blob: 3fc5d86f423e7e13c5237ab36b39df2c9806397a [file] [log] [blame]
duke6e45e102007-12-01 00:00:00 +00001/*
vinnie45d0d272012-03-26 17:14:20 +01002 * Copyright (c) 2003, 2012, Oracle and/or its affiliates. All rights reserved.
duke6e45e102007-12-01 00:00:00 +00003 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
4 *
5 * This code is free software; you can redistribute it and/or modify it
6 * under the terms of the GNU General Public License version 2 only, as
7 * published by the Free Software Foundation.
8 *
9 * This code is distributed in the hope that it will be useful, but WITHOUT
10 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
11 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
12 * version 2 for more details (a copy is included in the LICENSE file that
13 * accompanied this code).
14 *
15 * You should have received a copy of the GNU General Public License version
16 * 2 along with this work; if not, write to the Free Software Foundation,
17 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
18 *
ohair2283b9d2010-05-25 15:58:33 -070019 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
20 * or visit www.oracle.com if you need additional information or have any
21 * questions.
duke6e45e102007-12-01 00:00:00 +000022 */
23
24
25// common infrastructure for SunPKCS11 tests
26
27import java.io.*;
28import java.util.*;
29import java.lang.reflect.*;
30
31import java.security.*;
32
33public abstract class PKCS11Test {
34
35 // directory of the test source
36 static final String BASE = System.getProperty("test.src", ".");
37
38 static final char SEP = File.separatorChar;
39
40 private final static String REL_CLOSED = "../../../../closed/sun/security/pkcs11".replace('/', SEP);
41
42 // directory corresponding to BASE in the /closed hierarchy
43 static final String CLOSED_BASE;
44
45 static {
46 // hack
47 String absBase = new File(BASE).getAbsolutePath();
48 int k = absBase.indexOf(SEP + "test" + SEP + "sun" + SEP);
49 if (k < 0) k = 0;
50 String p1 = absBase.substring(0, k + 6);
51 String p2 = absBase.substring(k + 5);
52 CLOSED_BASE = p1 + "closed" + p2;
53 }
54
55 static String NSPR_PREFIX = "";
56
57 static Provider getSunPKCS11(String config) throws Exception {
58 Class clazz = Class.forName("sun.security.pkcs11.SunPKCS11");
59 Constructor cons = clazz.getConstructor(new Class[] {String.class});
60 Object obj = cons.newInstance(new Object[] {config});
61 return (Provider)obj;
62 }
63
64 public abstract void main(Provider p) throws Exception;
65
66 private void premain(Provider p) throws Exception {
67 long start = System.currentTimeMillis();
68 System.out.println("Running test with provider " + p.getName() + "...");
69 main(p);
70 long stop = System.currentTimeMillis();
71 System.out.println("Completed test with provider " + p.getName() + " (" + (stop - start) + " ms).");
72 }
73
74 public static void main(PKCS11Test test) throws Exception {
weijundff52e62011-08-12 12:26:31 +080075 Provider[] oldProviders = Security.getProviders();
76 try {
77 System.out.println("Beginning test run " + test.getClass().getName() + "...");
78 testDefault(test);
79 testNSS(test);
80 testDeimos(test);
81 } finally {
82 Provider[] newProviders = Security.getProviders();
83 // Do not restore providers if nothing changed. This is especailly
84 // useful for ./Provider/Login.sh, where a SecurityManager exists.
85 if (oldProviders.length == newProviders.length) {
86 boolean found = false;
87 for (int i = 0; i<oldProviders.length; i++) {
88 if (oldProviders[i] != newProviders[i]) {
89 found = true;
90 break;
91 }
92 }
93 if (!found) return;
94 }
95 for (Provider p: newProviders) {
96 Security.removeProvider(p.getName());
97 }
98 for (Provider p: oldProviders) {
99 Security.addProvider(p);
100 }
101 }
duke6e45e102007-12-01 00:00:00 +0000102 }
103
104 public static void testDeimos(PKCS11Test test) throws Exception {
105 if (new File("/opt/SUNWconn/lib/libpkcs11.so").isFile() == false ||
106 "true".equals(System.getProperty("NO_DEIMOS"))) {
107 return;
108 }
109 String base = getBase();
110 String p11config = base + SEP + "nss" + SEP + "p11-deimos.txt";
111 Provider p = getSunPKCS11(p11config);
112 test.premain(p);
113 }
114
115 public static void testDefault(PKCS11Test test) throws Exception {
116 // run test for default configured PKCS11 providers (if any)
117
118 if ("true".equals(System.getProperty("NO_DEFAULT"))) {
119 return;
120 }
121
122 Provider[] providers = Security.getProviders();
123 for (int i = 0; i < providers.length; i++) {
124 Provider p = providers[i];
125 if (p.getName().startsWith("SunPKCS11-")) {
126 test.premain(p);
127 }
128 }
129 }
130
131 private static String PKCS11_BASE;
vinnie45d0d272012-03-26 17:14:20 +0100132 static {
133 try {
134 PKCS11_BASE = getBase();
135 } catch (Exception e) {
136 // ignore
137 }
138 }
duke6e45e102007-12-01 00:00:00 +0000139
140 private final static String PKCS11_REL_PATH = "sun/security/pkcs11";
141
142 public static String getBase() throws Exception {
143 if (PKCS11_BASE != null) {
144 return PKCS11_BASE;
145 }
146 File cwd = new File(System.getProperty("test.src", ".")).getCanonicalFile();
147 while (true) {
148 File file = new File(cwd, "TEST.ROOT");
149 if (file.isFile()) {
150 break;
151 }
152 cwd = cwd.getParentFile();
153 if (cwd == null) {
154 throw new Exception("Test root directory not found");
155 }
156 }
157 PKCS11_BASE = new File(cwd, PKCS11_REL_PATH.replace('/', SEP)).getAbsolutePath();
158 return PKCS11_BASE;
159 }
160
161 public static String getNSSLibDir() throws Exception {
162 Properties props = System.getProperties();
163 String osName = props.getProperty("os.name");
164 if (osName.startsWith("Win")) {
165 osName = "Windows";
166 NSPR_PREFIX = "lib";
167 }
168 String osid = osName + "-"
169 + props.getProperty("os.arch") + "-" + props.getProperty("sun.arch.data.model");
vinnie45d0d272012-03-26 17:14:20 +0100170 String nssLibDir = osMap.get(osid);
171 if (nssLibDir == null) {
duke6e45e102007-12-01 00:00:00 +0000172 System.out.println("Unsupported OS, skipping: " + osid);
173 return null;
vinnie45d0d272012-03-26 17:14:20 +0100174// throw new Exception("Unsupported OS " + osName);
duke6e45e102007-12-01 00:00:00 +0000175 }
vinnie45d0d272012-03-26 17:14:20 +0100176 if (nssLibDir.length() == 0) {
duke6e45e102007-12-01 00:00:00 +0000177 System.out.println("NSS not supported on this platform, skipping test");
178 return null;
179 }
vinnie45d0d272012-03-26 17:14:20 +0100180 System.setProperty("pkcs11test.nss.libdir", nssLibDir);
181 return nssLibDir;
duke6e45e102007-12-01 00:00:00 +0000182 }
183
weijundff52e62011-08-12 12:26:31 +0800184 protected static void safeReload(String lib) throws Exception {
185 try {
186 System.load(lib);
187 } catch (UnsatisfiedLinkError e) {
188 if (e.getMessage().contains("already loaded")) {
189 return;
190 }
191 }
192 }
193
duke6e45e102007-12-01 00:00:00 +0000194 static boolean loadNSPR(String libdir) throws Exception {
195 // load NSS softoken dependencies in advance to avoid resolver issues
weijundff52e62011-08-12 12:26:31 +0800196 safeReload(libdir + System.mapLibraryName(NSPR_PREFIX + "nspr4"));
197 safeReload(libdir + System.mapLibraryName(NSPR_PREFIX + "plc4"));
198 safeReload(libdir + System.mapLibraryName(NSPR_PREFIX + "plds4"));
vinnie45d0d272012-03-26 17:14:20 +0100199 safeReload(libdir + System.mapLibraryName("sqlite3"));
200 safeReload(libdir + System.mapLibraryName("nssutil3"));
duke6e45e102007-12-01 00:00:00 +0000201 return true;
202 }
203
204 public static void testNSS(PKCS11Test test) throws Exception {
205 String libdir = getNSSLibDir();
206 if (libdir == null) {
207 return;
208 }
209 String base = getBase();
210
211 if (loadNSPR(libdir) == false) {
212 return;
213 }
214
215 String libfile = libdir + System.mapLibraryName("softokn3");
216
217 String customDBdir = System.getProperty("CUSTOM_DB_DIR");
218 String dbdir = (customDBdir != null) ?
219 customDBdir :
220 base + SEP + "nss" + SEP + "db";
221 // NSS always wants forward slashes for the config path
222 dbdir = dbdir.replace('\\', '/');
223
224 String customConfig = System.getProperty("CUSTOM_P11_CONFIG");
225 String customConfigName = System.getProperty("CUSTOM_P11_CONFIG_NAME", "p11-nss.txt");
226 String p11config = (customConfig != null) ?
227 customConfig :
228 base + SEP + "nss" + SEP + customConfigName;
229
230 System.setProperty("pkcs11test.nss.lib", libfile);
231 System.setProperty("pkcs11test.nss.db", dbdir);
232 Provider p = getSunPKCS11(p11config);
233 test.premain(p);
234 }
235
236
237 private static final Map<String,String> osMap;
238
vinnie45d0d272012-03-26 17:14:20 +0100239 // Location of the NSS libraries on each supported platform
duke6e45e102007-12-01 00:00:00 +0000240 static {
241 osMap = new HashMap<String,String>();
vinnie45d0d272012-03-26 17:14:20 +0100242 osMap.put("SunOS-sparc-32", "/usr/lib/mps/");
243 osMap.put("SunOS-sparcv9-64", "/usr/lib/mps/64/");
244 osMap.put("SunOS-x86-32", "/usr/lib/mps/");
245 osMap.put("SunOS-amd64-64", "/usr/lib/mps/64/");
246 osMap.put("Linux-i386-32", "/usr/lib/");
247 osMap.put("Linux-amd64-64", "/usr/lib64/");
vinnie78765322012-07-16 22:38:49 +0100248 osMap.put("Windows-x86-32",
249 PKCS11_BASE + "/nss/lib/windows-i586/".replace('/', SEP));
250 osMap.put("Windows-amd64-64",
251 PKCS11_BASE + "/nss/lib/windows-amd64/".replace('/', SEP));
duke6e45e102007-12-01 00:00:00 +0000252 }
253
254 private final static char[] hexDigits = "0123456789abcdef".toCharArray();
255
256 public static String toString(byte[] b) {
257 if (b == null) {
258 return "(null)";
259 }
260 StringBuffer sb = new StringBuffer(b.length * 3);
261 for (int i = 0; i < b.length; i++) {
262 int k = b[i] & 0xff;
263 if (i != 0) {
264 sb.append(':');
265 }
266 sb.append(hexDigits[k >>> 4]);
267 sb.append(hexDigits[k & 0xf]);
268 }
269 return sb.toString();
270 }
271
272 public static byte[] parse(String s) {
273 if (s.equals("(null)")) {
274 return null;
275 }
276 try {
277 int n = s.length();
278 ByteArrayOutputStream out = new ByteArrayOutputStream(n / 3);
279 StringReader r = new StringReader(s);
280 while (true) {
281 int b1 = nextNibble(r);
282 if (b1 < 0) {
283 break;
284 }
285 int b2 = nextNibble(r);
286 if (b2 < 0) {
287 throw new RuntimeException("Invalid string " + s);
288 }
289 int b = (b1 << 4) | b2;
290 out.write(b);
291 }
292 return out.toByteArray();
293 } catch (IOException e) {
294 throw new RuntimeException(e);
295 }
296 }
297
298 private static int nextNibble(StringReader r) throws IOException {
299 while (true) {
300 int ch = r.read();
301 if (ch == -1) {
302 return -1;
303 } else if ((ch >= '0') && (ch <= '9')) {
304 return ch - '0';
305 } else if ((ch >= 'a') && (ch <= 'f')) {
306 return ch - 'a' + 10;
307 } else if ((ch >= 'A') && (ch <= 'F')) {
308 return ch - 'A' + 10;
309 }
310 }
311 }
312
313 <T> T[] concat(T[] a, T[] b) {
314 if ((b == null) || (b.length == 0)) {
315 return a;
316 }
317 T[] r = (T[])java.lang.reflect.Array.newInstance(a.getClass().getComponentType(), a.length + b.length);
318 System.arraycopy(a, 0, r, 0, a.length);
319 System.arraycopy(b, 0, r, a.length, b.length);
320 return r;
321 }
322
323}