config_test.go 2.5 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697
  1. package tls_test
  2. import (
  3. gotls "crypto/tls"
  4. "crypto/x509"
  5. "testing"
  6. "time"
  7. "github.com/xtls/xray-core/common"
  8. "github.com/xtls/xray-core/common/protocol/tls/cert"
  9. . "github.com/xtls/xray-core/transport/internet/tls"
  10. )
  11. func TestCertificateIssuing(t *testing.T) {
  12. certificate := ParseCertificate(cert.MustGenerate(nil, cert.Authority(true), cert.KeyUsage(x509.KeyUsageCertSign)))
  13. certificate.Usage = Certificate_AUTHORITY_ISSUE
  14. c := &Config{
  15. Certificate: []*Certificate{
  16. certificate,
  17. },
  18. }
  19. tlsConfig := c.GetTLSConfig()
  20. xrayCert, err := tlsConfig.GetCertificate(&gotls.ClientHelloInfo{
  21. ServerName: "www.example.com",
  22. })
  23. common.Must(err)
  24. x509Cert, err := x509.ParseCertificate(xrayCert.Certificate[0])
  25. common.Must(err)
  26. if !x509Cert.NotAfter.After(time.Now()) {
  27. t.Error("NotAfter: ", x509Cert.NotAfter)
  28. }
  29. }
  30. func TestExpiredCertificate(t *testing.T) {
  31. caCert := cert.MustGenerate(nil, cert.Authority(true), cert.KeyUsage(x509.KeyUsageCertSign))
  32. expiredCert := cert.MustGenerate(caCert, cert.NotAfter(time.Now().Add(time.Minute*-2)), cert.CommonName("www.example.com"), cert.DNSNames("www.example.com"))
  33. certificate := ParseCertificate(caCert)
  34. certificate.Usage = Certificate_AUTHORITY_ISSUE
  35. certificate2 := ParseCertificate(expiredCert)
  36. c := &Config{
  37. Certificate: []*Certificate{
  38. certificate,
  39. certificate2,
  40. },
  41. }
  42. tlsConfig := c.GetTLSConfig()
  43. xrayCert, err := tlsConfig.GetCertificate(&gotls.ClientHelloInfo{
  44. ServerName: "www.example.com",
  45. })
  46. common.Must(err)
  47. x509Cert, err := x509.ParseCertificate(xrayCert.Certificate[0])
  48. common.Must(err)
  49. if !x509Cert.NotAfter.After(time.Now()) {
  50. t.Error("NotAfter: ", x509Cert.NotAfter)
  51. }
  52. }
  53. func TestInsecureCertificates(t *testing.T) {
  54. c := &Config{}
  55. tlsConfig := c.GetTLSConfig()
  56. if len(tlsConfig.CipherSuites) > 0 {
  57. t.Fatal("Unexpected tls cipher suites list: ", tlsConfig.CipherSuites)
  58. }
  59. }
  60. func BenchmarkCertificateIssuing(b *testing.B) {
  61. certificate := ParseCertificate(cert.MustGenerate(nil, cert.Authority(true), cert.KeyUsage(x509.KeyUsageCertSign)))
  62. certificate.Usage = Certificate_AUTHORITY_ISSUE
  63. c := &Config{
  64. Certificate: []*Certificate{
  65. certificate,
  66. },
  67. }
  68. tlsConfig := c.GetTLSConfig()
  69. lenCerts := len(tlsConfig.Certificates)
  70. b.ResetTimer()
  71. for i := 0; i < b.N; i++ {
  72. _, _ = tlsConfig.GetCertificate(&gotls.ClientHelloInfo{
  73. ServerName: "www.example.com",
  74. })
  75. delete(tlsConfig.NameToCertificate, "www.example.com")
  76. tlsConfig.Certificates = tlsConfig.Certificates[:lenCerts]
  77. }
  78. }