ttomcat-1778514358873.zip-extract/apache-tomcat-11.0.18-src/test/org/apache/tomcat/util/net/openssl/TestOpenSSLConf.java

Path
ttomcat-1778514358873.zip-extract/apache-tomcat-11.0.18-src/test/org/apache/tomcat/util/net/openssl/TestOpenSSLConf.java
Status
scanned
Type
file
Name
TestOpenSSLConf.java
Extension
.java
Programming language
Java
Mime type
text/plain
File type
ASCII text, with CRLF line terminators
Tag

      
    
Rootfs path

      
    
Size
8934 (8.7 KB)
MD5
3bd41168040f83a979b645fd01b9014e
SHA1
847e0e60648b70e35c7392903050e71a9e64b648
SHA256
f79b9c302f98b65774b90f0b086ced6462ade3944992b1399bb5eae9dc2b437d
SHA512

      
    
SHA1_git
b5bf7a70239c468133f6f5cb7cde9f1bfbc5536f
Is binary

      
    
Is text
True
Is archive

      
    
Is media

      
    
Is legal

      
    
Is manifest

      
    
Is readme

      
    
Is top level

      
    
Is key file

      
    
TestOpenSSLConf.java | 8.7 KB |

/* * Licensed to the Apache Software Foundation (ASF) under one or more * contributor license agreements. See the NOTICE file distributed with * this work for additional information regarding copyright ownership. * The ASF licenses this file to You under the Apache License, Version 2.0 * (the "License"); you may not use this file except in compliance with * the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.apache.tomcat.util.net.openssl; import java.lang.reflect.Method; import java.util.ArrayList; import java.util.Arrays; import java.util.Collection; import java.util.HashSet; import java.util.List; import java.util.Set; import org.hamcrest.CoreMatchers; import org.hamcrest.MatcherAssert; import org.junit.Assert; import org.junit.Assume; import org.junit.Test; import org.junit.runner.RunWith; import org.junit.runners.Parameterized; import org.junit.runners.Parameterized.Parameter; import org.apache.catalina.Lifecycle; import org.apache.catalina.LifecycleEvent; import org.apache.catalina.LifecycleListener; import org.apache.catalina.connector.Connector; import org.apache.catalina.core.AprLifecycleListener; import org.apache.catalina.core.OpenSSLLifecycleListener; import org.apache.catalina.core.StandardServer; import org.apache.catalina.startup.Tomcat; import org.apache.catalina.startup.TomcatBaseTest; import org.apache.tomcat.jni.AprStatus; import org.apache.tomcat.jni.SSLContext; import org.apache.tomcat.util.net.SSLHostConfig; import org.apache.tomcat.util.net.TesterSupport; @RunWith(Parameterized.class) public class TestOpenSSLConf extends TomcatBaseTest { @Parameterized.Parameters(name = "{0}") public static Collection<Object[]> parameters() { List<Object[]> parameterSets = new ArrayList<>(); parameterSets.add( new Object[] { "org.apache.tomcat.util.net.openssl.OpenSSLImplementation" }); parameterSets.add( new Object[] { "org.apache.tomcat.util.net.openssl.panama.OpenSSLImplementation" }); return parameterSets; } @Parameter(0) public String sslImplementationName; private static final String ENABLED_CIPHER = "AES256-SHA256"; private static final String[] EXPECTED_CIPHERS = {ENABLED_CIPHER}; private static final String[] ENABLED_PROTOCOLS = {"TLSv1.1"}; private static final String[] DISABLED_PROTOCOLS = {"SSLv3", "TLSv1", "TLSv1.2"}; private static final String[] DISABLED_PROTOCOLS_TLS13 = {"TLSv1.3"}; // Test behavior needs to adjust for OpenSSL 1.1.1-pre3 and above private static final int OPENSSL_TLS13_SUPPORT_MIN_VERSION = 0x10101003; private static boolean hasTLS13() { return AprStatus.getOpenSSLVersion() >= OPENSSL_TLS13_SUPPORT_MIN_VERSION || OpenSSLStatus.getVersion() >= OPENSSL_TLS13_SUPPORT_MIN_VERSION; } private void initOpenSSL() throws Exception { Tomcat tomcat = getTomcatInstance(); TesterSupport.initSsl(tomcat); Assert.assertTrue(tomcat.getConnector().setProperty("sslImplementationName", sslImplementationName)); if (OpenSSLImplementation.class.getName().equals(sslImplementationName)) { LifecycleListener listener = new AprLifecycleListener(); Assume.assumeTrue(AprLifecycleListener.isAprAvailable()); StandardServer server = (StandardServer) tomcat.getServer(); server.addLifecycleListener(listener); // Initialize only the listener as the OpenSSL version is not available before initializeSSL listener.lifecycleEvent(new LifecycleEvent(tomcat.getServer(), Lifecycle.BEFORE_INIT_EVENT, null)); } else if ("org.apache.tomcat.util.net.openssl.panama.OpenSSLImplementation".equals(sslImplementationName)) { LifecycleListener listener = new OpenSSLLifecycleListener(); Assume.assumeTrue(OpenSSLLifecycleListener.isAvailable()); Assume.assumeFalse("LibreSSL does not support OpenSSLConf", Class.forName("org.apache.tomcat.util.openssl.openssl_h_Compatibility").getField("LIBRESSL").getBoolean(null)); StandardServer server = (StandardServer) tomcat.getServer(); server.addLifecycleListener(listener); } } private SSLHostConfig initOpenSSLConfCmd(String... commands) throws Exception { Assert.assertNotNull(commands); Assert.assertTrue("Invalid length", commands.length % 2 == 0); OpenSSLConf conf = new OpenSSLConf(); for (int i = 0; i < commands.length;) { OpenSSLConfCmd cmd = new OpenSSLConfCmd(); cmd.setName(commands[i++]); cmd.setValue(commands[i++]); conf.addCmd(cmd); } Tomcat tomcat = getTomcatInstance(); Connector connector = tomcat.getConnector(); SSLHostConfig[] sslHostConfigs = connector.getProtocolHandler().findSslHostConfigs(); Assert.assertEquals("Wrong SSLHostConfigCount", 1, sslHostConfigs.length); sslHostConfigs[0].setOpenSslConf(conf); tomcat.start(); Assume.assumeFalse("BoringSSL does not support OpenSSLConf", TesterSupport.isOpenSSLVariant(sslImplementationName, OpenSSLStatus.Name.BORINGSSL)); sslHostConfigs = connector.getProtocolHandler().findSslHostConfigs(); Assert.assertEquals("Wrong SSLHostConfigCount", 1, sslHostConfigs.length); return sslHostConfigs[0]; } @Test public void testOpenSSLConfCmdCipher() throws Exception { initOpenSSL(); SSLHostConfig sslHostConfig; if (hasTLS13()) { // Ensure TLSv1.3 ciphers aren't returned sslHostConfig = initOpenSSLConfCmd("CipherString", ENABLED_CIPHER, "CipherSuites", ""); } else { sslHostConfig = initOpenSSLConfCmd("CipherString", ENABLED_CIPHER); } String[] ciphers = sslHostConfig.getEnabledCiphers(); MatcherAssert.assertThat("Wrong HostConfig ciphers", ciphers, CoreMatchers.is(EXPECTED_CIPHERS)); if (OpenSSLImplementation.class.getName().equals(sslImplementationName)) { ciphers = SSLContext.getCiphers(sslHostConfig.getOpenSslContext().longValue()); } else { Class<?> memorySegmentClass = Class.forName("java.lang.foreign.MemorySegment"); Object ssxCtxSegment = memorySegmentClass.getMethod("ofAddress", Long.TYPE) .invoke(null, sslHostConfig.getOpenSslContext()); Method getCiphersMethod = Class.forName("org.apache.tomcat.util.net.openssl.panama.OpenSSLContext") .getDeclaredMethod("getCiphers", memorySegmentClass); getCiphersMethod.setAccessible(true); ciphers = (String[]) getCiphersMethod.invoke(null, ssxCtxSegment); } MatcherAssert.assertThat("Wrong native SSL context ciphers", ciphers, CoreMatchers.is(EXPECTED_CIPHERS)); } @Test public void testOpenSSLConfCmdProtocol() throws Exception { initOpenSSL(); Set<String> disabledProtocols = new HashSet<>(Arrays.asList(DISABLED_PROTOCOLS)); StringBuilder sb = new StringBuilder(); for (String protocol : DISABLED_PROTOCOLS) { sb.append(',').append('-').append(protocol); } if (hasTLS13()) { // Also disable TLSv1.3 for (String protocol : DISABLED_PROTOCOLS_TLS13) { sb.append(',').append('-').append(protocol); disabledProtocols.add(protocol); } } for (String protocol : ENABLED_PROTOCOLS) { sb.append(',').append(protocol); } SSLHostConfig sslHostConfig = initOpenSSLConfCmd("Protocol", sb.substring(1)); String[] protocols = sslHostConfig.getEnabledProtocols(); for (String protocol : protocols) { Assert.assertFalse("Protocol " + protocol + " is not allowed", disabledProtocols.contains(protocol)); } Set<String> enabledProtocols = new HashSet<>(Arrays.asList(protocols)); for (String protocol : ENABLED_PROTOCOLS) { Assert.assertTrue("Protocol " + protocol + " is not enabled", enabledProtocols.contains(protocol)); } } }
Detected license expression
apache-2.0
Detected license expression (SPDX)
Apache-2.0
Percentage of license text
14.42
Copyrights

      
    
Holders

      
    
Authors

      
    
License detections License expression License expression SPDX
apache_2_0-4bde3f57-78aa-4201-96bf-531cba09e7de apache-2.0 Apache-2.0
URL Start line End line
http://www.apache.org/licenses/LICENSE-2.0 9 9