Lines Matching +full:p +full:- +full:256
2 # Copyright 2015-2022 The OpenSSL Project Authors. All Rights Reserved.
56 if disabled("engine") || disabled("dynamic-engine");
69 my $proxy = TLSProxy::Proxy->new(
82 $proxy->filter(\&modify_key_shares_filter);
84 $proxy->serverflags("-groups ffdhe3072");
86 $proxy->serverflags("-groups P-256");
88 $proxy->start() or plan skip_all => "Unable to start up Proxy for tests";
90 ok(TLSProxy::Message->success(), "Success after HRR");
94 $proxy->clear();
95 $proxy->start();
96 ok(TLSProxy::Message->fail(), "Server asks for group already provided");
99 $proxy->clear();
101 $proxy->start();
102 ok(TLSProxy::Message->fail(), "Missing key_shares extension");
106 $proxy->clear();
107 $proxy->filter(undef);
109 $proxy->serverflags("-groups ffdhe3072");
111 $proxy->serverflags("-groups P-256");
113 $proxy->start();
114 ok(TLSProxy::Message->success(), "No initial acceptable key_shares");
117 $proxy->clear();
118 $proxy->filter(undef);
120 $proxy->serverflags("-groups ffdhe2048");
122 $proxy->serverflags("-groups P-256");
125 $proxy->clientflags("-groups ffdhe3072");
127 $proxy->clientflags("-groups P-384");
129 $proxy->start();
130 ok(TLSProxy::Message->fail(), "No acceptable key_shares");
133 $proxy->clear();
134 $proxy->clientflags("-curves P-256");
136 $proxy->clientflags("-groups ffdhe3072");
138 $proxy->clientflags("-groups P-256");
140 $proxy->start();
141 ok(TLSProxy::Message->success(), "Non preferred key_share");
142 $proxy->filter(\&modify_key_shares_filter);
147 #Test 7: An acceptable key_share after a list of non-acceptable ones should
149 $proxy->clear();
151 $proxy->start();
152 ok(TLSProxy::Message->success(), "Acceptable key_share at end of list");
157 $proxy->clear();
159 $proxy->start();
160 ok(TLSProxy::Message->fail(), "Acceptable key_share not in supported_groups");
163 $proxy->clear();
165 $proxy->start();
166 ok(TLSProxy::Message->fail(), "Group id too short");
169 $proxy->clear();
171 $proxy->start();
172 ok(TLSProxy::Message->fail(), "key_exchange length mismatch");
175 $proxy->clear();
177 $proxy->start();
178 ok(TLSProxy::Message->fail(), "zero length key_exchange data");
181 $proxy->clear();
183 $proxy->start();
184 ok(TLSProxy::Message->fail(), "key_share list trailing data");
186 #Test 13: Multiple acceptable key_shares - we choose the first one
187 $proxy->clear();
192 $proxy->clientflags("-groups ffdhe3072:ffdhe2048");
194 $proxy->clientflags("-groups P-256:X25519");
196 $proxy->start();
198 ok(TLSProxy::Message->success() && ($selectedgroupid == FFDHE3072),
201 ok(TLSProxy::Message->success() && ($selectedgroupid == P_256),
205 #Test 14: Multiple acceptable key_shares - we choose the first one (part 2)
206 $proxy->clear();
208 $proxy->clientflags("-curves ffdhe2048:ffdhe3072");
210 $proxy->clientflags("-curves X25519:P-256");
212 $proxy->start();
214 ok(TLSProxy::Message->success() && ($selectedgroupid == FFDHE2048),
217 ok(TLSProxy::Message->success() && ($selectedgroupid == X25519),
222 $proxy->clear();
225 $proxy->clientflags("-groups ffdhe3072");
227 $proxy->clientflags("-groups P-256");
229 $proxy->start();
230 ok(TLSProxy::Message->fail(), "Non offered key_share");
233 $proxy->clear();
235 $proxy->start();
236 ok(TLSProxy::Message->fail(), "Group id too short in ServerHello");
239 $proxy->clear();
241 $proxy->start();
242 ok(TLSProxy::Message->fail(), "key_exchange length mismatch in ServerHello");
245 $proxy->clear();
247 $proxy->start();
248 ok(TLSProxy::Message->fail(), "zero length key_exchange data in ServerHello");
251 $proxy->clear();
253 $proxy->start();
254 ok(TLSProxy::Message->fail(), "key_share trailing data in ServerHello");
261 $proxy->clear();
262 $proxy->filter(undef);
263 $proxy->clientflags("-no_tls1_3");
264 $proxy->start();
265 my $clienthello = $proxy->message_list->[0];
266 ok(TLSProxy::Message->success()
267 && !defined $clienthello->extension_data->{TLSProxy::Message::EXT_KEY_SHARE},
269 $proxy->filter(\&modify_key_shares_filter);
273 $proxy->clear();
276 $proxy->serverflags("-no_tls1_3");
277 $proxy->start();
278 ok(TLSProxy::Message->success(), "Ignore key_share for TLS<=1.2 server");
283 $proxy->clear();
287 $proxy->serverflags("-groups ffdhe2048");
289 $proxy->serverflags("-groups X25519");
291 $proxy->start();
292 ok(TLSProxy::Message->fail(), "Server sends HRR with no key_shares");
297 $proxy->clear();
299 $proxy->clientflags("-groups secp192r1:P-256:X25519");
300 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
302 $proxy->start();
303 my $ishrr = defined ${$proxy->message_list}[2]
304 &&(${$proxy->message_list}[0]->mt == TLSProxy::Message::MT_CLIENT_HELLO)
305 && (${$proxy->message_list}[2]->mt == TLSProxy::Message::MT_CLIENT_HELLO);
306 ok(TLSProxy::Message->success() && $ishrr,
315 if (($direction == CLIENT_TO_SERVER && $proxy->flight != 0
316 && ($proxy->flight != 1 || $testtype != NO_KEY_SHARES_IN_HRR))
317 || ($direction == SERVER_TO_CLIENT && $proxy->flight != 1)) {
321 foreach my $message (@{$proxy->message_list}) {
322 if ($message->mt == TLSProxy::Message::MT_CLIENT_HELLO
396 #We trick the server into thinking we sent a P-256 key_share -
400 0x00, 0x17, #P-256
406 0x00, 0x13, #P-192
414 $message->set_extension(
418 $message->delete_extension(
421 $message->set_extension(
425 $message->repack();
426 } elsif ($message->mt == TLSProxy::Message::MT_SERVER_HELLO
430 $message->extension_data->{TLSProxy::Message::EXT_KEY_SHARE};
437 $message->delete_extension(TLSProxy::Message::EXT_KEY_SHARE);
438 $message->set_extension(TLSProxy::Message::EXT_UNKNOWN, "");
439 $message->repack();
468 $message->set_extension(TLSProxy::Message::EXT_KEY_SHARE, $ext);
470 $message->repack();