blob: 061adba762e492019890b75c7472159ba25f3f7b [file] [log] [blame]
Manuel Pégourié-Gonnard4956fd72014-09-24 11:13:44 +02001/* BEGIN_HEADER */
Chris Jones84a773f2021-03-05 18:38:47 +00002#include <ssl_misc.h>
Andrzej Kurek941962e2020-02-07 09:20:32 -05003#include <mbedtls/timing.h>
Piotr Nowickibde7ee82020-02-21 10:59:50 +01004#include <mbedtls/debug.h>
Valerio Setti1b08d422023-02-13 11:33:26 +01005#include <mbedtls/pk.h>
Hanno Becker73c825a2020-09-08 10:52:58 +01006#include <ssl_tls13_keys.h>
Gabor Mezeib35759d2022-02-09 16:59:11 +01007#include <ssl_tls13_invasive.h>
Yanray Wang47907a42022-10-24 14:42:01 +08008#include <test/ssl_helpers.h>
Piotr Nowickibde7ee82020-02-21 10:59:50 +01009
Gabor Mezei22c9a6f2021-10-20 12:09:35 +020010#include <constant_time_internal.h>
Manuel Pégourié-Gonnard9670a592020-07-10 10:21:46 +020011#include <test/constant_flow.h>
12
Valerio Setti7c0f91b2023-04-28 12:20:34 +020013#define SSL_MESSAGE_QUEUE_INIT { NULL, 0, 0, 0 }
14
Ronald Cron33327da2024-02-05 17:46:41 +010015/* Mnemonics for the early data test scenarios */
Ronald Cron5c208d72024-01-24 10:13:30 +010016#define TEST_EARLY_DATA_ACCEPTED 0
Ronald Cron265273e2024-01-24 11:13:19 +010017#define TEST_EARLY_DATA_NO_INDICATION_SENT 1
Ronald Crond6dba672024-01-24 12:22:24 +010018#define TEST_EARLY_DATA_SERVER_REJECTS 2
Ronald Cron2261ab22024-01-24 13:38:31 +010019#define TEST_EARLY_DATA_HRR 3
Waleed Elmelegy4dfb0e72024-03-14 01:48:40 +000020#define TEST_EARLY_DATA_SAME_ALPN 4
21#define TEST_EARLY_DATA_DIFF_ALPN 5
22#define TEST_EARLY_DATA_NO_INITIAL_ALPN 6
23#define TEST_EARLY_DATA_NO_LATER_ALPN 7
Ronald Cron33327da2024-02-05 17:46:41 +010024
Ronald Cronae2d81c2024-01-22 09:13:41 +010025#if (!defined(MBEDTLS_SSL_PROTO_TLS1_2)) && \
26 defined(MBEDTLS_SSL_EARLY_DATA) && defined(MBEDTLS_SSL_CLI_C) && \
Ronald Crona8dd81b2024-01-16 17:50:52 +010027 defined(MBEDTLS_SSL_SRV_C) && defined(MBEDTLS_DEBUG_C) && \
28 defined(MBEDTLS_TEST_AT_LEAST_ONE_TLS1_3_CIPHERSUITE) && \
29 defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED) && \
30 defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED) && \
Elena Uziunaite0916cd72024-05-23 17:01:07 +010031 defined(PSA_WANT_ALG_SHA_256) && \
Elena Uziunaite6b4cd482024-07-04 17:50:11 +010032 defined(PSA_WANT_ECC_SECP_R1_256) && defined(PSA_WANT_ECC_SECP_R1_384) && \
Elena Uziunaitebed21b52024-08-27 11:56:25 +010033 defined(PSA_HAVE_ALG_ECDSA_VERIFY) && defined(MBEDTLS_SSL_SESSION_TICKETS)
Ronald Crona8dd81b2024-01-16 17:50:52 +010034/*
Ronald Cronfcbf7762024-03-01 10:00:42 +010035 * Test function to write early data for negative tests where
36 * mbedtls_ssl_write_early_data() cannot be used.
Ronald Crona8dd81b2024-01-16 17:50:52 +010037 */
38static int write_early_data(mbedtls_ssl_context *ssl,
39 unsigned char *buf, size_t len)
40{
41 int ret = mbedtls_ssl_get_max_out_record_payload(ssl);
42
43 TEST_ASSERT(ret > 0);
Ronald Cron4facb0a2024-03-08 11:40:07 +010044 TEST_LE_U(len, (size_t) ret);
Ronald Crona8dd81b2024-01-16 17:50:52 +010045
46 ret = mbedtls_ssl_flush_output(ssl);
47 TEST_EQUAL(ret, 0);
48 TEST_EQUAL(ssl->out_left, 0);
49
50 ssl->out_msglen = len;
51 ssl->out_msgtype = MBEDTLS_SSL_MSG_APPLICATION_DATA;
52 if (len > 0) {
53 memcpy(ssl->out_msg, buf, len);
54 }
55
56 ret = mbedtls_ssl_write_record(ssl, 1);
57 TEST_EQUAL(ret, 0);
58
59 ret = len;
60
61exit:
62 return ret;
63}
64#endif
65
Gabor Mezei5ba9b572025-03-20 09:17:05 +010066#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED) && \
67 defined(MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH) && \
68 defined(MBEDTLS_SSL_PROTO_TLS1_2) && \
69 defined(PSA_WANT_ECC_SECP_R1_384) && \
70 defined(PSA_WANT_ALG_SHA_256)
71/*
72 * Test function to perform a handshake using the mfl extension and with
73 * setting the resize buffer option.
74 */
75static void resize_buffers(int mfl, int renegotiation, int legacy_renegotiation,
76 int serialize, int dtls, char *cipher)
77{
78 mbedtls_test_handshake_test_options options;
79 mbedtls_test_init_handshake_options(&options);
80
81 options.mfl = mfl;
82 options.cipher = cipher;
83 options.renegotiate = renegotiation;
84 options.legacy_renegotiation = legacy_renegotiation;
85 options.serialize = serialize;
86 options.dtls = dtls;
87 if (dtls) {
88 options.expected_negotiated_version = MBEDTLS_SSL_VERSION_TLS1_2;
89 }
90 options.resize_buffers = 1;
91
92 const mbedtls_ssl_ciphersuite_t *ciphersuite =
93 mbedtls_ssl_ciphersuite_from_string(cipher);
94 if (ciphersuite != NULL) {
95 options.pk_alg = mbedtls_ssl_get_ciphersuite_sig_pk_alg(ciphersuite);
96 }
97
98 mbedtls_test_ssl_perform_handshake(&options);
99
100 mbedtls_test_free_handshake_options(&options);
101}
102
103#endif
104
Valerio Setti1494a092025-01-30 16:45:45 +0100105#if defined(PSA_WANT_ALG_GCM) || defined(PSA_WANT_ALG_CHACHA20_POLY1305)
106#define TEST_GCM_OR_CHACHAPOLY_ENABLED
107#endif
108
Gilles Peskine92122ed2025-03-07 20:40:50 +0100109typedef enum {
110 RECOMBINE_NOMINAL, /* param: ignored */
Gilles Peskine7c1dbef2025-03-07 20:48:01 +0100111 RECOMBINE_SPLIT_FIRST, /* param: offset of split (<=0 means from end) */
112 RECOMBINE_INSERT_EMPTY, /* param: offset (<0 means from end) */
Gilles Peskine92122ed2025-03-07 20:40:50 +0100113 RECOMBINE_COALESCE, /* param: min number of records */
Gilles Peskine7c1dbef2025-03-07 20:48:01 +0100114 RECOMBINE_COALESCE_SPLIT_ONCE, /* param: offset of split (<=0 means from end) */
115 RECOMBINE_COALESCE_SPLIT_ENDS, /* the hairiest one? param: offset, must be >0 */
Gilles Peskine92122ed2025-03-07 20:40:50 +0100116} recombine_records_instruction_t;
117
Gilles Peskine07426722025-03-07 23:01:42 +0100118#if defined(MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED)
119
Gilles Peskine7c1dbef2025-03-07 20:48:01 +0100120/* Split the first record into two pieces of lengths offset and
121 * record_length-offset. If offset is zero or negative, count from the end of
122 * the record. */
123static int recombine_split_first_record(mbedtls_test_ssl_buffer *buf,
124 int offset)
125{
126 const size_t header_length = 5;
127 TEST_LE_U(header_length, buf->content_length);
128 size_t record_length = MBEDTLS_GET_UINT16_BE(buf->buffer, header_length - 2);
129
130 if (offset > 0) {
131 TEST_LE_S(offset, record_length);
132 } else {
133 TEST_LE_S(-offset, record_length);
134 offset = record_length + offset;
135 }
136
137 /* Check that we have room to insert a record header */
138 TEST_LE_U(buf->content_length + header_length, buf->capacity);
139
140 /* Make room for a record header */
141 size_t new_record_start = header_length + offset;
142 size_t new_content_start = new_record_start + header_length;
143 memmove(buf->buffer + new_content_start,
144 buf->buffer + new_record_start,
145 buf->content_length - new_record_start);
146 buf->content_length += header_length;
147
148 /* Construct a header for the new record based on the existing one */
149 memcpy(buf->buffer + new_record_start, buf->buffer, header_length);
150 MBEDTLS_PUT_UINT16_BE(record_length - offset,
151 buf->buffer, new_content_start - 2);
152
153 /* Adjust the length of the first record */
154 MBEDTLS_PUT_UINT16_BE(offset, buf->buffer, header_length - 2);
155
156 return 0;
157
158exit:
159 return -1;
160}
161
162/* Insert an empty record at the given offset. If offset is negative,
163 * count from the end of the first record. */
164static int recombine_insert_empty_record(mbedtls_test_ssl_buffer *buf,
165 int offset)
166{
167 const size_t header_length = 5;
168 TEST_LE_U(header_length, buf->content_length);
169 size_t record_length = MBEDTLS_GET_UINT16_BE(buf->buffer, header_length - 2);
170
171 if (offset >= 0) {
172 TEST_LE_S(offset, record_length);
173 } else {
174 TEST_LE_S(-offset, record_length);
175 offset = record_length + offset;
176 }
177
178 /* Check that we have room to insert two record headers */
179 TEST_LE_U(buf->content_length + 2 * header_length, buf->capacity);
180
181 /* Make room for an empty record and a record header */
182 size_t empty_record_start = header_length + offset;
183 size_t empty_content_start = empty_record_start + header_length;
184 size_t tail_record_start = empty_content_start;
185 size_t tail_content_start = tail_record_start + header_length;
186 memmove(buf->buffer + tail_content_start,
187 buf->buffer + tail_record_start,
188 buf->content_length - tail_record_start);
189 buf->content_length += 2 * header_length;
190
191 /* Construct headers for the new records based on the existing one */
192 memcpy(buf->buffer + empty_record_start, buf->buffer, header_length);
193 MBEDTLS_PUT_UINT16_BE(0, buf->buffer, empty_content_start - 2);
194 memcpy(buf->buffer + tail_record_start, buf->buffer, header_length);
195 MBEDTLS_PUT_UINT16_BE(record_length - offset,
196 buf->buffer, tail_content_start - 2);
197
198 /* Adjust the length of the first record */
199 MBEDTLS_PUT_UINT16_BE(offset, buf->buffer, header_length - 2);
200
201 return 0;
202
203exit:
204 return -1;
205}
206
Gilles Peskine92122ed2025-03-07 20:40:50 +0100207/* Coalesce TLS handshake records.
208 * DTLS is not supported.
209 * Encrypted or authenticated handshake records are not supported.
210 * Assume the buffer content is a valid sequence of records.
211 */
212static int recombine_coalesce_handshake_records(mbedtls_test_ssl_buffer *buf,
213 int max)
214{
215 const size_t header_length = 5;
216 TEST_LE_U(header_length, buf->content_length);
217 if (buf->buffer[0] != MBEDTLS_SSL_MSG_HANDSHAKE) {
218 return 0;
219 }
220
221 size_t record_length = MBEDTLS_GET_UINT16_BE(buf->buffer, header_length - 2);
222 TEST_LE_U(header_length + record_length, buf->content_length);
223
224 int count;
225 for (count = 1; count < max; count++) {
226 size_t next_start = header_length + record_length;
227 if (next_start >= buf->content_length) {
228 /* We've already reached the last record. */
229 break;
230 }
231
232 TEST_LE_U(next_start + header_length, buf->content_length);
233 if (buf->buffer[next_start] != MBEDTLS_SSL_MSG_HANDSHAKE) {
234 /* There's another record, but it isn't a handshake record. */
235 break;
236 }
237 size_t next_length =
238 MBEDTLS_GET_UINT16_BE(buf->buffer, next_start + header_length - 2);
239 TEST_LE_U(next_start + header_length + next_length, buf->content_length);
240
241 /* Erase the next record header */
242 memmove(buf->buffer + next_start,
243 buf->buffer + next_start + header_length,
244 buf->content_length - next_start);
245 buf->content_length -= header_length;
246 /* Update the first record length */
247 record_length += next_length;
248 TEST_LE_U(record_length, 0xffff);
249 MBEDTLS_PUT_UINT16_BE(record_length, buf->buffer, header_length - 2);
250 }
251
252 return count;
253
254exit:
255 return -1;
256}
257
258static int recombine_records(mbedtls_test_ssl_endpoint *server,
259 recombine_records_instruction_t instruction,
260 int param)
261{
262 mbedtls_test_ssl_buffer *buf = server->socket.output;
263 int ret;
264
265 /* buf is a circular buffer. For simplicity, this code assumes that
266 * the data is located at the beginning. This should be ok since
267 * this function is only meant to be used on the first flight
268 * emitted by a server. */
269 TEST_EQUAL(buf->start, 0);
270
271 switch (instruction) {
272 case RECOMBINE_NOMINAL:
273 break;
274
Gilles Peskine7c1dbef2025-03-07 20:48:01 +0100275 case RECOMBINE_SPLIT_FIRST:
276 ret = recombine_split_first_record(buf, param);
277 TEST_LE_S(0, ret);
278 break;
279
280 case RECOMBINE_INSERT_EMPTY:
281 ret = recombine_insert_empty_record(buf, param);
282 TEST_LE_S(0, ret);
283 break;
284
Gilles Peskine92122ed2025-03-07 20:40:50 +0100285 case RECOMBINE_COALESCE:
286 ret = recombine_coalesce_handshake_records(buf, param);
287 if (param == INT_MAX) {
288 TEST_LE_S(1, ret);
289 } else {
290 TEST_EQUAL(ret, param);
291 }
292 break;
293
Gilles Peskine7c1dbef2025-03-07 20:48:01 +0100294 case RECOMBINE_COALESCE_SPLIT_ONCE:
295 ret = recombine_coalesce_handshake_records(buf, INT_MAX);
296 /* Require at least two coalesced records, otherwise this
297 * doesn't lead to a meaningful test (use
298 * RECOMBINE_SPLIT_FIRST instead). */
299 TEST_LE_S(2, ret);
300 ret = recombine_split_first_record(buf, param);
301 TEST_LE_S(0, ret);
302 break;
303
304 case RECOMBINE_COALESCE_SPLIT_ENDS:
305 ret = recombine_coalesce_handshake_records(buf, INT_MAX);
306 /* Accept a single record, which will be split at both ends */
307 TEST_LE_S(1, ret);
308 TEST_LE_S(1, param);
309 ret = recombine_split_first_record(buf, -param);
310 TEST_LE_S(0, ret);
311 ret = recombine_split_first_record(buf, param);
312 TEST_LE_S(0, ret);
313 break;
314
Gilles Peskine92122ed2025-03-07 20:40:50 +0100315 default:
316 TEST_FAIL("Instructions not understood");
317 }
318
319 return 1;
320
321exit:
322 return 0;
323}
324
Gilles Peskine07426722025-03-07 23:01:42 +0100325#endif /* MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED */
326
Manuel Pégourié-Gonnard4956fd72014-09-24 11:13:44 +0200327/* END_HEADER */
328
329/* BEGIN_DEPENDENCIES
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200330 * depends_on:MBEDTLS_SSL_TLS_C
Manuel Pégourié-Gonnard4956fd72014-09-24 11:13:44 +0200331 * END_DEPENDENCIES
332 */
333
Janos Follath6264e662019-11-26 11:11:15 +0000334/* BEGIN_CASE */
335void test_callback_buffer_sanity()
336{
337 enum { MSGLEN = 10 };
Yanray Wang9ef0dce2022-10-25 16:44:13 +0800338 mbedtls_test_ssl_buffer buf;
Gilles Peskine21e46b32023-10-17 16:35:20 +0200339 mbedtls_test_ssl_buffer_init(&buf);
Janos Follath6264e662019-11-26 11:11:15 +0000340 unsigned char input[MSGLEN];
341 unsigned char output[MSGLEN];
342
Valerio Setti285dae82023-04-19 15:10:45 +0200343 USE_PSA_INIT();
Gilles Peskine449bd832023-01-11 14:50:10 +0100344 memset(input, 0, sizeof(input));
Janos Follath6264e662019-11-26 11:11:15 +0000345
346 /* Make sure calling put and get on NULL buffer results in error. */
Yanray Wangf7b62352022-10-26 11:51:53 +0800347 TEST_ASSERT(mbedtls_test_ssl_buffer_put(NULL, input, sizeof(input))
Gilles Peskine449bd832023-01-11 14:50:10 +0100348 == -1);
Yanray Wangf7b62352022-10-26 11:51:53 +0800349 TEST_ASSERT(mbedtls_test_ssl_buffer_get(NULL, output, sizeof(output))
Gilles Peskine449bd832023-01-11 14:50:10 +0100350 == -1);
Yanray Wangbd296832022-10-26 18:28:11 +0800351 TEST_ASSERT(mbedtls_test_ssl_buffer_put(NULL, NULL, sizeof(input))
352 == -1);
Andrzej Kurekf7774142020-01-22 06:34:59 -0500353
Yanray Wangf7b62352022-10-26 11:51:53 +0800354 TEST_ASSERT(mbedtls_test_ssl_buffer_put(NULL, NULL, 0) == -1);
355 TEST_ASSERT(mbedtls_test_ssl_buffer_get(NULL, NULL, 0) == -1);
Janos Follath6264e662019-11-26 11:11:15 +0000356
357 /* Make sure calling put and get on a buffer that hasn't been set up results
Shaun Case8b0ecbc2021-12-20 21:14:10 -0800358 * in error. */
Yanray Wangbd296832022-10-26 18:28:11 +0800359 TEST_ASSERT(mbedtls_test_ssl_buffer_put(&buf, input, sizeof(input))
360 == -1);
Yanray Wangf7b62352022-10-26 11:51:53 +0800361 TEST_ASSERT(mbedtls_test_ssl_buffer_get(&buf, output, sizeof(output))
Gilles Peskine449bd832023-01-11 14:50:10 +0100362 == -1);
Yanray Wangbd296832022-10-26 18:28:11 +0800363 TEST_ASSERT(mbedtls_test_ssl_buffer_put(&buf, NULL, sizeof(input))
364 == -1);
Andrzej Kurekf7774142020-01-22 06:34:59 -0500365
Yanray Wangf7b62352022-10-26 11:51:53 +0800366 TEST_ASSERT(mbedtls_test_ssl_buffer_put(&buf, NULL, 0) == -1);
367 TEST_ASSERT(mbedtls_test_ssl_buffer_get(&buf, NULL, 0) == -1);
Janos Follath6264e662019-11-26 11:11:15 +0000368
Andrzej Kurekf7774142020-01-22 06:34:59 -0500369 /* Make sure calling put and get on NULL input only results in
370 * error if the length is not zero, and that a NULL output is valid for data
371 * dropping.
372 */
Janos Follath6264e662019-11-26 11:11:15 +0000373
Yanray Wangf7b62352022-10-26 11:51:53 +0800374 TEST_ASSERT(mbedtls_test_ssl_buffer_setup(&buf, sizeof(input)) == 0);
Janos Follath6264e662019-11-26 11:11:15 +0000375
Yanray Wangbd296832022-10-26 18:28:11 +0800376 TEST_ASSERT(mbedtls_test_ssl_buffer_put(&buf, NULL, sizeof(input))
377 == -1);
Yanray Wangf7b62352022-10-26 11:51:53 +0800378 TEST_ASSERT(mbedtls_test_ssl_buffer_get(&buf, NULL, sizeof(output))
Gilles Peskine449bd832023-01-11 14:50:10 +0100379 == 0);
Yanray Wangf7b62352022-10-26 11:51:53 +0800380 TEST_ASSERT(mbedtls_test_ssl_buffer_put(&buf, NULL, 0) == 0);
381 TEST_ASSERT(mbedtls_test_ssl_buffer_get(&buf, NULL, 0) == 0);
Janos Follath6264e662019-11-26 11:11:15 +0000382
Piotr Nowickifb437d72020-01-13 16:59:12 +0100383 /* Make sure calling put several times in the row is safe */
384
Yanray Wangf7b62352022-10-26 11:51:53 +0800385 TEST_ASSERT(mbedtls_test_ssl_buffer_put(&buf, input, sizeof(input))
Gilles Peskine449bd832023-01-11 14:50:10 +0100386 == sizeof(input));
Yanray Wangf7b62352022-10-26 11:51:53 +0800387 TEST_ASSERT(mbedtls_test_ssl_buffer_get(&buf, output, 2) == 2);
388 TEST_ASSERT(mbedtls_test_ssl_buffer_put(&buf, input, 1) == 1);
389 TEST_ASSERT(mbedtls_test_ssl_buffer_put(&buf, input, 2) == 1);
390 TEST_ASSERT(mbedtls_test_ssl_buffer_put(&buf, input, 2) == 0);
Piotr Nowickifb437d72020-01-13 16:59:12 +0100391
392
Janos Follath6264e662019-11-26 11:11:15 +0000393exit:
Yanray Wangf7b62352022-10-26 11:51:53 +0800394 mbedtls_test_ssl_buffer_free(&buf);
Valerio Setti285dae82023-04-19 15:10:45 +0200395 USE_PSA_DONE();
Janos Follath6264e662019-11-26 11:11:15 +0000396}
397/* END_CASE */
398
399/*
Yanray Wang9ef0dce2022-10-25 16:44:13 +0800400 * Test if the implementation of `mbedtls_test_ssl_buffer` related functions is
Janos Follath6264e662019-11-26 11:11:15 +0000401 * correct and works as expected.
402 *
403 * That is
404 * - If we try to put in \p put1 bytes then we can put in \p put1_ret bytes.
405 * - Afterwards if we try to get \p get1 bytes then we can get \get1_ret bytes.
406 * - Next, if we try to put in \p put1 bytes then we can put in \p put1_ret
407 * bytes.
408 * - Afterwards if we try to get \p get1 bytes then we can get \get1_ret bytes.
409 * - All of the bytes we got match the bytes we put in in a FIFO manner.
410 */
411
412/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +0100413void test_callback_buffer(int size, int put1, int put1_ret,
414 int get1, int get1_ret, int put2, int put2_ret,
415 int get2, int get2_ret)
Janos Follath6264e662019-11-26 11:11:15 +0000416{
417 enum { ROUNDS = 2 };
418 size_t put[ROUNDS];
419 int put_ret[ROUNDS];
420 size_t get[ROUNDS];
421 int get_ret[ROUNDS];
Yanray Wang9ef0dce2022-10-25 16:44:13 +0800422 mbedtls_test_ssl_buffer buf;
Gilles Peskine449bd832023-01-11 14:50:10 +0100423 unsigned char *input = NULL;
Janos Follath6264e662019-11-26 11:11:15 +0000424 size_t input_len;
Gilles Peskine449bd832023-01-11 14:50:10 +0100425 unsigned char *output = NULL;
Janos Follath6264e662019-11-26 11:11:15 +0000426 size_t output_len;
Janos Follath031827f2019-11-27 11:12:14 +0000427 size_t i, j, written, read;
Janos Follath6264e662019-11-26 11:11:15 +0000428
Yanray Wangf7b62352022-10-26 11:51:53 +0800429 mbedtls_test_ssl_buffer_init(&buf);
Valerio Setti00a256f2023-04-27 17:22:27 +0200430 USE_PSA_INIT();
Yanray Wangf7b62352022-10-26 11:51:53 +0800431 TEST_ASSERT(mbedtls_test_ssl_buffer_setup(&buf, size) == 0);
Janos Follath6264e662019-11-26 11:11:15 +0000432
433 /* Check the sanity of input parameters and initialise local variables. That
434 * is, ensure that the amount of data is not negative and that we are not
435 * expecting more to put or get than we actually asked for. */
Gilles Peskine449bd832023-01-11 14:50:10 +0100436 TEST_ASSERT(put1 >= 0);
Janos Follath6264e662019-11-26 11:11:15 +0000437 put[0] = put1;
438 put_ret[0] = put1_ret;
Gilles Peskine449bd832023-01-11 14:50:10 +0100439 TEST_ASSERT(put1_ret <= put1);
440 TEST_ASSERT(put2 >= 0);
Janos Follath6264e662019-11-26 11:11:15 +0000441 put[1] = put2;
442 put_ret[1] = put2_ret;
Gilles Peskine449bd832023-01-11 14:50:10 +0100443 TEST_ASSERT(put2_ret <= put2);
Janos Follath6264e662019-11-26 11:11:15 +0000444
Gilles Peskine449bd832023-01-11 14:50:10 +0100445 TEST_ASSERT(get1 >= 0);
Janos Follath6264e662019-11-26 11:11:15 +0000446 get[0] = get1;
447 get_ret[0] = get1_ret;
Gilles Peskine449bd832023-01-11 14:50:10 +0100448 TEST_ASSERT(get1_ret <= get1);
449 TEST_ASSERT(get2 >= 0);
Janos Follath6264e662019-11-26 11:11:15 +0000450 get[1] = get2;
451 get_ret[1] = get2_ret;
Gilles Peskine449bd832023-01-11 14:50:10 +0100452 TEST_ASSERT(get2_ret <= get2);
Janos Follath6264e662019-11-26 11:11:15 +0000453
454 input_len = 0;
455 /* Calculate actual input and output lengths */
Gilles Peskine449bd832023-01-11 14:50:10 +0100456 for (j = 0; j < ROUNDS; j++) {
457 if (put_ret[j] > 0) {
Janos Follath6264e662019-11-26 11:11:15 +0000458 input_len += put_ret[j];
459 }
460 }
461 /* In order to always have a valid pointer we always allocate at least 1
462 * byte. */
Gilles Peskine449bd832023-01-11 14:50:10 +0100463 if (input_len == 0) {
Janos Follath6264e662019-11-26 11:11:15 +0000464 input_len = 1;
Gilles Peskine449bd832023-01-11 14:50:10 +0100465 }
Tom Cosgrove05b2a872023-07-21 11:31:13 +0100466 TEST_CALLOC(input, input_len);
Janos Follath6264e662019-11-26 11:11:15 +0000467
468 output_len = 0;
Gilles Peskine449bd832023-01-11 14:50:10 +0100469 for (j = 0; j < ROUNDS; j++) {
470 if (get_ret[j] > 0) {
Janos Follath6264e662019-11-26 11:11:15 +0000471 output_len += get_ret[j];
472 }
473 }
Gilles Peskine449bd832023-01-11 14:50:10 +0100474 TEST_ASSERT(output_len <= input_len);
Janos Follath6264e662019-11-26 11:11:15 +0000475 /* In order to always have a valid pointer we always allocate at least 1
476 * byte. */
Gilles Peskine449bd832023-01-11 14:50:10 +0100477 if (output_len == 0) {
Janos Follath6264e662019-11-26 11:11:15 +0000478 output_len = 1;
Gilles Peskine449bd832023-01-11 14:50:10 +0100479 }
Tom Cosgrove05b2a872023-07-21 11:31:13 +0100480 TEST_CALLOC(output, output_len);
Janos Follath6264e662019-11-26 11:11:15 +0000481
482 /* Fill up the buffer with structured data so that unwanted changes
483 * can be detected */
Gilles Peskine449bd832023-01-11 14:50:10 +0100484 for (i = 0; i < input_len; i++) {
Janos Follath6264e662019-11-26 11:11:15 +0000485 input[i] = i & 0xFF;
486 }
487
488 written = read = 0;
Gilles Peskine449bd832023-01-11 14:50:10 +0100489 for (j = 0; j < ROUNDS; j++) {
Yanray Wangf7b62352022-10-26 11:51:53 +0800490 TEST_ASSERT(put_ret[j] == mbedtls_test_ssl_buffer_put(&buf,
491 input + written, put[j]));
Janos Follath6264e662019-11-26 11:11:15 +0000492 written += put_ret[j];
Yanray Wangf7b62352022-10-26 11:51:53 +0800493 TEST_ASSERT(get_ret[j] == mbedtls_test_ssl_buffer_get(&buf,
494 output + read, get[j]));
Janos Follath6264e662019-11-26 11:11:15 +0000495 read += get_ret[j];
Gilles Peskine449bd832023-01-11 14:50:10 +0100496 TEST_ASSERT(read <= written);
497 if (get_ret[j] > 0) {
498 TEST_ASSERT(memcmp(output + read - get_ret[j],
499 input + read - get_ret[j], get_ret[j])
500 == 0);
Janos Follath6264e662019-11-26 11:11:15 +0000501 }
502 }
503
504exit:
Gilles Peskine449bd832023-01-11 14:50:10 +0100505 mbedtls_free(input);
506 mbedtls_free(output);
Yanray Wangf7b62352022-10-26 11:51:53 +0800507 mbedtls_test_ssl_buffer_free(&buf);
Valerio Setti285dae82023-04-19 15:10:45 +0200508 USE_PSA_DONE();
Janos Follath6264e662019-11-26 11:11:15 +0000509}
510/* END_CASE */
511
Janos Follath031827f2019-11-27 11:12:14 +0000512/*
Yanray Wangbd296832022-10-26 18:28:11 +0800513 * Test if the implementation of `mbedtls_test_mock_socket` related
514 * I/O functions is correct and works as expected on unconnected sockets.
Janos Follathc673c2c2019-12-02 15:47:26 +0000515 */
516
517/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +0100518void ssl_mock_sanity()
Janos Follathc673c2c2019-12-02 15:47:26 +0000519{
520 enum { MSGLEN = 105 };
Paul Elliott21c8fe52021-11-24 16:54:26 +0000521 unsigned char message[MSGLEN] = { 0 };
522 unsigned char received[MSGLEN] = { 0 };
Yanray Wang9ef0dce2022-10-25 16:44:13 +0800523 mbedtls_test_mock_socket socket;
Janos Follathc673c2c2019-12-02 15:47:26 +0000524
Yanray Wang5f86a422023-03-15 16:02:29 +0800525 mbedtls_test_mock_socket_init(&socket);
Valerio Setti00a256f2023-04-27 17:22:27 +0200526 USE_PSA_INIT();
Yanray Wangf7b62352022-10-26 11:51:53 +0800527 TEST_ASSERT(mbedtls_test_mock_tcp_send_b(&socket, message, MSGLEN) < 0);
528 mbedtls_test_mock_socket_close(&socket);
Yanray Wang5f86a422023-03-15 16:02:29 +0800529 mbedtls_test_mock_socket_init(&socket);
Yanray Wangf7b62352022-10-26 11:51:53 +0800530 TEST_ASSERT(mbedtls_test_mock_tcp_recv_b(&socket, received, MSGLEN) < 0);
531 mbedtls_test_mock_socket_close(&socket);
Janos Follathc673c2c2019-12-02 15:47:26 +0000532
Yanray Wang5f86a422023-03-15 16:02:29 +0800533 mbedtls_test_mock_socket_init(&socket);
Yanray Wangf7b62352022-10-26 11:51:53 +0800534 TEST_ASSERT(mbedtls_test_mock_tcp_send_nb(&socket, message, MSGLEN) < 0);
535 mbedtls_test_mock_socket_close(&socket);
Yanray Wang5f86a422023-03-15 16:02:29 +0800536 mbedtls_test_mock_socket_init(&socket);
Yanray Wangf7b62352022-10-26 11:51:53 +0800537 TEST_ASSERT(mbedtls_test_mock_tcp_recv_nb(&socket, received, MSGLEN) < 0);
538 mbedtls_test_mock_socket_close(&socket);
Janos Follathc673c2c2019-12-02 15:47:26 +0000539
540exit:
Yanray Wangf7b62352022-10-26 11:51:53 +0800541 mbedtls_test_mock_socket_close(&socket);
Valerio Setti285dae82023-04-19 15:10:45 +0200542 USE_PSA_DONE();
Janos Follathc673c2c2019-12-02 15:47:26 +0000543}
544/* END_CASE */
545
546/*
Yanray Wangbd296832022-10-26 18:28:11 +0800547 * Test if the implementation of `mbedtls_test_mock_socket` related functions
548 * can send a single message from the client to the server.
Janos Follath031827f2019-11-27 11:12:14 +0000549 */
550
551/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +0100552void ssl_mock_tcp(int blocking)
Janos Follath031827f2019-11-27 11:12:14 +0000553{
Janos Follathc673c2c2019-12-02 15:47:26 +0000554 enum { MSGLEN = 105 };
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100555 enum { BUFLEN = MSGLEN / 5 };
Janos Follathc673c2c2019-12-02 15:47:26 +0000556 unsigned char message[MSGLEN];
557 unsigned char received[MSGLEN];
Yanray Wang9ef0dce2022-10-25 16:44:13 +0800558 mbedtls_test_mock_socket client;
559 mbedtls_test_mock_socket server;
Janos Follathc673c2c2019-12-02 15:47:26 +0000560 size_t written, read;
561 int send_ret, recv_ret;
562 mbedtls_ssl_send_t *send;
563 mbedtls_ssl_recv_t *recv;
Janos Follathc673c2c2019-12-02 15:47:26 +0000564 unsigned i;
565
Gilles Peskine449bd832023-01-11 14:50:10 +0100566 if (blocking == 0) {
Yanray Wangf7b62352022-10-26 11:51:53 +0800567 send = mbedtls_test_mock_tcp_send_nb;
568 recv = mbedtls_test_mock_tcp_recv_nb;
Gilles Peskine449bd832023-01-11 14:50:10 +0100569 } else {
Yanray Wangf7b62352022-10-26 11:51:53 +0800570 send = mbedtls_test_mock_tcp_send_b;
571 recv = mbedtls_test_mock_tcp_recv_b;
Janos Follathc673c2c2019-12-02 15:47:26 +0000572 }
573
Yanray Wang5f86a422023-03-15 16:02:29 +0800574 mbedtls_test_mock_socket_init(&client);
575 mbedtls_test_mock_socket_init(&server);
Valerio Setti00a256f2023-04-27 17:22:27 +0200576 USE_PSA_INIT();
Janos Follathc673c2c2019-12-02 15:47:26 +0000577
578 /* Fill up the buffer with structured data so that unwanted changes
579 * can be detected */
Gilles Peskine449bd832023-01-11 14:50:10 +0100580 for (i = 0; i < MSGLEN; i++) {
Janos Follathc673c2c2019-12-02 15:47:26 +0000581 message[i] = i & 0xFF;
582 }
583
584 /* Make sure that sending a message takes a few iterations. */
Yanray Wangbd296832022-10-26 18:28:11 +0800585 TEST_ASSERT(0 == mbedtls_test_mock_socket_connect(&client, &server,
586 BUFLEN));
Janos Follathc673c2c2019-12-02 15:47:26 +0000587
588 /* Send the message to the server */
589 send_ret = recv_ret = 1;
590 written = read = 0;
Gilles Peskine449bd832023-01-11 14:50:10 +0100591 while (send_ret != 0 || recv_ret != 0) {
592 send_ret = send(&client, message + written, MSGLEN - written);
Janos Follathc673c2c2019-12-02 15:47:26 +0000593
Gilles Peskine449bd832023-01-11 14:50:10 +0100594 TEST_ASSERT(send_ret >= 0);
595 TEST_ASSERT(send_ret <= BUFLEN);
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100596 written += send_ret;
597
598 /* If the buffer is full we can test blocking and non-blocking send */
Gilles Peskine449bd832023-01-11 14:50:10 +0100599 if (send_ret == BUFLEN) {
600 int blocking_ret = send(&client, message, 1);
601 if (blocking) {
602 TEST_ASSERT(blocking_ret == 0);
603 } else {
604 TEST_ASSERT(blocking_ret == MBEDTLS_ERR_SSL_WANT_WRITE);
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100605 }
Janos Follathc673c2c2019-12-02 15:47:26 +0000606 }
Janos Follathc673c2c2019-12-02 15:47:26 +0000607
Gilles Peskine449bd832023-01-11 14:50:10 +0100608 recv_ret = recv(&server, received + read, MSGLEN - read);
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100609
610 /* The result depends on whether any data was sent */
Gilles Peskine449bd832023-01-11 14:50:10 +0100611 if (send_ret > 0) {
612 TEST_ASSERT(recv_ret > 0);
613 TEST_ASSERT(recv_ret <= BUFLEN);
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100614 read += recv_ret;
Gilles Peskine449bd832023-01-11 14:50:10 +0100615 } else if (blocking) {
616 TEST_ASSERT(recv_ret == 0);
617 } else {
618 TEST_ASSERT(recv_ret == MBEDTLS_ERR_SSL_WANT_READ);
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100619 recv_ret = 0;
Janos Follathc673c2c2019-12-02 15:47:26 +0000620 }
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100621
622 /* If the buffer is empty we can test blocking and non-blocking read */
Gilles Peskine449bd832023-01-11 14:50:10 +0100623 if (recv_ret == BUFLEN) {
624 int blocking_ret = recv(&server, received, 1);
625 if (blocking) {
626 TEST_ASSERT(blocking_ret == 0);
627 } else {
628 TEST_ASSERT(blocking_ret == MBEDTLS_ERR_SSL_WANT_READ);
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100629 }
630 }
Janos Follathc673c2c2019-12-02 15:47:26 +0000631 }
Gilles Peskine449bd832023-01-11 14:50:10 +0100632 TEST_ASSERT(memcmp(message, received, MSGLEN) == 0);
Janos Follathc673c2c2019-12-02 15:47:26 +0000633
634exit:
Yanray Wangf7b62352022-10-26 11:51:53 +0800635 mbedtls_test_mock_socket_close(&client);
636 mbedtls_test_mock_socket_close(&server);
Valerio Setti285dae82023-04-19 15:10:45 +0200637 USE_PSA_DONE();
Janos Follathc673c2c2019-12-02 15:47:26 +0000638}
639/* END_CASE */
640
641/*
Yanray Wangbd296832022-10-26 18:28:11 +0800642 * Test if the implementation of `mbedtls_test_mock_socket` related functions
643 * can send messages in both direction at the same time (with the I/O calls
Janos Follathc673c2c2019-12-02 15:47:26 +0000644 * interleaving).
645 */
646
647/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +0100648void ssl_mock_tcp_interleaving(int blocking)
Janos Follathc673c2c2019-12-02 15:47:26 +0000649{
Janos Follath031827f2019-11-27 11:12:14 +0000650 enum { ROUNDS = 2 };
651 enum { MSGLEN = 105 };
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100652 enum { BUFLEN = MSGLEN / 5 };
Janos Follath031827f2019-11-27 11:12:14 +0000653 unsigned char message[ROUNDS][MSGLEN];
654 unsigned char received[ROUNDS][MSGLEN];
Yanray Wang9ef0dce2022-10-25 16:44:13 +0800655 mbedtls_test_mock_socket client;
656 mbedtls_test_mock_socket server;
Janos Follath031827f2019-11-27 11:12:14 +0000657 size_t written[ROUNDS];
658 size_t read[ROUNDS];
659 int send_ret[ROUNDS];
660 int recv_ret[ROUNDS];
661 unsigned i, j, progress;
Janos Follath3766ba52019-11-27 13:31:42 +0000662 mbedtls_ssl_send_t *send;
663 mbedtls_ssl_recv_t *recv;
Janos Follath3766ba52019-11-27 13:31:42 +0000664
Gilles Peskine449bd832023-01-11 14:50:10 +0100665 if (blocking == 0) {
Yanray Wangf7b62352022-10-26 11:51:53 +0800666 send = mbedtls_test_mock_tcp_send_nb;
667 recv = mbedtls_test_mock_tcp_recv_nb;
Gilles Peskine449bd832023-01-11 14:50:10 +0100668 } else {
Yanray Wangf7b62352022-10-26 11:51:53 +0800669 send = mbedtls_test_mock_tcp_send_b;
670 recv = mbedtls_test_mock_tcp_recv_b;
Janos Follath3766ba52019-11-27 13:31:42 +0000671 }
Janos Follath031827f2019-11-27 11:12:14 +0000672
Yanray Wang5f86a422023-03-15 16:02:29 +0800673 mbedtls_test_mock_socket_init(&client);
674 mbedtls_test_mock_socket_init(&server);
Valerio Setti00a256f2023-04-27 17:22:27 +0200675 USE_PSA_INIT();
Janos Follath031827f2019-11-27 11:12:14 +0000676
677 /* Fill up the buffers with structured data so that unwanted changes
678 * can be detected */
Gilles Peskine449bd832023-01-11 14:50:10 +0100679 for (i = 0; i < ROUNDS; i++) {
680 for (j = 0; j < MSGLEN; j++) {
681 message[i][j] = (i * MSGLEN + j) & 0xFF;
Janos Follath031827f2019-11-27 11:12:14 +0000682 }
683 }
684
Janos Follath031827f2019-11-27 11:12:14 +0000685 /* Make sure that sending a message takes a few iterations. */
Yanray Wangbd296832022-10-26 18:28:11 +0800686 TEST_ASSERT(0 == mbedtls_test_mock_socket_connect(&client, &server,
687 BUFLEN));
Janos Follath031827f2019-11-27 11:12:14 +0000688
Janos Follath031827f2019-11-27 11:12:14 +0000689 /* Send the message from both sides, interleaving. */
690 progress = 1;
Gilles Peskine449bd832023-01-11 14:50:10 +0100691 for (i = 0; i < ROUNDS; i++) {
Janos Follath031827f2019-11-27 11:12:14 +0000692 written[i] = 0;
693 read[i] = 0;
694 }
695 /* This loop does not stop as long as there was a successful write or read
696 * of at least one byte on either side. */
Gilles Peskine449bd832023-01-11 14:50:10 +0100697 while (progress != 0) {
Yanray Wang9ef0dce2022-10-25 16:44:13 +0800698 mbedtls_test_mock_socket *socket;
Janos Follath031827f2019-11-27 11:12:14 +0000699
Gilles Peskine449bd832023-01-11 14:50:10 +0100700 for (i = 0; i < ROUNDS; i++) {
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100701 /* First sending is from the client */
Gilles Peskine449bd832023-01-11 14:50:10 +0100702 socket = (i % 2 == 0) ? (&client) : (&server);
Janos Follath031827f2019-11-27 11:12:14 +0000703
Gilles Peskine449bd832023-01-11 14:50:10 +0100704 send_ret[i] = send(socket, message[i] + written[i],
705 MSGLEN - written[i]);
706 TEST_ASSERT(send_ret[i] >= 0);
707 TEST_ASSERT(send_ret[i] <= BUFLEN);
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100708 written[i] += send_ret[i];
Janos Follath031827f2019-11-27 11:12:14 +0000709
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100710 /* If the buffer is full we can test blocking and non-blocking
711 * send */
Gilles Peskine449bd832023-01-11 14:50:10 +0100712 if (send_ret[i] == BUFLEN) {
713 int blocking_ret = send(socket, message[i], 1);
714 if (blocking) {
715 TEST_ASSERT(blocking_ret == 0);
716 } else {
717 TEST_ASSERT(blocking_ret == MBEDTLS_ERR_SSL_WANT_WRITE);
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100718 }
719 }
Janos Follath3766ba52019-11-27 13:31:42 +0000720 }
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100721
Gilles Peskine449bd832023-01-11 14:50:10 +0100722 for (i = 0; i < ROUNDS; i++) {
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100723 /* First receiving is from the server */
Gilles Peskine449bd832023-01-11 14:50:10 +0100724 socket = (i % 2 == 0) ? (&server) : (&client);
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100725
Gilles Peskine449bd832023-01-11 14:50:10 +0100726 recv_ret[i] = recv(socket, received[i] + read[i],
727 MSGLEN - read[i]);
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100728
729 /* The result depends on whether any data was sent */
Gilles Peskine449bd832023-01-11 14:50:10 +0100730 if (send_ret[i] > 0) {
731 TEST_ASSERT(recv_ret[i] > 0);
732 TEST_ASSERT(recv_ret[i] <= BUFLEN);
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100733 read[i] += recv_ret[i];
Gilles Peskine449bd832023-01-11 14:50:10 +0100734 } else if (blocking) {
735 TEST_ASSERT(recv_ret[i] == 0);
736 } else {
737 TEST_ASSERT(recv_ret[i] == MBEDTLS_ERR_SSL_WANT_READ);
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100738 recv_ret[i] = 0;
739 }
740
741 /* If the buffer is empty we can test blocking and non-blocking
742 * read */
Gilles Peskine449bd832023-01-11 14:50:10 +0100743 if (recv_ret[i] == BUFLEN) {
744 int blocking_ret = recv(socket, received[i], 1);
745 if (blocking) {
746 TEST_ASSERT(blocking_ret == 0);
747 } else {
748 TEST_ASSERT(blocking_ret == MBEDTLS_ERR_SSL_WANT_READ);
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100749 }
750 }
Janos Follath3766ba52019-11-27 13:31:42 +0000751 }
Janos Follath031827f2019-11-27 11:12:14 +0000752
753 progress = 0;
Gilles Peskine449bd832023-01-11 14:50:10 +0100754 for (i = 0; i < ROUNDS; i++) {
Piotr Nowicki890b5ca2020-01-15 16:19:07 +0100755 progress += send_ret[i] + recv_ret[i];
Janos Follath031827f2019-11-27 11:12:14 +0000756 }
757 }
758
Gilles Peskine449bd832023-01-11 14:50:10 +0100759 for (i = 0; i < ROUNDS; i++) {
760 TEST_ASSERT(memcmp(message[i], received[i], MSGLEN) == 0);
761 }
Janos Follath031827f2019-11-27 11:12:14 +0000762
763exit:
Yanray Wangf7b62352022-10-26 11:51:53 +0800764 mbedtls_test_mock_socket_close(&client);
765 mbedtls_test_mock_socket_close(&server);
Valerio Setti285dae82023-04-19 15:10:45 +0200766 USE_PSA_DONE();
Janos Follath031827f2019-11-27 11:12:14 +0000767}
768/* END_CASE */
769
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500770/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +0100771void ssl_message_queue_sanity()
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500772{
Valerio Setti7c0f91b2023-04-28 12:20:34 +0200773 mbedtls_test_ssl_message_queue queue = SSL_MESSAGE_QUEUE_INIT;
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500774
Valerio Setti285dae82023-04-19 15:10:45 +0200775 USE_PSA_INIT();
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500776 /* Trying to push/pull to an empty queue */
Yanray Wangf7b62352022-10-26 11:51:53 +0800777 TEST_ASSERT(mbedtls_test_ssl_message_queue_push_info(NULL, 1)
Gilles Peskine449bd832023-01-11 14:50:10 +0100778 == MBEDTLS_TEST_ERROR_ARG_NULL);
Yanray Wangf7b62352022-10-26 11:51:53 +0800779 TEST_ASSERT(mbedtls_test_ssl_message_queue_pop_info(NULL, 1)
Gilles Peskine449bd832023-01-11 14:50:10 +0100780 == MBEDTLS_TEST_ERROR_ARG_NULL);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500781
Yanray Wangf7b62352022-10-26 11:51:53 +0800782 TEST_ASSERT(mbedtls_test_ssl_message_queue_setup(&queue, 3) == 0);
Gilles Peskine449bd832023-01-11 14:50:10 +0100783 TEST_ASSERT(queue.capacity == 3);
784 TEST_ASSERT(queue.num == 0);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500785
786exit:
Yanray Wangf7b62352022-10-26 11:51:53 +0800787 mbedtls_test_ssl_message_queue_free(&queue);
Valerio Setti285dae82023-04-19 15:10:45 +0200788 USE_PSA_DONE();
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500789}
790/* END_CASE */
791
792/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +0100793void ssl_message_queue_basic()
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500794{
Valerio Setti7c0f91b2023-04-28 12:20:34 +0200795 mbedtls_test_ssl_message_queue queue = SSL_MESSAGE_QUEUE_INIT;
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500796
Valerio Setti285dae82023-04-19 15:10:45 +0200797 USE_PSA_INIT();
Yanray Wangf7b62352022-10-26 11:51:53 +0800798 TEST_ASSERT(mbedtls_test_ssl_message_queue_setup(&queue, 3) == 0);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500799
800 /* Sanity test - 3 pushes and 3 pops with sufficient space */
Yanray Wangf7b62352022-10-26 11:51:53 +0800801 TEST_ASSERT(mbedtls_test_ssl_message_queue_push_info(&queue, 1) == 1);
Gilles Peskine449bd832023-01-11 14:50:10 +0100802 TEST_ASSERT(queue.capacity == 3);
803 TEST_ASSERT(queue.num == 1);
Yanray Wangf7b62352022-10-26 11:51:53 +0800804 TEST_ASSERT(mbedtls_test_ssl_message_queue_push_info(&queue, 1) == 1);
Gilles Peskine449bd832023-01-11 14:50:10 +0100805 TEST_ASSERT(queue.capacity == 3);
806 TEST_ASSERT(queue.num == 2);
Yanray Wangf7b62352022-10-26 11:51:53 +0800807 TEST_ASSERT(mbedtls_test_ssl_message_queue_push_info(&queue, 2) == 2);
Gilles Peskine449bd832023-01-11 14:50:10 +0100808 TEST_ASSERT(queue.capacity == 3);
809 TEST_ASSERT(queue.num == 3);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500810
Yanray Wangf7b62352022-10-26 11:51:53 +0800811 TEST_ASSERT(mbedtls_test_ssl_message_queue_pop_info(&queue, 1) == 1);
812 TEST_ASSERT(mbedtls_test_ssl_message_queue_pop_info(&queue, 1) == 1);
813 TEST_ASSERT(mbedtls_test_ssl_message_queue_pop_info(&queue, 2) == 2);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500814
815exit:
Yanray Wangf7b62352022-10-26 11:51:53 +0800816 mbedtls_test_ssl_message_queue_free(&queue);
Valerio Setti285dae82023-04-19 15:10:45 +0200817 USE_PSA_DONE();
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500818}
819/* END_CASE */
820
821/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +0100822void ssl_message_queue_overflow_underflow()
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500823{
Valerio Setti7c0f91b2023-04-28 12:20:34 +0200824 mbedtls_test_ssl_message_queue queue = SSL_MESSAGE_QUEUE_INIT;
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500825
Valerio Setti285dae82023-04-19 15:10:45 +0200826 USE_PSA_INIT();
Yanray Wangf7b62352022-10-26 11:51:53 +0800827 TEST_ASSERT(mbedtls_test_ssl_message_queue_setup(&queue, 3) == 0);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500828
829 /* 4 pushes (last one with an error), 4 pops (last one with an error) */
Yanray Wangf7b62352022-10-26 11:51:53 +0800830 TEST_ASSERT(mbedtls_test_ssl_message_queue_push_info(&queue, 1) == 1);
831 TEST_ASSERT(mbedtls_test_ssl_message_queue_push_info(&queue, 1) == 1);
832 TEST_ASSERT(mbedtls_test_ssl_message_queue_push_info(&queue, 2) == 2);
833 TEST_ASSERT(mbedtls_test_ssl_message_queue_push_info(&queue, 3)
Gilles Peskine449bd832023-01-11 14:50:10 +0100834 == MBEDTLS_ERR_SSL_WANT_WRITE);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500835
Yanray Wangf7b62352022-10-26 11:51:53 +0800836 TEST_ASSERT(mbedtls_test_ssl_message_queue_pop_info(&queue, 1) == 1);
837 TEST_ASSERT(mbedtls_test_ssl_message_queue_pop_info(&queue, 1) == 1);
838 TEST_ASSERT(mbedtls_test_ssl_message_queue_pop_info(&queue, 2) == 2);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500839
Yanray Wangf7b62352022-10-26 11:51:53 +0800840 TEST_ASSERT(mbedtls_test_ssl_message_queue_pop_info(&queue, 1)
Gilles Peskine449bd832023-01-11 14:50:10 +0100841 == MBEDTLS_ERR_SSL_WANT_READ);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500842
843exit:
Yanray Wangf7b62352022-10-26 11:51:53 +0800844 mbedtls_test_ssl_message_queue_free(&queue);
Valerio Setti285dae82023-04-19 15:10:45 +0200845 USE_PSA_DONE();
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500846}
847/* END_CASE */
848
849/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +0100850void ssl_message_queue_interleaved()
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500851{
Valerio Setti7c0f91b2023-04-28 12:20:34 +0200852 mbedtls_test_ssl_message_queue queue = SSL_MESSAGE_QUEUE_INIT;
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500853
Valerio Setti285dae82023-04-19 15:10:45 +0200854 USE_PSA_INIT();
Yanray Wangf7b62352022-10-26 11:51:53 +0800855 TEST_ASSERT(mbedtls_test_ssl_message_queue_setup(&queue, 3) == 0);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500856
857 /* Interleaved test - [2 pushes, 1 pop] twice, and then two pops
858 * (to wrap around the buffer) */
Yanray Wangf7b62352022-10-26 11:51:53 +0800859 TEST_ASSERT(mbedtls_test_ssl_message_queue_push_info(&queue, 1) == 1);
860 TEST_ASSERT(mbedtls_test_ssl_message_queue_push_info(&queue, 1) == 1);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500861
Yanray Wangf7b62352022-10-26 11:51:53 +0800862 TEST_ASSERT(mbedtls_test_ssl_message_queue_pop_info(&queue, 1) == 1);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500863
Yanray Wangf7b62352022-10-26 11:51:53 +0800864 TEST_ASSERT(mbedtls_test_ssl_message_queue_push_info(&queue, 2) == 2);
865 TEST_ASSERT(mbedtls_test_ssl_message_queue_push_info(&queue, 3) == 3);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500866
Yanray Wangf7b62352022-10-26 11:51:53 +0800867 TEST_ASSERT(mbedtls_test_ssl_message_queue_pop_info(&queue, 1) == 1);
868 TEST_ASSERT(mbedtls_test_ssl_message_queue_pop_info(&queue, 2) == 2);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500869
Yanray Wangf7b62352022-10-26 11:51:53 +0800870 TEST_ASSERT(mbedtls_test_ssl_message_queue_push_info(&queue, 5) == 5);
871 TEST_ASSERT(mbedtls_test_ssl_message_queue_push_info(&queue, 8) == 8);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500872
Yanray Wangf7b62352022-10-26 11:51:53 +0800873 TEST_ASSERT(mbedtls_test_ssl_message_queue_pop_info(&queue, 3) == 3);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500874
Yanray Wangf7b62352022-10-26 11:51:53 +0800875 TEST_ASSERT(mbedtls_test_ssl_message_queue_pop_info(&queue, 5) == 5);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500876
Yanray Wangf7b62352022-10-26 11:51:53 +0800877 TEST_ASSERT(mbedtls_test_ssl_message_queue_pop_info(&queue, 8) == 8);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500878
879exit:
Yanray Wangf7b62352022-10-26 11:51:53 +0800880 mbedtls_test_ssl_message_queue_free(&queue);
Valerio Setti285dae82023-04-19 15:10:45 +0200881 USE_PSA_DONE();
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500882}
883/* END_CASE */
884
885/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +0100886void ssl_message_queue_insufficient_buffer()
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500887{
Valerio Setti7c0f91b2023-04-28 12:20:34 +0200888 mbedtls_test_ssl_message_queue queue = SSL_MESSAGE_QUEUE_INIT;
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500889 size_t message_len = 10;
890 size_t buffer_len = 5;
891
Valerio Setti285dae82023-04-19 15:10:45 +0200892 USE_PSA_INIT();
Yanray Wangf7b62352022-10-26 11:51:53 +0800893 TEST_ASSERT(mbedtls_test_ssl_message_queue_setup(&queue, 1) == 0);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500894
895 /* Popping without a sufficient buffer */
Yanray Wangf7b62352022-10-26 11:51:53 +0800896 TEST_ASSERT(mbedtls_test_ssl_message_queue_push_info(&queue, message_len)
Gilles Peskine449bd832023-01-11 14:50:10 +0100897 == (int) message_len);
Yanray Wangf7b62352022-10-26 11:51:53 +0800898 TEST_ASSERT(mbedtls_test_ssl_message_queue_pop_info(&queue, buffer_len)
Gilles Peskine449bd832023-01-11 14:50:10 +0100899 == (int) buffer_len);
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500900exit:
Yanray Wangf7b62352022-10-26 11:51:53 +0800901 mbedtls_test_ssl_message_queue_free(&queue);
Valerio Setti285dae82023-04-19 15:10:45 +0200902 USE_PSA_DONE();
Andrzej Kurek13719cd2020-01-22 06:36:39 -0500903}
904/* END_CASE */
905
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500906/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +0100907void ssl_message_mock_uninitialized()
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500908{
909 enum { MSGLEN = 10 };
Gilles Peskine449bd832023-01-11 14:50:10 +0100910 unsigned char message[MSGLEN] = { 0 }, received[MSGLEN];
Yanray Wang9ef0dce2022-10-25 16:44:13 +0800911 mbedtls_test_mock_socket client, server;
912 mbedtls_test_ssl_message_queue server_queue, client_queue;
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500913 mbedtls_test_message_socket_context server_context, client_context;
Yanray Wangf7b62352022-10-26 11:51:53 +0800914 mbedtls_test_message_socket_init(&server_context);
915 mbedtls_test_message_socket_init(&client_context);
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500916
Valerio Setti285dae82023-04-19 15:10:45 +0200917 USE_PSA_INIT();
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500918 /* Send with a NULL context */
Yanray Wangf7b62352022-10-26 11:51:53 +0800919 TEST_ASSERT(mbedtls_test_mock_tcp_send_msg(NULL, message, MSGLEN)
Gilles Peskine449bd832023-01-11 14:50:10 +0100920 == MBEDTLS_TEST_ERROR_CONTEXT_ERROR);
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500921
Yanray Wangf7b62352022-10-26 11:51:53 +0800922 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(NULL, message, MSGLEN)
Gilles Peskine449bd832023-01-11 14:50:10 +0100923 == MBEDTLS_TEST_ERROR_CONTEXT_ERROR);
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500924
Yanray Wangbd296832022-10-26 18:28:11 +0800925 TEST_ASSERT(mbedtls_test_message_socket_setup(&server_queue,
926 &client_queue, 1,
Yanray Wangf7b62352022-10-26 11:51:53 +0800927 &server,
928 &server_context) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500929
Yanray Wangbd296832022-10-26 18:28:11 +0800930 TEST_ASSERT(mbedtls_test_message_socket_setup(&client_queue,
931 &server_queue, 1,
Yanray Wangf7b62352022-10-26 11:51:53 +0800932 &client,
933 &client_context) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500934
Yanray Wangbd296832022-10-26 18:28:11 +0800935 TEST_ASSERT(mbedtls_test_mock_tcp_send_msg(&client_context, message,
936 MSGLEN)
Gilles Peskine449bd832023-01-11 14:50:10 +0100937 == MBEDTLS_TEST_ERROR_SEND_FAILED);
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500938
Yanray Wangbd296832022-10-26 18:28:11 +0800939 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&server_context, received,
940 MSGLEN)
Gilles Peskine449bd832023-01-11 14:50:10 +0100941 == MBEDTLS_ERR_SSL_WANT_READ);
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500942
943 /* Push directly to a queue to later simulate a disconnected behavior */
Yanray Wangbd296832022-10-26 18:28:11 +0800944 TEST_ASSERT(mbedtls_test_ssl_message_queue_push_info(&server_queue,
945 MSGLEN)
Gilles Peskine449bd832023-01-11 14:50:10 +0100946 == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500947
948 /* Test if there's an error when trying to read from a disconnected
949 * socket */
Yanray Wangbd296832022-10-26 18:28:11 +0800950 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&server_context, received,
951 MSGLEN)
Gilles Peskine449bd832023-01-11 14:50:10 +0100952 == MBEDTLS_TEST_ERROR_RECV_FAILED);
953exit:
Yanray Wangf7b62352022-10-26 11:51:53 +0800954 mbedtls_test_message_socket_close(&server_context);
955 mbedtls_test_message_socket_close(&client_context);
Valerio Setti285dae82023-04-19 15:10:45 +0200956 USE_PSA_DONE();
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500957}
958/* END_CASE */
959
960/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +0100961void ssl_message_mock_basic()
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500962{
963 enum { MSGLEN = 10 };
964 unsigned char message[MSGLEN], received[MSGLEN];
Yanray Wang9ef0dce2022-10-25 16:44:13 +0800965 mbedtls_test_mock_socket client, server;
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500966 unsigned i;
Yanray Wang9ef0dce2022-10-25 16:44:13 +0800967 mbedtls_test_ssl_message_queue server_queue, client_queue;
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500968 mbedtls_test_message_socket_context server_context, client_context;
Valerio Setti285dae82023-04-19 15:10:45 +0200969
Yanray Wangf7b62352022-10-26 11:51:53 +0800970 mbedtls_test_message_socket_init(&server_context);
971 mbedtls_test_message_socket_init(&client_context);
Valerio Setti00a256f2023-04-27 17:22:27 +0200972 USE_PSA_INIT();
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500973
Yanray Wangbd296832022-10-26 18:28:11 +0800974 TEST_ASSERT(mbedtls_test_message_socket_setup(&server_queue,
975 &client_queue, 1,
Yanray Wangf7b62352022-10-26 11:51:53 +0800976 &server,
977 &server_context) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500978
Yanray Wangbd296832022-10-26 18:28:11 +0800979 TEST_ASSERT(mbedtls_test_message_socket_setup(&client_queue,
980 &server_queue, 1,
Yanray Wangf7b62352022-10-26 11:51:53 +0800981 &client,
982 &client_context) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500983
984 /* Fill up the buffer with structured data so that unwanted changes
985 * can be detected */
Gilles Peskine449bd832023-01-11 14:50:10 +0100986 for (i = 0; i < MSGLEN; i++) {
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500987 message[i] = i & 0xFF;
988 }
Yanray Wangf7b62352022-10-26 11:51:53 +0800989 TEST_ASSERT(0 == mbedtls_test_mock_socket_connect(&client, &server,
990 MSGLEN));
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500991
992 /* Send the message to the server */
Yanray Wangf7b62352022-10-26 11:51:53 +0800993 TEST_ASSERT(mbedtls_test_mock_tcp_send_msg(&client_context, message,
994 MSGLEN) == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -0500995
996 /* Read from the server */
Yanray Wangbd296832022-10-26 18:28:11 +0800997 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&server_context, received,
998 MSGLEN)
Gilles Peskine449bd832023-01-11 14:50:10 +0100999 == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001000
Gilles Peskine449bd832023-01-11 14:50:10 +01001001 TEST_ASSERT(memcmp(message, received, MSGLEN) == 0);
1002 memset(received, 0, MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001003
1004 /* Send the message to the client */
Yanray Wangf7b62352022-10-26 11:51:53 +08001005 TEST_ASSERT(mbedtls_test_mock_tcp_send_msg(&server_context, message,
Yanray Wangbd296832022-10-26 18:28:11 +08001006 MSGLEN)
1007 == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001008
1009 /* Read from the client */
Yanray Wangbd296832022-10-26 18:28:11 +08001010 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&client_context, received,
1011 MSGLEN)
Gilles Peskine449bd832023-01-11 14:50:10 +01001012 == MSGLEN);
1013 TEST_ASSERT(memcmp(message, received, MSGLEN) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001014
Gilles Peskine449bd832023-01-11 14:50:10 +01001015exit:
Yanray Wangf7b62352022-10-26 11:51:53 +08001016 mbedtls_test_message_socket_close(&server_context);
1017 mbedtls_test_message_socket_close(&client_context);
Valerio Setti285dae82023-04-19 15:10:45 +02001018 USE_PSA_DONE();
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001019}
1020/* END_CASE */
1021
1022/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +01001023void ssl_message_mock_queue_overflow_underflow()
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001024{
1025 enum { MSGLEN = 10 };
1026 unsigned char message[MSGLEN], received[MSGLEN];
Yanray Wang9ef0dce2022-10-25 16:44:13 +08001027 mbedtls_test_mock_socket client, server;
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001028 unsigned i;
Yanray Wang9ef0dce2022-10-25 16:44:13 +08001029 mbedtls_test_ssl_message_queue server_queue, client_queue;
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001030 mbedtls_test_message_socket_context server_context, client_context;
Valerio Setti285dae82023-04-19 15:10:45 +02001031
Yanray Wangf7b62352022-10-26 11:51:53 +08001032 mbedtls_test_message_socket_init(&server_context);
1033 mbedtls_test_message_socket_init(&client_context);
Valerio Setti00a256f2023-04-27 17:22:27 +02001034 USE_PSA_INIT();
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001035
Yanray Wangbd296832022-10-26 18:28:11 +08001036 TEST_ASSERT(mbedtls_test_message_socket_setup(&server_queue,
1037 &client_queue, 2,
Yanray Wangf7b62352022-10-26 11:51:53 +08001038 &server,
1039 &server_context) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001040
Yanray Wangbd296832022-10-26 18:28:11 +08001041 TEST_ASSERT(mbedtls_test_message_socket_setup(&client_queue,
1042 &server_queue, 2,
Yanray Wangf7b62352022-10-26 11:51:53 +08001043 &client,
1044 &client_context) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001045
1046 /* Fill up the buffer with structured data so that unwanted changes
1047 * can be detected */
Gilles Peskine449bd832023-01-11 14:50:10 +01001048 for (i = 0; i < MSGLEN; i++) {
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001049 message[i] = i & 0xFF;
1050 }
Yanray Wangf7b62352022-10-26 11:51:53 +08001051 TEST_ASSERT(0 == mbedtls_test_mock_socket_connect(&client, &server,
1052 MSGLEN*2));
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001053
1054 /* Send three message to the server, last one with an error */
Yanray Wangf7b62352022-10-26 11:51:53 +08001055 TEST_ASSERT(mbedtls_test_mock_tcp_send_msg(&client_context, message,
Yanray Wangbd296832022-10-26 18:28:11 +08001056 MSGLEN - 1)
1057 == MSGLEN - 1);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001058
Yanray Wangf7b62352022-10-26 11:51:53 +08001059 TEST_ASSERT(mbedtls_test_mock_tcp_send_msg(&client_context, message,
Yanray Wangbd296832022-10-26 18:28:11 +08001060 MSGLEN)
1061 == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001062
Yanray Wangf7b62352022-10-26 11:51:53 +08001063 TEST_ASSERT(mbedtls_test_mock_tcp_send_msg(&client_context, message,
1064 MSGLEN)
Gilles Peskine449bd832023-01-11 14:50:10 +01001065 == MBEDTLS_ERR_SSL_WANT_WRITE);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001066
1067 /* Read three messages from the server, last one with an error */
Yanray Wangf7b62352022-10-26 11:51:53 +08001068 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&server_context, received,
Yanray Wangbd296832022-10-26 18:28:11 +08001069 MSGLEN - 1)
1070 == MSGLEN - 1);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001071
Yanray Wangbd296832022-10-26 18:28:11 +08001072 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&server_context, received,
1073 MSGLEN)
Gilles Peskine449bd832023-01-11 14:50:10 +01001074 == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001075
Gilles Peskine449bd832023-01-11 14:50:10 +01001076 TEST_ASSERT(memcmp(message, received, MSGLEN) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001077
Yanray Wangbd296832022-10-26 18:28:11 +08001078 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&server_context, received,
1079 MSGLEN)
Gilles Peskine449bd832023-01-11 14:50:10 +01001080 == MBEDTLS_ERR_SSL_WANT_READ);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001081
Gilles Peskine449bd832023-01-11 14:50:10 +01001082exit:
Yanray Wangf7b62352022-10-26 11:51:53 +08001083 mbedtls_test_message_socket_close(&server_context);
1084 mbedtls_test_message_socket_close(&client_context);
Valerio Setti285dae82023-04-19 15:10:45 +02001085 USE_PSA_DONE();
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001086}
1087/* END_CASE */
1088
1089/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +01001090void ssl_message_mock_socket_overflow()
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001091{
1092 enum { MSGLEN = 10 };
1093 unsigned char message[MSGLEN], received[MSGLEN];
Yanray Wang9ef0dce2022-10-25 16:44:13 +08001094 mbedtls_test_mock_socket client, server;
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001095 unsigned i;
Yanray Wang9ef0dce2022-10-25 16:44:13 +08001096 mbedtls_test_ssl_message_queue server_queue, client_queue;
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001097 mbedtls_test_message_socket_context server_context, client_context;
Valerio Setti285dae82023-04-19 15:10:45 +02001098
Yanray Wangf7b62352022-10-26 11:51:53 +08001099 mbedtls_test_message_socket_init(&server_context);
1100 mbedtls_test_message_socket_init(&client_context);
Valerio Setti00a256f2023-04-27 17:22:27 +02001101 USE_PSA_INIT();
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001102
Yanray Wangbd296832022-10-26 18:28:11 +08001103 TEST_ASSERT(mbedtls_test_message_socket_setup(&server_queue,
1104 &client_queue, 2,
Yanray Wangf7b62352022-10-26 11:51:53 +08001105 &server,
1106 &server_context) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001107
Yanray Wangbd296832022-10-26 18:28:11 +08001108 TEST_ASSERT(mbedtls_test_message_socket_setup(&client_queue,
1109 &server_queue, 2,
Yanray Wangf7b62352022-10-26 11:51:53 +08001110 &client,
1111 &client_context) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001112
1113 /* Fill up the buffer with structured data so that unwanted changes
1114 * can be detected */
Gilles Peskine449bd832023-01-11 14:50:10 +01001115 for (i = 0; i < MSGLEN; i++) {
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001116 message[i] = i & 0xFF;
1117 }
Yanray Wangf7b62352022-10-26 11:51:53 +08001118 TEST_ASSERT(0 == mbedtls_test_mock_socket_connect(&client, &server,
1119 MSGLEN));
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001120
1121 /* Send two message to the server, second one with an error */
Yanray Wangf7b62352022-10-26 11:51:53 +08001122 TEST_ASSERT(mbedtls_test_mock_tcp_send_msg(&client_context, message,
Yanray Wangbd296832022-10-26 18:28:11 +08001123 MSGLEN)
1124 == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001125
Yanray Wangf7b62352022-10-26 11:51:53 +08001126 TEST_ASSERT(mbedtls_test_mock_tcp_send_msg(&client_context, message,
1127 MSGLEN)
Gilles Peskine449bd832023-01-11 14:50:10 +01001128 == MBEDTLS_TEST_ERROR_SEND_FAILED);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001129
1130 /* Read the only message from the server */
Yanray Wangbd296832022-10-26 18:28:11 +08001131 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&server_context, received,
1132 MSGLEN)
Gilles Peskine449bd832023-01-11 14:50:10 +01001133 == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001134
Gilles Peskine449bd832023-01-11 14:50:10 +01001135 TEST_ASSERT(memcmp(message, received, MSGLEN) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001136
Gilles Peskine449bd832023-01-11 14:50:10 +01001137exit:
Yanray Wangf7b62352022-10-26 11:51:53 +08001138 mbedtls_test_message_socket_close(&server_context);
1139 mbedtls_test_message_socket_close(&client_context);
Valerio Setti285dae82023-04-19 15:10:45 +02001140 USE_PSA_DONE();
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001141}
1142/* END_CASE */
1143
1144/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +01001145void ssl_message_mock_truncated()
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001146{
1147 enum { MSGLEN = 10 };
1148 unsigned char message[MSGLEN], received[MSGLEN];
Yanray Wang9ef0dce2022-10-25 16:44:13 +08001149 mbedtls_test_mock_socket client, server;
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001150 unsigned i;
Yanray Wang9ef0dce2022-10-25 16:44:13 +08001151 mbedtls_test_ssl_message_queue server_queue, client_queue;
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001152 mbedtls_test_message_socket_context server_context, client_context;
Valerio Setti285dae82023-04-19 15:10:45 +02001153
Yanray Wangf7b62352022-10-26 11:51:53 +08001154 mbedtls_test_message_socket_init(&server_context);
1155 mbedtls_test_message_socket_init(&client_context);
Valerio Setti00a256f2023-04-27 17:22:27 +02001156 USE_PSA_INIT();
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001157
Yanray Wangbd296832022-10-26 18:28:11 +08001158 TEST_ASSERT(mbedtls_test_message_socket_setup(&server_queue,
1159 &client_queue, 2,
Yanray Wangf7b62352022-10-26 11:51:53 +08001160 &server,
1161 &server_context) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001162
Yanray Wangbd296832022-10-26 18:28:11 +08001163 TEST_ASSERT(mbedtls_test_message_socket_setup(&client_queue,
1164 &server_queue, 2,
Yanray Wangf7b62352022-10-26 11:51:53 +08001165 &client,
1166 &client_context) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001167
Gilles Peskine449bd832023-01-11 14:50:10 +01001168 memset(received, 0, MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001169 /* Fill up the buffer with structured data so that unwanted changes
1170 * can be detected */
Gilles Peskine449bd832023-01-11 14:50:10 +01001171 for (i = 0; i < MSGLEN; i++) {
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001172 message[i] = i & 0xFF;
1173 }
Yanray Wangf7b62352022-10-26 11:51:53 +08001174 TEST_ASSERT(0 == mbedtls_test_mock_socket_connect(&client, &server,
1175 2 * MSGLEN));
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001176
1177 /* Send two messages to the server, the second one small enough to fit in the
1178 * receiver's buffer. */
Yanray Wangf7b62352022-10-26 11:51:53 +08001179 TEST_ASSERT(mbedtls_test_mock_tcp_send_msg(&client_context, message,
Yanray Wangbd296832022-10-26 18:28:11 +08001180 MSGLEN)
1181 == MSGLEN);
Yanray Wangf7b62352022-10-26 11:51:53 +08001182 TEST_ASSERT(mbedtls_test_mock_tcp_send_msg(&client_context, message,
Yanray Wangbd296832022-10-26 18:28:11 +08001183 MSGLEN / 2)
1184 == MSGLEN / 2);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001185 /* Read a truncated message from the server */
Yanray Wangbd296832022-10-26 18:28:11 +08001186 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&server_context, received,
1187 MSGLEN/2)
Gilles Peskine449bd832023-01-11 14:50:10 +01001188 == MSGLEN/2);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001189
1190 /* Test that the first half of the message is valid, and second one isn't */
Gilles Peskine449bd832023-01-11 14:50:10 +01001191 TEST_ASSERT(memcmp(message, received, MSGLEN/2) == 0);
1192 TEST_ASSERT(memcmp(message + MSGLEN/2, received + MSGLEN/2, MSGLEN/2)
1193 != 0);
1194 memset(received, 0, MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001195
1196 /* Read a full message from the server */
Yanray Wangbd296832022-10-26 18:28:11 +08001197 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&server_context, received,
1198 MSGLEN/2)
Gilles Peskine449bd832023-01-11 14:50:10 +01001199 == MSGLEN / 2);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001200
1201 /* Test that the first half of the message is valid */
Gilles Peskine449bd832023-01-11 14:50:10 +01001202 TEST_ASSERT(memcmp(message, received, MSGLEN/2) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001203
Gilles Peskine449bd832023-01-11 14:50:10 +01001204exit:
Yanray Wangf7b62352022-10-26 11:51:53 +08001205 mbedtls_test_message_socket_close(&server_context);
1206 mbedtls_test_message_socket_close(&client_context);
Valerio Setti285dae82023-04-19 15:10:45 +02001207 USE_PSA_DONE();
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001208}
1209/* END_CASE */
1210
1211/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +01001212void ssl_message_mock_socket_read_error()
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001213{
1214 enum { MSGLEN = 10 };
1215 unsigned char message[MSGLEN], received[MSGLEN];
Yanray Wang9ef0dce2022-10-25 16:44:13 +08001216 mbedtls_test_mock_socket client, server;
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001217 unsigned i;
Yanray Wang9ef0dce2022-10-25 16:44:13 +08001218 mbedtls_test_ssl_message_queue server_queue, client_queue;
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001219 mbedtls_test_message_socket_context server_context, client_context;
Valerio Setti285dae82023-04-19 15:10:45 +02001220
Yanray Wangf7b62352022-10-26 11:51:53 +08001221 mbedtls_test_message_socket_init(&server_context);
1222 mbedtls_test_message_socket_init(&client_context);
Valerio Setti00a256f2023-04-27 17:22:27 +02001223 USE_PSA_INIT();
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001224
Yanray Wangbd296832022-10-26 18:28:11 +08001225 TEST_ASSERT(mbedtls_test_message_socket_setup(&server_queue,
1226 &client_queue, 1,
Yanray Wangf7b62352022-10-26 11:51:53 +08001227 &server,
1228 &server_context) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001229
Yanray Wangbd296832022-10-26 18:28:11 +08001230 TEST_ASSERT(mbedtls_test_message_socket_setup(&client_queue,
1231 &server_queue, 1,
Yanray Wangf7b62352022-10-26 11:51:53 +08001232 &client,
1233 &client_context) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001234
1235 /* Fill up the buffer with structured data so that unwanted changes
1236 * can be detected */
Gilles Peskine449bd832023-01-11 14:50:10 +01001237 for (i = 0; i < MSGLEN; i++) {
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001238 message[i] = i & 0xFF;
1239 }
Yanray Wangf7b62352022-10-26 11:51:53 +08001240 TEST_ASSERT(0 == mbedtls_test_mock_socket_connect(&client, &server,
1241 MSGLEN));
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001242
Yanray Wangf7b62352022-10-26 11:51:53 +08001243 TEST_ASSERT(mbedtls_test_mock_tcp_send_msg(&client_context, message,
Yanray Wangbd296832022-10-26 18:28:11 +08001244 MSGLEN)
1245 == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001246
1247 /* Force a read error by disconnecting the socket by hand */
1248 server.status = 0;
Yanray Wangbd296832022-10-26 18:28:11 +08001249 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&server_context, received,
1250 MSGLEN)
Gilles Peskine449bd832023-01-11 14:50:10 +01001251 == MBEDTLS_TEST_ERROR_RECV_FAILED);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001252 /* Return to a valid state */
1253 server.status = MBEDTLS_MOCK_SOCKET_CONNECTED;
1254
Gilles Peskine449bd832023-01-11 14:50:10 +01001255 memset(received, 0, sizeof(received));
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001256
1257 /* Test that even though the server tried to read once disconnected, the
1258 * continuity is preserved */
Yanray Wangbd296832022-10-26 18:28:11 +08001259 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&server_context, received,
1260 MSGLEN)
Gilles Peskine449bd832023-01-11 14:50:10 +01001261 == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001262
Gilles Peskine449bd832023-01-11 14:50:10 +01001263 TEST_ASSERT(memcmp(message, received, MSGLEN) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001264
Gilles Peskine449bd832023-01-11 14:50:10 +01001265exit:
Yanray Wangf7b62352022-10-26 11:51:53 +08001266 mbedtls_test_message_socket_close(&server_context);
1267 mbedtls_test_message_socket_close(&client_context);
Valerio Setti285dae82023-04-19 15:10:45 +02001268 USE_PSA_DONE();
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001269}
1270/* END_CASE */
1271
1272/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +01001273void ssl_message_mock_interleaved_one_way()
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001274{
1275 enum { MSGLEN = 10 };
1276 unsigned char message[MSGLEN], received[MSGLEN];
Yanray Wang9ef0dce2022-10-25 16:44:13 +08001277 mbedtls_test_mock_socket client, server;
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001278 unsigned i;
Yanray Wang9ef0dce2022-10-25 16:44:13 +08001279 mbedtls_test_ssl_message_queue server_queue, client_queue;
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001280 mbedtls_test_message_socket_context server_context, client_context;
Valerio Setti285dae82023-04-19 15:10:45 +02001281
Yanray Wangf7b62352022-10-26 11:51:53 +08001282 mbedtls_test_message_socket_init(&server_context);
1283 mbedtls_test_message_socket_init(&client_context);
Valerio Setti00a256f2023-04-27 17:22:27 +02001284 USE_PSA_INIT();
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001285
Yanray Wangbd296832022-10-26 18:28:11 +08001286 TEST_ASSERT(mbedtls_test_message_socket_setup(&server_queue,
1287 &client_queue, 3,
Yanray Wangf7b62352022-10-26 11:51:53 +08001288 &server,
1289 &server_context) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001290
Yanray Wangbd296832022-10-26 18:28:11 +08001291 TEST_ASSERT(mbedtls_test_message_socket_setup(&client_queue,
1292 &server_queue, 3,
Yanray Wangf7b62352022-10-26 11:51:53 +08001293 &client,
1294 &client_context) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001295
1296 /* Fill up the buffer with structured data so that unwanted changes
1297 * can be detected */
Gilles Peskine449bd832023-01-11 14:50:10 +01001298 for (i = 0; i < MSGLEN; i++) {
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001299 message[i] = i & 0xFF;
1300 }
Yanray Wangf7b62352022-10-26 11:51:53 +08001301 TEST_ASSERT(0 == mbedtls_test_mock_socket_connect(&client, &server,
1302 MSGLEN*3));
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001303
1304 /* Interleaved test - [2 sends, 1 read] twice, and then two reads
1305 * (to wrap around the buffer) */
Gilles Peskine449bd832023-01-11 14:50:10 +01001306 for (i = 0; i < 2; i++) {
Yanray Wangf7b62352022-10-26 11:51:53 +08001307 TEST_ASSERT(mbedtls_test_mock_tcp_send_msg(&client_context, message,
1308 MSGLEN) == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001309
Yanray Wangf7b62352022-10-26 11:51:53 +08001310 TEST_ASSERT(mbedtls_test_mock_tcp_send_msg(&client_context, message,
1311 MSGLEN) == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001312
Yanray Wangf7b62352022-10-26 11:51:53 +08001313 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&server_context, received,
1314 MSGLEN) == MSGLEN);
Gilles Peskine449bd832023-01-11 14:50:10 +01001315 TEST_ASSERT(memcmp(message, received, MSGLEN) == 0);
1316 memset(received, 0, sizeof(received));
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001317 }
1318
Gilles Peskine449bd832023-01-11 14:50:10 +01001319 for (i = 0; i < 2; i++) {
Yanray Wangf7b62352022-10-26 11:51:53 +08001320 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&server_context, received,
1321 MSGLEN) == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001322
Gilles Peskine449bd832023-01-11 14:50:10 +01001323 TEST_ASSERT(memcmp(message, received, MSGLEN) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001324 }
Yanray Wangbd296832022-10-26 18:28:11 +08001325 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&server_context, received,
1326 MSGLEN)
Gilles Peskine449bd832023-01-11 14:50:10 +01001327 == MBEDTLS_ERR_SSL_WANT_READ);
1328exit:
Yanray Wangf7b62352022-10-26 11:51:53 +08001329 mbedtls_test_message_socket_close(&server_context);
1330 mbedtls_test_message_socket_close(&client_context);
Valerio Setti285dae82023-04-19 15:10:45 +02001331 USE_PSA_DONE();
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001332}
1333/* END_CASE */
1334
1335/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +01001336void ssl_message_mock_interleaved_two_ways()
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001337{
1338 enum { MSGLEN = 10 };
1339 unsigned char message[MSGLEN], received[MSGLEN];
Yanray Wang9ef0dce2022-10-25 16:44:13 +08001340 mbedtls_test_mock_socket client, server;
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001341 unsigned i;
Yanray Wang9ef0dce2022-10-25 16:44:13 +08001342 mbedtls_test_ssl_message_queue server_queue, client_queue;
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001343 mbedtls_test_message_socket_context server_context, client_context;
Valerio Setti285dae82023-04-19 15:10:45 +02001344
Yanray Wangf7b62352022-10-26 11:51:53 +08001345 mbedtls_test_message_socket_init(&server_context);
1346 mbedtls_test_message_socket_init(&client_context);
Valerio Setti00a256f2023-04-27 17:22:27 +02001347 USE_PSA_INIT();
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001348
Yanray Wangbd296832022-10-26 18:28:11 +08001349 TEST_ASSERT(mbedtls_test_message_socket_setup(&server_queue,
1350 &client_queue, 3,
Yanray Wangf7b62352022-10-26 11:51:53 +08001351 &server,
1352 &server_context) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001353
Yanray Wangbd296832022-10-26 18:28:11 +08001354 TEST_ASSERT(mbedtls_test_message_socket_setup(&client_queue,
1355 &server_queue, 3,
Yanray Wangf7b62352022-10-26 11:51:53 +08001356 &client,
1357 &client_context) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001358
1359 /* Fill up the buffer with structured data so that unwanted changes
1360 * can be detected */
Gilles Peskine449bd832023-01-11 14:50:10 +01001361 for (i = 0; i < MSGLEN; i++) {
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001362 message[i] = i & 0xFF;
1363 }
Yanray Wangf7b62352022-10-26 11:51:53 +08001364 TEST_ASSERT(0 == mbedtls_test_mock_socket_connect(&client, &server,
1365 MSGLEN*3));
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001366
1367 /* Interleaved test - [2 sends, 1 read] twice, both ways, and then two reads
1368 * (to wrap around the buffer) both ways. */
Gilles Peskine449bd832023-01-11 14:50:10 +01001369 for (i = 0; i < 2; i++) {
Yanray Wangf7b62352022-10-26 11:51:53 +08001370 TEST_ASSERT(mbedtls_test_mock_tcp_send_msg(&client_context, message,
1371 MSGLEN) == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001372
Yanray Wangf7b62352022-10-26 11:51:53 +08001373 TEST_ASSERT(mbedtls_test_mock_tcp_send_msg(&client_context, message,
1374 MSGLEN) == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001375
Yanray Wangf7b62352022-10-26 11:51:53 +08001376 TEST_ASSERT(mbedtls_test_mock_tcp_send_msg(&server_context, message,
1377 MSGLEN) == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001378
Yanray Wangf7b62352022-10-26 11:51:53 +08001379 TEST_ASSERT(mbedtls_test_mock_tcp_send_msg(&server_context, message,
1380 MSGLEN) == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001381
Yanray Wangf7b62352022-10-26 11:51:53 +08001382 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&server_context, received,
1383 MSGLEN) == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001384
Gilles Peskine449bd832023-01-11 14:50:10 +01001385 TEST_ASSERT(memcmp(message, received, MSGLEN) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001386
Gilles Peskine449bd832023-01-11 14:50:10 +01001387 memset(received, 0, sizeof(received));
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001388
Yanray Wangf7b62352022-10-26 11:51:53 +08001389 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&client_context, received,
1390 MSGLEN) == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001391
Gilles Peskine449bd832023-01-11 14:50:10 +01001392 TEST_ASSERT(memcmp(message, received, MSGLEN) == 0);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001393
Gilles Peskine449bd832023-01-11 14:50:10 +01001394 memset(received, 0, sizeof(received));
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001395 }
1396
Gilles Peskine449bd832023-01-11 14:50:10 +01001397 for (i = 0; i < 2; i++) {
Yanray Wangf7b62352022-10-26 11:51:53 +08001398 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&server_context, received,
1399 MSGLEN) == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001400
Gilles Peskine449bd832023-01-11 14:50:10 +01001401 TEST_ASSERT(memcmp(message, received, MSGLEN) == 0);
1402 memset(received, 0, sizeof(received));
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001403
Yanray Wangf7b62352022-10-26 11:51:53 +08001404 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&client_context, received,
1405 MSGLEN) == MSGLEN);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001406
Gilles Peskine449bd832023-01-11 14:50:10 +01001407 TEST_ASSERT(memcmp(message, received, MSGLEN) == 0);
1408 memset(received, 0, sizeof(received));
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001409 }
1410
Yanray Wangbd296832022-10-26 18:28:11 +08001411 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&server_context, received,
1412 MSGLEN)
Gilles Peskine449bd832023-01-11 14:50:10 +01001413 == MBEDTLS_ERR_SSL_WANT_READ);
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001414
Yanray Wangbd296832022-10-26 18:28:11 +08001415 TEST_ASSERT(mbedtls_test_mock_tcp_recv_msg(&client_context, received,
1416 MSGLEN)
Gilles Peskine449bd832023-01-11 14:50:10 +01001417 == MBEDTLS_ERR_SSL_WANT_READ);
1418exit:
Yanray Wangf7b62352022-10-26 11:51:53 +08001419 mbedtls_test_message_socket_close(&server_context);
1420 mbedtls_test_message_socket_close(&client_context);
Valerio Setti285dae82023-04-19 15:10:45 +02001421 USE_PSA_DONE();
Andrzej Kurekbc483de2020-01-22 03:40:00 -05001422}
1423/* END_CASE */
1424
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001425/* BEGIN_CASE depends_on:MBEDTLS_SSL_DTLS_ANTI_REPLAY */
Gilles Peskine449bd832023-01-11 14:50:10 +01001426void ssl_dtls_replay(data_t *prevs, data_t *new, int ret)
Manuel Pégourié-Gonnard4956fd72014-09-24 11:13:44 +02001427{
Azim Khand30ca132017-06-09 04:32:58 +01001428 uint32_t len = 0;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02001429 mbedtls_ssl_context ssl;
Manuel Pégourié-Gonnarddef0bbe2015-05-04 14:56:36 +02001430 mbedtls_ssl_config conf;
Manuel Pégourié-Gonnard4956fd72014-09-24 11:13:44 +02001431
Gilles Peskine449bd832023-01-11 14:50:10 +01001432 mbedtls_ssl_init(&ssl);
1433 mbedtls_ssl_config_init(&conf);
valerio32f2ac92023-04-20 11:59:52 +02001434 MD_OR_USE_PSA_INIT();
Manuel Pégourié-Gonnard41d479e2015-04-29 00:48:22 +02001435
Gilles Peskine449bd832023-01-11 14:50:10 +01001436 TEST_ASSERT(mbedtls_ssl_config_defaults(&conf,
1437 MBEDTLS_SSL_IS_CLIENT,
1438 MBEDTLS_SSL_TRANSPORT_DATAGRAM,
1439 MBEDTLS_SSL_PRESET_DEFAULT) == 0);
Ronald Cronaab4a542024-02-23 18:51:11 +01001440
Gilles Peskine449bd832023-01-11 14:50:10 +01001441 TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
Manuel Pégourié-Gonnard4956fd72014-09-24 11:13:44 +02001442
1443 /* Read previous record numbers */
Gilles Peskine449bd832023-01-11 14:50:10 +01001444 for (len = 0; len < prevs->len; len += 6) {
1445 memcpy(ssl.in_ctr + 2, prevs->x + len, 6);
1446 mbedtls_ssl_dtls_replay_update(&ssl);
Manuel Pégourié-Gonnard4956fd72014-09-24 11:13:44 +02001447 }
1448
1449 /* Check new number */
Gilles Peskine449bd832023-01-11 14:50:10 +01001450 memcpy(ssl.in_ctr + 2, new->x, 6);
1451 TEST_ASSERT(mbedtls_ssl_dtls_replay_check(&ssl) == ret);
Manuel Pégourié-Gonnard4956fd72014-09-24 11:13:44 +02001452
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01001453exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01001454 mbedtls_ssl_free(&ssl);
1455 mbedtls_ssl_config_free(&conf);
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01001456 MD_OR_USE_PSA_DONE();
Manuel Pégourié-Gonnard4956fd72014-09-24 11:13:44 +02001457}
1458/* END_CASE */
Hanno Beckerb25c0c72017-05-05 11:24:30 +01001459
Ronald Crone68ab4f2022-10-05 12:46:29 +02001460/* BEGIN_CASE depends_on:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED */
Pengyu Lv9d87a382023-07-11 10:15:16 +08001461void ssl_set_hostname_twice(char *input_hostname0, char *input_hostname1)
Hanno Beckerb25c0c72017-05-05 11:24:30 +01001462{
Pengyu Lv9d87a382023-07-11 10:15:16 +08001463 const char *output_hostname;
Hanno Beckerb25c0c72017-05-05 11:24:30 +01001464 mbedtls_ssl_context ssl;
Valerio Setti285dae82023-04-19 15:10:45 +02001465
Gilles Peskine449bd832023-01-11 14:50:10 +01001466 mbedtls_ssl_init(&ssl);
valerio32f2ac92023-04-20 11:59:52 +02001467 USE_PSA_INIT();
Hanno Beckerb25c0c72017-05-05 11:24:30 +01001468
Pengyu Lv9d87a382023-07-11 10:15:16 +08001469 TEST_ASSERT(mbedtls_ssl_set_hostname(&ssl, input_hostname0) == 0);
1470 output_hostname = mbedtls_ssl_get_hostname(&ssl);
1471 TEST_ASSERT(strcmp(input_hostname0, output_hostname) == 0);
Pengyu Lv30e08702023-07-10 10:53:11 +08001472
Pengyu Lv9d87a382023-07-11 10:15:16 +08001473 TEST_ASSERT(mbedtls_ssl_set_hostname(&ssl, input_hostname1) == 0);
1474 output_hostname = mbedtls_ssl_get_hostname(&ssl);
1475 TEST_ASSERT(strcmp(input_hostname1, output_hostname) == 0);
Hanno Beckerb25c0c72017-05-05 11:24:30 +01001476
valerio32f2ac92023-04-20 11:59:52 +02001477exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01001478 mbedtls_ssl_free(&ssl);
Valerio Setti285dae82023-04-19 15:10:45 +02001479 USE_PSA_DONE();
Hanno Beckerb25c0c72017-05-05 11:24:30 +01001480}
Darryl Green11999bb2018-03-13 15:22:58 +00001481/* END_CASE */
Hanno Beckera18d1322018-01-03 14:27:32 +00001482
1483/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +01001484void ssl_crypt_record(int cipher_type, int hash_id,
1485 int etm, int tag_mode, int ver,
1486 int cid0_len, int cid1_len)
Hanno Beckera18d1322018-01-03 14:27:32 +00001487{
1488 /*
1489 * Test several record encryptions and decryptions
1490 * with plenty of space before and after the data
1491 * within the record buffer.
1492 */
1493
1494 int ret;
1495 int num_records = 16;
1496 mbedtls_ssl_context ssl; /* ONLY for debugging */
1497
1498 mbedtls_ssl_transform t0, t1;
Hanno Becker81e16a32019-03-01 11:21:44 +00001499 unsigned char *buf = NULL;
Hanno Beckera18d1322018-01-03 14:27:32 +00001500 size_t const buflen = 512;
1501 mbedtls_record rec, rec_backup;
1502
Gilles Peskine449bd832023-01-11 14:50:10 +01001503 mbedtls_ssl_init(&ssl);
1504 mbedtls_ssl_transform_init(&t0);
1505 mbedtls_ssl_transform_init(&t1);
valerio32f2ac92023-04-20 11:59:52 +02001506 MD_OR_USE_PSA_INIT();
1507
Yanray Wangf7b62352022-10-26 11:51:53 +08001508 ret = mbedtls_test_ssl_build_transforms(&t0, &t1, cipher_type, hash_id,
1509 etm, tag_mode, ver,
1510 (size_t) cid0_len,
1511 (size_t) cid1_len);
Przemyslaw Stekiel93cf4ee2022-01-19 16:18:53 +01001512
Gilles Peskine449bd832023-01-11 14:50:10 +01001513 TEST_ASSERT(ret == 0);
Hanno Beckera18d1322018-01-03 14:27:32 +00001514
Gilles Peskined681ffd2023-10-17 17:31:50 +02001515 TEST_CALLOC(buf, buflen);
Hanno Beckera18d1322018-01-03 14:27:32 +00001516
Gilles Peskine449bd832023-01-11 14:50:10 +01001517 while (num_records-- > 0) {
Hanno Beckera18d1322018-01-03 14:27:32 +00001518 mbedtls_ssl_transform *t_dec, *t_enc;
1519 /* Take turns in who's sending and who's receiving. */
Gilles Peskine449bd832023-01-11 14:50:10 +01001520 if (num_records % 3 == 0) {
Hanno Beckera18d1322018-01-03 14:27:32 +00001521 t_dec = &t0;
1522 t_enc = &t1;
Gilles Peskine449bd832023-01-11 14:50:10 +01001523 } else {
Hanno Beckera18d1322018-01-03 14:27:32 +00001524 t_dec = &t1;
1525 t_enc = &t0;
1526 }
1527
1528 /*
1529 * The record header affects the transformation in two ways:
1530 * 1) It determines the AEAD additional data
1531 * 2) The record counter sometimes determines the IV.
1532 *
1533 * Apart from that, the fields don't have influence.
1534 * In particular, it is currently not the responsibility
1535 * of ssl_encrypt/decrypt_buf to check if the transform
1536 * version matches the record version, or that the
1537 * type is sensible.
1538 */
1539
Gilles Peskine449bd832023-01-11 14:50:10 +01001540 memset(rec.ctr, num_records, sizeof(rec.ctr));
Hanno Beckera18d1322018-01-03 14:27:32 +00001541 rec.type = 42;
1542 rec.ver[0] = num_records;
1543 rec.ver[1] = num_records;
Hanno Beckera0e20d02019-05-15 14:03:01 +01001544#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
Hanno Beckerd856c822019-04-29 17:30:59 +01001545 rec.cid_len = 0;
Hanno Beckera0e20d02019-05-15 14:03:01 +01001546#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
Hanno Beckera18d1322018-01-03 14:27:32 +00001547
1548 rec.buf = buf;
1549 rec.buf_len = buflen;
1550 rec.data_offset = 16;
1551 /* Make sure to vary the length to exercise different
1552 * paddings. */
1553 rec.data_len = 1 + num_records;
1554
Gilles Peskine449bd832023-01-11 14:50:10 +01001555 memset(rec.buf + rec.data_offset, 42, rec.data_len);
Hanno Beckera18d1322018-01-03 14:27:32 +00001556
1557 /* Make a copy for later comparison */
1558 rec_backup = rec;
1559
1560 /* Encrypt record */
Ben Taylor602b2962025-03-07 15:52:50 +00001561 ret = mbedtls_ssl_encrypt_buf(&ssl, t_enc, &rec);
Gilles Peskine449bd832023-01-11 14:50:10 +01001562 TEST_ASSERT(ret == 0 || ret == MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL);
1563 if (ret != 0) {
Hanno Beckera18d1322018-01-03 14:27:32 +00001564 continue;
1565 }
1566
Hanno Beckerb2713ab2020-05-07 14:54:22 +01001567#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
Gilles Peskine449bd832023-01-11 14:50:10 +01001568 if (rec.cid_len != 0) {
Hanno Beckerb2713ab2020-05-07 14:54:22 +01001569 /* DTLS 1.2 + CID hides the real content type and
1570 * uses a special CID content type in the protected
1571 * record. Double-check this. */
Gilles Peskine449bd832023-01-11 14:50:10 +01001572 TEST_ASSERT(rec.type == MBEDTLS_SSL_MSG_CID);
Hanno Beckerb2713ab2020-05-07 14:54:22 +01001573 }
1574#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1575
Ronald Cron6f135e12021-12-08 16:57:54 +01001576#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
Gilles Peskine449bd832023-01-11 14:50:10 +01001577 if (t_enc->tls_version == MBEDTLS_SSL_VERSION_TLS1_3) {
Hanno Beckerb2713ab2020-05-07 14:54:22 +01001578 /* TLS 1.3 hides the real content type and
1579 * always uses Application Data as the content type
1580 * for protected records. Double-check this. */
Gilles Peskine449bd832023-01-11 14:50:10 +01001581 TEST_ASSERT(rec.type == MBEDTLS_SSL_MSG_APPLICATION_DATA);
Hanno Beckerb2713ab2020-05-07 14:54:22 +01001582 }
Ronald Cron6f135e12021-12-08 16:57:54 +01001583#endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
Hanno Beckerb2713ab2020-05-07 14:54:22 +01001584
Hanno Beckera18d1322018-01-03 14:27:32 +00001585 /* Decrypt record with t_dec */
Gilles Peskine449bd832023-01-11 14:50:10 +01001586 ret = mbedtls_ssl_decrypt_buf(&ssl, t_dec, &rec);
1587 TEST_ASSERT(ret == 0);
Hanno Beckera18d1322018-01-03 14:27:32 +00001588
1589 /* Compare results */
Gilles Peskine449bd832023-01-11 14:50:10 +01001590 TEST_ASSERT(rec.type == rec_backup.type);
1591 TEST_ASSERT(memcmp(rec.ctr, rec_backup.ctr, 8) == 0);
1592 TEST_ASSERT(rec.ver[0] == rec_backup.ver[0]);
1593 TEST_ASSERT(rec.ver[1] == rec_backup.ver[1]);
1594 TEST_ASSERT(rec.data_len == rec_backup.data_len);
1595 TEST_ASSERT(rec.data_offset == rec_backup.data_offset);
1596 TEST_ASSERT(memcmp(rec.buf + rec.data_offset,
1597 rec_backup.buf + rec_backup.data_offset,
1598 rec.data_len) == 0);
Hanno Beckera18d1322018-01-03 14:27:32 +00001599 }
1600
Hanno Becker81e16a32019-03-01 11:21:44 +00001601exit:
1602
Hanno Beckera18d1322018-01-03 14:27:32 +00001603 /* Cleanup */
Gilles Peskine449bd832023-01-11 14:50:10 +01001604 mbedtls_ssl_free(&ssl);
1605 mbedtls_ssl_transform_free(&t0);
1606 mbedtls_ssl_transform_free(&t1);
Hanno Beckera18d1322018-01-03 14:27:32 +00001607
Gilles Peskine449bd832023-01-11 14:50:10 +01001608 mbedtls_free(buf);
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01001609 MD_OR_USE_PSA_DONE();
Hanno Beckera18d1322018-01-03 14:27:32 +00001610}
1611/* END_CASE */
Hanno Beckerb3268da2018-01-05 15:20:24 +00001612
1613/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +01001614void ssl_crypt_record_small(int cipher_type, int hash_id,
1615 int etm, int tag_mode, int ver,
1616 int cid0_len, int cid1_len)
Hanno Beckerb3268da2018-01-05 15:20:24 +00001617{
1618 /*
1619 * Test pairs of encryption and decryption with an increasing
1620 * amount of space in the record buffer - in more detail:
1621 * 1) Try to encrypt with 0, 1, 2, ... bytes available
1622 * in front of the plaintext, and expect the encryption
1623 * to succeed starting from some offset. Always keep
1624 * enough space in the end of the buffer.
1625 * 2) Try to encrypt with 0, 1, 2, ... bytes available
1626 * at the end of the plaintext, and expect the encryption
1627 * to succeed starting from some offset. Always keep
1628 * enough space at the beginning of the buffer.
1629 * 3) Try to encrypt with 0, 1, 2, ... bytes available
1630 * both at the front and end of the plaintext,
1631 * and expect the encryption to succeed starting from
1632 * some offset.
1633 *
1634 * If encryption succeeds, check that decryption succeeds
1635 * and yields the original record.
1636 */
1637
1638 mbedtls_ssl_context ssl; /* ONLY for debugging */
1639
1640 mbedtls_ssl_transform t0, t1;
Hanno Becker81e16a32019-03-01 11:21:44 +00001641 unsigned char *buf = NULL;
Hanno Beckerd856c822019-04-29 17:30:59 +01001642 size_t const buflen = 256;
Hanno Beckerb3268da2018-01-05 15:20:24 +00001643 mbedtls_record rec, rec_backup;
1644
1645 int ret;
Hanno Beckerd856c822019-04-29 17:30:59 +01001646 int mode; /* Mode 1, 2 or 3 as explained above */
1647 size_t offset; /* Available space at beginning/end/both */
1648 size_t threshold = 96; /* Maximum offset to test against */
Hanno Beckerb3268da2018-01-05 15:20:24 +00001649
Hanno Beckerd856c822019-04-29 17:30:59 +01001650 size_t default_pre_padding = 64; /* Pre-padding to use in mode 2 */
1651 size_t default_post_padding = 128; /* Post-padding to use in mode 1 */
Hanno Beckerb3268da2018-01-05 15:20:24 +00001652
1653 int seen_success; /* Indicates if in the current mode we've
1654 * already seen a successful test. */
1655
Gilles Peskine449bd832023-01-11 14:50:10 +01001656 mbedtls_ssl_init(&ssl);
1657 mbedtls_ssl_transform_init(&t0);
1658 mbedtls_ssl_transform_init(&t1);
valerio32f2ac92023-04-20 11:59:52 +02001659 MD_OR_USE_PSA_INIT();
1660
Yanray Wangf7b62352022-10-26 11:51:53 +08001661 ret = mbedtls_test_ssl_build_transforms(&t0, &t1, cipher_type, hash_id,
1662 etm, tag_mode, ver,
1663 (size_t) cid0_len,
1664 (size_t) cid1_len);
Przemyslaw Stekiel93cf4ee2022-01-19 16:18:53 +01001665
Gilles Peskine449bd832023-01-11 14:50:10 +01001666 TEST_ASSERT(ret == 0);
Hanno Beckerb3268da2018-01-05 15:20:24 +00001667
Gilles Peskined681ffd2023-10-17 17:31:50 +02001668 TEST_CALLOC(buf, buflen);
Hanno Beckerb3268da2018-01-05 15:20:24 +00001669
Gilles Peskine449bd832023-01-11 14:50:10 +01001670 for (mode = 1; mode <= 3; mode++) {
Hanno Beckerb3268da2018-01-05 15:20:24 +00001671 seen_success = 0;
Gilles Peskine449bd832023-01-11 14:50:10 +01001672 for (offset = 0; offset <= threshold; offset++) {
Hanno Beckerb3268da2018-01-05 15:20:24 +00001673 mbedtls_ssl_transform *t_dec, *t_enc;
Hanno Becker6c87b3f2019-04-29 17:24:44 +01001674 t_dec = &t0;
1675 t_enc = &t1;
Hanno Beckerb3268da2018-01-05 15:20:24 +00001676
Gilles Peskine449bd832023-01-11 14:50:10 +01001677 memset(rec.ctr, offset, sizeof(rec.ctr));
Hanno Beckerb3268da2018-01-05 15:20:24 +00001678 rec.type = 42;
1679 rec.ver[0] = offset;
1680 rec.ver[1] = offset;
1681 rec.buf = buf;
1682 rec.buf_len = buflen;
Hanno Beckera0e20d02019-05-15 14:03:01 +01001683#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
Hanno Beckerd856c822019-04-29 17:30:59 +01001684 rec.cid_len = 0;
Hanno Beckera0e20d02019-05-15 14:03:01 +01001685#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
Hanno Beckerb3268da2018-01-05 15:20:24 +00001686
Gilles Peskine449bd832023-01-11 14:50:10 +01001687 switch (mode) {
Hanno Beckerb3268da2018-01-05 15:20:24 +00001688 case 1: /* Space in the beginning */
1689 rec.data_offset = offset;
1690 rec.data_len = buflen - offset - default_post_padding;
1691 break;
1692
1693 case 2: /* Space in the end */
1694 rec.data_offset = default_pre_padding;
1695 rec.data_len = buflen - default_pre_padding - offset;
1696 break;
1697
1698 case 3: /* Space in the beginning and end */
1699 rec.data_offset = offset;
1700 rec.data_len = buflen - 2 * offset;
1701 break;
1702
1703 default:
Gilles Peskine449bd832023-01-11 14:50:10 +01001704 TEST_ASSERT(0);
Hanno Beckerb3268da2018-01-05 15:20:24 +00001705 break;
1706 }
1707
Gilles Peskine449bd832023-01-11 14:50:10 +01001708 memset(rec.buf + rec.data_offset, 42, rec.data_len);
Hanno Beckerb3268da2018-01-05 15:20:24 +00001709
1710 /* Make a copy for later comparison */
1711 rec_backup = rec;
1712
1713 /* Encrypt record */
Ben Taylor602b2962025-03-07 15:52:50 +00001714 ret = mbedtls_ssl_encrypt_buf(&ssl, t_enc, &rec);
Hanno Beckerb3268da2018-01-05 15:20:24 +00001715
Gilles Peskine5fd88b72023-07-20 22:18:23 +02001716 if (ret == MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL) {
1717 /* It's ok if the output buffer is too small. We do insist
1718 * on at least one mode succeeding; this is tracked by
1719 * seen_success. */
Hanno Beckerb3268da2018-01-05 15:20:24 +00001720 continue;
Gilles Peskine449bd832023-01-11 14:50:10 +01001721 }
Hanno Beckerb3268da2018-01-05 15:20:24 +00001722
Gilles Peskine5fd88b72023-07-20 22:18:23 +02001723 TEST_EQUAL(ret, 0);
1724 seen_success = 1;
1725
Hanno Beckerb2713ab2020-05-07 14:54:22 +01001726#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
Gilles Peskine449bd832023-01-11 14:50:10 +01001727 if (rec.cid_len != 0) {
Hanno Beckerb2713ab2020-05-07 14:54:22 +01001728 /* DTLS 1.2 + CID hides the real content type and
1729 * uses a special CID content type in the protected
1730 * record. Double-check this. */
Gilles Peskine449bd832023-01-11 14:50:10 +01001731 TEST_ASSERT(rec.type == MBEDTLS_SSL_MSG_CID);
Hanno Beckerb2713ab2020-05-07 14:54:22 +01001732 }
1733#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1734
Ronald Cron6f135e12021-12-08 16:57:54 +01001735#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
Gilles Peskine449bd832023-01-11 14:50:10 +01001736 if (t_enc->tls_version == MBEDTLS_SSL_VERSION_TLS1_3) {
Hanno Beckerb2713ab2020-05-07 14:54:22 +01001737 /* TLS 1.3 hides the real content type and
1738 * always uses Application Data as the content type
1739 * for protected records. Double-check this. */
Gilles Peskine449bd832023-01-11 14:50:10 +01001740 TEST_ASSERT(rec.type == MBEDTLS_SSL_MSG_APPLICATION_DATA);
Hanno Beckerb2713ab2020-05-07 14:54:22 +01001741 }
Ronald Cron6f135e12021-12-08 16:57:54 +01001742#endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
Hanno Beckerb2713ab2020-05-07 14:54:22 +01001743
Hanno Beckerb3268da2018-01-05 15:20:24 +00001744 /* Decrypt record with t_dec */
Gilles Peskine449bd832023-01-11 14:50:10 +01001745 TEST_ASSERT(mbedtls_ssl_decrypt_buf(&ssl, t_dec, &rec) == 0);
Hanno Beckerb3268da2018-01-05 15:20:24 +00001746
1747 /* Compare results */
Gilles Peskine449bd832023-01-11 14:50:10 +01001748 TEST_ASSERT(rec.type == rec_backup.type);
1749 TEST_ASSERT(memcmp(rec.ctr, rec_backup.ctr, 8) == 0);
1750 TEST_ASSERT(rec.ver[0] == rec_backup.ver[0]);
1751 TEST_ASSERT(rec.ver[1] == rec_backup.ver[1]);
1752 TEST_ASSERT(rec.data_len == rec_backup.data_len);
1753 TEST_ASSERT(rec.data_offset == rec_backup.data_offset);
1754 TEST_ASSERT(memcmp(rec.buf + rec.data_offset,
1755 rec_backup.buf + rec_backup.data_offset,
1756 rec.data_len) == 0);
Hanno Beckerb3268da2018-01-05 15:20:24 +00001757 }
1758
Gilles Peskine449bd832023-01-11 14:50:10 +01001759 TEST_ASSERT(seen_success == 1);
Hanno Beckerb3268da2018-01-05 15:20:24 +00001760 }
1761
Hanno Becker81e16a32019-03-01 11:21:44 +00001762exit:
1763
Hanno Beckerb3268da2018-01-05 15:20:24 +00001764 /* Cleanup */
Gilles Peskine449bd832023-01-11 14:50:10 +01001765 mbedtls_ssl_free(&ssl);
1766 mbedtls_ssl_transform_free(&t0);
1767 mbedtls_ssl_transform_free(&t1);
Hanno Beckerb3268da2018-01-05 15:20:24 +00001768
Gilles Peskine449bd832023-01-11 14:50:10 +01001769 mbedtls_free(buf);
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01001770 MD_OR_USE_PSA_DONE();
Hanno Beckerb3268da2018-01-05 15:20:24 +00001771}
1772/* END_CASE */
Ron Eldor824ad7b2019-05-13 14:09:00 +03001773
Ronald Cron6f135e12021-12-08 16:57:54 +01001774/* BEGIN_CASE depends_on:MBEDTLS_SSL_PROTO_TLS1_3 */
Gilles Peskine449bd832023-01-11 14:50:10 +01001775void ssl_tls13_hkdf_expand_label(int hash_alg,
1776 data_t *secret,
1777 int label_idx,
1778 data_t *ctx,
1779 int desired_length,
1780 data_t *expected)
Hanno Becker39ff4922020-08-21 13:36:56 +01001781{
Gilles Peskine449bd832023-01-11 14:50:10 +01001782 unsigned char dst[100];
Hanno Becker39ff4922020-08-21 13:36:56 +01001783
Hanno Becker70d7fb02020-09-09 10:11:21 +01001784 unsigned char const *lbl = NULL;
1785 size_t lbl_len;
Gilles Peskine449bd832023-01-11 14:50:10 +01001786#define MBEDTLS_SSL_TLS1_3_LABEL(name, string) \
1787 if (label_idx == (int) tls13_label_ ## name) \
Xiaofei Baid25fab62021-12-02 06:36:27 +00001788 { \
Xiaofei Bai746f9482021-11-12 08:53:56 +00001789 lbl = mbedtls_ssl_tls13_labels.name; \
Gilles Peskine449bd832023-01-11 14:50:10 +01001790 lbl_len = sizeof(mbedtls_ssl_tls13_labels.name); \
Hanno Becker70d7fb02020-09-09 10:11:21 +01001791 }
Gilles Peskine449bd832023-01-11 14:50:10 +01001792 MBEDTLS_SSL_TLS1_3_LABEL_LIST
Hanno Becker70d7fb02020-09-09 10:11:21 +01001793#undef MBEDTLS_SSL_TLS1_3_LABEL
Gilles Peskine449bd832023-01-11 14:50:10 +01001794 TEST_ASSERT(lbl != NULL);
Hanno Becker39ff4922020-08-21 13:36:56 +01001795
1796 /* Check sanity of test parameters. */
Gilles Peskine449bd832023-01-11 14:50:10 +01001797 TEST_ASSERT((size_t) desired_length <= sizeof(dst));
1798 TEST_ASSERT((size_t) desired_length == expected->len);
Hanno Becker39ff4922020-08-21 13:36:56 +01001799
Gilles Peskine449bd832023-01-11 14:50:10 +01001800 PSA_INIT();
Gabor Mezei892c4aa2022-03-21 12:21:43 +01001801
Gilles Peskine449bd832023-01-11 14:50:10 +01001802 TEST_ASSERT(mbedtls_ssl_tls13_hkdf_expand_label(
1803 (psa_algorithm_t) hash_alg,
1804 secret->x, secret->len,
1805 lbl, lbl_len,
1806 ctx->x, ctx->len,
1807 dst, desired_length) == 0);
Hanno Becker39ff4922020-08-21 13:36:56 +01001808
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +01001809 TEST_MEMORY_COMPARE(dst, (size_t) desired_length,
Tom Cosgrove0540fe72023-07-27 14:17:27 +01001810 expected->x, (size_t) expected->len);
Gabor Mezei892c4aa2022-03-21 12:21:43 +01001811
valerio32f2ac92023-04-20 11:59:52 +02001812exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01001813 PSA_DONE();
Hanno Becker39ff4922020-08-21 13:36:56 +01001814}
1815/* END_CASE */
1816
Ronald Cron6f135e12021-12-08 16:57:54 +01001817/* BEGIN_CASE depends_on:MBEDTLS_SSL_PROTO_TLS1_3 */
Gilles Peskine449bd832023-01-11 14:50:10 +01001818void ssl_tls13_traffic_key_generation(int hash_alg,
1819 data_t *server_secret,
1820 data_t *client_secret,
1821 int desired_iv_len,
1822 int desired_key_len,
1823 data_t *expected_server_write_key,
1824 data_t *expected_server_write_iv,
1825 data_t *expected_client_write_key,
1826 data_t *expected_client_write_iv)
Hanno Becker19498f82020-08-21 13:37:08 +01001827{
1828 mbedtls_ssl_key_set keys;
1829
1830 /* Check sanity of test parameters. */
Gilles Peskine449bd832023-01-11 14:50:10 +01001831 TEST_ASSERT(client_secret->len == server_secret->len);
Yanray Wangd577a682022-10-27 11:47:54 +08001832 TEST_ASSERT(
1833 expected_client_write_iv->len == expected_server_write_iv->len &&
1834 expected_client_write_iv->len == (size_t) desired_iv_len);
1835 TEST_ASSERT(
1836 expected_client_write_key->len == expected_server_write_key->len &&
1837 expected_client_write_key->len == (size_t) desired_key_len);
Hanno Becker19498f82020-08-21 13:37:08 +01001838
Gilles Peskine449bd832023-01-11 14:50:10 +01001839 PSA_INIT();
Gabor Mezei892c4aa2022-03-21 12:21:43 +01001840
Gilles Peskine449bd832023-01-11 14:50:10 +01001841 TEST_ASSERT(mbedtls_ssl_tls13_make_traffic_keys(
1842 (psa_algorithm_t) hash_alg,
1843 client_secret->x,
1844 server_secret->x,
1845 client_secret->len /* == server_secret->len */,
1846 desired_key_len, desired_iv_len,
1847 &keys) == 0);
Hanno Becker19498f82020-08-21 13:37:08 +01001848
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +01001849 TEST_MEMORY_COMPARE(keys.client_write_key,
Tom Cosgrove0540fe72023-07-27 14:17:27 +01001850 keys.key_len,
1851 expected_client_write_key->x,
1852 (size_t) desired_key_len);
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +01001853 TEST_MEMORY_COMPARE(keys.server_write_key,
Tom Cosgrove0540fe72023-07-27 14:17:27 +01001854 keys.key_len,
1855 expected_server_write_key->x,
1856 (size_t) desired_key_len);
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +01001857 TEST_MEMORY_COMPARE(keys.client_write_iv,
Tom Cosgrove0540fe72023-07-27 14:17:27 +01001858 keys.iv_len,
1859 expected_client_write_iv->x,
1860 (size_t) desired_iv_len);
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +01001861 TEST_MEMORY_COMPARE(keys.server_write_iv,
Tom Cosgrove0540fe72023-07-27 14:17:27 +01001862 keys.iv_len,
1863 expected_server_write_iv->x,
1864 (size_t) desired_iv_len);
Gabor Mezei892c4aa2022-03-21 12:21:43 +01001865
valerio32f2ac92023-04-20 11:59:52 +02001866exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01001867 PSA_DONE();
Hanno Becker19498f82020-08-21 13:37:08 +01001868}
1869/* END_CASE */
1870
Ronald Cron6f135e12021-12-08 16:57:54 +01001871/* BEGIN_CASE depends_on:MBEDTLS_SSL_PROTO_TLS1_3 */
Gilles Peskine449bd832023-01-11 14:50:10 +01001872void ssl_tls13_derive_secret(int hash_alg,
1873 data_t *secret,
1874 int label_idx,
1875 data_t *ctx,
1876 int desired_length,
1877 int already_hashed,
1878 data_t *expected)
Hanno Beckere4849d12020-08-21 14:14:14 +01001879{
Gilles Peskine449bd832023-01-11 14:50:10 +01001880 unsigned char dst[100];
Hanno Beckere4849d12020-08-21 14:14:14 +01001881
Hanno Becker70d7fb02020-09-09 10:11:21 +01001882 unsigned char const *lbl = NULL;
1883 size_t lbl_len;
Michael Schusterbd89b792024-06-04 02:41:10 +02001884#define MBEDTLS_SSL_TLS1_3_LABEL(name, string) \
1885 if (label_idx == (int) tls13_label_ ## name) \
Xiaofei Baid25fab62021-12-02 06:36:27 +00001886 { \
Xiaofei Bai746f9482021-11-12 08:53:56 +00001887 lbl = mbedtls_ssl_tls13_labels.name; \
Michael Schusterbd89b792024-06-04 02:41:10 +02001888 lbl_len = sizeof(mbedtls_ssl_tls13_labels.name); \
Hanno Becker70d7fb02020-09-09 10:11:21 +01001889 }
Gilles Peskine449bd832023-01-11 14:50:10 +01001890 MBEDTLS_SSL_TLS1_3_LABEL_LIST
Hanno Becker70d7fb02020-09-09 10:11:21 +01001891#undef MBEDTLS_SSL_TLS1_3_LABEL
Gilles Peskine449bd832023-01-11 14:50:10 +01001892 TEST_ASSERT(lbl != NULL);
Hanno Becker70d7fb02020-09-09 10:11:21 +01001893
Hanno Beckere4849d12020-08-21 14:14:14 +01001894 /* Check sanity of test parameters. */
Gilles Peskine449bd832023-01-11 14:50:10 +01001895 TEST_ASSERT((size_t) desired_length <= sizeof(dst));
1896 TEST_ASSERT((size_t) desired_length == expected->len);
Hanno Beckere4849d12020-08-21 14:14:14 +01001897
Gilles Peskine449bd832023-01-11 14:50:10 +01001898 PSA_INIT();
Gabor Mezei892c4aa2022-03-21 12:21:43 +01001899
Gilles Peskine449bd832023-01-11 14:50:10 +01001900 TEST_ASSERT(mbedtls_ssl_tls13_derive_secret(
1901 (psa_algorithm_t) hash_alg,
1902 secret->x, secret->len,
1903 lbl, lbl_len,
1904 ctx->x, ctx->len,
1905 already_hashed,
1906 dst, desired_length) == 0);
Hanno Beckere4849d12020-08-21 14:14:14 +01001907
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +01001908 TEST_MEMORY_COMPARE(dst, desired_length,
Tom Cosgrove0540fe72023-07-27 14:17:27 +01001909 expected->x, desired_length);
Gabor Mezei892c4aa2022-03-21 12:21:43 +01001910
valerio32f2ac92023-04-20 11:59:52 +02001911exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01001912 PSA_DONE();
Hanno Beckere4849d12020-08-21 14:14:14 +01001913}
1914/* END_CASE */
1915
Ronald Cron6f135e12021-12-08 16:57:54 +01001916/* BEGIN_CASE depends_on:MBEDTLS_SSL_PROTO_TLS1_3 */
Gilles Peskine449bd832023-01-11 14:50:10 +01001917void ssl_tls13_derive_early_secrets(int hash_alg,
1918 data_t *secret,
1919 data_t *transcript,
1920 data_t *traffic_expected,
1921 data_t *exporter_expected)
Hanno Beckera4f40a02021-05-24 06:42:11 +01001922{
Xiaofei Bai746f9482021-11-12 08:53:56 +00001923 mbedtls_ssl_tls13_early_secrets secrets;
Hanno Beckera4f40a02021-05-24 06:42:11 +01001924
1925 /* Double-check that we've passed sane parameters. */
Gabor Mezei07732f72022-03-26 17:04:19 +01001926 psa_algorithm_t alg = (psa_algorithm_t) hash_alg;
Gilles Peskine449bd832023-01-11 14:50:10 +01001927 size_t const hash_len = PSA_HASH_LENGTH(alg);
Michael Schusterbd89b792024-06-04 02:41:10 +02001928 TEST_ASSERT(PSA_ALG_IS_HASH(alg) &&
Gilles Peskine449bd832023-01-11 14:50:10 +01001929 secret->len == hash_len &&
1930 transcript->len == hash_len &&
1931 traffic_expected->len == hash_len &&
1932 exporter_expected->len == hash_len);
Hanno Beckera4f40a02021-05-24 06:42:11 +01001933
Gilles Peskine449bd832023-01-11 14:50:10 +01001934 PSA_INIT();
Hanno Beckera4f40a02021-05-24 06:42:11 +01001935
Gilles Peskine449bd832023-01-11 14:50:10 +01001936 TEST_ASSERT(mbedtls_ssl_tls13_derive_early_secrets(
1937 alg, secret->x, transcript->x, transcript->len,
1938 &secrets) == 0);
Hanno Beckera4f40a02021-05-24 06:42:11 +01001939
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +01001940 TEST_MEMORY_COMPARE(secrets.client_early_traffic_secret, hash_len,
Tom Cosgrove0540fe72023-07-27 14:17:27 +01001941 traffic_expected->x, traffic_expected->len);
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +01001942 TEST_MEMORY_COMPARE(secrets.early_exporter_master_secret, hash_len,
Tom Cosgrove0540fe72023-07-27 14:17:27 +01001943 exporter_expected->x, exporter_expected->len);
Gabor Mezei892c4aa2022-03-21 12:21:43 +01001944
valerio32f2ac92023-04-20 11:59:52 +02001945exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01001946 PSA_DONE();
Hanno Beckera4f40a02021-05-24 06:42:11 +01001947}
1948/* END_CASE */
1949
Ronald Cron6f135e12021-12-08 16:57:54 +01001950/* BEGIN_CASE depends_on:MBEDTLS_SSL_PROTO_TLS1_3 */
Gilles Peskine449bd832023-01-11 14:50:10 +01001951void ssl_tls13_derive_handshake_secrets(int hash_alg,
1952 data_t *secret,
1953 data_t *transcript,
1954 data_t *client_expected,
1955 data_t *server_expected)
Hanno Beckera4f40a02021-05-24 06:42:11 +01001956{
Xiaofei Bai746f9482021-11-12 08:53:56 +00001957 mbedtls_ssl_tls13_handshake_secrets secrets;
Hanno Beckera4f40a02021-05-24 06:42:11 +01001958
1959 /* Double-check that we've passed sane parameters. */
Gabor Mezei07732f72022-03-26 17:04:19 +01001960 psa_algorithm_t alg = (psa_algorithm_t) hash_alg;
Gilles Peskine449bd832023-01-11 14:50:10 +01001961 size_t const hash_len = PSA_HASH_LENGTH(alg);
Michael Schusterbd89b792024-06-04 02:41:10 +02001962 TEST_ASSERT(PSA_ALG_IS_HASH(alg) &&
Gilles Peskine449bd832023-01-11 14:50:10 +01001963 secret->len == hash_len &&
1964 transcript->len == hash_len &&
1965 client_expected->len == hash_len &&
1966 server_expected->len == hash_len);
Hanno Beckera4f40a02021-05-24 06:42:11 +01001967
Gilles Peskine449bd832023-01-11 14:50:10 +01001968 PSA_INIT();
Hanno Beckera4f40a02021-05-24 06:42:11 +01001969
Gilles Peskine449bd832023-01-11 14:50:10 +01001970 TEST_ASSERT(mbedtls_ssl_tls13_derive_handshake_secrets(
1971 alg, secret->x, transcript->x, transcript->len,
1972 &secrets) == 0);
Hanno Beckera4f40a02021-05-24 06:42:11 +01001973
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +01001974 TEST_MEMORY_COMPARE(secrets.client_handshake_traffic_secret, hash_len,
Tom Cosgrove0540fe72023-07-27 14:17:27 +01001975 client_expected->x, client_expected->len);
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +01001976 TEST_MEMORY_COMPARE(secrets.server_handshake_traffic_secret, hash_len,
Tom Cosgrove0540fe72023-07-27 14:17:27 +01001977 server_expected->x, server_expected->len);
Gabor Mezei892c4aa2022-03-21 12:21:43 +01001978
valerio32f2ac92023-04-20 11:59:52 +02001979exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01001980 PSA_DONE();
Hanno Beckera4f40a02021-05-24 06:42:11 +01001981}
1982/* END_CASE */
1983
Ronald Cron6f135e12021-12-08 16:57:54 +01001984/* BEGIN_CASE depends_on:MBEDTLS_SSL_PROTO_TLS1_3 */
Gilles Peskine449bd832023-01-11 14:50:10 +01001985void ssl_tls13_derive_application_secrets(int hash_alg,
Xiaofei Bai746f9482021-11-12 08:53:56 +00001986 data_t *secret,
1987 data_t *transcript,
Gilles Peskine449bd832023-01-11 14:50:10 +01001988 data_t *client_expected,
1989 data_t *server_expected,
1990 data_t *exporter_expected)
Hanno Beckera4f40a02021-05-24 06:42:11 +01001991{
Xiaofei Bai746f9482021-11-12 08:53:56 +00001992 mbedtls_ssl_tls13_application_secrets secrets;
Hanno Beckera4f40a02021-05-24 06:42:11 +01001993
1994 /* Double-check that we've passed sane parameters. */
Gabor Mezei07732f72022-03-26 17:04:19 +01001995 psa_algorithm_t alg = (psa_algorithm_t) hash_alg;
Gilles Peskine449bd832023-01-11 14:50:10 +01001996 size_t const hash_len = PSA_HASH_LENGTH(alg);
Michael Schusterbd89b792024-06-04 02:41:10 +02001997 TEST_ASSERT(PSA_ALG_IS_HASH(alg) &&
Gilles Peskine449bd832023-01-11 14:50:10 +01001998 secret->len == hash_len &&
1999 transcript->len == hash_len &&
2000 client_expected->len == hash_len &&
2001 server_expected->len == hash_len &&
2002 exporter_expected->len == hash_len);
Hanno Beckera4f40a02021-05-24 06:42:11 +01002003
Gilles Peskine449bd832023-01-11 14:50:10 +01002004 PSA_INIT();
Hanno Beckera4f40a02021-05-24 06:42:11 +01002005
Gilles Peskine449bd832023-01-11 14:50:10 +01002006 TEST_ASSERT(mbedtls_ssl_tls13_derive_application_secrets(
2007 alg, secret->x, transcript->x, transcript->len,
2008 &secrets) == 0);
Hanno Beckera4f40a02021-05-24 06:42:11 +01002009
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +01002010 TEST_MEMORY_COMPARE(secrets.client_application_traffic_secret_N, hash_len,
Tom Cosgrove0540fe72023-07-27 14:17:27 +01002011 client_expected->x, client_expected->len);
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +01002012 TEST_MEMORY_COMPARE(secrets.server_application_traffic_secret_N, hash_len,
Tom Cosgrove0540fe72023-07-27 14:17:27 +01002013 server_expected->x, server_expected->len);
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +01002014 TEST_MEMORY_COMPARE(secrets.exporter_master_secret, hash_len,
Tom Cosgrove0540fe72023-07-27 14:17:27 +01002015 exporter_expected->x, exporter_expected->len);
Gabor Mezei892c4aa2022-03-21 12:21:43 +01002016
valerio32f2ac92023-04-20 11:59:52 +02002017exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01002018 PSA_DONE();
Hanno Beckera4f40a02021-05-24 06:42:11 +01002019}
2020/* END_CASE */
2021
Ronald Cron6f135e12021-12-08 16:57:54 +01002022/* BEGIN_CASE depends_on:MBEDTLS_SSL_PROTO_TLS1_3 */
Gilles Peskine449bd832023-01-11 14:50:10 +01002023void ssl_tls13_derive_resumption_secrets(int hash_alg,
2024 data_t *secret,
2025 data_t *transcript,
2026 data_t *resumption_expected)
Hanno Becker55bc2c52021-05-24 06:53:52 +01002027{
Gilles Peskine449bd832023-01-11 14:50:10 +01002028 mbedtls_ssl_tls13_application_secrets secrets;
Hanno Becker55bc2c52021-05-24 06:53:52 +01002029
2030 /* Double-check that we've passed sane parameters. */
Gabor Mezei07732f72022-03-26 17:04:19 +01002031 psa_algorithm_t alg = (psa_algorithm_t) hash_alg;
Gilles Peskine449bd832023-01-11 14:50:10 +01002032 size_t const hash_len = PSA_HASH_LENGTH(alg);
Michael Schusterbd89b792024-06-04 02:41:10 +02002033 TEST_ASSERT(PSA_ALG_IS_HASH(alg) &&
Gilles Peskine449bd832023-01-11 14:50:10 +01002034 secret->len == hash_len &&
2035 transcript->len == hash_len &&
2036 resumption_expected->len == hash_len);
Hanno Becker55bc2c52021-05-24 06:53:52 +01002037
Gilles Peskine449bd832023-01-11 14:50:10 +01002038 PSA_INIT();
Hanno Becker55bc2c52021-05-24 06:53:52 +01002039
Gilles Peskine449bd832023-01-11 14:50:10 +01002040 TEST_ASSERT(mbedtls_ssl_tls13_derive_resumption_master_secret(
2041 alg, secret->x, transcript->x, transcript->len,
2042 &secrets) == 0);
Hanno Becker55bc2c52021-05-24 06:53:52 +01002043
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +01002044 TEST_MEMORY_COMPARE(secrets.resumption_master_secret, hash_len,
Tom Cosgrove0540fe72023-07-27 14:17:27 +01002045 resumption_expected->x, resumption_expected->len);
Gabor Mezei892c4aa2022-03-21 12:21:43 +01002046
valerio32f2ac92023-04-20 11:59:52 +02002047exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01002048 PSA_DONE();
2049}
2050/* END_CASE */
2051
2052/* BEGIN_CASE depends_on:MBEDTLS_SSL_PROTO_TLS1_3 */
2053void ssl_tls13_create_psk_binder(int hash_alg,
2054 data_t *psk,
2055 int psk_type,
2056 data_t *transcript,
2057 data_t *binder_expected)
2058{
Manuel Pégourié-Gonnard88579842023-03-28 11:20:23 +02002059 unsigned char binder[MBEDTLS_MD_MAX_SIZE];
Gilles Peskine449bd832023-01-11 14:50:10 +01002060
2061 /* Double-check that we've passed sane parameters. */
2062 psa_algorithm_t alg = (psa_algorithm_t) hash_alg;
2063 size_t const hash_len = PSA_HASH_LENGTH(alg);
Michael Schusterbd89b792024-06-04 02:41:10 +02002064 TEST_ASSERT(PSA_ALG_IS_HASH(alg) &&
Gilles Peskine449bd832023-01-11 14:50:10 +01002065 transcript->len == hash_len &&
2066 binder_expected->len == hash_len);
2067
2068 PSA_INIT();
2069
2070 TEST_ASSERT(mbedtls_ssl_tls13_create_psk_binder(
2071 NULL, /* SSL context for debugging only */
2072 alg,
2073 psk->x, psk->len,
2074 psk_type,
2075 transcript->x,
2076 binder) == 0);
2077
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +01002078 TEST_MEMORY_COMPARE(binder, hash_len,
Tom Cosgrove0540fe72023-07-27 14:17:27 +01002079 binder_expected->x, binder_expected->len);
Gilles Peskine449bd832023-01-11 14:50:10 +01002080
valerio32f2ac92023-04-20 11:59:52 +02002081exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01002082 PSA_DONE();
Hanno Becker55bc2c52021-05-24 06:53:52 +01002083}
2084/* END_CASE */
2085
Gilles Peskine9d5952d2023-07-20 20:11:21 +02002086/* BEGIN_CASE depends_on:MBEDTLS_SSL_PROTO_TLS1_3 */
Gilles Peskine449bd832023-01-11 14:50:10 +01002087void ssl_tls13_record_protection(int ciphersuite,
2088 int endpoint,
2089 int ctr,
2090 int padding_used,
2091 data_t *server_write_key,
2092 data_t *server_write_iv,
2093 data_t *client_write_key,
2094 data_t *client_write_iv,
2095 data_t *plaintext,
2096 data_t *ciphertext)
Hanno Beckera77d0052021-03-22 15:16:33 +00002097{
2098 mbedtls_ssl_key_set keys;
2099 mbedtls_ssl_transform transform_send;
Gilles Peskine21e46b32023-10-17 16:35:20 +02002100 mbedtls_ssl_transform_init(&transform_send);
Hanno Beckera77d0052021-03-22 15:16:33 +00002101 mbedtls_ssl_transform transform_recv;
Gilles Peskine21e46b32023-10-17 16:35:20 +02002102 mbedtls_ssl_transform_init(&transform_recv);
Hanno Beckera77d0052021-03-22 15:16:33 +00002103 mbedtls_record rec;
2104 unsigned char *buf = NULL;
Hanno Becker1f918782021-08-01 19:18:28 +01002105 size_t buf_len;
Hanno Beckera77d0052021-03-22 15:16:33 +00002106 int other_endpoint;
2107
Gilles Peskine449bd832023-01-11 14:50:10 +01002108 TEST_ASSERT(endpoint == MBEDTLS_SSL_IS_CLIENT ||
2109 endpoint == MBEDTLS_SSL_IS_SERVER);
Hanno Beckera77d0052021-03-22 15:16:33 +00002110
Gilles Peskine449bd832023-01-11 14:50:10 +01002111 if (endpoint == MBEDTLS_SSL_IS_SERVER) {
Hanno Beckera77d0052021-03-22 15:16:33 +00002112 other_endpoint = MBEDTLS_SSL_IS_CLIENT;
Gilles Peskine449bd832023-01-11 14:50:10 +01002113 }
2114 if (endpoint == MBEDTLS_SSL_IS_CLIENT) {
Hanno Beckera77d0052021-03-22 15:16:33 +00002115 other_endpoint = MBEDTLS_SSL_IS_SERVER;
Gilles Peskine449bd832023-01-11 14:50:10 +01002116 }
Hanno Beckera77d0052021-03-22 15:16:33 +00002117
Gilles Peskine449bd832023-01-11 14:50:10 +01002118 TEST_ASSERT(server_write_key->len == client_write_key->len);
2119 TEST_ASSERT(server_write_iv->len == client_write_iv->len);
Hanno Beckera77d0052021-03-22 15:16:33 +00002120
Gilles Peskine449bd832023-01-11 14:50:10 +01002121 memcpy(keys.client_write_key,
2122 client_write_key->x, client_write_key->len);
2123 memcpy(keys.client_write_iv,
2124 client_write_iv->x, client_write_iv->len);
2125 memcpy(keys.server_write_key,
2126 server_write_key->x, server_write_key->len);
2127 memcpy(keys.server_write_iv,
2128 server_write_iv->x, server_write_iv->len);
Hanno Beckera77d0052021-03-22 15:16:33 +00002129
2130 keys.key_len = server_write_key->len;
2131 keys.iv_len = server_write_iv->len;
2132
Valerio Setti00a256f2023-04-27 17:22:27 +02002133 MD_OR_USE_PSA_INIT();
Hanno Beckera77d0052021-03-22 15:16:33 +00002134
Gilles Peskine449bd832023-01-11 14:50:10 +01002135 TEST_ASSERT(mbedtls_ssl_tls13_populate_transform(
2136 &transform_send, endpoint,
2137 ciphersuite, &keys, NULL) == 0);
2138 TEST_ASSERT(mbedtls_ssl_tls13_populate_transform(
2139 &transform_recv, other_endpoint,
2140 ciphersuite, &keys, NULL) == 0);
Hanno Beckera77d0052021-03-22 15:16:33 +00002141
Hanno Becker1f918782021-08-01 19:18:28 +01002142 /* Make sure we have enough space in the buffer even if
2143 * we use more padding than the KAT. */
2144 buf_len = ciphertext->len + MBEDTLS_SSL_CID_TLS1_3_PADDING_GRANULARITY;
Tom Cosgrove05b2a872023-07-21 11:31:13 +01002145 TEST_CALLOC(buf, buf_len);
Hanno Beckera77d0052021-03-22 15:16:33 +00002146 rec.type = MBEDTLS_SSL_MSG_APPLICATION_DATA;
Hanno Becker41537452021-04-20 05:35:28 +01002147
2148 /* TLS 1.3 uses the version identifier from TLS 1.2 on the wire. */
Gilles Peskine449bd832023-01-11 14:50:10 +01002149 mbedtls_ssl_write_version(rec.ver,
2150 MBEDTLS_SSL_TRANSPORT_STREAM,
2151 MBEDTLS_SSL_VERSION_TLS1_2);
Hanno Beckera77d0052021-03-22 15:16:33 +00002152
2153 /* Copy plaintext into record structure */
2154 rec.buf = buf;
Hanno Becker1f918782021-08-01 19:18:28 +01002155 rec.buf_len = buf_len;
Hanno Beckera77d0052021-03-22 15:16:33 +00002156 rec.data_offset = 0;
Gilles Peskine449bd832023-01-11 14:50:10 +01002157 TEST_ASSERT(plaintext->len <= ciphertext->len);
2158 memcpy(rec.buf + rec.data_offset, plaintext->x, plaintext->len);
Hanno Beckera77d0052021-03-22 15:16:33 +00002159 rec.data_len = plaintext->len;
2160#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
2161 rec.cid_len = 0;
2162#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
2163
Gilles Peskine449bd832023-01-11 14:50:10 +01002164 memset(&rec.ctr[0], 0, 8);
Hanno Beckera77d0052021-03-22 15:16:33 +00002165 rec.ctr[7] = ctr;
2166
Ben Taylor602b2962025-03-07 15:52:50 +00002167 TEST_ASSERT(mbedtls_ssl_encrypt_buf(NULL, &transform_send, &rec) == 0);
Hanno Becker1f918782021-08-01 19:18:28 +01002168
Gilles Peskine449bd832023-01-11 14:50:10 +01002169 if (padding_used == MBEDTLS_SSL_CID_TLS1_3_PADDING_GRANULARITY) {
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +01002170 TEST_MEMORY_COMPARE(rec.buf + rec.data_offset, rec.data_len,
Tom Cosgrove0540fe72023-07-27 14:17:27 +01002171 ciphertext->x, ciphertext->len);
Hanno Becker1f918782021-08-01 19:18:28 +01002172 }
Hanno Beckera77d0052021-03-22 15:16:33 +00002173
Gilles Peskine449bd832023-01-11 14:50:10 +01002174 TEST_ASSERT(mbedtls_ssl_decrypt_buf(NULL, &transform_recv, &rec) == 0);
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +01002175 TEST_MEMORY_COMPARE(rec.buf + rec.data_offset, rec.data_len,
Tom Cosgrove0540fe72023-07-27 14:17:27 +01002176 plaintext->x, plaintext->len);
Hanno Beckera77d0052021-03-22 15:16:33 +00002177
valerio32f2ac92023-04-20 11:59:52 +02002178exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01002179 mbedtls_free(buf);
2180 mbedtls_ssl_transform_free(&transform_send);
2181 mbedtls_ssl_transform_free(&transform_recv);
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01002182 MD_OR_USE_PSA_DONE();
Hanno Beckera77d0052021-03-22 15:16:33 +00002183}
2184/* END_CASE */
2185
Andrzej Kurek658442f2022-10-12 11:28:41 -04002186/* BEGIN_CASE depends_on:MBEDTLS_SSL_PROTO_TLS1_3 */
Gilles Peskine449bd832023-01-11 14:50:10 +01002187void ssl_tls13_key_evolution(int hash_alg,
2188 data_t *secret,
2189 data_t *input,
2190 data_t *expected)
Hanno Becker2d2c3eb2020-08-20 14:54:24 +01002191{
Manuel Pégourié-Gonnard88579842023-03-28 11:20:23 +02002192 unsigned char secret_new[MBEDTLS_MD_MAX_SIZE];
Hanno Becker2d2c3eb2020-08-20 14:54:24 +01002193
Gabor Mezei5d9a1fe2022-03-24 17:49:14 +01002194 PSA_INIT();
Gabor Mezei892c4aa2022-03-21 12:21:43 +01002195
Gilles Peskine449bd832023-01-11 14:50:10 +01002196 TEST_ASSERT(mbedtls_ssl_tls13_evolve_secret(
2197 (psa_algorithm_t) hash_alg,
2198 secret->len ? secret->x : NULL,
2199 input->len ? input->x : NULL, input->len,
2200 secret_new) == 0);
Hanno Becker2d2c3eb2020-08-20 14:54:24 +01002201
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +01002202 TEST_MEMORY_COMPARE(secret_new, (size_t) expected->len,
Tom Cosgrove0540fe72023-07-27 14:17:27 +01002203 expected->x, (size_t) expected->len);
Gabor Mezei892c4aa2022-03-21 12:21:43 +01002204
valerio32f2ac92023-04-20 11:59:52 +02002205exit:
Gabor Mezei5d9a1fe2022-03-24 17:49:14 +01002206 PSA_DONE();
Hanno Becker2d2c3eb2020-08-20 14:54:24 +01002207}
2208/* END_CASE */
2209
Jerry Yu53d23e22022-02-09 16:25:09 +08002210/* BEGIN_CASE depends_on:MBEDTLS_SSL_PROTO_TLS1_2 */
Gilles Peskine449bd832023-01-11 14:50:10 +01002211void ssl_tls_prf(int type, data_t *secret, data_t *random,
2212 char *label, data_t *result_str, int exp_ret)
Ron Eldor824ad7b2019-05-13 14:09:00 +03002213{
2214 unsigned char *output;
2215
Gilles Peskine449bd832023-01-11 14:50:10 +01002216 output = mbedtls_calloc(1, result_str->len);
2217 if (output == NULL) {
Ron Eldor824ad7b2019-05-13 14:09:00 +03002218 goto exit;
Gilles Peskine449bd832023-01-11 14:50:10 +01002219 }
Ron Eldor824ad7b2019-05-13 14:09:00 +03002220
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01002221 MD_OR_USE_PSA_INIT();
Ron Eldor6b9b1b82019-05-15 17:04:33 +03002222
Gilles Peskine449bd832023-01-11 14:50:10 +01002223 TEST_ASSERT(mbedtls_ssl_tls_prf(type, secret->x, secret->len,
2224 label, random->x, random->len,
2225 output, result_str->len) == exp_ret);
Ron Eldor824ad7b2019-05-13 14:09:00 +03002226
Gilles Peskine449bd832023-01-11 14:50:10 +01002227 if (exp_ret == 0) {
2228 TEST_ASSERT(mbedtls_test_hexcmp(output, result_str->x,
2229 result_str->len, result_str->len) == 0);
Ron Eldor824ad7b2019-05-13 14:09:00 +03002230 }
2231exit:
2232
Gilles Peskine449bd832023-01-11 14:50:10 +01002233 mbedtls_free(output);
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01002234 MD_OR_USE_PSA_DONE();
Ron Eldor824ad7b2019-05-13 14:09:00 +03002235}
2236/* END_CASE */
Manuel Pégourié-Gonnard6eac11b2019-05-23 09:30:55 +02002237
Manuel Pégourié-Gonnardf9deaec2019-05-24 09:41:39 +02002238/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +01002239void ssl_serialize_session_save_load(int ticket_len, char *crt_file,
2240 int endpoint_type, int tls_version)
Manuel Pégourié-Gonnardf9deaec2019-05-24 09:41:39 +02002241{
2242 mbedtls_ssl_session original, restored;
2243 unsigned char *buf = NULL;
2244 size_t len;
2245
2246 /*
2247 * Test that a save-load pair is the identity
2248 */
Gilles Peskine449bd832023-01-11 14:50:10 +01002249 mbedtls_ssl_session_init(&original);
2250 mbedtls_ssl_session_init(&restored);
valerio32f2ac92023-04-20 11:59:52 +02002251 USE_PSA_INIT();
Manuel Pégourié-Gonnardf9deaec2019-05-24 09:41:39 +02002252
2253 /* Prepare a dummy session to work on */
Jerry Yuf0926292022-07-15 13:05:57 +08002254 ((void) tls_version);
Jerry Yu28547c42023-10-31 14:42:50 +08002255 ((void) ticket_len);
2256 ((void) crt_file);
Jerry Yuf0926292022-07-15 13:05:57 +08002257#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
Gilles Peskine449bd832023-01-11 14:50:10 +01002258 if (tls_version == MBEDTLS_SSL_VERSION_TLS1_3) {
Yanray Wangf7b62352022-10-26 11:51:53 +08002259 TEST_ASSERT(mbedtls_test_ssl_tls13_populate_session(
Gilles Peskine449bd832023-01-11 14:50:10 +01002260 &original, 0, endpoint_type) == 0);
Jerry Yu28547c42023-10-31 14:42:50 +08002261 }
Jerry Yuf0926292022-07-15 13:05:57 +08002262#endif
Jerry Yu28547c42023-10-31 14:42:50 +08002263
2264#if defined(MBEDTLS_SSL_PROTO_TLS1_2)
2265 if (tls_version == MBEDTLS_SSL_VERSION_TLS1_2) {
Yanray Wangf7b62352022-10-26 11:51:53 +08002266 TEST_ASSERT(mbedtls_test_ssl_tls12_populate_session(
Ronald Cron7b1921a2023-11-23 12:31:56 +01002267 &original, ticket_len, endpoint_type, crt_file) == 0);
Jerry Yuf0926292022-07-15 13:05:57 +08002268 }
Jerry Yu28547c42023-10-31 14:42:50 +08002269#endif
Manuel Pégourié-Gonnardf9deaec2019-05-24 09:41:39 +02002270
Manuel Pégourié-Gonnard686adb42019-06-03 09:55:16 +02002271 /* Serialize it */
Gilles Peskine449bd832023-01-11 14:50:10 +01002272 TEST_ASSERT(mbedtls_ssl_session_save(&original, NULL, 0, &len)
2273 == MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL);
Gilles Peskined681ffd2023-10-17 17:31:50 +02002274 TEST_CALLOC(buf, len);
Gilles Peskine449bd832023-01-11 14:50:10 +01002275 TEST_ASSERT(mbedtls_ssl_session_save(&original, buf, len, &len)
2276 == 0);
Manuel Pégourié-Gonnardf9deaec2019-05-24 09:41:39 +02002277
Manuel Pégourié-Gonnard686adb42019-06-03 09:55:16 +02002278 /* Restore session from serialized data */
Gilles Peskine449bd832023-01-11 14:50:10 +01002279 TEST_ASSERT(mbedtls_ssl_session_load(&restored, buf, len) == 0);
Manuel Pégourié-Gonnardf9deaec2019-05-24 09:41:39 +02002280
2281 /*
2282 * Make sure both session structures are identical
2283 */
2284#if defined(MBEDTLS_HAVE_TIME)
Ronald Cronc57f86e2023-11-22 09:50:01 +01002285 if (tls_version == MBEDTLS_SSL_VERSION_TLS1_2) {
2286 TEST_ASSERT(original.start == restored.start);
Jerry Yu28547c42023-10-31 14:42:50 +08002287 }
Ronald Cronc57f86e2023-11-22 09:50:01 +01002288#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_SRV_C)
2289 TEST_ASSERT(original.ticket_creation_time == restored.ticket_creation_time);
Jerry Yu28547c42023-10-31 14:42:50 +08002290#endif
Ronald Cronc57f86e2023-11-22 09:50:01 +01002291#endif /* MBEDTLS_HAVE_TIME */
Jerry Yu28547c42023-10-31 14:42:50 +08002292
Gilles Peskine449bd832023-01-11 14:50:10 +01002293 TEST_ASSERT(original.tls_version == restored.tls_version);
Ronald Cron7b1921a2023-11-23 12:31:56 +01002294 TEST_ASSERT(original.endpoint == restored.endpoint);
Gilles Peskine449bd832023-01-11 14:50:10 +01002295 TEST_ASSERT(original.ciphersuite == restored.ciphersuite);
Jerry Yuf0926292022-07-15 13:05:57 +08002296#if defined(MBEDTLS_SSL_PROTO_TLS1_2)
Gilles Peskine449bd832023-01-11 14:50:10 +01002297 if (tls_version == MBEDTLS_SSL_VERSION_TLS1_2) {
2298 TEST_ASSERT(original.id_len == restored.id_len);
2299 TEST_ASSERT(memcmp(original.id,
2300 restored.id, sizeof(original.id)) == 0);
2301 TEST_ASSERT(memcmp(original.master,
2302 restored.master, sizeof(original.master)) == 0);
Manuel Pégourié-Gonnardf9deaec2019-05-24 09:41:39 +02002303
Ronald Crone68ab4f2022-10-05 12:46:29 +02002304#if defined(MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED)
Manuel Pégourié-Gonnardee13a732019-07-29 13:00:39 +02002305#if defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
Gilles Peskine449bd832023-01-11 14:50:10 +01002306 TEST_ASSERT((original.peer_cert == NULL) ==
2307 (restored.peer_cert == NULL));
2308 if (original.peer_cert != NULL) {
2309 TEST_ASSERT(original.peer_cert->raw.len ==
2310 restored.peer_cert->raw.len);
2311 TEST_ASSERT(memcmp(original.peer_cert->raw.p,
2312 restored.peer_cert->raw.p,
2313 original.peer_cert->raw.len) == 0);
Jerry Yuf0926292022-07-15 13:05:57 +08002314 }
Manuel Pégourié-Gonnardee13a732019-07-29 13:00:39 +02002315#else /* MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
Gilles Peskine449bd832023-01-11 14:50:10 +01002316 TEST_ASSERT(original.peer_cert_digest_type ==
2317 restored.peer_cert_digest_type);
2318 TEST_ASSERT(original.peer_cert_digest_len ==
2319 restored.peer_cert_digest_len);
2320 TEST_ASSERT((original.peer_cert_digest == NULL) ==
2321 (restored.peer_cert_digest == NULL));
2322 if (original.peer_cert_digest != NULL) {
2323 TEST_ASSERT(memcmp(original.peer_cert_digest,
2324 restored.peer_cert_digest,
2325 original.peer_cert_digest_len) == 0);
Jerry Yuf0926292022-07-15 13:05:57 +08002326 }
Manuel Pégourié-Gonnardee13a732019-07-29 13:00:39 +02002327#endif /* MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
Ronald Crone68ab4f2022-10-05 12:46:29 +02002328#endif /* MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED */
Gilles Peskine449bd832023-01-11 14:50:10 +01002329 TEST_ASSERT(original.verify_result == restored.verify_result);
Manuel Pégourié-Gonnardf9deaec2019-05-24 09:41:39 +02002330
Jerry Yuf0926292022-07-15 13:05:57 +08002331#if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
Gilles Peskine449bd832023-01-11 14:50:10 +01002332 TEST_ASSERT(original.mfl_code == restored.mfl_code);
Jerry Yuf0926292022-07-15 13:05:57 +08002333#endif
2334
2335#if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
Gilles Peskine449bd832023-01-11 14:50:10 +01002336 TEST_ASSERT(original.encrypt_then_mac == restored.encrypt_then_mac);
Jerry Yuf0926292022-07-15 13:05:57 +08002337#endif
Jerry Yu6ac7c032022-07-21 23:11:55 +08002338#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_CLI_C)
Gilles Peskine449bd832023-01-11 14:50:10 +01002339 TEST_ASSERT(original.ticket_len == restored.ticket_len);
2340 if (original.ticket_len != 0) {
2341 TEST_ASSERT(original.ticket != NULL);
2342 TEST_ASSERT(restored.ticket != NULL);
2343 TEST_ASSERT(memcmp(original.ticket,
2344 restored.ticket, original.ticket_len) == 0);
Jerry Yu6ac7c032022-07-21 23:11:55 +08002345 }
Gilles Peskine449bd832023-01-11 14:50:10 +01002346 TEST_ASSERT(original.ticket_lifetime == restored.ticket_lifetime);
Jerry Yu6ac7c032022-07-21 23:11:55 +08002347#endif
Jerry Yuf0926292022-07-15 13:05:57 +08002348 }
Jerry Yu6ac7c032022-07-21 23:11:55 +08002349#endif /* MBEDTLS_SSL_PROTO_TLS1_2 */
2350
2351#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
Gilles Peskine449bd832023-01-11 14:50:10 +01002352 if (tls_version == MBEDTLS_SSL_VERSION_TLS1_3) {
Ronald Cron18b92a12024-03-26 10:15:08 +01002353#if defined(MBEDTLS_SSL_SESSION_TICKETS)
Gilles Peskine449bd832023-01-11 14:50:10 +01002354 TEST_ASSERT(original.ticket_age_add == restored.ticket_age_add);
2355 TEST_ASSERT(original.ticket_flags == restored.ticket_flags);
2356 TEST_ASSERT(original.resumption_key_len == restored.resumption_key_len);
2357 if (original.resumption_key_len != 0) {
2358 TEST_ASSERT(original.resumption_key != NULL);
2359 TEST_ASSERT(restored.resumption_key != NULL);
2360 TEST_ASSERT(memcmp(original.resumption_key,
2361 restored.resumption_key,
2362 original.resumption_key_len) == 0);
Jerry Yu6ac7c032022-07-21 23:11:55 +08002363 }
Ronald Cron18b92a12024-03-26 10:15:08 +01002364#endif /* MBEDTLS_SSL_SESSION_TICKETS */
Jerry Yu34e95162022-12-12 15:14:56 +08002365
Ronald Cron18b92a12024-03-26 10:15:08 +01002366#if defined(MBEDTLS_SSL_SRV_C)
Waleed Elmelegy2824a202024-02-23 17:51:47 +00002367 if (endpoint_type == MBEDTLS_SSL_IS_SERVER) {
Ronald Cron18b92a12024-03-26 10:15:08 +01002368#if defined(MBEDTLS_SSL_SESSION_TICKETS)
2369#if defined(MBEDTLS_SSL_EARLY_DATA) && defined(MBEDTLS_SSL_ALPN)
Waleed Elmelegy883f77c2024-03-06 19:09:41 +00002370 TEST_ASSERT(original.ticket_alpn != NULL);
2371 TEST_ASSERT(restored.ticket_alpn != NULL);
2372 TEST_MEMORY_COMPARE(original.ticket_alpn, strlen(original.ticket_alpn),
2373 restored.ticket_alpn, strlen(restored.ticket_alpn));
Ronald Cron18b92a12024-03-26 10:15:08 +01002374#endif
2375#endif /* MBEDTLS_SSL_SESSION_TICKETS */
Waleed Elmelegy2824a202024-02-23 17:51:47 +00002376 }
Ronald Cron18b92a12024-03-26 10:15:08 +01002377#endif /* MBEDTLS_SSL_SRV_C */
Jerry Yu34e95162022-12-12 15:14:56 +08002378
Ronald Cron18b92a12024-03-26 10:15:08 +01002379#if defined(MBEDTLS_SSL_CLI_C)
Gilles Peskine449bd832023-01-11 14:50:10 +01002380 if (endpoint_type == MBEDTLS_SSL_IS_CLIENT) {
Ronald Cron18b92a12024-03-26 10:15:08 +01002381#if defined(MBEDTLS_SSL_SESSION_TICKETS)
Jerry Yu6ac7c032022-07-21 23:11:55 +08002382#if defined(MBEDTLS_HAVE_TIME)
Jerry Yu342a5552023-11-10 14:23:39 +08002383 TEST_ASSERT(original.ticket_reception_time == restored.ticket_reception_time);
Manuel Pégourié-Gonnardf9deaec2019-05-24 09:41:39 +02002384#endif
Gilles Peskine449bd832023-01-11 14:50:10 +01002385 TEST_ASSERT(original.ticket_lifetime == restored.ticket_lifetime);
2386 TEST_ASSERT(original.ticket_len == restored.ticket_len);
2387 if (original.ticket_len != 0) {
2388 TEST_ASSERT(original.ticket != NULL);
2389 TEST_ASSERT(restored.ticket != NULL);
2390 TEST_ASSERT(memcmp(original.ticket,
2391 restored.ticket,
2392 original.ticket_len) == 0);
Jerry Yu6ac7c032022-07-21 23:11:55 +08002393 }
Ronald Cron8d15e012024-03-27 09:30:13 +01002394#if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION)
2395 TEST_ASSERT(original.hostname != NULL);
2396 TEST_ASSERT(restored.hostname != NULL);
2397 TEST_MEMORY_COMPARE(original.hostname, strlen(original.hostname),
2398 restored.hostname, strlen(restored.hostname));
2399#endif
Ronald Cron18b92a12024-03-26 10:15:08 +01002400#endif /* MBEDTLS_SSL_SESSION_TICKETS */
Jerry Yu6ac7c032022-07-21 23:11:55 +08002401 }
Ronald Cron18b92a12024-03-26 10:15:08 +01002402#endif /* MBEDTLS_SSL_CLI_C */
Jerry Yu6ac7c032022-07-21 23:11:55 +08002403 }
2404#endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
Manuel Pégourié-Gonnardf9deaec2019-05-24 09:41:39 +02002405
Ronald Cron18b92a12024-03-26 10:15:08 +01002406#if defined(MBEDTLS_SSL_EARLY_DATA)
2407 TEST_ASSERT(
2408 original.max_early_data_size == restored.max_early_data_size);
2409#endif
2410
Waleed Elmelegy049cd302023-12-20 17:28:31 +00002411#if defined(MBEDTLS_SSL_RECORD_SIZE_LIMIT)
2412 TEST_ASSERT(original.record_size_limit == restored.record_size_limit);
2413#endif
2414
Manuel Pégourié-Gonnardf9deaec2019-05-24 09:41:39 +02002415exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01002416 mbedtls_ssl_session_free(&original);
2417 mbedtls_ssl_session_free(&restored);
2418 mbedtls_free(buf);
Valerio Setti285dae82023-04-19 15:10:45 +02002419 USE_PSA_DONE();
Manuel Pégourié-Gonnardf9deaec2019-05-24 09:41:39 +02002420}
2421/* END_CASE */
2422
Manuel Pégourié-Gonnardaa755832019-06-03 10:53:47 +02002423/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +01002424void ssl_serialize_session_load_save(int ticket_len, char *crt_file,
2425 int endpoint_type, int tls_version)
Manuel Pégourié-Gonnard6eac11b2019-05-23 09:30:55 +02002426{
2427 mbedtls_ssl_session session;
2428 unsigned char *buf1 = NULL, *buf2 = NULL;
2429 size_t len0, len1, len2;
2430
2431 /*
2432 * Test that a load-save pair is the identity
2433 */
Gilles Peskine449bd832023-01-11 14:50:10 +01002434 mbedtls_ssl_session_init(&session);
valerio32f2ac92023-04-20 11:59:52 +02002435 USE_PSA_INIT();
Manuel Pégourié-Gonnard6eac11b2019-05-23 09:30:55 +02002436
Manuel Pégourié-Gonnard3caa6ca2019-05-23 10:06:14 +02002437 /* Prepare a dummy session to work on */
Jerry Yu28547c42023-10-31 14:42:50 +08002438 ((void) ticket_len);
2439 ((void) crt_file);
Jerry Yuaa5dc242023-11-20 18:07:54 +08002440
2441 switch (tls_version) {
Jerry Yua180f992022-07-15 12:52:54 +08002442#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
Jerry Yuaa5dc242023-11-20 18:07:54 +08002443 case MBEDTLS_SSL_VERSION_TLS1_3:
2444 TEST_ASSERT(mbedtls_test_ssl_tls13_populate_session(
2445 &session, 0, endpoint_type) == 0);
2446 break;
Jerry Yua180f992022-07-15 12:52:54 +08002447#endif
Jerry Yu28547c42023-10-31 14:42:50 +08002448
2449#if defined(MBEDTLS_SSL_PROTO_TLS1_2)
Jerry Yuaa5dc242023-11-20 18:07:54 +08002450 case MBEDTLS_SSL_VERSION_TLS1_2:
2451 TEST_ASSERT(mbedtls_test_ssl_tls12_populate_session(
Ronald Cron7b1921a2023-11-23 12:31:56 +01002452 &session, ticket_len, endpoint_type, crt_file) == 0);
Jerry Yuaa5dc242023-11-20 18:07:54 +08002453 break;
Jerry Yu28547c42023-10-31 14:42:50 +08002454#endif
Jerry Yuaa5dc242023-11-20 18:07:54 +08002455 default:
2456 /* should never happen */
2457 TEST_ASSERT(0);
2458 break;
2459 }
Manuel Pégourié-Gonnard3caa6ca2019-05-23 10:06:14 +02002460
Manuel Pégourié-Gonnard686adb42019-06-03 09:55:16 +02002461 /* Get desired buffer size for serializing */
Gilles Peskine449bd832023-01-11 14:50:10 +01002462 TEST_ASSERT(mbedtls_ssl_session_save(&session, NULL, 0, &len0)
2463 == MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL);
Manuel Pégourié-Gonnard6eac11b2019-05-23 09:30:55 +02002464
2465 /* Allocate first buffer */
Gilles Peskine449bd832023-01-11 14:50:10 +01002466 buf1 = mbedtls_calloc(1, len0);
2467 TEST_ASSERT(buf1 != NULL);
Manuel Pégourié-Gonnard6eac11b2019-05-23 09:30:55 +02002468
Manuel Pégourié-Gonnard686adb42019-06-03 09:55:16 +02002469 /* Serialize to buffer and free live session */
Gilles Peskine449bd832023-01-11 14:50:10 +01002470 TEST_ASSERT(mbedtls_ssl_session_save(&session, buf1, len0, &len1)
2471 == 0);
2472 TEST_ASSERT(len0 == len1);
2473 mbedtls_ssl_session_free(&session);
Manuel Pégourié-Gonnard6eac11b2019-05-23 09:30:55 +02002474
Manuel Pégourié-Gonnard686adb42019-06-03 09:55:16 +02002475 /* Restore session from serialized data */
Gilles Peskine449bd832023-01-11 14:50:10 +01002476 TEST_ASSERT(mbedtls_ssl_session_load(&session, buf1, len1) == 0);
Manuel Pégourié-Gonnard6eac11b2019-05-23 09:30:55 +02002477
Manuel Pégourié-Gonnard686adb42019-06-03 09:55:16 +02002478 /* Allocate second buffer and serialize to it */
Gilles Peskine449bd832023-01-11 14:50:10 +01002479 buf2 = mbedtls_calloc(1, len0);
2480 TEST_ASSERT(buf2 != NULL);
2481 TEST_ASSERT(mbedtls_ssl_session_save(&session, buf2, len0, &len2)
2482 == 0);
Manuel Pégourié-Gonnard6eac11b2019-05-23 09:30:55 +02002483
Manuel Pégourié-Gonnard686adb42019-06-03 09:55:16 +02002484 /* Make sure both serialized versions are identical */
Gilles Peskine449bd832023-01-11 14:50:10 +01002485 TEST_ASSERT(len1 == len2);
2486 TEST_ASSERT(memcmp(buf1, buf2, len1) == 0);
Manuel Pégourié-Gonnard6eac11b2019-05-23 09:30:55 +02002487
2488exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01002489 mbedtls_ssl_session_free(&session);
2490 mbedtls_free(buf1);
2491 mbedtls_free(buf2);
Valerio Setti285dae82023-04-19 15:10:45 +02002492 USE_PSA_DONE();
Manuel Pégourié-Gonnard6eac11b2019-05-23 09:30:55 +02002493}
2494/* END_CASE */
Manuel Pégourié-Gonnardf5fa0aa2019-05-23 10:38:11 +02002495
2496/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +01002497void ssl_serialize_session_save_buf_size(int ticket_len, char *crt_file,
2498 int endpoint_type, int tls_version)
Manuel Pégourié-Gonnardf5fa0aa2019-05-23 10:38:11 +02002499{
2500 mbedtls_ssl_session session;
2501 unsigned char *buf = NULL;
2502 size_t good_len, bad_len, test_len;
2503
2504 /*
2505 * Test that session_save() fails cleanly on small buffers
2506 */
Gilles Peskine449bd832023-01-11 14:50:10 +01002507 mbedtls_ssl_session_init(&session);
valerio32f2ac92023-04-20 11:59:52 +02002508 USE_PSA_INIT();
Manuel Pégourié-Gonnardf5fa0aa2019-05-23 10:38:11 +02002509
Manuel Pégourié-Gonnard686adb42019-06-03 09:55:16 +02002510 /* Prepare dummy session and get serialized size */
Jerry Yu28547c42023-10-31 14:42:50 +08002511 ((void) ticket_len);
2512 ((void) crt_file);
Jerry Yu28547c42023-10-31 14:42:50 +08002513
Jerry Yud84c14f2023-11-16 13:33:57 +08002514 switch (tls_version) {
2515#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
2516 case MBEDTLS_SSL_VERSION_TLS1_3:
2517 TEST_ASSERT(mbedtls_test_ssl_tls13_populate_session(
2518 &session, 0, endpoint_type) == 0);
2519 break;
Jerry Yu28547c42023-10-31 14:42:50 +08002520#endif
Jerry Yud84c14f2023-11-16 13:33:57 +08002521#if defined(MBEDTLS_SSL_PROTO_TLS1_2)
2522 case MBEDTLS_SSL_VERSION_TLS1_2:
2523 TEST_ASSERT(mbedtls_test_ssl_tls12_populate_session(
Ronald Cron7b1921a2023-11-23 12:31:56 +01002524 &session, ticket_len, endpoint_type, crt_file) == 0);
Jerry Yud84c14f2023-11-16 13:33:57 +08002525 break;
2526#endif
2527 default:
2528 /* should never happen */
2529 TEST_ASSERT(0);
2530 break;
2531 }
Jerry Yu28547c42023-10-31 14:42:50 +08002532
Gilles Peskine449bd832023-01-11 14:50:10 +01002533 TEST_ASSERT(mbedtls_ssl_session_save(&session, NULL, 0, &good_len)
2534 == MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL);
Manuel Pégourié-Gonnardf5fa0aa2019-05-23 10:38:11 +02002535
2536 /* Try all possible bad lengths */
Gilles Peskine449bd832023-01-11 14:50:10 +01002537 for (bad_len = 1; bad_len < good_len; bad_len++) {
Manuel Pégourié-Gonnardf5fa0aa2019-05-23 10:38:11 +02002538 /* Allocate exact size so that asan/valgrind can detect any overwrite */
Gilles Peskine449bd832023-01-11 14:50:10 +01002539 mbedtls_free(buf);
Gilles Peskined681ffd2023-10-17 17:31:50 +02002540 buf = NULL;
2541 TEST_CALLOC(buf, bad_len);
Gilles Peskine449bd832023-01-11 14:50:10 +01002542 TEST_ASSERT(mbedtls_ssl_session_save(&session, buf, bad_len,
2543 &test_len)
2544 == MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL);
2545 TEST_ASSERT(test_len == good_len);
Manuel Pégourié-Gonnardf5fa0aa2019-05-23 10:38:11 +02002546 }
2547
2548exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01002549 mbedtls_ssl_session_free(&session);
2550 mbedtls_free(buf);
Valerio Setti285dae82023-04-19 15:10:45 +02002551 USE_PSA_DONE();
Manuel Pégourié-Gonnardf5fa0aa2019-05-23 10:38:11 +02002552}
2553/* END_CASE */
Manuel Pégourié-Gonnarda3d831b2019-05-23 12:28:45 +02002554
2555/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +01002556void ssl_serialize_session_load_buf_size(int ticket_len, char *crt_file,
2557 int endpoint_type, int tls_version)
Manuel Pégourié-Gonnarda3d831b2019-05-23 12:28:45 +02002558{
2559 mbedtls_ssl_session session;
2560 unsigned char *good_buf = NULL, *bad_buf = NULL;
2561 size_t good_len, bad_len;
2562
2563 /*
2564 * Test that session_load() fails cleanly on small buffers
2565 */
Gilles Peskine449bd832023-01-11 14:50:10 +01002566 mbedtls_ssl_session_init(&session);
valerio32f2ac92023-04-20 11:59:52 +02002567 USE_PSA_INIT();
Manuel Pégourié-Gonnarda3d831b2019-05-23 12:28:45 +02002568
Manuel Pégourié-Gonnard686adb42019-06-03 09:55:16 +02002569 /* Prepare serialized session data */
Jerry Yu28547c42023-10-31 14:42:50 +08002570 ((void) ticket_len);
2571 ((void) crt_file);
Jerry Yu4ac648e2023-11-16 13:58:38 +08002572
2573 switch (tls_version) {
Jerry Yu6e8fec22022-07-15 10:37:02 +08002574#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
Jerry Yu4ac648e2023-11-16 13:58:38 +08002575 case MBEDTLS_SSL_VERSION_TLS1_3:
2576 TEST_ASSERT(mbedtls_test_ssl_tls13_populate_session(
2577 &session, 0, endpoint_type) == 0);
2578 break;
Jerry Yu6e8fec22022-07-15 10:37:02 +08002579#endif
Jerry Yu28547c42023-10-31 14:42:50 +08002580
2581#if defined(MBEDTLS_SSL_PROTO_TLS1_2)
Jerry Yu4ac648e2023-11-16 13:58:38 +08002582 case MBEDTLS_SSL_VERSION_TLS1_2:
2583 TEST_ASSERT(mbedtls_test_ssl_tls12_populate_session(
Ronald Cron7b1921a2023-11-23 12:31:56 +01002584 &session, ticket_len, endpoint_type, crt_file) == 0);
Jerry Yu4ac648e2023-11-16 13:58:38 +08002585 break;
Jerry Yu28547c42023-10-31 14:42:50 +08002586#endif
2587
Jerry Yu4ac648e2023-11-16 13:58:38 +08002588 default:
2589 /* should never happen */
2590 TEST_ASSERT(0);
2591 break;
2592 }
2593
Gilles Peskine449bd832023-01-11 14:50:10 +01002594 TEST_ASSERT(mbedtls_ssl_session_save(&session, NULL, 0, &good_len)
2595 == MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL);
Gilles Peskined681ffd2023-10-17 17:31:50 +02002596 TEST_CALLOC(good_buf, good_len);
Gilles Peskine449bd832023-01-11 14:50:10 +01002597 TEST_ASSERT(mbedtls_ssl_session_save(&session, good_buf, good_len,
2598 &good_len) == 0);
2599 mbedtls_ssl_session_free(&session);
Manuel Pégourié-Gonnarda3d831b2019-05-23 12:28:45 +02002600
2601 /* Try all possible bad lengths */
Gilles Peskine449bd832023-01-11 14:50:10 +01002602 for (bad_len = 0; bad_len < good_len; bad_len++) {
Manuel Pégourié-Gonnarda3d831b2019-05-23 12:28:45 +02002603 /* Allocate exact size so that asan/valgrind can detect any overread */
Gilles Peskine449bd832023-01-11 14:50:10 +01002604 mbedtls_free(bad_buf);
Gilles Peskined681ffd2023-10-17 17:31:50 +02002605 bad_buf = NULL;
2606 TEST_CALLOC_NONNULL(bad_buf, bad_len);
Gilles Peskine449bd832023-01-11 14:50:10 +01002607 memcpy(bad_buf, good_buf, bad_len);
Manuel Pégourié-Gonnarda3d831b2019-05-23 12:28:45 +02002608
Gilles Peskine449bd832023-01-11 14:50:10 +01002609 TEST_ASSERT(mbedtls_ssl_session_load(&session, bad_buf, bad_len)
2610 == MBEDTLS_ERR_SSL_BAD_INPUT_DATA);
Manuel Pégourié-Gonnarda3d831b2019-05-23 12:28:45 +02002611 }
2612
2613exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01002614 mbedtls_ssl_session_free(&session);
2615 mbedtls_free(good_buf);
2616 mbedtls_free(bad_buf);
Valerio Setti285dae82023-04-19 15:10:45 +02002617 USE_PSA_DONE();
Manuel Pégourié-Gonnarda3d831b2019-05-23 12:28:45 +02002618}
2619/* END_CASE */
Hanno Becker861d0bb2019-05-21 16:39:30 +01002620
Hanno Becker363b6462019-05-29 12:44:28 +01002621/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +01002622void ssl_session_serialize_version_check(int corrupt_major,
2623 int corrupt_minor,
2624 int corrupt_patch,
2625 int corrupt_config,
2626 int endpoint_type,
2627 int tls_version)
Hanno Becker861d0bb2019-05-21 16:39:30 +01002628{
Gilles Peskine449bd832023-01-11 14:50:10 +01002629 unsigned char serialized_session[2048];
Hanno Becker363b6462019-05-29 12:44:28 +01002630 size_t serialized_session_len;
Hanno Beckerfe1275e2019-05-29 12:45:21 +01002631 unsigned cur_byte;
Hanno Becker861d0bb2019-05-21 16:39:30 +01002632 mbedtls_ssl_session session;
Hanno Beckerfe1275e2019-05-29 12:45:21 +01002633 uint8_t should_corrupt_byte[] = { corrupt_major == 1,
2634 corrupt_minor == 1,
2635 corrupt_patch == 1,
2636 corrupt_config == 1,
2637 corrupt_config == 1 };
2638
Gilles Peskine449bd832023-01-11 14:50:10 +01002639 mbedtls_ssl_session_init(&session);
valerio32f2ac92023-04-20 11:59:52 +02002640 USE_PSA_INIT();
Jerry Yu534ff402022-07-14 16:43:43 +08002641
Jerry Yud84c14f2023-11-16 13:33:57 +08002642 switch (tls_version) {
2643#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
2644 case MBEDTLS_SSL_VERSION_TLS1_3:
2645 TEST_ASSERT(mbedtls_test_ssl_tls13_populate_session(
2646 &session, 0, endpoint_type) == 0);
2647 break;
Jerry Yu28547c42023-10-31 14:42:50 +08002648#endif
Jerry Yud84c14f2023-11-16 13:33:57 +08002649#if defined(MBEDTLS_SSL_PROTO_TLS1_2)
2650 case MBEDTLS_SSL_VERSION_TLS1_2:
2651 TEST_ASSERT(mbedtls_test_ssl_tls12_populate_session(
Ronald Cron7b1921a2023-11-23 12:31:56 +01002652 &session, 0, endpoint_type, NULL) == 0);
Jerry Yu4ac648e2023-11-16 13:58:38 +08002653
Jerry Yud84c14f2023-11-16 13:33:57 +08002654 break;
2655#endif
2656 default:
2657 /* should never happen */
2658 TEST_ASSERT(0);
2659 break;
2660 }
Hanno Becker861d0bb2019-05-21 16:39:30 +01002661
Hanno Beckerfe1275e2019-05-29 12:45:21 +01002662 /* Infer length of serialized session. */
Gilles Peskine449bd832023-01-11 14:50:10 +01002663 TEST_ASSERT(mbedtls_ssl_session_save(&session,
2664 serialized_session,
2665 sizeof(serialized_session),
2666 &serialized_session_len) == 0);
Hanno Becker861d0bb2019-05-21 16:39:30 +01002667
Gilles Peskine449bd832023-01-11 14:50:10 +01002668 mbedtls_ssl_session_free(&session);
Hanno Becker861d0bb2019-05-21 16:39:30 +01002669
Hanno Beckerfe1275e2019-05-29 12:45:21 +01002670 /* Without any modification, we should be able to successfully
Hanno Becker363b6462019-05-29 12:44:28 +01002671 * de-serialize the session - double-check that. */
Gilles Peskine449bd832023-01-11 14:50:10 +01002672 TEST_ASSERT(mbedtls_ssl_session_load(&session,
2673 serialized_session,
2674 serialized_session_len) == 0);
2675 mbedtls_ssl_session_free(&session);
Hanno Becker861d0bb2019-05-21 16:39:30 +01002676
Hanno Beckerfe1275e2019-05-29 12:45:21 +01002677 /* Go through the bytes in the serialized session header and
2678 * corrupt them bit-by-bit. */
Gilles Peskine449bd832023-01-11 14:50:10 +01002679 for (cur_byte = 0; cur_byte < sizeof(should_corrupt_byte); cur_byte++) {
Hanno Beckerfe1275e2019-05-29 12:45:21 +01002680 int cur_bit;
BensonLioubedd2512024-03-13 20:21:26 +08002681 unsigned char *const byte = &serialized_session[cur_byte];
Hanno Beckerfe1275e2019-05-29 12:45:21 +01002682
Gilles Peskine449bd832023-01-11 14:50:10 +01002683 if (should_corrupt_byte[cur_byte] == 0) {
Hanno Beckerfe1275e2019-05-29 12:45:21 +01002684 continue;
Gilles Peskine449bd832023-01-11 14:50:10 +01002685 }
Hanno Beckerfe1275e2019-05-29 12:45:21 +01002686
Gilles Peskine449bd832023-01-11 14:50:10 +01002687 for (cur_bit = 0; cur_bit < CHAR_BIT; cur_bit++) {
Hanno Beckerfe1275e2019-05-29 12:45:21 +01002688 unsigned char const corrupted_bit = 0x1u << cur_bit;
2689 /* Modify a single bit in the serialized session. */
2690 *byte ^= corrupted_bit;
2691
2692 /* Attempt to deserialize */
Gilles Peskine449bd832023-01-11 14:50:10 +01002693 TEST_ASSERT(mbedtls_ssl_session_load(&session,
2694 serialized_session,
2695 serialized_session_len) ==
2696 MBEDTLS_ERR_SSL_VERSION_MISMATCH);
Hanno Beckerfe1275e2019-05-29 12:45:21 +01002697
2698 /* Undo the change */
2699 *byte ^= corrupted_bit;
2700 }
Hanno Becker861d0bb2019-05-21 16:39:30 +01002701 }
valerio32f2ac92023-04-20 11:59:52 +02002702exit:
Valerio Setti285dae82023-04-19 15:10:45 +02002703 USE_PSA_DONE();
Hanno Becker861d0bb2019-05-21 16:39:30 +01002704}
2705/* END_CASE */
Piotr Nowicki2a1f1782020-01-13 09:42:10 +01002706
Minos Galanakis411cb6c2024-03-04 17:33:52 +00002707/* BEGIN_CASE */
2708void ssl_session_id_accessors_check(int tls_version)
2709{
2710 mbedtls_ssl_session session;
2711 int ciphersuite_id;
2712 const mbedtls_ssl_ciphersuite_t *ciphersuite_info;
2713
2714 mbedtls_ssl_session_init(&session);
2715 USE_PSA_INIT();
2716
2717 switch (tls_version) {
2718#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
2719 case MBEDTLS_SSL_VERSION_TLS1_3:
2720 ciphersuite_id = MBEDTLS_TLS1_3_AES_128_GCM_SHA256;
2721 TEST_ASSERT(mbedtls_test_ssl_tls13_populate_session(
2722 &session, 0, MBEDTLS_SSL_IS_SERVER) == 0);
2723 break;
2724#endif
2725#if defined(MBEDTLS_SSL_PROTO_TLS1_2)
2726 case MBEDTLS_SSL_VERSION_TLS1_2:
2727 ciphersuite_id = MBEDTLS_TLS_PSK_WITH_AES_128_GCM_SHA256;
2728 TEST_ASSERT(mbedtls_test_ssl_tls12_populate_session(
2729 &session, 0, MBEDTLS_SSL_IS_SERVER, NULL) == 0);
2730
2731 break;
2732#endif
2733 default:
2734 /* should never happen */
2735 TEST_ASSERT(0);
2736 break;
2737 }
2738 TEST_ASSERT(*mbedtls_ssl_session_get_id(&session) == session.id);
2739 TEST_ASSERT(mbedtls_ssl_session_get_id_len(&session) == session.id_len);
2740 /* mbedtls_test_ssl_tls1x_populate_session sets a mock suite-id of 0xabcd */
2741 TEST_ASSERT(mbedtls_ssl_session_get_ciphersuite_id(&session) == 0xabcd);
2742
2743 /* Test setting a reference id for tls1.3 and tls1.2 */
2744 ciphersuite_info = mbedtls_ssl_ciphersuite_from_id(ciphersuite_id);
2745 if (ciphersuite_info != NULL) {
2746 TEST_ASSERT(mbedtls_ssl_ciphersuite_get_id(ciphersuite_info) == ciphersuite_id);
2747 }
2748
2749exit:
2750 mbedtls_ssl_session_free(&session);
2751 USE_PSA_DONE();
2752}
2753/* END_CASE */
2754
Elena Uziunaite6b4cd482024-07-04 17:50:11 +01002755/* BEGIN_CASE depends_on:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED:MBEDTLS_RSA_C:PSA_WANT_ECC_SECP_R1_384:!MBEDTLS_SSL_PROTO_TLS1_3:MBEDTLS_PKCS1_V15:PSA_WANT_ALG_SHA_256 */
Gilles Peskine449bd832023-01-11 14:50:10 +01002756void mbedtls_endpoint_sanity(int endpoint_type)
Piotr Nowicki2a1f1782020-01-13 09:42:10 +01002757{
2758 enum { BUFFSIZE = 1024 };
Yanray Wang9ef0dce2022-10-25 16:44:13 +08002759 mbedtls_test_ssl_endpoint ep;
Piotr Nowicki2a1f1782020-01-13 09:42:10 +01002760 int ret = -1;
Yanray Wang9ef0dce2022-10-25 16:44:13 +08002761 mbedtls_test_handshake_test_options options;
Yanray Wangf7b62352022-10-26 11:51:53 +08002762 mbedtls_test_init_handshake_options(&options);
Andrzej Kurek780dc182022-06-10 08:57:19 -04002763 options.pk_alg = MBEDTLS_PK_RSA;
Piotr Nowicki2a1f1782020-01-13 09:42:10 +01002764
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01002765 MD_OR_USE_PSA_INIT();
2766
Yanray Wangf7b62352022-10-26 11:51:53 +08002767 ret = mbedtls_test_ssl_endpoint_init(NULL, endpoint_type, &options,
Ronald Cronfb536472024-01-26 14:55:25 +01002768 NULL, NULL, NULL);
Gilles Peskine449bd832023-01-11 14:50:10 +01002769 TEST_ASSERT(MBEDTLS_ERR_SSL_BAD_INPUT_DATA == ret);
Piotr Nowicki2a1f1782020-01-13 09:42:10 +01002770
Yanray Wangbd296832022-10-26 18:28:11 +08002771 ret = mbedtls_test_ssl_endpoint_certificate_init(NULL, options.pk_alg,
2772 0, 0, 0);
Gilles Peskine449bd832023-01-11 14:50:10 +01002773 TEST_ASSERT(MBEDTLS_ERR_SSL_BAD_INPUT_DATA == ret);
Piotr Nowicki2a1f1782020-01-13 09:42:10 +01002774
Yanray Wangf7b62352022-10-26 11:51:53 +08002775 ret = mbedtls_test_ssl_endpoint_init(&ep, endpoint_type, &options,
Ronald Cronfb536472024-01-26 14:55:25 +01002776 NULL, NULL, NULL);
Gilles Peskine449bd832023-01-11 14:50:10 +01002777 TEST_ASSERT(ret == 0);
Piotr Nowicki2a1f1782020-01-13 09:42:10 +01002778
2779exit:
Yanray Wangf7b62352022-10-26 11:51:53 +08002780 mbedtls_test_ssl_endpoint_free(&ep, NULL);
2781 mbedtls_test_free_handshake_options(&options);
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01002782 MD_OR_USE_PSA_DONE();
Piotr Nowicki2a1f1782020-01-13 09:42:10 +01002783}
2784/* END_CASE */
2785
Elena Uziunaite6b4cd482024-07-04 17:50:11 +01002786/* BEGIN_CASE depends_on:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED:MBEDTLS_RSA_C:PSA_WANT_ECC_SECP_R1_384:MBEDTLS_PKCS1_V15:PSA_WANT_ALG_SHA_256:PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY */
Ronald Cron43263c02023-03-09 16:48:10 +01002787void move_handshake_to_state(int endpoint_type, int tls_version, int state, int need_pass)
Piotr Nowicki2a1f1782020-01-13 09:42:10 +01002788{
2789 enum { BUFFSIZE = 1024 };
Yanray Wang9ef0dce2022-10-25 16:44:13 +08002790 mbedtls_test_ssl_endpoint base_ep, second_ep;
Piotr Nowicki2a1f1782020-01-13 09:42:10 +01002791 int ret = -1;
Ronald Cron43263c02023-03-09 16:48:10 +01002792 (void) tls_version;
2793
Yanray Wang9ef0dce2022-10-25 16:44:13 +08002794 mbedtls_test_handshake_test_options options;
Yanray Wangf7b62352022-10-26 11:51:53 +08002795 mbedtls_test_init_handshake_options(&options);
Ronald Cron43263c02023-03-09 16:48:10 +01002796
Andrzej Kurek780dc182022-06-10 08:57:19 -04002797 options.pk_alg = MBEDTLS_PK_RSA;
Piotr Nowicki2a1f1782020-01-13 09:42:10 +01002798
Ronald Cron43263c02023-03-09 16:48:10 +01002799 /*
Ronald Cron097ba142023-03-08 16:18:00 +01002800 * If both TLS 1.2 and 1.3 are enabled and we want to do a TLS 1.2
2801 * handshake, force the TLS 1.2 version on endpoint under test.
Ronald Cron43263c02023-03-09 16:48:10 +01002802 */
2803#if defined(MBEDTLS_SSL_PROTO_TLS1_3) && defined(MBEDTLS_SSL_PROTO_TLS1_2)
Ronald Cron097ba142023-03-08 16:18:00 +01002804 if (MBEDTLS_SSL_VERSION_TLS1_2 == tls_version) {
2805 if (MBEDTLS_SSL_IS_CLIENT == endpoint_type) {
2806 options.client_min_version = MBEDTLS_SSL_VERSION_TLS1_2;
2807 options.client_max_version = MBEDTLS_SSL_VERSION_TLS1_2;
2808 } else {
2809 options.server_min_version = MBEDTLS_SSL_VERSION_TLS1_2;
2810 options.server_max_version = MBEDTLS_SSL_VERSION_TLS1_2;
2811 }
Ronald Cron43263c02023-03-09 16:48:10 +01002812 }
2813#endif
2814
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01002815 MD_OR_USE_PSA_INIT();
Gilles Peskine449bd832023-01-11 14:50:10 +01002816 mbedtls_platform_zeroize(&base_ep, sizeof(base_ep));
2817 mbedtls_platform_zeroize(&second_ep, sizeof(second_ep));
Neil Armstrong06baf042022-04-14 16:21:15 +02002818
Yanray Wangf7b62352022-10-26 11:51:53 +08002819 ret = mbedtls_test_ssl_endpoint_init(&base_ep, endpoint_type, &options,
Ronald Cronfb536472024-01-26 14:55:25 +01002820 NULL, NULL, NULL);
Gilles Peskine449bd832023-01-11 14:50:10 +01002821 TEST_ASSERT(ret == 0);
Piotr Nowicki2a1f1782020-01-13 09:42:10 +01002822
Yanray Wangbd296832022-10-26 18:28:11 +08002823 ret = mbedtls_test_ssl_endpoint_init(
2824 &second_ep,
2825 (endpoint_type == MBEDTLS_SSL_IS_SERVER) ?
2826 MBEDTLS_SSL_IS_CLIENT : MBEDTLS_SSL_IS_SERVER,
Ronald Cronfb536472024-01-26 14:55:25 +01002827 &options, NULL, NULL, NULL);
Andrzej Kurek780dc182022-06-10 08:57:19 -04002828
Gilles Peskine449bd832023-01-11 14:50:10 +01002829 TEST_ASSERT(ret == 0);
Piotr Nowicki2a1f1782020-01-13 09:42:10 +01002830
Yanray Wangf7b62352022-10-26 11:51:53 +08002831 ret = mbedtls_test_mock_socket_connect(&(base_ep.socket),
2832 &(second_ep.socket),
2833 BUFFSIZE);
Gilles Peskine449bd832023-01-11 14:50:10 +01002834 TEST_ASSERT(ret == 0);
Piotr Nowicki2a1f1782020-01-13 09:42:10 +01002835
Yanray Wangf7b62352022-10-26 11:51:53 +08002836 ret = mbedtls_test_move_handshake_to_state(&(base_ep.ssl),
2837 &(second_ep.ssl),
2838 state);
Gilles Peskine449bd832023-01-11 14:50:10 +01002839 if (need_pass) {
2840 TEST_ASSERT(ret == 0 ||
2841 ret == MBEDTLS_ERR_SSL_WANT_READ ||
2842 ret == MBEDTLS_ERR_SSL_WANT_WRITE);
2843 TEST_ASSERT(base_ep.ssl.state == state);
2844 } else {
2845 TEST_ASSERT(ret != 0 &&
2846 ret != MBEDTLS_ERR_SSL_WANT_READ &&
2847 ret != MBEDTLS_ERR_SSL_WANT_WRITE);
2848 TEST_ASSERT(base_ep.ssl.state != state);
Piotr Nowicki2a1f1782020-01-13 09:42:10 +01002849 }
2850
2851exit:
Yanray Wangf7b62352022-10-26 11:51:53 +08002852 mbedtls_test_free_handshake_options(&options);
2853 mbedtls_test_ssl_endpoint_free(&base_ep, NULL);
2854 mbedtls_test_ssl_endpoint_free(&second_ep, NULL);
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01002855 MD_OR_USE_PSA_DONE();
Piotr Nowicki2a1f1782020-01-13 09:42:10 +01002856}
2857/* END_CASE */
Andrzej Kurekf40daa32020-02-04 09:00:01 -05002858
Elena Uziunaite6b4cd482024-07-04 17:50:11 +01002859/* BEGIN_CASE depends_on:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED:MBEDTLS_PKCS1_V15:MBEDTLS_RSA_C:PSA_WANT_ECC_SECP_R1_384:PSA_WANT_ALG_SHA_256:PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY:MBEDTLS_CAN_HANDLE_RSA_TEST_KEY */
Gilles Peskine449bd832023-01-11 14:50:10 +01002860void handshake_version(int dtls, int client_min_version, int client_max_version,
2861 int server_min_version, int server_max_version,
2862 int expected_negotiated_version)
Andrzej Kurekf40daa32020-02-04 09:00:01 -05002863{
Yanray Wang9ef0dce2022-10-25 16:44:13 +08002864 mbedtls_test_handshake_test_options options;
Yanray Wangf7b62352022-10-26 11:51:53 +08002865 mbedtls_test_init_handshake_options(&options);
Andrzej Kurekda2b6782020-02-12 07:56:36 -05002866
Paul Elliottc8570442020-04-15 17:00:50 +01002867 options.client_min_version = client_min_version;
2868 options.client_max_version = client_max_version;
2869 options.server_min_version = server_min_version;
2870 options.server_max_version = server_max_version;
Paul Elliottc8570442020-04-15 17:00:50 +01002871 options.expected_negotiated_version = expected_negotiated_version;
2872
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05002873 options.dtls = dtls;
Yanray Wangf7b62352022-10-26 11:51:53 +08002874 mbedtls_test_ssl_perform_handshake(&options);
Andrzej Kurekf40daa32020-02-04 09:00:01 -05002875
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05002876 /* The goto below is used to avoid an "unused label" warning.*/
2877 goto exit;
Andrzej Kureke11acb22022-06-27 06:11:34 -04002878
2879exit:
Yanray Wangf7b62352022-10-26 11:51:53 +08002880 mbedtls_test_free_handshake_options(&options);
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05002881}
2882/* END_CASE */
Andrzej Kurek9e9efdc2020-02-26 05:25:23 -05002883
Elena Uziunaite0916cd72024-05-23 17:01:07 +01002884/* BEGIN_CASE depends_on:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED:MBEDTLS_PKCS1_V15:MBEDTLS_SSL_PROTO_TLS1_2:PSA_WANT_ALG_SHA_256 */
Gilles Peskine449bd832023-01-11 14:50:10 +01002885void handshake_psk_cipher(char *cipher, int pk_alg, data_t *psk_str, int dtls)
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05002886{
Yanray Wang9ef0dce2022-10-25 16:44:13 +08002887 mbedtls_test_handshake_test_options options;
Yanray Wangf7b62352022-10-26 11:51:53 +08002888 mbedtls_test_init_handshake_options(&options);
Andrzej Kurekf40daa32020-02-04 09:00:01 -05002889
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05002890 options.cipher = cipher;
2891 options.dtls = dtls;
2892 options.psk_str = psk_str;
2893 options.pk_alg = pk_alg;
Andrzej Kurekcc5169c2020-02-04 09:04:56 -05002894
Ronald Cron097ba142023-03-08 16:18:00 +01002895 options.client_min_version = MBEDTLS_SSL_VERSION_TLS1_2;
2896 options.client_max_version = MBEDTLS_SSL_VERSION_TLS1_2;
2897 options.expected_negotiated_version = MBEDTLS_SSL_VERSION_TLS1_2;
2898
Yanray Wangf7b62352022-10-26 11:51:53 +08002899 mbedtls_test_ssl_perform_handshake(&options);
Andrzej Kurek316da1f2020-02-26 09:03:47 -05002900
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05002901 /* The goto below is used to avoid an "unused label" warning.*/
2902 goto exit;
Andrzej Kureke11acb22022-06-27 06:11:34 -04002903
Andrzej Kurekddb8cd62022-07-04 16:07:28 -04002904exit:
Yanray Wangf7b62352022-10-26 11:51:53 +08002905 mbedtls_test_free_handshake_options(&options);
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05002906}
2907/* END_CASE */
Andrzej Kurek316da1f2020-02-26 09:03:47 -05002908
Elena Uziunaite0916cd72024-05-23 17:01:07 +01002909/* BEGIN_CASE depends_on:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED:MBEDTLS_PKCS1_V15:MBEDTLS_SSL_PROTO_TLS1_2:PSA_WANT_ALG_SHA_256 */
Gilles Peskine449bd832023-01-11 14:50:10 +01002910void handshake_cipher(char *cipher, int pk_alg, int dtls)
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05002911{
Gilles Peskine449bd832023-01-11 14:50:10 +01002912 test_handshake_psk_cipher(cipher, pk_alg, NULL, dtls);
Andrzej Kurekf40daa32020-02-04 09:00:01 -05002913
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05002914 /* The goto below is used to avoid an "unused label" warning.*/
2915 goto exit;
2916}
2917/* END_CASE */
Andrzej Kurekf40daa32020-02-04 09:00:01 -05002918
Elena Uziunaite0916cd72024-05-23 17:01:07 +01002919/* BEGIN_CASE depends_on:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED:MBEDTLS_PKCS1_V15:MBEDTLS_SSL_PROTO_TLS1_2:PSA_WANT_ALG_SHA_256 */
Gilles Peskine449bd832023-01-11 14:50:10 +01002920void handshake_ciphersuite_select(char *cipher, int pk_alg, data_t *psk_str,
2921 int psa_alg, int psa_alg2, int psa_usage,
2922 int expected_handshake_result,
2923 int expected_ciphersuite)
Neil Armstrong8c52ed82022-05-27 13:14:55 +02002924{
Yanray Wang9ef0dce2022-10-25 16:44:13 +08002925 mbedtls_test_handshake_test_options options;
Yanray Wangf7b62352022-10-26 11:51:53 +08002926 mbedtls_test_init_handshake_options(&options);
Neil Armstrong8c52ed82022-05-27 13:14:55 +02002927
2928 options.cipher = cipher;
Neil Armstrongdb134972022-06-30 09:06:28 +02002929 options.psk_str = psk_str;
Neil Armstrong8c52ed82022-05-27 13:14:55 +02002930 options.pk_alg = pk_alg;
2931 options.opaque_alg = psa_alg;
2932 options.opaque_alg2 = psa_alg2;
2933 options.opaque_usage = psa_usage;
2934 options.expected_handshake_result = expected_handshake_result;
2935 options.expected_ciphersuite = expected_ciphersuite;
Ronald Cron097ba142023-03-08 16:18:00 +01002936
2937 options.server_min_version = MBEDTLS_SSL_VERSION_TLS1_2;
2938 options.server_max_version = MBEDTLS_SSL_VERSION_TLS1_2;
2939 options.expected_negotiated_version = MBEDTLS_SSL_VERSION_TLS1_2;
2940
Yanray Wangf7b62352022-10-26 11:51:53 +08002941 mbedtls_test_ssl_perform_handshake(&options);
Neil Armstrong8c52ed82022-05-27 13:14:55 +02002942
2943 /* The goto below is used to avoid an "unused label" warning.*/
2944 goto exit;
Andrzej Kurekddb8cd62022-07-04 16:07:28 -04002945
2946exit:
Yanray Wangf7b62352022-10-26 11:51:53 +08002947 mbedtls_test_free_handshake_options(&options);
Neil Armstrong8c52ed82022-05-27 13:14:55 +02002948}
2949/* END_CASE */
2950
Elena Uziunaite6b4cd482024-07-04 17:50:11 +01002951/* BEGIN_CASE depends_on:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED:MBEDTLS_PKCS1_V15:MBEDTLS_RSA_C:PSA_WANT_ECC_SECP_R1_384:PSA_WANT_ALG_SHA_256 */
Gilles Peskine449bd832023-01-11 14:50:10 +01002952void app_data(int mfl, int cli_msg_len, int srv_msg_len,
2953 int expected_cli_fragments,
2954 int expected_srv_fragments, int dtls)
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05002955{
Yanray Wang9ef0dce2022-10-25 16:44:13 +08002956 mbedtls_test_handshake_test_options options;
Yanray Wangf7b62352022-10-26 11:51:53 +08002957 mbedtls_test_init_handshake_options(&options);
Andrzej Kurekda2b6782020-02-12 07:56:36 -05002958
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05002959 options.mfl = mfl;
2960 options.cli_msg_len = cli_msg_len;
2961 options.srv_msg_len = srv_msg_len;
2962 options.expected_cli_fragments = expected_cli_fragments;
2963 options.expected_srv_fragments = expected_srv_fragments;
2964 options.dtls = dtls;
Ronald Cron097ba142023-03-08 16:18:00 +01002965
2966 options.client_min_version = MBEDTLS_SSL_VERSION_TLS1_2;
2967 options.client_max_version = MBEDTLS_SSL_VERSION_TLS1_2;
2968 options.expected_negotiated_version = MBEDTLS_SSL_VERSION_TLS1_2;
Andrzej Kurekda2b6782020-02-12 07:56:36 -05002969
Yanray Wangf7b62352022-10-26 11:51:53 +08002970 mbedtls_test_ssl_perform_handshake(&options);
Andrzej Kurek780dc182022-06-10 08:57:19 -04002971
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05002972 /* The goto below is used to avoid an "unused label" warning.*/
2973 goto exit;
Andrzej Kurek780dc182022-06-10 08:57:19 -04002974
2975exit:
Yanray Wangf7b62352022-10-26 11:51:53 +08002976 mbedtls_test_free_handshake_options(&options);
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05002977}
2978/* END_CASE */
Andrzej Kurekda2b6782020-02-12 07:56:36 -05002979
Elena Uziunaite6b4cd482024-07-04 17:50:11 +01002980/* BEGIN_CASE depends_on:MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED:MBEDTLS_PKCS1_V15:MBEDTLS_RSA_C:PSA_WANT_ECC_SECP_R1_384:PSA_WANT_ALG_SHA_256:PSA_WANT_KEY_TYPE_ECC_PUBLIC_KEY:MBEDTLS_CAN_HANDLE_RSA_TEST_KEY */
Gilles Peskine449bd832023-01-11 14:50:10 +01002981void app_data_tls(int mfl, int cli_msg_len, int srv_msg_len,
2982 int expected_cli_fragments,
2983 int expected_srv_fragments)
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05002984{
Gilles Peskine449bd832023-01-11 14:50:10 +01002985 test_app_data(mfl, cli_msg_len, srv_msg_len, expected_cli_fragments,
2986 expected_srv_fragments, 0);
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05002987 /* The goto below is used to avoid an "unused label" warning.*/
2988 goto exit;
2989}
2990/* END_CASE */
Andrzej Kurekda2b6782020-02-12 07:56:36 -05002991
Elena Uziunaite6b4cd482024-07-04 17:50:11 +01002992/* BEGIN_CASE depends_on:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED:!MBEDTLS_SSL_PROTO_TLS1_3:MBEDTLS_PKCS1_V15:MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_RSA_C:PSA_WANT_ECC_SECP_R1_384:MBEDTLS_SSL_PROTO_DTLS:PSA_WANT_ALG_SHA_256:MBEDTLS_CAN_HANDLE_RSA_TEST_KEY */
Gilles Peskine449bd832023-01-11 14:50:10 +01002993void app_data_dtls(int mfl, int cli_msg_len, int srv_msg_len,
2994 int expected_cli_fragments,
2995 int expected_srv_fragments)
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05002996{
Gilles Peskine449bd832023-01-11 14:50:10 +01002997 test_app_data(mfl, cli_msg_len, srv_msg_len, expected_cli_fragments,
2998 expected_srv_fragments, 1);
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05002999 /* The goto below is used to avoid an "unused label" warning.*/
3000 goto exit;
3001}
3002/* END_CASE */
Andrzej Kurekda2b6782020-02-12 07:56:36 -05003003
Valerio Setti1494a092025-01-30 16:45:45 +01003004/* BEGIN_CASE depends_on:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED:MBEDTLS_PKCS1_V15:MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_RSA_C:PSA_WANT_ECC_SECP_R1_384:MBEDTLS_SSL_PROTO_DTLS:MBEDTLS_SSL_RENEGOTIATION:MBEDTLS_SSL_CONTEXT_SERIALIZATION:PSA_WANT_ALG_SHA_256:MBEDTLS_CAN_HANDLE_RSA_TEST_KEY:TEST_GCM_OR_CHACHAPOLY_ENABLED */
Gilles Peskine449bd832023-01-11 14:50:10 +01003005void handshake_serialization()
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05003006{
Yanray Wang9ef0dce2022-10-25 16:44:13 +08003007 mbedtls_test_handshake_test_options options;
Yanray Wangf7b62352022-10-26 11:51:53 +08003008 mbedtls_test_init_handshake_options(&options);
Andrzej Kurekda2b6782020-02-12 07:56:36 -05003009
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05003010 options.serialize = 1;
3011 options.dtls = 1;
Ronald Cron097ba142023-03-08 16:18:00 +01003012 options.expected_negotiated_version = MBEDTLS_SSL_VERSION_TLS1_2;
Yanray Wangf7b62352022-10-26 11:51:53 +08003013 mbedtls_test_ssl_perform_handshake(&options);
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05003014 /* The goto below is used to avoid an "unused label" warning.*/
3015 goto exit;
Andrzej Kurek6e518ab2022-06-11 05:08:38 -04003016exit:
Yanray Wangf7b62352022-10-26 11:51:53 +08003017 mbedtls_test_free_handshake_options(&options);
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05003018}
3019/* END_CASE */
Andrzej Kurekda2b6782020-02-12 07:56:36 -05003020
Valerio Settib8ef2a42025-01-20 11:07:09 +01003021/* BEGIN_CASE depends_on:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED:!MBEDTLS_SSL_PROTO_TLS1_3:MBEDTLS_PKCS1_V15:MBEDTLS_RSA_C:PSA_WANT_KEY_TYPE_AES:PSA_WANT_ECC_SECP_R1_384:MBEDTLS_DEBUG_C:MBEDTLS_SSL_MAX_FRAGMENT_LENGTH:PSA_WANT_ALG_CBC_NO_PADDING:PSA_WANT_ALG_SHA_384:MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED */
Gilles Peskine449bd832023-01-11 14:50:10 +01003022void handshake_fragmentation(int mfl,
3023 int expected_srv_hs_fragmentation,
3024 int expected_cli_hs_fragmentation)
Piotr Nowickibde7ee82020-02-21 10:59:50 +01003025{
Yanray Wang9ef0dce2022-10-25 16:44:13 +08003026 mbedtls_test_handshake_test_options options;
3027 mbedtls_test_ssl_log_pattern srv_pattern, cli_pattern;
Piotr Nowickibde7ee82020-02-21 10:59:50 +01003028
3029 srv_pattern.pattern = cli_pattern.pattern = "found fragmented DTLS handshake";
3030 srv_pattern.counter = 0;
3031 cli_pattern.counter = 0;
3032
Yanray Wangf7b62352022-10-26 11:51:53 +08003033 mbedtls_test_init_handshake_options(&options);
Piotr Nowickibde7ee82020-02-21 10:59:50 +01003034 options.dtls = 1;
Ronald Cron097ba142023-03-08 16:18:00 +01003035 options.expected_negotiated_version = MBEDTLS_SSL_VERSION_TLS1_2;
Piotr Nowickibde7ee82020-02-21 10:59:50 +01003036 options.mfl = mfl;
Darryl Greenaad82f92019-12-02 10:53:11 +00003037 /* Set cipher to one using CBC so that record splitting can be tested */
Valerio Settib8ef2a42025-01-20 11:07:09 +01003038 options.cipher = "TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA384";
Piotr Nowickibde7ee82020-02-21 10:59:50 +01003039 options.srv_auth_mode = MBEDTLS_SSL_VERIFY_REQUIRED;
3040 options.srv_log_obj = &srv_pattern;
3041 options.cli_log_obj = &cli_pattern;
Yanray Wangf7b62352022-10-26 11:51:53 +08003042 options.srv_log_fun = mbedtls_test_ssl_log_analyzer;
3043 options.cli_log_fun = mbedtls_test_ssl_log_analyzer;
Piotr Nowickibde7ee82020-02-21 10:59:50 +01003044
Yanray Wangf7b62352022-10-26 11:51:53 +08003045 mbedtls_test_ssl_perform_handshake(&options);
Piotr Nowickibde7ee82020-02-21 10:59:50 +01003046
3047 /* Test if the server received a fragmented handshake */
Gilles Peskine449bd832023-01-11 14:50:10 +01003048 if (expected_srv_hs_fragmentation) {
3049 TEST_ASSERT(srv_pattern.counter >= 1);
Piotr Nowickibde7ee82020-02-21 10:59:50 +01003050 }
3051 /* Test if the client received a fragmented handshake */
Gilles Peskine449bd832023-01-11 14:50:10 +01003052 if (expected_cli_hs_fragmentation) {
3053 TEST_ASSERT(cli_pattern.counter >= 1);
Piotr Nowickibde7ee82020-02-21 10:59:50 +01003054 }
Andrzej Kurek780dc182022-06-10 08:57:19 -04003055
3056exit:
Yanray Wangf7b62352022-10-26 11:51:53 +08003057 mbedtls_test_free_handshake_options(&options);
Piotr Nowickibde7ee82020-02-21 10:59:50 +01003058}
3059/* END_CASE */
3060
Gilles Peskine07426722025-03-07 23:01:42 +01003061/* This test case doesn't actually depend on certificates,
3062 * but our helper code for mbedtls_test_ssl_endpoint does. */
3063/* BEGIN_CASE depends_on:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED */
Gilles Peskine92122ed2025-03-07 20:40:50 +01003064void recombine_server_first_flight(int version,
3065 int instruction, int param,
3066 char *client_log, char *server_log,
3067 int goal_state, int expected_ret)
3068{
3069 enum { BUFFSIZE = 17000 };
Gilles Peskine7ab9fb62025-03-07 22:26:36 +01003070 mbedtls_test_ssl_endpoint client;
3071 memset(&client, 0, sizeof(client));
3072 mbedtls_test_ssl_endpoint server;
3073 memset(&server, 0, sizeof(server));
Gilles Peskine92122ed2025-03-07 20:40:50 +01003074 mbedtls_test_handshake_test_options client_options;
3075 mbedtls_test_init_handshake_options(&client_options);
3076 mbedtls_test_handshake_test_options server_options;
3077 mbedtls_test_init_handshake_options(&server_options);
3078#if defined(MBEDTLS_DEBUG_C)
3079 mbedtls_test_ssl_log_pattern cli_pattern = { .pattern = client_log };
3080 mbedtls_test_ssl_log_pattern srv_pattern = { .pattern = server_log };
Gilles Peskinec34ea472025-03-07 23:04:23 +01003081#else
3082 (void) client_log;
3083 (void) server_log;
Gilles Peskine92122ed2025-03-07 20:40:50 +01003084#endif
3085 int ret = 0;
3086
3087 MD_OR_USE_PSA_INIT();
3088#if defined(MBEDTLS_DEBUG_C)
3089 mbedtls_debug_set_threshold(3);
3090#endif
3091
3092 client_options.client_min_version = version;
3093 client_options.client_max_version = version;
3094#if defined(MBEDTLS_DEBUG_C)
3095 client_options.cli_log_obj = &cli_pattern;
3096 client_options.cli_log_fun = mbedtls_test_ssl_log_analyzer;
Gilles Peskine92122ed2025-03-07 20:40:50 +01003097#endif
3098 TEST_EQUAL(mbedtls_test_ssl_endpoint_init(&client, MBEDTLS_SSL_IS_CLIENT,
3099 &client_options, NULL, NULL,
3100 NULL), 0);
3101#if defined(MBEDTLS_DEBUG_C)
3102 mbedtls_ssl_conf_dbg(&client.conf, client_options.cli_log_fun,
3103 client_options.cli_log_obj);
3104#endif
3105
3106 server_options.server_min_version = version;
3107 server_options.server_max_version = version;
3108#if defined(MBEDTLS_DEBUG_C)
3109 server_options.srv_log_obj = &srv_pattern;
3110 server_options.srv_log_fun = mbedtls_test_ssl_log_analyzer;
Gilles Peskine92122ed2025-03-07 20:40:50 +01003111#endif
3112 TEST_EQUAL(mbedtls_test_ssl_endpoint_init(&server, MBEDTLS_SSL_IS_SERVER,
3113 &server_options, NULL, NULL,
3114 NULL), 0);
3115#if defined(MBEDTLS_DEBUG_C)
3116 mbedtls_ssl_conf_dbg(&server.conf, server_options.srv_log_fun,
3117 server_options.srv_log_obj);
3118#endif
3119
3120 TEST_EQUAL(mbedtls_test_mock_socket_connect(&client.socket,
3121 &server.socket,
3122 BUFFSIZE), 0);
3123
3124 /* Client: emit the first flight from the client */
3125 while (ret == 0) {
3126 mbedtls_test_set_step(client.ssl.state);
3127 ret = mbedtls_ssl_handshake_step(&client.ssl);
3128 }
3129 TEST_EQUAL(ret, MBEDTLS_ERR_SSL_WANT_READ);
3130 ret = 0;
3131 TEST_EQUAL(client.ssl.state, MBEDTLS_SSL_SERVER_HELLO);
3132
3133 /* Server: parse the first flight from the client
3134 * and emit the first flight from the server */
3135 while (ret == 0) {
3136 mbedtls_test_set_step(1000 + server.ssl.state);
3137 ret = mbedtls_ssl_handshake_step(&server.ssl);
3138 }
3139 TEST_EQUAL(ret, MBEDTLS_ERR_SSL_WANT_READ);
3140 ret = 0;
3141 TEST_EQUAL(server.ssl.state, MBEDTLS_SSL_SERVER_HELLO_DONE + 1);
3142
3143 /* Recombine the first flight from the server */
3144 TEST_ASSERT(recombine_records(&server, instruction, param));
3145
3146 /* Client: parse the first flight from the server
3147 * and emit the second flight from the client */
3148 while (ret == 0 && !mbedtls_ssl_is_handshake_over(&client.ssl)) {
3149 mbedtls_test_set_step(client.ssl.state);
3150 ret = mbedtls_ssl_handshake_step(&client.ssl);
3151 if (client.ssl.state == goal_state && ret != 0) {
3152 TEST_EQUAL(ret, expected_ret);
3153 goto goal_reached;
3154 }
3155 }
3156#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
3157 if (version >= MBEDTLS_SSL_VERSION_TLS1_3 &&
3158 goal_state >= MBEDTLS_SSL_HANDSHAKE_OVER) {
3159 TEST_EQUAL(ret, 0);
3160 } else
3161#endif
3162 {
3163 TEST_EQUAL(ret, MBEDTLS_ERR_SSL_WANT_READ);
3164 }
3165 ret = 0;
3166
3167 /* Server: parse the first flight from the client
3168 * and emit the second flight from the server */
3169 while (ret == 0 && !mbedtls_ssl_is_handshake_over(&server.ssl)) {
3170 mbedtls_test_set_step(1000 + server.ssl.state);
3171 ret = mbedtls_ssl_handshake_step(&server.ssl);
3172 }
3173 TEST_EQUAL(ret, 0);
3174
3175 /* Client: parse the second flight from the server */
3176 while (ret == 0 && !mbedtls_ssl_is_handshake_over(&client.ssl)) {
3177 mbedtls_test_set_step(client.ssl.state);
3178 ret = mbedtls_ssl_handshake_step(&client.ssl);
3179 }
3180 if (client.ssl.state == goal_state) {
3181 TEST_EQUAL(ret, expected_ret);
3182 } else {
3183 TEST_EQUAL(ret, 0);
3184 }
3185
3186goal_reached:
3187#if defined(MBEDTLS_DEBUG_C)
3188 TEST_ASSERT(cli_pattern.counter >= 1);
3189 TEST_ASSERT(srv_pattern.counter >= 1);
3190#endif
3191
3192exit:
3193 mbedtls_test_ssl_endpoint_free(&client, NULL);
3194 mbedtls_test_ssl_endpoint_free(&server, NULL);
3195 mbedtls_test_free_handshake_options(&client_options);
3196 mbedtls_test_free_handshake_options(&server_options);
3197 MD_OR_USE_PSA_DONE();
3198#if defined(MBEDTLS_DEBUG_C)
3199 mbedtls_debug_set_threshold(0);
3200#endif
3201}
3202/* END_CASE */
3203
Elena Uziunaite6b4cd482024-07-04 17:50:11 +01003204/* BEGIN_CASE depends_on:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED:!MBEDTLS_SSL_PROTO_TLS1_3:MBEDTLS_PKCS1_V15:MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_RSA_C:PSA_WANT_ECC_SECP_R1_384:MBEDTLS_SSL_PROTO_DTLS:MBEDTLS_SSL_RENEGOTIATION:PSA_WANT_ALG_SHA_256:MBEDTLS_CAN_HANDLE_RSA_TEST_KEY */
Gilles Peskine449bd832023-01-11 14:50:10 +01003205void renegotiation(int legacy_renegotiation)
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05003206{
Yanray Wang9ef0dce2022-10-25 16:44:13 +08003207 mbedtls_test_handshake_test_options options;
Yanray Wangf7b62352022-10-26 11:51:53 +08003208 mbedtls_test_init_handshake_options(&options);
Andrzej Kurekda2b6782020-02-12 07:56:36 -05003209
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05003210 options.renegotiate = 1;
3211 options.legacy_renegotiation = legacy_renegotiation;
3212 options.dtls = 1;
Ronald Cron097ba142023-03-08 16:18:00 +01003213 options.expected_negotiated_version = MBEDTLS_SSL_VERSION_TLS1_2;
Andrzej Kurek316da1f2020-02-26 09:03:47 -05003214
Yanray Wangf7b62352022-10-26 11:51:53 +08003215 mbedtls_test_ssl_perform_handshake(&options);
Andrzej Kurek780dc182022-06-10 08:57:19 -04003216
Andrzej Kurek8a6ff152020-02-26 09:10:14 -05003217 /* The goto below is used to avoid an "unused label" warning.*/
3218 goto exit;
Andrzej Kurekddb8cd62022-07-04 16:07:28 -04003219exit:
Yanray Wangf7b62352022-10-26 11:51:53 +08003220 mbedtls_test_free_handshake_options(&options);
Andrzej Kurekf40daa32020-02-04 09:00:01 -05003221}
3222/* END_CASE */
Andrzej Kurek0afa2a12020-03-03 10:39:58 -05003223
Gabor Mezei9ee58e42025-03-10 22:31:35 +01003224/* BEGIN_CASE depends_on:MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED:MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH:MBEDTLS_SSL_CONTEXT_SERIALIZATION:MBEDTLS_SSL_PROTO_TLS1_2:PSA_WANT_ECC_SECP_R1_384:MBEDTLS_SSL_PROTO_DTLS:PSA_WANT_ALG_SHA_256:MBEDTLS_TEST_HAS_AEAD_ALG */
Gilles Peskine449bd832023-01-11 14:50:10 +01003225void resize_buffers_serialize_mfl(int mfl)
Andrzej Kurek0afa2a12020-03-03 10:39:58 -05003226{
Gabor Mezei14950932025-03-06 16:06:42 +01003227 /* Choose an AEAD ciphersuite */
3228 const int *ciphersuites = mbedtls_ssl_list_ciphersuites();
3229 const mbedtls_ssl_ciphersuite_t *ciphersuite = NULL;
3230 int i = 0;
3231 while (ciphersuites[i] != 0) {
3232 ciphersuite = mbedtls_ssl_ciphersuite_from_id(ciphersuites[i]);
3233
3234 if (ciphersuite->min_tls_version == MBEDTLS_SSL_VERSION_TLS1_2) {
3235 const mbedtls_ssl_mode_t mode =
3236#if defined(MBEDTLS_SSL_SOME_SUITES_USE_CBC_ETM)
3237 mbedtls_ssl_get_mode_from_ciphersuite(0, ciphersuite);
3238#else
3239 mbedtls_ssl_get_mode_from_ciphersuite(ciphersuite);
3240#endif
Gabor Mezei8829aa32025-03-07 13:21:37 +01003241 if (mode == MBEDTLS_SSL_MODE_AEAD) {
Gabor Mezei14950932025-03-06 16:06:42 +01003242 break;
Gabor Mezei8829aa32025-03-07 13:21:37 +01003243 }
Gabor Mezei14950932025-03-06 16:06:42 +01003244 }
3245
3246 i++;
3247 }
3248
3249 TEST_ASSERT(ciphersuite != NULL);
3250
Gabor Mezei5ba9b572025-03-20 09:17:05 +01003251 resize_buffers(mfl, 0, MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION, 1, 1,
3252 (char *) ciphersuite->name);
Andrzej Kurek0afa2a12020-03-03 10:39:58 -05003253}
3254/* END_CASE */
3255
Gabor Mezei9ee58e42025-03-10 22:31:35 +01003256/* BEGIN_CASE depends_on:MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED:MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH:MBEDTLS_SSL_RENEGOTIATION:MBEDTLS_SSL_PROTO_TLS1_2:PSA_WANT_ECC_SECP_R1_384:PSA_WANT_ALG_SHA_256 */
Gilles Peskine449bd832023-01-11 14:50:10 +01003257void resize_buffers_renegotiate_mfl(int mfl, int legacy_renegotiation,
3258 char *cipher)
Andrzej Kurek0afa2a12020-03-03 10:39:58 -05003259{
Gabor Mezei5ba9b572025-03-20 09:17:05 +01003260 resize_buffers(mfl, 1, legacy_renegotiation, 0, 1, cipher);
Andrzej Kurek0afa2a12020-03-03 10:39:58 -05003261 /* The goto below is used to avoid an "unused label" warning.*/
3262 goto exit;
3263}
3264/* END_CASE */
Manuel Pégourié-Gonnard045f0942020-07-02 11:34:02 +02003265
Ronald Cron73fe8df2022-10-05 14:31:43 +02003266/* BEGIN_CASE depends_on:MBEDTLS_SSL_HANDSHAKE_WITH_PSK_ENABLED */
Hanno Becker6667ffd2021-04-19 21:59:22 +01003267void test_multiple_psks()
3268{
3269 unsigned char psk0[10] = { 0 };
3270 unsigned char psk0_identity[] = { 'f', 'o', 'o' };
3271
3272 unsigned char psk1[10] = { 0 };
3273 unsigned char psk1_identity[] = { 'b', 'a', 'r' };
3274
3275 mbedtls_ssl_config conf;
3276
Gilles Peskine449bd832023-01-11 14:50:10 +01003277 mbedtls_ssl_config_init(&conf);
valerio32f2ac92023-04-20 11:59:52 +02003278 MD_OR_USE_PSA_INIT();
Hanno Becker6667ffd2021-04-19 21:59:22 +01003279
Gilles Peskine449bd832023-01-11 14:50:10 +01003280 TEST_ASSERT(mbedtls_ssl_conf_psk(&conf,
3281 psk0, sizeof(psk0),
3282 psk0_identity, sizeof(psk0_identity)) == 0);
3283 TEST_ASSERT(mbedtls_ssl_conf_psk(&conf,
3284 psk1, sizeof(psk1),
3285 psk1_identity, sizeof(psk1_identity)) ==
3286 MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE);
Hanno Becker6667ffd2021-04-19 21:59:22 +01003287
3288exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01003289 mbedtls_ssl_config_free(&conf);
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01003290 MD_OR_USE_PSA_DONE();
Hanno Becker6667ffd2021-04-19 21:59:22 +01003291}
3292/* END_CASE */
3293
Ronald Cron73fe8df2022-10-05 14:31:43 +02003294/* BEGIN_CASE depends_on:MBEDTLS_SSL_HANDSHAKE_WITH_PSK_ENABLED:MBEDTLS_USE_PSA_CRYPTO */
Gilles Peskine449bd832023-01-11 14:50:10 +01003295void test_multiple_psks_opaque(int mode)
Hanno Becker6667ffd2021-04-19 21:59:22 +01003296{
3297 /*
3298 * Mode 0: Raw PSK, then opaque PSK
3299 * Mode 1: Opaque PSK, then raw PSK
3300 * Mode 2: 2x opaque PSK
3301 */
3302
3303 unsigned char psk0_raw[10] = { 0 };
3304 unsigned char psk0_raw_identity[] = { 'f', 'o', 'o' };
3305
Gilles Peskine449bd832023-01-11 14:50:10 +01003306 mbedtls_svc_key_id_t psk0_opaque = mbedtls_svc_key_id_make(0x1, (psa_key_id_t) 1);
Andrzej Kurek03e01462022-01-03 12:53:24 +01003307
Hanno Becker6667ffd2021-04-19 21:59:22 +01003308 unsigned char psk0_opaque_identity[] = { 'f', 'o', 'o' };
3309
3310 unsigned char psk1_raw[10] = { 0 };
3311 unsigned char psk1_raw_identity[] = { 'b', 'a', 'r' };
3312
Gilles Peskine449bd832023-01-11 14:50:10 +01003313 mbedtls_svc_key_id_t psk1_opaque = mbedtls_svc_key_id_make(0x1, (psa_key_id_t) 2);
Andrzej Kurek03e01462022-01-03 12:53:24 +01003314
Hanno Becker6667ffd2021-04-19 21:59:22 +01003315 unsigned char psk1_opaque_identity[] = { 'b', 'a', 'r' };
3316
3317 mbedtls_ssl_config conf;
3318
Gilles Peskine449bd832023-01-11 14:50:10 +01003319 mbedtls_ssl_config_init(&conf);
valerio32f2ac92023-04-20 11:59:52 +02003320 MD_OR_USE_PSA_INIT();
Hanno Becker6667ffd2021-04-19 21:59:22 +01003321
Gilles Peskine449bd832023-01-11 14:50:10 +01003322 switch (mode) {
Hanno Becker6667ffd2021-04-19 21:59:22 +01003323 case 0:
3324
Gilles Peskine449bd832023-01-11 14:50:10 +01003325 TEST_ASSERT(mbedtls_ssl_conf_psk(&conf,
3326 psk0_raw, sizeof(psk0_raw),
3327 psk0_raw_identity, sizeof(psk0_raw_identity))
3328 == 0);
3329 TEST_ASSERT(mbedtls_ssl_conf_psk_opaque(&conf,
3330 psk1_opaque,
3331 psk1_opaque_identity,
3332 sizeof(psk1_opaque_identity))
3333 == MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE);
Hanno Becker6667ffd2021-04-19 21:59:22 +01003334 break;
3335
3336 case 1:
3337
Gilles Peskine449bd832023-01-11 14:50:10 +01003338 TEST_ASSERT(mbedtls_ssl_conf_psk_opaque(&conf,
3339 psk0_opaque,
3340 psk0_opaque_identity,
3341 sizeof(psk0_opaque_identity))
3342 == 0);
3343 TEST_ASSERT(mbedtls_ssl_conf_psk(&conf,
3344 psk1_raw, sizeof(psk1_raw),
3345 psk1_raw_identity, sizeof(psk1_raw_identity))
3346 == MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE);
Hanno Becker6667ffd2021-04-19 21:59:22 +01003347
3348 break;
3349
3350 case 2:
3351
Gilles Peskine449bd832023-01-11 14:50:10 +01003352 TEST_ASSERT(mbedtls_ssl_conf_psk_opaque(&conf,
3353 psk0_opaque,
3354 psk0_opaque_identity,
3355 sizeof(psk0_opaque_identity))
3356 == 0);
3357 TEST_ASSERT(mbedtls_ssl_conf_psk_opaque(&conf,
3358 psk1_opaque,
3359 psk1_opaque_identity,
3360 sizeof(psk1_opaque_identity))
3361 == MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE);
Hanno Becker6667ffd2021-04-19 21:59:22 +01003362
3363 break;
3364
3365 default:
Gilles Peskine449bd832023-01-11 14:50:10 +01003366 TEST_ASSERT(0);
Hanno Becker6667ffd2021-04-19 21:59:22 +01003367 break;
3368 }
3369
3370exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01003371 mbedtls_ssl_config_free(&conf);
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01003372 MD_OR_USE_PSA_DONE();
Hanno Becker6667ffd2021-04-19 21:59:22 +01003373
3374}
3375/* END_CASE */
Brett Warren7f813d52021-10-20 23:08:38 +01003376
Ronald Cron37bdaab2022-03-30 16:45:51 +02003377/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +01003378void conf_version(int endpoint, int transport,
3379 int min_tls_version, int max_tls_version,
3380 int expected_ssl_setup_result)
Ronald Cron37bdaab2022-03-30 16:45:51 +02003381{
3382 mbedtls_ssl_config conf;
3383 mbedtls_ssl_context ssl;
3384
Gilles Peskine449bd832023-01-11 14:50:10 +01003385 mbedtls_ssl_config_init(&conf);
3386 mbedtls_ssl_init(&ssl);
valerio32f2ac92023-04-20 11:59:52 +02003387 MD_OR_USE_PSA_INIT();
Ronald Cron37bdaab2022-03-30 16:45:51 +02003388
Gilles Peskine449bd832023-01-11 14:50:10 +01003389 mbedtls_ssl_conf_endpoint(&conf, endpoint);
3390 mbedtls_ssl_conf_transport(&conf, transport);
3391 mbedtls_ssl_conf_min_tls_version(&conf, min_tls_version);
3392 mbedtls_ssl_conf_max_tls_version(&conf, max_tls_version);
Ronald Cron37bdaab2022-03-30 16:45:51 +02003393
Gilles Peskine449bd832023-01-11 14:50:10 +01003394 TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == expected_ssl_setup_result);
Pengyu Lvdb614332023-07-10 10:56:54 +08003395 TEST_EQUAL(mbedtls_ssl_conf_get_endpoint(
3396 mbedtls_ssl_context_get_config(&ssl)), endpoint);
Ronald Cron37bdaab2022-03-30 16:45:51 +02003397
Gilles Peskine449bd832023-01-11 14:50:10 +01003398 mbedtls_ssl_free(&ssl);
3399 mbedtls_ssl_config_free(&conf);
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01003400
3401exit:
3402 MD_OR_USE_PSA_DONE();
Ronald Cron37bdaab2022-03-30 16:45:51 +02003403}
3404/* END_CASE */
3405
Manuel Pégourié-Gonnard4c3134a2025-01-14 12:25:52 +01003406/* BEGIN_CASE */
Brett Warren7f813d52021-10-20 23:08:38 +01003407void conf_group()
3408{
3409 uint16_t iana_tls_group_list[] = { MBEDTLS_SSL_IANA_TLS_GROUP_SECP192R1,
Gilles Peskine449bd832023-01-11 14:50:10 +01003410 MBEDTLS_SSL_IANA_TLS_GROUP_SECP224R1,
3411 MBEDTLS_SSL_IANA_TLS_GROUP_SECP256R1,
3412 MBEDTLS_SSL_IANA_TLS_GROUP_NONE };
Brett Warren7f813d52021-10-20 23:08:38 +01003413
3414 mbedtls_ssl_config conf;
Gilles Peskine449bd832023-01-11 14:50:10 +01003415 mbedtls_ssl_config_init(&conf);
Brett Warren7f813d52021-10-20 23:08:38 +01003416
Manuel Pégourié-Gonnardc4e768a2025-01-22 10:04:43 +01003417 mbedtls_ssl_config_defaults(&conf, MBEDTLS_SSL_IS_CLIENT,
3418 MBEDTLS_SSL_TRANSPORT_STREAM,
3419 MBEDTLS_SSL_PRESET_DEFAULT);
Brett Warren7f813d52021-10-20 23:08:38 +01003420
Gilles Peskine449bd832023-01-11 14:50:10 +01003421 mbedtls_ssl_conf_groups(&conf, iana_tls_group_list);
Brett Warren7f813d52021-10-20 23:08:38 +01003422
3423 mbedtls_ssl_context ssl;
Gilles Peskine449bd832023-01-11 14:50:10 +01003424 mbedtls_ssl_init(&ssl);
valerio32f2ac92023-04-20 11:59:52 +02003425 MD_OR_USE_PSA_INIT();
3426
Gilles Peskine449bd832023-01-11 14:50:10 +01003427 TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
Brett Warren7f813d52021-10-20 23:08:38 +01003428
Gilles Peskine449bd832023-01-11 14:50:10 +01003429 TEST_ASSERT(ssl.conf != NULL && ssl.conf->group_list != NULL);
Brett Warren7f813d52021-10-20 23:08:38 +01003430
Yanray Wangd577a682022-10-27 11:47:54 +08003431 TEST_EQUAL(ssl.conf->
3432 group_list[ARRAY_LENGTH(iana_tls_group_list) - 1],
Gilles Peskine449bd832023-01-11 14:50:10 +01003433 MBEDTLS_SSL_IANA_TLS_GROUP_NONE);
Brett Warren7f813d52021-10-20 23:08:38 +01003434
Gilles Peskine449bd832023-01-11 14:50:10 +01003435 for (size_t i = 0; i < ARRAY_LENGTH(iana_tls_group_list); i++) {
3436 TEST_EQUAL(iana_tls_group_list[i], ssl.conf->group_list[i]);
3437 }
Brett Warren7f813d52021-10-20 23:08:38 +01003438
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01003439exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01003440 mbedtls_ssl_free(&ssl);
3441 mbedtls_ssl_config_free(&conf);
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01003442 MD_OR_USE_PSA_DONE();
Brett Warren7f813d52021-10-20 23:08:38 +01003443}
3444/* END_CASE */
Paul Elliottb9af2db2022-03-09 15:34:37 +00003445
Elena Uziunaite6b4cd482024-07-04 17:50:11 +01003446/* BEGIN_CASE depends_on:MBEDTLS_SSL_SRV_C:MBEDTLS_SSL_CACHE_C:!MBEDTLS_SSL_PROTO_TLS1_3:MBEDTLS_DEBUG_C:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED:MBEDTLS_RSA_C:PSA_WANT_ECC_SECP_R1_384:MBEDTLS_PKCS1_V15:PSA_WANT_ALG_SHA_256 */
Gilles Peskine449bd832023-01-11 14:50:10 +01003447void force_bad_session_id_len()
Andrzej Kurek514683a2022-06-10 10:33:05 -04003448{
3449 enum { BUFFSIZE = 1024 };
Yanray Wang9ef0dce2022-10-25 16:44:13 +08003450 mbedtls_test_handshake_test_options options;
3451 mbedtls_test_ssl_endpoint client, server;
3452 mbedtls_test_ssl_log_pattern srv_pattern, cli_pattern;
Andrzej Kurek514683a2022-06-10 10:33:05 -04003453 mbedtls_test_message_socket_context server_context, client_context;
3454
3455 srv_pattern.pattern = cli_pattern.pattern = "cache did not store session";
3456 srv_pattern.counter = 0;
Yanray Wangf7b62352022-10-26 11:51:53 +08003457 mbedtls_test_init_handshake_options(&options);
Andrzej Kurek514683a2022-06-10 10:33:05 -04003458
3459 options.srv_log_obj = &srv_pattern;
Yanray Wangf7b62352022-10-26 11:51:53 +08003460 options.srv_log_fun = mbedtls_test_ssl_log_analyzer;
Andrzej Kurek514683a2022-06-10 10:33:05 -04003461
Gilles Peskine449bd832023-01-11 14:50:10 +01003462 mbedtls_platform_zeroize(&client, sizeof(client));
3463 mbedtls_platform_zeroize(&server, sizeof(server));
Andrzej Kurek514683a2022-06-10 10:33:05 -04003464
Yanray Wangf7b62352022-10-26 11:51:53 +08003465 mbedtls_test_message_socket_init(&server_context);
3466 mbedtls_test_message_socket_init(&client_context);
Valerio Setti00a256f2023-04-27 17:22:27 +02003467 MD_OR_USE_PSA_INIT();
Andrzej Kurek514683a2022-06-10 10:33:05 -04003468
Yanray Wangf7b62352022-10-26 11:51:53 +08003469 TEST_ASSERT(mbedtls_test_ssl_endpoint_init(&client, MBEDTLS_SSL_IS_CLIENT,
3470 &options, NULL, NULL,
Ronald Cronfb536472024-01-26 14:55:25 +01003471 NULL) == 0);
Andrzej Kurek514683a2022-06-10 10:33:05 -04003472
Yanray Wangf7b62352022-10-26 11:51:53 +08003473 TEST_ASSERT(mbedtls_test_ssl_endpoint_init(&server, MBEDTLS_SSL_IS_SERVER,
Ronald Cronfb536472024-01-26 14:55:25 +01003474 &options, NULL, NULL, NULL) == 0);
Andrzej Kurek514683a2022-06-10 10:33:05 -04003475
Gilles Peskine449bd832023-01-11 14:50:10 +01003476 mbedtls_debug_set_threshold(1);
3477 mbedtls_ssl_conf_dbg(&server.conf, options.srv_log_fun,
3478 options.srv_log_obj);
Andrzej Kurek514683a2022-06-10 10:33:05 -04003479
Yanray Wangf7b62352022-10-26 11:51:53 +08003480 TEST_ASSERT(mbedtls_test_mock_socket_connect(&(client.socket),
3481 &(server.socket),
3482 BUFFSIZE) == 0);
Andrzej Kurek514683a2022-06-10 10:33:05 -04003483
Yanray Wangbd296832022-10-26 18:28:11 +08003484 TEST_ASSERT(mbedtls_test_move_handshake_to_state(
3485 &(client.ssl), &(server.ssl), MBEDTLS_SSL_HANDSHAKE_WRAPUP)
Gilles Peskine449bd832023-01-11 14:50:10 +01003486 == 0);
Andrzej Kurek514683a2022-06-10 10:33:05 -04003487 /* Force a bad session_id_len that will be read by the server in
3488 * mbedtls_ssl_cache_set. */
3489 server.ssl.session_negotiate->id_len = 33;
Gilles Peskine449bd832023-01-11 14:50:10 +01003490 if (options.cli_msg_len != 0 || options.srv_msg_len != 0) {
Andrzej Kurek514683a2022-06-10 10:33:05 -04003491 /* Start data exchanging test */
Yanray Wangb088bfc2023-03-16 12:15:49 +08003492 TEST_ASSERT(mbedtls_test_ssl_exchange_data(
3493 &(client.ssl), options.cli_msg_len,
3494 options.expected_cli_fragments,
3495 &(server.ssl), options.srv_msg_len,
3496 options.expected_srv_fragments)
Gilles Peskine449bd832023-01-11 14:50:10 +01003497 == 0);
Andrzej Kurek514683a2022-06-10 10:33:05 -04003498 }
Andrzej Kurek514683a2022-06-10 10:33:05 -04003499
3500 /* Make sure that the cache did not store the session */
Gilles Peskine449bd832023-01-11 14:50:10 +01003501 TEST_EQUAL(srv_pattern.counter, 1);
Andrzej Kurek514683a2022-06-10 10:33:05 -04003502exit:
Yanray Wangf7b62352022-10-26 11:51:53 +08003503 mbedtls_test_ssl_endpoint_free(&client, NULL);
3504 mbedtls_test_ssl_endpoint_free(&server, NULL);
3505 mbedtls_test_free_handshake_options(&options);
Gilles Peskine449bd832023-01-11 14:50:10 +01003506 mbedtls_debug_set_threshold(0);
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01003507 MD_OR_USE_PSA_DONE();
Andrzej Kurek514683a2022-06-10 10:33:05 -04003508}
3509/* END_CASE */
3510
Andrzej Kureked4d2172022-06-08 11:57:57 -04003511/* BEGIN_CASE depends_on:MBEDTLS_SSL_SRV_C:MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE:MBEDTLS_TEST_HOOKS */
Gilles Peskine449bd832023-01-11 14:50:10 +01003512void cookie_parsing(data_t *cookie, int exp_ret)
Andrzej Kurekcfb01942022-06-06 13:08:23 -04003513{
3514 mbedtls_ssl_context ssl;
3515 mbedtls_ssl_config conf;
3516 size_t len;
3517
Gilles Peskine449bd832023-01-11 14:50:10 +01003518 mbedtls_ssl_init(&ssl);
3519 mbedtls_ssl_config_init(&conf);
valerio32f2ac92023-04-20 11:59:52 +02003520 USE_PSA_INIT();
3521
Gilles Peskine449bd832023-01-11 14:50:10 +01003522 TEST_EQUAL(mbedtls_ssl_config_defaults(&conf, MBEDTLS_SSL_IS_SERVER,
3523 MBEDTLS_SSL_TRANSPORT_DATAGRAM,
3524 MBEDTLS_SSL_PRESET_DEFAULT),
3525 0);
Andrzej Kurekcfb01942022-06-06 13:08:23 -04003526
Gilles Peskine449bd832023-01-11 14:50:10 +01003527 TEST_EQUAL(mbedtls_ssl_setup(&ssl, &conf), 0);
3528 TEST_EQUAL(mbedtls_ssl_check_dtls_clihlo_cookie(&ssl, ssl.cli_id,
3529 ssl.cli_id_len,
3530 cookie->x, cookie->len,
3531 ssl.out_buf,
3532 MBEDTLS_SSL_OUT_CONTENT_LEN,
3533 &len),
3534 exp_ret);
Andrzej Kurekcfb01942022-06-06 13:08:23 -04003535
valerio32f2ac92023-04-20 11:59:52 +02003536exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01003537 mbedtls_ssl_free(&ssl);
3538 mbedtls_ssl_config_free(&conf);
Valerio Setti285dae82023-04-19 15:10:45 +02003539 USE_PSA_DONE();
Andrzej Kurekcfb01942022-06-06 13:08:23 -04003540}
3541/* END_CASE */
3542
Paul Elliottb9af2db2022-03-09 15:34:37 +00003543/* BEGIN_CASE depends_on:MBEDTLS_TIMING_C:MBEDTLS_HAVE_TIME */
Gilles Peskine449bd832023-01-11 14:50:10 +01003544void timing_final_delay_accessor()
Paul Elliottb9af2db2022-03-09 15:34:37 +00003545{
3546 mbedtls_timing_delay_context delay_context;
3547
Valerio Setti285dae82023-04-19 15:10:45 +02003548 USE_PSA_INIT();
Gilles Peskine449bd832023-01-11 14:50:10 +01003549 mbedtls_timing_set_delay(&delay_context, 50, 100);
Paul Elliottb9af2db2022-03-09 15:34:37 +00003550
Gilles Peskine449bd832023-01-11 14:50:10 +01003551 TEST_ASSERT(mbedtls_timing_get_final_delay(&delay_context) == 100);
valerio32f2ac92023-04-20 11:59:52 +02003552
3553exit:
Valerio Setti285dae82023-04-19 15:10:45 +02003554 USE_PSA_DONE();
Paul Elliottb9af2db2022-03-09 15:34:37 +00003555}
3556/* END_CASE */
Paul Elliott02758a52022-03-16 14:32:33 +00003557
3558/* BEGIN_CASE depends_on:MBEDTLS_SSL_DTLS_CONNECTION_ID */
Gilles Peskine449bd832023-01-11 14:50:10 +01003559void cid_sanity()
Paul Elliott02758a52022-03-16 14:32:33 +00003560{
3561 mbedtls_ssl_context ssl;
3562 mbedtls_ssl_config conf;
3563
3564 unsigned char own_cid[MBEDTLS_SSL_CID_IN_LEN_MAX];
3565 unsigned char test_cid[MBEDTLS_SSL_CID_IN_LEN_MAX];
3566 int cid_enabled;
3567 size_t own_cid_len;
3568
Gilles Peskine449bd832023-01-11 14:50:10 +01003569 mbedtls_test_rnd_std_rand(NULL, own_cid, sizeof(own_cid));
Paul Elliott02758a52022-03-16 14:32:33 +00003570
Gilles Peskine449bd832023-01-11 14:50:10 +01003571 mbedtls_ssl_init(&ssl);
3572 mbedtls_ssl_config_init(&conf);
valerio32f2ac92023-04-20 11:59:52 +02003573 MD_OR_USE_PSA_INIT();
Paul Elliott02758a52022-03-16 14:32:33 +00003574
Gilles Peskine449bd832023-01-11 14:50:10 +01003575 TEST_ASSERT(mbedtls_ssl_config_defaults(&conf,
3576 MBEDTLS_SSL_IS_CLIENT,
3577 MBEDTLS_SSL_TRANSPORT_STREAM,
3578 MBEDTLS_SSL_PRESET_DEFAULT)
3579 == 0);
Paul Elliott02758a52022-03-16 14:32:33 +00003580
Gilles Peskine449bd832023-01-11 14:50:10 +01003581 TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
Paul Elliott02758a52022-03-16 14:32:33 +00003582
3583 /* Can't use CID functions with stream transport. */
Gilles Peskine449bd832023-01-11 14:50:10 +01003584 TEST_ASSERT(mbedtls_ssl_set_cid(&ssl, MBEDTLS_SSL_CID_ENABLED, own_cid,
3585 sizeof(own_cid))
3586 == MBEDTLS_ERR_SSL_BAD_INPUT_DATA);
Paul Elliott02758a52022-03-16 14:32:33 +00003587
Gilles Peskine449bd832023-01-11 14:50:10 +01003588 TEST_ASSERT(mbedtls_ssl_get_own_cid(&ssl, &cid_enabled, test_cid,
3589 &own_cid_len)
3590 == MBEDTLS_ERR_SSL_BAD_INPUT_DATA);
Paul Elliott02758a52022-03-16 14:32:33 +00003591
Gilles Peskine449bd832023-01-11 14:50:10 +01003592 TEST_ASSERT(mbedtls_ssl_config_defaults(&conf,
3593 MBEDTLS_SSL_IS_CLIENT,
3594 MBEDTLS_SSL_TRANSPORT_DATAGRAM,
3595 MBEDTLS_SSL_PRESET_DEFAULT)
3596 == 0);
Paul Elliott02758a52022-03-16 14:32:33 +00003597
3598 /* Attempt to set config cid size too big. */
Gilles Peskine449bd832023-01-11 14:50:10 +01003599 TEST_ASSERT(mbedtls_ssl_conf_cid(&conf, MBEDTLS_SSL_CID_IN_LEN_MAX + 1,
3600 MBEDTLS_SSL_UNEXPECTED_CID_IGNORE)
3601 == MBEDTLS_ERR_SSL_BAD_INPUT_DATA);
Paul Elliott02758a52022-03-16 14:32:33 +00003602
Gilles Peskine449bd832023-01-11 14:50:10 +01003603 TEST_ASSERT(mbedtls_ssl_conf_cid(&conf, sizeof(own_cid),
3604 MBEDTLS_SSL_UNEXPECTED_CID_IGNORE)
3605 == 0);
Paul Elliott02758a52022-03-16 14:32:33 +00003606
3607 /* Attempt to set CID length not matching config. */
Gilles Peskine449bd832023-01-11 14:50:10 +01003608 TEST_ASSERT(mbedtls_ssl_set_cid(&ssl, MBEDTLS_SSL_CID_ENABLED, own_cid,
3609 MBEDTLS_SSL_CID_IN_LEN_MAX - 1)
3610 == MBEDTLS_ERR_SSL_BAD_INPUT_DATA);
Paul Elliott02758a52022-03-16 14:32:33 +00003611
Gilles Peskine449bd832023-01-11 14:50:10 +01003612 TEST_ASSERT(mbedtls_ssl_set_cid(&ssl, MBEDTLS_SSL_CID_ENABLED, own_cid,
3613 sizeof(own_cid))
3614 == 0);
Paul Elliott02758a52022-03-16 14:32:33 +00003615
3616 /* Test we get back what we put in. */
Gilles Peskine449bd832023-01-11 14:50:10 +01003617 TEST_ASSERT(mbedtls_ssl_get_own_cid(&ssl, &cid_enabled, test_cid,
3618 &own_cid_len)
3619 == 0);
Paul Elliott02758a52022-03-16 14:32:33 +00003620
Gilles Peskine449bd832023-01-11 14:50:10 +01003621 TEST_EQUAL(cid_enabled, MBEDTLS_SSL_CID_ENABLED);
Tom Cosgrovee4e9e7d2023-07-21 11:40:20 +01003622 TEST_MEMORY_COMPARE(own_cid, own_cid_len, test_cid, own_cid_len);
Paul Elliott02758a52022-03-16 14:32:33 +00003623
3624 /* Test disabling works. */
Gilles Peskine449bd832023-01-11 14:50:10 +01003625 TEST_ASSERT(mbedtls_ssl_set_cid(&ssl, MBEDTLS_SSL_CID_DISABLED, NULL,
3626 0)
3627 == 0);
Paul Elliott02758a52022-03-16 14:32:33 +00003628
Gilles Peskine449bd832023-01-11 14:50:10 +01003629 TEST_ASSERT(mbedtls_ssl_get_own_cid(&ssl, &cid_enabled, test_cid,
3630 &own_cid_len)
3631 == 0);
Paul Elliott02758a52022-03-16 14:32:33 +00003632
Gilles Peskine449bd832023-01-11 14:50:10 +01003633 TEST_EQUAL(cid_enabled, MBEDTLS_SSL_CID_DISABLED);
Paul Elliott02758a52022-03-16 14:32:33 +00003634
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01003635exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01003636 mbedtls_ssl_free(&ssl);
3637 mbedtls_ssl_config_free(&conf);
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01003638 MD_OR_USE_PSA_DONE();
Paul Elliott02758a52022-03-16 14:32:33 +00003639}
3640/* END_CASE */
3641
Elena Uziunaite8d8620b2024-09-03 14:13:50 +01003642/* BEGIN_CASE depends_on:MBEDTLS_PSA_CRYPTO_C:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED:MBEDTLS_USE_PSA_CRYPTO:MBEDTLS_PKCS1_V15:MBEDTLS_SSL_PROTO_TLS1_2:PSA_WANT_ECC_SECP_R1_256:MBEDTLS_RSA_C:PSA_WANT_ECC_SECP_R1_384:PSA_HAVE_ALG_SOME_ECDSA:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT */
Gilles Peskine449bd832023-01-11 14:50:10 +01003643void raw_key_agreement_fail(int bad_server_ecdhe_key)
Andrzej Kurekb3427822022-03-08 06:55:42 -05003644{
3645 enum { BUFFSIZE = 17000 };
Yanray Wang9ef0dce2022-10-25 16:44:13 +08003646 mbedtls_test_ssl_endpoint client, server;
Andrzej Kurekb3427822022-03-08 06:55:42 -05003647 mbedtls_psa_stats_t stats;
Andrzej Kurek39d88d42022-03-31 06:30:54 -04003648 size_t free_slots_before = -1;
Ronald Cronfb536472024-01-26 14:55:25 +01003649 mbedtls_test_handshake_test_options client_options, server_options;
3650 mbedtls_test_init_handshake_options(&client_options);
3651 mbedtls_test_init_handshake_options(&server_options);
Andrzej Kurekb3427822022-03-08 06:55:42 -05003652
Andrzej Kurekcc28e9a2022-03-08 18:36:35 -05003653 uint16_t iana_tls_group_list[] = { MBEDTLS_SSL_IANA_TLS_GROUP_SECP256R1,
3654 MBEDTLS_SSL_IANA_TLS_GROUP_NONE };
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01003655 MD_OR_USE_PSA_INIT();
Gilles Peskine449bd832023-01-11 14:50:10 +01003656 mbedtls_platform_zeroize(&client, sizeof(client));
3657 mbedtls_platform_zeroize(&server, sizeof(server));
Andrzej Kurekb3427822022-03-08 06:55:42 -05003658
3659 /* Client side, force SECP256R1 to make one key bitflip fail
Andrzej Kurek83e60ee2022-04-14 08:51:41 -04003660 * the raw key agreement. Flipping the first byte makes the
3661 * required 0x04 identifier invalid. */
Ronald Cronfb536472024-01-26 14:55:25 +01003662 client_options.pk_alg = MBEDTLS_PK_ECDSA;
3663 client_options.group_list = iana_tls_group_list;
Yanray Wangf7b62352022-10-26 11:51:53 +08003664 TEST_EQUAL(mbedtls_test_ssl_endpoint_init(&client, MBEDTLS_SSL_IS_CLIENT,
Ronald Cronfb536472024-01-26 14:55:25 +01003665 &client_options, NULL, NULL,
3666 NULL), 0);
Andrzej Kurekb3427822022-03-08 06:55:42 -05003667
3668 /* Server side */
Ronald Cronfb536472024-01-26 14:55:25 +01003669 server_options.pk_alg = MBEDTLS_PK_ECDSA;
3670 server_options.server_min_version = MBEDTLS_SSL_VERSION_TLS1_2;
3671 server_options.server_max_version = MBEDTLS_SSL_VERSION_TLS1_2;
Yanray Wangf7b62352022-10-26 11:51:53 +08003672 TEST_EQUAL(mbedtls_test_ssl_endpoint_init(&server, MBEDTLS_SSL_IS_SERVER,
Ronald Cronfb536472024-01-26 14:55:25 +01003673 &server_options, NULL, NULL,
3674 NULL), 0);
Andrzej Kurekb3427822022-03-08 06:55:42 -05003675
Yanray Wangf7b62352022-10-26 11:51:53 +08003676 TEST_EQUAL(mbedtls_test_mock_socket_connect(&(client.socket),
3677 &(server.socket),
3678 BUFFSIZE), 0);
Andrzej Kurekb3427822022-03-08 06:55:42 -05003679
Yanray Wangbd296832022-10-26 18:28:11 +08003680 TEST_EQUAL(mbedtls_test_move_handshake_to_state(
3681 &(client.ssl), &(server.ssl),
3682 MBEDTLS_SSL_CLIENT_KEY_EXCHANGE), 0);
Andrzej Kurekb3427822022-03-08 06:55:42 -05003683
Gilles Peskine449bd832023-01-11 14:50:10 +01003684 mbedtls_psa_get_stats(&stats);
Andrzej Kurek39d88d42022-03-31 06:30:54 -04003685 /* Save the number of slots in use up to this point.
3686 * With PSA, one can be used for the ECDH private key. */
3687 free_slots_before = stats.empty_slots;
Andrzej Kurekcb33bc52022-03-31 07:17:18 -04003688
Gilles Peskine449bd832023-01-11 14:50:10 +01003689 if (bad_server_ecdhe_key) {
Gilles Peskineb4f874d2022-04-08 16:48:09 -04003690 /* Force a simulated bitflip in the server key. to make the
3691 * raw key agreement in ssl_write_client_key_exchange fail. */
Przemek Stekiel7ac93be2023-07-04 10:02:38 +02003692 (client.ssl).handshake->xxdh_psa_peerkey[0] ^= 0x02;
Gilles Peskineb4f874d2022-04-08 16:48:09 -04003693 }
Andrzej Kurekb3427822022-03-08 06:55:42 -05003694
Yanray Wangbd296832022-10-26 18:28:11 +08003695 TEST_EQUAL(mbedtls_test_move_handshake_to_state(
3696 &(client.ssl), &(server.ssl), MBEDTLS_SSL_HANDSHAKE_OVER),
Gilles Peskine449bd832023-01-11 14:50:10 +01003697 bad_server_ecdhe_key ? MBEDTLS_ERR_SSL_HW_ACCEL_FAILED : 0);
Andrzej Kurekb3427822022-03-08 06:55:42 -05003698
Gilles Peskine449bd832023-01-11 14:50:10 +01003699 mbedtls_psa_get_stats(&stats);
Andrzej Kurekb3427822022-03-08 06:55:42 -05003700
Gilles Peskineb4f874d2022-04-08 16:48:09 -04003701 /* Make sure that the key slot is already destroyed in case of failure,
3702 * without waiting to close the connection. */
Gilles Peskine449bd832023-01-11 14:50:10 +01003703 if (bad_server_ecdhe_key) {
3704 TEST_EQUAL(free_slots_before, stats.empty_slots);
3705 }
Andrzej Kurekb3427822022-03-08 06:55:42 -05003706
3707exit:
Yanray Wangf7b62352022-10-26 11:51:53 +08003708 mbedtls_test_ssl_endpoint_free(&client, NULL);
3709 mbedtls_test_ssl_endpoint_free(&server, NULL);
Ronald Cronfb536472024-01-26 14:55:25 +01003710 mbedtls_test_free_handshake_options(&client_options);
3711 mbedtls_test_free_handshake_options(&server_options);
Andrzej Kurekcb33bc52022-03-31 07:17:18 -04003712
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01003713 MD_OR_USE_PSA_DONE();
Andrzej Kurekb3427822022-03-08 06:55:42 -05003714}
3715/* END_CASE */
Elena Uziunaite6b4cd482024-07-04 17:50:11 +01003716/* BEGIN_CASE depends_on:MBEDTLS_TEST_HOOKS:MBEDTLS_SSL_PROTO_TLS1_3:!MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_SSL_CLI_C:MBEDTLS_SSL_SRV_C:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED:PSA_WANT_ECC_SECP_R1_384 */
Gilles Peskine449bd832023-01-11 14:50:10 +01003717void tls13_server_certificate_msg_invalid_vector_len()
Ronald Crone3dac4a2022-06-10 17:21:51 +02003718{
3719 int ret = -1;
Yanray Wang9ef0dce2022-10-25 16:44:13 +08003720 mbedtls_test_ssl_endpoint client_ep, server_ep;
Ronald Crone3dac4a2022-06-10 17:21:51 +02003721 unsigned char *buf, *end;
3722 size_t buf_len;
3723 int step = 0;
3724 int expected_result;
Ronald Crone7b9b6b2022-06-10 17:24:31 +02003725 mbedtls_ssl_chk_buf_ptr_args expected_chk_buf_ptr_args;
Yanray Wang9ef0dce2022-10-25 16:44:13 +08003726 mbedtls_test_handshake_test_options client_options;
3727 mbedtls_test_handshake_test_options server_options;
Ronald Crone3dac4a2022-06-10 17:21:51 +02003728
3729 /*
3730 * Test set-up
3731 */
Gilles Peskine449bd832023-01-11 14:50:10 +01003732 mbedtls_platform_zeroize(&client_ep, sizeof(client_ep));
3733 mbedtls_platform_zeroize(&server_ep, sizeof(server_ep));
Ronald Crone3dac4a2022-06-10 17:21:51 +02003734
Yanray Wangf7b62352022-10-26 11:51:53 +08003735 mbedtls_test_init_handshake_options(&client_options);
valerio32f2ac92023-04-20 11:59:52 +02003736 MD_OR_USE_PSA_INIT();
3737
Paul Elliott9a8d7842022-07-10 12:48:57 +01003738 client_options.pk_alg = MBEDTLS_PK_ECDSA;
Yanray Wangf7b62352022-10-26 11:51:53 +08003739 ret = mbedtls_test_ssl_endpoint_init(&client_ep, MBEDTLS_SSL_IS_CLIENT,
Ronald Cronfb536472024-01-26 14:55:25 +01003740 &client_options, NULL, NULL, NULL);
Gilles Peskine449bd832023-01-11 14:50:10 +01003741 TEST_EQUAL(ret, 0);
Ronald Crone3dac4a2022-06-10 17:21:51 +02003742
Yanray Wangf7b62352022-10-26 11:51:53 +08003743 mbedtls_test_init_handshake_options(&server_options);
Paul Elliott9a8d7842022-07-10 12:48:57 +01003744 server_options.pk_alg = MBEDTLS_PK_ECDSA;
Yanray Wangf7b62352022-10-26 11:51:53 +08003745 ret = mbedtls_test_ssl_endpoint_init(&server_ep, MBEDTLS_SSL_IS_SERVER,
Ronald Cronfb536472024-01-26 14:55:25 +01003746 &server_options, NULL, NULL, NULL);
Gilles Peskine449bd832023-01-11 14:50:10 +01003747 TEST_EQUAL(ret, 0);
Ronald Crone3dac4a2022-06-10 17:21:51 +02003748
Yanray Wangf7b62352022-10-26 11:51:53 +08003749 ret = mbedtls_test_mock_socket_connect(&(client_ep.socket),
3750 &(server_ep.socket), 1024);
Gilles Peskine449bd832023-01-11 14:50:10 +01003751 TEST_EQUAL(ret, 0);
Ronald Crone3dac4a2022-06-10 17:21:51 +02003752
Gilles Peskine449bd832023-01-11 14:50:10 +01003753 while (1) {
3754 mbedtls_test_set_step(++step);
Ronald Crone3dac4a2022-06-10 17:21:51 +02003755
Yanray Wangbd296832022-10-26 18:28:11 +08003756 ret = mbedtls_test_move_handshake_to_state(
3757 &(server_ep.ssl), &(client_ep.ssl),
3758 MBEDTLS_SSL_CERTIFICATE_VERIFY);
Gilles Peskine449bd832023-01-11 14:50:10 +01003759 TEST_EQUAL(ret, 0);
Ronald Crone3dac4a2022-06-10 17:21:51 +02003760
Gilles Peskine449bd832023-01-11 14:50:10 +01003761 ret = mbedtls_ssl_flush_output(&(server_ep.ssl));
3762 TEST_EQUAL(ret, 0);
Ronald Crone3dac4a2022-06-10 17:21:51 +02003763
Yanray Wangbd296832022-10-26 18:28:11 +08003764 ret = mbedtls_test_move_handshake_to_state(
3765 &(client_ep.ssl), &(server_ep.ssl),
3766 MBEDTLS_SSL_SERVER_CERTIFICATE);
Gilles Peskine449bd832023-01-11 14:50:10 +01003767 TEST_EQUAL(ret, 0);
Ronald Crone3dac4a2022-06-10 17:21:51 +02003768
Gilles Peskine449bd832023-01-11 14:50:10 +01003769 ret = mbedtls_ssl_tls13_fetch_handshake_msg(&(client_ep.ssl),
3770 MBEDTLS_SSL_HS_CERTIFICATE,
3771 &buf, &buf_len);
3772 TEST_EQUAL(ret, 0);
Ronald Crone3dac4a2022-06-10 17:21:51 +02003773
3774 end = buf + buf_len;
3775
3776 /*
3777 * Tweak server Certificate message and parse it.
3778 */
3779
Yanray Wangf56181a2023-03-16 12:21:33 +08003780 ret = mbedtls_test_tweak_tls13_certificate_msg_vector_len(
Gilles Peskine449bd832023-01-11 14:50:10 +01003781 buf, &end, step, &expected_result, &expected_chk_buf_ptr_args);
Ronald Crone3dac4a2022-06-10 17:21:51 +02003782
Gilles Peskine449bd832023-01-11 14:50:10 +01003783 if (ret != 0) {
Ronald Crone3dac4a2022-06-10 17:21:51 +02003784 break;
Gilles Peskine449bd832023-01-11 14:50:10 +01003785 }
Ronald Crone3dac4a2022-06-10 17:21:51 +02003786
Gilles Peskine449bd832023-01-11 14:50:10 +01003787 ret = mbedtls_ssl_tls13_parse_certificate(&(client_ep.ssl), buf, end);
3788 TEST_EQUAL(ret, expected_result);
Ronald Crone3dac4a2022-06-10 17:21:51 +02003789
Gilles Peskine449bd832023-01-11 14:50:10 +01003790 TEST_ASSERT(mbedtls_ssl_cmp_chk_buf_ptr_fail_args(
3791 &expected_chk_buf_ptr_args) == 0);
Ronald Crone7b9b6b2022-06-10 17:24:31 +02003792
Gilles Peskine449bd832023-01-11 14:50:10 +01003793 mbedtls_ssl_reset_chk_buf_ptr_fail_args();
Ronald Crone7b9b6b2022-06-10 17:24:31 +02003794
Gilles Peskine449bd832023-01-11 14:50:10 +01003795 ret = mbedtls_ssl_session_reset(&(client_ep.ssl));
3796 TEST_EQUAL(ret, 0);
Ronald Crone3dac4a2022-06-10 17:21:51 +02003797
Gilles Peskine449bd832023-01-11 14:50:10 +01003798 ret = mbedtls_ssl_session_reset(&(server_ep.ssl));
3799 TEST_EQUAL(ret, 0);
Ronald Crone3dac4a2022-06-10 17:21:51 +02003800 }
3801
3802exit:
Gilles Peskine449bd832023-01-11 14:50:10 +01003803 mbedtls_ssl_reset_chk_buf_ptr_fail_args();
Yanray Wangf7b62352022-10-26 11:51:53 +08003804 mbedtls_test_ssl_endpoint_free(&client_ep, NULL);
3805 mbedtls_test_ssl_endpoint_free(&server_ep, NULL);
3806 mbedtls_test_free_handshake_options(&client_options);
3807 mbedtls_test_free_handshake_options(&server_options);
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01003808 MD_OR_USE_PSA_DONE();
Ronald Crone3dac4a2022-06-10 17:21:51 +02003809}
3810/* END_CASE */
Valerio Setti4452e982022-12-01 15:08:35 +01003811
3812/* BEGIN_CASE depends_on:MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */
Gilles Peskine449bd832023-01-11 14:50:10 +01003813void ssl_ecjpake_set_password(int use_opaque_arg)
Valerio Setti4452e982022-12-01 15:08:35 +01003814{
3815 mbedtls_ssl_context ssl;
3816 mbedtls_ssl_config conf;
Gilles Peskine449bd832023-01-11 14:50:10 +01003817#if defined(MBEDTLS_USE_PSA_CRYPTO)
Valerio Setti4452e982022-12-01 15:08:35 +01003818 mbedtls_svc_key_id_t pwd_slot = MBEDTLS_SVC_KEY_ID_INIT;
3819#else /* MBEDTLS_USE_PSA_CRYPTO */
3820 (void) use_opaque_arg;
3821#endif /* MBEDTLS_USE_PSA_CRYPTO */
Gilles Peskine449bd832023-01-11 14:50:10 +01003822 unsigned char pwd_string[sizeof(ECJPAKE_TEST_PWD)] = "";
Valerio Setti4452e982022-12-01 15:08:35 +01003823 size_t pwd_len = 0;
Valerio Setti4452e982022-12-01 15:08:35 +01003824 int ret;
3825
Gilles Peskine449bd832023-01-11 14:50:10 +01003826 mbedtls_ssl_init(&ssl);
valerio32f2ac92023-04-20 11:59:52 +02003827 MD_OR_USE_PSA_INIT();
Valerio Setti4452e982022-12-01 15:08:35 +01003828
Valerio Settie7518ba2022-12-02 12:09:43 +01003829 /* test with uninitalized SSL context */
Gilles Peskine449bd832023-01-11 14:50:10 +01003830 ECJPAKE_TEST_SET_PASSWORD(MBEDTLS_ERR_SSL_BAD_INPUT_DATA);
Valerio Setti4452e982022-12-01 15:08:35 +01003831
Gilles Peskine449bd832023-01-11 14:50:10 +01003832 mbedtls_ssl_config_init(&conf);
Valerio Setti4452e982022-12-01 15:08:35 +01003833
Gilles Peskine449bd832023-01-11 14:50:10 +01003834 TEST_EQUAL(mbedtls_ssl_config_defaults(&conf,
3835 MBEDTLS_SSL_IS_CLIENT,
3836 MBEDTLS_SSL_TRANSPORT_STREAM,
3837 MBEDTLS_SSL_PRESET_DEFAULT), 0);
Valerio Setti4452e982022-12-01 15:08:35 +01003838
Gilles Peskine449bd832023-01-11 14:50:10 +01003839 TEST_EQUAL(mbedtls_ssl_setup(&ssl, &conf), 0);
Valerio Setti4452e982022-12-01 15:08:35 +01003840
Valerio Settiba22c9c2022-12-06 11:42:33 +01003841 /* test with empty password or unitialized password key (depending on use_opaque_arg) */
Gilles Peskine449bd832023-01-11 14:50:10 +01003842 ECJPAKE_TEST_SET_PASSWORD(MBEDTLS_ERR_SSL_BAD_INPUT_DATA);
Valerio Setti4452e982022-12-01 15:08:35 +01003843
Gilles Peskine449bd832023-01-11 14:50:10 +01003844 pwd_len = strlen(ECJPAKE_TEST_PWD);
3845 memcpy(pwd_string, ECJPAKE_TEST_PWD, pwd_len);
Valerio Setti4452e982022-12-01 15:08:35 +01003846
Gilles Peskine449bd832023-01-11 14:50:10 +01003847#if defined(MBEDTLS_USE_PSA_CRYPTO)
3848 if (use_opaque_arg) {
Valerio Setti4452e982022-12-01 15:08:35 +01003849 psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
Valerio Setti785116a2022-12-12 11:59:25 +01003850 psa_key_attributes_t check_attributes = PSA_KEY_ATTRIBUTES_INIT;
Valerio Setti4452e982022-12-01 15:08:35 +01003851
Valerio Setti2a3ffb42022-12-08 16:27:46 +01003852 /* First try with an invalid usage */
Gilles Peskine449bd832023-01-11 14:50:10 +01003853 psa_set_key_usage_flags(&attributes, PSA_KEY_USAGE_SIGN_HASH);
3854 psa_set_key_algorithm(&attributes, PSA_ALG_JPAKE);
3855 psa_set_key_type(&attributes, PSA_KEY_TYPE_PASSWORD);
Valerio Setti4452e982022-12-01 15:08:35 +01003856
Gilles Peskine449bd832023-01-11 14:50:10 +01003857 PSA_ASSERT(psa_import_key(&attributes, pwd_string,
3858 pwd_len, &pwd_slot));
Valerio Setti2a3ffb42022-12-08 16:27:46 +01003859
Gilles Peskine449bd832023-01-11 14:50:10 +01003860 ECJPAKE_TEST_SET_PASSWORD(MBEDTLS_ERR_SSL_HW_ACCEL_FAILED);
Valerio Setti2a3ffb42022-12-08 16:27:46 +01003861
Valerio Setti9d313df2022-12-09 11:38:59 +01003862 /* check that the opaque key is still valid after failure */
Gilles Peskine449bd832023-01-11 14:50:10 +01003863 TEST_EQUAL(psa_get_key_attributes(pwd_slot, &check_attributes),
3864 PSA_SUCCESS);
Valerio Setti9d313df2022-12-09 11:38:59 +01003865
Gilles Peskine449bd832023-01-11 14:50:10 +01003866 psa_destroy_key(pwd_slot);
Valerio Setti2a3ffb42022-12-08 16:27:46 +01003867
3868 /* Then set the correct usage */
Gilles Peskine449bd832023-01-11 14:50:10 +01003869 psa_set_key_usage_flags(&attributes, PSA_KEY_USAGE_DERIVE);
Valerio Setti2a3ffb42022-12-08 16:27:46 +01003870
Gilles Peskine449bd832023-01-11 14:50:10 +01003871 PSA_ASSERT(psa_import_key(&attributes, pwd_string,
3872 pwd_len, &pwd_slot));
Valerio Setti4452e982022-12-01 15:08:35 +01003873 }
3874#endif /* MBEDTLS_USE_PSA_CRYPTO */
3875
Valerio Settie7518ba2022-12-02 12:09:43 +01003876 /* final check which should work without errors */
Gilles Peskine449bd832023-01-11 14:50:10 +01003877 ECJPAKE_TEST_SET_PASSWORD(0);
Valerio Setti4452e982022-12-01 15:08:35 +01003878
Gilles Peskine449bd832023-01-11 14:50:10 +01003879#if defined(MBEDTLS_USE_PSA_CRYPTO)
3880 if (use_opaque_arg) {
3881 psa_destroy_key(pwd_slot);
Valerio Setti31e99bb2022-12-09 14:35:10 +01003882 }
Valerio Settie7518ba2022-12-02 12:09:43 +01003883#endif /* MBEDTLS_USE_PSA_CRYPTO */
Gilles Peskine449bd832023-01-11 14:50:10 +01003884 mbedtls_ssl_free(&ssl);
3885 mbedtls_ssl_config_free(&conf);
Valerio Setti4452e982022-12-01 15:08:35 +01003886
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01003887 MD_OR_USE_PSA_DONE();
Valerio Setti4452e982022-12-01 15:08:35 +01003888}
3889/* END_CASE */
Valerio Setti73260b62023-01-03 12:53:28 +01003890
Valerio Setti2c121852023-01-09 18:00:39 +01003891/* BEGIN_CASE */
Gilles Peskine449bd832023-01-11 14:50:10 +01003892void elliptic_curve_get_properties()
Valerio Setti73260b62023-01-03 12:53:28 +01003893{
Przemek Stekiel75a5a9c2023-06-12 11:21:18 +02003894 psa_key_type_t psa_type = PSA_KEY_TYPE_NONE;
Valerio Setti73260b62023-01-03 12:53:28 +01003895 size_t psa_bits;
3896
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01003897 MD_OR_USE_PSA_INIT();
Valerio Setti73260b62023-01-03 12:53:28 +01003898
Elena Uziunaite24e24f22024-07-04 17:53:40 +01003899#if defined(PSA_WANT_ECC_SECP_R1_521)
Gilles Peskine449bd832023-01-11 14:50:10 +01003900 TEST_AVAILABLE_ECC(25, MBEDTLS_ECP_DP_SECP521R1, PSA_ECC_FAMILY_SECP_R1, 521);
Valerio Setti73260b62023-01-03 12:53:28 +01003901#else
Gilles Peskine449bd832023-01-11 14:50:10 +01003902 TEST_UNAVAILABLE_ECC(25, MBEDTLS_ECP_DP_SECP521R1, PSA_ECC_FAMILY_SECP_R1, 521);
Valerio Setti73260b62023-01-03 12:53:28 +01003903#endif
Elena Uziunaiteb8d10872024-07-05 10:51:40 +01003904#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_512)
Gilles Peskine449bd832023-01-11 14:50:10 +01003905 TEST_AVAILABLE_ECC(28, MBEDTLS_ECP_DP_BP512R1, PSA_ECC_FAMILY_BRAINPOOL_P_R1, 512);
Valerio Setti73260b62023-01-03 12:53:28 +01003906#else
Gilles Peskine449bd832023-01-11 14:50:10 +01003907 TEST_UNAVAILABLE_ECC(28, MBEDTLS_ECP_DP_BP512R1, PSA_ECC_FAMILY_BRAINPOOL_P_R1, 512);
Valerio Setti73260b62023-01-03 12:53:28 +01003908#endif
Elena Uziunaite6b4cd482024-07-04 17:50:11 +01003909#if defined(PSA_WANT_ECC_SECP_R1_384)
Gilles Peskine449bd832023-01-11 14:50:10 +01003910 TEST_AVAILABLE_ECC(24, MBEDTLS_ECP_DP_SECP384R1, PSA_ECC_FAMILY_SECP_R1, 384);
Valerio Setti73260b62023-01-03 12:53:28 +01003911#else
Gilles Peskine449bd832023-01-11 14:50:10 +01003912 TEST_UNAVAILABLE_ECC(24, MBEDTLS_ECP_DP_SECP384R1, PSA_ECC_FAMILY_SECP_R1, 384);
Valerio Setti73260b62023-01-03 12:53:28 +01003913#endif
Elena Uziunaiteb8d10872024-07-05 10:51:40 +01003914#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_384)
Gilles Peskine449bd832023-01-11 14:50:10 +01003915 TEST_AVAILABLE_ECC(27, MBEDTLS_ECP_DP_BP384R1, PSA_ECC_FAMILY_BRAINPOOL_P_R1, 384);
Valerio Setti73260b62023-01-03 12:53:28 +01003916#else
Gilles Peskine449bd832023-01-11 14:50:10 +01003917 TEST_UNAVAILABLE_ECC(27, MBEDTLS_ECP_DP_BP384R1, PSA_ECC_FAMILY_BRAINPOOL_P_R1, 384);
Valerio Setti73260b62023-01-03 12:53:28 +01003918#endif
Elena Uziunaite417d05f2024-07-04 17:46:30 +01003919#if defined(PSA_WANT_ECC_SECP_R1_256)
Gilles Peskine449bd832023-01-11 14:50:10 +01003920 TEST_AVAILABLE_ECC(23, MBEDTLS_ECP_DP_SECP256R1, PSA_ECC_FAMILY_SECP_R1, 256);
Valerio Setti73260b62023-01-03 12:53:28 +01003921#else
Gilles Peskine449bd832023-01-11 14:50:10 +01003922 TEST_UNAVAILABLE_ECC(23, MBEDTLS_ECP_DP_SECP256R1, PSA_ECC_FAMILY_SECP_R1, 256);
Valerio Setti73260b62023-01-03 12:53:28 +01003923#endif
Elena Uziunaite63cb13e2024-09-05 12:43:14 +01003924#if defined(PSA_WANT_ECC_SECP_K1_256)
Gilles Peskine449bd832023-01-11 14:50:10 +01003925 TEST_AVAILABLE_ECC(22, MBEDTLS_ECP_DP_SECP256K1, PSA_ECC_FAMILY_SECP_K1, 256);
Valerio Setti73260b62023-01-03 12:53:28 +01003926#else
Gilles Peskine449bd832023-01-11 14:50:10 +01003927 TEST_UNAVAILABLE_ECC(22, MBEDTLS_ECP_DP_SECP256K1, PSA_ECC_FAMILY_SECP_K1, 256);
Valerio Setti73260b62023-01-03 12:53:28 +01003928#endif
Elena Uziunaiteb8d10872024-07-05 10:51:40 +01003929#if defined(PSA_WANT_ECC_BRAINPOOL_P_R1_256)
Gilles Peskine449bd832023-01-11 14:50:10 +01003930 TEST_AVAILABLE_ECC(26, MBEDTLS_ECP_DP_BP256R1, PSA_ECC_FAMILY_BRAINPOOL_P_R1, 256);
Valerio Setti73260b62023-01-03 12:53:28 +01003931#else
Gilles Peskine449bd832023-01-11 14:50:10 +01003932 TEST_UNAVAILABLE_ECC(26, MBEDTLS_ECP_DP_BP256R1, PSA_ECC_FAMILY_BRAINPOOL_P_R1, 256);
Valerio Setti73260b62023-01-03 12:53:28 +01003933#endif
Elena Uziunaiteeaa0cf02024-07-04 17:41:25 +01003934#if defined(PSA_WANT_ECC_SECP_R1_224)
Gilles Peskine449bd832023-01-11 14:50:10 +01003935 TEST_AVAILABLE_ECC(21, MBEDTLS_ECP_DP_SECP224R1, PSA_ECC_FAMILY_SECP_R1, 224);
Valerio Setti73260b62023-01-03 12:53:28 +01003936#else
Gilles Peskine449bd832023-01-11 14:50:10 +01003937 TEST_UNAVAILABLE_ECC(21, MBEDTLS_ECP_DP_SECP224R1, PSA_ECC_FAMILY_SECP_R1, 224);
Valerio Setti73260b62023-01-03 12:53:28 +01003938#endif
Elena Uziunaitea3632862024-07-04 13:52:43 +01003939#if defined(PSA_WANT_ECC_SECP_R1_192)
Gilles Peskine449bd832023-01-11 14:50:10 +01003940 TEST_AVAILABLE_ECC(19, MBEDTLS_ECP_DP_SECP192R1, PSA_ECC_FAMILY_SECP_R1, 192);
Valerio Setti73260b62023-01-03 12:53:28 +01003941#else
Gilles Peskine449bd832023-01-11 14:50:10 +01003942 TEST_UNAVAILABLE_ECC(19, MBEDTLS_ECP_DP_SECP192R1, PSA_ECC_FAMILY_SECP_R1, 192);
Valerio Setti73260b62023-01-03 12:53:28 +01003943#endif
Elena Uziunaite9e85c9f2024-07-04 18:37:34 +01003944#if defined(PSA_WANT_ECC_SECP_K1_192)
Gilles Peskine449bd832023-01-11 14:50:10 +01003945 TEST_AVAILABLE_ECC(18, MBEDTLS_ECP_DP_SECP192K1, PSA_ECC_FAMILY_SECP_K1, 192);
Valerio Setti73260b62023-01-03 12:53:28 +01003946#else
Gilles Peskine449bd832023-01-11 14:50:10 +01003947 TEST_UNAVAILABLE_ECC(18, MBEDTLS_ECP_DP_SECP192K1, PSA_ECC_FAMILY_SECP_K1, 192);
Valerio Setti73260b62023-01-03 12:53:28 +01003948#endif
Elena Uziunaite0b5d48e2024-07-05 11:48:23 +01003949#if defined(PSA_WANT_ECC_MONTGOMERY_255)
Gilles Peskine449bd832023-01-11 14:50:10 +01003950 TEST_AVAILABLE_ECC(29, MBEDTLS_ECP_DP_CURVE25519, PSA_ECC_FAMILY_MONTGOMERY, 255);
Valerio Setti73260b62023-01-03 12:53:28 +01003951#else
Gilles Peskine449bd832023-01-11 14:50:10 +01003952 TEST_UNAVAILABLE_ECC(29, MBEDTLS_ECP_DP_CURVE25519, PSA_ECC_FAMILY_MONTGOMERY, 255);
Valerio Setti73260b62023-01-03 12:53:28 +01003953#endif
Elena Uziunaite0b5d48e2024-07-05 11:48:23 +01003954#if defined(PSA_WANT_ECC_MONTGOMERY_448)
Gilles Peskine449bd832023-01-11 14:50:10 +01003955 TEST_AVAILABLE_ECC(30, MBEDTLS_ECP_DP_CURVE448, PSA_ECC_FAMILY_MONTGOMERY, 448);
Valerio Setti73260b62023-01-03 12:53:28 +01003956#else
Gilles Peskine449bd832023-01-11 14:50:10 +01003957 TEST_UNAVAILABLE_ECC(30, MBEDTLS_ECP_DP_CURVE448, PSA_ECC_FAMILY_MONTGOMERY, 448);
Valerio Setti73260b62023-01-03 12:53:28 +01003958#endif
valerio32f2ac92023-04-20 11:59:52 +02003959 goto exit;
3960exit:
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +01003961 MD_OR_USE_PSA_DONE();
Valerio Setti73260b62023-01-03 12:53:28 +01003962}
3963/* END_CASE */
Ronald Crond903a862024-01-15 15:57:17 +01003964
Elena Uziunaitebed21b52024-08-27 11:56:25 +01003965/* BEGIN_CASE depends_on:MBEDTLS_SSL_PROTO_TLS1_3:MBEDTLS_SSL_CLI_C:MBEDTLS_SSL_SRV_C:MBEDTLS_TEST_AT_LEAST_ONE_TLS1_3_CIPHERSUITE:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED:PSA_WANT_ALG_SHA_256:PSA_WANT_ECC_SECP_R1_256:PSA_WANT_ECC_SECP_R1_384:PSA_HAVE_ALG_ECDSA_VERIFY:MBEDTLS_SSL_SESSION_TICKETS */
Ronald Crond903a862024-01-15 15:57:17 +01003966void tls13_resume_session_with_ticket()
3967{
3968 int ret = -1;
Ronald Crond903a862024-01-15 15:57:17 +01003969 mbedtls_test_ssl_endpoint client_ep, server_ep;
3970 mbedtls_test_handshake_test_options client_options;
3971 mbedtls_test_handshake_test_options server_options;
3972 mbedtls_ssl_session saved_session;
3973
Ronald Crond903a862024-01-15 15:57:17 +01003974 mbedtls_platform_zeroize(&client_ep, sizeof(client_ep));
3975 mbedtls_platform_zeroize(&server_ep, sizeof(server_ep));
3976 mbedtls_test_init_handshake_options(&client_options);
3977 mbedtls_test_init_handshake_options(&server_options);
3978 mbedtls_ssl_session_init(&saved_session);
3979
Ronald Cron095a3a52024-01-31 14:34:22 +01003980 PSA_INIT();
Ronald Crond903a862024-01-15 15:57:17 +01003981
Ronald Cron1f6e4e42024-01-26 16:31:33 +01003982 /*
3983 * Run first handshake to get a ticket from the server.
3984 */
Ronald Crond903a862024-01-15 15:57:17 +01003985 client_options.pk_alg = MBEDTLS_PK_ECDSA;
Ronald Cron1f6e4e42024-01-26 16:31:33 +01003986 server_options.pk_alg = MBEDTLS_PK_ECDSA;
3987
3988 ret = mbedtls_test_get_tls13_ticket(&client_options, &server_options,
3989 &saved_session);
3990 TEST_EQUAL(ret, 0);
3991
3992 /*
3993 * Prepare for handshake with the ticket.
3994 */
Ronald Crond903a862024-01-15 15:57:17 +01003995 ret = mbedtls_test_ssl_endpoint_init(&client_ep, MBEDTLS_SSL_IS_CLIENT,
Ronald Cronfb536472024-01-26 14:55:25 +01003996 &client_options, NULL, NULL, NULL);
Ronald Crond903a862024-01-15 15:57:17 +01003997 TEST_EQUAL(ret, 0);
3998
Ronald Crond903a862024-01-15 15:57:17 +01003999 ret = mbedtls_test_ssl_endpoint_init(&server_ep, MBEDTLS_SSL_IS_SERVER,
Ronald Cronfb536472024-01-26 14:55:25 +01004000 &server_options, NULL, NULL, NULL);
Ronald Cron1f6e4e42024-01-26 16:31:33 +01004001 TEST_EQUAL(ret, 0);
4002
Ronald Crond903a862024-01-15 15:57:17 +01004003 mbedtls_ssl_conf_session_tickets_cb(&server_ep.conf,
4004 mbedtls_test_ticket_write,
4005 mbedtls_test_ticket_parse,
4006 NULL);
4007 TEST_EQUAL(ret, 0);
4008
4009 ret = mbedtls_test_mock_socket_connect(&(client_ep.socket),
4010 &(server_ep.socket), 1024);
4011 TEST_EQUAL(ret, 0);
4012
Ronald Crond903a862024-01-15 15:57:17 +01004013 ret = mbedtls_ssl_set_session(&(client_ep.ssl), &saved_session);
4014 TEST_EQUAL(ret, 0);
4015
Ronald Cron5de9c6f2024-01-31 14:45:16 +01004016 /*
Ronald Cron1f6e4e42024-01-26 16:31:33 +01004017 * Handshake with ticket.
4018 *
Ronald Cron5de9c6f2024-01-31 14:45:16 +01004019 * Run the handshake up to MBEDTLS_SSL_HANDSHAKE_WRAPUP and not
4020 * MBEDTLS_SSL_HANDSHAKE_OVER to preserve handshake data for the checks
4021 * below.
4022 */
Ronald Croneb845342024-01-31 14:48:23 +01004023 TEST_EQUAL(mbedtls_test_move_handshake_to_state(
4024 &(server_ep.ssl), &(client_ep.ssl),
4025 MBEDTLS_SSL_HANDSHAKE_WRAPUP), 0);
Ronald Crond903a862024-01-15 15:57:17 +01004026
4027 TEST_EQUAL(server_ep.ssl.handshake->resume, 1);
4028 TEST_EQUAL(server_ep.ssl.handshake->new_session_tickets_count, 1);
4029 TEST_EQUAL(server_ep.ssl.handshake->key_exchange_mode,
4030 MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL);
4031
4032exit:
4033 mbedtls_test_ssl_endpoint_free(&client_ep, NULL);
4034 mbedtls_test_ssl_endpoint_free(&server_ep, NULL);
4035 mbedtls_test_free_handshake_options(&client_options);
4036 mbedtls_test_free_handshake_options(&server_options);
4037 mbedtls_ssl_session_free(&saved_session);
Ronald Cron095a3a52024-01-31 14:34:22 +01004038 PSA_DONE();
Ronald Crond903a862024-01-15 15:57:17 +01004039}
4040/* END_CASE */
Ronald Crona8dd81b2024-01-16 17:50:52 +01004041
Ronald Cronae2d81c2024-01-22 09:13:41 +01004042/*
Ronald Cron86d288c2024-02-22 11:28:29 +01004043 * The !MBEDTLS_SSL_PROTO_TLS1_2 dependency of tls13_read_early_data() below is
Ronald Cronae2d81c2024-01-22 09:13:41 +01004044 * a temporary workaround to not run the test in Windows-2013 where there is
4045 * an issue with mbedtls_vsnprintf().
4046 */
Elena Uziunaitebed21b52024-08-27 11:56:25 +01004047/* BEGIN_CASE depends_on:!MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_SSL_EARLY_DATA:MBEDTLS_SSL_CLI_C:MBEDTLS_SSL_SRV_C:MBEDTLS_DEBUG_C:MBEDTLS_TEST_AT_LEAST_ONE_TLS1_3_CIPHERSUITE:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED:PSA_WANT_ALG_SHA_256:PSA_WANT_ECC_SECP_R1_256:PSA_WANT_ECC_SECP_R1_384:PSA_HAVE_ALG_ECDSA_VERIFY:MBEDTLS_SSL_SESSION_TICKETS */
Ronald Cron86d288c2024-02-22 11:28:29 +01004048void tls13_read_early_data(int scenario)
Ronald Crona8dd81b2024-01-16 17:50:52 +01004049{
4050 int ret = -1;
4051 unsigned char buf[64];
4052 const char *early_data = "This is early data.";
4053 size_t early_data_len = strlen(early_data);
4054 mbedtls_test_ssl_endpoint client_ep, server_ep;
4055 mbedtls_test_handshake_test_options client_options;
4056 mbedtls_test_handshake_test_options server_options;
4057 mbedtls_ssl_session saved_session;
Ronald Cron2995d352024-01-18 16:59:39 +01004058 mbedtls_test_ssl_log_pattern server_pattern = { NULL, 0 };
Jerry Yuf57d14b2023-11-15 16:40:09 +08004059 uint16_t group_list[3] = {
4060 MBEDTLS_SSL_IANA_TLS_GROUP_SECP256R1,
4061 MBEDTLS_SSL_IANA_TLS_GROUP_SECP384R1,
4062 MBEDTLS_SSL_IANA_TLS_GROUP_NONE
4063 };
Ronald Cron2995d352024-01-18 16:59:39 +01004064
Ronald Crona8dd81b2024-01-16 17:50:52 +01004065 mbedtls_platform_zeroize(&client_ep, sizeof(client_ep));
4066 mbedtls_platform_zeroize(&server_ep, sizeof(server_ep));
4067 mbedtls_test_init_handshake_options(&client_options);
4068 mbedtls_test_init_handshake_options(&server_options);
4069 mbedtls_ssl_session_init(&saved_session);
4070
Ronald Cron095a3a52024-01-31 14:34:22 +01004071 PSA_INIT();
Ronald Crona8dd81b2024-01-16 17:50:52 +01004072
Ronald Cronbfcdc062024-01-26 16:57:25 +01004073 /*
4074 * Run first handshake to get a ticket from the server.
4075 */
4076
Ronald Crona8dd81b2024-01-16 17:50:52 +01004077 client_options.pk_alg = MBEDTLS_PK_ECDSA;
Ronald Cronfb536472024-01-26 14:55:25 +01004078 client_options.group_list = group_list;
Ronald Cronced99be2024-01-26 15:49:12 +01004079 client_options.early_data = MBEDTLS_SSL_EARLY_DATA_ENABLED;
Ronald Cronbfcdc062024-01-26 16:57:25 +01004080 server_options.pk_alg = MBEDTLS_PK_ECDSA;
4081 server_options.group_list = group_list;
4082 server_options.early_data = MBEDTLS_SSL_EARLY_DATA_ENABLED;
4083
Waleed Elmelegy4dfb0e72024-03-14 01:48:40 +00004084#if defined(MBEDTLS_SSL_ALPN)
4085 switch (scenario) {
4086 case TEST_EARLY_DATA_SAME_ALPN:
4087 case TEST_EARLY_DATA_DIFF_ALPN:
4088 case TEST_EARLY_DATA_NO_LATER_ALPN:
4089 client_options.alpn_list[0] = "ALPNExample";
4090 client_options.alpn_list[1] = NULL;
4091 server_options.alpn_list[0] = "ALPNExample";
4092 server_options.alpn_list[1] = NULL;
4093 break;
4094 }
4095#endif
4096
Ronald Cronbfcdc062024-01-26 16:57:25 +01004097 ret = mbedtls_test_get_tls13_ticket(&client_options, &server_options,
4098 &saved_session);
4099 TEST_EQUAL(ret, 0);
4100
4101 /*
4102 * Prepare for handshake with the ticket.
4103 */
4104 switch (scenario) {
Ronald Cron5c208d72024-01-24 10:13:30 +01004105 case TEST_EARLY_DATA_ACCEPTED:
Ronald Cronbfcdc062024-01-26 16:57:25 +01004106 break;
4107
Ronald Cron110303f2024-02-22 11:35:21 +01004108 case TEST_EARLY_DATA_NO_INDICATION_SENT:
4109 client_options.early_data = MBEDTLS_SSL_EARLY_DATA_DISABLED;
4110 break;
4111
Ronald Crond6dba672024-01-24 12:22:24 +01004112 case TEST_EARLY_DATA_SERVER_REJECTS:
Ronald Cronbfcdc062024-01-26 16:57:25 +01004113 mbedtls_debug_set_threshold(3);
4114 server_pattern.pattern =
4115 "EarlyData: deprotect and discard app data records.";
4116 server_options.early_data = MBEDTLS_SSL_EARLY_DATA_DISABLED;
4117 break;
4118
Ronald Cron2261ab22024-01-24 13:38:31 +01004119 case TEST_EARLY_DATA_HRR:
Ronald Cronbfcdc062024-01-26 16:57:25 +01004120 mbedtls_debug_set_threshold(3);
4121 server_pattern.pattern =
4122 "EarlyData: Ignore application message before 2nd ClientHello";
4123 server_options.group_list = group_list + 1;
4124 break;
Waleed Elmelegy4dfb0e72024-03-14 01:48:40 +00004125#if defined(MBEDTLS_SSL_ALPN)
4126 case TEST_EARLY_DATA_SAME_ALPN:
4127 client_options.alpn_list[0] = "ALPNExample";
4128 client_options.alpn_list[1] = NULL;
4129 server_options.alpn_list[0] = "ALPNExample";
4130 server_options.alpn_list[1] = NULL;
4131 break;
4132 case TEST_EARLY_DATA_DIFF_ALPN:
4133 case TEST_EARLY_DATA_NO_INITIAL_ALPN:
4134 client_options.alpn_list[0] = "ALPNExample2";
4135 client_options.alpn_list[1] = NULL;
4136 server_options.alpn_list[0] = "ALPNExample2";
4137 server_options.alpn_list[1] = NULL;
4138 mbedtls_debug_set_threshold(3);
4139 server_pattern.pattern =
4140 "EarlyData: rejected, the selected ALPN is different "
4141 "from the one associated with the pre-shared key.";
4142 break;
4143 case TEST_EARLY_DATA_NO_LATER_ALPN:
4144 client_options.alpn_list[0] = NULL;
4145 server_options.alpn_list[0] = NULL;
4146 mbedtls_debug_set_threshold(3);
4147 server_pattern.pattern =
4148 "EarlyData: rejected, the selected ALPN is different "
4149 "from the one associated with the pre-shared key.";
4150 break;
4151#endif
Ronald Cronbfcdc062024-01-26 16:57:25 +01004152
4153 default:
4154 TEST_FAIL("Unknown scenario.");
4155 }
4156
Ronald Crona8dd81b2024-01-16 17:50:52 +01004157 ret = mbedtls_test_ssl_endpoint_init(&client_ep, MBEDTLS_SSL_IS_CLIENT,
Ronald Cronfb536472024-01-26 14:55:25 +01004158 &client_options, NULL, NULL, NULL);
Ronald Crona8dd81b2024-01-16 17:50:52 +01004159 TEST_EQUAL(ret, 0);
Ronald Crona8dd81b2024-01-16 17:50:52 +01004160
Ronald Cron2995d352024-01-18 16:59:39 +01004161 server_options.srv_log_fun = mbedtls_test_ssl_log_analyzer;
4162 server_options.srv_log_obj = &server_pattern;
Ronald Crona8dd81b2024-01-16 17:50:52 +01004163 ret = mbedtls_test_ssl_endpoint_init(&server_ep, MBEDTLS_SSL_IS_SERVER,
Ronald Cronfb536472024-01-26 14:55:25 +01004164 &server_options, NULL, NULL, NULL);
Ronald Crona8dd81b2024-01-16 17:50:52 +01004165 TEST_EQUAL(ret, 0);
Ronald Cronfb536472024-01-26 14:55:25 +01004166
Ronald Crona8dd81b2024-01-16 17:50:52 +01004167 mbedtls_ssl_conf_session_tickets_cb(&server_ep.conf,
4168 mbedtls_test_ticket_write,
4169 mbedtls_test_ticket_parse,
4170 NULL);
Ronald Crona8dd81b2024-01-16 17:50:52 +01004171
4172 ret = mbedtls_test_mock_socket_connect(&(client_ep.socket),
4173 &(server_ep.socket), 1024);
4174 TEST_EQUAL(ret, 0);
4175
Ronald Crona8dd81b2024-01-16 17:50:52 +01004176 ret = mbedtls_ssl_set_session(&(client_ep.ssl), &saved_session);
4177 TEST_EQUAL(ret, 0);
4178
Ronald Cronbfcdc062024-01-26 16:57:25 +01004179 /*
4180 * Handshake with ticket and send early data.
4181 */
Ronald Croneb845342024-01-31 14:48:23 +01004182 TEST_EQUAL(mbedtls_test_move_handshake_to_state(
4183 &(client_ep.ssl), &(server_ep.ssl),
4184 MBEDTLS_SSL_SERVER_HELLO), 0);
Ronald Crona8dd81b2024-01-16 17:50:52 +01004185
Ronald Cron7d158f42024-02-22 11:39:39 +01004186 ret = mbedtls_ssl_write_early_data(&(client_ep.ssl),
4187 (unsigned char *) early_data,
4188 early_data_len);
Ronald Crona8dd81b2024-01-16 17:50:52 +01004189
Ronald Crond2884662024-03-03 15:03:22 +01004190 if (client_ep.ssl.early_data_state !=
Ronald Cron3c5a6832024-03-03 15:46:57 +01004191 MBEDTLS_SSL_EARLY_DATA_STATE_NO_IND_SENT) {
Ronald Cron110303f2024-02-22 11:35:21 +01004192 TEST_EQUAL(ret, early_data_len);
Ronald Cron7d158f42024-02-22 11:39:39 +01004193 } else {
4194 TEST_EQUAL(ret, MBEDTLS_ERR_SSL_CANNOT_WRITE_EARLY_DATA);
Ronald Cron110303f2024-02-22 11:35:21 +01004195 }
Ronald Crona8dd81b2024-01-16 17:50:52 +01004196
Ronald Cron2995d352024-01-18 16:59:39 +01004197 ret = mbedtls_test_move_handshake_to_state(
4198 &(server_ep.ssl), &(client_ep.ssl),
4199 MBEDTLS_SSL_HANDSHAKE_WRAPUP);
Ronald Crona8dd81b2024-01-16 17:50:52 +01004200
Ronald Cron2995d352024-01-18 16:59:39 +01004201 switch (scenario) {
Ronald Cron5c208d72024-01-24 10:13:30 +01004202 case TEST_EARLY_DATA_ACCEPTED:
Waleed Elmelegy4dfb0e72024-03-14 01:48:40 +00004203#if defined(MBEDTLS_SSL_ALPN)
4204 case TEST_EARLY_DATA_SAME_ALPN:
4205#endif
Ronald Cron2995d352024-01-18 16:59:39 +01004206 TEST_EQUAL(ret, MBEDTLS_ERR_SSL_RECEIVED_EARLY_DATA);
4207 TEST_EQUAL(server_ep.ssl.handshake->early_data_accepted, 1);
4208 TEST_EQUAL(mbedtls_ssl_read_early_data(&(server_ep.ssl),
4209 buf, sizeof(buf)), early_data_len);
4210 TEST_MEMORY_COMPARE(buf, early_data_len, early_data, early_data_len);
Ronald Cron2995d352024-01-18 16:59:39 +01004211 break;
4212
Ronald Cron110303f2024-02-22 11:35:21 +01004213 case TEST_EARLY_DATA_NO_INDICATION_SENT:
4214 TEST_EQUAL(ret, 0);
4215 TEST_EQUAL(server_ep.ssl.handshake->early_data_accepted, 0);
4216 break;
4217
Ronald Crond6dba672024-01-24 12:22:24 +01004218 case TEST_EARLY_DATA_SERVER_REJECTS: /* Intentional fallthrough */
Ronald Cron2261ab22024-01-24 13:38:31 +01004219 case TEST_EARLY_DATA_HRR:
Waleed Elmelegy4dfb0e72024-03-14 01:48:40 +00004220#if defined(MBEDTLS_SSL_ALPN)
4221 case TEST_EARLY_DATA_DIFF_ALPN:
4222 case TEST_EARLY_DATA_NO_INITIAL_ALPN:
4223 case TEST_EARLY_DATA_NO_LATER_ALPN:
4224#endif
Ronald Cron2995d352024-01-18 16:59:39 +01004225 TEST_EQUAL(ret, 0);
4226 TEST_EQUAL(server_ep.ssl.handshake->early_data_accepted, 0);
4227 TEST_EQUAL(server_pattern.counter, 1);
4228 break;
Ronald Cron24da9912024-02-15 16:13:44 +01004229
4230 default:
4231 TEST_FAIL("Unknown scenario.");
Ronald Cron2995d352024-01-18 16:59:39 +01004232 }
Ronald Crona8dd81b2024-01-16 17:50:52 +01004233
Ronald Crond0a77272024-02-05 17:57:05 +01004234 TEST_EQUAL(mbedtls_test_move_handshake_to_state(
4235 &(server_ep.ssl), &(client_ep.ssl),
4236 MBEDTLS_SSL_HANDSHAKE_OVER), 0);
4237
Ronald Crona8dd81b2024-01-16 17:50:52 +01004238exit:
4239 mbedtls_test_ssl_endpoint_free(&client_ep, NULL);
4240 mbedtls_test_ssl_endpoint_free(&server_ep, NULL);
4241 mbedtls_test_free_handshake_options(&client_options);
4242 mbedtls_test_free_handshake_options(&server_options);
4243 mbedtls_ssl_session_free(&saved_session);
Ronald Cron2995d352024-01-18 16:59:39 +01004244 mbedtls_debug_set_threshold(0);
Ronald Cron095a3a52024-01-31 14:34:22 +01004245 PSA_DONE();
Ronald Crona8dd81b2024-01-16 17:50:52 +01004246}
4247/* END_CASE */
Ronald Crona7f94e42024-01-24 09:40:46 +01004248
Elena Uziunaitebed21b52024-08-27 11:56:25 +01004249/* BEGIN_CASE depends_on:MBEDTLS_SSL_EARLY_DATA:MBEDTLS_SSL_CLI_C:MBEDTLS_SSL_SRV_C:MBEDTLS_TEST_AT_LEAST_ONE_TLS1_3_CIPHERSUITE:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED:PSA_WANT_ALG_SHA_256:PSA_WANT_ECC_SECP_R1_256:PSA_WANT_ECC_SECP_R1_384:PSA_HAVE_ALG_ECDSA_VERIFY:MBEDTLS_SSL_SESSION_TICKETS */
Ronald Crond2884662024-03-03 15:03:22 +01004250void tls13_cli_early_data_state(int scenario)
Ronald Crona7f94e42024-01-24 09:40:46 +01004251{
4252 int ret = -1;
4253 mbedtls_test_ssl_endpoint client_ep, server_ep;
4254 mbedtls_test_handshake_test_options client_options;
4255 mbedtls_test_handshake_test_options server_options;
4256 mbedtls_ssl_session saved_session;
Ronald Cron2261ab22024-01-24 13:38:31 +01004257 uint16_t group_list[3] = {
4258 MBEDTLS_SSL_IANA_TLS_GROUP_SECP256R1,
4259 MBEDTLS_SSL_IANA_TLS_GROUP_SECP384R1,
4260 MBEDTLS_SSL_IANA_TLS_GROUP_NONE
4261 };
BensonLiou41bed382024-02-16 16:07:53 +08004262 uint8_t client_random[MBEDTLS_CLIENT_HELLO_RANDOM_LEN];
Ronald Crona7f94e42024-01-24 09:40:46 +01004263
4264 mbedtls_platform_zeroize(&client_ep, sizeof(client_ep));
4265 mbedtls_platform_zeroize(&server_ep, sizeof(server_ep));
4266 mbedtls_test_init_handshake_options(&client_options);
4267 mbedtls_test_init_handshake_options(&server_options);
4268 mbedtls_ssl_session_init(&saved_session);
4269
4270 PSA_INIT();
4271
4272 /*
4273 * Run first handshake to get a ticket from the server.
4274 */
4275 client_options.pk_alg = MBEDTLS_PK_ECDSA;
4276 client_options.early_data = MBEDTLS_SSL_EARLY_DATA_ENABLED;
4277 server_options.pk_alg = MBEDTLS_PK_ECDSA;
4278 server_options.early_data = MBEDTLS_SSL_EARLY_DATA_ENABLED;
Ronald Cron2261ab22024-01-24 13:38:31 +01004279 if (scenario == TEST_EARLY_DATA_HRR) {
4280 client_options.group_list = group_list;
4281 server_options.group_list = group_list;
4282 }
Ronald Crona7f94e42024-01-24 09:40:46 +01004283
4284 ret = mbedtls_test_get_tls13_ticket(&client_options, &server_options,
4285 &saved_session);
4286 TEST_EQUAL(ret, 0);
4287
4288 /*
4289 * Prepare for handshake with the ticket.
4290 */
Ronald Cron5c208d72024-01-24 10:13:30 +01004291 switch (scenario) {
4292 case TEST_EARLY_DATA_ACCEPTED:
4293 break;
4294
Ronald Cron265273e2024-01-24 11:13:19 +01004295 case TEST_EARLY_DATA_NO_INDICATION_SENT:
4296 client_options.early_data = MBEDTLS_SSL_EARLY_DATA_DISABLED;
4297 break;
4298
Ronald Crond6dba672024-01-24 12:22:24 +01004299 case TEST_EARLY_DATA_SERVER_REJECTS:
4300 server_options.early_data = MBEDTLS_SSL_EARLY_DATA_DISABLED;
4301 break;
4302
Ronald Cron2261ab22024-01-24 13:38:31 +01004303 case TEST_EARLY_DATA_HRR:
4304 server_options.group_list = group_list + 1;
4305 break;
4306
Ronald Cron5c208d72024-01-24 10:13:30 +01004307 default:
4308 TEST_FAIL("Unknown scenario.");
4309 }
4310
Ronald Crona7f94e42024-01-24 09:40:46 +01004311 ret = mbedtls_test_ssl_endpoint_init(&client_ep, MBEDTLS_SSL_IS_CLIENT,
4312 &client_options, NULL, NULL, NULL);
4313 TEST_EQUAL(ret, 0);
4314
4315 ret = mbedtls_test_ssl_endpoint_init(&server_ep, MBEDTLS_SSL_IS_SERVER,
4316 &server_options, NULL, NULL, NULL);
4317 TEST_EQUAL(ret, 0);
4318
4319 mbedtls_ssl_conf_session_tickets_cb(&server_ep.conf,
4320 mbedtls_test_ticket_write,
4321 mbedtls_test_ticket_parse,
4322 NULL);
4323
4324 ret = mbedtls_test_mock_socket_connect(&(client_ep.socket),
4325 &(server_ep.socket), 1024);
4326 TEST_EQUAL(ret, 0);
4327
4328 ret = mbedtls_ssl_set_session(&(client_ep.ssl), &saved_session);
4329 TEST_EQUAL(ret, 0);
4330
4331 /*
4332 * Go through the handshake sequence, state by state, checking the early
4333 * data status each time.
4334 */
4335 do {
4336 int state = client_ep.ssl.state;
4337
4338 /* Progress the handshake from at least one state */
4339 while (client_ep.ssl.state == state) {
4340 ret = mbedtls_ssl_handshake_step(&(client_ep.ssl));
4341 TEST_ASSERT((ret == 0) ||
4342 (ret == MBEDTLS_ERR_SSL_WANT_READ) ||
4343 (ret == MBEDTLS_ERR_SSL_WANT_WRITE));
4344 if (client_ep.ssl.state != state) {
4345 break;
4346 }
4347 ret = mbedtls_ssl_handshake_step(&(server_ep.ssl));
4348 TEST_ASSERT((ret == 0) ||
4349 (ret == MBEDTLS_ERR_SSL_WANT_READ) ||
4350 (ret == MBEDTLS_ERR_SSL_WANT_WRITE));
4351 }
4352
Ronald Cron9f2c3c02024-02-21 17:03:22 +01004353 if (client_ep.ssl.state != MBEDTLS_SSL_HANDSHAKE_OVER) {
4354 TEST_EQUAL(mbedtls_ssl_get_early_data_status(&(client_ep.ssl)),
4355 MBEDTLS_ERR_SSL_BAD_INPUT_DATA);
4356 }
4357
Ronald Crona7f94e42024-01-24 09:40:46 +01004358 switch (client_ep.ssl.state) {
4359 case MBEDTLS_SSL_CLIENT_HELLO:
Ronald Cron5c208d72024-01-24 10:13:30 +01004360 switch (scenario) {
Ronald Cron265273e2024-01-24 11:13:19 +01004361 case TEST_EARLY_DATA_ACCEPTED: /* Intentional fallthrough */
Ronald Crond6dba672024-01-24 12:22:24 +01004362 case TEST_EARLY_DATA_NO_INDICATION_SENT: /* Intentional fallthrough */
4363 case TEST_EARLY_DATA_SERVER_REJECTS:
Ronald Crond2884662024-03-03 15:03:22 +01004364 TEST_EQUAL(client_ep.ssl.early_data_state,
Ronald Cron05d7cfb2024-03-03 15:39:30 +01004365 MBEDTLS_SSL_EARLY_DATA_STATE_IDLE);
Ronald Cron5c208d72024-01-24 10:13:30 +01004366 break;
Ronald Cron2261ab22024-01-24 13:38:31 +01004367
4368 case TEST_EARLY_DATA_HRR:
Ronald Cron5fbd2702024-02-14 10:03:36 +01004369 if (!client_ep.ssl.handshake->hello_retry_request_flag) {
Ronald Crond2884662024-03-03 15:03:22 +01004370 TEST_EQUAL(client_ep.ssl.early_data_state,
Ronald Cron05d7cfb2024-03-03 15:39:30 +01004371 MBEDTLS_SSL_EARLY_DATA_STATE_IDLE);
Ronald Cron2261ab22024-01-24 13:38:31 +01004372 } else {
Ronald Crond2884662024-03-03 15:03:22 +01004373 TEST_EQUAL(client_ep.ssl.early_data_state,
4374 MBEDTLS_SSL_EARLY_DATA_STATE_REJECTED);
Ronald Cron2261ab22024-01-24 13:38:31 +01004375 }
4376 break;
Ronald Cron24da9912024-02-15 16:13:44 +01004377
4378 default:
4379 TEST_FAIL("Unknown scenario.");
Ronald Cron5c208d72024-01-24 10:13:30 +01004380 }
Ronald Crona7f94e42024-01-24 09:40:46 +01004381 break;
4382
4383 case MBEDTLS_SSL_SERVER_HELLO:
Ronald Cron5c208d72024-01-24 10:13:30 +01004384 switch (scenario) {
Ronald Crond6dba672024-01-24 12:22:24 +01004385 case TEST_EARLY_DATA_ACCEPTED: /* Intentional fallthrough */
4386 case TEST_EARLY_DATA_SERVER_REJECTS:
Ronald Crond2884662024-03-03 15:03:22 +01004387 TEST_EQUAL(client_ep.ssl.early_data_state,
4388 MBEDTLS_SSL_EARLY_DATA_STATE_CAN_WRITE);
Ronald Cron5c208d72024-01-24 10:13:30 +01004389 break;
Ronald Cron265273e2024-01-24 11:13:19 +01004390
4391 case TEST_EARLY_DATA_NO_INDICATION_SENT:
Ronald Crond2884662024-03-03 15:03:22 +01004392 TEST_EQUAL(client_ep.ssl.early_data_state,
Ronald Cron3c5a6832024-03-03 15:46:57 +01004393 MBEDTLS_SSL_EARLY_DATA_STATE_NO_IND_SENT);
Ronald Cron265273e2024-01-24 11:13:19 +01004394 break;
Ronald Cron2261ab22024-01-24 13:38:31 +01004395
4396 case TEST_EARLY_DATA_HRR:
Ronald Cron5fbd2702024-02-14 10:03:36 +01004397 if (!client_ep.ssl.handshake->hello_retry_request_flag) {
Ronald Crond2884662024-03-03 15:03:22 +01004398 TEST_EQUAL(client_ep.ssl.early_data_state,
4399 MBEDTLS_SSL_EARLY_DATA_STATE_CAN_WRITE);
BensonLioubedd2512024-03-13 20:21:26 +08004400 memcpy(client_random,
4401 client_ep.ssl.handshake->randbytes,
4402 MBEDTLS_CLIENT_HELLO_RANDOM_LEN);
Ronald Cron2261ab22024-01-24 13:38:31 +01004403 } else {
Ronald Crond2884662024-03-03 15:03:22 +01004404 TEST_EQUAL(client_ep.ssl.early_data_state,
4405 MBEDTLS_SSL_EARLY_DATA_STATE_REJECTED);
BensonLioubedd2512024-03-13 20:21:26 +08004406 TEST_MEMORY_COMPARE(client_random,
4407 MBEDTLS_CLIENT_HELLO_RANDOM_LEN,
4408 client_ep.ssl.handshake->randbytes,
4409 MBEDTLS_CLIENT_HELLO_RANDOM_LEN);
Ronald Cron2261ab22024-01-24 13:38:31 +01004410 }
4411 break;
Ronald Cron24da9912024-02-15 16:13:44 +01004412
4413 default:
4414 TEST_FAIL("Unknown scenario.");
Ronald Cron5c208d72024-01-24 10:13:30 +01004415 }
Ronald Crona7f94e42024-01-24 09:40:46 +01004416 break;
4417
4418 case MBEDTLS_SSL_ENCRYPTED_EXTENSIONS:
Ronald Cron5c208d72024-01-24 10:13:30 +01004419 switch (scenario) {
Ronald Crond6dba672024-01-24 12:22:24 +01004420 case TEST_EARLY_DATA_ACCEPTED: /* Intentional fallthrough */
4421 case TEST_EARLY_DATA_SERVER_REJECTS:
Ronald Crond2884662024-03-03 15:03:22 +01004422 TEST_EQUAL(client_ep.ssl.early_data_state,
4423 MBEDTLS_SSL_EARLY_DATA_STATE_CAN_WRITE);
Ronald Cron5c208d72024-01-24 10:13:30 +01004424 break;
Ronald Cron265273e2024-01-24 11:13:19 +01004425
4426 case TEST_EARLY_DATA_NO_INDICATION_SENT:
Ronald Crond2884662024-03-03 15:03:22 +01004427 TEST_EQUAL(client_ep.ssl.early_data_state,
Ronald Cron3c5a6832024-03-03 15:46:57 +01004428 MBEDTLS_SSL_EARLY_DATA_STATE_NO_IND_SENT);
Ronald Cron265273e2024-01-24 11:13:19 +01004429 break;
Ronald Cron2261ab22024-01-24 13:38:31 +01004430
4431 case TEST_EARLY_DATA_HRR:
Ronald Crond2884662024-03-03 15:03:22 +01004432 TEST_EQUAL(client_ep.ssl.early_data_state,
4433 MBEDTLS_SSL_EARLY_DATA_STATE_REJECTED);
Ronald Cron2261ab22024-01-24 13:38:31 +01004434 break;
Ronald Cron24da9912024-02-15 16:13:44 +01004435
4436 default:
4437 TEST_FAIL("Unknown scenario.");
Ronald Cron5c208d72024-01-24 10:13:30 +01004438 }
Ronald Crona7f94e42024-01-24 09:40:46 +01004439 break;
4440
4441 case MBEDTLS_SSL_SERVER_FINISHED:
Ronald Cron5c208d72024-01-24 10:13:30 +01004442 switch (scenario) {
4443 case TEST_EARLY_DATA_ACCEPTED:
Ronald Crond2884662024-03-03 15:03:22 +01004444 TEST_EQUAL(client_ep.ssl.early_data_state,
4445 MBEDTLS_SSL_EARLY_DATA_STATE_ACCEPTED);
Ronald Cron5c208d72024-01-24 10:13:30 +01004446 break;
Ronald Cron265273e2024-01-24 11:13:19 +01004447
4448 case TEST_EARLY_DATA_NO_INDICATION_SENT:
Ronald Crond2884662024-03-03 15:03:22 +01004449 TEST_EQUAL(client_ep.ssl.early_data_state,
Ronald Cron3c5a6832024-03-03 15:46:57 +01004450 MBEDTLS_SSL_EARLY_DATA_STATE_NO_IND_SENT);
Ronald Cron265273e2024-01-24 11:13:19 +01004451 break;
Ronald Crond6dba672024-01-24 12:22:24 +01004452
Ronald Cron2261ab22024-01-24 13:38:31 +01004453 case TEST_EARLY_DATA_SERVER_REJECTS: /* Intentional fallthrough */
4454 case TEST_EARLY_DATA_HRR:
Ronald Crond2884662024-03-03 15:03:22 +01004455 TEST_EQUAL(client_ep.ssl.early_data_state,
4456 MBEDTLS_SSL_EARLY_DATA_STATE_REJECTED);
Ronald Crond6dba672024-01-24 12:22:24 +01004457 break;
Ronald Cron24da9912024-02-15 16:13:44 +01004458
4459 default:
4460 TEST_FAIL("Unknown scenario.");
Ronald Cron5c208d72024-01-24 10:13:30 +01004461 }
Ronald Crona7f94e42024-01-24 09:40:46 +01004462 break;
4463
4464 case MBEDTLS_SSL_END_OF_EARLY_DATA:
Ronald Cron265273e2024-01-24 11:13:19 +01004465 TEST_EQUAL(scenario, TEST_EARLY_DATA_ACCEPTED);
Ronald Crond2884662024-03-03 15:03:22 +01004466 TEST_EQUAL(client_ep.ssl.early_data_state,
4467 MBEDTLS_SSL_EARLY_DATA_STATE_SERVER_FINISHED_RECEIVED);
Ronald Crona7f94e42024-01-24 09:40:46 +01004468 break;
4469
4470 case MBEDTLS_SSL_CLIENT_CERTIFICATE:
Ronald Cron5c208d72024-01-24 10:13:30 +01004471 switch (scenario) {
4472 case TEST_EARLY_DATA_ACCEPTED:
Ronald Crond2884662024-03-03 15:03:22 +01004473 TEST_EQUAL(client_ep.ssl.early_data_state,
4474 MBEDTLS_SSL_EARLY_DATA_STATE_SERVER_FINISHED_RECEIVED);
Ronald Cron5c208d72024-01-24 10:13:30 +01004475 break;
Ronald Cron265273e2024-01-24 11:13:19 +01004476
4477 case TEST_EARLY_DATA_NO_INDICATION_SENT:
Ronald Crond2884662024-03-03 15:03:22 +01004478 TEST_EQUAL(client_ep.ssl.early_data_state,
Ronald Cron3c5a6832024-03-03 15:46:57 +01004479 MBEDTLS_SSL_EARLY_DATA_STATE_NO_IND_SENT);
Ronald Cron265273e2024-01-24 11:13:19 +01004480 break;
Ronald Crond6dba672024-01-24 12:22:24 +01004481
Ronald Cron2261ab22024-01-24 13:38:31 +01004482 case TEST_EARLY_DATA_SERVER_REJECTS: /* Intentional fallthrough */
4483 case TEST_EARLY_DATA_HRR:
Ronald Crond2884662024-03-03 15:03:22 +01004484 TEST_EQUAL(client_ep.ssl.early_data_state,
4485 MBEDTLS_SSL_EARLY_DATA_STATE_REJECTED);
Ronald Crond6dba672024-01-24 12:22:24 +01004486 break;
Ronald Cron24da9912024-02-15 16:13:44 +01004487
4488 default:
4489 TEST_FAIL("Unknown scenario.");
Ronald Cron5c208d72024-01-24 10:13:30 +01004490 }
Ronald Crona7f94e42024-01-24 09:40:46 +01004491 break;
4492
4493 case MBEDTLS_SSL_CLIENT_FINISHED:
Ronald Cron5c208d72024-01-24 10:13:30 +01004494 switch (scenario) {
4495 case TEST_EARLY_DATA_ACCEPTED:
Ronald Crond2884662024-03-03 15:03:22 +01004496 TEST_EQUAL(client_ep.ssl.early_data_state,
4497 MBEDTLS_SSL_EARLY_DATA_STATE_SERVER_FINISHED_RECEIVED);
Ronald Cron5c208d72024-01-24 10:13:30 +01004498 break;
Ronald Cron265273e2024-01-24 11:13:19 +01004499
4500 case TEST_EARLY_DATA_NO_INDICATION_SENT:
Ronald Crond2884662024-03-03 15:03:22 +01004501 TEST_EQUAL(client_ep.ssl.early_data_state,
Ronald Cron3c5a6832024-03-03 15:46:57 +01004502 MBEDTLS_SSL_EARLY_DATA_STATE_NO_IND_SENT);
Ronald Cron265273e2024-01-24 11:13:19 +01004503 break;
Ronald Crond6dba672024-01-24 12:22:24 +01004504
Ronald Cron2261ab22024-01-24 13:38:31 +01004505 case TEST_EARLY_DATA_SERVER_REJECTS: /* Intentional fallthrough */
4506 case TEST_EARLY_DATA_HRR:
Ronald Crond2884662024-03-03 15:03:22 +01004507 TEST_EQUAL(client_ep.ssl.early_data_state,
4508 MBEDTLS_SSL_EARLY_DATA_STATE_REJECTED);
Ronald Crond6dba672024-01-24 12:22:24 +01004509 break;
Ronald Cron24da9912024-02-15 16:13:44 +01004510
4511 default:
4512 TEST_FAIL("Unknown scenario.");
Ronald Cron5c208d72024-01-24 10:13:30 +01004513 }
Ronald Crona7f94e42024-01-24 09:40:46 +01004514 break;
4515
4516#if defined(MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE)
4517 case MBEDTLS_SSL_CLIENT_CCS_AFTER_CLIENT_HELLO:
Ronald Cron5c208d72024-01-24 10:13:30 +01004518 switch (scenario) {
Ronald Crond6dba672024-01-24 12:22:24 +01004519 case TEST_EARLY_DATA_ACCEPTED: /* Intentional fallthrough */
Ronald Cron2261ab22024-01-24 13:38:31 +01004520 case TEST_EARLY_DATA_SERVER_REJECTS: /* Intentional fallthrough */
4521 case TEST_EARLY_DATA_HRR:
Ronald Crond2884662024-03-03 15:03:22 +01004522 TEST_EQUAL(client_ep.ssl.early_data_state,
Ronald Cron3641df22024-03-03 16:10:58 +01004523 MBEDTLS_SSL_EARLY_DATA_STATE_IND_SENT);
Ronald Cron5c208d72024-01-24 10:13:30 +01004524 break;
Ronald Cron24da9912024-02-15 16:13:44 +01004525
4526 default:
4527 TEST_FAIL("Unexpected or unknown scenario.");
Ronald Cron5c208d72024-01-24 10:13:30 +01004528 }
Ronald Crona7f94e42024-01-24 09:40:46 +01004529 break;
Ronald Cron265273e2024-01-24 11:13:19 +01004530
Ronald Cron2261ab22024-01-24 13:38:31 +01004531 case MBEDTLS_SSL_CLIENT_CCS_BEFORE_2ND_CLIENT_HELLO:
4532 TEST_ASSERT(scenario == TEST_EARLY_DATA_HRR);
Ronald Crond2884662024-03-03 15:03:22 +01004533 TEST_EQUAL(client_ep.ssl.early_data_state,
4534 MBEDTLS_SSL_EARLY_DATA_STATE_REJECTED);
Ronald Cron2261ab22024-01-24 13:38:31 +01004535 break;
4536
Ronald Cron265273e2024-01-24 11:13:19 +01004537 case MBEDTLS_SSL_CLIENT_CCS_AFTER_SERVER_FINISHED:
Ronald Crond6dba672024-01-24 12:22:24 +01004538 switch (scenario) {
4539 case TEST_EARLY_DATA_NO_INDICATION_SENT:
Ronald Crond2884662024-03-03 15:03:22 +01004540 TEST_EQUAL(client_ep.ssl.early_data_state,
Ronald Cron3c5a6832024-03-03 15:46:57 +01004541 MBEDTLS_SSL_EARLY_DATA_STATE_NO_IND_SENT);
Ronald Crond6dba672024-01-24 12:22:24 +01004542 break;
4543
Ronald Cron2261ab22024-01-24 13:38:31 +01004544 case TEST_EARLY_DATA_SERVER_REJECTS: /* Intentional fallthrough */
4545 case TEST_EARLY_DATA_HRR:
Ronald Crond2884662024-03-03 15:03:22 +01004546 TEST_EQUAL(client_ep.ssl.early_data_state,
4547 MBEDTLS_SSL_EARLY_DATA_STATE_REJECTED);
Ronald Crond6dba672024-01-24 12:22:24 +01004548 break;
Ronald Cron24da9912024-02-15 16:13:44 +01004549
4550 default:
4551 TEST_FAIL("Unexpected or unknown scenario.");
Ronald Crond6dba672024-01-24 12:22:24 +01004552 }
Ronald Cron265273e2024-01-24 11:13:19 +01004553 break;
Ronald Crona7f94e42024-01-24 09:40:46 +01004554#endif /* MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE */
4555
4556 case MBEDTLS_SSL_FLUSH_BUFFERS: /* Intentional fallthrough */
4557 case MBEDTLS_SSL_HANDSHAKE_WRAPUP: /* Intentional fallthrough */
4558 case MBEDTLS_SSL_HANDSHAKE_OVER:
Ronald Cron5c208d72024-01-24 10:13:30 +01004559 switch (scenario) {
4560 case TEST_EARLY_DATA_ACCEPTED:
Ronald Crond2884662024-03-03 15:03:22 +01004561 TEST_EQUAL(client_ep.ssl.early_data_state,
4562 MBEDTLS_SSL_EARLY_DATA_STATE_SERVER_FINISHED_RECEIVED);
Ronald Cron5c208d72024-01-24 10:13:30 +01004563 break;
Ronald Cron265273e2024-01-24 11:13:19 +01004564
4565 case TEST_EARLY_DATA_NO_INDICATION_SENT:
Ronald Crond2884662024-03-03 15:03:22 +01004566 TEST_EQUAL(client_ep.ssl.early_data_state,
Ronald Cron3c5a6832024-03-03 15:46:57 +01004567 MBEDTLS_SSL_EARLY_DATA_STATE_NO_IND_SENT);
Ronald Cron265273e2024-01-24 11:13:19 +01004568 break;
Ronald Crond6dba672024-01-24 12:22:24 +01004569
Ronald Cron2261ab22024-01-24 13:38:31 +01004570 case TEST_EARLY_DATA_SERVER_REJECTS: /* Intentional fallthrough */
4571 case TEST_EARLY_DATA_HRR:
Ronald Crond2884662024-03-03 15:03:22 +01004572 TEST_EQUAL(client_ep.ssl.early_data_state,
4573 MBEDTLS_SSL_EARLY_DATA_STATE_REJECTED);
Ronald Crond6dba672024-01-24 12:22:24 +01004574 break;
Ronald Cron24da9912024-02-15 16:13:44 +01004575
4576 default:
4577 TEST_FAIL("Unknown scenario.");
Ronald Cron5c208d72024-01-24 10:13:30 +01004578 }
Ronald Crona7f94e42024-01-24 09:40:46 +01004579 break;
4580
4581 default:
4582 TEST_FAIL("Unexpected state.");
4583 }
4584 } while (client_ep.ssl.state != MBEDTLS_SSL_HANDSHAKE_OVER);
4585
Ronald Cron9f2c3c02024-02-21 17:03:22 +01004586 ret = mbedtls_ssl_get_early_data_status(&(client_ep.ssl));
4587 switch (scenario) {
4588 case TEST_EARLY_DATA_ACCEPTED:
4589 TEST_EQUAL(ret, MBEDTLS_SSL_EARLY_DATA_STATUS_ACCEPTED);
4590 break;
4591
4592 case TEST_EARLY_DATA_NO_INDICATION_SENT:
Ronald Cron840de7f2024-03-11 17:49:35 +01004593 TEST_EQUAL(ret, MBEDTLS_SSL_EARLY_DATA_STATUS_NOT_INDICATED);
Ronald Cron9f2c3c02024-02-21 17:03:22 +01004594 break;
4595
4596 case TEST_EARLY_DATA_SERVER_REJECTS: /* Intentional fallthrough */
4597 case TEST_EARLY_DATA_HRR:
4598 TEST_EQUAL(ret, MBEDTLS_SSL_EARLY_DATA_STATUS_REJECTED);
4599 break;
4600
4601 default:
4602 TEST_FAIL("Unknown scenario.");
4603 }
4604
Ronald Crondcb09ca2024-02-22 12:12:45 +01004605 ret = mbedtls_ssl_get_early_data_status(&(server_ep.ssl));
4606 TEST_EQUAL(ret, MBEDTLS_ERR_SSL_BAD_INPUT_DATA);
4607
Ronald Crona7f94e42024-01-24 09:40:46 +01004608#if defined(MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE)
Ronald Cron5fbd2702024-02-14 10:03:36 +01004609 TEST_EQUAL(client_ep.ssl.handshake->ccs_sent, 1);
Ronald Crona7f94e42024-01-24 09:40:46 +01004610#endif
4611
4612exit:
4613 mbedtls_test_ssl_endpoint_free(&client_ep, NULL);
4614 mbedtls_test_ssl_endpoint_free(&server_ep, NULL);
4615 mbedtls_test_free_handshake_options(&client_options);
4616 mbedtls_test_free_handshake_options(&server_options);
4617 mbedtls_ssl_session_free(&saved_session);
4618 PSA_DONE();
4619}
4620/* END_CASE */
Ronald Cron2fbbba92024-01-26 20:13:42 +01004621
Elena Uziunaitebed21b52024-08-27 11:56:25 +01004622/* BEGIN_CASE depends_on:MBEDTLS_SSL_EARLY_DATA:MBEDTLS_SSL_CLI_C:MBEDTLS_SSL_SRV_C:MBEDTLS_TEST_AT_LEAST_ONE_TLS1_3_CIPHERSUITE:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED:PSA_WANT_ALG_SHA_256:PSA_WANT_ECC_SECP_R1_256:PSA_WANT_ECC_SECP_R1_384:PSA_HAVE_ALG_ECDSA_VERIFY:MBEDTLS_SSL_SESSION_TICKETS */
Ronald Cron2fbbba92024-01-26 20:13:42 +01004623void tls13_write_early_data(int scenario)
4624{
4625 int ret = -1;
4626 mbedtls_test_ssl_endpoint client_ep, server_ep;
4627 mbedtls_test_handshake_test_options client_options;
4628 mbedtls_test_handshake_test_options server_options;
4629 mbedtls_ssl_session saved_session;
Ronald Cronb3d42fd2024-01-26 11:54:06 +01004630 uint16_t group_list[3] = {
4631 MBEDTLS_SSL_IANA_TLS_GROUP_SECP256R1,
4632 MBEDTLS_SSL_IANA_TLS_GROUP_SECP384R1,
4633 MBEDTLS_SSL_IANA_TLS_GROUP_NONE
4634 };
Ronald Cron00046002024-02-21 16:00:12 +01004635 int beyond_first_hello = 0;
Ronald Cron2fbbba92024-01-26 20:13:42 +01004636
4637 mbedtls_platform_zeroize(&client_ep, sizeof(client_ep));
4638 mbedtls_platform_zeroize(&server_ep, sizeof(server_ep));
4639 mbedtls_test_init_handshake_options(&client_options);
4640 mbedtls_test_init_handshake_options(&server_options);
4641 mbedtls_ssl_session_init(&saved_session);
4642
4643 PSA_INIT();
4644
4645 /*
4646 * Run first handshake to get a ticket from the server.
4647 */
4648 client_options.pk_alg = MBEDTLS_PK_ECDSA;
4649 client_options.early_data = MBEDTLS_SSL_EARLY_DATA_ENABLED;
4650 server_options.pk_alg = MBEDTLS_PK_ECDSA;
4651 server_options.early_data = MBEDTLS_SSL_EARLY_DATA_ENABLED;
Ronald Cronb3d42fd2024-01-26 11:54:06 +01004652 if (scenario == TEST_EARLY_DATA_HRR) {
4653 client_options.group_list = group_list;
4654 server_options.group_list = group_list;
4655 }
Ronald Cron2fbbba92024-01-26 20:13:42 +01004656
4657 ret = mbedtls_test_get_tls13_ticket(&client_options, &server_options,
4658 &saved_session);
4659 TEST_EQUAL(ret, 0);
4660
Ronald Cron2fbbba92024-01-26 20:13:42 +01004661 /*
4662 * Prepare for handshake with the ticket.
4663 */
4664 switch (scenario) {
4665 case TEST_EARLY_DATA_ACCEPTED:
4666 break;
4667
Ronald Cron8fe2b012024-01-26 20:25:00 +01004668 case TEST_EARLY_DATA_NO_INDICATION_SENT:
4669 client_options.early_data = MBEDTLS_SSL_EARLY_DATA_DISABLED;
4670 break;
4671
Ronald Cron05600e22024-01-26 10:23:31 +01004672 case TEST_EARLY_DATA_SERVER_REJECTS:
4673 server_options.early_data = MBEDTLS_SSL_EARLY_DATA_DISABLED;
4674 break;
4675
Ronald Cronb3d42fd2024-01-26 11:54:06 +01004676 case TEST_EARLY_DATA_HRR:
Ronald Cron52472102024-03-08 11:29:28 +01004677 /*
4678 * Remove server support for the group negotiated in
Ronald Crone1295fa2024-03-08 17:03:16 +01004679 * mbedtls_test_get_tls13_ticket() forcing a HelloRetryRequest.
Ronald Cron52472102024-03-08 11:29:28 +01004680 */
Ronald Cronb3d42fd2024-01-26 11:54:06 +01004681 server_options.group_list = group_list + 1;
4682 break;
4683
Ronald Cron2fbbba92024-01-26 20:13:42 +01004684 default:
4685 TEST_FAIL("Unknown scenario.");
4686 }
4687
4688 ret = mbedtls_test_ssl_endpoint_init(&client_ep, MBEDTLS_SSL_IS_CLIENT,
4689 &client_options, NULL, NULL, NULL);
4690 TEST_EQUAL(ret, 0);
4691
4692 ret = mbedtls_test_ssl_endpoint_init(&server_ep, MBEDTLS_SSL_IS_SERVER,
4693 &server_options, NULL, NULL, NULL);
4694 TEST_EQUAL(ret, 0);
4695
4696 mbedtls_ssl_conf_session_tickets_cb(&server_ep.conf,
4697 mbedtls_test_ticket_write,
4698 mbedtls_test_ticket_parse,
4699 NULL);
4700
4701 ret = mbedtls_test_mock_socket_connect(&(client_ep.socket),
4702 &(server_ep.socket), 1024);
4703 TEST_EQUAL(ret, 0);
4704
4705 ret = mbedtls_ssl_set_session(&(client_ep.ssl), &saved_session);
4706 TEST_EQUAL(ret, 0);
4707
4708 /*
Ronald Crond4069242024-02-21 13:45:52 +01004709 * Run handshakes going one state further in the handshake sequence at each
4710 * loop up to the point where we reach the MBEDTLS_SSL_HANDSHAKE_OVER
4711 * state. For each reached handshake state, check the result of the call
Ronald Cronbf5e9092024-02-21 15:31:36 +01004712 * to mbedtls_ssl_write_early_data(), make sure we can complete the
4713 * handshake successfully and then reset the connection to restart the
4714 * handshake from scratch.
Ronald Cron2fbbba92024-01-26 20:13:42 +01004715 */
Ronald Cron00046002024-02-21 16:00:12 +01004716 do {
4717 int client_state = client_ep.ssl.state;
4718 int previous_client_state;
4719 const char *early_data_string = "This is early data.";
4720 const unsigned char *early_data = (const unsigned char *) early_data_string;
4721 size_t early_data_len = strlen(early_data_string);
4722 int write_early_data_ret, read_early_data_ret;
4723 unsigned char read_buf[64];
Ronald Cron2fbbba92024-01-26 20:13:42 +01004724
Ronald Cron2fbbba92024-01-26 20:13:42 +01004725 write_early_data_ret = mbedtls_ssl_write_early_data(&(client_ep.ssl),
4726 early_data,
4727 early_data_len);
4728
Ronald Cron8fe2b012024-01-26 20:25:00 +01004729 if (scenario == TEST_EARLY_DATA_NO_INDICATION_SENT) {
4730 TEST_EQUAL(write_early_data_ret, MBEDTLS_ERR_SSL_CANNOT_WRITE_EARLY_DATA);
4731 TEST_EQUAL(client_ep.ssl.state, client_state);
Ronald Cronbf5e9092024-02-21 15:31:36 +01004732 goto complete_handshake;
Ronald Cron8fe2b012024-01-26 20:25:00 +01004733 }
4734
Ronald Cron2fbbba92024-01-26 20:13:42 +01004735 switch (client_state) {
Ronald Cron00046002024-02-21 16:00:12 +01004736 case MBEDTLS_SSL_HELLO_REQUEST: /* Intentional fallthrough */
Ronald Cron2fbbba92024-01-26 20:13:42 +01004737 case MBEDTLS_SSL_CLIENT_HELLO:
4738 switch (scenario) {
Ronald Cron05600e22024-01-26 10:23:31 +01004739 case TEST_EARLY_DATA_ACCEPTED: /* Intentional fallthrough */
4740 case TEST_EARLY_DATA_SERVER_REJECTS:
Ronald Cron2fbbba92024-01-26 20:13:42 +01004741 TEST_EQUAL(write_early_data_ret, early_data_len);
4742 TEST_EQUAL(client_ep.ssl.state, MBEDTLS_SSL_SERVER_HELLO);
4743 break;
Ronald Cronb3d42fd2024-01-26 11:54:06 +01004744
4745 case TEST_EARLY_DATA_HRR:
Ronald Cron5fbd2702024-02-14 10:03:36 +01004746 if (!client_ep.ssl.handshake->hello_retry_request_flag) {
Ronald Cronb3d42fd2024-01-26 11:54:06 +01004747 TEST_EQUAL(write_early_data_ret, early_data_len);
4748 TEST_EQUAL(client_ep.ssl.state, MBEDTLS_SSL_SERVER_HELLO);
4749 } else {
4750 beyond_first_hello = 1;
4751 TEST_EQUAL(write_early_data_ret,
4752 MBEDTLS_ERR_SSL_CANNOT_WRITE_EARLY_DATA);
4753 TEST_EQUAL(client_ep.ssl.state, MBEDTLS_SSL_CLIENT_HELLO);
4754 }
4755 break;
Ronald Cron24da9912024-02-15 16:13:44 +01004756
4757 default:
4758 TEST_FAIL("Unknown scenario.");
Ronald Cron2fbbba92024-01-26 20:13:42 +01004759 }
4760 break;
4761
4762 case MBEDTLS_SSL_SERVER_HELLO:
4763 switch (scenario) {
Ronald Cron05600e22024-01-26 10:23:31 +01004764 case TEST_EARLY_DATA_ACCEPTED: /* Intentional fallthrough */
4765 case TEST_EARLY_DATA_SERVER_REJECTS:
Ronald Cron2fbbba92024-01-26 20:13:42 +01004766 TEST_EQUAL(write_early_data_ret, early_data_len);
4767 TEST_EQUAL(client_ep.ssl.state, MBEDTLS_SSL_SERVER_HELLO);
4768 break;
Ronald Cronb3d42fd2024-01-26 11:54:06 +01004769
4770 case TEST_EARLY_DATA_HRR:
Ronald Cron5fbd2702024-02-14 10:03:36 +01004771 if (!client_ep.ssl.handshake->hello_retry_request_flag) {
Ronald Cronb3d42fd2024-01-26 11:54:06 +01004772 TEST_EQUAL(write_early_data_ret, early_data_len);
4773 TEST_EQUAL(client_ep.ssl.state, MBEDTLS_SSL_SERVER_HELLO);
4774 } else {
4775 TEST_EQUAL(write_early_data_ret,
4776 MBEDTLS_ERR_SSL_CANNOT_WRITE_EARLY_DATA);
4777 TEST_EQUAL(client_ep.ssl.state, MBEDTLS_SSL_SERVER_HELLO);
4778 }
4779 break;
Ronald Cron24da9912024-02-15 16:13:44 +01004780
4781 default:
4782 TEST_FAIL("Unknown scenario.");
Ronald Cron2fbbba92024-01-26 20:13:42 +01004783 }
4784 break;
4785
4786 case MBEDTLS_SSL_ENCRYPTED_EXTENSIONS:
4787 switch (scenario) {
Ronald Cron05600e22024-01-26 10:23:31 +01004788 case TEST_EARLY_DATA_ACCEPTED: /* Intentional fallthrough */
4789 case TEST_EARLY_DATA_SERVER_REJECTS:
Ronald Cron2fbbba92024-01-26 20:13:42 +01004790 TEST_EQUAL(write_early_data_ret, early_data_len);
4791 TEST_EQUAL(client_ep.ssl.state, MBEDTLS_SSL_ENCRYPTED_EXTENSIONS);
4792 break;
Ronald Cronb3d42fd2024-01-26 11:54:06 +01004793
4794 case TEST_EARLY_DATA_HRR:
4795 TEST_EQUAL(write_early_data_ret, MBEDTLS_ERR_SSL_CANNOT_WRITE_EARLY_DATA);
4796 TEST_EQUAL(client_ep.ssl.state, MBEDTLS_SSL_ENCRYPTED_EXTENSIONS);
4797 break;
Ronald Cron24da9912024-02-15 16:13:44 +01004798
4799 default:
4800 TEST_FAIL("Unknown scenario.");
Ronald Cron2fbbba92024-01-26 20:13:42 +01004801 }
4802 break;
4803
4804 case MBEDTLS_SSL_SERVER_FINISHED:
4805 switch (scenario) {
4806 case TEST_EARLY_DATA_ACCEPTED:
4807 TEST_EQUAL(write_early_data_ret, early_data_len);
4808 TEST_EQUAL(client_ep.ssl.state, MBEDTLS_SSL_SERVER_FINISHED);
4809 break;
Ronald Cron05600e22024-01-26 10:23:31 +01004810
4811 case TEST_EARLY_DATA_SERVER_REJECTS:
4812 TEST_EQUAL(write_early_data_ret, MBEDTLS_ERR_SSL_CANNOT_WRITE_EARLY_DATA);
4813 TEST_EQUAL(client_ep.ssl.state, MBEDTLS_SSL_SERVER_FINISHED);
4814 break;
Ronald Cronb3d42fd2024-01-26 11:54:06 +01004815
4816 case TEST_EARLY_DATA_HRR:
4817 TEST_EQUAL(write_early_data_ret, MBEDTLS_ERR_SSL_CANNOT_WRITE_EARLY_DATA);
4818 TEST_EQUAL(client_ep.ssl.state, MBEDTLS_SSL_SERVER_FINISHED);
4819 break;
Ronald Cron24da9912024-02-15 16:13:44 +01004820
4821 default:
4822 TEST_FAIL("Unknown scenario.");
Ronald Cron2fbbba92024-01-26 20:13:42 +01004823 }
4824 break;
4825
4826 case MBEDTLS_SSL_END_OF_EARLY_DATA:
4827 TEST_EQUAL(scenario, TEST_EARLY_DATA_ACCEPTED);
4828 TEST_EQUAL(write_early_data_ret, MBEDTLS_ERR_SSL_CANNOT_WRITE_EARLY_DATA);
4829 TEST_EQUAL(client_ep.ssl.state, MBEDTLS_SSL_END_OF_EARLY_DATA);
4830 break;
4831
4832#if defined(MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE)
4833 case MBEDTLS_SSL_CLIENT_CCS_AFTER_CLIENT_HELLO:
4834 switch (scenario) {
Ronald Cron05600e22024-01-26 10:23:31 +01004835 case TEST_EARLY_DATA_ACCEPTED: /* Intentional fallthrough */
Ronald Cronb3d42fd2024-01-26 11:54:06 +01004836 case TEST_EARLY_DATA_SERVER_REJECTS: /* Intentional fallthrough */
4837 case TEST_EARLY_DATA_HRR:
Ronald Cron2fbbba92024-01-26 20:13:42 +01004838 TEST_EQUAL(write_early_data_ret, early_data_len);
4839 TEST_EQUAL(client_ep.ssl.state, MBEDTLS_SSL_SERVER_HELLO);
4840 break;
Ronald Cron24da9912024-02-15 16:13:44 +01004841 default:
4842 TEST_FAIL("Unknown scenario.");
Ronald Cron2fbbba92024-01-26 20:13:42 +01004843 }
4844 break;
4845
Ronald Cronb3d42fd2024-01-26 11:54:06 +01004846 case MBEDTLS_SSL_CLIENT_CCS_BEFORE_2ND_CLIENT_HELLO:
4847 TEST_EQUAL(scenario, TEST_EARLY_DATA_HRR);
4848 TEST_EQUAL(write_early_data_ret, MBEDTLS_ERR_SSL_CANNOT_WRITE_EARLY_DATA);
4849 TEST_EQUAL(client_ep.ssl.state, MBEDTLS_SSL_CLIENT_CCS_BEFORE_2ND_CLIENT_HELLO);
4850 break;
4851
Ronald Cron05600e22024-01-26 10:23:31 +01004852 case MBEDTLS_SSL_CLIENT_CCS_AFTER_SERVER_FINISHED:
Ronald Cron05600e22024-01-26 10:23:31 +01004853 switch (scenario) {
Ronald Cronb3d42fd2024-01-26 11:54:06 +01004854 case TEST_EARLY_DATA_SERVER_REJECTS: /* Intentional fallthrough */
4855 case TEST_EARLY_DATA_HRR:
4856 TEST_EQUAL(write_early_data_ret,
4857 MBEDTLS_ERR_SSL_CANNOT_WRITE_EARLY_DATA);
4858 TEST_EQUAL(client_ep.ssl.state,
4859 MBEDTLS_SSL_CLIENT_CCS_AFTER_SERVER_FINISHED);
Ronald Cron05600e22024-01-26 10:23:31 +01004860 break;
Ronald Cron24da9912024-02-15 16:13:44 +01004861 default:
4862 TEST_FAIL("Unexpected or unknown scenario.");
Ronald Cron05600e22024-01-26 10:23:31 +01004863 }
4864 break;
Ronald Cron2fbbba92024-01-26 20:13:42 +01004865#endif /* MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE */
4866
4867 case MBEDTLS_SSL_CLIENT_CERTIFICATE: /* Intentional fallthrough */
4868 case MBEDTLS_SSL_CLIENT_FINISHED: /* Intentional fallthrough */
4869 case MBEDTLS_SSL_FLUSH_BUFFERS: /* Intentional fallthrough */
4870 case MBEDTLS_SSL_HANDSHAKE_WRAPUP: /* Intentional fallthrough */
4871 case MBEDTLS_SSL_HANDSHAKE_OVER:
4872 switch (scenario) {
Ronald Cron05600e22024-01-26 10:23:31 +01004873 case TEST_EARLY_DATA_ACCEPTED: /* Intentional fallthrough */
Ronald Cronb3d42fd2024-01-26 11:54:06 +01004874 case TEST_EARLY_DATA_SERVER_REJECTS: /* Intentional fallthrough */
4875 case TEST_EARLY_DATA_HRR:
Ronald Cron2fbbba92024-01-26 20:13:42 +01004876 TEST_EQUAL(write_early_data_ret, MBEDTLS_ERR_SSL_CANNOT_WRITE_EARLY_DATA);
4877 TEST_EQUAL(client_ep.ssl.state, client_state);
4878 break;
Ronald Cron24da9912024-02-15 16:13:44 +01004879 default:
4880 TEST_FAIL("Unknown scenario.");
Ronald Cron2fbbba92024-01-26 20:13:42 +01004881 }
4882 break;
4883
4884 default:
4885 TEST_FAIL("Unexpected state.");
4886 }
4887
Ronald Cronbf5e9092024-02-21 15:31:36 +01004888complete_handshake:
4889 do {
4890 ret = mbedtls_test_move_handshake_to_state(
4891 &(server_ep.ssl), &(client_ep.ssl),
4892 MBEDTLS_SSL_HANDSHAKE_OVER);
4893
4894 if (ret == MBEDTLS_ERR_SSL_RECEIVED_EARLY_DATA) {
4895 read_early_data_ret = mbedtls_ssl_read_early_data(
4896 &(server_ep.ssl), read_buf, sizeof(read_buf));
4897
4898 TEST_EQUAL(read_early_data_ret, early_data_len);
4899 }
4900 } while (ret == MBEDTLS_ERR_SSL_RECEIVED_EARLY_DATA);
4901
4902 TEST_EQUAL(ret, 0);
4903 TEST_EQUAL(mbedtls_test_move_handshake_to_state(
4904 &(client_ep.ssl), &(server_ep.ssl),
4905 MBEDTLS_SSL_HANDSHAKE_OVER), 0);
4906
Ronald Cron2fbbba92024-01-26 20:13:42 +01004907 mbedtls_test_mock_socket_close(&(client_ep.socket));
4908 mbedtls_test_mock_socket_close(&(server_ep.socket));
4909
4910 ret = mbedtls_ssl_session_reset(&(client_ep.ssl));
4911 TEST_EQUAL(ret, 0);
4912
4913 ret = mbedtls_ssl_set_session(&(client_ep.ssl), &saved_session);
4914 TEST_EQUAL(ret, 0);
4915
4916 ret = mbedtls_ssl_session_reset(&(server_ep.ssl));
4917 TEST_EQUAL(ret, 0);
4918
4919 ret = mbedtls_test_mock_socket_connect(&(client_ep.socket),
4920 &(server_ep.socket), 1024);
4921 TEST_EQUAL(ret, 0);
4922
4923 previous_client_state = client_state;
Ronald Cron00046002024-02-21 16:00:12 +01004924 if (previous_client_state == MBEDTLS_SSL_HANDSHAKE_OVER) {
4925 break;
4926 }
4927
4928 /* In case of HRR scenario, once we have been through it, move over
4929 * the first ClientHello and ServerHello otherwise we just keep playing
4930 * this first part of the handshake with HRR.
4931 */
4932 if ((scenario == TEST_EARLY_DATA_HRR) && (beyond_first_hello)) {
4933 TEST_ASSERT(mbedtls_test_move_handshake_to_state(
4934 &(client_ep.ssl), &(server_ep.ssl),
4935 MBEDTLS_SSL_SERVER_HELLO) == 0);
4936 TEST_ASSERT(mbedtls_test_move_handshake_to_state(
4937 &(client_ep.ssl), &(server_ep.ssl),
4938 MBEDTLS_SSL_CLIENT_HELLO) == 0);
4939 }
4940
4941 TEST_EQUAL(mbedtls_test_move_handshake_to_state(
4942 &(client_ep.ssl), &(server_ep.ssl),
4943 previous_client_state), 0);
4944
4945 /* Progress the handshake from at least one state */
4946 while (client_ep.ssl.state == previous_client_state) {
4947 ret = mbedtls_ssl_handshake_step(&(client_ep.ssl));
4948 TEST_ASSERT((ret == 0) ||
4949 (ret == MBEDTLS_ERR_SSL_WANT_READ) ||
4950 (ret == MBEDTLS_ERR_SSL_WANT_WRITE));
4951 if (client_ep.ssl.state != previous_client_state) {
4952 break;
4953 }
4954 ret = mbedtls_ssl_handshake_step(&(server_ep.ssl));
4955 TEST_ASSERT((ret == 0) ||
4956 (ret == MBEDTLS_ERR_SSL_WANT_READ) ||
4957 (ret == MBEDTLS_ERR_SSL_WANT_WRITE));
4958 }
4959 } while (1);
Ronald Cron2fbbba92024-01-26 20:13:42 +01004960
4961exit:
4962 mbedtls_test_ssl_endpoint_free(&client_ep, NULL);
4963 mbedtls_test_ssl_endpoint_free(&server_ep, NULL);
4964 mbedtls_test_free_handshake_options(&client_options);
4965 mbedtls_test_free_handshake_options(&server_options);
4966 mbedtls_ssl_session_free(&saved_session);
4967 PSA_DONE();
4968}
4969/* END_CASE */
Ronald Cronaad85232024-02-07 08:04:07 +01004970
Elena Uziunaitebed21b52024-08-27 11:56:25 +01004971/* BEGIN_CASE depends_on:MBEDTLS_SSL_EARLY_DATA:MBEDTLS_SSL_CLI_C:MBEDTLS_SSL_SRV_C:MBEDTLS_DEBUG_C:MBEDTLS_TEST_AT_LEAST_ONE_TLS1_3_CIPHERSUITE:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED:PSA_WANT_ALG_SHA_256:PSA_WANT_ECC_SECP_R1_256:PSA_WANT_ECC_SECP_R1_384:PSA_HAVE_ALG_ECDSA_VERIFY:MBEDTLS_SSL_SESSION_TICKETS */
Ronald Cronaad85232024-02-07 08:04:07 +01004972void tls13_cli_max_early_data_size(int max_early_data_size_arg)
4973{
4974 int ret = -1;
4975 mbedtls_test_ssl_endpoint client_ep, server_ep;
4976 mbedtls_test_handshake_test_options client_options;
4977 mbedtls_test_handshake_test_options server_options;
4978 mbedtls_ssl_session saved_session;
Ronald Cronae6f9a52024-03-01 16:05:59 +01004979 unsigned char *buf = NULL;
4980 uint32_t buf_size = 64;
Ronald Cronaad85232024-02-07 08:04:07 +01004981 uint32_t max_early_data_size;
4982 uint32_t written_early_data_size = 0;
4983 uint32_t read_early_data_size = 0;
4984
4985 mbedtls_platform_zeroize(&client_ep, sizeof(client_ep));
4986 mbedtls_platform_zeroize(&server_ep, sizeof(server_ep));
4987 mbedtls_test_init_handshake_options(&client_options);
4988 mbedtls_test_init_handshake_options(&server_options);
4989 mbedtls_ssl_session_init(&saved_session);
4990
4991 PSA_INIT();
Ronald Cronae6f9a52024-03-01 16:05:59 +01004992 TEST_CALLOC(buf, buf_size);
Ronald Cronaad85232024-02-07 08:04:07 +01004993
4994 /*
4995 * Run first handshake to get a ticket from the server.
4996 */
4997
4998 client_options.pk_alg = MBEDTLS_PK_ECDSA;
4999 client_options.early_data = MBEDTLS_SSL_EARLY_DATA_ENABLED;
5000 server_options.pk_alg = MBEDTLS_PK_ECDSA;
5001 server_options.early_data = MBEDTLS_SSL_EARLY_DATA_ENABLED;
5002 server_options.max_early_data_size = max_early_data_size_arg;
5003
5004 ret = mbedtls_test_get_tls13_ticket(&client_options, &server_options,
5005 &saved_session);
5006 TEST_EQUAL(ret, 0);
5007
5008 /*
5009 * Prepare for handshake with the ticket.
5010 */
5011 ret = mbedtls_test_ssl_endpoint_init(&client_ep, MBEDTLS_SSL_IS_CLIENT,
5012 &client_options, NULL, NULL, NULL);
5013 TEST_EQUAL(ret, 0);
5014
5015 ret = mbedtls_test_ssl_endpoint_init(&server_ep, MBEDTLS_SSL_IS_SERVER,
5016 &server_options, NULL, NULL, NULL);
5017 TEST_EQUAL(ret, 0);
5018
5019 mbedtls_ssl_conf_session_tickets_cb(&server_ep.conf,
5020 mbedtls_test_ticket_write,
5021 mbedtls_test_ticket_parse,
5022 NULL);
5023
5024 max_early_data_size = saved_session.max_early_data_size;
5025 /*
5026 * (max_early_data_size + 1024) for the size of the socket buffers for the
5027 * server one to be able to contain the maximum number of early data bytes
Ronald Cron7c07aab2024-03-01 16:01:27 +01005028 * plus the first flight of client messages. Needed because we cannot
5029 * initiate the handshake on server side before doing all the calls to
Ronald Cronaad85232024-02-07 08:04:07 +01005030 * mbedtls_ssl_write_early_data() we want to test. See below for more
5031 * information.
5032 */
5033 ret = mbedtls_test_mock_socket_connect(&(client_ep.socket),
5034 &(server_ep.socket),
5035 max_early_data_size + 1024);
5036 TEST_EQUAL(ret, 0);
5037
5038 /* If our server is configured with max_early_data_size equal to zero, it
5039 * does not set the MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_EARLY_DATA flag for
5040 * the tickets it creates. To be able to test early data with a ticket
5041 * allowing early data in its flags but with max_early_data_size equal to
5042 * zero (case supported by our client) tweak the ticket flags here.
5043 */
5044 if (max_early_data_size == 0) {
5045 saved_session.ticket_flags |= MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_EARLY_DATA;
5046 }
5047
5048 ret = mbedtls_ssl_set_session(&(client_ep.ssl), &saved_session);
5049 TEST_EQUAL(ret, 0);
5050
5051 while (written_early_data_size < max_early_data_size) {
Ronald Cronaad85232024-02-07 08:04:07 +01005052 uint32_t remaining = max_early_data_size - written_early_data_size;
5053
Ronald Cronae6f9a52024-03-01 16:05:59 +01005054 for (size_t i = 0; i < buf_size; i++) {
Ronald Cronaad85232024-02-07 08:04:07 +01005055 buf[i] = (unsigned char) (written_early_data_size + i);
5056 }
5057
5058 ret = mbedtls_ssl_write_early_data(&(client_ep.ssl),
5059 buf,
Ronald Cronae6f9a52024-03-01 16:05:59 +01005060 buf_size);
Ronald Cronaad85232024-02-07 08:04:07 +01005061
Ronald Cronae6f9a52024-03-01 16:05:59 +01005062 if (buf_size <= remaining) {
5063 TEST_EQUAL(ret, buf_size);
Ronald Cronaad85232024-02-07 08:04:07 +01005064 } else {
5065 TEST_EQUAL(ret, remaining);
5066 }
Ronald Cronae6f9a52024-03-01 16:05:59 +01005067 written_early_data_size += buf_size;
Ronald Cronaad85232024-02-07 08:04:07 +01005068 }
Ronald Cron7c07aab2024-03-01 16:01:27 +01005069 TEST_EQUAL(client_ep.ssl.total_early_data_size, max_early_data_size);
Ronald Cronaad85232024-02-07 08:04:07 +01005070
Ronald Cronaad85232024-02-07 08:04:07 +01005071 ret = mbedtls_ssl_write_early_data(&(client_ep.ssl), buf, 1);
5072 TEST_EQUAL(ret, MBEDTLS_ERR_SSL_CANNOT_WRITE_EARLY_DATA);
Ronald Cronde9b03d2024-03-01 15:14:17 +01005073 TEST_EQUAL(client_ep.ssl.total_early_data_size, max_early_data_size);
Ronald Crond2884662024-03-03 15:03:22 +01005074 TEST_EQUAL(client_ep.ssl.early_data_state,
5075 MBEDTLS_SSL_EARLY_DATA_STATE_CAN_WRITE);
Ronald Cronaad85232024-02-07 08:04:07 +01005076
5077 /*
5078 * Now, check data on server side. It is not done in the previous loop as
5079 * in the first call to mbedtls_ssl_handshake(), the server ends up sending
5080 * its Finished message and then in the following call to
5081 * mbedtls_ssl_write_early_data() we go past the early data writing window
5082 * and we cannot test multiple calls to the API is this writing window.
5083 */
5084 while (read_early_data_size < max_early_data_size) {
5085 ret = mbedtls_ssl_handshake(&(server_ep.ssl));
5086 TEST_EQUAL(ret, MBEDTLS_ERR_SSL_RECEIVED_EARLY_DATA);
5087
5088 ret = mbedtls_ssl_read_early_data(&(server_ep.ssl),
5089 buf,
Ronald Cronae6f9a52024-03-01 16:05:59 +01005090 buf_size);
Ronald Cronaad85232024-02-07 08:04:07 +01005091 TEST_ASSERT(ret > 0);
5092
5093 for (size_t i = 0; i < (size_t) ret; i++) {
5094 TEST_EQUAL(buf[i], (unsigned char) (read_early_data_size + i));
5095 }
5096
5097 read_early_data_size += ret;
5098 }
5099 TEST_EQUAL(read_early_data_size, max_early_data_size);
5100
5101 ret = mbedtls_ssl_handshake(&(server_ep.ssl));
5102 TEST_EQUAL(ret, MBEDTLS_ERR_SSL_WANT_READ);
5103
Ronald Cron7c07aab2024-03-01 16:01:27 +01005104 TEST_ASSERT(mbedtls_test_move_handshake_to_state(
5105 &(client_ep.ssl), &(server_ep.ssl), MBEDTLS_SSL_HANDSHAKE_OVER)
5106 == 0);
Ronald Cronaad85232024-02-07 08:04:07 +01005107
5108exit:
5109 mbedtls_test_ssl_endpoint_free(&client_ep, NULL);
5110 mbedtls_test_ssl_endpoint_free(&server_ep, NULL);
5111 mbedtls_test_free_handshake_options(&client_options);
5112 mbedtls_test_free_handshake_options(&server_options);
5113 mbedtls_ssl_session_free(&saved_session);
Ronald Cronae6f9a52024-03-01 16:05:59 +01005114 mbedtls_free(buf);
Ronald Cronaad85232024-02-07 08:04:07 +01005115 PSA_DONE();
5116}
5117/* END_CASE */
Ronald Cron61fd13c2024-03-10 18:09:47 +01005118
Ronald Cron2160bfe2024-02-07 08:04:07 +01005119/*
5120 * The !MBEDTLS_SSL_PROTO_TLS1_2 dependency of tls13_early_data() below is
5121 * a temporary workaround to not run the test in Windows-2013 where there is
5122 * an issue with mbedtls_vsnprintf().
5123 */
Elena Uziunaitebed21b52024-08-27 11:56:25 +01005124/* BEGIN_CASE depends_on:!MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_SSL_EARLY_DATA:MBEDTLS_SSL_CLI_C:MBEDTLS_SSL_SRV_C:MBEDTLS_DEBUG_C:MBEDTLS_TEST_AT_LEAST_ONE_TLS1_3_CIPHERSUITE:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED:PSA_WANT_ALG_SHA_256:PSA_WANT_ECC_SECP_R1_256:PSA_WANT_ECC_SECP_R1_384:PSA_HAVE_ALG_ECDSA_VERIFY:MBEDTLS_SSL_SESSION_TICKETS */
Ronald Cron25ad10a2024-02-29 00:39:23 +01005125void tls13_srv_max_early_data_size(int scenario, int max_early_data_size_arg, int write_size_arg)
Ronald Cron2160bfe2024-02-07 08:04:07 +01005126{
5127 int ret = -1;
5128 mbedtls_test_ssl_endpoint client_ep, server_ep;
5129 mbedtls_test_handshake_test_options client_options;
5130 mbedtls_test_handshake_test_options server_options;
5131 mbedtls_ssl_session saved_session;
5132 mbedtls_test_ssl_log_pattern server_pattern = { NULL, 0 };
Ronald Cron01d273d2024-02-09 16:17:10 +01005133 uint16_t group_list[3] = {
5134 MBEDTLS_SSL_IANA_TLS_GROUP_SECP256R1,
5135 MBEDTLS_SSL_IANA_TLS_GROUP_SECP384R1,
5136 MBEDTLS_SSL_IANA_TLS_GROUP_NONE
5137 };
Ronald Cron2160bfe2024-02-07 08:04:07 +01005138 char pattern[128];
Ronald Cron25ad10a2024-02-29 00:39:23 +01005139 unsigned char *buf_write = NULL;
5140 uint32_t write_size = (uint32_t) write_size_arg;
5141 unsigned char *buf_read = NULL;
5142 uint32_t read_size;
Ronald Cron4facb0a2024-03-08 11:40:07 +01005143 uint32_t expanded_early_data_chunk_size = 0;
Ronald Cron2160bfe2024-02-07 08:04:07 +01005144 uint32_t written_early_data_size = 0;
Ronald Cron2160bfe2024-02-07 08:04:07 +01005145 uint32_t max_early_data_size;
5146
5147 mbedtls_platform_zeroize(&client_ep, sizeof(client_ep));
5148 mbedtls_platform_zeroize(&server_ep, sizeof(server_ep));
5149 mbedtls_test_init_handshake_options(&client_options);
5150 mbedtls_test_init_handshake_options(&server_options);
5151 mbedtls_ssl_session_init(&saved_session);
Ronald Crone93cd1b2024-03-01 19:30:00 +01005152 PSA_INIT();
5153
Ronald Cron25ad10a2024-02-29 00:39:23 +01005154 TEST_CALLOC(buf_write, write_size);
Ronald Cron2160bfe2024-02-07 08:04:07 +01005155
5156 /*
Ronald Cron25ad10a2024-02-29 00:39:23 +01005157 * Allocate a smaller buffer for early data reading to exercise the reading
5158 * of data in one record in multiple calls.
Ronald Crondc81b732024-02-26 15:02:26 +01005159 */
Ronald Cron25ad10a2024-02-29 00:39:23 +01005160 read_size = (write_size / 2) + 1;
5161 TEST_CALLOC(buf_read, read_size);
5162
Ronald Crondc81b732024-02-26 15:02:26 +01005163 /*
Ronald Cron2160bfe2024-02-07 08:04:07 +01005164 * Run first handshake to get a ticket from the server.
5165 */
5166
5167 client_options.pk_alg = MBEDTLS_PK_ECDSA;
Ronald Cron01d273d2024-02-09 16:17:10 +01005168 client_options.group_list = group_list;
Ronald Cron2160bfe2024-02-07 08:04:07 +01005169 client_options.early_data = MBEDTLS_SSL_EARLY_DATA_ENABLED;
5170 server_options.pk_alg = MBEDTLS_PK_ECDSA;
Ronald Cron01d273d2024-02-09 16:17:10 +01005171 server_options.group_list = group_list;
Ronald Cron2160bfe2024-02-07 08:04:07 +01005172 server_options.early_data = MBEDTLS_SSL_EARLY_DATA_ENABLED;
5173 server_options.max_early_data_size = max_early_data_size_arg;
5174
5175 ret = mbedtls_test_get_tls13_ticket(&client_options, &server_options,
5176 &saved_session);
5177 TEST_EQUAL(ret, 0);
5178
5179 /*
5180 * Prepare for handshake with the ticket.
5181 */
5182 server_options.srv_log_fun = mbedtls_test_ssl_log_analyzer;
5183 server_options.srv_log_obj = &server_pattern;
5184 server_pattern.pattern = pattern;
5185
5186 switch (scenario) {
5187 case TEST_EARLY_DATA_ACCEPTED:
5188 break;
5189
Ronald Cron919e5962024-02-08 15:48:29 +01005190 case TEST_EARLY_DATA_SERVER_REJECTS:
5191 server_options.early_data = MBEDTLS_SSL_EARLY_DATA_DISABLED;
5192 ret = mbedtls_snprintf(pattern, sizeof(pattern),
5193 "EarlyData: deprotect and discard app data records.");
5194 TEST_ASSERT(ret < (int) sizeof(pattern));
5195 mbedtls_debug_set_threshold(3);
5196 break;
5197
Ronald Cron01d273d2024-02-09 16:17:10 +01005198 case TEST_EARLY_DATA_HRR:
Ronald Cron52472102024-03-08 11:29:28 +01005199 /*
5200 * Remove server support for the group negotiated in
5201 * mbedtls_test_get_tls13_ticket() forcing an HelloRetryRequest.
5202 */
Ronald Cron01d273d2024-02-09 16:17:10 +01005203 server_options.group_list = group_list + 1;
5204 ret = mbedtls_snprintf(
5205 pattern, sizeof(pattern),
5206 "EarlyData: Ignore application message before 2nd ClientHello");
5207 TEST_ASSERT(ret < (int) sizeof(pattern));
5208 mbedtls_debug_set_threshold(3);
5209 break;
5210
Ronald Cron2160bfe2024-02-07 08:04:07 +01005211 default:
5212 TEST_FAIL("Unknown scenario.");
5213 }
5214
5215 ret = mbedtls_test_ssl_endpoint_init(&client_ep, MBEDTLS_SSL_IS_CLIENT,
5216 &client_options, NULL, NULL, NULL);
5217 TEST_EQUAL(ret, 0);
5218
5219 ret = mbedtls_test_ssl_endpoint_init(&server_ep, MBEDTLS_SSL_IS_SERVER,
5220 &server_options, NULL, NULL, NULL);
5221 TEST_EQUAL(ret, 0);
5222
5223 mbedtls_ssl_conf_session_tickets_cb(&server_ep.conf,
5224 mbedtls_test_ticket_write,
5225 mbedtls_test_ticket_parse,
5226 NULL);
5227
5228 ret = mbedtls_test_mock_socket_connect(&(client_ep.socket),
5229 &(server_ep.socket), 1024);
5230 TEST_EQUAL(ret, 0);
5231
5232 max_early_data_size = saved_session.max_early_data_size;
5233
5234 ret = mbedtls_ssl_set_session(&(client_ep.ssl), &saved_session);
5235 TEST_EQUAL(ret, 0);
5236
5237 /*
5238 * Start an handshake based on the ticket up to the point where early data
5239 * can be sent from client side. Then send in a loop as much early data as
5240 * possible without going over the maximum permitted size for the ticket.
5241 * Finally, do a last writting to go past that maximum permitted size and
5242 * check that we detect it.
5243 */
5244 TEST_EQUAL(mbedtls_test_move_handshake_to_state(
5245 &(client_ep.ssl), &(server_ep.ssl),
5246 MBEDTLS_SSL_SERVER_HELLO), 0);
5247
Ronald Crond2884662024-03-03 15:03:22 +01005248 TEST_ASSERT(client_ep.ssl.early_data_state !=
Ronald Cron3c5a6832024-03-03 15:46:57 +01005249 MBEDTLS_SSL_EARLY_DATA_STATE_NO_IND_SENT);
Ronald Cron2160bfe2024-02-07 08:04:07 +01005250
5251 ret = mbedtls_ssl_handshake(&(server_ep.ssl));
5252 TEST_EQUAL(ret, MBEDTLS_ERR_SSL_WANT_READ);
5253
Ronald Cron25ad10a2024-02-29 00:39:23 +01005254 /*
5255 * Write and if possible read as much as possible chunks of write_size
5256 * bytes data without getting over the max_early_data_size limit.
5257 */
5258 do {
Ronald Cron2160bfe2024-02-07 08:04:07 +01005259 uint32_t read_early_data_size = 0;
Ronald Cron2160bfe2024-02-07 08:04:07 +01005260
Ronald Cron52472102024-03-08 11:29:28 +01005261 /*
5262 * The contents of the early data are not very important, write a
5263 * pattern that varies byte-by-byte and is different for every chunk of
5264 * early data.
5265 */
Ronald Cron25ad10a2024-02-29 00:39:23 +01005266 if ((written_early_data_size + write_size) > max_early_data_size) {
5267 break;
Ronald Cron2160bfe2024-02-07 08:04:07 +01005268 }
5269
Ronald Cron25ad10a2024-02-29 00:39:23 +01005270 /*
5271 * If the server rejected early data, base the determination of when
Ronald Cron4facb0a2024-03-08 11:40:07 +01005272 * to stop the loop on the expanded size (padding and encryption
Ronald Cron25ad10a2024-02-29 00:39:23 +01005273 * expansion) of early data on server side and the number of early data
Ronald Cron4facb0a2024-03-08 11:40:07 +01005274 * received so far by the server (multiple of the expanded size).
Ronald Cron25ad10a2024-02-29 00:39:23 +01005275 */
Ronald Cron4facb0a2024-03-08 11:40:07 +01005276 if ((expanded_early_data_chunk_size != 0) &&
Ronald Cron25ad10a2024-02-29 00:39:23 +01005277 ((server_ep.ssl.total_early_data_size +
Ronald Cron4facb0a2024-03-08 11:40:07 +01005278 expanded_early_data_chunk_size) > max_early_data_size)) {
Ronald Cron25ad10a2024-02-29 00:39:23 +01005279 break;
5280 }
5281
5282 for (size_t i = 0; i < write_size; i++) {
Ronald Cron2160bfe2024-02-07 08:04:07 +01005283 buf_write[i] = (unsigned char) (written_early_data_size + i);
5284 }
5285
Ronald Cron25ad10a2024-02-29 00:39:23 +01005286 ret = write_early_data(&(client_ep.ssl), buf_write, write_size);
5287 TEST_EQUAL(ret, write_size);
5288 written_early_data_size += write_size;
Ronald Cron2160bfe2024-02-07 08:04:07 +01005289
5290 switch (scenario) {
5291 case TEST_EARLY_DATA_ACCEPTED:
Ronald Cron25ad10a2024-02-29 00:39:23 +01005292 while (read_early_data_size < write_size) {
Ronald Cron2160bfe2024-02-07 08:04:07 +01005293 ret = mbedtls_ssl_handshake(&(server_ep.ssl));
5294 TEST_EQUAL(ret, MBEDTLS_ERR_SSL_RECEIVED_EARLY_DATA);
5295
5296 ret = mbedtls_ssl_read_early_data(&(server_ep.ssl),
Ronald Cron25ad10a2024-02-29 00:39:23 +01005297 buf_read, read_size);
Ronald Cron2160bfe2024-02-07 08:04:07 +01005298 TEST_ASSERT(ret > 0);
5299
5300 TEST_MEMORY_COMPARE(buf_read, ret,
5301 buf_write + read_early_data_size, ret);
5302 read_early_data_size += ret;
5303
Ronald Cron19bfe0a2024-02-26 16:43:01 +01005304 TEST_EQUAL(server_ep.ssl.total_early_data_size,
Ronald Cron2160bfe2024-02-07 08:04:07 +01005305 written_early_data_size);
5306 }
5307 break;
Ronald Cron919e5962024-02-08 15:48:29 +01005308
Ronald Cron01d273d2024-02-09 16:17:10 +01005309 case TEST_EARLY_DATA_SERVER_REJECTS: /* Intentional fallthrough */
5310 case TEST_EARLY_DATA_HRR:
Ronald Cron919e5962024-02-08 15:48:29 +01005311 ret = mbedtls_ssl_handshake(&(server_ep.ssl));
5312 /*
Ronald Cron1a13e2f2024-03-08 14:44:35 +01005313 * In this write loop we try to always stay below the
5314 * max_early_data_size limit but if max_early_data_size is very
5315 * small we may exceed the max_early_data_size limit on the
5316 * first write. In TEST_EARLY_DATA_SERVER_REJECTS/
5317 * TEST_EARLY_DATA_HRR scenario, this is for sure the case if
5318 * max_early_data_size is smaller than the smallest possible
5319 * inner content/protected record. Take into account this
5320 * possibility here but only for max_early_data_size values
Ronald Crone1295fa2024-03-08 17:03:16 +01005321 * that are close to write_size. Below, '1' is for the inner
5322 * type byte and '16' is to take into account some AEAD
5323 * expansion (tag, ...).
Ronald Cron919e5962024-02-08 15:48:29 +01005324 */
5325 if (ret == MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE) {
Ronald Cron1a13e2f2024-03-08 14:44:35 +01005326 if (scenario == TEST_EARLY_DATA_SERVER_REJECTS) {
5327 TEST_LE_U(max_early_data_size,
5328 write_size + 1 +
5329 MBEDTLS_SSL_CID_TLS1_3_PADDING_GRANULARITY);
5330 } else {
5331 TEST_LE_U(max_early_data_size,
5332 write_size + 1 + 16 +
5333 MBEDTLS_SSL_CID_TLS1_3_PADDING_GRANULARITY);
5334 }
Ronald Cron919e5962024-02-08 15:48:29 +01005335 goto exit;
5336 }
5337
5338 TEST_ASSERT(ret == MBEDTLS_ERR_SSL_WANT_READ);
5339
5340 TEST_EQUAL(server_pattern.counter, 1);
5341 server_pattern.counter = 0;
Ronald Cron4facb0a2024-03-08 11:40:07 +01005342 if (expanded_early_data_chunk_size == 0) {
5343 expanded_early_data_chunk_size = server_ep.ssl.total_early_data_size;
Ronald Cron919e5962024-02-08 15:48:29 +01005344 }
Ronald Cron919e5962024-02-08 15:48:29 +01005345 break;
Ronald Cron2160bfe2024-02-07 08:04:07 +01005346 }
Ronald Cron4facb0a2024-03-08 11:40:07 +01005347 TEST_LE_U(server_ep.ssl.total_early_data_size, max_early_data_size);
Ronald Cron25ad10a2024-02-29 00:39:23 +01005348 } while (1);
Ronald Cron2160bfe2024-02-07 08:04:07 +01005349
5350 mbedtls_debug_set_threshold(3);
Ronald Cron25ad10a2024-02-29 00:39:23 +01005351 ret = write_early_data(&(client_ep.ssl), buf_write, write_size);
5352 TEST_EQUAL(ret, write_size);
Ronald Cron2160bfe2024-02-07 08:04:07 +01005353
5354 ret = mbedtls_snprintf(pattern, sizeof(pattern),
Ronald Cron70eab452024-02-26 15:50:15 +01005355 "EarlyData: Too much early data received");
Ronald Cron2160bfe2024-02-07 08:04:07 +01005356 TEST_ASSERT(ret < (int) sizeof(pattern));
5357
5358 ret = mbedtls_ssl_handshake(&(server_ep.ssl));
5359 TEST_EQUAL(ret, MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE);
5360 TEST_EQUAL(server_pattern.counter, 1);
5361
5362exit:
5363 mbedtls_test_ssl_endpoint_free(&client_ep, NULL);
5364 mbedtls_test_ssl_endpoint_free(&server_ep, NULL);
5365 mbedtls_test_free_handshake_options(&client_options);
5366 mbedtls_test_free_handshake_options(&server_options);
5367 mbedtls_ssl_session_free(&saved_session);
Ronald Crone93cd1b2024-03-01 19:30:00 +01005368 mbedtls_free(buf_write);
5369 mbedtls_free(buf_read);
Ronald Cron2160bfe2024-02-07 08:04:07 +01005370 mbedtls_debug_set_threshold(0);
5371 PSA_DONE();
5372}
5373/* END_CASE */
Manuel Pégourié-Gonnard6637ef72025-02-11 13:19:45 +01005374
Manuel Pégourié-Gonnardae567ad2025-02-25 10:32:20 +01005375/* BEGIN_CASE depends_on:MBEDTLS_DEBUG_C:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED */
Manuel Pégourié-Gonnarde9166522025-02-12 12:36:28 +01005376void inject_client_content_on_the_wire(int pk_alg,
5377 int state, data_t *data,
5378 char *log_pattern, int expected_ret)
Manuel Pégourié-Gonnard6637ef72025-02-11 13:19:45 +01005379{
5380 /* This function allows us to inject content at a specific state
5381 * in the handshake, or when it's completed. The content is injected
5382 * on the mock TCP socket, as if we were an active network attacker.
5383 *
5384 * This function is suitable to inject:
5385 * - crafted records, at any point;
5386 * - valid records that contain crafted handshake messages, but only
5387 * when the traffic is still unprotected (for TLS 1.2 that's most of the
5388 * handshake, for TLS 1.3 that's only the Hello messages);
5389 * - handshake messages that are fragmented in a specific way,
5390 * under the same conditions as above.
5391 */
5392 enum { BUFFSIZE = 16384 };
5393 mbedtls_test_ssl_endpoint server, client;
5394 mbedtls_platform_zeroize(&server, sizeof(server));
5395 mbedtls_platform_zeroize(&client, sizeof(client));
5396 mbedtls_test_handshake_test_options options;
5397 mbedtls_test_init_handshake_options(&options);
5398 mbedtls_test_ssl_log_pattern srv_pattern;
5399 memset(&srv_pattern, 0, sizeof(srv_pattern));
5400 int ret = -1;
5401
5402 PSA_INIT();
5403
5404 srv_pattern.pattern = log_pattern;
5405 options.srv_log_obj = &srv_pattern;
5406 options.srv_log_fun = mbedtls_test_ssl_log_analyzer;
Manuel Pégourié-Gonnardaf4606d2025-03-11 12:12:51 +01005407 mbedtls_debug_set_threshold(3);
Manuel Pégourié-Gonnarde9166522025-02-12 12:36:28 +01005408
5409 options.pk_alg = pk_alg;
Manuel Pégourié-Gonnard6637ef72025-02-11 13:19:45 +01005410
5411 ret = mbedtls_test_ssl_endpoint_init(&server, MBEDTLS_SSL_IS_SERVER,
5412 &options, NULL, NULL, NULL);
5413 TEST_EQUAL(ret, 0);
5414
5415 ret = mbedtls_test_ssl_endpoint_init(&client, MBEDTLS_SSL_IS_CLIENT,
5416 &options, NULL, NULL, NULL);
5417 TEST_EQUAL(ret, 0);
5418
5419 ret = mbedtls_test_mock_socket_connect(&server.socket, &client.socket,
5420 BUFFSIZE);
5421 TEST_EQUAL(ret, 0);
5422
5423 /* Make the server move to the required state */
5424 ret = mbedtls_test_move_handshake_to_state(&client.ssl, &server.ssl, state);
5425 TEST_EQUAL(ret, 0);
5426
5427 /* Send the crafted message */
Manuel Pégourié-Gonnarde9166522025-02-12 12:36:28 +01005428 ret = mbedtls_test_mock_tcp_send_b(&client.socket, data->x, data->len);
Manuel Pégourié-Gonnard47d0b792025-03-11 10:27:49 +01005429 TEST_EQUAL(ret, (int) data->len);
Manuel Pégourié-Gonnard6637ef72025-02-11 13:19:45 +01005430
5431 /* Have the server process it.
5432 * Need the loop because a server that support 1.3 and 1.2
5433 * will process a 1.2 ClientHello in two steps.
5434 */
5435 do {
5436 ret = mbedtls_ssl_handshake_step(&server.ssl);
5437 } while (ret == 0 && server.ssl.state == state);
5438 TEST_EQUAL(ret, expected_ret);
Manuel Pégourié-Gonnardaf4606d2025-03-11 12:12:51 +01005439 TEST_ASSERT(srv_pattern.counter >= 1);
Manuel Pégourié-Gonnard6637ef72025-02-11 13:19:45 +01005440
5441exit:
5442 mbedtls_test_free_handshake_options(&options);
5443 mbedtls_test_ssl_endpoint_free(&server, NULL);
5444 mbedtls_test_ssl_endpoint_free(&client, NULL);
5445 mbedtls_debug_set_threshold(0);
5446 PSA_DONE();
5447}
5448/* END_CASE */
Manuel Pégourié-Gonnard1bed8272025-02-26 13:01:10 +01005449
Manuel Pégourié-Gonnard6dcfdf12025-03-12 09:35:51 +01005450/* BEGIN_CASE depends_on:MBEDTLS_SSL_PROTO_TLS1_3:MBEDTLS_DEBUG_C:MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED:PSA_WANT_ALG_SHA_256:PSA_WANT_ECC_SECP_R1_256:PSA_WANT_ECC_SECP_R1_384:PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT:PSA_WANT_ALG_ECDSA_ANY */
Manuel Pégourié-Gonnard1bed8272025-02-26 13:01:10 +01005451void send_large_fragmented_hello(int hs_len_int, int first_frag_content_len_int,
5452 char *log_pattern, int expected_ret)
5453{
5454 /* This function sends a long message (claiming to be a ClientHello)
5455 * fragmented in 1-byte fragments (except the initial fragment).
5456 * The purpose is to test how the stack reacts when receiving:
5457 * - a message larger than our buffer;
5458 * - a message smaller than our buffer, but where the intermediate size of
5459 * holding all the fragments (including overhead) is larger than our
5460 * buffer.
5461 */
5462 enum { BUFFSIZE = 16384 };
5463 mbedtls_test_ssl_endpoint server, client;
5464 mbedtls_platform_zeroize(&server, sizeof(server));
5465 mbedtls_platform_zeroize(&client, sizeof(client));
5466
5467 mbedtls_test_handshake_test_options options;
5468 mbedtls_test_init_handshake_options(&options);
5469
5470 mbedtls_test_ssl_log_pattern srv_pattern;
5471 memset(&srv_pattern, 0, sizeof(srv_pattern));
5472
5473 unsigned char *first_frag = NULL;
5474 int ret = -1;
5475
5476 size_t hs_len = (size_t) hs_len_int;
5477 size_t first_frag_content_len = (size_t) first_frag_content_len_int;
5478
5479 PSA_INIT();
5480
5481 srv_pattern.pattern = log_pattern;
5482 options.srv_log_obj = &srv_pattern;
5483 options.srv_log_fun = mbedtls_test_ssl_log_analyzer;
Manuel Pégourié-Gonnard1038b222025-03-05 11:53:09 +01005484 mbedtls_debug_set_threshold(1);
Manuel Pégourié-Gonnard1bed8272025-02-26 13:01:10 +01005485
Manuel Pégourié-Gonnard299f94a2025-03-04 10:12:25 +01005486 // Does't really matter but we want to know to declare dependencies.
5487 options.pk_alg = MBEDTLS_PK_ECDSA;
5488
Manuel Pégourié-Gonnard1bed8272025-02-26 13:01:10 +01005489 ret = mbedtls_test_ssl_endpoint_init(&server, MBEDTLS_SSL_IS_SERVER,
5490 &options, NULL, NULL, NULL);
5491 TEST_EQUAL(ret, 0);
5492
5493 ret = mbedtls_test_ssl_endpoint_init(&client, MBEDTLS_SSL_IS_CLIENT,
5494 &options, NULL, NULL, NULL);
5495 TEST_EQUAL(ret, 0);
5496
5497 ret = mbedtls_test_mock_socket_connect(&server.socket, &client.socket,
5498 BUFFSIZE);
5499 TEST_EQUAL(ret, 0);
5500
5501 /* Make the server move past the initial dummy state */
5502 ret = mbedtls_test_move_handshake_to_state(&client.ssl, &server.ssl,
5503 MBEDTLS_SSL_CLIENT_HELLO);
5504 TEST_EQUAL(ret, 0);
5505
5506 /* Prepare initial fragment */
5507 const size_t first_len = 5 // record header, see below
5508 + 4 // handshake header, see balow
5509 + first_frag_content_len;
5510 TEST_CALLOC(first_frag, first_len);
5511 unsigned char *p = first_frag;
5512 // record header
5513 // record type: handshake
5514 *p++ = 0x16,
5515 // record version (actually common to TLS 1.2 and TLS 1.3)
5516 *p++ = 0x03,
5517 *p++ = 0x03,
5518 // record length: two bytes
5519 *p++ = (unsigned char) (((4 + first_frag_content_len) >> 8) & 0xff);
5520 *p++ = (unsigned char) (((4 + first_frag_content_len) >> 0) & 0xff);
5521 // handshake header
5522 // handshake type: ClientHello
5523 *p++ = 0x01,
5524 // handshake length: three bytes
5525 *p++ = (unsigned char) ((hs_len >> 16) & 0xff);
5526 *p++ = (unsigned char) ((hs_len >> 8) & 0xff);
5527 *p++ = (unsigned char) ((hs_len >> 0) & 0xff);
5528 // handshake content: dummy value
5529 memset(p, 0x2a, first_frag_content_len);
5530
5531 /* Send initial fragment and have the server process it. */
5532 ret = mbedtls_test_mock_tcp_send_b(&client.socket, first_frag, first_len);
5533 TEST_ASSERT(ret >= 0 && (size_t) ret == first_len);
5534
5535 ret = mbedtls_ssl_handshake_step(&server.ssl);
5536 TEST_EQUAL(ret, MBEDTLS_ERR_SSL_WANT_READ);
5537
5538 /* Dummy 1-byte fragment to repeatedly send next */
5539 const unsigned char next[] = {
5540 0x16, 0x03, 0x03, 0x00, 0x01, // record header (see above)
5541 0x2a, // Dummy handshake message content
5542 };
5543 for (size_t left = hs_len - first_frag_content_len; left != 0; left--) {
5544 ret = mbedtls_test_mock_tcp_send_b(&client.socket, next, sizeof(next));
5545 TEST_ASSERT(ret >= 0 && (size_t) ret == sizeof(next));
5546
5547 ret = mbedtls_ssl_handshake_step(&server.ssl);
5548 if (ret != MBEDTLS_ERR_SSL_WANT_READ) {
5549 break;
5550 }
5551 }
5552 TEST_EQUAL(ret, expected_ret);
5553 TEST_EQUAL(srv_pattern.counter, 1);
5554
5555exit:
5556 mbedtls_test_free_handshake_options(&options);
5557 mbedtls_test_ssl_endpoint_free(&server, NULL);
5558 mbedtls_test_ssl_endpoint_free(&client, NULL);
5559 mbedtls_debug_set_threshold(0);
5560 mbedtls_free(first_frag);
5561 PSA_DONE();
5562}
5563/* END_CASE */