b267c4cf63
- Update to jdk-17+35, also known as jdk-17-ga. - Remove boot JDKs in favour of OpenJDK 17 build now in the buildroot. - Update buildjdkver to 17 so as to build with itself - Add possibility to disable system crypto policy - Add PR3695 to allow the system crypto policy to be turned off - Re-enable TestSecurityProperties after inclusion of PR3695 - Added gating.yaml - Fix patch rh1648249-add_commented_out_nss_cfg_provider_to_java_security.patch - Use the "reverse" build loop (debug first) as the main and only build loop to get more diagnostics. - Remove restriction on disabling product build, as debug packages no longer have javadoc packages. - Update to jdk-17+33, including JDWP fix and July 2021 CPU - Support the FIPS mode crypto policy (RH1655466) - Update RH1655466 FIPS patch with changes in OpenJDK 8 version. - SunPKCS11 runtime provider name is a concatenation of "SunPKCS11-" and the name in the config file. - Change nss.fips.cfg config name to "NSS-FIPS" to avoid confusion with nss.cfg. - No need to substitute path to nss.fips.cfg as java.security file supports a java.home variable. - Disable FIPS mode support unless com.redhat.fips is set to "true". - Use appropriate keystore types when in FIPS mode (RH1818909) - Enable alignment with FIPS crypto policy by default (-Dcom.redhat.fips=false to disable). - Disable TLSv1.3 when the FIPS crypto policy and the NSS-FIPS provider are in use (RH1860986) - Add explicit runtime dependency on NSS for the PKCS11 provider in FIPS mode - Move setup of JavaSecuritySystemConfiguratorAccess to Security class so it always occurs (RH1915071) - Detect FIPS using SECMOD_GetSystemFIPSEnabled in the new libsystemconf JDK library. - Minor code cleanups on FIPS detection patch and check for SECMOD_GetSystemFIPSEnabled in configure. - Remove unneeded Requires on NSS as it will now be dynamically linked and detected by RPM. - Add patch to disable non-FIPS crypto in the SUN and SunEC security providers. - Add patch to login to the NSS software token when in FIPS mode. - Fix unused function compiler warning found in systemconf.c - Extend the default security policy to accomodate PKCS11 accessing jdk.internal.access. - Add JDK-8272332 fix so we actually link against HarfBuzz. - Update release notes to document the major changes between OpenJDK 11 & 17. - Add FIPS patch to allow plain key import. - Allow plain key import to be disabled with -Dcom.redhat.fips.plainKeySupport=false - Patch syslookup.c so it actually has some code to be compiled into libsyslookup - alternatives creation moved to posttrans - Set LTS designator on RHEL, but not Fedora or EPEL. Related: RHEL-45216
73 lines
2.4 KiB
Java
73 lines
2.4 KiB
Java
/* TestCryptoLevel -- Ensure unlimited crypto policy is in use.
|
|
Copyright (C) 2012 Red Hat, Inc.
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
it under the terms of the GNU Affero General Public License as
|
|
published by the Free Software Foundation, either version 3 of the
|
|
License, or (at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU Affero General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Affero General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
import java.lang.reflect.Field;
|
|
import java.lang.reflect.Method;
|
|
import java.lang.reflect.InvocationTargetException;
|
|
|
|
import java.security.Permission;
|
|
import java.security.PermissionCollection;
|
|
|
|
public class TestCryptoLevel
|
|
{
|
|
public static void main(String[] args)
|
|
throws NoSuchFieldException, ClassNotFoundException,
|
|
IllegalAccessException, InvocationTargetException
|
|
{
|
|
Class<?> cls = null;
|
|
Method def = null, exempt = null;
|
|
|
|
try
|
|
{
|
|
cls = Class.forName("javax.crypto.JceSecurity");
|
|
}
|
|
catch (ClassNotFoundException ex)
|
|
{
|
|
System.err.println("Running a non-Sun JDK.");
|
|
System.exit(0);
|
|
}
|
|
try
|
|
{
|
|
def = cls.getDeclaredMethod("getDefaultPolicy");
|
|
exempt = cls.getDeclaredMethod("getExemptPolicy");
|
|
}
|
|
catch (NoSuchMethodException ex)
|
|
{
|
|
System.err.println("Running IcedTea with the original crypto patch.");
|
|
System.exit(0);
|
|
}
|
|
def.setAccessible(true);
|
|
exempt.setAccessible(true);
|
|
PermissionCollection defPerms = (PermissionCollection) def.invoke(null);
|
|
PermissionCollection exemptPerms = (PermissionCollection) exempt.invoke(null);
|
|
Class<?> apCls = Class.forName("javax.crypto.CryptoAllPermission");
|
|
Field apField = apCls.getDeclaredField("INSTANCE");
|
|
apField.setAccessible(true);
|
|
Permission allPerms = (Permission) apField.get(null);
|
|
if (defPerms.implies(allPerms) && (exemptPerms == null || exemptPerms.implies(allPerms)))
|
|
{
|
|
System.err.println("Running with the unlimited policy.");
|
|
System.exit(0);
|
|
}
|
|
else
|
|
{
|
|
System.err.println("WARNING: Running with a restricted crypto policy.");
|
|
System.exit(-1);
|
|
}
|
|
}
|
|
}
|