2013-02-06 15:27:05 +01:00
|
|
|
/*
|
2014-03-30 12:09:21 +02:00
|
|
|
* nghttp2 - HTTP/2 C Library
|
2013-02-06 15:27:05 +01:00
|
|
|
*
|
|
|
|
* Copyright (c) 2013 Tatsuhiro Tsujikawa
|
|
|
|
*
|
|
|
|
* Permission is hereby granted, free of charge, to any person obtaining
|
|
|
|
* a copy of this software and associated documentation files (the
|
|
|
|
* "Software"), to deal in the Software without restriction, including
|
|
|
|
* without limitation the rights to use, copy, modify, merge, publish,
|
|
|
|
* distribute, sublicense, and/or sell copies of the Software, and to
|
|
|
|
* permit persons to whom the Software is furnished to do so, subject to
|
|
|
|
* the following conditions:
|
|
|
|
*
|
|
|
|
* The above copyright notice and this permission notice shall be
|
|
|
|
* included in all copies or substantial portions of the Software.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
|
|
|
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
|
|
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
|
|
|
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
|
|
|
|
* LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
|
|
|
|
* OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
|
|
|
|
* WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
|
|
*/
|
|
|
|
#include "shrpx_ssl_test.h"
|
|
|
|
|
|
|
|
#include <CUnit/CUnit.h>
|
|
|
|
|
|
|
|
#include "shrpx_ssl.h"
|
2014-08-27 17:45:12 +02:00
|
|
|
#include "util.h"
|
2015-02-02 14:47:12 +01:00
|
|
|
#include "template.h"
|
2014-08-27 17:45:12 +02:00
|
|
|
|
|
|
|
using namespace nghttp2;
|
2013-02-06 15:27:05 +01:00
|
|
|
|
|
|
|
namespace shrpx {
|
|
|
|
|
2014-11-27 15:39:04 +01:00
|
|
|
void test_shrpx_ssl_create_lookup_tree(void) {
|
2015-02-02 14:47:12 +01:00
|
|
|
auto tree = make_unique<ssl::CertLookupTree>();
|
2013-02-13 16:28:55 +01:00
|
|
|
|
2016-03-24 15:16:20 +01:00
|
|
|
constexpr StringRef hostnames[] = {
|
2016-06-24 17:28:15 +02:00
|
|
|
StringRef::from_lit("example.com"), // 0
|
|
|
|
StringRef::from_lit("www.example.org"), // 1
|
|
|
|
StringRef::from_lit("*www.example.org"), // 2
|
|
|
|
StringRef::from_lit("xy*.host.domain"), // 3
|
|
|
|
StringRef::from_lit("*yy.host.domain"), // 4
|
|
|
|
StringRef::from_lit("nghttp2.sourceforge.net"), // 5
|
|
|
|
StringRef::from_lit("sourceforge.net"), // 6
|
|
|
|
StringRef::from_lit("sourceforge.net"), // 7, duplicate
|
|
|
|
StringRef::from_lit("*.foo.bar"), // 8, oo.bar is suffix of *.foo.bar
|
|
|
|
StringRef::from_lit("oo.bar") // 9
|
|
|
|
};
|
|
|
|
auto num = array_size(hostnames);
|
|
|
|
|
|
|
|
for (size_t idx = 0; idx < num; ++idx) {
|
|
|
|
tree->add_cert(hostnames[idx], idx);
|
2013-02-06 15:27:05 +01:00
|
|
|
}
|
|
|
|
|
2016-06-24 17:28:15 +02:00
|
|
|
tree->dump();
|
|
|
|
|
|
|
|
CU_ASSERT(0 == tree->lookup(hostnames[0]));
|
|
|
|
CU_ASSERT(1 == tree->lookup(hostnames[1]));
|
|
|
|
CU_ASSERT(2 == tree->lookup(StringRef::from_lit("2www.example.org")));
|
|
|
|
CU_ASSERT(-1 == tree->lookup(StringRef::from_lit("www2.example.org")));
|
|
|
|
CU_ASSERT(3 == tree->lookup(StringRef::from_lit("xy1.host.domain")));
|
2013-02-06 15:27:05 +01:00
|
|
|
// Does not match *yy.host.domain, because * must match at least 1
|
|
|
|
// character.
|
2016-06-24 17:28:15 +02:00
|
|
|
CU_ASSERT(-1 == tree->lookup(StringRef::from_lit("yy.host.domain")));
|
|
|
|
CU_ASSERT(4 == tree->lookup(StringRef::from_lit("xyy.host.domain")));
|
|
|
|
CU_ASSERT(-1 == tree->lookup(StringRef{}));
|
|
|
|
CU_ASSERT(5 == tree->lookup(hostnames[5]));
|
|
|
|
CU_ASSERT(6 == tree->lookup(hostnames[6]));
|
2016-03-24 15:16:20 +01:00
|
|
|
constexpr char h6[] = "pdylay.sourceforge.net";
|
2014-11-27 15:39:04 +01:00
|
|
|
for (int i = 0; i < 7; ++i) {
|
2016-06-24 17:28:15 +02:00
|
|
|
CU_ASSERT(-1 == tree->lookup(StringRef{h6 + i, str_size(h6) - i}));
|
2013-02-06 15:27:05 +01:00
|
|
|
}
|
2016-06-24 17:28:15 +02:00
|
|
|
CU_ASSERT(8 == tree->lookup(StringRef::from_lit("x.foo.bar")));
|
|
|
|
CU_ASSERT(9 == tree->lookup(hostnames[9]));
|
2013-02-15 18:33:16 +01:00
|
|
|
|
2016-03-24 15:16:20 +01:00
|
|
|
constexpr StringRef names[] = {
|
2016-06-24 17:28:15 +02:00
|
|
|
StringRef::from_lit("rab"), // 1
|
|
|
|
StringRef::from_lit("zab"), // 2
|
|
|
|
StringRef::from_lit("zzub"), // 3
|
|
|
|
StringRef::from_lit("ab") // 4
|
|
|
|
};
|
|
|
|
num = array_size(names);
|
2015-02-02 14:47:12 +01:00
|
|
|
|
|
|
|
tree = make_unique<ssl::CertLookupTree>();
|
2016-06-24 17:28:15 +02:00
|
|
|
for (size_t idx = 0; idx < num; ++idx) {
|
|
|
|
tree->add_cert(names[idx], idx);
|
2013-02-15 18:33:16 +01:00
|
|
|
}
|
2016-03-24 15:16:20 +01:00
|
|
|
for (size_t i = 0; i < num; ++i) {
|
2016-06-25 16:57:26 +02:00
|
|
|
CU_ASSERT((ssize_t)i == tree->lookup(names[i]));
|
2013-02-15 18:33:16 +01:00
|
|
|
}
|
2016-06-24 17:28:15 +02:00
|
|
|
}
|
2015-02-02 14:47:12 +01:00
|
|
|
|
2016-06-24 17:28:15 +02:00
|
|
|
// We use cfssl to generate key pairs.
|
|
|
|
//
|
|
|
|
// CA self-signed key pairs generation:
|
|
|
|
//
|
|
|
|
// $ cfssl genkey -initca ca.nghttp2.org.csr.json | \
|
|
|
|
// cfssljson -bare ca.nghttp2.org
|
|
|
|
//
|
|
|
|
// Create CSR:
|
|
|
|
//
|
|
|
|
// $ cfssl genkey test.nghttp2.org.csr.json | cfssljson -bare test.nghttp2.org
|
|
|
|
// $ cfssl genkey test.example.com.csr.json | cfssljson -bare test.example.com
|
|
|
|
//
|
|
|
|
// Sign CSR:
|
|
|
|
//
|
|
|
|
// $ cfssl sign -ca ca.nghttp2.org.pem -ca-key ca.nghttp2.org-key.pem \
|
|
|
|
// -config=ca-config.json -profile=server test.nghttp2.org.csr | \
|
|
|
|
// cfssljson -bare test.nghttp2.org
|
|
|
|
//
|
|
|
|
// $ cfssl sign -ca ca.nghttp2.org.pem -ca-key ca.nghttp2.org-key.pem \
|
|
|
|
// -config=ca-config.json -profile=server test.example.com.csr | \
|
|
|
|
// cfssljson -bare test.example.com
|
|
|
|
//
|
|
|
|
void test_shrpx_ssl_cert_lookup_tree_add_cert_from_x509(void) {
|
2013-02-06 15:27:05 +01:00
|
|
|
int rv;
|
2016-06-24 17:28:15 +02:00
|
|
|
|
|
|
|
constexpr char nghttp2_certfile[] = NGHTTP2_SRC_DIR "/test.nghttp2.org.pem";
|
2016-06-25 16:35:12 +02:00
|
|
|
auto nghttp2_cert = ssl::load_certificate(nghttp2_certfile);
|
2016-06-24 17:28:15 +02:00
|
|
|
auto nghttp2_cert_deleter = defer(X509_free, nghttp2_cert);
|
|
|
|
|
|
|
|
constexpr char examples_certfile[] = NGHTTP2_SRC_DIR "/test.example.com.pem";
|
2016-06-25 16:35:12 +02:00
|
|
|
auto examples_cert = ssl::load_certificate(examples_certfile);
|
2016-06-24 17:28:15 +02:00
|
|
|
auto examples_cert_deleter = defer(X509_free, examples_cert);
|
|
|
|
|
2015-02-02 14:47:12 +01:00
|
|
|
ssl::CertLookupTree tree;
|
2016-06-24 17:28:15 +02:00
|
|
|
|
|
|
|
rv = ssl::cert_lookup_tree_add_cert_from_x509(&tree, 0, nghttp2_cert);
|
|
|
|
|
|
|
|
CU_ASSERT(0 == rv);
|
|
|
|
|
|
|
|
rv = ssl::cert_lookup_tree_add_cert_from_x509(&tree, 1, examples_cert);
|
|
|
|
|
2013-02-06 15:27:05 +01:00
|
|
|
CU_ASSERT(0 == rv);
|
2015-02-02 14:47:12 +01:00
|
|
|
|
2016-06-24 17:28:15 +02:00
|
|
|
CU_ASSERT(-1 == tree.lookup(StringRef::from_lit("not-used.nghttp2.org")));
|
|
|
|
CU_ASSERT(0 == tree.lookup(StringRef::from_lit("test.nghttp2.org")));
|
|
|
|
CU_ASSERT(0 == tree.lookup(StringRef::from_lit("w.test.nghttp2.org")));
|
|
|
|
CU_ASSERT(0 == tree.lookup(StringRef::from_lit("www.test.nghttp2.org")));
|
|
|
|
CU_ASSERT(1 == tree.lookup(StringRef::from_lit("test.example.com")));
|
2013-02-06 15:27:05 +01:00
|
|
|
}
|
|
|
|
|
2016-01-16 15:54:21 +01:00
|
|
|
template <size_t N, size_t M>
|
|
|
|
bool tls_hostname_match_wrapper(const char(&pattern)[N],
|
|
|
|
const char(&hostname)[M]) {
|
2016-03-24 15:16:20 +01:00
|
|
|
return ssl::tls_hostname_match(StringRef{pattern, N}, StringRef{hostname, M});
|
2016-01-16 15:54:21 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
void test_shrpx_ssl_tls_hostname_match(void) {
|
|
|
|
CU_ASSERT(tls_hostname_match_wrapper("example.com", "example.com"));
|
|
|
|
CU_ASSERT(tls_hostname_match_wrapper("example.com", "EXAMPLE.com"));
|
|
|
|
|
|
|
|
// check wildcard
|
|
|
|
CU_ASSERT(tls_hostname_match_wrapper("*.example.com", "www.example.com"));
|
|
|
|
CU_ASSERT(tls_hostname_match_wrapper("*w.example.com", "www.example.com"));
|
|
|
|
CU_ASSERT(tls_hostname_match_wrapper("www*.example.com", "www1.example.com"));
|
|
|
|
CU_ASSERT(
|
|
|
|
tls_hostname_match_wrapper("www*.example.com", "WWW12.EXAMPLE.com"));
|
|
|
|
// at least 2 dots are required after '*'
|
|
|
|
CU_ASSERT(!tls_hostname_match_wrapper("*.com", "example.com"));
|
|
|
|
CU_ASSERT(!tls_hostname_match_wrapper("*", "example.com"));
|
|
|
|
// '*' must be in left most label
|
|
|
|
CU_ASSERT(
|
|
|
|
!tls_hostname_match_wrapper("blog.*.example.com", "blog.my.example.com"));
|
|
|
|
// prefix is wrong
|
|
|
|
CU_ASSERT(
|
|
|
|
!tls_hostname_match_wrapper("client*.example.com", "server.example.com"));
|
|
|
|
// '*' must match at least one character
|
|
|
|
CU_ASSERT(!tls_hostname_match_wrapper("www*.example.com", "www.example.com"));
|
|
|
|
|
|
|
|
CU_ASSERT(!tls_hostname_match_wrapper("example.com", "nghttp2.org"));
|
|
|
|
CU_ASSERT(!tls_hostname_match_wrapper("www.example.com", "example.com"));
|
|
|
|
CU_ASSERT(!tls_hostname_match_wrapper("example.com", "www.example.com"));
|
|
|
|
}
|
|
|
|
|
2013-02-06 15:27:05 +01:00
|
|
|
} // namespace shrpx
|