| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697 |
- package tls_test
- import (
- gotls "crypto/tls"
- "crypto/x509"
- "testing"
- "time"
- "v2ray.com/core/common"
- "v2ray.com/core/common/protocol/tls/cert"
- . "v2ray.com/core/transport/internet/tls"
- )
- func TestCertificateIssuing(t *testing.T) {
- certificate := ParseCertificate(cert.MustGenerate(nil, cert.Authority(true), cert.KeyUsage(x509.KeyUsageCertSign)))
- certificate.Usage = Certificate_AUTHORITY_ISSUE
- c := &Config{
- Certificate: []*Certificate{
- certificate,
- },
- }
- tlsConfig := c.GetTLSConfig()
- v2rayCert, err := tlsConfig.GetCertificate(&gotls.ClientHelloInfo{
- ServerName: "www.v2ray.com",
- })
- common.Must(err)
- x509Cert, err := x509.ParseCertificate(v2rayCert.Certificate[0])
- common.Must(err)
- if !x509Cert.NotAfter.After(time.Now()) {
- t.Error("NotAfter: ", x509Cert.NotAfter)
- }
- }
- func TestExpiredCertificate(t *testing.T) {
- caCert := cert.MustGenerate(nil, cert.Authority(true), cert.KeyUsage(x509.KeyUsageCertSign))
- expiredCert := cert.MustGenerate(caCert, cert.NotAfter(time.Now().Add(time.Minute*-2)), cert.CommonName("www.v2ray.com"), cert.DNSNames("www.v2ray.com"))
- certificate := ParseCertificate(caCert)
- certificate.Usage = Certificate_AUTHORITY_ISSUE
- certificate2 := ParseCertificate(expiredCert)
- c := &Config{
- Certificate: []*Certificate{
- certificate,
- certificate2,
- },
- }
- tlsConfig := c.GetTLSConfig()
- v2rayCert, err := tlsConfig.GetCertificate(&gotls.ClientHelloInfo{
- ServerName: "www.v2ray.com",
- })
- common.Must(err)
- x509Cert, err := x509.ParseCertificate(v2rayCert.Certificate[0])
- common.Must(err)
- if !x509Cert.NotAfter.After(time.Now()) {
- t.Error("NotAfter: ", x509Cert.NotAfter)
- }
- }
- func TestInsecureCertificates(t *testing.T) {
- c := &Config{}
- tlsConfig := c.GetTLSConfig()
- if len(tlsConfig.CipherSuites) > 0 {
- t.Fatal("Unexpected tls cipher suites list: ", tlsConfig.CipherSuites)
- }
- }
- func BenchmarkCertificateIssuing(b *testing.B) {
- certificate := ParseCertificate(cert.MustGenerate(nil, cert.Authority(true), cert.KeyUsage(x509.KeyUsageCertSign)))
- certificate.Usage = Certificate_AUTHORITY_ISSUE
- c := &Config{
- Certificate: []*Certificate{
- certificate,
- },
- }
- tlsConfig := c.GetTLSConfig()
- lenCerts := len(tlsConfig.Certificates)
- b.ResetTimer()
- for i := 0; i < b.N; i++ {
- _, _ = tlsConfig.GetCertificate(&gotls.ClientHelloInfo{
- ServerName: "www.v2ray.com",
- })
- delete(tlsConfig.NameToCertificate, "www.v2ray.com")
- tlsConfig.Certificates = tlsConfig.Certificates[:lenCerts]
- }
- }
|