config_test.go 2.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100
  1. package xtls_test
  2. import (
  3. "crypto/x509"
  4. "testing"
  5. "time"
  6. xtls "github.com/xtls/go"
  7. "v2ray.com/core/common"
  8. "v2ray.com/core/common/protocol/tls/cert"
  9. . "v2ray.com/core/transport/internet/xtls"
  10. )
  11. func TestCertificateIssuing(t *testing.T) {
  12. certificate := ParseCertificate(cert.MustGenerate(nil, cert.Authority(true), cert.KeyUsage(x509.KeyUsageCertSign)))
  13. certificate.Usage = Certificate_AUTHORITY_ISSUE
  14. c := &Config{
  15. Certificate: []*Certificate{
  16. certificate,
  17. },
  18. }
  19. xtlsConfig := c.GetXTLSConfig()
  20. v2rayCert, err := xtlsConfig.GetCertificate(&xtls.ClientHelloInfo{
  21. ServerName: "www.v2fly.org",
  22. })
  23. common.Must(err)
  24. x509Cert, err := x509.ParseCertificate(v2rayCert.Certificate[0])
  25. common.Must(err)
  26. if !x509Cert.NotAfter.After(time.Now()) {
  27. t.Error("NotAfter: ", x509Cert.NotAfter)
  28. }
  29. }
  30. func TestExpiredCertificate(t *testing.T) {
  31. caCert := cert.MustGenerate(nil, cert.Authority(true), cert.KeyUsage(x509.KeyUsageCertSign))
  32. expiredCert := cert.MustGenerate(caCert, cert.NotAfter(time.Now().Add(time.Minute*-2)), cert.CommonName("www.v2fly.org"), cert.DNSNames("www.v2fly.org"))
  33. certificate := ParseCertificate(caCert)
  34. certificate.Usage = Certificate_AUTHORITY_ISSUE
  35. certificate2 := ParseCertificate(expiredCert)
  36. c := &Config{
  37. Certificate: []*Certificate{
  38. certificate,
  39. certificate2,
  40. },
  41. }
  42. xtlsConfig := c.GetXTLSConfig()
  43. v2rayCert, err := xtlsConfig.GetCertificate(&xtls.ClientHelloInfo{
  44. ServerName: "www.v2fly.org",
  45. })
  46. common.Must(err)
  47. x509Cert, err := x509.ParseCertificate(v2rayCert.Certificate[0])
  48. common.Must(err)
  49. if !x509Cert.NotAfter.After(time.Now()) {
  50. t.Error("NotAfter: ", x509Cert.NotAfter)
  51. }
  52. }
  53. func TestInsecureCertificates(t *testing.T) {
  54. c := &Config{
  55. AllowInsecureCiphers: true,
  56. }
  57. xtlsConfig := c.GetXTLSConfig()
  58. if len(xtlsConfig.CipherSuites) > 0 {
  59. t.Fatal("Unexpected tls cipher suites list: ", xtlsConfig.CipherSuites)
  60. }
  61. }
  62. func BenchmarkCertificateIssuing(b *testing.B) {
  63. certificate := ParseCertificate(cert.MustGenerate(nil, cert.Authority(true), cert.KeyUsage(x509.KeyUsageCertSign)))
  64. certificate.Usage = Certificate_AUTHORITY_ISSUE
  65. c := &Config{
  66. Certificate: []*Certificate{
  67. certificate,
  68. },
  69. }
  70. xtlsConfig := c.GetXTLSConfig()
  71. lenCerts := len(xtlsConfig.Certificates)
  72. b.ResetTimer()
  73. for i := 0; i < b.N; i++ {
  74. _, _ = xtlsConfig.GetCertificate(&xtls.ClientHelloInfo{
  75. ServerName: "www.v2fly.org",
  76. })
  77. delete(xtlsConfig.NameToCertificate, "www.v2fly.org")
  78. xtlsConfig.Certificates = xtlsConfig.Certificates[:lenCerts]
  79. }
  80. }