Commit c0537ebd authored by Matt Caswell's avatar Matt Caswell
Browse files

Add a test to check we get a new session even if s->hit is true in TLSv1.3



In TLSv1.3 we can resume, but still get a new session. This adds a test to
make sure that is happening.

Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
Reviewed-by: default avatarBen Kaduk <kaduk@mit.edu>
(Merged from https://github.com/openssl/openssl/pull/4068)
parent 5d61491c
Loading
Loading
Loading
Loading
+39 −20
Original line number Diff line number Diff line
@@ -786,6 +786,11 @@ static void ssl_session_tear_down(SSL_SESSION_TEST_FIXTURE fixture)
static int new_session_cb(SSL *ssl, SSL_SESSION *sess)
{
    new_called++;
    /*
     * sess has been up-refed for us, but we don't actually need it so free it
     * immediately.
     */
    SSL_SESSION_free(sess);
    return 1;
}

@@ -842,6 +847,32 @@ static int execute_test_session(SSL_SESSION_TEST_FIXTURE fix)
    if (fix.use_ext_cache && (new_called != 1 || remove_called != 0))
        goto end;

#if !defined(OPENSSL_NO_TLS1_3)
    new_called = remove_called = 0;
    if (!TEST_true(create_ssl_objects(sctx, cctx, &serverssl2,
                                      &clientssl2, NULL, NULL))
            || !TEST_true(SSL_set_session(clientssl2, sess1))
            || !TEST_true(create_ssl_connection(serverssl2, clientssl2,
                                                SSL_ERROR_NONE))
            || !TEST_true(SSL_session_reused(clientssl2)))
        goto end;

    /*
     * In TLSv1.3 we should have created a new session even though we have
     * resumed. The original session should also have been removed.
     */
    if (fix.use_ext_cache && !TEST_true((new_called == 1
                                         && remove_called == 1)))
        goto end;

    SSL_SESSION_free(sess1);
    if (!TEST_ptr(sess1 = SSL_get1_session(clientssl2)))
        goto end;
    shutdown_ssl_connection(serverssl2, clientssl2);
    serverssl2 = clientssl2 = NULL;
#endif

    new_called = remove_called = 0;
    if (!TEST_true(create_ssl_objects(sctx, cctx, &serverssl2,
                                      &clientssl2, NULL, NULL))
            || !TEST_true(create_ssl_connection(serverssl2, clientssl2,
@@ -851,16 +882,17 @@ static int execute_test_session(SSL_SESSION_TEST_FIXTURE fix)
    if (!TEST_ptr(sess2 = SSL_get1_session(clientssl2)))
        goto end;

    if (fix.use_ext_cache && (new_called != 2 || remove_called != 0))
    if (fix.use_ext_cache && !TEST_true(new_called == 1 && remove_called == 0))
        goto end;

    new_called = remove_called = 0;
    /*
     * This should clear sess2 from the cache because it is a "bad" session.
     * See SSL_set_session() documentation.
     */
    if (!TEST_true(SSL_set_session(clientssl2, sess1)))
        goto end;
    if (fix.use_ext_cache && (new_called != 2 || remove_called != 1))
    if (fix.use_ext_cache && !TEST_true(new_called == 0 && remove_called == 1))
        goto end;
    if (!TEST_ptr_eq(SSL_get_session(clientssl2), sess1))
        goto end;
@@ -870,23 +902,18 @@ static int execute_test_session(SSL_SESSION_TEST_FIXTURE fix)
        if (!TEST_true(SSL_CTX_add_session(cctx, sess2))
                || !TEST_true(SSL_CTX_remove_session(cctx, sess2)))
            goto end;

        /*
         * This is for the purposes of internal cache testing...ignore the
         * counter for external cache
         */
        if (fix.use_ext_cache)
            remove_called--;
    }

    new_called = remove_called = 0;
    /* This shouldn't be in the cache so should fail */
    if (!TEST_false(SSL_CTX_remove_session(cctx, sess2)))
        goto end;

    if (fix.use_ext_cache && (new_called != 2 || remove_called != 2))
    if (fix.use_ext_cache && !TEST_true(new_called == 0 && remove_called == 1))
        goto end;

#if !defined(OPENSSL_NO_TLS1_1) && !defined(OPENSSL_NO_TLS1_2)
    new_called = remove_called = 0;
    /* Force a connection failure */
    SSL_CTX_set_max_proto_version(sctx, TLS1_1_VERSION);
    if (!TEST_true(create_ssl_objects(sctx, cctx, &serverssl3,
@@ -898,7 +925,7 @@ static int execute_test_session(SSL_SESSION_TEST_FIXTURE fix)
        goto end;

    /* We should have automatically removed the session from the cache */
    if (fix.use_ext_cache && (new_called != 2 || remove_called != 3))
    if (fix.use_ext_cache && !TEST_true(new_called == 0 && remove_called == 1))
        goto end;

    /* Should succeed because it should not already be in the cache */
@@ -919,14 +946,6 @@ static int execute_test_session(SSL_SESSION_TEST_FIXTURE fix)
#endif
    SSL_SESSION_free(sess1);
    SSL_SESSION_free(sess2);

    /*
     * Check if we need to remove any sessions up-refed for the external cache
     */
    if (new_called >= 1)
        SSL_SESSION_free(sess1);
    if (new_called >= 2)
        SSL_SESSION_free(sess2);
    SSL_CTX_free(sctx);
    SSL_CTX_free(cctx);