123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407 |
- #! /usr/bin/env perl
- # Copyright 2015-2018 The OpenSSL Project Authors. All Rights Reserved.
- #
- # Licensed under the Apache License 2.0 (the "License"). You may not use
- # this file except in compliance with the License. You can obtain a copy
- # in the file LICENSE in the source distribution or at
- # https://www.openssl.org/source/license.html
- use strict;
- use OpenSSL::Test qw/:DEFAULT cmdstr srctop_file srctop_dir bldtop_dir/;
- use OpenSSL::Test::Utils;
- use File::Temp qw(tempfile);
- use TLSProxy::Proxy;
- use checkhandshake qw(checkhandshake @handmessages @extensions);
- my $test_name = "test_sslmessages";
- setup($test_name);
- plan skip_all => "TLSProxy isn't usable on $^O"
- if $^O =~ /^(VMS)$/;
- plan skip_all => "$test_name needs the dynamic engine feature enabled"
- if disabled("engine") || disabled("dynamic-engine");
- plan skip_all => "$test_name needs the sock feature enabled"
- if disabled("sock");
- plan skip_all => "$test_name needs TLS enabled"
- if alldisabled(available_protocols("tls"))
- || (!disabled("tls1_3") && disabled("tls1_2"));
- $ENV{OPENSSL_ia32cap} = '~0x200000200000000';
- $ENV{CTLOG_FILE} = srctop_file("test", "ct", "log_list.conf");
- my $proxy = TLSProxy::Proxy->new(
- undef,
- cmdstr(app(["openssl"]), display => 1),
- srctop_file("apps", "server.pem"),
- (!$ENV{HARNESS_ACTIVE} || $ENV{HARNESS_VERBOSE})
- );
- @handmessages = (
- [TLSProxy::Message::MT_CLIENT_HELLO,
- checkhandshake::ALL_HANDSHAKES],
- [TLSProxy::Message::MT_SERVER_HELLO,
- checkhandshake::ALL_HANDSHAKES],
- [TLSProxy::Message::MT_CERTIFICATE,
- checkhandshake::ALL_HANDSHAKES
- & ~checkhandshake::RESUME_HANDSHAKE],
- (disabled("ec") ? () :
- [TLSProxy::Message::MT_SERVER_KEY_EXCHANGE,
- checkhandshake::EC_HANDSHAKE]),
- [TLSProxy::Message::MT_CERTIFICATE_STATUS,
- checkhandshake::OCSP_HANDSHAKE],
- #ServerKeyExchange handshakes not currently supported by TLSProxy
- [TLSProxy::Message::MT_CERTIFICATE_REQUEST,
- checkhandshake::CLIENT_AUTH_HANDSHAKE],
- [TLSProxy::Message::MT_SERVER_HELLO_DONE,
- checkhandshake::ALL_HANDSHAKES
- & ~checkhandshake::RESUME_HANDSHAKE],
- [TLSProxy::Message::MT_CERTIFICATE,
- checkhandshake::CLIENT_AUTH_HANDSHAKE],
- [TLSProxy::Message::MT_CLIENT_KEY_EXCHANGE,
- checkhandshake::ALL_HANDSHAKES
- & ~checkhandshake::RESUME_HANDSHAKE],
- [TLSProxy::Message::MT_CERTIFICATE_VERIFY,
- checkhandshake::CLIENT_AUTH_HANDSHAKE],
- [TLSProxy::Message::MT_NEXT_PROTO,
- checkhandshake::NPN_HANDSHAKE],
- [TLSProxy::Message::MT_FINISHED,
- checkhandshake::ALL_HANDSHAKES],
- [TLSProxy::Message::MT_NEW_SESSION_TICKET,
- checkhandshake::ALL_HANDSHAKES
- & ~checkhandshake::RESUME_HANDSHAKE],
- [TLSProxy::Message::MT_FINISHED,
- checkhandshake::ALL_HANDSHAKES],
- [TLSProxy::Message::MT_CLIENT_HELLO,
- checkhandshake::RENEG_HANDSHAKE],
- [TLSProxy::Message::MT_SERVER_HELLO,
- checkhandshake::RENEG_HANDSHAKE],
- [TLSProxy::Message::MT_CERTIFICATE,
- checkhandshake::RENEG_HANDSHAKE],
- [TLSProxy::Message::MT_SERVER_HELLO_DONE,
- checkhandshake::RENEG_HANDSHAKE],
- [TLSProxy::Message::MT_CLIENT_KEY_EXCHANGE,
- checkhandshake::RENEG_HANDSHAKE],
- [TLSProxy::Message::MT_FINISHED,
- checkhandshake::RENEG_HANDSHAKE],
- [TLSProxy::Message::MT_NEW_SESSION_TICKET,
- checkhandshake::RENEG_HANDSHAKE],
- [TLSProxy::Message::MT_FINISHED,
- checkhandshake::RENEG_HANDSHAKE],
- [0, 0]
- );
- @extensions = (
- [TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_SERVER_NAME,
- checkhandshake::SERVER_NAME_CLI_EXTENSION],
- [TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_STATUS_REQUEST,
- checkhandshake::STATUS_REQUEST_CLI_EXTENSION],
- (disabled("ec") ? () :
- [TLSProxy::Message::MT_CLIENT_HELLO,
- TLSProxy::Message::EXT_SUPPORTED_GROUPS,
- checkhandshake::DEFAULT_EXTENSIONS]),
- (disabled("ec") ? () :
- [TLSProxy::Message::MT_CLIENT_HELLO,
- TLSProxy::Message::EXT_EC_POINT_FORMATS,
- checkhandshake::DEFAULT_EXTENSIONS]),
- (disabled("tls1_2") ? () :
- [TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_SIG_ALGS,
- checkhandshake::DEFAULT_EXTENSIONS]),
- [TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_ALPN,
- checkhandshake::ALPN_CLI_EXTENSION],
- [TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_SCT,
- checkhandshake::SCT_CLI_EXTENSION],
- [TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_ENCRYPT_THEN_MAC,
- checkhandshake::DEFAULT_EXTENSIONS],
- [TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_EXTENDED_MASTER_SECRET,
- checkhandshake::DEFAULT_EXTENSIONS],
- [TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_SESSION_TICKET,
- checkhandshake::DEFAULT_EXTENSIONS],
- [TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_RENEGOTIATE,
- checkhandshake::RENEGOTIATE_CLI_EXTENSION],
- [TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_NPN,
- checkhandshake::NPN_CLI_EXTENSION],
- [TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_SRP,
- checkhandshake::SRP_CLI_EXTENSION],
- [TLSProxy::Message::MT_SERVER_HELLO, TLSProxy::Message::EXT_RENEGOTIATE,
- checkhandshake::DEFAULT_EXTENSIONS],
- [TLSProxy::Message::MT_SERVER_HELLO, TLSProxy::Message::EXT_ENCRYPT_THEN_MAC,
- checkhandshake::DEFAULT_EXTENSIONS],
- [TLSProxy::Message::MT_SERVER_HELLO, TLSProxy::Message::EXT_EXTENDED_MASTER_SECRET,
- checkhandshake::DEFAULT_EXTENSIONS],
- [TLSProxy::Message::MT_SERVER_HELLO, TLSProxy::Message::EXT_SESSION_TICKET,
- checkhandshake::SESSION_TICKET_SRV_EXTENSION],
- [TLSProxy::Message::MT_SERVER_HELLO, TLSProxy::Message::EXT_SERVER_NAME,
- checkhandshake::SERVER_NAME_SRV_EXTENSION],
- [TLSProxy::Message::MT_SERVER_HELLO, TLSProxy::Message::EXT_STATUS_REQUEST,
- checkhandshake::STATUS_REQUEST_SRV_EXTENSION],
- [TLSProxy::Message::MT_SERVER_HELLO, TLSProxy::Message::EXT_ALPN,
- checkhandshake::ALPN_SRV_EXTENSION],
- [TLSProxy::Message::MT_SERVER_HELLO, TLSProxy::Message::EXT_SCT,
- checkhandshake::SCT_SRV_EXTENSION],
- [TLSProxy::Message::MT_SERVER_HELLO, TLSProxy::Message::EXT_NPN,
- checkhandshake::NPN_SRV_EXTENSION],
- [TLSProxy::Message::MT_SERVER_HELLO, TLSProxy::Message::EXT_EC_POINT_FORMATS,
- checkhandshake::EC_POINT_FORMAT_SRV_EXTENSION],
- [0,0,0]
- );
- #Test 1: Check we get all the right messages for a default handshake
- (undef, my $session) = tempfile();
- $proxy->serverconnects(2);
- $proxy->clientflags("-no_tls1_3 -sess_out ".$session);
- $proxy->start() or plan skip_all => "Unable to start up Proxy for tests";
- plan tests => 21;
- checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE,
- checkhandshake::DEFAULT_EXTENSIONS,
- "Default handshake test");
- #Test 2: Resumption handshake
- $proxy->clearClient();
- $proxy->clientflags("-no_tls1_3 -sess_in ".$session);
- $proxy->clientstart();
- checkhandshake($proxy, checkhandshake::RESUME_HANDSHAKE,
- checkhandshake::DEFAULT_EXTENSIONS
- & ~checkhandshake::SESSION_TICKET_SRV_EXTENSION,
- "Resumption handshake test");
- unlink $session;
- SKIP: {
- skip "No OCSP support in this OpenSSL build", 3
- if disabled("ocsp");
- #Test 3: A status_request handshake (client request only)
- $proxy->clear();
- $proxy->clientflags("-no_tls1_3 -status");
- $proxy->start();
- checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE,
- checkhandshake::DEFAULT_EXTENSIONS
- | checkhandshake::STATUS_REQUEST_CLI_EXTENSION,
- "status_request handshake test (client)");
- #Test 4: A status_request handshake (server support only)
- $proxy->clear();
- $proxy->clientflags("-no_tls1_3");
- $proxy->serverflags("-status_file "
- .srctop_file("test", "recipes", "ocsp-response.der"));
- $proxy->start();
- checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE,
- checkhandshake::DEFAULT_EXTENSIONS,
- "status_request handshake test (server)");
- #Test 5: A status_request handshake (client and server)
- $proxy->clear();
- $proxy->clientflags("-no_tls1_3 -status");
- $proxy->serverflags("-status_file "
- .srctop_file("test", "recipes", "ocsp-response.der"));
- $proxy->start();
- checkhandshake($proxy, checkhandshake::OCSP_HANDSHAKE,
- checkhandshake::DEFAULT_EXTENSIONS
- | checkhandshake::STATUS_REQUEST_CLI_EXTENSION
- | checkhandshake::STATUS_REQUEST_SRV_EXTENSION,
- "status_request handshake test");
- }
- #Test 6: A client auth handshake
- $proxy->clear();
- $proxy->clientflags("-no_tls1_3 -cert ".srctop_file("apps", "server.pem"));
- $proxy->serverflags("-Verify 5");
- $proxy->start();
- checkhandshake($proxy, checkhandshake::CLIENT_AUTH_HANDSHAKE,
- checkhandshake::DEFAULT_EXTENSIONS,
- "Client auth handshake test");
- #Test 7: A handshake with a renegotiation
- $proxy->clear();
- $proxy->clientflags("-no_tls1_3");
- $proxy->reneg(1);
- $proxy->start();
- checkhandshake($proxy, checkhandshake::RENEG_HANDSHAKE,
- checkhandshake::DEFAULT_EXTENSIONS,
- "Renegotiation handshake test");
- #Test 8: Server name handshake (no client request)
- $proxy->clear();
- $proxy->clientflags("-no_tls1_3 -noservername");
- $proxy->start();
- checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE,
- checkhandshake::DEFAULT_EXTENSIONS
- & ~checkhandshake::SERVER_NAME_CLI_EXTENSION,
- "Server name handshake test (client)");
- #Test 9: Server name handshake (server support only)
- $proxy->clear();
- $proxy->clientflags("-no_tls1_3 -noservername");
- $proxy->serverflags("-servername testhost");
- $proxy->start();
- checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE,
- checkhandshake::DEFAULT_EXTENSIONS
- & ~checkhandshake::SERVER_NAME_CLI_EXTENSION,
- "Server name handshake test (server)");
- #Test 10: Server name handshake (client and server)
- $proxy->clear();
- $proxy->clientflags("-no_tls1_3 -servername testhost");
- $proxy->serverflags("-servername testhost");
- $proxy->start();
- checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE,
- checkhandshake::DEFAULT_EXTENSIONS
- | checkhandshake::SERVER_NAME_SRV_EXTENSION,
- "Server name handshake test");
- #Test 11: ALPN handshake (client request only)
- $proxy->clear();
- $proxy->clientflags("-no_tls1_3 -alpn test");
- $proxy->start();
- checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE,
- checkhandshake::DEFAULT_EXTENSIONS
- | checkhandshake::ALPN_CLI_EXTENSION,
- "ALPN handshake test (client)");
- #Test 12: ALPN handshake (server support only)
- $proxy->clear();
- $proxy->clientflags("-no_tls1_3");
- $proxy->serverflags("-alpn test");
- $proxy->start();
- checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE,
- checkhandshake::DEFAULT_EXTENSIONS,
- "ALPN handshake test (server)");
- #Test 13: ALPN handshake (client and server)
- $proxy->clear();
- $proxy->clientflags("-no_tls1_3 -alpn test");
- $proxy->serverflags("-alpn test");
- $proxy->start();
- checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE,
- checkhandshake::DEFAULT_EXTENSIONS
- | checkhandshake::ALPN_CLI_EXTENSION
- | checkhandshake::ALPN_SRV_EXTENSION,
- "ALPN handshake test");
- SKIP: {
- skip "No CT, EC or OCSP support in this OpenSSL build", 1
- if disabled("ct") || disabled("ec") || disabled("ocsp");
- #Test 14: SCT handshake (client request only)
- $proxy->clear();
- #Note: -ct also sends status_request
- $proxy->clientflags("-no_tls1_3 -ct");
- $proxy->serverflags("-status_file "
- .srctop_file("test", "recipes", "ocsp-response.der"));
- $proxy->start();
- checkhandshake($proxy, checkhandshake::OCSP_HANDSHAKE,
- checkhandshake::DEFAULT_EXTENSIONS
- | checkhandshake::SCT_CLI_EXTENSION
- | checkhandshake::STATUS_REQUEST_CLI_EXTENSION
- | checkhandshake::STATUS_REQUEST_SRV_EXTENSION,
- "SCT handshake test (client)");
- }
- SKIP: {
- skip "No OCSP support in this OpenSSL build", 1
- if disabled("ocsp");
- #Test 15: SCT handshake (server support only)
- $proxy->clear();
- #Note: -ct also sends status_request
- $proxy->clientflags("-no_tls1_3");
- $proxy->serverflags("-status_file "
- .srctop_file("test", "recipes", "ocsp-response.der"));
- $proxy->start();
- checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE,
- checkhandshake::DEFAULT_EXTENSIONS,
- "SCT handshake test (server)");
- }
- SKIP: {
- skip "No CT, EC or OCSP support in this OpenSSL build", 1
- if disabled("ct") || disabled("ec") || disabled("ocsp");
- #Test 16: SCT handshake (client and server)
- #There is no built-in server side support for this so we are actually also
- #testing custom extensions here
- $proxy->clear();
- #Note: -ct also sends status_request
- $proxy->clientflags("-no_tls1_3 -ct");
- $proxy->serverflags("-status_file "
- .srctop_file("test", "recipes", "ocsp-response.der")
- ." -serverinfo ".srctop_file("test", "serverinfo.pem"));
- $proxy->start();
- checkhandshake($proxy, checkhandshake::OCSP_HANDSHAKE,
- checkhandshake::DEFAULT_EXTENSIONS
- | checkhandshake::SCT_CLI_EXTENSION
- | checkhandshake::SCT_SRV_EXTENSION
- | checkhandshake::STATUS_REQUEST_CLI_EXTENSION
- | checkhandshake::STATUS_REQUEST_SRV_EXTENSION,
- "SCT handshake test");
- }
- SKIP: {
- skip "No NPN support in this OpenSSL build", 3
- if disabled("nextprotoneg");
- #Test 17: NPN handshake (client request only)
- $proxy->clear();
- $proxy->clientflags("-no_tls1_3 -nextprotoneg test");
- $proxy->start();
- checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE,
- checkhandshake::DEFAULT_EXTENSIONS
- | checkhandshake::NPN_CLI_EXTENSION,
- "NPN handshake test (client)");
- #Test 18: NPN handshake (server support only)
- $proxy->clear();
- $proxy->clientflags("-no_tls1_3");
- $proxy->serverflags("-nextprotoneg test");
- $proxy->start();
- checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE,
- checkhandshake::DEFAULT_EXTENSIONS,
- "NPN handshake test (server)");
- #Test 19: NPN handshake (client and server)
- $proxy->clear();
- $proxy->clientflags("-no_tls1_3 -nextprotoneg test");
- $proxy->serverflags("-nextprotoneg test");
- $proxy->start();
- checkhandshake($proxy, checkhandshake::NPN_HANDSHAKE,
- checkhandshake::DEFAULT_EXTENSIONS
- | checkhandshake::NPN_CLI_EXTENSION
- | checkhandshake::NPN_SRV_EXTENSION,
- "NPN handshake test");
- }
- SKIP: {
- skip "No SRP support in this OpenSSL build", 1
- if disabled("srp");
- #Test 20: SRP extension
- #Note: We are not actually going to perform an SRP handshake (TLSProxy
- #does not support it). However it is sufficient for us to check that the
- #SRP extension gets added on the client side. There is no SRP extension
- #generated on the server side anyway.
- $proxy->clear();
- $proxy->clientflags("-no_tls1_3 -srpuser user -srppass pass:pass");
- $proxy->start();
- checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE,
- checkhandshake::DEFAULT_EXTENSIONS
- | checkhandshake::SRP_CLI_EXTENSION,
- "SRP extension test");
- }
- #Test 21: EC handshake
- SKIP: {
- skip "No EC support in this OpenSSL build", 1 if disabled("ec");
- $proxy->clear();
- $proxy->clientflags("-no_tls1_3");
- $proxy->serverflags("-no_tls1_3");
- $proxy->ciphers("ECDHE-RSA-AES128-SHA");
- $proxy->start();
- checkhandshake($proxy, checkhandshake::EC_HANDSHAKE,
- checkhandshake::DEFAULT_EXTENSIONS
- | checkhandshake::EC_POINT_FORMAT_SRV_EXTENSION,
- "EC handshake test");
- }
|