| /* |
| * Copyright (c) 1997, 2001, Oracle and/or its affiliates. All rights reserved. |
| * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. |
| * |
| * This code is free software; you can redistribute it and/or modify it |
| * under the terms of the GNU General Public License version 2 only, as |
| * published by the Free Software Foundation. |
| * |
| * This code is distributed in the hope that it will be useful, but WITHOUT |
| * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or |
| * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License |
| * version 2 for more details (a copy is included in the LICENSE file that |
| * accompanied this code). |
| * |
| * You should have received a copy of the GNU General Public License version |
| * 2 along with this work; if not, write to the Free Software Foundation, |
| * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. |
| * |
| * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA |
| * or visit www.oracle.com if you need additional information or have any |
| * questions. |
| */ |
| |
| import java.io.*; |
| import java.net.Socket; |
| import java.net.SocketException; |
| |
| import javax.net.ssl.*; |
| |
| // |
| // Base connection handler class -- server and client roles are almost |
| // identical, this class holds everything except what's different. |
| // |
| abstract class Handler extends TestThread |
| implements HandshakeCompletedListener |
| { |
| protected SSLSocket s; |
| protected boolean roleIsClient; |
| |
| // generates the stream of test data |
| private Traffic traffic; |
| |
| // for optional use in renegotiation |
| private String renegotiateSuites []; |
| |
| // Test flag: did we pass this test? |
| private boolean pass = false; |
| |
| |
| Handler (String name) |
| { |
| super (name); |
| } |
| |
| |
| public void setRenegotiateSuites (String suites []) |
| { renegotiateSuites = suites; } |
| |
| |
| abstract public void setReverseRole (boolean flag); |
| |
| |
| // XXX override setVerbosity() and pass that to |
| // the traffic generation module |
| |
| |
| public void run () |
| { |
| try { |
| traffic = new Traffic (s.getInputStream (), s.getOutputStream ()); |
| } catch (IOException e) { |
| e.printStackTrace (); |
| return; |
| } |
| |
| if (prng != null) |
| traffic.setPRNG (prng); |
| |
| if (listenHandshake || doRenegotiate) |
| s.addHandshakeCompletedListener (this); |
| |
| try { |
| if (initiateHandshake) |
| s.startHandshake (); |
| |
| // XXX if use client auth ... |
| |
| doTraffic (0); |
| |
| if (doRenegotiate) |
| s.startHandshake (); |
| |
| doTraffic (iterations); |
| |
| // XXX abortive shutdown should be a test option |
| |
| s.close (); |
| |
| // XXX want a close-this-session-down option |
| |
| } catch (IOException e) { |
| String message = e.getMessage (); |
| |
| synchronized (out) { |
| if (message.equalsIgnoreCase ("no cipher suites in common")) { |
| out.println ("%% " + getName () + " " + message); |
| |
| } else { |
| out.println ("%% " + getName ()); |
| e.printStackTrace (out); |
| } |
| } |
| |
| } catch (Throwable t) { |
| synchronized (out) { |
| out.println ("%% " + getName ()); |
| t.printStackTrace (out); |
| } |
| } |
| } |
| |
| |
| public boolean passed () |
| { return pass; } |
| |
| |
| private void doTraffic (int n) |
| throws IOException |
| { |
| try { |
| if (roleIsClient) |
| traffic.initiate (n); |
| else |
| traffic.respond (n); |
| |
| pass = true; |
| |
| } catch (SSLException e) { |
| String m = e.getMessage (); |
| |
| // |
| // As of this writing, self-signed certs won't be accepted |
| // by the simple trust decider. That rules out testing all |
| // of the SSL_DHE_DSS_* flavors for now, and for testers |
| // that don't have a Verisign cert, it also rules out testing |
| // SSL_RSA_* flavors. |
| // |
| // XXX need two things to fix this "right": (a) ability to |
| // let the 'simple trust decider import arbitrary certs, as |
| // exported by a keystore; (b) specialized exceptions, since |
| // comparing message strings is bogus. |
| // |
| if (m.equalsIgnoreCase ("untrusted server cert chain") |
| || m.equalsIgnoreCase ( |
| "Received fatal alert: certificate_unknown")) { |
| System.out.println ("%% " + Thread.currentThread ().getName () |
| + ", " + m); |
| s.close (); |
| } else |
| throw e; |
| |
| } catch (SocketException e) { |
| String m = e.getMessage (); |
| |
| if (m.equalsIgnoreCase ("Socket closed")) |
| System.out.println ("%% " + Thread.currentThread ().getName () |
| + ", " + m); |
| else |
| throw e; |
| |
| } catch (EOFException e) { |
| // ignore |
| } |
| } |
| |
| |
| public void handshakeCompleted (HandshakeCompletedEvent event) |
| { |
| if (verbosity >= 1) { |
| Socket sock = (Socket) event.getSource (); |
| |
| out.println ("%% " + getName () |
| + ", port " + sock.getLocalPort () |
| + " to " + sock.getInetAddress ().getHostName () |
| + ":" + sock.getPort () |
| + ", " + event.getCipherSuite ()); |
| |
| // if more verbosity, give cert chain |
| } |
| } |
| } |