Blame SOURCES/pr2888-openjdk_should_check_for_system_cacerts_database_eg_etc_pki_java_cacerts.patch

53c576
# HG changeset patch
53c576
# User andrew
53c576
# Date 1459487045 -3600
53c576
#      Fri Apr 01 06:04:05 2016 +0100
53c576
# Node ID 3334efeacd8327a14b7d2f392f4546e3c29c594b
53c576
# Parent  6b81fd2227d14226f2121f2d51b464536925686e
53c576
PR2888: OpenJDK should check for system cacerts database (e.g. /etc/pki/java/cacerts)
53c576
PR3575: System cacerts database handling should not affect jssecacerts
53c576
53c576
diff --git openjdk.orig/jdk/src/share/classes/sun/security/ssl/TrustStoreManager.java openjdk/jdk/src/share/classes/sun/security/ssl/TrustStoreManager.java
53c576
--- openjdk.orig/jdk/src/share/classes/sun/security/ssl/TrustStoreManager.java
53c576
+++ openjdk/jdk/src/share/classes/sun/security/ssl/TrustStoreManager.java
53c576
@@ -72,7 +72,7 @@
53c576
      * The preference of the default trusted KeyStore is:
53c576
      *    javax.net.ssl.trustStore
53c576
      *    jssecacerts
53c576
-     *    cacerts
53c576
+     *    cacerts (system and local)
53c576
      */
53c576
     private static final class TrustStoreDescriptor {
53c576
         private static final String fileSep = File.separator;
53c576
@@ -83,6 +83,10 @@
53c576
                 defaultStorePath + fileSep + "cacerts";
53c576
         private static final String jsseDefaultStore =
53c576
                 defaultStorePath + fileSep + "jssecacerts";
53c576
+        /* Check system cacerts DB: /etc/pki/java/cacerts */
53c576
+        private static final String systemStore =
53c576
+                fileSep + "etc" + fileSep + "pki" +
53c576
+                fileSep + "java" + fileSep + "cacerts";
53c576
 
53c576
         // the trust store name
53c576
         private final String storeName;
53c576
@@ -146,7 +150,8 @@
53c576
                     long temporaryTime = 0L;
53c576
                     if (!"NONE".equals(storePropName)) {
53c576
                         String[] fileNames =
53c576
-                                new String[] {storePropName, defaultStore};
53c576
+                                new String[] {storePropName,
53c576
+                                              systemStore, defaultStore};
53c576
                         for (String fileName : fileNames) {
53c576
                             File f = new File(fileName);
53c576
                             if (f.isFile() && f.canRead()) {
53c576
diff --git openjdk.orig/jdk/src/share/classes/sun/security/tools/KeyStoreUtil.java openjdk/jdk/src/share/classes/sun/security/tools/KeyStoreUtil.java
53c576
--- openjdk.orig/jdk/src/share/classes/sun/security/tools/KeyStoreUtil.java
53c576
+++ openjdk/jdk/src/share/classes/sun/security/tools/KeyStoreUtil.java
53c576
@@ -108,9 +108,14 @@
53c576
         throws Exception
53c576
     {
53c576
         String sep = File.separator;
53c576
-        File file = new File(System.getProperty("java.home") + sep
53c576
-                             + "lib" + sep + "security" + sep
53c576
-                             + "cacerts");
53c576
+        /* Check system cacerts DB first; /etc/pki/java/cacerts */
53c576
+        File file = new File(sep + "etc" + sep + "pki" + sep
53c576
+                             + "java" + sep + "cacerts");
53c576
+        if (!file.exists()) {
53c576
+            file = new File(System.getProperty("java.home") + sep
53c576
+                            + "lib" + sep + "security" + sep
53c576
+                            + "cacerts");
53c576
+        }
53c576
         if (!file.exists()) {
53c576
             return null;
53c576
         }