| /* |
| * Copyright (c) 2011, 2016, Oracle and/or its affiliates. All rights reserved. |
| * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. |
| * |
| * This code is free software; you can redistribute it and/or modify it |
| * under the terms of the GNU General Public License version 2 only, as |
| * published by the Free Software Foundation. Oracle designates this |
| * particular file as subject to the "Classpath" exception as provided |
| * by Oracle in the LICENSE file that accompanied this code. |
| * |
| * This code is distributed in the hope that it will be useful, but WITHOUT |
| * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or |
| * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License |
| * version 2 for more details (a copy is included in the LICENSE file that |
| * accompanied this code). |
| * |
| * You should have received a copy of the GNU General Public License version |
| * 2 along with this work; if not, write to the Free Software Foundation, |
| * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. |
| * |
| * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA |
| * or visit www.oracle.com if you need additional information or have any |
| * questions. |
| */ |
| |
| // |
| // SunJSSE does not support dynamic system properties, no way to re-use |
| // system properties in samevm/agentvm mode. |
| // |
| |
| /* |
| * @test |
| * @bug 7113275 |
| * @summary compatibility issue with MD2 trust anchor and old X509TrustManager |
| * @run main/othervm MD2InTrustAnchor PKIX TLSv1.1 |
| * @run main/othervm MD2InTrustAnchor SunX509 TLSv1.1 |
| * @run main/othervm MD2InTrustAnchor PKIX TLSv1.2 |
| * @run main/othervm MD2InTrustAnchor SunX509 TLSv1.2 |
| */ |
| import java.io.ByteArrayInputStream; |
| import java.io.InputStream; |
| import java.io.OutputStream; |
| import javax.net.ssl.*; |
| import java.security.Security; |
| import java.security.KeyStore; |
| import java.security.KeyFactory; |
| import java.security.cert.Certificate; |
| import java.security.cert.CertificateFactory; |
| import java.security.interfaces.RSAPrivateKey; |
| import java.security.spec.PKCS8EncodedKeySpec; |
| import java.util.Base64; |
| import java.util.concurrent.CountDownLatch; |
| |
| public class MD2InTrustAnchor { |
| |
| /* |
| * Certificates and key used in the test. |
| */ |
| // It's a trust anchor signed with MD2 hash function. |
| private static final String TRUSTED_CERT_STR = "-----BEGIN CERTIFICATE-----\n" |
| + "MIICkjCCAfugAwIBAgIBADANBgkqhkiG9w0BAQIFADA7MQswCQYDVQQGEwJVUzEN\n" |
| + "MAsGA1UEChMESmF2YTEdMBsGA1UECxMUU3VuSlNTRSBUZXN0IFNlcml2Y2UwHhcN\n" |
| + "MTExMTE4MTExNDA0WhcNMzIxMDI4MTExNDA0WjA7MQswCQYDVQQGEwJVUzENMAsG\n" |
| + "A1UEChMESmF2YTEdMBsGA1UECxMUU3VuSlNTRSBUZXN0IFNlcml2Y2UwgZ8wDQYJ\n" |
| + "KoZIhvcNAQEBBQADgY0AMIGJAoGBAPGyB9tugUGgxtdeqe0qJEwf9x1Gy4BOi1yR\n" |
| + "wzDZY4H5LquvIfQ2V3J9X1MQENVsFvkvp65ZcFcy+ObOucXUUPFcd/iw2DVb5QXA\n" |
| + "ffyeVqWD56GPi8Qe37wrJO3L6fBhN9oxp/BbdRLgjU81zx8qLEyPODhPMxV4OkcA\n" |
| + "SDwZTSxxAgMBAAGjgaUwgaIwHQYDVR0OBBYEFLOAtr/YrYj9H04EDLA0fd14jisF\n" |
| + "MGMGA1UdIwRcMFqAFLOAtr/YrYj9H04EDLA0fd14jisFoT+kPTA7MQswCQYDVQQG\n" |
| + "EwJVUzENMAsGA1UEChMESmF2YTEdMBsGA1UECxMUU3VuSlNTRSBUZXN0IFNlcml2\n" |
| + "Y2WCAQAwDwYDVR0TAQH/BAUwAwEB/zALBgNVHQ8EBAMCAQYwDQYJKoZIhvcNAQEC\n" |
| + "BQADgYEAr8ExpXu/FTIRiMzPm0ubqwME4lniilwQUiEOD/4DbksNjEIcUyS2hIk1\n" |
| + "qsmjJz3SHBnwhxl9dhJVwk2tZLkPGW86Zn0TPVRsttK4inTgCC9GFGeqQBdrU/uf\n" |
| + "lipBzXWljrfbg4N/kK8m2LabtKUMMnGysM8rN0Fx2PYm5xxGvtM=\n" |
| + "-----END CERTIFICATE-----"; |
| |
| // The certificate issued by above trust anchor, signed with MD5 |
| private static final String TARGET_CERT_STR = "-----BEGIN CERTIFICATE-----\n" |
| + "MIICeDCCAeGgAwIBAgIBAjANBgkqhkiG9w0BAQQFADA7MQswCQYDVQQGEwJVUzEN\n" |
| + "MAsGA1UEChMESmF2YTEdMBsGA1UECxMUU3VuSlNTRSBUZXN0IFNlcml2Y2UwHhcN\n" |
| + "MTExMTE4MTExNDA2WhcNMzEwODA1MTExNDA2WjBPMQswCQYDVQQGEwJVUzENMAsG\n" |
| + "A1UEChMESmF2YTEdMBsGA1UECxMUU3VuSlNTRSBUZXN0IFNlcml2Y2UxEjAQBgNV\n" |
| + "BAMTCWxvY2FsaG9zdDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAwDnm96mw\n" |
| + "fXCH4bgXk1US0VcJsQVxUtGMyncAveMuzBzNzOmKZPeqyYX1Fuh4q+cuza03WTJd\n" |
| + "G9nOkNr364e3Rn1aaHjCMcBmFflObnGnhhufNmIGYogJ9dJPmhUVPEVAXrMG+Ces\n" |
| + "NKy2E8woGnLMrqu6yiuTClbLBPK8fWzTXrECAwEAAaN4MHYwCwYDVR0PBAQDAgPo\n" |
| + "MB0GA1UdDgQWBBSdRrpocLPJXyGfDmMWJrcEf29WGDAfBgNVHSMEGDAWgBSzgLa/\n" |
| + "2K2I/R9OBAywNH3deI4rBTAnBgNVHSUEIDAeBggrBgEFBQcDAQYIKwYBBQUHAwIG\n" |
| + "CCsGAQUFBwMDMA0GCSqGSIb3DQEBBAUAA4GBAKJ71ZiCUykkJrCLYUxlFlhvUcr9\n" |
| + "sTcOc67QdroW5f412NI15SXWDiley/JOasIiuIFPjaJBjOKoHOvTjG/snVu9wEgq\n" |
| + "YNR8dPsO+NM8r79C6jO+Jx5fYAC7os2XxS75h3NX0ElJcbwIXGBJ6xRrsFh/BGYH\n" |
| + "yvudOlX4BkVR0l1K\n" |
| + "-----END CERTIFICATE-----"; |
| |
| // Private key in the format of PKCS#8. |
| private static final String TARGET_PRIV_KEY_STR = "MIICdwIBADANBgkqhkiG9w0B\n" |
| + "AQEFAASCAmEwggJdAgEAAoGBAMA55vepsH1wh+G4F5NVEtFXCbEFcVLRjMp3AL3j\n" |
| + "LswczczpimT3qsmF9RboeKvnLs2tN1kyXRvZzpDa9+uHt0Z9Wmh4wjHAZhX5Tm5x\n" |
| + "p4YbnzZiBmKICfXST5oVFTxFQF6zBvgnrDSsthPMKBpyzK6rusorkwpWywTyvH1s\n" |
| + "016xAgMBAAECgYEAn9bF3oRkdDoBU0i/mcww5I+KSH9tFt+WQbiojjz9ac49trkv\n" |
| + "Ufu7MO1Jui2+QbrvaSkyj+HYGFOJd1wMsPXeB7ck5mOIYV4uZK8jfNMSQ8v0tFEe\n" |
| + "IPp5lKdw1XnrQfSe+abo2eL5Lwso437Y4s3w37+HaY3d76hR5qly+Ys+Ww0CQQDj\n" |
| + "eOoX89d/xhRqGXKjCx8ImE/dPmsI8O27cwtKrDYJ6t0v/xryVIdvOYcRBvKnqEog\n" |
| + "OH7T1kI+LnWKUTJ2ehJ7AkEA2FVloPVqCehXcc7ez3TDpU9w1B0JXklcV5HddYsR\n" |
| + "qp9RukN/VK4szKE7F1yoarIUtfE9Lr9082Jwyp3ML11xwwJBAKsZ+Hur3x0tUY29\n" |
| + "No2Nf/pnFyvEF57SGwA0uPmiL8Ol9lpz+UDudDElhIM6Rqv12kwCMuQE9i7vo1o3\n" |
| + "WU3k5KECQEqhg1L49yD935TqiiFFpe0Ur9btQXsekdXAA4d2d5zGI7q/aGD9SYU6\n" |
| + "phkUJSHR16VA2RuUfzMrpb+wmm1IrmMCQFtLoKRTA5kokFb+E3Gplu29tJvCUpfw\n" |
| + "gBFRS+wmkvtiaU/tiyDcVgDO+An5DwedxxdVzqiEnjWHoKY3axDQ8OU="; |
| |
| private static final char PASSPHRASE[] = "passphrase".toCharArray(); |
| |
| /* |
| * Is the server ready to serve? |
| */ |
| private static volatile CountDownLatch sync = new CountDownLatch(1); |
| |
| /* |
| * Turn on SSL debugging? |
| */ |
| private static final boolean DEBUG = false; |
| |
| /* |
| * Define the server side of the test. |
| * |
| * If the server prematurely exits, serverReady will be set to true |
| * to avoid infinite hangs. |
| */ |
| private void doServerSide() throws Exception { |
| SSLContext context = generateSSLContext(TRUSTED_CERT_STR, TARGET_CERT_STR, |
| TARGET_PRIV_KEY_STR); |
| SSLServerSocketFactory sslssf = context.getServerSocketFactory(); |
| try (SSLServerSocket sslServerSocket |
| = (SSLServerSocket) sslssf.createServerSocket(serverPort)) { |
| sslServerSocket.setNeedClientAuth(true); |
| serverPort = sslServerSocket.getLocalPort(); |
| /* |
| * Signal Client, we're ready for his connect. |
| */ |
| System.out.println("Signal server ready"); |
| sync.countDown(); |
| |
| System.out.println("Waiting for client connection"); |
| try (SSLSocket sslSocket = (SSLSocket) sslServerSocket.accept()) { |
| InputStream sslIS = sslSocket.getInputStream(); |
| OutputStream sslOS = sslSocket.getOutputStream(); |
| |
| sslIS.read(); |
| sslOS.write('A'); |
| sslOS.flush(); |
| } |
| } |
| } |
| |
| /* |
| * Define the client side of the test. |
| * |
| * If the server prematurely exits, serverReady will be set to true |
| * to avoid infinite hangs. |
| */ |
| private void doClientSide() throws Exception { |
| |
| /* |
| * Wait for server to get started. |
| */ |
| System.out.println("Waiting for server ready"); |
| sync.await(); |
| |
| SSLContext context = generateSSLContext(TRUSTED_CERT_STR, TARGET_CERT_STR, |
| TARGET_PRIV_KEY_STR); |
| SSLSocketFactory sslsf = context.getSocketFactory(); |
| |
| System.out.println("Connect to server on port: " + serverPort); |
| try (SSLSocket sslSocket |
| = (SSLSocket) sslsf.createSocket("localhost", serverPort)) { |
| // enable the specified TLS protocol |
| sslSocket.setEnabledProtocols(new String[]{tlsProtocol}); |
| |
| InputStream sslIS = sslSocket.getInputStream(); |
| OutputStream sslOS = sslSocket.getOutputStream(); |
| |
| sslOS.write('B'); |
| sslOS.flush(); |
| sslIS.read(); |
| } |
| } |
| |
| /* |
| * ============================================================= |
| * The remainder is just support stuff |
| */ |
| private static String tmAlgorithm; // trust manager |
| private static String tlsProtocol; // trust manager |
| |
| private static void parseArguments(String[] args) { |
| tmAlgorithm = args[0]; |
| tlsProtocol = args[1]; |
| } |
| |
| private static SSLContext generateSSLContext(String trustedCertStr, |
| String keyCertStr, String keySpecStr) throws Exception { |
| |
| // generate certificate from cert string |
| CertificateFactory cf = CertificateFactory.getInstance("X.509"); |
| |
| // create a key store |
| KeyStore ks = KeyStore.getInstance("JKS"); |
| ks.load(null, null); |
| |
| // import the trused cert |
| Certificate trusedCert = null; |
| ByteArrayInputStream is = null; |
| if (trustedCertStr != null) { |
| is = new ByteArrayInputStream(trustedCertStr.getBytes()); |
| trusedCert = cf.generateCertificate(is); |
| is.close(); |
| |
| ks.setCertificateEntry("RSA Export Signer", trusedCert); |
| } |
| |
| if (keyCertStr != null) { |
| // generate the private key. |
| PKCS8EncodedKeySpec priKeySpec = new PKCS8EncodedKeySpec( |
| Base64.getMimeDecoder().decode(keySpecStr)); |
| KeyFactory kf = KeyFactory.getInstance("RSA"); |
| RSAPrivateKey priKey |
| = (RSAPrivateKey) kf.generatePrivate(priKeySpec); |
| |
| // generate certificate chain |
| is = new ByteArrayInputStream(keyCertStr.getBytes()); |
| Certificate keyCert = cf.generateCertificate(is); |
| is.close(); |
| |
| // It's not allowed to send MD2 signed certificate to peer, |
| // even it may be a trusted certificate. Then we will not |
| // place the trusted certficate in the chain. |
| Certificate[] chain = new Certificate[1]; |
| chain[0] = keyCert; |
| |
| // import the key entry. |
| ks.setKeyEntry("Whatever", priKey, PASSPHRASE, chain); |
| } |
| |
| // create SSL context |
| TrustManagerFactory tmf = TrustManagerFactory.getInstance(tmAlgorithm); |
| tmf.init(ks); |
| |
| SSLContext ctx = SSLContext.getInstance(tlsProtocol); |
| if (keyCertStr != null && !keyCertStr.isEmpty()) { |
| KeyManagerFactory kmf = KeyManagerFactory.getInstance("NewSunX509"); |
| kmf.init(ks, PASSPHRASE); |
| |
| ctx.init(kmf.getKeyManagers(), tmf.getTrustManagers(), null); |
| ks = null; |
| } else { |
| ctx.init(null, tmf.getTrustManagers(), null); |
| } |
| |
| return ctx; |
| } |
| |
| // use any free port by default |
| private volatile int serverPort = 0; |
| |
| private volatile Exception serverException = null; |
| |
| public static void main(String[] args) throws Exception { |
| // MD5 is used in this test case, don't disable MD5 algorithm. |
| Security.setProperty("jdk.certpath.disabledAlgorithms", |
| "MD2, RSA keySize < 1024"); |
| Security.setProperty("jdk.tls.disabledAlgorithms", |
| "SSLv3, RC4, DH keySize < 768"); |
| |
| if (DEBUG) { |
| System.setProperty("javax.net.debug", "all"); |
| } |
| |
| /* |
| * Get the customized arguments. |
| */ |
| parseArguments(args); |
| /* |
| * Start the tests. |
| */ |
| new MD2InTrustAnchor().runTest(); |
| } |
| |
| private Thread serverThread = null; |
| |
| /* |
| * Used to drive remainder of the test. |
| * |
| * Fork off the other side, then do your work. |
| */ |
| public void runTest() throws Exception { |
| startServerThread(); |
| doClientSide(); |
| |
| /* |
| * Wait for other side to close down. |
| */ |
| serverThread.join(); |
| |
| if (serverException != null) { |
| throw serverException; |
| } |
| } |
| |
| private void startServerThread() { |
| serverThread = new Thread() { |
| @Override |
| public void run() { |
| try { |
| doServerSide(); |
| } catch (Exception e) { |
| /* |
| * Our server thread just died. |
| * |
| * Release the client, if not active already... |
| */ |
| System.err.println("Server died..."); |
| e.printStackTrace(System.out); |
| serverException = e; |
| sync.countDown(); |
| } |
| } |
| }; |
| |
| serverThread.start(); |
| } |
| } |