jdk/src/java.base/share/classes/java/util/jar/JarFile.java
author sherman
Tue, 08 Dec 2015 09:25:01 -0800
changeset 34525 14d2d84cae6d
parent 33235 edfac9a33df3
child 34526 f1f852f5f477
permissions -rw-r--r--
8142508: To bring j.u.z.ZipFile's native implementation to Java to remove the expensive jni cost and mmap crash risk Reviewed-by: coffeys
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     1
/*
31469
92cc72d2a11a 8081678: Add Stream returning methods to classes where there currently exist only Enumeration returning methods
psandoz
parents: 30786
diff changeset
     2
 * Copyright (c) 1997, 2015, Oracle and/or its affiliates. All rights reserved.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     3
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
90ce3da70b43 Initial load
duke
parents:
diff changeset
     4
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
     5
 * This code is free software; you can redistribute it and/or modify it
90ce3da70b43 Initial load
duke
parents:
diff changeset
     6
 * under the terms of the GNU General Public License version 2 only, as
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 4152
diff changeset
     7
 * published by the Free Software Foundation.  Oracle designates this
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     8
 * particular file as subject to the "Classpath" exception as provided
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 4152
diff changeset
     9
 * by Oracle in the LICENSE file that accompanied this code.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    10
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    11
 * This code is distributed in the hope that it will be useful, but WITHOUT
90ce3da70b43 Initial load
duke
parents:
diff changeset
    12
 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
90ce3da70b43 Initial load
duke
parents:
diff changeset
    13
 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
90ce3da70b43 Initial load
duke
parents:
diff changeset
    14
 * version 2 for more details (a copy is included in the LICENSE file that
90ce3da70b43 Initial load
duke
parents:
diff changeset
    15
 * accompanied this code).
90ce3da70b43 Initial load
duke
parents:
diff changeset
    16
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    17
 * You should have received a copy of the GNU General Public License version
90ce3da70b43 Initial load
duke
parents:
diff changeset
    18
 * 2 along with this work; if not, write to the Free Software Foundation,
90ce3da70b43 Initial load
duke
parents:
diff changeset
    19
 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    20
 *
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 4152
diff changeset
    21
 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 4152
diff changeset
    22
 * or visit www.oracle.com if you need additional information or have any
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 4152
diff changeset
    23
 * questions.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    24
 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
    25
90ce3da70b43 Initial load
duke
parents:
diff changeset
    26
package java.util.jar;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    27
90ce3da70b43 Initial load
duke
parents:
diff changeset
    28
import java.io.*;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    29
import java.lang.ref.SoftReference;
8387
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
    30
import java.net.URL;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    31
import java.util.*;
17421
f3fbcfe6e2cf 8012645: Stream methods on BitSet, Random, ThreadLocalRandom, ZipFile
mduigou
parents: 16117
diff changeset
    32
import java.util.stream.Stream;
f3fbcfe6e2cf 8012645: Stream methods on BitSet, Random, ThreadLocalRandom, ZipFile
mduigou
parents: 16117
diff changeset
    33
import java.util.stream.StreamSupport;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    34
import java.util.zip.*;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    35
import java.security.CodeSigner;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    36
import java.security.cert.Certificate;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    37
import java.security.AccessController;
8387
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
    38
import java.security.CodeSource;
32834
e1dca5fe4de3 8137056: Move SharedSecrets and interface friends out of sun.misc
chegar
parents: 32037
diff changeset
    39
import jdk.internal.misc.SharedSecrets;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    40
import sun.security.action.GetPropertyAction;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    41
import sun.security.util.ManifestEntryVerifier;
22578
ff8d54ac7c5c 8031572: jarsigner -verify exits with 0 when a jar file is not properly signed
weijun
parents: 22342
diff changeset
    42
import sun.security.util.SignatureFileVerifier;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    43
90ce3da70b43 Initial load
duke
parents:
diff changeset
    44
/**
32037
ab4526f4ac10 8133115: docs: replace <tt> tags (obsolete in html5) for java.util.logging, java.util.prefs, java.util.zip, java.util.jar
avstepan
parents: 31469
diff changeset
    45
 * The {@code JarFile} class is used to read the contents of a jar file
ab4526f4ac10 8133115: docs: replace <tt> tags (obsolete in html5) for java.util.logging, java.util.prefs, java.util.zip, java.util.jar
avstepan
parents: 31469
diff changeset
    46
 * from any file that can be opened with {@code java.io.RandomAccessFile}.
ab4526f4ac10 8133115: docs: replace <tt> tags (obsolete in html5) for java.util.logging, java.util.prefs, java.util.zip, java.util.jar
avstepan
parents: 31469
diff changeset
    47
 * It extends the class {@code java.util.zip.ZipFile} with support
ab4526f4ac10 8133115: docs: replace <tt> tags (obsolete in html5) for java.util.logging, java.util.prefs, java.util.zip, java.util.jar
avstepan
parents: 31469
diff changeset
    48
 * for reading an optional {@code Manifest} entry. The
ab4526f4ac10 8133115: docs: replace <tt> tags (obsolete in html5) for java.util.logging, java.util.prefs, java.util.zip, java.util.jar
avstepan
parents: 31469
diff changeset
    49
 * {@code Manifest} can be used to specify meta-information about the
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    50
 * jar file and its entries.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    51
 *
32037
ab4526f4ac10 8133115: docs: replace <tt> tags (obsolete in html5) for java.util.logging, java.util.prefs, java.util.zip, java.util.jar
avstepan
parents: 31469
diff changeset
    52
 * <p> Unless otherwise noted, passing a {@code null} argument to a constructor
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    53
 * or method in this class will cause a {@link NullPointerException} to be
90ce3da70b43 Initial load
duke
parents:
diff changeset
    54
 * thrown.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    55
 *
22316
5668a8abf212 8024659: Clarify JarFile API
weijun
parents: 19409
diff changeset
    56
 * If the verify flag is on when opening a signed jar file, the content of the
5668a8abf212 8024659: Clarify JarFile API
weijun
parents: 19409
diff changeset
    57
 * file is verified against its signature embedded inside the file. Please note
5668a8abf212 8024659: Clarify JarFile API
weijun
parents: 19409
diff changeset
    58
 * that the verification process does not include validating the signer's
5668a8abf212 8024659: Clarify JarFile API
weijun
parents: 19409
diff changeset
    59
 * certificate. A caller should inspect the return value of
5668a8abf212 8024659: Clarify JarFile API
weijun
parents: 19409
diff changeset
    60
 * {@link JarEntry#getCodeSigners()} to further determine if the signature
5668a8abf212 8024659: Clarify JarFile API
weijun
parents: 19409
diff changeset
    61
 * can be trusted.
5668a8abf212 8024659: Clarify JarFile API
weijun
parents: 19409
diff changeset
    62
 *
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    63
 * @author  David Connelly
90ce3da70b43 Initial load
duke
parents:
diff changeset
    64
 * @see     Manifest
90ce3da70b43 Initial load
duke
parents:
diff changeset
    65
 * @see     java.util.zip.ZipFile
90ce3da70b43 Initial load
duke
parents:
diff changeset
    66
 * @see     java.util.jar.JarEntry
90ce3da70b43 Initial load
duke
parents:
diff changeset
    67
 * @since   1.2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    68
 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
    69
public
90ce3da70b43 Initial load
duke
parents:
diff changeset
    70
class JarFile extends ZipFile {
90ce3da70b43 Initial load
duke
parents:
diff changeset
    71
    private SoftReference<Manifest> manRef;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    72
    private JarEntry manEntry;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    73
    private JarVerifier jv;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    74
    private boolean jvInitialized;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    75
    private boolean verify;
16023
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
    76
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
    77
    // indicates if Class-Path attribute present (only valid if hasCheckedSpecialAttributes true)
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    78
    private boolean hasClassPathAttribute;
16023
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
    79
    // true if manifest checked for special attributes
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
    80
    private volatile boolean hasCheckedSpecialAttributes;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    81
90ce3da70b43 Initial load
duke
parents:
diff changeset
    82
    // Set up JavaUtilJarAccess in SharedSecrets
90ce3da70b43 Initial load
duke
parents:
diff changeset
    83
    static {
90ce3da70b43 Initial load
duke
parents:
diff changeset
    84
        SharedSecrets.setJavaUtilJarAccess(new JavaUtilJarAccessImpl());
90ce3da70b43 Initial load
duke
parents:
diff changeset
    85
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
    86
90ce3da70b43 Initial load
duke
parents:
diff changeset
    87
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
    88
     * The JAR manifest file name.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    89
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
    90
    public static final String MANIFEST_NAME = "META-INF/MANIFEST.MF";
90ce3da70b43 Initial load
duke
parents:
diff changeset
    91
90ce3da70b43 Initial load
duke
parents:
diff changeset
    92
    /**
32037
ab4526f4ac10 8133115: docs: replace <tt> tags (obsolete in html5) for java.util.logging, java.util.prefs, java.util.zip, java.util.jar
avstepan
parents: 31469
diff changeset
    93
     * Creates a new {@code JarFile} to read from the specified
ab4526f4ac10 8133115: docs: replace <tt> tags (obsolete in html5) for java.util.logging, java.util.prefs, java.util.zip, java.util.jar
avstepan
parents: 31469
diff changeset
    94
     * file {@code name}. The {@code JarFile} will be verified if
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    95
     * it is signed.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    96
     * @param name the name of the jar file to be opened for reading
90ce3da70b43 Initial load
duke
parents:
diff changeset
    97
     * @throws IOException if an I/O error has occurred
90ce3da70b43 Initial load
duke
parents:
diff changeset
    98
     * @throws SecurityException if access to the file is denied
90ce3da70b43 Initial load
duke
parents:
diff changeset
    99
     *         by the SecurityManager
90ce3da70b43 Initial load
duke
parents:
diff changeset
   100
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   101
    public JarFile(String name) throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   102
        this(new File(name), true, ZipFile.OPEN_READ);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   103
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   104
90ce3da70b43 Initial load
duke
parents:
diff changeset
   105
    /**
32037
ab4526f4ac10 8133115: docs: replace <tt> tags (obsolete in html5) for java.util.logging, java.util.prefs, java.util.zip, java.util.jar
avstepan
parents: 31469
diff changeset
   106
     * Creates a new {@code JarFile} to read from the specified
ab4526f4ac10 8133115: docs: replace <tt> tags (obsolete in html5) for java.util.logging, java.util.prefs, java.util.zip, java.util.jar
avstepan
parents: 31469
diff changeset
   107
     * file {@code name}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   108
     * @param name the name of the jar file to be opened for reading
90ce3da70b43 Initial load
duke
parents:
diff changeset
   109
     * @param verify whether or not to verify the jar file if
90ce3da70b43 Initial load
duke
parents:
diff changeset
   110
     * it is signed.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   111
     * @throws IOException if an I/O error has occurred
90ce3da70b43 Initial load
duke
parents:
diff changeset
   112
     * @throws SecurityException if access to the file is denied
90ce3da70b43 Initial load
duke
parents:
diff changeset
   113
     *         by the SecurityManager
90ce3da70b43 Initial load
duke
parents:
diff changeset
   114
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   115
    public JarFile(String name, boolean verify) throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   116
        this(new File(name), verify, ZipFile.OPEN_READ);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   117
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   118
90ce3da70b43 Initial load
duke
parents:
diff changeset
   119
    /**
32037
ab4526f4ac10 8133115: docs: replace <tt> tags (obsolete in html5) for java.util.logging, java.util.prefs, java.util.zip, java.util.jar
avstepan
parents: 31469
diff changeset
   120
     * Creates a new {@code JarFile} to read from the specified
ab4526f4ac10 8133115: docs: replace <tt> tags (obsolete in html5) for java.util.logging, java.util.prefs, java.util.zip, java.util.jar
avstepan
parents: 31469
diff changeset
   121
     * {@code File} object. The {@code JarFile} will be verified if
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   122
     * it is signed.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   123
     * @param file the jar file to be opened for reading
90ce3da70b43 Initial load
duke
parents:
diff changeset
   124
     * @throws IOException if an I/O error has occurred
90ce3da70b43 Initial load
duke
parents:
diff changeset
   125
     * @throws SecurityException if access to the file is denied
90ce3da70b43 Initial load
duke
parents:
diff changeset
   126
     *         by the SecurityManager
90ce3da70b43 Initial load
duke
parents:
diff changeset
   127
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   128
    public JarFile(File file) throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   129
        this(file, true, ZipFile.OPEN_READ);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   130
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   131
90ce3da70b43 Initial load
duke
parents:
diff changeset
   132
90ce3da70b43 Initial load
duke
parents:
diff changeset
   133
    /**
32037
ab4526f4ac10 8133115: docs: replace <tt> tags (obsolete in html5) for java.util.logging, java.util.prefs, java.util.zip, java.util.jar
avstepan
parents: 31469
diff changeset
   134
     * Creates a new {@code JarFile} to read from the specified
ab4526f4ac10 8133115: docs: replace <tt> tags (obsolete in html5) for java.util.logging, java.util.prefs, java.util.zip, java.util.jar
avstepan
parents: 31469
diff changeset
   135
     * {@code File} object.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   136
     * @param file the jar file to be opened for reading
90ce3da70b43 Initial load
duke
parents:
diff changeset
   137
     * @param verify whether or not to verify the jar file if
90ce3da70b43 Initial load
duke
parents:
diff changeset
   138
     * it is signed.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   139
     * @throws IOException if an I/O error has occurred
90ce3da70b43 Initial load
duke
parents:
diff changeset
   140
     * @throws SecurityException if access to the file is denied
90ce3da70b43 Initial load
duke
parents:
diff changeset
   141
     *         by the SecurityManager.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   142
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   143
    public JarFile(File file, boolean verify) throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   144
        this(file, verify, ZipFile.OPEN_READ);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   145
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   146
90ce3da70b43 Initial load
duke
parents:
diff changeset
   147
90ce3da70b43 Initial load
duke
parents:
diff changeset
   148
    /**
32037
ab4526f4ac10 8133115: docs: replace <tt> tags (obsolete in html5) for java.util.logging, java.util.prefs, java.util.zip, java.util.jar
avstepan
parents: 31469
diff changeset
   149
     * Creates a new {@code JarFile} to read from the specified
ab4526f4ac10 8133115: docs: replace <tt> tags (obsolete in html5) for java.util.logging, java.util.prefs, java.util.zip, java.util.jar
avstepan
parents: 31469
diff changeset
   150
     * {@code File} object in the specified mode.  The mode argument
ab4526f4ac10 8133115: docs: replace <tt> tags (obsolete in html5) for java.util.logging, java.util.prefs, java.util.zip, java.util.jar
avstepan
parents: 31469
diff changeset
   151
     * must be either {@code OPEN_READ} or {@code OPEN_READ | OPEN_DELETE}.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   152
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   153
     * @param file the jar file to be opened for reading
90ce3da70b43 Initial load
duke
parents:
diff changeset
   154
     * @param verify whether or not to verify the jar file if
90ce3da70b43 Initial load
duke
parents:
diff changeset
   155
     * it is signed.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   156
     * @param mode the mode in which the file is to be opened
90ce3da70b43 Initial load
duke
parents:
diff changeset
   157
     * @throws IOException if an I/O error has occurred
90ce3da70b43 Initial load
duke
parents:
diff changeset
   158
     * @throws IllegalArgumentException
32037
ab4526f4ac10 8133115: docs: replace <tt> tags (obsolete in html5) for java.util.logging, java.util.prefs, java.util.zip, java.util.jar
avstepan
parents: 31469
diff changeset
   159
     *         if the {@code mode} argument is invalid
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   160
     * @throws SecurityException if access to the file is denied
90ce3da70b43 Initial load
duke
parents:
diff changeset
   161
     *         by the SecurityManager
90ce3da70b43 Initial load
duke
parents:
diff changeset
   162
     * @since 1.3
90ce3da70b43 Initial load
duke
parents:
diff changeset
   163
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   164
    public JarFile(File file, boolean verify, int mode) throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   165
        super(file, mode);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   166
        this.verify = verify;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   167
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   168
90ce3da70b43 Initial load
duke
parents:
diff changeset
   169
    /**
32037
ab4526f4ac10 8133115: docs: replace <tt> tags (obsolete in html5) for java.util.logging, java.util.prefs, java.util.zip, java.util.jar
avstepan
parents: 31469
diff changeset
   170
     * Returns the jar file manifest, or {@code null} if none.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   171
     *
32037
ab4526f4ac10 8133115: docs: replace <tt> tags (obsolete in html5) for java.util.logging, java.util.prefs, java.util.zip, java.util.jar
avstepan
parents: 31469
diff changeset
   172
     * @return the jar file manifest, or {@code null} if none
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   173
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   174
     * @throws IllegalStateException
90ce3da70b43 Initial load
duke
parents:
diff changeset
   175
     *         may be thrown if the jar file has been closed
19047
08210fe86260 8021408: Fix misc doclint issues in java.util and java.io
darcy
parents: 18822
diff changeset
   176
     * @throws IOException  if an I/O error has occurred
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   177
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   178
    public Manifest getManifest() throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   179
        return getManifestFromReference();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   180
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   181
90ce3da70b43 Initial load
duke
parents:
diff changeset
   182
    private Manifest getManifestFromReference() throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   183
        Manifest man = manRef != null ? manRef.get() : null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   184
90ce3da70b43 Initial load
duke
parents:
diff changeset
   185
        if (man == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   186
90ce3da70b43 Initial load
duke
parents:
diff changeset
   187
            JarEntry manEntry = getManEntry();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   188
90ce3da70b43 Initial load
duke
parents:
diff changeset
   189
            // If found then load the manifest
90ce3da70b43 Initial load
duke
parents:
diff changeset
   190
            if (manEntry != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   191
                if (verify) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   192
                    byte[] b = getBytes(manEntry);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   193
                    man = new Manifest(new ByteArrayInputStream(b));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   194
                    if (!jvInitialized) {
9365
469cd39a25de 7040803: regression: bugster fail to start
igor
parents: 9248
diff changeset
   195
                        jv = new JarVerifier(b);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   196
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   197
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   198
                    man = new Manifest(super.getInputStream(manEntry));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   199
                }
11274
7e7196757acd 7117249: fix warnings in java.util.jar, .logging, .prefs, .zip
smarks
parents: 9365
diff changeset
   200
                manRef = new SoftReference<>(man);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   201
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   202
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   203
        return man;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   204
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   205
34525
14d2d84cae6d 8142508: To bring j.u.z.ZipFile's native implementation to Java to remove the expensive jni cost and mmap crash risk
sherman
parents: 33235
diff changeset
   206
    private String[] getMetaInfEntryNames() {
14d2d84cae6d 8142508: To bring j.u.z.ZipFile's native implementation to Java to remove the expensive jni cost and mmap crash risk
sherman
parents: 33235
diff changeset
   207
        return jdk.internal.misc.SharedSecrets.getJavaUtilZipFileAccess()
14d2d84cae6d 8142508: To bring j.u.z.ZipFile's native implementation to Java to remove the expensive jni cost and mmap crash risk
sherman
parents: 33235
diff changeset
   208
                                              .getMetaInfEntryNames((ZipFile)this);
14d2d84cae6d 8142508: To bring j.u.z.ZipFile's native implementation to Java to remove the expensive jni cost and mmap crash risk
sherman
parents: 33235
diff changeset
   209
    }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   210
90ce3da70b43 Initial load
duke
parents:
diff changeset
   211
    /**
32037
ab4526f4ac10 8133115: docs: replace <tt> tags (obsolete in html5) for java.util.logging, java.util.prefs, java.util.zip, java.util.jar
avstepan
parents: 31469
diff changeset
   212
     * Returns the {@code JarEntry} for the given entry name or
ab4526f4ac10 8133115: docs: replace <tt> tags (obsolete in html5) for java.util.logging, java.util.prefs, java.util.zip, java.util.jar
avstepan
parents: 31469
diff changeset
   213
     * {@code null} if not found.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   214
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   215
     * @param name the jar file entry name
32037
ab4526f4ac10 8133115: docs: replace <tt> tags (obsolete in html5) for java.util.logging, java.util.prefs, java.util.zip, java.util.jar
avstepan
parents: 31469
diff changeset
   216
     * @return the {@code JarEntry} for the given entry name or
ab4526f4ac10 8133115: docs: replace <tt> tags (obsolete in html5) for java.util.logging, java.util.prefs, java.util.zip, java.util.jar
avstepan
parents: 31469
diff changeset
   217
     *         {@code null} if not found.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   218
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   219
     * @throws IllegalStateException
90ce3da70b43 Initial load
duke
parents:
diff changeset
   220
     *         may be thrown if the jar file has been closed
90ce3da70b43 Initial load
duke
parents:
diff changeset
   221
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   222
     * @see java.util.jar.JarEntry
90ce3da70b43 Initial load
duke
parents:
diff changeset
   223
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   224
    public JarEntry getJarEntry(String name) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   225
        return (JarEntry)getEntry(name);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   226
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   227
90ce3da70b43 Initial load
duke
parents:
diff changeset
   228
    /**
32037
ab4526f4ac10 8133115: docs: replace <tt> tags (obsolete in html5) for java.util.logging, java.util.prefs, java.util.zip, java.util.jar
avstepan
parents: 31469
diff changeset
   229
     * Returns the {@code ZipEntry} for the given entry name or
ab4526f4ac10 8133115: docs: replace <tt> tags (obsolete in html5) for java.util.logging, java.util.prefs, java.util.zip, java.util.jar
avstepan
parents: 31469
diff changeset
   230
     * {@code null} if not found.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   231
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   232
     * @param name the jar file entry name
32037
ab4526f4ac10 8133115: docs: replace <tt> tags (obsolete in html5) for java.util.logging, java.util.prefs, java.util.zip, java.util.jar
avstepan
parents: 31469
diff changeset
   233
     * @return the {@code ZipEntry} for the given entry name or
ab4526f4ac10 8133115: docs: replace <tt> tags (obsolete in html5) for java.util.logging, java.util.prefs, java.util.zip, java.util.jar
avstepan
parents: 31469
diff changeset
   234
     *         {@code null} if not found
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   235
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   236
     * @throws IllegalStateException
90ce3da70b43 Initial load
duke
parents:
diff changeset
   237
     *         may be thrown if the jar file has been closed
90ce3da70b43 Initial load
duke
parents:
diff changeset
   238
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   239
     * @see java.util.zip.ZipEntry
90ce3da70b43 Initial load
duke
parents:
diff changeset
   240
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   241
    public ZipEntry getEntry(String name) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   242
        ZipEntry ze = super.getEntry(name);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   243
        if (ze != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   244
            return new JarFileEntry(ze);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   245
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   246
        return null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   247
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   248
17421
f3fbcfe6e2cf 8012645: Stream methods on BitSet, Random, ThreadLocalRandom, ZipFile
mduigou
parents: 16117
diff changeset
   249
    private class JarEntryIterator implements Enumeration<JarEntry>,
f3fbcfe6e2cf 8012645: Stream methods on BitSet, Random, ThreadLocalRandom, ZipFile
mduigou
parents: 16117
diff changeset
   250
            Iterator<JarEntry>
f3fbcfe6e2cf 8012645: Stream methods on BitSet, Random, ThreadLocalRandom, ZipFile
mduigou
parents: 16117
diff changeset
   251
    {
f3fbcfe6e2cf 8012645: Stream methods on BitSet, Random, ThreadLocalRandom, ZipFile
mduigou
parents: 16117
diff changeset
   252
        final Enumeration<? extends ZipEntry> e = JarFile.super.entries();
f3fbcfe6e2cf 8012645: Stream methods on BitSet, Random, ThreadLocalRandom, ZipFile
mduigou
parents: 16117
diff changeset
   253
f3fbcfe6e2cf 8012645: Stream methods on BitSet, Random, ThreadLocalRandom, ZipFile
mduigou
parents: 16117
diff changeset
   254
        public boolean hasNext() {
f3fbcfe6e2cf 8012645: Stream methods on BitSet, Random, ThreadLocalRandom, ZipFile
mduigou
parents: 16117
diff changeset
   255
            return e.hasMoreElements();
f3fbcfe6e2cf 8012645: Stream methods on BitSet, Random, ThreadLocalRandom, ZipFile
mduigou
parents: 16117
diff changeset
   256
        }
f3fbcfe6e2cf 8012645: Stream methods on BitSet, Random, ThreadLocalRandom, ZipFile
mduigou
parents: 16117
diff changeset
   257
f3fbcfe6e2cf 8012645: Stream methods on BitSet, Random, ThreadLocalRandom, ZipFile
mduigou
parents: 16117
diff changeset
   258
        public JarEntry next() {
f3fbcfe6e2cf 8012645: Stream methods on BitSet, Random, ThreadLocalRandom, ZipFile
mduigou
parents: 16117
diff changeset
   259
            ZipEntry ze = e.nextElement();
f3fbcfe6e2cf 8012645: Stream methods on BitSet, Random, ThreadLocalRandom, ZipFile
mduigou
parents: 16117
diff changeset
   260
            return new JarFileEntry(ze);
f3fbcfe6e2cf 8012645: Stream methods on BitSet, Random, ThreadLocalRandom, ZipFile
mduigou
parents: 16117
diff changeset
   261
        }
f3fbcfe6e2cf 8012645: Stream methods on BitSet, Random, ThreadLocalRandom, ZipFile
mduigou
parents: 16117
diff changeset
   262
f3fbcfe6e2cf 8012645: Stream methods on BitSet, Random, ThreadLocalRandom, ZipFile
mduigou
parents: 16117
diff changeset
   263
        public boolean hasMoreElements() {
f3fbcfe6e2cf 8012645: Stream methods on BitSet, Random, ThreadLocalRandom, ZipFile
mduigou
parents: 16117
diff changeset
   264
            return hasNext();
f3fbcfe6e2cf 8012645: Stream methods on BitSet, Random, ThreadLocalRandom, ZipFile
mduigou
parents: 16117
diff changeset
   265
        }
f3fbcfe6e2cf 8012645: Stream methods on BitSet, Random, ThreadLocalRandom, ZipFile
mduigou
parents: 16117
diff changeset
   266
f3fbcfe6e2cf 8012645: Stream methods on BitSet, Random, ThreadLocalRandom, ZipFile
mduigou
parents: 16117
diff changeset
   267
        public JarEntry nextElement() {
f3fbcfe6e2cf 8012645: Stream methods on BitSet, Random, ThreadLocalRandom, ZipFile
mduigou
parents: 16117
diff changeset
   268
            return next();
f3fbcfe6e2cf 8012645: Stream methods on BitSet, Random, ThreadLocalRandom, ZipFile
mduigou
parents: 16117
diff changeset
   269
        }
31469
92cc72d2a11a 8081678: Add Stream returning methods to classes where there currently exist only Enumeration returning methods
psandoz
parents: 30786
diff changeset
   270
92cc72d2a11a 8081678: Add Stream returning methods to classes where there currently exist only Enumeration returning methods
psandoz
parents: 30786
diff changeset
   271
        public Iterator<JarEntry> asIterator() {
92cc72d2a11a 8081678: Add Stream returning methods to classes where there currently exist only Enumeration returning methods
psandoz
parents: 30786
diff changeset
   272
            return this;
92cc72d2a11a 8081678: Add Stream returning methods to classes where there currently exist only Enumeration returning methods
psandoz
parents: 30786
diff changeset
   273
        }
17421
f3fbcfe6e2cf 8012645: Stream methods on BitSet, Random, ThreadLocalRandom, ZipFile
mduigou
parents: 16117
diff changeset
   274
    }
f3fbcfe6e2cf 8012645: Stream methods on BitSet, Random, ThreadLocalRandom, ZipFile
mduigou
parents: 16117
diff changeset
   275
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   276
    /**
30786
fb0d6aaea1dc 8064736: Part of java.util.jar.JarFile spec looks confusing with references to Zip
sherman
parents: 29986
diff changeset
   277
     * Returns an enumeration of the jar file entries.
fb0d6aaea1dc 8064736: Part of java.util.jar.JarFile spec looks confusing with references to Zip
sherman
parents: 29986
diff changeset
   278
     *
fb0d6aaea1dc 8064736: Part of java.util.jar.JarFile spec looks confusing with references to Zip
sherman
parents: 29986
diff changeset
   279
     * @return an enumeration of the jar file entries
fb0d6aaea1dc 8064736: Part of java.util.jar.JarFile spec looks confusing with references to Zip
sherman
parents: 29986
diff changeset
   280
     * @throws IllegalStateException
fb0d6aaea1dc 8064736: Part of java.util.jar.JarFile spec looks confusing with references to Zip
sherman
parents: 29986
diff changeset
   281
     *         may be thrown if the jar file has been closed
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   282
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   283
    public Enumeration<JarEntry> entries() {
17421
f3fbcfe6e2cf 8012645: Stream methods on BitSet, Random, ThreadLocalRandom, ZipFile
mduigou
parents: 16117
diff changeset
   284
        return new JarEntryIterator();
f3fbcfe6e2cf 8012645: Stream methods on BitSet, Random, ThreadLocalRandom, ZipFile
mduigou
parents: 16117
diff changeset
   285
    }
f3fbcfe6e2cf 8012645: Stream methods on BitSet, Random, ThreadLocalRandom, ZipFile
mduigou
parents: 16117
diff changeset
   286
30786
fb0d6aaea1dc 8064736: Part of java.util.jar.JarFile spec looks confusing with references to Zip
sherman
parents: 29986
diff changeset
   287
    /**
fb0d6aaea1dc 8064736: Part of java.util.jar.JarFile spec looks confusing with references to Zip
sherman
parents: 29986
diff changeset
   288
     * Returns an ordered {@code Stream} over the jar file entries.
fb0d6aaea1dc 8064736: Part of java.util.jar.JarFile spec looks confusing with references to Zip
sherman
parents: 29986
diff changeset
   289
     * Entries appear in the {@code Stream} in the order they appear in
fb0d6aaea1dc 8064736: Part of java.util.jar.JarFile spec looks confusing with references to Zip
sherman
parents: 29986
diff changeset
   290
     * the central directory of the jar file.
fb0d6aaea1dc 8064736: Part of java.util.jar.JarFile spec looks confusing with references to Zip
sherman
parents: 29986
diff changeset
   291
     *
fb0d6aaea1dc 8064736: Part of java.util.jar.JarFile spec looks confusing with references to Zip
sherman
parents: 29986
diff changeset
   292
     * @return an ordered {@code Stream} of entries in this jar file
fb0d6aaea1dc 8064736: Part of java.util.jar.JarFile spec looks confusing with references to Zip
sherman
parents: 29986
diff changeset
   293
     * @throws IllegalStateException if the jar file has been closed
fb0d6aaea1dc 8064736: Part of java.util.jar.JarFile spec looks confusing with references to Zip
sherman
parents: 29986
diff changeset
   294
     * @since 1.8
fb0d6aaea1dc 8064736: Part of java.util.jar.JarFile spec looks confusing with references to Zip
sherman
parents: 29986
diff changeset
   295
     */
17421
f3fbcfe6e2cf 8012645: Stream methods on BitSet, Random, ThreadLocalRandom, ZipFile
mduigou
parents: 16117
diff changeset
   296
    public Stream<JarEntry> stream() {
f3fbcfe6e2cf 8012645: Stream methods on BitSet, Random, ThreadLocalRandom, ZipFile
mduigou
parents: 16117
diff changeset
   297
        return StreamSupport.stream(Spliterators.spliterator(
f3fbcfe6e2cf 8012645: Stream methods on BitSet, Random, ThreadLocalRandom, ZipFile
mduigou
parents: 16117
diff changeset
   298
                new JarEntryIterator(), size(),
f3fbcfe6e2cf 8012645: Stream methods on BitSet, Random, ThreadLocalRandom, ZipFile
mduigou
parents: 16117
diff changeset
   299
                Spliterator.ORDERED | Spliterator.DISTINCT |
18822
4b6be7c19547 8019395: Consolidate StreamSupport.{stream,parallelStream} into a single method
psandoz
parents: 17421
diff changeset
   300
                        Spliterator.IMMUTABLE | Spliterator.NONNULL), false);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   301
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   302
90ce3da70b43 Initial load
duke
parents:
diff changeset
   303
    private class JarFileEntry extends JarEntry {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   304
        JarFileEntry(ZipEntry ze) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   305
            super(ze);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   306
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   307
        public Attributes getAttributes() throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   308
            Manifest man = JarFile.this.getManifest();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   309
            if (man != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   310
                return man.getAttributes(getName());
90ce3da70b43 Initial load
duke
parents:
diff changeset
   311
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   312
                return null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   313
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   314
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   315
        public Certificate[] getCertificates() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   316
            try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   317
                maybeInstantiateVerifier();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   318
            } catch (IOException e) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   319
                throw new RuntimeException(e);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   320
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   321
            if (certs == null && jv != null) {
8387
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   322
                certs = jv.getCerts(JarFile.this, this);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   323
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   324
            return certs == null ? null : certs.clone();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   325
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   326
        public CodeSigner[] getCodeSigners() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   327
            try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   328
                maybeInstantiateVerifier();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   329
            } catch (IOException e) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   330
                throw new RuntimeException(e);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   331
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   332
            if (signers == null && jv != null) {
8387
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   333
                signers = jv.getCodeSigners(JarFile.this, this);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   334
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   335
            return signers == null ? null : signers.clone();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   336
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   337
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   338
90ce3da70b43 Initial load
duke
parents:
diff changeset
   339
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   340
     * Ensures that the JarVerifier has been created if one is
90ce3da70b43 Initial load
duke
parents:
diff changeset
   341
     * necessary (i.e., the jar appears to be signed.) This is done as
90ce3da70b43 Initial load
duke
parents:
diff changeset
   342
     * a quick check to avoid processing of the manifest for unsigned
90ce3da70b43 Initial load
duke
parents:
diff changeset
   343
     * jars.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   344
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   345
    private void maybeInstantiateVerifier() throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   346
        if (jv != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   347
            return;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   348
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   349
90ce3da70b43 Initial load
duke
parents:
diff changeset
   350
        if (verify) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   351
            String[] names = getMetaInfEntryNames();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   352
            if (names != null) {
22078
bdec5d53e98c 8030851: Update code in java.util to use newer language features
psandoz
parents: 19409
diff changeset
   353
                for (String nameLower : names) {
bdec5d53e98c 8030851: Update code in java.util to use newer language features
psandoz
parents: 19409
diff changeset
   354
                    String name = nameLower.toUpperCase(Locale.ENGLISH);
9365
469cd39a25de 7040803: regression: bugster fail to start
igor
parents: 9248
diff changeset
   355
                    if (name.endsWith(".DSA") ||
469cd39a25de 7040803: regression: bugster fail to start
igor
parents: 9248
diff changeset
   356
                        name.endsWith(".RSA") ||
469cd39a25de 7040803: regression: bugster fail to start
igor
parents: 9248
diff changeset
   357
                        name.endsWith(".EC") ||
469cd39a25de 7040803: regression: bugster fail to start
igor
parents: 9248
diff changeset
   358
                        name.endsWith(".SF")) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   359
                        // Assume since we found a signature-related file
90ce3da70b43 Initial load
duke
parents:
diff changeset
   360
                        // that the jar is signed and that we therefore
90ce3da70b43 Initial load
duke
parents:
diff changeset
   361
                        // need a JarVerifier and Manifest
90ce3da70b43 Initial load
duke
parents:
diff changeset
   362
                        getManifest();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   363
                        return;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   364
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   365
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   366
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   367
            // No signature-related files; don't instantiate a
90ce3da70b43 Initial load
duke
parents:
diff changeset
   368
            // verifier
90ce3da70b43 Initial load
duke
parents:
diff changeset
   369
            verify = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   370
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   371
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   372
90ce3da70b43 Initial load
duke
parents:
diff changeset
   373
90ce3da70b43 Initial load
duke
parents:
diff changeset
   374
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   375
     * Initializes the verifier object by reading all the manifest
90ce3da70b43 Initial load
duke
parents:
diff changeset
   376
     * entries and passing them to the verifier.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   377
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   378
    private void initializeVerifier() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   379
        ManifestEntryVerifier mev = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   380
90ce3da70b43 Initial load
duke
parents:
diff changeset
   381
        // Verify "META-INF/" entries...
90ce3da70b43 Initial load
duke
parents:
diff changeset
   382
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   383
            String[] names = getMetaInfEntryNames();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   384
            if (names != null) {
22078
bdec5d53e98c 8030851: Update code in java.util to use newer language features
psandoz
parents: 19409
diff changeset
   385
                for (String name : names) {
22578
ff8d54ac7c5c 8031572: jarsigner -verify exits with 0 when a jar file is not properly signed
weijun
parents: 22342
diff changeset
   386
                    String uname = name.toUpperCase(Locale.ENGLISH);
ff8d54ac7c5c 8031572: jarsigner -verify exits with 0 when a jar file is not properly signed
weijun
parents: 22342
diff changeset
   387
                    if (MANIFEST_NAME.equals(uname)
ff8d54ac7c5c 8031572: jarsigner -verify exits with 0 when a jar file is not properly signed
weijun
parents: 22342
diff changeset
   388
                            || SignatureFileVerifier.isBlockOrSF(uname)) {
ff8d54ac7c5c 8031572: jarsigner -verify exits with 0 when a jar file is not properly signed
weijun
parents: 22342
diff changeset
   389
                        JarEntry e = getJarEntry(name);
ff8d54ac7c5c 8031572: jarsigner -verify exits with 0 when a jar file is not properly signed
weijun
parents: 22342
diff changeset
   390
                        if (e == null) {
ff8d54ac7c5c 8031572: jarsigner -verify exits with 0 when a jar file is not properly signed
weijun
parents: 22342
diff changeset
   391
                            throw new JarException("corrupted jar file");
ff8d54ac7c5c 8031572: jarsigner -verify exits with 0 when a jar file is not properly signed
weijun
parents: 22342
diff changeset
   392
                        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   393
                        if (mev == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   394
                            mev = new ManifestEntryVerifier
90ce3da70b43 Initial load
duke
parents:
diff changeset
   395
                                (getManifestFromReference());
90ce3da70b43 Initial load
duke
parents:
diff changeset
   396
                        }
9365
469cd39a25de 7040803: regression: bugster fail to start
igor
parents: 9248
diff changeset
   397
                        byte[] b = getBytes(e);
469cd39a25de 7040803: regression: bugster fail to start
igor
parents: 9248
diff changeset
   398
                        if (b != null && b.length > 0) {
469cd39a25de 7040803: regression: bugster fail to start
igor
parents: 9248
diff changeset
   399
                            jv.beginEntry(e, mev);
469cd39a25de 7040803: regression: bugster fail to start
igor
parents: 9248
diff changeset
   400
                            jv.update(b.length, b, 0, b.length, mev);
469cd39a25de 7040803: regression: bugster fail to start
igor
parents: 9248
diff changeset
   401
                            jv.update(-1, null, 0, 0, mev);
469cd39a25de 7040803: regression: bugster fail to start
igor
parents: 9248
diff changeset
   402
                        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   403
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   404
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   405
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   406
        } catch (IOException ex) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   407
            // if we had an error parsing any blocks, just
90ce3da70b43 Initial load
duke
parents:
diff changeset
   408
            // treat the jar file as being unsigned
90ce3da70b43 Initial load
duke
parents:
diff changeset
   409
            jv = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   410
            verify = false;
16082
a042f1412a78 8000210: Improve JarFile code quality
weijun
parents: 11274
diff changeset
   411
            if (JarVerifier.debug != null) {
a042f1412a78 8000210: Improve JarFile code quality
weijun
parents: 11274
diff changeset
   412
                JarVerifier.debug.println("jarfile parsing error!");
a042f1412a78 8000210: Improve JarFile code quality
weijun
parents: 11274
diff changeset
   413
                ex.printStackTrace();
a042f1412a78 8000210: Improve JarFile code quality
weijun
parents: 11274
diff changeset
   414
            }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   415
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   416
90ce3da70b43 Initial load
duke
parents:
diff changeset
   417
        // if after initializing the verifier we have nothing
90ce3da70b43 Initial load
duke
parents:
diff changeset
   418
        // signed, we null it out.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   419
90ce3da70b43 Initial load
duke
parents:
diff changeset
   420
        if (jv != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   421
90ce3da70b43 Initial load
duke
parents:
diff changeset
   422
            jv.doneWithMeta();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   423
            if (JarVerifier.debug != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   424
                JarVerifier.debug.println("done with meta!");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   425
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   426
90ce3da70b43 Initial load
duke
parents:
diff changeset
   427
            if (jv.nothingToVerify()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   428
                if (JarVerifier.debug != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   429
                    JarVerifier.debug.println("nothing to verify!");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   430
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   431
                jv = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   432
                verify = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   433
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   434
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   435
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   436
90ce3da70b43 Initial load
duke
parents:
diff changeset
   437
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   438
     * Reads all the bytes for a given entry. Used to process the
90ce3da70b43 Initial load
duke
parents:
diff changeset
   439
     * META-INF files.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   440
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   441
    private byte[] getBytes(ZipEntry ze) throws IOException {
16082
a042f1412a78 8000210: Improve JarFile code quality
weijun
parents: 11274
diff changeset
   442
        try (InputStream is = super.getInputStream(ze)) {
32933
83d50f1247bb 8138978: Examine usages of sun.misc.IOUtils
chegar
parents: 32834
diff changeset
   443
            int len = (int)ze.getSize();
33235
edfac9a33df3 8139706: JarFile.getBytes could use InputStream.readNBytes
redestad
parents: 32933
diff changeset
   444
            int bytesRead;
edfac9a33df3 8139706: JarFile.getBytes could use InputStream.readNBytes
redestad
parents: 32933
diff changeset
   445
            byte[] b;
edfac9a33df3 8139706: JarFile.getBytes could use InputStream.readNBytes
redestad
parents: 32933
diff changeset
   446
            // trust specified entry sizes when reasonably small
edfac9a33df3 8139706: JarFile.getBytes could use InputStream.readNBytes
redestad
parents: 32933
diff changeset
   447
            if (len != -1 && len <= 65535) {
edfac9a33df3 8139706: JarFile.getBytes could use InputStream.readNBytes
redestad
parents: 32933
diff changeset
   448
                b = new byte[len];
edfac9a33df3 8139706: JarFile.getBytes could use InputStream.readNBytes
redestad
parents: 32933
diff changeset
   449
                bytesRead = is.readNBytes(b, 0, len);
edfac9a33df3 8139706: JarFile.getBytes could use InputStream.readNBytes
redestad
parents: 32933
diff changeset
   450
            } else {
edfac9a33df3 8139706: JarFile.getBytes could use InputStream.readNBytes
redestad
parents: 32933
diff changeset
   451
                b = is.readAllBytes();
edfac9a33df3 8139706: JarFile.getBytes could use InputStream.readNBytes
redestad
parents: 32933
diff changeset
   452
                bytesRead = b.length;
edfac9a33df3 8139706: JarFile.getBytes could use InputStream.readNBytes
redestad
parents: 32933
diff changeset
   453
            }
edfac9a33df3 8139706: JarFile.getBytes could use InputStream.readNBytes
redestad
parents: 32933
diff changeset
   454
            if (len != -1 && len != bytesRead) {
edfac9a33df3 8139706: JarFile.getBytes could use InputStream.readNBytes
redestad
parents: 32933
diff changeset
   455
                throw new EOFException("Expected:" + len + ", read:" + bytesRead);
edfac9a33df3 8139706: JarFile.getBytes could use InputStream.readNBytes
redestad
parents: 32933
diff changeset
   456
            }
32933
83d50f1247bb 8138978: Examine usages of sun.misc.IOUtils
chegar
parents: 32834
diff changeset
   457
            return b;
8553
46c2babb1e44 7021582: convert jar/zip code and tests to use try-with-resources
smarks
parents: 8387
diff changeset
   458
        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   459
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   460
90ce3da70b43 Initial load
duke
parents:
diff changeset
   461
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   462
     * Returns an input stream for reading the contents of the specified
90ce3da70b43 Initial load
duke
parents:
diff changeset
   463
     * zip file entry.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   464
     * @param ze the zip file entry
90ce3da70b43 Initial load
duke
parents:
diff changeset
   465
     * @return an input stream for reading the contents of the specified
90ce3da70b43 Initial load
duke
parents:
diff changeset
   466
     *         zip file entry
90ce3da70b43 Initial load
duke
parents:
diff changeset
   467
     * @throws ZipException if a zip file format error has occurred
90ce3da70b43 Initial load
duke
parents:
diff changeset
   468
     * @throws IOException if an I/O error has occurred
90ce3da70b43 Initial load
duke
parents:
diff changeset
   469
     * @throws SecurityException if any of the jar file entries
90ce3da70b43 Initial load
duke
parents:
diff changeset
   470
     *         are incorrectly signed.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   471
     * @throws IllegalStateException
90ce3da70b43 Initial load
duke
parents:
diff changeset
   472
     *         may be thrown if the jar file has been closed
90ce3da70b43 Initial load
duke
parents:
diff changeset
   473
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   474
    public synchronized InputStream getInputStream(ZipEntry ze)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   475
        throws IOException
90ce3da70b43 Initial load
duke
parents:
diff changeset
   476
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   477
        maybeInstantiateVerifier();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   478
        if (jv == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   479
            return super.getInputStream(ze);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   480
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   481
        if (!jvInitialized) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   482
            initializeVerifier();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   483
            jvInitialized = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   484
            // could be set to null after a call to
90ce3da70b43 Initial load
duke
parents:
diff changeset
   485
            // initializeVerifier if we have nothing to
90ce3da70b43 Initial load
duke
parents:
diff changeset
   486
            // verify
90ce3da70b43 Initial load
duke
parents:
diff changeset
   487
            if (jv == null)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   488
                return super.getInputStream(ze);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   489
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   490
90ce3da70b43 Initial load
duke
parents:
diff changeset
   491
        // wrap a verifier stream around the real stream
90ce3da70b43 Initial load
duke
parents:
diff changeset
   492
        return new JarVerifier.VerifierStream(
90ce3da70b43 Initial load
duke
parents:
diff changeset
   493
            getManifestFromReference(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
   494
            ze instanceof JarFileEntry ?
90ce3da70b43 Initial load
duke
parents:
diff changeset
   495
            (JarEntry) ze : getJarEntry(ze.getName()),
90ce3da70b43 Initial load
duke
parents:
diff changeset
   496
            super.getInputStream(ze),
90ce3da70b43 Initial load
duke
parents:
diff changeset
   497
            jv);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   498
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   499
16023
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   500
    // Statics for hand-coded Boyer-Moore search
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   501
    private static final char[] CLASSPATH_CHARS = {'c','l','a','s','s','-','p','a','t','h'};
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   502
    // The bad character shift for "class-path"
16023
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   503
    private static final int[] CLASSPATH_LASTOCC;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   504
    // The good suffix shift for "class-path"
16023
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   505
    private static final int[] CLASSPATH_OPTOSFT;
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   506
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   507
    static {
16023
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   508
        CLASSPATH_LASTOCC = new int[128];
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   509
        CLASSPATH_OPTOSFT = new int[10];
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   510
        CLASSPATH_LASTOCC[(int)'c'] = 1;
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   511
        CLASSPATH_LASTOCC[(int)'l'] = 2;
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   512
        CLASSPATH_LASTOCC[(int)'s'] = 5;
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   513
        CLASSPATH_LASTOCC[(int)'-'] = 6;
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   514
        CLASSPATH_LASTOCC[(int)'p'] = 7;
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   515
        CLASSPATH_LASTOCC[(int)'a'] = 8;
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   516
        CLASSPATH_LASTOCC[(int)'t'] = 9;
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   517
        CLASSPATH_LASTOCC[(int)'h'] = 10;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   518
        for (int i=0; i<9; i++)
16023
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   519
            CLASSPATH_OPTOSFT[i] = 10;
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   520
        CLASSPATH_OPTOSFT[9]=1;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   521
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   522
90ce3da70b43 Initial load
duke
parents:
diff changeset
   523
    private JarEntry getManEntry() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   524
        if (manEntry == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   525
            // First look up manifest entry using standard name
90ce3da70b43 Initial load
duke
parents:
diff changeset
   526
            manEntry = getJarEntry(MANIFEST_NAME);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   527
            if (manEntry == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   528
                // If not found, then iterate through all the "META-INF/"
90ce3da70b43 Initial load
duke
parents:
diff changeset
   529
                // entries to find a match.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   530
                String[] names = getMetaInfEntryNames();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   531
                if (names != null) {
22078
bdec5d53e98c 8030851: Update code in java.util to use newer language features
psandoz
parents: 19409
diff changeset
   532
                    for (String name : names) {
bdec5d53e98c 8030851: Update code in java.util to use newer language features
psandoz
parents: 19409
diff changeset
   533
                        if (MANIFEST_NAME.equals(name.toUpperCase(Locale.ENGLISH))) {
bdec5d53e98c 8030851: Update code in java.util to use newer language features
psandoz
parents: 19409
diff changeset
   534
                            manEntry = getJarEntry(name);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   535
                            break;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   536
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   537
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   538
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   539
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   540
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   541
        return manEntry;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   542
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   543
16023
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   544
   /**
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   545
    * Returns {@code true} iff this JAR file has a manifest with the
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   546
    * Class-Path attribute
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   547
    */
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   548
    boolean hasClassPathAttribute() throws IOException {
16023
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   549
        checkForSpecialAttributes();
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   550
        return hasClassPathAttribute;
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   551
    }
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   552
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   553
    /**
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   554
     * Returns true if the pattern {@code src} is found in {@code b}.
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   555
     * The {@code lastOcc} and {@code optoSft} arrays are the precomputed
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   556
     * bad character and good suffix shifts.
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   557
     */
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   558
    private boolean match(char[] src, byte[] b, int[] lastOcc, int[] optoSft) {
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   559
        int len = src.length;
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   560
        int last = b.length - len;
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   561
        int i = 0;
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   562
        next:
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   563
        while (i<=last) {
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   564
            for (int j=(len-1); j>=0; j--) {
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   565
                char c = (char) b[i+j];
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   566
                c = (((c-'A')|('Z'-c)) >= 0) ? (char)(c + 32) : c;
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   567
                if (c != src[j]) {
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   568
                    i += Math.max(j + 1 - lastOcc[c&0x7F], optoSft[j]);
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   569
                    continue next;
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   570
                 }
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   571
            }
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   572
            return true;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   573
        }
16023
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   574
        return false;
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   575
    }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   576
16023
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   577
    /**
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   578
     * On first invocation, check if the JAR file has the Class-Path
19409
d7c7b9d56631 8022921: Remove experimental Profile attribute
alanb
parents: 19047
diff changeset
   579
     * attribute. A no-op on subsequent calls.
16023
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   580
     */
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   581
    private void checkForSpecialAttributes() throws IOException {
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   582
        if (hasCheckedSpecialAttributes) return;
27565
729f9700483a 8049367: Modular Run-Time Images
chegar
parents: 25859
diff changeset
   583
        JarEntry manEntry = getManEntry();
729f9700483a 8049367: Modular Run-Time Images
chegar
parents: 25859
diff changeset
   584
        if (manEntry != null) {
729f9700483a 8049367: Modular Run-Time Images
chegar
parents: 25859
diff changeset
   585
            byte[] b = getBytes(manEntry);
729f9700483a 8049367: Modular Run-Time Images
chegar
parents: 25859
diff changeset
   586
            if (match(CLASSPATH_CHARS, b, CLASSPATH_LASTOCC, CLASSPATH_OPTOSFT))
729f9700483a 8049367: Modular Run-Time Images
chegar
parents: 25859
diff changeset
   587
                hasClassPathAttribute = true;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   588
        }
16023
58ecc1b8327b 8008290: (profiles) Startup regression due to additional checking of JAR file manifests
alanb
parents: 11274
diff changeset
   589
        hasCheckedSpecialAttributes = true;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   590
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   591
8387
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   592
    private synchronized void ensureInitialization() {
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   593
        try {
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   594
            maybeInstantiateVerifier();
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   595
        } catch (IOException e) {
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   596
            throw new RuntimeException(e);
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   597
        }
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   598
        if (jv != null && !jvInitialized) {
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   599
            initializeVerifier();
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   600
            jvInitialized = true;
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   601
        }
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   602
    }
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   603
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   604
    JarEntry newEntry(ZipEntry ze) {
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   605
        return new JarFileEntry(ze);
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   606
    }
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   607
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   608
    Enumeration<String> entryNames(CodeSource[] cs) {
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   609
        ensureInitialization();
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   610
        if (jv != null) {
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   611
            return jv.entryNames(this, cs);
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   612
        }
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   613
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   614
        /*
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   615
         * JAR file has no signed content. Is there a non-signing
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   616
         * code source?
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   617
         */
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   618
        boolean includeUnsigned = false;
22078
bdec5d53e98c 8030851: Update code in java.util to use newer language features
psandoz
parents: 19409
diff changeset
   619
        for (CodeSource c : cs) {
bdec5d53e98c 8030851: Update code in java.util to use newer language features
psandoz
parents: 19409
diff changeset
   620
            if (c.getCodeSigners() == null) {
8387
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   621
                includeUnsigned = true;
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   622
                break;
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   623
            }
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   624
        }
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   625
        if (includeUnsigned) {
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   626
            return unsignedEntryNames();
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   627
        } else {
29986
97167d851fc4 8078467: Update core libraries to use diamond with anonymous classes
darcy
parents: 27565
diff changeset
   628
            return new Enumeration<>() {
8387
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   629
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   630
                public boolean hasMoreElements() {
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   631
                    return false;
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   632
                }
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   633
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   634
                public String nextElement() {
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   635
                    throw new NoSuchElementException();
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   636
                }
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   637
            };
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   638
        }
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   639
    }
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   640
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   641
    /**
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   642
     * Returns an enumeration of the zip file entries
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   643
     * excluding internal JAR mechanism entries and including
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   644
     * signed entries missing from the ZIP directory.
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   645
     */
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   646
    Enumeration<JarEntry> entries2() {
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   647
        ensureInitialization();
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   648
        if (jv != null) {
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   649
            return jv.entries2(this, super.entries());
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   650
        }
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   651
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   652
        // screen out entries which are never signed
11274
7e7196757acd 7117249: fix warnings in java.util.jar, .logging, .prefs, .zip
smarks
parents: 9365
diff changeset
   653
        final Enumeration<? extends ZipEntry> enum_ = super.entries();
29986
97167d851fc4 8078467: Update core libraries to use diamond with anonymous classes
darcy
parents: 27565
diff changeset
   654
        return new Enumeration<>() {
8387
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   655
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   656
            ZipEntry entry;
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   657
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   658
            public boolean hasMoreElements() {
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   659
                if (entry != null) {
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   660
                    return true;
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   661
                }
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   662
                while (enum_.hasMoreElements()) {
11274
7e7196757acd 7117249: fix warnings in java.util.jar, .logging, .prefs, .zip
smarks
parents: 9365
diff changeset
   663
                    ZipEntry ze = enum_.nextElement();
8387
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   664
                    if (JarVerifier.isSigningRelated(ze.getName())) {
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   665
                        continue;
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   666
                    }
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   667
                    entry = ze;
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   668
                    return true;
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   669
                }
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   670
                return false;
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   671
            }
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   672
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   673
            public JarFileEntry nextElement() {
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   674
                if (hasMoreElements()) {
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   675
                    ZipEntry ze = entry;
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   676
                    entry = null;
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   677
                    return new JarFileEntry(ze);
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   678
                }
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   679
                throw new NoSuchElementException();
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   680
            }
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   681
        };
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   682
    }
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   683
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   684
    CodeSource[] getCodeSources(URL url) {
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   685
        ensureInitialization();
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   686
        if (jv != null) {
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   687
            return jv.getCodeSources(this, url);
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   688
        }
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   689
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   690
        /*
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   691
         * JAR file has no signed content. Is there a non-signing
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   692
         * code source?
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   693
         */
11274
7e7196757acd 7117249: fix warnings in java.util.jar, .logging, .prefs, .zip
smarks
parents: 9365
diff changeset
   694
        Enumeration<String> unsigned = unsignedEntryNames();
8387
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   695
        if (unsigned.hasMoreElements()) {
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   696
            return new CodeSource[]{JarVerifier.getUnsignedCS(url)};
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   697
        } else {
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   698
            return null;
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   699
        }
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   700
    }
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   701
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   702
    private Enumeration<String> unsignedEntryNames() {
11274
7e7196757acd 7117249: fix warnings in java.util.jar, .logging, .prefs, .zip
smarks
parents: 9365
diff changeset
   703
        final Enumeration<JarEntry> entries = entries();
29986
97167d851fc4 8078467: Update core libraries to use diamond with anonymous classes
darcy
parents: 27565
diff changeset
   704
        return new Enumeration<>() {
8387
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   705
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   706
            String name;
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   707
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   708
            /*
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   709
             * Grab entries from ZIP directory but screen out
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   710
             * metadata.
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   711
             */
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   712
            public boolean hasMoreElements() {
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   713
                if (name != null) {
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   714
                    return true;
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   715
                }
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   716
                while (entries.hasMoreElements()) {
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   717
                    String value;
11274
7e7196757acd 7117249: fix warnings in java.util.jar, .logging, .prefs, .zip
smarks
parents: 9365
diff changeset
   718
                    ZipEntry e = entries.nextElement();
8387
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   719
                    value = e.getName();
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   720
                    if (e.isDirectory() || JarVerifier.isSigningRelated(value)) {
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   721
                        continue;
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   722
                    }
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   723
                    name = value;
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   724
                    return true;
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   725
                }
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   726
                return false;
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   727
            }
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   728
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   729
            public String nextElement() {
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   730
                if (hasMoreElements()) {
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   731
                    String value = name;
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   732
                    name = null;
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   733
                    return value;
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   734
                }
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   735
                throw new NoSuchElementException();
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   736
            }
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   737
        };
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   738
    }
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   739
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   740
    CodeSource getCodeSource(URL url, String name) {
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   741
        ensureInitialization();
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   742
        if (jv != null) {
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   743
            if (jv.eagerValidation) {
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   744
                CodeSource cs = null;
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   745
                JarEntry je = getJarEntry(name);
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   746
                if (je != null) {
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   747
                    cs = jv.getCodeSource(url, this, je);
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   748
                } else {
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   749
                    cs = jv.getCodeSource(url, name);
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   750
                }
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   751
                return cs;
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   752
            } else {
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   753
                return jv.getCodeSource(url, name);
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   754
            }
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   755
        }
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   756
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   757
        return JarVerifier.getUnsignedCS(url);
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   758
    }
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   759
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   760
    void setEagerValidation(boolean eager) {
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   761
        try {
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   762
            maybeInstantiateVerifier();
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   763
        } catch (IOException e) {
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   764
            throw new RuntimeException(e);
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   765
        }
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   766
        if (jv != null) {
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   767
            jv.setEagerValidation(eager);
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   768
        }
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   769
    }
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   770
11274
7e7196757acd 7117249: fix warnings in java.util.jar, .logging, .prefs, .zip
smarks
parents: 9365
diff changeset
   771
    List<Object> getManifestDigests() {
8387
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   772
        ensureInitialization();
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   773
        if (jv != null) {
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   774
            return jv.getManifestDigests();
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   775
        }
22078
bdec5d53e98c 8030851: Update code in java.util to use newer language features
psandoz
parents: 19409
diff changeset
   776
        return new ArrayList<>();
8387
f0fa7bbf889e 6742654: Code insertion/replacement attacks against signed jars
weijun
parents: 5506
diff changeset
   777
    }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   778
}