config_test.go 2.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899
  1. package tls_test
  2. import (
  3. gotls "crypto/tls"
  4. "crypto/x509"
  5. "testing"
  6. "time"
  7. "v2ray.com/core/common/protocol/tls/cert"
  8. . "v2ray.com/core/transport/internet/tls"
  9. . "v2ray.com/ext/assert"
  10. )
  11. func TestCertificateIssuing(t *testing.T) {
  12. assert := With(t)
  13. certificate := ParseCertificate(cert.MustGenerate(nil, cert.Authority(true), cert.KeyUsage(x509.KeyUsageCertSign)))
  14. certificate.Usage = Certificate_AUTHORITY_ISSUE
  15. c := &Config{
  16. Certificate: []*Certificate{
  17. certificate,
  18. },
  19. }
  20. tlsConfig := c.GetTLSConfig()
  21. v2rayCert, err := tlsConfig.GetCertificate(&gotls.ClientHelloInfo{
  22. ServerName: "www.v2ray.com",
  23. })
  24. assert(err, IsNil)
  25. x509Cert, err := x509.ParseCertificate(v2rayCert.Certificate[0])
  26. assert(err, IsNil)
  27. assert(x509Cert.NotAfter.After(time.Now()), IsTrue)
  28. }
  29. func TestExpiredCertificate(t *testing.T) {
  30. assert := With(t)
  31. caCert := cert.MustGenerate(nil, cert.Authority(true), cert.KeyUsage(x509.KeyUsageCertSign))
  32. expiredCert := cert.MustGenerate(caCert, cert.NotAfter(time.Now().Add(time.Minute*-2)), cert.CommonName("www.v2ray.com"), cert.DNSNames("www.v2ray.com"))
  33. certificate := ParseCertificate(caCert)
  34. certificate.Usage = Certificate_AUTHORITY_ISSUE
  35. certificate2 := ParseCertificate(expiredCert)
  36. c := &Config{
  37. Certificate: []*Certificate{
  38. certificate,
  39. certificate2,
  40. },
  41. }
  42. tlsConfig := c.GetTLSConfig()
  43. v2rayCert, err := tlsConfig.GetCertificate(&gotls.ClientHelloInfo{
  44. ServerName: "www.v2ray.com",
  45. })
  46. assert(err, IsNil)
  47. x509Cert, err := x509.ParseCertificate(v2rayCert.Certificate[0])
  48. assert(err, IsNil)
  49. assert(x509Cert.NotAfter.After(time.Now()), IsTrue)
  50. }
  51. func TestInsecureCertificates(t *testing.T) {
  52. c := &Config{
  53. AllowInsecureCiphers: true,
  54. }
  55. tlsConfig := c.GetTLSConfig()
  56. if len(tlsConfig.CipherSuites) > 0 {
  57. t.Fatal("Unexpected tls cipher suites list: ", tlsConfig.CipherSuites)
  58. }
  59. }
  60. func BenchmarkCertificateIssuing(b *testing.B) {
  61. certificate := ParseCertificate(cert.MustGenerate(nil, cert.Authority(true), cert.KeyUsage(x509.KeyUsageCertSign)))
  62. certificate.Usage = Certificate_AUTHORITY_ISSUE
  63. c := &Config{
  64. Certificate: []*Certificate{
  65. certificate,
  66. },
  67. }
  68. tlsConfig := c.GetTLSConfig()
  69. lenCerts := len(tlsConfig.Certificates)
  70. b.ResetTimer()
  71. for i := 0; i < b.N; i++ {
  72. _, _ = tlsConfig.GetCertificate(&gotls.ClientHelloInfo{
  73. ServerName: "www.v2ray.com",
  74. })
  75. delete(tlsConfig.NameToCertificate, "www.v2ray.com")
  76. tlsConfig.Certificates = tlsConfig.Certificates[:lenCerts]
  77. }
  78. }