123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210 |
- # -*- mode: perl; -*-
- # Copyright 2016-2021 The OpenSSL Project Authors. All Rights Reserved.
- #
- # Licensed under the Apache License 2.0 (the "License"). You may not use
- # this file except in compliance with the License. You can obtain a copy
- # in the file LICENSE in the source distribution or at
- # https://www.openssl.org/source/license.html
- ## Test Renegotiation
- use strict;
- use warnings;
- package ssltests;
- use OpenSSL::Test::Utils;
- our $fips_mode;
- our @tests = ();
- foreach my $sctp ("No", "Yes")
- {
- next if disabled("sctp") && $sctp eq "Yes";
- next if disabled("dtls1_2") && $fips_mode;
- my $suffix = ($sctp eq "No") ? "" : "-sctp";
- our @tests_basic = (
- {
- name => "renegotiate-client-no-resume".$suffix,
- server => {
- "CipherString" => 'DEFAULT:@SECLEVEL=0',
- "Options" => "NoResumptionOnRenegotiation"
- },
- client => {
- "CipherString" => 'DEFAULT:@SECLEVEL=0'
- },
- test => {
- "Method" => "DTLS",
- "UseSCTP" => $sctp,
- "HandshakeMode" => "RenegotiateClient",
- "ResumptionExpected" => "No",
- "ExpectedResult" => "Success"
- }
- },
- {
- name => "renegotiate-client-resume".$suffix,
- server => {
- "CipherString" => 'DEFAULT:@SECLEVEL=0'
- },
- client => {
- "CipherString" => 'DEFAULT:@SECLEVEL=0'
- },
- test => {
- "Method" => "DTLS",
- "UseSCTP" => $sctp,
- "HandshakeMode" => "RenegotiateClient",
- "ResumptionExpected" => "Yes",
- "ExpectedResult" => "Success"
- }
- },
- # Note: Unlike the TLS tests, we will never do resumption with server
- # initiated reneg. This is because an OpenSSL DTLS client will always do a full
- # handshake (i.e. it doesn't supply a session id) when it receives a
- # HelloRequest. This is different to the OpenSSL TLS implementation where an
- # OpenSSL client will always try an abbreviated handshake (i.e. it will supply
- # the session id). This goes all the way to commit 48ae85b6f when abbreviated
- # handshake support was first added. Neither behaviour is wrong, but the
- # discrepancy is strange. TODO: Should we harmonise the TLS and DTLS behaviour,
- # and if so, what to?
- {
- name => "renegotiate-server-resume".$suffix,
- server => {
- "CipherString" => 'DEFAULT:@SECLEVEL=0'
- },
- client => {
- "CipherString" => 'DEFAULT:@SECLEVEL=0'
- },
- test => {
- "Method" => "DTLS",
- "UseSCTP" => $sctp,
- "HandshakeMode" => "RenegotiateServer",
- "ResumptionExpected" => "No",
- "ExpectedResult" => "Success"
- }
- },
- {
- name => "renegotiate-client-auth-require".$suffix,
- server => {
- "VerifyCAFile" => test_pem("root-cert.pem"),
- "VerifyMode" => "Require",
- "CipherString" => 'DEFAULT:@SECLEVEL=0'
- },
- client => {
- "Certificate" => test_pem("ee-client-chain.pem"),
- "PrivateKey" => test_pem("ee-key.pem"),
- "CipherString" => 'DEFAULT:@SECLEVEL=0'
- },
- test => {
- "Method" => "DTLS",
- "UseSCTP" => $sctp,
- "HandshakeMode" => "RenegotiateServer",
- "ResumptionExpected" => "No",
- "ExpectedResult" => "Success"
- }
- },
- {
- name => "renegotiate-client-auth-once".$suffix,
- server => {
- "VerifyCAFile" => test_pem("root-cert.pem"),
- "VerifyMode" => "Once",
- "CipherString" => 'DEFAULT:@SECLEVEL=0'
- },
- client => {
- "Certificate" => test_pem("ee-client-chain.pem"),
- "PrivateKey" => test_pem("ee-key.pem"),
- "CipherString" => 'DEFAULT:@SECLEVEL=0'
- },
- test => {
- "Method" => "DTLS",
- "UseSCTP" => $sctp,
- "HandshakeMode" => "RenegotiateServer",
- "ResumptionExpected" => "No",
- "ExpectedResult" => "Success"
- }
- }
- );
- push @tests, @tests_basic;
- next if disabled("dtls1_2");
- our @tests_dtls1_2 = (
- {
- name => "renegotiate-aead-to-non-aead".$suffix,
- server => {
- "Options" => "NoResumptionOnRenegotiation"
- },
- client => {
- "CipherString" => "AES128-GCM-SHA256",
- extra => {
- "RenegotiateCiphers" => "AES128-SHA"
- }
- },
- test => {
- "Method" => "DTLS",
- "UseSCTP" => $sctp,
- "HandshakeMode" => "RenegotiateClient",
- "ResumptionExpected" => "No",
- "ExpectedResult" => "Success"
- }
- },
- {
- name => "renegotiate-non-aead-to-aead".$suffix,
- server => {
- "Options" => "NoResumptionOnRenegotiation"
- },
- client => {
- "CipherString" => "AES128-SHA",
- extra => {
- "RenegotiateCiphers" => "AES128-GCM-SHA256"
- }
- },
- test => {
- "Method" => "DTLS",
- "UseSCTP" => $sctp,
- "HandshakeMode" => "RenegotiateClient",
- "ResumptionExpected" => "No",
- "ExpectedResult" => "Success"
- }
- },
- {
- name => "renegotiate-non-aead-to-non-aead".$suffix,
- server => {
- "Options" => "NoResumptionOnRenegotiation"
- },
- client => {
- "CipherString" => "AES128-SHA",
- extra => {
- "RenegotiateCiphers" => "AES256-SHA"
- }
- },
- test => {
- "Method" => "DTLS",
- "UseSCTP" => $sctp,
- "HandshakeMode" => "RenegotiateClient",
- "ResumptionExpected" => "No",
- "ExpectedResult" => "Success"
- }
- },
- {
- name => "renegotiate-aead-to-aead".$suffix,
- server => {
- "Options" => "NoResumptionOnRenegotiation"
- },
- client => {
- "CipherString" => "AES128-GCM-SHA256",
- extra => {
- "RenegotiateCiphers" => "AES256-GCM-SHA384"
- }
- },
- test => {
- "Method" => "DTLS",
- "UseSCTP" => $sctp,
- "HandshakeMode" => "RenegotiateClient",
- "ResumptionExpected" => "No",
- "ExpectedResult" => "Success"
- }
- },
- );
- push @tests, @tests_dtls1_2;
- }
|