/* * Copyright (c) 2020, Oracle and/or its affiliates. All rights reserved. * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. * * This code is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License version 2 only, as * published by the Free Software Foundation. * * This code is distributed in the hope that it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * version 2 for more details (a copy is included in the LICENSE file that * accompanied this code). * * You should have received a copy of the GNU General Public License version * 2 along with this work; if not, write to the Free Software Foundation, * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. * * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA * or visit www.oracle.com if you need additional information or have any * questions.
*/
/* * @test * @summary This is an interop compatibility test on TLSv1.3 hello retry request. * * @library /test/lib * ../TLSCommon * ../TLSCommon/interop * @compile -source 1.8 -target 1.8 * JdkInfoUtils.java * ../TLSCommon/interop/JdkProcServer.java * ../TLSCommon/interop/JdkProcClient.java * @run main/manual HrrTest true * @run main/manual HrrTest false
*/
if (!serverJdkInfo.enablesProtocol(Protocol.TLSV1_3)) {
System.out.println("The server doesn't support TLSv1.3.");
supported = false;
}
if (!clientJdkInfo.enablesProtocol(Protocol.TLSV1_3)) {
System.out.println("The client doesn't support TLSv1.3.");
supported = false;
}
return supported;
}
/* * It takes the server to support secp384r1 only, and the client to support * secp256r1 and secp384r1 in order, the server should respond hello retry * request message. * Please note that it has to specify the supported groups via property * jdk.tls.namedGroups for JSSE peers.
*/
@Override protected List<TestCase<ExtUseCase>> getTestCases() {
List<TestCase<ExtUseCase>> testCases = new ArrayList<>(); for (CipherSuite cipherSuite : new CipherSuite[] {
CipherSuite.TLS_AES_128_GCM_SHA256,
CipherSuite.TLS_AES_256_GCM_SHA384,
CipherSuite.TLS_CHACHA20_POLY1305_SHA256}) {
testCases.add(createTestCase(cipherSuite));
} return testCases;
}
private TestCase<ExtUseCase> createTestCase(CipherSuite cipherSuite) {
Cert cert = new Cert(KeyAlgorithm.RSA, SignatureAlgorithm.RSA,
HashAlgorithm.SHA256, CertUtils.RSA_CERT, CertUtils.RSA_KEY);
CertTuple certTuple = new CertTuple(cert, cert);
Die Informationen auf dieser Webseite wurden
nach bestem Wissen sorgfältig zusammengestellt. Es wird jedoch weder Vollständigkeit, noch Richtigkeit,
noch Qualität der bereit gestellten Informationen zugesichert.
Bemerkung:
Die farbliche Syntaxdarstellung und die Messung sind noch experimentell.