]> git.ipfire.org Git - thirdparty/openssl.git/blob - test/recipes/70-test_certtypeext.t
RFC7250 (RPK) support
[thirdparty/openssl.git] / test / recipes / 70-test_certtypeext.t
1 #! /usr/bin/env perl
2 # Copyright 2023 The OpenSSL Project Authors. All Rights Reserved.
3 #
4 # Licensed under the Apache License 2.0 (the "License"). You may not use
5 # this file except in compliance with the License. You can obtain a copy
6 # in the file LICENSE in the source distribution or at
7 # https://www.openssl.org/source/license.html
8
9 use strict;
10 use OpenSSL::Test qw/:DEFAULT cmdstr srctop_file bldtop_dir/;
11 use OpenSSL::Test::Utils;
12 use TLSProxy::Proxy;
13
14 my $test_name = "test_certtypeext";
15 setup($test_name);
16
17 plan skip_all => "TLSProxy isn't usable on $^O"
18 if $^O =~ /^(VMS)$/;
19
20 plan skip_all => "$test_name needs the dynamic engine feature enabled"
21 if disabled("engine") || disabled("dynamic-engine");
22
23 plan skip_all => "$test_name needs the sock feature enabled"
24 if disabled("sock");
25
26 plan skip_all => "$test_name needs TLSv1.2 enabled"
27 if disabled("tls1_2");
28
29 my $proxy = TLSProxy::Proxy->new(
30 \&certtype_filter,
31 cmdstr(app(["openssl"]), display => 1),
32 srctop_file("apps", "server.pem"),
33 (!$ENV{HARNESS_ACTIVE} || $ENV{HARNESS_VERBOSE})
34 );
35
36 use constant {
37 SERVER_CERT_TYPE => 0,
38 CLIENT_CERT_TYPE => 1,
39 NO_CERT_TYPE => 2
40 };
41 my $testtype;
42
43 # Test 1: Just do a verify without cert type
44 $proxy->clear();
45 $proxy->clientflags("-tls1_2 -cert ".srctop_file("apps", "server.pem"));
46 $proxy->serverflags("-verify 4");
47 $testtype = NO_CERT_TYPE;
48 $proxy->start() or plan skip_all => "Unable to start up Proxy for tests";
49 plan tests => 4;
50 ok(TLSProxy::Message->success, "Simple verify");
51
52 # Test 2: Set a bogus server cert type
53 $proxy->clear();
54 $proxy->serverflags("-enable_server_rpk");
55 $testtype = SERVER_CERT_TYPE;
56 $proxy->start();
57 ok(TLSProxy::Message->fail, "Unsupported server cert type");
58
59 # Test 3: Set a bogus client cert type
60 $proxy->clear();
61 $proxy->serverflags("-enable_client_rpk");
62 $testtype = CLIENT_CERT_TYPE;
63 $proxy->start();
64 ok(TLSProxy::Message->success, "Unsupported client cert type, no verify");
65
66 # Test 4: Set a bogus server cert type with verify
67 $proxy->clear();
68 $testtype = CLIENT_CERT_TYPE;
69 $proxy->clientflags("-tls1_2 -cert ".srctop_file("apps", "server.pem"));
70 $proxy->serverflags("-verify 4 -enable_client_rpk");
71 $proxy->start();
72 ok(TLSProxy::Message->fail, "Unsupported client cert type with verify");
73
74 sub certtype_filter
75 {
76 my $proxy = shift;
77 my $message;
78
79 # We're only interested in the initial ClientHello
80 return if $proxy->flight != 0;
81
82 $message = ${$proxy->message_list}[0];
83
84 # Add unsupported and bogus client and server cert type to the client hello.
85 my $ct = pack "C5", 0x04, 0x01, 0x03, 0x55, 0x66;
86 if ($testtype == CLIENT_CERT_TYPE) {
87 print "SETTING CLIENT CERT TYPE\n";
88 $message->set_extension(TLSProxy::Message::EXT_CLIENT_CERT_TYPE, $ct);
89 }
90 if ($testtype == SERVER_CERT_TYPE) {
91 print "SETTING SERVER CERT TYPE\n";
92 $message->set_extension(TLSProxy::Message::EXT_SERVER_CERT_TYPE, $ct);
93 }
94
95 $message->repack();
96 }