mirror of
https://github.com/refraction-networking/uquic.git
synced 2025-04-01 19:27:35 +03:00
123 lines
4.4 KiB
Go
123 lines
4.4 KiB
Go
package handshake
|
|
|
|
import (
|
|
"crypto/rand"
|
|
"encoding/asn1"
|
|
"net"
|
|
"time"
|
|
|
|
"github.com/refraction-networking/uquic/internal/protocol"
|
|
|
|
. "github.com/onsi/ginkgo/v2"
|
|
. "github.com/onsi/gomega"
|
|
)
|
|
|
|
var _ = Describe("Token Generator", func() {
|
|
var tokenGen *TokenGenerator
|
|
|
|
BeforeEach(func() {
|
|
var key TokenProtectorKey
|
|
rand.Read(key[:])
|
|
tokenGen = NewTokenGenerator(key)
|
|
})
|
|
|
|
It("generates a token", func() {
|
|
ip := net.IPv4(127, 0, 0, 1)
|
|
token, err := tokenGen.NewRetryToken(&net.UDPAddr{IP: ip, Port: 1337}, protocol.ConnectionID{}, protocol.ConnectionID{})
|
|
Expect(err).ToNot(HaveOccurred())
|
|
Expect(token).ToNot(BeEmpty())
|
|
})
|
|
|
|
It("works with nil tokens", func() {
|
|
token, err := tokenGen.DecodeToken(nil)
|
|
Expect(err).ToNot(HaveOccurred())
|
|
Expect(token).To(BeNil())
|
|
})
|
|
|
|
It("accepts a valid token", func() {
|
|
addr := &net.UDPAddr{IP: net.IPv4(192, 168, 0, 1), Port: 1337}
|
|
tokenEnc, err := tokenGen.NewRetryToken(addr, protocol.ConnectionID{}, protocol.ConnectionID{})
|
|
Expect(err).ToNot(HaveOccurred())
|
|
token, err := tokenGen.DecodeToken(tokenEnc)
|
|
Expect(err).ToNot(HaveOccurred())
|
|
Expect(token.ValidateRemoteAddr(addr)).To(BeTrue())
|
|
Expect(token.ValidateRemoteAddr(&net.UDPAddr{IP: net.IPv4(192, 168, 0, 2), Port: 1337})).To(BeFalse())
|
|
Expect(token.SentTime).To(BeTemporally("~", time.Now(), 100*time.Millisecond))
|
|
Expect(token.OriginalDestConnectionID.Len()).To(BeZero())
|
|
Expect(token.RetrySrcConnectionID.Len()).To(BeZero())
|
|
})
|
|
|
|
It("saves the connection ID", func() {
|
|
connID1 := protocol.ParseConnectionID([]byte{0xde, 0xad, 0xbe, 0xef})
|
|
connID2 := protocol.ParseConnectionID([]byte{0xde, 0xad, 0xc0, 0xde})
|
|
tokenEnc, err := tokenGen.NewRetryToken(&net.UDPAddr{}, connID1, connID2)
|
|
Expect(err).ToNot(HaveOccurred())
|
|
token, err := tokenGen.DecodeToken(tokenEnc)
|
|
Expect(err).ToNot(HaveOccurred())
|
|
Expect(token.OriginalDestConnectionID).To(Equal(connID1))
|
|
Expect(token.RetrySrcConnectionID).To(Equal(connID2))
|
|
})
|
|
|
|
It("rejects invalid tokens", func() {
|
|
_, err := tokenGen.DecodeToken([]byte("invalid token"))
|
|
Expect(err).To(HaveOccurred())
|
|
})
|
|
|
|
It("rejects tokens that cannot be decoded", func() {
|
|
token, err := tokenGen.tokenProtector.NewToken([]byte("foobar"))
|
|
Expect(err).ToNot(HaveOccurred())
|
|
_, err = tokenGen.DecodeToken(token)
|
|
Expect(err).To(HaveOccurred())
|
|
})
|
|
|
|
It("rejects tokens that can be decoded, but have additional payload", func() {
|
|
t, err := asn1.Marshal(token{RemoteAddr: []byte("foobar")})
|
|
Expect(err).ToNot(HaveOccurred())
|
|
t = append(t, []byte("rest")...)
|
|
enc, err := tokenGen.tokenProtector.NewToken(t)
|
|
Expect(err).ToNot(HaveOccurred())
|
|
_, err = tokenGen.DecodeToken(enc)
|
|
Expect(err).To(MatchError("rest when unpacking token: 4"))
|
|
})
|
|
|
|
// we don't generate tokens that have no data, but we should be able to handle them if we receive one for whatever reason
|
|
It("doesn't panic if a tokens has no data", func() {
|
|
t, err := asn1.Marshal(token{RemoteAddr: []byte("")})
|
|
Expect(err).ToNot(HaveOccurred())
|
|
enc, err := tokenGen.tokenProtector.NewToken(t)
|
|
Expect(err).ToNot(HaveOccurred())
|
|
_, err = tokenGen.DecodeToken(enc)
|
|
Expect(err).ToNot(HaveOccurred())
|
|
})
|
|
|
|
It("works with an IPv6 addresses ", func() {
|
|
addresses := []string{
|
|
"2001:db8::68",
|
|
"2001:0000:4136:e378:8000:63bf:3fff:fdd2",
|
|
"2001::1",
|
|
"ff01:0:0:0:0:0:0:2",
|
|
}
|
|
for _, addr := range addresses {
|
|
ip := net.ParseIP(addr)
|
|
Expect(ip).ToNot(BeNil())
|
|
raddr := &net.UDPAddr{IP: ip, Port: 1337}
|
|
tokenEnc, err := tokenGen.NewRetryToken(raddr, protocol.ConnectionID{}, protocol.ConnectionID{})
|
|
Expect(err).ToNot(HaveOccurred())
|
|
token, err := tokenGen.DecodeToken(tokenEnc)
|
|
Expect(err).ToNot(HaveOccurred())
|
|
Expect(token.ValidateRemoteAddr(raddr)).To(BeTrue())
|
|
Expect(token.SentTime).To(BeTemporally("~", time.Now(), 100*time.Millisecond))
|
|
}
|
|
})
|
|
|
|
It("uses the string representation an address that is not a UDP address", func() {
|
|
raddr := &net.TCPAddr{IP: net.IPv4(192, 168, 13, 37), Port: 1337}
|
|
tokenEnc, err := tokenGen.NewRetryToken(raddr, protocol.ConnectionID{}, protocol.ConnectionID{})
|
|
Expect(err).ToNot(HaveOccurred())
|
|
token, err := tokenGen.DecodeToken(tokenEnc)
|
|
Expect(err).ToNot(HaveOccurred())
|
|
Expect(token.ValidateRemoteAddr(raddr)).To(BeTrue())
|
|
Expect(token.ValidateRemoteAddr(&net.TCPAddr{IP: net.IPv4(192, 168, 13, 37), Port: 1338})).To(BeFalse())
|
|
Expect(token.SentTime).To(BeTemporally("~", time.Now(), 100*time.Millisecond))
|
|
})
|
|
})
|