1/*
2 * Copyright (c) 2013, Oracle and/or its affiliates. All rights reserved.
3 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
4 *
5 * This code is free software; you can redistribute it and/or modify it
6 * under the terms of the GNU General Public License version 2 only, as
7 * published by the Free Software Foundation.
8 *
9 * This code is distributed in the hope that it will be useful, but WITHOUT
10 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
11 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
12 * version 2 for more details (a copy is included in the LICENSE file that
13 * accompanied this code).
14 *
15 * You should have received a copy of the GNU General Public License version
16 * 2 along with this work; if not, write to the Free Software Foundation,
17 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
18 *
19 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
20 * or visit www.oracle.com if you need additional information or have any
21 * questions.
22 */
23
24// SunJSSE does not support dynamic system properties, no way to re-use
25// system properties in samevm/agentvm mode.
26
27/*
28 * @test
29 * @bug 7093640
30 * @summary Enable TLS 1.1 and TLS 1.2 by default in client side of SunJSSE
31 * @run main/othervm -Djdk.tls.client.protocols="XSLv3,TLSv1"
32 *      IllegalProtocolProperty
33 */
34
35import javax.net.ssl.*;
36import java.security.NoSuchAlgorithmException;
37
38public class IllegalProtocolProperty {
39    static enum ContextVersion {
40        TLS_CV_01("SSL", "TLSv1", "TLSv1.2", true),
41        TLS_CV_02("TLS", "TLSv1", "TLSv1.2", true),
42        TLS_CV_03("SSLv3", "TLSv1", "TLSv1.2", false),
43        TLS_CV_04("TLSv1", "TLSv1", "TLSv1.2", false),
44        TLS_CV_05("TLSv1.1", "TLSv1.1", "TLSv1.2", false),
45        TLS_CV_06("TLSv1.2", "TLSv1.2", "TLSv1.2", false),
46        TLS_CV_07("Default", "TLSv1", "TLSv1.2", true);
47
48        final String contextVersion;
49        final String defaultProtocolVersion;
50        final String supportedProtocolVersion;
51        final boolean impacted;
52
53        ContextVersion(String contextVersion, String defaultProtocolVersion,
54                String supportedProtocolVersion, boolean impacted) {
55            this.contextVersion = contextVersion;
56            this.defaultProtocolVersion = defaultProtocolVersion;
57            this.supportedProtocolVersion = supportedProtocolVersion;
58            this.impacted = impacted;
59        }
60    }
61
62    public static void main(String[] args) throws Exception {
63        for (ContextVersion cv : ContextVersion.values()) {
64            System.out.println("Checking SSLContext of " + cv.contextVersion);
65
66            SSLContext context;
67            try {
68                context = SSLContext.getInstance(cv.contextVersion);
69                if (cv.impacted) {
70                    throw new Exception(
71                        "illegal system property jdk.tls.client.protocols: " +
72                        System.getProperty("jdk.tls.client.protocols"));
73                }
74            } catch (NoSuchAlgorithmException nsae) {
75                if (cv.impacted) {
76                    System.out.println(
77                        "\tIgnore: illegal system property " +
78                        "jdk.tls.client.protocols=" +
79                        System.getProperty("jdk.tls.client.protocols"));
80                    continue;
81                } else {
82                    throw nsae;
83                }
84            }
85
86            // Default SSLContext is initialized automatically.
87            if (!cv.contextVersion.equals("Default")) {
88                // Use default TK, KM and random.
89                context.init((KeyManager[])null, (TrustManager[])null, null);
90            }
91
92            SSLParameters parameters = context.getDefaultSSLParameters();
93
94            String[] protocols = parameters.getProtocols();
95            String[] ciphers = parameters.getCipherSuites();
96
97            if (protocols.length == 0 || ciphers.length == 0) {
98                throw new Exception("No default protocols or cipher suites");
99            }
100
101            boolean isMatch = false;
102            for (String protocol : protocols) {
103                System.out.println("\tdefault protocol version " + protocol);
104                if (protocol.equals(cv.defaultProtocolVersion)) {
105                    isMatch = true;
106                    break;
107                }
108            }
109
110            if (!isMatch) {
111                throw new Exception("No matched default protocol");
112            }
113
114            parameters = context.getSupportedSSLParameters();
115
116            protocols = parameters.getProtocols();
117            ciphers = parameters.getCipherSuites();
118
119            if (protocols.length == 0 || ciphers.length == 0) {
120                throw new Exception("No supported protocols or cipher suites");
121            }
122
123            isMatch = false;
124            for (String protocol : protocols) {
125                System.out.println("\tsupported protocol version " + protocol);
126                if (protocol.equals(cv.supportedProtocolVersion)) {
127                    isMatch = true;
128                    break;
129                }
130            }
131
132            if (!isMatch) {
133                throw new Exception("No matched supported protocol");
134            }
135            System.out.println("\t... Success");
136        }
137    }
138}
139