diff options
author | Nikos Mavrogiannopoulos <nmav@redhat.com> | 2016-02-18 14:18:04 +0100 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@redhat.com> | 2016-02-18 14:28:18 +0100 |
commit | 95537f79ba010a1b84e4f8eceee7a7b51a26f85a (patch) | |
tree | 962ac54755aa996aed67e627ce0f02864156504d | |
parent | dbe7970417c8c4eb3c1a6a3104df3dedb0f49a5c (diff) | |
download | gnutls-95537f79ba010a1b84e4f8eceee7a7b51a26f85a.tar.gz |
tests: verify that we do not allow rehandshakes without ext master
That is, if we have an initial session which uses the extended master
secret do not allow subsequent rehandshakes to skip it.
-rw-r--r-- | tests/Makefile.am | 2 | ||||
-rw-r--r-- | tests/rehandshake-ext-secret.c | 148 |
2 files changed, 149 insertions, 1 deletions
diff --git a/tests/Makefile.am b/tests/Makefile.am index 94897aacdd..7f0bd53243 100644 --- a/tests/Makefile.am +++ b/tests/Makefile.am @@ -95,7 +95,7 @@ ctests = mini-record-2 simple gc set_pkcs12_cred certder certuniqueid \ rehandshake-switch-cert rehandshake-switch-cert-allow rehandshake-switch-cert-client \ rehandshake-switch-cert-client-allow handshake-versions dtls-handshake-versions \ dtls-max-record tls-max-record alpn-server-prec ocsp-filename-memleak \ - dh-params + dh-params rehandshake-ext-secret if HAVE_SECCOMP_TESTS ctests += dtls-with-seccomp tls-with-seccomp dtls-client-with-seccomp tls-client-with-seccomp diff --git a/tests/rehandshake-ext-secret.c b/tests/rehandshake-ext-secret.c new file mode 100644 index 0000000000..8db123d46c --- /dev/null +++ b/tests/rehandshake-ext-secret.c @@ -0,0 +1,148 @@ +/* + * Copyright (C) 2016 Red Hat, Inc. + * + * Author: Nikos Mavrogiannopoulos + * + * This file is part of GnuTLS. + * + * GnuTLS is free software; you can redistribute it and/or modify it + * under the terms of the GNU General Public License as published by + * the Free Software Foundation; either version 3 of the License, or + * (at your option) any later version. + * + * GnuTLS is distributed in the hope that it will be useful, but + * WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + * General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with GnuTLS; if not, write to the Free Software Foundation, + * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA + */ + +#ifdef HAVE_CONFIG_H +#include <config.h> +#endif + +#include <stdio.h> +#include <stdlib.h> +#include <string.h> +#include <errno.h> +#include <gnutls/gnutls.h> +#include "utils.h" +#include "eagain-common.h" +#include "cert-common.h" + +/* This program tests whether rehandshake without ext master secret works + * even if ext master secret was used initially. + * + * Note that we do not fail gracefully and we simply continue as if + * the extension is still valid. This violates the letter of RFC7627. + */ + +const char *side = ""; + +static void tls_log_func(int level, const char *str) +{ + fprintf(stderr, "%s|<%d>| %s", side, level, str); +} + +static void try(unsigned onclient) +{ + int exit_code = EXIT_SUCCESS; + /* Server stuff. */ + gnutls_certificate_credentials_t serverx509cred; + gnutls_session_t server; + int sret = GNUTLS_E_AGAIN; + /* Client stuff. */ + gnutls_certificate_credentials_t clientx509cred; + gnutls_session_t client; + int cret = GNUTLS_E_AGAIN; + + /* General init. */ + global_init(); + gnutls_global_set_log_function(tls_log_func); + if (debug) + gnutls_global_set_log_level(7); + + /* Init server */ + gnutls_certificate_allocate_credentials(&serverx509cred); + gnutls_certificate_set_x509_key_mem(serverx509cred, + &server_cert, &server_key, + GNUTLS_X509_FMT_PEM); + gnutls_init(&server, GNUTLS_SERVER); + gnutls_credentials_set(server, GNUTLS_CRD_CERTIFICATE, + serverx509cred); + gnutls_priority_set_direct(server, "NORMAL", NULL); + gnutls_transport_set_push_function(server, server_push); + gnutls_transport_set_pull_function(server, server_pull); + gnutls_transport_set_ptr(server, server); + + /* Init client */ + gnutls_certificate_allocate_credentials(&clientx509cred); + gnutls_init(&client, GNUTLS_CLIENT); + gnutls_credentials_set(client, GNUTLS_CRD_CERTIFICATE, + clientx509cred); + gnutls_priority_set_direct(client, "NORMAL", NULL); + gnutls_transport_set_push_function(client, client_push); + gnutls_transport_set_pull_function(client, client_pull); + gnutls_transport_set_ptr(client, client); + + HANDSHAKE(client, server); + + if (gnutls_session_ext_master_secret_status(server) == 0) { + fail("%d: ext master secret was not detected by server\n", onclient); + } + + if (gnutls_session_ext_master_secret_status(client) == 0) { + fail("%d: ext master secret was not detected by client\n", onclient); + } + + if (onclient) + gnutls_priority_set_direct(client, "NORMAL:%NO_SESSION_HASH", NULL); + else + gnutls_priority_set_direct(server, "NORMAL:%NO_SESSION_HASH", NULL); + + sret = gnutls_rehandshake(server); + if (debug) { + tls_log_func(0, "gnutls_rehandshake (server)...\n"); + tls_log_func(0, gnutls_strerror(sret)); + tls_log_func(0, "\n"); + } + + { + ssize_t n; + char b[1]; + n = gnutls_record_recv(client, b, 1); + if (n != GNUTLS_E_REHANDSHAKE) + abort(); + } + + if (onclient) { + HANDSHAKE_EXPECT(client, server, GNUTLS_E_AGAIN, GNUTLS_E_DECRYPTION_FAILED); + } else { + HANDSHAKE_EXPECT(client, server, GNUTLS_E_AGAIN, GNUTLS_E_DECRYPTION_FAILED); + } + + gnutls_deinit(client); + gnutls_deinit(server); + + gnutls_certificate_free_credentials(serverx509cred); + gnutls_certificate_free_credentials(clientx509cred); + + gnutls_global_deinit(); + + if (debug) { + if (exit_code == 0) + puts("Self-test successful"); + else + puts("Self-test failed"); + } +} + +void doit(void) +{ + try(0); + reset_buffers(); + try(1); +} |