mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-04 20:47:36 +03:00
fix: add tests and fix bugs
This commit is contained in:
parent
ed46e3def4
commit
6f87c69b6a
6 changed files with 178 additions and 30 deletions
54
tls_test.go
54
tls_test.go
|
@ -2068,6 +2068,10 @@ func TestLargeCertMsg(t *testing.T) {
|
|||
}
|
||||
|
||||
func TestECH(t *testing.T) {
|
||||
testECHSpec(t, nil, true)
|
||||
}
|
||||
|
||||
func testECHSpec(t *testing.T, spec *ClientHelloSpec, expectSuccess bool) {
|
||||
k, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
|
@ -2157,26 +2161,34 @@ func TestECH(t *testing.T) {
|
|||
{Config: echConfig, PrivateKey: echKey.Bytes(), SendAsRetry: true},
|
||||
}
|
||||
|
||||
ss, cs, err := testHandshake(t, clientConfig, serverConfig)
|
||||
if err != nil {
|
||||
t.Fatalf("unexpected failure: %s", err)
|
||||
}
|
||||
if !ss.ECHAccepted {
|
||||
t.Fatal("server ConnectionState shows ECH not accepted")
|
||||
}
|
||||
if !cs.ECHAccepted {
|
||||
t.Fatal("client ConnectionState shows ECH not accepted")
|
||||
}
|
||||
if cs.ServerName != "secret.example" || ss.ServerName != "secret.example" {
|
||||
t.Fatalf("unexpected ConnectionState.ServerName, want %q, got server:%q, client: %q", "secret.example", ss.ServerName, cs.ServerName)
|
||||
}
|
||||
if len(cs.VerifiedChains) != 1 {
|
||||
t.Fatal("unexpect number of certificate chains")
|
||||
}
|
||||
if len(cs.VerifiedChains[0]) != 1 {
|
||||
t.Fatal("unexpect number of certificates")
|
||||
}
|
||||
if !cs.VerifiedChains[0][0].Equal(secretCert) {
|
||||
t.Fatal("unexpected certificate")
|
||||
// [uTLS SECTION BEGIN]
|
||||
ss, cs, err := testUtlsHandshake(t, clientConfig, serverConfig, spec)
|
||||
if expectSuccess {
|
||||
if err != nil {
|
||||
t.Fatalf("unexpected failure: %s", err)
|
||||
}
|
||||
if !ss.ECHAccepted {
|
||||
t.Fatal("server ConnectionState shows ECH not accepted")
|
||||
}
|
||||
if !cs.ECHAccepted {
|
||||
t.Fatal("client ConnectionState shows ECH not accepted")
|
||||
}
|
||||
if cs.ServerName != "secret.example" || ss.ServerName != "secret.example" {
|
||||
t.Fatalf("unexpected ConnectionState.ServerName, want %q, got server:%q, client: %q", "secret.example", ss.ServerName, cs.ServerName)
|
||||
}
|
||||
if len(cs.VerifiedChains) != 1 {
|
||||
t.Fatal("unexpect number of certificate chains")
|
||||
}
|
||||
if len(cs.VerifiedChains[0]) != 1 {
|
||||
t.Fatal("unexpect number of certificates")
|
||||
}
|
||||
if !cs.VerifiedChains[0][0].Equal(secretCert) {
|
||||
t.Fatal("unexpected certificate")
|
||||
}
|
||||
} else {
|
||||
if err == nil {
|
||||
t.Fatalf("unexpected handshake success, expected failure")
|
||||
}
|
||||
}
|
||||
// [uTLS SECTION END]
|
||||
}
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue