|
- // Copyright 2014 The Go Authors. All rights reserved.
- // Use of this source code is governed by a BSD-style
- // license that can be found in the LICENSE file.
-
- package trs_test
-
- import (
- "crypto/tls"
- "crypto/x509"
- "log"
- "net/http"
- "net/http/httptest"
- "os"
- "time"
- )
-
- // zeroSource is an io.Reader that returns an unlimited number of zero bytes.
- type zeroSource struct{}
-
- func (zeroSource) Read(b []byte) (n int, err error) {
- for i := range b {
- b[i] = 0
- }
-
- return len(b), nil
- }
-
- func ExampleDial() {
- // Connecting with a custom root-certificate set.
-
- const rootPEM = `
- -----BEGIN CERTIFICATE-----
- MIIEBDCCAuygAwIBAgIDAjppMA0GCSqGSIb3DQEBBQUAMEIxCzAJBgNVBAYTAlVT
- MRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMRswGQYDVQQDExJHZW9UcnVzdCBHbG9i
- YWwgQ0EwHhcNMTMwNDA1MTUxNTU1WhcNMTUwNDA0MTUxNTU1WjBJMQswCQYDVQQG
- EwJVUzETMBEGA1UEChMKR29vZ2xlIEluYzElMCMGA1UEAxMcR29vZ2xlIEludGVy
- bmV0IEF1dGhvcml0eSBHMjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB
- AJwqBHdc2FCROgajguDYUEi8iT/xGXAaiEZ+4I/F8YnOIe5a/mENtzJEiaB0C1NP
- VaTOgmKV7utZX8bhBYASxF6UP7xbSDj0U/ck5vuR6RXEz/RTDfRK/J9U3n2+oGtv
- h8DQUB8oMANA2ghzUWx//zo8pzcGjr1LEQTrfSTe5vn8MXH7lNVg8y5Kr0LSy+rE
- ahqyzFPdFUuLH8gZYR/Nnag+YyuENWllhMgZxUYi+FOVvuOAShDGKuy6lyARxzmZ
- EASg8GF6lSWMTlJ14rbtCMoU/M4iarNOz0YDl5cDfsCx3nuvRTPPuj5xt970JSXC
- DTWJnZ37DhF5iR43xa+OcmkCAwEAAaOB+zCB+DAfBgNVHSMEGDAWgBTAephojYn7
- qwVkDBF9qn1luMrMTjAdBgNVHQ4EFgQUSt0GFhu89mi1dvWBtrtiGrpagS8wEgYD
- VR0TAQH/BAgwBgEB/wIBADAOBgNVHQ8BAf8EBAMCAQYwOgYDVR0fBDMwMTAvoC2g
- K4YpaHR0cDovL2NybC5nZW90cnVzdC5jb20vY3Jscy9ndGdsb2JhbC5jcmwwPQYI
- KwYBBQUHAQEEMTAvMC0GCCsGAQUFBzABhiFodHRwOi8vZ3RnbG9iYWwtb2NzcC5n
- ZW90cnVzdC5jb20wFwYDVR0gBBAwDjAMBgorBgEEAdZ5AgUBMA0GCSqGSIb3DQEB
- BQUAA4IBAQA21waAESetKhSbOHezI6B1WLuxfoNCunLaHtiONgaX4PCVOzf9G0JY
- /iLIa704XtE7JW4S615ndkZAkNoUyHgN7ZVm2o6Gb4ChulYylYbc3GrKBIxbf/a/
- zG+FA1jDaFETzf3I93k9mTXwVqO94FntT0QJo544evZG0R0SnU++0ED8Vf4GXjza
- HFa9llF7b1cq26KqltyMdMKVvvBulRP/F/A8rLIQjcxz++iPAsbw+zOzlTvjwsto
- WHPbqCRiOwY1nQ2pM714A5AuTHhdUDqB1O6gyHA43LL5Z/qHQF1hwFGPa4NrzQU6
- yuGnBXj8ytqU0CwIPX4WecigUCAkVDNx
- -----END CERTIFICATE-----`
-
- // First, create the set of root certificates. For this example we only
- // have one. It's also possible to omit this in order to use the
- // default root set of the current operating system.
- roots := x509.NewCertPool()
- ok := roots.AppendCertsFromPEM([]byte(rootPEM))
- if !ok {
- panic("failed to parse root certificate")
- }
-
- conn, err := tls.Dial("tcp", "mail.google.com:443", &tls.Config{
- RootCAs: roots,
- })
- if err != nil {
- panic("failed to connect: " + err.Error())
- }
- conn.Close()
- }
-
- func ExampleConfig_keyLogWriter_TLS12() {
- // Debugging TLS applications by decrypting a network traffic capture.
-
- // WARNING: Use of KeyLogWriter compromises security and should only be
- // used for debugging.
-
- // Dummy test HTTP server for the example with insecure random so output is
- // reproducible.
- server := httptest.NewUnstartedServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {}))
- server.TLS = &tls.Config{
- Rand: zeroSource{}, // for example only; don't do this.
- MaxVersion: tls.VersionTLS12,
- }
- server.StartTLS()
- defer server.Close()
-
- // Typically the log would go to an open file:
- // w, err := os.OpenFile("tls-secrets.txt", os.O_WRONLY|os.O_CREATE|os.O_TRUNC, 0600)
- w := os.Stdout
-
- client := &http.Client{
- Transport: &http.Transport{
- TLSClientConfig: &tls.Config{
- KeyLogWriter: w,
-
- Rand: zeroSource{}, // for reproducible output; don't do this.
- InsecureSkipVerify: true, // test server certificate is not trusted.
- },
- },
- }
- resp, err := client.Get(server.URL)
- if err != nil {
- log.Fatalf("Failed to get URL: %v", err)
- }
- resp.Body.Close()
-
- // The resulting file can be used with Wireshark to decrypt the TLS
- // connection by setting (Pre)-Master-Secret log filename in SSL Protocol
- // preferences.
-
- // Output:
- // CLIENT_RANDOM 0000000000000000000000000000000000000000000000000000000000000000 baca0df460a688e44ce018b025183cc2353ae01f89755ef766eedd3ecc302888ee3b3a22962e45f48c20df15a98c0e80
- }
-
- func ExampleConfig_keyLogWriter_TLS13() {
- // Debugging TLS applications by decrypting a network traffic capture.
-
- // WARNING: Use of KeyLogWriter compromises security and should only be
- // used for debugging.
-
- // Dummy test HTTP server for the example with insecure random so output is
- // reproducible.
- server := httptest.NewUnstartedServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {}))
- server.TLS = &tls.Config{
- Rand: zeroSource{}, // for example only; don't do this.
- }
- server.StartTLS()
- defer server.Close()
-
- // Typically the log would go to an open file:
- // w, err := os.OpenFile("tls-secrets.txt", os.O_WRONLY|os.O_CREATE|os.O_TRUNC, 0600)
- w := os.Stdout
-
- client := &http.Client{
- Transport: &http.Transport{
- TLSClientConfig: &tls.Config{
- KeyLogWriter: w,
-
- Rand: zeroSource{}, // for reproducible output; don't do this.
- InsecureSkipVerify: true, // test server certificate is not trusted.
- },
- },
- }
- resp, err := client.Get(server.URL)
- if err != nil {
- log.Fatalf("Failed to get URL: %v", err)
- }
- resp.Body.Close()
-
- // The resulting file can be used with Wireshark to decrypt the TLS
- // connection by setting (Pre)-Master-Secret log filename in SSL Protocol
- // preferences.
-
- // Output:
- // CLIENT_HANDSHAKE_TRAFFIC_SECRET 0000000000000000000000000000000000000000000000000000000000000000 b946c84f46f53bd410368a1fd7d53873e74bedd53b4b1a4b125be40c8b0510a1
- // SERVER_HANDSHAKE_TRAFFIC_SECRET 0000000000000000000000000000000000000000000000000000000000000000 b6c44e95e34cb2616ff2e9a1163577aa1aa5cb3af8df16d0fdbbbaf15f415c8e
- // SERVER_TRAFFIC_SECRET_0 0000000000000000000000000000000000000000000000000000000000000000 cbecc42509a124ae517f6c9aaae1961d755ab4268548b40b0c7840a9643240e8
- // CLIENT_TRAFFIC_SECRET_0 0000000000000000000000000000000000000000000000000000000000000000 8f6dd1476706ea8147d829347937694496a7d62d6d01de0a1b4820140d01cad0
- }
-
- func ExampleLoadX509KeyPair() {
- cert, err := tls.LoadX509KeyPair("testdata/example-cert.pem", "testdata/example-key.pem")
- if err != nil {
- log.Fatal(err)
- }
- cfg := &tls.Config{Certificates: []tls.Certificate{cert}}
- listener, err := tls.Listen("tcp", ":2000", cfg)
- if err != nil {
- log.Fatal(err)
- }
- _ = listener
- }
-
- func ExampleX509KeyPair() {
- certPem := []byte(`-----BEGIN CERTIFICATE-----
- MIIBhTCCASugAwIBAgIQIRi6zePL6mKjOipn+dNuaTAKBggqhkjOPQQDAjASMRAw
- DgYDVQQKEwdBY21lIENvMB4XDTE3MTAyMDE5NDMwNloXDTE4MTAyMDE5NDMwNlow
- EjEQMA4GA1UEChMHQWNtZSBDbzBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABD0d
- 7VNhbWvZLWPuj/RtHFjvtJBEwOkhbN/BnnE8rnZR8+sbwnc/KhCk3FhnpHZnQz7B
- 5aETbbIgmuvewdjvSBSjYzBhMA4GA1UdDwEB/wQEAwICpDATBgNVHSUEDDAKBggr
- BgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdEQQiMCCCDmxvY2FsaG9zdDo1
- NDUzgg4xMjcuMC4wLjE6NTQ1MzAKBggqhkjOPQQDAgNIADBFAiEA2zpJEPQyz6/l
- Wf86aX6PepsntZv2GYlA5UpabfT2EZICICpJ5h/iI+i341gBmLiAFQOyTDT+/wQc
- 6MF9+Yw1Yy0t
- -----END CERTIFICATE-----`)
- keyPem := []byte(`-----BEGIN EC PRIVATE KEY-----
- MHcCAQEEIIrYSSNQFaA2Hwf1duRSxKtLYX5CB04fSeQ6tF1aY/PuoAoGCCqGSM49
- AwEHoUQDQgAEPR3tU2Fta9ktY+6P9G0cWO+0kETA6SFs38GecTyudlHz6xvCdz8q
- EKTcWGekdmdDPsHloRNtsiCa697B2O9IFA==
- -----END EC PRIVATE KEY-----`)
- cert, err := tls.X509KeyPair(certPem, keyPem)
- if err != nil {
- log.Fatal(err)
- }
- cfg := &tls.Config{Certificates: []tls.Certificate{cert}}
- listener, err := tls.Listen("tcp", ":2000", cfg)
- if err != nil {
- log.Fatal(err)
- }
- _ = listener
- }
-
- func ExampleX509KeyPair_httpServer() {
- certPem := []byte(`-----BEGIN CERTIFICATE-----
- MIIBhTCCASugAwIBAgIQIRi6zePL6mKjOipn+dNuaTAKBggqhkjOPQQDAjASMRAw
- DgYDVQQKEwdBY21lIENvMB4XDTE3MTAyMDE5NDMwNloXDTE4MTAyMDE5NDMwNlow
- EjEQMA4GA1UEChMHQWNtZSBDbzBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABD0d
- 7VNhbWvZLWPuj/RtHFjvtJBEwOkhbN/BnnE8rnZR8+sbwnc/KhCk3FhnpHZnQz7B
- 5aETbbIgmuvewdjvSBSjYzBhMA4GA1UdDwEB/wQEAwICpDATBgNVHSUEDDAKBggr
- BgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdEQQiMCCCDmxvY2FsaG9zdDo1
- NDUzgg4xMjcuMC4wLjE6NTQ1MzAKBggqhkjOPQQDAgNIADBFAiEA2zpJEPQyz6/l
- Wf86aX6PepsntZv2GYlA5UpabfT2EZICICpJ5h/iI+i341gBmLiAFQOyTDT+/wQc
- 6MF9+Yw1Yy0t
- -----END CERTIFICATE-----`)
- keyPem := []byte(`-----BEGIN EC PRIVATE KEY-----
- MHcCAQEEIIrYSSNQFaA2Hwf1duRSxKtLYX5CB04fSeQ6tF1aY/PuoAoGCCqGSM49
- AwEHoUQDQgAEPR3tU2Fta9ktY+6P9G0cWO+0kETA6SFs38GecTyudlHz6xvCdz8q
- EKTcWGekdmdDPsHloRNtsiCa697B2O9IFA==
- -----END EC PRIVATE KEY-----`)
- cert, err := tls.X509KeyPair(certPem, keyPem)
- if err != nil {
- log.Fatal(err)
- }
- cfg := &tls.Config{Certificates: []tls.Certificate{cert}}
- srv := &http.Server{
- TLSConfig: cfg,
- ReadTimeout: time.Minute,
- WriteTimeout: time.Minute,
- }
- log.Fatal(srv.ListenAndServeTLS("", ""))
- }
|