/* * Copyright (c) 2021, 2022, Oracle and/or its affiliates. All rights reserved. * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. * * This code is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License version 2 only, as * published by the Free Software Foundation. * * This code is distributed in the hope that it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * version 2 for more details (a copy is included in the LICENSE file that * accompanied this code). * * You should have received a copy of the GNU General Public License version * 2 along with this work; if not, write to the Free Software Foundation, * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. * * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA * or visit www.oracle.com if you need additional information or have any * questions.
*/
/* * @test * @bug 8270290 * @library /test/lib * @run main/othervm NTLMHeadTest SERVER * @run main/othervm NTLMHeadTest PROXY * @run main/othervm NTLMHeadTest TUNNEL * @summary test for the incorrect logic in reading (and discarding) HTTP * response body when processing NTLMSSP_CHALLENGE response * (to CONNECT request) from proxy server. When this response is received * by client, reset() is called on the connection to read and discard the * response body. This code path was broken when initial client request * uses HEAD method and HTTPS resource, in this case CONNECT is sent to * proxy server (to establish TLS tunnel) and response body is not read * from a socket (because initial method on client connection is HEAD). * This does not cause problems with the majority of proxy servers because * InputStream opened over the response socket is buffered with 8kb buffer * size. Problem is only reproducible if the response size (headers + * body) is larger than 8kb. The code path with HTTPS tunneling is checked * with TUNNEL argument. Additional checks for HEAD handling are included * for direct server (SERVER) and HTTP proxying (PROXY) code paths, in * these (non-tunnel) cases client must NOT attempt to read response data * (to not block on socket read) because HEAD is sent to server and * NTLMSSP_CHALLENGE response includes Content-Length, but does not * include the body.
*/
Die Informationen auf dieser Webseite wurden
nach bestem Wissen sorgfältig zusammengestellt. Es wird jedoch weder Vollständigkeit, noch Richtigkeit,
noch Qualität der bereit gestellten Informationen zugesichert.
Bemerkung:
Die farbliche Syntaxdarstellung und die Messung sind noch experimentell.