From 88af5f193af779f13f0e835f6b364ebc91e7e7d7 Mon Sep 17 00:00:00 2001 From: Colin Sullivan Date: Fri, 22 Apr 2016 15:00:19 -0600 Subject: [PATCH] Add TestTlsCipher. --- server/server_test.go | 52 +++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 52 insertions(+) diff --git a/server/server_test.go b/server/server_test.go index f8435f88..c9625d41 100644 --- a/server/server_test.go +++ b/server/server_test.go @@ -4,6 +4,7 @@ package server import ( "net" + "strings" "testing" "time" ) @@ -86,3 +87,54 @@ func TestStartupAndShutdown(t *testing.T) { t.Fatalf("Expected numSubscriptions to be 0 vs %d\n", numSubscriptions) } } + +func TestTlsCipher(t *testing.T) { + if strings.Compare(tlsCipher(0x0005), "TLS_RSA_WITH_RC4_128_SHA") != 0 { + t.Fatalf("Invalid tls cipher") + } + if strings.Compare(tlsCipher(0x000a), "TLS_RSA_WITH_3DES_EDE_CBC_SHA") != 0 { + t.Fatalf("Invalid tls cipher") + } + if strings.Compare(tlsCipher(0x002f), "TLS_RSA_WITH_AES_128_CBC_SHA") != 0 { + t.Fatalf("Invalid tls cipher") + } + if strings.Compare(tlsCipher(0x0035), "TLS_RSA_WITH_AES_256_CBC_SHA") != 0 { + t.Fatalf("Invalid tls cipher") + } + if strings.Compare(tlsCipher(0xc007), "TLS_ECDHE_ECDSA_WITH_RC4_128_SHA") != 0 { + t.Fatalf("Invalid tls cipher") + } + if strings.Compare(tlsCipher(0xc009), "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA") != 0 { + t.Fatalf("Invalid tls cipher") + } + if strings.Compare(tlsCipher(0xc00a), "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA") != 0 { + t.Fatalf("Invalid tls cipher") + } + if strings.Compare(tlsCipher(0xc011), "TLS_ECDHE_RSA_WITH_RC4_128_SHA") != 0 { + t.Fatalf("Invalid tls cipher") + } + if strings.Compare(tlsCipher(0xc012), "TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA") != 0 { + t.Fatalf("Invalid tls cipher") + } + if strings.Compare(tlsCipher(0xc013), "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA") != 0 { + t.Fatalf("Invalid tls cipher") + } + if strings.Compare(tlsCipher(0xc014), "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA") != 0 { + t.Fatalf("IUnknownnvalid tls cipher") + } + if strings.Compare(tlsCipher(0xc02f), "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256") != 0 { + t.Fatalf("Invalid tls cipher") + } + if strings.Compare(tlsCipher(0xc02b), "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256") != 0 { + t.Fatalf("Invalid tls cipher") + } + if strings.Compare(tlsCipher(0xc030), "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384") != 0 { + t.Fatalf("Invalid tls cipher") + } + if strings.Compare(tlsCipher(0xc02c), "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384") != 0 { + t.Fatalf("Invalid tls cipher") + } + if !strings.Contains(tlsCipher(0x9999), "Unknown") { + t.Fatalf("Expected an unknown cipher.") + } +}