-
Notifications
You must be signed in to change notification settings - Fork 81
/
Copy pathssl_sni_reneg.t
140 lines (92 loc) · 3.01 KB
/
ssl_sni_reneg.t
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
#!/usr/bin/perl
# (C) Sergey Kandaurov
# (C) Nginx, Inc.
# Tests for http ssl module with SNI and renegotiation.
###############################################################################
use warnings;
use strict;
use Test::More;
use Socket qw/ CRLF /;
BEGIN { use FindBin; chdir($FindBin::Bin); }
use lib 'lib';
use Test::Nginx qw/ :DEFAULT http_end /;
###############################################################################
select STDERR; $| = 1;
select STDOUT; $| = 1;
my $t = Test::Nginx->new()->has(qw/http http_ssl socket_ssl_sni/)
->has_daemon('openssl')->plan(8);
$t->write_file_expand('nginx.conf', <<'EOF');
%%TEST_GLOBALS%%
daemon off;
events {
}
http {
%%TEST_GLOBALS_HTTP%%
ssl_certificate_key localhost.key;
ssl_certificate localhost.crt;
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
server {
listen 127.0.0.1:8443 ssl;
listen 127.0.0.1:8444 ssl;
server_name localhost;
location / { }
}
server {
listen 127.0.0.1:8444 ssl;
server_name localhost2;
location / { }
}
}
EOF
$t->write_file('openssl.conf', <<EOF);
[ req ]
default_bits = 2048
encrypt_key = no
distinguished_name = req_distinguished_name
[ req_distinguished_name ]
EOF
my $d = $t->testdir();
foreach my $name ('localhost') {
system('openssl req -x509 -new '
. "-config $d/openssl.conf -subj /CN=$name/ "
. "-out $d/$name.crt -keyout $d/$name.key "
. ">>$d/openssl.out 2>&1") == 0
or die "Can't create certificate for $name: $!\n";
}
$t->run();
###############################################################################
my ($s, $ssl);
$s = http('', start => 1, SSL => 1);
ok($s, 'connection');
SKIP: {
skip 'connection failed', 3 unless $s;
local $SIG{PIPE} = 'IGNORE';
$s->print('GET / HTTP/1.0' . CRLF);
# Note: this uses IO::Socket::SSL::_get_ssl_object() internal method.
# While not exactly correct, it looks like there is no other way to
# trigger renegotiation with IO::Socket::SSL, and this seems to be
# good enough for tests.
$ssl = $s->_get_ssl_object();
ok(Net::SSLeay::renegotiate($ssl), 'renegotiation');
ok(Net::SSLeay::set_tlsext_host_name($ssl, 'localhost'), 'SNI');
$s->print('Host: localhost' . CRLF . CRLF);
ok(!http_end($s), 'response');
}
# virtual servers
$s = http('', start => 1, PeerAddr => '127.0.0.1:' . port(8444), SSL => 1);
ok($s, 'connection 2');
SKIP: {
skip 'connection failed', 3 unless $s;
local $SIG{PIPE} = 'IGNORE';
$s->print('GET / HTTP/1.0' . CRLF);
# Note: this uses IO::Socket::SSL::_get_ssl_object() internal method.
# While not exactly correct, it looks like there is no other way to
# trigger renegotiation with IO::Socket::SSL, and this seems to be
# good enough for tests.
$ssl = $s->_get_ssl_object();
ok(Net::SSLeay::renegotiate($ssl), 'renegotiation');
ok(Net::SSLeay::set_tlsext_host_name($ssl, 'localhost'), 'SNI');
$s->print('Host: localhost' . CRLF . CRLF);
ok(!http_end($s), 'virtual servers');
}
###############################################################################