|
1 | 1 | /*
|
2 |
| - * Copyright (c) 1997, 2022, Oracle and/or its affiliates. All rights reserved. |
| 2 | + * Copyright (c) 1997, 2023, Oracle and/or its affiliates. All rights reserved. |
3 | 3 | * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
4 | 4 | *
|
5 | 5 | * This code is free software; you can redistribute it and/or modify it
|
@@ -51,7 +51,10 @@ package javax.crypto;
|
51 | 51 |
|
52 | 52 | import java.util.*;
|
53 | 53 | import java.util.concurrent.ConcurrentHashMap;
|
| 54 | +import java.util.function.Function; |
54 | 55 | import java.io.*;
|
| 56 | +import java.lang.ref.ReferenceQueue; |
| 57 | +import java.lang.ref.WeakReference; |
55 | 58 | import java.net.URL;
|
56 | 59 | import java.nio.file.*;
|
57 | 60 | import java.security.*;
|
@@ -86,13 +89,16 @@ final class JceSecurity {
|
86 | 89 | // Map of the providers we already have verified.
|
87 | 90 | // If verified ok, value == PROVIDER_VERIFIED, otherwise
|
88 | 91 | // the cause of verification failure is stored as value.
|
89 |
| - private static final Map<IdentityWrapper, Object> |
| 92 | + private static final Map<WeakIdentityWrapper, Object> |
90 | 93 | verificationResults = new ConcurrentHashMap<>();
|
91 | 94 |
|
92 | 95 | // Map<Provider,?> of the providers currently being verified
|
93 | 96 | private static final Map<Provider, Object> verifyingProviders =
|
94 | 97 | new IdentityHashMap<>();
|
95 | 98 |
|
| 99 | + // weak references queued by GC |
| 100 | + private static final ReferenceQueue<Object> queue = new ReferenceQueue<>(); |
| 101 | + |
96 | 102 | private static final boolean isRestricted;
|
97 | 103 |
|
98 | 104 | /*
|
@@ -199,38 +205,51 @@ final class JceSecurity {
|
199 | 205 | * Return null if ok, failure Exception if verification failed.
|
200 | 206 | */
|
201 | 207 | static Exception getVerificationResult(Provider p) {
|
202 |
| - IdentityWrapper pKey = new IdentityWrapper(p); |
203 |
| - Object o = verificationResults.get(pKey); |
204 |
| - // no mapping found |
205 |
| - if (o == null) { |
206 |
| - synchronized (JceSecurity.class) { |
207 |
| - // check cache again in case the result is now available |
208 |
| - o = verificationResults.get(pKey); |
209 |
| - if (o == null) { |
| 208 | + expungeStaleWrappers(); |
| 209 | + WeakIdentityWrapper pKey = new WeakIdentityWrapper(p, queue); |
| 210 | + try { |
| 211 | + Object o = verificationResults.computeIfAbsent(pKey, new Function<>() { |
| 212 | + public Object apply(WeakIdentityWrapper key) { |
| 213 | + // no mapping found |
210 | 214 | if (verifyingProviders.get(p) != null) {
|
211 | 215 | // recursion; return failure now
|
212 |
| - return new NoSuchProviderException |
213 |
| - ("Recursion during verification"); |
| 216 | + throw new IllegalStateException(); |
214 | 217 | }
|
| 218 | + Object result; |
215 | 219 | try {
|
216 | 220 | verifyingProviders.put(p, Boolean.FALSE);
|
217 | 221 | URL providerURL = getCodeBase(p.getClass());
|
218 | 222 | verifyProvider(providerURL, p);
|
219 |
| - o = PROVIDER_VERIFIED; |
| 223 | + result = PROVIDER_VERIFIED; |
220 | 224 | } catch (Exception e) {
|
221 |
| - o = e; |
| 225 | + result = e; |
222 | 226 | } finally {
|
223 | 227 | verifyingProviders.remove(p);
|
224 | 228 | }
|
225 |
| - verificationResults.put(pKey, o); |
226 | 229 | if (debug != null) {
|
227 | 230 | debug.println("Provider " + p.getName() +
|
228 |
| - " verification result: " + o); |
| 231 | + " verification result: " + result); |
229 | 232 | }
|
| 233 | + return result; |
230 | 234 | }
|
231 |
| - } |
| 235 | + }); |
| 236 | + return (o == PROVIDER_VERIFIED? null : (Exception) o); |
| 237 | + |
| 238 | + } catch (IllegalStateException ise) { |
| 239 | + // recursive update detected |
| 240 | + return new NoSuchProviderException |
| 241 | + ("Recursion during verification"); |
| 242 | + } |
| 243 | + } |
| 244 | + |
| 245 | + /** |
| 246 | + * Removes weakly reachable keys from history. |
| 247 | + */ |
| 248 | + static void expungeStaleWrappers() { |
| 249 | + WeakIdentityWrapper key; |
| 250 | + while ((key = (WeakIdentityWrapper) queue.poll()) != null) { |
| 251 | + verificationResults.remove(key); |
232 | 252 | }
|
233 |
| - return (o == PROVIDER_VERIFIED? null : (Exception) o); |
234 | 253 | }
|
235 | 254 |
|
236 | 255 | // return whether this provider is properly signed and can be used by JCE
|
@@ -404,28 +423,26 @@ final class JceSecurity {
|
404 | 423 | return isRestricted;
|
405 | 424 | }
|
406 | 425 |
|
407 |
| - private static final class IdentityWrapper { |
| 426 | + private static final class WeakIdentityWrapper extends WeakReference<Object> { |
408 | 427 |
|
409 |
| - final Provider obj; |
| 428 | + final int hash; |
410 | 429 |
|
411 |
| - IdentityWrapper(Provider obj) { |
412 |
| - this.obj = obj; |
| 430 | + WeakIdentityWrapper(Provider obj, ReferenceQueue<Object> queue) { |
| 431 | + super(obj, queue); |
| 432 | + hash = System.identityHashCode(obj); |
413 | 433 | }
|
414 | 434 |
|
415 | 435 | @Override
|
416 | 436 | public boolean equals(Object o) {
|
417 | 437 | if (this == o) {
|
418 | 438 | return true;
|
419 | 439 | }
|
420 |
| - if (!(o instanceof IdentityWrapper)) { |
421 |
| - return false; |
422 |
| - } |
423 |
| - return this.obj == ((IdentityWrapper)o).obj; |
| 440 | + return o instanceof WeakIdentityWrapper w && get() == w.get(); |
424 | 441 | }
|
425 | 442 |
|
426 | 443 | @Override
|
427 | 444 | public int hashCode() {
|
428 |
| - return System.identityHashCode(obj); |
| 445 | + return hash; |
429 | 446 | }
|
430 | 447 | }
|
431 | 448 | }
|
0 commit comments