# HG changeset patch # User Sergey Kandaurov # Date 1686667390 -14400 # Node ID 2c5ae1e75db4c63335ed1bdc7cefea26b5e76f3b # Parent e0b53fbdb5cf0eb18df408a04d8f604dbb77b72e Tests: tests for TLSv1.3 ciphers in QUIC connections. diff --git a/quic_ciphers.t b/quic_ciphers.t new file mode 100644 --- /dev/null +++ b/quic_ciphers.t @@ -0,0 +1,109 @@ +#!/usr/bin/perl + +# (C) Sergey Kandaurov +# (C) Nginx, Inc. + +# Tests for various TLSv1.3 ciphers in QUIC. + +############################################################################### + +use warnings; +use strict; + +use Test::More; + +BEGIN { use FindBin; chdir($FindBin::Bin); } + +use lib 'lib'; +use Test::Nginx; +use Test::Nginx::HTTP3; + +############################################################################### + +select STDERR; $| = 1; +select STDOUT; $| = 1; + +my $t = Test::Nginx->new()->has(qw/http http_v3 cryptx/) + ->has_daemon('openssl')->plan(5); + +$t->write_file_expand('nginx.conf', <<'EOF'); + +%%TEST_GLOBALS%% + +daemon off; + +events { +} + +http { + %%TEST_GLOBALS_HTTP%% + + ssl_certificate_key localhost.key; + ssl_certificate localhost.crt; + + server { + listen 127.0.0.1:%%PORT_8980_UDP%% quic; + server_name localhost; + + location / { + add_header x-cipher $ssl_cipher; + add_header x-ciphers $ssl_ciphers; + } + } +} + +EOF + +$t->write_file('openssl.conf', <testdir(); + +foreach my $name ('localhost') { + system('openssl req -x509 -new ' + . "-config $d/openssl.conf -subj /CN=$name/ " + . "-out $d/$name.crt -keyout $d/$name.key " + . ">>$d/openssl.out 2>&1") == 0 + or die "Can't create certificate for $name: $!\n"; +} + +$t->write_file('index.html', ''); +$t->run(); + +############################################################################### + +my ($s, $sid, $frames, $frame); + +is(get("\x13\x01"), 'TLS_AES_128_GCM_SHA256', 'TLS_AES_128_GCM_SHA256'); +is(get("\x13\x02"), 'TLS_AES_256_GCM_SHA384', 'TLS_AES_256_GCM_SHA384'); +is(get("\x13\x03"), 'TLS_CHACHA20_POLY1305_SHA256', + 'TLS_CHACHA20_POLY1305_SHA256'); + +# TLS_AES_256_GCM_SHA384:TLS_AES_128_GCM_SHA256 + +is(get("\x13\x02\x13\x01"), 'TLS_AES_256_GCM_SHA384', 'ciphers many'); + +TODO: { +local $TODO = 'CCM cipher disabled'; + +is(get("\x13\x04\x13\x01"), 'TLS_AES_128_CCM_SHA256', 'TLS_AES_128_CCM_SHA256'); + +} + +############################################################################### + +sub get { + my ($ciphers) = @_; + my $s = Test::Nginx::HTTP3->new(8980, ciphers => $ciphers); + my $frames = $s->read(all => [{ sid => $s->new_stream(), fin => 1 }]); + + ($frame) = grep { $_->{type} eq "HEADERS" } @$frames; + return $frame->{headers}->{'x-cipher'}; +} + +###############################################################################