blob: c3a06e108147bc8613e7fc1b98a53c6202ff5aaf [file] [log] [blame]
Paul Bakkeraccd4eb2013-07-19 13:41:51 +02001#!/bin/bash
2
Manuel Pégourié-Gonnard12b84722014-03-25 19:07:28 +01003# Test interop with OpenSSL and GnuTLS (and self-op while at it).
4#
5# Check each common ciphersuite, with each version, both ways (client/server),
6# with and without client authentication.
Manuel Pégourié-Gonnardeaadc502014-02-20 11:01:30 +01007
Manuel Pégourié-Gonnarda1a9f9a2014-03-25 18:04:59 +01008# test if those two are set in the environment before assigning defaults
9if [ -n "$GNUTLS_CLI" -a -n "$GNUTLS_SERV" ]; then
10 GNUTLS_AVAILABLE=1
11else
12 GNUTLS_AVAILABLE=0
13fi
14
15# catch undefined variables from now on
Manuel Pégourié-Gonnard3eec6042014-02-27 15:37:24 +010016set -u
17
Manuel Pégourié-Gonnarda1a9f9a2014-03-25 18:04:59 +010018# initialise counters
Manuel Pégourié-Gonnard70064fd2013-08-27 22:00:47 +020019let "tests = 0"
20let "failed = 0"
21let "skipped = 0"
Manuel Pégourié-Gonnard3eec6042014-02-27 15:37:24 +010022let "srvmem = 0"
Manuel Pégourié-Gonnard70064fd2013-08-27 22:00:47 +020023
Manuel Pégourié-Gonnarda1a9f9a2014-03-25 18:04:59 +010024# default commands, can be overriden by the environment
Manuel Pégourié-Gonnardf7a26902014-02-27 12:25:54 +010025: ${P_SRV:=../programs/ssl/ssl_server2}
26: ${P_CLI:=../programs/ssl/ssl_client2}
Manuel Pégourié-Gonnard74faf3c2014-03-13 18:47:44 +010027: ${OPENSSL_CMD:=openssl} # OPENSSL would conflict with the build system
28: ${GNUTLS_CLI:=gnutls-cli}
29: ${GNUTLS_SERV:=gnutls-serv}
Manuel Pégourié-Gonnardf7a26902014-02-27 12:25:54 +010030
Manuel Pégourié-Gonnarda1a9f9a2014-03-25 18:04:59 +010031# default values for options
Paul Bakker10cd2252012-04-12 21:26:34 +000032MODES="ssl3 tls1 tls1_1 tls1_2"
Paul Bakker1eeceae2012-11-23 14:25:34 +010033VERIFIES="NO YES"
Manuel Pégourié-Gonnard7ebaf372013-08-27 21:03:33 +020034TYPES="ECDSA RSA PSK"
Paul Bakkeraccd4eb2013-07-19 13:41:51 +020035FILTER=""
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +010036EXCLUDE='NULL\|DES-CBC-' # avoid plain DES but keep 3DES-EDE-CBC (PolarSSL), DES-CBC3 (OpenSSL)
Paul Bakkeraccd4eb2013-07-19 13:41:51 +020037VERBOSE=""
Manuel Pégourié-Gonnard3eec6042014-02-27 15:37:24 +010038MEMCHECK=0
Manuel Pégourié-Gonnarda1a9f9a2014-03-25 18:04:59 +010039# GnuTLS not enabled by default, 3.2.4 might not be available everywhere
40if [ "$GNUTLS_AVAILABLE" -gt 0 ]; then
41 PEERS="OpenSSL PolarSSL GnuTLS"
42else
43 PEERS="OpenSSL PolarSSL"
44fi
Paul Bakkeraccd4eb2013-07-19 13:41:51 +020045
Manuel Pégourié-Gonnard9dea8bd2014-02-26 18:21:02 +010046print_usage() {
47 echo "Usage: $0"
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +010048 echo -e " -h|--help\tPrint this help."
49 echo -e " -f|--filter\tOnly matching ciphersuites are tested (Default: '$FILTER')"
50 echo -e " -e|--exclude\tMatching ciphersuites are excluded (Default: '$EXCLUDE')"
51 echo -e " -m|--modes\tWhich modes to perform (Default: '$MODES')"
52 echo -e " -t|--types\tWhich key exchange type to perform (Default: '$TYPES')"
53 echo -e " -V|--verify\tWhich verification modes to perform (Default: '$VERIFIES')"
54 echo -e " -p|--peers\tWhich peers to use (Default: '$PEERS')"
55 echo -e " \tAlso available: GnuTLS (needs v3.2.4 or higher)"
56 echo -e " -M|--memcheck\tCheck memory leaks and errors."
57 echo -e " -v|--verbose\tSet verbose output."
Manuel Pégourié-Gonnard9dea8bd2014-02-26 18:21:02 +010058}
59
60get_options() {
61 while [ $# -gt 0 ]; do
62 case "$1" in
63 -f|--filter)
64 shift; FILTER=$1
65 ;;
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +010066 -e|--exclude)
67 shift; EXCLUDE=$1
68 ;;
Manuel Pégourié-Gonnard9dea8bd2014-02-26 18:21:02 +010069 -m|--modes)
70 shift; MODES=$1
71 ;;
72 -t|--types)
73 shift; TYPES=$1
74 ;;
75 -V|--verify)
76 shift; VERIFIES=$1
77 ;;
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +010078 -p|--peers)
79 shift; PEERS=$1
80 ;;
Manuel Pégourié-Gonnard9dea8bd2014-02-26 18:21:02 +010081 -v|--verbose)
82 VERBOSE=1
83 ;;
Manuel Pégourié-Gonnard3eec6042014-02-27 15:37:24 +010084 -M|--memcheck)
85 MEMCHECK=1
86 ;;
Manuel Pégourié-Gonnard9dea8bd2014-02-26 18:21:02 +010087 -h|--help)
88 print_usage
89 exit 0
90 ;;
91 *)
92 echo "Unknown argument: '$1'"
93 print_usage
94 exit 1
95 ;;
96 esac
97 shift
98 done
99}
Paul Bakkeraccd4eb2013-07-19 13:41:51 +0200100
Manuel Pégourié-Gonnard95957712014-02-19 15:29:38 +0100101log() {
Paul Bakkeraccd4eb2013-07-19 13:41:51 +0200102 if [ "X" != "X$VERBOSE" ]; then
103 echo "$@"
104 fi
105}
Paul Bakker10cd2252012-04-12 21:26:34 +0000106
Manuel Pégourié-Gonnarddfc8d5a2013-08-27 20:48:40 +0200107filter()
108{
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100109 LIST="$1"
Manuel Pégourié-Gonnarddfc8d5a2013-08-27 20:48:40 +0200110 NEW_LIST=""
111
112 for i in $LIST;
113 do
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100114 NEW_LIST="$NEW_LIST $( echo "$i" | grep "$FILTER" | grep -v "$EXCLUDE" )"
Manuel Pégourié-Gonnarddfc8d5a2013-08-27 20:48:40 +0200115 done
116
Manuel Pégourié-Gonnard911622d2014-02-27 11:50:40 +0100117 # normalize whitespace
118 echo "$NEW_LIST" | sed -e 's/[[:space:]]\+/ /g' -e 's/^ //' -e 's/ $//'
Manuel Pégourié-Gonnarddfc8d5a2013-08-27 20:48:40 +0200119}
120
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100121filter_ciphersuites()
122{
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100123 if [ "X" != "X$FILTER" -o "X" != "X$EXCLUDE" ];
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100124 then
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100125 P_CIPHERS=$( filter "$P_CIPHERS" )
126 O_CIPHERS=$( filter "$O_CIPHERS" )
127 G_CIPHERS=$( filter "$G_CIPHERS" )
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100128 fi
129}
130
131reset_ciphersuites()
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100132{
133 P_CIPHERS=""
134 O_CIPHERS=""
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100135 G_CIPHERS=""
136}
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100137
Manuel Pégourié-Gonnard12b84722014-03-25 19:07:28 +0100138add_common_ciphersuites()
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100139{
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100140 case $TYPE in
141
142 "ECDSA")
143 if [ "$MODE" != "ssl3" ];
144 then
145 P_CIPHERS="$P_CIPHERS \
146 TLS-ECDHE-ECDSA-WITH-NULL-SHA \
147 TLS-ECDHE-ECDSA-WITH-RC4-128-SHA \
148 TLS-ECDHE-ECDSA-WITH-3DES-EDE-CBC-SHA \
149 TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA \
150 TLS-ECDHE-ECDSA-WITH-AES-256-CBC-SHA \
Manuel Pégourié-Gonnard12b84722014-03-25 19:07:28 +0100151 "
152 G_CIPHERS="$G_CIPHERS \
153 +ECDHE-ECDSA:+NULL:+SHA1 \
154 +ECDHE-ECDSA:+ARCFOUR-128:+SHA1 \
155 +ECDHE-ECDSA:+3DES-CBC:+SHA1 \
156 +ECDHE-ECDSA:+AES-128-CBC:+SHA1 \
157 +ECDHE-ECDSA:+AES-256-CBC:+SHA1 \
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100158 "
159 O_CIPHERS="$O_CIPHERS \
160 ECDHE-ECDSA-NULL-SHA \
161 ECDHE-ECDSA-RC4-SHA \
162 ECDHE-ECDSA-DES-CBC3-SHA \
163 ECDHE-ECDSA-AES128-SHA \
164 ECDHE-ECDSA-AES256-SHA \
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100165 "
166 fi
167 if [ "$MODE" = "tls1_2" ];
168 then
169 P_CIPHERS="$P_CIPHERS \
170 TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA256 \
171 TLS-ECDHE-ECDSA-WITH-AES-256-CBC-SHA384 \
172 TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256 \
173 TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384 \
Manuel Pégourié-Gonnard12b84722014-03-25 19:07:28 +0100174 "
175 G_CIPHERS="$G_CIPHERS \
176 +ECDHE-ECDSA:+AES-128-CBC:+SHA256 \
177 +ECDHE-ECDSA:+AES-256-CBC:+SHA384 \
178 +ECDHE-ECDSA:+AES-128-GCM:+AEAD \
179 +ECDHE-ECDSA:+AES-256-GCM:+AEAD \
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100180 "
181 O_CIPHERS="$O_CIPHERS \
182 ECDHE-ECDSA-AES128-SHA256 \
183 ECDHE-ECDSA-AES256-SHA384 \
184 ECDHE-ECDSA-AES128-GCM-SHA256 \
185 ECDHE-ECDSA-AES256-GCM-SHA384 \
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100186 "
187 fi
188 ;;
189
190 "RSA")
191 P_CIPHERS="$P_CIPHERS \
192 TLS-DHE-RSA-WITH-AES-128-CBC-SHA \
193 TLS-DHE-RSA-WITH-AES-256-CBC-SHA \
194 TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-SHA \
195 TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA \
196 TLS-DHE-RSA-WITH-3DES-EDE-CBC-SHA \
197 TLS-RSA-WITH-AES-256-CBC-SHA \
198 TLS-RSA-WITH-CAMELLIA-256-CBC-SHA \
199 TLS-RSA-WITH-AES-128-CBC-SHA \
200 TLS-RSA-WITH-CAMELLIA-128-CBC-SHA \
201 TLS-RSA-WITH-3DES-EDE-CBC-SHA \
202 TLS-RSA-WITH-RC4-128-SHA \
203 TLS-RSA-WITH-RC4-128-MD5 \
204 TLS-RSA-WITH-NULL-MD5 \
205 TLS-RSA-WITH-NULL-SHA \
Manuel Pégourié-Gonnard12b84722014-03-25 19:07:28 +0100206 "
207 G_CIPHERS="$G_CIPHERS \
208 +DHE-RSA:+AES-128-CBC:+SHA1 \
209 +DHE-RSA:+AES-256-CBC:+SHA1 \
210 +DHE-RSA:+CAMELLIA-128-CBC:+SHA1 \
211 +DHE-RSA:+CAMELLIA-256-CBC:+SHA1 \
212 +DHE-RSA:+3DES-CBC:+SHA1 \
213 +RSA:+AES-256-CBC:+SHA1 \
214 +RSA:+CAMELLIA-256-CBC:+SHA1 \
215 +RSA:+AES-128-CBC:+SHA1 \
216 +RSA:+CAMELLIA-128-CBC:+SHA1 \
217 +RSA:+3DES-CBC:+SHA1 \
218 +RSA:+ARCFOUR-128:+SHA1 \
219 +RSA:+ARCFOUR-128:+MD5 \
220 +RSA:+NULL:+MD5 \
221 +RSA:+NULL:+SHA1 \
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100222 "
223 O_CIPHERS="$O_CIPHERS \
224 DHE-RSA-AES128-SHA \
225 DHE-RSA-AES256-SHA \
226 DHE-RSA-CAMELLIA128-SHA \
227 DHE-RSA-CAMELLIA256-SHA \
228 EDH-RSA-DES-CBC3-SHA \
229 AES256-SHA \
230 CAMELLIA256-SHA \
231 AES128-SHA \
232 CAMELLIA128-SHA \
233 DES-CBC3-SHA \
234 RC4-SHA \
235 RC4-MD5 \
236 NULL-MD5 \
237 NULL-SHA \
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100238 "
239 if [ "$MODE" != "ssl3" ];
240 then
241 P_CIPHERS="$P_CIPHERS \
242 TLS-ECDHE-RSA-WITH-AES-128-CBC-SHA \
243 TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA \
244 TLS-ECDHE-RSA-WITH-3DES-EDE-CBC-SHA \
245 TLS-ECDHE-RSA-WITH-RC4-128-SHA \
246 TLS-ECDHE-RSA-WITH-NULL-SHA \
247 "
Manuel Pégourié-Gonnard12b84722014-03-25 19:07:28 +0100248 G_CIPHERS="$G_CIPHERS \
249 +ECDHE-RSA:+AES-128-CBC:+SHA1 \
250 +ECDHE-RSA:+AES-256-CBC:+SHA1 \
251 +ECDHE-RSA:+3DES-CBC:+SHA1 \
252 +ECDHE-RSA:+ARCFOUR-128:+SHA1 \
253 +ECDHE-RSA:+NULL:+SHA1 \
254 "
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100255 O_CIPHERS="$O_CIPHERS \
256 ECDHE-RSA-AES256-SHA \
257 ECDHE-RSA-AES128-SHA \
258 ECDHE-RSA-DES-CBC3-SHA \
259 ECDHE-RSA-RC4-SHA \
260 ECDHE-RSA-NULL-SHA \
261 "
262 fi
263 if [ "$MODE" = "tls1_2" ];
264 then
265 P_CIPHERS="$P_CIPHERS \
266 TLS-RSA-WITH-NULL-SHA256 \
267 TLS-RSA-WITH-AES-128-CBC-SHA256 \
268 TLS-DHE-RSA-WITH-AES-128-CBC-SHA256 \
269 TLS-RSA-WITH-AES-256-CBC-SHA256 \
270 TLS-DHE-RSA-WITH-AES-256-CBC-SHA256 \
271 TLS-ECDHE-RSA-WITH-AES-128-CBC-SHA256 \
272 TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA384 \
273 TLS-RSA-WITH-AES-128-GCM-SHA256 \
274 TLS-RSA-WITH-AES-256-GCM-SHA384 \
275 TLS-DHE-RSA-WITH-AES-128-GCM-SHA256 \
276 TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 \
277 TLS-ECDHE-RSA-WITH-AES-128-GCM-SHA256 \
278 TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384 \
279 "
Manuel Pégourié-Gonnard12b84722014-03-25 19:07:28 +0100280 G_CIPHERS="$G_CIPHERS \
281 +RSA:+NULL:+SHA256 \
282 +RSA:+AES-128-CBC:+SHA256 \
283 +DHE-RSA:+AES-128-CBC:+SHA256 \
284 +RSA:+AES-256-CBC:+SHA256 \
285 +DHE-RSA:+AES-256-CBC:+SHA256 \
286 +ECDHE-RSA:+AES-128-CBC:+SHA256 \
287 +ECDHE-RSA:+AES-256-CBC:+SHA384 \
288 +RSA:+AES-128-GCM:+AEAD \
289 +RSA:+AES-256-GCM:+AEAD \
290 +DHE-RSA:+AES-128-GCM:+AEAD \
291 +DHE-RSA:+AES-256-GCM:+AEAD \
292 +ECDHE-RSA:+AES-128-GCM:+AEAD \
293 +ECDHE-RSA:+AES-256-GCM:+AEAD \
294 "
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100295 O_CIPHERS="$O_CIPHERS \
296 NULL-SHA256 \
297 AES128-SHA256 \
298 DHE-RSA-AES128-SHA256 \
299 AES256-SHA256 \
300 DHE-RSA-AES256-SHA256 \
301 ECDHE-RSA-AES128-SHA256 \
302 ECDHE-RSA-AES256-SHA384 \
303 AES128-GCM-SHA256 \
304 DHE-RSA-AES128-GCM-SHA256 \
305 AES256-GCM-SHA384 \
306 DHE-RSA-AES256-GCM-SHA384 \
307 ECDHE-RSA-AES128-GCM-SHA256 \
308 ECDHE-RSA-AES256-GCM-SHA384 \
309 "
310 fi
311 ;;
312
313 "PSK")
314 P_CIPHERS="$P_CIPHERS \
315 TLS-PSK-WITH-RC4-128-SHA \
316 TLS-PSK-WITH-3DES-EDE-CBC-SHA \
317 TLS-PSK-WITH-AES-128-CBC-SHA \
318 TLS-PSK-WITH-AES-256-CBC-SHA \
319 "
Manuel Pégourié-Gonnard12b84722014-03-25 19:07:28 +0100320 G_CIPHERS="$G_CIPHERS \
321 +PSK:+ARCFOUR-128:+SHA1 \
322 +PSK:+3DES-CBC:+SHA1 \
323 +PSK:+AES-128-CBC:+SHA1 \
324 +PSK:+AES-256-CBC:+SHA1 \
325 "
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100326 O_CIPHERS="$O_CIPHERS \
327 PSK-RC4-SHA \
328 PSK-3DES-EDE-CBC-SHA \
329 PSK-AES128-CBC-SHA \
330 PSK-AES256-CBC-SHA \
331 "
332 ;;
333 esac
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100334}
335
Manuel Pégourié-Gonnard12b84722014-03-25 19:07:28 +0100336add_openssl_ciphersuites()
337{
338 case $TYPE in
339
340 "ECDSA")
341 if [ "$MODE" != "ssl3" ];
342 then
343 P_CIPHERS="$P_CIPHERS \
344 TLS-ECDH-ECDSA-WITH-NULL-SHA \
345 TLS-ECDH-ECDSA-WITH-RC4-128-SHA \
346 TLS-ECDH-ECDSA-WITH-3DES-EDE-CBC-SHA \
347 TLS-ECDH-ECDSA-WITH-AES-128-CBC-SHA \
348 TLS-ECDH-ECDSA-WITH-AES-256-CBC-SHA \
349 "
350 O_CIPHERS="$O_CIPHERS \
351 ECDH-ECDSA-NULL-SHA \
352 ECDH-ECDSA-RC4-SHA \
353 ECDH-ECDSA-DES-CBC3-SHA \
354 ECDH-ECDSA-AES128-SHA \
355 ECDH-ECDSA-AES256-SHA \
356 "
357 fi
358 if [ "$MODE" = "tls1_2" ];
359 then
360 P_CIPHERS="$P_CIPHERS \
361 TLS-ECDH-ECDSA-WITH-AES-128-CBC-SHA256 \
362 TLS-ECDH-ECDSA-WITH-AES-256-CBC-SHA384 \
363 TLS-ECDH-ECDSA-WITH-AES-128-GCM-SHA256 \
364 TLS-ECDH-ECDSA-WITH-AES-256-GCM-SHA384 \
365 "
366 O_CIPHERS="$O_CIPHERS \
367 ECDH-ECDSA-AES128-SHA256 \
368 ECDH-ECDSA-AES256-SHA384 \
369 ECDH-ECDSA-AES128-GCM-SHA256 \
370 ECDH-ECDSA-AES256-GCM-SHA384 \
371 "
372 fi
373 ;;
374
375 "RSA")
376 P_CIPHERS="$P_CIPHERS \
377 TLS-RSA-WITH-DES-CBC-SHA \
378 TLS-DHE-RSA-WITH-DES-CBC-SHA \
379 "
380 O_CIPHERS="$O_CIPHERS \
381 DES-CBC-SHA \
382 EDH-RSA-DES-CBC-SHA \
383 "
384 ;;
385
386 "PSK")
387 ;;
388 esac
389}
390
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100391add_gnutls_ciphersuites()
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100392{
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100393 case $TYPE in
394
395 "ECDSA")
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100396 if [ "$MODE" = "tls1_2" ];
397 then
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100398 P_CIPHERS="$P_CIPHERS \
399 TLS-ECDHE-ECDSA-WITH-CAMELLIA-128-CBC-SHA256 \
400 TLS-ECDHE-ECDSA-WITH-CAMELLIA-256-CBC-SHA384 \
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100401 TLS-ECDHE-ECDSA-WITH-CAMELLIA-128-GCM-SHA256 \
402 TLS-ECDHE-ECDSA-WITH-CAMELLIA-256-GCM-SHA384 \
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100403 "
404 G_CIPHERS="$G_CIPHERS \
405 +ECDHE-ECDSA:+CAMELLIA-128-CBC:+SHA256 \
406 +ECDHE-ECDSA:+CAMELLIA-256-CBC:+SHA384 \
407 +ECDHE-ECDSA:+CAMELLIA-128-GCM:+AEAD \
408 +ECDHE-ECDSA:+CAMELLIA-256-GCM:+AEAD \
409 "
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100410 fi
411 ;;
412
413 "RSA")
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100414 if [ "$MODE" = "tls1_2" ];
415 then
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100416 P_CIPHERS="$P_CIPHERS \
417 TLS-ECDHE-RSA-WITH-CAMELLIA-128-CBC-SHA256 \
418 TLS-ECDHE-RSA-WITH-CAMELLIA-256-CBC-SHA384 \
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100419 TLS-RSA-WITH-CAMELLIA-128-CBC-SHA256 \
420 TLS-RSA-WITH-CAMELLIA-256-CBC-SHA256 \
421 TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-SHA256 \
422 TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA256 \
423 TLS-ECDHE-RSA-WITH-CAMELLIA-128-GCM-SHA256 \
424 TLS-ECDHE-RSA-WITH-CAMELLIA-256-GCM-SHA384 \
425 TLS-DHE-RSA-WITH-CAMELLIA-128-GCM-SHA256 \
426 TLS-DHE-RSA-WITH-CAMELLIA-256-GCM-SHA384 \
427 TLS-RSA-WITH-CAMELLIA-128-GCM-SHA256 \
428 TLS-RSA-WITH-CAMELLIA-256-GCM-SHA384 \
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100429 TLS-RSA-WITH-NULL-SHA256 \
430 TLS-RSA-WITH-NULL-SHA \
431 TLS-RSA-WITH-NULL-MD5 \
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100432 "
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100433 G_CIPHERS="$G_CIPHERS \
434 +ECDHE-RSA:+CAMELLIA-128-CBC:+SHA256 \
435 +ECDHE-RSA:+CAMELLIA-256-CBC:+SHA384 \
436 +RSA:+CAMELLIA-128-CBC:+SHA256 \
437 +RSA:+CAMELLIA-256-CBC:+SHA256 \
438 +DHE-RSA:+CAMELLIA-128-CBC:+SHA256 \
439 +DHE-RSA:+CAMELLIA-256-CBC:+SHA256 \
440 +ECDHE-RSA:+CAMELLIA-128-GCM:+AEAD \
441 +ECDHE-RSA:+CAMELLIA-256-GCM:+AEAD \
442 +DHE-RSA:+CAMELLIA-128-GCM:+AEAD \
443 +DHE-RSA:+CAMELLIA-256-GCM:+AEAD \
444 +RSA:+CAMELLIA-128-GCM:+AEAD \
445 +RSA:+CAMELLIA-256-GCM:+AEAD \
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100446 +RSA:+NULL:+SHA256 \
447 +RSA:+NULL:+SHA1 \
448 +RSA:+NULL:+MD5 \
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100449 "
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100450 fi
451 ;;
452
453 "PSK")
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100454 # GnuTLS 3.2.11 (2014-02-13) requires TLS 1.x for most *PSK suites
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100455 if [ "$MODE" != "ssl3" ];
456 then
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100457 P_CIPHERS="$P_CIPHERS \
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100458 TLS-ECDHE-PSK-WITH-AES-256-CBC-SHA \
459 TLS-ECDHE-PSK-WITH-AES-128-CBC-SHA \
460 TLS-ECDHE-PSK-WITH-3DES-EDE-CBC-SHA \
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100461 TLS-DHE-PSK-WITH-3DES-EDE-CBC-SHA \
462 TLS-DHE-PSK-WITH-AES-128-CBC-SHA \
463 TLS-DHE-PSK-WITH-AES-256-CBC-SHA \
464 TLS-RSA-PSK-WITH-3DES-EDE-CBC-SHA \
465 TLS-RSA-PSK-WITH-AES-256-CBC-SHA \
466 TLS-RSA-PSK-WITH-AES-128-CBC-SHA \
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100467 "
468 G_CIPHERS="$G_CIPHERS \
469 +ECDHE-PSK:+AES-256-CBC:+SHA1 \
470 +ECDHE-PSK:+AES-128-CBC:+SHA1 \
471 +ECDHE-PSK:+3DES-CBC:+SHA1 \
472 +DHE-PSK:+3DES-CBC:+SHA1 \
473 +DHE-PSK:+AES-128-CBC:+SHA1 \
474 +DHE-PSK:+AES-256-CBC:+SHA1 \
475 +RSA-PSK:+3DES-CBC:+SHA1 \
476 +RSA-PSK:+AES-256-CBC:+SHA1 \
477 +RSA-PSK:+AES-128-CBC:+SHA1 \
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100478 "
479 fi
480 if [ "$MODE" = "tls1_2" ];
481 then
482 P_CIPHERS="$P_CIPHERS \
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100483 TLS-ECDHE-PSK-WITH-AES-256-CBC-SHA384 \
484 TLS-ECDHE-PSK-WITH-CAMELLIA-256-CBC-SHA384 \
485 TLS-ECDHE-PSK-WITH-AES-128-CBC-SHA256 \
486 TLS-ECDHE-PSK-WITH-CAMELLIA-128-CBC-SHA256 \
487 TLS-ECDHE-PSK-WITH-NULL-SHA384 \
488 TLS-ECDHE-PSK-WITH-NULL-SHA256 \
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100489 TLS-PSK-WITH-AES-128-CBC-SHA256 \
490 TLS-PSK-WITH-AES-256-CBC-SHA384 \
491 TLS-DHE-PSK-WITH-AES-128-CBC-SHA256 \
492 TLS-DHE-PSK-WITH-AES-256-CBC-SHA384 \
493 TLS-PSK-WITH-NULL-SHA256 \
494 TLS-PSK-WITH-NULL-SHA384 \
495 TLS-DHE-PSK-WITH-NULL-SHA256 \
496 TLS-DHE-PSK-WITH-NULL-SHA384 \
497 TLS-RSA-PSK-WITH-AES-256-CBC-SHA384 \
498 TLS-RSA-PSK-WITH-AES-128-CBC-SHA256 \
499 TLS-RSA-PSK-WITH-NULL-SHA256 \
500 TLS-RSA-PSK-WITH-NULL-SHA384 \
501 TLS-DHE-PSK-WITH-CAMELLIA-128-CBC-SHA256 \
502 TLS-DHE-PSK-WITH-CAMELLIA-256-CBC-SHA384 \
503 TLS-PSK-WITH-CAMELLIA-128-CBC-SHA256 \
504 TLS-PSK-WITH-CAMELLIA-256-CBC-SHA384 \
505 TLS-RSA-PSK-WITH-CAMELLIA-256-CBC-SHA384 \
506 TLS-RSA-PSK-WITH-CAMELLIA-128-CBC-SHA256 \
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100507 TLS-PSK-WITH-AES-128-GCM-SHA256 \
508 TLS-PSK-WITH-AES-256-GCM-SHA384 \
509 TLS-DHE-PSK-WITH-AES-128-GCM-SHA256 \
510 TLS-DHE-PSK-WITH-AES-256-GCM-SHA384 \
511 TLS-RSA-PSK-WITH-CAMELLIA-128-GCM-SHA256 \
512 TLS-RSA-PSK-WITH-CAMELLIA-256-GCM-SHA384 \
513 TLS-PSK-WITH-CAMELLIA-128-GCM-SHA256 \
514 TLS-PSK-WITH-CAMELLIA-256-GCM-SHA384 \
515 TLS-DHE-PSK-WITH-CAMELLIA-128-GCM-SHA256 \
516 TLS-DHE-PSK-WITH-CAMELLIA-256-GCM-SHA384 \
517 TLS-RSA-PSK-WITH-AES-256-GCM-SHA384 \
518 TLS-RSA-PSK-WITH-AES-128-GCM-SHA256 \
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100519 "
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100520 G_CIPHERS="$G_CIPHERS \
521 +ECDHE-PSK:+AES-256-CBC:+SHA384 \
522 +ECDHE-PSK:+CAMELLIA-256-CBC:+SHA384 \
523 +ECDHE-PSK:+AES-128-CBC:+SHA256 \
524 +ECDHE-PSK:+CAMELLIA-128-CBC:+SHA256 \
525 +PSK:+AES-128-CBC:+SHA256 \
526 +PSK:+AES-256-CBC:+SHA384 \
527 +DHE-PSK:+AES-128-CBC:+SHA256 \
528 +DHE-PSK:+AES-256-CBC:+SHA384 \
529 +RSA-PSK:+AES-256-CBC:+SHA384 \
530 +RSA-PSK:+AES-128-CBC:+SHA256 \
531 +DHE-PSK:+CAMELLIA-128-CBC:+SHA256 \
532 +DHE-PSK:+CAMELLIA-256-CBC:+SHA384 \
533 +PSK:+CAMELLIA-128-CBC:+SHA256 \
534 +PSK:+CAMELLIA-256-CBC:+SHA384 \
535 +RSA-PSK:+CAMELLIA-256-CBC:+SHA384 \
536 +RSA-PSK:+CAMELLIA-128-CBC:+SHA256 \
537 +PSK:+AES-128-GCM:+AEAD \
538 +PSK:+AES-256-GCM:+AEAD \
539 +DHE-PSK:+AES-128-GCM:+AEAD \
540 +DHE-PSK:+AES-256-GCM:+AEAD \
541 +RSA-PSK:+CAMELLIA-128-GCM:+AEAD \
542 +RSA-PSK:+CAMELLIA-256-GCM:+AEAD \
543 +PSK:+CAMELLIA-128-GCM:+AEAD \
544 +PSK:+CAMELLIA-256-GCM:+AEAD \
545 +DHE-PSK:+CAMELLIA-128-GCM:+AEAD \
546 +DHE-PSK:+CAMELLIA-256-GCM:+AEAD \
547 +RSA-PSK:+AES-256-GCM:+AEAD \
548 +RSA-PSK:+AES-128-GCM:+AEAD \
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100549 +ECDHE-PSK:+NULL:+SHA384 \
550 +ECDHE-PSK:+NULL:+SHA256 \
551 +PSK:+NULL:+SHA256 \
552 +PSK:+NULL:+SHA384 \
553 +DHE-PSK:+NULL:+SHA256 \
554 +DHE-PSK:+NULL:+SHA384 \
555 +RSA-PSK:+NULL:+SHA256 \
556 +RSA-PSK:+NULL:+SHA384 \
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100557 "
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100558 fi
559 ;;
560 esac
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100561}
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100562
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100563add_polarssl_ciphersuites()
564{
565 case $TYPE in
566
567 "ECDSA")
568 if [ "$MODE" != "ssl3" ];
569 then
570 P_CIPHERS="$P_CIPHERS \
571 TLS-ECDH-ECDSA-WITH-CAMELLIA-128-CBC-SHA256 \
572 TLS-ECDH-ECDSA-WITH-CAMELLIA-256-CBC-SHA384 \
573 "
574 fi
575 if [ "$MODE" = "tls1_2" ];
576 then
577 P_CIPHERS="$P_CIPHERS \
578 TLS-ECDH-ECDSA-WITH-CAMELLIA-128-GCM-SHA256 \
579 TLS-ECDH-ECDSA-WITH-CAMELLIA-256-GCM-SHA384 \
580 "
581 fi
582 ;;
583
584 "RSA")
585 ;;
586
587 "PSK")
588 P_CIPHERS="$P_CIPHERS \
589 TLS-PSK-WITH-NULL-SHA \
590 TLS-DHE-PSK-WITH-RC4-128-SHA \
591 TLS-DHE-PSK-WITH-NULL-SHA \
592 TLS-RSA-PSK-WITH-RC4-128-SHA \
593 "
594 if [ "$MODE" != "ssl3" ];
595 then
596 P_CIPHERS="$P_CIPHERS \
597 TLS-ECDHE-PSK-WITH-RC4-128-SHA \
598 TLS-ECDHE-PSK-WITH-NULL-SHA \
599 "
600 fi
601 ;;
602 esac
Manuel Pégourié-Gonnard48f196c2014-02-19 13:51:58 +0100603}
604
Manuel Pégourié-Gonnardd941a792014-02-19 13:35:52 +0100605setup_arguments()
606{
Manuel Pégourié-Gonnard9ada01a2014-02-19 14:24:24 +0100607 case $MODE in
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100608 "ssl3")
609 G_PRIO_MODE="+VERS-SSL3.0"
610 ;;
611 "tls1")
612 G_PRIO_MODE="+VERS-TLS1.0"
613 ;;
614 "tls1_1")
615 G_PRIO_MODE="+VERS-TLS1.1"
616 ;;
617 "tls1_2")
618 G_PRIO_MODE="+VERS-TLS1.2"
Manuel Pégourié-Gonnard9ada01a2014-02-19 14:24:24 +0100619 ;;
620 *)
621 echo "error: invalid mode: $MODE" >&2
622 exit 1;
623 esac
624
625 P_SERVER_ARGS="server_addr=0.0.0.0 force_version=$MODE"
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100626 O_SERVER_ARGS="-www -cipher NULL,ALL -$MODE"
627 G_SERVER_ARGS="-p 4433 --http"
Manuel Pégourié-Gonnard12b84722014-03-25 19:07:28 +0100628 G_SERVER_PRIO="EXPORT:+NULL:+MD5:+PSK:+DHE-PSK:+ECDHE-PSK:+RSA-PSK:-VERS-TLS-ALL:$G_PRIO_MODE"
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100629
630 P_CLIENT_ARGS="force_version=$MODE"
Manuel Pégourié-Gonnard9ada01a2014-02-19 14:24:24 +0100631 O_CLIENT_ARGS="-$MODE"
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100632 G_CLIENT_ARGS="-p 4433 --debug 3"
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100633 G_CLIENT_PRIO="NONE:$G_PRIO_MODE:+COMP-NULL:+CURVE-ALL:+SIGN-ALL"
Manuel Pégourié-Gonnard9ada01a2014-02-19 14:24:24 +0100634
Manuel Pégourié-Gonnardd941a792014-02-19 13:35:52 +0100635 if [ "X$VERIFY" = "XYES" ];
636 then
Manuel Pégourié-Gonnard9ada01a2014-02-19 14:24:24 +0100637 P_SERVER_ARGS="$P_SERVER_ARGS ca_file=data_files/test-ca_cat12.crt auth_mode=required"
Manuel Pégourié-Gonnard9ada01a2014-02-19 14:24:24 +0100638 O_SERVER_ARGS="$O_SERVER_ARGS -CAfile data_files/test-ca_cat12.crt -Verify 10"
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100639 G_SERVER_ARGS="$G_SERVER_ARGS --x509cafile data_files/test-ca_cat12.crt --require-client-cert"
640
641 P_CLIENT_ARGS="$P_CLIENT_ARGS ca_file=data_files/test-ca_cat12.crt auth_mode=required"
Manuel Pégourié-Gonnardda782c92014-02-21 10:10:20 +0100642 O_CLIENT_ARGS="$O_CLIENT_ARGS -CAfile data_files/test-ca_cat12.crt -verify 10"
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100643 G_CLIENT_ARGS="$G_CLIENT_ARGS --x509cafile data_files/test-ca_cat12.crt"
Manuel Pégourié-Gonnardda782c92014-02-21 10:10:20 +0100644 else
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100645 # don't request a client cert at all
Manuel Pégourié-Gonnard1b149ef2014-02-27 14:38:29 +0100646 P_SERVER_ARGS="$P_SERVER_ARGS ca_file=none auth_mode=none"
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100647 G_SERVER_ARGS="$G_SERVER_ARGS --disable-client-cert"
648
Manuel Pégourié-Gonnard5de31ec2014-03-19 17:34:52 +0100649 P_CLIENT_ARGS="$P_CLIENT_ARGS ca_file=none auth_mode=none"
650 O_CLIENT_ARGS="$O_CLIENT_ARGS"
651 G_CLIENT_ARGS="$G_CLIENT_ARGS --insecure"
Manuel Pégourié-Gonnardd941a792014-02-19 13:35:52 +0100652 fi
653
654 case $TYPE in
655 "ECDSA")
Manuel Pégourié-Gonnard9ada01a2014-02-19 14:24:24 +0100656 P_SERVER_ARGS="$P_SERVER_ARGS crt_file=data_files/server5.crt key_file=data_files/server5.key"
Manuel Pégourié-Gonnard9ada01a2014-02-19 14:24:24 +0100657 O_SERVER_ARGS="$O_SERVER_ARGS -cert data_files/server5.crt -key data_files/server5.key"
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100658 G_SERVER_ARGS="$G_SERVER_ARGS --x509certfile data_files/server5.crt --x509keyfile data_files/server5.key"
659
Manuel Pégourié-Gonnard1b149ef2014-02-27 14:38:29 +0100660 if [ "X$VERIFY" = "XYES" ]; then
661 P_CLIENT_ARGS="$P_CLIENT_ARGS crt_file=data_files/server6.crt key_file=data_files/server6.key"
662 O_CLIENT_ARGS="$O_CLIENT_ARGS -cert data_files/server6.crt -key data_files/server6.key"
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100663 G_CLIENT_ARGS="$G_CLIENT_ARGS --x509certfile data_files/server6.crt --x509keyfile data_files/server6.key"
Manuel Pégourié-Gonnard1b149ef2014-02-27 14:38:29 +0100664 else
665 P_CLIENT_ARGS="$P_CLIENT_ARGS crt_file=none key_file=none"
666 fi
Manuel Pégourié-Gonnardd941a792014-02-19 13:35:52 +0100667 ;;
668
669 "RSA")
Manuel Pégourié-Gonnardda782c92014-02-21 10:10:20 +0100670 P_SERVER_ARGS="$P_SERVER_ARGS crt_file=data_files/server2.crt key_file=data_files/server2.key"
Manuel Pégourié-Gonnardda782c92014-02-21 10:10:20 +0100671 O_SERVER_ARGS="$O_SERVER_ARGS -cert data_files/server2.crt -key data_files/server2.key"
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100672 G_SERVER_ARGS="$G_SERVER_ARGS --x509certfile data_files/server2.crt --x509keyfile data_files/server2.key"
673
Manuel Pégourié-Gonnard1b149ef2014-02-27 14:38:29 +0100674 if [ "X$VERIFY" = "XYES" ]; then
675 P_CLIENT_ARGS="$P_CLIENT_ARGS crt_file=data_files/server1.crt key_file=data_files/server1.key"
676 O_CLIENT_ARGS="$O_CLIENT_ARGS -cert data_files/server1.crt -key data_files/server1.key"
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100677 G_CLIENT_ARGS="$G_CLIENT_ARGS --x509certfile data_files/server1.crt --x509keyfile data_files/server1.key"
Manuel Pégourié-Gonnard1b149ef2014-02-27 14:38:29 +0100678 else
679 P_CLIENT_ARGS="$P_CLIENT_ARGS crt_file=none key_file=none"
680 fi
Manuel Pégourié-Gonnardd941a792014-02-19 13:35:52 +0100681 ;;
682
683 "PSK")
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100684 # give RSA-PSK-capable server a RSA cert
Manuel Pégourié-Gonnard1b149ef2014-02-27 14:38:29 +0100685 # (should be a separate type, but harder to close with openssl)
686 P_SERVER_ARGS="$P_SERVER_ARGS psk=6162636465666768696a6b6c6d6e6f70 ca_file=none crt_file=data_files/server2.crt key_file=data_files/server2.key"
Manuel Pégourié-Gonnard1b149ef2014-02-27 14:38:29 +0100687 O_SERVER_ARGS="$O_SERVER_ARGS -psk 6162636465666768696a6b6c6d6e6f70 -nocert"
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100688 G_SERVER_ARGS="$G_SERVER_ARGS --x509certfile data_files/server2.crt --x509keyfile data_files/server2.key --pskpasswd data_files/passwd.psk"
689
690 P_CLIENT_ARGS="$P_CLIENT_ARGS psk=6162636465666768696a6b6c6d6e6f70 crt_file=none key_file=none"
Manuel Pégourié-Gonnard9ada01a2014-02-19 14:24:24 +0100691 O_CLIENT_ARGS="$O_CLIENT_ARGS -psk 6162636465666768696a6b6c6d6e6f70"
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100692 G_CLIENT_ARGS="$G_CLIENT_ARGS --pskusername Client_identity --pskkey=6162636465666768696a6b6c6d6e6f70"
Manuel Pégourié-Gonnardd941a792014-02-19 13:35:52 +0100693 ;;
694 esac
695}
696
Manuel Pégourié-Gonnard3eec6042014-02-27 15:37:24 +0100697# is_polar <cmd_line>
698is_polar() {
699 echo "$1" | grep 'ssl_server2\|ssl_client2' > /dev/null
700}
701
702# has_mem_err <log_file_name>
703has_mem_err() {
704 if ( grep -F 'All heap blocks were freed -- no leaks are possible' "$1" &&
705 grep -F 'ERROR SUMMARY: 0 errors from 0 contexts' "$1" ) > /dev/null
706 then
707 return 1 # false: does not have errors
708 else
709 return 0 # true: has errors
710 fi
711}
712
Manuel Pégourié-Gonnard304beef2014-02-19 14:45:00 +0100713# start_server <name>
714# also saves name and command
715start_server() {
Manuel Pégourié-Gonnard304beef2014-02-19 14:45:00 +0100716 case $1 in
717 [Oo]pen*)
Manuel Pégourié-Gonnard74faf3c2014-03-13 18:47:44 +0100718 SERVER_CMD="$OPENSSL_CMD s_server $O_SERVER_ARGS"
Manuel Pégourié-Gonnard304beef2014-02-19 14:45:00 +0100719 ;;
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100720 [Gg]nu*)
Manuel Pégourié-Gonnard74faf3c2014-03-13 18:47:44 +0100721 SERVER_CMD="$GNUTLS_SERV $G_SERVER_ARGS --priority $G_SERVER_PRIO"
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100722 ;;
Manuel Pégourié-Gonnard304beef2014-02-19 14:45:00 +0100723 [Pp]olar*)
Manuel Pégourié-Gonnardf7a26902014-02-27 12:25:54 +0100724 SERVER_CMD="$P_SRV $P_SERVER_ARGS"
Manuel Pégourié-Gonnard3eec6042014-02-27 15:37:24 +0100725 if [ "$MEMCHECK" -gt 0 ]; then
726 SERVER_CMD="valgrind --leak-check=full $SERVER_CMD"
727 fi
Manuel Pégourié-Gonnard304beef2014-02-19 14:45:00 +0100728 ;;
729 *)
730 echo "error: invalid server name: $1" >&2
731 exit 1
732 ;;
733 esac
734 SERVER_NAME=$1
735
736 log "$SERVER_CMD"
Manuel Pégourié-Gonnardba0b8442014-03-13 17:57:45 +0100737 echo "$SERVER_CMD" > srv_out
738 $SERVER_CMD >> srv_out 2>&1 &
Manuel Pégourié-Gonnard304beef2014-02-19 14:45:00 +0100739 PROCESS_ID=$!
740
741 sleep 1
742}
743
Manuel Pégourié-Gonnard911622d2014-02-27 11:50:40 +0100744# terminate the running server (closing it cleanly if it is ours)
Manuel Pégourié-Gonnard95957712014-02-19 15:29:38 +0100745stop_server() {
Manuel Pégourié-Gonnardc57e98b2014-02-19 17:37:55 +0100746 case $SERVER_NAME in
747 [Pp]olar*)
Manuel Pégourié-Gonnard911622d2014-02-27 11:50:40 +0100748 # we must force a PSK suite when in PSK mode (otherwise client
Manuel Pégourié-Gonnard84fd6872014-03-13 18:35:10 +0100749 # auth will fail), so try every entry in $P_CIPHERS in turn (in
750 # case the first one is not implemented in this configuration)
751 for i in $P_CIPHERS; do
Manuel Pégourié-Gonnard5de31ec2014-03-19 17:34:52 +0100752 log "$P_CLI $P_CLIENT_ARGS request_page=SERVERQUIT auth_mode=none force_ciphersuite=$i"
Manuel Pégourié-Gonnard84fd6872014-03-13 18:35:10 +0100753 "$P_CLI" $P_CLIENT_ARGS request_page=SERVERQUIT auth_mode=none \
Manuel Pégourié-Gonnard84fd6872014-03-13 18:35:10 +0100754 force_ciphersuite=$i >/dev/null
755 if [ "$?" == 0 ]; then
756 break
757 fi
758 done
Manuel Pégourié-Gonnardc57e98b2014-02-19 17:37:55 +0100759 ;;
Manuel Pégourié-Gonnard911622d2014-02-27 11:50:40 +0100760 *)
761 kill $PROCESS_ID 2>/dev/null
Manuel Pégourié-Gonnardc57e98b2014-02-19 17:37:55 +0100762 esac
763
Manuel Pégourié-Gonnard95957712014-02-19 15:29:38 +0100764 wait $PROCESS_ID 2>/dev/null
Manuel Pégourié-Gonnard3eec6042014-02-27 15:37:24 +0100765
766 if [ "$MEMCHECK" -gt 0 ]; then
767 if is_polar "$SERVER_CMD" && has_mem_err srv_out; then
768 echo " ! Server had memory errors"
769 let "srvmem++"
770 return
771 fi
772 fi
773
Manuel Pégourié-Gonnard87ae3032014-02-27 11:12:30 +0100774 rm -f srv_out
Manuel Pégourié-Gonnard95957712014-02-19 15:29:38 +0100775}
776
Manuel Pégourié-Gonnarda9062e92014-02-25 16:21:22 +0100777# kill the running server (used when killed by signal)
778cleanup() {
Manuel Pégourié-Gonnard87ae3032014-02-27 11:12:30 +0100779 rm -f srv_out cli_out
Manuel Pégourié-Gonnarda9062e92014-02-25 16:21:22 +0100780 kill $PROCESS_ID
781 exit 1
782}
783
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100784# run_client <name> <cipher>
785run_client() {
Manuel Pégourié-Gonnard87ae3032014-02-27 11:12:30 +0100786 # announce what we're going to do
787 let "tests++"
788 VERIF=$(echo $VERIFY | tr '[:upper:]' '[:lower:]')
Manuel Pégourié-Gonnarde01af4c2014-03-25 14:16:44 +0100789 TITLE="${1:0:1}->${SERVER_NAME:0:1} $MODE,$VERIF $2"
790 echo -n "$TITLE "
Manuel Pégourié-Gonnard87ae3032014-02-27 11:12:30 +0100791 LEN=`echo "$TITLE" | wc -c`
792 LEN=`echo 72 - $LEN | bc`
793 for i in `seq 1 $LEN`; do echo -n '.'; done; echo -n ' '
794
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100795 # run the command and interpret result
796 case $1 in
797 [Oo]pen*)
Manuel Pégourié-Gonnard74faf3c2014-03-13 18:47:44 +0100798 CLIENT_CMD="$OPENSSL_CMD s_client $O_CLIENT_ARGS -cipher $2"
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100799 log "$CLIENT_CMD"
Manuel Pégourié-Gonnardba0b8442014-03-13 17:57:45 +0100800 echo "$CLIENT_CMD" > cli_out
801 ( echo -e 'GET HTTP/1.0'; echo; ) | $CLIENT_CMD >> cli_out 2>&1
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100802 EXIT=$?
803
804 if [ "$EXIT" == "0" ]; then
805 RESULT=0
806 else
Manuel Pégourié-Gonnard87ae3032014-02-27 11:12:30 +0100807 if grep 'Cipher is (NONE)' cli_out >/dev/null; then
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100808 RESULT=1
809 else
810 RESULT=2
811 fi
812 fi
813 ;;
814
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100815 [Gg]nu*)
Manuel Pégourié-Gonnard74faf3c2014-03-13 18:47:44 +0100816 CLIENT_CMD="$GNUTLS_CLI $G_CLIENT_ARGS --priority $G_PRIO_MODE:$2 localhost"
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100817 log "$CLIENT_CMD"
Manuel Pégourié-Gonnardba0b8442014-03-13 17:57:45 +0100818 echo "$CLIENT_CMD" > cli_out
819 ( echo -e 'GET HTTP/1.0'; echo; ) | $CLIENT_CMD >> cli_out 2>&1
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100820 EXIT=$?
821
822 if [ "$EXIT" == "0" ]; then
823 RESULT=0
824 else
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100825 RESULT=2
826 # interpret early failure, with a handshake_failure alert
827 # before the server hello, as "no ciphersuite in common"
828 if grep -F 'Received alert [40]: Handshake failed' cli_out; then
829 if grep -i 'SERVER HELLO .* was received' cli_out; then :
830 else
831 RESULT=1
832 fi
833 fi >/dev/null
Manuel Pégourié-Gonnarda4371442014-03-13 16:21:59 +0100834 fi
835 ;;
836
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100837 [Pp]olar*)
Manuel Pégourié-Gonnardf7a26902014-02-27 12:25:54 +0100838 CLIENT_CMD="$P_CLI $P_CLIENT_ARGS force_ciphersuite=$2"
Manuel Pégourié-Gonnard3eec6042014-02-27 15:37:24 +0100839 if [ "$MEMCHECK" -gt 0 ]; then
840 CLIENT_CMD="valgrind --leak-check=full $CLIENT_CMD"
841 fi
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100842 log "$CLIENT_CMD"
Manuel Pégourié-Gonnardba0b8442014-03-13 17:57:45 +0100843 echo "$CLIENT_CMD" > cli_out
844 $CLIENT_CMD >> cli_out 2>&1
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100845 EXIT=$?
846
847 case $EXIT in
848 "0") RESULT=0 ;;
849 "2") RESULT=1 ;;
850 *) RESULT=2 ;;
851 esac
Manuel Pégourié-Gonnard3eec6042014-02-27 15:37:24 +0100852
853 if [ "$MEMCHECK" -gt 0 ]; then
854 if is_polar "$CLIENT_CMD" && has_mem_err cli_out; then
855 RESULT=2
856 fi
857 fi
858
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100859 ;;
860
861 *)
862 echo "error: invalid client name: $1" >&2
863 exit 1
864 ;;
865 esac
866
Manuel Pégourié-Gonnarde01af4c2014-03-25 14:16:44 +0100867 echo "EXIT: $EXIT" >> cli_out
868
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100869 # report and count result
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100870 case $RESULT in
871 "0")
Manuel Pégourié-Gonnard4145b892014-02-24 13:20:14 +0100872 echo PASS
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100873 ;;
874 "1")
Manuel Pégourié-Gonnard4145b892014-02-24 13:20:14 +0100875 echo SKIP
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100876 let "skipped++"
877 ;;
878 "2")
Manuel Pégourié-Gonnard4145b892014-02-24 13:20:14 +0100879 echo FAIL
Manuel Pégourié-Gonnard3eec6042014-02-27 15:37:24 +0100880 cp srv_out c-srv-${tests}.log
881 cp cli_out c-cli-${tests}.log
882 echo " ! outputs saved to c-srv-${tests}.log, c-cli-${tests}.log"
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100883 let "failed++"
884 ;;
885 esac
Manuel Pégourié-Gonnard87ae3032014-02-27 11:12:30 +0100886
887 rm -f cli_out
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100888}
889
Manuel Pégourié-Gonnard9dea8bd2014-02-26 18:21:02 +0100890#
891# MAIN
892#
893
Manuel Pégourié-Gonnard3947d042014-03-14 18:13:53 +0100894get_options "$@"
895
Manuel Pégourié-Gonnardf7a26902014-02-27 12:25:54 +0100896# sanity checks, avoid an avalanche of errors
897if [ ! -x "$P_SRV" ]; then
Manuel Pégourié-Gonnard3947d042014-03-14 18:13:53 +0100898 echo "Command '$P_SRV' is not an executable file" >&2
Manuel Pégourié-Gonnardf7a26902014-02-27 12:25:54 +0100899 exit 1
900fi
901if [ ! -x "$P_CLI" ]; then
Manuel Pégourié-Gonnard3947d042014-03-14 18:13:53 +0100902 echo "Command '$P_CLI' is not an executable file" >&2
Manuel Pégourié-Gonnardf7a26902014-02-27 12:25:54 +0100903 exit 1
904fi
Manuel Pégourié-Gonnard3947d042014-03-14 18:13:53 +0100905
906if echo "$PEERS" | grep -i openssl > /dev/null; then
907 if which "$OPENSSL_CMD" >/dev/null 2>&1; then :; else
908 echo "Command '$OPENSSL_CMD' not found" >&2
Manuel Pégourié-Gonnard74faf3c2014-03-13 18:47:44 +0100909 exit 1
910 fi
Manuel Pégourié-Gonnard3947d042014-03-14 18:13:53 +0100911fi
Manuel Pégourié-Gonnardf7a26902014-02-27 12:25:54 +0100912
Manuel Pégourié-Gonnard3947d042014-03-14 18:13:53 +0100913if echo "$PEERS" | grep -i gnutls > /dev/null; then
914 for CMD in "$GNUTLS_CLI" "$GNUTLS_SERV"; do
915 if which "$CMD" >/dev/null 2>&1; then :; else
916 echo "Command '$CMD' not found" >&2
917 exit 1
918 fi
919 done
920fi
921
922for PEER in $PEERS; do
923 case "$PEER" in
924 [Pp]olar*|[Oo]pen*|[Gg]nu*)
925 ;;
926 *)
927 echo "Unknown peers: $PEER" >&2
928 exit 1
929 esac
930done
Manuel Pégourié-Gonnard9dea8bd2014-02-26 18:21:02 +0100931
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100932killall -q gnutls-serv openssl ssl_server ssl_server2
Manuel Pégourié-Gonnarda9062e92014-02-25 16:21:22 +0100933trap cleanup INT TERM HUP
934
Manuel Pégourié-Gonnard95957712014-02-19 15:29:38 +0100935for VERIFY in $VERIFIES; do
936 for MODE in $MODES; do
Manuel Pégourié-Gonnard95957712014-02-19 15:29:38 +0100937 for TYPE in $TYPES; do
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100938 for PEER in $PEERS; do
Paul Bakker7e5e7ca2013-04-17 19:27:58 +0200939
Manuel Pégourié-Gonnard95957712014-02-19 15:29:38 +0100940 setup_arguments
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100941
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100942 case "$PEER" in
Manuel Pégourié-Gonnardd3313192013-09-13 19:20:37 +0200943
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100944 [Oo]pen*)
Paul Bakker398cb512012-04-10 08:22:31 +0000945
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100946 reset_ciphersuites
Manuel Pégourié-Gonnard12b84722014-03-25 19:07:28 +0100947 add_common_ciphersuites
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100948 add_openssl_ciphersuites
949 filter_ciphersuites
Manuel Pégourié-Gonnard330e4112014-02-19 15:23:21 +0100950
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100951 if [ "X" != "X$P_CIPHERS" ]; then
952 start_server "OpenSSL"
953 for i in $P_CIPHERS; do
954 run_client PolarSSL $i
955 done
956 stop_server
957 fi
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100958
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100959 if [ "X" != "X$O_CIPHERS" ]; then
960 start_server "PolarSSL"
961 for i in $O_CIPHERS; do
962 run_client OpenSSL $i
963 done
964 stop_server
965 fi
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100966
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100967 ;;
Manuel Pégourié-Gonnard5b2d7762014-02-28 12:42:57 +0100968
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100969 [Gg]nu*)
Paul Bakkerfab5c822012-02-06 16:45:10 +0000970
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100971 reset_ciphersuites
Manuel Pégourié-Gonnard12b84722014-03-25 19:07:28 +0100972 add_common_ciphersuites
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100973 add_gnutls_ciphersuites
974 filter_ciphersuites
Paul Bakkerfab5c822012-02-06 16:45:10 +0000975
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100976 if [ "X" != "X$P_CIPHERS" ]; then
977 start_server "GnuTLS"
978 for i in $P_CIPHERS; do
979 run_client PolarSSL $i
980 done
981 stop_server
982 fi
983
984 if [ "X" != "X$G_CIPHERS" ]; then
985 start_server "PolarSSL"
986 for i in $G_CIPHERS; do
987 run_client GnuTLS $i
988 done
989 stop_server
990 fi
991
992 ;;
993
994 [Pp]olar*)
995
996 reset_ciphersuites
Manuel Pégourié-Gonnard12b84722014-03-25 19:07:28 +0100997 add_common_ciphersuites
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +0100998 add_openssl_ciphersuites
999 add_gnutls_ciphersuites
1000 add_polarssl_ciphersuites
1001 filter_ciphersuites
1002
1003 if [ "X" != "X$P_CIPHERS" ]; then
1004 start_server "PolarSSL"
1005 for i in $P_CIPHERS; do
1006 run_client PolarSSL $i
1007 done
1008 stop_server
1009 fi
1010
1011 ;;
1012
Manuel Pégourié-Gonnarda1a9f9a2014-03-25 18:04:59 +01001013 *)
1014 echo "Unkown peer: $PEER" >&2
1015 exit 1
1016 ;;
1017
Manuel Pégourié-Gonnard9edba772014-03-13 17:45:35 +01001018 esac
1019
1020 done
Manuel Pégourié-Gonnard95957712014-02-19 15:29:38 +01001021 done
1022 done
Manuel Pégourié-Gonnard9791a402013-08-27 19:57:15 +02001023done
Manuel Pégourié-Gonnard70064fd2013-08-27 22:00:47 +02001024
Manuel Pégourié-Gonnard4145b892014-02-24 13:20:14 +01001025echo "------------------------------------------------------------------------"
Manuel Pégourié-Gonnard70064fd2013-08-27 22:00:47 +02001026
Manuel Pégourié-Gonnard3eec6042014-02-27 15:37:24 +01001027if (( failed != 0 && srvmem != 0 ));
Manuel Pégourié-Gonnard70064fd2013-08-27 22:00:47 +02001028then
1029 echo -n "FAILED"
1030else
1031 echo -n "PASSED"
1032fi
1033
Manuel Pégourié-Gonnardba0b8442014-03-13 17:57:45 +01001034if [ "$MEMCHECK" -gt 0 ]; then
1035 MEMREPORT=", $srvmem server memory errors"
1036else
1037 MEMREPORT=""
1038fi
1039
Manuel Pégourié-Gonnard70064fd2013-08-27 22:00:47 +02001040let "passed = tests - failed"
Manuel Pégourié-Gonnardba0b8442014-03-13 17:57:45 +01001041echo " ($passed / $tests tests ($skipped skipped$MEMREPORT))"
Manuel Pégourié-Gonnard70064fd2013-08-27 22:00:47 +02001042
Manuel Pégourié-Gonnard3eec6042014-02-27 15:37:24 +01001043let "failed += srvmem"
Manuel Pégourié-Gonnard70064fd2013-08-27 22:00:47 +02001044exit $failed