jdk/test/sun/security/ssl/sanity/interop/JSSEClient.java
changeset 23073 323831f76669
parent 23072 cf836c6f207d
parent 23065 259559ac0ddf
child 23086 e61d91adef6f
equal deleted inserted replaced
23072:cf836c6f207d 23073:323831f76669
     1 /*
       
     2  * Copyright (c) 2002, 2005, Oracle and/or its affiliates. All rights reserved.
       
     3  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
       
     4  *
       
     5  * This code is free software; you can redistribute it and/or modify it
       
     6  * under the terms of the GNU General Public License version 2 only, as
       
     7  * published by the Free Software Foundation.
       
     8  *
       
     9  * This code is distributed in the hope that it will be useful, but WITHOUT
       
    10  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
       
    11  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
       
    12  * version 2 for more details (a copy is included in the LICENSE file that
       
    13  * accompanied this code).
       
    14  *
       
    15  * You should have received a copy of the GNU General Public License version
       
    16  * 2 along with this work; if not, write to the Free Software Foundation,
       
    17  * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
       
    18  *
       
    19  * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
       
    20  * or visit www.oracle.com if you need additional information or have any
       
    21  * questions.
       
    22  */
       
    23 
       
    24 
       
    25 import java.io.*;
       
    26 import java.net.*;
       
    27 import java.util.*;
       
    28 
       
    29 import java.security.*;
       
    30 import java.security.cert.*;
       
    31 import java.security.cert.Certificate;
       
    32 
       
    33 import javax.net.ssl.*;
       
    34 
       
    35 class JSSEClient extends CipherTest.Client {
       
    36 
       
    37     private final SSLContext sslContext;
       
    38     private final MyX509KeyManager keyManager;
       
    39 
       
    40     JSSEClient(CipherTest cipherTest) throws Exception {
       
    41         super(cipherTest);
       
    42         this.keyManager = new MyX509KeyManager(CipherTest.keyManager);
       
    43         sslContext = SSLContext.getInstance("TLS");
       
    44     }
       
    45 
       
    46     void runTest(CipherTest.TestParameters params) throws Exception {
       
    47         SSLSocket socket = null;
       
    48         try {
       
    49             keyManager.setAuthType(params.clientAuth);
       
    50             sslContext.init(new KeyManager[] {keyManager}, new TrustManager[] {cipherTest.trustManager}, cipherTest.secureRandom);
       
    51             SSLSocketFactory factory = (SSLSocketFactory)sslContext.getSocketFactory();
       
    52             socket = (SSLSocket)factory.createSocket("127.0.0.1", cipherTest.serverPort);
       
    53             socket.setSoTimeout(cipherTest.TIMEOUT);
       
    54             socket.setEnabledCipherSuites(new String[] {params.cipherSuite});
       
    55             socket.setEnabledProtocols(new String[] {params.protocol});
       
    56             InputStream in = socket.getInputStream();
       
    57             OutputStream out = socket.getOutputStream();
       
    58             sendRequest(in, out);
       
    59             socket.close();
       
    60             SSLSession session = socket.getSession();
       
    61             session.invalidate();
       
    62             String cipherSuite = session.getCipherSuite();
       
    63             if (params.cipherSuite.equals(cipherSuite) == false) {
       
    64                 throw new Exception("Negotiated ciphersuite mismatch: " + cipherSuite + " != " + params.cipherSuite);
       
    65             }
       
    66             String protocol = session.getProtocol();
       
    67             if (params.protocol.equals(protocol) == false) {
       
    68                 throw new Exception("Negotiated protocol mismatch: " + protocol + " != " + params.protocol);
       
    69             }
       
    70             if (cipherSuite.indexOf("DH_anon") == -1) {
       
    71                 session.getPeerCertificates();
       
    72             }
       
    73             Certificate[] certificates = session.getLocalCertificates();
       
    74             if (params.clientAuth == null) {
       
    75                 if (certificates != null) {
       
    76                     throw new Exception("Local certificates should be null");
       
    77                 }
       
    78             } else {
       
    79                 if ((certificates == null) || (certificates.length == 0)) {
       
    80                     throw new Exception("Certificates missing");
       
    81                 }
       
    82                 String keyAlg = certificates[0].getPublicKey().getAlgorithm();
       
    83                 if (params.clientAuth != keyAlg) {
       
    84                     throw new Exception("Certificate type mismatch: " + keyAlg + " != " + params.clientAuth);
       
    85                 }
       
    86             }
       
    87         } finally {
       
    88             if (socket != null) {
       
    89                 socket.close();
       
    90             }
       
    91         }
       
    92     }
       
    93 
       
    94 }