OLD | NEW |
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/ssl/ssl_cipher_suite_names.h" | 5 #include "net/ssl/ssl_cipher_suite_names.h" |
6 | 6 |
7 #include "base/macros.h" | 7 #include "base/macros.h" |
8 #include "base/strings/stringprintf.h" | 8 #include "base/strings/stringprintf.h" |
| 9 #include "net/ssl/ssl_connection_status_flags.h" |
9 #include "testing/gtest/include/gtest/gtest.h" | 10 #include "testing/gtest/include/gtest/gtest.h" |
10 | 11 |
11 namespace net { | 12 namespace net { |
12 | 13 |
13 namespace { | 14 namespace { |
14 | 15 |
| 16 int kObsoleteVersion = SSL_CONNECTION_VERSION_TLS1; |
| 17 int kModernVersion = SSL_CONNECTION_VERSION_TLS1_2; |
| 18 |
| 19 uint16_t kModernCipherSuite = |
| 20 0xc02f; /* TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 */ |
| 21 |
| 22 uint16_t kObsoleteCipherObsoleteKeyExchange = |
| 23 0x67; /* TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 */ |
| 24 uint16_t kObsoleteCipherModernKeyExchange = |
| 25 0x9e; /* TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 */ |
| 26 uint16_t kModernCipherObsoleteKeyExchange = |
| 27 0xc014; /* TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA */ |
| 28 uint16_t kModernCipherModernKeyExchange = |
| 29 0xc02f; /* TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 */ |
| 30 |
| 31 int MakeConnectionStatus(int version, uint16_t cipher_suite) { |
| 32 int connection_status = 0; |
| 33 |
| 34 SSLConnectionStatusSetVersion(version, &connection_status); |
| 35 SSLConnectionStatusSetCipherSuite(cipher_suite, &connection_status); |
| 36 |
| 37 return connection_status; |
| 38 } |
| 39 |
15 TEST(CipherSuiteNamesTest, Basic) { | 40 TEST(CipherSuiteNamesTest, Basic) { |
16 const char *key_exchange, *cipher, *mac; | 41 const char *key_exchange, *cipher, *mac; |
17 bool is_aead; | 42 bool is_aead; |
18 | 43 |
19 SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, 0xc001); | 44 SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, 0xc001); |
20 EXPECT_STREQ("ECDH_ECDSA", key_exchange); | 45 EXPECT_STREQ("ECDH_ECDSA", key_exchange); |
21 EXPECT_STREQ("NULL", cipher); | 46 EXPECT_STREQ("NULL", cipher); |
22 EXPECT_STREQ("HMAC-SHA1", mac); | 47 EXPECT_STREQ("HMAC-SHA1", mac); |
23 EXPECT_FALSE(is_aead); | 48 EXPECT_FALSE(is_aead); |
24 | 49 |
(...skipping 38 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
63 "0x004", | 88 "0x004", |
64 "0xBEEFY", | 89 "0xBEEFY", |
65 }; | 90 }; |
66 | 91 |
67 for (size_t i = 0; i < arraysize(cipher_strings); ++i) { | 92 for (size_t i = 0; i < arraysize(cipher_strings); ++i) { |
68 uint16_t cipher_suite = 0; | 93 uint16_t cipher_suite = 0; |
69 EXPECT_FALSE(ParseSSLCipherString(cipher_strings[i], &cipher_suite)); | 94 EXPECT_FALSE(ParseSSLCipherString(cipher_strings[i], &cipher_suite)); |
70 } | 95 } |
71 } | 96 } |
72 | 97 |
73 TEST(CipherSuiteNamesTest, SecureCipherSuites) { | 98 TEST(CipherSuiteNamesTest, ObsoleteSSLStatusProtocol) { |
74 // Picked some random cipher suites. | 99 // Obsolete |
75 EXPECT_FALSE(IsSecureTLSCipherSuite(0x0 /* TLS_NULL_WITH_NULL_NULL */)); | 100 EXPECT_EQ(OBSOLETE_SSL_MASK_PROTOCOL, |
76 EXPECT_FALSE( | 101 ObsoleteSSLStatus(MakeConnectionStatus(SSL_CONNECTION_VERSION_SSL2, |
77 IsSecureTLSCipherSuite(0x39 /* TLS_DHE_RSA_WITH_AES_256_CBC_SHA */)); | 102 kModernCipherSuite))); |
78 EXPECT_FALSE(IsSecureTLSCipherSuite( | 103 EXPECT_EQ(OBSOLETE_SSL_MASK_PROTOCOL, |
79 0xc5 /* TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA256 */)); | 104 ObsoleteSSLStatus(MakeConnectionStatus(SSL_CONNECTION_VERSION_SSL3, |
80 EXPECT_FALSE( | 105 kModernCipherSuite))); |
81 IsSecureTLSCipherSuite(0xc00f /* TLS_ECDH_RSA_WITH_AES_256_CBC_SHA */)); | 106 EXPECT_EQ(OBSOLETE_SSL_MASK_PROTOCOL, |
82 EXPECT_FALSE(IsSecureTLSCipherSuite( | 107 ObsoleteSSLStatus(MakeConnectionStatus(SSL_CONNECTION_VERSION_TLS1, |
83 0xc083 /* TLS_DH_DSS_WITH_CAMELLIA_256_GCM_SHA384 */)); | 108 kModernCipherSuite))); |
84 EXPECT_FALSE( | 109 EXPECT_EQ(OBSOLETE_SSL_MASK_PROTOCOL, |
85 IsSecureTLSCipherSuite(0x9e /* TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 */)); | 110 ObsoleteSSLStatus(MakeConnectionStatus( |
86 EXPECT_FALSE( | 111 SSL_CONNECTION_VERSION_TLS1_1, kModernCipherSuite))); |
87 IsSecureTLSCipherSuite(0xc014 /* TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA */)); | |
88 EXPECT_FALSE( | |
89 IsSecureTLSCipherSuite(0x9c /* TLS_RSA_WITH_AES_128_GCM_SHA256 */)); | |
90 | 112 |
91 // Non-existent cipher suite. | 113 // Modern |
92 EXPECT_FALSE(IsSecureTLSCipherSuite(0xffff)) << "Doesn't exist!"; | 114 EXPECT_EQ(OBSOLETE_SSL_NONE, |
| 115 ObsoleteSSLStatus(MakeConnectionStatus( |
| 116 SSL_CONNECTION_VERSION_TLS1_2, kModernCipherSuite))); |
| 117 EXPECT_EQ(OBSOLETE_SSL_NONE, |
| 118 ObsoleteSSLStatus(MakeConnectionStatus(SSL_CONNECTION_VERSION_QUIC, |
| 119 kModernCipherSuite))); |
| 120 } |
93 | 121 |
94 // Secure ones. | 122 TEST(CipherSuiteNamesTest, ObsoleteSSLStatusProtocolAndCipherSuite) { |
95 EXPECT_TRUE(IsSecureTLSCipherSuite( | 123 // Cartesian combos |
96 0xc02f /* TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 */)); | 124 // As above, some of these combinations can't happen in practice. |
97 EXPECT_TRUE(IsSecureTLSCipherSuite( | 125 EXPECT_EQ(OBSOLETE_SSL_MASK_PROTOCOL | OBSOLETE_SSL_MASK_KEY_EXCHANGE | |
98 0xcc13 /* ECDHE_RSA_WITH_CHACHA20_POLY1305 (non-standard) */)); | 126 OBSOLETE_SSL_MASK_CIPHER, |
99 EXPECT_TRUE(IsSecureTLSCipherSuite( | 127 ObsoleteSSLStatus(MakeConnectionStatus( |
100 0xcc14 /* ECDHE_ECDSA_WITH_CHACHA20_POLY1305 (non-standard) */)); | 128 kObsoleteVersion, kObsoleteCipherObsoleteKeyExchange))); |
101 EXPECT_TRUE(IsSecureTLSCipherSuite( | 129 EXPECT_EQ(OBSOLETE_SSL_MASK_PROTOCOL | OBSOLETE_SSL_MASK_KEY_EXCHANGE, |
102 0xcca8 /* ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 */)); | 130 ObsoleteSSLStatus(MakeConnectionStatus( |
103 EXPECT_TRUE(IsSecureTLSCipherSuite( | 131 kObsoleteVersion, kObsoleteCipherModernKeyExchange))); |
104 0xcca9 /* ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 */)); | 132 EXPECT_EQ(OBSOLETE_SSL_MASK_PROTOCOL | OBSOLETE_SSL_MASK_CIPHER, |
| 133 ObsoleteSSLStatus(MakeConnectionStatus( |
| 134 kObsoleteVersion, kModernCipherObsoleteKeyExchange))); |
| 135 EXPECT_EQ(OBSOLETE_SSL_MASK_PROTOCOL, |
| 136 ObsoleteSSLStatus(MakeConnectionStatus( |
| 137 kObsoleteVersion, kModernCipherModernKeyExchange))); |
| 138 EXPECT_EQ(OBSOLETE_SSL_MASK_KEY_EXCHANGE | OBSOLETE_SSL_MASK_CIPHER, |
| 139 ObsoleteSSLStatus(MakeConnectionStatus( |
| 140 kModernVersion, kObsoleteCipherObsoleteKeyExchange))); |
| 141 EXPECT_EQ(OBSOLETE_SSL_MASK_KEY_EXCHANGE, |
| 142 ObsoleteSSLStatus(MakeConnectionStatus( |
| 143 kModernVersion, kObsoleteCipherModernKeyExchange))); |
| 144 EXPECT_EQ(OBSOLETE_SSL_MASK_CIPHER, |
| 145 ObsoleteSSLStatus(MakeConnectionStatus( |
| 146 kModernVersion, kModernCipherObsoleteKeyExchange))); |
| 147 EXPECT_EQ(OBSOLETE_SSL_NONE, |
| 148 ObsoleteSSLStatus(MakeConnectionStatus( |
| 149 kModernVersion, kModernCipherModernKeyExchange))); |
105 } | 150 } |
106 | 151 |
107 TEST(CipherSuiteNamesTest, HTTP2CipherSuites) { | 152 TEST(CipherSuiteNamesTest, HTTP2CipherSuites) { |
108 // Picked some random cipher suites. | 153 // Picked some random cipher suites. |
109 EXPECT_FALSE( | 154 EXPECT_FALSE( |
110 IsTLSCipherSuiteAllowedByHTTP2(0x0 /* TLS_NULL_WITH_NULL_NULL */)); | 155 IsTLSCipherSuiteAllowedByHTTP2(0x0 /* TLS_NULL_WITH_NULL_NULL */)); |
111 EXPECT_FALSE(IsTLSCipherSuiteAllowedByHTTP2( | 156 EXPECT_FALSE(IsTLSCipherSuiteAllowedByHTTP2( |
112 0x39 /* TLS_DHE_RSA_WITH_AES_256_CBC_SHA */)); | 157 0x39 /* TLS_DHE_RSA_WITH_AES_256_CBC_SHA */)); |
113 EXPECT_FALSE(IsTLSCipherSuiteAllowedByHTTP2( | 158 EXPECT_FALSE(IsTLSCipherSuiteAllowedByHTTP2( |
114 0xc5 /* TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA256 */)); | 159 0xc5 /* TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA256 */)); |
(...skipping 30 matching lines...) Expand all Loading... |
145 0x16b8, // TLS_CECPQ1_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (non-standard) | 190 0x16b8, // TLS_CECPQ1_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (non-standard) |
146 0x16b9, // TLS_CECPQ1_RSA_WITH_AES_256_GCM_SHA384 (non-standard) | 191 0x16b9, // TLS_CECPQ1_RSA_WITH_AES_256_GCM_SHA384 (non-standard) |
147 0x16ba, // TLS_CECPQ1_ECDSA_WITH_AES_256_GCM_SHA384 (non-standard) | 192 0x16ba, // TLS_CECPQ1_ECDSA_WITH_AES_256_GCM_SHA384 (non-standard) |
148 }; | 193 }; |
149 const char *key_exchange, *cipher, *mac; | 194 const char *key_exchange, *cipher, *mac; |
150 bool is_aead; | 195 bool is_aead; |
151 | 196 |
152 for (const uint16_t cipher_suite_id : kCECPQ1CipherSuites) { | 197 for (const uint16_t cipher_suite_id : kCECPQ1CipherSuites) { |
153 SCOPED_TRACE(base::StringPrintf("cipher suite %x", cipher_suite_id)); | 198 SCOPED_TRACE(base::StringPrintf("cipher suite %x", cipher_suite_id)); |
154 EXPECT_TRUE(IsTLSCipherSuiteAllowedByHTTP2(cipher_suite_id)); | 199 EXPECT_TRUE(IsTLSCipherSuiteAllowedByHTTP2(cipher_suite_id)); |
155 EXPECT_TRUE(IsSecureTLSCipherSuite(cipher_suite_id)); | 200 |
| 201 int connection_status = |
| 202 MakeConnectionStatus(kModernVersion, cipher_suite_id); |
| 203 EXPECT_EQ(OBSOLETE_SSL_NONE, ObsoleteSSLStatus(connection_status)); |
156 SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, | 204 SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, |
157 cipher_suite_id); | 205 cipher_suite_id); |
158 EXPECT_TRUE(is_aead); | 206 EXPECT_TRUE(is_aead); |
159 EXPECT_EQ(nullptr, mac); | 207 EXPECT_EQ(nullptr, mac); |
160 } | 208 } |
161 | 209 |
162 SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, 0x16b7); | 210 SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, 0x16b7); |
163 EXPECT_STREQ("CECPQ1_RSA", key_exchange); | 211 EXPECT_STREQ("CECPQ1_RSA", key_exchange); |
164 EXPECT_STREQ("CHACHA20_POLY1305", cipher); | 212 EXPECT_STREQ("CHACHA20_POLY1305", cipher); |
165 | 213 |
166 SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, 0x16b8); | 214 SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, 0x16b8); |
167 EXPECT_STREQ("CECPQ1_ECDSA", key_exchange); | 215 EXPECT_STREQ("CECPQ1_ECDSA", key_exchange); |
168 EXPECT_STREQ("CHACHA20_POLY1305", cipher); | 216 EXPECT_STREQ("CHACHA20_POLY1305", cipher); |
169 | 217 |
170 SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, 0x16b9); | 218 SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, 0x16b9); |
171 EXPECT_STREQ("CECPQ1_RSA", key_exchange); | 219 EXPECT_STREQ("CECPQ1_RSA", key_exchange); |
172 EXPECT_STREQ("AES_256_GCM", cipher); | 220 EXPECT_STREQ("AES_256_GCM", cipher); |
173 | 221 |
174 SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, 0x16ba); | 222 SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, 0x16ba); |
175 EXPECT_STREQ("CECPQ1_ECDSA", key_exchange); | 223 EXPECT_STREQ("CECPQ1_ECDSA", key_exchange); |
176 EXPECT_STREQ("AES_256_GCM", cipher); | 224 EXPECT_STREQ("AES_256_GCM", cipher); |
177 } | 225 } |
178 | 226 |
179 } // anonymous namespace | 227 } // anonymous namespace |
180 | 228 |
181 } // namespace net | 229 } // namespace net |
OLD | NEW |