-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathsession_test.go
108 lines (85 loc) · 2 KB
/
session_test.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
package dtls
import (
"bytes"
"encoding/hex"
"net"
"os"
"sync"
"testing"
)
func getFSS(t *testing.T) *FileSessionStore {
root, err := os.MkdirTemp(os.TempDir(), "pion-dtls-")
if err != nil {
t.Fatal(err)
}
return &FileSessionStore{Root: root}
}
func TestSessionResumption(t *testing.T) {
addr := &net.UDPAddr{IP: net.ParseIP("127.0.0.1"), Port: 54321}
fss1 := getFSS(t)
fss2 := getFSS(t)
defer os.RemoveAll(fss1.Root)
defer os.RemoveAll(fss2.Root)
id, _ := hex.DecodeString("9b9fc92255634d9fb109febed42166717bb8ded8c738ba71bc7f2a0d9dae0306")
secret, _ := hex.DecodeString("2e942a37aca5241deb2295b5fcedac221c7078d2503d2b62aeb48c880d7da73c001238b708559686b9da6e829c05ead7")
s := Session{
ID: id,
Secret: secret,
Addr: addr.String(),
}
fss1.Set(&s, false)
fss2.Set(&s, true)
cfg1 := Config{
PSK: func(hint []byte) ([]byte, error) {
return []byte{0xAB, 0xC1, 0x23}, nil
},
PSKIdentityHint: []byte("Pion DTLS Client"),
CipherSuites: []CipherSuiteID{TLS_PSK_WITH_AES_128_GCM_SHA256},
SessionStore: fss1,
}
cfg2 := cfg1
cfg2.SessionStore = fss2
cfg2.PSK = func([]byte) ([]byte, error) { return []byte{}, nil }
var wg sync.WaitGroup
var buf [4]byte
wg.Add(2)
go func() {
defer wg.Done()
listener, err := Listen("udp", addr, &cfg1)
if err != nil {
t.Fatal(err)
}
defer listener.Close()
conn, err := listener.Accept()
if err != nil {
t.Fatal(err)
}
defer conn.Close()
_, err = conn.Read(buf[:])
if err != nil {
t.Fatal(err)
}
}()
go func() {
defer wg.Done()
conn, err := Dial("udp", addr, &cfg2)
if err != nil {
t.Fatal(err)
}
defer conn.Close()
_, err = conn.Write([]byte("dtls"))
if err != nil {
t.Fatal(err)
}
if !bytes.Equal(secret, conn.state.masterSecret) {
t.Fatalf("invalid master sercret: %x", conn.state.masterSecret)
}
if !bytes.Equal(id, conn.state.SessionID) {
t.Fatalf("invalid session id: %x", conn.state.SessionID)
}
}()
wg.Wait()
if string(buf[:]) != "dtls" {
t.Fatal("error")
}
}