mirror of
https://github.com/openjdk/jdk.git
synced 2026-01-28 12:09:14 +00:00
201 lines
7.4 KiB
Java
201 lines
7.4 KiB
Java
/*
|
|
* Copyright (c) 2026, Oracle and/or its affiliates. All rights reserved.
|
|
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
|
*
|
|
* This code is free software; you can redistribute it and/or modify it
|
|
* under the terms of the GNU General Public License version 2 only, as
|
|
* published by the Free Software Foundation.
|
|
*
|
|
* This code is distributed in the hope that it will be useful, but WITHOUT
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
|
* version 2 for more details (a copy is included in the LICENSE file that
|
|
* accompanied this code).
|
|
*
|
|
* You should have received a copy of the GNU General Public License version
|
|
* 2 along with this work; if not, write to the Free Software Foundation,
|
|
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
*
|
|
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
|
|
* or visit www.oracle.com if you need additional information or have any
|
|
* questions.
|
|
*/
|
|
|
|
import static jdk.test.lib.Asserts.assertEquals;
|
|
|
|
import java.io.ByteArrayOutputStream;
|
|
import java.io.IOException;
|
|
import java.io.PrintStream;
|
|
import java.math.BigInteger;
|
|
import java.security.KeyPair;
|
|
import java.security.KeyPairGenerator;
|
|
import java.security.KeyStore;
|
|
import java.security.PrivateKey;
|
|
import java.security.PublicKey;
|
|
import java.security.SecureRandom;
|
|
import java.security.cert.Certificate;
|
|
import java.security.cert.CertificateException;
|
|
import java.security.cert.X509Certificate;
|
|
import java.time.Instant;
|
|
import java.time.temporal.ChronoUnit;
|
|
import java.util.Date;
|
|
import javax.net.ssl.KeyManagerFactory;
|
|
import javax.net.ssl.SSLContext;
|
|
import javax.net.ssl.TrustManagerFactory;
|
|
import jdk.test.lib.security.CertificateBuilder;
|
|
|
|
/*
|
|
* @test
|
|
* @bug 8372526
|
|
* @summary Check CompressedCertificate message cache size limit.
|
|
* @modules java.base/sun.security.x509
|
|
* java.base/sun.security.util
|
|
* @library /javax/net/ssl/templates
|
|
* /test/lib
|
|
* @run main/othervm CompressedCertMsgCacheLimit
|
|
*/
|
|
|
|
public class CompressedCertMsgCacheLimit extends CompressedCertMsgCache {
|
|
|
|
// Make sure every certificate has random serial number.
|
|
private static final SecureRandom RANDOM = new SecureRandom();
|
|
|
|
private final String protocol;
|
|
private final String keyAlg;
|
|
private final String certSigAlg;
|
|
private X509Certificate trustedCert;
|
|
private X509Certificate serverCert;
|
|
private X509Certificate clientCert;
|
|
private KeyPair serverKeys;
|
|
private KeyPair clientKeys;
|
|
|
|
protected CompressedCertMsgCacheLimit(
|
|
String protocol, String keyAlg,
|
|
String certSigAlg) throws Exception {
|
|
super();
|
|
this.protocol = protocol;
|
|
this.keyAlg = keyAlg;
|
|
this.certSigAlg = certSigAlg;
|
|
setupCertificates();
|
|
}
|
|
|
|
public static void main(String[] args) throws Exception {
|
|
System.setProperty("javax.net.debug", "ssl");
|
|
ByteArrayOutputStream baos = new ByteArrayOutputStream();
|
|
PrintStream err = new PrintStream(baos);
|
|
System.setErr(err);
|
|
|
|
// Complete 6 handshakes, all with different certificates.
|
|
for (int i = 0; i < 6; i++) {
|
|
new CompressedCertMsgCacheLimit(
|
|
"TLSv1.3", "EC", "SHA256withECDSA").run();
|
|
}
|
|
|
|
err.close();
|
|
|
|
// Make sure first 4 CompressedCertificate messages are cached.
|
|
assertEquals(4, countSubstringOccurrences(baos.toString(),
|
|
"Caching CompressedCertificate message"));
|
|
|
|
// Last 2 CompressedCertificate messages must not be cached.
|
|
assertEquals(2, countSubstringOccurrences(baos.toString(),
|
|
"Certificate message cache size limit of 4 reached"));
|
|
}
|
|
|
|
@Override
|
|
public SSLContext createServerSSLContext() throws Exception {
|
|
return getSSLContext(
|
|
trustedCert, serverCert, serverKeys.getPrivate(), protocol);
|
|
}
|
|
|
|
@Override
|
|
public SSLContext createClientSSLContext() throws Exception {
|
|
return getSSLContext(
|
|
trustedCert, clientCert, clientKeys.getPrivate(), protocol);
|
|
}
|
|
|
|
private static SSLContext getSSLContext(
|
|
X509Certificate trustedCertificate, X509Certificate keyCertificate,
|
|
PrivateKey privateKey, String protocol)
|
|
throws Exception {
|
|
|
|
// create a key store
|
|
KeyStore ks = KeyStore.getInstance("PKCS12");
|
|
ks.load(null, null);
|
|
|
|
// import the trusted cert
|
|
ks.setCertificateEntry("TLS Signer", trustedCertificate);
|
|
|
|
// generate certificate chain
|
|
Certificate[] chain = new Certificate[2];
|
|
chain[0] = keyCertificate;
|
|
chain[1] = trustedCertificate;
|
|
|
|
// import the key entry.
|
|
final char[] passphrase = "passphrase".toCharArray();
|
|
ks.setKeyEntry("Whatever", privateKey, passphrase, chain);
|
|
|
|
TrustManagerFactory tmf = TrustManagerFactory.getInstance("PKIX");
|
|
tmf.init(ks);
|
|
|
|
// create SSL context
|
|
SSLContext ctx = SSLContext.getInstance(protocol);
|
|
|
|
KeyManagerFactory kmf = KeyManagerFactory.getInstance("SunX509");
|
|
kmf.init(ks, passphrase);
|
|
|
|
ctx.init(kmf.getKeyManagers(), tmf.getTrustManagers(), null);
|
|
|
|
return ctx;
|
|
}
|
|
|
|
// Certificate-building helper methods.
|
|
|
|
private void setupCertificates() throws Exception {
|
|
KeyPairGenerator kpg = KeyPairGenerator.getInstance(keyAlg);
|
|
KeyPair caKeys = kpg.generateKeyPair();
|
|
this.serverKeys = kpg.generateKeyPair();
|
|
this.clientKeys = kpg.generateKeyPair();
|
|
|
|
this.trustedCert = createTrustedCert(caKeys, certSigAlg);
|
|
|
|
this.serverCert = customCertificateBuilder(
|
|
"O=Some-Org, L=Some-City, ST=Some-State, C=US",
|
|
serverKeys.getPublic(), caKeys.getPublic())
|
|
.addBasicConstraintsExt(false, false, -1)
|
|
.build(trustedCert, caKeys.getPrivate(), certSigAlg);
|
|
|
|
this.clientCert = customCertificateBuilder(
|
|
"CN=localhost, OU=SSL-Client, ST=Some-State, C=US",
|
|
clientKeys.getPublic(), caKeys.getPublic())
|
|
.addBasicConstraintsExt(false, false, -1)
|
|
.build(trustedCert, caKeys.getPrivate(), certSigAlg);
|
|
}
|
|
|
|
private static X509Certificate createTrustedCert(
|
|
KeyPair caKeys, String certSigAlg) throws Exception {
|
|
return customCertificateBuilder(
|
|
"O=CA-Org, L=Some-City, ST=Some-State, C=US",
|
|
caKeys.getPublic(), caKeys.getPublic())
|
|
.addBasicConstraintsExt(true, true, 1)
|
|
.build(null, caKeys.getPrivate(), certSigAlg);
|
|
}
|
|
|
|
private static CertificateBuilder customCertificateBuilder(
|
|
String subjectName, PublicKey publicKey, PublicKey caKey)
|
|
throws CertificateException, IOException {
|
|
return new CertificateBuilder()
|
|
.setSubjectName(subjectName)
|
|
.setPublicKey(publicKey)
|
|
.setNotBefore(
|
|
Date.from(Instant.now().minus(1, ChronoUnit.HOURS)))
|
|
.setNotAfter(Date.from(Instant.now().plus(1, ChronoUnit.HOURS)))
|
|
.setSerialNumber(BigInteger.valueOf(
|
|
RANDOM.nextLong(1000000) + 1))
|
|
.addSubjectKeyIdExt(publicKey)
|
|
.addAuthorityKeyIdExt(caKey)
|
|
.addKeyUsageExt(new boolean[]{
|
|
true, true, true, true, true, true, true});
|
|
}
|
|
}
|