/* * Copyright (c) 2001, 2022, Oracle and/or its affiliates. All rights reserved. * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. * * This code is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License version 2 only, as * published by the Free Software Foundation. * * This code is distributed in the hope that it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * version 2 for more details (a copy is included in the LICENSE file that * accompanied this code). * * You should have received a copy of the GNU General Public License version * 2 along with this work; if not, write to the Free Software Foundation, * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. * * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA * or visit www.oracle.com if you need additional information or have any * questions.
*/
// SunJSSE does not support dynamic system properties, no way to re-use // system properties in samevm/agentvm mode.
/* * ============================================================= * Set the various variables needed for the tests, then * specify what tests to run on each side.
*/
/* * Should we run the client or server in a separate thread? * Both sides can throw exceptions, but do you have a preference * as to which side should be the main thread.
*/ staticboolean separateServerThread = false;
/* * Where do we find the keystores?
*/ static String pathToStores = "../etc"; static String keyStoreFile = "keystore"; static String trustStoreFile = "truststore"; static String passwd = "passphrase";
/* * If the client or server is doing some kind of object creation * that the other side depends on, and that thread prematurely * exits, you may experience a hang. The test harness will * terminate all hung threads after its timeout has expired, * currently 3 minutes by default, but you might try to be * smart about it....
*/
/* * Define the server side of the test. * * If the server prematurely exits, serverReady will be set to true * to avoid infinite hangs.
*/ void doServerSide() throws Exception {
SSLServerSocketFactory sslssf = mySSLContext.getServerSocketFactory();
SSLServerSocket sslServerSocket
= (SSLServerSocket) sslssf.createServerSocket(serverPort); // for both client/server to call into X509KM
sslServerSocket.setNeedClientAuth(true);
serverPort = sslServerSocket.getLocalPort();
/* * Signal Client, we're ready for his connect.
*/
serverReady = true;
/* * The default ciphersuite ordering from the SSLContext may not * reflect "h2" ciphersuites as being preferred, additionally the * client may not send them in an appropriate order. We could resort * the suite list if so desired.
*/
String[] suites = sslp.getCipherSuites();
sslp.setCipherSuites(suites);
sslp.setUseCipherSuitesOrder(true); // Set server side order
// Set the ALPN selection. if (serverAPs != null) {
sslp.setApplicationProtocols(serverAPs);
}
sslSocket.setSSLParameters(sslp);
if (sslSocket.getHandshakeApplicationProtocol() != null) { thrownew Exception ("getHandshakeApplicationProtocol() should "
+ "return null before the handshake starts");
}
// check that no callback has been registered if (sslSocket.getHandshakeApplicationProtocolSelector() != null) { thrownew Exception("getHandshakeApplicationProtocolSelector() " + "should return null");
}
// check that the callback can be retrieved if (sslSocket.getHandshakeApplicationProtocolSelector() == null) { thrownew Exception("getHandshakeApplicationProtocolSelector()" + " should return non-null");
}
}
sslSocket.startHandshake();
if (sslSocket.getHandshakeApplicationProtocol() != null) { thrownew Exception ("getHandshakeApplicationProtocol() should "
+ "return null after the handshake is completed");
}
String ap = sslSocket.getApplicationProtocol();
System.out.println("Application Protocol: \"" + ap + "\"");
if (ap == null) { thrownew Exception( "Handshake was completed but null was received");
} if (expectedAP.equals("NONE")) { if (!ap.isEmpty()) { thrownew Exception("Expected no ALPN value");
} else {
System.out.println("No ALPN value negotiated, as expected");
}
} elseif (!expectedAP.equals(ap)) { thrownew Exception(expectedAP
+ " ALPN value not available on negotiated connection");
}
/* * Define the client side of the test. * * If the server prematurely exits, serverReady will be set to true * to avoid infinite hangs.
*/ void doClientSide() throws Exception {
/* * Wait for server to get started.
*/ while (!serverReady) { Thread.sleep(50);
}
/* * The default ciphersuite ordering from the SSLContext may not * reflect "h2" ciphersuites as being preferred, additionally the * client may not send them in an appropriate order. We could resort * the suite list if so desired.
*/
String[] suites = sslp.getCipherSuites();
sslp.setCipherSuites(suites);
sslp.setUseCipherSuitesOrder(true); // Set server side order
// Set the ALPN selection.
sslp.setApplicationProtocols(clientAPs);
sslSocket.setSSLParameters(sslp);
if (sslSocket.getHandshakeApplicationProtocol() != null) { thrownew Exception ("getHandshakeApplicationProtocol() should "
+ "return null before the handshake starts");
}
sslSocket.startHandshake();
if (sslSocket.getHandshakeApplicationProtocol() != null) { thrownew Exception ("getHandshakeApplicationProtocol() should "
+ "return null after the handshake is completed");
}
/* * Check that the resulting connection meets our defined ALPN * criteria. If we were connecting to a non-JSSE implementation, * the server might have negotiated something we shouldn't accept.
*/
String ap = sslSocket.getApplicationProtocol();
System.out.println("Application Protocol: \"" + ap + "\"");
if (ap == null) { thrownew Exception( "Handshake was completed but null was received");
} if (expectedAP.equals("NONE")) { if (!ap.isEmpty()) { thrownew Exception("Expected no ALPN value");
} else {
System.out.println("No ALPN value negotiated, as expected");
}
} elseif (!expectedAP.equals(ap)) { thrownew Exception(expectedAP
+ " ALPN value not available on negotiated connection");
}
/* * ============================================================= * The remainder is just support stuff
*/ // use any free port by default volatileint serverPort = 0;
/* * Convert a comma-separated list into an array of strings.
*/ privatestatic String[] convert(String list) { if (list.equals("UNUSED")) { returnnull;
}
if (list.equals("EMPTY")) { returnnew String[0];
}
String[] strings; if (list.indexOf(',') > 0) {
strings = list.split(",");
} else {
strings = new String[]{ list };
}
/* * Primary constructor, used to drive remainder of the test. * * Fork off the other side, then do your work.
*/
SSLSocketAlpnTest() throws Exception {
Exception startException = null;
mySSLContext = getSSLContext(keyFilename, trustFilename); try { if (separateServerThread) {
startServer(true);
startClient(false);
} else {
startClient(true);
startServer(false);
}
} catch (Exception e) {
startException = e;
}
/* * Wait for other side to close down.
*/ if (separateServerThread) { if (serverThread != null) {
serverThread.join();
}
} else { if (clientThread != null) {
clientThread.join();
}
}
/* * When we get here, the test is pretty much over. * Which side threw the error?
*/
Exception local;
Exception remote;
if (separateServerThread) {
remote = serverException;
local = clientException;
} else {
remote = clientException;
local = serverException;
}
/* * If there was an exception *AND* a startException, * output it.
*/ if (exception != null) { if (exception != startException && startException != null) {
exception.addSuppressed(startException);
} throw exception;
}
Die Informationen auf dieser Webseite wurden
nach bestem Wissen sorgfältig zusammengestellt. Es wird jedoch weder Vollständigkeit, noch Richtigkeit,
noch Qualität der bereit gestellten Informationen zugesichert.
Bemerkung:
Die farbliche Syntaxdarstellung und die Messung sind noch experimentell.