test/jdk/java/net/httpclient/ssltest/Server.java
branchhttp-client-branch
changeset 56126 86e628130926
child 56265 ec34ae013fbe
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/test/jdk/java/net/httpclient/ssltest/Server.java	Wed Feb 14 16:04:18 2018 +0000
@@ -0,0 +1,125 @@
+/*
+ * Copyright (c) 2018, Oracle and/or its affiliates. All rights reserved.
+ * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
+ *
+ * This code is free software; you can redistribute it and/or modify it
+ * under the terms of the GNU General Public License version 2 only, as
+ * published by the Free Software Foundation.
+ *
+ * This code is distributed in the hope that it will be useful, but WITHOUT
+ * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
+ * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
+ * version 2 for more details (a copy is included in the LICENSE file that
+ * accompanied this code).
+ *
+ * You should have received a copy of the GNU General Public License version
+ * 2 along with this work; if not, write to the Free Software Foundation,
+ * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
+ *
+ * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
+ * or visit www.oracle.com if you need additional information or have any
+ * questions.
+ */
+
+import com.sun.net.httpserver.*;
+import java.io.*;
+import java.net.InetSocketAddress;
+import java.net.URI;
+import java.security.*;
+import java.util.*;
+import java.util.logging.*;
+import java.util.concurrent.Executors;
+import java.util.concurrent.ExecutorService;
+import javax.net.ssl.*;
+
+public class Server {
+
+    HttpsServer server;
+    final ExecutorService exec;
+    final int port;
+
+    // certfile: needs to be good or bad, ie. bad contains an otherwise valid
+    // cert but whose CN contains a different host. good must be correct
+
+    // assuming the TLS handshake succeeds, the server returns a 200 OK
+    // response with a short text string.
+    public Server(String certfile) throws Exception {
+        initLogger();
+        SSLContext ctx = getContext("TLSv1.2", certfile);
+        Configurator cfg = new Configurator(ctx);
+        server = HttpsServer.create(new InetSocketAddress(0), 10);
+        server.setHttpsConfigurator(cfg);
+        server.createContext("/", new MyHandler());
+        server.setExecutor((exec=Executors.newCachedThreadPool()));
+        port = server.getAddress().getPort();
+        System.out.println ("Listening on port " + port);
+        server.start();
+    }
+
+    int getPort() {
+        return port;
+    }
+
+    void stop() {
+        server.stop(1);
+        exec.shutdownNow();
+    }
+
+    SSLContext getContext(String protocol, String certfile) throws Exception {
+        char[] passphrase = "passphrase".toCharArray();
+        KeyStore ks = KeyStore.getInstance("JKS");
+        ks.load(new FileInputStream(certfile), passphrase);
+
+        KeyManagerFactory kmf = KeyManagerFactory.getInstance("SunX509");
+        kmf.init(ks, passphrase);
+
+        TrustManagerFactory tmf = TrustManagerFactory.getInstance("SunX509");
+        tmf.init(ks);
+
+        SSLContext ssl = SSLContext.getInstance(protocol);
+        ssl.init(kmf.getKeyManagers(), tmf.getTrustManagers(), null);
+        return ssl;
+    }
+
+    Logger logger;
+
+    void initLogger() {
+        logger = Logger.getLogger("com.sun.net.httpserver");
+        Handler h = new ConsoleHandler();
+        logger.setLevel(Level.ALL);
+        h.setLevel(Level.ALL);
+        logger.addHandler(h);
+    }
+
+    String responseBody = "Greetings from localhost";
+
+    class MyHandler implements HttpHandler {
+
+        @Override
+        public void handle(HttpExchange e) throws IOException {
+            System.out.println("Server: received " + e.getRequestURI());
+            InputStream is = e.getRequestBody();
+            byte[] buf = new byte[128];
+            while (is.read(buf) != -1);
+            is.close();
+            e.sendResponseHeaders(200, responseBody.length());
+            OutputStream os = e.getResponseBody();
+            os.write(responseBody.getBytes("ISO8859_1"));
+            os.close();
+        }
+    }
+
+    class Configurator extends HttpsConfigurator {
+        public Configurator(SSLContext ctx) throws Exception {
+            super(ctx);
+        }
+
+        public void configure(HttpsParameters params) {
+            SSLParameters p = getSSLContext().getDefaultSSLParameters();
+            for (String cipher : p.getCipherSuites())
+                System.out.println("Cipher: " + cipher);
+            System.err.println("PArams = " + p);
+            params.setSSLParameters(p);
+        }
+    }
+}