1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99
|
/*
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
*
* Licensed under the Apache License, Version 2.0 (the "License").
* You may not use this file except in compliance with the License.
* A copy of the License is located at
*
* http://aws.amazon.com/apache2.0
*
* or in the "license" file accompanying this file. This file is distributed
* on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either
* express or implied. See the License for the specific language governing
* permissions and limitations under the License.
*/
#include "s2n_test.h"
#include "testlib/s2n_testlib.h"
#include "tls/extensions/s2n_cert_status_response.h"
const uint8_t ocsp_data[] = "OCSP DATA";
int s2n_test_enable_sending_extension(struct s2n_connection *conn, struct s2n_cert_chain_and_key *chain_and_key)
{
conn->mode = S2N_SERVER;
conn->status_type = S2N_STATUS_REQUEST_OCSP;
conn->handshake_params.our_chain_and_key = chain_and_key;
EXPECT_SUCCESS(s2n_cert_chain_and_key_set_ocsp_data(chain_and_key, ocsp_data, s2n_array_len(ocsp_data)));
return S2N_SUCCESS;
}
int main(int argc, char **argv)
{
BEGIN_TEST();
EXPECT_SUCCESS(s2n_disable_tls13_in_test());
DEFER_CLEANUP(struct s2n_cert_chain_and_key *chain_and_key = NULL, s2n_cert_chain_and_key_ptr_free);
EXPECT_SUCCESS(s2n_test_cert_chain_and_key_new(&chain_and_key,
S2N_DEFAULT_TEST_CERT_CHAIN, S2N_DEFAULT_TEST_PRIVATE_KEY));
/* should_send */
{
struct s2n_config *config;
EXPECT_NOT_NULL(config = s2n_config_new());
struct s2n_connection *conn;
EXPECT_NOT_NULL(conn = s2n_connection_new(S2N_CLIENT));
EXPECT_SUCCESS(s2n_connection_set_config(conn, config));
/* Don't send by default */
EXPECT_FALSE(s2n_cert_status_response_extension.should_send(conn));
/* Send if all prerequisites met */
EXPECT_SUCCESS(s2n_test_enable_sending_extension(conn, chain_and_key));
EXPECT_TRUE(s2n_cert_status_response_extension.should_send(conn));
/* Don't send if client */
EXPECT_SUCCESS(s2n_test_enable_sending_extension(conn, chain_and_key));
conn->mode = S2N_CLIENT;
EXPECT_FALSE(s2n_cert_status_response_extension.should_send(conn));
/* Don't send if no status request configured */
EXPECT_SUCCESS(s2n_test_enable_sending_extension(conn, chain_and_key));
conn->status_type = S2N_STATUS_REQUEST_NONE;
EXPECT_FALSE(s2n_cert_status_response_extension.should_send(conn));
/* Don't send if no certificate set */
EXPECT_SUCCESS(s2n_test_enable_sending_extension(conn, chain_and_key));
conn->handshake_params.our_chain_and_key = NULL;
EXPECT_FALSE(s2n_cert_status_response_extension.should_send(conn));
/* Don't send if no ocsp data */
EXPECT_SUCCESS(s2n_test_enable_sending_extension(conn, chain_and_key));
EXPECT_SUCCESS(s2n_free(&conn->handshake_params.our_chain_and_key->ocsp_status));
EXPECT_FALSE(s2n_cert_status_response_extension.should_send(conn));
EXPECT_SUCCESS(s2n_connection_free(conn));
EXPECT_SUCCESS(s2n_config_free(config));
};
/* Set oscp data */
EXPECT_SUCCESS(s2n_cert_chain_and_key_set_ocsp_data(chain_and_key, ocsp_data, s2n_array_len(ocsp_data)));
/* Test send and recv */
{
struct s2n_connection *conn;
EXPECT_NOT_NULL(conn = s2n_connection_new(S2N_SERVER));
EXPECT_SUCCESS(s2n_cert_status_response_extension.send(conn, NULL));
EXPECT_EQUAL(conn->status_type, S2N_STATUS_REQUEST_NONE);
EXPECT_SUCCESS(s2n_cert_status_response_extension.recv(conn, NULL));
EXPECT_EQUAL(conn->status_type, S2N_STATUS_REQUEST_OCSP);
EXPECT_SUCCESS(s2n_connection_free(conn));
};
END_TEST();
return 0;
}
|