mirror of https://github.com/openssl/openssl.git
				
				
				
			
		
			
				
	
	
		
			141 lines
		
	
	
		
			5.4 KiB
		
	
	
	
		
			C
		
	
	
	
			
		
		
	
	
			141 lines
		
	
	
		
			5.4 KiB
		
	
	
	
		
			C
		
	
	
	
/*
 | 
						|
 * Copyright 2018-2023 The OpenSSL Project Authors. All Rights Reserved.
 | 
						|
 *
 | 
						|
 * Licensed under the Apache License 2.0 (the "License").  You may not use
 | 
						|
 * this file except in compliance with the License.  You can obtain a copy
 | 
						|
 * in the file LICENSE in the source distribution or at
 | 
						|
 * https://www.openssl.org/source/license.html
 | 
						|
 */
 | 
						|
 | 
						|
#include "testutil.h"
 | 
						|
#include <openssl/ssl.h>
 | 
						|
 | 
						|
typedef struct {
 | 
						|
    int proto;
 | 
						|
    int min_version;
 | 
						|
    int max_version;
 | 
						|
    int min_ok;
 | 
						|
    int max_ok;
 | 
						|
    int expected_min;
 | 
						|
    int expected_max;
 | 
						|
} version_test;
 | 
						|
 | 
						|
#define PROTO_TLS  0
 | 
						|
#define PROTO_DTLS 1
 | 
						|
#define PROTO_QUIC 2
 | 
						|
 | 
						|
/*
 | 
						|
 * If a version is valid for *any* protocol then setting the min/max protocol is
 | 
						|
 * expected to return success, even if that version is not valid for *this*
 | 
						|
 * protocol. However it only has an effect if it is valid for *this* protocol -
 | 
						|
 * otherwise it is ignored.
 | 
						|
 */
 | 
						|
static const version_test version_testdata[] = {
 | 
						|
    /* proto     min                     max                     ok    expected min        expected max */
 | 
						|
    {PROTO_TLS,  0,                      0,                      1, 1, 0,                  0},
 | 
						|
    {PROTO_TLS,  SSL3_VERSION,           TLS1_3_VERSION,         1, 1, SSL3_VERSION,       TLS1_3_VERSION},
 | 
						|
    {PROTO_TLS,  TLS1_VERSION,           TLS1_3_VERSION,         1, 1, TLS1_VERSION,       TLS1_3_VERSION},
 | 
						|
    {PROTO_TLS,  TLS1_VERSION,           TLS1_2_VERSION,         1, 1, TLS1_VERSION,       TLS1_2_VERSION},
 | 
						|
    {PROTO_TLS,  TLS1_2_VERSION,         TLS1_2_VERSION,         1, 1, TLS1_2_VERSION,     TLS1_2_VERSION},
 | 
						|
    {PROTO_TLS,  TLS1_2_VERSION,         TLS1_1_VERSION,         1, 1, TLS1_2_VERSION,     TLS1_1_VERSION},
 | 
						|
    {PROTO_TLS,  SSL3_VERSION - 1,       TLS1_3_VERSION,         0, 1, 0,                  TLS1_3_VERSION},
 | 
						|
    {PROTO_TLS,  SSL3_VERSION,           TLS1_3_VERSION + 1,     1, 0, SSL3_VERSION,       0},
 | 
						|
#ifndef OPENSSL_NO_DTLS
 | 
						|
    {PROTO_TLS,  DTLS1_VERSION,          DTLS1_2_VERSION,        1, 1, 0,                  0},
 | 
						|
#endif
 | 
						|
    {PROTO_TLS,  OSSL_QUIC1_VERSION,     OSSL_QUIC1_VERSION,     0, 0, 0,                  0},
 | 
						|
    {PROTO_TLS,  7,                      42,                     0, 0, 0,                  0},
 | 
						|
    {PROTO_DTLS, 0,                      0,                      1, 1, 0,                  0},
 | 
						|
    {PROTO_DTLS, DTLS1_VERSION,          DTLS1_2_VERSION,        1, 1, DTLS1_VERSION,      DTLS1_2_VERSION},
 | 
						|
#ifndef OPENSSL_NO_DTLS1_2
 | 
						|
    {PROTO_DTLS, DTLS1_2_VERSION,        DTLS1_2_VERSION,        1, 1, DTLS1_2_VERSION,    DTLS1_2_VERSION},
 | 
						|
#endif
 | 
						|
#ifndef OPENSSL_NO_DTLS1
 | 
						|
    {PROTO_DTLS, DTLS1_VERSION,          DTLS1_VERSION,          1, 1, DTLS1_VERSION,      DTLS1_VERSION},
 | 
						|
#endif
 | 
						|
#if !defined(OPENSSL_NO_DTLS1) && !defined(OPENSSL_NO_DTLS1_2)
 | 
						|
    {PROTO_DTLS, DTLS1_2_VERSION,        DTLS1_VERSION,          1, 1, DTLS1_2_VERSION,    DTLS1_VERSION},
 | 
						|
#endif
 | 
						|
    {PROTO_DTLS, DTLS1_VERSION + 1,      DTLS1_2_VERSION,        0, 1, 0,                  DTLS1_2_VERSION},
 | 
						|
    {PROTO_DTLS, DTLS1_VERSION,          DTLS1_2_VERSION - 1,    1, 0, DTLS1_VERSION,      0},
 | 
						|
    {PROTO_DTLS, TLS1_VERSION,           TLS1_3_VERSION,         1, 1, 0,                  0},
 | 
						|
    {PROTO_DTLS, OSSL_QUIC1_VERSION,     OSSL_QUIC1_VERSION,     0, 0, 0,                  0},
 | 
						|
    /* These functions never have an effect when called on a QUIC object */
 | 
						|
    {PROTO_QUIC, 0,                      0,                      1, 1, 0,                  0},
 | 
						|
    {PROTO_QUIC, OSSL_QUIC1_VERSION,     OSSL_QUIC1_VERSION,     0, 0, 0,                  0},
 | 
						|
    {PROTO_QUIC, OSSL_QUIC1_VERSION,     OSSL_QUIC1_VERSION + 1, 0, 0, 0,                  0},
 | 
						|
    {PROTO_QUIC, TLS1_VERSION,           TLS1_3_VERSION,         1, 1, 0,                  0},
 | 
						|
#ifndef OPENSSL_NO_DTLS
 | 
						|
    {PROTO_QUIC, DTLS1_VERSION,          DTLS1_2_VERSION,        1, 1, 0,                  0},
 | 
						|
#endif
 | 
						|
};
 | 
						|
 | 
						|
static int test_set_min_max_version(int idx_tst)
 | 
						|
{
 | 
						|
    SSL_CTX *ctx = NULL;
 | 
						|
    SSL *ssl = NULL;
 | 
						|
    int testresult = 0;
 | 
						|
    version_test t = version_testdata[idx_tst];
 | 
						|
    const SSL_METHOD *meth = NULL;
 | 
						|
 | 
						|
    switch (t.proto) {
 | 
						|
    case PROTO_TLS:
 | 
						|
        meth = TLS_client_method();
 | 
						|
        break;
 | 
						|
 | 
						|
#ifndef OPENSSL_NO_DTLS
 | 
						|
    case PROTO_DTLS:
 | 
						|
        meth = DTLS_client_method();
 | 
						|
        break;
 | 
						|
#endif
 | 
						|
 | 
						|
#ifndef OPENSSL_NO_QUIC
 | 
						|
    case PROTO_QUIC:
 | 
						|
        meth = OSSL_QUIC_client_method();
 | 
						|
        break;
 | 
						|
#endif
 | 
						|
    }
 | 
						|
 | 
						|
    if (meth == NULL)
 | 
						|
        return TEST_skip("Protocol not supported");
 | 
						|
 | 
						|
    ctx = SSL_CTX_new(meth);
 | 
						|
    if (ctx == NULL)
 | 
						|
        goto end;
 | 
						|
 | 
						|
    ssl = SSL_new(ctx);
 | 
						|
    if (ssl == NULL)
 | 
						|
        goto end;
 | 
						|
 | 
						|
    if (!TEST_int_eq(SSL_CTX_set_min_proto_version(ctx, t.min_version), t.min_ok))
 | 
						|
        goto end;
 | 
						|
    if (!TEST_int_eq(SSL_CTX_set_max_proto_version(ctx, t.max_version), t.max_ok))
 | 
						|
        goto end;
 | 
						|
    if (!TEST_int_eq(SSL_CTX_get_min_proto_version(ctx), t.expected_min))
 | 
						|
        goto end;
 | 
						|
    if (!TEST_int_eq(SSL_CTX_get_max_proto_version(ctx), t.expected_max))
 | 
						|
        goto end;
 | 
						|
 | 
						|
    if (!TEST_int_eq(SSL_set_min_proto_version(ssl, t.min_version), t.min_ok))
 | 
						|
        goto end;
 | 
						|
    if (!TEST_int_eq(SSL_set_max_proto_version(ssl, t.max_version), t.max_ok))
 | 
						|
        goto end;
 | 
						|
    if (!TEST_int_eq(SSL_get_min_proto_version(ssl), t.expected_min))
 | 
						|
        goto end;
 | 
						|
    if (!TEST_int_eq(SSL_get_max_proto_version(ssl), t.expected_max))
 | 
						|
        goto end;
 | 
						|
 | 
						|
    testresult = 1;
 | 
						|
 | 
						|
  end:
 | 
						|
    SSL_free(ssl);
 | 
						|
    SSL_CTX_free(ctx);
 | 
						|
    return testresult;
 | 
						|
}
 | 
						|
 | 
						|
int setup_tests(void)
 | 
						|
{
 | 
						|
    ADD_ALL_TESTS(test_set_min_max_version, sizeof(version_testdata) / sizeof(version_test));
 | 
						|
    return 1;
 | 
						|
}
 |