mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-03 20:17:36 +03:00
Fix tests after a merge
This commit is contained in:
parent
ceee37ab69
commit
9369e476d0
3 changed files with 21 additions and 61 deletions
|
@ -10,6 +10,7 @@ import (
|
|||
"crypto/hmac"
|
||||
"crypto/rsa"
|
||||
"errors"
|
||||
"fmt"
|
||||
"hash"
|
||||
"sync/atomic"
|
||||
"time"
|
||||
|
|
41
tls_test.go
41
tls_test.go
|
@ -359,47 +359,6 @@ func TestVerifyHostname(t *testing.T) {
|
|||
}
|
||||
}
|
||||
|
||||
func TestVerifyHostnameResumed(t *testing.T) {
|
||||
t.Run("TLSv12", func(t *testing.T) { testVerifyHostnameResumed(t, VersionTLS12) })
|
||||
t.Run("TLSv13", func(t *testing.T) { testVerifyHostnameResumed(t, VersionTLS13) })
|
||||
}
|
||||
|
||||
func testVerifyHostnameResumed(t *testing.T, version uint16) {
|
||||
testenv.MustHaveExternalNetwork(t)
|
||||
|
||||
config := &Config{
|
||||
MaxVersion: version,
|
||||
ClientSessionCache: NewLRUClientSessionCache(32),
|
||||
}
|
||||
for i := 0; i < 2; i++ {
|
||||
c, err := Dial("tcp", "mail.google.com:https", config)
|
||||
if err != nil {
|
||||
t.Fatalf("Dial #%d: %v", i, err)
|
||||
}
|
||||
cs := c.ConnectionState()
|
||||
if i > 0 && !cs.DidResume {
|
||||
t.Fatalf("Subsequent connection unexpectedly didn't resume")
|
||||
}
|
||||
if cs.Version != version {
|
||||
t.Fatalf("Unexpectedly negotiated version %x", cs.Version)
|
||||
}
|
||||
if cs.VerifiedChains == nil {
|
||||
t.Fatalf("Dial #%d: cs.VerifiedChains == nil", i)
|
||||
}
|
||||
if err := c.VerifyHostname("mail.google.com"); err != nil {
|
||||
t.Fatalf("verify mail.google.com #%d: %v", i, err)
|
||||
}
|
||||
// Give the client a chance to read the server session tickets.
|
||||
c.SetReadDeadline(time.Now().Add(500 * time.Millisecond))
|
||||
if _, err := c.Read(make([]byte, 1)); err != nil {
|
||||
if err, ok := err.(net.Error); !ok || !err.Timeout() {
|
||||
t.Fatal(err)
|
||||
}
|
||||
}
|
||||
c.Close()
|
||||
}
|
||||
}
|
||||
|
||||
func TestConnCloseBreakingWrite(t *testing.T) {
|
||||
ln := newLocalListener(t)
|
||||
defer ln.Close()
|
||||
|
|
|
@ -135,7 +135,7 @@ func TestUTLSHandshakeClientParrotChrome_58_setclienthello(t *testing.T) {
|
|||
opensslCipherName := "ECDHE-RSA-AES128-GCM-SHA256"
|
||||
test := &clientTest{
|
||||
name: "UTLS-setclienthello-" + opensslCipherName + "-" + helloID.Str(),
|
||||
command: []string{"openssl", "s_server", "-cipher", opensslCipherName},
|
||||
args: []string{"openssl", "s_server", "-cipher", opensslCipherName},
|
||||
config: config,
|
||||
}
|
||||
|
||||
|
@ -152,7 +152,7 @@ func TestUTLSHelloRetryRequest(t *testing.T) {
|
|||
|
||||
test := &clientTest{
|
||||
name: "UTLS-HelloRetryRequest-" + helloID.Str(),
|
||||
command: []string{"openssl", "s_server", "-cipher", "ECDHE-RSA-AES128-GCM-SHA256", "-curves", "P-256"},
|
||||
args: []string{"openssl", "s_server", "-cipher", "ECDHE-RSA-AES128-GCM-SHA256", "-curves", "P-256"},
|
||||
config: config,
|
||||
}
|
||||
|
||||
|
@ -184,7 +184,7 @@ func testUTLSHandshakeClientECDHE_RSA_AES128_CBC_SHA(t *testing.T, helloID Clien
|
|||
opensslCipherName := "ECDHE-RSA-AES128-SHA"
|
||||
test := &clientTest{
|
||||
name: "UTLS-" + opensslCipherName + "-" + helloID.Str(),
|
||||
command: []string{"openssl", "s_server", "-cipher", opensslCipherName},
|
||||
args: []string{"openssl", "s_server", "-cipher", opensslCipherName},
|
||||
config: config,
|
||||
}
|
||||
|
||||
|
@ -196,7 +196,7 @@ func testUTLSHandshakeClientECDHE_RSA_AES256_CBC_SHA(t *testing.T, helloID Clien
|
|||
opensslCipherName := "ECDHE-RSA-AES256-SHA"
|
||||
test := &clientTest{
|
||||
name: "UTLS-" + opensslCipherName + "-" + helloID.Str(),
|
||||
command: []string{"openssl", "s_server", "-cipher", opensslCipherName},
|
||||
args: []string{"openssl", "s_server", "-cipher", opensslCipherName},
|
||||
config: config,
|
||||
}
|
||||
|
||||
|
@ -208,7 +208,7 @@ func testUTLSHandshakeClientECDHE_ECDSA_AES128_CBC_SHA(t *testing.T, helloID Cli
|
|||
opensslCipherName := "ECDHE-ECDSA-AES128-SHA"
|
||||
test := &clientTest{
|
||||
name: "UTLS-" + opensslCipherName + "-" + helloID.Str(),
|
||||
command: []string{"openssl", "s_server", "-cipher", opensslCipherName},
|
||||
args: []string{"openssl", "s_server", "-cipher", opensslCipherName},
|
||||
cert: testECDSACertificate,
|
||||
key: testECDSAPrivateKey,
|
||||
config: config,
|
||||
|
@ -222,7 +222,7 @@ func testUTLSHandshakeClientECDHE_ECDSA_AES256_CBC_SHA(t *testing.T, helloID Cli
|
|||
opensslCipherName := "ECDHE-ECDSA-AES256-SHA"
|
||||
test := &clientTest{
|
||||
name: "UTLS-" + opensslCipherName + "-" + helloID.Str(),
|
||||
command: []string{"openssl", "s_server", "-cipher", opensslCipherName},
|
||||
args: []string{"openssl", "s_server", "-cipher", opensslCipherName},
|
||||
cert: testECDSACertificate,
|
||||
key: testECDSAPrivateKey,
|
||||
config: config,
|
||||
|
@ -236,7 +236,7 @@ func testUTLSHandshakeClientRSA_AES128_GCM_SHA256(t *testing.T, helloID ClientHe
|
|||
opensslCipherName := "AES128-GCM-SHA256"
|
||||
test := &clientTest{
|
||||
name: "UTLS-" + opensslCipherName + "-" + helloID.Str(),
|
||||
command: []string{"openssl", "s_server", "-cipher", opensslCipherName},
|
||||
args: []string{"openssl", "s_server", "-cipher", opensslCipherName},
|
||||
config: config,
|
||||
}
|
||||
|
||||
|
@ -249,7 +249,7 @@ func testUTLSHandshakeClientECDHE_ECDSA_AES128_GCM_SHA256(t *testing.T, helloID
|
|||
opensslCipherName := "ECDHE-ECDSA-AES128-GCM-SHA256"
|
||||
test := &clientTest{
|
||||
name: "UTLS-" + opensslCipherName + "-" + helloID.Str(),
|
||||
command: []string{"openssl", "s_server", "-cipher", opensslCipherName},
|
||||
args: []string{"openssl", "s_server", "-cipher", opensslCipherName},
|
||||
cert: testECDSACertificate,
|
||||
key: testECDSAPrivateKey,
|
||||
config: config,
|
||||
|
@ -264,7 +264,7 @@ func testUTLSHandshakeClientECDHE_RSA_AES128_GCM_SHA256(t *testing.T, helloID Cl
|
|||
opensslCipherName := "ECDHE-RSA-AES128-GCM-SHA256"
|
||||
test := &clientTest{
|
||||
name: "UTLS-" + opensslCipherName + "-" + helloID.Str(),
|
||||
command: []string{"openssl", "s_server", "-cipher", opensslCipherName},
|
||||
args: []string{"openssl", "s_server", "-cipher", opensslCipherName},
|
||||
config: config,
|
||||
}
|
||||
|
||||
|
@ -276,7 +276,7 @@ func testUTLSHandshakeClientECDHE_ECDSA_AES256_GCM_SHA256(t *testing.T, helloID
|
|||
opensslCipherName := "ECDHE-ECDSA-AES256-GCM-SHA256"
|
||||
test := &clientTest{
|
||||
name: "UTLS-" + opensslCipherName + "-" + helloID.Str(),
|
||||
command: []string{"openssl", "s_server", "-cipher", opensslCipherName},
|
||||
args: []string{"openssl", "s_server", "-cipher", opensslCipherName},
|
||||
cert: testECDSACertificate,
|
||||
key: testECDSAPrivateKey,
|
||||
config: config,
|
||||
|
@ -290,7 +290,7 @@ func testUTLSHandshakeClientECDHE_RSA_AES256_GCM_SHA256(t *testing.T, helloID Cl
|
|||
opensslCipherName := "ECDHE-RSA-AES128-GCM-SHA256"
|
||||
test := &clientTest{
|
||||
name: "UTLS-" + opensslCipherName + "-" + helloID.Str(),
|
||||
command: []string{"openssl", "s_server", "-cipher", opensslCipherName},
|
||||
args: []string{"openssl", "s_server", "-cipher", opensslCipherName},
|
||||
config: config,
|
||||
}
|
||||
|
||||
|
@ -303,7 +303,7 @@ func testUTLSHandshakeClientTLS13_AES_128_GCM_SHA256(t *testing.T, helloID Clien
|
|||
opensslCipherName := "TLS_AES_128_GCM_SHA256"
|
||||
test := &clientTest{
|
||||
name: "UTLS-" + opensslCipherName + "-" + helloID.Str(),
|
||||
command: []string{"openssl", "s_server", "-cipher", opensslCipherName},
|
||||
args: []string{"openssl", "s_server", "-cipher", opensslCipherName},
|
||||
config: config,
|
||||
}
|
||||
|
||||
|
@ -316,7 +316,7 @@ func testUTLSHandshakeClientTLS13_AES_256_GCM_SHA384(t *testing.T, helloID Clien
|
|||
opensslCipherName := "TLS_AES_256_GCM_SHA384"
|
||||
test := &clientTest{
|
||||
name: "UTLS-" + opensslCipherName + "-" + helloID.Str(),
|
||||
command: []string{"openssl", "s_server", "-cipher", opensslCipherName},
|
||||
args: []string{"openssl", "s_server", "-cipher", opensslCipherName},
|
||||
config: config,
|
||||
}
|
||||
|
||||
|
@ -329,7 +329,7 @@ func testUTLSHandshakeClientTLS13_CHACHA20_POLY1305_SHA256(t *testing.T, helloID
|
|||
opensslCipherName := "TLS_CHACHA20_POLY1305_SHA256"
|
||||
test := &clientTest{
|
||||
name: "UTLS-" + opensslCipherName + "-" + helloID.Str(),
|
||||
command: []string{"openssl", "s_server", "-cipher", opensslCipherName},
|
||||
args: []string{"openssl", "s_server", "-cipher", opensslCipherName},
|
||||
config: config,
|
||||
}
|
||||
|
||||
|
@ -342,7 +342,7 @@ func testUTLSHandshakeClientECDHE_RSA_WITH_CHACHA20_POLY1305(t *testing.T, hello
|
|||
opensslCipherName := "ECDHE-RSA-CHACHA20-POLY1305"
|
||||
test := &clientTest{
|
||||
name: "UTLS-" + opensslCipherName + "-" + helloID.Str(),
|
||||
command: []string{"openssl", "s_server", "-cipher", opensslCipherName},
|
||||
args: []string{"openssl", "s_server", "-cipher", opensslCipherName},
|
||||
config: config,
|
||||
}
|
||||
|
||||
|
@ -355,7 +355,7 @@ func testUTLSHandshakeClientECDHE_ECDSA_WITH_CHACHA20_POLY1305(t *testing.T, hel
|
|||
opensslCipherName := "ECDHE-ECDSA-CHACHA20-POLY1305"
|
||||
test := &clientTest{
|
||||
name: "UTLS-" + opensslCipherName + "-" + helloID.Str(),
|
||||
command: []string{"openssl", "s_server", "-cipher", opensslCipherName},
|
||||
args: []string{"openssl", "s_server", "-cipher", opensslCipherName},
|
||||
config: config,
|
||||
cert: testECDSACertificate,
|
||||
key: testECDSAPrivateKey,
|
||||
|
@ -367,11 +367,11 @@ func testUTLSHandshakeClientECDHE_ECDSA_WITH_CHACHA20_POLY1305(t *testing.T, hel
|
|||
func runUTLSClientTestForVersion(t *testing.T, template *clientTest, prefix, option string, helloID ClientHelloID) {
|
||||
test := *template
|
||||
test.name = prefix + test.name
|
||||
if len(test.command) == 0 {
|
||||
test.command = defaultClientCommand
|
||||
if len(test.args) == 0 {
|
||||
test.args = defaultClientCommand
|
||||
}
|
||||
test.command = append([]string(nil), test.command...)
|
||||
test.command = append(test.command, option)
|
||||
test.args = append([]string(nil), test.args...)
|
||||
test.args = append(test.args, option)
|
||||
test.runUTLS(t, *update, helloID)
|
||||
}
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue