Path: blob/master/test/jdk/javax/net/ssl/interop/ClientHelloInterOp.java
41152 views
/*1* Copyright (c) 2016, Oracle and/or its affiliates. All rights reserved.2* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.3*4* This code is free software; you can redistribute it and/or modify it5* under the terms of the GNU General Public License version 2 only, as6* published by the Free Software Foundation.7*8* This code is distributed in the hope that it will be useful, but WITHOUT9* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or10* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License11* version 2 for more details (a copy is included in the LICENSE file that12* accompanied this code).13*14* You should have received a copy of the GNU General Public License version15* 2 along with this work; if not, write to the Free Software Foundation,16* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.17*18* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA19* or visit www.oracle.com if you need additional information or have any20* questions.21*/2223import javax.net.ssl.*;24import javax.net.ssl.SSLEngineResult.*;25import java.io.*;26import java.nio.*;27import java.security.KeyStore;28import java.security.PrivateKey;29import java.security.KeyFactory;30import java.security.cert.Certificate;31import java.security.cert.CertificateFactory;32import java.security.spec.*;33import java.util.Base64;3435public abstract class ClientHelloInterOp {3637/*38* Certificates and keys used in the test.39*/40// Trusted certificates.41private final static String[] trustedCertStrs = {42// SHA256withECDSA, curve prime256v143// Validity44// Not Before: Nov 9 03:24:05 2016 GMT45// Not After : Oct 20 03:24:05 2037 GMT46"-----BEGIN CERTIFICATE-----\n" +47"MIICHDCCAcGgAwIBAgIJAM83C/MVp9F5MAoGCCqGSM49BAMCMDsxCzAJBgNVBAYT\n" +48"AlVTMQ0wCwYDVQQKEwRKYXZhMR0wGwYDVQQLExRTdW5KU1NFIFRlc3QgU2VyaXZj\n" +49"ZTAeFw0xNjExMDkwMzI0MDVaFw0zNzEwMjAwMzI0MDVaMDsxCzAJBgNVBAYTAlVT\n" +50"MQ0wCwYDVQQKEwRKYXZhMR0wGwYDVQQLExRTdW5KU1NFIFRlc3QgU2VyaXZjZTBZ\n" +51"MBMGByqGSM49AgEGCCqGSM49AwEHA0IABGeQXwyeNyU4UAATfwUbMO5zaREI21Wh\n" +52"bds6WDu+PmfK8SWsTgsgpYxBRui+fZtYqSmbdjkurvAQ3j2fvN++BtWjga0wgaow\n" +53"HQYDVR0OBBYEFDF/OeJ82qBSRkAm1rdZUPbWfDzyMGsGA1UdIwRkMGKAFDF/OeJ8\n" +54"2qBSRkAm1rdZUPbWfDzyoT+kPTA7MQswCQYDVQQGEwJVUzENMAsGA1UEChMESmF2\n" +55"YTEdMBsGA1UECxMUU3VuSlNTRSBUZXN0IFNlcml2Y2WCCQDPNwvzFafReTAPBgNV\n" +56"HRMBAf8EBTADAQH/MAsGA1UdDwQEAwIBBjAKBggqhkjOPQQDAgNJADBGAiEAlHQY\n" +57"QFPlODOsjLVQYSxgeSUvYzMp0vP8naeVB9bfFG8CIQCFfrKZvhq9z3bOtlYKxs2a\n" +58"EWUjUZ82a1JTqkP+lgHY5A==\n" +59"-----END CERTIFICATE-----",6061// SHA256withRSA, 2048 bits62// Validity63// Not Before: Nov 9 03:24:16 2016 GMT64// Not After : Oct 20 03:24:16 2037 GMT65"-----BEGIN CERTIFICATE-----\n" +66"MIIDpzCCAo+gAwIBAgIJAJAYpR2aIlA1MA0GCSqGSIb3DQEBCwUAMDsxCzAJBgNV\n" +67"BAYTAlVTMQ0wCwYDVQQKEwRKYXZhMR0wGwYDVQQLExRTdW5KU1NFIFRlc3QgU2Vy\n" +68"aXZjZTAeFw0xNjExMDkwMzI0MTZaFw0zNzEwMjAwMzI0MTZaMDsxCzAJBgNVBAYT\n" +69"AlVTMQ0wCwYDVQQKEwRKYXZhMR0wGwYDVQQLExRTdW5KU1NFIFRlc3QgU2VyaXZj\n" +70"ZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+F/FTPODYzsU0Pakfp\n" +71"lsh88YoQWZPjABhCU+HPsCTMYc8UBkaiduUzregwwVBW3D7kmec2K408krGQsxdy\n" +72"oKJA12GL/XX1YgzDEsyBRk/gvex5lPaBIZiJ5IZlUfjLuRDGxPjtRelBTpZ7SUet\n" +73"PJVZz6zV6hMPGO6kQzCtbzzET515EE0okIS40LkAmtWoOmVm3gRldomaZTrZ0V2L\n" +74"MMaJGzrXYqk0SX+PYul8v+2EEHeMuaXG/XpK5xsg9gZvzpKqFQcBOdENoJHB07go\n" +75"jCmRC328ALqr+bMyktKAuYfB+mhjmN2AU8TQx72WPpvNTXxFDYcwo+8254cCAVKB\n" +76"e98CAwEAAaOBrTCBqjAdBgNVHQ4EFgQUlJQlQTbi8YIyiNf+SqF7LtH+gicwawYD\n" +77"VR0jBGQwYoAUlJQlQTbi8YIyiNf+SqF7LtH+giehP6Q9MDsxCzAJBgNVBAYTAlVT\n" +78"MQ0wCwYDVQQKEwRKYXZhMR0wGwYDVQQLExRTdW5KU1NFIFRlc3QgU2VyaXZjZYIJ\n" +79"AJAYpR2aIlA1MA8GA1UdEwEB/wQFMAMBAf8wCwYDVR0PBAQDAgEGMA0GCSqGSIb3\n" +80"DQEBCwUAA4IBAQAI0lTY0YAKQ2VdoIQ6dnqolphLVWdNGiC9drHEYSn7+hmAD2r2\n" +81"v1U/9m752TkcT74a65xKbEVuVtleD/w6i+QjALW2PYt6ivjOnnY0a9Y9a9UCa00j\n" +82"C9415sCw84Tp9VoKtuYqzhN87bBUeABOw5dsW3z32C2N/YhprkqeF/vdx4JxulPr\n" +83"PKze5BREXnKLA1ISoDioCPphvNMKrSpkAofb1rTCwtgt5V/WFls283L52ORmpRGO\n" +84"Ja88ztXOz00ZGu0RQLwlmpN7m8tNgA/5MPrldyYIwegP4RSkkJlF/8+hxvvqfJhK\n" +85"FFDa0HHQSJfR2b9628Iniw1UHOMMT6qx5EHr\n" +86"-----END CERTIFICATE-----"87};8889// End entity certificate.90private final static String[] endEntityCertStrs = {91// SHA256withECDSA, curve prime256v192// Validity93// Not Before: Nov 9 03:24:05 2016 GMT94// Not After : Jul 27 03:24:05 2036 GMT95"-----BEGIN CERTIFICATE-----\n" +96"MIIB1DCCAXmgAwIBAgIJAKVa+4dIUjaLMAoGCCqGSM49BAMCMDsxCzAJBgNVBAYT\n" +97"AlVTMQ0wCwYDVQQKEwRKYXZhMR0wGwYDVQQLExRTdW5KU1NFIFRlc3QgU2VyaXZj\n" +98"ZTAeFw0xNjExMDkwMzI0MDVaFw0zNjA3MjcwMzI0MDVaMFIxCzAJBgNVBAYTAlVT\n" +99"MQ0wCwYDVQQKDARKYXZhMR0wGwYDVQQLDBRTdW5KU1NFIFRlc3QgU2VyaXZjZTEV\n" +100"MBMGA1UEAwwMSW50ZXJPcCBUZXN0MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\n" +101"h4vXNUJzULq4e7fAOvF0WiWU6cllOAMus1GqTFvcnRPOChl8suZsvksO0CpZqL3h\n" +102"jXmVX9dp1FV/rUBGLo1aG6NPME0wCwYDVR0PBAQDAgPoMB0GA1UdDgQWBBSO8V5+\n" +103"bj0ik0T9BtJc4jLJt7m6wjAfBgNVHSMEGDAWgBQxfznifNqgUkZAJta3WVD21nw8\n" +104"8jAKBggqhkjOPQQDAgNJADBGAiEAk7MF+L9bFRwUsbPsBCbCqH9DMdzBQR+kFDNf\n" +105"lfn8Rs4CIQD9qWvBXd+EJqwraxiX6cftaFchn+T2HpvMboy+irMFow==\n" +106"-----END CERTIFICATE-----",107108// SHA256withRSA, 2048 bits109// Validity110// Not Before: Nov 9 03:24:16 2016 GMT111// Not After : Jul 27 03:24:16 2036 GMT112"-----BEGIN CERTIFICATE-----\n" +113"MIIDczCCAlugAwIBAgIJAPhM2oUKx0aJMA0GCSqGSIb3DQEBCwUAMDsxCzAJBgNV\n" +114"BAYTAlVTMQ0wCwYDVQQKEwRKYXZhMR0wGwYDVQQLExRTdW5KU1NFIFRlc3QgU2Vy\n" +115"aXZjZTAeFw0xNjExMDkwMzI0MTZaFw0zNjA3MjcwMzI0MTZaMFIxCzAJBgNVBAYT\n" +116"AlVTMQ0wCwYDVQQKDARKYXZhMR0wGwYDVQQLDBRTdW5KU1NFIFRlc3QgU2VyaXZj\n" +117"ZTEVMBMGA1UEAwwMSW50ZXJPcCBUZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A\n" +118"MIIBCgKCAQEA36tJaXfJ2B/AFvES+tnueyQPSNABVu9nfMdU+NEPamJ+FH7cEF8Z\n" +119"1Spr1vlQgNzCpDUVrfnmT75rCapgz5ldA9+y+3hdfUyHjZBzzfx+6GHXLB4u6eU2\n" +120"NATa7vqSLNbcLcfZ7/QmkFqg4JRJbX4F42kKkRJrWdKZ8UoCYC8WXWvDaZ3nUs05\n" +121"XHe+mBJ8qMNPTbYST1jpzXPyH5CljlFGYi2mKJDTImDhwht7mu2+zvwvbJ81Gj2X\n" +122"JUSTSf9fu0zxFcCk6RmJPw9nSVqePVlOwtNNBodfKN+k4yr+gOz1v8NmMtmEtklV\n" +123"Sulr/J4QxI+E2Zar/C+4XjxkvstIS+PNKQIDAQABo2MwYTALBgNVHQ8EBAMCA+gw\n" +124"HQYDVR0OBBYEFHt19CItAz0VOF0WKGWwaT4DtEsSMB8GA1UdIwQYMBaAFJSUJUE2\n" +125"4vGCMojX/kqhey7R/oInMBIGA1UdEQEB/wQIMAaHBH8AAAEwDQYJKoZIhvcNAQEL\n" +126"BQADggEBACKYZWvo9B9IEpCCdBba2sNo4X1NI/VEY3fyUx1lkw+Kna+1d2Ab+RCZ\n" +127"cf3Y85fcwv03hNE///wNBp+Nde4NQRDK/oiQARzWwWslfinm5d83eQwzC3cpSzt+\n" +128"7ts6M5UlOblGsLXZI7THWO1tkgoEra9p+zezxLMmf/2MpNyZMZlVoJPM2YGxU9cN\n" +129"ws0AyeY1gpBEdT21vjsBPdxxj6qklXVMnzS3zF8YwXyOndDYQWdjmFEknRK/qmQ2\n" +130"gkLHrzpSpyCziecna5mGuDRdCU2dpsWiq1npEPXTq+PQGwWYcoaFTtXF8DDqhfPC\n" +131"4Abe8gPm6MfzerdmS3RFTj9b/DIIENM=\n" +132"-----END CERTIFICATE-----"133};134135// Private key in the format of PKCS#8.136private final static String[] endEntityPrivateKeys = {137//138// EC private key related to cert endEntityCertStrs[0].139//140"MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgA3pmS+OrIjGyUv2F\n" +141"K/PkyayJIePM2RTFYxNoQqmJGnihRANCAASHi9c1QnNQurh7t8A68XRaJZTpyWU4\n" +142"Ay6zUapMW9ydE84KGXyy5my+Sw7QKlmoveGNeZVf12nUVX+tQEYujVob",143144//145// RSA private key related to cert endEntityCertStrs[1].146//147"MIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQDfq0lpd8nYH8AW\n" +148"8RL62e57JA9I0AFW72d8x1T40Q9qYn4UftwQXxnVKmvW+VCA3MKkNRWt+eZPvmsJ\n" +149"qmDPmV0D37L7eF19TIeNkHPN/H7oYdcsHi7p5TY0BNru+pIs1twtx9nv9CaQWqDg\n" +150"lEltfgXjaQqREmtZ0pnxSgJgLxZda8NpnedSzTlcd76YEnyow09NthJPWOnNc/If\n" +151"kKWOUUZiLaYokNMiYOHCG3ua7b7O/C9snzUaPZclRJNJ/1+7TPEVwKTpGYk/D2dJ\n" +152"Wp49WU7C000Gh18o36TjKv6A7PW/w2Yy2YS2SVVK6Wv8nhDEj4TZlqv8L7hePGS+\n" +153"y0hL480pAgMBAAECggEBAJyP1zk+IkloIBtu7+wrdCU6HoDHKMjjlzrehHoOTI4Z\n" +154"F0vdaMkE6J4vrYCyz0kEPjKW/e/jxvT2wxHm8xEdtuApS61+mWJFmXTcMlNzdJnR\n" +155"Mr6s+gW67fAHngA94OgGFeTtyX2PFxdgeM/6vFMqLZD7S+w0SnR7WEpvla4iB7On\n" +156"lXqhJKVQeVc+IpByg/S4MmJb91jck73GltCaCL/b6BTrsz+zc/AY5tb8JInxjMZ9\n" +157"jmjmA+s6l7tnBrFQfJHlF9a374lxCOtZTxyxVJjD7tQcGpsUpSHXZGdpDcT34qYT\n" +158"UGh0yp2Mc/1PfWni5gS/6UGLrYmT57RRCn5YJBJTEkkCgYEA/XPCNehFaOMSxOZh\n" +159"OGBVhQ+eRAmdpJfMhSUsDdEdQLZyWGmZsMTHjZZrwevBX/D0dxQYDv/sAl0GZomJ\n" +160"d6iRCHlscycwx5Q0U/EpacsgRlYHz1nMRzXqS3Ry+8O8qQlliqCLUM7SfVgzdI5/\n" +161"ll9JMrng9NnRl8ccjEdOGK8g/MMCgYEA4eriKMfRslGY4uOQoTPbuEJSMMwQ2X4k\n" +162"lPj1p+xSQfU9QBaWJake67oBj3vpCxqN7/VkvCIeC6LCjhLpWHCn4EkdGiqkEdWz\n" +163"m5CHzpzVIgznzWnbt0rCVL2KdL+ihgY8KPDdsZ6tZrABHuYhsWkAu10wyvuQYM88\n" +164"3u6yOIQn36MCgYEAk5qR1UEzAxWTPbaJkgKQa5Cf9DHBbDS3eCcg098f8SsPxquh\n" +165"RRAkwzGCCgqZsJ0sUhkStdGXifzRGHAq7dPuuwe0ABAn2WNXYjeFjcYtQqkhnUFH\n" +166"tYURsOXdfQAOZEdDqos691GrxjHSraO7bECL6Y3VE+Oyq3jbCFsSgU+kn28CgYBT\n" +167"mrXZO6FJqVK33FlAns1YEgsSjeJKapklHEDkxNroF9Zz6ifkhgKwX6SGMefbORd/\n" +168"zsNZsBKIYdI3+52pIf+uS8BeV5tiEkCmeEUZ3AYv1LDP3rX1zc++xmn/rI97o8EN\n" +169"sZ2JRtyK3OV9RtL/MYmYzPLqm1Ah02+GXLVNnvKWmwKBgE8Ble8CzrXYuuPdGxXz\n" +170"BZU6HnXQrmTUcgeze0tj8SDHzCfsGsaG6pHrVNkT7CKsRuCHTZLM0kXmUijLFKuP\n" +171"5xyE257z4IbbEbs+tcbB3p28n4/47MzZkSR3kt8+FrsEMZq5oOHbFTGzgp9dhZCC\n" +172"dKUqlw5BPHdbxoWB/JpSHGCV"173};174175// Private key names of endEntityPrivateKeys.176private final static String[] endEntityPrivateKeyNames = {177"EC",178"RSA"179};180181/*182* Run the test case.183*/184public void run() throws Exception {185SSLEngine serverEngine = createServerEngine();186187//188// Create and size the buffers appropriately.189//190SSLSession session = serverEngine.getSession();191ByteBuffer serverAppInbound =192ByteBuffer.allocate(session.getApplicationBufferSize());193ByteBuffer clientHello =194ByteBuffer.allocate(session.getPacketBufferSize());195196//197// Generate a ClientHello message, and check if the server198// engine can read it or not.199//200clientHello.put(createClientHelloMessage());201clientHello.flip();202203SSLEngineResult serverResult =204serverEngine.unwrap(clientHello, serverAppInbound);205log("Server unwrap: ", serverResult);206runDelegatedTasks(serverResult, serverEngine);207208//209// Generate server responses to the ClientHello request.210//211ByteBuffer clientNetInbound =212ByteBuffer.allocate(session.getPacketBufferSize());213ByteBuffer clientAppInbound =214ByteBuffer.wrap("Hello Client, I'm Server".getBytes());215216serverResult = serverEngine.wrap(clientAppInbound, clientNetInbound);217log("Server wrap: ", serverResult);218runDelegatedTasks(serverResult, serverEngine);219}220221/*222* Create a ClientHello message.223*/224abstract protected byte[] createClientHelloMessage();225226/*227* Create an instance of SSLContext for client use.228*/229protected SSLContext createClientSSLContext() throws Exception {230return createSSLContext(trustedCertStrs, null, null, null);231}232233/*234* Create an instance of SSLContext for server use.235*/236protected SSLContext createServerSSLContext() throws Exception {237return createSSLContext(null,238endEntityCertStrs, endEntityPrivateKeys,239endEntityPrivateKeyNames);240}241242/*243* Create an instance of SSLContext with the specified trust/key materials.244*/245protected SSLContext createSSLContext(246String[] trustedMaterials,247String[] keyMaterialCerts,248String[] keyMaterialKeys,249String[] keyMaterialKeyAlgs) throws Exception {250251KeyStore ts = null; // trust store252KeyStore ks = null; // key store253char passphrase[] = "passphrase".toCharArray();254255// Generate certificate from cert string.256CertificateFactory cf = CertificateFactory.getInstance("X.509");257258// Import the trused certs.259ByteArrayInputStream is;260if (trustedMaterials != null && trustedMaterials.length != 0) {261ts = KeyStore.getInstance("JKS");262ts.load(null, null);263264Certificate[] trustedCert =265new Certificate[trustedMaterials.length];266for (int i = 0; i < trustedMaterials.length; i++) {267String trustedCertStr = trustedMaterials[i];268269is = new ByteArrayInputStream(trustedCertStr.getBytes());270try {271trustedCert[i] = cf.generateCertificate(is);272} finally {273is.close();274}275276ts.setCertificateEntry("trusted-cert-" + i, trustedCert[i]);277}278}279280// Import the key materials.281//282// Note that certification pathes bigger than one are not supported yet.283boolean hasKeyMaterials =284(keyMaterialCerts != null) && (keyMaterialCerts.length != 0) &&285(keyMaterialKeys != null) && (keyMaterialKeys.length != 0) &&286(keyMaterialKeyAlgs != null) && (keyMaterialKeyAlgs.length != 0) &&287(keyMaterialCerts.length == keyMaterialKeys.length) &&288(keyMaterialCerts.length == keyMaterialKeyAlgs.length);289if (hasKeyMaterials) {290ks = KeyStore.getInstance("JKS");291ks.load(null, null);292293for (int i = 0; i < keyMaterialCerts.length; i++) {294String keyCertStr = keyMaterialCerts[i];295296// generate the private key.297PKCS8EncodedKeySpec priKeySpec = new PKCS8EncodedKeySpec(298Base64.getMimeDecoder().decode(keyMaterialKeys[i]));299KeyFactory kf =300KeyFactory.getInstance(keyMaterialKeyAlgs[i]);301PrivateKey priKey = kf.generatePrivate(priKeySpec);302303// generate certificate chain304is = new ByteArrayInputStream(keyCertStr.getBytes());305Certificate keyCert = null;306try {307keyCert = cf.generateCertificate(is);308} finally {309is.close();310}311312Certificate[] chain = new Certificate[] { keyCert };313314// import the key entry.315ks.setKeyEntry("cert-" + i, priKey, passphrase, chain);316}317}318319// Create an SSLContext object.320TrustManagerFactory tmf = TrustManagerFactory.getInstance("PKIX");321tmf.init(ts);322323SSLContext context = SSLContext.getInstance("TLS");324if (hasKeyMaterials && ks != null) {325KeyManagerFactory kmf = KeyManagerFactory.getInstance("NewSunX509");326kmf.init(ks, passphrase);327328context.init(kmf.getKeyManagers(), tmf.getTrustManagers(), null);329} else {330context.init(null, tmf.getTrustManagers(), null);331}332333return context;334}335336/*337* Create an instance of SSLEngine in client mode.338*/339protected SSLEngine createClientEngine() throws Exception {340return createClientEngine(createClientSSLContext());341}342343/*344* Create an instance of SSLEngine in client mode with the345* specified SSLContext object.346*/347protected SSLEngine createClientEngine(348SSLContext context) throws Exception {349350SSLEngine engine = context.createSSLEngine();351engine.setUseClientMode(true);352353/*354* Customize the SSLEngine object.355*/356// blank357358return engine;359}360361/*362* Create an instance of SSLEngine in server mode.363*/364protected SSLEngine createServerEngine() throws Exception {365return createServerEngine(createServerSSLContext());366}367368/*369* Create an instance of SSLEngine in server mode with the370* specified SSLContext object.371*/372protected SSLEngine createServerEngine(373SSLContext context) throws Exception {374375SSLEngine engine = context.createSSLEngine();376engine.setUseClientMode(false);377378/*379* Customize the SSLEngine object.380*/381engine.setNeedClientAuth(false);382383return engine;384}385386/*387* Run the delagayed tasks if any.388*389* If the result indicates that we have outstanding tasks to do,390* go ahead and run them in this thread.391*/392protected static void runDelegatedTasks(SSLEngineResult result,393SSLEngine engine) throws Exception {394395if (result.getHandshakeStatus() == HandshakeStatus.NEED_TASK) {396Runnable runnable;397while ((runnable = engine.getDelegatedTask()) != null) {398log("\trunning delegated task...");399runnable.run();400}401HandshakeStatus hsStatus = engine.getHandshakeStatus();402if (hsStatus == HandshakeStatus.NEED_TASK) {403throw new Exception(404"handshake shouldn't need additional tasks");405}406log("\tnew HandshakeStatus: " + hsStatus);407}408}409410/*411* Logging the specificated message and the SSLEngine operation result.412*/413protected static void log(String str, SSLEngineResult result) {414HandshakeStatus hsStatus = result.getHandshakeStatus();415log(str +416result.getStatus() + "/" + hsStatus + ", consumed: " +417result.bytesConsumed() + "/produced: " + result.bytesProduced() +418" bytes");419420if (hsStatus == HandshakeStatus.FINISHED) {421log("\t...ready for application data");422}423}424425/*426* Logging the specificated message.427*/428protected static void log(String str) {429System.out.println(str);430}431}432433434