123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219 |
- #include <string.h>
- #include <openssl/bio.h>
- #include <openssl/crypto.h>
- #include <openssl/evp.h>
- #include <openssl/ssl.h>
- #include <openssl/err.h>
- #define CLIENT_VERSION_LEN 2
- #define SESSION_ID_LEN_LEN 1
- #define CIPHERS_LEN_LEN 2
- #define COMPRESSION_LEN_LEN 1
- #define EXTENSIONS_LEN_LEN 2
- #define EXTENSION_TYPE_LEN 2
- #define EXTENSION_SIZE_LEN 2
- #define TOTAL_NUM_TESTS 2
- #define TEST_SET_SESSION_TICK_DATA_TLS_1_2 0
- #define TEST_SET_SESSION_TICK_DATA_VER_NEG 1
- int main(int argc, char *argv[])
- {
- SSL_CTX *ctx;
- SSL *con;
- BIO *rbio;
- BIO *wbio;
- BIO *err;
- long len;
- unsigned char *data;
- unsigned char *dataend;
- char *dummytick = "Hello World!";
- unsigned int tmplen;
- unsigned int type;
- unsigned int size;
- int testresult = 0;
- int currtest = 0;
- SSL_library_init();
- SSL_load_error_strings();
- err = BIO_new_fp(stderr, BIO_NOCLOSE | BIO_FP_TEXT);
- CRYPTO_malloc_debug_init();
- CRYPTO_set_mem_debug_options(V_CRYPTO_MDEBUG_ALL);
- CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ON);
-
- for (; currtest < TOTAL_NUM_TESTS; currtest++) {
- testresult = 0;
- if (currtest == TEST_SET_SESSION_TICK_DATA_TLS_1_2) {
- ctx = SSL_CTX_new(TLSv1_2_method());
- } else {
- ctx = SSL_CTX_new(SSLv23_method());
- }
- con = SSL_new(ctx);
- rbio = BIO_new(BIO_s_mem());
- wbio = BIO_new(BIO_s_mem());
- SSL_set_bio(con, rbio, wbio);
- SSL_set_connect_state(con);
- if (currtest == TEST_SET_SESSION_TICK_DATA_TLS_1_2
- || currtest == TEST_SET_SESSION_TICK_DATA_VER_NEG) {
- if (!SSL_set_session_ticket_ext(con, dummytick, strlen(dummytick)))
- goto end;
- }
- if (SSL_connect(con) > 0) {
-
- goto end;
- }
- len = BIO_get_mem_data(wbio, (char **)&data);
- dataend = data + len;
-
- data += SSL3_RT_HEADER_LENGTH;
-
- data += SSL3_HM_HEADER_LENGTH;
-
- data += CLIENT_VERSION_LEN + SSL3_RANDOM_SIZE;
- if (data + SESSION_ID_LEN_LEN > dataend)
- goto end;
-
- tmplen = *data;
- data += SESSION_ID_LEN_LEN + tmplen;
- if (data + CIPHERS_LEN_LEN > dataend)
- goto end;
-
- tmplen = ((*data) << 8) | *(data + 1);
- data += CIPHERS_LEN_LEN + tmplen;
- if (data + COMPRESSION_LEN_LEN > dataend)
- goto end;
-
- tmplen = *data;
- data += COMPRESSION_LEN_LEN + tmplen;
- if (data + EXTENSIONS_LEN_LEN > dataend)
- goto end;
-
- tmplen = ((*data) << 8) | *(data + 1);
- data += EXTENSIONS_LEN_LEN;
- if (data + tmplen > dataend)
- goto end;
-
- while (tmplen > EXTENSION_TYPE_LEN + EXTENSION_SIZE_LEN) {
- type = ((*data) << 8) | *(data + 1);
- data += EXTENSION_TYPE_LEN;
- size = ((*data) << 8) | *(data + 1);
- data += EXTENSION_SIZE_LEN;
- if (data + size > dataend)
- goto end;
- if (type == TLSEXT_TYPE_session_ticket) {
- if (currtest == TEST_SET_SESSION_TICK_DATA_TLS_1_2
- || currtest == TEST_SET_SESSION_TICK_DATA_VER_NEG) {
- if (size == strlen(dummytick)
- && memcmp(data, dummytick, size) == 0) {
-
- testresult = 1;
- } else {
- printf("Received session ticket is not as expected\n");
- }
- break;
- }
- }
- tmplen -= EXTENSION_TYPE_LEN + EXTENSION_SIZE_LEN + size;
- data += size;
- }
- end:
- SSL_free(con);
- SSL_CTX_free(ctx);
- if (!testresult) {
- printf("ClientHello test: FAILED (Test %d)\n", currtest);
- break;
- }
- }
- ERR_free_strings();
- ERR_remove_thread_state(NULL);
- EVP_cleanup();
- CRYPTO_cleanup_all_ex_data();
- CRYPTO_mem_leaks(err);
- BIO_free(err);
- return testresult?0:1;
- }
|