Skip to content

Commit c698b45

Browse files
committed
8313229: DHEKeySizing.java should be modified to use TLS versions TLSv1, TLSv1.1, TLSv1.2
Reviewed-by: jnimeh
1 parent 015f6f5 commit c698b45

File tree

1 file changed

+27
-27
lines changed

1 file changed

+27
-27
lines changed

test/jdk/sun/security/ssl/DHKeyExchange/DHEKeySizing.java

Lines changed: 27 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -32,58 +32,55 @@
3232
* @summary make ephemeral DH key match the length of the certificate key
3333
* @library /javax/net/ssl/templates
3434
* @run main/othervm -Djdk.tls.client.enableSessionTicketExtension=false
35-
* DHEKeySizing TLS_DHE_RSA_WITH_AES_128_CBC_SHA false 1643 267
35+
* DHEKeySizing TLS_DHE_RSA_WITH_AES_128_CBC_SHA 1643 267 TLSv1
3636
* @run main/othervm -Djsse.enableFFDHE=false
3737
* -Djdk.tls.client.enableSessionTicketExtension=false
38-
* DHEKeySizing SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA true 1259 75
38+
* DHEKeySizing SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA 1259 75 TLSv1.1
3939
* @run main/othervm -Djsse.enableFFDHE=false
4040
* -Djdk.tls.ephemeralDHKeySize=matched
4141
* -Djdk.tls.client.enableSessionTicketExtension=false
42-
* DHEKeySizing SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA true 1259 75
42+
* DHEKeySizing SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA 1259 75 TLSv1.2
4343
* @run main/othervm -Djsse.enableFFDHE=false
4444
* -Djdk.tls.ephemeralDHKeySize=legacy
4545
* -Djdk.tls.client.enableSessionTicketExtension=false
46-
* DHEKeySizing SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA true 1259 75
46+
* DHEKeySizing SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA 1259 75 TLSv1
4747
* @run main/othervm -Djsse.enableFFDHE=false
4848
* -Djdk.tls.ephemeralDHKeySize=1024
4949
* -Djdk.tls.client.enableSessionTicketExtension=false
50-
* DHEKeySizing SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA true 1259 75
51-
*
50+
* DHEKeySizing SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA 1259 75 TLSv1.1
5251
* @run main/othervm -Djsse.enableFFDHE=false
5352
* -Djdk.tls.client.enableSessionTicketExtension=false
54-
* DHEKeySizing SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA true 233 75
55-
*
53+
* DHEKeySizing SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA 233 75 TLSv1.2
5654
* @run main/othervm -Djsse.enableFFDHE=false
5755
* -Djdk.tls.client.enableSessionTicketExtension=false
58-
* DHEKeySizing TLS_DHE_RSA_WITH_AES_128_CBC_SHA false 1643 267
56+
* DHEKeySizing TLS_DHE_RSA_WITH_AES_128_CBC_SHA 1643 267 TLSv1
5957
* @run main/othervm -Djsse.enableFFDHE=false
6058
* -Djdk.tls.ephemeralDHKeySize=legacy
6159
* -Djdk.tls.client.enableSessionTicketExtension=false
62-
* DHEKeySizing TLS_DHE_RSA_WITH_AES_128_CBC_SHA false 1323 107
60+
* DHEKeySizing TLS_DHE_RSA_WITH_AES_128_CBC_SHA 1323 107 TLSv1.1
6361
* @run main/othervm -Djsse.enableFFDHE=false
6462
* -Djdk.tls.ephemeralDHKeySize=matched
6563
* -Djdk.tls.client.enableSessionTicketExtension=false
66-
* DHEKeySizing TLS_DHE_RSA_WITH_AES_128_CBC_SHA false 1643 267
64+
* DHEKeySizing TLS_DHE_RSA_WITH_AES_128_CBC_SHA 1645 267 TLSv1.2
6765
* @run main/othervm -Djsse.enableFFDHE=false
6866
* -Djdk.tls.ephemeralDHKeySize=1024
6967
* -Djdk.tls.client.enableSessionTicketExtension=false
70-
* DHEKeySizing TLS_DHE_RSA_WITH_AES_128_CBC_SHA false 1387 139
71-
*
68+
* DHEKeySizing TLS_DHE_RSA_WITH_AES_128_CBC_SHA 1387 139 TLSv1
7269
* @run main/othervm -Djsse.enableFFDHE=false
7370
* -Djdk.tls.client.enableSessionTicketExtension=false
74-
* DHEKeySizing SSL_DH_anon_WITH_RC4_128_MD5 false 617 267
71+
* DHEKeySizing SSL_DH_anon_WITH_RC4_128_MD5 617 267 TLSv1.1
7572
* @run main/othervm -Djsse.enableFFDHE=false
7673
* -Djdk.tls.client.enableSessionTicketExtension=false
7774
* -Djdk.tls.ephemeralDHKeySize=legacy
78-
* DHEKeySizing SSL_DH_anon_WITH_RC4_128_MD5 false 297 107
75+
* DHEKeySizing SSL_DH_anon_WITH_RC4_128_MD5 297 107 TLSv1.2
7976
* @run main/othervm -Djsse.enableFFDHE=false
8077
* -Djdk.tls.client.enableSessionTicketExtension=false
8178
* -Djdk.tls.ephemeralDHKeySize=matched
82-
* DHEKeySizing SSL_DH_anon_WITH_RC4_128_MD5 false 617 267
79+
* DHEKeySizing SSL_DH_anon_WITH_RC4_128_MD5 617 267 TLSv1
8380
* @run main/othervm -Djsse.enableFFDHE=false
8481
* -Djdk.tls.client.enableSessionTicketExtension=false
8582
* -Djdk.tls.ephemeralDHKeySize=1024
86-
* DHEKeySizing SSL_DH_anon_WITH_RC4_128_MD5 false 361 139
83+
* DHEKeySizing SSL_DH_anon_WITH_RC4_128_MD5 361 139 TLSv1.1
8784
*/
8885

8986
/*
@@ -133,11 +130,13 @@ public class DHEKeySizing extends SSLEngineTemplate {
133130
// key length bias because of the stripping of leading zero bytes of
134131
// negotiated DH keys.
135132
//
136-
// This is an effort to mimum intermittent failure when we cannot
133+
// This is an effort to minimize intermittent failures when we cannot
137134
// estimate what's the exact number of leading zero bytes of
138135
// negotiated DH keys.
139136
private final static int KEY_LEN_BIAS = 6;
140137

138+
private static String protocol;
139+
141140
private void checkResult(ByteBuffer bbIn, ByteBuffer bbOut,
142141
SSLEngineResult result,
143142
Status status, HandshakeStatus hsStatus,
@@ -175,8 +174,8 @@ private void checkResult(ByteBuffer bbIn, ByteBuffer bbOut,
175174
}
176175
}
177176

178-
private void test(String cipherSuite, boolean exportable,
179-
int lenServerKeyEx, int lenClientKeyEx) throws Exception {
177+
private void test(String cipherSuite, int lenServerKeyEx,
178+
int lenClientKeyEx) throws Exception {
180179

181180
SSLEngineResult result1; // clientEngine's results from last operation
182181
SSLEngineResult result2; // serverEngine's results from last operation
@@ -316,15 +315,16 @@ public static void main(String args[]) throws Exception {
316315
if (args.length != 4) {
317316
System.out.println(
318317
"Usage: java DHEKeySizing cipher-suite " +
319-
"exportable(true|false)\n" +
320-
" size-of-server-hello-record size-of-client-key-exchange");
318+
"size-of-server-hello-record\n" +
319+
" size-of-client-key-exchange protocol");
321320
throw new Exception("Incorrect usage!");
322321
}
323322

323+
protocol = args[3];
324+
324325
(new DHEKeySizing()).test(args[0],
325-
Boolean.parseBoolean(args[1]),
326-
Integer.parseInt(args[2]),
327-
Integer.parseInt(args[3]));
326+
Integer.parseInt(args[1]),
327+
Integer.parseInt(args[2]));
328328
System.out.println("Test Passed.");
329329
}
330330

@@ -359,12 +359,12 @@ protected SSLContext createClientSSLContext() throws Exception {
359359

360360
@Override
361361
protected ContextParameters getClientContextParameters() {
362-
return new ContextParameters("TLSv1", "PKIX", "NewSunX509");
362+
return new ContextParameters(protocol, "PKIX", "NewSunX509");
363363
}
364364

365365
@Override
366366
protected ContextParameters getServerContextParameters() {
367-
return new ContextParameters("TLSv1", "PKIX", "NewSunX509");
367+
return new ContextParameters(protocol, "PKIX", "NewSunX509");
368368
}
369369

370370
private static void log(String str) {

0 commit comments

Comments
 (0)