tls_test.go 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690
  1. package scenarios
  2. import (
  3. "crypto/rand"
  4. "crypto/x509"
  5. "runtime"
  6. "sync"
  7. "testing"
  8. "time"
  9. "github.com/google/go-cmp/cmp"
  10. "golang.org/x/sync/errgroup"
  11. "v2ray.com/core"
  12. "v2ray.com/core/app/proxyman"
  13. "v2ray.com/core/common"
  14. "v2ray.com/core/common/errors"
  15. "v2ray.com/core/common/net"
  16. "v2ray.com/core/common/protocol"
  17. "v2ray.com/core/common/protocol/tls/cert"
  18. "v2ray.com/core/common/serial"
  19. "v2ray.com/core/common/uuid"
  20. "v2ray.com/core/proxy/dokodemo"
  21. "v2ray.com/core/proxy/freedom"
  22. "v2ray.com/core/proxy/vmess"
  23. "v2ray.com/core/proxy/vmess/inbound"
  24. "v2ray.com/core/proxy/vmess/outbound"
  25. "v2ray.com/core/testing/servers/tcp"
  26. "v2ray.com/core/testing/servers/udp"
  27. "v2ray.com/core/transport/internet"
  28. "v2ray.com/core/transport/internet/http"
  29. "v2ray.com/core/transport/internet/tls"
  30. "v2ray.com/core/transport/internet/websocket"
  31. . "v2ray.com/ext/assert"
  32. )
  33. func TestSimpleTLSConnection(t *testing.T) {
  34. tcpServer := tcp.Server{
  35. MsgProcessor: xor,
  36. }
  37. dest, err := tcpServer.Start()
  38. common.Must(err)
  39. defer tcpServer.Close()
  40. userID := protocol.NewID(uuid.New())
  41. serverPort := tcp.PickPort()
  42. serverConfig := &core.Config{
  43. Inbound: []*core.InboundHandlerConfig{
  44. {
  45. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  46. PortRange: net.SinglePortRange(serverPort),
  47. Listen: net.NewIPOrDomain(net.LocalHostIP),
  48. StreamSettings: &internet.StreamConfig{
  49. SecurityType: serial.GetMessageType(&tls.Config{}),
  50. SecuritySettings: []*serial.TypedMessage{
  51. serial.ToTypedMessage(&tls.Config{
  52. Certificate: []*tls.Certificate{tls.ParseCertificate(cert.MustGenerate(nil))},
  53. }),
  54. },
  55. },
  56. }),
  57. ProxySettings: serial.ToTypedMessage(&inbound.Config{
  58. User: []*protocol.User{
  59. {
  60. Account: serial.ToTypedMessage(&vmess.Account{
  61. Id: userID.String(),
  62. }),
  63. },
  64. },
  65. }),
  66. },
  67. },
  68. Outbound: []*core.OutboundHandlerConfig{
  69. {
  70. ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
  71. },
  72. },
  73. }
  74. clientPort := tcp.PickPort()
  75. clientConfig := &core.Config{
  76. Inbound: []*core.InboundHandlerConfig{
  77. {
  78. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  79. PortRange: net.SinglePortRange(clientPort),
  80. Listen: net.NewIPOrDomain(net.LocalHostIP),
  81. }),
  82. ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
  83. Address: net.NewIPOrDomain(dest.Address),
  84. Port: uint32(dest.Port),
  85. NetworkList: &net.NetworkList{
  86. Network: []net.Network{net.Network_TCP},
  87. },
  88. }),
  89. },
  90. },
  91. Outbound: []*core.OutboundHandlerConfig{
  92. {
  93. ProxySettings: serial.ToTypedMessage(&outbound.Config{
  94. Receiver: []*protocol.ServerEndpoint{
  95. {
  96. Address: net.NewIPOrDomain(net.LocalHostIP),
  97. Port: uint32(serverPort),
  98. User: []*protocol.User{
  99. {
  100. Account: serial.ToTypedMessage(&vmess.Account{
  101. Id: userID.String(),
  102. }),
  103. },
  104. },
  105. },
  106. },
  107. }),
  108. SenderSettings: serial.ToTypedMessage(&proxyman.SenderConfig{
  109. StreamSettings: &internet.StreamConfig{
  110. SecurityType: serial.GetMessageType(&tls.Config{}),
  111. SecuritySettings: []*serial.TypedMessage{
  112. serial.ToTypedMessage(&tls.Config{
  113. AllowInsecure: true,
  114. }),
  115. },
  116. },
  117. }),
  118. },
  119. },
  120. }
  121. servers, err := InitializeServerConfigs(serverConfig, clientConfig)
  122. common.Must(err)
  123. defer CloseAllServers(servers)
  124. var errg errgroup.Group
  125. errg.Go(func() error {
  126. conn, err := net.DialTCP("tcp", nil, &net.TCPAddr{
  127. IP: []byte{127, 0, 0, 1},
  128. Port: int(clientPort),
  129. })
  130. if err != nil {
  131. return err
  132. }
  133. defer conn.Close()
  134. payload := make([]byte, 1024)
  135. common.Must2(rand.Read(payload))
  136. nBytes, err := conn.Write([]byte(payload))
  137. common.Must(err)
  138. if nBytes != len(payload) {
  139. return errors.New("expected ", len(payload), " written, but actually ", nBytes)
  140. }
  141. response := readFrom(conn, time.Second*2, len(payload))
  142. if r := cmp.Diff(response, xor(payload)); r != "" {
  143. return errors.New(r)
  144. }
  145. return nil
  146. })
  147. if err := errg.Wait(); err != nil {
  148. t.Fatal(err)
  149. }
  150. }
  151. func TestAutoIssuingCertificate(t *testing.T) {
  152. if runtime.GOOS == "windows" {
  153. // Not supported on Windows yet.
  154. return
  155. }
  156. if runtime.GOARCH == "arm64" {
  157. return
  158. }
  159. assert := With(t)
  160. tcpServer := tcp.Server{
  161. MsgProcessor: xor,
  162. }
  163. dest, err := tcpServer.Start()
  164. assert(err, IsNil)
  165. defer tcpServer.Close()
  166. caCert, err := cert.Generate(nil, cert.Authority(true), cert.KeyUsage(x509.KeyUsageDigitalSignature|x509.KeyUsageKeyEncipherment|x509.KeyUsageCertSign))
  167. assert(err, IsNil)
  168. certPEM, keyPEM := caCert.ToPEM()
  169. userID := protocol.NewID(uuid.New())
  170. serverPort := tcp.PickPort()
  171. serverConfig := &core.Config{
  172. Inbound: []*core.InboundHandlerConfig{
  173. {
  174. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  175. PortRange: net.SinglePortRange(serverPort),
  176. Listen: net.NewIPOrDomain(net.LocalHostIP),
  177. StreamSettings: &internet.StreamConfig{
  178. SecurityType: serial.GetMessageType(&tls.Config{}),
  179. SecuritySettings: []*serial.TypedMessage{
  180. serial.ToTypedMessage(&tls.Config{
  181. Certificate: []*tls.Certificate{{
  182. Certificate: certPEM,
  183. Key: keyPEM,
  184. Usage: tls.Certificate_AUTHORITY_ISSUE,
  185. }},
  186. }),
  187. },
  188. },
  189. }),
  190. ProxySettings: serial.ToTypedMessage(&inbound.Config{
  191. User: []*protocol.User{
  192. {
  193. Account: serial.ToTypedMessage(&vmess.Account{
  194. Id: userID.String(),
  195. }),
  196. },
  197. },
  198. }),
  199. },
  200. },
  201. Outbound: []*core.OutboundHandlerConfig{
  202. {
  203. ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
  204. },
  205. },
  206. }
  207. clientPort := tcp.PickPort()
  208. clientConfig := &core.Config{
  209. Inbound: []*core.InboundHandlerConfig{
  210. {
  211. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  212. PortRange: net.SinglePortRange(clientPort),
  213. Listen: net.NewIPOrDomain(net.LocalHostIP),
  214. }),
  215. ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
  216. Address: net.NewIPOrDomain(dest.Address),
  217. Port: uint32(dest.Port),
  218. NetworkList: &net.NetworkList{
  219. Network: []net.Network{net.Network_TCP},
  220. },
  221. }),
  222. },
  223. },
  224. Outbound: []*core.OutboundHandlerConfig{
  225. {
  226. ProxySettings: serial.ToTypedMessage(&outbound.Config{
  227. Receiver: []*protocol.ServerEndpoint{
  228. {
  229. Address: net.NewIPOrDomain(net.LocalHostIP),
  230. Port: uint32(serverPort),
  231. User: []*protocol.User{
  232. {
  233. Account: serial.ToTypedMessage(&vmess.Account{
  234. Id: userID.String(),
  235. }),
  236. },
  237. },
  238. },
  239. },
  240. }),
  241. SenderSettings: serial.ToTypedMessage(&proxyman.SenderConfig{
  242. StreamSettings: &internet.StreamConfig{
  243. SecurityType: serial.GetMessageType(&tls.Config{}),
  244. SecuritySettings: []*serial.TypedMessage{
  245. serial.ToTypedMessage(&tls.Config{
  246. ServerName: "v2ray.com",
  247. Certificate: []*tls.Certificate{{
  248. Certificate: certPEM,
  249. Usage: tls.Certificate_AUTHORITY_VERIFY,
  250. }},
  251. }),
  252. },
  253. },
  254. }),
  255. },
  256. },
  257. }
  258. servers, err := InitializeServerConfigs(serverConfig, clientConfig)
  259. assert(err, IsNil)
  260. for i := 0; i < 10; i++ {
  261. conn, err := net.DialTCP("tcp", nil, &net.TCPAddr{
  262. IP: []byte{127, 0, 0, 1},
  263. Port: int(clientPort),
  264. })
  265. assert(err, IsNil)
  266. payload := "dokodemo request."
  267. nBytes, err := conn.Write([]byte(payload))
  268. assert(err, IsNil)
  269. assert(nBytes, Equals, len(payload))
  270. response := readFrom(conn, time.Second*2, len(payload))
  271. assert(response, Equals, xor([]byte(payload)))
  272. assert(conn.Close(), IsNil)
  273. }
  274. CloseAllServers(servers)
  275. }
  276. func TestTLSOverKCP(t *testing.T) {
  277. assert := With(t)
  278. tcpServer := tcp.Server{
  279. MsgProcessor: xor,
  280. }
  281. dest, err := tcpServer.Start()
  282. assert(err, IsNil)
  283. defer tcpServer.Close()
  284. userID := protocol.NewID(uuid.New())
  285. serverPort := udp.PickPort()
  286. serverConfig := &core.Config{
  287. Inbound: []*core.InboundHandlerConfig{
  288. {
  289. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  290. PortRange: net.SinglePortRange(serverPort),
  291. Listen: net.NewIPOrDomain(net.LocalHostIP),
  292. StreamSettings: &internet.StreamConfig{
  293. Protocol: internet.TransportProtocol_MKCP,
  294. SecurityType: serial.GetMessageType(&tls.Config{}),
  295. SecuritySettings: []*serial.TypedMessage{
  296. serial.ToTypedMessage(&tls.Config{
  297. Certificate: []*tls.Certificate{tls.ParseCertificate(cert.MustGenerate(nil))},
  298. }),
  299. },
  300. },
  301. }),
  302. ProxySettings: serial.ToTypedMessage(&inbound.Config{
  303. User: []*protocol.User{
  304. {
  305. Account: serial.ToTypedMessage(&vmess.Account{
  306. Id: userID.String(),
  307. }),
  308. },
  309. },
  310. }),
  311. },
  312. },
  313. Outbound: []*core.OutboundHandlerConfig{
  314. {
  315. ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
  316. },
  317. },
  318. }
  319. clientPort := tcp.PickPort()
  320. clientConfig := &core.Config{
  321. Inbound: []*core.InboundHandlerConfig{
  322. {
  323. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  324. PortRange: net.SinglePortRange(clientPort),
  325. Listen: net.NewIPOrDomain(net.LocalHostIP),
  326. }),
  327. ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
  328. Address: net.NewIPOrDomain(dest.Address),
  329. Port: uint32(dest.Port),
  330. NetworkList: &net.NetworkList{
  331. Network: []net.Network{net.Network_TCP},
  332. },
  333. }),
  334. },
  335. },
  336. Outbound: []*core.OutboundHandlerConfig{
  337. {
  338. ProxySettings: serial.ToTypedMessage(&outbound.Config{
  339. Receiver: []*protocol.ServerEndpoint{
  340. {
  341. Address: net.NewIPOrDomain(net.LocalHostIP),
  342. Port: uint32(serverPort),
  343. User: []*protocol.User{
  344. {
  345. Account: serial.ToTypedMessage(&vmess.Account{
  346. Id: userID.String(),
  347. }),
  348. },
  349. },
  350. },
  351. },
  352. }),
  353. SenderSettings: serial.ToTypedMessage(&proxyman.SenderConfig{
  354. StreamSettings: &internet.StreamConfig{
  355. Protocol: internet.TransportProtocol_MKCP,
  356. SecurityType: serial.GetMessageType(&tls.Config{}),
  357. SecuritySettings: []*serial.TypedMessage{
  358. serial.ToTypedMessage(&tls.Config{
  359. AllowInsecure: true,
  360. }),
  361. },
  362. },
  363. }),
  364. },
  365. },
  366. }
  367. servers, err := InitializeServerConfigs(serverConfig, clientConfig)
  368. assert(err, IsNil)
  369. conn, err := net.DialTCP("tcp", nil, &net.TCPAddr{
  370. IP: []byte{127, 0, 0, 1},
  371. Port: int(clientPort),
  372. })
  373. assert(err, IsNil)
  374. payload := "dokodemo request."
  375. nBytes, err := conn.Write([]byte(payload))
  376. assert(err, IsNil)
  377. assert(nBytes, Equals, len(payload))
  378. response := readFrom(conn, time.Second*2, len(payload))
  379. assert(response, Equals, xor([]byte(payload)))
  380. assert(conn.Close(), IsNil)
  381. CloseAllServers(servers)
  382. }
  383. func TestTLSOverWebSocket(t *testing.T) {
  384. assert := With(t)
  385. tcpServer := tcp.Server{
  386. MsgProcessor: xor,
  387. }
  388. dest, err := tcpServer.Start()
  389. assert(err, IsNil)
  390. defer tcpServer.Close()
  391. userID := protocol.NewID(uuid.New())
  392. serverPort := tcp.PickPort()
  393. serverConfig := &core.Config{
  394. Inbound: []*core.InboundHandlerConfig{
  395. {
  396. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  397. PortRange: net.SinglePortRange(serverPort),
  398. Listen: net.NewIPOrDomain(net.LocalHostIP),
  399. StreamSettings: &internet.StreamConfig{
  400. Protocol: internet.TransportProtocol_WebSocket,
  401. SecurityType: serial.GetMessageType(&tls.Config{}),
  402. SecuritySettings: []*serial.TypedMessage{
  403. serial.ToTypedMessage(&tls.Config{
  404. Certificate: []*tls.Certificate{tls.ParseCertificate(cert.MustGenerate(nil))},
  405. }),
  406. },
  407. },
  408. }),
  409. ProxySettings: serial.ToTypedMessage(&inbound.Config{
  410. User: []*protocol.User{
  411. {
  412. Account: serial.ToTypedMessage(&vmess.Account{
  413. Id: userID.String(),
  414. }),
  415. },
  416. },
  417. }),
  418. },
  419. },
  420. Outbound: []*core.OutboundHandlerConfig{
  421. {
  422. ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
  423. },
  424. },
  425. }
  426. clientPort := tcp.PickPort()
  427. clientConfig := &core.Config{
  428. Inbound: []*core.InboundHandlerConfig{
  429. {
  430. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  431. PortRange: net.SinglePortRange(clientPort),
  432. Listen: net.NewIPOrDomain(net.LocalHostIP),
  433. }),
  434. ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
  435. Address: net.NewIPOrDomain(dest.Address),
  436. Port: uint32(dest.Port),
  437. NetworkList: &net.NetworkList{
  438. Network: []net.Network{net.Network_TCP},
  439. },
  440. }),
  441. },
  442. },
  443. Outbound: []*core.OutboundHandlerConfig{
  444. {
  445. ProxySettings: serial.ToTypedMessage(&outbound.Config{
  446. Receiver: []*protocol.ServerEndpoint{
  447. {
  448. Address: net.NewIPOrDomain(net.LocalHostIP),
  449. Port: uint32(serverPort),
  450. User: []*protocol.User{
  451. {
  452. Account: serial.ToTypedMessage(&vmess.Account{
  453. Id: userID.String(),
  454. }),
  455. },
  456. },
  457. },
  458. },
  459. }),
  460. SenderSettings: serial.ToTypedMessage(&proxyman.SenderConfig{
  461. StreamSettings: &internet.StreamConfig{
  462. Protocol: internet.TransportProtocol_WebSocket,
  463. TransportSettings: []*internet.TransportConfig{
  464. {
  465. Protocol: internet.TransportProtocol_WebSocket,
  466. Settings: serial.ToTypedMessage(&websocket.Config{}),
  467. },
  468. },
  469. SecurityType: serial.GetMessageType(&tls.Config{}),
  470. SecuritySettings: []*serial.TypedMessage{
  471. serial.ToTypedMessage(&tls.Config{
  472. AllowInsecure: true,
  473. }),
  474. },
  475. },
  476. }),
  477. },
  478. },
  479. }
  480. servers, err := InitializeServerConfigs(serverConfig, clientConfig)
  481. common.Must(err)
  482. defer CloseAllServers(servers)
  483. var wg sync.WaitGroup
  484. for i := 0; i < 10; i++ {
  485. wg.Add(1)
  486. go func() {
  487. defer wg.Done()
  488. conn, err := net.DialTCP("tcp", nil, &net.TCPAddr{
  489. IP: []byte{127, 0, 0, 1},
  490. Port: int(clientPort),
  491. })
  492. common.Must(err)
  493. payload := make([]byte, 10240*1024)
  494. rand.Read(payload)
  495. nBytes, err := conn.Write([]byte(payload))
  496. assert(err, IsNil)
  497. assert(nBytes, Equals, len(payload))
  498. response := readFrom(conn, time.Second*20, len(payload))
  499. assert(response, Equals, xor([]byte(payload)))
  500. assert(conn.Close(), IsNil)
  501. }()
  502. }
  503. wg.Wait()
  504. }
  505. func TestHTTP2(t *testing.T) {
  506. assert := With(t)
  507. tcpServer := tcp.Server{
  508. MsgProcessor: xor,
  509. }
  510. dest, err := tcpServer.Start()
  511. assert(err, IsNil)
  512. defer tcpServer.Close()
  513. userID := protocol.NewID(uuid.New())
  514. serverPort := tcp.PickPort()
  515. serverConfig := &core.Config{
  516. Inbound: []*core.InboundHandlerConfig{
  517. {
  518. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  519. PortRange: net.SinglePortRange(serverPort),
  520. Listen: net.NewIPOrDomain(net.LocalHostIP),
  521. StreamSettings: &internet.StreamConfig{
  522. Protocol: internet.TransportProtocol_HTTP,
  523. TransportSettings: []*internet.TransportConfig{
  524. {
  525. Protocol: internet.TransportProtocol_HTTP,
  526. Settings: serial.ToTypedMessage(&http.Config{
  527. Host: []string{"v2ray.com"},
  528. Path: "/testpath",
  529. }),
  530. },
  531. },
  532. SecurityType: serial.GetMessageType(&tls.Config{}),
  533. SecuritySettings: []*serial.TypedMessage{
  534. serial.ToTypedMessage(&tls.Config{
  535. Certificate: []*tls.Certificate{tls.ParseCertificate(cert.MustGenerate(nil))},
  536. }),
  537. },
  538. },
  539. }),
  540. ProxySettings: serial.ToTypedMessage(&inbound.Config{
  541. User: []*protocol.User{
  542. {
  543. Account: serial.ToTypedMessage(&vmess.Account{
  544. Id: userID.String(),
  545. }),
  546. },
  547. },
  548. }),
  549. },
  550. },
  551. Outbound: []*core.OutboundHandlerConfig{
  552. {
  553. ProxySettings: serial.ToTypedMessage(&freedom.Config{}),
  554. },
  555. },
  556. }
  557. clientPort := tcp.PickPort()
  558. clientConfig := &core.Config{
  559. Inbound: []*core.InboundHandlerConfig{
  560. {
  561. ReceiverSettings: serial.ToTypedMessage(&proxyman.ReceiverConfig{
  562. PortRange: net.SinglePortRange(clientPort),
  563. Listen: net.NewIPOrDomain(net.LocalHostIP),
  564. }),
  565. ProxySettings: serial.ToTypedMessage(&dokodemo.Config{
  566. Address: net.NewIPOrDomain(dest.Address),
  567. Port: uint32(dest.Port),
  568. NetworkList: &net.NetworkList{
  569. Network: []net.Network{net.Network_TCP},
  570. },
  571. }),
  572. },
  573. },
  574. Outbound: []*core.OutboundHandlerConfig{
  575. {
  576. ProxySettings: serial.ToTypedMessage(&outbound.Config{
  577. Receiver: []*protocol.ServerEndpoint{
  578. {
  579. Address: net.NewIPOrDomain(net.LocalHostIP),
  580. Port: uint32(serverPort),
  581. User: []*protocol.User{
  582. {
  583. Account: serial.ToTypedMessage(&vmess.Account{
  584. Id: userID.String(),
  585. }),
  586. },
  587. },
  588. },
  589. },
  590. }),
  591. SenderSettings: serial.ToTypedMessage(&proxyman.SenderConfig{
  592. StreamSettings: &internet.StreamConfig{
  593. Protocol: internet.TransportProtocol_HTTP,
  594. TransportSettings: []*internet.TransportConfig{
  595. {
  596. Protocol: internet.TransportProtocol_HTTP,
  597. Settings: serial.ToTypedMessage(&http.Config{
  598. Host: []string{"v2ray.com"},
  599. Path: "/testpath",
  600. }),
  601. },
  602. },
  603. SecurityType: serial.GetMessageType(&tls.Config{}),
  604. SecuritySettings: []*serial.TypedMessage{
  605. serial.ToTypedMessage(&tls.Config{
  606. AllowInsecure: true,
  607. }),
  608. },
  609. },
  610. }),
  611. },
  612. },
  613. }
  614. servers, err := InitializeServerConfigs(serverConfig, clientConfig)
  615. assert(err, IsNil)
  616. var wg sync.WaitGroup
  617. for i := 0; i < 10; i++ {
  618. wg.Add(1)
  619. go func() {
  620. defer wg.Done()
  621. conn, err := net.DialTCP("tcp", nil, &net.TCPAddr{
  622. IP: []byte{127, 0, 0, 1},
  623. Port: int(clientPort),
  624. })
  625. assert(err, IsNil)
  626. payload := make([]byte, 10240*1024)
  627. rand.Read(payload)
  628. nBytes, err := conn.Write([]byte(payload))
  629. assert(err, IsNil)
  630. assert(nBytes, Equals, len(payload))
  631. response := readFrom(conn, time.Second*20, len(payload))
  632. assert(response, Equals, xor([]byte(payload)))
  633. assert(conn.Close(), IsNil)
  634. }()
  635. }
  636. wg.Wait()
  637. CloseAllServers(servers)
  638. }