|  | /* | 
|  | * Copyright 2016 The OpenSSL Project Authors. All Rights Reserved. | 
|  | * | 
|  | * Licensed under the OpenSSL licenses, (the "License"); | 
|  | * you may not use this file except in compliance with the License. | 
|  | * You may obtain a copy of the License at | 
|  | * https://www.openssl.org/source/license.html | 
|  | * or in the file LICENSE in the source distribution. | 
|  | */ | 
|  |  | 
|  | #include <stdio.h> | 
|  |  | 
|  | #include <openssl/opensslconf.h> | 
|  | #include <openssl/err.h> | 
|  | #include <openssl/e_os2.h> | 
|  | #include <openssl/ssl.h> | 
|  | #include <openssl/ssl3.h> | 
|  | #include <openssl/tls1.h> | 
|  |  | 
|  | #include "e_os.h" | 
|  | #include "testutil.h" | 
|  |  | 
|  | typedef struct cipherlist_test_fixture { | 
|  | const char *test_case_name; | 
|  | SSL_CTX *server; | 
|  | SSL_CTX *client; | 
|  | } CIPHERLIST_TEST_FIXTURE; | 
|  |  | 
|  |  | 
|  | static CIPHERLIST_TEST_FIXTURE set_up(const char *const test_case_name) | 
|  | { | 
|  | CIPHERLIST_TEST_FIXTURE fixture; | 
|  | fixture.test_case_name = test_case_name; | 
|  | fixture.server = SSL_CTX_new(TLS_server_method()); | 
|  | fixture.client = SSL_CTX_new(TLS_client_method()); | 
|  | OPENSSL_assert(fixture.client != NULL && fixture.server != NULL); | 
|  | return fixture; | 
|  | } | 
|  |  | 
|  | /* | 
|  | * All ciphers in the DEFAULT cipherlist meet the default security level. | 
|  | * However, default supported ciphers exclude SRP and PSK ciphersuites | 
|  | * for which no callbacks have been set up. | 
|  | * | 
|  | * Supported ciphers also exclude TLSv1.2 ciphers if TLSv1.2 is disabled, | 
|  | * and individual disabled algorithms. However, NO_RSA, NO_AES and NO_SHA | 
|  | * are currently broken and should be considered mission impossible in libssl. | 
|  | */ | 
|  | static const uint32_t default_ciphers_in_order[] = { | 
|  | #ifndef OPENSSL_NO_TLS1_2 | 
|  | # ifndef OPENSSL_NO_EC | 
|  | TLS1_CK_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, | 
|  | TLS1_CK_ECDHE_RSA_WITH_AES_256_GCM_SHA384, | 
|  | # endif | 
|  | # ifndef OPENSSL_NO_DH | 
|  | TLS1_CK_DHE_RSA_WITH_AES_256_GCM_SHA384, | 
|  | # endif | 
|  |  | 
|  | # if !defined OPENSSL_NO_CHACHA && !defined OPENSSL_NO_POLY1305 | 
|  | #  ifndef OPENSSL_NO_EC | 
|  | TLS1_CK_ECDHE_ECDSA_WITH_CHACHA20_POLY1305, | 
|  | TLS1_CK_ECDHE_RSA_WITH_CHACHA20_POLY1305, | 
|  | #  endif | 
|  | #  ifndef OPENSSL_NO_DH | 
|  | TLS1_CK_DHE_RSA_WITH_CHACHA20_POLY1305, | 
|  | #  endif | 
|  | # endif  /* !OPENSSL_NO_CHACHA && !OPENSSL_NO_POLY1305 */ | 
|  |  | 
|  | # ifndef OPENSSL_NO_EC | 
|  | TLS1_CK_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, | 
|  | TLS1_CK_ECDHE_RSA_WITH_AES_128_GCM_SHA256, | 
|  | # endif | 
|  | # ifndef OPENSSL_NO_DH | 
|  | TLS1_CK_DHE_RSA_WITH_AES_128_GCM_SHA256, | 
|  | # endif | 
|  | # ifndef OPENSSL_NO_EC | 
|  | TLS1_CK_ECDHE_ECDSA_WITH_AES_256_SHA384, | 
|  | TLS1_CK_ECDHE_RSA_WITH_AES_256_SHA384, | 
|  | # endif | 
|  | # ifndef OPENSSL_NO_DH | 
|  | TLS1_CK_DHE_RSA_WITH_AES_256_SHA256, | 
|  | # endif | 
|  | # ifndef OPENSSL_NO_EC | 
|  | TLS1_CK_ECDHE_ECDSA_WITH_AES_128_SHA256, | 
|  | TLS1_CK_ECDHE_RSA_WITH_AES_128_SHA256, | 
|  | # endif | 
|  | # ifndef OPENSSL_NO_DH | 
|  | TLS1_CK_DHE_RSA_WITH_AES_128_SHA256, | 
|  | # endif | 
|  | #endif  /* !OPENSSL_NO_TLS1_2 */ | 
|  |  | 
|  | #ifndef OPENSSL_NO_EC | 
|  | TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, | 
|  | TLS1_CK_ECDHE_RSA_WITH_AES_256_CBC_SHA, | 
|  | #endif | 
|  | #ifndef OPENSSL_NO_DH | 
|  | TLS1_CK_DHE_RSA_WITH_AES_256_SHA, | 
|  | #endif | 
|  | #ifndef OPENSSL_NO_EC | 
|  | TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, | 
|  | TLS1_CK_ECDHE_RSA_WITH_AES_128_CBC_SHA, | 
|  | #endif | 
|  | #ifndef OPENSSL_NO_DH | 
|  | TLS1_CK_DHE_RSA_WITH_AES_128_SHA, | 
|  | #endif | 
|  |  | 
|  | #ifndef OPENSSL_NO_DES | 
|  | # ifndef OPENSSL_NO_EC | 
|  | TLS1_CK_ECDHE_ECDSA_WITH_DES_192_CBC3_SHA, | 
|  | TLS1_CK_ECDHE_RSA_WITH_DES_192_CBC3_SHA, | 
|  | # endif | 
|  | # ifndef OPENSSL_NO_DH | 
|  | SSL3_CK_DHE_RSA_DES_192_CBC3_SHA, | 
|  | # endif | 
|  | #endif  /* !OPENSSL_NO_DES */ | 
|  |  | 
|  | #ifndef OPENSSL_NO_TLS1_2 | 
|  | TLS1_CK_RSA_WITH_AES_256_GCM_SHA384, | 
|  | TLS1_CK_RSA_WITH_AES_128_GCM_SHA256, | 
|  | TLS1_CK_RSA_WITH_AES_256_SHA256, | 
|  | TLS1_CK_RSA_WITH_AES_128_SHA256, | 
|  | #endif | 
|  |  | 
|  | TLS1_CK_RSA_WITH_AES_256_SHA, | 
|  | TLS1_CK_RSA_WITH_AES_128_SHA, | 
|  | #ifndef OPENSSL_NO_DES | 
|  | SSL3_CK_RSA_DES_192_CBC3_SHA, | 
|  | #endif | 
|  | }; | 
|  |  | 
|  | static int test_default_cipherlist(SSL_CTX *ctx) | 
|  | { | 
|  | STACK_OF(SSL_CIPHER) *ciphers; | 
|  | SSL *ssl; | 
|  | int i, ret = 0, num_expected_ciphers, num_ciphers; | 
|  | uint32_t expected_cipher_id, cipher_id; | 
|  |  | 
|  | ssl = SSL_new(ctx); | 
|  | OPENSSL_assert(ssl != NULL); | 
|  |  | 
|  | ciphers = SSL_get1_supported_ciphers(ssl); | 
|  | OPENSSL_assert(ciphers != NULL); | 
|  | num_expected_ciphers = OSSL_NELEM(default_ciphers_in_order); | 
|  | num_ciphers = sk_SSL_CIPHER_num(ciphers); | 
|  | if (num_ciphers != num_expected_ciphers) { | 
|  | fprintf(stderr, "Expected %d supported ciphers, got %d.\n", | 
|  | num_expected_ciphers, num_ciphers); | 
|  | goto err; | 
|  | } | 
|  |  | 
|  | for (i = 0; i < num_ciphers; i++) { | 
|  | expected_cipher_id = default_ciphers_in_order[i]; | 
|  | cipher_id = SSL_CIPHER_get_id(sk_SSL_CIPHER_value(ciphers, i)); | 
|  | if (cipher_id != expected_cipher_id) { | 
|  | fprintf(stderr, "Wrong cipher at position %d: expected %x, " | 
|  | "got %x\n", i, expected_cipher_id, cipher_id); | 
|  | goto err; | 
|  | } | 
|  | } | 
|  |  | 
|  | ret = 1; | 
|  |  | 
|  | err: | 
|  | sk_SSL_CIPHER_free(ciphers); | 
|  | SSL_free(ssl); | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | static int execute_test(CIPHERLIST_TEST_FIXTURE fixture) | 
|  | { | 
|  | return test_default_cipherlist(fixture.server) | 
|  | && test_default_cipherlist(fixture.client); | 
|  | } | 
|  |  | 
|  | static void tear_down(CIPHERLIST_TEST_FIXTURE fixture) | 
|  | { | 
|  | SSL_CTX_free(fixture.server); | 
|  | SSL_CTX_free(fixture.client); | 
|  | ERR_print_errors_fp(stderr); | 
|  | } | 
|  |  | 
|  | #define SETUP_CIPHERLIST_TEST_FIXTURE() \ | 
|  | SETUP_TEST_FIXTURE(CIPHERLIST_TEST_FIXTURE, set_up) | 
|  |  | 
|  | #define EXECUTE_CIPHERLIST_TEST() \ | 
|  | EXECUTE_TEST(execute_test, tear_down) | 
|  |  | 
|  | static int test_default_cipherlist_implicit() | 
|  | { | 
|  | SETUP_CIPHERLIST_TEST_FIXTURE(); | 
|  | EXECUTE_CIPHERLIST_TEST(); | 
|  | } | 
|  |  | 
|  | static int test_default_cipherlist_explicit() | 
|  | { | 
|  | SETUP_CIPHERLIST_TEST_FIXTURE(); | 
|  | OPENSSL_assert(SSL_CTX_set_cipher_list(fixture.server, "DEFAULT")); | 
|  | OPENSSL_assert(SSL_CTX_set_cipher_list(fixture.client, "DEFAULT")); | 
|  | EXECUTE_CIPHERLIST_TEST(); | 
|  | } | 
|  |  | 
|  | int main(int argc, char **argv) | 
|  | { | 
|  | int result = 0; | 
|  |  | 
|  | ADD_TEST(test_default_cipherlist_implicit); | 
|  | ADD_TEST(test_default_cipherlist_explicit); | 
|  |  | 
|  | result = run_tests(argv[0]); | 
|  |  | 
|  | return result; | 
|  | } |