8315436: HttpsServer does not send TLS alerts
Reviewed-by: dfuchs, michaelm
This commit is contained in:
parent
033f311abc
commit
42f5b9e7aa
src/jdk.httpserver/share/classes/sun/net/httpserver
test/jdk/com/sun/net/httpserver/simpleserver
@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright (c) 2005, 2022, Oracle and/or its affiliates. All rights reserved.
|
||||
* Copyright (c) 2005, 2023, Oracle and/or its affiliates. All rights reserved.
|
||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
*
|
||||
* This code is free software; you can redistribute it and/or modify it
|
||||
@ -286,7 +286,6 @@ class SSLStreams {
|
||||
} while (status == Status.BUFFER_OVERFLOW);
|
||||
if (status == Status.CLOSED && !ignoreClose) {
|
||||
closed = true;
|
||||
return r;
|
||||
}
|
||||
if (r.result.bytesProduced() > 0) {
|
||||
wrap_dst.flip();
|
||||
|
@ -0,0 +1,110 @@
|
||||
/*
|
||||
* Copyright (c) 2023, Oracle and/or its affiliates. All rights reserved.
|
||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
*
|
||||
* This code is free software; you can redistribute it and/or modify it
|
||||
* under the terms of the GNU General Public License version 2 only, as
|
||||
* published by the Free Software Foundation.
|
||||
*
|
||||
* This code is distributed in the hope that it will be useful, but WITHOUT
|
||||
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
||||
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||
* version 2 for more details (a copy is included in the LICENSE file that
|
||||
* accompanied this code).
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License version
|
||||
* 2 along with this work; if not, write to the Free Software Foundation,
|
||||
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||
*
|
||||
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
|
||||
* or visit www.oracle.com if you need additional information or have any
|
||||
* questions.
|
||||
*/
|
||||
|
||||
/*
|
||||
* @test
|
||||
* @bug 8315436
|
||||
* @summary Test if HttpsServer sends the TLS alerts produced
|
||||
* @library /test/lib
|
||||
* @build jdk.test.lib.net.SimpleSSLContext
|
||||
* @run testng/othervm HttpsServerAlertTest
|
||||
*/
|
||||
|
||||
import com.sun.net.httpserver.HttpsConfigurator;
|
||||
import com.sun.net.httpserver.HttpsParameters;
|
||||
import com.sun.net.httpserver.HttpsServer;
|
||||
import jdk.test.lib.net.SimpleSSLContext;
|
||||
import org.testng.annotations.BeforeTest;
|
||||
import org.testng.annotations.Test;
|
||||
|
||||
import javax.net.ssl.SSLContext;
|
||||
import javax.net.ssl.SSLHandshakeException;
|
||||
import javax.net.ssl.SSLParameters;
|
||||
import javax.net.ssl.SSLSocket;
|
||||
import javax.net.ssl.SSLSocketFactory;
|
||||
import java.io.EOFException;
|
||||
import java.io.IOException;
|
||||
import java.net.InetAddress;
|
||||
import java.net.InetSocketAddress;
|
||||
import java.util.logging.ConsoleHandler;
|
||||
import java.util.logging.Level;
|
||||
import java.util.logging.Logger;
|
||||
|
||||
import static org.testng.Assert.fail;
|
||||
|
||||
public class HttpsServerAlertTest {
|
||||
|
||||
static final InetSocketAddress LOOPBACK_ADDR = new InetSocketAddress(InetAddress.getLoopbackAddress(), 0);
|
||||
|
||||
static final boolean ENABLE_LOGGING = true;
|
||||
static final Logger LOGGER = Logger.getLogger("com.sun.net.httpserver");
|
||||
|
||||
SSLContext sslContext;
|
||||
|
||||
@BeforeTest
|
||||
public void setup() throws IOException {
|
||||
if (ENABLE_LOGGING) {
|
||||
ConsoleHandler ch = new ConsoleHandler();
|
||||
LOGGER.setLevel(Level.ALL);
|
||||
ch.setLevel(Level.ALL);
|
||||
LOGGER.addHandler(ch);
|
||||
}
|
||||
sslContext = new SimpleSSLContext().get();
|
||||
SSLContext.setDefault(sslContext);
|
||||
}
|
||||
|
||||
@Test
|
||||
public void testProtocolMismatch() throws Exception {
|
||||
SSLSocketFactory sf = sslContext.getSocketFactory();
|
||||
var server = HttpsServer.create(LOOPBACK_ADDR, 0);
|
||||
server.setHttpsConfigurator(new Configurator(sslContext));
|
||||
server.start();
|
||||
try (SSLSocket s = (SSLSocket) sf.createSocket()) {
|
||||
// server only accepts TLS 1.3
|
||||
s.setEnabledProtocols(new String[]{"TLSv1.2"});
|
||||
s.connect(server.getAddress());
|
||||
s.startHandshake();
|
||||
fail("Expected a handshake failure");
|
||||
} catch (SSLHandshakeException e) {
|
||||
System.out.println("Got exception: " + e);
|
||||
if (e.getCause() instanceof EOFException ||
|
||||
!e.getMessage().contains("protocol_version"))
|
||||
throw e;
|
||||
} finally {
|
||||
server.stop(0);
|
||||
}
|
||||
}
|
||||
|
||||
private static class Configurator extends HttpsConfigurator {
|
||||
public Configurator(SSLContext sslContext) {
|
||||
super(sslContext);
|
||||
}
|
||||
|
||||
@Override
|
||||
public void configure(HttpsParameters params) {
|
||||
SSLParameters sslParams = getSSLContext().getDefaultSSLParameters();
|
||||
sslParams.setProtocols(new String[]{"TLSv1.3"});
|
||||
params.setSSLParameters(sslParams);
|
||||
}
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user