47
47
import java .util .stream .Collectors ;
48
48
import java .util .stream .Stream ;
49
49
50
+ import sun .security .jca .ProviderList ;
51
+ import sun .security .jca .Providers ;
50
52
import sun .security .util .Debug ;
51
53
52
54
/**
@@ -79,6 +81,8 @@ public final class RestrictedSecurity {
79
81
80
82
private static RestrictedSecurityProperties restricts ;
81
83
84
+ private static boolean profileHashChecked = false ;
85
+
82
86
private static final Set <String > unmodifiableProperties = new HashSet <>();
83
87
84
88
private static final Map <String , List <String >> supportedPlatformsNSS = new HashMap <>();
@@ -202,6 +206,11 @@ public static String getRandomProvider() {
202
206
printStackTraceAndExit (
203
207
"Restricted security mode secure random provider can only be used when restricted security mode is enabled." );
204
208
}
209
+
210
+ if (!profileHashChecked ) {
211
+ profileHashChecked = true ;
212
+ checkHashValues ();
213
+ }
205
214
return restricts .jdkSecureRandomProvider ;
206
215
}
207
216
@@ -218,6 +227,10 @@ public static String getRandomAlgorithm() {
218
227
printStackTraceAndExit (
219
228
"Restricted security mode secure random algorithm can only be used when restricted security mode is enabled." );
220
229
}
230
+ if (!profileHashChecked ) {
231
+ profileHashChecked = true ;
232
+ checkHashValues ();
233
+ }
221
234
return restricts .jdkSecureRandomAlgorithm ;
222
235
}
223
236
@@ -231,6 +244,10 @@ public static String getRandomAlgorithm() {
231
244
*/
232
245
public static boolean isFIPSEnabled () {
233
246
if (securityEnabled ) {
247
+ if (!profileHashChecked ) {
248
+ profileHashChecked = true ;
249
+ checkHashValues ();
250
+ }
234
251
return isFIPSEnabled ;
235
252
}
236
253
return false ;
@@ -244,6 +261,10 @@ public static boolean isFIPSEnabled() {
244
261
*/
245
262
public static boolean isServiceAllowed (Service service ) {
246
263
if (securityEnabled ) {
264
+ if (!(profileHashChecked || isJarVerifierinStackTrace ())) {
265
+ profileHashChecked = true ;
266
+ checkHashValues ();
267
+ }
247
268
return restricts .isRestrictedServiceAllowed (service , true );
248
269
}
249
270
return true ;
@@ -257,6 +278,10 @@ public static boolean isServiceAllowed(Service service) {
257
278
*/
258
279
public static boolean canServiceBeRegistered (Service service ) {
259
280
if (securityEnabled ) {
281
+ if (!profileHashChecked ) {
282
+ checkHashValues ();
283
+ profileHashChecked = true ;
284
+ }
260
285
return restricts .isRestrictedServiceAllowed (service , false );
261
286
}
262
287
return true ;
@@ -270,6 +295,10 @@ public static boolean canServiceBeRegistered(Service service) {
270
295
*/
271
296
public static boolean isProviderAllowed (String providerName ) {
272
297
if (securityEnabled ) {
298
+ if (!(profileHashChecked || isJarVerifierinStackTrace ())) {
299
+ profileHashChecked = true ;
300
+ checkHashValues ();
301
+ }
273
302
// Remove argument, e.g. -NSS-FIPS, if present.
274
303
int pos = providerName .indexOf ('-' );
275
304
if (pos >= 0 ) {
@@ -289,6 +318,10 @@ public static boolean isProviderAllowed(String providerName) {
289
318
*/
290
319
public static boolean isProviderAllowed (Class <?> providerClazz ) {
291
320
if (securityEnabled ) {
321
+ if (!(profileHashChecked || isJarVerifierinStackTrace ())) {
322
+ profileHashChecked = true ;
323
+ checkHashValues ();
324
+ }
292
325
String providerClassName = providerClazz .getName ();
293
326
294
327
// Check if the specified class extends java.security.Provider.
@@ -378,6 +411,18 @@ private static void getProfileID(Properties props) {
378
411
}
379
412
}
380
413
414
+ private static boolean isJarVerifierinStackTrace () {
415
+ StackTraceElement [] elements = Thread .currentThread ().getStackTrace ();
416
+ for (int i = 1 ; i < elements .length ; i ++) {
417
+ StackTraceElement stackTraceElement = elements [i ];
418
+ if ("java.util.jar.JarVerifier" .equals (stackTraceElement .getClassName ())
419
+ && "java.base" .equals (stackTraceElement .getModuleName ())) {
420
+ return true ;
421
+ }
422
+ }
423
+ return false ;
424
+ }
425
+
381
426
private static void checkIfKnownProfileSupported () {
382
427
if (profileID .contains ("NSS" ) && !isNSSSupported ) {
383
428
printStackTraceAndExit ("NSS RestrictedSecurity profiles are not supported"
@@ -516,6 +561,7 @@ public static boolean configure(Properties props) {
516
561
}
517
562
printStackTraceAndExit (e );
518
563
}
564
+
519
565
return securityEnabled ;
520
566
}
521
567
0 commit comments