jdk/test/javax/net/ssl/DTLS/InvalidCookie.java
changeset 30904 ec0224270f90
child 35315 67dcc46f8241
equal deleted inserted replaced
30903:0c7d705209c6 30904:ec0224270f90
       
     1 /*
       
     2  * Copyright (c) 2015, Oracle and/or its affiliates. All rights reserved.
       
     3  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
       
     4  *
       
     5  * This code is free software; you can redistribute it and/or modify it
       
     6  * under the terms of the GNU General Public License version 2 only, as
       
     7  * published by the Free Software Foundation.
       
     8  *
       
     9  * This code is distributed in the hope that it will be useful, but WITHOUT
       
    10  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
       
    11  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
       
    12  * version 2 for more details (a copy is included in the LICENSE file that
       
    13  * accompanied this code).
       
    14  *
       
    15  * You should have received a copy of the GNU General Public License version
       
    16  * 2 along with this work; if not, write to the Free Software Foundation,
       
    17  * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
       
    18  *
       
    19  * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
       
    20  * or visit www.oracle.com if you need additional information or have any
       
    21  * questions.
       
    22  */
       
    23 
       
    24 // SunJSSE does not support dynamic system properties, no way to re-use
       
    25 // system properties in samevm/agentvm mode.
       
    26 
       
    27 /*
       
    28  * @test
       
    29  * @bug 8043758
       
    30  * @summary Datagram Transport Layer Security (DTLS)
       
    31  * @compile DTLSOverDatagram.java
       
    32  * @run main/othervm InvalidCookie
       
    33  */
       
    34 
       
    35 import java.net.DatagramPacket;
       
    36 import java.net.SocketAddress;
       
    37 
       
    38 /**
       
    39  * Test that if the handshake cookie in client side is incorrect, the handshake
       
    40  * process can continue as if the client does not use cookie.
       
    41  */
       
    42 public class InvalidCookie extends DTLSOverDatagram {
       
    43     boolean needInvalidCookie = true;
       
    44 
       
    45     public static void main(String[] args) throws Exception {
       
    46         InvalidCookie testCase = new InvalidCookie();
       
    47         testCase.runTest(testCase);
       
    48     }
       
    49 
       
    50     @Override
       
    51     DatagramPacket createHandshakePacket(byte[] ba, SocketAddress socketAddr) {
       
    52         if (needInvalidCookie && (ba.length >= 60) &&
       
    53                 (ba[0] == (byte)0x16) && (ba[13] == (byte)0x03)) {
       
    54             // HelloVerifyRequest
       
    55             needInvalidCookie = false;
       
    56             System.out.println("invalidate handshake verify cookie");
       
    57             if (ba[ba.length - 1] == (byte)0xFF) {
       
    58                 ba[ba.length - 1] = (byte)0xFE;
       
    59             } else {
       
    60                 ba[ba.length - 1] = (byte)0xFF;
       
    61             }
       
    62         }
       
    63 
       
    64         return super.createHandshakePacket(ba, socketAddr);
       
    65     }
       
    66 }