tttls1.3 0.3.5 → 0.3.7

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (68) hide show
  1. checksums.yaml +4 -4
  2. data/.ruby-version +1 -1
  3. data/Gemfile +2 -2
  4. data/README.md +1 -1
  5. data/lib/tttls1.3/client.rb +11 -5
  6. data/lib/tttls1.3/ech.rb +31 -90
  7. data/lib/tttls1.3/message/alert.rb +1 -0
  8. data/lib/tttls1.3/sslkeylogfile.rb +22 -0
  9. data/lib/tttls1.3/version.rb +1 -1
  10. data/lib/tttls1.3.rb +1 -0
  11. data/tttls1.3.gemspec +7 -4
  12. metadata +11 -121
  13. data/.github/workflows/ci.yml +0 -39
  14. data/.gitignore +0 -17
  15. data/spec/aead_spec.rb +0 -95
  16. data/spec/alert_spec.rb +0 -54
  17. data/spec/alpn_spec.rb +0 -55
  18. data/spec/application_data_spec.rb +0 -26
  19. data/spec/certificate_spec.rb +0 -82
  20. data/spec/certificate_verify_spec.rb +0 -51
  21. data/spec/change_cipher_spec_spec.rb +0 -26
  22. data/spec/cipher_suites_spec.rb +0 -39
  23. data/spec/client_hello_spec.rb +0 -105
  24. data/spec/client_spec.rb +0 -274
  25. data/spec/compress_certificate_spec.rb +0 -54
  26. data/spec/cookie_spec.rb +0 -98
  27. data/spec/early_data_indication_spec.rb +0 -64
  28. data/spec/ech_outer_extensions_spec.rb +0 -42
  29. data/spec/ech_spec.rb +0 -122
  30. data/spec/encrypted_extensions_spec.rb +0 -94
  31. data/spec/end_of_early_data_spec.rb +0 -28
  32. data/spec/endpoint_spec.rb +0 -167
  33. data/spec/error_spec.rb +0 -18
  34. data/spec/extensions_spec.rb +0 -250
  35. data/spec/finished_spec.rb +0 -55
  36. data/spec/fixtures/rsa_ca.crt +0 -18
  37. data/spec/fixtures/rsa_ca.key +0 -27
  38. data/spec/fixtures/rsa_rsa.crt +0 -18
  39. data/spec/fixtures/rsa_rsa.key +0 -27
  40. data/spec/fixtures/rsa_rsa_ocsp.crt +0 -18
  41. data/spec/fixtures/rsa_rsa_ocsp.key +0 -27
  42. data/spec/fixtures/rsa_rsassaPss.crt +0 -20
  43. data/spec/fixtures/rsa_rsassaPss.key +0 -27
  44. data/spec/fixtures/rsa_secp256r1.crt +0 -14
  45. data/spec/fixtures/rsa_secp256r1.key +0 -5
  46. data/spec/fixtures/rsa_secp384r1.crt +0 -14
  47. data/spec/fixtures/rsa_secp384r1.key +0 -6
  48. data/spec/fixtures/rsa_secp521r1.crt +0 -15
  49. data/spec/fixtures/rsa_secp521r1.key +0 -7
  50. data/spec/key_schedule_spec.rb +0 -221
  51. data/spec/key_share_spec.rb +0 -199
  52. data/spec/new_session_ticket_spec.rb +0 -80
  53. data/spec/pre_shared_key_spec.rb +0 -167
  54. data/spec/psk_key_exchange_modes_spec.rb +0 -45
  55. data/spec/record_size_limit_spec.rb +0 -61
  56. data/spec/record_spec.rb +0 -105
  57. data/spec/server_hello_spec.rb +0 -200
  58. data/spec/server_name_spec.rb +0 -110
  59. data/spec/server_spec.rb +0 -232
  60. data/spec/signature_algorithms_cert_spec.rb +0 -77
  61. data/spec/signature_algorithms_spec.rb +0 -104
  62. data/spec/spec_helper.rb +0 -990
  63. data/spec/status_request_spec.rb +0 -140
  64. data/spec/supported_groups_spec.rb +0 -79
  65. data/spec/supported_versions_spec.rb +0 -136
  66. data/spec/transcript_spec.rb +0 -83
  67. data/spec/unknown_extension_spec.rb +0 -90
  68. data/spec/utils_spec.rb +0 -235
@@ -1,80 +0,0 @@
1
- # encoding: ascii-8bit
2
- # frozen_string_literal: true
3
-
4
- require_relative 'spec_helper'
5
- using Refinements
6
-
7
- RSpec.describe NewSessionTicket do
8
- context 'new_session_ticket' do
9
- let(:ticket_lifetime) do
10
- 7200 # two_hours
11
- end
12
-
13
- let(:ticket_age_add) do
14
- OpenSSL::Random.random_bytes(4)
15
- end
16
-
17
- let(:ticket_nonce) do
18
- "\x00" * 255
19
- end
20
-
21
- let(:ticket) do
22
- OpenSSL::Random.random_bytes(255)
23
- end
24
-
25
- let(:message) do
26
- NewSessionTicket.new(ticket_lifetime:,
27
- ticket_age_add:,
28
- ticket_nonce:,
29
- ticket:)
30
- end
31
-
32
- it 'should be generated' do
33
- expect(message.msg_type).to eq HandshakeType::NEW_SESSION_TICKET
34
- expect(message.ticket_lifetime).to eq ticket_lifetime
35
- expect(message.ticket_age_add).to eq ticket_age_add
36
- expect(message.ticket_nonce).to eq ticket_nonce
37
- expect(message.ticket).to eq ticket
38
- expect(message.extensions).to be_empty
39
- end
40
-
41
- it 'should be serialized' do
42
- expect(message.serialize).to eq HandshakeType::NEW_SESSION_TICKET \
43
- + 523.to_uint24 \
44
- + ticket_lifetime.to_uint32 \
45
- + ticket_age_add \
46
- + ticket_nonce.prefix_uint8_length \
47
- + ticket.prefix_uint16_length \
48
- + Extensions.new.serialize
49
- end
50
- end
51
-
52
- context 'new_session_ticket, invalid ticket_age_add,' do
53
- let(:message) do
54
- NewSessionTicket.new(ticket_lifetime: 60 * 60 * 2, # 2 hours
55
- ticket_age_add: OpenSSL::Random.random_bytes(32),
56
- ticket_nonce: "\x00" * 255,
57
- ticket: OpenSSL::Random.random_bytes(255))
58
- end
59
-
60
- it 'should not be generated' do
61
- expect { message }.to raise_error(ErrorAlerts)
62
- end
63
- end
64
-
65
- context 'valid new_session_ticket binary' do
66
- let(:message) do
67
- NewSessionTicket.deserialize(TESTBINARY_NEW_SESSION_TICKET)
68
- end
69
-
70
- it 'should generate object' do
71
- expect(message.msg_type).to eq HandshakeType::NEW_SESSION_TICKET
72
- expect(message.ticket_lifetime).to eq 30
73
- expect(message.ticket_nonce).to eq "\x00\x00"
74
- end
75
-
76
- it 'should generate serializable object' do
77
- expect(message.serialize).to eq TESTBINARY_NEW_SESSION_TICKET
78
- end
79
- end
80
- end
@@ -1,167 +0,0 @@
1
- # encoding: ascii-8bit
2
- # frozen_string_literal: true
3
-
4
- require_relative 'spec_helper'
5
- using Refinements
6
-
7
- RSpec.describe PreSharedKey do
8
- context 'valid pre_shared_key of ClientHello' do
9
- let(:identity) do
10
- OpenSSL::Random.random_bytes(32)
11
- end
12
-
13
- let(:obfuscated_ticket_age) do
14
- OpenSSL::BN.rand_range(1 << 32).to_i
15
- end
16
-
17
- let(:binders) do
18
- [
19
- OpenSSL::Random.random_bytes(32)
20
- ]
21
- end
22
-
23
- let(:identities) do
24
- [
25
- PskIdentity.new(
26
- identity:,
27
- obfuscated_ticket_age:
28
- )
29
- ]
30
- end
31
-
32
- let(:offered_psks) do
33
- OfferedPsks.new(
34
- identities:,
35
- binders:
36
- )
37
- end
38
-
39
- let(:extension) do
40
- PreSharedKey.new(msg_type: HandshakeType::CLIENT_HELLO,
41
- offered_psks:)
42
- end
43
-
44
- it 'should be generated' do
45
- expect(extension.msg_type).to eq HandshakeType::CLIENT_HELLO
46
- expect(extension.extension_type).to eq ExtensionType::PRE_SHARED_KEY
47
- expect(extension.offered_psks).to eq offered_psks
48
- expect(extension.selected_identity).to be_nil
49
- end
50
-
51
- it 'should be serialized' do
52
- expect(extension.serialize).to eq ExtensionType::PRE_SHARED_KEY \
53
- + 75.to_uint16 \
54
- + 38.to_uint16 \
55
- + 32.to_uint16 \
56
- + identity \
57
- + obfuscated_ticket_age.to_uint32 \
58
- + 33.to_uint16 \
59
- + "\x20" \
60
- + binders.join
61
- end
62
- end
63
-
64
- context 'valid pre_shared_key, ClientHello,' do
65
- let(:identity_1) do
66
- OpenSSL::Random.random_bytes(32)
67
- end
68
- let(:identity_2) do
69
- OpenSSL::Random.random_bytes(32)
70
- end
71
-
72
- let(:obfuscated_ticket_age_1) do
73
- OpenSSL::BN.rand_range(1 << 32).to_i
74
- end
75
- let(:obfuscated_ticket_age_2) do
76
- OpenSSL::BN.rand_range(1 << 32).to_i
77
- end
78
-
79
- let(:binders) do
80
- [
81
- OpenSSL::Random.random_bytes(32),
82
- OpenSSL::Random.random_bytes(32)
83
- ]
84
- end
85
-
86
- let(:identities) do
87
- [
88
- PskIdentity.new(
89
- identity: identity_1,
90
- obfuscated_ticket_age: obfuscated_ticket_age_1
91
- ),
92
- PskIdentity.new(
93
- identity: identity_2,
94
- obfuscated_ticket_age: obfuscated_ticket_age_2
95
- )
96
- ]
97
- end
98
-
99
- let(:offered_psks) do
100
- OfferedPsks.new(
101
- identities:,
102
- binders:
103
- )
104
- end
105
-
106
- let(:extension) do
107
- PreSharedKey.new(msg_type: HandshakeType::CLIENT_HELLO,
108
- offered_psks:)
109
- end
110
-
111
- it 'should be generated' do
112
- expect(extension.msg_type).to eq HandshakeType::CLIENT_HELLO
113
- expect(extension.extension_type).to eq ExtensionType::PRE_SHARED_KEY
114
- expect(extension.offered_psks).to eq offered_psks
115
- expect(extension.selected_identity).to be_nil
116
- end
117
-
118
- it 'should be serialized' do
119
- expect(extension.serialize).to eq ExtensionType::PRE_SHARED_KEY \
120
- + 146.to_uint16 \
121
- + 76.to_uint16 \
122
- + identity_1.prefix_uint16_length \
123
- + obfuscated_ticket_age_1.to_uint32 \
124
- + identity_2.prefix_uint16_length \
125
- + obfuscated_ticket_age_2.to_uint32 \
126
- + 66.to_uint16 \
127
- + binders[0].prefix_uint8_length \
128
- + binders[1].prefix_uint8_length
129
- end
130
- end
131
-
132
- context 'valid pre_shared_key binary, ClientHello,' do
133
- let(:extension) do
134
- PreSharedKey.deserialize(TESTBINARY_PRE_SHARED_KEY_CH,
135
- HandshakeType::CLIENT_HELLO)
136
- end
137
-
138
- it 'should generate valid object' do
139
- expect(extension.msg_type).to eq HandshakeType::CLIENT_HELLO
140
- expect(extension.extension_type).to eq ExtensionType::PRE_SHARED_KEY
141
- end
142
-
143
- it 'should generate valid serializable object' do
144
- expect(extension.serialize)
145
- .to eq ExtensionType::PRE_SHARED_KEY \
146
- + TESTBINARY_PRE_SHARED_KEY_CH.prefix_uint16_length
147
- end
148
- end
149
-
150
- context 'valid pre_shared_key binary, ServerHello,' do
151
- let(:extension) do
152
- PreSharedKey.deserialize(TESTBINARY_PRE_SHARED_KEY_SH,
153
- HandshakeType::SERVER_HELLO)
154
- end
155
-
156
- it 'should generate valid object' do
157
- expect(extension.msg_type).to eq HandshakeType::SERVER_HELLO
158
- expect(extension.extension_type).to eq ExtensionType::PRE_SHARED_KEY
159
- end
160
-
161
- it 'should generate valid serializable object' do
162
- expect(extension.serialize)
163
- .to eq ExtensionType::PRE_SHARED_KEY \
164
- + TESTBINARY_PRE_SHARED_KEY_SH.prefix_uint16_length
165
- end
166
- end
167
- end
@@ -1,45 +0,0 @@
1
- # encoding: ascii-8bit
2
- # frozen_string_literal: true
3
-
4
- require_relative 'spec_helper'
5
- using Refinements
6
-
7
- RSpec.describe PskKeyExchangeModes do
8
- context 'valid psk_key_exchange_modes' do
9
- let(:extension) do
10
- PskKeyExchangeModes.new([PskKeyExchangeMode::PSK_KE,
11
- PskKeyExchangeMode::PSK_DHE_KE])
12
- end
13
-
14
- it 'should generate valid psk_key_exchange_modes' do
15
- expect(extension.extension_type)
16
- .to eq ExtensionType::PSK_KEY_EXCHANGE_MODES
17
- expect(extension.ke_modes).to eq [PskKeyExchangeMode::PSK_KE,
18
- PskKeyExchangeMode::PSK_DHE_KE]
19
- expect(extension.serialize)
20
- .to eq ExtensionType::PSK_KEY_EXCHANGE_MODES \
21
- + 3.to_uint16 \
22
- + [PskKeyExchangeMode::PSK_KE,
23
- PskKeyExchangeMode::PSK_DHE_KE].join.prefix_uint8_length
24
- end
25
- end
26
-
27
- context 'valid psk_key_exchange_modes binary' do
28
- let(:extension) do
29
- PskKeyExchangeModes.deserialize(TESTBINARY_PSK_KEY_EXCHANGE_MODES)
30
- end
31
-
32
- it 'should generate valid object' do
33
- expect(extension.extension_type)
34
- .to eq ExtensionType::PSK_KEY_EXCHANGE_MODES
35
- expect(extension.ke_modes).to eq [PskKeyExchangeMode::PSK_KE,
36
- PskKeyExchangeMode::PSK_DHE_KE]
37
- end
38
-
39
- it 'should generate serializable object' do
40
- expect(extension.serialize)
41
- .to eq ExtensionType::PSK_KEY_EXCHANGE_MODES \
42
- + TESTBINARY_PSK_KEY_EXCHANGE_MODES.prefix_uint16_length
43
- end
44
- end
45
- end
@@ -1,61 +0,0 @@
1
- # encoding: ascii-8bit
2
- # frozen_string_literal: true
3
-
4
- require_relative 'spec_helper'
5
- using Refinements
6
-
7
- RSpec.describe RecordSizeLimit do
8
- context 'vailid record_size_limit' do
9
- let(:extension) do
10
- RecordSizeLimit.new(2**14)
11
- end
12
-
13
- it 'should be generated' do
14
- expect(extension.extension_type).to eq ExtensionType::RECORD_SIZE_LIMIT
15
- expect(extension.record_size_limit).to eq 2**14
16
- end
17
-
18
- it 'should be serialized' do
19
- expect(extension.serialize).to eq ExtensionType::RECORD_SIZE_LIMIT \
20
- + 2.to_uint16 \
21
- + (2**14).to_uint16
22
- end
23
- end
24
-
25
- context 'invalid record_size_limit' do
26
- let(:extension) do
27
- RecordSizeLimit.new(63)
28
- end
29
-
30
- it 'should not generated' do
31
- expect { extension }.to raise_error(ErrorAlerts)
32
- end
33
- end
34
-
35
- context 'valid record_size_limit binary' do
36
- let(:extension) do
37
- RecordSizeLimit.deserialize(TESTBINARY_RECORD_SIZE_LIMIT)
38
- end
39
-
40
- it 'should generate valid object' do
41
- expect(extension.extension_type).to eq ExtensionType::RECORD_SIZE_LIMIT
42
- expect(extension.record_size_limit).to eq 2**14
43
- end
44
-
45
- it 'should generate serializable object' do
46
- expect(extension.serialize)
47
- .to eq ExtensionType::RECORD_SIZE_LIMIT \
48
- + TESTBINARY_RECORD_SIZE_LIMIT.prefix_uint16_length
49
- end
50
- end
51
-
52
- context 'invalid record_size_limit binary, too short record_size_limit,' do
53
- let(:extension) do
54
- RecordSizeLimit.deserialize(63.to_uint16)
55
- end
56
-
57
- it 'should not generate object' do
58
- expect { extension }.to raise_error(ErrorAlerts)
59
- end
60
- end
61
- end
data/spec/record_spec.rb DELETED
@@ -1,105 +0,0 @@
1
- # encoding: ascii-8bit
2
- # frozen_string_literal: true
3
-
4
- require_relative 'spec_helper'
5
- using Refinements
6
-
7
- RSpec.describe Record do
8
- context 'valid record' do
9
- let(:record) do
10
- Record.new(
11
- type: ContentType::CCS,
12
- legacy_record_version: ProtocolVersion::TLS_1_2,
13
- messages: [ChangeCipherSpec.new],
14
- cipher: Passer.new
15
- )
16
- end
17
-
18
- it 'should be generated' do
19
- expect(record.type).to eq ContentType::CCS
20
- expect(record.legacy_record_version).to eq ProtocolVersion::TLS_1_2
21
- end
22
-
23
- it 'should be serialized' do
24
- expect(record.serialize).to eq ContentType::CCS \
25
- + ProtocolVersion::TLS_1_2 \
26
- + 1.to_uint16 \
27
- + ChangeCipherSpec.new.serialize
28
- end
29
- end
30
-
31
- context 'valid record binary' do
32
- let(:record) do
33
- Record.deserialize(TESTBINARY_RECORD_CCS, Passer.new).first
34
- end
35
-
36
- it 'should generate valid record header and ChangeCipherSpec' do
37
- expect(record.type).to eq ContentType::CCS
38
- expect(record.legacy_record_version).to eq ProtocolVersion::TLS_1_2
39
- end
40
-
41
- it 'should generate valid serializable object' do
42
- expect(record.serialize).to eq ContentType::CCS \
43
- + ProtocolVersion::TLS_1_2 \
44
- + 1.to_uint16 \
45
- + ChangeCipherSpec.new.serialize
46
- end
47
- end
48
-
49
- context 'invalid record binary, too short,' do
50
- let(:record) do
51
- Record.deserialize(TESTBINARY_RECORD_CCS[0...-1],
52
- Passer.new)
53
- end
54
-
55
- it 'should not generate object' do
56
- expect { record }.to raise_error(ErrorAlerts)
57
- end
58
- end
59
-
60
- context 'invalid record binary, nil,' do
61
- let(:record) do
62
- Record.deserialize(nil, Passer.new)
63
- end
64
-
65
- it 'should not generate object' do
66
- expect { record }.to raise_error(ErrorAlerts)
67
- end
68
- end
69
-
70
- context 'server parameters record binary' do
71
- let(:record) do
72
- cipher = Cryptograph::Aead.new(
73
- cipher_suite: CipherSuite::TLS_AES_128_GCM_SHA256,
74
- write_key: TESTBINARY_SERVER_PARAMETERS_WRITE_KEY,
75
- write_iv: TESTBINARY_SERVER_PARAMETERS_WRITE_IV,
76
- sequence_number: SequenceNumber.new
77
- )
78
- Record.deserialize(TESTBINARY_SERVER_PARAMETERS_RECORD, cipher).first
79
- end
80
-
81
- it 'should generate valid record header' do
82
- expect(record.type).to eq ContentType::APPLICATION_DATA
83
- expect(record.legacy_record_version).to eq ProtocolVersion::TLS_1_2
84
- end
85
-
86
- it 'should generate valid server parameters' do
87
- expect(record.messages[0].msg_type)
88
- .to eq HandshakeType::ENCRYPTED_EXTENSIONS
89
- expect(record.messages[0].serialize)
90
- .to eq TESTBINARY_ENCRYPTED_EXTENSIONS
91
- expect(record.messages[1].msg_type)
92
- .to eq HandshakeType::CERTIFICATE
93
- expect(record.messages[1].serialize)
94
- .to eq TESTBINARY_CERTIFICATE
95
- expect(record.messages[2].msg_type)
96
- .to eq HandshakeType::CERTIFICATE_VERIFY
97
- expect(record.messages[2].serialize)
98
- .to eq TESTBINARY_CERTIFICATE_VERIFY
99
- expect(record.messages[3].msg_type)
100
- .to eq HandshakeType::FINISHED
101
- expect(record.messages[3].serialize)
102
- .to eq TESTBINARY_SERVER_FINISHED
103
- end
104
- end
105
- end
@@ -1,200 +0,0 @@
1
- # encoding: ascii-8bit
2
- # frozen_string_literal: true
3
-
4
- require_relative 'spec_helper'
5
- using Refinements
6
-
7
- RSpec.describe ServerHello do
8
- context 'default server_hello' do
9
- let(:random) do
10
- OpenSSL::Random.random_bytes(32)
11
- end
12
-
13
- let(:legacy_session_id_echo) do
14
- Array.new(32, 0).map(&:chr).join
15
- end
16
-
17
- let(:cipher_suite) do
18
- CipherSuite::TLS_AES_256_GCM_SHA384
19
- end
20
-
21
- let(:message) do
22
- ServerHello.new(random:,
23
- legacy_session_id_echo:,
24
- cipher_suite:)
25
- end
26
-
27
- it 'should be generated' do
28
- expect(message.msg_type).to eq HandshakeType::SERVER_HELLO
29
- expect(message.legacy_version).to eq ProtocolVersion::TLS_1_2
30
- expect(message.random).to eq random
31
- expect(message.legacy_session_id_echo).to eq legacy_session_id_echo
32
- expect(message.cipher_suite).to eq CipherSuite::TLS_AES_256_GCM_SHA384
33
- expect(message.legacy_compression_method).to eq "\x00"
34
- expect(message.extensions).to be_empty
35
- expect(message.hrr?).to be false
36
- expect(message.appearable_extensions?).to be true
37
- expect(message.negotiated_tls_1_3?).to be false
38
- end
39
-
40
- it 'should be serialized' do
41
- expect(message.serialize).to eq HandshakeType::SERVER_HELLO \
42
- + 72.to_uint24 \
43
- + ProtocolVersion::TLS_1_2 \
44
- + random \
45
- + legacy_session_id_echo.length.to_uint8 \
46
- + legacy_session_id_echo \
47
- + cipher_suite \
48
- + "\x00" \
49
- + Extensions.new.serialize
50
- end
51
- end
52
-
53
- context 'valid server_hello binary' do
54
- let(:message) do
55
- ServerHello.deserialize(TESTBINARY_SERVER_HELLO)
56
- end
57
-
58
- it 'should generate valid object' do
59
- expect(message.msg_type).to eq HandshakeType::SERVER_HELLO
60
- expect(message.legacy_version).to eq ProtocolVersion::TLS_1_2
61
- expect(message.cipher_suite).to eq CipherSuite::TLS_AES_128_GCM_SHA256
62
- expect(message.legacy_compression_method).to eq "\x00"
63
- expect(message.hrr?).to be false
64
- expect(message.appearable_extensions?).to be true
65
- expect(message.negotiated_tls_1_3?).to be true
66
- end
67
-
68
- it 'should generate valid serializable object' do
69
- expect(message.serialize).to eq TESTBINARY_SERVER_HELLO
70
- end
71
- end
72
-
73
- context 'hello_retry_request binary' do
74
- let(:message) do
75
- ServerHello.deserialize(TESTBINARY_HRR_HELLO_RETRY_REQUEST)
76
- end
77
-
78
- it 'should generate valid object' do
79
- expect(message.msg_type).to eq HandshakeType::SERVER_HELLO
80
- expect(message.legacy_version).to eq ProtocolVersion::TLS_1_2
81
- expect(message.cipher_suite).to eq CipherSuite::TLS_AES_128_GCM_SHA256
82
- expect(message.legacy_compression_method).to eq "\x00"
83
- expect(message.hrr?).to be true
84
- expect(message.appearable_extensions?).to be true
85
- expect(message.negotiated_tls_1_3?).to be true
86
- end
87
-
88
- it 'should generate valid serializable object' do
89
- expect(message.serialize).to eq TESTBINARY_HRR_HELLO_RETRY_REQUEST
90
- end
91
- end
92
-
93
- context 'valid server_hello binary, 0-RTT,' do
94
- let(:message) do
95
- ServerHello.deserialize(TESTBINARY_0_RTT_SERVER_HELLO)
96
- end
97
-
98
- it 'should generate valid object' do
99
- expect(message.msg_type).to eq HandshakeType::SERVER_HELLO
100
- expect(message.legacy_version).to eq ProtocolVersion::TLS_1_2
101
- expect(message.cipher_suite).to eq CipherSuite::TLS_AES_128_GCM_SHA256
102
- expect(message.legacy_compression_method).to eq "\x00"
103
- expect(message.hrr?).to be false
104
- expect(message.appearable_extensions?).to be true
105
- expect(message.negotiated_tls_1_3?).to be true
106
- end
107
-
108
- it 'should generate valid serializable object' do
109
- expect(message.serialize).to eq TESTBINARY_0_RTT_SERVER_HELLO
110
- end
111
- end
112
-
113
- context 'default hello_retry_request' do
114
- let(:legacy_session_id_echo) do
115
- Array.new(32, 0).map(&:chr).join
116
- end
117
-
118
- let(:cipher_suite) do
119
- CipherSuite::TLS_AES_256_GCM_SHA384
120
- end
121
-
122
- let(:message) do
123
- ServerHello.new(random: Message::HRR_RANDOM,
124
- legacy_session_id_echo:,
125
- cipher_suite:)
126
- end
127
-
128
- it 'should be generated' do
129
- expect(message.msg_type).to eq HandshakeType::SERVER_HELLO
130
- expect(message.legacy_version).to eq ProtocolVersion::TLS_1_2
131
- expect(message.random).to eq Message::HRR_RANDOM
132
- expect(message.legacy_session_id_echo).to eq legacy_session_id_echo
133
- expect(message.cipher_suite).to eq CipherSuite::TLS_AES_256_GCM_SHA384
134
- expect(message.legacy_compression_method).to eq "\x00"
135
- expect(message.extensions).to be_empty
136
- expect(message.hrr?).to eq true
137
- expect(message.appearable_extensions?).to be true
138
- expect(message.negotiated_tls_1_3?).to be false
139
- end
140
-
141
- it 'should be serialized' do
142
- expect(message.serialize).to eq HandshakeType::SERVER_HELLO \
143
- + 72.to_uint24 \
144
- + ProtocolVersion::TLS_1_2 \
145
- + Message::HRR_RANDOM \
146
- + legacy_session_id_echo.length.to_uint8 \
147
- + legacy_session_id_echo \
148
- + cipher_suite \
149
- + "\x00" \
150
- + Extensions.new.serialize
151
- end
152
- end
153
-
154
- context 'server_hello with random[-8..] == downgrade protection ' \
155
- 'value(TLS 1.2)' do
156
- let(:message) do
157
- sh = ServerHello.deserialize(TESTBINARY_SERVER_HELLO)
158
- random = OpenSSL::Random.random_bytes(24) + \
159
- ServerHello.const_get(:DOWNGRADE_PROTECTION_TLS_1_2)
160
- sh.instance_variable_set(:@random, random)
161
- sh
162
- end
163
-
164
- it 'should check downgrade protection value' do
165
- expect(message.negotiated_tls_1_3?).to be true
166
- expect(message.downgraded?).to be true
167
- end
168
- end
169
-
170
- context 'server_hello with random[-8..] == downgrade protection ' \
171
- 'value(TLS 1.2)' do
172
- let(:message) do
173
- sh = ServerHello.deserialize(TESTBINARY_SERVER_HELLO)
174
- random = OpenSSL::Random.random_bytes(24) + \
175
- ServerHello.const_get(:DOWNGRADE_PROTECTION_TLS_1_1)
176
- sh.instance_variable_set(:@random, random)
177
- sh
178
- end
179
-
180
- it 'should check downgrade protection value' do
181
- expect(message.negotiated_tls_1_3?).to be true
182
- expect(message.downgraded?).to be true
183
- end
184
- end
185
-
186
- context 'server_hello with supported_versions not including "\x03\x04"' do
187
- let(:message) do
188
- sh = ServerHello.deserialize(TESTBINARY_SERVER_HELLO)
189
- extensions = sh.instance_variable_get(:@extensions)
190
- extensions.delete(ExtensionType::SUPPORTED_VERSIONS)
191
- sh.instance_variable_set(:@extensions, extensions)
192
- sh
193
- end
194
-
195
- it 'should check downgrade protection value' do
196
- expect(message.negotiated_tls_1_3?).to be false
197
- expect(message.downgraded?).to be false
198
- end
199
- end
200
- end