mirror of
https://github.com/openjdk/jdk.git
synced 2026-01-28 12:09:14 +00:00
8365953: Key manager returns no certificates when handshakeSession is not an ExtendedSSLSession
Reviewed-by: djelinski, wetmore
This commit is contained in:
parent
56f2f7a3af
commit
4ea8979b93
@ -167,25 +167,17 @@ abstract class X509KeyManagerCertChecking extends X509ExtendedKeyManager {
|
||||
return null;
|
||||
}
|
||||
|
||||
if (socket != null && socket.isConnected() &&
|
||||
socket instanceof SSLSocket sslSocket) {
|
||||
|
||||
if (socket instanceof SSLSocket sslSocket && sslSocket.isConnected()) {
|
||||
SSLSession session = sslSocket.getHandshakeSession();
|
||||
|
||||
if (session != null) {
|
||||
if (ProtocolVersion.useTLS12PlusSpec(session.getProtocol())) {
|
||||
String[] peerSupportedSignAlgs = null;
|
||||
|
||||
if (session instanceof ExtendedSSLSession extSession) {
|
||||
// Peer supported certificate signature algorithms
|
||||
// sent with "signature_algorithms_cert" TLS extension.
|
||||
peerSupportedSignAlgs =
|
||||
extSession.getPeerSupportedSignatureAlgorithms();
|
||||
}
|
||||
|
||||
return SSLAlgorithmConstraints.forSocket(
|
||||
sslSocket, peerSupportedSignAlgs, true);
|
||||
}
|
||||
if (session instanceof ExtendedSSLSession extSession
|
||||
&& ProtocolVersion.useTLS12PlusSpec(
|
||||
extSession.getProtocol())) {
|
||||
// Use peer supported certificate signature algorithms
|
||||
// sent with "signature_algorithms_cert" TLS extension.
|
||||
return SSLAlgorithmConstraints.forSocket(sslSocket,
|
||||
extSession.getPeerSupportedSignatureAlgorithms(),
|
||||
true);
|
||||
}
|
||||
|
||||
return SSLAlgorithmConstraints.forSocket(sslSocket, true);
|
||||
@ -203,20 +195,15 @@ abstract class X509KeyManagerCertChecking extends X509ExtendedKeyManager {
|
||||
|
||||
if (engine != null) {
|
||||
SSLSession session = engine.getHandshakeSession();
|
||||
if (session != null) {
|
||||
if (ProtocolVersion.useTLS12PlusSpec(session.getProtocol())) {
|
||||
String[] peerSupportedSignAlgs = null;
|
||||
|
||||
if (session instanceof ExtendedSSLSession extSession) {
|
||||
// Peer supported certificate signature algorithms
|
||||
// sent with "signature_algorithms_cert" TLS extension.
|
||||
peerSupportedSignAlgs =
|
||||
extSession.getPeerSupportedSignatureAlgorithms();
|
||||
}
|
||||
|
||||
return SSLAlgorithmConstraints.forEngine(
|
||||
engine, peerSupportedSignAlgs, true);
|
||||
}
|
||||
if (session instanceof ExtendedSSLSession extSession
|
||||
&& ProtocolVersion.useTLS12PlusSpec(
|
||||
extSession.getProtocol())) {
|
||||
// Use peer supported certificate signature algorithms
|
||||
// sent with "signature_algorithms_cert" TLS extension.
|
||||
return SSLAlgorithmConstraints.forEngine(engine,
|
||||
extSession.getPeerSupportedSignatureAlgorithms(),
|
||||
true);
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
@ -57,31 +57,31 @@ import sun.security.x509.X500Name;
|
||||
* @modules java.base/sun.security.x509
|
||||
* java.base/sun.security.util
|
||||
* @library /test/lib
|
||||
* @run main/othervm AlgorithmConstraintsCheck false SunX509 SHA256withRSA
|
||||
* @run main/othervm AlgorithmConstraintsCheck true SunX509 SHA256withRSA
|
||||
* @run main/othervm AlgorithmConstraintsCheck false PKIX SHA256withRSA
|
||||
* @run main/othervm AlgorithmConstraintsCheck true PKIX SHA256withRSA
|
||||
* @run main/othervm AlgorithmConstraintsCheck false SunX509
|
||||
* @run main/othervm AlgorithmConstraintsCheck true SunX509
|
||||
* @run main/othervm AlgorithmConstraintsCheck false PKIX
|
||||
* @run main/othervm AlgorithmConstraintsCheck true PKIX
|
||||
*/
|
||||
|
||||
public class AlgorithmConstraintsCheck {
|
||||
|
||||
private static final String CERT_ALIAS = "testalias";
|
||||
private static final String KEY_TYPE = "RSA";
|
||||
protected static final String CERT_ALIAS = "testalias";
|
||||
protected static final String KEY_TYPE = "EC";
|
||||
protected static final String CERT_SIG_ALG = "SHA256withECDSA";
|
||||
|
||||
public static void main(String[] args) throws Exception {
|
||||
if (args.length != 3) {
|
||||
if (args.length != 2) {
|
||||
throw new RuntimeException("Wrong number of arguments");
|
||||
}
|
||||
|
||||
String enabled = args[0];
|
||||
String kmAlg = args[1];
|
||||
String certSignatureAlg = args[2];
|
||||
|
||||
System.setProperty("jdk.tls.SunX509KeyManager.certChecking", enabled);
|
||||
SecurityUtils.addToDisabledTlsAlgs(certSignatureAlg);
|
||||
SecurityUtils.addToDisabledTlsAlgs(CERT_SIG_ALG);
|
||||
|
||||
X509ExtendedKeyManager km = (X509ExtendedKeyManager) getKeyManager(
|
||||
kmAlg, certSignatureAlg);
|
||||
kmAlg, KEY_TYPE, CERT_SIG_ALG);
|
||||
String serverAlias = km.chooseServerAlias(KEY_TYPE, null, null);
|
||||
String engineServerAlias = km.chooseEngineServerAlias(
|
||||
KEY_TYPE, null, null);
|
||||
@ -108,13 +108,13 @@ public class AlgorithmConstraintsCheck {
|
||||
}
|
||||
|
||||
// PKIX KeyManager adds a cache prefix to an alias.
|
||||
private static String normalizeAlias(String alias) {
|
||||
protected static String normalizeAlias(String alias) {
|
||||
return alias.substring(alias.lastIndexOf(".") + 1);
|
||||
}
|
||||
|
||||
private static X509KeyManager getKeyManager(String kmAlg,
|
||||
String certSignatureAlg) throws Exception {
|
||||
KeyPairGenerator kpg = KeyPairGenerator.getInstance(KEY_TYPE);
|
||||
protected static X509KeyManager getKeyManager(String kmAlg,
|
||||
String keyAlg, String certSignatureAlg) throws Exception {
|
||||
KeyPairGenerator kpg = KeyPairGenerator.getInstance(keyAlg);
|
||||
KeyPair caKeys = kpg.generateKeyPair();
|
||||
KeyPair endpointKeys = kpg.generateKeyPair();
|
||||
|
||||
|
||||
@ -0,0 +1,405 @@
|
||||
/*
|
||||
* Copyright (c) 2025, Oracle and/or its affiliates. All rights reserved.
|
||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
*
|
||||
* This code is free software; you can redistribute it and/or modify it
|
||||
* under the terms of the GNU General Public License version 2 only, as
|
||||
* published by the Free Software Foundation.
|
||||
*
|
||||
* This code is distributed in the hope that it will be useful, but WITHOUT
|
||||
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
||||
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||
* version 2 for more details (a copy is included in the LICENSE file that
|
||||
* accompanied this code).
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License version
|
||||
* 2 along with this work; if not, write to the Free Software Foundation,
|
||||
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||
*
|
||||
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
|
||||
* or visit www.oracle.com if you need additional information or have any
|
||||
* questions.
|
||||
*/
|
||||
|
||||
/*
|
||||
* @test
|
||||
* @bug 8365953
|
||||
* @summary Key manager returns no certificates when handshakeSession is not
|
||||
* an ExtendedSSLSession
|
||||
* @modules java.base/sun.security.x509
|
||||
* java.base/sun.security.util
|
||||
* @library /test/lib
|
||||
* @run main/othervm NonExtendedSSLSessionAlgorithmConstraints
|
||||
*/
|
||||
|
||||
import static jdk.test.lib.Asserts.assertEquals;
|
||||
|
||||
import java.io.IOException;
|
||||
import java.nio.ByteBuffer;
|
||||
import java.security.Principal;
|
||||
import javax.net.ssl.HandshakeCompletedListener;
|
||||
import javax.net.ssl.SSLEngine;
|
||||
import javax.net.ssl.SSLEngineResult;
|
||||
import javax.net.ssl.SSLException;
|
||||
import javax.net.ssl.SSLSession;
|
||||
import javax.net.ssl.SSLSessionContext;
|
||||
import javax.net.ssl.SSLSocket;
|
||||
import javax.net.ssl.X509ExtendedKeyManager;
|
||||
|
||||
/*
|
||||
* Make sure Key Managers return the certificates when SSLSocket or SSLEngine
|
||||
* use an SSLSession which is not extending ExtendedSSLSession.
|
||||
*/
|
||||
public class NonExtendedSSLSessionAlgorithmConstraints extends
|
||||
AlgorithmConstraintsCheck {
|
||||
|
||||
public static void main(String[] args) throws Exception {
|
||||
new NonExtendedSSLSessionAlgorithmConstraints().runTest();
|
||||
}
|
||||
|
||||
private void runTest() throws Exception {
|
||||
for (String kmAlg : new String[]{"SunX509", "PKIX"}) {
|
||||
|
||||
X509ExtendedKeyManager km =
|
||||
(X509ExtendedKeyManager) getKeyManager(
|
||||
kmAlg, KEY_TYPE, CERT_SIG_ALG);
|
||||
var testSocket = new TestHandshakeSessionSSLSocket();
|
||||
var testEngine = new TestHandshakeSessionSSLEngine();
|
||||
|
||||
// Test SSLSocket
|
||||
assertEquals(CERT_ALIAS, normalizeAlias(km.chooseServerAlias(
|
||||
KEY_TYPE, null, testSocket)));
|
||||
assertEquals(CERT_ALIAS, normalizeAlias(km.chooseClientAlias(
|
||||
new String[]{KEY_TYPE}, null, testSocket)));
|
||||
|
||||
// Test SSLEngine
|
||||
assertEquals(CERT_ALIAS, normalizeAlias(km.chooseEngineServerAlias(
|
||||
KEY_TYPE, null, testEngine)));
|
||||
assertEquals(CERT_ALIAS, normalizeAlias(km.chooseEngineClientAlias(
|
||||
new String[]{KEY_TYPE}, null, testEngine)));
|
||||
}
|
||||
}
|
||||
|
||||
private static class TestHandshakeSessionSSLSocket extends SSLSocket {
|
||||
|
||||
TestHandshakeSessionSSLSocket() {
|
||||
}
|
||||
|
||||
@Override
|
||||
public SSLSession getHandshakeSession() {
|
||||
return new TestSSLSession();
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean isConnected() {
|
||||
return true;
|
||||
}
|
||||
|
||||
@Override
|
||||
public SSLSession getSession() {
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public String[] getSupportedCipherSuites() {
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public String[] getSupportedProtocols() {
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public String[] getEnabledCipherSuites() {
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void setEnabledCipherSuites(String[] suites) {
|
||||
}
|
||||
|
||||
@Override
|
||||
public String[] getEnabledProtocols() {
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void setEnabledProtocols(String[] protocols) {
|
||||
}
|
||||
|
||||
@Override
|
||||
public void addHandshakeCompletedListener
|
||||
(HandshakeCompletedListener listener) {
|
||||
}
|
||||
|
||||
@Override
|
||||
public void removeHandshakeCompletedListener
|
||||
(HandshakeCompletedListener listener) {
|
||||
}
|
||||
|
||||
@Override
|
||||
public void startHandshake() throws IOException {
|
||||
}
|
||||
|
||||
@Override
|
||||
public void setUseClientMode(boolean mode) {
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean getUseClientMode() {
|
||||
return false;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void setNeedClientAuth(boolean need) {
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean getNeedClientAuth() {
|
||||
return false;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void setWantClientAuth(boolean want) {
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean getWantClientAuth() {
|
||||
return false;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void setEnableSessionCreation(boolean flag) {
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean getEnableSessionCreation() {
|
||||
return true;
|
||||
}
|
||||
}
|
||||
|
||||
private static class TestHandshakeSessionSSLEngine extends SSLEngine {
|
||||
|
||||
@Override
|
||||
public SSLSession getHandshakeSession() {
|
||||
return new TestSSLSession();
|
||||
}
|
||||
|
||||
@Override
|
||||
public String[] getEnabledProtocols() {
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public SSLEngineResult wrap(ByteBuffer[] src, int off, int len,
|
||||
ByteBuffer dst) throws SSLException {
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public SSLEngineResult unwrap(ByteBuffer src,
|
||||
ByteBuffer[] dst, int off, int len)
|
||||
throws SSLException {
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Runnable getDelegatedTask() {
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void closeInbound() {
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean isInboundDone() {
|
||||
return false;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void closeOutbound() {
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean isOutboundDone() {
|
||||
return false;
|
||||
}
|
||||
|
||||
@Override
|
||||
public String[] getEnabledCipherSuites() {
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public String[] getSupportedCipherSuites() {
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void setEnabledCipherSuites(String[] suites) {
|
||||
}
|
||||
|
||||
@Override
|
||||
public String[] getSupportedProtocols() {
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void setEnabledProtocols(String[] protocols) {
|
||||
}
|
||||
|
||||
@Override
|
||||
public SSLSession getSession() {
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void beginHandshake() {
|
||||
}
|
||||
|
||||
@Override
|
||||
public SSLEngineResult.HandshakeStatus getHandshakeStatus() {
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void setUseClientMode(boolean mode) {
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean getUseClientMode() {
|
||||
return false;
|
||||
}
|
||||
|
||||
public void setNeedClientAuth(boolean need) {
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean getNeedClientAuth() {
|
||||
return false;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void setWantClientAuth(boolean need) {
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean getWantClientAuth() {
|
||||
return false;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void setEnableSessionCreation(boolean flag) {
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean getEnableSessionCreation() {
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
||||
public static class TestSSLSession implements SSLSession {
|
||||
|
||||
TestSSLSession() {
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getProtocol() {
|
||||
return "TLSv1.3";
|
||||
}
|
||||
|
||||
@Override
|
||||
public byte[] getId() {
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public SSLSessionContext getSessionContext() {
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public long getCreationTime() {
|
||||
return 0;
|
||||
}
|
||||
|
||||
@Override
|
||||
public long getLastAccessedTime() {
|
||||
return 0;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void invalidate() {
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean isValid() {
|
||||
return true;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void putValue(String name, Object value) {
|
||||
}
|
||||
|
||||
@Override
|
||||
public Object getValue(String name) {
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void removeValue(String name) {
|
||||
}
|
||||
|
||||
@Override
|
||||
public String[] getValueNames() {
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public java.security.cert.Certificate[] getPeerCertificates() {
|
||||
return new java.security.cert.Certificate[0];
|
||||
}
|
||||
|
||||
@Override
|
||||
public java.security.cert.Certificate[] getLocalCertificates() {
|
||||
return new java.security.cert.Certificate[0];
|
||||
}
|
||||
|
||||
@Override
|
||||
public Principal getPeerPrincipal() {
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Principal getLocalPrincipal() {
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getCipherSuite() {
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public String getPeerHost() {
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public int getPeerPort() {
|
||||
return 0;
|
||||
}
|
||||
|
||||
@Override
|
||||
public int getPacketBufferSize() {
|
||||
return 0;
|
||||
}
|
||||
|
||||
@Override
|
||||
public int getApplicationBufferSize() {
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
}
|
||||
Loading…
x
Reference in New Issue
Block a user