1 /*
   2  * Copyright (c) 2013, Oracle and/or its affiliates. All rights reserved.
   3  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
   4  *
   5  * This code is free software; you can redistribute it and/or modify it
   6  * under the terms of the GNU General Public License version 2 only, as
   7  * published by the Free Software Foundation.
   8  *
   9  * This code is distributed in the hope that it will be useful, but WITHOUT
  10  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
  11  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
  12  * version 2 for more details (a copy is included in the LICENSE file that
  13  * accompanied this code).
  14  *
  15  * You should have received a copy of the GNU General Public License version
  16  * 2 along with this work; if not, write to the Free Software Foundation,
  17  * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
  18  *
  19  * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
  20  * or visit www.oracle.com if you need additional information or have any
  21  * questions.
  22 */
  23 
  24 /*
  25  * @test
  26  * @bug 8001326
  27  * @run main/othervm ReplayCacheExpunge 16
  28  * @run main/othervm/fail ReplayCacheExpunge 15
  29  * @summary when number of expired entries minus number of good entries
  30  * is more than 30, expunge occurs, and expired entries are forgotten.
  31 */
  32 
  33 import java.util.Random;
  34 import sun.security.krb5.internal.KerberosTime;
  35 import sun.security.krb5.internal.ReplayCache;
  36 import sun.security.krb5.internal.rcache.AuthTimeWithHash;
  37 
  38 public class ReplayCacheExpunge {
  39     static final String client = "dummy@REALM";
  40     static final String server = "server/localhost@REALM";
  41     static final Random rand = new Random();
  42 
  43     public static void main(String[] args) throws Exception {
  44         int count = Integer.parseInt(args[0]);
  45         ReplayCache cache = ReplayCache.getInstance("dfl:./");
  46         AuthTimeWithHash a1 =
  47                 new AuthTimeWithHash(client, server, time(-400), 0, hash("1"));
  48         AuthTimeWithHash a2 =
  49                 new AuthTimeWithHash(client, server, time(0), 0, hash("4"));
  50         KerberosTime now = new KerberosTime(time(0)*1000L);
  51         KerberosTime then = new KerberosTime(time(-300)*1000L);
  52 
  53         // Once upon a time, we added a lot of events
  54         for (int i=0; i<count; i++) {
  55             a1 = new AuthTimeWithHash(client, server, time(-400), 0, hash(""));
  56             cache.checkAndStore(then, a1);
  57         }
  58 
  59         // Now, we add a new one. If some conditions hold, the old ones
  60         // will be expunged.
  61         cache.checkAndStore(now, a2);
  62 
  63         // and adding an old one will not trigger any error
  64         cache.checkAndStore(now, a1);
  65     }
  66 
  67     private static String hash(String s) {
  68         char[] data = new char[16];
  69         for (int i=0; i<16; i++) {
  70             if (i < s.length()) data[i] = s.charAt(i);
  71             else data[i] = (char)('0' + rand.nextInt(10));
  72         }
  73         return new String(data);
  74     }
  75 
  76     private static int time(int x) {
  77         return (int)(System.currentTimeMillis()/1000) + x;
  78     }
  79 }