ttomcat-1778514358873.zip-extract/apache-tomcat-11.0.18-src/test/org/apache/tomcat/security/TestSecurity2017Ocsp.java

Path
ttomcat-1778514358873.zip-extract/apache-tomcat-11.0.18-src/test/org/apache/tomcat/security/TestSecurity2017Ocsp.java
Status
scanned
Type
file
Name
TestSecurity2017Ocsp.java
Extension
.java
Programming language
Java
Mime type
text/plain
File type
ASCII text, with CRLF line terminators
Tag

      
    
Rootfs path

      
    
Size
4100 (4.0 KB)
MD5
6776d7d993ff1c8371cf1accbd75de90
SHA1
1492c6b96ea13871858fa9e871fcc48be36715f7
SHA256
c19a2c5d46f70e3865b6216cf8c286fccd011e6d73dd56d5b659f56ee57b6da0
SHA512

      
    
SHA1_git
9364efc2fa1a00ac03a1abe4731dd329b53cf807
Is binary

      
    
Is text
True
Is archive

      
    
Is media

      
    
Is legal

      
    
Is manifest

      
    
Is readme

      
    
Is top level

      
    
Is key file

      
    
TestSecurity2017Ocsp.java | 4.0 KB |

/* * Licensed to the Apache Software Foundation (ASF) under one or more * contributor license agreements. See the NOTICE file distributed with * this work for additional information regarding copyright ownership. * The ASF licenses this file to You under the Apache License, Version 2.0 * (the "License"); you may not use this file except in compliance with * the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.apache.tomcat.security; import java.io.IOException; import java.net.SocketException; import javax.net.ssl.SSLHandshakeException; import jakarta.servlet.http.HttpServletResponse; import org.junit.AfterClass; import org.junit.Assert; import org.junit.Assume; import org.junit.BeforeClass; import org.junit.Test; import org.junit.runner.RunWith; import org.junit.runners.Parameterized; import org.apache.catalina.Context; import org.apache.catalina.startup.Tomcat; import org.apache.tomcat.util.buf.ByteChunk; import org.apache.tomcat.util.net.SSLHostConfig; import org.apache.tomcat.util.net.TesterSupport; import org.apache.tomcat.util.net.TesterSupport.SimpleServlet; import org.apache.tomcat.util.net.ocsp.OcspBaseTest; import org.apache.tomcat.util.net.ocsp.TesterOcspResponder; import org.apache.tomcat.util.net.openssl.OpenSSLStatus; @RunWith(Parameterized.class) public class TestSecurity2017Ocsp extends OcspBaseTest { private static TesterOcspResponder ocspResponder; @BeforeClass public static void startOcspResponder() { ocspResponder = new TesterOcspResponder(); try { ocspResponder.start(); } catch (IOException ioe) { ocspResponder = null; } } @AfterClass public static void stopOcspResponder() { if (ocspResponder != null) { ocspResponder.stop(); ocspResponder = null; } } /* * In addition to testing Tomcat Native (where the CVE occurred), this also tests JSSE and OpenSSl via FFM. */ @Test(expected=SSLHandshakeException.class) public void testCVE_2017_15698() throws Exception { if ("OpenSSL-FFM".equals(connectorName)) { Assume.assumeFalse(OpenSSLStatus.isBoringSSL() || OpenSSLStatus.isLibreSSLPre35()); } Assume.assumeNotNull(ocspResponder); Tomcat tomcat = getTomcatInstance(); // No file system docBase required Context ctx = tomcat.addContext("", null); Tomcat.addServlet(ctx, "simple", new SimpleServlet()); ctx.addServletMappingDecoded("/simple", "simple"); // Use the default (valid, non-revoked) server certificate TesterSupport.initSsl(tomcat, useOpenSSLTrust); // Require client certificates and enable verification SSLHostConfig sslHostConfig = tomcat.getConnector().findSslHostConfigs()[0]; sslHostConfig.setOcspEnabled(true); sslHostConfig.setCertificateVerification("required"); // Configure a revoked client certificate with a long AIA // Don't verify the server certificate TesterSupport.configureClientSsl(false, TesterSupport.CLIENT_CRL_LONG_JKS); // Disable soft-fail sslHostConfig.setOcspSoftFail(false); tomcat.start(); int rc; try { rc = getUrl("https://localhost:" + getPort() + "/simple", new ByteChunk(), false); } catch (SocketException se) { throw new SSLHandshakeException(se.getMessage()); } // If the TLS handshake fails, the test won't get this far. Assert.assertEquals(HttpServletResponse.SC_OK, rc); } }
Detected license expression
apache-2.0
Detected license expression (SPDX)
Apache-2.0
Percentage of license text
27.29
Copyrights

      
    
Holders

      
    
Authors

      
    
License detections License expression License expression SPDX
apache_2_0-4bde3f57-78aa-4201-96bf-531cba09e7de apache-2.0 Apache-2.0
URL Start line End line
http://www.apache.org/licenses/LICENSE-2.0 9 9