1 /*
   2  * Copyright (c) 2013, Oracle and/or its affiliates. All rights reserved.
   3  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
   4  *
   5  * This code is free software; you can redistribute it and/or modify it
   6  * under the terms of the GNU General Public License version 2 only, as
   7  * published by the Free Software Foundation.
   8  *
   9  * This code is distributed in the hope that it will be useful, but WITHOUT
  10  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
  11  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
  12  * version 2 for more details (a copy is included in the LICENSE file that
  13  * accompanied this code).
  14  *
  15  * You should have received a copy of the GNU General Public License version
  16  * 2 along with this work; if not, write to the Free Software Foundation,
  17  * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
  18  *
  19  * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
  20  * or visit www.oracle.com if you need additional information or have any
  21  * questions.
  22  */
  23 
  24 // SunJSSE does not support dynamic system properties, no way to re-use
  25 // system properties in samevm/agentvm mode.
  26 
  27 /*
  28  * @test
  29  * @bug 7093640
  30  * @summary Enable TLS 1.1 and TLS 1.2 by default in client side of SunJSSE
  31  * @run main/othervm -Djdk.tls.client.protocols="XSLv3,TLSv1"
  32  *      IllegalProtocolProperty
  33  */
  34 
  35 import javax.net.ssl.*;
  36 import java.security.NoSuchAlgorithmException;
  37 
  38 public class IllegalProtocolProperty {
  39     static enum ContextVersion {
  40         TLS_CV_01("SSL", "TLSv1", "TLSv1.2", true),
  41         TLS_CV_02("TLS", "TLSv1", "TLSv1.2", true),
  42         TLS_CV_03("SSLv3", "TLSv1", "TLSv1.2", false),
  43         TLS_CV_04("TLSv1", "TLSv1", "TLSv1.2", false),
  44         TLS_CV_05("TLSv1.1", "TLSv1.1", "TLSv1.2", false),
  45         TLS_CV_06("TLSv1.2", "TLSv1.2", "TLSv1.2", false),
  46         TLS_CV_07("Default", "TLSv1", "TLSv1.2", true);
  47 
  48         final String contextVersion;
  49         final String defaultProtocolVersion;
  50         final String supportedProtocolVersion;
  51         final boolean impacted;
  52 
  53         ContextVersion(String contextVersion, String defaultProtocolVersion,
  54                 String supportedProtocolVersion, boolean impacted) {
  55             this.contextVersion = contextVersion;
  56             this.defaultProtocolVersion = defaultProtocolVersion;
  57             this.supportedProtocolVersion = supportedProtocolVersion;
  58             this.impacted = impacted;
  59         }
  60     }
  61 
  62     public static void main(String[] args) throws Exception {
  63         for (ContextVersion cv : ContextVersion.values()) {
  64             System.out.println("Checking SSLContext of " + cv.contextVersion);
  65 
  66             SSLContext context;
  67             try {
  68                 context = SSLContext.getInstance(cv.contextVersion);
  69                 if (cv.impacted) {
  70                     throw new Exception(
  71                         "illegal system property jdk.tls.client.protocols: " +
  72                         System.getProperty("jdk.tls.client.protocols"));
  73                 }
  74             } catch (NoSuchAlgorithmException nsae) {
  75                 if (cv.impacted) {
  76                     System.out.println(
  77                         "\tIgnore: illegal system property " +
  78                         "jdk.tls.client.protocols=" +
  79                         System.getProperty("jdk.tls.client.protocols"));
  80                     continue;
  81                 } else {
  82                     throw nsae;
  83                 }
  84             }
  85 
  86             // Default SSLContext is initialized automatically.
  87             if (!cv.contextVersion.equals("Default")) {
  88                 // Use default TK, KM and random.
  89                 context.init((KeyManager[])null, (TrustManager[])null, null);
  90             }
  91 
  92             SSLParameters parameters = context.getDefaultSSLParameters();
  93 
  94             String[] protocols = parameters.getProtocols();
  95             String[] ciphers = parameters.getCipherSuites();
  96 
  97             if (protocols.length == 0 || ciphers.length == 0) {
  98                 throw new Exception("No default protocols or cipher suites");
  99             }
 100 
 101             boolean isMatch = false;
 102             for (String protocol : protocols) {
 103                 System.out.println("\tdefault protocol version " + protocol);
 104                 if (protocol.equals(cv.defaultProtocolVersion)) {
 105                     isMatch = true;
 106                     break;
 107                 }
 108             }
 109 
 110             if (!isMatch) {
 111                 throw new Exception("No matched default protocol");
 112             }
 113 
 114             parameters = context.getSupportedSSLParameters();
 115 
 116             protocols = parameters.getProtocols();
 117             ciphers = parameters.getCipherSuites();
 118 
 119             if (protocols.length == 0 || ciphers.length == 0) {
 120                 throw new Exception("No supported protocols or cipher suites");
 121             }
 122 
 123             isMatch = false;
 124             for (String protocol : protocols) {
 125                 System.out.println("\tsupported protocol version " + protocol);
 126                 if (protocol.equals(cv.supportedProtocolVersion)) {
 127                     isMatch = true;
 128                     break;
 129                 }
 130             }
 131 
 132             if (!isMatch) {
 133                 throw new Exception("No matched supported protocol");
 134             }
 135             System.out.println("\t... Success");
 136         }
 137     }
 138 }