This repository has been archived by the owner on Aug 27, 2022. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 14
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
8242294: JSSE Client does not throw SSLException when an alert occurs…
… during handshaking Reviewed-by: xuelei
- Loading branch information
Jamil Nimeh
committed
Apr 8, 2020
1 parent
67fd181
commit 6b7a466
Showing
2 changed files
with
261 additions
and
3 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,250 @@ | ||
/* | ||
* Copyright (c) 2020, Oracle and/or its affiliates. All rights reserved. | ||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. | ||
* | ||
* This code is free software; you can redistribute it and/or modify it | ||
* under the terms of the GNU General Public License version 2 only, as | ||
* published by the Free Software Foundation. | ||
* | ||
* This code is distributed in the hope that it will be useful, but WITHOUT | ||
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or | ||
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License | ||
* version 2 for more details (a copy is included in the LICENSE file that | ||
* accompanied this code). | ||
* | ||
* You should have received a copy of the GNU General Public License version | ||
* 2 along with this work; if not, write to the Free Software Foundation, | ||
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. | ||
* | ||
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA | ||
* or visit www.oracle.com if you need additional information or have any | ||
* questions. | ||
*/ | ||
|
||
// | ||
// Please run in othervm mode. SunJSSE does not support dynamic system | ||
// properties, no way to re-use system properties in samevm/agentvm mode. | ||
// | ||
|
||
/* | ||
* @test | ||
* @bug 8242294 | ||
* @summary JSSE Client does not throw SSLException when an alert occurs during | ||
* handshaking. | ||
* @run main/othervm ClientExcOnAlert TLSv1.2 | ||
* @run main/othervm ClientExcOnAlert TLSv1.3 | ||
*/ | ||
|
||
import java.io.BufferedReader; | ||
import java.io.ByteArrayInputStream; | ||
import java.io.IOException; | ||
import java.io.InputStreamReader; | ||
import java.io.PrintWriter; | ||
import java.net.InetAddress; | ||
import java.security.GeneralSecurityException; | ||
import java.security.KeyStore; | ||
import java.util.Base64; | ||
import java.util.concurrent.locks.Condition; | ||
import java.util.concurrent.locks.Lock; | ||
import java.util.concurrent.locks.ReentrantLock; | ||
import javax.net.ssl.KeyManagerFactory; | ||
import javax.net.ssl.SSLContext; | ||
import javax.net.ssl.SSLException; | ||
import javax.net.ssl.SSLServerSocket; | ||
import javax.net.ssl.SSLServerSocketFactory; | ||
import javax.net.ssl.SSLSocket; | ||
import javax.net.ssl.SSLSocketFactory; | ||
|
||
public class ClientExcOnAlert { | ||
// This is a PKCS#12 keystore created with the following command: | ||
// keytool -genkeypair -alias testcert -keyalg rsa -keysize 2048 | ||
// -sigalg SHA256withRSA | ||
// -dname "CN=Test TLS Self-Signed Cert, O=Test" -validity 365 | ||
// -storetype pkcs12 -keystore p12ks.p12 | ||
// | ||
// The resulting keystore was then converted to PEM for inclusion in this | ||
// file. | ||
private static int serverPort = -1; | ||
private static final String KEYSTORE_PASS = "password"; | ||
private static final String KEYSTORE_PEM = | ||
"MIIJrwIBAzCCCWgGCSqGSIb3DQEHAaCCCVkEgglVMIIJUTCCBW0GCSqGSIb3DQEH\n" + | ||
"AaCCBV4EggVaMIIFVjCCBVIGCyqGSIb3DQEMCgECoIIE+zCCBPcwKQYKKoZIhvcN\n" + | ||
"AQwBAzAbBBRvyuWzvSCS62cWMeKOcF0JnaYRPgIDAMNQBIIEyMrZGW/sgjhW20Gz\n" + | ||
"fdj/NkWYORRTPCopS/y0NvZpmQgcu5uSbJWsadClnFBMQ2aZDJ5jaa5G2ipcrVSo\n" + | ||
"c7RYSi2vAh2fqGtm25spSKyV/t1q7Z07FBIQWVNMR9IczWmM5fQyeY7V9o2M3DtN\n" + | ||
"3co0RjXEpVQbvxXc5UI3Tbv8q3WKoxadicvm3uMTQCV1/swObYZqHUAMrvwgkXSy\n" + | ||
"omTsCr8JwKvI2ndPA1tD+63h9v+zHK7U6n24DBNJNxZOSmUO7L+WxgQ4COkTXhZj\n" + | ||
"24sYJcBJcGb74p9rv7QQn5WmkJBh+lfCQU+cS0bL6VwRZOyAesniMBpytaR5/SQW\n" + | ||
"UwAk230oy64x0WegG/q4uAIeczBlu2L1HDGJp3KbGwsu5Zwqs3psHjUZJEforWzR\n" + | ||
"RGTU+eBGi0U/BSeyeyY3HRimRrXytmXGcGFy6KcgAGeDwu6tG4hblyK+Fd4+8vw0\n" + | ||
"T3sYOsOPR3NjOFshtcnsTa/Q9lPCAAA3WNieJyWmnh+Zg0EU26GOEeagfZ8JLvfh\n" + | ||
"U1tE6e2j7L4xTt03IR2Z0U1bq+dY9eqfZb4PAqW7Zgv16m586QIjeSUecjlDRrN4\n" + | ||
"OYtOKAbO2qFjevgv/5e8ja4d5rM+xlT8vcOaoLXqGvBzgWvQcDOBp3Bd7I3KuWjZ\n" + | ||
"+i//bK7dnahOJP4Y2swdTy4AYkbNDPRwPmQRi0uwQ+ALH5VOxwa/MslkbmEuxVqw\n" + | ||
"t/F7IP150rIT2GeV3QTE4H6QtIGHcdib72zc3eer+GqxbSCqslaxOLKneSHuFCCo\n" + | ||
"9/jxaYA1i8Gunn16DV19UP8DXsOaW4pHl8FOOvTMEvLNxuXHQrZpltxfibZXW8CL\n" + | ||
"Yo6HX9dXmDsf+L9M0FKOJHwueT6+aWuUzy3Y2MSb2BdxTJYzXzwqaqnsFBVxtlzB\n" + | ||
"WsAoCpmXISqzQcnobqkHJ5BURVGR6o1CM1X7SvxlHV/vMtIsfjiXdWb0oPhO0KHd\n" + | ||
"agOOCg4N8t6vNkj3CXoePZC1n+2+Ldx89rIsebs7Y0PBmtcnW2Ez9q6BekxVNZVJ\n" + | ||
"Mcg5fzZROgQyK5rgy5IuHAUlnK/peYyoIYDLV8uFico7Fx/oIcB44mkAhVyDoP5E\n" + | ||
"FSCJxi5ory1nQ1kxhfVLEPUAbUq+0q2qhx/oagbEhWJxPgkYpqr5TaXG7w3Tf735\n" + | ||
"JH22YvwgfmFp9gwObZY9Ea6cmJb+jgamETLCgo5A+ghg5ecdvg9ivLBxEK1Kmx8y\n" + | ||
"DHlZxm/EQnSXYUD37E0UyFdYMoXmm39avOiOmZn4z22N//WWGvI2NH0B+R9x/i3A\n" + | ||
"TwvpcbJfGx3eYJnizH71GPQZOG0EbU6ctMaZqv6zMijqBwDJadl3q7m4PadJClup\n" + | ||
"NW1Y+J1hJ7XJIzcS/fBTu1GHFpQNkKCuv3Dly3XhkqINGRpunA02BX51mFU3SJM+\n" + | ||
"78cSq4mYt0ej5fO8iaDUEz/izTawZVryW8VvVShfHp5KHBqZEbNsEY7d06DwT+Rk\n" + | ||
"9990eywGasADs0TvNcuSguIfU1WcKaCYBK4fWmy34+aDkwBQalOmzk7fSnzugKBe\n" + | ||
"0mpEDey2SkTOlhX0VkHUd0YDF2hg+FAgZmFkCDqgAE9jYIOdAIYsHFGMp4VebBoM\n" + | ||
"Bg2zaxQ/CCeQ+f85zDFEMB8GCSqGSIb3DQEJFDESHhAAdABlAHMAdABjAGUAcgB0\n" + | ||
"MCEGCSqGSIb3DQEJFTEUBBJUaW1lIDE1ODYxNTM1NzA3NTMwggPcBgkqhkiG9w0B\n" + | ||
"BwagggPNMIIDyQIBADCCA8IGCSqGSIb3DQEHATApBgoqhkiG9w0BDAEGMBsEFJVD\n" + | ||
"mSE6jHuKMglKP2/O43UfmAjUAgMAw1CAggOInN3Hutt24/8YoVksN2hrcqtITqk3\n" + | ||
"mfMJkYg2GtKUoNwjpGC/RB0uyOkkyikupPlv3WmDqQr0Tzrqad3laBwGuN7OWxYh\n" + | ||
"yvuKCyazNT/3rDVVG/pEuvZuyLvwAARhuCnIk1cJMsLiY+4sqz/j0GnIxbhOzN/k\n" + | ||
"ST8lkIekNvE7H6yHZzZ+8TxMSJ3PwCc+oyhY88aHVssOu9oAmSHznJO2prA/vl1A\n" + | ||
"JQ6oODNbslCF35IsajJ2CrJAXKHut0OiBbgioKmlGwyIsFR1GnsEEyV2CcCj1ui1\n" + | ||
"gd7dI/QxJJ5PpEyw/BQi+rmvAmVGTOuBJuJUlHd0JBvZ78fjbMZU7SxWSKB2YVUW\n" + | ||
"1Glxw+F1HVB6kMk/Ucqnzrwns2IuNUdrxFIMo7rpEpq5ySZkeHqvpwwHE2S2XEOg\n" + | ||
"8yM5PYEq6b0/0rrmXL7eoYN0Atk0cUK9lAo19cfrD9GGc7D+lHAJzFY225UP9MfR\n" + | ||
"pT9NAClIbAB7mQnEta3o+MaES9EC2S+8UtcWRlW42vXX80syL08aoZYXFlwJ+9wP\n" + | ||
"oQ7jEC97jH3tEkAhpMcwvDf3C/ftRnX5iOMCdbhxOL8BUMfBPlj667TidJHTb/Lr\n" + | ||
"n/fyxWq/7qPrUdX8/gYCcufexDv0a8HQ8a99HAw+GzQU57jwbrmA2UHVFp/N488Q\n" + | ||
"3T3Ulw2AtrEHgUWPRMokcFAfO1U8/QObOheLGTIQ3VOjwrcxENLYJif4syyrYkOP\n" + | ||
"m/5d/d5TpXtI5GBGOzXjUSbz3KmoYM3MlLHGNUciZufif2lhWVwzgE+P1XLqmo1Z\n" + | ||
"sY3b7CGiRKOwFMvsYfFisen6xiIJdpurE2SypLA1UBmc9QoDGp5mxFG550pRCLGI\n" + | ||
"Zpsrvg16VDqU+WXbzIIu2LaJNWrM3jHnFde1cn2MJEdXchbq5FiajoZ27COUcdp9\n" + | ||
"sxvssAx7Ov9lfYqacWm+bZFOX2NdYUjz3VGk2YehCN7KnegV0a9f9L3eiY8hdfE6\n" + | ||
"4uDw4vIML5wDED6sIPdmywWbWm1PxRHiusWuL8PbApJ5r8cfCAfCqhYJos5TL9VD\n" + | ||
"IaI7jhWPHkiarlMzrpb8XwaY5/0lzYqUNj1/gZUQA2S4PLaQTBZZ8o3HQy91SvJr\n" + | ||
"kVug/6q06Xzyrxm467Q/8xIeIXym26DMp03xHatFSTvpJDxfl14cnbr2vNbPSlEy\n" + | ||
"fp6NbaSzKadTU3yqva1TrEdPlDA+MCEwCQYFKw4DAhoFAAQUtSDOH+RGJI6TAjl1\n" + | ||
"R2HMhteRVSMEFKmTNz/98xQ6XxJiJF5P+7rli4x5AgMBhqA="; | ||
|
||
static final Lock lock = new ReentrantLock(); | ||
static final Condition serverReady = lock.newCondition(); | ||
|
||
public static void main(String[] args) throws Exception { | ||
Thread serverThread = new Thread(() -> { | ||
try { | ||
doServerSide(); | ||
} | ||
catch (Exception exc) { | ||
log("Caught exception: %s", exc); | ||
} | ||
} | ||
); | ||
serverThread.start(); | ||
|
||
try { | ||
doClientSide((args == null || args.length < 1) ? null : args[0]); | ||
throw new RuntimeException("Expected SSLException did not occur!"); | ||
} catch (SSLException ssle) { | ||
log("Caught expected exception on client: " + ssle); | ||
} finally { | ||
serverThread.join(); | ||
} | ||
|
||
} | ||
|
||
static void doServerSide() throws Exception { | ||
Thread.currentThread().setName("ServerThread"); | ||
SSLContext sslc = SSLContext.getInstance("TLS"); | ||
log("doServerSide start"); | ||
KeyManagerFactory kmf = createKeyManagerFactory(KEYSTORE_PEM, | ||
KEYSTORE_PASS); | ||
sslc.init(kmf.getKeyManagers(), null, null); | ||
SSLServerSocketFactory ssf = | ||
(SSLServerSocketFactory)sslc.getServerSocketFactory(); | ||
|
||
try (SSLServerSocket sslServerSocket = | ||
(SSLServerSocket)ssf.createServerSocket(0)) { | ||
sslServerSocket.setReuseAddress(true); | ||
// Set the server port and wake up the client thread who is waiting | ||
// for the port to be set. | ||
lock.lock(); | ||
try { | ||
serverPort = sslServerSocket.getLocalPort(); | ||
log("Server listening on port %d", serverPort); | ||
serverReady.signalAll(); | ||
log("Server ready"); | ||
} finally { | ||
lock.unlock(); | ||
} | ||
|
||
// Go into the accept wait state until the client initiates the | ||
// TLS handshake. | ||
try (SSLSocket sslSocket = (SSLSocket)sslServerSocket.accept(); | ||
PrintWriter pw = | ||
new PrintWriter(sslSocket.getOutputStream()); | ||
BufferedReader br = new BufferedReader( | ||
new InputStreamReader(sslSocket.getInputStream()))) { | ||
log("Incoming connection from %s", | ||
sslSocket.getRemoteSocketAddress()); | ||
String data = br.readLine(); | ||
log("Got mesage from client: ", data); | ||
pw.write("I am server\n"); | ||
pw.close(); | ||
} | ||
} | ||
} | ||
|
||
private static KeyManagerFactory createKeyManagerFactory( | ||
String ksPem, String ksAuth) throws IOException, | ||
GeneralSecurityException { | ||
KeyManagerFactory kmf = null; | ||
if (ksPem != null && ksAuth != null) { | ||
Base64.Decoder b64dec = Base64.getMimeDecoder(); | ||
ByteArrayInputStream bais = | ||
new ByteArrayInputStream(b64dec.decode(ksPem)); | ||
KeyStore ks = KeyStore.getInstance("PKCS12"); | ||
char[] ksPass = ksAuth.toCharArray(); | ||
ks.load(bais, ksPass); | ||
|
||
kmf = KeyManagerFactory.getInstance("PKIX"); | ||
kmf.init(ks, ksAuth.toCharArray()); | ||
} | ||
|
||
return kmf; | ||
} | ||
|
||
static void doClientSide(String proto) throws Exception { | ||
Thread.currentThread().setName("ClientThread"); | ||
log("doClientSide start"); | ||
|
||
// Wait for the server to be ready and wake up this thread | ||
// so the client knows which port to communicate with | ||
lock.lock(); | ||
try { | ||
serverReady.await(); | ||
log("Client ready to contact port %d", serverPort); | ||
} finally { | ||
lock.unlock(); | ||
} | ||
|
||
SSLSocketFactory sslsf = | ||
(SSLSocketFactory)SSLSocketFactory.getDefault(); | ||
try (SSLSocket sslSocket = (SSLSocket)sslsf.createSocket( | ||
InetAddress.getLocalHost(), serverPort); | ||
BufferedReader br = new BufferedReader( | ||
new InputStreamReader(sslSocket.getInputStream())); | ||
PrintWriter pw = new PrintWriter(sslSocket.getOutputStream())) { | ||
|
||
if (proto != null) { | ||
sslSocket.setEnabledProtocols(new String[] { proto }); | ||
} | ||
pw.write("I am client\n"); | ||
pw.flush(); | ||
|
||
String response = br.readLine(); | ||
System.out.println("response is: " + response); | ||
} | ||
} | ||
|
||
private static void log(String msgFmt, Object ... args) { | ||
StringBuilder sb = new StringBuilder(); | ||
sb.append(String.format("%d | %s | ", | ||
System.currentTimeMillis(), Thread.currentThread().getName())); | ||
sb.append(String.format(msgFmt, args)); | ||
System.out.println(sb.toString()); | ||
} | ||
} |