xref: /openssl/test/recordlentest.c (revision a28d06f3)
1 /*
2  * Copyright 2017-2021 The OpenSSL Project Authors. All Rights Reserved.
3  *
4  * Licensed under the Apache License 2.0 (the "License").  You may not use
5  * this file except in compliance with the License.  You can obtain a copy
6  * in the file LICENSE in the source distribution or at
7  * https://www.openssl.org/source/license.html
8  */
9 
10 #include <string.h>
11 
12 #include "helpers/ssltestlib.h"
13 #include "testutil.h"
14 
15 static char *cert = NULL;
16 static char *privkey = NULL;
17 
18 #define TEST_PLAINTEXT_OVERFLOW_OK      0
19 #define TEST_PLAINTEXT_OVERFLOW_NOT_OK  1
20 #define TEST_ENCRYPTED_OVERFLOW_TLS1_3_OK       2
21 #define TEST_ENCRYPTED_OVERFLOW_TLS1_3_NOT_OK   3
22 #define TEST_ENCRYPTED_OVERFLOW_TLS1_2_OK       4
23 #define TEST_ENCRYPTED_OVERFLOW_TLS1_2_NOT_OK   5
24 
25 #define TOTAL_RECORD_OVERFLOW_TESTS 6
26 
write_record(BIO * b,size_t len,int rectype,int recversion)27 static int write_record(BIO *b, size_t len, int rectype, int recversion)
28 {
29     unsigned char header[SSL3_RT_HEADER_LENGTH];
30     size_t written;
31     unsigned char buf[256];
32 
33     memset(buf, 0, sizeof(buf));
34 
35     header[0] = rectype;
36     header[1] = (recversion >> 8) & 0xff;
37     header[2] = recversion & 0xff;
38     header[3] = (len >> 8) & 0xff;
39     header[4] = len & 0xff;
40 
41     if (!BIO_write_ex(b, header, SSL3_RT_HEADER_LENGTH, &written)
42             || written != SSL3_RT_HEADER_LENGTH)
43         return 0;
44 
45     while (len > 0) {
46         size_t outlen;
47 
48         if (len > sizeof(buf))
49             outlen = sizeof(buf);
50         else
51             outlen = len;
52 
53         if (!BIO_write_ex(b, buf, outlen, &written)
54                 || written != outlen)
55             return 0;
56 
57         len -= outlen;
58     }
59 
60     return 1;
61 }
62 
fail_due_to_record_overflow(int enc)63 static int fail_due_to_record_overflow(int enc)
64 {
65     long err = ERR_peek_error();
66     int reason;
67 
68     if (enc)
69         reason = SSL_R_ENCRYPTED_LENGTH_TOO_LONG;
70     else
71         reason = SSL_R_DATA_LENGTH_TOO_LONG;
72 
73     if (ERR_GET_LIB(err) == ERR_LIB_SSL
74             && ERR_GET_REASON(err) == reason)
75         return 1;
76 
77     return 0;
78 }
79 
test_record_overflow(int idx)80 static int test_record_overflow(int idx)
81 {
82     SSL_CTX *cctx = NULL, *sctx = NULL;
83     SSL *clientssl = NULL, *serverssl = NULL;
84     int testresult = 0;
85     size_t len = 0;
86     size_t written;
87     int overf_expected;
88     unsigned char buf;
89     BIO *serverbio;
90     int recversion;
91 
92 #ifdef OPENSSL_NO_TLS1_2
93     if (idx == TEST_ENCRYPTED_OVERFLOW_TLS1_2_OK
94             || idx == TEST_ENCRYPTED_OVERFLOW_TLS1_2_NOT_OK)
95         return 1;
96 #endif
97 #if defined(OPENSSL_NO_TLS1_3) \
98     || (defined(OPENSSL_NO_EC) && defined(OPENSSL_NO_DH))
99     if (idx == TEST_ENCRYPTED_OVERFLOW_TLS1_3_OK
100             || idx == TEST_ENCRYPTED_OVERFLOW_TLS1_3_NOT_OK)
101         return 1;
102 #endif
103 
104     ERR_clear_error();
105 
106     if (!TEST_true(create_ssl_ctx_pair(NULL, TLS_server_method(),
107                                        TLS_client_method(),
108                                        TLS1_VERSION, 0,
109                                        &sctx, &cctx, cert, privkey)))
110         goto end;
111 
112     if (idx == TEST_ENCRYPTED_OVERFLOW_TLS1_2_OK
113             || idx == TEST_ENCRYPTED_OVERFLOW_TLS1_2_NOT_OK) {
114         len = SSL3_RT_MAX_ENCRYPTED_LENGTH;
115 #ifndef OPENSSL_NO_COMP
116         len -= SSL3_RT_MAX_COMPRESSED_OVERHEAD;
117 #endif
118         SSL_CTX_set_max_proto_version(sctx, TLS1_2_VERSION);
119     } else if (idx == TEST_ENCRYPTED_OVERFLOW_TLS1_3_OK
120                || idx == TEST_ENCRYPTED_OVERFLOW_TLS1_3_NOT_OK) {
121         len = SSL3_RT_MAX_TLS13_ENCRYPTED_LENGTH;
122     }
123 
124     if (!TEST_true(create_ssl_objects(sctx, cctx, &serverssl, &clientssl,
125                                       NULL, NULL)))
126         goto end;
127 
128     serverbio = SSL_get_rbio(serverssl);
129 
130     if (idx == TEST_PLAINTEXT_OVERFLOW_OK
131             || idx == TEST_PLAINTEXT_OVERFLOW_NOT_OK) {
132         len = SSL3_RT_MAX_PLAIN_LENGTH;
133 
134         if (idx == TEST_PLAINTEXT_OVERFLOW_NOT_OK)
135             len++;
136 
137         if (!TEST_true(write_record(serverbio, len,
138                                     SSL3_RT_HANDSHAKE, TLS1_VERSION)))
139             goto end;
140 
141         if (!TEST_int_le(SSL_accept(serverssl), 0))
142             goto end;
143 
144         overf_expected = (idx == TEST_PLAINTEXT_OVERFLOW_OK) ? 0 : 1;
145         if (!TEST_int_eq(fail_due_to_record_overflow(0), overf_expected))
146             goto end;
147 
148         goto success;
149     }
150 
151     if (!TEST_true(create_ssl_connection(serverssl, clientssl,
152                                          SSL_ERROR_NONE)))
153         goto end;
154 
155     if (idx == TEST_ENCRYPTED_OVERFLOW_TLS1_2_NOT_OK
156             || idx == TEST_ENCRYPTED_OVERFLOW_TLS1_3_NOT_OK) {
157         overf_expected = 1;
158         len++;
159     } else {
160         overf_expected = 0;
161     }
162 
163     recversion = TLS1_2_VERSION;
164 
165     if (!TEST_true(write_record(serverbio, len, SSL3_RT_APPLICATION_DATA,
166                                 recversion)))
167         goto end;
168 
169     if (!TEST_false(SSL_read_ex(serverssl, &buf, sizeof(buf), &written)))
170         goto end;
171 
172     if (!TEST_int_eq(fail_due_to_record_overflow(1), overf_expected))
173         goto end;
174 
175  success:
176     testresult = 1;
177 
178  end:
179     SSL_free(serverssl);
180     SSL_free(clientssl);
181     SSL_CTX_free(sctx);
182     SSL_CTX_free(cctx);
183     return testresult;
184 }
185 
186 OPT_TEST_DECLARE_USAGE("certfile privkeyfile\n")
187 
setup_tests(void)188 int setup_tests(void)
189 {
190     if (!test_skip_common_options()) {
191         TEST_error("Error parsing test options\n");
192         return 0;
193     }
194 
195     if (!TEST_ptr(cert = test_get_argument(0))
196             || !TEST_ptr(privkey = test_get_argument(1)))
197         return 0;
198 
199     ADD_ALL_TESTS(test_record_overflow, TOTAL_RECORD_OVERFLOW_TESTS);
200     return 1;
201 }
202 
cleanup_tests(void)203 void cleanup_tests(void)
204 {
205     bio_s_mempacket_test_free();
206 }
207