/* * Copyright (C) 2000-2012 Free Software Foundation, Inc. * * This file is part of GnuTLS. * * GnuTLS is free software: you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. * * GnuTLS is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program. If not, see * . */ #include #include #include #ifndef _WIN32 #include #include #else #include #endif #include #include #include #include #include void _gnutls_record_set_default_version(gnutls_session_t session, unsigned char major, unsigned char minor); void _gnutls_hello_set_default_version(gnutls_session_t session, unsigned char major, unsigned char minor); extern gnutls_srp_client_credentials_t srp_cred; extern gnutls_anon_client_credentials_t anon_cred; extern gnutls_certificate_credentials_t xcred; extern unsigned int verbose; const char *ext_text = ""; int tls_ext_ok = 1; int tls1_ok = 0; int ssl3_ok = 0; int tls1_1_ok = 0; int tls1_2_ok = 0; /* keep session info */ static char *session_data = NULL; static char session_id[32]; static size_t session_data_size = 0, session_id_size = 0; static int sfree = 0; static int handshake_output = 0; static int do_handshake(gnutls_session_t session) { int ret, alert; do { ret = gnutls_handshake(session); } while (ret < 0 && gnutls_error_is_fatal(ret) == 0); handshake_output = ret; if (ret < 0 && verbose > 1) { if (ret == GNUTLS_E_FATAL_ALERT_RECEIVED) { alert = gnutls_alert_get(session); printf("\n"); printf("*** Received alert [%d]: %s\n", alert, gnutls_alert_get_name(alert)); } } if (ret < 0) return TEST_FAILED; gnutls_session_get_data(session, NULL, &session_data_size); if (sfree != 0) { free(session_data); sfree = 0; } session_data = malloc(session_data_size); sfree = 1; if (session_data == NULL) { fprintf(stderr, "Memory error\n"); exit(1); } gnutls_session_get_data(session, session_data, &session_data_size); session_id_size = sizeof(session_id); gnutls_session_get_id(session, session_id, &session_id_size); return TEST_SUCCEED; } char protocol_str[] = "+VERS-TLS1.2:+VERS-TLS1.1:+VERS-TLS1.0:+VERS-SSL3.0"; char protocol_all_str[] = "+VERS-TLS1.2:+VERS-TLS1.1:+VERS-TLS1.0:+VERS-SSL3.0"; char prio_str[512] = ""; #define ALL_CIPHERS "+AES-128-GCM:+CAMELLIA-128-GCM:+AES-128-CBC:+CAMELLIA-128-CBC:+3DES-CBC:+ARCFOUR-128:+ARCFOUR-40" #define BLOCK_CIPHERS "+3DES-CBC:+AES-128-CBC:+CAMELLIA-128-CBC" #define ALL_COMP "+COMP-NULL" #define ALL_MACS "+SHA1:+MD5" #define ALL_CERTTYPES "+CTYPE-X509" #define ALL_KX "+RSA:+DHE-RSA:+DHE-DSS:+ANON-DH:+ECDHE-RSA:+ECDHE-ECDSA:+ANON-ECDH" #define INIT_STR "NONE:" char rest[128] = "%UNSAFE_RENEGOTIATION:+SIGN-ALL:+CURVE-ALL"; static inline void _gnutls_priority_set_direct(gnutls_session_t session, const char *str) { const char *err; int ret = gnutls_priority_set_direct(session, str, &err); if (ret < 0) { fprintf(stderr, "Error with string %s\n", str); fprintf(stderr, "Error at %s: %s\n", err, gnutls_strerror(ret)); exit(1); } } test_code_t test_server(gnutls_session_t session) { int ret, i = 0; static char buf[5 * 1024]; char *p; const char snd_buf[] = "GET / HTTP/1.0\r\n\r\n"; buf[sizeof(buf) - 1] = 0; sprintf(prio_str, INIT_STR ALL_CIPHERS ":" ALL_COMP ":" ALL_CERTTYPES ":%s:" ALL_MACS ":" ALL_KX ":" "%s", protocol_str, rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); ret = do_handshake(session); if (ret != TEST_SUCCEED) return TEST_FAILED; gnutls_record_send(session, snd_buf, sizeof(snd_buf) - 1); ret = gnutls_record_recv(session, buf, sizeof(buf) - 1); if (ret < 0) return TEST_FAILED; ext_text = "unknown"; p = strstr(buf, "Server:"); if (p != NULL) { p+=7; if (*p == ' ') p++; ext_text = p; while (*p != 0 && *p != '\r' && *p != '\n') { p++; i++; if (i > 128) break; } *p = 0; } return TEST_SUCCEED; } static gnutls_datum_t pubkey = { NULL, 0 }; static gnutls_ecc_curve_t curve = GNUTLS_ECC_CURVE_INVALID; test_code_t test_dhe(gnutls_session_t session) { int ret; sprintf(prio_str, INIT_STR ALL_CIPHERS ":" ALL_COMP ":" ALL_CERTTYPES ":%s:" ALL_MACS ":+DHE-RSA:+DHE-DSS:%s", protocol_str, rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); ret = do_handshake(session); gnutls_dh_get_pubkey(session, &pubkey); return ret; } test_code_t test_ecdhe(gnutls_session_t session) { int ret; if (tls_ext_ok == 0) return TEST_IGNORE; sprintf(prio_str, INIT_STR ALL_CIPHERS ":" ALL_COMP ":" ALL_CERTTYPES ":%s:" ALL_MACS ":+ECDHE-RSA:+ECDHE-ECDSA:+CURVE-ALL:%s", protocol_all_str, rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); ret = do_handshake(session); if (ret < 0) return TEST_FAILED; curve = gnutls_ecc_curve_get(session); return ret; } test_code_t test_safe_renegotiation(gnutls_session_t session) { int ret; if (tls_ext_ok == 0) return TEST_IGNORE; sprintf(prio_str, INIT_STR ALL_CIPHERS ":" ALL_COMP ":" ALL_CERTTYPES ":%s:" ALL_MACS ":" ALL_KX ":%s:%%SAFE_RENEGOTIATION", rest, protocol_str); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); ret = do_handshake(session); return ret; } #ifdef ENABLE_OCSP test_code_t test_ocsp_status(gnutls_session_t session) { int ret; gnutls_datum_t resp; if (tls_ext_ok == 0) return TEST_IGNORE; sprintf(prio_str, INIT_STR ALL_CIPHERS ":" ALL_COMP ":" ALL_CERTTYPES ":%s:" ALL_MACS ":" ALL_KX":%s", protocol_str, rest); _gnutls_priority_set_direct(session, prio_str); gnutls_ocsp_status_request_enable_client(session, NULL, 0, NULL); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); ret = do_handshake(session); if (ret < 0) return TEST_FAILED; ret = gnutls_ocsp_status_request_get(session, &resp); if (ret == 0) return TEST_SUCCEED; return TEST_FAILED; } #endif test_code_t test_safe_renegotiation_scsv(gnutls_session_t session) { int ret; if (ssl3_ok == 0) return TEST_IGNORE; sprintf(prio_str, INIT_STR ALL_CIPHERS ":" ALL_COMP ":" ALL_CERTTYPES ":+VERS-SSL3.0:" ALL_MACS ":" ALL_KX ":%%SAFE_RENEGOTIATION"); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); ret = do_handshake(session); return ret; } test_code_t test_dhe_group(gnutls_session_t session) { int ret, ret2; gnutls_datum_t gen, prime, pubkey2; const char *print; FILE *fp; remove("debug-dh.out"); if (verbose == 0 || pubkey.data == NULL) return TEST_IGNORE; sprintf(prio_str, INIT_STR ALL_CIPHERS ":" ALL_COMP ":" ALL_CERTTYPES ":%s:" ALL_MACS ":+DHE-RSA:+DHE-DSS:%s", protocol_str, rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); ret = do_handshake(session); ret2 = gnutls_dh_get_group(session, &gen, &prime); if (ret2 >= 0) { fp = fopen("debug-dh.out", "w"); if (fp == NULL) return TEST_FAILED; ext_text = "saved in debug-dh.out"; print = raw_to_string(gen.data, gen.size); if (print) { fprintf(fp, " Generator [%d bits]: %s\n", gen.size * 8, print); } print = raw_to_string(prime.data, prime.size); if (print) { fprintf(fp, " Prime [%d bits]: %s\n", prime.size * 8, print); } gnutls_dh_get_pubkey(session, &pubkey2); print = raw_to_string(pubkey2.data, pubkey2.size); if (print) { fprintf(fp, " Pubkey [%d bits]: %s\n", pubkey2.size * 8, print); } if (pubkey2.data && pubkey2.size == pubkey.size && memcmp(pubkey.data, pubkey2.data, pubkey.size) == 0) { fprintf (fp, " (public key seems to be static among sessions)\n"); } { /* save the PKCS #3 params */ gnutls_dh_params_t dhp; gnutls_datum p3; ret2 = gnutls_dh_params_init(&dhp); if (ret2 < 0) return TEST_FAILED; ret2 = gnutls_dh_params_import_raw(dhp, &prime, &gen); if (ret2 < 0) return TEST_FAILED; ret2 = gnutls_dh_params_export2_pkcs3(dhp, GNUTLS_X509_FMT_PEM, &p3); if (ret2 < 0) return TEST_FAILED; fprintf(fp, "\n%s\n", p3.data); gnutls_free(p3.data); } fclose(fp); } return ret; } test_code_t test_ecdhe_curve(gnutls_session_t session) { if (curve == GNUTLS_ECC_CURVE_INVALID) return TEST_IGNORE; ext_text = gnutls_ecc_curve_get_name(curve); return TEST_SUCCEED; } test_code_t test_ssl3(gnutls_session_t session) { int ret; sprintf(prio_str, INIT_STR ALL_CIPHERS ":" ALL_COMP ":" ALL_CERTTYPES ":+VERS-SSL3.0:" ALL_MACS ":" ALL_KX ":%s", rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); ret = do_handshake(session); if (ret == TEST_SUCCEED) ssl3_ok = 1; return ret; } static int alrm = 0; static void got_alarm(int k) { alrm = 1; } test_code_t test_bye(gnutls_session_t session) { int ret; char data[20]; int secs = 6; #ifndef _WIN32 int old; signal(SIGALRM, got_alarm); #endif sprintf(prio_str, INIT_STR ALL_CIPHERS ":" ALL_COMP ":" ALL_CERTTYPES ":%s:" ALL_MACS ":" ALL_KX ":%s", protocol_str, rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); ret = do_handshake(session); if (ret == TEST_FAILED) return ret; ret = gnutls_bye(session, GNUTLS_SHUT_WR); if (ret < 0) return TEST_FAILED; #ifndef _WIN32 old = siginterrupt(SIGALRM, 1); alarm(secs); #else setsockopt((int) gnutls_transport_get_ptr(session), SOL_SOCKET, SO_RCVTIMEO, (char *) &secs, sizeof(int)); #endif do { ret = gnutls_record_recv(session, data, sizeof(data)); } while (ret > 0); #ifndef _WIN32 siginterrupt(SIGALRM, old); #else if (WSAGetLastError() == WSAETIMEDOUT || WSAGetLastError() == WSAECONNABORTED) alrm = 1; #endif if (ret == 0) return TEST_SUCCEED; if (alrm == 0) return TEST_UNSURE; return TEST_FAILED; } test_code_t test_aes(gnutls_session_t session) { int ret; sprintf(prio_str, INIT_STR "+AES-128-CBC:" ALL_COMP ":" ALL_CERTTYPES ":%s:" ALL_MACS ":" ALL_KX ":%s", protocol_str, rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); ret = do_handshake(session); return ret; } test_code_t test_aes_gcm(gnutls_session_t session) { int ret; sprintf(prio_str, INIT_STR "+AES-128-GCM:+AES-256-GCM:+AEAD:" ALL_COMP ":" ALL_CERTTYPES ":%s:" ALL_MACS ":" ALL_KX ":%s", protocol_all_str, rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); ret = do_handshake(session); return ret; } test_code_t test_camellia_cbc(gnutls_session_t session) { int ret; sprintf(prio_str, INIT_STR "+CAMELLIA-128-CBC:" ALL_COMP ":" ALL_CERTTYPES ":%s:" ALL_MACS ":" ALL_KX ":%s", protocol_str, rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); ret = do_handshake(session); return ret; } test_code_t test_camellia_gcm(gnutls_session_t session) { int ret; sprintf(prio_str, INIT_STR "+CAMELLIA-128-GCM:+AEAD:" ALL_COMP ":" ALL_CERTTYPES ":%s:" ALL_KX ":%s", protocol_str, rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); ret = do_handshake(session); return ret; } test_code_t test_openpgp1(gnutls_session_t session) { int ret; sprintf(prio_str, INIT_STR ALL_CIPHERS ":" ALL_COMP ":+CTYPE-OPENPGP:%s:" ALL_MACS ":" ALL_KX ":%s", protocol_str, rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); ret = do_handshake(session); if (ret == TEST_FAILED) return ret; if (gnutls_certificate_type_get(session) == GNUTLS_CRT_OPENPGP) return TEST_SUCCEED; return TEST_FAILED; } test_code_t test_unknown_ciphersuites(gnutls_session_t session) { int ret; sprintf(prio_str, INIT_STR "+AES-128-CBC:" ALL_CIPHERS ":" ALL_COMP ":" ALL_CERTTYPES ":%s:" ALL_MACS ":" ALL_KX ":%s", protocol_str, rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); ret = do_handshake(session); return ret; } test_code_t test_md5(gnutls_session_t session) { int ret; sprintf(prio_str, INIT_STR "+AES-128-CBC:" ALL_CIPHERS ":" ALL_COMP ":" ALL_CERTTYPES ":%s:+MD5:" ALL_KX ":%s", protocol_str, rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); ret = do_handshake(session); return ret; } #ifdef HAVE_LIBZ test_code_t test_zlib(gnutls_session_t session) { int ret; sprintf(prio_str, INIT_STR ALL_CIPHERS ":+COMP-DEFLATE:" ALL_CERTTYPES ":%s:" ALL_MACS ":" ALL_KX ":%s", protocol_str, rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); ret = do_handshake(session); return ret; } #endif test_code_t test_sha(gnutls_session_t session) { int ret; sprintf(prio_str, INIT_STR "+AES-128-CBC:" ALL_CIPHERS ":" ALL_COMP ":" ALL_CERTTYPES ":%s:+SHA1:" ALL_KX ":%s", protocol_str, rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); ret = do_handshake(session); return ret; } test_code_t test_sha256(gnutls_session_t session) { int ret; sprintf(prio_str, INIT_STR "+AES-128-CBC:" ALL_CIPHERS ":" ALL_COMP ":" ALL_CERTTYPES ":%s:+SHA256:" ALL_KX ":%s", protocol_all_str, rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); ret = do_handshake(session); return ret; } test_code_t test_3des(gnutls_session_t session) { int ret; sprintf(prio_str, INIT_STR "+3DES-CBC:" ALL_COMP ":" ALL_CERTTYPES ":%s:" ALL_MACS ":" ALL_KX ":%s", protocol_str, rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); ret = do_handshake(session); return ret; } test_code_t test_arcfour(gnutls_session_t session) { int ret; sprintf(prio_str, INIT_STR "+ARCFOUR-128:" ALL_COMP ":" ALL_CERTTYPES ":%s:" ALL_MACS ":" ALL_KX ":%s", protocol_str, rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); ret = do_handshake(session); return ret; } test_code_t test_tls1(gnutls_session_t session) { int ret; sprintf(prio_str, INIT_STR ALL_CIPHERS ":" ALL_COMP ":" ALL_CERTTYPES ":+VERS-TLS1.0:%%SSL3_RECORD_VERSION:" ALL_MACS ":" ALL_KX ":%s", rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); ret = do_handshake(session); if (ret == TEST_SUCCEED) tls1_ok = 1; return ret; } test_code_t test_tls1_nossl3(gnutls_session_t session) { int ret; if (tls1_ok != 0) return TEST_IGNORE; sprintf(prio_str, INIT_STR ALL_CIPHERS ":" ALL_COMP ":" ALL_CERTTYPES ":+VERS-TLS1.0:%%LATEST_RECORD_VERSION:" ALL_MACS ":" ALL_KX ":%s", rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); ret = do_handshake(session); if (ret == TEST_SUCCEED) { strcat(rest, ":%LATEST_RECORD_VERSION"); tls1_ok = 1; } return ret; } test_code_t test_record_padding(gnutls_session_t session) { int ret; sprintf(prio_str, INIT_STR BLOCK_CIPHERS ":" ALL_COMP ":" ALL_CERTTYPES ":+VERS-TLS-ALL:-VERS-SSL3.0:" ALL_MACS ":" ALL_KX ":%s", rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); ret = do_handshake(session); if (ret == TEST_SUCCEED) { tls1_ok = 1; } else { strcat(rest, ":%COMPAT"); } return ret; } test_code_t test_no_extensions(gnutls_session_t session) { int ret; sprintf(prio_str, INIT_STR ALL_CIPHERS ":" ALL_COMP ":" ALL_CERTTYPES ":%s:" ALL_MACS ":" ALL_KX ":%s", protocol_str, rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); gnutls_record_set_max_size(session, 4096); ret = do_handshake(session); if (ret == TEST_SUCCEED) { tls_ext_ok = 1; } else { tls_ext_ok = 0; strcat(rest, ":%NO_EXTENSIONS"); } return ret; } test_code_t test_tls1_2(gnutls_session_t session) { int ret; sprintf(prio_str, INIT_STR ALL_CIPHERS ":" ALL_COMP ":" ALL_CERTTYPES ":+VERS-TLS1.2:" ALL_MACS ":" ALL_KX ":%s", rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); ret = do_handshake(session); if (ret == TEST_SUCCEED) tls1_2_ok = 1; return ret; } test_code_t test_tls1_1(gnutls_session_t session) { int ret; sprintf(prio_str, INIT_STR ALL_CIPHERS ":" ALL_COMP ":" ALL_CERTTYPES ":+VERS-TLS1.1:" ALL_MACS ":" ALL_KX ":%s", rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); ret = do_handshake(session); if (ret == TEST_SUCCEED) tls1_1_ok = 1; return ret; } test_code_t test_tls1_1_fallback(gnutls_session_t session) { int ret; if (tls1_1_ok) return TEST_IGNORE; sprintf(prio_str, INIT_STR ALL_CIPHERS ":" ALL_COMP ":" ALL_CERTTYPES ":+VERS-TLS1.1:+VERS-TLS1.0:+VERS-SSL3.0:" ALL_MACS ":" ALL_KX ":%s", rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); ret = do_handshake(session); if (ret != TEST_SUCCEED) return TEST_FAILED; if (gnutls_protocol_get_version(session) == GNUTLS_TLS1) return TEST_SUCCEED; else if (gnutls_protocol_get_version(session) == GNUTLS_SSL3) return TEST_UNSURE; return TEST_FAILED; } /* Advertize both TLS 1.0 and SSL 3.0. If the connection fails, * but the previous SSL 3.0 test succeeded then disable TLS 1.0. */ test_code_t test_tls_disable0(gnutls_session_t session) { int ret; if (tls1_ok != 0) return TEST_IGNORE; sprintf(prio_str, INIT_STR ALL_CIPHERS ":" ALL_COMP ":" ALL_CERTTYPES ":%s:" ALL_MACS ":" ALL_KX ":%s", protocol_str, rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); ret = do_handshake(session); if (ret == TEST_FAILED) { /* disable TLS 1.0 */ if (ssl3_ok != 0) { strcpy(protocol_str, "+VERS-SSL3.0"); } } return ret; } test_code_t test_tls_disable1(gnutls_session_t session) { int ret; if (tls1_1_ok != 0) return TEST_IGNORE; sprintf(prio_str, INIT_STR ALL_CIPHERS ":" ALL_COMP ":" ALL_CERTTYPES ":%s:" ALL_MACS ":" ALL_KX ":%s", protocol_str, rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); ret = do_handshake(session); if (ret == TEST_FAILED) { protocol_str[0] = 0; /* disable TLS 1.1 */ if (tls1_ok != 0) { strcat(protocol_str, "+VERS-TLS1.0"); } if (ssl3_ok != 0) { if (protocol_str[0] != 0) strcat(protocol_str, ":+VERS-SSL3.0"); else strcat(protocol_str, "+VERS-SSL3.0"); } } return ret; } test_code_t test_tls_disable2(gnutls_session_t session) { int ret; if (tls1_2_ok != 0) return TEST_IGNORE; sprintf(prio_str, INIT_STR ALL_CIPHERS ":" ALL_COMP ":" ALL_CERTTYPES ":%s:" ALL_MACS ":" ALL_KX ":%s", protocol_str, rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); ret = do_handshake(session); if (ret == TEST_FAILED) { /* disable TLS 1.2 */ protocol_str[0] = 0; if (tls1_1_ok != 0) { strcat(protocol_str, "+VERS-TLS1.1"); } if (tls1_ok != 0) { if (protocol_str[0] != 0) strcat(protocol_str, ":+VERS-TLS1.0"); else strcat(protocol_str, "+VERS-TLS1.0"); } if (ssl3_ok != 0) { if (protocol_str[0] != 0) strcat(protocol_str, ":+VERS-SSL3.0"); else strcat(protocol_str, "+VERS-SSL3.0"); } } return ret; } test_code_t test_rsa_pms(gnutls_session_t session) { int ret; /* here we enable both SSL 3.0 and TLS 1.0 * and try to connect and use rsa authentication. * If the server is old, buggy and only supports * SSL 3.0 then the handshake will fail. */ sprintf(prio_str, INIT_STR ALL_CIPHERS ":" ALL_COMP ":" ALL_CERTTYPES ":%s:" ALL_MACS ":+RSA:%s", protocol_str, rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); ret = do_handshake(session); if (ret == TEST_FAILED) return TEST_FAILED; if (gnutls_protocol_get_version(session) == GNUTLS_TLS1) return TEST_SUCCEED; return TEST_UNSURE; } test_code_t test_max_record_size(gnutls_session_t session) { int ret; if (tls_ext_ok == 0) return TEST_IGNORE; sprintf(prio_str, INIT_STR ALL_CIPHERS ":" ALL_COMP ":" ALL_CERTTYPES ":%s:" ALL_MACS ":" ALL_KX ":%s", protocol_str, rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); gnutls_record_set_max_size(session, 512); ret = do_handshake(session); if (ret == TEST_FAILED) return ret; ret = gnutls_record_get_max_size(session); if (ret == 512) return TEST_SUCCEED; return TEST_FAILED; } test_code_t test_heartbeat_extension(gnutls_session_t session) { if (tls_ext_ok == 0) return TEST_IGNORE; sprintf(prio_str, INIT_STR ALL_CIPHERS ":" ALL_COMP ":" ALL_CERTTYPES ":%s:" ALL_MACS ":" ALL_KX ":%s", protocol_str, rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); gnutls_heartbeat_enable(session, GNUTLS_HB_PEER_ALLOWED_TO_SEND); do_handshake(session); switch (gnutls_heartbeat_allowed(session, GNUTLS_HB_LOCAL_ALLOWED_TO_SEND)) { case 0: return TEST_FAILED; default: return TEST_SUCCEED; } } test_code_t test_small_records(gnutls_session_t session) { int ret; sprintf(prio_str, INIT_STR ALL_CIPHERS ":" ALL_COMP ":" ALL_CERTTYPES ":%s:" ALL_MACS ":" ALL_KX ":%s", protocol_str, rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); gnutls_record_set_max_size(session, 512); ret = do_handshake(session); return ret; } test_code_t test_version_rollback(gnutls_session_t session) { int ret; if (tls1_ok == 0) return TEST_IGNORE; /* here we enable both SSL 3.0 and TLS 1.0 * and we connect using a 3.1 client hello version, * and a 3.0 record version. Some implementations * are buggy (and vulnerable to man in the middle * attacks which allow a version downgrade) and this * connection will fail. */ sprintf(prio_str, INIT_STR ALL_CIPHERS ":" ALL_COMP ":" ALL_CERTTYPES ":%s:" ALL_MACS ":" ALL_KX ":%s", protocol_str, rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); _gnutls_record_set_default_version(session, 3, 0); ret = do_handshake(session); if (ret != TEST_SUCCEED) return ret; if (tls1_ok != 0 && gnutls_protocol_get_version(session) == GNUTLS_SSL3) return TEST_FAILED; return TEST_SUCCEED; } /* See if the server tolerates out of bounds * record layer versions in the first client hello * message. */ test_code_t test_version_oob(gnutls_session_t session) { int ret; /* here we enable both SSL 3.0 and TLS 1.0 * and we connect using a 5.5 record version. */ sprintf(prio_str, INIT_STR ALL_CIPHERS ":" ALL_COMP ":" ALL_CERTTYPES ":%s:" ALL_MACS ":" ALL_KX ":%s", protocol_str, rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); _gnutls_record_set_default_version(session, 5, 5); ret = do_handshake(session); return ret; } void _gnutls_rsa_pms_set_version(gnutls_session_t session, unsigned char major, unsigned char minor); test_code_t test_rsa_pms_version_check(gnutls_session_t session) { int ret; /* here we use an arbitary version in the RSA PMS * to see whether to server will check this version. * * A normal server would abort this handshake. */ sprintf(prio_str, INIT_STR ALL_CIPHERS ":" ALL_COMP ":" ALL_CERTTYPES ":%s:" ALL_MACS ":" ALL_KX ":%s", protocol_str, rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); _gnutls_rsa_pms_set_version(session, 5, 5); /* use SSL 5.5 version */ ret = do_handshake(session); return ret; } #ifdef ENABLE_ANON test_code_t test_anonymous(gnutls_session_t session) { int ret; sprintf(prio_str, INIT_STR ALL_CIPHERS ":" ALL_COMP ":" ALL_CERTTYPES ":%s:" ALL_MACS ":+ANON-DH:+ANON-ECDH:+CURVE-ALL:%s", protocol_str, rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_ANON, anon_cred); ret = do_handshake(session); if (ret == TEST_SUCCEED) gnutls_dh_get_pubkey(session, &pubkey); return ret; } #endif test_code_t test_session_resume2(gnutls_session_t session) { int ret; char tmp_session_id[32]; size_t tmp_session_id_size; if (session == NULL) return TEST_IGNORE; sprintf(prio_str, INIT_STR ALL_CIPHERS ":" ALL_COMP ":" ALL_CERTTYPES ":%s:" ALL_MACS ":" ALL_KX ":%s", protocol_str, rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); gnutls_credentials_set(session, GNUTLS_CRD_ANON, anon_cred); gnutls_session_set_data(session, session_data, session_data_size); memcpy(tmp_session_id, session_id, session_id_size); tmp_session_id_size = session_id_size; ret = do_handshake(session); if (ret == TEST_FAILED) return ret; /* check if we actually resumed the previous session */ session_id_size = sizeof(session_id); gnutls_session_get_id(session, session_id, &session_id_size); if (session_id_size == 0) return TEST_FAILED; if (gnutls_session_is_resumed(session)) return TEST_SUCCEED; if (tmp_session_id_size == session_id_size && memcmp(tmp_session_id, session_id, tmp_session_id_size) == 0) return TEST_SUCCEED; else return TEST_FAILED; } extern char *hostname; test_code_t test_certificate(gnutls_session_t session) { int ret; FILE *fp; remove("debug-certs.out"); if (verbose == 0) return TEST_IGNORE; sprintf(prio_str, INIT_STR ALL_CIPHERS ":" ALL_COMP ":" ALL_CERTTYPES ":%s:" ALL_MACS ":" ALL_KX ":%s", protocol_str, rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); ret = do_handshake(session); if (ret == TEST_FAILED) return ret; fp = fopen("debug-certs.out", "w"); if (fp != NULL) { fprintf(fp, "\n"); print_cert_info2(session, GNUTLS_CRT_PRINT_FULL, fp, verbose); fclose(fp); ext_text = "saved in debug-certs.out"; return TEST_SUCCEED; } return TEST_FAILED; } test_code_t test_chain_order(gnutls_session_t session) { int ret; const gnutls_datum_t *cert_list; unsigned int cert_list_size = 0; unsigned int i; unsigned p_size; gnutls_datum_t t; gnutls_x509_crt_t *certs; char *p, *pos; sprintf(prio_str, INIT_STR ALL_CIPHERS ":" ALL_COMP ":" ALL_CERTTYPES ":%s:" ALL_MACS ":" ALL_KX ":%s", protocol_str, rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); ret = do_handshake(session); if (ret == TEST_FAILED) return ret; if (gnutls_certificate_type_get(session) != GNUTLS_CRT_X509) return TEST_IGNORE; cert_list = gnutls_certificate_get_peers(session, &cert_list_size); if (cert_list_size == 0) { ext_text = "No certificates found!"; return TEST_IGNORE; } p = 0; p_size = 0; pos = NULL; for (i=0;i 0) fprintf(fp, "- Server's trusted authorities:\n"); else fprintf (fp, "- Server did not send us any trusted authorities names.\n"); /* print the names (if any) */ for (i = 0; i < nreqs; i++) { len = sizeof(issuer_dn); ret = gnutls_x509_rdn_get(&req_ca_rdn[i], issuer_dn, &len); if (ret >= 0) { fprintf(fp, " [%d]: ", i); fprintf(fp, "%s\n", issuer_dn); } } fclose(fp); return -1; } /* Prints the trusted server's CAs. This is only * if the server sends a certificate request packet. */ test_code_t test_server_cas(gnutls_session_t session) { int ret; remove("debug-cas.out"); if (verbose == 0) return TEST_IGNORE; sprintf(prio_str, INIT_STR ALL_CIPHERS ":" ALL_COMP ":" ALL_CERTTYPES ":%s:" ALL_MACS ":" ALL_KX ":%s", protocol_str, rest); _gnutls_priority_set_direct(session, prio_str); gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, xcred); gnutls_certificate_set_retrieve_function(xcred, cert_callback); ret = do_handshake(session); gnutls_certificate_set_retrieve_function(xcred, NULL); if (ret == TEST_FAILED) return ret; if (access("debug-cas.out", R_OK) == 0) ext_text = "saved in debug-cas.out"; else ext_text = "none"; return TEST_SUCCEED; }