ttomcat-1778514358873.zip-extract/apache-tomcat-11.0.18-src/test/org/apache/tomcat/util/net/TestSSLHostConfigCipher.java

Path
ttomcat-1778514358873.zip-extract/apache-tomcat-11.0.18-src/test/org/apache/tomcat/util/net/TestSSLHostConfigCipher.java
Status
scanned
Type
file
Name
TestSSLHostConfigCipher.java
Extension
.java
Programming language
Java
Mime type
text/plain
File type
ASCII text, with CRLF line terminators
Tag

      
    
Rootfs path

      
    
Size
5890 (5.8 KB)
MD5
81bdf7cb9f56deb231b1165f4f7437a2
SHA1
ee4a0139e9e70328f4638afb32497a8391348ddb
SHA256
dde6dccf1214c27012c1ac1d28a187a6daa5431e39e6db7ce4f6108ab34c47ed
SHA512

      
    
SHA1_git
c3a3cd4da45249f21dbf7f5364877c64b2db8fd9
Is binary

      
    
Is text
True
Is archive

      
    
Is media

      
    
Is legal

      
    
Is manifest

      
    
Is readme

      
    
Is top level

      
    
Is key file

      
    
TestSSLHostConfigCipher.java | 5.8 KB |

/* * Licensed to the Apache Software Foundation (ASF) under one or more * contributor license agreements. See the NOTICE file distributed with * this work for additional information regarding copyright ownership. * The ASF licenses this file to You under the Apache License, Version 2.0 * (the "License"); you may not use this file except in compliance with * the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.apache.tomcat.util.net; import java.util.ArrayList; import java.util.Collection; import java.util.List; import javax.net.ssl.SSLHandshakeException; import org.junit.Assert; import org.junit.Assume; import org.junit.Test; import org.junit.runner.RunWith; import org.junit.runners.Parameterized; import org.junit.runners.Parameterized.Parameter; import org.apache.catalina.Context; import org.apache.catalina.connector.Connector; import org.apache.catalina.startup.TesterServlet; import org.apache.catalina.startup.Tomcat; import org.apache.catalina.startup.TomcatBaseTest; import org.apache.tomcat.util.buf.ByteChunk; import org.apache.tomcat.util.net.openssl.OpenSSLStatus; @RunWith(Parameterized.class) public class TestSSLHostConfigCipher extends TomcatBaseTest { private static final String CIPHER_12_AVAILABLE = "TLS_DHE_RSA_WITH_AES_128_GCM_SHA256"; private static final String CIPHER_12_NOT_AVAILABLE = "TLS_DHE_RSA_WITH_AES_256_GCM_SHA384"; private static final String CIPHER_13_AVAILABLE = "TLS_AES_128_GCM_SHA256"; private static final String CIPHER_13_NOT_AVAILABLE = "TLS_AES_256_GCM_SHA384"; @Parameterized.Parameters(name = "{0}") public static Collection<Object[]> parameters() { List<Object[]> parameterSets = new ArrayList<>(); parameterSets.add(new Object[] { "JSSE", Boolean.FALSE, "org.apache.tomcat.util.net.jsse.JSSEImplementation"}); parameterSets.add(new Object[] { "OpenSSL", Boolean.TRUE, "org.apache.tomcat.util.net.openssl.OpenSSLImplementation"}); parameterSets.add(new Object[] { "OpenSSL-FFM", Boolean.TRUE, "org.apache.tomcat.util.net.openssl.panama.OpenSSLImplementation"}); return parameterSets; } @Parameter(0) public String connectorName; @Parameter(1) public boolean useOpenSSL; @Parameter(2) public String sslImplementationName; @Override public void setUp() throws Exception { super.setUp(); Tomcat tomcat = getTomcatInstance(); // Server-side TLS configuration TesterSupport.initSsl(tomcat); TesterSupport.configureSSLImplementation(tomcat, sslImplementationName, useOpenSSL); // Test specific, server-side cipher & protocol configuration SSLHostConfig sslHostConfig = getSSLHostConfig(); sslHostConfig.setProtocols("+TLSv1.2+TLSv1.3"); sslHostConfig.setCiphers(CIPHER_12_AVAILABLE); sslHostConfig.setCipherSuites(CIPHER_13_AVAILABLE); // Simple webapp Context ctxt = getProgrammaticRootContext(); Tomcat.addServlet(ctxt, "TesterServlet", new TesterServlet()); ctxt.addServletMappingDecoded("/*", "TesterServlet"); } @Test public void testTls12CipherAvailable() throws Exception { if ("OpenSSL-FFM".equals(connectorName)) { // The functionality works, but the two ciphers used are not available Assume.assumeFalse(OpenSSLStatus.isBoringSSL()); } // Client-side TLS configuration TesterSupport.configureClientSsl(true, new String[] { CIPHER_12_AVAILABLE } ); doTest(); } @Test(expected=SSLHandshakeException.class) public void testTls12CipherNotAvailable() throws Exception { if ("OpenSSL-FFM".equals(connectorName)) { Assume.assumeFalse(OpenSSLStatus.isBoringSSL()); } // Client-side TLS configuration TesterSupport.configureClientSsl(true, new String[] { CIPHER_12_NOT_AVAILABLE } ); doTest(); } @Test public void testTls13CipherAvailable() throws Exception { if ("OpenSSL-FFM".equals(connectorName)) { Assume.assumeFalse(OpenSSLStatus.isBoringSSL()); } // Client-side TLS configuration TesterSupport.configureClientSsl(new String[] { CIPHER_13_AVAILABLE } ); doTest(); } @Test(expected=SSLHandshakeException.class) public void testTls13CipherNotAvailable() throws Exception { if ("OpenSSL-FFM".equals(connectorName)) { // The TLS 1.3 call might not be present Assume.assumeFalse(OpenSSLStatus.isLibreSSLPre35()); Assume.assumeFalse(OpenSSLStatus.isBoringSSL()); } // Client-side TLS configuration TesterSupport.configureClientSsl(new String[] { CIPHER_13_NOT_AVAILABLE } ); doTest(); } private void doTest() throws Exception { Tomcat tomcat = getTomcatInstance(); tomcat.start(); // Check a request can be made ByteChunk res = getUrl("https://localhost:" + getPort() + "/"); Assert.assertEquals("OK", res.toString()); } private SSLHostConfig getSSLHostConfig() { Tomcat tomcat = getTomcatInstance(); Connector connector = tomcat.getConnector(); return connector.findSslHostConfigs()[0]; } }
Detected license expression
apache-2.0
Detected license expression (SPDX)
Apache-2.0
Percentage of license text
20.27
Copyrights

      
    
Holders

      
    
Authors

      
    
License detections License expression License expression SPDX
apache_2_0-4bde3f57-78aa-4201-96bf-531cba09e7de apache-2.0 Apache-2.0
URL Start line End line
http://www.apache.org/licenses/LICENSE-2.0 9 9