3a4b90f086
Reviewed-by: xuelei, dfuchs, coffeys
146 lines
5.5 KiB
Java
146 lines
5.5 KiB
Java
/*
|
|
* Copyright (c) 2013, 2020, Oracle and/or its affiliates. All rights reserved.
|
|
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
|
*
|
|
* This code is free software; you can redistribute it and/or modify it
|
|
* under the terms of the GNU General Public License version 2 only, as
|
|
* published by the Free Software Foundation.
|
|
*
|
|
* This code is distributed in the hope that it will be useful, but WITHOUT
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
|
* version 2 for more details (a copy is included in the LICENSE file that
|
|
* accompanied this code).
|
|
*
|
|
* You should have received a copy of the GNU General Public License version
|
|
* 2 along with this work; if not, write to the Free Software Foundation,
|
|
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
*
|
|
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
|
|
* or visit www.oracle.com if you need additional information or have any
|
|
* questions.
|
|
*/
|
|
|
|
// SunJSSE does not support dynamic system properties, no way to re-use
|
|
// system properties in samevm/agentvm mode.
|
|
|
|
/*
|
|
* @test
|
|
* @bug 7093640 8234725
|
|
* @summary Enable TLS 1.1 and TLS 1.2 by default in client side of SunJSSE
|
|
* @library /test/lib
|
|
* @run main/othervm -Djdk.tls.client.protocols="XSLv3,TLSv1"
|
|
* IllegalProtocolProperty
|
|
*/
|
|
|
|
import javax.net.ssl.*;
|
|
import java.security.NoSuchAlgorithmException;
|
|
|
|
import jdk.test.lib.security.SecurityUtils;
|
|
|
|
public class IllegalProtocolProperty {
|
|
static enum ContextVersion {
|
|
TLS_CV_01("SSL", "TLSv1", "TLSv1.2", true),
|
|
TLS_CV_02("TLS", "TLSv1", "TLSv1.2", true),
|
|
TLS_CV_03("SSLv3", "TLSv1", "TLSv1.2", false),
|
|
TLS_CV_04("TLSv1", "TLSv1", "TLSv1.2", false),
|
|
TLS_CV_05("TLSv1.1", "TLSv1.1", "TLSv1.2", false),
|
|
TLS_CV_06("TLSv1.2", "TLSv1.2", "TLSv1.2", false),
|
|
TLS_CV_07("Default", "TLSv1", "TLSv1.2", true),
|
|
TLS_CV_08("TLSv1.3", "TLSv1.3", "TLSv1.3", false);
|
|
|
|
final String contextVersion;
|
|
final String defaultProtocolVersion;
|
|
final String supportedProtocolVersion;
|
|
final boolean impacted;
|
|
|
|
ContextVersion(String contextVersion, String defaultProtocolVersion,
|
|
String supportedProtocolVersion, boolean impacted) {
|
|
this.contextVersion = contextVersion;
|
|
this.defaultProtocolVersion = defaultProtocolVersion;
|
|
this.supportedProtocolVersion = supportedProtocolVersion;
|
|
this.impacted = impacted;
|
|
}
|
|
}
|
|
|
|
public static void main(String[] args) throws Exception {
|
|
// Re-enable TLSv1 and TLSv1.1 since test depends on them.
|
|
SecurityUtils.removeFromDisabledTlsAlgs("TLSv1", "TLSv1.1");
|
|
|
|
for (ContextVersion cv : ContextVersion.values()) {
|
|
System.out.println("Checking SSLContext of " + cv.contextVersion);
|
|
|
|
SSLContext context;
|
|
try {
|
|
context = SSLContext.getInstance(cv.contextVersion);
|
|
if (cv.impacted) {
|
|
throw new Exception(
|
|
"illegal system property jdk.tls.client.protocols: " +
|
|
System.getProperty("jdk.tls.client.protocols"));
|
|
}
|
|
} catch (NoSuchAlgorithmException nsae) {
|
|
if (cv.impacted) {
|
|
System.out.println(
|
|
"\tIgnore: illegal system property " +
|
|
"jdk.tls.client.protocols=" +
|
|
System.getProperty("jdk.tls.client.protocols"));
|
|
continue;
|
|
} else {
|
|
throw nsae;
|
|
}
|
|
}
|
|
|
|
// Default SSLContext is initialized automatically.
|
|
if (!cv.contextVersion.equals("Default")) {
|
|
// Use default TK, KM and random.
|
|
context.init((KeyManager[])null, (TrustManager[])null, null);
|
|
}
|
|
|
|
SSLParameters parameters = context.getDefaultSSLParameters();
|
|
|
|
String[] protocols = parameters.getProtocols();
|
|
String[] ciphers = parameters.getCipherSuites();
|
|
|
|
if (protocols.length == 0 || ciphers.length == 0) {
|
|
throw new Exception("No default protocols or cipher suites");
|
|
}
|
|
|
|
boolean isMatch = false;
|
|
for (String protocol : protocols) {
|
|
System.out.println("\tdefault protocol version " + protocol);
|
|
if (protocol.equals(cv.defaultProtocolVersion)) {
|
|
isMatch = true;
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (!isMatch) {
|
|
throw new Exception("No matched default protocol");
|
|
}
|
|
|
|
parameters = context.getSupportedSSLParameters();
|
|
|
|
protocols = parameters.getProtocols();
|
|
ciphers = parameters.getCipherSuites();
|
|
|
|
if (protocols.length == 0 || ciphers.length == 0) {
|
|
throw new Exception("No supported protocols or cipher suites");
|
|
}
|
|
|
|
isMatch = false;
|
|
for (String protocol : protocols) {
|
|
System.out.println("\tsupported protocol version " + protocol);
|
|
if (protocol.equals(cv.supportedProtocolVersion)) {
|
|
isMatch = true;
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (!isMatch) {
|
|
throw new Exception("No matched supported protocol");
|
|
}
|
|
System.out.println("\t... Success");
|
|
}
|
|
}
|
|
}
|