blob: b9e09d85c6d3e2295289e2bfe509c692bd39f0fe [file] [log] [blame]
Jerry Yu305bfc32021-11-24 16:04:47 +08001#!/usr/bin/env python3
2
3# generate_tls13_compat_tests.py
4#
5# Copyright The Mbed TLS Contributors
6# SPDX-License-Identifier: Apache-2.0
7#
8# Licensed under the Apache License, Version 2.0 (the "License"); you may
9# not use this file except in compliance with the License.
10# You may obtain a copy of the License at
11#
12# http://www.apache.org/licenses/LICENSE-2.0
13#
14# Unless required by applicable law or agreed to in writing, software
15# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
16# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
17# See the License for the specific language governing permissions and
18# limitations under the License.
19
20"""
21Generate TLSv1.3 Compat test cases
22
23"""
24
25import sys
26import abc
27import argparse
Jerry Yuc4aa1522021-11-26 11:13:58 +080028import itertools
Jerry Yu305bfc32021-11-24 16:04:47 +080029
30# pylint: disable=useless-super-delegation
31
32CERTIFICATES = {
33 'ecdsa_secp256r1_sha256': (
34 'data_files/ecdsa_secp256r1_sha256.crt',
35 'data_files/ecdsa_secp256r1_sha256.key'),
36 'ecdsa_secp384r1_sha384': (
37 'data_files/ecdsa_secp384r1_sha384.crt',
38 'data_files/ecdsa_secp384r1_sha384.key'),
39 'ecdsa_secp521r1_sha512': (
40 'data_files/ecdsa_secp521r1_sha512.crt',
41 'data_files/ecdsa_secp521r1_sha512.key'),
Jerry Yu29deed42021-11-25 11:09:54 +080042 'rsa_pss_rsae_sha256': (
43 'data_files/server2-sha256.crt', 'data_files/server2.key'
44 )
Jerry Yu305bfc32021-11-24 16:04:47 +080045}
46
Jerry Yucdcb6832021-11-29 16:50:13 +080047
Jerry Yu29deed42021-11-25 11:09:54 +080048CAFILE = {
49 'ecdsa_secp256r1_sha256': 'data_files/test-ca2.crt',
50 'ecdsa_secp384r1_sha384': 'data_files/test-ca2.crt',
51 'ecdsa_secp521r1_sha512': 'data_files/test-ca2.crt',
52 'rsa_pss_rsae_sha256': 'data_files/test-ca_cat12.crt'
53}
Jerry Yu305bfc32021-11-24 16:04:47 +080054
55CIPHER_SUITE_IANA_VALUE = {
56 "TLS_AES_128_GCM_SHA256": 0x1301,
57 "TLS_AES_256_GCM_SHA384": 0x1302,
58 "TLS_CHACHA20_POLY1305_SHA256": 0x1303,
59 "TLS_AES_128_CCM_SHA256": 0x1304,
60 "TLS_AES_128_CCM_8_SHA256": 0x1305
61}
62
63SIG_ALG_IANA_VALUE = {
64 "ecdsa_secp256r1_sha256": 0x0403,
65 "ecdsa_secp384r1_sha384": 0x0503,
66 "ecdsa_secp521r1_sha512": 0x0603,
Jerry Yu29deed42021-11-25 11:09:54 +080067 'rsa_pss_rsae_sha256': 0x0804,
Jerry Yu305bfc32021-11-24 16:04:47 +080068}
69
70NAMED_GROUP_IANA_VALUE = {
71 'secp256r1': 0x17,
72 'secp384r1': 0x18,
73 'secp521r1': 0x19,
74 'x25519': 0x1d,
75 'x448': 0x1e,
76}
77
78
79def remove_duplicates(seq):
80 seen = set()
81 seen_add = seen.add
82 return [x for x in seq if not (x in seen or seen_add(x))]
83
84
85class TLSProgram(metaclass=abc.ABCMeta):
86 """
87 Base class for generate server/client command.
88 """
Jerry Yu29deed42021-11-25 11:09:54 +080089
Jerry Yu305bfc32021-11-24 16:04:47 +080090 def __init__(self, ciphersuite, signature_algorithm, named_group):
91 self._cipher = ciphersuite
92 self._sig_alg = signature_algorithm
93 self._named_group = named_group
94 self.add_ciphersuites(ciphersuite)
95 self.add_named_groups(named_group)
96 self.add_signature_algorithms(signature_algorithm)
97
98 @abc.abstractmethod
99 def add_ciphersuites(self, *ciphersuites):
100 pass
101
102 @abc.abstractmethod
103 def add_signature_algorithms(self, *signature_algorithms):
104 pass
105
106 @abc.abstractmethod
107 def add_named_groups(self, *named_groups):
108 pass
109
110 @abc.abstractmethod
111 def pre_checks(self):
112 return []
113
114 @abc.abstractmethod
115 def cmd(self):
116 pass
117
118 @abc.abstractmethod
119 def post_checks(self):
120 return []
121
122
123class OpenSSLServ(TLSProgram):
124 """
125 Generate test commands for OpenSSL server.
126 """
127 program = '$OPENSSL_NEXT'
128
129 def __init__(
130 self,
131 ciphersuite,
132 signature_algorithm,
133 named_group):
134 self.ciphersuites = []
135 self.named_groups = []
136 self.signature_algorithms = []
137 self.certificates = []
138 super().__init__(ciphersuite, signature_algorithm, named_group)
139
Jerry Yu305bfc32021-11-24 16:04:47 +0800140 def add_ciphersuites(self, *ciphersuites):
141 self.ciphersuites.extend(ciphersuites)
142
143 def add_signature_algorithms(self, *signature_algorithms):
144 self.signature_algorithms.extend(signature_algorithms)
145 for sig_alg in signature_algorithms:
146 self.certificates.append(CERTIFICATES[sig_alg])
147
148 NAMED_GROUP = {
149 'secp256r1': 'P-256',
150 'secp384r1': 'P-384',
151 'secp521r1': 'P-521',
152 'x25519': 'X25519',
153 'x448': 'X448',
154 }
155
156 def add_named_groups(self, *named_groups):
157 for named_group in named_groups:
158 self.named_groups.append(self.NAMED_GROUP[named_group])
159
160 def cmd(self):
161 ret = ['$O_NEXT_SRV_NO_CERT']
162 for cert, key in self.certificates:
163 ret += ['-cert {cert} -key {key}'.format(cert=cert, key=key)]
164 ret += ['-accept $SRV_PORT']
165 ciphersuites = ','.join(self.ciphersuites)
166 signature_algorithms = ','.join(self.signature_algorithms)
167 named_groups = ','.join(self.named_groups)
168 ret += ["-ciphersuites {ciphersuites}".format(ciphersuites=ciphersuites),
169 "-sigalgs {signature_algorithms}".format(
170 signature_algorithms=signature_algorithms),
171 "-groups {named_groups}".format(named_groups=named_groups)]
172 ret += ['-msg -tls1_3 -no_middlebox -num_tickets 0 -no_resume_ephemeral -no_cache']
173 return ' '.join(ret)
174
175 def pre_checks(self):
176 return ["requires_openssl_tls1_3"]
177
178 def post_checks(self):
Jerry Yu29deed42021-11-25 11:09:54 +0800179 return ['-c "HTTP/1.0 200 ok"']
Jerry Yu305bfc32021-11-24 16:04:47 +0800180
181
182class GnuTLSServ(TLSProgram):
183 """
184 Generate test commands for GnuTLS server.
185 """
186
187 def __init__(self, ciphersuite, signature_algorithm, named_group):
188 self.priority_strings = []
189 self.certificates = []
190 super().__init__(ciphersuite, signature_algorithm, named_group)
191
192 CIPHER_SUITE = {
193 'TLS_AES_256_GCM_SHA384': [
194 'AES-256-GCM',
195 'SHA384',
196 'AEAD'],
197 'TLS_AES_128_GCM_SHA256': [
198 'AES-128-GCM',
199 'SHA256',
200 'AEAD'],
201 'TLS_CHACHA20_POLY1305_SHA256': [
202 'CHACHA20-POLY1305',
203 'SHA256',
204 'AEAD'],
205 'TLS_AES_128_CCM_SHA256': [
206 'AES-128-CCM',
207 'SHA256',
208 'AEAD'],
209 'TLS_AES_128_CCM_8_SHA256': [
210 'AES-128-CCM-8',
211 'SHA256',
212 'AEAD']}
213
214 def add_ciphersuites(self, *ciphersuites):
Jerry Yud64e20d2021-11-26 10:50:01 +0800215 for ciphersuite in ciphersuites:
216 self.priority_strings.extend(self.CIPHER_SUITE[ciphersuite])
Jerry Yu305bfc32021-11-24 16:04:47 +0800217
218 SIGNATURE_ALGORITHM = {
219 'ecdsa_secp256r1_sha256': ['SIGN-ECDSA-SECP256R1-SHA256'],
220 'ecdsa_secp521r1_sha512': ['SIGN-ECDSA-SECP521R1-SHA512'],
Jerry Yu29deed42021-11-25 11:09:54 +0800221 'ecdsa_secp384r1_sha384': ['SIGN-ECDSA-SECP384R1-SHA384'],
222 'rsa_pss_rsae_sha256': ['SIGN-RSA-PSS-RSAE-SHA256']}
Jerry Yu305bfc32021-11-24 16:04:47 +0800223
224 def add_signature_algorithms(self, *signature_algorithms):
225 for sig_alg in signature_algorithms:
226 self.priority_strings.extend(self.SIGNATURE_ALGORITHM[sig_alg])
227 self.certificates.append(CERTIFICATES[sig_alg])
228
229 NAMED_GROUP = {
230 'secp256r1': ['GROUP-SECP256R1'],
231 'secp384r1': ['GROUP-SECP384R1'],
232 'secp521r1': ['GROUP-SECP521R1'],
233 'x25519': ['GROUP-X25519'],
234 'x448': ['GROUP-X448'],
235 }
236
237 def add_named_groups(self, *named_groups):
238 for named_group in named_groups:
239 self.priority_strings.extend(self.NAMED_GROUP[named_group])
240
241 def pre_checks(self):
242 return ["requires_gnutls_tls1_3",
243 "requires_gnutls_next_no_ticket",
244 "requires_gnutls_next_disable_tls13_compat", ]
245
246 def post_checks(self):
Jerry Yu29deed42021-11-25 11:09:54 +0800247 return ['-c "HTTP/1.0 200 OK"']
Jerry Yu305bfc32021-11-24 16:04:47 +0800248
249 def cmd(self):
250 ret = [
251 '$G_NEXT_SRV_NO_CERT',
252 '--http',
253 '--disable-client-cert',
254 '--debug=4']
255 for cert, key in self.certificates:
256 ret += ['--x509certfile {cert} --x509keyfile {key}'.format(
257 cert=cert, key=key)]
258 priority_strings = ':+'.join(['NONE'] +
259 list(set(self.priority_strings)) +
260 ['VERS-TLS1.3'])
261 priority_strings += ':%NO_TICKETS:%DISABLE_TLS13_COMPAT_MODE'
262 ret += ['--priority={priority_strings}'.format(
263 priority_strings=priority_strings)]
264 ret = ' '.join(ret)
265 return ret
266
267
268class MbedTLSCli(TLSProgram):
269 """
270 Generate test commands for mbedTLS client.
271 """
Jerry Yu29deed42021-11-25 11:09:54 +0800272
Jerry Yu305bfc32021-11-24 16:04:47 +0800273 def __init__(self, ciphersuite, signature_algorithm, named_group):
274 self.ciphersuites = []
275 self.certificates = []
276 self.signature_algorithms = []
277 self.named_groups = []
278 self.needed_named_groups = []
279 super().__init__(ciphersuite, signature_algorithm, named_group)
280
281 CIPHER_SUITE = {
282 'TLS_AES_256_GCM_SHA384': 'TLS1-3-AES-256-GCM-SHA384',
283 'TLS_AES_128_GCM_SHA256': 'TLS1-3-AES-128-GCM-SHA256',
284 'TLS_CHACHA20_POLY1305_SHA256': 'TLS1-3-CHACHA20-POLY1305-SHA256',
285 'TLS_AES_128_CCM_SHA256': 'TLS1-3-AES-128-CCM-SHA256',
286 'TLS_AES_128_CCM_8_SHA256': 'TLS1-3-AES-128-CCM-8-SHA256'}
287
288 def add_ciphersuites(self, *ciphersuites):
Jerry Yud64e20d2021-11-26 10:50:01 +0800289 for ciphersuite in ciphersuites:
290 self.ciphersuites.append(self.CIPHER_SUITE[ciphersuite])
Jerry Yu305bfc32021-11-24 16:04:47 +0800291
292 def add_signature_algorithms(self, *signature_algorithms):
293 for sig_alg in signature_algorithms:
294 self.signature_algorithms.append(sig_alg)
295 if sig_alg == 'ecdsa_secp256r1_sha256':
296 self.needed_named_groups.append('secp256r1')
297 elif sig_alg == 'ecdsa_secp521r1_sha512':
298 self.needed_named_groups.append('secp521r1')
299 elif sig_alg == 'ecdsa_secp384r1_sha384':
300 self.needed_named_groups.append('secp384r1')
301
302 self.certificates.append(CERTIFICATES[sig_alg])
303
304 def add_named_groups(self, *named_groups):
305 for named_group in named_groups:
306 self.named_groups.append(named_group)
307
308 def pre_checks(self):
Jerry Yu29deed42021-11-25 11:09:54 +0800309
310 ret = ['requires_config_enabled MBEDTLS_DEBUG_C',
311 'requires_config_enabled MBEDTLS_SSL_CLI_C',
312 'requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3_EXPERIMENTAL',
313 'requires_config_disabled MBEDTLS_USE_PSA_CRYPTO']
314 if 'rsa_pss_rsae_sha256' in self.signature_algorithms:
315 ret.append(
316 'requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT')
317 return ret
Jerry Yu305bfc32021-11-24 16:04:47 +0800318
319 def post_checks(self):
320
321 check_strings = ["ECDH curve: {group}".format(group=self._named_group),
322 "server hello, chosen ciphersuite: ( {:04x} ) - {}".format(
323 CIPHER_SUITE_IANA_VALUE[self._cipher],
324 self.CIPHER_SUITE[self._cipher]),
325 "Certificate Verify: Signature algorithm ( {:04x} )".format(
326 SIG_ALG_IANA_VALUE[self._sig_alg]),
327 "Verifying peer X.509 certificate... ok", ]
328 return ['-c "{}"'.format(i) for i in check_strings]
329
330 def cmd(self):
331 ret = ['$P_CLI']
332 ret += [
333 'server_addr=127.0.0.1 server_port=$SRV_PORT',
334 'debug_level=4 force_version=tls1_3']
Jerry Yu29deed42021-11-25 11:09:54 +0800335 ret += ['ca_file={CAFILE}'.format(CAFILE=CAFILE[self._sig_alg])]
Jerry Yu305bfc32021-11-24 16:04:47 +0800336 self.ciphersuites = list(set(self.ciphersuites))
337 cipher = ','.join(self.ciphersuites)
338 if cipher:
339 ret += ["force_ciphersuite={cipher}".format(cipher=cipher)]
340 self.named_groups = remove_duplicates(
341 self.named_groups + self.needed_named_groups)
342 group = ','.join(self.named_groups)
343 if group:
344 ret += ["curves={group}".format(group=group)]
345 sig_alg = ','.join(self.signature_algorithms)
346 ret += ['sig_algs={sig_alg}'.format(sig_alg=sig_alg)]
347 ret = ' '.join(ret)
348 return ret
349
350
351SERVER_CLS = {'OpenSSL': OpenSSLServ, 'GnuTLS': GnuTLSServ}
352CLIENT_CLS = {'mbedTLS': MbedTLSCli}
353
354
Jerry Yu29deed42021-11-25 11:09:54 +0800355def generate_compat_test(server=None, client=None, cipher=None, # pylint: disable=unused-argument
Jerry Yu305bfc32021-11-24 16:04:47 +0800356 sig_alg=None, named_group=None, **kwargs):
357 """
358 Generate test case with `ssl-opt.sh` format.
359 """
360 name = 'TLS1.3 {client[0]}->{server[0]}: {cipher},{named_group},{sig_alg}'.format(
361 client=client, server=server, cipher=cipher, sig_alg=sig_alg, named_group=named_group)
362 server = SERVER_CLS[server](cipher, sig_alg, named_group)
363 client = CLIENT_CLS[client](cipher, sig_alg, named_group)
364
365 cmd = ['run_test "{}"'.format(name), '"{}"'.format(
366 server.cmd()), '"{}"'.format(client.cmd()), '0']
367 cmd += server.post_checks()
368 cmd += client.post_checks()
Jerry Yucdcb6832021-11-29 16:50:13 +0800369 prefix = ' \\\n' + (' '*9)
Jerry Yu305bfc32021-11-24 16:04:47 +0800370 cmd = prefix.join(cmd)
Jerry Yucdcb6832021-11-29 16:50:13 +0800371 return '\n'.join(server.pre_checks() + client.pre_checks() + [cmd])
Jerry Yu29deed42021-11-25 11:09:54 +0800372
Jerry Yu7f5e5ad2021-11-29 17:37:19 +0800373
374SSL_OUTPUT_HEADER = '''#!/bin/sh
Jerry Yucdcb6832021-11-29 16:50:13 +0800375
376# {filename}
377#
378# Copyright The Mbed TLS Contributors
379# SPDX-License-Identifier: Apache-2.0
380#
381# Licensed under the Apache License, Version 2.0 (the "License"); you may
382# not use this file except in compliance with the License.
383# You may obtain a copy of the License at
384#
385# http://www.apache.org/licenses/LICENSE-2.0
386#
387# Unless required by applicable law or agreed to in writing, software
388# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
389# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
390# See the License for the specific language governing permissions and
391# limitations under the License.
392#
393# Purpose
394#
395# List TLS1.3 compat test cases. They are generated by
396# `generate_tls13_compat_tests.py -a`.
397#
398# PLEASE DO NOT EDIT THIS FILE. IF NEEDED, PLEASE MODIFY `generate_tls13_compat_tests.py`
399# AND REGENERATE THIS FILE.
400#
401'''
Jerry Yu29deed42021-11-25 11:09:54 +0800402
Jerry Yu7f5e5ad2021-11-29 17:37:19 +0800403
Jerry Yu305bfc32021-11-24 16:04:47 +0800404def main():
405 parser = argparse.ArgumentParser()
406
Jerry Yucdcb6832021-11-29 16:50:13 +0800407 parser.add_argument('-o', '--output', nargs='?',
Jerry Yu7f5e5ad2021-11-29 17:37:19 +0800408 default=None, help='Output file path if `-a` was set')
Jerry Yucdcb6832021-11-29 16:50:13 +0800409
Jerry Yuc4aa1522021-11-26 11:13:58 +0800410 parser.add_argument('-a', '--generate-all-tls13-compat-tests', action='store_true',
411 default=False, help='Generate all available tls13 compat tests')
412
Jerry Yu305bfc32021-11-24 16:04:47 +0800413 parser.add_argument('--list-ciphers', action='store_true',
414 default=False, help='List supported ciphersuites')
415
416 parser.add_argument('--list-sig-algs', action='store_true',
417 default=False, help='List supported signature algorithms')
418
419 parser.add_argument('--list-named-groups', action='store_true',
420 default=False, help='List supported named groups')
421
422 parser.add_argument('--list-servers', action='store_true',
423 default=False, help='List supported TLS servers')
424
425 parser.add_argument('--list-clients', action='store_true',
426 default=False, help='List supported TLS Clients')
427
428 parser.add_argument('server', choices=SERVER_CLS.keys(), nargs='?',
429 default=list(SERVER_CLS.keys())[0],
430 help='Choose TLS server program for test')
431 parser.add_argument('client', choices=CLIENT_CLS.keys(), nargs='?',
432 default=list(CLIENT_CLS.keys())[0],
433 help='Choose TLS client program for test')
434 parser.add_argument('cipher', choices=CIPHER_SUITE_IANA_VALUE.keys(), nargs='?',
435 default=list(CIPHER_SUITE_IANA_VALUE.keys())[0],
436 help='Choose cipher suite for test')
437 parser.add_argument('sig_alg', choices=SIG_ALG_IANA_VALUE.keys(), nargs='?',
438 default=list(SIG_ALG_IANA_VALUE.keys())[0],
439 help='Choose cipher suite for test')
440 parser.add_argument('named_group', choices=NAMED_GROUP_IANA_VALUE.keys(), nargs='?',
441 default=list(NAMED_GROUP_IANA_VALUE.keys())[0],
442 help='Choose cipher suite for test')
443
444 args = parser.parse_args()
Jerry Yucdcb6832021-11-29 16:50:13 +0800445
Jerry Yu7f5e5ad2021-11-29 17:37:19 +0800446 def get_all_test_cases():
Jerry Yuc4aa1522021-11-26 11:13:58 +0800447 for i in itertools.product(CIPHER_SUITE_IANA_VALUE.keys(), SIG_ALG_IANA_VALUE.keys(),
448 NAMED_GROUP_IANA_VALUE.keys(), SERVER_CLS.keys(),
449 CLIENT_CLS.keys()):
Jerry Yu7f5e5ad2021-11-29 17:37:19 +0800450 yield generate_compat_test(**dict(
Jerry Yucdcb6832021-11-29 16:50:13 +0800451 zip(['cipher', 'sig_alg', 'named_group', 'server', 'client'], i)))
Jerry Yu7f5e5ad2021-11-29 17:37:19 +0800452
453 if args.generate_all_tls13_compat_tests:
454 if args.output:
455 with open(args.output, 'w', encoding="utf-8") as f:
456 f.write(SSL_OUTPUT_HEADER.format(filename=args.output))
457 f.write('\n\n'.join(get_all_test_cases()))
458 else:
459 print('\n'.join(get_all_test_cases()))
Jerry Yuc4aa1522021-11-26 11:13:58 +0800460 return 0
461
Jerry Yu305bfc32021-11-24 16:04:47 +0800462 if args.list_ciphers or args.list_sig_algs or args.list_named_groups \
Jerry Yu29deed42021-11-25 11:09:54 +0800463 or args.list_servers or args.list_clients:
Jerry Yu305bfc32021-11-24 16:04:47 +0800464 if args.list_ciphers:
Jerry Yu7f5e5ad2021-11-29 17:37:19 +0800465 print(*CIPHER_SUITE_IANA_VALUE.keys())
Jerry Yu305bfc32021-11-24 16:04:47 +0800466 if args.list_sig_algs:
Jerry Yu7f5e5ad2021-11-29 17:37:19 +0800467 print(*SIG_ALG_IANA_VALUE.keys())
Jerry Yu305bfc32021-11-24 16:04:47 +0800468 if args.list_named_groups:
Jerry Yu7f5e5ad2021-11-29 17:37:19 +0800469 print(*NAMED_GROUP_IANA_VALUE.keys())
Jerry Yu305bfc32021-11-24 16:04:47 +0800470 if args.list_servers:
Jerry Yu7f5e5ad2021-11-29 17:37:19 +0800471 print(*SERVER_CLS.keys())
Jerry Yu305bfc32021-11-24 16:04:47 +0800472 if args.list_clients:
Jerry Yu7f5e5ad2021-11-29 17:37:19 +0800473 print(*CLIENT_CLS.keys())
Jerry Yu305bfc32021-11-24 16:04:47 +0800474 return 0
Jerry Yucdcb6832021-11-29 16:50:13 +0800475
Jerry Yu7f5e5ad2021-11-29 17:37:19 +0800476 print(generate_compat_test(**vars(args)))
Jerry Yucdcb6832021-11-29 16:50:13 +0800477 return 0
Jerry Yu305bfc32021-11-24 16:04:47 +0800478
Jerry Yu29deed42021-11-25 11:09:54 +0800479
Jerry Yu305bfc32021-11-24 16:04:47 +0800480if __name__ == "__main__":
481 sys.exit(main())