forked from pion/dtls
-
Notifications
You must be signed in to change notification settings - Fork 0
/
flight3handler_test.go
109 lines (90 loc) · 2.82 KB
/
flight3handler_test.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
// SPDX-FileCopyrightText: 2023 The Pion community <https://pion.ly>
// SPDX-License-Identifier: MIT
package dtls
import (
"context"
"math/rand"
"testing"
"time"
"github.com/pion/dtls/v3/pkg/crypto/elliptic"
dtlsnet "github.com/pion/dtls/v3/pkg/net"
"github.com/pion/dtls/v3/pkg/protocol/extension"
"github.com/pion/dtls/v3/pkg/protocol/handshake"
"github.com/pion/dtls/v3/pkg/protocol/recordlayer"
"github.com/pion/transport/v3/dpipe"
"github.com/pion/transport/v3/test"
)
// Assert that SupportedEllipticCurves is only sent when a ECC CipherSuite is available
func TestSupportedEllipticCurves(t *testing.T) {
// Limit runtime in case of deadlocks
lim := test.TimeOut(time.Second * 20)
defer lim.Stop()
// Check for leaking routines
report := test.CheckRoutines(t)
defer report()
ctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)
defer cancel()
expectedCurves := defaultCurves
var actualCurves []elliptic.Curve
rand.Shuffle(len(expectedCurves), func(i, j int) {
expectedCurves[i], expectedCurves[j] = expectedCurves[j], expectedCurves[i]
})
clientErr := make(chan error, 1)
ca, cb := dpipe.Pipe()
caAnalyzer := &connWithCallback{Conn: ca}
caAnalyzer.onWrite = func(in []byte) {
messages, err := recordlayer.UnpackDatagram(in)
if err != nil {
t.Fatal(err)
}
for i := range messages {
h := &handshake.Handshake{}
_ = h.Unmarshal(messages[i][recordlayer.FixedHeaderSize:])
if h.Header.Type == handshake.TypeClientHello {
clientHello := &handshake.MessageClientHello{}
msg, err := h.Message.Marshal()
if err != nil {
t.Fatal(err)
} else if err = clientHello.Unmarshal(msg); err != nil {
t.Fatal(err)
}
for _, e := range clientHello.Extensions {
if e.TypeValue() == extension.SupportedEllipticCurvesTypeValue {
if c, ok := e.(*extension.SupportedEllipticCurves); ok {
actualCurves = c.EllipticCurves
}
}
}
}
}
}
go func() {
conf := &Config{
CipherSuites: []CipherSuiteID{TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256},
EllipticCurves: expectedCurves,
}
if client, err := testClient(ctx, dtlsnet.PacketConnFromConn(caAnalyzer), caAnalyzer.RemoteAddr(), conf, false); err != nil {
clientErr <- err
} else {
clientErr <- client.Close() //nolint
}
}()
config := &Config{
CipherSuites: []CipherSuiteID{TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256},
}
if server, err := testServer(ctx, dtlsnet.PacketConnFromConn(cb), cb.RemoteAddr(), config, true); err != nil {
t.Fatalf("Server error %v", err)
} else {
if err = server.Close(); err != nil {
t.Fatal(err)
}
}
if err := <-clientErr; err != nil {
t.Fatalf("Client error %v", err)
}
for i := range expectedCurves {
if expectedCurves[i] != actualCurves[i] {
t.Fatal("List of curves in SupportedEllipticCurves does not match config")
}
}
}