diff options
author | Frederik Wedel-Heinen <frederik.wedel-heinen@dencrypt.dk> | 2024-05-30 11:50:54 +0200 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2024-06-27 15:01:01 +0100 |
commit | 8ce0641f7d314b6fe97430d98f202d7e186dab4f (patch) | |
tree | f55053cd016e79e3b2e6604fc63c8ad81df73114 | |
parent | a022d72aaac1a593fca6fb0bc616b63b819fa59e (diff) | |
download | openssl-8ce0641f7d314b6fe97430d98f202d7e186dab4f.zip openssl-8ce0641f7d314b6fe97430d98f202d7e186dab4f.tar.gz openssl-8ce0641f7d314b6fe97430d98f202d7e186dab4f.tar.bz2 |
Run 70-test_tls13messages.t with dtls
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/24525)
-rw-r--r-- | test/recipes/70-test_tls13messages.t | 413 |
1 files changed, 237 insertions, 176 deletions
diff --git a/test/recipes/70-test_tls13messages.t b/test/recipes/70-test_tls13messages.t index f8b5bf9..9f2ce6d 100644 --- a/test/recipes/70-test_tls13messages.t +++ b/test/recipes/70-test_tls13messages.t @@ -25,9 +25,6 @@ plan skip_all => "$test_name needs the dynamic engine feature enabled" plan skip_all => "$test_name needs the sock feature enabled" if disabled("sock"); -plan skip_all => "$test_name needs TLSv1.3 enabled" - if disabled("tls1_3"); - plan skip_all => "$test_name needs EC enabled" if disabled("ec"); @@ -199,201 +196,265 @@ plan skip_all => "$test_name needs EC enabled" [0,0,0,0] ); -my $proxy = TLSProxy::Proxy->new( - undef, - cmdstr(app(["openssl"]), display => 1), - srctop_file("apps", "server.pem"), - (!$ENV{HARNESS_ACTIVE} || $ENV{HARNESS_VERBOSE}) -); +my $testcount = 17; -#Test 1: Check we get all the right messages for a default handshake -(undef, my $session) = tempfile(); -$proxy->serverconnects(2); -$proxy->clientflags("-no_rx_cert_comp -sess_out ".$session); -$proxy->sessionfile($session); -$proxy->start() or plan skip_all => "Unable to start up Proxy for tests"; -plan tests => 17; -checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE, - checkhandshake::DEFAULT_EXTENSIONS, - "Default handshake test"); - -#Test 2: Resumption handshake -$proxy->clearClient(); -$proxy->clientflags("-no_rx_cert_comp -sess_in ".$session); -$proxy->clientstart(); -checkhandshake($proxy, checkhandshake::RESUME_HANDSHAKE, - (checkhandshake::DEFAULT_EXTENSIONS - | checkhandshake::PSK_CLI_EXTENSION - | checkhandshake::PSK_SRV_EXTENSION), - "Resumption handshake test"); +plan tests => 2 * $testcount; + +SKIP: { + skip "TLS 1.3 is disabled", $testcount if disabled("tls1_3"); + # Run tests with TLS + run_tests(0); +} SKIP: { - skip "No OCSP support in this OpenSSL build", 4 - if disabled("ct") || disabled("ec") || disabled("ocsp"); - #Test 3: A status_request handshake (client request only) + skip "DTLS 1.3 is disabled", $testcount if disabled("dtls1_3"); + skip "DTLSProxy does not work on Windows", $testcount if $^O =~ /^(MSWin32)$/; + run_tests(1); +} + +sub run_tests +{ + my $run_test_as_dtls = shift; + my $proxy_start_success = 0; + + (undef, my $session) = tempfile(); + my $proxy; + if ($run_test_as_dtls == 1) { + $proxy = TLSProxy::Proxy->new_dtls( + undef, + cmdstr(app([ "openssl" ]), display => 1), + srctop_file("apps", "server.pem"), + (!$ENV{HARNESS_ACTIVE} || $ENV{HARNESS_VERBOSE}) + ); + } + else { + $proxy = TLSProxy::Proxy->new( + undef, + cmdstr(app([ "openssl" ]), display => 1), + srctop_file("apps", "server.pem"), + (!$ENV{HARNESS_ACTIVE} || $ENV{HARNESS_VERBOSE}) + ); + } + + $proxy->clear(); + + SKIP: { + skip "TODO(DTLSv1.3): When enabling sessionfile and dtls TLSProxy hangs" + ." after the handshake.", 2 if $run_test_as_dtls == 1; + #Test 1: Check we get all the right messages for a default handshake + $proxy->serverconnects(2); + $proxy->clientflags("-no_rx_cert_comp -sess_out " . $session); + $proxy->sessionfile($session); + $proxy_start_success = $proxy->start(); + skip "TLSProxy did not start correctly", $testcount if $proxy_start_success == 0; + checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE, + checkhandshake::DEFAULT_EXTENSIONS, + "Default handshake test"); + + #Test 2: Resumption handshake + $proxy->clearClient(); + $proxy->clientflags("-no_rx_cert_comp -sess_in " . $session); + $proxy->clientstart(); + checkhandshake($proxy, checkhandshake::RESUME_HANDSHAKE, + (checkhandshake::DEFAULT_EXTENSIONS + | checkhandshake::PSK_CLI_EXTENSION + | checkhandshake::PSK_SRV_EXTENSION), + "Resumption handshake test"); + } + + SKIP: { + skip "No OCSP support in this OpenSSL build", 4 + if disabled("ct") || disabled("ec") || disabled("ocsp"); + #Test 3: A status_request handshake (client request only) + $proxy->clear(); + $proxy->clientflags("-no_rx_cert_comp -status"); + $proxy_start_success = $proxy->start(); + skip "TLSProxy did not start correctly", 4 if $proxy_start_success == 0; + checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE, + checkhandshake::DEFAULT_EXTENSIONS + | checkhandshake::STATUS_REQUEST_CLI_EXTENSION, + "status_request handshake test (client)"); + + #Test 4: A status_request handshake (server support only) + $proxy->clear(); + $proxy->clientflags("-no_rx_cert_comp"); + $proxy->serverflags("-no_rx_cert_comp -status_file " + . srctop_file("test", "recipes", "ocsp-response.der")); + $proxy->start(); + checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE, + checkhandshake::DEFAULT_EXTENSIONS, + "status_request handshake test (server)"); + + SKIP: { + skip "TLSProxy does not support partial messages for dtls", 2 + if $run_test_as_dtls == 1; + #Test 5: A status_request handshake (client and server) + $proxy->clear(); + $proxy->clientflags("-no_rx_cert_comp -status"); + $proxy->serverflags("-no_rx_cert_comp -status_file " + . srctop_file("test", "recipes", "ocsp-response.der")); + $proxy->start(); + checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE, + checkhandshake::DEFAULT_EXTENSIONS + | checkhandshake::STATUS_REQUEST_CLI_EXTENSION + | checkhandshake::STATUS_REQUEST_SRV_EXTENSION, + "status_request handshake test"); + + #Test 6: A status_request handshake (client and server) with client auth + $proxy->clear(); + $proxy->clientflags("-no_rx_cert_comp -status -enable_pha -cert " + . srctop_file("apps", "server.pem")); + $proxy->serverflags("-no_rx_cert_comp -Verify 5 -status_file " + . srctop_file("test", "recipes", "ocsp-response.der")); + $proxy->start(); + checkhandshake($proxy, checkhandshake::CLIENT_AUTH_HANDSHAKE, + checkhandshake::DEFAULT_EXTENSIONS + | checkhandshake::STATUS_REQUEST_CLI_EXTENSION + | checkhandshake::STATUS_REQUEST_SRV_EXTENSION + | checkhandshake::POST_HANDSHAKE_AUTH_CLI_EXTENSION, + "status_request handshake with client auth test"); + } + } + + SKIP: { + skip "TLSProxy does not support partial messages for dtls", 1 + if $run_test_as_dtls == 1; + #Test 7: A client auth handshake + $proxy->clear(); + $proxy->clientflags("-no_rx_cert_comp -enable_pha -cert " . srctop_file("apps", "server.pem")); + $proxy->serverflags("-no_rx_cert_comp -Verify 5"); + $proxy_start_success = $proxy->start(); + skip "TLSProxy did not start correctly", $testcount - 6 if $proxy_start_success == 0; + checkhandshake($proxy, checkhandshake::CLIENT_AUTH_HANDSHAKE, + checkhandshake::DEFAULT_EXTENSIONS | + checkhandshake::POST_HANDSHAKE_AUTH_CLI_EXTENSION, + "Client auth handshake test"); + } + + #Test 8: Server name handshake (no client request) $proxy->clear(); - $proxy->clientflags("-no_rx_cert_comp -status"); + $proxy->clientflags("-no_rx_cert_comp -noservername"); $proxy->start(); checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE, - checkhandshake::DEFAULT_EXTENSIONS - | checkhandshake::STATUS_REQUEST_CLI_EXTENSION, - "status_request handshake test (client)"); + checkhandshake::DEFAULT_EXTENSIONS + & ~checkhandshake::SERVER_NAME_CLI_EXTENSION, + "Server name handshake test (client)"); - #Test 4: A status_request handshake (server support only) + #Test 9: Server name handshake (server support only) $proxy->clear(); - $proxy->clientflags("-no_rx_cert_comp"); - $proxy->serverflags("-no_rx_cert_comp -status_file " - .srctop_file("test", "recipes", "ocsp-response.der")); + $proxy->clientflags("-no_rx_cert_comp -noservername"); + $proxy->serverflags("-no_rx_cert_comp -servername testhost"); $proxy->start(); checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE, - checkhandshake::DEFAULT_EXTENSIONS, - "status_request handshake test (server)"); + checkhandshake::DEFAULT_EXTENSIONS + & ~checkhandshake::SERVER_NAME_CLI_EXTENSION, + "Server name handshake test (server)"); - #Test 5: A status_request handshake (client and server) + #Test 10: Server name handshake (client and server) $proxy->clear(); - $proxy->clientflags("-no_rx_cert_comp -status"); - $proxy->serverflags("-no_rx_cert_comp -status_file " - .srctop_file("test", "recipes", "ocsp-response.der")); + $proxy->clientflags("-no_rx_cert_comp -servername testhost"); + $proxy->serverflags("-no_rx_cert_comp -servername testhost"); $proxy->start(); checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE, - checkhandshake::DEFAULT_EXTENSIONS - | checkhandshake::STATUS_REQUEST_CLI_EXTENSION - | checkhandshake::STATUS_REQUEST_SRV_EXTENSION, - "status_request handshake test"); + checkhandshake::DEFAULT_EXTENSIONS + | checkhandshake::SERVER_NAME_SRV_EXTENSION, + "Server name handshake test"); - #Test 6: A status_request handshake (client and server) with client auth + #Test 11: ALPN handshake (client request only) $proxy->clear(); - $proxy->clientflags("-no_rx_cert_comp -status -enable_pha -cert " - .srctop_file("apps", "server.pem")); - $proxy->serverflags("-no_rx_cert_comp -Verify 5 -status_file " - .srctop_file("test", "recipes", "ocsp-response.der")); + $proxy->clientflags("-no_rx_cert_comp -alpn test"); $proxy->start(); - checkhandshake($proxy, checkhandshake::CLIENT_AUTH_HANDSHAKE, - checkhandshake::DEFAULT_EXTENSIONS - | checkhandshake::STATUS_REQUEST_CLI_EXTENSION - | checkhandshake::STATUS_REQUEST_SRV_EXTENSION - | checkhandshake::POST_HANDSHAKE_AUTH_CLI_EXTENSION, - "status_request handshake with client auth test"); -} - -#Test 7: A client auth handshake -$proxy->clear(); -$proxy->clientflags("-no_rx_cert_comp -enable_pha -cert ".srctop_file("apps", "server.pem")); -$proxy->serverflags("-no_rx_cert_comp -Verify 5"); -$proxy->start(); -checkhandshake($proxy, checkhandshake::CLIENT_AUTH_HANDSHAKE, - checkhandshake::DEFAULT_EXTENSIONS | - checkhandshake::POST_HANDSHAKE_AUTH_CLI_EXTENSION, - "Client auth handshake test"); - -#Test 8: Server name handshake (no client request) -$proxy->clear(); -$proxy->clientflags("-no_rx_cert_comp -noservername"); -$proxy->start(); -checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE, - checkhandshake::DEFAULT_EXTENSIONS - & ~checkhandshake::SERVER_NAME_CLI_EXTENSION, - "Server name handshake test (client)"); - -#Test 9: Server name handshake (server support only) -$proxy->clear(); -$proxy->clientflags("-no_rx_cert_comp -noservername"); -$proxy->serverflags("-no_rx_cert_comp -servername testhost"); -$proxy->start(); -checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE, - checkhandshake::DEFAULT_EXTENSIONS - & ~checkhandshake::SERVER_NAME_CLI_EXTENSION, - "Server name handshake test (server)"); - -#Test 10: Server name handshake (client and server) -$proxy->clear(); -$proxy->clientflags("-no_rx_cert_comp -servername testhost"); -$proxy->serverflags("-no_rx_cert_comp -servername testhost"); -$proxy->start(); -checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE, - checkhandshake::DEFAULT_EXTENSIONS - | checkhandshake::SERVER_NAME_SRV_EXTENSION, - "Server name handshake test"); - -#Test 11: ALPN handshake (client request only) -$proxy->clear(); -$proxy->clientflags("-no_rx_cert_comp -alpn test"); -$proxy->start(); -checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE, - checkhandshake::DEFAULT_EXTENSIONS - | checkhandshake::ALPN_CLI_EXTENSION, - "ALPN handshake test (client)"); - -#Test 12: ALPN handshake (server support only) -$proxy->clear(); -$proxy->clientflags("-no_rx_cert_comp"); -$proxy->serverflags("-no_rx_cert_comp -alpn test"); -$proxy->start(); -checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE, - checkhandshake::DEFAULT_EXTENSIONS, - "ALPN handshake test (server)"); - -#Test 13: ALPN handshake (client and server) -$proxy->clear(); -$proxy->clientflags("-no_rx_cert_comp -alpn test"); -$proxy->serverflags("-no_rx_cert_comp -alpn test"); -$proxy->start(); -checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE, - checkhandshake::DEFAULT_EXTENSIONS - | checkhandshake::ALPN_CLI_EXTENSION - | checkhandshake::ALPN_SRV_EXTENSION, - "ALPN handshake test"); - -SKIP: { - skip "No CT, EC or OCSP support in this OpenSSL build", 1 - if disabled("ct") || disabled("ec") || disabled("ocsp"); + checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE, + checkhandshake::DEFAULT_EXTENSIONS + | checkhandshake::ALPN_CLI_EXTENSION, + "ALPN handshake test (client)"); - #Test 14: SCT handshake (client request only) + #Test 12: ALPN handshake (server support only) $proxy->clear(); - #Note: -ct also sends status_request - $proxy->clientflags("-no_rx_cert_comp -ct"); - $proxy->serverflags("-no_rx_cert_comp -status_file " - .srctop_file("test", "recipes", "ocsp-response.der") - ." -serverinfo ".srctop_file("test", "serverinfo2.pem")); + $proxy->clientflags("-no_rx_cert_comp"); + $proxy->serverflags("-no_rx_cert_comp -alpn test"); $proxy->start(); checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE, - checkhandshake::DEFAULT_EXTENSIONS - | checkhandshake::SCT_CLI_EXTENSION - | checkhandshake::SCT_SRV_EXTENSION - | checkhandshake::STATUS_REQUEST_CLI_EXTENSION - | checkhandshake::STATUS_REQUEST_SRV_EXTENSION, - "SCT handshake test"); -} + checkhandshake::DEFAULT_EXTENSIONS, + "ALPN handshake test (server)"); -#Test 15: HRR Handshake -$proxy->clear(); -$proxy->clientflags("-no_rx_cert_comp"); -$proxy->serverflags("-no_rx_cert_comp -curves P-384"); -$proxy->start(); -checkhandshake($proxy, checkhandshake::HRR_HANDSHAKE, - checkhandshake::DEFAULT_EXTENSIONS - | checkhandshake::KEY_SHARE_HRR_EXTENSION, - "HRR handshake test"); - -#Test 16: Resumption handshake with HRR -$proxy->clear(); -$proxy->clientflags("-no_rx_cert_comp -sess_in ".$session); -$proxy->serverflags("-no_rx_cert_comp -curves P-384"); -$proxy->start(); -checkhandshake($proxy, checkhandshake::HRR_RESUME_HANDSHAKE, - (checkhandshake::DEFAULT_EXTENSIONS + #Test 13: ALPN handshake (client and server) + $proxy->clear(); + $proxy->clientflags("-no_rx_cert_comp -alpn test"); + $proxy->serverflags("-no_rx_cert_comp -alpn test"); + $proxy->start(); + checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE, + checkhandshake::DEFAULT_EXTENSIONS + | checkhandshake::ALPN_CLI_EXTENSION + | checkhandshake::ALPN_SRV_EXTENSION, + "ALPN handshake test"); + + SKIP: { + skip "No CT, EC or OCSP support in this OpenSSL build", 1 + if disabled("ct") || disabled("ec") || disabled("ocsp"); + skip "TLSProxy does not support partial messages for dtls", 1 + if $run_test_as_dtls == 1; + + #Test 14: SCT handshake (client request only) + $proxy->clear(); + #Note: -ct also sends status_request + $proxy->clientflags("-no_rx_cert_comp -ct"); + $proxy->serverflags("-no_rx_cert_comp -status_file " + . srctop_file("test", "recipes", "ocsp-response.der") + . " -serverinfo " . srctop_file("test", "serverinfo2.pem")); + $proxy->start(); + checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE, + checkhandshake::DEFAULT_EXTENSIONS + | checkhandshake::SCT_CLI_EXTENSION + | checkhandshake::SCT_SRV_EXTENSION + | checkhandshake::STATUS_REQUEST_CLI_EXTENSION + | checkhandshake::STATUS_REQUEST_SRV_EXTENSION, + "SCT handshake test"); + } + + SKIP: { + skip "TLSProxy does not support partial messages for dtls", 1 + if $run_test_as_dtls == 1; + #Test 15: HRR Handshake + $proxy->clear(); + $proxy->clientflags("-no_rx_cert_comp"); + $proxy->serverflags("-no_rx_cert_comp -curves P-384"); + $proxy->start(); + checkhandshake($proxy, checkhandshake::HRR_HANDSHAKE, + checkhandshake::DEFAULT_EXTENSIONS + | checkhandshake::KEY_SHARE_HRR_EXTENSION, + "HRR handshake test"); + } + + SKIP: { + skip "TODO(DTLSv1.3): When enabling sessionfile and dtls TLSProxy hangs" + . " after the handshake.", 1 if $run_test_as_dtls == 1; + #Test 16: Resumption handshake with HRR + $proxy->clear(); + $proxy->clientflags("-no_rx_cert_comp -sess_in " . $session); + $proxy->serverflags("-no_rx_cert_comp -curves P-384"); + $proxy->start(); + checkhandshake($proxy, checkhandshake::HRR_RESUME_HANDSHAKE, + (checkhandshake::DEFAULT_EXTENSIONS | checkhandshake::KEY_SHARE_HRR_EXTENSION | checkhandshake::PSK_CLI_EXTENSION | checkhandshake::PSK_SRV_EXTENSION), - "Resumption handshake with HRR test"); - -#Test 17: Acceptable but non preferred key_share -$proxy->clear(); -$proxy->clientflags("-no_rx_cert_comp -curves P-384"); -$proxy->start(); -checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE, - checkhandshake::DEFAULT_EXTENSIONS - | checkhandshake::SUPPORTED_GROUPS_SRV_EXTENSION, - "Acceptable but non preferred key_share"); - -unlink $session; + "Resumption handshake with HRR test"); + } + + + SKIP: { + skip "TLSProxy does not support partial messages for dtls", 1 + if $run_test_as_dtls == 1; + #Test 17: Acceptable but non preferred key_share + $proxy->clear(); + $proxy->clientflags("-no_rx_cert_comp -curves P-384"); + $proxy->start(); + checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE, + checkhandshake::DEFAULT_EXTENSIONS + | checkhandshake::SUPPORTED_GROUPS_SRV_EXTENSION, + "Acceptable but non preferred key_share"); + } + + unlink $session; +} |