1 /* 2 * Copyright (c) 2013, 2014, Oracle and/or its affiliates. All rights reserved. 3 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. 4 * 5 * This code is free software; you can redistribute it and/or modify it 6 * under the terms of the GNU General Public License version 2 only, as 7 * published by the Free Software Foundation. 8 * 9 * This code is distributed in the hope that it will be useful, but WITHOUT 10 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or 11 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License 12 * version 2 for more details (a copy is included in the LICENSE file that 13 * accompanied this code). 14 * 15 * You should have received a copy of the GNU General Public License version 16 * 2 along with this work; if not, write to the Free Software Foundation, 17 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. 18 * 19 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA 20 * or visit www.oracle.com if you need additional information or have any 21 * questions. 22 */ 23 24 // SunJSSE does not support dynamic system properties, no way to re-use 25 // system properties in samevm/agentvm mode. 26 27 /* 28 * @test 29 * @bug 7093640 30 * @summary Enable TLS 1.1 and TLS 1.2 by default in client side of SunJSSE 31 * @run main/othervm -Djdk.tls.client.protocols="SSLv3,TLSv1,TLSv1.1" 32 * CustomizedDefaultProtocols 33 */ 34 35 import javax.net.*; 36 import javax.net.ssl.*; 37 import java.util.Arrays; 38 import java.security.Security; 39 40 public class CustomizedDefaultProtocols { 41 static enum ContextVersion { 42 TLS_CV_01("SSL", 43 new String[] {"SSLv3", "TLSv1", "TLSv1.1"}), 44 TLS_CV_02("TLS", 45 new String[] {"SSLv3", "TLSv1", "TLSv1.1"}), 46 TLS_CV_03("SSLv3", 47 new String[] {"SSLv3", "TLSv1"}), 48 TLS_CV_04("TLSv1", 49 new String[] {"SSLv3", "TLSv1"}), 50 TLS_CV_05("TLSv1.1", 51 new String[] {"SSLv3", "TLSv1", "TLSv1.1"}), 52 TLS_CV_06("TLSv1.2", 53 new String[] {"SSLv3", "TLSv1", "TLSv1.1", "TLSv1.2"}), 54 TLS_CV_07("Default", 55 new String[] {"SSLv3", "TLSv1", "TLSv1.1"}); 56 57 final String contextVersion; 58 final String[] enabledProtocols; 59 final static String[] supportedProtocols = new String[] { 60 "SSLv2Hello", "SSLv3", "TLSv1", "TLSv1.1", "TLSv1.2"}; 61 62 ContextVersion(String contextVersion, String[] enabledProtocols) { 63 this.contextVersion = contextVersion; 64 this.enabledProtocols = enabledProtocols; 65 } 66 } 67 68 private static boolean checkProtocols(String[] target, String[] expected) { 69 boolean success = true; 70 if (target.length == 0) { 71 System.out.println("\tError: No protocols"); 72 success = false; 73 } 74 75 if (!Arrays.equals(target, expected)) { 76 System.out.println("\tError: Expected to get protocols " + 77 Arrays.toString(expected)); 78 System.out.println("\tError: The actual protocols " + 79 Arrays.toString(target)); 80 success = false; 81 } 82 83 return success; 84 } 85 86 private static boolean checkCipherSuites(String[] target) { 87 boolean success = true; 88 if (target.length == 0) { 89 System.out.println("\tError: No cipher suites"); 90 success = false; 91 } 92 93 return success; 94 } 95 96 public static void main(String[] args) throws Exception { 97 // reset the security property to make sure that the algorithms 98 // and keys used in this test are not disabled. 99 Security.setProperty("jdk.tls.disabledAlgorithms", ""); 100 101 boolean failed = false; 102 for (ContextVersion cv : ContextVersion.values()) { 103 System.out.println("Checking SSLContext of " + cv.contextVersion); 104 SSLContext context = SSLContext.getInstance(cv.contextVersion); 105 106 // Default SSLContext is initialized automatically. 107 if (!cv.contextVersion.equals("Default")) { 108 // Use default TK, KM and random. 109 context.init((KeyManager[])null, (TrustManager[])null, null); 110 } 111 112 // 113 // Check SSLContext 114 // 115 // Check default SSLParameters of SSLContext 116 System.out.println("\tChecking default SSLParameters"); 117 SSLParameters parameters = context.getDefaultSSLParameters(); 118 119 String[] protocols = parameters.getProtocols(); 120 failed |= !checkProtocols(protocols, cv.enabledProtocols); 121 122 String[] ciphers = parameters.getCipherSuites(); 123 failed |= !checkCipherSuites(ciphers); 124 125 // Check supported SSLParameters of SSLContext 126 System.out.println("\tChecking supported SSLParameters"); 127 parameters = context.getSupportedSSLParameters(); 128 129 protocols = parameters.getProtocols(); 130 failed |= !checkProtocols(protocols, cv.supportedProtocols); 131 132 ciphers = parameters.getCipherSuites(); 133 failed |= !checkCipherSuites(ciphers); 134 135 // 136 // Check SSLEngine 137 // 138 // Check SSLParameters of SSLEngine 139 System.out.println(); 140 System.out.println("\tChecking SSLEngine of this SSLContext"); 141 System.out.println("\tChecking SSLEngine.getSSLParameters()"); 142 SSLEngine engine = context.createSSLEngine(); 143 engine.setUseClientMode(true); 144 parameters = engine.getSSLParameters(); 145 146 protocols = parameters.getProtocols(); 147 failed |= !checkProtocols(protocols, cv.enabledProtocols); 148 149 ciphers = parameters.getCipherSuites(); 150 failed |= !checkCipherSuites(ciphers); 151 152 System.out.println("\tChecking SSLEngine.getEnabledProtocols()"); 153 protocols = engine.getEnabledProtocols(); 154 failed |= !checkProtocols(protocols, cv.enabledProtocols); 155 156 System.out.println("\tChecking SSLEngine.getEnabledCipherSuites()"); 157 ciphers = engine.getEnabledCipherSuites(); 158 failed |= !checkCipherSuites(ciphers); 159 160 System.out.println("\tChecking SSLEngine.getSupportedProtocols()"); 161 protocols = engine.getSupportedProtocols(); 162 failed |= !checkProtocols(protocols, cv.supportedProtocols); 163 164 System.out.println( 165 "\tChecking SSLEngine.getSupportedCipherSuites()"); 166 ciphers = engine.getSupportedCipherSuites(); 167 failed |= !checkCipherSuites(ciphers); 168 169 // 170 // Check SSLSocket 171 // 172 // Check SSLParameters of SSLSocket 173 System.out.println(); 174 System.out.println("\tChecking SSLSocket of this SSLContext"); 175 System.out.println("\tChecking SSLSocket.getSSLParameters()"); 176 SocketFactory fac = context.getSocketFactory(); 177 SSLSocket socket = (SSLSocket)fac.createSocket(); 178 parameters = socket.getSSLParameters(); 179 180 protocols = parameters.getProtocols(); 181 failed |= !checkProtocols(protocols, cv.enabledProtocols); 182 183 ciphers = parameters.getCipherSuites(); 184 failed |= !checkCipherSuites(ciphers); 185 186 System.out.println("\tChecking SSLEngine.getEnabledProtocols()"); 187 protocols = socket.getEnabledProtocols(); 188 failed |= !checkProtocols(protocols, cv.enabledProtocols); 189 190 System.out.println("\tChecking SSLEngine.getEnabledCipherSuites()"); 191 ciphers = socket.getEnabledCipherSuites(); 192 failed |= !checkCipherSuites(ciphers); 193 194 System.out.println("\tChecking SSLEngine.getSupportedProtocols()"); 195 protocols = socket.getSupportedProtocols(); 196 failed |= !checkProtocols(protocols, cv.supportedProtocols); 197 198 System.out.println( 199 "\tChecking SSLEngine.getSupportedCipherSuites()"); 200 ciphers = socket.getSupportedCipherSuites(); 201 failed |= !checkCipherSuites(ciphers); 202 203 // 204 // Check SSLServerSocket 205 // 206 // Check SSLParameters of SSLServerSocket 207 System.out.println(); 208 System.out.println("\tChecking SSLServerSocket of this SSLContext"); 209 System.out.println("\tChecking SSLServerSocket.getSSLParameters()"); 210 SSLServerSocketFactory sf = context.getServerSocketFactory(); 211 SSLServerSocket ssocket = (SSLServerSocket)sf.createServerSocket(); 212 parameters = ssocket.getSSLParameters(); 213 214 protocols = parameters.getProtocols(); 215 failed |= !checkProtocols(protocols, cv.supportedProtocols); 216 217 ciphers = parameters.getCipherSuites(); 218 failed |= !checkCipherSuites(ciphers); 219 220 System.out.println("\tChecking SSLEngine.getEnabledProtocols()"); 221 protocols = ssocket.getEnabledProtocols(); 222 failed |= !checkProtocols(protocols, cv.supportedProtocols); 223 224 System.out.println("\tChecking SSLEngine.getEnabledCipherSuites()"); 225 ciphers = ssocket.getEnabledCipherSuites(); 226 failed |= !checkCipherSuites(ciphers); 227 228 System.out.println("\tChecking SSLEngine.getSupportedProtocols()"); 229 protocols = ssocket.getSupportedProtocols(); 230 failed |= !checkProtocols(protocols, cv.supportedProtocols); 231 232 System.out.println( 233 "\tChecking SSLEngine.getSupportedCipherSuites()"); 234 ciphers = ssocket.getSupportedCipherSuites(); 235 failed |= !checkCipherSuites(ciphers); 236 } 237 238 if (failed) { 239 throw new Exception("Run into problems, see log for more details"); 240 } else { 241 System.out.println("\t... Success"); 242 } 243 } 244 }