github.com/FISCO-BCOS/crypto@v0.0.0-20200202032121-bd8ab0b5d4f1/tls/example_test.go (about) 1 // Copyright 2014 The Go Authors. All rights reserved. 2 // Use of this source code is governed by a BSD-style 3 // license that can be found in the LICENSE file. 4 5 package tls_test 6 7 import ( 8 "github.com/FISCO-BCOS/crypto/tls" 9 "github.com/FISCO-BCOS/crypto/x509" 10 "log" 11 "net/http" 12 "net/http/httptest" 13 "os" 14 "time" 15 ) 16 17 // zeroSource is an io.Reader that returns an unlimited number of zero bytes. 18 type zeroSource struct{} 19 20 func (zeroSource) Read(b []byte) (n int, err error) { 21 for i := range b { 22 b[i] = 0 23 } 24 25 return len(b), nil 26 } 27 28 func ExampleDial() { 29 // Connecting with a custom root-certificate set. 30 31 const rootPEM = ` 32 -----BEGIN CERTIFICATE----- 33 MIIEBDCCAuygAwIBAgIDAjppMA0GCSqGSIb3DQEBBQUAMEIxCzAJBgNVBAYTAlVT 34 MRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMRswGQYDVQQDExJHZW9UcnVzdCBHbG9i 35 YWwgQ0EwHhcNMTMwNDA1MTUxNTU1WhcNMTUwNDA0MTUxNTU1WjBJMQswCQYDVQQG 36 EwJVUzETMBEGA1UEChMKR29vZ2xlIEluYzElMCMGA1UEAxMcR29vZ2xlIEludGVy 37 bmV0IEF1dGhvcml0eSBHMjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB 38 AJwqBHdc2FCROgajguDYUEi8iT/xGXAaiEZ+4I/F8YnOIe5a/mENtzJEiaB0C1NP 39 VaTOgmKV7utZX8bhBYASxF6UP7xbSDj0U/ck5vuR6RXEz/RTDfRK/J9U3n2+oGtv 40 h8DQUB8oMANA2ghzUWx//zo8pzcGjr1LEQTrfSTe5vn8MXH7lNVg8y5Kr0LSy+rE 41 ahqyzFPdFUuLH8gZYR/Nnag+YyuENWllhMgZxUYi+FOVvuOAShDGKuy6lyARxzmZ 42 EASg8GF6lSWMTlJ14rbtCMoU/M4iarNOz0YDl5cDfsCx3nuvRTPPuj5xt970JSXC 43 DTWJnZ37DhF5iR43xa+OcmkCAwEAAaOB+zCB+DAfBgNVHSMEGDAWgBTAephojYn7 44 qwVkDBF9qn1luMrMTjAdBgNVHQ4EFgQUSt0GFhu89mi1dvWBtrtiGrpagS8wEgYD 45 VR0TAQH/BAgwBgEB/wIBADAOBgNVHQ8BAf8EBAMCAQYwOgYDVR0fBDMwMTAvoC2g 46 K4YpaHR0cDovL2NybC5nZW90cnVzdC5jb20vY3Jscy9ndGdsb2JhbC5jcmwwPQYI 47 KwYBBQUHAQEEMTAvMC0GCCsGAQUFBzABhiFodHRwOi8vZ3RnbG9iYWwtb2NzcC5n 48 ZW90cnVzdC5jb20wFwYDVR0gBBAwDjAMBgorBgEEAdZ5AgUBMA0GCSqGSIb3DQEB 49 BQUAA4IBAQA21waAESetKhSbOHezI6B1WLuxfoNCunLaHtiONgaX4PCVOzf9G0JY 50 /iLIa704XtE7JW4S615ndkZAkNoUyHgN7ZVm2o6Gb4ChulYylYbc3GrKBIxbf/a/ 51 zG+FA1jDaFETzf3I93k9mTXwVqO94FntT0QJo544evZG0R0SnU++0ED8Vf4GXjza 52 HFa9llF7b1cq26KqltyMdMKVvvBulRP/F/A8rLIQjcxz++iPAsbw+zOzlTvjwsto 53 WHPbqCRiOwY1nQ2pM714A5AuTHhdUDqB1O6gyHA43LL5Z/qHQF1hwFGPa4NrzQU6 54 yuGnBXj8ytqU0CwIPX4WecigUCAkVDNx 55 -----END CERTIFICATE-----` 56 57 // First, create the set of root certificates. For this example we only 58 // have one. It's also possible to omit this in order to use the 59 // default root set of the current operating system. 60 roots := x509.NewCertPool() 61 ok := roots.AppendCertsFromPEM([]byte(rootPEM)) 62 if !ok { 63 panic("failed to parse root certificate") 64 } 65 66 conn, err := tls.Dial("tcp", "mail.google.com:443", &tls.Config{ 67 RootCAs: roots, 68 }) 69 if err != nil { 70 panic("failed to connect: " + err.Error()) 71 } 72 conn.Close() 73 } 74 75 func ExampleConfig_keyLogWriter() { 76 // Debugging TLS applications by decrypting a network traffic capture. 77 78 // WARNING: Use of KeyLogWriter compromises security and should only be 79 // used for debugging. 80 81 // Dummy test HTTP server for the example with insecure random so output is 82 // reproducible. 83 server := httptest.NewUnstartedServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {})) 84 server.TLS = &tls.Config{ 85 Rand: zeroSource{}, // for example only; don't do this. 86 } 87 server.StartTLS() 88 defer server.Close() 89 90 // Typically the log would go to an open file: 91 // w, err := os.OpenFile("tls-secrets.txt", os.O_WRONLY|os.O_CREATE|os.O_TRUNC, 0600) 92 w := os.Stdout 93 94 client := &http.Client{ 95 Transport: &http.Transport{ 96 TLSClientConfig: &tls.Config{ 97 KeyLogWriter: w, 98 99 Rand: zeroSource{}, // for reproducible output; don't do this. 100 InsecureSkipVerify: true, // test server certificate is not trusted. 101 }, 102 }, 103 } 104 resp, err := client.Get(server.URL) 105 if err != nil { 106 log.Fatalf("Failed to get URL: %v", err) 107 } 108 resp.Body.Close() 109 110 // The resulting file can be used with Wireshark to decrypt the TLS 111 // connection by setting (Pre)-Master-Secret log filename in SSL Protocol 112 // preferences. 113 } 114 115 func ExampleLoadX509KeyPair() { 116 cert, err := tls.LoadX509KeyPair("testdata/example-cert.pem", "testdata/example-key.pem") 117 if err != nil { 118 log.Fatal(err) 119 } 120 cfg := &tls.Config{Certificates: []tls.Certificate{cert}} 121 listener, err := tls.Listen("tcp", ":2000", cfg) 122 if err != nil { 123 log.Fatal(err) 124 } 125 _ = listener 126 } 127 128 func ExampleX509KeyPair() { 129 certPem := []byte(`-----BEGIN CERTIFICATE----- 130 MIIBhTCCASugAwIBAgIQIRi6zePL6mKjOipn+dNuaTAKBggqhkjOPQQDAjASMRAw 131 DgYDVQQKEwdBY21lIENvMB4XDTE3MTAyMDE5NDMwNloXDTE4MTAyMDE5NDMwNlow 132 EjEQMA4GA1UEChMHQWNtZSBDbzBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABD0d 133 7VNhbWvZLWPuj/RtHFjvtJBEwOkhbN/BnnE8rnZR8+sbwnc/KhCk3FhnpHZnQz7B 134 5aETbbIgmuvewdjvSBSjYzBhMA4GA1UdDwEB/wQEAwICpDATBgNVHSUEDDAKBggr 135 BgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdEQQiMCCCDmxvY2FsaG9zdDo1 136 NDUzgg4xMjcuMC4wLjE6NTQ1MzAKBggqhkjOPQQDAgNIADBFAiEA2zpJEPQyz6/l 137 Wf86aX6PepsntZv2GYlA5UpabfT2EZICICpJ5h/iI+i341gBmLiAFQOyTDT+/wQc 138 6MF9+Yw1Yy0t 139 -----END CERTIFICATE-----`) 140 keyPem := []byte(`-----BEGIN EC PRIVATE KEY----- 141 MHcCAQEEIIrYSSNQFaA2Hwf1duRSxKtLYX5CB04fSeQ6tF1aY/PuoAoGCCqGSM49 142 AwEHoUQDQgAEPR3tU2Fta9ktY+6P9G0cWO+0kETA6SFs38GecTyudlHz6xvCdz8q 143 EKTcWGekdmdDPsHloRNtsiCa697B2O9IFA== 144 -----END EC PRIVATE KEY-----`) 145 cert, err := tls.X509KeyPair(certPem, keyPem) 146 if err != nil { 147 log.Fatal(err) 148 } 149 cfg := &tls.Config{Certificates: []tls.Certificate{cert}} 150 listener, err := tls.Listen("tcp", ":2000", cfg) 151 if err != nil { 152 log.Fatal(err) 153 } 154 _ = listener 155 } 156 157 func ExampleX509KeyPair_httpServer() { 158 certPem := []byte(`-----BEGIN CERTIFICATE----- 159 MIIBhTCCASugAwIBAgIQIRi6zePL6mKjOipn+dNuaTAKBggqhkjOPQQDAjASMRAw 160 DgYDVQQKEwdBY21lIENvMB4XDTE3MTAyMDE5NDMwNloXDTE4MTAyMDE5NDMwNlow 161 EjEQMA4GA1UEChMHQWNtZSBDbzBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABD0d 162 7VNhbWvZLWPuj/RtHFjvtJBEwOkhbN/BnnE8rnZR8+sbwnc/KhCk3FhnpHZnQz7B 163 5aETbbIgmuvewdjvSBSjYzBhMA4GA1UdDwEB/wQEAwICpDATBgNVHSUEDDAKBggr 164 BgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdEQQiMCCCDmxvY2FsaG9zdDo1 165 NDUzgg4xMjcuMC4wLjE6NTQ1MzAKBggqhkjOPQQDAgNIADBFAiEA2zpJEPQyz6/l 166 Wf86aX6PepsntZv2GYlA5UpabfT2EZICICpJ5h/iI+i341gBmLiAFQOyTDT+/wQc 167 6MF9+Yw1Yy0t 168 -----END CERTIFICATE-----`) 169 keyPem := []byte(`-----BEGIN EC PRIVATE KEY----- 170 MHcCAQEEIIrYSSNQFaA2Hwf1duRSxKtLYX5CB04fSeQ6tF1aY/PuoAoGCCqGSM49 171 AwEHoUQDQgAEPR3tU2Fta9ktY+6P9G0cWO+0kETA6SFs38GecTyudlHz6xvCdz8q 172 EKTcWGekdmdDPsHloRNtsiCa697B2O9IFA== 173 -----END EC PRIVATE KEY-----`) 174 cert, err := tls.X509KeyPair(certPem, keyPem) 175 if err != nil { 176 log.Fatal(err) 177 } 178 cfg := &tls.Config{Certificates: []tls.Certificate{cert}} 179 srv := &http.Server{ 180 TLSConfig: cfg, 181 ReadTimeout: time.Minute, 182 WriteTimeout: time.Minute, 183 } 184 log.Fatal(srv.ListenAndServeTLS("", "")) 185 }