check_handshake.c 4.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213
  1. /** check_handshake.c
  2. *
  3. * Integration-style tests for extracting the TLS master secret for various
  4. * types of TLS handshakes
  5. */
  6. #include <check.h>
  7. #include <stdlib.h>
  8. #include "../flow.h"
  9. #include "../crypto.h"
  10. #include "../cryptothread.h"
  11. #include "../packet.h"
  12. #include "../util.h"
  13. #include "test_util.h"
  14. START_TEST(full_handshake_regular){
  15. flow *f = NULL;
  16. uint8_t *data;
  17. struct packet_info *info;
  18. info = smalloc(sizeof(struct packet_info));
  19. /* Read in ClientHello message */
  20. if(!read_file("data/frame_handshake_regular1.dat", &data)){
  21. ck_abort();
  22. }
  23. extract_packet_headers(data, info);
  24. //Make sure it recognized the tag
  25. ck_assert_int_eq(check_handshake(info), 1);
  26. //make sure it saved the flow
  27. f = check_flow(info);
  28. ck_assert_ptr_ne(f, NULL);
  29. add_packet(f, info);
  30. free(data);
  31. /* Read in ServerHello message */
  32. if(!read_file("data/frame_handshake_regular2.dat", &data)){
  33. ck_abort();
  34. }
  35. extract_packet_headers(data, info);
  36. f = check_flow(info);
  37. ck_assert_ptr_ne(f, NULL);
  38. add_packet(f, info);
  39. //make sure it's not using the extended master extension
  40. ck_assert_int_eq(f->extended_master_secret, 0);
  41. free(data);
  42. /* Read in Certificate messages */
  43. if(!read_file("data/frame_handshake_regular3.dat", &data)){
  44. ck_abort();
  45. }
  46. extract_packet_headers(data, info);
  47. f = check_flow(info);
  48. ck_assert_ptr_ne(f, NULL);
  49. add_packet(f, info);
  50. free(data);
  51. if(!read_file("data/frame_handshake_regular4.dat", &data)){
  52. ck_abort();
  53. }
  54. extract_packet_headers(data, info);
  55. f = check_flow(info);
  56. ck_assert_ptr_ne(f, NULL);
  57. add_packet(f, info);
  58. free(data);
  59. /* ServerKeyEx, ServerHelloDone */
  60. if(!read_file("data/frame_handshake_regular5.dat", &data)){
  61. ck_abort();
  62. }
  63. extract_packet_headers(data, info);
  64. f = check_flow(info);
  65. ck_assert_ptr_ne(f, NULL);
  66. add_packet(f, info);
  67. free(data);
  68. /* ClientKeyEx, CCS, Finished */
  69. if(!read_file("data/frame_handshake_regular6.dat", &data)){
  70. ck_abort();
  71. }
  72. extract_packet_headers(data, info);
  73. f = check_flow(info);
  74. ck_assert_ptr_ne(f, NULL);
  75. add_packet(f, info);
  76. //Verify Finished received
  77. ck_assert_int_eq(f->out_encrypted, 2);
  78. free(data);
  79. /* CCS, Finished (from the server) */
  80. if(!read_file("data/frame_handshake_regular7.dat", &data)){
  81. ck_abort();
  82. }
  83. extract_packet_headers(data, info);
  84. f = check_flow(info);
  85. ck_assert_ptr_ne(f, NULL);
  86. add_packet(f, info);
  87. //Make sure both Finished messages were successfully received and decrypted
  88. f = check_flow(info);
  89. ck_assert_ptr_ne(f, NULL);
  90. ck_assert_int_eq(f->in_encrypted, 2);
  91. ck_assert_int_eq(f->application, 1);
  92. remove_flow(f);
  93. free(data);
  94. }
  95. END_TEST
  96. START_TEST(full_handshake_regular_resumed){
  97. flow *f;
  98. uint8_t *record;
  99. //populate record from file
  100. if(!read_file("data/packet_tagged.dat", &record)){
  101. ck_abort();
  102. }
  103. }
  104. END_TEST
  105. START_TEST(full_handshake_extended){
  106. }
  107. END_TEST
  108. START_TEST(full_handshake_extended_resumed){
  109. flow *f;
  110. uint8_t *record;
  111. //populate record from file
  112. if(!read_file("data/packet_tagged.dat", &record)){
  113. ck_abort();
  114. }
  115. }
  116. END_TEST
  117. Suite *tag_suite(void) {
  118. Suite *s;
  119. TCase *tc_core;
  120. s = suite_create("Handshake");
  121. tc_core = tcase_create("Core");
  122. tcase_add_test(tc_core, full_handshake_regular);
  123. suite_add_tcase(s, tc_core);
  124. return s;
  125. }
  126. int main(void){
  127. int number_failed;
  128. Suite *s;
  129. SRunner *sr;
  130. //initialize Slitheen structures
  131. if(init_tables()){
  132. exit(1);
  133. }
  134. if(init_session_cache()){
  135. exit(1);
  136. }
  137. init_crypto_locks();
  138. s = tag_suite();
  139. sr = srunner_create(s);
  140. srunner_set_fork_status(sr, CK_NOFORK);
  141. srunner_run_all(sr, CK_NORMAL);
  142. number_failed = srunner_ntests_failed(sr);
  143. srunner_free(sr);
  144. crypto_locks_cleanup();
  145. return (number_failed == 0) ? EXIT_SUCCESS : EXIT_FAILURE;
  146. }