blob: ca85578b5bb2fe0b5a71f6574bbcbc343057b516 [file] [log] [blame]
Manuel Pégourié-Gonnard4956fd72014-09-24 11:13:44 +02001/* BEGIN_HEADER */
Chris Jones84a773f2021-03-05 18:38:47 +00002#include <ssl_misc.h>
Andrzej Kurek941962e2020-02-07 09:20:32 -05003#include <mbedtls/timing.h>
Piotr Nowickibde7ee82020-02-21 10:59:50 +01004#include <mbedtls/debug.h>
Valerio Setti1b08d422023-02-13 11:33:26 +01005#include <mbedtls/pk.h>
Hanno Becker73c825a2020-09-08 10:52:58 +01006#include <ssl_tls13_keys.h>
Gabor Mezeib35759d2022-02-09 16:59:11 +01007#include <ssl_tls13_invasive.h>
Yanray Wang47907a42022-10-24 14:42:01 +08008#include <test/ssl_helpers.h>
Piotr Nowickibde7ee82020-02-21 10:59:50 +01009
Gabor Mezei22c9a6f2021-10-20 12:09:35 +020010#include <constant_time_internal.h>
Manuel Pégourié-Gonnard9670a592020-07-10 10:21:46 +020011#include <test/constant_flow.h>
12
Valerio Setti7c0f91b2023-04-28 12:20:34 +020013#define SSL_MESSAGE_QUEUE_INIT { NULL, 0, 0, 0 }
14
Ronald Cron33327da2024-02-05 17:46:41 +010015/* Mnemonics for the early data test scenarios */
Ronald Cron5c208d72024-01-24 10:13:30 +010016#define TEST_EARLY_DATA_ACCEPTED 0
Ronald Cron265273e2024-01-24 11:13:19 +010017#define TEST_EARLY_DATA_NO_INDICATION_SENT 1
Ronald Crond6dba672024-01-24 12:22:24 +010018#define TEST_EARLY_DATA_SERVER_REJECTS 2
Ronald Cron2261ab22024-01-24 13:38:31 +010019#define TEST_EARLY_DATA_HRR 3
Waleed Elmelegy4dfb0e72024-03-14 01:48:40 +000020#define TEST_EARLY_DATA_SAME_ALPN 4
21#define TEST_EARLY_DATA_DIFF_ALPN 5
22#define TEST_EARLY_DATA_NO_INITIAL_ALPN 6
23#define TEST_EARLY_DATA_NO_LATER_ALPN 7
Ronald Cron33327da2024-02-05 17:46:41 +010024
Ronald Cronae2d81c2024-01-22 09:13:41 +010025#if (!defined(MBEDTLS_SSL_PROTO_TLS1_2)) && \
26 defined(MBEDTLS_SSL_EARLY_DATA) && defined(MBEDTLS_SSL_CLI_C) && \
Ronald Crona8dd81b2024-01-16 17:50:52 +010027 defined(MBEDTLS_SSL_SRV_C) && defined(MBEDTLS_DEBUG_C) && \
28 defined(MBEDTLS_TEST_AT_LEAST_ONE_TLS1_3_CIPHERSUITE) && \
29 defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED) && \
30 defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED) && \
Elena Uziunaite0916cd72024-05-23 17:01:07 +010031 defined(PSA_WANT_ALG_SHA_256) && \
Elena Uziunaite6b4cd482024-07-04 17:50:11 +010032 defined(PSA_WANT_ECC_SECP_R1_256) && defined(PSA_WANT_ECC_SECP_R1_384) && \
Elena Uziunaitebed21b52024-08-27 11:56:25 +010033 defined(PSA_HAVE_ALG_ECDSA_VERIFY) && defined(MBEDTLS_SSL_SESSION_TICKETS)
Ronald Crona8dd81b2024-01-16 17:50:52 +010034/*
Ronald Cronfcbf7762024-03-01 10:00:42 +010035 * Test function to write early data for negative tests where
36 * mbedtls_ssl_write_early_data() cannot be used.
Ronald Crona8dd81b2024-01-16 17:50:52 +010037 */
38static int write_early_data(mbedtls_ssl_context *ssl,
39 unsigned char *buf, size_t len)
40{
41 int ret = mbedtls_ssl_get_max_out_record_payload(ssl);
42
43 TEST_ASSERT(ret > 0);
Ronald Cron4facb0a2024-03-08 11:40:07 +010044 TEST_LE_U(len, (size_t) ret);
Ronald Crona8dd81b2024-01-16 17:50:52 +010045
46 ret = mbedtls_ssl_flush_output(ssl);
47 TEST_EQUAL(ret, 0);
48 TEST_EQUAL(ssl->out_left, 0);
49
50 ssl->out_msglen = len;
51 ssl->out_msgtype = MBEDTLS_SSL_MSG_APPLICATION_DATA;
52 if (len > 0) {
53 memcpy(ssl->out_msg, buf, len);
54 }
55
56 ret = mbedtls_ssl_write_record(ssl, 1);
57 TEST_EQUAL(ret, 0);
58
59 ret = len;
60
61exit:
62 return ret;
63}
64#endif
65
Gabor Mezei5ba9b572025-03-20 09:17:05 +010066#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED) && \
67 defined(MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH) && \
68 defined(MBEDTLS_SSL_PROTO_TLS1_2) && \
69 defined(PSA_WANT_ECC_SECP_R1_384) && \
70 defined(PSA_WANT_ALG_SHA_256)
71/*
72 * Test function to perform a handshake using the mfl extension and with
73 * setting the resize buffer option.
74 */
75static void resize_buffers(int mfl, int renegotiation, int legacy_renegotiation,
76 int serialize, int dtls, char *cipher)
77{
78 mbedtls_test_handshake_test_options options;
79 mbedtls_test_init_handshake_options(&options);
80
81 options.mfl = mfl;
82 options.cipher = cipher;
83 options.renegotiate = renegotiation;
84 options.legacy_renegotiation = legacy_renegotiation;
85 options.serialize = serialize;
86 options.dtls = dtls;
87 if (dtls) {
88 options.expected_negotiated_version = MBEDTLS_SSL_VERSION_TLS1_2;
89 }
90 options.resize_buffers = 1;
91
92 const mbedtls_ssl_ciphersuite_t *ciphersuite =
93 mbedtls_ssl_ciphersuite_from_string(cipher);
94 if (ciphersuite != NULL) {
95 options.pk_alg = mbedtls_ssl_get_ciphersuite_sig_pk_alg(ciphersuite);
96 }
97
98 mbedtls_test_ssl_perform_handshake(&options);
99
100 mbedtls_test_free_handshake_options(&options);
101}
102
103#endif
104
Valerio Setti1494a092025-01-30 16:45:45 +0100105#if defined(PSA_WANT_ALG_GCM) || defined(PSA_WANT_ALG_CHACHA20_POLY1305)
106#define TEST_GCM_OR_CHACHAPOLY_ENABLED
107#endif
108
Gilles Peskine92122ed2025-03-07 20:40:50 +0100109typedef enum {
110 RECOMBINE_NOMINAL, /* param: ignored */
Gilles Peskine7c1dbef2025-03-07 20:48:01 +0100111 RECOMBINE_SPLIT_FIRST, /* param: offset of split (<=0 means from end) */
112 RECOMBINE_INSERT_EMPTY, /* param: offset (<0 means from end) */
Gilles Peskine92122ed2025-03-07 20:40:50 +0100113 RECOMBINE_COALESCE, /* param: min number of records */
Gilles Peskine7c1dbef2025-03-07 20:48:01 +0100114 RECOMBINE_COALESCE_SPLIT_ONCE, /* param: offset of split (<=0 means from end) */
115 RECOMBINE_COALESCE_SPLIT_ENDS, /* the hairiest one? param: offset, must be >0 */
Gilles Peskine92122ed2025-03-07 20:40:50 +0100116} recombine_records_instruction_t;
117
Gilles Peskine07426722025-03-07 23:01:42 +0100118#if defined(MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED)
119
Gilles Peskine7c1dbef2025-03-07 20:48:01 +0100120/* Split the first record into two pieces of lengths offset and
121 * record_length-offset. If offset is zero or negative, count from the end of
122 * the record. */
123static int recombine_split_first_record(mbedtls_test_ssl_buffer *buf,
124 int offset)
125{
126 const size_t header_length = 5;
127 TEST_LE_U(header_length, buf->content_length);
128 size_t record_length = MBEDTLS_GET_UINT16_BE(buf->buffer, header_length - 2);
129
130 if (offset > 0) {
131 TEST_LE_S(offset, record_length);
132 } else {
133 TEST_LE_S(-offset, record_length);
134 offset = record_length + offset;
135 }
136
137 /* Check that we have room to insert a record header */
138 TEST_LE_U(buf->content_length + header_length, buf->capacity);
139
140 /* Make room for a record header */
141 size_t new_record_start = header_length + offset;
142 size_t new_content_start = new_record_start + header_length;
143 memmove(buf->buffer + new_content_start,
144 buf->buffer + new_record_start,
145 buf->content_length - new_record_start);
146 buf->content_length += header_length;
147
148 /* Construct a header for the new record based on the existing one */
149 memcpy(buf->buffer + new_record_start, buf->buffer, header_length);
150 MBEDTLS_PUT_UINT16_BE(record_length - offset,
151 buf->buffer, new_content_start - 2);
152
153 /* Adjust the length of the first record */
154 MBEDTLS_PUT_UINT16_BE(offset, buf->buffer, header_length - 2);
155
156 return 0;
157
158exit:
159 return -1;
160}
161
162/* Insert an empty record at the given offset. If offset is negative,
163 * count from the end of the first record. */
164static int recombine_insert_empty_record(mbedtls_test_ssl_buffer *buf,
165 int offset)
166{
167 const size_t header_length = 5;
168 TEST_LE_U(header_length, buf->content_length);
169 size_t record_length = MBEDTLS_GET_UINT16_BE(buf->buffer, header_length - 2);
170
171 if (offset >= 0) {
172 TEST_LE_S(offset, record_length);
173 } else {
174 TEST_LE_S(-offset, record_length);
175 offset = record_length + offset;
176 }
177
178 /* Check that we have room to insert two record headers */
179 TEST_LE_U(buf->content_length + 2 * header_length, buf->capacity);
180
181 /* Make room for an empty record and a record header */
182 size_t empty_record_start = header_length + offset;
183 size_t empty_content_start = empty_record_start + header_length;
184 size_t tail_record_start = empty_content_start;
185 size_t tail_content_start = tail_record_start + header_length;
186 memmove(buf->buffer + tail_content_start,
187 buf->buffer + tail_record_start,
188 buf->content_length - tail_record_start);
189 buf->content_length += 2 * header_length;
190
191 /* Construct headers for the new records based on the existing one */
192 memcpy(buf->buffer + empty_record_start, buf->buffer, header_length);
193 MBEDTLS_PUT_UINT16_BE(0, buf->buffer, empty_content_start - 2);
194 memcpy(buf->buffer + tail_record_start, buf->buffer, header_length);
195 MBEDTLS_PUT_UINT16_BE(record_length - offset,
196 buf->buffer, tail_content_start - 2);
197
198 /* Adjust the length of the first record */
199 MBEDTLS_PUT_UINT16_BE(offset, buf->buffer, header_length - 2);
200
201 return 0;
202
203exit:
204 return -1;
205}
206
Gilles Peskine92122ed2025-03-07 20:40:50 +0100207/* Coalesce TLS handshake records.
208 * DTLS is not supported.
209 * Encrypted or authenticated handshake records are not supported.
210 * Assume the buffer content is a valid sequence of records.
211 */
212static int recombine_coalesce_handshake_records(mbedtls_test_ssl_buffer *buf,
213 int max)
214{
215 const size_t header_length = 5;
216 TEST_LE_U(header_length, buf->content_length);
217 if (buf->buffer[0] != MBEDTLS_SSL_MSG_HANDSHAKE) {
218 return 0;
219 }
220
221 size_t record_length = MBEDTLS_GET_UINT16_BE(buf->buffer, header_length - 2);
222 TEST_LE_U(header_length + record_length, buf->content_length);
223
224 int count;
225 for (count = 1; count < max; count++) {
226 size_t next_start = header_length + record_length;
227 if (next_start >= buf->content_length) {
228 /* We've already reached the last record. */
229 break;
230 }
231
232 TEST_LE_U(next_start + header_length, buf->content_length);
233 if (buf->buffer[next_start] != MBEDTLS_SSL_MSG_HANDSHAKE) {
234 /* There's another record, but it isn't a handshake record. */
235 break;
236 }
237 size_t next_length =
238 MBEDTLS_GET_UINT16_BE(buf->buffer, next_start + header_length - 2);
239 TEST_LE_U(next_start + header_length + next_length, buf->content_length);
240
241 /* Erase the next record header */
242 memmove(buf->buffer + next_start,
243 buf->buffer + next_start + header_length,
244 buf->content_length - next_start);
245 buf->content_length -= header_length;
246 /* Update the first record length */
247 record_length += next_length;
248 TEST_LE_U(record_length, 0xffff);
249 MBEDTLS_PUT_UINT16_BE(record_length, buf->buffer, header_length - 2);
250 }
251
252 return count;
253
254exit:
255 return -1;
256}
257
258static int recombine_records(mbedtls_test_ssl_endpoint *server,
259 recombine_records_instruction_t instruction,
260 int param)
261{
262 mbedtls_test_ssl_buffer *buf = server->socket.output;
263 int ret;
264
265 /* buf is a circular buffer. For simplicity, this code assumes that
266 * the data is located at the beginning. This should be ok since
267 * this function is only meant to be used on the first flight
268 * emitted by a server. */
269 TEST_EQUAL(buf->start, 0);
270
271 switch (instruction) {
272 case RECOMBINE_NOMINAL:
273 break;
274
Gilles Peskine7c1dbef2025-03-07 20:48:01 +0100275 case RECOMBINE_SPLIT_FIRST:
276 ret = recombine_split_first_record(buf, param);
277 TEST_LE_S(0, ret);
278 break;
279
280 case RECOMBINE_INSERT_EMPTY:
281 ret = recombine_insert_empty_record(buf, param);
282 TEST_LE_S(0, ret);
283 break;
284
Gilles Peskine92122ed2025-03-07 20:40:50 +0100285 case RECOMBINE_COALESCE:
286 ret = recombine_coalesce_handshake_records(buf, param);
287 if (param == INT_MAX) {
288 TEST_LE_S(1, ret);
289 } else {
290 TEST_EQUAL(ret, param);
291 }
292 break;
293
Gilles Peskine7c1dbef2025-03-07 20:48:01 +0100294 case RECOMBINE_COALESCE_SPLIT_ONCE:
295 ret = recombine_coalesce_handshake_records(buf, INT_MAX);
296 /* Require at least two coalesced records, otherwise this
297 * doesn't lead to a meaningful test (use
298 * RECOMBINE_SPLIT_FIRST instead). */
299 TEST_LE_S(2, ret);
300 ret = recombine_split_first_record(buf, param);
301 TEST_LE_S(0, ret);
302 break;
303
304 case RECOMBINE_COALESCE_SPLIT_ENDS:
305 ret = recombine_coalesce_handshake_records(buf, INT_MAX);
306 /* Accept a single record, which will be split at both ends */
307 TEST_LE_S(1, ret);
308 TEST_LE_S(1, param);
309 ret = recombine_split_first_record(buf, -param);
310 TEST_LE_S(0, ret);
311 ret = recombine_split_first_record(buf, param);
312 TEST_LE_S(0, ret);
313 break;
314
Gilles Peskine92122ed2025-03-07 20:40:50 +0100315 default:
316 TEST_FAIL("Instructions not understood");
317 }
318
319 return 1;
320
321exit:
322 return 0;
323}
324
Gilles Peskine07426722025-03-07 23:01:42 +0100325#endif /* MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED */
326
Manuel Pégourié-Gonnard4956fd72014-09-24 11:13:44 +0200327/* END_HEADER */
328
329/* BEGIN_DEPENDENCIES
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200330 * depends_on:MBEDTLS_SSL_TLS_C
Manuel Pégourié-Gonnard4956fd72014-09-24 11:13:44 +0200331 * END_DEPENDENCIES
332 */
333
Janos Follath6264e662019-11-26 11:11:15 +0000334/* BEGIN_CASE */
335void test_callback_buffer_sanity()
336{
337 enum { MSGLEN = 10 };
Yanray Wang9ef0dce2022-10-25 16:44:13 +0800338 mbedtls_test_ssl_buffer buf;
Gilles Peskine21e46b32023-10-17 16:35:20 +0200339 mbedtls_test_ssl_buffer_init(&buf);
Janos Follath6264e662019-11-26 11:11:15 +0000340 unsigned char input[MSGLEN];
341 unsigned char output[MSGLEN];
342
Valerio Setti285dae82023-04-19 15:10:45 +0200343 USE_PSA_INIT();
Gilles Peskine449bd832023-01-11 14:50:10 +0100344 memset(input, 0, sizeof(input));
Janos Follath6264e662019-11-26 11:11:15 +0000345
346 /* Make sure calling put and get on NULL buffer results in error. */
Yanray Wangf7b62352022-10-26 11:51:53 +0800347 TEST_ASSERT(mbedtls_test_ssl_buffer_put(NULL, input, sizeof(input))
Gilles Peskine449bd832023-01-11 14:50:10 +0100348 == -1);
Yanray Wangf7b62352022-10-26 11:51:53 +0800349 TEST_ASSERT(mbedtls_test_ssl_buffer_get(NULL, output, sizeof(output))
Gilles Peskine449bd832023-01-11 14:50:10 +0100350 == -1);
Yanray Wangbd296832022-10-26 18:28:11 +0800351 TEST_ASSERT(mbedtls_test_ssl_buffer_put(NULL, NULL, sizeof(input))
352 == -1);
Andrzej Kurekf7774142020-01-22 06:34:59 -0500353
Yanray Wangf7b62352022-10-26 11:51:53 +0800354 TEST_ASSERT(mbedtls_test_ssl_buffer_put(NULL, NULL, 0) == -1);
355 TEST_ASSERT(mbedtls_test_ssl_buffer_get(NULL, NULL, 0) == -1);
Janos Follath6264e662019-11-26 11:11:15 +0000356
357 /* Make sure calling put and get on a buffer that hasn't been set up results
Shaun Case8b0ecbc2021-12-20 21:14:10 -0800358 * in error. */
Yanray Wangbd296832022-10-26 18:28:11 +0800359 TEST_ASSERT(mbedtls_test_ssl_buffer_put(&buf, input, sizeof(input))
360 == -1);
Yanray Wangf7b62352022-10-26 11:51:53 +0800361 TEST_ASSERT(mbedtls_test_ssl_buffer_get(&buf, output, sizeof(output))
Gilles Peskine449bd832023-01-11 14:50:10 +0100362 == -1);
Yanray Wangbd296832022-10-26 18:28:11 +0800363 TEST_ASSERT(mbedtls_test_ssl_buffer_put(&buf, NULL, sizeof(input))
364 == -1);
Andrzej Kurekf7774142020-01-22 06:34:59 -0500365
Yanray Wangf7b62352022-10-26 11:51:53 +0800366 TEST_ASSERT(mbedtls_test_ssl_buffer_put(&buf, NULL, 0) == -1);
367 TEST_ASSERT(mbedtls_test_ssl_buffer_get(&buf, NULL, 0) == -1);
Janos Follath6264e662019-11-26 11:11:15 +0000368
Andrzej Kurekf7774142020-01-22 06:34:59 -0500369 /* Make sure calling put and get on NULL input only results in
370 * error if the length is not zero, and that a NULL output is valid for data
371 * dropping.
372 */
Janos Follath6264e662019-11-26 11:11:15 +0000373
Yanray Wangf7b62352022-10-26 11:51:53 +0800374 TEST_ASSERT(mbedtls_test_ssl_buffer_setup(&buf, sizeof(input)) == 0);
Janos Follath6264e662019-11-26 11:11:15 +0000375
Yanray Wangbd296832022-10-26 18:28:11 +0800376 TEST_ASSERT(mbedtls_test_ssl_buffer_put(&buf, NULL, sizeof(input))
377 == -1);
Yanray Wangf7b62352022-10-26 11:51:53 +0800378 TEST_ASSERT(mbedtls_test_ssl_buffer_get(&buf, NULL, sizeof(output))
Gilles Peskine449bd832023-01-11 14:50:10 +0100379 == 0);
Yanray Wangf7b62352022-10-26 11:51:53 +0800380 TEST_ASSERT(mbedtls_test_ssl_buffer_put(&buf, NULL, 0) == 0);
381 TEST_ASSERT(mbedtls_test_ssl_buffer_get(&buf, NULL, 0) == 0);
Janos Follath6264e662019-11-26 11:11:15 +0000382
Piotr Nowickifb437d72020-01-13 16:59:12 +0100383 /* Make sure calling put several times in the row is safe */
384
Yanray Wangf7b62352022-10-26 11:51:53 +0800385 TEST_ASSERT(mbedtls_test_ssl_buffer_put(&buf, input, sizeof(input))
Gilles Peskine449bd832023-01-11 14:50:10 +0100386 == sizeof(input));
Yanray Wangf7b62352022-10-26 11:51:53 +0800387 TEST_ASSERT(mbedtls_test_ssl_buffer_get(&buf, output, 2) == 2);
388 TEST_ASSERT(mbedtls_test_ssl_buffer_put(&buf, input, 1) == 1);
389 TEST_ASSERT(mbedtls_test_ssl_buffer_put(&buf, input, 2) == 1);
390 TEST_ASSERT(mbedtls_test_ssl_buffer_put(&buf, input, 2) == 0);
Piotr Nowickifb437d72020-01-13 16:59:12 +0100391
392
Janos Follath6264e662019-11-26 11:11:15 +0000393exit:
Yanray Wangf7b62352022-10-26 11:51:53 +0800394 mbedtls_test_ssl_buffer_free(&buf);
Valerio Setti285dae82023-04-19 15:10:45 +0200395 USE_PSA_DONE();
Janos Follath6264e662019-11-26 11:11:15 +0000396}
397/* END_CASE */
398
399/*
Yanray Wang9ef0dce2022-10-25 16:44:13 +0800400 * Test if the implementation of `mbedtls_test_ssl_buffer` related functions is
Janos Follath6264e662019-11-26 11:11:15 +0000401 * correct and works as expected.
402 *
403 * That is
404 * - If we try to put in \p put1 bytes then we can put in \p put1_ret bytes.
405 * - Afterwards if we try to get \p get1 bytes then we can get \get1_ret bytes.
406 * - Next, if we try to put in \p put1 bytes then we can put in \p put1_ret
407 * bytes.
408 * - Afterwards if we try to get \p get1 bytes then we can get \get1_ret bytes.
409 * - All of the bytes we got match the bytes we put in in a FIFO manner.
410 */
411
412/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +0100413void test_callback_buffer(int size, int put1, int put1_ret,
414 int get1, int get1_ret, int put2, int put2_ret,
415 int get2, int get2_ret)
Janos Follath6264e662019-11-26 11:11:15 +0000416{
417 enum { ROUNDS = 2 };
418 size_t put[ROUNDS];
419 int put_ret[ROUNDS];
420 size_t get[ROUNDS];
421 int get_ret[ROUNDS];
Yanray Wang9ef0dce2022-10-25 16:44:13 +0800422 mbedtls_test_ssl_buffer buf;
Gilles Peskine449bd832023-01-11 14:50:10 +0100423 unsigned char *input = NULL;
Janos Follath6264e662019-11-26 11:11:15 +0000424 size_t input_len;
Gilles Peskine449bd832023-01-11 14:50:10 +0100425 unsigned char *output = NULL;
Janos Follath6264e662019-11-26 11:11:15 +0000426 size_t output_len;
Janos Follath031827f2019-11-27 11:12:14 +0000427 size_t i, j, written, read;
Janos Follath6264e662019-11-26 11:11:15 +0000428
Yanray Wangf7b62352022-10-26 11:51:53 +0800429 mbedtls_test_ssl_buffer_init(&buf);
Valerio Setti00a256f2023-04-27 17:22:27 +0200430 USE_PSA_INIT();
Yanray Wangf7b62352022-10-26 11:51:53 +0800431 TEST_ASSERT(mbedtls_test_ssl_buffer_setup(&buf, size) == 0);
Janos Follath6264e662019-11-26 11:11:15 +0000432
433 /* Check the sanity of input parameters and initialise local variables. That
434 * is, ensure that the amount of data is not negative and that we are not
435 * expecting more to put or get than we actually asked for. */
Gilles Peskine449bd832023-01-11 14:50:10 +0100436 TEST_ASSERT(put1 >= 0);
Janos Follath6264e662019-11-26 11:11:15 +0000437 put[0] = put1;
438 put_ret[0] = put1_ret;
Gilles Peskine449bd832023-01-11 14:50:10 +0100439 TEST_ASSERT(put1_ret <= put1);
440 TEST_ASSERT(put2 >= 0);
Janos Follath6264e662019-11-26 11:11:15 +0000441 put[1] = put2;
442 put_ret[1] = put2_ret;
Gilles Peskine449bd832023-01-11 14:50:10 +0100443 TEST_ASSERT(put2_ret <= put2);
Janos Follath6264e662019-11-26 11:11:15 +0000444
Gilles Peskine449bd832023-01-11 14:50:10 +0100445 TEST_ASSERT(get1 >= 0);
Janos Follath6264e662019-11-26 11:11:15 +0000446 get[0] = get1;
447 get_ret[0] = get1_ret;
Gilles Peskine449bd832023-01-11 14:50:10 +0100448 TEST_ASSERT(get1_ret <= get1);
449 TEST_ASSERT(get2 >= 0);
Janos Follath6264e662019-11-26 11:11:15 +0000450 get[1] = get2;
451 get_ret[1] = get2_ret;
Gilles Peskine449bd832023-01-11 14:50:10 +0100452 TEST_ASSERT(get2_ret <= get2);
Janos Follath6264e662019-11-26 11:11:15 +0000453
454 input_len = 0;
455 /* Calculate actual input and output lengths */
Gilles Peskine449bd832023-01-11 14:50:10 +0100456 for (j = 0; j < ROUNDS; j++) {
457 if (put_ret[j] > 0) {
Janos Follath6264e662019-11-26 11:11:15 +0000458 input_len += put_ret[j];
459 }
460 }
461 /* In order to always have a valid pointer we always allocate at least 1
462 * byte. */
Gilles Peskine449bd832023-01-11 14:50:10 +0100463 if (input_len == 0) {
Janos Follath6264e662019-11-26 11:11:15 +0000464 input_len = 1;
Gilles Peskine449bd832023-01-11 14:50:10 +0100465 }
Tom Cosgrove05b2a872023-07-21 11:31:13 +0100466 TEST_CALLOC(input, input_len);
Janos Follath6264e662019-11-26 11:11:15 +0000467
468 output_len = 0;
Gilles Peskine449bd832023-01-11 14:50:10 +0100469 for (j = 0; j < ROUNDS; j++) {
470 if (get_ret[j] > 0) {
Janos Follath6264e662019-11-26 11:11:15 +0000471 output_len += get_ret[j];
472 }
473 }
Gilles Peskine449bd832023-01-11 14:50:10 +0100474 TEST_ASSERT(output_len <= input_len);
Janos Follath6264e662019-11-26 11:11:15 +0000475 /* In order to always have a valid pointer we always allocate at least 1
476 * byte. */
Gilles Peskine449bd832023-01-11 14:50:10 +0100477 if (output_len == 0) {
Janos Follath6264e662019-11-26 11:11:15 +0000478 output_len = 1;
Gilles Peskine449bd832023-01-11 14:50:10 +0100479 }
Tom Cosgrove05b2a872023-07-21 11:31:13 +0100480 TEST_CALLOC(output, output_len);
Janos Follath6264e662019-11-26 11:11:15 +0000481
482 /* Fill up the buffer with structured data so that unwanted changes
483 * can be detected */
Gilles Peskine449bd832023-01-11 14:50:10 +0100484 for (i = 0; i < input_len; i++) {
Janos Follath6264e662019-11-26 11:11:15 +0000485 input[i] = i & 0xFF;
486 }
487
488 written = read = 0;
Gilles Peskine449bd832023-01-11 14:50:10 +0100489 for (j = 0; j < ROUNDS; j++) {
Yanray Wangf7b62352022-10-26 11:51:53 +0800490 TEST_ASSERT(put_ret[j] == mbedtls_test_ssl_buffer_put(&buf,
491 input + written, put[j]));
Janos Follath6264e662019-11-26 11:11:15 +0000492 written += put_ret[j];
Yanray Wangf7b62352022-10-26 11:51:53 +0800493 TEST_ASSERT(get_ret[j] == mbedtls_test_ssl_buffer_get(&buf,
494 output + read, get[j]));
Janos Follath6264e662019-11-26 11:11:15 +0000495 read += get_ret[j];
Gilles Peskine449bd832023-01-11 14:50:10 +0100496 TEST_ASSERT(read <= written);
497 if (get_ret[j] > 0) {
498 TEST_ASSERT(memcmp(output + read - get_ret[j],
499 input + read - get_ret[j], get_ret[j])
500 == 0);
Janos Follath6264e662019-11-26 11:11:15 +0000501 }
502 }
503
504exit:
Gilles Peskine449bd832023-01-11 14:50:10 +0100505 mbedtls_free(input);
506 mbedtls_free(output);
Yanray Wangf7b62352022-10-26 11:51:53 +0800507 mbedtls_test_ssl_buffer_free(&buf);
Valerio Setti285dae82023-04-19 15:10:45 +0200508 USE_PSA_DONE();
Janos Follath6264e662019-11-26 11:11:15 +0000509}
510/* END_CASE */
511
Janos Follath031827f2019-11-27 11:12:14 +0000512/*
Yanray Wangbd296832022-10-26 18:28:11 +0800513 * Test if the implementation of `mbedtls_test_mock_socket` related
514 * I/O functions is correct and works as expected on unconnected sockets.
Janos Follathc673c2c2019-12-02 15:47:26 +0000515 */
516
517/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +0100518void ssl_mock_sanity()
Janos Follathc673c2c2019-12-02 15:47:26 +0000519{
520 enum { MSGLEN = 105 };
Paul Elliott21c8fe52021-11-24 16:54:26 +0000521 unsigned char message[MSGLEN] = { 0 };
522 unsigned char received[MSGLEN] = { 0 };
Yanray Wang9ef0dce2022-10-25 16:44:13 +0800523 mbedtls_test_mock_socket socket;
Janos Follathc673c2c2019-12-02 15:47:26 +0000524
Yanray Wang5f86a422023-03-15 16:02:29 +0800525 mbedtls_test_mock_socket_init(&socket);
Valerio Setti00a256f2023-04-27 17:22:27 +0200526 USE_PSA_INIT();
Yanray Wangf7b62352022-10-26 11:51:53 +0800527 TEST_ASSERT(mbedtls_test_mock_tcp_send_b(&socket, message, MSGLEN) < 0);
528 mbedtls_test_mock_socket_close(&socket);
Yanray Wang5f86a422023-03-15 16:02:29 +0800529 mbedtls_test_mock_socket_init(&socket);
Yanray Wangf7b62352022-10-26 11:51:53 +0800530 TEST_ASSERT(mbedtls_test_mock_tcp_recv_b(&socket, received, MSGLEN) < 0);
531 mbedtls_test_mock_socket_close(&socket);
Janos Follathc673c2c2019-12-02 15:47:26 +0000532
Yanray Wang5f86a422023-03-15 16:02:29 +0800533 mbedtls_test_mock_socket_init(&socket);
Yanray Wangf7b62352022-10-26 11:51:53 +0800534 TEST_ASSERT(mbedtls_test_mock_tcp_send_nb(&socket, message, MSGLEN) < 0);
535 mbedtls_test_mock_socket_close(&socket);
Yanray Wang5f86a422023-03-15 16:02:29 +0800536 mbedtls_test_mock_socket_init(&socket);
Yanray Wangf7b62352022-10-26 11:51:53 +0800537 TEST_ASSERT(mbedtls_test_mock_tcp_recv_nb(&socket, received, MSGLEN) < 0);
538 mbedtls_test_mock_socket_close(&socket);
Janos Follathc673c2c2019-12-02 15:47:26 +0000539
540exit:
Yanray Wangf7b62352022-10-26 11:51:53 +0800541 mbedtls_test_mock_socket_close(&socket);
Valerio Setti285dae82023-04-19 15:10:45 +0200542 USE_PSA_DONE();
Janos Follathc673c2c2019-12-02 15:47:26 +0000543}
544/* END_CASE */
545
546/*
Yanray Wangbd296832022-10-26 18:28:11 +0800547 * Test if the implementation of `mbedtls_test_mock_socket` related functions
548 * can send a single message from the client to the server.
Janos Follath031827f2019-11-27 11:12:14 +0000549 */
550
551/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +0100552void ssl_mock_tcp(int blocking)
Janos Follath031827f2019-11-27 11:12:14 +0000553{
Janos Follathc673c2c2019-12-02 15:47:26 +0000554 enum { MSGLEN = 105 };
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100555 enum { BUFLEN = MSGLEN / 5 };
Janos Follathc673c2c2019-12-02 15:47:26 +0000556 unsigned char message[MSGLEN];
557 unsigned char received[MSGLEN];
Yanray Wang9ef0dce2022-10-25 16:44:13 +0800558 mbedtls_test_mock_socket client;
559 mbedtls_test_mock_socket server;
Janos Follathc673c2c2019-12-02 15:47:26 +0000560 size_t written, read;
561 int send_ret, recv_ret;
562 mbedtls_ssl_send_t *send;
563 mbedtls_ssl_recv_t *recv;
Janos Follathc673c2c2019-12-02 15:47:26 +0000564 unsigned i;
565
Gilles Peskine449bd832023-01-11 14:50:10 +0100566 if (blocking == 0) {
Yanray Wangf7b62352022-10-26 11:51:53 +0800567 send = mbedtls_test_mock_tcp_send_nb;
568 recv = mbedtls_test_mock_tcp_recv_nb;
Gilles Peskine449bd832023-01-11 14:50:10 +0100569 } else {
Yanray Wangf7b62352022-10-26 11:51:53 +0800570 send = mbedtls_test_mock_tcp_send_b;
571 recv = mbedtls_test_mock_tcp_recv_b;
Janos Follathc673c2c2019-12-02 15:47:26 +0000572 }
573
Yanray Wang5f86a422023-03-15 16:02:29 +0800574 mbedtls_test_mock_socket_init(&client);
575 mbedtls_test_mock_socket_init(&server);
Valerio Setti00a256f2023-04-27 17:22:27 +0200576 USE_PSA_INIT();
Janos Follathc673c2c2019-12-02 15:47:26 +0000577
578 /* Fill up the buffer with structured data so that unwanted changes
579 * can be detected */
Gilles Peskine449bd832023-01-11 14:50:10 +0100580 for (i = 0; i < MSGLEN; i++) {
Janos Follathc673c2c2019-12-02 15:47:26 +0000581 message[i] = i & 0xFF;
582 }
583
584 /* Make sure that sending a message takes a few iterations. */
Yanray Wangbd296832022-10-26 18:28:11 +0800585 TEST_ASSERT(0 == mbedtls_test_mock_socket_connect(&client, &server,
586 BUFLEN));
Janos Follathc673c2c2019-12-02 15:47:26 +0000587
588 /* Send the message to the server */
589 send_ret = recv_ret = 1;
590 written = read = 0;
Gilles Peskine449bd832023-01-11 14:50:10 +0100591 while (send_ret != 0 || recv_ret != 0) {
592 send_ret = send(&client, message + written, MSGLEN - written);
Janos Follathc673c2c2019-12-02 15:47:26 +0000593
Gilles Peskine449bd832023-01-11 14:50:10 +0100594 TEST_ASSERT(send_ret >= 0);
595 TEST_ASSERT(send_ret <= BUFLEN);
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100596 written += send_ret;
597
598 /* If the buffer is full we can test blocking and non-blocking send */
Gilles Peskine449bd832023-01-11 14:50:10 +0100599 if (send_ret == BUFLEN) {
600 int blocking_ret = send(&client, message, 1);
601 if (blocking) {
602 TEST_ASSERT(blocking_ret == 0);
603 } else {
604 TEST_ASSERT(blocking_ret == MBEDTLS_ERR_SSL_WANT_WRITE);
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100605 }
Janos Follathc673c2c2019-12-02 15:47:26 +0000606 }
Janos Follathc673c2c2019-12-02 15:47:26 +0000607
Gilles Peskine449bd832023-01-11 14:50:10 +0100608 recv_ret = recv(&server, received + read, MSGLEN - read);
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100609
610 /* The result depends on whether any data was sent */
Gilles Peskine449bd832023-01-11 14:50:10 +0100611 if (send_ret > 0) {
612 TEST_ASSERT(recv_ret > 0);
613 TEST_ASSERT(recv_ret <= BUFLEN);
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100614 read += recv_ret;
Gilles Peskine449bd832023-01-11 14:50:10 +0100615 } else if (blocking) {
616 TEST_ASSERT(recv_ret == 0);
617 } else {
618 TEST_ASSERT(recv_ret == MBEDTLS_ERR_SSL_WANT_READ);
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100619 recv_ret = 0;
Janos Follathc673c2c2019-12-02 15:47:26 +0000620 }
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100621
622 /* If the buffer is empty we can test blocking and non-blocking read */
Gilles Peskine449bd832023-01-11 14:50:10 +0100623 if (recv_ret == BUFLEN) {
624 int blocking_ret = recv(&server, received, 1);
625 if (blocking) {
626 TEST_ASSERT(blocking_ret == 0);
627 } else {
628 TEST_ASSERT(blocking_ret == MBEDTLS_ERR_SSL_WANT_READ);
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100629 }
630 }
Janos Follathc673c2c2019-12-02 15:47:26 +0000631 }
Gilles Peskine449bd832023-01-11 14:50:10 +0100632 TEST_ASSERT(memcmp(message, received, MSGLEN) == 0);
Janos Follathc673c2c2019-12-02 15:47:26 +0000633
634exit:
Yanray Wangf7b62352022-10-26 11:51:53 +0800635 mbedtls_test_mock_socket_close(&client);
636 mbedtls_test_mock_socket_close(&server);
Valerio Setti285dae82023-04-19 15:10:45 +0200637 USE_PSA_DONE();
Janos Follathc673c2c2019-12-02 15:47:26 +0000638}
639/* END_CASE */
640
641/*
Yanray Wangbd296832022-10-26 18:28:11 +0800642 * Test if the implementation of `mbedtls_test_mock_socket` related functions
643 * can send messages in both direction at the same time (with the I/O calls
Janos Follathc673c2c2019-12-02 15:47:26 +0000644 * interleaving).
645 */
646
647/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +0100648void ssl_mock_tcp_interleaving(int blocking)
Janos Follathc673c2c2019-12-02 15:47:26 +0000649{
Janos Follath031827f2019-11-27 11:12:14 +0000650 enum { ROUNDS = 2 };
651 enum { MSGLEN = 105 };
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100652 enum { BUFLEN = MSGLEN / 5 };
Janos Follath031827f2019-11-27 11:12:14 +0000653 unsigned char message[ROUNDS][MSGLEN];
654 unsigned char received[ROUNDS][MSGLEN];
Yanray Wang9ef0dce2022-10-25 16:44:13 +0800655 mbedtls_test_mock_socket client;
656 mbedtls_test_mock_socket server;
Janos Follath031827f2019-11-27 11:12:14 +0000657 size_t written[ROUNDS];
658 size_t read[ROUNDS];
659 int send_ret[ROUNDS];
660 int recv_ret[ROUNDS];
661 unsigned i, j, progress;
Janos Follath3766ba52019-11-27 13:31:42 +0000662 mbedtls_ssl_send_t *send;
663 mbedtls_ssl_recv_t *recv;
Janos Follath3766ba52019-11-27 13:31:42 +0000664
Gilles Peskine449bd832023-01-11 14:50:10 +0100665 if (blocking == 0) {
Yanray Wangf7b62352022-10-26 11:51:53 +0800666 send = mbedtls_test_mock_tcp_send_nb;
667 recv = mbedtls_test_mock_tcp_recv_nb;
Gilles Peskine449bd832023-01-11 14:50:10 +0100668 } else {
Yanray Wangf7b62352022-10-26 11:51:53 +0800669 send = mbedtls_test_mock_tcp_send_b;
670 recv = mbedtls_test_mock_tcp_recv_b;
Janos Follath3766ba52019-11-27 13:31:42 +0000671 }
Janos Follath031827f2019-11-27 11:12:14 +0000672
Yanray Wang5f86a422023-03-15 16:02:29 +0800673 mbedtls_test_mock_socket_init(&client);
674 mbedtls_test_mock_socket_init(&server);
Valerio Setti00a256f2023-04-27 17:22:27 +0200675 USE_PSA_INIT();
Janos Follath031827f2019-11-27 11:12:14 +0000676
677 /* Fill up the buffers with structured data so that unwanted changes
678 * can be detected */
Gilles Peskine449bd832023-01-11 14:50:10 +0100679 for (i = 0; i < ROUNDS; i++) {
680 for (j = 0; j < MSGLEN; j++) {
681 message[i][j] = (i * MSGLEN + j) & 0xFF;
Janos Follath031827f2019-11-27 11:12:14 +0000682 }
683 }
684
Janos Follath031827f2019-11-27 11:12:14 +0000685 /* Make sure that sending a message takes a few iterations. */
Yanray Wangbd296832022-10-26 18:28:11 +0800686 TEST_ASSERT(0 == mbedtls_test_mock_socket_connect(&client, &server,
687 BUFLEN));
Janos Follath031827f2019-11-27 11:12:14 +0000688
Janos Follath031827f2019-11-27 11:12:14 +0000689 /* Send the message from both sides, interleaving. */
690 progress = 1;
Gilles Peskine449bd832023-01-11 14:50:10 +0100691 for (i = 0; i < ROUNDS; i++) {
Janos Follath031827f2019-11-27 11:12:14 +0000692 written[i] = 0;
693 read[i] = 0;
694 }
695 /* This loop does not stop as long as there was a successful write or read
696 * of at least one byte on either side. */
Gilles Peskine449bd832023-01-11 14:50:10 +0100697 while (progress != 0) {
Yanray Wang9ef0dce2022-10-25 16:44:13 +0800698 mbedtls_test_mock_socket *socket;
Janos Follath031827f2019-11-27 11:12:14 +0000699
Gilles Peskine449bd832023-01-11 14:50:10 +0100700 for (i = 0; i < ROUNDS; i++) {
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100701 /* First sending is from the client */
Gilles Peskine449bd832023-01-11 14:50:10 +0100702 socket = (i % 2 == 0) ? (&client) : (&server);
Janos Follath031827f2019-11-27 11:12:14 +0000703
Gilles Peskine449bd832023-01-11 14:50:10 +0100704 send_ret[i] = send(socket, message[i] + written[i],
705 MSGLEN - written[i]);
706 TEST_ASSERT(send_ret[i] >= 0);
707 TEST_ASSERT(send_ret[i] <= BUFLEN);
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100708 written[i] += send_ret[i];
Janos Follath031827f2019-11-27 11:12:14 +0000709
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100710 /* If the buffer is full we can test blocking and non-blocking
711 * send */
Gilles Peskine449bd832023-01-11 14:50:10 +0100712 if (send_ret[i] == BUFLEN) {
713 int blocking_ret = send(socket, message[i], 1);
714 if (blocking) {
715 TEST_ASSERT(blocking_ret == 0);
716 } else {
717 TEST_ASSERT(blocking_ret == MBEDTLS_ERR_SSL_WANT_WRITE);
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100718 }
719 }
Janos Follath3766ba52019-11-27 13:31:42 +0000720 }
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100721
Gilles Peskine449bd832023-01-11 14:50:10 +0100722 for (i = 0; i < ROUNDS; i++) {
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100723 /* First receiving is from the server */
Gilles Peskine449bd832023-01-11 14:50:10 +0100724 socket = (i % 2 == 0) ? (&server) : (&client);
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100725
Gilles Peskine449bd832023-01-11 14:50:10 +0100726 recv_ret[i] = recv(socket, received[i] + read[i],
727 MSGLEN - read[i]);
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100728
729 /* The result depends on whether any data was sent */
Gilles Peskine449bd832023-01-11 14:50:10 +0100730 if (send_ret[i] > 0) {
731 TEST_ASSERT(recv_ret[i] > 0);
732 TEST_ASSERT(recv_ret[i] <= BUFLEN);
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100733 read[i] += recv_ret[i];
Gilles Peskine449bd832023-01-11 14:50:10 +0100734 } else if (blocking) {
735 TEST_ASSERT(recv_ret[i] == 0);
736 } else {
737 TEST_ASSERT(recv_ret[i] == MBEDTLS_ERR_SSL_WANT_READ);
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100738 recv_ret[i] = 0;
739 }
740
741 /* If the buffer is empty we can test blocking and non-blocking
742 * read */
Gilles Peskine449bd832023-01-11 14:50:10 +0100743 if (recv_ret[i] == BUFLEN) {
744 int blocking_ret = recv(socket, received[i], 1);
745 if (blocking) {
746 TEST_ASSERT(blocking_ret == 0);
747 } else {
748 TEST_ASSERT(blocking_ret == MBEDTLS_ERR_SSL_WANT_READ);
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100749 }
750 }
Janos Follath3766ba52019-11-27 13:31:42 +0000751 }
Janos Follath031827f2019-11-27 11:12:14 +0000752
753 progress = 0;
Gilles Peskine449bd832023-01-11 14:50:10 +0100754 for (i = 0; i < ROUNDS; i++) {
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100755 progress += send_ret[i] + recv_ret[i];
Janos Follath031827f2019-11-27 11:12:14 +0000756 }
757 }
758
Gilles Peskine449bd832023-01-11 14:50:10 +0100759 for (i = 0; i < ROUNDS; i++) {
760 TEST_ASSERT(memcmp(message[i], received[i], MSGLEN) == 0);
761 }
Janos Follath031827f2019-11-27 11:12:14 +0000762
763exit:
Yanray Wangf7b62352022-10-26 11:51:53 +0800764 mbedtls_test_mock_socket_close(&client);
765 mbedtls_test_mock_socket_close(&server);
Valerio Setti285dae82023-04-19 15:10:45 +0200766 USE_PSA_DONE();
Janos Follath031827f2019-11-27 11:12:14 +0000767}
768/* END_CASE */
769
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500770/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +0100771void ssl_message_queue_sanity()
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500772{
Valerio Setti7c0f91b2023-04-28 12:20:34 +0200773 mbedtls_test_ssl_message_queue queue = SSL_MESSAGE_QUEUE_INIT;
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500774
Valerio Setti285dae82023-04-19 15:10:45 +0200775 USE_PSA_INIT();
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500776 /* Trying to push/pull to an empty queue */
Yanray Wangf7b62352022-10-26 11:51:53 +0800777 TEST_ASSERT(mbedtls_test_ssl_message_queue_push_info(NULL, 1)
Gilles Peskine449bd832023-01-11 14:50:10 +0100778 == MBEDTLS_TEST_ERROR_ARG_NULL);
Yanray Wangf7b62352022-10-26 11:51:53 +0800779 TEST_ASSERT(mbedtls_test_ssl_message_queue_pop_info(NULL, 1)
Gilles Peskine449bd832023-01-11 14:50:10 +0100780 == MBEDTLS_TEST_ERROR_ARG_NULL);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500781
Yanray Wangf7b62352022-10-26 11:51:53 +0800782 TEST_ASSERT(mbedtls_test_ssl_message_queue_setup(&queue, 3) == 0);
Gilles Peskine449bd832023-01-11 14:50:10 +0100783 TEST_ASSERT(queue.capacity == 3);
784 TEST_ASSERT(queue.num == 0);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500785
786exit:
Yanray Wangf7b62352022-10-26 11:51:53 +0800787 mbedtls_test_ssl_message_queue_free(&queue);
Valerio Setti285dae82023-04-19 15:10:45 +0200788 USE_PSA_DONE();
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500789}
790/* END_CASE */
791
792/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +0100793void ssl_message_queue_basic()
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500794{
Valerio Setti7c0f91b2023-04-28 12:20:34 +0200795 mbedtls_test_ssl_message_queue queue = SSL_MESSAGE_QUEUE_INIT;
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500796
Valerio Setti285dae82023-04-19 15:10:45 +0200797 USE_PSA_INIT();
Yanray Wangf7b62352022-10-26 11:51:53 +0800798 TEST_ASSERT(mbedtls_test_ssl_message_queue_setup(&queue, 3) == 0);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500799
800 /* Sanity test - 3 pushes and 3 pops with sufficient space */
Yanray Wangf7b62352022-10-26 11:51:53 +0800801 TEST_ASSERT(mbedtls_test_ssl_message_queue_push_info(&queue, 1) == 1);
Gilles Peskine449bd832023-01-11 14:50:10 +0100802 TEST_ASSERT(queue.capacity == 3);
803 TEST_ASSERT(queue.num == 1);
Yanray Wangf7b62352022-10-26 11:51:53 +0800804 TEST_ASSERT(mbedtls_test_ssl_message_queue_push_info(&queue, 1) == 1);
Gilles Peskine449bd832023-01-11 14:50:10 +0100805 TEST_ASSERT(queue.capacity == 3);
806 TEST_ASSERT(queue.num == 2);
Yanray Wangf7b62352022-10-26 11:51:53 +0800807 TEST_ASSERT(mbedtls_test_ssl_message_queue_push_info(&queue, 2) == 2);
Gilles Peskine449bd832023-01-11 14:50:10 +0100808 TEST_ASSERT(queue.capacity == 3);
809 TEST_ASSERT(queue.num == 3);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500810
Yanray Wangf7b62352022-10-26 11:51:53 +0800811 TEST_ASSERT(mbedtls_test_ssl_message_queue_pop_info(&queue, 1) == 1);
812 TEST_ASSERT(mbedtls_test_ssl_message_queue_pop_info(&queue, 1) == 1);
813 TEST_ASSERT(mbedtls_test_ssl_message_queue_pop_info(&queue, 2) == 2);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500814
815exit:
Yanray Wangf7b62352022-10-26 11:51:53 +0800816 mbedtls_test_ssl_message_queue_free(&queue);
Valerio Setti285dae82023-04-19 15:10:45 +0200817 USE_PSA_DONE();
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500818}
819/* END_CASE */
820
821/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +0100822void ssl_message_queue_overflow_underflow()
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500823{
Valerio Setti7c0f91b2023-04-28 12:20:34 +0200824 mbedtls_test_ssl_message_queue queue = SSL_MESSAGE_QUEUE_INIT;
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500825
Valerio Setti285dae82023-04-19 15:10:45 +0200826 USE_PSA_INIT();
Yanray Wangf7b62352022-10-26 11:51:53 +0800827 TEST_ASSERT(mbedtls_test_ssl_message_queue_setup(&queue, 3) == 0);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500828
829 /* 4 pushes (last one with an error), 4 pops (last one with an error) */
Yanray Wangf7b62352022-10-26 11:51:53 +0800830 TEST_ASSERT(mbedtls_test_ssl_message_queue_push_info(&queue, 1) == 1);
831 TEST_ASSERT(mbedtls_test_ssl_message_queue_push_info(&queue, 1) == 1);
832 TEST_ASSERT(mbedtls_test_ssl_message_queue_push_info(&queue, 2) == 2);
833 TEST_ASSERT(mbedtls_test_ssl_message_queue_push_info(&queue, 3)
Gilles Peskine449bd832023-01-11 14:50:10 +0100834 == MBEDTLS_ERR_SSL_WANT_WRITE);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500835
Yanray Wangf7b62352022-10-26 11:51:53 +0800836 TEST_ASSERT(mbedtls_test_ssl_message_queue_pop_info(&queue, 1) == 1);
837 TEST_ASSERT(mbedtls_test_ssl_message_queue_pop_info(&queue, 1) == 1);
838 TEST_ASSERT(mbedtls_test_ssl_message_queue_pop_info(&queue, 2) == 2);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500839
Yanray Wangf7b62352022-10-26 11:51:53 +0800840 TEST_ASSERT(mbedtls_test_ssl_message_queue_pop_info(&queue, 1)
Gilles Peskine449bd832023-01-11 14:50:10 +0100841 == MBEDTLS_ERR_SSL_WANT_READ);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500842
843exit:
Yanray Wangf7b62352022-10-26 11:51:53 +0800844 mbedtls_test_ssl_message_queue_free(&queue);
Valerio Setti285dae82023-04-19 15:10:45 +0200845 USE_PSA_DONE();
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500846}
847/* END_CASE */
848
849/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +0100850void ssl_message_queue_interleaved()
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500851{
Valerio Setti7c0f91b2023-04-28 12:20:34 +0200852 mbedtls_test_ssl_message_queue queue = SSL_MESSAGE_QUEUE_INIT;
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500853
Valerio Setti285dae82023-04-19 15:10:45 +0200854 USE_PSA_INIT();
Yanray Wangf7b62352022-10-26 11:51:53 +0800855 TEST_ASSERT(mbedtls_test_ssl_message_queue_setup(&queue, 3) == 0);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500856
857 /* Interleaved test - [2 pushes, 1 pop] twice, and then two pops
858 * (to wrap around the buffer) */
Yanray Wangf7b62352022-10-26 11:51:53 +0800859 TEST_ASSERT(mbedtls_test_ssl_message_queue_push_info(&queue, 1) == 1);
860 TEST_ASSERT(mbedtls_test_ssl_message_queue_push_info(&queue, 1) == 1);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500861
Yanray Wangf7b62352022-10-26 11:51:53 +0800862 TEST_ASSERT(mbedtls_test_ssl_message_queue_pop_info(&queue, 1) == 1);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500863
Yanray Wangf7b62352022-10-26 11:51:53 +0800864 TEST_ASSERT(mbedtls_test_ssl_message_queue_push_info(&queue, 2) == 2);
865 TEST_ASSERT(mbedtls_test_ssl_message_queue_push_info(&queue, 3) == 3);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500866
Yanray Wangf7b62352022-10-26 11:51:53 +0800867 TEST_ASSERT(mbedtls_test_ssl_message_queue_pop_info(&queue, 1) == 1);
868 TEST_ASSERT(mbedtls_test_ssl_message_queue_pop_info(&queue, 2) == 2);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500869
Yanray Wangf7b62352022-10-26 11:51:53 +0800870 TEST_ASSERT(mbedtls_test_ssl_message_queue_push_info(&queue, 5) == 5);
871 TEST_ASSERT(mbedtls_test_ssl_message_queue_push_info(&queue, 8) == 8);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500872
Yanray Wangf7b62352022-10-26 11:51:53 +0800873 TEST_ASSERT(mbedtls_test_ssl_message_queue_pop_info(&queue, 3) == 3);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500874
Yanray Wangf7b62352022-10-26 11:51:53 +0800875 TEST_ASSERT(mbedtls_test_ssl_message_queue_pop_info(&queue, 5) == 5);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500876
Yanray Wangf7b62352022-10-26 11:51:53 +0800877 TEST_ASSERT(mbedtls_test_ssl_message_queue_pop_info(&queue, 8) == 8);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500878
879exit:
Yanray Wangf7b62352022-10-26 11:51:53 +0800880 mbedtls_test_ssl_message_queue_free(&queue);
Valerio Setti285dae82023-04-19 15:10:45 +0200881 USE_PSA_DONE();
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500882}
883/* END_CASE */
884
885/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +0100886void ssl_message_queue_insufficient_buffer()
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500887{
Valerio Setti7c0f91b2023-04-28 12:20:34 +0200888 mbedtls_test_ssl_message_queue queue = SSL_MESSAGE_QUEUE_INIT;
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500889 size_t message_len = 10;
890 size_t buffer_len = 5;
891
Valerio Setti285dae82023-04-19 15:10:45 +0200892 USE_PSA_INIT();
Yanray Wangf7b62352022-10-26 11:51:53 +0800893 TEST_ASSERT(mbedtls_test_ssl_message_queue_setup(&queue, 1) == 0);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500894
895 /* Popping without a sufficient buffer */
Yanray Wangf7b62352022-10-26 11:51:53 +0800896 TEST_ASSERT(mbedtls_test_ssl_message_queue_push_info(&queue, message_len)
Gilles Peskine449bd832023-01-11 14:50:10 +0100897 == (int) message_len);
Yanray Wangf7b62352022-10-26 11:51:53 +0800898 TEST_ASSERT(mbedtls_test_ssl_message_queue_pop_info(&queue, buffer_len)
Gilles Peskine449bd832023-01-11 14:50:10 +0100899 == (int) buffer_len);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500900exit:
Yanray Wangf7b62352022-10-26 11:51:53 +0800901 mbedtls_test_ssl_message_queue_free(&queue);
Valerio Setti285dae82023-04-19 15:10:45 +0200902 USE_PSA_DONE();
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500903}
904/* END_CASE */
905
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500906/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +0100907void ssl_message_mock_uninitialized()
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500908{
909 enum { MSGLEN = 10 };
Gilles Peskine449bd832023-01-11 14:50:10 +0100910 unsigned char message[MSGLEN] = { 0 }, received[MSGLEN];
Yanray Wang9ef0dce2022-10-25 16:44:13 +0800911 mbedtls_test_mock_socket client, server;
912 mbedtls_test_ssl_message_queue server_queue, client_queue;
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500913 mbedtls_test_message_socket_context server_context, client_context;
Yanray Wangf7b62352022-10-26 11:51:53 +0800914 mbedtls_test_message_socket_init(&server_context);
915 mbedtls_test_message_socket_init(&client_context);
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500916
Valerio Setti285dae82023-04-19 15:10:45 +0200917 USE_PSA_INIT();
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500918 /* Send with a NULL context */
Yanray Wangf7b62352022-10-26 11:51:53 +0800919 TEST_ASSERT(mbedtls_test_mock_tcp_send_msg(NULL, message, MSGLEN)
Gilles Peskine449bd832023-01-11 14:50:10 +0100920 == MBEDTLS_TEST_ERROR_CONTEXT_ERROR);
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500921
Yanray Wangf7b62352022-10-26 11:51:53 +0800922 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(NULL, message, MSGLEN)
Gilles Peskine449bd832023-01-11 14:50:10 +0100923 == MBEDTLS_TEST_ERROR_CONTEXT_ERROR);
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500924
Yanray Wangbd296832022-10-26 18:28:11 +0800925 TEST_ASSERT(mbedtls_test_message_socket_setup(&server_queue,
926 &client_queue, 1,
Yanray Wangf7b62352022-10-26 11:51:53 +0800927 &server,
928 &server_context) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500929
Yanray Wangbd296832022-10-26 18:28:11 +0800930 TEST_ASSERT(mbedtls_test_message_socket_setup(&client_queue,
931 &server_queue, 1,
Yanray Wangf7b62352022-10-26 11:51:53 +0800932 &client,
933 &client_context) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500934
Yanray Wangbd296832022-10-26 18:28:11 +0800935 TEST_ASSERT(mbedtls_test_mock_tcp_send_msg(&client_context, message,
936 MSGLEN)
Gilles Peskine449bd832023-01-11 14:50:10 +0100937 == MBEDTLS_TEST_ERROR_SEND_FAILED);
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500938
Yanray Wangbd296832022-10-26 18:28:11 +0800939 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&server_context, received,
940 MSGLEN)
Gilles Peskine449bd832023-01-11 14:50:10 +0100941 == MBEDTLS_ERR_SSL_WANT_READ);
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500942
943 /* Push directly to a queue to later simulate a disconnected behavior */
Yanray Wangbd296832022-10-26 18:28:11 +0800944 TEST_ASSERT(mbedtls_test_ssl_message_queue_push_info(&server_queue,
945 MSGLEN)
Gilles Peskine449bd832023-01-11 14:50:10 +0100946 == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500947
948 /* Test if there's an error when trying to read from a disconnected
949 * socket */
Yanray Wangbd296832022-10-26 18:28:11 +0800950 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&server_context, received,
951 MSGLEN)
Gilles Peskine449bd832023-01-11 14:50:10 +0100952 == MBEDTLS_TEST_ERROR_RECV_FAILED);
953exit:
Yanray Wangf7b62352022-10-26 11:51:53 +0800954 mbedtls_test_message_socket_close(&server_context);
955 mbedtls_test_message_socket_close(&client_context);
Valerio Setti285dae82023-04-19 15:10:45 +0200956 USE_PSA_DONE();
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500957}
958/* END_CASE */
959
960/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +0100961void ssl_message_mock_basic()
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500962{
963 enum { MSGLEN = 10 };
964 unsigned char message[MSGLEN], received[MSGLEN];
Yanray Wang9ef0dce2022-10-25 16:44:13 +0800965 mbedtls_test_mock_socket client, server;
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500966 unsigned i;
Yanray Wang9ef0dce2022-10-25 16:44:13 +0800967 mbedtls_test_ssl_message_queue server_queue, client_queue;
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500968 mbedtls_test_message_socket_context server_context, client_context;
Valerio Setti285dae82023-04-19 15:10:45 +0200969
Yanray Wangf7b62352022-10-26 11:51:53 +0800970 mbedtls_test_message_socket_init(&server_context);
971 mbedtls_test_message_socket_init(&client_context);
Valerio Setti00a256f2023-04-27 17:22:27 +0200972 USE_PSA_INIT();
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500973
Yanray Wangbd296832022-10-26 18:28:11 +0800974 TEST_ASSERT(mbedtls_test_message_socket_setup(&server_queue,
975 &client_queue, 1,
Yanray Wangf7b62352022-10-26 11:51:53 +0800976 &server,
977 &server_context) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500978
Yanray Wangbd296832022-10-26 18:28:11 +0800979 TEST_ASSERT(mbedtls_test_message_socket_setup(&client_queue,
980 &server_queue, 1,
Yanray Wangf7b62352022-10-26 11:51:53 +0800981 &client,
982 &client_context) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500983
984 /* Fill up the buffer with structured data so that unwanted changes
985 * can be detected */
Gilles Peskine449bd832023-01-11 14:50:10 +0100986 for (i = 0; i < MSGLEN; i++) {
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500987 message[i] = i & 0xFF;
988 }
Yanray Wangf7b62352022-10-26 11:51:53 +0800989 TEST_ASSERT(0 == mbedtls_test_mock_socket_connect(&client, &server,
990 MSGLEN));
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500991
992 /* Send the message to the server */
Yanray Wangf7b62352022-10-26 11:51:53 +0800993 TEST_ASSERT(mbedtls_test_mock_tcp_send_msg(&client_context, message,
994 MSGLEN) == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500995
996 /* Read from the server */
Yanray Wangbd296832022-10-26 18:28:11 +0800997 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&server_context, received,
998 MSGLEN)
Gilles Peskine449bd832023-01-11 14:50:10 +0100999 == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001000
Gilles Peskine449bd832023-01-11 14:50:10 +01001001 TEST_ASSERT(memcmp(message, received, MSGLEN) == 0);
1002 memset(received, 0, MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001003
1004 /* Send the message to the client */
Yanray Wangf7b62352022-10-26 11:51:53 +08001005 TEST_ASSERT(mbedtls_test_mock_tcp_send_msg(&server_context, message,
Yanray Wangbd296832022-10-26 18:28:11 +08001006 MSGLEN)
1007 == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001008
1009 /* Read from the client */
Yanray Wangbd296832022-10-26 18:28:11 +08001010 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&client_context, received,
1011 MSGLEN)
Gilles Peskine449bd832023-01-11 14:50:10 +01001012 == MSGLEN);
1013 TEST_ASSERT(memcmp(message, received, MSGLEN) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001014
Gilles Peskine449bd832023-01-11 14:50:10 +01001015exit:
Yanray Wangf7b62352022-10-26 11:51:53 +08001016 mbedtls_test_message_socket_close(&server_context);
1017 mbedtls_test_message_socket_close(&client_context);
Valerio Setti285dae82023-04-19 15:10:45 +02001018 USE_PSA_DONE();
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001019}
1020/* END_CASE */
1021
1022/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +01001023void ssl_message_mock_queue_overflow_underflow()
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001024{
1025 enum { MSGLEN = 10 };
1026 unsigned char message[MSGLEN], received[MSGLEN];
Yanray Wang9ef0dce2022-10-25 16:44:13 +08001027 mbedtls_test_mock_socket client, server;
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001028 unsigned i;
Yanray Wang9ef0dce2022-10-25 16:44:13 +08001029 mbedtls_test_ssl_message_queue server_queue, client_queue;
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001030 mbedtls_test_message_socket_context server_context, client_context;
Valerio Setti285dae82023-04-19 15:10:45 +02001031
Yanray Wangf7b62352022-10-26 11:51:53 +08001032 mbedtls_test_message_socket_init(&server_context);
1033 mbedtls_test_message_socket_init(&client_context);
Valerio Setti00a256f2023-04-27 17:22:27 +02001034 USE_PSA_INIT();
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001035
Yanray Wangbd296832022-10-26 18:28:11 +08001036 TEST_ASSERT(mbedtls_test_message_socket_setup(&server_queue,
1037 &client_queue, 2,
Yanray Wangf7b62352022-10-26 11:51:53 +08001038 &server,
1039 &server_context) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001040
Yanray Wangbd296832022-10-26 18:28:11 +08001041 TEST_ASSERT(mbedtls_test_message_socket_setup(&client_queue,
1042 &server_queue, 2,
Yanray Wangf7b62352022-10-26 11:51:53 +08001043 &client,
1044 &client_context) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001045
1046 /* Fill up the buffer with structured data so that unwanted changes
1047 * can be detected */
Gilles Peskine449bd832023-01-11 14:50:10 +01001048 for (i = 0; i < MSGLEN; i++) {
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001049 message[i] = i & 0xFF;
1050 }
Yanray Wangf7b62352022-10-26 11:51:53 +08001051 TEST_ASSERT(0 == mbedtls_test_mock_socket_connect(&client, &server,
1052 MSGLEN*2));
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001053
1054 /* Send three message to the server, last one with an error */
Yanray Wangf7b62352022-10-26 11:51:53 +08001055 TEST_ASSERT(mbedtls_test_mock_tcp_send_msg(&client_context, message,
Yanray Wangbd296832022-10-26 18:28:11 +08001056 MSGLEN - 1)
1057 == MSGLEN - 1);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001058
Yanray Wangf7b62352022-10-26 11:51:53 +08001059 TEST_ASSERT(mbedtls_test_mock_tcp_send_msg(&client_context, message,
Yanray Wangbd296832022-10-26 18:28:11 +08001060 MSGLEN)
1061 == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001062
Yanray Wangf7b62352022-10-26 11:51:53 +08001063 TEST_ASSERT(mbedtls_test_mock_tcp_send_msg(&client_context, message,
1064 MSGLEN)
Gilles Peskine449bd832023-01-11 14:50:10 +01001065 == MBEDTLS_ERR_SSL_WANT_WRITE);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001066
1067 /* Read three messages from the server, last one with an error */
Yanray Wangf7b62352022-10-26 11:51:53 +08001068 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&server_context, received,
Yanray Wangbd296832022-10-26 18:28:11 +08001069 MSGLEN - 1)
1070 == MSGLEN - 1);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001071
Yanray Wangbd296832022-10-26 18:28:11 +08001072 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&server_context, received,
1073 MSGLEN)
Gilles Peskine449bd832023-01-11 14:50:10 +01001074 == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001075
Gilles Peskine449bd832023-01-11 14:50:10 +01001076 TEST_ASSERT(memcmp(message, received, MSGLEN) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001077
Yanray Wangbd296832022-10-26 18:28:11 +08001078 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&server_context, received,
1079 MSGLEN)
Gilles Peskine449bd832023-01-11 14:50:10 +01001080 == MBEDTLS_ERR_SSL_WANT_READ);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001081
Gilles Peskine449bd832023-01-11 14:50:10 +01001082exit:
Yanray Wangf7b62352022-10-26 11:51:53 +08001083 mbedtls_test_message_socket_close(&server_context);
1084 mbedtls_test_message_socket_close(&client_context);
Valerio Setti285dae82023-04-19 15:10:45 +02001085 USE_PSA_DONE();
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001086}
1087/* END_CASE */
1088
1089/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +01001090void ssl_message_mock_socket_overflow()
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001091{
1092 enum { MSGLEN = 10 };
1093 unsigned char message[MSGLEN], received[MSGLEN];
Yanray Wang9ef0dce2022-10-25 16:44:13 +08001094 mbedtls_test_mock_socket client, server;
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001095 unsigned i;
Yanray Wang9ef0dce2022-10-25 16:44:13 +08001096 mbedtls_test_ssl_message_queue server_queue, client_queue;
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001097 mbedtls_test_message_socket_context server_context, client_context;
Valerio Setti285dae82023-04-19 15:10:45 +02001098
Yanray Wangf7b62352022-10-26 11:51:53 +08001099 mbedtls_test_message_socket_init(&server_context);
1100 mbedtls_test_message_socket_init(&client_context);
Valerio Setti00a256f2023-04-27 17:22:27 +02001101 USE_PSA_INIT();
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001102
Yanray Wangbd296832022-10-26 18:28:11 +08001103 TEST_ASSERT(mbedtls_test_message_socket_setup(&server_queue,
1104 &client_queue, 2,
Yanray Wangf7b62352022-10-26 11:51:53 +08001105 &server,
1106 &server_context) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001107
Yanray Wangbd296832022-10-26 18:28:11 +08001108 TEST_ASSERT(mbedtls_test_message_socket_setup(&client_queue,
1109 &server_queue, 2,
Yanray Wangf7b62352022-10-26 11:51:53 +08001110 &client,
1111 &client_context) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001112
1113 /* Fill up the buffer with structured data so that unwanted changes
1114 * can be detected */
Gilles Peskine449bd832023-01-11 14:50:10 +01001115 for (i = 0; i < MSGLEN; i++) {
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001116 message[i] = i & 0xFF;
1117 }
Yanray Wangf7b62352022-10-26 11:51:53 +08001118 TEST_ASSERT(0 == mbedtls_test_mock_socket_connect(&client, &server,
1119 MSGLEN));
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001120
1121 /* Send two message to the server, second one with an error */
Yanray Wangf7b62352022-10-26 11:51:53 +08001122 TEST_ASSERT(mbedtls_test_mock_tcp_send_msg(&client_context, message,
Yanray Wangbd296832022-10-26 18:28:11 +08001123 MSGLEN)
1124 == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001125
Yanray Wangf7b62352022-10-26 11:51:53 +08001126 TEST_ASSERT(mbedtls_test_mock_tcp_send_msg(&client_context, message,
1127 MSGLEN)
Gilles Peskine449bd832023-01-11 14:50:10 +01001128 == MBEDTLS_TEST_ERROR_SEND_FAILED);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001129
1130 /* Read the only message from the server */
Yanray Wangbd296832022-10-26 18:28:11 +08001131 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&server_context, received,
1132 MSGLEN)
Gilles Peskine449bd832023-01-11 14:50:10 +01001133 == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001134
Gilles Peskine449bd832023-01-11 14:50:10 +01001135 TEST_ASSERT(memcmp(message, received, MSGLEN) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001136
Gilles Peskine449bd832023-01-11 14:50:10 +01001137exit:
Yanray Wangf7b62352022-10-26 11:51:53 +08001138 mbedtls_test_message_socket_close(&server_context);
1139 mbedtls_test_message_socket_close(&client_context);
Valerio Setti285dae82023-04-19 15:10:45 +02001140 USE_PSA_DONE();
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001141}
1142/* END_CASE */
1143
1144/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +01001145void ssl_message_mock_truncated()
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001146{
1147 enum { MSGLEN = 10 };
1148 unsigned char message[MSGLEN], received[MSGLEN];
Yanray Wang9ef0dce2022-10-25 16:44:13 +08001149 mbedtls_test_mock_socket client, server;
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001150 unsigned i;
Yanray Wang9ef0dce2022-10-25 16:44:13 +08001151 mbedtls_test_ssl_message_queue server_queue, client_queue;
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001152 mbedtls_test_message_socket_context server_context, client_context;
Valerio Setti285dae82023-04-19 15:10:45 +02001153
Yanray Wangf7b62352022-10-26 11:51:53 +08001154 mbedtls_test_message_socket_init(&server_context);
1155 mbedtls_test_message_socket_init(&client_context);
Valerio Setti00a256f2023-04-27 17:22:27 +02001156 USE_PSA_INIT();
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001157
Yanray Wangbd296832022-10-26 18:28:11 +08001158 TEST_ASSERT(mbedtls_test_message_socket_setup(&server_queue,
1159 &client_queue, 2,
Yanray Wangf7b62352022-10-26 11:51:53 +08001160 &server,
1161 &server_context) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001162
Yanray Wangbd296832022-10-26 18:28:11 +08001163 TEST_ASSERT(mbedtls_test_message_socket_setup(&client_queue,
1164 &server_queue, 2,
Yanray Wangf7b62352022-10-26 11:51:53 +08001165 &client,
1166 &client_context) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001167
Gilles Peskine449bd832023-01-11 14:50:10 +01001168 memset(received, 0, MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001169 /* Fill up the buffer with structured data so that unwanted changes
1170 * can be detected */
Gilles Peskine449bd832023-01-11 14:50:10 +01001171 for (i = 0; i < MSGLEN; i++) {
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001172 message[i] = i & 0xFF;
1173 }
Yanray Wangf7b62352022-10-26 11:51:53 +08001174 TEST_ASSERT(0 == mbedtls_test_mock_socket_connect(&client, &server,
1175 2 * MSGLEN));
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001176
1177 /* Send two messages to the server, the second one small enough to fit in the
1178 * receiver's buffer. */
Yanray Wangf7b62352022-10-26 11:51:53 +08001179 TEST_ASSERT(mbedtls_test_mock_tcp_send_msg(&client_context, message,
Yanray Wangbd296832022-10-26 18:28:11 +08001180 MSGLEN)
1181 == MSGLEN);
Yanray Wangf7b62352022-10-26 11:51:53 +08001182 TEST_ASSERT(mbedtls_test_mock_tcp_send_msg(&client_context, message,
Yanray Wangbd296832022-10-26 18:28:11 +08001183 MSGLEN / 2)
1184 == MSGLEN / 2);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001185 /* Read a truncated message from the server */
Yanray Wangbd296832022-10-26 18:28:11 +08001186 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&server_context, received,
1187 MSGLEN/2)
Gilles Peskine449bd832023-01-11 14:50:10 +01001188 == MSGLEN/2);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001189
1190 /* Test that the first half of the message is valid, and second one isn't */
Gilles Peskine449bd832023-01-11 14:50:10 +01001191 TEST_ASSERT(memcmp(message, received, MSGLEN/2) == 0);
1192 TEST_ASSERT(memcmp(message + MSGLEN/2, received + MSGLEN/2, MSGLEN/2)
1193 != 0);
1194 memset(received, 0, MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001195
1196 /* Read a full message from the server */
Yanray Wangbd296832022-10-26 18:28:11 +08001197 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&server_context, received,
1198 MSGLEN/2)
Gilles Peskine449bd832023-01-11 14:50:10 +01001199 == MSGLEN / 2);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001200
1201 /* Test that the first half of the message is valid */
Gilles Peskine449bd832023-01-11 14:50:10 +01001202 TEST_ASSERT(memcmp(message, received, MSGLEN/2) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001203
Gilles Peskine449bd832023-01-11 14:50:10 +01001204exit:
Yanray Wangf7b62352022-10-26 11:51:53 +08001205 mbedtls_test_message_socket_close(&server_context);
1206 mbedtls_test_message_socket_close(&client_context);
Valerio Setti285dae82023-04-19 15:10:45 +02001207 USE_PSA_DONE();
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001208}
1209/* END_CASE */
1210
1211/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +01001212void ssl_message_mock_socket_read_error()
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001213{
1214 enum { MSGLEN = 10 };
1215 unsigned char message[MSGLEN], received[MSGLEN];
Yanray Wang9ef0dce2022-10-25 16:44:13 +08001216 mbedtls_test_mock_socket client, server;
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001217 unsigned i;
Yanray Wang9ef0dce2022-10-25 16:44:13 +08001218 mbedtls_test_ssl_message_queue server_queue, client_queue;
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001219 mbedtls_test_message_socket_context server_context, client_context;
Valerio Setti285dae82023-04-19 15:10:45 +02001220
Yanray Wangf7b62352022-10-26 11:51:53 +08001221 mbedtls_test_message_socket_init(&server_context);
1222 mbedtls_test_message_socket_init(&client_context);
Valerio Setti00a256f2023-04-27 17:22:27 +02001223 USE_PSA_INIT();
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001224
Yanray Wangbd296832022-10-26 18:28:11 +08001225 TEST_ASSERT(mbedtls_test_message_socket_setup(&server_queue,
1226 &client_queue, 1,
Yanray Wangf7b62352022-10-26 11:51:53 +08001227 &server,
1228 &server_context) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001229
Yanray Wangbd296832022-10-26 18:28:11 +08001230 TEST_ASSERT(mbedtls_test_message_socket_setup(&client_queue,
1231 &server_queue, 1,
Yanray Wangf7b62352022-10-26 11:51:53 +08001232 &client,
1233 &client_context) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001234
1235 /* Fill up the buffer with structured data so that unwanted changes
1236 * can be detected */
Gilles Peskine449bd832023-01-11 14:50:10 +01001237 for (i = 0; i < MSGLEN; i++) {
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001238 message[i] = i & 0xFF;
1239 }
Yanray Wangf7b62352022-10-26 11:51:53 +08001240 TEST_ASSERT(0 == mbedtls_test_mock_socket_connect(&client, &server,
1241 MSGLEN));
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001242
Yanray Wangf7b62352022-10-26 11:51:53 +08001243 TEST_ASSERT(mbedtls_test_mock_tcp_send_msg(&client_context, message,
Yanray Wangbd296832022-10-26 18:28:11 +08001244 MSGLEN)
1245 == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001246
1247 /* Force a read error by disconnecting the socket by hand */
1248 server.status = 0;
Yanray Wangbd296832022-10-26 18:28:11 +08001249 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&server_context, received,
1250 MSGLEN)
Gilles Peskine449bd832023-01-11 14:50:10 +01001251 == MBEDTLS_TEST_ERROR_RECV_FAILED);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001252 /* Return to a valid state */
1253 server.status = MBEDTLS_MOCK_SOCKET_CONNECTED;
1254
Gilles Peskine449bd832023-01-11 14:50:10 +01001255 memset(received, 0, sizeof(received));
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001256
1257 /* Test that even though the server tried to read once disconnected, the
1258 * continuity is preserved */
Yanray Wangbd296832022-10-26 18:28:11 +08001259 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&server_context, received,
1260 MSGLEN)
Gilles Peskine449bd832023-01-11 14:50:10 +01001261 == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001262
Gilles Peskine449bd832023-01-11 14:50:10 +01001263 TEST_ASSERT(memcmp(message, received, MSGLEN) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001264
Gilles Peskine449bd832023-01-11 14:50:10 +01001265exit:
Yanray Wangf7b62352022-10-26 11:51:53 +08001266 mbedtls_test_message_socket_close(&server_context);
1267 mbedtls_test_message_socket_close(&client_context);
Valerio Setti285dae82023-04-19 15:10:45 +02001268 USE_PSA_DONE();
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001269}
1270/* END_CASE */
1271
1272/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +01001273void ssl_message_mock_interleaved_one_way()
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001274{
1275 enum { MSGLEN = 10 };
1276 unsigned char message[MSGLEN], received[MSGLEN];
Yanray Wang9ef0dce2022-10-25 16:44:13 +08001277 mbedtls_test_mock_socket client, server;
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001278 unsigned i;
Yanray Wang9ef0dce2022-10-25 16:44:13 +08001279 mbedtls_test_ssl_message_queue server_queue, client_queue;
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001280 mbedtls_test_message_socket_context server_context, client_context;
Valerio Setti285dae82023-04-19 15:10:45 +02001281
Yanray Wangf7b62352022-10-26 11:51:53 +08001282 mbedtls_test_message_socket_init(&server_context);
1283 mbedtls_test_message_socket_init(&client_context);
Valerio Setti00a256f2023-04-27 17:22:27 +02001284 USE_PSA_INIT();
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001285
Yanray Wangbd296832022-10-26 18:28:11 +08001286 TEST_ASSERT(mbedtls_test_message_socket_setup(&server_queue,
1287 &client_queue, 3,
Yanray Wangf7b62352022-10-26 11:51:53 +08001288 &server,
1289 &server_context) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001290
Yanray Wangbd296832022-10-26 18:28:11 +08001291 TEST_ASSERT(mbedtls_test_message_socket_setup(&client_queue,
1292 &server_queue, 3,
Yanray Wangf7b62352022-10-26 11:51:53 +08001293 &client,
1294 &client_context) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001295
1296 /* Fill up the buffer with structured data so that unwanted changes
1297 * can be detected */
Gilles Peskine449bd832023-01-11 14:50:10 +01001298 for (i = 0; i < MSGLEN; i++) {
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001299 message[i] = i & 0xFF;
1300 }
Yanray Wangf7b62352022-10-26 11:51:53 +08001301 TEST_ASSERT(0 == mbedtls_test_mock_socket_connect(&client, &server,
1302 MSGLEN*3));
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001303
1304 /* Interleaved test - [2 sends, 1 read] twice, and then two reads
1305 * (to wrap around the buffer) */
Gilles Peskine449bd832023-01-11 14:50:10 +01001306 for (i = 0; i < 2; i++) {
Yanray Wangf7b62352022-10-26 11:51:53 +08001307 TEST_ASSERT(mbedtls_test_mock_tcp_send_msg(&client_context, message,
1308 MSGLEN) == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001309
Yanray Wangf7b62352022-10-26 11:51:53 +08001310 TEST_ASSERT(mbedtls_test_mock_tcp_send_msg(&client_context, message,
1311 MSGLEN) == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001312
Yanray Wangf7b62352022-10-26 11:51:53 +08001313 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&server_context, received,
1314 MSGLEN) == MSGLEN);
Gilles Peskine449bd832023-01-11 14:50:10 +01001315 TEST_ASSERT(memcmp(message, received, MSGLEN) == 0);
1316 memset(received, 0, sizeof(received));
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001317 }
1318
Gilles Peskine449bd832023-01-11 14:50:10 +01001319 for (i = 0; i < 2; i++) {
Yanray Wangf7b62352022-10-26 11:51:53 +08001320 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&server_context, received,
1321 MSGLEN) == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001322
Gilles Peskine449bd832023-01-11 14:50:10 +01001323 TEST_ASSERT(memcmp(message, received, MSGLEN) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001324 }
Yanray Wangbd296832022-10-26 18:28:11 +08001325 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&server_context, received,
1326 MSGLEN)
Gilles Peskine449bd832023-01-11 14:50:10 +01001327 == MBEDTLS_ERR_SSL_WANT_READ);
1328exit:
Yanray Wangf7b62352022-10-26 11:51:53 +08001329 mbedtls_test_message_socket_close(&server_context);
1330 mbedtls_test_message_socket_close(&client_context);
Valerio Setti285dae82023-04-19 15:10:45 +02001331 USE_PSA_DONE();
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001332}
1333/* END_CASE */
1334
1335/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +01001336void ssl_message_mock_interleaved_two_ways()
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001337{
1338 enum { MSGLEN = 10 };
1339 unsigned char message[MSGLEN], received[MSGLEN];
Yanray Wang9ef0dce2022-10-25 16:44:13 +08001340 mbedtls_test_mock_socket client, server;
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001341 unsigned i;
Yanray Wang9ef0dce2022-10-25 16:44:13 +08001342 mbedtls_test_ssl_message_queue server_queue, client_queue;
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001343 mbedtls_test_message_socket_context server_context, client_context;
Valerio Setti285dae82023-04-19 15:10:45 +02001344
Yanray Wangf7b62352022-10-26 11:51:53 +08001345 mbedtls_test_message_socket_init(&server_context);
1346 mbedtls_test_message_socket_init(&client_context);
Valerio Setti00a256f2023-04-27 17:22:27 +02001347 USE_PSA_INIT();
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001348
Yanray Wangbd296832022-10-26 18:28:11 +08001349 TEST_ASSERT(mbedtls_test_message_socket_setup(&server_queue,
1350 &client_queue, 3,
Yanray Wangf7b62352022-10-26 11:51:53 +08001351 &server,
1352 &server_context) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001353
Yanray Wangbd296832022-10-26 18:28:11 +08001354 TEST_ASSERT(mbedtls_test_message_socket_setup(&client_queue,
1355 &server_queue, 3,
Yanray Wangf7b62352022-10-26 11:51:53 +08001356 &client,
1357 &client_context) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001358
1359 /* Fill up the buffer with structured data so that unwanted changes
1360 * can be detected */
Gilles Peskine449bd832023-01-11 14:50:10 +01001361 for (i = 0; i < MSGLEN; i++) {
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001362 message[i] = i & 0xFF;
1363 }
Yanray Wangf7b62352022-10-26 11:51:53 +08001364 TEST_ASSERT(0 == mbedtls_test_mock_socket_connect(&client, &server,
1365 MSGLEN*3));
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001366
1367 /* Interleaved test - [2 sends, 1 read] twice, both ways, and then two reads
1368 * (to wrap around the buffer) both ways. */
Gilles Peskine449bd832023-01-11 14:50:10 +01001369 for (i = 0; i < 2; i++) {
Yanray Wangf7b62352022-10-26 11:51:53 +08001370 TEST_ASSERT(mbedtls_test_mock_tcp_send_msg(&client_context, message,
1371 MSGLEN) == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001372
Yanray Wangf7b62352022-10-26 11:51:53 +08001373 TEST_ASSERT(mbedtls_test_mock_tcp_send_msg(&client_context, message,
1374 MSGLEN) == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001375
Yanray Wangf7b62352022-10-26 11:51:53 +08001376 TEST_ASSERT(mbedtls_test_mock_tcp_send_msg(&server_context, message,
1377 MSGLEN) == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001378
Yanray Wangf7b62352022-10-26 11:51:53 +08001379 TEST_ASSERT(mbedtls_test_mock_tcp_send_msg(&server_context, message,
1380 MSGLEN) == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001381
Yanray Wangf7b62352022-10-26 11:51:53 +08001382 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&server_context, received,
1383 MSGLEN) == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001384
Gilles Peskine449bd832023-01-11 14:50:10 +01001385 TEST_ASSERT(memcmp(message, received, MSGLEN) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001386
Gilles Peskine449bd832023-01-11 14:50:10 +01001387 memset(received, 0, sizeof(received));
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001388
Yanray Wangf7b62352022-10-26 11:51:53 +08001389 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&client_context, received,
1390 MSGLEN) == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001391
Gilles Peskine449bd832023-01-11 14:50:10 +01001392 TEST_ASSERT(memcmp(message, received, MSGLEN) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001393
Gilles Peskine449bd832023-01-11 14:50:10 +01001394 memset(received, 0, sizeof(received));
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001395 }
1396
Gilles Peskine449bd832023-01-11 14:50:10 +01001397 for (i = 0; i < 2; i++) {
Yanray Wangf7b62352022-10-26 11:51:53 +08001398 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&server_context, received,
1399 MSGLEN) == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001400
Gilles Peskine449bd832023-01-11 14:50:10 +01001401 TEST_ASSERT(memcmp(message, received, MSGLEN) == 0);
1402 memset(received, 0, sizeof(received));
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001403
Yanray Wangf7b62352022-10-26 11:51:53 +08001404 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&client_context, received,
1405 MSGLEN) == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001406
Gilles Peskine449bd832023-01-11 14:50:10 +01001407 TEST_ASSERT(memcmp(message, received, MSGLEN) == 0);
1408 memset(received, 0, sizeof(received));
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001409 }
1410
Yanray Wangbd296832022-10-26 18:28:11 +08001411 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&server_context, received,
1412 MSGLEN)
Gilles Peskine449bd832023-01-11 14:50:10 +01001413 == MBEDTLS_ERR_SSL_WANT_READ);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001414
Yanray Wangbd296832022-10-26 18:28:11 +08001415 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&client_context, received,
1416 MSGLEN)
Gilles Peskine449bd832023-01-11 14:50:10 +01001417 == MBEDTLS_ERR_SSL_WANT_READ);
1418exit:
Yanray Wangf7b62352022-10-26 11:51:53 +08001419 mbedtls_test_message_socket_close(&server_context);
1420 mbedtls_test_message_socket_close(&client_context);
Valerio Setti285dae82023-04-19 15:10:45 +02001421 USE_PSA_DONE();
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001422}
1423/* END_CASE */
1424
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001425/* BEGIN_CASE depends_on:MBEDTLS_SSL_DTLS_ANTI_REPLAY */
Gilles Peskine449bd832023-01-11 14:50:10 +01001426void ssl_dtls_replay(data_t *prevs, data_t *new, int ret)
Manuel Pégourié-Gonnard4956fd72014-09-24 11:13:44 +02001427{
Azim Khand30ca132017-06-09 04:32:58 +01001428 uint32_t len = 0;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001429 mbedtls_ssl_context ssl;
Manuel Pégourié-Gonnarddef0bbe2015-05-04 14:56:36 +02001430 mbedtls_ssl_config conf;
Manuel Pégourié-Gonnard4956fd72014-09-24 11:13:44 +02001431
Gilles Peskine449bd832023-01-11 14:50:10 +01001432 mbedtls_ssl_init(&ssl);
1433 mbedtls_ssl_config_init(&conf);
valerio32f2ac92023-04-20 11:59:52 +02001434 MD_OR_USE_PSA_INIT();
Manuel Pégourié-Gonnard41d479e2015-04-29 00:48:22 +02001435
Gilles Peskine449bd832023-01-11 14:50:10 +01001436 TEST_ASSERT(mbedtls_ssl_config_defaults(&conf,
1437 MBEDTLS_SSL_IS_CLIENT,
1438 MBEDTLS_SSL_TRANSPORT_DATAGRAM,
1439 MBEDTLS_SSL_PRESET_DEFAULT) == 0);
Ronald Cronaab4a542024-02-23 18:51:11 +01001440
Gilles Peskine449bd832023-01-11 14:50:10 +01001441 TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
Manuel Pégourié-Gonnard4956fd72014-09-24 11:13:44 +02001442
1443 /* Read previous record numbers */
Gilles Peskine449bd832023-01-11 14:50:10 +01001444 for (len = 0; len < prevs->len; len += 6) {
1445 memcpy(ssl.in_ctr + 2, prevs->x + len, 6);
1446 mbedtls_ssl_dtls_replay_update(&ssl);
Manuel Pégourié-Gonnard4956fd72014-09-24 11:13:44 +02001447 }
1448
1449 /* Check new number */
Gilles Peskine449bd832023-01-11 14:50:10 +01001450 memcpy(ssl.in_ctr + 2, new->x, 6);
1451 TEST_ASSERT(mbedtls_ssl_dtls_replay_check(&ssl) == ret);
Manuel Pégourié-Gonnard4956fd72014-09-24 11:13:44 +02001452
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01001453exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01001454 mbedtls_ssl_free(&ssl);
1455 mbedtls_ssl_config_free(&conf);
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01001456 MD_OR_USE_PSA_DONE();
Manuel Pégourié-Gonnard4956fd72014-09-24 11:13:44 +02001457}
1458/* END_CASE */
Hanno Beckerb25c0c72017-05-05 11:24:30 +01001459
Ronald Crone68ab4f2022-10-05 12:46:29 +02001460/* BEGIN_CASE depends_on:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED */
Pengyu Lv9d87a382023-07-11 10:15:16 +08001461void ssl_set_hostname_twice(char *input_hostname0, char *input_hostname1)
Hanno Beckerb25c0c72017-05-05 11:24:30 +01001462{
Pengyu Lv9d87a382023-07-11 10:15:16 +08001463 const char *output_hostname;
Hanno Beckerb25c0c72017-05-05 11:24:30 +01001464 mbedtls_ssl_context ssl;
Valerio Setti285dae82023-04-19 15:10:45 +02001465
Gilles Peskine449bd832023-01-11 14:50:10 +01001466 mbedtls_ssl_init(&ssl);
valerio32f2ac92023-04-20 11:59:52 +02001467 USE_PSA_INIT();
Hanno Beckerb25c0c72017-05-05 11:24:30 +01001468
Pengyu Lv9d87a382023-07-11 10:15:16 +08001469 TEST_ASSERT(mbedtls_ssl_set_hostname(&ssl, input_hostname0) == 0);
1470 output_hostname = mbedtls_ssl_get_hostname(&ssl);
1471 TEST_ASSERT(strcmp(input_hostname0, output_hostname) == 0);
Pengyu Lv30e08702023-07-10 10:53:11 +08001472
Pengyu Lv9d87a382023-07-11 10:15:16 +08001473 TEST_ASSERT(mbedtls_ssl_set_hostname(&ssl, input_hostname1) == 0);
1474 output_hostname = mbedtls_ssl_get_hostname(&ssl);
1475 TEST_ASSERT(strcmp(input_hostname1, output_hostname) == 0);
Hanno Beckerb25c0c72017-05-05 11:24:30 +01001476
valerio32f2ac92023-04-20 11:59:52 +02001477exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01001478 mbedtls_ssl_free(&ssl);
Valerio Setti285dae82023-04-19 15:10:45 +02001479 USE_PSA_DONE();
Hanno Beckerb25c0c72017-05-05 11:24:30 +01001480}
Darryl Green11999bb2018-03-13 15:22:58 +00001481/* END_CASE */
Hanno Beckera18d1322018-01-03 14:27:32 +00001482
1483/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +01001484void ssl_crypt_record(int cipher_type, int hash_id,
1485 int etm, int tag_mode, int ver,
1486 int cid0_len, int cid1_len)
Hanno Beckera18d1322018-01-03 14:27:32 +00001487{
1488 /*
1489 * Test several record encryptions and decryptions
1490 * with plenty of space before and after the data
1491 * within the record buffer.
1492 */
1493
1494 int ret;
1495 int num_records = 16;
1496 mbedtls_ssl_context ssl; /* ONLY for debugging */
1497
1498 mbedtls_ssl_transform t0, t1;
Hanno Becker81e16a32019-03-01 11:21:44 +00001499 unsigned char *buf = NULL;
Hanno Beckera18d1322018-01-03 14:27:32 +00001500 size_t const buflen = 512;
1501 mbedtls_record rec, rec_backup;
1502
Gilles Peskine449bd832023-01-11 14:50:10 +01001503 mbedtls_ssl_init(&ssl);
1504 mbedtls_ssl_transform_init(&t0);
1505 mbedtls_ssl_transform_init(&t1);
valerio32f2ac92023-04-20 11:59:52 +02001506 MD_OR_USE_PSA_INIT();
1507
Yanray Wangf7b62352022-10-26 11:51:53 +08001508 ret = mbedtls_test_ssl_build_transforms(&t0, &t1, cipher_type, hash_id,
1509 etm, tag_mode, ver,
1510 (size_t) cid0_len,
1511 (size_t) cid1_len);
Przemyslaw Stekiel93cf4ee2022-01-19 16:18:53 +01001512
Gilles Peskine449bd832023-01-11 14:50:10 +01001513 TEST_ASSERT(ret == 0);
Hanno Beckera18d1322018-01-03 14:27:32 +00001514
Gilles Peskined681ffd2023-10-17 17:31:50 +02001515 TEST_CALLOC(buf, buflen);
Hanno Beckera18d1322018-01-03 14:27:32 +00001516
Gilles Peskine449bd832023-01-11 14:50:10 +01001517 while (num_records-- > 0) {
Hanno Beckera18d1322018-01-03 14:27:32 +00001518 mbedtls_ssl_transform *t_dec, *t_enc;
1519 /* Take turns in who's sending and who's receiving. */
Gilles Peskine449bd832023-01-11 14:50:10 +01001520 if (num_records % 3 == 0) {
Hanno Beckera18d1322018-01-03 14:27:32 +00001521 t_dec = &t0;
1522 t_enc = &t1;
Gilles Peskine449bd832023-01-11 14:50:10 +01001523 } else {
Hanno Beckera18d1322018-01-03 14:27:32 +00001524 t_dec = &t1;
1525 t_enc = &t0;
1526 }
1527
1528 /*
1529 * The record header affects the transformation in two ways:
1530 * 1) It determines the AEAD additional data
1531 * 2) The record counter sometimes determines the IV.
1532 *
1533 * Apart from that, the fields don't have influence.
1534 * In particular, it is currently not the responsibility
1535 * of ssl_encrypt/decrypt_buf to check if the transform
1536 * version matches the record version, or that the
1537 * type is sensible.
1538 */
1539
Gilles Peskine449bd832023-01-11 14:50:10 +01001540 memset(rec.ctr, num_records, sizeof(rec.ctr));
Hanno Beckera18d1322018-01-03 14:27:32 +00001541 rec.type = 42;
1542 rec.ver[0] = num_records;
1543 rec.ver[1] = num_records;
Hanno Beckera0e20d02019-05-15 14:03:01 +01001544#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
Hanno Beckerd856c822019-04-29 17:30:59 +01001545 rec.cid_len = 0;
Hanno Beckera0e20d02019-05-15 14:03:01 +01001546#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
Hanno Beckera18d1322018-01-03 14:27:32 +00001547
1548 rec.buf = buf;
1549 rec.buf_len = buflen;
1550 rec.data_offset = 16;
1551 /* Make sure to vary the length to exercise different
1552 * paddings. */
1553 rec.data_len = 1 + num_records;
1554
Gilles Peskine449bd832023-01-11 14:50:10 +01001555 memset(rec.buf + rec.data_offset, 42, rec.data_len);
Hanno Beckera18d1322018-01-03 14:27:32 +00001556
1557 /* Make a copy for later comparison */
1558 rec_backup = rec;
1559
1560 /* Encrypt record */
Ben Taylor602b2962025-03-07 15:52:50 +00001561 ret = mbedtls_ssl_encrypt_buf(&ssl, t_enc, &rec);
Gilles Peskine449bd832023-01-11 14:50:10 +01001562 TEST_ASSERT(ret == 0 || ret == MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL);
1563 if (ret != 0) {
Hanno Beckera18d1322018-01-03 14:27:32 +00001564 continue;
1565 }
1566
Hanno Beckerb2713ab2020-05-07 14:54:22 +01001567#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
Gilles Peskine449bd832023-01-11 14:50:10 +01001568 if (rec.cid_len != 0) {
Hanno Beckerb2713ab2020-05-07 14:54:22 +01001569 /* DTLS 1.2 + CID hides the real content type and
1570 * uses a special CID content type in the protected
1571 * record. Double-check this. */
Gilles Peskine449bd832023-01-11 14:50:10 +01001572 TEST_ASSERT(rec.type == MBEDTLS_SSL_MSG_CID);
Hanno Beckerb2713ab2020-05-07 14:54:22 +01001573 }
1574#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1575
Ronald Cron6f135e12021-12-08 16:57:54 +01001576#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
Gilles Peskine449bd832023-01-11 14:50:10 +01001577 if (t_enc->tls_version == MBEDTLS_SSL_VERSION_TLS1_3) {
Hanno Beckerb2713ab2020-05-07 14:54:22 +01001578 /* TLS 1.3 hides the real content type and
1579 * always uses Application Data as the content type
1580 * for protected records. Double-check this. */
Gilles Peskine449bd832023-01-11 14:50:10 +01001581 TEST_ASSERT(rec.type == MBEDTLS_SSL_MSG_APPLICATION_DATA);
Hanno Beckerb2713ab2020-05-07 14:54:22 +01001582 }
Ronald Cron6f135e12021-12-08 16:57:54 +01001583#endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
Hanno Beckerb2713ab2020-05-07 14:54:22 +01001584
Hanno Beckera18d1322018-01-03 14:27:32 +00001585 /* Decrypt record with t_dec */
Gilles Peskine449bd832023-01-11 14:50:10 +01001586 ret = mbedtls_ssl_decrypt_buf(&ssl, t_dec, &rec);
1587 TEST_ASSERT(ret == 0);
Hanno Beckera18d1322018-01-03 14:27:32 +00001588
1589 /* Compare results */
Gilles Peskine449bd832023-01-11 14:50:10 +01001590 TEST_ASSERT(rec.type == rec_backup.type);
1591 TEST_ASSERT(memcmp(rec.ctr, rec_backup.ctr, 8) == 0);
1592 TEST_ASSERT(rec.ver[0] == rec_backup.ver[0]);
1593 TEST_ASSERT(rec.ver[1] == rec_backup.ver[1]);
1594 TEST_ASSERT(rec.data_len == rec_backup.data_len);
1595 TEST_ASSERT(rec.data_offset == rec_backup.data_offset);
1596 TEST_ASSERT(memcmp(rec.buf + rec.data_offset,
1597 rec_backup.buf + rec_backup.data_offset,
1598 rec.data_len) == 0);
Hanno Beckera18d1322018-01-03 14:27:32 +00001599 }
1600
Hanno Becker81e16a32019-03-01 11:21:44 +00001601exit:
1602
Hanno Beckera18d1322018-01-03 14:27:32 +00001603 /* Cleanup */
Gilles Peskine449bd832023-01-11 14:50:10 +01001604 mbedtls_ssl_free(&ssl);
1605 mbedtls_ssl_transform_free(&t0);
1606 mbedtls_ssl_transform_free(&t1);
Hanno Beckera18d1322018-01-03 14:27:32 +00001607
Gilles Peskine449bd832023-01-11 14:50:10 +01001608 mbedtls_free(buf);
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01001609 MD_OR_USE_PSA_DONE();
Hanno Beckera18d1322018-01-03 14:27:32 +00001610}
1611/* END_CASE */
Hanno Beckerb3268da2018-01-05 15:20:24 +00001612
1613/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +01001614void ssl_crypt_record_small(int cipher_type, int hash_id,
1615 int etm, int tag_mode, int ver,
1616 int cid0_len, int cid1_len)
Hanno Beckerb3268da2018-01-05 15:20:24 +00001617{
1618 /*
1619 * Test pairs of encryption and decryption with an increasing
1620 * amount of space in the record buffer - in more detail:
1621 * 1) Try to encrypt with 0, 1, 2, ... bytes available
1622 * in front of the plaintext, and expect the encryption
1623 * to succeed starting from some offset. Always keep
1624 * enough space in the end of the buffer.
1625 * 2) Try to encrypt with 0, 1, 2, ... bytes available
1626 * at the end of the plaintext, and expect the encryption
1627 * to succeed starting from some offset. Always keep
1628 * enough space at the beginning of the buffer.
1629 * 3) Try to encrypt with 0, 1, 2, ... bytes available
1630 * both at the front and end of the plaintext,
1631 * and expect the encryption to succeed starting from
1632 * some offset.
1633 *
1634 * If encryption succeeds, check that decryption succeeds
1635 * and yields the original record.
1636 */
1637
1638 mbedtls_ssl_context ssl; /* ONLY for debugging */
1639
1640 mbedtls_ssl_transform t0, t1;
Hanno Becker81e16a32019-03-01 11:21:44 +00001641 unsigned char *buf = NULL;
Hanno Beckerd856c822019-04-29 17:30:59 +01001642 size_t const buflen = 256;
Hanno Beckerb3268da2018-01-05 15:20:24 +00001643 mbedtls_record rec, rec_backup;
1644
1645 int ret;
Hanno Beckerd856c822019-04-29 17:30:59 +01001646 int mode; /* Mode 1, 2 or 3 as explained above */
1647 size_t offset; /* Available space at beginning/end/both */
1648 size_t threshold = 96; /* Maximum offset to test against */
Hanno Beckerb3268da2018-01-05 15:20:24 +00001649
Hanno Beckerd856c822019-04-29 17:30:59 +01001650 size_t default_pre_padding = 64; /* Pre-padding to use in mode 2 */
1651 size_t default_post_padding = 128; /* Post-padding to use in mode 1 */
Hanno Beckerb3268da2018-01-05 15:20:24 +00001652
1653 int seen_success; /* Indicates if in the current mode we've
1654 * already seen a successful test. */
1655
Gilles Peskine449bd832023-01-11 14:50:10 +01001656 mbedtls_ssl_init(&ssl);
1657 mbedtls_ssl_transform_init(&t0);
1658 mbedtls_ssl_transform_init(&t1);
valerio32f2ac92023-04-20 11:59:52 +02001659 MD_OR_USE_PSA_INIT();
1660
Yanray Wangf7b62352022-10-26 11:51:53 +08001661 ret = mbedtls_test_ssl_build_transforms(&t0, &t1, cipher_type, hash_id,
1662 etm, tag_mode, ver,
1663 (size_t) cid0_len,
1664 (size_t) cid1_len);
Przemyslaw Stekiel93cf4ee2022-01-19 16:18:53 +01001665
Gilles Peskine449bd832023-01-11 14:50:10 +01001666 TEST_ASSERT(ret == 0);
Hanno Beckerb3268da2018-01-05 15:20:24 +00001667
Gilles Peskined681ffd2023-10-17 17:31:50 +02001668 TEST_CALLOC(buf, buflen);
Hanno Beckerb3268da2018-01-05 15:20:24 +00001669
Gilles Peskine449bd832023-01-11 14:50:10 +01001670 for (mode = 1; mode <= 3; mode++) {
Hanno Beckerb3268da2018-01-05 15:20:24 +00001671 seen_success = 0;
Gilles Peskine449bd832023-01-11 14:50:10 +01001672 for (offset = 0; offset <= threshold; offset++) {
Hanno Beckerb3268da2018-01-05 15:20:24 +00001673 mbedtls_ssl_transform *t_dec, *t_enc;
Hanno Becker6c87b3f2019-04-29 17:24:44 +01001674 t_dec = &t0;
1675 t_enc = &t1;
Hanno Beckerb3268da2018-01-05 15:20:24 +00001676
Gilles Peskine449bd832023-01-11 14:50:10 +01001677 memset(rec.ctr, offset, sizeof(rec.ctr));
Hanno Beckerb3268da2018-01-05 15:20:24 +00001678 rec.type = 42;
1679 rec.ver[0] = offset;
1680 rec.ver[1] = offset;
1681 rec.buf = buf;
1682 rec.buf_len = buflen;
Hanno Beckera0e20d02019-05-15 14:03:01 +01001683#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
Hanno Beckerd856c822019-04-29 17:30:59 +01001684 rec.cid_len = 0;
Hanno Beckera0e20d02019-05-15 14:03:01 +01001685#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
Hanno Beckerb3268da2018-01-05 15:20:24 +00001686
Gilles Peskine449bd832023-01-11 14:50:10 +01001687 switch (mode) {
Hanno Beckerb3268da2018-01-05 15:20:24 +00001688 case 1: /* Space in the beginning */
1689 rec.data_offset = offset;
1690 rec.data_len = buflen - offset - default_post_padding;
1691 break;
1692
1693 case 2: /* Space in the end */
1694 rec.data_offset = default_pre_padding;
1695 rec.data_len = buflen - default_pre_padding - offset;
1696 break;
1697
1698 case 3: /* Space in the beginning and end */
1699 rec.data_offset = offset;
1700 rec.data_len = buflen - 2 * offset;
1701 break;
1702
1703 default:
Gilles Peskine449bd832023-01-11 14:50:10 +01001704 TEST_ASSERT(0);
Hanno Beckerb3268da2018-01-05 15:20:24 +00001705 break;
1706 }
1707
Gilles Peskine449bd832023-01-11 14:50:10 +01001708 memset(rec.buf + rec.data_offset, 42, rec.data_len);
Hanno Beckerb3268da2018-01-05 15:20:24 +00001709
1710 /* Make a copy for later comparison */
1711 rec_backup = rec;
1712
1713 /* Encrypt record */
Ben Taylor602b2962025-03-07 15:52:50 +00001714 ret = mbedtls_ssl_encrypt_buf(&ssl, t_enc, &rec);
Hanno Beckerb3268da2018-01-05 15:20:24 +00001715
Gilles Peskine5fd88b72023-07-20 22:18:23 +02001716 if (ret == MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL) {
1717 /* It's ok if the output buffer is too small. We do insist
1718 * on at least one mode succeeding; this is tracked by
1719 * seen_success. */
Hanno Beckerb3268da2018-01-05 15:20:24 +00001720 continue;
Gilles Peskine449bd832023-01-11 14:50:10 +01001721 }
Hanno Beckerb3268da2018-01-05 15:20:24 +00001722
Gilles Peskine5fd88b72023-07-20 22:18:23 +02001723 TEST_EQUAL(ret, 0);
1724 seen_success = 1;
1725
Hanno Beckerb2713ab2020-05-07 14:54:22 +01001726#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
Gilles Peskine449bd832023-01-11 14:50:10 +01001727 if (rec.cid_len != 0) {
Hanno Beckerb2713ab2020-05-07 14:54:22 +01001728 /* DTLS 1.2 + CID hides the real content type and
1729 * uses a special CID content type in the protected
1730 * record. Double-check this. */
Gilles Peskine449bd832023-01-11 14:50:10 +01001731 TEST_ASSERT(rec.type == MBEDTLS_SSL_MSG_CID);
Hanno Beckerb2713ab2020-05-07 14:54:22 +01001732 }
1733#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1734
Ronald Cron6f135e12021-12-08 16:57:54 +01001735#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
Gilles Peskine449bd832023-01-11 14:50:10 +01001736 if (t_enc->tls_version == MBEDTLS_SSL_VERSION_TLS1_3) {
Hanno Beckerb2713ab2020-05-07 14:54:22 +01001737 /* TLS 1.3 hides the real content type and
1738 * always uses Application Data as the content type
1739 * for protected records. Double-check this. */
Gilles Peskine449bd832023-01-11 14:50:10 +01001740 TEST_ASSERT(rec.type == MBEDTLS_SSL_MSG_APPLICATION_DATA);
Hanno Beckerb2713ab2020-05-07 14:54:22 +01001741 }
Ronald Cron6f135e12021-12-08 16:57:54 +01001742#endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
Hanno Beckerb2713ab2020-05-07 14:54:22 +01001743
Hanno Beckerb3268da2018-01-05 15:20:24 +00001744 /* Decrypt record with t_dec */
Gilles Peskine449bd832023-01-11 14:50:10 +01001745 TEST_ASSERT(mbedtls_ssl_decrypt_buf(&ssl, t_dec, &rec) == 0);
Hanno Beckerb3268da2018-01-05 15:20:24 +00001746
1747 /* Compare results */
Gilles Peskine449bd832023-01-11 14:50:10 +01001748 TEST_ASSERT(rec.type == rec_backup.type);
1749 TEST_ASSERT(memcmp(rec.ctr, rec_backup.ctr, 8) == 0);
1750 TEST_ASSERT(rec.ver[0] == rec_backup.ver[0]);
1751 TEST_ASSERT(rec.ver[1] == rec_backup.ver[1]);
1752 TEST_ASSERT(rec.data_len == rec_backup.data_len);
1753 TEST_ASSERT(rec.data_offset == rec_backup.data_offset);
1754 TEST_ASSERT(memcmp(rec.buf + rec.data_offset,
1755 rec_backup.buf + rec_backup.data_offset,
1756 rec.data_len) == 0);
Hanno Beckerb3268da2018-01-05 15:20:24 +00001757 }
1758
Gilles Peskine449bd832023-01-11 14:50:10 +01001759 TEST_ASSERT(seen_success == 1);
Hanno Beckerb3268da2018-01-05 15:20:24 +00001760 }
1761
Hanno Becker81e16a32019-03-01 11:21:44 +00001762exit:
1763
Hanno Beckerb3268da2018-01-05 15:20:24 +00001764 /* Cleanup */
Gilles Peskine449bd832023-01-11 14:50:10 +01001765 mbedtls_ssl_free(&ssl);
1766 mbedtls_ssl_transform_free(&t0);
1767 mbedtls_ssl_transform_free(&t1);
Hanno Beckerb3268da2018-01-05 15:20:24 +00001768
Gilles Peskine449bd832023-01-11 14:50:10 +01001769 mbedtls_free(buf);
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01001770 MD_OR_USE_PSA_DONE();
Hanno Beckerb3268da2018-01-05 15:20:24 +00001771}
1772/* END_CASE */
Ron Eldor824ad7b2019-05-13 14:09:00 +03001773
Ronald Cron6f135e12021-12-08 16:57:54 +01001774/* BEGIN_CASE depends_on:MBEDTLS_SSL_PROTO_TLS1_3 */
Gilles Peskine449bd832023-01-11 14:50:10 +01001775void ssl_tls13_hkdf_expand_label(int hash_alg,
1776 data_t *secret,
1777 int label_idx,
1778 data_t *ctx,
1779 int desired_length,
1780 data_t *expected)
Hanno Becker39ff4922020-08-21 13:36:56 +01001781{
Gilles Peskine449bd832023-01-11 14:50:10 +01001782 unsigned char dst[100];
Hanno Becker39ff4922020-08-21 13:36:56 +01001783
Hanno Becker70d7fb02020-09-09 10:11:21 +01001784 unsigned char const *lbl = NULL;
1785 size_t lbl_len;
Gilles Peskine449bd832023-01-11 14:50:10 +01001786#define MBEDTLS_SSL_TLS1_3_LABEL(name, string) \
1787 if (label_idx == (int) tls13_label_ ## name) \
Xiaofei Baid25fab62021-12-02 06:36:27 +00001788 { \
Xiaofei Bai746f9482021-11-12 08:53:56 +00001789 lbl = mbedtls_ssl_tls13_labels.name; \
Gilles Peskine449bd832023-01-11 14:50:10 +01001790 lbl_len = sizeof(mbedtls_ssl_tls13_labels.name); \
Hanno Becker70d7fb02020-09-09 10:11:21 +01001791 }
Gilles Peskine449bd832023-01-11 14:50:10 +01001792 MBEDTLS_SSL_TLS1_3_LABEL_LIST
Hanno Becker70d7fb02020-09-09 10:11:21 +01001793#undef MBEDTLS_SSL_TLS1_3_LABEL
Gilles Peskine449bd832023-01-11 14:50:10 +01001794 TEST_ASSERT(lbl != NULL);
Hanno Becker39ff4922020-08-21 13:36:56 +01001795
1796 /* Check sanity of test parameters. */
Gilles Peskine449bd832023-01-11 14:50:10 +01001797 TEST_ASSERT((size_t) desired_length <= sizeof(dst));
1798 TEST_ASSERT((size_t) desired_length == expected->len);
Hanno Becker39ff4922020-08-21 13:36:56 +01001799
Gilles Peskine449bd832023-01-11 14:50:10 +01001800 PSA_INIT();
Gabor Mezei892c4aa2022-03-21 12:21:43 +01001801
Gilles Peskine449bd832023-01-11 14:50:10 +01001802 TEST_ASSERT(mbedtls_ssl_tls13_hkdf_expand_label(
1803 (psa_algorithm_t) hash_alg,
1804 secret->x, secret->len,
1805 lbl, lbl_len,
1806 ctx->x, ctx->len,
1807 dst, desired_length) == 0);
Hanno Becker39ff4922020-08-21 13:36:56 +01001808
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +01001809 TEST_MEMORY_COMPARE(dst, (size_t) desired_length,
Tom Cosgrove0540fe72023-07-27 14:17:27 +01001810 expected->x, (size_t) expected->len);
Gabor Mezei892c4aa2022-03-21 12:21:43 +01001811
valerio32f2ac92023-04-20 11:59:52 +02001812exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01001813 PSA_DONE();
Hanno Becker39ff4922020-08-21 13:36:56 +01001814}
1815/* END_CASE */
1816
Ronald Cron6f135e12021-12-08 16:57:54 +01001817/* BEGIN_CASE depends_on:MBEDTLS_SSL_PROTO_TLS1_3 */
Gilles Peskine449bd832023-01-11 14:50:10 +01001818void ssl_tls13_traffic_key_generation(int hash_alg,
1819 data_t *server_secret,
1820 data_t *client_secret,
1821 int desired_iv_len,
1822 int desired_key_len,
1823 data_t *expected_server_write_key,
1824 data_t *expected_server_write_iv,
1825 data_t *expected_client_write_key,
1826 data_t *expected_client_write_iv)
Hanno Becker19498f82020-08-21 13:37:08 +01001827{
1828 mbedtls_ssl_key_set keys;
1829
1830 /* Check sanity of test parameters. */
Gilles Peskine449bd832023-01-11 14:50:10 +01001831 TEST_ASSERT(client_secret->len == server_secret->len);
Yanray Wangd577a682022-10-27 11:47:54 +08001832 TEST_ASSERT(
1833 expected_client_write_iv->len == expected_server_write_iv->len &&
1834 expected_client_write_iv->len == (size_t) desired_iv_len);
1835 TEST_ASSERT(
1836 expected_client_write_key->len == expected_server_write_key->len &&
1837 expected_client_write_key->len == (size_t) desired_key_len);
Hanno Becker19498f82020-08-21 13:37:08 +01001838
Gilles Peskine449bd832023-01-11 14:50:10 +01001839 PSA_INIT();
Gabor Mezei892c4aa2022-03-21 12:21:43 +01001840
Gilles Peskine449bd832023-01-11 14:50:10 +01001841 TEST_ASSERT(mbedtls_ssl_tls13_make_traffic_keys(
1842 (psa_algorithm_t) hash_alg,
1843 client_secret->x,
1844 server_secret->x,
1845 client_secret->len /* == server_secret->len */,
1846 desired_key_len, desired_iv_len,
1847 &keys) == 0);
Hanno Becker19498f82020-08-21 13:37:08 +01001848
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +01001849 TEST_MEMORY_COMPARE(keys.client_write_key,
Tom Cosgrove0540fe72023-07-27 14:17:27 +01001850 keys.key_len,
1851 expected_client_write_key->x,
1852 (size_t) desired_key_len);
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +01001853 TEST_MEMORY_COMPARE(keys.server_write_key,
Tom Cosgrove0540fe72023-07-27 14:17:27 +01001854 keys.key_len,
1855 expected_server_write_key->x,
1856 (size_t) desired_key_len);
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +01001857 TEST_MEMORY_COMPARE(keys.client_write_iv,
Tom Cosgrove0540fe72023-07-27 14:17:27 +01001858 keys.iv_len,
1859 expected_client_write_iv->x,
1860 (size_t) desired_iv_len);
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +01001861 TEST_MEMORY_COMPARE(keys.server_write_iv,
Tom Cosgrove0540fe72023-07-27 14:17:27 +01001862 keys.iv_len,
1863 expected_server_write_iv->x,
1864 (size_t) desired_iv_len);
Gabor Mezei892c4aa2022-03-21 12:21:43 +01001865
valerio32f2ac92023-04-20 11:59:52 +02001866exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01001867 PSA_DONE();
Hanno Becker19498f82020-08-21 13:37:08 +01001868}
1869/* END_CASE */
1870
Ronald Cron6f135e12021-12-08 16:57:54 +01001871/* BEGIN_CASE depends_on:MBEDTLS_SSL_PROTO_TLS1_3 */
Gilles Peskine449bd832023-01-11 14:50:10 +01001872void ssl_tls13_derive_secret(int hash_alg,
1873 data_t *secret,
1874 int label_idx,
1875 data_t *ctx,
1876 int desired_length,
1877 int already_hashed,
1878 data_t *expected)
Hanno Beckere4849d12020-08-21 14:14:14 +01001879{
Gilles Peskine449bd832023-01-11 14:50:10 +01001880 unsigned char dst[100];
Hanno Beckere4849d12020-08-21 14:14:14 +01001881
Hanno Becker70d7fb02020-09-09 10:11:21 +01001882 unsigned char const *lbl = NULL;
1883 size_t lbl_len;
Michael Schusterbd89b792024-06-04 02:41:10 +02001884#define MBEDTLS_SSL_TLS1_3_LABEL(name, string) \
1885 if (label_idx == (int) tls13_label_ ## name) \
Xiaofei Baid25fab62021-12-02 06:36:27 +00001886 { \
Xiaofei Bai746f9482021-11-12 08:53:56 +00001887 lbl = mbedtls_ssl_tls13_labels.name; \
Michael Schusterbd89b792024-06-04 02:41:10 +02001888 lbl_len = sizeof(mbedtls_ssl_tls13_labels.name); \
Hanno Becker70d7fb02020-09-09 10:11:21 +01001889 }
Gilles Peskine449bd832023-01-11 14:50:10 +01001890 MBEDTLS_SSL_TLS1_3_LABEL_LIST
Hanno Becker70d7fb02020-09-09 10:11:21 +01001891#undef MBEDTLS_SSL_TLS1_3_LABEL
Gilles Peskine449bd832023-01-11 14:50:10 +01001892 TEST_ASSERT(lbl != NULL);
Hanno Becker70d7fb02020-09-09 10:11:21 +01001893
Hanno Beckere4849d12020-08-21 14:14:14 +01001894 /* Check sanity of test parameters. */
Gilles Peskine449bd832023-01-11 14:50:10 +01001895 TEST_ASSERT((size_t) desired_length <= sizeof(dst));
1896 TEST_ASSERT((size_t) desired_length == expected->len);
Hanno Beckere4849d12020-08-21 14:14:14 +01001897
Gilles Peskine449bd832023-01-11 14:50:10 +01001898 PSA_INIT();
Gabor Mezei892c4aa2022-03-21 12:21:43 +01001899
Gilles Peskine449bd832023-01-11 14:50:10 +01001900 TEST_ASSERT(mbedtls_ssl_tls13_derive_secret(
1901 (psa_algorithm_t) hash_alg,
1902 secret->x, secret->len,
1903 lbl, lbl_len,
1904 ctx->x, ctx->len,
1905 already_hashed,
1906 dst, desired_length) == 0);
Hanno Beckere4849d12020-08-21 14:14:14 +01001907
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +01001908 TEST_MEMORY_COMPARE(dst, desired_length,
Tom Cosgrove0540fe72023-07-27 14:17:27 +01001909 expected->x, desired_length);
Gabor Mezei892c4aa2022-03-21 12:21:43 +01001910
valerio32f2ac92023-04-20 11:59:52 +02001911exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01001912 PSA_DONE();
Hanno Beckere4849d12020-08-21 14:14:14 +01001913}
1914/* END_CASE */
1915
Ronald Cron6f135e12021-12-08 16:57:54 +01001916/* BEGIN_CASE depends_on:MBEDTLS_SSL_PROTO_TLS1_3 */
Gilles Peskine449bd832023-01-11 14:50:10 +01001917void ssl_tls13_derive_early_secrets(int hash_alg,
1918 data_t *secret,
1919 data_t *transcript,
1920 data_t *traffic_expected,
1921 data_t *exporter_expected)
Hanno Beckera4f40a02021-05-24 06:42:11 +01001922{
Xiaofei Bai746f9482021-11-12 08:53:56 +00001923 mbedtls_ssl_tls13_early_secrets secrets;
Hanno Beckera4f40a02021-05-24 06:42:11 +01001924
1925 /* Double-check that we've passed sane parameters. */
Gabor Mezei07732f72022-03-26 17:04:19 +01001926 psa_algorithm_t alg = (psa_algorithm_t) hash_alg;
Gilles Peskine449bd832023-01-11 14:50:10 +01001927 size_t const hash_len = PSA_HASH_LENGTH(alg);
Michael Schusterbd89b792024-06-04 02:41:10 +02001928 TEST_ASSERT(PSA_ALG_IS_HASH(alg) &&
Gilles Peskine449bd832023-01-11 14:50:10 +01001929 secret->len == hash_len &&
1930 transcript->len == hash_len &&
1931 traffic_expected->len == hash_len &&
1932 exporter_expected->len == hash_len);
Hanno Beckera4f40a02021-05-24 06:42:11 +01001933
Gilles Peskine449bd832023-01-11 14:50:10 +01001934 PSA_INIT();
Hanno Beckera4f40a02021-05-24 06:42:11 +01001935
Gilles Peskine449bd832023-01-11 14:50:10 +01001936 TEST_ASSERT(mbedtls_ssl_tls13_derive_early_secrets(
1937 alg, secret->x, transcript->x, transcript->len,
1938 &secrets) == 0);
Hanno Beckera4f40a02021-05-24 06:42:11 +01001939
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +01001940 TEST_MEMORY_COMPARE(secrets.client_early_traffic_secret, hash_len,
Tom Cosgrove0540fe72023-07-27 14:17:27 +01001941 traffic_expected->x, traffic_expected->len);
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +01001942 TEST_MEMORY_COMPARE(secrets.early_exporter_master_secret, hash_len,
Tom Cosgrove0540fe72023-07-27 14:17:27 +01001943 exporter_expected->x, exporter_expected->len);
Gabor Mezei892c4aa2022-03-21 12:21:43 +01001944
valerio32f2ac92023-04-20 11:59:52 +02001945exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01001946 PSA_DONE();
Hanno Beckera4f40a02021-05-24 06:42:11 +01001947}
1948/* END_CASE */
1949
Ronald Cron6f135e12021-12-08 16:57:54 +01001950/* BEGIN_CASE depends_on:MBEDTLS_SSL_PROTO_TLS1_3 */
Gilles Peskine449bd832023-01-11 14:50:10 +01001951void ssl_tls13_derive_handshake_secrets(int hash_alg,
1952 data_t *secret,
1953 data_t *transcript,
1954 data_t *client_expected,
1955 data_t *server_expected)
Hanno Beckera4f40a02021-05-24 06:42:11 +01001956{
Xiaofei Bai746f9482021-11-12 08:53:56 +00001957 mbedtls_ssl_tls13_handshake_secrets secrets;
Hanno Beckera4f40a02021-05-24 06:42:11 +01001958
1959 /* Double-check that we've passed sane parameters. */
Gabor Mezei07732f72022-03-26 17:04:19 +01001960 psa_algorithm_t alg = (psa_algorithm_t) hash_alg;
Gilles Peskine449bd832023-01-11 14:50:10 +01001961 size_t const hash_len = PSA_HASH_LENGTH(alg);
Michael Schusterbd89b792024-06-04 02:41:10 +02001962 TEST_ASSERT(PSA_ALG_IS_HASH(alg) &&
Gilles Peskine449bd832023-01-11 14:50:10 +01001963 secret->len == hash_len &&
1964 transcript->len == hash_len &&
1965 client_expected->len == hash_len &&
1966 server_expected->len == hash_len);
Hanno Beckera4f40a02021-05-24 06:42:11 +01001967
Gilles Peskine449bd832023-01-11 14:50:10 +01001968 PSA_INIT();
Hanno Beckera4f40a02021-05-24 06:42:11 +01001969
Gilles Peskine449bd832023-01-11 14:50:10 +01001970 TEST_ASSERT(mbedtls_ssl_tls13_derive_handshake_secrets(
1971 alg, secret->x, transcript->x, transcript->len,
1972 &secrets) == 0);
Hanno Beckera4f40a02021-05-24 06:42:11 +01001973
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +01001974 TEST_MEMORY_COMPARE(secrets.client_handshake_traffic_secret, hash_len,
Tom Cosgrove0540fe72023-07-27 14:17:27 +01001975 client_expected->x, client_expected->len);
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +01001976 TEST_MEMORY_COMPARE(secrets.server_handshake_traffic_secret, hash_len,
Tom Cosgrove0540fe72023-07-27 14:17:27 +01001977 server_expected->x, server_expected->len);
Gabor Mezei892c4aa2022-03-21 12:21:43 +01001978
valerio32f2ac92023-04-20 11:59:52 +02001979exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01001980 PSA_DONE();
Hanno Beckera4f40a02021-05-24 06:42:11 +01001981}
1982/* END_CASE */
1983
Ronald Cron6f135e12021-12-08 16:57:54 +01001984/* BEGIN_CASE depends_on:MBEDTLS_SSL_PROTO_TLS1_3 */
Gilles Peskine449bd832023-01-11 14:50:10 +01001985void ssl_tls13_derive_application_secrets(int hash_alg,
Xiaofei Bai746f9482021-11-12 08:53:56 +00001986 data_t *secret,
1987 data_t *transcript,
Gilles Peskine449bd832023-01-11 14:50:10 +01001988 data_t *client_expected,
1989 data_t *server_expected,
1990 data_t *exporter_expected)
Hanno Beckera4f40a02021-05-24 06:42:11 +01001991{
Xiaofei Bai746f9482021-11-12 08:53:56 +00001992 mbedtls_ssl_tls13_application_secrets secrets;
Hanno Beckera4f40a02021-05-24 06:42:11 +01001993
1994 /* Double-check that we've passed sane parameters. */
Gabor Mezei07732f72022-03-26 17:04:19 +01001995 psa_algorithm_t alg = (psa_algorithm_t) hash_alg;
Gilles Peskine449bd832023-01-11 14:50:10 +01001996 size_t const hash_len = PSA_HASH_LENGTH(alg);
Michael Schusterbd89b792024-06-04 02:41:10 +02001997 TEST_ASSERT(PSA_ALG_IS_HASH(alg) &&
Gilles Peskine449bd832023-01-11 14:50:10 +01001998 secret->len == hash_len &&
1999 transcript->len == hash_len &&
2000 client_expected->len == hash_len &&
2001 server_expected->len == hash_len &&
2002 exporter_expected->len == hash_len);
Hanno Beckera4f40a02021-05-24 06:42:11 +01002003
Gilles Peskine449bd832023-01-11 14:50:10 +01002004 PSA_INIT();
Hanno Beckera4f40a02021-05-24 06:42:11 +01002005
Gilles Peskine449bd832023-01-11 14:50:10 +01002006 TEST_ASSERT(mbedtls_ssl_tls13_derive_application_secrets(
2007 alg, secret->x, transcript->x, transcript->len,
2008 &secrets) == 0);
Hanno Beckera4f40a02021-05-24 06:42:11 +01002009
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +01002010 TEST_MEMORY_COMPARE(secrets.client_application_traffic_secret_N, hash_len,
Tom Cosgrove0540fe72023-07-27 14:17:27 +01002011 client_expected->x, client_expected->len);
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +01002012 TEST_MEMORY_COMPARE(secrets.server_application_traffic_secret_N, hash_len,
Tom Cosgrove0540fe72023-07-27 14:17:27 +01002013 server_expected->x, server_expected->len);
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +01002014 TEST_MEMORY_COMPARE(secrets.exporter_master_secret, hash_len,
Tom Cosgrove0540fe72023-07-27 14:17:27 +01002015 exporter_expected->x, exporter_expected->len);
Gabor Mezei892c4aa2022-03-21 12:21:43 +01002016
valerio32f2ac92023-04-20 11:59:52 +02002017exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01002018 PSA_DONE();
Hanno Beckera4f40a02021-05-24 06:42:11 +01002019}
2020/* END_CASE */
2021
Ronald Cron6f135e12021-12-08 16:57:54 +01002022/* BEGIN_CASE depends_on:MBEDTLS_SSL_PROTO_TLS1_3 */
Gilles Peskine449bd832023-01-11 14:50:10 +01002023void ssl_tls13_derive_resumption_secrets(int hash_alg,
2024 data_t *secret,
2025 data_t *transcript,
2026 data_t *resumption_expected)
Hanno Becker55bc2c52021-05-24 06:53:52 +01002027{
Gilles Peskine449bd832023-01-11 14:50:10 +01002028 mbedtls_ssl_tls13_application_secrets secrets;
Hanno Becker55bc2c52021-05-24 06:53:52 +01002029
2030 /* Double-check that we've passed sane parameters. */
Gabor Mezei07732f72022-03-26 17:04:19 +01002031 psa_algorithm_t alg = (psa_algorithm_t) hash_alg;
Gilles Peskine449bd832023-01-11 14:50:10 +01002032 size_t const hash_len = PSA_HASH_LENGTH(alg);
Michael Schusterbd89b792024-06-04 02:41:10 +02002033 TEST_ASSERT(PSA_ALG_IS_HASH(alg) &&
Gilles Peskine449bd832023-01-11 14:50:10 +01002034 secret->len == hash_len &&
2035 transcript->len == hash_len &&
2036 resumption_expected->len == hash_len);
Hanno Becker55bc2c52021-05-24 06:53:52 +01002037
Gilles Peskine449bd832023-01-11 14:50:10 +01002038 PSA_INIT();
Hanno Becker55bc2c52021-05-24 06:53:52 +01002039
Gilles Peskine449bd832023-01-11 14:50:10 +01002040 TEST_ASSERT(mbedtls_ssl_tls13_derive_resumption_master_secret(
2041 alg, secret->x, transcript->x, transcript->len,
2042 &secrets) == 0);
Hanno Becker55bc2c52021-05-24 06:53:52 +01002043
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +01002044 TEST_MEMORY_COMPARE(secrets.resumption_master_secret, hash_len,
Tom Cosgrove0540fe72023-07-27 14:17:27 +01002045 resumption_expected->x, resumption_expected->len);
Gabor Mezei892c4aa2022-03-21 12:21:43 +01002046
valerio32f2ac92023-04-20 11:59:52 +02002047exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01002048 PSA_DONE();
2049}
2050/* END_CASE */
2051
2052/* BEGIN_CASE depends_on:MBEDTLS_SSL_PROTO_TLS1_3 */
2053void ssl_tls13_create_psk_binder(int hash_alg,
2054 data_t *psk,
2055 int psk_type,
2056 data_t *transcript,
2057 data_t *binder_expected)
2058{
Manuel Pégourié-Gonnard88579842023-03-28 11:20:23 +02002059 unsigned char binder[MBEDTLS_MD_MAX_SIZE];
Gilles Peskine449bd832023-01-11 14:50:10 +01002060
2061 /* Double-check that we've passed sane parameters. */
2062 psa_algorithm_t alg = (psa_algorithm_t) hash_alg;
2063 size_t const hash_len = PSA_HASH_LENGTH(alg);
Michael Schusterbd89b792024-06-04 02:41:10 +02002064 TEST_ASSERT(PSA_ALG_IS_HASH(alg) &&
Gilles Peskine449bd832023-01-11 14:50:10 +01002065 transcript->len == hash_len &&
2066 binder_expected->len == hash_len);
2067
2068 PSA_INIT();
2069
2070 TEST_ASSERT(mbedtls_ssl_tls13_create_psk_binder(
2071 NULL, /* SSL context for debugging only */
2072 alg,
2073 psk->x, psk->len,
2074 psk_type,
2075 transcript->x,
2076 binder) == 0);
2077
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +01002078 TEST_MEMORY_COMPARE(binder, hash_len,
Tom Cosgrove0540fe72023-07-27 14:17:27 +01002079 binder_expected->x, binder_expected->len);
Gilles Peskine449bd832023-01-11 14:50:10 +01002080
valerio32f2ac92023-04-20 11:59:52 +02002081exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01002082 PSA_DONE();
Hanno Becker55bc2c52021-05-24 06:53:52 +01002083}
2084/* END_CASE */
2085
Gilles Peskine9d5952d2023-07-20 20:11:21 +02002086/* BEGIN_CASE depends_on:MBEDTLS_SSL_PROTO_TLS1_3 */
Gilles Peskine449bd832023-01-11 14:50:10 +01002087void ssl_tls13_record_protection(int ciphersuite,
2088 int endpoint,
2089 int ctr,
2090 int padding_used,
2091 data_t *server_write_key,
2092 data_t *server_write_iv,
2093 data_t *client_write_key,
2094 data_t *client_write_iv,
2095 data_t *plaintext,
2096 data_t *ciphertext)
Hanno Beckera77d0052021-03-22 15:16:33 +00002097{
2098 mbedtls_ssl_key_set keys;
2099 mbedtls_ssl_transform transform_send;
Gilles Peskine21e46b32023-10-17 16:35:20 +02002100 mbedtls_ssl_transform_init(&transform_send);
Hanno Beckera77d0052021-03-22 15:16:33 +00002101 mbedtls_ssl_transform transform_recv;
Gilles Peskine21e46b32023-10-17 16:35:20 +02002102 mbedtls_ssl_transform_init(&transform_recv);
Hanno Beckera77d0052021-03-22 15:16:33 +00002103 mbedtls_record rec;
2104 unsigned char *buf = NULL;
Hanno Becker1f918782021-08-01 19:18:28 +01002105 size_t buf_len;
Hanno Beckera77d0052021-03-22 15:16:33 +00002106 int other_endpoint;
2107
Gilles Peskine449bd832023-01-11 14:50:10 +01002108 TEST_ASSERT(endpoint == MBEDTLS_SSL_IS_CLIENT ||
2109 endpoint == MBEDTLS_SSL_IS_SERVER);
Hanno Beckera77d0052021-03-22 15:16:33 +00002110
Gilles Peskine449bd832023-01-11 14:50:10 +01002111 if (endpoint == MBEDTLS_SSL_IS_SERVER) {
Hanno Beckera77d0052021-03-22 15:16:33 +00002112 other_endpoint = MBEDTLS_SSL_IS_CLIENT;
Gilles Peskine449bd832023-01-11 14:50:10 +01002113 }
2114 if (endpoint == MBEDTLS_SSL_IS_CLIENT) {
Hanno Beckera77d0052021-03-22 15:16:33 +00002115 other_endpoint = MBEDTLS_SSL_IS_SERVER;
Gilles Peskine449bd832023-01-11 14:50:10 +01002116 }
Hanno Beckera77d0052021-03-22 15:16:33 +00002117
Gilles Peskine449bd832023-01-11 14:50:10 +01002118 TEST_ASSERT(server_write_key->len == client_write_key->len);
2119 TEST_ASSERT(server_write_iv->len == client_write_iv->len);
Hanno Beckera77d0052021-03-22 15:16:33 +00002120
Gilles Peskine449bd832023-01-11 14:50:10 +01002121 memcpy(keys.client_write_key,
2122 client_write_key->x, client_write_key->len);
2123 memcpy(keys.client_write_iv,
2124 client_write_iv->x, client_write_iv->len);
2125 memcpy(keys.server_write_key,
2126 server_write_key->x, server_write_key->len);
2127 memcpy(keys.server_write_iv,
2128 server_write_iv->x, server_write_iv->len);
Hanno Beckera77d0052021-03-22 15:16:33 +00002129
2130 keys.key_len = server_write_key->len;
2131 keys.iv_len = server_write_iv->len;
2132
Valerio Setti00a256f2023-04-27 17:22:27 +02002133 MD_OR_USE_PSA_INIT();
Hanno Beckera77d0052021-03-22 15:16:33 +00002134
Gilles Peskine449bd832023-01-11 14:50:10 +01002135 TEST_ASSERT(mbedtls_ssl_tls13_populate_transform(
2136 &transform_send, endpoint,
2137 ciphersuite, &keys, NULL) == 0);
2138 TEST_ASSERT(mbedtls_ssl_tls13_populate_transform(
2139 &transform_recv, other_endpoint,
2140 ciphersuite, &keys, NULL) == 0);
Hanno Beckera77d0052021-03-22 15:16:33 +00002141
Hanno Becker1f918782021-08-01 19:18:28 +01002142 /* Make sure we have enough space in the buffer even if
2143 * we use more padding than the KAT. */
2144 buf_len = ciphertext->len + MBEDTLS_SSL_CID_TLS1_3_PADDING_GRANULARITY;
Tom Cosgrove05b2a872023-07-21 11:31:13 +01002145 TEST_CALLOC(buf, buf_len);
Hanno Beckera77d0052021-03-22 15:16:33 +00002146 rec.type = MBEDTLS_SSL_MSG_APPLICATION_DATA;
Hanno Becker41537452021-04-20 05:35:28 +01002147
2148 /* TLS 1.3 uses the version identifier from TLS 1.2 on the wire. */
Gilles Peskine449bd832023-01-11 14:50:10 +01002149 mbedtls_ssl_write_version(rec.ver,
2150 MBEDTLS_SSL_TRANSPORT_STREAM,
2151 MBEDTLS_SSL_VERSION_TLS1_2);
Hanno Beckera77d0052021-03-22 15:16:33 +00002152
2153 /* Copy plaintext into record structure */
2154 rec.buf = buf;
Hanno Becker1f918782021-08-01 19:18:28 +01002155 rec.buf_len = buf_len;
Hanno Beckera77d0052021-03-22 15:16:33 +00002156 rec.data_offset = 0;
Gilles Peskine449bd832023-01-11 14:50:10 +01002157 TEST_ASSERT(plaintext->len <= ciphertext->len);
2158 memcpy(rec.buf + rec.data_offset, plaintext->x, plaintext->len);
Hanno Beckera77d0052021-03-22 15:16:33 +00002159 rec.data_len = plaintext->len;
2160#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
2161 rec.cid_len = 0;
2162#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
2163
Gilles Peskine449bd832023-01-11 14:50:10 +01002164 memset(&rec.ctr[0], 0, 8);
Hanno Beckera77d0052021-03-22 15:16:33 +00002165 rec.ctr[7] = ctr;
2166
Ben Taylor602b2962025-03-07 15:52:50 +00002167 TEST_ASSERT(mbedtls_ssl_encrypt_buf(NULL, &transform_send, &rec) == 0);
Hanno Becker1f918782021-08-01 19:18:28 +01002168
Gilles Peskine449bd832023-01-11 14:50:10 +01002169 if (padding_used == MBEDTLS_SSL_CID_TLS1_3_PADDING_GRANULARITY) {
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +01002170 TEST_MEMORY_COMPARE(rec.buf + rec.data_offset, rec.data_len,
Tom Cosgrove0540fe72023-07-27 14:17:27 +01002171 ciphertext->x, ciphertext->len);
Hanno Becker1f918782021-08-01 19:18:28 +01002172 }
Hanno Beckera77d0052021-03-22 15:16:33 +00002173
Gilles Peskine449bd832023-01-11 14:50:10 +01002174 TEST_ASSERT(mbedtls_ssl_decrypt_buf(NULL, &transform_recv, &rec) == 0);
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +01002175 TEST_MEMORY_COMPARE(rec.buf + rec.data_offset, rec.data_len,
Tom Cosgrove0540fe72023-07-27 14:17:27 +01002176 plaintext->x, plaintext->len);
Hanno Beckera77d0052021-03-22 15:16:33 +00002177
valerio32f2ac92023-04-20 11:59:52 +02002178exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01002179 mbedtls_free(buf);
2180 mbedtls_ssl_transform_free(&transform_send);
2181 mbedtls_ssl_transform_free(&transform_recv);
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01002182 MD_OR_USE_PSA_DONE();
Hanno Beckera77d0052021-03-22 15:16:33 +00002183}
2184/* END_CASE */
2185
Andrzej Kurek658442f2022-10-12 11:28:41 -04002186/* BEGIN_CASE depends_on:MBEDTLS_SSL_PROTO_TLS1_3 */
Gilles Peskine449bd832023-01-11 14:50:10 +01002187void ssl_tls13_key_evolution(int hash_alg,
2188 data_t *secret,
2189 data_t *input,
2190 data_t *expected)
Hanno Becker2d2c3eb2020-08-20 14:54:24 +01002191{
Manuel Pégourié-Gonnard88579842023-03-28 11:20:23 +02002192 unsigned char secret_new[MBEDTLS_MD_MAX_SIZE];
Hanno Becker2d2c3eb2020-08-20 14:54:24 +01002193
Gabor Mezei5d9a1fe2022-03-24 17:49:14 +01002194 PSA_INIT();
Gabor Mezei892c4aa2022-03-21 12:21:43 +01002195
Gilles Peskine449bd832023-01-11 14:50:10 +01002196 TEST_ASSERT(mbedtls_ssl_tls13_evolve_secret(
2197 (psa_algorithm_t) hash_alg,
2198 secret->len ? secret->x : NULL,
2199 input->len ? input->x : NULL, input->len,
2200 secret_new) == 0);
Hanno Becker2d2c3eb2020-08-20 14:54:24 +01002201
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +01002202 TEST_MEMORY_COMPARE(secret_new, (size_t) expected->len,
Tom Cosgrove0540fe72023-07-27 14:17:27 +01002203 expected->x, (size_t) expected->len);
Gabor Mezei892c4aa2022-03-21 12:21:43 +01002204
valerio32f2ac92023-04-20 11:59:52 +02002205exit:
Gabor Mezei5d9a1fe2022-03-24 17:49:14 +01002206 PSA_DONE();
Hanno Becker2d2c3eb2020-08-20 14:54:24 +01002207}
2208/* END_CASE */
2209
Jerry Yu53d23e22022-02-09 16:25:09 +08002210/* BEGIN_CASE depends_on:MBEDTLS_SSL_PROTO_TLS1_2 */
Gilles Peskine449bd832023-01-11 14:50:10 +01002211void ssl_tls_prf(int type, data_t *secret, data_t *random,
2212 char *label, data_t *result_str, int exp_ret)
Ron Eldor824ad7b2019-05-13 14:09:00 +03002213{
2214 unsigned char *output;
2215
Gilles Peskine449bd832023-01-11 14:50:10 +01002216 output = mbedtls_calloc(1, result_str->len);
2217 if (output == NULL) {
Ron Eldor824ad7b2019-05-13 14:09:00 +03002218 goto exit;
Gilles Peskine449bd832023-01-11 14:50:10 +01002219 }
Ron Eldor824ad7b2019-05-13 14:09:00 +03002220
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01002221 MD_OR_USE_PSA_INIT();
Ron Eldor6b9b1b82019-05-15 17:04:33 +03002222
Gilles Peskine449bd832023-01-11 14:50:10 +01002223 TEST_ASSERT(mbedtls_ssl_tls_prf(type, secret->x, secret->len,
2224 label, random->x, random->len,
2225 output, result_str->len) == exp_ret);
Ron Eldor824ad7b2019-05-13 14:09:00 +03002226
Gilles Peskine449bd832023-01-11 14:50:10 +01002227 if (exp_ret == 0) {
2228 TEST_ASSERT(mbedtls_test_hexcmp(output, result_str->x,
2229 result_str->len, result_str->len) == 0);
Ron Eldor824ad7b2019-05-13 14:09:00 +03002230 }
2231exit:
2232
Gilles Peskine449bd832023-01-11 14:50:10 +01002233 mbedtls_free(output);
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01002234 MD_OR_USE_PSA_DONE();
Ron Eldor824ad7b2019-05-13 14:09:00 +03002235}
2236/* END_CASE */
Manuel Pégourié-Gonnard6eac11b2019-05-23 09:30:55 +02002237
Manuel Pégourié-Gonnardf9deaec2019-05-24 09:41:39 +02002238/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +01002239void ssl_serialize_session_save_load(int ticket_len, char *crt_file,
2240 int endpoint_type, int tls_version)
Manuel Pégourié-Gonnardf9deaec2019-05-24 09:41:39 +02002241{
2242 mbedtls_ssl_session original, restored;
2243 unsigned char *buf = NULL;
2244 size_t len;
2245
2246 /*
2247 * Test that a save-load pair is the identity
2248 */
Gilles Peskine449bd832023-01-11 14:50:10 +01002249 mbedtls_ssl_session_init(&original);
2250 mbedtls_ssl_session_init(&restored);
valerio32f2ac92023-04-20 11:59:52 +02002251 USE_PSA_INIT();
Manuel Pégourié-Gonnardf9deaec2019-05-24 09:41:39 +02002252
2253 /* Prepare a dummy session to work on */
Jerry Yuf0926292022-07-15 13:05:57 +08002254 ((void) tls_version);
Jerry Yu28547c42023-10-31 14:42:50 +08002255 ((void) ticket_len);
2256 ((void) crt_file);
Jerry Yuf0926292022-07-15 13:05:57 +08002257#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
Gilles Peskine449bd832023-01-11 14:50:10 +01002258 if (tls_version == MBEDTLS_SSL_VERSION_TLS1_3) {
Yanray Wangf7b62352022-10-26 11:51:53 +08002259 TEST_ASSERT(mbedtls_test_ssl_tls13_populate_session(
Gilles Peskine449bd832023-01-11 14:50:10 +01002260 &original, 0, endpoint_type) == 0);
Jerry Yu28547c42023-10-31 14:42:50 +08002261 }
Jerry Yuf0926292022-07-15 13:05:57 +08002262#endif
Jerry Yu28547c42023-10-31 14:42:50 +08002263
2264#if defined(MBEDTLS_SSL_PROTO_TLS1_2)
2265 if (tls_version == MBEDTLS_SSL_VERSION_TLS1_2) {
Yanray Wangf7b62352022-10-26 11:51:53 +08002266 TEST_ASSERT(mbedtls_test_ssl_tls12_populate_session(
Ronald Cron7b1921a2023-11-23 12:31:56 +01002267 &original, ticket_len, endpoint_type, crt_file) == 0);
Jerry Yuf0926292022-07-15 13:05:57 +08002268 }
Jerry Yu28547c42023-10-31 14:42:50 +08002269#endif
Manuel Pégourié-Gonnardf9deaec2019-05-24 09:41:39 +02002270
Manuel Pégourié-Gonnard686adb42019-06-03 09:55:16 +02002271 /* Serialize it */
Gilles Peskine449bd832023-01-11 14:50:10 +01002272 TEST_ASSERT(mbedtls_ssl_session_save(&original, NULL, 0, &len)
2273 == MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL);
Gilles Peskined681ffd2023-10-17 17:31:50 +02002274 TEST_CALLOC(buf, len);
Gilles Peskine449bd832023-01-11 14:50:10 +01002275 TEST_ASSERT(mbedtls_ssl_session_save(&original, buf, len, &len)
2276 == 0);
Manuel Pégourié-Gonnardf9deaec2019-05-24 09:41:39 +02002277
Manuel Pégourié-Gonnard686adb42019-06-03 09:55:16 +02002278 /* Restore session from serialized data */
Gilles Peskine449bd832023-01-11 14:50:10 +01002279 TEST_ASSERT(mbedtls_ssl_session_load(&restored, buf, len) == 0);
Manuel Pégourié-Gonnardf9deaec2019-05-24 09:41:39 +02002280
2281 /*
2282 * Make sure both session structures are identical
2283 */
2284#if defined(MBEDTLS_HAVE_TIME)
Ronald Cronc57f86e2023-11-22 09:50:01 +01002285 if (tls_version == MBEDTLS_SSL_VERSION_TLS1_2) {
2286 TEST_ASSERT(original.start == restored.start);
Jerry Yu28547c42023-10-31 14:42:50 +08002287 }
Ronald Cronc57f86e2023-11-22 09:50:01 +01002288#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_SRV_C)
2289 TEST_ASSERT(original.ticket_creation_time == restored.ticket_creation_time);
Jerry Yu28547c42023-10-31 14:42:50 +08002290#endif
Ronald Cronc57f86e2023-11-22 09:50:01 +01002291#endif /* MBEDTLS_HAVE_TIME */
Jerry Yu28547c42023-10-31 14:42:50 +08002292
Gilles Peskine449bd832023-01-11 14:50:10 +01002293 TEST_ASSERT(original.tls_version == restored.tls_version);
Ronald Cron7b1921a2023-11-23 12:31:56 +01002294 TEST_ASSERT(original.endpoint == restored.endpoint);
Gilles Peskine449bd832023-01-11 14:50:10 +01002295 TEST_ASSERT(original.ciphersuite == restored.ciphersuite);
Jerry Yuf0926292022-07-15 13:05:57 +08002296#if defined(MBEDTLS_SSL_PROTO_TLS1_2)
Gilles Peskine449bd832023-01-11 14:50:10 +01002297 if (tls_version == MBEDTLS_SSL_VERSION_TLS1_2) {
2298 TEST_ASSERT(original.id_len == restored.id_len);
2299 TEST_ASSERT(memcmp(original.id,
2300 restored.id, sizeof(original.id)) == 0);
2301 TEST_ASSERT(memcmp(original.master,
2302 restored.master, sizeof(original.master)) == 0);
Manuel Pégourié-Gonnardf9deaec2019-05-24 09:41:39 +02002303
Ronald Crone68ab4f2022-10-05 12:46:29 +02002304#if defined(MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED)
Manuel Pégourié-Gonnardee13a732019-07-29 13:00:39 +02002305#if defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
Gilles Peskine449bd832023-01-11 14:50:10 +01002306 TEST_ASSERT((original.peer_cert == NULL) ==
2307 (restored.peer_cert == NULL));
2308 if (original.peer_cert != NULL) {
2309 TEST_ASSERT(original.peer_cert->raw.len ==
2310 restored.peer_cert->raw.len);
2311 TEST_ASSERT(memcmp(original.peer_cert->raw.p,
2312 restored.peer_cert->raw.p,
2313 original.peer_cert->raw.len) == 0);
Jerry Yuf0926292022-07-15 13:05:57 +08002314 }
Manuel Pégourié-Gonnardee13a732019-07-29 13:00:39 +02002315#else /* MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
Gilles Peskine449bd832023-01-11 14:50:10 +01002316 TEST_ASSERT(original.peer_cert_digest_type ==
2317 restored.peer_cert_digest_type);
2318 TEST_ASSERT(original.peer_cert_digest_len ==
2319 restored.peer_cert_digest_len);
2320 TEST_ASSERT((original.peer_cert_digest == NULL) ==
2321 (restored.peer_cert_digest == NULL));
2322 if (original.peer_cert_digest != NULL) {
2323 TEST_ASSERT(memcmp(original.peer_cert_digest,
2324 restored.peer_cert_digest,
2325 original.peer_cert_digest_len) == 0);
Jerry Yuf0926292022-07-15 13:05:57 +08002326 }
Manuel Pégourié-Gonnardee13a732019-07-29 13:00:39 +02002327#endif /* MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
Ronald Crone68ab4f2022-10-05 12:46:29 +02002328#endif /* MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED */
Gilles Peskine449bd832023-01-11 14:50:10 +01002329 TEST_ASSERT(original.verify_result == restored.verify_result);
Manuel Pégourié-Gonnardf9deaec2019-05-24 09:41:39 +02002330
Jerry Yuf0926292022-07-15 13:05:57 +08002331#if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
Gilles Peskine449bd832023-01-11 14:50:10 +01002332 TEST_ASSERT(original.mfl_code == restored.mfl_code);
Jerry Yuf0926292022-07-15 13:05:57 +08002333#endif
2334
2335#if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
Gilles Peskine449bd832023-01-11 14:50:10 +01002336 TEST_ASSERT(original.encrypt_then_mac == restored.encrypt_then_mac);
Jerry Yuf0926292022-07-15 13:05:57 +08002337#endif
Jerry Yu6ac7c032022-07-21 23:11:55 +08002338#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_CLI_C)
Gilles Peskine449bd832023-01-11 14:50:10 +01002339 TEST_ASSERT(original.ticket_len == restored.ticket_len);
2340 if (original.ticket_len != 0) {
2341 TEST_ASSERT(original.ticket != NULL);
2342 TEST_ASSERT(restored.ticket != NULL);
2343 TEST_ASSERT(memcmp(original.ticket,
2344 restored.ticket, original.ticket_len) == 0);
Jerry Yu6ac7c032022-07-21 23:11:55 +08002345 }
Gilles Peskine449bd832023-01-11 14:50:10 +01002346 TEST_ASSERT(original.ticket_lifetime == restored.ticket_lifetime);
Jerry Yu6ac7c032022-07-21 23:11:55 +08002347#endif
Jerry Yuf0926292022-07-15 13:05:57 +08002348 }
Jerry Yu6ac7c032022-07-21 23:11:55 +08002349#endif /* MBEDTLS_SSL_PROTO_TLS1_2 */
2350
2351#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
Gilles Peskine449bd832023-01-11 14:50:10 +01002352 if (tls_version == MBEDTLS_SSL_VERSION_TLS1_3) {
Ronald Cron18b92a12024-03-26 10:15:08 +01002353#if defined(MBEDTLS_SSL_SESSION_TICKETS)
Gilles Peskine449bd832023-01-11 14:50:10 +01002354 TEST_ASSERT(original.ticket_age_add == restored.ticket_age_add);
2355 TEST_ASSERT(original.ticket_flags == restored.ticket_flags);
2356 TEST_ASSERT(original.resumption_key_len == restored.resumption_key_len);
2357 if (original.resumption_key_len != 0) {
2358 TEST_ASSERT(original.resumption_key != NULL);
2359 TEST_ASSERT(restored.resumption_key != NULL);
2360 TEST_ASSERT(memcmp(original.resumption_key,
2361 restored.resumption_key,
2362 original.resumption_key_len) == 0);
Jerry Yu6ac7c032022-07-21 23:11:55 +08002363 }
Ronald Cron18b92a12024-03-26 10:15:08 +01002364#endif /* MBEDTLS_SSL_SESSION_TICKETS */
Jerry Yu34e95162022-12-12 15:14:56 +08002365
Ronald Cron18b92a12024-03-26 10:15:08 +01002366#if defined(MBEDTLS_SSL_SRV_C)
Waleed Elmelegy2824a202024-02-23 17:51:47 +00002367 if (endpoint_type == MBEDTLS_SSL_IS_SERVER) {
Ronald Cron18b92a12024-03-26 10:15:08 +01002368#if defined(MBEDTLS_SSL_SESSION_TICKETS)
2369#if defined(MBEDTLS_SSL_EARLY_DATA) && defined(MBEDTLS_SSL_ALPN)
Waleed Elmelegy883f77c2024-03-06 19:09:41 +00002370 TEST_ASSERT(original.ticket_alpn != NULL);
2371 TEST_ASSERT(restored.ticket_alpn != NULL);
2372 TEST_MEMORY_COMPARE(original.ticket_alpn, strlen(original.ticket_alpn),
2373 restored.ticket_alpn, strlen(restored.ticket_alpn));
Ronald Cron18b92a12024-03-26 10:15:08 +01002374#endif
2375#endif /* MBEDTLS_SSL_SESSION_TICKETS */
Waleed Elmelegy2824a202024-02-23 17:51:47 +00002376 }
Ronald Cron18b92a12024-03-26 10:15:08 +01002377#endif /* MBEDTLS_SSL_SRV_C */
Jerry Yu34e95162022-12-12 15:14:56 +08002378
Ronald Cron18b92a12024-03-26 10:15:08 +01002379#if defined(MBEDTLS_SSL_CLI_C)
Gilles Peskine449bd832023-01-11 14:50:10 +01002380 if (endpoint_type == MBEDTLS_SSL_IS_CLIENT) {
Ronald Cron18b92a12024-03-26 10:15:08 +01002381#if defined(MBEDTLS_SSL_SESSION_TICKETS)
Jerry Yu6ac7c032022-07-21 23:11:55 +08002382#if defined(MBEDTLS_HAVE_TIME)
Jerry Yu342a5552023-11-10 14:23:39 +08002383 TEST_ASSERT(original.ticket_reception_time == restored.ticket_reception_time);
Manuel Pégourié-Gonnardf9deaec2019-05-24 09:41:39 +02002384#endif
Gilles Peskine449bd832023-01-11 14:50:10 +01002385 TEST_ASSERT(original.ticket_lifetime == restored.ticket_lifetime);
2386 TEST_ASSERT(original.ticket_len == restored.ticket_len);
2387 if (original.ticket_len != 0) {
2388 TEST_ASSERT(original.ticket != NULL);
2389 TEST_ASSERT(restored.ticket != NULL);
2390 TEST_ASSERT(memcmp(original.ticket,
2391 restored.ticket,
2392 original.ticket_len) == 0);
Jerry Yu6ac7c032022-07-21 23:11:55 +08002393 }
Ronald Cron8d15e012024-03-27 09:30:13 +01002394#if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION)
2395 TEST_ASSERT(original.hostname != NULL);
2396 TEST_ASSERT(restored.hostname != NULL);
2397 TEST_MEMORY_COMPARE(original.hostname, strlen(original.hostname),
2398 restored.hostname, strlen(restored.hostname));
2399#endif
Ronald Cron18b92a12024-03-26 10:15:08 +01002400#endif /* MBEDTLS_SSL_SESSION_TICKETS */
Jerry Yu6ac7c032022-07-21 23:11:55 +08002401 }
Ronald Cron18b92a12024-03-26 10:15:08 +01002402#endif /* MBEDTLS_SSL_CLI_C */
Jerry Yu6ac7c032022-07-21 23:11:55 +08002403 }
2404#endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
Manuel Pégourié-Gonnardf9deaec2019-05-24 09:41:39 +02002405
Ronald Cron18b92a12024-03-26 10:15:08 +01002406#if defined(MBEDTLS_SSL_EARLY_DATA)
2407 TEST_ASSERT(
2408 original.max_early_data_size == restored.max_early_data_size);
2409#endif
2410
Waleed Elmelegy049cd302023-12-20 17:28:31 +00002411#if defined(MBEDTLS_SSL_RECORD_SIZE_LIMIT)
2412 TEST_ASSERT(original.record_size_limit == restored.record_size_limit);
2413#endif
2414
Manuel Pégourié-Gonnardf9deaec2019-05-24 09:41:39 +02002415exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01002416 mbedtls_ssl_session_free(&original);
2417 mbedtls_ssl_session_free(&restored);
2418 mbedtls_free(buf);
Valerio Setti285dae82023-04-19 15:10:45 +02002419 USE_PSA_DONE();
Manuel Pégourié-Gonnardf9deaec2019-05-24 09:41:39 +02002420}
2421/* END_CASE */
2422
Manuel Pégourié-Gonnardaa755832019-06-03 10:53:47 +02002423/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +01002424void ssl_serialize_session_load_save(int ticket_len, char *crt_file,
2425 int endpoint_type, int tls_version)
Manuel Pégourié-Gonnard6eac11b2019-05-23 09:30:55 +02002426{
2427 mbedtls_ssl_session session;
2428 unsigned char *buf1 = NULL, *buf2 = NULL;
2429 size_t len0, len1, len2;
2430
2431 /*
2432 * Test that a load-save pair is the identity
2433 */
Gilles Peskine449bd832023-01-11 14:50:10 +01002434 mbedtls_ssl_session_init(&session);
valerio32f2ac92023-04-20 11:59:52 +02002435 USE_PSA_INIT();
Manuel Pégourié-Gonnard6eac11b2019-05-23 09:30:55 +02002436
Manuel Pégourié-Gonnard3caa6ca2019-05-23 10:06:14 +02002437 /* Prepare a dummy session to work on */
Jerry Yu28547c42023-10-31 14:42:50 +08002438 ((void) ticket_len);
2439 ((void) crt_file);
Jerry Yuaa5dc242023-11-20 18:07:54 +08002440
2441 switch (tls_version) {
Jerry Yua180f992022-07-15 12:52:54 +08002442#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
Jerry Yuaa5dc242023-11-20 18:07:54 +08002443 case MBEDTLS_SSL_VERSION_TLS1_3:
2444 TEST_ASSERT(mbedtls_test_ssl_tls13_populate_session(
2445 &session, 0, endpoint_type) == 0);
2446 break;
Jerry Yua180f992022-07-15 12:52:54 +08002447#endif
Jerry Yu28547c42023-10-31 14:42:50 +08002448
2449#if defined(MBEDTLS_SSL_PROTO_TLS1_2)
Jerry Yuaa5dc242023-11-20 18:07:54 +08002450 case MBEDTLS_SSL_VERSION_TLS1_2:
2451 TEST_ASSERT(mbedtls_test_ssl_tls12_populate_session(
Ronald Cron7b1921a2023-11-23 12:31:56 +01002452 &session, ticket_len, endpoint_type, crt_file) == 0);
Jerry Yuaa5dc242023-11-20 18:07:54 +08002453 break;
Jerry Yu28547c42023-10-31 14:42:50 +08002454#endif
Jerry Yuaa5dc242023-11-20 18:07:54 +08002455 default:
2456 /* should never happen */
2457 TEST_ASSERT(0);
2458 break;
2459 }
Manuel Pégourié-Gonnard3caa6ca2019-05-23 10:06:14 +02002460
Manuel Pégourié-Gonnard686adb42019-06-03 09:55:16 +02002461 /* Get desired buffer size for serializing */
Gilles Peskine449bd832023-01-11 14:50:10 +01002462 TEST_ASSERT(mbedtls_ssl_session_save(&session, NULL, 0, &len0)
2463 == MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL);
Manuel Pégourié-Gonnard6eac11b2019-05-23 09:30:55 +02002464
2465 /* Allocate first buffer */
Gilles Peskine449bd832023-01-11 14:50:10 +01002466 buf1 = mbedtls_calloc(1, len0);
2467 TEST_ASSERT(buf1 != NULL);
Manuel Pégourié-Gonnard6eac11b2019-05-23 09:30:55 +02002468
Manuel Pégourié-Gonnard686adb42019-06-03 09:55:16 +02002469 /* Serialize to buffer and free live session */
Gilles Peskine449bd832023-01-11 14:50:10 +01002470 TEST_ASSERT(mbedtls_ssl_session_save(&session, buf1, len0, &len1)
2471 == 0);
2472 TEST_ASSERT(len0 == len1);
2473 mbedtls_ssl_session_free(&session);
Manuel Pégourié-Gonnard6eac11b2019-05-23 09:30:55 +02002474
Manuel Pégourié-Gonnard686adb42019-06-03 09:55:16 +02002475 /* Restore session from serialized data */
Gilles Peskine449bd832023-01-11 14:50:10 +01002476 TEST_ASSERT(mbedtls_ssl_session_load(&session, buf1, len1) == 0);
Manuel Pégourié-Gonnard6eac11b2019-05-23 09:30:55 +02002477
Manuel Pégourié-Gonnard686adb42019-06-03 09:55:16 +02002478 /* Allocate second buffer and serialize to it */
Gilles Peskine449bd832023-01-11 14:50:10 +01002479 buf2 = mbedtls_calloc(1, len0);
2480 TEST_ASSERT(buf2 != NULL);
2481 TEST_ASSERT(mbedtls_ssl_session_save(&session, buf2, len0, &len2)
2482 == 0);
Manuel Pégourié-Gonnard6eac11b2019-05-23 09:30:55 +02002483
Manuel Pégourié-Gonnard686adb42019-06-03 09:55:16 +02002484 /* Make sure both serialized versions are identical */
Gilles Peskine449bd832023-01-11 14:50:10 +01002485 TEST_ASSERT(len1 == len2);
2486 TEST_ASSERT(memcmp(buf1, buf2, len1) == 0);
Manuel Pégourié-Gonnard6eac11b2019-05-23 09:30:55 +02002487
2488exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01002489 mbedtls_ssl_session_free(&session);
2490 mbedtls_free(buf1);
2491 mbedtls_free(buf2);
Valerio Setti285dae82023-04-19 15:10:45 +02002492 USE_PSA_DONE();
Manuel Pégourié-Gonnard6eac11b2019-05-23 09:30:55 +02002493}
2494/* END_CASE */
Manuel Pégourié-Gonnardf5fa0aa2019-05-23 10:38:11 +02002495
2496/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +01002497void ssl_serialize_session_save_buf_size(int ticket_len, char *crt_file,
2498 int endpoint_type, int tls_version)
Manuel Pégourié-Gonnardf5fa0aa2019-05-23 10:38:11 +02002499{
2500 mbedtls_ssl_session session;
2501 unsigned char *buf = NULL;
2502 size_t good_len, bad_len, test_len;
2503
2504 /*
2505 * Test that session_save() fails cleanly on small buffers
2506 */
Gilles Peskine449bd832023-01-11 14:50:10 +01002507 mbedtls_ssl_session_init(&session);
valerio32f2ac92023-04-20 11:59:52 +02002508 USE_PSA_INIT();
Manuel Pégourié-Gonnardf5fa0aa2019-05-23 10:38:11 +02002509
Manuel Pégourié-Gonnard686adb42019-06-03 09:55:16 +02002510 /* Prepare dummy session and get serialized size */
Jerry Yu28547c42023-10-31 14:42:50 +08002511 ((void) ticket_len);
2512 ((void) crt_file);
Jerry Yu28547c42023-10-31 14:42:50 +08002513
Jerry Yud84c14f2023-11-16 13:33:57 +08002514 switch (tls_version) {
2515#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
2516 case MBEDTLS_SSL_VERSION_TLS1_3:
2517 TEST_ASSERT(mbedtls_test_ssl_tls13_populate_session(
2518 &session, 0, endpoint_type) == 0);
2519 break;
Jerry Yu28547c42023-10-31 14:42:50 +08002520#endif
Jerry Yud84c14f2023-11-16 13:33:57 +08002521#if defined(MBEDTLS_SSL_PROTO_TLS1_2)
2522 case MBEDTLS_SSL_VERSION_TLS1_2:
2523 TEST_ASSERT(mbedtls_test_ssl_tls12_populate_session(
Ronald Cron7b1921a2023-11-23 12:31:56 +01002524 &session, ticket_len, endpoint_type, crt_file) == 0);
Jerry Yud84c14f2023-11-16 13:33:57 +08002525 break;
2526#endif
2527 default:
2528 /* should never happen */
2529 TEST_ASSERT(0);
2530 break;
2531 }
Jerry Yu28547c42023-10-31 14:42:50 +08002532
Gilles Peskine449bd832023-01-11 14:50:10 +01002533 TEST_ASSERT(mbedtls_ssl_session_save(&session, NULL, 0, &good_len)
2534 == MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL);
Manuel Pégourié-Gonnardf5fa0aa2019-05-23 10:38:11 +02002535
2536 /* Try all possible bad lengths */
Gilles Peskine449bd832023-01-11 14:50:10 +01002537 for (bad_len = 1; bad_len < good_len; bad_len++) {
Manuel Pégourié-Gonnardf5fa0aa2019-05-23 10:38:11 +02002538 /* Allocate exact size so that asan/valgrind can detect any overwrite */
Gilles Peskine449bd832023-01-11 14:50:10 +01002539 mbedtls_free(buf);
Gilles Peskined681ffd2023-10-17 17:31:50 +02002540 buf = NULL;
2541 TEST_CALLOC(buf, bad_len);
Gilles Peskine449bd832023-01-11 14:50:10 +01002542 TEST_ASSERT(mbedtls_ssl_session_save(&session, buf, bad_len,
2543 &test_len)
2544 == MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL);
2545 TEST_ASSERT(test_len == good_len);
Manuel Pégourié-Gonnardf5fa0aa2019-05-23 10:38:11 +02002546 }
2547
2548exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01002549 mbedtls_ssl_session_free(&session);
2550 mbedtls_free(buf);
Valerio Setti285dae82023-04-19 15:10:45 +02002551 USE_PSA_DONE();
Manuel Pégourié-Gonnardf5fa0aa2019-05-23 10:38:11 +02002552}
2553/* END_CASE */
Manuel Pégourié-Gonnarda3d831b2019-05-23 12:28:45 +02002554
2555/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +01002556void ssl_serialize_session_load_buf_size(int ticket_len, char *crt_file,
2557 int endpoint_type, int tls_version)
Manuel Pégourié-Gonnarda3d831b2019-05-23 12:28:45 +02002558{
2559 mbedtls_ssl_session session;
2560 unsigned char *good_buf = NULL, *bad_buf = NULL;
2561 size_t good_len, bad_len;
2562
2563 /*
2564 * Test that session_load() fails cleanly on small buffers
2565 */
Gilles Peskine449bd832023-01-11 14:50:10 +01002566 mbedtls_ssl_session_init(&session);
valerio32f2ac92023-04-20 11:59:52 +02002567 USE_PSA_INIT();
Manuel Pégourié-Gonnarda3d831b2019-05-23 12:28:45 +02002568
Manuel Pégourié-Gonnard686adb42019-06-03 09:55:16 +02002569 /* Prepare serialized session data */
Jerry Yu28547c42023-10-31 14:42:50 +08002570 ((void) ticket_len);
2571 ((void) crt_file);
Jerry Yu4ac648e2023-11-16 13:58:38 +08002572
2573 switch (tls_version) {
Jerry Yu6e8fec22022-07-15 10:37:02 +08002574#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
Jerry Yu4ac648e2023-11-16 13:58:38 +08002575 case MBEDTLS_SSL_VERSION_TLS1_3:
2576 TEST_ASSERT(mbedtls_test_ssl_tls13_populate_session(
2577 &session, 0, endpoint_type) == 0);
2578 break;
Jerry Yu6e8fec22022-07-15 10:37:02 +08002579#endif
Jerry Yu28547c42023-10-31 14:42:50 +08002580
2581#if defined(MBEDTLS_SSL_PROTO_TLS1_2)
Jerry Yu4ac648e2023-11-16 13:58:38 +08002582 case MBEDTLS_SSL_VERSION_TLS1_2:
2583 TEST_ASSERT(mbedtls_test_ssl_tls12_populate_session(
Ronald Cron7b1921a2023-11-23 12:31:56 +01002584 &session, ticket_len, endpoint_type, crt_file) == 0);
Jerry Yu4ac648e2023-11-16 13:58:38 +08002585 break;
Jerry Yu28547c42023-10-31 14:42:50 +08002586#endif
2587
Jerry Yu4ac648e2023-11-16 13:58:38 +08002588 default:
2589 /* should never happen */
2590 TEST_ASSERT(0);
2591 break;
2592 }
2593
Gilles Peskine449bd832023-01-11 14:50:10 +01002594 TEST_ASSERT(mbedtls_ssl_session_save(&session, NULL, 0, &good_len)
2595 == MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL);
Gilles Peskined681ffd2023-10-17 17:31:50 +02002596 TEST_CALLOC(good_buf, good_len);
Gilles Peskine449bd832023-01-11 14:50:10 +01002597 TEST_ASSERT(mbedtls_ssl_session_save(&session, good_buf, good_len,
2598 &good_len) == 0);
2599 mbedtls_ssl_session_free(&session);
Manuel Pégourié-Gonnarda3d831b2019-05-23 12:28:45 +02002600
2601 /* Try all possible bad lengths */
Gilles Peskine449bd832023-01-11 14:50:10 +01002602 for (bad_len = 0; bad_len < good_len; bad_len++) {
Manuel Pégourié-Gonnarda3d831b2019-05-23 12:28:45 +02002603 /* Allocate exact size so that asan/valgrind can detect any overread */
Gilles Peskine449bd832023-01-11 14:50:10 +01002604 mbedtls_free(bad_buf);
Gilles Peskined681ffd2023-10-17 17:31:50 +02002605 bad_buf = NULL;
2606 TEST_CALLOC_NONNULL(bad_buf, bad_len);
Gilles Peskine449bd832023-01-11 14:50:10 +01002607 memcpy(bad_buf, good_buf, bad_len);
Manuel Pégourié-Gonnarda3d831b2019-05-23 12:28:45 +02002608
Gilles Peskine449bd832023-01-11 14:50:10 +01002609 TEST_ASSERT(mbedtls_ssl_session_load(&session, bad_buf, bad_len)
2610 == MBEDTLS_ERR_SSL_BAD_INPUT_DATA);
Manuel Pégourié-Gonnarda3d831b2019-05-23 12:28:45 +02002611 }
2612
2613exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01002614 mbedtls_ssl_session_free(&session);
2615 mbedtls_free(good_buf);
2616 mbedtls_free(bad_buf);
Valerio Setti285dae82023-04-19 15:10:45 +02002617 USE_PSA_DONE();
Manuel Pégourié-Gonnarda3d831b2019-05-23 12:28:45 +02002618}
2619/* END_CASE */
Hanno Becker861d0bb2019-05-21 16:39:30 +01002620
Hanno Becker363b6462019-05-29 12:44:28 +01002621/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +01002622void ssl_session_serialize_version_check(int corrupt_major,
2623 int corrupt_minor,
2624 int corrupt_patch,
2625 int corrupt_config,
2626 int endpoint_type,
2627 int tls_version)
Hanno Becker861d0bb2019-05-21 16:39:30 +01002628{
Gilles Peskine449bd832023-01-11 14:50:10 +01002629 unsigned char serialized_session[2048];
Hanno Becker363b6462019-05-29 12:44:28 +01002630 size_t serialized_session_len;
Hanno Beckerfe1275e2019-05-29 12:45:21 +01002631 unsigned cur_byte;
Hanno Becker861d0bb2019-05-21 16:39:30 +01002632 mbedtls_ssl_session session;
Hanno Beckerfe1275e2019-05-29 12:45:21 +01002633 uint8_t should_corrupt_byte[] = { corrupt_major == 1,
2634 corrupt_minor == 1,
2635 corrupt_patch == 1,
2636 corrupt_config == 1,
2637 corrupt_config == 1 };
2638
Gilles Peskine449bd832023-01-11 14:50:10 +01002639 mbedtls_ssl_session_init(&session);
valerio32f2ac92023-04-20 11:59:52 +02002640 USE_PSA_INIT();
Jerry Yu534ff402022-07-14 16:43:43 +08002641
Jerry Yud84c14f2023-11-16 13:33:57 +08002642 switch (tls_version) {
2643#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
2644 case MBEDTLS_SSL_VERSION_TLS1_3:
2645 TEST_ASSERT(mbedtls_test_ssl_tls13_populate_session(
2646 &session, 0, endpoint_type) == 0);
2647 break;
Jerry Yu28547c42023-10-31 14:42:50 +08002648#endif
Jerry Yud84c14f2023-11-16 13:33:57 +08002649#if defined(MBEDTLS_SSL_PROTO_TLS1_2)
2650 case MBEDTLS_SSL_VERSION_TLS1_2:
2651 TEST_ASSERT(mbedtls_test_ssl_tls12_populate_session(
Ronald Cron7b1921a2023-11-23 12:31:56 +01002652 &session, 0, endpoint_type, NULL) == 0);
Jerry Yu4ac648e2023-11-16 13:58:38 +08002653
Jerry Yud84c14f2023-11-16 13:33:57 +08002654 break;
2655#endif
2656 default:
2657 /* should never happen */
2658 TEST_ASSERT(0);
2659 break;
2660 }
Hanno Becker861d0bb2019-05-21 16:39:30 +01002661
Hanno Beckerfe1275e2019-05-29 12:45:21 +01002662 /* Infer length of serialized session. */
Gilles Peskine449bd832023-01-11 14:50:10 +01002663 TEST_ASSERT(mbedtls_ssl_session_save(&session,
2664 serialized_session,
2665 sizeof(serialized_session),
2666 &serialized_session_len) == 0);
Hanno Becker861d0bb2019-05-21 16:39:30 +01002667
Gilles Peskine449bd832023-01-11 14:50:10 +01002668 mbedtls_ssl_session_free(&session);
Hanno Becker861d0bb2019-05-21 16:39:30 +01002669
Hanno Beckerfe1275e2019-05-29 12:45:21 +01002670 /* Without any modification, we should be able to successfully
Hanno Becker363b6462019-05-29 12:44:28 +01002671 * de-serialize the session - double-check that. */
Gilles Peskine449bd832023-01-11 14:50:10 +01002672 TEST_ASSERT(mbedtls_ssl_session_load(&session,
2673 serialized_session,
2674 serialized_session_len) == 0);
2675 mbedtls_ssl_session_free(&session);
Hanno Becker861d0bb2019-05-21 16:39:30 +01002676
Hanno Beckerfe1275e2019-05-29 12:45:21 +01002677 /* Go through the bytes in the serialized session header and
2678 * corrupt them bit-by-bit. */
Gilles Peskine449bd832023-01-11 14:50:10 +01002679 for (cur_byte = 0; cur_byte < sizeof(should_corrupt_byte); cur_byte++) {
Hanno Beckerfe1275e2019-05-29 12:45:21 +01002680 int cur_bit;
BensonLioubedd2512024-03-13 20:21:26 +08002681 unsigned char *const byte = &serialized_session[cur_byte];
Hanno Beckerfe1275e2019-05-29 12:45:21 +01002682
Gilles Peskine449bd832023-01-11 14:50:10 +01002683 if (should_corrupt_byte[cur_byte] == 0) {
Hanno Beckerfe1275e2019-05-29 12:45:21 +01002684 continue;
Gilles Peskine449bd832023-01-11 14:50:10 +01002685 }
Hanno Beckerfe1275e2019-05-29 12:45:21 +01002686
Gilles Peskine449bd832023-01-11 14:50:10 +01002687 for (cur_bit = 0; cur_bit < CHAR_BIT; cur_bit++) {
Hanno Beckerfe1275e2019-05-29 12:45:21 +01002688 unsigned char const corrupted_bit = 0x1u << cur_bit;
2689 /* Modify a single bit in the serialized session. */
2690 *byte ^= corrupted_bit;
2691
2692 /* Attempt to deserialize */
Gilles Peskine449bd832023-01-11 14:50:10 +01002693 TEST_ASSERT(mbedtls_ssl_session_load(&session,
2694 serialized_session,
2695 serialized_session_len) ==
2696 MBEDTLS_ERR_SSL_VERSION_MISMATCH);
Hanno Beckerfe1275e2019-05-29 12:45:21 +01002697
2698 /* Undo the change */
2699 *byte ^= corrupted_bit;
2700 }
Hanno Becker861d0bb2019-05-21 16:39:30 +01002701 }
valerio32f2ac92023-04-20 11:59:52 +02002702exit:
Valerio Setti285dae82023-04-19 15:10:45 +02002703 USE_PSA_DONE();
Hanno Becker861d0bb2019-05-21 16:39:30 +01002704}
2705/* END_CASE */
Piotr Nowicki2a1f1782020-01-13 09:42:10 +01002706
Minos Galanakis411cb6c2024-03-04 17:33:52 +00002707/* BEGIN_CASE */
2708void ssl_session_id_accessors_check(int tls_version)
2709{
2710 mbedtls_ssl_session session;
2711 int ciphersuite_id;
2712 const mbedtls_ssl_ciphersuite_t *ciphersuite_info;
2713
2714 mbedtls_ssl_session_init(&session);
2715 USE_PSA_INIT();
2716
2717 switch (tls_version) {
2718#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
2719 case MBEDTLS_SSL_VERSION_TLS1_3:
2720 ciphersuite_id = MBEDTLS_TLS1_3_AES_128_GCM_SHA256;
2721 TEST_ASSERT(mbedtls_test_ssl_tls13_populate_session(
2722 &session, 0, MBEDTLS_SSL_IS_SERVER) == 0);
2723 break;
2724#endif
2725#if defined(MBEDTLS_SSL_PROTO_TLS1_2)
2726 case MBEDTLS_SSL_VERSION_TLS1_2:
2727 ciphersuite_id = MBEDTLS_TLS_PSK_WITH_AES_128_GCM_SHA256;
2728 TEST_ASSERT(mbedtls_test_ssl_tls12_populate_session(
2729 &session, 0, MBEDTLS_SSL_IS_SERVER, NULL) == 0);
2730
2731 break;
2732#endif
2733 default:
2734 /* should never happen */
2735 TEST_ASSERT(0);
2736 break;
2737 }
2738 TEST_ASSERT(*mbedtls_ssl_session_get_id(&session) == session.id);
2739 TEST_ASSERT(mbedtls_ssl_session_get_id_len(&session) == session.id_len);
2740 /* mbedtls_test_ssl_tls1x_populate_session sets a mock suite-id of 0xabcd */
2741 TEST_ASSERT(mbedtls_ssl_session_get_ciphersuite_id(&session) == 0xabcd);
2742
2743 /* Test setting a reference id for tls1.3 and tls1.2 */
2744 ciphersuite_info = mbedtls_ssl_ciphersuite_from_id(ciphersuite_id);
2745 if (ciphersuite_info != NULL) {
2746 TEST_ASSERT(mbedtls_ssl_ciphersuite_get_id(ciphersuite_info) == ciphersuite_id);
2747 }
2748
2749exit:
2750 mbedtls_ssl_session_free(&session);
2751 USE_PSA_DONE();
2752}
2753/* END_CASE */
2754
Elena Uziunaite6b4cd482024-07-04 17:50:11 +01002755/* BEGIN_CASE depends_on:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED:MBEDTLS_RSA_C:PSA_WANT_ECC_SECP_R1_384:!MBEDTLS_SSL_PROTO_TLS1_3:MBEDTLS_PKCS1_V15:PSA_WANT_ALG_SHA_256 */
Gilles Peskine449bd832023-01-11 14:50:10 +01002756void mbedtls_endpoint_sanity(int endpoint_type)
Piotr Nowicki2a1f1782020-01-13 09:42:10 +01002757{
2758 enum { BUFFSIZE = 1024 };
Yanray Wang9ef0dce2022-10-25 16:44:13 +08002759 mbedtls_test_ssl_endpoint ep;
Piotr Nowicki2a1f1782020-01-13 09:42:10 +01002760 int ret = -1;
Yanray Wang9ef0dce2022-10-25 16:44:13 +08002761 mbedtls_test_handshake_test_options options;
Yanray Wangf7b62352022-10-26 11:51:53 +08002762 mbedtls_test_init_handshake_options(&options);
Andrzej Kurek780dc182022-06-10 08:57:19 -04002763 options.pk_alg = MBEDTLS_PK_RSA;
Piotr Nowicki2a1f1782020-01-13 09:42:10 +01002764
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01002765 MD_OR_USE_PSA_INIT();
2766
Yanray Wangf7b62352022-10-26 11:51:53 +08002767 ret = mbedtls_test_ssl_endpoint_init(NULL, endpoint_type, &options,
Ronald Cronfb536472024-01-26 14:55:25 +01002768 NULL, NULL, NULL);
Gilles Peskine449bd832023-01-11 14:50:10 +01002769 TEST_ASSERT(MBEDTLS_ERR_SSL_BAD_INPUT_DATA == ret);
Piotr Nowicki2a1f1782020-01-13 09:42:10 +01002770
Yanray Wangbd296832022-10-26 18:28:11 +08002771 ret = mbedtls_test_ssl_endpoint_certificate_init(NULL, options.pk_alg,
2772 0, 0, 0);
Gilles Peskine449bd832023-01-11 14:50:10 +01002773 TEST_ASSERT(MBEDTLS_ERR_SSL_BAD_INPUT_DATA == ret);
Piotr Nowicki2a1f1782020-01-13 09:42:10 +01002774
Yanray Wangf7b62352022-10-26 11:51:53 +08002775 ret = mbedtls_test_ssl_endpoint_init(&ep, endpoint_type, &options,
Ronald Cronfb536472024-01-26 14:55:25 +01002776 NULL, NULL, NULL);
Gilles Peskine449bd832023-01-11 14:50:10 +01002777 TEST_ASSERT(ret == 0);
Piotr Nowicki2a1f1782020-01-13 09:42:10 +01002778
2779exit:
Yanray Wangf7b62352022-10-26 11:51:53 +08002780 mbedtls_test_ssl_endpoint_free(&ep, NULL);
2781 mbedtls_test_free_handshake_options(&options);
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01002782 MD_OR_USE_PSA_DONE();
Piotr Nowicki2a1f1782020-01-13 09:42:10 +01002783}
2784/* END_CASE */
2785
Elena Uziunaite6b4cd482024-07-04 17:50:11 +01002786/* BEGIN_CASE depends_on:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED:MBEDTLS_RSA_C:PSA_WANT_ECC_SECP_R1_384:MBEDTLS_PKCS1_V15:PSA_WANT_ALG_SHA_256:PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY */
Ronald Cron43263c02023-03-09 16:48:10 +01002787void move_handshake_to_state(int endpoint_type, int tls_version, int state, int need_pass)
Piotr Nowicki2a1f1782020-01-13 09:42:10 +01002788{
2789 enum { BUFFSIZE = 1024 };
Yanray Wang9ef0dce2022-10-25 16:44:13 +08002790 mbedtls_test_ssl_endpoint base_ep, second_ep;
Piotr Nowicki2a1f1782020-01-13 09:42:10 +01002791 int ret = -1;
Ronald Cron43263c02023-03-09 16:48:10 +01002792 (void) tls_version;
2793
Yanray Wang9ef0dce2022-10-25 16:44:13 +08002794 mbedtls_test_handshake_test_options options;
Yanray Wangf7b62352022-10-26 11:51:53 +08002795 mbedtls_test_init_handshake_options(&options);
Ronald Cron43263c02023-03-09 16:48:10 +01002796
Andrzej Kurek780dc182022-06-10 08:57:19 -04002797 options.pk_alg = MBEDTLS_PK_RSA;
Piotr Nowicki2a1f1782020-01-13 09:42:10 +01002798
Ronald Cron43263c02023-03-09 16:48:10 +01002799 /*
Ronald Cron097ba142023-03-08 16:18:00 +01002800 * If both TLS 1.2 and 1.3 are enabled and we want to do a TLS 1.2
2801 * handshake, force the TLS 1.2 version on endpoint under test.
Ronald Cron43263c02023-03-09 16:48:10 +01002802 */
2803#if defined(MBEDTLS_SSL_PROTO_TLS1_3) && defined(MBEDTLS_SSL_PROTO_TLS1_2)
Ronald Cron097ba142023-03-08 16:18:00 +01002804 if (MBEDTLS_SSL_VERSION_TLS1_2 == tls_version) {
2805 if (MBEDTLS_SSL_IS_CLIENT == endpoint_type) {
2806 options.client_min_version = MBEDTLS_SSL_VERSION_TLS1_2;
2807 options.client_max_version = MBEDTLS_SSL_VERSION_TLS1_2;
2808 } else {
2809 options.server_min_version = MBEDTLS_SSL_VERSION_TLS1_2;
2810 options.server_max_version = MBEDTLS_SSL_VERSION_TLS1_2;
2811 }
Ronald Cron43263c02023-03-09 16:48:10 +01002812 }
2813#endif
2814
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01002815 MD_OR_USE_PSA_INIT();
Gilles Peskine449bd832023-01-11 14:50:10 +01002816 mbedtls_platform_zeroize(&base_ep, sizeof(base_ep));
2817 mbedtls_platform_zeroize(&second_ep, sizeof(second_ep));
Neil Armstrong06baf042022-04-14 16:21:15 +02002818
Yanray Wangf7b62352022-10-26 11:51:53 +08002819 ret = mbedtls_test_ssl_endpoint_init(&base_ep, endpoint_type, &options,
Ronald Cronfb536472024-01-26 14:55:25 +01002820 NULL, NULL, NULL);
Gilles Peskine449bd832023-01-11 14:50:10 +01002821 TEST_ASSERT(ret == 0);
Piotr Nowicki2a1f1782020-01-13 09:42:10 +01002822
Yanray Wangbd296832022-10-26 18:28:11 +08002823 ret = mbedtls_test_ssl_endpoint_init(
2824 &second_ep,
2825 (endpoint_type == MBEDTLS_SSL_IS_SERVER) ?
2826 MBEDTLS_SSL_IS_CLIENT : MBEDTLS_SSL_IS_SERVER,
Ronald Cronfb536472024-01-26 14:55:25 +01002827 &options, NULL, NULL, NULL);
Andrzej Kurek780dc182022-06-10 08:57:19 -04002828
Gilles Peskine449bd832023-01-11 14:50:10 +01002829 TEST_ASSERT(ret == 0);
Piotr Nowicki2a1f1782020-01-13 09:42:10 +01002830
Yanray Wangf7b62352022-10-26 11:51:53 +08002831 ret = mbedtls_test_mock_socket_connect(&(base_ep.socket),
2832 &(second_ep.socket),
2833 BUFFSIZE);
Gilles Peskine449bd832023-01-11 14:50:10 +01002834 TEST_ASSERT(ret == 0);
Piotr Nowicki2a1f1782020-01-13 09:42:10 +01002835
Yanray Wangf7b62352022-10-26 11:51:53 +08002836 ret = mbedtls_test_move_handshake_to_state(&(base_ep.ssl),
2837 &(second_ep.ssl),
2838 state);
Gilles Peskine449bd832023-01-11 14:50:10 +01002839 if (need_pass) {
2840 TEST_ASSERT(ret == 0 ||
2841 ret == MBEDTLS_ERR_SSL_WANT_READ ||
2842 ret == MBEDTLS_ERR_SSL_WANT_WRITE);
2843 TEST_ASSERT(base_ep.ssl.state == state);
2844 } else {
2845 TEST_ASSERT(ret != 0 &&
2846 ret != MBEDTLS_ERR_SSL_WANT_READ &&
2847 ret != MBEDTLS_ERR_SSL_WANT_WRITE);
2848 TEST_ASSERT(base_ep.ssl.state != state);
Piotr Nowicki2a1f1782020-01-13 09:42:10 +01002849 }
2850
2851exit:
Yanray Wangf7b62352022-10-26 11:51:53 +08002852 mbedtls_test_free_handshake_options(&options);
2853 mbedtls_test_ssl_endpoint_free(&base_ep, NULL);
2854 mbedtls_test_ssl_endpoint_free(&second_ep, NULL);
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01002855 MD_OR_USE_PSA_DONE();
Piotr Nowicki2a1f1782020-01-13 09:42:10 +01002856}
2857/* END_CASE */
Andrzej Kurekf40daa32020-02-04 09:00:01 -05002858
Elena Uziunaite6b4cd482024-07-04 17:50:11 +01002859/* BEGIN_CASE depends_on:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED:MBEDTLS_PKCS1_V15:MBEDTLS_RSA_C:PSA_WANT_ECC_SECP_R1_384:PSA_WANT_ALG_SHA_256:PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY:MBEDTLS_CAN_HANDLE_RSA_TEST_KEY */
Gilles Peskine449bd832023-01-11 14:50:10 +01002860void handshake_version(int dtls, int client_min_version, int client_max_version,
2861 int server_min_version, int server_max_version,
2862 int expected_negotiated_version)
Andrzej Kurekf40daa32020-02-04 09:00:01 -05002863{
Yanray Wang9ef0dce2022-10-25 16:44:13 +08002864 mbedtls_test_handshake_test_options options;
Yanray Wangf7b62352022-10-26 11:51:53 +08002865 mbedtls_test_init_handshake_options(&options);
Andrzej Kurekda2b6782020-02-12 07:56:36 -05002866
Paul Elliottc8570442020-04-15 17:00:50 +01002867 options.client_min_version = client_min_version;
2868 options.client_max_version = client_max_version;
2869 options.server_min_version = server_min_version;
2870 options.server_max_version = server_max_version;
Paul Elliottc8570442020-04-15 17:00:50 +01002871 options.expected_negotiated_version = expected_negotiated_version;
2872
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05002873 options.dtls = dtls;
Yanray Wangf7b62352022-10-26 11:51:53 +08002874 mbedtls_test_ssl_perform_handshake(&options);
Andrzej Kurekf40daa32020-02-04 09:00:01 -05002875
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05002876 /* The goto below is used to avoid an "unused label" warning.*/
2877 goto exit;
Andrzej Kureke11acb22022-06-27 06:11:34 -04002878
2879exit:
Yanray Wangf7b62352022-10-26 11:51:53 +08002880 mbedtls_test_free_handshake_options(&options);
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05002881}
2882/* END_CASE */
Andrzej Kurek9e9efdc2020-02-26 05:25:23 -05002883
Elena Uziunaite0916cd72024-05-23 17:01:07 +01002884/* BEGIN_CASE depends_on:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED:MBEDTLS_PKCS1_V15:MBEDTLS_SSL_PROTO_TLS1_2:PSA_WANT_ALG_SHA_256 */
Gilles Peskine449bd832023-01-11 14:50:10 +01002885void handshake_psk_cipher(char *cipher, int pk_alg, data_t *psk_str, int dtls)
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05002886{
Yanray Wang9ef0dce2022-10-25 16:44:13 +08002887 mbedtls_test_handshake_test_options options;
Yanray Wangf7b62352022-10-26 11:51:53 +08002888 mbedtls_test_init_handshake_options(&options);
Andrzej Kurekf40daa32020-02-04 09:00:01 -05002889
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05002890 options.cipher = cipher;
2891 options.dtls = dtls;
2892 options.psk_str = psk_str;
2893 options.pk_alg = pk_alg;
Andrzej Kurekcc5169c2020-02-04 09:04:56 -05002894
Ronald Cron097ba142023-03-08 16:18:00 +01002895 options.client_min_version = MBEDTLS_SSL_VERSION_TLS1_2;
2896 options.client_max_version = MBEDTLS_SSL_VERSION_TLS1_2;
2897 options.expected_negotiated_version = MBEDTLS_SSL_VERSION_TLS1_2;
2898
Yanray Wangf7b62352022-10-26 11:51:53 +08002899 mbedtls_test_ssl_perform_handshake(&options);
Andrzej Kurek316da1f2020-02-26 09:03:47 -05002900
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05002901 /* The goto below is used to avoid an "unused label" warning.*/
2902 goto exit;
Andrzej Kureke11acb22022-06-27 06:11:34 -04002903
Andrzej Kurekddb8cd62022-07-04 16:07:28 -04002904exit:
Yanray Wangf7b62352022-10-26 11:51:53 +08002905 mbedtls_test_free_handshake_options(&options);
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05002906}
2907/* END_CASE */
Andrzej Kurek316da1f2020-02-26 09:03:47 -05002908
Elena Uziunaite0916cd72024-05-23 17:01:07 +01002909/* BEGIN_CASE depends_on:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED:MBEDTLS_PKCS1_V15:MBEDTLS_SSL_PROTO_TLS1_2:PSA_WANT_ALG_SHA_256 */
Gilles Peskine449bd832023-01-11 14:50:10 +01002910void handshake_cipher(char *cipher, int pk_alg, int dtls)
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05002911{
Gilles Peskine449bd832023-01-11 14:50:10 +01002912 test_handshake_psk_cipher(cipher, pk_alg, NULL, dtls);
Andrzej Kurekf40daa32020-02-04 09:00:01 -05002913
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05002914 /* The goto below is used to avoid an "unused label" warning.*/
2915 goto exit;
2916}
2917/* END_CASE */
Andrzej Kurekf40daa32020-02-04 09:00:01 -05002918
Elena Uziunaite0916cd72024-05-23 17:01:07 +01002919/* BEGIN_CASE depends_on:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED:MBEDTLS_PKCS1_V15:MBEDTLS_SSL_PROTO_TLS1_2:PSA_WANT_ALG_SHA_256 */
Gilles Peskine449bd832023-01-11 14:50:10 +01002920void handshake_ciphersuite_select(char *cipher, int pk_alg, data_t *psk_str,
2921 int psa_alg, int psa_alg2, int psa_usage,
2922 int expected_handshake_result,
2923 int expected_ciphersuite)
Neil Armstrong8c52ed82022-05-27 13:14:55 +02002924{
Yanray Wang9ef0dce2022-10-25 16:44:13 +08002925 mbedtls_test_handshake_test_options options;
Yanray Wangf7b62352022-10-26 11:51:53 +08002926 mbedtls_test_init_handshake_options(&options);
Neil Armstrong8c52ed82022-05-27 13:14:55 +02002927
2928 options.cipher = cipher;
Neil Armstrongdb134972022-06-30 09:06:28 +02002929 options.psk_str = psk_str;
Neil Armstrong8c52ed82022-05-27 13:14:55 +02002930 options.pk_alg = pk_alg;
2931 options.opaque_alg = psa_alg;
2932 options.opaque_alg2 = psa_alg2;
2933 options.opaque_usage = psa_usage;
2934 options.expected_handshake_result = expected_handshake_result;
2935 options.expected_ciphersuite = expected_ciphersuite;
Ronald Cron097ba142023-03-08 16:18:00 +01002936
2937 options.server_min_version = MBEDTLS_SSL_VERSION_TLS1_2;
2938 options.server_max_version = MBEDTLS_SSL_VERSION_TLS1_2;
2939 options.expected_negotiated_version = MBEDTLS_SSL_VERSION_TLS1_2;
2940
Yanray Wangf7b62352022-10-26 11:51:53 +08002941 mbedtls_test_ssl_perform_handshake(&options);
Neil Armstrong8c52ed82022-05-27 13:14:55 +02002942
2943 /* The goto below is used to avoid an "unused label" warning.*/
2944 goto exit;
Andrzej Kurekddb8cd62022-07-04 16:07:28 -04002945
2946exit:
Yanray Wangf7b62352022-10-26 11:51:53 +08002947 mbedtls_test_free_handshake_options(&options);
Neil Armstrong8c52ed82022-05-27 13:14:55 +02002948}
2949/* END_CASE */
2950
Elena Uziunaite6b4cd482024-07-04 17:50:11 +01002951/* BEGIN_CASE depends_on:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED:MBEDTLS_PKCS1_V15:MBEDTLS_RSA_C:PSA_WANT_ECC_SECP_R1_384:PSA_WANT_ALG_SHA_256 */
Gilles Peskine449bd832023-01-11 14:50:10 +01002952void app_data(int mfl, int cli_msg_len, int srv_msg_len,
2953 int expected_cli_fragments,
2954 int expected_srv_fragments, int dtls)
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05002955{
Yanray Wang9ef0dce2022-10-25 16:44:13 +08002956 mbedtls_test_handshake_test_options options;
Yanray Wangf7b62352022-10-26 11:51:53 +08002957 mbedtls_test_init_handshake_options(&options);
Andrzej Kurekda2b6782020-02-12 07:56:36 -05002958
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05002959 options.mfl = mfl;
2960 options.cli_msg_len = cli_msg_len;
2961 options.srv_msg_len = srv_msg_len;
2962 options.expected_cli_fragments = expected_cli_fragments;
2963 options.expected_srv_fragments = expected_srv_fragments;
2964 options.dtls = dtls;
Ronald Cron097ba142023-03-08 16:18:00 +01002965
2966 options.client_min_version = MBEDTLS_SSL_VERSION_TLS1_2;
2967 options.client_max_version = MBEDTLS_SSL_VERSION_TLS1_2;
2968 options.expected_negotiated_version = MBEDTLS_SSL_VERSION_TLS1_2;
Andrzej Kurekda2b6782020-02-12 07:56:36 -05002969
Yanray Wangf7b62352022-10-26 11:51:53 +08002970 mbedtls_test_ssl_perform_handshake(&options);
Andrzej Kurek780dc182022-06-10 08:57:19 -04002971
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05002972 /* The goto below is used to avoid an "unused label" warning.*/
2973 goto exit;
Andrzej Kurek780dc182022-06-10 08:57:19 -04002974
2975exit:
Yanray Wangf7b62352022-10-26 11:51:53 +08002976 mbedtls_test_free_handshake_options(&options);
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05002977}
2978/* END_CASE */
Andrzej Kurekda2b6782020-02-12 07:56:36 -05002979
Elena Uziunaite6b4cd482024-07-04 17:50:11 +01002980/* BEGIN_CASE depends_on:MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED:MBEDTLS_PKCS1_V15:MBEDTLS_RSA_C:PSA_WANT_ECC_SECP_R1_384:PSA_WANT_ALG_SHA_256:PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY:MBEDTLS_CAN_HANDLE_RSA_TEST_KEY */
Gilles Peskine449bd832023-01-11 14:50:10 +01002981void app_data_tls(int mfl, int cli_msg_len, int srv_msg_len,
2982 int expected_cli_fragments,
2983 int expected_srv_fragments)
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05002984{
Gilles Peskine449bd832023-01-11 14:50:10 +01002985 test_app_data(mfl, cli_msg_len, srv_msg_len, expected_cli_fragments,
2986 expected_srv_fragments, 0);
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05002987 /* The goto below is used to avoid an "unused label" warning.*/
2988 goto exit;
2989}
2990/* END_CASE */
Andrzej Kurekda2b6782020-02-12 07:56:36 -05002991
Elena Uziunaite6b4cd482024-07-04 17:50:11 +01002992/* BEGIN_CASE depends_on:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED:!MBEDTLS_SSL_PROTO_TLS1_3:MBEDTLS_PKCS1_V15:MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_RSA_C:PSA_WANT_ECC_SECP_R1_384:MBEDTLS_SSL_PROTO_DTLS:PSA_WANT_ALG_SHA_256:MBEDTLS_CAN_HANDLE_RSA_TEST_KEY */
Gilles Peskine449bd832023-01-11 14:50:10 +01002993void app_data_dtls(int mfl, int cli_msg_len, int srv_msg_len,
2994 int expected_cli_fragments,
2995 int expected_srv_fragments)
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05002996{
Gilles Peskine449bd832023-01-11 14:50:10 +01002997 test_app_data(mfl, cli_msg_len, srv_msg_len, expected_cli_fragments,
2998 expected_srv_fragments, 1);
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05002999 /* The goto below is used to avoid an "unused label" warning.*/
3000 goto exit;
3001}
3002/* END_CASE */
Andrzej Kurekda2b6782020-02-12 07:56:36 -05003003
Valerio Setti1494a092025-01-30 16:45:45 +01003004/* BEGIN_CASE depends_on:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED:MBEDTLS_PKCS1_V15:MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_RSA_C:PSA_WANT_ECC_SECP_R1_384:MBEDTLS_SSL_PROTO_DTLS:MBEDTLS_SSL_RENEGOTIATION:MBEDTLS_SSL_CONTEXT_SERIALIZATION:PSA_WANT_ALG_SHA_256:MBEDTLS_CAN_HANDLE_RSA_TEST_KEY:TEST_GCM_OR_CHACHAPOLY_ENABLED */
Gilles Peskine449bd832023-01-11 14:50:10 +01003005void handshake_serialization()
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05003006{
Yanray Wang9ef0dce2022-10-25 16:44:13 +08003007 mbedtls_test_handshake_test_options options;
Yanray Wangf7b62352022-10-26 11:51:53 +08003008 mbedtls_test_init_handshake_options(&options);
Andrzej Kurekda2b6782020-02-12 07:56:36 -05003009
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05003010 options.serialize = 1;
3011 options.dtls = 1;
Ronald Cron097ba142023-03-08 16:18:00 +01003012 options.expected_negotiated_version = MBEDTLS_SSL_VERSION_TLS1_2;
Yanray Wangf7b62352022-10-26 11:51:53 +08003013 mbedtls_test_ssl_perform_handshake(&options);
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05003014 /* The goto below is used to avoid an "unused label" warning.*/
3015 goto exit;
Andrzej Kurek6e518ab2022-06-11 05:08:38 -04003016exit:
Yanray Wangf7b62352022-10-26 11:51:53 +08003017 mbedtls_test_free_handshake_options(&options);
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05003018}
3019/* END_CASE */
Andrzej Kurekda2b6782020-02-12 07:56:36 -05003020
Valerio Settib8ef2a42025-01-20 11:07:09 +01003021/* BEGIN_CASE depends_on:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED:!MBEDTLS_SSL_PROTO_TLS1_3:MBEDTLS_PKCS1_V15:MBEDTLS_RSA_C:PSA_WANT_KEY_TYPE_AES:PSA_WANT_ECC_SECP_R1_384:MBEDTLS_DEBUG_C:MBEDTLS_SSL_MAX_FRAGMENT_LENGTH:PSA_WANT_ALG_CBC_NO_PADDING:PSA_WANT_ALG_SHA_384:MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED */
Gilles Peskine449bd832023-01-11 14:50:10 +01003022void handshake_fragmentation(int mfl,
3023 int expected_srv_hs_fragmentation,
3024 int expected_cli_hs_fragmentation)
Piotr Nowickibde7ee82020-02-21 10:59:50 +01003025{
Yanray Wang9ef0dce2022-10-25 16:44:13 +08003026 mbedtls_test_handshake_test_options options;
3027 mbedtls_test_ssl_log_pattern srv_pattern, cli_pattern;
Piotr Nowickibde7ee82020-02-21 10:59:50 +01003028
3029 srv_pattern.pattern = cli_pattern.pattern = "found fragmented DTLS handshake";
3030 srv_pattern.counter = 0;
3031 cli_pattern.counter = 0;
3032
Yanray Wangf7b62352022-10-26 11:51:53 +08003033 mbedtls_test_init_handshake_options(&options);
Piotr Nowickibde7ee82020-02-21 10:59:50 +01003034 options.dtls = 1;
Ronald Cron097ba142023-03-08 16:18:00 +01003035 options.expected_negotiated_version = MBEDTLS_SSL_VERSION_TLS1_2;
Piotr Nowickibde7ee82020-02-21 10:59:50 +01003036 options.mfl = mfl;
Darryl Greenaad82f92019-12-02 10:53:11 +00003037 /* Set cipher to one using CBC so that record splitting can be tested */
Valerio Settib8ef2a42025-01-20 11:07:09 +01003038 options.cipher = "TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA384";
Piotr Nowickibde7ee82020-02-21 10:59:50 +01003039 options.srv_auth_mode = MBEDTLS_SSL_VERIFY_REQUIRED;
3040 options.srv_log_obj = &srv_pattern;
3041 options.cli_log_obj = &cli_pattern;
Yanray Wangf7b62352022-10-26 11:51:53 +08003042 options.srv_log_fun = mbedtls_test_ssl_log_analyzer;
3043 options.cli_log_fun = mbedtls_test_ssl_log_analyzer;
Piotr Nowickibde7ee82020-02-21 10:59:50 +01003044
Yanray Wangf7b62352022-10-26 11:51:53 +08003045 mbedtls_test_ssl_perform_handshake(&options);
Piotr Nowickibde7ee82020-02-21 10:59:50 +01003046
3047 /* Test if the server received a fragmented handshake */
Gilles Peskine449bd832023-01-11 14:50:10 +01003048 if (expected_srv_hs_fragmentation) {
3049 TEST_ASSERT(srv_pattern.counter >= 1);
Piotr Nowickibde7ee82020-02-21 10:59:50 +01003050 }
3051 /* Test if the client received a fragmented handshake */
Gilles Peskine449bd832023-01-11 14:50:10 +01003052 if (expected_cli_hs_fragmentation) {
3053 TEST_ASSERT(cli_pattern.counter >= 1);
Piotr Nowickibde7ee82020-02-21 10:59:50 +01003054 }
Andrzej Kurek780dc182022-06-10 08:57:19 -04003055
3056exit:
Yanray Wangf7b62352022-10-26 11:51:53 +08003057 mbedtls_test_free_handshake_options(&options);
Piotr Nowickibde7ee82020-02-21 10:59:50 +01003058}
3059/* END_CASE */
3060
Gilles Peskine07426722025-03-07 23:01:42 +01003061/* This test case doesn't actually depend on certificates,
3062 * but our helper code for mbedtls_test_ssl_endpoint does. */
3063/* BEGIN_CASE depends_on:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED */
Gilles Peskine92122ed2025-03-07 20:40:50 +01003064void recombine_server_first_flight(int version,
3065 int instruction, int param,
3066 char *client_log, char *server_log,
3067 int goal_state, int expected_ret)
3068{
3069 enum { BUFFSIZE = 17000 };
Gilles Peskine7ab9fb62025-03-07 22:26:36 +01003070 mbedtls_test_ssl_endpoint client;
3071 memset(&client, 0, sizeof(client));
3072 mbedtls_test_ssl_endpoint server;
3073 memset(&server, 0, sizeof(server));
Gilles Peskine92122ed2025-03-07 20:40:50 +01003074 mbedtls_test_handshake_test_options client_options;
3075 mbedtls_test_init_handshake_options(&client_options);
3076 mbedtls_test_handshake_test_options server_options;
3077 mbedtls_test_init_handshake_options(&server_options);
3078#if defined(MBEDTLS_DEBUG_C)
3079 mbedtls_test_ssl_log_pattern cli_pattern = { .pattern = client_log };
3080 mbedtls_test_ssl_log_pattern srv_pattern = { .pattern = server_log };
3081#endif
3082 int ret = 0;
3083
3084 MD_OR_USE_PSA_INIT();
3085#if defined(MBEDTLS_DEBUG_C)
3086 mbedtls_debug_set_threshold(3);
3087#endif
3088
3089 client_options.client_min_version = version;
3090 client_options.client_max_version = version;
3091#if defined(MBEDTLS_DEBUG_C)
3092 client_options.cli_log_obj = &cli_pattern;
3093 client_options.cli_log_fun = mbedtls_test_ssl_log_analyzer;
3094#else
3095 (void) cli_pattern;
3096#endif
3097 TEST_EQUAL(mbedtls_test_ssl_endpoint_init(&client, MBEDTLS_SSL_IS_CLIENT,
3098 &client_options, NULL, NULL,
3099 NULL), 0);
3100#if defined(MBEDTLS_DEBUG_C)
3101 mbedtls_ssl_conf_dbg(&client.conf, client_options.cli_log_fun,
3102 client_options.cli_log_obj);
3103#endif
3104
3105 server_options.server_min_version = version;
3106 server_options.server_max_version = version;
3107#if defined(MBEDTLS_DEBUG_C)
3108 server_options.srv_log_obj = &srv_pattern;
3109 server_options.srv_log_fun = mbedtls_test_ssl_log_analyzer;
3110#else
3111 (void) srv_pattern;
3112#endif
3113 TEST_EQUAL(mbedtls_test_ssl_endpoint_init(&server, MBEDTLS_SSL_IS_SERVER,
3114 &server_options, NULL, NULL,
3115 NULL), 0);
3116#if defined(MBEDTLS_DEBUG_C)
3117 mbedtls_ssl_conf_dbg(&server.conf, server_options.srv_log_fun,
3118 server_options.srv_log_obj);
3119#endif
3120
3121 TEST_EQUAL(mbedtls_test_mock_socket_connect(&client.socket,
3122 &server.socket,
3123 BUFFSIZE), 0);
3124
3125 /* Client: emit the first flight from the client */
3126 while (ret == 0) {
3127 mbedtls_test_set_step(client.ssl.state);
3128 ret = mbedtls_ssl_handshake_step(&client.ssl);
3129 }
3130 TEST_EQUAL(ret, MBEDTLS_ERR_SSL_WANT_READ);
3131 ret = 0;
3132 TEST_EQUAL(client.ssl.state, MBEDTLS_SSL_SERVER_HELLO);
3133
3134 /* Server: parse the first flight from the client
3135 * and emit the first flight from the server */
3136 while (ret == 0) {
3137 mbedtls_test_set_step(1000 + server.ssl.state);
3138 ret = mbedtls_ssl_handshake_step(&server.ssl);
3139 }
3140 TEST_EQUAL(ret, MBEDTLS_ERR_SSL_WANT_READ);
3141 ret = 0;
3142 TEST_EQUAL(server.ssl.state, MBEDTLS_SSL_SERVER_HELLO_DONE + 1);
3143
3144 /* Recombine the first flight from the server */
3145 TEST_ASSERT(recombine_records(&server, instruction, param));
3146
3147 /* Client: parse the first flight from the server
3148 * and emit the second flight from the client */
3149 while (ret == 0 && !mbedtls_ssl_is_handshake_over(&client.ssl)) {
3150 mbedtls_test_set_step(client.ssl.state);
3151 ret = mbedtls_ssl_handshake_step(&client.ssl);
3152 if (client.ssl.state == goal_state && ret != 0) {
3153 TEST_EQUAL(ret, expected_ret);
3154 goto goal_reached;
3155 }
3156 }
3157#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
3158 if (version >= MBEDTLS_SSL_VERSION_TLS1_3 &&
3159 goal_state >= MBEDTLS_SSL_HANDSHAKE_OVER) {
3160 TEST_EQUAL(ret, 0);
3161 } else
3162#endif
3163 {
3164 TEST_EQUAL(ret, MBEDTLS_ERR_SSL_WANT_READ);
3165 }
3166 ret = 0;
3167
3168 /* Server: parse the first flight from the client
3169 * and emit the second flight from the server */
3170 while (ret == 0 && !mbedtls_ssl_is_handshake_over(&server.ssl)) {
3171 mbedtls_test_set_step(1000 + server.ssl.state);
3172 ret = mbedtls_ssl_handshake_step(&server.ssl);
3173 }
3174 TEST_EQUAL(ret, 0);
3175
3176 /* Client: parse the second flight from the server */
3177 while (ret == 0 && !mbedtls_ssl_is_handshake_over(&client.ssl)) {
3178 mbedtls_test_set_step(client.ssl.state);
3179 ret = mbedtls_ssl_handshake_step(&client.ssl);
3180 }
3181 if (client.ssl.state == goal_state) {
3182 TEST_EQUAL(ret, expected_ret);
3183 } else {
3184 TEST_EQUAL(ret, 0);
3185 }
3186
3187goal_reached:
3188#if defined(MBEDTLS_DEBUG_C)
3189 TEST_ASSERT(cli_pattern.counter >= 1);
3190 TEST_ASSERT(srv_pattern.counter >= 1);
3191#endif
3192
3193exit:
3194 mbedtls_test_ssl_endpoint_free(&client, NULL);
3195 mbedtls_test_ssl_endpoint_free(&server, NULL);
3196 mbedtls_test_free_handshake_options(&client_options);
3197 mbedtls_test_free_handshake_options(&server_options);
3198 MD_OR_USE_PSA_DONE();
3199#if defined(MBEDTLS_DEBUG_C)
3200 mbedtls_debug_set_threshold(0);
3201#endif
3202}
3203/* END_CASE */
3204
Elena Uziunaite6b4cd482024-07-04 17:50:11 +01003205/* BEGIN_CASE depends_on:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED:!MBEDTLS_SSL_PROTO_TLS1_3:MBEDTLS_PKCS1_V15:MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_RSA_C:PSA_WANT_ECC_SECP_R1_384:MBEDTLS_SSL_PROTO_DTLS:MBEDTLS_SSL_RENEGOTIATION:PSA_WANT_ALG_SHA_256:MBEDTLS_CAN_HANDLE_RSA_TEST_KEY */
Gilles Peskine449bd832023-01-11 14:50:10 +01003206void renegotiation(int legacy_renegotiation)
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05003207{
Yanray Wang9ef0dce2022-10-25 16:44:13 +08003208 mbedtls_test_handshake_test_options options;
Yanray Wangf7b62352022-10-26 11:51:53 +08003209 mbedtls_test_init_handshake_options(&options);
Andrzej Kurekda2b6782020-02-12 07:56:36 -05003210
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05003211 options.renegotiate = 1;
3212 options.legacy_renegotiation = legacy_renegotiation;
3213 options.dtls = 1;
Ronald Cron097ba142023-03-08 16:18:00 +01003214 options.expected_negotiated_version = MBEDTLS_SSL_VERSION_TLS1_2;
Andrzej Kurek316da1f2020-02-26 09:03:47 -05003215
Yanray Wangf7b62352022-10-26 11:51:53 +08003216 mbedtls_test_ssl_perform_handshake(&options);
Andrzej Kurek780dc182022-06-10 08:57:19 -04003217
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05003218 /* The goto below is used to avoid an "unused label" warning.*/
3219 goto exit;
Andrzej Kurekddb8cd62022-07-04 16:07:28 -04003220exit:
Yanray Wangf7b62352022-10-26 11:51:53 +08003221 mbedtls_test_free_handshake_options(&options);
Andrzej Kurekf40daa32020-02-04 09:00:01 -05003222}
3223/* END_CASE */
Andrzej Kurek0afa2a12020-03-03 10:39:58 -05003224
Gabor Mezei9ee58e42025-03-10 22:31:35 +01003225/* BEGIN_CASE depends_on:MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED:MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH:MBEDTLS_SSL_CONTEXT_SERIALIZATION:MBEDTLS_SSL_PROTO_TLS1_2:PSA_WANT_ECC_SECP_R1_384:MBEDTLS_SSL_PROTO_DTLS:PSA_WANT_ALG_SHA_256:MBEDTLS_TEST_HAS_AEAD_ALG */
Gilles Peskine449bd832023-01-11 14:50:10 +01003226void resize_buffers_serialize_mfl(int mfl)
Andrzej Kurek0afa2a12020-03-03 10:39:58 -05003227{
Gabor Mezei14950932025-03-06 16:06:42 +01003228 /* Choose an AEAD ciphersuite */
3229 const int *ciphersuites = mbedtls_ssl_list_ciphersuites();
3230 const mbedtls_ssl_ciphersuite_t *ciphersuite = NULL;
3231 int i = 0;
3232 while (ciphersuites[i] != 0) {
3233 ciphersuite = mbedtls_ssl_ciphersuite_from_id(ciphersuites[i]);
3234
3235 if (ciphersuite->min_tls_version == MBEDTLS_SSL_VERSION_TLS1_2) {
3236 const mbedtls_ssl_mode_t mode =
3237#if defined(MBEDTLS_SSL_SOME_SUITES_USE_CBC_ETM)
3238 mbedtls_ssl_get_mode_from_ciphersuite(0, ciphersuite);
3239#else
3240 mbedtls_ssl_get_mode_from_ciphersuite(ciphersuite);
3241#endif
Gabor Mezei8829aa32025-03-07 13:21:37 +01003242 if (mode == MBEDTLS_SSL_MODE_AEAD) {
Gabor Mezei14950932025-03-06 16:06:42 +01003243 break;
Gabor Mezei8829aa32025-03-07 13:21:37 +01003244 }
Gabor Mezei14950932025-03-06 16:06:42 +01003245 }
3246
3247 i++;
3248 }
3249
3250 TEST_ASSERT(ciphersuite != NULL);
3251
Gabor Mezei5ba9b572025-03-20 09:17:05 +01003252 resize_buffers(mfl, 0, MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION, 1, 1,
3253 (char *) ciphersuite->name);
Andrzej Kurek0afa2a12020-03-03 10:39:58 -05003254}
3255/* END_CASE */
3256
Gabor Mezei9ee58e42025-03-10 22:31:35 +01003257/* BEGIN_CASE depends_on:MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED:MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH:MBEDTLS_SSL_RENEGOTIATION:MBEDTLS_SSL_PROTO_TLS1_2:PSA_WANT_ECC_SECP_R1_384:PSA_WANT_ALG_SHA_256 */
Gilles Peskine449bd832023-01-11 14:50:10 +01003258void resize_buffers_renegotiate_mfl(int mfl, int legacy_renegotiation,
3259 char *cipher)
Andrzej Kurek0afa2a12020-03-03 10:39:58 -05003260{
Gabor Mezei5ba9b572025-03-20 09:17:05 +01003261 resize_buffers(mfl, 1, legacy_renegotiation, 0, 1, cipher);
Andrzej Kurek0afa2a12020-03-03 10:39:58 -05003262 /* The goto below is used to avoid an "unused label" warning.*/
3263 goto exit;
3264}
3265/* END_CASE */
Manuel Pégourié-Gonnard045f0942020-07-02 11:34:02 +02003266
Ronald Cron73fe8df2022-10-05 14:31:43 +02003267/* BEGIN_CASE depends_on:MBEDTLS_SSL_HANDSHAKE_WITH_PSK_ENABLED */
Hanno Becker6667ffd2021-04-19 21:59:22 +01003268void test_multiple_psks()
3269{
3270 unsigned char psk0[10] = { 0 };
3271 unsigned char psk0_identity[] = { 'f', 'o', 'o' };
3272
3273 unsigned char psk1[10] = { 0 };
3274 unsigned char psk1_identity[] = { 'b', 'a', 'r' };
3275
3276 mbedtls_ssl_config conf;
3277
Gilles Peskine449bd832023-01-11 14:50:10 +01003278 mbedtls_ssl_config_init(&conf);
valerio32f2ac92023-04-20 11:59:52 +02003279 MD_OR_USE_PSA_INIT();
Hanno Becker6667ffd2021-04-19 21:59:22 +01003280
Gilles Peskine449bd832023-01-11 14:50:10 +01003281 TEST_ASSERT(mbedtls_ssl_conf_psk(&conf,
3282 psk0, sizeof(psk0),
3283 psk0_identity, sizeof(psk0_identity)) == 0);
3284 TEST_ASSERT(mbedtls_ssl_conf_psk(&conf,
3285 psk1, sizeof(psk1),
3286 psk1_identity, sizeof(psk1_identity)) ==
3287 MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE);
Hanno Becker6667ffd2021-04-19 21:59:22 +01003288
3289exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01003290 mbedtls_ssl_config_free(&conf);
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01003291 MD_OR_USE_PSA_DONE();
Hanno Becker6667ffd2021-04-19 21:59:22 +01003292}
3293/* END_CASE */
3294
Ronald Cron73fe8df2022-10-05 14:31:43 +02003295/* BEGIN_CASE depends_on:MBEDTLS_SSL_HANDSHAKE_WITH_PSK_ENABLED:MBEDTLS_USE_PSA_CRYPTO */
Gilles Peskine449bd832023-01-11 14:50:10 +01003296void test_multiple_psks_opaque(int mode)
Hanno Becker6667ffd2021-04-19 21:59:22 +01003297{
3298 /*
3299 * Mode 0: Raw PSK, then opaque PSK
3300 * Mode 1: Opaque PSK, then raw PSK
3301 * Mode 2: 2x opaque PSK
3302 */
3303
3304 unsigned char psk0_raw[10] = { 0 };
3305 unsigned char psk0_raw_identity[] = { 'f', 'o', 'o' };
3306
Gilles Peskine449bd832023-01-11 14:50:10 +01003307 mbedtls_svc_key_id_t psk0_opaque = mbedtls_svc_key_id_make(0x1, (psa_key_id_t) 1);
Andrzej Kurek03e01462022-01-03 12:53:24 +01003308
Hanno Becker6667ffd2021-04-19 21:59:22 +01003309 unsigned char psk0_opaque_identity[] = { 'f', 'o', 'o' };
3310
3311 unsigned char psk1_raw[10] = { 0 };
3312 unsigned char psk1_raw_identity[] = { 'b', 'a', 'r' };
3313
Gilles Peskine449bd832023-01-11 14:50:10 +01003314 mbedtls_svc_key_id_t psk1_opaque = mbedtls_svc_key_id_make(0x1, (psa_key_id_t) 2);
Andrzej Kurek03e01462022-01-03 12:53:24 +01003315
Hanno Becker6667ffd2021-04-19 21:59:22 +01003316 unsigned char psk1_opaque_identity[] = { 'b', 'a', 'r' };
3317
3318 mbedtls_ssl_config conf;
3319
Gilles Peskine449bd832023-01-11 14:50:10 +01003320 mbedtls_ssl_config_init(&conf);
valerio32f2ac92023-04-20 11:59:52 +02003321 MD_OR_USE_PSA_INIT();
Hanno Becker6667ffd2021-04-19 21:59:22 +01003322
Gilles Peskine449bd832023-01-11 14:50:10 +01003323 switch (mode) {
Hanno Becker6667ffd2021-04-19 21:59:22 +01003324 case 0:
3325
Gilles Peskine449bd832023-01-11 14:50:10 +01003326 TEST_ASSERT(mbedtls_ssl_conf_psk(&conf,
3327 psk0_raw, sizeof(psk0_raw),
3328 psk0_raw_identity, sizeof(psk0_raw_identity))
3329 == 0);
3330 TEST_ASSERT(mbedtls_ssl_conf_psk_opaque(&conf,
3331 psk1_opaque,
3332 psk1_opaque_identity,
3333 sizeof(psk1_opaque_identity))
3334 == MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE);
Hanno Becker6667ffd2021-04-19 21:59:22 +01003335 break;
3336
3337 case 1:
3338
Gilles Peskine449bd832023-01-11 14:50:10 +01003339 TEST_ASSERT(mbedtls_ssl_conf_psk_opaque(&conf,
3340 psk0_opaque,
3341 psk0_opaque_identity,
3342 sizeof(psk0_opaque_identity))
3343 == 0);
3344 TEST_ASSERT(mbedtls_ssl_conf_psk(&conf,
3345 psk1_raw, sizeof(psk1_raw),
3346 psk1_raw_identity, sizeof(psk1_raw_identity))
3347 == MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE);
Hanno Becker6667ffd2021-04-19 21:59:22 +01003348
3349 break;
3350
3351 case 2:
3352
Gilles Peskine449bd832023-01-11 14:50:10 +01003353 TEST_ASSERT(mbedtls_ssl_conf_psk_opaque(&conf,
3354 psk0_opaque,
3355 psk0_opaque_identity,
3356 sizeof(psk0_opaque_identity))
3357 == 0);
3358 TEST_ASSERT(mbedtls_ssl_conf_psk_opaque(&conf,
3359 psk1_opaque,
3360 psk1_opaque_identity,
3361 sizeof(psk1_opaque_identity))
3362 == MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE);
Hanno Becker6667ffd2021-04-19 21:59:22 +01003363
3364 break;
3365
3366 default:
Gilles Peskine449bd832023-01-11 14:50:10 +01003367 TEST_ASSERT(0);
Hanno Becker6667ffd2021-04-19 21:59:22 +01003368 break;
3369 }
3370
3371exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01003372 mbedtls_ssl_config_free(&conf);
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01003373 MD_OR_USE_PSA_DONE();
Hanno Becker6667ffd2021-04-19 21:59:22 +01003374
3375}
3376/* END_CASE */
Brett Warren7f813d52021-10-20 23:08:38 +01003377
Ronald Cron37bdaab2022-03-30 16:45:51 +02003378/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +01003379void conf_version(int endpoint, int transport,
3380 int min_tls_version, int max_tls_version,
3381 int expected_ssl_setup_result)
Ronald Cron37bdaab2022-03-30 16:45:51 +02003382{
3383 mbedtls_ssl_config conf;
3384 mbedtls_ssl_context ssl;
3385
Gilles Peskine449bd832023-01-11 14:50:10 +01003386 mbedtls_ssl_config_init(&conf);
3387 mbedtls_ssl_init(&ssl);
valerio32f2ac92023-04-20 11:59:52 +02003388 MD_OR_USE_PSA_INIT();
Ronald Cron37bdaab2022-03-30 16:45:51 +02003389
Gilles Peskine449bd832023-01-11 14:50:10 +01003390 mbedtls_ssl_conf_endpoint(&conf, endpoint);
3391 mbedtls_ssl_conf_transport(&conf, transport);
3392 mbedtls_ssl_conf_min_tls_version(&conf, min_tls_version);
3393 mbedtls_ssl_conf_max_tls_version(&conf, max_tls_version);
Ronald Cron37bdaab2022-03-30 16:45:51 +02003394
Gilles Peskine449bd832023-01-11 14:50:10 +01003395 TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == expected_ssl_setup_result);
Pengyu Lvdb614332023-07-10 10:56:54 +08003396 TEST_EQUAL(mbedtls_ssl_conf_get_endpoint(
3397 mbedtls_ssl_context_get_config(&ssl)), endpoint);
Ronald Cron37bdaab2022-03-30 16:45:51 +02003398
Gilles Peskine449bd832023-01-11 14:50:10 +01003399 mbedtls_ssl_free(&ssl);
3400 mbedtls_ssl_config_free(&conf);
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01003401
3402exit:
3403 MD_OR_USE_PSA_DONE();
Ronald Cron37bdaab2022-03-30 16:45:51 +02003404}
3405/* END_CASE */
3406
Manuel Pégourié-Gonnard4c3134a2025-01-14 12:25:52 +01003407/* BEGIN_CASE */
Brett Warren7f813d52021-10-20 23:08:38 +01003408void conf_group()
3409{
3410 uint16_t iana_tls_group_list[] = { MBEDTLS_SSL_IANA_TLS_GROUP_SECP192R1,
Gilles Peskine449bd832023-01-11 14:50:10 +01003411 MBEDTLS_SSL_IANA_TLS_GROUP_SECP224R1,
3412 MBEDTLS_SSL_IANA_TLS_GROUP_SECP256R1,
3413 MBEDTLS_SSL_IANA_TLS_GROUP_NONE };
Brett Warren7f813d52021-10-20 23:08:38 +01003414
3415 mbedtls_ssl_config conf;
Gilles Peskine449bd832023-01-11 14:50:10 +01003416 mbedtls_ssl_config_init(&conf);
Brett Warren7f813d52021-10-20 23:08:38 +01003417
Manuel Pégourié-Gonnardc4e768a2025-01-22 10:04:43 +01003418 mbedtls_ssl_config_defaults(&conf, MBEDTLS_SSL_IS_CLIENT,
3419 MBEDTLS_SSL_TRANSPORT_STREAM,
3420 MBEDTLS_SSL_PRESET_DEFAULT);
Brett Warren7f813d52021-10-20 23:08:38 +01003421
Gilles Peskine449bd832023-01-11 14:50:10 +01003422 mbedtls_ssl_conf_groups(&conf, iana_tls_group_list);
Brett Warren7f813d52021-10-20 23:08:38 +01003423
3424 mbedtls_ssl_context ssl;
Gilles Peskine449bd832023-01-11 14:50:10 +01003425 mbedtls_ssl_init(&ssl);
valerio32f2ac92023-04-20 11:59:52 +02003426 MD_OR_USE_PSA_INIT();
3427
Gilles Peskine449bd832023-01-11 14:50:10 +01003428 TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
Brett Warren7f813d52021-10-20 23:08:38 +01003429
Gilles Peskine449bd832023-01-11 14:50:10 +01003430 TEST_ASSERT(ssl.conf != NULL && ssl.conf->group_list != NULL);
Brett Warren7f813d52021-10-20 23:08:38 +01003431
Yanray Wangd577a682022-10-27 11:47:54 +08003432 TEST_EQUAL(ssl.conf->
3433 group_list[ARRAY_LENGTH(iana_tls_group_list) - 1],
Gilles Peskine449bd832023-01-11 14:50:10 +01003434 MBEDTLS_SSL_IANA_TLS_GROUP_NONE);
Brett Warren7f813d52021-10-20 23:08:38 +01003435
Gilles Peskine449bd832023-01-11 14:50:10 +01003436 for (size_t i = 0; i < ARRAY_LENGTH(iana_tls_group_list); i++) {
3437 TEST_EQUAL(iana_tls_group_list[i], ssl.conf->group_list[i]);
3438 }
Brett Warren7f813d52021-10-20 23:08:38 +01003439
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01003440exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01003441 mbedtls_ssl_free(&ssl);
3442 mbedtls_ssl_config_free(&conf);
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01003443 MD_OR_USE_PSA_DONE();
Brett Warren7f813d52021-10-20 23:08:38 +01003444}
3445/* END_CASE */
Paul Elliottb9af2db2022-03-09 15:34:37 +00003446
Elena Uziunaite6b4cd482024-07-04 17:50:11 +01003447/* BEGIN_CASE depends_on:MBEDTLS_SSL_SRV_C:MBEDTLS_SSL_CACHE_C:!MBEDTLS_SSL_PROTO_TLS1_3:MBEDTLS_DEBUG_C:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED:MBEDTLS_RSA_C:PSA_WANT_ECC_SECP_R1_384:MBEDTLS_PKCS1_V15:PSA_WANT_ALG_SHA_256 */
Gilles Peskine449bd832023-01-11 14:50:10 +01003448void force_bad_session_id_len()
Andrzej Kurek514683a2022-06-10 10:33:05 -04003449{
3450 enum { BUFFSIZE = 1024 };
Yanray Wang9ef0dce2022-10-25 16:44:13 +08003451 mbedtls_test_handshake_test_options options;
3452 mbedtls_test_ssl_endpoint client, server;
3453 mbedtls_test_ssl_log_pattern srv_pattern, cli_pattern;
Andrzej Kurek514683a2022-06-10 10:33:05 -04003454 mbedtls_test_message_socket_context server_context, client_context;
3455
3456 srv_pattern.pattern = cli_pattern.pattern = "cache did not store session";
3457 srv_pattern.counter = 0;
Yanray Wangf7b62352022-10-26 11:51:53 +08003458 mbedtls_test_init_handshake_options(&options);
Andrzej Kurek514683a2022-06-10 10:33:05 -04003459
3460 options.srv_log_obj = &srv_pattern;
Yanray Wangf7b62352022-10-26 11:51:53 +08003461 options.srv_log_fun = mbedtls_test_ssl_log_analyzer;
Andrzej Kurek514683a2022-06-10 10:33:05 -04003462
Gilles Peskine449bd832023-01-11 14:50:10 +01003463 mbedtls_platform_zeroize(&client, sizeof(client));
3464 mbedtls_platform_zeroize(&server, sizeof(server));
Andrzej Kurek514683a2022-06-10 10:33:05 -04003465
Yanray Wangf7b62352022-10-26 11:51:53 +08003466 mbedtls_test_message_socket_init(&server_context);
3467 mbedtls_test_message_socket_init(&client_context);
Valerio Setti00a256f2023-04-27 17:22:27 +02003468 MD_OR_USE_PSA_INIT();
Andrzej Kurek514683a2022-06-10 10:33:05 -04003469
Yanray Wangf7b62352022-10-26 11:51:53 +08003470 TEST_ASSERT(mbedtls_test_ssl_endpoint_init(&client, MBEDTLS_SSL_IS_CLIENT,
3471 &options, NULL, NULL,
Ronald Cronfb536472024-01-26 14:55:25 +01003472 NULL) == 0);
Andrzej Kurek514683a2022-06-10 10:33:05 -04003473
Yanray Wangf7b62352022-10-26 11:51:53 +08003474 TEST_ASSERT(mbedtls_test_ssl_endpoint_init(&server, MBEDTLS_SSL_IS_SERVER,
Ronald Cronfb536472024-01-26 14:55:25 +01003475 &options, NULL, NULL, NULL) == 0);
Andrzej Kurek514683a2022-06-10 10:33:05 -04003476
Gilles Peskine449bd832023-01-11 14:50:10 +01003477 mbedtls_debug_set_threshold(1);
3478 mbedtls_ssl_conf_dbg(&server.conf, options.srv_log_fun,
3479 options.srv_log_obj);
Andrzej Kurek514683a2022-06-10 10:33:05 -04003480
Yanray Wangf7b62352022-10-26 11:51:53 +08003481 TEST_ASSERT(mbedtls_test_mock_socket_connect(&(client.socket),
3482 &(server.socket),
3483 BUFFSIZE) == 0);
Andrzej Kurek514683a2022-06-10 10:33:05 -04003484
Yanray Wangbd296832022-10-26 18:28:11 +08003485 TEST_ASSERT(mbedtls_test_move_handshake_to_state(
3486 &(client.ssl), &(server.ssl), MBEDTLS_SSL_HANDSHAKE_WRAPUP)
Gilles Peskine449bd832023-01-11 14:50:10 +01003487 == 0);
Andrzej Kurek514683a2022-06-10 10:33:05 -04003488 /* Force a bad session_id_len that will be read by the server in
3489 * mbedtls_ssl_cache_set. */
3490 server.ssl.session_negotiate->id_len = 33;
Gilles Peskine449bd832023-01-11 14:50:10 +01003491 if (options.cli_msg_len != 0 || options.srv_msg_len != 0) {
Andrzej Kurek514683a2022-06-10 10:33:05 -04003492 /* Start data exchanging test */
Yanray Wangb088bfc2023-03-16 12:15:49 +08003493 TEST_ASSERT(mbedtls_test_ssl_exchange_data(
3494 &(client.ssl), options.cli_msg_len,
3495 options.expected_cli_fragments,
3496 &(server.ssl), options.srv_msg_len,
3497 options.expected_srv_fragments)
Gilles Peskine449bd832023-01-11 14:50:10 +01003498 == 0);
Andrzej Kurek514683a2022-06-10 10:33:05 -04003499 }
Andrzej Kurek514683a2022-06-10 10:33:05 -04003500
3501 /* Make sure that the cache did not store the session */
Gilles Peskine449bd832023-01-11 14:50:10 +01003502 TEST_EQUAL(srv_pattern.counter, 1);
Andrzej Kurek514683a2022-06-10 10:33:05 -04003503exit:
Yanray Wangf7b62352022-10-26 11:51:53 +08003504 mbedtls_test_ssl_endpoint_free(&client, NULL);
3505 mbedtls_test_ssl_endpoint_free(&server, NULL);
3506 mbedtls_test_free_handshake_options(&options);
Gilles Peskine449bd832023-01-11 14:50:10 +01003507 mbedtls_debug_set_threshold(0);
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01003508 MD_OR_USE_PSA_DONE();
Andrzej Kurek514683a2022-06-10 10:33:05 -04003509}
3510/* END_CASE */
3511
Andrzej Kureked4d2172022-06-08 11:57:57 -04003512/* BEGIN_CASE depends_on:MBEDTLS_SSL_SRV_C:MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE:MBEDTLS_TEST_HOOKS */
Gilles Peskine449bd832023-01-11 14:50:10 +01003513void cookie_parsing(data_t *cookie, int exp_ret)
Andrzej Kurekcfb01942022-06-06 13:08:23 -04003514{
3515 mbedtls_ssl_context ssl;
3516 mbedtls_ssl_config conf;
3517 size_t len;
3518
Gilles Peskine449bd832023-01-11 14:50:10 +01003519 mbedtls_ssl_init(&ssl);
3520 mbedtls_ssl_config_init(&conf);
valerio32f2ac92023-04-20 11:59:52 +02003521 USE_PSA_INIT();
3522
Gilles Peskine449bd832023-01-11 14:50:10 +01003523 TEST_EQUAL(mbedtls_ssl_config_defaults(&conf, MBEDTLS_SSL_IS_SERVER,
3524 MBEDTLS_SSL_TRANSPORT_DATAGRAM,
3525 MBEDTLS_SSL_PRESET_DEFAULT),
3526 0);
Andrzej Kurekcfb01942022-06-06 13:08:23 -04003527
Gilles Peskine449bd832023-01-11 14:50:10 +01003528 TEST_EQUAL(mbedtls_ssl_setup(&ssl, &conf), 0);
3529 TEST_EQUAL(mbedtls_ssl_check_dtls_clihlo_cookie(&ssl, ssl.cli_id,
3530 ssl.cli_id_len,
3531 cookie->x, cookie->len,
3532 ssl.out_buf,
3533 MBEDTLS_SSL_OUT_CONTENT_LEN,
3534 &len),
3535 exp_ret);
Andrzej Kurekcfb01942022-06-06 13:08:23 -04003536
valerio32f2ac92023-04-20 11:59:52 +02003537exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01003538 mbedtls_ssl_free(&ssl);
3539 mbedtls_ssl_config_free(&conf);
Valerio Setti285dae82023-04-19 15:10:45 +02003540 USE_PSA_DONE();
Andrzej Kurekcfb01942022-06-06 13:08:23 -04003541}
3542/* END_CASE */
3543
Paul Elliottb9af2db2022-03-09 15:34:37 +00003544/* BEGIN_CASE depends_on:MBEDTLS_TIMING_C:MBEDTLS_HAVE_TIME */
Gilles Peskine449bd832023-01-11 14:50:10 +01003545void timing_final_delay_accessor()
Paul Elliottb9af2db2022-03-09 15:34:37 +00003546{
3547 mbedtls_timing_delay_context delay_context;
3548
Valerio Setti285dae82023-04-19 15:10:45 +02003549 USE_PSA_INIT();
Gilles Peskine449bd832023-01-11 14:50:10 +01003550 mbedtls_timing_set_delay(&delay_context, 50, 100);
Paul Elliottb9af2db2022-03-09 15:34:37 +00003551
Gilles Peskine449bd832023-01-11 14:50:10 +01003552 TEST_ASSERT(mbedtls_timing_get_final_delay(&delay_context) == 100);
valerio32f2ac92023-04-20 11:59:52 +02003553
3554exit:
Valerio Setti285dae82023-04-19 15:10:45 +02003555 USE_PSA_DONE();
Paul Elliottb9af2db2022-03-09 15:34:37 +00003556}
3557/* END_CASE */
Paul Elliott02758a52022-03-16 14:32:33 +00003558
3559/* BEGIN_CASE depends_on:MBEDTLS_SSL_DTLS_CONNECTION_ID */
Gilles Peskine449bd832023-01-11 14:50:10 +01003560void cid_sanity()
Paul Elliott02758a52022-03-16 14:32:33 +00003561{
3562 mbedtls_ssl_context ssl;
3563 mbedtls_ssl_config conf;
3564
3565 unsigned char own_cid[MBEDTLS_SSL_CID_IN_LEN_MAX];
3566 unsigned char test_cid[MBEDTLS_SSL_CID_IN_LEN_MAX];
3567 int cid_enabled;
3568 size_t own_cid_len;
3569
Gilles Peskine449bd832023-01-11 14:50:10 +01003570 mbedtls_test_rnd_std_rand(NULL, own_cid, sizeof(own_cid));
Paul Elliott02758a52022-03-16 14:32:33 +00003571
Gilles Peskine449bd832023-01-11 14:50:10 +01003572 mbedtls_ssl_init(&ssl);
3573 mbedtls_ssl_config_init(&conf);
valerio32f2ac92023-04-20 11:59:52 +02003574 MD_OR_USE_PSA_INIT();
Paul Elliott02758a52022-03-16 14:32:33 +00003575
Gilles Peskine449bd832023-01-11 14:50:10 +01003576 TEST_ASSERT(mbedtls_ssl_config_defaults(&conf,
3577 MBEDTLS_SSL_IS_CLIENT,
3578 MBEDTLS_SSL_TRANSPORT_STREAM,
3579 MBEDTLS_SSL_PRESET_DEFAULT)
3580 == 0);
Paul Elliott02758a52022-03-16 14:32:33 +00003581
Gilles Peskine449bd832023-01-11 14:50:10 +01003582 TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
Paul Elliott02758a52022-03-16 14:32:33 +00003583
3584 /* Can't use CID functions with stream transport. */
Gilles Peskine449bd832023-01-11 14:50:10 +01003585 TEST_ASSERT(mbedtls_ssl_set_cid(&ssl, MBEDTLS_SSL_CID_ENABLED, own_cid,
3586 sizeof(own_cid))
3587 == MBEDTLS_ERR_SSL_BAD_INPUT_DATA);
Paul Elliott02758a52022-03-16 14:32:33 +00003588
Gilles Peskine449bd832023-01-11 14:50:10 +01003589 TEST_ASSERT(mbedtls_ssl_get_own_cid(&ssl, &cid_enabled, test_cid,
3590 &own_cid_len)
3591 == MBEDTLS_ERR_SSL_BAD_INPUT_DATA);
Paul Elliott02758a52022-03-16 14:32:33 +00003592
Gilles Peskine449bd832023-01-11 14:50:10 +01003593 TEST_ASSERT(mbedtls_ssl_config_defaults(&conf,
3594 MBEDTLS_SSL_IS_CLIENT,
3595 MBEDTLS_SSL_TRANSPORT_DATAGRAM,
3596 MBEDTLS_SSL_PRESET_DEFAULT)
3597 == 0);
Paul Elliott02758a52022-03-16 14:32:33 +00003598
3599 /* Attempt to set config cid size too big. */
Gilles Peskine449bd832023-01-11 14:50:10 +01003600 TEST_ASSERT(mbedtls_ssl_conf_cid(&conf, MBEDTLS_SSL_CID_IN_LEN_MAX + 1,
3601 MBEDTLS_SSL_UNEXPECTED_CID_IGNORE)
3602 == MBEDTLS_ERR_SSL_BAD_INPUT_DATA);
Paul Elliott02758a52022-03-16 14:32:33 +00003603
Gilles Peskine449bd832023-01-11 14:50:10 +01003604 TEST_ASSERT(mbedtls_ssl_conf_cid(&conf, sizeof(own_cid),
3605 MBEDTLS_SSL_UNEXPECTED_CID_IGNORE)
3606 == 0);
Paul Elliott02758a52022-03-16 14:32:33 +00003607
3608 /* Attempt to set CID length not matching config. */
Gilles Peskine449bd832023-01-11 14:50:10 +01003609 TEST_ASSERT(mbedtls_ssl_set_cid(&ssl, MBEDTLS_SSL_CID_ENABLED, own_cid,
3610 MBEDTLS_SSL_CID_IN_LEN_MAX - 1)
3611 == MBEDTLS_ERR_SSL_BAD_INPUT_DATA);
Paul Elliott02758a52022-03-16 14:32:33 +00003612
Gilles Peskine449bd832023-01-11 14:50:10 +01003613 TEST_ASSERT(mbedtls_ssl_set_cid(&ssl, MBEDTLS_SSL_CID_ENABLED, own_cid,
3614 sizeof(own_cid))
3615 == 0);
Paul Elliott02758a52022-03-16 14:32:33 +00003616
3617 /* Test we get back what we put in. */
Gilles Peskine449bd832023-01-11 14:50:10 +01003618 TEST_ASSERT(mbedtls_ssl_get_own_cid(&ssl, &cid_enabled, test_cid,
3619 &own_cid_len)
3620 == 0);
Paul Elliott02758a52022-03-16 14:32:33 +00003621
Gilles Peskine449bd832023-01-11 14:50:10 +01003622 TEST_EQUAL(cid_enabled, MBEDTLS_SSL_CID_ENABLED);
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +01003623 TEST_MEMORY_COMPARE(own_cid, own_cid_len, test_cid, own_cid_len);
Paul Elliott02758a52022-03-16 14:32:33 +00003624
3625 /* Test disabling works. */
Gilles Peskine449bd832023-01-11 14:50:10 +01003626 TEST_ASSERT(mbedtls_ssl_set_cid(&ssl, MBEDTLS_SSL_CID_DISABLED, NULL,
3627 0)
3628 == 0);
Paul Elliott02758a52022-03-16 14:32:33 +00003629
Gilles Peskine449bd832023-01-11 14:50:10 +01003630 TEST_ASSERT(mbedtls_ssl_get_own_cid(&ssl, &cid_enabled, test_cid,
3631 &own_cid_len)
3632 == 0);
Paul Elliott02758a52022-03-16 14:32:33 +00003633
Gilles Peskine449bd832023-01-11 14:50:10 +01003634 TEST_EQUAL(cid_enabled, MBEDTLS_SSL_CID_DISABLED);
Paul Elliott02758a52022-03-16 14:32:33 +00003635
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01003636exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01003637 mbedtls_ssl_free(&ssl);
3638 mbedtls_ssl_config_free(&conf);
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01003639 MD_OR_USE_PSA_DONE();
Paul Elliott02758a52022-03-16 14:32:33 +00003640}
3641/* END_CASE */
3642
Elena Uziunaite8d8620b2024-09-03 14:13:50 +01003643/* BEGIN_CASE depends_on:MBEDTLS_PSA_CRYPTO_C:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED:MBEDTLS_USE_PSA_CRYPTO:MBEDTLS_PKCS1_V15:MBEDTLS_SSL_PROTO_TLS1_2:PSA_WANT_ECC_SECP_R1_256:MBEDTLS_RSA_C:PSA_WANT_ECC_SECP_R1_384:PSA_HAVE_ALG_SOME_ECDSA:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT */
Gilles Peskine449bd832023-01-11 14:50:10 +01003644void raw_key_agreement_fail(int bad_server_ecdhe_key)
Andrzej Kurekb3427822022-03-08 06:55:42 -05003645{
3646 enum { BUFFSIZE = 17000 };
Yanray Wang9ef0dce2022-10-25 16:44:13 +08003647 mbedtls_test_ssl_endpoint client, server;
Andrzej Kurekb3427822022-03-08 06:55:42 -05003648 mbedtls_psa_stats_t stats;
Andrzej Kurek39d88d42022-03-31 06:30:54 -04003649 size_t free_slots_before = -1;
Ronald Cronfb536472024-01-26 14:55:25 +01003650 mbedtls_test_handshake_test_options client_options, server_options;
3651 mbedtls_test_init_handshake_options(&client_options);
3652 mbedtls_test_init_handshake_options(&server_options);
Andrzej Kurekb3427822022-03-08 06:55:42 -05003653
Andrzej Kurekcc28e9a2022-03-08 18:36:35 -05003654 uint16_t iana_tls_group_list[] = { MBEDTLS_SSL_IANA_TLS_GROUP_SECP256R1,
3655 MBEDTLS_SSL_IANA_TLS_GROUP_NONE };
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01003656 MD_OR_USE_PSA_INIT();
Gilles Peskine449bd832023-01-11 14:50:10 +01003657 mbedtls_platform_zeroize(&client, sizeof(client));
3658 mbedtls_platform_zeroize(&server, sizeof(server));
Andrzej Kurekb3427822022-03-08 06:55:42 -05003659
3660 /* Client side, force SECP256R1 to make one key bitflip fail
Andrzej Kurek83e60ee2022-04-14 08:51:41 -04003661 * the raw key agreement. Flipping the first byte makes the
3662 * required 0x04 identifier invalid. */
Ronald Cronfb536472024-01-26 14:55:25 +01003663 client_options.pk_alg = MBEDTLS_PK_ECDSA;
3664 client_options.group_list = iana_tls_group_list;
Yanray Wangf7b62352022-10-26 11:51:53 +08003665 TEST_EQUAL(mbedtls_test_ssl_endpoint_init(&client, MBEDTLS_SSL_IS_CLIENT,
Ronald Cronfb536472024-01-26 14:55:25 +01003666 &client_options, NULL, NULL,
3667 NULL), 0);
Andrzej Kurekb3427822022-03-08 06:55:42 -05003668
3669 /* Server side */
Ronald Cronfb536472024-01-26 14:55:25 +01003670 server_options.pk_alg = MBEDTLS_PK_ECDSA;
3671 server_options.server_min_version = MBEDTLS_SSL_VERSION_TLS1_2;
3672 server_options.server_max_version = MBEDTLS_SSL_VERSION_TLS1_2;
Yanray Wangf7b62352022-10-26 11:51:53 +08003673 TEST_EQUAL(mbedtls_test_ssl_endpoint_init(&server, MBEDTLS_SSL_IS_SERVER,
Ronald Cronfb536472024-01-26 14:55:25 +01003674 &server_options, NULL, NULL,
3675 NULL), 0);
Andrzej Kurekb3427822022-03-08 06:55:42 -05003676
Yanray Wangf7b62352022-10-26 11:51:53 +08003677 TEST_EQUAL(mbedtls_test_mock_socket_connect(&(client.socket),
3678 &(server.socket),
3679 BUFFSIZE), 0);
Andrzej Kurekb3427822022-03-08 06:55:42 -05003680
Yanray Wangbd296832022-10-26 18:28:11 +08003681 TEST_EQUAL(mbedtls_test_move_handshake_to_state(
3682 &(client.ssl), &(server.ssl),
3683 MBEDTLS_SSL_CLIENT_KEY_EXCHANGE), 0);
Andrzej Kurekb3427822022-03-08 06:55:42 -05003684
Gilles Peskine449bd832023-01-11 14:50:10 +01003685 mbedtls_psa_get_stats(&stats);
Andrzej Kurek39d88d42022-03-31 06:30:54 -04003686 /* Save the number of slots in use up to this point.
3687 * With PSA, one can be used for the ECDH private key. */
3688 free_slots_before = stats.empty_slots;
Andrzej Kurekcb33bc52022-03-31 07:17:18 -04003689
Gilles Peskine449bd832023-01-11 14:50:10 +01003690 if (bad_server_ecdhe_key) {
Gilles Peskineb4f874d2022-04-08 16:48:09 -04003691 /* Force a simulated bitflip in the server key. to make the
3692 * raw key agreement in ssl_write_client_key_exchange fail. */
Przemek Stekiel7ac93be2023-07-04 10:02:38 +02003693 (client.ssl).handshake->xxdh_psa_peerkey[0] ^= 0x02;
Gilles Peskineb4f874d2022-04-08 16:48:09 -04003694 }
Andrzej Kurekb3427822022-03-08 06:55:42 -05003695
Yanray Wangbd296832022-10-26 18:28:11 +08003696 TEST_EQUAL(mbedtls_test_move_handshake_to_state(
3697 &(client.ssl), &(server.ssl), MBEDTLS_SSL_HANDSHAKE_OVER),
Gilles Peskine449bd832023-01-11 14:50:10 +01003698 bad_server_ecdhe_key ? MBEDTLS_ERR_SSL_HW_ACCEL_FAILED : 0);
Andrzej Kurekb3427822022-03-08 06:55:42 -05003699
Gilles Peskine449bd832023-01-11 14:50:10 +01003700 mbedtls_psa_get_stats(&stats);
Andrzej Kurekb3427822022-03-08 06:55:42 -05003701
Gilles Peskineb4f874d2022-04-08 16:48:09 -04003702 /* Make sure that the key slot is already destroyed in case of failure,
3703 * without waiting to close the connection. */
Gilles Peskine449bd832023-01-11 14:50:10 +01003704 if (bad_server_ecdhe_key) {
3705 TEST_EQUAL(free_slots_before, stats.empty_slots);
3706 }
Andrzej Kurekb3427822022-03-08 06:55:42 -05003707
3708exit:
Yanray Wangf7b62352022-10-26 11:51:53 +08003709 mbedtls_test_ssl_endpoint_free(&client, NULL);
3710 mbedtls_test_ssl_endpoint_free(&server, NULL);
Ronald Cronfb536472024-01-26 14:55:25 +01003711 mbedtls_test_free_handshake_options(&client_options);
3712 mbedtls_test_free_handshake_options(&server_options);
Andrzej Kurekcb33bc52022-03-31 07:17:18 -04003713
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01003714 MD_OR_USE_PSA_DONE();
Andrzej Kurekb3427822022-03-08 06:55:42 -05003715}
3716/* END_CASE */
Elena Uziunaite6b4cd482024-07-04 17:50:11 +01003717/* BEGIN_CASE depends_on:MBEDTLS_TEST_HOOKS:MBEDTLS_SSL_PROTO_TLS1_3:!MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_SSL_CLI_C:MBEDTLS_SSL_SRV_C:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED:PSA_WANT_ECC_SECP_R1_384 */
Gilles Peskine449bd832023-01-11 14:50:10 +01003718void tls13_server_certificate_msg_invalid_vector_len()
Ronald Crone3dac4a2022-06-10 17:21:51 +02003719{
3720 int ret = -1;
Yanray Wang9ef0dce2022-10-25 16:44:13 +08003721 mbedtls_test_ssl_endpoint client_ep, server_ep;
Ronald Crone3dac4a2022-06-10 17:21:51 +02003722 unsigned char *buf, *end;
3723 size_t buf_len;
3724 int step = 0;
3725 int expected_result;
Ronald Crone7b9b6b2022-06-10 17:24:31 +02003726 mbedtls_ssl_chk_buf_ptr_args expected_chk_buf_ptr_args;
Yanray Wang9ef0dce2022-10-25 16:44:13 +08003727 mbedtls_test_handshake_test_options client_options;
3728 mbedtls_test_handshake_test_options server_options;
Ronald Crone3dac4a2022-06-10 17:21:51 +02003729
3730 /*
3731 * Test set-up
3732 */
Gilles Peskine449bd832023-01-11 14:50:10 +01003733 mbedtls_platform_zeroize(&client_ep, sizeof(client_ep));
3734 mbedtls_platform_zeroize(&server_ep, sizeof(server_ep));
Ronald Crone3dac4a2022-06-10 17:21:51 +02003735
Yanray Wangf7b62352022-10-26 11:51:53 +08003736 mbedtls_test_init_handshake_options(&client_options);
valerio32f2ac92023-04-20 11:59:52 +02003737 MD_OR_USE_PSA_INIT();
3738
Paul Elliott9a8d7842022-07-10 12:48:57 +01003739 client_options.pk_alg = MBEDTLS_PK_ECDSA;
Yanray Wangf7b62352022-10-26 11:51:53 +08003740 ret = mbedtls_test_ssl_endpoint_init(&client_ep, MBEDTLS_SSL_IS_CLIENT,
Ronald Cronfb536472024-01-26 14:55:25 +01003741 &client_options, NULL, NULL, NULL);
Gilles Peskine449bd832023-01-11 14:50:10 +01003742 TEST_EQUAL(ret, 0);
Ronald Crone3dac4a2022-06-10 17:21:51 +02003743
Yanray Wangf7b62352022-10-26 11:51:53 +08003744 mbedtls_test_init_handshake_options(&server_options);
Paul Elliott9a8d7842022-07-10 12:48:57 +01003745 server_options.pk_alg = MBEDTLS_PK_ECDSA;
Yanray Wangf7b62352022-10-26 11:51:53 +08003746 ret = mbedtls_test_ssl_endpoint_init(&server_ep, MBEDTLS_SSL_IS_SERVER,
Ronald Cronfb536472024-01-26 14:55:25 +01003747 &server_options, NULL, NULL, NULL);
Gilles Peskine449bd832023-01-11 14:50:10 +01003748 TEST_EQUAL(ret, 0);
Ronald Crone3dac4a2022-06-10 17:21:51 +02003749
Yanray Wangf7b62352022-10-26 11:51:53 +08003750 ret = mbedtls_test_mock_socket_connect(&(client_ep.socket),
3751 &(server_ep.socket), 1024);
Gilles Peskine449bd832023-01-11 14:50:10 +01003752 TEST_EQUAL(ret, 0);
Ronald Crone3dac4a2022-06-10 17:21:51 +02003753
Gilles Peskine449bd832023-01-11 14:50:10 +01003754 while (1) {
3755 mbedtls_test_set_step(++step);
Ronald Crone3dac4a2022-06-10 17:21:51 +02003756
Yanray Wangbd296832022-10-26 18:28:11 +08003757 ret = mbedtls_test_move_handshake_to_state(
3758 &(server_ep.ssl), &(client_ep.ssl),
3759 MBEDTLS_SSL_CERTIFICATE_VERIFY);
Gilles Peskine449bd832023-01-11 14:50:10 +01003760 TEST_EQUAL(ret, 0);
Ronald Crone3dac4a2022-06-10 17:21:51 +02003761
Gilles Peskine449bd832023-01-11 14:50:10 +01003762 ret = mbedtls_ssl_flush_output(&(server_ep.ssl));
3763 TEST_EQUAL(ret, 0);
Ronald Crone3dac4a2022-06-10 17:21:51 +02003764
Yanray Wangbd296832022-10-26 18:28:11 +08003765 ret = mbedtls_test_move_handshake_to_state(
3766 &(client_ep.ssl), &(server_ep.ssl),
3767 MBEDTLS_SSL_SERVER_CERTIFICATE);
Gilles Peskine449bd832023-01-11 14:50:10 +01003768 TEST_EQUAL(ret, 0);
Ronald Crone3dac4a2022-06-10 17:21:51 +02003769
Gilles Peskine449bd832023-01-11 14:50:10 +01003770 ret = mbedtls_ssl_tls13_fetch_handshake_msg(&(client_ep.ssl),
3771 MBEDTLS_SSL_HS_CERTIFICATE,
3772 &buf, &buf_len);
3773 TEST_EQUAL(ret, 0);
Ronald Crone3dac4a2022-06-10 17:21:51 +02003774
3775 end = buf + buf_len;
3776
3777 /*
3778 * Tweak server Certificate message and parse it.
3779 */
3780
Yanray Wangf56181a2023-03-16 12:21:33 +08003781 ret = mbedtls_test_tweak_tls13_certificate_msg_vector_len(
Gilles Peskine449bd832023-01-11 14:50:10 +01003782 buf, &end, step, &expected_result, &expected_chk_buf_ptr_args);
Ronald Crone3dac4a2022-06-10 17:21:51 +02003783
Gilles Peskine449bd832023-01-11 14:50:10 +01003784 if (ret != 0) {
Ronald Crone3dac4a2022-06-10 17:21:51 +02003785 break;
Gilles Peskine449bd832023-01-11 14:50:10 +01003786 }
Ronald Crone3dac4a2022-06-10 17:21:51 +02003787
Gilles Peskine449bd832023-01-11 14:50:10 +01003788 ret = mbedtls_ssl_tls13_parse_certificate(&(client_ep.ssl), buf, end);
3789 TEST_EQUAL(ret, expected_result);
Ronald Crone3dac4a2022-06-10 17:21:51 +02003790
Gilles Peskine449bd832023-01-11 14:50:10 +01003791 TEST_ASSERT(mbedtls_ssl_cmp_chk_buf_ptr_fail_args(
3792 &expected_chk_buf_ptr_args) == 0);
Ronald Crone7b9b6b2022-06-10 17:24:31 +02003793
Gilles Peskine449bd832023-01-11 14:50:10 +01003794 mbedtls_ssl_reset_chk_buf_ptr_fail_args();
Ronald Crone7b9b6b2022-06-10 17:24:31 +02003795
Gilles Peskine449bd832023-01-11 14:50:10 +01003796 ret = mbedtls_ssl_session_reset(&(client_ep.ssl));
3797 TEST_EQUAL(ret, 0);
Ronald Crone3dac4a2022-06-10 17:21:51 +02003798
Gilles Peskine449bd832023-01-11 14:50:10 +01003799 ret = mbedtls_ssl_session_reset(&(server_ep.ssl));
3800 TEST_EQUAL(ret, 0);
Ronald Crone3dac4a2022-06-10 17:21:51 +02003801 }
3802
3803exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01003804 mbedtls_ssl_reset_chk_buf_ptr_fail_args();
Yanray Wangf7b62352022-10-26 11:51:53 +08003805 mbedtls_test_ssl_endpoint_free(&client_ep, NULL);
3806 mbedtls_test_ssl_endpoint_free(&server_ep, NULL);
3807 mbedtls_test_free_handshake_options(&client_options);
3808 mbedtls_test_free_handshake_options(&server_options);
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01003809 MD_OR_USE_PSA_DONE();
Ronald Crone3dac4a2022-06-10 17:21:51 +02003810}
3811/* END_CASE */
Valerio Setti4452e982022-12-01 15:08:35 +01003812
3813/* BEGIN_CASE depends_on:MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */
Gilles Peskine449bd832023-01-11 14:50:10 +01003814void ssl_ecjpake_set_password(int use_opaque_arg)
Valerio Setti4452e982022-12-01 15:08:35 +01003815{
3816 mbedtls_ssl_context ssl;
3817 mbedtls_ssl_config conf;
Gilles Peskine449bd832023-01-11 14:50:10 +01003818#if defined(MBEDTLS_USE_PSA_CRYPTO)
Valerio Setti4452e982022-12-01 15:08:35 +01003819 mbedtls_svc_key_id_t pwd_slot = MBEDTLS_SVC_KEY_ID_INIT;
3820#else /* MBEDTLS_USE_PSA_CRYPTO */
3821 (void) use_opaque_arg;
3822#endif /* MBEDTLS_USE_PSA_CRYPTO */
Gilles Peskine449bd832023-01-11 14:50:10 +01003823 unsigned char pwd_string[sizeof(ECJPAKE_TEST_PWD)] = "";
Valerio Setti4452e982022-12-01 15:08:35 +01003824 size_t pwd_len = 0;
Valerio Setti4452e982022-12-01 15:08:35 +01003825 int ret;
3826
Gilles Peskine449bd832023-01-11 14:50:10 +01003827 mbedtls_ssl_init(&ssl);
valerio32f2ac92023-04-20 11:59:52 +02003828 MD_OR_USE_PSA_INIT();
Valerio Setti4452e982022-12-01 15:08:35 +01003829
Valerio Settie7518ba2022-12-02 12:09:43 +01003830 /* test with uninitalized SSL context */
Gilles Peskine449bd832023-01-11 14:50:10 +01003831 ECJPAKE_TEST_SET_PASSWORD(MBEDTLS_ERR_SSL_BAD_INPUT_DATA);
Valerio Setti4452e982022-12-01 15:08:35 +01003832
Gilles Peskine449bd832023-01-11 14:50:10 +01003833 mbedtls_ssl_config_init(&conf);
Valerio Setti4452e982022-12-01 15:08:35 +01003834
Gilles Peskine449bd832023-01-11 14:50:10 +01003835 TEST_EQUAL(mbedtls_ssl_config_defaults(&conf,
3836 MBEDTLS_SSL_IS_CLIENT,
3837 MBEDTLS_SSL_TRANSPORT_STREAM,
3838 MBEDTLS_SSL_PRESET_DEFAULT), 0);
Valerio Setti4452e982022-12-01 15:08:35 +01003839
Gilles Peskine449bd832023-01-11 14:50:10 +01003840 TEST_EQUAL(mbedtls_ssl_setup(&ssl, &conf), 0);
Valerio Setti4452e982022-12-01 15:08:35 +01003841
Valerio Settiba22c9c2022-12-06 11:42:33 +01003842 /* test with empty password or unitialized password key (depending on use_opaque_arg) */
Gilles Peskine449bd832023-01-11 14:50:10 +01003843 ECJPAKE_TEST_SET_PASSWORD(MBEDTLS_ERR_SSL_BAD_INPUT_DATA);
Valerio Setti4452e982022-12-01 15:08:35 +01003844
Gilles Peskine449bd832023-01-11 14:50:10 +01003845 pwd_len = strlen(ECJPAKE_TEST_PWD);
3846 memcpy(pwd_string, ECJPAKE_TEST_PWD, pwd_len);
Valerio Setti4452e982022-12-01 15:08:35 +01003847
Gilles Peskine449bd832023-01-11 14:50:10 +01003848#if defined(MBEDTLS_USE_PSA_CRYPTO)
3849 if (use_opaque_arg) {
Valerio Setti4452e982022-12-01 15:08:35 +01003850 psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
Valerio Setti785116a2022-12-12 11:59:25 +01003851 psa_key_attributes_t check_attributes = PSA_KEY_ATTRIBUTES_INIT;
Valerio Setti4452e982022-12-01 15:08:35 +01003852
Valerio Setti2a3ffb42022-12-08 16:27:46 +01003853 /* First try with an invalid usage */
Gilles Peskine449bd832023-01-11 14:50:10 +01003854 psa_set_key_usage_flags(&attributes, PSA_KEY_USAGE_SIGN_HASH);
3855 psa_set_key_algorithm(&attributes, PSA_ALG_JPAKE);
3856 psa_set_key_type(&attributes, PSA_KEY_TYPE_PASSWORD);
Valerio Setti4452e982022-12-01 15:08:35 +01003857
Gilles Peskine449bd832023-01-11 14:50:10 +01003858 PSA_ASSERT(psa_import_key(&attributes, pwd_string,
3859 pwd_len, &pwd_slot));
Valerio Setti2a3ffb42022-12-08 16:27:46 +01003860
Gilles Peskine449bd832023-01-11 14:50:10 +01003861 ECJPAKE_TEST_SET_PASSWORD(MBEDTLS_ERR_SSL_HW_ACCEL_FAILED);
Valerio Setti2a3ffb42022-12-08 16:27:46 +01003862
Valerio Setti9d313df2022-12-09 11:38:59 +01003863 /* check that the opaque key is still valid after failure */
Gilles Peskine449bd832023-01-11 14:50:10 +01003864 TEST_EQUAL(psa_get_key_attributes(pwd_slot, &check_attributes),
3865 PSA_SUCCESS);
Valerio Setti9d313df2022-12-09 11:38:59 +01003866
Gilles Peskine449bd832023-01-11 14:50:10 +01003867 psa_destroy_key(pwd_slot);
Valerio Setti2a3ffb42022-12-08 16:27:46 +01003868
3869 /* Then set the correct usage */
Gilles Peskine449bd832023-01-11 14:50:10 +01003870 psa_set_key_usage_flags(&attributes, PSA_KEY_USAGE_DERIVE);
Valerio Setti2a3ffb42022-12-08 16:27:46 +01003871
Gilles Peskine449bd832023-01-11 14:50:10 +01003872 PSA_ASSERT(psa_import_key(&attributes, pwd_string,
3873 pwd_len, &pwd_slot));
Valerio Setti4452e982022-12-01 15:08:35 +01003874 }
3875#endif /* MBEDTLS_USE_PSA_CRYPTO */
3876
Valerio Settie7518ba2022-12-02 12:09:43 +01003877 /* final check which should work without errors */
Gilles Peskine449bd832023-01-11 14:50:10 +01003878 ECJPAKE_TEST_SET_PASSWORD(0);
Valerio Setti4452e982022-12-01 15:08:35 +01003879
Gilles Peskine449bd832023-01-11 14:50:10 +01003880#if defined(MBEDTLS_USE_PSA_CRYPTO)
3881 if (use_opaque_arg) {
3882 psa_destroy_key(pwd_slot);
Valerio Setti31e99bb2022-12-09 14:35:10 +01003883 }
Valerio Settie7518ba2022-12-02 12:09:43 +01003884#endif /* MBEDTLS_USE_PSA_CRYPTO */
Gilles Peskine449bd832023-01-11 14:50:10 +01003885 mbedtls_ssl_free(&ssl);
3886 mbedtls_ssl_config_free(&conf);
Valerio Setti4452e982022-12-01 15:08:35 +01003887
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01003888 MD_OR_USE_PSA_DONE();
Valerio Setti4452e982022-12-01 15:08:35 +01003889}
3890/* END_CASE */
Valerio Setti73260b62023-01-03 12:53:28 +01003891
Valerio Setti2c121852023-01-09 18:00:39 +01003892/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +01003893void elliptic_curve_get_properties()
Valerio Setti73260b62023-01-03 12:53:28 +01003894{
Przemek Stekiel75a5a9c2023-06-12 11:21:18 +02003895 psa_key_type_t psa_type = PSA_KEY_TYPE_NONE;
Valerio Setti73260b62023-01-03 12:53:28 +01003896 size_t psa_bits;
3897
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01003898 MD_OR_USE_PSA_INIT();
Valerio Setti73260b62023-01-03 12:53:28 +01003899
Elena Uziunaite24e24f22024-07-04 17:53:40 +01003900#if defined(PSA_WANT_ECC_SECP_R1_521)
Gilles Peskine449bd832023-01-11 14:50:10 +01003901 TEST_AVAILABLE_ECC(25, MBEDTLS_ECP_DP_SECP521R1, PSA_ECC_FAMILY_SECP_R1, 521);
Valerio Setti73260b62023-01-03 12:53:28 +01003902#else
Gilles Peskine449bd832023-01-11 14:50:10 +01003903 TEST_UNAVAILABLE_ECC(25, MBEDTLS_ECP_DP_SECP521R1, PSA_ECC_FAMILY_SECP_R1, 521);
Valerio Setti73260b62023-01-03 12:53:28 +01003904#endif
Elena Uziunaiteb8d10872024-07-05 10:51:40 +01003905#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_512)
Gilles Peskine449bd832023-01-11 14:50:10 +01003906 TEST_AVAILABLE_ECC(28, MBEDTLS_ECP_DP_BP512R1, PSA_ECC_FAMILY_BRAINPOOL_P_R1, 512);
Valerio Setti73260b62023-01-03 12:53:28 +01003907#else
Gilles Peskine449bd832023-01-11 14:50:10 +01003908 TEST_UNAVAILABLE_ECC(28, MBEDTLS_ECP_DP_BP512R1, PSA_ECC_FAMILY_BRAINPOOL_P_R1, 512);
Valerio Setti73260b62023-01-03 12:53:28 +01003909#endif
Elena Uziunaite6b4cd482024-07-04 17:50:11 +01003910#if defined(PSA_WANT_ECC_SECP_R1_384)
Gilles Peskine449bd832023-01-11 14:50:10 +01003911 TEST_AVAILABLE_ECC(24, MBEDTLS_ECP_DP_SECP384R1, PSA_ECC_FAMILY_SECP_R1, 384);
Valerio Setti73260b62023-01-03 12:53:28 +01003912#else
Gilles Peskine449bd832023-01-11 14:50:10 +01003913 TEST_UNAVAILABLE_ECC(24, MBEDTLS_ECP_DP_SECP384R1, PSA_ECC_FAMILY_SECP_R1, 384);
Valerio Setti73260b62023-01-03 12:53:28 +01003914#endif
Elena Uziunaiteb8d10872024-07-05 10:51:40 +01003915#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_384)
Gilles Peskine449bd832023-01-11 14:50:10 +01003916 TEST_AVAILABLE_ECC(27, MBEDTLS_ECP_DP_BP384R1, PSA_ECC_FAMILY_BRAINPOOL_P_R1, 384);
Valerio Setti73260b62023-01-03 12:53:28 +01003917#else
Gilles Peskine449bd832023-01-11 14:50:10 +01003918 TEST_UNAVAILABLE_ECC(27, MBEDTLS_ECP_DP_BP384R1, PSA_ECC_FAMILY_BRAINPOOL_P_R1, 384);
Valerio Setti73260b62023-01-03 12:53:28 +01003919#endif
Elena Uziunaite417d05f2024-07-04 17:46:30 +01003920#if defined(PSA_WANT_ECC_SECP_R1_256)
Gilles Peskine449bd832023-01-11 14:50:10 +01003921 TEST_AVAILABLE_ECC(23, MBEDTLS_ECP_DP_SECP256R1, PSA_ECC_FAMILY_SECP_R1, 256);
Valerio Setti73260b62023-01-03 12:53:28 +01003922#else
Gilles Peskine449bd832023-01-11 14:50:10 +01003923 TEST_UNAVAILABLE_ECC(23, MBEDTLS_ECP_DP_SECP256R1, PSA_ECC_FAMILY_SECP_R1, 256);
Valerio Setti73260b62023-01-03 12:53:28 +01003924#endif
Elena Uziunaite63cb13e2024-09-05 12:43:14 +01003925#if defined(PSA_WANT_ECC_SECP_K1_256)
Gilles Peskine449bd832023-01-11 14:50:10 +01003926 TEST_AVAILABLE_ECC(22, MBEDTLS_ECP_DP_SECP256K1, PSA_ECC_FAMILY_SECP_K1, 256);
Valerio Setti73260b62023-01-03 12:53:28 +01003927#else
Gilles Peskine449bd832023-01-11 14:50:10 +01003928 TEST_UNAVAILABLE_ECC(22, MBEDTLS_ECP_DP_SECP256K1, PSA_ECC_FAMILY_SECP_K1, 256);
Valerio Setti73260b62023-01-03 12:53:28 +01003929#endif
Elena Uziunaiteb8d10872024-07-05 10:51:40 +01003930#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_256)
Gilles Peskine449bd832023-01-11 14:50:10 +01003931 TEST_AVAILABLE_ECC(26, MBEDTLS_ECP_DP_BP256R1, PSA_ECC_FAMILY_BRAINPOOL_P_R1, 256);
Valerio Setti73260b62023-01-03 12:53:28 +01003932#else
Gilles Peskine449bd832023-01-11 14:50:10 +01003933 TEST_UNAVAILABLE_ECC(26, MBEDTLS_ECP_DP_BP256R1, PSA_ECC_FAMILY_BRAINPOOL_P_R1, 256);
Valerio Setti73260b62023-01-03 12:53:28 +01003934#endif
Elena Uziunaiteeaa0cf02024-07-04 17:41:25 +01003935#if defined(PSA_WANT_ECC_SECP_R1_224)
Gilles Peskine449bd832023-01-11 14:50:10 +01003936 TEST_AVAILABLE_ECC(21, MBEDTLS_ECP_DP_SECP224R1, PSA_ECC_FAMILY_SECP_R1, 224);
Valerio Setti73260b62023-01-03 12:53:28 +01003937#else
Gilles Peskine449bd832023-01-11 14:50:10 +01003938 TEST_UNAVAILABLE_ECC(21, MBEDTLS_ECP_DP_SECP224R1, PSA_ECC_FAMILY_SECP_R1, 224);
Valerio Setti73260b62023-01-03 12:53:28 +01003939#endif
Elena Uziunaitea3632862024-07-04 13:52:43 +01003940#if defined(PSA_WANT_ECC_SECP_R1_192)
Gilles Peskine449bd832023-01-11 14:50:10 +01003941 TEST_AVAILABLE_ECC(19, MBEDTLS_ECP_DP_SECP192R1, PSA_ECC_FAMILY_SECP_R1, 192);
Valerio Setti73260b62023-01-03 12:53:28 +01003942#else
Gilles Peskine449bd832023-01-11 14:50:10 +01003943 TEST_UNAVAILABLE_ECC(19, MBEDTLS_ECP_DP_SECP192R1, PSA_ECC_FAMILY_SECP_R1, 192);
Valerio Setti73260b62023-01-03 12:53:28 +01003944#endif
Elena Uziunaite9e85c9f2024-07-04 18:37:34 +01003945#if defined(PSA_WANT_ECC_SECP_K1_192)
Gilles Peskine449bd832023-01-11 14:50:10 +01003946 TEST_AVAILABLE_ECC(18, MBEDTLS_ECP_DP_SECP192K1, PSA_ECC_FAMILY_SECP_K1, 192);
Valerio Setti73260b62023-01-03 12:53:28 +01003947#else
Gilles Peskine449bd832023-01-11 14:50:10 +01003948 TEST_UNAVAILABLE_ECC(18, MBEDTLS_ECP_DP_SECP192K1, PSA_ECC_FAMILY_SECP_K1, 192);
Valerio Setti73260b62023-01-03 12:53:28 +01003949#endif
Elena Uziunaite0b5d48e2024-07-05 11:48:23 +01003950#if defined(PSA_WANT_ECC_MONTGOMERY_255)
Gilles Peskine449bd832023-01-11 14:50:10 +01003951 TEST_AVAILABLE_ECC(29, MBEDTLS_ECP_DP_CURVE25519, PSA_ECC_FAMILY_MONTGOMERY, 255);
Valerio Setti73260b62023-01-03 12:53:28 +01003952#else
Gilles Peskine449bd832023-01-11 14:50:10 +01003953 TEST_UNAVAILABLE_ECC(29, MBEDTLS_ECP_DP_CURVE25519, PSA_ECC_FAMILY_MONTGOMERY, 255);
Valerio Setti73260b62023-01-03 12:53:28 +01003954#endif
Elena Uziunaite0b5d48e2024-07-05 11:48:23 +01003955#if defined(PSA_WANT_ECC_MONTGOMERY_448)
Gilles Peskine449bd832023-01-11 14:50:10 +01003956 TEST_AVAILABLE_ECC(30, MBEDTLS_ECP_DP_CURVE448, PSA_ECC_FAMILY_MONTGOMERY, 448);
Valerio Setti73260b62023-01-03 12:53:28 +01003957#else
Gilles Peskine449bd832023-01-11 14:50:10 +01003958 TEST_UNAVAILABLE_ECC(30, MBEDTLS_ECP_DP_CURVE448, PSA_ECC_FAMILY_MONTGOMERY, 448);
Valerio Setti73260b62023-01-03 12:53:28 +01003959#endif
valerio32f2ac92023-04-20 11:59:52 +02003960 goto exit;
3961exit:
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01003962 MD_OR_USE_PSA_DONE();
Valerio Setti73260b62023-01-03 12:53:28 +01003963}
3964/* END_CASE */
Ronald Crond903a862024-01-15 15:57:17 +01003965
Elena Uziunaitebed21b52024-08-27 11:56:25 +01003966/* BEGIN_CASE depends_on:MBEDTLS_SSL_PROTO_TLS1_3:MBEDTLS_SSL_CLI_C:MBEDTLS_SSL_SRV_C:MBEDTLS_TEST_AT_LEAST_ONE_TLS1_3_CIPHERSUITE:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED:PSA_WANT_ALG_SHA_256:PSA_WANT_ECC_SECP_R1_256:PSA_WANT_ECC_SECP_R1_384:PSA_HAVE_ALG_ECDSA_VERIFY:MBEDTLS_SSL_SESSION_TICKETS */
Ronald Crond903a862024-01-15 15:57:17 +01003967void tls13_resume_session_with_ticket()
3968{
3969 int ret = -1;
Ronald Crond903a862024-01-15 15:57:17 +01003970 mbedtls_test_ssl_endpoint client_ep, server_ep;
3971 mbedtls_test_handshake_test_options client_options;
3972 mbedtls_test_handshake_test_options server_options;
3973 mbedtls_ssl_session saved_session;
3974
Ronald Crond903a862024-01-15 15:57:17 +01003975 mbedtls_platform_zeroize(&client_ep, sizeof(client_ep));
3976 mbedtls_platform_zeroize(&server_ep, sizeof(server_ep));
3977 mbedtls_test_init_handshake_options(&client_options);
3978 mbedtls_test_init_handshake_options(&server_options);
3979 mbedtls_ssl_session_init(&saved_session);
3980
Ronald Cron095a3a52024-01-31 14:34:22 +01003981 PSA_INIT();
Ronald Crond903a862024-01-15 15:57:17 +01003982
Ronald Cron1f6e4e42024-01-26 16:31:33 +01003983 /*
3984 * Run first handshake to get a ticket from the server.
3985 */
Ronald Crond903a862024-01-15 15:57:17 +01003986 client_options.pk_alg = MBEDTLS_PK_ECDSA;
Ronald Cron1f6e4e42024-01-26 16:31:33 +01003987 server_options.pk_alg = MBEDTLS_PK_ECDSA;
3988
3989 ret = mbedtls_test_get_tls13_ticket(&client_options, &server_options,
3990 &saved_session);
3991 TEST_EQUAL(ret, 0);
3992
3993 /*
3994 * Prepare for handshake with the ticket.
3995 */
Ronald Crond903a862024-01-15 15:57:17 +01003996 ret = mbedtls_test_ssl_endpoint_init(&client_ep, MBEDTLS_SSL_IS_CLIENT,
Ronald Cronfb536472024-01-26 14:55:25 +01003997 &client_options, NULL, NULL, NULL);
Ronald Crond903a862024-01-15 15:57:17 +01003998 TEST_EQUAL(ret, 0);
3999
Ronald Crond903a862024-01-15 15:57:17 +01004000 ret = mbedtls_test_ssl_endpoint_init(&server_ep, MBEDTLS_SSL_IS_SERVER,
Ronald Cronfb536472024-01-26 14:55:25 +01004001 &server_options, NULL, NULL, NULL);
Ronald Cron1f6e4e42024-01-26 16:31:33 +01004002 TEST_EQUAL(ret, 0);
4003
Ronald Crond903a862024-01-15 15:57:17 +01004004 mbedtls_ssl_conf_session_tickets_cb(&server_ep.conf,
4005 mbedtls_test_ticket_write,
4006 mbedtls_test_ticket_parse,
4007 NULL);
4008 TEST_EQUAL(ret, 0);
4009
4010 ret = mbedtls_test_mock_socket_connect(&(client_ep.socket),
4011 &(server_ep.socket), 1024);
4012 TEST_EQUAL(ret, 0);
4013
Ronald Crond903a862024-01-15 15:57:17 +01004014 ret = mbedtls_ssl_set_session(&(client_ep.ssl), &saved_session);
4015 TEST_EQUAL(ret, 0);
4016
Ronald Cron5de9c6f2024-01-31 14:45:16 +01004017 /*
Ronald Cron1f6e4e42024-01-26 16:31:33 +01004018 * Handshake with ticket.
4019 *
Ronald Cron5de9c6f2024-01-31 14:45:16 +01004020 * Run the handshake up to MBEDTLS_SSL_HANDSHAKE_WRAPUP and not
4021 * MBEDTLS_SSL_HANDSHAKE_OVER to preserve handshake data for the checks
4022 * below.
4023 */
Ronald Croneb845342024-01-31 14:48:23 +01004024 TEST_EQUAL(mbedtls_test_move_handshake_to_state(
4025 &(server_ep.ssl), &(client_ep.ssl),
4026 MBEDTLS_SSL_HANDSHAKE_WRAPUP), 0);
Ronald Crond903a862024-01-15 15:57:17 +01004027
4028 TEST_EQUAL(server_ep.ssl.handshake->resume, 1);
4029 TEST_EQUAL(server_ep.ssl.handshake->new_session_tickets_count, 1);
4030 TEST_EQUAL(server_ep.ssl.handshake->key_exchange_mode,
4031 MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL);
4032
4033exit:
4034 mbedtls_test_ssl_endpoint_free(&client_ep, NULL);
4035 mbedtls_test_ssl_endpoint_free(&server_ep, NULL);
4036 mbedtls_test_free_handshake_options(&client_options);
4037 mbedtls_test_free_handshake_options(&server_options);
4038 mbedtls_ssl_session_free(&saved_session);
Ronald Cron095a3a52024-01-31 14:34:22 +01004039 PSA_DONE();
Ronald Crond903a862024-01-15 15:57:17 +01004040}
4041/* END_CASE */
Ronald Crona8dd81b2024-01-16 17:50:52 +01004042
Ronald Cronae2d81c2024-01-22 09:13:41 +01004043/*
Ronald Cron86d288c2024-02-22 11:28:29 +01004044 * The !MBEDTLS_SSL_PROTO_TLS1_2 dependency of tls13_read_early_data() below is
Ronald Cronae2d81c2024-01-22 09:13:41 +01004045 * a temporary workaround to not run the test in Windows-2013 where there is
4046 * an issue with mbedtls_vsnprintf().
4047 */
Elena Uziunaitebed21b52024-08-27 11:56:25 +01004048/* BEGIN_CASE depends_on:!MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_SSL_EARLY_DATA:MBEDTLS_SSL_CLI_C:MBEDTLS_SSL_SRV_C:MBEDTLS_DEBUG_C:MBEDTLS_TEST_AT_LEAST_ONE_TLS1_3_CIPHERSUITE:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED:PSA_WANT_ALG_SHA_256:PSA_WANT_ECC_SECP_R1_256:PSA_WANT_ECC_SECP_R1_384:PSA_HAVE_ALG_ECDSA_VERIFY:MBEDTLS_SSL_SESSION_TICKETS */
Ronald Cron86d288c2024-02-22 11:28:29 +01004049void tls13_read_early_data(int scenario)
Ronald Crona8dd81b2024-01-16 17:50:52 +01004050{
4051 int ret = -1;
4052 unsigned char buf[64];
4053 const char *early_data = "This is early data.";
4054 size_t early_data_len = strlen(early_data);
4055 mbedtls_test_ssl_endpoint client_ep, server_ep;
4056 mbedtls_test_handshake_test_options client_options;
4057 mbedtls_test_handshake_test_options server_options;
4058 mbedtls_ssl_session saved_session;
Ronald Cron2995d352024-01-18 16:59:39 +01004059 mbedtls_test_ssl_log_pattern server_pattern = { NULL, 0 };
Jerry Yuf57d14b2023-11-15 16:40:09 +08004060 uint16_t group_list[3] = {
4061 MBEDTLS_SSL_IANA_TLS_GROUP_SECP256R1,
4062 MBEDTLS_SSL_IANA_TLS_GROUP_SECP384R1,
4063 MBEDTLS_SSL_IANA_TLS_GROUP_NONE
4064 };
Ronald Cron2995d352024-01-18 16:59:39 +01004065
Ronald Crona8dd81b2024-01-16 17:50:52 +01004066 mbedtls_platform_zeroize(&client_ep, sizeof(client_ep));
4067 mbedtls_platform_zeroize(&server_ep, sizeof(server_ep));
4068 mbedtls_test_init_handshake_options(&client_options);
4069 mbedtls_test_init_handshake_options(&server_options);
4070 mbedtls_ssl_session_init(&saved_session);
4071
Ronald Cron095a3a52024-01-31 14:34:22 +01004072 PSA_INIT();
Ronald Crona8dd81b2024-01-16 17:50:52 +01004073
Ronald Cronbfcdc062024-01-26 16:57:25 +01004074 /*
4075 * Run first handshake to get a ticket from the server.
4076 */
4077
Ronald Crona8dd81b2024-01-16 17:50:52 +01004078 client_options.pk_alg = MBEDTLS_PK_ECDSA;
Ronald Cronfb536472024-01-26 14:55:25 +01004079 client_options.group_list = group_list;
Ronald Cronced99be2024-01-26 15:49:12 +01004080 client_options.early_data = MBEDTLS_SSL_EARLY_DATA_ENABLED;
Ronald Cronbfcdc062024-01-26 16:57:25 +01004081 server_options.pk_alg = MBEDTLS_PK_ECDSA;
4082 server_options.group_list = group_list;
4083 server_options.early_data = MBEDTLS_SSL_EARLY_DATA_ENABLED;
4084
Waleed Elmelegy4dfb0e72024-03-14 01:48:40 +00004085#if defined(MBEDTLS_SSL_ALPN)
4086 switch (scenario) {
4087 case TEST_EARLY_DATA_SAME_ALPN:
4088 case TEST_EARLY_DATA_DIFF_ALPN:
4089 case TEST_EARLY_DATA_NO_LATER_ALPN:
4090 client_options.alpn_list[0] = "ALPNExample";
4091 client_options.alpn_list[1] = NULL;
4092 server_options.alpn_list[0] = "ALPNExample";
4093 server_options.alpn_list[1] = NULL;
4094 break;
4095 }
4096#endif
4097
Ronald Cronbfcdc062024-01-26 16:57:25 +01004098 ret = mbedtls_test_get_tls13_ticket(&client_options, &server_options,
4099 &saved_session);
4100 TEST_EQUAL(ret, 0);
4101
4102 /*
4103 * Prepare for handshake with the ticket.
4104 */
4105 switch (scenario) {
Ronald Cron5c208d72024-01-24 10:13:30 +01004106 case TEST_EARLY_DATA_ACCEPTED:
Ronald Cronbfcdc062024-01-26 16:57:25 +01004107 break;
4108
Ronald Cron110303f2024-02-22 11:35:21 +01004109 case TEST_EARLY_DATA_NO_INDICATION_SENT:
4110 client_options.early_data = MBEDTLS_SSL_EARLY_DATA_DISABLED;
4111 break;
4112
Ronald Crond6dba672024-01-24 12:22:24 +01004113 case TEST_EARLY_DATA_SERVER_REJECTS:
Ronald Cronbfcdc062024-01-26 16:57:25 +01004114 mbedtls_debug_set_threshold(3);
4115 server_pattern.pattern =
4116 "EarlyData: deprotect and discard app data records.";
4117 server_options.early_data = MBEDTLS_SSL_EARLY_DATA_DISABLED;
4118 break;
4119
Ronald Cron2261ab22024-01-24 13:38:31 +01004120 case TEST_EARLY_DATA_HRR:
Ronald Cronbfcdc062024-01-26 16:57:25 +01004121 mbedtls_debug_set_threshold(3);
4122 server_pattern.pattern =
4123 "EarlyData: Ignore application message before 2nd ClientHello";
4124 server_options.group_list = group_list + 1;
4125 break;
Waleed Elmelegy4dfb0e72024-03-14 01:48:40 +00004126#if defined(MBEDTLS_SSL_ALPN)
4127 case TEST_EARLY_DATA_SAME_ALPN:
4128 client_options.alpn_list[0] = "ALPNExample";
4129 client_options.alpn_list[1] = NULL;
4130 server_options.alpn_list[0] = "ALPNExample";
4131 server_options.alpn_list[1] = NULL;
4132 break;
4133 case TEST_EARLY_DATA_DIFF_ALPN:
4134 case TEST_EARLY_DATA_NO_INITIAL_ALPN:
4135 client_options.alpn_list[0] = "ALPNExample2";
4136 client_options.alpn_list[1] = NULL;
4137 server_options.alpn_list[0] = "ALPNExample2";
4138 server_options.alpn_list[1] = NULL;
4139 mbedtls_debug_set_threshold(3);
4140 server_pattern.pattern =
4141 "EarlyData: rejected, the selected ALPN is different "
4142 "from the one associated with the pre-shared key.";
4143 break;
4144 case TEST_EARLY_DATA_NO_LATER_ALPN:
4145 client_options.alpn_list[0] = NULL;
4146 server_options.alpn_list[0] = NULL;
4147 mbedtls_debug_set_threshold(3);
4148 server_pattern.pattern =
4149 "EarlyData: rejected, the selected ALPN is different "
4150 "from the one associated with the pre-shared key.";
4151 break;
4152#endif
Ronald Cronbfcdc062024-01-26 16:57:25 +01004153
4154 default:
4155 TEST_FAIL("Unknown scenario.");
4156 }
4157
Ronald Crona8dd81b2024-01-16 17:50:52 +01004158 ret = mbedtls_test_ssl_endpoint_init(&client_ep, MBEDTLS_SSL_IS_CLIENT,
Ronald Cronfb536472024-01-26 14:55:25 +01004159 &client_options, NULL, NULL, NULL);
Ronald Crona8dd81b2024-01-16 17:50:52 +01004160 TEST_EQUAL(ret, 0);
Ronald Crona8dd81b2024-01-16 17:50:52 +01004161
Ronald Cron2995d352024-01-18 16:59:39 +01004162 server_options.srv_log_fun = mbedtls_test_ssl_log_analyzer;
4163 server_options.srv_log_obj = &server_pattern;
Ronald Crona8dd81b2024-01-16 17:50:52 +01004164 ret = mbedtls_test_ssl_endpoint_init(&server_ep, MBEDTLS_SSL_IS_SERVER,
Ronald Cronfb536472024-01-26 14:55:25 +01004165 &server_options, NULL, NULL, NULL);
Ronald Crona8dd81b2024-01-16 17:50:52 +01004166 TEST_EQUAL(ret, 0);
Ronald Cronfb536472024-01-26 14:55:25 +01004167
Ronald Crona8dd81b2024-01-16 17:50:52 +01004168 mbedtls_ssl_conf_session_tickets_cb(&server_ep.conf,
4169 mbedtls_test_ticket_write,
4170 mbedtls_test_ticket_parse,
4171 NULL);
Ronald Crona8dd81b2024-01-16 17:50:52 +01004172
4173 ret = mbedtls_test_mock_socket_connect(&(client_ep.socket),
4174 &(server_ep.socket), 1024);
4175 TEST_EQUAL(ret, 0);
4176
Ronald Crona8dd81b2024-01-16 17:50:52 +01004177 ret = mbedtls_ssl_set_session(&(client_ep.ssl), &saved_session);
4178 TEST_EQUAL(ret, 0);
4179
Ronald Cronbfcdc062024-01-26 16:57:25 +01004180 /*
4181 * Handshake with ticket and send early data.
4182 */
Ronald Croneb845342024-01-31 14:48:23 +01004183 TEST_EQUAL(mbedtls_test_move_handshake_to_state(
4184 &(client_ep.ssl), &(server_ep.ssl),
4185 MBEDTLS_SSL_SERVER_HELLO), 0);
Ronald Crona8dd81b2024-01-16 17:50:52 +01004186
Ronald Cron7d158f42024-02-22 11:39:39 +01004187 ret = mbedtls_ssl_write_early_data(&(client_ep.ssl),
4188 (unsigned char *) early_data,
4189 early_data_len);
Ronald Crona8dd81b2024-01-16 17:50:52 +01004190
Ronald Crond2884662024-03-03 15:03:22 +01004191 if (client_ep.ssl.early_data_state !=
Ronald Cron3c5a6832024-03-03 15:46:57 +01004192 MBEDTLS_SSL_EARLY_DATA_STATE_NO_IND_SENT) {
Ronald Cron110303f2024-02-22 11:35:21 +01004193 TEST_EQUAL(ret, early_data_len);
Ronald Cron7d158f42024-02-22 11:39:39 +01004194 } else {
4195 TEST_EQUAL(ret, MBEDTLS_ERR_SSL_CANNOT_WRITE_EARLY_DATA);
Ronald Cron110303f2024-02-22 11:35:21 +01004196 }
Ronald Crona8dd81b2024-01-16 17:50:52 +01004197
Ronald Cron2995d352024-01-18 16:59:39 +01004198 ret = mbedtls_test_move_handshake_to_state(
4199 &(server_ep.ssl), &(client_ep.ssl),
4200 MBEDTLS_SSL_HANDSHAKE_WRAPUP);
Ronald Crona8dd81b2024-01-16 17:50:52 +01004201
Ronald Cron2995d352024-01-18 16:59:39 +01004202 switch (scenario) {
Ronald Cron5c208d72024-01-24 10:13:30 +01004203 case TEST_EARLY_DATA_ACCEPTED:
Waleed Elmelegy4dfb0e72024-03-14 01:48:40 +00004204#if defined(MBEDTLS_SSL_ALPN)
4205 case TEST_EARLY_DATA_SAME_ALPN:
4206#endif
Ronald Cron2995d352024-01-18 16:59:39 +01004207 TEST_EQUAL(ret, MBEDTLS_ERR_SSL_RECEIVED_EARLY_DATA);
4208 TEST_EQUAL(server_ep.ssl.handshake->early_data_accepted, 1);
4209 TEST_EQUAL(mbedtls_ssl_read_early_data(&(server_ep.ssl),
4210 buf, sizeof(buf)), early_data_len);
4211 TEST_MEMORY_COMPARE(buf, early_data_len, early_data, early_data_len);
Ronald Cron2995d352024-01-18 16:59:39 +01004212 break;
4213
Ronald Cron110303f2024-02-22 11:35:21 +01004214 case TEST_EARLY_DATA_NO_INDICATION_SENT:
4215 TEST_EQUAL(ret, 0);
4216 TEST_EQUAL(server_ep.ssl.handshake->early_data_accepted, 0);
4217 break;
4218
Ronald Crond6dba672024-01-24 12:22:24 +01004219 case TEST_EARLY_DATA_SERVER_REJECTS: /* Intentional fallthrough */
Ronald Cron2261ab22024-01-24 13:38:31 +01004220 case TEST_EARLY_DATA_HRR:
Waleed Elmelegy4dfb0e72024-03-14 01:48:40 +00004221#if defined(MBEDTLS_SSL_ALPN)
4222 case TEST_EARLY_DATA_DIFF_ALPN:
4223 case TEST_EARLY_DATA_NO_INITIAL_ALPN:
4224 case TEST_EARLY_DATA_NO_LATER_ALPN:
4225#endif
Ronald Cron2995d352024-01-18 16:59:39 +01004226 TEST_EQUAL(ret, 0);
4227 TEST_EQUAL(server_ep.ssl.handshake->early_data_accepted, 0);
4228 TEST_EQUAL(server_pattern.counter, 1);
4229 break;
Ronald Cron24da9912024-02-15 16:13:44 +01004230
4231 default:
4232 TEST_FAIL("Unknown scenario.");
Ronald Cron2995d352024-01-18 16:59:39 +01004233 }
Ronald Crona8dd81b2024-01-16 17:50:52 +01004234
Ronald Crond0a77272024-02-05 17:57:05 +01004235 TEST_EQUAL(mbedtls_test_move_handshake_to_state(
4236 &(server_ep.ssl), &(client_ep.ssl),
4237 MBEDTLS_SSL_HANDSHAKE_OVER), 0);
4238
Ronald Crona8dd81b2024-01-16 17:50:52 +01004239exit:
4240 mbedtls_test_ssl_endpoint_free(&client_ep, NULL);
4241 mbedtls_test_ssl_endpoint_free(&server_ep, NULL);
4242 mbedtls_test_free_handshake_options(&client_options);
4243 mbedtls_test_free_handshake_options(&server_options);
4244 mbedtls_ssl_session_free(&saved_session);
Ronald Cron2995d352024-01-18 16:59:39 +01004245 mbedtls_debug_set_threshold(0);
Ronald Cron095a3a52024-01-31 14:34:22 +01004246 PSA_DONE();
Ronald Crona8dd81b2024-01-16 17:50:52 +01004247}
4248/* END_CASE */
Ronald Crona7f94e42024-01-24 09:40:46 +01004249
Elena Uziunaitebed21b52024-08-27 11:56:25 +01004250/* BEGIN_CASE depends_on:MBEDTLS_SSL_EARLY_DATA:MBEDTLS_SSL_CLI_C:MBEDTLS_SSL_SRV_C:MBEDTLS_TEST_AT_LEAST_ONE_TLS1_3_CIPHERSUITE:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED:PSA_WANT_ALG_SHA_256:PSA_WANT_ECC_SECP_R1_256:PSA_WANT_ECC_SECP_R1_384:PSA_HAVE_ALG_ECDSA_VERIFY:MBEDTLS_SSL_SESSION_TICKETS */
Ronald Crond2884662024-03-03 15:03:22 +01004251void tls13_cli_early_data_state(int scenario)
Ronald Crona7f94e42024-01-24 09:40:46 +01004252{
4253 int ret = -1;
4254 mbedtls_test_ssl_endpoint client_ep, server_ep;
4255 mbedtls_test_handshake_test_options client_options;
4256 mbedtls_test_handshake_test_options server_options;
4257 mbedtls_ssl_session saved_session;
Ronald Cron2261ab22024-01-24 13:38:31 +01004258 uint16_t group_list[3] = {
4259 MBEDTLS_SSL_IANA_TLS_GROUP_SECP256R1,
4260 MBEDTLS_SSL_IANA_TLS_GROUP_SECP384R1,
4261 MBEDTLS_SSL_IANA_TLS_GROUP_NONE
4262 };
BensonLiou41bed382024-02-16 16:07:53 +08004263 uint8_t client_random[MBEDTLS_CLIENT_HELLO_RANDOM_LEN];
Ronald Crona7f94e42024-01-24 09:40:46 +01004264
4265 mbedtls_platform_zeroize(&client_ep, sizeof(client_ep));
4266 mbedtls_platform_zeroize(&server_ep, sizeof(server_ep));
4267 mbedtls_test_init_handshake_options(&client_options);
4268 mbedtls_test_init_handshake_options(&server_options);
4269 mbedtls_ssl_session_init(&saved_session);
4270
4271 PSA_INIT();
4272
4273 /*
4274 * Run first handshake to get a ticket from the server.
4275 */
4276 client_options.pk_alg = MBEDTLS_PK_ECDSA;
4277 client_options.early_data = MBEDTLS_SSL_EARLY_DATA_ENABLED;
4278 server_options.pk_alg = MBEDTLS_PK_ECDSA;
4279 server_options.early_data = MBEDTLS_SSL_EARLY_DATA_ENABLED;
Ronald Cron2261ab22024-01-24 13:38:31 +01004280 if (scenario == TEST_EARLY_DATA_HRR) {
4281 client_options.group_list = group_list;
4282 server_options.group_list = group_list;
4283 }
Ronald Crona7f94e42024-01-24 09:40:46 +01004284
4285 ret = mbedtls_test_get_tls13_ticket(&client_options, &server_options,
4286 &saved_session);
4287 TEST_EQUAL(ret, 0);
4288
4289 /*
4290 * Prepare for handshake with the ticket.
4291 */
Ronald Cron5c208d72024-01-24 10:13:30 +01004292 switch (scenario) {
4293 case TEST_EARLY_DATA_ACCEPTED:
4294 break;
4295
Ronald Cron265273e2024-01-24 11:13:19 +01004296 case TEST_EARLY_DATA_NO_INDICATION_SENT:
4297 client_options.early_data = MBEDTLS_SSL_EARLY_DATA_DISABLED;
4298 break;
4299
Ronald Crond6dba672024-01-24 12:22:24 +01004300 case TEST_EARLY_DATA_SERVER_REJECTS:
4301 server_options.early_data = MBEDTLS_SSL_EARLY_DATA_DISABLED;
4302 break;
4303
Ronald Cron2261ab22024-01-24 13:38:31 +01004304 case TEST_EARLY_DATA_HRR:
4305 server_options.group_list = group_list + 1;
4306 break;
4307
Ronald Cron5c208d72024-01-24 10:13:30 +01004308 default:
4309 TEST_FAIL("Unknown scenario.");
4310 }
4311
Ronald Crona7f94e42024-01-24 09:40:46 +01004312 ret = mbedtls_test_ssl_endpoint_init(&client_ep, MBEDTLS_SSL_IS_CLIENT,
4313 &client_options, NULL, NULL, NULL);
4314 TEST_EQUAL(ret, 0);
4315
4316 ret = mbedtls_test_ssl_endpoint_init(&server_ep, MBEDTLS_SSL_IS_SERVER,
4317 &server_options, NULL, NULL, NULL);
4318 TEST_EQUAL(ret, 0);
4319
4320 mbedtls_ssl_conf_session_tickets_cb(&server_ep.conf,
4321 mbedtls_test_ticket_write,
4322 mbedtls_test_ticket_parse,
4323 NULL);
4324
4325 ret = mbedtls_test_mock_socket_connect(&(client_ep.socket),
4326 &(server_ep.socket), 1024);
4327 TEST_EQUAL(ret, 0);
4328
4329 ret = mbedtls_ssl_set_session(&(client_ep.ssl), &saved_session);
4330 TEST_EQUAL(ret, 0);
4331
4332 /*
4333 * Go through the handshake sequence, state by state, checking the early
4334 * data status each time.
4335 */
4336 do {
4337 int state = client_ep.ssl.state;
4338
4339 /* Progress the handshake from at least one state */
4340 while (client_ep.ssl.state == state) {
4341 ret = mbedtls_ssl_handshake_step(&(client_ep.ssl));
4342 TEST_ASSERT((ret == 0) ||
4343 (ret == MBEDTLS_ERR_SSL_WANT_READ) ||
4344 (ret == MBEDTLS_ERR_SSL_WANT_WRITE));
4345 if (client_ep.ssl.state != state) {
4346 break;
4347 }
4348 ret = mbedtls_ssl_handshake_step(&(server_ep.ssl));
4349 TEST_ASSERT((ret == 0) ||
4350 (ret == MBEDTLS_ERR_SSL_WANT_READ) ||
4351 (ret == MBEDTLS_ERR_SSL_WANT_WRITE));
4352 }
4353
Ronald Cron9f2c3c02024-02-21 17:03:22 +01004354 if (client_ep.ssl.state != MBEDTLS_SSL_HANDSHAKE_OVER) {
4355 TEST_EQUAL(mbedtls_ssl_get_early_data_status(&(client_ep.ssl)),
4356 MBEDTLS_ERR_SSL_BAD_INPUT_DATA);
4357 }
4358
Ronald Crona7f94e42024-01-24 09:40:46 +01004359 switch (client_ep.ssl.state) {
4360 case MBEDTLS_SSL_CLIENT_HELLO:
Ronald Cron5c208d72024-01-24 10:13:30 +01004361 switch (scenario) {
Ronald Cron265273e2024-01-24 11:13:19 +01004362 case TEST_EARLY_DATA_ACCEPTED: /* Intentional fallthrough */
Ronald Crond6dba672024-01-24 12:22:24 +01004363 case TEST_EARLY_DATA_NO_INDICATION_SENT: /* Intentional fallthrough */
4364 case TEST_EARLY_DATA_SERVER_REJECTS:
Ronald Crond2884662024-03-03 15:03:22 +01004365 TEST_EQUAL(client_ep.ssl.early_data_state,
Ronald Cron05d7cfb2024-03-03 15:39:30 +01004366 MBEDTLS_SSL_EARLY_DATA_STATE_IDLE);
Ronald Cron5c208d72024-01-24 10:13:30 +01004367 break;
Ronald Cron2261ab22024-01-24 13:38:31 +01004368
4369 case TEST_EARLY_DATA_HRR:
Ronald Cron5fbd2702024-02-14 10:03:36 +01004370 if (!client_ep.ssl.handshake->hello_retry_request_flag) {
Ronald Crond2884662024-03-03 15:03:22 +01004371 TEST_EQUAL(client_ep.ssl.early_data_state,
Ronald Cron05d7cfb2024-03-03 15:39:30 +01004372 MBEDTLS_SSL_EARLY_DATA_STATE_IDLE);
Ronald Cron2261ab22024-01-24 13:38:31 +01004373 } else {
Ronald Crond2884662024-03-03 15:03:22 +01004374 TEST_EQUAL(client_ep.ssl.early_data_state,
4375 MBEDTLS_SSL_EARLY_DATA_STATE_REJECTED);
Ronald Cron2261ab22024-01-24 13:38:31 +01004376 }
4377 break;
Ronald Cron24da9912024-02-15 16:13:44 +01004378
4379 default:
4380 TEST_FAIL("Unknown scenario.");
Ronald Cron5c208d72024-01-24 10:13:30 +01004381 }
Ronald Crona7f94e42024-01-24 09:40:46 +01004382 break;
4383
4384 case MBEDTLS_SSL_SERVER_HELLO:
Ronald Cron5c208d72024-01-24 10:13:30 +01004385 switch (scenario) {
Ronald Crond6dba672024-01-24 12:22:24 +01004386 case TEST_EARLY_DATA_ACCEPTED: /* Intentional fallthrough */
4387 case TEST_EARLY_DATA_SERVER_REJECTS:
Ronald Crond2884662024-03-03 15:03:22 +01004388 TEST_EQUAL(client_ep.ssl.early_data_state,
4389 MBEDTLS_SSL_EARLY_DATA_STATE_CAN_WRITE);
Ronald Cron5c208d72024-01-24 10:13:30 +01004390 break;
Ronald Cron265273e2024-01-24 11:13:19 +01004391
4392 case TEST_EARLY_DATA_NO_INDICATION_SENT:
Ronald Crond2884662024-03-03 15:03:22 +01004393 TEST_EQUAL(client_ep.ssl.early_data_state,
Ronald Cron3c5a6832024-03-03 15:46:57 +01004394 MBEDTLS_SSL_EARLY_DATA_STATE_NO_IND_SENT);
Ronald Cron265273e2024-01-24 11:13:19 +01004395 break;
Ronald Cron2261ab22024-01-24 13:38:31 +01004396
4397 case TEST_EARLY_DATA_HRR:
Ronald Cron5fbd2702024-02-14 10:03:36 +01004398 if (!client_ep.ssl.handshake->hello_retry_request_flag) {
Ronald Crond2884662024-03-03 15:03:22 +01004399 TEST_EQUAL(client_ep.ssl.early_data_state,
4400 MBEDTLS_SSL_EARLY_DATA_STATE_CAN_WRITE);
BensonLioubedd2512024-03-13 20:21:26 +08004401 memcpy(client_random,
4402 client_ep.ssl.handshake->randbytes,
4403 MBEDTLS_CLIENT_HELLO_RANDOM_LEN);
Ronald Cron2261ab22024-01-24 13:38:31 +01004404 } else {
Ronald Crond2884662024-03-03 15:03:22 +01004405 TEST_EQUAL(client_ep.ssl.early_data_state,
4406 MBEDTLS_SSL_EARLY_DATA_STATE_REJECTED);
BensonLioubedd2512024-03-13 20:21:26 +08004407 TEST_MEMORY_COMPARE(client_random,
4408 MBEDTLS_CLIENT_HELLO_RANDOM_LEN,
4409 client_ep.ssl.handshake->randbytes,
4410 MBEDTLS_CLIENT_HELLO_RANDOM_LEN);
Ronald Cron2261ab22024-01-24 13:38:31 +01004411 }
4412 break;
Ronald Cron24da9912024-02-15 16:13:44 +01004413
4414 default:
4415 TEST_FAIL("Unknown scenario.");
Ronald Cron5c208d72024-01-24 10:13:30 +01004416 }
Ronald Crona7f94e42024-01-24 09:40:46 +01004417 break;
4418
4419 case MBEDTLS_SSL_ENCRYPTED_EXTENSIONS:
Ronald Cron5c208d72024-01-24 10:13:30 +01004420 switch (scenario) {
Ronald Crond6dba672024-01-24 12:22:24 +01004421 case TEST_EARLY_DATA_ACCEPTED: /* Intentional fallthrough */
4422 case TEST_EARLY_DATA_SERVER_REJECTS:
Ronald Crond2884662024-03-03 15:03:22 +01004423 TEST_EQUAL(client_ep.ssl.early_data_state,
4424 MBEDTLS_SSL_EARLY_DATA_STATE_CAN_WRITE);
Ronald Cron5c208d72024-01-24 10:13:30 +01004425 break;
Ronald Cron265273e2024-01-24 11:13:19 +01004426
4427 case TEST_EARLY_DATA_NO_INDICATION_SENT:
Ronald Crond2884662024-03-03 15:03:22 +01004428 TEST_EQUAL(client_ep.ssl.early_data_state,
Ronald Cron3c5a6832024-03-03 15:46:57 +01004429 MBEDTLS_SSL_EARLY_DATA_STATE_NO_IND_SENT);
Ronald Cron265273e2024-01-24 11:13:19 +01004430 break;
Ronald Cron2261ab22024-01-24 13:38:31 +01004431
4432 case TEST_EARLY_DATA_HRR:
Ronald Crond2884662024-03-03 15:03:22 +01004433 TEST_EQUAL(client_ep.ssl.early_data_state,
4434 MBEDTLS_SSL_EARLY_DATA_STATE_REJECTED);
Ronald Cron2261ab22024-01-24 13:38:31 +01004435 break;
Ronald Cron24da9912024-02-15 16:13:44 +01004436
4437 default:
4438 TEST_FAIL("Unknown scenario.");
Ronald Cron5c208d72024-01-24 10:13:30 +01004439 }
Ronald Crona7f94e42024-01-24 09:40:46 +01004440 break;
4441
4442 case MBEDTLS_SSL_SERVER_FINISHED:
Ronald Cron5c208d72024-01-24 10:13:30 +01004443 switch (scenario) {
4444 case TEST_EARLY_DATA_ACCEPTED:
Ronald Crond2884662024-03-03 15:03:22 +01004445 TEST_EQUAL(client_ep.ssl.early_data_state,
4446 MBEDTLS_SSL_EARLY_DATA_STATE_ACCEPTED);
Ronald Cron5c208d72024-01-24 10:13:30 +01004447 break;
Ronald Cron265273e2024-01-24 11:13:19 +01004448
4449 case TEST_EARLY_DATA_NO_INDICATION_SENT:
Ronald Crond2884662024-03-03 15:03:22 +01004450 TEST_EQUAL(client_ep.ssl.early_data_state,
Ronald Cron3c5a6832024-03-03 15:46:57 +01004451 MBEDTLS_SSL_EARLY_DATA_STATE_NO_IND_SENT);
Ronald Cron265273e2024-01-24 11:13:19 +01004452 break;
Ronald Crond6dba672024-01-24 12:22:24 +01004453
Ronald Cron2261ab22024-01-24 13:38:31 +01004454 case TEST_EARLY_DATA_SERVER_REJECTS: /* Intentional fallthrough */
4455 case TEST_EARLY_DATA_HRR:
Ronald Crond2884662024-03-03 15:03:22 +01004456 TEST_EQUAL(client_ep.ssl.early_data_state,
4457 MBEDTLS_SSL_EARLY_DATA_STATE_REJECTED);
Ronald Crond6dba672024-01-24 12:22:24 +01004458 break;
Ronald Cron24da9912024-02-15 16:13:44 +01004459
4460 default:
4461 TEST_FAIL("Unknown scenario.");
Ronald Cron5c208d72024-01-24 10:13:30 +01004462 }
Ronald Crona7f94e42024-01-24 09:40:46 +01004463 break;
4464
4465 case MBEDTLS_SSL_END_OF_EARLY_DATA:
Ronald Cron265273e2024-01-24 11:13:19 +01004466 TEST_EQUAL(scenario, TEST_EARLY_DATA_ACCEPTED);
Ronald Crond2884662024-03-03 15:03:22 +01004467 TEST_EQUAL(client_ep.ssl.early_data_state,
4468 MBEDTLS_SSL_EARLY_DATA_STATE_SERVER_FINISHED_RECEIVED);
Ronald Crona7f94e42024-01-24 09:40:46 +01004469 break;
4470
4471 case MBEDTLS_SSL_CLIENT_CERTIFICATE:
Ronald Cron5c208d72024-01-24 10:13:30 +01004472 switch (scenario) {
4473 case TEST_EARLY_DATA_ACCEPTED:
Ronald Crond2884662024-03-03 15:03:22 +01004474 TEST_EQUAL(client_ep.ssl.early_data_state,
4475 MBEDTLS_SSL_EARLY_DATA_STATE_SERVER_FINISHED_RECEIVED);
Ronald Cron5c208d72024-01-24 10:13:30 +01004476 break;
Ronald Cron265273e2024-01-24 11:13:19 +01004477
4478 case TEST_EARLY_DATA_NO_INDICATION_SENT:
Ronald Crond2884662024-03-03 15:03:22 +01004479 TEST_EQUAL(client_ep.ssl.early_data_state,
Ronald Cron3c5a6832024-03-03 15:46:57 +01004480 MBEDTLS_SSL_EARLY_DATA_STATE_NO_IND_SENT);
Ronald Cron265273e2024-01-24 11:13:19 +01004481 break;
Ronald Crond6dba672024-01-24 12:22:24 +01004482
Ronald Cron2261ab22024-01-24 13:38:31 +01004483 case TEST_EARLY_DATA_SERVER_REJECTS: /* Intentional fallthrough */
4484 case TEST_EARLY_DATA_HRR:
Ronald Crond2884662024-03-03 15:03:22 +01004485 TEST_EQUAL(client_ep.ssl.early_data_state,
4486 MBEDTLS_SSL_EARLY_DATA_STATE_REJECTED);
Ronald Crond6dba672024-01-24 12:22:24 +01004487 break;
Ronald Cron24da9912024-02-15 16:13:44 +01004488
4489 default:
4490 TEST_FAIL("Unknown scenario.");
Ronald Cron5c208d72024-01-24 10:13:30 +01004491 }
Ronald Crona7f94e42024-01-24 09:40:46 +01004492 break;
4493
4494 case MBEDTLS_SSL_CLIENT_FINISHED:
Ronald Cron5c208d72024-01-24 10:13:30 +01004495 switch (scenario) {
4496 case TEST_EARLY_DATA_ACCEPTED:
Ronald Crond2884662024-03-03 15:03:22 +01004497 TEST_EQUAL(client_ep.ssl.early_data_state,
4498 MBEDTLS_SSL_EARLY_DATA_STATE_SERVER_FINISHED_RECEIVED);
Ronald Cron5c208d72024-01-24 10:13:30 +01004499 break;
Ronald Cron265273e2024-01-24 11:13:19 +01004500
4501 case TEST_EARLY_DATA_NO_INDICATION_SENT:
Ronald Crond2884662024-03-03 15:03:22 +01004502 TEST_EQUAL(client_ep.ssl.early_data_state,
Ronald Cron3c5a6832024-03-03 15:46:57 +01004503 MBEDTLS_SSL_EARLY_DATA_STATE_NO_IND_SENT);
Ronald Cron265273e2024-01-24 11:13:19 +01004504 break;
Ronald Crond6dba672024-01-24 12:22:24 +01004505
Ronald Cron2261ab22024-01-24 13:38:31 +01004506 case TEST_EARLY_DATA_SERVER_REJECTS: /* Intentional fallthrough */
4507 case TEST_EARLY_DATA_HRR:
Ronald Crond2884662024-03-03 15:03:22 +01004508 TEST_EQUAL(client_ep.ssl.early_data_state,
4509 MBEDTLS_SSL_EARLY_DATA_STATE_REJECTED);
Ronald Crond6dba672024-01-24 12:22:24 +01004510 break;
Ronald Cron24da9912024-02-15 16:13:44 +01004511
4512 default:
4513 TEST_FAIL("Unknown scenario.");
Ronald Cron5c208d72024-01-24 10:13:30 +01004514 }
Ronald Crona7f94e42024-01-24 09:40:46 +01004515 break;
4516
4517#if defined(MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE)
4518 case MBEDTLS_SSL_CLIENT_CCS_AFTER_CLIENT_HELLO:
Ronald Cron5c208d72024-01-24 10:13:30 +01004519 switch (scenario) {
Ronald Crond6dba672024-01-24 12:22:24 +01004520 case TEST_EARLY_DATA_ACCEPTED: /* Intentional fallthrough */
Ronald Cron2261ab22024-01-24 13:38:31 +01004521 case TEST_EARLY_DATA_SERVER_REJECTS: /* Intentional fallthrough */
4522 case TEST_EARLY_DATA_HRR:
Ronald Crond2884662024-03-03 15:03:22 +01004523 TEST_EQUAL(client_ep.ssl.early_data_state,
Ronald Cron3641df22024-03-03 16:10:58 +01004524 MBEDTLS_SSL_EARLY_DATA_STATE_IND_SENT);
Ronald Cron5c208d72024-01-24 10:13:30 +01004525 break;
Ronald Cron24da9912024-02-15 16:13:44 +01004526
4527 default:
4528 TEST_FAIL("Unexpected or unknown scenario.");
Ronald Cron5c208d72024-01-24 10:13:30 +01004529 }
Ronald Crona7f94e42024-01-24 09:40:46 +01004530 break;
Ronald Cron265273e2024-01-24 11:13:19 +01004531
Ronald Cron2261ab22024-01-24 13:38:31 +01004532 case MBEDTLS_SSL_CLIENT_CCS_BEFORE_2ND_CLIENT_HELLO:
4533 TEST_ASSERT(scenario == TEST_EARLY_DATA_HRR);
Ronald Crond2884662024-03-03 15:03:22 +01004534 TEST_EQUAL(client_ep.ssl.early_data_state,
4535 MBEDTLS_SSL_EARLY_DATA_STATE_REJECTED);
Ronald Cron2261ab22024-01-24 13:38:31 +01004536 break;
4537
Ronald Cron265273e2024-01-24 11:13:19 +01004538 case MBEDTLS_SSL_CLIENT_CCS_AFTER_SERVER_FINISHED:
Ronald Crond6dba672024-01-24 12:22:24 +01004539 switch (scenario) {
4540 case TEST_EARLY_DATA_NO_INDICATION_SENT:
Ronald Crond2884662024-03-03 15:03:22 +01004541 TEST_EQUAL(client_ep.ssl.early_data_state,
Ronald Cron3c5a6832024-03-03 15:46:57 +01004542 MBEDTLS_SSL_EARLY_DATA_STATE_NO_IND_SENT);
Ronald Crond6dba672024-01-24 12:22:24 +01004543 break;
4544
Ronald Cron2261ab22024-01-24 13:38:31 +01004545 case TEST_EARLY_DATA_SERVER_REJECTS: /* Intentional fallthrough */
4546 case TEST_EARLY_DATA_HRR:
Ronald Crond2884662024-03-03 15:03:22 +01004547 TEST_EQUAL(client_ep.ssl.early_data_state,
4548 MBEDTLS_SSL_EARLY_DATA_STATE_REJECTED);
Ronald Crond6dba672024-01-24 12:22:24 +01004549 break;
Ronald Cron24da9912024-02-15 16:13:44 +01004550
4551 default:
4552 TEST_FAIL("Unexpected or unknown scenario.");
Ronald Crond6dba672024-01-24 12:22:24 +01004553 }
Ronald Cron265273e2024-01-24 11:13:19 +01004554 break;
Ronald Crona7f94e42024-01-24 09:40:46 +01004555#endif /* MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE */
4556
4557 case MBEDTLS_SSL_FLUSH_BUFFERS: /* Intentional fallthrough */
4558 case MBEDTLS_SSL_HANDSHAKE_WRAPUP: /* Intentional fallthrough */
4559 case MBEDTLS_SSL_HANDSHAKE_OVER:
Ronald Cron5c208d72024-01-24 10:13:30 +01004560 switch (scenario) {
4561 case TEST_EARLY_DATA_ACCEPTED:
Ronald Crond2884662024-03-03 15:03:22 +01004562 TEST_EQUAL(client_ep.ssl.early_data_state,
4563 MBEDTLS_SSL_EARLY_DATA_STATE_SERVER_FINISHED_RECEIVED);
Ronald Cron5c208d72024-01-24 10:13:30 +01004564 break;
Ronald Cron265273e2024-01-24 11:13:19 +01004565
4566 case TEST_EARLY_DATA_NO_INDICATION_SENT:
Ronald Crond2884662024-03-03 15:03:22 +01004567 TEST_EQUAL(client_ep.ssl.early_data_state,
Ronald Cron3c5a6832024-03-03 15:46:57 +01004568 MBEDTLS_SSL_EARLY_DATA_STATE_NO_IND_SENT);
Ronald Cron265273e2024-01-24 11:13:19 +01004569 break;
Ronald Crond6dba672024-01-24 12:22:24 +01004570
Ronald Cron2261ab22024-01-24 13:38:31 +01004571 case TEST_EARLY_DATA_SERVER_REJECTS: /* Intentional fallthrough */
4572 case TEST_EARLY_DATA_HRR:
Ronald Crond2884662024-03-03 15:03:22 +01004573 TEST_EQUAL(client_ep.ssl.early_data_state,
4574 MBEDTLS_SSL_EARLY_DATA_STATE_REJECTED);
Ronald Crond6dba672024-01-24 12:22:24 +01004575 break;
Ronald Cron24da9912024-02-15 16:13:44 +01004576
4577 default:
4578 TEST_FAIL("Unknown scenario.");
Ronald Cron5c208d72024-01-24 10:13:30 +01004579 }
Ronald Crona7f94e42024-01-24 09:40:46 +01004580 break;
4581
4582 default:
4583 TEST_FAIL("Unexpected state.");
4584 }
4585 } while (client_ep.ssl.state != MBEDTLS_SSL_HANDSHAKE_OVER);
4586
Ronald Cron9f2c3c02024-02-21 17:03:22 +01004587 ret = mbedtls_ssl_get_early_data_status(&(client_ep.ssl));
4588 switch (scenario) {
4589 case TEST_EARLY_DATA_ACCEPTED:
4590 TEST_EQUAL(ret, MBEDTLS_SSL_EARLY_DATA_STATUS_ACCEPTED);
4591 break;
4592
4593 case TEST_EARLY_DATA_NO_INDICATION_SENT:
Ronald Cron840de7f2024-03-11 17:49:35 +01004594 TEST_EQUAL(ret, MBEDTLS_SSL_EARLY_DATA_STATUS_NOT_INDICATED);
Ronald Cron9f2c3c02024-02-21 17:03:22 +01004595 break;
4596
4597 case TEST_EARLY_DATA_SERVER_REJECTS: /* Intentional fallthrough */
4598 case TEST_EARLY_DATA_HRR:
4599 TEST_EQUAL(ret, MBEDTLS_SSL_EARLY_DATA_STATUS_REJECTED);
4600 break;
4601
4602 default:
4603 TEST_FAIL("Unknown scenario.");
4604 }
4605
Ronald Crondcb09ca2024-02-22 12:12:45 +01004606 ret = mbedtls_ssl_get_early_data_status(&(server_ep.ssl));
4607 TEST_EQUAL(ret, MBEDTLS_ERR_SSL_BAD_INPUT_DATA);
4608
Ronald Crona7f94e42024-01-24 09:40:46 +01004609#if defined(MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE)
Ronald Cron5fbd2702024-02-14 10:03:36 +01004610 TEST_EQUAL(client_ep.ssl.handshake->ccs_sent, 1);
Ronald Crona7f94e42024-01-24 09:40:46 +01004611#endif
4612
4613exit:
4614 mbedtls_test_ssl_endpoint_free(&client_ep, NULL);
4615 mbedtls_test_ssl_endpoint_free(&server_ep, NULL);
4616 mbedtls_test_free_handshake_options(&client_options);
4617 mbedtls_test_free_handshake_options(&server_options);
4618 mbedtls_ssl_session_free(&saved_session);
4619 PSA_DONE();
4620}
4621/* END_CASE */
Ronald Cron2fbbba92024-01-26 20:13:42 +01004622
Elena Uziunaitebed21b52024-08-27 11:56:25 +01004623/* BEGIN_CASE depends_on:MBEDTLS_SSL_EARLY_DATA:MBEDTLS_SSL_CLI_C:MBEDTLS_SSL_SRV_C:MBEDTLS_TEST_AT_LEAST_ONE_TLS1_3_CIPHERSUITE:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED:PSA_WANT_ALG_SHA_256:PSA_WANT_ECC_SECP_R1_256:PSA_WANT_ECC_SECP_R1_384:PSA_HAVE_ALG_ECDSA_VERIFY:MBEDTLS_SSL_SESSION_TICKETS */
Ronald Cron2fbbba92024-01-26 20:13:42 +01004624void tls13_write_early_data(int scenario)
4625{
4626 int ret = -1;
4627 mbedtls_test_ssl_endpoint client_ep, server_ep;
4628 mbedtls_test_handshake_test_options client_options;
4629 mbedtls_test_handshake_test_options server_options;
4630 mbedtls_ssl_session saved_session;
Ronald Cronb3d42fd2024-01-26 11:54:06 +01004631 uint16_t group_list[3] = {
4632 MBEDTLS_SSL_IANA_TLS_GROUP_SECP256R1,
4633 MBEDTLS_SSL_IANA_TLS_GROUP_SECP384R1,
4634 MBEDTLS_SSL_IANA_TLS_GROUP_NONE
4635 };
Ronald Cron00046002024-02-21 16:00:12 +01004636 int beyond_first_hello = 0;
Ronald Cron2fbbba92024-01-26 20:13:42 +01004637
4638 mbedtls_platform_zeroize(&client_ep, sizeof(client_ep));
4639 mbedtls_platform_zeroize(&server_ep, sizeof(server_ep));
4640 mbedtls_test_init_handshake_options(&client_options);
4641 mbedtls_test_init_handshake_options(&server_options);
4642 mbedtls_ssl_session_init(&saved_session);
4643
4644 PSA_INIT();
4645
4646 /*
4647 * Run first handshake to get a ticket from the server.
4648 */
4649 client_options.pk_alg = MBEDTLS_PK_ECDSA;
4650 client_options.early_data = MBEDTLS_SSL_EARLY_DATA_ENABLED;
4651 server_options.pk_alg = MBEDTLS_PK_ECDSA;
4652 server_options.early_data = MBEDTLS_SSL_EARLY_DATA_ENABLED;
Ronald Cronb3d42fd2024-01-26 11:54:06 +01004653 if (scenario == TEST_EARLY_DATA_HRR) {
4654 client_options.group_list = group_list;
4655 server_options.group_list = group_list;
4656 }
Ronald Cron2fbbba92024-01-26 20:13:42 +01004657
4658 ret = mbedtls_test_get_tls13_ticket(&client_options, &server_options,
4659 &saved_session);
4660 TEST_EQUAL(ret, 0);
4661
Ronald Cron2fbbba92024-01-26 20:13:42 +01004662 /*
4663 * Prepare for handshake with the ticket.
4664 */
4665 switch (scenario) {
4666 case TEST_EARLY_DATA_ACCEPTED:
4667 break;
4668
Ronald Cron8fe2b012024-01-26 20:25:00 +01004669 case TEST_EARLY_DATA_NO_INDICATION_SENT:
4670 client_options.early_data = MBEDTLS_SSL_EARLY_DATA_DISABLED;
4671 break;
4672
Ronald Cron05600e22024-01-26 10:23:31 +01004673 case TEST_EARLY_DATA_SERVER_REJECTS:
4674 server_options.early_data = MBEDTLS_SSL_EARLY_DATA_DISABLED;
4675 break;
4676
Ronald Cronb3d42fd2024-01-26 11:54:06 +01004677 case TEST_EARLY_DATA_HRR:
Ronald Cron52472102024-03-08 11:29:28 +01004678 /*
4679 * Remove server support for the group negotiated in
Ronald Crone1295fa2024-03-08 17:03:16 +01004680 * mbedtls_test_get_tls13_ticket() forcing a HelloRetryRequest.
Ronald Cron52472102024-03-08 11:29:28 +01004681 */
Ronald Cronb3d42fd2024-01-26 11:54:06 +01004682 server_options.group_list = group_list + 1;
4683 break;
4684
Ronald Cron2fbbba92024-01-26 20:13:42 +01004685 default:
4686 TEST_FAIL("Unknown scenario.");
4687 }
4688
4689 ret = mbedtls_test_ssl_endpoint_init(&client_ep, MBEDTLS_SSL_IS_CLIENT,
4690 &client_options, NULL, NULL, NULL);
4691 TEST_EQUAL(ret, 0);
4692
4693 ret = mbedtls_test_ssl_endpoint_init(&server_ep, MBEDTLS_SSL_IS_SERVER,
4694 &server_options, NULL, NULL, NULL);
4695 TEST_EQUAL(ret, 0);
4696
4697 mbedtls_ssl_conf_session_tickets_cb(&server_ep.conf,
4698 mbedtls_test_ticket_write,
4699 mbedtls_test_ticket_parse,
4700 NULL);
4701
4702 ret = mbedtls_test_mock_socket_connect(&(client_ep.socket),
4703 &(server_ep.socket), 1024);
4704 TEST_EQUAL(ret, 0);
4705
4706 ret = mbedtls_ssl_set_session(&(client_ep.ssl), &saved_session);
4707 TEST_EQUAL(ret, 0);
4708
4709 /*
Ronald Crond4069242024-02-21 13:45:52 +01004710 * Run handshakes going one state further in the handshake sequence at each
4711 * loop up to the point where we reach the MBEDTLS_SSL_HANDSHAKE_OVER
4712 * state. For each reached handshake state, check the result of the call
Ronald Cronbf5e9092024-02-21 15:31:36 +01004713 * to mbedtls_ssl_write_early_data(), make sure we can complete the
4714 * handshake successfully and then reset the connection to restart the
4715 * handshake from scratch.
Ronald Cron2fbbba92024-01-26 20:13:42 +01004716 */
Ronald Cron00046002024-02-21 16:00:12 +01004717 do {
4718 int client_state = client_ep.ssl.state;
4719 int previous_client_state;
4720 const char *early_data_string = "This is early data.";
4721 const unsigned char *early_data = (const unsigned char *) early_data_string;
4722 size_t early_data_len = strlen(early_data_string);
4723 int write_early_data_ret, read_early_data_ret;
4724 unsigned char read_buf[64];
Ronald Cron2fbbba92024-01-26 20:13:42 +01004725
Ronald Cron2fbbba92024-01-26 20:13:42 +01004726 write_early_data_ret = mbedtls_ssl_write_early_data(&(client_ep.ssl),
4727 early_data,
4728 early_data_len);
4729
Ronald Cron8fe2b012024-01-26 20:25:00 +01004730 if (scenario == TEST_EARLY_DATA_NO_INDICATION_SENT) {
4731 TEST_EQUAL(write_early_data_ret, MBEDTLS_ERR_SSL_CANNOT_WRITE_EARLY_DATA);
4732 TEST_EQUAL(client_ep.ssl.state, client_state);
Ronald Cronbf5e9092024-02-21 15:31:36 +01004733 goto complete_handshake;
Ronald Cron8fe2b012024-01-26 20:25:00 +01004734 }
4735
Ronald Cron2fbbba92024-01-26 20:13:42 +01004736 switch (client_state) {
Ronald Cron00046002024-02-21 16:00:12 +01004737 case MBEDTLS_SSL_HELLO_REQUEST: /* Intentional fallthrough */
Ronald Cron2fbbba92024-01-26 20:13:42 +01004738 case MBEDTLS_SSL_CLIENT_HELLO:
4739 switch (scenario) {
Ronald Cron05600e22024-01-26 10:23:31 +01004740 case TEST_EARLY_DATA_ACCEPTED: /* Intentional fallthrough */
4741 case TEST_EARLY_DATA_SERVER_REJECTS:
Ronald Cron2fbbba92024-01-26 20:13:42 +01004742 TEST_EQUAL(write_early_data_ret, early_data_len);
4743 TEST_EQUAL(client_ep.ssl.state, MBEDTLS_SSL_SERVER_HELLO);
4744 break;
Ronald Cronb3d42fd2024-01-26 11:54:06 +01004745
4746 case TEST_EARLY_DATA_HRR:
Ronald Cron5fbd2702024-02-14 10:03:36 +01004747 if (!client_ep.ssl.handshake->hello_retry_request_flag) {
Ronald Cronb3d42fd2024-01-26 11:54:06 +01004748 TEST_EQUAL(write_early_data_ret, early_data_len);
4749 TEST_EQUAL(client_ep.ssl.state, MBEDTLS_SSL_SERVER_HELLO);
4750 } else {
4751 beyond_first_hello = 1;
4752 TEST_EQUAL(write_early_data_ret,
4753 MBEDTLS_ERR_SSL_CANNOT_WRITE_EARLY_DATA);
4754 TEST_EQUAL(client_ep.ssl.state, MBEDTLS_SSL_CLIENT_HELLO);
4755 }
4756 break;
Ronald Cron24da9912024-02-15 16:13:44 +01004757
4758 default:
4759 TEST_FAIL("Unknown scenario.");
Ronald Cron2fbbba92024-01-26 20:13:42 +01004760 }
4761 break;
4762
4763 case MBEDTLS_SSL_SERVER_HELLO:
4764 switch (scenario) {
Ronald Cron05600e22024-01-26 10:23:31 +01004765 case TEST_EARLY_DATA_ACCEPTED: /* Intentional fallthrough */
4766 case TEST_EARLY_DATA_SERVER_REJECTS:
Ronald Cron2fbbba92024-01-26 20:13:42 +01004767 TEST_EQUAL(write_early_data_ret, early_data_len);
4768 TEST_EQUAL(client_ep.ssl.state, MBEDTLS_SSL_SERVER_HELLO);
4769 break;
Ronald Cronb3d42fd2024-01-26 11:54:06 +01004770
4771 case TEST_EARLY_DATA_HRR:
Ronald Cron5fbd2702024-02-14 10:03:36 +01004772 if (!client_ep.ssl.handshake->hello_retry_request_flag) {
Ronald Cronb3d42fd2024-01-26 11:54:06 +01004773 TEST_EQUAL(write_early_data_ret, early_data_len);
4774 TEST_EQUAL(client_ep.ssl.state, MBEDTLS_SSL_SERVER_HELLO);
4775 } else {
4776 TEST_EQUAL(write_early_data_ret,
4777 MBEDTLS_ERR_SSL_CANNOT_WRITE_EARLY_DATA);
4778 TEST_EQUAL(client_ep.ssl.state, MBEDTLS_SSL_SERVER_HELLO);
4779 }
4780 break;
Ronald Cron24da9912024-02-15 16:13:44 +01004781
4782 default:
4783 TEST_FAIL("Unknown scenario.");
Ronald Cron2fbbba92024-01-26 20:13:42 +01004784 }
4785 break;
4786
4787 case MBEDTLS_SSL_ENCRYPTED_EXTENSIONS:
4788 switch (scenario) {
Ronald Cron05600e22024-01-26 10:23:31 +01004789 case TEST_EARLY_DATA_ACCEPTED: /* Intentional fallthrough */
4790 case TEST_EARLY_DATA_SERVER_REJECTS:
Ronald Cron2fbbba92024-01-26 20:13:42 +01004791 TEST_EQUAL(write_early_data_ret, early_data_len);
4792 TEST_EQUAL(client_ep.ssl.state, MBEDTLS_SSL_ENCRYPTED_EXTENSIONS);
4793 break;
Ronald Cronb3d42fd2024-01-26 11:54:06 +01004794
4795 case TEST_EARLY_DATA_HRR:
4796 TEST_EQUAL(write_early_data_ret, MBEDTLS_ERR_SSL_CANNOT_WRITE_EARLY_DATA);
4797 TEST_EQUAL(client_ep.ssl.state, MBEDTLS_SSL_ENCRYPTED_EXTENSIONS);
4798 break;
Ronald Cron24da9912024-02-15 16:13:44 +01004799
4800 default:
4801 TEST_FAIL("Unknown scenario.");
Ronald Cron2fbbba92024-01-26 20:13:42 +01004802 }
4803 break;
4804
4805 case MBEDTLS_SSL_SERVER_FINISHED:
4806 switch (scenario) {
4807 case TEST_EARLY_DATA_ACCEPTED:
4808 TEST_EQUAL(write_early_data_ret, early_data_len);
4809 TEST_EQUAL(client_ep.ssl.state, MBEDTLS_SSL_SERVER_FINISHED);
4810 break;
Ronald Cron05600e22024-01-26 10:23:31 +01004811
4812 case TEST_EARLY_DATA_SERVER_REJECTS:
4813 TEST_EQUAL(write_early_data_ret, MBEDTLS_ERR_SSL_CANNOT_WRITE_EARLY_DATA);
4814 TEST_EQUAL(client_ep.ssl.state, MBEDTLS_SSL_SERVER_FINISHED);
4815 break;
Ronald Cronb3d42fd2024-01-26 11:54:06 +01004816
4817 case TEST_EARLY_DATA_HRR:
4818 TEST_EQUAL(write_early_data_ret, MBEDTLS_ERR_SSL_CANNOT_WRITE_EARLY_DATA);
4819 TEST_EQUAL(client_ep.ssl.state, MBEDTLS_SSL_SERVER_FINISHED);
4820 break;
Ronald Cron24da9912024-02-15 16:13:44 +01004821
4822 default:
4823 TEST_FAIL("Unknown scenario.");
Ronald Cron2fbbba92024-01-26 20:13:42 +01004824 }
4825 break;
4826
4827 case MBEDTLS_SSL_END_OF_EARLY_DATA:
4828 TEST_EQUAL(scenario, TEST_EARLY_DATA_ACCEPTED);
4829 TEST_EQUAL(write_early_data_ret, MBEDTLS_ERR_SSL_CANNOT_WRITE_EARLY_DATA);
4830 TEST_EQUAL(client_ep.ssl.state, MBEDTLS_SSL_END_OF_EARLY_DATA);
4831 break;
4832
4833#if defined(MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE)
4834 case MBEDTLS_SSL_CLIENT_CCS_AFTER_CLIENT_HELLO:
4835 switch (scenario) {
Ronald Cron05600e22024-01-26 10:23:31 +01004836 case TEST_EARLY_DATA_ACCEPTED: /* Intentional fallthrough */
Ronald Cronb3d42fd2024-01-26 11:54:06 +01004837 case TEST_EARLY_DATA_SERVER_REJECTS: /* Intentional fallthrough */
4838 case TEST_EARLY_DATA_HRR:
Ronald Cron2fbbba92024-01-26 20:13:42 +01004839 TEST_EQUAL(write_early_data_ret, early_data_len);
4840 TEST_EQUAL(client_ep.ssl.state, MBEDTLS_SSL_SERVER_HELLO);
4841 break;
Ronald Cron24da9912024-02-15 16:13:44 +01004842 default:
4843 TEST_FAIL("Unknown scenario.");
Ronald Cron2fbbba92024-01-26 20:13:42 +01004844 }
4845 break;
4846
Ronald Cronb3d42fd2024-01-26 11:54:06 +01004847 case MBEDTLS_SSL_CLIENT_CCS_BEFORE_2ND_CLIENT_HELLO:
4848 TEST_EQUAL(scenario, TEST_EARLY_DATA_HRR);
4849 TEST_EQUAL(write_early_data_ret, MBEDTLS_ERR_SSL_CANNOT_WRITE_EARLY_DATA);
4850 TEST_EQUAL(client_ep.ssl.state, MBEDTLS_SSL_CLIENT_CCS_BEFORE_2ND_CLIENT_HELLO);
4851 break;
4852
Ronald Cron05600e22024-01-26 10:23:31 +01004853 case MBEDTLS_SSL_CLIENT_CCS_AFTER_SERVER_FINISHED:
Ronald Cron05600e22024-01-26 10:23:31 +01004854 switch (scenario) {
Ronald Cronb3d42fd2024-01-26 11:54:06 +01004855 case TEST_EARLY_DATA_SERVER_REJECTS: /* Intentional fallthrough */
4856 case TEST_EARLY_DATA_HRR:
4857 TEST_EQUAL(write_early_data_ret,
4858 MBEDTLS_ERR_SSL_CANNOT_WRITE_EARLY_DATA);
4859 TEST_EQUAL(client_ep.ssl.state,
4860 MBEDTLS_SSL_CLIENT_CCS_AFTER_SERVER_FINISHED);
Ronald Cron05600e22024-01-26 10:23:31 +01004861 break;
Ronald Cron24da9912024-02-15 16:13:44 +01004862 default:
4863 TEST_FAIL("Unexpected or unknown scenario.");
Ronald Cron05600e22024-01-26 10:23:31 +01004864 }
4865 break;
Ronald Cron2fbbba92024-01-26 20:13:42 +01004866#endif /* MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE */
4867
4868 case MBEDTLS_SSL_CLIENT_CERTIFICATE: /* Intentional fallthrough */
4869 case MBEDTLS_SSL_CLIENT_FINISHED: /* Intentional fallthrough */
4870 case MBEDTLS_SSL_FLUSH_BUFFERS: /* Intentional fallthrough */
4871 case MBEDTLS_SSL_HANDSHAKE_WRAPUP: /* Intentional fallthrough */
4872 case MBEDTLS_SSL_HANDSHAKE_OVER:
4873 switch (scenario) {
Ronald Cron05600e22024-01-26 10:23:31 +01004874 case TEST_EARLY_DATA_ACCEPTED: /* Intentional fallthrough */
Ronald Cronb3d42fd2024-01-26 11:54:06 +01004875 case TEST_EARLY_DATA_SERVER_REJECTS: /* Intentional fallthrough */
4876 case TEST_EARLY_DATA_HRR:
Ronald Cron2fbbba92024-01-26 20:13:42 +01004877 TEST_EQUAL(write_early_data_ret, MBEDTLS_ERR_SSL_CANNOT_WRITE_EARLY_DATA);
4878 TEST_EQUAL(client_ep.ssl.state, client_state);
4879 break;
Ronald Cron24da9912024-02-15 16:13:44 +01004880 default:
4881 TEST_FAIL("Unknown scenario.");
Ronald Cron2fbbba92024-01-26 20:13:42 +01004882 }
4883 break;
4884
4885 default:
4886 TEST_FAIL("Unexpected state.");
4887 }
4888
Ronald Cronbf5e9092024-02-21 15:31:36 +01004889complete_handshake:
4890 do {
4891 ret = mbedtls_test_move_handshake_to_state(
4892 &(server_ep.ssl), &(client_ep.ssl),
4893 MBEDTLS_SSL_HANDSHAKE_OVER);
4894
4895 if (ret == MBEDTLS_ERR_SSL_RECEIVED_EARLY_DATA) {
4896 read_early_data_ret = mbedtls_ssl_read_early_data(
4897 &(server_ep.ssl), read_buf, sizeof(read_buf));
4898
4899 TEST_EQUAL(read_early_data_ret, early_data_len);
4900 }
4901 } while (ret == MBEDTLS_ERR_SSL_RECEIVED_EARLY_DATA);
4902
4903 TEST_EQUAL(ret, 0);
4904 TEST_EQUAL(mbedtls_test_move_handshake_to_state(
4905 &(client_ep.ssl), &(server_ep.ssl),
4906 MBEDTLS_SSL_HANDSHAKE_OVER), 0);
4907
Ronald Cron2fbbba92024-01-26 20:13:42 +01004908 mbedtls_test_mock_socket_close(&(client_ep.socket));
4909 mbedtls_test_mock_socket_close(&(server_ep.socket));
4910
4911 ret = mbedtls_ssl_session_reset(&(client_ep.ssl));
4912 TEST_EQUAL(ret, 0);
4913
4914 ret = mbedtls_ssl_set_session(&(client_ep.ssl), &saved_session);
4915 TEST_EQUAL(ret, 0);
4916
4917 ret = mbedtls_ssl_session_reset(&(server_ep.ssl));
4918 TEST_EQUAL(ret, 0);
4919
4920 ret = mbedtls_test_mock_socket_connect(&(client_ep.socket),
4921 &(server_ep.socket), 1024);
4922 TEST_EQUAL(ret, 0);
4923
4924 previous_client_state = client_state;
Ronald Cron00046002024-02-21 16:00:12 +01004925 if (previous_client_state == MBEDTLS_SSL_HANDSHAKE_OVER) {
4926 break;
4927 }
4928
4929 /* In case of HRR scenario, once we have been through it, move over
4930 * the first ClientHello and ServerHello otherwise we just keep playing
4931 * this first part of the handshake with HRR.
4932 */
4933 if ((scenario == TEST_EARLY_DATA_HRR) && (beyond_first_hello)) {
4934 TEST_ASSERT(mbedtls_test_move_handshake_to_state(
4935 &(client_ep.ssl), &(server_ep.ssl),
4936 MBEDTLS_SSL_SERVER_HELLO) == 0);
4937 TEST_ASSERT(mbedtls_test_move_handshake_to_state(
4938 &(client_ep.ssl), &(server_ep.ssl),
4939 MBEDTLS_SSL_CLIENT_HELLO) == 0);
4940 }
4941
4942 TEST_EQUAL(mbedtls_test_move_handshake_to_state(
4943 &(client_ep.ssl), &(server_ep.ssl),
4944 previous_client_state), 0);
4945
4946 /* Progress the handshake from at least one state */
4947 while (client_ep.ssl.state == previous_client_state) {
4948 ret = mbedtls_ssl_handshake_step(&(client_ep.ssl));
4949 TEST_ASSERT((ret == 0) ||
4950 (ret == MBEDTLS_ERR_SSL_WANT_READ) ||
4951 (ret == MBEDTLS_ERR_SSL_WANT_WRITE));
4952 if (client_ep.ssl.state != previous_client_state) {
4953 break;
4954 }
4955 ret = mbedtls_ssl_handshake_step(&(server_ep.ssl));
4956 TEST_ASSERT((ret == 0) ||
4957 (ret == MBEDTLS_ERR_SSL_WANT_READ) ||
4958 (ret == MBEDTLS_ERR_SSL_WANT_WRITE));
4959 }
4960 } while (1);
Ronald Cron2fbbba92024-01-26 20:13:42 +01004961
4962exit:
4963 mbedtls_test_ssl_endpoint_free(&client_ep, NULL);
4964 mbedtls_test_ssl_endpoint_free(&server_ep, NULL);
4965 mbedtls_test_free_handshake_options(&client_options);
4966 mbedtls_test_free_handshake_options(&server_options);
4967 mbedtls_ssl_session_free(&saved_session);
4968 PSA_DONE();
4969}
4970/* END_CASE */
Ronald Cronaad85232024-02-07 08:04:07 +01004971
Elena Uziunaitebed21b52024-08-27 11:56:25 +01004972/* BEGIN_CASE depends_on:MBEDTLS_SSL_EARLY_DATA:MBEDTLS_SSL_CLI_C:MBEDTLS_SSL_SRV_C:MBEDTLS_DEBUG_C:MBEDTLS_TEST_AT_LEAST_ONE_TLS1_3_CIPHERSUITE:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED:PSA_WANT_ALG_SHA_256:PSA_WANT_ECC_SECP_R1_256:PSA_WANT_ECC_SECP_R1_384:PSA_HAVE_ALG_ECDSA_VERIFY:MBEDTLS_SSL_SESSION_TICKETS */
Ronald Cronaad85232024-02-07 08:04:07 +01004973void tls13_cli_max_early_data_size(int max_early_data_size_arg)
4974{
4975 int ret = -1;
4976 mbedtls_test_ssl_endpoint client_ep, server_ep;
4977 mbedtls_test_handshake_test_options client_options;
4978 mbedtls_test_handshake_test_options server_options;
4979 mbedtls_ssl_session saved_session;
Ronald Cronae6f9a52024-03-01 16:05:59 +01004980 unsigned char *buf = NULL;
4981 uint32_t buf_size = 64;
Ronald Cronaad85232024-02-07 08:04:07 +01004982 uint32_t max_early_data_size;
4983 uint32_t written_early_data_size = 0;
4984 uint32_t read_early_data_size = 0;
4985
4986 mbedtls_platform_zeroize(&client_ep, sizeof(client_ep));
4987 mbedtls_platform_zeroize(&server_ep, sizeof(server_ep));
4988 mbedtls_test_init_handshake_options(&client_options);
4989 mbedtls_test_init_handshake_options(&server_options);
4990 mbedtls_ssl_session_init(&saved_session);
4991
4992 PSA_INIT();
Ronald Cronae6f9a52024-03-01 16:05:59 +01004993 TEST_CALLOC(buf, buf_size);
Ronald Cronaad85232024-02-07 08:04:07 +01004994
4995 /*
4996 * Run first handshake to get a ticket from the server.
4997 */
4998
4999 client_options.pk_alg = MBEDTLS_PK_ECDSA;
5000 client_options.early_data = MBEDTLS_SSL_EARLY_DATA_ENABLED;
5001 server_options.pk_alg = MBEDTLS_PK_ECDSA;
5002 server_options.early_data = MBEDTLS_SSL_EARLY_DATA_ENABLED;
5003 server_options.max_early_data_size = max_early_data_size_arg;
5004
5005 ret = mbedtls_test_get_tls13_ticket(&client_options, &server_options,
5006 &saved_session);
5007 TEST_EQUAL(ret, 0);
5008
5009 /*
5010 * Prepare for handshake with the ticket.
5011 */
5012 ret = mbedtls_test_ssl_endpoint_init(&client_ep, MBEDTLS_SSL_IS_CLIENT,
5013 &client_options, NULL, NULL, NULL);
5014 TEST_EQUAL(ret, 0);
5015
5016 ret = mbedtls_test_ssl_endpoint_init(&server_ep, MBEDTLS_SSL_IS_SERVER,
5017 &server_options, NULL, NULL, NULL);
5018 TEST_EQUAL(ret, 0);
5019
5020 mbedtls_ssl_conf_session_tickets_cb(&server_ep.conf,
5021 mbedtls_test_ticket_write,
5022 mbedtls_test_ticket_parse,
5023 NULL);
5024
5025 max_early_data_size = saved_session.max_early_data_size;
5026 /*
5027 * (max_early_data_size + 1024) for the size of the socket buffers for the
5028 * server one to be able to contain the maximum number of early data bytes
Ronald Cron7c07aab2024-03-01 16:01:27 +01005029 * plus the first flight of client messages. Needed because we cannot
5030 * initiate the handshake on server side before doing all the calls to
Ronald Cronaad85232024-02-07 08:04:07 +01005031 * mbedtls_ssl_write_early_data() we want to test. See below for more
5032 * information.
5033 */
5034 ret = mbedtls_test_mock_socket_connect(&(client_ep.socket),
5035 &(server_ep.socket),
5036 max_early_data_size + 1024);
5037 TEST_EQUAL(ret, 0);
5038
5039 /* If our server is configured with max_early_data_size equal to zero, it
5040 * does not set the MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_EARLY_DATA flag for
5041 * the tickets it creates. To be able to test early data with a ticket
5042 * allowing early data in its flags but with max_early_data_size equal to
5043 * zero (case supported by our client) tweak the ticket flags here.
5044 */
5045 if (max_early_data_size == 0) {
5046 saved_session.ticket_flags |= MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_EARLY_DATA;
5047 }
5048
5049 ret = mbedtls_ssl_set_session(&(client_ep.ssl), &saved_session);
5050 TEST_EQUAL(ret, 0);
5051
5052 while (written_early_data_size < max_early_data_size) {
Ronald Cronaad85232024-02-07 08:04:07 +01005053 uint32_t remaining = max_early_data_size - written_early_data_size;
5054
Ronald Cronae6f9a52024-03-01 16:05:59 +01005055 for (size_t i = 0; i < buf_size; i++) {
Ronald Cronaad85232024-02-07 08:04:07 +01005056 buf[i] = (unsigned char) (written_early_data_size + i);
5057 }
5058
5059 ret = mbedtls_ssl_write_early_data(&(client_ep.ssl),
5060 buf,
Ronald Cronae6f9a52024-03-01 16:05:59 +01005061 buf_size);
Ronald Cronaad85232024-02-07 08:04:07 +01005062
Ronald Cronae6f9a52024-03-01 16:05:59 +01005063 if (buf_size <= remaining) {
5064 TEST_EQUAL(ret, buf_size);
Ronald Cronaad85232024-02-07 08:04:07 +01005065 } else {
5066 TEST_EQUAL(ret, remaining);
5067 }
Ronald Cronae6f9a52024-03-01 16:05:59 +01005068 written_early_data_size += buf_size;
Ronald Cronaad85232024-02-07 08:04:07 +01005069 }
Ronald Cron7c07aab2024-03-01 16:01:27 +01005070 TEST_EQUAL(client_ep.ssl.total_early_data_size, max_early_data_size);
Ronald Cronaad85232024-02-07 08:04:07 +01005071
Ronald Cronaad85232024-02-07 08:04:07 +01005072 ret = mbedtls_ssl_write_early_data(&(client_ep.ssl), buf, 1);
5073 TEST_EQUAL(ret, MBEDTLS_ERR_SSL_CANNOT_WRITE_EARLY_DATA);
Ronald Cronde9b03d2024-03-01 15:14:17 +01005074 TEST_EQUAL(client_ep.ssl.total_early_data_size, max_early_data_size);
Ronald Crond2884662024-03-03 15:03:22 +01005075 TEST_EQUAL(client_ep.ssl.early_data_state,
5076 MBEDTLS_SSL_EARLY_DATA_STATE_CAN_WRITE);
Ronald Cronaad85232024-02-07 08:04:07 +01005077
5078 /*
5079 * Now, check data on server side. It is not done in the previous loop as
5080 * in the first call to mbedtls_ssl_handshake(), the server ends up sending
5081 * its Finished message and then in the following call to
5082 * mbedtls_ssl_write_early_data() we go past the early data writing window
5083 * and we cannot test multiple calls to the API is this writing window.
5084 */
5085 while (read_early_data_size < max_early_data_size) {
5086 ret = mbedtls_ssl_handshake(&(server_ep.ssl));
5087 TEST_EQUAL(ret, MBEDTLS_ERR_SSL_RECEIVED_EARLY_DATA);
5088
5089 ret = mbedtls_ssl_read_early_data(&(server_ep.ssl),
5090 buf,
Ronald Cronae6f9a52024-03-01 16:05:59 +01005091 buf_size);
Ronald Cronaad85232024-02-07 08:04:07 +01005092 TEST_ASSERT(ret > 0);
5093
5094 for (size_t i = 0; i < (size_t) ret; i++) {
5095 TEST_EQUAL(buf[i], (unsigned char) (read_early_data_size + i));
5096 }
5097
5098 read_early_data_size += ret;
5099 }
5100 TEST_EQUAL(read_early_data_size, max_early_data_size);
5101
5102 ret = mbedtls_ssl_handshake(&(server_ep.ssl));
5103 TEST_EQUAL(ret, MBEDTLS_ERR_SSL_WANT_READ);
5104
Ronald Cron7c07aab2024-03-01 16:01:27 +01005105 TEST_ASSERT(mbedtls_test_move_handshake_to_state(
5106 &(client_ep.ssl), &(server_ep.ssl), MBEDTLS_SSL_HANDSHAKE_OVER)
5107 == 0);
Ronald Cronaad85232024-02-07 08:04:07 +01005108
5109exit:
5110 mbedtls_test_ssl_endpoint_free(&client_ep, NULL);
5111 mbedtls_test_ssl_endpoint_free(&server_ep, NULL);
5112 mbedtls_test_free_handshake_options(&client_options);
5113 mbedtls_test_free_handshake_options(&server_options);
5114 mbedtls_ssl_session_free(&saved_session);
Ronald Cronae6f9a52024-03-01 16:05:59 +01005115 mbedtls_free(buf);
Ronald Cronaad85232024-02-07 08:04:07 +01005116 PSA_DONE();
5117}
5118/* END_CASE */
Ronald Cron61fd13c2024-03-10 18:09:47 +01005119
Ronald Cron2160bfe2024-02-07 08:04:07 +01005120/*
5121 * The !MBEDTLS_SSL_PROTO_TLS1_2 dependency of tls13_early_data() below is
5122 * a temporary workaround to not run the test in Windows-2013 where there is
5123 * an issue with mbedtls_vsnprintf().
5124 */
Elena Uziunaitebed21b52024-08-27 11:56:25 +01005125/* BEGIN_CASE depends_on:!MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_SSL_EARLY_DATA:MBEDTLS_SSL_CLI_C:MBEDTLS_SSL_SRV_C:MBEDTLS_DEBUG_C:MBEDTLS_TEST_AT_LEAST_ONE_TLS1_3_CIPHERSUITE:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED:PSA_WANT_ALG_SHA_256:PSA_WANT_ECC_SECP_R1_256:PSA_WANT_ECC_SECP_R1_384:PSA_HAVE_ALG_ECDSA_VERIFY:MBEDTLS_SSL_SESSION_TICKETS */
Ronald Cron25ad10a2024-02-29 00:39:23 +01005126void tls13_srv_max_early_data_size(int scenario, int max_early_data_size_arg, int write_size_arg)
Ronald Cron2160bfe2024-02-07 08:04:07 +01005127{
5128 int ret = -1;
5129 mbedtls_test_ssl_endpoint client_ep, server_ep;
5130 mbedtls_test_handshake_test_options client_options;
5131 mbedtls_test_handshake_test_options server_options;
5132 mbedtls_ssl_session saved_session;
5133 mbedtls_test_ssl_log_pattern server_pattern = { NULL, 0 };
Ronald Cron01d273d2024-02-09 16:17:10 +01005134 uint16_t group_list[3] = {
5135 MBEDTLS_SSL_IANA_TLS_GROUP_SECP256R1,
5136 MBEDTLS_SSL_IANA_TLS_GROUP_SECP384R1,
5137 MBEDTLS_SSL_IANA_TLS_GROUP_NONE
5138 };
Ronald Cron2160bfe2024-02-07 08:04:07 +01005139 char pattern[128];
Ronald Cron25ad10a2024-02-29 00:39:23 +01005140 unsigned char *buf_write = NULL;
5141 uint32_t write_size = (uint32_t) write_size_arg;
5142 unsigned char *buf_read = NULL;
5143 uint32_t read_size;
Ronald Cron4facb0a2024-03-08 11:40:07 +01005144 uint32_t expanded_early_data_chunk_size = 0;
Ronald Cron2160bfe2024-02-07 08:04:07 +01005145 uint32_t written_early_data_size = 0;
Ronald Cron2160bfe2024-02-07 08:04:07 +01005146 uint32_t max_early_data_size;
5147
5148 mbedtls_platform_zeroize(&client_ep, sizeof(client_ep));
5149 mbedtls_platform_zeroize(&server_ep, sizeof(server_ep));
5150 mbedtls_test_init_handshake_options(&client_options);
5151 mbedtls_test_init_handshake_options(&server_options);
5152 mbedtls_ssl_session_init(&saved_session);
Ronald Crone93cd1b2024-03-01 19:30:00 +01005153 PSA_INIT();
5154
Ronald Cron25ad10a2024-02-29 00:39:23 +01005155 TEST_CALLOC(buf_write, write_size);
Ronald Cron2160bfe2024-02-07 08:04:07 +01005156
5157 /*
Ronald Cron25ad10a2024-02-29 00:39:23 +01005158 * Allocate a smaller buffer for early data reading to exercise the reading
5159 * of data in one record in multiple calls.
Ronald Crondc81b732024-02-26 15:02:26 +01005160 */
Ronald Cron25ad10a2024-02-29 00:39:23 +01005161 read_size = (write_size / 2) + 1;
5162 TEST_CALLOC(buf_read, read_size);
5163
Ronald Crondc81b732024-02-26 15:02:26 +01005164 /*
Ronald Cron2160bfe2024-02-07 08:04:07 +01005165 * Run first handshake to get a ticket from the server.
5166 */
5167
5168 client_options.pk_alg = MBEDTLS_PK_ECDSA;
Ronald Cron01d273d2024-02-09 16:17:10 +01005169 client_options.group_list = group_list;
Ronald Cron2160bfe2024-02-07 08:04:07 +01005170 client_options.early_data = MBEDTLS_SSL_EARLY_DATA_ENABLED;
5171 server_options.pk_alg = MBEDTLS_PK_ECDSA;
Ronald Cron01d273d2024-02-09 16:17:10 +01005172 server_options.group_list = group_list;
Ronald Cron2160bfe2024-02-07 08:04:07 +01005173 server_options.early_data = MBEDTLS_SSL_EARLY_DATA_ENABLED;
5174 server_options.max_early_data_size = max_early_data_size_arg;
5175
5176 ret = mbedtls_test_get_tls13_ticket(&client_options, &server_options,
5177 &saved_session);
5178 TEST_EQUAL(ret, 0);
5179
5180 /*
5181 * Prepare for handshake with the ticket.
5182 */
5183 server_options.srv_log_fun = mbedtls_test_ssl_log_analyzer;
5184 server_options.srv_log_obj = &server_pattern;
5185 server_pattern.pattern = pattern;
5186
5187 switch (scenario) {
5188 case TEST_EARLY_DATA_ACCEPTED:
5189 break;
5190
Ronald Cron919e5962024-02-08 15:48:29 +01005191 case TEST_EARLY_DATA_SERVER_REJECTS:
5192 server_options.early_data = MBEDTLS_SSL_EARLY_DATA_DISABLED;
5193 ret = mbedtls_snprintf(pattern, sizeof(pattern),
5194 "EarlyData: deprotect and discard app data records.");
5195 TEST_ASSERT(ret < (int) sizeof(pattern));
5196 mbedtls_debug_set_threshold(3);
5197 break;
5198
Ronald Cron01d273d2024-02-09 16:17:10 +01005199 case TEST_EARLY_DATA_HRR:
Ronald Cron52472102024-03-08 11:29:28 +01005200 /*
5201 * Remove server support for the group negotiated in
5202 * mbedtls_test_get_tls13_ticket() forcing an HelloRetryRequest.
5203 */
Ronald Cron01d273d2024-02-09 16:17:10 +01005204 server_options.group_list = group_list + 1;
5205 ret = mbedtls_snprintf(
5206 pattern, sizeof(pattern),
5207 "EarlyData: Ignore application message before 2nd ClientHello");
5208 TEST_ASSERT(ret < (int) sizeof(pattern));
5209 mbedtls_debug_set_threshold(3);
5210 break;
5211
Ronald Cron2160bfe2024-02-07 08:04:07 +01005212 default:
5213 TEST_FAIL("Unknown scenario.");
5214 }
5215
5216 ret = mbedtls_test_ssl_endpoint_init(&client_ep, MBEDTLS_SSL_IS_CLIENT,
5217 &client_options, NULL, NULL, NULL);
5218 TEST_EQUAL(ret, 0);
5219
5220 ret = mbedtls_test_ssl_endpoint_init(&server_ep, MBEDTLS_SSL_IS_SERVER,
5221 &server_options, NULL, NULL, NULL);
5222 TEST_EQUAL(ret, 0);
5223
5224 mbedtls_ssl_conf_session_tickets_cb(&server_ep.conf,
5225 mbedtls_test_ticket_write,
5226 mbedtls_test_ticket_parse,
5227 NULL);
5228
5229 ret = mbedtls_test_mock_socket_connect(&(client_ep.socket),
5230 &(server_ep.socket), 1024);
5231 TEST_EQUAL(ret, 0);
5232
5233 max_early_data_size = saved_session.max_early_data_size;
5234
5235 ret = mbedtls_ssl_set_session(&(client_ep.ssl), &saved_session);
5236 TEST_EQUAL(ret, 0);
5237
5238 /*
5239 * Start an handshake based on the ticket up to the point where early data
5240 * can be sent from client side. Then send in a loop as much early data as
5241 * possible without going over the maximum permitted size for the ticket.
5242 * Finally, do a last writting to go past that maximum permitted size and
5243 * check that we detect it.
5244 */
5245 TEST_EQUAL(mbedtls_test_move_handshake_to_state(
5246 &(client_ep.ssl), &(server_ep.ssl),
5247 MBEDTLS_SSL_SERVER_HELLO), 0);
5248
Ronald Crond2884662024-03-03 15:03:22 +01005249 TEST_ASSERT(client_ep.ssl.early_data_state !=
Ronald Cron3c5a6832024-03-03 15:46:57 +01005250 MBEDTLS_SSL_EARLY_DATA_STATE_NO_IND_SENT);
Ronald Cron2160bfe2024-02-07 08:04:07 +01005251
5252 ret = mbedtls_ssl_handshake(&(server_ep.ssl));
5253 TEST_EQUAL(ret, MBEDTLS_ERR_SSL_WANT_READ);
5254
Ronald Cron25ad10a2024-02-29 00:39:23 +01005255 /*
5256 * Write and if possible read as much as possible chunks of write_size
5257 * bytes data without getting over the max_early_data_size limit.
5258 */
5259 do {
Ronald Cron2160bfe2024-02-07 08:04:07 +01005260 uint32_t read_early_data_size = 0;
Ronald Cron2160bfe2024-02-07 08:04:07 +01005261
Ronald Cron52472102024-03-08 11:29:28 +01005262 /*
5263 * The contents of the early data are not very important, write a
5264 * pattern that varies byte-by-byte and is different for every chunk of
5265 * early data.
5266 */
Ronald Cron25ad10a2024-02-29 00:39:23 +01005267 if ((written_early_data_size + write_size) > max_early_data_size) {
5268 break;
Ronald Cron2160bfe2024-02-07 08:04:07 +01005269 }
5270
Ronald Cron25ad10a2024-02-29 00:39:23 +01005271 /*
5272 * If the server rejected early data, base the determination of when
Ronald Cron4facb0a2024-03-08 11:40:07 +01005273 * to stop the loop on the expanded size (padding and encryption
Ronald Cron25ad10a2024-02-29 00:39:23 +01005274 * expansion) of early data on server side and the number of early data
Ronald Cron4facb0a2024-03-08 11:40:07 +01005275 * received so far by the server (multiple of the expanded size).
Ronald Cron25ad10a2024-02-29 00:39:23 +01005276 */
Ronald Cron4facb0a2024-03-08 11:40:07 +01005277 if ((expanded_early_data_chunk_size != 0) &&
Ronald Cron25ad10a2024-02-29 00:39:23 +01005278 ((server_ep.ssl.total_early_data_size +
Ronald Cron4facb0a2024-03-08 11:40:07 +01005279 expanded_early_data_chunk_size) > max_early_data_size)) {
Ronald Cron25ad10a2024-02-29 00:39:23 +01005280 break;
5281 }
5282
5283 for (size_t i = 0; i < write_size; i++) {
Ronald Cron2160bfe2024-02-07 08:04:07 +01005284 buf_write[i] = (unsigned char) (written_early_data_size + i);
5285 }
5286
Ronald Cron25ad10a2024-02-29 00:39:23 +01005287 ret = write_early_data(&(client_ep.ssl), buf_write, write_size);
5288 TEST_EQUAL(ret, write_size);
5289 written_early_data_size += write_size;
Ronald Cron2160bfe2024-02-07 08:04:07 +01005290
5291 switch (scenario) {
5292 case TEST_EARLY_DATA_ACCEPTED:
Ronald Cron25ad10a2024-02-29 00:39:23 +01005293 while (read_early_data_size < write_size) {
Ronald Cron2160bfe2024-02-07 08:04:07 +01005294 ret = mbedtls_ssl_handshake(&(server_ep.ssl));
5295 TEST_EQUAL(ret, MBEDTLS_ERR_SSL_RECEIVED_EARLY_DATA);
5296
5297 ret = mbedtls_ssl_read_early_data(&(server_ep.ssl),
Ronald Cron25ad10a2024-02-29 00:39:23 +01005298 buf_read, read_size);
Ronald Cron2160bfe2024-02-07 08:04:07 +01005299 TEST_ASSERT(ret > 0);
5300
5301 TEST_MEMORY_COMPARE(buf_read, ret,
5302 buf_write + read_early_data_size, ret);
5303 read_early_data_size += ret;
5304
Ronald Cron19bfe0a2024-02-26 16:43:01 +01005305 TEST_EQUAL(server_ep.ssl.total_early_data_size,
Ronald Cron2160bfe2024-02-07 08:04:07 +01005306 written_early_data_size);
5307 }
5308 break;
Ronald Cron919e5962024-02-08 15:48:29 +01005309
Ronald Cron01d273d2024-02-09 16:17:10 +01005310 case TEST_EARLY_DATA_SERVER_REJECTS: /* Intentional fallthrough */
5311 case TEST_EARLY_DATA_HRR:
Ronald Cron919e5962024-02-08 15:48:29 +01005312 ret = mbedtls_ssl_handshake(&(server_ep.ssl));
5313 /*
Ronald Cron1a13e2f2024-03-08 14:44:35 +01005314 * In this write loop we try to always stay below the
5315 * max_early_data_size limit but if max_early_data_size is very
5316 * small we may exceed the max_early_data_size limit on the
5317 * first write. In TEST_EARLY_DATA_SERVER_REJECTS/
5318 * TEST_EARLY_DATA_HRR scenario, this is for sure the case if
5319 * max_early_data_size is smaller than the smallest possible
5320 * inner content/protected record. Take into account this
5321 * possibility here but only for max_early_data_size values
Ronald Crone1295fa2024-03-08 17:03:16 +01005322 * that are close to write_size. Below, '1' is for the inner
5323 * type byte and '16' is to take into account some AEAD
5324 * expansion (tag, ...).
Ronald Cron919e5962024-02-08 15:48:29 +01005325 */
5326 if (ret == MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE) {
Ronald Cron1a13e2f2024-03-08 14:44:35 +01005327 if (scenario == TEST_EARLY_DATA_SERVER_REJECTS) {
5328 TEST_LE_U(max_early_data_size,
5329 write_size + 1 +
5330 MBEDTLS_SSL_CID_TLS1_3_PADDING_GRANULARITY);
5331 } else {
5332 TEST_LE_U(max_early_data_size,
5333 write_size + 1 + 16 +
5334 MBEDTLS_SSL_CID_TLS1_3_PADDING_GRANULARITY);
5335 }
Ronald Cron919e5962024-02-08 15:48:29 +01005336 goto exit;
5337 }
5338
5339 TEST_ASSERT(ret == MBEDTLS_ERR_SSL_WANT_READ);
5340
5341 TEST_EQUAL(server_pattern.counter, 1);
5342 server_pattern.counter = 0;
Ronald Cron4facb0a2024-03-08 11:40:07 +01005343 if (expanded_early_data_chunk_size == 0) {
5344 expanded_early_data_chunk_size = server_ep.ssl.total_early_data_size;
Ronald Cron919e5962024-02-08 15:48:29 +01005345 }
Ronald Cron919e5962024-02-08 15:48:29 +01005346 break;
Ronald Cron2160bfe2024-02-07 08:04:07 +01005347 }
Ronald Cron4facb0a2024-03-08 11:40:07 +01005348 TEST_LE_U(server_ep.ssl.total_early_data_size, max_early_data_size);
Ronald Cron25ad10a2024-02-29 00:39:23 +01005349 } while (1);
Ronald Cron2160bfe2024-02-07 08:04:07 +01005350
5351 mbedtls_debug_set_threshold(3);
Ronald Cron25ad10a2024-02-29 00:39:23 +01005352 ret = write_early_data(&(client_ep.ssl), buf_write, write_size);
5353 TEST_EQUAL(ret, write_size);
Ronald Cron2160bfe2024-02-07 08:04:07 +01005354
5355 ret = mbedtls_snprintf(pattern, sizeof(pattern),
Ronald Cron70eab452024-02-26 15:50:15 +01005356 "EarlyData: Too much early data received");
Ronald Cron2160bfe2024-02-07 08:04:07 +01005357 TEST_ASSERT(ret < (int) sizeof(pattern));
5358
5359 ret = mbedtls_ssl_handshake(&(server_ep.ssl));
5360 TEST_EQUAL(ret, MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE);
5361 TEST_EQUAL(server_pattern.counter, 1);
5362
5363exit:
5364 mbedtls_test_ssl_endpoint_free(&client_ep, NULL);
5365 mbedtls_test_ssl_endpoint_free(&server_ep, NULL);
5366 mbedtls_test_free_handshake_options(&client_options);
5367 mbedtls_test_free_handshake_options(&server_options);
5368 mbedtls_ssl_session_free(&saved_session);
Ronald Crone93cd1b2024-03-01 19:30:00 +01005369 mbedtls_free(buf_write);
5370 mbedtls_free(buf_read);
Ronald Cron2160bfe2024-02-07 08:04:07 +01005371 mbedtls_debug_set_threshold(0);
5372 PSA_DONE();
5373}
5374/* END_CASE */
Manuel Pégourié-Gonnard6637ef72025-02-11 13:19:45 +01005375
Manuel Pégourié-Gonnardae567ad2025-02-25 10:32:20 +01005376/* BEGIN_CASE depends_on:MBEDTLS_DEBUG_C:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED */
Manuel Pégourié-Gonnarde9166522025-02-12 12:36:28 +01005377void inject_client_content_on_the_wire(int pk_alg,
5378 int state, data_t *data,
5379 char *log_pattern, int expected_ret)
Manuel Pégourié-Gonnard6637ef72025-02-11 13:19:45 +01005380{
5381 /* This function allows us to inject content at a specific state
5382 * in the handshake, or when it's completed. The content is injected
5383 * on the mock TCP socket, as if we were an active network attacker.
5384 *
5385 * This function is suitable to inject:
5386 * - crafted records, at any point;
5387 * - valid records that contain crafted handshake messages, but only
5388 * when the traffic is still unprotected (for TLS 1.2 that's most of the
5389 * handshake, for TLS 1.3 that's only the Hello messages);
5390 * - handshake messages that are fragmented in a specific way,
5391 * under the same conditions as above.
5392 */
5393 enum { BUFFSIZE = 16384 };
5394 mbedtls_test_ssl_endpoint server, client;
5395 mbedtls_platform_zeroize(&server, sizeof(server));
5396 mbedtls_platform_zeroize(&client, sizeof(client));
5397 mbedtls_test_handshake_test_options options;
5398 mbedtls_test_init_handshake_options(&options);
5399 mbedtls_test_ssl_log_pattern srv_pattern;
5400 memset(&srv_pattern, 0, sizeof(srv_pattern));
5401 int ret = -1;
5402
5403 PSA_INIT();
5404
5405 srv_pattern.pattern = log_pattern;
5406 options.srv_log_obj = &srv_pattern;
5407 options.srv_log_fun = mbedtls_test_ssl_log_analyzer;
Manuel Pégourié-Gonnardaf4606d2025-03-11 12:12:51 +01005408 mbedtls_debug_set_threshold(3);
Manuel Pégourié-Gonnarde9166522025-02-12 12:36:28 +01005409
5410 options.pk_alg = pk_alg;
Manuel Pégourié-Gonnard6637ef72025-02-11 13:19:45 +01005411
5412 ret = mbedtls_test_ssl_endpoint_init(&server, MBEDTLS_SSL_IS_SERVER,
5413 &options, NULL, NULL, NULL);
5414 TEST_EQUAL(ret, 0);
5415
5416 ret = mbedtls_test_ssl_endpoint_init(&client, MBEDTLS_SSL_IS_CLIENT,
5417 &options, NULL, NULL, NULL);
5418 TEST_EQUAL(ret, 0);
5419
5420 ret = mbedtls_test_mock_socket_connect(&server.socket, &client.socket,
5421 BUFFSIZE);
5422 TEST_EQUAL(ret, 0);
5423
5424 /* Make the server move to the required state */
5425 ret = mbedtls_test_move_handshake_to_state(&client.ssl, &server.ssl, state);
5426 TEST_EQUAL(ret, 0);
5427
5428 /* Send the crafted message */
Manuel Pégourié-Gonnarde9166522025-02-12 12:36:28 +01005429 ret = mbedtls_test_mock_tcp_send_b(&client.socket, data->x, data->len);
Manuel Pégourié-Gonnard47d0b792025-03-11 10:27:49 +01005430 TEST_EQUAL(ret, (int) data->len);
Manuel Pégourié-Gonnard6637ef72025-02-11 13:19:45 +01005431
5432 /* Have the server process it.
5433 * Need the loop because a server that support 1.3 and 1.2
5434 * will process a 1.2 ClientHello in two steps.
5435 */
5436 do {
5437 ret = mbedtls_ssl_handshake_step(&server.ssl);
5438 } while (ret == 0 && server.ssl.state == state);
5439 TEST_EQUAL(ret, expected_ret);
Manuel Pégourié-Gonnardaf4606d2025-03-11 12:12:51 +01005440 TEST_ASSERT(srv_pattern.counter >= 1);
Manuel Pégourié-Gonnard6637ef72025-02-11 13:19:45 +01005441
5442exit:
5443 mbedtls_test_free_handshake_options(&options);
5444 mbedtls_test_ssl_endpoint_free(&server, NULL);
5445 mbedtls_test_ssl_endpoint_free(&client, NULL);
5446 mbedtls_debug_set_threshold(0);
5447 PSA_DONE();
5448}
5449/* END_CASE */
Manuel Pégourié-Gonnard1bed8272025-02-26 13:01:10 +01005450
Manuel Pégourié-Gonnard6dcfdf12025-03-12 09:35:51 +01005451/* BEGIN_CASE depends_on:MBEDTLS_SSL_PROTO_TLS1_3:MBEDTLS_DEBUG_C:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED:PSA_WANT_ALG_SHA_256:PSA_WANT_ECC_SECP_R1_256:PSA_WANT_ECC_SECP_R1_384:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT:PSA_WANT_ALG_ECDSA_ANY */
Manuel Pégourié-Gonnard1bed8272025-02-26 13:01:10 +01005452void send_large_fragmented_hello(int hs_len_int, int first_frag_content_len_int,
5453 char *log_pattern, int expected_ret)
5454{
5455 /* This function sends a long message (claiming to be a ClientHello)
5456 * fragmented in 1-byte fragments (except the initial fragment).
5457 * The purpose is to test how the stack reacts when receiving:
5458 * - a message larger than our buffer;
5459 * - a message smaller than our buffer, but where the intermediate size of
5460 * holding all the fragments (including overhead) is larger than our
5461 * buffer.
5462 */
5463 enum { BUFFSIZE = 16384 };
5464 mbedtls_test_ssl_endpoint server, client;
5465 mbedtls_platform_zeroize(&server, sizeof(server));
5466 mbedtls_platform_zeroize(&client, sizeof(client));
5467
5468 mbedtls_test_handshake_test_options options;
5469 mbedtls_test_init_handshake_options(&options);
5470
5471 mbedtls_test_ssl_log_pattern srv_pattern;
5472 memset(&srv_pattern, 0, sizeof(srv_pattern));
5473
5474 unsigned char *first_frag = NULL;
5475 int ret = -1;
5476
5477 size_t hs_len = (size_t) hs_len_int;
5478 size_t first_frag_content_len = (size_t) first_frag_content_len_int;
5479
5480 PSA_INIT();
5481
5482 srv_pattern.pattern = log_pattern;
5483 options.srv_log_obj = &srv_pattern;
5484 options.srv_log_fun = mbedtls_test_ssl_log_analyzer;
Manuel Pégourié-Gonnard1038b222025-03-05 11:53:09 +01005485 mbedtls_debug_set_threshold(1);
Manuel Pégourié-Gonnard1bed8272025-02-26 13:01:10 +01005486
Manuel Pégourié-Gonnard299f94a2025-03-04 10:12:25 +01005487 // Does't really matter but we want to know to declare dependencies.
5488 options.pk_alg = MBEDTLS_PK_ECDSA;
5489
Manuel Pégourié-Gonnard1bed8272025-02-26 13:01:10 +01005490 ret = mbedtls_test_ssl_endpoint_init(&server, MBEDTLS_SSL_IS_SERVER,
5491 &options, NULL, NULL, NULL);
5492 TEST_EQUAL(ret, 0);
5493
5494 ret = mbedtls_test_ssl_endpoint_init(&client, MBEDTLS_SSL_IS_CLIENT,
5495 &options, NULL, NULL, NULL);
5496 TEST_EQUAL(ret, 0);
5497
5498 ret = mbedtls_test_mock_socket_connect(&server.socket, &client.socket,
5499 BUFFSIZE);
5500 TEST_EQUAL(ret, 0);
5501
5502 /* Make the server move past the initial dummy state */
5503 ret = mbedtls_test_move_handshake_to_state(&client.ssl, &server.ssl,
5504 MBEDTLS_SSL_CLIENT_HELLO);
5505 TEST_EQUAL(ret, 0);
5506
5507 /* Prepare initial fragment */
5508 const size_t first_len = 5 // record header, see below
5509 + 4 // handshake header, see balow
5510 + first_frag_content_len;
5511 TEST_CALLOC(first_frag, first_len);
5512 unsigned char *p = first_frag;
5513 // record header
5514 // record type: handshake
5515 *p++ = 0x16,
5516 // record version (actually common to TLS 1.2 and TLS 1.3)
5517 *p++ = 0x03,
5518 *p++ = 0x03,
5519 // record length: two bytes
5520 *p++ = (unsigned char) (((4 + first_frag_content_len) >> 8) & 0xff);
5521 *p++ = (unsigned char) (((4 + first_frag_content_len) >> 0) & 0xff);
5522 // handshake header
5523 // handshake type: ClientHello
5524 *p++ = 0x01,
5525 // handshake length: three bytes
5526 *p++ = (unsigned char) ((hs_len >> 16) & 0xff);
5527 *p++ = (unsigned char) ((hs_len >> 8) & 0xff);
5528 *p++ = (unsigned char) ((hs_len >> 0) & 0xff);
5529 // handshake content: dummy value
5530 memset(p, 0x2a, first_frag_content_len);
5531
5532 /* Send initial fragment and have the server process it. */
5533 ret = mbedtls_test_mock_tcp_send_b(&client.socket, first_frag, first_len);
5534 TEST_ASSERT(ret >= 0 && (size_t) ret == first_len);
5535
5536 ret = mbedtls_ssl_handshake_step(&server.ssl);
5537 TEST_EQUAL(ret, MBEDTLS_ERR_SSL_WANT_READ);
5538
5539 /* Dummy 1-byte fragment to repeatedly send next */
5540 const unsigned char next[] = {
5541 0x16, 0x03, 0x03, 0x00, 0x01, // record header (see above)
5542 0x2a, // Dummy handshake message content
5543 };
5544 for (size_t left = hs_len - first_frag_content_len; left != 0; left--) {
5545 ret = mbedtls_test_mock_tcp_send_b(&client.socket, next, sizeof(next));
5546 TEST_ASSERT(ret >= 0 && (size_t) ret == sizeof(next));
5547
5548 ret = mbedtls_ssl_handshake_step(&server.ssl);
5549 if (ret != MBEDTLS_ERR_SSL_WANT_READ) {
5550 break;
5551 }
5552 }
5553 TEST_EQUAL(ret, expected_ret);
5554 TEST_EQUAL(srv_pattern.counter, 1);
5555
5556exit:
5557 mbedtls_test_free_handshake_options(&options);
5558 mbedtls_test_ssl_endpoint_free(&server, NULL);
5559 mbedtls_test_ssl_endpoint_free(&client, NULL);
5560 mbedtls_debug_set_threshold(0);
5561 mbedtls_free(first_frag);
5562 PSA_DONE();
5563}
5564/* END_CASE */