Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

8281234: The -protected option is not always checked in keytool and jarsigner #3163

Open
wants to merge 1 commit into
base: master
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -1287,6 +1287,7 @@ && isKeyStoreRelated(command)
kssave = true;
} else if (command == LIST) {
if (storePass == null
&& !protectedPath
&& !KeyStoreUtil.isWindowsKeyStore(storetype)
&& !isPasswordlessKeyStore) {
printNoIntegrityWarning();
Expand Down Expand Up @@ -1686,6 +1687,7 @@ private void doExportCert(String alias, PrintStream out)
throws Exception
{
if (storePass == null
&& !protectedPath
&& !KeyStoreUtil.isWindowsKeyStore(storetype)
&& !isPasswordlessKeyStore) {
printNoIntegrityWarning();
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2151,7 +2151,7 @@ void loadKeyStore(String keyStoreName, boolean prompt) {
&& !KeyStoreUtil.isWindowsKeyStore(storetype)) {
storepass = getPass
(rb.getString("Enter.Passphrase.for.keystore."));
} else if (!token && storepass == null && prompt) {
} else if (!token && storepass == null && prompt && !protectedPath) {
storepass = getPass
(rb.getString("Enter.Passphrase.for.keystore."));
}
Expand Down
190 changes: 190 additions & 0 deletions test/jdk/sun/security/tools/jarsigner/AutoKeyStore.java
Original file line number Diff line number Diff line change
@@ -0,0 +1,190 @@
/*
* Copyright (c) 2022, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License version 2 only, as
* published by the Free Software Foundation.
*
* This code is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* version 2 for more details (a copy is included in the LICENSE file that
* accompanied this code).
*
* You should have received a copy of the GNU General Public License version
* 2 along with this work; if not, write to the Free Software Foundation,
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
* or visit www.oracle.com if you need additional information or have any
* questions.
*/

/*
* @test
* @bug 8281234
* @summary The -protected option is not always checked in keytool and jarsigner
* @library /test/lib
* @modules java.base/sun.security.tools.keytool
* java.base/sun.security.x509
*/

import jdk.test.lib.Asserts;
import jdk.test.lib.SecurityTools;
import jdk.test.lib.util.JarUtils;
import sun.security.tools.keytool.CertAndKeyGen;
import sun.security.x509.X500Name;

import java.io.IOException;
import java.io.InputStream;
import java.io.OutputStream;
import java.nio.file.Files;
import java.nio.file.Path;
import java.security.*;
import java.security.cert.Certificate;
import java.security.cert.X509Certificate;
import java.util.Collections;
import java.util.Date;
import java.util.Enumeration;
import java.util.List;
import java.util.jar.JarFile;

public class AutoKeyStore {

public static void main(String[] args) throws Exception {

JarUtils.createJarFile(Path.of("unsigned.jar"), Path.of("."),
Files.writeString(Path.of("file"), "hello"));

SecurityTools.keytool("""
-J--add-exports -Jjava.base/sun.security.tools.keytool=ALL-UNNAMED
-J--add-exports -Jjava.base/sun.security.x509=ALL-UNNAMED
-providerClass AutoKeyStore$AutoProvider
-providerPath $test.classes
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You changed the code below due to missing "8281175: Add a -providerPath option to jarsigner", but here, there is still "-providerPath".

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The code above calls keytool which supports the argument. jarsigner does not. For jarsigner it was added by above mentioned change.

-storetype AUTO -keystore NONE -protected
-list
""").shouldHaveExitValue(0)
.shouldContain("Keystore type: AUTO")
.shouldContain("Keystore provider: AUTO")
.shouldContain("PrivateKeyEntry");

SecurityTools.jarsigner("""
-J--add-exports -Jjava.base/sun.security.tools.keytool=ALL-UNNAMED
-J--add-exports -Jjava.base/sun.security.x509=ALL-UNNAMED
-J-cp -J$test.classes
-providerClass AutoKeyStore$AutoProvider
-storetype AUTO -keystore NONE -protected
-signedJar signed.jar
unsigned.jar
one
""").shouldHaveExitValue(0)
.shouldContain("jar signed.");

Asserts.assertTrue(new JarFile("signed.jar")
.getEntry("META-INF/ONE.EC") != null);
}

public static class AutoProvider extends Provider {
public AutoProvider() {
super("AUTO", "1.1.1", "auto");
put("KeyStore.AUTO", "AutoKeyStore$KeyStoreImpl");
}
}

// This keystore is not based on file. Whenever it's loaded
// a self-sign certificate is generated inside
public static class KeyStoreImpl extends KeyStoreSpi {

private PrivateKey pri;
private PublicKey pub;
private X509Certificate cert;

@Override
public Key engineGetKey(String alias, char[] password) {
return pri;
}

@Override
public Certificate[] engineGetCertificateChain(String alias) {
return new Certificate[] { cert };
}

@Override
public Certificate engineGetCertificate(String alias) {
return cert;
}

@Override
public Date engineGetCreationDate(String alias) {
return new Date();
}

@Override
public void engineSetKeyEntry(String alias, Key key, char[] password, Certificate[] chain) throws KeyStoreException {
throw new KeyStoreException("Not supported");
}

@Override
public void engineSetKeyEntry(String alias, byte[] key, Certificate[] chain) throws KeyStoreException {
throw new KeyStoreException("Not supported");
}

@Override
public void engineSetCertificateEntry(String alias, Certificate cert) throws KeyStoreException {
throw new KeyStoreException("Not supported");
}

@Override
public void engineDeleteEntry(String alias) throws KeyStoreException {
throw new KeyStoreException("Not supported");
}

@Override
public Enumeration<String> engineAliases() {
return Collections.enumeration(List.of("one"));
}

@Override
public boolean engineContainsAlias(String alias) {
return alias.equalsIgnoreCase("one");
}

@Override
public int engineSize() {
return 1;
}

@Override
public boolean engineIsKeyEntry(String alias) {
return true;
}

@Override
public boolean engineIsCertificateEntry(String alias) {
return false;
}

@Override
public String engineGetCertificateAlias(Certificate cert) {
return "one";
}

@Override
public void engineStore(OutputStream stream, char[] password) {
}

@Override
public void engineLoad(InputStream stream, char[] password) throws IOException {
try {
CertAndKeyGen cag = new CertAndKeyGen("EC", "SHA256withECDSA");
cag.generate("secp256r1");
pri = cag.getPrivateKey();
pub = cag.getPublicKey();
cert = cag.getSelfCertificate(new X500Name("CN=one"), 3600);
} catch (Exception e) {
throw new IOException("Not loaded");
}
}
}
}
13 changes: 10 additions & 3 deletions test/lib/jdk/test/lib/SecurityTools.java
Original file line number Diff line number Diff line change
Expand Up @@ -41,8 +41,8 @@
* Run security tools (including jarsigner and keytool) in a new process.
* The en_US locale is always used so a test can always match output to
* English text. {@code /dev/urandom} is used as entropy source so tool will
* not block because of entropy scarcity. {@code -Jvm-options} is supported
* as an argument.
* not block because of entropy scarcity. An argument can be a normal string,
* {@code -Jvm-options}, or {@code $sysProp}.
*/
public class SecurityTools {

Expand All @@ -63,10 +63,17 @@ public static ProcessBuilder getProcessBuilder(String tool, List<String> args) {
}
for (String arg : args) {
if (arg.startsWith("-J")) {
launcher.addVMArg(arg.substring(2));
String jarg = arg.substring(2);
if (jarg.length() > 1 && jarg.charAt(0) == '$') {
launcher.addVMArg(System.getProperty(jarg.substring(1)));
} else {
launcher.addVMArg(jarg);
}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

For which property is this needed? I can't see such code upstream.

} else if (Platform.isWindows() && arg.isEmpty()) {
// JDK-6518827: special handling for empty argument on Windows
launcher.addToolArg("\"\"");
} else if (arg.length() > 1 && arg.charAt(0) == '$') {
launcher.addToolArg(System.getProperty(arg.substring(1)));
} else {
launcher.addToolArg(arg);
}
Expand Down