Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
openanolis
dragonwell8_jdk
提交
4709070d
D
dragonwell8_jdk
项目概览
openanolis
/
dragonwell8_jdk
通知
4
Star
2
Fork
0
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
D
dragonwell8_jdk
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
提交
4709070d
编写于
12月 08, 2014
作者:
X
xuelei
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
8049432: New tests for TLS property jdk.tls.client.protocols
Reviewed-by: xuelei Contributed-by:
N
Zaiyao Liu
<
zaiyao.liu@oracle.com
>
上级
dd50b1e9
变更
1
隐藏空白更改
内联
并排
Showing
1 changed file
with
204 addition
and
0 deletion
+204
-0
test/javax/net/ssl/TLS/TLSClientPropertyTest.java
test/javax/net/ssl/TLS/TLSClientPropertyTest.java
+204
-0
未找到文件。
test/javax/net/ssl/TLS/TLSClientPropertyTest.java
0 → 100644
浏览文件 @
4709070d
/*
* Copyright (c) 2014, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License version 2 only, as
* published by the Free Software Foundation.
*
* This code is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* version 2 for more details (a copy is included in the LICENSE file that
* accompanied this code).
*
* You should have received a copy of the GNU General Public License version
* 2 along with this work; if not, write to the Free Software Foundation,
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
* or visit www.oracle.com if you need additional information or have any
* questions.
*/
import
java.security.KeyManagementException
;
import
java.security.NoSuchAlgorithmException
;
import
java.util.Arrays
;
import
java.util.List
;
import
javax.net.ssl.SSLContext
;
/*
* @test
* @bug 8049432
* @summary New tests for TLS property jdk.tls.client.protocols
* @run main/othervm TLSClientPropertyTest NoProperty
* @run main/othervm TLSClientPropertyTest SSLv3
* @run main/othervm TLSClientPropertyTest TLSv1
* @run main/othervm TLSClientPropertyTest TLSv11
* @run main/othervm TLSClientPropertyTest TLSv12
* @run main/othervm TLSClientPropertyTest WrongProperty
*/
/**
* Sets the property jdk.tls.client.protocols to one of this protocols:
* SSLv3,TLSv1,TLSv1.1,TLSv1.2 and TLSV(invalid) or removes this
* property (if any),then validates the default, supported and current
* protocols in the SSLContext.
*/
public
class
TLSClientPropertyTest
{
private
final
String
[]
expecteSupportedProtos
=
new
String
[]
{
"SSLv2Hello"
,
"SSLv3"
,
"TLSv1"
,
"TLSv1.1"
,
"TLSv1.2"
};
public
static
void
main
(
String
[]
args
)
throws
Exception
{
if
(
args
.
length
<
1
)
{
throw
new
RuntimeException
(
"Incorrect arguments,expected arguments: testCase"
);
}
String
[]
expectedDefaultProtos
;
String
testCase
=
args
[
0
];
String
contextProtocol
;
switch
(
testCase
)
{
case
"NoProperty"
:
if
(
System
.
getProperty
(
"jdk.tls.client.protocols"
)
!=
null
)
{
System
.
getProperties
().
remove
(
"jdk.tls.client.protocols"
);
}
contextProtocol
=
null
;
expectedDefaultProtos
=
new
String
[]
{
"SSLv3"
,
"TLSv1"
,
"TLSv1.1"
,
"TLSv1.2"
};
break
;
case
"SSLv3"
:
contextProtocol
=
"SSLv3"
;
expectedDefaultProtos
=
new
String
[]
{
"SSLv3"
};
break
;
case
"TLSv1"
:
contextProtocol
=
"TLSv1"
;
expectedDefaultProtos
=
new
String
[]
{
"SSLv3"
,
"TLSv1"
};
break
;
case
"TLSv11"
:
contextProtocol
=
"TLSv1.1"
;
expectedDefaultProtos
=
new
String
[]
{
"SSLv3"
,
"TLSv1"
,
"TLSv1.1"
};
break
;
case
"TLSv12"
:
contextProtocol
=
"TLSv1.2"
;
expectedDefaultProtos
=
new
String
[]
{
"SSLv3"
,
"TLSv1"
,
"TLSv1.1"
,
"TLSv1.2"
};
break
;
case
"WrongProperty"
:
expectedDefaultProtos
=
new
String
[]
{};
contextProtocol
=
"TLSV"
;
break
;
default
:
throw
new
RuntimeException
(
"test case is wrong"
);
}
if
(
contextProtocol
!=
null
)
{
System
.
setProperty
(
"jdk.tls.client.protocols"
,
contextProtocol
);
}
try
{
TLSClientPropertyTest
test
=
new
TLSClientPropertyTest
();
test
.
test
(
contextProtocol
,
expectedDefaultProtos
);
if
(
testCase
.
equals
(
"WrongProperty"
))
{
throw
new
RuntimeException
(
"Test failed: NoSuchAlgorithmException "
+
"is expected when input wrong protocol"
);
}
else
{
System
.
out
.
println
(
"Test "
+
contextProtocol
+
" passed"
);
}
}
catch
(
NoSuchAlgorithmException
nsae
)
{
if
(
testCase
.
equals
(
"WrongProperty"
))
{
System
.
out
.
println
(
"NoSuchAlgorithmException is expected,"
+
contextProtocol
+
" test passed"
);
}
else
{
throw
nsae
;
}
}
}
/**
* The parameter passed is the user enforced protocol. Does not catch
* NoSuchAlgorithmException, WrongProperty test will use it.
*/
public
void
test
(
String
expectedContextProto
,
String
[]
expectedDefaultProtos
)
throws
NoSuchAlgorithmException
{
SSLContext
context
=
null
;
try
{
if
(
expectedContextProto
!=
null
)
{
context
=
SSLContext
.
getInstance
(
expectedContextProto
);
context
.
init
(
null
,
null
,
null
);
}
else
{
context
=
SSLContext
.
getDefault
();
}
printContextDetails
(
context
);
}
catch
(
KeyManagementException
ex
)
{
error
(
null
,
ex
);
}
validateContext
(
expectedContextProto
,
expectedDefaultProtos
,
context
);
}
/**
* Simple print utility for SSLContext's protocol details.
*/
private
void
printContextDetails
(
SSLContext
context
)
{
System
.
out
.
println
(
"Default Protocols: "
+
Arrays
.
toString
(
context
.
getDefaultSSLParameters
()
.
getProtocols
()));
System
.
out
.
println
(
"Supported Protocols: "
+
Arrays
.
toString
(
context
.
getSupportedSSLParameters
()
.
getProtocols
()));
System
.
out
.
println
(
"Current Protocol : "
+
context
.
getProtocol
());
}
/**
* Error handler.
*/
private
void
error
(
String
msg
,
Throwable
tble
)
{
String
finalMsg
=
"FAILED "
+
(
msg
!=
null
?
msg
:
""
);
if
(
tble
!=
null
)
{
throw
new
RuntimeException
(
finalMsg
,
tble
);
}
throw
new
RuntimeException
(
finalMsg
);
}
/**
* Validates the SSLContext's protocols against the user enforced protocol.
*/
private
void
validateContext
(
String
expectedProto
,
String
[]
expectedDefaultProtos
,
SSLContext
context
)
{
if
(
expectedProto
==
null
)
{
expectedProto
=
"Default"
;
}
if
(!
context
.
getProtocol
().
equals
(
expectedProto
))
{
error
(
"Invalid current protocol:"
+
context
.
getProtocol
()
+
", Expected:"
+
expectedProto
,
null
);
}
List
<
String
>
actualDefaultProtos
=
Arrays
.
asList
(
context
.
getDefaultSSLParameters
().
getProtocols
());
for
(
String
p:
expectedDefaultProtos
)
{
if
(!
actualDefaultProtos
.
contains
(
p
))
{
error
(
"Default protocol "
+
p
+
"missing"
,
null
);
}
}
List
<
String
>
actualSupportedProtos
=
Arrays
.
asList
(
context
.
getSupportedSSLParameters
().
getProtocols
());
for
(
String
p:
expecteSupportedProtos
)
{
if
(!
actualSupportedProtos
.
contains
(
p
))
{
error
(
"Expected to support protocol:"
+
p
,
null
);
}
}
}
}
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录