Skip to content

Commit d3e579a

Browse files
committed
fix: Config.Time in tests using expired certificates
Adopted from golang/go@d1d9312
1 parent 90dd94c commit d3e579a

4 files changed

+23
-11
lines changed

tls/handshake_client_test.go

+15-8
Original file line numberDiff line numberDiff line change
@@ -886,6 +886,7 @@ func testResumption(t *testing.T, version uint16) {
886886
MaxVersion: version,
887887
CipherSuites: []uint16{TLS_RSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA},
888888
Certificates: testConfig.Certificates,
889+
Time: testTime,
889890
}
890891

891892
issuer, err := x509.ParseCertificate(testRSACertificateIssuer)
@@ -902,6 +903,7 @@ func testResumption(t *testing.T, version uint16) {
902903
ClientSessionCache: NewLRUClientSessionCache(32),
903904
RootCAs: rootCAs,
904905
ServerName: "example.golang",
906+
Time: testTime,
905907
}
906908

907909
testResumeState := func(test string, didResume bool) {
@@ -949,20 +951,20 @@ func testResumption(t *testing.T, version uint16) {
949951
}
950952

951953
// An old session ticket can resume, but the server will provide a ticket encrypted with a fresh key.
952-
serverConfig.Time = func() time.Time { return time.Now().Add(24*time.Hour + time.Minute) }
954+
serverConfig.Time = func() time.Time { return testTime().Add(24*time.Hour + time.Minute) }
953955
testResumeState("ResumeWithOldTicket", true)
954956
if bytes.Equal(ticket[:ticketKeyNameLen], getTicket()[:ticketKeyNameLen]) {
955957
t.Fatal("old first ticket matches the fresh one")
956958
}
957959

958960
// Now the session tickey key is expired, so a full handshake should occur.
959-
serverConfig.Time = func() time.Time { return time.Now().Add(24*8*time.Hour + time.Minute) }
961+
serverConfig.Time = func() time.Time { return testTime().Add(24*8*time.Hour + time.Minute) }
960962
testResumeState("ResumeWithExpiredTicket", false)
961963
if bytes.Equal(ticket, getTicket()) {
962964
t.Fatal("expired first ticket matches the fresh one")
963965
}
964966

965-
serverConfig.Time = func() time.Time { return time.Now() } // reset the time back
967+
serverConfig.Time = testTime // reset the time back
966968
key1 := randomKey()
967969
serverConfig.SetSessionTicketKeys([][32]byte{key1})
968970

@@ -979,11 +981,11 @@ func testResumption(t *testing.T, version uint16) {
979981
testResumeState("KeyChangeFinish", true)
980982

981983
// Age the session ticket a bit, but not yet expired.
982-
serverConfig.Time = func() time.Time { return time.Now().Add(24*time.Hour + time.Minute) }
984+
serverConfig.Time = func() time.Time { return testTime().Add(24*time.Hour + time.Minute) }
983985
testResumeState("OldSessionTicket", true)
984986
ticket = getTicket()
985987
// Expire the session ticket, which would force a full handshake.
986-
serverConfig.Time = func() time.Time { return time.Now().Add(24*8*time.Hour + time.Minute) }
988+
serverConfig.Time = func() time.Time { return testTime().Add(24*8*time.Hour + 2*time.Minute) }
987989
testResumeState("ExpiredSessionTicket", false)
988990
if bytes.Equal(ticket, getTicket()) {
989991
t.Fatal("new ticket wasn't provided after old ticket expired")
@@ -993,15 +995,15 @@ func testResumption(t *testing.T, version uint16) {
993995
d := 0 * time.Hour
994996
for i := 0; i < 13; i++ {
995997
d += 12 * time.Hour
996-
serverConfig.Time = func() time.Time { return time.Now().Add(d) }
998+
serverConfig.Time = func() time.Time { return testTime().Add(d) }
997999
testResumeState("OldSessionTicket", true)
9981000
}
9991001
// Expire it (now a little more than 7 days) and make sure a full
10001002
// handshake occurs for TLS 1.2. Resumption should still occur for
10011003
// TLS 1.3 since the client should be using a fresh ticket sent over
10021004
// by the server.
1003-
d += 12 * time.Hour
1004-
serverConfig.Time = func() time.Time { return time.Now().Add(d) }
1005+
d += 12*time.Hour + 1*time.Minute
1006+
serverConfig.Time = func() time.Time { return testTime().Add(d) }
10051007
if version == VersionTLS13 {
10061008
testResumeState("ExpiredSessionTicket", true)
10071009
} else {
@@ -1017,6 +1019,7 @@ func testResumption(t *testing.T, version uint16) {
10171019
MaxVersion: version,
10181020
CipherSuites: []uint16{TLS_RSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA},
10191021
Certificates: testConfig.Certificates,
1022+
Time: testTime,
10201023
}
10211024
serverConfig.SetSessionTicketKeys([][32]byte{key2})
10221025

@@ -1655,6 +1658,7 @@ func testVerifyConnection(t *testing.T, version uint16) {
16551658
Certificates: []Certificate{testConfig.Certificates[0]},
16561659
ClientCAs: rootCAs,
16571660
NextProtos: []string{"protocol1"},
1661+
Time: testTime,
16581662
}
16591663
serverConfig.Certificates[0].SignedCertificateTimestamps = [][]byte{[]byte("dummy sct 1"), []byte("dummy sct 2")}
16601664
serverConfig.Certificates[0].OCSPStaple = []byte("dummy ocsp")
@@ -1667,6 +1671,7 @@ func testVerifyConnection(t *testing.T, version uint16) {
16671671
ServerName: "example.golang",
16681672
Certificates: []Certificate{testConfig.Certificates[0]},
16691673
NextProtos: []string{"protocol1"},
1674+
Time: testTime,
16701675
}
16711676
test.configureClient(clientConfig, &clientCalled)
16721677

@@ -2465,11 +2470,13 @@ func testResumptionKeepsOCSPAndSCT(t *testing.T, ver uint16) {
24652470
ClientSessionCache: NewLRUClientSessionCache(32),
24662471
ServerName: "example.golang",
24672472
RootCAs: roots,
2473+
Time: testTime,
24682474
}
24692475
serverConfig := testConfig.Clone()
24702476
serverConfig.MaxVersion = ver
24712477
serverConfig.Certificates[0].OCSPStaple = []byte{1, 2, 3}
24722478
serverConfig.Certificates[0].SignedCertificateTimestamps = [][]byte{{4, 5, 6}}
2479+
serverConfig.Time = testTime
24732480

24742481
_, ccs, err := testHandshake(t, clientConfig, serverConfig)
24752482
if err != nil {

tls/handshake_server_test.go

+2
Original file line numberDiff line numberDiff line change
@@ -462,12 +462,14 @@ func testCrossVersionResume(t *testing.T, version uint16) {
462462
serverConfig := &Config{
463463
CipherSuites: []uint16{TLS_RSA_WITH_AES_128_CBC_SHA},
464464
Certificates: testConfig.Certificates,
465+
Time: testTime,
465466
}
466467
clientConfig := &Config{
467468
CipherSuites: []uint16{TLS_RSA_WITH_AES_128_CBC_SHA},
468469
InsecureSkipVerify: true,
469470
ClientSessionCache: NewLRUClientSessionCache(1),
470471
ServerName: "servername",
472+
Time: testTime,
471473
}
472474

473475
// Establish a session at TLS 1.1.

tls/handshake_test.go

+5
Original file line numberDiff line numberDiff line change
@@ -435,6 +435,11 @@ func fromHex(s string) []byte {
435435
return b
436436
}
437437

438+
// testTime is 2016-10-20T17:32:09.000Z, which is within the validity period of
439+
// [testRSACertificate], [testRSACertificateIssuer], [testRSA2048Certificate],
440+
// [testRSA2048CertificateIssuer], and [testECDSACertificate].
441+
var testTime = func() time.Time { return time.Unix(1476984729, 0) }
442+
438443
var testRSACertificate = fromHex("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")
439444

440445
var testRSACertificateIssuer = fromHex("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")

tls/tls_test.go

+1-3
Original file line numberDiff line numberDiff line change
@@ -1069,8 +1069,6 @@ func TestConnectionState(t *testing.T) {
10691069
rootCAs := x509.NewCertPool()
10701070
rootCAs.AddCert(issuer)
10711071

1072-
now := func() time.Time { return time.Unix(1476984729, 0) }
1073-
10741072
const alpnProtocol = "golang"
10751073
const serverName = "example.golang"
10761074
var scts = [][]byte{[]byte("dummy sct 1"), []byte("dummy sct 2")}
@@ -1086,7 +1084,7 @@ func TestConnectionState(t *testing.T) {
10861084
}
10871085
t.Run(name, func(t *testing.T) {
10881086
config := &Config{
1089-
Time: now,
1087+
Time: testTime,
10901088
Rand: zeroSource{},
10911089
Certificates: make([]Certificate, 1),
10921090
MaxVersion: v,

0 commit comments

Comments
 (0)