1 /* 2 * Copyright (c) 1998, 2015, Oracle and/or its affiliates. All rights reserved. 3 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. 4 * 5 * This code is free software; you can redistribute it and/or modify it 6 * under the terms of the GNU General Public License version 2 only, as 7 * published by the Free Software Foundation. Oracle designates this 8 * particular file as subject to the "Classpath" exception as provided 9 * by Oracle in the LICENSE file that accompanied this code. 10 * 11 * This code is distributed in the hope that it will be useful, but WITHOUT 12 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or 13 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License 14 * version 2 for more details (a copy is included in the LICENSE file that 15 * accompanied this code). 16 * 17 * You should have received a copy of the GNU General Public License version 18 * 2 along with this work; if not, write to the Free Software Foundation, 19 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. 20 * 21 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA 22 * or visit www.oracle.com if you need additional information or have any 23 * questions. 24 */ 25 26 package sun.security.util; 27 28 import java.math.BigInteger; 29 import java.util.regex.Pattern; 30 import java.util.regex.Matcher; 31 import java.util.Locale; 32 33 /** 34 * A utility class for debuging. 35 * 36 * @author Roland Schemers 37 */ 38 public class Debug { 39 40 private String prefix; 41 42 private static String args; 43 44 static { 45 args = java.security.AccessController.doPrivileged 46 (new sun.security.action.GetPropertyAction 47 ("java.security.debug")); 48 49 String args2 = java.security.AccessController.doPrivileged 50 (new sun.security.action.GetPropertyAction 51 ("java.security.auth.debug")); 52 53 if (args == null) { 54 args = args2; 55 } else { 56 if (args2 != null) 57 args = args + "," + args2; 58 } 59 60 if (args != null) { 61 args = marshal(args); 62 if (args.equals("help")) { 63 Help(); 64 } 65 } 66 } 67 68 public static void Help() 69 { 70 System.err.println(); 71 System.err.println("all turn on all debugging"); 72 System.err.println("access print all checkPermission results"); 73 System.err.println("certpath PKIX CertPathBuilder and"); 74 System.err.println(" CertPathValidator debugging"); 75 System.err.println("combiner SubjectDomainCombiner debugging"); 76 System.err.println("gssloginconfig"); 77 System.err.println(" GSS LoginConfigImpl debugging"); 78 System.err.println("configfile JAAS ConfigFile loading"); 79 System.err.println("configparser JAAS ConfigFile parsing"); 80 System.err.println("jar jar verification"); 81 System.err.println("logincontext login context results"); 82 System.err.println("jca JCA engine class debugging"); 83 System.err.println("keystore KeyStore debugging"); 84 System.err.println("policy loading and granting"); 85 System.err.println("provider security provider debugging"); 86 System.err.println("pkcs11 PKCS11 session manager debugging"); 87 System.err.println("pkcs11keystore"); 88 System.err.println(" PKCS11 KeyStore debugging"); 89 System.err.println("pkcs12 PKCS12 KeyStore debugging"); 90 System.err.println("sunpkcs11 SunPKCS11 provider debugging"); 91 System.err.println("scl permissions SecureClassLoader assigns"); 92 System.err.println("ts timestamping"); 93 System.err.println(); 94 System.err.println("The following can be used with access:"); 95 System.err.println(); 96 System.err.println("stack include stack trace"); 97 System.err.println("domain dump all domains in context"); 98 System.err.println("failure before throwing exception, dump stack"); 99 System.err.println(" and domain that didn't have permission"); 100 System.err.println(); 101 System.err.println("The following can be used with stack and domain:"); 102 System.err.println(); 103 System.err.println("permission=<classname>"); 104 System.err.println(" only dump output if specified permission"); 105 System.err.println(" is being checked"); 106 System.err.println("codebase=<URL>"); 107 System.err.println(" only dump output if specified codebase"); 108 System.err.println(" is being checked"); 109 System.err.println(); 110 System.err.println("The following can be used with provider:"); 111 System.err.println(); 112 System.err.println("engine=<engines>"); 113 System.err.println(" only dump output for the specified list"); 114 System.err.println(" of JCA engines. Supported values:"); 115 System.err.println(" Cipher, KeyAgreement, KeyGenerator,"); 116 System.err.println(" KeyPairGenerator, KeyStore, Mac,"); 117 System.err.println(" MessageDigest, SecureRandom, Signature."); 118 System.err.println(); 119 System.err.println("The following can be used with certpath:"); 120 System.err.println(); 121 System.err.println("ocsp dump the OCSP protocol exchanges"); 122 System.err.println(); 123 System.err.println("Note: Separate multiple options with a comma"); 124 System.exit(0); 125 } 126 127 128 /** 129 * Get a Debug object corresponding to whether or not the given 130 * option is set. Set the prefix to be the same as option. 131 */ 132 133 public static Debug getInstance(String option) 134 { 135 return getInstance(option, option); 136 } 137 138 /** 139 * Get a Debug object corresponding to whether or not the given 140 * option is set. Set the prefix to be prefix. 141 */ 142 public static Debug getInstance(String option, String prefix) 143 { 144 if (isOn(option)) { 145 Debug d = new Debug(); 146 d.prefix = prefix; 147 return d; 148 } else { 149 return null; 150 } 151 } 152 153 /** 154 * True if the system property "security.debug" contains the 155 * string "option". 156 */ 157 public static boolean isOn(String option) 158 { 159 if (args == null) 160 return false; 161 else { 162 if (args.indexOf("all") != -1) 163 return true; 164 else 165 return (args.indexOf(option) != -1); 166 } 167 } 168 169 /** 170 * print a message to stderr that is prefixed with the prefix 171 * created from the call to getInstance. 172 */ 173 174 public void println(String message) 175 { 176 System.err.println(prefix + ": "+message); 177 } 178 179 /** 180 * print a blank line to stderr that is prefixed with the prefix. 181 */ 182 183 public void println() 184 { 185 System.err.println(prefix + ":"); 186 } 187 188 /** 189 * print a message to stderr that is prefixed with the prefix. 190 */ 191 192 public static void println(String prefix, String message) 193 { 194 System.err.println(prefix + ": "+message); 195 } 196 197 /** 198 * return a hexadecimal printed representation of the specified 199 * BigInteger object. the value is formatted to fit on lines of 200 * at least 75 characters, with embedded newlines. Words are 201 * separated for readability, with eight words (32 bytes) per line. 202 */ 203 public static String toHexString(BigInteger b) { 204 String hexValue = b.toString(16); 205 StringBuilder sb = new StringBuilder(hexValue.length()*2); 206 207 if (hexValue.startsWith("-")) { 208 sb.append(" -"); 209 hexValue = hexValue.substring(1); 210 } else { 211 sb.append(" "); // four spaces 212 } 213 if ((hexValue.length()%2) != 0) { 214 // add back the leading 0 215 hexValue = "0" + hexValue; 216 } 217 int i=0; 218 while (i < hexValue.length()) { 219 // one byte at a time 220 sb.append(hexValue.substring(i, i + 2)); 221 i+=2; 222 if (i!= hexValue.length()) { 223 if ((i%64) == 0) { 224 sb.append("\n "); // line after eight words 225 } else if (i%8 == 0) { 226 sb.append(" "); // space between words 227 } 228 } 229 } 230 return sb.toString(); 231 } 232 233 /** 234 * change a string into lower case except permission classes and URLs. 235 */ 236 private static String marshal(String args) { 237 if (args != null) { 238 StringBuilder target = new StringBuilder(); 239 StringBuffer source = new StringBuffer(args); 240 241 // obtain the "permission=<classname>" options 242 // the syntax of classname: IDENTIFIER.IDENTIFIER 243 // the regular express to match a class name: 244 // "[a-zA-Z_$][a-zA-Z0-9_$]*([.][a-zA-Z_$][a-zA-Z0-9_$]*)*" 245 String keyReg = "[Pp][Ee][Rr][Mm][Ii][Ss][Ss][Ii][Oo][Nn]="; 246 String keyStr = "permission="; 247 String reg = keyReg + 248 "[a-zA-Z_$][a-zA-Z0-9_$]*([.][a-zA-Z_$][a-zA-Z0-9_$]*)*"; 249 Pattern pattern = Pattern.compile(reg); 250 Matcher matcher = pattern.matcher(source); 251 StringBuffer left = new StringBuffer(); 252 while (matcher.find()) { 253 String matched = matcher.group(); 254 target.append(matched.replaceFirst(keyReg, keyStr)); 255 target.append(" "); 256 257 // delete the matched sequence 258 matcher.appendReplacement(left, ""); 259 } 260 matcher.appendTail(left); 261 source = left; 262 263 // obtain the "codebase=<URL>" options 264 // the syntax of URL is too flexible, and here assumes that the 265 // URL contains no space, comma(','), and semicolon(';'). That 266 // also means those characters also could be used as separator 267 // after codebase option. 268 // However, the assumption is incorrect in some special situation 269 // when the URL contains comma or semicolon 270 keyReg = "[Cc][Oo][Dd][Ee][Bb][Aa][Ss][Ee]="; 271 keyStr = "codebase="; 272 reg = keyReg + "[^, ;]*"; 273 pattern = Pattern.compile(reg); 274 matcher = pattern.matcher(source); 275 left = new StringBuffer(); 276 while (matcher.find()) { 277 String matched = matcher.group(); 278 target.append(matched.replaceFirst(keyReg, keyStr)); 279 target.append(" "); 280 281 // delete the matched sequence 282 matcher.appendReplacement(left, ""); 283 } 284 matcher.appendTail(left); 285 source = left; 286 287 // convert the rest to lower-case characters 288 target.append(source.toString().toLowerCase(Locale.ENGLISH)); 289 290 return target.toString(); 291 } 292 293 return null; 294 } 295 296 private static final char[] hexDigits = "0123456789abcdef".toCharArray(); 297 298 public static String toString(byte[] b) { 299 if (b == null) { 300 return "(null)"; 301 } 302 StringBuilder sb = new StringBuilder(b.length * 3); 303 for (int i = 0; i < b.length; i++) { 304 int k = b[i] & 0xff; 305 if (i != 0) { 306 sb.append(':'); 307 } 308 sb.append(hexDigits[k >>> 4]); 309 sb.append(hexDigits[k & 0xf]); 310 } 311 return sb.toString(); 312 } 313 314 }