]>
git.ipfire.org Git - thirdparty/openssl.git/blob - test/recipes/70-test_tls13messages.t
2 # Copyright 2015-2016 The OpenSSL Project Authors. All Rights Reserved.
4 # Licensed under the OpenSSL license (the "License"). You may not use
5 # this file except in compliance with the License. You can obtain a copy
6 # in the file LICENSE in the source distribution or at
7 # https://www.openssl.org/source/license.html
10 use OpenSSL
::Test qw
/:DEFAULT cmdstr srctop_file srctop_dir bldtop_dir/;
11 use OpenSSL
::Test
::Utils
;
12 use File
::Temp
qw(tempfile);
14 use checkhandshake
qw(checkhandshake @handmessages @extensions);
16 my $test_name = "test_tls13messages";
19 plan skip_all => "TLSProxy isn't usable on $^O"
20 if $^O =~ /^(VMS|MSWin32)$/;
22 plan skip_all => "$test_name needs the dynamic engine feature enabled"
23 if disabled("engine") || disabled("dynamic-engine");
25 plan skip_all => "$test_name needs the sock feature enabled"
28 plan skip_all => "$test_name needs TLSv1.3 enabled"
29 if disabled("tls1_3");
31 $ENV{OPENSSL_ia32cap} = '~0x200000200000000';
32 $ENV{CTLOG_FILE} = srctop_file("test", "ct", "log_list.conf");
36 [TLSProxy::Message::MT_CLIENT_HELLO,
37 checkhandshake::ALL_HANDSHAKES],
38 [TLSProxy::Message::MT_SERVER_HELLO,
39 checkhandshake::ALL_HANDSHAKES],
40 [TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS,
41 checkhandshake::ALL_HANDSHAKES],
42 [TLSProxy::Message::MT_CERTIFICATE_REQUEST,
43 checkhandshake::CLIENT_AUTH_HANDSHAKE],
44 [TLSProxy::Message::MT_CERTIFICATE,
45 checkhandshake::ALL_HANDSHAKES & ~checkhandshake::RESUME_HANDSHAKE],
46 [TLSProxy::Message::MT_CERTIFICATE_STATUS,
47 checkhandshake::OCSP_HANDSHAKE],
48 [TLSProxy::Message::MT_FINISHED,
49 checkhandshake::ALL_HANDSHAKES],
50 [TLSProxy::Message::MT_CERTIFICATE,
51 checkhandshake::CLIENT_AUTH_HANDSHAKE],
52 [TLSProxy::Message::MT_CERTIFICATE_VERIFY,
53 checkhandshake::CLIENT_AUTH_HANDSHAKE],
54 [TLSProxy::Message::MT_FINISHED,
55 checkhandshake::ALL_HANDSHAKES],
60 [TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_SERVER_NAME,
61 checkhandshake::SERVER_NAME_CLI_EXTENSION],
62 [TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_STATUS_REQUEST,
63 checkhandshake::STATUS_REQUEST_CLI_EXTENSION],
64 [TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_SUPPORTED_GROUPS,
65 checkhandshake::DEFAULT_EXTENSIONS],
66 [TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_EC_POINT_FORMATS,
67 checkhandshake::DEFAULT_EXTENSIONS],
68 [TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_SIG_ALGS,
69 checkhandshake::DEFAULT_EXTENSIONS],
70 [TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_ALPN,
71 checkhandshake::ALPN_CLI_EXTENSION],
72 [TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_SCT,
73 checkhandshake::SCT_CLI_EXTENSION],
74 [TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_ENCRYPT_THEN_MAC,
75 checkhandshake::DEFAULT_EXTENSIONS],
76 [TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_EXTENDED_MASTER_SECRET,
77 checkhandshake::DEFAULT_EXTENSIONS],
78 [TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_SESSION_TICKET,
79 checkhandshake::DEFAULT_EXTENSIONS],
80 [TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_KEY_SHARE,
81 checkhandshake::DEFAULT_EXTENSIONS],
82 [TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_SUPPORTED_VERSIONS,
83 checkhandshake::DEFAULT_EXTENSIONS],
85 [TLSProxy::Message::MT_SERVER_HELLO, TLSProxy::Message::EXT_KEY_SHARE,
86 checkhandshake::DEFAULT_EXTENSIONS],
88 [TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS, TLSProxy::Message::EXT_SERVER_NAME,
89 checkhandshake::SERVER_NAME_SRV_EXTENSION],
90 [TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS, TLSProxy::Message::EXT_STATUS_REQUEST,
91 checkhandshake::STATUS_REQUEST_SRV_EXTENSION],
92 [TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS, TLSProxy::Message::EXT_ALPN,
93 checkhandshake::ALPN_SRV_EXTENSION],
97 my $proxy = TLSProxy::Proxy->new(
99 cmdstr(app(["openssl"]), display => 1),
100 srctop_file("apps", "server.pem"),
101 (!$ENV{HARNESS_ACTIVE} || $ENV{HARNESS_VERBOSE})
104 #Test 1: Check we get all the right messages for a default handshake
105 (undef, my $session) = tempfile();
106 #$proxy->serverconnects(2);
107 $proxy->clientflags("-sess_out ".$session);
108 $proxy->start() or plan skip_all => "Unable to start up Proxy for tests";
110 checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE,
111 checkhandshake::DEFAULT_EXTENSIONS,
112 "Default handshake test");
114 #TODO(TLS1.3): Test temporarily disabled until we implement TLS1.3 resumption
115 #Test 2: Resumption handshake
116 #$proxy->clearClient();
117 #$proxy->clientflags("-sess_in ".$session);
118 #$proxy->clientstart();
119 #checkmessages(RESUME_HANDSHAKE, "Resumption handshake test");
122 #Test 3: A status_request handshake (client request only)
124 $proxy->clientflags("-status");
126 checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE,
127 checkhandshake::DEFAULT_EXTENSIONS
128 | checkhandshake::STATUS_REQUEST_CLI_EXTENSION,
129 "status_request handshake test (client)");
131 #Test 4: A status_request handshake (server support only)
133 $proxy->serverflags("-status_file "
134 .srctop_file("test", "recipes", "ocsp-response.der"));
136 checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE,
137 checkhandshake::DEFAULT_EXTENSIONS,
138 "status_request handshake test (server)");
140 #Test 5: A status_request handshake (client and server)
141 #TODO(TLS1.3): TLS1.3 doesn't actually have CertificateStatus messages. This is
142 #a temporary test until such time as we do proper TLS1.3 style certificate
145 $proxy->clientflags("-status");
146 $proxy->serverflags("-status_file "
147 .srctop_file("test", "recipes", "ocsp-response.der"));
149 checkhandshake($proxy, checkhandshake::OCSP_HANDSHAKE,
150 checkhandshake::DEFAULT_EXTENSIONS
151 | checkhandshake::STATUS_REQUEST_CLI_EXTENSION
152 | checkhandshake::STATUS_REQUEST_SRV_EXTENSION,
153 "status_request handshake test");
155 #Test 6: A client auth handshake
157 $proxy->clientflags("-cert ".srctop_file("apps", "server.pem"));
158 $proxy->serverflags("-Verify 5");
160 checkhandshake($proxy, checkhandshake::CLIENT_AUTH_HANDSHAKE,
161 checkhandshake::DEFAULT_EXTENSIONS,
162 "Client auth handshake test");
164 #Test 7: Server name handshake (client request only)
166 $proxy->clientflags("-servername testhost");
168 checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE,
169 checkhandshake::DEFAULT_EXTENSIONS
170 | checkhandshake::SERVER_NAME_CLI_EXTENSION,
171 "Server name handshake test (client)");
173 #Test 8: Server name handshake (server support only)
175 $proxy->serverflags("-servername testhost");
177 checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE,
178 checkhandshake::DEFAULT_EXTENSIONS,
179 "Server name handshake test (server)");
181 #Test 9: Server name handshake (client and server)
183 $proxy->clientflags("-servername testhost");
184 $proxy->serverflags("-servername testhost");
186 checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE,
187 checkhandshake::DEFAULT_EXTENSIONS
188 | checkhandshake::SERVER_NAME_CLI_EXTENSION
189 | checkhandshake::SERVER_NAME_SRV_EXTENSION,
190 "Server name handshake test");
192 #Test 10: ALPN handshake (client request only)
194 $proxy->clientflags("-alpn test");
196 checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE,
197 checkhandshake::DEFAULT_EXTENSIONS
198 | checkhandshake::ALPN_CLI_EXTENSION,
199 "ALPN handshake test (client)");
201 #Test 11: ALPN handshake (server support only)
203 $proxy->serverflags("-alpn test");
205 checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE,
206 checkhandshake::DEFAULT_EXTENSIONS,
207 "ALPN handshake test (server)");
209 #Test 12: ALPN handshake (client and server)
211 $proxy->clientflags("-alpn test");
212 $proxy->serverflags("-alpn test");
214 checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE,
215 checkhandshake::DEFAULT_EXTENSIONS
216 | checkhandshake::ALPN_CLI_EXTENSION
217 | checkhandshake::ALPN_SRV_EXTENSION,
218 "ALPN handshake test");
220 #Test 13: SCT handshake (client request only)
221 #TODO(TLS1.3): This only checks that the client side extension appears. The
222 #SCT extension is unusual in that we have no built-in server side implementation
223 #The server side implementation can nomrally be added using the custom
224 #extensions framework (e.g. by using the "-serverinfo" s_server option). However
225 #currently we only support <= TLS1.2 for custom extensions because the existing
226 #framework and API has no knowledge of the TLS1.3 messages
228 #Note: -ct also sends status_request
229 $proxy->clientflags("-ct");
230 $proxy->serverflags("-status_file "
231 .srctop_file("test", "recipes", "ocsp-response.der"));
233 checkhandshake($proxy, checkhandshake::OCSP_HANDSHAKE,
234 checkhandshake::DEFAULT_EXTENSIONS
235 | checkhandshake::SCT_CLI_EXTENSION
236 | checkhandshake::STATUS_REQUEST_CLI_EXTENSION
237 | checkhandshake::STATUS_REQUEST_SRV_EXTENSION,
238 "SCT handshake test");