8273826: Correct Manifest file name and NPE checks

Reviewed-by: weijun, hchao, mullan
This commit is contained in:
Sean Coffey 2021-10-07 15:12:13 +00:00
parent 722d639fad
commit 03a8d342b8
5 changed files with 137 additions and 11 deletions

View file

@ -749,7 +749,7 @@ public class JarFile extends ZipFile {
} }
if (mev == null) { if (mev == null) {
mev = new ManifestEntryVerifier mev = new ManifestEntryVerifier
(getManifestFromReference()); (getManifestFromReference(), jv.manifestName);
} }
if (name.equalsIgnoreCase(MANIFEST_NAME)) { if (name.equalsIgnoreCase(MANIFEST_NAME)) {
b = jv.manifestRawBytes; b = jv.manifestRawBytes;

View file

@ -95,7 +95,7 @@ public class JarInputStream extends ZipInputStream {
closeEntry(); closeEntry();
if (doVerify) { if (doVerify) {
jv = new JarVerifier(e.getName(), bytes); jv = new JarVerifier(e.getName(), bytes);
mev = new ManifestEntryVerifier(man); mev = new ManifestEntryVerifier(man, jv.manifestName);
} }
return (JarEntry)super.getNextEntry(); return (JarEntry)super.getNextEntry();
} }

View file

@ -444,7 +444,7 @@ class JarVerifier {
{ {
this.is = Objects.requireNonNull(is); this.is = Objects.requireNonNull(is);
this.jv = jv; this.jv = jv;
this.mev = new ManifestEntryVerifier(man); this.mev = new ManifestEntryVerifier(man, jv.manifestName);
this.jv.beginEntry(je, mev); this.jv.beginEntry(je, mev);
this.numLeft = je.getSize(); this.numLeft = je.getSize();
if (this.numLeft == 0) if (this.numLeft == 0)

View file

@ -63,7 +63,9 @@ public class ManifestEntryVerifier {
ArrayList<byte[]> manifestHashes; ArrayList<byte[]> manifestHashes;
private String name = null; private String name = null;
private Manifest man;
private final String manifestFileName; // never null
private final Manifest man;
private boolean skip = true; private boolean skip = true;
@ -74,11 +76,12 @@ public class ManifestEntryVerifier {
/** /**
* Create a new ManifestEntryVerifier object. * Create a new ManifestEntryVerifier object.
*/ */
public ManifestEntryVerifier(Manifest man) public ManifestEntryVerifier(Manifest man, String manifestFileName)
{ {
createdDigests = new HashMap<>(11); createdDigests = new HashMap<>(11);
digests = new ArrayList<>(); digests = new ArrayList<>();
manifestHashes = new ArrayList<>(); manifestHashes = new ArrayList<>();
this.manifestFileName = manifestFileName;
this.man = man; this.man = man;
} }
@ -187,7 +190,6 @@ public class ManifestEntryVerifier {
* the first time we have verified this object, remove its * the first time we have verified this object, remove its
* code signers from sigFileSigners and place in verifiedSigners. * code signers from sigFileSigners and place in verifiedSigners.
* *
*
*/ */
public CodeSigner[] verify(Hashtable<String, CodeSigner[]> verifiedSigners, public CodeSigner[] verify(Hashtable<String, CodeSigner[]> verifiedSigners,
Hashtable<String, CodeSigner[]> sigFileSigners) Hashtable<String, CodeSigner[]> sigFileSigners)
@ -209,7 +211,6 @@ public class ManifestEntryVerifier {
getParams(verifiedSigners, sigFileSigners); getParams(verifiedSigners, sigFileSigners);
for (int i=0; i < digests.size(); i++) { for (int i=0; i < digests.size(); i++) {
MessageDigest digest = digests.get(i); MessageDigest digest = digests.get(i);
if (params != null) { if (params != null) {
try { try {
@ -251,7 +252,8 @@ public class ManifestEntryVerifier {
/** /**
* Get constraints parameters for JAR. The constraints should be * Get constraints parameters for JAR. The constraints should be
* checked against all code signers. Returns the parameters, * checked against all code signers. Returns the parameters,
* or null if the signers for this entry have already been checked. * or null if the signers for this entry have already been checked
* or there are no signers for this entry.
*/ */
private JarConstraintsParameters getParams( private JarConstraintsParameters getParams(
Map<String, CodeSigner[]> verifiedSigners, Map<String, CodeSigner[]> verifiedSigners,
@ -262,17 +264,20 @@ public class ManifestEntryVerifier {
// the signers of the JAR. But if it doesn't then we need to fallback // the signers of the JAR. But if it doesn't then we need to fallback
// and check verifiedSigners to see if the signers of this entry have // and check verifiedSigners to see if the signers of this entry have
// been checked already. // been checked already.
if (verifiedSigners.containsKey(JarFile.MANIFEST_NAME)) { if (verifiedSigners.containsKey(manifestFileName)) {
if (verifiedSigners.size() > 1) { if (verifiedSigners.size() > 1) {
// this means we already checked it previously // this means we already checked it previously
return null; return null;
} else { } else {
return new JarConstraintsParameters( return new JarConstraintsParameters(
verifiedSigners.get(JarFile.MANIFEST_NAME)); verifiedSigners.get(manifestFileName));
} }
} else { } else {
if (debug != null) {
debug.println(manifestFileName + " not present in verifiedSigners");
}
CodeSigner[] signers = sigFileSigners.get(name); CodeSigner[] signers = sigFileSigners.get(name);
if (verifiedSigners.containsValue(signers)) { if (signers == null || verifiedSigners.containsValue(signers)) {
return null; return null;
} else { } else {
return new JarConstraintsParameters(signers); return new JarConstraintsParameters(signers);

View file

@ -0,0 +1,121 @@
/*
* Copyright (c) 2021, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License version 2 only, as
* published by the Free Software Foundation.
*
* This code is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* version 2 for more details (a copy is included in the LICENSE file that
* accompanied this code).
*
* You should have received a copy of the GNU General Public License version
* 2 along with this work; if not, write to the Free Software Foundation,
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
* or visit www.oracle.com if you need additional information or have any
* questions.
*/
import jdk.test.lib.process.OutputAnalyzer;
import jdk.test.lib.util.JarUtils;
import java.nio.file.*;
import java.security.Security;
import java.util.Collections;
/**
* @test
* @bug 8273826
* @summary Test for signed jar file with lowercase META-INF files
* @library /test/lib ../
* @build jdk.test.lib.util.JarUtils
* @run main LowerCaseManifest
*/
public class LowerCaseManifest extends Test {
public static void main(String[] args) throws Throwable {
new LowerCaseManifest().start();
}
private void start() throws Throwable {
// create a jar file that contains one class file
Utils.createFiles(FIRST_FILE);
JarUtils.createJar(UNSIGNED_JARFILE, FIRST_FILE);
// create key pair for jar signing
createAlias(CA_KEY_ALIAS, "-ext", "bc:c");
createAlias(KEY_ALIAS);
issueCert(KEY_ALIAS);
// sign jar
OutputAnalyzer analyzer = jarsigner(
"-keystore", KEYSTORE,
"-verbose",
"-storepass", PASSWORD,
"-keypass", PASSWORD,
"-signedjar", SIGNED_JARFILE,
UNSIGNED_JARFILE,
KEY_ALIAS);
checkSigning(analyzer);
// verify signed jar
analyzer = jarsigner(
"-verify",
"-verbose",
"-keystore", KEYSTORE,
"-storepass", PASSWORD,
"-keypass", PASSWORD,
SIGNED_JARFILE,
KEY_ALIAS);
checkVerifying(analyzer, 0, JAR_VERIFIED);
// verify signed jar in strict mode
analyzer = jarsigner(
"-verify",
"-verbose",
"-strict",
"-keystore", KEYSTORE,
"-storepass", PASSWORD,
"-keypass", PASSWORD,
SIGNED_JARFILE,
KEY_ALIAS);
checkVerifying(analyzer, 0, JAR_VERIFIED);
// convert the META-INF/ files to lower case
FileSystem fs = FileSystems.newFileSystem(Path.of(SIGNED_JARFILE), Collections.emptyMap());
for (String s : new String[]{"ALIAS.SF", "ALIAS.RSA", "MANIFEST.MF"}) {
Path origPath = fs.getPath("META-INF/" + s);
Path lowerCase = fs.getPath("META-INF/" + s.toLowerCase());
Files.write(lowerCase, Files.readAllBytes(origPath));
Files.delete(origPath);
}
fs.close();
// verify signed jar in strict mode (with lower case META-INF names in place)
analyzer = jarsigner(
"-verify",
"-verbose",
"-strict",
"-J-Djava.security.debug=jar",
"-keystore", KEYSTORE,
"-storepass", PASSWORD,
"-keypass", PASSWORD,
SIGNED_JARFILE,
KEY_ALIAS);
checkVerifying(analyzer, 0,
JAR_VERIFIED, "!not present in verifiedSigners");
System.out.println("Test passed");
}
}