2015-05-27 09:18:54 +00:00
|
|
|
import cStringIO
|
|
|
|
import Queue
|
|
|
|
import time
|
|
|
|
import socket
|
|
|
|
import random
|
2015-02-27 21:02:52 +00:00
|
|
|
import os
|
2015-04-08 22:57:37 +00:00
|
|
|
import threading
|
2013-01-26 08:19:35 +00:00
|
|
|
import mock
|
2015-05-29 15:04:12 +00:00
|
|
|
|
2014-03-02 03:47:10 +00:00
|
|
|
from OpenSSL import SSL
|
2015-05-29 15:04:12 +00:00
|
|
|
import OpenSSL
|
|
|
|
|
2015-06-26 11:26:35 +00:00
|
|
|
from netlib import tcp, certutils
|
2015-06-22 02:52:23 +00:00
|
|
|
from . import tutils, tservers
|
2012-06-18 21:42:32 +00:00
|
|
|
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2012-06-25 04:16:01 +00:00
|
|
|
class EchoHandler(tcp.BaseHandler):
|
2012-06-25 21:50:42 +00:00
|
|
|
sni = None
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2012-06-25 21:50:42 +00:00
|
|
|
def handle_sni(self, connection):
|
|
|
|
self.sni = connection.get_servername()
|
|
|
|
|
2012-06-18 21:42:32 +00:00
|
|
|
def handle(self):
|
|
|
|
v = self.rfile.readline()
|
2013-01-27 06:21:18 +00:00
|
|
|
self.wfile.write(v)
|
2012-06-18 21:42:32 +00:00
|
|
|
self.wfile.flush()
|
|
|
|
|
|
|
|
|
2013-08-21 10:42:30 +00:00
|
|
|
class ClientCipherListHandler(tcp.BaseHandler):
|
|
|
|
sni = None
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2013-08-21 10:42:30 +00:00
|
|
|
def handle(self):
|
2015-05-27 09:18:54 +00:00
|
|
|
self.wfile.write("%s" % self.connection.get_cipher_list())
|
2013-08-21 10:42:30 +00:00
|
|
|
self.wfile.flush()
|
|
|
|
|
|
|
|
|
2012-07-21 04:10:54 +00:00
|
|
|
class HangHandler(tcp.BaseHandler):
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2012-07-21 04:10:54 +00:00
|
|
|
def handle(self):
|
2015-05-27 09:18:54 +00:00
|
|
|
while True:
|
2012-07-21 04:10:54 +00:00
|
|
|
time.sleep(1)
|
|
|
|
|
|
|
|
|
2015-06-15 15:31:08 +00:00
|
|
|
class ALPNHandler(tcp.BaseHandler):
|
|
|
|
sni = None
|
|
|
|
|
|
|
|
def handle(self):
|
|
|
|
alp = self.get_alpn_proto_negotiated()
|
|
|
|
if alp:
|
|
|
|
self.wfile.write("%s" % alp)
|
|
|
|
else:
|
|
|
|
self.wfile.write("NONE")
|
|
|
|
self.wfile.flush()
|
|
|
|
|
|
|
|
|
2015-06-22 02:52:23 +00:00
|
|
|
class TestServer(tservers.ServerTestBase):
|
2013-01-25 03:03:59 +00:00
|
|
|
handler = EchoHandler
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2012-06-18 21:42:32 +00:00
|
|
|
def test_echo(self):
|
|
|
|
testval = "echo!\n"
|
2014-01-28 16:26:35 +00:00
|
|
|
c = tcp.TCPClient(("127.0.0.1", self.port))
|
2012-06-24 23:23:04 +00:00
|
|
|
c.connect()
|
2012-06-18 21:42:32 +00:00
|
|
|
c.wfile.write(testval)
|
|
|
|
c.wfile.flush()
|
|
|
|
assert c.rfile.readline() == testval
|
|
|
|
|
2015-04-08 22:57:37 +00:00
|
|
|
def test_thread_start_error(self):
|
|
|
|
with mock.patch.object(threading.Thread, "start", side_effect=threading.ThreadError("nonewthread")) as m:
|
|
|
|
c = tcp.TCPClient(("127.0.0.1", self.port))
|
|
|
|
c.connect()
|
|
|
|
assert not c.rfile.read(1)
|
|
|
|
assert m.called
|
|
|
|
assert "nonewthread" in self.q.get_nowait()
|
|
|
|
self.test_echo()
|
|
|
|
|
2012-06-24 23:00:39 +00:00
|
|
|
|
2015-06-22 02:52:23 +00:00
|
|
|
class TestServerBind(tservers.ServerTestBase):
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2014-03-10 04:29:27 +00:00
|
|
|
class handler(tcp.BaseHandler):
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2014-03-10 04:29:27 +00:00
|
|
|
def handle(self):
|
|
|
|
self.wfile.write(str(self.connection.getpeername()))
|
|
|
|
self.wfile.flush()
|
2013-12-13 23:19:24 +00:00
|
|
|
|
|
|
|
def test_bind(self):
|
|
|
|
""" Test to bind to a given random port. Try again if the random port turned out to be blocked. """
|
|
|
|
for i in range(20):
|
|
|
|
random_port = random.randrange(1024, 65535)
|
|
|
|
try:
|
2015-05-30 00:02:58 +00:00
|
|
|
c = tcp.TCPClient(
|
|
|
|
("127.0.0.1", self.port), source_address=(
|
|
|
|
"127.0.0.1", random_port))
|
2013-12-13 23:19:24 +00:00
|
|
|
c.connect()
|
|
|
|
assert c.rfile.readline() == str(("127.0.0.1", random_port))
|
|
|
|
return
|
2015-05-27 09:18:54 +00:00
|
|
|
except tcp.NetLibError: # port probably already in use
|
2013-12-13 23:19:24 +00:00
|
|
|
pass
|
|
|
|
|
|
|
|
|
2015-06-22 02:52:23 +00:00
|
|
|
class TestServerIPv6(tservers.ServerTestBase):
|
2013-12-13 14:04:38 +00:00
|
|
|
handler = EchoHandler
|
2014-01-28 16:26:35 +00:00
|
|
|
addr = tcp.Address(("localhost", 0), use_ipv6=True)
|
2013-12-13 14:04:38 +00:00
|
|
|
|
|
|
|
def test_echo(self):
|
|
|
|
testval = "echo!\n"
|
2014-01-28 16:26:35 +00:00
|
|
|
c = tcp.TCPClient(tcp.Address(("::1", self.port), use_ipv6=True))
|
2013-12-13 14:04:38 +00:00
|
|
|
c.connect()
|
|
|
|
c.wfile.write(testval)
|
|
|
|
c.wfile.flush()
|
|
|
|
assert c.rfile.readline() == testval
|
|
|
|
|
2013-01-27 06:21:18 +00:00
|
|
|
|
2015-06-22 02:52:23 +00:00
|
|
|
class TestEcho(tservers.ServerTestBase):
|
2013-01-25 03:03:59 +00:00
|
|
|
handler = EchoHandler
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2012-07-20 02:43:51 +00:00
|
|
|
def test_echo(self):
|
|
|
|
testval = "echo!\n"
|
2014-01-28 16:26:35 +00:00
|
|
|
c = tcp.TCPClient(("127.0.0.1", self.port))
|
2012-07-20 02:43:51 +00:00
|
|
|
c.connect()
|
|
|
|
c.wfile.write(testval)
|
|
|
|
c.wfile.flush()
|
|
|
|
assert c.rfile.readline() == testval
|
|
|
|
|
|
|
|
|
2014-03-10 16:43:39 +00:00
|
|
|
class HardDisconnectHandler(tcp.BaseHandler):
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2014-03-10 16:43:39 +00:00
|
|
|
def handle(self):
|
|
|
|
self.connection.close()
|
|
|
|
|
|
|
|
|
2015-06-22 02:52:23 +00:00
|
|
|
class TestFinishFail(tservers.ServerTestBase):
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2015-02-27 21:02:52 +00:00
|
|
|
"""
|
|
|
|
This tests a difficult-to-trigger exception in the .finish() method of
|
|
|
|
the handler.
|
|
|
|
"""
|
|
|
|
handler = EchoHandler
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2015-02-27 21:02:52 +00:00
|
|
|
def test_disconnect_in_finish(self):
|
|
|
|
c = tcp.TCPClient(("127.0.0.1", self.port))
|
|
|
|
c.connect()
|
|
|
|
c.wfile.write("foo\n")
|
|
|
|
c.wfile.flush = mock.Mock(side_effect=tcp.NetLibDisconnect)
|
|
|
|
c.finish()
|
|
|
|
|
|
|
|
|
2015-06-22 02:52:23 +00:00
|
|
|
class TestServerSSL(tservers.ServerTestBase):
|
2013-01-25 03:03:59 +00:00
|
|
|
handler = EchoHandler
|
|
|
|
ssl = dict(
|
2015-05-27 09:18:54 +00:00
|
|
|
cipher_list="AES256-SHA",
|
|
|
|
chain_file=tutils.test_data.path("data/server.crt")
|
|
|
|
)
|
|
|
|
|
2012-06-24 23:00:39 +00:00
|
|
|
def test_echo(self):
|
2014-01-28 16:26:35 +00:00
|
|
|
c = tcp.TCPClient(("127.0.0.1", self.port))
|
2012-06-24 23:23:04 +00:00
|
|
|
c.connect()
|
2014-09-08 22:08:56 +00:00
|
|
|
c.convert_to_ssl(sni="foo.com", options=SSL.OP_ALL)
|
2012-06-24 23:00:39 +00:00
|
|
|
testval = "echo!\n"
|
2012-06-18 21:42:32 +00:00
|
|
|
c.wfile.write(testval)
|
|
|
|
c.wfile.flush()
|
2012-06-24 23:00:39 +00:00
|
|
|
assert c.rfile.readline() == testval
|
2012-06-18 21:42:32 +00:00
|
|
|
|
2014-03-02 08:37:28 +00:00
|
|
|
def test_get_current_cipher(self):
|
|
|
|
c = tcp.TCPClient(("127.0.0.1", self.port))
|
|
|
|
c.connect()
|
|
|
|
assert not c.get_current_cipher()
|
|
|
|
c.convert_to_ssl(sni="foo.com")
|
|
|
|
ret = c.get_current_cipher()
|
|
|
|
assert ret
|
|
|
|
assert "AES" in ret[0]
|
|
|
|
|
2012-06-18 21:42:32 +00:00
|
|
|
|
2015-06-22 02:52:23 +00:00
|
|
|
class TestSSLv3Only(tservers.ServerTestBase):
|
2013-01-25 03:03:59 +00:00
|
|
|
handler = EchoHandler
|
|
|
|
ssl = dict(
|
2015-05-27 09:18:54 +00:00
|
|
|
request_client_cert=False,
|
|
|
|
v3_only=True
|
2013-01-25 03:03:59 +00:00
|
|
|
)
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2012-07-04 09:30:07 +00:00
|
|
|
def test_failure(self):
|
2014-01-28 16:26:35 +00:00
|
|
|
c = tcp.TCPClient(("127.0.0.1", self.port))
|
2012-07-04 09:30:07 +00:00
|
|
|
c.connect()
|
2015-02-27 21:02:52 +00:00
|
|
|
tutils.raises(tcp.NetLibError, c.convert_to_ssl, sni="foo.com")
|
2012-07-04 09:30:07 +00:00
|
|
|
|
|
|
|
|
2015-06-20 20:07:23 +00:00
|
|
|
class TestSSLUpstreamCertVerificationWBadServerCert(tservers.ServerTestBase):
|
2015-06-15 17:16:44 +00:00
|
|
|
handler = EchoHandler
|
|
|
|
|
|
|
|
ssl = dict(
|
2015-06-20 20:07:23 +00:00
|
|
|
cert=tutils.test_data.path("data/verificationcerts/untrusted.crt"),
|
|
|
|
key=tutils.test_data.path("data/verificationcerts/verification-server.key"))
|
2015-06-15 17:16:44 +00:00
|
|
|
|
2015-06-20 20:07:23 +00:00
|
|
|
def test_mode_default_should_pass(self):
|
2015-06-15 17:16:44 +00:00
|
|
|
c = tcp.TCPClient(("127.0.0.1", self.port))
|
|
|
|
c.connect()
|
|
|
|
|
|
|
|
c.convert_to_ssl()
|
|
|
|
|
2015-06-20 20:07:23 +00:00
|
|
|
# Verification errors should be saved even if connection isn't aborted
|
|
|
|
# aborted
|
|
|
|
assert c.ssl_verification_error is not None
|
|
|
|
|
2015-06-15 17:16:44 +00:00
|
|
|
testval = "echo!\n"
|
|
|
|
c.wfile.write(testval)
|
|
|
|
c.wfile.flush()
|
|
|
|
assert c.rfile.readline() == testval
|
|
|
|
|
2015-06-20 20:07:23 +00:00
|
|
|
def test_mode_none_should_pass(self):
|
2015-06-15 17:16:44 +00:00
|
|
|
c = tcp.TCPClient(("127.0.0.1", self.port))
|
|
|
|
c.connect()
|
|
|
|
|
|
|
|
c.convert_to_ssl(verify_options=SSL.VERIFY_NONE)
|
|
|
|
|
2015-06-20 20:07:23 +00:00
|
|
|
# Verification errors should be saved even if connection isn't aborted
|
|
|
|
assert c.ssl_verification_error is not None
|
|
|
|
|
2015-06-15 17:16:44 +00:00
|
|
|
testval = "echo!\n"
|
|
|
|
c.wfile.write(testval)
|
|
|
|
c.wfile.flush()
|
|
|
|
assert c.rfile.readline() == testval
|
|
|
|
|
2015-06-20 20:07:23 +00:00
|
|
|
def test_mode_strict_should_fail(self):
|
2015-06-15 17:16:44 +00:00
|
|
|
c = tcp.TCPClient(("127.0.0.1", self.port))
|
|
|
|
c.connect()
|
|
|
|
|
|
|
|
tutils.raises(
|
2015-07-24 14:47:28 +00:00
|
|
|
tcp.NetLibInvalidCertificateError,
|
2015-06-15 17:16:44 +00:00
|
|
|
c.convert_to_ssl,
|
2015-06-20 20:07:23 +00:00
|
|
|
verify_options=SSL.VERIFY_PEER,
|
|
|
|
ca_pemfile=tutils.test_data.path("data/verificationcerts/trusted.pem"))
|
|
|
|
|
|
|
|
assert c.ssl_verification_error is not None
|
|
|
|
|
|
|
|
# Unknown issuing certificate authority for first certificate
|
|
|
|
assert c.ssl_verification_error['errno'] == 20
|
|
|
|
assert c.ssl_verification_error['depth'] == 0
|
|
|
|
|
|
|
|
|
|
|
|
class TestSSLUpstreamCertVerificationWBadCertChain(tservers.ServerTestBase):
|
|
|
|
handler = EchoHandler
|
|
|
|
|
|
|
|
ssl = dict(
|
|
|
|
cert=tutils.test_data.path("data/verificationcerts/untrusted-chain.crt"),
|
|
|
|
key=tutils.test_data.path("data/verificationcerts/verification-server.key"))
|
|
|
|
|
|
|
|
def test_mode_strict_should_fail(self):
|
|
|
|
c = tcp.TCPClient(("127.0.0.1", self.port))
|
|
|
|
c.connect()
|
|
|
|
|
|
|
|
tutils.raises(
|
|
|
|
"certificate verify failed",
|
|
|
|
c.convert_to_ssl,
|
|
|
|
verify_options=SSL.VERIFY_PEER,
|
|
|
|
ca_pemfile=tutils.test_data.path("data/verificationcerts/trusted.pem"))
|
|
|
|
|
|
|
|
assert c.ssl_verification_error is not None
|
|
|
|
|
|
|
|
# Untrusted self-signed certificate at second position in certificate
|
|
|
|
# chain
|
|
|
|
assert c.ssl_verification_error['errno'] == 19
|
|
|
|
assert c.ssl_verification_error['depth'] == 1
|
2015-06-15 17:16:44 +00:00
|
|
|
|
2015-06-20 20:07:23 +00:00
|
|
|
|
|
|
|
class TestSSLUpstreamCertVerificationWValidCertChain(tservers.ServerTestBase):
|
|
|
|
handler = EchoHandler
|
|
|
|
|
|
|
|
ssl = dict(
|
|
|
|
cert=tutils.test_data.path("data/verificationcerts/trusted-chain.crt"),
|
|
|
|
key=tutils.test_data.path("data/verificationcerts/verification-server.key"))
|
|
|
|
|
|
|
|
def test_mode_strict_w_pemfile_should_pass(self):
|
|
|
|
c = tcp.TCPClient(("127.0.0.1", self.port))
|
|
|
|
c.connect()
|
|
|
|
|
|
|
|
c.convert_to_ssl(
|
|
|
|
verify_options=SSL.VERIFY_PEER,
|
|
|
|
ca_pemfile=tutils.test_data.path("data/verificationcerts/trusted.pem"))
|
|
|
|
|
|
|
|
assert c.ssl_verification_error is None
|
|
|
|
|
|
|
|
testval = "echo!\n"
|
|
|
|
c.wfile.write(testval)
|
|
|
|
c.wfile.flush()
|
|
|
|
assert c.rfile.readline() == testval
|
|
|
|
|
|
|
|
def test_mode_strict_w_cadir_should_pass(self):
|
2015-06-15 17:16:44 +00:00
|
|
|
c = tcp.TCPClient(("127.0.0.1", self.port))
|
|
|
|
c.connect()
|
|
|
|
|
|
|
|
c.convert_to_ssl(
|
2015-06-20 20:07:23 +00:00
|
|
|
verify_options=SSL.VERIFY_PEER,
|
|
|
|
ca_path=tutils.test_data.path("data/verificationcerts/"))
|
|
|
|
|
|
|
|
assert c.ssl_verification_error is None
|
2015-06-15 17:16:44 +00:00
|
|
|
|
|
|
|
testval = "echo!\n"
|
|
|
|
c.wfile.write(testval)
|
|
|
|
c.wfile.flush()
|
|
|
|
assert c.rfile.readline() == testval
|
|
|
|
|
|
|
|
|
2015-06-22 02:52:23 +00:00
|
|
|
class TestSSLClientCert(tservers.ServerTestBase):
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2014-03-10 04:29:27 +00:00
|
|
|
class handler(tcp.BaseHandler):
|
|
|
|
sni = None
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2014-03-10 04:29:27 +00:00
|
|
|
def handle_sni(self, connection):
|
|
|
|
self.sni = connection.get_servername()
|
|
|
|
|
|
|
|
def handle(self):
|
2015-05-27 09:18:54 +00:00
|
|
|
self.wfile.write("%s\n" % self.clientcert.serial)
|
2014-03-10 04:29:27 +00:00
|
|
|
self.wfile.flush()
|
2015-06-05 10:44:29 +00:00
|
|
|
|
2013-01-25 03:03:59 +00:00
|
|
|
ssl = dict(
|
2015-05-27 09:18:54 +00:00
|
|
|
request_client_cert=True,
|
|
|
|
v3_only=False
|
2013-01-25 03:03:59 +00:00
|
|
|
)
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2013-01-20 09:13:38 +00:00
|
|
|
def test_clientcert(self):
|
2014-01-28 16:26:35 +00:00
|
|
|
c = tcp.TCPClient(("127.0.0.1", self.port))
|
2013-01-20 09:13:38 +00:00
|
|
|
c.connect()
|
2015-05-30 00:02:58 +00:00
|
|
|
c.convert_to_ssl(
|
|
|
|
cert=tutils.test_data.path("data/clientcert/client.pem"))
|
2013-01-20 09:13:38 +00:00
|
|
|
assert c.rfile.readline().strip() == "1"
|
|
|
|
|
2013-01-20 09:36:54 +00:00
|
|
|
def test_clientcert_err(self):
|
2014-01-28 16:26:35 +00:00
|
|
|
c = tcp.TCPClient(("127.0.0.1", self.port))
|
2013-01-20 09:36:54 +00:00
|
|
|
c.connect()
|
|
|
|
tutils.raises(
|
|
|
|
tcp.NetLibError,
|
|
|
|
c.convert_to_ssl,
|
2013-02-24 02:36:15 +00:00
|
|
|
cert=tutils.test_data.path("data/clientcert/make")
|
2013-01-20 09:36:54 +00:00
|
|
|
)
|
|
|
|
|
2013-01-20 09:13:38 +00:00
|
|
|
|
2015-06-22 02:52:23 +00:00
|
|
|
class TestSNI(tservers.ServerTestBase):
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2014-03-10 04:29:27 +00:00
|
|
|
class handler(tcp.BaseHandler):
|
|
|
|
sni = None
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2014-03-10 04:29:27 +00:00
|
|
|
def handle_sni(self, connection):
|
|
|
|
self.sni = connection.get_servername()
|
|
|
|
|
|
|
|
def handle(self):
|
|
|
|
self.wfile.write(self.sni)
|
|
|
|
self.wfile.flush()
|
|
|
|
|
2015-06-05 10:44:29 +00:00
|
|
|
ssl = True
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2012-06-25 21:50:42 +00:00
|
|
|
def test_echo(self):
|
2014-01-28 16:26:35 +00:00
|
|
|
c = tcp.TCPClient(("127.0.0.1", self.port))
|
2012-06-25 21:50:42 +00:00
|
|
|
c.connect()
|
|
|
|
c.convert_to_ssl(sni="foo.com")
|
2014-02-05 20:34:14 +00:00
|
|
|
assert c.sni == "foo.com"
|
2012-06-25 21:50:42 +00:00
|
|
|
assert c.rfile.readline() == "foo.com"
|
|
|
|
|
|
|
|
|
2015-06-22 02:52:23 +00:00
|
|
|
class TestServerCipherList(tservers.ServerTestBase):
|
2013-08-21 10:42:30 +00:00
|
|
|
handler = ClientCipherListHandler
|
|
|
|
ssl = dict(
|
2015-05-27 09:18:54 +00:00
|
|
|
cipher_list='RC4-SHA'
|
2013-08-21 10:42:30 +00:00
|
|
|
)
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2013-08-21 10:42:30 +00:00
|
|
|
def test_echo(self):
|
2014-01-28 16:26:35 +00:00
|
|
|
c = tcp.TCPClient(("127.0.0.1", self.port))
|
2013-08-21 10:42:30 +00:00
|
|
|
c.connect()
|
|
|
|
c.convert_to_ssl(sni="foo.com")
|
|
|
|
assert c.rfile.readline() == "['RC4-SHA']"
|
|
|
|
|
|
|
|
|
2015-06-22 02:52:23 +00:00
|
|
|
class TestServerCurrentCipher(tservers.ServerTestBase):
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2014-03-10 04:29:27 +00:00
|
|
|
class handler(tcp.BaseHandler):
|
|
|
|
sni = None
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2014-03-10 04:29:27 +00:00
|
|
|
def handle(self):
|
2015-05-27 09:18:54 +00:00
|
|
|
self.wfile.write("%s" % str(self.get_current_cipher()))
|
2014-03-10 04:29:27 +00:00
|
|
|
self.wfile.flush()
|
2015-06-05 10:44:29 +00:00
|
|
|
|
2014-03-02 08:37:28 +00:00
|
|
|
ssl = dict(
|
2015-05-27 09:18:54 +00:00
|
|
|
cipher_list='RC4-SHA'
|
2014-03-02 08:37:28 +00:00
|
|
|
)
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2014-03-02 08:37:28 +00:00
|
|
|
def test_echo(self):
|
|
|
|
c = tcp.TCPClient(("127.0.0.1", self.port))
|
|
|
|
c.connect()
|
|
|
|
c.convert_to_ssl(sni="foo.com")
|
|
|
|
assert "RC4-SHA" in c.rfile.readline()
|
|
|
|
|
|
|
|
|
2015-06-22 02:52:23 +00:00
|
|
|
class TestServerCipherListError(tservers.ServerTestBase):
|
2014-02-27 05:35:16 +00:00
|
|
|
handler = ClientCipherListHandler
|
|
|
|
ssl = dict(
|
2015-05-27 09:18:54 +00:00
|
|
|
cipher_list='bogus'
|
2014-02-27 05:35:16 +00:00
|
|
|
)
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2014-02-27 05:35:16 +00:00
|
|
|
def test_echo(self):
|
|
|
|
c = tcp.TCPClient(("127.0.0.1", self.port))
|
|
|
|
c.connect()
|
|
|
|
tutils.raises("handshake error", c.convert_to_ssl, sni="foo.com")
|
|
|
|
|
|
|
|
|
2015-06-22 02:52:23 +00:00
|
|
|
class TestClientCipherListError(tservers.ServerTestBase):
|
2014-02-27 05:35:16 +00:00
|
|
|
handler = ClientCipherListHandler
|
|
|
|
ssl = dict(
|
2015-05-27 09:18:54 +00:00
|
|
|
cipher_list='RC4-SHA'
|
2014-02-27 05:35:16 +00:00
|
|
|
)
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2014-02-27 05:35:16 +00:00
|
|
|
def test_echo(self):
|
|
|
|
c = tcp.TCPClient(("127.0.0.1", self.port))
|
|
|
|
c.connect()
|
2015-05-30 00:02:58 +00:00
|
|
|
tutils.raises(
|
|
|
|
"cipher specification",
|
|
|
|
c.convert_to_ssl,
|
|
|
|
sni="foo.com",
|
|
|
|
cipher_list="bogus")
|
2014-02-27 05:35:16 +00:00
|
|
|
|
|
|
|
|
2015-06-22 02:52:23 +00:00
|
|
|
class TestSSLDisconnect(tservers.ServerTestBase):
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2014-03-10 04:29:27 +00:00
|
|
|
class handler(tcp.BaseHandler):
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2014-03-10 04:29:27 +00:00
|
|
|
def handle(self):
|
2014-10-23 13:31:42 +00:00
|
|
|
self.finish()
|
2015-06-05 10:44:29 +00:00
|
|
|
|
|
|
|
ssl = True
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2012-06-25 04:16:01 +00:00
|
|
|
def test_echo(self):
|
2014-01-28 16:26:35 +00:00
|
|
|
c = tcp.TCPClient(("127.0.0.1", self.port))
|
2012-06-25 04:16:01 +00:00
|
|
|
c.connect()
|
|
|
|
c.convert_to_ssl()
|
|
|
|
# Excercise SSL.ZeroReturnError
|
|
|
|
c.rfile.read(10)
|
2012-07-20 02:43:51 +00:00
|
|
|
c.close()
|
|
|
|
tutils.raises(tcp.NetLibDisconnect, c.wfile.write, "foo")
|
|
|
|
tutils.raises(Queue.Empty, self.q.get_nowait)
|
|
|
|
|
|
|
|
|
2015-06-22 02:52:23 +00:00
|
|
|
class TestSSLHardDisconnect(tservers.ServerTestBase):
|
2014-03-10 16:43:39 +00:00
|
|
|
handler = HardDisconnectHandler
|
2015-06-05 10:44:29 +00:00
|
|
|
ssl = True
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2014-03-10 16:43:39 +00:00
|
|
|
def test_echo(self):
|
|
|
|
c = tcp.TCPClient(("127.0.0.1", self.port))
|
|
|
|
c.connect()
|
|
|
|
c.convert_to_ssl()
|
|
|
|
# Exercise SSL.SysCallError
|
|
|
|
c.rfile.read(10)
|
|
|
|
c.close()
|
|
|
|
tutils.raises(tcp.NetLibDisconnect, c.wfile.write, "foo")
|
|
|
|
|
|
|
|
|
2015-06-22 02:52:23 +00:00
|
|
|
class TestDisconnect(tservers.ServerTestBase):
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2012-07-20 02:43:51 +00:00
|
|
|
def test_echo(self):
|
2014-01-28 16:26:35 +00:00
|
|
|
c = tcp.TCPClient(("127.0.0.1", self.port))
|
2012-07-20 02:43:51 +00:00
|
|
|
c.connect()
|
|
|
|
c.rfile.read(10)
|
|
|
|
c.wfile.write("foo")
|
|
|
|
c.close()
|
|
|
|
c.close()
|
2012-06-25 04:16:01 +00:00
|
|
|
|
|
|
|
|
2015-06-22 02:52:23 +00:00
|
|
|
class TestServerTimeOut(tservers.ServerTestBase):
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2014-03-10 04:29:27 +00:00
|
|
|
class handler(tcp.BaseHandler):
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2014-03-10 04:29:27 +00:00
|
|
|
def handle(self):
|
|
|
|
self.timeout = False
|
|
|
|
self.settimeout(0.01)
|
|
|
|
try:
|
|
|
|
self.rfile.read(10)
|
|
|
|
except tcp.NetLibTimeout:
|
|
|
|
self.timeout = True
|
|
|
|
|
2012-09-30 22:30:02 +00:00
|
|
|
def test_timeout(self):
|
2014-01-28 16:26:35 +00:00
|
|
|
c = tcp.TCPClient(("127.0.0.1", self.port))
|
2012-09-30 22:30:02 +00:00
|
|
|
c.connect()
|
|
|
|
time.sleep(0.3)
|
|
|
|
assert self.last_handler.timeout
|
|
|
|
|
|
|
|
|
2015-06-22 02:52:23 +00:00
|
|
|
class TestTimeOut(tservers.ServerTestBase):
|
2013-01-25 03:03:59 +00:00
|
|
|
handler = HangHandler
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2012-09-30 22:30:02 +00:00
|
|
|
def test_timeout(self):
|
2014-01-28 16:26:35 +00:00
|
|
|
c = tcp.TCPClient(("127.0.0.1", self.port))
|
2012-07-21 04:10:54 +00:00
|
|
|
c.connect()
|
|
|
|
c.settimeout(0.1)
|
2013-01-26 08:29:45 +00:00
|
|
|
assert c.gettimeout() == 0.1
|
2012-07-21 04:10:54 +00:00
|
|
|
tutils.raises(tcp.NetLibTimeout, c.rfile.read, 10)
|
|
|
|
|
|
|
|
|
2015-06-22 02:52:23 +00:00
|
|
|
class TestALPNClient(tservers.ServerTestBase):
|
2015-06-15 15:31:08 +00:00
|
|
|
handler = ALPNHandler
|
2015-05-28 15:46:44 +00:00
|
|
|
ssl = dict(
|
2015-06-15 15:31:08 +00:00
|
|
|
alpn_select="bar"
|
2015-05-28 15:46:44 +00:00
|
|
|
)
|
|
|
|
|
2015-05-29 15:04:12 +00:00
|
|
|
if OpenSSL._util.lib.Cryptography_HAS_ALPN:
|
|
|
|
def test_alpn(self):
|
|
|
|
c = tcp.TCPClient(("127.0.0.1", self.port))
|
|
|
|
c.connect()
|
2015-06-15 15:31:08 +00:00
|
|
|
c.convert_to_ssl(alpn_protos=["foo", "bar", "fasel"])
|
|
|
|
assert c.get_alpn_proto_negotiated() == "bar"
|
|
|
|
assert c.rfile.readline().strip() == "bar"
|
2015-05-28 15:46:44 +00:00
|
|
|
|
2015-06-12 13:21:23 +00:00
|
|
|
def test_no_alpn(self):
|
|
|
|
c = tcp.TCPClient(("127.0.0.1", self.port))
|
|
|
|
c.connect()
|
2015-06-15 15:31:08 +00:00
|
|
|
c.convert_to_ssl()
|
|
|
|
assert c.get_alpn_proto_negotiated() == ""
|
|
|
|
assert c.rfile.readline().strip() == "NONE"
|
2015-06-12 13:21:23 +00:00
|
|
|
|
2015-06-08 11:25:42 +00:00
|
|
|
else:
|
|
|
|
def test_none_alpn(self):
|
|
|
|
c = tcp.TCPClient(("127.0.0.1", self.port))
|
|
|
|
c.connect()
|
2015-06-15 15:31:08 +00:00
|
|
|
c.convert_to_ssl(alpn_protos=["foo", "bar", "fasel"])
|
|
|
|
assert c.get_alpn_proto_negotiated() == ""
|
|
|
|
assert c.rfile.readline() == "NONE"
|
|
|
|
|
2015-06-20 20:07:23 +00:00
|
|
|
|
2015-06-22 02:52:23 +00:00
|
|
|
class TestNoSSLNoALPNClient(tservers.ServerTestBase):
|
2015-06-15 15:31:08 +00:00
|
|
|
handler = ALPNHandler
|
|
|
|
|
|
|
|
def test_no_ssl_no_alpn(self):
|
|
|
|
c = tcp.TCPClient(("127.0.0.1", self.port))
|
|
|
|
c.connect()
|
|
|
|
assert c.get_alpn_proto_negotiated() == ""
|
|
|
|
assert c.rfile.readline().strip() == "NONE"
|
2015-06-08 11:25:42 +00:00
|
|
|
|
2015-05-28 15:46:44 +00:00
|
|
|
|
2015-06-22 02:52:23 +00:00
|
|
|
class TestSSLTimeOut(tservers.ServerTestBase):
|
2013-01-25 03:03:59 +00:00
|
|
|
handler = HangHandler
|
2015-06-05 10:44:29 +00:00
|
|
|
ssl = True
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2012-07-21 04:10:54 +00:00
|
|
|
def test_timeout_client(self):
|
2014-01-28 16:26:35 +00:00
|
|
|
c = tcp.TCPClient(("127.0.0.1", self.port))
|
2012-07-21 04:10:54 +00:00
|
|
|
c.connect()
|
|
|
|
c.convert_to_ssl()
|
|
|
|
c.settimeout(0.1)
|
|
|
|
tutils.raises(tcp.NetLibTimeout, c.rfile.read, 10)
|
|
|
|
|
|
|
|
|
2015-06-22 02:52:23 +00:00
|
|
|
class TestDHParams(tservers.ServerTestBase):
|
2014-03-07 03:38:50 +00:00
|
|
|
handler = HangHandler
|
|
|
|
ssl = dict(
|
2015-05-27 09:18:54 +00:00
|
|
|
dhparams=certutils.CertStore.load_dhparam(
|
2014-03-07 03:38:50 +00:00
|
|
|
tutils.test_data.path("data/dhparam.pem"),
|
|
|
|
),
|
2015-05-27 09:18:54 +00:00
|
|
|
cipher_list="DHE-RSA-AES256-SHA"
|
2014-03-07 03:38:50 +00:00
|
|
|
)
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2014-03-07 03:38:50 +00:00
|
|
|
def test_dhparams(self):
|
|
|
|
c = tcp.TCPClient(("127.0.0.1", self.port))
|
|
|
|
c.connect()
|
|
|
|
c.convert_to_ssl()
|
|
|
|
ret = c.get_current_cipher()
|
|
|
|
assert ret[0] == "DHE-RSA-AES256-SHA"
|
|
|
|
|
2015-02-27 21:02:52 +00:00
|
|
|
def test_create_dhparams(self):
|
|
|
|
with tutils.tmpdir() as d:
|
|
|
|
filename = os.path.join(d, "dhparam.pem")
|
|
|
|
certutils.CertStore.load_dhparam(filename)
|
|
|
|
assert os.path.exists(filename)
|
2014-03-07 03:38:50 +00:00
|
|
|
|
2014-03-10 04:29:27 +00:00
|
|
|
|
2012-06-18 21:42:32 +00:00
|
|
|
class TestTCPClient:
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2012-06-18 21:42:32 +00:00
|
|
|
def test_conerr(self):
|
2014-01-28 16:26:35 +00:00
|
|
|
c = tcp.TCPClient(("127.0.0.1", 0))
|
2012-06-24 23:23:04 +00:00
|
|
|
tutils.raises(tcp.NetLibError, c.connect)
|
2012-06-18 21:42:32 +00:00
|
|
|
|
|
|
|
|
|
|
|
class TestFileLike:
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2012-10-09 03:25:15 +00:00
|
|
|
def test_blocksize(self):
|
|
|
|
s = cStringIO.StringIO("1234567890abcdefghijklmnopqrstuvwxyz")
|
|
|
|
s = tcp.Reader(s)
|
|
|
|
s.BLOCKSIZE = 2
|
|
|
|
assert s.read(1) == "1"
|
|
|
|
assert s.read(2) == "23"
|
|
|
|
assert s.read(3) == "456"
|
|
|
|
assert s.read(4) == "7890"
|
|
|
|
d = s.read(-1)
|
|
|
|
assert d.startswith("abc") and d.endswith("xyz")
|
|
|
|
|
2012-06-18 21:42:32 +00:00
|
|
|
def test_wrap(self):
|
|
|
|
s = cStringIO.StringIO("foobar\nfoobar")
|
|
|
|
s.flush()
|
2012-09-23 23:10:21 +00:00
|
|
|
s = tcp.Reader(s)
|
2012-06-18 21:42:32 +00:00
|
|
|
assert s.readline() == "foobar\n"
|
|
|
|
assert s.readline() == "foobar"
|
|
|
|
# Test __getattr__
|
|
|
|
assert s.isatty
|
|
|
|
|
|
|
|
def test_limit(self):
|
|
|
|
s = cStringIO.StringIO("foobar\nfoobar")
|
2012-09-23 23:10:21 +00:00
|
|
|
s = tcp.Reader(s)
|
2012-06-18 21:42:32 +00:00
|
|
|
assert s.readline(3) == "foo"
|
2012-07-23 23:39:49 +00:00
|
|
|
|
|
|
|
def test_limitless(self):
|
2015-05-27 09:18:54 +00:00
|
|
|
s = cStringIO.StringIO("f" * (50 * 1024))
|
2012-09-23 23:10:21 +00:00
|
|
|
s = tcp.Reader(s)
|
2012-07-23 23:39:49 +00:00
|
|
|
ret = s.read(-1)
|
|
|
|
assert len(ret) == 50 * 1024
|
2012-09-23 23:10:21 +00:00
|
|
|
|
|
|
|
def test_readlog(self):
|
|
|
|
s = cStringIO.StringIO("foobar\nfoobar")
|
|
|
|
s = tcp.Reader(s)
|
|
|
|
assert not s.is_logging()
|
|
|
|
s.start_log()
|
|
|
|
assert s.is_logging()
|
|
|
|
s.readline()
|
|
|
|
assert s.get_log() == "foobar\n"
|
|
|
|
s.read(1)
|
|
|
|
assert s.get_log() == "foobar\nf"
|
|
|
|
s.start_log()
|
|
|
|
assert s.get_log() == ""
|
|
|
|
s.read(1)
|
|
|
|
assert s.get_log() == "o"
|
|
|
|
s.stop_log()
|
|
|
|
tutils.raises(ValueError, s.get_log)
|
|
|
|
|
|
|
|
def test_writelog(self):
|
|
|
|
s = cStringIO.StringIO()
|
|
|
|
s = tcp.Writer(s)
|
|
|
|
s.start_log()
|
|
|
|
assert s.is_logging()
|
|
|
|
s.write("x")
|
|
|
|
assert s.get_log() == "x"
|
|
|
|
s.write("x")
|
|
|
|
assert s.get_log() == "xx"
|
|
|
|
|
2013-01-26 08:19:35 +00:00
|
|
|
def test_writer_flush_error(self):
|
|
|
|
s = cStringIO.StringIO()
|
|
|
|
s = tcp.Writer(s)
|
|
|
|
o = mock.MagicMock()
|
|
|
|
o.flush = mock.MagicMock(side_effect=socket.error)
|
|
|
|
s.o = o
|
|
|
|
tutils.raises(tcp.NetLibDisconnect, s.flush)
|
|
|
|
|
|
|
|
def test_reader_read_error(self):
|
|
|
|
s = cStringIO.StringIO("foobar\nfoobar")
|
|
|
|
s = tcp.Reader(s)
|
|
|
|
o = mock.MagicMock()
|
|
|
|
o.read = mock.MagicMock(side_effect=socket.error)
|
|
|
|
s.o = o
|
|
|
|
tutils.raises(tcp.NetLibDisconnect, s.read, 10)
|
|
|
|
|
2013-01-16 20:30:19 +00:00
|
|
|
def test_reset_timestamps(self):
|
|
|
|
s = cStringIO.StringIO("foobar\nfoobar")
|
|
|
|
s = tcp.Reader(s)
|
|
|
|
s.first_byte_timestamp = 500
|
|
|
|
s.reset_timestamps()
|
|
|
|
assert not s.first_byte_timestamp
|
|
|
|
|
|
|
|
def test_first_byte_timestamp_updated_on_read(self):
|
|
|
|
s = cStringIO.StringIO("foobar\nfoobar")
|
|
|
|
s = tcp.Reader(s)
|
|
|
|
s.read(1)
|
|
|
|
assert s.first_byte_timestamp
|
|
|
|
expected = s.first_byte_timestamp
|
|
|
|
s.read(5)
|
|
|
|
assert s.first_byte_timestamp == expected
|
|
|
|
|
|
|
|
def test_first_byte_timestamp_updated_on_readline(self):
|
|
|
|
s = cStringIO.StringIO("foobar\nfoobar\nfoobar")
|
|
|
|
s = tcp.Reader(s)
|
|
|
|
s.readline()
|
|
|
|
assert s.first_byte_timestamp
|
|
|
|
expected = s.first_byte_timestamp
|
|
|
|
s.readline()
|
|
|
|
assert s.first_byte_timestamp == expected
|
2013-01-27 06:21:18 +00:00
|
|
|
|
2014-03-02 03:47:10 +00:00
|
|
|
def test_read_ssl_error(self):
|
|
|
|
s = mock.MagicMock()
|
|
|
|
s.read = mock.MagicMock(side_effect=SSL.Error())
|
|
|
|
s = tcp.Reader(s)
|
|
|
|
tutils.raises(tcp.NetLibSSLError, s.read, 1)
|
|
|
|
|
2015-02-27 21:02:52 +00:00
|
|
|
def test_read_syscall_ssl_error(self):
|
|
|
|
s = mock.MagicMock()
|
|
|
|
s.read = mock.MagicMock(side_effect=SSL.SysCallError())
|
|
|
|
s = tcp.Reader(s)
|
|
|
|
tutils.raises(tcp.NetLibSSLError, s.read, 1)
|
|
|
|
|
|
|
|
def test_reader_readline_disconnect(self):
|
|
|
|
o = mock.MagicMock()
|
|
|
|
o.read = mock.MagicMock(side_effect=socket.error)
|
|
|
|
s = tcp.Reader(o)
|
|
|
|
tutils.raises(tcp.NetLibDisconnect, s.readline, 10)
|
2014-03-02 03:47:10 +00:00
|
|
|
|
2015-06-05 17:39:15 +00:00
|
|
|
def test_reader_incomplete_error(self):
|
|
|
|
s = cStringIO.StringIO("foobar")
|
|
|
|
s = tcp.Reader(s)
|
|
|
|
tutils.raises(tcp.NetLibIncomplete, s.safe_read, 10)
|
|
|
|
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2014-03-02 03:47:10 +00:00
|
|
|
class TestAddress:
|
2015-05-27 09:18:54 +00:00
|
|
|
|
2014-03-02 03:47:10 +00:00
|
|
|
def test_simple(self):
|
|
|
|
a = tcp.Address("localhost", True)
|
|
|
|
assert a.use_ipv6
|
|
|
|
b = tcp.Address("foo.com", True)
|
|
|
|
assert not a == b
|
2015-05-28 15:45:54 +00:00
|
|
|
assert str(b) == str(tuple("foo.com"))
|
2014-03-02 03:47:10 +00:00
|
|
|
c = tcp.Address("localhost", True)
|
|
|
|
assert a == c
|
2015-02-27 21:02:52 +00:00
|
|
|
assert not a != c
|
|
|
|
assert repr(a)
|
|
|
|
|
|
|
|
|
2015-06-22 02:52:23 +00:00
|
|
|
class TestSSLKeyLogger(tservers.ServerTestBase):
|
2015-02-27 21:02:52 +00:00
|
|
|
handler = EchoHandler
|
|
|
|
ssl = dict(
|
2015-05-27 09:18:54 +00:00
|
|
|
cipher_list="AES256-SHA"
|
|
|
|
)
|
2015-02-27 21:02:52 +00:00
|
|
|
|
|
|
|
def test_log(self):
|
2015-02-27 21:34:36 +00:00
|
|
|
testval = "echo!\n"
|
2015-02-27 21:02:52 +00:00
|
|
|
_logfun = tcp.log_ssl_key
|
|
|
|
|
|
|
|
with tutils.tmpdir() as d:
|
|
|
|
logfile = os.path.join(d, "foo", "bar", "logfile")
|
|
|
|
tcp.log_ssl_key = tcp.SSLKeyLogger(logfile)
|
2015-02-27 21:34:36 +00:00
|
|
|
|
2015-02-27 21:02:52 +00:00
|
|
|
c = tcp.TCPClient(("127.0.0.1", self.port))
|
|
|
|
c.connect()
|
|
|
|
c.convert_to_ssl()
|
2015-02-27 21:34:36 +00:00
|
|
|
c.wfile.write(testval)
|
|
|
|
c.wfile.flush()
|
|
|
|
assert c.rfile.readline() == testval
|
2015-02-27 21:27:23 +00:00
|
|
|
c.finish()
|
2015-02-27 21:34:36 +00:00
|
|
|
|
2015-02-27 21:02:52 +00:00
|
|
|
tcp.log_ssl_key.close()
|
|
|
|
with open(logfile, "rb") as f:
|
|
|
|
assert f.read().count("CLIENT_RANDOM") == 2
|
|
|
|
|
|
|
|
tcp.log_ssl_key = _logfun
|
|
|
|
|
|
|
|
def test_create_logfun(self):
|
2015-05-30 00:02:58 +00:00
|
|
|
assert isinstance(
|
|
|
|
tcp.SSLKeyLogger.create_logfun("test"),
|
|
|
|
tcp.SSLKeyLogger)
|
2015-05-27 09:18:54 +00:00
|
|
|
assert not tcp.SSLKeyLogger.create_logfun(False)
|