Skip to content

Commit b03ba9e

Browse files
author
Sibabrata Sahoo
committedNov 29, 2019
8234723: javax/net/ssl/TLS tests support TLSv1.3
Missing TLSv1.3 test cases Reviewed-by: xuelei
1 parent ec16834 commit b03ba9e

4 files changed

+68
-27
lines changed
 

‎test/jdk/javax/net/ssl/TLS/TLSClientPropertyTest.java

+13-4
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright (c) 2014, 2016, Oracle and/or its affiliates. All rights reserved.
2+
* Copyright (c) 2014, 2019, Oracle and/or its affiliates. All rights reserved.
33
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
44
*
55
* This code is free software; you can redistribute it and/or modify it
@@ -23,7 +23,7 @@
2323

2424
/*
2525
* @test
26-
* @bug 8049432 8069038
26+
* @bug 8049432 8069038 8234723
2727
* @summary New tests for TLS property jdk.tls.client.protocols
2828
* @summary javax/net/ssl/TLS/TLSClientPropertyTest.java needs to be
2929
* updated for JDK-8061210
@@ -40,6 +40,8 @@
4040
* @run main/othervm TLSClientPropertyTest TLSv1
4141
* @run main/othervm TLSClientPropertyTest TLSv11
4242
* @run main/othervm TLSClientPropertyTest TLSv12
43+
* @run main/othervm TLSClientPropertyTest TLSv13
44+
* @run main/othervm TLSClientPropertyTest TLS
4345
* @run main/othervm TLSClientPropertyTest WrongProperty
4446
*/
4547

@@ -57,7 +59,7 @@
5759
*/
5860
public class TLSClientPropertyTest {
5961
private final String[] expectedSupportedProtos = new String[] {
60-
"SSLv2Hello", "SSLv3", "TLSv1", "TLSv1.1", "TLSv1.2"
62+
"SSLv2Hello", "SSLv3", "TLSv1", "TLSv1.1", "TLSv1.2", "TLSv1.3"
6163
};
6264

6365
public static void main(String[] args) throws Exception {
@@ -77,7 +79,7 @@ public static void main(String[] args) throws Exception {
7779
}
7880
contextProtocol = null;
7981
expectedDefaultProtos = new String[] {
80-
"TLSv1", "TLSv1.1", "TLSv1.2"
82+
"TLSv1", "TLSv1.1", "TLSv1.2", "TLSv1.3"
8183
};
8284
break;
8385
case "SSLv3":
@@ -103,6 +105,13 @@ public static void main(String[] args) throws Exception {
103105
"TLSv1", "TLSv1.1", "TLSv1.2"
104106
};
105107
break;
108+
case "TLSv13":
109+
case "TLS":
110+
contextProtocol = "TLSv1.3";
111+
expectedDefaultProtos = new String[] {
112+
"TLSv1", "TLSv1.1", "TLSv1.2", "TLSv1.3"
113+
};
114+
break;
106115
case "WrongProperty":
107116
expectedDefaultProtos = new String[] {};
108117
contextProtocol = "TLSV";

‎test/jdk/javax/net/ssl/TLS/TestJSSEClientDefaultProtocol.java

+18-6
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright (c) 2016, Oracle and/or its affiliates. All rights reserved.
2+
* Copyright (c) 2016, 2019, Oracle and/or its affiliates. All rights reserved.
33
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
44
*
55
* This code is free software; you can redistribute it and/or modify it
@@ -23,7 +23,7 @@
2323

2424
/*
2525
* @test
26-
* @bug 8049429
26+
* @bug 8049429 8234723
2727
* @modules java.management
2828
* jdk.crypto.ec/sun.security.ec
2929
* @summary Test that all cipher suites work in all versions and all client
@@ -33,23 +33,35 @@
3333
* @run main/othervm
3434
* -DSERVER_PROTOCOL=SSLv2Hello,SSLv3,TLSv1
3535
* -DCLIENT_PROTOCOL=DEFAULT
36-
* -DCIPHER=SSL_RSA_WITH_RC4_128_MD5
36+
* -DCIPHER=TLS_RSA_WITH_AES_128_CBC_SHA
3737
* TestJSSE
3838
* @run main/othervm
3939
* -DSERVER_PROTOCOL=SSLv2Hello,SSLv3,TLSv1,TLSv1.1,TLSv1.2
4040
* -DCLIENT_PROTOCOL=DEFAULT
41-
* -DCIPHER=SSL_RSA_WITH_RC4_128_MD5
41+
* -DCIPHER=TLS_RSA_WITH_AES_128_GCM_SHA256
4242
* TestJSSE
4343
* @run main/othervm
4444
* -DSERVER_PROTOCOL=SSLv2Hello,SSLv3,TLSv1,TLSv1.1,TLSv1.2
4545
* -DCLIENT_PROTOCOL=DEFAULT
4646
* -Djdk.tls.client.protocols=TLSv1
47-
* -DCIPHER=SSL_RSA_WITH_RC4_128_MD5
47+
* -DCIPHER=TLS_RSA_WITH_AES_128_CBC_SHA
4848
* TestJSSE
4949
* @run main/othervm
5050
* -DSERVER_PROTOCOL=SSLv2Hello,SSLv3,TLSv1
5151
* -DCLIENT_PROTOCOL=DEFAULT
5252
* -Djdk.tls.client.protocols=TLSv1.2
53-
* -DCIPHER=SSL_RSA_WITH_RC4_128_MD5
53+
* -DCIPHER=TLS_RSA_WITH_AES_128_GCM_SHA256
54+
* TestJSSE javax.net.ssl.SSLHandshakeException
55+
* @run main/othervm
56+
* -DSERVER_PROTOCOL=SSLv2Hello,SSLv3,TLSv1,TLSv1.1,TLSv1.2,TLSv1.3
57+
* -DCLIENT_PROTOCOL=DEFAULT
58+
* -Djdk.tls.client.protocols=TLSv1.3
59+
* -DCIPHER=TLS_AES_256_GCM_SHA384
60+
* TestJSSE
61+
* @run main/othervm
62+
* -DSERVER_PROTOCOL=SSLv2Hello,SSLv3,TLSv1
63+
* -DCLIENT_PROTOCOL=DEFAULT
64+
* -Djdk.tls.client.protocols=TLSv1.3
65+
* -DCIPHER=TLS_AES_256_GCM_SHA384
5466
* TestJSSE javax.net.ssl.SSLHandshakeException
5567
*/

‎test/jdk/javax/net/ssl/TLS/TestJSSEClientProtocol.java

+22-12
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright (c) 2016, Oracle and/or its affiliates. All rights reserved.
2+
* Copyright (c) 2016, 2019, Oracle and/or its affiliates. All rights reserved.
33
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
44
*
55
* This code is free software; you can redistribute it and/or modify it
@@ -23,46 +23,56 @@
2323

2424
/*
2525
* @test
26-
* @bug 8049429 8172273
26+
* @bug 8049429 8172273 8234723
2727
* @modules java.management
2828
* jdk.crypto.ec/sun.security.ec
2929
* @summary Test that all cipher suites work in all versions and all client
3030
* authentication types. The way this is setup the server is stateless
3131
* and all checking is done on the client side.
3232
* @compile CipherTestUtils.java JSSEClient.java JSSEServer.java
3333
* @run main/othervm
34-
* -DSERVER_PROTOCOL=SSLv2Hello,SSLv3,TLSv1,TLSv1.1,TLSv1.2
35-
* -DCLIENT_PROTOCOL=SSLv2Hello,SSLv3,TLSv1,TLSv1.1,TLSv1.2
34+
* -DSERVER_PROTOCOL=SSLv2Hello,SSLv3,TLSv1,TLSv1.1,TLSv1.2,TLSv1.3
35+
* -DCLIENT_PROTOCOL=SSLv2Hello,SSLv3,TLSv1,TLSv1.1,TLSv1.2,TLSv1.3
3636
* -DCIPHER=SSL_RSA_WITH_RC4_128_MD5
3737
* TestJSSE
3838
* @run main/othervm
39-
* -DSERVER_PROTOCOL=SSLv2Hello,SSLv3,TLSv1,TLSv1.1,TLSv1.2
40-
* -DCLIENT_PROTOCOL=SSLv2Hello,SSLv3,TLSv1,TLSv1.1,TLSv1.2
39+
* -DSERVER_PROTOCOL=SSLv2Hello,SSLv3,TLSv1,TLSv1.1,TLSv1.2,TLSv1.3
40+
* -DCLIENT_PROTOCOL=SSLv2Hello,SSLv3,TLSv1,TLSv1.1,TLSv1.2,TLSv1.3
4141
* -DCIPHER=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
4242
* TestJSSE
4343
* @run main/othervm
44-
* -DSERVER_PROTOCOL=SSLv2Hello,SSLv3,TLSv1,TLSv1.1,TLSv1.2
45-
* -DCLIENT_PROTOCOL=SSLv2Hello,SSLv3,TLSv1,TLSv1.1,TLSv1.2
44+
* -DSERVER_PROTOCOL=SSLv2Hello,SSLv3,TLSv1,TLSv1.1,TLSv1.2,TLSv1.3
45+
* -DCLIENT_PROTOCOL=SSLv2Hello,SSLv3,TLSv1,TLSv1.1,TLSv1.2,TLSv1.3
4646
* -DCIPHER=TLS_DHE_RSA_WITH_AES_128_CBC_SHA
4747
* TestJSSE
4848
* @run main/othervm
49+
* -DSERVER_PROTOCOL=SSLv2Hello,SSLv3,TLSv1,TLSv1.1,TLSv1.2,TLSv1.3
50+
* -DCLIENT_PROTOCOL=SSLv2Hello,SSLv3,TLSv1,TLSv1.1,TLSv1.2,TLSv1.3
51+
* -DCIPHER=TLS_AES_256_GCM_SHA384
52+
* TestJSSE
53+
* @run main/othervm
4954
* -DSERVER_PROTOCOL=SSLv3
5055
* -DCLIENT_PROTOCOL=SSLv3
5156
* -DCIPHER=SSL_RSA_WITH_RC4_128_MD5
5257
* TestJSSE
5358
* @run main/othervm
5459
* -DSERVER_PROTOCOL=SSLv3,TLSv1
5560
* -DCLIENT_PROTOCOL=TLSv1
56-
* -DCIPHER=SSL_RSA_WITH_RC4_128_MD5
61+
* -DCIPHER=TLS_RSA_WITH_AES_128_CBC_SHA
5762
* TestJSSE
5863
* @run main/othervm
5964
* -DSERVER_PROTOCOL=SSLv3,TLSv1,TLSv1.1
6065
* -DCLIENT_PROTOCOL=TLSv1.1
61-
* -DCIPHER=SSL_RSA_WITH_RC4_128_MD5
66+
* -DCIPHER=TLS_RSA_WITH_AES_256_CBC_SHA
6267
* TestJSSE
6368
* @run main/othervm
64-
* -DSERVER_PROTOCOL=SSLv3,TLSv1,TLSv1.1,TLSv1.2
69+
* -DSERVER_PROTOCOL=SSLv3,TLSv1,TLSv1.1,TLSv1.2,TLSv1.3
6570
* -DCLIENT_PROTOCOL=TLSv1.2
66-
* -DCIPHER=SSL_RSA_WITH_RC4_128_MD5
71+
* -DCIPHER=TLS_RSA_WITH_AES_128_GCM_SHA256
72+
* TestJSSE
73+
* @run main/othervm
74+
* -DSERVER_PROTOCOL=SSLv3,TLSv1,TLSv1.1,TLSv1.2,TLSv1.3
75+
* -DCLIENT_PROTOCOL=TLSv1.3
76+
* -DCIPHER=TLS_AES_256_GCM_SHA384
6777
* TestJSSE
6878
*/

‎test/jdk/javax/net/ssl/TLS/TestJSSEServerProtocol.java

+15-5
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright (c) 2016, Oracle and/or its affiliates. All rights reserved.
2+
* Copyright (c) 2016, 2019, Oracle and/or its affiliates. All rights reserved.
33
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
44
*
55
* This code is free software; you can redistribute it and/or modify it
@@ -23,7 +23,7 @@
2323

2424
/*
2525
* @test
26-
* @bug 8049429
26+
* @bug 8049429 8234723
2727
* @modules java.management
2828
* jdk.crypto.ec/sun.security.ec
2929
* @summary Test that all cipher suites work in all versions and all client
@@ -38,16 +38,26 @@
3838
* @run main/othervm
3939
* -DSERVER_PROTOCOL=TLSv1
4040
* -DCLIENT_PROTOCOL=SSLv3,TLSv1,TLSv1.1,TLSv1.2
41-
* -DCIPHER=SSL_RSA_WITH_RC4_128_MD5
41+
* -DCIPHER=TLS_RSA_WITH_AES_128_CBC_SHA
4242
* TestJSSE
4343
* @run main/othervm
4444
* -DSERVER_PROTOCOL=TLSv1.1
4545
* -DCLIENT_PROTOCOL=SSLv3,TLSv1,TLSv1.1,TLSv1.2
46-
* -DCIPHER=SSL_RSA_WITH_RC4_128_MD5
46+
* -DCIPHER=TLS_RSA_WITH_AES_256_CBC_SHA
4747
* TestJSSE
4848
* @run main/othervm
4949
* -DSERVER_PROTOCOL=TLSv1.2
5050
* -DCLIENT_PROTOCOL=SSLv3,TLSv1,TLSv1.1,TLSv1.2
51-
* -DCIPHER=SSL_RSA_WITH_RC4_128_MD5
51+
* -DCIPHER=TLS_RSA_WITH_AES_128_GCM_SHA256
52+
* TestJSSE
53+
* @run main/othervm
54+
* -DSERVER_PROTOCOL=TLSv1.3
55+
* -DCLIENT_PROTOCOL=SSLv3,TLSv1,TLSv1.1,TLSv1.2,TLSv1.3
56+
* -DCIPHER=TLS_AES_256_GCM_SHA384
5257
* TestJSSE
58+
* @run main/othervm
59+
* -DSERVER_PROTOCOL=TLSv1.2
60+
* -DCLIENT_PROTOCOL=TLSv1.3
61+
* -DCIPHER=TLS_AES_256_GCM_SHA384
62+
* TestJSSE javax.net.ssl.SSLHandshakeException
5363
*/

0 commit comments

Comments
 (0)
Please sign in to comment.