github.com/JimmyHuang454/JLS-go@v0.0.0-20230831150107-90d536585ba0/tls/conn_test.go (about) 1 // Copyright 2010 The Go Authors. All rights reserved. 2 // Use of this source code is governed by a BSD-style 3 // license that can be found in the LICENSE file. 4 5 package tls 6 7 import ( 8 "bytes" 9 "io" 10 "net" 11 "testing" 12 ) 13 14 func TestRoundUp(t *testing.T) { 15 if roundUp(0, 16) != 0 || 16 roundUp(1, 16) != 16 || 17 roundUp(15, 16) != 16 || 18 roundUp(16, 16) != 16 || 19 roundUp(17, 16) != 32 { 20 t.Error("roundUp broken") 21 } 22 } 23 24 // will be initialized with {0, 255, 255, ..., 255} 25 var padding255Bad = [256]byte{} 26 27 // will be initialized with {255, 255, 255, ..., 255} 28 var padding255Good = [256]byte{255} 29 30 var paddingTests = []struct { 31 in []byte 32 good bool 33 expectedLen int 34 }{ 35 {[]byte{1, 2, 3, 4, 0}, true, 4}, 36 {[]byte{1, 2, 3, 4, 0, 1}, false, 0}, 37 {[]byte{1, 2, 3, 4, 99, 99}, false, 0}, 38 {[]byte{1, 2, 3, 4, 1, 1}, true, 4}, 39 {[]byte{1, 2, 3, 2, 2, 2}, true, 3}, 40 {[]byte{1, 2, 3, 3, 3, 3}, true, 2}, 41 {[]byte{1, 2, 3, 4, 3, 3}, false, 0}, 42 {[]byte{1, 4, 4, 4, 4, 4}, true, 1}, 43 {[]byte{5, 5, 5, 5, 5, 5}, true, 0}, 44 {[]byte{6, 6, 6, 6, 6, 6}, false, 0}, 45 {padding255Bad[:], false, 0}, 46 {padding255Good[:], true, 0}, 47 } 48 49 func TestRemovePadding(t *testing.T) { 50 for i := 1; i < len(padding255Bad); i++ { 51 padding255Bad[i] = 255 52 padding255Good[i] = 255 53 } 54 for i, test := range paddingTests { 55 paddingLen, good := extractPadding(test.in) 56 expectedGood := byte(255) 57 if !test.good { 58 expectedGood = 0 59 } 60 if good != expectedGood { 61 t.Errorf("#%d: wrong validity, want:%d got:%d", i, expectedGood, good) 62 } 63 if good == 255 && len(test.in)-paddingLen != test.expectedLen { 64 t.Errorf("#%d: got %d, want %d", i, len(test.in)-paddingLen, test.expectedLen) 65 } 66 } 67 } 68 69 var certExampleCom = `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` 70 71 var certWildcardExampleCom = `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` 72 73 var certFooExampleCom = `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` 74 75 func TestCertificateSelection(t *testing.T) { 76 config := Config{ 77 Certificates: []Certificate{ 78 { 79 Certificate: [][]byte{fromHex(certExampleCom)}, 80 }, 81 { 82 Certificate: [][]byte{fromHex(certWildcardExampleCom)}, 83 }, 84 { 85 Certificate: [][]byte{fromHex(certFooExampleCom)}, 86 }, 87 }, 88 } 89 90 config.BuildNameToCertificate() 91 92 pointerToIndex := func(c *Certificate) int { 93 for i := range config.Certificates { 94 if c == &config.Certificates[i] { 95 return i 96 } 97 } 98 return -1 99 } 100 101 certificateForName := func(name string) *Certificate { 102 clientHello := &ClientHelloInfo{ 103 ServerName: name, 104 } 105 if cert, err := config.getCertificate(clientHello); err != nil { 106 t.Errorf("unable to get certificate for name '%s': %s", name, err) 107 return nil 108 } else { 109 return cert 110 } 111 } 112 113 if n := pointerToIndex(certificateForName("example.com")); n != 0 { 114 t.Errorf("example.com returned certificate %d, not 0", n) 115 } 116 if n := pointerToIndex(certificateForName("bar.example.com")); n != 1 { 117 t.Errorf("bar.example.com returned certificate %d, not 1", n) 118 } 119 if n := pointerToIndex(certificateForName("foo.example.com")); n != 2 { 120 t.Errorf("foo.example.com returned certificate %d, not 2", n) 121 } 122 if n := pointerToIndex(certificateForName("foo.bar.example.com")); n != 0 { 123 t.Errorf("foo.bar.example.com returned certificate %d, not 0", n) 124 } 125 } 126 127 // Run with multiple crypto configs to test the logic for computing TLS record overheads. 128 func runDynamicRecordSizingTest(t *testing.T, config *Config) { 129 clientConn, serverConn := localPipe(t) 130 131 serverConfig := config.Clone() 132 serverConfig.DynamicRecordSizingDisabled = false 133 tlsConn := Server(serverConn, serverConfig) 134 135 handshakeDone := make(chan struct{}) 136 recordSizesChan := make(chan []int, 1) 137 defer func() { <-recordSizesChan }() // wait for the goroutine to exit 138 go func() { 139 // This goroutine performs a TLS handshake over clientConn and 140 // then reads TLS records until EOF. It writes a slice that 141 // contains all the record sizes to recordSizesChan. 142 defer close(recordSizesChan) 143 defer clientConn.Close() 144 145 tlsConn := Client(clientConn, config) 146 if err := tlsConn.Handshake(); err != nil { 147 t.Errorf("Error from client handshake: %v", err) 148 return 149 } 150 close(handshakeDone) 151 152 var recordHeader [recordHeaderLen]byte 153 var record []byte 154 var recordSizes []int 155 156 for { 157 n, err := io.ReadFull(clientConn, recordHeader[:]) 158 if err == io.EOF { 159 break 160 } 161 if err != nil || n != len(recordHeader) { 162 t.Errorf("io.ReadFull = %d, %v", n, err) 163 return 164 } 165 166 length := int(recordHeader[3])<<8 | int(recordHeader[4]) 167 if len(record) < length { 168 record = make([]byte, length) 169 } 170 171 n, err = io.ReadFull(clientConn, record[:length]) 172 if err != nil || n != length { 173 t.Errorf("io.ReadFull = %d, %v", n, err) 174 return 175 } 176 177 recordSizes = append(recordSizes, recordHeaderLen+length) 178 } 179 180 recordSizesChan <- recordSizes 181 }() 182 183 if err := tlsConn.Handshake(); err != nil { 184 t.Fatalf("Error from server handshake: %s", err) 185 } 186 <-handshakeDone 187 188 // The server writes these plaintexts in order. 189 plaintext := bytes.Join([][]byte{ 190 bytes.Repeat([]byte("x"), recordSizeBoostThreshold), 191 bytes.Repeat([]byte("y"), maxPlaintext*2), 192 bytes.Repeat([]byte("z"), maxPlaintext), 193 }, nil) 194 195 if _, err := tlsConn.Write(plaintext); err != nil { 196 t.Fatalf("Error from server write: %s", err) 197 } 198 if err := tlsConn.Close(); err != nil { 199 t.Fatalf("Error from server close: %s", err) 200 } 201 202 recordSizes := <-recordSizesChan 203 if recordSizes == nil { 204 t.Fatalf("Client encountered an error") 205 } 206 207 // Drop the size of the second to last record, which is likely to be 208 // truncated, and the last record, which is a close_notify alert. 209 recordSizes = recordSizes[:len(recordSizes)-2] 210 211 // recordSizes should contain a series of records smaller than 212 // tcpMSSEstimate followed by some larger than maxPlaintext. 213 seenLargeRecord := false 214 for i, size := range recordSizes { 215 if !seenLargeRecord { 216 if size > (i+1)*tcpMSSEstimate { 217 t.Fatalf("Record #%d has size %d, which is too large too soon", i, size) 218 } 219 if size >= maxPlaintext { 220 seenLargeRecord = true 221 } 222 } else if size <= maxPlaintext { 223 t.Fatalf("Record #%d has size %d but should be full sized", i, size) 224 } 225 } 226 227 if !seenLargeRecord { 228 t.Fatalf("No large records observed") 229 } 230 } 231 232 func TestDynamicRecordSizingWithStreamCipher(t *testing.T) { 233 config := testConfig.Clone() 234 config.MaxVersion = VersionTLS12 235 config.CipherSuites = []uint16{TLS_RSA_WITH_RC4_128_SHA} 236 runDynamicRecordSizingTest(t, config) 237 } 238 239 func TestDynamicRecordSizingWithCBC(t *testing.T) { 240 config := testConfig.Clone() 241 config.MaxVersion = VersionTLS12 242 config.CipherSuites = []uint16{TLS_RSA_WITH_AES_256_CBC_SHA} 243 runDynamicRecordSizingTest(t, config) 244 } 245 246 func TestDynamicRecordSizingWithAEAD(t *testing.T) { 247 config := testConfig.Clone() 248 config.MaxVersion = VersionTLS12 249 config.CipherSuites = []uint16{TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256} 250 runDynamicRecordSizingTest(t, config) 251 } 252 253 func TestDynamicRecordSizingWithTLSv13(t *testing.T) { 254 config := testConfig.Clone() 255 runDynamicRecordSizingTest(t, config) 256 } 257 258 // hairpinConn is a net.Conn that makes a “hairpin” call when closed, back into 259 // the tls.Conn which is calling it. 260 type hairpinConn struct { 261 net.Conn 262 tlsConn *Conn 263 } 264 265 func (conn *hairpinConn) Close() error { 266 conn.tlsConn.ConnectionState() 267 return nil 268 } 269 270 func TestHairpinInClose(t *testing.T) { 271 // This tests that the underlying net.Conn can call back into the 272 // tls.Conn when being closed without deadlocking. 273 client, server := localPipe(t) 274 defer server.Close() 275 defer client.Close() 276 277 conn := &hairpinConn{client, nil} 278 tlsConn := Server(conn, &Config{ 279 GetCertificate: func(*ClientHelloInfo) (*Certificate, error) { 280 panic("unreachable") 281 }, 282 }) 283 conn.tlsConn = tlsConn 284 285 // This call should not deadlock. 286 tlsConn.Close() 287 } 288 289 func TestRecordBadVersionTLS13(t *testing.T) { 290 client, server := localPipe(t) 291 defer server.Close() 292 defer client.Close() 293 294 config := testConfig.Clone() 295 config.MinVersion, config.MaxVersion = VersionTLS13, VersionTLS13 296 297 go func() { 298 tlsConn := Client(client, config) 299 if err := tlsConn.Handshake(); err != nil { 300 t.Errorf("Error from client handshake: %v", err) 301 return 302 } 303 tlsConn.vers = 0x1111 304 tlsConn.Write([]byte{1}) 305 }() 306 307 tlsConn := Server(server, config) 308 if err := tlsConn.Handshake(); err != nil { 309 t.Errorf("Error from client handshake: %v", err) 310 return 311 } 312 313 expectedErr := "tls: received record with version 1111 when expecting version 303" 314 315 _, err := tlsConn.Read(make([]byte, 10)) 316 if err.Error() != expectedErr { 317 t.Fatalf("unexpected error: got %q, want %q", err, expectedErr) 318 } 319 }