1 /* 2 * Copyright (c) 1998, 2015, Oracle and/or its affiliates. All rights reserved. 3 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. 4 * 5 * This code is free software; you can redistribute it and/or modify it 6 * under the terms of the GNU General Public License version 2 only, as 7 * published by the Free Software Foundation. Oracle designates this 8 * particular file as subject to the "Classpath" exception as provided 9 * by Oracle in the LICENSE file that accompanied this code. 10 * 11 * This code is distributed in the hope that it will be useful, but WITHOUT 12 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or 13 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License 14 * version 2 for more details (a copy is included in the LICENSE file that 15 * accompanied this code). 16 * 17 * You should have received a copy of the GNU General Public License version 18 * 2 along with this work; if not, write to the Free Software Foundation, 19 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. 20 * 21 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA 22 * or visit www.oracle.com if you need additional information or have any 23 * questions. 24 */ 25 26 package sun.security.util; 27 28 import java.math.BigInteger; 29 import java.util.regex.Pattern; 30 import java.util.regex.Matcher; 31 import java.util.Locale; 32 33 /** 34 * A utility class for debuging. 35 * 36 * @author Roland Schemers 37 */ 38 public class Debug { 39 40 private String prefix; 41 42 private static String args; 43 44 static { 45 args = java.security.AccessController.doPrivileged 46 (new sun.security.action.GetPropertyAction 47 ("java.security.debug")); 48 49 String args2 = java.security.AccessController.doPrivileged 50 (new sun.security.action.GetPropertyAction 51 ("java.security.auth.debug")); 52 53 if (args == null) { 54 args = args2; 55 } else { 56 if (args2 != null) 57 args = args + "," + args2; 58 } 59 60 if (args != null) { 61 args = marshal(args); 62 if (args.equals("help")) { 63 Help(); 64 } 65 } 66 } 67 68 public static void Help() 69 { 70 System.err.println(); 71 System.err.println("all turn on all debugging"); 72 System.err.println("access print all checkPermission results"); 73 System.err.println("certpath PKIX CertPathBuilder and"); 74 System.err.println(" CertPathValidator debugging"); 75 System.err.println("combiner SubjectDomainCombiner debugging"); 76 System.err.println("gssloginconfig"); 77 System.err.println(" GSS LoginConfigImpl debugging"); 78 System.err.println("configfile JAAS ConfigFile loading"); 79 System.err.println("configparser JAAS ConfigFile parsing"); 80 System.err.println("jar jar verification"); 81 System.err.println("logincontext login context results"); 82 System.err.println("jca JCA engine class debugging"); 83 System.err.println("keystore KeyStore debugging"); 84 System.err.println("policy loading and granting"); 85 System.err.println("provider security provider debugging"); 86 System.err.println("pkcs11 PKCS11 session manager debugging"); 87 System.err.println("pkcs11keystore"); 88 System.err.println(" PKCS11 KeyStore debugging"); 89 System.err.println("pkcs12 PKCS12 KeyStore debugging"); 90 System.err.println("sunpkcs11 SunPKCS11 provider debugging"); 91 System.err.println("scl permissions SecureClassLoader assigns"); 92 System.err.println("securerandom SecureRandom"); 93 System.err.println("ts timestamping"); 94 System.err.println(); 95 System.err.println("The following can be used with access:"); 96 System.err.println(); 97 System.err.println("stack include stack trace"); 98 System.err.println("domain dump all domains in context"); 99 System.err.println("failure before throwing exception, dump stack"); 100 System.err.println(" and domain that didn't have permission"); 101 System.err.println(); 102 System.err.println("The following can be used with stack and domain:"); 103 System.err.println(); 104 System.err.println("permission=<classname>"); 105 System.err.println(" only dump output if specified permission"); 106 System.err.println(" is being checked"); 107 System.err.println("codebase=<URL>"); 108 System.err.println(" only dump output if specified codebase"); 109 System.err.println(" is being checked"); 110 System.err.println(); 111 System.err.println("The following can be used with provider:"); 112 System.err.println(); 113 System.err.println("engine=<engines>"); 114 System.err.println(" only dump output for the specified list"); 115 System.err.println(" of JCA engines. Supported values:"); 116 System.err.println(" Cipher, KeyAgreement, KeyGenerator,"); 117 System.err.println(" KeyPairGenerator, KeyStore, Mac,"); 118 System.err.println(" MessageDigest, SecureRandom, Signature."); 119 System.err.println(); 120 System.err.println("The following can be used with certpath:"); 121 System.err.println(); 122 System.err.println("ocsp dump the OCSP protocol exchanges"); 123 System.err.println(); 124 System.err.println("Note: Separate multiple options with a comma"); 125 System.exit(0); 126 } 127 128 129 /** 130 * Get a Debug object corresponding to whether or not the given 131 * option is set. Set the prefix to be the same as option. 132 */ 133 134 public static Debug getInstance(String option) 135 { 136 return getInstance(option, option); 137 } 138 139 /** 140 * Get a Debug object corresponding to whether or not the given 141 * option is set. Set the prefix to be prefix. 142 */ 143 public static Debug getInstance(String option, String prefix) 144 { 145 if (isOn(option)) { 146 Debug d = new Debug(); 147 d.prefix = prefix; 148 return d; 149 } else { 150 return null; 151 } 152 } 153 154 /** 155 * True if the system property "security.debug" contains the 156 * string "option". 157 */ 158 public static boolean isOn(String option) 159 { 160 if (args == null) 161 return false; 162 else { 163 if (args.indexOf("all") != -1) 164 return true; 165 else 166 return (args.indexOf(option) != -1); 167 } 168 } 169 170 /** 171 * print a message to stderr that is prefixed with the prefix 172 * created from the call to getInstance. 173 */ 174 175 public void println(String message) 176 { 177 System.err.println(prefix + ": "+message); 178 } 179 180 /** 181 * print a blank line to stderr that is prefixed with the prefix. 182 */ 183 184 public void println() 185 { 186 System.err.println(prefix + ":"); 187 } 188 189 /** 190 * print a message to stderr that is prefixed with the prefix. 191 */ 192 193 public static void println(String prefix, String message) 194 { 195 System.err.println(prefix + ": "+message); 196 } 197 198 /** 199 * return a hexadecimal printed representation of the specified 200 * BigInteger object. the value is formatted to fit on lines of 201 * at least 75 characters, with embedded newlines. Words are 202 * separated for readability, with eight words (32 bytes) per line. 203 */ 204 public static String toHexString(BigInteger b) { 205 String hexValue = b.toString(16); 206 StringBuilder sb = new StringBuilder(hexValue.length()*2); 207 208 if (hexValue.startsWith("-")) { 209 sb.append(" -"); 210 hexValue = hexValue.substring(1); 211 } else { 212 sb.append(" "); // four spaces 213 } 214 if ((hexValue.length()%2) != 0) { 215 // add back the leading 0 216 hexValue = "0" + hexValue; 217 } 218 int i=0; 219 while (i < hexValue.length()) { 220 // one byte at a time 221 sb.append(hexValue.substring(i, i + 2)); 222 i+=2; 223 if (i!= hexValue.length()) { 224 if ((i%64) == 0) { 225 sb.append("\n "); // line after eight words 226 } else if (i%8 == 0) { 227 sb.append(" "); // space between words 228 } 229 } 230 } 231 return sb.toString(); 232 } 233 234 /** 235 * change a string into lower case except permission classes and URLs. 236 */ 237 private static String marshal(String args) { 238 if (args != null) { 239 StringBuilder target = new StringBuilder(); 240 StringBuffer source = new StringBuffer(args); 241 242 // obtain the "permission=<classname>" options 243 // the syntax of classname: IDENTIFIER.IDENTIFIER 244 // the regular express to match a class name: 245 // "[a-zA-Z_$][a-zA-Z0-9_$]*([.][a-zA-Z_$][a-zA-Z0-9_$]*)*" 246 String keyReg = "[Pp][Ee][Rr][Mm][Ii][Ss][Ss][Ii][Oo][Nn]="; 247 String keyStr = "permission="; 248 String reg = keyReg + 249 "[a-zA-Z_$][a-zA-Z0-9_$]*([.][a-zA-Z_$][a-zA-Z0-9_$]*)*"; 250 Pattern pattern = Pattern.compile(reg); 251 Matcher matcher = pattern.matcher(source); 252 StringBuffer left = new StringBuffer(); 253 while (matcher.find()) { 254 String matched = matcher.group(); 255 target.append(matched.replaceFirst(keyReg, keyStr)); 256 target.append(" "); 257 258 // delete the matched sequence 259 matcher.appendReplacement(left, ""); 260 } 261 matcher.appendTail(left); 262 source = left; 263 264 // obtain the "codebase=<URL>" options 265 // the syntax of URL is too flexible, and here assumes that the 266 // URL contains no space, comma(','), and semicolon(';'). That 267 // also means those characters also could be used as separator 268 // after codebase option. 269 // However, the assumption is incorrect in some special situation 270 // when the URL contains comma or semicolon 271 keyReg = "[Cc][Oo][Dd][Ee][Bb][Aa][Ss][Ee]="; 272 keyStr = "codebase="; 273 reg = keyReg + "[^, ;]*"; 274 pattern = Pattern.compile(reg); 275 matcher = pattern.matcher(source); 276 left = new StringBuffer(); 277 while (matcher.find()) { 278 String matched = matcher.group(); 279 target.append(matched.replaceFirst(keyReg, keyStr)); 280 target.append(" "); 281 282 // delete the matched sequence 283 matcher.appendReplacement(left, ""); 284 } 285 matcher.appendTail(left); 286 source = left; 287 288 // convert the rest to lower-case characters 289 target.append(source.toString().toLowerCase(Locale.ENGLISH)); 290 291 return target.toString(); 292 } 293 294 return null; 295 } 296 297 private static final char[] hexDigits = "0123456789abcdef".toCharArray(); 298 299 public static String toString(byte[] b) { 300 if (b == null) { 301 return "(null)"; 302 } 303 StringBuilder sb = new StringBuilder(b.length * 3); 304 for (int i = 0; i < b.length; i++) { 305 int k = b[i] & 0xff; 306 if (i != 0) { 307 sb.append(':'); 308 } 309 sb.append(hexDigits[k >>> 4]); 310 sb.append(hexDigits[k & 0xf]); 311 } 312 return sb.toString(); 313 } 314 315 }