Path: blob/master/test/jdk/javax/net/ssl/DTLS/InvalidCookie.java
41152 views
/*1* Copyright (c) 2015, 2019, Oracle and/or its affiliates. All rights reserved.2* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.3*4* This code is free software; you can redistribute it and/or modify it5* under the terms of the GNU General Public License version 2 only, as6* published by the Free Software Foundation.7*8* This code is distributed in the hope that it will be useful, but WITHOUT9* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or10* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License11* version 2 for more details (a copy is included in the LICENSE file that12* accompanied this code).13*14* You should have received a copy of the GNU General Public License version15* 2 along with this work; if not, write to the Free Software Foundation,16* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.17*18* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA19* or visit www.oracle.com if you need additional information or have any20* questions.21*/2223// SunJSSE does not support dynamic system properties, no way to re-use24// system properties in samevm/agentvm mode.2526/*27* @test28* @bug 804375829* @summary Datagram Transport Layer Security (DTLS)30* @modules java.base/sun.security.util31* @library /test/lib32* @build DTLSOverDatagram33* @run main/othervm InvalidCookie34*/3536import java.net.DatagramPacket;37import java.net.SocketAddress;3839/**40* Test that if the handshake cookie in client side is incorrect, the handshake41* process can continue as if the client does not use cookie.42*/43public class InvalidCookie extends DTLSOverDatagram {44boolean needInvalidCookie = true;4546public static void main(String[] args) throws Exception {47InvalidCookie testCase = new InvalidCookie();48testCase.runTest(testCase);49}5051@Override52DatagramPacket createHandshakePacket(byte[] ba, SocketAddress socketAddr) {53if (needInvalidCookie && (ba.length >= 60) &&54(ba[0] == (byte)0x16) && (ba[13] == (byte)0x03)) {55// HelloVerifyRequest56needInvalidCookie = false;57System.out.println("invalidate handshake verify cookie");58if (ba[ba.length - 1] == (byte)0xFF) {59ba[ba.length - 1] = (byte)0xFE;60} else {61ba[ba.length - 1] = (byte)0xFF;62}63}6465return super.createHandshakePacket(ba, socketAddr);66}67}686970