mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-03 20:17:36 +03:00
Update and add new tests
This commit is contained in:
parent
a07d9bc87d
commit
09f732cdd6
31 changed files with 2187 additions and 289 deletions
|
@ -235,6 +235,8 @@ func TestUTLSHandshakeClientParrotAndroid_5_1(t *testing.T) {
|
|||
|
||||
func TestUTLSHandshakeClientParrotAndroid_6_0(t *testing.T) {
|
||||
helloID := HelloAndroid_6_0_Browser
|
||||
// TODO: EC tests below are disabled because latest version of reference OpenSSL doesn't support p256 nor p384
|
||||
// and I can't find configuration flag to enable it. Therefore I can't record replays.
|
||||
|
||||
// As this package sometimes has to modify global vars cipherSuites and supportedSignatureAlgorithms,
|
||||
// we'll back them up and restore after running the tests.
|
||||
|
@ -251,11 +253,12 @@ func TestUTLSHandshakeClientParrotAndroid_6_0(t *testing.T) {
|
|||
// testUTLSHandshakeClientECDHE_ECDSA_WITH_CHACHA20_POLY1305(t, helloID)
|
||||
// testUTLSHandshakeClientECDHE_RSA_WITH_CHACHA20_POLY1305(t, helloID)
|
||||
|
||||
testUTLSHandshakeClientECDHE_ECDSA_AES128_GCM_SHA256(t, helloID)
|
||||
|
||||
//testUTLSHandshakeClientECDHE_ECDSA_AES128_GCM_SHA256(t, helloID)
|
||||
testUTLSHandshakeClientECDHE_RSA_AES128_GCM_SHA256(t, helloID)
|
||||
testUTLSHandshakeClientECDHE_ECDSA_AES256_CBC_SHA(t, helloID)
|
||||
//testUTLSHandshakeClientECDHE_ECDSA_AES256_CBC_SHA(t, helloID)
|
||||
testUTLSHandshakeClientECDHE_RSA_AES256_CBC_SHA(t, helloID)
|
||||
testUTLSHandshakeClientECDHE_ECDSA_AES128_CBC_SHA(t, helloID)
|
||||
//testUTLSHandshakeClientECDHE_ECDSA_AES128_CBC_SHA(t, helloID)
|
||||
testUTLSHandshakeClientECDHE_RSA_AES128_CBC_SHA(t, helloID)
|
||||
|
||||
testUTLSHandshakeClientRSA_AES128_GCM_SHA256(t, helloID)
|
||||
|
@ -263,6 +266,8 @@ func TestUTLSHandshakeClientParrotAndroid_6_0(t *testing.T) {
|
|||
|
||||
func TestUTLSHandshakeClientParrotChrome_58(t *testing.T) {
|
||||
helloID := HelloChrome_58
|
||||
// TODO: EC tests below are disabled because latest version of reference OpenSSL doesn't support p256 nor p384
|
||||
// nor X25519 and I can't find configuration flag to enable it. Therefore I can't record replays.
|
||||
|
||||
// As this package sometimes has to modify global vars cipherSuites and supportedSignatureAlgorithms,
|
||||
// we'll back them up and restore after running the tests.
|
||||
|
@ -275,12 +280,12 @@ func TestUTLSHandshakeClientParrotChrome_58(t *testing.T) {
|
|||
supportedSignatureAlgorithms = supportedSignatureAlgorithmsBackup
|
||||
}()
|
||||
|
||||
testUTLSHandshakeClientECDHE_ECDSA_AES128_GCM_SHA256(t, helloID)
|
||||
//testUTLSHandshakeClientECDHE_ECDSA_AES128_GCM_SHA256(t, helloID)
|
||||
testUTLSHandshakeClientECDHE_RSA_AES128_GCM_SHA256(t, helloID)
|
||||
testUTLSHandshakeClientECDHE_ECDSA_AES256_GCM_SHA256(t, helloID)
|
||||
//testUTLSHandshakeClientECDHE_ECDSA_AES256_GCM_SHA256(t, helloID)
|
||||
testUTLSHandshakeClientECDHE_RSA_AES256_GCM_SHA256(t, helloID)
|
||||
|
||||
testUTLSHandshakeClientECDHE_ECDSA_WITH_CHACHA20_POLY1305(t, helloID)
|
||||
//testUTLSHandshakeClientECDHE_ECDSA_WITH_CHACHA20_POLY1305(t, helloID)
|
||||
testUTLSHandshakeClientECDHE_RSA_WITH_CHACHA20_POLY1305(t, helloID)
|
||||
|
||||
testUTLSHandshakeClientECDHE_RSA_AES128_CBC_SHA(t, helloID)
|
||||
|
@ -295,9 +300,12 @@ func TestUTLSHandshakeClientParrotFirefox_55(t *testing.T) {
|
|||
|
||||
// As this package sometimes has to modify global vars cipherSuites and supportedSignatureAlgorithms,
|
||||
// we'll back them up and restore after running the tests.
|
||||
cipherSuitesBackup := make([]*cipherSuite, len(cipherSuites))
|
||||
supportedSignatureAlgorithmsBackup := make([]signatureAndHash, len(supportedSignatureAlgorithms))
|
||||
copy(cipherSuitesBackup, cipherSuites)
|
||||
copy(supportedSignatureAlgorithmsBackup, supportedSignatureAlgorithms)
|
||||
defer func() {
|
||||
cipherSuites = cipherSuitesBackup
|
||||
supportedSignatureAlgorithms = supportedSignatureAlgorithmsBackup
|
||||
}()
|
||||
|
||||
|
@ -307,7 +315,7 @@ func TestUTLSHandshakeClientParrotFirefox_55(t *testing.T) {
|
|||
testUTLSHandshakeClientECDHE_ECDSA_WITH_CHACHA20_POLY1305(t, helloID)
|
||||
testUTLSHandshakeClientECDHE_RSA_WITH_CHACHA20_POLY1305(t, helloID)
|
||||
|
||||
testUTLSHandshakeClientECDHE_ECDSA_AES256_GCM_SHA256(t, helloID)
|
||||
//testUTLSHandshakeClientECDHE_ECDSA_AES256_GCM_SHA256(t, helloID) TODO: enable when OpenSSL supports it
|
||||
testUTLSHandshakeClientECDHE_RSA_AES256_GCM_SHA256(t, helloID)
|
||||
|
||||
testUTLSHandshakeClientECDHE_ECDSA_AES256_CBC_SHA(t, helloID)
|
||||
|
@ -315,8 +323,6 @@ func TestUTLSHandshakeClientParrotFirefox_55(t *testing.T) {
|
|||
|
||||
testUTLSHandshakeClientECDHE_RSA_AES256_CBC_SHA(t, helloID)
|
||||
testUTLSHandshakeClientECDHE_RSA_AES128_CBC_SHA(t, helloID)
|
||||
|
||||
testUTLSHandshakeClientRSA_AES128_GCM_SHA256(t, helloID)
|
||||
}
|
||||
|
||||
func getUTLSTestConfig() *Config {
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue