Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 1 | #!/usr/bin/env python3 |
| 2 | |
| 3 | # generate_tls13_compat_tests.py |
| 4 | # |
| 5 | # Copyright The Mbed TLS Contributors |
| 6 | # SPDX-License-Identifier: Apache-2.0 |
| 7 | # |
| 8 | # Licensed under the Apache License, Version 2.0 (the "License"); you may |
| 9 | # not use this file except in compliance with the License. |
| 10 | # You may obtain a copy of the License at |
| 11 | # |
| 12 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 13 | # |
| 14 | # Unless required by applicable law or agreed to in writing, software |
| 15 | # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| 16 | # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 17 | # See the License for the specific language governing permissions and |
| 18 | # limitations under the License. |
| 19 | |
| 20 | """ |
| 21 | Generate TLSv1.3 Compat test cases |
| 22 | |
| 23 | """ |
| 24 | |
| 25 | import sys |
Jerry Yu | dda036d | 2021-11-30 11:19:41 +0800 | [diff] [blame] | 26 | import os |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 27 | import abc |
| 28 | import argparse |
Jerry Yu | c4aa152 | 2021-11-26 11:13:58 +0800 | [diff] [blame] | 29 | import itertools |
Jerry Yu | 882c30d | 2021-12-01 10:59:59 +0800 | [diff] [blame] | 30 | from collections import namedtuple |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 31 | |
Jerry Yu | 882c30d | 2021-12-01 10:59:59 +0800 | [diff] [blame] | 32 | # define certificates configuration entry |
| 33 | Certificate = namedtuple("Certificate", ['cafile', 'certfile', 'keyfile']) |
| 34 | # define the certificate parameters for signature algorithms |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 35 | CERTIFICATES = { |
Jerry Yu | 882c30d | 2021-12-01 10:59:59 +0800 | [diff] [blame] | 36 | 'ecdsa_secp256r1_sha256': Certificate('data_files/test-ca2.crt', |
| 37 | 'data_files/ecdsa_secp256r1.crt', |
| 38 | 'data_files/ecdsa_secp256r1.key'), |
| 39 | 'ecdsa_secp384r1_sha384': Certificate('data_files/test-ca2.crt', |
| 40 | 'data_files/ecdsa_secp384r1.crt', |
| 41 | 'data_files/ecdsa_secp384r1.key'), |
| 42 | 'ecdsa_secp521r1_sha512': Certificate('data_files/test-ca2.crt', |
| 43 | 'data_files/ecdsa_secp521r1.crt', |
| 44 | 'data_files/ecdsa_secp521r1.key'), |
| 45 | 'rsa_pss_rsae_sha256': Certificate('data_files/test-ca_cat12.crt', |
| 46 | 'data_files/server2-sha256.crt', 'data_files/server2.key' |
| 47 | ) |
Jerry Yu | 29deed4 | 2021-11-25 11:09:54 +0800 | [diff] [blame] | 48 | } |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 49 | |
| 50 | CIPHER_SUITE_IANA_VALUE = { |
| 51 | "TLS_AES_128_GCM_SHA256": 0x1301, |
| 52 | "TLS_AES_256_GCM_SHA384": 0x1302, |
| 53 | "TLS_CHACHA20_POLY1305_SHA256": 0x1303, |
| 54 | "TLS_AES_128_CCM_SHA256": 0x1304, |
| 55 | "TLS_AES_128_CCM_8_SHA256": 0x1305 |
| 56 | } |
| 57 | |
| 58 | SIG_ALG_IANA_VALUE = { |
| 59 | "ecdsa_secp256r1_sha256": 0x0403, |
| 60 | "ecdsa_secp384r1_sha384": 0x0503, |
| 61 | "ecdsa_secp521r1_sha512": 0x0603, |
Jerry Yu | 29deed4 | 2021-11-25 11:09:54 +0800 | [diff] [blame] | 62 | 'rsa_pss_rsae_sha256': 0x0804, |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 63 | } |
| 64 | |
| 65 | NAMED_GROUP_IANA_VALUE = { |
| 66 | 'secp256r1': 0x17, |
| 67 | 'secp384r1': 0x18, |
| 68 | 'secp521r1': 0x19, |
| 69 | 'x25519': 0x1d, |
| 70 | 'x448': 0x1e, |
| 71 | } |
| 72 | |
XiaokangQian | 68a87e4 | 2022-03-17 06:06:07 +0000 | [diff] [blame] | 73 | |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 74 | class TLSProgram(metaclass=abc.ABCMeta): |
| 75 | """ |
| 76 | Base class for generate server/client command. |
| 77 | """ |
Jerry Yu | 7de7985 | 2022-03-23 16:50:47 +0800 | [diff] [blame] | 78 | # pylint: disable=too-many-arguments |
XiaokangQian | a193144 | 2022-03-25 11:58:22 +0000 | [diff] [blame] | 79 | def __init__(self, ciphersuite=None, signature_algorithm=None, named_group=None, |
| 80 | cert_sig_alg=None, compat_mode=True): |
Jerry Yu | 7918efe | 2021-12-01 15:29:10 +0800 | [diff] [blame] | 81 | self._ciphers = [] |
| 82 | self._sig_algs = [] |
| 83 | self._named_groups = [] |
Jerry Yu | 7de7985 | 2022-03-23 16:50:47 +0800 | [diff] [blame] | 84 | self._cert_sig_algs = [] |
| 85 | if ciphersuite: |
| 86 | self.add_ciphersuites(ciphersuite) |
| 87 | if named_group: |
| 88 | self.add_named_groups(named_group) |
| 89 | if signature_algorithm: |
| 90 | self.add_signature_algorithms(signature_algorithm) |
| 91 | if cert_sig_alg: |
| 92 | self.add_cert_signature_algorithms(cert_sig_alg) |
Ronald Cron | ae93725 | 2021-12-10 09:55:15 +0100 | [diff] [blame] | 93 | self._compat_mode = compat_mode |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 94 | |
Jerry Yu | 7918efe | 2021-12-01 15:29:10 +0800 | [diff] [blame] | 95 | # add_ciphersuites should not override by sub class |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 96 | def add_ciphersuites(self, *ciphersuites): |
Jerry Yu | 7918efe | 2021-12-01 15:29:10 +0800 | [diff] [blame] | 97 | self._ciphers.extend( |
| 98 | [cipher for cipher in ciphersuites if cipher not in self._ciphers]) |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 99 | |
Jerry Yu | 7918efe | 2021-12-01 15:29:10 +0800 | [diff] [blame] | 100 | # add_signature_algorithms should not override by sub class |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 101 | def add_signature_algorithms(self, *signature_algorithms): |
Jerry Yu | 7918efe | 2021-12-01 15:29:10 +0800 | [diff] [blame] | 102 | self._sig_algs.extend( |
| 103 | [sig_alg for sig_alg in signature_algorithms if sig_alg not in self._sig_algs]) |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 104 | |
Jerry Yu | 7de7985 | 2022-03-23 16:50:47 +0800 | [diff] [blame] | 105 | # add_named_groups should not override by sub class |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 106 | def add_named_groups(self, *named_groups): |
Jerry Yu | 7918efe | 2021-12-01 15:29:10 +0800 | [diff] [blame] | 107 | self._named_groups.extend( |
| 108 | [named_group for named_group in named_groups if named_group not in self._named_groups]) |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 109 | |
Jerry Yu | 7de7985 | 2022-03-23 16:50:47 +0800 | [diff] [blame] | 110 | # add_cert_signature_algorithms should not override by sub class |
| 111 | def add_cert_signature_algorithms(self, *signature_algorithms): |
| 112 | self._cert_sig_algs.extend( |
| 113 | [sig_alg for sig_alg in signature_algorithms if sig_alg not in self._cert_sig_algs]) |
| 114 | |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 115 | @abc.abstractmethod |
| 116 | def pre_checks(self): |
| 117 | return [] |
| 118 | |
| 119 | @abc.abstractmethod |
| 120 | def cmd(self): |
Jerry Yu | 7de7985 | 2022-03-23 16:50:47 +0800 | [diff] [blame] | 121 | if not self._cert_sig_algs: |
| 122 | self._cert_sig_algs = list(CERTIFICATES.keys()) |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 123 | |
| 124 | @abc.abstractmethod |
| 125 | def post_checks(self): |
| 126 | return [] |
| 127 | |
| 128 | |
| 129 | class OpenSSLServ(TLSProgram): |
| 130 | """ |
| 131 | Generate test commands for OpenSSL server. |
| 132 | """ |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 133 | |
| 134 | NAMED_GROUP = { |
| 135 | 'secp256r1': 'P-256', |
| 136 | 'secp384r1': 'P-384', |
| 137 | 'secp521r1': 'P-521', |
| 138 | 'x25519': 'X25519', |
| 139 | 'x448': 'X448', |
| 140 | } |
| 141 | |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 142 | def cmd(self): |
Jerry Yu | 7de7985 | 2022-03-23 16:50:47 +0800 | [diff] [blame] | 143 | super().cmd() |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 144 | ret = ['$O_NEXT_SRV_NO_CERT'] |
Jerry Yu | 7de7985 | 2022-03-23 16:50:47 +0800 | [diff] [blame] | 145 | for _, cert, key in map(lambda sig_alg: CERTIFICATES[sig_alg], self._cert_sig_algs): |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 146 | ret += ['-cert {cert} -key {key}'.format(cert=cert, key=key)] |
| 147 | ret += ['-accept $SRV_PORT'] |
Jerry Yu | 7de7985 | 2022-03-23 16:50:47 +0800 | [diff] [blame] | 148 | |
XiaokangQian | a193144 | 2022-03-25 11:58:22 +0000 | [diff] [blame] | 149 | if self._ciphers: |
| 150 | ciphersuites = ':'.join(self._ciphers) |
| 151 | ret += ["-ciphersuites {ciphersuites}".format(ciphersuites=ciphersuites)] |
Jerry Yu | 7de7985 | 2022-03-23 16:50:47 +0800 | [diff] [blame] | 152 | |
XiaokangQian | a193144 | 2022-03-25 11:58:22 +0000 | [diff] [blame] | 153 | if self._sig_algs: |
| 154 | signature_algorithms = set(self._sig_algs + self._cert_sig_algs) |
| 155 | signature_algorithms = ':'.join(signature_algorithms) |
| 156 | ret += ["-sigalgs {signature_algorithms}".format( |
| 157 | signature_algorithms=signature_algorithms)] |
Jerry Yu | 7de7985 | 2022-03-23 16:50:47 +0800 | [diff] [blame] | 158 | |
| 159 | if self._named_groups: |
| 160 | named_groups = ':'.join( |
| 161 | map(lambda named_group: self.NAMED_GROUP[named_group], self._named_groups)) |
| 162 | ret += ["-groups {named_groups}".format(named_groups=named_groups)] |
| 163 | |
Ronald Cron | fdb0e3f | 2021-12-09 10:39:19 +0100 | [diff] [blame] | 164 | ret += ['-msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache'] |
Ronald Cron | ae93725 | 2021-12-10 09:55:15 +0100 | [diff] [blame] | 165 | if not self._compat_mode: |
| 166 | ret += ['-no_middlebox'] |
| 167 | |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 168 | return ' '.join(ret) |
| 169 | |
| 170 | def pre_checks(self): |
| 171 | return ["requires_openssl_tls1_3"] |
| 172 | |
| 173 | def post_checks(self): |
Jerry Yu | 29deed4 | 2021-11-25 11:09:54 +0800 | [diff] [blame] | 174 | return ['-c "HTTP/1.0 200 ok"'] |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 175 | |
| 176 | |
| 177 | class GnuTLSServ(TLSProgram): |
| 178 | """ |
| 179 | Generate test commands for GnuTLS server. |
| 180 | """ |
| 181 | |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 182 | CIPHER_SUITE = { |
| 183 | 'TLS_AES_256_GCM_SHA384': [ |
| 184 | 'AES-256-GCM', |
| 185 | 'SHA384', |
| 186 | 'AEAD'], |
| 187 | 'TLS_AES_128_GCM_SHA256': [ |
| 188 | 'AES-128-GCM', |
| 189 | 'SHA256', |
| 190 | 'AEAD'], |
| 191 | 'TLS_CHACHA20_POLY1305_SHA256': [ |
| 192 | 'CHACHA20-POLY1305', |
| 193 | 'SHA256', |
| 194 | 'AEAD'], |
| 195 | 'TLS_AES_128_CCM_SHA256': [ |
| 196 | 'AES-128-CCM', |
| 197 | 'SHA256', |
| 198 | 'AEAD'], |
| 199 | 'TLS_AES_128_CCM_8_SHA256': [ |
| 200 | 'AES-128-CCM-8', |
| 201 | 'SHA256', |
| 202 | 'AEAD']} |
| 203 | |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 204 | SIGNATURE_ALGORITHM = { |
| 205 | 'ecdsa_secp256r1_sha256': ['SIGN-ECDSA-SECP256R1-SHA256'], |
| 206 | 'ecdsa_secp521r1_sha512': ['SIGN-ECDSA-SECP521R1-SHA512'], |
Jerry Yu | 29deed4 | 2021-11-25 11:09:54 +0800 | [diff] [blame] | 207 | 'ecdsa_secp384r1_sha384': ['SIGN-ECDSA-SECP384R1-SHA384'], |
| 208 | 'rsa_pss_rsae_sha256': ['SIGN-RSA-PSS-RSAE-SHA256']} |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 209 | |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 210 | NAMED_GROUP = { |
| 211 | 'secp256r1': ['GROUP-SECP256R1'], |
| 212 | 'secp384r1': ['GROUP-SECP384R1'], |
| 213 | 'secp521r1': ['GROUP-SECP521R1'], |
| 214 | 'x25519': ['GROUP-X25519'], |
| 215 | 'x448': ['GROUP-X448'], |
| 216 | } |
| 217 | |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 218 | def pre_checks(self): |
| 219 | return ["requires_gnutls_tls1_3", |
| 220 | "requires_gnutls_next_no_ticket", |
| 221 | "requires_gnutls_next_disable_tls13_compat", ] |
| 222 | |
| 223 | def post_checks(self): |
Jerry Yu | 29deed4 | 2021-11-25 11:09:54 +0800 | [diff] [blame] | 224 | return ['-c "HTTP/1.0 200 OK"'] |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 225 | |
| 226 | def cmd(self): |
Jerry Yu | 7de7985 | 2022-03-23 16:50:47 +0800 | [diff] [blame] | 227 | super().cmd() |
Jerry Yu | 7918efe | 2021-12-01 15:29:10 +0800 | [diff] [blame] | 228 | ret = ['$G_NEXT_SRV_NO_CERT', '--http', |
| 229 | '--disable-client-cert', '--debug=4'] |
| 230 | |
Jerry Yu | 7de7985 | 2022-03-23 16:50:47 +0800 | [diff] [blame] | 231 | for _, cert, key in map(lambda sig_alg: CERTIFICATES[sig_alg], self._cert_sig_algs): |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 232 | ret += ['--x509certfile {cert} --x509keyfile {key}'.format( |
| 233 | cert=cert, key=key)] |
Jerry Yu | 7918efe | 2021-12-01 15:29:10 +0800 | [diff] [blame] | 234 | |
| 235 | priority_string_list = [] |
| 236 | |
| 237 | def update_priority_string_list(items, map_table): |
| 238 | for item in items: |
| 239 | for i in map_table[item]: |
| 240 | if i not in priority_string_list: |
| 241 | yield i |
Jerry Yu | 7de7985 | 2022-03-23 16:50:47 +0800 | [diff] [blame] | 242 | |
XiaokangQian | a193144 | 2022-03-25 11:58:22 +0000 | [diff] [blame] | 243 | if self._ciphers: |
| 244 | priority_string_list.extend(update_priority_string_list( |
| 245 | self._ciphers, self.CIPHER_SUITE)) |
Jerry Yu | 7de7985 | 2022-03-23 16:50:47 +0800 | [diff] [blame] | 246 | else: |
XiaokangQian | 5c25262 | 2022-03-28 08:30:25 +0000 | [diff] [blame] | 247 | priority_string_list.extend(['CIPHER-ALL', 'MAC-ALL']) |
Jerry Yu | 7de7985 | 2022-03-23 16:50:47 +0800 | [diff] [blame] | 248 | |
XiaokangQian | a193144 | 2022-03-25 11:58:22 +0000 | [diff] [blame] | 249 | if self._sig_algs: |
| 250 | signature_algorithms = set(self._sig_algs + self._cert_sig_algs) |
| 251 | priority_string_list.extend(update_priority_string_list( |
| 252 | signature_algorithms, self.SIGNATURE_ALGORITHM)) |
| 253 | else: |
XiaokangQian | 5c25262 | 2022-03-28 08:30:25 +0000 | [diff] [blame] | 254 | priority_string_list.append('SIGN-ALL') |
Jerry Yu | 7de7985 | 2022-03-23 16:50:47 +0800 | [diff] [blame] | 255 | |
| 256 | |
| 257 | if self._named_groups: |
| 258 | priority_string_list.extend(update_priority_string_list( |
| 259 | self._named_groups, self.NAMED_GROUP)) |
| 260 | else: |
| 261 | priority_string_list.append('GROUP-ALL') |
| 262 | |
| 263 | priority_string_list = ['NONE'] + \ |
| 264 | sorted(priority_string_list) + ['VERS-TLS1.3'] |
Jerry Yu | 7918efe | 2021-12-01 15:29:10 +0800 | [diff] [blame] | 265 | |
| 266 | priority_string = ':+'.join(priority_string_list) |
Ronald Cron | fdb0e3f | 2021-12-09 10:39:19 +0100 | [diff] [blame] | 267 | priority_string += ':%NO_TICKETS' |
Jerry Yu | 7de7985 | 2022-03-23 16:50:47 +0800 | [diff] [blame] | 268 | |
Ronald Cron | ae93725 | 2021-12-10 09:55:15 +0100 | [diff] [blame] | 269 | if not self._compat_mode: |
| 270 | priority_string += [':%DISABLE_TLS13_COMPAT_MODE'] |
| 271 | |
Jerry Yu | 7918efe | 2021-12-01 15:29:10 +0800 | [diff] [blame] | 272 | ret += ['--priority={priority_string}'.format( |
| 273 | priority_string=priority_string)] |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 274 | ret = ' '.join(ret) |
| 275 | return ret |
| 276 | |
| 277 | |
XiaokangQian | d5d5b60 | 2022-05-23 09:16:20 +0000 | [diff] [blame^] | 278 | class MbedTLSServ(TLSProgram): |
| 279 | """ |
| 280 | Generate test commands for mbedTLS server. |
| 281 | """ |
| 282 | |
| 283 | CIPHER_SUITE = { |
| 284 | 'TLS_AES_256_GCM_SHA384': 'TLS1-3-AES-256-GCM-SHA384', |
| 285 | 'TLS_AES_128_GCM_SHA256': 'TLS1-3-AES-128-GCM-SHA256', |
| 286 | 'TLS_CHACHA20_POLY1305_SHA256': 'TLS1-3-CHACHA20-POLY1305-SHA256', |
| 287 | 'TLS_AES_128_CCM_SHA256': 'TLS1-3-AES-128-CCM-SHA256', |
| 288 | 'TLS_AES_128_CCM_8_SHA256': 'TLS1-3-AES-128-CCM-8-SHA256'} |
| 289 | |
| 290 | def cmd(self): |
| 291 | super().cmd() |
| 292 | ret = ['$P_SRV_NO_CERT'] |
| 293 | ret += ['server_addr=127.0.0.1', 'server_port=$SRV_PORT', |
| 294 | 'debug_level=4', 'force_version=tls13'] |
| 295 | for _, cert, key in map(lambda sig_alg: CERTIFICATES[sig_alg], self._cert_sig_algs): |
| 296 | ret += ['crt_file={cert} key_file={key}'.format(cert=cert, key=key)] |
| 297 | ret += ['ca_file={cafile}'.format( |
| 298 | cafile=CERTIFICATES[self._cert_sig_algs[0]].cafile)] |
| 299 | |
| 300 | if self._ciphers: |
| 301 | ciphers = ','.join( |
| 302 | map(lambda cipher: self.CIPHER_SUITE[cipher], self._ciphers)) |
| 303 | ret += ["force_ciphersuite={ciphers}".format(ciphers=ciphers)] |
| 304 | |
| 305 | if self._sig_algs + self._cert_sig_algs: |
| 306 | ret += ['sig_algs={sig_algs}'.format( |
| 307 | sig_algs=','.join(set(self._sig_algs + self._cert_sig_algs)))] |
| 308 | |
| 309 | if self._named_groups: |
| 310 | named_groups = ','.join(self._named_groups) |
| 311 | ret += ["curves={named_groups}".format(named_groups=named_groups)] |
| 312 | |
| 313 | ret += ['tls13_kex_modes=ephemeral cookies=0 tickets=0'] |
| 314 | ret = ' '.join(ret) |
| 315 | return ret |
| 316 | |
| 317 | def pre_checks(self): |
| 318 | ret = ['requires_config_enabled MBEDTLS_DEBUG_C', |
| 319 | 'requires_config_enabled MBEDTLS_SSL_CLI_C', |
| 320 | 'requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3'] |
| 321 | |
| 322 | if self._compat_mode: |
| 323 | ret += ['requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE'] |
| 324 | |
| 325 | if 'rsa_pss_rsae_sha256' in self._sig_algs + self._cert_sig_algs: |
| 326 | ret.append( |
| 327 | 'requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT') |
| 328 | return ret |
| 329 | |
| 330 | def post_checks(self): |
| 331 | check_strings = ["Protocol is TLSv1.3"] |
| 332 | if self._ciphers: |
| 333 | check_strings.append( |
| 334 | "server hello, chosen ciphersuite: {} ( id={:04d} )".format( |
| 335 | self.CIPHER_SUITE[self._ciphers[0]], |
| 336 | CIPHER_SUITE_IANA_VALUE[self._ciphers[0]])) |
| 337 | if self._sig_algs: |
| 338 | check_strings.append( |
| 339 | "received signature algorithm: 0x{:x}".format( |
| 340 | SIG_ALG_IANA_VALUE[self._sig_algs[0]])) |
| 341 | |
| 342 | for named_group in self._named_groups: |
| 343 | check_strings += ['got named group: {named_group}({iana_value:04x})'.format( |
| 344 | named_group=named_group, |
| 345 | iana_value=NAMED_GROUP_IANA_VALUE[named_group])] |
| 346 | |
| 347 | check_strings.append("Verifying peer X.509 certificate... ok") |
| 348 | return ['-s "{}"'.format(i) for i in check_strings] |
| 349 | |
| 350 | |
| 351 | class OpenSSLCli(TLSProgram): |
| 352 | """ |
| 353 | Generate test commands for OpenSSL client. |
| 354 | """ |
| 355 | |
| 356 | NAMED_GROUP = { |
| 357 | 'secp256r1': 'P-256', |
| 358 | 'secp384r1': 'P-384', |
| 359 | 'secp521r1': 'P-521', |
| 360 | 'x25519': 'X25519', |
| 361 | 'x448': 'X448', |
| 362 | } |
| 363 | |
| 364 | def cmd(self): |
| 365 | super().cmd() |
| 366 | ret = ['$O_NEXT_CLI_NO_CERT'] |
| 367 | for _, cert, key in map(lambda sig_alg: CERTIFICATES[sig_alg], self._cert_sig_algs): |
| 368 | ret += ['-cert {cert} -key {key}'.format(cert=cert, key=key)] |
| 369 | |
| 370 | ret += ['-CAfile {cafile}'.format( |
| 371 | cafile=CERTIFICATES[self._cert_sig_algs[0]].cafile)] |
| 372 | |
| 373 | if self._ciphers: |
| 374 | ciphersuites = ':'.join(self._ciphers) |
| 375 | ret += ["-ciphersuites {ciphersuites}".format(ciphersuites=ciphersuites)] |
| 376 | |
| 377 | if self._sig_algs: |
| 378 | signature_algorithms = set(self._sig_algs + self._cert_sig_algs) |
| 379 | signature_algorithms = ':'.join(signature_algorithms) |
| 380 | ret += ["-sigalgs {signature_algorithms}".format( |
| 381 | signature_algorithms=signature_algorithms)] |
| 382 | |
| 383 | if self._named_groups: |
| 384 | named_groups = ':'.join( |
| 385 | map(lambda named_group: self.NAMED_GROUP[named_group], self._named_groups)) |
| 386 | ret += ["-groups {named_groups}".format(named_groups=named_groups)] |
| 387 | |
| 388 | ret += ['-msg -tls1_3'] |
| 389 | if not self._compat_mode: |
| 390 | ret += ['-no_middlebox'] |
| 391 | |
| 392 | return ' '.join(ret) |
| 393 | |
| 394 | def pre_checks(self): |
| 395 | return ["requires_openssl_tls1_3"] |
| 396 | |
| 397 | def post_checks(self): |
| 398 | return ['-s "HTTP/1.0 200 OK"'] |
| 399 | |
| 400 | |
| 401 | class GnuTLSCli(TLSProgram): |
| 402 | """ |
| 403 | Generate test commands for GnuTLS client. |
| 404 | """ |
| 405 | |
| 406 | CIPHER_SUITE = { |
| 407 | 'TLS_AES_256_GCM_SHA384': [ |
| 408 | 'AES-256-GCM', |
| 409 | 'SHA384', |
| 410 | 'AEAD'], |
| 411 | 'TLS_AES_128_GCM_SHA256': [ |
| 412 | 'AES-128-GCM', |
| 413 | 'SHA256', |
| 414 | 'AEAD'], |
| 415 | 'TLS_CHACHA20_POLY1305_SHA256': [ |
| 416 | 'CHACHA20-POLY1305', |
| 417 | 'SHA256', |
| 418 | 'AEAD'], |
| 419 | 'TLS_AES_128_CCM_SHA256': [ |
| 420 | 'AES-128-CCM', |
| 421 | 'SHA256', |
| 422 | 'AEAD'], |
| 423 | 'TLS_AES_128_CCM_8_SHA256': [ |
| 424 | 'AES-128-CCM-8', |
| 425 | 'SHA256', |
| 426 | 'AEAD']} |
| 427 | |
| 428 | SIGNATURE_ALGORITHM = { |
| 429 | 'ecdsa_secp256r1_sha256': ['SIGN-ECDSA-SECP256R1-SHA256'], |
| 430 | 'ecdsa_secp521r1_sha512': ['SIGN-ECDSA-SECP521R1-SHA512'], |
| 431 | 'ecdsa_secp384r1_sha384': ['SIGN-ECDSA-SECP384R1-SHA384'], |
| 432 | 'rsa_pss_rsae_sha256': ['SIGN-RSA-PSS-RSAE-SHA256']} |
| 433 | |
| 434 | NAMED_GROUP = { |
| 435 | 'secp256r1': ['GROUP-SECP256R1'], |
| 436 | 'secp384r1': ['GROUP-SECP384R1'], |
| 437 | 'secp521r1': ['GROUP-SECP521R1'], |
| 438 | 'x25519': ['GROUP-X25519'], |
| 439 | 'x448': ['GROUP-X448'], |
| 440 | } |
| 441 | |
| 442 | def pre_checks(self): |
| 443 | return ["requires_gnutls_tls1_3", |
| 444 | "requires_gnutls_next_no_ticket", |
| 445 | "requires_gnutls_next_disable_tls13_compat", ] |
| 446 | |
| 447 | def post_checks(self): |
| 448 | return ['-c "HTTP/1.0 200 OK"'] |
| 449 | |
| 450 | def cmd(self): |
| 451 | super().cmd() |
| 452 | ret = ['$G_NEXT_CLI_NO_CERT', '--debug=4'] |
| 453 | ret += ['localhost', '-p $SRV_PORT', '--single-key-share'] |
| 454 | ret += ['--x509cafile {cafile}'.format( |
| 455 | cafile=CERTIFICATES[self._cert_sig_algs[0]].cafile)] |
| 456 | |
| 457 | for _, cert, key in map(lambda sig_alg: CERTIFICATES[sig_alg], self._cert_sig_algs): |
| 458 | ret += ['--x509certfile {cert} --x509keyfile {key}'.format( |
| 459 | cert=cert, key=key)] |
| 460 | |
| 461 | priority_string_list = [] |
| 462 | |
| 463 | def update_priority_string_list(items, map_table): |
| 464 | for item in items: |
| 465 | for i in map_table[item]: |
| 466 | if i not in priority_string_list: |
| 467 | yield i |
| 468 | |
| 469 | if self._ciphers: |
| 470 | priority_string_list.extend(update_priority_string_list( |
| 471 | self._ciphers, self.CIPHER_SUITE)) |
| 472 | else: |
| 473 | priority_string_list.extend(['CIPHER-ALL', 'MAC-ALL']) |
| 474 | |
| 475 | if self._sig_algs: |
| 476 | signature_algorithms = set(self._sig_algs + self._cert_sig_algs) |
| 477 | priority_string_list.extend(update_priority_string_list( |
| 478 | signature_algorithms, self.SIGNATURE_ALGORITHM)) |
| 479 | else: |
| 480 | priority_string_list.append('SIGN-ALL') |
| 481 | |
| 482 | |
| 483 | if self._named_groups: |
| 484 | priority_string_list.extend(update_priority_string_list( |
| 485 | self._named_groups, self.NAMED_GROUP)) |
| 486 | else: |
| 487 | priority_string_list.append('GROUP-ALL') |
| 488 | |
| 489 | priority_string_list = ['NONE'] + \ |
| 490 | priority_string_list + ['VERS-TLS1.3'] |
| 491 | |
| 492 | priority_string = ':+'.join(priority_string_list) |
| 493 | priority_string += ':%NO_TICKETS' |
| 494 | |
| 495 | if not self._compat_mode: |
| 496 | priority_string += [':%DISABLE_TLS13_COMPAT_MODE'] |
| 497 | |
| 498 | ret += ['--priority={priority_string}'.format( |
| 499 | priority_string=priority_string)] |
| 500 | ret = ' '.join(ret) |
| 501 | return ret |
| 502 | |
| 503 | |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 504 | class MbedTLSCli(TLSProgram): |
| 505 | """ |
| 506 | Generate test commands for mbedTLS client. |
| 507 | """ |
Jerry Yu | 29deed4 | 2021-11-25 11:09:54 +0800 | [diff] [blame] | 508 | |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 509 | CIPHER_SUITE = { |
| 510 | 'TLS_AES_256_GCM_SHA384': 'TLS1-3-AES-256-GCM-SHA384', |
| 511 | 'TLS_AES_128_GCM_SHA256': 'TLS1-3-AES-128-GCM-SHA256', |
| 512 | 'TLS_CHACHA20_POLY1305_SHA256': 'TLS1-3-CHACHA20-POLY1305-SHA256', |
| 513 | 'TLS_AES_128_CCM_SHA256': 'TLS1-3-AES-128-CCM-SHA256', |
| 514 | 'TLS_AES_128_CCM_8_SHA256': 'TLS1-3-AES-128-CCM-8-SHA256'} |
| 515 | |
Jerry Yu | 7918efe | 2021-12-01 15:29:10 +0800 | [diff] [blame] | 516 | def cmd(self): |
Jerry Yu | 7de7985 | 2022-03-23 16:50:47 +0800 | [diff] [blame] | 517 | super().cmd() |
Jerry Yu | 7918efe | 2021-12-01 15:29:10 +0800 | [diff] [blame] | 518 | ret = ['$P_CLI'] |
| 519 | ret += ['server_addr=127.0.0.1', 'server_port=$SRV_PORT', |
Ronald Cron | a1b8f6e | 2022-03-18 14:04:12 +0100 | [diff] [blame] | 520 | 'debug_level=4'] |
Jerry Yu | 7918efe | 2021-12-01 15:29:10 +0800 | [diff] [blame] | 521 | ret += ['ca_file={cafile}'.format( |
Jerry Yu | 7de7985 | 2022-03-23 16:50:47 +0800 | [diff] [blame] | 522 | cafile=CERTIFICATES[self._cert_sig_algs[0]].cafile)] |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 523 | |
XiaokangQian | a193144 | 2022-03-25 11:58:22 +0000 | [diff] [blame] | 524 | if self._ciphers: |
| 525 | ciphers = ','.join( |
| 526 | map(lambda cipher: self.CIPHER_SUITE[cipher], self._ciphers)) |
| 527 | ret += ["force_ciphersuite={ciphers}".format(ciphers=ciphers)] |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 528 | |
XiaokangQian | a193144 | 2022-03-25 11:58:22 +0000 | [diff] [blame] | 529 | if self._sig_algs + self._cert_sig_algs: |
| 530 | ret += ['sig_algs={sig_algs}'.format( |
| 531 | sig_algs=','.join(set(self._sig_algs + self._cert_sig_algs)))] |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 532 | |
Jerry Yu | 7918efe | 2021-12-01 15:29:10 +0800 | [diff] [blame] | 533 | if self._named_groups: |
XiaokangQian | 8031ba7 | 2022-03-22 12:53:45 +0000 | [diff] [blame] | 534 | named_groups = ','.join(self._named_groups) |
Jerry Yu | 7918efe | 2021-12-01 15:29:10 +0800 | [diff] [blame] | 535 | ret += ["curves={named_groups}".format(named_groups=named_groups)] |
| 536 | |
| 537 | ret = ' '.join(ret) |
| 538 | return ret |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 539 | |
| 540 | def pre_checks(self): |
Jerry Yu | 29deed4 | 2021-11-25 11:09:54 +0800 | [diff] [blame] | 541 | ret = ['requires_config_enabled MBEDTLS_DEBUG_C', |
| 542 | 'requires_config_enabled MBEDTLS_SSL_CLI_C', |
Ronald Cron | 135427c | 2022-01-07 22:14:24 +0100 | [diff] [blame] | 543 | 'requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3'] |
Ronald Cron | ae93725 | 2021-12-10 09:55:15 +0100 | [diff] [blame] | 544 | |
| 545 | if self._compat_mode: |
| 546 | ret += ['requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE'] |
| 547 | |
Jerry Yu | 7de7985 | 2022-03-23 16:50:47 +0800 | [diff] [blame] | 548 | if 'rsa_pss_rsae_sha256' in self._sig_algs + self._cert_sig_algs: |
Jerry Yu | 29deed4 | 2021-11-25 11:09:54 +0800 | [diff] [blame] | 549 | ret.append( |
| 550 | 'requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT') |
| 551 | return ret |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 552 | |
| 553 | def post_checks(self): |
Ronald Cron | a1b8f6e | 2022-03-18 14:04:12 +0100 | [diff] [blame] | 554 | check_strings = ["Protocol is TLSv1.3"] |
Jerry Yu | 7de7985 | 2022-03-23 16:50:47 +0800 | [diff] [blame] | 555 | if self._ciphers: |
| 556 | check_strings.append( |
| 557 | "server hello, chosen ciphersuite: ( {:04x} ) - {}".format( |
| 558 | CIPHER_SUITE_IANA_VALUE[self._ciphers[0]], |
| 559 | self.CIPHER_SUITE[self._ciphers[0]])) |
| 560 | if self._sig_algs: |
| 561 | check_strings.append( |
| 562 | "Certificate Verify: Signature algorithm ( {:04x} )".format( |
| 563 | SIG_ALG_IANA_VALUE[self._sig_algs[0]])) |
| 564 | |
| 565 | for named_group in self._named_groups: |
| 566 | check_strings += ['NamedGroup: {named_group} ( {iana_value:x} )'.format( |
| 567 | named_group=named_group, |
| 568 | iana_value=NAMED_GROUP_IANA_VALUE[named_group])] |
| 569 | |
| 570 | check_strings.append("Verifying peer X.509 certificate... ok") |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 571 | return ['-c "{}"'.format(i) for i in check_strings] |
| 572 | |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 573 | |
Jerry Yu | b4ac8f3 | 2021-12-01 10:41:37 +0800 | [diff] [blame] | 574 | SERVER_CLASSES = {'OpenSSL': OpenSSLServ, 'GnuTLS': GnuTLSServ} |
| 575 | CLIENT_CLASSES = {'mbedTLS': MbedTLSCli} |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 576 | |
XiaokangQian | d5d5b60 | 2022-05-23 09:16:20 +0000 | [diff] [blame^] | 577 | SERVER_SERVER_CLASSES = {'mbedTLS': MbedTLSServ} |
| 578 | SERVER_CLIENT_CLASSES = {'OpenSSL': OpenSSLCli, 'GnuTLS': GnuTLSCli, 'mbedTLS': MbedTLSCli} |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 579 | |
Ronald Cron | 9d0a3e8 | 2022-04-05 16:13:38 +0200 | [diff] [blame] | 580 | def generate_compat_test(client=None, server=None, cipher=None, named_group=None, sig_alg=None): |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 581 | """ |
| 582 | Generate test case with `ssl-opt.sh` format. |
| 583 | """ |
Jerry Yu | dda036d | 2021-11-30 11:19:41 +0800 | [diff] [blame] | 584 | name = 'TLS 1.3 {client[0]}->{server[0]}: {cipher},{named_group},{sig_alg}'.format( |
Ronald Cron | df5f868 | 2022-04-05 16:01:03 +0200 | [diff] [blame] | 585 | client=client, server=server, cipher=cipher[4:], sig_alg=sig_alg, named_group=named_group) |
Jerry Yu | 7de7985 | 2022-03-23 16:50:47 +0800 | [diff] [blame] | 586 | |
| 587 | server_object = SERVER_CLASSES[server](ciphersuite=cipher, |
| 588 | named_group=named_group, |
| 589 | signature_algorithm=sig_alg, |
| 590 | cert_sig_alg=sig_alg) |
| 591 | client_object = CLIENT_CLASSES[client](ciphersuite=cipher, |
| 592 | named_group=named_group, |
| 593 | signature_algorithm=sig_alg, |
| 594 | cert_sig_alg=sig_alg) |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 595 | |
| 596 | cmd = ['run_test "{}"'.format(name), '"{}"'.format( |
Jerry Yu | b4ac8f3 | 2021-12-01 10:41:37 +0800 | [diff] [blame] | 597 | server_object.cmd()), '"{}"'.format(client_object.cmd()), '0'] |
| 598 | cmd += server_object.post_checks() |
| 599 | cmd += client_object.post_checks() |
Jerry Yu | 7de7985 | 2022-03-23 16:50:47 +0800 | [diff] [blame] | 600 | cmd += ['-C "received HelloRetryRequest message"'] |
Jerry Yu | cdcb683 | 2021-11-29 16:50:13 +0800 | [diff] [blame] | 601 | prefix = ' \\\n' + (' '*9) |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 602 | cmd = prefix.join(cmd) |
Jerry Yu | b4ac8f3 | 2021-12-01 10:41:37 +0800 | [diff] [blame] | 603 | return '\n'.join(server_object.pre_checks() + client_object.pre_checks() + [cmd]) |
Jerry Yu | 29deed4 | 2021-11-25 11:09:54 +0800 | [diff] [blame] | 604 | |
XiaokangQian | a193144 | 2022-03-25 11:58:22 +0000 | [diff] [blame] | 605 | |
XiaokangQian | d5d5b60 | 2022-05-23 09:16:20 +0000 | [diff] [blame^] | 606 | def generate_server_side_compat_test(client=None, server=None, cipher=None, |
| 607 | named_group=None, sig_alg=None): |
| 608 | """ |
| 609 | Generate server side test case with `ssl-opt.sh` format. |
| 610 | """ |
| 611 | name = 'TLS 1.3 server side {client[0]}->{server[0]}: {cipher},{named_group},{sig_alg}'.format( |
| 612 | client=client, server=server, cipher=cipher[4:], sig_alg=sig_alg, named_group=named_group) |
| 613 | |
| 614 | server_object = SERVER_SERVER_CLASSES[server](ciphersuite=cipher, |
| 615 | named_group=named_group, |
| 616 | signature_algorithm=sig_alg, |
| 617 | cert_sig_alg=sig_alg) |
| 618 | client_object = SERVER_CLIENT_CLASSES[client](ciphersuite=cipher, |
| 619 | named_group=named_group, |
| 620 | signature_algorithm=sig_alg, |
| 621 | cert_sig_alg=sig_alg) |
| 622 | |
| 623 | cmd = ['run_test "{}"'.format(name), '"{}"'.format( |
| 624 | server_object.cmd()), '"{}"'.format(client_object.cmd()), '0'] |
| 625 | cmd += server_object.post_checks() |
| 626 | cmd += client_object.post_checks() |
| 627 | cmd += ['-C "received HelloRetryRequest message"'] |
| 628 | prefix = ' \\\n' + (' '*9) |
| 629 | cmd = prefix.join(cmd) |
| 630 | return '\n'.join(server_object.pre_checks() + client_object.pre_checks() + [cmd]) |
| 631 | |
| 632 | |
Ronald Cron | 9d0a3e8 | 2022-04-05 16:13:38 +0200 | [diff] [blame] | 633 | def generate_hrr_compat_test(client=None, server=None, |
| 634 | client_named_group=None, server_named_group=None, |
| 635 | cert_sig_alg=None): |
XiaokangQian | 7069cbc | 2022-02-24 08:30:39 +0000 | [diff] [blame] | 636 | """ |
XiaokangQian | eff93f9 | 2022-03-23 06:14:26 +0000 | [diff] [blame] | 637 | Generate Hello Retry Request test case with `ssl-opt.sh` format. |
XiaokangQian | 7069cbc | 2022-02-24 08:30:39 +0000 | [diff] [blame] | 638 | """ |
XiaokangQian | eff93f9 | 2022-03-23 06:14:26 +0000 | [diff] [blame] | 639 | name = 'TLS 1.3 {client[0]}->{server[0]}: HRR {c_named_group} -> {s_named_group}'.format( |
XiaokangQian | 2e17fb8 | 2022-03-28 03:30:05 +0000 | [diff] [blame] | 640 | client=client, server=server, c_named_group=client_named_group, |
| 641 | s_named_group=server_named_group) |
| 642 | server_object = SERVER_CLASSES[server](named_group=server_named_group, |
| 643 | cert_sig_alg=cert_sig_alg) |
XiaokangQian | a193144 | 2022-03-25 11:58:22 +0000 | [diff] [blame] | 644 | |
XiaokangQian | 2e17fb8 | 2022-03-28 03:30:05 +0000 | [diff] [blame] | 645 | client_object = CLIENT_CLASSES[client](named_group=client_named_group, |
| 646 | cert_sig_alg=cert_sig_alg) |
XiaokangQian | a193144 | 2022-03-25 11:58:22 +0000 | [diff] [blame] | 647 | client_object.add_named_groups(server_named_group) |
XiaokangQian | 7069cbc | 2022-02-24 08:30:39 +0000 | [diff] [blame] | 648 | |
| 649 | cmd = ['run_test "{}"'.format(name), '"{}"'.format( |
| 650 | server_object.cmd()), '"{}"'.format(client_object.cmd()), '0'] |
| 651 | cmd += server_object.post_checks() |
XiaokangQian | a193144 | 2022-03-25 11:58:22 +0000 | [diff] [blame] | 652 | cmd += client_object.post_checks() |
| 653 | cmd += ['-c "received HelloRetryRequest message"'] |
| 654 | cmd += ['-c "selected_group ( {:d} )"'.format( |
| 655 | NAMED_GROUP_IANA_VALUE[server_named_group])] |
XiaokangQian | 7069cbc | 2022-02-24 08:30:39 +0000 | [diff] [blame] | 656 | prefix = ' \\\n' + (' '*9) |
| 657 | cmd = prefix.join(cmd) |
XiaokangQian | a193144 | 2022-03-25 11:58:22 +0000 | [diff] [blame] | 658 | return '\n'.join(server_object.pre_checks() + |
| 659 | client_object.pre_checks() + |
| 660 | [cmd]) |
XiaokangQian | 7069cbc | 2022-02-24 08:30:39 +0000 | [diff] [blame] | 661 | |
XiaokangQian | d5d5b60 | 2022-05-23 09:16:20 +0000 | [diff] [blame^] | 662 | def generate_server_hrr_compat_test(client=None, server=None, |
| 663 | client_named_group=None, server_named_group=None, |
| 664 | cert_sig_alg=None): |
| 665 | """ |
| 666 | Generate server side Hello Retry Request test case with `ssl-opt.sh` format. |
| 667 | """ |
| 668 | name = 'TLS 1.3 {client[0]}->{server[0]}: Server HRR {c_named_group} -> {s_named_group}'.format( |
| 669 | client=client, server=server, c_named_group=client_named_group, |
| 670 | s_named_group=server_named_group) |
| 671 | server_object = SERVER_SERVER_CLASSES[server](named_group=server_named_group, |
| 672 | cert_sig_alg=cert_sig_alg) |
| 673 | |
| 674 | client_object = SERVER_CLIENT_CLASSES[client](named_group=client_named_group, |
| 675 | cert_sig_alg=cert_sig_alg) |
| 676 | client_object.add_named_groups(server_named_group) |
| 677 | |
| 678 | cmd = ['run_test "{}"'.format(name), '"{}"'.format( |
| 679 | server_object.cmd()), '"{}"'.format(client_object.cmd()), '0'] |
| 680 | cmd += server_object.post_checks() |
| 681 | cmd += client_object.post_checks() |
| 682 | cmd += ['-s "HRR selected_group: {:s}"'.format(server_named_group)] |
| 683 | prefix = ' \\\n' + (' '*9) |
| 684 | cmd = prefix.join(cmd) |
| 685 | return '\n'.join(server_object.pre_checks() + |
| 686 | client_object.pre_checks() + |
| 687 | [cmd]) |
Jerry Yu | 7f5e5ad | 2021-11-29 17:37:19 +0800 | [diff] [blame] | 688 | |
| 689 | SSL_OUTPUT_HEADER = '''#!/bin/sh |
Jerry Yu | cdcb683 | 2021-11-29 16:50:13 +0800 | [diff] [blame] | 690 | |
| 691 | # {filename} |
| 692 | # |
| 693 | # Copyright The Mbed TLS Contributors |
| 694 | # SPDX-License-Identifier: Apache-2.0 |
| 695 | # |
| 696 | # Licensed under the Apache License, Version 2.0 (the "License"); you may |
| 697 | # not use this file except in compliance with the License. |
| 698 | # You may obtain a copy of the License at |
| 699 | # |
| 700 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 701 | # |
| 702 | # Unless required by applicable law or agreed to in writing, software |
| 703 | # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| 704 | # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 705 | # See the License for the specific language governing permissions and |
| 706 | # limitations under the License. |
| 707 | # |
| 708 | # Purpose |
| 709 | # |
| 710 | # List TLS1.3 compat test cases. They are generated by |
XiaokangQian | a193144 | 2022-03-25 11:58:22 +0000 | [diff] [blame] | 711 | # `{cmd}`. |
Jerry Yu | cdcb683 | 2021-11-29 16:50:13 +0800 | [diff] [blame] | 712 | # |
| 713 | # PLEASE DO NOT EDIT THIS FILE. IF NEEDED, PLEASE MODIFY `generate_tls13_compat_tests.py` |
| 714 | # AND REGENERATE THIS FILE. |
| 715 | # |
| 716 | ''' |
Jerry Yu | 29deed4 | 2021-11-25 11:09:54 +0800 | [diff] [blame] | 717 | |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 718 | def main(): |
Jerry Yu | dda036d | 2021-11-30 11:19:41 +0800 | [diff] [blame] | 719 | """ |
| 720 | Main function of this program |
| 721 | """ |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 722 | parser = argparse.ArgumentParser() |
| 723 | |
Jerry Yu | cdcb683 | 2021-11-29 16:50:13 +0800 | [diff] [blame] | 724 | parser.add_argument('-o', '--output', nargs='?', |
Jerry Yu | 7f5e5ad | 2021-11-29 17:37:19 +0800 | [diff] [blame] | 725 | default=None, help='Output file path if `-a` was set') |
Jerry Yu | cdcb683 | 2021-11-29 16:50:13 +0800 | [diff] [blame] | 726 | |
Jerry Yu | c4aa152 | 2021-11-26 11:13:58 +0800 | [diff] [blame] | 727 | parser.add_argument('-a', '--generate-all-tls13-compat-tests', action='store_true', |
| 728 | default=False, help='Generate all available tls13 compat tests') |
| 729 | |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 730 | parser.add_argument('--list-ciphers', action='store_true', |
| 731 | default=False, help='List supported ciphersuites') |
| 732 | |
| 733 | parser.add_argument('--list-sig-algs', action='store_true', |
| 734 | default=False, help='List supported signature algorithms') |
| 735 | |
| 736 | parser.add_argument('--list-named-groups', action='store_true', |
| 737 | default=False, help='List supported named groups') |
| 738 | |
| 739 | parser.add_argument('--list-servers', action='store_true', |
| 740 | default=False, help='List supported TLS servers') |
| 741 | |
| 742 | parser.add_argument('--list-clients', action='store_true', |
| 743 | default=False, help='List supported TLS Clients') |
| 744 | |
Jerry Yu | b4ac8f3 | 2021-12-01 10:41:37 +0800 | [diff] [blame] | 745 | parser.add_argument('server', choices=SERVER_CLASSES.keys(), nargs='?', |
| 746 | default=list(SERVER_CLASSES.keys())[0], |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 747 | help='Choose TLS server program for test') |
Jerry Yu | b4ac8f3 | 2021-12-01 10:41:37 +0800 | [diff] [blame] | 748 | parser.add_argument('client', choices=CLIENT_CLASSES.keys(), nargs='?', |
| 749 | default=list(CLIENT_CLASSES.keys())[0], |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 750 | help='Choose TLS client program for test') |
| 751 | parser.add_argument('cipher', choices=CIPHER_SUITE_IANA_VALUE.keys(), nargs='?', |
| 752 | default=list(CIPHER_SUITE_IANA_VALUE.keys())[0], |
| 753 | help='Choose cipher suite for test') |
| 754 | parser.add_argument('sig_alg', choices=SIG_ALG_IANA_VALUE.keys(), nargs='?', |
| 755 | default=list(SIG_ALG_IANA_VALUE.keys())[0], |
| 756 | help='Choose cipher suite for test') |
| 757 | parser.add_argument('named_group', choices=NAMED_GROUP_IANA_VALUE.keys(), nargs='?', |
| 758 | default=list(NAMED_GROUP_IANA_VALUE.keys())[0], |
| 759 | help='Choose cipher suite for test') |
| 760 | |
| 761 | args = parser.parse_args() |
Jerry Yu | cdcb683 | 2021-11-29 16:50:13 +0800 | [diff] [blame] | 762 | |
Jerry Yu | 7f5e5ad | 2021-11-29 17:37:19 +0800 | [diff] [blame] | 763 | def get_all_test_cases(): |
Jerry Yu | 7de7985 | 2022-03-23 16:50:47 +0800 | [diff] [blame] | 764 | # Generate normal compat test cases |
Ronald Cron | 9d0a3e8 | 2022-04-05 16:13:38 +0200 | [diff] [blame] | 765 | for client, server, cipher, named_group, sig_alg in \ |
| 766 | itertools.product(CLIENT_CLASSES.keys(), |
Jerry Yu | 7de7985 | 2022-03-23 16:50:47 +0800 | [diff] [blame] | 767 | SERVER_CLASSES.keys(), |
Ronald Cron | 9d0a3e8 | 2022-04-05 16:13:38 +0200 | [diff] [blame] | 768 | CIPHER_SUITE_IANA_VALUE.keys(), |
| 769 | NAMED_GROUP_IANA_VALUE.keys(), |
| 770 | SIG_ALG_IANA_VALUE.keys()): |
| 771 | yield generate_compat_test(client=client, server=server, |
| 772 | cipher=cipher, named_group=named_group, |
| 773 | sig_alg=sig_alg) |
XiaokangQian | a193144 | 2022-03-25 11:58:22 +0000 | [diff] [blame] | 774 | |
XiaokangQian | d5d5b60 | 2022-05-23 09:16:20 +0000 | [diff] [blame^] | 775 | for client, server, cipher, named_group, sig_alg in \ |
| 776 | itertools.product(SERVER_CLIENT_CLASSES.keys(), |
| 777 | SERVER_SERVER_CLASSES.keys(), |
| 778 | CIPHER_SUITE_IANA_VALUE.keys(), |
| 779 | NAMED_GROUP_IANA_VALUE.keys(), |
| 780 | SIG_ALG_IANA_VALUE.keys()): |
| 781 | yield generate_server_side_compat_test(client=client, server=server, |
| 782 | cipher=cipher, named_group=named_group, |
| 783 | sig_alg=sig_alg) |
| 784 | |
XiaokangQian | a193144 | 2022-03-25 11:58:22 +0000 | [diff] [blame] | 785 | # Generate Hello Retry Request compat test cases |
XiaokangQian | 2e17fb8 | 2022-03-28 03:30:05 +0000 | [diff] [blame] | 786 | for client, server, client_named_group, server_named_group in \ |
| 787 | itertools.product(CLIENT_CLASSES.keys(), |
XiaokangQian | a193144 | 2022-03-25 11:58:22 +0000 | [diff] [blame] | 788 | SERVER_CLASSES.keys(), |
XiaokangQian | 2e17fb8 | 2022-03-28 03:30:05 +0000 | [diff] [blame] | 789 | NAMED_GROUP_IANA_VALUE.keys(), |
| 790 | NAMED_GROUP_IANA_VALUE.keys()): |
| 791 | if client_named_group != server_named_group: |
| 792 | yield generate_hrr_compat_test(client=client, server=server, |
XiaokangQian | 2e17fb8 | 2022-03-28 03:30:05 +0000 | [diff] [blame] | 793 | client_named_group=client_named_group, |
Ronald Cron | 9d0a3e8 | 2022-04-05 16:13:38 +0200 | [diff] [blame] | 794 | server_named_group=server_named_group, |
| 795 | cert_sig_alg="ecdsa_secp256r1_sha256") |
Jerry Yu | 7de7985 | 2022-03-23 16:50:47 +0800 | [diff] [blame] | 796 | |
XiaokangQian | d5d5b60 | 2022-05-23 09:16:20 +0000 | [diff] [blame^] | 797 | for client, server, client_named_group, server_named_group in \ |
| 798 | itertools.product(SERVER_CLIENT_CLASSES.keys(), |
| 799 | SERVER_SERVER_CLASSES.keys(), |
| 800 | NAMED_GROUP_IANA_VALUE.keys(), |
| 801 | NAMED_GROUP_IANA_VALUE.keys()): |
| 802 | if client_named_group != server_named_group: |
| 803 | yield generate_server_hrr_compat_test(client=client, server=server, |
| 804 | client_named_group=client_named_group, |
| 805 | server_named_group=server_named_group, |
| 806 | cert_sig_alg="ecdsa_secp256r1_sha256") |
| 807 | |
Jerry Yu | 7f5e5ad | 2021-11-29 17:37:19 +0800 | [diff] [blame] | 808 | if args.generate_all_tls13_compat_tests: |
| 809 | if args.output: |
| 810 | with open(args.output, 'w', encoding="utf-8") as f: |
Jerry Yu | b4ac8f3 | 2021-12-01 10:41:37 +0800 | [diff] [blame] | 811 | f.write(SSL_OUTPUT_HEADER.format( |
XiaokangQian | a193144 | 2022-03-25 11:58:22 +0000 | [diff] [blame] | 812 | filename=os.path.basename(args.output), cmd=' '.join(sys.argv))) |
Jerry Yu | 7f5e5ad | 2021-11-29 17:37:19 +0800 | [diff] [blame] | 813 | f.write('\n\n'.join(get_all_test_cases())) |
Jerry Yu | dda036d | 2021-11-30 11:19:41 +0800 | [diff] [blame] | 814 | f.write('\n') |
Jerry Yu | 7f5e5ad | 2021-11-29 17:37:19 +0800 | [diff] [blame] | 815 | else: |
Jerry Yu | 7de7985 | 2022-03-23 16:50:47 +0800 | [diff] [blame] | 816 | print('\n\n'.join(get_all_test_cases())) |
Jerry Yu | c4aa152 | 2021-11-26 11:13:58 +0800 | [diff] [blame] | 817 | return 0 |
| 818 | |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 819 | if args.list_ciphers or args.list_sig_algs or args.list_named_groups \ |
Jerry Yu | 29deed4 | 2021-11-25 11:09:54 +0800 | [diff] [blame] | 820 | or args.list_servers or args.list_clients: |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 821 | if args.list_ciphers: |
Jerry Yu | 7f5e5ad | 2021-11-29 17:37:19 +0800 | [diff] [blame] | 822 | print(*CIPHER_SUITE_IANA_VALUE.keys()) |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 823 | if args.list_sig_algs: |
Jerry Yu | 7f5e5ad | 2021-11-29 17:37:19 +0800 | [diff] [blame] | 824 | print(*SIG_ALG_IANA_VALUE.keys()) |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 825 | if args.list_named_groups: |
Jerry Yu | 7f5e5ad | 2021-11-29 17:37:19 +0800 | [diff] [blame] | 826 | print(*NAMED_GROUP_IANA_VALUE.keys()) |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 827 | if args.list_servers: |
Jerry Yu | b4ac8f3 | 2021-12-01 10:41:37 +0800 | [diff] [blame] | 828 | print(*SERVER_CLASSES.keys()) |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 829 | if args.list_clients: |
Jerry Yu | b4ac8f3 | 2021-12-01 10:41:37 +0800 | [diff] [blame] | 830 | print(*CLIENT_CLASSES.keys()) |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 831 | return 0 |
Jerry Yu | cdcb683 | 2021-11-29 16:50:13 +0800 | [diff] [blame] | 832 | |
XiaokangQian | a193144 | 2022-03-25 11:58:22 +0000 | [diff] [blame] | 833 | print(generate_compat_test(server=args.server, client=args.client, sig_alg=args.sig_alg, |
| 834 | cipher=args.cipher, named_group=args.named_group)) |
Jerry Yu | cdcb683 | 2021-11-29 16:50:13 +0800 | [diff] [blame] | 835 | return 0 |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 836 | |
Jerry Yu | 29deed4 | 2021-11-25 11:09:54 +0800 | [diff] [blame] | 837 | |
Jerry Yu | 305bfc3 | 2021-11-24 16:04:47 +0800 | [diff] [blame] | 838 | if __name__ == "__main__": |
| 839 | sys.exit(main()) |