blob: 8e032af05b6f7d713933917a5b931abc4e2ed782 [file] [log] [blame]
Paul Bakkeraccd4eb2013-07-19 13:41:51 +02001#!/bin/bash
2
Manuel Pégourié-Gonnardeaadc502014-02-20 11:01:30 +01003# Test interop with OpenSSL for each common ciphersuite and version.
4# Also test selfop for ciphersuites not shared with OpenSSL.
5
Manuel Pégourié-Gonnard3eec6042014-02-27 15:37:24 +01006set -u
7
Manuel Pégourié-Gonnard70064fd2013-08-27 22:00:47 +02008let "tests = 0"
9let "failed = 0"
10let "skipped = 0"
Manuel Pégourié-Gonnard3eec6042014-02-27 15:37:24 +010011let "srvmem = 0"
Manuel Pégourié-Gonnard70064fd2013-08-27 22:00:47 +020012
Manuel Pégourié-Gonnardf7a26902014-02-27 12:25:54 +010013# default values, can be overriden by the environment
14: ${P_SRV:=../programs/ssl/ssl_server2}
15: ${P_CLI:=../programs/ssl/ssl_client2}
Manuel Pégourié-Gonnard74faf3c2014-03-13 18:47:44 +010016: ${OPENSSL_CMD:=openssl} # OPENSSL would conflict with the build system
17: ${GNUTLS_CLI:=gnutls-cli}
18: ${GNUTLS_SERV:=gnutls-serv}
Manuel Pégourié-Gonnardf7a26902014-02-27 12:25:54 +010019
Paul Bakker10cd2252012-04-12 21:26:34 +000020MODES="ssl3 tls1 tls1_1 tls1_2"
Paul Bakker1eeceae2012-11-23 14:25:34 +010021VERIFIES="NO YES"
Manuel Pégourié-Gonnard7ebaf372013-08-27 21:03:33 +020022TYPES="ECDSA RSA PSK"
Paul Bakkeraccd4eb2013-07-19 13:41:51 +020023FILTER=""
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +010024EXCLUDE='NULL\|DES-CBC-' # avoid plain DES but keep 3DES-EDE-CBC (PolarSSL), DES-CBC3 (OpenSSL)
Paul Bakkeraccd4eb2013-07-19 13:41:51 +020025VERBOSE=""
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +010026PEERS="OpenSSL PolarSSL" # GnuTLS not enabled by default, 3.2.4 might not be available on all buildbot machines
Manuel Pégourié-Gonnard3eec6042014-02-27 15:37:24 +010027MEMCHECK=0
Paul Bakkeraccd4eb2013-07-19 13:41:51 +020028
Manuel Pégourié-Gonnard9dea8bd2014-02-26 18:21:02 +010029print_usage() {
30 echo "Usage: $0"
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +010031 echo -e " -h|--help\tPrint this help."
32 echo -e " -f|--filter\tOnly matching ciphersuites are tested (Default: '$FILTER')"
33 echo -e " -e|--exclude\tMatching ciphersuites are excluded (Default: '$EXCLUDE')"
34 echo -e " -m|--modes\tWhich modes to perform (Default: '$MODES')"
35 echo -e " -t|--types\tWhich key exchange type to perform (Default: '$TYPES')"
36 echo -e " -V|--verify\tWhich verification modes to perform (Default: '$VERIFIES')"
37 echo -e " -p|--peers\tWhich peers to use (Default: '$PEERS')"
38 echo -e " \tAlso available: GnuTLS (needs v3.2.4 or higher)"
39 echo -e " -M|--memcheck\tCheck memory leaks and errors."
40 echo -e " -v|--verbose\tSet verbose output."
Manuel Pégourié-Gonnard9dea8bd2014-02-26 18:21:02 +010041}
42
43get_options() {
44 while [ $# -gt 0 ]; do
45 case "$1" in
46 -f|--filter)
47 shift; FILTER=$1
48 ;;
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +010049 -e|--exclude)
50 shift; EXCLUDE=$1
51 ;;
Manuel Pégourié-Gonnard9dea8bd2014-02-26 18:21:02 +010052 -m|--modes)
53 shift; MODES=$1
54 ;;
55 -t|--types)
56 shift; TYPES=$1
57 ;;
58 -V|--verify)
59 shift; VERIFIES=$1
60 ;;
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +010061 -p|--peers)
62 shift; PEERS=$1
63 ;;
Manuel Pégourié-Gonnard9dea8bd2014-02-26 18:21:02 +010064 -v|--verbose)
65 VERBOSE=1
66 ;;
Manuel Pégourié-Gonnard3eec6042014-02-27 15:37:24 +010067 -M|--memcheck)
68 MEMCHECK=1
69 ;;
Manuel Pégourié-Gonnard9dea8bd2014-02-26 18:21:02 +010070 -h|--help)
71 print_usage
72 exit 0
73 ;;
74 *)
75 echo "Unknown argument: '$1'"
76 print_usage
77 exit 1
78 ;;
79 esac
80 shift
81 done
82}
Paul Bakkeraccd4eb2013-07-19 13:41:51 +020083
Manuel Pégourié-Gonnard95957712014-02-19 15:29:38 +010084log() {
Paul Bakkeraccd4eb2013-07-19 13:41:51 +020085 if [ "X" != "X$VERBOSE" ]; then
86 echo "$@"
87 fi
88}
Paul Bakker10cd2252012-04-12 21:26:34 +000089
Manuel Pégourié-Gonnarddfc8d5a2013-08-27 20:48:40 +020090filter()
91{
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +010092 LIST="$1"
Manuel Pégourié-Gonnarddfc8d5a2013-08-27 20:48:40 +020093 NEW_LIST=""
94
95 for i in $LIST;
96 do
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +010097 NEW_LIST="$NEW_LIST $( echo "$i" | grep "$FILTER" | grep -v "$EXCLUDE" )"
Manuel Pégourié-Gonnarddfc8d5a2013-08-27 20:48:40 +020098 done
99
Manuel Pégourié-Gonnard911622d2014-02-27 11:50:40 +0100100 # normalize whitespace
101 echo "$NEW_LIST" | sed -e 's/[[:space:]]\+/ /g' -e 's/^ //' -e 's/ $//'
Manuel Pégourié-Gonnarddfc8d5a2013-08-27 20:48:40 +0200102}
103
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100104filter_ciphersuites()
105{
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100106 if [ "X" != "X$FILTER" -o "X" != "X$EXCLUDE" ];
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100107 then
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100108 P_CIPHERS=$( filter "$P_CIPHERS" )
109 O_CIPHERS=$( filter "$O_CIPHERS" )
110 G_CIPHERS=$( filter "$G_CIPHERS" )
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100111 fi
112}
113
114reset_ciphersuites()
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100115{
116 P_CIPHERS=""
117 O_CIPHERS=""
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100118 G_CIPHERS=""
119}
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100120
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100121add_openssl_ciphersuites()
122{
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100123 case $TYPE in
124
125 "ECDSA")
126 if [ "$MODE" != "ssl3" ];
127 then
128 P_CIPHERS="$P_CIPHERS \
129 TLS-ECDHE-ECDSA-WITH-NULL-SHA \
130 TLS-ECDHE-ECDSA-WITH-RC4-128-SHA \
131 TLS-ECDHE-ECDSA-WITH-3DES-EDE-CBC-SHA \
132 TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA \
133 TLS-ECDHE-ECDSA-WITH-AES-256-CBC-SHA \
134 TLS-ECDH-ECDSA-WITH-NULL-SHA \
135 TLS-ECDH-ECDSA-WITH-RC4-128-SHA \
136 TLS-ECDH-ECDSA-WITH-3DES-EDE-CBC-SHA \
137 TLS-ECDH-ECDSA-WITH-AES-128-CBC-SHA \
138 TLS-ECDH-ECDSA-WITH-AES-256-CBC-SHA \
139 "
140 O_CIPHERS="$O_CIPHERS \
141 ECDHE-ECDSA-NULL-SHA \
142 ECDHE-ECDSA-RC4-SHA \
143 ECDHE-ECDSA-DES-CBC3-SHA \
144 ECDHE-ECDSA-AES128-SHA \
145 ECDHE-ECDSA-AES256-SHA \
146 ECDH-ECDSA-NULL-SHA \
147 ECDH-ECDSA-RC4-SHA \
148 ECDH-ECDSA-DES-CBC3-SHA \
149 ECDH-ECDSA-AES128-SHA \
150 ECDH-ECDSA-AES256-SHA \
151 "
152 fi
153 if [ "$MODE" = "tls1_2" ];
154 then
155 P_CIPHERS="$P_CIPHERS \
156 TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA256 \
157 TLS-ECDHE-ECDSA-WITH-AES-256-CBC-SHA384 \
158 TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256 \
159 TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384 \
160 TLS-ECDH-ECDSA-WITH-AES-128-CBC-SHA256 \
161 TLS-ECDH-ECDSA-WITH-AES-256-CBC-SHA384 \
162 TLS-ECDH-ECDSA-WITH-AES-128-GCM-SHA256 \
163 TLS-ECDH-ECDSA-WITH-AES-256-GCM-SHA384 \
164 "
165 O_CIPHERS="$O_CIPHERS \
166 ECDHE-ECDSA-AES128-SHA256 \
167 ECDHE-ECDSA-AES256-SHA384 \
168 ECDHE-ECDSA-AES128-GCM-SHA256 \
169 ECDHE-ECDSA-AES256-GCM-SHA384 \
170 ECDH-ECDSA-AES128-SHA256 \
171 ECDH-ECDSA-AES256-SHA384 \
172 ECDH-ECDSA-AES128-GCM-SHA256 \
173 ECDH-ECDSA-AES256-GCM-SHA384 \
174 "
175 fi
176 ;;
177
178 "RSA")
179 P_CIPHERS="$P_CIPHERS \
180 TLS-DHE-RSA-WITH-AES-128-CBC-SHA \
181 TLS-DHE-RSA-WITH-AES-256-CBC-SHA \
182 TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-SHA \
183 TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA \
184 TLS-DHE-RSA-WITH-3DES-EDE-CBC-SHA \
185 TLS-RSA-WITH-AES-256-CBC-SHA \
186 TLS-RSA-WITH-CAMELLIA-256-CBC-SHA \
187 TLS-RSA-WITH-AES-128-CBC-SHA \
188 TLS-RSA-WITH-CAMELLIA-128-CBC-SHA \
189 TLS-RSA-WITH-3DES-EDE-CBC-SHA \
190 TLS-RSA-WITH-RC4-128-SHA \
191 TLS-RSA-WITH-RC4-128-MD5 \
192 TLS-RSA-WITH-NULL-MD5 \
193 TLS-RSA-WITH-NULL-SHA \
194 TLS-RSA-WITH-DES-CBC-SHA \
195 TLS-DHE-RSA-WITH-DES-CBC-SHA \
196 "
197 O_CIPHERS="$O_CIPHERS \
198 DHE-RSA-AES128-SHA \
199 DHE-RSA-AES256-SHA \
200 DHE-RSA-CAMELLIA128-SHA \
201 DHE-RSA-CAMELLIA256-SHA \
202 EDH-RSA-DES-CBC3-SHA \
203 AES256-SHA \
204 CAMELLIA256-SHA \
205 AES128-SHA \
206 CAMELLIA128-SHA \
207 DES-CBC3-SHA \
208 RC4-SHA \
209 RC4-MD5 \
210 NULL-MD5 \
211 NULL-SHA \
212 DES-CBC-SHA \
213 EDH-RSA-DES-CBC-SHA \
214 "
215 if [ "$MODE" != "ssl3" ];
216 then
217 P_CIPHERS="$P_CIPHERS \
218 TLS-ECDHE-RSA-WITH-AES-128-CBC-SHA \
219 TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA \
220 TLS-ECDHE-RSA-WITH-3DES-EDE-CBC-SHA \
221 TLS-ECDHE-RSA-WITH-RC4-128-SHA \
222 TLS-ECDHE-RSA-WITH-NULL-SHA \
223 "
224 O_CIPHERS="$O_CIPHERS \
225 ECDHE-RSA-AES256-SHA \
226 ECDHE-RSA-AES128-SHA \
227 ECDHE-RSA-DES-CBC3-SHA \
228 ECDHE-RSA-RC4-SHA \
229 ECDHE-RSA-NULL-SHA \
230 "
231 fi
232 if [ "$MODE" = "tls1_2" ];
233 then
234 P_CIPHERS="$P_CIPHERS \
235 TLS-RSA-WITH-NULL-SHA256 \
236 TLS-RSA-WITH-AES-128-CBC-SHA256 \
237 TLS-DHE-RSA-WITH-AES-128-CBC-SHA256 \
238 TLS-RSA-WITH-AES-256-CBC-SHA256 \
239 TLS-DHE-RSA-WITH-AES-256-CBC-SHA256 \
240 TLS-ECDHE-RSA-WITH-AES-128-CBC-SHA256 \
241 TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA384 \
242 TLS-RSA-WITH-AES-128-GCM-SHA256 \
243 TLS-RSA-WITH-AES-256-GCM-SHA384 \
244 TLS-DHE-RSA-WITH-AES-128-GCM-SHA256 \
245 TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 \
246 TLS-ECDHE-RSA-WITH-AES-128-GCM-SHA256 \
247 TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384 \
248 "
249 O_CIPHERS="$O_CIPHERS \
250 NULL-SHA256 \
251 AES128-SHA256 \
252 DHE-RSA-AES128-SHA256 \
253 AES256-SHA256 \
254 DHE-RSA-AES256-SHA256 \
255 ECDHE-RSA-AES128-SHA256 \
256 ECDHE-RSA-AES256-SHA384 \
257 AES128-GCM-SHA256 \
258 DHE-RSA-AES128-GCM-SHA256 \
259 AES256-GCM-SHA384 \
260 DHE-RSA-AES256-GCM-SHA384 \
261 ECDHE-RSA-AES128-GCM-SHA256 \
262 ECDHE-RSA-AES256-GCM-SHA384 \
263 "
264 fi
265 ;;
266
267 "PSK")
268 P_CIPHERS="$P_CIPHERS \
269 TLS-PSK-WITH-RC4-128-SHA \
270 TLS-PSK-WITH-3DES-EDE-CBC-SHA \
271 TLS-PSK-WITH-AES-128-CBC-SHA \
272 TLS-PSK-WITH-AES-256-CBC-SHA \
273 "
274 O_CIPHERS="$O_CIPHERS \
275 PSK-RC4-SHA \
276 PSK-3DES-EDE-CBC-SHA \
277 PSK-AES128-CBC-SHA \
278 PSK-AES256-CBC-SHA \
279 "
280 ;;
281 esac
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100282}
283
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100284add_gnutls_ciphersuites()
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100285{
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100286 case $TYPE in
287
288 "ECDSA")
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100289 if [ "$MODE" = "tls1_2" ];
290 then
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100291 P_CIPHERS="$P_CIPHERS \
292 TLS-ECDHE-ECDSA-WITH-CAMELLIA-128-CBC-SHA256 \
293 TLS-ECDHE-ECDSA-WITH-CAMELLIA-256-CBC-SHA384 \
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100294 TLS-ECDHE-ECDSA-WITH-CAMELLIA-128-GCM-SHA256 \
295 TLS-ECDHE-ECDSA-WITH-CAMELLIA-256-GCM-SHA384 \
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100296 "
297 G_CIPHERS="$G_CIPHERS \
298 +ECDHE-ECDSA:+CAMELLIA-128-CBC:+SHA256 \
299 +ECDHE-ECDSA:+CAMELLIA-256-CBC:+SHA384 \
300 +ECDHE-ECDSA:+CAMELLIA-128-GCM:+AEAD \
301 +ECDHE-ECDSA:+CAMELLIA-256-GCM:+AEAD \
302 "
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100303 fi
304 ;;
305
306 "RSA")
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100307 if [ "$MODE" = "tls1_2" ];
308 then
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100309 P_CIPHERS="$P_CIPHERS \
310 TLS-ECDHE-RSA-WITH-CAMELLIA-128-CBC-SHA256 \
311 TLS-ECDHE-RSA-WITH-CAMELLIA-256-CBC-SHA384 \
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100312 TLS-RSA-WITH-CAMELLIA-128-CBC-SHA256 \
313 TLS-RSA-WITH-CAMELLIA-256-CBC-SHA256 \
314 TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-SHA256 \
315 TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA256 \
316 TLS-ECDHE-RSA-WITH-CAMELLIA-128-GCM-SHA256 \
317 TLS-ECDHE-RSA-WITH-CAMELLIA-256-GCM-SHA384 \
318 TLS-DHE-RSA-WITH-CAMELLIA-128-GCM-SHA256 \
319 TLS-DHE-RSA-WITH-CAMELLIA-256-GCM-SHA384 \
320 TLS-RSA-WITH-CAMELLIA-128-GCM-SHA256 \
321 TLS-RSA-WITH-CAMELLIA-256-GCM-SHA384 \
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100322 TLS-RSA-WITH-NULL-SHA256 \
323 TLS-RSA-WITH-NULL-SHA \
324 TLS-RSA-WITH-NULL-MD5 \
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100325 "
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100326 G_CIPHERS="$G_CIPHERS \
327 +ECDHE-RSA:+CAMELLIA-128-CBC:+SHA256 \
328 +ECDHE-RSA:+CAMELLIA-256-CBC:+SHA384 \
329 +RSA:+CAMELLIA-128-CBC:+SHA256 \
330 +RSA:+CAMELLIA-256-CBC:+SHA256 \
331 +DHE-RSA:+CAMELLIA-128-CBC:+SHA256 \
332 +DHE-RSA:+CAMELLIA-256-CBC:+SHA256 \
333 +ECDHE-RSA:+CAMELLIA-128-GCM:+AEAD \
334 +ECDHE-RSA:+CAMELLIA-256-GCM:+AEAD \
335 +DHE-RSA:+CAMELLIA-128-GCM:+AEAD \
336 +DHE-RSA:+CAMELLIA-256-GCM:+AEAD \
337 +RSA:+CAMELLIA-128-GCM:+AEAD \
338 +RSA:+CAMELLIA-256-GCM:+AEAD \
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100339 +RSA:+NULL:+SHA256 \
340 +RSA:+NULL:+SHA1 \
341 +RSA:+NULL:+MD5 \
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100342 "
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100343 fi
344 ;;
345
346 "PSK")
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100347 # GnuTLS 3.2.11 (2014-02-13) requires TLS 1.x for most *PSK suites
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100348 if [ "$MODE" != "ssl3" ];
349 then
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100350 P_CIPHERS="$P_CIPHERS \
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100351 TLS-ECDHE-PSK-WITH-AES-256-CBC-SHA \
352 TLS-ECDHE-PSK-WITH-AES-128-CBC-SHA \
353 TLS-ECDHE-PSK-WITH-3DES-EDE-CBC-SHA \
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100354 TLS-DHE-PSK-WITH-3DES-EDE-CBC-SHA \
355 TLS-DHE-PSK-WITH-AES-128-CBC-SHA \
356 TLS-DHE-PSK-WITH-AES-256-CBC-SHA \
357 TLS-RSA-PSK-WITH-3DES-EDE-CBC-SHA \
358 TLS-RSA-PSK-WITH-AES-256-CBC-SHA \
359 TLS-RSA-PSK-WITH-AES-128-CBC-SHA \
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100360 "
361 G_CIPHERS="$G_CIPHERS \
362 +ECDHE-PSK:+AES-256-CBC:+SHA1 \
363 +ECDHE-PSK:+AES-128-CBC:+SHA1 \
364 +ECDHE-PSK:+3DES-CBC:+SHA1 \
365 +DHE-PSK:+3DES-CBC:+SHA1 \
366 +DHE-PSK:+AES-128-CBC:+SHA1 \
367 +DHE-PSK:+AES-256-CBC:+SHA1 \
368 +RSA-PSK:+3DES-CBC:+SHA1 \
369 +RSA-PSK:+AES-256-CBC:+SHA1 \
370 +RSA-PSK:+AES-128-CBC:+SHA1 \
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100371 "
372 fi
373 if [ "$MODE" = "tls1_2" ];
374 then
375 P_CIPHERS="$P_CIPHERS \
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100376 TLS-ECDHE-PSK-WITH-AES-256-CBC-SHA384 \
377 TLS-ECDHE-PSK-WITH-CAMELLIA-256-CBC-SHA384 \
378 TLS-ECDHE-PSK-WITH-AES-128-CBC-SHA256 \
379 TLS-ECDHE-PSK-WITH-CAMELLIA-128-CBC-SHA256 \
380 TLS-ECDHE-PSK-WITH-NULL-SHA384 \
381 TLS-ECDHE-PSK-WITH-NULL-SHA256 \
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100382 TLS-PSK-WITH-AES-128-CBC-SHA256 \
383 TLS-PSK-WITH-AES-256-CBC-SHA384 \
384 TLS-DHE-PSK-WITH-AES-128-CBC-SHA256 \
385 TLS-DHE-PSK-WITH-AES-256-CBC-SHA384 \
386 TLS-PSK-WITH-NULL-SHA256 \
387 TLS-PSK-WITH-NULL-SHA384 \
388 TLS-DHE-PSK-WITH-NULL-SHA256 \
389 TLS-DHE-PSK-WITH-NULL-SHA384 \
390 TLS-RSA-PSK-WITH-AES-256-CBC-SHA384 \
391 TLS-RSA-PSK-WITH-AES-128-CBC-SHA256 \
392 TLS-RSA-PSK-WITH-NULL-SHA256 \
393 TLS-RSA-PSK-WITH-NULL-SHA384 \
394 TLS-DHE-PSK-WITH-CAMELLIA-128-CBC-SHA256 \
395 TLS-DHE-PSK-WITH-CAMELLIA-256-CBC-SHA384 \
396 TLS-PSK-WITH-CAMELLIA-128-CBC-SHA256 \
397 TLS-PSK-WITH-CAMELLIA-256-CBC-SHA384 \
398 TLS-RSA-PSK-WITH-CAMELLIA-256-CBC-SHA384 \
399 TLS-RSA-PSK-WITH-CAMELLIA-128-CBC-SHA256 \
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100400 TLS-PSK-WITH-AES-128-GCM-SHA256 \
401 TLS-PSK-WITH-AES-256-GCM-SHA384 \
402 TLS-DHE-PSK-WITH-AES-128-GCM-SHA256 \
403 TLS-DHE-PSK-WITH-AES-256-GCM-SHA384 \
404 TLS-RSA-PSK-WITH-CAMELLIA-128-GCM-SHA256 \
405 TLS-RSA-PSK-WITH-CAMELLIA-256-GCM-SHA384 \
406 TLS-PSK-WITH-CAMELLIA-128-GCM-SHA256 \
407 TLS-PSK-WITH-CAMELLIA-256-GCM-SHA384 \
408 TLS-DHE-PSK-WITH-CAMELLIA-128-GCM-SHA256 \
409 TLS-DHE-PSK-WITH-CAMELLIA-256-GCM-SHA384 \
410 TLS-RSA-PSK-WITH-AES-256-GCM-SHA384 \
411 TLS-RSA-PSK-WITH-AES-128-GCM-SHA256 \
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100412 "
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100413 G_CIPHERS="$G_CIPHERS \
414 +ECDHE-PSK:+AES-256-CBC:+SHA384 \
415 +ECDHE-PSK:+CAMELLIA-256-CBC:+SHA384 \
416 +ECDHE-PSK:+AES-128-CBC:+SHA256 \
417 +ECDHE-PSK:+CAMELLIA-128-CBC:+SHA256 \
418 +PSK:+AES-128-CBC:+SHA256 \
419 +PSK:+AES-256-CBC:+SHA384 \
420 +DHE-PSK:+AES-128-CBC:+SHA256 \
421 +DHE-PSK:+AES-256-CBC:+SHA384 \
422 +RSA-PSK:+AES-256-CBC:+SHA384 \
423 +RSA-PSK:+AES-128-CBC:+SHA256 \
424 +DHE-PSK:+CAMELLIA-128-CBC:+SHA256 \
425 +DHE-PSK:+CAMELLIA-256-CBC:+SHA384 \
426 +PSK:+CAMELLIA-128-CBC:+SHA256 \
427 +PSK:+CAMELLIA-256-CBC:+SHA384 \
428 +RSA-PSK:+CAMELLIA-256-CBC:+SHA384 \
429 +RSA-PSK:+CAMELLIA-128-CBC:+SHA256 \
430 +PSK:+AES-128-GCM:+AEAD \
431 +PSK:+AES-256-GCM:+AEAD \
432 +DHE-PSK:+AES-128-GCM:+AEAD \
433 +DHE-PSK:+AES-256-GCM:+AEAD \
434 +RSA-PSK:+CAMELLIA-128-GCM:+AEAD \
435 +RSA-PSK:+CAMELLIA-256-GCM:+AEAD \
436 +PSK:+CAMELLIA-128-GCM:+AEAD \
437 +PSK:+CAMELLIA-256-GCM:+AEAD \
438 +DHE-PSK:+CAMELLIA-128-GCM:+AEAD \
439 +DHE-PSK:+CAMELLIA-256-GCM:+AEAD \
440 +RSA-PSK:+AES-256-GCM:+AEAD \
441 +RSA-PSK:+AES-128-GCM:+AEAD \
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100442 +ECDHE-PSK:+NULL:+SHA384 \
443 +ECDHE-PSK:+NULL:+SHA256 \
444 +PSK:+NULL:+SHA256 \
445 +PSK:+NULL:+SHA384 \
446 +DHE-PSK:+NULL:+SHA256 \
447 +DHE-PSK:+NULL:+SHA384 \
448 +RSA-PSK:+NULL:+SHA256 \
449 +RSA-PSK:+NULL:+SHA384 \
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100450 "
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100451 fi
452 ;;
453 esac
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100454}
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100455
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100456add_polarssl_ciphersuites()
457{
458 case $TYPE in
459
460 "ECDSA")
461 if [ "$MODE" != "ssl3" ];
462 then
463 P_CIPHERS="$P_CIPHERS \
464 TLS-ECDH-ECDSA-WITH-CAMELLIA-128-CBC-SHA256 \
465 TLS-ECDH-ECDSA-WITH-CAMELLIA-256-CBC-SHA384 \
466 "
467 fi
468 if [ "$MODE" = "tls1_2" ];
469 then
470 P_CIPHERS="$P_CIPHERS \
471 TLS-ECDH-ECDSA-WITH-CAMELLIA-128-GCM-SHA256 \
472 TLS-ECDH-ECDSA-WITH-CAMELLIA-256-GCM-SHA384 \
473 "
474 fi
475 ;;
476
477 "RSA")
478 ;;
479
480 "PSK")
481 P_CIPHERS="$P_CIPHERS \
482 TLS-PSK-WITH-NULL-SHA \
483 TLS-DHE-PSK-WITH-RC4-128-SHA \
484 TLS-DHE-PSK-WITH-NULL-SHA \
485 TLS-RSA-PSK-WITH-RC4-128-SHA \
486 "
487 if [ "$MODE" != "ssl3" ];
488 then
489 P_CIPHERS="$P_CIPHERS \
490 TLS-ECDHE-PSK-WITH-RC4-128-SHA \
491 TLS-ECDHE-PSK-WITH-NULL-SHA \
492 "
493 fi
494 ;;
495 esac
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100496}
497
Manuel Pégourié-Gonnardd941a792014-02-19 13:35:52 +0100498setup_arguments()
499{
Manuel Pégourié-Gonnard9ada01a2014-02-19 14:24:24 +0100500 case $MODE in
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100501 "ssl3")
502 G_PRIO_MODE="+VERS-SSL3.0"
503 ;;
504 "tls1")
505 G_PRIO_MODE="+VERS-TLS1.0"
506 ;;
507 "tls1_1")
508 G_PRIO_MODE="+VERS-TLS1.1"
509 ;;
510 "tls1_2")
511 G_PRIO_MODE="+VERS-TLS1.2"
Manuel Pégourié-Gonnard9ada01a2014-02-19 14:24:24 +0100512 ;;
513 *)
514 echo "error: invalid mode: $MODE" >&2
515 exit 1;
516 esac
517
518 P_SERVER_ARGS="server_addr=0.0.0.0 force_version=$MODE"
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100519 O_SERVER_ARGS="-www -cipher NULL,ALL -$MODE"
520 G_SERVER_ARGS="-p 4433 --http"
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100521 G_SERVER_PRIO="EXPORT:+NULL:+PSK:+DHE-PSK:+ECDHE-PSK:+RSA-PSK:-VERS-TLS-ALL:$G_PRIO_MODE"
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100522
523 P_CLIENT_ARGS="force_version=$MODE"
Manuel Pégourié-Gonnard9ada01a2014-02-19 14:24:24 +0100524 O_CLIENT_ARGS="-$MODE"
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100525 G_CLIENT_ARGS="-p 4433 --debug 3"
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100526 G_CLIENT_PRIO="NONE:$G_PRIO_MODE:+COMP-NULL:+CURVE-ALL:+SIGN-ALL"
Manuel Pégourié-Gonnard9ada01a2014-02-19 14:24:24 +0100527
Manuel Pégourié-Gonnardd941a792014-02-19 13:35:52 +0100528 if [ "X$VERIFY" = "XYES" ];
529 then
Manuel Pégourié-Gonnard9ada01a2014-02-19 14:24:24 +0100530 P_SERVER_ARGS="$P_SERVER_ARGS ca_file=data_files/test-ca_cat12.crt auth_mode=required"
Manuel Pégourié-Gonnard9ada01a2014-02-19 14:24:24 +0100531 O_SERVER_ARGS="$O_SERVER_ARGS -CAfile data_files/test-ca_cat12.crt -Verify 10"
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100532 G_SERVER_ARGS="$G_SERVER_ARGS --x509cafile data_files/test-ca_cat12.crt --require-client-cert"
533
534 P_CLIENT_ARGS="$P_CLIENT_ARGS ca_file=data_files/test-ca_cat12.crt auth_mode=required"
Manuel Pégourié-Gonnardda782c92014-02-21 10:10:20 +0100535 O_CLIENT_ARGS="$O_CLIENT_ARGS -CAfile data_files/test-ca_cat12.crt -verify 10"
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100536 G_CLIENT_ARGS="$G_CLIENT_ARGS --x509cafile data_files/test-ca_cat12.crt"
Manuel Pégourié-Gonnardda782c92014-02-21 10:10:20 +0100537 else
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100538 # don't request a client cert at all
Manuel Pégourié-Gonnard1b149ef2014-02-27 14:38:29 +0100539 P_SERVER_ARGS="$P_SERVER_ARGS ca_file=none auth_mode=none"
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100540 G_SERVER_ARGS="$G_SERVER_ARGS --disable-client-cert"
541
Manuel Pégourié-Gonnard5de31ec2014-03-19 17:34:52 +0100542 P_CLIENT_ARGS="$P_CLIENT_ARGS ca_file=none auth_mode=none"
543 O_CLIENT_ARGS="$O_CLIENT_ARGS"
544 G_CLIENT_ARGS="$G_CLIENT_ARGS --insecure"
Manuel Pégourié-Gonnardd941a792014-02-19 13:35:52 +0100545 fi
546
547 case $TYPE in
548 "ECDSA")
Manuel Pégourié-Gonnard9ada01a2014-02-19 14:24:24 +0100549 P_SERVER_ARGS="$P_SERVER_ARGS crt_file=data_files/server5.crt key_file=data_files/server5.key"
Manuel Pégourié-Gonnard9ada01a2014-02-19 14:24:24 +0100550 O_SERVER_ARGS="$O_SERVER_ARGS -cert data_files/server5.crt -key data_files/server5.key"
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100551 G_SERVER_ARGS="$G_SERVER_ARGS --x509certfile data_files/server5.crt --x509keyfile data_files/server5.key"
552
Manuel Pégourié-Gonnard1b149ef2014-02-27 14:38:29 +0100553 if [ "X$VERIFY" = "XYES" ]; then
554 P_CLIENT_ARGS="$P_CLIENT_ARGS crt_file=data_files/server6.crt key_file=data_files/server6.key"
555 O_CLIENT_ARGS="$O_CLIENT_ARGS -cert data_files/server6.crt -key data_files/server6.key"
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100556 G_CLIENT_ARGS="$G_CLIENT_ARGS --x509certfile data_files/server6.crt --x509keyfile data_files/server6.key"
Manuel Pégourié-Gonnard1b149ef2014-02-27 14:38:29 +0100557 else
558 P_CLIENT_ARGS="$P_CLIENT_ARGS crt_file=none key_file=none"
559 fi
Manuel Pégourié-Gonnardd941a792014-02-19 13:35:52 +0100560 ;;
561
562 "RSA")
Manuel Pégourié-Gonnardda782c92014-02-21 10:10:20 +0100563 P_SERVER_ARGS="$P_SERVER_ARGS crt_file=data_files/server2.crt key_file=data_files/server2.key"
Manuel Pégourié-Gonnardda782c92014-02-21 10:10:20 +0100564 O_SERVER_ARGS="$O_SERVER_ARGS -cert data_files/server2.crt -key data_files/server2.key"
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100565 G_SERVER_ARGS="$G_SERVER_ARGS --x509certfile data_files/server2.crt --x509keyfile data_files/server2.key"
566
Manuel Pégourié-Gonnard1b149ef2014-02-27 14:38:29 +0100567 if [ "X$VERIFY" = "XYES" ]; then
568 P_CLIENT_ARGS="$P_CLIENT_ARGS crt_file=data_files/server1.crt key_file=data_files/server1.key"
569 O_CLIENT_ARGS="$O_CLIENT_ARGS -cert data_files/server1.crt -key data_files/server1.key"
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100570 G_CLIENT_ARGS="$G_CLIENT_ARGS --x509certfile data_files/server1.crt --x509keyfile data_files/server1.key"
Manuel Pégourié-Gonnard1b149ef2014-02-27 14:38:29 +0100571 else
572 P_CLIENT_ARGS="$P_CLIENT_ARGS crt_file=none key_file=none"
573 fi
Manuel Pégourié-Gonnardd941a792014-02-19 13:35:52 +0100574 ;;
575
576 "PSK")
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100577 # give RSA-PSK-capable server a RSA cert
Manuel Pégourié-Gonnard1b149ef2014-02-27 14:38:29 +0100578 # (should be a separate type, but harder to close with openssl)
579 P_SERVER_ARGS="$P_SERVER_ARGS psk=6162636465666768696a6b6c6d6e6f70 ca_file=none crt_file=data_files/server2.crt key_file=data_files/server2.key"
Manuel Pégourié-Gonnard1b149ef2014-02-27 14:38:29 +0100580 O_SERVER_ARGS="$O_SERVER_ARGS -psk 6162636465666768696a6b6c6d6e6f70 -nocert"
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100581 G_SERVER_ARGS="$G_SERVER_ARGS --x509certfile data_files/server2.crt --x509keyfile data_files/server2.key --pskpasswd data_files/passwd.psk"
582
583 P_CLIENT_ARGS="$P_CLIENT_ARGS psk=6162636465666768696a6b6c6d6e6f70 crt_file=none key_file=none"
Manuel Pégourié-Gonnard9ada01a2014-02-19 14:24:24 +0100584 O_CLIENT_ARGS="$O_CLIENT_ARGS -psk 6162636465666768696a6b6c6d6e6f70"
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100585 G_CLIENT_ARGS="$G_CLIENT_ARGS --pskusername Client_identity --pskkey=6162636465666768696a6b6c6d6e6f70"
Manuel Pégourié-Gonnardd941a792014-02-19 13:35:52 +0100586 ;;
587 esac
588}
589
Manuel Pégourié-Gonnard3eec6042014-02-27 15:37:24 +0100590# is_polar <cmd_line>
591is_polar() {
592 echo "$1" | grep 'ssl_server2\|ssl_client2' > /dev/null
593}
594
595# has_mem_err <log_file_name>
596has_mem_err() {
597 if ( grep -F 'All heap blocks were freed -- no leaks are possible' "$1" &&
598 grep -F 'ERROR SUMMARY: 0 errors from 0 contexts' "$1" ) > /dev/null
599 then
600 return 1 # false: does not have errors
601 else
602 return 0 # true: has errors
603 fi
604}
605
Manuel Pégourié-Gonnard304beef2014-02-19 14:45:00 +0100606# start_server <name>
607# also saves name and command
608start_server() {
Manuel Pégourié-Gonnard304beef2014-02-19 14:45:00 +0100609 case $1 in
610 [Oo]pen*)
Manuel Pégourié-Gonnard74faf3c2014-03-13 18:47:44 +0100611 SERVER_CMD="$OPENSSL_CMD s_server $O_SERVER_ARGS"
Manuel Pégourié-Gonnard304beef2014-02-19 14:45:00 +0100612 ;;
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100613 [Gg]nu*)
Manuel Pégourié-Gonnard74faf3c2014-03-13 18:47:44 +0100614 SERVER_CMD="$GNUTLS_SERV $G_SERVER_ARGS --priority $G_SERVER_PRIO"
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100615 ;;
Manuel Pégourié-Gonnard304beef2014-02-19 14:45:00 +0100616 [Pp]olar*)
Manuel Pégourié-Gonnardf7a26902014-02-27 12:25:54 +0100617 SERVER_CMD="$P_SRV $P_SERVER_ARGS"
Manuel Pégourié-Gonnard3eec6042014-02-27 15:37:24 +0100618 if [ "$MEMCHECK" -gt 0 ]; then
619 SERVER_CMD="valgrind --leak-check=full $SERVER_CMD"
620 fi
Manuel Pégourié-Gonnard304beef2014-02-19 14:45:00 +0100621 ;;
622 *)
623 echo "error: invalid server name: $1" >&2
624 exit 1
625 ;;
626 esac
627 SERVER_NAME=$1
628
629 log "$SERVER_CMD"
Manuel Pégourié-Gonnardba0b8442014-03-13 17:57:45 +0100630 echo "$SERVER_CMD" > srv_out
631 $SERVER_CMD >> srv_out 2>&1 &
Manuel Pégourié-Gonnard304beef2014-02-19 14:45:00 +0100632 PROCESS_ID=$!
633
634 sleep 1
635}
636
Manuel Pégourié-Gonnard911622d2014-02-27 11:50:40 +0100637# terminate the running server (closing it cleanly if it is ours)
Manuel Pégourié-Gonnard95957712014-02-19 15:29:38 +0100638stop_server() {
Manuel Pégourié-Gonnardc57e98b2014-02-19 17:37:55 +0100639 case $SERVER_NAME in
640 [Pp]olar*)
Manuel Pégourié-Gonnard911622d2014-02-27 11:50:40 +0100641 # we must force a PSK suite when in PSK mode (otherwise client
Manuel Pégourié-Gonnard84fd6872014-03-13 18:35:10 +0100642 # auth will fail), so try every entry in $P_CIPHERS in turn (in
643 # case the first one is not implemented in this configuration)
644 for i in $P_CIPHERS; do
Manuel Pégourié-Gonnard5de31ec2014-03-19 17:34:52 +0100645 log "$P_CLI $P_CLIENT_ARGS request_page=SERVERQUIT auth_mode=none force_ciphersuite=$i"
Manuel Pégourié-Gonnard84fd6872014-03-13 18:35:10 +0100646 "$P_CLI" $P_CLIENT_ARGS request_page=SERVERQUIT auth_mode=none \
Manuel Pégourié-Gonnard84fd6872014-03-13 18:35:10 +0100647 force_ciphersuite=$i >/dev/null
648 if [ "$?" == 0 ]; then
649 break
650 fi
651 done
Manuel Pégourié-Gonnardc57e98b2014-02-19 17:37:55 +0100652 ;;
Manuel Pégourié-Gonnard911622d2014-02-27 11:50:40 +0100653 *)
654 kill $PROCESS_ID 2>/dev/null
Manuel Pégourié-Gonnardc57e98b2014-02-19 17:37:55 +0100655 esac
656
Manuel Pégourié-Gonnard95957712014-02-19 15:29:38 +0100657 wait $PROCESS_ID 2>/dev/null
Manuel Pégourié-Gonnard3eec6042014-02-27 15:37:24 +0100658
659 if [ "$MEMCHECK" -gt 0 ]; then
660 if is_polar "$SERVER_CMD" && has_mem_err srv_out; then
661 echo " ! Server had memory errors"
662 let "srvmem++"
663 return
664 fi
665 fi
666
Manuel Pégourié-Gonnard87ae3032014-02-27 11:12:30 +0100667 rm -f srv_out
Manuel Pégourié-Gonnard95957712014-02-19 15:29:38 +0100668}
669
Manuel Pégourié-Gonnarda9062e92014-02-25 16:21:22 +0100670# kill the running server (used when killed by signal)
671cleanup() {
Manuel Pégourié-Gonnard87ae3032014-02-27 11:12:30 +0100672 rm -f srv_out cli_out
Manuel Pégourié-Gonnarda9062e92014-02-25 16:21:22 +0100673 kill $PROCESS_ID
674 exit 1
675}
676
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100677# run_client <name> <cipher>
678run_client() {
Manuel Pégourié-Gonnard87ae3032014-02-27 11:12:30 +0100679 # announce what we're going to do
680 let "tests++"
681 VERIF=$(echo $VERIFY | tr '[:upper:]' '[:lower:]')
682 TITLE="${1:0:1}->${SERVER_NAME:0:1} $MODE,$VERIF $2 "
683 echo -n "$TITLE"
684 LEN=`echo "$TITLE" | wc -c`
685 LEN=`echo 72 - $LEN | bc`
686 for i in `seq 1 $LEN`; do echo -n '.'; done; echo -n ' '
687
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100688 # run the command and interpret result
689 case $1 in
690 [Oo]pen*)
Manuel Pégourié-Gonnard74faf3c2014-03-13 18:47:44 +0100691 CLIENT_CMD="$OPENSSL_CMD s_client $O_CLIENT_ARGS -cipher $2"
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100692 log "$CLIENT_CMD"
Manuel Pégourié-Gonnardba0b8442014-03-13 17:57:45 +0100693 echo "$CLIENT_CMD" > cli_out
694 ( echo -e 'GET HTTP/1.0'; echo; ) | $CLIENT_CMD >> cli_out 2>&1
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100695 EXIT=$?
696
697 if [ "$EXIT" == "0" ]; then
698 RESULT=0
699 else
Manuel Pégourié-Gonnard87ae3032014-02-27 11:12:30 +0100700 if grep 'Cipher is (NONE)' cli_out >/dev/null; then
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100701 RESULT=1
702 else
703 RESULT=2
704 fi
705 fi
706 ;;
707
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100708 [Gg]nu*)
Manuel Pégourié-Gonnard74faf3c2014-03-13 18:47:44 +0100709 CLIENT_CMD="$GNUTLS_CLI $G_CLIENT_ARGS --priority $G_PRIO_MODE:$2 localhost"
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100710 log "$CLIENT_CMD"
Manuel Pégourié-Gonnardba0b8442014-03-13 17:57:45 +0100711 echo "$CLIENT_CMD" > cli_out
712 ( echo -e 'GET HTTP/1.0'; echo; ) | $CLIENT_CMD >> cli_out 2>&1
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100713 EXIT=$?
714
715 if [ "$EXIT" == "0" ]; then
716 RESULT=0
717 else
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100718 RESULT=2
719 # interpret early failure, with a handshake_failure alert
720 # before the server hello, as "no ciphersuite in common"
721 if grep -F 'Received alert [40]: Handshake failed' cli_out; then
722 if grep -i 'SERVER HELLO .* was received' cli_out; then :
723 else
724 RESULT=1
725 fi
726 fi >/dev/null
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100727 fi
728 ;;
729
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100730 [Pp]olar*)
Manuel Pégourié-Gonnardf7a26902014-02-27 12:25:54 +0100731 CLIENT_CMD="$P_CLI $P_CLIENT_ARGS force_ciphersuite=$2"
Manuel Pégourié-Gonnard3eec6042014-02-27 15:37:24 +0100732 if [ "$MEMCHECK" -gt 0 ]; then
733 CLIENT_CMD="valgrind --leak-check=full $CLIENT_CMD"
734 fi
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100735 log "$CLIENT_CMD"
Manuel Pégourié-Gonnardba0b8442014-03-13 17:57:45 +0100736 echo "$CLIENT_CMD" > cli_out
737 $CLIENT_CMD >> cli_out 2>&1
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100738 EXIT=$?
739
740 case $EXIT in
741 "0") RESULT=0 ;;
742 "2") RESULT=1 ;;
743 *) RESULT=2 ;;
744 esac
Manuel Pégourié-Gonnard3eec6042014-02-27 15:37:24 +0100745
746 if [ "$MEMCHECK" -gt 0 ]; then
747 if is_polar "$CLIENT_CMD" && has_mem_err cli_out; then
748 RESULT=2
749 fi
750 fi
751
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100752 ;;
753
754 *)
755 echo "error: invalid client name: $1" >&2
756 exit 1
757 ;;
758 esac
759
760 # report and count result
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100761 case $RESULT in
762 "0")
Manuel Pégourié-Gonnard4145b892014-02-24 13:20:14 +0100763 echo PASS
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100764 ;;
765 "1")
Manuel Pégourié-Gonnard4145b892014-02-24 13:20:14 +0100766 echo SKIP
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100767 let "skipped++"
768 ;;
769 "2")
Manuel Pégourié-Gonnard4145b892014-02-24 13:20:14 +0100770 echo FAIL
771 echo " ! $SERVER_CMD"
772 echo " ! $CLIENT_CMD"
Manuel Pégourié-Gonnard3eec6042014-02-27 15:37:24 +0100773 cp srv_out c-srv-${tests}.log
774 cp cli_out c-cli-${tests}.log
775 echo " ! outputs saved to c-srv-${tests}.log, c-cli-${tests}.log"
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100776 let "failed++"
777 ;;
778 esac
Manuel Pégourié-Gonnard87ae3032014-02-27 11:12:30 +0100779
780 rm -f cli_out
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100781}
782
Manuel Pégourié-Gonnard9dea8bd2014-02-26 18:21:02 +0100783#
784# MAIN
785#
786
Manuel Pégourié-Gonnard3947d042014-03-14 18:13:53 +0100787get_options "$@"
788
Manuel Pégourié-Gonnardf7a26902014-02-27 12:25:54 +0100789# sanity checks, avoid an avalanche of errors
790if [ ! -x "$P_SRV" ]; then
Manuel Pégourié-Gonnard3947d042014-03-14 18:13:53 +0100791 echo "Command '$P_SRV' is not an executable file" >&2
Manuel Pégourié-Gonnardf7a26902014-02-27 12:25:54 +0100792 exit 1
793fi
794if [ ! -x "$P_CLI" ]; then
Manuel Pégourié-Gonnard3947d042014-03-14 18:13:53 +0100795 echo "Command '$P_CLI' is not an executable file" >&2
Manuel Pégourié-Gonnardf7a26902014-02-27 12:25:54 +0100796 exit 1
797fi
Manuel Pégourié-Gonnard3947d042014-03-14 18:13:53 +0100798
799if echo "$PEERS" | grep -i openssl > /dev/null; then
800 if which "$OPENSSL_CMD" >/dev/null 2>&1; then :; else
801 echo "Command '$OPENSSL_CMD' not found" >&2
Manuel Pégourié-Gonnard74faf3c2014-03-13 18:47:44 +0100802 exit 1
803 fi
Manuel Pégourié-Gonnard3947d042014-03-14 18:13:53 +0100804fi
Manuel Pégourié-Gonnardf7a26902014-02-27 12:25:54 +0100805
Manuel Pégourié-Gonnard3947d042014-03-14 18:13:53 +0100806if echo "$PEERS" | grep -i gnutls > /dev/null; then
807 for CMD in "$GNUTLS_CLI" "$GNUTLS_SERV"; do
808 if which "$CMD" >/dev/null 2>&1; then :; else
809 echo "Command '$CMD' not found" >&2
810 exit 1
811 fi
812 done
813fi
814
815for PEER in $PEERS; do
816 case "$PEER" in
817 [Pp]olar*|[Oo]pen*|[Gg]nu*)
818 ;;
819 *)
820 echo "Unknown peers: $PEER" >&2
821 exit 1
822 esac
823done
Manuel Pégourié-Gonnard9dea8bd2014-02-26 18:21:02 +0100824
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100825killall -q gnutls-serv openssl ssl_server ssl_server2
Manuel Pégourié-Gonnarda9062e92014-02-25 16:21:22 +0100826trap cleanup INT TERM HUP
827
Manuel Pégourié-Gonnard95957712014-02-19 15:29:38 +0100828for VERIFY in $VERIFIES; do
829 for MODE in $MODES; do
Manuel Pégourié-Gonnard95957712014-02-19 15:29:38 +0100830 for TYPE in $TYPES; do
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100831 for PEER in $PEERS; do
Paul Bakker7e5e7ca2013-04-17 19:27:58 +0200832
Manuel Pégourié-Gonnard95957712014-02-19 15:29:38 +0100833 setup_arguments
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100834
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100835 case "$PEER" in
Manuel Pégourié-Gonnardd3313192013-09-13 19:20:37 +0200836
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100837 [Oo]pen*)
Paul Bakker398cb512012-04-10 08:22:31 +0000838
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100839 reset_ciphersuites
840 add_openssl_ciphersuites
841 filter_ciphersuites
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100842
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100843 if [ "X" != "X$P_CIPHERS" ]; then
844 start_server "OpenSSL"
845 for i in $P_CIPHERS; do
846 run_client PolarSSL $i
847 done
848 stop_server
849 fi
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100850
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100851 if [ "X" != "X$O_CIPHERS" ]; then
852 start_server "PolarSSL"
853 for i in $O_CIPHERS; do
854 run_client OpenSSL $i
855 done
856 stop_server
857 fi
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100858
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100859 ;;
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100860
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100861 [Gg]nu*)
Paul Bakkerfab5c822012-02-06 16:45:10 +0000862
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100863 reset_ciphersuites
864 add_gnutls_ciphersuites
865 filter_ciphersuites
Paul Bakkerfab5c822012-02-06 16:45:10 +0000866
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100867 if [ "X" != "X$P_CIPHERS" ]; then
868 start_server "GnuTLS"
869 for i in $P_CIPHERS; do
870 run_client PolarSSL $i
871 done
872 stop_server
873 fi
874
875 if [ "X" != "X$G_CIPHERS" ]; then
876 start_server "PolarSSL"
877 for i in $G_CIPHERS; do
878 run_client GnuTLS $i
879 done
880 stop_server
881 fi
882
883 ;;
884
885 [Pp]olar*)
886
887 reset_ciphersuites
888 add_openssl_ciphersuites
889 add_gnutls_ciphersuites
890 add_polarssl_ciphersuites
891 filter_ciphersuites
892
893 if [ "X" != "X$P_CIPHERS" ]; then
894 start_server "PolarSSL"
895 for i in $P_CIPHERS; do
896 run_client PolarSSL $i
897 done
898 stop_server
899 fi
900
901 ;;
902
903 esac
904
905 done
Manuel Pégourié-Gonnard95957712014-02-19 15:29:38 +0100906 done
907 done
Manuel Pégourié-Gonnard9791a402013-08-27 19:57:15 +0200908done
Manuel Pégourié-Gonnard70064fd2013-08-27 22:00:47 +0200909
Manuel Pégourié-Gonnard4145b892014-02-24 13:20:14 +0100910echo "------------------------------------------------------------------------"
Manuel Pégourié-Gonnard70064fd2013-08-27 22:00:47 +0200911
Manuel Pégourié-Gonnard3eec6042014-02-27 15:37:24 +0100912if (( failed != 0 && srvmem != 0 ));
Manuel Pégourié-Gonnard70064fd2013-08-27 22:00:47 +0200913then
914 echo -n "FAILED"
915else
916 echo -n "PASSED"
917fi
918
Manuel Pégourié-Gonnardba0b8442014-03-13 17:57:45 +0100919if [ "$MEMCHECK" -gt 0 ]; then
920 MEMREPORT=", $srvmem server memory errors"
921else
922 MEMREPORT=""
923fi
924
Manuel Pégourié-Gonnard70064fd2013-08-27 22:00:47 +0200925let "passed = tests - failed"
Manuel Pégourié-Gonnardba0b8442014-03-13 17:57:45 +0100926echo " ($passed / $tests tests ($skipped skipped$MEMREPORT))"
Manuel Pégourié-Gonnard70064fd2013-08-27 22:00:47 +0200927
Manuel Pégourié-Gonnard3eec6042014-02-27 15:37:24 +0100928let "failed += srvmem"
Manuel Pégourié-Gonnard70064fd2013-08-27 22:00:47 +0200929exit $failed