зеркало из https://github.com/mozilla/gecko-dev.git
344 строки
8.9 KiB
JavaScript
344 строки
8.9 KiB
JavaScript
/* Any copyright is dedicated to the Public Domain.
|
|
http://creativecommons.org/publicdomain/zero/1.0/ */
|
|
|
|
"use strict";
|
|
|
|
// Need profile dir to store the key / cert
|
|
do_get_profile();
|
|
// Ensure PSM is initialized
|
|
Cc["@mozilla.org/psm;1"].getService(Ci.nsISupports);
|
|
|
|
const { MockRegistrar } = ChromeUtils.importESModule(
|
|
"resource://testing-common/MockRegistrar.sys.mjs"
|
|
);
|
|
const { PromiseUtils } = ChromeUtils.importESModule(
|
|
"resource://gre/modules/PromiseUtils.sys.mjs"
|
|
);
|
|
const certOverrideService = Cc[
|
|
"@mozilla.org/security/certoverride;1"
|
|
].getService(Ci.nsICertOverrideService);
|
|
const socketTransportService = Cc[
|
|
"@mozilla.org/network/socket-transport-service;1"
|
|
].getService(Ci.nsISocketTransportService);
|
|
|
|
const prefs = Services.prefs;
|
|
|
|
function areCertsEqual(certA, certB) {
|
|
let derA = certA.getRawDER();
|
|
let derB = certB.getRawDER();
|
|
if (derA.length != derB.length) {
|
|
return false;
|
|
}
|
|
for (let i = 0; i < derA.length; i++) {
|
|
if (derA[i] != derB[i]) {
|
|
return false;
|
|
}
|
|
}
|
|
return true;
|
|
}
|
|
|
|
function startServer(
|
|
cert,
|
|
expectingPeerCert,
|
|
clientCertificateConfig,
|
|
expectedVersion,
|
|
expectedVersionStr
|
|
) {
|
|
let tlsServer = Cc["@mozilla.org/network/tls-server-socket;1"].createInstance(
|
|
Ci.nsITLSServerSocket
|
|
);
|
|
tlsServer.init(-1, true, -1);
|
|
tlsServer.serverCert = cert;
|
|
|
|
let input, output;
|
|
|
|
let listener = {
|
|
onSocketAccepted(socket, transport) {
|
|
info("Accept TLS client connection");
|
|
let connectionInfo = transport.securityCallbacks.getInterface(
|
|
Ci.nsITLSServerConnectionInfo
|
|
);
|
|
connectionInfo.setSecurityObserver(listener);
|
|
input = transport.openInputStream(0, 0, 0);
|
|
output = transport.openOutputStream(0, 0, 0);
|
|
},
|
|
onHandshakeDone(socket, status) {
|
|
info("TLS handshake done");
|
|
if (expectingPeerCert) {
|
|
ok(!!status.peerCert, "Has peer cert");
|
|
ok(
|
|
areCertsEqual(status.peerCert, cert),
|
|
"Peer cert matches expected cert"
|
|
);
|
|
} else {
|
|
ok(!status.peerCert, "No peer cert (as expected)");
|
|
}
|
|
|
|
equal(
|
|
status.tlsVersionUsed,
|
|
expectedVersion,
|
|
"Using " + expectedVersionStr
|
|
);
|
|
let expectedCipher;
|
|
if (expectedVersion >= 772) {
|
|
expectedCipher = "TLS_AES_128_GCM_SHA256";
|
|
} else {
|
|
expectedCipher = "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256";
|
|
}
|
|
equal(status.cipherName, expectedCipher, "Using expected cipher");
|
|
equal(status.keyLength, 128, "Using 128-bit key");
|
|
equal(status.macLength, 128, "Using 128-bit MAC");
|
|
|
|
input.asyncWait(
|
|
{
|
|
onInputStreamReady(input) {
|
|
NetUtil.asyncCopy(input, output);
|
|
},
|
|
},
|
|
0,
|
|
0,
|
|
Services.tm.currentThread
|
|
);
|
|
},
|
|
onStopListening() {
|
|
info("onStopListening");
|
|
input.close();
|
|
output.close();
|
|
},
|
|
};
|
|
|
|
tlsServer.setSessionTickets(false);
|
|
tlsServer.setRequestClientCertificate(clientCertificateConfig);
|
|
|
|
tlsServer.asyncListen(listener);
|
|
|
|
return tlsServer;
|
|
}
|
|
|
|
function storeCertOverride(port, cert) {
|
|
certOverrideService.rememberValidityOverride(
|
|
"127.0.0.1",
|
|
port,
|
|
{},
|
|
cert,
|
|
true
|
|
);
|
|
}
|
|
|
|
function startClient(port, sendClientCert, expectingAlert, tlsVersion) {
|
|
gClientAuthDialogs.selectCertificate = sendClientCert;
|
|
let SSL_ERROR_BASE = Ci.nsINSSErrorsService.NSS_SSL_ERROR_BASE;
|
|
let SSL_ERROR_BAD_CERT_ALERT = SSL_ERROR_BASE + 17;
|
|
let SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT = SSL_ERROR_BASE + 181;
|
|
let transport = socketTransportService.createTransport(
|
|
["ssl"],
|
|
"127.0.0.1",
|
|
port,
|
|
null,
|
|
null
|
|
);
|
|
let input;
|
|
let output;
|
|
|
|
let inputDeferred = PromiseUtils.defer();
|
|
let outputDeferred = PromiseUtils.defer();
|
|
|
|
let handler = {
|
|
onTransportStatus(transport, status) {
|
|
if (status === Ci.nsISocketTransport.STATUS_CONNECTED_TO) {
|
|
output.asyncWait(handler, 0, 0, Services.tm.currentThread);
|
|
}
|
|
},
|
|
|
|
onInputStreamReady(input) {
|
|
try {
|
|
let data = NetUtil.readInputStreamToString(input, input.available());
|
|
equal(data, "HELLO", "Echoed data received");
|
|
input.close();
|
|
output.close();
|
|
ok(!expectingAlert, "No cert alert expected");
|
|
inputDeferred.resolve();
|
|
} catch (e) {
|
|
let errorCode = -1 * (e.result & 0xffff);
|
|
if (expectingAlert) {
|
|
if (
|
|
tlsVersion == Ci.nsITLSClientStatus.TLS_VERSION_1_2 &&
|
|
errorCode == SSL_ERROR_BAD_CERT_ALERT
|
|
) {
|
|
info("Got bad cert alert as expected for tls 1.2");
|
|
input.close();
|
|
output.close();
|
|
inputDeferred.resolve();
|
|
return;
|
|
}
|
|
if (
|
|
tlsVersion == Ci.nsITLSClientStatus.TLS_VERSION_1_3 &&
|
|
errorCode == SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT
|
|
) {
|
|
info("Got cert required alert as expected for tls 1.3");
|
|
input.close();
|
|
output.close();
|
|
inputDeferred.resolve();
|
|
return;
|
|
}
|
|
}
|
|
inputDeferred.reject(e);
|
|
}
|
|
},
|
|
|
|
onOutputStreamReady(output) {
|
|
try {
|
|
output.write("HELLO", 5);
|
|
info("Output to server written");
|
|
outputDeferred.resolve();
|
|
input = transport.openInputStream(0, 0, 0);
|
|
input.asyncWait(handler, 0, 0, Services.tm.currentThread);
|
|
} catch (e) {
|
|
let errorCode = -1 * (e.result & 0xffff);
|
|
if (errorCode == SSL_ERROR_BAD_CERT_ALERT) {
|
|
info("Server doesn't like client cert");
|
|
}
|
|
outputDeferred.reject(e);
|
|
}
|
|
},
|
|
};
|
|
|
|
transport.setEventSink(handler, Services.tm.currentThread);
|
|
output = transport.openOutputStream(0, 0, 0);
|
|
|
|
return Promise.all([inputDeferred.promise, outputDeferred.promise]);
|
|
}
|
|
|
|
// Replace the UI dialog that prompts the user to pick a client certificate.
|
|
const gClientAuthDialogs = {
|
|
_selectCertificate: false,
|
|
|
|
set selectCertificate(value) {
|
|
this._selectCertificate = value;
|
|
},
|
|
|
|
chooseCertificate(
|
|
hostname,
|
|
port,
|
|
organization,
|
|
issuerOrg,
|
|
certList,
|
|
selectedIndex,
|
|
rememberClientAuthCertificate
|
|
) {
|
|
rememberClientAuthCertificate.value = false;
|
|
if (this._selectCertificate) {
|
|
selectedIndex.value = 0;
|
|
return true;
|
|
}
|
|
return false;
|
|
},
|
|
|
|
QueryInterface: ChromeUtils.generateQI([Ci.nsIClientAuthDialogs]),
|
|
};
|
|
|
|
const ClientAuthDialogsContractID = "@mozilla.org/nsClientAuthDialogs;1";
|
|
// On all platforms but Android, this component already exists, so this replaces
|
|
// it. On Android, the component does not exist, so this registers it.
|
|
if (AppConstants.platform != "android") {
|
|
MockRegistrar.register(ClientAuthDialogsContractID, gClientAuthDialogs);
|
|
} else {
|
|
const factory = {
|
|
createInstance(iid) {
|
|
return gClientAuthDialogs.QueryInterface(iid);
|
|
},
|
|
|
|
QueryInterface: ChromeUtils.generateQI(["nsIFactory"]),
|
|
};
|
|
const Cm = Components.manager;
|
|
const registrar = Cm.QueryInterface(Ci.nsIComponentRegistrar);
|
|
const cid = Services.uuid.generateUUID();
|
|
registrar.registerFactory(
|
|
cid,
|
|
"A Mock for " + ClientAuthDialogsContractID,
|
|
ClientAuthDialogsContractID,
|
|
factory
|
|
);
|
|
}
|
|
|
|
const tests = [
|
|
{
|
|
expectingPeerCert: true,
|
|
clientCertificateConfig: Ci.nsITLSServerSocket.REQUIRE_ALWAYS,
|
|
sendClientCert: true,
|
|
expectingAlert: false,
|
|
},
|
|
{
|
|
expectingPeerCert: true,
|
|
clientCertificateConfig: Ci.nsITLSServerSocket.REQUIRE_ALWAYS,
|
|
sendClientCert: false,
|
|
expectingAlert: true,
|
|
},
|
|
{
|
|
expectingPeerCert: true,
|
|
clientCertificateConfig: Ci.nsITLSServerSocket.REQUEST_ALWAYS,
|
|
sendClientCert: true,
|
|
expectingAlert: false,
|
|
},
|
|
{
|
|
expectingPeerCert: false,
|
|
clientCertificateConfig: Ci.nsITLSServerSocket.REQUEST_ALWAYS,
|
|
sendClientCert: false,
|
|
expectingAlert: false,
|
|
},
|
|
{
|
|
expectingPeerCert: false,
|
|
clientCertificateConfig: Ci.nsITLSServerSocket.REQUEST_NEVER,
|
|
sendClientCert: true,
|
|
expectingAlert: false,
|
|
},
|
|
{
|
|
expectingPeerCert: false,
|
|
clientCertificateConfig: Ci.nsITLSServerSocket.REQUEST_NEVER,
|
|
sendClientCert: false,
|
|
expectingAlert: false,
|
|
},
|
|
];
|
|
|
|
const versions = [
|
|
{
|
|
prefValue: 3,
|
|
version: Ci.nsITLSClientStatus.TLS_VERSION_1_2,
|
|
versionStr: "TLS 1.2",
|
|
},
|
|
{
|
|
prefValue: 4,
|
|
version: Ci.nsITLSClientStatus.TLS_VERSION_1_3,
|
|
versionStr: "TLS 1.3",
|
|
},
|
|
];
|
|
|
|
add_task(async function() {
|
|
let cert = getTestServerCertificate();
|
|
ok(!!cert, "Got self-signed cert");
|
|
for (let v of versions) {
|
|
prefs.setIntPref("security.tls.version.max", v.prefValue);
|
|
for (let t of tests) {
|
|
let server = startServer(
|
|
cert,
|
|
t.expectingPeerCert,
|
|
t.clientCertificateConfig,
|
|
v.version,
|
|
v.versionStr
|
|
);
|
|
storeCertOverride(server.port, cert);
|
|
await startClient(
|
|
server.port,
|
|
t.sendClientCert,
|
|
t.expectingAlert,
|
|
v.version
|
|
);
|
|
server.close();
|
|
}
|
|
}
|
|
});
|
|
|
|
registerCleanupFunction(function() {
|
|
prefs.clearUserPref("security.tls.version.max");
|
|
});
|