tttls1.3 0.3.6 → 0.3.7

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (62) hide show
  1. checksums.yaml +4 -4
  2. data/.ruby-version +1 -1
  3. data/lib/tttls1.3/version.rb +1 -1
  4. data/lib/tttls1.3.rb +1 -0
  5. data/tttls1.3.gemspec +5 -2
  6. metadata +3 -113
  7. data/.github/workflows/ci.yml +0 -39
  8. data/.gitignore +0 -17
  9. data/spec/aead_spec.rb +0 -95
  10. data/spec/alert_spec.rb +0 -54
  11. data/spec/alpn_spec.rb +0 -55
  12. data/spec/application_data_spec.rb +0 -26
  13. data/spec/certificate_spec.rb +0 -82
  14. data/spec/certificate_verify_spec.rb +0 -51
  15. data/spec/change_cipher_spec_spec.rb +0 -26
  16. data/spec/cipher_suites_spec.rb +0 -39
  17. data/spec/client_hello_spec.rb +0 -105
  18. data/spec/client_spec.rb +0 -274
  19. data/spec/compress_certificate_spec.rb +0 -54
  20. data/spec/cookie_spec.rb +0 -98
  21. data/spec/early_data_indication_spec.rb +0 -64
  22. data/spec/ech_outer_extensions_spec.rb +0 -42
  23. data/spec/ech_spec.rb +0 -122
  24. data/spec/encrypted_extensions_spec.rb +0 -94
  25. data/spec/end_of_early_data_spec.rb +0 -28
  26. data/spec/endpoint_spec.rb +0 -167
  27. data/spec/error_spec.rb +0 -18
  28. data/spec/extensions_spec.rb +0 -250
  29. data/spec/finished_spec.rb +0 -55
  30. data/spec/fixtures/rsa_ca.crt +0 -18
  31. data/spec/fixtures/rsa_ca.key +0 -27
  32. data/spec/fixtures/rsa_rsa.crt +0 -18
  33. data/spec/fixtures/rsa_rsa.key +0 -27
  34. data/spec/fixtures/rsa_rsa_ocsp.crt +0 -18
  35. data/spec/fixtures/rsa_rsa_ocsp.key +0 -27
  36. data/spec/fixtures/rsa_rsassaPss.crt +0 -20
  37. data/spec/fixtures/rsa_rsassaPss.key +0 -27
  38. data/spec/fixtures/rsa_secp256r1.crt +0 -14
  39. data/spec/fixtures/rsa_secp256r1.key +0 -5
  40. data/spec/fixtures/rsa_secp384r1.crt +0 -14
  41. data/spec/fixtures/rsa_secp384r1.key +0 -6
  42. data/spec/fixtures/rsa_secp521r1.crt +0 -15
  43. data/spec/fixtures/rsa_secp521r1.key +0 -7
  44. data/spec/key_schedule_spec.rb +0 -221
  45. data/spec/key_share_spec.rb +0 -199
  46. data/spec/new_session_ticket_spec.rb +0 -80
  47. data/spec/pre_shared_key_spec.rb +0 -167
  48. data/spec/psk_key_exchange_modes_spec.rb +0 -45
  49. data/spec/record_size_limit_spec.rb +0 -61
  50. data/spec/record_spec.rb +0 -105
  51. data/spec/server_hello_spec.rb +0 -200
  52. data/spec/server_name_spec.rb +0 -110
  53. data/spec/server_spec.rb +0 -232
  54. data/spec/signature_algorithms_cert_spec.rb +0 -77
  55. data/spec/signature_algorithms_spec.rb +0 -104
  56. data/spec/spec_helper.rb +0 -990
  57. data/spec/status_request_spec.rb +0 -140
  58. data/spec/supported_groups_spec.rb +0 -79
  59. data/spec/supported_versions_spec.rb +0 -136
  60. data/spec/transcript_spec.rb +0 -83
  61. data/spec/unknown_extension_spec.rb +0 -90
  62. data/spec/utils_spec.rb +0 -235
@@ -1,199 +0,0 @@
1
- # encoding: ascii-8bit
2
- # frozen_string_literal: true
3
-
4
- require_relative 'spec_helper'
5
- using Refinements
6
-
7
- RSpec.describe KeyShare do
8
- context 'valid key_share, KeyShareClientHello,' do
9
- let(:public_key_secp384r1) do
10
- "\x04" + OpenSSL::Random.random_bytes(96)
11
- end
12
-
13
- let(:public_key_secp256r1) do
14
- "\x04" + OpenSSL::Random.random_bytes(64)
15
- end
16
-
17
- let(:extension) do
18
- KeyShare.new(
19
- msg_type: HandshakeType::CLIENT_HELLO,
20
- key_share_entry: [
21
- KeyShareEntry.new(
22
- group: NamedGroup::SECP384R1,
23
- key_exchange: public_key_secp384r1
24
- ),
25
- KeyShareEntry.new(
26
- group: NamedGroup::SECP256R1,
27
- key_exchange: public_key_secp256r1
28
- )
29
- ]
30
- )
31
- end
32
-
33
- it 'should be generated' do
34
- expect(extension.msg_type).to eq HandshakeType::CLIENT_HELLO
35
- expect(extension.extension_type).to eq ExtensionType::KEY_SHARE
36
- expect(extension.key_share_entry[0].group).to eq NamedGroup::SECP384R1
37
- expect(extension.key_share_entry[0].key_exchange)
38
- .to eq public_key_secp384r1
39
- expect(extension.key_share_entry[1].group).to eq NamedGroup::SECP256R1
40
- expect(extension.key_share_entry[1].key_exchange)
41
- .to eq public_key_secp256r1
42
- end
43
-
44
- it 'should be serialized' do
45
- expect(extension.serialize)
46
- .to eq ExtensionType::KEY_SHARE \
47
- + 172.to_uint16 \
48
- + 170.to_uint16 \
49
- + NamedGroup::SECP384R1 \
50
- + NamedGroup.key_exchange_len(NamedGroup::SECP384R1).to_uint16 \
51
- + public_key_secp384r1 \
52
- + NamedGroup::SECP256R1 \
53
- + NamedGroup.key_exchange_len(NamedGroup::SECP256R1).to_uint16 \
54
- + public_key_secp256r1
55
- end
56
- end
57
-
58
- context 'valid key_share, empty KeyShare.client_shares vector' do
59
- let(:extension) do
60
- KeyShare.new(
61
- msg_type: HandshakeType::CLIENT_HELLO,
62
- key_share_entry: []
63
- )
64
- end
65
-
66
- it 'should be generated' do
67
- expect(extension.msg_type).to eq HandshakeType::CLIENT_HELLO
68
- expect(extension.extension_type).to eq ExtensionType::KEY_SHARE
69
- expect(extension.key_share_entry).to be_empty
70
- end
71
-
72
- it 'should be serialized' do
73
- expect(extension.serialize).to eq ExtensionType::KEY_SHARE \
74
- + 2.to_uint16 \
75
- + 0.to_uint16
76
- end
77
- end
78
-
79
- context 'valid key_share, KeyShareServerHello,' do
80
- let(:public_key_secp256r1) do
81
- "\x04" + OpenSSL::Random.random_bytes(64)
82
- end
83
-
84
- let(:extension) do
85
- KeyShare.new(
86
- msg_type: HandshakeType::SERVER_HELLO,
87
- key_share_entry: [
88
- KeyShareEntry.new(
89
- group: NamedGroup::SECP256R1,
90
- key_exchange: public_key_secp256r1
91
- )
92
- ]
93
- )
94
- end
95
-
96
- it 'should be generated' do
97
- expect(extension.msg_type).to eq HandshakeType::SERVER_HELLO
98
- expect(extension.extension_type).to eq ExtensionType::KEY_SHARE
99
- expect(extension.key_share_entry[0].group).to eq NamedGroup::SECP256R1
100
- expect(extension.key_share_entry[0].key_exchange)
101
- .to eq public_key_secp256r1
102
- end
103
-
104
- it 'should be serialized' do
105
- expect(extension.serialize)
106
- .to eq ExtensionType::KEY_SHARE \
107
- + 69.to_uint16 \
108
- + NamedGroup::SECP256R1 \
109
- + public_key_secp256r1.prefix_uint16_length
110
- end
111
- end
112
-
113
- context 'valid key_share, KeyShareHelloRetryRequest,' do
114
- let(:extension) do
115
- KeyShare.new(
116
- msg_type: HandshakeType::HELLO_RETRY_REQUEST,
117
- key_share_entry: [
118
- KeyShareEntry.new(
119
- group: NamedGroup::SECP256R1,
120
- key_exchange: nil
121
- )
122
- ]
123
- )
124
- end
125
-
126
- it 'should be generated' do
127
- expect(extension.msg_type).to eq HandshakeType::HELLO_RETRY_REQUEST
128
- expect(extension.extension_type).to eq ExtensionType::KEY_SHARE
129
- expect(extension.key_share_entry[0].group).to eq NamedGroup::SECP256R1
130
- expect(extension.key_share_entry[0].key_exchange).to be_empty
131
- end
132
-
133
- it 'should be serialized' do
134
- expect(extension.serialize)
135
- .to eq ExtensionType::KEY_SHARE \
136
- + NamedGroup::SECP256R1.prefix_uint16_length
137
- end
138
- end
139
-
140
- context 'valid key_share binary, KeyShareClientHello,' do
141
- let(:extension) do
142
- KeyShare.deserialize(TESTBINARY_KEY_SHARE_CH, HandshakeType::CLIENT_HELLO)
143
- end
144
-
145
- it 'should generate valid object' do
146
- expect(extension.msg_type).to eq HandshakeType::CLIENT_HELLO
147
- expect(extension.extension_type).to eq ExtensionType::KEY_SHARE
148
- expect(extension.key_share_entry[0].group).to eq NamedGroup::SECP256R1
149
- expect(extension.key_share_entry[0].key_exchange.length)
150
- .to eq NamedGroup.key_exchange_len(NamedGroup::SECP256R1)
151
- end
152
-
153
- it 'should generate serializable object' do
154
- expect(extension.serialize)
155
- .to eq ExtensionType::KEY_SHARE \
156
- + TESTBINARY_KEY_SHARE_CH.prefix_uint16_length
157
- end
158
- end
159
-
160
- context 'valid key_share binary, KeyShareServerHello,' do
161
- let(:extension) do
162
- KeyShare.deserialize(TESTBINARY_KEY_SHARE_SH, HandshakeType::SERVER_HELLO)
163
- end
164
-
165
- it 'should generate valid object' do
166
- expect(extension.msg_type).to eq HandshakeType::SERVER_HELLO
167
- expect(extension.extension_type).to eq ExtensionType::KEY_SHARE
168
- expect(extension.key_share_entry[0].group).to eq NamedGroup::SECP256R1
169
- expect(extension.key_share_entry[0].key_exchange.length)
170
- .to eq NamedGroup.key_exchange_len(NamedGroup::SECP256R1)
171
- end
172
-
173
- it 'should generate serializable object' do
174
- expect(extension.serialize)
175
- .to eq ExtensionType::KEY_SHARE \
176
- + TESTBINARY_KEY_SHARE_SH.prefix_uint16_length
177
- end
178
- end
179
-
180
- context 'valid key_share binary, KeyShareHelloRetryRequest,' do
181
- let(:extension) do
182
- KeyShare.deserialize(TESTBINARY_KEY_SHARE_HRR,
183
- HandshakeType::HELLO_RETRY_REQUEST)
184
- end
185
-
186
- it 'should generate valid object' do
187
- expect(extension.msg_type).to eq HandshakeType::HELLO_RETRY_REQUEST
188
- expect(extension.extension_type).to eq ExtensionType::KEY_SHARE
189
- expect(extension.key_share_entry[0].group).to eq NamedGroup::SECP256R1
190
- expect(extension.key_share_entry[0].key_exchange).to be_empty
191
- end
192
-
193
- it 'should generate serializable object' do
194
- expect(extension.serialize)
195
- .to eq ExtensionType::KEY_SHARE \
196
- + TESTBINARY_KEY_SHARE_HRR.prefix_uint16_length
197
- end
198
- end
199
- end
@@ -1,80 +0,0 @@
1
- # encoding: ascii-8bit
2
- # frozen_string_literal: true
3
-
4
- require_relative 'spec_helper'
5
- using Refinements
6
-
7
- RSpec.describe NewSessionTicket do
8
- context 'new_session_ticket' do
9
- let(:ticket_lifetime) do
10
- 7200 # two_hours
11
- end
12
-
13
- let(:ticket_age_add) do
14
- OpenSSL::Random.random_bytes(4)
15
- end
16
-
17
- let(:ticket_nonce) do
18
- "\x00" * 255
19
- end
20
-
21
- let(:ticket) do
22
- OpenSSL::Random.random_bytes(255)
23
- end
24
-
25
- let(:message) do
26
- NewSessionTicket.new(ticket_lifetime:,
27
- ticket_age_add:,
28
- ticket_nonce:,
29
- ticket:)
30
- end
31
-
32
- it 'should be generated' do
33
- expect(message.msg_type).to eq HandshakeType::NEW_SESSION_TICKET
34
- expect(message.ticket_lifetime).to eq ticket_lifetime
35
- expect(message.ticket_age_add).to eq ticket_age_add
36
- expect(message.ticket_nonce).to eq ticket_nonce
37
- expect(message.ticket).to eq ticket
38
- expect(message.extensions).to be_empty
39
- end
40
-
41
- it 'should be serialized' do
42
- expect(message.serialize).to eq HandshakeType::NEW_SESSION_TICKET \
43
- + 523.to_uint24 \
44
- + ticket_lifetime.to_uint32 \
45
- + ticket_age_add \
46
- + ticket_nonce.prefix_uint8_length \
47
- + ticket.prefix_uint16_length \
48
- + Extensions.new.serialize
49
- end
50
- end
51
-
52
- context 'new_session_ticket, invalid ticket_age_add,' do
53
- let(:message) do
54
- NewSessionTicket.new(ticket_lifetime: 60 * 60 * 2, # 2 hours
55
- ticket_age_add: OpenSSL::Random.random_bytes(32),
56
- ticket_nonce: "\x00" * 255,
57
- ticket: OpenSSL::Random.random_bytes(255))
58
- end
59
-
60
- it 'should not be generated' do
61
- expect { message }.to raise_error(ErrorAlerts)
62
- end
63
- end
64
-
65
- context 'valid new_session_ticket binary' do
66
- let(:message) do
67
- NewSessionTicket.deserialize(TESTBINARY_NEW_SESSION_TICKET)
68
- end
69
-
70
- it 'should generate object' do
71
- expect(message.msg_type).to eq HandshakeType::NEW_SESSION_TICKET
72
- expect(message.ticket_lifetime).to eq 30
73
- expect(message.ticket_nonce).to eq "\x00\x00"
74
- end
75
-
76
- it 'should generate serializable object' do
77
- expect(message.serialize).to eq TESTBINARY_NEW_SESSION_TICKET
78
- end
79
- end
80
- end
@@ -1,167 +0,0 @@
1
- # encoding: ascii-8bit
2
- # frozen_string_literal: true
3
-
4
- require_relative 'spec_helper'
5
- using Refinements
6
-
7
- RSpec.describe PreSharedKey do
8
- context 'valid pre_shared_key of ClientHello' do
9
- let(:identity) do
10
- OpenSSL::Random.random_bytes(32)
11
- end
12
-
13
- let(:obfuscated_ticket_age) do
14
- OpenSSL::BN.rand_range(1 << 32).to_i
15
- end
16
-
17
- let(:binders) do
18
- [
19
- OpenSSL::Random.random_bytes(32)
20
- ]
21
- end
22
-
23
- let(:identities) do
24
- [
25
- PskIdentity.new(
26
- identity:,
27
- obfuscated_ticket_age:
28
- )
29
- ]
30
- end
31
-
32
- let(:offered_psks) do
33
- OfferedPsks.new(
34
- identities:,
35
- binders:
36
- )
37
- end
38
-
39
- let(:extension) do
40
- PreSharedKey.new(msg_type: HandshakeType::CLIENT_HELLO,
41
- offered_psks:)
42
- end
43
-
44
- it 'should be generated' do
45
- expect(extension.msg_type).to eq HandshakeType::CLIENT_HELLO
46
- expect(extension.extension_type).to eq ExtensionType::PRE_SHARED_KEY
47
- expect(extension.offered_psks).to eq offered_psks
48
- expect(extension.selected_identity).to be_nil
49
- end
50
-
51
- it 'should be serialized' do
52
- expect(extension.serialize).to eq ExtensionType::PRE_SHARED_KEY \
53
- + 75.to_uint16 \
54
- + 38.to_uint16 \
55
- + 32.to_uint16 \
56
- + identity \
57
- + obfuscated_ticket_age.to_uint32 \
58
- + 33.to_uint16 \
59
- + "\x20" \
60
- + binders.join
61
- end
62
- end
63
-
64
- context 'valid pre_shared_key, ClientHello,' do
65
- let(:identity_1) do
66
- OpenSSL::Random.random_bytes(32)
67
- end
68
- let(:identity_2) do
69
- OpenSSL::Random.random_bytes(32)
70
- end
71
-
72
- let(:obfuscated_ticket_age_1) do
73
- OpenSSL::BN.rand_range(1 << 32).to_i
74
- end
75
- let(:obfuscated_ticket_age_2) do
76
- OpenSSL::BN.rand_range(1 << 32).to_i
77
- end
78
-
79
- let(:binders) do
80
- [
81
- OpenSSL::Random.random_bytes(32),
82
- OpenSSL::Random.random_bytes(32)
83
- ]
84
- end
85
-
86
- let(:identities) do
87
- [
88
- PskIdentity.new(
89
- identity: identity_1,
90
- obfuscated_ticket_age: obfuscated_ticket_age_1
91
- ),
92
- PskIdentity.new(
93
- identity: identity_2,
94
- obfuscated_ticket_age: obfuscated_ticket_age_2
95
- )
96
- ]
97
- end
98
-
99
- let(:offered_psks) do
100
- OfferedPsks.new(
101
- identities:,
102
- binders:
103
- )
104
- end
105
-
106
- let(:extension) do
107
- PreSharedKey.new(msg_type: HandshakeType::CLIENT_HELLO,
108
- offered_psks:)
109
- end
110
-
111
- it 'should be generated' do
112
- expect(extension.msg_type).to eq HandshakeType::CLIENT_HELLO
113
- expect(extension.extension_type).to eq ExtensionType::PRE_SHARED_KEY
114
- expect(extension.offered_psks).to eq offered_psks
115
- expect(extension.selected_identity).to be_nil
116
- end
117
-
118
- it 'should be serialized' do
119
- expect(extension.serialize).to eq ExtensionType::PRE_SHARED_KEY \
120
- + 146.to_uint16 \
121
- + 76.to_uint16 \
122
- + identity_1.prefix_uint16_length \
123
- + obfuscated_ticket_age_1.to_uint32 \
124
- + identity_2.prefix_uint16_length \
125
- + obfuscated_ticket_age_2.to_uint32 \
126
- + 66.to_uint16 \
127
- + binders[0].prefix_uint8_length \
128
- + binders[1].prefix_uint8_length
129
- end
130
- end
131
-
132
- context 'valid pre_shared_key binary, ClientHello,' do
133
- let(:extension) do
134
- PreSharedKey.deserialize(TESTBINARY_PRE_SHARED_KEY_CH,
135
- HandshakeType::CLIENT_HELLO)
136
- end
137
-
138
- it 'should generate valid object' do
139
- expect(extension.msg_type).to eq HandshakeType::CLIENT_HELLO
140
- expect(extension.extension_type).to eq ExtensionType::PRE_SHARED_KEY
141
- end
142
-
143
- it 'should generate valid serializable object' do
144
- expect(extension.serialize)
145
- .to eq ExtensionType::PRE_SHARED_KEY \
146
- + TESTBINARY_PRE_SHARED_KEY_CH.prefix_uint16_length
147
- end
148
- end
149
-
150
- context 'valid pre_shared_key binary, ServerHello,' do
151
- let(:extension) do
152
- PreSharedKey.deserialize(TESTBINARY_PRE_SHARED_KEY_SH,
153
- HandshakeType::SERVER_HELLO)
154
- end
155
-
156
- it 'should generate valid object' do
157
- expect(extension.msg_type).to eq HandshakeType::SERVER_HELLO
158
- expect(extension.extension_type).to eq ExtensionType::PRE_SHARED_KEY
159
- end
160
-
161
- it 'should generate valid serializable object' do
162
- expect(extension.serialize)
163
- .to eq ExtensionType::PRE_SHARED_KEY \
164
- + TESTBINARY_PRE_SHARED_KEY_SH.prefix_uint16_length
165
- end
166
- end
167
- end
@@ -1,45 +0,0 @@
1
- # encoding: ascii-8bit
2
- # frozen_string_literal: true
3
-
4
- require_relative 'spec_helper'
5
- using Refinements
6
-
7
- RSpec.describe PskKeyExchangeModes do
8
- context 'valid psk_key_exchange_modes' do
9
- let(:extension) do
10
- PskKeyExchangeModes.new([PskKeyExchangeMode::PSK_KE,
11
- PskKeyExchangeMode::PSK_DHE_KE])
12
- end
13
-
14
- it 'should generate valid psk_key_exchange_modes' do
15
- expect(extension.extension_type)
16
- .to eq ExtensionType::PSK_KEY_EXCHANGE_MODES
17
- expect(extension.ke_modes).to eq [PskKeyExchangeMode::PSK_KE,
18
- PskKeyExchangeMode::PSK_DHE_KE]
19
- expect(extension.serialize)
20
- .to eq ExtensionType::PSK_KEY_EXCHANGE_MODES \
21
- + 3.to_uint16 \
22
- + [PskKeyExchangeMode::PSK_KE,
23
- PskKeyExchangeMode::PSK_DHE_KE].join.prefix_uint8_length
24
- end
25
- end
26
-
27
- context 'valid psk_key_exchange_modes binary' do
28
- let(:extension) do
29
- PskKeyExchangeModes.deserialize(TESTBINARY_PSK_KEY_EXCHANGE_MODES)
30
- end
31
-
32
- it 'should generate valid object' do
33
- expect(extension.extension_type)
34
- .to eq ExtensionType::PSK_KEY_EXCHANGE_MODES
35
- expect(extension.ke_modes).to eq [PskKeyExchangeMode::PSK_KE,
36
- PskKeyExchangeMode::PSK_DHE_KE]
37
- end
38
-
39
- it 'should generate serializable object' do
40
- expect(extension.serialize)
41
- .to eq ExtensionType::PSK_KEY_EXCHANGE_MODES \
42
- + TESTBINARY_PSK_KEY_EXCHANGE_MODES.prefix_uint16_length
43
- end
44
- end
45
- end
@@ -1,61 +0,0 @@
1
- # encoding: ascii-8bit
2
- # frozen_string_literal: true
3
-
4
- require_relative 'spec_helper'
5
- using Refinements
6
-
7
- RSpec.describe RecordSizeLimit do
8
- context 'vailid record_size_limit' do
9
- let(:extension) do
10
- RecordSizeLimit.new(2**14)
11
- end
12
-
13
- it 'should be generated' do
14
- expect(extension.extension_type).to eq ExtensionType::RECORD_SIZE_LIMIT
15
- expect(extension.record_size_limit).to eq 2**14
16
- end
17
-
18
- it 'should be serialized' do
19
- expect(extension.serialize).to eq ExtensionType::RECORD_SIZE_LIMIT \
20
- + 2.to_uint16 \
21
- + (2**14).to_uint16
22
- end
23
- end
24
-
25
- context 'invalid record_size_limit' do
26
- let(:extension) do
27
- RecordSizeLimit.new(63)
28
- end
29
-
30
- it 'should not generated' do
31
- expect { extension }.to raise_error(ErrorAlerts)
32
- end
33
- end
34
-
35
- context 'valid record_size_limit binary' do
36
- let(:extension) do
37
- RecordSizeLimit.deserialize(TESTBINARY_RECORD_SIZE_LIMIT)
38
- end
39
-
40
- it 'should generate valid object' do
41
- expect(extension.extension_type).to eq ExtensionType::RECORD_SIZE_LIMIT
42
- expect(extension.record_size_limit).to eq 2**14
43
- end
44
-
45
- it 'should generate serializable object' do
46
- expect(extension.serialize)
47
- .to eq ExtensionType::RECORD_SIZE_LIMIT \
48
- + TESTBINARY_RECORD_SIZE_LIMIT.prefix_uint16_length
49
- end
50
- end
51
-
52
- context 'invalid record_size_limit binary, too short record_size_limit,' do
53
- let(:extension) do
54
- RecordSizeLimit.deserialize(63.to_uint16)
55
- end
56
-
57
- it 'should not generate object' do
58
- expect { extension }.to raise_error(ErrorAlerts)
59
- end
60
- end
61
- end
data/spec/record_spec.rb DELETED
@@ -1,105 +0,0 @@
1
- # encoding: ascii-8bit
2
- # frozen_string_literal: true
3
-
4
- require_relative 'spec_helper'
5
- using Refinements
6
-
7
- RSpec.describe Record do
8
- context 'valid record' do
9
- let(:record) do
10
- Record.new(
11
- type: ContentType::CCS,
12
- legacy_record_version: ProtocolVersion::TLS_1_2,
13
- messages: [ChangeCipherSpec.new],
14
- cipher: Passer.new
15
- )
16
- end
17
-
18
- it 'should be generated' do
19
- expect(record.type).to eq ContentType::CCS
20
- expect(record.legacy_record_version).to eq ProtocolVersion::TLS_1_2
21
- end
22
-
23
- it 'should be serialized' do
24
- expect(record.serialize).to eq ContentType::CCS \
25
- + ProtocolVersion::TLS_1_2 \
26
- + 1.to_uint16 \
27
- + ChangeCipherSpec.new.serialize
28
- end
29
- end
30
-
31
- context 'valid record binary' do
32
- let(:record) do
33
- Record.deserialize(TESTBINARY_RECORD_CCS, Passer.new).first
34
- end
35
-
36
- it 'should generate valid record header and ChangeCipherSpec' do
37
- expect(record.type).to eq ContentType::CCS
38
- expect(record.legacy_record_version).to eq ProtocolVersion::TLS_1_2
39
- end
40
-
41
- it 'should generate valid serializable object' do
42
- expect(record.serialize).to eq ContentType::CCS \
43
- + ProtocolVersion::TLS_1_2 \
44
- + 1.to_uint16 \
45
- + ChangeCipherSpec.new.serialize
46
- end
47
- end
48
-
49
- context 'invalid record binary, too short,' do
50
- let(:record) do
51
- Record.deserialize(TESTBINARY_RECORD_CCS[0...-1],
52
- Passer.new)
53
- end
54
-
55
- it 'should not generate object' do
56
- expect { record }.to raise_error(ErrorAlerts)
57
- end
58
- end
59
-
60
- context 'invalid record binary, nil,' do
61
- let(:record) do
62
- Record.deserialize(nil, Passer.new)
63
- end
64
-
65
- it 'should not generate object' do
66
- expect { record }.to raise_error(ErrorAlerts)
67
- end
68
- end
69
-
70
- context 'server parameters record binary' do
71
- let(:record) do
72
- cipher = Cryptograph::Aead.new(
73
- cipher_suite: CipherSuite::TLS_AES_128_GCM_SHA256,
74
- write_key: TESTBINARY_SERVER_PARAMETERS_WRITE_KEY,
75
- write_iv: TESTBINARY_SERVER_PARAMETERS_WRITE_IV,
76
- sequence_number: SequenceNumber.new
77
- )
78
- Record.deserialize(TESTBINARY_SERVER_PARAMETERS_RECORD, cipher).first
79
- end
80
-
81
- it 'should generate valid record header' do
82
- expect(record.type).to eq ContentType::APPLICATION_DATA
83
- expect(record.legacy_record_version).to eq ProtocolVersion::TLS_1_2
84
- end
85
-
86
- it 'should generate valid server parameters' do
87
- expect(record.messages[0].msg_type)
88
- .to eq HandshakeType::ENCRYPTED_EXTENSIONS
89
- expect(record.messages[0].serialize)
90
- .to eq TESTBINARY_ENCRYPTED_EXTENSIONS
91
- expect(record.messages[1].msg_type)
92
- .to eq HandshakeType::CERTIFICATE
93
- expect(record.messages[1].serialize)
94
- .to eq TESTBINARY_CERTIFICATE
95
- expect(record.messages[2].msg_type)
96
- .to eq HandshakeType::CERTIFICATE_VERIFY
97
- expect(record.messages[2].serialize)
98
- .to eq TESTBINARY_CERTIFICATE_VERIFY
99
- expect(record.messages[3].msg_type)
100
- .to eq HandshakeType::FINISHED
101
- expect(record.messages[3].serialize)
102
- .to eq TESTBINARY_SERVER_FINISHED
103
- end
104
- end
105
- end