提交 9e158684 编写于 作者: X xuelei

6882437: CertPath/X509CertPathDiscovery/Test fails on jdk7/pit/b62

Summary: Pass trust anchors to CRL certification path building, support CRLs without AKID extension.
Reviewed-by: mullan
上级 4a0dafcc
/* /*
* Copyright (c) 2000, 2009, Oracle and/or its affiliates. All rights reserved. * Copyright (c) 2000, 2011, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
* *
* This code is free software; you can redistribute it and/or modify it * This code is free software; you can redistribute it and/or modify it
...@@ -249,7 +249,7 @@ class CrlRevocationChecker extends PKIXCertPathChecker { ...@@ -249,7 +249,7 @@ class CrlRevocationChecker extends PKIXCertPathChecker {
throws CertPathValidatorException throws CertPathValidatorException
{ {
verifyRevocationStatus(currCert, prevKey, signFlag, verifyRevocationStatus(currCert, prevKey, signFlag,
allowSeparateKey, null); allowSeparateKey, null, mParams.getTrustAnchors());
} }
/** /**
...@@ -260,11 +260,12 @@ class CrlRevocationChecker extends PKIXCertPathChecker { ...@@ -260,11 +260,12 @@ class CrlRevocationChecker extends PKIXCertPathChecker {
* circular dependencies, we assume they're * circular dependencies, we assume they're
* revoked while checking the revocation * revoked while checking the revocation
* status of this cert. * status of this cert.
* @param trustAnchors a <code>Set</code> of <code>TrustAnchor</code>s
*/ */
private void verifyRevocationStatus(X509Certificate currCert, private void verifyRevocationStatus(X509Certificate currCert,
PublicKey prevKey, boolean signFlag, boolean allowSeparateKey, PublicKey prevKey, boolean signFlag, boolean allowSeparateKey,
Set<X509Certificate> stackedCerts) throws CertPathValidatorException Set<X509Certificate> stackedCerts,
{ Set<TrustAnchor> trustAnchors) throws CertPathValidatorException {
String msg = "revocation status"; String msg = "revocation status";
if (debug != null) { if (debug != null) {
...@@ -311,7 +312,7 @@ class CrlRevocationChecker extends PKIXCertPathChecker { ...@@ -311,7 +312,7 @@ class CrlRevocationChecker extends PKIXCertPathChecker {
DistributionPointFetcher.getInstance(); DistributionPointFetcher.getInstance();
// all CRLs returned by the DP Fetcher have also been verified // all CRLs returned by the DP Fetcher have also been verified
mApprovedCRLs.addAll(store.getCRLs(sel, signFlag, prevKey, mApprovedCRLs.addAll(store.getCRLs(sel, signFlag, prevKey,
mSigProvider, mStores, reasonsMask, mAnchor)); mSigProvider, mStores, reasonsMask, trustAnchors));
} catch (Exception e) { } catch (Exception e) {
if (debug != null) { if (debug != null) {
debug.println("CrlRevocationChecker.verifyRevocationStatus() " debug.println("CrlRevocationChecker.verifyRevocationStatus() "
...@@ -328,7 +329,7 @@ class CrlRevocationChecker extends PKIXCertPathChecker { ...@@ -328,7 +329,7 @@ class CrlRevocationChecker extends PKIXCertPathChecker {
// Now that we have a list of possible CRLs, see which ones can // Now that we have a list of possible CRLs, see which ones can
// be approved // be approved
mApprovedCRLs.addAll(verifyPossibleCRLs(mPossibleCRLs, currCert, mApprovedCRLs.addAll(verifyPossibleCRLs(mPossibleCRLs, currCert,
signFlag, prevKey, reasonsMask)); signFlag, prevKey, reasonsMask, trustAnchors));
} }
if (debug != null) { if (debug != null) {
debug.println("CrlRevocationChecker.verifyRevocationStatus() " + debug.println("CrlRevocationChecker.verifyRevocationStatus() " +
...@@ -353,9 +354,10 @@ class CrlRevocationChecker extends PKIXCertPathChecker { ...@@ -353,9 +354,10 @@ class CrlRevocationChecker extends PKIXCertPathChecker {
// See if the cert is in the set of approved crls. // See if the cert is in the set of approved crls.
if (debug != null) { if (debug != null) {
BigInteger sn = currCert.getSerialNumber(); BigInteger sn = currCert.getSerialNumber();
debug.println("starting the final sweep..."); debug.println("CrlRevocationChecker.verifyRevocationStatus() " +
"starting the final sweep...");
debug.println("CrlRevocationChecker.verifyRevocationStatus" + debug.println("CrlRevocationChecker.verifyRevocationStatus" +
" cert SN: " + sn.toString()); " cert SN: " + sn.toString());
} }
CRLReason reasonCode = CRLReason.UNSPECIFIED; CRLReason reasonCode = CRLReason.UNSPECIFIED;
...@@ -497,9 +499,9 @@ class CrlRevocationChecker extends PKIXCertPathChecker { ...@@ -497,9 +499,9 @@ class CrlRevocationChecker extends PKIXCertPathChecker {
certSel.setSubject(currCert.getIssuerX500Principal()); certSel.setSubject(currCert.getIssuerX500Principal());
certSel.setKeyUsage(mCrlSignUsage); certSel.setKeyUsage(mCrlSignUsage);
Set<TrustAnchor> newAnchors = mAnchor == null Set<TrustAnchor> newAnchors =
? mParams.getTrustAnchors() (mAnchor == null ? mParams.getTrustAnchors() :
: Collections.singleton(mAnchor); Collections.singleton(mAnchor));
PKIXBuilderParameters builderParams; PKIXBuilderParameters builderParams;
if (mParams instanceof PKIXBuilderParameters) { if (mParams instanceof PKIXBuilderParameters) {
...@@ -617,8 +619,8 @@ class CrlRevocationChecker extends PKIXCertPathChecker { ...@@ -617,8 +619,8 @@ class CrlRevocationChecker extends PKIXCertPathChecker {
debug.println("CrlRevocationChecker.buildToNewKey()" debug.println("CrlRevocationChecker.buildToNewKey()"
+ " index " + i + " checking " + cert); + " index " + i + " checking " + cert);
} }
verifyRevocationStatus(cert, prevKey2, signFlag, verifyRevocationStatus(cert, prevKey2, signFlag, true,
true, stackedCerts); stackedCerts, newAnchors);
signFlag = certCanSignCrl(cert); signFlag = certCanSignCrl(cert);
prevKey2 = cert.getPublicKey(); prevKey2 = cert.getPublicKey();
} }
...@@ -727,12 +729,14 @@ class CrlRevocationChecker extends PKIXCertPathChecker { ...@@ -727,12 +729,14 @@ class CrlRevocationChecker extends PKIXCertPathChecker {
* @param signFlag <code>true</code> if prevKey was trusted to sign CRLs * @param signFlag <code>true</code> if prevKey was trusted to sign CRLs
* @param prevKey the public key of the issuer of cert * @param prevKey the public key of the issuer of cert
* @param reasonsMask the reason code mask * @param reasonsMask the reason code mask
* @param trustAnchors a <code>Set</code> of <code>TrustAnchor</code>s>
* @return a collection of approved crls (or an empty collection) * @return a collection of approved crls (or an empty collection)
*/ */
private Collection<X509CRL> verifyPossibleCRLs(Set<X509CRL> crls, private Collection<X509CRL> verifyPossibleCRLs(Set<X509CRL> crls,
X509Certificate cert, boolean signFlag, PublicKey prevKey, X509Certificate cert, boolean signFlag, PublicKey prevKey,
boolean[] reasonsMask) throws CertPathValidatorException boolean[] reasonsMask,
{ Set<TrustAnchor> trustAnchors) throws CertPathValidatorException {
try { try {
X509CertImpl certImpl = X509CertImpl.toImpl(cert); X509CertImpl certImpl = X509CertImpl.toImpl(cert);
if (debug != null) { if (debug != null) {
...@@ -764,7 +768,8 @@ class CrlRevocationChecker extends PKIXCertPathChecker { ...@@ -764,7 +768,8 @@ class CrlRevocationChecker extends PKIXCertPathChecker {
DistributionPoint point = t.next(); DistributionPoint point = t.next();
for (X509CRL crl : crls) { for (X509CRL crl : crls) {
if (dpf.verifyCRL(certImpl, point, crl, reasonsMask, if (dpf.verifyCRL(certImpl, point, crl, reasonsMask,
signFlag, prevKey, mSigProvider, mAnchor, mStores)) { signFlag, prevKey, mSigProvider,
trustAnchors, mStores)) {
results.add(crl); results.add(crl);
} }
} }
......
...@@ -90,8 +90,9 @@ class DistributionPointFetcher { ...@@ -90,8 +90,9 @@ class DistributionPointFetcher {
*/ */
Collection<X509CRL> getCRLs(X509CRLSelector selector, boolean signFlag, Collection<X509CRL> getCRLs(X509CRLSelector selector, boolean signFlag,
PublicKey prevKey, String provider, List<CertStore> certStores, PublicKey prevKey, String provider, List<CertStore> certStores,
boolean[] reasonsMask, TrustAnchor anchor) throws CertStoreException boolean[] reasonsMask,
{ Set<TrustAnchor> trustAnchors) throws CertStoreException {
if (USE_CRLDP == false) { if (USE_CRLDP == false) {
return Collections.emptySet(); return Collections.emptySet();
} }
...@@ -121,7 +122,7 @@ class DistributionPointFetcher { ...@@ -121,7 +122,7 @@ class DistributionPointFetcher {
DistributionPoint point = t.next(); DistributionPoint point = t.next();
Collection<X509CRL> crls = getCRLs(selector, certImpl, Collection<X509CRL> crls = getCRLs(selector, certImpl,
point, reasonsMask, signFlag, prevKey, provider, point, reasonsMask, signFlag, prevKey, provider,
certStores, anchor); certStores, trustAnchors);
results.addAll(crls); results.addAll(crls);
} }
if (debug != null) { if (debug != null) {
...@@ -142,8 +143,8 @@ class DistributionPointFetcher { ...@@ -142,8 +143,8 @@ class DistributionPointFetcher {
private Collection<X509CRL> getCRLs(X509CRLSelector selector, private Collection<X509CRL> getCRLs(X509CRLSelector selector,
X509CertImpl certImpl, DistributionPoint point, boolean[] reasonsMask, X509CertImpl certImpl, DistributionPoint point, boolean[] reasonsMask,
boolean signFlag, PublicKey prevKey, String provider, boolean signFlag, PublicKey prevKey, String provider,
List<CertStore> certStores, TrustAnchor anchor) List<CertStore> certStores, Set<TrustAnchor> trustAnchors) {
{
// check for full name // check for full name
GeneralNames fullName = point.getFullName(); GeneralNames fullName = point.getFullName();
if (fullName == null) { if (fullName == null) {
...@@ -194,7 +195,7 @@ class DistributionPointFetcher { ...@@ -194,7 +195,7 @@ class DistributionPointFetcher {
// we check the issuer in verifyCRLs method // we check the issuer in verifyCRLs method
selector.setIssuerNames(null); selector.setIssuerNames(null);
if (selector.match(crl) && verifyCRL(certImpl, point, crl, if (selector.match(crl) && verifyCRL(certImpl, point, crl,
reasonsMask, signFlag, prevKey, provider, anchor, reasonsMask, signFlag, prevKey, provider, trustAnchors,
certStores)) { certStores)) {
crls.add(crl); crls.add(crl);
} }
...@@ -276,12 +277,17 @@ class DistributionPointFetcher { ...@@ -276,12 +277,17 @@ class DistributionPointFetcher {
* @param signFlag true if prevKey can be used to verify the CRL * @param signFlag true if prevKey can be used to verify the CRL
* @param prevKey the public key that verifies the certificate's signature * @param prevKey the public key that verifies the certificate's signature
* @param provider the Signature provider to use * @param provider the Signature provider to use
* @param trustAnchors a {@code Set} of {@code TrustAnchor}s
* @param certStores a {@code List} of {@code CertStore}s to be used in
* finding certificates and CRLs
* @return true if ok, false if not * @return true if ok, false if not
*/ */
boolean verifyCRL(X509CertImpl certImpl, DistributionPoint point, boolean verifyCRL(X509CertImpl certImpl, DistributionPoint point,
X509CRL crl, boolean[] reasonsMask, boolean signFlag, X509CRL crl, boolean[] reasonsMask, boolean signFlag,
PublicKey prevKey, String provider, TrustAnchor anchor, PublicKey prevKey, String provider,
Set<TrustAnchor> trustAnchors,
List<CertStore> certStores) throws CRLException, IOException { List<CertStore> certStores) throws CRLException, IOException {
boolean indirectCRL = false; boolean indirectCRL = false;
X509CRLImpl crlImpl = X509CRLImpl.toImpl(crl); X509CRLImpl crlImpl = X509CRLImpl.toImpl(crl);
IssuingDistributionPointExtension idpExt = IssuingDistributionPointExtension idpExt =
...@@ -335,7 +341,16 @@ class DistributionPointFetcher { ...@@ -335,7 +341,16 @@ class DistributionPointFetcher {
byte[] crlAKID = crlImpl.getExtensionValue( byte[] crlAKID = crlImpl.getExtensionValue(
PKIXExtensions.AuthorityKey_Id.toString()); PKIXExtensions.AuthorityKey_Id.toString());
if (!Arrays.equals(certAKID, crlAKID)) { if (certAKID == null || crlAKID == null) {
// cannot recognize indirect CRL without AKID
// we accept the case that a CRL issuer provide status
// information for itself.
if (issues(certImpl, crlImpl, provider)) {
// reset the public key used to verify the CRL's signature
prevKey = certImpl.getPublicKey();
}
} else if (!Arrays.equals(certAKID, crlAKID)) {
// we accept the case that a CRL issuer provide status // we accept the case that a CRL issuer provide status
// information for itself. // information for itself.
if (issues(certImpl, crlImpl, provider)) { if (issues(certImpl, crlImpl, provider)) {
...@@ -572,46 +587,19 @@ class DistributionPointFetcher { ...@@ -572,46 +587,19 @@ class DistributionPointFetcher {
// Except the performance improvement, another benefit is to break // Except the performance improvement, another benefit is to break
// the dead loop while looking for the issuer back and forth // the dead loop while looking for the issuer back and forth
// between the delegated self-issued certificate and its issuer. // between the delegated self-issued certificate and its issuer.
Set<TrustAnchor> trustAnchors = new HashSet<TrustAnchor>(); Set<TrustAnchor> newTrustAnchors = new HashSet<>(trustAnchors);
if (anchor != null) {
trustAnchors.add(anchor);
}
if (prevKey != null) { if (prevKey != null) {
// if the previous key is of the anchor, don't bother to // Add the previous certificate as a trust anchor.
// duplicate the trust.
boolean duplicated = false;
PublicKey publicKey = prevKey;
X500Principal principal = certImpl.getIssuerX500Principal(); X500Principal principal = certImpl.getIssuerX500Principal();
TrustAnchor temporary =
if (anchor != null) { new TrustAnchor(principal, prevKey, null);
X509Certificate trustedCert = anchor.getTrustedCert(); newTrustAnchors.add(temporary);
X500Principal trustedPrincipal;
PublicKey trustedPublicKey;
if (trustedCert != null) {
trustedPrincipal = trustedCert.getSubjectX500Principal();
trustedPublicKey = trustedCert.getPublicKey();
} else {
trustedPrincipal = anchor.getCA();
trustedPublicKey = anchor.getCAPublicKey();
}
if (principal.equals(trustedPrincipal) &&
publicKey.equals(trustedPublicKey)) {
duplicated = true;
}
}
if (!duplicated) {
TrustAnchor temporary =
new TrustAnchor(principal, publicKey, null);
trustAnchors.add(temporary);
}
} }
PKIXBuilderParameters params = null; PKIXBuilderParameters params = null;
try { try {
params = new PKIXBuilderParameters(trustAnchors, certSel); params = new PKIXBuilderParameters(newTrustAnchors, certSel);
} catch (InvalidAlgorithmParameterException iape) { } catch (InvalidAlgorithmParameterException iape) {
throw new CRLException(iape); throw new CRLException(iape);
} }
...@@ -697,6 +685,8 @@ class DistributionPointFetcher { ...@@ -697,6 +685,8 @@ class DistributionPointFetcher {
private static boolean issues(X509CertImpl cert, X509CRLImpl crl, private static boolean issues(X509CertImpl cert, X509CRLImpl crl,
String provider) throws IOException { String provider) throws IOException {
boolean matched = false;
AdaptableX509CertSelector issuerSelector = AdaptableX509CertSelector issuerSelector =
new AdaptableX509CertSelector(); new AdaptableX509CertSelector();
...@@ -719,9 +709,24 @@ class DistributionPointFetcher { ...@@ -719,9 +709,24 @@ class DistributionPointFetcher {
* and MUST include authority key identifier extension in all CRLs * and MUST include authority key identifier extension in all CRLs
* issued. [section 5.2.1, RFC 2459] * issued. [section 5.2.1, RFC 2459]
*/ */
issuerSelector.parseAuthorityKeyIdentifierExtension( AuthorityKeyIdentifierExtension crlAKID = crl.getAuthKeyIdExtension();
crl.getAuthKeyIdExtension()); if (crlAKID != null) {
issuerSelector.parseAuthorityKeyIdentifierExtension(crlAKID);
}
matched = issuerSelector.match(cert);
// if AKID is unreliable, verify the CRL signature with the cert
if (matched && (crlAKID == null ||
cert.getAuthorityKeyIdentifierExtension() == null)) {
try {
crl.verify(cert.getPublicKey(), provider);
matched = true;
} catch (Exception e) {
matched = false;
}
}
return issuerSelector.match(cert); return matched;
} }
} }
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册