1 /*
   2  * Copyright (c) 2015, 2019, Oracle and/or its affiliates. All rights reserved.
   3  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
   4  *
   5  * This code is free software; you can redistribute it and/or modify it
   6  * under the terms of the GNU General Public License version 2 only, as
   7  * published by the Free Software Foundation.
   8  *
   9  * This code is distributed in the hope that it will be useful, but WITHOUT
  10  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
  11  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
  12  * version 2 for more details (a copy is included in the LICENSE file that
  13  * accompanied this code).
  14  *
  15  * You should have received a copy of the GNU General Public License version
  16  * 2 along with this work; if not, write to the Free Software Foundation,
  17  * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
  18  *
  19  * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
  20  * or visit www.oracle.com if you need additional information or have any
  21  * questions.
  22  */
  23 
  24 // SunJSSE does not support dynamic system properties, no way to re-use
  25 // system properties in samevm/agentvm mode.
  26 
  27 /*
  28  * @test
  29  * @bug 8043758
  30  * @summary Datagram Transport Layer Security (DTLS)
  31  * @modules java.base/sun.security.util
  32  * @library /test/lib
  33  * @build DTLSOverDatagram
  34  * @run main/othervm InvalidCookie
  35  */
  36 
  37 import java.net.DatagramPacket;
  38 import java.net.SocketAddress;
  39 
  40 /**
  41  * Test that if the handshake cookie in client side is incorrect, the handshake
  42  * process can continue as if the client does not use cookie.
  43  */
  44 public class InvalidCookie extends DTLSOverDatagram {
  45     boolean needInvalidCookie = true;
  46 
  47     public static void main(String[] args) throws Exception {
  48         InvalidCookie testCase = new InvalidCookie();
  49         testCase.runTest(testCase);
  50     }
  51 
  52     @Override
  53     DatagramPacket createHandshakePacket(byte[] ba, SocketAddress socketAddr) {
  54         if (needInvalidCookie && (ba.length >= 60) &&
  55                 (ba[0] == (byte)0x16) && (ba[13] == (byte)0x03)) {
  56             // HelloVerifyRequest
  57             needInvalidCookie = false;
  58             System.out.println("invalidate handshake verify cookie");
  59             if (ba[ba.length - 1] == (byte)0xFF) {
  60                 ba[ba.length - 1] = (byte)0xFE;
  61             } else {
  62                 ba[ba.length - 1] = (byte)0xFF;
  63             }
  64         }
  65 
  66         return super.createHandshakePacket(ba, socketAddr);
  67     }
  68 }