diff --git a/.circleci/config.yml b/.circleci/config.yml index dce4d8d4..7cc9e9bc 100644 --- a/.circleci/config.yml +++ b/.circleci/config.yml @@ -5,11 +5,6 @@ executors: - image: "circleci/golang:1.14" environment: runrace: true - test-go113: - docker: - - image: "circleci/golang:1.13" - environment: - runrace: true interop: docker: - image: circleci/buildpack-deps:stretch @@ -50,9 +45,6 @@ jobs: command: ginkgo -v -randomizeAllSpecs -trace integrationtests/self -- -qlog go114: <<: *test - go113: - <<: *test - executor: test-go113 interop-build: executor: interop steps: @@ -88,7 +80,6 @@ workflows: workflow: jobs: - go114 - - go113 - interop-build: filters: branches: diff --git a/.travis.yml b/.travis.yml index c3f68de6..4e96a992 100644 --- a/.travis.yml +++ b/.travis.yml @@ -5,7 +5,6 @@ language: go go: - "1.14.x" - - "1.13.x" # first part of the GOARCH workaround # setting the GOARCH directly doesn't work, since the value will be overwritten later @@ -24,11 +23,6 @@ env: - TRAVIS_GOARCH=386 TESTMODE=unit - TRAVIS_GOARCH=386 TESTMODE=integration -jobs: - exclude: - - go: "1.13.x" - env: TRAVIS_GOARCH=amd64 TESTMODE=fuzz - # second part of the GOARCH workaround # now actually set the GOARCH env variable to the value of the temporary variable set earlier before_install: diff --git a/README.md b/README.md index 200d446c..e93938b0 100644 --- a/README.md +++ b/README.md @@ -19,7 +19,7 @@ If you want to use quic-go as a library in other projects, please consider using ## Guides -*We currently support both Go 1.13.x and Go 1.14+, with [Go modules](https://github.com/golang/go/wiki/Modules) support enabled.* +*We currently support Go 1.14+, with [Go modules](https://github.com/golang/go/wiki/Modules) support enabled.* Running tests: diff --git a/go.mod b/go.mod index 23db8cc2..8a5ffdfb 100644 --- a/go.mod +++ b/go.mod @@ -1,6 +1,6 @@ module github.com/lucas-clemente/quic-go -go 1.13 +go 1.14 require ( github.com/cheekybits/genny v1.0.0 @@ -8,7 +8,7 @@ require ( github.com/golang/mock v1.4.0 github.com/golang/protobuf v1.4.0 github.com/marten-seemann/qpack v0.1.0 - github.com/marten-seemann/qtls v0.9.1 + github.com/marten-seemann/qtls v0.9.2 github.com/onsi/ginkgo v1.11.0 github.com/onsi/gomega v1.8.1 golang.org/x/crypto v0.0.0-20200423211502-4bdfaf469ed5 diff --git a/go.sum b/go.sum index 1d90931e..d8c31ddb 100644 --- a/go.sum +++ b/go.sum @@ -73,8 +73,8 @@ github.com/lunixbochs/vtclean v1.0.0/go.mod h1:pHhQNgMf3btfWnGBVipUOjRYhoOsdGqdm github.com/mailru/easyjson v0.0.0-20190312143242-1de009706dbe/go.mod h1:C1wdFJiN94OJF2b5HbByQZoLdCWB1Yqtg26g4irojpc= github.com/marten-seemann/qpack v0.1.0 h1:/0M7lkda/6mus9B8u34Asqm8ZhHAAt9Ho0vniNuVSVg= github.com/marten-seemann/qpack v0.1.0/go.mod h1:LFt1NU/Ptjip0C2CPkhimBz5CGE3WGDAUWqna+CNTrI= -github.com/marten-seemann/qtls v0.9.1 h1:O0YKQxNVPaiFgMng0suWEOY2Sb4LT2sRn9Qimq3Z1IQ= -github.com/marten-seemann/qtls v0.9.1/go.mod h1:T1MmAdDPyISzxlK6kjRr0pcZFBVd1OZbBb/j3cvzHhk= +github.com/marten-seemann/qtls v0.9.2 h1:5/CTvBD0DlIOyoESU4J8CvooIZK//2sYK2I30Wou8Cs= +github.com/marten-seemann/qtls v0.9.2/go.mod h1:UvMd1oaYDACI99/oZUYLzMCkBXQVT0aGm99sJhbT8hs= github.com/matttproud/golang_protobuf_extensions v1.0.1/go.mod h1:D8He9yQNgCq6Z5Ld7szi9bcBfOoFv/3dc6xSMkL2PC0= github.com/microcosm-cc/bluemonday v1.0.1/go.mod h1:hsXNsILzKxV+sX77C5b8FSuKF00vh2OMYv+xgHpAMF4= github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q= diff --git a/interface.go b/interface.go index eeadf220..429e1caa 100644 --- a/interface.go +++ b/interface.go @@ -50,6 +50,16 @@ type ErrorCode = protocol.ApplicationErrorCode // Stream is the interface implemented by QUIC streams type Stream interface { + ReceiveStream + SendStream + // SetDeadline sets the read and write deadlines associated + // with the connection. It is equivalent to calling both + // SetReadDeadline and SetWriteDeadline. + SetDeadline(t time.Time) error +} + +// A ReceiveStream is a unidirectional Receive Stream. +type ReceiveStream interface { // StreamID returns the stream ID. StreamID() StreamID // Read reads data from the stream. @@ -60,6 +70,22 @@ type Stream interface { // If the session was closed due to a timeout, the error satisfies // the net.Error interface, and Timeout() will be true. io.Reader + // CancelRead aborts receiving on this stream. + // It will ask the peer to stop transmitting stream data. + // Read will unblock immediately, and future Read calls will fail. + // When called multiple times or after reading the io.EOF it is a no-op. + CancelRead(ErrorCode) + // SetReadDeadline sets the deadline for future Read calls and + // any currently-blocked Read call. + // A zero value for t means Read will not time out. + + SetReadDeadline(t time.Time) error +} + +// A SendStream is a unidirectional Send Stream. +type SendStream interface { + // StreamID returns the stream ID. + StreamID() StreamID // Write writes data to the stream. // Write can be made to time out and return a net.Error with Timeout() == true // after a fixed time limit; see SetDeadline and SetWriteDeadline. @@ -78,58 +104,17 @@ type Stream interface { // Write will unblock immediately, and future calls to Write will fail. // When called multiple times or after closing the stream it is a no-op. CancelWrite(ErrorCode) - // CancelRead aborts receiving on this stream. - // It will ask the peer to stop transmitting stream data. - // Read will unblock immediately, and future Read calls will fail. - // When called multiple times or after reading the io.EOF it is a no-op. - CancelRead(ErrorCode) // The context is canceled as soon as the write-side of the stream is closed. // This happens when Close() or CancelWrite() is called, or when the peer // cancels the read-side of their stream. // Warning: This API should not be considered stable and might change soon. Context() context.Context - // SetReadDeadline sets the deadline for future Read calls and - // any currently-blocked Read call. - // A zero value for t means Read will not time out. - SetReadDeadline(t time.Time) error // SetWriteDeadline sets the deadline for future Write calls // and any currently-blocked Write call. // Even if write times out, it may return n > 0, indicating that // some of the data was successfully written. // A zero value for t means Write will not time out. SetWriteDeadline(t time.Time) error - // SetDeadline sets the read and write deadlines associated - // with the connection. It is equivalent to calling both - // SetReadDeadline and SetWriteDeadline. - SetDeadline(t time.Time) error -} - -// A ReceiveStream is a unidirectional Receive Stream. -type ReceiveStream interface { - // see Stream.StreamID - StreamID() StreamID - // see Stream.Read - io.Reader - // see Stream.CancelRead - CancelRead(ErrorCode) - // see Stream.SetReadDealine - SetReadDeadline(t time.Time) error -} - -// A SendStream is a unidirectional Send Stream. -type SendStream interface { - // see Stream.StreamID - StreamID() StreamID - // see Stream.Write - io.Writer - // see Stream.Close - io.Closer - // see Stream.CancelWrite - CancelWrite(ErrorCode) - // see Stream.Context - Context() context.Context - // see Stream.SetWriteDeadline - SetWriteDeadline(t time.Time) error } // StreamError is returned by Read and Write when the peer cancels the stream. diff --git a/internal/handshake/aead_test.go b/internal/handshake/aead_test.go index 7638b652..180a76a2 100644 --- a/internal/handshake/aead_test.go +++ b/internal/handshake/aead_test.go @@ -8,6 +8,7 @@ import ( "fmt" "github.com/lucas-clemente/quic-go/internal/protocol" + "github.com/marten-seemann/qtls" . "github.com/onsi/ginkgo" . "github.com/onsi/gomega" @@ -17,7 +18,7 @@ var _ = Describe("Long Header AEAD", func() { for i := range cipherSuites { cs := cipherSuites[i] - Context(fmt.Sprintf("using %s", cipherSuiteName(cs.ID)), func() { + Context(fmt.Sprintf("using %s", qtls.CipherSuiteName(cs.ID)), func() { getSealerAndOpener := func() (LongHeaderSealer, LongHeaderOpener) { key := make([]byte, 16) hpKey := make([]byte, 16) diff --git a/internal/handshake/crypto_setup.go b/internal/handshake/crypto_setup.go index 89043d61..c8ee345d 100644 --- a/internal/handshake/crypto_setup.go +++ b/internal/handshake/crypto_setup.go @@ -571,7 +571,7 @@ func (h *cryptoSetup) SetReadKey(encLevel qtls.EncryptionLevel, suite *qtls.Ciph newHeaderProtector(suite, trafficSecret, true), ) h.mutex.Unlock() - h.logger.Debugf("Installed 0-RTT Read keys (using %s)", cipherSuiteName(suite.ID)) + h.logger.Debugf("Installed 0-RTT Read keys (using %s)", qtls.CipherSuiteName(suite.ID)) if h.qlogger != nil { h.qlogger.UpdatedKeyFromTLS(protocol.Encryption0RTT, h.perspective.Opposite()) } @@ -584,12 +584,12 @@ func (h *cryptoSetup) SetReadKey(encLevel qtls.EncryptionLevel, suite *qtls.Ciph h.dropInitialKeys, h.perspective, ) - h.logger.Debugf("Installed Handshake Read keys (using %s)", cipherSuiteName(suite.ID)) + h.logger.Debugf("Installed Handshake Read keys (using %s)", qtls.CipherSuiteName(suite.ID)) case qtls.EncryptionApplication: h.readEncLevel = protocol.Encryption1RTT h.aead.SetReadKey(suite, trafficSecret) h.has1RTTOpener = true - h.logger.Debugf("Installed 1-RTT Read keys (using %s)", cipherSuiteName(suite.ID)) + h.logger.Debugf("Installed 1-RTT Read keys (using %s)", qtls.CipherSuiteName(suite.ID)) default: panic("unexpected read encryption level") } @@ -612,7 +612,7 @@ func (h *cryptoSetup) SetWriteKey(encLevel qtls.EncryptionLevel, suite *qtls.Cip newHeaderProtector(suite, trafficSecret, true), ) h.mutex.Unlock() - h.logger.Debugf("Installed 0-RTT Write keys (using %s)", cipherSuiteName(suite.ID)) + h.logger.Debugf("Installed 0-RTT Write keys (using %s)", qtls.CipherSuiteName(suite.ID)) if h.qlogger != nil { h.qlogger.UpdatedKeyFromTLS(protocol.Encryption0RTT, h.perspective) } @@ -625,12 +625,12 @@ func (h *cryptoSetup) SetWriteKey(encLevel qtls.EncryptionLevel, suite *qtls.Cip h.dropInitialKeys, h.perspective, ) - h.logger.Debugf("Installed Handshake Write keys (using %s)", cipherSuiteName(suite.ID)) + h.logger.Debugf("Installed Handshake Write keys (using %s)", qtls.CipherSuiteName(suite.ID)) case qtls.EncryptionApplication: h.writeEncLevel = protocol.Encryption1RTT h.aead.SetWriteKey(suite, trafficSecret) h.has1RTTSealer = true - h.logger.Debugf("Installed 1-RTT Write keys (using %s)", cipherSuiteName(suite.ID)) + h.logger.Debugf("Installed 1-RTT Write keys (using %s)", qtls.CipherSuiteName(suite.ID)) if h.zeroRTTSealer != nil { h.zeroRTTSealer = nil h.logger.Debugf("Dropping 0-RTT keys.") diff --git a/internal/handshake/go_1-13.go b/internal/handshake/go_1-13.go deleted file mode 100644 index 56bce4e7..00000000 --- a/internal/handshake/go_1-13.go +++ /dev/null @@ -1,24 +0,0 @@ -// +build !go1.14 - -package handshake - -import ( - "crypto/tls" - - "github.com/marten-seemann/qtls" -) - -func cipherSuiteName(id uint16) string { - switch id { - case qtls.TLS_AES_128_GCM_SHA256: - return "TLS_AES_128_GCM_SHA256" - case qtls.TLS_CHACHA20_POLY1305_SHA256: - return "TLS_CHACHA20_POLY1305_SHA256" - case qtls.TLS_AES_256_GCM_SHA384: - return "TLS_AES_256_GCM_SHA384" - default: - return "unknown cipher suite" - } -} - -func toTLSClientHelloInfo(c *qtls.ClientHelloInfo) *tls.ClientHelloInfo { return c } diff --git a/internal/handshake/go_1-14.go b/internal/handshake/go_1-14.go deleted file mode 100644 index 5ccc069a..00000000 --- a/internal/handshake/go_1-14.go +++ /dev/null @@ -1,82 +0,0 @@ -// +build go1.14 - -package handshake - -import ( - "crypto/tls" - "net" - "unsafe" - - "github.com/marten-seemann/qtls" -) - -func init() { - if !structsEqual(&tls.ClientHelloInfo{}, &clientHelloInfo{}) { - panic("clientHelloInfo not compatible with tls.ClientHelloInfo") - } - if !structsEqual(&qtls.ClientHelloInfo{}, &qtlsClientHelloInfo{}) { - panic("qtlsClientHelloInfo not compatible with qtls.ClientHelloInfo") - } -} - -func cipherSuiteName(id uint16) string { return qtls.CipherSuiteName(id) } - -type clientHelloInfo struct { - CipherSuites []uint16 - ServerName string - SupportedCurves []tls.CurveID - SupportedPoints []uint8 - SignatureSchemes []tls.SignatureScheme - SupportedProtos []string - SupportedVersions []uint16 - Conn net.Conn - - config *tls.Config -} - -type qtlsClientHelloInfo struct { - CipherSuites []uint16 - ServerName string - SupportedCurves []tls.CurveID - SupportedPoints []uint8 - SignatureSchemes []tls.SignatureScheme - SupportedProtos []string - SupportedVersions []uint16 - Conn net.Conn - - config *qtls.Config -} - -func toTLSClientHelloInfo(chi *qtls.ClientHelloInfo) *tls.ClientHelloInfo { - if chi == nil { - return nil - } - qtlsCHI := (*qtlsClientHelloInfo)(unsafe.Pointer(chi)) - var config *tls.Config - if qtlsCHI.config != nil { - config = qtlsConfigToTLSConfig((*qtls.Config)(unsafe.Pointer(qtlsCHI.config))) - } - return (*tls.ClientHelloInfo)(unsafe.Pointer(&clientHelloInfo{ - CipherSuites: chi.CipherSuites, - ServerName: chi.ServerName, - SupportedCurves: chi.SupportedCurves, - SupportedPoints: chi.SupportedPoints, - SignatureSchemes: chi.SignatureSchemes, - SupportedProtos: chi.SupportedProtos, - SupportedVersions: chi.SupportedVersions, - Conn: chi.Conn, - config: config, - })) -} - -// qtlsConfigToTLSConfig is used to transform a qtls.Config to a tls.Config. -// It is used to create the tls.Config in the ClientHelloInfo. -// It doesn't copy all values, but only those used by ClientHelloInfo.SupportsCertificate. -func qtlsConfigToTLSConfig(config *qtls.Config) *tls.Config { - return &tls.Config{ - MinVersion: config.MinVersion, - MaxVersion: config.MaxVersion, - CipherSuites: config.CipherSuites, - CurvePreferences: config.CurvePreferences, - } -} diff --git a/internal/handshake/go_1-14_test.go b/internal/handshake/go_1-14_test.go deleted file mode 100644 index 3ee80551..00000000 --- a/internal/handshake/go_1-14_test.go +++ /dev/null @@ -1,55 +0,0 @@ -// +build go1.14 - -package handshake - -import ( - "crypto/tls" - "net" - "unsafe" - - "github.com/marten-seemann/qtls" - - . "github.com/onsi/ginkgo" - . "github.com/onsi/gomega" -) - -var _ = Describe("Unsafe checks, for Go 1.14+", func() { - It("converts a qtls.ClientHelloInfo to a tls.ClientHelloInfo", func() { - chi := &qtlsClientHelloInfo{ - CipherSuites: []uint16{1, 2, 3}, - ServerName: "foo.bar", - SupportedCurves: []qtls.CurveID{4, 5, 6}, - SupportedPoints: []uint8{7, 8, 9}, - SignatureSchemes: []qtls.SignatureScheme{10, 11, 12}, - SupportedProtos: []string{"foo", "bar"}, - SupportedVersions: []uint16{13, 14, 15}, - Conn: &net.UDPConn{}, - config: &qtls.Config{ - MinVersion: tls.VersionTLS10, - MaxVersion: tls.VersionTLS12, - CipherSuites: []uint16{16, 17, 18}, - CurvePreferences: []qtls.CurveID{19, 20, 21}, - }, - } - tlsCHI := toTLSClientHelloInfo((*qtls.ClientHelloInfo)(unsafe.Pointer(chi))) - Expect(tlsCHI.CipherSuites).To(Equal([]uint16{1, 2, 3})) - Expect(tlsCHI.ServerName).To(Equal("foo.bar")) - Expect(tlsCHI.SupportedCurves).To(Equal([]tls.CurveID{4, 5, 6})) - Expect(tlsCHI.SupportedPoints).To(Equal([]uint8{7, 8, 9})) - Expect(tlsCHI.SignatureSchemes).To(Equal([]tls.SignatureScheme{10, 11, 12})) - Expect(tlsCHI.SupportedProtos).To(Equal([]string{"foo", "bar"})) - Expect(tlsCHI.SupportedVersions).To(Equal([]uint16{13, 14, 15})) - Expect(tlsCHI.Conn).To(Equal(&net.UDPConn{})) - c := (*clientHelloInfo)(unsafe.Pointer(tlsCHI)) - Expect(c.config.CipherSuites).To(Equal([]uint16{16, 17, 18})) - Expect(c.config.MinVersion).To(BeEquivalentTo(tls.VersionTLS10)) - Expect(c.config.MaxVersion).To(BeEquivalentTo(tls.VersionTLS12)) - Expect(c.config.CurvePreferences).To(Equal([]tls.CurveID{19, 20, 21})) - }) - - It("converts a qtls.ClientHelloInfo to a tls.ClientHelloInfo, if no config is set", func() { - chi := &qtlsClientHelloInfo{CipherSuites: []uint16{13, 37}} - tlsCHI := toTLSClientHelloInfo((*qtls.ClientHelloInfo)(unsafe.Pointer(chi))) - Expect(tlsCHI.CipherSuites).To(Equal([]uint16{13, 37})) - }) -}) diff --git a/internal/handshake/qtls.go b/internal/handshake/qtls.go index 911009b8..c7fedbad 100644 --- a/internal/handshake/qtls.go +++ b/internal/handshake/qtls.go @@ -11,6 +11,15 @@ import ( "github.com/lucas-clemente/quic-go/internal/congestion" ) +func init() { + if !structsEqual(&tls.ClientHelloInfo{}, &clientHelloInfo{}) { + panic("clientHelloInfo not compatible with tls.ClientHelloInfo") + } + if !structsEqual(&qtls.ClientHelloInfo{}, &qtlsClientHelloInfo{}) { + panic("qtlsClientHelloInfo not compatible with qtls.ClientHelloInfo") + } +} + type conn struct { localAddr, remoteAddr net.Addr } @@ -130,3 +139,63 @@ func tlsConfigToQtlsConfig( } return conf } + +type clientHelloInfo struct { + CipherSuites []uint16 + ServerName string + SupportedCurves []tls.CurveID + SupportedPoints []uint8 + SignatureSchemes []tls.SignatureScheme + SupportedProtos []string + SupportedVersions []uint16 + Conn net.Conn + + config *tls.Config +} + +type qtlsClientHelloInfo struct { + CipherSuites []uint16 + ServerName string + SupportedCurves []tls.CurveID + SupportedPoints []uint8 + SignatureSchemes []tls.SignatureScheme + SupportedProtos []string + SupportedVersions []uint16 + Conn net.Conn + + config *qtls.Config +} + +func toTLSClientHelloInfo(chi *qtls.ClientHelloInfo) *tls.ClientHelloInfo { + if chi == nil { + return nil + } + qtlsCHI := (*qtlsClientHelloInfo)(unsafe.Pointer(chi)) + var config *tls.Config + if qtlsCHI.config != nil { + config = qtlsConfigToTLSConfig((*qtls.Config)(unsafe.Pointer(qtlsCHI.config))) + } + return (*tls.ClientHelloInfo)(unsafe.Pointer(&clientHelloInfo{ + CipherSuites: chi.CipherSuites, + ServerName: chi.ServerName, + SupportedCurves: chi.SupportedCurves, + SupportedPoints: chi.SupportedPoints, + SignatureSchemes: chi.SignatureSchemes, + SupportedProtos: chi.SupportedProtos, + SupportedVersions: chi.SupportedVersions, + Conn: chi.Conn, + config: config, + })) +} + +// qtlsConfigToTLSConfig is used to transform a qtls.Config to a tls.Config. +// It is used to create the tls.Config in the ClientHelloInfo. +// It doesn't copy all values, but only those used by ClientHelloInfo.SupportsCertificate. +func qtlsConfigToTLSConfig(config *qtls.Config) *tls.Config { + return &tls.Config{ + MinVersion: config.MinVersion, + MaxVersion: config.MaxVersion, + CipherSuites: config.CipherSuites, + CurvePreferences: config.CurvePreferences, + } +} diff --git a/internal/handshake/qtls_test.go b/internal/handshake/qtls_test.go index 576607ba..b0778d01 100644 --- a/internal/handshake/qtls_test.go +++ b/internal/handshake/qtls_test.go @@ -3,6 +3,8 @@ package handshake import ( "crypto/tls" "errors" + "net" + "unsafe" gomock "github.com/golang/mock/gomock" "github.com/lucas-clemente/quic-go/internal/congestion" @@ -26,7 +28,7 @@ func (h *mockExtensionHandler) ReceivedExtensions(msgType uint8, exts []qtls.Ext } func (*mockExtensionHandler) TransportParameters() <-chan []byte { panic("not implemented") } -var _ = Describe("qtls.Config generation", func() { +var _ = Describe("qtls.Config", func() { It("sets MinVersion and MaxVersion", func() { tlsConf := &tls.Config{MinVersion: tls.VersionTLS11, MaxVersion: tls.VersionTLS12} qtlsConf := tlsConfigToQtlsConfig(tlsConf, nil, &mockExtensionHandler{}, congestion.NewRTTStats(), nil, nil, nil, nil, false) @@ -219,3 +221,44 @@ var _ = Describe("qtls.Config generation", func() { }) }) }) + +var _ = Describe("qtls.Config generation", func() { + It("converts a qtls.ClientHelloInfo to a tls.ClientHelloInfo", func() { + chi := &qtlsClientHelloInfo{ + CipherSuites: []uint16{1, 2, 3}, + ServerName: "foo.bar", + SupportedCurves: []qtls.CurveID{4, 5, 6}, + SupportedPoints: []uint8{7, 8, 9}, + SignatureSchemes: []qtls.SignatureScheme{10, 11, 12}, + SupportedProtos: []string{"foo", "bar"}, + SupportedVersions: []uint16{13, 14, 15}, + Conn: &net.UDPConn{}, + config: &qtls.Config{ + MinVersion: tls.VersionTLS10, + MaxVersion: tls.VersionTLS12, + CipherSuites: []uint16{16, 17, 18}, + CurvePreferences: []qtls.CurveID{19, 20, 21}, + }, + } + tlsCHI := toTLSClientHelloInfo((*qtls.ClientHelloInfo)(unsafe.Pointer(chi))) + Expect(tlsCHI.CipherSuites).To(Equal([]uint16{1, 2, 3})) + Expect(tlsCHI.ServerName).To(Equal("foo.bar")) + Expect(tlsCHI.SupportedCurves).To(Equal([]tls.CurveID{4, 5, 6})) + Expect(tlsCHI.SupportedPoints).To(Equal([]uint8{7, 8, 9})) + Expect(tlsCHI.SignatureSchemes).To(Equal([]tls.SignatureScheme{10, 11, 12})) + Expect(tlsCHI.SupportedProtos).To(Equal([]string{"foo", "bar"})) + Expect(tlsCHI.SupportedVersions).To(Equal([]uint16{13, 14, 15})) + Expect(tlsCHI.Conn).To(Equal(&net.UDPConn{})) + c := (*clientHelloInfo)(unsafe.Pointer(tlsCHI)) + Expect(c.config.CipherSuites).To(Equal([]uint16{16, 17, 18})) + Expect(c.config.MinVersion).To(BeEquivalentTo(tls.VersionTLS10)) + Expect(c.config.MaxVersion).To(BeEquivalentTo(tls.VersionTLS12)) + Expect(c.config.CurvePreferences).To(Equal([]tls.CurveID{19, 20, 21})) + }) + + It("converts a qtls.ClientHelloInfo to a tls.ClientHelloInfo, if no config is set", func() { + chi := &qtlsClientHelloInfo{CipherSuites: []uint16{13, 37}} + tlsCHI := toTLSClientHelloInfo((*qtls.ClientHelloInfo)(unsafe.Pointer(chi))) + Expect(tlsCHI.CipherSuites).To(Equal([]uint16{13, 37})) + }) +}) diff --git a/internal/handshake/updatable_aead_test.go b/internal/handshake/updatable_aead_test.go index 2fc3d734..f48f6370 100644 --- a/internal/handshake/updatable_aead_test.go +++ b/internal/handshake/updatable_aead_test.go @@ -36,7 +36,7 @@ var _ = Describe("Updatable AEAD", func() { for i := range cipherSuites { cs := cipherSuites[i] - Context(fmt.Sprintf("using %s", cipherSuiteName(cs.ID)), func() { + Context(fmt.Sprintf("using %s", qtls.CipherSuiteName(cs.ID)), func() { getPeers := func(rttStats *congestion.RTTStats) (client, server *updatableAEAD) { trafficSecret1 := make([]byte, 16) trafficSecret2 := make([]byte, 16)