|
5 | 5 | package tls
|
6 | 6 |
|
7 | 7 | import (
|
| 8 | + "bytes" |
| 9 | + "io" |
| 10 | + "net" |
8 | 11 | "testing"
|
9 | 12 | )
|
10 | 13 |
|
@@ -116,3 +119,128 @@ func TestCertificateSelection(t *testing.T) {
|
116 | 119 | t.Errorf("foo.bar.baz.example.com returned certificate %d, not 0", n)
|
117 | 120 | }
|
118 | 121 | }
|
| 122 | + |
| 123 | +// Run with multiple crypto configs to test the logic for computing TLS record overheads. |
| 124 | +func runDynamicRecordSizingTest(t *testing.T, config *Config) { |
| 125 | + clientConn, serverConn := net.Pipe() |
| 126 | + |
| 127 | + serverConfig := *config |
| 128 | + serverConfig.DynamicRecordSizingDisabled = false |
| 129 | + tlsConn := Server(serverConn, &serverConfig) |
| 130 | + |
| 131 | + recordSizesChan := make(chan []int, 1) |
| 132 | + go func() { |
| 133 | + // This goroutine performs a TLS handshake over clientConn and |
| 134 | + // then reads TLS records until EOF. It writes a slice that |
| 135 | + // contains all the record sizes to recordSizesChan. |
| 136 | + defer close(recordSizesChan) |
| 137 | + defer clientConn.Close() |
| 138 | + |
| 139 | + tlsConn := Client(clientConn, config) |
| 140 | + if err := tlsConn.Handshake(); err != nil { |
| 141 | + t.Errorf("Error from client handshake: %s", err) |
| 142 | + return |
| 143 | + } |
| 144 | + |
| 145 | + var recordHeader [recordHeaderLen]byte |
| 146 | + var record []byte |
| 147 | + var recordSizes []int |
| 148 | + |
| 149 | + for { |
| 150 | + n, err := clientConn.Read(recordHeader[:]) |
| 151 | + if err == io.EOF { |
| 152 | + break |
| 153 | + } |
| 154 | + if err != nil || n != len(recordHeader) { |
| 155 | + t.Errorf("Error from client read: %s", err) |
| 156 | + return |
| 157 | + } |
| 158 | + |
| 159 | + length := int(recordHeader[3])<<8 | int(recordHeader[4]) |
| 160 | + if len(record) < length { |
| 161 | + record = make([]byte, length) |
| 162 | + } |
| 163 | + |
| 164 | + n, err = clientConn.Read(record[:length]) |
| 165 | + if err != nil || n != length { |
| 166 | + t.Errorf("Error from client read: %s", err) |
| 167 | + return |
| 168 | + } |
| 169 | + |
| 170 | + // The last record will be a close_notify alert, which |
| 171 | + // we don't wish to record. |
| 172 | + if recordType(recordHeader[0]) == recordTypeApplicationData { |
| 173 | + recordSizes = append(recordSizes, recordHeaderLen+length) |
| 174 | + } |
| 175 | + } |
| 176 | + |
| 177 | + recordSizesChan <- recordSizes |
| 178 | + }() |
| 179 | + |
| 180 | + if err := tlsConn.Handshake(); err != nil { |
| 181 | + t.Fatalf("Error from server handshake: %s", err) |
| 182 | + } |
| 183 | + |
| 184 | + // The server writes these plaintexts in order. |
| 185 | + plaintext := bytes.Join([][]byte{ |
| 186 | + bytes.Repeat([]byte("x"), recordSizeBoostThreshold), |
| 187 | + bytes.Repeat([]byte("y"), maxPlaintext*2), |
| 188 | + bytes.Repeat([]byte("z"), maxPlaintext), |
| 189 | + }, nil) |
| 190 | + |
| 191 | + if _, err := tlsConn.Write(plaintext); err != nil { |
| 192 | + t.Fatalf("Error from server write: %s", err) |
| 193 | + } |
| 194 | + if err := tlsConn.Close(); err != nil { |
| 195 | + t.Fatalf("Error from server close: %s", err) |
| 196 | + } |
| 197 | + |
| 198 | + recordSizes := <-recordSizesChan |
| 199 | + if recordSizes == nil { |
| 200 | + t.Fatalf("Client encountered an error") |
| 201 | + } |
| 202 | + |
| 203 | + // Drop the size of last record, which is likely to be truncated. |
| 204 | + recordSizes = recordSizes[:len(recordSizes)-1] |
| 205 | + |
| 206 | + // recordSizes should contain a series of records smaller than |
| 207 | + // tcpMSSEstimate followed by some larger than maxPlaintext. |
| 208 | + seenLargeRecord := false |
| 209 | + for i, size := range recordSizes { |
| 210 | + if !seenLargeRecord { |
| 211 | + if size > tcpMSSEstimate { |
| 212 | + if i < 100 { |
| 213 | + t.Fatalf("Record #%d has size %d, which is too large too soon", i, size) |
| 214 | + } |
| 215 | + if size <= maxPlaintext { |
| 216 | + t.Fatalf("Record #%d has odd size %d", i, size) |
| 217 | + } |
| 218 | + seenLargeRecord = true |
| 219 | + } |
| 220 | + } else if size <= maxPlaintext { |
| 221 | + t.Fatalf("Record #%d has size %d but should be full sized", i, size) |
| 222 | + } |
| 223 | + } |
| 224 | + |
| 225 | + if !seenLargeRecord { |
| 226 | + t.Fatalf("No large records observed") |
| 227 | + } |
| 228 | +} |
| 229 | + |
| 230 | +func TestDynamicRecordSizingWithStreamCipher(t *testing.T) { |
| 231 | + config := *testConfig |
| 232 | + config.CipherSuites = []uint16{TLS_RSA_WITH_RC4_128_SHA} |
| 233 | + runDynamicRecordSizingTest(t, &config) |
| 234 | +} |
| 235 | + |
| 236 | +func TestDynamicRecordSizingWithCBC(t *testing.T) { |
| 237 | + config := *testConfig |
| 238 | + config.CipherSuites = []uint16{TLS_RSA_WITH_AES_256_CBC_SHA} |
| 239 | + runDynamicRecordSizingTest(t, &config) |
| 240 | +} |
| 241 | + |
| 242 | +func TestDynamicRecordSizingWithAEAD(t *testing.T) { |
| 243 | + config := *testConfig |
| 244 | + config.CipherSuites = []uint16{TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256} |
| 245 | + runDynamicRecordSizingTest(t, &config) |
| 246 | +} |
0 commit comments