2016-11-15 13:26:12 +00:00
|
|
|
#! /usr/bin/env perl
|
|
|
|
# Copyright 2015-2016 The OpenSSL Project Authors. All Rights Reserved.
|
|
|
|
#
|
|
|
|
# Licensed under the OpenSSL license (the "License"). You may not use
|
|
|
|
# this file except in compliance with the License. You can obtain a copy
|
|
|
|
# in the file LICENSE in the source distribution or at
|
|
|
|
# https://www.openssl.org/source/license.html
|
|
|
|
|
|
|
|
use strict;
|
2016-11-29 17:34:10 +00:00
|
|
|
use OpenSSL::Test qw/:DEFAULT cmdstr srctop_file srctop_dir bldtop_dir/;
|
2016-11-15 13:26:12 +00:00
|
|
|
use OpenSSL::Test::Utils;
|
2016-11-15 14:53:37 +00:00
|
|
|
use File::Temp qw(tempfile);
|
2016-11-15 13:26:12 +00:00
|
|
|
use TLSProxy::Proxy;
|
2016-11-29 17:34:10 +00:00
|
|
|
|
2016-11-30 12:04:34 +00:00
|
|
|
my $test_name;
|
|
|
|
|
2016-11-29 17:34:10 +00:00
|
|
|
# This block needs to run before 'use lib srctop_dir' directives.
|
|
|
|
BEGIN {
|
2016-11-30 12:04:34 +00:00
|
|
|
$test_name = "test_tls13messages";
|
|
|
|
OpenSSL::Test::setup($test_name);
|
2016-11-29 17:34:10 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
use lib srctop_dir("test", "recipes");
|
|
|
|
|
|
|
|
use recipes::checkhandshake qw(checkhandshake @handmessages @extensions);
|
|
|
|
|
2016-11-15 13:26:12 +00:00
|
|
|
plan skip_all => "TLSProxy isn't usable on $^O"
|
|
|
|
if $^O =~ /^(VMS|MSWin32)$/;
|
|
|
|
|
|
|
|
plan skip_all => "$test_name needs the dynamic engine feature enabled"
|
|
|
|
if disabled("engine") || disabled("dynamic-engine");
|
|
|
|
|
|
|
|
plan skip_all => "$test_name needs the sock feature enabled"
|
|
|
|
if disabled("sock");
|
|
|
|
|
|
|
|
plan skip_all => "$test_name needs TLSv1.3 enabled"
|
|
|
|
if disabled("tls1_3");
|
|
|
|
|
|
|
|
$ENV{OPENSSL_ia32cap} = '~0x200000200000000';
|
2016-11-28 22:39:23 +00:00
|
|
|
$ENV{CTLOG_FILE} = srctop_file("test", "ct", "log_list.conf");
|
2016-11-15 13:26:12 +00:00
|
|
|
|
|
|
|
|
2016-11-29 17:34:10 +00:00
|
|
|
@handmessages = (
|
|
|
|
[TLSProxy::Message::MT_CLIENT_HELLO,
|
|
|
|
recipes::checkhandshake::ALL_HANDSHAKES],
|
|
|
|
[TLSProxy::Message::MT_SERVER_HELLO,
|
|
|
|
recipes::checkhandshake::ALL_HANDSHAKES],
|
|
|
|
[TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS,
|
|
|
|
recipes::checkhandshake::ALL_HANDSHAKES],
|
|
|
|
[TLSProxy::Message::MT_CERTIFICATE_REQUEST,
|
|
|
|
recipes::checkhandshake::CLIENT_AUTH_HANDSHAKE],
|
|
|
|
[TLSProxy::Message::MT_CERTIFICATE,
|
|
|
|
recipes::checkhandshake::ALL_HANDSHAKES & ~recipes::checkhandshake::RESUME_HANDSHAKE],
|
|
|
|
[TLSProxy::Message::MT_CERTIFICATE_STATUS,
|
|
|
|
recipes::checkhandshake::OCSP_HANDSHAKE],
|
|
|
|
[TLSProxy::Message::MT_FINISHED,
|
|
|
|
recipes::checkhandshake::ALL_HANDSHAKES],
|
|
|
|
[TLSProxy::Message::MT_CERTIFICATE,
|
|
|
|
recipes::checkhandshake::CLIENT_AUTH_HANDSHAKE],
|
|
|
|
[TLSProxy::Message::MT_CERTIFICATE_VERIFY,
|
|
|
|
recipes::checkhandshake::CLIENT_AUTH_HANDSHAKE],
|
|
|
|
[TLSProxy::Message::MT_FINISHED,
|
|
|
|
recipes::checkhandshake::ALL_HANDSHAKES],
|
2016-11-15 13:26:12 +00:00
|
|
|
[0, 0]
|
|
|
|
);
|
|
|
|
|
2016-11-29 17:34:10 +00:00
|
|
|
@extensions = (
|
|
|
|
[TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_SERVER_NAME,
|
|
|
|
recipes::checkhandshake::SERVER_NAME_CLI_EXTENSION],
|
|
|
|
[TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_STATUS_REQUEST,
|
|
|
|
recipes::checkhandshake::STATUS_REQUEST_CLI_EXTENSION],
|
|
|
|
[TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_SUPPORTED_GROUPS,
|
|
|
|
recipes::checkhandshake::DEFAULT_EXTENSIONS],
|
|
|
|
[TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_EC_POINT_FORMATS,
|
|
|
|
recipes::checkhandshake::DEFAULT_EXTENSIONS],
|
|
|
|
[TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_SIG_ALGS,
|
|
|
|
recipes::checkhandshake::DEFAULT_EXTENSIONS],
|
|
|
|
[TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_ALPN,
|
|
|
|
recipes::checkhandshake::ALPN_CLI_EXTENSION],
|
|
|
|
[TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_SCT,
|
|
|
|
recipes::checkhandshake::SCT_CLI_EXTENSION],
|
|
|
|
[TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_ENCRYPT_THEN_MAC,
|
|
|
|
recipes::checkhandshake::DEFAULT_EXTENSIONS],
|
|
|
|
[TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_EXTENDED_MASTER_SECRET,
|
|
|
|
recipes::checkhandshake::DEFAULT_EXTENSIONS],
|
|
|
|
[TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_SESSION_TICKET,
|
|
|
|
recipes::checkhandshake::DEFAULT_EXTENSIONS],
|
|
|
|
[TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_KEY_SHARE,
|
|
|
|
recipes::checkhandshake::DEFAULT_EXTENSIONS],
|
|
|
|
[TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_SUPPORTED_VERSIONS,
|
|
|
|
recipes::checkhandshake::DEFAULT_EXTENSIONS],
|
|
|
|
|
|
|
|
[TLSProxy::Message::MT_SERVER_HELLO, TLSProxy::Message::EXT_KEY_SHARE,
|
|
|
|
recipes::checkhandshake::DEFAULT_EXTENSIONS],
|
|
|
|
|
|
|
|
[TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS, TLSProxy::Message::EXT_SERVER_NAME,
|
|
|
|
recipes::checkhandshake::SERVER_NAME_SRV_EXTENSION],
|
|
|
|
[TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS, TLSProxy::Message::EXT_STATUS_REQUEST,
|
|
|
|
recipes::checkhandshake::STATUS_REQUEST_SRV_EXTENSION],
|
|
|
|
[TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS, TLSProxy::Message::EXT_ALPN,
|
|
|
|
recipes::checkhandshake::ALPN_SRV_EXTENSION],
|
2016-11-28 22:39:23 +00:00
|
|
|
[0,0,0]
|
|
|
|
);
|
|
|
|
|
2016-11-15 13:26:12 +00:00
|
|
|
my $proxy = TLSProxy::Proxy->new(
|
|
|
|
undef,
|
|
|
|
cmdstr(app(["openssl"]), display => 1),
|
|
|
|
srctop_file("apps", "server.pem"),
|
|
|
|
(!$ENV{HARNESS_ACTIVE} || $ENV{HARNESS_VERBOSE})
|
|
|
|
);
|
|
|
|
|
|
|
|
#Test 1: Check we get all the right messages for a default handshake
|
2016-11-15 14:53:37 +00:00
|
|
|
(undef, my $session) = tempfile();
|
2016-11-07 13:50:43 +00:00
|
|
|
#$proxy->serverconnects(2);
|
2016-11-15 14:53:37 +00:00
|
|
|
$proxy->clientflags("-sess_out ".$session);
|
2016-11-15 13:26:12 +00:00
|
|
|
$proxy->start() or plan skip_all => "Unable to start up Proxy for tests";
|
2016-11-28 22:39:23 +00:00
|
|
|
plan tests => 12;
|
2016-11-29 17:34:10 +00:00
|
|
|
checkhandshake($proxy, recipes::checkhandshake::DEFAULT_HANDSHAKE,
|
|
|
|
recipes::checkhandshake::DEFAULT_EXTENSIONS,
|
|
|
|
"Default handshake test");
|
2016-11-15 13:26:12 +00:00
|
|
|
|
2016-11-07 13:50:43 +00:00
|
|
|
#TODO(TLS1.3): Test temporarily disabled until we implement TLS1.3 resumption
|
2016-11-15 14:53:37 +00:00
|
|
|
#Test 2: Resumption handshake
|
2016-11-07 13:50:43 +00:00
|
|
|
#$proxy->clearClient();
|
|
|
|
#$proxy->clientflags("-sess_in ".$session);
|
|
|
|
#$proxy->clientstart();
|
|
|
|
#checkmessages(RESUME_HANDSHAKE, "Resumption handshake test");
|
2016-11-15 14:53:37 +00:00
|
|
|
unlink $session;
|
|
|
|
|
2016-11-28 22:39:23 +00:00
|
|
|
#Test 3: A status_request handshake (client request only)
|
|
|
|
$proxy->clear();
|
|
|
|
$proxy->clientflags("-status");
|
|
|
|
$proxy->start();
|
2016-11-29 17:34:10 +00:00
|
|
|
checkhandshake($proxy, recipes::checkhandshake::DEFAULT_HANDSHAKE,
|
|
|
|
recipes::checkhandshake::DEFAULT_EXTENSIONS
|
|
|
|
| recipes::checkhandshake::STATUS_REQUEST_CLI_EXTENSION,
|
2016-11-28 22:39:23 +00:00
|
|
|
"status_request handshake test (client)");
|
|
|
|
|
|
|
|
#Test 4: A status_request handshake (server support only)
|
|
|
|
$proxy->clear();
|
|
|
|
$proxy->serverflags("-status_file "
|
|
|
|
.srctop_file("test", "recipes", "ocsp-response.der"));
|
|
|
|
$proxy->start();
|
2016-11-29 17:34:10 +00:00
|
|
|
checkhandshake($proxy, recipes::checkhandshake::DEFAULT_HANDSHAKE,
|
|
|
|
recipes::checkhandshake::DEFAULT_EXTENSIONS,
|
2016-11-28 22:39:23 +00:00
|
|
|
"status_request handshake test (server)");
|
|
|
|
|
|
|
|
#Test 5: A status_request handshake (client and server)
|
2016-11-15 14:53:37 +00:00
|
|
|
#TODO(TLS1.3): TLS1.3 doesn't actually have CertificateStatus messages. This is
|
|
|
|
#a temporary test until such time as we do proper TLS1.3 style certificate
|
|
|
|
#status
|
|
|
|
$proxy->clear();
|
|
|
|
$proxy->clientflags("-status");
|
|
|
|
$proxy->serverflags("-status_file "
|
|
|
|
.srctop_file("test", "recipes", "ocsp-response.der"));
|
|
|
|
$proxy->start();
|
2016-11-29 17:34:10 +00:00
|
|
|
checkhandshake($proxy, recipes::checkhandshake::OCSP_HANDSHAKE,
|
|
|
|
recipes::checkhandshake::DEFAULT_EXTENSIONS
|
|
|
|
| recipes::checkhandshake::STATUS_REQUEST_CLI_EXTENSION
|
|
|
|
| recipes::checkhandshake::STATUS_REQUEST_SRV_EXTENSION,
|
2016-11-28 22:39:23 +00:00
|
|
|
"status_request handshake test");
|
2016-11-15 14:53:37 +00:00
|
|
|
|
2016-11-28 22:39:23 +00:00
|
|
|
#Test 6: A client auth handshake
|
2016-11-15 14:53:37 +00:00
|
|
|
$proxy->clear();
|
|
|
|
$proxy->clientflags("-cert ".srctop_file("apps", "server.pem"));
|
|
|
|
$proxy->serverflags("-Verify 5");
|
|
|
|
$proxy->start();
|
2016-11-29 17:34:10 +00:00
|
|
|
checkhandshake($proxy, recipes::checkhandshake::CLIENT_AUTH_HANDSHAKE,
|
|
|
|
recipes::checkhandshake::DEFAULT_EXTENSIONS,
|
2016-11-28 22:39:23 +00:00
|
|
|
"Client auth handshake test");
|
2016-11-15 14:53:37 +00:00
|
|
|
|
2016-11-28 22:39:23 +00:00
|
|
|
#Test 7: Server name handshake (client request only)
|
|
|
|
$proxy->clear();
|
|
|
|
$proxy->clientflags("-servername testhost");
|
|
|
|
$proxy->start();
|
2016-11-29 17:34:10 +00:00
|
|
|
checkhandshake($proxy, recipes::checkhandshake::DEFAULT_HANDSHAKE,
|
|
|
|
recipes::checkhandshake::DEFAULT_EXTENSIONS
|
|
|
|
| recipes::checkhandshake::SERVER_NAME_CLI_EXTENSION,
|
2016-11-28 22:39:23 +00:00
|
|
|
"Server name handshake test (client)");
|
|
|
|
|
|
|
|
#Test 8: Server name handshake (server support only)
|
|
|
|
$proxy->clear();
|
|
|
|
$proxy->serverflags("-servername testhost");
|
|
|
|
$proxy->start();
|
2016-11-29 17:34:10 +00:00
|
|
|
checkhandshake($proxy, recipes::checkhandshake::DEFAULT_HANDSHAKE,
|
|
|
|
recipes::checkhandshake::DEFAULT_EXTENSIONS,
|
2016-11-28 22:39:23 +00:00
|
|
|
"Server name handshake test (server)");
|
|
|
|
|
|
|
|
#Test 9: Server name handshake (client and server)
|
|
|
|
$proxy->clear();
|
|
|
|
$proxy->clientflags("-servername testhost");
|
|
|
|
$proxy->serverflags("-servername testhost");
|
|
|
|
$proxy->start();
|
2016-11-29 17:34:10 +00:00
|
|
|
checkhandshake($proxy, recipes::checkhandshake::DEFAULT_HANDSHAKE,
|
|
|
|
recipes::checkhandshake::DEFAULT_EXTENSIONS
|
|
|
|
| recipes::checkhandshake::SERVER_NAME_CLI_EXTENSION
|
|
|
|
| recipes::checkhandshake::SERVER_NAME_SRV_EXTENSION,
|
2016-11-28 22:39:23 +00:00
|
|
|
"Server name handshake test");
|
|
|
|
|
|
|
|
#Test 10: ALPN handshake (client request only)
|
|
|
|
$proxy->clear();
|
|
|
|
$proxy->clientflags("-alpn test");
|
|
|
|
$proxy->start();
|
2016-11-29 17:34:10 +00:00
|
|
|
checkhandshake($proxy, recipes::checkhandshake::DEFAULT_HANDSHAKE,
|
|
|
|
recipes::checkhandshake::DEFAULT_EXTENSIONS
|
|
|
|
| recipes::checkhandshake::ALPN_CLI_EXTENSION,
|
2016-11-28 22:39:23 +00:00
|
|
|
"ALPN handshake test (client)");
|
|
|
|
|
|
|
|
#Test 11: ALPN handshake (server support only)
|
|
|
|
$proxy->clear();
|
|
|
|
$proxy->serverflags("-alpn test");
|
|
|
|
$proxy->start();
|
2016-11-29 17:34:10 +00:00
|
|
|
checkhandshake($proxy, recipes::checkhandshake::DEFAULT_HANDSHAKE,
|
|
|
|
recipes::checkhandshake::DEFAULT_EXTENSIONS,
|
2016-11-28 22:39:23 +00:00
|
|
|
"ALPN handshake test (server)");
|
|
|
|
|
|
|
|
#Test 12: ALPN handshake (client and server)
|
|
|
|
$proxy->clear();
|
|
|
|
$proxy->clientflags("-alpn test");
|
|
|
|
$proxy->serverflags("-alpn test");
|
|
|
|
$proxy->start();
|
2016-11-29 17:34:10 +00:00
|
|
|
checkhandshake($proxy, recipes::checkhandshake::DEFAULT_HANDSHAKE,
|
|
|
|
recipes::checkhandshake::DEFAULT_EXTENSIONS
|
|
|
|
| recipes::checkhandshake::ALPN_CLI_EXTENSION
|
|
|
|
| recipes::checkhandshake::ALPN_SRV_EXTENSION,
|
2016-11-28 22:39:23 +00:00
|
|
|
"ALPN handshake test");
|
|
|
|
|
|
|
|
#Test 13: SCT handshake (client request only)
|
|
|
|
#TODO(TLS1.3): This only checks that the client side extension appears. The
|
|
|
|
#SCT extension is unusual in that we have no built-in server side implementation
|
|
|
|
#The server side implementation can nomrally be added using the custom
|
|
|
|
#extensions framework (e.g. by using the "-serverinfo" s_server option). However
|
|
|
|
#currently we only support <= TLS1.2 for custom extensions because the existing
|
|
|
|
#framework and API has no knowledge of the TLS1.3 messages
|
|
|
|
$proxy->clear();
|
|
|
|
#Note: -ct also sends status_request
|
|
|
|
$proxy->clientflags("-ct");
|
|
|
|
$proxy->serverflags("-status_file "
|
|
|
|
.srctop_file("test", "recipes", "ocsp-response.der"));
|
|
|
|
$proxy->start();
|
2016-11-29 17:34:10 +00:00
|
|
|
checkhandshake($proxy, recipes::checkhandshake::OCSP_HANDSHAKE,
|
|
|
|
recipes::checkhandshake::DEFAULT_EXTENSIONS
|
|
|
|
| recipes::checkhandshake::SCT_CLI_EXTENSION
|
|
|
|
| recipes::checkhandshake::STATUS_REQUEST_CLI_EXTENSION
|
|
|
|
| recipes::checkhandshake::STATUS_REQUEST_SRV_EXTENSION,
|
2016-11-28 22:39:23 +00:00
|
|
|
"SCT handshake test");
|