80-test_ssl_old.t 31.2 KB
Newer Older
R
Rich Salz 已提交
1 2 3 4 5 6 7 8
#! /usr/bin/env perl
# Copyright 2015-2016 The OpenSSL Project Authors. All Rights Reserved.
#
# Licensed under the OpenSSL license (the "License").  You may not use
# this file except in compliance with the License.  You can obtain a copy
# in the file LICENSE in the source distribution or at
# https://www.openssl.org/source/license.html

9 10 11 12 13 14 15

use strict;
use warnings;

use POSIX;
use File::Spec;
use File::Copy;
16
use OpenSSL::Test qw/:DEFAULT with bldtop_file srctop_file cmdstr/;
17
use OpenSSL::Test::Utils;
18 19 20

setup("test_ssl");

M
Matt Caswell 已提交
21 22
$ENV{CTLOG_FILE} = srctop_file("test", "ct", "log_list.conf");

23 24
my ($no_rsa, $no_dsa, $no_dh, $no_ec, $no_srp, $no_psk,
    $no_ssl3, $no_tls1, $no_tls1_1, $no_tls1_2,
25
    $no_dtls, $no_dtls1, $no_dtls1_2, $no_ct) =
26 27
    anydisabled qw/rsa dsa dh ec srp psk
                   ssl3 tls1 tls1_1 tls1_2
28
                   dtls dtls1 dtls1_2 ct/;
29 30
my $no_anytls = alldisabled(available_protocols("tls"));
my $no_anydtls = alldisabled(available_protocols("dtls"));
31 32 33

plan skip_all => "No SSL/TLS/DTLS protocol is support by this OpenSSL build"
    if $no_anytls && $no_anydtls;
34

35 36 37 38
my $digest = "-sha1";
my @reqcmd = ("openssl", "req");
my @x509cmd = ("openssl", "x509", $digest);
my @verifycmd = ("openssl", "verify");
M
Matt Caswell 已提交
39
my @gendsacmd = ("openssl", "gendsa");
40
my $dummycnf = srctop_file("apps", "openssl.cnf");
41 42 43 44 45

my $CAkey = "keyCA.ss";
my $CAcert="certCA.ss";
my $CAserial="certCA.srl";
my $CAreq="reqCA.ss";
46
my $CAconf=srctop_file("test","CAss.cnf");
47 48
my $CAreq2="req2CA.ss";	# temp

49
my $Uconf=srctop_file("test","Uss.cnf");
50 51 52 53
my $Ukey="keyU.ss";
my $Ureq="reqU.ss";
my $Ucert="certU.ss";

54 55 56 57 58 59 60 61
my $Dkey="keyD.ss";
my $Dreq="reqD.ss";
my $Dcert="certD.ss";

my $Ekey="keyE.ss";
my $Ereq="reqE.ss";
my $Ecert="certE.ss";

62
my $P1conf=srctop_file("test","P1ss.cnf");
63 64 65 66 67
my $P1key="keyP1.ss";
my $P1req="reqP1.ss";
my $P1cert="certP1.ss";
my $P1intermediate="tmp_intP1.ss";

68
my $P2conf=srctop_file("test","P2ss.cnf");
69 70 71 72 73
my $P2key="keyP2.ss";
my $P2req="reqP2.ss";
my $P2cert="certP2.ss";
my $P2intermediate="tmp_intP2.ss";

K
Kurt Roeckx 已提交
74 75 76
my $server_sess="server.ss";
my $client_sess="client.ss";

E
Emilia Kasper 已提交
77
# ssltest_old.c is deprecated in favour of the new framework in ssl_test.c
E
Emilia Kasper 已提交
78 79
# If you're adding tests here, you probably want to convert them to the
# new format in ssl_test.c and add recipes to 80-test_ssl_new.t instead.
80 81
plan tests =>
    1				# For testss
E
Emilia Kasper 已提交
82
    + 14			# For the first testssl
83 84 85 86 87 88 89 90 91 92 93 94 95 96
    ;

subtest 'test_ss' => sub {
    if (testss()) {
	open OUT, ">", "intP1.ss";
	copy($CAcert, \*OUT); copy($Ucert, \*OUT);
	close OUT;

	open OUT, ">", "intP2.ss";
	copy($CAcert, \*OUT); copy($Ucert, \*OUT); copy($P1cert, \*OUT);
	close OUT;
    }
};

E
Emilia Kasper 已提交
97 98
note('test_ssl -- key U');
testssl("keyU.ss", $Ucert, $CAcert);
99 100 101 102 103 104 105 106

# -----------
# subtest functions
sub testss {
    open RND, ">>", ".rnd";
    print RND "string to make the random number generator think it has entropy";
    close RND;

107
    my @req_dsa = ("-newkey",
108
                   "dsa:".srctop_file("apps", "dsa1024.pem"));
M
Matt Caswell 已提交
109
    my $dsaparams = srctop_file("apps", "dsa1024.pem");
110
    my @req_new;
111
    if ($no_rsa) {
112
	@req_new = @req_dsa;
113 114 115 116
    } else {
	@req_new = ("-new");
    }

117
    plan tests => 17;
118 119

  SKIP: {
120
      skip 'failure', 16 unless
121 122 123 124 125
	  ok(run(app([@reqcmd, "-config", $CAconf,
		      "-out", $CAreq, "-keyout", $CAkey,
		      @req_new])),
	     'make cert request');

126
      skip 'failure', 15 unless
127 128 129 130 131 132
	  ok(run(app([@x509cmd, "-CAcreateserial", "-in", $CAreq, "-days", "30",
		      "-req", "-out", $CAcert, "-signkey", $CAkey,
		      "-extfile", $CAconf, "-extensions", "v3_ca"],
		     stdout => "err.ss")),
	     'convert request into self-signed cert');

133
      skip 'failure', 14 unless
134 135 136 137 138
	  ok(run(app([@x509cmd, "-in", $CAcert,
		      "-x509toreq", "-signkey", $CAkey, "-out", $CAreq2],
		     stdout => "err.ss")),
	     'convert cert into a cert request');

139
      skip 'failure', 13 unless
140 141 142 143 144
	  ok(run(app([@reqcmd, "-config", $dummycnf,
		      "-verify", "-in", $CAreq, "-noout"])),
	     'verify request 1');


145
      skip 'failure', 12 unless
146 147 148 149
	  ok(run(app([@reqcmd, "-config", $dummycnf,
		      "-verify", "-in", $CAreq2, "-noout"])),
	     'verify request 2');

150
      skip 'failure', 11 unless
151 152 153
	  ok(run(app([@verifycmd, "-CAfile", $CAcert, $CAcert])),
	     'verify signature');

154
      skip 'failure', 10 unless
155 156 157 158 159
	  ok(run(app([@reqcmd, "-config", $Uconf,
		      "-out", $Ureq, "-keyout", $Ukey, @req_new],
		     stdout => "err.ss")),
	     'make a user cert request');

160
      skip 'failure', 9 unless
161 162 163 164 165 166 167 168
	  ok(run(app([@x509cmd, "-CAcreateserial", "-in", $Ureq, "-days", "30",
		      "-req", "-out", $Ucert,
		      "-CA", $CAcert, "-CAkey", $CAkey, "-CAserial", $CAserial,
		      "-extfile", $Uconf, "-extensions", "v3_ee"],
		     stdout => "err.ss"))
	     && run(app([@verifycmd, "-CAfile", $CAcert, $Ucert])),
	     'sign user cert request');

169
      skip 'failure', 8 unless
170 171 172 173 174
	  ok(run(app([@x509cmd,
		      "-subject", "-issuer", "-startdate", "-enddate",
		      "-noout", "-in", $Ucert])),
	     'Certificate details');

175 176 177
      skip 'failure', 7 unless
          subtest 'DSA certificate creation' => sub {
              plan skip_all => "skipping DSA certificate creation"
178
                  if $no_dsa;
179

M
Matt Caswell 已提交
180
              plan tests => 5;
181 182 183

            SKIP: {
                $ENV{CN2} = "DSA Certificate";
M
Matt Caswell 已提交
184 185 186 187 188
                skip 'failure', 4 unless
                    ok(run(app([@gendsacmd, "-out", $Dkey,
                                $dsaparams],
                               stdout => "err.ss")),
                       "make a DSA key");
189
                skip 'failure', 3 unless
M
Matt Caswell 已提交
190 191
                    ok(run(app([@reqcmd, "-new", "-config", $Uconf,
                                "-out", $Dreq, "-key", $Dkey],
192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220
                               stdout => "err.ss")),
                       "make a DSA user cert request");
                skip 'failure', 2 unless
                    ok(run(app([@x509cmd, "-CAcreateserial",
                                "-in", $Dreq,
                                "-days", "30",
                                "-req",
                                "-out", $Dcert,
                                "-CA", $CAcert, "-CAkey", $CAkey,
                                "-CAserial", $CAserial,
                                "-extfile", $Uconf,
                                "-extensions", "v3_ee_dsa"],
                               stdout => "err.ss")),
                       "sign DSA user cert request");
                skip 'failure', 1 unless
                    ok(run(app([@verifycmd, "-CAfile", $CAcert, $Dcert])),
                       "verify DSA user cert");
                skip 'failure', 0 unless
                    ok(run(app([@x509cmd,
                                "-subject", "-issuer",
                                "-startdate", "-enddate", "-noout",
                                "-in", $Dcert])),
                       "DSA Certificate details");
              }
      };

      skip 'failure', 6 unless
          subtest 'ECDSA/ECDH certificate creation' => sub {
              plan skip_all => "skipping ECDSA/ECDH certificate creation"
221
                  if $no_ec;
222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259

              plan tests => 5;

            SKIP: {
                $ENV{CN2} = "ECDSA Certificate";
                skip 'failure', 4 unless
                    ok(run(app(["openssl", "ecparam", "-name", "P-256",
                                "-out", "ecp.ss"])),
                       "make EC parameters");
                skip 'failure', 3 unless
                    ok(run(app([@reqcmd, "-config", $Uconf,
                                "-out", $Ereq, "-keyout", $Ekey,
                                "-newkey", "ec:ecp.ss"],
                               stdout => "err.ss")),
                       "make a ECDSA/ECDH user cert request");
                skip 'failure', 2 unless
                    ok(run(app([@x509cmd, "-CAcreateserial",
                                "-in", $Ereq,
                                "-days", "30",
                                "-req",
                                "-out", $Ecert,
                                "-CA", $CAcert, "-CAkey", $CAkey,
                                "-CAserial", $CAserial,
                                "-extfile", $Uconf,
                                "-extensions", "v3_ee_ec"],
                               stdout => "err.ss")),
                       "sign ECDSA/ECDH user cert request");
                skip 'failure', 1 unless
                    ok(run(app([@verifycmd, "-CAfile", $CAcert, $Ecert])),
                       "verify ECDSA/ECDH user cert");
                skip 'failure', 0 unless
                    ok(run(app([@x509cmd,
                                "-subject", "-issuer",
                                "-startdate", "-enddate", "-noout",
                                "-in", $Ecert])),
                       "ECDSA Certificate details");
              }
      };
260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313

      skip 'failure', 5 unless
	  ok(run(app([@reqcmd, "-config", $P1conf,
		      "-out", $P1req, "-keyout", $P1key, @req_new],
		     stdout => "err.ss")),
	     'make a proxy cert request');


      skip 'failure', 4 unless
	  ok(run(app([@x509cmd, "-CAcreateserial", "-in", $P1req, "-days", "30",
		      "-req", "-out", $P1cert,
		      "-CA", $Ucert, "-CAkey", $Ukey,
		      "-extfile", $P1conf, "-extensions", "v3_proxy"],
		     stdout => "err.ss")),
	     'sign proxy with user cert');

      copy($Ucert, $P1intermediate);
      run(app([@verifycmd, "-CAfile", $CAcert,
	       "-untrusted", $P1intermediate, $P1cert]));
      ok(run(app([@x509cmd,
		  "-subject", "-issuer", "-startdate", "-enddate",
		  "-noout", "-in", $P1cert])),
	 'Certificate details');

      skip 'failure', 2 unless
	  ok(run(app([@reqcmd, "-config", $P2conf,
		      "-out", $P2req, "-keyout", $P2key,
		      @req_new],
		     stdout => "err.ss")),
	     'make another proxy cert request');


      skip 'failure', 1 unless
	  ok(run(app([@x509cmd, "-CAcreateserial", "-in", $P2req, "-days", "30",
		      "-req", "-out", $P2cert,
		      "-CA", $P1cert, "-CAkey", $P1key,
		      "-extfile", $P2conf, "-extensions", "v3_proxy"],
		     stdout => "err.ss")),
	     'sign second proxy cert request with the first proxy cert');


      open OUT, ">", $P2intermediate;
      copy($Ucert, \*OUT); copy($P1cert, \*OUT);
      close OUT;
      run(app([@verifycmd, "-CAfile", $CAcert,
	       "-untrusted", $P2intermediate, $P2cert]));
      ok(run(app([@x509cmd,
		  "-subject", "-issuer", "-startdate", "-enddate",
		  "-noout", "-in", $P2cert])),
	 'Certificate details');
    }
}

sub testssl {
314
    my ($key, $cert, $CAtmp) = @_;
315
    my @CA = $CAtmp ? ("-CAfile", $CAtmp) : ("-CApath", bldtop_dir("certs"));
316

E
Emilia Kasper 已提交
317
    my @ssltest = ("ssltest_old",
318
		   "-s_key", $key, "-s_cert", $cert,
319 320
		   "-c_key", $key, "-c_cert", $cert);

321
    my $serverinfo = srctop_file("test","serverinfo.pem");
322 323 324 325 326 327 328 329

    my $dsa_cert = 0;
    if (grep /DSA Public Key/, run(app(["openssl", "x509", "-in", $cert,
					"-text", "-noout"]), capture => 1)) {
	$dsa_cert = 1;
    }


330
    # plan tests => 11;
331 332 333

    subtest 'standard SSL tests' => sub {
	######################################################################
334
        plan tests => 21;
335

336 337 338 339
      SKIP: {
	  skip "SSLv3 is not supported by this OpenSSL build", 4
	      if disabled("ssl3");

340
	  ok(run(test([@ssltest, "-bio_pair", "-ssl3"])),
341
	     'test sslv3 via BIO pair');
342
	  ok(run(test([@ssltest, "-bio_pair", "-ssl3", "-server_auth", @CA])),
343
	     'test sslv3 with server authentication via BIO pair');
344
	  ok(run(test([@ssltest, "-bio_pair", "-ssl3", "-client_auth", @CA])),
345
	     'test sslv3 with client authentication via BIO pair');
346
	  ok(run(test([@ssltest, "-bio_pair", "-ssl3", "-server_auth", "-client_auth", @CA])),
347 348 349 350 351 352 353
	     'test sslv3 with both server and client authentication via BIO pair');
	}

      SKIP: {
	  skip "Neither SSLv3 nor any TLS version are supported by this OpenSSL build", 1
	      if $no_anytls;

354
	  ok(run(test([@ssltest, "-bio_pair"])),
355 356 357 358 359 360 361
	     'test sslv2/sslv3 via BIO pair');
	}

      SKIP: {
	  skip "DTLSv1 is not supported by this OpenSSL build", 4
	      if disabled("dtls1");

362
	  ok(run(test([@ssltest, "-dtls1"])),
363
	     'test dtlsv1');
364
	  ok(run(test([@ssltest, "-dtls1", "-server_auth", @CA])),
365
	   'test dtlsv1 with server authentication');
366
	  ok(run(test([@ssltest, "-dtls1", "-client_auth", @CA])),
367
	     'test dtlsv1 with client authentication');
368
	  ok(run(test([@ssltest, "-dtls1", "-server_auth", "-client_auth", @CA])),
369 370 371 372 373 374 375
	     'test dtlsv1 with both server and client authentication');
	}

      SKIP: {
	  skip "DTLSv1.2 is not supported by this OpenSSL build", 4
	      if disabled("dtls1_2");

376
	  ok(run(test([@ssltest, "-dtls12"])),
377
	     'test dtlsv1.2');
378
	  ok(run(test([@ssltest, "-dtls12", "-server_auth", @CA])),
379
	     'test dtlsv1.2 with server authentication');
380
	  ok(run(test([@ssltest, "-dtls12", "-client_auth", @CA])),
381
	     'test dtlsv1.2 with client authentication');
382
	  ok(run(test([@ssltest, "-dtls12", "-server_auth", "-client_auth", @CA])),
383 384 385 386
	     'test dtlsv1.2 with both server and client authentication');
	}

      SKIP: {
387
	  skip "Neither SSLv3 nor any TLS version are supported by this OpenSSL build", 8
388 389 390 391 392
	      if $no_anytls;

	SKIP: {
	    skip "skipping test of sslv2/sslv3 w/o (EC)DHE test", 1 if $dsa_cert;

393
	    ok(run(test([@ssltest, "-bio_pair", "-no_dhe", "-no_ecdhe"])),
394 395 396
	       'test sslv2/sslv3 w/o (EC)DHE via BIO pair');
	  }

397
	  ok(run(test([@ssltest, "-bio_pair", "-dhe1024dsa", "-v"])),
398
	     'test sslv2/sslv3 with 1024bit DHE via BIO pair');
399
	  ok(run(test([@ssltest, "-bio_pair", "-server_auth", @CA])),
400
	     'test sslv2/sslv3 with server authentication');
401
	  ok(run(test([@ssltest, "-bio_pair", "-client_auth", @CA])),
402
	     'test sslv2/sslv3 with client authentication via BIO pair');
403
	  ok(run(test([@ssltest, "-bio_pair", "-server_auth", "-client_auth", @CA])),
404
	     'test sslv2/sslv3 with both client and server authentication via BIO pair');
405
	  ok(run(test([@ssltest, "-bio_pair", "-server_auth", "-client_auth", "-app_verify", @CA])),
406
	     'test sslv2/sslv3 with both client and server authentication via BIO pair and app verify');
407

408 409
        SKIP: {
            skip "No IPv4 available on this machine", 1
M
Matt Caswell 已提交
410
                unless !disabled("sock") && have_IPv4();
411
            ok(run(test([@ssltest, "-ipv4"])),
412 413
               'test TLS via IPv4');
          }
E
Emilia Kasper 已提交
414

415 416
        SKIP: {
            skip "No IPv6 available on this machine", 1
M
Matt Caswell 已提交
417
                unless !disabled("sock") && have_IPv6();
418
            ok(run(test([@ssltest, "-ipv6"])),
419 420 421
               'test TLS via IPv6');
          }
        }
422 423 424 425
    };

    subtest "Testing ciphersuites" => sub {

426 427 428
        my @exkeys = ();
        my $ciphers = "-EXP:-PSK:-SRP:-kDH:-kECDHe";

429
        if ($no_dh) {
430 431 432
            note "skipping DHE tests\n";
            $ciphers .= ":-kDHE";
        }
433
        if ($no_dsa) {
434 435 436 437 438 439
            note "skipping DSA tests\n";
            $ciphers .= ":-aDSA";
        } else {
            push @exkeys, "-s_cert", "certD.ss", "-s_key", "keyD.ss";
        }

440
        if ($no_ec) {
441 442 443 444 445
            note "skipping EC tests\n";
            $ciphers .= ":!aECDSA:!kECDH";
        } else {
            push @exkeys, "-s_cert", "certE.ss", "-s_key", "keyE.ss";
        }
446

447
	my @protocols = ();
448
	# FIXME: I feel unsure about the following line, is that really just TLSv1.2, or is it all of the SSLv3/TLS protocols?
449 450
        push(@protocols, "TLSv1.2") unless $no_tls1_2;
        push(@protocols, "SSLv3") unless $no_ssl3;
451 452 453 454
	my $protocolciphersuitcount = 0;
	my %ciphersuites =
	    map { my @c =
		      map { split(/:/, $_) }
455 456
		      run(app(["openssl", "ciphers", "${_}:$ciphers"]),
                          capture => 1);
457
		  map { s/\R//; } @c;  # chomp @c;
458 459 460
		  $protocolciphersuitcount += scalar @c;
		  $_ => [ @c ] } @protocols;

461 462 463
        plan skip_all => "None of the ciphersuites to test are available in this OpenSSL build"
            if $protocolciphersuitcount + scalar(@protocols) == 0;

464 465 466
        # The count of protocols is because in addition to the ciphersuits
        # we got above, we're running a weak DH test for each protocol
	plan tests => $protocolciphersuitcount + scalar(@protocols);
467 468 469 470

	foreach my $protocol (@protocols) {
	    note "Testing ciphersuites for $protocol";
	    foreach my $cipher (@{$ciphersuites{$protocol}}) {
471
		ok(run(test([@ssltest, @exkeys, "-cipher", $cipher,
472 473 474
			     $protocol eq "SSLv3" ? ("-ssl3") : ()])),
		   "Testing $cipher");
	    }
475 476 477 478 479 480
            is(run(test([@ssltest,
                         "-s_cipher", "EDH",
                         "-c_cipher", 'EDH:@SECLEVEL=1',
                         "-dhe512",
                         $protocol eq "SSLv3" ? ("-ssl3") : ()])), 0,
               "testing connection with weak DH, expecting failure");
481 482 483 484 485 486 487 488
	}
    };

    subtest 'RSA/(EC)DHE/PSK tests' => sub {
	######################################################################

	plan tests => 5;

489 490 491
      SKIP: {
	  skip "TLSv1.0 is not supported by this OpenSSL build", 5
	      if $no_tls1;
492

493 494 495
	SKIP: {
	    skip "skipping anonymous DH tests", 1
	      if ($no_dh);
496

497
	    ok(run(test([@ssltest, "-v", "-bio_pair", "-tls1", "-cipher", "ADH", "-dhe1024dsa", "-num", "10", "-f", "-time"])),
498 499
	       'test tlsv1 with 1024bit anonymous DH, multiple handshakes');
	  }
500

501 502 503
	SKIP: {
	    skip "skipping RSA tests", 2
		if $no_rsa;
504

505
	    ok(run(test(["ssltest_old", "-v", "-bio_pair", "-tls1", "-s_cert", srctop_file("apps","server2.pem"), "-no_dhe", "-no_ecdhe", "-num", "10", "-f", "-time"])),
506
	       'test tlsv1 with 1024bit RSA, no (EC)DHE, multiple handshakes');
507

508 509 510
	    skip "skipping RSA+DHE tests", 1
		if $no_dh;

511
	    ok(run(test(["ssltest_old", "-v", "-bio_pair", "-tls1", "-s_cert", srctop_file("apps","server2.pem"), "-dhe1024dsa", "-num", "10", "-f", "-time"])),
512 513 514 515 516
	       'test tlsv1 with 1024bit RSA, 1024bit DHE, multiple handshakes');
	  }

	SKIP: {
	    skip "skipping PSK tests", 2
D
Dr. Stephen Henson 已提交
517 518
	        if ($no_psk);

519
	    ok(run(test([@ssltest, "-tls1", "-cipher", "PSK", "-psk", "abc123"])),
520
	       'test tls1 with PSK');
D
Dr. Stephen Henson 已提交
521

522
	    ok(run(test([@ssltest, "-bio_pair", "-tls1", "-cipher", "PSK", "-psk", "abc123"])),
523 524 525
	       'test tls1 with PSK via BIO pair');
	  }
	}
526 527 528 529 530 531 532 533

    };

    subtest 'Next Protocol Negotiation Tests' => sub {
	######################################################################

	plan tests => 7;

534 535 536
      SKIP: {
	  skip "TLSv1.0 is not supported by this OpenSSL build", 7
	      if $no_tls1;
M
Matt Caswell 已提交
537 538
	  skip "Next Protocol Negotiation is not supported by this OpenSSL build", 7
	      if disabled("nextprotoneg");
539 540 541 542 543 544 545 546 547

	  ok(run(test([@ssltest, "-bio_pair", "-tls1", "-npn_client"])));
	  ok(run(test([@ssltest, "-bio_pair", "-tls1", "-npn_server"])));
	  ok(run(test([@ssltest, "-bio_pair", "-tls1", "-npn_server_reject"])));
	  ok(run(test([@ssltest, "-bio_pair", "-tls1", "-npn_client", "-npn_server_reject"])));
	  ok(run(test([@ssltest, "-bio_pair", "-tls1", "-npn_client", "-npn_server"])));
	  ok(run(test([@ssltest, "-bio_pair", "-tls1", "-npn_client", "-npn_server", "-num", "2"])));
	  ok(run(test([@ssltest, "-bio_pair", "-tls1", "-npn_client", "-npn_server", "-num", "2", "-reuse"])));
	}
548 549 550 551 552 553 554
    };

    subtest 'Custom Extension tests' => sub {
	######################################################################

	plan tests => 1;

555
      SKIP: {
556
	  skip "TLSv1.0 is not supported by this OpenSSL build", 1
557 558 559 560 561
	      if $no_tls1;

	  ok(run(test([@ssltest, "-bio_pair", "-tls1", "-custom_ext"])),
	     'test tls1 with custom extensions');
	}
562 563 564 565 566 567 568
    };

    subtest 'Serverinfo tests' => sub {
	######################################################################

	plan tests => 5;

569 570 571 572 573 574 575 576 577 578 579
      SKIP: {
	  skip "TLSv1.0 is not supported by this OpenSSL build", 5
	      if $no_tls1;

	  note('echo test tls1 with serverinfo');
	  ok(run(test([@ssltest, "-bio_pair", "-tls1", "-serverinfo_file", $serverinfo])));
	  ok(run(test([@ssltest, "-bio_pair", "-tls1", "-serverinfo_file", $serverinfo, "-serverinfo_sct"])));
	  ok(run(test([@ssltest, "-bio_pair", "-tls1", "-serverinfo_file", $serverinfo, "-serverinfo_tack"])));
	  ok(run(test([@ssltest, "-bio_pair", "-tls1", "-serverinfo_file", $serverinfo, "-serverinfo_sct", "-serverinfo_tack"])));
	  ok(run(test([@ssltest, "-bio_pair", "-tls1", "-custom_ext", "-serverinfo_file", $serverinfo, "-serverinfo_sct", "-serverinfo_tack"])));
	}
580 581
    };

T
Todd Short 已提交
582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600
    subtest 'SNI tests' => sub {

	plan tests => 7;

      SKIP: {
	  skip "TLSv1.x is not supported by this OpenSSL build", 7
	      if $no_tls1 && $no_tls1_1 && $no_tls1_2;

	  ok(run(test([@ssltest, "-bio_pair", "-sn_client", "foo"])));
	  ok(run(test([@ssltest, "-bio_pair", "-sn_server1", "foo"])));
	  ok(run(test([@ssltest, "-bio_pair", "-sn_client", "foo", "-sn_server1", "foo", "-sn_expect1"])));
	  ok(run(test([@ssltest, "-bio_pair", "-sn_client", "foo", "-sn_server1", "bar", "-sn_expect1"])));
	  ok(run(test([@ssltest, "-bio_pair", "-sn_client", "foo", "-sn_server1", "foo", "-sn_server2", "bar", "-sn_expect1"])));
	  ok(run(test([@ssltest, "-bio_pair", "-sn_client", "bar", "-sn_server1", "foo", "-sn_server2", "bar", "-sn_expect2"])));
	  # Negative test - make sure it doesn't crash, and doesn't switch contexts
	  ok(run(test([@ssltest, "-bio_pair", "-sn_client", "foobar", "-sn_server1", "foo", "-sn_server2", "bar", "-sn_expect1"])));
	}
    };

601 602 603
    subtest 'ALPN tests' => sub {
	######################################################################

T
Todd Short 已提交
604
	plan tests => 13;
605

606
      SKIP: {
T
Todd Short 已提交
607
	  skip "TLSv1.0 is not supported by this OpenSSL build", 13
608 609
	      if $no_tls1;

610 611
	  ok(run(test([@ssltest, "-bio_pair", "-tls1", "-alpn_client", "foo"])));
	  ok(run(test([@ssltest, "-bio_pair", "-tls1", "-alpn_server", "foo"])));
612 613 614 615 616 617
	  ok(run(test([@ssltest, "-bio_pair", "-tls1", "-alpn_client", "foo", "-alpn_server", "foo", "-alpn_expected", "foo"])));
	  ok(run(test([@ssltest, "-bio_pair", "-tls1", "-alpn_client", "foo,bar", "-alpn_server", "foo", "-alpn_expected", "foo"])));
	  ok(run(test([@ssltest, "-bio_pair", "-tls1", "-alpn_client", "bar,foo", "-alpn_server", "foo", "-alpn_expected", "foo"])));
	  ok(run(test([@ssltest, "-bio_pair", "-tls1", "-alpn_client", "bar,foo", "-alpn_server", "foo,bar", "-alpn_expected", "foo"])));
	  ok(run(test([@ssltest, "-bio_pair", "-tls1", "-alpn_client", "bar,foo", "-alpn_server", "bar,foo", "-alpn_expected", "bar"])));
	  ok(run(test([@ssltest, "-bio_pair", "-tls1", "-alpn_client", "foo,bar", "-alpn_server", "bar,foo", "-alpn_expected", "bar"])));
618 619 620 621 622

	  is(run(test([@ssltest, "-bio_pair", "-tls1", "-alpn_client", "foo", "-alpn_server", "bar"])), 0,
             "Testing ALPN with protocol mismatch, expecting failure");
	  is(run(test([@ssltest, "-bio_pair", "-tls1", "-alpn_client", "baz", "-alpn_server", "bar,foo"])), 0,
             "Testing ALPN with protocol mismatch, expecting failure");
623

T
Todd Short 已提交
624 625 626 627 628 629 630 631 632 633 634
	  # ALPN + SNI
	  ok(run(test([@ssltest, "-bio_pair",
		       "-alpn_client", "foo,bar", "-sn_client", "alice",
		       "-alpn_server1", "foo,123", "-sn_server1", "alice",
		       "-alpn_server2", "bar,456", "-sn_server2", "bob",
		       "-alpn_expected", "foo"])));
	  ok(run(test([@ssltest, "-bio_pair",
		       "-alpn_client", "foo,bar", "-sn_client", "bob",
		       "-alpn_server1", "foo,123", "-sn_server1", "alice",
		       "-alpn_server2", "bar,456", "-sn_server2", "bob",
		       "-alpn_expected", "bar"])));
T
Todd Short 已提交
635 636 637 638
	  ok(run(test([@ssltest, "-bio_pair",
		       "-alpn_client", "foo,bar", "-sn_client", "bob",
		       "-alpn_server2", "bar,456", "-sn_server2", "bob",
		       "-alpn_expected", "bar"])));
T
Todd Short 已提交
639 640
	}
    };
641

T
Todd Short 已提交
642
    subtest 'SRP tests' => sub {
643

T
Todd Short 已提交
644
	plan tests => 4;
645

T
Todd Short 已提交
646 647 648
      SKIP: {
	  skip "skipping SRP tests", 4
	      if $no_srp;
649

T
Todd Short 已提交
650 651 652 653 654 655 656 657 658 659 660
	  ok(run(test([@ssltest, "-tls1", "-cipher", "SRP", "-srpuser", "test", "-srppass", "abc123"])),
	     'test tls1 with SRP');

	  ok(run(test([@ssltest, "-bio_pair", "-tls1", "-cipher", "SRP", "-srpuser", "test", "-srppass", "abc123"])),
	     'test tls1 with SRP via BIO pair');

	  ok(run(test([@ssltest, "-tls1", "-cipher", "aSRP", "-srpuser", "test", "-srppass", "abc123"])),
	     'test tls1 with SRP auth');

	  ok(run(test([@ssltest, "-bio_pair", "-tls1", "-cipher", "aSRP", "-srpuser", "test", "-srppass", "abc123"])),
	     'test tls1 with SRP auth via BIO pair');
661 662 663 664 665 666 667 668
	}
    };

    subtest 'Multi-buffer tests' => sub {
	######################################################################

	plan tests => 2;

669 670 671 672 673
      SKIP: {
	  skip "Neither SSLv3 nor any TLS version are supported by this OpenSSL build", 2
	      if $no_anytls;

	  skip "skipping multi-buffer tests", 2
674
	      if (POSIX::uname())[4] ne "x86_64";
675 676 677 678 679 680 681 682

	  ok(run(test([@ssltest, "-cipher", "AES128-SHA",    "-bytes", "8m"])));

	  # We happen to know that AES128-SHA256 is TLSv1.2 only... for now.
	  skip "TLSv1.2 is not supported by this OpenSSL configuration", 1
	      if $no_tls1_2;

	  ok(run(test([@ssltest, "-cipher", "AES128-SHA256", "-bytes", "8m"])));
683 684
	}
    };
685

686 687 688 689 690 691 692 693 694 695
    subtest 'DTLS Version min/max tests' => sub {
        my @protos;
        push(@protos, "dtls1") unless ($no_dtls1 || $no_dtls);
        push(@protos, "dtls1.2") unless ($no_dtls1_2 || $no_dtls);
        my @minprotos = (undef, @protos);
        my @maxprotos = (@protos, undef);
        my @shdprotos = (@protos, $protos[$#protos]);
        my $n = ((@protos+2) * (@protos+3))/2 - 2;
        my $ntests = $n * $n;
	plan tests => $ntests;
696
      SKIP: {
697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729
        skip "DTLS disabled", 1 if $ntests == 1;

        my $should;
        for (my $smin = 0; $smin < @minprotos; ++$smin) {
        for (my $smax = $smin ? $smin - 1 : 0; $smax < @maxprotos; ++$smax) {
        for (my $cmin = 0; $cmin < @minprotos; ++$cmin) {
        for (my $cmax = $cmin ? $cmin - 1 : 0; $cmax < @maxprotos; ++$cmax) {
            if ($cmax < $smin-1) {
                $should = "fail-server";
            } elsif ($smax < $cmin-1) {
                $should = "fail-client";
            } elsif ($cmax > $smax) {
                $should = $shdprotos[$smax];
            } else {
                $should = $shdprotos[$cmax];
            }

            my @args = (@ssltest, "-dtls");
            push(@args, "-should_negotiate", $should);
            push(@args, "-server_min_proto", $minprotos[$smin])
                if (defined($minprotos[$smin]));
            push(@args, "-server_max_proto", $maxprotos[$smax])
                if (defined($maxprotos[$smax]));
            push(@args, "-client_min_proto", $minprotos[$cmin])
                if (defined($minprotos[$cmin]));
            push(@args, "-client_max_proto", $maxprotos[$cmax])
                if (defined($maxprotos[$cmax]));
            my $ok = run(test[@args]);
            if (! $ok) {
                print STDERR "\nsmin=$smin, smax=$smax, cmin=$cmin, cmax=$cmax\n";
                print STDERR "\nFailed: @args\n";
            }
            ok($ok);
730
        }}}}}
731
    };
732

K
Kurt Roeckx 已提交
733 734 735
    subtest 'TLS session reuse' => sub {
        plan tests => 12;

M
Matt Caswell 已提交
736
        SKIP: {
M
Matt Caswell 已提交
737
            skip "TLS1.1 or TLS1.2 disabled", 12 if $no_tls1_1 || $no_tls1_2;
M
Matt Caswell 已提交
738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753
            ok(run(test([@ssltest, "-server_sess_out", $server_sess, "-client_sess_out", $client_sess])));
            ok(run(test([@ssltest, "-server_sess_in", $server_sess, "-client_sess_in", $client_sess, "-should_reuse", "1", "-should_negotiate", "tls1.2"])));
            ok(run(test([@ssltest, "-server_max_proto", "tls1.1", "-server_sess_in", $server_sess, "-client_sess_in", $client_sess, "-should_reuse", "0", "-should_negotiate", "tls1.1"])));

            ok(run(test([@ssltest, "-server_max_proto", "tls1.1", "-server_sess_out", $server_sess, "-client_sess_out", $client_sess])));
            ok(run(test([@ssltest, "-server_max_proto", "tls1.1", "-server_sess_in", $server_sess, "-client_sess_in", $client_sess, "-should_reuse", "1", "-should_negotiate", "tls1.1"])));
            ok(run(test([@ssltest, "-server_sess_in", $server_sess, "-client_sess_in", $client_sess, "-should_reuse", "0", "-should_negotiate", "tls1.2"])));

            ok(run(test([@ssltest, "-no_ticket", "-server_sess_out", $server_sess, "-client_sess_out", $client_sess])));
            ok(run(test([@ssltest, "-no_ticket", "-server_sess_in", $server_sess, "-client_sess_in", $client_sess, "-should_reuse", "1", "-should_negotiate", "tls1.2"])));
            ok(run(test([@ssltest, "-no_ticket", "-server_max_proto", "tls1.1", "-server_sess_in", $server_sess, "-client_sess_in", $client_sess, "-should_reuse", "0", "-should_negotiate", "tls1.1"])));

            ok(run(test([@ssltest, "-no_ticket", "-server_max_proto", "tls1.1", "-server_sess_out", $server_sess, "-client_sess_out", $client_sess])));
            ok(run(test([@ssltest, "-no_ticket", "-server_max_proto", "tls1.1", "-server_sess_in", $server_sess, "-client_sess_in", $client_sess, "-should_reuse", "1", "-should_negotiate", "tls1.1"])));
            ok(run(test([@ssltest, "-no_ticket", "-server_sess_in", $server_sess, "-client_sess_in", $client_sess, "-should_reuse", "0", "-should_negotiate", "tls1.2"])));
        }
K
Kurt Roeckx 已提交
754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778
    };

    subtest 'DTLS session reuse' => sub {
        plan tests => 12;
      SKIP: {
        skip "DTLS disabled", 12 if $no_dtls;

        ok(run(test([@ssltest, "-dtls", "-server_sess_out", $server_sess, "-client_sess_out", $client_sess])));
        ok(run(test([@ssltest, "-dtls", "-server_sess_in", $server_sess, "-client_sess_in", $client_sess, "-should_reuse", "1", "-should_negotiate", "dtls1.2"])));
        ok(run(test([@ssltest, "-dtls", "-server_max_proto", "dtls1", "-server_sess_in", $server_sess, "-client_sess_in", $client_sess, "-should_reuse", "0", "-should_negotiate", "dtls1"])));

        ok(run(test([@ssltest, "-dtls", "-server_max_proto", "dtls1", "-server_sess_out", $server_sess, "-client_sess_out", $client_sess])));
        ok(run(test([@ssltest, "-dtls", "-server_max_proto", "dtls1", "-server_sess_in", $server_sess, "-client_sess_in", $client_sess, "-should_reuse", "1", "-should_negotiate", "dtls1"])));
        ok(run(test([@ssltest, "-dtls", "-server_sess_in", $server_sess, "-client_sess_in", $client_sess, "-should_reuse", "0", "-should_negotiate", "dtls1.2"])));

        ok(run(test([@ssltest, "-dtls", "-no_ticket", "-server_sess_out", $server_sess, "-client_sess_out", $client_sess])));
        ok(run(test([@ssltest, "-dtls", "-no_ticket", "-server_sess_in", $server_sess, "-client_sess_in", $client_sess, "-should_reuse", "1", "-should_negotiate", "dtls1.2"])));
        ok(run(test([@ssltest, "-dtls", "-no_ticket", "-server_max_proto", "dtls1", "-server_sess_in", $server_sess, "-client_sess_in", $client_sess, "-should_reuse", "0", "-should_negotiate", "dtls1"])));

        ok(run(test([@ssltest, "-dtls", "-no_ticket", "-server_max_proto", "dtls1", "-server_sess_out", $server_sess, "-client_sess_out", $client_sess])));
        ok(run(test([@ssltest, "-dtls", "-no_ticket", "-server_max_proto", "dtls1", "-server_sess_in", $server_sess, "-client_sess_in", $client_sess, "-should_reuse", "1", "-should_negotiate", "dtls1"])));
        ok(run(test([@ssltest, "-dtls", "-no_ticket", "-server_sess_in", $server_sess, "-client_sess_in", $client_sess, "-should_reuse", "0", "-should_negotiate", "dtls1.2"])));
	}
    };

779 780 781 782 783 784
    subtest 'Certificate Transparency tests' => sub {
	######################################################################

	plan tests => 3;

      SKIP: {
785 786 787 788 789 790 791 792 793 794 795 796 797 798
        skip "Certificate Transparency is not supported by this OpenSSL build", 3
            if $no_ct;
        skip "TLSv1.0 is not supported by this OpenSSL build", 3
            if $no_tls1;

        $ENV{CTLOG_FILE} = srctop_file("test", "ct", "log_list.conf");
        my @ca = qw(-CAfile certCA.ss);
        ok(run(test([@ssltest, @ca, "-bio_pair", "-tls1", "-noct"])));
        # No SCTs provided, so this should fail.
        ok(run(test([@ssltest, @ca, "-bio_pair", "-tls1", "-ct",
                     "-should_negotiate", "fail-client"])));
        # No SCTs provided, unverified chains still succeed.
        ok(run(test([@ssltest, "-bio_pair", "-tls1", "-ct"])));
        }
799
    };
800
}