Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 1 | #!/usr/bin/env python3 |
| 2 | |
| 3 | # generate_tls13_compat_tests.py |
| 4 | # |
| 5 | # Copyright The Mbed TLS Contributors |
| 6 | # SPDX-License-Identifier: Apache-2.0 |
| 7 | # |
| 8 | # Licensed under the Apache License, Version 2.0 (the "License"); you may |
| 9 | # not use this file except in compliance with the License. |
| 10 | # You may obtain a copy of the License at |
| 11 | # |
| 12 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 13 | # |
| 14 | # Unless required by applicable law or agreed to in writing, software |
| 15 | # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| 16 | # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 17 | # See the License for the specific language governing permissions and |
| 18 | # limitations under the License. |
| 19 | |
| 20 | """ |
| 21 | Generate TLSv1.3 Compat test cases |
| 22 | |
| 23 | """ |
| 24 | |
| 25 | import sys |
| 26 | import abc |
| 27 | import argparse |
Jerry Yu | c4aa152 | 2021-11-26 11:13:58 +0800 | [diff] [blame] | 28 | import itertools |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 29 | |
| 30 | # pylint: disable=useless-super-delegation |
| 31 | |
| 32 | CERTIFICATES = { |
| 33 | 'ecdsa_secp256r1_sha256': ( |
| 34 | 'data_files/ecdsa_secp256r1_sha256.crt', |
| 35 | 'data_files/ecdsa_secp256r1_sha256.key'), |
| 36 | 'ecdsa_secp384r1_sha384': ( |
| 37 | 'data_files/ecdsa_secp384r1_sha384.crt', |
| 38 | 'data_files/ecdsa_secp384r1_sha384.key'), |
| 39 | 'ecdsa_secp521r1_sha512': ( |
| 40 | 'data_files/ecdsa_secp521r1_sha512.crt', |
| 41 | 'data_files/ecdsa_secp521r1_sha512.key'), |
Jerry Yu | 29deed4 | 2021-11-25 11:09:54 +0800 | [diff] [blame] | 42 | 'rsa_pss_rsae_sha256': ( |
| 43 | 'data_files/server2-sha256.crt', 'data_files/server2.key' |
| 44 | ) |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 45 | } |
| 46 | |
Jerry Yu | 29deed4 | 2021-11-25 11:09:54 +0800 | [diff] [blame] | 47 | CAFILE = { |
| 48 | 'ecdsa_secp256r1_sha256': 'data_files/test-ca2.crt', |
| 49 | 'ecdsa_secp384r1_sha384': 'data_files/test-ca2.crt', |
| 50 | 'ecdsa_secp521r1_sha512': 'data_files/test-ca2.crt', |
| 51 | 'rsa_pss_rsae_sha256': 'data_files/test-ca_cat12.crt' |
| 52 | } |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 53 | |
| 54 | CIPHER_SUITE_IANA_VALUE = { |
| 55 | "TLS_AES_128_GCM_SHA256": 0x1301, |
| 56 | "TLS_AES_256_GCM_SHA384": 0x1302, |
| 57 | "TLS_CHACHA20_POLY1305_SHA256": 0x1303, |
| 58 | "TLS_AES_128_CCM_SHA256": 0x1304, |
| 59 | "TLS_AES_128_CCM_8_SHA256": 0x1305 |
| 60 | } |
| 61 | |
| 62 | SIG_ALG_IANA_VALUE = { |
| 63 | "ecdsa_secp256r1_sha256": 0x0403, |
| 64 | "ecdsa_secp384r1_sha384": 0x0503, |
| 65 | "ecdsa_secp521r1_sha512": 0x0603, |
Jerry Yu | 29deed4 | 2021-11-25 11:09:54 +0800 | [diff] [blame] | 66 | 'rsa_pss_rsae_sha256': 0x0804, |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 67 | } |
| 68 | |
| 69 | NAMED_GROUP_IANA_VALUE = { |
| 70 | 'secp256r1': 0x17, |
| 71 | 'secp384r1': 0x18, |
| 72 | 'secp521r1': 0x19, |
| 73 | 'x25519': 0x1d, |
| 74 | 'x448': 0x1e, |
| 75 | } |
| 76 | |
| 77 | |
| 78 | def remove_duplicates(seq): |
| 79 | seen = set() |
| 80 | seen_add = seen.add |
| 81 | return [x for x in seq if not (x in seen or seen_add(x))] |
| 82 | |
| 83 | |
| 84 | class TLSProgram(metaclass=abc.ABCMeta): |
| 85 | """ |
| 86 | Base class for generate server/client command. |
| 87 | """ |
Jerry Yu | 29deed4 | 2021-11-25 11:09:54 +0800 | [diff] [blame] | 88 | |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 89 | def __init__(self, ciphersuite, signature_algorithm, named_group): |
| 90 | self._cipher = ciphersuite |
| 91 | self._sig_alg = signature_algorithm |
| 92 | self._named_group = named_group |
| 93 | self.add_ciphersuites(ciphersuite) |
| 94 | self.add_named_groups(named_group) |
| 95 | self.add_signature_algorithms(signature_algorithm) |
| 96 | |
| 97 | @abc.abstractmethod |
| 98 | def add_ciphersuites(self, *ciphersuites): |
| 99 | pass |
| 100 | |
| 101 | @abc.abstractmethod |
| 102 | def add_signature_algorithms(self, *signature_algorithms): |
| 103 | pass |
| 104 | |
| 105 | @abc.abstractmethod |
| 106 | def add_named_groups(self, *named_groups): |
| 107 | pass |
| 108 | |
| 109 | @abc.abstractmethod |
| 110 | def pre_checks(self): |
| 111 | return [] |
| 112 | |
| 113 | @abc.abstractmethod |
| 114 | def cmd(self): |
| 115 | pass |
| 116 | |
| 117 | @abc.abstractmethod |
| 118 | def post_checks(self): |
| 119 | return [] |
| 120 | |
| 121 | |
| 122 | class OpenSSLServ(TLSProgram): |
| 123 | """ |
| 124 | Generate test commands for OpenSSL server. |
| 125 | """ |
| 126 | program = '$OPENSSL_NEXT' |
| 127 | |
| 128 | def __init__( |
| 129 | self, |
| 130 | ciphersuite, |
| 131 | signature_algorithm, |
| 132 | named_group): |
| 133 | self.ciphersuites = [] |
| 134 | self.named_groups = [] |
| 135 | self.signature_algorithms = [] |
| 136 | self.certificates = [] |
| 137 | super().__init__(ciphersuite, signature_algorithm, named_group) |
| 138 | |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 139 | def add_ciphersuites(self, *ciphersuites): |
| 140 | self.ciphersuites.extend(ciphersuites) |
| 141 | |
| 142 | def add_signature_algorithms(self, *signature_algorithms): |
| 143 | self.signature_algorithms.extend(signature_algorithms) |
| 144 | for sig_alg in signature_algorithms: |
| 145 | self.certificates.append(CERTIFICATES[sig_alg]) |
| 146 | |
| 147 | NAMED_GROUP = { |
| 148 | 'secp256r1': 'P-256', |
| 149 | 'secp384r1': 'P-384', |
| 150 | 'secp521r1': 'P-521', |
| 151 | 'x25519': 'X25519', |
| 152 | 'x448': 'X448', |
| 153 | } |
| 154 | |
| 155 | def add_named_groups(self, *named_groups): |
| 156 | for named_group in named_groups: |
| 157 | self.named_groups.append(self.NAMED_GROUP[named_group]) |
| 158 | |
| 159 | def cmd(self): |
| 160 | ret = ['$O_NEXT_SRV_NO_CERT'] |
| 161 | for cert, key in self.certificates: |
| 162 | ret += ['-cert {cert} -key {key}'.format(cert=cert, key=key)] |
| 163 | ret += ['-accept $SRV_PORT'] |
| 164 | ciphersuites = ','.join(self.ciphersuites) |
| 165 | signature_algorithms = ','.join(self.signature_algorithms) |
| 166 | named_groups = ','.join(self.named_groups) |
| 167 | ret += ["-ciphersuites {ciphersuites}".format(ciphersuites=ciphersuites), |
| 168 | "-sigalgs {signature_algorithms}".format( |
| 169 | signature_algorithms=signature_algorithms), |
| 170 | "-groups {named_groups}".format(named_groups=named_groups)] |
| 171 | ret += ['-msg -tls1_3 -no_middlebox -num_tickets 0 -no_resume_ephemeral -no_cache'] |
| 172 | return ' '.join(ret) |
| 173 | |
| 174 | def pre_checks(self): |
| 175 | return ["requires_openssl_tls1_3"] |
| 176 | |
| 177 | def post_checks(self): |
Jerry Yu | 29deed4 | 2021-11-25 11:09:54 +0800 | [diff] [blame] | 178 | return ['-c "HTTP/1.0 200 ok"'] |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 179 | |
| 180 | |
| 181 | class GnuTLSServ(TLSProgram): |
| 182 | """ |
| 183 | Generate test commands for GnuTLS server. |
| 184 | """ |
| 185 | |
| 186 | def __init__(self, ciphersuite, signature_algorithm, named_group): |
| 187 | self.priority_strings = [] |
| 188 | self.certificates = [] |
| 189 | super().__init__(ciphersuite, signature_algorithm, named_group) |
| 190 | |
| 191 | CIPHER_SUITE = { |
| 192 | 'TLS_AES_256_GCM_SHA384': [ |
| 193 | 'AES-256-GCM', |
| 194 | 'SHA384', |
| 195 | 'AEAD'], |
| 196 | 'TLS_AES_128_GCM_SHA256': [ |
| 197 | 'AES-128-GCM', |
| 198 | 'SHA256', |
| 199 | 'AEAD'], |
| 200 | 'TLS_CHACHA20_POLY1305_SHA256': [ |
| 201 | 'CHACHA20-POLY1305', |
| 202 | 'SHA256', |
| 203 | 'AEAD'], |
| 204 | 'TLS_AES_128_CCM_SHA256': [ |
| 205 | 'AES-128-CCM', |
| 206 | 'SHA256', |
| 207 | 'AEAD'], |
| 208 | 'TLS_AES_128_CCM_8_SHA256': [ |
| 209 | 'AES-128-CCM-8', |
| 210 | 'SHA256', |
| 211 | 'AEAD']} |
| 212 | |
| 213 | def add_ciphersuites(self, *ciphersuites): |
Jerry Yu | d64e20d | 2021-11-26 10:50:01 +0800 | [diff] [blame] | 214 | for ciphersuite in ciphersuites: |
| 215 | self.priority_strings.extend(self.CIPHER_SUITE[ciphersuite]) |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 216 | |
| 217 | SIGNATURE_ALGORITHM = { |
| 218 | 'ecdsa_secp256r1_sha256': ['SIGN-ECDSA-SECP256R1-SHA256'], |
| 219 | 'ecdsa_secp521r1_sha512': ['SIGN-ECDSA-SECP521R1-SHA512'], |
Jerry Yu | 29deed4 | 2021-11-25 11:09:54 +0800 | [diff] [blame] | 220 | 'ecdsa_secp384r1_sha384': ['SIGN-ECDSA-SECP384R1-SHA384'], |
| 221 | 'rsa_pss_rsae_sha256': ['SIGN-RSA-PSS-RSAE-SHA256']} |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 222 | |
| 223 | def add_signature_algorithms(self, *signature_algorithms): |
| 224 | for sig_alg in signature_algorithms: |
| 225 | self.priority_strings.extend(self.SIGNATURE_ALGORITHM[sig_alg]) |
| 226 | self.certificates.append(CERTIFICATES[sig_alg]) |
| 227 | |
| 228 | NAMED_GROUP = { |
| 229 | 'secp256r1': ['GROUP-SECP256R1'], |
| 230 | 'secp384r1': ['GROUP-SECP384R1'], |
| 231 | 'secp521r1': ['GROUP-SECP521R1'], |
| 232 | 'x25519': ['GROUP-X25519'], |
| 233 | 'x448': ['GROUP-X448'], |
| 234 | } |
| 235 | |
| 236 | def add_named_groups(self, *named_groups): |
| 237 | for named_group in named_groups: |
| 238 | self.priority_strings.extend(self.NAMED_GROUP[named_group]) |
| 239 | |
| 240 | def pre_checks(self): |
| 241 | return ["requires_gnutls_tls1_3", |
| 242 | "requires_gnutls_next_no_ticket", |
| 243 | "requires_gnutls_next_disable_tls13_compat", ] |
| 244 | |
| 245 | def post_checks(self): |
Jerry Yu | 29deed4 | 2021-11-25 11:09:54 +0800 | [diff] [blame] | 246 | return ['-c "HTTP/1.0 200 OK"'] |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 247 | |
| 248 | def cmd(self): |
| 249 | ret = [ |
| 250 | '$G_NEXT_SRV_NO_CERT', |
| 251 | '--http', |
| 252 | '--disable-client-cert', |
| 253 | '--debug=4'] |
| 254 | for cert, key in self.certificates: |
| 255 | ret += ['--x509certfile {cert} --x509keyfile {key}'.format( |
| 256 | cert=cert, key=key)] |
| 257 | priority_strings = ':+'.join(['NONE'] + |
| 258 | list(set(self.priority_strings)) + |
| 259 | ['VERS-TLS1.3']) |
| 260 | priority_strings += ':%NO_TICKETS:%DISABLE_TLS13_COMPAT_MODE' |
| 261 | ret += ['--priority={priority_strings}'.format( |
| 262 | priority_strings=priority_strings)] |
| 263 | ret = ' '.join(ret) |
| 264 | return ret |
| 265 | |
| 266 | |
| 267 | class MbedTLSCli(TLSProgram): |
| 268 | """ |
| 269 | Generate test commands for mbedTLS client. |
| 270 | """ |
Jerry Yu | 29deed4 | 2021-11-25 11:09:54 +0800 | [diff] [blame] | 271 | |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 272 | def __init__(self, ciphersuite, signature_algorithm, named_group): |
| 273 | self.ciphersuites = [] |
| 274 | self.certificates = [] |
| 275 | self.signature_algorithms = [] |
| 276 | self.named_groups = [] |
| 277 | self.needed_named_groups = [] |
| 278 | super().__init__(ciphersuite, signature_algorithm, named_group) |
| 279 | |
| 280 | CIPHER_SUITE = { |
| 281 | 'TLS_AES_256_GCM_SHA384': 'TLS1-3-AES-256-GCM-SHA384', |
| 282 | 'TLS_AES_128_GCM_SHA256': 'TLS1-3-AES-128-GCM-SHA256', |
| 283 | 'TLS_CHACHA20_POLY1305_SHA256': 'TLS1-3-CHACHA20-POLY1305-SHA256', |
| 284 | 'TLS_AES_128_CCM_SHA256': 'TLS1-3-AES-128-CCM-SHA256', |
| 285 | 'TLS_AES_128_CCM_8_SHA256': 'TLS1-3-AES-128-CCM-8-SHA256'} |
| 286 | |
| 287 | def add_ciphersuites(self, *ciphersuites): |
Jerry Yu | d64e20d | 2021-11-26 10:50:01 +0800 | [diff] [blame] | 288 | for ciphersuite in ciphersuites: |
| 289 | self.ciphersuites.append(self.CIPHER_SUITE[ciphersuite]) |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 290 | |
| 291 | def add_signature_algorithms(self, *signature_algorithms): |
| 292 | for sig_alg in signature_algorithms: |
| 293 | self.signature_algorithms.append(sig_alg) |
| 294 | if sig_alg == 'ecdsa_secp256r1_sha256': |
| 295 | self.needed_named_groups.append('secp256r1') |
| 296 | elif sig_alg == 'ecdsa_secp521r1_sha512': |
| 297 | self.needed_named_groups.append('secp521r1') |
| 298 | elif sig_alg == 'ecdsa_secp384r1_sha384': |
| 299 | self.needed_named_groups.append('secp384r1') |
| 300 | |
| 301 | self.certificates.append(CERTIFICATES[sig_alg]) |
| 302 | |
| 303 | def add_named_groups(self, *named_groups): |
| 304 | for named_group in named_groups: |
| 305 | self.named_groups.append(named_group) |
| 306 | |
| 307 | def pre_checks(self): |
Jerry Yu | 29deed4 | 2021-11-25 11:09:54 +0800 | [diff] [blame] | 308 | |
| 309 | ret = ['requires_config_enabled MBEDTLS_DEBUG_C', |
| 310 | 'requires_config_enabled MBEDTLS_SSL_CLI_C', |
| 311 | 'requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3_EXPERIMENTAL', |
| 312 | 'requires_config_disabled MBEDTLS_USE_PSA_CRYPTO'] |
| 313 | if 'rsa_pss_rsae_sha256' in self.signature_algorithms: |
| 314 | ret.append( |
| 315 | 'requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT') |
| 316 | return ret |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 317 | |
| 318 | def post_checks(self): |
| 319 | |
| 320 | check_strings = ["ECDH curve: {group}".format(group=self._named_group), |
| 321 | "server hello, chosen ciphersuite: ( {:04x} ) - {}".format( |
| 322 | CIPHER_SUITE_IANA_VALUE[self._cipher], |
| 323 | self.CIPHER_SUITE[self._cipher]), |
| 324 | "Certificate Verify: Signature algorithm ( {:04x} )".format( |
| 325 | SIG_ALG_IANA_VALUE[self._sig_alg]), |
| 326 | "Verifying peer X.509 certificate... ok", ] |
| 327 | return ['-c "{}"'.format(i) for i in check_strings] |
| 328 | |
| 329 | def cmd(self): |
| 330 | ret = ['$P_CLI'] |
| 331 | ret += [ |
| 332 | 'server_addr=127.0.0.1 server_port=$SRV_PORT', |
| 333 | 'debug_level=4 force_version=tls1_3'] |
Jerry Yu | 29deed4 | 2021-11-25 11:09:54 +0800 | [diff] [blame] | 334 | ret += ['ca_file={CAFILE}'.format(CAFILE=CAFILE[self._sig_alg])] |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 335 | self.ciphersuites = list(set(self.ciphersuites)) |
| 336 | cipher = ','.join(self.ciphersuites) |
| 337 | if cipher: |
| 338 | ret += ["force_ciphersuite={cipher}".format(cipher=cipher)] |
| 339 | self.named_groups = remove_duplicates( |
| 340 | self.named_groups + self.needed_named_groups) |
| 341 | group = ','.join(self.named_groups) |
| 342 | if group: |
| 343 | ret += ["curves={group}".format(group=group)] |
| 344 | sig_alg = ','.join(self.signature_algorithms) |
| 345 | ret += ['sig_algs={sig_alg}'.format(sig_alg=sig_alg)] |
| 346 | ret = ' '.join(ret) |
| 347 | return ret |
| 348 | |
| 349 | |
| 350 | SERVER_CLS = {'OpenSSL': OpenSSLServ, 'GnuTLS': GnuTLSServ} |
| 351 | CLIENT_CLS = {'mbedTLS': MbedTLSCli} |
| 352 | |
| 353 | |
Jerry Yu | 29deed4 | 2021-11-25 11:09:54 +0800 | [diff] [blame] | 354 | def generate_compat_test(server=None, client=None, cipher=None, # pylint: disable=unused-argument |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 355 | sig_alg=None, named_group=None, **kwargs): |
| 356 | """ |
| 357 | Generate test case with `ssl-opt.sh` format. |
| 358 | """ |
| 359 | name = 'TLS1.3 {client[0]}->{server[0]}: {cipher},{named_group},{sig_alg}'.format( |
| 360 | client=client, server=server, cipher=cipher, sig_alg=sig_alg, named_group=named_group) |
| 361 | server = SERVER_CLS[server](cipher, sig_alg, named_group) |
| 362 | client = CLIENT_CLS[client](cipher, sig_alg, named_group) |
| 363 | |
| 364 | cmd = ['run_test "{}"'.format(name), '"{}"'.format( |
| 365 | server.cmd()), '"{}"'.format(client.cmd()), '0'] |
| 366 | cmd += server.post_checks() |
| 367 | cmd += client.post_checks() |
| 368 | prefix = ' \\\n' + (' '*12) |
| 369 | cmd = prefix.join(cmd) |
| 370 | print('\n'.join(server.pre_checks() + client.pre_checks() + [cmd])) |
| 371 | return 0 |
Jerry Yu | 29deed4 | 2021-11-25 11:09:54 +0800 | [diff] [blame] | 372 | |
| 373 | |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 374 | def main(): |
| 375 | parser = argparse.ArgumentParser() |
| 376 | |
Jerry Yu | c4aa152 | 2021-11-26 11:13:58 +0800 | [diff] [blame] | 377 | parser.add_argument('-a', '--generate-all-tls13-compat-tests', action='store_true', |
| 378 | default=False, help='Generate all available tls13 compat tests') |
| 379 | |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 380 | parser.add_argument('--list-ciphers', action='store_true', |
| 381 | default=False, help='List supported ciphersuites') |
| 382 | |
| 383 | parser.add_argument('--list-sig-algs', action='store_true', |
| 384 | default=False, help='List supported signature algorithms') |
| 385 | |
| 386 | parser.add_argument('--list-named-groups', action='store_true', |
| 387 | default=False, help='List supported named groups') |
| 388 | |
| 389 | parser.add_argument('--list-servers', action='store_true', |
| 390 | default=False, help='List supported TLS servers') |
| 391 | |
| 392 | parser.add_argument('--list-clients', action='store_true', |
| 393 | default=False, help='List supported TLS Clients') |
| 394 | |
| 395 | parser.add_argument('server', choices=SERVER_CLS.keys(), nargs='?', |
| 396 | default=list(SERVER_CLS.keys())[0], |
| 397 | help='Choose TLS server program for test') |
| 398 | parser.add_argument('client', choices=CLIENT_CLS.keys(), nargs='?', |
| 399 | default=list(CLIENT_CLS.keys())[0], |
| 400 | help='Choose TLS client program for test') |
| 401 | parser.add_argument('cipher', choices=CIPHER_SUITE_IANA_VALUE.keys(), nargs='?', |
| 402 | default=list(CIPHER_SUITE_IANA_VALUE.keys())[0], |
| 403 | help='Choose cipher suite for test') |
| 404 | parser.add_argument('sig_alg', choices=SIG_ALG_IANA_VALUE.keys(), nargs='?', |
| 405 | default=list(SIG_ALG_IANA_VALUE.keys())[0], |
| 406 | help='Choose cipher suite for test') |
| 407 | parser.add_argument('named_group', choices=NAMED_GROUP_IANA_VALUE.keys(), nargs='?', |
| 408 | default=list(NAMED_GROUP_IANA_VALUE.keys())[0], |
| 409 | help='Choose cipher suite for test') |
| 410 | |
| 411 | args = parser.parse_args() |
Jerry Yu | c4aa152 | 2021-11-26 11:13:58 +0800 | [diff] [blame] | 412 | if args.generate_all_tls13_compat_tests: |
| 413 | for i in itertools.product(CIPHER_SUITE_IANA_VALUE.keys(), SIG_ALG_IANA_VALUE.keys(), |
| 414 | NAMED_GROUP_IANA_VALUE.keys(), SERVER_CLS.keys(), |
| 415 | CLIENT_CLS.keys()): |
| 416 | generate_compat_test( |
| 417 | **dict(zip(['cipher', 'sig_alg', 'named_group', 'server', 'client'], i))) |
| 418 | print() |
| 419 | return 0 |
| 420 | |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 421 | if args.list_ciphers or args.list_sig_algs or args.list_named_groups \ |
Jerry Yu | 29deed4 | 2021-11-25 11:09:54 +0800 | [diff] [blame] | 422 | or args.list_servers or args.list_clients: |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 423 | if args.list_ciphers: |
| 424 | print(*CIPHER_SUITE_IANA_VALUE.keys()) |
| 425 | if args.list_sig_algs: |
| 426 | print(*SIG_ALG_IANA_VALUE.keys()) |
| 427 | if args.list_named_groups: |
| 428 | print(*NAMED_GROUP_IANA_VALUE.keys()) |
| 429 | if args.list_servers: |
| 430 | print(*SERVER_CLS.keys()) |
| 431 | if args.list_clients: |
| 432 | print(*CLIENT_CLS.keys()) |
| 433 | return 0 |
| 434 | return generate_compat_test(**vars(args)) |
| 435 | |
Jerry Yu | 29deed4 | 2021-11-25 11:09:54 +0800 | [diff] [blame] | 436 | |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 437 | if __name__ == "__main__": |
| 438 | sys.exit(main()) |