tttls1.3 0.3.6 → 0.3.7
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/.ruby-version +1 -1
- data/lib/tttls1.3/version.rb +1 -1
- data/lib/tttls1.3.rb +1 -0
- data/tttls1.3.gemspec +5 -2
- metadata +3 -113
- data/.github/workflows/ci.yml +0 -39
- data/.gitignore +0 -17
- data/spec/aead_spec.rb +0 -95
- data/spec/alert_spec.rb +0 -54
- data/spec/alpn_spec.rb +0 -55
- data/spec/application_data_spec.rb +0 -26
- data/spec/certificate_spec.rb +0 -82
- data/spec/certificate_verify_spec.rb +0 -51
- data/spec/change_cipher_spec_spec.rb +0 -26
- data/spec/cipher_suites_spec.rb +0 -39
- data/spec/client_hello_spec.rb +0 -105
- data/spec/client_spec.rb +0 -274
- data/spec/compress_certificate_spec.rb +0 -54
- data/spec/cookie_spec.rb +0 -98
- data/spec/early_data_indication_spec.rb +0 -64
- data/spec/ech_outer_extensions_spec.rb +0 -42
- data/spec/ech_spec.rb +0 -122
- data/spec/encrypted_extensions_spec.rb +0 -94
- data/spec/end_of_early_data_spec.rb +0 -28
- data/spec/endpoint_spec.rb +0 -167
- data/spec/error_spec.rb +0 -18
- data/spec/extensions_spec.rb +0 -250
- data/spec/finished_spec.rb +0 -55
- data/spec/fixtures/rsa_ca.crt +0 -18
- data/spec/fixtures/rsa_ca.key +0 -27
- data/spec/fixtures/rsa_rsa.crt +0 -18
- data/spec/fixtures/rsa_rsa.key +0 -27
- data/spec/fixtures/rsa_rsa_ocsp.crt +0 -18
- data/spec/fixtures/rsa_rsa_ocsp.key +0 -27
- data/spec/fixtures/rsa_rsassaPss.crt +0 -20
- data/spec/fixtures/rsa_rsassaPss.key +0 -27
- data/spec/fixtures/rsa_secp256r1.crt +0 -14
- data/spec/fixtures/rsa_secp256r1.key +0 -5
- data/spec/fixtures/rsa_secp384r1.crt +0 -14
- data/spec/fixtures/rsa_secp384r1.key +0 -6
- data/spec/fixtures/rsa_secp521r1.crt +0 -15
- data/spec/fixtures/rsa_secp521r1.key +0 -7
- data/spec/key_schedule_spec.rb +0 -221
- data/spec/key_share_spec.rb +0 -199
- data/spec/new_session_ticket_spec.rb +0 -80
- data/spec/pre_shared_key_spec.rb +0 -167
- data/spec/psk_key_exchange_modes_spec.rb +0 -45
- data/spec/record_size_limit_spec.rb +0 -61
- data/spec/record_spec.rb +0 -105
- data/spec/server_hello_spec.rb +0 -200
- data/spec/server_name_spec.rb +0 -110
- data/spec/server_spec.rb +0 -232
- data/spec/signature_algorithms_cert_spec.rb +0 -77
- data/spec/signature_algorithms_spec.rb +0 -104
- data/spec/spec_helper.rb +0 -990
- data/spec/status_request_spec.rb +0 -140
- data/spec/supported_groups_spec.rb +0 -79
- data/spec/supported_versions_spec.rb +0 -136
- data/spec/transcript_spec.rb +0 -83
- data/spec/unknown_extension_spec.rb +0 -90
- data/spec/utils_spec.rb +0 -235
data/spec/key_share_spec.rb
DELETED
|
@@ -1,199 +0,0 @@
|
|
|
1
|
-
# encoding: ascii-8bit
|
|
2
|
-
# frozen_string_literal: true
|
|
3
|
-
|
|
4
|
-
require_relative 'spec_helper'
|
|
5
|
-
using Refinements
|
|
6
|
-
|
|
7
|
-
RSpec.describe KeyShare do
|
|
8
|
-
context 'valid key_share, KeyShareClientHello,' do
|
|
9
|
-
let(:public_key_secp384r1) do
|
|
10
|
-
"\x04" + OpenSSL::Random.random_bytes(96)
|
|
11
|
-
end
|
|
12
|
-
|
|
13
|
-
let(:public_key_secp256r1) do
|
|
14
|
-
"\x04" + OpenSSL::Random.random_bytes(64)
|
|
15
|
-
end
|
|
16
|
-
|
|
17
|
-
let(:extension) do
|
|
18
|
-
KeyShare.new(
|
|
19
|
-
msg_type: HandshakeType::CLIENT_HELLO,
|
|
20
|
-
key_share_entry: [
|
|
21
|
-
KeyShareEntry.new(
|
|
22
|
-
group: NamedGroup::SECP384R1,
|
|
23
|
-
key_exchange: public_key_secp384r1
|
|
24
|
-
),
|
|
25
|
-
KeyShareEntry.new(
|
|
26
|
-
group: NamedGroup::SECP256R1,
|
|
27
|
-
key_exchange: public_key_secp256r1
|
|
28
|
-
)
|
|
29
|
-
]
|
|
30
|
-
)
|
|
31
|
-
end
|
|
32
|
-
|
|
33
|
-
it 'should be generated' do
|
|
34
|
-
expect(extension.msg_type).to eq HandshakeType::CLIENT_HELLO
|
|
35
|
-
expect(extension.extension_type).to eq ExtensionType::KEY_SHARE
|
|
36
|
-
expect(extension.key_share_entry[0].group).to eq NamedGroup::SECP384R1
|
|
37
|
-
expect(extension.key_share_entry[0].key_exchange)
|
|
38
|
-
.to eq public_key_secp384r1
|
|
39
|
-
expect(extension.key_share_entry[1].group).to eq NamedGroup::SECP256R1
|
|
40
|
-
expect(extension.key_share_entry[1].key_exchange)
|
|
41
|
-
.to eq public_key_secp256r1
|
|
42
|
-
end
|
|
43
|
-
|
|
44
|
-
it 'should be serialized' do
|
|
45
|
-
expect(extension.serialize)
|
|
46
|
-
.to eq ExtensionType::KEY_SHARE \
|
|
47
|
-
+ 172.to_uint16 \
|
|
48
|
-
+ 170.to_uint16 \
|
|
49
|
-
+ NamedGroup::SECP384R1 \
|
|
50
|
-
+ NamedGroup.key_exchange_len(NamedGroup::SECP384R1).to_uint16 \
|
|
51
|
-
+ public_key_secp384r1 \
|
|
52
|
-
+ NamedGroup::SECP256R1 \
|
|
53
|
-
+ NamedGroup.key_exchange_len(NamedGroup::SECP256R1).to_uint16 \
|
|
54
|
-
+ public_key_secp256r1
|
|
55
|
-
end
|
|
56
|
-
end
|
|
57
|
-
|
|
58
|
-
context 'valid key_share, empty KeyShare.client_shares vector' do
|
|
59
|
-
let(:extension) do
|
|
60
|
-
KeyShare.new(
|
|
61
|
-
msg_type: HandshakeType::CLIENT_HELLO,
|
|
62
|
-
key_share_entry: []
|
|
63
|
-
)
|
|
64
|
-
end
|
|
65
|
-
|
|
66
|
-
it 'should be generated' do
|
|
67
|
-
expect(extension.msg_type).to eq HandshakeType::CLIENT_HELLO
|
|
68
|
-
expect(extension.extension_type).to eq ExtensionType::KEY_SHARE
|
|
69
|
-
expect(extension.key_share_entry).to be_empty
|
|
70
|
-
end
|
|
71
|
-
|
|
72
|
-
it 'should be serialized' do
|
|
73
|
-
expect(extension.serialize).to eq ExtensionType::KEY_SHARE \
|
|
74
|
-
+ 2.to_uint16 \
|
|
75
|
-
+ 0.to_uint16
|
|
76
|
-
end
|
|
77
|
-
end
|
|
78
|
-
|
|
79
|
-
context 'valid key_share, KeyShareServerHello,' do
|
|
80
|
-
let(:public_key_secp256r1) do
|
|
81
|
-
"\x04" + OpenSSL::Random.random_bytes(64)
|
|
82
|
-
end
|
|
83
|
-
|
|
84
|
-
let(:extension) do
|
|
85
|
-
KeyShare.new(
|
|
86
|
-
msg_type: HandshakeType::SERVER_HELLO,
|
|
87
|
-
key_share_entry: [
|
|
88
|
-
KeyShareEntry.new(
|
|
89
|
-
group: NamedGroup::SECP256R1,
|
|
90
|
-
key_exchange: public_key_secp256r1
|
|
91
|
-
)
|
|
92
|
-
]
|
|
93
|
-
)
|
|
94
|
-
end
|
|
95
|
-
|
|
96
|
-
it 'should be generated' do
|
|
97
|
-
expect(extension.msg_type).to eq HandshakeType::SERVER_HELLO
|
|
98
|
-
expect(extension.extension_type).to eq ExtensionType::KEY_SHARE
|
|
99
|
-
expect(extension.key_share_entry[0].group).to eq NamedGroup::SECP256R1
|
|
100
|
-
expect(extension.key_share_entry[0].key_exchange)
|
|
101
|
-
.to eq public_key_secp256r1
|
|
102
|
-
end
|
|
103
|
-
|
|
104
|
-
it 'should be serialized' do
|
|
105
|
-
expect(extension.serialize)
|
|
106
|
-
.to eq ExtensionType::KEY_SHARE \
|
|
107
|
-
+ 69.to_uint16 \
|
|
108
|
-
+ NamedGroup::SECP256R1 \
|
|
109
|
-
+ public_key_secp256r1.prefix_uint16_length
|
|
110
|
-
end
|
|
111
|
-
end
|
|
112
|
-
|
|
113
|
-
context 'valid key_share, KeyShareHelloRetryRequest,' do
|
|
114
|
-
let(:extension) do
|
|
115
|
-
KeyShare.new(
|
|
116
|
-
msg_type: HandshakeType::HELLO_RETRY_REQUEST,
|
|
117
|
-
key_share_entry: [
|
|
118
|
-
KeyShareEntry.new(
|
|
119
|
-
group: NamedGroup::SECP256R1,
|
|
120
|
-
key_exchange: nil
|
|
121
|
-
)
|
|
122
|
-
]
|
|
123
|
-
)
|
|
124
|
-
end
|
|
125
|
-
|
|
126
|
-
it 'should be generated' do
|
|
127
|
-
expect(extension.msg_type).to eq HandshakeType::HELLO_RETRY_REQUEST
|
|
128
|
-
expect(extension.extension_type).to eq ExtensionType::KEY_SHARE
|
|
129
|
-
expect(extension.key_share_entry[0].group).to eq NamedGroup::SECP256R1
|
|
130
|
-
expect(extension.key_share_entry[0].key_exchange).to be_empty
|
|
131
|
-
end
|
|
132
|
-
|
|
133
|
-
it 'should be serialized' do
|
|
134
|
-
expect(extension.serialize)
|
|
135
|
-
.to eq ExtensionType::KEY_SHARE \
|
|
136
|
-
+ NamedGroup::SECP256R1.prefix_uint16_length
|
|
137
|
-
end
|
|
138
|
-
end
|
|
139
|
-
|
|
140
|
-
context 'valid key_share binary, KeyShareClientHello,' do
|
|
141
|
-
let(:extension) do
|
|
142
|
-
KeyShare.deserialize(TESTBINARY_KEY_SHARE_CH, HandshakeType::CLIENT_HELLO)
|
|
143
|
-
end
|
|
144
|
-
|
|
145
|
-
it 'should generate valid object' do
|
|
146
|
-
expect(extension.msg_type).to eq HandshakeType::CLIENT_HELLO
|
|
147
|
-
expect(extension.extension_type).to eq ExtensionType::KEY_SHARE
|
|
148
|
-
expect(extension.key_share_entry[0].group).to eq NamedGroup::SECP256R1
|
|
149
|
-
expect(extension.key_share_entry[0].key_exchange.length)
|
|
150
|
-
.to eq NamedGroup.key_exchange_len(NamedGroup::SECP256R1)
|
|
151
|
-
end
|
|
152
|
-
|
|
153
|
-
it 'should generate serializable object' do
|
|
154
|
-
expect(extension.serialize)
|
|
155
|
-
.to eq ExtensionType::KEY_SHARE \
|
|
156
|
-
+ TESTBINARY_KEY_SHARE_CH.prefix_uint16_length
|
|
157
|
-
end
|
|
158
|
-
end
|
|
159
|
-
|
|
160
|
-
context 'valid key_share binary, KeyShareServerHello,' do
|
|
161
|
-
let(:extension) do
|
|
162
|
-
KeyShare.deserialize(TESTBINARY_KEY_SHARE_SH, HandshakeType::SERVER_HELLO)
|
|
163
|
-
end
|
|
164
|
-
|
|
165
|
-
it 'should generate valid object' do
|
|
166
|
-
expect(extension.msg_type).to eq HandshakeType::SERVER_HELLO
|
|
167
|
-
expect(extension.extension_type).to eq ExtensionType::KEY_SHARE
|
|
168
|
-
expect(extension.key_share_entry[0].group).to eq NamedGroup::SECP256R1
|
|
169
|
-
expect(extension.key_share_entry[0].key_exchange.length)
|
|
170
|
-
.to eq NamedGroup.key_exchange_len(NamedGroup::SECP256R1)
|
|
171
|
-
end
|
|
172
|
-
|
|
173
|
-
it 'should generate serializable object' do
|
|
174
|
-
expect(extension.serialize)
|
|
175
|
-
.to eq ExtensionType::KEY_SHARE \
|
|
176
|
-
+ TESTBINARY_KEY_SHARE_SH.prefix_uint16_length
|
|
177
|
-
end
|
|
178
|
-
end
|
|
179
|
-
|
|
180
|
-
context 'valid key_share binary, KeyShareHelloRetryRequest,' do
|
|
181
|
-
let(:extension) do
|
|
182
|
-
KeyShare.deserialize(TESTBINARY_KEY_SHARE_HRR,
|
|
183
|
-
HandshakeType::HELLO_RETRY_REQUEST)
|
|
184
|
-
end
|
|
185
|
-
|
|
186
|
-
it 'should generate valid object' do
|
|
187
|
-
expect(extension.msg_type).to eq HandshakeType::HELLO_RETRY_REQUEST
|
|
188
|
-
expect(extension.extension_type).to eq ExtensionType::KEY_SHARE
|
|
189
|
-
expect(extension.key_share_entry[0].group).to eq NamedGroup::SECP256R1
|
|
190
|
-
expect(extension.key_share_entry[0].key_exchange).to be_empty
|
|
191
|
-
end
|
|
192
|
-
|
|
193
|
-
it 'should generate serializable object' do
|
|
194
|
-
expect(extension.serialize)
|
|
195
|
-
.to eq ExtensionType::KEY_SHARE \
|
|
196
|
-
+ TESTBINARY_KEY_SHARE_HRR.prefix_uint16_length
|
|
197
|
-
end
|
|
198
|
-
end
|
|
199
|
-
end
|
|
@@ -1,80 +0,0 @@
|
|
|
1
|
-
# encoding: ascii-8bit
|
|
2
|
-
# frozen_string_literal: true
|
|
3
|
-
|
|
4
|
-
require_relative 'spec_helper'
|
|
5
|
-
using Refinements
|
|
6
|
-
|
|
7
|
-
RSpec.describe NewSessionTicket do
|
|
8
|
-
context 'new_session_ticket' do
|
|
9
|
-
let(:ticket_lifetime) do
|
|
10
|
-
7200 # two_hours
|
|
11
|
-
end
|
|
12
|
-
|
|
13
|
-
let(:ticket_age_add) do
|
|
14
|
-
OpenSSL::Random.random_bytes(4)
|
|
15
|
-
end
|
|
16
|
-
|
|
17
|
-
let(:ticket_nonce) do
|
|
18
|
-
"\x00" * 255
|
|
19
|
-
end
|
|
20
|
-
|
|
21
|
-
let(:ticket) do
|
|
22
|
-
OpenSSL::Random.random_bytes(255)
|
|
23
|
-
end
|
|
24
|
-
|
|
25
|
-
let(:message) do
|
|
26
|
-
NewSessionTicket.new(ticket_lifetime:,
|
|
27
|
-
ticket_age_add:,
|
|
28
|
-
ticket_nonce:,
|
|
29
|
-
ticket:)
|
|
30
|
-
end
|
|
31
|
-
|
|
32
|
-
it 'should be generated' do
|
|
33
|
-
expect(message.msg_type).to eq HandshakeType::NEW_SESSION_TICKET
|
|
34
|
-
expect(message.ticket_lifetime).to eq ticket_lifetime
|
|
35
|
-
expect(message.ticket_age_add).to eq ticket_age_add
|
|
36
|
-
expect(message.ticket_nonce).to eq ticket_nonce
|
|
37
|
-
expect(message.ticket).to eq ticket
|
|
38
|
-
expect(message.extensions).to be_empty
|
|
39
|
-
end
|
|
40
|
-
|
|
41
|
-
it 'should be serialized' do
|
|
42
|
-
expect(message.serialize).to eq HandshakeType::NEW_SESSION_TICKET \
|
|
43
|
-
+ 523.to_uint24 \
|
|
44
|
-
+ ticket_lifetime.to_uint32 \
|
|
45
|
-
+ ticket_age_add \
|
|
46
|
-
+ ticket_nonce.prefix_uint8_length \
|
|
47
|
-
+ ticket.prefix_uint16_length \
|
|
48
|
-
+ Extensions.new.serialize
|
|
49
|
-
end
|
|
50
|
-
end
|
|
51
|
-
|
|
52
|
-
context 'new_session_ticket, invalid ticket_age_add,' do
|
|
53
|
-
let(:message) do
|
|
54
|
-
NewSessionTicket.new(ticket_lifetime: 60 * 60 * 2, # 2 hours
|
|
55
|
-
ticket_age_add: OpenSSL::Random.random_bytes(32),
|
|
56
|
-
ticket_nonce: "\x00" * 255,
|
|
57
|
-
ticket: OpenSSL::Random.random_bytes(255))
|
|
58
|
-
end
|
|
59
|
-
|
|
60
|
-
it 'should not be generated' do
|
|
61
|
-
expect { message }.to raise_error(ErrorAlerts)
|
|
62
|
-
end
|
|
63
|
-
end
|
|
64
|
-
|
|
65
|
-
context 'valid new_session_ticket binary' do
|
|
66
|
-
let(:message) do
|
|
67
|
-
NewSessionTicket.deserialize(TESTBINARY_NEW_SESSION_TICKET)
|
|
68
|
-
end
|
|
69
|
-
|
|
70
|
-
it 'should generate object' do
|
|
71
|
-
expect(message.msg_type).to eq HandshakeType::NEW_SESSION_TICKET
|
|
72
|
-
expect(message.ticket_lifetime).to eq 30
|
|
73
|
-
expect(message.ticket_nonce).to eq "\x00\x00"
|
|
74
|
-
end
|
|
75
|
-
|
|
76
|
-
it 'should generate serializable object' do
|
|
77
|
-
expect(message.serialize).to eq TESTBINARY_NEW_SESSION_TICKET
|
|
78
|
-
end
|
|
79
|
-
end
|
|
80
|
-
end
|
data/spec/pre_shared_key_spec.rb
DELETED
|
@@ -1,167 +0,0 @@
|
|
|
1
|
-
# encoding: ascii-8bit
|
|
2
|
-
# frozen_string_literal: true
|
|
3
|
-
|
|
4
|
-
require_relative 'spec_helper'
|
|
5
|
-
using Refinements
|
|
6
|
-
|
|
7
|
-
RSpec.describe PreSharedKey do
|
|
8
|
-
context 'valid pre_shared_key of ClientHello' do
|
|
9
|
-
let(:identity) do
|
|
10
|
-
OpenSSL::Random.random_bytes(32)
|
|
11
|
-
end
|
|
12
|
-
|
|
13
|
-
let(:obfuscated_ticket_age) do
|
|
14
|
-
OpenSSL::BN.rand_range(1 << 32).to_i
|
|
15
|
-
end
|
|
16
|
-
|
|
17
|
-
let(:binders) do
|
|
18
|
-
[
|
|
19
|
-
OpenSSL::Random.random_bytes(32)
|
|
20
|
-
]
|
|
21
|
-
end
|
|
22
|
-
|
|
23
|
-
let(:identities) do
|
|
24
|
-
[
|
|
25
|
-
PskIdentity.new(
|
|
26
|
-
identity:,
|
|
27
|
-
obfuscated_ticket_age:
|
|
28
|
-
)
|
|
29
|
-
]
|
|
30
|
-
end
|
|
31
|
-
|
|
32
|
-
let(:offered_psks) do
|
|
33
|
-
OfferedPsks.new(
|
|
34
|
-
identities:,
|
|
35
|
-
binders:
|
|
36
|
-
)
|
|
37
|
-
end
|
|
38
|
-
|
|
39
|
-
let(:extension) do
|
|
40
|
-
PreSharedKey.new(msg_type: HandshakeType::CLIENT_HELLO,
|
|
41
|
-
offered_psks:)
|
|
42
|
-
end
|
|
43
|
-
|
|
44
|
-
it 'should be generated' do
|
|
45
|
-
expect(extension.msg_type).to eq HandshakeType::CLIENT_HELLO
|
|
46
|
-
expect(extension.extension_type).to eq ExtensionType::PRE_SHARED_KEY
|
|
47
|
-
expect(extension.offered_psks).to eq offered_psks
|
|
48
|
-
expect(extension.selected_identity).to be_nil
|
|
49
|
-
end
|
|
50
|
-
|
|
51
|
-
it 'should be serialized' do
|
|
52
|
-
expect(extension.serialize).to eq ExtensionType::PRE_SHARED_KEY \
|
|
53
|
-
+ 75.to_uint16 \
|
|
54
|
-
+ 38.to_uint16 \
|
|
55
|
-
+ 32.to_uint16 \
|
|
56
|
-
+ identity \
|
|
57
|
-
+ obfuscated_ticket_age.to_uint32 \
|
|
58
|
-
+ 33.to_uint16 \
|
|
59
|
-
+ "\x20" \
|
|
60
|
-
+ binders.join
|
|
61
|
-
end
|
|
62
|
-
end
|
|
63
|
-
|
|
64
|
-
context 'valid pre_shared_key, ClientHello,' do
|
|
65
|
-
let(:identity_1) do
|
|
66
|
-
OpenSSL::Random.random_bytes(32)
|
|
67
|
-
end
|
|
68
|
-
let(:identity_2) do
|
|
69
|
-
OpenSSL::Random.random_bytes(32)
|
|
70
|
-
end
|
|
71
|
-
|
|
72
|
-
let(:obfuscated_ticket_age_1) do
|
|
73
|
-
OpenSSL::BN.rand_range(1 << 32).to_i
|
|
74
|
-
end
|
|
75
|
-
let(:obfuscated_ticket_age_2) do
|
|
76
|
-
OpenSSL::BN.rand_range(1 << 32).to_i
|
|
77
|
-
end
|
|
78
|
-
|
|
79
|
-
let(:binders) do
|
|
80
|
-
[
|
|
81
|
-
OpenSSL::Random.random_bytes(32),
|
|
82
|
-
OpenSSL::Random.random_bytes(32)
|
|
83
|
-
]
|
|
84
|
-
end
|
|
85
|
-
|
|
86
|
-
let(:identities) do
|
|
87
|
-
[
|
|
88
|
-
PskIdentity.new(
|
|
89
|
-
identity: identity_1,
|
|
90
|
-
obfuscated_ticket_age: obfuscated_ticket_age_1
|
|
91
|
-
),
|
|
92
|
-
PskIdentity.new(
|
|
93
|
-
identity: identity_2,
|
|
94
|
-
obfuscated_ticket_age: obfuscated_ticket_age_2
|
|
95
|
-
)
|
|
96
|
-
]
|
|
97
|
-
end
|
|
98
|
-
|
|
99
|
-
let(:offered_psks) do
|
|
100
|
-
OfferedPsks.new(
|
|
101
|
-
identities:,
|
|
102
|
-
binders:
|
|
103
|
-
)
|
|
104
|
-
end
|
|
105
|
-
|
|
106
|
-
let(:extension) do
|
|
107
|
-
PreSharedKey.new(msg_type: HandshakeType::CLIENT_HELLO,
|
|
108
|
-
offered_psks:)
|
|
109
|
-
end
|
|
110
|
-
|
|
111
|
-
it 'should be generated' do
|
|
112
|
-
expect(extension.msg_type).to eq HandshakeType::CLIENT_HELLO
|
|
113
|
-
expect(extension.extension_type).to eq ExtensionType::PRE_SHARED_KEY
|
|
114
|
-
expect(extension.offered_psks).to eq offered_psks
|
|
115
|
-
expect(extension.selected_identity).to be_nil
|
|
116
|
-
end
|
|
117
|
-
|
|
118
|
-
it 'should be serialized' do
|
|
119
|
-
expect(extension.serialize).to eq ExtensionType::PRE_SHARED_KEY \
|
|
120
|
-
+ 146.to_uint16 \
|
|
121
|
-
+ 76.to_uint16 \
|
|
122
|
-
+ identity_1.prefix_uint16_length \
|
|
123
|
-
+ obfuscated_ticket_age_1.to_uint32 \
|
|
124
|
-
+ identity_2.prefix_uint16_length \
|
|
125
|
-
+ obfuscated_ticket_age_2.to_uint32 \
|
|
126
|
-
+ 66.to_uint16 \
|
|
127
|
-
+ binders[0].prefix_uint8_length \
|
|
128
|
-
+ binders[1].prefix_uint8_length
|
|
129
|
-
end
|
|
130
|
-
end
|
|
131
|
-
|
|
132
|
-
context 'valid pre_shared_key binary, ClientHello,' do
|
|
133
|
-
let(:extension) do
|
|
134
|
-
PreSharedKey.deserialize(TESTBINARY_PRE_SHARED_KEY_CH,
|
|
135
|
-
HandshakeType::CLIENT_HELLO)
|
|
136
|
-
end
|
|
137
|
-
|
|
138
|
-
it 'should generate valid object' do
|
|
139
|
-
expect(extension.msg_type).to eq HandshakeType::CLIENT_HELLO
|
|
140
|
-
expect(extension.extension_type).to eq ExtensionType::PRE_SHARED_KEY
|
|
141
|
-
end
|
|
142
|
-
|
|
143
|
-
it 'should generate valid serializable object' do
|
|
144
|
-
expect(extension.serialize)
|
|
145
|
-
.to eq ExtensionType::PRE_SHARED_KEY \
|
|
146
|
-
+ TESTBINARY_PRE_SHARED_KEY_CH.prefix_uint16_length
|
|
147
|
-
end
|
|
148
|
-
end
|
|
149
|
-
|
|
150
|
-
context 'valid pre_shared_key binary, ServerHello,' do
|
|
151
|
-
let(:extension) do
|
|
152
|
-
PreSharedKey.deserialize(TESTBINARY_PRE_SHARED_KEY_SH,
|
|
153
|
-
HandshakeType::SERVER_HELLO)
|
|
154
|
-
end
|
|
155
|
-
|
|
156
|
-
it 'should generate valid object' do
|
|
157
|
-
expect(extension.msg_type).to eq HandshakeType::SERVER_HELLO
|
|
158
|
-
expect(extension.extension_type).to eq ExtensionType::PRE_SHARED_KEY
|
|
159
|
-
end
|
|
160
|
-
|
|
161
|
-
it 'should generate valid serializable object' do
|
|
162
|
-
expect(extension.serialize)
|
|
163
|
-
.to eq ExtensionType::PRE_SHARED_KEY \
|
|
164
|
-
+ TESTBINARY_PRE_SHARED_KEY_SH.prefix_uint16_length
|
|
165
|
-
end
|
|
166
|
-
end
|
|
167
|
-
end
|
|
@@ -1,45 +0,0 @@
|
|
|
1
|
-
# encoding: ascii-8bit
|
|
2
|
-
# frozen_string_literal: true
|
|
3
|
-
|
|
4
|
-
require_relative 'spec_helper'
|
|
5
|
-
using Refinements
|
|
6
|
-
|
|
7
|
-
RSpec.describe PskKeyExchangeModes do
|
|
8
|
-
context 'valid psk_key_exchange_modes' do
|
|
9
|
-
let(:extension) do
|
|
10
|
-
PskKeyExchangeModes.new([PskKeyExchangeMode::PSK_KE,
|
|
11
|
-
PskKeyExchangeMode::PSK_DHE_KE])
|
|
12
|
-
end
|
|
13
|
-
|
|
14
|
-
it 'should generate valid psk_key_exchange_modes' do
|
|
15
|
-
expect(extension.extension_type)
|
|
16
|
-
.to eq ExtensionType::PSK_KEY_EXCHANGE_MODES
|
|
17
|
-
expect(extension.ke_modes).to eq [PskKeyExchangeMode::PSK_KE,
|
|
18
|
-
PskKeyExchangeMode::PSK_DHE_KE]
|
|
19
|
-
expect(extension.serialize)
|
|
20
|
-
.to eq ExtensionType::PSK_KEY_EXCHANGE_MODES \
|
|
21
|
-
+ 3.to_uint16 \
|
|
22
|
-
+ [PskKeyExchangeMode::PSK_KE,
|
|
23
|
-
PskKeyExchangeMode::PSK_DHE_KE].join.prefix_uint8_length
|
|
24
|
-
end
|
|
25
|
-
end
|
|
26
|
-
|
|
27
|
-
context 'valid psk_key_exchange_modes binary' do
|
|
28
|
-
let(:extension) do
|
|
29
|
-
PskKeyExchangeModes.deserialize(TESTBINARY_PSK_KEY_EXCHANGE_MODES)
|
|
30
|
-
end
|
|
31
|
-
|
|
32
|
-
it 'should generate valid object' do
|
|
33
|
-
expect(extension.extension_type)
|
|
34
|
-
.to eq ExtensionType::PSK_KEY_EXCHANGE_MODES
|
|
35
|
-
expect(extension.ke_modes).to eq [PskKeyExchangeMode::PSK_KE,
|
|
36
|
-
PskKeyExchangeMode::PSK_DHE_KE]
|
|
37
|
-
end
|
|
38
|
-
|
|
39
|
-
it 'should generate serializable object' do
|
|
40
|
-
expect(extension.serialize)
|
|
41
|
-
.to eq ExtensionType::PSK_KEY_EXCHANGE_MODES \
|
|
42
|
-
+ TESTBINARY_PSK_KEY_EXCHANGE_MODES.prefix_uint16_length
|
|
43
|
-
end
|
|
44
|
-
end
|
|
45
|
-
end
|
|
@@ -1,61 +0,0 @@
|
|
|
1
|
-
# encoding: ascii-8bit
|
|
2
|
-
# frozen_string_literal: true
|
|
3
|
-
|
|
4
|
-
require_relative 'spec_helper'
|
|
5
|
-
using Refinements
|
|
6
|
-
|
|
7
|
-
RSpec.describe RecordSizeLimit do
|
|
8
|
-
context 'vailid record_size_limit' do
|
|
9
|
-
let(:extension) do
|
|
10
|
-
RecordSizeLimit.new(2**14)
|
|
11
|
-
end
|
|
12
|
-
|
|
13
|
-
it 'should be generated' do
|
|
14
|
-
expect(extension.extension_type).to eq ExtensionType::RECORD_SIZE_LIMIT
|
|
15
|
-
expect(extension.record_size_limit).to eq 2**14
|
|
16
|
-
end
|
|
17
|
-
|
|
18
|
-
it 'should be serialized' do
|
|
19
|
-
expect(extension.serialize).to eq ExtensionType::RECORD_SIZE_LIMIT \
|
|
20
|
-
+ 2.to_uint16 \
|
|
21
|
-
+ (2**14).to_uint16
|
|
22
|
-
end
|
|
23
|
-
end
|
|
24
|
-
|
|
25
|
-
context 'invalid record_size_limit' do
|
|
26
|
-
let(:extension) do
|
|
27
|
-
RecordSizeLimit.new(63)
|
|
28
|
-
end
|
|
29
|
-
|
|
30
|
-
it 'should not generated' do
|
|
31
|
-
expect { extension }.to raise_error(ErrorAlerts)
|
|
32
|
-
end
|
|
33
|
-
end
|
|
34
|
-
|
|
35
|
-
context 'valid record_size_limit binary' do
|
|
36
|
-
let(:extension) do
|
|
37
|
-
RecordSizeLimit.deserialize(TESTBINARY_RECORD_SIZE_LIMIT)
|
|
38
|
-
end
|
|
39
|
-
|
|
40
|
-
it 'should generate valid object' do
|
|
41
|
-
expect(extension.extension_type).to eq ExtensionType::RECORD_SIZE_LIMIT
|
|
42
|
-
expect(extension.record_size_limit).to eq 2**14
|
|
43
|
-
end
|
|
44
|
-
|
|
45
|
-
it 'should generate serializable object' do
|
|
46
|
-
expect(extension.serialize)
|
|
47
|
-
.to eq ExtensionType::RECORD_SIZE_LIMIT \
|
|
48
|
-
+ TESTBINARY_RECORD_SIZE_LIMIT.prefix_uint16_length
|
|
49
|
-
end
|
|
50
|
-
end
|
|
51
|
-
|
|
52
|
-
context 'invalid record_size_limit binary, too short record_size_limit,' do
|
|
53
|
-
let(:extension) do
|
|
54
|
-
RecordSizeLimit.deserialize(63.to_uint16)
|
|
55
|
-
end
|
|
56
|
-
|
|
57
|
-
it 'should not generate object' do
|
|
58
|
-
expect { extension }.to raise_error(ErrorAlerts)
|
|
59
|
-
end
|
|
60
|
-
end
|
|
61
|
-
end
|
data/spec/record_spec.rb
DELETED
|
@@ -1,105 +0,0 @@
|
|
|
1
|
-
# encoding: ascii-8bit
|
|
2
|
-
# frozen_string_literal: true
|
|
3
|
-
|
|
4
|
-
require_relative 'spec_helper'
|
|
5
|
-
using Refinements
|
|
6
|
-
|
|
7
|
-
RSpec.describe Record do
|
|
8
|
-
context 'valid record' do
|
|
9
|
-
let(:record) do
|
|
10
|
-
Record.new(
|
|
11
|
-
type: ContentType::CCS,
|
|
12
|
-
legacy_record_version: ProtocolVersion::TLS_1_2,
|
|
13
|
-
messages: [ChangeCipherSpec.new],
|
|
14
|
-
cipher: Passer.new
|
|
15
|
-
)
|
|
16
|
-
end
|
|
17
|
-
|
|
18
|
-
it 'should be generated' do
|
|
19
|
-
expect(record.type).to eq ContentType::CCS
|
|
20
|
-
expect(record.legacy_record_version).to eq ProtocolVersion::TLS_1_2
|
|
21
|
-
end
|
|
22
|
-
|
|
23
|
-
it 'should be serialized' do
|
|
24
|
-
expect(record.serialize).to eq ContentType::CCS \
|
|
25
|
-
+ ProtocolVersion::TLS_1_2 \
|
|
26
|
-
+ 1.to_uint16 \
|
|
27
|
-
+ ChangeCipherSpec.new.serialize
|
|
28
|
-
end
|
|
29
|
-
end
|
|
30
|
-
|
|
31
|
-
context 'valid record binary' do
|
|
32
|
-
let(:record) do
|
|
33
|
-
Record.deserialize(TESTBINARY_RECORD_CCS, Passer.new).first
|
|
34
|
-
end
|
|
35
|
-
|
|
36
|
-
it 'should generate valid record header and ChangeCipherSpec' do
|
|
37
|
-
expect(record.type).to eq ContentType::CCS
|
|
38
|
-
expect(record.legacy_record_version).to eq ProtocolVersion::TLS_1_2
|
|
39
|
-
end
|
|
40
|
-
|
|
41
|
-
it 'should generate valid serializable object' do
|
|
42
|
-
expect(record.serialize).to eq ContentType::CCS \
|
|
43
|
-
+ ProtocolVersion::TLS_1_2 \
|
|
44
|
-
+ 1.to_uint16 \
|
|
45
|
-
+ ChangeCipherSpec.new.serialize
|
|
46
|
-
end
|
|
47
|
-
end
|
|
48
|
-
|
|
49
|
-
context 'invalid record binary, too short,' do
|
|
50
|
-
let(:record) do
|
|
51
|
-
Record.deserialize(TESTBINARY_RECORD_CCS[0...-1],
|
|
52
|
-
Passer.new)
|
|
53
|
-
end
|
|
54
|
-
|
|
55
|
-
it 'should not generate object' do
|
|
56
|
-
expect { record }.to raise_error(ErrorAlerts)
|
|
57
|
-
end
|
|
58
|
-
end
|
|
59
|
-
|
|
60
|
-
context 'invalid record binary, nil,' do
|
|
61
|
-
let(:record) do
|
|
62
|
-
Record.deserialize(nil, Passer.new)
|
|
63
|
-
end
|
|
64
|
-
|
|
65
|
-
it 'should not generate object' do
|
|
66
|
-
expect { record }.to raise_error(ErrorAlerts)
|
|
67
|
-
end
|
|
68
|
-
end
|
|
69
|
-
|
|
70
|
-
context 'server parameters record binary' do
|
|
71
|
-
let(:record) do
|
|
72
|
-
cipher = Cryptograph::Aead.new(
|
|
73
|
-
cipher_suite: CipherSuite::TLS_AES_128_GCM_SHA256,
|
|
74
|
-
write_key: TESTBINARY_SERVER_PARAMETERS_WRITE_KEY,
|
|
75
|
-
write_iv: TESTBINARY_SERVER_PARAMETERS_WRITE_IV,
|
|
76
|
-
sequence_number: SequenceNumber.new
|
|
77
|
-
)
|
|
78
|
-
Record.deserialize(TESTBINARY_SERVER_PARAMETERS_RECORD, cipher).first
|
|
79
|
-
end
|
|
80
|
-
|
|
81
|
-
it 'should generate valid record header' do
|
|
82
|
-
expect(record.type).to eq ContentType::APPLICATION_DATA
|
|
83
|
-
expect(record.legacy_record_version).to eq ProtocolVersion::TLS_1_2
|
|
84
|
-
end
|
|
85
|
-
|
|
86
|
-
it 'should generate valid server parameters' do
|
|
87
|
-
expect(record.messages[0].msg_type)
|
|
88
|
-
.to eq HandshakeType::ENCRYPTED_EXTENSIONS
|
|
89
|
-
expect(record.messages[0].serialize)
|
|
90
|
-
.to eq TESTBINARY_ENCRYPTED_EXTENSIONS
|
|
91
|
-
expect(record.messages[1].msg_type)
|
|
92
|
-
.to eq HandshakeType::CERTIFICATE
|
|
93
|
-
expect(record.messages[1].serialize)
|
|
94
|
-
.to eq TESTBINARY_CERTIFICATE
|
|
95
|
-
expect(record.messages[2].msg_type)
|
|
96
|
-
.to eq HandshakeType::CERTIFICATE_VERIFY
|
|
97
|
-
expect(record.messages[2].serialize)
|
|
98
|
-
.to eq TESTBINARY_CERTIFICATE_VERIFY
|
|
99
|
-
expect(record.messages[3].msg_type)
|
|
100
|
-
.to eq HandshakeType::FINISHED
|
|
101
|
-
expect(record.messages[3].serialize)
|
|
102
|
-
.to eq TESTBINARY_SERVER_FINISHED
|
|
103
|
-
end
|
|
104
|
-
end
|
|
105
|
-
end
|