mirror of https://github.com/secdev/scapy.git
267 lines
11 KiB
Plaintext
267 lines
11 KiB
Plaintext
% Tests for TLS 1.3
|
|
#
|
|
# Try me with :
|
|
# bash test/run_tests -t test/tls13.uts -F
|
|
|
|
|
|
+ Read a TLS 1.3 session
|
|
# /!\ These tests will not catch our 'INTEGRITY CHECK FAILED's. /!\
|
|
# We deem the knowledge of the plaintext sufficient for passing...
|
|
|
|
= Reading TLS 1.3 test session (vectors 5 from draft-ietf-tls-tls13-vectors-00)
|
|
~ crypto
|
|
import binascii
|
|
from cryptography.hazmat.primitives.asymmetric.ec import EllipticCurvePrivateNumbers
|
|
from cryptography.hazmat.backends import default_backend
|
|
|
|
def clean(s):
|
|
return binascii.unhexlify(''.join(c for c in s if c.isalnum()))
|
|
|
|
clientHello1 = clean("""
|
|
16030100ae010000 aa0303d9e9898df6
|
|
3d43adbe64a2634f 0b63bcdc4019a3e5 26bc013a6042e05b
|
|
14555c0000061301 130313020100007b 0000000b00090000
|
|
06736572766572ff 01000100000a0008 0006001d00170018
|
|
002800260024001d 002005efa94d13f5 adcd14219379d5a3
|
|
7dbce4721d9294e5 72c6651aeb761838 815b002b0003027f
|
|
12000d0020001e04 0305030603020308 0408050806040105
|
|
0106010201040205 0206020202002d00 020101
|
|
""")
|
|
t = TLS(clientHello1)
|
|
|
|
helloRetryRequest = clean("""
|
|
160301000e060000 0a7f120006002800 020017
|
|
""")
|
|
t = TLS(helloRetryRequest, tls_session=t.tls_session.mirror())
|
|
|
|
secp256r1_client_privkey = clean("""
|
|
11fa48d153c917ff d89dff13140760a1
|
|
36265d399fa9f10e 2d766d42a6c84e90
|
|
""")
|
|
clientHello2 = clean("""
|
|
16030100cf010000 cb0303d9e9898df6
|
|
3d43adbe64a2634f 0b63bcdc4019a3e5 26bc013a6042e05b
|
|
14555c0000061301 130313020100009c 0000000b00090000
|
|
06736572766572ff 01000100000a0008 0006001d00170018
|
|
0028004700450017 0041041e5a785f54 17fb18db42938435
|
|
34a5c0ba6e744baa 6846d0b32f4e9ea3 922724a08f2adb09
|
|
f071f81402e7fd8c a33b76abe1cd556f d3e8fe20e0fd2e82
|
|
02f969002b000302 7f12000d0020001e 0403050306030203
|
|
0804080508060401 0501060102010402 050206020202002d 00020101
|
|
""")
|
|
t = TLS(clientHello2, tls_session=t.tls_session.mirror())
|
|
pubnum = t.tls_session.tls13_client_pubshares["secp256r1"].public_numbers()
|
|
privnum = EllipticCurvePrivateNumbers(pkcs_os2ip(secp256r1_client_privkey), pubnum)
|
|
privkey = privnum.private_key(default_backend())
|
|
t.tls_session.tls13_client_privshares["secp256r1"] = privkey
|
|
|
|
#secp256r1_server_privkey = clean("""
|
|
# ff265d2062c70725 ca22513e1e6841ff
|
|
# 475e8a00421f0818 186edd1c0080cc6a
|
|
# """)
|
|
serverHello = clean("""
|
|
1603010073020000 6f7f1296ff693075
|
|
d8465651a9c28773 f5496542206ba390 199b9c997545d9a1
|
|
2666151301004900 2800450017004104 8a4d09cde58dbc04
|
|
1955b9a41a43c169 6dc5429ffa96f9cd 194a863ac782f181
|
|
59f072b4f610215d 86407dd7368b754a b2e64f2c1b3f9d45
|
|
7c264e2b1781a36b
|
|
""")
|
|
t = TLS(serverHello, tls_session=t.tls_session.mirror())
|
|
|
|
serverEncHS = clean("""
|
|
170301029081de4f cfd700da4573d570
|
|
5942f14a11e569aa 9aacc95260520102 6f74f2b2ad6abe08
|
|
7b53a4940ff94208 9e02d3159b1c6f11 75d7fcb51abad6fd
|
|
d4f7ff4af6590b47 16c1d90e1031e1a1 e32079f531108c6b
|
|
9f79d6120319e0a3 73010e82d780a8f9 c3fdf8474840cdb6
|
|
7e4943d3808a27cd 5d9375c766a95ef4 8393c235d83ad26a
|
|
20628671793f75df aa0be78b11fed206 6506d19a769d9d32
|
|
adc0437784994359 ef5e452609353670 1c46004cf6fc252e
|
|
546e797238c73b94 b073461158301f78 1498917c32dc0ece
|
|
658a53790c667397 f7744775c2bef907 b5f7d5677b2e57fe
|
|
7c4bfd43c7ad1ee4 6fd400c3d3c3c05f e8775f055263e98a
|
|
692b49a818d0f698 4400c1db2f429fa8 9fb61d523398e1d0
|
|
2bc5c393027146c0 f326032d18cb8283 473f2b6d554df942
|
|
c7b1a0050694c7b2 bf31a816f7ff77f1 d7db873dbb6e4646
|
|
acabfa73c317a34c e6212a3469f549e6 cde71ab229a6f220
|
|
acda60832b510663 02a23d02c734bd5e 71b04fb248ca47ba
|
|
0c7b1fd28fee9b5d 86e6b1a6a2a1a43e 3831210519f54134
|
|
c96486d11ef3125f 74969785690487e0 aa5c0a310ebf9d31
|
|
95ec5543af8a6ffb 710eb0a90285960d c1ccdc10ecee9669
|
|
9171e97eae526a17 205012ab6f262e44 31ae9a70ff2ed7bd
|
|
966ef6bd4563f56a 7a14970dcabf97ae 7e4354db1ea27548
|
|
c55c11542ad07bcd 6f47a7143b86c4e6 678ce7dc6d51a1b7
|
|
75687644d6526efa 3c864f592819e7b7 f9f1bbc02ed8821a
|
|
e66019b240b41f5e ebf9475069700030 7122f7c8a8d6c0da
|
|
a264c63183238d72 0eacb86879fab9ba 8a673c51a52c8284
|
|
75e3211223cd2238 bd8b8a934af3e4dd e10e788df23ad6d8
|
|
51d68b78082ac667 a854356415e7858b e526307332990d8c
|
|
c38a5dc4cfc22a2c a2bdd9126a2ce13d 7015264921
|
|
""")
|
|
t = TLS(serverEncHS, tls_session=t.tls_session)
|
|
|
|
clientFinished = clean("""
|
|
170301003543adad e592362412fb77d7
|
|
28b181c01b77cd62 a661e4125e6f9851 826e418f4c292ec6
|
|
3254e8b0342d65db 8a7f074eed527ea6 98a6
|
|
""")
|
|
t = TLS(clientFinished, tls_session=t.tls_session.mirror())
|
|
|
|
clientRecord = clean("""
|
|
17030100131ef5c9 e7205f31a1edf9b1
|
|
3600fec1271e4f5d
|
|
""")
|
|
t = TLS(clientRecord, tls_session=t.tls_session)
|
|
|
|
serverRecord = clean("""
|
|
170301001350ff6e 907c508b6b191ff6
|
|
094faf4c0b32d6a8
|
|
""")
|
|
t = TLS(serverRecord, tls_session=t.tls_session.mirror())
|
|
|
|
alert = t.inner.msg[0]
|
|
assert(isinstance(alert, TLSAlert))
|
|
alert.level == 1 and alert.descr == 0
|
|
|
|
|
|
= Reading TLS 1.3 test session (vectors 3 from draft-ietf-tls-tls13-vectors-00)
|
|
~ crypto_advanced
|
|
from cryptography.hazmat.primitives.asymmetric.x25519 import X25519PrivateKey
|
|
|
|
x25519_client_privkey = clean("""
|
|
00b4198a84ed6a7c 218702891735239d
|
|
40b7c66505330364 3d3c67f7458ecbc9
|
|
""")
|
|
clientHello = clean("""
|
|
1603010200010001 fc03039a464db650
|
|
dcc81fed6f1fea63 5f15861574c0ed0b fb5778de7724fb92
|
|
7c5ef100003e1301 13031302c02bc02f cca9cca8c00ac009
|
|
c013c023c027c014 009eccaa00330032 006700390038006b
|
|
00160013009c002f 003c0035003d000a 0005000401000195
|
|
001500fc00000000 0000000000000000 0000000000000000
|
|
0000000000000000 0000000000000000 0000000000000000
|
|
0000000000000000 0000000000000000 0000000000000000
|
|
0000000000000000 0000000000000000 0000000000000000
|
|
0000000000000000 0000000000000000 0000000000000000
|
|
0000000000000000 0000000000000000 0000000000000000
|
|
0000000000000000 0000000000000000 0000000000000000
|
|
0000000000000000 0000000000000000 0000000000000000
|
|
0000000000000000 0000000000000000 0000000000000000
|
|
0000000000000000 0000000000000000 0000000000000000
|
|
0000000000000000 0000000000000000 0000000b00090000
|
|
06736572766572ff 01000100000a0014 0012001d00170018
|
|
0019010001010102 01030104000b0002 0100002300000028
|
|
00260024001d0020 35e58b160db6124f 01a1d2475a22b72a
|
|
bd6896701eed4c7e fd6124ee231ba458 002b0007067f1203
|
|
030302000d002000 1e04030503060302 0308040805080604
|
|
0105010601020104 0205020602020200 2d00020101
|
|
""")
|
|
t = TLS(clientHello)
|
|
privkey = X25519PrivateKey._from_private_bytes(x25519_client_privkey)
|
|
t.tls_session.tls13_client_privshares["x25519"] = privkey
|
|
|
|
x25519_server_privkey = clean("""
|
|
03d43f48ed52076f 4ce9bab73d1f39ec
|
|
689cf304075829f5 2b90f9f13bea6f34
|
|
""")
|
|
serverHello = clean("""
|
|
1603010052020000 4e7f1298e3436403
|
|
8683391cbec1039a a0fba2f496d8c8e6 327151cc94bbc5ef
|
|
7390751301002800 280024001d0020a2 0ed1b7f2d96a7f12
|
|
568f0e460bb0fc86 dc8d1db6c07d6b10 d4dc74aaac9219
|
|
""")
|
|
t = TLS(serverHello, tls_session=t.tls_session.mirror())
|
|
|
|
serverEncHS = clean("""
|
|
170301029c4e1f34 2dba17a54a09f7a1
|
|
8ffb2c6a29df17a6 db843044c52861bf 78988527ce366159
|
|
e6a24871b704d2b9 fade56488921796d 719173a753bdfec8
|
|
0554c8c15e128695 450ccfdde1204ffd 2fb1ecdcd87b8070
|
|
644eb5a6b86ec951 aba3ed314754a2f3 14d4d2620b92da1f
|
|
28f24b9559d76b67 a7b35c17cc231ba5 77a94fb2be59c74f
|
|
84c8c78bf5faf4cb b2f8a37091580743 3c67d9f4e1b1923a
|
|
3969b85a2ae9064e 34e84363aae43aa9 f58717836a017b9c
|
|
33c3ad733c2fd3ce 288ae362764403d0 102a371047d9e49d
|
|
f9b30596262b1704 f0e9839fff5641ba a7041a4bcf9e4d46
|
|
7108922fc0ea0bc1 48dab2ebdd155f51 76c632be04a7c610
|
|
3fbc92754dba7962 4f8a09f8e8d65c17 eee87f98636fbc93
|
|
bb734674b80d183c da904200a20d8f15 0a214902b6953209
|
|
aa2431c3973bda3b d92a33878baca7b9 0507f433a55f2fe8
|
|
f0db81898ebacf31 b68eaabfa27c39b6 a2453a322c005030
|
|
4e60bf53f0402b38 65b43fe5a7454c13 17a2dc76d1323fb1
|
|
aa553996876a0dfe 8e789d6adf3dc85b 0636bb58a96e6aad
|
|
851e7a6fc1dfa796 ec65e33bf9e3c05d 6de35f11e1f32731
|
|
fb9550a60cb75e90 9345eb0edb81f99f cad883cb41d4a3ef
|
|
7cbe671b92a8176b 472772be401b83a4 99b06b7ab0a1d9cd
|
|
795e5ba0b67ce2d6 5c45565028824aa2 08797f405bbcf243
|
|
27dd69a1d986032f 544b15d110e4d8c4 681cb85c09960adb
|
|
57fb9723eef0e0bb 275552af25fbdfc1 a4215adf14a9dba2
|
|
4462dd095f1a78f5 6ed6db3de139936f 14b091ab7f4adc81
|
|
c277e68bfb6fd925 d92c06c0a4ddd105 9c071073a8a2e987
|
|
f98948599f27bf6d 1f4369ac6c5a3323 2932fb8aa52ec4e1
|
|
85790dff0ef5eee0 13b4e90b5bc1cd4a c42b7ce82d856cc0
|
|
f5d1c80400e68d61 b434cec56d437141 1e31849d4cf88862
|
|
8ba288548df6a19e c4
|
|
""")
|
|
t = TLS(serverEncHS, tls_session=t.tls_session)
|
|
|
|
clientFinished = clean("""
|
|
1703010035161e94 818226d7bd618063
|
|
0804644debc52bdd 661034243217ac45 a084228c82086baa
|
|
4893ecfc969624d6 8e19d88c3e67ccb4 8bdf
|
|
""")
|
|
t = TLS(clientFinished, tls_session=t.tls_session.mirror())
|
|
|
|
serverRecord1 = clean("""
|
|
17030100bbe6b3e9 89df694688f29f5d
|
|
a42d9f56053fc6d2 f73ee23accad26f9 599ee4dcf4e0cf9e
|
|
de80128b48156a65 e5e47dee679a8401 1234862b6728fb12
|
|
be5198d5c023d6f2 0c355fc417a5eade 1aff0bf9ecba14c8
|
|
7277ea7aeb30055e a4d9b37bc12f7517 27ca7a1efc9285f8
|
|
ed5e9e3be42ff475 30f2b7347a90618b 6f7f4eba9b8b6564
|
|
f2159fcfcf09e4b6 2b4b09bb129e7c76 5c877966ca66e5cd
|
|
a84cdb6087a07fc0 50c97f275568623c 5d0f459d2b1133d1
|
|
d5d37cd441192da7
|
|
""")
|
|
t = TLS(serverRecord1, tls_session=t.tls_session.mirror())
|
|
|
|
clientRecord1 = clean("""
|
|
170301004341b540 bf5adeaf9d209001
|
|
9f0733e281964724 526678a1946852cf 6f586dffacf1151d
|
|
bf7c9262ef6ae960 4a423fff339fd7e4 0cc3e7604ae661f0
|
|
afa2f775c3668867
|
|
""")
|
|
t = TLS(clientRecord1, tls_session=t.tls_session.mirror())
|
|
app_data = t.inner.msg[0]
|
|
assert(app_data.data == b'\x00\x01\x02\x03\x04\x05\x06\x07\x08\t\n\x0b\x0c\r\x0e\x0f\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f !"#$%&\'()*+,-./01')
|
|
|
|
serverRecord2 = clean("""
|
|
17030100438c3168 1fb21f820ef0603c
|
|
dc3b9d3deedeb2bb 615aa418fb2590a0 9b0dec00c2299feb
|
|
17c4206f89ab28d2 7a605e288ac9bd69 657593addd1046be
|
|
51b23940f8746634
|
|
""")
|
|
t = TLS(serverRecord2, tls_session=t.tls_session.mirror())
|
|
app_data = t.inner.msg[0]
|
|
assert(app_data.data == b'\x00\x01\x02\x03\x04\x05\x06\x07\x08\t\n\x0b\x0c\r\x0e\x0f\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f !"#$%&\'()*+,-./01')
|
|
|
|
clientRecord2 = clean("""
|
|
17030100131ce9b1 f21ba236bca94455
|
|
ab2aad71c666534a
|
|
""")
|
|
t = TLS(clientRecord2, tls_session=t.tls_session.mirror())
|
|
alert = t.inner.msg[0]
|
|
assert(isinstance(alert, TLSAlert))
|
|
assert(alert.level == 1 and alert.descr == 0)
|
|
|
|
serverRecord3 = clean("""
|
|
1703010013aabcdb 9d293d23fb00deb7
|
|
11b562afeddffeed
|
|
""")
|
|
t = TLS(serverRecord3, tls_session=t.tls_session.mirror())
|
|
alert = t.inner.msg[0]
|
|
assert(isinstance(alert, TLSAlert))
|
|
alert.level == 1 and alert.descr == 0
|
|
|