1*e0c4386eSCy Schubert /*
2*e0c4386eSCy Schubert * Copyright 2017-2022 The OpenSSL Project Authors. All Rights Reserved.
3*e0c4386eSCy Schubert *
4*e0c4386eSCy Schubert * Licensed under the Apache License 2.0 (the "License"). You may not use
5*e0c4386eSCy Schubert * this file except in compliance with the License. You can obtain a copy
6*e0c4386eSCy Schubert * in the file LICENSE in the source distribution or at
7*e0c4386eSCy Schubert * https://www.openssl.org/source/license.html
8*e0c4386eSCy Schubert */
9*e0c4386eSCy Schubert
10*e0c4386eSCy Schubert #include <string.h>
11*e0c4386eSCy Schubert
12*e0c4386eSCy Schubert #include "helpers/ssltestlib.h"
13*e0c4386eSCy Schubert #include "testutil.h"
14*e0c4386eSCy Schubert
15*e0c4386eSCy Schubert static char *cert = NULL;
16*e0c4386eSCy Schubert static char *privkey = NULL;
17*e0c4386eSCy Schubert
18*e0c4386eSCy Schubert #define TEST_PLAINTEXT_OVERFLOW_OK 0
19*e0c4386eSCy Schubert #define TEST_PLAINTEXT_OVERFLOW_NOT_OK 1
20*e0c4386eSCy Schubert #define TEST_ENCRYPTED_OVERFLOW_TLS1_3_OK 2
21*e0c4386eSCy Schubert #define TEST_ENCRYPTED_OVERFLOW_TLS1_3_NOT_OK 3
22*e0c4386eSCy Schubert #define TEST_ENCRYPTED_OVERFLOW_TLS1_2_OK 4
23*e0c4386eSCy Schubert #define TEST_ENCRYPTED_OVERFLOW_TLS1_2_NOT_OK 5
24*e0c4386eSCy Schubert
25*e0c4386eSCy Schubert #define TOTAL_RECORD_OVERFLOW_TESTS 6
26*e0c4386eSCy Schubert
write_record(BIO * b,size_t len,int rectype,int recversion)27*e0c4386eSCy Schubert static int write_record(BIO *b, size_t len, int rectype, int recversion)
28*e0c4386eSCy Schubert {
29*e0c4386eSCy Schubert unsigned char header[SSL3_RT_HEADER_LENGTH];
30*e0c4386eSCy Schubert size_t written;
31*e0c4386eSCy Schubert unsigned char buf[256];
32*e0c4386eSCy Schubert
33*e0c4386eSCy Schubert memset(buf, 0, sizeof(buf));
34*e0c4386eSCy Schubert
35*e0c4386eSCy Schubert header[0] = rectype;
36*e0c4386eSCy Schubert header[1] = (recversion >> 8) & 0xff;
37*e0c4386eSCy Schubert header[2] = recversion & 0xff;
38*e0c4386eSCy Schubert header[3] = (len >> 8) & 0xff;
39*e0c4386eSCy Schubert header[4] = len & 0xff;
40*e0c4386eSCy Schubert
41*e0c4386eSCy Schubert if (!BIO_write_ex(b, header, SSL3_RT_HEADER_LENGTH, &written)
42*e0c4386eSCy Schubert || written != SSL3_RT_HEADER_LENGTH)
43*e0c4386eSCy Schubert return 0;
44*e0c4386eSCy Schubert
45*e0c4386eSCy Schubert while (len > 0) {
46*e0c4386eSCy Schubert size_t outlen;
47*e0c4386eSCy Schubert
48*e0c4386eSCy Schubert if (len > sizeof(buf))
49*e0c4386eSCy Schubert outlen = sizeof(buf);
50*e0c4386eSCy Schubert else
51*e0c4386eSCy Schubert outlen = len;
52*e0c4386eSCy Schubert
53*e0c4386eSCy Schubert if (!BIO_write_ex(b, buf, outlen, &written)
54*e0c4386eSCy Schubert || written != outlen)
55*e0c4386eSCy Schubert return 0;
56*e0c4386eSCy Schubert
57*e0c4386eSCy Schubert len -= outlen;
58*e0c4386eSCy Schubert }
59*e0c4386eSCy Schubert
60*e0c4386eSCy Schubert return 1;
61*e0c4386eSCy Schubert }
62*e0c4386eSCy Schubert
fail_due_to_record_overflow(int enc)63*e0c4386eSCy Schubert static int fail_due_to_record_overflow(int enc)
64*e0c4386eSCy Schubert {
65*e0c4386eSCy Schubert long err = ERR_peek_error();
66*e0c4386eSCy Schubert int reason;
67*e0c4386eSCy Schubert
68*e0c4386eSCy Schubert if (enc)
69*e0c4386eSCy Schubert reason = SSL_R_ENCRYPTED_LENGTH_TOO_LONG;
70*e0c4386eSCy Schubert else
71*e0c4386eSCy Schubert reason = SSL_R_DATA_LENGTH_TOO_LONG;
72*e0c4386eSCy Schubert
73*e0c4386eSCy Schubert if (ERR_GET_LIB(err) == ERR_LIB_SSL
74*e0c4386eSCy Schubert && ERR_GET_REASON(err) == reason)
75*e0c4386eSCy Schubert return 1;
76*e0c4386eSCy Schubert
77*e0c4386eSCy Schubert return 0;
78*e0c4386eSCy Schubert }
79*e0c4386eSCy Schubert
test_record_overflow(int idx)80*e0c4386eSCy Schubert static int test_record_overflow(int idx)
81*e0c4386eSCy Schubert {
82*e0c4386eSCy Schubert SSL_CTX *cctx = NULL, *sctx = NULL;
83*e0c4386eSCy Schubert SSL *clientssl = NULL, *serverssl = NULL;
84*e0c4386eSCy Schubert int testresult = 0;
85*e0c4386eSCy Schubert size_t len = 0;
86*e0c4386eSCy Schubert size_t written;
87*e0c4386eSCy Schubert int overf_expected;
88*e0c4386eSCy Schubert unsigned char buf;
89*e0c4386eSCy Schubert BIO *serverbio;
90*e0c4386eSCy Schubert int recversion;
91*e0c4386eSCy Schubert
92*e0c4386eSCy Schubert #ifdef OPENSSL_NO_TLS1_2
93*e0c4386eSCy Schubert if (idx == TEST_ENCRYPTED_OVERFLOW_TLS1_2_OK
94*e0c4386eSCy Schubert || idx == TEST_ENCRYPTED_OVERFLOW_TLS1_2_NOT_OK)
95*e0c4386eSCy Schubert return 1;
96*e0c4386eSCy Schubert #endif
97*e0c4386eSCy Schubert #if defined(OPENSSL_NO_TLS1_3) \
98*e0c4386eSCy Schubert || (defined(OPENSSL_NO_EC) && defined(OPENSSL_NO_DH))
99*e0c4386eSCy Schubert if (idx == TEST_ENCRYPTED_OVERFLOW_TLS1_3_OK
100*e0c4386eSCy Schubert || idx == TEST_ENCRYPTED_OVERFLOW_TLS1_3_NOT_OK)
101*e0c4386eSCy Schubert return 1;
102*e0c4386eSCy Schubert #endif
103*e0c4386eSCy Schubert
104*e0c4386eSCy Schubert if (!TEST_true(create_ssl_ctx_pair(NULL, TLS_server_method(),
105*e0c4386eSCy Schubert TLS_client_method(),
106*e0c4386eSCy Schubert TLS1_VERSION, 0,
107*e0c4386eSCy Schubert &sctx, &cctx, cert, privkey)))
108*e0c4386eSCy Schubert goto end;
109*e0c4386eSCy Schubert
110*e0c4386eSCy Schubert if (idx == TEST_ENCRYPTED_OVERFLOW_TLS1_2_OK
111*e0c4386eSCy Schubert || idx == TEST_ENCRYPTED_OVERFLOW_TLS1_2_NOT_OK) {
112*e0c4386eSCy Schubert len = SSL3_RT_MAX_ENCRYPTED_LENGTH;
113*e0c4386eSCy Schubert #ifndef OPENSSL_NO_COMP
114*e0c4386eSCy Schubert len -= SSL3_RT_MAX_COMPRESSED_OVERHEAD;
115*e0c4386eSCy Schubert #endif
116*e0c4386eSCy Schubert SSL_CTX_set_max_proto_version(sctx, TLS1_2_VERSION);
117*e0c4386eSCy Schubert } else if (idx == TEST_ENCRYPTED_OVERFLOW_TLS1_3_OK
118*e0c4386eSCy Schubert || idx == TEST_ENCRYPTED_OVERFLOW_TLS1_3_NOT_OK) {
119*e0c4386eSCy Schubert len = SSL3_RT_MAX_TLS13_ENCRYPTED_LENGTH;
120*e0c4386eSCy Schubert }
121*e0c4386eSCy Schubert
122*e0c4386eSCy Schubert if (!TEST_true(create_ssl_objects(sctx, cctx, &serverssl, &clientssl,
123*e0c4386eSCy Schubert NULL, NULL)))
124*e0c4386eSCy Schubert goto end;
125*e0c4386eSCy Schubert
126*e0c4386eSCy Schubert serverbio = SSL_get_rbio(serverssl);
127*e0c4386eSCy Schubert
128*e0c4386eSCy Schubert if (idx == TEST_PLAINTEXT_OVERFLOW_OK
129*e0c4386eSCy Schubert || idx == TEST_PLAINTEXT_OVERFLOW_NOT_OK) {
130*e0c4386eSCy Schubert len = SSL3_RT_MAX_PLAIN_LENGTH;
131*e0c4386eSCy Schubert
132*e0c4386eSCy Schubert if (idx == TEST_PLAINTEXT_OVERFLOW_NOT_OK)
133*e0c4386eSCy Schubert len++;
134*e0c4386eSCy Schubert
135*e0c4386eSCy Schubert if (!TEST_true(write_record(serverbio, len,
136*e0c4386eSCy Schubert SSL3_RT_HANDSHAKE, TLS1_VERSION)))
137*e0c4386eSCy Schubert goto end;
138*e0c4386eSCy Schubert
139*e0c4386eSCy Schubert if (!TEST_int_le(SSL_accept(serverssl), 0))
140*e0c4386eSCy Schubert goto end;
141*e0c4386eSCy Schubert
142*e0c4386eSCy Schubert overf_expected = (idx == TEST_PLAINTEXT_OVERFLOW_OK) ? 0 : 1;
143*e0c4386eSCy Schubert if (!TEST_int_eq(fail_due_to_record_overflow(0), overf_expected))
144*e0c4386eSCy Schubert goto end;
145*e0c4386eSCy Schubert
146*e0c4386eSCy Schubert goto success;
147*e0c4386eSCy Schubert }
148*e0c4386eSCy Schubert
149*e0c4386eSCy Schubert if (!TEST_true(create_ssl_connection(serverssl, clientssl,
150*e0c4386eSCy Schubert SSL_ERROR_NONE)))
151*e0c4386eSCy Schubert goto end;
152*e0c4386eSCy Schubert
153*e0c4386eSCy Schubert if (idx == TEST_ENCRYPTED_OVERFLOW_TLS1_2_NOT_OK
154*e0c4386eSCy Schubert || idx == TEST_ENCRYPTED_OVERFLOW_TLS1_3_NOT_OK) {
155*e0c4386eSCy Schubert overf_expected = 1;
156*e0c4386eSCy Schubert len++;
157*e0c4386eSCy Schubert } else {
158*e0c4386eSCy Schubert overf_expected = 0;
159*e0c4386eSCy Schubert }
160*e0c4386eSCy Schubert
161*e0c4386eSCy Schubert recversion = TLS1_2_VERSION;
162*e0c4386eSCy Schubert
163*e0c4386eSCy Schubert if (!TEST_true(write_record(serverbio, len, SSL3_RT_APPLICATION_DATA,
164*e0c4386eSCy Schubert recversion)))
165*e0c4386eSCy Schubert goto end;
166*e0c4386eSCy Schubert
167*e0c4386eSCy Schubert if (!TEST_false(SSL_read_ex(serverssl, &buf, sizeof(buf), &written)))
168*e0c4386eSCy Schubert goto end;
169*e0c4386eSCy Schubert
170*e0c4386eSCy Schubert if (!TEST_int_eq(fail_due_to_record_overflow(1), overf_expected))
171*e0c4386eSCy Schubert goto end;
172*e0c4386eSCy Schubert
173*e0c4386eSCy Schubert success:
174*e0c4386eSCy Schubert testresult = 1;
175*e0c4386eSCy Schubert
176*e0c4386eSCy Schubert end:
177*e0c4386eSCy Schubert SSL_free(serverssl);
178*e0c4386eSCy Schubert SSL_free(clientssl);
179*e0c4386eSCy Schubert SSL_CTX_free(sctx);
180*e0c4386eSCy Schubert SSL_CTX_free(cctx);
181*e0c4386eSCy Schubert return testresult;
182*e0c4386eSCy Schubert }
183*e0c4386eSCy Schubert
184*e0c4386eSCy Schubert OPT_TEST_DECLARE_USAGE("certfile privkeyfile\n")
185*e0c4386eSCy Schubert
setup_tests(void)186*e0c4386eSCy Schubert int setup_tests(void)
187*e0c4386eSCy Schubert {
188*e0c4386eSCy Schubert if (!test_skip_common_options()) {
189*e0c4386eSCy Schubert TEST_error("Error parsing test options\n");
190*e0c4386eSCy Schubert return 0;
191*e0c4386eSCy Schubert }
192*e0c4386eSCy Schubert
193*e0c4386eSCy Schubert if (!TEST_ptr(cert = test_get_argument(0))
194*e0c4386eSCy Schubert || !TEST_ptr(privkey = test_get_argument(1)))
195*e0c4386eSCy Schubert return 0;
196*e0c4386eSCy Schubert
197*e0c4386eSCy Schubert ADD_ALL_TESTS(test_record_overflow, TOTAL_RECORD_OVERFLOW_TESTS);
198*e0c4386eSCy Schubert return 1;
199*e0c4386eSCy Schubert }
200*e0c4386eSCy Schubert
cleanup_tests(void)201*e0c4386eSCy Schubert void cleanup_tests(void)
202*e0c4386eSCy Schubert {
203*e0c4386eSCy Schubert bio_s_mempacket_test_free();
204*e0c4386eSCy Schubert }
205