Add NewSessionTicket test suite
Add a set of tests for checking that NewSessionTicket messages are behaving as expected. Reviewed-by: Tim Hudson <tjh@openssl.org>
This commit is contained in:
parent
8af538e5c5
commit
ddcc5e5b60
@ -73,6 +73,7 @@ CLIENTHELLOTEST= clienthellotest
|
|||||||
PACKETTEST= packettest
|
PACKETTEST= packettest
|
||||||
SSLVERTOLTEST= sslvertoltest.pl
|
SSLVERTOLTEST= sslvertoltest.pl
|
||||||
SSLEXTENSIONTEST= sslextensiontest.pl
|
SSLEXTENSIONTEST= sslextensiontest.pl
|
||||||
|
SSLSESSIONTICKTEST= sslsessionticktest.pl
|
||||||
SSLSKEWITH0PTEST= sslskewith0ptest.pl
|
SSLSKEWITH0PTEST= sslskewith0ptest.pl
|
||||||
|
|
||||||
TESTS= alltests
|
TESTS= alltests
|
||||||
@ -160,7 +161,7 @@ alltests: \
|
|||||||
test_srp test_cms test_v3name test_ocsp \
|
test_srp test_cms test_v3name test_ocsp \
|
||||||
test_gost2814789 test_heartbeat test_p5_crpt2 \
|
test_gost2814789 test_heartbeat test_p5_crpt2 \
|
||||||
test_constant_time test_verify_extra test_clienthello test_packet \
|
test_constant_time test_verify_extra test_clienthello test_packet \
|
||||||
test_sslvertol test_sslextension test_sslskewith0p
|
test_sslvertol test_sslextension test_sslsessionticket test_sslskewith0p
|
||||||
|
|
||||||
test_evp: $(EVPTEST)$(EXE_EXT) evptests.txt
|
test_evp: $(EVPTEST)$(EXE_EXT) evptests.txt
|
||||||
@echo $(START) $@
|
@echo $(START) $@
|
||||||
@ -432,6 +433,11 @@ test_sslextension: ../apps/openssl$(EXE_EXT)
|
|||||||
[ -z "$(SHARED_LIBS)" ] || OPENSSL_ENGINES=../engines ../util/shlib_wrap.sh $(PERL) -I../util -w ./$(SSLEXTENSIONTEST) "OPENSSL_ia32cap='~0x200000200000000' ../apps/openssl$(EXE_EXT)" ../apps/server.pem
|
[ -z "$(SHARED_LIBS)" ] || OPENSSL_ENGINES=../engines ../util/shlib_wrap.sh $(PERL) -I../util -w ./$(SSLEXTENSIONTEST) "OPENSSL_ia32cap='~0x200000200000000' ../apps/openssl$(EXE_EXT)" ../apps/server.pem
|
||||||
@[ -n "$(SHARED_LIBS)" ] || echo test_sslextension can only be performed with OpenSSL configured shared
|
@[ -n "$(SHARED_LIBS)" ] || echo test_sslextension can only be performed with OpenSSL configured shared
|
||||||
|
|
||||||
|
test_sslsessionticket: ../apps/openssl$(EXE_EXT)
|
||||||
|
@echo $(START) $@
|
||||||
|
[ -z "$(SHARED_LIBS)" ] || PERL5LIB=$$PERL5LIB:../util OPENSSL_ENGINES=../engines ../util/shlib_wrap.sh ./$(SSLSESSIONTICKTEST) "OPENSSL_ia32cap='~0x200000200000000' ../apps/openssl$(EXE_EXT)" ../apps/server.pem
|
||||||
|
@[ -n "$(SHARED_LIBS)" ] || echo test_sslsessionticket can only be performed with OpenSSL configured shared
|
||||||
|
|
||||||
test_sslskewith0p: ../apps/openssl$(EXE_EXT)
|
test_sslskewith0p: ../apps/openssl$(EXE_EXT)
|
||||||
@echo $(START) $@
|
@echo $(START) $@
|
||||||
[ -z "$(SHARED_LIBS)" ] || OPENSSL_ENGINES=../engines ../util/shlib_wrap.sh $(PERL) -I../util -w ./$(SSLSKEWITH0PTEST) "OPENSSL_ia32cap='~0x200000200000000' ../apps/openssl$(EXE_EXT)" ../apps/server.pem
|
[ -z "$(SHARED_LIBS)" ] || OPENSSL_ENGINES=../engines ../util/shlib_wrap.sh $(PERL) -I../util -w ./$(SSLSKEWITH0PTEST) "OPENSSL_ia32cap='~0x200000200000000' ../apps/openssl$(EXE_EXT)" ../apps/server.pem
|
||||||
|
173
test/sslsessionticktest.pl
Executable file
173
test/sslsessionticktest.pl
Executable file
@ -0,0 +1,173 @@
|
|||||||
|
#!/usr/bin/perl
|
||||||
|
# Written by Matt Caswell for the OpenSSL project.
|
||||||
|
# ====================================================================
|
||||||
|
# Copyright (c) 1998-2015 The OpenSSL Project. All rights reserved.
|
||||||
|
#
|
||||||
|
# Redistribution and use in source and binary forms, with or without
|
||||||
|
# modification, are permitted provided that the following conditions
|
||||||
|
# are met:
|
||||||
|
#
|
||||||
|
# 1. Redistributions of source code must retain the above copyright
|
||||||
|
# notice, this list of conditions and the following disclaimer.
|
||||||
|
#
|
||||||
|
# 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
# notice, this list of conditions and the following disclaimer in
|
||||||
|
# the documentation and/or other materials provided with the
|
||||||
|
# distribution.
|
||||||
|
#
|
||||||
|
# 3. All advertising materials mentioning features or use of this
|
||||||
|
# software must display the following acknowledgment:
|
||||||
|
# "This product includes software developed by the OpenSSL Project
|
||||||
|
# for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
|
||||||
|
#
|
||||||
|
# 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
||||||
|
# endorse or promote products derived from this software without
|
||||||
|
# prior written permission. For written permission, please contact
|
||||||
|
# openssl-core@openssl.org.
|
||||||
|
#
|
||||||
|
# 5. Products derived from this software may not be called "OpenSSL"
|
||||||
|
# nor may "OpenSSL" appear in their names without prior written
|
||||||
|
# permission of the OpenSSL Project.
|
||||||
|
#
|
||||||
|
# 6. Redistributions of any form whatsoever must retain the following
|
||||||
|
# acknowledgment:
|
||||||
|
# "This product includes software developed by the OpenSSL Project
|
||||||
|
# for use in the OpenSSL Toolkit (http://www.openssl.org/)"
|
||||||
|
#
|
||||||
|
# THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
||||||
|
# EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||||
|
# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
||||||
|
# ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||||
|
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
||||||
|
# NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
||||||
|
# LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
||||||
|
# STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||||||
|
# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
||||||
|
# OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
|
# ====================================================================
|
||||||
|
#
|
||||||
|
# This product includes cryptographic software written by Eric Young
|
||||||
|
# (eay@cryptsoft.com). This product includes software written by Tim
|
||||||
|
# Hudson (tjh@cryptsoft.com).
|
||||||
|
|
||||||
|
use strict;
|
||||||
|
use TLSProxy::Proxy;
|
||||||
|
use File::Temp qw(tempfile);
|
||||||
|
|
||||||
|
my $chellotickext = 0;
|
||||||
|
my $shellotickext = 0;
|
||||||
|
my $fullhand = 0;
|
||||||
|
my $ticketseen = 0;
|
||||||
|
|
||||||
|
my $proxy = TLSProxy::Proxy->new(
|
||||||
|
undef,
|
||||||
|
@ARGV
|
||||||
|
);
|
||||||
|
|
||||||
|
#Test 1: By default with no existing session we should get a session ticket
|
||||||
|
#Expected result: ClientHello extension seen; ServerHello extension seen
|
||||||
|
# NewSessionTicket message seen; Full handshake
|
||||||
|
$proxy->start();
|
||||||
|
checkmessages(1, "Default session ticket test", 1, 1, 1, 1);
|
||||||
|
|
||||||
|
#Test 2: If the server does not accept tickets we should get a normal handshake
|
||||||
|
#with no session tickets
|
||||||
|
#Expected result: ClientHello extension seen; ServerHello extension not seen
|
||||||
|
# NewSessionTicket message not seen; Full handshake
|
||||||
|
clearall();
|
||||||
|
$proxy->serverflags("-no_ticket");
|
||||||
|
$proxy->start();
|
||||||
|
checkmessages(2, "No server support session ticket test", 1, 0, 0, 1);
|
||||||
|
|
||||||
|
#Test 3: If the client does not accept tickets we should get a normal handshake
|
||||||
|
#with no session tickets
|
||||||
|
#Expected result: ClientHello extension not seen; ServerHello extension not seen
|
||||||
|
# NewSessionTicket message not seen; Full handshake
|
||||||
|
clearall();
|
||||||
|
$proxy->clientflags("-no_ticket");
|
||||||
|
$proxy->start();
|
||||||
|
checkmessages(3, "No client support session ticket test", 0, 0, 0, 1);
|
||||||
|
|
||||||
|
#Test 4: Test session resumption with session ticket
|
||||||
|
#Expected result: ClientHello extension seen; ServerHello extension not seen
|
||||||
|
# NewSessionTicket message not seen; Abbreviated handshake
|
||||||
|
clearall();
|
||||||
|
(my $fh, my $session) = tempfile();
|
||||||
|
$proxy->serverconnects(2);
|
||||||
|
$proxy->clientflags("-sess_out ".$session);
|
||||||
|
$proxy->start();
|
||||||
|
$proxy->clear();
|
||||||
|
$proxy->clientflags("-sess_in ".$session);
|
||||||
|
$proxy->clientstart();
|
||||||
|
checkmessages(4, "Session resumption session ticket test", 1, 0, 0, 0);
|
||||||
|
|
||||||
|
#Test 5: Test session resumption with ticket capable client without a ticket
|
||||||
|
#Expected result: ClientHello extension seen; ServerHello extension seen
|
||||||
|
# NewSessionTicket message seen; Abbreviated handshake
|
||||||
|
clearall();
|
||||||
|
(my $fh, my $session) = tempfile();
|
||||||
|
$proxy->serverconnects(2);
|
||||||
|
$proxy->clientflags("-sess_out ".$session." -no_ticket");
|
||||||
|
$proxy->start();
|
||||||
|
$proxy->clear();
|
||||||
|
$proxy->clientflags("-sess_in ".$session);
|
||||||
|
$proxy->clientstart();
|
||||||
|
checkmessages(5, "Session resumption with ticket capable client without a "
|
||||||
|
."ticket", 1, 1, 1, 0);
|
||||||
|
|
||||||
|
sub checkmessages()
|
||||||
|
{
|
||||||
|
my ($testno, $testname, $testch, $testsh, $testtickseen, $testhand) = @_;
|
||||||
|
|
||||||
|
foreach my $message (@{$proxy->message_list}) {
|
||||||
|
if ($message->mt == TLSProxy::Message::MT_CLIENT_HELLO
|
||||||
|
|| $message->mt == TLSProxy::Message::MT_SERVER_HELLO) {
|
||||||
|
#Get the extensions data
|
||||||
|
my %extensions = %{$message->extension_data};
|
||||||
|
if (defined
|
||||||
|
$extensions{TLSProxy::ClientHello::EXT_SESSION_TICKET}) {
|
||||||
|
if ($message->mt == TLSProxy::Message::MT_CLIENT_HELLO) {
|
||||||
|
$chellotickext = 1;
|
||||||
|
} else {
|
||||||
|
$shellotickext = 1;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
} elsif ($message->mt == TLSProxy::Message::MT_CLIENT_KEY_EXCHANGE) {
|
||||||
|
#Must be doing a full handshake
|
||||||
|
$fullhand = 1;
|
||||||
|
} elsif ($message->mt == TLSProxy::Message::MT_NEW_SESSION_TICKET) {
|
||||||
|
$ticketseen = 1;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
TLSProxy::Message->success or die "FAILED: $testname: Hanshake failed "
|
||||||
|
."(Test $testno)\n";
|
||||||
|
if (($testch && !$chellotickext) || (!$testch && $chellotickext)) {
|
||||||
|
die "FAILED: $testname: ClientHello extension Session Ticket check "
|
||||||
|
."failed (Test $testno)\n";
|
||||||
|
}
|
||||||
|
if (($testsh && !$shellotickext) || (!$testsh && $shellotickext)) {
|
||||||
|
die "FAILED: $testname: ServerHello extension Session Ticket check "
|
||||||
|
."failed (Test $testno)\n";
|
||||||
|
}
|
||||||
|
if (($testtickseen && !$ticketseen) || (!$testtickseen && $ticketseen)) {
|
||||||
|
die "FAILED: $testname: Session Ticket message presence check failed "
|
||||||
|
."(Test $testno)\n";
|
||||||
|
}
|
||||||
|
if (($testhand && !$fullhand) || (!$testhand && $fullhand)) {
|
||||||
|
die "FAILED: $testname: Session Ticket full handshake check failed "
|
||||||
|
."(Test $testno)\n";
|
||||||
|
}
|
||||||
|
print "SUCCESS: $testname (Test#$testno)\n";
|
||||||
|
}
|
||||||
|
|
||||||
|
sub clearall()
|
||||||
|
{
|
||||||
|
$chellotickext = 0;
|
||||||
|
$shellotickext = 0;
|
||||||
|
$fullhand = 0;
|
||||||
|
$ticketseen = 0;
|
||||||
|
$proxy->clear();
|
||||||
|
}
|
@ -58,7 +58,8 @@ package TLSProxy::ClientHello;
|
|||||||
use parent 'TLSProxy::Message';
|
use parent 'TLSProxy::Message';
|
||||||
|
|
||||||
use constant {
|
use constant {
|
||||||
EXT_ENCRYPT_THEN_MAC => 22
|
EXT_ENCRYPT_THEN_MAC => 22,
|
||||||
|
EXT_SESSION_TICKET => 35
|
||||||
};
|
};
|
||||||
|
|
||||||
sub new
|
sub new
|
||||||
|
@ -79,13 +79,16 @@ sub new
|
|||||||
server_addr => "localhost",
|
server_addr => "localhost",
|
||||||
server_port => 4443,
|
server_port => 4443,
|
||||||
filter => $filter,
|
filter => $filter,
|
||||||
|
serverflags => "",
|
||||||
|
clientflags => "",
|
||||||
|
serverconnects => 1,
|
||||||
|
|
||||||
#Public read
|
#Public read
|
||||||
execute => $execute,
|
execute => $execute,
|
||||||
cert => $cert,
|
cert => $cert,
|
||||||
debug => $debug,
|
debug => $debug,
|
||||||
cipherc => "AES128-SHA",
|
cipherc => "",
|
||||||
ciphers => "",
|
ciphers => "AES128-SHA",
|
||||||
flight => 0,
|
flight => 0,
|
||||||
record_list => [],
|
record_list => [],
|
||||||
message_list => [],
|
message_list => [],
|
||||||
@ -101,12 +104,15 @@ sub clear
|
|||||||
{
|
{
|
||||||
my $self = shift;
|
my $self = shift;
|
||||||
|
|
||||||
$self->{cipherc} = "AES128-SHA";
|
$self->{cipherc} = "";
|
||||||
$self->{ciphers} = "";
|
$self->{ciphers} = "AES128-SHA";
|
||||||
$self->{flight} = 0;
|
$self->{flight} = 0;
|
||||||
$self->{record_list} = [];
|
$self->{record_list} = [];
|
||||||
$self->{message_list} = [];
|
$self->{message_list} = [];
|
||||||
$self->{message_rec_list} = [];
|
$self->{message_rec_list} = [];
|
||||||
|
$self->{serverflags} = "";
|
||||||
|
$self->{clientflags} = "";
|
||||||
|
$self->{serverconnects} = 1;
|
||||||
|
|
||||||
TLSProxy::Message->clear();
|
TLSProxy::Message->clear();
|
||||||
TLSProxy::Record->clear();
|
TLSProxy::Record->clear();
|
||||||
@ -120,6 +126,14 @@ sub restart
|
|||||||
$self->start;
|
$self->start;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
sub clientrestart
|
||||||
|
{
|
||||||
|
my $self = shift;
|
||||||
|
|
||||||
|
$self->clear;
|
||||||
|
$self->clientstart;
|
||||||
|
}
|
||||||
|
|
||||||
sub start
|
sub start
|
||||||
{
|
{
|
||||||
my ($self) = shift;
|
my ($self) = shift;
|
||||||
@ -132,13 +146,22 @@ sub start
|
|||||||
open(STDERR, ">&STDOUT");
|
open(STDERR, ">&STDOUT");
|
||||||
my $execcmd = $self->execute." s_server -rev -engine ossltest -accept "
|
my $execcmd = $self->execute." s_server -rev -engine ossltest -accept "
|
||||||
.($self->server_port)
|
.($self->server_port)
|
||||||
." -cert ".$self->cert." -naccept 1";
|
." -cert ".$self->cert." -naccept ".$self->serverconnects;
|
||||||
if ($self->ciphers ne "") {
|
if ($self->ciphers ne "") {
|
||||||
$execcmd .= " -cipher ".$self->ciphers;
|
$execcmd .= " -cipher ".$self->ciphers;
|
||||||
}
|
}
|
||||||
|
if ($self->serverflags ne "") {
|
||||||
|
$execcmd .= " ".$self->serverflags;
|
||||||
|
}
|
||||||
exec($execcmd);
|
exec($execcmd);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
$self->clientstart;
|
||||||
|
}
|
||||||
|
|
||||||
|
sub clientstart
|
||||||
|
{
|
||||||
|
my ($self) = shift;
|
||||||
my $oldstdout;
|
my $oldstdout;
|
||||||
|
|
||||||
if(!$self->debug) {
|
if(!$self->debug) {
|
||||||
@ -173,6 +196,9 @@ sub start
|
|||||||
if ($self->cipherc ne "") {
|
if ($self->cipherc ne "") {
|
||||||
$execcmd .= " -cipher ".$self->cipherc;
|
$execcmd .= " -cipher ".$self->cipherc;
|
||||||
}
|
}
|
||||||
|
if ($self->clientflags ne "") {
|
||||||
|
$execcmd .= " ".$self->clientflags;
|
||||||
|
}
|
||||||
exec($execcmd);
|
exec($execcmd);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -274,7 +300,9 @@ sub process_packet
|
|||||||
print "\n";
|
print "\n";
|
||||||
|
|
||||||
#Finished parsing. Call user provided filter here
|
#Finished parsing. Call user provided filter here
|
||||||
$self->filter->($self);
|
if(defined $self->filter) {
|
||||||
|
$self->filter->($self);
|
||||||
|
}
|
||||||
|
|
||||||
#Reconstruct the packet
|
#Reconstruct the packet
|
||||||
$packet = "";
|
$packet = "";
|
||||||
@ -392,4 +420,28 @@ sub ciphers
|
|||||||
}
|
}
|
||||||
return $self->{ciphers};
|
return $self->{ciphers};
|
||||||
}
|
}
|
||||||
|
sub serverflags
|
||||||
|
{
|
||||||
|
my $self = shift;
|
||||||
|
if (@_) {
|
||||||
|
$self->{serverflags} = shift;
|
||||||
|
}
|
||||||
|
return $self->{serverflags};
|
||||||
|
}
|
||||||
|
sub clientflags
|
||||||
|
{
|
||||||
|
my $self = shift;
|
||||||
|
if (@_) {
|
||||||
|
$self->{clientflags} = shift;
|
||||||
|
}
|
||||||
|
return $self->{clientflags};
|
||||||
|
}
|
||||||
|
sub serverconnects
|
||||||
|
{
|
||||||
|
my $self = shift;
|
||||||
|
if (@_) {
|
||||||
|
$self->{serverconnects} = shift;
|
||||||
|
}
|
||||||
|
return $self->{serverconnects};
|
||||||
|
}
|
||||||
1;
|
1;
|
||||||
|
Loading…
x
Reference in New Issue
Block a user