mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-05 04:57:35 +03:00
crypto/tls: fix test data generation
- Multiple GetCertificate tests shared the same name and were overwriting each other, each test now has a unique name. - expectAlert was not implemented in the data updater, the single test that used it has been replaced with a ClientHello failure test. Fixes #10470 Change-Id: I500738f6302ffa863d7ee45d85fa8773155e0614 Reviewed-on: https://go-review.googlesource.com/8959 Reviewed-by: Adam Langley <agl@golang.org> Run-TryBot: Adam Langley <agl@golang.org>
This commit is contained in:
parent
569d8e983a
commit
06b29738e8
3 changed files with 171 additions and 28 deletions
|
@ -385,9 +385,6 @@ type serverTest struct {
|
|||
expectedPeerCerts []string
|
||||
// config, if not nil, contains a custom Config to use for this test.
|
||||
config *Config
|
||||
// expectAlert, if true, indicates that a fatal alert should be returned
|
||||
// when handshaking with the server.
|
||||
expectAlert bool
|
||||
// expectHandshakeErrorIncluding, when not empty, contains a string
|
||||
// that must be a substring of the error resulting from the handshake.
|
||||
expectHandshakeErrorIncluding string
|
||||
|
@ -512,9 +509,7 @@ func (test *serverTest) run(t *testing.T, write bool) {
|
|||
if !write {
|
||||
flows, err := test.loadData()
|
||||
if err != nil {
|
||||
if !test.expectAlert {
|
||||
t.Fatalf("%s: failed to load data from %s", test.name, test.dataPath())
|
||||
}
|
||||
t.Fatalf("%s: failed to load data from %s", test.name, test.dataPath())
|
||||
}
|
||||
for i, b := range flows {
|
||||
if i%2 == 0 {
|
||||
|
@ -523,17 +518,11 @@ func (test *serverTest) run(t *testing.T, write bool) {
|
|||
}
|
||||
bb := make([]byte, len(b))
|
||||
n, err := io.ReadFull(clientConn, bb)
|
||||
if test.expectAlert {
|
||||
if err == nil {
|
||||
t.Fatal("Expected read failure but read succeeded")
|
||||
}
|
||||
} else {
|
||||
if err != nil {
|
||||
t.Fatalf("%s #%d: %s\nRead %d, wanted %d, got %x, wanted %x\n", test.name, i+1, err, n, len(bb), bb[:n], b)
|
||||
}
|
||||
if !bytes.Equal(b, bb) {
|
||||
t.Fatalf("%s #%d: mismatch on read: got:%x want:%x", test.name, i+1, bb, b)
|
||||
}
|
||||
if err != nil {
|
||||
t.Fatalf("%s #%d: %s\nRead %d, wanted %d, got %x, wanted %x\n", test.name, i+1, err, n, len(bb), bb[:n], b)
|
||||
}
|
||||
if !bytes.Equal(b, bb) {
|
||||
t.Fatalf("%s #%d: mismatch on read: got:%x want:%x", test.name, i+1, bb, b)
|
||||
}
|
||||
}
|
||||
clientConn.Close()
|
||||
|
@ -735,7 +724,7 @@ func TestHandshakeServerSNIGetCertificate(t *testing.T) {
|
|||
return cert, nil
|
||||
}
|
||||
test := &serverTest{
|
||||
name: "SNI",
|
||||
name: "SNI-GetCertificate",
|
||||
command: []string{"openssl", "s_client", "-no_ticket", "-cipher", "AES128-SHA", "-servername", "snitest.com"},
|
||||
config: &config,
|
||||
}
|
||||
|
@ -753,7 +742,7 @@ func TestHandshakeServerSNIGetCertificateNotFound(t *testing.T) {
|
|||
return nil, nil
|
||||
}
|
||||
test := &serverTest{
|
||||
name: "SNI",
|
||||
name: "SNI-GetCertificateNotFound",
|
||||
command: []string{"openssl", "s_client", "-no_ticket", "-cipher", "AES128-SHA", "-servername", "snitest.com"},
|
||||
config: &config,
|
||||
}
|
||||
|
@ -763,18 +752,20 @@ func TestHandshakeServerSNIGetCertificateNotFound(t *testing.T) {
|
|||
// TestHandshakeServerSNICertForNameError tests to make sure that errors in
|
||||
// GetCertificate result in a tls alert.
|
||||
func TestHandshakeServerSNIGetCertificateError(t *testing.T) {
|
||||
config := *testConfig
|
||||
const errMsg = "TestHandshakeServerSNIGetCertificateError error"
|
||||
|
||||
config.GetCertificate = func(clientHello *ClientHelloInfo) (*Certificate, error) {
|
||||
return nil, fmt.Errorf("Test error in GetCertificate")
|
||||
serverConfig := *testConfig
|
||||
serverConfig.GetCertificate = func(clientHello *ClientHelloInfo) (*Certificate, error) {
|
||||
return nil, errors.New(errMsg)
|
||||
}
|
||||
test := &serverTest{
|
||||
name: "SNI",
|
||||
command: []string{"openssl", "s_client", "-no_ticket", "-cipher", "AES128-SHA", "-servername", "snitest.com"},
|
||||
config: &config,
|
||||
expectAlert: true,
|
||||
|
||||
clientHello := &clientHelloMsg{
|
||||
vers: 0x0301,
|
||||
cipherSuites: []uint16{TLS_RSA_WITH_RC4_128_SHA},
|
||||
compressionMethods: []uint8{0},
|
||||
serverName: "test",
|
||||
}
|
||||
runServerTestTLS12(t, test)
|
||||
testClientHelloFailure(t, &serverConfig, clientHello, errMsg)
|
||||
}
|
||||
|
||||
// TestCipherSuiteCertPreferance ensures that we select an RSA ciphersuite with
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue