mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-03 20:17:36 +03:00
crypto/tls: test with FIPS 140-3 TLS mode
For tests that are interested in testing the difference between TLS in FIPS 140-3 required mode or otherwise two new helpers are introduced, runWithFIPSEnabled and runWithFIPSDisabled. They take care of forcing the correct TLS FIPS 140-3 state regardless of the overal GODEBUG=fips state, and restoring it afterwards. For the tests that use features or test data not appropriate for TLS in FIPS 140-3 required mode we add skips. For some tests we can make them appropriate for both TLS FIPS 140-3 required or not by tweaking some parameters that weren't important to the subject under test, but would otherwise preclude TLS FIPS 140-3 required mode (e.g. because they used TLS 1.0 when the test could use TLS 1.2 instead). For others, switching test certificates to a RSA 2048 hierarchy is sufficient. We avoid regenerating the existing RSA 1024 certs as 2048 since it would invalidate recorded static flow data. Tests that rely on static message flows (primarily the client and server handshake) tests are skipped due to FIPS mode being non-deterministic and inappropriate for this style of testing. Change-Id: I311f3828dac890bb3ff8ebda6ed73d50f0797110 Reviewed-on: https://go-review.googlesource.com/c/go/+/629736 Reviewed-by: Roland Shoemaker <roland@golang.org> Reviewed-by: Filippo Valsorda <filippo@golang.org> LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com> Reviewed-by: Dmitri Shuralyov <dmitshur@google.com>
This commit is contained in:
parent
212bbb2c77
commit
4cb059fbbf
8 changed files with 238 additions and 118 deletions
43
tls_test.go
43
tls_test.go
|
@ -13,6 +13,7 @@ import (
|
|||
"crypto/elliptic"
|
||||
"crypto/internal/hpke"
|
||||
"crypto/rand"
|
||||
"crypto/tls/internal/fips140tls"
|
||||
"crypto/x509"
|
||||
"crypto/x509/pkix"
|
||||
"encoding/asn1"
|
||||
|
@ -178,6 +179,40 @@ func newLocalListener(t testing.TB) net.Listener {
|
|||
return ln
|
||||
}
|
||||
|
||||
func runWithFIPSEnabled(t *testing.T, testFunc func(t *testing.T)) {
|
||||
originalFIPS := fips140tls.Required()
|
||||
defer func() {
|
||||
if originalFIPS {
|
||||
fips140tls.Force()
|
||||
} else {
|
||||
fips140tls.TestingOnlyAbandon()
|
||||
}
|
||||
}()
|
||||
|
||||
fips140tls.Force()
|
||||
t.Run("fips140tls", testFunc)
|
||||
}
|
||||
|
||||
func runWithFIPSDisabled(t *testing.T, testFunc func(t *testing.T)) {
|
||||
originalFIPS := fips140tls.Required()
|
||||
defer func() {
|
||||
if originalFIPS {
|
||||
fips140tls.Force()
|
||||
} else {
|
||||
fips140tls.TestingOnlyAbandon()
|
||||
}
|
||||
}()
|
||||
|
||||
fips140tls.TestingOnlyAbandon()
|
||||
t.Run("no-fips140tls", testFunc)
|
||||
}
|
||||
|
||||
func skipFIPS(t *testing.T) {
|
||||
if fips140tls.Required() {
|
||||
t.Skip("skipping test in FIPS mode")
|
||||
}
|
||||
}
|
||||
|
||||
func TestDialTimeout(t *testing.T) {
|
||||
if testing.Short() {
|
||||
t.Skip("skipping in short mode")
|
||||
|
@ -1114,6 +1149,8 @@ func TestConnectionStateMarshal(t *testing.T) {
|
|||
}
|
||||
|
||||
func TestConnectionState(t *testing.T) {
|
||||
skipFIPS(t) // Test certificates not FIPS compatible.
|
||||
|
||||
issuer, err := x509.ParseCertificate(testRSACertificateIssuer)
|
||||
if err != nil {
|
||||
panic(err)
|
||||
|
@ -1254,6 +1291,8 @@ func TestBuildNameToCertificate_doesntModifyCertificates(t *testing.T) {
|
|||
func testingKey(s string) string { return strings.ReplaceAll(s, "TESTING KEY", "PRIVATE KEY") }
|
||||
|
||||
func TestClientHelloInfo_SupportsCertificate(t *testing.T) {
|
||||
skipFIPS(t) // Test certificates not FIPS compatible.
|
||||
|
||||
rsaCert := &Certificate{
|
||||
Certificate: [][]byte{testRSACertificate},
|
||||
PrivateKey: testRSAPrivateKey,
|
||||
|
@ -1703,6 +1742,8 @@ func TestPKCS1OnlyCert(t *testing.T) {
|
|||
}
|
||||
|
||||
func TestVerifyCertificates(t *testing.T) {
|
||||
skipFIPS(t) // Test certificates not FIPS compatible.
|
||||
|
||||
// See https://go.dev/issue/31641.
|
||||
t.Run("TLSv12", func(t *testing.T) { testVerifyCertificates(t, VersionTLS12) })
|
||||
t.Run("TLSv13", func(t *testing.T) { testVerifyCertificates(t, VersionTLS13) })
|
||||
|
@ -1847,6 +1888,8 @@ func testVerifyCertificates(t *testing.T, version uint16) {
|
|||
}
|
||||
|
||||
func TestHandshakeKyber(t *testing.T) {
|
||||
skipFIPS(t) // No Kyber768 in FIPS
|
||||
|
||||
if x25519Kyber768Draft00.String() != "X25519Kyber768Draft00" {
|
||||
t.Fatalf("unexpected CurveID string: %v", x25519Kyber768Draft00.String())
|
||||
}
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue