Skip to content

Commit 3417000

Browse files
FiloSottileprattmic
authored andcommitted
[release-branch.go1.23] crypto/tls: fix Config.Time in tests using expired certificates
Updates #71077 Fixes #71104 Change-Id: I6a6a465685f3bd50a5bb35a160f87b59b74fa6af Reviewed-on: https://go-review.googlesource.com/c/go/+/639655 Auto-Submit: Ian Lance Taylor <[email protected]> Reviewed-by: Damien Neil <[email protected]> LUCI-TryBot-Result: Go LUCI <[email protected]> Auto-Submit: Filippo Valsorda <[email protected]> Auto-Submit: Damien Neil <[email protected]> Reviewed-by: Joel Sing <[email protected]> Reviewed-by: Ian Lance Taylor <[email protected]> Reviewed-on: https://go-review.googlesource.com/c/go/+/640315 Reviewed-by: Filippo Valsorda <[email protected]>
1 parent 1576793 commit 3417000

File tree

4 files changed

+27
-16
lines changed

4 files changed

+27
-16
lines changed

src/crypto/tls/handshake_client_test.go

Lines changed: 18 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -852,6 +852,7 @@ func testResumption(t *testing.T, version uint16) {
852852
MaxVersion: version,
853853
CipherSuites: []uint16{TLS_RSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA},
854854
Certificates: testConfig.Certificates,
855+
Time: testTime,
855856
}
856857

857858
issuer, err := x509.ParseCertificate(testRSACertificateIssuer)
@@ -868,6 +869,7 @@ func testResumption(t *testing.T, version uint16) {
868869
ClientSessionCache: NewLRUClientSessionCache(32),
869870
RootCAs: rootCAs,
870871
ServerName: "example.golang",
872+
Time: testTime,
871873
}
872874

873875
testResumeState := func(test string, didResume bool) {
@@ -914,21 +916,21 @@ func testResumption(t *testing.T, version uint16) {
914916

915917
// An old session ticket is replaced with a ticket encrypted with a fresh key.
916918
ticket = getTicket()
917-
serverConfig.Time = func() time.Time { return time.Now().Add(24*time.Hour + time.Minute) }
919+
serverConfig.Time = func() time.Time { return testTime().Add(24*time.Hour + time.Minute) }
918920
testResumeState("ResumeWithOldTicket", true)
919921
if bytes.Equal(ticket, getTicket()) {
920922
t.Fatal("old first ticket matches the fresh one")
921923
}
922924

923925
// Once the session master secret is expired, a full handshake should occur.
924926
ticket = getTicket()
925-
serverConfig.Time = func() time.Time { return time.Now().Add(24*8*time.Hour + time.Minute) }
927+
serverConfig.Time = func() time.Time { return testTime().Add(24*8*time.Hour + time.Minute) }
926928
testResumeState("ResumeWithExpiredTicket", false)
927929
if bytes.Equal(ticket, getTicket()) {
928930
t.Fatal("expired first ticket matches the fresh one")
929931
}
930932

931-
serverConfig.Time = func() time.Time { return time.Now() } // reset the time back
933+
serverConfig.Time = testTime // reset the time back
932934
key1 := randomKey()
933935
serverConfig.SetSessionTicketKeys([][32]byte{key1})
934936

@@ -945,19 +947,19 @@ func testResumption(t *testing.T, version uint16) {
945947
testResumeState("KeyChangeFinish", true)
946948

947949
// Age the session ticket a bit, but not yet expired.
948-
serverConfig.Time = func() time.Time { return time.Now().Add(24*time.Hour + time.Minute) }
950+
serverConfig.Time = func() time.Time { return testTime().Add(24*time.Hour + time.Minute) }
949951
testResumeState("OldSessionTicket", true)
950952
ticket = getTicket()
951953
// Expire the session ticket, which would force a full handshake.
952-
serverConfig.Time = func() time.Time { return time.Now().Add(24*8*time.Hour + time.Minute) }
954+
serverConfig.Time = func() time.Time { return testTime().Add(24*8*time.Hour + 2*time.Minute) }
953955
testResumeState("ExpiredSessionTicket", false)
954956
if bytes.Equal(ticket, getTicket()) {
955957
t.Fatal("new ticket wasn't provided after old ticket expired")
956958
}
957959

958960
// Age the session ticket a bit at a time, but don't expire it.
959961
d := 0 * time.Hour
960-
serverConfig.Time = func() time.Time { return time.Now().Add(d) }
962+
serverConfig.Time = func() time.Time { return testTime().Add(d) }
961963
deleteTicket()
962964
testResumeState("GetFreshSessionTicket", false)
963965
for i := 0; i < 13; i++ {
@@ -968,7 +970,7 @@ func testResumption(t *testing.T, version uint16) {
968970
// handshake occurs for TLS 1.2. Resumption should still occur for
969971
// TLS 1.3 since the client should be using a fresh ticket sent over
970972
// by the server.
971-
d += 12 * time.Hour
973+
d += 12*time.Hour + time.Minute
972974
if version == VersionTLS13 {
973975
testResumeState("ExpiredSessionTicket", true)
974976
} else {
@@ -984,6 +986,7 @@ func testResumption(t *testing.T, version uint16) {
984986
MaxVersion: version,
985987
CipherSuites: []uint16{TLS_RSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA},
986988
Certificates: testConfig.Certificates,
989+
Time: testTime,
987990
}
988991
serverConfig.SetSessionTicketKeys([][32]byte{key2})
989992

@@ -1009,6 +1012,7 @@ func testResumption(t *testing.T, version uint16) {
10091012
CurvePreferences: []CurveID{CurveP521, CurveP384, CurveP256},
10101013
MaxVersion: version,
10111014
Certificates: testConfig.Certificates,
1015+
Time: testTime,
10121016
}
10131017
testResumeState("InitialHandshake", false)
10141018
testResumeState("WithHelloRetryRequest", true)
@@ -1018,6 +1022,7 @@ func testResumption(t *testing.T, version uint16) {
10181022
MaxVersion: version,
10191023
CipherSuites: []uint16{TLS_RSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA},
10201024
Certificates: testConfig.Certificates,
1025+
Time: testTime,
10211026
}
10221027
}
10231028

@@ -1736,6 +1741,7 @@ func testVerifyConnection(t *testing.T, version uint16) {
17361741
serverConfig := &Config{
17371742
MaxVersion: version,
17381743
Certificates: []Certificate{testConfig.Certificates[0]},
1744+
Time: testTime,
17391745
ClientCAs: rootCAs,
17401746
NextProtos: []string{"protocol1"},
17411747
}
@@ -1749,6 +1755,7 @@ func testVerifyConnection(t *testing.T, version uint16) {
17491755
RootCAs: rootCAs,
17501756
ServerName: "example.golang",
17511757
Certificates: []Certificate{testConfig.Certificates[0]},
1758+
Time: testTime,
17521759
NextProtos: []string{"protocol1"},
17531760
}
17541761
test.configureClient(clientConfig, &clientCalled)
@@ -1791,8 +1798,6 @@ func testVerifyPeerCertificate(t *testing.T, version uint16) {
17911798
rootCAs := x509.NewCertPool()
17921799
rootCAs.AddCert(issuer)
17931800

1794-
now := func() time.Time { return time.Unix(1476984729, 0) }
1795-
17961801
sentinelErr := errors.New("TestVerifyPeerCertificate")
17971802

17981803
verifyPeerCertificateCallback := func(called *bool, rawCerts [][]byte, validatedChains [][]*x509.Certificate) error {
@@ -2038,7 +2043,7 @@ func testVerifyPeerCertificate(t *testing.T, version uint16) {
20382043
config.ServerName = "example.golang"
20392044
config.ClientAuth = RequireAndVerifyClientCert
20402045
config.ClientCAs = rootCAs
2041-
config.Time = now
2046+
config.Time = testTime
20422047
config.MaxVersion = version
20432048
config.Certificates = make([]Certificate, 1)
20442049
config.Certificates[0].Certificate = [][]byte{testRSACertificate}
@@ -2055,7 +2060,7 @@ func testVerifyPeerCertificate(t *testing.T, version uint16) {
20552060
config := testConfig.Clone()
20562061
config.ServerName = "example.golang"
20572062
config.RootCAs = rootCAs
2058-
config.Time = now
2063+
config.Time = testTime
20592064
config.MaxVersion = version
20602065
test.configureClient(config, &clientCalled)
20612066
clientErr := Client(c, config).Handshake()
@@ -2368,7 +2373,7 @@ func testGetClientCertificate(t *testing.T, version uint16) {
23682373
serverConfig.RootCAs = x509.NewCertPool()
23692374
serverConfig.RootCAs.AddCert(issuer)
23702375
serverConfig.ClientCAs = serverConfig.RootCAs
2371-
serverConfig.Time = func() time.Time { return time.Unix(1476984729, 0) }
2376+
serverConfig.Time = testTime
23722377
serverConfig.MaxVersion = version
23732378

23742379
clientConfig := testConfig.Clone()
@@ -2539,6 +2544,7 @@ func testResumptionKeepsOCSPAndSCT(t *testing.T, ver uint16) {
25392544
ClientSessionCache: NewLRUClientSessionCache(32),
25402545
ServerName: "example.golang",
25412546
RootCAs: roots,
2547+
Time: testTime,
25422548
}
25432549
serverConfig := testConfig.Clone()
25442550
serverConfig.MaxVersion = ver

src/crypto/tls/handshake_server_test.go

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -501,13 +501,15 @@ func testCrossVersionResume(t *testing.T, version uint16) {
501501
serverConfig := &Config{
502502
CipherSuites: []uint16{TLS_RSA_WITH_AES_128_CBC_SHA},
503503
Certificates: testConfig.Certificates,
504+
Time: testTime,
504505
}
505506
clientConfig := &Config{
506507
CipherSuites: []uint16{TLS_RSA_WITH_AES_128_CBC_SHA},
507508
InsecureSkipVerify: true,
508509
ClientSessionCache: NewLRUClientSessionCache(1),
509510
ServerName: "servername",
510511
MinVersion: VersionTLS12,
512+
Time: testTime,
511513
}
512514

513515
// Establish a session at TLS 1.3.

src/crypto/tls/handshake_test.go

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -519,6 +519,11 @@ func fromHex(s string) []byte {
519519
return b
520520
}
521521

522+
// testTime is 2016-10-20T17:32:09.000Z, which is within the validity period of
523+
// [testRSACertificate], [testRSACertificateIssuer], [testRSA2048Certificate],
524+
// [testRSA2048CertificateIssuer], and [testECDSACertificate].
525+
var testTime = func() time.Time { return time.Unix(1476984729, 0) }
526+
522527
var testRSACertificate = fromHex("3082024b308201b4a003020102020900e8f09d3fe25beaa6300d06092a864886f70d01010b0500301f310b3009060355040a1302476f3110300e06035504031307476f20526f6f74301e170d3136303130313030303030305a170d3235303130313030303030305a301a310b3009060355040a1302476f310b300906035504031302476f30819f300d06092a864886f70d010101050003818d0030818902818100db467d932e12270648bc062821ab7ec4b6a25dfe1e5245887a3647a5080d92425bc281c0be97799840fb4f6d14fd2b138bc2a52e67d8d4099ed62238b74a0b74732bc234f1d193e596d9747bf3589f6c613cc0b041d4d92b2b2423775b1c3bbd755dce2054cfa163871d1e24c4f31d1a508baab61443ed97a77562f414c852d70203010001a38193308190300e0603551d0f0101ff0404030205a0301d0603551d250416301406082b0601050507030106082b06010505070302300c0603551d130101ff0402300030190603551d0e041204109f91161f43433e49a6de6db680d79f60301b0603551d230414301280104813494d137e1631bba301d5acab6e7b30190603551d1104123010820e6578616d706c652e676f6c616e67300d06092a864886f70d01010b0500038181009d30cc402b5b50a061cbbae55358e1ed8328a9581aa938a495a1ac315a1a84663d43d32dd90bf297dfd320643892243a00bccf9c7db74020015faad3166109a276fd13c3cce10c5ceeb18782f16c04ed73bbb343778d0c1cf10fa1d8408361c94c722b9daedb4606064df4c1b33ec0d1bd42d4dbfe3d1360845c21d33be9fae7")
523528

524529
var testRSACertificateIssuer = fromHex("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")

src/crypto/tls/tls_test.go

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1112,8 +1112,6 @@ func TestConnectionState(t *testing.T) {
11121112
rootCAs := x509.NewCertPool()
11131113
rootCAs.AddCert(issuer)
11141114

1115-
now := func() time.Time { return time.Unix(1476984729, 0) }
1116-
11171115
const alpnProtocol = "golang"
11181116
const serverName = "example.golang"
11191117
var scts = [][]byte{[]byte("dummy sct 1"), []byte("dummy sct 2")}
@@ -1129,7 +1127,7 @@ func TestConnectionState(t *testing.T) {
11291127
}
11301128
t.Run(name, func(t *testing.T) {
11311129
config := &Config{
1132-
Time: now,
1130+
Time: testTime,
11331131
Rand: zeroSource{},
11341132
Certificates: make([]Certificate, 1),
11351133
MaxVersion: v,
@@ -1760,7 +1758,7 @@ func testVerifyCertificates(t *testing.T, version uint16) {
17601758
var serverVerifyPeerCertificates, clientVerifyPeerCertificates bool
17611759

17621760
clientConfig := testConfig.Clone()
1763-
clientConfig.Time = func() time.Time { return time.Unix(1476984729, 0) }
1761+
clientConfig.Time = testTime
17641762
clientConfig.MaxVersion = version
17651763
clientConfig.MinVersion = version
17661764
clientConfig.RootCAs = rootCAs

0 commit comments

Comments
 (0)