Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
openanolis
dragonwell11
提交
e066868a
D
dragonwell11
项目概览
openanolis
/
dragonwell11
通知
7
Star
2
Fork
0
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
D
dragonwell11
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
体验新版 GitCode,发现更多精彩内容 >>
提交
e066868a
编写于
10月 21, 2009
作者:
W
weijun
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
6870812: enhance security tools to use ECC algorithms
Reviewed-by: vinnie, mullan
上级
7b381b2c
变更
11
隐藏空白更改
内联
并排
Showing
11 changed file
with
171 addition
and
47 deletion
+171
-47
jdk/src/share/classes/java/util/jar/JarFile.java
jdk/src/share/classes/java/util/jar/JarFile.java
+2
-1
jdk/src/share/classes/java/util/jar/JarVerifier.java
jdk/src/share/classes/java/util/jar/JarVerifier.java
+4
-4
jdk/src/share/classes/sun/security/jca/Providers.java
jdk/src/share/classes/sun/security/jca/Providers.java
+4
-1
jdk/src/share/classes/sun/security/pkcs/SignerInfo.java
jdk/src/share/classes/sun/security/pkcs/SignerInfo.java
+7
-6
jdk/src/share/classes/sun/security/tools/JarSigner.java
jdk/src/share/classes/sun/security/tools/JarSigner.java
+15
-13
jdk/src/share/classes/sun/security/tools/KeyTool.java
jdk/src/share/classes/sun/security/tools/KeyTool.java
+1
-1
jdk/src/share/classes/sun/security/tools/TimestampedSigner.java
...c/share/classes/sun/security/tools/TimestampedSigner.java
+5
-13
jdk/src/share/classes/sun/security/util/SignatureFileVerifier.java
...hare/classes/sun/security/util/SignatureFileVerifier.java
+6
-5
jdk/src/share/classes/sun/security/x509/AlgorithmId.java
jdk/src/share/classes/sun/security/x509/AlgorithmId.java
+49
-0
jdk/src/share/classes/sun/tools/jar/SignatureFile.java
jdk/src/share/classes/sun/tools/jar/SignatureFile.java
+5
-3
jdk/test/sun/security/tools/jarsigner/ec.sh
jdk/test/sun/security/tools/jarsigner/ec.sh
+73
-0
未找到文件。
jdk/src/share/classes/java/util/jar/JarFile.java
浏览文件 @
e066868a
/*
* Copyright 1997-200
6
Sun Microsystems, Inc. All Rights Reserved.
* Copyright 1997-200
9
Sun Microsystems, Inc. All Rights Reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
...
...
@@ -297,6 +297,7 @@ class JarFile extends ZipFile {
String
name
=
names
[
i
].
toUpperCase
(
Locale
.
ENGLISH
);
if
(
name
.
endsWith
(
".DSA"
)
||
name
.
endsWith
(
".RSA"
)
||
name
.
endsWith
(
".EC"
)
||
name
.
endsWith
(
".SF"
))
{
// Assume since we found a signature-related file
// that the jar is signed and that we therefore
...
...
jdk/src/share/classes/java/util/jar/JarVerifier.java
浏览文件 @
e066868a
/*
* Copyright 1997-200
5
Sun Microsystems, Inc. All Rights Reserved.
* Copyright 1997-200
9
Sun Microsystems, Inc. All Rights Reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
...
...
@@ -50,7 +50,7 @@ class JarVerifier {
private
Hashtable
verifiedSigners
;
/* a table mapping names to code signers, for jar entries that have
passed the .SF/.DSA -> MANIFEST check */
passed the .SF/.DSA
/.EC
-> MANIFEST check */
private
Hashtable
sigFileSigners
;
/* a hash table to hold .SF bytes */
...
...
@@ -111,7 +111,7 @@ class JarVerifier {
/*
* Assumptions:
* 1. The manifest should be the first entry in the META-INF directory.
* 2. The .SF/.DSA files follow the manifest, before any normal entries
* 2. The .SF/.DSA
/.EC
files follow the manifest, before any normal entries
* 3. Any of the following will throw a SecurityException:
* a. digest mismatch between a manifest section and
* the SF section.
...
...
@@ -129,7 +129,7 @@ class JarVerifier {
}
if
(
SignatureFileVerifier
.
isBlockOrSF
(
uname
))
{
/* We parse only DSA
or RSA
PKCS7 blocks. */
/* We parse only DSA
, RSA or EC
PKCS7 blocks. */
parsingBlockOrSF
=
true
;
baos
.
reset
();
mev
.
setEntry
(
null
,
je
);
...
...
jdk/src/share/classes/sun/security/jca/Providers.java
浏览文件 @
e066868a
/*
* Copyright 2003-200
5
Sun Microsystems, Inc. All Rights Reserved.
* Copyright 2003-200
9
Sun Microsystems, Inc. All Rights Reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
...
...
@@ -86,6 +86,9 @@ public class Providers {
private
static
final
String
[]
jarVerificationProviders
=
{
"sun.security.provider.Sun"
,
"sun.security.rsa.SunRsaSign"
,
// Note: SunEC *is* in a signed JAR file, but it's not signed
// by EC itself. So it's still safe to be listed here.
"sun.security.ec.SunEC"
,
BACKUP_PROVIDER_CLASSNAME
,
};
...
...
jdk/src/share/classes/sun/security/pkcs/SignerInfo.java
浏览文件 @
e066868a
/*
* Copyright 1996-200
6
Sun Microsystems, Inc. All Rights Reserved.
* Copyright 1996-200
9
Sun Microsystems, Inc. All Rights Reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
...
...
@@ -286,8 +286,6 @@ public class SignerInfo implements DerEncoder {
}
String
digestAlgname
=
getDigestAlgorithmId
().
getName
();
if
(
digestAlgname
.
equalsIgnoreCase
(
"SHA"
))
digestAlgname
=
"SHA1"
;
byte
[]
dataSigned
;
...
...
@@ -337,9 +335,12 @@ public class SignerInfo implements DerEncoder {
String
encryptionAlgname
=
getDigestEncryptionAlgorithmId
().
getName
();
if
(
encryptionAlgname
.
equalsIgnoreCase
(
"SHA1withDSA"
))
encryptionAlgname
=
"DSA"
;
String
algname
=
digestAlgname
+
"with"
+
encryptionAlgname
;
// Workaround: sometimes the encryptionAlgname is actually
// a signature name
String
tmp
=
AlgorithmId
.
getEncAlgFromSigAlg
(
encryptionAlgname
);
if
(
tmp
!=
null
)
encryptionAlgname
=
tmp
;
String
algname
=
AlgorithmId
.
makeSigAlg
(
digestAlgname
,
encryptionAlgname
);
Signature
sig
=
Signature
.
getInstance
(
algname
);
X509Certificate
cert
=
getCertificate
(
block
);
...
...
jdk/src/share/classes/sun/security/tools/JarSigner.java
浏览文件 @
e066868a
...
...
@@ -1031,9 +1031,9 @@ public class JarSigner {
}
if
(
sigfile
.
length
()
>
8
)
{
sigfile
=
sigfile
.
substring
(
0
,
8
).
toUpperCase
();
sigfile
=
sigfile
.
substring
(
0
,
8
).
toUpperCase
(
Locale
.
ENGLISH
);
}
else
{
sigfile
=
sigfile
.
toUpperCase
();
sigfile
=
sigfile
.
toUpperCase
(
Locale
.
ENGLISH
);
}
StringBuilder
tmpSigFile
=
new
StringBuilder
(
sigfile
.
length
());
...
...
@@ -1083,8 +1083,8 @@ public class JarSigner {
ZipOutputStream
zos
=
new
ZipOutputStream
(
ps
);
/* First guess at what they might be - we don't xclude RSA ones. */
String
sfFilename
=
(
META_INF
+
sigfile
+
".SF"
).
toUpperCase
();
String
bkFilename
=
(
META_INF
+
sigfile
+
".DSA"
).
toUpperCase
();
String
sfFilename
=
(
META_INF
+
sigfile
+
".SF"
).
toUpperCase
(
Locale
.
ENGLISH
);
String
bkFilename
=
(
META_INF
+
sigfile
+
".DSA"
).
toUpperCase
(
Locale
.
ENGLISH
);
Manifest
manifest
=
new
Manifest
();
Map
<
String
,
Attributes
>
mfEntries
=
manifest
.
getEntries
();
...
...
@@ -1447,9 +1447,10 @@ public class JarSigner {
* . META-INF/*.SF
* . META-INF/*.DSA
* . META-INF/*.RSA
* . META-INF/*.EC
*/
private
boolean
signatureRelated
(
String
name
)
{
String
ucName
=
name
.
toUpperCase
();
String
ucName
=
name
.
toUpperCase
(
Locale
.
ENGLISH
);
if
(
ucName
.
equals
(
JarFile
.
MANIFEST_NAME
)
||
ucName
.
equals
(
META_INF
)
||
(
ucName
.
startsWith
(
SIG_PREFIX
)
&&
...
...
@@ -1459,7 +1460,7 @@ public class JarSigner {
if
(
ucName
.
startsWith
(
META_INF
)
&&
SignatureFileVerifier
.
isBlockOrSF
(
ucName
))
{
// .SF/.DSA/.RSA files in META-INF subdirs
// .SF/.DSA/.RSA
/.EC
files in META-INF subdirs
// are not considered signature-related
return
(
ucName
.
indexOf
(
"/"
)
==
ucName
.
lastIndexOf
(
"/"
));
}
...
...
@@ -2227,7 +2228,6 @@ class SignatureFile {
}
BigInteger
serial
=
certChain
[
0
].
getSerialNumber
();
String
digestAlgorithm
;
String
signatureAlgorithm
;
String
keyAlgorithm
=
privateKey
.
getAlgorithm
();
/*
...
...
@@ -2237,22 +2237,24 @@ class SignatureFile {
if
(
sigalg
==
null
)
{
if
(
keyAlgorithm
.
equalsIgnoreCase
(
"DSA"
))
digestAlgorithm
=
"SHA1
"
;
signatureAlgorithm
=
"SHA1withDSA
"
;
else
if
(
keyAlgorithm
.
equalsIgnoreCase
(
"RSA"
))
digestAlgorithm
=
"SHA256"
;
else
{
signatureAlgorithm
=
"SHA256withRSA"
;
else
if
(
keyAlgorithm
.
equalsIgnoreCase
(
"EC"
))
signatureAlgorithm
=
"SHA256withECDSA"
;
else
throw
new
RuntimeException
(
"private key is not a DSA or "
+
"RSA key"
);
}
signatureAlgorithm
=
digestAlgorithm
+
"with"
+
keyAlgorithm
;
}
else
{
signatureAlgorithm
=
sigalg
;
}
// check common invalid key/signature algorithm combinations
String
sigAlgUpperCase
=
signatureAlgorithm
.
toUpperCase
();
String
sigAlgUpperCase
=
signatureAlgorithm
.
toUpperCase
(
Locale
.
ENGLISH
);
if
((
sigAlgUpperCase
.
endsWith
(
"WITHRSA"
)
&&
!
keyAlgorithm
.
equalsIgnoreCase
(
"RSA"
))
||
(
sigAlgUpperCase
.
endsWith
(
"WITHECDSA"
)
&&
!
keyAlgorithm
.
equalsIgnoreCase
(
"EC"
))
||
(
sigAlgUpperCase
.
endsWith
(
"WITHDSA"
)
&&
!
keyAlgorithm
.
equalsIgnoreCase
(
"DSA"
)))
{
throw
new
SignatureException
...
...
jdk/src/share/classes/sun/security/tools/KeyTool.java
浏览文件 @
e066868a
...
...
@@ -1407,7 +1407,7 @@ public final class KeyTool {
}
else
if
(
"RSA"
.
equalsIgnoreCase
(
keyAlgName
))
{
return
"SHA256WithRSA"
;
}
else
if
(
"EC"
.
equalsIgnoreCase
(
keyAlgName
))
{
return
"SHA
1
withECDSA"
;
return
"SHA
256
withECDSA"
;
}
else
{
throw
new
Exception
(
rb
.
getString
(
"Cannot derive signature algorithm"
));
...
...
jdk/src/share/classes/sun/security/tools/TimestampedSigner.java
浏览文件 @
e066868a
/*
* Copyright (c) 2007 Sun Microsystems, Inc. All Rights Reserved.
* Copyright (c) 2007
-2009
Sun Microsystems, Inc. All Rights Reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
...
...
@@ -159,18 +159,10 @@ public final class TimestampedSigner extends ContentSigner {
// "<digest>with<encryption>"
// or "<digest>with<encryption>and<mgf>"
String
signatureAlgorithm
=
parameters
.
getSignatureAlgorithm
();
String
digestAlgorithm
=
null
;
String
keyAlgorithm
=
null
;
int
with
=
signatureAlgorithm
.
indexOf
(
"with"
);
if
(
with
>
0
)
{
digestAlgorithm
=
signatureAlgorithm
.
substring
(
0
,
with
);
int
and
=
signatureAlgorithm
.
indexOf
(
"and"
,
with
+
4
);
if
(
and
>
0
)
{
keyAlgorithm
=
signatureAlgorithm
.
substring
(
with
+
4
,
and
);
}
else
{
keyAlgorithm
=
signatureAlgorithm
.
substring
(
with
+
4
);
}
}
String
keyAlgorithm
=
AlgorithmId
.
getEncAlgFromSigAlg
(
signatureAlgorithm
);
String
digestAlgorithm
=
AlgorithmId
.
getDigAlgFromSigAlg
(
signatureAlgorithm
);
AlgorithmId
digestAlgorithmId
=
AlgorithmId
.
get
(
digestAlgorithm
);
// Examine signer's certificate
...
...
jdk/src/share/classes/sun/security/util/SignatureFileVerifier.java
浏览文件 @
e066868a
/*
* Copyright 1997-200
6
Sun Microsystems, Inc. All Rights Reserved.
* Copyright 1997-200
9
Sun Microsystems, Inc. All Rights Reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
...
...
@@ -54,14 +54,14 @@ public class SignatureFileVerifier {
(
"-DIGEST-"
+
ManifestDigester
.
MF_MAIN_ATTRS
).
toUpperCase
(
Locale
.
ENGLISH
);
/** the PKCS7 block for this .DSA/.RSA file */
/** the PKCS7 block for this .DSA/.RSA
/.EC
file */
private
PKCS7
block
;
/** the raw bytes of the .SF file */
private
byte
sfBytes
[];
/** the name of the signature block file, uppercased and without
* the extension (.DSA/.RSA)
* the extension (.DSA/.RSA
/.EC
)
*/
private
String
name
;
...
...
@@ -80,7 +80,7 @@ public class SignatureFileVerifier {
/**
* Create the named SignatureFileVerifier.
*
* @param name the name of the signature block file (.DSA/.RSA)
* @param name the name of the signature block file (.DSA/.RSA
/.EC
)
*
* @param rawBytes the raw bytes of the signature block file
*/
...
...
@@ -148,7 +148,8 @@ public class SignatureFileVerifier {
*/
public
static
boolean
isBlockOrSF
(
String
s
)
{
// we currently only support DSA and RSA PKCS7 blocks
if
(
s
.
endsWith
(
".SF"
)
||
s
.
endsWith
(
".DSA"
)
||
s
.
endsWith
(
".RSA"
))
{
if
(
s
.
endsWith
(
".SF"
)
||
s
.
endsWith
(
".DSA"
)
||
s
.
endsWith
(
".RSA"
)
||
s
.
endsWith
(
".EC"
))
{
return
true
;
}
return
false
;
...
...
jdk/src/share/classes/sun/security/x509/AlgorithmId.java
浏览文件 @
e066868a
...
...
@@ -883,4 +883,53 @@ public class AlgorithmId implements Serializable, DerEncoder {
nameTable
.
put
(
pbeWithSHA1AndDESede_oid
,
"PBEWithSHA1AndDESede"
);
nameTable
.
put
(
pbeWithSHA1AndRC2_40_oid
,
"PBEWithSHA1AndRC2_40"
);
}
/**
* Creates a signature algorithm name from a digest algorithm
* name and a encryption algorithm name.
*/
public
static
String
makeSigAlg
(
String
digAlg
,
String
encAlg
)
{
digAlg
=
digAlg
.
replace
(
"-"
,
""
).
toUpperCase
(
Locale
.
ENGLISH
);
if
(
digAlg
.
equalsIgnoreCase
(
"SHA"
))
digAlg
=
"SHA1"
;
encAlg
=
encAlg
.
toUpperCase
(
Locale
.
ENGLISH
);
if
(
encAlg
.
equals
(
"EC"
))
encAlg
=
"ECDSA"
;
return
digAlg
+
"with"
+
encAlg
;
}
/**
* Extracts the encryption algorithm name from a signature
* algorithm name.
*/
public
static
String
getEncAlgFromSigAlg
(
String
signatureAlgorithm
)
{
signatureAlgorithm
=
signatureAlgorithm
.
toUpperCase
(
Locale
.
ENGLISH
);
int
with
=
signatureAlgorithm
.
indexOf
(
"WITH"
);
String
keyAlgorithm
=
null
;
if
(
with
>
0
)
{
int
and
=
signatureAlgorithm
.
indexOf
(
"AND"
,
with
+
4
);
if
(
and
>
0
)
{
keyAlgorithm
=
signatureAlgorithm
.
substring
(
with
+
4
,
and
);
}
else
{
keyAlgorithm
=
signatureAlgorithm
.
substring
(
with
+
4
);
}
if
(
keyAlgorithm
.
equalsIgnoreCase
(
"ECDSA"
))
{
keyAlgorithm
=
"EC"
;
}
}
return
keyAlgorithm
;
}
/**
* Extracts the digest algorithm name from a signature
* algorithm name.
*/
public
static
String
getDigAlgFromSigAlg
(
String
signatureAlgorithm
)
{
signatureAlgorithm
=
signatureAlgorithm
.
toUpperCase
(
Locale
.
ENGLISH
);
int
with
=
signatureAlgorithm
.
indexOf
(
"WITH"
);
if
(
with
>
0
)
{
return
signatureAlgorithm
.
substring
(
0
,
with
);
}
return
null
;
}
}
jdk/src/share/classes/sun/tools/jar/SignatureFile.java
浏览文件 @
e066868a
/*
* Copyright 1996-200
3
Sun Microsystems, Inc. All Rights Reserved.
* Copyright 1996-200
9
Sun Microsystems, Inc. All Rights Reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
...
...
@@ -34,6 +34,7 @@ import sun.misc.BASE64Encoder;
import
sun.misc.BASE64Decoder
;
import
sun.security.pkcs.*
;
import
sun.security.x509.AlgorithmId
;
/**
* <p>A signature file as defined in the <a
...
...
@@ -103,7 +104,7 @@ public class SignatureFile {
if
(
name
.
length
()
>
8
||
name
.
indexOf
(
'.'
)
!=
-
1
)
{
throw
new
JarException
(
"invalid file name"
);
}
rawName
=
name
.
toUpperCase
();
rawName
=
name
.
toUpperCase
(
Locale
.
ENGLISH
);
}
}
...
...
@@ -217,7 +218,8 @@ public class SignatureFile {
if
(
signatureBlock
!=
null
)
{
SignerInfo
info
=
signatureBlock
.
getSignerInfos
()[
0
];
suffix
=
info
.
getDigestEncryptionAlgorithmId
().
getName
();
suffix
=
suffix
.
substring
(
suffix
.
length
()
-
3
);
String
temp
=
AlgorithmId
.
getEncAlgFromSigAlg
(
suffix
);
if
(
temp
!=
null
)
suffix
=
temp
;
}
return
"META-INF/"
+
rawName
+
"."
+
suffix
;
}
...
...
jdk/test/sun/security/tools/jarsigner/ec.sh
0 → 100644
浏览文件 @
e066868a
#
# Copyright 2009 Sun Microsystems, Inc. All Rights Reserved.
# DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
#
# This code is free software; you can redistribute it and/or modify it
# under the terms of the GNU General Public License version 2 only, as
# published by the Free Software Foundation.
#
# This code is distributed in the hope that it will be useful, but WITHOUT
# ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
# FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
# version 2 for more details (a copy is included in the LICENSE file that
# accompanied this code).
#
# You should have received a copy of the GNU General Public License version
# 2 along with this work; if not, write to the Free Software Foundation,
# Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#
# Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
# CA 95054 USA or visit www.sun.com if you need additional information or
# have any questions.
#
# @test
# @bug 6870812
# @summary enhance security tools to use ECC algorithm
#
if
[
"
${
TESTJAVA
}
"
=
""
]
;
then
JAVAC_CMD
=
`
which javac
`
TESTJAVA
=
`
dirname
$JAVAC_CMD
`
/..
fi
# set platform-dependent variables
OS
=
`
uname
-s
`
case
"
$OS
"
in
Windows_
*
)
FS
=
"
\\
"
;;
*
)
FS
=
"/"
;;
esac
KS
=
ec.jks
JFILE
=
ec.jar
KT
=
"
$TESTJAVA
${
FS
}
bin
${
FS
}
keytool -storepass changeit -keypass changeit -keystore
$KS
"
JAR
=
$TESTJAVA
${
FS
}
bin
${
FS
}
jar
JARSIGNER
=
$TESTJAVA
${
FS
}
bin
${
FS
}
jarsigner
rm
$KS
$JFILE
echo
A
>
A
$JAR
cvf
$JFILE
A
$KT
-alias
a
-dname
CN
=
a
-keyalg
ec
-genkey
-validity
300
||
exit
11
$KT
-alias
b
-dname
CN
=
b
-keyalg
ec
-genkey
-validity
300
||
exit
12
$KT
-alias
c
-dname
CN
=
c
-keyalg
ec
-genkey
-validity
300
||
exit
13
$KT
-alias
x
-dname
CN
=
x
-keyalg
ec
-genkey
-validity
300
||
exit
14
$JARSIGNER
-keystore
$KS
-storepass
changeit
$JFILE
a
-debug
-strict
||
exit
21
$JARSIGNER
-keystore
$KS
-storepass
changeit
$JFILE
b
-debug
-strict
-sigalg
SHA1withECDSA
||
exit
22
$JARSIGNER
-keystore
$KS
-storepass
changeit
$JFILE
c
-debug
-strict
-sigalg
SHA512withECDSA
||
exit
23
$JARSIGNER
-keystore
$KS
-storepass
changeit
-verify
$JFILE
a
-debug
-strict
||
exit
31
$JARSIGNER
-keystore
$KS
-storepass
changeit
-verify
$JFILE
b
-debug
-strict
||
exit
32
$JARSIGNER
-keystore
$KS
-storepass
changeit
-verify
$JFILE
c
-debug
-strict
||
exit
33
# Not signed by x, should exit with non-zero
$JARSIGNER
-keystore
$KS
-storepass
changeit
-verify
$JFILE
x
-debug
-strict
&&
exit
34
exit
0
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录