diff options
Diffstat (limited to 'src/regress/lib/libssl/tlsext/tlsexttest.c')
-rw-r--r-- | src/regress/lib/libssl/tlsext/tlsexttest.c | 1153 |
1 files changed, 576 insertions, 577 deletions
diff --git a/src/regress/lib/libssl/tlsext/tlsexttest.c b/src/regress/lib/libssl/tlsext/tlsexttest.c index 4f9e6e29e2..df448924a3 100644 --- a/src/regress/lib/libssl/tlsext/tlsexttest.c +++ b/src/regress/lib/libssl/tlsext/tlsexttest.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: tlsexttest.c,v 1.5 2017/08/11 20:14:13 doug Exp $ */ | 1 | /* $OpenBSD: tlsexttest.c,v 1.6 2017/08/11 21:12:39 jsing Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2017 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2017 Joel Sing <jsing@openbsd.org> |
4 | * | 4 | * |
@@ -73,382 +73,269 @@ do { \ | |||
73 | } while(0) | 73 | } while(0) |
74 | 74 | ||
75 | /* | 75 | /* |
76 | * Renegotiation Indication - RFC 5746. | 76 | * Supported Elliptic Curves - RFC 4492 section 5.1.1. |
77 | * | ||
78 | * This extension is only used by the client. | ||
77 | */ | 79 | */ |
78 | 80 | ||
79 | static unsigned char tlsext_ri_prev_client[] = { | 81 | static uint8_t tlsext_ec_clienthello_default[] = { |
80 | 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, | 82 | 0x00, 0x06, |
81 | 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff, | 83 | 0x00, 0x1d, /* X25519 (29) */ |
84 | 0x00, 0x17, /* secp256r1 (23) */ | ||
85 | 0x00, 0x18 /* secp384r1 (24) */ | ||
82 | }; | 86 | }; |
83 | 87 | ||
84 | static unsigned char tlsext_ri_prev_server[] = { | 88 | static uint16_t tlsext_ec_clienthello_secp384r1_val[] = { |
85 | 0xff, 0xee, 0xdd, 0xcc, 0xbb, 0xaa, 0x99, 0x88, | 89 | 0x0018 /* tls1_ec_nid2curve_id(NID_secp384r1) */ |
86 | 0x77, 0x66, 0x55, 0x44, 0x33, 0x22, 0x11, 0x00, | ||
87 | }; | 90 | }; |
88 | 91 | static uint8_t tlsext_ec_clienthello_secp384r1[] = { | |
89 | static unsigned char tlsext_ri_clienthello[] = { | 92 | 0x00, 0x02, |
90 | 0x10, | 93 | 0x00, 0x18 /* secp384r1 (24) */ |
91 | 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, | ||
92 | 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff, | ||
93 | }; | 94 | }; |
94 | 95 | ||
95 | static unsigned char tlsext_ri_serverhello[] = { | 96 | /* Example from RFC 4492 section 5.1.1 */ |
96 | 0x20, | 97 | static uint16_t tlsext_ec_clienthello_nistp192and224_val[] = { |
97 | 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, | 98 | 0x0013, /* tls1_ec_nid2curve_id(NID_X9_62_prime192v1) */ |
98 | 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff, | 99 | 0x0015 /* tls1_ec_nid2curve_id(NID_secp224r1) */ |
99 | 0xff, 0xee, 0xdd, 0xcc, 0xbb, 0xaa, 0x99, 0x88, | 100 | }; |
100 | 0x77, 0x66, 0x55, 0x44, 0x33, 0x22, 0x11, 0x00, | 101 | static uint8_t tlsext_ec_clienthello_nistp192and224[] = { |
102 | 0x00, 0x04, | ||
103 | 0x00, 0x13, /* secp192r1 aka NIST P-192 */ | ||
104 | 0x00, 0x15 /* secp224r1 aka NIST P-224 */ | ||
101 | }; | 105 | }; |
102 | 106 | ||
103 | static int | 107 | static int |
104 | test_tlsext_ri_clienthello(void) | 108 | test_tlsext_ec_clienthello(void) |
105 | { | 109 | { |
106 | unsigned char *data = NULL; | 110 | unsigned char *data = NULL; |
107 | SSL_CTX *ssl_ctx = NULL; | 111 | SSL_CTX *ssl_ctx = NULL; |
108 | SSL *ssl = NULL; | 112 | SSL *ssl = NULL; |
109 | int failure = 0; | ||
110 | size_t dlen; | 113 | size_t dlen; |
111 | int alert; | 114 | int failure, alert; |
112 | CBB cbb; | 115 | CBB cbb; |
113 | CBS cbs; | 116 | CBS cbs; |
114 | 117 | ||
118 | failure = 1; | ||
119 | |||
115 | CBB_init(&cbb, 0); | 120 | CBB_init(&cbb, 0); |
116 | 121 | ||
117 | if ((ssl_ctx = SSL_CTX_new(TLSv1_2_client_method())) == NULL) | 122 | if ((ssl_ctx = SSL_CTX_new(TLS_client_method())) == NULL) |
118 | errx(1, "failed to create SSL_CTX"); | 123 | errx(1, "failed to create SSL_CTX"); |
119 | if ((ssl = SSL_new(ssl_ctx)) == NULL) | 124 | if ((ssl = SSL_new(ssl_ctx)) == NULL) |
120 | errx(1, "failed to create SSL"); | 125 | errx(1, "failed to create SSL"); |
121 | 126 | ||
122 | if (tlsext_ri_clienthello_needs(ssl)) { | 127 | /* |
123 | fprintf(stderr, "FAIL: clienthello should not need RI\n"); | 128 | * Default ciphers include EC so we need it by default. |
124 | failure = 1; | 129 | */ |
125 | goto done; | 130 | if (!tlsext_ec_clienthello_needs(ssl)) { |
126 | } | 131 | FAIL("clienthello should need Ellipticcurves for default " |
127 | 132 | "ciphers\n"); | |
128 | if (!SSL_renegotiate(ssl)) { | 133 | goto err; |
129 | fprintf(stderr, "FAIL: client failed to set renegotiate\n"); | ||
130 | failure = 1; | ||
131 | goto done; | ||
132 | } | ||
133 | |||
134 | if (!tlsext_ri_clienthello_needs(ssl)) { | ||
135 | fprintf(stderr, "FAIL: clienthello should need RI\n"); | ||
136 | failure = 1; | ||
137 | goto done; | ||
138 | } | ||
139 | |||
140 | memcpy(S3I(ssl)->previous_client_finished, tlsext_ri_prev_client, | ||
141 | sizeof(tlsext_ri_prev_client)); | ||
142 | S3I(ssl)->previous_client_finished_len = sizeof(tlsext_ri_prev_client); | ||
143 | |||
144 | S3I(ssl)->renegotiate_seen = 0; | ||
145 | |||
146 | if (!tlsext_ri_clienthello_build(ssl, &cbb)) { | ||
147 | fprintf(stderr, "FAIL: clienthello failed to build RI\n"); | ||
148 | failure = 1; | ||
149 | goto done; | ||
150 | } | ||
151 | |||
152 | if (!CBB_finish(&cbb, &data, &dlen)) | ||
153 | errx(1, "failed to finish CBB"); | ||
154 | |||
155 | if (dlen != sizeof(tlsext_ri_clienthello)) { | ||
156 | fprintf(stderr, "FAIL: got clienthello RI with length %zu, " | ||
157 | "want length %zu\n", dlen, sizeof(tlsext_ri_clienthello)); | ||
158 | failure = 1; | ||
159 | goto done; | ||
160 | } | ||
161 | |||
162 | if (memcmp(data, tlsext_ri_clienthello, dlen) != 0) { | ||
163 | fprintf(stderr, "FAIL: clienthello RI differs:\n"); | ||
164 | fprintf(stderr, "received:\n"); | ||
165 | hexdump(data, dlen); | ||
166 | fprintf(stderr, "test data:\n"); | ||
167 | hexdump(tlsext_ri_clienthello, sizeof(tlsext_ri_clienthello)); | ||
168 | failure = 1; | ||
169 | goto done; | ||
170 | } | ||
171 | |||
172 | CBS_init(&cbs, tlsext_ri_clienthello, sizeof(tlsext_ri_clienthello)); | ||
173 | if (!tlsext_ri_clienthello_parse(ssl, &cbs, &alert)) { | ||
174 | fprintf(stderr, "FAIL: failed to parse clienthello RI\n"); | ||
175 | failure = 1; | ||
176 | goto done; | ||
177 | } | 134 | } |
178 | 135 | ||
179 | if (S3I(ssl)->renegotiate_seen != 1) { | 136 | /* |
180 | fprintf(stderr, "FAIL: renegotiate seen not set\n"); | 137 | * Exclude cipher suites so we can test not including it. |
181 | failure = 1; | 138 | */ |
182 | goto done; | 139 | if (!SSL_set_cipher_list(ssl, "TLSv1.2:!ECDHE:!ECDSA")) { |
140 | FAIL("clienthello should be able to set cipher list\n"); | ||
141 | goto err; | ||
183 | } | 142 | } |
184 | if (S3I(ssl)->send_connection_binding != 1) { | 143 | if (tlsext_ec_clienthello_needs(ssl)) { |
185 | fprintf(stderr, "FAIL: send connection binding not set\n"); | 144 | FAIL("clienthello should not need Ellipticcurves\n"); |
186 | failure = 1; | 145 | goto err; |
187 | goto done; | ||
188 | } | 146 | } |
189 | 147 | ||
190 | memset(S3I(ssl)->previous_client_finished, 0, | 148 | /* |
191 | sizeof(S3I(ssl)->previous_client_finished)); | 149 | * Use libtls default for the rest of the testing |
192 | 150 | */ | |
193 | S3I(ssl)->renegotiate_seen = 0; | 151 | if (!SSL_set_cipher_list(ssl, "TLSv1.2+AEAD+ECDHE")) { |
194 | 152 | FAIL("clienthello should be able to set cipher list\n"); | |
195 | CBS_init(&cbs, tlsext_ri_clienthello, sizeof(tlsext_ri_clienthello)); | 153 | goto err; |
196 | if (tlsext_ri_clienthello_parse(ssl, &cbs, &alert)) { | ||
197 | fprintf(stderr, "FAIL: parsed invalid clienthello RI\n"); | ||
198 | failure = 1; | ||
199 | goto done; | ||
200 | } | 154 | } |
201 | 155 | if (!tlsext_ec_clienthello_needs(ssl)) { | |
202 | if (S3I(ssl)->renegotiate_seen == 1) { | 156 | FAIL("clienthello should need Ellipticcurves\n"); |
203 | fprintf(stderr, "FAIL: renegotiate seen set\n"); | 157 | goto err; |
204 | failure = 1; | ||
205 | goto done; | ||
206 | } | 158 | } |
207 | 159 | ||
208 | done: | 160 | /* |
209 | CBB_cleanup(&cbb); | 161 | * Test with a session secp384r1. The default is used instead. |
210 | SSL_CTX_free(ssl_ctx); | 162 | */ |
211 | SSL_free(ssl); | 163 | if ((ssl->session = SSL_SESSION_new()) == NULL) |
212 | free(data); | 164 | errx(1, "failed to create session"); |
213 | |||
214 | return (failure); | ||
215 | } | ||
216 | |||
217 | static int | ||
218 | test_tlsext_ri_serverhello(void) | ||
219 | { | ||
220 | unsigned char *data = NULL; | ||
221 | SSL_CTX *ssl_ctx = NULL; | ||
222 | SSL *ssl = NULL; | ||
223 | int failure = 0; | ||
224 | size_t dlen; | ||
225 | int alert; | ||
226 | CBB cbb; | ||
227 | CBS cbs; | ||
228 | |||
229 | CBB_init(&cbb, 0); | ||
230 | |||
231 | if ((ssl_ctx = SSL_CTX_new(TLS_server_method())) == NULL) | ||
232 | errx(1, "failed to create SSL_CTX"); | ||
233 | if ((ssl = SSL_new(ssl_ctx)) == NULL) | ||
234 | errx(1, "failed to create SSL"); | ||
235 | 165 | ||
236 | if (tlsext_ri_serverhello_needs(ssl)) { | 166 | if ((SSI(ssl)->tlsext_supportedgroups = malloc(sizeof(uint16_t))) |
237 | fprintf(stderr, "FAIL: serverhello should not need RI\n"); | 167 | == NULL) { |
238 | failure = 1; | 168 | FAIL("client could not malloc\n"); |
239 | goto done; | 169 | goto err; |
240 | } | 170 | } |
171 | SSI(ssl)->tlsext_supportedgroups[0] = tls1_ec_nid2curve_id(NID_secp384r1); | ||
172 | SSI(ssl)->tlsext_supportedgroups_length = 1; | ||
241 | 173 | ||
242 | S3I(ssl)->send_connection_binding = 1; | 174 | if (!tlsext_ec_clienthello_needs(ssl)) { |
243 | 175 | FAIL("clienthello should need Ellipticcurves\n"); | |
244 | if (!tlsext_ri_serverhello_needs(ssl)) { | 176 | goto err; |
245 | fprintf(stderr, "FAIL: serverhello should need RI\n"); | ||
246 | failure = 1; | ||
247 | goto done; | ||
248 | } | 177 | } |
249 | 178 | ||
250 | memcpy(S3I(ssl)->previous_client_finished, tlsext_ri_prev_client, | 179 | if (!tlsext_ec_clienthello_build(ssl, &cbb)) { |
251 | sizeof(tlsext_ri_prev_client)); | 180 | FAIL("clienthello failed to build Ellipticcurves\n"); |
252 | S3I(ssl)->previous_client_finished_len = sizeof(tlsext_ri_prev_client); | 181 | goto err; |
253 | |||
254 | memcpy(S3I(ssl)->previous_server_finished, tlsext_ri_prev_server, | ||
255 | sizeof(tlsext_ri_prev_server)); | ||
256 | S3I(ssl)->previous_server_finished_len = sizeof(tlsext_ri_prev_server); | ||
257 | |||
258 | S3I(ssl)->renegotiate_seen = 0; | ||
259 | |||
260 | if (!tlsext_ri_serverhello_build(ssl, &cbb)) { | ||
261 | fprintf(stderr, "FAIL: serverhello failed to build RI\n"); | ||
262 | failure = 1; | ||
263 | goto done; | ||
264 | } | 182 | } |
265 | 183 | ||
266 | if (!CBB_finish(&cbb, &data, &dlen)) | 184 | if (!CBB_finish(&cbb, &data, &dlen)) |
267 | errx(1, "failed to finish CBB"); | 185 | errx(1, "failed to finish CBB"); |
268 | 186 | ||
269 | if (dlen != sizeof(tlsext_ri_serverhello)) { | 187 | if (dlen != sizeof(tlsext_ec_clienthello_default)) { |
270 | fprintf(stderr, "FAIL: got serverhello RI with length %zu, " | 188 | FAIL("got clienthello Ellipticcurves with length %zu, " |
271 | "want length %zu\n", dlen, sizeof(tlsext_ri_serverhello)); | 189 | "want length %zu\n", dlen, |
272 | failure = 1; | 190 | sizeof(tlsext_ec_clienthello_default)); |
273 | goto done; | 191 | compare_data(data, dlen, tlsext_ec_clienthello_default, |
274 | } | 192 | sizeof(tlsext_ec_clienthello_default)); |
275 | 193 | goto err; | |
276 | if (memcmp(data, tlsext_ri_serverhello, dlen) != 0) { | ||
277 | fprintf(stderr, "FAIL: serverhello RI differs:\n"); | ||
278 | fprintf(stderr, "received:\n"); | ||
279 | hexdump(data, dlen); | ||
280 | fprintf(stderr, "test data:\n"); | ||
281 | hexdump(tlsext_ri_serverhello, sizeof(tlsext_ri_serverhello)); | ||
282 | failure = 1; | ||
283 | goto done; | ||
284 | } | 194 | } |
285 | 195 | ||
286 | CBS_init(&cbs, tlsext_ri_serverhello, sizeof(tlsext_ri_serverhello)); | 196 | if (memcmp(data, tlsext_ec_clienthello_default, dlen) != 0) { |
287 | if (!tlsext_ri_serverhello_parse(ssl, &cbs, &alert)) { | 197 | FAIL("clienthello Ellipticcurves differs:\n"); |
288 | fprintf(stderr, "FAIL: failed to parse serverhello RI\n"); | 198 | compare_data(data, dlen, tlsext_ec_clienthello_default, |
289 | failure = 1; | 199 | sizeof(tlsext_ec_clienthello_default)); |
290 | goto done; | 200 | goto err; |
291 | } | 201 | } |
292 | 202 | ||
293 | if (S3I(ssl)->renegotiate_seen != 1) { | 203 | /* |
294 | fprintf(stderr, "FAIL: renegotiate seen not set\n"); | 204 | * Test parsing secp384r1 |
295 | failure = 1; | 205 | */ |
296 | goto done; | 206 | CBB_cleanup(&cbb); |
297 | } | 207 | CBB_init(&cbb, 0); |
298 | if (S3I(ssl)->send_connection_binding != 1) { | 208 | free(data); |
299 | fprintf(stderr, "FAIL: send connection binding not set\n"); | 209 | data = NULL; |
300 | failure = 1; | ||
301 | goto done; | ||
302 | } | ||
303 | 210 | ||
304 | memset(S3I(ssl)->previous_client_finished, 0, | 211 | SSL_SESSION_free(ssl->session); |
305 | sizeof(S3I(ssl)->previous_client_finished)); | 212 | if ((ssl->session = SSL_SESSION_new()) == NULL) |
306 | memset(S3I(ssl)->previous_server_finished, 0, | 213 | errx(1, "failed to create session"); |
307 | sizeof(S3I(ssl)->previous_server_finished)); | ||
308 | 214 | ||
309 | S3I(ssl)->renegotiate_seen = 0; | 215 | CBS_init(&cbs, tlsext_ec_clienthello_secp384r1, |
216 | sizeof(tlsext_ec_clienthello_secp384r1)); | ||
217 | if (!tlsext_ec_clienthello_parse(ssl, &cbs, &alert)) { | ||
218 | FAIL("failed to parse clienthello Ellipticcurves\n"); | ||
219 | goto err; | ||
220 | } | ||
310 | 221 | ||
311 | CBS_init(&cbs, tlsext_ri_serverhello, sizeof(tlsext_ri_serverhello)); | 222 | if (SSI(ssl)->tlsext_supportedgroups_length != |
312 | if (tlsext_ri_serverhello_parse(ssl, &cbs, &alert)) { | 223 | sizeof(tlsext_ec_clienthello_secp384r1_val) / sizeof(uint16_t)) { |
313 | fprintf(stderr, "FAIL: parsed invalid serverhello RI\n"); | 224 | FAIL("no tlsext_ellipticcurves from clienthello " |
314 | failure = 1; | 225 | "Ellipticcurves\n"); |
315 | goto done; | 226 | goto err; |
316 | } | 227 | } |
317 | 228 | ||
318 | if (S3I(ssl)->renegotiate_seen == 1) { | 229 | if (memcmp(SSI(ssl)->tlsext_supportedgroups, |
319 | fprintf(stderr, "FAIL: renegotiate seen set\n"); | 230 | tlsext_ec_clienthello_secp384r1_val, |
320 | failure = 1; | 231 | sizeof(tlsext_ec_clienthello_secp384r1_val)) != 0) { |
321 | goto done; | 232 | FAIL("clienthello had an incorrect Ellipticcurves " |
233 | "entry\n"); | ||
234 | compare_data2(SSI(ssl)->tlsext_supportedgroups, | ||
235 | SSI(ssl)->tlsext_supportedgroups_length * 2, | ||
236 | tlsext_ec_clienthello_secp384r1_val, | ||
237 | sizeof(tlsext_ec_clienthello_secp384r1_val)); | ||
238 | goto err; | ||
322 | } | 239 | } |
323 | 240 | ||
324 | done: | 241 | /* |
242 | * Use a custom order. | ||
243 | */ | ||
325 | CBB_cleanup(&cbb); | 244 | CBB_cleanup(&cbb); |
326 | SSL_CTX_free(ssl_ctx); | ||
327 | SSL_free(ssl); | ||
328 | free(data); | ||
329 | |||
330 | return (failure); | ||
331 | } | ||
332 | |||
333 | /* | ||
334 | * Server Name Indication - RFC 6066, section 3. | ||
335 | */ | ||
336 | |||
337 | #define TEST_SNI_SERVERNAME "www.libressl.org" | ||
338 | |||
339 | static unsigned char tlsext_sni_clienthello[] = { | ||
340 | 0x00, 0x13, 0x00, 0x00, 0x10, 0x77, 0x77, 0x77, | ||
341 | 0x2e, 0x6c, 0x69, 0x62, 0x72, 0x65, 0x73, 0x73, | ||
342 | 0x6c, 0x2e, 0x6f, 0x72, 0x67, | ||
343 | }; | ||
344 | |||
345 | static unsigned char tlsext_sni_serverhello[] = { | ||
346 | }; | ||
347 | |||
348 | static int | ||
349 | test_tlsext_sni_clienthello(void) | ||
350 | { | ||
351 | unsigned char *data = NULL; | ||
352 | SSL_CTX *ssl_ctx = NULL; | ||
353 | SSL *ssl = NULL; | ||
354 | int failure = 0; | ||
355 | size_t dlen; | ||
356 | int alert; | ||
357 | CBB cbb; | ||
358 | CBS cbs; | ||
359 | |||
360 | CBB_init(&cbb, 0); | 245 | CBB_init(&cbb, 0); |
361 | 246 | ||
362 | if ((ssl_ctx = SSL_CTX_new(TLS_client_method())) == NULL) | 247 | SSL_SESSION_free(ssl->session); |
363 | errx(1, "failed to create SSL_CTX"); | 248 | if ((ssl->session = SSL_SESSION_new()) == NULL) |
364 | if ((ssl = SSL_new(ssl_ctx)) == NULL) | 249 | errx(1, "failed to create session"); |
365 | errx(1, "failed to create SSL"); | ||
366 | |||
367 | if (tlsext_sni_clienthello_needs(ssl)) { | ||
368 | fprintf(stderr, "FAIL: clienthello should not need SNI\n"); | ||
369 | failure = 1; | ||
370 | goto done; | ||
371 | } | ||
372 | 250 | ||
373 | if (!SSL_set_tlsext_host_name(ssl, TEST_SNI_SERVERNAME)) { | 251 | if ((ssl->internal->tlsext_supportedgroups = malloc(sizeof(uint16_t) * 2)) == NULL) { |
374 | fprintf(stderr, "FAIL: client failed to set server name\n"); | 252 | FAIL("client could not malloc\n"); |
375 | failure = 1; | 253 | goto err; |
376 | goto done; | ||
377 | } | 254 | } |
255 | ssl->internal->tlsext_supportedgroups[0] = tls1_ec_nid2curve_id(NID_X9_62_prime192v1); | ||
256 | ssl->internal->tlsext_supportedgroups[1] = tls1_ec_nid2curve_id(NID_secp224r1); | ||
257 | ssl->internal->tlsext_supportedgroups_length = 2; | ||
378 | 258 | ||
379 | if (!tlsext_sni_clienthello_needs(ssl)) { | 259 | if (!tlsext_ec_clienthello_needs(ssl)) { |
380 | fprintf(stderr, "FAIL: clienthello should need SNI\n"); | 260 | FAIL("clienthello should need Ellipticcurves\n"); |
381 | failure = 1; | 261 | goto err; |
382 | goto done; | ||
383 | } | 262 | } |
384 | 263 | ||
385 | if (!tlsext_sni_clienthello_build(ssl, &cbb)) { | 264 | if (!tlsext_ec_clienthello_build(ssl, &cbb)) { |
386 | fprintf(stderr, "FAIL: clienthello failed to build SNI\n"); | 265 | FAIL("clienthello failed to build Ellipticcurves\n"); |
387 | failure = 1; | 266 | goto err; |
388 | goto done; | ||
389 | } | 267 | } |
390 | 268 | ||
391 | if (!CBB_finish(&cbb, &data, &dlen)) | 269 | if (!CBB_finish(&cbb, &data, &dlen)) |
392 | errx(1, "failed to finish CBB"); | 270 | errx(1, "failed to finish CBB"); |
393 | 271 | ||
394 | if (dlen != sizeof(tlsext_sni_clienthello)) { | 272 | if (dlen != sizeof(tlsext_ec_clienthello_nistp192and224)) { |
395 | fprintf(stderr, "FAIL: got clienthello SNI with length %zu, " | 273 | FAIL("got clienthello Ellipticcurves with length %zu, " |
396 | "want length %zu\n", dlen, sizeof(tlsext_sni_clienthello)); | 274 | "want length %zu\n", dlen, |
397 | failure = 1; | 275 | sizeof(tlsext_ec_clienthello_nistp192and224)); |
398 | goto done; | 276 | fprintf(stderr, "received:\n"); |
277 | hexdump(data, dlen); | ||
278 | fprintf(stderr, "test data:\n"); | ||
279 | hexdump(tlsext_ec_clienthello_nistp192and224, | ||
280 | sizeof(tlsext_ec_clienthello_nistp192and224)); | ||
281 | goto err; | ||
399 | } | 282 | } |
400 | 283 | ||
401 | if (memcmp(data, tlsext_sni_clienthello, dlen) != 0) { | 284 | if (memcmp(data, tlsext_ec_clienthello_nistp192and224, dlen) != 0) { |
402 | fprintf(stderr, "FAIL: clienthello SNI differs:\n"); | 285 | FAIL("clienthello Ellipticcurves differs:\n"); |
403 | fprintf(stderr, "received:\n"); | 286 | fprintf(stderr, "received:\n"); |
404 | hexdump(data, dlen); | 287 | hexdump(data, dlen); |
405 | fprintf(stderr, "test data:\n"); | 288 | fprintf(stderr, "test data:\n"); |
406 | hexdump(tlsext_sni_clienthello, sizeof(tlsext_sni_clienthello)); | 289 | hexdump(tlsext_ec_clienthello_nistp192and224, |
407 | failure = 1; | 290 | sizeof(tlsext_ec_clienthello_nistp192and224)); |
408 | goto done; | 291 | goto err; |
409 | } | 292 | } |
410 | 293 | ||
294 | /* | ||
295 | * Parse non-default curves to session. | ||
296 | */ | ||
297 | CBB_cleanup(&cbb); | ||
298 | CBB_init(&cbb, 0); | ||
299 | free(data); | ||
300 | data = NULL; | ||
301 | |||
302 | SSL_SESSION_free(ssl->session); | ||
411 | if ((ssl->session = SSL_SESSION_new()) == NULL) | 303 | if ((ssl->session = SSL_SESSION_new()) == NULL) |
412 | errx(1, "failed to create session"); | 304 | errx(1, "failed to create session"); |
413 | 305 | ||
414 | ssl->internal->hit = 0; | 306 | /* Reset back to the default list. */ |
307 | free(ssl->internal->tlsext_supportedgroups); | ||
308 | ssl->internal->tlsext_supportedgroups = NULL; | ||
309 | ssl->internal->tlsext_supportedgroups_length = 0; | ||
415 | 310 | ||
416 | CBS_init(&cbs, tlsext_sni_clienthello, sizeof(tlsext_sni_clienthello)); | 311 | CBS_init(&cbs, tlsext_ec_clienthello_nistp192and224, |
417 | if (!tlsext_sni_clienthello_parse(ssl, &cbs, &alert)) { | 312 | sizeof(tlsext_ec_clienthello_nistp192and224)); |
418 | fprintf(stderr, "FAIL: failed to parse clienthello SNI\n"); | 313 | if (!tlsext_ec_clienthello_parse(ssl, &cbs, &alert)) { |
419 | failure = 1; | 314 | FAIL("failed to parse clienthello Ellipticcurves\n"); |
420 | goto done; | 315 | goto err; |
421 | } | 316 | } |
422 | 317 | ||
423 | if (ssl->session->tlsext_hostname == NULL) { | 318 | if (SSI(ssl)->tlsext_supportedgroups_length != |
424 | fprintf(stderr, "FAIL: no tlsext_hostname from clienthello SNI\n"); | 319 | sizeof(tlsext_ec_clienthello_nistp192and224_val) / sizeof(uint16_t)) { |
425 | failure = 1; | 320 | FAIL("no tlsext_ellipticcurves from clienthello " |
426 | goto done; | 321 | "Ellipticcurves\n"); |
322 | goto err; | ||
427 | } | 323 | } |
428 | 324 | ||
429 | if (strlen(ssl->session->tlsext_hostname) != strlen(TEST_SNI_SERVERNAME) || | 325 | if (memcmp(SSI(ssl)->tlsext_supportedgroups, |
430 | strncmp(ssl->session->tlsext_hostname, TEST_SNI_SERVERNAME, | 326 | tlsext_ec_clienthello_nistp192and224_val, |
431 | strlen(TEST_SNI_SERVERNAME)) != 0) { | 327 | sizeof(tlsext_ec_clienthello_nistp192and224_val)) != 0) { |
432 | fprintf(stderr, "FAIL: got tlsext_hostname `%s', want `%s'\n", | 328 | FAIL("clienthello had an incorrect Ellipticcurves entry\n"); |
433 | ssl->session->tlsext_hostname, TEST_SNI_SERVERNAME); | 329 | compare_data2(SSI(ssl)->tlsext_supportedgroups, |
434 | failure = 1; | 330 | SSI(ssl)->tlsext_supportedgroups_length * 2, |
435 | goto done; | 331 | tlsext_ec_clienthello_nistp192and224_val, |
332 | sizeof(tlsext_ec_clienthello_nistp192and224_val)); | ||
333 | goto err; | ||
436 | } | 334 | } |
437 | 335 | ||
438 | ssl->internal->hit = 1; | 336 | failure = 0; |
439 | |||
440 | if ((ssl->session->tlsext_hostname = strdup("notthesame.libressl.org")) == | ||
441 | NULL) | ||
442 | errx(1, "failed to strdup tlsext_hostname"); | ||
443 | |||
444 | CBS_init(&cbs, tlsext_sni_clienthello, sizeof(tlsext_sni_clienthello)); | ||
445 | if (tlsext_sni_clienthello_parse(ssl, &cbs, &alert)) { | ||
446 | fprintf(stderr, "FAIL: parsed clienthello with mismatched SNI\n"); | ||
447 | failure = 1; | ||
448 | goto done; | ||
449 | } | ||
450 | 337 | ||
451 | done: | 338 | err: |
452 | CBB_cleanup(&cbb); | 339 | CBB_cleanup(&cbb); |
453 | SSL_CTX_free(ssl_ctx); | 340 | SSL_CTX_free(ssl_ctx); |
454 | SSL_free(ssl); | 341 | SSL_free(ssl); |
@@ -457,112 +344,47 @@ test_tlsext_sni_clienthello(void) | |||
457 | return (failure); | 344 | return (failure); |
458 | } | 345 | } |
459 | 346 | ||
347 | |||
348 | /* elliptic_curves is only used by the client so this doesn't test much. */ | ||
460 | static int | 349 | static int |
461 | test_tlsext_sni_serverhello(void) | 350 | test_tlsext_ec_serverhello(void) |
462 | { | 351 | { |
463 | unsigned char *data = NULL; | ||
464 | SSL_CTX *ssl_ctx = NULL; | 352 | SSL_CTX *ssl_ctx = NULL; |
465 | SSL *ssl = NULL; | 353 | SSL *ssl = NULL; |
466 | int failure = 0; | 354 | int failure; |
467 | size_t dlen; | ||
468 | int alert; | ||
469 | CBB cbb; | ||
470 | CBS cbs; | ||
471 | 355 | ||
472 | CBB_init(&cbb, 0); | 356 | failure = 1; |
473 | 357 | ||
474 | if ((ssl_ctx = SSL_CTX_new(TLS_server_method())) == NULL) | 358 | if ((ssl_ctx = SSL_CTX_new(TLS_server_method())) == NULL) |
475 | errx(1, "failed to create SSL_CTX"); | 359 | errx(1, "failed to create SSL_CTX"); |
476 | if ((ssl = SSL_new(ssl_ctx)) == NULL) | 360 | if ((ssl = SSL_new(ssl_ctx)) == NULL) |
477 | errx(1, "failed to create SSL"); | 361 | errx(1, "failed to create SSL"); |
478 | 362 | ||
479 | if ((ssl->session = SSL_SESSION_new()) == NULL) | 363 | if (tlsext_ec_serverhello_needs(ssl)) { |
480 | errx(1, "failed to create session"); | 364 | FAIL("serverhello should not need elliptic_curves\n"); |
481 | 365 | goto err; | |
482 | if (tlsext_sni_serverhello_needs(ssl)) { | ||
483 | fprintf(stderr, "FAIL: serverhello should not need SNI\n"); | ||
484 | failure = 1; | ||
485 | goto done; | ||
486 | } | ||
487 | |||
488 | if (!SSL_set_tlsext_host_name(ssl, TEST_SNI_SERVERNAME)) { | ||
489 | fprintf(stderr, "FAIL: client failed to set server name\n"); | ||
490 | failure = 1; | ||
491 | goto done; | ||
492 | } | ||
493 | |||
494 | if ((ssl->session->tlsext_hostname = strdup(TEST_SNI_SERVERNAME)) == | ||
495 | NULL) | ||
496 | errx(1, "failed to strdup tlsext_hostname"); | ||
497 | |||
498 | if (!tlsext_sni_serverhello_needs(ssl)) { | ||
499 | fprintf(stderr, "FAIL: serverhello should need SNI\n"); | ||
500 | failure = 1; | ||
501 | goto done; | ||
502 | } | ||
503 | |||
504 | if (!tlsext_sni_serverhello_build(ssl, &cbb)) { | ||
505 | fprintf(stderr, "FAIL: serverhello failed to build SNI\n"); | ||
506 | failure = 1; | ||
507 | goto done; | ||
508 | } | ||
509 | |||
510 | if (!CBB_finish(&cbb, &data, &dlen)) | ||
511 | errx(1, "failed to finish CBB"); | ||
512 | |||
513 | if (dlen != sizeof(tlsext_sni_serverhello)) { | ||
514 | fprintf(stderr, "FAIL: got serverhello SNI with length %zu, " | ||
515 | "want length %zu\n", dlen, sizeof(tlsext_sni_serverhello)); | ||
516 | failure = 1; | ||
517 | goto done; | ||
518 | } | ||
519 | |||
520 | if (memcmp(data, tlsext_sni_serverhello, dlen) != 0) { | ||
521 | fprintf(stderr, "FAIL: serverhello SNI differs:\n"); | ||
522 | fprintf(stderr, "received:\n"); | ||
523 | hexdump(data, dlen); | ||
524 | fprintf(stderr, "test data:\n"); | ||
525 | hexdump(tlsext_sni_serverhello, sizeof(tlsext_sni_serverhello)); | ||
526 | failure = 1; | ||
527 | goto done; | ||
528 | } | 366 | } |
529 | 367 | ||
530 | free(ssl->session->tlsext_hostname); | 368 | if ((ssl->session = SSL_SESSION_new()) == NULL) |
531 | ssl->session->tlsext_hostname = NULL; | 369 | errx(1, "failed to create session"); |
532 | |||
533 | CBS_init(&cbs, tlsext_sni_serverhello, sizeof(tlsext_sni_serverhello)); | ||
534 | if (!tlsext_sni_serverhello_parse(ssl, &cbs, &alert)) { | ||
535 | fprintf(stderr, "FAIL: failed to parse serverhello SNI\n"); | ||
536 | failure = 1; | ||
537 | goto done; | ||
538 | } | ||
539 | 370 | ||
540 | if (ssl->session->tlsext_hostname == NULL) { | 371 | if (tlsext_ec_serverhello_needs(ssl)) { |
541 | fprintf(stderr, "FAIL: no tlsext_hostname after serverhello SNI\n"); | 372 | FAIL("serverhello should not need elliptic_curves\n"); |
542 | failure = 1; | 373 | goto err; |
543 | goto done; | ||
544 | } | 374 | } |
545 | 375 | ||
546 | if (strlen(ssl->session->tlsext_hostname) != strlen(TEST_SNI_SERVERNAME) || | 376 | failure = 0; |
547 | strncmp(ssl->session->tlsext_hostname, TEST_SNI_SERVERNAME, | ||
548 | strlen(TEST_SNI_SERVERNAME)) != 0) { | ||
549 | fprintf(stderr, "FAIL: got tlsext_hostname `%s', want `%s'\n", | ||
550 | ssl->session->tlsext_hostname, TEST_SNI_SERVERNAME); | ||
551 | failure = 1; | ||
552 | goto done; | ||
553 | } | ||
554 | 377 | ||
555 | done: | 378 | err: |
556 | CBB_cleanup(&cbb); | ||
557 | SSL_CTX_free(ssl_ctx); | 379 | SSL_CTX_free(ssl_ctx); |
558 | SSL_free(ssl); | 380 | SSL_free(ssl); |
559 | free(data); | ||
560 | 381 | ||
561 | return (failure); | 382 | return (failure); |
383 | |||
562 | } | 384 | } |
563 | 385 | ||
564 | /* | 386 | /* |
565 | * ECPointFormats - RFC 4492 section 5.1.2 (Supported Point Formats). | 387 | * Supported Point Formats - RFC 4492 section 5.1.2. |
566 | * | 388 | * |
567 | * Examples are from the RFC. Both client and server have the same build and | 389 | * Examples are from the RFC. Both client and server have the same build and |
568 | * parse but the needs differ. | 390 | * parse but the needs differ. |
@@ -810,7 +632,6 @@ test_tlsext_ecpf_clienthello(void) | |||
810 | return (failure); | 632 | return (failure); |
811 | } | 633 | } |
812 | 634 | ||
813 | |||
814 | static int | 635 | static int |
815 | test_tlsext_ecpf_serverhello(void) | 636 | test_tlsext_ecpf_serverhello(void) |
816 | { | 637 | { |
@@ -1011,269 +832,382 @@ test_tlsext_ecpf_serverhello(void) | |||
1011 | } | 832 | } |
1012 | 833 | ||
1013 | /* | 834 | /* |
1014 | * ellliptic_curves - RFC 4492 section 5.1.1 (Supported Elliptic Curves). | 835 | * Renegotiation Indication - RFC 5746. |
1015 | * | ||
1016 | * This extension is only used by the client. | ||
1017 | */ | 836 | */ |
1018 | 837 | ||
1019 | static uint8_t tlsext_ec_clienthello_default[] = { | 838 | static unsigned char tlsext_ri_prev_client[] = { |
1020 | 0x00, 0x06, | 839 | 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, |
1021 | 0x00, 0x1d, /* X25519 (29) */ | 840 | 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff, |
1022 | 0x00, 0x17, /* secp256r1 (23) */ | ||
1023 | 0x00, 0x18 /* secp384r1 (24) */ | ||
1024 | }; | 841 | }; |
1025 | 842 | ||
1026 | static uint16_t tlsext_ec_clienthello_secp384r1_val[] = { | 843 | static unsigned char tlsext_ri_prev_server[] = { |
1027 | 0x0018 /* tls1_ec_nid2curve_id(NID_secp384r1) */ | 844 | 0xff, 0xee, 0xdd, 0xcc, 0xbb, 0xaa, 0x99, 0x88, |
1028 | }; | 845 | 0x77, 0x66, 0x55, 0x44, 0x33, 0x22, 0x11, 0x00, |
1029 | static uint8_t tlsext_ec_clienthello_secp384r1[] = { | ||
1030 | 0x00, 0x02, | ||
1031 | 0x00, 0x18 /* secp384r1 (24) */ | ||
1032 | }; | 846 | }; |
1033 | 847 | ||
1034 | /* Example from RFC 4492 section 5.1.1 */ | 848 | static unsigned char tlsext_ri_clienthello[] = { |
1035 | static uint16_t tlsext_ec_clienthello_nistp192and224_val[] = { | 849 | 0x10, |
1036 | 0x0013, /* tls1_ec_nid2curve_id(NID_X9_62_prime192v1) */ | 850 | 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, |
1037 | 0x0015 /* tls1_ec_nid2curve_id(NID_secp224r1) */ | 851 | 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff, |
1038 | }; | 852 | }; |
1039 | static uint8_t tlsext_ec_clienthello_nistp192and224[] = { | 853 | |
1040 | 0x00, 0x04, | 854 | static unsigned char tlsext_ri_serverhello[] = { |
1041 | 0x00, 0x13, /* secp192r1 aka NIST P-192 */ | 855 | 0x20, |
1042 | 0x00, 0x15 /* secp224r1 aka NIST P-224 */ | 856 | 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, |
857 | 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff, | ||
858 | 0xff, 0xee, 0xdd, 0xcc, 0xbb, 0xaa, 0x99, 0x88, | ||
859 | 0x77, 0x66, 0x55, 0x44, 0x33, 0x22, 0x11, 0x00, | ||
1043 | }; | 860 | }; |
1044 | 861 | ||
1045 | static int | 862 | static int |
1046 | test_tlsext_ec_clienthello(void) | 863 | test_tlsext_ri_clienthello(void) |
1047 | { | 864 | { |
1048 | unsigned char *data = NULL; | 865 | unsigned char *data = NULL; |
1049 | SSL_CTX *ssl_ctx = NULL; | 866 | SSL_CTX *ssl_ctx = NULL; |
1050 | SSL *ssl = NULL; | 867 | SSL *ssl = NULL; |
868 | int failure = 0; | ||
1051 | size_t dlen; | 869 | size_t dlen; |
1052 | int failure, alert; | 870 | int alert; |
1053 | CBB cbb; | 871 | CBB cbb; |
1054 | CBS cbs; | 872 | CBS cbs; |
1055 | 873 | ||
1056 | failure = 1; | ||
1057 | |||
1058 | CBB_init(&cbb, 0); | 874 | CBB_init(&cbb, 0); |
1059 | 875 | ||
1060 | if ((ssl_ctx = SSL_CTX_new(TLS_client_method())) == NULL) | 876 | if ((ssl_ctx = SSL_CTX_new(TLSv1_2_client_method())) == NULL) |
1061 | errx(1, "failed to create SSL_CTX"); | 877 | errx(1, "failed to create SSL_CTX"); |
1062 | if ((ssl = SSL_new(ssl_ctx)) == NULL) | 878 | if ((ssl = SSL_new(ssl_ctx)) == NULL) |
1063 | errx(1, "failed to create SSL"); | 879 | errx(1, "failed to create SSL"); |
1064 | 880 | ||
1065 | /* | 881 | if (tlsext_ri_clienthello_needs(ssl)) { |
1066 | * Default ciphers include EC so we need it by default. | 882 | fprintf(stderr, "FAIL: clienthello should not need RI\n"); |
1067 | */ | 883 | failure = 1; |
1068 | if (!tlsext_ec_clienthello_needs(ssl)) { | 884 | goto done; |
1069 | FAIL("clienthello should need Ellipticcurves for default " | ||
1070 | "ciphers\n"); | ||
1071 | goto err; | ||
1072 | } | 885 | } |
1073 | 886 | ||
1074 | /* | 887 | if (!SSL_renegotiate(ssl)) { |
1075 | * Exclude cipher suites so we can test not including it. | 888 | fprintf(stderr, "FAIL: client failed to set renegotiate\n"); |
1076 | */ | 889 | failure = 1; |
1077 | if (!SSL_set_cipher_list(ssl, "TLSv1.2:!ECDHE:!ECDSA")) { | 890 | goto done; |
1078 | FAIL("clienthello should be able to set cipher list\n"); | ||
1079 | goto err; | ||
1080 | } | ||
1081 | if (tlsext_ec_clienthello_needs(ssl)) { | ||
1082 | FAIL("clienthello should not need Ellipticcurves\n"); | ||
1083 | goto err; | ||
1084 | } | 891 | } |
1085 | 892 | ||
1086 | /* | 893 | if (!tlsext_ri_clienthello_needs(ssl)) { |
1087 | * Use libtls default for the rest of the testing | 894 | fprintf(stderr, "FAIL: clienthello should need RI\n"); |
1088 | */ | 895 | failure = 1; |
1089 | if (!SSL_set_cipher_list(ssl, "TLSv1.2+AEAD+ECDHE")) { | 896 | goto done; |
1090 | FAIL("clienthello should be able to set cipher list\n"); | ||
1091 | goto err; | ||
1092 | } | 897 | } |
1093 | if (!tlsext_ec_clienthello_needs(ssl)) { | 898 | |
1094 | FAIL("clienthello should need Ellipticcurves\n"); | 899 | memcpy(S3I(ssl)->previous_client_finished, tlsext_ri_prev_client, |
1095 | goto err; | 900 | sizeof(tlsext_ri_prev_client)); |
901 | S3I(ssl)->previous_client_finished_len = sizeof(tlsext_ri_prev_client); | ||
902 | |||
903 | S3I(ssl)->renegotiate_seen = 0; | ||
904 | |||
905 | if (!tlsext_ri_clienthello_build(ssl, &cbb)) { | ||
906 | fprintf(stderr, "FAIL: clienthello failed to build RI\n"); | ||
907 | failure = 1; | ||
908 | goto done; | ||
1096 | } | 909 | } |
1097 | 910 | ||
1098 | /* | 911 | if (!CBB_finish(&cbb, &data, &dlen)) |
1099 | * Test with a session secp384r1. The default is used instead. | 912 | errx(1, "failed to finish CBB"); |
1100 | */ | ||
1101 | if ((ssl->session = SSL_SESSION_new()) == NULL) | ||
1102 | errx(1, "failed to create session"); | ||
1103 | 913 | ||
1104 | if ((SSI(ssl)->tlsext_supportedgroups = malloc(sizeof(uint16_t))) | 914 | if (dlen != sizeof(tlsext_ri_clienthello)) { |
1105 | == NULL) { | 915 | fprintf(stderr, "FAIL: got clienthello RI with length %zu, " |
1106 | FAIL("client could not malloc\n"); | 916 | "want length %zu\n", dlen, sizeof(tlsext_ri_clienthello)); |
1107 | goto err; | 917 | failure = 1; |
918 | goto done; | ||
1108 | } | 919 | } |
1109 | SSI(ssl)->tlsext_supportedgroups[0] = tls1_ec_nid2curve_id(NID_secp384r1); | ||
1110 | SSI(ssl)->tlsext_supportedgroups_length = 1; | ||
1111 | 920 | ||
1112 | if (!tlsext_ec_clienthello_needs(ssl)) { | 921 | if (memcmp(data, tlsext_ri_clienthello, dlen) != 0) { |
1113 | FAIL("clienthello should need Ellipticcurves\n"); | 922 | fprintf(stderr, "FAIL: clienthello RI differs:\n"); |
1114 | goto err; | 923 | fprintf(stderr, "received:\n"); |
924 | hexdump(data, dlen); | ||
925 | fprintf(stderr, "test data:\n"); | ||
926 | hexdump(tlsext_ri_clienthello, sizeof(tlsext_ri_clienthello)); | ||
927 | failure = 1; | ||
928 | goto done; | ||
1115 | } | 929 | } |
1116 | 930 | ||
1117 | if (!tlsext_ec_clienthello_build(ssl, &cbb)) { | 931 | CBS_init(&cbs, tlsext_ri_clienthello, sizeof(tlsext_ri_clienthello)); |
1118 | FAIL("clienthello failed to build Ellipticcurves\n"); | 932 | if (!tlsext_ri_clienthello_parse(ssl, &cbs, &alert)) { |
1119 | goto err; | 933 | fprintf(stderr, "FAIL: failed to parse clienthello RI\n"); |
934 | failure = 1; | ||
935 | goto done; | ||
1120 | } | 936 | } |
1121 | 937 | ||
1122 | if (!CBB_finish(&cbb, &data, &dlen)) | 938 | if (S3I(ssl)->renegotiate_seen != 1) { |
1123 | errx(1, "failed to finish CBB"); | 939 | fprintf(stderr, "FAIL: renegotiate seen not set\n"); |
940 | failure = 1; | ||
941 | goto done; | ||
942 | } | ||
943 | if (S3I(ssl)->send_connection_binding != 1) { | ||
944 | fprintf(stderr, "FAIL: send connection binding not set\n"); | ||
945 | failure = 1; | ||
946 | goto done; | ||
947 | } | ||
1124 | 948 | ||
1125 | if (dlen != sizeof(tlsext_ec_clienthello_default)) { | 949 | memset(S3I(ssl)->previous_client_finished, 0, |
1126 | FAIL("got clienthello Ellipticcurves with length %zu, " | 950 | sizeof(S3I(ssl)->previous_client_finished)); |
1127 | "want length %zu\n", dlen, | 951 | |
1128 | sizeof(tlsext_ec_clienthello_default)); | 952 | S3I(ssl)->renegotiate_seen = 0; |
1129 | compare_data(data, dlen, tlsext_ec_clienthello_default, | 953 | |
1130 | sizeof(tlsext_ec_clienthello_default)); | 954 | CBS_init(&cbs, tlsext_ri_clienthello, sizeof(tlsext_ri_clienthello)); |
1131 | goto err; | 955 | if (tlsext_ri_clienthello_parse(ssl, &cbs, &alert)) { |
956 | fprintf(stderr, "FAIL: parsed invalid clienthello RI\n"); | ||
957 | failure = 1; | ||
958 | goto done; | ||
1132 | } | 959 | } |
1133 | 960 | ||
1134 | if (memcmp(data, tlsext_ec_clienthello_default, dlen) != 0) { | 961 | if (S3I(ssl)->renegotiate_seen == 1) { |
1135 | FAIL("clienthello Ellipticcurves differs:\n"); | 962 | fprintf(stderr, "FAIL: renegotiate seen set\n"); |
1136 | compare_data(data, dlen, tlsext_ec_clienthello_default, | 963 | failure = 1; |
1137 | sizeof(tlsext_ec_clienthello_default)); | 964 | goto done; |
1138 | goto err; | ||
1139 | } | 965 | } |
1140 | 966 | ||
1141 | /* | 967 | done: |
1142 | * Test parsing secp384r1 | ||
1143 | */ | ||
1144 | CBB_cleanup(&cbb); | 968 | CBB_cleanup(&cbb); |
1145 | CBB_init(&cbb, 0); | 969 | SSL_CTX_free(ssl_ctx); |
970 | SSL_free(ssl); | ||
1146 | free(data); | 971 | free(data); |
1147 | data = NULL; | ||
1148 | 972 | ||
1149 | SSL_SESSION_free(ssl->session); | 973 | return (failure); |
1150 | if ((ssl->session = SSL_SESSION_new()) == NULL) | 974 | } |
1151 | errx(1, "failed to create session"); | ||
1152 | 975 | ||
1153 | CBS_init(&cbs, tlsext_ec_clienthello_secp384r1, | 976 | static int |
1154 | sizeof(tlsext_ec_clienthello_secp384r1)); | 977 | test_tlsext_ri_serverhello(void) |
1155 | if (!tlsext_ec_clienthello_parse(ssl, &cbs, &alert)) { | 978 | { |
1156 | FAIL("failed to parse clienthello Ellipticcurves\n"); | 979 | unsigned char *data = NULL; |
1157 | goto err; | 980 | SSL_CTX *ssl_ctx = NULL; |
981 | SSL *ssl = NULL; | ||
982 | int failure = 0; | ||
983 | size_t dlen; | ||
984 | int alert; | ||
985 | CBB cbb; | ||
986 | CBS cbs; | ||
987 | |||
988 | CBB_init(&cbb, 0); | ||
989 | |||
990 | if ((ssl_ctx = SSL_CTX_new(TLS_server_method())) == NULL) | ||
991 | errx(1, "failed to create SSL_CTX"); | ||
992 | if ((ssl = SSL_new(ssl_ctx)) == NULL) | ||
993 | errx(1, "failed to create SSL"); | ||
994 | |||
995 | if (tlsext_ri_serverhello_needs(ssl)) { | ||
996 | fprintf(stderr, "FAIL: serverhello should not need RI\n"); | ||
997 | failure = 1; | ||
998 | goto done; | ||
1158 | } | 999 | } |
1159 | 1000 | ||
1160 | if (SSI(ssl)->tlsext_supportedgroups_length != | 1001 | S3I(ssl)->send_connection_binding = 1; |
1161 | sizeof(tlsext_ec_clienthello_secp384r1_val) / sizeof(uint16_t)) { | 1002 | |
1162 | FAIL("no tlsext_ellipticcurves from clienthello " | 1003 | if (!tlsext_ri_serverhello_needs(ssl)) { |
1163 | "Ellipticcurves\n"); | 1004 | fprintf(stderr, "FAIL: serverhello should need RI\n"); |
1164 | goto err; | 1005 | failure = 1; |
1006 | goto done; | ||
1165 | } | 1007 | } |
1166 | 1008 | ||
1167 | if (memcmp(SSI(ssl)->tlsext_supportedgroups, | 1009 | memcpy(S3I(ssl)->previous_client_finished, tlsext_ri_prev_client, |
1168 | tlsext_ec_clienthello_secp384r1_val, | 1010 | sizeof(tlsext_ri_prev_client)); |
1169 | sizeof(tlsext_ec_clienthello_secp384r1_val)) != 0) { | 1011 | S3I(ssl)->previous_client_finished_len = sizeof(tlsext_ri_prev_client); |
1170 | FAIL("clienthello had an incorrect Ellipticcurves " | 1012 | |
1171 | "entry\n"); | 1013 | memcpy(S3I(ssl)->previous_server_finished, tlsext_ri_prev_server, |
1172 | compare_data2(SSI(ssl)->tlsext_supportedgroups, | 1014 | sizeof(tlsext_ri_prev_server)); |
1173 | SSI(ssl)->tlsext_supportedgroups_length * 2, | 1015 | S3I(ssl)->previous_server_finished_len = sizeof(tlsext_ri_prev_server); |
1174 | tlsext_ec_clienthello_secp384r1_val, | 1016 | |
1175 | sizeof(tlsext_ec_clienthello_secp384r1_val)); | 1017 | S3I(ssl)->renegotiate_seen = 0; |
1176 | goto err; | 1018 | |
1019 | if (!tlsext_ri_serverhello_build(ssl, &cbb)) { | ||
1020 | fprintf(stderr, "FAIL: serverhello failed to build RI\n"); | ||
1021 | failure = 1; | ||
1022 | goto done; | ||
1177 | } | 1023 | } |
1178 | 1024 | ||
1179 | /* | 1025 | if (!CBB_finish(&cbb, &data, &dlen)) |
1180 | * Use a custom order. | 1026 | errx(1, "failed to finish CBB"); |
1181 | */ | 1027 | |
1028 | if (dlen != sizeof(tlsext_ri_serverhello)) { | ||
1029 | fprintf(stderr, "FAIL: got serverhello RI with length %zu, " | ||
1030 | "want length %zu\n", dlen, sizeof(tlsext_ri_serverhello)); | ||
1031 | failure = 1; | ||
1032 | goto done; | ||
1033 | } | ||
1034 | |||
1035 | if (memcmp(data, tlsext_ri_serverhello, dlen) != 0) { | ||
1036 | fprintf(stderr, "FAIL: serverhello RI differs:\n"); | ||
1037 | fprintf(stderr, "received:\n"); | ||
1038 | hexdump(data, dlen); | ||
1039 | fprintf(stderr, "test data:\n"); | ||
1040 | hexdump(tlsext_ri_serverhello, sizeof(tlsext_ri_serverhello)); | ||
1041 | failure = 1; | ||
1042 | goto done; | ||
1043 | } | ||
1044 | |||
1045 | CBS_init(&cbs, tlsext_ri_serverhello, sizeof(tlsext_ri_serverhello)); | ||
1046 | if (!tlsext_ri_serverhello_parse(ssl, &cbs, &alert)) { | ||
1047 | fprintf(stderr, "FAIL: failed to parse serverhello RI\n"); | ||
1048 | failure = 1; | ||
1049 | goto done; | ||
1050 | } | ||
1051 | |||
1052 | if (S3I(ssl)->renegotiate_seen != 1) { | ||
1053 | fprintf(stderr, "FAIL: renegotiate seen not set\n"); | ||
1054 | failure = 1; | ||
1055 | goto done; | ||
1056 | } | ||
1057 | if (S3I(ssl)->send_connection_binding != 1) { | ||
1058 | fprintf(stderr, "FAIL: send connection binding not set\n"); | ||
1059 | failure = 1; | ||
1060 | goto done; | ||
1061 | } | ||
1062 | |||
1063 | memset(S3I(ssl)->previous_client_finished, 0, | ||
1064 | sizeof(S3I(ssl)->previous_client_finished)); | ||
1065 | memset(S3I(ssl)->previous_server_finished, 0, | ||
1066 | sizeof(S3I(ssl)->previous_server_finished)); | ||
1067 | |||
1068 | S3I(ssl)->renegotiate_seen = 0; | ||
1069 | |||
1070 | CBS_init(&cbs, tlsext_ri_serverhello, sizeof(tlsext_ri_serverhello)); | ||
1071 | if (tlsext_ri_serverhello_parse(ssl, &cbs, &alert)) { | ||
1072 | fprintf(stderr, "FAIL: parsed invalid serverhello RI\n"); | ||
1073 | failure = 1; | ||
1074 | goto done; | ||
1075 | } | ||
1076 | |||
1077 | if (S3I(ssl)->renegotiate_seen == 1) { | ||
1078 | fprintf(stderr, "FAIL: renegotiate seen set\n"); | ||
1079 | failure = 1; | ||
1080 | goto done; | ||
1081 | } | ||
1082 | |||
1083 | done: | ||
1182 | CBB_cleanup(&cbb); | 1084 | CBB_cleanup(&cbb); |
1085 | SSL_CTX_free(ssl_ctx); | ||
1086 | SSL_free(ssl); | ||
1087 | free(data); | ||
1088 | |||
1089 | return (failure); | ||
1090 | } | ||
1091 | |||
1092 | /* | ||
1093 | * Server Name Indication - RFC 6066 section 3. | ||
1094 | */ | ||
1095 | |||
1096 | #define TEST_SNI_SERVERNAME "www.libressl.org" | ||
1097 | |||
1098 | static unsigned char tlsext_sni_clienthello[] = { | ||
1099 | 0x00, 0x13, 0x00, 0x00, 0x10, 0x77, 0x77, 0x77, | ||
1100 | 0x2e, 0x6c, 0x69, 0x62, 0x72, 0x65, 0x73, 0x73, | ||
1101 | 0x6c, 0x2e, 0x6f, 0x72, 0x67, | ||
1102 | }; | ||
1103 | |||
1104 | static unsigned char tlsext_sni_serverhello[] = { | ||
1105 | }; | ||
1106 | |||
1107 | static int | ||
1108 | test_tlsext_sni_clienthello(void) | ||
1109 | { | ||
1110 | unsigned char *data = NULL; | ||
1111 | SSL_CTX *ssl_ctx = NULL; | ||
1112 | SSL *ssl = NULL; | ||
1113 | int failure = 0; | ||
1114 | size_t dlen; | ||
1115 | int alert; | ||
1116 | CBB cbb; | ||
1117 | CBS cbs; | ||
1118 | |||
1183 | CBB_init(&cbb, 0); | 1119 | CBB_init(&cbb, 0); |
1184 | 1120 | ||
1185 | SSL_SESSION_free(ssl->session); | 1121 | if ((ssl_ctx = SSL_CTX_new(TLS_client_method())) == NULL) |
1186 | if ((ssl->session = SSL_SESSION_new()) == NULL) | 1122 | errx(1, "failed to create SSL_CTX"); |
1187 | errx(1, "failed to create session"); | 1123 | if ((ssl = SSL_new(ssl_ctx)) == NULL) |
1124 | errx(1, "failed to create SSL"); | ||
1188 | 1125 | ||
1189 | if ((ssl->internal->tlsext_supportedgroups = malloc(sizeof(uint16_t) * 2)) == NULL) { | 1126 | if (tlsext_sni_clienthello_needs(ssl)) { |
1190 | FAIL("client could not malloc\n"); | 1127 | fprintf(stderr, "FAIL: clienthello should not need SNI\n"); |
1191 | goto err; | 1128 | failure = 1; |
1129 | goto done; | ||
1192 | } | 1130 | } |
1193 | ssl->internal->tlsext_supportedgroups[0] = tls1_ec_nid2curve_id(NID_X9_62_prime192v1); | ||
1194 | ssl->internal->tlsext_supportedgroups[1] = tls1_ec_nid2curve_id(NID_secp224r1); | ||
1195 | ssl->internal->tlsext_supportedgroups_length = 2; | ||
1196 | 1131 | ||
1197 | if (!tlsext_ec_clienthello_needs(ssl)) { | 1132 | if (!SSL_set_tlsext_host_name(ssl, TEST_SNI_SERVERNAME)) { |
1198 | FAIL("clienthello should need Ellipticcurves\n"); | 1133 | fprintf(stderr, "FAIL: client failed to set server name\n"); |
1199 | goto err; | 1134 | failure = 1; |
1135 | goto done; | ||
1200 | } | 1136 | } |
1201 | 1137 | ||
1202 | if (!tlsext_ec_clienthello_build(ssl, &cbb)) { | 1138 | if (!tlsext_sni_clienthello_needs(ssl)) { |
1203 | FAIL("clienthello failed to build Ellipticcurves\n"); | 1139 | fprintf(stderr, "FAIL: clienthello should need SNI\n"); |
1204 | goto err; | 1140 | failure = 1; |
1141 | goto done; | ||
1142 | } | ||
1143 | |||
1144 | if (!tlsext_sni_clienthello_build(ssl, &cbb)) { | ||
1145 | fprintf(stderr, "FAIL: clienthello failed to build SNI\n"); | ||
1146 | failure = 1; | ||
1147 | goto done; | ||
1205 | } | 1148 | } |
1206 | 1149 | ||
1207 | if (!CBB_finish(&cbb, &data, &dlen)) | 1150 | if (!CBB_finish(&cbb, &data, &dlen)) |
1208 | errx(1, "failed to finish CBB"); | 1151 | errx(1, "failed to finish CBB"); |
1209 | 1152 | ||
1210 | if (dlen != sizeof(tlsext_ec_clienthello_nistp192and224)) { | 1153 | if (dlen != sizeof(tlsext_sni_clienthello)) { |
1211 | FAIL("got clienthello Ellipticcurves with length %zu, " | 1154 | fprintf(stderr, "FAIL: got clienthello SNI with length %zu, " |
1212 | "want length %zu\n", dlen, | 1155 | "want length %zu\n", dlen, sizeof(tlsext_sni_clienthello)); |
1213 | sizeof(tlsext_ec_clienthello_nistp192and224)); | 1156 | failure = 1; |
1214 | fprintf(stderr, "received:\n"); | 1157 | goto done; |
1215 | hexdump(data, dlen); | ||
1216 | fprintf(stderr, "test data:\n"); | ||
1217 | hexdump(tlsext_ec_clienthello_nistp192and224, | ||
1218 | sizeof(tlsext_ec_clienthello_nistp192and224)); | ||
1219 | goto err; | ||
1220 | } | 1158 | } |
1221 | 1159 | ||
1222 | if (memcmp(data, tlsext_ec_clienthello_nistp192and224, dlen) != 0) { | 1160 | if (memcmp(data, tlsext_sni_clienthello, dlen) != 0) { |
1223 | FAIL("clienthello Ellipticcurves differs:\n"); | 1161 | fprintf(stderr, "FAIL: clienthello SNI differs:\n"); |
1224 | fprintf(stderr, "received:\n"); | 1162 | fprintf(stderr, "received:\n"); |
1225 | hexdump(data, dlen); | 1163 | hexdump(data, dlen); |
1226 | fprintf(stderr, "test data:\n"); | 1164 | fprintf(stderr, "test data:\n"); |
1227 | hexdump(tlsext_ec_clienthello_nistp192and224, | 1165 | hexdump(tlsext_sni_clienthello, sizeof(tlsext_sni_clienthello)); |
1228 | sizeof(tlsext_ec_clienthello_nistp192and224)); | 1166 | failure = 1; |
1229 | goto err; | 1167 | goto done; |
1230 | } | 1168 | } |
1231 | 1169 | ||
1232 | /* | ||
1233 | * Parse non-default curves to session. | ||
1234 | */ | ||
1235 | CBB_cleanup(&cbb); | ||
1236 | CBB_init(&cbb, 0); | ||
1237 | free(data); | ||
1238 | data = NULL; | ||
1239 | |||
1240 | SSL_SESSION_free(ssl->session); | ||
1241 | if ((ssl->session = SSL_SESSION_new()) == NULL) | 1170 | if ((ssl->session = SSL_SESSION_new()) == NULL) |
1242 | errx(1, "failed to create session"); | 1171 | errx(1, "failed to create session"); |
1243 | 1172 | ||
1244 | /* Reset back to the default list. */ | 1173 | ssl->internal->hit = 0; |
1245 | free(ssl->internal->tlsext_supportedgroups); | ||
1246 | ssl->internal->tlsext_supportedgroups = NULL; | ||
1247 | ssl->internal->tlsext_supportedgroups_length = 0; | ||
1248 | 1174 | ||
1249 | CBS_init(&cbs, tlsext_ec_clienthello_nistp192and224, | 1175 | CBS_init(&cbs, tlsext_sni_clienthello, sizeof(tlsext_sni_clienthello)); |
1250 | sizeof(tlsext_ec_clienthello_nistp192and224)); | 1176 | if (!tlsext_sni_clienthello_parse(ssl, &cbs, &alert)) { |
1251 | if (!tlsext_ec_clienthello_parse(ssl, &cbs, &alert)) { | 1177 | fprintf(stderr, "FAIL: failed to parse clienthello SNI\n"); |
1252 | FAIL("failed to parse clienthello Ellipticcurves\n"); | 1178 | failure = 1; |
1253 | goto err; | 1179 | goto done; |
1254 | } | 1180 | } |
1255 | 1181 | ||
1256 | if (SSI(ssl)->tlsext_supportedgroups_length != | 1182 | if (ssl->session->tlsext_hostname == NULL) { |
1257 | sizeof(tlsext_ec_clienthello_nistp192and224_val) / sizeof(uint16_t)) { | 1183 | fprintf(stderr, "FAIL: no tlsext_hostname from clienthello SNI\n"); |
1258 | FAIL("no tlsext_ellipticcurves from clienthello " | 1184 | failure = 1; |
1259 | "Ellipticcurves\n"); | 1185 | goto done; |
1260 | goto err; | ||
1261 | } | 1186 | } |
1262 | 1187 | ||
1263 | if (memcmp(SSI(ssl)->tlsext_supportedgroups, | 1188 | if (strlen(ssl->session->tlsext_hostname) != strlen(TEST_SNI_SERVERNAME) || |
1264 | tlsext_ec_clienthello_nistp192and224_val, | 1189 | strncmp(ssl->session->tlsext_hostname, TEST_SNI_SERVERNAME, |
1265 | sizeof(tlsext_ec_clienthello_nistp192and224_val)) != 0) { | 1190 | strlen(TEST_SNI_SERVERNAME)) != 0) { |
1266 | FAIL("clienthello had an incorrect Ellipticcurves entry\n"); | 1191 | fprintf(stderr, "FAIL: got tlsext_hostname `%s', want `%s'\n", |
1267 | compare_data2(SSI(ssl)->tlsext_supportedgroups, | 1192 | ssl->session->tlsext_hostname, TEST_SNI_SERVERNAME); |
1268 | SSI(ssl)->tlsext_supportedgroups_length * 2, | 1193 | failure = 1; |
1269 | tlsext_ec_clienthello_nistp192and224_val, | 1194 | goto done; |
1270 | sizeof(tlsext_ec_clienthello_nistp192and224_val)); | ||
1271 | goto err; | ||
1272 | } | 1195 | } |
1273 | 1196 | ||
1274 | failure = 0; | 1197 | ssl->internal->hit = 1; |
1275 | 1198 | ||
1276 | err: | 1199 | if ((ssl->session->tlsext_hostname = strdup("notthesame.libressl.org")) == |
1200 | NULL) | ||
1201 | errx(1, "failed to strdup tlsext_hostname"); | ||
1202 | |||
1203 | CBS_init(&cbs, tlsext_sni_clienthello, sizeof(tlsext_sni_clienthello)); | ||
1204 | if (tlsext_sni_clienthello_parse(ssl, &cbs, &alert)) { | ||
1205 | fprintf(stderr, "FAIL: parsed clienthello with mismatched SNI\n"); | ||
1206 | failure = 1; | ||
1207 | goto done; | ||
1208 | } | ||
1209 | |||
1210 | done: | ||
1277 | CBB_cleanup(&cbb); | 1211 | CBB_cleanup(&cbb); |
1278 | SSL_CTX_free(ssl_ctx); | 1212 | SSL_CTX_free(ssl_ctx); |
1279 | SSL_free(ssl); | 1213 | SSL_free(ssl); |
@@ -1282,43 +1216,108 @@ test_tlsext_ec_clienthello(void) | |||
1282 | return (failure); | 1216 | return (failure); |
1283 | } | 1217 | } |
1284 | 1218 | ||
1285 | |||
1286 | /* elliptic_curves is only used by the client so this doesn't test much. */ | ||
1287 | static int | 1219 | static int |
1288 | test_tlsext_ec_serverhello(void) | 1220 | test_tlsext_sni_serverhello(void) |
1289 | { | 1221 | { |
1222 | unsigned char *data = NULL; | ||
1290 | SSL_CTX *ssl_ctx = NULL; | 1223 | SSL_CTX *ssl_ctx = NULL; |
1291 | SSL *ssl = NULL; | 1224 | SSL *ssl = NULL; |
1292 | int failure; | 1225 | int failure = 0; |
1226 | size_t dlen; | ||
1227 | int alert; | ||
1228 | CBB cbb; | ||
1229 | CBS cbs; | ||
1293 | 1230 | ||
1294 | failure = 1; | 1231 | CBB_init(&cbb, 0); |
1295 | 1232 | ||
1296 | if ((ssl_ctx = SSL_CTX_new(TLS_server_method())) == NULL) | 1233 | if ((ssl_ctx = SSL_CTX_new(TLS_server_method())) == NULL) |
1297 | errx(1, "failed to create SSL_CTX"); | 1234 | errx(1, "failed to create SSL_CTX"); |
1298 | if ((ssl = SSL_new(ssl_ctx)) == NULL) | 1235 | if ((ssl = SSL_new(ssl_ctx)) == NULL) |
1299 | errx(1, "failed to create SSL"); | 1236 | errx(1, "failed to create SSL"); |
1300 | 1237 | ||
1301 | if (tlsext_ec_serverhello_needs(ssl)) { | ||
1302 | FAIL("serverhello should not need elliptic_curves\n"); | ||
1303 | goto err; | ||
1304 | } | ||
1305 | |||
1306 | if ((ssl->session = SSL_SESSION_new()) == NULL) | 1238 | if ((ssl->session = SSL_SESSION_new()) == NULL) |
1307 | errx(1, "failed to create session"); | 1239 | errx(1, "failed to create session"); |
1308 | 1240 | ||
1309 | if (tlsext_ec_serverhello_needs(ssl)) { | 1241 | if (tlsext_sni_serverhello_needs(ssl)) { |
1310 | FAIL("serverhello should not need elliptic_curves\n"); | 1242 | fprintf(stderr, "FAIL: serverhello should not need SNI\n"); |
1311 | goto err; | 1243 | failure = 1; |
1244 | goto done; | ||
1312 | } | 1245 | } |
1313 | 1246 | ||
1314 | failure = 0; | 1247 | if (!SSL_set_tlsext_host_name(ssl, TEST_SNI_SERVERNAME)) { |
1248 | fprintf(stderr, "FAIL: client failed to set server name\n"); | ||
1249 | failure = 1; | ||
1250 | goto done; | ||
1251 | } | ||
1315 | 1252 | ||
1316 | err: | 1253 | if ((ssl->session->tlsext_hostname = strdup(TEST_SNI_SERVERNAME)) == |
1254 | NULL) | ||
1255 | errx(1, "failed to strdup tlsext_hostname"); | ||
1256 | |||
1257 | if (!tlsext_sni_serverhello_needs(ssl)) { | ||
1258 | fprintf(stderr, "FAIL: serverhello should need SNI\n"); | ||
1259 | failure = 1; | ||
1260 | goto done; | ||
1261 | } | ||
1262 | |||
1263 | if (!tlsext_sni_serverhello_build(ssl, &cbb)) { | ||
1264 | fprintf(stderr, "FAIL: serverhello failed to build SNI\n"); | ||
1265 | failure = 1; | ||
1266 | goto done; | ||
1267 | } | ||
1268 | |||
1269 | if (!CBB_finish(&cbb, &data, &dlen)) | ||
1270 | errx(1, "failed to finish CBB"); | ||
1271 | |||
1272 | if (dlen != sizeof(tlsext_sni_serverhello)) { | ||
1273 | fprintf(stderr, "FAIL: got serverhello SNI with length %zu, " | ||
1274 | "want length %zu\n", dlen, sizeof(tlsext_sni_serverhello)); | ||
1275 | failure = 1; | ||
1276 | goto done; | ||
1277 | } | ||
1278 | |||
1279 | if (memcmp(data, tlsext_sni_serverhello, dlen) != 0) { | ||
1280 | fprintf(stderr, "FAIL: serverhello SNI differs:\n"); | ||
1281 | fprintf(stderr, "received:\n"); | ||
1282 | hexdump(data, dlen); | ||
1283 | fprintf(stderr, "test data:\n"); | ||
1284 | hexdump(tlsext_sni_serverhello, sizeof(tlsext_sni_serverhello)); | ||
1285 | failure = 1; | ||
1286 | goto done; | ||
1287 | } | ||
1288 | |||
1289 | free(ssl->session->tlsext_hostname); | ||
1290 | ssl->session->tlsext_hostname = NULL; | ||
1291 | |||
1292 | CBS_init(&cbs, tlsext_sni_serverhello, sizeof(tlsext_sni_serverhello)); | ||
1293 | if (!tlsext_sni_serverhello_parse(ssl, &cbs, &alert)) { | ||
1294 | fprintf(stderr, "FAIL: failed to parse serverhello SNI\n"); | ||
1295 | failure = 1; | ||
1296 | goto done; | ||
1297 | } | ||
1298 | |||
1299 | if (ssl->session->tlsext_hostname == NULL) { | ||
1300 | fprintf(stderr, "FAIL: no tlsext_hostname after serverhello SNI\n"); | ||
1301 | failure = 1; | ||
1302 | goto done; | ||
1303 | } | ||
1304 | |||
1305 | if (strlen(ssl->session->tlsext_hostname) != strlen(TEST_SNI_SERVERNAME) || | ||
1306 | strncmp(ssl->session->tlsext_hostname, TEST_SNI_SERVERNAME, | ||
1307 | strlen(TEST_SNI_SERVERNAME)) != 0) { | ||
1308 | fprintf(stderr, "FAIL: got tlsext_hostname `%s', want `%s'\n", | ||
1309 | ssl->session->tlsext_hostname, TEST_SNI_SERVERNAME); | ||
1310 | failure = 1; | ||
1311 | goto done; | ||
1312 | } | ||
1313 | |||
1314 | done: | ||
1315 | CBB_cleanup(&cbb); | ||
1317 | SSL_CTX_free(ssl_ctx); | 1316 | SSL_CTX_free(ssl_ctx); |
1318 | SSL_free(ssl); | 1317 | SSL_free(ssl); |
1318 | free(data); | ||
1319 | 1319 | ||
1320 | return (failure); | 1320 | return (failure); |
1321 | |||
1322 | } | 1321 | } |
1323 | 1322 | ||
1324 | int | 1323 | int |
@@ -1328,17 +1327,17 @@ main(int argc, char **argv) | |||
1328 | 1327 | ||
1329 | SSL_library_init(); | 1328 | SSL_library_init(); |
1330 | 1329 | ||
1330 | failed |= test_tlsext_ec_clienthello(); | ||
1331 | failed |= test_tlsext_ec_serverhello(); | ||
1332 | |||
1333 | failed |= test_tlsext_ecpf_clienthello(); | ||
1334 | failed |= test_tlsext_ecpf_serverhello(); | ||
1335 | |||
1331 | failed |= test_tlsext_ri_clienthello(); | 1336 | failed |= test_tlsext_ri_clienthello(); |
1332 | failed |= test_tlsext_ri_serverhello(); | 1337 | failed |= test_tlsext_ri_serverhello(); |
1333 | 1338 | ||
1334 | failed |= test_tlsext_sni_clienthello(); | 1339 | failed |= test_tlsext_sni_clienthello(); |
1335 | failed |= test_tlsext_sni_serverhello(); | 1340 | failed |= test_tlsext_sni_serverhello(); |
1336 | 1341 | ||
1337 | failed |= test_tlsext_ecpf_clienthello(); | ||
1338 | failed |= test_tlsext_ecpf_serverhello(); | ||
1339 | |||
1340 | failed |= test_tlsext_ec_clienthello(); | ||
1341 | failed |= test_tlsext_ec_serverhello(); | ||
1342 | |||
1343 | return (failed); | 1342 | return (failed); |
1344 | } | 1343 | } |