< prev index next >
test/jdk/javax/net/ssl/compatibility/UseCase.java
Print this page
@@ -1,7 +1,7 @@
/*
- * Copyright (c) 2017, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 2017, 2019, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License version 2 only, as
* published by the Free Software Foundation.
@@ -30,29 +30,132 @@
public class UseCase {
private static final boolean FULL_CASES
= Utils.getBoolProperty("fullCases");
- private static final Parameter[][] PARAMS = new Parameter[][] {
- FULL_CASES ? Protocol.values() : Protocol.getMandatoryValues(),
- FULL_CASES ? CipherSuite.values() : CipherSuite.getMandatoryValues(),
- FULL_CASES ? ClientAuth.values() : ClientAuth.getMandatoryValues(),
- FULL_CASES ? ServerName.values() : ServerName.getMandatoryValues(),
- FULL_CASES ? AppProtocol.values() : AppProtocol.getMandatoryValues() };
+ public static final boolean FULL_CIPHER_SUITES
+ = Utils.getBoolProperty("fullCipherSuites");
+
+ public static final Protocol[] PROTOCOLS = new Protocol[] {
+ Protocol.TLSV1,
+ Protocol.TLSV1_1,
+ Protocol.TLSV1_2,
+ Protocol.TLSV1_3 };
+
+ public static final CipherSuite[] CIPHER_SUITES = new CipherSuite[] {
+ CipherSuite.TLS_AES_128_GCM_SHA256,
+ CipherSuite.TLS_AES_256_GCM_SHA384,
+ CipherSuite.TLS_CHACHA20_POLY1305_SHA256,
+ CipherSuite.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256,
+ CipherSuite.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,
+ CipherSuite.TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256,
+ CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384,
+ CipherSuite.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,
+ CipherSuite.TLS_RSA_WITH_AES_256_CBC_SHA256,
+ CipherSuite.TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384,
+ CipherSuite.TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384,
+ CipherSuite.TLS_DHE_RSA_WITH_AES_256_CBC_SHA256,
+ CipherSuite.TLS_DHE_DSS_WITH_AES_256_CBC_SHA256,
+ CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
+ CipherSuite.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
+ CipherSuite.TLS_RSA_WITH_AES_256_CBC_SHA,
+ CipherSuite.TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA,
+ CipherSuite.TLS_ECDH_RSA_WITH_AES_256_CBC_SHA,
+ CipherSuite.TLS_DHE_RSA_WITH_AES_256_CBC_SHA,
+ CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,
+ CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,
+ CipherSuite.TLS_RSA_WITH_AES_128_CBC_SHA256,
+ CipherSuite.TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256,
+ CipherSuite.TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256,
+ CipherSuite.TLS_DHE_RSA_WITH_AES_128_CBC_SHA256,
+ CipherSuite.TLS_DHE_DSS_WITH_AES_128_CBC_SHA256,
+ CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
+ CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
+ CipherSuite.TLS_RSA_WITH_AES_128_CBC_SHA,
+ CipherSuite.TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA,
+ CipherSuite.TLS_DHE_RSA_WITH_AES_128_CBC_SHA,
+ CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
+ CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
+ CipherSuite.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
+ CipherSuite.TLS_RSA_WITH_AES_256_GCM_SHA384,
+ CipherSuite.TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384,
+ CipherSuite.TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384,
+ CipherSuite.TLS_DHE_RSA_WITH_AES_256_GCM_SHA384,
+ CipherSuite.TLS_DHE_DSS_WITH_AES_256_GCM_SHA384,
+ CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
+ CipherSuite.TLS_RSA_WITH_AES_128_GCM_SHA256,
+ CipherSuite.TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256,
+ CipherSuite.TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256,
+ CipherSuite.TLS_DHE_RSA_WITH_AES_128_GCM_SHA256,
+ CipherSuite.TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 };
+
+ public static final CipherSuite[] MANDATORY_CIPHER_SUITES = new CipherSuite[] {
+ CipherSuite.TLS_AES_128_GCM_SHA256,
+ CipherSuite.TLS_CHACHA20_POLY1305_SHA256,
+ CipherSuite.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,
+ CipherSuite.TLS_RSA_WITH_AES_128_CBC_SHA,
+ CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
+ CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
+ CipherSuite.TLS_RSA_WITH_AES_256_CBC_SHA256,
+ CipherSuite.TLS_DHE_DSS_WITH_AES_256_CBC_SHA256,
+ CipherSuite.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384,
+ CipherSuite.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 };
+
+ enum ServerName {
+
+ NONE(null),
+ EXAMPLE("EXAMPLE");
+
+ final String name;
+
+ private ServerName(String name) {
+ this.name = name;
+ }
+ }
+
+ enum AppProtocol {
+
+ NONE(null, null),
+ EXAMPLE(new String[] { Utils.HTTP_2, Utils.HTTP_1_1 }, Utils.HTTP_2);
+
+ final String[] appProtocols;
+
+ // Expected negotiated application protocol
+ final String negoAppProtocol;
+
+ private AppProtocol(String[] appProtocols, String negoAppProtocol) {
+ this.appProtocols = appProtocols;
+ this.negoAppProtocol = negoAppProtocol;
+ }
+ }
+
+ private static final Object[][] PARAMS = new Object[][] {
+ FULL_CASES ? PROTOCOLS : PROTOCOLS,
+ FULL_CASES ? CIPHER_SUITES : MANDATORY_CIPHER_SUITES,
+ FULL_CASES ? new Boolean[] { false, true } : new Boolean[] { true },
+ FULL_CASES
+ ? new ServerName[] { ServerName.NONE, ServerName.EXAMPLE }
+ : new ServerName[] { ServerName.EXAMPLE },
+ FULL_CASES
+ ? new AppProtocol[] {
+ AppProtocol.NONE,
+ AppProtocol.EXAMPLE }
+ : new AppProtocol[] {
+ AppProtocol.EXAMPLE } };
public final Protocol protocol;
public final CipherSuite cipherSuite;
- public final ClientAuth clientAuth;
+ public final Boolean clientAuth;
public final ServerName serverName;
public final AppProtocol appProtocol;
public final boolean negativeCase;
public UseCase(
Protocol protocol,
CipherSuite cipherSuite,
- ClientAuth clientAuth,
+ boolean clientAuth,
ServerName serverName,
AppProtocol appProtocol) {
this.protocol = protocol;
this.cipherSuite = cipherSuite;
this.clientAuth = clientAuth;
@@ -60,46 +163,41 @@
this.appProtocol = appProtocol;
negativeCase = !cipherSuite.supportedByProtocol(protocol);
}
- // JDK 6 doesn't support EC key algorithm.
- public boolean ignoredByJdk(JdkInfo jdkInfo) {
- return cipherSuite.name().contains("_EC") && !jdkInfo.supportsECKey;
- }
-
@Override
public String toString() {
return Utils.join(Utils.PARAM_DELIMITER,
- "Protocol=" + protocol.version,
+ "Protocol=" + protocol.name,
"CipherSuite=" + cipherSuite,
"ClientAuth=" + clientAuth,
"ServerName=" + serverName,
"AppProtocols=" + appProtocol);
}
public static List<UseCase> getAllUseCases() {
List<UseCase> useCases = new ArrayList<>();
- getUseCases(PARAMS, 0, new Parameter[PARAMS.length], useCases);
+ getUseCases(PARAMS, 0, new Object[PARAMS.length], useCases);
return useCases;
}
- private static void getUseCases(Parameter[][] params, int index,
- Parameter[] currentValues, List<UseCase> useCases) {
+ private static void getUseCases(Object[][] params, int index,
+ Object[] currentValues, List<UseCase> useCases) {
if (index == params.length) {
Protocol protocol = (Protocol) currentValues[0];
CipherSuite cipherSuite = (CipherSuite) currentValues[1];
UseCase useCase = new UseCase(
protocol,
cipherSuite,
- (ClientAuth) currentValues[2],
+ (Boolean) currentValues[2],
(ServerName) currentValues[3],
(AppProtocol) currentValues[4]);
useCases.add(useCase);
} else {
- Parameter[] values = params[index];
+ Object[] values = params[index];
for (int i = 0; i < values.length; i++) {
currentValues[index] = values[i];
getUseCases(params, index + 1, currentValues, useCases);
}
}
< prev index next >