describe("http.tls module", function() local tls = require "http.tls" local cqueues = require "cqueues" local ca = require "cqueues.auxlib" local cs = require "cqueues.socket" local openssl_ctx = require "openssl.ssl.context" local openssl_pkey = require "openssl.pkey" local openssl_x509 = require "openssl.x509" it("banned ciphers list denies a negotiated banned cipher", function() local banned_cipher_list do local t = {} for cipher in pairs(tls.banned_ciphers) do table.insert(t, cipher) end banned_cipher_list = table.concat(t, ":") end local s, c = ca.assert(cs.pair()) local cq = cqueues.new() cq:wrap(function() local ctx = openssl_ctx.new("TLSv1", false) assert(c:starttls(ctx)) local ssl = assert(s:checktls()) local cipher = ssl:getCipherInfo() assert(tls.banned_ciphers[cipher.name]) end) cq:wrap(function() local ctx = openssl_ctx.new("TLSv1", true) ctx:setCipherList(banned_cipher_list) ctx:setEphemeralKey(openssl_pkey.new{ type = "EC", curve = "prime256v1" }) local crt = openssl_x509.new() local key = openssl_pkey.new() crt:setPublicKey(key) crt:sign(key) assert(ctx:setPrivateKey(key)) assert(ctx:setCertificate(crt)) assert(s:starttls(ctx)) local ssl = assert(s:checktls()) local cipher = ssl:getCipherInfo() assert(tls.banned_ciphers[cipher.name]) end) assert_loop(cq, TEST_TIMEOUT) assert.truthy(cq:empty()) s:close() c:close() end) it("can create a new client context", function() tls.new_client_context() end) it("can create a new server context", function() tls.new_server_context() end) end)