jdk-24/test/jdk/sun/security/tools/jarsigner/Options.java
2023-03-14 11:48:59 +00:00

112 lines
4.2 KiB
Java

/*
* Copyright (c) 2015, 2023, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License version 2 only, as
* published by the Free Software Foundation.
*
* This code is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* version 2 for more details (a copy is included in the LICENSE file that
* accompanied this code).
*
* You should have received a copy of the GNU General Public License version
* 2 along with this work; if not, write to the Free Software Foundation,
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
* or visit www.oracle.com if you need additional information or have any
* questions.
*/
/**
* @test
* @bug 8056174 8242260
* @summary Make sure the jarsigner tool still works after it's modified to
* be based on JarSigner API
* @library /test/lib
* @modules java.base/sun.security.pkcs
* java.base/sun.security.x509
*/
import jdk.test.lib.Asserts;
import jdk.test.lib.SecurityTools;
import jdk.test.lib.util.JarUtils;
import sun.security.pkcs.PKCS7;
import java.io.ByteArrayInputStream;
import java.io.InputStream;
import java.nio.file.Files;
import java.nio.file.Path;
import java.util.*;
import java.util.jar.Attributes;
import java.util.jar.JarEntry;
import java.util.jar.JarFile;
import java.util.jar.Manifest;
public class Options {
public static void main(String[] args) throws Exception {
// Prepares raw file
Files.write(Path.of("a"), List.of("a"));
// Pack
JarUtils.createJarFile(Path.of("a.jar"), Path.of("."), Path.of("a"));
// Prepare a keystore
SecurityTools.keytool(
"-keystore jks -storepass changeit -keypass changeit -dname" +
" CN=A -alias a -genkeypair -keyalg rsa")
.shouldHaveExitValue(0);
// -sigfile, -digestalg, -sigalg, -internalsf, -sectionsonly
SecurityTools.jarsigner(
"-debug -signedjar new.jar -keystore jks -storepass changeit" +
" -sigfile olala -digestalg SHA1 -sigalg SHA224withRSA" +
" -internalsf -sectionsonly a.jar a")
.shouldHaveExitValue(0)
.shouldNotContain("Exception"); // a real success
try (JarFile jf = new JarFile("new.jar")) {
JarEntry je = jf.getJarEntry("META-INF/OLALA.SF");
Objects.requireNonNull(je); // check -sigfile
byte[] sf = null; // content of .SF
try (InputStream is = jf.getInputStream(je)) {
sf = is.readAllBytes(); // save for later comparison
Attributes attrs = new Manifest(new ByteArrayInputStream(sf))
.getMainAttributes();
// check -digestalg
if (!attrs.containsKey(new Attributes.Name(
"SHA1-Digest-Manifest-Main-Attributes"))) {
throw new Exception("digestalg incorrect");
}
// check -sectionsonly
if (attrs.containsKey(new Attributes.Name(
"SHA1-Digest-Manifest"))) {
throw new Exception("SF should not have file digest");
}
}
je = jf.getJarEntry("META-INF/OLALA.RSA");
try (InputStream is = jf.getInputStream(je)) {
PKCS7 p7 = new PKCS7(is.readAllBytes());
String alg = p7.getSignerInfos()[0]
.getDigestAlgorithmId().getName();
if (!alg.equals("SHA-224")) { // check -sigalg
throw new Exception("PKCS7 signing is using " + alg);
}
// check -internalsf
if (!Arrays.equals(sf, p7.getContentInfo().getData())) {
throw new Exception("SF not in RSA");
}
}
}
// TSA-related ones are checked in ts.sh
}
}