jdk.test.lib.util.JarUtils;
|
|
import sun.security.pkcs.PKCS7;
|
|
|
|
import java.io.ByteArrayInputStream;
|
|
import java.io.InputStream;
|
|
import java.nio.file.Files;
|
|
import java.nio.file.Path;
|
|
import java.util.*;
|
|
import java.util.jar.Attributes;
|
|
import java.util.jar.JarEntry;
|
|
import java.util.jar.JarFile;
|
|
import java.util.jar.Manifest;
|
|
|
|
public class Options {
|
|
|
|
public static void main(String[] args) throws Exception {
|
|
|
|
// Prepares raw file
|
|
Files.write(Path.of("a"), List.of("a"));
|
|
|
|
// Pack
|
|
JarUtils.createJarFile(Path.of("a.jar"), Path.of("."), Path.of("a"));
|
|
|
|
// Prepare a keystore
|
|
SecurityTools.keytool(
|
|
"-keystore jks -storepass changeit -keypass changeit -dname" +
|
|
" CN=A -alias a -genkeypair -keyalg rsa")
|
|
.shouldHaveExitValue(0);
|
|
|
|
// -sigfile, -digestalg, -sigalg, -internalsf, -sectionsonly
|
|
SecurityTools.jarsigner(
|
|
"-debug -signedjar new.jar -keystore jks -storepass changeit" +
|
|
" -sigfile olala -digestalg SHA1 -sigalg SHA224withRSA" +
|
|
" -internalsf -sectionsonly a.jar a")
|
|
.shouldHaveExitValue(0)
|
|
.shouldNotContain("Exception"); // a real success
|
|
|
|
try (JarFile jf = new JarFile("new.jar")) {
|
|
JarEntry je = jf.getJarEntry("META-INF/OLALA.SF");
|
|
Objects.requireNonNull(je); // check -sigfile
|
|
byte[] sf = null; // content of .SF
|
|
try (InputStream is = jf.getInputStream(je)) {
|
|
sf = is.readAllBytes(); // save for later comparison
|
|
Attributes attrs = new Manifest(new ByteArrayInputStream(sf))
|
|
.getMainAttributes();
|
|
// check -digestalg
|
|
if (!attrs.containsKey(new Attributes.Name(
|
|
"SHA1-Digest-Manifest-Main-Attributes"))) {
|
|
throw new Exception("digestalg incorrect");
|
|
}
|
|
// check -sectionsonly
|
|
if (attrs.containsKey(new Attributes.Name(
|
|
"SHA1-Digest-Manifest"))) {
|
|
throw new Exception("SF should not have file digest");
|
|
}
|
|
}
|
|
|
|
je = jf.getJarEntry("META-INF/OLALA.RSA");
|
|
try (InputStream is = jf.getInputStream(je)) {
|
|
PKCS7 p7 = new PKCS7(is.readAllBytes());
|
|
String alg = p7.getSignerInfos()[0]
|
|
.getDigestAlgorithmId().getName();
|
|
if (!alg.equals("SHA-224")) { // check -sigalg
|
|
throw new Exception("PKCS7 signing is using " + alg);
|
|
}
|
|
// check -internalsf
|
|
if (!Arrays.equals(sf, p7.getContentInfo().getData())) {
|
|
throw new Exception("SF not in RSA");
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
// TSA-related ones are checked in ts.sh
|
|
}
|
|
}
|