123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271 |
- // Copyright (c) 2011 The Chromium Authors. All rights reserved.
- // Use of this source code is governed by a BSD-style license that can be
- // found in the LICENSE file.
- #include "net/ssl/ssl_cipher_suite_names.h"
- #include "net/ssl/ssl_connection_status_flags.h"
- #include "testing/gtest/include/gtest/gtest.h"
- #include "third_party/boringssl/src/include/openssl/ssl.h"
- namespace net {
- namespace {
- int kObsoleteVersion = SSL_CONNECTION_VERSION_TLS1;
- int kModernVersion = SSL_CONNECTION_VERSION_TLS1_2;
- uint16_t kModernCipherSuite =
- 0xc02f; /* TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 */
- uint16_t kObsoleteCipherObsoleteKeyExchange =
- 0x2f; /* TLS_RSA_WITH_AES_128_CBC_SHA */
- uint16_t kObsoleteCipherModernKeyExchange =
- 0xc014; /* TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA */
- uint16_t kModernCipherObsoleteKeyExchange =
- 0x9c; /* TLS_RSA_WITH_AES_128_GCM_SHA256 */
- uint16_t kModernCipherModernKeyExchange =
- 0xc02f; /* TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 */
- uint16_t kObsoleteSignature = SSL_SIGN_RSA_PKCS1_SHA1;
- uint16_t kModernSignature = SSL_SIGN_RSA_PSS_RSAE_SHA256;
- int MakeConnectionStatus(int version, uint16_t cipher_suite) {
- int connection_status = 0;
- SSLConnectionStatusSetVersion(version, &connection_status);
- SSLConnectionStatusSetCipherSuite(cipher_suite, &connection_status);
- return connection_status;
- }
- TEST(CipherSuiteNamesTest, Basic) {
- const char *key_exchange, *cipher, *mac;
- bool is_aead, is_tls13;
- SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, &is_tls13,
- 0x000a);
- EXPECT_STREQ("RSA", key_exchange);
- EXPECT_STREQ("3DES_EDE_CBC", cipher);
- EXPECT_STREQ("HMAC-SHA1", mac);
- EXPECT_FALSE(is_aead);
- EXPECT_FALSE(is_tls13);
- SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, &is_tls13,
- 0x002f);
- EXPECT_STREQ("RSA", key_exchange);
- EXPECT_STREQ("AES_128_CBC", cipher);
- EXPECT_STREQ("HMAC-SHA1", mac);
- EXPECT_FALSE(is_aead);
- EXPECT_FALSE(is_tls13);
- SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, &is_tls13,
- 0xc030);
- EXPECT_STREQ("ECDHE_RSA", key_exchange);
- EXPECT_STREQ("AES_256_GCM", cipher);
- EXPECT_TRUE(is_aead);
- EXPECT_FALSE(is_tls13);
- EXPECT_EQ(nullptr, mac);
- SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, &is_tls13,
- 0xcca9);
- EXPECT_STREQ("ECDHE_ECDSA", key_exchange);
- EXPECT_STREQ("CHACHA20_POLY1305", cipher);
- EXPECT_TRUE(is_aead);
- EXPECT_FALSE(is_tls13);
- EXPECT_EQ(nullptr, mac);
- SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, &is_tls13,
- 0xff31);
- EXPECT_STREQ("???", key_exchange);
- EXPECT_STREQ("???", cipher);
- EXPECT_STREQ("???", mac);
- EXPECT_FALSE(is_aead);
- EXPECT_FALSE(is_tls13);
- SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, &is_tls13,
- 0x1301);
- EXPECT_STREQ("AES_128_GCM", cipher);
- EXPECT_TRUE(is_aead);
- EXPECT_TRUE(is_tls13);
- EXPECT_EQ(nullptr, mac);
- EXPECT_EQ(nullptr, key_exchange);
- SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, &is_tls13,
- 0x1302);
- EXPECT_STREQ("AES_256_GCM", cipher);
- EXPECT_TRUE(is_aead);
- EXPECT_TRUE(is_tls13);
- EXPECT_EQ(nullptr, mac);
- EXPECT_EQ(nullptr, key_exchange);
- SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, &is_tls13,
- 0x1303);
- EXPECT_STREQ("CHACHA20_POLY1305", cipher);
- EXPECT_TRUE(is_aead);
- EXPECT_TRUE(is_tls13);
- EXPECT_EQ(nullptr, mac);
- EXPECT_EQ(nullptr, key_exchange);
- }
- TEST(CipherSuiteNamesTest, ParseSSLCipherString) {
- uint16_t cipher_suite = 0;
- EXPECT_TRUE(ParseSSLCipherString("0x0004", &cipher_suite));
- EXPECT_EQ(0x00004u, cipher_suite);
- EXPECT_TRUE(ParseSSLCipherString("0xBEEF", &cipher_suite));
- EXPECT_EQ(0xBEEFu, cipher_suite);
- }
- TEST(CipherSuiteNamesTest, ParseSSLCipherStringFails) {
- const char* const cipher_strings[] = {
- "0004",
- "0x004",
- "0xBEEFY",
- };
- for (const auto* cipher_string : cipher_strings) {
- uint16_t cipher_suite = 0;
- EXPECT_FALSE(ParseSSLCipherString(cipher_string, &cipher_suite));
- }
- }
- TEST(CipherSuiteNamesTest, ObsoleteSSLStatusProtocol) {
- // Obsolete
- // Note all of these combinations are impossible; TLS 1.2 is necessary for
- // kModernCipherSuite.
- EXPECT_EQ(OBSOLETE_SSL_MASK_PROTOCOL,
- ObsoleteSSLStatus(MakeConnectionStatus(SSL_CONNECTION_VERSION_SSL2,
- kModernCipherSuite),
- kModernSignature));
- EXPECT_EQ(OBSOLETE_SSL_MASK_PROTOCOL,
- ObsoleteSSLStatus(MakeConnectionStatus(SSL_CONNECTION_VERSION_SSL3,
- kModernCipherSuite),
- kModernSignature));
- EXPECT_EQ(OBSOLETE_SSL_MASK_PROTOCOL,
- ObsoleteSSLStatus(MakeConnectionStatus(SSL_CONNECTION_VERSION_TLS1,
- kModernCipherSuite),
- kModernSignature));
- EXPECT_EQ(
- OBSOLETE_SSL_MASK_PROTOCOL,
- ObsoleteSSLStatus(MakeConnectionStatus(SSL_CONNECTION_VERSION_TLS1_1,
- kModernCipherSuite),
- kModernSignature));
- // Modern
- EXPECT_EQ(
- OBSOLETE_SSL_NONE,
- ObsoleteSSLStatus(MakeConnectionStatus(SSL_CONNECTION_VERSION_TLS1_2,
- kModernCipherSuite),
- kModernSignature));
- EXPECT_EQ(OBSOLETE_SSL_NONE,
- ObsoleteSSLStatus(MakeConnectionStatus(SSL_CONNECTION_VERSION_QUIC,
- kModernCipherSuite),
- kModernSignature));
- }
- TEST(CipherSuiteNamesTest, ObsoleteSSLStatusProtocolAndCipherSuite) {
- // Cartesian combos
- // As above, some of these combinations can't happen in practice.
- EXPECT_EQ(OBSOLETE_SSL_MASK_PROTOCOL | OBSOLETE_SSL_MASK_KEY_EXCHANGE |
- OBSOLETE_SSL_MASK_CIPHER | OBSOLETE_SSL_MASK_SIGNATURE,
- ObsoleteSSLStatus(
- MakeConnectionStatus(kObsoleteVersion,
- kObsoleteCipherObsoleteKeyExchange),
- kObsoleteSignature));
- EXPECT_EQ(OBSOLETE_SSL_MASK_PROTOCOL | OBSOLETE_SSL_MASK_KEY_EXCHANGE |
- OBSOLETE_SSL_MASK_CIPHER,
- ObsoleteSSLStatus(
- MakeConnectionStatus(kObsoleteVersion,
- kObsoleteCipherObsoleteKeyExchange),
- kModernSignature));
- EXPECT_EQ(
- OBSOLETE_SSL_MASK_PROTOCOL | OBSOLETE_SSL_MASK_KEY_EXCHANGE,
- ObsoleteSSLStatus(MakeConnectionStatus(kObsoleteVersion,
- kModernCipherObsoleteKeyExchange),
- kModernSignature));
- EXPECT_EQ(
- OBSOLETE_SSL_MASK_PROTOCOL | OBSOLETE_SSL_MASK_CIPHER,
- ObsoleteSSLStatus(MakeConnectionStatus(kObsoleteVersion,
- kObsoleteCipherModernKeyExchange),
- kModernSignature));
- EXPECT_EQ(
- OBSOLETE_SSL_MASK_PROTOCOL,
- ObsoleteSSLStatus(MakeConnectionStatus(kObsoleteVersion,
- kModernCipherModernKeyExchange),
- kModernSignature));
- EXPECT_EQ(
- OBSOLETE_SSL_MASK_KEY_EXCHANGE | OBSOLETE_SSL_MASK_CIPHER,
- ObsoleteSSLStatus(MakeConnectionStatus(
- kModernVersion, kObsoleteCipherObsoleteKeyExchange),
- kModernSignature));
- EXPECT_EQ(
- OBSOLETE_SSL_MASK_KEY_EXCHANGE,
- ObsoleteSSLStatus(MakeConnectionStatus(kModernVersion,
- kModernCipherObsoleteKeyExchange),
- kModernSignature));
- EXPECT_EQ(
- OBSOLETE_SSL_MASK_CIPHER,
- ObsoleteSSLStatus(MakeConnectionStatus(kModernVersion,
- kObsoleteCipherModernKeyExchange),
- kModernSignature));
- EXPECT_EQ(
- OBSOLETE_SSL_NONE,
- ObsoleteSSLStatus(
- MakeConnectionStatus(kModernVersion, kModernCipherModernKeyExchange),
- kModernSignature));
- EXPECT_EQ(
- OBSOLETE_SSL_NONE,
- ObsoleteSSLStatus(MakeConnectionStatus(SSL_CONNECTION_VERSION_TLS1_3,
- 0x1301 /* AES_128_GCM_SHA256 */),
- kModernSignature));
- // Don't flag the signature as obsolete if not present. It may be an old cache
- // entry or a key exchange that doesn't involve a signature. (Though, in the
- // latter case, we would always flag a bad key exchange.)
- EXPECT_EQ(
- OBSOLETE_SSL_NONE,
- ObsoleteSSLStatus(
- MakeConnectionStatus(kModernVersion, kModernCipherModernKeyExchange),
- 0));
- EXPECT_EQ(
- OBSOLETE_SSL_MASK_KEY_EXCHANGE,
- ObsoleteSSLStatus(MakeConnectionStatus(kModernVersion,
- kModernCipherObsoleteKeyExchange),
- 0));
- // Flag obsolete signatures.
- EXPECT_EQ(
- OBSOLETE_SSL_MASK_SIGNATURE,
- ObsoleteSSLStatus(
- MakeConnectionStatus(kModernVersion, kModernCipherModernKeyExchange),
- kObsoleteSignature));
- }
- TEST(CipherSuiteNamesTest, HTTP2CipherSuites) {
- // Picked some random cipher suites.
- EXPECT_FALSE(
- IsTLSCipherSuiteAllowedByHTTP2(0x0 /* TLS_NULL_WITH_NULL_NULL */));
- EXPECT_FALSE(IsTLSCipherSuiteAllowedByHTTP2(
- 0xc014 /* TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA */));
- EXPECT_FALSE(IsTLSCipherSuiteAllowedByHTTP2(
- 0x9c /* TLS_RSA_WITH_AES_128_GCM_SHA256 */));
- // Non-existent cipher suite.
- EXPECT_FALSE(IsTLSCipherSuiteAllowedByHTTP2(0xffff)) << "Doesn't exist!";
- // HTTP/2-compatible ones.
- EXPECT_TRUE(IsTLSCipherSuiteAllowedByHTTP2(
- 0xc02f /* TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 */));
- EXPECT_TRUE(IsTLSCipherSuiteAllowedByHTTP2(
- 0xcca8 /* ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 */));
- EXPECT_TRUE(IsTLSCipherSuiteAllowedByHTTP2(
- 0xcca9 /* ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 */));
- EXPECT_TRUE(IsTLSCipherSuiteAllowedByHTTP2(0x1301 /* AES_128_GCM_SHA256 */));
- EXPECT_TRUE(IsTLSCipherSuiteAllowedByHTTP2(0x1302 /* AES_256_GCM_SHA384 */));
- EXPECT_TRUE(IsTLSCipherSuiteAllowedByHTTP2(0x1303 /* CHACHA20_POLY1305 */));
- }
- } // anonymous namespace
- } // namespace net
|