Mercurial > hg > nginx-tests
view ssl_curve.t @ 1942:00124c7d0ef1
Tests: made sure migrated QUIC connection didn't get stall.
While working on connection migration patches, it was observed that
connections could easly stuck due to bugs in bytes in-flight accounting.
Added a simple test to make sure more data can be sent after confirming
a client's ownership of its new address.
author | Sergey Kandaurov <pluknet@nginx.com> |
---|---|
date | Mon, 11 Dec 2023 14:13:03 +0400 |
parents | 2a0a6035a1af |
children |
line wrap: on
line source
#!/usr/bin/perl # (C) Sergey Kandaurov # (C) Nginx, Inc. # Tests for http ssl module, $ssl_curve variable. ############################################################################### use warnings; use strict; use Test::More; BEGIN { use FindBin; chdir($FindBin::Bin); } use lib 'lib'; use Test::Nginx; ############################################################################### select STDERR; $| = 1; select STDOUT; $| = 1; my $t = Test::Nginx->new() ->has(qw/http http_ssl rewrite socket_ssl/) ->has_daemon('openssl'); $t->write_file_expand('nginx.conf', <<'EOF'); %%TEST_GLOBALS%% daemon off; events { } http { %%TEST_GLOBALS_HTTP%% ssl_certificate_key localhost.key; ssl_certificate localhost.crt; ssl_ecdh_curve prime256v1; server { listen 127.0.0.1:8443 ssl; server_name localhost; return 200 "$ssl_curve $ssl_curves"; } } EOF $t->write_file('openssl.conf', <<EOF); [ req ] default_bits = 2048 encrypt_key = no distinguished_name = req_distinguished_name [ req_distinguished_name ] EOF my $d = $t->testdir(); foreach my $name ('localhost') { system('openssl req -x509 -new ' . "-config $d/openssl.conf -subj /CN=$name/ " . "-out $d/$name.crt -keyout $d/$name.key " . ">>$d/openssl.out 2>&1") == 0 or die "Can't create certificate for $name: $!\n"; } $t->run()->plan(1); ############################################################################### local $TODO = 'OpenSSL too old' unless $t->has_feature('openssl:3.0.0') or $t->has_module('BoringSSL'); like(http_get('/curve', SSL => 1), qr/^prime256v1 /m, 'ssl curve'); ###############################################################################