Source file
src/crypto/tls/tls_test.go
1
2
3
4
5 package tls
6
7 import (
8 "bytes"
9 "context"
10 "crypto"
11 "crypto/ecdsa"
12 "crypto/elliptic"
13 "crypto/rand"
14 "crypto/x509"
15 "crypto/x509/pkix"
16 "encoding/asn1"
17 "encoding/json"
18 "encoding/pem"
19 "errors"
20 "fmt"
21 "internal/testenv"
22 "io"
23 "math"
24 "math/big"
25 "net"
26 "os"
27 "reflect"
28 "slices"
29 "strings"
30 "testing"
31 "time"
32 )
33
34 var rsaCertPEM = `-----BEGIN CERTIFICATE-----
35 MIIB0zCCAX2gAwIBAgIJAI/M7BYjwB+uMA0GCSqGSIb3DQEBBQUAMEUxCzAJBgNV
36 BAYTAkFVMRMwEQYDVQQIDApTb21lLVN0YXRlMSEwHwYDVQQKDBhJbnRlcm5ldCBX
37 aWRnaXRzIFB0eSBMdGQwHhcNMTIwOTEyMjE1MjAyWhcNMTUwOTEyMjE1MjAyWjBF
38 MQswCQYDVQQGEwJBVTETMBEGA1UECAwKU29tZS1TdGF0ZTEhMB8GA1UECgwYSW50
39 ZXJuZXQgV2lkZ2l0cyBQdHkgTHRkMFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANLJ
40 hPHhITqQbPklG3ibCVxwGMRfp/v4XqhfdQHdcVfHap6NQ5Wok/4xIA+ui35/MmNa
41 rtNuC+BdZ1tMuVCPFZcCAwEAAaNQME4wHQYDVR0OBBYEFJvKs8RfJaXTH08W+SGv
42 zQyKn0H8MB8GA1UdIwQYMBaAFJvKs8RfJaXTH08W+SGvzQyKn0H8MAwGA1UdEwQF
43 MAMBAf8wDQYJKoZIhvcNAQEFBQADQQBJlffJHybjDGxRMqaRmDhX0+6v02TUKZsW
44 r5QuVbpQhH6u+0UgcW0jp9QwpxoPTLTWGXEWBBBurxFwiCBhkQ+V
45 -----END CERTIFICATE-----
46 `
47
48 var rsaKeyPEM = testingKey(`-----BEGIN RSA TESTING KEY-----
49 MIIBOwIBAAJBANLJhPHhITqQbPklG3ibCVxwGMRfp/v4XqhfdQHdcVfHap6NQ5Wo
50 k/4xIA+ui35/MmNartNuC+BdZ1tMuVCPFZcCAwEAAQJAEJ2N+zsR0Xn8/Q6twa4G
51 6OB1M1WO+k+ztnX/1SvNeWu8D6GImtupLTYgjZcHufykj09jiHmjHx8u8ZZB/o1N
52 MQIhAPW+eyZo7ay3lMz1V01WVjNKK9QSn1MJlb06h/LuYv9FAiEA25WPedKgVyCW
53 SmUwbPw8fnTcpqDWE3yTO3vKcebqMSsCIBF3UmVue8YU3jybC3NxuXq3wNm34R8T
54 xVLHwDXh/6NJAiEAl2oHGGLz64BuAfjKrqwz7qMYr9HCLIe/YsoWq/olzScCIQDi
55 D2lWusoe2/nEqfDVVWGWlyJ7yOmqaVm/iNUN9B2N2g==
56 -----END RSA TESTING KEY-----
57 `)
58
59
60
61 var keyPEM = testingKey(`-----BEGIN TESTING KEY-----
62 MIIBOwIBAAJBANLJhPHhITqQbPklG3ibCVxwGMRfp/v4XqhfdQHdcVfHap6NQ5Wo
63 k/4xIA+ui35/MmNartNuC+BdZ1tMuVCPFZcCAwEAAQJAEJ2N+zsR0Xn8/Q6twa4G
64 6OB1M1WO+k+ztnX/1SvNeWu8D6GImtupLTYgjZcHufykj09jiHmjHx8u8ZZB/o1N
65 MQIhAPW+eyZo7ay3lMz1V01WVjNKK9QSn1MJlb06h/LuYv9FAiEA25WPedKgVyCW
66 SmUwbPw8fnTcpqDWE3yTO3vKcebqMSsCIBF3UmVue8YU3jybC3NxuXq3wNm34R8T
67 xVLHwDXh/6NJAiEAl2oHGGLz64BuAfjKrqwz7qMYr9HCLIe/YsoWq/olzScCIQDi
68 D2lWusoe2/nEqfDVVWGWlyJ7yOmqaVm/iNUN9B2N2g==
69 -----END TESTING KEY-----
70 `)
71
72 var ecdsaCertPEM = `-----BEGIN CERTIFICATE-----
73 MIIB/jCCAWICCQDscdUxw16XFDAJBgcqhkjOPQQBMEUxCzAJBgNVBAYTAkFVMRMw
74 EQYDVQQIEwpTb21lLVN0YXRlMSEwHwYDVQQKExhJbnRlcm5ldCBXaWRnaXRzIFB0
75 eSBMdGQwHhcNMTIxMTE0MTI0MDQ4WhcNMTUxMTE0MTI0MDQ4WjBFMQswCQYDVQQG
76 EwJBVTETMBEGA1UECBMKU29tZS1TdGF0ZTEhMB8GA1UEChMYSW50ZXJuZXQgV2lk
77 Z2l0cyBQdHkgTHRkMIGbMBAGByqGSM49AgEGBSuBBAAjA4GGAAQBY9+my9OoeSUR
78 lDQdV/x8LsOuLilthhiS1Tz4aGDHIPwC1mlvnf7fg5lecYpMCrLLhauAc1UJXcgl
79 01xoLuzgtAEAgv2P/jgytzRSpUYvgLBt1UA0leLYBy6mQQbrNEuqT3INapKIcUv8
80 XxYP0xMEUksLPq6Ca+CRSqTtrd/23uTnapkwCQYHKoZIzj0EAQOBigAwgYYCQXJo
81 A7Sl2nLVf+4Iu/tAX/IF4MavARKC4PPHK3zfuGfPR3oCCcsAoz3kAzOeijvd0iXb
82 H5jBImIxPL4WxQNiBTexAkF8D1EtpYuWdlVQ80/h/f4pBcGiXPqX5h2PQSQY7hP1
83 +jwM1FGS4fREIOvlBYr/SzzQRtwrvrzGYxDEDbsC0ZGRnA==
84 -----END CERTIFICATE-----
85 `
86
87 var ecdsaKeyPEM = testingKey(`-----BEGIN EC PARAMETERS-----
88 BgUrgQQAIw==
89 -----END EC PARAMETERS-----
90 -----BEGIN EC TESTING KEY-----
91 MIHcAgEBBEIBrsoKp0oqcv6/JovJJDoDVSGWdirrkgCWxrprGlzB9o0X8fV675X0
92 NwuBenXFfeZvVcwluO7/Q9wkYoPd/t3jGImgBwYFK4EEACOhgYkDgYYABAFj36bL
93 06h5JRGUNB1X/Hwuw64uKW2GGJLVPPhoYMcg/ALWaW+d/t+DmV5xikwKssuFq4Bz
94 VQldyCXTXGgu7OC0AQCC/Y/+ODK3NFKlRi+AsG3VQDSV4tgHLqZBBus0S6pPcg1q
95 kohxS/xfFg/TEwRSSws+roJr4JFKpO2t3/be5OdqmQ==
96 -----END EC TESTING KEY-----
97 `)
98
99 var keyPairTests = []struct {
100 algo string
101 cert string
102 key string
103 }{
104 {"ECDSA", ecdsaCertPEM, ecdsaKeyPEM},
105 {"RSA", rsaCertPEM, rsaKeyPEM},
106 {"RSA-untyped", rsaCertPEM, keyPEM},
107 }
108
109 func TestX509KeyPair(t *testing.T) {
110 t.Parallel()
111 var pem []byte
112 for _, test := range keyPairTests {
113 pem = []byte(test.cert + test.key)
114 if _, err := X509KeyPair(pem, pem); err != nil {
115 t.Errorf("Failed to load %s cert followed by %s key: %s", test.algo, test.algo, err)
116 }
117 pem = []byte(test.key + test.cert)
118 if _, err := X509KeyPair(pem, pem); err != nil {
119 t.Errorf("Failed to load %s key followed by %s cert: %s", test.algo, test.algo, err)
120 }
121 }
122 }
123
124 func TestX509KeyPairErrors(t *testing.T) {
125 _, err := X509KeyPair([]byte(rsaKeyPEM), []byte(rsaCertPEM))
126 if err == nil {
127 t.Fatalf("X509KeyPair didn't return an error when arguments were switched")
128 }
129 if subStr := "been switched"; !strings.Contains(err.Error(), subStr) {
130 t.Fatalf("Expected %q in the error when switching arguments to X509KeyPair, but the error was %q", subStr, err)
131 }
132
133 _, err = X509KeyPair([]byte(rsaCertPEM), []byte(rsaCertPEM))
134 if err == nil {
135 t.Fatalf("X509KeyPair didn't return an error when both arguments were certificates")
136 }
137 if subStr := "certificate"; !strings.Contains(err.Error(), subStr) {
138 t.Fatalf("Expected %q in the error when both arguments to X509KeyPair were certificates, but the error was %q", subStr, err)
139 }
140
141 const nonsensePEM = `
142 -----BEGIN NONSENSE-----
143 Zm9vZm9vZm9v
144 -----END NONSENSE-----
145 `
146
147 _, err = X509KeyPair([]byte(nonsensePEM), []byte(nonsensePEM))
148 if err == nil {
149 t.Fatalf("X509KeyPair didn't return an error when both arguments were nonsense")
150 }
151 if subStr := "NONSENSE"; !strings.Contains(err.Error(), subStr) {
152 t.Fatalf("Expected %q in the error when both arguments to X509KeyPair were nonsense, but the error was %q", subStr, err)
153 }
154 }
155
156 func TestX509MixedKeyPair(t *testing.T) {
157 if _, err := X509KeyPair([]byte(rsaCertPEM), []byte(ecdsaKeyPEM)); err == nil {
158 t.Error("Load of RSA certificate succeeded with ECDSA private key")
159 }
160 if _, err := X509KeyPair([]byte(ecdsaCertPEM), []byte(rsaKeyPEM)); err == nil {
161 t.Error("Load of ECDSA certificate succeeded with RSA private key")
162 }
163 }
164
165 func newLocalListener(t testing.TB) net.Listener {
166 ln, err := net.Listen("tcp", "127.0.0.1:0")
167 if err != nil {
168 ln, err = net.Listen("tcp6", "[::1]:0")
169 }
170 if err != nil {
171 t.Fatal(err)
172 }
173 return ln
174 }
175
176 func TestDialTimeout(t *testing.T) {
177 if testing.Short() {
178 t.Skip("skipping in short mode")
179 }
180
181 timeout := 100 * time.Microsecond
182 for !t.Failed() {
183 acceptc := make(chan net.Conn)
184 listener := newLocalListener(t)
185 go func() {
186 for {
187 conn, err := listener.Accept()
188 if err != nil {
189 close(acceptc)
190 return
191 }
192 acceptc <- conn
193 }
194 }()
195
196 addr := listener.Addr().String()
197 dialer := &net.Dialer{
198 Timeout: timeout,
199 }
200 if conn, err := DialWithDialer(dialer, "tcp", addr, nil); err == nil {
201 conn.Close()
202 t.Errorf("DialWithTimeout unexpectedly completed successfully")
203 } else if !isTimeoutError(err) {
204 t.Errorf("resulting error not a timeout: %v\nType %T: %#v", err, err, err)
205 }
206
207 listener.Close()
208
209
210
211
212
213
214 lconn, ok := <-acceptc
215 if ok {
216
217
218 t.Logf("Listener accepted a connection from %s", lconn.RemoteAddr())
219 lconn.Close()
220 }
221
222
223 for extraConn := range acceptc {
224 t.Logf("spurious extra connection from %s", extraConn.RemoteAddr())
225 extraConn.Close()
226 }
227 if ok {
228 break
229 }
230
231 t.Logf("with timeout %v, DialWithDialer returned before listener accepted any connections; retrying", timeout)
232 timeout *= 2
233 }
234 }
235
236 func TestDeadlineOnWrite(t *testing.T) {
237 if testing.Short() {
238 t.Skip("skipping in short mode")
239 }
240
241 ln := newLocalListener(t)
242 defer ln.Close()
243
244 srvCh := make(chan *Conn, 1)
245
246 go func() {
247 sconn, err := ln.Accept()
248 if err != nil {
249 srvCh <- nil
250 return
251 }
252 srv := Server(sconn, testConfig.Clone())
253 if err := srv.Handshake(); err != nil {
254 srvCh <- nil
255 return
256 }
257 srvCh <- srv
258 }()
259
260 clientConfig := testConfig.Clone()
261 clientConfig.MaxVersion = VersionTLS12
262 conn, err := Dial("tcp", ln.Addr().String(), clientConfig)
263 if err != nil {
264 t.Fatal(err)
265 }
266 defer conn.Close()
267
268 srv := <-srvCh
269 if srv == nil {
270 t.Error(err)
271 }
272
273
274 buf := make([]byte, 6)
275 if _, err := srv.Write([]byte("foobar")); err != nil {
276 t.Errorf("Write err: %v", err)
277 }
278 if n, err := conn.Read(buf); n != 6 || err != nil || string(buf) != "foobar" {
279 t.Errorf("Read = %d, %v, data %q; want 6, nil, foobar", n, err, buf)
280 }
281
282
283 if err = srv.SetDeadline(time.Now()); err != nil {
284 t.Fatalf("SetDeadline(time.Now()) err: %v", err)
285 }
286 if _, err = srv.Write([]byte("should fail")); err == nil {
287 t.Fatal("Write should have timed out")
288 }
289
290
291 if err = srv.SetDeadline(time.Time{}); err != nil {
292 t.Fatalf("SetDeadline(time.Time{}) err: %v", err)
293 }
294 if _, err = srv.Write([]byte("This connection is permanently broken")); err == nil {
295 t.Fatal("Write which previously failed should still time out")
296 }
297
298
299 if ne := err.(net.Error); ne.Temporary() != false {
300 t.Error("Write timed out but incorrectly classified the error as Temporary")
301 }
302 if !isTimeoutError(err) {
303 t.Error("Write timed out but did not classify the error as a Timeout")
304 }
305 }
306
307 type readerFunc func([]byte) (int, error)
308
309 func (f readerFunc) Read(b []byte) (int, error) { return f(b) }
310
311
312
313
314 func TestDialer(t *testing.T) {
315 ln := newLocalListener(t)
316 defer ln.Close()
317
318 unblockServer := make(chan struct{})
319 defer close(unblockServer)
320 go func() {
321 conn, err := ln.Accept()
322 if err != nil {
323 return
324 }
325 defer conn.Close()
326 <-unblockServer
327 }()
328
329 ctx, cancel := context.WithCancel(context.Background())
330 d := Dialer{Config: &Config{
331 Rand: readerFunc(func(b []byte) (n int, err error) {
332
333
334
335
336
337 cancel()
338 return len(b), nil
339 }),
340 ServerName: "foo",
341 }}
342 _, err := d.DialContext(ctx, "tcp", ln.Addr().String())
343 if err != context.Canceled {
344 t.Errorf("err = %v; want context.Canceled", err)
345 }
346 }
347
348 func isTimeoutError(err error) bool {
349 if ne, ok := err.(net.Error); ok {
350 return ne.Timeout()
351 }
352 return false
353 }
354
355
356
357
358 func TestConnReadNonzeroAndEOF(t *testing.T) {
359
360
361
362
363
364
365 if testing.Short() {
366 t.Skip("skipping in short mode")
367 }
368 var err error
369 for delay := time.Millisecond; delay <= 64*time.Millisecond; delay *= 2 {
370 if err = testConnReadNonzeroAndEOF(t, delay); err == nil {
371 return
372 }
373 }
374 t.Error(err)
375 }
376
377 func testConnReadNonzeroAndEOF(t *testing.T, delay time.Duration) error {
378 ln := newLocalListener(t)
379 defer ln.Close()
380
381 srvCh := make(chan *Conn, 1)
382 var serr error
383 go func() {
384 sconn, err := ln.Accept()
385 if err != nil {
386 serr = err
387 srvCh <- nil
388 return
389 }
390 serverConfig := testConfig.Clone()
391 srv := Server(sconn, serverConfig)
392 if err := srv.Handshake(); err != nil {
393 serr = fmt.Errorf("handshake: %v", err)
394 srvCh <- nil
395 return
396 }
397 srvCh <- srv
398 }()
399
400 clientConfig := testConfig.Clone()
401
402
403 clientConfig.MaxVersion = VersionTLS12
404 conn, err := Dial("tcp", ln.Addr().String(), clientConfig)
405 if err != nil {
406 t.Fatal(err)
407 }
408 defer conn.Close()
409
410 srv := <-srvCh
411 if srv == nil {
412 return serr
413 }
414
415 buf := make([]byte, 6)
416
417 srv.Write([]byte("foobar"))
418 n, err := conn.Read(buf)
419 if n != 6 || err != nil || string(buf) != "foobar" {
420 return fmt.Errorf("Read = %d, %v, data %q; want 6, nil, foobar", n, err, buf)
421 }
422
423 srv.Write([]byte("abcdef"))
424 srv.Close()
425 time.Sleep(delay)
426 n, err = conn.Read(buf)
427 if n != 6 || string(buf) != "abcdef" {
428 return fmt.Errorf("Read = %d, buf= %q; want 6, abcdef", n, buf)
429 }
430 if err != io.EOF {
431 return fmt.Errorf("Second Read error = %v; want io.EOF", err)
432 }
433 return nil
434 }
435
436 func TestTLSUniqueMatches(t *testing.T) {
437 ln := newLocalListener(t)
438 defer ln.Close()
439
440 serverTLSUniques := make(chan []byte)
441 parentDone := make(chan struct{})
442 childDone := make(chan struct{})
443 defer close(parentDone)
444 go func() {
445 defer close(childDone)
446 for i := 0; i < 2; i++ {
447 sconn, err := ln.Accept()
448 if err != nil {
449 t.Error(err)
450 return
451 }
452 serverConfig := testConfig.Clone()
453 serverConfig.MaxVersion = VersionTLS12
454 srv := Server(sconn, serverConfig)
455 if err := srv.Handshake(); err != nil {
456 t.Error(err)
457 return
458 }
459 select {
460 case <-parentDone:
461 return
462 case serverTLSUniques <- srv.ConnectionState().TLSUnique:
463 }
464 }
465 }()
466
467 clientConfig := testConfig.Clone()
468 clientConfig.ClientSessionCache = NewLRUClientSessionCache(1)
469 conn, err := Dial("tcp", ln.Addr().String(), clientConfig)
470 if err != nil {
471 t.Fatal(err)
472 }
473
474 var serverTLSUniquesValue []byte
475 select {
476 case <-childDone:
477 return
478 case serverTLSUniquesValue = <-serverTLSUniques:
479 }
480
481 if !bytes.Equal(conn.ConnectionState().TLSUnique, serverTLSUniquesValue) {
482 t.Error("client and server channel bindings differ")
483 }
484 if serverTLSUniquesValue == nil || bytes.Equal(serverTLSUniquesValue, make([]byte, 12)) {
485 t.Error("tls-unique is empty or zero")
486 }
487 conn.Close()
488
489 conn, err = Dial("tcp", ln.Addr().String(), clientConfig)
490 if err != nil {
491 t.Fatal(err)
492 }
493 defer conn.Close()
494 if !conn.ConnectionState().DidResume {
495 t.Error("second session did not use resumption")
496 }
497
498 select {
499 case <-childDone:
500 return
501 case serverTLSUniquesValue = <-serverTLSUniques:
502 }
503
504 if !bytes.Equal(conn.ConnectionState().TLSUnique, serverTLSUniquesValue) {
505 t.Error("client and server channel bindings differ when session resumption is used")
506 }
507 if serverTLSUniquesValue == nil || bytes.Equal(serverTLSUniquesValue, make([]byte, 12)) {
508 t.Error("resumption tls-unique is empty or zero")
509 }
510 }
511
512 func TestVerifyHostname(t *testing.T) {
513 testenv.MustHaveExternalNetwork(t)
514
515 c, err := Dial("tcp", "www.google.com:https", nil)
516 if err != nil {
517 t.Fatal(err)
518 }
519 if err := c.VerifyHostname("www.google.com"); err != nil {
520 t.Fatalf("verify www.google.com: %v", err)
521 }
522 if err := c.VerifyHostname("www.yahoo.com"); err == nil {
523 t.Fatalf("verify www.yahoo.com succeeded")
524 }
525
526 c, err = Dial("tcp", "www.google.com:https", &Config{InsecureSkipVerify: true})
527 if err != nil {
528 t.Fatal(err)
529 }
530 if err := c.VerifyHostname("www.google.com"); err == nil {
531 t.Fatalf("verify www.google.com succeeded with InsecureSkipVerify=true")
532 }
533 }
534
535 func TestConnCloseBreakingWrite(t *testing.T) {
536 ln := newLocalListener(t)
537 defer ln.Close()
538
539 srvCh := make(chan *Conn, 1)
540 var serr error
541 var sconn net.Conn
542 go func() {
543 var err error
544 sconn, err = ln.Accept()
545 if err != nil {
546 serr = err
547 srvCh <- nil
548 return
549 }
550 serverConfig := testConfig.Clone()
551 srv := Server(sconn, serverConfig)
552 if err := srv.Handshake(); err != nil {
553 serr = fmt.Errorf("handshake: %v", err)
554 srvCh <- nil
555 return
556 }
557 srvCh <- srv
558 }()
559
560 cconn, err := net.Dial("tcp", ln.Addr().String())
561 if err != nil {
562 t.Fatal(err)
563 }
564 defer cconn.Close()
565
566 conn := &changeImplConn{
567 Conn: cconn,
568 }
569
570 clientConfig := testConfig.Clone()
571 tconn := Client(conn, clientConfig)
572 if err := tconn.Handshake(); err != nil {
573 t.Fatal(err)
574 }
575
576 srv := <-srvCh
577 if srv == nil {
578 t.Fatal(serr)
579 }
580 defer sconn.Close()
581
582 connClosed := make(chan struct{})
583 conn.closeFunc = func() error {
584 close(connClosed)
585 return nil
586 }
587
588 inWrite := make(chan bool, 1)
589 var errConnClosed = errors.New("conn closed for test")
590 conn.writeFunc = func(p []byte) (n int, err error) {
591 inWrite <- true
592 <-connClosed
593 return 0, errConnClosed
594 }
595
596 closeReturned := make(chan bool, 1)
597 go func() {
598 <-inWrite
599 tconn.Close()
600 closeReturned <- true
601 }()
602
603 _, err = tconn.Write([]byte("foo"))
604 if err != errConnClosed {
605 t.Errorf("Write error = %v; want errConnClosed", err)
606 }
607
608 <-closeReturned
609 if err := tconn.Close(); err != net.ErrClosed {
610 t.Errorf("Close error = %v; want net.ErrClosed", err)
611 }
612 }
613
614 func TestConnCloseWrite(t *testing.T) {
615 ln := newLocalListener(t)
616 defer ln.Close()
617
618 clientDoneChan := make(chan struct{})
619
620 serverCloseWrite := func() error {
621 sconn, err := ln.Accept()
622 if err != nil {
623 return fmt.Errorf("accept: %v", err)
624 }
625 defer sconn.Close()
626
627 serverConfig := testConfig.Clone()
628 srv := Server(sconn, serverConfig)
629 if err := srv.Handshake(); err != nil {
630 return fmt.Errorf("handshake: %v", err)
631 }
632 defer srv.Close()
633
634 data, err := io.ReadAll(srv)
635 if err != nil {
636 return err
637 }
638 if len(data) > 0 {
639 return fmt.Errorf("Read data = %q; want nothing", data)
640 }
641
642 if err := srv.CloseWrite(); err != nil {
643 return fmt.Errorf("server CloseWrite: %v", err)
644 }
645
646
647
648
649
650 <-clientDoneChan
651 return nil
652 }
653
654 clientCloseWrite := func() error {
655 defer close(clientDoneChan)
656
657 clientConfig := testConfig.Clone()
658 conn, err := Dial("tcp", ln.Addr().String(), clientConfig)
659 if err != nil {
660 return err
661 }
662 if err := conn.Handshake(); err != nil {
663 return err
664 }
665 defer conn.Close()
666
667 if err := conn.CloseWrite(); err != nil {
668 return fmt.Errorf("client CloseWrite: %v", err)
669 }
670
671 if _, err := conn.Write([]byte{0}); err != errShutdown {
672 return fmt.Errorf("CloseWrite error = %v; want errShutdown", err)
673 }
674
675 data, err := io.ReadAll(conn)
676 if err != nil {
677 return err
678 }
679 if len(data) > 0 {
680 return fmt.Errorf("Read data = %q; want nothing", data)
681 }
682 return nil
683 }
684
685 errChan := make(chan error, 2)
686
687 go func() { errChan <- serverCloseWrite() }()
688 go func() { errChan <- clientCloseWrite() }()
689
690 for i := 0; i < 2; i++ {
691 select {
692 case err := <-errChan:
693 if err != nil {
694 t.Fatal(err)
695 }
696 case <-time.After(10 * time.Second):
697 t.Fatal("deadlock")
698 }
699 }
700
701
702
703 {
704 ln2 := newLocalListener(t)
705 defer ln2.Close()
706
707 netConn, err := net.Dial("tcp", ln2.Addr().String())
708 if err != nil {
709 t.Fatal(err)
710 }
711 defer netConn.Close()
712 conn := Client(netConn, testConfig.Clone())
713
714 if err := conn.CloseWrite(); err != errEarlyCloseWrite {
715 t.Errorf("CloseWrite error = %v; want errEarlyCloseWrite", err)
716 }
717 }
718 }
719
720 func TestWarningAlertFlood(t *testing.T) {
721 ln := newLocalListener(t)
722 defer ln.Close()
723
724 server := func() error {
725 sconn, err := ln.Accept()
726 if err != nil {
727 return fmt.Errorf("accept: %v", err)
728 }
729 defer sconn.Close()
730
731 serverConfig := testConfig.Clone()
732 srv := Server(sconn, serverConfig)
733 if err := srv.Handshake(); err != nil {
734 return fmt.Errorf("handshake: %v", err)
735 }
736 defer srv.Close()
737
738 _, err = io.ReadAll(srv)
739 if err == nil {
740 return errors.New("unexpected lack of error from server")
741 }
742 const expected = "too many ignored"
743 if str := err.Error(); !strings.Contains(str, expected) {
744 return fmt.Errorf("expected error containing %q, but saw: %s", expected, str)
745 }
746
747 return nil
748 }
749
750 errChan := make(chan error, 1)
751 go func() { errChan <- server() }()
752
753 clientConfig := testConfig.Clone()
754 clientConfig.MaxVersion = VersionTLS12
755 conn, err := Dial("tcp", ln.Addr().String(), clientConfig)
756 if err != nil {
757 t.Fatal(err)
758 }
759 defer conn.Close()
760 if err := conn.Handshake(); err != nil {
761 t.Fatal(err)
762 }
763
764 for i := 0; i < maxUselessRecords+1; i++ {
765 conn.sendAlert(alertNoRenegotiation)
766 }
767
768 if err := <-errChan; err != nil {
769 t.Fatal(err)
770 }
771 }
772
773 func TestCloneFuncFields(t *testing.T) {
774 const expectedCount = 9
775 called := 0
776
777 c1 := Config{
778 Time: func() time.Time {
779 called |= 1 << 0
780 return time.Time{}
781 },
782 GetCertificate: func(*ClientHelloInfo) (*Certificate, error) {
783 called |= 1 << 1
784 return nil, nil
785 },
786 GetClientCertificate: func(*CertificateRequestInfo) (*Certificate, error) {
787 called |= 1 << 2
788 return nil, nil
789 },
790 GetConfigForClient: func(*ClientHelloInfo) (*Config, error) {
791 called |= 1 << 3
792 return nil, nil
793 },
794 VerifyPeerCertificate: func(rawCerts [][]byte, verifiedChains [][]*x509.Certificate) error {
795 called |= 1 << 4
796 return nil
797 },
798 VerifyConnection: func(ConnectionState) error {
799 called |= 1 << 5
800 return nil
801 },
802 UnwrapSession: func(identity []byte, cs ConnectionState) (*SessionState, error) {
803 called |= 1 << 6
804 return nil, nil
805 },
806 WrapSession: func(cs ConnectionState, ss *SessionState) ([]byte, error) {
807 called |= 1 << 7
808 return nil, nil
809 },
810 EncryptedClientHelloRejectionVerify: func(ConnectionState) error {
811 called |= 1 << 8
812 return nil
813 },
814 }
815
816 c2 := c1.Clone()
817
818 c2.Time()
819 c2.GetCertificate(nil)
820 c2.GetClientCertificate(nil)
821 c2.GetConfigForClient(nil)
822 c2.VerifyPeerCertificate(nil, nil)
823 c2.VerifyConnection(ConnectionState{})
824 c2.UnwrapSession(nil, ConnectionState{})
825 c2.WrapSession(ConnectionState{}, nil)
826 c2.EncryptedClientHelloRejectionVerify(ConnectionState{})
827
828 if called != (1<<expectedCount)-1 {
829 t.Fatalf("expected %d calls but saw calls %b", expectedCount, called)
830 }
831 }
832
833 func TestCloneNonFuncFields(t *testing.T) {
834 var c1 Config
835 v := reflect.ValueOf(&c1).Elem()
836
837 typ := v.Type()
838 for i := 0; i < typ.NumField(); i++ {
839 f := v.Field(i)
840
841
842 switch fn := typ.Field(i).Name; fn {
843 case "Rand":
844 f.Set(reflect.ValueOf(io.Reader(os.Stdin)))
845 case "Time", "GetCertificate", "GetConfigForClient", "VerifyPeerCertificate", "VerifyConnection", "GetClientCertificate", "WrapSession", "UnwrapSession", "EncryptedClientHelloRejectionVerify":
846
847
848
849
850 case "Certificates":
851 f.Set(reflect.ValueOf([]Certificate{
852 {Certificate: [][]byte{{'b'}}},
853 }))
854 case "NameToCertificate":
855 f.Set(reflect.ValueOf(map[string]*Certificate{"a": nil}))
856 case "RootCAs", "ClientCAs":
857 f.Set(reflect.ValueOf(x509.NewCertPool()))
858 case "ClientSessionCache":
859 f.Set(reflect.ValueOf(NewLRUClientSessionCache(10)))
860 case "KeyLogWriter":
861 f.Set(reflect.ValueOf(io.Writer(os.Stdout)))
862 case "NextProtos":
863 f.Set(reflect.ValueOf([]string{"a", "b"}))
864 case "ServerName":
865 f.Set(reflect.ValueOf("b"))
866 case "ClientAuth":
867 f.Set(reflect.ValueOf(VerifyClientCertIfGiven))
868 case "InsecureSkipVerify", "SessionTicketsDisabled", "DynamicRecordSizingDisabled", "PreferServerCipherSuites":
869 f.Set(reflect.ValueOf(true))
870 case "MinVersion", "MaxVersion":
871 f.Set(reflect.ValueOf(uint16(VersionTLS12)))
872 case "SessionTicketKey":
873 f.Set(reflect.ValueOf([32]byte{}))
874 case "CipherSuites":
875 f.Set(reflect.ValueOf([]uint16{1, 2}))
876 case "CurvePreferences":
877 f.Set(reflect.ValueOf([]CurveID{CurveP256}))
878 case "Renegotiation":
879 f.Set(reflect.ValueOf(RenegotiateOnceAsClient))
880 case "EncryptedClientHelloConfigList":
881 f.Set(reflect.ValueOf([]byte{'x'}))
882 case "mutex", "autoSessionTicketKeys", "sessionTicketKeys":
883 continue
884 default:
885 t.Errorf("all fields must be accounted for, but saw unknown field %q", fn)
886 }
887 }
888
889 c1.autoSessionTicketKeys = []ticketKey{c1.ticketKeyFromBytes(c1.SessionTicketKey)}
890 c1.sessionTicketKeys = []ticketKey{c1.ticketKeyFromBytes(c1.SessionTicketKey)}
891
892 c2 := c1.Clone()
893 if !reflect.DeepEqual(&c1, c2) {
894 t.Errorf("clone failed to copy a field")
895 }
896 }
897
898 func TestCloneNilConfig(t *testing.T) {
899 var config *Config
900 if cc := config.Clone(); cc != nil {
901 t.Fatalf("Clone with nil should return nil, got: %+v", cc)
902 }
903 }
904
905
906
907 type changeImplConn struct {
908 net.Conn
909 writeFunc func([]byte) (int, error)
910 closeFunc func() error
911 }
912
913 func (w *changeImplConn) Write(p []byte) (n int, err error) {
914 if w.writeFunc != nil {
915 return w.writeFunc(p)
916 }
917 return w.Conn.Write(p)
918 }
919
920 func (w *changeImplConn) Close() error {
921 if w.closeFunc != nil {
922 return w.closeFunc()
923 }
924 return w.Conn.Close()
925 }
926
927 func throughput(b *testing.B, version uint16, totalBytes int64, dynamicRecordSizingDisabled bool) {
928 ln := newLocalListener(b)
929 defer ln.Close()
930
931 N := b.N
932
933
934
935 const bufsize = 32 << 10
936
937 go func() {
938 buf := make([]byte, bufsize)
939 for i := 0; i < N; i++ {
940 sconn, err := ln.Accept()
941 if err != nil {
942
943
944 panic(fmt.Errorf("accept: %v", err))
945 }
946 serverConfig := testConfig.Clone()
947 serverConfig.CipherSuites = nil
948 serverConfig.DynamicRecordSizingDisabled = dynamicRecordSizingDisabled
949 srv := Server(sconn, serverConfig)
950 if err := srv.Handshake(); err != nil {
951 panic(fmt.Errorf("handshake: %v", err))
952 }
953 if _, err := io.CopyBuffer(srv, srv, buf); err != nil {
954 panic(fmt.Errorf("copy buffer: %v", err))
955 }
956 }
957 }()
958
959 b.SetBytes(totalBytes)
960 clientConfig := testConfig.Clone()
961 clientConfig.CipherSuites = nil
962 clientConfig.DynamicRecordSizingDisabled = dynamicRecordSizingDisabled
963 clientConfig.MaxVersion = version
964
965 buf := make([]byte, bufsize)
966 chunks := int(math.Ceil(float64(totalBytes) / float64(len(buf))))
967 for i := 0; i < N; i++ {
968 conn, err := Dial("tcp", ln.Addr().String(), clientConfig)
969 if err != nil {
970 b.Fatal(err)
971 }
972 for j := 0; j < chunks; j++ {
973 _, err := conn.Write(buf)
974 if err != nil {
975 b.Fatal(err)
976 }
977 _, err = io.ReadFull(conn, buf)
978 if err != nil {
979 b.Fatal(err)
980 }
981 }
982 conn.Close()
983 }
984 }
985
986 func BenchmarkThroughput(b *testing.B) {
987 for _, mode := range []string{"Max", "Dynamic"} {
988 for size := 1; size <= 64; size <<= 1 {
989 name := fmt.Sprintf("%sPacket/%dMB", mode, size)
990 b.Run(name, func(b *testing.B) {
991 b.Run("TLSv12", func(b *testing.B) {
992 throughput(b, VersionTLS12, int64(size<<20), mode == "Max")
993 })
994 b.Run("TLSv13", func(b *testing.B) {
995 throughput(b, VersionTLS13, int64(size<<20), mode == "Max")
996 })
997 })
998 }
999 }
1000 }
1001
1002 type slowConn struct {
1003 net.Conn
1004 bps int
1005 }
1006
1007 func (c *slowConn) Write(p []byte) (int, error) {
1008 if c.bps == 0 {
1009 panic("too slow")
1010 }
1011 t0 := time.Now()
1012 wrote := 0
1013 for wrote < len(p) {
1014 time.Sleep(100 * time.Microsecond)
1015 allowed := int(time.Since(t0).Seconds()*float64(c.bps)) / 8
1016 if allowed > len(p) {
1017 allowed = len(p)
1018 }
1019 if wrote < allowed {
1020 n, err := c.Conn.Write(p[wrote:allowed])
1021 wrote += n
1022 if err != nil {
1023 return wrote, err
1024 }
1025 }
1026 }
1027 return len(p), nil
1028 }
1029
1030 func latency(b *testing.B, version uint16, bps int, dynamicRecordSizingDisabled bool) {
1031 ln := newLocalListener(b)
1032 defer ln.Close()
1033
1034 N := b.N
1035
1036 go func() {
1037 for i := 0; i < N; i++ {
1038 sconn, err := ln.Accept()
1039 if err != nil {
1040
1041
1042 panic(fmt.Errorf("accept: %v", err))
1043 }
1044 serverConfig := testConfig.Clone()
1045 serverConfig.DynamicRecordSizingDisabled = dynamicRecordSizingDisabled
1046 srv := Server(&slowConn{sconn, bps}, serverConfig)
1047 if err := srv.Handshake(); err != nil {
1048 panic(fmt.Errorf("handshake: %v", err))
1049 }
1050 io.Copy(srv, srv)
1051 }
1052 }()
1053
1054 clientConfig := testConfig.Clone()
1055 clientConfig.DynamicRecordSizingDisabled = dynamicRecordSizingDisabled
1056 clientConfig.MaxVersion = version
1057
1058 buf := make([]byte, 16384)
1059 peek := make([]byte, 1)
1060
1061 for i := 0; i < N; i++ {
1062 conn, err := Dial("tcp", ln.Addr().String(), clientConfig)
1063 if err != nil {
1064 b.Fatal(err)
1065 }
1066
1067 if _, err := conn.Write(buf[:1]); err != nil {
1068 b.Fatal(err)
1069 }
1070 if _, err := io.ReadFull(conn, peek); err != nil {
1071 b.Fatal(err)
1072 }
1073 if _, err := conn.Write(buf); err != nil {
1074 b.Fatal(err)
1075 }
1076 if _, err = io.ReadFull(conn, peek); err != nil {
1077 b.Fatal(err)
1078 }
1079 conn.Close()
1080 }
1081 }
1082
1083 func BenchmarkLatency(b *testing.B) {
1084 for _, mode := range []string{"Max", "Dynamic"} {
1085 for _, kbps := range []int{200, 500, 1000, 2000, 5000} {
1086 name := fmt.Sprintf("%sPacket/%dkbps", mode, kbps)
1087 b.Run(name, func(b *testing.B) {
1088 b.Run("TLSv12", func(b *testing.B) {
1089 latency(b, VersionTLS12, kbps*1000, mode == "Max")
1090 })
1091 b.Run("TLSv13", func(b *testing.B) {
1092 latency(b, VersionTLS13, kbps*1000, mode == "Max")
1093 })
1094 })
1095 }
1096 }
1097 }
1098
1099 func TestConnectionStateMarshal(t *testing.T) {
1100 cs := &ConnectionState{}
1101 _, err := json.Marshal(cs)
1102 if err != nil {
1103 t.Errorf("json.Marshal failed on ConnectionState: %v", err)
1104 }
1105 }
1106
1107 func TestConnectionState(t *testing.T) {
1108 issuer, err := x509.ParseCertificate(testRSACertificateIssuer)
1109 if err != nil {
1110 panic(err)
1111 }
1112 rootCAs := x509.NewCertPool()
1113 rootCAs.AddCert(issuer)
1114
1115 const alpnProtocol = "golang"
1116 const serverName = "example.golang"
1117 var scts = [][]byte{[]byte("dummy sct 1"), []byte("dummy sct 2")}
1118 var ocsp = []byte("dummy ocsp")
1119
1120 for _, v := range []uint16{VersionTLS12, VersionTLS13} {
1121 var name string
1122 switch v {
1123 case VersionTLS12:
1124 name = "TLSv12"
1125 case VersionTLS13:
1126 name = "TLSv13"
1127 }
1128 t.Run(name, func(t *testing.T) {
1129 config := &Config{
1130 Time: testTime,
1131 Rand: zeroSource{},
1132 Certificates: make([]Certificate, 1),
1133 MaxVersion: v,
1134 RootCAs: rootCAs,
1135 ClientCAs: rootCAs,
1136 ClientAuth: RequireAndVerifyClientCert,
1137 NextProtos: []string{alpnProtocol},
1138 ServerName: serverName,
1139 }
1140 config.Certificates[0].Certificate = [][]byte{testRSACertificate}
1141 config.Certificates[0].PrivateKey = testRSAPrivateKey
1142 config.Certificates[0].SignedCertificateTimestamps = scts
1143 config.Certificates[0].OCSPStaple = ocsp
1144
1145 ss, cs, err := testHandshake(t, config, config)
1146 if err != nil {
1147 t.Fatalf("Handshake failed: %v", err)
1148 }
1149
1150 if ss.Version != v || cs.Version != v {
1151 t.Errorf("Got versions %x (server) and %x (client), expected %x", ss.Version, cs.Version, v)
1152 }
1153
1154 if !ss.HandshakeComplete || !cs.HandshakeComplete {
1155 t.Errorf("Got HandshakeComplete %v (server) and %v (client), expected true", ss.HandshakeComplete, cs.HandshakeComplete)
1156 }
1157
1158 if ss.DidResume || cs.DidResume {
1159 t.Errorf("Got DidResume %v (server) and %v (client), expected false", ss.DidResume, cs.DidResume)
1160 }
1161
1162 if ss.CipherSuite == 0 || cs.CipherSuite == 0 {
1163 t.Errorf("Got invalid cipher suite: %v (server) and %v (client)", ss.CipherSuite, cs.CipherSuite)
1164 }
1165
1166 if ss.NegotiatedProtocol != alpnProtocol || cs.NegotiatedProtocol != alpnProtocol {
1167 t.Errorf("Got negotiated protocol %q (server) and %q (client), expected %q", ss.NegotiatedProtocol, cs.NegotiatedProtocol, alpnProtocol)
1168 }
1169
1170 if !cs.NegotiatedProtocolIsMutual {
1171 t.Errorf("Got false NegotiatedProtocolIsMutual on the client side")
1172 }
1173
1174
1175 if ss.ServerName != serverName {
1176 t.Errorf("Got server name %q, expected %q", ss.ServerName, serverName)
1177 }
1178 if cs.ServerName != serverName {
1179 t.Errorf("Got server name on client connection %q, expected %q", cs.ServerName, serverName)
1180 }
1181
1182 if len(ss.PeerCertificates) != 1 || len(cs.PeerCertificates) != 1 {
1183 t.Errorf("Got %d (server) and %d (client) peer certificates, expected %d", len(ss.PeerCertificates), len(cs.PeerCertificates), 1)
1184 }
1185
1186 if len(ss.VerifiedChains) != 1 || len(cs.VerifiedChains) != 1 {
1187 t.Errorf("Got %d (server) and %d (client) verified chains, expected %d", len(ss.VerifiedChains), len(cs.VerifiedChains), 1)
1188 } else if len(ss.VerifiedChains[0]) != 2 || len(cs.VerifiedChains[0]) != 2 {
1189 t.Errorf("Got %d (server) and %d (client) long verified chain, expected %d", len(ss.VerifiedChains[0]), len(cs.VerifiedChains[0]), 2)
1190 }
1191
1192 if len(cs.SignedCertificateTimestamps) != 2 {
1193 t.Errorf("Got %d SCTs, expected %d", len(cs.SignedCertificateTimestamps), 2)
1194 }
1195 if !bytes.Equal(cs.OCSPResponse, ocsp) {
1196 t.Errorf("Got OCSPs %x, expected %x", cs.OCSPResponse, ocsp)
1197 }
1198
1199 if v == VersionTLS13 {
1200 if len(ss.SignedCertificateTimestamps) != 2 {
1201 t.Errorf("Got %d client SCTs, expected %d", len(ss.SignedCertificateTimestamps), 2)
1202 }
1203 if !bytes.Equal(ss.OCSPResponse, ocsp) {
1204 t.Errorf("Got client OCSPs %x, expected %x", ss.OCSPResponse, ocsp)
1205 }
1206 }
1207
1208 if v == VersionTLS13 {
1209 if ss.TLSUnique != nil || cs.TLSUnique != nil {
1210 t.Errorf("Got TLSUnique %x (server) and %x (client), expected nil in TLS 1.3", ss.TLSUnique, cs.TLSUnique)
1211 }
1212 } else {
1213 if ss.TLSUnique == nil || cs.TLSUnique == nil {
1214 t.Errorf("Got TLSUnique %x (server) and %x (client), expected non-nil", ss.TLSUnique, cs.TLSUnique)
1215 }
1216 }
1217 })
1218 }
1219 }
1220
1221
1222
1223 func TestBuildNameToCertificate_doesntModifyCertificates(t *testing.T) {
1224 c0 := Certificate{
1225 Certificate: [][]byte{testRSACertificate},
1226 PrivateKey: testRSAPrivateKey,
1227 }
1228 c1 := Certificate{
1229 Certificate: [][]byte{testSNICertificate},
1230 PrivateKey: testRSAPrivateKey,
1231 }
1232 config := testConfig.Clone()
1233 config.Certificates = []Certificate{c0, c1}
1234
1235 config.BuildNameToCertificate()
1236 got := config.Certificates
1237 want := []Certificate{c0, c1}
1238 if !reflect.DeepEqual(got, want) {
1239 t.Fatalf("Certificates were mutated by BuildNameToCertificate\nGot: %#v\nWant: %#v\n", got, want)
1240 }
1241 }
1242
1243 func testingKey(s string) string { return strings.ReplaceAll(s, "TESTING KEY", "PRIVATE KEY") }
1244
1245 func TestClientHelloInfo_SupportsCertificate(t *testing.T) {
1246 rsaCert := &Certificate{
1247 Certificate: [][]byte{testRSACertificate},
1248 PrivateKey: testRSAPrivateKey,
1249 }
1250 pkcs1Cert := &Certificate{
1251 Certificate: [][]byte{testRSACertificate},
1252 PrivateKey: testRSAPrivateKey,
1253 SupportedSignatureAlgorithms: []SignatureScheme{PKCS1WithSHA1, PKCS1WithSHA256},
1254 }
1255 ecdsaCert := &Certificate{
1256
1257 Certificate: [][]byte{testP256Certificate},
1258 PrivateKey: testP256PrivateKey,
1259 }
1260 ed25519Cert := &Certificate{
1261 Certificate: [][]byte{testEd25519Certificate},
1262 PrivateKey: testEd25519PrivateKey,
1263 }
1264
1265 tests := []struct {
1266 c *Certificate
1267 chi *ClientHelloInfo
1268 wantErr string
1269 }{
1270 {rsaCert, &ClientHelloInfo{
1271 ServerName: "example.golang",
1272 SignatureSchemes: []SignatureScheme{PSSWithSHA256},
1273 SupportedVersions: []uint16{VersionTLS13},
1274 }, ""},
1275 {ecdsaCert, &ClientHelloInfo{
1276 SignatureSchemes: []SignatureScheme{PSSWithSHA256, ECDSAWithP256AndSHA256},
1277 SupportedVersions: []uint16{VersionTLS13, VersionTLS12},
1278 }, ""},
1279 {rsaCert, &ClientHelloInfo{
1280 ServerName: "example.com",
1281 SignatureSchemes: []SignatureScheme{PSSWithSHA256},
1282 SupportedVersions: []uint16{VersionTLS13},
1283 }, "not valid for requested server name"},
1284 {ecdsaCert, &ClientHelloInfo{
1285 SignatureSchemes: []SignatureScheme{ECDSAWithP384AndSHA384},
1286 SupportedVersions: []uint16{VersionTLS13},
1287 }, "signature algorithms"},
1288 {pkcs1Cert, &ClientHelloInfo{
1289 SignatureSchemes: []SignatureScheme{PSSWithSHA256, ECDSAWithP256AndSHA256},
1290 SupportedVersions: []uint16{VersionTLS13},
1291 }, "signature algorithms"},
1292
1293 {rsaCert, &ClientHelloInfo{
1294 CipherSuites: []uint16{TLS_RSA_WITH_AES_128_GCM_SHA256},
1295 SignatureSchemes: []SignatureScheme{PKCS1WithSHA1},
1296 SupportedVersions: []uint16{VersionTLS13, VersionTLS12},
1297 }, "signature algorithms"},
1298 {rsaCert, &ClientHelloInfo{
1299 CipherSuites: []uint16{TLS_RSA_WITH_AES_128_GCM_SHA256},
1300 SignatureSchemes: []SignatureScheme{PKCS1WithSHA1},
1301 SupportedVersions: []uint16{VersionTLS13, VersionTLS12},
1302 config: &Config{
1303 CipherSuites: []uint16{TLS_RSA_WITH_AES_128_GCM_SHA256},
1304 MaxVersion: VersionTLS12,
1305 },
1306 }, ""},
1307
1308 {ecdsaCert, &ClientHelloInfo{
1309 CipherSuites: []uint16{TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256},
1310 SupportedCurves: []CurveID{CurveP256},
1311 SupportedPoints: []uint8{pointFormatUncompressed},
1312 SignatureSchemes: []SignatureScheme{ECDSAWithP256AndSHA256},
1313 SupportedVersions: []uint16{VersionTLS12},
1314 }, ""},
1315 {ecdsaCert, &ClientHelloInfo{
1316 CipherSuites: []uint16{TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256},
1317 SupportedCurves: []CurveID{CurveP256},
1318 SupportedPoints: []uint8{pointFormatUncompressed},
1319 SignatureSchemes: []SignatureScheme{ECDSAWithP384AndSHA384},
1320 SupportedVersions: []uint16{VersionTLS12},
1321 }, ""},
1322 {ecdsaCert, &ClientHelloInfo{
1323 CipherSuites: []uint16{TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256},
1324 SupportedCurves: []CurveID{CurveP256},
1325 SupportedPoints: []uint8{pointFormatUncompressed},
1326 SignatureSchemes: nil,
1327 SupportedVersions: []uint16{VersionTLS12},
1328 }, ""},
1329 {ecdsaCert, &ClientHelloInfo{
1330 CipherSuites: []uint16{TLS_RSA_WITH_AES_128_GCM_SHA256},
1331 SupportedCurves: []CurveID{CurveP256},
1332 SupportedPoints: []uint8{pointFormatUncompressed},
1333 SignatureSchemes: []SignatureScheme{ECDSAWithP256AndSHA256},
1334 SupportedVersions: []uint16{VersionTLS12},
1335 }, "cipher suite"},
1336 {ecdsaCert, &ClientHelloInfo{
1337 CipherSuites: []uint16{TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256},
1338 SupportedCurves: []CurveID{CurveP256},
1339 SupportedPoints: []uint8{pointFormatUncompressed},
1340 SignatureSchemes: []SignatureScheme{ECDSAWithP256AndSHA256},
1341 SupportedVersions: []uint16{VersionTLS12},
1342 config: &Config{
1343 CipherSuites: []uint16{TLS_RSA_WITH_AES_128_GCM_SHA256},
1344 },
1345 }, "cipher suite"},
1346 {ecdsaCert, &ClientHelloInfo{
1347 CipherSuites: []uint16{TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256},
1348 SupportedCurves: []CurveID{CurveP384},
1349 SupportedPoints: []uint8{pointFormatUncompressed},
1350 SignatureSchemes: []SignatureScheme{ECDSAWithP256AndSHA256},
1351 SupportedVersions: []uint16{VersionTLS12},
1352 }, "certificate curve"},
1353 {ecdsaCert, &ClientHelloInfo{
1354 CipherSuites: []uint16{TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256},
1355 SupportedCurves: []CurveID{CurveP256},
1356 SupportedPoints: []uint8{1},
1357 SignatureSchemes: []SignatureScheme{ECDSAWithP256AndSHA256},
1358 SupportedVersions: []uint16{VersionTLS12},
1359 }, "doesn't support ECDHE"},
1360 {ecdsaCert, &ClientHelloInfo{
1361 CipherSuites: []uint16{TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256},
1362 SupportedCurves: []CurveID{CurveP256},
1363 SupportedPoints: []uint8{pointFormatUncompressed},
1364 SignatureSchemes: []SignatureScheme{PSSWithSHA256},
1365 SupportedVersions: []uint16{VersionTLS12},
1366 }, "signature algorithms"},
1367
1368 {ed25519Cert, &ClientHelloInfo{
1369 CipherSuites: []uint16{TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256},
1370 SupportedCurves: []CurveID{CurveP256},
1371 SupportedPoints: []uint8{pointFormatUncompressed},
1372 SignatureSchemes: []SignatureScheme{Ed25519},
1373 SupportedVersions: []uint16{VersionTLS12},
1374 }, ""},
1375 {ed25519Cert, &ClientHelloInfo{
1376 CipherSuites: []uint16{TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256},
1377 SupportedCurves: []CurveID{CurveP256},
1378 SupportedPoints: []uint8{pointFormatUncompressed},
1379 SignatureSchemes: []SignatureScheme{Ed25519},
1380 SupportedVersions: []uint16{VersionTLS10},
1381 config: &Config{MinVersion: VersionTLS10},
1382 }, "doesn't support Ed25519"},
1383 {ed25519Cert, &ClientHelloInfo{
1384 CipherSuites: []uint16{TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256},
1385 SupportedCurves: []CurveID{},
1386 SupportedPoints: []uint8{pointFormatUncompressed},
1387 SignatureSchemes: []SignatureScheme{Ed25519},
1388 SupportedVersions: []uint16{VersionTLS12},
1389 }, "doesn't support ECDHE"},
1390
1391 {rsaCert, &ClientHelloInfo{
1392 CipherSuites: []uint16{TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA},
1393 SupportedCurves: []CurveID{CurveP256},
1394 SupportedPoints: []uint8{pointFormatUncompressed},
1395 SupportedVersions: []uint16{VersionTLS10},
1396 config: &Config{MinVersion: VersionTLS10},
1397 }, ""},
1398 {rsaCert, &ClientHelloInfo{
1399 CipherSuites: []uint16{TLS_RSA_WITH_AES_128_GCM_SHA256},
1400 SupportedVersions: []uint16{VersionTLS12},
1401 config: &Config{
1402 CipherSuites: []uint16{TLS_RSA_WITH_AES_128_GCM_SHA256},
1403 },
1404 }, ""},
1405 }
1406 for i, tt := range tests {
1407 err := tt.chi.SupportsCertificate(tt.c)
1408 switch {
1409 case tt.wantErr == "" && err != nil:
1410 t.Errorf("%d: unexpected error: %v", i, err)
1411 case tt.wantErr != "" && err == nil:
1412 t.Errorf("%d: unexpected success", i)
1413 case tt.wantErr != "" && !strings.Contains(err.Error(), tt.wantErr):
1414 t.Errorf("%d: got error %q, expected %q", i, err, tt.wantErr)
1415 }
1416 }
1417 }
1418
1419 func TestCipherSuites(t *testing.T) {
1420 var lastID uint16
1421 for _, c := range CipherSuites() {
1422 if lastID > c.ID {
1423 t.Errorf("CipherSuites are not ordered by ID: got %#04x after %#04x", c.ID, lastID)
1424 } else {
1425 lastID = c.ID
1426 }
1427
1428 if c.Insecure {
1429 t.Errorf("%#04x: Insecure CipherSuite returned by CipherSuites()", c.ID)
1430 }
1431 }
1432 lastID = 0
1433 for _, c := range InsecureCipherSuites() {
1434 if lastID > c.ID {
1435 t.Errorf("InsecureCipherSuites are not ordered by ID: got %#04x after %#04x", c.ID, lastID)
1436 } else {
1437 lastID = c.ID
1438 }
1439
1440 if !c.Insecure {
1441 t.Errorf("%#04x: not Insecure CipherSuite returned by InsecureCipherSuites()", c.ID)
1442 }
1443 }
1444
1445 CipherSuiteByID := func(id uint16) *CipherSuite {
1446 for _, c := range CipherSuites() {
1447 if c.ID == id {
1448 return c
1449 }
1450 }
1451 for _, c := range InsecureCipherSuites() {
1452 if c.ID == id {
1453 return c
1454 }
1455 }
1456 return nil
1457 }
1458
1459 for _, c := range cipherSuites {
1460 cc := CipherSuiteByID(c.id)
1461 if cc == nil {
1462 t.Errorf("%#04x: no CipherSuite entry", c.id)
1463 continue
1464 }
1465
1466 if tls12Only := c.flags&suiteTLS12 != 0; tls12Only && len(cc.SupportedVersions) != 1 {
1467 t.Errorf("%#04x: suite is TLS 1.2 only, but SupportedVersions is %v", c.id, cc.SupportedVersions)
1468 } else if !tls12Only && len(cc.SupportedVersions) != 3 {
1469 t.Errorf("%#04x: suite TLS 1.0-1.2, but SupportedVersions is %v", c.id, cc.SupportedVersions)
1470 }
1471
1472 if cc.Insecure {
1473 if slices.Contains(defaultCipherSuites(), c.id) {
1474 t.Errorf("%#04x: insecure suite in default list", c.id)
1475 }
1476 } else {
1477 if !slices.Contains(defaultCipherSuites(), c.id) {
1478 t.Errorf("%#04x: secure suite not in default list", c.id)
1479 }
1480 }
1481
1482 if got := CipherSuiteName(c.id); got != cc.Name {
1483 t.Errorf("%#04x: unexpected CipherSuiteName: got %q, expected %q", c.id, got, cc.Name)
1484 }
1485 }
1486 for _, c := range cipherSuitesTLS13 {
1487 cc := CipherSuiteByID(c.id)
1488 if cc == nil {
1489 t.Errorf("%#04x: no CipherSuite entry", c.id)
1490 continue
1491 }
1492
1493 if cc.Insecure {
1494 t.Errorf("%#04x: Insecure %v, expected false", c.id, cc.Insecure)
1495 }
1496 if len(cc.SupportedVersions) != 1 || cc.SupportedVersions[0] != VersionTLS13 {
1497 t.Errorf("%#04x: suite is TLS 1.3 only, but SupportedVersions is %v", c.id, cc.SupportedVersions)
1498 }
1499
1500 if got := CipherSuiteName(c.id); got != cc.Name {
1501 t.Errorf("%#04x: unexpected CipherSuiteName: got %q, expected %q", c.id, got, cc.Name)
1502 }
1503 }
1504
1505 if got := CipherSuiteName(0xabc); got != "0x0ABC" {
1506 t.Errorf("unexpected fallback CipherSuiteName: got %q, expected 0x0ABC", got)
1507 }
1508
1509 if len(cipherSuitesPreferenceOrder) != len(cipherSuites) {
1510 t.Errorf("cipherSuitesPreferenceOrder is not the same size as cipherSuites")
1511 }
1512 if len(cipherSuitesPreferenceOrderNoAES) != len(cipherSuitesPreferenceOrder) {
1513 t.Errorf("cipherSuitesPreferenceOrderNoAES is not the same size as cipherSuitesPreferenceOrder")
1514 }
1515
1516
1517 for _, badSuites := range []map[uint16]bool{disabledCipherSuites, rsaKexCiphers} {
1518 for id := range badSuites {
1519 c := CipherSuiteByID(id)
1520 if c == nil {
1521 t.Errorf("%#04x: no CipherSuite entry", id)
1522 continue
1523 }
1524 if !c.Insecure {
1525 t.Errorf("%#04x: disabled by default but not marked insecure", id)
1526 }
1527 }
1528 }
1529
1530 for i, prefOrder := range [][]uint16{cipherSuitesPreferenceOrder, cipherSuitesPreferenceOrderNoAES} {
1531
1532
1533 var sawInsecure, sawBad bool
1534 for _, id := range prefOrder {
1535 c := CipherSuiteByID(id)
1536 if c == nil {
1537 t.Errorf("%#04x: no CipherSuite entry", id)
1538 continue
1539 }
1540
1541 if c.Insecure {
1542 sawInsecure = true
1543 } else if sawInsecure {
1544 t.Errorf("%#04x: secure suite after insecure one(s)", id)
1545 }
1546
1547 if http2isBadCipher(id) {
1548 sawBad = true
1549 } else if sawBad {
1550 t.Errorf("%#04x: non-bad suite after bad HTTP/2 one(s)", id)
1551 }
1552 }
1553
1554
1555 isBetter := func(a, b uint16) int {
1556 aSuite, bSuite := cipherSuiteByID(a), cipherSuiteByID(b)
1557 aName, bName := CipherSuiteName(a), CipherSuiteName(b)
1558
1559 if !strings.Contains(aName, "RC4") && strings.Contains(bName, "RC4") {
1560 return -1
1561 } else if strings.Contains(aName, "RC4") && !strings.Contains(bName, "RC4") {
1562 return +1
1563 }
1564
1565 if !strings.Contains(aName, "CBC_SHA256") && strings.Contains(bName, "CBC_SHA256") {
1566 return -1
1567 } else if strings.Contains(aName, "CBC_SHA256") && !strings.Contains(bName, "CBC_SHA256") {
1568 return +1
1569 }
1570
1571 if !strings.Contains(aName, "3DES") && strings.Contains(bName, "3DES") {
1572 return -1
1573 } else if strings.Contains(aName, "3DES") && !strings.Contains(bName, "3DES") {
1574 return +1
1575 }
1576
1577 if aSuite.flags&suiteECDHE != 0 && bSuite.flags&suiteECDHE == 0 {
1578 return -1
1579 } else if aSuite.flags&suiteECDHE == 0 && bSuite.flags&suiteECDHE != 0 {
1580 return +1
1581 }
1582
1583 if aSuite.aead != nil && bSuite.aead == nil {
1584 return -1
1585 } else if aSuite.aead == nil && bSuite.aead != nil {
1586 return +1
1587 }
1588
1589 if strings.Contains(aName, "AES") && strings.Contains(bName, "CHACHA20") {
1590
1591 if i == 0 {
1592 return -1
1593 } else {
1594 return +1
1595 }
1596 } else if strings.Contains(aName, "CHACHA20") && strings.Contains(bName, "AES") {
1597
1598 if i != 0 {
1599 return -1
1600 } else {
1601 return +1
1602 }
1603 }
1604
1605 if strings.Contains(aName, "AES_128") && strings.Contains(bName, "AES_256") {
1606 return -1
1607 } else if strings.Contains(aName, "AES_256") && strings.Contains(bName, "AES_128") {
1608 return +1
1609 }
1610
1611 if aSuite.flags&suiteECSign != 0 && bSuite.flags&suiteECSign == 0 {
1612 return -1
1613 } else if aSuite.flags&suiteECSign == 0 && bSuite.flags&suiteECSign != 0 {
1614 return +1
1615 }
1616 t.Fatalf("two ciphersuites are equal by all criteria: %v and %v", aName, bName)
1617 panic("unreachable")
1618 }
1619 if !slices.IsSortedFunc(prefOrder, isBetter) {
1620 t.Error("preference order is not sorted according to the rules")
1621 }
1622 }
1623 }
1624
1625 func TestVersionName(t *testing.T) {
1626 if got, exp := VersionName(VersionTLS13), "TLS 1.3"; got != exp {
1627 t.Errorf("unexpected VersionName: got %q, expected %q", got, exp)
1628 }
1629 if got, exp := VersionName(0x12a), "0x012A"; got != exp {
1630 t.Errorf("unexpected fallback VersionName: got %q, expected %q", got, exp)
1631 }
1632 }
1633
1634
1635
1636 func http2isBadCipher(cipher uint16) bool {
1637 switch cipher {
1638 case TLS_RSA_WITH_RC4_128_SHA,
1639 TLS_RSA_WITH_3DES_EDE_CBC_SHA,
1640 TLS_RSA_WITH_AES_128_CBC_SHA,
1641 TLS_RSA_WITH_AES_256_CBC_SHA,
1642 TLS_RSA_WITH_AES_128_CBC_SHA256,
1643 TLS_RSA_WITH_AES_128_GCM_SHA256,
1644 TLS_RSA_WITH_AES_256_GCM_SHA384,
1645 TLS_ECDHE_ECDSA_WITH_RC4_128_SHA,
1646 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
1647 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
1648 TLS_ECDHE_RSA_WITH_RC4_128_SHA,
1649 TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,
1650 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
1651 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
1652 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,
1653 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256:
1654 return true
1655 default:
1656 return false
1657 }
1658 }
1659
1660 type brokenSigner struct{ crypto.Signer }
1661
1662 func (s brokenSigner) Sign(rand io.Reader, digest []byte, opts crypto.SignerOpts) (signature []byte, err error) {
1663
1664 return s.Signer.Sign(rand, digest, opts.HashFunc())
1665 }
1666
1667
1668
1669 func TestPKCS1OnlyCert(t *testing.T) {
1670 clientConfig := testConfig.Clone()
1671 clientConfig.Certificates = []Certificate{{
1672 Certificate: [][]byte{testRSACertificate},
1673 PrivateKey: brokenSigner{testRSAPrivateKey},
1674 }}
1675 serverConfig := testConfig.Clone()
1676 serverConfig.MaxVersion = VersionTLS12
1677 serverConfig.ClientAuth = RequireAnyClientCert
1678
1679
1680 if _, _, err := testHandshake(t, clientConfig, serverConfig); err == nil {
1681 t.Fatal("expected broken certificate to cause connection to fail")
1682 }
1683
1684 clientConfig.Certificates[0].SupportedSignatureAlgorithms =
1685 []SignatureScheme{PKCS1WithSHA1, PKCS1WithSHA256}
1686
1687
1688
1689 if _, _, err := testHandshake(t, clientConfig, serverConfig); err != nil {
1690 t.Error(err)
1691 }
1692 }
1693
1694 func TestVerifyCertificates(t *testing.T) {
1695
1696 t.Run("TLSv12", func(t *testing.T) { testVerifyCertificates(t, VersionTLS12) })
1697 t.Run("TLSv13", func(t *testing.T) { testVerifyCertificates(t, VersionTLS13) })
1698 }
1699
1700 func testVerifyCertificates(t *testing.T, version uint16) {
1701 tests := []struct {
1702 name string
1703
1704 InsecureSkipVerify bool
1705 ClientAuth ClientAuthType
1706 ClientCertificates bool
1707 }{
1708 {
1709 name: "defaults",
1710 },
1711 {
1712 name: "InsecureSkipVerify",
1713 InsecureSkipVerify: true,
1714 },
1715 {
1716 name: "RequestClientCert with no certs",
1717 ClientAuth: RequestClientCert,
1718 },
1719 {
1720 name: "RequestClientCert with certs",
1721 ClientAuth: RequestClientCert,
1722 ClientCertificates: true,
1723 },
1724 {
1725 name: "RequireAnyClientCert",
1726 ClientAuth: RequireAnyClientCert,
1727 ClientCertificates: true,
1728 },
1729 {
1730 name: "VerifyClientCertIfGiven with no certs",
1731 ClientAuth: VerifyClientCertIfGiven,
1732 },
1733 {
1734 name: "VerifyClientCertIfGiven with certs",
1735 ClientAuth: VerifyClientCertIfGiven,
1736 ClientCertificates: true,
1737 },
1738 {
1739 name: "RequireAndVerifyClientCert",
1740 ClientAuth: RequireAndVerifyClientCert,
1741 ClientCertificates: true,
1742 },
1743 }
1744
1745 issuer, err := x509.ParseCertificate(testRSACertificateIssuer)
1746 if err != nil {
1747 t.Fatal(err)
1748 }
1749 rootCAs := x509.NewCertPool()
1750 rootCAs.AddCert(issuer)
1751
1752 for _, test := range tests {
1753 test := test
1754 t.Run(test.name, func(t *testing.T) {
1755 t.Parallel()
1756
1757 var serverVerifyConnection, clientVerifyConnection bool
1758 var serverVerifyPeerCertificates, clientVerifyPeerCertificates bool
1759
1760 clientConfig := testConfig.Clone()
1761 clientConfig.Time = testTime
1762 clientConfig.MaxVersion = version
1763 clientConfig.MinVersion = version
1764 clientConfig.RootCAs = rootCAs
1765 clientConfig.ServerName = "example.golang"
1766 clientConfig.ClientSessionCache = NewLRUClientSessionCache(1)
1767 serverConfig := clientConfig.Clone()
1768 serverConfig.ClientCAs = rootCAs
1769
1770 clientConfig.VerifyConnection = func(cs ConnectionState) error {
1771 clientVerifyConnection = true
1772 return nil
1773 }
1774 clientConfig.VerifyPeerCertificate = func(rawCerts [][]byte, verifiedChains [][]*x509.Certificate) error {
1775 clientVerifyPeerCertificates = true
1776 return nil
1777 }
1778 serverConfig.VerifyConnection = func(cs ConnectionState) error {
1779 serverVerifyConnection = true
1780 return nil
1781 }
1782 serverConfig.VerifyPeerCertificate = func(rawCerts [][]byte, verifiedChains [][]*x509.Certificate) error {
1783 serverVerifyPeerCertificates = true
1784 return nil
1785 }
1786
1787 clientConfig.InsecureSkipVerify = test.InsecureSkipVerify
1788 serverConfig.ClientAuth = test.ClientAuth
1789 if !test.ClientCertificates {
1790 clientConfig.Certificates = nil
1791 }
1792
1793 if _, _, err := testHandshake(t, clientConfig, serverConfig); err != nil {
1794 t.Fatal(err)
1795 }
1796
1797 want := serverConfig.ClientAuth != NoClientCert
1798 if serverVerifyPeerCertificates != want {
1799 t.Errorf("VerifyPeerCertificates on the server: got %v, want %v",
1800 serverVerifyPeerCertificates, want)
1801 }
1802 if !clientVerifyPeerCertificates {
1803 t.Errorf("VerifyPeerCertificates not called on the client")
1804 }
1805 if !serverVerifyConnection {
1806 t.Error("VerifyConnection did not get called on the server")
1807 }
1808 if !clientVerifyConnection {
1809 t.Error("VerifyConnection did not get called on the client")
1810 }
1811
1812 serverVerifyPeerCertificates, clientVerifyPeerCertificates = false, false
1813 serverVerifyConnection, clientVerifyConnection = false, false
1814 cs, _, err := testHandshake(t, clientConfig, serverConfig)
1815 if err != nil {
1816 t.Fatal(err)
1817 }
1818 if !cs.DidResume {
1819 t.Error("expected resumption")
1820 }
1821
1822 if serverVerifyPeerCertificates {
1823 t.Error("VerifyPeerCertificates got called on the server on resumption")
1824 }
1825 if clientVerifyPeerCertificates {
1826 t.Error("VerifyPeerCertificates got called on the client on resumption")
1827 }
1828 if !serverVerifyConnection {
1829 t.Error("VerifyConnection did not get called on the server on resumption")
1830 }
1831 if !clientVerifyConnection {
1832 t.Error("VerifyConnection did not get called on the client on resumption")
1833 }
1834 })
1835 }
1836 }
1837
1838 func TestHandshakeKyber(t *testing.T) {
1839 if x25519Kyber768Draft00.String() != "X25519Kyber768Draft00" {
1840 t.Fatalf("unexpected CurveID string: %v", x25519Kyber768Draft00.String())
1841 }
1842
1843 var tests = []struct {
1844 name string
1845 clientConfig func(*Config)
1846 serverConfig func(*Config)
1847 preparation func(*testing.T)
1848 expectClientSupport bool
1849 expectKyber bool
1850 expectHRR bool
1851 }{
1852 {
1853 name: "Default",
1854 expectClientSupport: true,
1855 expectKyber: true,
1856 expectHRR: false,
1857 },
1858 {
1859 name: "ClientCurvePreferences",
1860 clientConfig: func(config *Config) {
1861 config.CurvePreferences = []CurveID{X25519}
1862 },
1863 expectClientSupport: false,
1864 },
1865 {
1866 name: "ServerCurvePreferencesX25519",
1867 serverConfig: func(config *Config) {
1868 config.CurvePreferences = []CurveID{X25519}
1869 },
1870 expectClientSupport: true,
1871 expectKyber: false,
1872 expectHRR: false,
1873 },
1874 {
1875 name: "ServerCurvePreferencesHRR",
1876 serverConfig: func(config *Config) {
1877 config.CurvePreferences = []CurveID{CurveP256}
1878 },
1879 expectClientSupport: true,
1880 expectKyber: false,
1881 expectHRR: true,
1882 },
1883 {
1884 name: "ClientTLSv12",
1885 clientConfig: func(config *Config) {
1886 config.MaxVersion = VersionTLS12
1887 },
1888 expectClientSupport: false,
1889 },
1890 {
1891 name: "ServerTLSv12",
1892 serverConfig: func(config *Config) {
1893 config.MaxVersion = VersionTLS12
1894 },
1895 expectClientSupport: true,
1896 expectKyber: false,
1897 },
1898 {
1899 name: "GODEBUG",
1900 preparation: func(t *testing.T) {
1901 t.Setenv("GODEBUG", "tlskyber=0")
1902 },
1903 expectClientSupport: false,
1904 },
1905 }
1906
1907 baseConfig := testConfig.Clone()
1908 baseConfig.CurvePreferences = nil
1909 for _, test := range tests {
1910 t.Run(test.name, func(t *testing.T) {
1911 if test.preparation != nil {
1912 test.preparation(t)
1913 } else {
1914 t.Parallel()
1915 }
1916 serverConfig := baseConfig.Clone()
1917 if test.serverConfig != nil {
1918 test.serverConfig(serverConfig)
1919 }
1920 serverConfig.GetConfigForClient = func(hello *ClientHelloInfo) (*Config, error) {
1921 if !test.expectClientSupport && slices.Contains(hello.SupportedCurves, x25519Kyber768Draft00) {
1922 return nil, errors.New("client supports Kyber768Draft00")
1923 } else if test.expectClientSupport && !slices.Contains(hello.SupportedCurves, x25519Kyber768Draft00) {
1924 return nil, errors.New("client does not support Kyber768Draft00")
1925 }
1926 return nil, nil
1927 }
1928 clientConfig := baseConfig.Clone()
1929 if test.clientConfig != nil {
1930 test.clientConfig(clientConfig)
1931 }
1932 ss, cs, err := testHandshake(t, clientConfig, serverConfig)
1933 if err != nil {
1934 t.Fatal(err)
1935 }
1936 if test.expectKyber {
1937 if ss.testingOnlyCurveID != x25519Kyber768Draft00 {
1938 t.Errorf("got CurveID %v (server), expected %v", ss.testingOnlyCurveID, x25519Kyber768Draft00)
1939 }
1940 if cs.testingOnlyCurveID != x25519Kyber768Draft00 {
1941 t.Errorf("got CurveID %v (client), expected %v", cs.testingOnlyCurveID, x25519Kyber768Draft00)
1942 }
1943 } else {
1944 if ss.testingOnlyCurveID == x25519Kyber768Draft00 {
1945 t.Errorf("got CurveID %v (server), expected not Kyber", ss.testingOnlyCurveID)
1946 }
1947 if cs.testingOnlyCurveID == x25519Kyber768Draft00 {
1948 t.Errorf("got CurveID %v (client), expected not Kyber", cs.testingOnlyCurveID)
1949 }
1950 }
1951 if test.expectHRR {
1952 if !ss.testingOnlyDidHRR {
1953 t.Error("server did not use HRR")
1954 }
1955 if !cs.testingOnlyDidHRR {
1956 t.Error("client did not use HRR")
1957 }
1958 } else {
1959 if ss.testingOnlyDidHRR {
1960 t.Error("server used HRR")
1961 }
1962 if cs.testingOnlyDidHRR {
1963 t.Error("client used HRR")
1964 }
1965 }
1966 })
1967 }
1968 }
1969
1970 func TestX509KeyPairPopulateCertificate(t *testing.T) {
1971 key, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
1972 if err != nil {
1973 t.Fatal(err)
1974 }
1975 keyDER, err := x509.MarshalPKCS8PrivateKey(key)
1976 if err != nil {
1977 t.Fatal(err)
1978 }
1979 keyPEM := pem.EncodeToMemory(&pem.Block{Type: "PRIVATE KEY", Bytes: keyDER})
1980 tmpl := &x509.Certificate{
1981 SerialNumber: big.NewInt(1),
1982 Subject: pkix.Name{CommonName: "test"},
1983 }
1984 certDER, err := x509.CreateCertificate(rand.Reader, tmpl, tmpl, key.Public(), key)
1985 if err != nil {
1986 t.Fatal(err)
1987 }
1988 certPEM := pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: certDER})
1989
1990 t.Run("x509keypairleaf=0", func(t *testing.T) {
1991 t.Setenv("GODEBUG", "x509keypairleaf=0")
1992 cert, err := X509KeyPair(certPEM, keyPEM)
1993 if err != nil {
1994 t.Fatal(err)
1995 }
1996 if cert.Leaf != nil {
1997 t.Fatal("Leaf should not be populated")
1998 }
1999 })
2000 t.Run("x509keypairleaf=1", func(t *testing.T) {
2001 t.Setenv("GODEBUG", "x509keypairleaf=1")
2002 cert, err := X509KeyPair(certPEM, keyPEM)
2003 if err != nil {
2004 t.Fatal(err)
2005 }
2006 if cert.Leaf == nil {
2007 t.Fatal("Leaf should be populated")
2008 }
2009 })
2010 t.Run("GODEBUG unset", func(t *testing.T) {
2011 cert, err := X509KeyPair(certPEM, keyPEM)
2012 if err != nil {
2013 t.Fatal(err)
2014 }
2015 if cert.Leaf == nil {
2016 t.Fatal("Leaf should be populated")
2017 }
2018 })
2019 }
2020
2021 func TestEarlyLargeCertMsg(t *testing.T) {
2022 client, server := localPipe(t)
2023
2024 go func() {
2025 if _, err := client.Write([]byte{byte(recordTypeHandshake), 3, 4, 0, 4, typeCertificate, 1, 255, 255}); err != nil {
2026 t.Log(err)
2027 }
2028 }()
2029
2030 expectedErr := "tls: handshake message of length 131071 bytes exceeds maximum of 65536 bytes"
2031 servConn := Server(server, testConfig)
2032 err := servConn.Handshake()
2033 if err == nil {
2034 t.Fatal("unexpected success")
2035 }
2036 if err.Error() != expectedErr {
2037 t.Fatalf("unexpected error: got %q, want %q", err, expectedErr)
2038 }
2039 }
2040
2041 func TestLargeCertMsg(t *testing.T) {
2042 k, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
2043 if err != nil {
2044 t.Fatal(err)
2045 }
2046 tmpl := &x509.Certificate{
2047 SerialNumber: big.NewInt(1),
2048 Subject: pkix.Name{CommonName: "test"},
2049 ExtraExtensions: []pkix.Extension{
2050 {
2051 Id: asn1.ObjectIdentifier{1, 2, 3},
2052
2053
2054 Value: make([]byte, 65536),
2055 },
2056 },
2057 }
2058 cert, err := x509.CreateCertificate(rand.Reader, tmpl, tmpl, k.Public(), k)
2059 if err != nil {
2060 t.Fatal(err)
2061 }
2062
2063 clientConfig, serverConfig := testConfig.Clone(), testConfig.Clone()
2064 clientConfig.InsecureSkipVerify = true
2065 serverConfig.Certificates = []Certificate{
2066 {
2067 Certificate: [][]byte{cert},
2068 PrivateKey: k,
2069 },
2070 }
2071 if _, _, err := testHandshake(t, clientConfig, serverConfig); err != nil {
2072 t.Fatalf("unexpected failure :%s", err)
2073 }
2074 }
2075
View as plain text