Blame tests/priority-init2.c

Packit Service 4684c1
/*
Packit Service 4684c1
 * Copyright (C) 2008-2012 Free Software Foundation, Inc.
Packit Service 4684c1
 * Copyright (C) 2018 Red Hat, Inc.
Packit Service 4684c1
 *
Packit Service 4684c1
 * Author: Simon Josefsson, Nikos Mavrogiannopoulos
Packit Service 4684c1
 *
Packit Service 4684c1
 * This file is part of GnuTLS.
Packit Service 4684c1
 *
Packit Service 4684c1
 * GnuTLS is free software; you can redistribute it and/or modify it
Packit Service 4684c1
 * under the terms of the GNU General Public License as published by
Packit Service 4684c1
 * the Free Software Foundation; either version 3 of the License, or
Packit Service 4684c1
 * (at your option) any later version.
Packit Service 4684c1
 *
Packit Service 4684c1
 * GnuTLS is distributed in the hope that it will be useful, but
Packit Service 4684c1
 * WITHOUT ANY WARRANTY; without even the implied warranty of
Packit Service 4684c1
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
Packit Service 4684c1
 * General Public License for more details.
Packit Service 4684c1
 *
Packit Service 4684c1
 * You should have received a copy of the GNU Lesser General Public License
Packit Service 4684c1
 * along with this program.  If not, see <https://www.gnu.org/licenses/>
Packit Service 4684c1
 */
Packit Service 4684c1
Packit Service 4684c1
#ifdef HAVE_CONFIG_H
Packit Service 4684c1
#include <config.h>
Packit Service 4684c1
#endif
Packit Service 4684c1
Packit Service 4684c1
#include <stdio.h>
Packit Service 4684c1
#include <stdlib.h>
Packit Service 4684c1
#include <string.h>
Packit Service 4684c1
#include <errno.h>
Packit Service 4684c1
#include <assert.h>
Packit Service 4684c1
#include <gnutls/gnutls.h>
Packit Service 4684c1
#include "utils.h"
Packit Service 4684c1
#include "eagain-common.h"
Packit Service 4684c1
#include "cert-common.h"
Packit Service 4684c1
Packit Service 4684c1
const char *side;
Packit Service 4684c1
extern const char *_gnutls_default_priority_string;
Packit Service 4684c1
Packit Service 4684c1
static void tls_log_func(int level, const char *str)
Packit Service 4684c1
{
Packit Service 4684c1
	fprintf(stderr, "%s|<%d>| %s", side, level, str);
Packit Service 4684c1
}
Packit Service 4684c1
Packit Service 4684c1
struct test_st {
Packit Service 4684c1
	const char *name;
Packit Service 4684c1
	const char *add_prio;
Packit Service 4684c1
	const char *def_prio;
Packit Service 4684c1
	int exp_err;
Packit Service 4684c1
	int exp_etm;
Packit Service 4684c1
	unsigned err_pos;
Packit Service 4684c1
	unsigned exp_vers;
Packit Service 4684c1
};
Packit Service 4684c1
Packit Service 4684c1
static void start(struct test_st *test)
Packit Service 4684c1
{
Packit Service 4684c1
	int ret;
Packit Service 4684c1
	/* Server stuff. */
Packit Service 4684c1
	gnutls_priority_t cache;
Packit Service 4684c1
	gnutls_certificate_credentials_t serverx509cred;
Packit Service 4684c1
	gnutls_session_t server;
Packit Service 4684c1
	int sret = GNUTLS_E_AGAIN;
Packit Service 4684c1
	/* Client stuff. */
Packit Service 4684c1
	gnutls_certificate_credentials_t clientx509cred;
Packit Service 4684c1
	gnutls_session_t client;
Packit Service 4684c1
	const char *ep;
Packit Service 4684c1
	int cret = GNUTLS_E_AGAIN;
Packit Service 4684c1
Packit Service 4684c1
	if (test == NULL)
Packit Service 4684c1
		success("running gnutls_set_default_priority test\n");
Packit Service 4684c1
	else
Packit Service 4684c1
		success("running %s\n", test->name);
Packit Service 4684c1
Packit Service 4684c1
	if (test && test->def_prio)
Packit Service 4684c1
		_gnutls_default_priority_string = test->def_prio;
Packit Service 4684c1
	else
Packit Service 4684c1
		_gnutls_default_priority_string = "NORMAL";
Packit Service 4684c1
Packit Service 4684c1
	/* General init. */
Packit Service 4684c1
	global_init();
Packit Service 4684c1
	gnutls_global_set_log_function(tls_log_func);
Packit Service 4684c1
	if (debug)
Packit Service 4684c1
		gnutls_global_set_log_level(6);
Packit Service 4684c1
Packit Service 4684c1
	assert(gnutls_certificate_allocate_credentials(&serverx509cred)>=0);
Packit Service 4684c1
	assert(gnutls_certificate_set_x509_key_mem(serverx509cred,
Packit Service 4684c1
					    &server_cert, &server_key,
Packit Service 4684c1
					    GNUTLS_X509_FMT_PEM)>=0);
Packit Service 4684c1
Packit Service 4684c1
	assert(gnutls_init(&server, GNUTLS_SERVER) >= 0);
Packit Service 4684c1
	gnutls_credentials_set(server, GNUTLS_CRD_CERTIFICATE,
Packit Service 4684c1
				serverx509cred);
Packit Service 4684c1
	if (test == NULL) {
Packit Service 4684c1
		ret = gnutls_priority_init(&cache, NULL, NULL);
Packit Service 4684c1
		if (ret < 0)
Packit Service 4684c1
			fail("error: %s\n", gnutls_strerror(ret));
Packit Service 4684c1
	} else {
Packit Service 4684c1
		ret = gnutls_priority_init2(&cache, test->add_prio, &ep, GNUTLS_PRIORITY_INIT_DEF_APPEND);
Packit Service 4684c1
		if (ret < 0) {
Packit Service 4684c1
			if (test->exp_err == ret) {
Packit Service 4684c1
				if (strchr(_gnutls_default_priority_string, '@') != 0) {
Packit Service 4684c1
					if (ep != test->add_prio) {
Packit Service 4684c1
						fail("error expected error on start of string[%d]: %s\n",
Packit Service 4684c1
							test->err_pos, test->add_prio);
Packit Service 4684c1
					}
Packit Service 4684c1
				} else {
Packit Service 4684c1
					if (ep-test->add_prio != test->err_pos) {
Packit Service 4684c1
						fprintf(stderr, "diff: %d\n", (int)(ep-test->add_prio));
Packit Service 4684c1
						fail("error expected error on different position[%d]: %s\n",
Packit Service 4684c1
							test->err_pos, test->add_prio);
Packit Service 4684c1
					}
Packit Service 4684c1
				}
Packit Service 4684c1
				goto cleanup;
Packit Service 4684c1
			}
Packit Service 4684c1
			fail("error: %s\n", gnutls_strerror(ret));
Packit Service 4684c1
		}
Packit Service 4684c1
	}
Packit Service 4684c1
	gnutls_priority_set(server, cache);
Packit Service 4684c1
Packit Service 4684c1
	gnutls_transport_set_push_function(server, server_push);
Packit Service 4684c1
	gnutls_transport_set_pull_function(server, server_pull);
Packit Service 4684c1
	gnutls_transport_set_ptr(server, server);
Packit Service 4684c1
Packit Service 4684c1
	/* Init client */
Packit Service 4684c1
	ret = gnutls_certificate_allocate_credentials(&clientx509cred);
Packit Service 4684c1
	if (ret < 0)
Packit Service 4684c1
		exit(1);
Packit Service 4684c1
Packit Service 4684c1
	ret = gnutls_certificate_set_x509_trust_mem(clientx509cred, &ca_cert, GNUTLS_X509_FMT_PEM);
Packit Service 4684c1
	if (ret < 0)
Packit Service 4684c1
		exit(1);
Packit Service 4684c1
Packit Service 4684c1
	ret = gnutls_init(&client, GNUTLS_CLIENT);
Packit Service 4684c1
	if (ret < 0)
Packit Service 4684c1
		exit(1);
Packit Service 4684c1
Packit Service 4684c1
	ret = gnutls_credentials_set(client, GNUTLS_CRD_CERTIFICATE,
Packit Service 4684c1
				clientx509cred);
Packit Service 4684c1
	if (ret < 0)
Packit Service 4684c1
		exit(1);
Packit Service 4684c1
Packit Service 4684c1
	ret = gnutls_set_default_priority(client);
Packit Service 4684c1
	if (ret < 0)
Packit Service 4684c1
		exit(1);
Packit Service 4684c1
Packit Service 4684c1
	gnutls_transport_set_push_function(client, client_push);
Packit Service 4684c1
	gnutls_transport_set_pull_function(client, client_pull);
Packit Service 4684c1
	gnutls_transport_set_ptr(client, client);
Packit Service 4684c1
Packit Service 4684c1
	HANDSHAKE(client, server);
Packit Service 4684c1
Packit Service 4684c1
	/* check gnutls_certificate_get_ours() - client side */
Packit Service 4684c1
	{
Packit Service 4684c1
		const gnutls_datum_t *mcert;
Packit Service 4684c1
Packit Service 4684c1
		mcert = gnutls_certificate_get_ours(client);
Packit Service 4684c1
		if (mcert != NULL) {
Packit Service 4684c1
			fail("gnutls_certificate_get_ours(): failed\n");
Packit Service 4684c1
			exit(1);
Packit Service 4684c1
		}
Packit Service 4684c1
	}
Packit Service 4684c1
Packit Service 4684c1
	if (test && test->exp_vers != 0) {
Packit Service 4684c1
		if (test->exp_vers != gnutls_protocol_get_version(server)) {
Packit Service 4684c1
			fail("expected version %s, got %s\n",
Packit Service 4684c1
			     gnutls_protocol_get_name(test->exp_vers),
Packit Service 4684c1
			     gnutls_protocol_get_name(gnutls_protocol_get_version(server)));
Packit Service 4684c1
		}
Packit Service 4684c1
	}
Packit Service 4684c1
Packit Service 4684c1
	/* check the number of certificates received */
Packit Service 4684c1
	{
Packit Service 4684c1
		unsigned cert_list_size = 0;
Packit Service 4684c1
		gnutls_typed_vdata_st data[2];
Packit Service 4684c1
		unsigned status;
Packit Service 4684c1
Packit Service 4684c1
		memset(data, 0, sizeof(data));
Packit Service 4684c1
Packit Service 4684c1
		data[0].type = GNUTLS_DT_DNS_HOSTNAME;
Packit Service 4684c1
		data[0].data = (void*)"localhost1";
Packit Service 4684c1
Packit Service 4684c1
		data[1].type = GNUTLS_DT_KEY_PURPOSE_OID;
Packit Service 4684c1
		data[1].data = (void*)GNUTLS_KP_TLS_WWW_SERVER;
Packit Service 4684c1
Packit Service 4684c1
		gnutls_certificate_get_peers(client, &cert_list_size);
Packit Service 4684c1
		if (cert_list_size < 2) {
Packit Service 4684c1
			fprintf(stderr, "received a certificate list of %d!\n", cert_list_size);
Packit Service 4684c1
			exit(1);
Packit Service 4684c1
		}
Packit Service 4684c1
Packit Service 4684c1
		ret = gnutls_certificate_verify_peers(client, data, 2, &status);
Packit Service 4684c1
		if (ret < 0) {
Packit Service 4684c1
			fprintf(stderr, "could not verify certificate: %s\n", gnutls_strerror(ret));
Packit Service 4684c1
			exit(1);
Packit Service 4684c1
		}
Packit Service 4684c1
Packit Service 4684c1
		if (status == 0) {
Packit Service 4684c1
			fprintf(stderr, "should not have accepted!\n");
Packit Service 4684c1
			exit(1);
Packit Service 4684c1
		}
Packit Service 4684c1
Packit Service 4684c1
		data[0].type = GNUTLS_DT_DNS_HOSTNAME;
Packit Service 4684c1
		data[0].data = (void*)"localhost";
Packit Service 4684c1
Packit Service 4684c1
		ret = gnutls_certificate_verify_peers(client, data, 2, &status);
Packit Service 4684c1
		if (ret < 0) {
Packit Service 4684c1
			fprintf(stderr, "could not verify certificate: %s\n", gnutls_strerror(ret));
Packit Service 4684c1
			exit(1);
Packit Service 4684c1
		}
Packit Service 4684c1
Packit Service 4684c1
		if (status != 0) {
Packit Service 4684c1
			fprintf(stderr, "could not verify certificate: %.4x\n", status);
Packit Service 4684c1
			exit(1);
Packit Service 4684c1
		}
Packit Service 4684c1
	}
Packit Service 4684c1
Packit Service 4684c1
	if (test && test->exp_etm) {
Packit Service 4684c1
		ret = gnutls_session_ext_master_secret_status(client);
Packit Service 4684c1
		if (ret != 1) {
Packit Service 4684c1
			fprintf(stderr, "Extended master secret wasn't negotiated by default (client ret: %d)\n", ret);
Packit Service 4684c1
			exit(1);
Packit Service 4684c1
		}
Packit Service 4684c1
Packit Service 4684c1
		ret = gnutls_session_ext_master_secret_status(server);
Packit Service 4684c1
		if (ret != 1) {
Packit Service 4684c1
			fprintf(stderr, "Extended master secret wasn't negotiated by default (server ret: %d)\n", ret);
Packit Service 4684c1
			exit(1);
Packit Service 4684c1
		}
Packit Service 4684c1
	}
Packit Service 4684c1
Packit Service 4684c1
	gnutls_bye(client, GNUTLS_SHUT_RDWR);
Packit Service 4684c1
	gnutls_bye(server, GNUTLS_SHUT_RDWR);
Packit Service 4684c1
Packit Service 4684c1
	gnutls_deinit(client);
Packit Service 4684c1
	gnutls_certificate_free_credentials(clientx509cred);
Packit Service 4684c1
 cleanup:
Packit Service 4684c1
	gnutls_priority_deinit(cache);
Packit Service 4684c1
	gnutls_deinit(server);
Packit Service 4684c1
Packit Service 4684c1
	gnutls_certificate_free_credentials(serverx509cred);
Packit Service 4684c1
Packit Service 4684c1
	gnutls_global_deinit();
Packit Service 4684c1
	reset_buffers();
Packit Service 4684c1
}
Packit Service 4684c1
Packit Service 4684c1
struct test_st tests[] = {
Packit Service 4684c1
	{
Packit Service 4684c1
		.name = "additional flag",
Packit Service 4684c1
		.def_prio = "NORMAL",
Packit Service 4684c1
		.add_prio = "%FORCE_ETM",
Packit Service 4684c1
		.exp_err = 0
Packit Service 4684c1
	},
Packit Service 4684c1
	{
Packit Service 4684c1
		.name = "additional flag typo1",
Packit Service 4684c1
		.def_prio = "NORMAL",
Packit Service 4684c1
		.add_prio = ":%FORCE_ETM",
Packit Service 4684c1
		.exp_err = GNUTLS_E_INVALID_REQUEST,
Packit Service 4684c1
		.err_pos = 0
Packit Service 4684c1
	},
Packit Service 4684c1
	{
Packit Service 4684c1
		.name = "additional flag typo2",
Packit Service 4684c1
		.def_prio = "NORMAL",
Packit Service 4684c1
		.add_prio = "%FORCE_ETM::%NO_TICKETS",
Packit Service 4684c1
		.exp_err = GNUTLS_E_INVALID_REQUEST,
Packit Service 4684c1
		.err_pos = 11
Packit Service 4684c1
	},
Packit Service 4684c1
	{
Packit Service 4684c1
		.name = "additional flag typo3",
Packit Service 4684c1
		.def_prio = "NORMAL",
Packit Service 4684c1
		.add_prio = "%FORCE_ETM:%%NO_TICKETS",
Packit Service 4684c1
		.exp_err = GNUTLS_E_INVALID_REQUEST,
Packit Service 4684c1
		.err_pos = 11
Packit Service 4684c1
	},
Packit Service 4684c1
	{
Packit Service 4684c1
		.name = "additional flag typo3 (with resolved def prio)",
Packit Service 4684c1
		.def_prio = "@HELLO",
Packit Service 4684c1
		.add_prio = "%FORCE_ETM:%%NO_TICKETS",
Packit Service 4684c1
		.exp_err = GNUTLS_E_INVALID_REQUEST,
Packit Service 4684c1
		.err_pos = 0
Packit Service 4684c1
	},
Packit Service 4684c1
	{
Packit Service 4684c1
		.name = "additional flag for version (functional)",
Packit Service 4684c1
		.def_prio = "NORMAL",
Packit Service 4684c1
		.add_prio = "-VERS-ALL:+VERS-TLS1.1",
Packit Service 4684c1
		.exp_etm = 1,
Packit Service 4684c1
		.exp_err = 0,
Packit Service 4684c1
		.exp_vers = GNUTLS_TLS1_1
Packit Service 4684c1
	}
Packit Service 4684c1
};
Packit Service 4684c1
Packit Service 4684c1
Packit Service 4684c1
void doit(void)
Packit Service 4684c1
{
Packit Service 4684c1
	start(NULL);
Packit Service 4684c1
	for (unsigned i=0;i
Packit Service 4684c1
		start(&tests[i]);
Packit Service 4684c1
	}
Packit Service 4684c1
}