mitmproxy/test/test_tcp.py

750 lines
21 KiB
Python
Raw Normal View History

import cStringIO
import Queue
import time
import socket
import random
2015-02-27 21:02:52 +00:00
import os
2015-04-08 22:57:37 +00:00
import threading
import mock
from OpenSSL import SSL
import OpenSSL
2015-08-01 12:49:15 +00:00
from netlib import tcp, certutils, tutils
from . import tservers
from netlib.exceptions import InvalidCertificateException, TcpReadIncomplete, TlsException, \
TcpTimeout, TcpDisconnect, TcpException
2012-06-18 21:42:32 +00:00
class EchoHandler(tcp.BaseHandler):
2012-06-25 21:50:42 +00:00
sni = None
2012-06-25 21:50:42 +00:00
def handle_sni(self, connection):
self.sni = connection.get_servername()
2012-06-18 21:42:32 +00:00
def handle(self):
v = self.rfile.readline()
2013-01-27 06:21:18 +00:00
self.wfile.write(v)
2012-06-18 21:42:32 +00:00
self.wfile.flush()
class ClientCipherListHandler(tcp.BaseHandler):
sni = None
def handle(self):
self.wfile.write("%s" % self.connection.get_cipher_list())
self.wfile.flush()
2012-07-21 04:10:54 +00:00
class HangHandler(tcp.BaseHandler):
2012-07-21 04:10:54 +00:00
def handle(self):
while True:
2012-07-21 04:10:54 +00:00
time.sleep(1)
2015-06-15 15:31:08 +00:00
class ALPNHandler(tcp.BaseHandler):
sni = None
def handle(self):
alp = self.get_alpn_proto_negotiated()
if alp:
self.wfile.write("%s" % alp)
else:
self.wfile.write("NONE")
self.wfile.flush()
2015-06-22 02:52:23 +00:00
class TestServer(tservers.ServerTestBase):
2013-01-25 03:03:59 +00:00
handler = EchoHandler
2012-06-18 21:42:32 +00:00
def test_echo(self):
testval = "echo!\n"
c = tcp.TCPClient(("127.0.0.1", self.port))
c.connect()
2012-06-18 21:42:32 +00:00
c.wfile.write(testval)
c.wfile.flush()
assert c.rfile.readline() == testval
2015-04-08 22:57:37 +00:00
def test_thread_start_error(self):
with mock.patch.object(threading.Thread, "start", side_effect=threading.ThreadError("nonewthread")) as m:
c = tcp.TCPClient(("127.0.0.1", self.port))
c.connect()
assert not c.rfile.read(1)
assert m.called
assert "nonewthread" in self.q.get_nowait()
self.test_echo()
2015-06-22 02:52:23 +00:00
class TestServerBind(tservers.ServerTestBase):
2014-03-10 04:29:27 +00:00
class handler(tcp.BaseHandler):
2014-03-10 04:29:27 +00:00
def handle(self):
self.wfile.write(str(self.connection.getpeername()))
self.wfile.flush()
def test_bind(self):
""" Test to bind to a given random port. Try again if the random port turned out to be blocked. """
for i in range(20):
random_port = random.randrange(1024, 65535)
try:
2015-05-30 00:02:58 +00:00
c = tcp.TCPClient(
("127.0.0.1", self.port), source_address=(
"127.0.0.1", random_port))
c.connect()
assert c.rfile.readline() == str(("127.0.0.1", random_port))
return
except TcpException: # port probably already in use
pass
2015-06-22 02:52:23 +00:00
class TestServerIPv6(tservers.ServerTestBase):
handler = EchoHandler
addr = tcp.Address(("localhost", 0), use_ipv6=True)
def test_echo(self):
testval = "echo!\n"
c = tcp.TCPClient(tcp.Address(("::1", self.port), use_ipv6=True))
c.connect()
c.wfile.write(testval)
c.wfile.flush()
assert c.rfile.readline() == testval
2013-01-27 06:21:18 +00:00
2015-06-22 02:52:23 +00:00
class TestEcho(tservers.ServerTestBase):
2013-01-25 03:03:59 +00:00
handler = EchoHandler
def test_echo(self):
testval = "echo!\n"
c = tcp.TCPClient(("127.0.0.1", self.port))
c.connect()
c.wfile.write(testval)
c.wfile.flush()
assert c.rfile.readline() == testval
2014-03-10 16:43:39 +00:00
class HardDisconnectHandler(tcp.BaseHandler):
2014-03-10 16:43:39 +00:00
def handle(self):
self.connection.close()
2015-06-22 02:52:23 +00:00
class TestFinishFail(tservers.ServerTestBase):
2015-02-27 21:02:52 +00:00
"""
This tests a difficult-to-trigger exception in the .finish() method of
the handler.
"""
handler = EchoHandler
2015-02-27 21:02:52 +00:00
def test_disconnect_in_finish(self):
c = tcp.TCPClient(("127.0.0.1", self.port))
c.connect()
c.wfile.write("foo\n")
c.wfile.flush = mock.Mock(side_effect=TcpDisconnect)
2015-02-27 21:02:52 +00:00
c.finish()
2015-06-22 02:52:23 +00:00
class TestServerSSL(tservers.ServerTestBase):
2013-01-25 03:03:59 +00:00
handler = EchoHandler
ssl = dict(
cipher_list="AES256-SHA",
chain_file=tutils.test_data.path("data/server.crt")
)
def test_echo(self):
c = tcp.TCPClient(("127.0.0.1", self.port))
c.connect()
c.convert_to_ssl(sni="foo.com", options=SSL.OP_ALL)
testval = "echo!\n"
2012-06-18 21:42:32 +00:00
c.wfile.write(testval)
c.wfile.flush()
assert c.rfile.readline() == testval
2012-06-18 21:42:32 +00:00
def test_get_current_cipher(self):
c = tcp.TCPClient(("127.0.0.1", self.port))
c.connect()
assert not c.get_current_cipher()
c.convert_to_ssl(sni="foo.com")
ret = c.get_current_cipher()
assert ret
assert "AES" in ret[0]
2012-06-18 21:42:32 +00:00
2015-06-22 02:52:23 +00:00
class TestSSLv3Only(tservers.ServerTestBase):
2013-01-25 03:03:59 +00:00
handler = EchoHandler
ssl = dict(
request_client_cert=False,
v3_only=True
2013-01-25 03:03:59 +00:00
)
def test_failure(self):
c = tcp.TCPClient(("127.0.0.1", self.port))
c.connect()
tutils.raises(TlsException, c.convert_to_ssl, sni="foo.com")
class TestSSLUpstreamCertVerificationWBadServerCert(tservers.ServerTestBase):
handler = EchoHandler
ssl = dict(
cert=tutils.test_data.path("data/verificationcerts/untrusted.crt"),
key=tutils.test_data.path("data/verificationcerts/verification-server.key"))
def test_mode_default_should_pass(self):
c = tcp.TCPClient(("127.0.0.1", self.port))
c.connect()
c.convert_to_ssl()
# Verification errors should be saved even if connection isn't aborted
# aborted
assert c.ssl_verification_error is not None
testval = "echo!\n"
c.wfile.write(testval)
c.wfile.flush()
assert c.rfile.readline() == testval
def test_mode_none_should_pass(self):
c = tcp.TCPClient(("127.0.0.1", self.port))
c.connect()
c.convert_to_ssl(verify_options=SSL.VERIFY_NONE)
# Verification errors should be saved even if connection isn't aborted
assert c.ssl_verification_error is not None
testval = "echo!\n"
c.wfile.write(testval)
c.wfile.flush()
assert c.rfile.readline() == testval
def test_mode_strict_should_fail(self):
c = tcp.TCPClient(("127.0.0.1", self.port))
c.connect()
tutils.raises(
InvalidCertificateException,
c.convert_to_ssl,
verify_options=SSL.VERIFY_PEER,
ca_pemfile=tutils.test_data.path("data/verificationcerts/trusted.pem"))
assert c.ssl_verification_error is not None
# Unknown issuing certificate authority for first certificate
assert c.ssl_verification_error['errno'] == 20
assert c.ssl_verification_error['depth'] == 0
class TestSSLUpstreamCertVerificationWBadCertChain(tservers.ServerTestBase):
handler = EchoHandler
ssl = dict(
cert=tutils.test_data.path("data/verificationcerts/untrusted-chain.crt"),
key=tutils.test_data.path("data/verificationcerts/verification-server.key"))
def test_mode_strict_should_fail(self):
c = tcp.TCPClient(("127.0.0.1", self.port))
c.connect()
tutils.raises(
"certificate verify failed",
c.convert_to_ssl,
verify_options=SSL.VERIFY_PEER,
ca_pemfile=tutils.test_data.path("data/verificationcerts/trusted.pem"))
assert c.ssl_verification_error is not None
# Untrusted self-signed certificate at second position in certificate
# chain
assert c.ssl_verification_error['errno'] == 19
assert c.ssl_verification_error['depth'] == 1
class TestSSLUpstreamCertVerificationWValidCertChain(tservers.ServerTestBase):
handler = EchoHandler
ssl = dict(
cert=tutils.test_data.path("data/verificationcerts/trusted-chain.crt"),
key=tutils.test_data.path("data/verificationcerts/verification-server.key"))
def test_mode_strict_w_pemfile_should_pass(self):
c = tcp.TCPClient(("127.0.0.1", self.port))
c.connect()
c.convert_to_ssl(
verify_options=SSL.VERIFY_PEER,
ca_pemfile=tutils.test_data.path("data/verificationcerts/trusted.pem"))
assert c.ssl_verification_error is None
testval = "echo!\n"
c.wfile.write(testval)
c.wfile.flush()
assert c.rfile.readline() == testval
def test_mode_strict_w_cadir_should_pass(self):
c = tcp.TCPClient(("127.0.0.1", self.port))
c.connect()
c.convert_to_ssl(
verify_options=SSL.VERIFY_PEER,
ca_path=tutils.test_data.path("data/verificationcerts/"))
assert c.ssl_verification_error is None
testval = "echo!\n"
c.wfile.write(testval)
c.wfile.flush()
assert c.rfile.readline() == testval
2015-06-22 02:52:23 +00:00
class TestSSLClientCert(tservers.ServerTestBase):
2014-03-10 04:29:27 +00:00
class handler(tcp.BaseHandler):
sni = None
2014-03-10 04:29:27 +00:00
def handle_sni(self, connection):
self.sni = connection.get_servername()
def handle(self):
self.wfile.write("%s\n" % self.clientcert.serial)
2014-03-10 04:29:27 +00:00
self.wfile.flush()
2013-01-25 03:03:59 +00:00
ssl = dict(
request_client_cert=True,
v3_only=False
2013-01-25 03:03:59 +00:00
)
def test_clientcert(self):
c = tcp.TCPClient(("127.0.0.1", self.port))
c.connect()
2015-05-30 00:02:58 +00:00
c.convert_to_ssl(
cert=tutils.test_data.path("data/clientcert/client.pem"))
assert c.rfile.readline().strip() == "1"
def test_clientcert_err(self):
c = tcp.TCPClient(("127.0.0.1", self.port))
c.connect()
tutils.raises(
TlsException,
c.convert_to_ssl,
cert=tutils.test_data.path("data/clientcert/make")
)
2015-06-22 02:52:23 +00:00
class TestSNI(tservers.ServerTestBase):
2014-03-10 04:29:27 +00:00
class handler(tcp.BaseHandler):
sni = None
2014-03-10 04:29:27 +00:00
def handle_sni(self, connection):
self.sni = connection.get_servername()
def handle(self):
self.wfile.write(self.sni)
self.wfile.flush()
ssl = True
2012-06-25 21:50:42 +00:00
def test_echo(self):
c = tcp.TCPClient(("127.0.0.1", self.port))
2012-06-25 21:50:42 +00:00
c.connect()
c.convert_to_ssl(sni="foo.com")
assert c.sni == "foo.com"
2012-06-25 21:50:42 +00:00
assert c.rfile.readline() == "foo.com"
2015-06-22 02:52:23 +00:00
class TestServerCipherList(tservers.ServerTestBase):
handler = ClientCipherListHandler
ssl = dict(
cipher_list='RC4-SHA'
)
def test_echo(self):
c = tcp.TCPClient(("127.0.0.1", self.port))
c.connect()
c.convert_to_ssl(sni="foo.com")
assert c.rfile.readline() == "['RC4-SHA']"
2015-06-22 02:52:23 +00:00
class TestServerCurrentCipher(tservers.ServerTestBase):
2014-03-10 04:29:27 +00:00
class handler(tcp.BaseHandler):
sni = None
2014-03-10 04:29:27 +00:00
def handle(self):
self.wfile.write("%s" % str(self.get_current_cipher()))
2014-03-10 04:29:27 +00:00
self.wfile.flush()
ssl = dict(
cipher_list='RC4-SHA'
)
def test_echo(self):
c = tcp.TCPClient(("127.0.0.1", self.port))
c.connect()
c.convert_to_ssl(sni="foo.com")
assert "RC4-SHA" in c.rfile.readline()
2015-06-22 02:52:23 +00:00
class TestServerCipherListError(tservers.ServerTestBase):
handler = ClientCipherListHandler
ssl = dict(
cipher_list='bogus'
)
def test_echo(self):
c = tcp.TCPClient(("127.0.0.1", self.port))
c.connect()
tutils.raises("handshake error", c.convert_to_ssl, sni="foo.com")
2015-06-22 02:52:23 +00:00
class TestClientCipherListError(tservers.ServerTestBase):
handler = ClientCipherListHandler
ssl = dict(
cipher_list='RC4-SHA'
)
def test_echo(self):
c = tcp.TCPClient(("127.0.0.1", self.port))
c.connect()
2015-05-30 00:02:58 +00:00
tutils.raises(
"cipher specification",
c.convert_to_ssl,
sni="foo.com",
cipher_list="bogus")
2015-06-22 02:52:23 +00:00
class TestSSLDisconnect(tservers.ServerTestBase):
2014-03-10 04:29:27 +00:00
class handler(tcp.BaseHandler):
2014-03-10 04:29:27 +00:00
def handle(self):
2014-10-23 13:31:42 +00:00
self.finish()
ssl = True
def test_echo(self):
c = tcp.TCPClient(("127.0.0.1", self.port))
c.connect()
c.convert_to_ssl()
# Excercise SSL.ZeroReturnError
c.rfile.read(10)
c.close()
tutils.raises(TcpDisconnect, c.wfile.write, "foo")
tutils.raises(Queue.Empty, self.q.get_nowait)
2015-06-22 02:52:23 +00:00
class TestSSLHardDisconnect(tservers.ServerTestBase):
2014-03-10 16:43:39 +00:00
handler = HardDisconnectHandler
ssl = True
2014-03-10 16:43:39 +00:00
def test_echo(self):
c = tcp.TCPClient(("127.0.0.1", self.port))
c.connect()
c.convert_to_ssl()
# Exercise SSL.SysCallError
c.rfile.read(10)
c.close()
tutils.raises(TcpDisconnect, c.wfile.write, "foo")
2014-03-10 16:43:39 +00:00
2015-06-22 02:52:23 +00:00
class TestDisconnect(tservers.ServerTestBase):
def test_echo(self):
c = tcp.TCPClient(("127.0.0.1", self.port))
c.connect()
c.rfile.read(10)
c.wfile.write("foo")
c.close()
c.close()
2015-06-22 02:52:23 +00:00
class TestServerTimeOut(tservers.ServerTestBase):
2014-03-10 04:29:27 +00:00
class handler(tcp.BaseHandler):
2014-03-10 04:29:27 +00:00
def handle(self):
self.timeout = False
self.settimeout(0.01)
try:
self.rfile.read(10)
except TcpTimeout:
2014-03-10 04:29:27 +00:00
self.timeout = True
def test_timeout(self):
c = tcp.TCPClient(("127.0.0.1", self.port))
c.connect()
time.sleep(0.3)
assert self.last_handler.timeout
2015-06-22 02:52:23 +00:00
class TestTimeOut(tservers.ServerTestBase):
2013-01-25 03:03:59 +00:00
handler = HangHandler
def test_timeout(self):
c = tcp.TCPClient(("127.0.0.1", self.port))
2012-07-21 04:10:54 +00:00
c.connect()
c.settimeout(0.1)
assert c.gettimeout() == 0.1
tutils.raises(TcpTimeout, c.rfile.read, 10)
2012-07-21 04:10:54 +00:00
2015-06-22 02:52:23 +00:00
class TestALPNClient(tservers.ServerTestBase):
2015-06-15 15:31:08 +00:00
handler = ALPNHandler
2015-05-28 15:46:44 +00:00
ssl = dict(
2015-06-15 15:31:08 +00:00
alpn_select="bar"
2015-05-28 15:46:44 +00:00
)
if OpenSSL._util.lib.Cryptography_HAS_ALPN:
def test_alpn(self):
c = tcp.TCPClient(("127.0.0.1", self.port))
c.connect()
2015-06-15 15:31:08 +00:00
c.convert_to_ssl(alpn_protos=["foo", "bar", "fasel"])
assert c.get_alpn_proto_negotiated() == "bar"
assert c.rfile.readline().strip() == "bar"
2015-05-28 15:46:44 +00:00
2015-06-12 13:21:23 +00:00
def test_no_alpn(self):
c = tcp.TCPClient(("127.0.0.1", self.port))
c.connect()
2015-06-15 15:31:08 +00:00
c.convert_to_ssl()
assert c.get_alpn_proto_negotiated() == ""
assert c.rfile.readline().strip() == "NONE"
2015-06-12 13:21:23 +00:00
else:
def test_none_alpn(self):
c = tcp.TCPClient(("127.0.0.1", self.port))
c.connect()
2015-06-15 15:31:08 +00:00
c.convert_to_ssl(alpn_protos=["foo", "bar", "fasel"])
assert c.get_alpn_proto_negotiated() == ""
assert c.rfile.readline() == "NONE"
2015-06-22 02:52:23 +00:00
class TestNoSSLNoALPNClient(tservers.ServerTestBase):
2015-06-15 15:31:08 +00:00
handler = ALPNHandler
def test_no_ssl_no_alpn(self):
c = tcp.TCPClient(("127.0.0.1", self.port))
c.connect()
assert c.get_alpn_proto_negotiated() == ""
assert c.rfile.readline().strip() == "NONE"
2015-05-28 15:46:44 +00:00
2015-06-22 02:52:23 +00:00
class TestSSLTimeOut(tservers.ServerTestBase):
2013-01-25 03:03:59 +00:00
handler = HangHandler
ssl = True
2012-07-21 04:10:54 +00:00
def test_timeout_client(self):
c = tcp.TCPClient(("127.0.0.1", self.port))
2012-07-21 04:10:54 +00:00
c.connect()
c.convert_to_ssl()
c.settimeout(0.1)
tutils.raises(TcpTimeout, c.rfile.read, 10)
2012-07-21 04:10:54 +00:00
2015-06-22 02:52:23 +00:00
class TestDHParams(tservers.ServerTestBase):
2014-03-07 03:38:50 +00:00
handler = HangHandler
ssl = dict(
dhparams=certutils.CertStore.load_dhparam(
2014-03-07 03:38:50 +00:00
tutils.test_data.path("data/dhparam.pem"),
),
cipher_list="DHE-RSA-AES256-SHA"
2014-03-07 03:38:50 +00:00
)
2014-03-07 03:38:50 +00:00
def test_dhparams(self):
c = tcp.TCPClient(("127.0.0.1", self.port))
c.connect()
c.convert_to_ssl()
ret = c.get_current_cipher()
assert ret[0] == "DHE-RSA-AES256-SHA"
2015-02-27 21:02:52 +00:00
def test_create_dhparams(self):
with tutils.tmpdir() as d:
filename = os.path.join(d, "dhparam.pem")
certutils.CertStore.load_dhparam(filename)
assert os.path.exists(filename)
2014-03-07 03:38:50 +00:00
2014-03-10 04:29:27 +00:00
2012-06-18 21:42:32 +00:00
class TestTCPClient:
2012-06-18 21:42:32 +00:00
def test_conerr(self):
c = tcp.TCPClient(("127.0.0.1", 0))
tutils.raises(TcpException, c.connect)
2012-06-18 21:42:32 +00:00
class TestFileLike:
2012-10-09 03:25:15 +00:00
def test_blocksize(self):
s = cStringIO.StringIO("1234567890abcdefghijklmnopqrstuvwxyz")
s = tcp.Reader(s)
s.BLOCKSIZE = 2
assert s.read(1) == "1"
assert s.read(2) == "23"
assert s.read(3) == "456"
assert s.read(4) == "7890"
d = s.read(-1)
assert d.startswith("abc") and d.endswith("xyz")
2012-06-18 21:42:32 +00:00
def test_wrap(self):
s = cStringIO.StringIO("foobar\nfoobar")
s.flush()
s = tcp.Reader(s)
2012-06-18 21:42:32 +00:00
assert s.readline() == "foobar\n"
assert s.readline() == "foobar"
# Test __getattr__
assert s.isatty
def test_limit(self):
s = cStringIO.StringIO("foobar\nfoobar")
s = tcp.Reader(s)
2012-06-18 21:42:32 +00:00
assert s.readline(3) == "foo"
def test_limitless(self):
s = cStringIO.StringIO("f" * (50 * 1024))
s = tcp.Reader(s)
ret = s.read(-1)
assert len(ret) == 50 * 1024
def test_readlog(self):
s = cStringIO.StringIO("foobar\nfoobar")
s = tcp.Reader(s)
assert not s.is_logging()
s.start_log()
assert s.is_logging()
s.readline()
assert s.get_log() == "foobar\n"
s.read(1)
assert s.get_log() == "foobar\nf"
s.start_log()
assert s.get_log() == ""
s.read(1)
assert s.get_log() == "o"
s.stop_log()
tutils.raises(ValueError, s.get_log)
def test_writelog(self):
s = cStringIO.StringIO()
s = tcp.Writer(s)
s.start_log()
assert s.is_logging()
s.write("x")
assert s.get_log() == "x"
s.write("x")
assert s.get_log() == "xx"
def test_writer_flush_error(self):
s = cStringIO.StringIO()
s = tcp.Writer(s)
o = mock.MagicMock()
o.flush = mock.MagicMock(side_effect=socket.error)
s.o = o
tutils.raises(TcpDisconnect, s.flush)
def test_reader_read_error(self):
s = cStringIO.StringIO("foobar\nfoobar")
s = tcp.Reader(s)
o = mock.MagicMock()
o.read = mock.MagicMock(side_effect=socket.error)
s.o = o
tutils.raises(TcpDisconnect, s.read, 10)
def test_reset_timestamps(self):
s = cStringIO.StringIO("foobar\nfoobar")
s = tcp.Reader(s)
s.first_byte_timestamp = 500
s.reset_timestamps()
assert not s.first_byte_timestamp
def test_first_byte_timestamp_updated_on_read(self):
s = cStringIO.StringIO("foobar\nfoobar")
s = tcp.Reader(s)
s.read(1)
assert s.first_byte_timestamp
expected = s.first_byte_timestamp
s.read(5)
assert s.first_byte_timestamp == expected
def test_first_byte_timestamp_updated_on_readline(self):
s = cStringIO.StringIO("foobar\nfoobar\nfoobar")
s = tcp.Reader(s)
s.readline()
assert s.first_byte_timestamp
expected = s.first_byte_timestamp
s.readline()
assert s.first_byte_timestamp == expected
2013-01-27 06:21:18 +00:00
def test_read_ssl_error(self):
s = mock.MagicMock()
s.read = mock.MagicMock(side_effect=SSL.Error())
s = tcp.Reader(s)
tutils.raises(TlsException, s.read, 1)
2015-02-27 21:02:52 +00:00
def test_read_syscall_ssl_error(self):
s = mock.MagicMock()
s.read = mock.MagicMock(side_effect=SSL.SysCallError())
s = tcp.Reader(s)
tutils.raises(TlsException, s.read, 1)
2015-02-27 21:02:52 +00:00
def test_reader_readline_disconnect(self):
o = mock.MagicMock()
o.read = mock.MagicMock(side_effect=socket.error)
s = tcp.Reader(o)
tutils.raises(TcpDisconnect, s.readline, 10)
2015-06-05 17:39:15 +00:00
def test_reader_incomplete_error(self):
s = cStringIO.StringIO("foobar")
s = tcp.Reader(s)
tutils.raises(TcpReadIncomplete, s.safe_read, 10)
2015-06-05 17:39:15 +00:00
class TestAddress:
def test_simple(self):
a = tcp.Address("localhost", True)
assert a.use_ipv6
b = tcp.Address("foo.com", True)
assert not a == b
2015-05-28 15:45:54 +00:00
assert str(b) == str(tuple("foo.com"))
c = tcp.Address("localhost", True)
assert a == c
2015-02-27 21:02:52 +00:00
assert not a != c
assert repr(a)
2015-06-22 02:52:23 +00:00
class TestSSLKeyLogger(tservers.ServerTestBase):
2015-02-27 21:02:52 +00:00
handler = EchoHandler
ssl = dict(
cipher_list="AES256-SHA"
)
2015-02-27 21:02:52 +00:00
def test_log(self):
testval = "echo!\n"
2015-02-27 21:02:52 +00:00
_logfun = tcp.log_ssl_key
with tutils.tmpdir() as d:
logfile = os.path.join(d, "foo", "bar", "logfile")
tcp.log_ssl_key = tcp.SSLKeyLogger(logfile)
2015-02-27 21:02:52 +00:00
c = tcp.TCPClient(("127.0.0.1", self.port))
c.connect()
c.convert_to_ssl()
c.wfile.write(testval)
c.wfile.flush()
assert c.rfile.readline() == testval
2015-02-27 21:27:23 +00:00
c.finish()
2015-02-27 21:02:52 +00:00
tcp.log_ssl_key.close()
with open(logfile, "rb") as f:
assert f.read().count("CLIENT_RANDOM") == 2
tcp.log_ssl_key = _logfun
def test_create_logfun(self):
2015-05-30 00:02:58 +00:00
assert isinstance(
tcp.SSLKeyLogger.create_logfun("test"),
tcp.SSLKeyLogger)
assert not tcp.SSLKeyLogger.create_logfun(False)