crypto-tls-bogo-shim/tls_shim.go
Peter Wu 3b70371d64 Enable client tests
Tested with the initial tls-tris client support branch which includes
basic RSASSA-PSS support. Coverage changed from ... to ...:

    0/3509/3692/3692/4136
    0/2784/3195/3195/4136
2017-10-02 16:54:31 +01:00

89 lines
1.6 KiB
Go

package main
import (
"crypto/tls"
"flag"
"fmt"
"io"
"log"
"net"
"os"
)
func main() {
fs := &flag.FlagSet{}
var (
port = fs.String("port", "", "")
server = fs.Bool("server", false, "")
dtls = fs.Bool("dtls", false, "")
keyFile = fs.String("key-file", "", "")
certFile = fs.String("cert-file", "", "")
resumeCount = fs.Int("resume-count", 0, "")
minVersion = fs.Int("min-version", tls.VersionSSL30, "")
maxVersion = fs.Int("max-version", tls.VersionTLS13, "")
)
fmt.Println("Args:", os.Args[1:])
if err := fs.Parse(os.Args[1:]); err != nil {
log.Println(err)
if os.Getenv("FAIL") == "1" {
os.Exit(1)
} else {
os.Exit(89)
}
}
if *dtls {
os.Exit(89)
}
if *port == "" {
log.Fatal("missing -port")
}
config := &tls.Config{
MinVersion: uint16(*minVersion),
MaxVersion: uint16(*maxVersion),
InsecureSkipVerify: true,
}
if *keyFile != "" {
cert, err := tls.LoadX509KeyPair(*certFile, *keyFile)
if err != nil {
log.Fatal(err)
}
config.Certificates = []tls.Certificate{cert}
}
for i := 0; i < *resumeCount+1; i++ {
conn, err := net.Dial("tcp", net.JoinHostPort("localhost", *port))
if err != nil {
log.Fatal(err)
}
var tlsConn *tls.Conn
if *server {
tlsConn = tls.Server(conn, config)
} else {
tlsConn = tls.Client(conn, config)
}
for {
buf := make([]byte, 500)
n, err := tlsConn.Read(buf)
if err == io.EOF {
break
}
if err != nil {
log.Fatal(err)
}
buf = buf[:n]
for i := range buf {
buf[i] ^= 0xff
}
if _, err := tlsConn.Write(buf); err != nil {
log.Fatal(err)
}
}
}
}