This repository has been archived by the owner. It is now read-only.
Permalink
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Browse files
8246330: Add TLS Tests for Legacy ECDSA curves
Reviewed-by: rhalade
- Loading branch information
Showing
with
173 additions
and 0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
@@ -0,0 +1,118 @@ | ||
/* | ||
* Copyright (c) 2020, Oracle and/or its affiliates. All rights reserved. | ||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. | ||
* | ||
* This code is free software; you can redistribute it and/or modify it | ||
* under the terms of the GNU General Public License version 2 only, as | ||
* published by the Free Software Foundation. | ||
* | ||
* This code is distributed in the hope that it will be useful, but WITHOUT | ||
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or | ||
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License | ||
* version 2 for more details (a copy is included in the LICENSE file that | ||
* accompanied this code). | ||
* | ||
* You should have received a copy of the GNU General Public License version | ||
* 2 along with this work; if not, write to the Free Software Foundation, | ||
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. | ||
* | ||
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA | ||
* or visit www.oracle.com if you need additional information or have any | ||
* questions. | ||
*/ | ||
|
||
/* | ||
* @test | ||
* @bug 8246330 | ||
* @library /javax/net/ssl/templates | ||
* @run main/othervm -Djdk.tls.namedGroups="sect283r1" | ||
DisabledCurve DISABLE_NONE PASS | ||
* @run main/othervm -Djdk.tls.namedGroups="sect283r1" | ||
DisabledCurve sect283r1 FAIL | ||
*/ | ||
import java.security.Security; | ||
import java.util.Arrays; | ||
import javax.net.ssl.SSLSocket; | ||
import javax.net.ssl.SSLServerSocket; | ||
import javax.net.ssl.SSLContext; | ||
import javax.net.ssl.SSLException; | ||
|
||
public class DisabledCurve extends SSLSocketTemplate { | ||
|
||
private static volatile int index; | ||
private static final String[][][] protocols = { | ||
{ { "TLSv1.3", "TLSv1.2", "TLSv1.1", "TLSv1" }, { "TLSv1.2" } }, | ||
{ { "TLSv1.2" }, { "TLSv1.3", "TLSv1.2", "TLSv1.1", "TLSv1" } }, | ||
{ { "TLSv1.2" }, { "TLSv1.2" } }, { { "TLSv1.1" }, { "TLSv1.1" } }, | ||
{ { "TLSv1" }, { "TLSv1" } } }; | ||
|
||
protected SSLContext createClientSSLContext() throws Exception { | ||
return createSSLContext( | ||
new SSLSocketTemplate.Cert[] { | ||
SSLSocketTemplate.Cert.CA_ECDSA_SECT283R1 }, | ||
new SSLSocketTemplate.Cert[] { | ||
SSLSocketTemplate.Cert.EE_ECDSA_SECT283R1 }, | ||
getClientContextParameters()); | ||
} | ||
|
||
protected SSLContext createServerSSLContext() throws Exception { | ||
return createSSLContext( | ||
new SSLSocketTemplate.Cert[] { | ||
SSLSocketTemplate.Cert.CA_ECDSA_SECT283R1 }, | ||
new SSLSocketTemplate.Cert[] { | ||
SSLSocketTemplate.Cert.EE_ECDSA_SECT283R1 }, | ||
getServerContextParameters()); | ||
} | ||
|
||
@Override | ||
protected void configureClientSocket(SSLSocket socket) { | ||
String[] ps = protocols[index][0]; | ||
|
||
System.out.print("Setting client protocol(s): "); | ||
Arrays.stream(ps).forEachOrdered(System.out::print); | ||
System.out.println(); | ||
|
||
socket.setEnabledProtocols(ps); | ||
} | ||
|
||
@Override | ||
protected void configureServerSocket(SSLServerSocket serverSocket) { | ||
String[] ps = protocols[index][1]; | ||
|
||
System.out.print("Setting server protocol(s): "); | ||
Arrays.stream(ps).forEachOrdered(System.out::print); | ||
System.out.println(); | ||
|
||
serverSocket.setEnabledProtocols(ps); | ||
} | ||
|
||
public static void main(String[] args) throws Exception { | ||
String expected = args[1]; | ||
String disabledName = ("DISABLE_NONE".equals(args[0]) ? "" : args[0]); | ||
if (disabledName.equals("")) { | ||
Security.setProperty("jdk.disabled.namedCurves", ""); | ||
} | ||
System.setProperty("jdk.sunec.disableNative", "false"); | ||
|
||
for (index = 0; index < protocols.length; index++) { | ||
try { | ||
(new DisabledCurve()).run(); | ||
if (expected.equals("FAIL")) { | ||
throw new RuntimeException( | ||
"The test case should not reach here"); | ||
} | ||
} catch (SSLException | IllegalStateException ssle) { | ||
if ((expected.equals("FAIL")) | ||
&& Security.getProperty("jdk.disabled.namedCurves") | ||
.contains(disabledName)) { | ||
System.out.println( | ||
"Expected exception was thrown: TEST PASSED"); | ||
} else { | ||
throw new RuntimeException(ssle); | ||
} | ||
|
||
} | ||
|
||
} | ||
} | ||
} |