aboutsummaryrefslogtreecommitdiffstats
path: root/libraries/spongycastle/core/src/test/java/org/spongycastle/crypto/tls/test/MockDTLSServer.java
diff options
context:
space:
mode:
Diffstat (limited to 'libraries/spongycastle/core/src/test/java/org/spongycastle/crypto/tls/test/MockDTLSServer.java')
-rw-r--r--libraries/spongycastle/core/src/test/java/org/spongycastle/crypto/tls/test/MockDTLSServer.java142
1 files changed, 0 insertions, 142 deletions
diff --git a/libraries/spongycastle/core/src/test/java/org/spongycastle/crypto/tls/test/MockDTLSServer.java b/libraries/spongycastle/core/src/test/java/org/spongycastle/crypto/tls/test/MockDTLSServer.java
deleted file mode 100644
index b8a5de9ea..000000000
--- a/libraries/spongycastle/core/src/test/java/org/spongycastle/crypto/tls/test/MockDTLSServer.java
+++ /dev/null
@@ -1,142 +0,0 @@
-package org.spongycastle.crypto.tls.test;
-
-import java.io.IOException;
-import java.io.PrintStream;
-import java.util.Vector;
-
-import org.spongycastle.asn1.x509.Certificate;
-import org.spongycastle.crypto.tls.AlertLevel;
-import org.spongycastle.crypto.tls.CertificateRequest;
-import org.spongycastle.crypto.tls.CipherSuite;
-import org.spongycastle.crypto.tls.ClientCertificateType;
-import org.spongycastle.crypto.tls.DefaultTlsServer;
-import org.spongycastle.crypto.tls.HashAlgorithm;
-import org.spongycastle.crypto.tls.ProtocolVersion;
-import org.spongycastle.crypto.tls.SignatureAlgorithm;
-import org.spongycastle.crypto.tls.SignatureAndHashAlgorithm;
-import org.spongycastle.crypto.tls.TlsEncryptionCredentials;
-import org.spongycastle.crypto.tls.TlsSignerCredentials;
-import org.spongycastle.crypto.tls.TlsUtils;
-
-public class MockDTLSServer
- extends DefaultTlsServer
-{
- public void notifyAlertRaised(short alertLevel, short alertDescription, String message, Exception cause)
- {
- PrintStream out = (alertLevel == AlertLevel.fatal) ? System.err : System.out;
- out.println("DTLS server raised alert (AlertLevel." + alertLevel + ", AlertDescription." + alertDescription
- + ")");
- if (message != null)
- {
- out.println(message);
- }
- if (cause != null)
- {
- cause.printStackTrace(out);
- }
- }
-
- public void notifyAlertReceived(short alertLevel, short alertDescription)
- {
- PrintStream out = (alertLevel == AlertLevel.fatal) ? System.err : System.out;
- out.println("DTLS server received alert (AlertLevel." + alertLevel + ", AlertDescription." + alertDescription
- + ")");
- }
-
- protected int[] getCipherSuites()
- {
- return new int[] { CipherSuite.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
- CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, CipherSuite.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,
- CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, CipherSuite.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
- CipherSuite.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, CipherSuite.TLS_RSA_WITH_AES_256_GCM_SHA384,
- CipherSuite.TLS_RSA_WITH_AES_128_GCM_SHA256, CipherSuite.TLS_RSA_WITH_AES_256_CBC_SHA256,
- CipherSuite.TLS_RSA_WITH_AES_128_CBC_SHA256, CipherSuite.TLS_RSA_WITH_AES_256_CBC_SHA,
- CipherSuite.TLS_RSA_WITH_AES_128_CBC_SHA };
- }
-
- public CertificateRequest getCertificateRequest()
- {
- Vector serverSigAlgs = null;
-
- if (TlsUtils.isSignatureAlgorithmsExtensionAllowed(serverVersion))
- {
- short[] hashAlgorithms = new short[]{ HashAlgorithm.sha512, HashAlgorithm.sha384, HashAlgorithm.sha256,
- HashAlgorithm.sha224, HashAlgorithm.sha1 };
- short[] signatureAlgorithms = new short[]{ SignatureAlgorithm.rsa };
-
- serverSigAlgs = new Vector();
- for (int i = 0; i < hashAlgorithms.length; ++i)
- {
- for (int j = 0; j < signatureAlgorithms.length; ++j)
- {
- serverSigAlgs.addElement(new SignatureAndHashAlgorithm(hashAlgorithms[i],
- signatureAlgorithms[j]));
- }
- }
- }
-
- return new CertificateRequest(new short[]{ ClientCertificateType.rsa_sign }, serverSigAlgs, null);
- }
-
- public void notifyClientCertificate(org.spongycastle.crypto.tls.Certificate clientCertificate)
- throws IOException
- {
- Certificate[] chain = clientCertificate.getCertificateList();
- System.out.println("Received client certificate chain of length " + chain.length);
- for (int i = 0; i != chain.length; i++)
- {
- Certificate entry = chain[i];
- // TODO Create fingerprint based on certificate signature algorithm digest
- System.out.println(" fingerprint:SHA-256 " + TlsTestUtils.fingerprint(entry) + " (" + entry.getSubject()
- + ")");
- }
- }
-
- protected ProtocolVersion getMaximumVersion()
- {
- return ProtocolVersion.DTLSv12;
- }
-
- protected ProtocolVersion getMinimumVersion()
- {
- return ProtocolVersion.DTLSv10;
- }
-
- protected TlsEncryptionCredentials getRSAEncryptionCredentials()
- throws IOException
- {
- return TlsTestUtils.loadEncryptionCredentials(context, new String[]{"x509-server.pem", "x509-ca.pem"},
- "x509-server-key.pem");
- }
-
- protected TlsSignerCredentials getRSASignerCredentials()
- throws IOException
- {
- /*
- * TODO Note that this code fails to provide default value for the client supported
- * algorithms if it wasn't sent.
- */
- SignatureAndHashAlgorithm signatureAndHashAlgorithm = null;
- Vector sigAlgs = supportedSignatureAlgorithms;
- if (sigAlgs != null)
- {
- for (int i = 0; i < sigAlgs.size(); ++i)
- {
- SignatureAndHashAlgorithm sigAlg = (SignatureAndHashAlgorithm)
- sigAlgs.elementAt(i);
- if (sigAlg.getSignature() == SignatureAlgorithm.rsa)
- {
- signatureAndHashAlgorithm = sigAlg;
- break;
- }
- }
-
- if (signatureAndHashAlgorithm == null)
- {
- return null;
- }
- }
- return TlsTestUtils.loadSignerCredentials(context, new String[]{"x509-server.pem", "x509-ca.pem"},
- "x509-server-key.pem", signatureAndHashAlgorithm);
- }
-}