1178 lines
33 KiB
C++
1178 lines
33 KiB
C++
/*
|
|
* plugin-test.cpp
|
|
*
|
|
* This source file is part of the FoundationDB open source project
|
|
*
|
|
* Copyright 2013-2018 Apple Inc. and the FoundationDB project authors
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#include <exception>
|
|
#include <fstream>
|
|
#include <iostream>
|
|
#include <sstream>
|
|
#include <string>
|
|
#include <vector>
|
|
|
|
#include <stdarg.h>
|
|
#include <dlfcn.h>
|
|
|
|
#include <boost/circular_buffer.hpp>
|
|
|
|
#include "fdbrpc/ITLSPlugin.h"
|
|
#include "ReferenceCounted.h"
|
|
|
|
#include "FDBLibTLS/FDBLibTLSPlugin.h"
|
|
|
|
#define TESTDATA "./testdata/"
|
|
|
|
static std::string load_file(std::string path)
|
|
{
|
|
std::ifstream fs(path);
|
|
std::stringstream ss;
|
|
|
|
ss << fs.rdbuf();
|
|
fs.close();
|
|
|
|
return ss.str();
|
|
}
|
|
|
|
struct client_server_test {
|
|
std::string ca_path;
|
|
|
|
bool client_success;
|
|
std::string client_path;
|
|
const char* client_password;
|
|
std::vector<std::string> client_verify;
|
|
const char* servername;
|
|
|
|
bool server_success;
|
|
std::string server_path;
|
|
const char* server_password;
|
|
std::vector<std::string> server_verify;
|
|
};
|
|
|
|
struct FDBLibTLSPluginTest {
|
|
FDBLibTLSPluginTest(Reference<ITLSPlugin> plugin);
|
|
~FDBLibTLSPluginTest();
|
|
|
|
Reference<ITLSPlugin> plugin;
|
|
|
|
boost::circular_buffer<uint8_t> client_buffer;
|
|
boost::circular_buffer<uint8_t> server_buffer;
|
|
|
|
int circular_read(boost::circular_buffer<uint8_t> *cb, uint8_t* buf, int len);
|
|
int circular_write(boost::circular_buffer<uint8_t> *cb, const uint8_t* buf, int len);
|
|
int client_read(uint8_t* buf, int len);
|
|
int client_write(const uint8_t* buf, int len);
|
|
int server_read(uint8_t* buf, int len);
|
|
int server_write(const uint8_t* buf, int len);
|
|
|
|
Reference<ITLSPolicy> create_policy(void);
|
|
Reference<ITLSSession> create_client_session(Reference<ITLSPolicy> policy, const char* servername);
|
|
Reference<ITLSSession> create_server_session(Reference<ITLSPolicy> policy);
|
|
|
|
void circular_reset(void);
|
|
void circular_self_test(void);
|
|
|
|
int client_server_test(const struct client_server_test *cst);
|
|
int set_cert_data_test(void);
|
|
};
|
|
|
|
FDBLibTLSPluginTest::FDBLibTLSPluginTest(Reference<ITLSPlugin> plugin) :
|
|
plugin(plugin)
|
|
{
|
|
circular_reset();
|
|
circular_self_test();
|
|
}
|
|
|
|
FDBLibTLSPluginTest::~FDBLibTLSPluginTest()
|
|
{
|
|
}
|
|
|
|
int FDBLibTLSPluginTest::circular_read(boost::circular_buffer<uint8_t> *cb, uint8_t* buf, int len)
|
|
{
|
|
int n = 0;
|
|
|
|
for (n = 0; n < len; n++) {
|
|
if (cb->empty())
|
|
break;
|
|
buf[n] = (*cb)[0];
|
|
cb->pop_front();
|
|
}
|
|
|
|
return n;
|
|
}
|
|
|
|
int FDBLibTLSPluginTest::circular_write(boost::circular_buffer<uint8_t> *cb, const uint8_t* buf, int len)
|
|
{
|
|
int n = 0;
|
|
|
|
for (n = 0; n < len; n++) {
|
|
if (cb->full())
|
|
break;
|
|
cb->push_back(buf[n]);
|
|
}
|
|
|
|
return n;
|
|
}
|
|
|
|
int FDBLibTLSPluginTest::client_read(uint8_t* buf, int len)
|
|
{
|
|
// Read bytes from the server from the client's buffer.
|
|
return circular_read(&client_buffer, buf, len);
|
|
}
|
|
|
|
int FDBLibTLSPluginTest::client_write(const uint8_t* buf, int len)
|
|
{
|
|
// Write bytes from the client into the server's buffer.
|
|
return circular_write(&server_buffer, buf, len);
|
|
}
|
|
|
|
int FDBLibTLSPluginTest::server_read(uint8_t* buf, int len)
|
|
{
|
|
// Read bytes from the client from the server's buffer.
|
|
return circular_read(&server_buffer, buf, len);
|
|
}
|
|
|
|
int FDBLibTLSPluginTest::server_write(const uint8_t* buf, int len)
|
|
{
|
|
// Write bytes from the server into the client's buffer.
|
|
return circular_write(&client_buffer, buf, len);
|
|
}
|
|
|
|
void FDBLibTLSPluginTest::circular_reset()
|
|
{
|
|
client_buffer = boost::circular_buffer<uint8_t>(1024);
|
|
server_buffer = boost::circular_buffer<uint8_t>(1024);
|
|
}
|
|
|
|
void FDBLibTLSPluginTest::circular_self_test()
|
|
{
|
|
uint8_t buf[1024] = {1, 2, 3};
|
|
|
|
std::cerr << "INFO: running circular buffer self tests...\n";
|
|
|
|
assert(server_read(buf, 3) == 0);
|
|
|
|
buf[0] = 1, buf[1] = 2, buf[2] = 3;
|
|
assert(client_write(buf, 2) == 2);
|
|
|
|
buf[0] = buf[1] = buf[2] = 255;
|
|
assert(server_read(buf, 3) == 2);
|
|
assert(buf[0] == 1 && buf[1] == 2 && buf[2] == 255);
|
|
|
|
assert(client_write(buf, 1024) == 1024);
|
|
assert(client_write(buf, 1) == 0);
|
|
assert(server_read(buf, 1) == 1);
|
|
assert(client_write(buf, 1) == 1);
|
|
assert(client_write(buf, 1) == 0);
|
|
assert(server_read(buf, 1024) == 1024);
|
|
assert(server_read(buf, 1024) == 0);
|
|
|
|
assert(client_read(buf, 3) == 0);
|
|
|
|
buf[0] = 1, buf[1] = 2, buf[2] = 3;
|
|
assert(server_write(buf, 2) == 2);
|
|
|
|
buf[0] = buf[1] = buf[2] = 255;
|
|
assert(client_read(buf, 3) == 2);
|
|
assert(buf[0] == 1 && buf[1] == 2 && buf[2] == 255);
|
|
|
|
assert(server_write(buf, 1024) == 1024);
|
|
assert(server_write(buf, 1) == 0);
|
|
assert(client_read(buf, 1) == 1);
|
|
assert(server_write(buf, 1) == 1);
|
|
assert(server_write(buf, 1) == 0);
|
|
assert(client_read(buf, 1024) == 1024);
|
|
assert(client_read(buf, 1024) == 0);
|
|
}
|
|
|
|
Reference<ITLSPolicy> FDBLibTLSPluginTest::create_policy(void)
|
|
{
|
|
return Reference<ITLSPolicy>(plugin->create_policy());
|
|
}
|
|
|
|
static int client_send_func(void* ctx, const uint8_t* buf, int len) {
|
|
FDBLibTLSPluginTest *pt = (FDBLibTLSPluginTest *)ctx;
|
|
try {
|
|
return pt->client_write(buf, len);
|
|
} catch ( const std::runtime_error& e ) {
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
static int client_recv_func(void* ctx, uint8_t* buf, int len) {
|
|
FDBLibTLSPluginTest *pt = (FDBLibTLSPluginTest *)ctx;
|
|
try {
|
|
return pt->client_read(buf, len);
|
|
} catch ( const std::runtime_error& e ) {
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
Reference<ITLSSession> FDBLibTLSPluginTest::create_client_session(Reference<ITLSPolicy> policy, const char* servername)
|
|
{
|
|
return Reference<ITLSSession>(policy->create_session(true, servername, client_send_func, this, client_recv_func, this, NULL));
|
|
}
|
|
|
|
static int server_send_func(void* ctx, const uint8_t* buf, int len) {
|
|
FDBLibTLSPluginTest *pt = (FDBLibTLSPluginTest *)ctx;
|
|
try {
|
|
return pt->server_write(buf, len);
|
|
} catch ( const std::runtime_error& e ) {
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
static int server_recv_func(void* ctx, uint8_t* buf, int len) {
|
|
FDBLibTLSPluginTest *pt = (FDBLibTLSPluginTest *)ctx;
|
|
try {
|
|
return pt->server_read(buf, len);
|
|
} catch ( const std::runtime_error& e ) {
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
Reference<ITLSSession> FDBLibTLSPluginTest::create_server_session(Reference<ITLSPolicy> policy)
|
|
{
|
|
return Reference<ITLSSession>(policy->create_session(false, NULL, server_send_func, this, server_recv_func, this, NULL));
|
|
}
|
|
|
|
#define MAX_VERIFY_RULES 5
|
|
|
|
static void convert_verify_peers(const std::vector<std::string> *verify_rules, const uint8_t *verify_peers[], int verify_peers_len[]) {
|
|
if (verify_rules->size() > MAX_VERIFY_RULES)
|
|
throw std::runtime_error("verify");
|
|
int i = 0;
|
|
for (auto &verify_rule: *verify_rules) {
|
|
verify_peers[i] = (const uint8_t *)&verify_rule[0];
|
|
verify_peers_len[i] = verify_rule.size();
|
|
i++;
|
|
}
|
|
}
|
|
|
|
int FDBLibTLSPluginTest::client_server_test(const struct client_server_test* cst)
|
|
{
|
|
const uint8_t *verify_peers[MAX_VERIFY_RULES];
|
|
int verify_peers_len[MAX_VERIFY_RULES];
|
|
|
|
circular_reset();
|
|
|
|
std::string ca_data = load_file(TESTDATA + cst->ca_path);
|
|
std::string client_data = load_file(TESTDATA + cst->client_path);
|
|
std::string server_data = load_file(TESTDATA + cst->server_path);
|
|
|
|
Reference<ITLSPolicy> client_policy = create_policy();
|
|
if (!client_policy->set_ca_data((const uint8_t*)&ca_data[0], ca_data.size())) {
|
|
std::cerr << "FAIL: failed to set client ca data\n";
|
|
return 1;
|
|
}
|
|
if (!client_policy->set_cert_data((const uint8_t*)&client_data[0], client_data.size())) {
|
|
std::cerr << "FAIL: failed to set client cert data\n";
|
|
return 1;
|
|
}
|
|
if (!client_policy->set_key_data((const uint8_t*)&client_data[0], client_data.size(), cst->client_password)) {
|
|
std::cerr << "FAIL: failed to set client key data\n";
|
|
return 1;
|
|
}
|
|
if (!cst->client_verify.empty()) {
|
|
convert_verify_peers(&cst->client_verify, verify_peers, verify_peers_len);
|
|
if (!client_policy->set_verify_peers(cst->client_verify.size(), verify_peers, verify_peers_len)) {
|
|
std::cerr << "FAIL: failed to set client verify peers\n";
|
|
return 1;
|
|
}
|
|
}
|
|
|
|
Reference<ITLSPolicy> server_policy = create_policy();
|
|
if (!server_policy->set_ca_data((const uint8_t*)&ca_data[0], ca_data.size())) {
|
|
std::cerr << "FAIL: failed to set server ca data\n";
|
|
return 1;
|
|
}
|
|
if (!server_policy->set_cert_data((const uint8_t*)&server_data[0], server_data.size())) {
|
|
std::cerr << "FAIL: failed to set server cert data\n";
|
|
return 1;
|
|
}
|
|
if (!server_policy->set_key_data((const uint8_t*)&server_data[0], server_data.size(), cst->server_password)) {
|
|
std::cerr << "FAIL: failed to set server key data\n";
|
|
return 1;
|
|
}
|
|
convert_verify_peers(&cst->server_verify, verify_peers, verify_peers_len);
|
|
if (!server_policy->set_verify_peers(cst->server_verify.size(), verify_peers, verify_peers_len)) {
|
|
std::cerr << "FAIL: failed to set server verify peers\n";
|
|
return 1;
|
|
}
|
|
|
|
Reference<ITLSSession> client_session = create_client_session(client_policy, cst->servername);
|
|
Reference<ITLSSession> server_session = create_server_session(server_policy);
|
|
|
|
if (client_session.getPtr() == NULL || server_session.getPtr() == NULL)
|
|
return 1;
|
|
|
|
std::cerr << "INFO: starting TLS handshake...\n";
|
|
|
|
bool client_done = false, server_done = false;
|
|
bool client_failed = false, server_failed = false;
|
|
int rc, i = 0;
|
|
do {
|
|
if (!client_done) {
|
|
rc = client_session->handshake();
|
|
if (rc == ITLSSession::SUCCESS) {
|
|
client_done = true;
|
|
} else if (rc == ITLSSession::FAILED) {
|
|
if (cst->client_success) {
|
|
std::cerr << "FAIL: failed to complete client handshake\n";
|
|
return 1;
|
|
} else {
|
|
std::cerr << "INFO: failed to complete client handshake (as expected)\n";
|
|
client_failed = true;
|
|
client_done = true;
|
|
}
|
|
} else if (rc != ITLSSession::WANT_READ && rc != ITLSSession::WANT_WRITE) {
|
|
std::cerr << "FAIL: client handshake returned unknown value: " << rc << "\n";
|
|
return 1;
|
|
}
|
|
}
|
|
if (!server_done) {
|
|
rc = server_session->handshake();
|
|
if (rc == ITLSSession::SUCCESS) {
|
|
server_done = true;
|
|
} else if (rc == ITLSSession::FAILED) {
|
|
if (cst->server_success) {
|
|
std::cerr << "FAIL: failed to complete server handshake\n";
|
|
return 1;
|
|
} else {
|
|
std::cerr << "INFO: failed to complete server handshake (as expected)\n";
|
|
server_failed = true;
|
|
server_done = true;
|
|
}
|
|
} else if (rc != ITLSSession::WANT_READ && rc != ITLSSession::WANT_WRITE) {
|
|
std::cerr << "FAIL: server handshake returned unknown value: " << rc << "\n";
|
|
return 1;
|
|
}
|
|
}
|
|
} while (i++ < 100 && (!client_done || !server_done));
|
|
|
|
if (!client_done || !server_done) {
|
|
std::cerr << "FAIL: failed to complete handshake\n";
|
|
return 1;
|
|
}
|
|
|
|
if (!cst->client_success && !client_failed) {
|
|
std::cerr << "FAIL: client handshake succeeded when it should have failed\n";
|
|
return 1;
|
|
}
|
|
if (!cst->server_success && !server_failed) {
|
|
std::cerr << "FAIL: server handshake succeeded when it should have failed\n";
|
|
return 1;
|
|
}
|
|
if (!cst->client_success || !cst->server_success)
|
|
return 0;
|
|
|
|
std::cerr << "INFO: handshake completed successfully\n";
|
|
|
|
//
|
|
// Write on client and read on server.
|
|
//
|
|
std::cerr << "INFO: starting client write test...\n";
|
|
|
|
std::string client_msg("FDBLibTLSPlugin Client Write Test");
|
|
std::string server_msg;
|
|
size_t cn = 0, sn = 0;
|
|
uint8_t buf[16];
|
|
|
|
client_done = false, server_done = false;
|
|
i = 0;
|
|
do {
|
|
if (!client_done) {
|
|
rc = client_session->write((const uint8_t*)&client_msg[cn], client_msg.size()-cn);
|
|
if (rc > 0) {
|
|
cn += rc;
|
|
if (cn >= client_msg.size())
|
|
client_done = true;
|
|
} else if (rc == ITLSSession::FAILED) {
|
|
std::cerr << "FAIL: failed to complete client write\n";
|
|
return 1;
|
|
} else if (rc != ITLSSession::WANT_READ && rc != ITLSSession::WANT_WRITE) {
|
|
std::cerr << "FAIL: client write returned unknown value: " << rc << "\n";
|
|
return 1;
|
|
}
|
|
}
|
|
if (!server_done) {
|
|
rc = server_session->read(buf, sizeof(buf));
|
|
if (rc > 0) {
|
|
sn += rc;
|
|
for (int j = 0; j < rc; j++)
|
|
server_msg += buf[j];
|
|
if (sn >= client_msg.size())
|
|
server_done = true;
|
|
} else if (rc == ITLSSession::FAILED) {
|
|
std::cerr << "FAIL: failed to complete server read\n";
|
|
return 1;
|
|
} else if (rc != ITLSSession::WANT_READ && rc != ITLSSession::WANT_WRITE) {
|
|
std::cerr << "FAIL: server read returned unknown value: " << rc << "\n";
|
|
return 1;
|
|
}
|
|
}
|
|
} while (i++ < 100 && (!client_done || !server_done));
|
|
|
|
if (client_msg != server_msg) {
|
|
std::cerr << "FAIL: got client msg '" << server_msg << "' want '" << client_msg << "'\n";
|
|
return 1;
|
|
}
|
|
|
|
std::cerr << "INFO: client write test completed successfully\n";
|
|
|
|
//
|
|
// Write on server and read on client.
|
|
//
|
|
std::cerr << "INFO: starting server write test...\n";
|
|
|
|
server_msg = "FDBLibTLSPlugin Server Write Test";
|
|
client_msg.clear();
|
|
cn = 0, sn = 0;
|
|
|
|
client_done = false, server_done = false;
|
|
i = 0;
|
|
do {
|
|
if (!server_done) {
|
|
rc = server_session->write((const uint8_t*)&server_msg[cn], server_msg.size()-cn);
|
|
if (rc > 0) {
|
|
cn += rc;
|
|
if (cn >= server_msg.size())
|
|
server_done = true;
|
|
} else if (rc == ITLSSession::FAILED) {
|
|
std::cerr << "FAIL: failed to complete server write\n";
|
|
return 1;
|
|
} else if (rc != ITLSSession::WANT_READ && rc != ITLSSession::WANT_WRITE) {
|
|
std::cerr << "FAIL: server write returned unknown value: " << rc << "\n";
|
|
return 1;
|
|
}
|
|
}
|
|
if (!client_done) {
|
|
rc = client_session->read(buf, sizeof(buf));
|
|
if (rc > 0) {
|
|
sn += rc;
|
|
for (int j = 0; j < rc; j++)
|
|
client_msg += buf[j];
|
|
if (sn >= server_msg.size())
|
|
client_done = true;
|
|
} else if (rc == ITLSSession::FAILED) {
|
|
std::cerr << "FAIL: failed to complete client read\n";
|
|
return 1;
|
|
} else if (rc != ITLSSession::WANT_READ && rc != ITLSSession::WANT_WRITE) {
|
|
std::cerr << "FAIL: client read returned unknown value: " << rc << "\n";
|
|
return 1;
|
|
}
|
|
}
|
|
} while (i++ < 100 && (!client_done || !server_done));
|
|
|
|
if (server_msg != client_msg) {
|
|
std::cerr << "FAIL: got server msg '" << client_msg << "' want '" << server_msg << "'\n";
|
|
return 1;
|
|
}
|
|
|
|
std::cerr << "INFO: server write test completed successfully\n";
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void logf(const char* event, void* uid, bool is_error, ...) {
|
|
va_list args;
|
|
|
|
std::string log_type ("INFO");
|
|
if (is_error)
|
|
log_type = "ERROR";
|
|
|
|
std::cerr << log_type << ": " << event;
|
|
|
|
va_start(args, is_error);
|
|
|
|
const char *s = va_arg(args, const char *);
|
|
while (s != NULL) {
|
|
std::cerr << " " << s;
|
|
s = va_arg(args, const char *);
|
|
}
|
|
|
|
std::cerr << "\n";
|
|
|
|
va_end(args);
|
|
}
|
|
|
|
const struct client_server_test client_server_tests[] = {
|
|
// Single root CA.
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = true,
|
|
.client_path = "test-client-1.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {""},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-1.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {""},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = true,
|
|
.client_path = "test-client-1.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {""},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-2.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {""},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = true,
|
|
.client_path = "test-client-2.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {""},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-1.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {""},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = true,
|
|
.client_path = "test-client-2.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {""},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-2.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {""},
|
|
},
|
|
|
|
// Multiple root CAs.
|
|
{
|
|
.ca_path = "test-ca-all.pem",
|
|
.client_success = true,
|
|
.client_path = "test-client-1.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {""},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-4.pem",
|
|
.server_password = "fdb123",
|
|
.server_verify = {""},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-all.pem",
|
|
.client_success = true,
|
|
.client_path = "test-client-4.pem",
|
|
.client_password = "fdb321",
|
|
.client_verify = {""},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-1.pem",
|
|
.server_password = "fdb123",
|
|
.server_verify = {""},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = false,
|
|
.client_path = "test-client-1.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {""},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-4.pem",
|
|
.server_password = "fdb123",
|
|
.server_verify = {""},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-2.pem",
|
|
.client_success = true,
|
|
.client_path = "test-client-1.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {""},
|
|
.servername = NULL,
|
|
.server_success = false,
|
|
.server_path = "test-server-4.pem",
|
|
.server_password = "fdb123",
|
|
.server_verify = {""},
|
|
},
|
|
|
|
// Expired certificates.
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = false,
|
|
.client_path = "test-client-1.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {""},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-3.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {""},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = true,
|
|
.client_path = "test-client-3.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {""},
|
|
.servername = NULL,
|
|
.server_success = false,
|
|
.server_path = "test-server-1.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {""},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = true,
|
|
.client_path = "test-client-1.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {"Check.Unexpired=0"},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-3.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {""},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = true,
|
|
.client_path = "test-client-3.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {""},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-1.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {"Check.Unexpired=0"},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = true,
|
|
.client_path = "test-client-1.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {"Check.Valid=0"},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-3.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {""},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = true,
|
|
.client_path = "test-client-3.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {""},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-1.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {"Check.Valid=0"},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = false,
|
|
.client_path = "test-client-1.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {"I.CN=FDB LibTLS Plugin Test Intermediate CA 1", "I.CN=FDB LibTLS Plugin Test Intermediate CA 2,Check.Unexpired=0"},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-3.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {""},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = true,
|
|
.client_path = "test-client-1.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {"I.CN=FDB LibTLS Plugin Test Intermediate CA 1,Check.Unexpired=0", "I.CN=FDB LibTLS Plugin Test Intermediate CA 2"},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-3.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {""},
|
|
},
|
|
|
|
// Match on specific subject and/or issuer.
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = true,
|
|
.client_path = "test-client-1.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {"C=US"},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-1.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {""},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = false,
|
|
.client_path = "test-client-1.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {"C=US"},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-2.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {""},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = true,
|
|
.client_path = "test-client-1.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {"C=AU"},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-2.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {""},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = true,
|
|
.client_path = "test-client-1.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {"C=US", "C=AU"},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-2.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {""},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = false,
|
|
.client_path = "test-client-1.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {"C=US", "C=JP"},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-2.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {""},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = true,
|
|
.client_path = "test-client-1.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {"CN=FDB LibTLS Plugin Test Server 2\\, \\80 \\<\\01\\+\\02=\\03\\>"},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-2.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {""},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = false,
|
|
.client_path = "test-client-1.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {"CN=FDB LibTLS Plugin Test Server 2\\, \\80 \\<\\01\\+\\02=\\04\\>"},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-2.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {""},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = false,
|
|
.client_path = "test-client-1.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {"CN=FDB LibTLS Plugin Test Server 2\\, \\81 \\<\\01\\+\\02=\\04\\>"},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-2.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {""},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = false,
|
|
.client_path = "test-client-1.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {"CN=FDB LibTLS Plugin Test Server 2\\, \\80 \\<\\01\\+\\02=\\04"},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-2.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {""},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = true,
|
|
.client_path = "test-client-1.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {"CN=FDB LibTLS Plugin Test Server 2\\, \\80 \\<\\01\\+\\02=\\03\\>"},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-2.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {"CN=FDB LibTLS Plugin Test Client 1"},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = true,
|
|
.client_path = "test-client-1.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {""},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-1.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {"CN=FDB LibTLS Plugin Test Client 1"},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = true,
|
|
.client_path = "test-client-2.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {""},
|
|
.servername = NULL,
|
|
.server_success = false,
|
|
.server_path = "test-server-1.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {"O=Apple Pty Limited,OU=FDC Team"},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = true,
|
|
.client_path = "test-client-2.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {"O=Apple Inc.,OU=FDB Team"},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-1.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {"O=Apple Pty Limited,OU=FDB Team"},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = false,
|
|
.client_path = "test-client-2.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {"O=Apple Inc.,OU=FDC Team"},
|
|
.servername = NULL,
|
|
.server_success = false,
|
|
.server_path = "test-server-1.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {"O=Apple Pty Limited,OU=FDC Team"},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = true,
|
|
.client_path = "test-client-1.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {"I.C=US,I.ST=California,I.L=Cupertino,I.O=Apple Inc.,I.OU=FDB Team"},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-1.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {"I.C=US,I.ST=California,I.L=Cupertino,I.O=Apple Inc.,I.OU=FDB Team"},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = false,
|
|
.client_path = "test-client-1.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {"I.C=US,I.ST=California,I.L=Cupertino,I.O=Apple Inc.,I.OU=FDC Team"},
|
|
.servername = NULL,
|
|
.server_success = false,
|
|
.server_path = "test-server-1.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {"I.C=US,I.ST=California,I.L=Cupertino,I.O=Apple Inc.,I.OU=FDC Team"},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = true,
|
|
.client_path = "test-client-1.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {"I.CN=FDB LibTLS Plugin Test Intermediate CA 1"},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-1.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {"I.CN=FDB LibTLS Plugin Test Intermediate CA 1"},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = false,
|
|
.client_path = "test-client-1.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {"I.CN=FDB LibTLS Plugin Test Intermediate CA 2"},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-1.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {"I.CN=FDB LibTLS Plugin Test Intermediate CA 1"},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = true,
|
|
.client_path = "test-client-1.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {"I.CN=FDB LibTLS Plugin Test Intermediate CA 2"},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-2.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {"I.CN=FDB LibTLS Plugin Test Intermediate CA 1"},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = true,
|
|
.client_path = "test-client-1.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {"CN=FDB LibTLS Plugin Test Server 2\\, \\80 \\<\\01\\+\\02=\\03\\>,I.CN=FDB LibTLS Plugin Test Intermediate CA 2"},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-2.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {"I.CN=FDB LibTLS Plugin Test Intermediate CA 1,O=Apple Inc.,I.C=US,S.C=US"},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = false,
|
|
.client_path = "test-client-1.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {"CN=FDB LibTLS Plugin Test Server 2\\, \\80 \\<\\01\\+\\02=\\03\\>,I.CN=FDB LibTLS Plugin Test Intermediate CA 1"},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-2.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {"I.CN=FDB LibTLS Plugin Test Intermediate CA 1,O=Apple Inc.,I.C=US,S.C=US"},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = true,
|
|
.client_path = "test-client-1.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {"R.CN=FDB LibTLS Plugin Test Root CA 1"},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-2.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {"R.CN=FDB LibTLS Plugin Test Root CA 1"},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-all.pem",
|
|
.client_success = false,
|
|
.client_path = "test-client-1.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {"R.CN=FDB LibTLS Plugin Test Root CA 1"},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-4.pem",
|
|
.server_password = "fdb123",
|
|
.server_verify = {"R.CN=FDB LibTLS Plugin Test Root CA 1"},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-all.pem",
|
|
.client_success = true,
|
|
.client_path = "test-client-1.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {"R.CN=FDB LibTLS Plugin Test Root CA 1", "R.CN=FDB LibTLS Plugin Test Root CA 2"},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-4.pem",
|
|
.server_password = "fdb123",
|
|
.server_verify = {"R.CN=FDB LibTLS Plugin Test Root CA 1"},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-all.pem",
|
|
.client_success = true,
|
|
.client_path = "test-client-1.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {"R.CN=FDB LibTLS Plugin Test Root CA 2"},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-4.pem",
|
|
.server_password = "fdb123",
|
|
.server_verify = {"R.CN=FDB LibTLS Plugin Test Root CA 1"},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-all.pem",
|
|
.client_success = true,
|
|
.client_path = "test-client-1.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {"R.OU=FDB Team"},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-4.pem",
|
|
.server_password = "fdb123",
|
|
.server_verify = {"R.OU=FDB Team"},
|
|
},
|
|
|
|
// Client performing name validation via servername.
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = true,
|
|
.client_path = "test-client-1.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {},
|
|
.servername = "test.foundationdb.org",
|
|
.server_success = true,
|
|
.server_path = "test-server-1.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {""},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = false,
|
|
.client_path = "test-client-1.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {},
|
|
.servername = "www.foundationdb.org",
|
|
.server_success = true,
|
|
.server_path = "test-server-1.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {""},
|
|
},
|
|
|
|
// Prefix and Suffix Matching
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = true,
|
|
.client_path = "test-client-2.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {"O>=Apple Inc.,OU>=FDB"},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-1.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {"O<=Limited,OU<=Team"},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = false,
|
|
.client_path = "test-client-2.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {"O<=Apple Inc.,OU<=FDB"},
|
|
.servername = NULL,
|
|
.server_success = false,
|
|
.server_path = "test-server-1.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {"O>=Limited,OU>=Team"},
|
|
},
|
|
|
|
// Subject Alternative Name
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = true,
|
|
.client_path = "test-client-2.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {"S.subjectAltName=DNS:test.foundationdb.org"},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-1.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {"Check.Valid=0"},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = true,
|
|
.client_path = "test-client-2.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {"S.subjectAltName>=DNS:test."},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-1.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {"Check.Valid=0"},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = true,
|
|
.client_path = "test-client-2.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {"S.subjectAltName<=DNS:.org"},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-1.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {"Check.Valid=0"},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = false,
|
|
.client_path = "test-client-2.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {"S.subjectAltName<=DNS:.com"},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-1.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {"Check.Valid=0"},
|
|
},
|
|
{
|
|
.ca_path = "test-ca-1.pem",
|
|
.client_success = false,
|
|
.client_path = "test-client-2.pem",
|
|
.client_password = NULL,
|
|
.client_verify = {"S.subjectAltName<=EMAIL:.com"},
|
|
.servername = NULL,
|
|
.server_success = true,
|
|
.server_path = "test-server-1.pem",
|
|
.server_password = NULL,
|
|
.server_verify = {"Check.Valid=0"},
|
|
},
|
|
};
|
|
|
|
int main(int argc, char **argv)
|
|
{
|
|
void *pluginSO = NULL;
|
|
void *(*getPlugin)(const char*);
|
|
int failed = 0;
|
|
|
|
if (argc != 2) {
|
|
std::cerr << "usage: " << argv[0] << " <plugin_path>\n";
|
|
exit(1);
|
|
}
|
|
|
|
pluginSO = dlopen(argv[1], RTLD_LAZY | RTLD_LOCAL);
|
|
if (pluginSO == NULL) {
|
|
std::cerr << "failed to load plugin '" << argv[1] << "': " << dlerror() << "\n";
|
|
exit(1);
|
|
}
|
|
|
|
getPlugin = (void*(*)(const char*))dlsym( pluginSO, "get_plugin" );
|
|
if (getPlugin == NULL) {
|
|
std::cerr << "plugin '" << argv[1] << "' does not provide get_plugin()\n";
|
|
exit(1);
|
|
}
|
|
|
|
Reference<ITLSPlugin> plugin = Reference<ITLSPlugin>((ITLSPlugin *)getPlugin(ITLSPlugin::get_plugin_type_name_and_version()));
|
|
|
|
FDBLibTLSPluginTest *pt = new FDBLibTLSPluginTest(plugin);
|
|
|
|
int test_num = 1;
|
|
for (auto &cst: client_server_tests) {
|
|
std::cerr << "== Test " << test_num++ << " ==\n";
|
|
failed |= pt->client_server_test(&cst);
|
|
}
|
|
|
|
delete pt;
|
|
|
|
return (failed);
|
|
}
|