test/jdk/sun/security/ssl/SSLContextImpl/IllegalProtocolProperty.java
changeset 47216 71c04702a3d5
parent 23052 241885315119
child 59302 24e8cdead5f3
equal deleted inserted replaced
47215:4ebc2e2fb97c 47216:71c04702a3d5
       
     1 /*
       
     2  * Copyright (c) 2013, Oracle and/or its affiliates. All rights reserved.
       
     3  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
       
     4  *
       
     5  * This code is free software; you can redistribute it and/or modify it
       
     6  * under the terms of the GNU General Public License version 2 only, as
       
     7  * published by the Free Software Foundation.
       
     8  *
       
     9  * This code is distributed in the hope that it will be useful, but WITHOUT
       
    10  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
       
    11  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
       
    12  * version 2 for more details (a copy is included in the LICENSE file that
       
    13  * accompanied this code).
       
    14  *
       
    15  * You should have received a copy of the GNU General Public License version
       
    16  * 2 along with this work; if not, write to the Free Software Foundation,
       
    17  * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
       
    18  *
       
    19  * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
       
    20  * or visit www.oracle.com if you need additional information or have any
       
    21  * questions.
       
    22  */
       
    23 
       
    24 // SunJSSE does not support dynamic system properties, no way to re-use
       
    25 // system properties in samevm/agentvm mode.
       
    26 
       
    27 /*
       
    28  * @test
       
    29  * @bug 7093640
       
    30  * @summary Enable TLS 1.1 and TLS 1.2 by default in client side of SunJSSE
       
    31  * @run main/othervm -Djdk.tls.client.protocols="XSLv3,TLSv1"
       
    32  *      IllegalProtocolProperty
       
    33  */
       
    34 
       
    35 import javax.net.ssl.*;
       
    36 import java.security.NoSuchAlgorithmException;
       
    37 
       
    38 public class IllegalProtocolProperty {
       
    39     static enum ContextVersion {
       
    40         TLS_CV_01("SSL", "TLSv1", "TLSv1.2", true),
       
    41         TLS_CV_02("TLS", "TLSv1", "TLSv1.2", true),
       
    42         TLS_CV_03("SSLv3", "TLSv1", "TLSv1.2", false),
       
    43         TLS_CV_04("TLSv1", "TLSv1", "TLSv1.2", false),
       
    44         TLS_CV_05("TLSv1.1", "TLSv1.1", "TLSv1.2", false),
       
    45         TLS_CV_06("TLSv1.2", "TLSv1.2", "TLSv1.2", false),
       
    46         TLS_CV_07("Default", "TLSv1", "TLSv1.2", true);
       
    47 
       
    48         final String contextVersion;
       
    49         final String defaultProtocolVersion;
       
    50         final String supportedProtocolVersion;
       
    51         final boolean impacted;
       
    52 
       
    53         ContextVersion(String contextVersion, String defaultProtocolVersion,
       
    54                 String supportedProtocolVersion, boolean impacted) {
       
    55             this.contextVersion = contextVersion;
       
    56             this.defaultProtocolVersion = defaultProtocolVersion;
       
    57             this.supportedProtocolVersion = supportedProtocolVersion;
       
    58             this.impacted = impacted;
       
    59         }
       
    60     }
       
    61 
       
    62     public static void main(String[] args) throws Exception {
       
    63         for (ContextVersion cv : ContextVersion.values()) {
       
    64             System.out.println("Checking SSLContext of " + cv.contextVersion);
       
    65 
       
    66             SSLContext context;
       
    67             try {
       
    68                 context = SSLContext.getInstance(cv.contextVersion);
       
    69                 if (cv.impacted) {
       
    70                     throw new Exception(
       
    71                         "illegal system property jdk.tls.client.protocols: " +
       
    72                         System.getProperty("jdk.tls.client.protocols"));
       
    73                 }
       
    74             } catch (NoSuchAlgorithmException nsae) {
       
    75                 if (cv.impacted) {
       
    76                     System.out.println(
       
    77                         "\tIgnore: illegal system property " +
       
    78                         "jdk.tls.client.protocols=" +
       
    79                         System.getProperty("jdk.tls.client.protocols"));
       
    80                     continue;
       
    81                 } else {
       
    82                     throw nsae;
       
    83                 }
       
    84             }
       
    85 
       
    86             // Default SSLContext is initialized automatically.
       
    87             if (!cv.contextVersion.equals("Default")) {
       
    88                 // Use default TK, KM and random.
       
    89                 context.init((KeyManager[])null, (TrustManager[])null, null);
       
    90             }
       
    91 
       
    92             SSLParameters parameters = context.getDefaultSSLParameters();
       
    93 
       
    94             String[] protocols = parameters.getProtocols();
       
    95             String[] ciphers = parameters.getCipherSuites();
       
    96 
       
    97             if (protocols.length == 0 || ciphers.length == 0) {
       
    98                 throw new Exception("No default protocols or cipher suites");
       
    99             }
       
   100 
       
   101             boolean isMatch = false;
       
   102             for (String protocol : protocols) {
       
   103                 System.out.println("\tdefault protocol version " + protocol);
       
   104                 if (protocol.equals(cv.defaultProtocolVersion)) {
       
   105                     isMatch = true;
       
   106                     break;
       
   107                 }
       
   108             }
       
   109 
       
   110             if (!isMatch) {
       
   111                 throw new Exception("No matched default protocol");
       
   112             }
       
   113 
       
   114             parameters = context.getSupportedSSLParameters();
       
   115 
       
   116             protocols = parameters.getProtocols();
       
   117             ciphers = parameters.getCipherSuites();
       
   118 
       
   119             if (protocols.length == 0 || ciphers.length == 0) {
       
   120                 throw new Exception("No supported protocols or cipher suites");
       
   121             }
       
   122 
       
   123             isMatch = false;
       
   124             for (String protocol : protocols) {
       
   125                 System.out.println("\tsupported protocol version " + protocol);
       
   126                 if (protocol.equals(cv.supportedProtocolVersion)) {
       
   127                     isMatch = true;
       
   128                     break;
       
   129                 }
       
   130             }
       
   131 
       
   132             if (!isMatch) {
       
   133                 throw new Exception("No matched supported protocol");
       
   134             }
       
   135             System.out.println("\t... Success");
       
   136         }
       
   137     }
       
   138 }