|
1 | 1 | /** |
2 | 2 | * TLS-Attacker - A Modular Penetration Testing Framework for TLS |
3 | | - * |
| 3 | + * <p> |
4 | 4 | * Copyright 2014-2017 Ruhr University Bochum / Hackmanit GmbH |
5 | | - * |
| 5 | + * <p> |
6 | 6 | * Licensed under Apache License 2.0 |
7 | 7 | * http://www.apache.org/licenses/LICENSE-2.0 |
8 | 8 | */ |
9 | 9 | package de.rub.nds.tlsattacker.core.protocol.handler; |
10 | 10 |
|
11 | 11 | import de.rub.nds.tlsattacker.core.constants.CipherSuite; |
12 | 12 | import de.rub.nds.tlsattacker.core.constants.ProtocolVersion; |
| 13 | +import de.rub.nds.tlsattacker.core.constants.ExtensionType; |
13 | 14 | import de.rub.nds.tlsattacker.core.protocol.message.HelloRetryRequestMessage; |
14 | 15 | import de.rub.nds.tlsattacker.core.protocol.message.extension.ExtensionMessage; |
15 | 16 | import de.rub.nds.tlsattacker.core.protocol.message.extension.EncryptThenMacExtensionMessage; |
16 | 17 | import de.rub.nds.tlsattacker.core.protocol.parser.HelloRetryRequestParser; |
17 | 18 | import de.rub.nds.tlsattacker.core.protocol.preparator.HelloRetryRequestPreparator; |
18 | 19 | import de.rub.nds.tlsattacker.core.protocol.serializer.HelloRetryRequestSerializer; |
19 | 20 | import de.rub.nds.tlsattacker.core.state.TlsContext; |
20 | | - |
21 | 21 | import org.junit.Before; |
22 | 22 | import org.junit.Test; |
23 | 23 |
|
24 | | -import de.rub.nds.tlsattacker.core.constants.ExtensionType; |
25 | | - |
26 | | - |
27 | 24 | import static org.junit.Assert.*; |
28 | 25 |
|
29 | 26 | public class HelloRetryRequestHandlerTest { |
| 27 | + |
30 | 28 | private TlsContext context; |
31 | 29 | private HelloRetryRequestHandler handler; |
32 | 30 |
|
33 | | - |
34 | 31 | @Before |
35 | 32 | public void setUp() { |
36 | 33 | context = new TlsContext(); |
37 | 34 | handler = new HelloRetryRequestHandler(context); |
38 | 35 | } |
39 | 36 |
|
40 | 37 | @Test |
41 | | - public void testGetParser(){ |
| 38 | + public void testGetParser() { |
42 | 39 | assertTrue(handler.getParser(new byte[1], 0) instanceof HelloRetryRequestParser); |
43 | 40 | } |
44 | 41 |
|
45 | 42 | @Test |
46 | | - public void testGetPreparator(){ |
| 43 | + public void testGetPreparator() { |
47 | 44 | assertTrue(handler.getPreparator(new HelloRetryRequestMessage()) instanceof HelloRetryRequestPreparator); |
48 | 45 | } |
49 | 46 |
|
50 | 47 | @Test |
51 | | - public void testGetSerializer(){ |
| 48 | + public void testGetSerializer() { |
52 | 49 | assertTrue(handler.getSerializer(new HelloRetryRequestMessage()) instanceof HelloRetryRequestSerializer); |
53 | 50 | } |
54 | 51 |
|
55 | 52 | @Test |
56 | | - public void testAdjustTLSContext(){ |
| 53 | + public void testAdjustTLSContext() { |
57 | 54 | HelloRetryRequestMessage message = new HelloRetryRequestMessage(); |
58 | 55 | ExtensionMessage extensionMessage = new EncryptThenMacExtensionMessage(); |
59 | 56 | ProtocolVersion protocolVersion = ProtocolVersion.SSL2; |
60 | 57 | CipherSuite cipherSuite = CipherSuite.TLS_DH_DSS_WITH_DES_CBC_SHA; |
61 | 58 | ExtensionType extensionType = ExtensionType.ENCRYPT_THEN_MAC; |
62 | 59 |
|
63 | | - |
64 | 60 | message.setProtocolVersion(protocolVersion.getValue()); |
65 | 61 | message.setSelectedCipherSuite(cipherSuite.getByteValue()); |
66 | 62 | message.setExtensionBytes(extensionType.getValue()); |
67 | 63 | message.addExtension(extensionMessage); |
68 | 64 |
|
69 | 65 | handler.adjustTLSContext(message); |
70 | | - |
71 | | - assertSame(context.getSelectedProtocolVersion(),protocolVersion); |
| 66 | + assertSame(context.getSelectedProtocolVersion(), protocolVersion); |
72 | 67 | assertSame(context.getSelectedCipherSuite(), cipherSuite); |
73 | 68 | assertTrue(context.isExtensionProposed(extensionType)); |
74 | | - |
75 | 69 | } |
76 | 70 |
|
77 | 71 | } |
0 commit comments