2 # Copyright 2015-2016 The OpenSSL Project Authors. All Rights Reserved.
4 # Licensed under the OpenSSL license (the "License"). You may not use
5 # this file except in compliance with the License. You can obtain a copy
6 # in the file LICENSE in the source distribution or at
7 # https://www.openssl.org/source/license.html
10 use OpenSSL::Test qw/:DEFAULT cmdstr srctop_file srctop_dir bldtop_dir/;
11 use OpenSSL::Test::Utils;
12 use File::Temp qw(tempfile);
14 use checkhandshake qw(checkhandshake @handmessages @extensions);
16 my $test_name = "test_tls13messages";
19 plan skip_all => "TLSProxy isn't usable on $^O"
20 if $^O =~ /^(VMS|MSWin32)$/;
22 plan skip_all => "$test_name needs the dynamic engine feature enabled"
23 if disabled("engine") || disabled("dynamic-engine");
25 plan skip_all => "$test_name needs the sock feature enabled"
28 plan skip_all => "$test_name needs TLSv1.3 enabled"
29 if disabled("tls1_3");
31 $ENV{OPENSSL_ia32cap} = '~0x200000200000000';
32 $ENV{CTLOG_FILE} = srctop_file("test", "ct", "log_list.conf");
36 [TLSProxy::Message::MT_CLIENT_HELLO,
37 checkhandshake::ALL_HANDSHAKES],
38 [TLSProxy::Message::MT_SERVER_HELLO,
39 checkhandshake::ALL_HANDSHAKES],
40 [TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS,
41 checkhandshake::ALL_HANDSHAKES],
42 [TLSProxy::Message::MT_CERTIFICATE_REQUEST,
43 checkhandshake::CLIENT_AUTH_HANDSHAKE],
44 [TLSProxy::Message::MT_CERTIFICATE,
45 checkhandshake::ALL_HANDSHAKES & ~checkhandshake::RESUME_HANDSHAKE],
46 [TLSProxy::Message::MT_CERTIFICATE_VERIFY,
47 checkhandshake::ALL_HANDSHAKES & ~checkhandshake::RESUME_HANDSHAKE],
48 [TLSProxy::Message::MT_FINISHED,
49 checkhandshake::ALL_HANDSHAKES],
50 [TLSProxy::Message::MT_CERTIFICATE,
51 checkhandshake::CLIENT_AUTH_HANDSHAKE],
52 [TLSProxy::Message::MT_CERTIFICATE_VERIFY,
53 checkhandshake::CLIENT_AUTH_HANDSHAKE],
54 [TLSProxy::Message::MT_FINISHED,
55 checkhandshake::ALL_HANDSHAKES],
60 [TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_SERVER_NAME,
61 checkhandshake::SERVER_NAME_CLI_EXTENSION],
62 [TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_STATUS_REQUEST,
63 checkhandshake::STATUS_REQUEST_CLI_EXTENSION],
64 [TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_SUPPORTED_GROUPS,
65 checkhandshake::DEFAULT_EXTENSIONS],
66 [TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_EC_POINT_FORMATS,
67 checkhandshake::DEFAULT_EXTENSIONS],
68 [TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_SIG_ALGS,
69 checkhandshake::DEFAULT_EXTENSIONS],
70 [TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_ALPN,
71 checkhandshake::ALPN_CLI_EXTENSION],
72 [TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_SCT,
73 checkhandshake::SCT_CLI_EXTENSION],
74 [TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_ENCRYPT_THEN_MAC,
75 checkhandshake::DEFAULT_EXTENSIONS],
76 [TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_EXTENDED_MASTER_SECRET,
77 checkhandshake::DEFAULT_EXTENSIONS],
78 [TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_SESSION_TICKET,
79 checkhandshake::DEFAULT_EXTENSIONS],
80 [TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_KEY_SHARE,
81 checkhandshake::DEFAULT_EXTENSIONS],
82 [TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_SUPPORTED_VERSIONS,
83 checkhandshake::DEFAULT_EXTENSIONS],
84 [TLSProxy::Message::MT_CLIENT_HELLO, TLSProxy::Message::EXT_PSK_KEX_MODES,
85 checkhandshake::DEFAULT_EXTENSIONS],
87 [TLSProxy::Message::MT_SERVER_HELLO, TLSProxy::Message::EXT_KEY_SHARE,
88 checkhandshake::DEFAULT_EXTENSIONS],
90 [TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS, TLSProxy::Message::EXT_SERVER_NAME,
91 checkhandshake::SERVER_NAME_SRV_EXTENSION],
92 [TLSProxy::Message::MT_ENCRYPTED_EXTENSIONS, TLSProxy::Message::EXT_ALPN,
93 checkhandshake::ALPN_SRV_EXTENSION],
95 [TLSProxy::Message::MT_CERTIFICATE, TLSProxy::Message::EXT_STATUS_REQUEST,
96 checkhandshake::STATUS_REQUEST_SRV_EXTENSION],
101 my $proxy = TLSProxy::Proxy->new(
103 cmdstr(app(["openssl"]), display => 1),
104 srctop_file("apps", "server.pem"),
105 (!$ENV{HARNESS_ACTIVE} || $ENV{HARNESS_VERBOSE})
108 #Test 1: Check we get all the right messages for a default handshake
109 (undef, my $session) = tempfile();
110 #$proxy->serverconnects(2);
111 $proxy->clientflags("-sess_out ".$session);
112 $proxy->start() or plan skip_all => "Unable to start up Proxy for tests";
114 checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE,
115 checkhandshake::DEFAULT_EXTENSIONS,
116 "Default handshake test");
118 #TODO(TLS1.3): Test temporarily disabled until we implement TLS1.3 resumption
119 #Test 2: Resumption handshake
120 #$proxy->clearClient();
121 #$proxy->clientflags("-sess_in ".$session);
122 #$proxy->clientstart();
123 #checkmessages(RESUME_HANDSHAKE, "Resumption handshake test");
126 #Test 3: A status_request handshake (client request only)
128 $proxy->clientflags("-status");
130 checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE,
131 checkhandshake::DEFAULT_EXTENSIONS
132 | checkhandshake::STATUS_REQUEST_CLI_EXTENSION,
133 "status_request handshake test (client)");
135 #Test 4: A status_request handshake (server support only)
137 $proxy->serverflags("-status_file "
138 .srctop_file("test", "recipes", "ocsp-response.der"));
140 checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE,
141 checkhandshake::DEFAULT_EXTENSIONS,
142 "status_request handshake test (server)");
144 #Test 5: A status_request handshake (client and server)
145 #TODO(TLS1.3): TLS1.3 doesn't actually have CertificateStatus messages. This is
146 #a temporary test until such time as we do proper TLS1.3 style certificate
149 $proxy->clientflags("-status");
150 $proxy->serverflags("-status_file "
151 .srctop_file("test", "recipes", "ocsp-response.der"));
153 checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE,
154 checkhandshake::DEFAULT_EXTENSIONS
155 | checkhandshake::STATUS_REQUEST_CLI_EXTENSION
156 | checkhandshake::STATUS_REQUEST_SRV_EXTENSION,
157 "status_request handshake test");
159 #Test 6: A client auth handshake
161 $proxy->clientflags("-cert ".srctop_file("apps", "server.pem"));
162 $proxy->serverflags("-Verify 5");
164 checkhandshake($proxy, checkhandshake::CLIENT_AUTH_HANDSHAKE,
165 checkhandshake::DEFAULT_EXTENSIONS,
166 "Client auth handshake test");
168 #Test 7: Server name handshake (client request only)
170 $proxy->clientflags("-servername testhost");
172 checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE,
173 checkhandshake::DEFAULT_EXTENSIONS
174 | checkhandshake::SERVER_NAME_CLI_EXTENSION,
175 "Server name handshake test (client)");
177 #Test 8: Server name handshake (server support only)
179 $proxy->serverflags("-servername testhost");
181 checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE,
182 checkhandshake::DEFAULT_EXTENSIONS,
183 "Server name handshake test (server)");
185 #Test 9: Server name handshake (client and server)
187 $proxy->clientflags("-servername testhost");
188 $proxy->serverflags("-servername testhost");
190 checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE,
191 checkhandshake::DEFAULT_EXTENSIONS
192 | checkhandshake::SERVER_NAME_CLI_EXTENSION
193 | checkhandshake::SERVER_NAME_SRV_EXTENSION,
194 "Server name handshake test");
196 #Test 10: ALPN handshake (client request only)
198 $proxy->clientflags("-alpn test");
200 checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE,
201 checkhandshake::DEFAULT_EXTENSIONS
202 | checkhandshake::ALPN_CLI_EXTENSION,
203 "ALPN handshake test (client)");
205 #Test 11: ALPN handshake (server support only)
207 $proxy->serverflags("-alpn test");
209 checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE,
210 checkhandshake::DEFAULT_EXTENSIONS,
211 "ALPN handshake test (server)");
213 #Test 12: ALPN handshake (client and server)
215 $proxy->clientflags("-alpn test");
216 $proxy->serverflags("-alpn test");
218 checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE,
219 checkhandshake::DEFAULT_EXTENSIONS
220 | checkhandshake::ALPN_CLI_EXTENSION
221 | checkhandshake::ALPN_SRV_EXTENSION,
222 "ALPN handshake test");
224 #Test 13: SCT handshake (client request only)
225 #TODO(TLS1.3): This only checks that the client side extension appears. The
226 #SCT extension is unusual in that we have no built-in server side implementation
227 #The server side implementation can nomrally be added using the custom
228 #extensions framework (e.g. by using the "-serverinfo" s_server option). However
229 #currently we only support <= TLS1.2 for custom extensions because the existing
230 #framework and API has no knowledge of the TLS1.3 messages
232 #Note: -ct also sends status_request
233 $proxy->clientflags("-ct");
234 $proxy->serverflags("-status_file "
235 .srctop_file("test", "recipes", "ocsp-response.der"));
237 checkhandshake($proxy, checkhandshake::DEFAULT_HANDSHAKE,
238 checkhandshake::DEFAULT_EXTENSIONS
239 | checkhandshake::SCT_CLI_EXTENSION
240 | checkhandshake::STATUS_REQUEST_CLI_EXTENSION
241 | checkhandshake::STATUS_REQUEST_SRV_EXTENSION,
242 "SCT handshake test");