jdk/src/share/classes/sun/security/tools/jarsigner/Main.java
author lana
Thu, 26 Dec 2013 12:04:16 -0800
changeset 23010 6dadb192ad81
parent 22336 a5de9b85e983
child 23912 9eab25093a89
permissions -rw-r--r--
8029235: Update copyright year to match last edit in jdk8 jdk repository for 2013 Summary: updated files with 2011, 2012 and 2013 years according to the file's last updated date Reviewed-by: tbell, lancea, chegar
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     1
/*
23010
6dadb192ad81 8029235: Update copyright year to match last edit in jdk8 jdk repository for 2013
lana
parents: 22336
diff changeset
     2
 * Copyright (c) 1997, 2013, Oracle and/or its affiliates. All rights reserved.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     3
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
90ce3da70b43 Initial load
duke
parents:
diff changeset
     4
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
     5
 * This code is free software; you can redistribute it and/or modify it
90ce3da70b43 Initial load
duke
parents:
diff changeset
     6
 * under the terms of the GNU General Public License version 2 only, as
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 5462
diff changeset
     7
 * published by the Free Software Foundation.  Oracle designates this
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     8
 * particular file as subject to the "Classpath" exception as provided
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 5462
diff changeset
     9
 * by Oracle in the LICENSE file that accompanied this code.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    10
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    11
 * This code is distributed in the hope that it will be useful, but WITHOUT
90ce3da70b43 Initial load
duke
parents:
diff changeset
    12
 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
90ce3da70b43 Initial load
duke
parents:
diff changeset
    13
 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
90ce3da70b43 Initial load
duke
parents:
diff changeset
    14
 * version 2 for more details (a copy is included in the LICENSE file that
90ce3da70b43 Initial load
duke
parents:
diff changeset
    15
 * accompanied this code).
90ce3da70b43 Initial load
duke
parents:
diff changeset
    16
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    17
 * You should have received a copy of the GNU General Public License version
90ce3da70b43 Initial load
duke
parents:
diff changeset
    18
 * 2 along with this work; if not, write to the Free Software Foundation,
90ce3da70b43 Initial load
duke
parents:
diff changeset
    19
 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    20
 *
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 5462
diff changeset
    21
 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 5462
diff changeset
    22
 * or visit www.oracle.com if you need additional information or have any
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 5462
diff changeset
    23
 * questions.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    24
 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
    25
14182
3041082abb40 7194449: String resources for Key Tool and Policy Tool should be in their respective packages
sflores
parents: 12046
diff changeset
    26
package sun.security.tools.jarsigner;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    27
90ce3da70b43 Initial load
duke
parents:
diff changeset
    28
import java.io.*;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    29
import java.util.*;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    30
import java.util.zip.*;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    31
import java.util.jar.*;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    32
import java.math.BigInteger;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    33
import java.net.URI;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    34
import java.net.URISyntaxException;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    35
import java.text.Collator;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    36
import java.text.MessageFormat;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    37
import java.security.cert.Certificate;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    38
import java.security.cert.X509Certificate;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    39
import java.security.cert.CertificateException;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    40
import java.security.*;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    41
import java.lang.reflect.Constructor;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    42
90ce3da70b43 Initial load
duke
parents:
diff changeset
    43
import com.sun.jarsigner.ContentSigner;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    44
import com.sun.jarsigner.ContentSignerParameters;
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
    45
import java.net.SocketTimeoutException;
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
    46
import java.net.URL;
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
    47
import java.net.URLClassLoader;
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
    48
import java.security.cert.CertPath;
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
    49
import java.security.cert.CertPathValidator;
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
    50
import java.security.cert.CertificateExpiredException;
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
    51
import java.security.cert.CertificateFactory;
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
    52
import java.security.cert.CertificateNotYetValidException;
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
    53
import java.security.cert.PKIXParameters;
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
    54
import java.security.cert.TrustAnchor;
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
    55
import java.util.Map.Entry;
14182
3041082abb40 7194449: String resources for Key Tool and Policy Tool should be in their respective packages
sflores
parents: 12046
diff changeset
    56
import sun.security.tools.KeyStoreUtil;
3041082abb40 7194449: String resources for Key Tool and Policy Tool should be in their respective packages
sflores
parents: 12046
diff changeset
    57
import sun.security.tools.PathList;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    58
import sun.security.x509.*;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    59
import sun.security.util.*;
16020
b57c48f16179 8006182: cleanup to use java.util.Base64 in java security component, providers, and regression tests
msheppar
parents: 14421
diff changeset
    60
import java.util.Base64;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    61
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
    62
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    63
/**
90ce3da70b43 Initial load
duke
parents:
diff changeset
    64
 * <p>The jarsigner utility.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    65
 *
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
    66
 * The exit codes for the main method are:
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
    67
 *
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
    68
 * 0: success
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
    69
 * 1: any error that the jar cannot be signed or verified, including:
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
    70
 *      keystore loading error
12046
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
    71
 *      TSP communication error
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
    72
 *      jarsigner command line error...
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
    73
 * otherwise: error codes from -strict
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
    74
 *
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    75
 * @author Roland Schemers
90ce3da70b43 Initial load
duke
parents:
diff changeset
    76
 * @author Jan Luehe
90ce3da70b43 Initial load
duke
parents:
diff changeset
    77
 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
    78
14182
3041082abb40 7194449: String resources for Key Tool and Policy Tool should be in their respective packages
sflores
parents: 12046
diff changeset
    79
public class Main {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    80
90ce3da70b43 Initial load
duke
parents:
diff changeset
    81
    // for i18n
90ce3da70b43 Initial load
duke
parents:
diff changeset
    82
    private static final java.util.ResourceBundle rb =
90ce3da70b43 Initial load
duke
parents:
diff changeset
    83
        java.util.ResourceBundle.getBundle
14182
3041082abb40 7194449: String resources for Key Tool and Policy Tool should be in their respective packages
sflores
parents: 12046
diff changeset
    84
        ("sun.security.tools.jarsigner.Resources");
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    85
    private static final Collator collator = Collator.getInstance();
90ce3da70b43 Initial load
duke
parents:
diff changeset
    86
    static {
90ce3da70b43 Initial load
duke
parents:
diff changeset
    87
        // this is for case insensitive string comparisions
90ce3da70b43 Initial load
duke
parents:
diff changeset
    88
        collator.setStrength(Collator.PRIMARY);
90ce3da70b43 Initial load
duke
parents:
diff changeset
    89
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
    90
90ce3da70b43 Initial load
duke
parents:
diff changeset
    91
    private static final String META_INF = "META-INF/";
90ce3da70b43 Initial load
duke
parents:
diff changeset
    92
90ce3da70b43 Initial load
duke
parents:
diff changeset
    93
    // prefix for new signature-related files in META-INF directory
90ce3da70b43 Initial load
duke
parents:
diff changeset
    94
    private static final String SIG_PREFIX = META_INF + "SIG-";
90ce3da70b43 Initial load
duke
parents:
diff changeset
    95
20754
3d7b2fafc34b 8025967: addition of -Werror broke the old build
valeriep
parents: 19189
diff changeset
    96
    private static final Class<?>[] PARAM_STRING = { String.class };
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    97
90ce3da70b43 Initial load
duke
parents:
diff changeset
    98
    private static final String NONE = "NONE";
90ce3da70b43 Initial load
duke
parents:
diff changeset
    99
    private static final String P11KEYSTORE = "PKCS11";
90ce3da70b43 Initial load
duke
parents:
diff changeset
   100
90ce3da70b43 Initial load
duke
parents:
diff changeset
   101
    private static final long SIX_MONTHS = 180*24*60*60*1000L; //milliseconds
90ce3da70b43 Initial load
duke
parents:
diff changeset
   102
90ce3da70b43 Initial load
duke
parents:
diff changeset
   103
    // Attention:
90ce3da70b43 Initial load
duke
parents:
diff changeset
   104
    // This is the entry that get launched by the security tool jarsigner.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   105
    public static void main(String args[]) throws Exception {
14182
3041082abb40 7194449: String resources for Key Tool and Policy Tool should be in their respective packages
sflores
parents: 12046
diff changeset
   106
        Main js = new Main();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   107
        js.run(args);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   108
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   109
90ce3da70b43 Initial load
duke
parents:
diff changeset
   110
    static final String VERSION = "1.0";
90ce3da70b43 Initial load
duke
parents:
diff changeset
   111
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   112
    static final int IN_KEYSTORE = 0x01;        // signer is in keystore
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   113
    static final int IN_SCOPE = 0x02;
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   114
    static final int NOT_ALIAS = 0x04;          // alias list is NOT empty and
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   115
                                                // signer is not in alias list
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   116
    static final int SIGNED_BY_ALIAS = 0x08;    // signer is in alias list
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   117
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   118
    X509Certificate[] certChain;    // signer's cert chain (when composing)
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   119
    PrivateKey privateKey;          // private key
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   120
    KeyStore store;                 // the keystore specified by -keystore
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   121
                                    // or the default keystore, never null
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   122
90ce3da70b43 Initial load
duke
parents:
diff changeset
   123
    String keystore; // key store file
90ce3da70b43 Initial load
duke
parents:
diff changeset
   124
    boolean nullStream = false; // null keystore input stream (NONE)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   125
    boolean token = false; // token-based keystore
5462
cb614e59f7f9 6890876: jarsigner can add CRL info into signed jar
weijun
parents: 5461
diff changeset
   126
    String jarfile;  // jar files to sign or verify
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   127
    String alias;    // alias to sign jar with
7977
f47f211cd627 7008713: diamond conversion of kerberos5 and security tools
smarks
parents: 7525
diff changeset
   128
    List<String> ckaliases = new ArrayList<>(); // aliases in -verify
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   129
    char[] storepass; // keystore password
90ce3da70b43 Initial load
duke
parents:
diff changeset
   130
    boolean protectedPath; // protected authentication path
90ce3da70b43 Initial load
duke
parents:
diff changeset
   131
    String storetype; // keystore type
90ce3da70b43 Initial load
duke
parents:
diff changeset
   132
    String providerName; // provider name
90ce3da70b43 Initial load
duke
parents:
diff changeset
   133
    Vector<String> providers = null; // list of providers
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   134
    // arguments for provider constructors
7977
f47f211cd627 7008713: diamond conversion of kerberos5 and security tools
smarks
parents: 7525
diff changeset
   135
    HashMap<String,String> providerArgs = new HashMap<>();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   136
    char[] keypass; // private key password
90ce3da70b43 Initial load
duke
parents:
diff changeset
   137
    String sigfile; // name of .SF file
90ce3da70b43 Initial load
duke
parents:
diff changeset
   138
    String sigalg; // name of signature algorithm
3318
dade78e63c92 6561126: keytool should use larger default keysize for keypairs
weijun
parents: 3047
diff changeset
   139
    String digestalg = "SHA-256"; // name of digest algorithm
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   140
    String signedjar; // output filename
90ce3da70b43 Initial load
duke
parents:
diff changeset
   141
    String tsaUrl; // location of the Timestamping Authority
90ce3da70b43 Initial load
duke
parents:
diff changeset
   142
    String tsaAlias; // alias for the Timestamping Authority's certificate
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   143
    String altCertChain; // file to read alternative cert chain from
17161
df1ec0e2f0e7 8009636: JARSigner including TimeStamp PolicyID (TSAPolicyID) as defined in RFC3161
weijun
parents: 16020
diff changeset
   144
    String tSAPolicyID;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   145
    boolean verify = false; // verify the jar
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   146
    String verbose = null; // verbose output when signing/verifying
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   147
    boolean showcerts = false; // show certs when verifying
90ce3da70b43 Initial load
duke
parents:
diff changeset
   148
    boolean debug = false; // debug
90ce3da70b43 Initial load
duke
parents:
diff changeset
   149
    boolean signManifest = true; // "sign" the whole manifest
90ce3da70b43 Initial load
duke
parents:
diff changeset
   150
    boolean externalSF = true; // leave the .SF out of the PKCS7 block
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   151
    boolean strict = false;  // treat warnings as error
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   152
90ce3da70b43 Initial load
duke
parents:
diff changeset
   153
    // read zip entry raw bytes
90ce3da70b43 Initial load
duke
parents:
diff changeset
   154
    private ByteArrayOutputStream baos = new ByteArrayOutputStream(2048);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   155
    private byte[] buffer = new byte[8192];
90ce3da70b43 Initial load
duke
parents:
diff changeset
   156
    private ContentSigner signingMechanism = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   157
    private String altSignerClass = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   158
    private String altSignerClasspath = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   159
    private ZipFile zipFile = null;
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   160
22315
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   161
    // Informational warnings
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   162
    private boolean hasExpiringCert = false;
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   163
    private boolean noTimestamp = false;
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   164
    private Date expireDate = new Date(0L);     // used in noTimestamp warning
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   165
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   166
    // Severe warnings
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   167
    private boolean hasExpiredCert = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   168
    private boolean notYetValidCert = false;
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   169
    private boolean chainNotValidated = false;
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   170
    private boolean notSignedByAlias = false;
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   171
    private boolean aliasNotInStore = false;
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   172
    private boolean hasUnsignedEntry = false;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   173
    private boolean badKeyUsage = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   174
    private boolean badExtendedKeyUsage = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   175
    private boolean badNetscapeCertType = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   176
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   177
    CertificateFactory certificateFactory;
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   178
    CertPathValidator validator;
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   179
    PKIXParameters pkixParameters;
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   180
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   181
    public void run(String args[]) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   182
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   183
            parseArgs(args);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   184
90ce3da70b43 Initial load
duke
parents:
diff changeset
   185
            // Try to load and install the specified providers
90ce3da70b43 Initial load
duke
parents:
diff changeset
   186
            if (providers != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   187
                ClassLoader cl = ClassLoader.getSystemClassLoader();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   188
                Enumeration<String> e = providers.elements();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   189
                while (e.hasMoreElements()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   190
                    String provName = e.nextElement();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   191
                    Class<?> provClass;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   192
                    if (cl != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   193
                        provClass = cl.loadClass(provName);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   194
                    } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   195
                        provClass = Class.forName(provName);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   196
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   197
90ce3da70b43 Initial load
duke
parents:
diff changeset
   198
                    String provArg = providerArgs.get(provName);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   199
                    Object obj;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   200
                    if (provArg == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   201
                        obj = provClass.newInstance();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   202
                    } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   203
                        Constructor<?> c =
90ce3da70b43 Initial load
duke
parents:
diff changeset
   204
                                provClass.getConstructor(PARAM_STRING);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   205
                        obj = c.newInstance(provArg);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   206
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   207
90ce3da70b43 Initial load
duke
parents:
diff changeset
   208
                    if (!(obj instanceof Provider)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   209
                        MessageFormat form = new MessageFormat(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   210
                            ("provName.not.a.provider"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   211
                        Object[] source = {provName};
90ce3da70b43 Initial load
duke
parents:
diff changeset
   212
                        throw new Exception(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   213
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   214
                    Security.addProvider((Provider)obj);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   215
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   216
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   217
90ce3da70b43 Initial load
duke
parents:
diff changeset
   218
            if (verify) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   219
                try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   220
                    loadKeyStore(keystore, false);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   221
                } catch (Exception e) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   222
                    if ((keystore != null) || (storepass != null)) {
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   223
                        System.out.println(rb.getString("jarsigner.error.") +
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   224
                                        e.getMessage());
90ce3da70b43 Initial load
duke
parents:
diff changeset
   225
                        System.exit(1);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   226
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   227
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   228
                /*              if (debug) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   229
                    SignatureFileVerifier.setDebug(true);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   230
                    ManifestEntryVerifier.setDebug(true);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   231
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   232
                */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   233
                verifyJar(jarfile);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   234
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   235
                loadKeyStore(keystore, true);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   236
                getAliasInfo(alias);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   237
90ce3da70b43 Initial load
duke
parents:
diff changeset
   238
                // load the alternative signing mechanism
90ce3da70b43 Initial load
duke
parents:
diff changeset
   239
                if (altSignerClass != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   240
                    signingMechanism = loadSigningMechanism(altSignerClass,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   241
                        altSignerClasspath);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   242
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   243
                signJar(jarfile, alias, args);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   244
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   245
        } catch (Exception e) {
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   246
            System.out.println(rb.getString("jarsigner.error.") + e);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   247
            if (debug) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   248
                e.printStackTrace();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   249
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   250
            System.exit(1);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   251
        } finally {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   252
            // zero-out private key password
90ce3da70b43 Initial load
duke
parents:
diff changeset
   253
            if (keypass != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   254
                Arrays.fill(keypass, ' ');
90ce3da70b43 Initial load
duke
parents:
diff changeset
   255
                keypass = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   256
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   257
            // zero-out keystore password
90ce3da70b43 Initial load
duke
parents:
diff changeset
   258
            if (storepass != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   259
                Arrays.fill(storepass, ' ');
90ce3da70b43 Initial load
duke
parents:
diff changeset
   260
                storepass = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   261
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   262
        }
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   263
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   264
        if (strict) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   265
            int exitCode = 0;
12046
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
   266
            if (chainNotValidated || hasExpiredCert || notYetValidCert) {
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   267
                exitCode |= 4;
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   268
            }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   269
            if (badKeyUsage || badExtendedKeyUsage || badNetscapeCertType) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   270
                exitCode |= 8;
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   271
            }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   272
            if (hasUnsignedEntry) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   273
                exitCode |= 16;
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   274
            }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   275
            if (notSignedByAlias || aliasNotInStore) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   276
                exitCode |= 32;
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   277
            }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   278
            if (exitCode != 0) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   279
                System.exit(exitCode);
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   280
            }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   281
        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   282
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   283
90ce3da70b43 Initial load
duke
parents:
diff changeset
   284
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   285
     * Parse command line arguments.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   286
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   287
    void parseArgs(String args[]) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   288
        /* parse flags */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   289
        int n = 0;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   290
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   291
        if (args.length == 0) fullusage();
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   292
        for (n=0; n < args.length; n++) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   293
90ce3da70b43 Initial load
duke
parents:
diff changeset
   294
            String flags = args[n];
3951
e821908c953e 6868579: RFE: jarsigner to support reading password from environment variable
weijun
parents: 3716
diff changeset
   295
            String modifier = null;
19189
a4b8478a2bc5 8021789: jarsigner parses alias as command line option (depending on locale)
weijun
parents: 17161
diff changeset
   296
a4b8478a2bc5 8021789: jarsigner parses alias as command line option (depending on locale)
weijun
parents: 17161
diff changeset
   297
            if (flags.startsWith("-")) {
3951
e821908c953e 6868579: RFE: jarsigner to support reading password from environment variable
weijun
parents: 3716
diff changeset
   298
                int pos = flags.indexOf(':');
e821908c953e 6868579: RFE: jarsigner to support reading password from environment variable
weijun
parents: 3716
diff changeset
   299
                if (pos > 0) {
e821908c953e 6868579: RFE: jarsigner to support reading password from environment variable
weijun
parents: 3716
diff changeset
   300
                    modifier = flags.substring(pos+1);
e821908c953e 6868579: RFE: jarsigner to support reading password from environment variable
weijun
parents: 3716
diff changeset
   301
                    flags = flags.substring(0, pos);
e821908c953e 6868579: RFE: jarsigner to support reading password from environment variable
weijun
parents: 3716
diff changeset
   302
                }
e821908c953e 6868579: RFE: jarsigner to support reading password from environment variable
weijun
parents: 3716
diff changeset
   303
            }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   304
19189
a4b8478a2bc5 8021789: jarsigner parses alias as command line option (depending on locale)
weijun
parents: 17161
diff changeset
   305
            if (!flags.startsWith("-")) {
a4b8478a2bc5 8021789: jarsigner parses alias as command line option (depending on locale)
weijun
parents: 17161
diff changeset
   306
                if (jarfile == null) {
a4b8478a2bc5 8021789: jarsigner parses alias as command line option (depending on locale)
weijun
parents: 17161
diff changeset
   307
                    jarfile = flags;
a4b8478a2bc5 8021789: jarsigner parses alias as command line option (depending on locale)
weijun
parents: 17161
diff changeset
   308
                } else {
a4b8478a2bc5 8021789: jarsigner parses alias as command line option (depending on locale)
weijun
parents: 17161
diff changeset
   309
                    alias = flags;
a4b8478a2bc5 8021789: jarsigner parses alias as command line option (depending on locale)
weijun
parents: 17161
diff changeset
   310
                    ckaliases.add(alias);
a4b8478a2bc5 8021789: jarsigner parses alias as command line option (depending on locale)
weijun
parents: 17161
diff changeset
   311
                }
a4b8478a2bc5 8021789: jarsigner parses alias as command line option (depending on locale)
weijun
parents: 17161
diff changeset
   312
            } else if (collator.compare(flags, "-keystore") == 0) {
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   313
                if (++n == args.length) usageNoArg();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   314
                keystore = args[n];
90ce3da70b43 Initial load
duke
parents:
diff changeset
   315
            } else if (collator.compare(flags, "-storepass") ==0) {
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   316
                if (++n == args.length) usageNoArg();
3951
e821908c953e 6868579: RFE: jarsigner to support reading password from environment variable
weijun
parents: 3716
diff changeset
   317
                storepass = getPass(modifier, args[n]);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   318
            } else if (collator.compare(flags, "-storetype") ==0) {
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   319
                if (++n == args.length) usageNoArg();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   320
                storetype = args[n];
90ce3da70b43 Initial load
duke
parents:
diff changeset
   321
            } else if (collator.compare(flags, "-providerName") ==0) {
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   322
                if (++n == args.length) usageNoArg();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   323
                providerName = args[n];
90ce3da70b43 Initial load
duke
parents:
diff changeset
   324
            } else if ((collator.compare(flags, "-provider") == 0) ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
   325
                        (collator.compare(flags, "-providerClass") == 0)) {
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   326
                if (++n == args.length) usageNoArg();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   327
                if (providers == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   328
                    providers = new Vector<String>(3);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   329
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   330
                providers.add(args[n]);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   331
90ce3da70b43 Initial load
duke
parents:
diff changeset
   332
                if (args.length > (n+1)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   333
                    flags = args[n+1];
90ce3da70b43 Initial load
duke
parents:
diff changeset
   334
                    if (collator.compare(flags, "-providerArg") == 0) {
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   335
                        if (args.length == (n+2)) usageNoArg();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   336
                        providerArgs.put(args[n], args[n+2]);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   337
                        n += 2;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   338
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   339
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   340
            } else if (collator.compare(flags, "-protected") ==0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   341
                protectedPath = true;
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   342
            } else if (collator.compare(flags, "-certchain") ==0) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   343
                if (++n == args.length) usageNoArg();
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   344
                altCertChain = args[n];
17161
df1ec0e2f0e7 8009636: JARSigner including TimeStamp PolicyID (TSAPolicyID) as defined in RFC3161
weijun
parents: 16020
diff changeset
   345
            } else if (collator.compare(flags, "-tsapolicyid") ==0) {
df1ec0e2f0e7 8009636: JARSigner including TimeStamp PolicyID (TSAPolicyID) as defined in RFC3161
weijun
parents: 16020
diff changeset
   346
                if (++n == args.length) usageNoArg();
df1ec0e2f0e7 8009636: JARSigner including TimeStamp PolicyID (TSAPolicyID) as defined in RFC3161
weijun
parents: 16020
diff changeset
   347
                tSAPolicyID = args[n];
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   348
            } else if (collator.compare(flags, "-debug") ==0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   349
                debug = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   350
            } else if (collator.compare(flags, "-keypass") ==0) {
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   351
                if (++n == args.length) usageNoArg();
3951
e821908c953e 6868579: RFE: jarsigner to support reading password from environment variable
weijun
parents: 3716
diff changeset
   352
                keypass = getPass(modifier, args[n]);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   353
            } else if (collator.compare(flags, "-sigfile") ==0) {
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   354
                if (++n == args.length) usageNoArg();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   355
                sigfile = args[n];
90ce3da70b43 Initial load
duke
parents:
diff changeset
   356
            } else if (collator.compare(flags, "-signedjar") ==0) {
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   357
                if (++n == args.length) usageNoArg();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   358
                signedjar = args[n];
90ce3da70b43 Initial load
duke
parents:
diff changeset
   359
            } else if (collator.compare(flags, "-tsa") ==0) {
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   360
                if (++n == args.length) usageNoArg();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   361
                tsaUrl = args[n];
90ce3da70b43 Initial load
duke
parents:
diff changeset
   362
            } else if (collator.compare(flags, "-tsacert") ==0) {
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   363
                if (++n == args.length) usageNoArg();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   364
                tsaAlias = args[n];
90ce3da70b43 Initial load
duke
parents:
diff changeset
   365
            } else if (collator.compare(flags, "-altsigner") ==0) {
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   366
                if (++n == args.length) usageNoArg();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   367
                altSignerClass = args[n];
90ce3da70b43 Initial load
duke
parents:
diff changeset
   368
            } else if (collator.compare(flags, "-altsignerpath") ==0) {
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   369
                if (++n == args.length) usageNoArg();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   370
                altSignerClasspath = args[n];
90ce3da70b43 Initial load
duke
parents:
diff changeset
   371
            } else if (collator.compare(flags, "-sectionsonly") ==0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   372
                signManifest = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   373
            } else if (collator.compare(flags, "-internalsf") ==0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   374
                externalSF = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   375
            } else if (collator.compare(flags, "-verify") ==0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   376
                verify = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   377
            } else if (collator.compare(flags, "-verbose") ==0) {
3951
e821908c953e 6868579: RFE: jarsigner to support reading password from environment variable
weijun
parents: 3716
diff changeset
   378
                verbose = (modifier != null) ? modifier : "all";
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   379
            } else if (collator.compare(flags, "-sigalg") ==0) {
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   380
                if (++n == args.length) usageNoArg();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   381
                sigalg = args[n];
90ce3da70b43 Initial load
duke
parents:
diff changeset
   382
            } else if (collator.compare(flags, "-digestalg") ==0) {
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   383
                if (++n == args.length) usageNoArg();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   384
                digestalg = args[n];
90ce3da70b43 Initial load
duke
parents:
diff changeset
   385
            } else if (collator.compare(flags, "-certs") ==0) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   386
                showcerts = true;
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   387
            } else if (collator.compare(flags, "-strict") ==0) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   388
                strict = true;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   389
            } else if (collator.compare(flags, "-h") == 0 ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
   390
                        collator.compare(flags, "-help") == 0) {
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   391
                fullusage();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   392
            } else {
19189
a4b8478a2bc5 8021789: jarsigner parses alias as command line option (depending on locale)
weijun
parents: 17161
diff changeset
   393
                System.err.println(
a4b8478a2bc5 8021789: jarsigner parses alias as command line option (depending on locale)
weijun
parents: 17161
diff changeset
   394
                        rb.getString("Illegal.option.") + flags);
a4b8478a2bc5 8021789: jarsigner parses alias as command line option (depending on locale)
weijun
parents: 17161
diff changeset
   395
                usage();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   396
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   397
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   398
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   399
        // -certs must always be specified with -verbose
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   400
        if (verbose == null) showcerts = false;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   401
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   402
        if (jarfile == null) {
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   403
            System.err.println(rb.getString("Please.specify.jarfile.name"));
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   404
            usage();
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   405
        }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   406
        if (!verify && alias == null) {
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   407
            System.err.println(rb.getString("Please.specify.alias.name"));
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   408
            usage();
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   409
        }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   410
        if (!verify && ckaliases.size() > 1) {
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   411
            System.err.println(rb.getString("Only.one.alias.can.be.specified"));
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   412
            usage();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   413
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   414
90ce3da70b43 Initial load
duke
parents:
diff changeset
   415
        if (storetype == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   416
            storetype = KeyStore.getDefaultType();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   417
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   418
        storetype = KeyStoreUtil.niceStoreTypeName(storetype);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   419
3481
6ae7a2a6c956 6866479: libzip.so caused JVM to crash when running jarsigner
weijun
parents: 3318
diff changeset
   420
        try {
6ae7a2a6c956 6866479: libzip.so caused JVM to crash when running jarsigner
weijun
parents: 3318
diff changeset
   421
            if (signedjar != null && new File(signedjar).getCanonicalPath().equals(
6ae7a2a6c956 6866479: libzip.so caused JVM to crash when running jarsigner
weijun
parents: 3318
diff changeset
   422
                    new File(jarfile).getCanonicalPath())) {
6ae7a2a6c956 6866479: libzip.so caused JVM to crash when running jarsigner
weijun
parents: 3318
diff changeset
   423
                signedjar = null;
6ae7a2a6c956 6866479: libzip.so caused JVM to crash when running jarsigner
weijun
parents: 3318
diff changeset
   424
            }
6ae7a2a6c956 6866479: libzip.so caused JVM to crash when running jarsigner
weijun
parents: 3318
diff changeset
   425
        } catch (IOException ioe) {
6ae7a2a6c956 6866479: libzip.so caused JVM to crash when running jarsigner
weijun
parents: 3318
diff changeset
   426
            // File system error?
6ae7a2a6c956 6866479: libzip.so caused JVM to crash when running jarsigner
weijun
parents: 3318
diff changeset
   427
            // Just ignore it.
6ae7a2a6c956 6866479: libzip.so caused JVM to crash when running jarsigner
weijun
parents: 3318
diff changeset
   428
        }
6ae7a2a6c956 6866479: libzip.so caused JVM to crash when running jarsigner
weijun
parents: 3318
diff changeset
   429
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   430
        if (P11KEYSTORE.equalsIgnoreCase(storetype) ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
   431
                KeyStoreUtil.isWindowsKeyStore(storetype)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   432
            token = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   433
            if (keystore == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   434
                keystore = NONE;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   435
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   436
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   437
90ce3da70b43 Initial load
duke
parents:
diff changeset
   438
        if (NONE.equals(keystore)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   439
            nullStream = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   440
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   441
90ce3da70b43 Initial load
duke
parents:
diff changeset
   442
        if (token && !nullStream) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   443
            System.err.println(MessageFormat.format(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   444
                (".keystore.must.be.NONE.if.storetype.is.{0}"), storetype));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   445
            usage();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   446
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   447
90ce3da70b43 Initial load
duke
parents:
diff changeset
   448
        if (token && keypass != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   449
            System.err.println(MessageFormat.format(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   450
                (".keypass.can.not.be.specified.if.storetype.is.{0}"), storetype));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   451
            usage();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   452
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   453
90ce3da70b43 Initial load
duke
parents:
diff changeset
   454
        if (protectedPath) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   455
            if (storepass != null || keypass != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   456
                System.err.println(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   457
                        ("If.protected.is.specified.then.storepass.and.keypass.must.not.be.specified"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   458
                usage();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   459
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   460
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   461
        if (KeyStoreUtil.isWindowsKeyStore(storetype)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   462
            if (storepass != null || keypass != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   463
                System.err.println(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   464
                        ("If.keystore.is.not.password.protected.then.storepass.and.keypass.must.not.be.specified"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   465
                usage();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   466
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   467
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   468
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   469
3951
e821908c953e 6868579: RFE: jarsigner to support reading password from environment variable
weijun
parents: 3716
diff changeset
   470
    static char[] getPass(String modifier, String arg) {
14182
3041082abb40 7194449: String resources for Key Tool and Policy Tool should be in their respective packages
sflores
parents: 12046
diff changeset
   471
        char[] output = KeyStoreUtil.getPassWithModifier(modifier, arg, rb);
3951
e821908c953e 6868579: RFE: jarsigner to support reading password from environment variable
weijun
parents: 3716
diff changeset
   472
        if (output != null) return output;
e821908c953e 6868579: RFE: jarsigner to support reading password from environment variable
weijun
parents: 3716
diff changeset
   473
        usage();
e821908c953e 6868579: RFE: jarsigner to support reading password from environment variable
weijun
parents: 3716
diff changeset
   474
        return null;    // Useless, usage() already exit
e821908c953e 6868579: RFE: jarsigner to support reading password from environment variable
weijun
parents: 3716
diff changeset
   475
    }
e821908c953e 6868579: RFE: jarsigner to support reading password from environment variable
weijun
parents: 3716
diff changeset
   476
e821908c953e 6868579: RFE: jarsigner to support reading password from environment variable
weijun
parents: 3716
diff changeset
   477
    static void usageNoArg() {
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   478
        System.out.println(rb.getString("Option.lacks.argument"));
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   479
        usage();
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   480
    }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   481
3951
e821908c953e 6868579: RFE: jarsigner to support reading password from environment variable
weijun
parents: 3716
diff changeset
   482
    static void usage() {
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   483
        System.out.println();
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   484
        System.out.println(rb.getString("Please.type.jarsigner.help.for.usage"));
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   485
        System.exit(1);
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   486
    }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   487
3951
e821908c953e 6868579: RFE: jarsigner to support reading password from environment variable
weijun
parents: 3716
diff changeset
   488
    static void fullusage() {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   489
        System.out.println(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   490
                ("Usage.jarsigner.options.jar.file.alias"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   491
        System.out.println(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   492
                (".jarsigner.verify.options.jar.file.alias."));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   493
        System.out.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   494
        System.out.println(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   495
                (".keystore.url.keystore.location"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   496
        System.out.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   497
        System.out.println(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   498
                (".storepass.password.password.for.keystore.integrity"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   499
        System.out.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   500
        System.out.println(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   501
                (".storetype.type.keystore.type"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   502
        System.out.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   503
        System.out.println(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   504
                (".keypass.password.password.for.private.key.if.different."));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   505
        System.out.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   506
        System.out.println(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   507
                (".certchain.file.name.of.alternative.certchain.file"));
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   508
        System.out.println();
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   509
        System.out.println(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   510
                (".sigfile.file.name.of.SF.DSA.file"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   511
        System.out.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   512
        System.out.println(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   513
                (".signedjar.file.name.of.signed.JAR.file"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   514
        System.out.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   515
        System.out.println(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   516
                (".digestalg.algorithm.name.of.digest.algorithm"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   517
        System.out.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   518
        System.out.println(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   519
                (".sigalg.algorithm.name.of.signature.algorithm"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   520
        System.out.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   521
        System.out.println(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   522
                (".verify.verify.a.signed.JAR.file"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   523
        System.out.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   524
        System.out.println(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   525
                (".verbose.suboptions.verbose.output.when.signing.verifying."));
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   526
        System.out.println(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   527
                (".suboptions.can.be.all.grouped.or.summary"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   528
        System.out.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   529
        System.out.println(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   530
                (".certs.display.certificates.when.verbose.and.verifying"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   531
        System.out.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   532
        System.out.println(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   533
                (".tsa.url.location.of.the.Timestamping.Authority"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   534
        System.out.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   535
        System.out.println(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   536
                (".tsacert.alias.public.key.certificate.for.Timestamping.Authority"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   537
        System.out.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   538
        System.out.println(rb.getString
17161
df1ec0e2f0e7 8009636: JARSigner including TimeStamp PolicyID (TSAPolicyID) as defined in RFC3161
weijun
parents: 16020
diff changeset
   539
                (".tsapolicyid.tsapolicyid.for.Timestamping.Authority"));
df1ec0e2f0e7 8009636: JARSigner including TimeStamp PolicyID (TSAPolicyID) as defined in RFC3161
weijun
parents: 16020
diff changeset
   540
        System.out.println();
df1ec0e2f0e7 8009636: JARSigner including TimeStamp PolicyID (TSAPolicyID) as defined in RFC3161
weijun
parents: 16020
diff changeset
   541
        System.out.println(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   542
                (".altsigner.class.class.name.of.an.alternative.signing.mechanism"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   543
        System.out.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   544
        System.out.println(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   545
                (".altsignerpath.pathlist.location.of.an.alternative.signing.mechanism"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   546
        System.out.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   547
        System.out.println(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   548
                (".internalsf.include.the.SF.file.inside.the.signature.block"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   549
        System.out.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   550
        System.out.println(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   551
                (".sectionsonly.don.t.compute.hash.of.entire.manifest"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   552
        System.out.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   553
        System.out.println(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   554
                (".protected.keystore.has.protected.authentication.path"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   555
        System.out.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   556
        System.out.println(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   557
                (".providerName.name.provider.name"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   558
        System.out.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   559
        System.out.println(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   560
                (".providerClass.class.name.of.cryptographic.service.provider.s"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   561
        System.out.println(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   562
                (".providerArg.arg.master.class.file.and.constructor.argument"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   563
        System.out.println();
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   564
        System.out.println(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   565
                (".strict.treat.warnings.as.errors"));
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   566
        System.out.println();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   567
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   568
        System.exit(0);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   569
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   570
90ce3da70b43 Initial load
duke
parents:
diff changeset
   571
    void verifyJar(String jarName)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   572
        throws Exception
90ce3da70b43 Initial load
duke
parents:
diff changeset
   573
    {
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   574
        boolean anySigned = false;  // if there exists entry inside jar signed
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   575
        JarFile jf = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   576
90ce3da70b43 Initial load
duke
parents:
diff changeset
   577
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   578
            jf = new JarFile(jarName, true);
7977
f47f211cd627 7008713: diamond conversion of kerberos5 and security tools
smarks
parents: 7525
diff changeset
   579
            Vector<JarEntry> entriesVec = new Vector<>();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   580
            byte[] buffer = new byte[8192];
90ce3da70b43 Initial load
duke
parents:
diff changeset
   581
90ce3da70b43 Initial load
duke
parents:
diff changeset
   582
            Enumeration<JarEntry> entries = jf.entries();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   583
            while (entries.hasMoreElements()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   584
                JarEntry je = entries.nextElement();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   585
                entriesVec.addElement(je);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   586
                InputStream is = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   587
                try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   588
                    is = jf.getInputStream(je);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   589
                    int n;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   590
                    while ((n = is.read(buffer, 0, buffer.length)) != -1) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   591
                        // we just read. this will throw a SecurityException
90ce3da70b43 Initial load
duke
parents:
diff changeset
   592
                        // if  a signature/digest check fails.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   593
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   594
                } finally {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   595
                    if (is != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   596
                        is.close();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   597
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   598
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   599
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   600
90ce3da70b43 Initial load
duke
parents:
diff changeset
   601
            Manifest man = jf.getManifest();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   602
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   603
            // The map to record display info, only used when -verbose provided
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   604
            //      key: signer info string
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   605
            //      value: the list of files with common key
7977
f47f211cd627 7008713: diamond conversion of kerberos5 and security tools
smarks
parents: 7525
diff changeset
   606
            Map<String,List<String>> output = new LinkedHashMap<>();
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   607
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   608
            if (man != null) {
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   609
                if (verbose != null) System.out.println();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   610
                Enumeration<JarEntry> e = entriesVec.elements();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   611
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   612
                String tab = rb.getString("6SPACE");
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   613
90ce3da70b43 Initial load
duke
parents:
diff changeset
   614
                while (e.hasMoreElements()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   615
                    JarEntry je = e.nextElement();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   616
                    String name = je.getName();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   617
                    CodeSigner[] signers = je.getCodeSigners();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   618
                    boolean isSigned = (signers != null);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   619
                    anySigned |= isSigned;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   620
                    hasUnsignedEntry |= !je.isDirectory() && !isSigned
90ce3da70b43 Initial load
duke
parents:
diff changeset
   621
                                        && !signatureRelated(name);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   622
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   623
                    int inStoreOrScope = inKeyStore(signers);
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   624
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   625
                    boolean inStore = (inStoreOrScope & IN_KEYSTORE) != 0;
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   626
                    boolean inScope = (inStoreOrScope & IN_SCOPE) != 0;
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   627
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   628
                    notSignedByAlias |= (inStoreOrScope & NOT_ALIAS) != 0;
7525
16d2b5e6517a 7004168: jarsigner -verify checks for KeyUsage codesigning ext on all certs instead of just signing cert
weijun
parents: 7524
diff changeset
   629
                    if (keystore != null) {
16d2b5e6517a 7004168: jarsigner -verify checks for KeyUsage codesigning ext on all certs instead of just signing cert
weijun
parents: 7524
diff changeset
   630
                        aliasNotInStore |= isSigned && (!inStore && !inScope);
16d2b5e6517a 7004168: jarsigner -verify checks for KeyUsage codesigning ext on all certs instead of just signing cert
weijun
parents: 7524
diff changeset
   631
                    }
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   632
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   633
                    // Only used when -verbose provided
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   634
                    StringBuffer sb = null;
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   635
                    if (verbose != null) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   636
                        sb = new StringBuffer();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   637
                        boolean inManifest =
90ce3da70b43 Initial load
duke
parents:
diff changeset
   638
                            ((man.getAttributes(name) != null) ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
   639
                             (man.getAttributes("./"+name) != null) ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
   640
                             (man.getAttributes("/"+name) != null));
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   641
                        sb.append(
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   642
                          (isSigned ? rb.getString("s") : rb.getString("SPACE")) +
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   643
                          (inManifest ? rb.getString("m") : rb.getString("SPACE")) +
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   644
                          (inStore ? rb.getString("k") : rb.getString("SPACE")) +
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   645
                          (inScope ? rb.getString("i") : rb.getString("SPACE")) +
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   646
                          ((inStoreOrScope & NOT_ALIAS) != 0 ?"X":" ") +
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   647
                          rb.getString("SPACE"));
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   648
                        sb.append("|");
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   649
                    }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   650
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   651
                    // When -certs provided, display info has extra empty
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   652
                    // lines at the beginning and end.
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   653
                    if (isSigned) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   654
                        if (showcerts) sb.append('\n');
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   655
                        for (CodeSigner signer: signers) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   656
                            // signerInfo() must be called even if -verbose
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   657
                            // not provided. The method updates various
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   658
                            // warning flags.
12046
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
   659
                            String si = signerInfo(signer, tab);
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   660
                            if (showcerts) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   661
                                sb.append(si);
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   662
                                sb.append('\n');
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   663
                            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   664
                        }
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   665
                    } else if (showcerts && !verbose.equals("all")) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   666
                        // Print no info for unsigned entries when -verbose:all,
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   667
                        // to be consistent with old behavior.
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   668
                        if (signatureRelated(name)) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   669
                            sb.append("\n" + tab + rb.getString(
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   670
                                    ".Signature.related.entries.") + "\n\n");
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   671
                        } else {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   672
                            sb.append("\n" + tab + rb.getString(
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   673
                                    ".Unsigned.entries.") + "\n\n");
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   674
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   675
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   676
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   677
                    if (verbose != null) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   678
                        String label = sb.toString();
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   679
                        if (signatureRelated(name)) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   680
                            // Entries inside META-INF and other unsigned
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   681
                            // entries are grouped separately.
7524
ec12e1e6fa20 7004035: signed jar with only META-INF/* inside is not verifiable
weijun
parents: 7179
diff changeset
   682
                            label = "-" + label;
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   683
                        }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   684
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   685
                        // The label finally contains 2 parts separated by '|':
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   686
                        // The legend displayed before the entry names, and
21278
ef8a3a2a72f2 8022746: List of spelling errors in API doc
malenkov
parents: 20754
diff changeset
   687
                        // the cert info (if -certs specified).
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   688
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   689
                        if (!output.containsKey(label)) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   690
                            output.put(label, new ArrayList<String>());
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   691
                        }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   692
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   693
                        StringBuffer fb = new StringBuffer();
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   694
                        String s = Long.toString(je.getSize());
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   695
                        for (int i = 6 - s.length(); i > 0; --i) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   696
                            fb.append(' ');
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   697
                        }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   698
                        fb.append(s).append(' ').
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   699
                                append(new Date(je.getTime()).toString());
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   700
                        fb.append(' ').append(name);
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   701
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   702
                        output.get(label).add(fb.toString());
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   703
                    }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   704
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   705
            }
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   706
            if (verbose != null) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   707
                for (Entry<String,List<String>> s: output.entrySet()) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   708
                    List<String> files = s.getValue();
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   709
                    String key = s.getKey();
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   710
                    if (key.charAt(0) == '-') { // the signature-related group
7524
ec12e1e6fa20 7004035: signed jar with only META-INF/* inside is not verifiable
weijun
parents: 7179
diff changeset
   711
                        key = key.substring(1);
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   712
                    }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   713
                    int pipe = key.indexOf('|');
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   714
                    if (verbose.equals("all")) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   715
                        for (String f: files) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   716
                            System.out.println(key.substring(0, pipe) + f);
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   717
                            System.out.printf(key.substring(pipe+1));
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   718
                        }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   719
                    } else {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   720
                        if (verbose.equals("grouped")) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   721
                            for (String f: files) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   722
                                System.out.println(key.substring(0, pipe) + f);
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   723
                            }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   724
                        } else if (verbose.equals("summary")) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   725
                            System.out.print(key.substring(0, pipe));
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   726
                            if (files.size() > 1) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   727
                                System.out.println(files.get(0) + " " +
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   728
                                        String.format(rb.getString(
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   729
                                        ".and.d.more."), files.size()-1));
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   730
                            } else {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   731
                                System.out.println(files.get(0));
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   732
                            }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   733
                        }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   734
                        System.out.printf(key.substring(pipe+1));
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   735
                    }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   736
                }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   737
                System.out.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   738
                System.out.println(rb.getString(
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   739
                    ".s.signature.was.verified."));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   740
                System.out.println(rb.getString(
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   741
                    ".m.entry.is.listed.in.manifest"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   742
                System.out.println(rb.getString(
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   743
                    ".k.at.least.one.certificate.was.found.in.keystore"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   744
                System.out.println(rb.getString(
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   745
                    ".i.at.least.one.certificate.was.found.in.identity.scope"));
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   746
                if (ckaliases.size() > 0) {
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   747
                    System.out.println(rb.getString(
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   748
                        ".X.not.signed.by.specified.alias.es."));
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   749
                }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   750
                System.out.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   751
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   752
            if (man == null)
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   753
                System.out.println(rb.getString("no.manifest."));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   754
90ce3da70b43 Initial load
duke
parents:
diff changeset
   755
            if (!anySigned) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   756
                System.out.println(rb.getString(
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   757
                      "jar.is.unsigned.signatures.missing.or.not.parsable."));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   758
            } else {
22315
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   759
                boolean warningAppeared = false;
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   760
                boolean errorAppeared = false;
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   761
                if (badKeyUsage || badExtendedKeyUsage || badNetscapeCertType ||
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   762
                        notYetValidCert || chainNotValidated || hasExpiredCert ||
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   763
                        hasUnsignedEntry ||
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   764
                        aliasNotInStore || notSignedByAlias) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   765
22315
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   766
                    if (strict) {
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   767
                        System.out.println(rb.getString("jar.verified.with.signer.errors."));
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   768
                        System.out.println();
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   769
                        System.out.println(rb.getString("Error."));
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   770
                        errorAppeared = true;
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   771
                    } else {
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   772
                        System.out.println(rb.getString("jar.verified."));
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   773
                        System.out.println();
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   774
                        System.out.println(rb.getString("Warning."));
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   775
                        warningAppeared = true;
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   776
                    }
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   777
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   778
                    if (badKeyUsage) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   779
                        System.out.println(
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   780
                            rb.getString("This.jar.contains.entries.whose.signer.certificate.s.KeyUsage.extension.doesn.t.allow.code.signing."));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   781
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   782
90ce3da70b43 Initial load
duke
parents:
diff changeset
   783
                    if (badExtendedKeyUsage) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   784
                        System.out.println(
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   785
                            rb.getString("This.jar.contains.entries.whose.signer.certificate.s.ExtendedKeyUsage.extension.doesn.t.allow.code.signing."));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   786
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   787
90ce3da70b43 Initial load
duke
parents:
diff changeset
   788
                    if (badNetscapeCertType) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   789
                        System.out.println(
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   790
                            rb.getString("This.jar.contains.entries.whose.signer.certificate.s.NetscapeCertType.extension.doesn.t.allow.code.signing."));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   791
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   792
90ce3da70b43 Initial load
duke
parents:
diff changeset
   793
                    if (hasUnsignedEntry) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   794
                        System.out.println(rb.getString(
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   795
                            "This.jar.contains.unsigned.entries.which.have.not.been.integrity.checked."));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   796
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   797
                    if (hasExpiredCert) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   798
                        System.out.println(rb.getString(
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   799
                            "This.jar.contains.entries.whose.signer.certificate.has.expired."));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   800
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   801
                    if (notYetValidCert) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   802
                        System.out.println(rb.getString(
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   803
                            "This.jar.contains.entries.whose.signer.certificate.is.not.yet.valid."));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   804
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   805
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   806
                    if (chainNotValidated) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   807
                        System.out.println(
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   808
                                rb.getString("This.jar.contains.entries.whose.certificate.chain.is.not.validated."));
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   809
                    }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   810
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   811
                    if (notSignedByAlias) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   812
                        System.out.println(
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   813
                                rb.getString("This.jar.contains.signed.entries.which.is.not.signed.by.the.specified.alias.es."));
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   814
                    }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   815
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   816
                    if (aliasNotInStore) {
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   817
                        System.out.println(rb.getString("This.jar.contains.signed.entries.that.s.not.signed.by.alias.in.this.keystore."));
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   818
                    }
22315
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   819
                } else {
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   820
                    System.out.println(rb.getString("jar.verified."));
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   821
                }
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   822
                if (hasExpiringCert || noTimestamp) {
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   823
                    if (!warningAppeared) {
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   824
                        System.out.println();
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   825
                        System.out.println(rb.getString("Warning."));
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   826
                        warningAppeared = true;
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   827
                    }
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   828
                    if (hasExpiringCert) {
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   829
                        System.out.println(rb.getString(
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   830
                                "This.jar.contains.entries.whose.signer.certificate.will.expire.within.six.months."));
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   831
                    }
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   832
                    if (noTimestamp) {
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   833
                        System.out.println(
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   834
                                String.format(rb.getString("no.timestamp.verifying"), expireDate));
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   835
                    }
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   836
                }
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   837
                if (warningAppeared || errorAppeared) {
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   838
                    if (! (verbose != null && showcerts)) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   839
                        System.out.println();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   840
                        System.out.println(rb.getString(
22315
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   841
                                "Re.run.with.the.verbose.and.certs.options.for.more.details."));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   842
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   843
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   844
            }
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   845
            return;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   846
        } catch (Exception e) {
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   847
            System.out.println(rb.getString("jarsigner.") + e);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   848
            if (debug) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   849
                e.printStackTrace();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   850
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   851
        } finally { // close the resource
90ce3da70b43 Initial load
duke
parents:
diff changeset
   852
            if (jf != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   853
                jf.close();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   854
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   855
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   856
90ce3da70b43 Initial load
duke
parents:
diff changeset
   857
        System.exit(1);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   858
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   859
90ce3da70b43 Initial load
duke
parents:
diff changeset
   860
    private static MessageFormat validityTimeForm = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   861
    private static MessageFormat notYetTimeForm = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   862
    private static MessageFormat expiredTimeForm = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   863
    private static MessageFormat expiringTimeForm = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   864
90ce3da70b43 Initial load
duke
parents:
diff changeset
   865
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
   866
     * Display some details about a certificate:
90ce3da70b43 Initial load
duke
parents:
diff changeset
   867
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   868
     * [<tab>] <cert-type> [", " <subject-DN>] [" (" <keystore-entry-alias> ")"]
90ce3da70b43 Initial load
duke
parents:
diff changeset
   869
     * [<validity-period> | <expiry-warning>]
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   870
     *
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   871
     * Note: no newline character at the end
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   872
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
   873
    String printCert(String tab, Certificate c, boolean checkValidityPeriod,
12046
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
   874
        Date timestamp, boolean checkUsage) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   875
90ce3da70b43 Initial load
duke
parents:
diff changeset
   876
        StringBuilder certStr = new StringBuilder();
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   877
        String space = rb.getString("SPACE");
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   878
        X509Certificate x509Cert = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   879
90ce3da70b43 Initial load
duke
parents:
diff changeset
   880
        if (c instanceof X509Certificate) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   881
            x509Cert = (X509Certificate) c;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   882
            certStr.append(tab).append(x509Cert.getType())
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   883
                .append(rb.getString("COMMA"))
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   884
                .append(x509Cert.getSubjectDN().getName());
90ce3da70b43 Initial load
duke
parents:
diff changeset
   885
        } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   886
            certStr.append(tab).append(c.getType());
90ce3da70b43 Initial load
duke
parents:
diff changeset
   887
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   888
90ce3da70b43 Initial load
duke
parents:
diff changeset
   889
        String alias = storeHash.get(c);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   890
        if (alias != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   891
            certStr.append(space).append(alias);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   892
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   893
90ce3da70b43 Initial load
duke
parents:
diff changeset
   894
        if (checkValidityPeriod && x509Cert != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   895
90ce3da70b43 Initial load
duke
parents:
diff changeset
   896
            certStr.append("\n").append(tab).append("[");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   897
            Date notAfter = x509Cert.getNotAfter();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   898
            try {
12046
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
   899
                boolean printValidity = true;
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
   900
                if (timestamp == null) {
22315
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   901
                    if (expireDate.getTime() == 0 || expireDate.after(notAfter)) {
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   902
                        expireDate = notAfter;
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
   903
                    }
12046
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
   904
                    x509Cert.checkValidity();
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
   905
                    // test if cert will expire within six months
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
   906
                    if (notAfter.getTime() < System.currentTimeMillis() + SIX_MONTHS) {
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
   907
                        hasExpiringCert = true;
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
   908
                        if (expiringTimeForm == null) {
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
   909
                            expiringTimeForm = new MessageFormat(
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
   910
                                rb.getString("certificate.will.expire.on"));
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
   911
                        }
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
   912
                        Object[] source = { notAfter };
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
   913
                        certStr.append(expiringTimeForm.format(source));
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
   914
                        printValidity = false;
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
   915
                    }
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
   916
                } else {
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
   917
                    x509Cert.checkValidity(timestamp);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   918
                }
12046
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
   919
                if (printValidity) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   920
                    if (validityTimeForm == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   921
                        validityTimeForm = new MessageFormat(
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   922
                            rb.getString("certificate.is.valid.from"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   923
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   924
                    Object[] source = { x509Cert.getNotBefore(), notAfter };
90ce3da70b43 Initial load
duke
parents:
diff changeset
   925
                    certStr.append(validityTimeForm.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   926
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   927
            } catch (CertificateExpiredException cee) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   928
                hasExpiredCert = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   929
90ce3da70b43 Initial load
duke
parents:
diff changeset
   930
                if (expiredTimeForm == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   931
                    expiredTimeForm = new MessageFormat(
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   932
                        rb.getString("certificate.expired.on"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   933
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   934
                Object[] source = { notAfter };
90ce3da70b43 Initial load
duke
parents:
diff changeset
   935
                certStr.append(expiredTimeForm.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   936
90ce3da70b43 Initial load
duke
parents:
diff changeset
   937
            } catch (CertificateNotYetValidException cnyve) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   938
                notYetValidCert = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   939
90ce3da70b43 Initial load
duke
parents:
diff changeset
   940
                if (notYetTimeForm == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   941
                    notYetTimeForm = new MessageFormat(
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   942
                        rb.getString("certificate.is.not.valid.until"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   943
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   944
                Object[] source = { x509Cert.getNotBefore() };
90ce3da70b43 Initial load
duke
parents:
diff changeset
   945
                certStr.append(notYetTimeForm.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
   946
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   947
            certStr.append("]");
90ce3da70b43 Initial load
duke
parents:
diff changeset
   948
7525
16d2b5e6517a 7004168: jarsigner -verify checks for KeyUsage codesigning ext on all certs instead of just signing cert
weijun
parents: 7524
diff changeset
   949
            if (checkUsage) {
16d2b5e6517a 7004168: jarsigner -verify checks for KeyUsage codesigning ext on all certs instead of just signing cert
weijun
parents: 7524
diff changeset
   950
                boolean[] bad = new boolean[3];
16d2b5e6517a 7004168: jarsigner -verify checks for KeyUsage codesigning ext on all certs instead of just signing cert
weijun
parents: 7524
diff changeset
   951
                checkCertUsage(x509Cert, bad);
16d2b5e6517a 7004168: jarsigner -verify checks for KeyUsage codesigning ext on all certs instead of just signing cert
weijun
parents: 7524
diff changeset
   952
                if (bad[0] || bad[1] || bad[2]) {
16d2b5e6517a 7004168: jarsigner -verify checks for KeyUsage codesigning ext on all certs instead of just signing cert
weijun
parents: 7524
diff changeset
   953
                    String x = "";
16d2b5e6517a 7004168: jarsigner -verify checks for KeyUsage codesigning ext on all certs instead of just signing cert
weijun
parents: 7524
diff changeset
   954
                    if (bad[0]) {
16d2b5e6517a 7004168: jarsigner -verify checks for KeyUsage codesigning ext on all certs instead of just signing cert
weijun
parents: 7524
diff changeset
   955
                        x ="KeyUsage";
16d2b5e6517a 7004168: jarsigner -verify checks for KeyUsage codesigning ext on all certs instead of just signing cert
weijun
parents: 7524
diff changeset
   956
                    }
16d2b5e6517a 7004168: jarsigner -verify checks for KeyUsage codesigning ext on all certs instead of just signing cert
weijun
parents: 7524
diff changeset
   957
                    if (bad[1]) {
16d2b5e6517a 7004168: jarsigner -verify checks for KeyUsage codesigning ext on all certs instead of just signing cert
weijun
parents: 7524
diff changeset
   958
                        if (x.length() > 0) x = x + ", ";
16d2b5e6517a 7004168: jarsigner -verify checks for KeyUsage codesigning ext on all certs instead of just signing cert
weijun
parents: 7524
diff changeset
   959
                        x = x + "ExtendedKeyUsage";
16d2b5e6517a 7004168: jarsigner -verify checks for KeyUsage codesigning ext on all certs instead of just signing cert
weijun
parents: 7524
diff changeset
   960
                    }
16d2b5e6517a 7004168: jarsigner -verify checks for KeyUsage codesigning ext on all certs instead of just signing cert
weijun
parents: 7524
diff changeset
   961
                    if (bad[2]) {
16d2b5e6517a 7004168: jarsigner -verify checks for KeyUsage codesigning ext on all certs instead of just signing cert
weijun
parents: 7524
diff changeset
   962
                        if (x.length() > 0) x = x + ", ";
16d2b5e6517a 7004168: jarsigner -verify checks for KeyUsage codesigning ext on all certs instead of just signing cert
weijun
parents: 7524
diff changeset
   963
                        x = x + "NetscapeCertType";
16d2b5e6517a 7004168: jarsigner -verify checks for KeyUsage codesigning ext on all certs instead of just signing cert
weijun
parents: 7524
diff changeset
   964
                    }
16d2b5e6517a 7004168: jarsigner -verify checks for KeyUsage codesigning ext on all certs instead of just signing cert
weijun
parents: 7524
diff changeset
   965
                    certStr.append("\n").append(tab)
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   966
                        .append(MessageFormat.format(rb.getString(
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   967
                        ".{0}.extension.does.not.support.code.signing."), x));
7525
16d2b5e6517a 7004168: jarsigner -verify checks for KeyUsage codesigning ext on all certs instead of just signing cert
weijun
parents: 7524
diff changeset
   968
                }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   969
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   970
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   971
        return certStr.toString();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   972
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   973
90ce3da70b43 Initial load
duke
parents:
diff changeset
   974
    private static MessageFormat signTimeForm = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   975
90ce3da70b43 Initial load
duke
parents:
diff changeset
   976
    private String printTimestamp(String tab, Timestamp timestamp) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   977
90ce3da70b43 Initial load
duke
parents:
diff changeset
   978
        if (signTimeForm == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   979
            signTimeForm =
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
   980
                new MessageFormat(rb.getString("entry.was.signed.on"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   981
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   982
        Object[] source = { timestamp.getTimestamp() };
90ce3da70b43 Initial load
duke
parents:
diff changeset
   983
90ce3da70b43 Initial load
duke
parents:
diff changeset
   984
        return new StringBuilder().append(tab).append("[")
90ce3da70b43 Initial load
duke
parents:
diff changeset
   985
            .append(signTimeForm.format(source)).append("]").toString();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   986
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   987
7977
f47f211cd627 7008713: diamond conversion of kerberos5 and security tools
smarks
parents: 7525
diff changeset
   988
    private Map<CodeSigner,Integer> cacheForInKS = new IdentityHashMap<>();
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   989
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   990
    private int inKeyStoreForOneSigner(CodeSigner signer) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   991
        if (cacheForInKS.containsKey(signer)) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   992
            return cacheForInKS.get(signer);
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   993
        }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   994
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   995
        boolean found = false;
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   996
        int result = 0;
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   997
        List<? extends Certificate> certs = signer.getSignerCertPath().getCertificates();
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   998
        for (Certificate c : certs) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
   999
            String alias = storeHash.get(c);
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1000
            if (alias != null) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1001
                if (alias.startsWith("(")) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1002
                    result |= IN_KEYSTORE;
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1003
                } else if (alias.startsWith("[")) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1004
                    result |= IN_SCOPE;
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1005
                }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1006
                if (ckaliases.contains(alias.substring(1, alias.length() - 1))) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1007
                    result |= SIGNED_BY_ALIAS;
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1008
                }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1009
            } else {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1010
                if (store != null) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1011
                    try {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1012
                        alias = store.getCertificateAlias(c);
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1013
                    } catch (KeyStoreException kse) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1014
                        // never happens, because keystore has been loaded
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1015
                    }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1016
                    if (alias != null) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1017
                        storeHash.put(c, "(" + alias + ")");
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1018
                        found = true;
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1019
                        result |= IN_KEYSTORE;
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1020
                    }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1021
                }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1022
                if (ckaliases.contains(alias)) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1023
                    result |= SIGNED_BY_ALIAS;
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1024
                }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1025
            }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1026
        }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1027
        cacheForInKS.put(signer, result);
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1028
        return result;
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1029
    }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1030
7977
f47f211cd627 7008713: diamond conversion of kerberos5 and security tools
smarks
parents: 7525
diff changeset
  1031
    Hashtable<Certificate, String> storeHash = new Hashtable<>();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1032
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1033
    int inKeyStore(CodeSigner[] signers) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1034
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1035
        if (signers == null)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1036
            return 0;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1037
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1038
        int output = 0;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1039
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1040
        for (CodeSigner signer: signers) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1041
            int result = inKeyStoreForOneSigner(signer);
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1042
            output |= result;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1043
        }
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1044
        if (ckaliases.size() > 0 && (output & SIGNED_BY_ALIAS) == 0) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1045
            output |= NOT_ALIAS;
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1046
        }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1047
        return output;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1048
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1049
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1050
    void signJar(String jarName, String alias, String[] args)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1051
        throws Exception {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1052
        boolean aliasUsed = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1053
        X509Certificate tsaCert = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1054
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1055
        if (sigfile == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1056
            sigfile = alias;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1057
            aliasUsed = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1058
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1059
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1060
        if (sigfile.length() > 8) {
4152
bc36a9f01ac6 6870812: enhance security tools to use ECC algorithms
weijun
parents: 3951
diff changeset
  1061
            sigfile = sigfile.substring(0, 8).toUpperCase(Locale.ENGLISH);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1062
        } else {
4152
bc36a9f01ac6 6870812: enhance security tools to use ECC algorithms
weijun
parents: 3951
diff changeset
  1063
            sigfile = sigfile.toUpperCase(Locale.ENGLISH);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1064
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1065
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1066
        StringBuilder tmpSigFile = new StringBuilder(sigfile.length());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1067
        for (int j = 0; j < sigfile.length(); j++) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1068
            char c = sigfile.charAt(j);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1069
            if (!
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1070
                ((c>= 'A' && c<= 'Z') ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1071
                (c>= '0' && c<= '9') ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1072
                (c == '-') ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1073
                (c == '_'))) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1074
                if (aliasUsed) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1075
                    // convert illegal characters from the alias to be _'s
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1076
                    c = '_';
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1077
                } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1078
                 throw new
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1079
                   RuntimeException(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1080
                        ("signature.filename.must.consist.of.the.following.characters.A.Z.0.9.or."));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1081
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1082
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1083
            tmpSigFile.append(c);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1084
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1085
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1086
        sigfile = tmpSigFile.toString();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1087
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1088
        String tmpJarName;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1089
        if (signedjar == null) tmpJarName = jarName+".sig";
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1090
        else tmpJarName = signedjar;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1091
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1092
        File jarFile = new File(jarName);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1093
        File signedJarFile = new File(tmpJarName);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1094
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1095
        // Open the jar (zip) file
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1096
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1097
            zipFile = new ZipFile(jarName);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1098
        } catch (IOException ioe) {
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1099
            error(rb.getString("unable.to.open.jar.file.")+jarName, ioe);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1100
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1101
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1102
        FileOutputStream fos = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1103
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1104
            fos = new FileOutputStream(signedJarFile);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1105
        } catch (IOException ioe) {
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1106
            error(rb.getString("unable.to.create.")+tmpJarName, ioe);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1107
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1108
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1109
        PrintStream ps = new PrintStream(fos);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1110
        ZipOutputStream zos = new ZipOutputStream(ps);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1111
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1112
        /* First guess at what they might be - we don't xclude RSA ones. */
4152
bc36a9f01ac6 6870812: enhance security tools to use ECC algorithms
weijun
parents: 3951
diff changeset
  1113
        String sfFilename = (META_INF + sigfile + ".SF").toUpperCase(Locale.ENGLISH);
bc36a9f01ac6 6870812: enhance security tools to use ECC algorithms
weijun
parents: 3951
diff changeset
  1114
        String bkFilename = (META_INF + sigfile + ".DSA").toUpperCase(Locale.ENGLISH);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1115
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1116
        Manifest manifest = new Manifest();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1117
        Map<String,Attributes> mfEntries = manifest.getEntries();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1118
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1119
        // The Attributes of manifest before updating
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1120
        Attributes oldAttr = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1121
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1122
        boolean mfModified = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1123
        boolean mfCreated = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1124
        byte[] mfRawBytes = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1125
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1126
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1127
            MessageDigest digests[] = { MessageDigest.getInstance(digestalg) };
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1128
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1129
            // Check if manifest exists
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1130
            ZipEntry mfFile;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1131
            if ((mfFile = getManifestFile(zipFile)) != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1132
                // Manifest exists. Read its raw bytes.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1133
                mfRawBytes = getBytes(zipFile, mfFile);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1134
                manifest.read(new ByteArrayInputStream(mfRawBytes));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1135
                oldAttr = (Attributes)(manifest.getMainAttributes().clone());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1136
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1137
                // Create new manifest
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1138
                Attributes mattr = manifest.getMainAttributes();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1139
                mattr.putValue(Attributes.Name.MANIFEST_VERSION.toString(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1140
                               "1.0");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1141
                String javaVendor = System.getProperty("java.vendor");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1142
                String jdkVersion = System.getProperty("java.version");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1143
                mattr.putValue("Created-By", jdkVersion + " (" +javaVendor
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1144
                               + ")");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1145
                mfFile = new ZipEntry(JarFile.MANIFEST_NAME);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1146
                mfCreated = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1147
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1148
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1149
            /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1150
             * For each entry in jar
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1151
             * (except for signature-related META-INF entries),
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1152
             * do the following:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1153
             *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1154
             * - if entry is not contained in manifest, add it to manifest;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1155
             * - if entry is contained in manifest, calculate its hash and
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1156
             *   compare it with the one in the manifest; if they are
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1157
             *   different, replace the hash in the manifest with the newly
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1158
             *   generated one. (This may invalidate existing signatures!)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1159
             */
7977
f47f211cd627 7008713: diamond conversion of kerberos5 and security tools
smarks
parents: 7525
diff changeset
  1160
            Vector<ZipEntry> mfFiles = new Vector<>();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1161
5461
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1162
            boolean wasSigned = false;
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1163
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1164
            for (Enumeration<? extends ZipEntry> enum_=zipFile.entries();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1165
                        enum_.hasMoreElements();) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1166
                ZipEntry ze = enum_.nextElement();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1167
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1168
                if (ze.getName().startsWith(META_INF)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1169
                    // Store META-INF files in vector, so they can be written
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1170
                    // out first
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1171
                    mfFiles.addElement(ze);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1172
5461
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1173
                    if (SignatureFileVerifier.isBlockOrSF(
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1174
                            ze.getName().toUpperCase(Locale.ENGLISH))) {
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1175
                        wasSigned = true;
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1176
                    }
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1177
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1178
                    if (signatureRelated(ze.getName())) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1179
                        // ignore signature-related and manifest files
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1180
                        continue;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1181
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1182
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1183
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1184
                if (manifest.getAttributes(ze.getName()) != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1185
                    // jar entry is contained in manifest, check and
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1186
                    // possibly update its digest attributes
16020
b57c48f16179 8006182: cleanup to use java.util.Base64 in java security component, providers, and regression tests
msheppar
parents: 14421
diff changeset
  1187
                    if (updateDigests(ze, zipFile, digests,
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1188
                                      manifest) == true) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1189
                        mfModified = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1190
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1191
                } else if (!ze.isDirectory()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1192
                    // Add entry to manifest
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1193
                    Attributes attrs = getDigestAttributes(ze, zipFile,
16020
b57c48f16179 8006182: cleanup to use java.util.Base64 in java security component, providers, and regression tests
msheppar
parents: 14421
diff changeset
  1194
                                                           digests);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1195
                    mfEntries.put(ze.getName(), attrs);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1196
                    mfModified = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1197
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1198
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1199
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1200
            // Recalculate the manifest raw bytes if necessary
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1201
            if (mfModified) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1202
                ByteArrayOutputStream baos = new ByteArrayOutputStream();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1203
                manifest.write(baos);
5461
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1204
                if (wasSigned) {
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1205
                    byte[] newBytes = baos.toByteArray();
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1206
                    if (mfRawBytes != null
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1207
                            && oldAttr.equals(manifest.getMainAttributes())) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1208
5461
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1209
                        /*
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1210
                         * Note:
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1211
                         *
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1212
                         * The Attributes object is based on HashMap and can handle
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1213
                         * continuation columns. Therefore, even if the contents are
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1214
                         * not changed (in a Map view), the bytes that it write()
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1215
                         * may be different from the original bytes that it read()
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1216
                         * from. Since the signature on the main attributes is based
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1217
                         * on raw bytes, we must retain the exact bytes.
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1218
                         */
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1219
5461
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1220
                        int newPos = findHeaderEnd(newBytes);
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1221
                        int oldPos = findHeaderEnd(mfRawBytes);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1222
5461
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1223
                        if (newPos == oldPos) {
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1224
                            System.arraycopy(mfRawBytes, 0, newBytes, 0, oldPos);
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1225
                        } else {
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1226
                            // cat oldHead newTail > newBytes
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1227
                            byte[] lastBytes = new byte[oldPos +
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1228
                                    newBytes.length - newPos];
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1229
                            System.arraycopy(mfRawBytes, 0, lastBytes, 0, oldPos);
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1230
                            System.arraycopy(newBytes, newPos, lastBytes, oldPos,
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1231
                                    newBytes.length - newPos);
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1232
                            newBytes = lastBytes;
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1233
                        }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1234
                    }
5461
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1235
                    mfRawBytes = newBytes;
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1236
                } else {
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1237
                    mfRawBytes = baos.toByteArray();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1238
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1239
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1240
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1241
            // Write out the manifest
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1242
            if (mfModified) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1243
                // manifest file has new length
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1244
                mfFile = new ZipEntry(JarFile.MANIFEST_NAME);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1245
            }
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1246
            if (verbose != null) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1247
                if (mfCreated) {
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1248
                    System.out.println(rb.getString(".adding.") +
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1249
                                        mfFile.getName());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1250
                } else if (mfModified) {
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1251
                    System.out.println(rb.getString(".updating.") +
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1252
                                        mfFile.getName());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1253
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1254
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1255
            zos.putNextEntry(mfFile);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1256
            zos.write(mfRawBytes);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1257
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1258
            // Calculate SignatureFile (".SF") and SignatureBlockFile
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1259
            ManifestDigester manDig = new ManifestDigester(mfRawBytes);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1260
            SignatureFile sf = new SignatureFile(digests, manifest, manDig,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1261
                                                 sigfile, signManifest);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1262
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1263
            if (tsaAlias != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1264
                tsaCert = getTsaCert(tsaAlias);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1265
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1266
22315
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
  1267
            if (tsaUrl == null && tsaCert == null) {
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
  1268
                noTimestamp = true;
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
  1269
            }
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
  1270
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1271
            SignatureFile.Block block = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1272
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1273
            try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1274
                block =
8556
d3d6e4643560 7021789: Remove jarsigner -crl option
weijun
parents: 7977
diff changeset
  1275
                    sf.generateBlock(privateKey, sigalg, certChain,
17161
df1ec0e2f0e7 8009636: JARSigner including TimeStamp PolicyID (TSAPolicyID) as defined in RFC3161
weijun
parents: 16020
diff changeset
  1276
                        externalSF, tsaUrl, tsaCert, tSAPolicyID, signingMechanism, args,
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1277
                        zipFile);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1278
            } catch (SocketTimeoutException e) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1279
                // Provide a helpful message when TSA is beyond a firewall
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1280
                error(rb.getString("unable.to.sign.jar.") +
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1281
                rb.getString("no.response.from.the.Timestamping.Authority.") +
8994
ef946d820d04 7028490: better suggestion for jarsigner when TSA is not accessible
weijun
parents: 8556
diff changeset
  1282
                "\n  -J-Dhttp.proxyHost=<hostname>" +
ef946d820d04 7028490: better suggestion for jarsigner when TSA is not accessible
weijun
parents: 8556
diff changeset
  1283
                "\n  -J-Dhttp.proxyPort=<portnumber>\n" +
ef946d820d04 7028490: better suggestion for jarsigner when TSA is not accessible
weijun
parents: 8556
diff changeset
  1284
                rb.getString("or") +
ef946d820d04 7028490: better suggestion for jarsigner when TSA is not accessible
weijun
parents: 8556
diff changeset
  1285
                "\n  -J-Dhttps.proxyHost=<hostname> " +
ef946d820d04 7028490: better suggestion for jarsigner when TSA is not accessible
weijun
parents: 8556
diff changeset
  1286
                "\n  -J-Dhttps.proxyPort=<portnumber> ", e);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1287
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1288
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1289
            sfFilename = sf.getMetaName();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1290
            bkFilename = block.getMetaName();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1291
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1292
            ZipEntry sfFile = new ZipEntry(sfFilename);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1293
            ZipEntry bkFile = new ZipEntry(bkFilename);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1294
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1295
            long time = System.currentTimeMillis();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1296
            sfFile.setTime(time);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1297
            bkFile.setTime(time);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1298
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1299
            // signature file
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1300
            zos.putNextEntry(sfFile);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1301
            sf.write(zos);
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1302
            if (verbose != null) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1303
                if (zipFile.getEntry(sfFilename) != null) {
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1304
                    System.out.println(rb.getString(".updating.") +
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1305
                                sfFilename);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1306
                } else {
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1307
                    System.out.println(rb.getString(".adding.") +
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1308
                                sfFilename);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1309
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1310
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1311
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1312
            if (verbose != null) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1313
                if (tsaUrl != null || tsaCert != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1314
                    System.out.println(
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1315
                        rb.getString("requesting.a.signature.timestamp"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1316
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1317
                if (tsaUrl != null) {
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1318
                    System.out.println(rb.getString("TSA.location.") + tsaUrl);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1319
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1320
                if (tsaCert != null) {
10788
680a3dbfcaba 7102686: Restructure timestamp code so that jars and modules can more easily share the same code
mullan
parents: 10427
diff changeset
  1321
                    URI tsaURI = TimestampedSigner.getTimestampingURI(tsaCert);
680a3dbfcaba 7102686: Restructure timestamp code so that jars and modules can more easily share the same code
mullan
parents: 10427
diff changeset
  1322
                    if (tsaURI != null) {
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1323
                        System.out.println(rb.getString("TSA.location.") +
10788
680a3dbfcaba 7102686: Restructure timestamp code so that jars and modules can more easily share the same code
mullan
parents: 10427
diff changeset
  1324
                            tsaURI);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1325
                    }
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1326
                    System.out.println(rb.getString("TSA.certificate.") +
12046
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
  1327
                        printCert("", tsaCert, false, null, false));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1328
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1329
                if (signingMechanism != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1330
                    System.out.println(
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1331
                        rb.getString("using.an.alternative.signing.mechanism"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1332
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1333
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1334
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1335
            // signature block file
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1336
            zos.putNextEntry(bkFile);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1337
            block.write(zos);
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1338
            if (verbose != null) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1339
                if (zipFile.getEntry(bkFilename) != null) {
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1340
                    System.out.println(rb.getString(".updating.") +
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1341
                        bkFilename);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1342
                } else {
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1343
                    System.out.println(rb.getString(".adding.") +
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1344
                        bkFilename);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1345
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1346
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1347
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1348
            // Write out all other META-INF files that we stored in the
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1349
            // vector
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1350
            for (int i=0; i<mfFiles.size(); i++) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1351
                ZipEntry ze = mfFiles.elementAt(i);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1352
                if (!ze.getName().equalsIgnoreCase(JarFile.MANIFEST_NAME)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1353
                    && !ze.getName().equalsIgnoreCase(sfFilename)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1354
                    && !ze.getName().equalsIgnoreCase(bkFilename)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1355
                    writeEntry(zipFile, zos, ze);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1356
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1357
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1358
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1359
            // Write out all other files
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1360
            for (Enumeration<? extends ZipEntry> enum_=zipFile.entries();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1361
                        enum_.hasMoreElements();) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1362
                ZipEntry ze = enum_.nextElement();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1363
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1364
                if (!ze.getName().startsWith(META_INF)) {
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1365
                    if (verbose != null) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1366
                        if (manifest.getAttributes(ze.getName()) != null)
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1367
                          System.out.println(rb.getString(".signing.") +
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1368
                                ze.getName());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1369
                        else
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1370
                          System.out.println(rb.getString(".adding.") +
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1371
                                ze.getName());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1372
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1373
                    writeEntry(zipFile, zos, ze);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1374
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1375
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1376
        } catch(IOException ioe) {
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1377
            error(rb.getString("unable.to.sign.jar.")+ioe, ioe);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1378
        } finally {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1379
            // close the resouces
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1380
            if (zipFile != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1381
                zipFile.close();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1382
                zipFile = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1383
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1384
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1385
            if (zos != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1386
                zos.close();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1387
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1388
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1389
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1390
        // no IOException thrown in the follow try clause, so disable
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1391
        // the try clause.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1392
        // try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1393
            if (signedjar == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1394
                // attempt an atomic rename. If that fails,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1395
                // rename the original jar file, then the signed
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1396
                // one, then delete the original.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1397
                if (!signedJarFile.renameTo(jarFile)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1398
                    File origJar = new File(jarName+".orig");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1399
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1400
                    if (jarFile.renameTo(origJar)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1401
                        if (signedJarFile.renameTo(jarFile)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1402
                            origJar.delete();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1403
                        } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1404
                            MessageFormat form = new MessageFormat(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1405
                        ("attempt.to.rename.signedJarFile.to.jarFile.failed"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1406
                            Object[] source = {signedJarFile, jarFile};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1407
                            error(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1408
                        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1409
                    } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1410
                        MessageFormat form = new MessageFormat(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1411
                            ("attempt.to.rename.jarFile.to.origJar.failed"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1412
                        Object[] source = {jarFile, origJar};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1413
                        error(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1414
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1415
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1416
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1417
22315
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
  1418
            boolean warningAppeared = false;
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
  1419
            if (badKeyUsage || badExtendedKeyUsage || badNetscapeCertType ||
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
  1420
                    notYetValidCert || chainNotValidated || hasExpiredCert) {
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
  1421
                if (strict) {
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
  1422
                    System.out.println(rb.getString("jar.signed.with.signer.errors."));
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
  1423
                    System.out.println();
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
  1424
                    System.out.println(rb.getString("Error."));
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
  1425
                } else {
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
  1426
                    System.out.println(rb.getString("jar.signed."));
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
  1427
                    System.out.println();
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
  1428
                    System.out.println(rb.getString("Warning."));
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
  1429
                    warningAppeared = true;
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
  1430
                }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1431
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1432
                if (badKeyUsage) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1433
                    System.out.println(
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1434
                        rb.getString("The.signer.certificate.s.KeyUsage.extension.doesn.t.allow.code.signing."));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1435
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1436
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1437
                if (badExtendedKeyUsage) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1438
                    System.out.println(
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1439
                        rb.getString("The.signer.certificate.s.ExtendedKeyUsage.extension.doesn.t.allow.code.signing."));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1440
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1441
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1442
                if (badNetscapeCertType) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1443
                    System.out.println(
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1444
                        rb.getString("The.signer.certificate.s.NetscapeCertType.extension.doesn.t.allow.code.signing."));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1445
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1446
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1447
                if (hasExpiredCert) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1448
                    System.out.println(
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1449
                        rb.getString("The.signer.certificate.has.expired."));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1450
                } else if (notYetValidCert) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1451
                    System.out.println(
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1452
                        rb.getString("The.signer.certificate.is.not.yet.valid."));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1453
                }
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1454
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1455
                if (chainNotValidated) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1456
                    System.out.println(
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1457
                            rb.getString("The.signer.s.certificate.chain.is.not.validated."));
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1458
                }
22315
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
  1459
            } else {
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
  1460
                System.out.println(rb.getString("jar.signed."));
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
  1461
            }
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
  1462
            if (hasExpiringCert || noTimestamp) {
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
  1463
                if (!warningAppeared) {
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
  1464
                    System.out.println();
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
  1465
                    System.out.println(rb.getString("Warning."));
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
  1466
                }
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
  1467
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
  1468
                if (hasExpiringCert) {
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
  1469
                    System.out.println(
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
  1470
                            rb.getString("The.signer.certificate.will.expire.within.six.months."));
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
  1471
                }
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
  1472
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
  1473
                if (noTimestamp) {
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
  1474
                    System.out.println(
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
  1475
                            String.format(rb.getString("no.timestamp.signing"), expireDate));
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
  1476
                }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1477
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1478
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1479
        // no IOException thrown in the above try clause, so disable
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1480
        // the catch clause.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1481
        // } catch(IOException ioe) {
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1482
        //     error(rb.getString("unable.to.sign.jar.")+ioe, ioe);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1483
        // }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1484
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1485
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1486
    /**
5461
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1487
     * Find the length of header inside bs. The header is a multiple (>=0)
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1488
     * lines of attributes plus an empty line. The empty line is included
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1489
     * in the header.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1490
     */
10336
0bb1999251f8 7064075: Security libraries don't build with javac -Xlint:all,-deprecation -Werror
jjg
parents: 9011
diff changeset
  1491
    @SuppressWarnings("fallthrough")
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1492
    private int findHeaderEnd(byte[] bs) {
5461
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1493
        // Initial state true to deal with empty header
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1494
        boolean newline = true;     // just met a newline
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1495
        int len = bs.length;
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1496
        for (int i=0; i<len; i++) {
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1497
            switch (bs[i]) {
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1498
                case '\r':
5614
9b34aca7cd0c 6954621: small error in 6948909
weijun
parents: 5462
diff changeset
  1499
                    if (i < len - 1 && bs[i+1] == '\n') i++;
5461
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1500
                    // fallthrough
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1501
                case '\n':
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1502
                    if (newline) return i+1;    //+1 to get length
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1503
                    newline = true;
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1504
                    break;
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1505
                default:
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1506
                    newline = false;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1507
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1508
        }
5461
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1509
        // If header end is not found, it means the MANIFEST.MF has only
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1510
        // the main attributes section and it does not end with 2 newlines.
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1511
        // Returns the whole length so that it can be completely replaced.
a0e3063bc133 6948909: Jarsigner removes MANIFEST.MF info for badly packages jar's
weijun
parents: 4350
diff changeset
  1512
        return len;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1513
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1514
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1515
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1516
     * signature-related files include:
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1517
     * . META-INF/MANIFEST.MF
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1518
     * . META-INF/SIG-*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1519
     * . META-INF/*.SF
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1520
     * . META-INF/*.DSA
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1521
     * . META-INF/*.RSA
4152
bc36a9f01ac6 6870812: enhance security tools to use ECC algorithms
weijun
parents: 3951
diff changeset
  1522
     * . META-INF/*.EC
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1523
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1524
    private boolean signatureRelated(String name) {
4152
bc36a9f01ac6 6870812: enhance security tools to use ECC algorithms
weijun
parents: 3951
diff changeset
  1525
        String ucName = name.toUpperCase(Locale.ENGLISH);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1526
        if (ucName.equals(JarFile.MANIFEST_NAME) ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1527
            ucName.equals(META_INF) ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1528
            (ucName.startsWith(SIG_PREFIX) &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1529
                ucName.indexOf("/") == ucName.lastIndexOf("/"))) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1530
            return true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1531
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1532
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1533
        if (ucName.startsWith(META_INF) &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1534
            SignatureFileVerifier.isBlockOrSF(ucName)) {
4152
bc36a9f01ac6 6870812: enhance security tools to use ECC algorithms
weijun
parents: 3951
diff changeset
  1535
            // .SF/.DSA/.RSA/.EC files in META-INF subdirs
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1536
            // are not considered signature-related
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1537
            return (ucName.indexOf("/") == ucName.lastIndexOf("/"));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1538
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1539
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1540
        return false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1541
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1542
7977
f47f211cd627 7008713: diamond conversion of kerberos5 and security tools
smarks
parents: 7525
diff changeset
  1543
    Map<CodeSigner,String> cacheForSignerInfo = new IdentityHashMap<>();
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1544
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1545
    /**
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1546
     * Returns a string of singer info, with a newline at the end
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1547
     */
12046
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
  1548
    private String signerInfo(CodeSigner signer, String tab) {
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1549
        if (cacheForSignerInfo.containsKey(signer)) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1550
            return cacheForSignerInfo.get(signer);
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1551
        }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1552
        StringBuffer s = new StringBuffer();
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1553
        List<? extends Certificate> certs = signer.getSignerCertPath().getCertificates();
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1554
        // display the signature timestamp, if present
12046
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
  1555
        Date timestamp;
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
  1556
        Timestamp ts = signer.getTimestamp();
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
  1557
        if (ts != null) {
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
  1558
            s.append(printTimestamp(tab, ts));
4169
0ca7e3e74ba4 6890872: keytool -printcert to recognize signed jar files
weijun
parents: 4152
diff changeset
  1559
            s.append('\n');
12046
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
  1560
            timestamp = ts.getTimestamp();
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
  1561
        } else {
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
  1562
            timestamp = null;
22315
529f1cc322fc 8024302: Clarify jar verifications
weijun
parents: 19189
diff changeset
  1563
            noTimestamp = true;
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1564
        }
12046
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
  1565
        // display the certificate(s). The first one is end-entity cert and
7525
16d2b5e6517a 7004168: jarsigner -verify checks for KeyUsage codesigning ext on all certs instead of just signing cert
weijun
parents: 7524
diff changeset
  1566
        // its KeyUsage should be checked.
16d2b5e6517a 7004168: jarsigner -verify checks for KeyUsage codesigning ext on all certs instead of just signing cert
weijun
parents: 7524
diff changeset
  1567
        boolean first = true;
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1568
        for (Certificate c : certs) {
12046
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
  1569
            s.append(printCert(tab, c, true, timestamp, first));
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1570
            s.append('\n');
7525
16d2b5e6517a 7004168: jarsigner -verify checks for KeyUsage codesigning ext on all certs instead of just signing cert
weijun
parents: 7524
diff changeset
  1571
            first = false;
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1572
        }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1573
        try {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1574
            CertPath cp = certificateFactory.generateCertPath(certs);
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1575
            validator.validate(cp, pkixParameters);
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1576
        } catch (Exception e) {
10427
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1577
            if (debug) {
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1578
                e.printStackTrace();
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1579
            }
12046
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
  1580
            if (e.getCause() != null &&
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
  1581
                    (e.getCause() instanceof CertificateExpiredException ||
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
  1582
                     e.getCause() instanceof CertificateNotYetValidException)) {
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
  1583
                // No more warning, we alreay have hasExpiredCert or notYetValidCert
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
  1584
            } else {
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
  1585
                chainNotValidated = true;
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
  1586
                s.append(tab + rb.getString(".CertPath.not.validated.") +
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
  1587
                        e.getLocalizedMessage() + "]\n");   // TODO
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
  1588
            }
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1589
        }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1590
        String result = s.toString();
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1591
        cacheForSignerInfo.put(signer, result);
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1592
        return result;
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1593
    }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1594
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1595
    private void writeEntry(ZipFile zf, ZipOutputStream os, ZipEntry ze)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1596
    throws IOException
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1597
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1598
        ZipEntry ze2 = new ZipEntry(ze.getName());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1599
        ze2.setMethod(ze.getMethod());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1600
        ze2.setTime(ze.getTime());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1601
        ze2.setComment(ze.getComment());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1602
        ze2.setExtra(ze.getExtra());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1603
        if (ze.getMethod() == ZipEntry.STORED) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1604
            ze2.setSize(ze.getSize());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1605
            ze2.setCrc(ze.getCrc());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1606
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1607
        os.putNextEntry(ze2);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1608
        writeBytes(zf, ze, os);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1609
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1610
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1611
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1612
     * Writes all the bytes for a given entry to the specified output stream.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1613
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1614
    private synchronized void writeBytes
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1615
        (ZipFile zf, ZipEntry ze, ZipOutputStream os) throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1616
        int n;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1617
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1618
        InputStream is = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1619
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1620
            is = zf.getInputStream(ze);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1621
            long left = ze.getSize();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1622
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1623
            while((left > 0) && (n = is.read(buffer, 0, buffer.length)) != -1) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1624
                os.write(buffer, 0, n);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1625
                left -= n;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1626
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1627
        } finally {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1628
            if (is != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1629
                is.close();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1630
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1631
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1632
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1633
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1634
    void loadKeyStore(String keyStoreName, boolean prompt) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1635
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1636
        if (!nullStream && keyStoreName == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1637
            keyStoreName = System.getProperty("user.home") + File.separator
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1638
                + ".keystore";
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1639
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1640
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1641
        try {
10427
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1642
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1643
            certificateFactory = CertificateFactory.getInstance("X.509");
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1644
            validator = CertPathValidator.getInstance("PKIX");
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1645
            Set<TrustAnchor> tas = new HashSet<>();
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1646
            try {
14182
3041082abb40 7194449: String resources for Key Tool and Policy Tool should be in their respective packages
sflores
parents: 12046
diff changeset
  1647
                KeyStore caks = KeyStoreUtil.getCacertsKeyStore();
10427
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1648
                if (caks != null) {
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1649
                    Enumeration<String> aliases = caks.aliases();
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1650
                    while (aliases.hasMoreElements()) {
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1651
                        String a = aliases.nextElement();
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1652
                        try {
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1653
                            tas.add(new TrustAnchor((X509Certificate)caks.getCertificate(a), null));
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1654
                        } catch (Exception e2) {
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1655
                            // ignore, when a SecretkeyEntry does not include a cert
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1656
                        }
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1657
                    }
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1658
                }
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1659
            } catch (Exception e) {
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1660
                // Ignore, if cacerts cannot be loaded
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1661
            }
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1662
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1663
            if (providerName == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1664
                store = KeyStore.getInstance(storetype);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1665
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1666
                store = KeyStore.getInstance(storetype, providerName);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1667
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1668
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1669
            // Get pass phrase
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1670
            // XXX need to disable echo; on UNIX, call getpass(char *prompt)Z
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1671
            // and on NT call ??
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1672
            if (token && storepass == null && !protectedPath
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1673
                    && !KeyStoreUtil.isWindowsKeyStore(storetype)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1674
                storepass = getPass
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1675
                        (rb.getString("Enter.Passphrase.for.keystore."));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1676
            } else if (!token && storepass == null && prompt) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1677
                storepass = getPass
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1678
                        (rb.getString("Enter.Passphrase.for.keystore."));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1679
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1680
10427
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1681
            try {
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1682
                if (nullStream) {
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1683
                    store.load(null, storepass);
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1684
                } else {
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1685
                    keyStoreName = keyStoreName.replace(File.separatorChar, '/');
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1686
                    URL url = null;
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1687
                    try {
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1688
                        url = new URL(keyStoreName);
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1689
                    } catch (java.net.MalformedURLException e) {
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1690
                        // try as file
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1691
                        url = new File(keyStoreName).toURI().toURL();
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1692
                    }
10427
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1693
                    InputStream is = null;
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1694
                    try {
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1695
                        is = url.openStream();
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1696
                        store.load(is, storepass);
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1697
                    } finally {
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1698
                        if (is != null) {
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1699
                            is.close();
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1700
                        }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1701
                    }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1702
                }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1703
                Enumeration<String> aliases = store.aliases();
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1704
                while (aliases.hasMoreElements()) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1705
                    String a = aliases.nextElement();
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1706
                    try {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1707
                        X509Certificate c = (X509Certificate)store.getCertificate(a);
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1708
                        // Only add TrustedCertificateEntry and self-signed
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1709
                        // PrivateKeyEntry
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1710
                        if (store.isCertificateEntry(a) ||
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1711
                                c.getSubjectDN().equals(c.getIssuerDN())) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1712
                            tas.add(new TrustAnchor(c, null));
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1713
                        }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1714
                    } catch (Exception e2) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1715
                        // ignore, when a SecretkeyEntry does not include a cert
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1716
                    }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1717
                }
10427
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1718
            } finally {
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1719
                try {
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1720
                    pkixParameters = new PKIXParameters(tas);
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1721
                    pkixParameters.setRevocationEnabled(false);
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1722
                } catch (InvalidAlgorithmParameterException ex) {
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1723
                    // Only if tas is empty
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1724
                }
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1725
            }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1726
        } catch (IOException ioe) {
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1727
            throw new RuntimeException(rb.getString("keystore.load.") +
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1728
                                        ioe.getMessage());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1729
        } catch (java.security.cert.CertificateException ce) {
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1730
            throw new RuntimeException(rb.getString("certificate.exception.") +
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1731
                                        ce.getMessage());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1732
        } catch (NoSuchProviderException pe) {
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1733
            throw new RuntimeException(rb.getString("keystore.load.") +
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1734
                                        pe.getMessage());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1735
        } catch (NoSuchAlgorithmException nsae) {
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1736
            throw new RuntimeException(rb.getString("keystore.load.") +
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1737
                                        nsae.getMessage());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1738
        } catch (KeyStoreException kse) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1739
            throw new RuntimeException
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1740
                (rb.getString("unable.to.instantiate.keystore.class.") +
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1741
                kse.getMessage());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1742
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1743
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1744
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1745
    X509Certificate getTsaCert(String alias) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1746
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1747
        java.security.cert.Certificate cs = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1748
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1749
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1750
            cs = store.getCertificate(alias);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1751
        } catch (KeyStoreException kse) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1752
            // this never happens, because keystore has been loaded
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1753
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1754
        if (cs == null || (!(cs instanceof X509Certificate))) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1755
            MessageFormat form = new MessageFormat(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1756
                ("Certificate.not.found.for.alias.alias.must.reference.a.valid.KeyStore.entry.containing.an.X.509.public.key.certificate.for.the"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1757
            Object[] source = {alias, alias};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1758
            error(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1759
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1760
        return (X509Certificate) cs;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1761
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1762
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1763
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1764
     * Check if userCert is designed to be a code signer
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1765
     * @param userCert the certificate to be examined
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1766
     * @param bad 3 booleans to show if the KeyUsage, ExtendedKeyUsage,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1767
     *            NetscapeCertType has codeSigning flag turned on.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1768
     *            If null, the class field badKeyUsage, badExtendedKeyUsage,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1769
     *            badNetscapeCertType will be set.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1770
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1771
    void checkCertUsage(X509Certificate userCert, boolean[] bad) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1772
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1773
        // Can act as a signer?
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1774
        // 1. if KeyUsage, then [0:digitalSignature] or
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1775
        //    [1:nonRepudiation] should be true
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1776
        // 2. if ExtendedKeyUsage, then should contains ANY or CODE_SIGNING
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1777
        // 3. if NetscapeCertType, then should contains OBJECT_SIGNING
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1778
        // 1,2,3 must be true
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1779
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1780
        if (bad != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1781
            bad[0] = bad[1] = bad[2] = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1782
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1783
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1784
        boolean[] keyUsage = userCert.getKeyUsage();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1785
        if (keyUsage != null) {
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1786
            keyUsage = Arrays.copyOf(keyUsage, 9);
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1787
            if (!keyUsage[0] && !keyUsage[1]) {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1788
                if (bad != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1789
                    bad[0] = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1790
                    badKeyUsage = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1791
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1792
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1793
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1794
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1795
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1796
            List<String> xKeyUsage = userCert.getExtendedKeyUsage();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1797
            if (xKeyUsage != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1798
                if (!xKeyUsage.contains("2.5.29.37.0") // anyExtendedKeyUsage
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1799
                        && !xKeyUsage.contains("1.3.6.1.5.5.7.3.3")) {  // codeSigning
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1800
                    if (bad != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1801
                        bad[1] = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1802
                        badExtendedKeyUsage = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1803
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1804
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1805
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1806
        } catch (java.security.cert.CertificateParsingException e) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1807
            // shouldn't happen
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1808
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1809
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1810
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1811
            // OID_NETSCAPE_CERT_TYPE
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1812
            byte[] netscapeEx = userCert.getExtensionValue
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1813
                    ("2.16.840.1.113730.1.1");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1814
            if (netscapeEx != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1815
                DerInputStream in = new DerInputStream(netscapeEx);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1816
                byte[] encoded = in.getOctetString();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1817
                encoded = new DerValue(encoded).getUnalignedBitString()
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1818
                        .toByteArray();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1819
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1820
                NetscapeCertTypeExtension extn =
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1821
                        new NetscapeCertTypeExtension(encoded);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1822
10336
0bb1999251f8 7064075: Security libraries don't build with javac -Xlint:all,-deprecation -Werror
jjg
parents: 9011
diff changeset
  1823
                Boolean val = extn.get(NetscapeCertTypeExtension.OBJECT_SIGNING);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1824
                if (!val) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1825
                    if (bad != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1826
                        bad[2] = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1827
                        badNetscapeCertType = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1828
                    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1829
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1830
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1831
        } catch (IOException e) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1832
            //
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1833
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1834
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1835
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1836
    void getAliasInfo(String alias) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1837
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1838
        Key key = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1839
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1840
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1841
            java.security.cert.Certificate[] cs = null;
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1842
            if (altCertChain != null) {
21642
5efc900f8ecd 8027991: InputStream should be closed in sun.security.tools.jarsigner.Main
weijun
parents: 21278
diff changeset
  1843
                try (FileInputStream fis = new FileInputStream(altCertChain)) {
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1844
                    cs = CertificateFactory.getInstance("X.509").
21642
5efc900f8ecd 8027991: InputStream should be closed in sun.security.tools.jarsigner.Main
weijun
parents: 21278
diff changeset
  1845
                            generateCertificates(fis).
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1846
                            toArray(new Certificate[0]);
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1847
                } catch (FileNotFoundException ex) {
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1848
                    error(rb.getString("File.specified.by.certchain.does.not.exist"));
21642
5efc900f8ecd 8027991: InputStream should be closed in sun.security.tools.jarsigner.Main
weijun
parents: 21278
diff changeset
  1849
                } catch (CertificateException | IOException ex) {
5efc900f8ecd 8027991: InputStream should be closed in sun.security.tools.jarsigner.Main
weijun
parents: 21278
diff changeset
  1850
                    error(rb.getString("Cannot.restore.certchain.from.file.specified"));
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1851
                }
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1852
            } else {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1853
                try {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1854
                    cs = store.getCertificateChain(alias);
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1855
                } catch (KeyStoreException kse) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1856
                    // this never happens, because keystore has been loaded
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1857
                }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1858
            }
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1859
            if (cs == null || cs.length == 0) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1860
                if (altCertChain != null) {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1861
                    error(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1862
                            ("Certificate.chain.not.found.in.the.file.specified."));
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1863
                } else {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1864
                    MessageFormat form = new MessageFormat(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1865
                        ("Certificate.chain.not.found.for.alias.alias.must.reference.a.valid.KeyStore.key.entry.containing.a.private.key.and"));
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1866
                    Object[] source = {alias, alias};
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1867
                    error(form.format(source));
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1868
                }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1869
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1870
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1871
            certChain = new X509Certificate[cs.length];
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1872
            for (int i=0; i<cs.length; i++) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1873
                if (!(cs[i] instanceof X509Certificate)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1874
                    error(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1875
                        ("found.non.X.509.certificate.in.signer.s.chain"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1876
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1877
                certChain[i] = (X509Certificate)cs[i];
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1878
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1879
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1880
            // We don't meant to print anything, the next call
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1881
            // checks validity and keyUsage etc
12046
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
  1882
            printCert("", certChain[0], true, null, true);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1883
2432
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1884
            try {
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1885
                CertPath cp = certificateFactory.generateCertPath(Arrays.asList(certChain));
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1886
                validator.validate(cp, pkixParameters);
dc17f417ef85 6802846: jarsigner needs enhanced cert validation(options)
weijun
parents: 2
diff changeset
  1887
            } catch (Exception e) {
10427
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1888
                if (debug) {
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1889
                    e.printStackTrace();
c255e1803e4d 7081783: jarsigner error when no $HOME/.keystore
weijun
parents: 10336
diff changeset
  1890
                }
12046
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
  1891
                if (e.getCause() != null &&
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
  1892
                        (e.getCause() instanceof CertificateExpiredException ||
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
  1893
                        e.getCause() instanceof CertificateNotYetValidException)) {
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
  1894
                    // No more warning, we alreay have hasExpiredCert or notYetValidCert
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
  1895
                } else {
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
  1896
                    chainNotValidated = true;
378aa3362868 7149012: jarsigner needs not warn about cert expiration if the jar has a TSA timestamp
weijun
parents: 10788
diff changeset
  1897
                }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1898
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1899
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1900
            try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1901
                if (!token && keypass == null)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1902
                    key = store.getKey(alias, storepass);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1903
                else
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1904
                    key = store.getKey(alias, keypass);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1905
            } catch (UnrecoverableKeyException e) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1906
                if (token) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1907
                    throw e;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1908
                } else if (keypass == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1909
                    // Did not work out, so prompt user for key password
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1910
                    MessageFormat form = new MessageFormat(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1911
                        ("Enter.key.password.for.alias."));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1912
                    Object[] source = {alias};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1913
                    keypass = getPass(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1914
                    key = store.getKey(alias, keypass);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1915
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1916
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1917
        } catch (NoSuchAlgorithmException e) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1918
            error(e.getMessage());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1919
        } catch (UnrecoverableKeyException e) {
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1920
            error(rb.getString("unable.to.recover.key.from.keystore"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1921
        } catch (KeyStoreException kse) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1922
            // this never happens, because keystore has been loaded
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1923
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1924
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1925
        if (!(key instanceof PrivateKey)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1926
            MessageFormat form = new MessageFormat(rb.getString
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1927
                ("key.associated.with.alias.not.a.private.key"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1928
            Object[] source = {alias};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1929
            error(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1930
        } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1931
            privateKey = (PrivateKey)key;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1932
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1933
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1934
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1935
    void error(String message)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1936
    {
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1937
        System.out.println(rb.getString("jarsigner.")+message);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1938
        System.exit(1);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1939
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1940
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1941
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1942
    void error(String message, Exception e)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1943
    {
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1944
        System.out.println(rb.getString("jarsigner.")+message);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1945
        if (debug) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1946
            e.printStackTrace();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1947
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1948
        System.exit(1);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1949
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1950
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1951
    char[] getPass(String prompt)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1952
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1953
        System.err.print(prompt);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1954
        System.err.flush();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1955
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1956
            char[] pass = Password.readPassword(System.in);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1957
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1958
            if (pass == null) {
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1959
                error(rb.getString("you.must.enter.key.password"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1960
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1961
                return pass;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1962
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1963
        } catch (IOException ioe) {
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  1964
            error(rb.getString("unable.to.read.password.")+ioe.getMessage());
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1965
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1966
        // this shouldn't happen
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1967
        return null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1968
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1969
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1970
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1971
     * Reads all the bytes for a given zip entry.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1972
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1973
    private synchronized byte[] getBytes(ZipFile zf,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1974
                                         ZipEntry ze) throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1975
        int n;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1976
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1977
        InputStream is = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1978
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1979
            is = zf.getInputStream(ze);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1980
            baos.reset();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1981
            long left = ze.getSize();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1982
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1983
            while((left > 0) && (n = is.read(buffer, 0, buffer.length)) != -1) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1984
                baos.write(buffer, 0, n);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1985
                left -= n;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1986
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1987
        } finally {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1988
            if (is != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1989
                is.close();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1990
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1991
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1992
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1993
        return baos.toByteArray();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1994
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1995
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1996
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1997
     * Returns manifest entry from given jar file, or null if given jar file
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1998
     * does not have a manifest entry.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  1999
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2000
    private ZipEntry getManifestFile(ZipFile zf) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2001
        ZipEntry ze = zf.getEntry(JarFile.MANIFEST_NAME);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2002
        if (ze == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2003
            // Check all entries for matching name
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2004
            Enumeration<? extends ZipEntry> enum_ = zf.entries();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2005
            while (enum_.hasMoreElements() && ze == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2006
                ze = enum_.nextElement();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2007
                if (!JarFile.MANIFEST_NAME.equalsIgnoreCase
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2008
                    (ze.getName())) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2009
                    ze = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2010
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2011
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2012
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2013
        return ze;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2014
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2015
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2016
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2017
     * Computes the digests of a zip entry, and returns them as an array
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2018
     * of base64-encoded strings.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2019
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2020
    private synchronized String[] getDigests(ZipEntry ze, ZipFile zf,
16020
b57c48f16179 8006182: cleanup to use java.util.Base64 in java security component, providers, and regression tests
msheppar
parents: 14421
diff changeset
  2021
                                             MessageDigest[] digests)
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2022
        throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2023
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2024
        int n, i;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2025
        InputStream is = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2026
        try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2027
            is = zf.getInputStream(ze);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2028
            long left = ze.getSize();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2029
            while((left > 0)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2030
                && (n = is.read(buffer, 0, buffer.length)) != -1) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2031
                for (i=0; i<digests.length; i++) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2032
                    digests[i].update(buffer, 0, n);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2033
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2034
                left -= n;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2035
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2036
        } finally {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2037
            if (is != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2038
                is.close();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2039
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2040
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2041
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2042
        // complete the digests
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2043
        String[] base64Digests = new String[digests.length];
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2044
        for (i=0; i<digests.length; i++) {
16020
b57c48f16179 8006182: cleanup to use java.util.Base64 in java security component, providers, and regression tests
msheppar
parents: 14421
diff changeset
  2045
            base64Digests[i] = Base64.getEncoder().encodeToString(digests[i].digest());
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2046
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2047
        return base64Digests;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2048
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2049
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2050
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2051
     * Computes the digests of a zip entry, and returns them as a list of
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2052
     * attributes
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2053
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2054
    private Attributes getDigestAttributes(ZipEntry ze, ZipFile zf,
16020
b57c48f16179 8006182: cleanup to use java.util.Base64 in java security component, providers, and regression tests
msheppar
parents: 14421
diff changeset
  2055
                                           MessageDigest[] digests)
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2056
        throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2057
16020
b57c48f16179 8006182: cleanup to use java.util.Base64 in java security component, providers, and regression tests
msheppar
parents: 14421
diff changeset
  2058
        String[] base64Digests = getDigests(ze, zf, digests);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2059
        Attributes attrs = new Attributes();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2060
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2061
        for (int i=0; i<digests.length; i++) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2062
            attrs.putValue(digests[i].getAlgorithm()+"-Digest",
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2063
                           base64Digests[i]);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2064
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2065
        return attrs;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2066
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2067
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2068
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2069
     * Updates the digest attributes of a manifest entry, by adding or
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2070
     * replacing digest values.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2071
     * A digest value is added if the manifest entry does not contain a digest
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2072
     * for that particular algorithm.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2073
     * A digest value is replaced if it is obsolete.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2074
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2075
     * Returns true if the manifest entry has been changed, and false
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2076
     * otherwise.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2077
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2078
    private boolean updateDigests(ZipEntry ze, ZipFile zf,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2079
                                  MessageDigest[] digests,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2080
                                  Manifest mf) throws IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2081
        boolean update = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2082
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2083
        Attributes attrs = mf.getAttributes(ze.getName());
16020
b57c48f16179 8006182: cleanup to use java.util.Base64 in java security component, providers, and regression tests
msheppar
parents: 14421
diff changeset
  2084
        String[] base64Digests = getDigests(ze, zf, digests);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2085
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2086
        for (int i=0; i<digests.length; i++) {
3716
aa66143f7ad1 6876328: different names for the same digest algorithms breaks jarsigner
weijun
parents: 3481
diff changeset
  2087
            // The entry name to be written into attrs
aa66143f7ad1 6876328: different names for the same digest algorithms breaks jarsigner
weijun
parents: 3481
diff changeset
  2088
            String name = null;
aa66143f7ad1 6876328: different names for the same digest algorithms breaks jarsigner
weijun
parents: 3481
diff changeset
  2089
            try {
aa66143f7ad1 6876328: different names for the same digest algorithms breaks jarsigner
weijun
parents: 3481
diff changeset
  2090
                // Find if the digest already exists
aa66143f7ad1 6876328: different names for the same digest algorithms breaks jarsigner
weijun
parents: 3481
diff changeset
  2091
                AlgorithmId aid = AlgorithmId.get(digests[i].getAlgorithm());
aa66143f7ad1 6876328: different names for the same digest algorithms breaks jarsigner
weijun
parents: 3481
diff changeset
  2092
                for (Object key: attrs.keySet()) {
aa66143f7ad1 6876328: different names for the same digest algorithms breaks jarsigner
weijun
parents: 3481
diff changeset
  2093
                    if (key instanceof Attributes.Name) {
aa66143f7ad1 6876328: different names for the same digest algorithms breaks jarsigner
weijun
parents: 3481
diff changeset
  2094
                        String n = ((Attributes.Name)key).toString();
aa66143f7ad1 6876328: different names for the same digest algorithms breaks jarsigner
weijun
parents: 3481
diff changeset
  2095
                        if (n.toUpperCase(Locale.ENGLISH).endsWith("-DIGEST")) {
aa66143f7ad1 6876328: different names for the same digest algorithms breaks jarsigner
weijun
parents: 3481
diff changeset
  2096
                            String tmp = n.substring(0, n.length() - 7);
aa66143f7ad1 6876328: different names for the same digest algorithms breaks jarsigner
weijun
parents: 3481
diff changeset
  2097
                            if (AlgorithmId.get(tmp).equals(aid)) {
aa66143f7ad1 6876328: different names for the same digest algorithms breaks jarsigner
weijun
parents: 3481
diff changeset
  2098
                                name = n;
aa66143f7ad1 6876328: different names for the same digest algorithms breaks jarsigner
weijun
parents: 3481
diff changeset
  2099
                                break;
aa66143f7ad1 6876328: different names for the same digest algorithms breaks jarsigner
weijun
parents: 3481
diff changeset
  2100
                            }
aa66143f7ad1 6876328: different names for the same digest algorithms breaks jarsigner
weijun
parents: 3481
diff changeset
  2101
                        }
aa66143f7ad1 6876328: different names for the same digest algorithms breaks jarsigner
weijun
parents: 3481
diff changeset
  2102
                    }
aa66143f7ad1 6876328: different names for the same digest algorithms breaks jarsigner
weijun
parents: 3481
diff changeset
  2103
                }
aa66143f7ad1 6876328: different names for the same digest algorithms breaks jarsigner
weijun
parents: 3481
diff changeset
  2104
            } catch (NoSuchAlgorithmException nsae) {
aa66143f7ad1 6876328: different names for the same digest algorithms breaks jarsigner
weijun
parents: 3481
diff changeset
  2105
                // Ignored. Writing new digest entry.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2106
            }
3716
aa66143f7ad1 6876328: different names for the same digest algorithms breaks jarsigner
weijun
parents: 3481
diff changeset
  2107
aa66143f7ad1 6876328: different names for the same digest algorithms breaks jarsigner
weijun
parents: 3481
diff changeset
  2108
            if (name == null) {
aa66143f7ad1 6876328: different names for the same digest algorithms breaks jarsigner
weijun
parents: 3481
diff changeset
  2109
                name = digests[i].getAlgorithm()+"-Digest";
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2110
                attrs.putValue(name, base64Digests[i]);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2111
                update=true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2112
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2113
                // compare digests, and replace the one in the manifest
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2114
                // if they are different
3716
aa66143f7ad1 6876328: different names for the same digest algorithms breaks jarsigner
weijun
parents: 3481
diff changeset
  2115
                String mfDigest = attrs.getValue(name);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2116
                if (!mfDigest.equalsIgnoreCase(base64Digests[i])) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2117
                    attrs.putValue(name, base64Digests[i]);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2118
                    update=true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2119
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2120
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2121
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2122
        return update;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2123
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2124
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2125
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2126
     * Try to load the specified signing mechanism.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2127
     * The URL class loader is used.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2128
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2129
    private ContentSigner loadSigningMechanism(String signerClassName,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2130
        String signerClassPath) throws Exception {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2131
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2132
        // construct class loader
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2133
        String cpString = null;   // make sure env.class.path defaults to dot
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2134
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2135
        // do prepends to get correct ordering
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2136
        cpString = PathList.appendPath(System.getProperty("env.class.path"), cpString);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2137
        cpString = PathList.appendPath(System.getProperty("java.class.path"), cpString);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2138
        cpString = PathList.appendPath(signerClassPath, cpString);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2139
        URL[] urls = PathList.pathToURLs(cpString);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2140
        ClassLoader appClassLoader = new URLClassLoader(urls);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2141
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2142
        // attempt to find signer
10336
0bb1999251f8 7064075: Security libraries don't build with javac -Xlint:all,-deprecation -Werror
jjg
parents: 9011
diff changeset
  2143
        Class<?> signerClass = appClassLoader.loadClass(signerClassName);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2144
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2145
        // Check that it implements ContentSigner
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2146
        Object signer = signerClass.newInstance();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2147
        if (!(signer instanceof ContentSigner)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2148
            MessageFormat form = new MessageFormat(
7179
4afb81e50183 6987827: security/util/Resources.java needs improvement
weijun
parents: 5627
diff changeset
  2149
                rb.getString("signerClass.is.not.a.signing.mechanism"));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2150
            Object[] source = {signerClass.getName()};
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2151
            throw new IllegalArgumentException(form.format(source));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2152
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2153
        return (ContentSigner)signer;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2154
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2155
}
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2156
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2157
class SignatureFile {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2158
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2159
    /** SignatureFile */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2160
    Manifest sf;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2161
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2162
    /** .SF base name */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2163
    String baseName;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2164
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2165
    public SignatureFile(MessageDigest digests[],
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2166
                         Manifest mf,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2167
                         ManifestDigester md,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2168
                         String baseName,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2169
                         boolean signManifest)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2170
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2171
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2172
        this.baseName = baseName;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2173
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2174
        String version = System.getProperty("java.version");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2175
        String javaVendor = System.getProperty("java.vendor");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2176
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2177
        sf = new Manifest();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2178
        Attributes mattr = sf.getMainAttributes();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2179
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2180
        mattr.putValue(Attributes.Name.SIGNATURE_VERSION.toString(), "1.0");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2181
        mattr.putValue("Created-By", version + " (" + javaVendor + ")");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2182
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2183
        if (signManifest) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2184
            // sign the whole manifest
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2185
            for (int i=0; i < digests.length; i++) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2186
                mattr.putValue(digests[i].getAlgorithm()+"-Digest-Manifest",
16020
b57c48f16179 8006182: cleanup to use java.util.Base64 in java security component, providers, and regression tests
msheppar
parents: 14421
diff changeset
  2187
                               Base64.getEncoder().encodeToString(md.manifestDigest(digests[i])));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2188
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2189
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2190
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2191
        // create digest of the manifest main attributes
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2192
        ManifestDigester.Entry mde =
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2193
                md.get(ManifestDigester.MF_MAIN_ATTRS, false);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2194
        if (mde != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2195
            for (int i=0; i < digests.length; i++) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2196
                mattr.putValue(digests[i].getAlgorithm() +
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2197
                        "-Digest-" + ManifestDigester.MF_MAIN_ATTRS,
16020
b57c48f16179 8006182: cleanup to use java.util.Base64 in java security component, providers, and regression tests
msheppar
parents: 14421
diff changeset
  2198
                        Base64.getEncoder().encodeToString(mde.digest(digests[i])));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2199
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2200
        } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2201
            throw new IllegalStateException
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2202
                ("ManifestDigester failed to create " +
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2203
                "Manifest-Main-Attribute entry");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2204
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2205
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2206
        /* go through the manifest entries and create the digests */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2207
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2208
        Map<String,Attributes> entries = sf.getEntries();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2209
        Iterator<Map.Entry<String,Attributes>> mit =
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2210
                                mf.getEntries().entrySet().iterator();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2211
        while(mit.hasNext()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2212
            Map.Entry<String,Attributes> e = mit.next();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2213
            String name = e.getKey();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2214
            mde = md.get(name, false);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2215
            if (mde != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2216
                Attributes attr = new Attributes();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2217
                for (int i=0; i < digests.length; i++) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2218
                    attr.putValue(digests[i].getAlgorithm()+"-Digest",
16020
b57c48f16179 8006182: cleanup to use java.util.Base64 in java security component, providers, and regression tests
msheppar
parents: 14421
diff changeset
  2219
                                  Base64.getEncoder().encodeToString(mde.digest(digests[i])));
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2220
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2221
                entries.put(name, attr);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2222
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2223
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2224
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2225
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2226
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2227
     * Writes the SignatureFile to the specified OutputStream.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2228
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2229
     * @param out the output stream
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2230
     * @exception IOException if an I/O error has occurred
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2231
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2232
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2233
    public void write(OutputStream out) throws IOException
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2234
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2235
        sf.write(out);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2236
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2237
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2238
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2239
     * get .SF file name
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2240
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2241
    public String getMetaName()
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2242
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2243
        return "META-INF/"+ baseName + ".SF";
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2244
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2245
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2246
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2247
     * get base file name
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2248
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2249
    public String getBaseName()
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2250
    {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2251
        return baseName;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2252
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2253
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2254
    /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2255
     * Generate a signed data block.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2256
     * If a URL or a certificate (containing a URL) for a Timestamping
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2257
     * Authority is supplied then a signature timestamp is generated and
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2258
     * inserted into the signed data block.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2259
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2260
     * @param sigalg signature algorithm to use, or null to use default
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2261
     * @param tsaUrl The location of the Timestamping Authority. If null
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2262
     *               then no timestamp is requested.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2263
     * @param tsaCert The certificate for the Timestamping Authority. If null
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2264
     *               then no timestamp is requested.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2265
     * @param signingMechanism The signing mechanism to use.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2266
     * @param args The command-line arguments to jarsigner.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2267
     * @param zipFile The original source Zip file.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2268
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2269
    public Block generateBlock(PrivateKey privateKey,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2270
                               String sigalg,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2271
                               X509Certificate[] certChain,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2272
                               boolean externalSF, String tsaUrl,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2273
                               X509Certificate tsaCert,
17161
df1ec0e2f0e7 8009636: JARSigner including TimeStamp PolicyID (TSAPolicyID) as defined in RFC3161
weijun
parents: 16020
diff changeset
  2274
                               String tSAPolicyID,
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2275
                               ContentSigner signingMechanism,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2276
                               String[] args, ZipFile zipFile)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2277
        throws NoSuchAlgorithmException, InvalidKeyException, IOException,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2278
            SignatureException, CertificateException
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2279
    {
8556
d3d6e4643560 7021789: Remove jarsigner -crl option
weijun
parents: 7977
diff changeset
  2280
        return new Block(this, privateKey, sigalg, certChain, externalSF,
17161
df1ec0e2f0e7 8009636: JARSigner including TimeStamp PolicyID (TSAPolicyID) as defined in RFC3161
weijun
parents: 16020
diff changeset
  2281
                tsaUrl, tsaCert, tSAPolicyID, signingMechanism, args, zipFile);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2282
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2283
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2284
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2285
    public static class Block {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2286
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2287
        private byte[] block;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2288
        private String blockFileName;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2289
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2290
        /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2291
         * Construct a new signature block.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2292
         */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2293
        Block(SignatureFile sfg, PrivateKey privateKey, String sigalg,
8556
d3d6e4643560 7021789: Remove jarsigner -crl option
weijun
parents: 7977
diff changeset
  2294
            X509Certificate[] certChain, boolean externalSF, String tsaUrl,
17161
df1ec0e2f0e7 8009636: JARSigner including TimeStamp PolicyID (TSAPolicyID) as defined in RFC3161
weijun
parents: 16020
diff changeset
  2295
            X509Certificate tsaCert, String tSAPolicyID, ContentSigner signingMechanism,
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2296
            String[] args, ZipFile zipFile)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2297
            throws NoSuchAlgorithmException, InvalidKeyException, IOException,
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2298
            SignatureException, CertificateException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2299
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2300
            Principal issuerName = certChain[0].getIssuerDN();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2301
            if (!(issuerName instanceof X500Name)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2302
                // must extract the original encoded form of DN for subsequent
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2303
                // name comparison checks (converting to a String and back to
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2304
                // an encoded DN could cause the types of String attribute
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2305
                // values to be changed)
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2306
                X509CertInfo tbsCert = new
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2307
                    X509CertInfo(certChain[0].getTBSCertificate());
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2308
                issuerName = (Principal)
14421
a64b2cc9d429 7198416: CertificateIssuerName and CertificateSubjectName are redundant
mullan
parents: 14182
diff changeset
  2309
                    tbsCert.get(X509CertInfo.ISSUER + "." +
a64b2cc9d429 7198416: CertificateIssuerName and CertificateSubjectName are redundant
mullan
parents: 14182
diff changeset
  2310
                                X509CertInfo.DN_NAME);
a64b2cc9d429 7198416: CertificateIssuerName and CertificateSubjectName are redundant
mullan
parents: 14182
diff changeset
  2311
                }
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2312
            BigInteger serial = certChain[0].getSerialNumber();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2313
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2314
            String signatureAlgorithm;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2315
            String keyAlgorithm = privateKey.getAlgorithm();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2316
            /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2317
             * If no signature algorithm was specified, we choose a
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2318
             * default that is compatible with the private key algorithm.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2319
             */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2320
            if (sigalg == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2321
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2322
                if (keyAlgorithm.equalsIgnoreCase("DSA"))
4152
bc36a9f01ac6 6870812: enhance security tools to use ECC algorithms
weijun
parents: 3951
diff changeset
  2323
                    signatureAlgorithm = "SHA1withDSA";
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2324
                else if (keyAlgorithm.equalsIgnoreCase("RSA"))
4152
bc36a9f01ac6 6870812: enhance security tools to use ECC algorithms
weijun
parents: 3951
diff changeset
  2325
                    signatureAlgorithm = "SHA256withRSA";
bc36a9f01ac6 6870812: enhance security tools to use ECC algorithms
weijun
parents: 3951
diff changeset
  2326
                else if (keyAlgorithm.equalsIgnoreCase("EC"))
bc36a9f01ac6 6870812: enhance security tools to use ECC algorithms
weijun
parents: 3951
diff changeset
  2327
                    signatureAlgorithm = "SHA256withECDSA";
bc36a9f01ac6 6870812: enhance security tools to use ECC algorithms
weijun
parents: 3951
diff changeset
  2328
                else
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2329
                    throw new RuntimeException("private key is not a DSA or "
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2330
                                               + "RSA key");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2331
            } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2332
                signatureAlgorithm = sigalg;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2333
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2334
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2335
            // check common invalid key/signature algorithm combinations
4152
bc36a9f01ac6 6870812: enhance security tools to use ECC algorithms
weijun
parents: 3951
diff changeset
  2336
            String sigAlgUpperCase = signatureAlgorithm.toUpperCase(Locale.ENGLISH);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2337
            if ((sigAlgUpperCase.endsWith("WITHRSA") &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2338
                !keyAlgorithm.equalsIgnoreCase("RSA")) ||
4152
bc36a9f01ac6 6870812: enhance security tools to use ECC algorithms
weijun
parents: 3951
diff changeset
  2339
                (sigAlgUpperCase.endsWith("WITHECDSA") &&
bc36a9f01ac6 6870812: enhance security tools to use ECC algorithms
weijun
parents: 3951
diff changeset
  2340
                !keyAlgorithm.equalsIgnoreCase("EC")) ||
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2341
                (sigAlgUpperCase.endsWith("WITHDSA") &&
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2342
                !keyAlgorithm.equalsIgnoreCase("DSA"))) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2343
                throw new SignatureException
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2344
                    ("private key algorithm is not compatible with signature algorithm");
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2345
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2346
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2347
            blockFileName = "META-INF/"+sfg.getBaseName()+"."+keyAlgorithm;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2348
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2349
            AlgorithmId sigAlg = AlgorithmId.get(signatureAlgorithm);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2350
            AlgorithmId digEncrAlg = AlgorithmId.get(keyAlgorithm);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2351
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2352
            Signature sig = Signature.getInstance(signatureAlgorithm);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2353
            sig.initSign(privateKey);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2354
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2355
            ByteArrayOutputStream baos = new ByteArrayOutputStream();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2356
            sfg.write(baos);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2357
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2358
            byte[] content = baos.toByteArray();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2359
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2360
            sig.update(content);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2361
            byte[] signature = sig.sign();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2362
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2363
            // Timestamp the signature and generate the signature block file
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2364
            if (signingMechanism == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2365
                signingMechanism = new TimestampedSigner();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2366
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2367
            URI tsaUri = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2368
            try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2369
                if (tsaUrl != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2370
                    tsaUri = new URI(tsaUrl);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2371
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2372
            } catch (URISyntaxException e) {
10336
0bb1999251f8 7064075: Security libraries don't build with javac -Xlint:all,-deprecation -Werror
jjg
parents: 9011
diff changeset
  2373
                throw new IOException(e);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2374
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2375
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2376
            // Assemble parameters for the signing mechanism
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2377
            ContentSignerParameters params =
17161
df1ec0e2f0e7 8009636: JARSigner including TimeStamp PolicyID (TSAPolicyID) as defined in RFC3161
weijun
parents: 16020
diff changeset
  2378
                new JarSignerParameters(args, tsaUri, tsaCert, tSAPolicyID, signature,
8556
d3d6e4643560 7021789: Remove jarsigner -crl option
weijun
parents: 7977
diff changeset
  2379
                    signatureAlgorithm, certChain, content, zipFile);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2380
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2381
            // Generate the signature block
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2382
            block = signingMechanism.generateSignedData(
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2383
                    params, externalSF, (tsaUrl != null || tsaCert != null));
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2384
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2385
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2386
        /*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2387
         * get block file name.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2388
         */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2389
        public String getMetaName()
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2390
        {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2391
            return blockFileName;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2392
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2393
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2394
        /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2395
         * Writes the block file to the specified OutputStream.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2396
         *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2397
         * @param out the output stream
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2398
         * @exception IOException if an I/O error has occurred
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2399
         */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2400
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2401
        public void write(OutputStream out) throws IOException
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2402
        {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2403
            out.write(block);
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2404
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2405
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2406
}
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2407
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2408
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2409
/*
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2410
 * This object encapsulates the parameters used to perform content signing.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2411
 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2412
class JarSignerParameters implements ContentSignerParameters {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2413
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2414
    private String[] args;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2415
    private URI tsa;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2416
    private X509Certificate tsaCertificate;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2417
    private byte[] signature;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2418
    private String signatureAlgorithm;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2419
    private X509Certificate[] signerCertificateChain;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2420
    private byte[] content;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2421
    private ZipFile source;
17161
df1ec0e2f0e7 8009636: JARSigner including TimeStamp PolicyID (TSAPolicyID) as defined in RFC3161
weijun
parents: 16020
diff changeset
  2422
    private String tSAPolicyID;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2423
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2424
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2425
     * Create a new object.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2426
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2427
    JarSignerParameters(String[] args, URI tsa, X509Certificate tsaCertificate,
17161
df1ec0e2f0e7 8009636: JARSigner including TimeStamp PolicyID (TSAPolicyID) as defined in RFC3161
weijun
parents: 16020
diff changeset
  2428
        String tSAPolicyID,
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2429
        byte[] signature, String signatureAlgorithm,
8556
d3d6e4643560 7021789: Remove jarsigner -crl option
weijun
parents: 7977
diff changeset
  2430
        X509Certificate[] signerCertificateChain, byte[] content,
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2431
        ZipFile source) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2432
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2433
        if (signature == null || signatureAlgorithm == null ||
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2434
            signerCertificateChain == null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2435
            throw new NullPointerException();
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2436
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2437
        this.args = args;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2438
        this.tsa = tsa;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2439
        this.tsaCertificate = tsaCertificate;
17161
df1ec0e2f0e7 8009636: JARSigner including TimeStamp PolicyID (TSAPolicyID) as defined in RFC3161
weijun
parents: 16020
diff changeset
  2440
        this.tSAPolicyID = tSAPolicyID;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2441
        this.signature = signature;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2442
        this.signatureAlgorithm = signatureAlgorithm;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2443
        this.signerCertificateChain = signerCertificateChain;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2444
        this.content = content;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2445
        this.source = source;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2446
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2447
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2448
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2449
     * Retrieves the command-line arguments.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2450
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2451
     * @return The command-line arguments. May be null.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2452
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2453
    public String[] getCommandLine() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2454
        return args;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2455
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2456
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2457
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2458
     * Retrieves the identifier for a Timestamping Authority (TSA).
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2459
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2460
     * @return The TSA identifier. May be null.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2461
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2462
    public URI getTimestampingAuthority() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2463
        return tsa;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2464
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2465
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2466
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2467
     * Retrieves the certificate for a Timestamping Authority (TSA).
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2468
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2469
     * @return The TSA certificate. May be null.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2470
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2471
    public X509Certificate getTimestampingAuthorityCertificate() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2472
        return tsaCertificate;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2473
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2474
17161
df1ec0e2f0e7 8009636: JARSigner including TimeStamp PolicyID (TSAPolicyID) as defined in RFC3161
weijun
parents: 16020
diff changeset
  2475
    public String getTSAPolicyID() {
df1ec0e2f0e7 8009636: JARSigner including TimeStamp PolicyID (TSAPolicyID) as defined in RFC3161
weijun
parents: 16020
diff changeset
  2476
        return tSAPolicyID;
df1ec0e2f0e7 8009636: JARSigner including TimeStamp PolicyID (TSAPolicyID) as defined in RFC3161
weijun
parents: 16020
diff changeset
  2477
    }
df1ec0e2f0e7 8009636: JARSigner including TimeStamp PolicyID (TSAPolicyID) as defined in RFC3161
weijun
parents: 16020
diff changeset
  2478
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2479
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2480
     * Retrieves the signature.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2481
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2482
     * @return The non-null signature bytes.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2483
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2484
    public byte[] getSignature() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2485
        return signature;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2486
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2487
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2488
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2489
     * Retrieves the name of the signature algorithm.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2490
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2491
     * @return The non-null string name of the signature algorithm.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2492
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2493
    public String getSignatureAlgorithm() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2494
        return signatureAlgorithm;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2495
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2496
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2497
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2498
     * Retrieves the signer's X.509 certificate chain.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2499
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2500
     * @return The non-null array of X.509 public-key certificates.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2501
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2502
    public X509Certificate[] getSignerCertificateChain() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2503
        return signerCertificateChain;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2504
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2505
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2506
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2507
     * Retrieves the content that was signed.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2508
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2509
     * @return The content bytes. May be null.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2510
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2511
    public byte[] getContent() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2512
        return content;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2513
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2514
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2515
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2516
     * Retrieves the original source ZIP file before it was signed.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2517
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2518
     * @return The original ZIP file. May be null.
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2519
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2520
    public ZipFile getSource() {
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2521
        return source;
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2522
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
  2523
}