8325579: Inconsistent behavior in com.sun.jndi.ldap.Connection::createSocket
Reviewed-by: dfuchs, aefimov
This commit is contained in:
parent
70a15c7363
commit
907e30ff00
@ -1,5 +1,5 @@
|
|||||||
/*
|
/*
|
||||||
* Copyright (c) 1999, 2023, Oracle and/or its affiliates. All rights reserved.
|
* Copyright (c) 1999, 2024, Oracle and/or its affiliates. All rights reserved.
|
||||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||||
*
|
*
|
||||||
* This code is free software; you can redistribute it and/or modify it
|
* This code is free software; you can redistribute it and/or modify it
|
||||||
@ -122,17 +122,15 @@ import javax.security.sasl.SaslException;
|
|||||||
public final class Connection implements Runnable {
|
public final class Connection implements Runnable {
|
||||||
|
|
||||||
private static final boolean debug = false;
|
private static final boolean debug = false;
|
||||||
private static final int dump = 0; // > 0 r, > 1 rw
|
|
||||||
|
|
||||||
|
|
||||||
private final Thread worker; // Initialized in constructor
|
private final Thread worker; // Initialized in constructor
|
||||||
|
|
||||||
private boolean v3 = true; // Set in setV3()
|
private boolean v3 = true; // Set in setV3()
|
||||||
|
|
||||||
public final String host; // used by LdapClient for generating exception messages
|
public final String host; // used by LdapClient for generating exception messages
|
||||||
// used by StartTlsResponse when creating an SSL socket
|
// used by StartTlsResponse when creating an SSL socket
|
||||||
public final int port; // used by LdapClient for generating exception messages
|
public final int port; // used by LdapClient for generating exception messages
|
||||||
// used by StartTlsResponse when creating an SSL socket
|
// used by StartTlsResponse when creating an SSL socket
|
||||||
|
|
||||||
private boolean bound = false; // Set in setBound()
|
private boolean bound = false; // Set in setBound()
|
||||||
|
|
||||||
@ -324,30 +322,37 @@ public final class Connection implements Runnable {
|
|||||||
}
|
}
|
||||||
|
|
||||||
private Socket createConnectionSocket(String host, int port, SocketFactory factory,
|
private Socket createConnectionSocket(String host, int port, SocketFactory factory,
|
||||||
int connectTimeout) throws Exception {
|
int connectTimeout) throws IOException {
|
||||||
Socket socket = null;
|
Socket socket = null;
|
||||||
|
|
||||||
|
// if timeout is supplied, try to use unconnected socket for connecting with timeout
|
||||||
if (connectTimeout > 0) {
|
if (connectTimeout > 0) {
|
||||||
// create unconnected socket and then connect it if timeout
|
|
||||||
// is supplied
|
|
||||||
InetSocketAddress endpoint =
|
|
||||||
createInetSocketAddress(host, port);
|
|
||||||
// unconnected socket
|
|
||||||
socket = factory.createSocket();
|
|
||||||
// connect socket with a timeout
|
|
||||||
socket.connect(endpoint, connectTimeout);
|
|
||||||
if (debug) {
|
if (debug) {
|
||||||
System.err.println("Connection: creating socket with " +
|
System.err.println("Connection: creating socket with a connect timeout");
|
||||||
"a connect timeout");
|
}
|
||||||
|
try {
|
||||||
|
// unconnected socket
|
||||||
|
socket = factory.createSocket();
|
||||||
|
} catch (IOException e) {
|
||||||
|
// unconnected socket is likely not supported by the SocketFactory
|
||||||
|
if (debug) {
|
||||||
|
System.err.println("Connection: unconnected socket not supported by SocketFactory");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (socket != null) {
|
||||||
|
InetSocketAddress endpoint = createInetSocketAddress(host, port);
|
||||||
|
// connect socket with a timeout
|
||||||
|
socket.connect(endpoint, connectTimeout);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// either no timeout was supplied or unconnected socket did not work
|
||||||
if (socket == null) {
|
if (socket == null) {
|
||||||
// create connected socket
|
// create connected socket
|
||||||
socket = factory.createSocket(host, port);
|
|
||||||
if (debug) {
|
if (debug) {
|
||||||
System.err.println("Connection: creating connected socket with" +
|
System.err.println("Connection: creating connected socket with no connect timeout");
|
||||||
" no connect timeout");
|
|
||||||
}
|
}
|
||||||
|
socket = factory.createSocket(host, port);
|
||||||
}
|
}
|
||||||
return socket;
|
return socket;
|
||||||
}
|
}
|
||||||
@ -356,7 +361,7 @@ public final class Connection implements Runnable {
|
|||||||
// the SSL handshake following socket connection as part of the timeout.
|
// the SSL handshake following socket connection as part of the timeout.
|
||||||
// So explicitly set a socket read timeout, trigger the SSL handshake,
|
// So explicitly set a socket read timeout, trigger the SSL handshake,
|
||||||
// then reset the timeout.
|
// then reset the timeout.
|
||||||
private void initialSSLHandshake(SSLSocket sslSocket , int connectTimeout) throws Exception {
|
private void initialSSLHandshake(SSLSocket sslSocket, int connectTimeout) throws Exception {
|
||||||
|
|
||||||
if (!IS_HOSTNAME_VERIFICATION_DISABLED) {
|
if (!IS_HOSTNAME_VERIFICATION_DISABLED) {
|
||||||
SSLParameters param = sslSocket.getSSLParameters();
|
SSLParameters param = sslSocket.getSSLParameters();
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
/*
|
/*
|
||||||
* Copyright (c) 2014, 2022, Oracle and/or its affiliates. All rights reserved.
|
* Copyright (c) 2014, 2024, Oracle and/or its affiliates. All rights reserved.
|
||||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||||
*
|
*
|
||||||
* This code is free software; you can redistribute it and/or modify it
|
* This code is free software; you can redistribute it and/or modify it
|
||||||
@ -36,21 +36,33 @@
|
|||||||
* The following implementation specific environment properties are supported by the
|
* The following implementation specific environment properties are supported by the
|
||||||
* default LDAP Naming Service Provider implementation in the JDK:
|
* default LDAP Naming Service Provider implementation in the JDK:
|
||||||
* <ul>
|
* <ul>
|
||||||
|
* <li>{@code java.naming.ldap.factory.socket}:
|
||||||
|
* <br>The value of this environment property specifies the fully
|
||||||
|
* qualified class name of the socket factory used by the LDAP provider.
|
||||||
|
* This class must implement the {@link javax.net.SocketFactory} abstract class
|
||||||
|
* and provide an implementation of the static "getDefault()" method that
|
||||||
|
* returns an instance of the socket factory. By default the environment
|
||||||
|
* property is not set.
|
||||||
|
* </li>
|
||||||
* <li>{@code com.sun.jndi.ldap.connect.timeout}:
|
* <li>{@code com.sun.jndi.ldap.connect.timeout}:
|
||||||
* <br>The value of this property is the string representation
|
* <br>The value of this environment property is the string representation
|
||||||
* of an integer representing the connection timeout in
|
* of an integer specifying the connection timeout in milliseconds.
|
||||||
* milliseconds. If the LDAP provider cannot establish a
|
* If the LDAP provider cannot establish a connection within that period,
|
||||||
* connection within that period, it aborts the connection attempt.
|
* it aborts the connection attempt.
|
||||||
* The integer should be greater than zero. An integer less than
|
* The integer should be greater than zero. An integer less than
|
||||||
* or equal to zero means to use the network protocol's (i.e., TCP's)
|
* or equal to zero means to use the network protocol's (i.e., TCP's)
|
||||||
* timeout value.
|
* timeout value.
|
||||||
* <br> If this property is not specified, the default is to wait
|
* <br> If this property is not specified, the default is to wait
|
||||||
* for the connection to be established or until the underlying
|
* for the connection to be established or until the underlying
|
||||||
* network times out.
|
* network times out.
|
||||||
|
* <br> If a custom socket factory is provided via environment property
|
||||||
|
* {@code java.naming.ldap.factory.socket} and unconnected sockets
|
||||||
|
* are not supported, the specified timeout is ignored
|
||||||
|
* and the provider behaves as if no connection timeout was set.
|
||||||
* </li>
|
* </li>
|
||||||
* <li>{@code com.sun.jndi.ldap.read.timeout}:
|
* <li>{@code com.sun.jndi.ldap.read.timeout}:
|
||||||
* <br>The value of this property is the string representation
|
* <br>The value of this property is the string representation
|
||||||
* of an integer representing the read timeout in milliseconds
|
* of an integer specifying the read timeout in milliseconds
|
||||||
* for LDAP operations. If the LDAP provider cannot get a LDAP
|
* for LDAP operations. If the LDAP provider cannot get a LDAP
|
||||||
* response within that period, it aborts the read attempt. The
|
* response within that period, it aborts the read attempt. The
|
||||||
* integer should be greater than zero. An integer less than or
|
* integer should be greater than zero. An integer less than or
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
/*
|
/*
|
||||||
* Copyright (c) 2023, Oracle and/or its affiliates. All rights reserved.
|
* Copyright (c) 2023, 2024, Oracle and/or its affiliates. All rights reserved.
|
||||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||||
*
|
*
|
||||||
* This code is free software; you can redistribute it and/or modify it
|
* This code is free software; you can redistribute it and/or modify it
|
||||||
@ -21,68 +21,117 @@
|
|||||||
* questions.
|
* questions.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
import jdk.test.lib.net.URIBuilder;
|
|
||||||
|
|
||||||
import javax.naming.Context;
|
|
||||||
import javax.naming.ldap.InitialLdapContext;
|
|
||||||
import javax.naming.ldap.LdapContext;
|
|
||||||
import javax.net.SocketFactory;
|
|
||||||
import javax.net.ssl.SSLServerSocketFactory;
|
|
||||||
import java.io.File;
|
import java.io.File;
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
import java.io.InputStream;
|
import java.io.InputStream;
|
||||||
import java.io.OutputStream;
|
import java.io.OutputStream;
|
||||||
|
import java.lang.reflect.Field;
|
||||||
import java.net.InetAddress;
|
import java.net.InetAddress;
|
||||||
import java.net.ServerSocket;
|
import java.net.ServerSocket;
|
||||||
import java.net.Socket;
|
import java.net.Socket;
|
||||||
import java.net.SocketException;
|
import java.net.SocketException;
|
||||||
|
import java.net.UnknownHostException;
|
||||||
import java.util.Hashtable;
|
import java.util.Hashtable;
|
||||||
|
|
||||||
|
import javax.naming.Context;
|
||||||
|
import javax.naming.NamingException;
|
||||||
|
import javax.naming.ldap.InitialLdapContext;
|
||||||
|
import javax.naming.ldap.LdapContext;
|
||||||
|
import javax.net.SocketFactory;
|
||||||
|
import javax.net.ssl.SSLServerSocketFactory;
|
||||||
|
|
||||||
|
import jdk.test.lib.net.URIBuilder;
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* @test
|
* @test
|
||||||
* @bug 8314063
|
* @bug 8314063 8325579
|
||||||
* @library /test/lib
|
* @library /test/lib
|
||||||
* @summary For LDAPs connection, if the value of com.sun.jndi.ldap.connect.timeout is
|
* @summary Several scenarios for LDAP connection handshaking are tested here.
|
||||||
* set too small or not an optimal value for the system, after the socket is created and
|
* We test different combinations of com.sun.jndi.ldap.connect.timeout values
|
||||||
* connected to the server, but the handshake between the client and server fails due to
|
* and server behavior, e.g. a server that replies immediately vs a server that
|
||||||
* socket time out, the opened socket is not closed properly. In this test case, the server
|
* delays the initial answer. We also try to check whether the underlying Socket
|
||||||
* is forced to sleep ten seconds and connection time out for client is one second. This
|
* object will be closed correctly.
|
||||||
* will allow the socket opened and connected, and give the chance for the handshake to be
|
* We expect exceptions when using a custom SocketFactory that does not supply
|
||||||
* timed out. Before this fix, the socket is kept opened. Right now the exception will be
|
* SSL Sockets. In that case we instrument the supplied Socket object and check
|
||||||
* caught and the socket will be closed.
|
* if it was properly closed after the handshake failure.
|
||||||
|
* When the value of com.sun.jndi.ldap.connect.timeout is set lower than the
|
||||||
|
* server delay, we also expect an exception.
|
||||||
|
* In all other cases a valid Context object shall be returned and we check
|
||||||
|
* whether the socket is closed after closing the Context.
|
||||||
*
|
*
|
||||||
* @run main/othervm LdapSSLHandshakeFailureTest LdapSSLHandshakeFailureTest$CustomSocketFactory true 6000
|
* @modules java.naming/javax.naming:+open java.naming/com.sun.jndi.ldap:+open
|
||||||
* @run main/othervm LdapSSLHandshakeFailureTest -1000 true 6000
|
* @run main/othervm LdapSSLHandshakeFailureTest
|
||||||
* @run main/othervm LdapSSLHandshakeFailureTest -1000 false 6000
|
|
||||||
* @run main/othervm LdapSSLHandshakeFailureTest 2000 false 6000
|
|
||||||
* @run main/othervm LdapSSLHandshakeFailureTest 0 true 6000
|
|
||||||
* @run main/othervm LdapSSLHandshakeFailureTest 0 false 6000
|
|
||||||
* @run main/othervm LdapSSLHandshakeFailureTest true
|
* @run main/othervm LdapSSLHandshakeFailureTest true
|
||||||
* @run main/othervm LdapSSLHandshakeFailureTest false
|
* @run main/othervm LdapSSLHandshakeFailureTest 0
|
||||||
|
* @run main/othervm LdapSSLHandshakeFailureTest 0 true
|
||||||
|
* @run main/othervm LdapSSLHandshakeFailureTest 2000
|
||||||
|
* @run main/othervm LdapSSLHandshakeFailureTest 2000 true
|
||||||
|
* @run main/othervm LdapSSLHandshakeFailureTest -1000
|
||||||
|
* @run main/othervm LdapSSLHandshakeFailureTest LdapSSLHandshakeFailureTest$CustomSocketFactoryNoUnconnected
|
||||||
|
* @run main/othervm LdapSSLHandshakeFailureTest LdapSSLHandshakeFailureTest$CustomSocketFactoryNoUnconnected 1000
|
||||||
|
* @run main/othervm LdapSSLHandshakeFailureTest LdapSSLHandshakeFailureTest$CustomSocketFactoryNoUnconnected true
|
||||||
|
* @run main/othervm LdapSSLHandshakeFailureTest LdapSSLHandshakeFailureTest$CustomSocketFactoryNoUnconnected 1000 true
|
||||||
|
* @run main/othervm LdapSSLHandshakeFailureTest LdapSSLHandshakeFailureTest$CustomSocketFactory
|
||||||
|
* @run main/othervm LdapSSLHandshakeFailureTest LdapSSLHandshakeFailureTest$CustomSocketFactory 1000
|
||||||
|
* @run main/othervm LdapSSLHandshakeFailureTest LdapSSLHandshakeFailureTest$CustomSocketFactory true
|
||||||
|
* @run main/othervm LdapSSLHandshakeFailureTest LdapSSLHandshakeFailureTest$CustomSocketFactory 1000 true
|
||||||
*/
|
*/
|
||||||
|
|
||||||
public class LdapSSLHandshakeFailureTest {
|
public class LdapSSLHandshakeFailureTest {
|
||||||
private static String SOCKET_CLOSED_MSG = "The socket has been closed.";
|
private static int SERVER_SLEEPING_TIME = 4000;
|
||||||
|
private static String progArgs[];
|
||||||
|
private static int curArg;
|
||||||
|
private static String customSocketFactory;
|
||||||
|
private static Integer connectTimeout;
|
||||||
|
private static boolean serverSlowDown;
|
||||||
|
|
||||||
private static int serverSleepingTime = 5000;
|
private static String popArg() {
|
||||||
|
if (curArg >= progArgs.length) {
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
return progArgs[curArg++];
|
||||||
|
}
|
||||||
|
|
||||||
public static void main(String args[]) throws Exception {
|
private static void parseArgs(String args[]) {
|
||||||
|
progArgs = args;
|
||||||
|
curArg = 0;
|
||||||
|
|
||||||
|
String arg = popArg();
|
||||||
|
if (arg == null)
|
||||||
|
return;
|
||||||
|
|
||||||
|
if (arg.startsWith("LdapSSLHandshakeFailureTest$CustomSocketFactory")) {
|
||||||
|
customSocketFactory = arg;
|
||||||
|
arg = popArg();
|
||||||
|
if (arg == null)
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
connectTimeout = Integer.valueOf(arg);
|
||||||
|
arg = popArg();
|
||||||
|
if (arg == null)
|
||||||
|
return;
|
||||||
|
} catch (NumberFormatException e) {
|
||||||
|
// then it must be the boolean arg for serverSlowDown
|
||||||
|
}
|
||||||
|
|
||||||
|
serverSlowDown = Boolean.valueOf(arg);
|
||||||
|
}
|
||||||
|
|
||||||
|
public static void main(String args[]) {
|
||||||
|
parseArgs(args);
|
||||||
|
|
||||||
|
System.out.println("Testing " +
|
||||||
|
(customSocketFactory == null ? "without custom SocketFactory" : "with custom SocketFactory \"" + customSocketFactory + "\"") +
|
||||||
|
", " + (connectTimeout == null ? "no connectTimeout" : "connectTimeout=" + connectTimeout + "") +
|
||||||
|
", serverSlowDown=" + serverSlowDown);
|
||||||
|
|
||||||
// Set the keystores
|
// Set the keystores
|
||||||
setKeyStore();
|
setKeyStore();
|
||||||
boolean serverSlowDown = Boolean.valueOf(args[0]);
|
|
||||||
if (args.length == 2) {
|
|
||||||
serverSlowDown = Boolean.valueOf(args[1]);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (args.length == 3) {
|
|
||||||
serverSleepingTime = Integer.valueOf(args[2]);
|
|
||||||
}
|
|
||||||
|
|
||||||
boolean hasCustomSocketFactory = args[0]
|
|
||||||
.equals("LdapSSLHandshakeFailureTest$CustomSocketFactory");
|
|
||||||
// start the test server first.
|
// start the test server first.
|
||||||
try (TestServer server = new TestServer(serverSlowDown, serverSleepingTime)) {
|
try (TestServer server = new TestServer(serverSlowDown)) {
|
||||||
server.start();
|
server.start();
|
||||||
Hashtable<String, Object> env = new Hashtable<>();
|
Hashtable<String, Object> env = new Hashtable<>();
|
||||||
env.put(Context.INITIAL_CONTEXT_FACTORY, "com.sun.jndi.ldap.LdapCtxFactory");
|
env.put(Context.INITIAL_CONTEXT_FACTORY, "com.sun.jndi.ldap.LdapCtxFactory");
|
||||||
@ -93,15 +142,13 @@ public class LdapSSLHandshakeFailureTest {
|
|||||||
.port(server.getPortNumber())
|
.port(server.getPortNumber())
|
||||||
.buildUnchecked().toString());
|
.buildUnchecked().toString());
|
||||||
|
|
||||||
if (hasCustomSocketFactory) {
|
if (customSocketFactory != null) {
|
||||||
env.put("java.naming.ldap.factory.socket", args[0]);
|
env.put("java.naming.ldap.factory.socket", customSocketFactory);
|
||||||
env.put("com.sun.jndi.ldap.connect.timeout", "1000");
|
|
||||||
}
|
}
|
||||||
|
|
||||||
if (args.length == 2 && !hasCustomSocketFactory) {
|
if (connectTimeout != null) {
|
||||||
env.put("com.sun.jndi.ldap.connect.timeout", args[0]);
|
env.put("com.sun.jndi.ldap.connect.timeout", connectTimeout.toString());
|
||||||
}
|
}
|
||||||
|
|
||||||
env.put(Context.SECURITY_PROTOCOL, "ssl");
|
env.put(Context.SECURITY_PROTOCOL, "ssl");
|
||||||
env.put(Context.SECURITY_AUTHENTICATION, "Simple");
|
env.put(Context.SECURITY_AUTHENTICATION, "Simple");
|
||||||
env.put(Context.SECURITY_PRINCIPAL, "cn=principal");
|
env.put(Context.SECURITY_PRINCIPAL, "cn=principal");
|
||||||
@ -109,62 +156,55 @@ public class LdapSSLHandshakeFailureTest {
|
|||||||
LdapContext ctx = null;
|
LdapContext ctx = null;
|
||||||
try {
|
try {
|
||||||
ctx = new InitialLdapContext(env, null);
|
ctx = new InitialLdapContext(env, null);
|
||||||
} catch (Exception e) {
|
} catch (NamingException e) {
|
||||||
if (CustomSocketFactory.customSocket.closeMethodCalledCount() > 0
|
if (customSocketFactory != null) {
|
||||||
&& hasCustomSocketFactory
|
System.out.println("Caught expected Exception with custom SocketFactory (no SSL Socket).");
|
||||||
&& Boolean.valueOf(args[1])) {
|
if (CustomSocketFactory.customSocket.closeMethodCalledCount() <= 0) {
|
||||||
System.out.println(SOCKET_CLOSED_MSG);
|
throw new RuntimeException("Custom Socket was not closed.");
|
||||||
|
}
|
||||||
|
} else if (connectTimeout > 0) {
|
||||||
|
System.out.println("Caught expected Exception with connectTimeout > 0.");
|
||||||
} else {
|
} else {
|
||||||
throw e;
|
throw e;
|
||||||
}
|
}
|
||||||
} finally {
|
} finally {
|
||||||
if (ctx != null)
|
if (ctx != null) {
|
||||||
|
System.out.println("Context was created, closing it.");
|
||||||
|
Socket sock = getSocket(ctx);
|
||||||
ctx.close();
|
ctx.close();
|
||||||
|
if (!sock.isClosed()) {
|
||||||
|
throw new RuntimeException("Socket isn't closed");
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
} catch (Exception e) {
|
||||||
|
e.printStackTrace();
|
||||||
|
throw new RuntimeException(e);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
public static class CustomSocketFactory extends SocketFactory {
|
private static Socket getSocket(LdapContext ctx) throws Exception {
|
||||||
private static CustomSocket customSocket;
|
Field defaultInitCtxField = ctx.getClass().getSuperclass().getSuperclass().getDeclaredField("defaultInitCtx");
|
||||||
|
defaultInitCtxField.setAccessible(true);
|
||||||
public static CustomSocketFactory getDefault() {
|
Object defaultInitCtx = defaultInitCtxField.get(ctx);
|
||||||
return new CustomSocketFactory();
|
Field clntField = defaultInitCtx.getClass().getDeclaredField("clnt");
|
||||||
}
|
clntField.setAccessible(true);
|
||||||
|
Object clnt = clntField.get(defaultInitCtx);
|
||||||
@Override
|
Field connField = clnt.getClass().getDeclaredField("conn");
|
||||||
public Socket createSocket() throws SocketException {
|
connField.setAccessible(true);
|
||||||
customSocket = new CustomSocket();
|
Object conn = connField.get(clnt);
|
||||||
return customSocket;
|
return (Socket)conn.getClass().getDeclaredField("sock").get(conn);
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public Socket createSocket(String s, int timeout) {
|
|
||||||
return customSocket;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public Socket createSocket(String host, int port, InetAddress localHost,
|
|
||||||
int localPort) {
|
|
||||||
return customSocket;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public Socket createSocket(InetAddress host, int port) {
|
|
||||||
return customSocket;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public Socket createSocket(InetAddress address, int port,
|
|
||||||
InetAddress localAddress, int localPort) {
|
|
||||||
return customSocket;
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
private static class CustomSocket extends Socket {
|
private static class CustomSocket extends Socket {
|
||||||
private int closeMethodCalled = 0;
|
private int closeMethodCalled;
|
||||||
|
|
||||||
public CustomSocket() {
|
public CustomSocket() {
|
||||||
closeMethodCalled = 0;
|
super();
|
||||||
|
}
|
||||||
|
|
||||||
|
public CustomSocket(String s, int port) throws IOException {
|
||||||
|
super(s, port);
|
||||||
}
|
}
|
||||||
|
|
||||||
public int closeMethodCalledCount() {
|
public int closeMethodCalledCount() {
|
||||||
@ -178,25 +218,65 @@ public class LdapSSLHandshakeFailureTest {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public static class CustomSocketFactoryNoUnconnected extends SocketFactory {
|
||||||
|
static CustomSocket customSocket;
|
||||||
|
|
||||||
|
public static SocketFactory getDefault() {
|
||||||
|
return new CustomSocketFactoryNoUnconnected();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Socket createSocket(String s, int port) throws IOException {
|
||||||
|
customSocket = new CustomSocket(s, port);
|
||||||
|
return customSocket;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Socket createSocket(String host, int port, InetAddress localHost, int localPort)
|
||||||
|
throws IOException, UnknownHostException {
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Socket createSocket(InetAddress host, int port) throws IOException {
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Socket createSocket(InetAddress address, int port, InetAddress localAddress, int localPort)
|
||||||
|
throws IOException {
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
public static class CustomSocketFactory extends CustomSocketFactoryNoUnconnected {
|
||||||
|
public static SocketFactory getDefault() {
|
||||||
|
return new CustomSocketFactory();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Socket createSocket() throws SocketException {
|
||||||
|
customSocket = new CustomSocket();
|
||||||
|
return customSocket;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
private static void setKeyStore() {
|
private static void setKeyStore() {
|
||||||
|
String keystore = System.getProperty("test.src", ".") + File.separator + "ksWithSAN";
|
||||||
|
|
||||||
String fileName = "ksWithSAN", dir = System.getProperty("test.src", ".") + File.separator;
|
System.setProperty("javax.net.ssl.keyStore", keystore);
|
||||||
|
|
||||||
System.setProperty("javax.net.ssl.keyStore", dir + fileName);
|
|
||||||
System.setProperty("javax.net.ssl.keyStorePassword", "welcome1");
|
System.setProperty("javax.net.ssl.keyStorePassword", "welcome1");
|
||||||
System.setProperty("javax.net.ssl.trustStore", dir + fileName);
|
System.setProperty("javax.net.ssl.trustStore", keystore);
|
||||||
System.setProperty("javax.net.ssl.trustStorePassword", "welcome1");
|
System.setProperty("javax.net.ssl.trustStorePassword", "welcome1");
|
||||||
}
|
}
|
||||||
|
|
||||||
static class TestServer extends Thread implements AutoCloseable {
|
static class TestServer extends Thread implements AutoCloseable {
|
||||||
private boolean isForceToSleep;
|
private boolean isForceToSleep;
|
||||||
private int sleepingTime;
|
|
||||||
private final ServerSocket serverSocket;
|
private final ServerSocket serverSocket;
|
||||||
private final int PORT;
|
private final int PORT;
|
||||||
|
|
||||||
private TestServer(boolean isForceToSleep, int sleepingTime) {
|
private TestServer(boolean isForceToSleep) {
|
||||||
this.isForceToSleep = isForceToSleep;
|
this.isForceToSleep = isForceToSleep;
|
||||||
this.sleepingTime = sleepingTime;
|
|
||||||
try {
|
try {
|
||||||
SSLServerSocketFactory socketFactory = (SSLServerSocketFactory) SSLServerSocketFactory.getDefault();
|
SSLServerSocketFactory socketFactory = (SSLServerSocketFactory) SSLServerSocketFactory.getDefault();
|
||||||
serverSocket = socketFactory.createServerSocket(0, 0, InetAddress.getLoopbackAddress());
|
serverSocket = socketFactory.createServerSocket(0, 0, InetAddress.getLoopbackAddress());
|
||||||
@ -217,7 +297,7 @@ public class LdapSSLHandshakeFailureTest {
|
|||||||
InputStream in = socket.getInputStream();
|
InputStream in = socket.getInputStream();
|
||||||
OutputStream out = socket.getOutputStream()) {
|
OutputStream out = socket.getOutputStream()) {
|
||||||
if (isForceToSleep) {
|
if (isForceToSleep) {
|
||||||
Thread.sleep(sleepingTime);
|
Thread.sleep(SERVER_SLEEPING_TIME);
|
||||||
}
|
}
|
||||||
byte[] bindResponse = {0x30, 0x0C, 0x02, 0x01, 0x01, 0x61, 0x07, 0x0A,
|
byte[] bindResponse = {0x30, 0x0C, 0x02, 0x01, 0x01, 0x61, 0x07, 0x0A,
|
||||||
0x01, 0x00, 0x04, 0x00, 0x04, 0x00};
|
0x01, 0x00, 0x04, 0x00, 0x04, 0x00};
|
||||||
@ -233,7 +313,7 @@ public class LdapSSLHandshakeFailureTest {
|
|||||||
in.skip(in.available());
|
in.skip(in.available());
|
||||||
}
|
}
|
||||||
} catch (Exception e) {
|
} catch (Exception e) {
|
||||||
e.printStackTrace();
|
// e.printStackTrace();
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -245,5 +325,3 @@ public class LdapSSLHandshakeFailureTest {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user