blob: 2e34ebb8b97665ae2347d2e8ff6a29347cb72d27 [file] [log] [blame]
Jerry Yu305bfc32021-11-24 16:04:47 +08001#!/usr/bin/env python3
2
3# generate_tls13_compat_tests.py
4#
5# Copyright The Mbed TLS Contributors
6# SPDX-License-Identifier: Apache-2.0
7#
8# Licensed under the Apache License, Version 2.0 (the "License"); you may
9# not use this file except in compliance with the License.
10# You may obtain a copy of the License at
11#
12# http://www.apache.org/licenses/LICENSE-2.0
13#
14# Unless required by applicable law or agreed to in writing, software
15# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
16# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
17# See the License for the specific language governing permissions and
18# limitations under the License.
19
20"""
21Generate TLSv1.3 Compat test cases
22
23"""
24
25import sys
26import abc
27import argparse
Jerry Yuc4aa1522021-11-26 11:13:58 +080028import itertools
Jerry Yu305bfc32021-11-24 16:04:47 +080029
30# pylint: disable=useless-super-delegation
31
32CERTIFICATES = {
33 'ecdsa_secp256r1_sha256': (
34 'data_files/ecdsa_secp256r1_sha256.crt',
35 'data_files/ecdsa_secp256r1_sha256.key'),
36 'ecdsa_secp384r1_sha384': (
37 'data_files/ecdsa_secp384r1_sha384.crt',
38 'data_files/ecdsa_secp384r1_sha384.key'),
39 'ecdsa_secp521r1_sha512': (
40 'data_files/ecdsa_secp521r1_sha512.crt',
41 'data_files/ecdsa_secp521r1_sha512.key'),
Jerry Yu29deed42021-11-25 11:09:54 +080042 'rsa_pss_rsae_sha256': (
43 'data_files/server2-sha256.crt', 'data_files/server2.key'
44 )
Jerry Yu305bfc32021-11-24 16:04:47 +080045}
46
Jerry Yu29deed42021-11-25 11:09:54 +080047CAFILE = {
48 'ecdsa_secp256r1_sha256': 'data_files/test-ca2.crt',
49 'ecdsa_secp384r1_sha384': 'data_files/test-ca2.crt',
50 'ecdsa_secp521r1_sha512': 'data_files/test-ca2.crt',
51 'rsa_pss_rsae_sha256': 'data_files/test-ca_cat12.crt'
52}
Jerry Yu305bfc32021-11-24 16:04:47 +080053
54CIPHER_SUITE_IANA_VALUE = {
55 "TLS_AES_128_GCM_SHA256": 0x1301,
56 "TLS_AES_256_GCM_SHA384": 0x1302,
57 "TLS_CHACHA20_POLY1305_SHA256": 0x1303,
58 "TLS_AES_128_CCM_SHA256": 0x1304,
59 "TLS_AES_128_CCM_8_SHA256": 0x1305
60}
61
62SIG_ALG_IANA_VALUE = {
63 "ecdsa_secp256r1_sha256": 0x0403,
64 "ecdsa_secp384r1_sha384": 0x0503,
65 "ecdsa_secp521r1_sha512": 0x0603,
Jerry Yu29deed42021-11-25 11:09:54 +080066 'rsa_pss_rsae_sha256': 0x0804,
Jerry Yu305bfc32021-11-24 16:04:47 +080067}
68
69NAMED_GROUP_IANA_VALUE = {
70 'secp256r1': 0x17,
71 'secp384r1': 0x18,
72 'secp521r1': 0x19,
73 'x25519': 0x1d,
74 'x448': 0x1e,
75}
76
77
78def remove_duplicates(seq):
79 seen = set()
80 seen_add = seen.add
81 return [x for x in seq if not (x in seen or seen_add(x))]
82
83
84class TLSProgram(metaclass=abc.ABCMeta):
85 """
86 Base class for generate server/client command.
87 """
Jerry Yu29deed42021-11-25 11:09:54 +080088
Jerry Yu305bfc32021-11-24 16:04:47 +080089 def __init__(self, ciphersuite, signature_algorithm, named_group):
90 self._cipher = ciphersuite
91 self._sig_alg = signature_algorithm
92 self._named_group = named_group
93 self.add_ciphersuites(ciphersuite)
94 self.add_named_groups(named_group)
95 self.add_signature_algorithms(signature_algorithm)
96
97 @abc.abstractmethod
98 def add_ciphersuites(self, *ciphersuites):
99 pass
100
101 @abc.abstractmethod
102 def add_signature_algorithms(self, *signature_algorithms):
103 pass
104
105 @abc.abstractmethod
106 def add_named_groups(self, *named_groups):
107 pass
108
109 @abc.abstractmethod
110 def pre_checks(self):
111 return []
112
113 @abc.abstractmethod
114 def cmd(self):
115 pass
116
117 @abc.abstractmethod
118 def post_checks(self):
119 return []
120
121
122class OpenSSLServ(TLSProgram):
123 """
124 Generate test commands for OpenSSL server.
125 """
126 program = '$OPENSSL_NEXT'
127
128 def __init__(
129 self,
130 ciphersuite,
131 signature_algorithm,
132 named_group):
133 self.ciphersuites = []
134 self.named_groups = []
135 self.signature_algorithms = []
136 self.certificates = []
137 super().__init__(ciphersuite, signature_algorithm, named_group)
138
Jerry Yu305bfc32021-11-24 16:04:47 +0800139 def add_ciphersuites(self, *ciphersuites):
140 self.ciphersuites.extend(ciphersuites)
141
142 def add_signature_algorithms(self, *signature_algorithms):
143 self.signature_algorithms.extend(signature_algorithms)
144 for sig_alg in signature_algorithms:
145 self.certificates.append(CERTIFICATES[sig_alg])
146
147 NAMED_GROUP = {
148 'secp256r1': 'P-256',
149 'secp384r1': 'P-384',
150 'secp521r1': 'P-521',
151 'x25519': 'X25519',
152 'x448': 'X448',
153 }
154
155 def add_named_groups(self, *named_groups):
156 for named_group in named_groups:
157 self.named_groups.append(self.NAMED_GROUP[named_group])
158
159 def cmd(self):
160 ret = ['$O_NEXT_SRV_NO_CERT']
161 for cert, key in self.certificates:
162 ret += ['-cert {cert} -key {key}'.format(cert=cert, key=key)]
163 ret += ['-accept $SRV_PORT']
164 ciphersuites = ','.join(self.ciphersuites)
165 signature_algorithms = ','.join(self.signature_algorithms)
166 named_groups = ','.join(self.named_groups)
167 ret += ["-ciphersuites {ciphersuites}".format(ciphersuites=ciphersuites),
168 "-sigalgs {signature_algorithms}".format(
169 signature_algorithms=signature_algorithms),
170 "-groups {named_groups}".format(named_groups=named_groups)]
171 ret += ['-msg -tls1_3 -no_middlebox -num_tickets 0 -no_resume_ephemeral -no_cache']
172 return ' '.join(ret)
173
174 def pre_checks(self):
175 return ["requires_openssl_tls1_3"]
176
177 def post_checks(self):
Jerry Yu29deed42021-11-25 11:09:54 +0800178 return ['-c "HTTP/1.0 200 ok"']
Jerry Yu305bfc32021-11-24 16:04:47 +0800179
180
181class GnuTLSServ(TLSProgram):
182 """
183 Generate test commands for GnuTLS server.
184 """
185
186 def __init__(self, ciphersuite, signature_algorithm, named_group):
187 self.priority_strings = []
188 self.certificates = []
189 super().__init__(ciphersuite, signature_algorithm, named_group)
190
191 CIPHER_SUITE = {
192 'TLS_AES_256_GCM_SHA384': [
193 'AES-256-GCM',
194 'SHA384',
195 'AEAD'],
196 'TLS_AES_128_GCM_SHA256': [
197 'AES-128-GCM',
198 'SHA256',
199 'AEAD'],
200 'TLS_CHACHA20_POLY1305_SHA256': [
201 'CHACHA20-POLY1305',
202 'SHA256',
203 'AEAD'],
204 'TLS_AES_128_CCM_SHA256': [
205 'AES-128-CCM',
206 'SHA256',
207 'AEAD'],
208 'TLS_AES_128_CCM_8_SHA256': [
209 'AES-128-CCM-8',
210 'SHA256',
211 'AEAD']}
212
213 def add_ciphersuites(self, *ciphersuites):
Jerry Yud64e20d2021-11-26 10:50:01 +0800214 for ciphersuite in ciphersuites:
215 self.priority_strings.extend(self.CIPHER_SUITE[ciphersuite])
Jerry Yu305bfc32021-11-24 16:04:47 +0800216
217 SIGNATURE_ALGORITHM = {
218 'ecdsa_secp256r1_sha256': ['SIGN-ECDSA-SECP256R1-SHA256'],
219 'ecdsa_secp521r1_sha512': ['SIGN-ECDSA-SECP521R1-SHA512'],
Jerry Yu29deed42021-11-25 11:09:54 +0800220 'ecdsa_secp384r1_sha384': ['SIGN-ECDSA-SECP384R1-SHA384'],
221 'rsa_pss_rsae_sha256': ['SIGN-RSA-PSS-RSAE-SHA256']}
Jerry Yu305bfc32021-11-24 16:04:47 +0800222
223 def add_signature_algorithms(self, *signature_algorithms):
224 for sig_alg in signature_algorithms:
225 self.priority_strings.extend(self.SIGNATURE_ALGORITHM[sig_alg])
226 self.certificates.append(CERTIFICATES[sig_alg])
227
228 NAMED_GROUP = {
229 'secp256r1': ['GROUP-SECP256R1'],
230 'secp384r1': ['GROUP-SECP384R1'],
231 'secp521r1': ['GROUP-SECP521R1'],
232 'x25519': ['GROUP-X25519'],
233 'x448': ['GROUP-X448'],
234 }
235
236 def add_named_groups(self, *named_groups):
237 for named_group in named_groups:
238 self.priority_strings.extend(self.NAMED_GROUP[named_group])
239
240 def pre_checks(self):
241 return ["requires_gnutls_tls1_3",
242 "requires_gnutls_next_no_ticket",
243 "requires_gnutls_next_disable_tls13_compat", ]
244
245 def post_checks(self):
Jerry Yu29deed42021-11-25 11:09:54 +0800246 return ['-c "HTTP/1.0 200 OK"']
Jerry Yu305bfc32021-11-24 16:04:47 +0800247
248 def cmd(self):
249 ret = [
250 '$G_NEXT_SRV_NO_CERT',
251 '--http',
252 '--disable-client-cert',
253 '--debug=4']
254 for cert, key in self.certificates:
255 ret += ['--x509certfile {cert} --x509keyfile {key}'.format(
256 cert=cert, key=key)]
257 priority_strings = ':+'.join(['NONE'] +
258 list(set(self.priority_strings)) +
259 ['VERS-TLS1.3'])
260 priority_strings += ':%NO_TICKETS:%DISABLE_TLS13_COMPAT_MODE'
261 ret += ['--priority={priority_strings}'.format(
262 priority_strings=priority_strings)]
263 ret = ' '.join(ret)
264 return ret
265
266
267class MbedTLSCli(TLSProgram):
268 """
269 Generate test commands for mbedTLS client.
270 """
Jerry Yu29deed42021-11-25 11:09:54 +0800271
Jerry Yu305bfc32021-11-24 16:04:47 +0800272 def __init__(self, ciphersuite, signature_algorithm, named_group):
273 self.ciphersuites = []
274 self.certificates = []
275 self.signature_algorithms = []
276 self.named_groups = []
277 self.needed_named_groups = []
278 super().__init__(ciphersuite, signature_algorithm, named_group)
279
280 CIPHER_SUITE = {
281 'TLS_AES_256_GCM_SHA384': 'TLS1-3-AES-256-GCM-SHA384',
282 'TLS_AES_128_GCM_SHA256': 'TLS1-3-AES-128-GCM-SHA256',
283 'TLS_CHACHA20_POLY1305_SHA256': 'TLS1-3-CHACHA20-POLY1305-SHA256',
284 'TLS_AES_128_CCM_SHA256': 'TLS1-3-AES-128-CCM-SHA256',
285 'TLS_AES_128_CCM_8_SHA256': 'TLS1-3-AES-128-CCM-8-SHA256'}
286
287 def add_ciphersuites(self, *ciphersuites):
Jerry Yud64e20d2021-11-26 10:50:01 +0800288 for ciphersuite in ciphersuites:
289 self.ciphersuites.append(self.CIPHER_SUITE[ciphersuite])
Jerry Yu305bfc32021-11-24 16:04:47 +0800290
291 def add_signature_algorithms(self, *signature_algorithms):
292 for sig_alg in signature_algorithms:
293 self.signature_algorithms.append(sig_alg)
294 if sig_alg == 'ecdsa_secp256r1_sha256':
295 self.needed_named_groups.append('secp256r1')
296 elif sig_alg == 'ecdsa_secp521r1_sha512':
297 self.needed_named_groups.append('secp521r1')
298 elif sig_alg == 'ecdsa_secp384r1_sha384':
299 self.needed_named_groups.append('secp384r1')
300
301 self.certificates.append(CERTIFICATES[sig_alg])
302
303 def add_named_groups(self, *named_groups):
304 for named_group in named_groups:
305 self.named_groups.append(named_group)
306
307 def pre_checks(self):
Jerry Yu29deed42021-11-25 11:09:54 +0800308
309 ret = ['requires_config_enabled MBEDTLS_DEBUG_C',
310 'requires_config_enabled MBEDTLS_SSL_CLI_C',
311 'requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3_EXPERIMENTAL',
312 'requires_config_disabled MBEDTLS_USE_PSA_CRYPTO']
313 if 'rsa_pss_rsae_sha256' in self.signature_algorithms:
314 ret.append(
315 'requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT')
316 return ret
Jerry Yu305bfc32021-11-24 16:04:47 +0800317
318 def post_checks(self):
319
320 check_strings = ["ECDH curve: {group}".format(group=self._named_group),
321 "server hello, chosen ciphersuite: ( {:04x} ) - {}".format(
322 CIPHER_SUITE_IANA_VALUE[self._cipher],
323 self.CIPHER_SUITE[self._cipher]),
324 "Certificate Verify: Signature algorithm ( {:04x} )".format(
325 SIG_ALG_IANA_VALUE[self._sig_alg]),
326 "Verifying peer X.509 certificate... ok", ]
327 return ['-c "{}"'.format(i) for i in check_strings]
328
329 def cmd(self):
330 ret = ['$P_CLI']
331 ret += [
332 'server_addr=127.0.0.1 server_port=$SRV_PORT',
333 'debug_level=4 force_version=tls1_3']
Jerry Yu29deed42021-11-25 11:09:54 +0800334 ret += ['ca_file={CAFILE}'.format(CAFILE=CAFILE[self._sig_alg])]
Jerry Yu305bfc32021-11-24 16:04:47 +0800335 self.ciphersuites = list(set(self.ciphersuites))
336 cipher = ','.join(self.ciphersuites)
337 if cipher:
338 ret += ["force_ciphersuite={cipher}".format(cipher=cipher)]
339 self.named_groups = remove_duplicates(
340 self.named_groups + self.needed_named_groups)
341 group = ','.join(self.named_groups)
342 if group:
343 ret += ["curves={group}".format(group=group)]
344 sig_alg = ','.join(self.signature_algorithms)
345 ret += ['sig_algs={sig_alg}'.format(sig_alg=sig_alg)]
346 ret = ' '.join(ret)
347 return ret
348
349
350SERVER_CLS = {'OpenSSL': OpenSSLServ, 'GnuTLS': GnuTLSServ}
351CLIENT_CLS = {'mbedTLS': MbedTLSCli}
352
353
Jerry Yu29deed42021-11-25 11:09:54 +0800354def generate_compat_test(server=None, client=None, cipher=None, # pylint: disable=unused-argument
Jerry Yu305bfc32021-11-24 16:04:47 +0800355 sig_alg=None, named_group=None, **kwargs):
356 """
357 Generate test case with `ssl-opt.sh` format.
358 """
359 name = 'TLS1.3 {client[0]}->{server[0]}: {cipher},{named_group},{sig_alg}'.format(
360 client=client, server=server, cipher=cipher, sig_alg=sig_alg, named_group=named_group)
361 server = SERVER_CLS[server](cipher, sig_alg, named_group)
362 client = CLIENT_CLS[client](cipher, sig_alg, named_group)
363
364 cmd = ['run_test "{}"'.format(name), '"{}"'.format(
365 server.cmd()), '"{}"'.format(client.cmd()), '0']
366 cmd += server.post_checks()
367 cmd += client.post_checks()
368 prefix = ' \\\n' + (' '*12)
369 cmd = prefix.join(cmd)
370 print('\n'.join(server.pre_checks() + client.pre_checks() + [cmd]))
371 return 0
Jerry Yu29deed42021-11-25 11:09:54 +0800372
373
Jerry Yu305bfc32021-11-24 16:04:47 +0800374def main():
375 parser = argparse.ArgumentParser()
376
Jerry Yuc4aa1522021-11-26 11:13:58 +0800377 parser.add_argument('-a', '--generate-all-tls13-compat-tests', action='store_true',
378 default=False, help='Generate all available tls13 compat tests')
379
Jerry Yu305bfc32021-11-24 16:04:47 +0800380 parser.add_argument('--list-ciphers', action='store_true',
381 default=False, help='List supported ciphersuites')
382
383 parser.add_argument('--list-sig-algs', action='store_true',
384 default=False, help='List supported signature algorithms')
385
386 parser.add_argument('--list-named-groups', action='store_true',
387 default=False, help='List supported named groups')
388
389 parser.add_argument('--list-servers', action='store_true',
390 default=False, help='List supported TLS servers')
391
392 parser.add_argument('--list-clients', action='store_true',
393 default=False, help='List supported TLS Clients')
394
395 parser.add_argument('server', choices=SERVER_CLS.keys(), nargs='?',
396 default=list(SERVER_CLS.keys())[0],
397 help='Choose TLS server program for test')
398 parser.add_argument('client', choices=CLIENT_CLS.keys(), nargs='?',
399 default=list(CLIENT_CLS.keys())[0],
400 help='Choose TLS client program for test')
401 parser.add_argument('cipher', choices=CIPHER_SUITE_IANA_VALUE.keys(), nargs='?',
402 default=list(CIPHER_SUITE_IANA_VALUE.keys())[0],
403 help='Choose cipher suite for test')
404 parser.add_argument('sig_alg', choices=SIG_ALG_IANA_VALUE.keys(), nargs='?',
405 default=list(SIG_ALG_IANA_VALUE.keys())[0],
406 help='Choose cipher suite for test')
407 parser.add_argument('named_group', choices=NAMED_GROUP_IANA_VALUE.keys(), nargs='?',
408 default=list(NAMED_GROUP_IANA_VALUE.keys())[0],
409 help='Choose cipher suite for test')
410
411 args = parser.parse_args()
Jerry Yuc4aa1522021-11-26 11:13:58 +0800412 if args.generate_all_tls13_compat_tests:
413 for i in itertools.product(CIPHER_SUITE_IANA_VALUE.keys(), SIG_ALG_IANA_VALUE.keys(),
414 NAMED_GROUP_IANA_VALUE.keys(), SERVER_CLS.keys(),
415 CLIENT_CLS.keys()):
416 generate_compat_test(
417 **dict(zip(['cipher', 'sig_alg', 'named_group', 'server', 'client'], i)))
418 print()
419 return 0
420
Jerry Yu305bfc32021-11-24 16:04:47 +0800421 if args.list_ciphers or args.list_sig_algs or args.list_named_groups \
Jerry Yu29deed42021-11-25 11:09:54 +0800422 or args.list_servers or args.list_clients:
Jerry Yu305bfc32021-11-24 16:04:47 +0800423 if args.list_ciphers:
424 print(*CIPHER_SUITE_IANA_VALUE.keys())
425 if args.list_sig_algs:
426 print(*SIG_ALG_IANA_VALUE.keys())
427 if args.list_named_groups:
428 print(*NAMED_GROUP_IANA_VALUE.keys())
429 if args.list_servers:
430 print(*SERVER_CLS.keys())
431 if args.list_clients:
432 print(*CLIENT_CLS.keys())
433 return 0
434 return generate_compat_test(**vars(args))
435
Jerry Yu29deed42021-11-25 11:09:54 +0800436
Jerry Yu305bfc32021-11-24 16:04:47 +0800437if __name__ == "__main__":
438 sys.exit(main())