mirror of
https://github.com/openjdk/jdk.git
synced 2026-04-18 10:50:23 +00:00
8010125: keytool -importkeystore could create a pkcs12 keystore with different storepass and keypass
Reviewed-by: vinnie
This commit is contained in:
parent
d891c7c560
commit
4a64ecdf42
@ -1832,9 +1832,9 @@ public final class Main {
|
||||
if (alias != null) {
|
||||
doImportKeyStoreSingle(loadSourceKeyStore(), alias);
|
||||
} else {
|
||||
if (dest != null || srckeyPass != null || destKeyPass != null) {
|
||||
if (dest != null || srckeyPass != null) {
|
||||
throw new Exception(rb.getString(
|
||||
"if.alias.not.specified.destalias.srckeypass.and.destkeypass.must.not.be.specified"));
|
||||
"if.alias.not.specified.destalias.and.srckeypass.must.not.be.specified"));
|
||||
}
|
||||
doImportKeyStoreAll(loadSourceKeyStore());
|
||||
}
|
||||
@ -1888,14 +1888,25 @@ public final class Main {
|
||||
// using destkeypass. If destkeypass is not provided, the destination
|
||||
// entry will be protected with the source entry password."
|
||||
// so always try to protect with destKeyPass.
|
||||
char[] newPass = null;
|
||||
if (destKeyPass != null) {
|
||||
newPass = destKeyPass;
|
||||
pp = new PasswordProtection(destKeyPass);
|
||||
} else if (objs.snd != null) {
|
||||
newPass = objs.snd;
|
||||
pp = new PasswordProtection(objs.snd);
|
||||
}
|
||||
|
||||
try {
|
||||
keyStore.setEntry(newAlias, entry, pp);
|
||||
// Place the check so that only successful imports are blocked.
|
||||
// For example, we don't block a failed SecretEntry import.
|
||||
if (P12KEYSTORE.equalsIgnoreCase(storetype)) {
|
||||
if (newPass != null && !Arrays.equals(newPass, storePass)) {
|
||||
throw new Exception(rb.getString(
|
||||
"The.destination.pkcs12.keystore.has.different.storepass.and.keypass.Please.retry.with.destkeypass.specified."));
|
||||
}
|
||||
}
|
||||
return 1;
|
||||
} catch (KeyStoreException kse) {
|
||||
Object[] source2 = {alias, kse.toString()};
|
||||
|
||||
@ -242,8 +242,10 @@ public class Resources extends java.util.ListResourceBundle {
|
||||
{"Certification.request.stored.in.file.filename.",
|
||||
"Certification request stored in file <{0}>"},
|
||||
{"Submit.this.to.your.CA", "Submit this to your CA"},
|
||||
{"if.alias.not.specified.destalias.srckeypass.and.destkeypass.must.not.be.specified",
|
||||
"if alias not specified, destalias, srckeypass, and destkeypass must not be specified"},
|
||||
{"if.alias.not.specified.destalias.and.srckeypass.must.not.be.specified",
|
||||
"if alias not specified, destalias and srckeypass must not be specified"},
|
||||
{"The.destination.pkcs12.keystore.has.different.storepass.and.keypass.Please.retry.with.destkeypass.specified.",
|
||||
"The destination pkcs12 keystore has different storepass and keypass. Please retry with -destkeypass specified."},
|
||||
{"Certificate.stored.in.file.filename.",
|
||||
"Certificate stored in file <{0}>"},
|
||||
{"Certificate.reply.was.installed.in.keystore",
|
||||
|
||||
118
jdk/test/sun/security/tools/keytool/p12importks.sh
Normal file
118
jdk/test/sun/security/tools/keytool/p12importks.sh
Normal file
@ -0,0 +1,118 @@
|
||||
#
|
||||
# Copyright (c) 2013, Oracle and/or its affiliates. All rights reserved.
|
||||
# DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
#
|
||||
# This code is free software; you can redistribute it and/or modify it
|
||||
# under the terms of the GNU General Public License version 2 only, as
|
||||
# published by the Free Software Foundation.
|
||||
#
|
||||
# This code is distributed in the hope that it will be useful, but WITHOUT
|
||||
# ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
||||
# FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||
# version 2 for more details (a copy is included in the LICENSE file that
|
||||
# accompanied this code).
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License version
|
||||
# 2 along with this work; if not, write to the Free Software Foundation,
|
||||
# Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||
#
|
||||
# Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
|
||||
# or visit www.oracle.com if you need additional information or have any
|
||||
# questions.
|
||||
#
|
||||
|
||||
# @test
|
||||
# @bug 8010125
|
||||
# @summary keytool -importkeystore could create a pkcs12 keystore with
|
||||
# different storepass and keypass
|
||||
#
|
||||
|
||||
if [ "${TESTJAVA}" = "" ] ; then
|
||||
JAVAC_CMD=`which javac`
|
||||
TESTJAVA=`dirname $JAVAC_CMD`/..
|
||||
fi
|
||||
|
||||
# set platform-dependent variables
|
||||
OS=`uname -s`
|
||||
case "$OS" in
|
||||
Windows_* )
|
||||
FS="\\"
|
||||
;;
|
||||
* )
|
||||
FS="/"
|
||||
;;
|
||||
esac
|
||||
|
||||
LANG=C
|
||||
KT=$TESTJAVA${FS}bin${FS}keytool
|
||||
|
||||
# Part 1: JKS keystore with same storepass and keypass
|
||||
|
||||
rm jks 2> /dev/null
|
||||
$KT -genkeypair -keystore jks -storetype jks -alias me -dname CN=Me \
|
||||
-storepass pass1111 -keypass pass1111 || exit 11
|
||||
|
||||
# Cannot only change storepass
|
||||
rm p12 2> /dev/null
|
||||
$KT -importkeystore -noprompt \
|
||||
-srcstoretype jks -srckeystore jks -destkeystore p12 -deststoretype pkcs12 \
|
||||
-srcstorepass pass1111 \
|
||||
-deststorepass pass2222 \
|
||||
&& exit 12
|
||||
|
||||
# You can keep storepass unchanged
|
||||
rm p12 2> /dev/null
|
||||
$KT -importkeystore -noprompt \
|
||||
-srcstoretype jks -srckeystore jks -destkeystore p12 -deststoretype pkcs12 \
|
||||
-srcstorepass pass1111 \
|
||||
-deststorepass pass1111 \
|
||||
|| exit 13
|
||||
$KT -certreq -storetype pkcs12 -keystore p12 -alias me \
|
||||
-storepass pass1111 -keypass pass1111 || exit 14
|
||||
|
||||
# Or change storepass and keypass both
|
||||
rm p12 2> /dev/null
|
||||
$KT -importkeystore -noprompt \
|
||||
-srcstoretype jks -srckeystore jks -destkeystore p12 -deststoretype pkcs12 \
|
||||
-srcstorepass pass1111 \
|
||||
-deststorepass pass2222 -destkeypass pass2222 \
|
||||
|| exit 15
|
||||
$KT -certreq -storetype pkcs12 -keystore p12 -alias me \
|
||||
-storepass pass2222 -keypass pass2222 || exit 16
|
||||
|
||||
# Part 2: JKS keystore with different storepass and keypass
|
||||
# Must import by alias (-srckeypass is not available when importing all)
|
||||
|
||||
rm jks 2> /dev/null
|
||||
$KT -genkeypair -keystore jks -storetype jks -alias me -dname CN=Me \
|
||||
-storepass pass1111 -keypass pass2222 || exit 21
|
||||
|
||||
# Can use old keypass as new storepass so new storepass and keypass are same
|
||||
rm p12 2> /dev/null
|
||||
$KT -importkeystore -noprompt -srcalias me \
|
||||
-srcstoretype jks -srckeystore jks -destkeystore p12 -deststoretype pkcs12 \
|
||||
-srcstorepass pass1111 -srckeypass pass2222 \
|
||||
-deststorepass pass2222 \
|
||||
|| exit 22
|
||||
$KT -certreq -storetype pkcs12 -keystore p12 -alias me \
|
||||
-storepass pass2222 -keypass pass2222 || exit 23
|
||||
|
||||
# Or specify both storepass and keypass to brand new ones
|
||||
rm p12 2> /dev/null
|
||||
$KT -importkeystore -noprompt -srcalias me \
|
||||
-srcstoretype jks -srckeystore jks -destkeystore p12 -deststoretype pkcs12 \
|
||||
-srcstorepass pass1111 -srckeypass pass2222 \
|
||||
-deststorepass pass3333 -destkeypass pass3333 \
|
||||
|| exit 24
|
||||
$KT -certreq -storetype pkcs12 -keystore p12 -alias me \
|
||||
-storepass pass3333 -keypass pass3333 || exit 25
|
||||
|
||||
# Anyway you cannot make new storepass and keypass different
|
||||
rm p12 2> /dev/null
|
||||
$KT -importkeystore -noprompt -srcalias me \
|
||||
-srcstoretype jks -srckeystore jks -destkeystore p12 -deststoretype pkcs12 \
|
||||
-srcstorepass pass1111 -srckeypass pass2222 \
|
||||
-deststorepass pass1111 \
|
||||
&& exit 26
|
||||
|
||||
exit 0
|
||||
Loading…
x
Reference in New Issue
Block a user