mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-03 20:17:36 +03:00
sync: merge changes from go 1.23.4
This commit is contained in:
commit
cefe226467
98 changed files with 8089 additions and 4530 deletions
|
@ -21,13 +21,13 @@ import (
|
|||
"os/exec"
|
||||
"path/filepath"
|
||||
"runtime"
|
||||
"slices"
|
||||
"strings"
|
||||
"testing"
|
||||
"time"
|
||||
)
|
||||
|
||||
func testClientHello(t *testing.T, serverConfig *Config, m handshakeMessage) {
|
||||
t.Helper()
|
||||
testClientHelloFailure(t, serverConfig, m, "")
|
||||
}
|
||||
|
||||
|
@ -53,32 +53,41 @@ func testClientHelloFailure(t *testing.T, serverConfig *Config, m handshakeMessa
|
|||
ctx := context.Background()
|
||||
conn := Server(s, serverConfig)
|
||||
ch, err := conn.readClientHello(ctx)
|
||||
if err == nil && conn.vers == VersionTLS13 {
|
||||
if conn.vers == VersionTLS13 {
|
||||
hs := serverHandshakeStateTLS13{
|
||||
c: conn,
|
||||
ctx: ctx,
|
||||
clientHello: ch,
|
||||
}
|
||||
err = hs.processClientHello()
|
||||
} else if err == nil {
|
||||
if err == nil {
|
||||
err = hs.processClientHello()
|
||||
}
|
||||
if err == nil {
|
||||
err = hs.checkForResumption()
|
||||
}
|
||||
if err == nil {
|
||||
err = hs.pickCertificate()
|
||||
}
|
||||
} else {
|
||||
hs := serverHandshakeState{
|
||||
c: conn,
|
||||
ctx: ctx,
|
||||
clientHello: ch,
|
||||
}
|
||||
err = hs.processClientHello()
|
||||
if err == nil {
|
||||
err = hs.processClientHello()
|
||||
}
|
||||
if err == nil {
|
||||
err = hs.pickCipherSuite()
|
||||
}
|
||||
}
|
||||
s.Close()
|
||||
t.Helper()
|
||||
if len(expectedSubStr) == 0 {
|
||||
if err != nil && err != io.EOF {
|
||||
t.Helper()
|
||||
t.Errorf("Got error: %s; expected to succeed", err)
|
||||
}
|
||||
} else if err == nil || !strings.Contains(err.Error(), expectedSubStr) {
|
||||
t.Helper()
|
||||
t.Errorf("Got error: %v; expected to match substring '%s'", err, expectedSubStr)
|
||||
}
|
||||
}
|
||||
|
@ -499,6 +508,7 @@ func testCrossVersionResume(t *testing.T, version uint16) {
|
|||
ClientSessionCache: NewLRUClientSessionCache(1),
|
||||
ServerName: "servername",
|
||||
MinVersion: VersionTLS12,
|
||||
Time: testTime, // [uTLS]
|
||||
}
|
||||
|
||||
// Establish a session at TLS 1.3.
|
||||
|
@ -651,7 +661,7 @@ func (test *serverTest) loadData() (flows [][]byte, err error) {
|
|||
}
|
||||
|
||||
func (test *serverTest) run(t *testing.T, write bool) {
|
||||
var clientConn, serverConn net.Conn
|
||||
var serverConn net.Conn
|
||||
var recordingConn *recordingConn
|
||||
var childProcess *exec.Cmd
|
||||
|
||||
|
@ -668,65 +678,33 @@ func (test *serverTest) run(t *testing.T, write bool) {
|
|||
}
|
||||
}()
|
||||
} else {
|
||||
clientConn, serverConn = localPipe(t)
|
||||
flows, err := test.loadData()
|
||||
if err != nil {
|
||||
t.Fatalf("Failed to load data from %s", test.dataPath())
|
||||
}
|
||||
serverConn = &replayingConn{t: t, flows: flows, reading: true}
|
||||
}
|
||||
config := test.config
|
||||
if config == nil {
|
||||
config = testConfig
|
||||
}
|
||||
server := Server(serverConn, config)
|
||||
connStateChan := make(chan ConnectionState, 1)
|
||||
go func() {
|
||||
_, err := server.Write([]byte("hello, world\n"))
|
||||
if len(test.expectHandshakeErrorIncluding) > 0 {
|
||||
if err == nil {
|
||||
t.Errorf("Error expected, but no error returned")
|
||||
} else if s := err.Error(); !strings.Contains(s, test.expectHandshakeErrorIncluding) {
|
||||
t.Errorf("Error expected containing '%s' but got '%s'", test.expectHandshakeErrorIncluding, s)
|
||||
}
|
||||
} else {
|
||||
if err != nil {
|
||||
t.Logf("Error from Server.Write: '%s'", err)
|
||||
}
|
||||
}
|
||||
server.Close()
|
||||
serverConn.Close()
|
||||
connStateChan <- server.ConnectionState()
|
||||
}()
|
||||
|
||||
if !write {
|
||||
flows, err := test.loadData()
|
||||
_, err := server.Write([]byte("hello, world\n"))
|
||||
if len(test.expectHandshakeErrorIncluding) > 0 {
|
||||
if err == nil {
|
||||
t.Errorf("Error expected, but no error returned")
|
||||
} else if s := err.Error(); !strings.Contains(s, test.expectHandshakeErrorIncluding) {
|
||||
t.Errorf("Error expected containing '%s' but got '%s'", test.expectHandshakeErrorIncluding, s)
|
||||
}
|
||||
} else {
|
||||
if err != nil {
|
||||
t.Fatalf("%s: failed to load data from %s", test.name, test.dataPath())
|
||||
t.Logf("Error from Server.Write: '%s'", err)
|
||||
}
|
||||
for i, b := range flows {
|
||||
if i%2 == 0 {
|
||||
if *fast {
|
||||
clientConn.SetWriteDeadline(time.Now().Add(1 * time.Second))
|
||||
} else {
|
||||
clientConn.SetWriteDeadline(time.Now().Add(1 * time.Minute))
|
||||
}
|
||||
clientConn.Write(b)
|
||||
continue
|
||||
}
|
||||
bb := make([]byte, len(b))
|
||||
if *fast {
|
||||
clientConn.SetReadDeadline(time.Now().Add(1 * time.Second))
|
||||
} else {
|
||||
clientConn.SetReadDeadline(time.Now().Add(1 * time.Minute))
|
||||
}
|
||||
n, err := io.ReadFull(clientConn, bb)
|
||||
if err != nil {
|
||||
t.Fatalf("%s #%d: %s\nRead %d, wanted %d, got %x, wanted %x\n", test.name, i+1, err, n, len(bb), bb[:n], b)
|
||||
}
|
||||
if !bytes.Equal(b, bb) {
|
||||
t.Fatalf("%s #%d: mismatch on read: got:%x want:%x", test.name, i+1, bb, b)
|
||||
}
|
||||
}
|
||||
clientConn.Close()
|
||||
}
|
||||
server.Close()
|
||||
|
||||
connState := <-connStateChan
|
||||
connState := server.ConnectionState()
|
||||
peerCerts := connState.PeerCertificates
|
||||
if len(peerCerts) == len(test.expectedPeerCerts) {
|
||||
for i, peerCert := range peerCerts {
|
||||
|
@ -746,6 +724,7 @@ func (test *serverTest) run(t *testing.T, write bool) {
|
|||
}
|
||||
|
||||
if write {
|
||||
serverConn.Close()
|
||||
path := test.dataPath()
|
||||
out, err := os.OpenFile(path, os.O_WRONLY|os.O_CREATE|os.O_TRUNC, 0644)
|
||||
if err != nil {
|
||||
|
@ -913,10 +892,52 @@ func TestHandshakeServerHelloRetryRequest(t *testing.T) {
|
|||
name: "HelloRetryRequest",
|
||||
command: []string{"openssl", "s_client", "-no_ticket", "-ciphersuites", "TLS_CHACHA20_POLY1305_SHA256", "-curves", "X25519:P-256"},
|
||||
config: config,
|
||||
validate: func(cs ConnectionState) error {
|
||||
if !cs.testingOnlyDidHRR {
|
||||
return errors.New("expected HelloRetryRequest")
|
||||
}
|
||||
return nil
|
||||
},
|
||||
}
|
||||
runServerTestTLS13(t, test)
|
||||
}
|
||||
|
||||
// TestHandshakeServerKeySharePreference checks that we prefer a key share even
|
||||
// if it's later in the CurvePreferences order.
|
||||
func TestHandshakeServerKeySharePreference(t *testing.T) {
|
||||
config := testConfig.Clone()
|
||||
config.CurvePreferences = []CurveID{X25519, CurveP256}
|
||||
|
||||
test := &serverTest{
|
||||
name: "KeySharePreference",
|
||||
command: []string{"openssl", "s_client", "-no_ticket", "-ciphersuites", "TLS_CHACHA20_POLY1305_SHA256", "-curves", "P-256:X25519"},
|
||||
config: config,
|
||||
validate: func(cs ConnectionState) error {
|
||||
if cs.testingOnlyDidHRR {
|
||||
return errors.New("unexpected HelloRetryRequest")
|
||||
}
|
||||
return nil
|
||||
},
|
||||
}
|
||||
runServerTestTLS13(t, test)
|
||||
}
|
||||
|
||||
// TestHandshakeServerUnsupportedKeyShare tests a client that sends a key share
|
||||
// that's not in the supported groups list.
|
||||
func TestHandshakeServerUnsupportedKeyShare(t *testing.T) {
|
||||
pk, _ := ecdh.X25519().GenerateKey(rand.Reader)
|
||||
clientHello := &clientHelloMsg{
|
||||
vers: VersionTLS12,
|
||||
random: make([]byte, 32),
|
||||
supportedVersions: []uint16{VersionTLS13},
|
||||
cipherSuites: []uint16{TLS_CHACHA20_POLY1305_SHA256},
|
||||
compressionMethods: []uint8{compressionNone},
|
||||
keyShares: []keyShare{{group: X25519, data: pk.PublicKey().Bytes()}},
|
||||
supportedCurves: []CurveID{CurveP256},
|
||||
}
|
||||
testClientHelloFailure(t, testConfig, clientHello, "client sent key share for group it does not support")
|
||||
}
|
||||
|
||||
func TestHandshakeServerALPN(t *testing.T) {
|
||||
config := testConfig.Clone()
|
||||
config.NextProtos = []string{"proto1", "proto2"}
|
||||
|
@ -1008,7 +1029,7 @@ func TestHandshakeServerSNI(t *testing.T) {
|
|||
runServerTestTLS12(t, test)
|
||||
}
|
||||
|
||||
// TestHandshakeServerSNICertForName is similar to TestHandshakeServerSNI, but
|
||||
// TestHandshakeServerSNIGetCertificate is similar to TestHandshakeServerSNI, but
|
||||
// tests the dynamic GetCertificate method
|
||||
func TestHandshakeServerSNIGetCertificate(t *testing.T) {
|
||||
config := testConfig.Clone()
|
||||
|
@ -1028,7 +1049,7 @@ func TestHandshakeServerSNIGetCertificate(t *testing.T) {
|
|||
runServerTestTLS12(t, test)
|
||||
}
|
||||
|
||||
// TestHandshakeServerSNICertForNameNotFound is similar to
|
||||
// TestHandshakeServerSNIGetCertificateNotFound is similar to
|
||||
// TestHandshakeServerSNICertForName, but tests to make sure that when the
|
||||
// GetCertificate method doesn't return a cert, we fall back to what's in
|
||||
// the NameToCertificate map.
|
||||
|
@ -1046,7 +1067,7 @@ func TestHandshakeServerSNIGetCertificateNotFound(t *testing.T) {
|
|||
runServerTestTLS12(t, test)
|
||||
}
|
||||
|
||||
// TestHandshakeServerSNICertForNameError tests to make sure that errors in
|
||||
// TestHandshakeServerSNIGetCertificateError tests to make sure that errors in
|
||||
// GetCertificate result in a tls alert.
|
||||
func TestHandshakeServerSNIGetCertificateError(t *testing.T) {
|
||||
const errMsg = "TestHandshakeServerSNIGetCertificateError error"
|
||||
|
@ -1280,37 +1301,14 @@ func benchmarkHandshakeServer(b *testing.B, version uint16, cipherSuite uint16,
|
|||
serverConn.Close()
|
||||
flows := serverConn.(*recordingConn).flows
|
||||
|
||||
feeder := make(chan struct{})
|
||||
clientConn, serverConn = localPipe(b)
|
||||
|
||||
go func() {
|
||||
for range feeder {
|
||||
for i, f := range flows {
|
||||
if i%2 == 0 {
|
||||
clientConn.Write(f)
|
||||
continue
|
||||
}
|
||||
ff := make([]byte, len(f))
|
||||
n, err := io.ReadFull(clientConn, ff)
|
||||
if err != nil {
|
||||
b.Errorf("#%d: %s\nRead %d, wanted %d, got %x, wanted %x\n", i+1, err, n, len(ff), ff[:n], f)
|
||||
}
|
||||
if !bytes.Equal(f, ff) {
|
||||
b.Errorf("#%d: mismatch on read: got:%x want:%x", i+1, ff, f)
|
||||
}
|
||||
}
|
||||
}
|
||||
}()
|
||||
|
||||
b.ResetTimer()
|
||||
for i := 0; i < b.N; i++ {
|
||||
feeder <- struct{}{}
|
||||
server := Server(serverConn, config)
|
||||
replay := &replayingConn{t: b, flows: slices.Clone(flows), reading: true}
|
||||
server := Server(replay, config)
|
||||
if err := server.Handshake(); err != nil {
|
||||
b.Fatalf("handshake failed: %v", err)
|
||||
}
|
||||
}
|
||||
close(feeder)
|
||||
}
|
||||
|
||||
func BenchmarkHandshakeServer(b *testing.B) {
|
||||
|
@ -1942,6 +1940,7 @@ func TestAESCipherReorderingTLS13(t *testing.T) {
|
|||
supportedVersions: []uint16{VersionTLS13},
|
||||
compressionMethods: []uint8{compressionNone},
|
||||
keyShares: []keyShare{{group: X25519, data: pk.PublicKey().Bytes()}},
|
||||
supportedCurves: []CurveID{X25519},
|
||||
},
|
||||
}
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue