diff options
author | jsing <> | 2020-05-04 16:18:54 +0000 |
---|---|---|
committer | jsing <> | 2020-05-04 16:18:54 +0000 |
commit | 511f3eb38cc356f639199275c5ef4bedb1dba369 (patch) | |
tree | 4c4b73108138482acdc84b6db1c777268d3b3d66 /src/regress/lib/libtls | |
parent | 8b8f4425fc0851a2c66a95a7cb36b974dcd60b64 (diff) | |
download | openbsd-511f3eb38cc356f639199275c5ef4bedb1dba369.tar.gz openbsd-511f3eb38cc356f639199275c5ef4bedb1dba369.tar.bz2 openbsd-511f3eb38cc356f639199275c5ef4bedb1dba369.zip |
Use a larger (2048 bit) RSA test key.
Otherwise we fail to do PSS signatures since the key size is too small.
Diffstat (limited to 'src/regress/lib/libtls')
-rw-r--r-- | src/regress/lib/libtls/gotls/tls_test.go | 64 |
1 files changed, 63 insertions, 1 deletions
diff --git a/src/regress/lib/libtls/gotls/tls_test.go b/src/regress/lib/libtls/gotls/tls_test.go index be880e138c..f6c6cfcdd5 100644 --- a/src/regress/lib/libtls/gotls/tls_test.go +++ b/src/regress/lib/libtls/gotls/tls_test.go | |||
@@ -17,12 +17,64 @@ import ( | |||
17 | const ( | 17 | const ( |
18 | httpContent = "Hello, TLS!" | 18 | httpContent = "Hello, TLS!" |
19 | 19 | ||
20 | certHash = "SHA256:448f628a8a65aa18560e53a80c53acb38c51b427df0334082349141147dc9bf6" | 20 | certHash = "SHA256:1153aa0230ee0481b36bdd83ddb04b607340dbda35f3a4fff0615e4d9292d687" |
21 | ) | 21 | ) |
22 | 22 | ||
23 | var ( | 23 | var ( |
24 | certNotBefore = time.Unix(0, 0) | 24 | certNotBefore = time.Unix(0, 0) |
25 | certNotAfter = certNotBefore.Add(1000000 * time.Hour) | 25 | certNotAfter = certNotBefore.Add(1000000 * time.Hour) |
26 | |||
27 | // Generated with: | ||
28 | // go run crypto/tls/generate_cert.go --rsa-bits 2048 \ | ||
29 | // --host 127.0.0.1,::1,example.com --ca \ | ||
30 | // --start-date "Jan 1 00:00:00 1970" --duration=1000000h` | ||
31 | testServerCert = []byte(`-----BEGIN CERTIFICATE----- | ||
32 | MIIDGTCCAgGgAwIBAgIRAJHZkrBTk/yTKT3L2Z+dgZcwDQYJKoZIhvcNAQELBQAw | ||
33 | EjEQMA4GA1UEChMHQWNtZSBDbzAgFw03MDAxMDEwMDAwMDBaGA8yMDg0MDEyOTE2 | ||
34 | MDAwMFowEjEQMA4GA1UEChMHQWNtZSBDbzCCASIwDQYJKoZIhvcNAQEBBQADggEP | ||
35 | ADCCAQoCggEBANxPCe2pafj2pWdA+hnN+Ne9Auh2YdoSPbQqIPQMVTT/3j6w9LlW | ||
36 | JirXCLWNuoarOA2iCgVa4Y607O/f2FTN7cKY2lvhAkuftCUJzB/lJVH5bWZgSrks | ||
37 | 3AaOBlBcyMKBajFoEOIgSMwHGAZO2XsWIvdbuQw3EKY50vfBvxQspjbMruhpZoKd | ||
38 | 9tHx6XUBoYSf5t9X+FrG2UjihnfcfBcsKGq7lbujt3+3QvlU6w1ZGOX+f9b+3+yw | ||
39 | RQkswxvkzKpfmgvr8GWWUm8w9wkImhAmA2UAhsM8OwnKVltvMih5mb9L2hw5+qBV | ||
40 | W1V+CSR0tDI9D8eiL26B3dvOilpZjttp3fsCAwEAAaNoMGYwDgYDVR0PAQH/BAQD | ||
41 | AgKkMBMGA1UdJQQMMAoGCCsGAQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wLgYDVR0R | ||
42 | BCcwJYILZXhhbXBsZS5jb22HBH8AAAGHEAAAAAAAAAAAAAAAAAAAAAEwDQYJKoZI | ||
43 | hvcNAQELBQADggEBAA+tFyWOZLoUjN2SKcIXnN5zs4VZedybLFVZoJSDakgo8awS | ||
44 | HPkD/1ReIOzT41Hmzjs/4CeVw6FSeKnYtEqTPOJoRVrXAIqyHGHJ2cEWpUXvg2b0 | ||
45 | u7lkFfElRqcBjsDZYr+rJUxkjlCa11ylCbgdwoDMIbKNldcJoLB0iwQWUE7j19xe | ||
46 | CF32aISt/nGxCYcO81tn+ionwzZyf5zh5k/SmAqrPy4O/qxn8oEaox4Z7BfoZlAS | ||
47 | gmPA2gedTWORfthamJdT2irz3rdHjV7NWxwTsgOAx9y+P3fqmMCyMwxFJkmP118W | ||
48 | yM5xDRR+ldYKoRts5qkPR6LVtCw9kn+dJKQm0Bc= | ||
49 | -----END CERTIFICATE-----`) | ||
50 | testServerKey = []byte(`-----BEGIN PRIVATE KEY----- | ||
51 | MIIEvwIBADANBgkqhkiG9w0BAQEFAASCBKkwggSlAgEAAoIBAQDcTwntqWn49qVn | ||
52 | QPoZzfjXvQLodmHaEj20KiD0DFU0/94+sPS5ViYq1wi1jbqGqzgNogoFWuGOtOzv | ||
53 | 39hUze3CmNpb4QJLn7QlCcwf5SVR+W1mYEq5LNwGjgZQXMjCgWoxaBDiIEjMBxgG | ||
54 | Ttl7FiL3W7kMNxCmOdL3wb8ULKY2zK7oaWaCnfbR8el1AaGEn+bfV/haxtlI4oZ3 | ||
55 | 3HwXLChqu5W7o7d/t0L5VOsNWRjl/n/W/t/ssEUJLMMb5MyqX5oL6/BlllJvMPcJ | ||
56 | CJoQJgNlAIbDPDsJylZbbzIoeZm/S9ocOfqgVVtVfgkkdLQyPQ/Hoi9ugd3bzopa | ||
57 | WY7bad37AgMBAAECggEAKSmnbD1sLHVBIFK2qB2g8gZBxddgnxMrbj802wR24ykv | ||
58 | iD0d7IcZKIX2/Z0WjdTt6zYscyWw4S4S2xrS272CQAq5OdOHz0NusEDtX8Q7vd5B | ||
59 | v5AcRg8IqTzeFyPO6vCtO7/675UipORqa7tNzT6sl9UOdSbQuI4zSdFsd0OEZtZs | ||
60 | oqKkv+jdvKaVJQ1vsoQSup23V0bvVCRydBNFZ2mQ3etZcRRYXyu1digJ7/oMyCHf | ||
61 | 1F37lJmjPJ8WwsGJMk2ngJiUOQx21bbTZ22c/8sMMLJjhhC2qu984keVRanSsJwC | ||
62 | Z80XcCxL/yoLF42A5ReMtutFs83rW7VX7VJGxoOaKQKBgQD91dCs9jGBVxHr4vxy | ||
63 | NJC2n92R5/JpqXygXS3L6RDP+we6p/fmSd4/QllwIVeC9kepsFz4//ArmLOy9JHu | ||
64 | rkXa7W9G+XbmYXSftmG78roLfAtvdudoytLQJg2bu8J3bzPVibRCUq0OORFyqOHR | ||
65 | QGcQtvPxwFHctIkOjajbLpbL7QKBgQDeMAbvjzD8wU1gp2U8Bl5l5ohYgQpcs15R | ||
66 | eBPS5DlRzICAeuQWi+BRjW5BPZVmTr3Ml3KiMWcalXMeH1TKoPON8RjmWgY2Fxvh | ||
67 | nS7gV+rJm4H0T+bBEXNAraracwGYd6JgcH9BPD9znHRmyFR4pMPqkSa7o/OExH6W | ||
68 | O32KqTMkhwKBgQCoX7wb/vK3qNnqbpal6thTS5fdwM276QESHrzSFbdhPlLSLbjy | ||
69 | uO0DaS+KgZNa+6JtnN8PDDZztMb+XdyvRkpv/i9iFPgZuWtyxbfuxANEuvOa7HRz | ||
70 | vpY4HAXK17EXKFxpuP4pQE4qsRAxznR8KQw0uib2pWunytlfHfhz62N7wQKBgQC+ | ||
71 | +TTc74zBkzx42SiwYSD+IRoMSE2pxBpLmBQh7jw+TLIevIITxwJ11kRwGwiwuPl2 | ||
72 | Qq4rLp9aQB6EQ5XT3Ge7FwG57KLuFwrF7x59gdOymdEnNw414FPZwevae4Nhk2Kj | ||
73 | 1c3rOmenbVC3j3TbhXNHyJ8sJQ2IjoPniRas+iWVPQKBgQDcZzKh6U+e9efYLAt0 | ||
74 | qdaKhm5MCAgzD9X/Tx2OvOqgWnSXt2Q2AhK2UsHnrGBn1SDNTNDGlniQy2OM2Ywn | ||
75 | n71nH1QUmgoiwBrFUh0gLxv878vwgUATqfFRTlirmK9XxHuTX9Jh6elmRebjYWyc | ||
76 | Oo0CJBeMABu71Y+VkCxURT1bzw== | ||
77 | -----END PRIVATE KEY-----`) | ||
26 | ) | 78 | ) |
27 | 79 | ||
28 | type handshakeError string | 80 | type handshakeError string |
@@ -57,6 +109,16 @@ func newTestServer(tlsCfg *tls.Config) (*httptest.Server, *url.URL, string, erro | |||
57 | }, | 109 | }, |
58 | ), | 110 | ), |
59 | ) | 111 | ) |
112 | if tlsCfg == nil { | ||
113 | tlsCfg = &tls.Config{} | ||
114 | } | ||
115 | if len(tlsCfg.Certificates) == 0 { | ||
116 | cert, err := tls.X509KeyPair(testServerCert, testServerKey) | ||
117 | if err != nil { | ||
118 | return nil, nil, "", fmt.Errorf("failed to load key pair: %v", err) | ||
119 | } | ||
120 | tlsCfg.Certificates = []tls.Certificate{cert} | ||
121 | } | ||
60 | ts.TLS = tlsCfg | 122 | ts.TLS = tlsCfg |
61 | ts.StartTLS() | 123 | ts.StartTLS() |
62 | 124 | ||