File: DisableSignatureSchemePerScopeTLS13.java

package info (click to toggle)
openjdk-17 17.0.17~8ea-1
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 764,864 kB
  • sloc: java: 5,319,013; xml: 1,291,711; cpp: 1,202,338; ansic: 428,731; asm: 404,978; objc: 20,861; sh: 14,753; javascript: 10,743; python: 6,402; makefile: 2,405; perl: 357; awk: 351; sed: 172; jsp: 24; csh: 3
file content (103 lines) | stat: -rw-r--r-- 3,861 bytes parent folder | download | duplicates (5)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
/*
 * Copyright (c) 2025, Oracle and/or its affiliates. All rights reserved.
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
 *
 * This code is free software; you can redistribute it and/or modify it
 * under the terms of the GNU General Public License version 2 only, as
 * published by the Free Software Foundation.
 *
 * This code is distributed in the hope that it will be useful, but WITHOUT
 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
 * version 2 for more details (a copy is included in the LICENSE file that
 * accompanied this code).
 *
 * You should have received a copy of the GNU General Public License version
 * 2 along with this work; if not, write to the Free Software Foundation,
 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
 *
 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
 * or visit www.oracle.com if you need additional information or have any
 * questions.
 */

/*
 * @test
 * @bug 8349583
 * @summary Add mechanism to disable signature schemes based on their TLS scope.
 *          This test only covers TLS 1.3.
 * @library /javax/net/ssl/templates
 *          /test/lib
 * @run main/othervm DisableSignatureSchemePerScopeTLS13
 */


import static jdk.test.lib.Asserts.assertFalse;
import static jdk.test.lib.Asserts.assertTrue;

import java.security.Security;
import java.util.List;

public class DisableSignatureSchemePerScopeTLS13
        extends DisableSignatureSchemePerScopeTLS12 {

    // Signature schemes not supported in TLSv1.3 only for the handshake.
    // This is regardless of jdk.tls.disabledAlgorithms configuration.
    List<String> NOT_SUPPORTED_FOR_HANDSHAKE = List.of(
            "rsa_pkcs1_sha1",
            "rsa_pkcs1_sha256",
            "rsa_pkcs1_sha384",
            "rsa_pkcs1_sha512"
    );

    protected DisableSignatureSchemePerScopeTLS13() throws Exception {
        super();
    }

    public static void main(String[] args) throws Exception {
        Security.setProperty(
                "jdk.tls.disabledAlgorithms", DISABLED_CONSTRAINTS);
        new DisableSignatureSchemePerScopeTLS13().run();
    }

    @Override
    protected String getProtocol() {
        return "TLSv1.3";
    }

    @Override
    protected void checkClientHello() throws Exception {
        super.checkClientHello();

        // Get signature_algorithms extension signature schemes.
        List<String> sigAlgsSS = getSigSchemesCliHello(
                extractHandshakeMsg(cTOs, TLS_HS_CLI_HELLO),
                SIG_ALGS_EXT);

        // Should not be present in signature_algorithms extension.
        NOT_SUPPORTED_FOR_HANDSHAKE.forEach(ss ->
                assertFalse(sigAlgsSS.contains(ss),
                        "Signature Scheme " + ss
                        + " present in ClientHello's signature_algorithms extension"));

        // Get signature_algorithms_cert extension signature schemes.
        List<String> sigAlgsCertSS = getSigSchemesCliHello(
                extractHandshakeMsg(cTOs, TLS_HS_CLI_HELLO),
                SIG_ALGS_CERT_EXT);

        // Should be present in signature_algorithms_cert extension.
        NOT_SUPPORTED_FOR_HANDSHAKE.forEach(ss ->
                assertTrue(sigAlgsCertSS.contains(ss),
                        "Signature Scheme " + ss
                        + " isn't present in ClientHello's"
                        + " signature_algorithms extension"));
    }

    // TLSv1.3 sends CertificateRequest signature schemes in
    // signature_algorithms and signature_algorithms_cert extensions. Same as
    // ClientHello, but they are encrypted. So we skip CertificateRequest
    // signature schemes verification for TLSv1.3.
    @Override
    protected void checkCertificateRequest() {
    }
}