/** * TLS-Attacker - A Modular Penetration Testing Framework for TLS * * Copyright 2014-2016 Ruhr University Bochum / Hackmanit GmbH * * Licensed under Apache License 2.0 * http://www.apache.org/licenses/LICENSE-2.0 */ package de.rub.nds.tlsattacker.tls.protocol.application; import de.rub.nds.tlsattacker.tls.protocol.ProtocolMessageHandler; import de.rub.nds.tlsattacker.tls.workflow.TlsContext; import java.util.Arrays; /** * @author Juraj Somorovsky <juraj.somorovsky@rub.de> */ public class ApplicationHandler extends ProtocolMessageHandler<ApplicationMessage> { public ApplicationHandler(TlsContext tlsContext) { super(tlsContext); this.correctProtocolMessageClass = ApplicationMessage.class; } @Override public byte[] prepareMessageAction() { protocolMessage.setData("test".getBytes()); byte[] result = protocolMessage.getData().getValue(); return result; } @Override public int parseMessageAction(byte[] message, int pointer) { protocolMessage.setData(Arrays.copyOfRange(message, pointer, message.length)); return pointer + message.length; } }