Alternative TLS implementation in Go
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

247 line
9.0 KiB

  1. // Copyright 2010 The Go Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style
  3. // license that can be found in the LICENSE file.
  4. package tls
  5. import (
  6. "bytes"
  7. "io"
  8. "net"
  9. "testing"
  10. )
  11. func TestRoundUp(t *testing.T) {
  12. if roundUp(0, 16) != 0 ||
  13. roundUp(1, 16) != 16 ||
  14. roundUp(15, 16) != 16 ||
  15. roundUp(16, 16) != 16 ||
  16. roundUp(17, 16) != 32 {
  17. t.Error("roundUp broken")
  18. }
  19. }
  20. var paddingTests = []struct {
  21. in []byte
  22. good bool
  23. expectedLen int
  24. }{
  25. {[]byte{1, 2, 3, 4, 0}, true, 4},
  26. {[]byte{1, 2, 3, 4, 0, 1}, false, 0},
  27. {[]byte{1, 2, 3, 4, 99, 99}, false, 0},
  28. {[]byte{1, 2, 3, 4, 1, 1}, true, 4},
  29. {[]byte{1, 2, 3, 2, 2, 2}, true, 3},
  30. {[]byte{1, 2, 3, 3, 3, 3}, true, 2},
  31. {[]byte{1, 2, 3, 4, 3, 3}, false, 0},
  32. {[]byte{1, 4, 4, 4, 4, 4}, true, 1},
  33. {[]byte{5, 5, 5, 5, 5, 5}, true, 0},
  34. {[]byte{6, 6, 6, 6, 6, 6}, false, 0},
  35. }
  36. func TestRemovePadding(t *testing.T) {
  37. for i, test := range paddingTests {
  38. payload, good := removePadding(test.in)
  39. expectedGood := byte(255)
  40. if !test.good {
  41. expectedGood = 0
  42. }
  43. if good != expectedGood {
  44. t.Errorf("#%d: wrong validity, want:%d got:%d", i, expectedGood, good)
  45. }
  46. if good == 255 && len(payload) != test.expectedLen {
  47. t.Errorf("#%d: got %d, want %d", i, len(payload), test.expectedLen)
  48. }
  49. }
  50. }
  51. var certExampleCom = `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`
  52. var certWildcardExampleCom = `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`
  53. var certFooExampleCom = `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`
  54. var certDoubleWildcardExampleCom = `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`
  55. func TestCertificateSelection(t *testing.T) {
  56. config := Config{
  57. Certificates: []Certificate{
  58. {
  59. Certificate: [][]byte{fromHex(certExampleCom)},
  60. },
  61. {
  62. Certificate: [][]byte{fromHex(certWildcardExampleCom)},
  63. },
  64. {
  65. Certificate: [][]byte{fromHex(certFooExampleCom)},
  66. },
  67. {
  68. Certificate: [][]byte{fromHex(certDoubleWildcardExampleCom)},
  69. },
  70. },
  71. }
  72. config.BuildNameToCertificate()
  73. pointerToIndex := func(c *Certificate) int {
  74. for i := range config.Certificates {
  75. if c == &config.Certificates[i] {
  76. return i
  77. }
  78. }
  79. return -1
  80. }
  81. certificateForName := func(name string) *Certificate {
  82. clientHello := &ClientHelloInfo{
  83. ServerName: name,
  84. }
  85. if cert, err := config.getCertificate(clientHello); err != nil {
  86. t.Errorf("unable to get certificate for name '%s': %s", name, err)
  87. return nil
  88. } else {
  89. return cert
  90. }
  91. }
  92. if n := pointerToIndex(certificateForName("example.com")); n != 0 {
  93. t.Errorf("example.com returned certificate %d, not 0", n)
  94. }
  95. if n := pointerToIndex(certificateForName("bar.example.com")); n != 1 {
  96. t.Errorf("bar.example.com returned certificate %d, not 1", n)
  97. }
  98. if n := pointerToIndex(certificateForName("foo.example.com")); n != 2 {
  99. t.Errorf("foo.example.com returned certificate %d, not 2", n)
  100. }
  101. if n := pointerToIndex(certificateForName("foo.bar.example.com")); n != 3 {
  102. t.Errorf("foo.bar.example.com returned certificate %d, not 3", n)
  103. }
  104. if n := pointerToIndex(certificateForName("foo.bar.baz.example.com")); n != 0 {
  105. t.Errorf("foo.bar.baz.example.com returned certificate %d, not 0", n)
  106. }
  107. }
  108. // Run with multiple crypto configs to test the logic for computing TLS record overheads.
  109. func runDynamicRecordSizingTest(t *testing.T, config *Config) {
  110. clientConn, serverConn := net.Pipe()
  111. serverConfig := *config
  112. serverConfig.DynamicRecordSizingDisabled = false
  113. tlsConn := Server(serverConn, &serverConfig)
  114. recordSizesChan := make(chan []int, 1)
  115. go func() {
  116. // This goroutine performs a TLS handshake over clientConn and
  117. // then reads TLS records until EOF. It writes a slice that
  118. // contains all the record sizes to recordSizesChan.
  119. defer close(recordSizesChan)
  120. defer clientConn.Close()
  121. tlsConn := Client(clientConn, config)
  122. if err := tlsConn.Handshake(); err != nil {
  123. t.Errorf("Error from client handshake: %s", err)
  124. return
  125. }
  126. var recordHeader [recordHeaderLen]byte
  127. var record []byte
  128. var recordSizes []int
  129. for {
  130. n, err := clientConn.Read(recordHeader[:])
  131. if err == io.EOF {
  132. break
  133. }
  134. if err != nil || n != len(recordHeader) {
  135. t.Errorf("Error from client read: %s", err)
  136. return
  137. }
  138. length := int(recordHeader[3])<<8 | int(recordHeader[4])
  139. if len(record) < length {
  140. record = make([]byte, length)
  141. }
  142. n, err = clientConn.Read(record[:length])
  143. if err != nil || n != length {
  144. t.Errorf("Error from client read: %s", err)
  145. return
  146. }
  147. // The last record will be a close_notify alert, which
  148. // we don't wish to record.
  149. if recordType(recordHeader[0]) == recordTypeApplicationData {
  150. recordSizes = append(recordSizes, recordHeaderLen+length)
  151. }
  152. }
  153. recordSizesChan <- recordSizes
  154. }()
  155. if err := tlsConn.Handshake(); err != nil {
  156. t.Fatalf("Error from server handshake: %s", err)
  157. }
  158. // The server writes these plaintexts in order.
  159. plaintext := bytes.Join([][]byte{
  160. bytes.Repeat([]byte("x"), recordSizeBoostThreshold),
  161. bytes.Repeat([]byte("y"), maxPlaintext*2),
  162. bytes.Repeat([]byte("z"), maxPlaintext),
  163. }, nil)
  164. if _, err := tlsConn.Write(plaintext); err != nil {
  165. t.Fatalf("Error from server write: %s", err)
  166. }
  167. if err := tlsConn.Close(); err != nil {
  168. t.Fatalf("Error from server close: %s", err)
  169. }
  170. recordSizes := <-recordSizesChan
  171. if recordSizes == nil {
  172. t.Fatalf("Client encountered an error")
  173. }
  174. // Drop the size of last record, which is likely to be truncated.
  175. recordSizes = recordSizes[:len(recordSizes)-1]
  176. // recordSizes should contain a series of records smaller than
  177. // tcpMSSEstimate followed by some larger than maxPlaintext.
  178. seenLargeRecord := false
  179. for i, size := range recordSizes {
  180. if !seenLargeRecord {
  181. if size > tcpMSSEstimate {
  182. if i < 100 {
  183. t.Fatalf("Record #%d has size %d, which is too large too soon", i, size)
  184. }
  185. if size <= maxPlaintext {
  186. t.Fatalf("Record #%d has odd size %d", i, size)
  187. }
  188. seenLargeRecord = true
  189. }
  190. } else if size <= maxPlaintext {
  191. t.Fatalf("Record #%d has size %d but should be full sized", i, size)
  192. }
  193. }
  194. if !seenLargeRecord {
  195. t.Fatalf("No large records observed")
  196. }
  197. }
  198. func TestDynamicRecordSizingWithStreamCipher(t *testing.T) {
  199. config := *testConfig
  200. config.CipherSuites = []uint16{TLS_RSA_WITH_RC4_128_SHA}
  201. runDynamicRecordSizingTest(t, &config)
  202. }
  203. func TestDynamicRecordSizingWithCBC(t *testing.T) {
  204. config := *testConfig
  205. config.CipherSuites = []uint16{TLS_RSA_WITH_AES_256_CBC_SHA}
  206. runDynamicRecordSizingTest(t, &config)
  207. }
  208. func TestDynamicRecordSizingWithAEAD(t *testing.T) {
  209. config := *testConfig
  210. config.CipherSuites = []uint16{TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256}
  211. runDynamicRecordSizingTest(t, &config)
  212. }