123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272 |
- /*
- * OpenVPN -- An application to securely tunnel IP networks
- * over a single UDP port, with support for SSL/TLS-based
- * session authentication and key exchange,
- * packet encryption, packet authentication, and
- * packet compression.
- *
- * Copyright (C) 2016-2018 Fox Crypto B.V. <openvpn@fox-it.com>
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License version 2
- * as published by the Free Software Foundation.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License along
- * with this program; if not, write to the Free Software Foundation, Inc.,
- * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
- */
- #ifdef HAVE_CONFIG_H
- #include "config.h"
- #elif defined(_MSC_VER)
- #include "config-msvc.h"
- #endif
- #ifdef ENABLE_CRYPTO
- #include "syshead.h"
- #include <stdio.h>
- #include <unistd.h>
- #include <stdlib.h>
- #include <stdarg.h>
- #include <string.h>
- #include <setjmp.h>
- #include <cmocka.h>
- #include "tls_crypt.c"
- #include "mock_msg.h"
- #define TESTBUF_SIZE 128
- const char plaintext_short[1];
- struct test_context {
- struct crypto_options co;
- struct key_type kt;
- struct buffer source;
- struct buffer ciphertext;
- struct buffer unwrapped;
- };
- static int
- setup(void **state) {
- struct test_context *ctx = calloc(1, sizeof(*ctx));
- *state = ctx;
- struct key key = { 0 };
- ctx->kt = tls_crypt_kt();
- if (!ctx->kt.cipher || !ctx->kt.digest)
- {
- return 0;
- }
- init_key_ctx(&ctx->co.key_ctx_bi.encrypt, &key, &ctx->kt, true, "TEST");
- init_key_ctx(&ctx->co.key_ctx_bi.decrypt, &key, &ctx->kt, false, "TEST");
- packet_id_init(&ctx->co.packet_id, 0, 0, "test", 0);
- ctx->source = alloc_buf(TESTBUF_SIZE);
- ctx->ciphertext = alloc_buf(TESTBUF_SIZE);
- ctx->unwrapped = alloc_buf(TESTBUF_SIZE);
- /* Write test plaintext */
- buf_write(&ctx->source, plaintext_short, sizeof(plaintext_short));
- /* Write dummy opcode and session id */
- buf_write(&ctx->ciphertext, "012345678", 1 + 8);
- return 0;
- }
- static int
- teardown(void **state) {
- struct test_context *ctx = (struct test_context *) *state;
- free_buf(&ctx->source);
- free_buf(&ctx->ciphertext);
- free_buf(&ctx->unwrapped);
- free_key_ctx_bi(&ctx->co.key_ctx_bi);
- free(ctx);
- return 0;
- }
- static void skip_if_tls_crypt_not_supported(struct test_context *ctx)
- {
- if (!ctx->kt.cipher || !ctx->kt.digest)
- {
- skip();
- }
- }
- /**
- * Check that short messages are successfully wrapped-and-unwrapped.
- */
- static void
- tls_crypt_loopback(void **state) {
- struct test_context *ctx = (struct test_context *) *state;
- skip_if_tls_crypt_not_supported(ctx);
- assert_true(tls_crypt_wrap(&ctx->source, &ctx->ciphertext, &ctx->co));
- assert_true(BLEN(&ctx->source) < BLEN(&ctx->ciphertext));
- assert_true(tls_crypt_unwrap(&ctx->ciphertext, &ctx->unwrapped, &ctx->co));
- assert_int_equal(BLEN(&ctx->source), BLEN(&ctx->unwrapped));
- assert_memory_equal(BPTR(&ctx->source), BPTR(&ctx->unwrapped),
- BLEN(&ctx->source));
- }
- /**
- * Check that zero-byte messages are successfully wrapped-and-unwrapped.
- */
- static void
- tls_crypt_loopback_zero_len(void **state) {
- struct test_context *ctx = (struct test_context *) *state;
- skip_if_tls_crypt_not_supported(ctx);
- buf_clear(&ctx->source);
- assert_true(tls_crypt_wrap(&ctx->source, &ctx->ciphertext, &ctx->co));
- assert_true(BLEN(&ctx->source) < BLEN(&ctx->ciphertext));
- assert_true(tls_crypt_unwrap(&ctx->ciphertext, &ctx->unwrapped, &ctx->co));
- assert_int_equal(BLEN(&ctx->source), BLEN(&ctx->unwrapped));
- assert_memory_equal(BPTR(&ctx->source), BPTR(&ctx->unwrapped),
- BLEN(&ctx->source));
- }
- /**
- * Check that max-length messages are successfully wrapped-and-unwrapped.
- */
- static void
- tls_crypt_loopback_max_len(void **state) {
- struct test_context *ctx = (struct test_context *) *state;
- skip_if_tls_crypt_not_supported(ctx);
- buf_clear(&ctx->source);
- assert_non_null(buf_write_alloc(&ctx->source,
- TESTBUF_SIZE - BLEN(&ctx->ciphertext) - tls_crypt_buf_overhead()));
- assert_true(tls_crypt_wrap(&ctx->source, &ctx->ciphertext, &ctx->co));
- assert_true(BLEN(&ctx->source) < BLEN(&ctx->ciphertext));
- assert_true(tls_crypt_unwrap(&ctx->ciphertext, &ctx->unwrapped, &ctx->co));
- assert_int_equal(BLEN(&ctx->source), BLEN(&ctx->unwrapped));
- assert_memory_equal(BPTR(&ctx->source), BPTR(&ctx->unwrapped),
- BLEN(&ctx->source));
- }
- /**
- * Check that too-long messages are gracefully rejected.
- */
- static void
- tls_crypt_fail_msg_too_long(void **state) {
- struct test_context *ctx = (struct test_context *) *state;
- skip_if_tls_crypt_not_supported(ctx);
- buf_clear(&ctx->source);
- assert_non_null(buf_write_alloc(&ctx->source,
- TESTBUF_SIZE - BLEN(&ctx->ciphertext) - tls_crypt_buf_overhead() + 1));
- assert_false(tls_crypt_wrap(&ctx->source, &ctx->ciphertext, &ctx->co));
- }
- /**
- * Check that packets that were wrapped (or unwrapped) with a different key
- * are not accepted.
- */
- static void
- tls_crypt_fail_invalid_key(void **state) {
- struct test_context *ctx = (struct test_context *) *state;
- skip_if_tls_crypt_not_supported(ctx);
- /* Change decrypt key */
- struct key key = { { 1 } };
- free_key_ctx(&ctx->co.key_ctx_bi.decrypt);
- init_key_ctx(&ctx->co.key_ctx_bi.decrypt, &key, &ctx->kt, false, "TEST");
- assert_true(tls_crypt_wrap(&ctx->source, &ctx->ciphertext, &ctx->co));
- assert_true(BLEN(&ctx->source) < BLEN(&ctx->ciphertext));
- assert_false(tls_crypt_unwrap(&ctx->ciphertext, &ctx->unwrapped, &ctx->co));
- }
- /**
- * Check that replayed packets are not accepted.
- */
- static void
- tls_crypt_fail_replay(void **state) {
- struct test_context *ctx = (struct test_context *) *state;
- skip_if_tls_crypt_not_supported(ctx);
- assert_true(tls_crypt_wrap(&ctx->source, &ctx->ciphertext, &ctx->co));
- assert_true(BLEN(&ctx->source) < BLEN(&ctx->ciphertext));
- struct buffer tmp = ctx->ciphertext;
- assert_true(tls_crypt_unwrap(&tmp, &ctx->unwrapped, &ctx->co));
- buf_clear(&ctx->unwrapped);
- assert_false(tls_crypt_unwrap(&ctx->ciphertext, &ctx->unwrapped, &ctx->co));
- }
- /**
- * Check that packet replays are accepted when CO_IGNORE_PACKET_ID is set. This
- * is used for the first control channel packet that arrives, because we don't
- * know the packet ID yet.
- */
- static void
- tls_crypt_ignore_replay(void **state) {
- struct test_context *ctx = (struct test_context *) *state;
- skip_if_tls_crypt_not_supported(ctx);
- ctx->co.flags |= CO_IGNORE_PACKET_ID;
- assert_true(tls_crypt_wrap(&ctx->source, &ctx->ciphertext, &ctx->co));
- assert_true(BLEN(&ctx->source) < BLEN(&ctx->ciphertext));
- struct buffer tmp = ctx->ciphertext;
- assert_true(tls_crypt_unwrap(&tmp, &ctx->unwrapped, &ctx->co));
- buf_clear(&ctx->unwrapped);
- assert_true(tls_crypt_unwrap(&ctx->ciphertext, &ctx->unwrapped, &ctx->co));
- }
- int
- main(void) {
- const struct CMUnitTest tests[] = {
- cmocka_unit_test_setup_teardown(tls_crypt_loopback, setup, teardown),
- cmocka_unit_test_setup_teardown(tls_crypt_loopback_zero_len,
- setup, teardown),
- cmocka_unit_test_setup_teardown(tls_crypt_loopback_max_len,
- setup, teardown),
- cmocka_unit_test_setup_teardown(tls_crypt_fail_msg_too_long,
- setup, teardown),
- cmocka_unit_test_setup_teardown(tls_crypt_fail_invalid_key,
- setup, teardown),
- cmocka_unit_test_setup_teardown(tls_crypt_fail_replay,
- setup, teardown),
- cmocka_unit_test_setup_teardown(tls_crypt_ignore_replay,
- setup, teardown),
- };
- #if defined(ENABLE_CRYPTO_OPENSSL)
- OpenSSL_add_all_algorithms();
- #endif
- int ret = cmocka_run_group_tests_name("tls-crypt tests", tests, NULL, NULL);
- #if defined(ENABLE_CRYPTO_OPENSSL)
- EVP_cleanup();
- #endif
- return ret;
- }
- #endif /* ENABLE_CRYPTO */
|