mirror of
https://github.com/openssl/openssl.git
synced 2024-12-09 05:51:54 +08:00
da1c088f59
Reviewed-by: Richard Levitte <levitte@openssl.org> Release: yes
141 lines
5.4 KiB
C
141 lines
5.4 KiB
C
/*
|
|
* Copyright 2018-2023 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
* in the file LICENSE in the source distribution or at
|
|
* https://www.openssl.org/source/license.html
|
|
*/
|
|
|
|
#include "testutil.h"
|
|
#include <openssl/ssl.h>
|
|
|
|
typedef struct {
|
|
int proto;
|
|
int min_version;
|
|
int max_version;
|
|
int min_ok;
|
|
int max_ok;
|
|
int expected_min;
|
|
int expected_max;
|
|
} version_test;
|
|
|
|
#define PROTO_TLS 0
|
|
#define PROTO_DTLS 1
|
|
#define PROTO_QUIC 2
|
|
|
|
/*
|
|
* If a version is valid for *any* protocol then setting the min/max protocol is
|
|
* expected to return success, even if that version is not valid for *this*
|
|
* protocol. However it only has an effect if it is valid for *this* protocol -
|
|
* otherwise it is ignored.
|
|
*/
|
|
static const version_test version_testdata[] = {
|
|
/* proto min max ok expected min expected max */
|
|
{PROTO_TLS, 0, 0, 1, 1, 0, 0},
|
|
{PROTO_TLS, SSL3_VERSION, TLS1_3_VERSION, 1, 1, SSL3_VERSION, TLS1_3_VERSION},
|
|
{PROTO_TLS, TLS1_VERSION, TLS1_3_VERSION, 1, 1, TLS1_VERSION, TLS1_3_VERSION},
|
|
{PROTO_TLS, TLS1_VERSION, TLS1_2_VERSION, 1, 1, TLS1_VERSION, TLS1_2_VERSION},
|
|
{PROTO_TLS, TLS1_2_VERSION, TLS1_2_VERSION, 1, 1, TLS1_2_VERSION, TLS1_2_VERSION},
|
|
{PROTO_TLS, TLS1_2_VERSION, TLS1_1_VERSION, 1, 1, TLS1_2_VERSION, TLS1_1_VERSION},
|
|
{PROTO_TLS, SSL3_VERSION - 1, TLS1_3_VERSION, 0, 1, 0, TLS1_3_VERSION},
|
|
{PROTO_TLS, SSL3_VERSION, TLS1_3_VERSION + 1, 1, 0, SSL3_VERSION, 0},
|
|
#ifndef OPENSSL_NO_DTLS
|
|
{PROTO_TLS, DTLS1_VERSION, DTLS1_2_VERSION, 1, 1, 0, 0},
|
|
#endif
|
|
{PROTO_TLS, OSSL_QUIC1_VERSION, OSSL_QUIC1_VERSION, 0, 0, 0, 0},
|
|
{PROTO_TLS, 7, 42, 0, 0, 0, 0},
|
|
{PROTO_DTLS, 0, 0, 1, 1, 0, 0},
|
|
{PROTO_DTLS, DTLS1_VERSION, DTLS1_2_VERSION, 1, 1, DTLS1_VERSION, DTLS1_2_VERSION},
|
|
#ifndef OPENSSL_NO_DTLS1_2
|
|
{PROTO_DTLS, DTLS1_2_VERSION, DTLS1_2_VERSION, 1, 1, DTLS1_2_VERSION, DTLS1_2_VERSION},
|
|
#endif
|
|
#ifndef OPENSSL_NO_DTLS1
|
|
{PROTO_DTLS, DTLS1_VERSION, DTLS1_VERSION, 1, 1, DTLS1_VERSION, DTLS1_VERSION},
|
|
#endif
|
|
#if !defined(OPENSSL_NO_DTLS1) && !defined(OPENSSL_NO_DTLS1_2)
|
|
{PROTO_DTLS, DTLS1_2_VERSION, DTLS1_VERSION, 1, 1, DTLS1_2_VERSION, DTLS1_VERSION},
|
|
#endif
|
|
{PROTO_DTLS, DTLS1_VERSION + 1, DTLS1_2_VERSION, 0, 1, 0, DTLS1_2_VERSION},
|
|
{PROTO_DTLS, DTLS1_VERSION, DTLS1_2_VERSION - 1, 1, 0, DTLS1_VERSION, 0},
|
|
{PROTO_DTLS, TLS1_VERSION, TLS1_3_VERSION, 1, 1, 0, 0},
|
|
{PROTO_DTLS, OSSL_QUIC1_VERSION, OSSL_QUIC1_VERSION, 0, 0, 0, 0},
|
|
/* These functions never have an effect when called on a QUIC object */
|
|
{PROTO_QUIC, 0, 0, 1, 1, 0, 0},
|
|
{PROTO_QUIC, OSSL_QUIC1_VERSION, OSSL_QUIC1_VERSION, 0, 0, 0, 0},
|
|
{PROTO_QUIC, OSSL_QUIC1_VERSION, OSSL_QUIC1_VERSION + 1, 0, 0, 0, 0},
|
|
{PROTO_QUIC, TLS1_VERSION, TLS1_3_VERSION, 1, 1, 0, 0},
|
|
#ifndef OPENSSL_NO_DTLS
|
|
{PROTO_QUIC, DTLS1_VERSION, DTLS1_2_VERSION, 1, 1, 0, 0},
|
|
#endif
|
|
};
|
|
|
|
static int test_set_min_max_version(int idx_tst)
|
|
{
|
|
SSL_CTX *ctx = NULL;
|
|
SSL *ssl = NULL;
|
|
int testresult = 0;
|
|
version_test t = version_testdata[idx_tst];
|
|
const SSL_METHOD *meth = NULL;
|
|
|
|
switch (t.proto) {
|
|
case PROTO_TLS:
|
|
meth = TLS_client_method();
|
|
break;
|
|
|
|
#ifndef OPENSSL_NO_DTLS
|
|
case PROTO_DTLS:
|
|
meth = DTLS_client_method();
|
|
break;
|
|
#endif
|
|
|
|
#ifndef OPENSSL_NO_QUIC
|
|
case PROTO_QUIC:
|
|
meth = OSSL_QUIC_client_method();
|
|
break;
|
|
#endif
|
|
}
|
|
|
|
if (meth == NULL)
|
|
return TEST_skip("Protocol not supported");
|
|
|
|
ctx = SSL_CTX_new(meth);
|
|
if (ctx == NULL)
|
|
goto end;
|
|
|
|
ssl = SSL_new(ctx);
|
|
if (ssl == NULL)
|
|
goto end;
|
|
|
|
if (!TEST_int_eq(SSL_CTX_set_min_proto_version(ctx, t.min_version), t.min_ok))
|
|
goto end;
|
|
if (!TEST_int_eq(SSL_CTX_set_max_proto_version(ctx, t.max_version), t.max_ok))
|
|
goto end;
|
|
if (!TEST_int_eq(SSL_CTX_get_min_proto_version(ctx), t.expected_min))
|
|
goto end;
|
|
if (!TEST_int_eq(SSL_CTX_get_max_proto_version(ctx), t.expected_max))
|
|
goto end;
|
|
|
|
if (!TEST_int_eq(SSL_set_min_proto_version(ssl, t.min_version), t.min_ok))
|
|
goto end;
|
|
if (!TEST_int_eq(SSL_set_max_proto_version(ssl, t.max_version), t.max_ok))
|
|
goto end;
|
|
if (!TEST_int_eq(SSL_get_min_proto_version(ssl), t.expected_min))
|
|
goto end;
|
|
if (!TEST_int_eq(SSL_get_max_proto_version(ssl), t.expected_max))
|
|
goto end;
|
|
|
|
testresult = 1;
|
|
|
|
end:
|
|
SSL_free(ssl);
|
|
SSL_CTX_free(ctx);
|
|
return testresult;
|
|
}
|
|
|
|
int setup_tests(void)
|
|
{
|
|
ADD_ALL_TESTS(test_set_min_max_version, sizeof(version_testdata) / sizeof(version_test));
|
|
return 1;
|
|
}
|