2014-06-20 20:00:00 +01:00
package main
import (
"bytes"
2014-08-24 06:46:07 +01:00
"crypto/ecdsa"
"crypto/elliptic"
2014-07-16 17:58:59 +01:00
"crypto/x509"
2014-08-24 06:25:27 +01:00
"encoding/base64"
2014-08-24 06:46:07 +01:00
"encoding/pem"
2014-06-20 20:00:00 +01:00
"flag"
"fmt"
"io"
2014-08-05 23:23:37 +01:00
"io/ioutil"
2015-05-15 01:38:50 +01:00
"math/big"
2014-06-20 20:00:00 +01:00
"net"
"os"
"os/exec"
2014-08-02 20:28:23 +01:00
"path"
2014-08-02 20:22:37 +01:00
"runtime"
2014-11-18 01:26:55 +00:00
"strconv"
2014-06-20 20:00:00 +01:00
"strings"
"sync"
"syscall"
Add DTLS timeout and retransmit tests.
This extends the packet adaptor protocol to send three commands:
type command =
| Packet of []byte
| Timeout of time.Duration
| TimeoutAck
When the shim processes a Timeout in BIO_read, it sends TimeoutAck, fails the
BIO_read, returns out of the SSL stack, advances the clock, calls
DTLSv1_handle_timeout, and continues.
If the Go side sends Timeout right between sending handshake flight N and
reading flight N+1, the shim won't read the Timeout until it has sent flight
N+1 (it only processes packet commands in BIO_read), so the TimeoutAck comes
after N+1. Go then drops all packets before the TimeoutAck, thus dropping one
transmit of flight N+1 without having to actually process the packets to
determine the end of the flight. The shim then sees the updated clock, calls
DTLSv1_handle_timeout, and re-sends flight N+1 for Go to process for real.
When dropping packets, Go checks the epoch and increments sequence numbers so
that we can continue to be strict here. This requires tracking the initial
sequence number of the next epoch.
The final Finished message takes an additional special-case to test. DTLS
triggers retransmits on either a timeout or seeing a stale flight. OpenSSL only
implements the former which should be sufficient (and is necessary) EXCEPT for
the final Finished message. If the peer's final Finished message is lost, it
won't be waiting for a message from us, so it won't time out anything. That
retransmit must be triggered on stale message, so we retransmit the Finished
message in Go.
Change-Id: I3ffbdb1de525beb2ee831b304670a3387877634c
Reviewed-on: https://boringssl-review.googlesource.com/3212
Reviewed-by: Adam Langley <agl@google.com>
2015-01-27 06:09:43 +00:00
"time"
2014-06-20 20:00:00 +01:00
)
2014-11-18 01:26:55 +00:00
var (
2015-02-11 22:14:15 +00:00
useValgrind = flag . Bool ( "valgrind" , false , "If true, run code under valgrind" )
useGDB = flag . Bool ( "gdb" , false , "If true, run BoringSSL code under gdb" )
flagDebug = flag . Bool ( "debug" , false , "Hexdump the contents of the connection" )
mallocTest = flag . Int64 ( "malloc-test" , - 1 , "If non-negative, run each test with each malloc in turn failing from the given number onwards." )
mallocTestDebug = flag . Bool ( "malloc-test-debug" , false , "If true, ask bssl_shim to abort rather than fail a malloc. This can be used with a specific value for --malloc-test to identity the malloc failing that is causing problems." )
jsonOutput = flag . String ( "json-output" , "" , "The file to output JSON results to." )
pipe = flag . Bool ( "pipe" , false , "If true, print status output suitable for piping into another program." )
2015-06-15 23:35:05 +01:00
testToRun = flag . String ( "test" , "" , "The name of a test to run, or empty to run all tests" )
numWorkers = flag . Int ( "num-workers" , runtime . NumCPU ( ) , "The number of workers to run in parallel." )
shimPath = flag . String ( "shim-path" , "../../../build/ssl/test/bssl_shim" , "The location of the shim binary." )
resourceDir = flag . String ( "resource-dir" , "." , "The directory in which to find certificate and key files." )
2014-11-18 01:26:55 +00:00
)
2014-06-20 20:00:00 +01:00
2014-07-02 00:53:04 +01:00
const (
rsaCertificateFile = "cert.pem"
ecdsaCertificateFile = "ecdsa_cert.pem"
)
const (
2014-08-24 06:46:07 +01:00
rsaKeyFile = "key.pem"
ecdsaKeyFile = "ecdsa_key.pem"
channelIDKeyFile = "channel_id_key.pem"
2014-07-02 00:53:04 +01:00
)
2014-06-20 20:00:00 +01:00
var rsaCertificate , ecdsaCertificate Certificate
2014-08-24 06:46:07 +01:00
var channelIDKey * ecdsa . PrivateKey
var channelIDBytes [ ] byte
2014-06-20 20:00:00 +01:00
2014-11-25 06:55:35 +00:00
var testOCSPResponse = [ ] byte { 1 , 2 , 3 , 4 }
var testSCTList = [ ] byte { 5 , 6 , 7 , 8 }
2014-06-20 20:00:00 +01:00
func initCertificates ( ) {
var err error
2015-06-15 23:35:05 +01:00
rsaCertificate , err = LoadX509KeyPair ( path . Join ( * resourceDir , rsaCertificateFile ) , path . Join ( * resourceDir , rsaKeyFile ) )
2014-06-20 20:00:00 +01:00
if err != nil {
panic ( err )
}
2014-11-25 06:55:35 +00:00
rsaCertificate . OCSPStaple = testOCSPResponse
rsaCertificate . SignedCertificateTimestampList = testSCTList
2014-06-20 20:00:00 +01:00
2015-06-15 23:35:05 +01:00
ecdsaCertificate , err = LoadX509KeyPair ( path . Join ( * resourceDir , ecdsaCertificateFile ) , path . Join ( * resourceDir , ecdsaKeyFile ) )
2014-06-20 20:00:00 +01:00
if err != nil {
panic ( err )
}
2014-11-25 06:55:35 +00:00
ecdsaCertificate . OCSPStaple = testOCSPResponse
ecdsaCertificate . SignedCertificateTimestampList = testSCTList
2014-08-24 06:46:07 +01:00
2015-06-15 23:35:05 +01:00
channelIDPEMBlock , err := ioutil . ReadFile ( path . Join ( * resourceDir , channelIDKeyFile ) )
2014-08-24 06:46:07 +01:00
if err != nil {
panic ( err )
}
channelIDDERBlock , _ := pem . Decode ( channelIDPEMBlock )
if channelIDDERBlock . Type != "EC PRIVATE KEY" {
panic ( "bad key type" )
}
channelIDKey , err = x509 . ParseECPrivateKey ( channelIDDERBlock . Bytes )
if err != nil {
panic ( err )
}
if channelIDKey . Curve != elliptic . P256 ( ) {
panic ( "bad curve" )
}
channelIDBytes = make ( [ ] byte , 64 )
writeIntPadded ( channelIDBytes [ : 32 ] , channelIDKey . X )
writeIntPadded ( channelIDBytes [ 32 : ] , channelIDKey . Y )
2014-06-20 20:00:00 +01:00
}
var certificateOnce sync . Once
func getRSACertificate ( ) Certificate {
certificateOnce . Do ( initCertificates )
return rsaCertificate
}
func getECDSACertificate ( ) Certificate {
certificateOnce . Do ( initCertificates )
return ecdsaCertificate
}
2014-07-02 00:53:04 +01:00
type testType int
const (
clientTest testType = iota
serverTest
)
2014-08-11 23:43:38 +01:00
type protocol int
const (
tls protocol = iota
dtls
)
2014-09-06 18:21:53 +01:00
const (
alpn = 1
npn = 2
)
2014-06-20 20:00:00 +01:00
type testCase struct {
2014-07-02 00:53:04 +01:00
testType testType
2014-08-11 23:43:38 +01:00
protocol protocol
2014-06-20 20:00:00 +01:00
name string
config Config
shouldFail bool
expectedError string
2014-06-23 20:03:11 +01:00
// expectedLocalError, if not empty, contains a substring that must be
// found in the local error.
expectedLocalError string
2014-08-07 22:44:24 +01:00
// expectedVersion, if non-zero, specifies the TLS version that must be
// negotiated.
expectedVersion uint16
2014-09-24 20:21:44 +01:00
// expectedResumeVersion, if non-zero, specifies the TLS version that
// must be negotiated on resumption. If zero, expectedVersion is used.
expectedResumeVersion uint16
2015-04-20 19:57:57 +01:00
// expectedCipher, if non-zero, specifies the TLS cipher suite that
// should be negotiated.
expectedCipher uint16
2014-08-24 06:46:07 +01:00
// expectChannelID controls whether the connection should have
// negotiated a Channel ID with channelIDKey.
expectChannelID bool
2014-09-06 17:58:58 +01:00
// expectedNextProto controls whether the connection should
// negotiate a next protocol via NPN or ALPN.
expectedNextProto string
2014-09-06 18:21:53 +01:00
// expectedNextProtoType, if non-zero, is the expected next
// protocol negotiation mechanism.
expectedNextProtoType int
2014-11-16 00:06:08 +00:00
// expectedSRTPProtectionProfile is the DTLS-SRTP profile that
// should be negotiated. If zero, none should be negotiated.
expectedSRTPProtectionProfile uint16
2014-06-20 20:00:00 +01:00
// messageLen is the length, in bytes, of the test message that will be
// sent.
messageLen int
2014-07-02 00:53:04 +01:00
// certFile is the path to the certificate to use for the server.
certFile string
// keyFile is the path to the private key to use for the server.
keyFile string
2014-07-23 00:20:02 +01:00
// resumeSession controls whether a second connection should be tested
2014-09-24 20:21:44 +01:00
// which attempts to resume the first session.
2014-07-23 00:20:02 +01:00
resumeSession bool
2015-06-02 18:47:39 +01:00
// expectResumeRejected, if true, specifies that the attempted
// resumption must be rejected by the client. This is only valid for a
// serverTest.
expectResumeRejected bool
2014-09-24 20:21:44 +01:00
// resumeConfig, if not nil, points to a Config to be used on
2014-11-17 08:19:02 +00:00
// resumption. Unless newSessionsOnResume is set,
// SessionTicketKey, ServerSessionCache, and
// ClientSessionCache are copied from the initial connection's
// config. If nil, the initial connection's config is used.
2014-09-24 20:21:44 +01:00
resumeConfig * Config
2014-11-17 08:19:02 +00:00
// newSessionsOnResume, if true, will cause resumeConfig to
// use a different session resumption context.
newSessionsOnResume bool
2015-06-18 23:36:15 +01:00
// noSessionCache, if true, will cause the server to run without a
// session cache.
noSessionCache bool
2014-08-08 18:24:34 +01:00
// sendPrefix sends a prefix on the socket before actually performing a
// handshake.
sendPrefix string
2014-08-24 08:47:07 +01:00
// shimWritesFirst controls whether the shim sends an initial "hello"
// message before doing a roundtrip with the runner.
shimWritesFirst bool
2014-10-29 02:06:14 +00:00
// renegotiate indicates the the connection should be renegotiated
// during the exchange.
renegotiate bool
// renegotiateCiphers is a list of ciphersuite ids that will be
// switched in just before renegotiation.
renegotiateCiphers [ ] uint16
2014-11-07 06:48:35 +00:00
// replayWrites, if true, configures the underlying transport
// to replay every write it makes in DTLS tests.
replayWrites bool
2015-01-22 21:35:40 +00:00
// damageFirstWrite, if true, configures the underlying transport to
// damage the final byte of the first application data write.
damageFirstWrite bool
2015-04-03 09:06:36 +01:00
// exportKeyingMaterial, if non-zero, configures the test to exchange
// keying material and verify they match.
exportKeyingMaterial int
exportLabel string
exportContext string
useExportContext bool
2014-07-02 00:40:31 +01:00
// flags, if not empty, contains a list of command-line flags that will
// be passed to the shim program.
flags [ ] string
2015-06-03 17:57:23 +01:00
// testTLSUnique, if true, causes the shim to send the tls-unique value
// which will be compared against the expected value.
testTLSUnique bool
2015-06-06 08:04:39 +01:00
// sendEmptyRecords is the number of consecutive empty records to send
// before and after the test message.
sendEmptyRecords int
2015-06-06 08:28:08 +01:00
// sendWarningAlerts is the number of consecutive warning alerts to send
// before and after the test message.
sendWarningAlerts int
2014-06-20 20:00:00 +01:00
}
2015-06-15 23:35:05 +01:00
var testCases [ ] testCase
2014-06-20 20:00:00 +01:00
2014-09-24 20:21:44 +01:00
func doExchange ( test * testCase , config * Config , conn net . Conn , messageLen int , isResume bool ) error {
2014-11-23 08:01:00 +00:00
var connDebug * recordingConn
2015-01-22 21:35:40 +00:00
var connDamage * damageAdaptor
2014-11-23 08:01:00 +00:00
if * flagDebug {
connDebug = & recordingConn { Conn : conn }
conn = connDebug
defer func ( ) {
connDebug . WriteTo ( os . Stdout )
} ( )
}
2014-08-11 23:43:38 +01:00
if test . protocol == dtls {
Add DTLS timeout and retransmit tests.
This extends the packet adaptor protocol to send three commands:
type command =
| Packet of []byte
| Timeout of time.Duration
| TimeoutAck
When the shim processes a Timeout in BIO_read, it sends TimeoutAck, fails the
BIO_read, returns out of the SSL stack, advances the clock, calls
DTLSv1_handle_timeout, and continues.
If the Go side sends Timeout right between sending handshake flight N and
reading flight N+1, the shim won't read the Timeout until it has sent flight
N+1 (it only processes packet commands in BIO_read), so the TimeoutAck comes
after N+1. Go then drops all packets before the TimeoutAck, thus dropping one
transmit of flight N+1 without having to actually process the packets to
determine the end of the flight. The shim then sees the updated clock, calls
DTLSv1_handle_timeout, and re-sends flight N+1 for Go to process for real.
When dropping packets, Go checks the epoch and increments sequence numbers so
that we can continue to be strict here. This requires tracking the initial
sequence number of the next epoch.
The final Finished message takes an additional special-case to test. DTLS
triggers retransmits on either a timeout or seeing a stale flight. OpenSSL only
implements the former which should be sufficient (and is necessary) EXCEPT for
the final Finished message. If the peer's final Finished message is lost, it
won't be waiting for a message from us, so it won't time out anything. That
retransmit must be triggered on stale message, so we retransmit the Finished
message in Go.
Change-Id: I3ffbdb1de525beb2ee831b304670a3387877634c
Reviewed-on: https://boringssl-review.googlesource.com/3212
Reviewed-by: Adam Langley <agl@google.com>
2015-01-27 06:09:43 +00:00
config . Bugs . PacketAdaptor = newPacketAdaptor ( conn )
conn = config . Bugs . PacketAdaptor
2014-11-07 06:48:35 +00:00
if test . replayWrites {
conn = newReplayAdaptor ( conn )
}
2014-08-11 23:43:38 +01:00
}
2015-01-22 21:35:40 +00:00
if test . damageFirstWrite {
connDamage = newDamageAdaptor ( conn )
conn = connDamage
}
2014-08-11 23:43:38 +01:00
if test . sendPrefix != "" {
if _ , err := conn . Write ( [ ] byte ( test . sendPrefix ) ) ; err != nil {
return err
}
2014-08-08 18:24:34 +01:00
}
2014-07-23 00:20:02 +01:00
var tlsConn * Conn
2014-08-07 22:44:24 +01:00
if test . testType == clientTest {
2014-08-11 23:43:38 +01:00
if test . protocol == dtls {
tlsConn = DTLSServer ( conn , config )
} else {
tlsConn = Server ( conn , config )
}
2014-07-23 00:20:02 +01:00
} else {
config . InsecureSkipVerify = true
2014-08-11 23:43:38 +01:00
if test . protocol == dtls {
tlsConn = DTLSClient ( conn , config )
} else {
tlsConn = Client ( conn , config )
}
2014-07-23 00:20:02 +01:00
}
2014-06-20 20:00:00 +01:00
if err := tlsConn . Handshake ( ) ; err != nil {
return err
}
2014-08-05 23:23:37 +01:00
2014-09-24 20:21:44 +01:00
// TODO(davidben): move all per-connection expectations into a dedicated
// expectations struct that can be specified separately for the two
// legs.
expectedVersion := test . expectedVersion
if isResume && test . expectedResumeVersion != 0 {
expectedVersion = test . expectedResumeVersion
}
2015-06-02 18:47:39 +01:00
connState := tlsConn . ConnectionState ( )
if vers := connState . Version ; expectedVersion != 0 && vers != expectedVersion {
2014-09-24 20:21:44 +01:00
return fmt . Errorf ( "got version %x, expected %x" , vers , expectedVersion )
2014-08-07 22:44:24 +01:00
}
2015-06-02 18:47:39 +01:00
if cipher := connState . CipherSuite ; test . expectedCipher != 0 && cipher != test . expectedCipher {
2015-04-20 19:57:57 +01:00
return fmt . Errorf ( "got cipher %x, expected %x" , cipher , test . expectedCipher )
}
2015-06-02 18:47:39 +01:00
if didResume := connState . DidResume ; isResume && didResume == test . expectResumeRejected {
return fmt . Errorf ( "didResume is %t, but we expected the opposite" , didResume )
}
2015-04-20 19:57:57 +01:00
2014-08-24 06:46:07 +01:00
if test . expectChannelID {
2015-06-02 18:47:39 +01:00
channelID := connState . ChannelID
2014-08-24 06:46:07 +01:00
if channelID == nil {
return fmt . Errorf ( "no channel ID negotiated" )
}
if channelID . Curve != channelIDKey . Curve ||
channelIDKey . X . Cmp ( channelIDKey . X ) != 0 ||
channelIDKey . Y . Cmp ( channelIDKey . Y ) != 0 {
return fmt . Errorf ( "incorrect channel ID" )
}
}
2014-09-06 17:58:58 +01:00
if expected := test . expectedNextProto ; expected != "" {
2015-06-02 18:47:39 +01:00
if actual := connState . NegotiatedProtocol ; actual != expected {
2014-09-06 17:58:58 +01:00
return fmt . Errorf ( "next proto mismatch: got %s, wanted %s" , actual , expected )
}
}
2014-09-06 18:21:53 +01:00
if test . expectedNextProtoType != 0 {
2015-06-02 18:47:39 +01:00
if ( test . expectedNextProtoType == alpn ) != connState . NegotiatedProtocolFromALPN {
2014-09-06 18:21:53 +01:00
return fmt . Errorf ( "next proto type mismatch" )
}
}
2015-06-02 18:47:39 +01:00
if p := connState . SRTPProtectionProfile ; p != test . expectedSRTPProtectionProfile {
2014-11-16 00:06:08 +00:00
return fmt . Errorf ( "SRTP profile mismatch: got %d, wanted %d" , p , test . expectedSRTPProtectionProfile )
}
2015-04-03 09:06:36 +01:00
if test . exportKeyingMaterial > 0 {
actual := make ( [ ] byte , test . exportKeyingMaterial )
if _ , err := io . ReadFull ( tlsConn , actual ) ; err != nil {
return err
}
expected , err := tlsConn . ExportKeyingMaterial ( test . exportKeyingMaterial , [ ] byte ( test . exportLabel ) , [ ] byte ( test . exportContext ) , test . useExportContext )
if err != nil {
return err
}
if ! bytes . Equal ( actual , expected ) {
return fmt . Errorf ( "keying material mismatch" )
}
}
2015-06-03 17:57:23 +01:00
if test . testTLSUnique {
var peersValue [ 12 ] byte
if _ , err := io . ReadFull ( tlsConn , peersValue [ : ] ) ; err != nil {
return err
}
expected := tlsConn . ConnectionState ( ) . TLSUnique
if ! bytes . Equal ( peersValue [ : ] , expected ) {
return fmt . Errorf ( "tls-unique mismatch: peer sent %x, but %x was expected" , peersValue [ : ] , expected )
}
}
2014-08-24 08:47:07 +01:00
if test . shimWritesFirst {
var buf [ 5 ] byte
_ , err := io . ReadFull ( tlsConn , buf [ : ] )
if err != nil {
return err
}
if string ( buf [ : ] ) != "hello" {
return fmt . Errorf ( "bad initial message" )
}
}
2015-06-06 08:04:39 +01:00
for i := 0 ; i < test . sendEmptyRecords ; i ++ {
tlsConn . Write ( nil )
}
2015-06-06 08:28:08 +01:00
for i := 0 ; i < test . sendWarningAlerts ; i ++ {
tlsConn . SendAlert ( alertLevelWarning , alertUnexpectedMessage )
}
2014-10-29 02:06:14 +00:00
if test . renegotiate {
if test . renegotiateCiphers != nil {
config . CipherSuites = test . renegotiateCiphers
}
if err := tlsConn . Renegotiate ( ) ; err != nil {
return err
}
} else if test . renegotiateCiphers != nil {
panic ( "renegotiateCiphers without renegotiate" )
}
2015-01-22 21:35:40 +00:00
if test . damageFirstWrite {
connDamage . setDamage ( true )
tlsConn . Write ( [ ] byte ( "DAMAGED WRITE" ) )
connDamage . setDamage ( false )
}
2014-08-05 23:23:37 +01:00
if messageLen < 0 {
2014-08-11 23:43:38 +01:00
if test . protocol == dtls {
return fmt . Errorf ( "messageLen < 0 not supported for DTLS tests" )
}
2014-08-05 23:23:37 +01:00
// Read until EOF.
_ , err := io . Copy ( ioutil . Discard , tlsConn )
return err
}
2015-04-05 09:17:25 +01:00
if messageLen == 0 {
messageLen = 32
}
testMessage := make ( [ ] byte , messageLen )
for i := range testMessage {
testMessage [ i ] = 0x42
2014-06-20 20:00:00 +01:00
}
2015-04-05 09:17:25 +01:00
tlsConn . Write ( testMessage )
2014-06-20 20:00:00 +01:00
2015-06-06 08:04:39 +01:00
for i := 0 ; i < test . sendEmptyRecords ; i ++ {
tlsConn . Write ( nil )
}
2015-06-06 08:28:08 +01:00
for i := 0 ; i < test . sendWarningAlerts ; i ++ {
tlsConn . SendAlert ( alertLevelWarning , alertUnexpectedMessage )
}
2014-06-20 20:00:00 +01:00
buf := make ( [ ] byte , len ( testMessage ) )
2014-08-11 23:43:38 +01:00
if test . protocol == dtls {
bufTmp := make ( [ ] byte , len ( buf ) + 1 )
n , err := tlsConn . Read ( bufTmp )
if err != nil {
return err
}
if n != len ( buf ) {
return fmt . Errorf ( "bad reply; length mismatch (%d vs %d)" , n , len ( buf ) )
}
copy ( buf , bufTmp )
} else {
_ , err := io . ReadFull ( tlsConn , buf )
if err != nil {
return err
}
2014-06-20 20:00:00 +01:00
}
for i , v := range buf {
if v != testMessage [ i ] ^ 0xff {
return fmt . Errorf ( "bad reply contents at byte %d" , i )
}
}
return nil
}
2014-07-02 00:40:31 +01:00
func valgrindOf ( dbAttach bool , path string , args ... string ) * exec . Cmd {
valgrindArgs := [ ] string { "--error-exitcode=99" , "--track-origins=yes" , "--leak-check=full" }
2014-06-20 20:00:00 +01:00
if dbAttach {
2014-07-02 00:40:31 +01:00
valgrindArgs = append ( valgrindArgs , "--db-attach=yes" , "--db-command=xterm -e gdb -nw %f %p" )
2014-06-20 20:00:00 +01:00
}
2014-07-02 00:40:31 +01:00
valgrindArgs = append ( valgrindArgs , path )
valgrindArgs = append ( valgrindArgs , args ... )
2014-06-20 20:00:00 +01:00
2014-07-02 00:40:31 +01:00
return exec . Command ( "valgrind" , valgrindArgs ... )
2014-06-20 20:00:00 +01:00
}
2014-07-02 00:40:31 +01:00
func gdbOf ( path string , args ... string ) * exec . Cmd {
xtermArgs := [ ] string { "-e" , "gdb" , "--args" }
xtermArgs = append ( xtermArgs , path )
xtermArgs = append ( xtermArgs , args ... )
2014-06-20 20:00:00 +01:00
2014-07-02 00:40:31 +01:00
return exec . Command ( "xterm" , xtermArgs ... )
2014-06-20 20:00:00 +01:00
}
2014-11-18 01:26:55 +00:00
type moreMallocsError struct { }
func ( moreMallocsError ) Error ( ) string {
return "child process did not exhaust all allocation calls"
}
var errMoreMallocs = moreMallocsError { }
Use TCP sockets rather than socketpairs in the SSL tests.
This involves more synchronization with child exits as the kernel no longer
closes the pre-created pipes for free, but it works on Windows. As long as
TCP_NODELAY is set, the performance seems comparable. Though it does involve
dealing with graceful socket shutdown. I couldn't get that to work on Windows
without draining the socket; not even SO_LINGER worked. Current (untested)
theory is that Windows refuses to gracefully shutdown a socket if the peer
sends data after we've stopped reading.
cmd.ExtraFiles doesn't work on Windows; it doesn't use fds natively, so you
can't pass fds 4 and 5. (stdin/stdout/stderr are special slots in
CreateProcess.) We can instead use the syscall module directly and mark handles
as inheritable (and then pass the numerical values out-of-band), but that
requires synchronizing all of our shim.Start() calls and assuming no other
thread is spawning a process.
PROC_THREAD_ATTRIBUTE_HANDLE_LIST fixes threading problems, but requires
wrapping more syscalls. exec.Cmd also doesn't let us launch the process
ourselves. Plus it still requires every handle in the list be marked
inheritable, so it doesn't help if some other thread is launching a process
with bInheritHandles TRUE but NOT using PROC_THREAD_ATTRIBUTE_HANDLE_LIST.
(Like Go, though we can take syscall.ForkLock there.)
http://blogs.msdn.com/b/oldnewthing/archive/2011/12/16/10248328.aspx
The more natively Windows option seems to be named pipes, but that too requires
wrapping more system calls. (To be fair, that isn't too painful.) They also
involve a listening server, so we'd still have to synchronize with shim.Wait()
a la net.TCPListener.
Then there's DuplicateHandle, but then we need an out-of-band signal.
All in all, one cross-platform implementation with a TCP sockets seems
simplest.
Change-Id: I38233e309a0fa6814baf61e806732138902347c0
Reviewed-on: https://boringssl-review.googlesource.com/3563
Reviewed-by: Adam Langley <agl@google.com>
2015-02-21 06:54:29 +00:00
// accept accepts a connection from listener, unless waitChan signals a process
// exit first.
func acceptOrWait ( listener net . Listener , waitChan chan error ) ( net . Conn , error ) {
type connOrError struct {
conn net . Conn
err error
}
connChan := make ( chan connOrError , 1 )
go func ( ) {
conn , err := listener . Accept ( )
connChan <- connOrError { conn , err }
close ( connChan )
} ( )
select {
case result := <- connChan :
return result . conn , result . err
case childErr := <- waitChan :
waitChan <- childErr
return nil , fmt . Errorf ( "child exited early: %s" , childErr )
}
}
2015-06-15 23:35:05 +01:00
func runTest ( test * testCase , shimPath string , mallocNumToFail int64 ) error {
2014-10-17 03:04:35 +01:00
if ! test . shouldFail && ( len ( test . expectedError ) > 0 || len ( test . expectedLocalError ) > 0 ) {
panic ( "Error expected without shouldFail in " + test . name )
}
2015-06-02 18:47:39 +01:00
if test . expectResumeRejected && ! test . resumeSession {
panic ( "expectResumeRejected without resumeSession in " + test . name )
}
Use TCP sockets rather than socketpairs in the SSL tests.
This involves more synchronization with child exits as the kernel no longer
closes the pre-created pipes for free, but it works on Windows. As long as
TCP_NODELAY is set, the performance seems comparable. Though it does involve
dealing with graceful socket shutdown. I couldn't get that to work on Windows
without draining the socket; not even SO_LINGER worked. Current (untested)
theory is that Windows refuses to gracefully shutdown a socket if the peer
sends data after we've stopped reading.
cmd.ExtraFiles doesn't work on Windows; it doesn't use fds natively, so you
can't pass fds 4 and 5. (stdin/stdout/stderr are special slots in
CreateProcess.) We can instead use the syscall module directly and mark handles
as inheritable (and then pass the numerical values out-of-band), but that
requires synchronizing all of our shim.Start() calls and assuming no other
thread is spawning a process.
PROC_THREAD_ATTRIBUTE_HANDLE_LIST fixes threading problems, but requires
wrapping more syscalls. exec.Cmd also doesn't let us launch the process
ourselves. Plus it still requires every handle in the list be marked
inheritable, so it doesn't help if some other thread is launching a process
with bInheritHandles TRUE but NOT using PROC_THREAD_ATTRIBUTE_HANDLE_LIST.
(Like Go, though we can take syscall.ForkLock there.)
http://blogs.msdn.com/b/oldnewthing/archive/2011/12/16/10248328.aspx
The more natively Windows option seems to be named pipes, but that too requires
wrapping more system calls. (To be fair, that isn't too painful.) They also
involve a listening server, so we'd still have to synchronize with shim.Wait()
a la net.TCPListener.
Then there's DuplicateHandle, but then we need an out-of-band signal.
All in all, one cross-platform implementation with a TCP sockets seems
simplest.
Change-Id: I38233e309a0fa6814baf61e806732138902347c0
Reviewed-on: https://boringssl-review.googlesource.com/3563
Reviewed-by: Adam Langley <agl@google.com>
2015-02-21 06:54:29 +00:00
listener , err := net . ListenTCP ( "tcp4" , & net . TCPAddr { IP : net . IP { 127 , 0 , 0 , 1 } } )
if err != nil {
panic ( err )
}
defer func ( ) {
if listener != nil {
listener . Close ( )
}
} ( )
2014-06-20 20:00:00 +01:00
Use TCP sockets rather than socketpairs in the SSL tests.
This involves more synchronization with child exits as the kernel no longer
closes the pre-created pipes for free, but it works on Windows. As long as
TCP_NODELAY is set, the performance seems comparable. Though it does involve
dealing with graceful socket shutdown. I couldn't get that to work on Windows
without draining the socket; not even SO_LINGER worked. Current (untested)
theory is that Windows refuses to gracefully shutdown a socket if the peer
sends data after we've stopped reading.
cmd.ExtraFiles doesn't work on Windows; it doesn't use fds natively, so you
can't pass fds 4 and 5. (stdin/stdout/stderr are special slots in
CreateProcess.) We can instead use the syscall module directly and mark handles
as inheritable (and then pass the numerical values out-of-band), but that
requires synchronizing all of our shim.Start() calls and assuming no other
thread is spawning a process.
PROC_THREAD_ATTRIBUTE_HANDLE_LIST fixes threading problems, but requires
wrapping more syscalls. exec.Cmd also doesn't let us launch the process
ourselves. Plus it still requires every handle in the list be marked
inheritable, so it doesn't help if some other thread is launching a process
with bInheritHandles TRUE but NOT using PROC_THREAD_ATTRIBUTE_HANDLE_LIST.
(Like Go, though we can take syscall.ForkLock there.)
http://blogs.msdn.com/b/oldnewthing/archive/2011/12/16/10248328.aspx
The more natively Windows option seems to be named pipes, but that too requires
wrapping more system calls. (To be fair, that isn't too painful.) They also
involve a listening server, so we'd still have to synchronize with shim.Wait()
a la net.TCPListener.
Then there's DuplicateHandle, but then we need an out-of-band signal.
All in all, one cross-platform implementation with a TCP sockets seems
simplest.
Change-Id: I38233e309a0fa6814baf61e806732138902347c0
Reviewed-on: https://boringssl-review.googlesource.com/3563
Reviewed-by: Adam Langley <agl@google.com>
2015-02-21 06:54:29 +00:00
flags := [ ] string { "-port" , strconv . Itoa ( listener . Addr ( ) . ( * net . TCPAddr ) . Port ) }
2014-07-23 00:20:02 +01:00
if test . testType == serverTest {
2014-08-12 00:51:50 +01:00
flags = append ( flags , "-server" )
2014-07-02 00:53:04 +01:00
flags = append ( flags , "-key-file" )
if test . keyFile == "" {
2015-06-15 23:35:05 +01:00
flags = append ( flags , path . Join ( * resourceDir , rsaKeyFile ) )
2014-07-02 00:53:04 +01:00
} else {
2015-06-15 23:35:05 +01:00
flags = append ( flags , path . Join ( * resourceDir , test . keyFile ) )
2014-07-02 00:53:04 +01:00
}
flags = append ( flags , "-cert-file" )
if test . certFile == "" {
2015-06-15 23:35:05 +01:00
flags = append ( flags , path . Join ( * resourceDir , rsaCertificateFile ) )
2014-07-02 00:53:04 +01:00
} else {
2015-06-15 23:35:05 +01:00
flags = append ( flags , path . Join ( * resourceDir , test . certFile ) )
2014-07-02 00:53:04 +01:00
}
}
2014-08-12 00:51:50 +01:00
2014-08-11 23:43:38 +01:00
if test . protocol == dtls {
flags = append ( flags , "-dtls" )
}
2014-08-12 00:51:50 +01:00
if test . resumeSession {
flags = append ( flags , "-resume" )
}
2014-08-24 08:47:07 +01:00
if test . shimWritesFirst {
flags = append ( flags , "-shim-writes-first" )
}
2015-04-03 09:06:36 +01:00
if test . exportKeyingMaterial > 0 {
flags = append ( flags , "-export-keying-material" , strconv . Itoa ( test . exportKeyingMaterial ) )
flags = append ( flags , "-export-label" , test . exportLabel )
flags = append ( flags , "-export-context" , test . exportContext )
if test . useExportContext {
flags = append ( flags , "-use-export-context" )
}
}
2015-06-02 18:47:39 +01:00
if test . expectResumeRejected {
flags = append ( flags , "-expect-session-miss" )
}
2015-04-03 09:06:36 +01:00
2015-06-03 17:57:23 +01:00
if test . testTLSUnique {
flags = append ( flags , "-tls-unique" )
}
2014-07-02 00:53:04 +01:00
flags = append ( flags , test . flags ... )
var shim * exec . Cmd
2014-06-20 20:00:00 +01:00
if * useValgrind {
2015-06-15 23:35:05 +01:00
shim = valgrindOf ( false , shimPath , flags ... )
2014-10-11 00:23:43 +01:00
} else if * useGDB {
2015-06-15 23:35:05 +01:00
shim = gdbOf ( shimPath , flags ... )
2014-06-20 20:00:00 +01:00
} else {
2015-06-15 23:35:05 +01:00
shim = exec . Command ( shimPath , flags ... )
2014-06-20 20:00:00 +01:00
}
2014-07-02 00:53:04 +01:00
shim . Stdin = os . Stdin
2014-06-20 20:00:00 +01:00
var stdoutBuf , stderrBuf bytes . Buffer
2014-07-02 00:53:04 +01:00
shim . Stdout = & stdoutBuf
shim . Stderr = & stderrBuf
2014-11-18 01:26:55 +00:00
if mallocNumToFail >= 0 {
2015-02-09 18:13:09 +00:00
shim . Env = os . Environ ( )
shim . Env = append ( shim . Env , "MALLOC_NUMBER_TO_FAIL=" + strconv . FormatInt ( mallocNumToFail , 10 ) )
2014-11-18 01:26:55 +00:00
if * mallocTestDebug {
2015-06-12 23:23:47 +01:00
shim . Env = append ( shim . Env , "MALLOC_BREAK_ON_FAIL=1" )
2014-11-18 01:26:55 +00:00
}
shim . Env = append ( shim . Env , "_MALLOC_CHECK=1" )
}
2014-06-20 20:00:00 +01:00
2014-07-02 00:53:04 +01:00
if err := shim . Start ( ) ; err != nil {
2014-06-20 20:00:00 +01:00
panic ( err )
}
Use TCP sockets rather than socketpairs in the SSL tests.
This involves more synchronization with child exits as the kernel no longer
closes the pre-created pipes for free, but it works on Windows. As long as
TCP_NODELAY is set, the performance seems comparable. Though it does involve
dealing with graceful socket shutdown. I couldn't get that to work on Windows
without draining the socket; not even SO_LINGER worked. Current (untested)
theory is that Windows refuses to gracefully shutdown a socket if the peer
sends data after we've stopped reading.
cmd.ExtraFiles doesn't work on Windows; it doesn't use fds natively, so you
can't pass fds 4 and 5. (stdin/stdout/stderr are special slots in
CreateProcess.) We can instead use the syscall module directly and mark handles
as inheritable (and then pass the numerical values out-of-band), but that
requires synchronizing all of our shim.Start() calls and assuming no other
thread is spawning a process.
PROC_THREAD_ATTRIBUTE_HANDLE_LIST fixes threading problems, but requires
wrapping more syscalls. exec.Cmd also doesn't let us launch the process
ourselves. Plus it still requires every handle in the list be marked
inheritable, so it doesn't help if some other thread is launching a process
with bInheritHandles TRUE but NOT using PROC_THREAD_ATTRIBUTE_HANDLE_LIST.
(Like Go, though we can take syscall.ForkLock there.)
http://blogs.msdn.com/b/oldnewthing/archive/2011/12/16/10248328.aspx
The more natively Windows option seems to be named pipes, but that too requires
wrapping more system calls. (To be fair, that isn't too painful.) They also
involve a listening server, so we'd still have to synchronize with shim.Wait()
a la net.TCPListener.
Then there's DuplicateHandle, but then we need an out-of-band signal.
All in all, one cross-platform implementation with a TCP sockets seems
simplest.
Change-Id: I38233e309a0fa6814baf61e806732138902347c0
Reviewed-on: https://boringssl-review.googlesource.com/3563
Reviewed-by: Adam Langley <agl@google.com>
2015-02-21 06:54:29 +00:00
waitChan := make ( chan error , 1 )
go func ( ) { waitChan <- shim . Wait ( ) } ( )
2014-06-20 20:00:00 +01:00
config := test . config
2015-06-18 23:36:15 +01:00
if ! test . noSessionCache {
config . ClientSessionCache = NewLRUClientSessionCache ( 1 )
config . ServerSessionCache = NewLRUServerSessionCache ( 1 )
}
2014-07-02 00:53:04 +01:00
if test . testType == clientTest {
if len ( config . Certificates ) == 0 {
config . Certificates = [ ] Certificate { getRSACertificate ( ) }
}
Use TCP sockets rather than socketpairs in the SSL tests.
This involves more synchronization with child exits as the kernel no longer
closes the pre-created pipes for free, but it works on Windows. As long as
TCP_NODELAY is set, the performance seems comparable. Though it does involve
dealing with graceful socket shutdown. I couldn't get that to work on Windows
without draining the socket; not even SO_LINGER worked. Current (untested)
theory is that Windows refuses to gracefully shutdown a socket if the peer
sends data after we've stopped reading.
cmd.ExtraFiles doesn't work on Windows; it doesn't use fds natively, so you
can't pass fds 4 and 5. (stdin/stdout/stderr are special slots in
CreateProcess.) We can instead use the syscall module directly and mark handles
as inheritable (and then pass the numerical values out-of-band), but that
requires synchronizing all of our shim.Start() calls and assuming no other
thread is spawning a process.
PROC_THREAD_ATTRIBUTE_HANDLE_LIST fixes threading problems, but requires
wrapping more syscalls. exec.Cmd also doesn't let us launch the process
ourselves. Plus it still requires every handle in the list be marked
inheritable, so it doesn't help if some other thread is launching a process
with bInheritHandles TRUE but NOT using PROC_THREAD_ATTRIBUTE_HANDLE_LIST.
(Like Go, though we can take syscall.ForkLock there.)
http://blogs.msdn.com/b/oldnewthing/archive/2011/12/16/10248328.aspx
The more natively Windows option seems to be named pipes, but that too requires
wrapping more system calls. (To be fair, that isn't too painful.) They also
involve a listening server, so we'd still have to synchronize with shim.Wait()
a la net.TCPListener.
Then there's DuplicateHandle, but then we need an out-of-band signal.
All in all, one cross-platform implementation with a TCP sockets seems
simplest.
Change-Id: I38233e309a0fa6814baf61e806732138902347c0
Reviewed-on: https://boringssl-review.googlesource.com/3563
Reviewed-by: Adam Langley <agl@google.com>
2015-02-21 06:54:29 +00:00
} else {
// Supply a ServerName to ensure a constant session cache key,
// rather than falling back to net.Conn.RemoteAddr.
if len ( config . ServerName ) == 0 {
config . ServerName = "test"
}
2014-07-02 00:53:04 +01:00
}
2014-06-20 20:00:00 +01:00
Use TCP sockets rather than socketpairs in the SSL tests.
This involves more synchronization with child exits as the kernel no longer
closes the pre-created pipes for free, but it works on Windows. As long as
TCP_NODELAY is set, the performance seems comparable. Though it does involve
dealing with graceful socket shutdown. I couldn't get that to work on Windows
without draining the socket; not even SO_LINGER worked. Current (untested)
theory is that Windows refuses to gracefully shutdown a socket if the peer
sends data after we've stopped reading.
cmd.ExtraFiles doesn't work on Windows; it doesn't use fds natively, so you
can't pass fds 4 and 5. (stdin/stdout/stderr are special slots in
CreateProcess.) We can instead use the syscall module directly and mark handles
as inheritable (and then pass the numerical values out-of-band), but that
requires synchronizing all of our shim.Start() calls and assuming no other
thread is spawning a process.
PROC_THREAD_ATTRIBUTE_HANDLE_LIST fixes threading problems, but requires
wrapping more syscalls. exec.Cmd also doesn't let us launch the process
ourselves. Plus it still requires every handle in the list be marked
inheritable, so it doesn't help if some other thread is launching a process
with bInheritHandles TRUE but NOT using PROC_THREAD_ATTRIBUTE_HANDLE_LIST.
(Like Go, though we can take syscall.ForkLock there.)
http://blogs.msdn.com/b/oldnewthing/archive/2011/12/16/10248328.aspx
The more natively Windows option seems to be named pipes, but that too requires
wrapping more system calls. (To be fair, that isn't too painful.) They also
involve a listening server, so we'd still have to synchronize with shim.Wait()
a la net.TCPListener.
Then there's DuplicateHandle, but then we need an out-of-band signal.
All in all, one cross-platform implementation with a TCP sockets seems
simplest.
Change-Id: I38233e309a0fa6814baf61e806732138902347c0
Reviewed-on: https://boringssl-review.googlesource.com/3563
Reviewed-by: Adam Langley <agl@google.com>
2015-02-21 06:54:29 +00:00
conn , err := acceptOrWait ( listener , waitChan )
if err == nil {
err = doExchange ( test , & config , conn , test . messageLen , false /* not a resumption */ )
conn . Close ( )
}
2014-11-23 08:01:00 +00:00
2014-07-23 00:20:02 +01:00
if err == nil && test . resumeSession {
2014-09-24 20:21:44 +01:00
var resumeConfig Config
if test . resumeConfig != nil {
resumeConfig = * test . resumeConfig
Use TCP sockets rather than socketpairs in the SSL tests.
This involves more synchronization with child exits as the kernel no longer
closes the pre-created pipes for free, but it works on Windows. As long as
TCP_NODELAY is set, the performance seems comparable. Though it does involve
dealing with graceful socket shutdown. I couldn't get that to work on Windows
without draining the socket; not even SO_LINGER worked. Current (untested)
theory is that Windows refuses to gracefully shutdown a socket if the peer
sends data after we've stopped reading.
cmd.ExtraFiles doesn't work on Windows; it doesn't use fds natively, so you
can't pass fds 4 and 5. (stdin/stdout/stderr are special slots in
CreateProcess.) We can instead use the syscall module directly and mark handles
as inheritable (and then pass the numerical values out-of-band), but that
requires synchronizing all of our shim.Start() calls and assuming no other
thread is spawning a process.
PROC_THREAD_ATTRIBUTE_HANDLE_LIST fixes threading problems, but requires
wrapping more syscalls. exec.Cmd also doesn't let us launch the process
ourselves. Plus it still requires every handle in the list be marked
inheritable, so it doesn't help if some other thread is launching a process
with bInheritHandles TRUE but NOT using PROC_THREAD_ATTRIBUTE_HANDLE_LIST.
(Like Go, though we can take syscall.ForkLock there.)
http://blogs.msdn.com/b/oldnewthing/archive/2011/12/16/10248328.aspx
The more natively Windows option seems to be named pipes, but that too requires
wrapping more system calls. (To be fair, that isn't too painful.) They also
involve a listening server, so we'd still have to synchronize with shim.Wait()
a la net.TCPListener.
Then there's DuplicateHandle, but then we need an out-of-band signal.
All in all, one cross-platform implementation with a TCP sockets seems
simplest.
Change-Id: I38233e309a0fa6814baf61e806732138902347c0
Reviewed-on: https://boringssl-review.googlesource.com/3563
Reviewed-by: Adam Langley <agl@google.com>
2015-02-21 06:54:29 +00:00
if len ( resumeConfig . ServerName ) == 0 {
resumeConfig . ServerName = config . ServerName
}
2014-09-24 20:21:44 +01:00
if len ( resumeConfig . Certificates ) == 0 {
resumeConfig . Certificates = [ ] Certificate { getRSACertificate ( ) }
}
2015-06-18 23:36:15 +01:00
if test . newSessionsOnResume {
if ! test . noSessionCache {
resumeConfig . ClientSessionCache = NewLRUClientSessionCache ( 1 )
resumeConfig . ServerSessionCache = NewLRUServerSessionCache ( 1 )
}
} else {
2014-11-17 08:19:02 +00:00
resumeConfig . SessionTicketKey = config . SessionTicketKey
resumeConfig . ClientSessionCache = config . ClientSessionCache
resumeConfig . ServerSessionCache = config . ServerSessionCache
}
2014-09-24 20:21:44 +01:00
} else {
resumeConfig = config
}
Use TCP sockets rather than socketpairs in the SSL tests.
This involves more synchronization with child exits as the kernel no longer
closes the pre-created pipes for free, but it works on Windows. As long as
TCP_NODELAY is set, the performance seems comparable. Though it does involve
dealing with graceful socket shutdown. I couldn't get that to work on Windows
without draining the socket; not even SO_LINGER worked. Current (untested)
theory is that Windows refuses to gracefully shutdown a socket if the peer
sends data after we've stopped reading.
cmd.ExtraFiles doesn't work on Windows; it doesn't use fds natively, so you
can't pass fds 4 and 5. (stdin/stdout/stderr are special slots in
CreateProcess.) We can instead use the syscall module directly and mark handles
as inheritable (and then pass the numerical values out-of-band), but that
requires synchronizing all of our shim.Start() calls and assuming no other
thread is spawning a process.
PROC_THREAD_ATTRIBUTE_HANDLE_LIST fixes threading problems, but requires
wrapping more syscalls. exec.Cmd also doesn't let us launch the process
ourselves. Plus it still requires every handle in the list be marked
inheritable, so it doesn't help if some other thread is launching a process
with bInheritHandles TRUE but NOT using PROC_THREAD_ATTRIBUTE_HANDLE_LIST.
(Like Go, though we can take syscall.ForkLock there.)
http://blogs.msdn.com/b/oldnewthing/archive/2011/12/16/10248328.aspx
The more natively Windows option seems to be named pipes, but that too requires
wrapping more system calls. (To be fair, that isn't too painful.) They also
involve a listening server, so we'd still have to synchronize with shim.Wait()
a la net.TCPListener.
Then there's DuplicateHandle, but then we need an out-of-band signal.
All in all, one cross-platform implementation with a TCP sockets seems
simplest.
Change-Id: I38233e309a0fa6814baf61e806732138902347c0
Reviewed-on: https://boringssl-review.googlesource.com/3563
Reviewed-by: Adam Langley <agl@google.com>
2015-02-21 06:54:29 +00:00
var connResume net . Conn
connResume , err = acceptOrWait ( listener , waitChan )
if err == nil {
err = doExchange ( test , & resumeConfig , connResume , test . messageLen , true /* resumption */ )
connResume . Close ( )
}
2014-07-23 00:20:02 +01:00
}
Use TCP sockets rather than socketpairs in the SSL tests.
This involves more synchronization with child exits as the kernel no longer
closes the pre-created pipes for free, but it works on Windows. As long as
TCP_NODELAY is set, the performance seems comparable. Though it does involve
dealing with graceful socket shutdown. I couldn't get that to work on Windows
without draining the socket; not even SO_LINGER worked. Current (untested)
theory is that Windows refuses to gracefully shutdown a socket if the peer
sends data after we've stopped reading.
cmd.ExtraFiles doesn't work on Windows; it doesn't use fds natively, so you
can't pass fds 4 and 5. (stdin/stdout/stderr are special slots in
CreateProcess.) We can instead use the syscall module directly and mark handles
as inheritable (and then pass the numerical values out-of-band), but that
requires synchronizing all of our shim.Start() calls and assuming no other
thread is spawning a process.
PROC_THREAD_ATTRIBUTE_HANDLE_LIST fixes threading problems, but requires
wrapping more syscalls. exec.Cmd also doesn't let us launch the process
ourselves. Plus it still requires every handle in the list be marked
inheritable, so it doesn't help if some other thread is launching a process
with bInheritHandles TRUE but NOT using PROC_THREAD_ATTRIBUTE_HANDLE_LIST.
(Like Go, though we can take syscall.ForkLock there.)
http://blogs.msdn.com/b/oldnewthing/archive/2011/12/16/10248328.aspx
The more natively Windows option seems to be named pipes, but that too requires
wrapping more system calls. (To be fair, that isn't too painful.) They also
involve a listening server, so we'd still have to synchronize with shim.Wait()
a la net.TCPListener.
Then there's DuplicateHandle, but then we need an out-of-band signal.
All in all, one cross-platform implementation with a TCP sockets seems
simplest.
Change-Id: I38233e309a0fa6814baf61e806732138902347c0
Reviewed-on: https://boringssl-review.googlesource.com/3563
Reviewed-by: Adam Langley <agl@google.com>
2015-02-21 06:54:29 +00:00
// Close the listener now. This is to avoid hangs should the shim try to
// open more connections than expected.
listener . Close ( )
listener = nil
childErr := <- waitChan
2014-11-18 01:26:55 +00:00
if exitError , ok := childErr . ( * exec . ExitError ) ; ok {
if exitError . Sys ( ) . ( syscall . WaitStatus ) . ExitStatus ( ) == 88 {
return errMoreMallocs
}
}
2014-06-20 20:00:00 +01:00
stdout := string ( stdoutBuf . Bytes ( ) )
stderr := string ( stderrBuf . Bytes ( ) )
failed := err != nil || childErr != nil
2015-04-03 09:06:36 +01:00
correctFailure := len ( test . expectedError ) == 0 || strings . Contains ( stderr , test . expectedError )
2014-06-23 20:03:11 +01:00
localError := "none"
if err != nil {
localError = err . Error ( )
}
if len ( test . expectedLocalError ) != 0 {
correctFailure = correctFailure && strings . Contains ( localError , test . expectedLocalError )
}
2014-06-20 20:00:00 +01:00
if failed != test . shouldFail || failed && ! correctFailure {
childError := "none"
if childErr != nil {
childError = childErr . Error ( )
}
var msg string
switch {
case failed && ! test . shouldFail :
msg = "unexpected failure"
case ! failed && test . shouldFail :
msg = "unexpected success"
case failed && ! correctFailure :
2014-06-23 20:03:11 +01:00
msg = "bad error (wanted '" + test . expectedError + "' / '" + test . expectedLocalError + "')"
2014-06-20 20:00:00 +01:00
default :
panic ( "internal error" )
}
2015-04-03 09:06:36 +01:00
return fmt . Errorf ( "%s: local error '%s', child error '%s', stdout:\n%s\nstderr:\n%s" , msg , localError , childError , stdout , stderr )
2014-06-20 20:00:00 +01:00
}
2015-04-03 09:06:36 +01:00
if ! * useValgrind && ! failed && len ( stderr ) > 0 {
2014-06-20 20:00:00 +01:00
println ( stderr )
}
return nil
}
var tlsVersions = [ ] struct {
name string
version uint16
2014-08-07 22:44:24 +01:00
flag string
2014-11-23 07:47:52 +00:00
hasDTLS bool
2014-06-20 20:00:00 +01:00
} {
2014-11-23 07:47:52 +00:00
{ "SSL3" , VersionSSL30 , "-no-ssl3" , false } ,
{ "TLS1" , VersionTLS10 , "-no-tls1" , true } ,
{ "TLS11" , VersionTLS11 , "-no-tls11" , false } ,
{ "TLS12" , VersionTLS12 , "-no-tls12" , true } ,
2014-06-20 20:00:00 +01:00
}
var testCipherSuites = [ ] struct {
name string
id uint16
} {
{ "3DES-SHA" , TLS_RSA_WITH_3DES_EDE_CBC_SHA } ,
2014-08-02 22:35:45 +01:00
{ "AES128-GCM" , TLS_RSA_WITH_AES_128_GCM_SHA256 } ,
2014-06-20 20:00:00 +01:00
{ "AES128-SHA" , TLS_RSA_WITH_AES_128_CBC_SHA } ,
2014-08-31 07:06:47 +01:00
{ "AES128-SHA256" , TLS_RSA_WITH_AES_128_CBC_SHA256 } ,
2014-08-02 22:35:45 +01:00
{ "AES256-GCM" , TLS_RSA_WITH_AES_256_GCM_SHA384 } ,
2014-06-20 20:00:00 +01:00
{ "AES256-SHA" , TLS_RSA_WITH_AES_256_CBC_SHA } ,
2014-08-31 07:06:47 +01:00
{ "AES256-SHA256" , TLS_RSA_WITH_AES_256_CBC_SHA256 } ,
2014-08-02 22:35:45 +01:00
{ "DHE-RSA-AES128-GCM" , TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 } ,
{ "DHE-RSA-AES128-SHA" , TLS_DHE_RSA_WITH_AES_128_CBC_SHA } ,
2014-08-31 07:06:47 +01:00
{ "DHE-RSA-AES128-SHA256" , TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 } ,
2014-08-02 22:35:45 +01:00
{ "DHE-RSA-AES256-GCM" , TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 } ,
{ "DHE-RSA-AES256-SHA" , TLS_DHE_RSA_WITH_AES_256_CBC_SHA } ,
2014-08-31 07:06:47 +01:00
{ "DHE-RSA-AES256-SHA256" , TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 } ,
2015-04-07 05:46:46 +01:00
{ "DHE-RSA-CHACHA20-POLY1305" , TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 } ,
2014-06-20 20:00:00 +01:00
{ "ECDHE-ECDSA-AES128-GCM" , TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 } ,
{ "ECDHE-ECDSA-AES128-SHA" , TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA } ,
2014-08-31 07:06:47 +01:00
{ "ECDHE-ECDSA-AES128-SHA256" , TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 } ,
{ "ECDHE-ECDSA-AES256-GCM" , TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 } ,
2014-06-20 20:00:00 +01:00
{ "ECDHE-ECDSA-AES256-SHA" , TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA } ,
2014-08-31 07:06:47 +01:00
{ "ECDHE-ECDSA-AES256-SHA384" , TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 } ,
2015-04-07 05:46:46 +01:00
{ "ECDHE-ECDSA-CHACHA20-POLY1305" , TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 } ,
2014-06-20 20:00:00 +01:00
{ "ECDHE-ECDSA-RC4-SHA" , TLS_ECDHE_ECDSA_WITH_RC4_128_SHA } ,
{ "ECDHE-RSA-AES128-GCM" , TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 } ,
{ "ECDHE-RSA-AES128-SHA" , TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA } ,
2014-08-31 07:06:47 +01:00
{ "ECDHE-RSA-AES128-SHA256" , TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 } ,
2014-08-02 22:35:45 +01:00
{ "ECDHE-RSA-AES256-GCM" , TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 } ,
2014-06-20 20:00:00 +01:00
{ "ECDHE-RSA-AES256-SHA" , TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA } ,
2014-08-31 07:06:47 +01:00
{ "ECDHE-RSA-AES256-SHA384" , TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 } ,
2015-04-07 05:46:46 +01:00
{ "ECDHE-RSA-CHACHA20-POLY1305" , TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 } ,
2014-06-20 20:00:00 +01:00
{ "ECDHE-RSA-RC4-SHA" , TLS_ECDHE_RSA_WITH_RC4_128_SHA } ,
2014-10-27 05:06:24 +00:00
{ "PSK-AES128-CBC-SHA" , TLS_PSK_WITH_AES_128_CBC_SHA } ,
{ "PSK-AES256-CBC-SHA" , TLS_PSK_WITH_AES_256_CBC_SHA } ,
2015-06-09 17:54:04 +01:00
{ "ECDHE-PSK-AES128-CBC-SHA" , TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA } ,
{ "ECDHE-PSK-AES256-CBC-SHA" , TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA } ,
2014-10-27 05:06:24 +00:00
{ "PSK-RC4-SHA" , TLS_PSK_WITH_RC4_128_SHA } ,
2014-06-20 20:00:00 +01:00
{ "RC4-MD5" , TLS_RSA_WITH_RC4_128_MD5 } ,
2014-08-02 22:35:45 +01:00
{ "RC4-SHA" , TLS_RSA_WITH_RC4_128_SHA } ,
2014-06-20 20:00:00 +01:00
}
2014-11-23 07:47:52 +00:00
func hasComponent ( suiteName , component string ) bool {
return strings . Contains ( "-" + suiteName + "-" , "-" + component + "-" )
}
2014-08-31 07:06:47 +01:00
func isTLS12Only ( suiteName string ) bool {
2014-11-23 07:47:52 +00:00
return hasComponent ( suiteName , "GCM" ) ||
hasComponent ( suiteName , "SHA256" ) ||
2015-04-07 05:46:46 +01:00
hasComponent ( suiteName , "SHA384" ) ||
hasComponent ( suiteName , "POLY1305" )
2014-11-23 07:47:52 +00:00
}
func isDTLSCipher ( suiteName string ) bool {
2014-12-23 16:16:01 +00:00
return ! hasComponent ( suiteName , "RC4" )
2014-08-31 07:06:47 +01:00
}
2015-05-15 01:38:50 +01:00
func bigFromHex ( hex string ) * big . Int {
ret , ok := new ( big . Int ) . SetString ( hex , 16 )
if ! ok {
panic ( "failed to parse hex number 0x" + hex )
}
return ret
}
2015-06-15 23:35:05 +01:00
func addBasicTests ( ) {
basicTests := [ ] testCase {
{
name : "BadRSASignature" ,
config : Config {
CipherSuites : [ ] uint16 { TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 } ,
Bugs : ProtocolBugs {
InvalidSKXSignature : true ,
} ,
} ,
shouldFail : true ,
expectedError : ":BAD_SIGNATURE:" ,
} ,
{
name : "BadECDSASignature" ,
config : Config {
CipherSuites : [ ] uint16 { TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 } ,
Bugs : ProtocolBugs {
InvalidSKXSignature : true ,
} ,
Certificates : [ ] Certificate { getECDSACertificate ( ) } ,
} ,
shouldFail : true ,
expectedError : ":BAD_SIGNATURE:" ,
} ,
{
name : "BadECDSACurve" ,
config : Config {
CipherSuites : [ ] uint16 { TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 } ,
Bugs : ProtocolBugs {
InvalidSKXCurve : true ,
} ,
Certificates : [ ] Certificate { getECDSACertificate ( ) } ,
} ,
shouldFail : true ,
expectedError : ":WRONG_CURVE:" ,
} ,
{
testType : serverTest ,
name : "BadRSAVersion" ,
config : Config {
CipherSuites : [ ] uint16 { TLS_RSA_WITH_RC4_128_SHA } ,
Bugs : ProtocolBugs {
RsaClientKeyExchangeVersion : VersionTLS11 ,
} ,
} ,
shouldFail : true ,
expectedError : ":DECRYPTION_FAILED_OR_BAD_RECORD_MAC:" ,
} ,
{
name : "NoFallbackSCSV" ,
config : Config {
Bugs : ProtocolBugs {
FailIfNotFallbackSCSV : true ,
} ,
} ,
shouldFail : true ,
expectedLocalError : "no fallback SCSV found" ,
} ,
{
name : "SendFallbackSCSV" ,
config : Config {
Bugs : ProtocolBugs {
FailIfNotFallbackSCSV : true ,
} ,
} ,
flags : [ ] string { "-fallback-scsv" } ,
} ,
{
name : "ClientCertificateTypes" ,
config : Config {
ClientAuth : RequestClientCert ,
ClientCertificateTypes : [ ] byte {
CertTypeDSSSign ,
CertTypeRSASign ,
CertTypeECDSASign ,
} ,
} ,
flags : [ ] string {
"-expect-certificate-types" ,
base64 . StdEncoding . EncodeToString ( [ ] byte {
CertTypeDSSSign ,
CertTypeRSASign ,
CertTypeECDSASign ,
} ) ,
} ,
} ,
{
name : "NoClientCertificate" ,
config : Config {
ClientAuth : RequireAnyClientCert ,
} ,
shouldFail : true ,
expectedLocalError : "client didn't provide a certificate" ,
} ,
{
name : "UnauthenticatedECDH" ,
config : Config {
CipherSuites : [ ] uint16 { TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 } ,
Bugs : ProtocolBugs {
UnauthenticatedECDH : true ,
} ,
} ,
shouldFail : true ,
expectedError : ":UNEXPECTED_MESSAGE:" ,
} ,
{
name : "SkipCertificateStatus" ,
config : Config {
CipherSuites : [ ] uint16 { TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 } ,
Bugs : ProtocolBugs {
SkipCertificateStatus : true ,
} ,
} ,
flags : [ ] string {
"-enable-ocsp-stapling" ,
} ,
} ,
{
name : "SkipServerKeyExchange" ,
config : Config {
CipherSuites : [ ] uint16 { TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 } ,
Bugs : ProtocolBugs {
SkipServerKeyExchange : true ,
} ,
} ,
shouldFail : true ,
expectedError : ":UNEXPECTED_MESSAGE:" ,
} ,
{
name : "SkipChangeCipherSpec-Client" ,
config : Config {
Bugs : ProtocolBugs {
SkipChangeCipherSpec : true ,
} ,
} ,
shouldFail : true ,
expectedError : ":HANDSHAKE_RECORD_BEFORE_CCS:" ,
} ,
{
testType : serverTest ,
name : "SkipChangeCipherSpec-Server" ,
config : Config {
Bugs : ProtocolBugs {
SkipChangeCipherSpec : true ,
} ,
} ,
shouldFail : true ,
expectedError : ":HANDSHAKE_RECORD_BEFORE_CCS:" ,
} ,
{
testType : serverTest ,
name : "SkipChangeCipherSpec-Server-NPN" ,
config : Config {
NextProtos : [ ] string { "bar" } ,
Bugs : ProtocolBugs {
SkipChangeCipherSpec : true ,
} ,
} ,
flags : [ ] string {
"-advertise-npn" , "\x03foo\x03bar\x03baz" ,
} ,
shouldFail : true ,
expectedError : ":HANDSHAKE_RECORD_BEFORE_CCS:" ,
} ,
{
name : "FragmentAcrossChangeCipherSpec-Client" ,
config : Config {
Bugs : ProtocolBugs {
FragmentAcrossChangeCipherSpec : true ,
} ,
} ,
shouldFail : true ,
expectedError : ":HANDSHAKE_RECORD_BEFORE_CCS:" ,
} ,
{
testType : serverTest ,
name : "FragmentAcrossChangeCipherSpec-Server" ,
config : Config {
Bugs : ProtocolBugs {
FragmentAcrossChangeCipherSpec : true ,
} ,
} ,
shouldFail : true ,
expectedError : ":HANDSHAKE_RECORD_BEFORE_CCS:" ,
} ,
{
testType : serverTest ,
name : "FragmentAcrossChangeCipherSpec-Server-NPN" ,
config : Config {
NextProtos : [ ] string { "bar" } ,
Bugs : ProtocolBugs {
FragmentAcrossChangeCipherSpec : true ,
} ,
} ,
flags : [ ] string {
"-advertise-npn" , "\x03foo\x03bar\x03baz" ,
} ,
shouldFail : true ,
expectedError : ":HANDSHAKE_RECORD_BEFORE_CCS:" ,
} ,
{
testType : serverTest ,
name : "Alert" ,
config : Config {
Bugs : ProtocolBugs {
SendSpuriousAlert : alertRecordOverflow ,
} ,
} ,
shouldFail : true ,
expectedError : ":TLSV1_ALERT_RECORD_OVERFLOW:" ,
} ,
{
protocol : dtls ,
testType : serverTest ,
name : "Alert-DTLS" ,
config : Config {
Bugs : ProtocolBugs {
SendSpuriousAlert : alertRecordOverflow ,
} ,
} ,
shouldFail : true ,
expectedError : ":TLSV1_ALERT_RECORD_OVERFLOW:" ,
} ,
{
testType : serverTest ,
name : "FragmentAlert" ,
config : Config {
Bugs : ProtocolBugs {
FragmentAlert : true ,
SendSpuriousAlert : alertRecordOverflow ,
} ,
} ,
shouldFail : true ,
expectedError : ":BAD_ALERT:" ,
} ,
{
protocol : dtls ,
testType : serverTest ,
name : "FragmentAlert-DTLS" ,
config : Config {
Bugs : ProtocolBugs {
FragmentAlert : true ,
SendSpuriousAlert : alertRecordOverflow ,
} ,
} ,
shouldFail : true ,
expectedError : ":BAD_ALERT:" ,
} ,
{
testType : serverTest ,
name : "EarlyChangeCipherSpec-server-1" ,
config : Config {
Bugs : ProtocolBugs {
EarlyChangeCipherSpec : 1 ,
} ,
} ,
shouldFail : true ,
expectedError : ":CCS_RECEIVED_EARLY:" ,
} ,
{
testType : serverTest ,
name : "EarlyChangeCipherSpec-server-2" ,
config : Config {
Bugs : ProtocolBugs {
EarlyChangeCipherSpec : 2 ,
} ,
} ,
shouldFail : true ,
expectedError : ":CCS_RECEIVED_EARLY:" ,
} ,
{
name : "SkipNewSessionTicket" ,
config : Config {
Bugs : ProtocolBugs {
SkipNewSessionTicket : true ,
} ,
} ,
shouldFail : true ,
expectedError : ":CCS_RECEIVED_EARLY:" ,
} ,
{
testType : serverTest ,
name : "FallbackSCSV" ,
config : Config {
MaxVersion : VersionTLS11 ,
Bugs : ProtocolBugs {
SendFallbackSCSV : true ,
} ,
} ,
shouldFail : true ,
expectedError : ":INAPPROPRIATE_FALLBACK:" ,
} ,
{
testType : serverTest ,
name : "FallbackSCSV-VersionMatch" ,
config : Config {
Bugs : ProtocolBugs {
SendFallbackSCSV : true ,
} ,
} ,
} ,
{
testType : serverTest ,
name : "FragmentedClientVersion" ,
config : Config {
Bugs : ProtocolBugs {
MaxHandshakeRecordLength : 1 ,
FragmentClientVersion : true ,
} ,
} ,
expectedVersion : VersionTLS12 ,
} ,
{
testType : serverTest ,
name : "MinorVersionTolerance" ,
config : Config {
Bugs : ProtocolBugs {
SendClientVersion : 0x03ff ,
} ,
} ,
expectedVersion : VersionTLS12 ,
} ,
{
testType : serverTest ,
name : "MajorVersionTolerance" ,
config : Config {
Bugs : ProtocolBugs {
SendClientVersion : 0x0400 ,
} ,
} ,
expectedVersion : VersionTLS12 ,
} ,
{
testType : serverTest ,
name : "VersionTooLow" ,
config : Config {
Bugs : ProtocolBugs {
SendClientVersion : 0x0200 ,
} ,
} ,
shouldFail : true ,
expectedError : ":UNSUPPORTED_PROTOCOL:" ,
} ,
{
testType : serverTest ,
name : "HttpGET" ,
sendPrefix : "GET / HTTP/1.0\n" ,
shouldFail : true ,
expectedError : ":HTTP_REQUEST:" ,
} ,
{
testType : serverTest ,
name : "HttpPOST" ,
sendPrefix : "POST / HTTP/1.0\n" ,
shouldFail : true ,
expectedError : ":HTTP_REQUEST:" ,
} ,
{
testType : serverTest ,
name : "HttpHEAD" ,
sendPrefix : "HEAD / HTTP/1.0\n" ,
shouldFail : true ,
expectedError : ":HTTP_REQUEST:" ,
} ,
{
testType : serverTest ,
name : "HttpPUT" ,
sendPrefix : "PUT / HTTP/1.0\n" ,
shouldFail : true ,
expectedError : ":HTTP_REQUEST:" ,
} ,
{
testType : serverTest ,
name : "HttpCONNECT" ,
sendPrefix : "CONNECT www.google.com:443 HTTP/1.0\n" ,
shouldFail : true ,
expectedError : ":HTTPS_PROXY_REQUEST:" ,
} ,
{
testType : serverTest ,
name : "Garbage" ,
sendPrefix : "blah" ,
shouldFail : true ,
expectedError : ":UNKNOWN_PROTOCOL:" ,
} ,
{
name : "SkipCipherVersionCheck" ,
config : Config {
CipherSuites : [ ] uint16 { TLS_RSA_WITH_AES_128_GCM_SHA256 } ,
MaxVersion : VersionTLS11 ,
Bugs : ProtocolBugs {
SkipCipherVersionCheck : true ,
} ,
} ,
shouldFail : true ,
expectedError : ":WRONG_CIPHER_RETURNED:" ,
} ,
{
name : "RSAEphemeralKey" ,
config : Config {
CipherSuites : [ ] uint16 { TLS_RSA_WITH_AES_128_CBC_SHA } ,
Bugs : ProtocolBugs {
RSAEphemeralKey : true ,
} ,
} ,
shouldFail : true ,
expectedError : ":UNEXPECTED_MESSAGE:" ,
} ,
{
name : "DisableEverything" ,
flags : [ ] string { "-no-tls12" , "-no-tls11" , "-no-tls1" , "-no-ssl3" } ,
shouldFail : true ,
expectedError : ":WRONG_SSL_VERSION:" ,
} ,
{
protocol : dtls ,
name : "DisableEverything-DTLS" ,
flags : [ ] string { "-no-tls12" , "-no-tls1" } ,
shouldFail : true ,
expectedError : ":WRONG_SSL_VERSION:" ,
} ,
{
name : "NoSharedCipher" ,
config : Config {
CipherSuites : [ ] uint16 { } ,
} ,
shouldFail : true ,
expectedError : ":HANDSHAKE_FAILURE_ON_CLIENT_HELLO:" ,
} ,
{
protocol : dtls ,
testType : serverTest ,
name : "MTU" ,
config : Config {
Bugs : ProtocolBugs {
MaxPacketLength : 256 ,
} ,
} ,
flags : [ ] string { "-mtu" , "256" } ,
} ,
{
protocol : dtls ,
testType : serverTest ,
name : "MTUExceeded" ,
config : Config {
Bugs : ProtocolBugs {
MaxPacketLength : 255 ,
} ,
} ,
flags : [ ] string { "-mtu" , "256" } ,
shouldFail : true ,
expectedLocalError : "dtls: exceeded maximum packet length" ,
} ,
{
name : "CertMismatchRSA" ,
config : Config {
CipherSuites : [ ] uint16 { TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 } ,
Certificates : [ ] Certificate { getECDSACertificate ( ) } ,
Bugs : ProtocolBugs {
SendCipherSuite : TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ,
} ,
} ,
shouldFail : true ,
expectedError : ":WRONG_CERTIFICATE_TYPE:" ,
} ,
{
name : "CertMismatchECDSA" ,
config : Config {
CipherSuites : [ ] uint16 { TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 } ,
Certificates : [ ] Certificate { getRSACertificate ( ) } ,
Bugs : ProtocolBugs {
SendCipherSuite : TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ,
} ,
} ,
shouldFail : true ,
expectedError : ":WRONG_CERTIFICATE_TYPE:" ,
} ,
{
name : "EmptyCertificateList" ,
config : Config {
CipherSuites : [ ] uint16 { TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 } ,
Bugs : ProtocolBugs {
EmptyCertificateList : true ,
} ,
} ,
shouldFail : true ,
expectedError : ":DECODE_ERROR:" ,
} ,
{
name : "TLSFatalBadPackets" ,
damageFirstWrite : true ,
shouldFail : true ,
expectedError : ":DECRYPTION_FAILED_OR_BAD_RECORD_MAC:" ,
} ,
{
protocol : dtls ,
name : "DTLSIgnoreBadPackets" ,
damageFirstWrite : true ,
} ,
{
protocol : dtls ,
name : "DTLSIgnoreBadPackets-Async" ,
damageFirstWrite : true ,
flags : [ ] string { "-async" } ,
} ,
{
name : "AppDataAfterChangeCipherSpec" ,
config : Config {
Bugs : ProtocolBugs {
AppDataAfterChangeCipherSpec : [ ] byte ( "TEST MESSAGE" ) ,
} ,
} ,
shouldFail : true ,
expectedError : ":DATA_BETWEEN_CCS_AND_FINISHED:" ,
} ,
{
protocol : dtls ,
name : "AppDataAfterChangeCipherSpec-DTLS" ,
config : Config {
Bugs : ProtocolBugs {
AppDataAfterChangeCipherSpec : [ ] byte ( "TEST MESSAGE" ) ,
} ,
} ,
// BoringSSL's DTLS implementation will drop the out-of-order
// application data.
} ,
{
name : "AlertAfterChangeCipherSpec" ,
config : Config {
Bugs : ProtocolBugs {
AlertAfterChangeCipherSpec : alertRecordOverflow ,
} ,
} ,
shouldFail : true ,
expectedError : ":TLSV1_ALERT_RECORD_OVERFLOW:" ,
} ,
{
protocol : dtls ,
name : "AlertAfterChangeCipherSpec-DTLS" ,
config : Config {
Bugs : ProtocolBugs {
AlertAfterChangeCipherSpec : alertRecordOverflow ,
} ,
} ,
shouldFail : true ,
expectedError : ":TLSV1_ALERT_RECORD_OVERFLOW:" ,
} ,
{
protocol : dtls ,
name : "ReorderHandshakeFragments-Small-DTLS" ,
config : Config {
Bugs : ProtocolBugs {
ReorderHandshakeFragments : true ,
// Small enough that every handshake message is
// fragmented.
MaxHandshakeRecordLength : 2 ,
} ,
} ,
} ,
{
protocol : dtls ,
name : "ReorderHandshakeFragments-Large-DTLS" ,
config : Config {
Bugs : ProtocolBugs {
ReorderHandshakeFragments : true ,
// Large enough that no handshake message is
// fragmented.
MaxHandshakeRecordLength : 2048 ,
} ,
} ,
} ,
{
protocol : dtls ,
name : "MixCompleteMessageWithFragments-DTLS" ,
config : Config {
Bugs : ProtocolBugs {
ReorderHandshakeFragments : true ,
MixCompleteMessageWithFragments : true ,
MaxHandshakeRecordLength : 2 ,
} ,
} ,
} ,
{
name : "SendInvalidRecordType" ,
config : Config {
Bugs : ProtocolBugs {
SendInvalidRecordType : true ,
} ,
} ,
shouldFail : true ,
expectedError : ":UNEXPECTED_RECORD:" ,
} ,
{
protocol : dtls ,
name : "SendInvalidRecordType-DTLS" ,
config : Config {
Bugs : ProtocolBugs {
SendInvalidRecordType : true ,
} ,
} ,
shouldFail : true ,
expectedError : ":UNEXPECTED_RECORD:" ,
} ,
{
name : "FalseStart-SkipServerSecondLeg" ,
config : Config {
CipherSuites : [ ] uint16 { TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 } ,
NextProtos : [ ] string { "foo" } ,
Bugs : ProtocolBugs {
SkipNewSessionTicket : true ,
SkipChangeCipherSpec : true ,
SkipFinished : true ,
ExpectFalseStart : true ,
} ,
} ,
flags : [ ] string {
"-false-start" ,
"-handshake-never-done" ,
"-advertise-alpn" , "\x03foo" ,
} ,
shimWritesFirst : true ,
shouldFail : true ,
expectedError : ":UNEXPECTED_RECORD:" ,
} ,
{
name : "FalseStart-SkipServerSecondLeg-Implicit" ,
config : Config {
CipherSuites : [ ] uint16 { TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 } ,
NextProtos : [ ] string { "foo" } ,
Bugs : ProtocolBugs {
SkipNewSessionTicket : true ,
SkipChangeCipherSpec : true ,
SkipFinished : true ,
} ,
} ,
flags : [ ] string {
"-implicit-handshake" ,
"-false-start" ,
"-handshake-never-done" ,
"-advertise-alpn" , "\x03foo" ,
} ,
shouldFail : true ,
expectedError : ":UNEXPECTED_RECORD:" ,
} ,
{
testType : serverTest ,
name : "FailEarlyCallback" ,
flags : [ ] string { "-fail-early-callback" } ,
shouldFail : true ,
expectedError : ":CONNECTION_REJECTED:" ,
expectedLocalError : "remote error: access denied" ,
} ,
{
name : "WrongMessageType" ,
config : Config {
Bugs : ProtocolBugs {
WrongCertificateMessageType : true ,
} ,
} ,
shouldFail : true ,
expectedError : ":UNEXPECTED_MESSAGE:" ,
expectedLocalError : "remote error: unexpected message" ,
} ,
{
protocol : dtls ,
name : "WrongMessageType-DTLS" ,
config : Config {
Bugs : ProtocolBugs {
WrongCertificateMessageType : true ,
} ,
} ,
shouldFail : true ,
expectedError : ":UNEXPECTED_MESSAGE:" ,
expectedLocalError : "remote error: unexpected message" ,
} ,
{
protocol : dtls ,
name : "FragmentMessageTypeMismatch-DTLS" ,
config : Config {
Bugs : ProtocolBugs {
MaxHandshakeRecordLength : 2 ,
FragmentMessageTypeMismatch : true ,
} ,
} ,
shouldFail : true ,
expectedError : ":FRAGMENT_MISMATCH:" ,
} ,
{
protocol : dtls ,
name : "FragmentMessageLengthMismatch-DTLS" ,
config : Config {
Bugs : ProtocolBugs {
MaxHandshakeRecordLength : 2 ,
FragmentMessageLengthMismatch : true ,
} ,
} ,
shouldFail : true ,
expectedError : ":FRAGMENT_MISMATCH:" ,
} ,
{
protocol : dtls ,
name : "SplitFragments-Header-DTLS" ,
config : Config {
Bugs : ProtocolBugs {
SplitFragments : 2 ,
} ,
} ,
shouldFail : true ,
expectedError : ":UNEXPECTED_MESSAGE:" ,
} ,
{
protocol : dtls ,
name : "SplitFragments-Boundary-DTLS" ,
config : Config {
Bugs : ProtocolBugs {
SplitFragments : dtlsRecordHeaderLen ,
} ,
} ,
shouldFail : true ,
expectedError : ":EXCESSIVE_MESSAGE_SIZE:" ,
} ,
{
protocol : dtls ,
name : "SplitFragments-Body-DTLS" ,
config : Config {
Bugs : ProtocolBugs {
SplitFragments : dtlsRecordHeaderLen + 1 ,
} ,
} ,
shouldFail : true ,
expectedError : ":EXCESSIVE_MESSAGE_SIZE:" ,
} ,
{
protocol : dtls ,
name : "SendEmptyFragments-DTLS" ,
config : Config {
Bugs : ProtocolBugs {
SendEmptyFragments : true ,
} ,
} ,
} ,
{
name : "UnsupportedCipherSuite" ,
config : Config {
CipherSuites : [ ] uint16 { TLS_RSA_WITH_RC4_128_SHA } ,
Bugs : ProtocolBugs {
IgnorePeerCipherPreferences : true ,
} ,
} ,
flags : [ ] string { "-cipher" , "DEFAULT:!RC4" } ,
shouldFail : true ,
expectedError : ":WRONG_CIPHER_RETURNED:" ,
} ,
{
name : "UnsupportedCurve" ,
config : Config {
CipherSuites : [ ] uint16 { TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 } ,
// BoringSSL implements P-224 but doesn't enable it by
// default.
CurvePreferences : [ ] CurveID { CurveP224 } ,
Bugs : ProtocolBugs {
IgnorePeerCurvePreferences : true ,
} ,
} ,
shouldFail : true ,
expectedError : ":WRONG_CURVE:" ,
} ,
{
name : "BadFinished" ,
config : Config {
Bugs : ProtocolBugs {
BadFinished : true ,
} ,
} ,
shouldFail : true ,
expectedError : ":DIGEST_CHECK_FAILED:" ,
} ,
{
name : "FalseStart-BadFinished" ,
config : Config {
CipherSuites : [ ] uint16 { TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 } ,
NextProtos : [ ] string { "foo" } ,
Bugs : ProtocolBugs {
BadFinished : true ,
ExpectFalseStart : true ,
} ,
} ,
flags : [ ] string {
"-false-start" ,
"-handshake-never-done" ,
"-advertise-alpn" , "\x03foo" ,
} ,
shimWritesFirst : true ,
shouldFail : true ,
expectedError : ":DIGEST_CHECK_FAILED:" ,
} ,
{
name : "NoFalseStart-NoALPN" ,
config : Config {
CipherSuites : [ ] uint16 { TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 } ,
Bugs : ProtocolBugs {
ExpectFalseStart : true ,
AlertBeforeFalseStartTest : alertAccessDenied ,
} ,
} ,
flags : [ ] string {
"-false-start" ,
} ,
shimWritesFirst : true ,
shouldFail : true ,
expectedError : ":TLSV1_ALERT_ACCESS_DENIED:" ,
expectedLocalError : "tls: peer did not false start: EOF" ,
} ,
{
name : "NoFalseStart-NoAEAD" ,
config : Config {
CipherSuites : [ ] uint16 { TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA } ,
NextProtos : [ ] string { "foo" } ,
Bugs : ProtocolBugs {
ExpectFalseStart : true ,
AlertBeforeFalseStartTest : alertAccessDenied ,
} ,
} ,
flags : [ ] string {
"-false-start" ,
"-advertise-alpn" , "\x03foo" ,
} ,
shimWritesFirst : true ,
shouldFail : true ,
expectedError : ":TLSV1_ALERT_ACCESS_DENIED:" ,
expectedLocalError : "tls: peer did not false start: EOF" ,
} ,
{
name : "NoFalseStart-RSA" ,
config : Config {
CipherSuites : [ ] uint16 { TLS_RSA_WITH_AES_128_GCM_SHA256 } ,
NextProtos : [ ] string { "foo" } ,
Bugs : ProtocolBugs {
ExpectFalseStart : true ,
AlertBeforeFalseStartTest : alertAccessDenied ,
} ,
} ,
flags : [ ] string {
"-false-start" ,
"-advertise-alpn" , "\x03foo" ,
} ,
shimWritesFirst : true ,
shouldFail : true ,
expectedError : ":TLSV1_ALERT_ACCESS_DENIED:" ,
expectedLocalError : "tls: peer did not false start: EOF" ,
} ,
{
name : "NoFalseStart-DHE_RSA" ,
config : Config {
CipherSuites : [ ] uint16 { TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 } ,
NextProtos : [ ] string { "foo" } ,
Bugs : ProtocolBugs {
ExpectFalseStart : true ,
AlertBeforeFalseStartTest : alertAccessDenied ,
} ,
} ,
flags : [ ] string {
"-false-start" ,
"-advertise-alpn" , "\x03foo" ,
} ,
shimWritesFirst : true ,
shouldFail : true ,
expectedError : ":TLSV1_ALERT_ACCESS_DENIED:" ,
expectedLocalError : "tls: peer did not false start: EOF" ,
} ,
{
testType : serverTest ,
name : "NoSupportedCurves" ,
config : Config {
CipherSuites : [ ] uint16 { TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 } ,
Bugs : ProtocolBugs {
NoSupportedCurves : true ,
} ,
} ,
} ,
{
testType : serverTest ,
name : "NoCommonCurves" ,
config : Config {
CipherSuites : [ ] uint16 {
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ,
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 ,
} ,
CurvePreferences : [ ] CurveID { CurveP224 } ,
} ,
expectedCipher : TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 ,
} ,
{
protocol : dtls ,
name : "SendSplitAlert-Sync" ,
config : Config {
Bugs : ProtocolBugs {
SendSplitAlert : true ,
} ,
} ,
} ,
{
protocol : dtls ,
name : "SendSplitAlert-Async" ,
config : Config {
Bugs : ProtocolBugs {
SendSplitAlert : true ,
} ,
} ,
flags : [ ] string { "-async" } ,
} ,
{
protocol : dtls ,
name : "PackDTLSHandshake" ,
config : Config {
Bugs : ProtocolBugs {
MaxHandshakeRecordLength : 2 ,
PackHandshakeFragments : 20 ,
PackHandshakeRecords : 200 ,
} ,
} ,
} ,
{
testType : serverTest ,
protocol : dtls ,
name : "NoRC4-DTLS" ,
config : Config {
CipherSuites : [ ] uint16 { TLS_ECDHE_RSA_WITH_RC4_128_SHA } ,
Bugs : ProtocolBugs {
EnableAllCiphersInDTLS : true ,
} ,
} ,
shouldFail : true ,
expectedError : ":NO_SHARED_CIPHER:" ,
} ,
{
name : "SendEmptyRecords-Pass" ,
sendEmptyRecords : 32 ,
} ,
{
name : "SendEmptyRecords" ,
sendEmptyRecords : 33 ,
shouldFail : true ,
expectedError : ":TOO_MANY_EMPTY_FRAGMENTS:" ,
} ,
{
name : "SendEmptyRecords-Async" ,
sendEmptyRecords : 33 ,
flags : [ ] string { "-async" } ,
shouldFail : true ,
expectedError : ":TOO_MANY_EMPTY_FRAGMENTS:" ,
} ,
{
name : "SendWarningAlerts-Pass" ,
sendWarningAlerts : 4 ,
} ,
{
protocol : dtls ,
name : "SendWarningAlerts-DTLS-Pass" ,
sendWarningAlerts : 4 ,
} ,
{
name : "SendWarningAlerts" ,
sendWarningAlerts : 5 ,
shouldFail : true ,
expectedError : ":TOO_MANY_WARNING_ALERTS:" ,
} ,
{
name : "SendWarningAlerts-Async" ,
sendWarningAlerts : 5 ,
flags : [ ] string { "-async" } ,
shouldFail : true ,
expectedError : ":TOO_MANY_WARNING_ALERTS:" ,
} ,
2015-06-18 23:36:15 +01:00
{
name : "EmptySessionID" ,
config : Config {
SessionTicketsDisabled : true ,
} ,
noSessionCache : true ,
flags : [ ] string { "-expect-no-session" } ,
} ,
2015-06-15 23:35:05 +01:00
}
testCases = append ( testCases , basicTests ... )
}
2014-06-20 20:00:00 +01:00
func addCipherSuiteTests ( ) {
for _ , suite := range testCipherSuites {
2014-10-27 05:06:24 +00:00
const psk = "12345"
const pskIdentity = "luggage combo"
2014-06-20 20:00:00 +01:00
var cert Certificate
2014-07-02 00:53:04 +01:00
var certFile string
var keyFile string
2014-11-23 07:47:52 +00:00
if hasComponent ( suite . name , "ECDSA" ) {
2014-06-20 20:00:00 +01:00
cert = getECDSACertificate ( )
2014-07-02 00:53:04 +01:00
certFile = ecdsaCertificateFile
keyFile = ecdsaKeyFile
2014-06-20 20:00:00 +01:00
} else {
cert = getRSACertificate ( )
2014-07-02 00:53:04 +01:00
certFile = rsaCertificateFile
keyFile = rsaKeyFile
2014-06-20 20:00:00 +01:00
}
2014-10-27 05:06:24 +00:00
var flags [ ] string
2014-11-23 07:47:52 +00:00
if hasComponent ( suite . name , "PSK" ) {
2014-10-27 05:06:24 +00:00
flags = append ( flags ,
"-psk" , psk ,
"-psk-identity" , pskIdentity )
}
2014-06-20 20:00:00 +01:00
for _ , ver := range tlsVersions {
2014-08-31 07:06:47 +01:00
if ver . version < VersionTLS12 && isTLS12Only ( suite . name ) {
2014-06-20 20:00:00 +01:00
continue
}
2014-07-02 00:53:04 +01:00
testCases = append ( testCases , testCase {
testType : clientTest ,
name : ver . name + "-" + suite . name + "-client" ,
2014-06-20 20:00:00 +01:00
config : Config {
2014-10-27 05:06:24 +00:00
MinVersion : ver . version ,
MaxVersion : ver . version ,
CipherSuites : [ ] uint16 { suite . id } ,
Certificates : [ ] Certificate { cert } ,
2015-05-05 01:20:48 +01:00
PreSharedKey : [ ] byte ( psk ) ,
2014-10-27 05:06:24 +00:00
PreSharedKeyIdentity : pskIdentity ,
2014-06-20 20:00:00 +01:00
} ,
2014-10-27 05:06:24 +00:00
flags : flags ,
2014-11-17 08:19:02 +00:00
resumeSession : true ,
2014-06-20 20:00:00 +01:00
} )
2014-07-02 00:53:04 +01:00
2014-08-14 21:25:34 +01:00
testCases = append ( testCases , testCase {
testType : serverTest ,
name : ver . name + "-" + suite . name + "-server" ,
config : Config {
2014-10-27 05:06:24 +00:00
MinVersion : ver . version ,
MaxVersion : ver . version ,
CipherSuites : [ ] uint16 { suite . id } ,
Certificates : [ ] Certificate { cert } ,
PreSharedKey : [ ] byte ( psk ) ,
PreSharedKeyIdentity : pskIdentity ,
2014-08-14 21:25:34 +01:00
} ,
certFile : certFile ,
keyFile : keyFile ,
2014-10-27 05:06:24 +00:00
flags : flags ,
2014-11-17 08:19:02 +00:00
resumeSession : true ,
2014-08-14 21:25:34 +01:00
} )
2014-08-11 23:43:38 +01:00
2014-11-23 07:47:52 +00:00
if ver . hasDTLS && isDTLSCipher ( suite . name ) {
2014-08-11 23:43:38 +01:00
testCases = append ( testCases , testCase {
testType : clientTest ,
protocol : dtls ,
name : "D" + ver . name + "-" + suite . name + "-client" ,
config : Config {
2014-10-27 05:06:24 +00:00
MinVersion : ver . version ,
MaxVersion : ver . version ,
CipherSuites : [ ] uint16 { suite . id } ,
Certificates : [ ] Certificate { cert } ,
PreSharedKey : [ ] byte ( psk ) ,
PreSharedKeyIdentity : pskIdentity ,
2014-08-11 23:43:38 +01:00
} ,
2014-10-27 05:06:24 +00:00
flags : flags ,
2014-11-17 08:19:02 +00:00
resumeSession : true ,
2014-08-11 23:43:38 +01:00
} )
testCases = append ( testCases , testCase {
testType : serverTest ,
protocol : dtls ,
name : "D" + ver . name + "-" + suite . name + "-server" ,
config : Config {
2014-10-27 05:06:24 +00:00
MinVersion : ver . version ,
MaxVersion : ver . version ,
CipherSuites : [ ] uint16 { suite . id } ,
Certificates : [ ] Certificate { cert } ,
PreSharedKey : [ ] byte ( psk ) ,
PreSharedKeyIdentity : pskIdentity ,
2014-08-11 23:43:38 +01:00
} ,
certFile : certFile ,
keyFile : keyFile ,
2014-10-27 05:06:24 +00:00
flags : flags ,
2014-11-17 08:19:02 +00:00
resumeSession : true ,
2014-08-11 23:43:38 +01:00
} )
}
2014-06-20 20:00:00 +01:00
}
}
2015-05-15 01:38:50 +01:00
testCases = append ( testCases , testCase {
name : "WeakDH" ,
config : Config {
CipherSuites : [ ] uint16 { TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 } ,
Bugs : ProtocolBugs {
// This is a 1023-bit prime number, generated
// with:
// openssl gendh 1023 | openssl asn1parse -i
DHGroupPrime : bigFromHex ( "518E9B7930CE61C6E445C8360584E5FC78D9137C0FFDC880B495D5338ADF7689951A6821C17A76B3ACB8E0156AEA607B7EC406EBEDBB84D8376EB8FE8F8BA1433488BEE0C3EDDFD3A32DBB9481980A7AF6C96BFCF490A094CFFB2B8192C1BB5510B77B658436E27C2D4D023FE3718222AB0CA1273995B51F6D625A4944D0DD4B" ) ,
} ,
} ,
shouldFail : true ,
expectedError : "BAD_DH_P_LENGTH" ,
} )
2014-06-20 20:00:00 +01:00
}
func addBadECDSASignatureTests ( ) {
for badR := BadValue ( 1 ) ; badR < NumBadValues ; badR ++ {
for badS := BadValue ( 1 ) ; badS < NumBadValues ; badS ++ {
2014-07-02 00:53:04 +01:00
testCases = append ( testCases , testCase {
2014-06-20 20:00:00 +01:00
name : fmt . Sprintf ( "BadECDSA-%d-%d" , badR , badS ) ,
config : Config {
CipherSuites : [ ] uint16 { TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 } ,
Certificates : [ ] Certificate { getECDSACertificate ( ) } ,
Bugs : ProtocolBugs {
BadECDSAR : badR ,
BadECDSAS : badS ,
} ,
} ,
shouldFail : true ,
expectedError : "SIGNATURE" ,
} )
}
}
}
2014-06-20 20:00:00 +01:00
func addCBCPaddingTests ( ) {
2014-07-02 00:53:04 +01:00
testCases = append ( testCases , testCase {
2014-06-20 20:00:00 +01:00
name : "MaxCBCPadding" ,
config : Config {
CipherSuites : [ ] uint16 { TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA } ,
Bugs : ProtocolBugs {
MaxPadding : true ,
} ,
} ,
messageLen : 12 , // 20 bytes of SHA-1 + 12 == 0 % block size
} )
2014-07-02 00:53:04 +01:00
testCases = append ( testCases , testCase {
2014-06-20 20:00:00 +01:00
name : "BadCBCPadding" ,
config : Config {
CipherSuites : [ ] uint16 { TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA } ,
Bugs : ProtocolBugs {
PaddingFirstByteBad : true ,
} ,
} ,
shouldFail : true ,
expectedError : "DECRYPTION_FAILED_OR_BAD_RECORD_MAC" ,
} )
// OpenSSL previously had an issue where the first byte of padding in
// 255 bytes of padding wasn't checked.
2014-07-02 00:53:04 +01:00
testCases = append ( testCases , testCase {
2014-06-20 20:00:00 +01:00
name : "BadCBCPadding255" ,
config : Config {
CipherSuites : [ ] uint16 { TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA } ,
Bugs : ProtocolBugs {
MaxPadding : true ,
PaddingFirstByteBadIf255 : true ,
} ,
} ,
messageLen : 12 , // 20 bytes of SHA-1 + 12 == 0 % block size
shouldFail : true ,
expectedError : "DECRYPTION_FAILED_OR_BAD_RECORD_MAC" ,
} )
}
2014-08-05 23:23:37 +01:00
func addCBCSplittingTests ( ) {
testCases = append ( testCases , testCase {
name : "CBCRecordSplitting" ,
config : Config {
MaxVersion : VersionTLS10 ,
MinVersion : VersionTLS10 ,
CipherSuites : [ ] uint16 { TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA } ,
} ,
messageLen : - 1 , // read until EOF
flags : [ ] string {
"-async" ,
"-write-different-record-sizes" ,
"-cbc-record-splitting" ,
} ,
2014-08-07 03:11:10 +01:00
} )
testCases = append ( testCases , testCase {
2014-08-05 23:23:37 +01:00
name : "CBCRecordSplittingPartialWrite" ,
config : Config {
MaxVersion : VersionTLS10 ,
MinVersion : VersionTLS10 ,
CipherSuites : [ ] uint16 { TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA } ,
} ,
messageLen : - 1 , // read until EOF
flags : [ ] string {
"-async" ,
"-write-different-record-sizes" ,
"-cbc-record-splitting" ,
"-partial-write" ,
} ,
} )
}
2014-07-08 22:59:18 +01:00
func addClientAuthTests ( ) {
2014-07-16 17:58:59 +01:00
// Add a dummy cert pool to stress certificate authority parsing.
// TODO(davidben): Add tests that those values parse out correctly.
certPool := x509 . NewCertPool ( )
cert , err := x509 . ParseCertificate ( rsaCertificate . Certificate [ 0 ] )
if err != nil {
panic ( err )
}
certPool . AddCert ( cert )
2014-07-08 22:59:18 +01:00
for _ , ver := range tlsVersions {
testCases = append ( testCases , testCase {
testType : clientTest ,
2014-07-12 20:47:52 +01:00
name : ver . name + "-Client-ClientAuth-RSA" ,
2014-07-08 22:59:18 +01:00
config : Config {
2014-08-28 04:13:20 +01:00
MinVersion : ver . version ,
MaxVersion : ver . version ,
ClientAuth : RequireAnyClientCert ,
ClientCAs : certPool ,
2014-07-08 22:59:18 +01:00
} ,
flags : [ ] string {
2015-06-15 23:35:05 +01:00
"-cert-file" , path . Join ( * resourceDir , rsaCertificateFile ) ,
"-key-file" , path . Join ( * resourceDir , rsaKeyFile ) ,
2014-07-08 22:59:18 +01:00
} ,
} )
2014-07-12 20:47:52 +01:00
testCases = append ( testCases , testCase {
testType : serverTest ,
name : ver . name + "-Server-ClientAuth-RSA" ,
config : Config {
2014-08-28 04:13:20 +01:00
MinVersion : ver . version ,
MaxVersion : ver . version ,
2014-07-12 20:47:52 +01:00
Certificates : [ ] Certificate { rsaCertificate } ,
} ,
flags : [ ] string { "-require-any-client-certificate" } ,
} )
2014-08-28 04:13:20 +01:00
if ver . version != VersionSSL30 {
testCases = append ( testCases , testCase {
testType : serverTest ,
name : ver . name + "-Server-ClientAuth-ECDSA" ,
config : Config {
MinVersion : ver . version ,
MaxVersion : ver . version ,
Certificates : [ ] Certificate { ecdsaCertificate } ,
} ,
flags : [ ] string { "-require-any-client-certificate" } ,
} )
testCases = append ( testCases , testCase {
testType : clientTest ,
name : ver . name + "-Client-ClientAuth-ECDSA" ,
config : Config {
MinVersion : ver . version ,
MaxVersion : ver . version ,
ClientAuth : RequireAnyClientCert ,
ClientCAs : certPool ,
} ,
flags : [ ] string {
2015-06-15 23:35:05 +01:00
"-cert-file" , path . Join ( * resourceDir , ecdsaCertificateFile ) ,
"-key-file" , path . Join ( * resourceDir , ecdsaKeyFile ) ,
2014-08-28 04:13:20 +01:00
} ,
} )
}
2014-07-08 22:59:18 +01:00
}
}
2014-10-11 00:23:43 +01:00
func addExtendedMasterSecretTests ( ) {
const expectEMSFlag = "-expect-extended-master-secret"
for _ , with := range [ ] bool { false , true } {
prefix := "No"
var flags [ ] string
if with {
prefix = ""
flags = [ ] string { expectEMSFlag }
}
for _ , isClient := range [ ] bool { false , true } {
suffix := "-Server"
testType := serverTest
if isClient {
suffix = "-Client"
testType = clientTest
}
for _ , ver := range tlsVersions {
test := testCase {
testType : testType ,
name : prefix + "ExtendedMasterSecret-" + ver . name + suffix ,
config : Config {
MinVersion : ver . version ,
MaxVersion : ver . version ,
Bugs : ProtocolBugs {
NoExtendedMasterSecret : ! with ,
RequireExtendedMasterSecret : with ,
} ,
} ,
2014-10-27 05:06:24 +00:00
flags : flags ,
shouldFail : ver . version == VersionSSL30 && with ,
2014-10-11 00:23:43 +01:00
}
if test . shouldFail {
test . expectedLocalError = "extended master secret required but not supported by peer"
}
testCases = append ( testCases , test )
}
}
}
2015-06-02 18:50:35 +01:00
for _ , isClient := range [ ] bool { false , true } {
for _ , supportedInFirstConnection := range [ ] bool { false , true } {
for _ , supportedInResumeConnection := range [ ] bool { false , true } {
boolToWord := func ( b bool ) string {
if b {
return "Yes"
}
return "No"
}
suffix := boolToWord ( supportedInFirstConnection ) + "To" + boolToWord ( supportedInResumeConnection ) + "-"
if isClient {
suffix += "Client"
} else {
suffix += "Server"
}
supportedConfig := Config {
Bugs : ProtocolBugs {
RequireExtendedMasterSecret : true ,
} ,
}
noSupportConfig := Config {
Bugs : ProtocolBugs {
NoExtendedMasterSecret : true ,
} ,
}
test := testCase {
name : "ExtendedMasterSecret-" + suffix ,
resumeSession : true ,
}
if ! isClient {
test . testType = serverTest
}
if supportedInFirstConnection {
test . config = supportedConfig
} else {
test . config = noSupportConfig
}
if supportedInResumeConnection {
test . resumeConfig = & supportedConfig
} else {
test . resumeConfig = & noSupportConfig
}
switch suffix {
case "YesToYes-Client" , "YesToYes-Server" :
// When a session is resumed, it should
// still be aware that its master
// secret was generated via EMS and
// thus it's safe to use tls-unique.
test . flags = [ ] string { expectEMSFlag }
case "NoToYes-Server" :
// If an original connection did not
// contain EMS, but a resumption
// handshake does, then a server should
// not resume the session.
test . expectResumeRejected = true
case "YesToNo-Server" :
// Resuming an EMS session without the
// EMS extension should cause the
// server to abort the connection.
test . shouldFail = true
test . expectedError = ":RESUMED_EMS_SESSION_WITHOUT_EMS_EXTENSION:"
case "NoToYes-Client" :
// A client should abort a connection
// where the server resumed a non-EMS
// session but echoed the EMS
// extension.
test . shouldFail = true
test . expectedError = ":RESUMED_NON_EMS_SESSION_WITH_EMS_EXTENSION:"
case "YesToNo-Client" :
// A client should abort a connection
// where the server didn't echo EMS
// when the session used it.
test . shouldFail = true
test . expectedError = ":RESUMED_EMS_SESSION_WITHOUT_EMS_EXTENSION:"
}
testCases = append ( testCases , test )
}
}
}
2014-10-11 00:23:43 +01:00
}
2014-08-05 07:28:57 +01:00
// Adds tests that try to cover the range of the handshake state machine, under
// various conditions. Some of these are redundant with other tests, but they
// only cover the synchronous case.
2014-08-11 23:43:38 +01:00
func addStateMachineCoverageTests ( async , splitHandshake bool , protocol protocol ) {
2015-05-16 04:33:48 +01:00
var tests [ ] testCase
2014-08-05 07:28:57 +01:00
2014-11-17 08:19:02 +00:00
// Basic handshake, with resumption. Client and server,
// session ID and session ticket.
2015-05-16 04:33:48 +01:00
tests = append ( tests , testCase {
name : "Basic-Client" ,
2014-08-08 00:13:38 +01:00
resumeSession : true ,
} )
2015-05-16 04:33:48 +01:00
tests = append ( tests , testCase {
name : "Basic-Client-RenewTicket" ,
2014-08-08 00:13:38 +01:00
config : Config {
Bugs : ProtocolBugs {
2015-05-16 04:33:48 +01:00
RenewTicketOnResume : true ,
2014-08-08 00:13:38 +01:00
} ,
} ,
2015-06-18 23:36:15 +01:00
flags : [ ] string { "-expect-ticket-renewal" } ,
2014-08-08 00:13:38 +01:00
resumeSession : true ,
2014-08-05 07:28:57 +01:00
} )
2015-05-16 04:33:48 +01:00
tests = append ( tests , testCase {
name : "Basic-Client-NoTicket" ,
2014-11-17 08:19:02 +00:00
config : Config {
SessionTicketsDisabled : true ,
} ,
resumeSession : true ,
} )
2015-05-16 04:33:48 +01:00
tests = append ( tests , testCase {
name : "Basic-Client-Implicit" ,
flags : [ ] string { "-implicit-handshake" } ,
2015-02-09 00:33:25 +00:00
resumeSession : true ,
} )
2015-05-16 04:33:48 +01:00
tests = append ( tests , testCase {
testType : serverTest ,
name : "Basic-Server" ,
2014-08-08 00:13:38 +01:00
resumeSession : true ,
2014-08-05 07:28:57 +01:00
} )
2015-05-16 04:33:48 +01:00
tests = append ( tests , testCase {
2014-11-17 08:19:02 +00:00
testType : serverTest ,
2015-05-16 04:33:48 +01:00
name : "Basic-Server-NoTickets" ,
2014-11-17 08:19:02 +00:00
config : Config {
SessionTicketsDisabled : true ,
} ,
resumeSession : true ,
} )
2015-05-16 04:33:48 +01:00
tests = append ( tests , testCase {
testType : serverTest ,
name : "Basic-Server-Implicit" ,
flags : [ ] string { "-implicit-handshake" } ,
2015-02-09 00:33:25 +00:00
resumeSession : true ,
} )
2015-05-16 04:33:48 +01:00
tests = append ( tests , testCase {
testType : serverTest ,
name : "Basic-Server-EarlyCallback" ,
flags : [ ] string { "-use-early-callback" } ,
2015-02-24 06:23:21 +00:00
resumeSession : true ,
} )
2014-08-05 07:28:57 +01:00
2014-08-11 23:43:38 +01:00
// TLS client auth.
2015-05-16 04:33:48 +01:00
tests = append ( tests , testCase {
2014-08-11 23:43:38 +01:00
testType : clientTest ,
2015-05-16 04:33:48 +01:00
name : "ClientAuth-Client" ,
2014-08-05 07:28:57 +01:00
config : Config {
2014-08-28 04:13:20 +01:00
ClientAuth : RequireAnyClientCert ,
2014-08-05 07:28:57 +01:00
} ,
2015-05-16 04:33:48 +01:00
flags : [ ] string {
2015-06-15 23:35:05 +01:00
"-cert-file" , path . Join ( * resourceDir , rsaCertificateFile ) ,
"-key-file" , path . Join ( * resourceDir , rsaKeyFile ) ,
2015-05-16 04:33:48 +01:00
} ,
2014-08-05 07:28:57 +01:00
} )
2015-05-29 22:11:21 +01:00
if async {
tests = append ( tests , testCase {
testType : clientTest ,
name : "ClientAuth-Client-AsyncKey" ,
config : Config {
ClientAuth : RequireAnyClientCert ,
} ,
flags : [ ] string {
2015-06-19 00:24:31 +01:00
"-cert-file" , path . Join ( * resourceDir , rsaCertificateFile ) ,
"-key-file" , path . Join ( * resourceDir , rsaKeyFile ) ,
2015-05-29 22:11:21 +01:00
"-use-async-private-key" ,
} ,
} )
}
2015-05-16 04:33:48 +01:00
tests = append ( tests , testCase {
2014-08-05 07:28:57 +01:00
testType : serverTest ,
2015-05-16 04:33:48 +01:00
name : "ClientAuth-Server" ,
2014-08-05 07:28:57 +01:00
config : Config {
2014-08-11 23:43:38 +01:00
Certificates : [ ] Certificate { rsaCertificate } ,
2014-08-05 07:28:57 +01:00
} ,
2015-05-16 04:33:48 +01:00
flags : [ ] string { "-require-any-client-certificate" } ,
2014-08-05 07:28:57 +01:00
} )
2014-08-11 23:43:38 +01:00
// No session ticket support; server doesn't send NewSessionTicket.
2015-05-16 04:33:48 +01:00
tests = append ( tests , testCase {
name : "SessionTicketsDisabled-Client" ,
2014-08-05 07:28:57 +01:00
config : Config {
2014-08-11 23:43:38 +01:00
SessionTicketsDisabled : true ,
2014-08-05 07:28:57 +01:00
} ,
} )
2015-05-16 04:33:48 +01:00
tests = append ( tests , testCase {
2014-08-05 07:28:57 +01:00
testType : serverTest ,
2015-05-16 04:33:48 +01:00
name : "SessionTicketsDisabled-Server" ,
2014-08-05 07:28:57 +01:00
config : Config {
2014-08-11 23:43:38 +01:00
SessionTicketsDisabled : true ,
2014-08-05 07:28:57 +01:00
} ,
} )
2014-10-27 05:06:24 +00:00
// Skip ServerKeyExchange in PSK key exchange if there's no
// identity hint.
2015-05-16 04:33:48 +01:00
tests = append ( tests , testCase {
name : "EmptyPSKHint-Client" ,
2014-10-27 05:06:24 +00:00
config : Config {
CipherSuites : [ ] uint16 { TLS_PSK_WITH_AES_128_CBC_SHA } ,
PreSharedKey : [ ] byte ( "secret" ) ,
} ,
2015-05-16 04:33:48 +01:00
flags : [ ] string { "-psk" , "secret" } ,
2014-10-27 05:06:24 +00:00
} )
2015-05-16 04:33:48 +01:00
tests = append ( tests , testCase {
2014-10-27 05:06:24 +00:00
testType : serverTest ,
2015-05-16 04:33:48 +01:00
name : "EmptyPSKHint-Server" ,
2014-10-27 05:06:24 +00:00
config : Config {
CipherSuites : [ ] uint16 { TLS_PSK_WITH_AES_128_CBC_SHA } ,
PreSharedKey : [ ] byte ( "secret" ) ,
} ,
2015-05-16 04:33:48 +01:00
flags : [ ] string { "-psk" , "secret" } ,
2014-10-27 05:06:24 +00:00
} )
2014-08-11 23:43:38 +01:00
if protocol == tls {
2015-05-16 04:33:48 +01:00
tests = append ( tests , testCase {
name : "Renegotiate-Client" ,
2015-05-16 04:19:31 +01:00
renegotiate : true ,
} )
2014-08-11 23:43:38 +01:00
// NPN on client and server; results in post-handshake message.
2015-05-16 04:33:48 +01:00
tests = append ( tests , testCase {
name : "NPN-Client" ,
2014-08-11 23:43:38 +01:00
config : Config {
2014-09-06 17:58:58 +01:00
NextProtos : [ ] string { "foo" } ,
2014-08-05 07:28:57 +01:00
} ,
2015-05-16 04:33:48 +01:00
flags : [ ] string { "-select-next-proto" , "foo" } ,
2014-09-06 18:21:53 +01:00
expectedNextProto : "foo" ,
expectedNextProtoType : npn ,
2014-08-11 23:43:38 +01:00
} )
2015-05-16 04:33:48 +01:00
tests = append ( tests , testCase {
2014-08-11 23:43:38 +01:00
testType : serverTest ,
2015-05-16 04:33:48 +01:00
name : "NPN-Server" ,
2014-08-11 23:43:38 +01:00
config : Config {
NextProtos : [ ] string { "bar" } ,
} ,
2015-05-16 04:33:48 +01:00
flags : [ ] string {
2014-08-11 23:43:38 +01:00
"-advertise-npn" , "\x03foo\x03bar\x03baz" ,
2015-05-16 04:33:48 +01:00
"-expect-next-proto" , "bar" ,
} ,
2014-09-06 18:21:53 +01:00
expectedNextProto : "bar" ,
expectedNextProtoType : npn ,
2014-08-11 23:43:38 +01:00
} )
2014-08-05 07:28:57 +01:00
2015-02-19 18:27:05 +00:00
// TODO(davidben): Add tests for when False Start doesn't trigger.
2014-08-11 23:43:38 +01:00
// Client does False Start and negotiates NPN.
2015-05-16 04:33:48 +01:00
tests = append ( tests , testCase {
name : "FalseStart" ,
2014-08-11 23:43:38 +01:00
config : Config {
CipherSuites : [ ] uint16 { TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 } ,
NextProtos : [ ] string { "foo" } ,
Bugs : ProtocolBugs {
2015-05-16 04:33:48 +01:00
ExpectFalseStart : true ,
2014-08-11 23:43:38 +01:00
} ,
2014-08-05 07:28:57 +01:00
} ,
2015-05-16 04:33:48 +01:00
flags : [ ] string {
2014-08-11 23:43:38 +01:00
"-false-start" ,
2015-05-16 04:33:48 +01:00
"-select-next-proto" , "foo" ,
} ,
2014-08-24 08:47:07 +01:00
shimWritesFirst : true ,
resumeSession : true ,
2014-08-11 23:43:38 +01:00
} )
2014-08-08 17:27:04 +01:00
2014-09-06 17:58:58 +01:00
// Client does False Start and negotiates ALPN.
2015-05-16 04:33:48 +01:00
tests = append ( tests , testCase {
name : "FalseStart-ALPN" ,
2014-09-06 17:58:58 +01:00
config : Config {
CipherSuites : [ ] uint16 { TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 } ,
NextProtos : [ ] string { "foo" } ,
Bugs : ProtocolBugs {
2015-05-16 04:33:48 +01:00
ExpectFalseStart : true ,
2014-09-06 17:58:58 +01:00
} ,
} ,
2015-05-16 04:33:48 +01:00
flags : [ ] string {
2014-09-06 17:58:58 +01:00
"-false-start" ,
2015-05-16 04:33:48 +01:00
"-advertise-alpn" , "\x03foo" ,
} ,
2014-09-06 17:58:58 +01:00
shimWritesFirst : true ,
resumeSession : true ,
} )
2015-02-09 00:46:57 +00:00
// Client does False Start but doesn't explicitly call
// SSL_connect.
2015-05-16 04:33:48 +01:00
tests = append ( tests , testCase {
name : "FalseStart-Implicit" ,
2015-02-09 00:46:57 +00:00
config : Config {
CipherSuites : [ ] uint16 { TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 } ,
NextProtos : [ ] string { "foo" } ,
} ,
2015-05-16 04:33:48 +01:00
flags : [ ] string {
2015-02-09 00:46:57 +00:00
"-implicit-handshake" ,
"-false-start" ,
2015-05-16 04:33:48 +01:00
"-advertise-alpn" , "\x03foo" ,
} ,
2015-02-09 00:46:57 +00:00
} )
2014-08-11 23:43:38 +01:00
// False Start without session tickets.
2015-05-16 04:33:48 +01:00
tests = append ( tests , testCase {
name : "FalseStart-SessionTicketsDisabled" ,
2014-08-11 23:43:38 +01:00
config : Config {
CipherSuites : [ ] uint16 { TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 } ,
NextProtos : [ ] string { "foo" } ,
SessionTicketsDisabled : true ,
2014-08-24 06:45:30 +01:00
Bugs : ProtocolBugs {
2015-05-16 04:33:48 +01:00
ExpectFalseStart : true ,
2014-08-24 06:45:30 +01:00
} ,
2014-08-08 17:27:04 +01:00
} ,
2015-05-16 04:33:48 +01:00
flags : [ ] string {
2014-08-11 23:43:38 +01:00
"-false-start" ,
"-select-next-proto" , "foo" ,
2015-05-16 04:33:48 +01:00
} ,
2014-08-24 08:47:07 +01:00
shimWritesFirst : true ,
2014-08-11 23:43:38 +01:00
} )
2014-08-24 06:46:07 +01:00
// Server parses a V2ClientHello.
2015-05-16 04:33:48 +01:00
tests = append ( tests , testCase {
2014-08-11 23:43:38 +01:00
testType : serverTest ,
2015-05-16 04:33:48 +01:00
name : "SendV2ClientHello" ,
2014-08-11 23:43:38 +01:00
config : Config {
// Choose a cipher suite that does not involve
// elliptic curves, so no extensions are
// involved.
CipherSuites : [ ] uint16 { TLS_RSA_WITH_RC4_128_SHA } ,
Bugs : ProtocolBugs {
2015-05-16 04:33:48 +01:00
SendV2ClientHello : true ,
2014-08-11 23:43:38 +01:00
} ,
} ,
} )
2014-08-24 06:46:07 +01:00
// Client sends a Channel ID.
2015-05-16 04:33:48 +01:00
tests = append ( tests , testCase {
name : "ChannelID-Client" ,
2014-08-24 06:46:07 +01:00
config : Config {
RequestChannelID : true ,
} ,
2015-06-15 23:35:05 +01:00
flags : [ ] string { "-send-channel-id" , path . Join ( * resourceDir , channelIDKeyFile ) } ,
2014-08-24 06:46:07 +01:00
resumeSession : true ,
expectChannelID : true ,
} )
// Server accepts a Channel ID.
2015-05-16 04:33:48 +01:00
tests = append ( tests , testCase {
2014-08-24 06:46:07 +01:00
testType : serverTest ,
2015-05-16 04:33:48 +01:00
name : "ChannelID-Server" ,
2014-08-24 06:46:07 +01:00
config : Config {
ChannelID : channelIDKey ,
} ,
2015-05-16 04:33:48 +01:00
flags : [ ] string {
2014-08-24 06:46:07 +01:00
"-expect-channel-id" ,
base64 . StdEncoding . EncodeToString ( channelIDBytes ) ,
2015-05-16 04:33:48 +01:00
} ,
2014-08-24 06:46:07 +01:00
resumeSession : true ,
expectChannelID : true ,
} )
2014-08-11 23:43:38 +01:00
} else {
2015-05-16 04:33:48 +01:00
tests = append ( tests , testCase {
name : "SkipHelloVerifyRequest" ,
2014-08-11 23:43:38 +01:00
config : Config {
Bugs : ProtocolBugs {
2015-05-16 04:33:48 +01:00
SkipHelloVerifyRequest : true ,
2014-08-11 23:43:38 +01:00
} ,
} ,
} )
}
2015-05-16 04:33:48 +01:00
var suffix string
var flags [ ] string
var maxHandshakeRecordLength int
if protocol == dtls {
suffix = "-DTLS"
}
if async {
suffix += "-Async"
flags = append ( flags , "-async" )
} else {
suffix += "-Sync"
}
if splitHandshake {
suffix += "-SplitHandshakeRecords"
maxHandshakeRecordLength = 1
}
for _ , test := range tests {
test . protocol = protocol
test . name += suffix
test . config . Bugs . MaxHandshakeRecordLength = maxHandshakeRecordLength
test . flags = append ( test . flags , flags ... )
testCases = append ( testCases , test )
}
2014-08-05 07:28:57 +01:00
}
2015-02-21 00:04:00 +00:00
func addDDoSCallbackTests ( ) {
// DDoS callback.
for _ , resume := range [ ] bool { false , true } {
suffix := "Resume"
if resume {
suffix = "No" + suffix
}
testCases = append ( testCases , testCase {
testType : serverTest ,
name : "Server-DDoS-OK-" + suffix ,
flags : [ ] string { "-install-ddos-callback" } ,
resumeSession : resume ,
} )
failFlag := "-fail-ddos-callback"
if resume {
failFlag = "-fail-second-ddos-callback"
}
testCases = append ( testCases , testCase {
testType : serverTest ,
name : "Server-DDoS-Reject-" + suffix ,
flags : [ ] string { "-install-ddos-callback" , failFlag } ,
resumeSession : resume ,
shouldFail : true ,
expectedError : ":CONNECTION_REJECTED:" ,
} )
}
}
2014-08-07 22:44:24 +01:00
func addVersionNegotiationTests ( ) {
for i , shimVers := range tlsVersions {
// Assemble flags to disable all newer versions on the shim.
var flags [ ] string
for _ , vers := range tlsVersions [ i + 1 : ] {
flags = append ( flags , vers . flag )
}
for _ , runnerVers := range tlsVersions {
2014-11-23 07:47:52 +00:00
protocols := [ ] protocol { tls }
if runnerVers . hasDTLS && shimVers . hasDTLS {
protocols = append ( protocols , dtls )
2014-08-07 22:44:24 +01:00
}
2014-11-23 07:47:52 +00:00
for _ , protocol := range protocols {
expectedVersion := shimVers . version
if runnerVers . version < shimVers . version {
expectedVersion = runnerVers . version
}
2014-08-07 22:44:24 +01:00
2014-11-23 07:47:52 +00:00
suffix := shimVers . name + "-" + runnerVers . name
if protocol == dtls {
suffix += "-DTLS"
}
2014-08-07 22:44:24 +01:00
2014-12-12 23:17:51 +00:00
shimVersFlag := strconv . Itoa ( int ( versionToWire ( shimVers . version , protocol == dtls ) ) )
2014-12-10 07:27:24 +00:00
clientVers := shimVers . version
if clientVers > VersionTLS10 {
clientVers = VersionTLS10
}
2014-11-23 07:47:52 +00:00
testCases = append ( testCases , testCase {
protocol : protocol ,
testType : clientTest ,
name : "VersionNegotiation-Client-" + suffix ,
config : Config {
MaxVersion : runnerVers . version ,
2014-12-10 07:27:24 +00:00
Bugs : ProtocolBugs {
ExpectInitialRecordVersion : clientVers ,
} ,
2014-11-23 07:47:52 +00:00
} ,
flags : flags ,
expectedVersion : expectedVersion ,
} )
2014-12-12 23:17:51 +00:00
testCases = append ( testCases , testCase {
protocol : protocol ,
testType : clientTest ,
name : "VersionNegotiation-Client2-" + suffix ,
config : Config {
MaxVersion : runnerVers . version ,
Bugs : ProtocolBugs {
ExpectInitialRecordVersion : clientVers ,
} ,
} ,
flags : [ ] string { "-max-version" , shimVersFlag } ,
expectedVersion : expectedVersion ,
} )
2014-11-23 07:47:52 +00:00
testCases = append ( testCases , testCase {
protocol : protocol ,
testType : serverTest ,
name : "VersionNegotiation-Server-" + suffix ,
config : Config {
MaxVersion : runnerVers . version ,
2014-12-10 07:27:24 +00:00
Bugs : ProtocolBugs {
ExpectInitialRecordVersion : expectedVersion ,
} ,
2014-11-23 07:47:52 +00:00
} ,
flags : flags ,
expectedVersion : expectedVersion ,
} )
2014-12-12 23:17:51 +00:00
testCases = append ( testCases , testCase {
protocol : protocol ,
testType : serverTest ,
name : "VersionNegotiation-Server2-" + suffix ,
config : Config {
MaxVersion : runnerVers . version ,
Bugs : ProtocolBugs {
ExpectInitialRecordVersion : expectedVersion ,
} ,
} ,
flags : [ ] string { "-max-version" , shimVersFlag } ,
expectedVersion : expectedVersion ,
} )
2014-11-23 07:47:52 +00:00
}
2014-08-07 22:44:24 +01:00
}
}
}
2014-12-13 04:44:33 +00:00
func addMinimumVersionTests ( ) {
for i , shimVers := range tlsVersions {
// Assemble flags to disable all older versions on the shim.
var flags [ ] string
for _ , vers := range tlsVersions [ : i ] {
flags = append ( flags , vers . flag )
}
for _ , runnerVers := range tlsVersions {
protocols := [ ] protocol { tls }
if runnerVers . hasDTLS && shimVers . hasDTLS {
protocols = append ( protocols , dtls )
}
for _ , protocol := range protocols {
suffix := shimVers . name + "-" + runnerVers . name
if protocol == dtls {
suffix += "-DTLS"
}
shimVersFlag := strconv . Itoa ( int ( versionToWire ( shimVers . version , protocol == dtls ) ) )
var expectedVersion uint16
var shouldFail bool
var expectedError string
2014-12-13 06:55:01 +00:00
var expectedLocalError string
2014-12-13 04:44:33 +00:00
if runnerVers . version >= shimVers . version {
expectedVersion = runnerVers . version
} else {
shouldFail = true
expectedError = ":UNSUPPORTED_PROTOCOL:"
2014-12-13 06:55:01 +00:00
if runnerVers . version > VersionSSL30 {
expectedLocalError = "remote error: protocol version not supported"
} else {
expectedLocalError = "remote error: handshake failure"
}
2014-12-13 04:44:33 +00:00
}
testCases = append ( testCases , testCase {
protocol : protocol ,
testType : clientTest ,
name : "MinimumVersion-Client-" + suffix ,
config : Config {
MaxVersion : runnerVers . version ,
} ,
2014-12-13 06:55:01 +00:00
flags : flags ,
expectedVersion : expectedVersion ,
shouldFail : shouldFail ,
expectedError : expectedError ,
expectedLocalError : expectedLocalError ,
2014-12-13 04:44:33 +00:00
} )
testCases = append ( testCases , testCase {
protocol : protocol ,
testType : clientTest ,
name : "MinimumVersion-Client2-" + suffix ,
config : Config {
MaxVersion : runnerVers . version ,
} ,
2014-12-13 06:55:01 +00:00
flags : [ ] string { "-min-version" , shimVersFlag } ,
expectedVersion : expectedVersion ,
shouldFail : shouldFail ,
expectedError : expectedError ,
expectedLocalError : expectedLocalError ,
2014-12-13 04:44:33 +00:00
} )
testCases = append ( testCases , testCase {
protocol : protocol ,
testType : serverTest ,
name : "MinimumVersion-Server-" + suffix ,
config : Config {
MaxVersion : runnerVers . version ,
} ,
2014-12-13 06:55:01 +00:00
flags : flags ,
expectedVersion : expectedVersion ,
shouldFail : shouldFail ,
expectedError : expectedError ,
expectedLocalError : expectedLocalError ,
2014-12-13 04:44:33 +00:00
} )
testCases = append ( testCases , testCase {
protocol : protocol ,
testType : serverTest ,
name : "MinimumVersion-Server2-" + suffix ,
config : Config {
MaxVersion : runnerVers . version ,
} ,
2014-12-13 06:55:01 +00:00
flags : [ ] string { "-min-version" , shimVersFlag } ,
expectedVersion : expectedVersion ,
shouldFail : shouldFail ,
expectedError : expectedError ,
expectedLocalError : expectedLocalError ,
2014-12-13 04:44:33 +00:00
} )
}
}
}
}
2014-08-31 05:59:27 +01:00
func addD5BugTests ( ) {
testCases = append ( testCases , testCase {
testType : serverTest ,
name : "D5Bug-NoQuirk-Reject" ,
config : Config {
CipherSuites : [ ] uint16 { TLS_RSA_WITH_AES_128_GCM_SHA256 } ,
Bugs : ProtocolBugs {
SSL3RSAKeyExchange : true ,
} ,
} ,
shouldFail : true ,
expectedError : ":TLS_RSA_ENCRYPTED_VALUE_LENGTH_IS_WRONG:" ,
} )
testCases = append ( testCases , testCase {
testType : serverTest ,
name : "D5Bug-Quirk-Normal" ,
config : Config {
CipherSuites : [ ] uint16 { TLS_RSA_WITH_AES_128_GCM_SHA256 } ,
} ,
flags : [ ] string { "-tls-d5-bug" } ,
} )
testCases = append ( testCases , testCase {
testType : serverTest ,
name : "D5Bug-Quirk-Bug" ,
config : Config {
CipherSuites : [ ] uint16 { TLS_RSA_WITH_AES_128_GCM_SHA256 } ,
Bugs : ProtocolBugs {
SSL3RSAKeyExchange : true ,
} ,
} ,
flags : [ ] string { "-tls-d5-bug" } ,
} )
}
2014-09-06 17:45:15 +01:00
func addExtensionTests ( ) {
testCases = append ( testCases , testCase {
testType : clientTest ,
name : "DuplicateExtensionClient" ,
config : Config {
Bugs : ProtocolBugs {
DuplicateExtension : true ,
} ,
} ,
shouldFail : true ,
expectedLocalError : "remote error: error decoding message" ,
} )
testCases = append ( testCases , testCase {
testType : serverTest ,
name : "DuplicateExtensionServer" ,
config : Config {
Bugs : ProtocolBugs {
DuplicateExtension : true ,
} ,
} ,
shouldFail : true ,
expectedLocalError : "remote error: error decoding message" ,
} )
testCases = append ( testCases , testCase {
testType : clientTest ,
name : "ServerNameExtensionClient" ,
config : Config {
Bugs : ProtocolBugs {
ExpectServerName : "example.com" ,
} ,
} ,
flags : [ ] string { "-host-name" , "example.com" } ,
} )
testCases = append ( testCases , testCase {
testType : clientTest ,
2015-02-11 22:14:15 +00:00
name : "ServerNameExtensionClientMismatch" ,
2014-09-06 17:45:15 +01:00
config : Config {
Bugs : ProtocolBugs {
ExpectServerName : "mismatch.com" ,
} ,
} ,
flags : [ ] string { "-host-name" , "example.com" } ,
shouldFail : true ,
expectedLocalError : "tls: unexpected server name" ,
} )
testCases = append ( testCases , testCase {
testType : clientTest ,
2015-02-11 22:14:15 +00:00
name : "ServerNameExtensionClientMissing" ,
2014-09-06 17:45:15 +01:00
config : Config {
Bugs : ProtocolBugs {
ExpectServerName : "missing.com" ,
} ,
} ,
shouldFail : true ,
expectedLocalError : "tls: unexpected server name" ,
} )
testCases = append ( testCases , testCase {
testType : serverTest ,
name : "ServerNameExtensionServer" ,
config : Config {
ServerName : "example.com" ,
} ,
flags : [ ] string { "-expect-server-name" , "example.com" } ,
resumeSession : true ,
} )
2014-09-06 17:58:58 +01:00
testCases = append ( testCases , testCase {
testType : clientTest ,
name : "ALPNClient" ,
config : Config {
NextProtos : [ ] string { "foo" } ,
} ,
flags : [ ] string {
"-advertise-alpn" , "\x03foo\x03bar\x03baz" ,
"-expect-alpn" , "foo" ,
} ,
2014-09-06 18:21:53 +01:00
expectedNextProto : "foo" ,
expectedNextProtoType : alpn ,
resumeSession : true ,
2014-09-06 17:58:58 +01:00
} )
testCases = append ( testCases , testCase {
testType : serverTest ,
name : "ALPNServer" ,
config : Config {
NextProtos : [ ] string { "foo" , "bar" , "baz" } ,
} ,
flags : [ ] string {
"-expect-advertised-alpn" , "\x03foo\x03bar\x03baz" ,
"-select-alpn" , "foo" ,
} ,
2014-09-06 18:21:53 +01:00
expectedNextProto : "foo" ,
expectedNextProtoType : alpn ,
resumeSession : true ,
} )
// Test that the server prefers ALPN over NPN.
testCases = append ( testCases , testCase {
testType : serverTest ,
name : "ALPNServer-Preferred" ,
config : Config {
NextProtos : [ ] string { "foo" , "bar" , "baz" } ,
} ,
flags : [ ] string {
"-expect-advertised-alpn" , "\x03foo\x03bar\x03baz" ,
"-select-alpn" , "foo" ,
"-advertise-npn" , "\x03foo\x03bar\x03baz" ,
} ,
expectedNextProto : "foo" ,
expectedNextProtoType : alpn ,
resumeSession : true ,
} )
testCases = append ( testCases , testCase {
testType : serverTest ,
name : "ALPNServer-Preferred-Swapped" ,
config : Config {
NextProtos : [ ] string { "foo" , "bar" , "baz" } ,
Bugs : ProtocolBugs {
SwapNPNAndALPN : true ,
} ,
} ,
flags : [ ] string {
"-expect-advertised-alpn" , "\x03foo\x03bar\x03baz" ,
"-select-alpn" , "foo" ,
"-advertise-npn" , "\x03foo\x03bar\x03baz" ,
} ,
expectedNextProto : "foo" ,
expectedNextProtoType : alpn ,
resumeSession : true ,
2014-09-06 17:58:58 +01:00
} )
2014-10-17 03:04:35 +01:00
// Resume with a corrupt ticket.
testCases = append ( testCases , testCase {
testType : serverTest ,
name : "CorruptTicket" ,
config : Config {
Bugs : ProtocolBugs {
CorruptTicket : true ,
} ,
} ,
2015-06-02 18:47:39 +01:00
resumeSession : true ,
expectResumeRejected : true ,
2014-10-17 03:04:35 +01:00
} )
2015-06-16 19:16:23 +01:00
// Test the ticket callback, with and without renewal.
testCases = append ( testCases , testCase {
testType : serverTest ,
name : "TicketCallback" ,
resumeSession : true ,
flags : [ ] string { "-use-ticket-callback" } ,
} )
testCases = append ( testCases , testCase {
testType : serverTest ,
name : "TicketCallback-Renew" ,
config : Config {
Bugs : ProtocolBugs {
ExpectNewTicket : true ,
} ,
} ,
flags : [ ] string { "-use-ticket-callback" , "-renew-ticket" } ,
resumeSession : true ,
} )
2014-10-17 03:04:35 +01:00
// Resume with an oversized session id.
testCases = append ( testCases , testCase {
testType : serverTest ,
name : "OversizedSessionId" ,
config : Config {
Bugs : ProtocolBugs {
OversizedSessionId : true ,
} ,
} ,
resumeSession : true ,
2014-10-11 00:23:43 +01:00
shouldFail : true ,
2014-10-17 03:04:35 +01:00
expectedError : ":DECODE_ERROR:" ,
} )
2014-11-16 00:06:08 +00:00
// Basic DTLS-SRTP tests. Include fake profiles to ensure they
// are ignored.
testCases = append ( testCases , testCase {
protocol : dtls ,
name : "SRTP-Client" ,
config : Config {
SRTPProtectionProfiles : [ ] uint16 { 40 , SRTP_AES128_CM_HMAC_SHA1_80 , 42 } ,
} ,
flags : [ ] string {
"-srtp-profiles" ,
"SRTP_AES128_CM_SHA1_80:SRTP_AES128_CM_SHA1_32" ,
} ,
expectedSRTPProtectionProfile : SRTP_AES128_CM_HMAC_SHA1_80 ,
} )
testCases = append ( testCases , testCase {
protocol : dtls ,
testType : serverTest ,
name : "SRTP-Server" ,
config : Config {
SRTPProtectionProfiles : [ ] uint16 { 40 , SRTP_AES128_CM_HMAC_SHA1_80 , 42 } ,
} ,
flags : [ ] string {
"-srtp-profiles" ,
"SRTP_AES128_CM_SHA1_80:SRTP_AES128_CM_SHA1_32" ,
} ,
expectedSRTPProtectionProfile : SRTP_AES128_CM_HMAC_SHA1_80 ,
} )
// Test that the MKI is ignored.
testCases = append ( testCases , testCase {
protocol : dtls ,
testType : serverTest ,
name : "SRTP-Server-IgnoreMKI" ,
config : Config {
SRTPProtectionProfiles : [ ] uint16 { SRTP_AES128_CM_HMAC_SHA1_80 } ,
Bugs : ProtocolBugs {
SRTPMasterKeyIdentifer : "bogus" ,
} ,
} ,
flags : [ ] string {
"-srtp-profiles" ,
"SRTP_AES128_CM_SHA1_80:SRTP_AES128_CM_SHA1_32" ,
} ,
expectedSRTPProtectionProfile : SRTP_AES128_CM_HMAC_SHA1_80 ,
} )
// Test that SRTP isn't negotiated on the server if there were
// no matching profiles.
testCases = append ( testCases , testCase {
protocol : dtls ,
testType : serverTest ,
name : "SRTP-Server-NoMatch" ,
config : Config {
SRTPProtectionProfiles : [ ] uint16 { 100 , 101 , 102 } ,
} ,
flags : [ ] string {
"-srtp-profiles" ,
"SRTP_AES128_CM_SHA1_80:SRTP_AES128_CM_SHA1_32" ,
} ,
expectedSRTPProtectionProfile : 0 ,
} )
// Test that the server returning an invalid SRTP profile is
// flagged as an error by the client.
testCases = append ( testCases , testCase {
protocol : dtls ,
name : "SRTP-Client-NoMatch" ,
config : Config {
Bugs : ProtocolBugs {
SendSRTPProtectionProfile : SRTP_AES128_CM_HMAC_SHA1_32 ,
} ,
} ,
flags : [ ] string {
"-srtp-profiles" ,
"SRTP_AES128_CM_SHA1_80" ,
} ,
shouldFail : true ,
expectedError : ":BAD_SRTP_PROTECTION_PROFILE_LIST:" ,
} )
2014-11-25 06:55:35 +00:00
// Test OCSP stapling and SCT list.
testCases = append ( testCases , testCase {
name : "OCSPStapling" ,
flags : [ ] string {
"-enable-ocsp-stapling" ,
"-expect-ocsp-response" ,
base64 . StdEncoding . EncodeToString ( testOCSPResponse ) ,
} ,
} )
testCases = append ( testCases , testCase {
name : "SignedCertificateTimestampList" ,
flags : [ ] string {
"-enable-signed-cert-timestamps" ,
"-expect-signed-cert-timestamps" ,
base64 . StdEncoding . EncodeToString ( testSCTList ) ,
} ,
} )
2014-09-06 17:45:15 +01:00
}
2014-09-24 20:21:44 +01:00
func addResumptionVersionTests ( ) {
for _ , sessionVers := range tlsVersions {
for _ , resumeVers := range tlsVersions {
2014-11-23 07:47:52 +00:00
protocols := [ ] protocol { tls }
if sessionVers . hasDTLS && resumeVers . hasDTLS {
protocols = append ( protocols , dtls )
}
for _ , protocol := range protocols {
suffix := "-" + sessionVers . name + "-" + resumeVers . name
if protocol == dtls {
suffix += "-DTLS"
}
2014-09-24 20:21:44 +01:00
2015-03-16 22:02:20 +00:00
if sessionVers . version == resumeVers . version {
testCases = append ( testCases , testCase {
protocol : protocol ,
name : "Resume-Client" + suffix ,
resumeSession : true ,
config : Config {
MaxVersion : sessionVers . version ,
CipherSuites : [ ] uint16 { TLS_RSA_WITH_AES_128_CBC_SHA } ,
2014-11-23 07:47:52 +00:00
} ,
2015-03-16 22:02:20 +00:00
expectedVersion : sessionVers . version ,
expectedResumeVersion : resumeVers . version ,
} )
} else {
testCases = append ( testCases , testCase {
protocol : protocol ,
name : "Resume-Client-Mismatch" + suffix ,
resumeSession : true ,
config : Config {
MaxVersion : sessionVers . version ,
CipherSuites : [ ] uint16 { TLS_RSA_WITH_AES_128_CBC_SHA } ,
2014-11-23 07:47:52 +00:00
} ,
2015-03-16 22:02:20 +00:00
expectedVersion : sessionVers . version ,
resumeConfig : & Config {
MaxVersion : resumeVers . version ,
CipherSuites : [ ] uint16 { TLS_RSA_WITH_AES_128_CBC_SHA } ,
Bugs : ProtocolBugs {
AllowSessionVersionMismatch : true ,
} ,
} ,
expectedResumeVersion : resumeVers . version ,
shouldFail : true ,
expectedError : ":OLD_SESSION_VERSION_NOT_RETURNED:" ,
} )
}
2014-09-24 20:21:44 +01:00
2014-11-23 07:47:52 +00:00
testCases = append ( testCases , testCase {
protocol : protocol ,
name : "Resume-Client-NoResume" + suffix ,
resumeSession : true ,
config : Config {
MaxVersion : sessionVers . version ,
CipherSuites : [ ] uint16 { TLS_RSA_WITH_AES_128_CBC_SHA } ,
} ,
expectedVersion : sessionVers . version ,
resumeConfig : & Config {
MaxVersion : resumeVers . version ,
CipherSuites : [ ] uint16 { TLS_RSA_WITH_AES_128_CBC_SHA } ,
} ,
newSessionsOnResume : true ,
2015-06-02 18:47:39 +01:00
expectResumeRejected : true ,
2014-11-23 07:47:52 +00:00
expectedResumeVersion : resumeVers . version ,
} )
2014-11-11 05:52:15 +00:00
2014-11-23 07:47:52 +00:00
testCases = append ( testCases , testCase {
protocol : protocol ,
testType : serverTest ,
name : "Resume-Server" + suffix ,
resumeSession : true ,
config : Config {
MaxVersion : sessionVers . version ,
CipherSuites : [ ] uint16 { TLS_RSA_WITH_AES_128_CBC_SHA } ,
} ,
2015-06-02 18:47:39 +01:00
expectedVersion : sessionVers . version ,
expectResumeRejected : sessionVers . version != resumeVers . version ,
2014-11-23 07:47:52 +00:00
resumeConfig : & Config {
MaxVersion : resumeVers . version ,
CipherSuites : [ ] uint16 { TLS_RSA_WITH_AES_128_CBC_SHA } ,
} ,
expectedResumeVersion : resumeVers . version ,
} )
2014-11-11 05:52:15 +00:00
}
2014-09-24 20:21:44 +01:00
}
}
2015-03-16 22:02:20 +00:00
testCases = append ( testCases , testCase {
name : "Resume-Client-CipherMismatch" ,
resumeSession : true ,
config : Config {
CipherSuites : [ ] uint16 { TLS_RSA_WITH_AES_128_GCM_SHA256 } ,
} ,
resumeConfig : & Config {
CipherSuites : [ ] uint16 { TLS_RSA_WITH_AES_128_GCM_SHA256 } ,
Bugs : ProtocolBugs {
SendCipherSuite : TLS_RSA_WITH_AES_128_CBC_SHA ,
} ,
} ,
shouldFail : true ,
expectedError : ":OLD_SESSION_CIPHER_NOT_RETURNED:" ,
} )
2014-09-24 20:21:44 +01:00
}
2014-10-29 00:29:33 +00:00
func addRenegotiationTests ( ) {
2015-05-21 06:29:55 +01:00
// Servers cannot renegotiate.
2015-04-09 00:16:58 +01:00
testCases = append ( testCases , testCase {
testType : serverTest ,
2015-05-21 06:29:55 +01:00
name : "Renegotiate-Server-Forbidden" ,
2015-04-09 00:16:58 +01:00
renegotiate : true ,
flags : [ ] string { "-reject-peer-renegotiations" } ,
shouldFail : true ,
expectedError : ":NO_RENEGOTIATION:" ,
expectedLocalError : "remote error: no renegotiation" ,
} )
2014-10-29 00:29:33 +00:00
// TODO(agl): test the renegotiation info SCSV.
2014-10-29 02:06:14 +00:00
testCases = append ( testCases , testCase {
2015-05-13 03:42:52 +01:00
name : "Renegotiate-Client" ,
2015-03-19 18:09:43 +00:00
config : Config {
Bugs : ProtocolBugs {
2015-05-13 03:42:52 +01:00
FailIfResumeOnRenego : true ,
2015-03-19 18:09:43 +00:00
} ,
} ,
renegotiate : true ,
} )
2014-10-29 02:06:14 +00:00
testCases = append ( testCases , testCase {
name : "Renegotiate-Client-EmptyExt" ,
renegotiate : true ,
config : Config {
Bugs : ProtocolBugs {
EmptyRenegotiationInfo : true ,
} ,
} ,
shouldFail : true ,
expectedError : ":RENEGOTIATION_MISMATCH:" ,
} )
testCases = append ( testCases , testCase {
name : "Renegotiate-Client-BadExt" ,
renegotiate : true ,
config : Config {
Bugs : ProtocolBugs {
BadRenegotiationInfo : true ,
} ,
} ,
shouldFail : true ,
expectedError : ":RENEGOTIATION_MISMATCH:" ,
} )
2015-05-16 04:09:47 +01:00
testCases = append ( testCases , testCase {
name : "Renegotiate-Client-NoExt" ,
renegotiate : true ,
config : Config {
Bugs : ProtocolBugs {
NoRenegotiationInfo : true ,
} ,
} ,
shouldFail : true ,
expectedError : ":UNSAFE_LEGACY_RENEGOTIATION_DISABLED:" ,
flags : [ ] string { "-no-legacy-server-connect" } ,
} )
testCases = append ( testCases , testCase {
name : "Renegotiate-Client-NoExt-Allowed" ,
renegotiate : true ,
config : Config {
Bugs : ProtocolBugs {
NoRenegotiationInfo : true ,
} ,
} ,
} )
2014-10-29 02:06:14 +00:00
testCases = append ( testCases , testCase {
name : "Renegotiate-Client-SwitchCiphers" ,
renegotiate : true ,
config : Config {
CipherSuites : [ ] uint16 { TLS_RSA_WITH_RC4_128_SHA } ,
} ,
renegotiateCiphers : [ ] uint16 { TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 } ,
} )
testCases = append ( testCases , testCase {
name : "Renegotiate-Client-SwitchCiphers2" ,
renegotiate : true ,
config : Config {
CipherSuites : [ ] uint16 { TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 } ,
} ,
renegotiateCiphers : [ ] uint16 { TLS_RSA_WITH_RC4_128_SHA } ,
} )
2015-04-09 00:16:58 +01:00
testCases = append ( testCases , testCase {
name : "Renegotiate-Client-Forbidden" ,
renegotiate : true ,
flags : [ ] string { "-reject-peer-renegotiations" } ,
shouldFail : true ,
expectedError : ":NO_RENEGOTIATION:" ,
expectedLocalError : "remote error: no renegotiation" ,
} )
2014-11-23 17:11:01 +00:00
testCases = append ( testCases , testCase {
name : "Renegotiate-SameClientVersion" ,
renegotiate : true ,
config : Config {
MaxVersion : VersionTLS10 ,
Bugs : ProtocolBugs {
RequireSameRenegoClientVersion : true ,
} ,
} ,
} )
2014-10-29 00:29:33 +00:00
}
2014-11-07 06:48:35 +00:00
func addDTLSReplayTests ( ) {
// Test that sequence number replays are detected.
testCases = append ( testCases , testCase {
protocol : dtls ,
name : "DTLS-Replay" ,
replayWrites : true ,
} )
// Test the outgoing sequence number skipping by values larger
// than the retransmit window.
testCases = append ( testCases , testCase {
protocol : dtls ,
name : "DTLS-Replay-LargeGaps" ,
config : Config {
Bugs : ProtocolBugs {
SequenceNumberIncrement : 127 ,
} ,
} ,
replayWrites : true ,
} )
}
2014-11-22 06:47:56 +00:00
func addFastRadioPaddingTests ( ) {
2014-12-10 07:27:24 +00:00
testCases = append ( testCases , testCase {
protocol : tls ,
name : "FastRadio-Padding" ,
2014-11-22 06:47:56 +00:00
config : Config {
Bugs : ProtocolBugs {
RequireFastradioPadding : true ,
} ,
} ,
2014-12-10 07:27:24 +00:00
flags : [ ] string { "-fastradio-padding" } ,
2014-11-22 06:47:56 +00:00
} )
2014-12-10 07:27:24 +00:00
testCases = append ( testCases , testCase {
protocol : dtls ,
2015-02-11 22:14:15 +00:00
name : "FastRadio-Padding-DTLS" ,
2014-11-22 06:47:56 +00:00
config : Config {
Bugs : ProtocolBugs {
RequireFastradioPadding : true ,
} ,
} ,
2014-12-10 07:27:24 +00:00
flags : [ ] string { "-fastradio-padding" } ,
2014-11-22 06:47:56 +00:00
} )
}
2014-11-14 06:43:59 +00:00
var testHashes = [ ] struct {
name string
id uint8
} {
{ "SHA1" , hashSHA1 } ,
{ "SHA224" , hashSHA224 } ,
{ "SHA256" , hashSHA256 } ,
{ "SHA384" , hashSHA384 } ,
{ "SHA512" , hashSHA512 } ,
}
func addSigningHashTests ( ) {
// Make sure each hash works. Include some fake hashes in the list and
// ensure they're ignored.
for _ , hash := range testHashes {
testCases = append ( testCases , testCase {
name : "SigningHash-ClientAuth-" + hash . name ,
config : Config {
ClientAuth : RequireAnyClientCert ,
SignatureAndHashes : [ ] signatureAndHash {
{ signatureRSA , 42 } ,
{ signatureRSA , hash . id } ,
{ signatureRSA , 255 } ,
} ,
} ,
flags : [ ] string {
2015-06-15 23:35:05 +01:00
"-cert-file" , path . Join ( * resourceDir , rsaCertificateFile ) ,
"-key-file" , path . Join ( * resourceDir , rsaKeyFile ) ,
2014-11-14 06:43:59 +00:00
} ,
} )
testCases = append ( testCases , testCase {
testType : serverTest ,
name : "SigningHash-ServerKeyExchange-Sign-" + hash . name ,
config : Config {
CipherSuites : [ ] uint16 { TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 } ,
SignatureAndHashes : [ ] signatureAndHash {
{ signatureRSA , 42 } ,
{ signatureRSA , hash . id } ,
{ signatureRSA , 255 } ,
} ,
} ,
} )
}
// Test that hash resolution takes the signature type into account.
testCases = append ( testCases , testCase {
name : "SigningHash-ClientAuth-SignatureType" ,
config : Config {
ClientAuth : RequireAnyClientCert ,
SignatureAndHashes : [ ] signatureAndHash {
{ signatureECDSA , hashSHA512 } ,
{ signatureRSA , hashSHA384 } ,
{ signatureECDSA , hashSHA1 } ,
} ,
} ,
flags : [ ] string {
2015-06-15 23:35:05 +01:00
"-cert-file" , path . Join ( * resourceDir , rsaCertificateFile ) ,
"-key-file" , path . Join ( * resourceDir , rsaKeyFile ) ,
2014-11-14 06:43:59 +00:00
} ,
} )
testCases = append ( testCases , testCase {
testType : serverTest ,
name : "SigningHash-ServerKeyExchange-SignatureType" ,
config : Config {
CipherSuites : [ ] uint16 { TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 } ,
SignatureAndHashes : [ ] signatureAndHash {
{ signatureECDSA , hashSHA512 } ,
{ signatureRSA , hashSHA384 } ,
{ signatureECDSA , hashSHA1 } ,
} ,
} ,
} )
// Test that, if the list is missing, the peer falls back to SHA-1.
testCases = append ( testCases , testCase {
name : "SigningHash-ClientAuth-Fallback" ,
config : Config {
ClientAuth : RequireAnyClientCert ,
SignatureAndHashes : [ ] signatureAndHash {
{ signatureRSA , hashSHA1 } ,
} ,
Bugs : ProtocolBugs {
NoSignatureAndHashes : true ,
} ,
} ,
flags : [ ] string {
2015-06-15 23:35:05 +01:00
"-cert-file" , path . Join ( * resourceDir , rsaCertificateFile ) ,
"-key-file" , path . Join ( * resourceDir , rsaKeyFile ) ,
2014-11-14 06:43:59 +00:00
} ,
} )
testCases = append ( testCases , testCase {
testType : serverTest ,
name : "SigningHash-ServerKeyExchange-Fallback" ,
config : Config {
CipherSuites : [ ] uint16 { TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 } ,
SignatureAndHashes : [ ] signatureAndHash {
{ signatureRSA , hashSHA1 } ,
} ,
Bugs : ProtocolBugs {
NoSignatureAndHashes : true ,
} ,
} ,
} )
2015-03-16 21:49:43 +00:00
// Test that hash preferences are enforced. BoringSSL defaults to
// rejecting MD5 signatures.
testCases = append ( testCases , testCase {
testType : serverTest ,
name : "SigningHash-ClientAuth-Enforced" ,
config : Config {
Certificates : [ ] Certificate { rsaCertificate } ,
SignatureAndHashes : [ ] signatureAndHash {
{ signatureRSA , hashMD5 } ,
// Advertise SHA-1 so the handshake will
// proceed, but the shim's preferences will be
// ignored in CertificateVerify generation, so
// MD5 will be chosen.
{ signatureRSA , hashSHA1 } ,
} ,
Bugs : ProtocolBugs {
IgnorePeerSignatureAlgorithmPreferences : true ,
} ,
} ,
flags : [ ] string { "-require-any-client-certificate" } ,
shouldFail : true ,
expectedError : ":WRONG_SIGNATURE_TYPE:" ,
} )
testCases = append ( testCases , testCase {
name : "SigningHash-ServerKeyExchange-Enforced" ,
config : Config {
CipherSuites : [ ] uint16 { TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 } ,
SignatureAndHashes : [ ] signatureAndHash {
{ signatureRSA , hashMD5 } ,
} ,
Bugs : ProtocolBugs {
IgnorePeerSignatureAlgorithmPreferences : true ,
} ,
} ,
shouldFail : true ,
expectedError : ":WRONG_SIGNATURE_TYPE:" ,
} )
2014-11-14 06:43:59 +00:00
}
Add DTLS timeout and retransmit tests.
This extends the packet adaptor protocol to send three commands:
type command =
| Packet of []byte
| Timeout of time.Duration
| TimeoutAck
When the shim processes a Timeout in BIO_read, it sends TimeoutAck, fails the
BIO_read, returns out of the SSL stack, advances the clock, calls
DTLSv1_handle_timeout, and continues.
If the Go side sends Timeout right between sending handshake flight N and
reading flight N+1, the shim won't read the Timeout until it has sent flight
N+1 (it only processes packet commands in BIO_read), so the TimeoutAck comes
after N+1. Go then drops all packets before the TimeoutAck, thus dropping one
transmit of flight N+1 without having to actually process the packets to
determine the end of the flight. The shim then sees the updated clock, calls
DTLSv1_handle_timeout, and re-sends flight N+1 for Go to process for real.
When dropping packets, Go checks the epoch and increments sequence numbers so
that we can continue to be strict here. This requires tracking the initial
sequence number of the next epoch.
The final Finished message takes an additional special-case to test. DTLS
triggers retransmits on either a timeout or seeing a stale flight. OpenSSL only
implements the former which should be sufficient (and is necessary) EXCEPT for
the final Finished message. If the peer's final Finished message is lost, it
won't be waiting for a message from us, so it won't time out anything. That
retransmit must be triggered on stale message, so we retransmit the Finished
message in Go.
Change-Id: I3ffbdb1de525beb2ee831b304670a3387877634c
Reviewed-on: https://boringssl-review.googlesource.com/3212
Reviewed-by: Adam Langley <agl@google.com>
2015-01-27 06:09:43 +00:00
// timeouts is the retransmit schedule for BoringSSL. It doubles and
// caps at 60 seconds. On the 13th timeout, it gives up.
var timeouts = [ ] time . Duration {
1 * time . Second ,
2 * time . Second ,
4 * time . Second ,
8 * time . Second ,
16 * time . Second ,
32 * time . Second ,
60 * time . Second ,
60 * time . Second ,
60 * time . Second ,
60 * time . Second ,
60 * time . Second ,
60 * time . Second ,
60 * time . Second ,
}
func addDTLSRetransmitTests ( ) {
// Test that this is indeed the timeout schedule. Stress all
// four patterns of handshake.
for i := 1 ; i < len ( timeouts ) ; i ++ {
number := strconv . Itoa ( i )
testCases = append ( testCases , testCase {
protocol : dtls ,
name : "DTLS-Retransmit-Client-" + number ,
config : Config {
Bugs : ProtocolBugs {
TimeoutSchedule : timeouts [ : i ] ,
} ,
} ,
resumeSession : true ,
flags : [ ] string { "-async" } ,
} )
testCases = append ( testCases , testCase {
protocol : dtls ,
testType : serverTest ,
name : "DTLS-Retransmit-Server-" + number ,
config : Config {
Bugs : ProtocolBugs {
TimeoutSchedule : timeouts [ : i ] ,
} ,
} ,
resumeSession : true ,
flags : [ ] string { "-async" } ,
} )
}
// Test that exceeding the timeout schedule hits a read
// timeout.
testCases = append ( testCases , testCase {
protocol : dtls ,
name : "DTLS-Retransmit-Timeout" ,
config : Config {
Bugs : ProtocolBugs {
TimeoutSchedule : timeouts ,
} ,
} ,
resumeSession : true ,
flags : [ ] string { "-async" } ,
shouldFail : true ,
expectedError : ":READ_TIMEOUT_EXPIRED:" ,
} )
// Test that timeout handling has a fudge factor, due to API
// problems.
testCases = append ( testCases , testCase {
protocol : dtls ,
name : "DTLS-Retransmit-Fudge" ,
config : Config {
Bugs : ProtocolBugs {
TimeoutSchedule : [ ] time . Duration {
timeouts [ 0 ] - 10 * time . Millisecond ,
} ,
} ,
} ,
resumeSession : true ,
flags : [ ] string { "-async" } ,
} )
2015-03-03 00:01:16 +00:00
// Test that the final Finished retransmitting isn't
// duplicated if the peer badly fragments everything.
testCases = append ( testCases , testCase {
testType : serverTest ,
protocol : dtls ,
name : "DTLS-Retransmit-Fragmented" ,
config : Config {
Bugs : ProtocolBugs {
TimeoutSchedule : [ ] time . Duration { timeouts [ 0 ] } ,
MaxHandshakeRecordLength : 2 ,
} ,
} ,
flags : [ ] string { "-async" } ,
} )
Add DTLS timeout and retransmit tests.
This extends the packet adaptor protocol to send three commands:
type command =
| Packet of []byte
| Timeout of time.Duration
| TimeoutAck
When the shim processes a Timeout in BIO_read, it sends TimeoutAck, fails the
BIO_read, returns out of the SSL stack, advances the clock, calls
DTLSv1_handle_timeout, and continues.
If the Go side sends Timeout right between sending handshake flight N and
reading flight N+1, the shim won't read the Timeout until it has sent flight
N+1 (it only processes packet commands in BIO_read), so the TimeoutAck comes
after N+1. Go then drops all packets before the TimeoutAck, thus dropping one
transmit of flight N+1 without having to actually process the packets to
determine the end of the flight. The shim then sees the updated clock, calls
DTLSv1_handle_timeout, and re-sends flight N+1 for Go to process for real.
When dropping packets, Go checks the epoch and increments sequence numbers so
that we can continue to be strict here. This requires tracking the initial
sequence number of the next epoch.
The final Finished message takes an additional special-case to test. DTLS
triggers retransmits on either a timeout or seeing a stale flight. OpenSSL only
implements the former which should be sufficient (and is necessary) EXCEPT for
the final Finished message. If the peer's final Finished message is lost, it
won't be waiting for a message from us, so it won't time out anything. That
retransmit must be triggered on stale message, so we retransmit the Finished
message in Go.
Change-Id: I3ffbdb1de525beb2ee831b304670a3387877634c
Reviewed-on: https://boringssl-review.googlesource.com/3212
Reviewed-by: Adam Langley <agl@google.com>
2015-01-27 06:09:43 +00:00
}
2015-04-03 09:06:36 +01:00
func addExportKeyingMaterialTests ( ) {
for _ , vers := range tlsVersions {
if vers . version == VersionSSL30 {
continue
}
testCases = append ( testCases , testCase {
name : "ExportKeyingMaterial-" + vers . name ,
config : Config {
MaxVersion : vers . version ,
} ,
exportKeyingMaterial : 1024 ,
exportLabel : "label" ,
exportContext : "context" ,
useExportContext : true ,
} )
testCases = append ( testCases , testCase {
name : "ExportKeyingMaterial-NoContext-" + vers . name ,
config : Config {
MaxVersion : vers . version ,
} ,
exportKeyingMaterial : 1024 ,
} )
testCases = append ( testCases , testCase {
name : "ExportKeyingMaterial-EmptyContext-" + vers . name ,
config : Config {
MaxVersion : vers . version ,
} ,
exportKeyingMaterial : 1024 ,
useExportContext : true ,
} )
testCases = append ( testCases , testCase {
name : "ExportKeyingMaterial-Small-" + vers . name ,
config : Config {
MaxVersion : vers . version ,
} ,
exportKeyingMaterial : 1 ,
exportLabel : "label" ,
exportContext : "context" ,
useExportContext : true ,
} )
}
testCases = append ( testCases , testCase {
name : "ExportKeyingMaterial-SSL3" ,
config : Config {
MaxVersion : VersionSSL30 ,
} ,
exportKeyingMaterial : 1024 ,
exportLabel : "label" ,
exportContext : "context" ,
useExportContext : true ,
shouldFail : true ,
expectedError : "failed to export keying material" ,
} )
}
2015-06-03 17:57:23 +01:00
func addTLSUniqueTests ( ) {
for _ , isClient := range [ ] bool { false , true } {
for _ , isResumption := range [ ] bool { false , true } {
for _ , hasEMS := range [ ] bool { false , true } {
var suffix string
if isResumption {
suffix = "Resume-"
} else {
suffix = "Full-"
}
if hasEMS {
suffix += "EMS-"
} else {
suffix += "NoEMS-"
}
if isClient {
suffix += "Client"
} else {
suffix += "Server"
}
test := testCase {
name : "TLSUnique-" + suffix ,
testTLSUnique : true ,
config : Config {
Bugs : ProtocolBugs {
NoExtendedMasterSecret : ! hasEMS ,
} ,
} ,
}
if isResumption {
test . resumeSession = true
test . resumeConfig = & Config {
Bugs : ProtocolBugs {
NoExtendedMasterSecret : ! hasEMS ,
} ,
}
}
if isResumption && ! hasEMS {
test . shouldFail = true
test . expectedError = "failed to get tls-unique"
}
testCases = append ( testCases , test )
}
}
}
}
2015-06-15 23:35:05 +01:00
func worker ( statusChan chan statusMsg , c chan * testCase , shimPath string , wg * sync . WaitGroup ) {
2014-06-20 20:00:00 +01:00
defer wg . Done ( )
for test := range c {
2014-11-18 01:26:55 +00:00
var err error
if * mallocTest < 0 {
statusChan <- statusMsg { test : test , started : true }
2015-06-15 23:35:05 +01:00
err = runTest ( test , shimPath , - 1 )
2014-11-18 01:26:55 +00:00
} else {
for mallocNumToFail := int64 ( * mallocTest ) ; ; mallocNumToFail ++ {
statusChan <- statusMsg { test : test , started : true }
2015-06-15 23:35:05 +01:00
if err = runTest ( test , shimPath , mallocNumToFail ) ; err != errMoreMallocs {
2014-11-18 01:26:55 +00:00
if err != nil {
fmt . Printf ( "\n\nmalloc test failed at %d: %s\n" , mallocNumToFail , err )
}
break
}
}
}
2014-06-20 20:00:00 +01:00
statusChan <- statusMsg { test : test , err : err }
}
}
type statusMsg struct {
test * testCase
started bool
err error
}
2015-02-11 22:14:15 +00:00
func statusPrinter ( doneChan chan * testOutput , statusChan chan statusMsg , total int ) {
2014-06-20 20:00:00 +01:00
var started , done , failed , lineLen int
2015-02-11 22:14:15 +00:00
testOutput := newTestOutput ( )
2014-06-20 20:00:00 +01:00
for msg := range statusChan {
2015-02-11 22:14:15 +00:00
if ! * pipe {
// Erase the previous status line.
Use TCP sockets rather than socketpairs in the SSL tests.
This involves more synchronization with child exits as the kernel no longer
closes the pre-created pipes for free, but it works on Windows. As long as
TCP_NODELAY is set, the performance seems comparable. Though it does involve
dealing with graceful socket shutdown. I couldn't get that to work on Windows
without draining the socket; not even SO_LINGER worked. Current (untested)
theory is that Windows refuses to gracefully shutdown a socket if the peer
sends data after we've stopped reading.
cmd.ExtraFiles doesn't work on Windows; it doesn't use fds natively, so you
can't pass fds 4 and 5. (stdin/stdout/stderr are special slots in
CreateProcess.) We can instead use the syscall module directly and mark handles
as inheritable (and then pass the numerical values out-of-band), but that
requires synchronizing all of our shim.Start() calls and assuming no other
thread is spawning a process.
PROC_THREAD_ATTRIBUTE_HANDLE_LIST fixes threading problems, but requires
wrapping more syscalls. exec.Cmd also doesn't let us launch the process
ourselves. Plus it still requires every handle in the list be marked
inheritable, so it doesn't help if some other thread is launching a process
with bInheritHandles TRUE but NOT using PROC_THREAD_ATTRIBUTE_HANDLE_LIST.
(Like Go, though we can take syscall.ForkLock there.)
http://blogs.msdn.com/b/oldnewthing/archive/2011/12/16/10248328.aspx
The more natively Windows option seems to be named pipes, but that too requires
wrapping more system calls. (To be fair, that isn't too painful.) They also
involve a listening server, so we'd still have to synchronize with shim.Wait()
a la net.TCPListener.
Then there's DuplicateHandle, but then we need an out-of-band signal.
All in all, one cross-platform implementation with a TCP sockets seems
simplest.
Change-Id: I38233e309a0fa6814baf61e806732138902347c0
Reviewed-on: https://boringssl-review.googlesource.com/3563
Reviewed-by: Adam Langley <agl@google.com>
2015-02-21 06:54:29 +00:00
var erase string
for i := 0 ; i < lineLen ; i ++ {
erase += "\b \b"
}
fmt . Print ( erase )
2015-02-11 22:14:15 +00:00
}
2014-06-20 20:00:00 +01:00
if msg . started {
started ++
} else {
done ++
2015-02-11 22:14:15 +00:00
if msg . err != nil {
fmt . Printf ( "FAILED (%s)\n%s\n" , msg . test . name , msg . err )
failed ++
testOutput . addResult ( msg . test . name , "FAIL" )
} else {
if * pipe {
// Print each test instead of a status line.
fmt . Printf ( "PASSED (%s)\n" , msg . test . name )
}
testOutput . addResult ( msg . test . name , "PASS" )
}
}
2014-06-20 20:00:00 +01:00
2015-02-11 22:14:15 +00:00
if ! * pipe {
// Print a new status line.
line := fmt . Sprintf ( "%d/%d/%d/%d" , failed , done , started , total )
lineLen = len ( line )
os . Stdout . WriteString ( line )
2014-06-20 20:00:00 +01:00
}
}
2015-02-11 22:14:15 +00:00
doneChan <- testOutput
2014-06-20 20:00:00 +01:00
}
func main ( ) {
flag . Parse ( )
2015-06-15 23:35:05 +01:00
* resourceDir = path . Clean ( * resourceDir )
2014-06-20 20:00:00 +01:00
2015-06-15 23:35:05 +01:00
addBasicTests ( )
2014-06-20 20:00:00 +01:00
addCipherSuiteTests ( )
addBadECDSASignatureTests ( )
2014-06-20 20:00:00 +01:00
addCBCPaddingTests ( )
2014-08-05 23:23:37 +01:00
addCBCSplittingTests ( )
2014-07-08 22:59:18 +01:00
addClientAuthTests ( )
2015-02-21 00:04:00 +00:00
addDDoSCallbackTests ( )
2014-08-07 22:44:24 +01:00
addVersionNegotiationTests ( )
2014-12-13 04:44:33 +00:00
addMinimumVersionTests ( )
2014-08-31 05:59:27 +01:00
addD5BugTests ( )
2014-09-06 17:45:15 +01:00
addExtensionTests ( )
2014-09-24 20:21:44 +01:00
addResumptionVersionTests ( )
2014-10-11 00:23:43 +01:00
addExtendedMasterSecretTests ( )
2014-10-29 00:29:33 +00:00
addRenegotiationTests ( )
2014-11-07 06:48:35 +00:00
addDTLSReplayTests ( )
2014-11-14 06:43:59 +00:00
addSigningHashTests ( )
2014-11-22 06:47:56 +00:00
addFastRadioPaddingTests ( )
Add DTLS timeout and retransmit tests.
This extends the packet adaptor protocol to send three commands:
type command =
| Packet of []byte
| Timeout of time.Duration
| TimeoutAck
When the shim processes a Timeout in BIO_read, it sends TimeoutAck, fails the
BIO_read, returns out of the SSL stack, advances the clock, calls
DTLSv1_handle_timeout, and continues.
If the Go side sends Timeout right between sending handshake flight N and
reading flight N+1, the shim won't read the Timeout until it has sent flight
N+1 (it only processes packet commands in BIO_read), so the TimeoutAck comes
after N+1. Go then drops all packets before the TimeoutAck, thus dropping one
transmit of flight N+1 without having to actually process the packets to
determine the end of the flight. The shim then sees the updated clock, calls
DTLSv1_handle_timeout, and re-sends flight N+1 for Go to process for real.
When dropping packets, Go checks the epoch and increments sequence numbers so
that we can continue to be strict here. This requires tracking the initial
sequence number of the next epoch.
The final Finished message takes an additional special-case to test. DTLS
triggers retransmits on either a timeout or seeing a stale flight. OpenSSL only
implements the former which should be sufficient (and is necessary) EXCEPT for
the final Finished message. If the peer's final Finished message is lost, it
won't be waiting for a message from us, so it won't time out anything. That
retransmit must be triggered on stale message, so we retransmit the Finished
message in Go.
Change-Id: I3ffbdb1de525beb2ee831b304670a3387877634c
Reviewed-on: https://boringssl-review.googlesource.com/3212
Reviewed-by: Adam Langley <agl@google.com>
2015-01-27 06:09:43 +00:00
addDTLSRetransmitTests ( )
2015-04-03 09:06:36 +01:00
addExportKeyingMaterialTests ( )
2015-06-03 17:57:23 +01:00
addTLSUniqueTests ( )
2014-08-05 07:28:57 +01:00
for _ , async := range [ ] bool { false , true } {
for _ , splitHandshake := range [ ] bool { false , true } {
2014-08-11 23:43:38 +01:00
for _ , protocol := range [ ] protocol { tls , dtls } {
addStateMachineCoverageTests ( async , splitHandshake , protocol )
}
2014-08-05 07:28:57 +01:00
}
}
2014-06-20 20:00:00 +01:00
var wg sync . WaitGroup
2015-06-15 23:35:05 +01:00
statusChan := make ( chan statusMsg , * numWorkers )
testChan := make ( chan * testCase , * numWorkers )
2015-02-11 22:14:15 +00:00
doneChan := make ( chan * testOutput )
2014-06-20 20:00:00 +01:00
2014-07-02 00:53:04 +01:00
go statusPrinter ( doneChan , statusChan , len ( testCases ) )
2014-06-20 20:00:00 +01:00
2015-06-15 23:35:05 +01:00
for i := 0 ; i < * numWorkers ; i ++ {
2014-06-20 20:00:00 +01:00
wg . Add ( 1 )
2015-06-15 23:35:05 +01:00
go worker ( statusChan , testChan , * shimPath , & wg )
2014-06-20 20:00:00 +01:00
}
2014-07-02 00:53:04 +01:00
for i := range testCases {
2015-06-15 23:35:05 +01:00
if len ( * testToRun ) == 0 || * testToRun == testCases [ i ] . name {
2014-07-02 00:53:04 +01:00
testChan <- & testCases [ i ]
2014-06-20 20:00:00 +01:00
}
}
close ( testChan )
wg . Wait ( )
close ( statusChan )
2015-02-11 22:14:15 +00:00
testOutput := <- doneChan
2014-06-20 20:00:00 +01:00
fmt . Printf ( "\n" )
2015-02-11 22:14:15 +00:00
if * jsonOutput != "" {
if err := testOutput . writeTo ( * jsonOutput ) ; err != nil {
fmt . Fprintf ( os . Stderr , "Error: %s\n" , err )
}
}
2015-04-04 22:02:18 +01:00
if ! testOutput . allPassed {
os . Exit ( 1 )
}
2014-06-20 20:00:00 +01:00
}