gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[libmicrohttpd] 21/31: test_tls_extensions: removed unused test


From: gnunet
Subject: [libmicrohttpd] 21/31: test_tls_extensions: removed unused test
Date: Mon, 10 Oct 2022 13:01:06 +0200

This is an automated email from the git hooks/post-receive script.

karlson2k pushed a commit to branch master
in repository libmicrohttpd.

commit a781ffa5834f0ed4a496cf854d374a0e958e293f
Author: Evgeny Grin (Karlson2k) <k2k@narod.ru>
AuthorDate: Thu Oct 6 20:12:23 2022 +0300

    test_tls_extensions: removed unused test
    
    The test has not been used for a long time.
    The initial idea of the test was testing GnuTLS for some bugs. Let's
    leave GnuTLS testing for GnuTLS test-suite.
---
 src/testcurl/https/test_tls_extensions.c | 297 -------------------------------
 1 file changed, 297 deletions(-)

diff --git a/src/testcurl/https/test_tls_extensions.c 
b/src/testcurl/https/test_tls_extensions.c
deleted file mode 100644
index 6cad17e8..00000000
--- a/src/testcurl/https/test_tls_extensions.c
+++ /dev/null
@@ -1,297 +0,0 @@
-/*
- This file is part of libmicrohttpd
- Copyright (C) 2007 Christian Grothoff
-
- libmicrohttpd is free software; you can redistribute it and/or modify
- it under the terms of the GNU General Public License as published
- by the Free Software Foundation; either version 2, or (at your
- option) any later version.
-
- libmicrohttpd is distributed in the hope that it will be useful, but
- WITHOUT ANY WARRANTY; without even the implied warranty of
- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
- General Public License for more details.
-
- You should have received a copy of the GNU General Public License
- along with libmicrohttpd; see the file COPYING.  If not, write to the
- Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
- Boston, MA 02110-1301, USA.
- */
-
-/**
- * @file tls_extension_test.c
- * @brief: test daemon response to TLS client hello requests containing 
extensions
- *
- * @author Sagie Amir
- */
-
-#include "platform.h"
-#include "microhttpd.h"
-#include "tls_test_common.h"
-#include "mhd_sockets.h" /* only macros used */
-#ifdef MHD_HTTPS_REQUIRE_GCRYPT
-#include <gcrypt.h>
-#endif /* MHD_HTTPS_REQUIRE_GCRYPT */
-#include "tls_test_keys.h"
-
-#define MAX_EXT_DATA_LENGTH 256
-
-/**
- * Test daemon response to TLS client hello requests containing extensions
- *
- * @param session
- * @param port
- * @param exten_t - the type of extension being appended to client hello 
request
- * @param ext_count - the number of consecutive extension replicas inserted 
into request
- * @param ext_length - the length of each appended extension
- * @return 0 on successful test completion, -1 otherwise
- */
-static int
-test_hello_extension (gnutls_session_t session, uint16_t port,
-                      extensions_t exten_t,
-                      int ext_count, int ext_length)
-{
-  int i, ret = 0, pos = 0;
-  MHD_socket sd;
-  int exten_data_len, ciphersuite_len, datalen;
-  struct sockaddr_in sa;
-  char url[255];
-  opaque *data = NULL;
-  uint8_t session_id_len = 0;
-  opaque rnd[TLS_RANDOM_SIZE];
-  opaque extdata[MAX_EXT_DATA_LENGTH];
-
-  /* single, null compression */
-  unsigned char comp[] = { 0x01, 0x00 };
-  struct CBC cbc;
-
-  sd = -1;
-  memset (&cbc, 0, sizeof (struct CBC));
-  if (NULL == (cbc.buf = malloc (sizeof (char) * 256)))
-  {
-    fprintf (stderr, MHD_E_MEM);
-    ret = -1;
-    goto cleanup;
-  }
-  cbc.size = 256;
-
-  sd = socket (AF_INET, SOCK_STREAM, 0);
-  if (sd == -1)
-  {
-    fprintf (stderr, "Failed to create socket: %s\n", strerror (errno));
-    free (cbc.buf);
-    return -1;
-  }
-  memset (&sa, '\0', sizeof (struct sockaddr_in));
-  sa.sin_family = AF_INET;
-  sa.sin_port = htons (port);
-  sa.sin_addr.s_addr = htonl (INADDR_LOOPBACK);
-
-  enum MHD_GNUTLS_Protocol hver;
-
-  /* init hash functions */
-  session->internals.handshake_mac_handle_md5 =
-    MHD_gtls_hash_init (MHD_GNUTLS_MAC_MD5);
-  session->internals.handshake_mac_handle_sha =
-    MHD_gtls_hash_init (MHD_GNUTLS_MAC_SHA1);
-
-  /* version = 2 , random = [4 for unix time + 28 for random bytes] */
-  datalen = 2 /* version */ + TLS_RANDOM_SIZE + (session_id_len + 1);
-
-  data = MHD_gnutls_malloc (datalen);
-  if (data == NULL)
-  {
-    free (cbc.buf);
-    return -1;
-  }
-  hver = MHD_gtls_version_max (session);
-  data[pos++] = MHD_gtls_version_get_major (hver);
-  data[pos++] = MHD_gtls_version_get_minor (hver);
-
-  /* Set the version we advertise as maximum (RSA uses it). */
-  set_adv_version (session, MHD_gtls_version_get_major (hver),
-                   MHD_gtls_version_get_minor (hver));
-
-  session->security_parameters.version = hver;
-  session->security_parameters.timestamp = time (NULL);
-
-  /* generate session client random */
-  memset (session->security_parameters.client_random, 0, TLS_RANDOM_SIZE);
-  gnutls_write_uint32 (time (NULL), rnd);
-  if (GC_OK != MHD_gc_nonce ((char *) &rnd[4], TLS_RANDOM_SIZE - 4))
-    abort ();
-  memcpy (session->security_parameters.client_random, rnd, TLS_RANDOM_SIZE);
-  memcpy (&data[pos], rnd, TLS_RANDOM_SIZE);
-  pos += TLS_RANDOM_SIZE;
-
-  /* Copy the Session ID       */
-  data[pos++] = session_id_len;
-
-  /*
-   * len = ciphersuite data + 2 bytes ciphersuite length \
-   *       1 byte compression length + 1 byte compression data + \
-   * 2 bytes extension length, extensions data
-   */ciphersuite_len = MHD__gnutls_copy_ciphersuites (session, extdata,
-                                                   sizeof (extdata));
-  exten_data_len = ext_count * (2 + 2 + ext_length);
-  datalen += ciphersuite_len + 2 + 2 + exten_data_len;
-  data = MHD_gtls_realloc_fast (data, datalen);
-  memcpy (&data[pos], extdata, sizeof (ciphersuite_len));
-  pos += ciphersuite_len;
-
-  /* set compression */
-  memcpy (&data[pos], comp, sizeof (comp));
-  pos += 2;
-
-  /* set extensions length = 2 type bytes + 2 length bytes + extension length 
*/
-  gnutls_write_uint16 (exten_data_len, &data[pos]);
-  pos += 2;
-  for (i = 0; i < ext_count; ++i)
-  {
-    /* write extension type */
-    gnutls_write_uint16 (exten_t, &data[pos]);
-    pos += 2;
-    gnutls_write_uint16 (ext_length, &data[pos]);
-    pos += 2;
-    /* we might want to generate random data here */
-    memset (&data[pos], 0, ext_length);
-    pos += ext_length;
-  }
-
-  if (connect (sd, &sa, sizeof (struct sockaddr_in)) < 0)
-  {
-    fprintf (stderr, "%s\n", MHD_E_FAILED_TO_CONNECT);
-    ret = -1;
-    goto cleanup;
-  }
-
-  gnutls_transport_set_ptr (session, (MHD_gnutls_transport_ptr_t) (long) sd);
-
-  if (gen_test_file_url (url,
-                         sizeof (url),
-                         port))
-  {
-    ret = -1;
-    goto cleanup;
-  }
-
-  /* this should crash the server */
-  ret = gnutls_send_handshake (session, data, datalen,
-                               GNUTLS_HANDSHAKE_CLIENT_HELLO);
-
-  /* advance to STATE2 */
-  session->internals.handshake_state = STATE2;
-  ret = gnutls_handshake (session);
-  ret = gnutls_bye (session, GNUTLS_SHUT_WR);
-
-  gnutls_free (data);
-
-  /* make sure daemon is still functioning */
-  if (CURLE_OK != send_curl_req (url, &cbc, NULL,
-                                 MHD_GNUTLS_PROTOCOL_TLS1_2))
-  {
-    ret = -1;
-    goto cleanup;
-  }
-
-cleanup:
-  if (-1 != sd)
-    MHD_socket_close_chk_ (sd);
-  gnutls_free (cbc.buf);
-  return ret;
-}
-
-
-int
-main (int argc, char *const *argv)
-{
-  int i, errorCount = 0;
-  FILE *test_fd;
-  struct MHD_Daemon *d;
-  gnutls_session_t session;
-  gnutls_certificate_credentials_t xcred;
-  const int ext_arr[] = {
-    GNUTLS_EXTENSION_SERVER_NAME,
-    -1
-  };
-  uint16_t port;
-
-  if (MHD_NO != MHD_is_feature_supported (MHD_FEATURE_AUTODETECT_BIND_PORT))
-    port = 0;
-  else
-    port = 3080;
-
-#ifdef MHD_HTTPS_REQUIRE_GCRYPT
-  gcry_control (GCRYCTL_ENABLE_QUICK_RANDOM, 0);
-#ifdef GCRYCTL_INITIALIZATION_FINISHED
-  gcry_control (GCRYCTL_INITIALIZATION_FINISHED, 0);
-#endif
-#endif /* MHD_HTTPS_REQUIRE_GCRYPT */
-  MHD_gtls_global_set_log_level (11);
-
-  if ((test_fd = setup_test_file ()) == NULL)
-  {
-    fprintf (stderr, MHD_E_TEST_FILE_CREAT);
-    return -1;
-  }
-
-  if (! testsuite_curl_global_init ())
-    return 99;
-
-  d = MHD_start_daemon (MHD_USE_THREAD_PER_CONNECTION
-                        | MHD_USE_INTERNAL_POLLING_THREAD | MHD_USE_TLS
-                        | MHD_USE_ERROR_LOG, port,
-                        NULL, NULL, &http_ahc, NULL,
-                        MHD_OPTION_HTTPS_MEM_KEY, srv_key_pem,
-                        MHD_OPTION_HTTPS_MEM_CERT, srv_self_signed_cert_pem,
-                        MHD_OPTION_END);
-
-  if (d == NULL)
-  {
-    fprintf (stderr, "%s\n", MHD_E_SERVER_INIT);
-    return -1;
-  }
-  if (0 == port)
-  {
-    const union MHD_DaemonInfo *dinfo;
-    dinfo = MHD_get_daemon_info (d, MHD_DAEMON_INFO_BIND_PORT);
-    if ((NULL == dinfo) || (0 == dinfo->port) )
-    {
-      MHD_stop_daemon (d); return -1;
-    }
-    port = dinfo->port;
-  }
-
-  i = 0;
-  setup_session (&session, &xcred);
-  errorCount += test_hello_extension (session, port, ext_arr[i], 1, 16);
-  teardown_session (session, xcred);
-#if 1
-  i = 0;
-  while (ext_arr[i] != -1)
-  {
-    setup_session (&session, &xcred);
-    errorCount += test_hello_extension (session, port, ext_arr[i], 1, 16);
-    teardown_session (session, xcred);
-
-    setup_session (&session, &xcred);
-    errorCount += test_hello_extension (session, port, ext_arr[i], 3, 8);
-    teardown_session (session, xcred);
-
-    /* this test specifically tests the issue raised in CVE-2008-1948 */
-    setup_session (&session, &xcred);
-    errorCount += test_hello_extension (session, port, ext_arr[i], 6, 0);
-    teardown_session (session, xcred);
-    i++;
-  }
-#endif
-
-  print_test_result (errorCount, argv[0]);
-
-  MHD_stop_daemon (d);
-
-  curl_global_cleanup ();
-  fclose (test_fd);
-
-  return (0 == errorCount) ? 0 : 1;       /* 0 == pass */
-}

-- 
To stop receiving notification emails like this one, please contact
gnunet@gnunet.org.



reply via email to

[Prev in Thread] Current Thread [Next in Thread]