// Copyright (C) 2021 The Qt Company Ltd. // Copyright (C) 2014 Governikus GmbH & Co. KG. // SPDX-License-Identifier: LicenseRef-Qt-Commercial OR GPL-3.0-only WITH Qt-GPL-exception-1.0 #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include "private/qhostinfo_p.h" #include "private/qiodevice_p.h" // for QIODEVICE_BUFFERSIZE #include "../../../network-settings.h" #include "../shared/tlshelpers.h" #if QT_CONFIG(openssl) #include "../shared/qopenssl_symbols.h" #endif #include "private/qtlsbackend_p.h" #include "private/qsslsocket_p.h" #include "private/qsslconfiguration_p.h" QT_WARNING_PUSH QT_WARNING_DISABLE_DEPRECATED // make these enum values available without causing deprecation warnings: namespace Test { #define COPY(tag, v) \ constexpr auto tag ## V ## v = QSsl:: tag ## V ## v ; \ constexpr auto tag ## V ## v ## OrLater = QSsl:: tag ## V ## v ## OrLater ; \ /* end */ COPY(Tls, 1_0) COPY(Dtls, 1_0) COPY(Tls, 1_1) #undef COPY } // namespace Test QT_WARNING_POP Q_DECLARE_METATYPE(QSslSocket::SslMode) typedef QList SslErrorList; Q_DECLARE_METATYPE(SslErrorList) Q_DECLARE_METATYPE(QSslError) Q_DECLARE_METATYPE(QSslKey) Q_DECLARE_METATYPE(QSsl::SslProtocol) Q_DECLARE_METATYPE(QSslSocket::PeerVerifyMode); typedef QSharedPointer QSslSocketPtr; #if defined Q_OS_HPUX && defined Q_CC_GNU // This error is delivered every time we try to use the fluke CA // certificate. For now we work around this bug. Task 202317. #define QSSLSOCKET_CERTUNTRUSTED_WORKAROUND #endif // Use this cipher to force PSK key sharing. // Also, it's a cipher w/o auth, to check that we emit the signals warning // about the identity of the peer. #if QT_CONFIG(openssl) static const QString PSK_CIPHER_WITHOUT_AUTH = QStringLiteral("PSK-AES256-CBC-SHA"); static const quint16 PSK_SERVER_PORT = 4433; static const QByteArray PSK_CLIENT_PRESHAREDKEY = QByteArrayLiteral("\x1a\x2b\x3c\x4d\x5e\x6f"); static const QByteArray PSK_SERVER_IDENTITY_HINT = QByteArrayLiteral("QtTestServerHint"); static const QByteArray PSK_CLIENT_IDENTITY = QByteArrayLiteral("Client_identity"); #endif // QT_CONFIG(openssl) QT_BEGIN_NAMESPACE void qt_ForceTlsSecurityLevel(); QT_END_NAMESPACE class tst_QSslSocket : public QObject { Q_OBJECT int proxyAuthCalled; public: tst_QSslSocket(); static void enterLoop(int secs) { ++loopLevel; QTestEventLoop::instance().enterLoop(secs); } static bool timeout() { return QTestEventLoop::instance().timeout(); } #if QT_CONFIG(ssl) QSslSocketPtr newSocket(); #if QT_CONFIG(openssl) enum PskConnectTestType { PskConnectDoNotHandlePsk, PskConnectEmptyCredentials, PskConnectWrongCredentials, PskConnectWrongIdentity, PskConnectWrongPreSharedKey, PskConnectRightCredentialsPeerVerifyFailure, PskConnectRightCredentialsVerifyPeer, PskConnectRightCredentialsDoNotVerifyPeer, }; #endif // QT_CONFIG(openssl) #endif // QT_CONFIG(ssl) public slots: void initTestCase_data(); void initTestCase(); void init(); void cleanup(); #if QT_CONFIG(networkproxy) void proxyAuthenticationRequired(const QNetworkProxy &, QAuthenticator *auth); #endif #if QT_CONFIG(ssl) private slots: void activeBackend(); void backends(); void constructing(); void configNoOnDemandLoad(); void simpleConnect(); void simpleConnectWithIgnore(); // API tests void sslErrors_data(); void sslErrors(); void ciphers(); #if QT_CONFIG(securetransport) void tls13Ciphers(); #endif // QT_CONFIG(securetransport) void connectToHostEncrypted(); void connectToHostEncryptedWithVerificationPeerName(); void sessionCipher(); void localCertificate(); void mode(); void peerCertificate(); void peerCertificateChain(); void privateKey(); #if QT_CONFIG(openssl) void privateKeyOpaque(); #endif void protocol(); void protocolServerSide_data(); void protocolServerSide(); #if QT_CONFIG(openssl) void serverCipherPreferences(); #endif void setCaCertificates(); void setLocalCertificate(); void localCertificateChain(); void setLocalCertificateChain(); void tlsConfiguration(); void setSocketDescriptor(); void setSslConfiguration_data(); void setSslConfiguration(); void waitForEncrypted(); void waitForEncryptedMinusOne(); void waitForConnectedEncryptedReadyRead(); void startClientEncryption(); void startServerEncryption(); void addDefaultCaCertificate(); void defaultCaCertificates(); void defaultCiphers(); void resetDefaultCiphers(); void setDefaultCaCertificates(); void setDefaultCiphers(); void supportedCiphers(); void systemCaCertificates(); void wildcardCertificateNames(); void isMatchingHostname(); void wildcard(); void setEmptyKey(); void spontaneousWrite(); void setReadBufferSize(); void setReadBufferSize_task_250027(); void waitForMinusOne(); void verifyMode(); void verifyDepth(); void verifyAndDefaultConfiguration(); void disconnectFromHostWhenConnecting(); void disconnectFromHostWhenConnected(); #if QT_CONFIG(openssl) void closeWhileEmittingSocketError(); #endif void resetProxy(); void ignoreSslErrorsList_data(); void ignoreSslErrorsList(); void ignoreSslErrorsListWithSlot_data(); void ignoreSslErrorsListWithSlot(); void abortOnSslErrors(); void readFromClosedSocket(); void writeBigChunk(); void blacklistedCertificates(); void versionAccessors(); void encryptWithoutConnecting(); void resume_data(); void resume(); void qtbug18498_peek(); void qtbug18498_peek2(); void dhServer(); #if QT_CONFIG(openssl) void dhServerCustomParamsNull(); void dhServerCustomParams(); #endif // QT_CONFIG(openssl) void ecdhServer(); void verifyClientCertificate_data(); void verifyClientCertificate(); void readBufferMaxSize(); void allowedProtocolNegotiation(); #if QT_CONFIG(openssl) void simplePskConnect_data(); void simplePskConnect(); void ephemeralServerKey_data(); void ephemeralServerKey(); void pskServer(); void forwardReadChannelFinished(); void signatureAlgorithm_data(); void signatureAlgorithm(); #endif // QT_CONFIG(openssl) void unsupportedProtocols_data(); void unsupportedProtocols(); void oldErrorsOnSocketReuse(); #if QT_CONFIG(openssl) void alertMissingCertificate(); void alertInvalidCertificate(); void selfSignedCertificates_data(); void selfSignedCertificates(); void pskHandshake_data(); void pskHandshake(); #endif // openssl void setEmptyDefaultConfiguration(); // this test should be last protected slots: static void exitLoop() { // Safe exit - if we aren't in an event loop, don't // exit one. if (loopLevel > 0) { --loopLevel; QTestEventLoop::instance().exitLoop(); } } void ignoreErrorSlot() { socket->ignoreSslErrors(); } void abortOnErrorSlot() { QSslSocket *sock = static_cast(sender()); sock->abort(); } void untrustedWorkaroundSlot(const QList &errors) { if (errors.size() == 1 && (errors.first().error() == QSslError::CertificateUntrusted || errors.first().error() == QSslError::SelfSignedCertificate)) socket->ignoreSslErrors(); } void ignoreErrorListSlot(const QList &errors); private: QSslSocket *socket; QList storedExpectedSslErrors; bool isTestingOpenSsl = false; bool opensslResolved = false; bool isTestingSecureTransport = false; bool isTestingSchannel = false; QSslError::SslError flukeCertificateError = QSslError::CertificateUntrusted; bool hasServerAlpn = false; #endif // QT_CONFIG(ssl) private: static int loopLevel; public: static QString testDataDir; bool supportsTls13() const { if (isTestingOpenSsl) { #ifdef TLS1_3_VERSION return true; #endif } if (isTestingSchannel) { // Copied from qtls_schannel.cpp #supportsTls13() static bool supported = []() { const auto current = QOperatingSystemVersion::current(); const auto minimum = QOperatingSystemVersion(QOperatingSystemVersion::Windows, 10, 0, 20221); return current >= minimum; }(); return supported; } return false; } }; QString tst_QSslSocket::testDataDir; #if QT_CONFIG(ssl) #if QT_CONFIG(openssl) Q_DECLARE_METATYPE(tst_QSslSocket::PskConnectTestType) #endif // QT_CONFIG(openssl) #endif // QT_CONFIG(ssl) int tst_QSslSocket::loopLevel = 0; namespace { QString httpServerCertChainPath() { // DOCKERTODO: note how we use CA certificate on the real server. The docker container // is using a different cert with a "special" CN. Check if it's important! #ifdef QT_TEST_SERVER return tst_QSslSocket::testDataDir + QStringLiteral("certs/qt-test-server-cert.pem"); #else return tst_QSslSocket::testDataDir + QStringLiteral("certs/qt-test-server-cacert.pem"); #endif // QT_TEST_SERVER } } // unnamed namespace tst_QSslSocket::tst_QSslSocket() { #if QT_CONFIG(ssl) qRegisterMetaType >("QList"); qRegisterMetaType("QSslError"); qRegisterMetaType("QAbstractSocket::SocketState"); qRegisterMetaType("QAbstractSocket::SocketError"); #if QT_CONFIG(openssl) qRegisterMetaType(); qRegisterMetaType(); #endif // QT_CONFIG(openssl) #endif // QT_CONFIG(ssl) } enum ProxyTests { NoProxy = 0x00, Socks5Proxy = 0x01, HttpProxy = 0x02, TypeMask = 0x0f, NoAuth = 0x00, AuthBasic = 0x10, AuthNtlm = 0x20, AuthMask = 0xf0 }; void tst_QSslSocket::initTestCase_data() { QTest::addColumn("setProxy"); QTest::addColumn("proxyType"); QTest::newRow("WithoutProxy") << false << 0; QTest::newRow("WithSocks5Proxy") << true << int(Socks5Proxy); QTest::newRow("WithSocks5ProxyAuth") << true << int(Socks5Proxy | AuthBasic); QTest::newRow("WithHttpProxy") << true << int(HttpProxy); QTest::newRow("WithHttpProxyBasicAuth") << true << int(HttpProxy | AuthBasic); // uncomment the line below when NTLM works // QTest::newRow("WithHttpProxyNtlmAuth") << true << int(HttpProxy | AuthNtlm); } void tst_QSslSocket::initTestCase() { testDataDir = QFileInfo(QFINDTESTDATA("certs")).absolutePath(); if (testDataDir.isEmpty()) testDataDir = QCoreApplication::applicationDirPath(); if (!testDataDir.endsWith(QLatin1String("/"))) testDataDir += QLatin1String("/"); hasServerAlpn = QSslSocket::supportedFeatures().contains(QSsl::SupportedFeature::ServerSideAlpn); // Several plugins (TLS-backends) can co-exist. QSslSocket would implicitly // select 'openssl' if available, and if not: 'securetransport' (Darwin) or // 'schannel' (Windows). Check what we actually have: const auto &tlsBackends = QSslSocket::availableBackends(); if (tlsBackends.contains(QTlsBackend::builtinBackendNames[QTlsBackend::nameIndexOpenSSL])) { isTestingOpenSsl = true; flukeCertificateError = QSslError::SelfSignedCertificate; #if QT_CONFIG(openssl) opensslResolved = qt_auto_test_resolve_OpenSSL_symbols(); #else opensslResolved = false; // Not 'unused variable' anymore. #endif } else if (tlsBackends.contains(QTlsBackend::builtinBackendNames[QTlsBackend::nameIndexSchannel])) { isTestingSchannel = true; } else { QVERIFY(tlsBackends.contains(QTlsBackend::builtinBackendNames[QTlsBackend::nameIndexSecureTransport])); isTestingSecureTransport = true; } #if QT_CONFIG(ssl) qDebug("Using SSL library %s (%ld)", qPrintable(QSslSocket::sslLibraryVersionString()), QSslSocket::sslLibraryVersionNumber()); #ifdef QT_TEST_SERVER QVERIFY(QtNetworkSettings::verifyConnection(QtNetworkSettings::socksProxyServerName(), 1080)); QVERIFY(QtNetworkSettings::verifyConnection(QtNetworkSettings::socksProxyServerName(), 1081)); QVERIFY(QtNetworkSettings::verifyConnection(QtNetworkSettings::httpProxyServerName(), 3128)); QVERIFY(QtNetworkSettings::verifyConnection(QtNetworkSettings::httpProxyServerName(), 3129)); QVERIFY(QtNetworkSettings::verifyConnection(QtNetworkSettings::httpProxyServerName(), 3130)); QVERIFY(QtNetworkSettings::verifyConnection(QtNetworkSettings::httpServerName(), 443)); QVERIFY(QtNetworkSettings::verifyConnection(QtNetworkSettings::imapServerName(), 993)); QVERIFY(QtNetworkSettings::verifyConnection(QtNetworkSettings::echoServerName(), 13)); #else if (!QtNetworkSettings::verifyTestNetworkSettings()) QSKIP("No network test server available"); #endif // QT_TEST_SERVER #endif // QT_CONFIG(ssl) } void tst_QSslSocket::init() { QFETCH_GLOBAL(bool, setProxy); if (setProxy) { #if QT_CONFIG(networkproxy) QFETCH_GLOBAL(int, proxyType); const QString socksProxyAddr = QtNetworkSettings::socksProxyServerIp().toString(); const QString httpProxyAddr = QtNetworkSettings::httpProxyServerIp().toString(); QNetworkProxy proxy; switch (proxyType) { case Socks5Proxy: proxy = QNetworkProxy(QNetworkProxy::Socks5Proxy, socksProxyAddr, 1080); break; case Socks5Proxy | AuthBasic: proxy = QNetworkProxy(QNetworkProxy::Socks5Proxy, socksProxyAddr, 1081); break; case HttpProxy | NoAuth: proxy = QNetworkProxy(QNetworkProxy::HttpProxy, httpProxyAddr, 3128); break; case HttpProxy | AuthBasic: proxy = QNetworkProxy(QNetworkProxy::HttpProxy, httpProxyAddr, 3129); break; case HttpProxy | AuthNtlm: proxy = QNetworkProxy(QNetworkProxy::HttpProxy, httpProxyAddr, 3130); break; } QNetworkProxy::setApplicationProxy(proxy); #else QSKIP("No proxy support"); #endif // QT_CONFIG(networkproxy) } QT_PREPEND_NAMESPACE(qt_ForceTlsSecurityLevel)(); qt_qhostinfo_clear_cache(); } void tst_QSslSocket::cleanup() { #if QT_CONFIG(networkproxy) QNetworkProxy::setApplicationProxy(QNetworkProxy::DefaultProxy); #endif } #if QT_CONFIG(ssl) QSslSocketPtr tst_QSslSocket::newSocket() { const auto socket = QSslSocketPtr::create(); proxyAuthCalled = 0; connect(socket.data(), SIGNAL(proxyAuthenticationRequired(QNetworkProxy,QAuthenticator*)), SLOT(proxyAuthenticationRequired(QNetworkProxy,QAuthenticator*)), Qt::DirectConnection); return socket; } #endif // QT_CONFIG(ssl) #if QT_CONFIG(networkproxy) void tst_QSslSocket::proxyAuthenticationRequired(const QNetworkProxy &, QAuthenticator *auth) { ++proxyAuthCalled; auth->setUser("qsockstest"); auth->setPassword("password"); } #endif // QT_CONFIG(networkproxy) #if QT_CONFIG(ssl) void tst_QSslSocket::activeBackend() { QFETCH_GLOBAL(const bool, setProxy); if (setProxy) // Not interesting for backend test. return; // We cannot set non-existing as active: const QString nonExistingBackend = QStringLiteral("TheQtTLS"); QCOMPARE(QSslSocket::setActiveBackend(nonExistingBackend), false); QCOMPARE(QSslSocket::supportedProtocols(nonExistingBackend).size(), 0); QCOMPARE(QSslSocket::supportedFeatures(nonExistingBackend), QList()); QCOMPARE(QSslSocket::implementedClasses(nonExistingBackend), QList()); const QString backendName = QSslSocket::activeBackend(); // Implemented by all our existing backends: const auto implemented = QSsl::ImplementedClass::Socket; const auto supportedFt = QSsl::SupportedFeature::ClientSideAlpn; QVERIFY(QSslSocket::availableBackends().contains(backendName)); QCOMPARE(QSslSocket::setActiveBackend(backendName), true); QCOMPARE(QSslSocket::activeBackend(), backendName); QCOMPARE(QSslSocket::setActiveBackend(backendName), true); // We can do it again. QCOMPARE(QSslSocket::activeBackend(), backendName); const auto protocols = QSslSocket::supportedProtocols(); QVERIFY(protocols.size() > 0); // 'Any' and 'Secure', since they are always present: QVERIFY(protocols.contains(QSsl::AnyProtocol)); QVERIFY(protocols.contains(QSsl::SecureProtocols)); const auto protocolsForNamed = QSslSocket::supportedProtocols(backendName); QCOMPARE(protocols, protocolsForNamed); // Any and secure, new versions are coming, old // go away, nothing more specific. QVERIFY(protocolsForNamed.contains(QSsl::AnyProtocol)); QVERIFY(protocolsForNamed.contains(QSsl::SecureProtocols)); QCOMPARE(QSslSocket::isProtocolSupported(QSsl::SecureProtocols), true); QCOMPARE(QSslSocket::isProtocolSupported(QSsl::SecureProtocols, backendName), true); const auto classes = QSslSocket::implementedClasses(); QVERIFY(classes.contains(implemented)); QVERIFY(QSslSocket::isClassImplemented(implemented)); QVERIFY(QSslSocket::isClassImplemented(implemented, backendName)); const auto features = QSslSocket::supportedFeatures(); QVERIFY(features.contains(QSsl::SupportedFeature(supportedFt))); QVERIFY(QSslSocket::isFeatureSupported(QSsl::SupportedFeature(supportedFt))); QVERIFY(QSslSocket::isFeatureSupported(QSsl::SupportedFeature(supportedFt), backendName)); } namespace { struct MockTlsBackend : QTlsBackend { MockTlsBackend(const QString &mockName) : name(mockName) { } QString backendName() const override { return name; } QList supportedFeatures() const override { return features; } QList supportedProtocols() const override { return protocols; } QList implementedClasses() const override { return classes; } QString name; QList classes; QList features; QList protocols; }; } // Unnamed backend. void tst_QSslSocket::backends() { QFETCH_GLOBAL(const bool, setProxy); if (setProxy) // Not interesting for backend test. return; // We are here, protected by QT_CONFIG(ssl). Some backend must be pre-existing. // Let's test the 'real' backend: auto backendNames = QTlsBackend::availableBackendNames(); const auto sizeBefore = backendNames.size(); QVERIFY(sizeBefore > 0); const QString tlsBackend = QSslSocket::activeBackend(); QVERIFY(tlsBackend == QTlsBackend::builtinBackendNames[QTlsBackend::nameIndexOpenSSL] || tlsBackend == QTlsBackend::builtinBackendNames[QTlsBackend::nameIndexSchannel] || tlsBackend == QTlsBackend::builtinBackendNames[QTlsBackend::nameIndexSecureTransport]); const auto builtinProtocols = QSslSocket::supportedProtocols(tlsBackend); QVERIFY(builtinProtocols.contains(QSsl::SecureProtocols)); // Socket and ALPN are supported by all our backends: const auto builtinClasses = QSslSocket::implementedClasses(tlsBackend); QVERIFY(builtinClasses.contains(QSsl::ImplementedClass::Socket)); const auto builtinFeatures = QSslSocket::supportedFeatures(tlsBackend); QVERIFY(builtinFeatures.contains(QSsl::SupportedFeature::ClientSideAlpn)); // Verify that non-dummy backend can be found: auto *systemBackend = QTlsBackend::findBackend(tlsBackend); QVERIFY(systemBackend); const auto protocols = QList{QSsl::SecureProtocols}; const auto classes = QList{QSsl::ImplementedClass::Socket}; const auto features = QList{QSsl::SupportedFeature::CertificateVerification}; const QString nameA = QStringLiteral("backend A"); const QString nameB = QStringLiteral("backend B"); const QString nonExisting = QStringLiteral("non-existing backend"); QVERIFY(!backendNames.contains(nameA)); QVERIFY(!backendNames.contains(nameB)); QVERIFY(!backendNames.contains(nonExisting)); { MockTlsBackend factoryA(nameA); backendNames = QTlsBackend::availableBackendNames(); QVERIFY(backendNames.contains(nameA)); QVERIFY(!backendNames.contains(nameB)); QVERIFY(!backendNames.contains(nonExisting)); const auto *backendA = QTlsBackend::findBackend(nameA); QVERIFY(backendA); QCOMPARE(backendA->backendName(), nameA); QCOMPARE(factoryA.supportedFeatures().size(), 0); QCOMPARE(factoryA.supportedProtocols().size(), 0); QCOMPARE(factoryA.implementedClasses().size(), 0); factoryA.protocols = protocols; factoryA.classes = classes; factoryA.features = features; // It's an overrider in some re-implemented factory: QCOMPARE(factoryA.supportedProtocols(), protocols); QCOMPARE(factoryA.supportedFeatures(), features); QCOMPARE(factoryA.implementedClasses(), classes); // That's a helper function (static member function): QCOMPARE(QTlsBackend::supportedProtocols(nameA), protocols); QCOMPARE(QTlsBackend::supportedFeatures(nameA), features); QCOMPARE(QTlsBackend::implementedClasses(nameA), classes); MockTlsBackend factoryB(nameB); QVERIFY(QTlsBackend::availableBackendNames().contains(nameA)); QVERIFY(QTlsBackend::availableBackendNames().contains(nameB)); QVERIFY(!QTlsBackend::availableBackendNames().contains(nonExisting)); const auto *nullBackend = QTlsBackend::findBackend(nonExisting); QCOMPARE(nullBackend, nullptr); } backendNames = QTlsBackend::availableBackendNames(); QCOMPARE(backendNames.size(), sizeBefore); // Check we cleaned up our factories: QVERIFY(!backendNames.contains(nameA)); QVERIFY(!backendNames.contains(nameB)); } void tst_QSslSocket::constructing() { const char readNotOpenMessage[] = "QIODevice::read (QSslSocket): device not open"; const char writeNotOpenMessage[] = "QIODevice::write (QSslSocket): device not open"; if (!QSslSocket::supportsSsl()) return; QSslSocket socket; QCOMPARE(socket.state(), QSslSocket::UnconnectedState); QCOMPARE(socket.mode(), QSslSocket::UnencryptedMode); QVERIFY(!socket.isEncrypted()); QCOMPARE(socket.bytesAvailable(), qint64(0)); QCOMPARE(socket.bytesToWrite(), qint64(0)); QVERIFY(!socket.canReadLine()); QVERIFY(socket.atEnd()); QCOMPARE(socket.localCertificate(), QSslCertificate()); QCOMPARE(socket.sslConfiguration(), QSslConfiguration::defaultConfiguration()); QCOMPARE(socket.errorString(), QString("Unknown error")); char c = '\0'; QTest::ignoreMessage(QtWarningMsg, readNotOpenMessage); QVERIFY(!socket.getChar(&c)); QCOMPARE(c, '\0'); QVERIFY(!socket.isOpen()); QVERIFY(!socket.isReadable()); QVERIFY(socket.isSequential()); QVERIFY(!socket.isTextModeEnabled()); QVERIFY(!socket.isWritable()); QCOMPARE(socket.openMode(), QIODevice::NotOpen); QTest::ignoreMessage(QtWarningMsg, "QIODevice::peek (QSslSocket): device not open"); QVERIFY(socket.peek(2).isEmpty()); QCOMPARE(socket.pos(), qint64(0)); QTest::ignoreMessage(QtWarningMsg, writeNotOpenMessage); QVERIFY(!socket.putChar('c')); QTest::ignoreMessage(QtWarningMsg, readNotOpenMessage); QVERIFY(socket.read(2).isEmpty()); QTest::ignoreMessage(QtWarningMsg, readNotOpenMessage); QCOMPARE(socket.read(0, 0), qint64(-1)); QTest::ignoreMessage(QtWarningMsg, readNotOpenMessage); QVERIFY(socket.readAll().isEmpty()); QTest::ignoreMessage(QtWarningMsg, "QIODevice::readLine (QSslSocket): device not open"); char buf[10]; QCOMPARE(socket.readLine(buf, sizeof(buf)), qint64(-1)); QTest::ignoreMessage(QtWarningMsg, "QIODevice::seek (QSslSocket): Cannot call seek on a sequential device"); QVERIFY(!socket.reset()); QTest::ignoreMessage(QtWarningMsg, "QIODevice::seek (QSslSocket): Cannot call seek on a sequential device"); QVERIFY(!socket.seek(2)); QCOMPARE(socket.size(), qint64(0)); QVERIFY(!socket.waitForBytesWritten(10)); QVERIFY(!socket.waitForReadyRead(10)); QTest::ignoreMessage(QtWarningMsg, writeNotOpenMessage); QCOMPARE(socket.write(0, 0), qint64(-1)); QTest::ignoreMessage(QtWarningMsg, writeNotOpenMessage); QCOMPARE(socket.write(QByteArray()), qint64(-1)); QCOMPARE(socket.error(), QAbstractSocket::UnknownSocketError); QVERIFY(!socket.flush()); QVERIFY(!socket.isValid()); QCOMPARE(socket.localAddress(), QHostAddress()); QCOMPARE(socket.localPort(), quint16(0)); QCOMPARE(socket.peerAddress(), QHostAddress()); QVERIFY(socket.peerName().isEmpty()); QCOMPARE(socket.peerPort(), quint16(0)); #if QT_CONFIG(networkproxy) QCOMPARE(socket.proxy().type(), QNetworkProxy::DefaultProxy); #endif QCOMPARE(socket.readBufferSize(), qint64(0)); QCOMPARE(socket.socketDescriptor(), qintptr(-1)); QCOMPARE(socket.socketType(), QAbstractSocket::TcpSocket); QVERIFY(!socket.waitForConnected(10)); QTest::ignoreMessage(QtWarningMsg, "QSslSocket::waitForDisconnected() is not allowed in UnconnectedState"); QVERIFY(!socket.waitForDisconnected(10)); QCOMPARE(socket.protocol(), QSsl::SecureProtocols); QSslConfiguration savedDefault = QSslConfiguration::defaultConfiguration(); auto sslConfig = socket.sslConfiguration(); sslConfig.setCaCertificates(QSslConfiguration::systemCaCertificates()); socket.setSslConfiguration(sslConfig); auto defaultConfig = QSslConfiguration::defaultConfiguration(); defaultConfig.setCaCertificates(QList()); defaultConfig.setCiphers(QList()); QSslConfiguration::setDefaultConfiguration(defaultConfig); QVERIFY(!socket.sslConfiguration().caCertificates().isEmpty()); QVERIFY(!socket.sslConfiguration().ciphers().isEmpty()); // verify the default as well: QVERIFY(QSslConfiguration::defaultConfiguration().caCertificates().isEmpty()); QVERIFY(QSslConfiguration::defaultConfiguration().ciphers().isEmpty()); QSslConfiguration::setDefaultConfiguration(savedDefault); } void tst_QSslSocket::configNoOnDemandLoad() { QFETCH_GLOBAL(bool, setProxy); if (setProxy) return; // NoProxy is enough. // We noticed a peculiar situation, where a configuration // set on a socket is not equal to the configuration we // get back from the socket afterwards. auto customConfig = QSslConfiguration::defaultConfiguration(); // Setting CA certificates disables loading root certificates // during verification: customConfig.setCaCertificates(customConfig.caCertificates()); QSslSocket socket; socket.setSslConfiguration(customConfig); QCOMPARE(customConfig, socket.sslConfiguration()); } static void downgrade_TLS_QTQAINFRA_4499(QSslSocket &socket) { // Set TLS 1.0 or above because the server doesn't support TLS 1.2 or above // QTQAINFRA-4499 QSslConfiguration config = socket.sslConfiguration(); config.setProtocol(Test::TlsV1_0OrLater); socket.setSslConfiguration(config); } void tst_QSslSocket::simpleConnect() { if (!QSslSocket::supportsSsl()) return; QFETCH_GLOBAL(bool, setProxy); if (setProxy) return; QSslSocket socket; downgrade_TLS_QTQAINFRA_4499(socket); QSignalSpy connectedSpy(&socket, SIGNAL(connected())); QSignalSpy hostFoundSpy(&socket, SIGNAL(hostFound())); QSignalSpy disconnectedSpy(&socket, SIGNAL(disconnected())); QSignalSpy connectionEncryptedSpy(&socket, SIGNAL(encrypted())); QSignalSpy sslErrorsSpy(&socket, SIGNAL(sslErrors(QList))); connect(&socket, SIGNAL(connected()), this, SLOT(exitLoop())); connect(&socket, SIGNAL(disconnected()), this, SLOT(exitLoop())); connect(&socket, SIGNAL(modeChanged(QSslSocket::SslMode)), this, SLOT(exitLoop())); connect(&socket, SIGNAL(encrypted()), this, SLOT(exitLoop())); connect(&socket, SIGNAL(stateChanged(QAbstractSocket::SocketState)), this, SLOT(exitLoop())); connect(&socket, SIGNAL(sslErrors(QList)), this, SLOT(exitLoop())); // Start connecting socket.connectToHost(QtNetworkSettings::imapServerName(), 993); QCOMPARE(socket.state(), QAbstractSocket::HostLookupState); enterLoop(10); // Entered connecting state QCOMPARE(socket.state(), QAbstractSocket::ConnectingState); QCOMPARE(connectedSpy.size(), 0); QCOMPARE(hostFoundSpy.size(), 1); QCOMPARE(disconnectedSpy.size(), 0); enterLoop(10); // Entered connected state QCOMPARE(socket.state(), QAbstractSocket::ConnectedState); QCOMPARE(socket.mode(), QSslSocket::UnencryptedMode); QVERIFY(!socket.isEncrypted()); QCOMPARE(connectedSpy.size(), 1); QCOMPARE(hostFoundSpy.size(), 1); QCOMPARE(disconnectedSpy.size(), 0); // Enter encrypted mode socket.startClientEncryption(); QCOMPARE(socket.mode(), QSslSocket::SslClientMode); QVERIFY(!socket.isEncrypted()); QCOMPARE(connectionEncryptedSpy.size(), 0); QCOMPARE(sslErrorsSpy.size(), 0); // Starting handshake enterLoop(10); QCOMPARE(sslErrorsSpy.size(), 1); QCOMPARE(connectionEncryptedSpy.size(), 0); QVERIFY(!socket.isEncrypted()); QCOMPARE(socket.state(), QAbstractSocket::UnconnectedState); } void tst_QSslSocket::simpleConnectWithIgnore() { if (!QSslSocket::supportsSsl()) return; QFETCH_GLOBAL(bool, setProxy); if (setProxy) return; QSslSocket socket; this->socket = &socket; QSignalSpy encryptedSpy(&socket, SIGNAL(encrypted())); QSignalSpy sslErrorsSpy(&socket, SIGNAL(sslErrors(QList))); downgrade_TLS_QTQAINFRA_4499(socket); connect(&socket, SIGNAL(readyRead()), this, SLOT(exitLoop())); connect(&socket, SIGNAL(encrypted()), this, SLOT(exitLoop())); connect(&socket, SIGNAL(connected()), this, SLOT(exitLoop())); connect(&socket, SIGNAL(sslErrors(QList)), this, SLOT(ignoreErrorSlot())); connect(&socket, SIGNAL(sslErrors(QList)), this, SLOT(exitLoop())); // Start connecting socket.connectToHost(QtNetworkSettings::imapServerName(), 993); QVERIFY(socket.state() != QAbstractSocket::UnconnectedState); // something must be in progress enterLoop(10); // Start handshake QCOMPARE(socket.state(), QAbstractSocket::ConnectedState); socket.startClientEncryption(); enterLoop(10); // Done; encryption should be enabled. QCOMPARE(sslErrorsSpy.size(), 1); QVERIFY(socket.isEncrypted()); QCOMPARE(socket.state(), QAbstractSocket::ConnectedState); QCOMPARE(encryptedSpy.size(), 1); // Wait for incoming data if (!socket.canReadLine()) enterLoop(10); QByteArray data = socket.readAll(); socket.disconnectFromHost(); QVERIFY2(QtNetworkSettings::compareReplyIMAPSSL(data), data.constData()); } void tst_QSslSocket::sslErrors_data() { QTest::addColumn("host"); QTest::addColumn("port"); QString name = QtNetworkSettings::serverLocalName(); QTest::newRow(qPrintable(name)) << name << 993; name = QtNetworkSettings::httpServerIp().toString(); QTest::newRow(qPrintable(name)) << name << 443; } void tst_QSslSocket::sslErrors() { QFETCH(QString, host); QFETCH(int, port); QSslSocketPtr socket = newSocket(); QVERIFY(socket); downgrade_TLS_QTQAINFRA_4499(*socket); QSignalSpy sslErrorsSpy(socket.data(), SIGNAL(sslErrors(QList))); QSignalSpy peerVerifyErrorSpy(socket.data(), SIGNAL(peerVerifyError(QSslError))); #ifdef QT_TEST_SERVER // On the old test server we had the same certificate on different services. // The idea of this test is to fail with 'HostNameMismatch', when we're using // either serverLocalName() or IP address directly. With Docker we connect // to IMAP server, and we have to connect using imapServerName() and passing // 'host' as peerVerificationName to the overload of connectToHostEncrypted(). if (port == 993) { socket->connectToHostEncrypted(QtNetworkSettings::imapServerName(), port, host); } else #endif // QT_TEST_SERVER { socket->connectToHostEncrypted(host, port); } if (!socket->waitForConnected()) QSKIP("Skipping flaky test - See QTBUG-29941"); socket->waitForEncrypted(10000); // check the SSL errors contain HostNameMismatch and an error due to // the certificate being self-signed SslErrorList sslErrors; const auto socketSslErrors = socket->sslHandshakeErrors(); for (const QSslError &err : socketSslErrors) sslErrors << err.error(); std::sort(sslErrors.begin(), sslErrors.end()); QVERIFY(sslErrors.contains(QSslError::HostNameMismatch)); // Non-OpenSSL backends are not able to report a specific error code // for self-signed certificates. QVERIFY(sslErrors.contains(flukeCertificateError)); // check the same errors were emitted by sslErrors QVERIFY(!sslErrorsSpy.isEmpty()); SslErrorList emittedErrors; const auto sslErrorsSpyErrors = qvariant_cast >(std::as_const(sslErrorsSpy).first().first()); for (const QSslError &err : sslErrorsSpyErrors) emittedErrors << err.error(); std::sort(emittedErrors.begin(), emittedErrors.end()); QCOMPARE(sslErrors, emittedErrors); // check the same errors were emitted by peerVerifyError QVERIFY(!peerVerifyErrorSpy.isEmpty()); SslErrorList peerErrors; const QList &peerVerifyList = peerVerifyErrorSpy; for (const QVariantList &args : peerVerifyList) peerErrors << qvariant_cast(args.first()).error(); std::sort(peerErrors.begin(), peerErrors.end()); QCOMPARE(sslErrors, peerErrors); } void tst_QSslSocket::ciphers() { if (!QSslSocket::supportsSsl()) return; QFETCH_GLOBAL(const bool, setProxy); if (setProxy) { // KISS(mart), we don't connect, no need to test the same thing // many times! return; } QSslSocket socket; QCOMPARE(socket.sslConfiguration().ciphers(), QSslConfiguration::defaultConfiguration().ciphers()); auto sslConfig = socket.sslConfiguration(); sslConfig.setCiphers(QList()); socket.setSslConfiguration(sslConfig); QVERIFY(socket.sslConfiguration().ciphers().isEmpty()); sslConfig.setCiphers(QSslConfiguration::defaultConfiguration().ciphers()); socket.setSslConfiguration(sslConfig); QCOMPARE(socket.sslConfiguration().ciphers(), QSslConfiguration::defaultConfiguration().ciphers()); sslConfig.setCiphers(QSslConfiguration::defaultConfiguration().ciphers()); socket.setSslConfiguration(sslConfig); QCOMPARE(socket.sslConfiguration().ciphers(), QSslConfiguration::defaultConfiguration().ciphers()); sslConfig = QSslConfiguration::defaultConfiguration(); QList ciphers; QString ciphersAsString; const auto &supported = sslConfig.supportedCiphers(); for (const auto &cipher : supported) { if (cipher.isNull() || !cipher.name().size()) continue; if (ciphers.size() > 0) ciphersAsString += QStringLiteral(":"); ciphersAsString += cipher.name(); ciphers.append(cipher); if (ciphers.size() == 3) // 3 should be enough. break; } if (!ciphers.size()) QSKIP("No proper ciphersuite was found to test 'setCiphers'"); if (isTestingSchannel) { qWarning("Schannel doesn't support setting ciphers from a cipher-string."); } else { sslConfig.setCiphers(ciphersAsString); socket.setSslConfiguration(sslConfig); QCOMPARE(ciphers, socket.sslConfiguration().ciphers()); } sslConfig.setCiphers(ciphers); socket.setSslConfiguration(sslConfig); QCOMPARE(ciphers, socket.sslConfiguration().ciphers()); if (isTestingOpenSsl) { for (const auto &cipher : ciphers) { if (cipher.name().size() && cipher.protocol() != QSsl::UnknownProtocol) { const QSslCipher aCopy(cipher.name(), cipher.protocol()); QCOMPARE(aCopy, cipher); break; } } } } #if QT_CONFIG(securetransport) void tst_QSslSocket::tls13Ciphers() { // SecureTransport introduced several new ciphers under // "TLS 1.3 ciphersuites" section. Since Qt 6 we respect // the ciphers from QSslConfiguration. In case of default // configuration, these are the same we report and we // were failing (for historical reasons) to report those // TLS 1.3 suites when creating default QSslConfiguration. // Check we now have them. if (!isTestingSecureTransport) QSKIP("The feature 'securetransport' was enabled, but active backend is not \"securetransport\""); QFETCH_GLOBAL(const bool, setProxy); if (setProxy) return; const auto suites = QSslConfiguration::defaultConfiguration().ciphers(); QSslCipher ciph; // Check the one of reported and previously missed: for (const auto &suite : suites) { if (suite.encryptionMethod() == QStringLiteral("CHACHA20")) { // There are several ciphesuites using CHACHA20, the first one // is sufficient for the purpose of this test: ciph = suite; break; } } QVERIFY(!ciph.isNull()); QCOMPARE(ciph.encryptionMethod(), QStringLiteral("CHACHA20")); QCOMPARE(ciph.supportedBits(), 256); QCOMPARE(ciph.usedBits(), 256); } #endif // QT_CONFIG(securetransport) void tst_QSslSocket::connectToHostEncrypted() { if (!QSslSocket::supportsSsl()) return; QSslSocketPtr socket = newSocket(); this->socket = socket.data(); auto config = socket->sslConfiguration(); QVERIFY(config.addCaCertificates(httpServerCertChainPath())); socket->setSslConfiguration(config); #ifdef QSSLSOCKET_CERTUNTRUSTED_WORKAROUND connect(socket.data(), SIGNAL(sslErrors(QList)), this, SLOT(untrustedWorkaroundSlot(QList))); #endif socket->connectToHostEncrypted(QtNetworkSettings::httpServerName(), 443); // This should pass unconditionally when using fluke's CA certificate. // or use untrusted certificate workaround QFETCH_GLOBAL(bool, setProxy); if (setProxy && !socket->waitForEncrypted(10000)) QSKIP("Skipping flaky test - See QTBUG-29941"); socket->disconnectFromHost(); QVERIFY(socket->waitForDisconnected()); QVERIFY(!socket->isEncrypted()); QCOMPARE(socket->mode(), QSslSocket::SslClientMode); socket->connectToHost(QtNetworkSettings::echoServerName(), 13); QCOMPARE(socket->mode(), QSslSocket::UnencryptedMode); QVERIFY(socket->waitForDisconnected()); } void tst_QSslSocket::connectToHostEncryptedWithVerificationPeerName() { if (!QSslSocket::supportsSsl()) return; QSslSocketPtr socket = newSocket(); this->socket = socket.data(); auto config = socket->sslConfiguration(); config.addCaCertificates(httpServerCertChainPath()); socket->setSslConfiguration(config); #ifdef QSSLSOCKET_CERTUNTRUSTED_WORKAROUND connect(socket.data(), SIGNAL(sslErrors(QList)), this, SLOT(untrustedWorkaroundSlot(QList))); #endif #ifdef QT_TEST_SERVER socket->connectToHostEncrypted(QtNetworkSettings::httpServerName(), 443, QtNetworkSettings::httpServerName()); #else // Connect to the server with its local name, but use the full name for verification. socket->connectToHostEncrypted(QtNetworkSettings::serverLocalName(), 443, QtNetworkSettings::httpServerName()); #endif // This should pass unconditionally when using fluke's CA certificate. QFETCH_GLOBAL(bool, setProxy); if (setProxy && !socket->waitForEncrypted(10000)) QSKIP("Skipping flaky test - See QTBUG-29941"); socket->disconnectFromHost(); QVERIFY(socket->waitForDisconnected()); QCOMPARE(socket->mode(), QSslSocket::SslClientMode); } void tst_QSslSocket::sessionCipher() { if (!QSslSocket::supportsSsl()) return; QSslSocketPtr socket = newSocket(); this->socket = socket.data(); connect(socket.data(), SIGNAL(sslErrors(QList)), this, SLOT(ignoreErrorSlot())); QVERIFY(socket->sessionCipher().isNull()); socket->connectToHost(QtNetworkSettings::httpServerName(), 443 /* https */); QVERIFY2(socket->waitForConnected(10000), qPrintable(socket->errorString())); QVERIFY(socket->sessionCipher().isNull()); socket->startClientEncryption(); if (!socket->waitForEncrypted(5000)) QSKIP("Skipping flaky test - See QTBUG-29941"); QVERIFY(!socket->sessionCipher().isNull()); qDebug() << "Supported Ciphers:" << QSslConfiguration::supportedCiphers(); qDebug() << "Default Ciphers:" << QSslConfiguration::defaultConfiguration().ciphers(); qDebug() << "Session Cipher:" << socket->sessionCipher(); QVERIFY(QSslConfiguration::supportedCiphers().contains(socket->sessionCipher())); socket->disconnectFromHost(); QVERIFY(socket->waitForDisconnected()); } void tst_QSslSocket::localCertificate() { if (!QSslSocket::supportsSsl()) return; // This test does not make 100% sense yet. We just set some local CA/cert/key and use it // to authenticate ourselves against the server. The server does not actually check this // values. This test should just run the codepath inside qsslsocket_openssl.cpp QSslSocketPtr socket = newSocket(); QList localCert = QSslCertificate::fromPath(httpServerCertChainPath()); auto sslConfig = socket->sslConfiguration(); sslConfig.setCaCertificates(localCert); socket->setSslConfiguration(sslConfig); socket->setLocalCertificate(testDataDir + "certs/fluke.cert"); socket->setPrivateKey(testDataDir + "certs/fluke.key"); socket->connectToHostEncrypted(QtNetworkSettings::httpServerName(), 443); QFETCH_GLOBAL(bool, setProxy); if (setProxy && !socket->waitForEncrypted(10000)) QSKIP("Skipping flaky test - See QTBUG-29941"); } void tst_QSslSocket::mode() { } void tst_QSslSocket::peerCertificate() { } void tst_QSslSocket::peerCertificateChain() { if (!QSslSocket::supportsSsl()) return; QSKIP("QTBUG-29941 - Unstable auto-test due to intermittently unreachable host"); QSslSocketPtr socket = newSocket(); this->socket = socket.data(); QList caCertificates = QSslCertificate::fromPath(httpServerCertChainPath()); QCOMPARE(caCertificates.size(), 1); auto config = socket->sslConfiguration(); config.addCaCertificates(caCertificates); socket->setSslConfiguration(config); #ifdef QSSLSOCKET_CERTUNTRUSTED_WORKAROUND connect(socket.data(), SIGNAL(sslErrors(QList)), this, SLOT(untrustedWorkaroundSlot(QList))); #endif socket->connectToHostEncrypted(QtNetworkSettings::httpServerName(), 443); QCOMPARE(socket->mode(), QSslSocket::UnencryptedMode); QVERIFY(socket->peerCertificateChain().isEmpty()); QFETCH_GLOBAL(bool, setProxy); if (setProxy && !socket->waitForEncrypted(10000)) QSKIP("Skipping flaky test - See QTBUG-29941"); QList certChain = socket->peerCertificateChain(); QVERIFY(certChain.size() > 0); QCOMPARE(certChain.first(), socket->peerCertificate()); socket->disconnectFromHost(); QVERIFY(socket->waitForDisconnected()); // connect again to a different server socket->connectToHostEncrypted("www.qt.io", 443); socket->ignoreSslErrors(); QCOMPARE(socket->mode(), QSslSocket::UnencryptedMode); QVERIFY(socket->peerCertificateChain().isEmpty()); if (setProxy && !socket->waitForEncrypted(10000)) QSKIP("Skipping flaky test - See QTBUG-29941"); QCOMPARE(socket->peerCertificateChain().first(), socket->peerCertificate()); QVERIFY(socket->peerCertificateChain() != certChain); socket->disconnectFromHost(); QVERIFY(socket->waitForDisconnected()); // now do it again back to the original server socket->connectToHost(QtNetworkSettings::httpServerName(), 443); QCOMPARE(socket->mode(), QSslSocket::UnencryptedMode); QVERIFY(socket->peerCertificateChain().isEmpty()); QVERIFY2(socket->waitForConnected(10000), qPrintable(socket->errorString())); socket->startClientEncryption(); if (setProxy && !socket->waitForEncrypted(10000)) QSKIP("Skipping flaky test - See QTBUG-29941"); QCOMPARE(socket->peerCertificateChain().first(), socket->peerCertificate()); QCOMPARE(socket->peerCertificateChain(), certChain); socket->disconnectFromHost(); QVERIFY(socket->waitForDisconnected()); } void tst_QSslSocket::privateKey() { } #if QT_CONFIG(openssl) void tst_QSslSocket::privateKeyOpaque() { if (!isTestingOpenSsl) QSKIP("The active TLS backend does not support private opaque keys"); if (!opensslResolved) QSKIP("Failed to resolve OpenSSL symbols, required by this test"); QFile file(testDataDir + "certs/fluke.key"); QVERIFY(file.open(QIODevice::ReadOnly)); QSslKey key(file.readAll(), QSsl::Rsa, QSsl::Pem, QSsl::PrivateKey); QVERIFY(!key.isNull()); EVP_PKEY *pkey = q_EVP_PKEY_new(); q_EVP_PKEY_set1_RSA(pkey, reinterpret_cast(key.handle())); // This test does not make 100% sense yet. We just set some local CA/cert/key and use it // to authenticate ourselves against the server. The server does not actually check this // values. This test should just run the codepath inside qsslsocket_openssl.cpp QSslSocketPtr socket = newSocket(); QList localCert = QSslCertificate::fromPath(httpServerCertChainPath()); auto sslConfig = socket->sslConfiguration(); sslConfig.setCaCertificates(localCert); socket->setSslConfiguration(sslConfig); socket->setLocalCertificate(testDataDir + "certs/fluke.cert"); socket->setPrivateKey(QSslKey(reinterpret_cast(pkey))); socket->setPeerVerifyMode(QSslSocket::QueryPeer); socket->connectToHostEncrypted(QtNetworkSettings::httpServerName(), 443); QFETCH_GLOBAL(bool, setProxy); if (setProxy && !socket->waitForEncrypted(10000)) QSKIP("Skipping flaky test - See QTBUG-29941"); } #endif // Feature 'openssl'. void tst_QSslSocket::protocol() { if (!QSslSocket::supportsSsl()) return; QSslSocketPtr socket = newSocket(); this->socket = socket.data(); QList certs = QSslCertificate::fromPath(httpServerCertChainPath()); auto sslConfig = socket->sslConfiguration(); sslConfig.setCaCertificates(certs); socket->setSslConfiguration(sslConfig); #ifdef QSSLSOCKET_CERTUNTRUSTED_WORKAROUND connect(socket, SIGNAL(sslErrors(QList)), this, SLOT(untrustedWorkaroundSlot(QList))); #endif QCOMPARE(socket->protocol(), QSsl::SecureProtocols); QFETCH_GLOBAL(bool, setProxy); { // qt-test-server allows TLSV1. socket->setProtocol(Test::TlsV1_0); QCOMPARE(socket->protocol(), Test::TlsV1_0); socket->connectToHostEncrypted(QtNetworkSettings::httpServerName(), 443); if (setProxy && !socket->waitForEncrypted()) QSKIP("Skipping flaky test - See QTBUG-29941"); QCOMPARE(socket->protocol(), Test::TlsV1_0); socket->abort(); QCOMPARE(socket->protocol(), Test::TlsV1_0); socket->connectToHost(QtNetworkSettings::httpServerName(), 443); QVERIFY2(socket->waitForConnected(), qPrintable(socket->errorString())); socket->startClientEncryption(); if (setProxy && !socket->waitForEncrypted()) QSKIP("Skipping flaky test - See QTBUG-29941"); QCOMPARE(socket->protocol(), Test::TlsV1_0); socket->abort(); } { // qt-test-server probably doesn't allow TLSV1.1 socket->setProtocol(Test::TlsV1_1); QCOMPARE(socket->protocol(), Test::TlsV1_1); socket->connectToHostEncrypted(QtNetworkSettings::httpServerName(), 443); if (setProxy && !socket->waitForEncrypted()) QSKIP("Skipping flaky test - See QTBUG-29941"); QCOMPARE(socket->protocol(), Test::TlsV1_1); socket->abort(); QCOMPARE(socket->protocol(), Test::TlsV1_1); socket->connectToHost(QtNetworkSettings::httpServerName(), 443); QVERIFY2(socket->waitForConnected(), qPrintable(socket->errorString())); socket->startClientEncryption(); if (setProxy && !socket->waitForEncrypted()) QSKIP("Skipping flaky test - See QTBUG-29941"); QCOMPARE(socket->protocol(), Test::TlsV1_1); socket->abort(); } { // qt-test-server probably doesn't allows TLSV1.2 socket->setProtocol(QSsl::TlsV1_2); QCOMPARE(socket->protocol(), QSsl::TlsV1_2); socket->connectToHostEncrypted(QtNetworkSettings::httpServerName(), 443); if (setProxy && !socket->waitForEncrypted()) QSKIP("Skipping flaky test - See QTBUG-29941"); QCOMPARE(socket->protocol(), QSsl::TlsV1_2); socket->abort(); QCOMPARE(socket->protocol(), QSsl::TlsV1_2); socket->connectToHost(QtNetworkSettings::httpServerName(), 443); QVERIFY2(socket->waitForConnected(), qPrintable(socket->errorString())); socket->startClientEncryption(); if (setProxy && !socket->waitForEncrypted()) QSKIP("Skipping flaky test - See QTBUG-29941"); QCOMPARE(socket->protocol(), QSsl::TlsV1_2); socket->abort(); } if (supportsTls13()) { // qt-test-server probably doesn't allow TLSV1.3 socket->setProtocol(QSsl::TlsV1_3); QCOMPARE(socket->protocol(), QSsl::TlsV1_3); socket->connectToHostEncrypted(QtNetworkSettings::httpServerName(), 443); if (!socket->waitForEncrypted(10'000)) QSKIP("TLS 1.3 is not supported by the test server or the test is flaky - see QTBUG-29941"); QCOMPARE(socket->protocol(), QSsl::TlsV1_3); socket->abort(); QCOMPARE(socket->protocol(), QSsl::TlsV1_3); socket->connectToHost(QtNetworkSettings::httpServerName(), 443); QVERIFY2(socket->waitForConnected(), qPrintable(socket->errorString())); socket->startClientEncryption(); if (!socket->waitForEncrypted(10'000)) QSKIP("TLS 1.3 is not supported by the test server or the test is flaky - see QTBUG-29941"); QCOMPARE(socket->sessionProtocol(), QSsl::TlsV1_3); socket->abort(); } { // qt-test-server allows SSLV3, so it allows AnyProtocol. socket->setProtocol(QSsl::AnyProtocol); QCOMPARE(socket->protocol(), QSsl::AnyProtocol); socket->connectToHostEncrypted(QtNetworkSettings::httpServerName(), 443); if (setProxy && !socket->waitForEncrypted()) QSKIP("Skipping flaky test - See QTBUG-29941"); QCOMPARE(socket->protocol(), QSsl::AnyProtocol); socket->abort(); QCOMPARE(socket->protocol(), QSsl::AnyProtocol); socket->connectToHost(QtNetworkSettings::httpServerName(), 443); QVERIFY2(socket->waitForConnected(), qPrintable(socket->errorString())); socket->startClientEncryption(); if (setProxy && !socket->waitForEncrypted()) QSKIP("Skipping flaky test - See QTBUG-29941"); QCOMPARE(socket->protocol(), QSsl::AnyProtocol); socket->abort(); } } class SslServer : public QTcpServer { Q_OBJECT public: SslServer(const QString &keyFile = tst_QSslSocket::testDataDir + "certs/fluke.key", const QString &certFile = tst_QSslSocket::testDataDir + "certs/fluke.cert", const QString &interFile = QString()) : socket(0), config(QSslConfiguration::defaultConfiguration()), ignoreSslErrors(true), peerVerifyMode(QSslSocket::AutoVerifyPeer), protocol(QSsl::SecureProtocols), m_keyFile(keyFile), m_certFile(certFile), m_interFile(interFile) { } QSslSocket *socket; QSslConfiguration config; QString addCaCertificates; bool ignoreSslErrors; QSslSocket::PeerVerifyMode peerVerifyMode; QSsl::SslProtocol protocol; QString m_keyFile; QString m_certFile; QString m_interFile; QList ciphers; signals: void sslErrors(const QList &errors); void socketError(QAbstractSocket::SocketError); void handshakeInterruptedOnError(const QSslError& rrror); void gotAlert(QSsl::AlertLevel level, QSsl::AlertType type, const QString &message); void alertSent(QSsl::AlertLevel level, QSsl::AlertType type, const QString &message); void socketEncrypted(QSslSocket *); protected: void incomingConnection(qintptr socketDescriptor) override { QSslConfiguration configuration = config; socket = new QSslSocket(this); configuration.setPeerVerifyMode(peerVerifyMode); configuration.setProtocol(protocol); if (ignoreSslErrors) connect(socket, SIGNAL(sslErrors(QList)), this, SLOT(ignoreErrorSlot())); else connect(socket, SIGNAL(sslErrors(QList)), this, SIGNAL(sslErrors(QList))); connect(socket, SIGNAL(errorOccurred(QAbstractSocket::SocketError)), this, SIGNAL(socketError(QAbstractSocket::SocketError))); connect(socket, &QSslSocket::handshakeInterruptedOnError, this, &SslServer::handshakeInterruptedOnError); connect(socket, &QSslSocket::alertReceived, this, &SslServer::gotAlert); connect(socket, &QSslSocket::alertSent, this, &SslServer::alertSent); connect(socket, &QSslSocket::preSharedKeyAuthenticationRequired, this, &SslServer::preSharedKeyAuthenticationRequired); connect(socket, &QSslSocket::encrypted, this, [this](){ emit socketEncrypted(socket); }); QFile file(m_keyFile); QVERIFY(file.open(QIODevice::ReadOnly)); QSslKey key(file.readAll(), QSsl::Rsa, QSsl::Pem, QSsl::PrivateKey); QVERIFY(!key.isNull()); configuration.setPrivateKey(key); // Add CA certificates to verify client certificate if (!addCaCertificates.isEmpty()) { QList caCert = QSslCertificate::fromPath(addCaCertificates); QVERIFY(!caCert.isEmpty()); QVERIFY(!caCert.first().isNull()); configuration.addCaCertificates(caCert); } // If we have a cert issued directly from the CA if (m_interFile.isEmpty()) { QList localCert = QSslCertificate::fromPath(m_certFile); QVERIFY(!localCert.isEmpty()); QVERIFY(!localCert.first().isNull()); configuration.setLocalCertificate(localCert.first()); } else { QList localCert = QSslCertificate::fromPath(m_certFile); QVERIFY(!localCert.isEmpty()); QVERIFY(!localCert.first().isNull()); QList interCert = QSslCertificate::fromPath(m_interFile); QVERIFY(!interCert.isEmpty()); QVERIFY(!interCert.first().isNull()); configuration.setLocalCertificateChain(localCert + interCert); } if (!ciphers.isEmpty()) configuration.setCiphers(ciphers); socket->setSslConfiguration(configuration); QVERIFY(socket->setSocketDescriptor(socketDescriptor, QAbstractSocket::ConnectedState)); QVERIFY(!socket->peerAddress().isNull()); QVERIFY(socket->peerPort() != 0); QVERIFY(!socket->localAddress().isNull()); QVERIFY(socket->localPort() != 0); socket->startServerEncryption(); } protected slots: void preSharedKeyAuthenticationRequired(QSslPreSharedKeyAuthenticator *authenticator) { authenticator->setPreSharedKey("123456"); } void ignoreErrorSlot() { socket->ignoreSslErrors(); } }; void tst_QSslSocket::protocolServerSide_data() { QTest::addColumn("serverProtocol"); QTest::addColumn("clientProtocol"); QTest::addColumn("works"); QTest::newRow("any-any") << QSsl::AnyProtocol << QSsl::AnyProtocol << true; QTest::newRow("secure-secure") << QSsl::SecureProtocols << QSsl::SecureProtocols << true; QTest::newRow("tls1.0-secure") << Test::TlsV1_0 << QSsl::SecureProtocols << false; QTest::newRow("secure-tls1.0") << QSsl::SecureProtocols << Test::TlsV1_0 << false; QTest::newRow("secure-any") << QSsl::SecureProtocols << QSsl::AnyProtocol << true; QTest::newRow("tls1.0orlater-tls1.2") << Test::TlsV1_0OrLater << QSsl::TlsV1_2 << true; if (supportsTls13()) QTest::newRow("tls1.0orlater-tls1.3") << Test::TlsV1_0OrLater << QSsl::TlsV1_3 << true; QTest::newRow("tls1.1orlater-tls1.0") << Test::TlsV1_1OrLater << Test::TlsV1_0 << false; QTest::newRow("tls1.1orlater-tls1.2") << Test::TlsV1_1OrLater << QSsl::TlsV1_2 << true; if (supportsTls13()) QTest::newRow("tls1.1orlater-tls1.3") << Test::TlsV1_1OrLater << QSsl::TlsV1_3 << true; QTest::newRow("tls1.2orlater-tls1.0") << QSsl::TlsV1_2OrLater << Test::TlsV1_0 << false; QTest::newRow("tls1.2orlater-tls1.1") << QSsl::TlsV1_2OrLater << Test::TlsV1_1 << false; QTest::newRow("tls1.2orlater-tls1.2") << QSsl::TlsV1_2OrLater << QSsl::TlsV1_2 << true; if (supportsTls13()) { QTest::newRow("tls1.2orlater-tls1.3") << QSsl::TlsV1_2OrLater << QSsl::TlsV1_3 << true; QTest::newRow("tls1.3orlater-tls1.0") << QSsl::TlsV1_3OrLater << Test::TlsV1_0 << false; QTest::newRow("tls1.3orlater-tls1.1") << QSsl::TlsV1_3OrLater << Test::TlsV1_1 << false; QTest::newRow("tls1.3orlater-tls1.2") << QSsl::TlsV1_3OrLater << QSsl::TlsV1_2 << false; QTest::newRow("tls1.3orlater-tls1.3") << QSsl::TlsV1_3OrLater << QSsl::TlsV1_3 << true; } QTest::newRow("any-secure") << QSsl::AnyProtocol << QSsl::SecureProtocols << true; } void tst_QSslSocket::protocolServerSide() { if (!QSslSocket::supportsSsl()) { qWarning("SSL not supported, skipping test"); return; } QFETCH_GLOBAL(bool, setProxy); if (setProxy) return; QFETCH(QSsl::SslProtocol, serverProtocol); SslServer server; server.protocol = serverProtocol; QVERIFY(server.listen()); QEventLoop loop; connect(&server, SIGNAL(socketError(QAbstractSocket::SocketError)), &loop, SLOT(quit())); QTimer::singleShot(5000, &loop, SLOT(quit())); QSslSocket client; socket = &client; QFETCH(QSsl::SslProtocol, clientProtocol); socket->setProtocol(clientProtocol); // upon SSL wrong version error, errorOccurred will be triggered, not sslErrors connect(socket, SIGNAL(errorOccurred(QAbstractSocket::SocketError)), &loop, SLOT(quit())); connect(socket, SIGNAL(sslErrors(QList)), this, SLOT(ignoreErrorSlot())); connect(socket, SIGNAL(encrypted()), &loop, SLOT(quit())); client.connectToHostEncrypted(QHostAddress(QHostAddress::LocalHost).toString(), server.serverPort()); loop.exec(); QFETCH(bool, works); QAbstractSocket::SocketState expectedState = (works) ? QAbstractSocket::ConnectedState : QAbstractSocket::UnconnectedState; // Determine whether the client or the server caused the event loop // to quit due to a socket error, and investigate the culprit. if (client.error() != QAbstractSocket::UnknownSocketError) { // It can happen that the client, after TCP connection established, before // incomingConnection() slot fired, hits TLS initialization error and stops // the loop, so the server socket is not created yet. if (server.socket) QVERIFY(server.socket->error() == QAbstractSocket::UnknownSocketError); QCOMPARE(client.state(), expectedState); } else if (server.socket->error() != QAbstractSocket::UnknownSocketError) { QVERIFY(client.error() == QAbstractSocket::UnknownSocketError); QCOMPARE(server.socket->state(), expectedState); } QCOMPARE(client.isEncrypted(), works); } #if QT_CONFIG(openssl) void tst_QSslSocket::serverCipherPreferences() { if (!isTestingOpenSsl) QSKIP("The active TLS backend does not support server-side cipher preferences"); QFETCH_GLOBAL(bool, setProxy); if (setProxy) return; QSslCipher testedCiphers[2]; { // First using the default (server preference) const auto supportedCiphers = QSslConfiguration::supportedCiphers(); int nSet = 0; for (const auto &cipher : supportedCiphers) { // Ciphersuites from TLS 1.2 and 1.3 are set separately, // let's select 1.3 or above explicitly. if (cipher.protocol() < QSsl::TlsV1_3) continue; testedCiphers[nSet++] = cipher; if (nSet == 2) break; } if (nSet != 2) QSKIP("Failed to find two proper ciphersuites to test, bailing out."); SslServer server; server.protocol = QSsl::TlsV1_2OrLater; server.ciphers = {testedCiphers[0], testedCiphers[1]}; QVERIFY(server.listen()); QEventLoop loop; QTimer::singleShot(5000, &loop, SLOT(quit())); QSslSocket client; socket = &client; auto sslConfig = socket->sslConfiguration(); sslConfig.setProtocol(QSsl::TlsV1_2OrLater); sslConfig.setCiphers({testedCiphers[1], testedCiphers[0]}); socket->setSslConfiguration(sslConfig); // upon SSL wrong version error, errorOccurred will be triggered, not sslErrors connect(socket, SIGNAL(errorOccurred(QAbstractSocket::SocketError)), &loop, SLOT(quit())); connect(socket, SIGNAL(sslErrors(QList)), this, SLOT(ignoreErrorSlot())); connect(socket, SIGNAL(encrypted()), &loop, SLOT(quit())); client.connectToHostEncrypted(QHostAddress(QHostAddress::LocalHost).toString(), server.serverPort()); loop.exec(); QVERIFY(client.isEncrypted()); QCOMPARE(client.sessionCipher().name(), testedCiphers[0].name()); } { if (QTestPrivate::isRunningArmOnX86()) QSKIP("This test is known to crash on QEMU emulation for no good reason."); // Now using the client preferences SslServer server; QSslConfiguration config = QSslConfiguration::defaultConfiguration(); config.setSslOption(QSsl::SslOptionDisableServerCipherPreference, true); server.config = config; server.protocol = QSsl::TlsV1_2OrLater; server.ciphers = {testedCiphers[0], testedCiphers[1]}; QVERIFY(server.listen()); QEventLoop loop; QTimer::singleShot(5000, &loop, SLOT(quit())); QSslSocket client; socket = &client; auto sslConfig = socket->sslConfiguration(); sslConfig.setProtocol(QSsl::TlsV1_2OrLater); sslConfig.setCiphers({testedCiphers[1], testedCiphers[0]}); socket->setSslConfiguration(sslConfig); // upon SSL wrong version error, errorOccurred will be triggered, not sslErrors connect(socket, SIGNAL(errorOccurred(QAbstractSocket::SocketError)), &loop, SLOT(quit())); connect(socket, SIGNAL(sslErrors(QList)), this, SLOT(ignoreErrorSlot())); connect(socket, SIGNAL(encrypted()), &loop, SLOT(quit())); client.connectToHostEncrypted(QHostAddress(QHostAddress::LocalHost).toString(), server.serverPort()); loop.exec(); QVERIFY(client.isEncrypted()); QCOMPARE(client.sessionCipher().name(), testedCiphers[1].name()); } } #endif // Feature 'openssl'. void tst_QSslSocket::setCaCertificates() { if (!QSslSocket::supportsSsl()) return; QSslSocket socket; QCOMPARE(socket.sslConfiguration().caCertificates(), QSslConfiguration::defaultConfiguration().caCertificates()); auto sslConfig = socket.sslConfiguration(); sslConfig.setCaCertificates( QSslCertificate::fromPath(testDataDir + "certs/qt-test-server-cacert.pem")); socket.setSslConfiguration(sslConfig); QCOMPARE(socket.sslConfiguration().caCertificates().size(), 1); sslConfig.setCaCertificates(QSslConfiguration::defaultConfiguration().caCertificates()); socket.setSslConfiguration(sslConfig); QCOMPARE(socket.sslConfiguration().caCertificates(), QSslConfiguration::defaultConfiguration().caCertificates()); } void tst_QSslSocket::setLocalCertificate() { } void tst_QSslSocket::localCertificateChain() { if (!QSslSocket::supportsSsl()) return; QSslSocket socket; socket.setLocalCertificate(testDataDir + "certs/fluke.cert"); QSslConfiguration conf = socket.sslConfiguration(); QList chain = conf.localCertificateChain(); QCOMPARE(chain.size(), 1); QCOMPARE(chain[0], conf.localCertificate()); QCOMPARE(chain[0], socket.localCertificate()); } void tst_QSslSocket::setLocalCertificateChain() { if (!QSslSocket::supportsSsl()) return; QFETCH_GLOBAL(bool, setProxy); if (setProxy) return; SslServer server(testDataDir + "certs/leaf.key", testDataDir + "certs/leaf.crt", testDataDir + "certs/inter.crt"); QVERIFY(server.listen()); QEventLoop loop; QTimer::singleShot(5000, &loop, SLOT(quit())); const QScopedPointer client(new QSslSocket); socket = client.data(); connect(socket, SIGNAL(encrypted()), &loop, SLOT(quit())); connect(socket, SIGNAL(errorOccurred(QAbstractSocket::SocketError)), &loop, SLOT(quit())); connect(socket, SIGNAL(sslErrors(QList)), this, SLOT(ignoreErrorSlot())); socket->connectToHostEncrypted(QHostAddress(QHostAddress::LocalHost).toString(), server.serverPort()); loop.exec(); QList chain = socket->peerCertificateChain(); if (isTestingSchannel) { QEXPECT_FAIL("", "Schannel cannot send intermediate certificates not " "located in a system certificate store", Abort); } QCOMPARE(chain.size(), 2); QCOMPARE(chain[0].serialNumber(), QByteArray("58:df:33:c1:9b:bc:c5:51:7a:00:86:64:43:94:41:e2:26:ef:3f:89")); QCOMPARE(chain[1].serialNumber(), QByteArray("11:72:34:bc:21:e6:ca:04:24:13:f8:35:48:84:a6:e9:de:96:22:15")); } void tst_QSslSocket::tlsConfiguration() { QFETCH_GLOBAL(const bool, setProxy); if (setProxy) return; // Test some things not covered by any other auto-test. QSslSocket socket; auto tlsConfig = socket.sslConfiguration(); QVERIFY(tlsConfig.sessionCipher().isNull()); QCOMPARE(tlsConfig.addCaCertificates(QStringLiteral("nonexisting/chain.crt")), false); QCOMPARE(tlsConfig.sessionProtocol(), QSsl::UnknownProtocol); QSslConfiguration nullConfig; QVERIFY(nullConfig.isNull()); #if QT_CONFIG(openssl) nullConfig.setEllipticCurves(tlsConfig.ellipticCurves()); QCOMPARE(nullConfig.ellipticCurves(), tlsConfig.ellipticCurves()); #endif QMap backendConfig; backendConfig["DTLSMTU"] = QVariant::fromValue(1024); backendConfig["DTLSTIMEOUTMS"] = QVariant::fromValue(1000); nullConfig.setBackendConfiguration(backendConfig); QCOMPARE(nullConfig.backendConfiguration(), backendConfig); QTest::ignoreMessage(QtWarningMsg, "QSslConfiguration::setPeerVerifyDepth: cannot set negative depth of -1000"); nullConfig.setPeerVerifyDepth(-1000); QVERIFY(nullConfig.peerVerifyDepth() != -1000); nullConfig.setPeerVerifyDepth(100); QCOMPARE(nullConfig.peerVerifyDepth(), 100); } void tst_QSslSocket::setSocketDescriptor() { if (!QSslSocket::supportsSsl()) return; QFETCH_GLOBAL(bool, setProxy); if (setProxy) return; SslServer server; QVERIFY(server.listen()); QEventLoop loop; QTimer::singleShot(5000, &loop, SLOT(quit())); QSslSocket client; socket = &client; connect(socket, SIGNAL(sslErrors(QList)), this, SLOT(ignoreErrorSlot())); connect(socket, SIGNAL(encrypted()), &loop, SLOT(quit())); client.connectToHostEncrypted(QHostAddress(QHostAddress::LocalHost).toString(), server.serverPort()); loop.exec(); QCOMPARE(client.state(), QAbstractSocket::ConnectedState); QVERIFY(client.isEncrypted()); QVERIFY(!client.peerAddress().isNull()); QVERIFY(client.peerPort() != 0); QVERIFY(!client.localAddress().isNull()); QVERIFY(client.localPort() != 0); } void tst_QSslSocket::setSslConfiguration_data() { QTest::addColumn("configuration"); QTest::addColumn("works"); QTest::newRow("empty") << QSslConfiguration() << false; QSslConfiguration conf = QSslConfiguration::defaultConfiguration(); QTest::newRow("default") << conf << false; // does not contain test server cert if (!isTestingSecureTransport) { QList testServerCert = QSslCertificate::fromPath(httpServerCertChainPath()); conf.setCaCertificates(testServerCert); QTest::newRow("set-root-cert") << conf << true; conf.setProtocol(QSsl::SecureProtocols); QTest::newRow("secure") << conf << true; } else { qWarning("Skipping the cases with certificate, SecureTransport does not like old certificate on the test server"); } } void tst_QSslSocket::setSslConfiguration() { if (!QSslSocket::supportsSsl()) return; QSslSocketPtr socket = newSocket(); QFETCH(QSslConfiguration, configuration); socket->setSslConfiguration(configuration); this->socket = socket.data(); socket->connectToHostEncrypted(QtNetworkSettings::httpServerName(), 443); QFETCH(bool, works); QFETCH_GLOBAL(bool, setProxy); if (setProxy && (socket->waitForEncrypted(10000) != works)) QSKIP("Skipping flaky test - See QTBUG-29941"); if (works) { socket->disconnectFromHost(); QVERIFY2(socket->waitForDisconnected(), qPrintable(socket->errorString())); } } void tst_QSslSocket::waitForEncrypted() { if (!QSslSocket::supportsSsl()) return; QSslSocketPtr socket = newSocket(); this->socket = socket.data(); connect(this->socket, SIGNAL(sslErrors(QList)), this, SLOT(ignoreErrorSlot())); socket->connectToHostEncrypted(QtNetworkSettings::httpServerName(), 443); QFETCH_GLOBAL(bool, setProxy); if (setProxy && !socket->waitForEncrypted(10000)) QSKIP("Skipping flaky test - See QTBUG-29941"); } void tst_QSslSocket::waitForEncryptedMinusOne() { #ifdef Q_OS_WIN QSKIP("QTBUG-24451 - indefinite wait may hang"); #endif if (!QSslSocket::supportsSsl()) return; QSslSocketPtr socket = newSocket(); this->socket = socket.data(); connect(this->socket, SIGNAL(sslErrors(QList)), this, SLOT(ignoreErrorSlot())); socket->connectToHostEncrypted(QtNetworkSettings::httpServerName(), 443); QFETCH_GLOBAL(bool, setProxy); if (setProxy && !socket->waitForEncrypted(-1)) QSKIP("Skipping flaky test - See QTBUG-29941"); } void tst_QSslSocket::waitForConnectedEncryptedReadyRead() { if (!QSslSocket::supportsSsl()) return; QSslSocketPtr socket = newSocket(); this->socket = socket.data(); // Set TLS 1.0 or above because the server doesn't support TLS 1.2 or above // QTQAINFRA-4499 QSslConfiguration config = socket->sslConfiguration(); config.setProtocol(Test::TlsV1_0OrLater); socket->setSslConfiguration(config); connect(this->socket, SIGNAL(sslErrors(QList)), this, SLOT(ignoreErrorSlot())); socket->connectToHostEncrypted(QtNetworkSettings::imapServerName(), 993); QVERIFY2(socket->waitForConnected(10000), qPrintable(socket->errorString())); QFETCH_GLOBAL(bool, setProxy); if (setProxy && !socket->waitForEncrypted(10000)) QSKIP("Skipping flaky test - See QTBUG-29941"); // We only do this if we have no bytes available to read already because readyRead will // not be emitted again. if (socket->bytesAvailable() == 0) QVERIFY(socket->waitForReadyRead(10000)); QVERIFY(!socket->peerCertificate().isNull()); QVERIFY(!socket->peerCertificateChain().isEmpty()); } void tst_QSslSocket::startClientEncryption() { } void tst_QSslSocket::startServerEncryption() { } void tst_QSslSocket::addDefaultCaCertificate() { if (!QSslSocket::supportsSsl()) return; // Reset the global CA chain auto sslConfig = QSslConfiguration::defaultConfiguration(); sslConfig.setCaCertificates(QSslConfiguration::systemCaCertificates()); QSslConfiguration::setDefaultConfiguration(sslConfig); QList flukeCerts = QSslCertificate::fromPath(httpServerCertChainPath()); QCOMPARE(flukeCerts.size(), 1); QList globalCerts = QSslConfiguration::defaultConfiguration().caCertificates(); QVERIFY(!globalCerts.contains(flukeCerts.first())); sslConfig.addCaCertificate(flukeCerts.first()); QSslConfiguration::setDefaultConfiguration(sslConfig); QCOMPARE(QSslConfiguration::defaultConfiguration().caCertificates().size(), globalCerts.size() + 1); QVERIFY(QSslConfiguration::defaultConfiguration().caCertificates() .contains(flukeCerts.first())); // Restore the global CA chain sslConfig = QSslConfiguration::defaultConfiguration(); sslConfig.setCaCertificates(QSslConfiguration::systemCaCertificates()); QSslConfiguration::setDefaultConfiguration(sslConfig); } void tst_QSslSocket::defaultCaCertificates() { if (!QSslSocket::supportsSsl()) return; QList certs = QSslConfiguration::defaultConfiguration().caCertificates(); QVERIFY(certs.size() > 1); QCOMPARE(certs, QSslConfiguration::systemCaCertificates()); } void tst_QSslSocket::defaultCiphers() { if (!QSslSocket::supportsSsl()) return; QList ciphers = QSslConfiguration::defaultConfiguration().ciphers(); QVERIFY(ciphers.size() > 1); QSslSocket socket; QCOMPARE(socket.sslConfiguration().defaultConfiguration().ciphers(), ciphers); QCOMPARE(socket.sslConfiguration().ciphers(), ciphers); } void tst_QSslSocket::resetDefaultCiphers() { } void tst_QSslSocket::setDefaultCaCertificates() { } void tst_QSslSocket::setDefaultCiphers() { } void tst_QSslSocket::supportedCiphers() { if (!QSslSocket::supportsSsl()) return; QList ciphers = QSslConfiguration::supportedCiphers(); QVERIFY(ciphers.size() > 1); QSslSocket socket; QCOMPARE(socket.sslConfiguration().supportedCiphers(), ciphers); } void tst_QSslSocket::systemCaCertificates() { if (!QSslSocket::supportsSsl()) return; QList certs = QSslConfiguration::systemCaCertificates(); QVERIFY(certs.size() > 1); QCOMPARE(certs, QSslConfiguration::defaultConfiguration().systemCaCertificates()); } void tst_QSslSocket::wildcardCertificateNames() { // Passing CN matches QCOMPARE( QSslSocketPrivate::isMatchingHostname(QString("www.example.com"), QString("www.example.com")), true ); QCOMPARE( QSslSocketPrivate::isMatchingHostname(QString("WWW.EXAMPLE.COM"), QString("www.example.com")), true ); QCOMPARE( QSslSocketPrivate::isMatchingHostname(QString("*.example.com"), QString("www.example.com")), true ); QCOMPARE( QSslSocketPrivate::isMatchingHostname(QString("xxx*.example.com"), QString("xxxwww.example.com")), true ); QCOMPARE( QSslSocketPrivate::isMatchingHostname(QString("f*.example.com"), QString("foo.example.com")), true ); QCOMPARE( QSslSocketPrivate::isMatchingHostname(QString("192.168.0.0"), QString("192.168.0.0")), true ); QCOMPARE( QSslSocketPrivate::isMatchingHostname(QString("foo.éxample.com"), QString("foo.xn--xample-9ua.com")), true ); QCOMPARE( QSslSocketPrivate::isMatchingHostname(QString("*.éxample.com"), QString("foo.xn--xample-9ua.com")), true ); QCOMPARE( QSslSocketPrivate::isMatchingHostname(QString("xn--kcry6tjko.example.org"), QString("xn--kcry6tjko.example.org")), true); QCOMPARE( QSslSocketPrivate::isMatchingHostname(QString("*.xn--kcry6tjko.example.org"), QString("xn--kcr.xn--kcry6tjko.example.org")), true); // Failing CN matches QCOMPARE( QSslSocketPrivate::isMatchingHostname(QString("xxx.example.com"), QString("www.example.com")), false ); QCOMPARE( QSslSocketPrivate::isMatchingHostname(QString("*"), QString("www.example.com")), false ); QCOMPARE( QSslSocketPrivate::isMatchingHostname(QString("*.*.com"), QString("www.example.com")), false ); QCOMPARE( QSslSocketPrivate::isMatchingHostname(QString("*.example.com"), QString("baa.foo.example.com")), false ); QCOMPARE( QSslSocketPrivate::isMatchingHostname(QString("f*.example.com"), QString("baa.example.com")), false ); QCOMPARE( QSslSocketPrivate::isMatchingHostname(QString("*.com"), QString("example.com")), false ); QCOMPARE( QSslSocketPrivate::isMatchingHostname(QString("*fail.com"), QString("example.com")), false ); QCOMPARE( QSslSocketPrivate::isMatchingHostname(QString("*.example."), QString("www.example.")), false ); QCOMPARE( QSslSocketPrivate::isMatchingHostname(QString("*.example."), QString("www.example")), false ); QCOMPARE( QSslSocketPrivate::isMatchingHostname(QString(""), QString("www")), false ); QCOMPARE( QSslSocketPrivate::isMatchingHostname(QString("*"), QString("www")), false ); QCOMPARE( QSslSocketPrivate::isMatchingHostname(QString("*.168.0.0"), QString("192.168.0.0")), false ); QCOMPARE( QSslSocketPrivate::isMatchingHostname(QString("xn--kcry6tjko*.example.org"), QString("xn--kcry6tjkoanc.example.org")), false ); // RFC 6125 §7.2 QCOMPARE( QSslSocketPrivate::isMatchingHostname(QString("å*.example.org"), QString("xn--la-xia.example.org")), false ); } void tst_QSslSocket::isMatchingHostname() { // with normalization: (the certificate has *.SCHÄUFELE.DE as a CN) // openssl req -x509 -nodes -subj "/CN=*.SCHÄUFELE.DE" -newkey rsa:512 -keyout /dev/null -out xn--schufele-2za.crt QList certs = QSslCertificate::fromPath(testDataDir + "certs/xn--schufele-2za.crt"); QVERIFY(!certs.isEmpty()); QSslCertificate cert = certs.first(); QCOMPARE(QSslSocketPrivate::isMatchingHostname(cert, QString::fromUtf8("WWW.SCHÄUFELE.DE")), true); QCOMPARE(QSslSocketPrivate::isMatchingHostname(cert, QString::fromUtf8("www.xn--schufele-2za.de")), true); QCOMPARE(QSslSocketPrivate::isMatchingHostname(cert, QString::fromUtf8("www.schäufele.de")), true); QCOMPARE(QSslSocketPrivate::isMatchingHostname(cert, QString::fromUtf8("föo.schäufele.de")), true); QCOMPARE(QSslSocketPrivate::isMatchingHostname(cert, QString::fromUtf8("foo.foo.xn--schufele-2za.de")), false); QCOMPARE(QSslSocketPrivate::isMatchingHostname(cert, QString::fromUtf8("www.schaufele.de")), false); QCOMPARE(QSslSocketPrivate::isMatchingHostname(cert, QString::fromUtf8("www.schufele.de")), false); /* Generated with the following command (only valid with openssl >= 1.1.1 due to "-addext"): openssl req -x509 -nodes -subj "/CN=example.org" \ -addext "subjectAltName = IP:192.5.8.16, IP:fe80::3c29:2fa1:dd44:765" \ -newkey rsa:2048 -keyout /dev/null -out subjectAltNameIP.crt */ certs = QSslCertificate::fromPath(testDataDir + "certs/subjectAltNameIP.crt"); QVERIFY(!certs.isEmpty()); cert = certs.first(); QCOMPARE(QSslSocketPrivate::isMatchingHostname(cert, QString::fromUtf8("192.5.8.16")), true); QCOMPARE(QSslSocketPrivate::isMatchingHostname(cert, QString::fromUtf8("fe80::3c29:2fa1:dd44:765")), true); /* openssl req -x509 -nodes -new -newkey rsa -keyout /dev/null -out 127-0-0-1-as-CN.crt \ -subj "/CN=127.0.0.1" */ certs = QSslCertificate::fromPath(testDataDir + "certs/127-0-0-1-as-CN.crt"); QVERIFY(!certs.isEmpty()); cert = certs.first(); QCOMPARE(QSslSocketPrivate::isMatchingHostname(cert, QString::fromUtf8("127.0.0.1")), true); } void tst_QSslSocket::wildcard() { QSKIP("TODO: solve wildcard problem"); if (!QSslSocket::supportsSsl()) return; // Fluke runs an apache server listening on port 4443, serving the // wildcard fluke.*.troll.no. The DNS entry for // fluke.wildcard.dev.troll.no, served by ares (root for dev.troll.no), // returns the CNAME fluke.troll.no for this domain. The web server // responds with the wildcard, and QSslSocket should accept that as a // valid connection. This was broken in 4.3.0. QSslSocketPtr socket = newSocket(); auto config = socket->sslConfiguration(); config.addCaCertificates(QLatin1String("certs/aspiriniks.ca.crt")); socket->setSslConfiguration(config); this->socket = socket.data(); #ifdef QSSLSOCKET_CERTUNTRUSTED_WORKAROUND connect(socket, SIGNAL(sslErrors(QList)), this, SLOT(untrustedWorkaroundSlot(QList))); #endif socket->connectToHostEncrypted(QtNetworkSettings::wildcardServerName(), 4443); QFETCH_GLOBAL(bool, setProxy); if (setProxy && !socket->waitForEncrypted(3000)) QSKIP("Skipping flaky test - See QTBUG-29941"); QSslCertificate certificate = socket->peerCertificate(); QVERIFY(certificate.subjectInfo(QSslCertificate::CommonName).contains(QString(QtNetworkSettings::serverLocalName() + ".*." + QtNetworkSettings::serverDomainName()))); QVERIFY(certificate.issuerInfo(QSslCertificate::CommonName).contains(QtNetworkSettings::serverName())); socket->close(); } class SslServer2 : public QTcpServer { protected: void incomingConnection(qintptr socketDescriptor) override { QSslSocket *socket = new QSslSocket(this); socket->ignoreSslErrors(); // Only set the certificate QList localCert = QSslCertificate::fromPath(tst_QSslSocket::testDataDir + "certs/fluke.cert"); QVERIFY(!localCert.isEmpty()); QVERIFY(!localCert.first().isNull()); socket->setLocalCertificate(localCert.first()); QVERIFY(socket->setSocketDescriptor(socketDescriptor, QAbstractSocket::ConnectedState)); socket->startServerEncryption(); } }; void tst_QSslSocket::setEmptyKey() { if (!QSslSocket::supportsSsl()) return; QFETCH_GLOBAL(bool, setProxy); if (setProxy) return; SslServer2 server; server.listen(); QSslSocket socket; socket.connectToHostEncrypted("127.0.0.1", server.serverPort()); QTestEventLoop::instance().enterLoop(2); QCOMPARE(socket.state(), QAbstractSocket::ConnectedState); QCOMPARE(socket.error(), QAbstractSocket::UnknownSocketError); } void tst_QSslSocket::spontaneousWrite() { QFETCH_GLOBAL(bool, setProxy); if (setProxy) return; SslServer server; QSslSocket *receiver = new QSslSocket(this); connect(receiver, SIGNAL(readyRead()), SLOT(exitLoop())); // connect two sockets to each other: QVERIFY(server.listen(QHostAddress::LocalHost)); receiver->connectToHost("127.0.0.1", server.serverPort()); QVERIFY(receiver->waitForConnected(5000)); QVERIFY(server.waitForNewConnection(0)); QSslSocket *sender = server.socket; QVERIFY(sender); QCOMPARE(sender->state(), QAbstractSocket::ConnectedState); receiver->setObjectName("receiver"); sender->setObjectName("sender"); receiver->ignoreSslErrors(); receiver->startClientEncryption(); // SSL handshake: // Need to wait for both sides to emit encrypted as the ordering of which // ones emits encrypted() changes depending on whether we use TLS 1.2 or 1.3 int waitFor = 2; auto earlyQuitter = [&waitFor]() { if (!--waitFor) exitLoop(); }; connect(receiver, &QSslSocket::encrypted, this, earlyQuitter); connect(sender, &QSslSocket::encrypted, this, earlyQuitter); enterLoop(1); QVERIFY(!timeout()); QVERIFY(sender->isEncrypted()); QVERIFY(receiver->isEncrypted()); // make sure there's nothing to be received on the sender: while (sender->waitForReadyRead(10) || receiver->waitForBytesWritten(10)) {} // spontaneously write something: QByteArray data("Hello World"); sender->write(data); // check if the other side receives it: enterLoop(1); QVERIFY(!timeout()); QCOMPARE(receiver->bytesAvailable(), qint64(data.size())); QCOMPARE(receiver->readAll(), data); } void tst_QSslSocket::setReadBufferSize() { QFETCH_GLOBAL(bool, setProxy); if (setProxy) return; SslServer server; QSslSocket *receiver = new QSslSocket(this); connect(receiver, SIGNAL(readyRead()), SLOT(exitLoop())); // connect two sockets to each other: QVERIFY(server.listen(QHostAddress::LocalHost)); receiver->connectToHost("127.0.0.1", server.serverPort()); QVERIFY(receiver->waitForConnected(5000)); QVERIFY(server.waitForNewConnection(0)); QSslSocket *sender = server.socket; QVERIFY(sender); QCOMPARE(sender->state(), QAbstractSocket::ConnectedState); receiver->setObjectName("receiver"); sender->setObjectName("sender"); receiver->ignoreSslErrors(); receiver->startClientEncryption(); // Need to wait for both sides to emit encrypted as the ordering of which // ones emits encrypted() changes depending on whether we use TLS 1.2 or 1.3 int waitFor = 2; auto earlyQuitter = [&waitFor]() { if (!--waitFor) exitLoop(); }; connect(receiver, &QSslSocket::encrypted, this, earlyQuitter); connect(sender, &QSslSocket::encrypted, this, earlyQuitter); enterLoop(1); if (!sender->isEncrypted()) { connect(sender, &QSslSocket::encrypted, this, &tst_QSslSocket::exitLoop); enterLoop(1); } QVERIFY(!timeout()); QVERIFY(sender->isEncrypted()); QVERIFY(receiver->isEncrypted()); QByteArray data(2048, 'b'); receiver->setReadBufferSize(39 * 1024); // make it a non-multiple of the data.size() // saturate the incoming buffer while (sender->state() == QAbstractSocket::ConnectedState && receiver->state() == QAbstractSocket::ConnectedState && receiver->bytesAvailable() < receiver->readBufferSize()) { sender->write(data); //qDebug() << receiver->bytesAvailable() << "<" << receiver->readBufferSize() << (receiver->bytesAvailable() < receiver->readBufferSize()); while (sender->bytesToWrite()) QVERIFY(sender->waitForBytesWritten(10)); // drain it: while (receiver->bytesAvailable() < receiver->readBufferSize() && receiver->waitForReadyRead(10)) {} } //qDebug() << sender->bytesToWrite() << "bytes to write"; //qDebug() << receiver->bytesAvailable() << "bytes available"; // send a bit more sender->write(data); sender->write(data); sender->write(data); sender->write(data); QVERIFY(sender->waitForBytesWritten(10)); qint64 oldBytesAvailable = receiver->bytesAvailable(); // now unset the read buffer limit and iterate receiver->setReadBufferSize(0); enterLoop(1); QVERIFY(!timeout()); QVERIFY(receiver->bytesAvailable() > oldBytesAvailable); } class SetReadBufferSize_task_250027_handler : public QObject { Q_OBJECT public slots: void readyReadSlot() { QTestEventLoop::instance().exitLoop(); } void waitSomeMore(QSslSocket *socket) { QElapsedTimer t; t.start(); while (!socket->encryptedBytesAvailable()) { QCoreApplication::processEvents(QEventLoop::AllEvents | QEventLoop::WaitForMoreEvents, 250); if (t.elapsed() > 1000 || socket->state() != QAbstractSocket::ConnectedState) return; } } }; void tst_QSslSocket::setReadBufferSize_task_250027() { QSKIP("QTBUG-29730 - flakey test blocking integration"); // do not execute this when a proxy is set. QFETCH_GLOBAL(bool, setProxy); if (setProxy) return; QSslSocketPtr socket = newSocket(); socket->setReadBufferSize(1000); // limit to 1 kb/sec socket->ignoreSslErrors(); socket->connectToHostEncrypted(QtNetworkSettings::httpServerName(), 443); socket->ignoreSslErrors(); QVERIFY2(socket->waitForConnected(10*1000), qPrintable(socket->errorString())); if (setProxy && !socket->waitForEncrypted(10*1000)) QSKIP("Skipping flaky test - See QTBUG-29941"); // exit the event loop as soon as we receive a readyRead() SetReadBufferSize_task_250027_handler setReadBufferSize_task_250027_handler; connect(socket.data(), SIGNAL(readyRead()), &setReadBufferSize_task_250027_handler, SLOT(readyReadSlot())); // provoke a response by sending a request socket->write("GET /qtest/fluke.gif HTTP/1.0\n"); // this file is 27 KB socket->write("Host: "); socket->write(QtNetworkSettings::httpServerName().toLocal8Bit().constData()); socket->write("\n"); socket->write("Connection: close\n"); socket->write("\n"); socket->flush(); QTestEventLoop::instance().enterLoop(10); setReadBufferSize_task_250027_handler.waitSomeMore(socket.data()); QByteArray firstRead = socket->readAll(); // First read should be some data, but not the whole file QVERIFY(firstRead.size() > 0 && firstRead.size() < 20*1024); QTestEventLoop::instance().enterLoop(10); setReadBufferSize_task_250027_handler.waitSomeMore(socket.data()); QByteArray secondRead = socket->readAll(); // second read should be some more data int secondReadSize = secondRead.size(); if (secondReadSize <= 0) { QEXPECT_FAIL("", "QTBUG-29730", Continue); } QVERIFY(secondReadSize > 0); socket->close(); } class SslServer3 : public QTcpServer { Q_OBJECT public: SslServer3() : socket(0) { } QSslSocket *socket; protected: void incomingConnection(qintptr socketDescriptor) override { socket = new QSslSocket(this); connect(socket, SIGNAL(sslErrors(QList)), this, SLOT(ignoreErrorSlot())); QFile file(tst_QSslSocket::testDataDir + "certs/fluke.key"); QVERIFY(file.open(QIODevice::ReadOnly)); QSslKey key(file.readAll(), QSsl::Rsa, QSsl::Pem, QSsl::PrivateKey); QVERIFY(!key.isNull()); socket->setPrivateKey(key); QList localCert = QSslCertificate::fromPath(tst_QSslSocket::testDataDir + "certs/fluke.cert"); QVERIFY(!localCert.isEmpty()); QVERIFY(!localCert.first().isNull()); socket->setLocalCertificate(localCert.first()); QVERIFY(socket->setSocketDescriptor(socketDescriptor, QAbstractSocket::ConnectedState)); QVERIFY(!socket->peerAddress().isNull()); QVERIFY(socket->peerPort() != 0); QVERIFY(!socket->localAddress().isNull()); QVERIFY(socket->localPort() != 0); } protected slots: void ignoreErrorSlot() { socket->ignoreSslErrors(); } }; class ThreadedSslServer: public QThread { Q_OBJECT public: QSemaphore dataReadSemaphore; int serverPort; bool ok; ThreadedSslServer() : serverPort(-1), ok(false) { } ~ThreadedSslServer() { if (isRunning()) wait(2000); QVERIFY(ok); } signals: void listening(); protected: void run() override { // if all goes well (no timeouts), this thread will sleep for a total of 500 ms // (i.e., 5 times 100 ms, one sleep for each operation) SslServer3 server; server.listen(QHostAddress::LocalHost); serverPort = server.serverPort(); emit listening(); // delayed acceptance: QTest::qSleep(100); bool ret = server.waitForNewConnection(2000); Q_UNUSED(ret); // delayed start of encryption QTest::qSleep(100); QSslSocket *socket = server.socket; if (!socket || !socket->isValid()) return; // error socket->ignoreSslErrors(); socket->startServerEncryption(); if (!socket->waitForEncrypted(2000)) return; // error // delayed reading data QTest::qSleep(100); if (!socket->waitForReadyRead(2000) && socket->bytesAvailable() == 0) return; // error socket->readAll(); dataReadSemaphore.release(); // delayed sending data QTest::qSleep(100); socket->write("Hello, World"); while (socket->bytesToWrite()) if (!socket->waitForBytesWritten(2000)) return; // error // delayed replying (reading then sending) QTest::qSleep(100); if (!socket->waitForReadyRead(2000)) return; // error socket->write("Hello, World"); while (socket->bytesToWrite()) if (!socket->waitForBytesWritten(2000)) return; // error // delayed disconnection: QTest::qSleep(100); socket->disconnectFromHost(); if (!socket->waitForDisconnected(2000)) return; // error delete socket; ok = true; } }; void tst_QSslSocket::waitForMinusOne() { #ifdef Q_OS_WIN QSKIP("QTBUG-24451 - indefinite wait may hang"); #endif QFETCH_GLOBAL(bool, setProxy); if (setProxy) return; ThreadedSslServer server; connect(&server, SIGNAL(listening()), SLOT(exitLoop())); // start the thread and wait for it to be ready server.start(); enterLoop(1); QVERIFY(!timeout()); // connect to the server QSslSocket socket; QTest::qSleep(100); socket.connectToHost("127.0.0.1", server.serverPort); QVERIFY(socket.waitForConnected(-1)); socket.ignoreSslErrors(); socket.startClientEncryption(); // first verification: this waiting should take 200 ms if (!socket.waitForEncrypted(-1)) QSKIP("Skipping flaky test - See QTBUG-29941"); QVERIFY(socket.isEncrypted()); QCOMPARE(socket.state(), QAbstractSocket::ConnectedState); QCOMPARE(socket.bytesAvailable(), Q_INT64_C(0)); // second verification: write and make sure the other side got it (100 ms) socket.write("How are you doing?"); QVERIFY(socket.bytesToWrite() != 0); QVERIFY(socket.waitForBytesWritten(-1)); QVERIFY(server.dataReadSemaphore.tryAcquire(1, 2500)); // third verification: it should wait for 100 ms: QVERIFY(socket.waitForReadyRead(-1)); QVERIFY(socket.isEncrypted()); QCOMPARE(socket.state(), QAbstractSocket::ConnectedState); QVERIFY(socket.bytesAvailable() != 0); // fourth verification: deadlock prevention: // we write and then wait for reading; the other side needs to receive before // replying (100 ms delay) socket.write("I'm doing just fine!"); QVERIFY(socket.bytesToWrite() != 0); QVERIFY(socket.waitForReadyRead(-1)); // fifth verification: it should wait for 200 ms more QVERIFY(socket.waitForDisconnected(-1)); // sixth verification: reading from a disconnected socket returns -1 // once we deplete the read buffer QCOMPARE(socket.state(), QAbstractSocket::UnconnectedState); socket.readAll(); char aux; QCOMPARE(socket.read(&aux, 1), -1); } class VerifyServer : public QTcpServer { Q_OBJECT public: VerifyServer() : socket(0) { } QSslSocket *socket; protected: void incomingConnection(qintptr socketDescriptor) override { socket = new QSslSocket(this); socket->setPrivateKey(tst_QSslSocket::testDataDir + "certs/fluke.key"); socket->setLocalCertificate(tst_QSslSocket::testDataDir + "certs/fluke.cert"); socket->setSocketDescriptor(socketDescriptor); socket->startServerEncryption(); } }; void tst_QSslSocket::verifyMode() { QFETCH_GLOBAL(bool, setProxy); if (setProxy) return; QSslSocket socket; QCOMPARE(socket.peerVerifyMode(), QSslSocket::AutoVerifyPeer); socket.setPeerVerifyMode(QSslSocket::VerifyNone); QCOMPARE(socket.peerVerifyMode(), QSslSocket::VerifyNone); socket.setPeerVerifyMode(QSslSocket::VerifyNone); socket.setPeerVerifyMode(QSslSocket::VerifyPeer); QCOMPARE(socket.peerVerifyMode(), QSslSocket::VerifyPeer); socket.connectToHostEncrypted(QtNetworkSettings::httpServerName(), 443); if (socket.waitForEncrypted()) QSKIP("Skipping flaky test - See QTBUG-29941"); QList expectedErrors = QList() << QSslError(flukeCertificateError, socket.peerCertificate()); QCOMPARE(socket.sslHandshakeErrors(), expectedErrors); socket.abort(); VerifyServer server; server.listen(); QSslSocket clientSocket; clientSocket.connectToHostEncrypted("127.0.0.1", server.serverPort()); clientSocket.ignoreSslErrors(); QEventLoop loop; QTimer::singleShot(5000, &loop, SLOT(quit())); connect(&clientSocket, SIGNAL(encrypted()), &loop, SLOT(quit())); loop.exec(); QVERIFY(clientSocket.isEncrypted()); QVERIFY(server.socket->sslHandshakeErrors().isEmpty()); } void tst_QSslSocket::verifyDepth() { QSslSocket socket; QCOMPARE(socket.peerVerifyDepth(), 0); socket.setPeerVerifyDepth(1); QCOMPARE(socket.peerVerifyDepth(), 1); QTest::ignoreMessage(QtWarningMsg, "QSslSocket::setPeerVerifyDepth: cannot set negative depth of -1"); socket.setPeerVerifyDepth(-1); QCOMPARE(socket.peerVerifyDepth(), 1); } void tst_QSslSocket::verifyAndDefaultConfiguration() { QFETCH_GLOBAL(const bool, setProxy); if (setProxy) return; if (!QSslSocket::supportedFeatures().contains(QSsl::SupportedFeature::CertificateVerification)) QSKIP("This backend doesn't support manual certificate verification"); const auto defaultCACertificates = QSslConfiguration::defaultConfiguration().caCertificates(); const auto chainGuard = qScopeGuard([&defaultCACertificates]{ auto conf = QSslConfiguration::defaultConfiguration(); conf.setCaCertificates(defaultCACertificates); QSslConfiguration::setDefaultConfiguration(conf); }); auto chain = QSslCertificate::fromPath(testDataDir + QStringLiteral("certs/qtiochain.crt"), QSsl::Pem); QCOMPARE(chain.size(), 2); QVERIFY(!chain.at(0).isNull()); QVERIFY(!chain.at(1).isNull()); auto errors = QSslCertificate::verify(chain); // At least, test that 'verify' did not alter the default configuration: QCOMPARE(defaultCACertificates, QSslConfiguration::defaultConfiguration().caCertificates()); if (!errors.isEmpty()) QSKIP("The certificate for qt.io could not be trusted, skipping the rest of the test"); #ifdef Q_OS_WINDOWS const auto fakeCaChain = QSslCertificate::fromPath(testDataDir + QStringLiteral("certs/fluke.cert")); QCOMPARE(fakeCaChain.size(), 1); const auto caCert = fakeCaChain.at(0); QVERIFY(!caCert.isNull()); auto conf = QSslConfiguration::defaultConfiguration(); conf.setCaCertificates({caCert}); QSslConfiguration::setDefaultConfiguration(conf); errors = QSslCertificate::verify(chain); QVERIFY(errors.size() > 0); QCOMPARE(QSslConfiguration::defaultConfiguration().caCertificates(), QList{caCert}); #endif } void tst_QSslSocket::disconnectFromHostWhenConnecting() { QSslSocketPtr socket = newSocket(); socket->connectToHostEncrypted(QtNetworkSettings::imapServerName(), 993); socket->ignoreSslErrors(); socket->write("XXXX LOGOUT\r\n"); QAbstractSocket::SocketState state = socket->state(); // without proxy, the state will be HostLookupState; // with proxy, the state will be ConnectingState. QVERIFY(socket->state() == QAbstractSocket::HostLookupState || socket->state() == QAbstractSocket::ConnectingState); socket->disconnectFromHost(); // the state of the socket must be the same before and after calling // disconnectFromHost() QCOMPARE(state, socket->state()); QVERIFY(socket->state() == QAbstractSocket::HostLookupState || socket->state() == QAbstractSocket::ConnectingState); if (!socket->waitForDisconnected(10000)) QSKIP("Skipping flaky test - See QTBUG-29941"); QCOMPARE(socket->state(), QAbstractSocket::UnconnectedState); // we did not call close, so the socket must be still open QVERIFY(socket->isOpen()); QCOMPARE(socket->bytesToWrite(), qint64(0)); // don't forget to login QCOMPARE((int) socket->write("USER ftptest\r\n"), 14); } void tst_QSslSocket::disconnectFromHostWhenConnected() { QSslSocketPtr socket = newSocket(); socket->connectToHostEncrypted(QtNetworkSettings::imapServerName(), 993); socket->ignoreSslErrors(); if (!socket->waitForEncrypted(5000)) QSKIP("Skipping flaky test - See QTBUG-29941"); socket->write("XXXX LOGOUT\r\n"); QCOMPARE(socket->state(), QAbstractSocket::ConnectedState); socket->disconnectFromHost(); QCOMPARE(socket->state(), QAbstractSocket::ClosingState); QVERIFY(socket->waitForDisconnected(5000)); QCOMPARE(socket->bytesToWrite(), qint64(0)); } #if QT_CONFIG(openssl) class BrokenPskHandshake : public QTcpServer { public: void socketError(QAbstractSocket::SocketError error) { Q_UNUSED(error); QSslSocket *clientSocket = qobject_cast(sender()); Q_ASSERT(clientSocket); clientSocket->close(); QTestEventLoop::instance().exitLoop(); } private: void incomingConnection(qintptr handle) override { if (!socket.setSocketDescriptor(handle)) return; QSslConfiguration serverConfig(QSslConfiguration::defaultConfiguration()); serverConfig.setPreSharedKeyIdentityHint("abcdefghijklmnop"); socket.setSslConfiguration(serverConfig); socket.startServerEncryption(); } QSslSocket socket; }; void tst_QSslSocket::closeWhileEmittingSocketError() { if (!isTestingOpenSsl) QSKIP("The active TLS backend does not support this test"); QFETCH_GLOBAL(bool, setProxy); if (setProxy) return; BrokenPskHandshake handshake; if (!handshake.listen()) QSKIP("failed to start TLS server"); QSslSocket clientSocket; QSslConfiguration clientConfig(QSslConfiguration::defaultConfiguration()); clientConfig.setPeerVerifyMode(QSslSocket::VerifyNone); clientSocket.setSslConfiguration(clientConfig); QSignalSpy socketErrorSpy(&clientSocket, SIGNAL(errorOccurred(QAbstractSocket::SocketError))); connect(&clientSocket, &QSslSocket::errorOccurred, &handshake, &BrokenPskHandshake::socketError); clientSocket.connectToHostEncrypted(QStringLiteral("127.0.0.1"), handshake.serverPort()); // Make sure we have some data buffered so that close will try to flush: clientSocket.write(QByteArray(1000000, Qt::Uninitialized)); QTestEventLoop::instance().enterLoopMSecs(1000); QVERIFY(!QTestEventLoop::instance().timeout()); QCOMPARE(socketErrorSpy.size(), 1); } #endif // Feature 'openssl'. void tst_QSslSocket::resetProxy() { #if QT_CONFIG(networkproxy) QFETCH_GLOBAL(bool, setProxy); if (setProxy) return; // check fix for bug 199941 QNetworkProxy goodProxy(QNetworkProxy::NoProxy); QNetworkProxy badProxy(QNetworkProxy::HttpProxy, "thisCannotWorkAbsolutelyNotForSure", 333); // make sure the connection works, and then set a nonsense proxy, and then // make sure it does not work anymore QSslSocket socket; auto config = socket.sslConfiguration(); config.addCaCertificates(httpServerCertChainPath()); socket.setSslConfiguration(config); socket.setProxy(goodProxy); socket.connectToHostEncrypted(QtNetworkSettings::httpServerName(), 443); QVERIFY2(socket.waitForConnected(10000), qPrintable(socket.errorString())); socket.abort(); socket.setProxy(badProxy); socket.connectToHostEncrypted(QtNetworkSettings::httpServerName(), 443); QVERIFY(! socket.waitForConnected(10000)); // don't forget to login QCOMPARE((int) socket.write("USER ftptest\r\n"), 14); QCOMPARE((int) socket.write("PASS password\r\n"), 15); enterLoop(10); // now the other way round: // set the nonsense proxy and make sure the connection does not work, // and then set the right proxy and make sure it works QSslSocket socket2; auto config2 = socket.sslConfiguration(); config2.addCaCertificates(httpServerCertChainPath()); socket2.setSslConfiguration(config2); socket2.setProxy(badProxy); socket2.connectToHostEncrypted(QtNetworkSettings::httpServerName(), 443); QVERIFY(! socket2.waitForConnected(10000)); socket2.abort(); socket2.setProxy(goodProxy); socket2.connectToHostEncrypted(QtNetworkSettings::httpServerName(), 443); QVERIFY2(socket2.waitForConnected(10000), qPrintable(socket.errorString())); #endif // QT_CONFIG(networkproxy) } void tst_QSslSocket::ignoreSslErrorsList_data() { QTest::addColumn >("expectedSslErrors"); QTest::addColumn("expectedSslErrorSignalCount"); // construct the list of errors that we will get with the SSL handshake and that we will ignore QList expectedSslErrors; // fromPath gives us a list of certs, but it actually only contains one QList certs = QSslCertificate::fromPath(httpServerCertChainPath()); QSslError rightError(flukeCertificateError, certs.at(0)); QSslError wrongError(flukeCertificateError); QTest::newRow("SSL-failure-empty-list") << expectedSslErrors << 1; expectedSslErrors.append(wrongError); QTest::newRow("SSL-failure-wrong-error") << expectedSslErrors << 1; expectedSslErrors.append(rightError); QTest::newRow("allErrorsInExpectedList1") << expectedSslErrors << 0; expectedSslErrors.removeAll(wrongError); QTest::newRow("allErrorsInExpectedList2") << expectedSslErrors << 0; expectedSslErrors.removeAll(rightError); QTest::newRow("SSL-failure-empty-list-again") << expectedSslErrors << 1; } void tst_QSslSocket::ignoreSslErrorsList() { QSslSocket socket; connect(&socket, SIGNAL(proxyAuthenticationRequired(QNetworkProxy,QAuthenticator*)), this, SLOT(proxyAuthenticationRequired(QNetworkProxy,QAuthenticator*))); QSslCertificate cert; QFETCH(QList, expectedSslErrors); socket.ignoreSslErrors(expectedSslErrors); QFETCH(int, expectedSslErrorSignalCount); QSignalSpy sslErrorsSpy(&socket, SIGNAL(errorOccurred(QAbstractSocket::SocketError))); socket.connectToHostEncrypted(QtNetworkSettings::httpServerName(), 443); bool expectEncryptionSuccess = (expectedSslErrorSignalCount == 0); if (socket.waitForEncrypted(10000) != expectEncryptionSuccess) QSKIP("Skipping flaky test - See QTBUG-29941"); QCOMPARE(sslErrorsSpy.size(), expectedSslErrorSignalCount); } void tst_QSslSocket::ignoreSslErrorsListWithSlot_data() { ignoreSslErrorsList_data(); } // this is not a test, just a slot called in the test below void tst_QSslSocket::ignoreErrorListSlot(const QList &) { socket->ignoreSslErrors(storedExpectedSslErrors); } void tst_QSslSocket::ignoreSslErrorsListWithSlot() { QSslSocket socket; this->socket = &socket; QFETCH(QList, expectedSslErrors); // store the errors to ignore them later in the slot connected below storedExpectedSslErrors = expectedSslErrors; connect(&socket, SIGNAL(proxyAuthenticationRequired(QNetworkProxy,QAuthenticator*)), this, SLOT(proxyAuthenticationRequired(QNetworkProxy,QAuthenticator*))); connect(&socket, SIGNAL(sslErrors(QList)), this, SLOT(ignoreErrorListSlot(QList))); socket.connectToHostEncrypted(QtNetworkSettings::httpServerName(), 443); QFETCH(int, expectedSslErrorSignalCount); bool expectEncryptionSuccess = (expectedSslErrorSignalCount == 0); QFETCH_GLOBAL(bool, setProxy); if (setProxy && (socket.waitForEncrypted(10000) != expectEncryptionSuccess)) QSKIP("Skipping flaky test - See QTBUG-29941"); } void tst_QSslSocket::abortOnSslErrors() { QFETCH_GLOBAL(bool, setProxy); if (setProxy) return; SslServer server; QVERIFY(server.listen()); QSslSocket clientSocket; connect(&clientSocket, SIGNAL(sslErrors(QList)), this, SLOT(abortOnErrorSlot())); clientSocket.connectToHostEncrypted("127.0.0.1", server.serverPort()); clientSocket.ignoreSslErrors(); QEventLoop loop; QTimer::singleShot(1000, &loop, SLOT(quit())); loop.exec(); QCOMPARE(clientSocket.state(), QAbstractSocket::UnconnectedState); } // make sure a closed socket has no bytesAvailable() // related to https://bugs.webkit.org/show_bug.cgi?id=28016 void tst_QSslSocket::readFromClosedSocket() { QSslSocketPtr socket = newSocket(); socket->ignoreSslErrors(); socket->connectToHostEncrypted(QtNetworkSettings::httpServerName(), 443); socket->ignoreSslErrors(); socket->waitForConnected(); socket->waitForEncrypted(); // provoke a response by sending a request socket->write("GET /qtest/fluke.gif HTTP/1.1\n"); socket->write("Host: "); socket->write(QtNetworkSettings::httpServerName().toLocal8Bit().constData()); socket->write("\n"); socket->write("\n"); socket->waitForBytesWritten(); socket->waitForReadyRead(); QFETCH_GLOBAL(bool, setProxy); if (setProxy && (socket->state() != QAbstractSocket::ConnectedState)) QSKIP("Skipping flaky test - See QTBUG-29941"); QVERIFY(socket->bytesAvailable()); socket->close(); QVERIFY(!socket->bytesAvailable()); QVERIFY(!socket->bytesToWrite()); QCOMPARE(socket->state(), QAbstractSocket::UnconnectedState); } void tst_QSslSocket::writeBigChunk() { if (!QSslSocket::supportsSsl()) return; QSslSocketPtr socket = newSocket(); this->socket = socket.data(); connect(this->socket, SIGNAL(sslErrors(QList)), this, SLOT(ignoreErrorSlot())); socket->connectToHostEncrypted(QtNetworkSettings::httpServerName(), 443); QByteArray data; // Originally, the test had this: '1024*1024*10; // 10 MB' data.resize(1024 * 1024 * 10); // Init with garbage. Needed so TLS cannot compress it in an efficient way. QRandomGenerator::global()->fillRange(reinterpret_cast(data.data()), data.size() / int(sizeof(quint32))); if (!socket->waitForEncrypted(10000)) QSKIP("Skipping flaky test - See QTBUG-29941"); QString errorBefore = socket->errorString(); int ret = socket->write(data.constData(), data.size()); QCOMPARE(data.size(), ret); // spin the event loop once so QSslSocket::transmit() gets called QCoreApplication::processEvents(); QString errorAfter = socket->errorString(); // no better way to do this right now since the error is the same as the default error. if (socket->errorString().startsWith(QLatin1String("Unable to write data"))) { qWarning() << socket->error() << socket->errorString(); QFAIL("Error while writing! Check if the OpenSSL BIO size is limited?!"); } // also check the error string. If another error (than UnknownError) occurred, it should be different than before QVERIFY2(errorBefore == errorAfter || socket->error() == QAbstractSocket::RemoteHostClosedError, QByteArray("unexpected error: ").append(qPrintable(errorAfter))); // check that everything has been written to OpenSSL QCOMPARE(socket->bytesToWrite(), 0); socket->close(); } void tst_QSslSocket::blacklistedCertificates() { QFETCH_GLOBAL(bool, setProxy); if (setProxy) return; SslServer server(testDataDir + "certs/fake-login.live.com.key", testDataDir + "certs/fake-login.live.com.pem"); QSslSocket *receiver = new QSslSocket(this); connect(receiver, SIGNAL(readyRead()), SLOT(exitLoop())); // connect two sockets to each other: QVERIFY(server.listen(QHostAddress::LocalHost)); receiver->connectToHost("127.0.0.1", server.serverPort()); QVERIFY(receiver->waitForConnected(5000)); if (!server.waitForNewConnection(0)) QSKIP("Skipping flaky test - See QTBUG-29941"); QSslSocket *sender = server.socket; QVERIFY(sender); QCOMPARE(sender->state(), QAbstractSocket::ConnectedState); receiver->setObjectName("receiver"); sender->setObjectName("sender"); receiver->startClientEncryption(); connect(receiver, SIGNAL(sslErrors(QList)), SLOT(exitLoop())); connect(receiver, SIGNAL(encrypted()), SLOT(exitLoop())); enterLoop(1); QList sslErrors = receiver->sslHandshakeErrors(); QVERIFY(sslErrors.size() > 0); // there are more errors (self signed cert and hostname mismatch), but we only care about the blacklist error QCOMPARE(sslErrors.at(0).error(), QSslError::CertificateBlacklisted); } void tst_QSslSocket::versionAccessors() { if (!QSslSocket::supportsSsl()) return; qDebug() << QSslSocket::sslLibraryVersionString(); qDebug() << QString::number(QSslSocket::sslLibraryVersionNumber(), 16); } void tst_QSslSocket::encryptWithoutConnecting() { if (!QSslSocket::supportsSsl()) return; QTest::ignoreMessage(QtWarningMsg, "QSslSocket::startClientEncryption: cannot start handshake when not connected"); QSslSocket sock; sock.startClientEncryption(); } void tst_QSslSocket::resume_data() { QTest::addColumn("ignoreErrorsAfterPause"); QTest::addColumn >("errorsToIgnore"); QTest::addColumn("expectSuccess"); QList errorsList; QTest::newRow("DoNotIgnoreErrors") << false << QList() << false; QTest::newRow("ignoreAllErrors") << true << QList() << true; // Note, httpServerCertChainPath() it's ... because we use the same certificate on // different services. We'll be actually connecting to IMAP server. QList certs = QSslCertificate::fromPath(httpServerCertChainPath()); QSslError rightError(flukeCertificateError, certs.at(0)); QSslError wrongError(flukeCertificateError); errorsList.append(wrongError); QTest::newRow("ignoreSpecificErrors-Wrong") << true << errorsList << false; errorsList.clear(); errorsList.append(rightError); QTest::newRow("ignoreSpecificErrors-Right") << true << errorsList << true; } void tst_QSslSocket::resume() { // make sure the server certificate is not in the list of accepted certificates, // we want to trigger the sslErrors signal auto sslConfig = QSslConfiguration::defaultConfiguration(); sslConfig.setCaCertificates(QSslConfiguration::systemCaCertificates()); QSslConfiguration::setDefaultConfiguration(sslConfig); QFETCH(bool, ignoreErrorsAfterPause); QFETCH(QList, errorsToIgnore); QFETCH(bool, expectSuccess); QSslSocket socket; socket.setPauseMode(QAbstractSocket::PauseOnSslErrors); // Set TLS 1.0 or above because the server doesn't support TLS 1.2 or above // QTQAINFRA-4499 QSslConfiguration config = socket.sslConfiguration(); config.setProtocol(Test::TlsV1_0OrLater); socket.setSslConfiguration(config); QSignalSpy sslErrorSpy(&socket, SIGNAL(sslErrors(QList))); QSignalSpy encryptedSpy(&socket, SIGNAL(encrypted())); QSignalSpy errorSpy(&socket, SIGNAL(errorOccurred(QAbstractSocket::SocketError))); connect(&socket, SIGNAL(sslErrors(QList)), &QTestEventLoop::instance(), SLOT(exitLoop())); connect(&socket, SIGNAL(encrypted()), &QTestEventLoop::instance(), SLOT(exitLoop())); connect(&socket, SIGNAL(proxyAuthenticationRequired(QNetworkProxy,QAuthenticator*)), this, SLOT(proxyAuthenticationRequired(QNetworkProxy,QAuthenticator*))); connect(&socket, SIGNAL(errorOccurred(QAbstractSocket::SocketError)), &QTestEventLoop::instance(), SLOT(exitLoop())); socket.connectToHostEncrypted(QtNetworkSettings::imapServerName(), 993); QTestEventLoop::instance().enterLoop(10); QFETCH_GLOBAL(bool, setProxy); if (setProxy && QTestEventLoop::instance().timeout()) QSKIP("Skipping flaky test - See QTBUG-29941"); QCOMPARE(sslErrorSpy.size(), 1); QCOMPARE(errorSpy.size(), 0); QCOMPARE(encryptedSpy.size(), 0); QVERIFY(!socket.isEncrypted()); if (ignoreErrorsAfterPause) { if (errorsToIgnore.empty()) socket.ignoreSslErrors(); else socket.ignoreSslErrors(errorsToIgnore); } socket.resume(); QTestEventLoop::instance().enterLoop(10); QVERIFY(!QTestEventLoop::instance().timeout()); // quit by encrypted() or error() signal if (expectSuccess) { QCOMPARE(encryptedSpy.size(), 1); QVERIFY(socket.isEncrypted()); QCOMPARE(errorSpy.size(), 0); socket.disconnectFromHost(); QVERIFY(socket.waitForDisconnected(10000)); } else { QCOMPARE(encryptedSpy.size(), 0); QVERIFY(!socket.isEncrypted()); QCOMPARE(errorSpy.size(), 1); QCOMPARE(socket.error(), QAbstractSocket::SslHandshakeFailedError); } } class WebSocket : public QSslSocket { Q_OBJECT public: explicit WebSocket(qintptr socketDescriptor, const QString &keyFile = tst_QSslSocket::testDataDir + "certs/fluke.key", const QString &certFile = tst_QSslSocket::testDataDir + "certs/fluke.cert"); protected slots: void onReadyReadFirstBytes(void); private: void _startServerEncryption(void); QString m_keyFile; QString m_certFile; private: Q_DISABLE_COPY(WebSocket) }; WebSocket::WebSocket (qintptr socketDescriptor, const QString &keyFile, const QString &certFile) : m_keyFile(keyFile), m_certFile(certFile) { QVERIFY(setSocketDescriptor(socketDescriptor, QAbstractSocket::ConnectedState, QIODevice::ReadWrite | QIODevice::Unbuffered)); connect (this, SIGNAL(readyRead()), this, SLOT(onReadyReadFirstBytes())); } void WebSocket::_startServerEncryption (void) { QFile file(m_keyFile); QVERIFY(file.open(QIODevice::ReadOnly)); QSslKey key(file.readAll(), QSsl::Rsa, QSsl::Pem, QSsl::PrivateKey); QVERIFY(!key.isNull()); setPrivateKey(key); QList localCert = QSslCertificate::fromPath(m_certFile); QVERIFY(!localCert.isEmpty()); QVERIFY(!localCert.first().isNull()); setLocalCertificate(localCert.first()); QVERIFY(!peerAddress().isNull()); QVERIFY(peerPort() != 0); QVERIFY(!localAddress().isNull()); QVERIFY(localPort() != 0); setProtocol(QSsl::AnyProtocol); setPeerVerifyMode(QSslSocket::VerifyNone); ignoreSslErrors(); startServerEncryption(); } void WebSocket::onReadyReadFirstBytes (void) { peek(1); disconnect(this,SIGNAL(readyRead()), this, SLOT(onReadyReadFirstBytes())); _startServerEncryption(); } class SslServer4 : public QTcpServer { Q_OBJECT public: QScopedPointer socket; protected: void incomingConnection(qintptr socketDescriptor) override { socket.reset(new WebSocket(socketDescriptor)); } }; void tst_QSslSocket::qtbug18498_peek() { QFETCH_GLOBAL(bool, setProxy); if (setProxy) return; SslServer4 server; QVERIFY(server.listen(QHostAddress::LocalHost)); QSslSocket client; client.connectToHost("127.0.0.1", server.serverPort()); QVERIFY(client.waitForConnected(5000)); QVERIFY(server.waitForNewConnection(1000)); client.ignoreSslErrors(); int encryptedCounter = 2; connect(&client, &QSslSocket::encrypted, this, [&encryptedCounter](){ if (!--encryptedCounter) exitLoop(); }); WebSocket *serversocket = server.socket.data(); connect(serversocket, &QSslSocket::encrypted, this, [&encryptedCounter](){ if (!--encryptedCounter) exitLoop(); }); connect(&client, SIGNAL(disconnected()), this, SLOT(exitLoop())); client.startClientEncryption(); QVERIFY(serversocket); enterLoop(1); QVERIFY(!timeout()); QVERIFY(serversocket->isEncrypted()); QVERIFY(client.isEncrypted()); QByteArray data("abc123"); client.write(data.data()); connect(serversocket, SIGNAL(readyRead()), this, SLOT(exitLoop())); enterLoop(1); QVERIFY(!timeout()); QByteArray peek1_data; peek1_data.reserve(data.size()); QByteArray peek2_data; QByteArray read_data; int lngth = serversocket->peek(peek1_data.data(), 10); peek1_data.resize(lngth); peek2_data = serversocket->peek(10); read_data = serversocket->readAll(); QCOMPARE(peek1_data, data); QCOMPARE(peek2_data, data); QCOMPARE(read_data, data); } class SslServer5 : public QTcpServer { Q_OBJECT public: SslServer5() : socket(0) {} QSslSocket *socket; protected: void incomingConnection(qintptr socketDescriptor) override { socket = new QSslSocket; socket->setSocketDescriptor(socketDescriptor); } }; void tst_QSslSocket::qtbug18498_peek2() { QFETCH_GLOBAL(bool, setProxy); if (setProxy) return; SslServer5 listener; QVERIFY(listener.listen(QHostAddress::Any)); QScopedPointer client(new QSslSocket); client->connectToHost(QHostAddress::LocalHost, listener.serverPort()); QVERIFY(client->waitForConnected(5000)); QVERIFY(listener.waitForNewConnection(1000)); QScopedPointer server(listener.socket); QVERIFY(server->write("HELLO\r\n", 7)); QTRY_COMPARE(client->bytesAvailable(), 7); char c; QCOMPARE(client->peek(&c,1), 1); QCOMPARE(c, 'H'); QCOMPARE(client->read(&c,1), 1); QCOMPARE(c, 'H'); QByteArray b = client->peek(2); QCOMPARE(b, QByteArray("EL")); char a[3]; QVERIFY(client->peek(a, 2) == 2); QCOMPARE(a[0], 'E'); QCOMPARE(a[1], 'L'); QCOMPARE(client->readAll(), QByteArray("ELLO\r\n")); //check data split between QIODevice and plain socket buffers. QByteArray bigblock; bigblock.fill('#', QIODEVICE_BUFFERSIZE + 1024); QVERIFY(client->write(QByteArray("head"))); QVERIFY(client->write(bigblock)); QTRY_COMPARE(server->bytesAvailable(), bigblock.size() + 4); QCOMPARE(server->read(4), QByteArray("head")); QCOMPARE(server->peek(bigblock.size()), bigblock); b.reserve(bigblock.size()); b.resize(server->peek(b.data(), bigblock.size())); QCOMPARE(b, bigblock); //check oversized peek QCOMPARE(server->peek(bigblock.size() * 3), bigblock); b.reserve(bigblock.size() * 3); b.resize(server->peek(b.data(), bigblock.size() * 3)); QCOMPARE(b, bigblock); QCOMPARE(server->readAll(), bigblock); QVERIFY(client->write("STARTTLS\r\n")); QTRY_COMPARE(server->bytesAvailable(), 10); QCOMPARE(server->peek(&c,1), 1); QCOMPARE(c, 'S'); b = server->peek(3); QCOMPARE(b, QByteArray("STA")); QCOMPARE(server->read(5), QByteArray("START")); QVERIFY(server->peek(a, 3) == 3); QCOMPARE(a[0], 'T'); QCOMPARE(a[1], 'L'); QCOMPARE(a[2], 'S'); QCOMPARE(server->readAll(), QByteArray("TLS\r\n")); QFile file(testDataDir + "certs/fluke.key"); QVERIFY(file.open(QIODevice::ReadOnly)); QSslKey key(file.readAll(), QSsl::Rsa, QSsl::Pem, QSsl::PrivateKey); QVERIFY(!key.isNull()); server->setPrivateKey(key); QList localCert = QSslCertificate::fromPath(testDataDir + "certs/fluke.cert"); QVERIFY(!localCert.isEmpty()); QVERIFY(!localCert.first().isNull()); server->setLocalCertificate(localCert.first()); server->setProtocol(QSsl::AnyProtocol); server->setPeerVerifyMode(QSslSocket::VerifyNone); server->ignoreSslErrors(); client->ignoreSslErrors(); server->startServerEncryption(); client->startClientEncryption(); QVERIFY(server->write("hello\r\n", 7)); QTRY_COMPARE(client->bytesAvailable(), 7); QVERIFY(server->mode() == QSslSocket::SslServerMode && client->mode() == QSslSocket::SslClientMode); QCOMPARE(client->peek(&c,1), 1); QCOMPARE(c, 'h'); QCOMPARE(client->read(&c,1), 1); QCOMPARE(c, 'h'); b = client->peek(2); QCOMPARE(b, QByteArray("el")); QCOMPARE(client->readAll(), QByteArray("ello\r\n")); QVERIFY(client->write("goodbye\r\n")); QTRY_COMPARE(server->bytesAvailable(), 9); QCOMPARE(server->peek(&c,1), 1); QCOMPARE(c, 'g'); QCOMPARE(server->readAll(), QByteArray("goodbye\r\n")); client->disconnectFromHost(); QVERIFY(client->waitForDisconnected(5000)); } void tst_QSslSocket::dhServer() { if (!QSslSocket::supportsSsl()) QSKIP("No SSL support"); QFETCH_GLOBAL(bool, setProxy); if (setProxy) return; SslServer server; server.ciphers = {QSslCipher("DHE-RSA-AES256-SHA"), QSslCipher("DHE-DSS-AES256-SHA")}; QVERIFY(server.listen()); QEventLoop loop; QTimer::singleShot(5000, &loop, SLOT(quit())); QSslSocket client; socket = &client; connect(socket, SIGNAL(errorOccurred(QAbstractSocket::SocketError)), &loop, SLOT(quit())); connect(socket, SIGNAL(sslErrors(QList)), this, SLOT(ignoreErrorSlot())); connect(socket, SIGNAL(encrypted()), &loop, SLOT(quit())); client.connectToHostEncrypted(QHostAddress(QHostAddress::LocalHost).toString(), server.serverPort()); loop.exec(); QCOMPARE(client.state(), QAbstractSocket::ConnectedState); } #if QT_CONFIG(openssl) void tst_QSslSocket::dhServerCustomParamsNull() { if (!isTestingOpenSsl) QSKIP("This test requires OpenSSL as the active TLS backend"); QFETCH_GLOBAL(bool, setProxy); if (setProxy) return; SslServer server; server.ciphers = {QSslCipher("DHE-RSA-AES256-SHA"), QSslCipher("DHE-DSS-AES256-SHA")}; server.protocol = Test::TlsV1_0; QSslConfiguration cfg = server.config; cfg.setDiffieHellmanParameters(QSslDiffieHellmanParameters()); server.config = cfg; QVERIFY(server.listen()); QEventLoop loop; QTimer::singleShot(5000, &loop, SLOT(quit())); QSslSocket client; QSslConfiguration config = client.sslConfiguration(); config.setProtocol(Test::TlsV1_0); client.setSslConfiguration(config); socket = &client; connect(socket, SIGNAL(errorOccurred(QAbstractSocket::SocketError)), &loop, SLOT(quit())); connect(socket, SIGNAL(sslErrors(QList)), this, SLOT(ignoreErrorSlot())); connect(socket, SIGNAL(encrypted()), &loop, SLOT(quit())); client.connectToHostEncrypted(QHostAddress(QHostAddress::LocalHost).toString(), server.serverPort()); loop.exec(); QVERIFY(client.state() != QAbstractSocket::ConnectedState); } void tst_QSslSocket::dhServerCustomParams() { if (!QSslSocket::supportsSsl()) QSKIP("No SSL support"); QFETCH_GLOBAL(bool, setProxy); if (setProxy) return; SslServer server; server.ciphers = {QSslCipher("DHE-RSA-AES256-SHA"), QSslCipher("DHE-DSS-AES256-SHA")}; QSslConfiguration cfg = server.config; // Custom 2048-bit DH parameters generated with 'openssl dhparam -outform DER -out out.der -check -2 2048' const auto dh = QSslDiffieHellmanParameters::fromEncoded(QByteArray::fromBase64(QByteArrayLiteral( "MIIBCAKCAQEAvVA7b8keTfjFutCtTJmP/pnQfw/prKa+GMed/pBWjrC4N1YwnI8h/A861d9WE/VWY7XMTjvjX3/0" "aaU8wEe0EXNpFdlTH+ZMQctQTSJOyQH0RCTwJfDGPCPT9L+c9GKwEKWORH38Earip986HJc0w3UbnfIwXUdsWHiXi" "Z6r3cpyBmTKlsXTFiDVAOUXSiO8d/zOb6zHZbDfyB/VbtZRmnA7TXVn9oMzC0g9+FXHdrV4K+XfdvNZdCegvoAZiy" "R6ZQgNG9aZ36/AQekhg060hp55f9HDPgXqYeNeXBiferjUtU7S9b3s83XhOJAr01/0Tf5dENwCfg2gK36TM8cC4wI" "BAg==")), QSsl::Der); cfg.setDiffieHellmanParameters(dh); server.config = cfg; QVERIFY(server.listen()); QEventLoop loop; QTimer::singleShot(5000, &loop, SLOT(quit())); QSslSocket client; socket = &client; connect(socket, SIGNAL(errorOccurred(QAbstractSocket::SocketError)), &loop, SLOT(quit())); connect(socket, SIGNAL(sslErrors(QList)), this, SLOT(ignoreErrorSlot())); connect(socket, SIGNAL(encrypted()), &loop, SLOT(quit())); client.connectToHostEncrypted(QHostAddress(QHostAddress::LocalHost).toString(), server.serverPort()); loop.exec(); QVERIFY(client.state() == QAbstractSocket::ConnectedState); } #endif // QT_CONFIG(openssl) void tst_QSslSocket::ecdhServer() { if (!QSslSocket::supportsSsl()) { qWarning("SSL not supported, skipping test"); return; } QFETCH_GLOBAL(bool, setProxy); if (setProxy) return; SslServer server; server.ciphers = {QSslCipher("ECDHE-RSA-AES128-SHA")}; QVERIFY(server.listen()); QEventLoop loop; QTimer::singleShot(5000, &loop, SLOT(quit())); QSslSocket client; socket = &client; connect(socket, SIGNAL(errorOccurred(QAbstractSocket::SocketError)), &loop, SLOT(quit())); connect(socket, SIGNAL(sslErrors(QList)), this, SLOT(ignoreErrorSlot())); connect(socket, SIGNAL(encrypted()), &loop, SLOT(quit())); client.connectToHostEncrypted(QHostAddress(QHostAddress::LocalHost).toString(), server.serverPort()); loop.exec(); QCOMPARE(client.state(), QAbstractSocket::ConnectedState); } void tst_QSslSocket::verifyClientCertificate_data() { QTest::addColumn("peerVerifyMode"); QTest::addColumn >("clientCerts"); QTest::addColumn("clientKey"); QTest::addColumn("works"); // no certificate QList noCerts; QSslKey noKey; QTest::newRow("NoCert:AutoVerifyPeer") << QSslSocket::AutoVerifyPeer << noCerts << noKey << true; QTest::newRow("NoCert:QueryPeer") << QSslSocket::QueryPeer << noCerts << noKey << true; QTest::newRow("NoCert:VerifyNone") << QSslSocket::VerifyNone << noCerts << noKey << true; QTest::newRow("NoCert:VerifyPeer") << QSslSocket::VerifyPeer << noCerts << noKey << false; // self-signed certificate QList flukeCerts = QSslCertificate::fromPath(testDataDir + "certs/fluke.cert"); QCOMPARE(flukeCerts.size(), 1); QFile flukeFile(testDataDir + "certs/fluke.key"); QVERIFY(flukeFile.open(QIODevice::ReadOnly)); QSslKey flukeKey(flukeFile.readAll(), QSsl::Rsa, QSsl::Pem, QSsl::PrivateKey); QVERIFY(!flukeKey.isNull()); QTest::newRow("SelfSignedCert:AutoVerifyPeer") << QSslSocket::AutoVerifyPeer << flukeCerts << flukeKey << true; QTest::newRow("SelfSignedCert:QueryPeer") << QSslSocket::QueryPeer << flukeCerts << flukeKey << true; QTest::newRow("SelfSignedCert:VerifyNone") << QSslSocket::VerifyNone << flukeCerts << flukeKey << true; QTest::newRow("SelfSignedCert:VerifyPeer") << QSslSocket::VerifyPeer << flukeCerts << flukeKey << false; // valid certificate, but wrong usage (server certificate) QList serverCerts = QSslCertificate::fromPath(testDataDir + "certs/bogus-server.crt"); QCOMPARE(serverCerts.size(), 1); QFile serverFile(testDataDir + "certs/bogus-server.key"); QVERIFY(serverFile.open(QIODevice::ReadOnly)); QSslKey serverKey(serverFile.readAll(), QSsl::Rsa, QSsl::Pem, QSsl::PrivateKey); QVERIFY(!serverKey.isNull()); QTest::newRow("ValidServerCert:AutoVerifyPeer") << QSslSocket::AutoVerifyPeer << serverCerts << serverKey << true; QTest::newRow("ValidServerCert:QueryPeer") << QSslSocket::QueryPeer << serverCerts << serverKey << true; QTest::newRow("ValidServerCert:VerifyNone") << QSslSocket::VerifyNone << serverCerts << serverKey << true; QTest::newRow("ValidServerCert:VerifyPeer") << QSslSocket::VerifyPeer << serverCerts << serverKey << false; // valid certificate, correct usage (client certificate) QList validCerts = QSslCertificate::fromPath(testDataDir + "certs/bogus-client.crt"); QCOMPARE(validCerts.size(), 1); QFile validFile(testDataDir + "certs/bogus-client.key"); QVERIFY(validFile.open(QIODevice::ReadOnly)); QSslKey validKey(validFile.readAll(), QSsl::Rsa, QSsl::Pem, QSsl::PrivateKey); QVERIFY(!validKey.isNull()); QTest::newRow("ValidClientCert:AutoVerifyPeer") << QSslSocket::AutoVerifyPeer << validCerts << validKey << true; QTest::newRow("ValidClientCert:QueryPeer") << QSslSocket::QueryPeer << validCerts << validKey << true; QTest::newRow("ValidClientCert:VerifyNone") << QSslSocket::VerifyNone << validCerts << validKey << true; QTest::newRow("ValidClientCert:VerifyPeer") << QSslSocket::VerifyPeer << validCerts << validKey << true; // valid certificate, correct usage (client certificate), with chain validCerts += QSslCertificate::fromPath(testDataDir + "certs/bogus-ca.crt"); QCOMPARE(validCerts.size(), 2); QTest::newRow("ValidChainedClientCert:AutoVerifyPeer") << QSslSocket::AutoVerifyPeer << validCerts << validKey << true; QTest::newRow("ValidChainedClientCert:QueryPeer") << QSslSocket::QueryPeer << validCerts << validKey << true; QTest::newRow("ValidChainedClientCert:VerifyNone") << QSslSocket::VerifyNone << validCerts << validKey << true; QTest::newRow("ValidChainedClientCert:VerifyPeer") << QSslSocket::VerifyPeer << validCerts << validKey << true; } void tst_QSslSocket::verifyClientCertificate() { if (isTestingSecureTransport) { // We run both client and server on the same machine, // this means, client can update keychain with client's certificates, // and server later will use the same certificates from the same // keychain thus making tests fail (wrong number of certificates, // success instead of failure etc.). QSKIP("This test can not work with Secure Transport"); } if (!QSslSocket::supportsSsl()) { qWarning("SSL not supported, skipping test"); return; } QFETCH_GLOBAL(bool, setProxy); if (setProxy) return; QFETCH(QSslSocket::PeerVerifyMode, peerVerifyMode); if (isTestingSchannel) { if (peerVerifyMode == QSslSocket::QueryPeer || peerVerifyMode == QSslSocket::AutoVerifyPeer) QSKIP("Schannel doesn't tackle requesting a certificate and not receiving one."); } SslServer server; server.protocol = QSsl::TlsV1_2; server.addCaCertificates = testDataDir + "certs/bogus-ca.crt"; server.ignoreSslErrors = false; server.peerVerifyMode = peerVerifyMode; QVERIFY(server.listen()); QEventLoop loop; QTimer::singleShot(5000, &loop, SLOT(quit())); QFETCH(QList, clientCerts); QFETCH(QSslKey, clientKey); QSslSocket client; client.setLocalCertificateChain(clientCerts); client.setPrivateKey(clientKey); QSslConfiguration config = client.sslConfiguration(); config.setProtocol(Test::TlsV1_0OrLater); client.setSslConfiguration(config); socket = &client; connect(socket, SIGNAL(sslErrors(QList)), this, SLOT(ignoreErrorSlot())); connect(socket, SIGNAL(disconnected()), &loop, SLOT(quit())); connect(socket, SIGNAL(encrypted()), &loop, SLOT(quit())); client.connectToHostEncrypted(QHostAddress(QHostAddress::LocalHost).toString(), server.serverPort()); loop.exec(); QFETCH(bool, works); QAbstractSocket::SocketState expectedState = (works) ? QAbstractSocket::ConnectedState : QAbstractSocket::UnconnectedState; // check server socket QVERIFY(server.socket); QCOMPARE(server.socket->state(), expectedState); QCOMPARE(server.socket->isEncrypted(), works); if (peerVerifyMode == QSslSocket::VerifyNone || clientCerts.isEmpty()) { QVERIFY(server.socket->peerCertificate().isNull()); QVERIFY(server.socket->peerCertificateChain().isEmpty()); } else { QCOMPARE(server.socket->peerCertificate(), clientCerts.first()); if (isTestingSchannel) { if (clientCerts.size() == 1 && server.socket->peerCertificateChain().size() == 2) { QEXPECT_FAIL("", "Schannel includes the entire chain, not just the leaf and intermediates", Continue); } } QCOMPARE(server.socket->peerCertificateChain(), clientCerts); } // check client socket QCOMPARE(client.state(), expectedState); QCOMPARE(client.isEncrypted(), works); } void tst_QSslSocket::readBufferMaxSize() { // QTBUG-94186: originally, only SecureTransport was // running this test (since it was a bug in that backend, // see comment below), after TLS plugins were introduced, // we enabled this test on all backends, as a part of // the clean up. This revealed the fact that this test // is flaky, and it started to fail on Windows. // TODO: this is a temporary solution, to be removed // as soon as 94186 fixed for good. if (!isTestingSecureTransport) QSKIP("This test is flaky with TLS backend other than SecureTransport"); // QTBUG-55170: // SecureTransport back-end was ignoring read-buffer // size limit, resulting (potentially) in a constantly // growing internal buffer. // The test's logic is: we set a small read buffer size on a client // socket (to some ridiculously small value), server sends us // a bunch of bytes , we ignore readReady signal so // that socket's internal buffer size stays // >= readBufferMaxSize, we wait for a quite long time // (which previously would be enough to read completely) // and we check socket's bytesAvaiable to be less than sent. QFETCH_GLOBAL(bool, setProxy); if (setProxy) return; SslServer server; QVERIFY(server.listen()); QEventLoop loop; QSslSocketPtr client(new QSslSocket); socket = client.data(); connect(socket, SIGNAL(errorOccurred(QAbstractSocket::SocketError)), &loop, SLOT(quit())); connect(socket, SIGNAL(sslErrors(QList)), this, SLOT(ignoreErrorSlot())); client->connectToHostEncrypted(QHostAddress(QHostAddress::LocalHost).toString(), server.serverPort()); int waitFor = 2; auto earlyQuitter = [&loop, &waitFor]() { if (!--waitFor) loop.exit(); }; connect(socket, &QSslSocket::encrypted, &loop, earlyQuitter); connect(&server, &SslServer::socketEncrypted, &loop, earlyQuitter); // Wait for 'encrypted' first: QTimer::singleShot(5000, &loop, SLOT(quit())); loop.exec(); QCOMPARE(client->state(), QAbstractSocket::ConnectedState); QCOMPARE(client->mode(), QSslSocket::SslClientMode); client->setReadBufferSize(10); const QByteArray message(int(0xffff), 'a'); server.socket->write(message); QTimer::singleShot(5000, &loop, SLOT(quit())); loop.exec(); int readSoFar = client->bytesAvailable(); QVERIFY(readSoFar > 0 && readSoFar < message.size()); // Now, let's check that we still can read the rest of it: QCOMPARE(client->readAll().size(), readSoFar); client->setReadBufferSize(0); QTimer::singleShot(1500, &loop, SLOT(quit())); loop.exec(); QCOMPARE(client->bytesAvailable() + readSoFar, message.size()); } void tst_QSslSocket::setEmptyDefaultConfiguration() // this test should be last, as it has some side effects { // used to produce a crash in QSslConfigurationPrivate::deepCopyDefaultConfiguration, QTBUG-13265 if (!QSslSocket::supportsSsl()) return; QSslConfiguration emptyConf; QSslConfiguration::setDefaultConfiguration(emptyConf); QSslSocketPtr client = newSocket(); socket = client.data(); connect(socket, SIGNAL(sslErrors(QList)), this, SLOT(ignoreErrorSlot())); socket->connectToHostEncrypted(QtNetworkSettings::httpServerName(), 443); QFETCH_GLOBAL(bool, setProxy); if (setProxy && socket->waitForEncrypted(4000)) QSKIP("Skipping flaky test - See QTBUG-29941"); } void tst_QSslSocket::allowedProtocolNegotiation() { if (!hasServerAlpn) QSKIP("Server-side ALPN is unsupported, skipping test"); QFETCH_GLOBAL(bool, setProxy); if (setProxy) return; const QByteArray expectedNegotiated("cool-protocol"); QList serverProtos; serverProtos << expectedNegotiated << "not-so-cool-protocol"; QList clientProtos; clientProtos << "uber-cool-protocol" << expectedNegotiated << "not-so-cool-protocol"; SslServer server; server.config.setAllowedNextProtocols(serverProtos); QVERIFY(server.listen()); QSslSocket clientSocket; auto configuration = clientSocket.sslConfiguration(); configuration.setAllowedNextProtocols(clientProtos); clientSocket.setSslConfiguration(configuration); clientSocket.connectToHostEncrypted("127.0.0.1", server.serverPort()); clientSocket.ignoreSslErrors(); QEventLoop loop; QTimer::singleShot(5000, &loop, SLOT(quit())); // Need to wait for both sides to emit encrypted as the ordering of which // ones emits encrypted() changes depending on whether we use TLS 1.2 or 1.3 int waitFor = 2; auto earlyQuitter = [&loop, &waitFor]() { if (!--waitFor) loop.exit(); }; connect(&clientSocket, &QSslSocket::encrypted, &loop, earlyQuitter); connect(&server, &SslServer::socketEncrypted, &loop, earlyQuitter); loop.exec(); QCOMPARE(server.socket->sslConfiguration().nextNegotiatedProtocol(), clientSocket.sslConfiguration().nextNegotiatedProtocol()); QCOMPARE(server.socket->sslConfiguration().nextNegotiatedProtocol(), expectedNegotiated); } #if QT_CONFIG(openssl) class PskProvider : public QObject { Q_OBJECT public: bool m_server; QByteArray m_identity; QByteArray m_psk; explicit PskProvider(QObject *parent = nullptr) : QObject(parent), m_server(false) { } void setIdentity(const QByteArray &identity) { m_identity = identity; } void setPreSharedKey(const QByteArray &psk) { m_psk = psk; } public slots: void providePsk(QSslPreSharedKeyAuthenticator *authenticator) { QVERIFY(authenticator); QCOMPARE(authenticator->identityHint(), PSK_SERVER_IDENTITY_HINT); if (m_server) QCOMPARE(authenticator->maximumIdentityLength(), 0); else QVERIFY(authenticator->maximumIdentityLength() > 0); QVERIFY(authenticator->maximumPreSharedKeyLength() > 0); if (!m_identity.isEmpty()) { authenticator->setIdentity(m_identity); QCOMPARE(authenticator->identity(), m_identity); } if (!m_psk.isEmpty()) { authenticator->setPreSharedKey(m_psk); QCOMPARE(authenticator->preSharedKey(), m_psk); } } }; class PskServer : public QTcpServer { Q_OBJECT public: PskServer() : socket(0), config(QSslConfiguration::defaultConfiguration()), ignoreSslErrors(true), peerVerifyMode(QSslSocket::AutoVerifyPeer), protocol(QSsl::TlsV1_2), m_pskProvider() { m_pskProvider.m_server = true; } QSslSocket *socket; QSslConfiguration config; bool ignoreSslErrors; QSslSocket::PeerVerifyMode peerVerifyMode; QSsl::SslProtocol protocol; QList ciphers; PskProvider m_pskProvider; protected: void incomingConnection(qintptr socketDescriptor) override { socket = new QSslSocket(this); socket->setSslConfiguration(config); socket->setPeerVerifyMode(peerVerifyMode); socket->setProtocol(protocol); if (ignoreSslErrors) connect(socket, SIGNAL(sslErrors(QList)), this, SLOT(ignoreErrorSlot())); if (!ciphers.isEmpty()) { auto sslConfig = socket->sslConfiguration(); sslConfig.setCiphers(ciphers); socket->setSslConfiguration(sslConfig); } QVERIFY(socket->setSocketDescriptor(socketDescriptor, QAbstractSocket::ConnectedState)); QVERIFY(!socket->peerAddress().isNull()); QVERIFY(socket->peerPort() != 0); QVERIFY(!socket->localAddress().isNull()); QVERIFY(socket->localPort() != 0); connect(socket, &QSslSocket::preSharedKeyAuthenticationRequired, &m_pskProvider, &PskProvider::providePsk); socket->startServerEncryption(); } protected slots: void ignoreErrorSlot() { socket->ignoreSslErrors(); } }; void tst_QSslSocket::simplePskConnect_data() { if (!isTestingOpenSsl) QSKIP("The active TLS backend does support PSK"); QTest::addColumn("pskTestType"); QTest::newRow("PskConnectDoNotHandlePsk") << PskConnectDoNotHandlePsk; QTest::newRow("PskConnectEmptyCredentials") << PskConnectEmptyCredentials; QTest::newRow("PskConnectWrongCredentials") << PskConnectWrongCredentials; QTest::newRow("PskConnectWrongIdentity") << PskConnectWrongIdentity; QTest::newRow("PskConnectWrongPreSharedKey") << PskConnectWrongPreSharedKey; QTest::newRow("PskConnectRightCredentialsPeerVerifyFailure") << PskConnectRightCredentialsPeerVerifyFailure; QTest::newRow("PskConnectRightCredentialsVerifyPeer") << PskConnectRightCredentialsVerifyPeer; QTest::newRow("PskConnectRightCredentialsDoNotVerifyPeer") << PskConnectRightCredentialsDoNotVerifyPeer; } void tst_QSslSocket::simplePskConnect() { QFETCH(PskConnectTestType, pskTestType); QSKIP("This test requires change 1f8cab2c3bcd91335684c95afa95ae71e00a94e4 on the network test server, QTQAINFRA-917"); if (!QSslSocket::supportsSsl()) QSKIP("No SSL support"); bool pskCipherFound = false; const QList supportedCiphers = QSslConfiguration::supportedCiphers(); for (const QSslCipher &cipher : supportedCiphers) { if (cipher.name() == PSK_CIPHER_WITHOUT_AUTH) { pskCipherFound = true; break; } } if (!pskCipherFound) QSKIP("SSL implementation does not support the necessary PSK cipher(s)"); QFETCH_GLOBAL(bool, setProxy); if (setProxy) QSKIP("This test must not be going through a proxy"); QSslSocket socket; this->socket = &socket; QSignalSpy connectedSpy(&socket, SIGNAL(connected())); QVERIFY(connectedSpy.isValid()); QSignalSpy hostFoundSpy(&socket, SIGNAL(hostFound())); QVERIFY(hostFoundSpy.isValid()); QSignalSpy disconnectedSpy(&socket, SIGNAL(disconnected())); QVERIFY(disconnectedSpy.isValid()); QSignalSpy connectionEncryptedSpy(&socket, SIGNAL(encrypted())); QVERIFY(connectionEncryptedSpy.isValid()); QSignalSpy sslErrorsSpy(&socket, SIGNAL(sslErrors(QList))); QVERIFY(sslErrorsSpy.isValid()); QSignalSpy socketErrorsSpy(&socket, SIGNAL(errorOccurred(QAbstractSocket::SocketError))); QVERIFY(socketErrorsSpy.isValid()); QSignalSpy peerVerifyErrorSpy(&socket, SIGNAL(peerVerifyError(QSslError))); QVERIFY(peerVerifyErrorSpy.isValid()); QSignalSpy pskAuthenticationRequiredSpy(&socket, SIGNAL(preSharedKeyAuthenticationRequired(QSslPreSharedKeyAuthenticator*))); QVERIFY(pskAuthenticationRequiredSpy.isValid()); connect(&socket, SIGNAL(connected()), this, SLOT(exitLoop())); connect(&socket, SIGNAL(disconnected()), this, SLOT(exitLoop())); connect(&socket, SIGNAL(modeChanged(QSslSocket::SslMode)), this, SLOT(exitLoop())); connect(&socket, SIGNAL(encrypted()), this, SLOT(exitLoop())); connect(&socket, SIGNAL(sslErrors(QList)), this, SLOT(exitLoop())); connect(&socket, SIGNAL(errorOccurred(QAbstractSocket::SocketError)), this, SLOT(exitLoop())); connect(&socket, SIGNAL(peerVerifyError(QSslError)), this, SLOT(exitLoop())); connect(&socket, SIGNAL(stateChanged(QAbstractSocket::SocketState)), this, SLOT(exitLoop())); // force a PSK cipher w/o auth auto sslConfig = socket.sslConfiguration(); sslConfig.setCiphers({QSslCipher(PSK_CIPHER_WITHOUT_AUTH)}); socket.setSslConfiguration(sslConfig); PskProvider provider; switch (pskTestType) { case PskConnectDoNotHandlePsk: // don't connect to the provider break; case PskConnectEmptyCredentials: // connect to the psk provider, but don't actually provide any PSK nor identity connect(&socket, SIGNAL(preSharedKeyAuthenticationRequired(QSslPreSharedKeyAuthenticator*)), &provider, SLOT(providePsk(QSslPreSharedKeyAuthenticator*))); break; case PskConnectWrongCredentials: // provide totally wrong credentials provider.setIdentity(PSK_CLIENT_IDENTITY.left(PSK_CLIENT_IDENTITY.size() - 1)); provider.setPreSharedKey(PSK_CLIENT_PRESHAREDKEY.left(PSK_CLIENT_PRESHAREDKEY.size() - 1)); connect(&socket, SIGNAL(preSharedKeyAuthenticationRequired(QSslPreSharedKeyAuthenticator*)), &provider, SLOT(providePsk(QSslPreSharedKeyAuthenticator*))); break; case PskConnectWrongIdentity: // right PSK, wrong identity provider.setIdentity(PSK_CLIENT_IDENTITY.left(PSK_CLIENT_IDENTITY.size() - 1)); provider.setPreSharedKey(PSK_CLIENT_PRESHAREDKEY); connect(&socket, SIGNAL(preSharedKeyAuthenticationRequired(QSslPreSharedKeyAuthenticator*)), &provider, SLOT(providePsk(QSslPreSharedKeyAuthenticator*))); break; case PskConnectWrongPreSharedKey: // right identity, wrong PSK provider.setIdentity(PSK_CLIENT_IDENTITY); provider.setPreSharedKey(PSK_CLIENT_PRESHAREDKEY.left(PSK_CLIENT_PRESHAREDKEY.size() - 1)); connect(&socket, SIGNAL(preSharedKeyAuthenticationRequired(QSslPreSharedKeyAuthenticator*)), &provider, SLOT(providePsk(QSslPreSharedKeyAuthenticator*))); break; case PskConnectRightCredentialsPeerVerifyFailure: // right identity, right PSK, but since we can't verify the other peer, we'll fail provider.setIdentity(PSK_CLIENT_IDENTITY); provider.setPreSharedKey(PSK_CLIENT_PRESHAREDKEY); connect(&socket, SIGNAL(preSharedKeyAuthenticationRequired(QSslPreSharedKeyAuthenticator*)), &provider, SLOT(providePsk(QSslPreSharedKeyAuthenticator*))); break; case PskConnectRightCredentialsVerifyPeer: // right identity, right PSK, verify the peer (but ignore the failure) and establish the connection provider.setIdentity(PSK_CLIENT_IDENTITY); provider.setPreSharedKey(PSK_CLIENT_PRESHAREDKEY); connect(&socket, SIGNAL(preSharedKeyAuthenticationRequired(QSslPreSharedKeyAuthenticator*)), &provider, SLOT(providePsk(QSslPreSharedKeyAuthenticator*))); connect(&socket, SIGNAL(peerVerifyError(QSslError)), this, SLOT(ignoreErrorSlot())); break; case PskConnectRightCredentialsDoNotVerifyPeer: // right identity, right PSK, do not verify the peer and establish the connection provider.setIdentity(PSK_CLIENT_IDENTITY); provider.setPreSharedKey(PSK_CLIENT_PRESHAREDKEY); connect(&socket, SIGNAL(preSharedKeyAuthenticationRequired(QSslPreSharedKeyAuthenticator*)), &provider, SLOT(providePsk(QSslPreSharedKeyAuthenticator*))); socket.setPeerVerifyMode(QSslSocket::VerifyNone); break; } // check the peer verification mode switch (pskTestType) { case PskConnectDoNotHandlePsk: case PskConnectEmptyCredentials: case PskConnectWrongCredentials: case PskConnectWrongIdentity: case PskConnectWrongPreSharedKey: case PskConnectRightCredentialsPeerVerifyFailure: case PskConnectRightCredentialsVerifyPeer: QCOMPARE(socket.peerVerifyMode(), QSslSocket::AutoVerifyPeer); break; case PskConnectRightCredentialsDoNotVerifyPeer: QCOMPARE(socket.peerVerifyMode(), QSslSocket::VerifyNone); break; } // Start connecting socket.connectToHost(QtNetworkSettings::serverName(), PSK_SERVER_PORT); QCOMPARE(socket.state(), QAbstractSocket::HostLookupState); enterLoop(10); // Entered connecting state QCOMPARE(socket.state(), QAbstractSocket::ConnectingState); QCOMPARE(connectedSpy.size(), 0); QCOMPARE(hostFoundSpy.size(), 1); QCOMPARE(disconnectedSpy.size(), 0); enterLoop(10); // Entered connected state QCOMPARE(socket.state(), QAbstractSocket::ConnectedState); QCOMPARE(socket.mode(), QSslSocket::UnencryptedMode); QVERIFY(!socket.isEncrypted()); QCOMPARE(connectedSpy.size(), 1); QCOMPARE(hostFoundSpy.size(), 1); QCOMPARE(disconnectedSpy.size(), 0); // Enter encrypted mode socket.startClientEncryption(); QCOMPARE(socket.mode(), QSslSocket::SslClientMode); QVERIFY(!socket.isEncrypted()); QCOMPARE(connectionEncryptedSpy.size(), 0); QCOMPARE(sslErrorsSpy.size(), 0); QCOMPARE(peerVerifyErrorSpy.size(), 0); // Start handshake. enterLoop(10); // We must get the PSK signal in all cases QCOMPARE(pskAuthenticationRequiredSpy.size(), 1); switch (pskTestType) { case PskConnectDoNotHandlePsk: case PskConnectEmptyCredentials: case PskConnectWrongCredentials: case PskConnectWrongIdentity: case PskConnectWrongPreSharedKey: // Handshake failure QCOMPARE(socketErrorsSpy.size(), 1); QCOMPARE(qvariant_cast(socketErrorsSpy.at(0).at(0)), QAbstractSocket::SslHandshakeFailedError); QCOMPARE(sslErrorsSpy.size(), 0); QCOMPARE(peerVerifyErrorSpy.size(), 0); QCOMPARE(connectionEncryptedSpy.size(), 0); QVERIFY(!socket.isEncrypted()); break; case PskConnectRightCredentialsPeerVerifyFailure: // Peer verification failure QCOMPARE(socketErrorsSpy.size(), 1); QCOMPARE(qvariant_cast(socketErrorsSpy.at(0).at(0)), QAbstractSocket::SslHandshakeFailedError); QCOMPARE(sslErrorsSpy.size(), 1); QCOMPARE(peerVerifyErrorSpy.size(), 1); QCOMPARE(connectionEncryptedSpy.size(), 0); QVERIFY(!socket.isEncrypted()); break; case PskConnectRightCredentialsVerifyPeer: // Peer verification failure, but ignore it and keep connecting QCOMPARE(socketErrorsSpy.size(), 0); QCOMPARE(sslErrorsSpy.size(), 1); QCOMPARE(peerVerifyErrorSpy.size(), 1); QCOMPARE(connectionEncryptedSpy.size(), 1); QVERIFY(socket.isEncrypted()); QCOMPARE(socket.state(), QAbstractSocket::ConnectedState); break; case PskConnectRightCredentialsDoNotVerifyPeer: // No peer verification => no failure QCOMPARE(socketErrorsSpy.size(), 0); QCOMPARE(sslErrorsSpy.size(), 0); QCOMPARE(peerVerifyErrorSpy.size(), 0); QCOMPARE(connectionEncryptedSpy.size(), 1); QVERIFY(socket.isEncrypted()); QCOMPARE(socket.state(), QAbstractSocket::ConnectedState); break; } // check writing switch (pskTestType) { case PskConnectDoNotHandlePsk: case PskConnectEmptyCredentials: case PskConnectWrongCredentials: case PskConnectWrongIdentity: case PskConnectWrongPreSharedKey: case PskConnectRightCredentialsPeerVerifyFailure: break; case PskConnectRightCredentialsVerifyPeer: case PskConnectRightCredentialsDoNotVerifyPeer: socket.write("Hello from Qt TLS/PSK!"); QVERIFY(socket.waitForBytesWritten()); break; } // disconnect switch (pskTestType) { case PskConnectDoNotHandlePsk: case PskConnectEmptyCredentials: case PskConnectWrongCredentials: case PskConnectWrongIdentity: case PskConnectWrongPreSharedKey: case PskConnectRightCredentialsPeerVerifyFailure: break; case PskConnectRightCredentialsVerifyPeer: case PskConnectRightCredentialsDoNotVerifyPeer: socket.disconnectFromHost(); enterLoop(10); break; } QCOMPARE(socket.state(), QAbstractSocket::UnconnectedState); QCOMPARE(disconnectedSpy.size(), 1); } void tst_QSslSocket::ephemeralServerKey_data() { if (!isTestingOpenSsl) QSKIP("The active TLS backend does not support ephemeral keys"); QTest::addColumn("cipher"); QTest::addColumn("emptyKey"); QTest::newRow("ForwardSecrecyCipher") << "ECDHE-RSA-AES256-SHA" << (QSslSocket::sslLibraryVersionNumber() < 0x10002000L); } void tst_QSslSocket::ephemeralServerKey() { QFETCH_GLOBAL(bool, setProxy); if (!QSslSocket::supportsSsl() || setProxy) return; QFETCH(QString, cipher); QFETCH(bool, emptyKey); SslServer server; server.config.setCiphers(QList() << QSslCipher(cipher)); QVERIFY(server.listen()); QSslSocketPtr client = newSocket(); socket = client.data(); connect(socket, SIGNAL(sslErrors(QList)), this, SLOT(ignoreErrorSlot())); QSignalSpy spy(client.data(), &QSslSocket::encrypted); client->connectToHostEncrypted(QHostAddress(QHostAddress::LocalHost).toString(), server.serverPort()); spy.wait(); QCOMPARE(spy.size(), 1); QVERIFY(server.config.ephemeralServerKey().isNull()); QCOMPARE(client->sslConfiguration().ephemeralServerKey().isNull(), emptyKey); } void tst_QSslSocket::pskServer() { if (!isTestingOpenSsl) QSKIP("The active TLS-backend does not have PSK support implemented."); QFETCH_GLOBAL(bool, setProxy); if (!QSslSocket::supportsSsl() || setProxy) return; QSslSocket socket; this->socket = &socket; QSignalSpy connectedSpy(&socket, SIGNAL(connected())); QVERIFY(connectedSpy.isValid()); QSignalSpy disconnectedSpy(&socket, SIGNAL(disconnected())); QVERIFY(disconnectedSpy.isValid()); QSignalSpy connectionEncryptedSpy(&socket, SIGNAL(encrypted())); QVERIFY(connectionEncryptedSpy.isValid()); QSignalSpy pskAuthenticationRequiredSpy(&socket, SIGNAL(preSharedKeyAuthenticationRequired(QSslPreSharedKeyAuthenticator*))); QVERIFY(pskAuthenticationRequiredSpy.isValid()); connect(&socket, SIGNAL(connected()), this, SLOT(exitLoop())); connect(&socket, SIGNAL(disconnected()), this, SLOT(exitLoop())); connect(&socket, SIGNAL(modeChanged(QSslSocket::SslMode)), this, SLOT(exitLoop())); connect(&socket, SIGNAL(encrypted()), this, SLOT(exitLoop())); connect(&socket, SIGNAL(sslErrors(QList)), this, SLOT(exitLoop())); connect(&socket, SIGNAL(errorOccurred(QAbstractSocket::SocketError)), this, SLOT(exitLoop())); connect(&socket, SIGNAL(peerVerifyError(QSslError)), this, SLOT(exitLoop())); connect(&socket, SIGNAL(stateChanged(QAbstractSocket::SocketState)), this, SLOT(exitLoop())); // force a PSK cipher w/o auth auto sslConfig = socket.sslConfiguration(); sslConfig.setCiphers({QSslCipher(PSK_CIPHER_WITHOUT_AUTH)}); socket.setSslConfiguration(sslConfig); PskProvider provider; provider.setIdentity(PSK_CLIENT_IDENTITY); provider.setPreSharedKey(PSK_CLIENT_PRESHAREDKEY); connect(&socket, SIGNAL(preSharedKeyAuthenticationRequired(QSslPreSharedKeyAuthenticator*)), &provider, SLOT(providePsk(QSslPreSharedKeyAuthenticator*))); socket.setPeerVerifyMode(QSslSocket::VerifyNone); PskServer server; server.m_pskProvider.setIdentity(provider.m_identity); server.m_pskProvider.setPreSharedKey(provider.m_psk); server.config.setPreSharedKeyIdentityHint(PSK_SERVER_IDENTITY_HINT); QVERIFY(server.listen()); // Start connecting socket.connectToHost(QHostAddress(QHostAddress::LocalHost).toString(), server.serverPort()); enterLoop(5); // Entered connected state QCOMPARE(socket.state(), QAbstractSocket::ConnectedState); QCOMPARE(socket.mode(), QSslSocket::UnencryptedMode); QVERIFY(!socket.isEncrypted()); QCOMPARE(connectedSpy.size(), 1); QCOMPARE(disconnectedSpy.size(), 0); // Enter encrypted mode socket.startClientEncryption(); QCOMPARE(socket.mode(), QSslSocket::SslClientMode); QVERIFY(!socket.isEncrypted()); QCOMPARE(connectionEncryptedSpy.size(), 0); // Start handshake. enterLoop(10); // We must get the PSK signal in all cases QCOMPARE(pskAuthenticationRequiredSpy.size(), 1); QCOMPARE(connectionEncryptedSpy.size(), 1); QVERIFY(socket.isEncrypted()); QCOMPARE(socket.state(), QAbstractSocket::ConnectedState); // check writing socket.write("Hello from Qt TLS/PSK!"); QVERIFY(socket.waitForBytesWritten()); // disconnect socket.disconnectFromHost(); enterLoop(10); QCOMPARE(socket.state(), QAbstractSocket::UnconnectedState); QCOMPARE(disconnectedSpy.size(), 1); } void tst_QSslSocket::signatureAlgorithm_data() { if (!isTestingOpenSsl) QSKIP("Signature algorithms cannot be tested with a non-OpenSSL TLS backend"); if (QSslSocket::sslLibraryVersionNumber() >= 0x10101000L) { // FIXME: investigate if this test makes any sense with TLS 1.3. QSKIP("Test is not valid for TLS 1.3/OpenSSL 1.1.1"); } QTest::addColumn("serverSigAlgPairs"); QTest::addColumn("serverProtocol"); QTest::addColumn("clientSigAlgPairs"); QTest::addColumn("clientProtocol"); QTest::addColumn("state"); const QByteArray dsaSha1("DSA+SHA1"); const QByteArray ecdsaSha1("ECDSA+SHA1"); const QByteArray ecdsaSha512("ECDSA+SHA512"); const QByteArray rsaSha256("RSA+SHA256"); const QByteArray rsaSha384("RSA+SHA384"); const QByteArray rsaSha512("RSA+SHA512"); QTest::newRow("match_TlsV1_2") << QByteArrayList({rsaSha256}) << QSsl::TlsV1_2 << QByteArrayList({rsaSha256}) << QSsl::AnyProtocol << QAbstractSocket::ConnectedState; QTest::newRow("no_hashalg_match_TlsV1_2") << QByteArrayList({rsaSha256}) << QSsl::TlsV1_2 << QByteArrayList({rsaSha512}) << QSsl::AnyProtocol << QAbstractSocket::UnconnectedState; QTest::newRow("no_sigalg_match_TlsV1_2") << QByteArrayList({ecdsaSha512}) << QSsl::TlsV1_2 << QByteArrayList({rsaSha512}) << QSsl::AnyProtocol << QAbstractSocket::UnconnectedState; QTest::newRow("no_cipher_match_AnyProtocol") << QByteArrayList({rsaSha512}) << QSsl::AnyProtocol << QByteArrayList({ecdsaSha512}) << QSsl::AnyProtocol << QAbstractSocket::UnconnectedState; QTest::newRow("match_multiple-choice") << QByteArrayList({dsaSha1, rsaSha256, rsaSha384, rsaSha512}) << QSsl::AnyProtocol << QByteArrayList({ecdsaSha1, rsaSha384, rsaSha512, ecdsaSha512}) << QSsl::AnyProtocol << QAbstractSocket::ConnectedState; QTest::newRow("match_client_longer") << QByteArrayList({dsaSha1, rsaSha256}) << QSsl::AnyProtocol << QByteArrayList({ecdsaSha1, ecdsaSha512, rsaSha256}) << QSsl::AnyProtocol << QAbstractSocket::ConnectedState; QTest::newRow("match_server_longer") << QByteArrayList({ecdsaSha1, ecdsaSha512, rsaSha256}) << QSsl::AnyProtocol << QByteArrayList({dsaSha1, rsaSha256}) << QSsl::AnyProtocol << QAbstractSocket::ConnectedState; // signature algorithms do not match, but are ignored because the tls version is not v1.2 QTest::newRow("client_ignore_TlsV1_1") << QByteArrayList({rsaSha256}) << Test::TlsV1_1 << QByteArrayList({rsaSha512}) << QSsl::AnyProtocol << QAbstractSocket::ConnectedState; QTest::newRow("server_ignore_TlsV1_1") << QByteArrayList({rsaSha256}) << QSsl::AnyProtocol << QByteArrayList({rsaSha512}) << Test::TlsV1_1 << QAbstractSocket::ConnectedState; QTest::newRow("client_ignore_TlsV1_0") << QByteArrayList({rsaSha256}) << Test::TlsV1_0 << QByteArrayList({rsaSha512}) << QSsl::AnyProtocol << QAbstractSocket::ConnectedState; QTest::newRow("server_ignore_TlsV1_0") << QByteArrayList({rsaSha256}) << QSsl::AnyProtocol << QByteArrayList({rsaSha512}) << Test::TlsV1_0 << QAbstractSocket::ConnectedState; } void tst_QSslSocket::signatureAlgorithm() { QFETCH_GLOBAL(bool, setProxy); if (setProxy) QSKIP("Test not adapted for use with proxying"); QFETCH(QByteArrayList, serverSigAlgPairs); QFETCH(QSsl::SslProtocol, serverProtocol); QFETCH(QByteArrayList, clientSigAlgPairs); QFETCH(QSsl::SslProtocol, clientProtocol); QFETCH(QAbstractSocket::SocketState, state); SslServer server; server.protocol = serverProtocol; server.config.setCiphers({QSslCipher("ECDHE-RSA-AES256-SHA")}); server.config.setBackendConfigurationOption(QByteArrayLiteral("SignatureAlgorithms"), serverSigAlgPairs.join(':')); QVERIFY(server.listen()); QSslConfiguration clientConfig = QSslConfiguration::defaultConfiguration(); clientConfig.setProtocol(clientProtocol); clientConfig.setBackendConfigurationOption(QByteArrayLiteral("SignatureAlgorithms"), clientSigAlgPairs.join(':')); QSslSocket client; client.setSslConfiguration(clientConfig); socket = &client; QEventLoop loop; QTimer::singleShot(5000, &loop, &QEventLoop::quit); connect(socket, &QAbstractSocket::errorOccurred, &loop, &QEventLoop::quit); connect(socket, QOverload &>::of(&QSslSocket::sslErrors), this, &tst_QSslSocket::ignoreErrorSlot); connect(socket, &QSslSocket::encrypted, &loop, &QEventLoop::quit); client.connectToHostEncrypted(QHostAddress(QHostAddress::LocalHost).toString(), server.serverPort()); loop.exec(); socket = nullptr; QCOMPARE(client.state(), state); } void tst_QSslSocket::forwardReadChannelFinished() { if (!isTestingOpenSsl) QSKIP("This test requires the OpenSSL backend"); QFETCH_GLOBAL(bool, setProxy); if (setProxy) QSKIP("This test doesn't work via a proxy"); QSslSocket socket; QSignalSpy readChannelFinishedSpy(&socket, &QAbstractSocket::readChannelFinished); connect(&socket, &QSslSocket::encrypted, [&socket]() { const auto data = QString("GET /ip HTTP/1.0\r\nHost: %1\r\n\r\nAccept: */*\r\n\r\n") .arg(QtNetworkSettings::serverLocalName()).toUtf8(); socket.write(data); }); connect(&socket, &QSslSocket::readChannelFinished, &QTestEventLoop::instance(), &QTestEventLoop::exitLoop); socket.connectToHostEncrypted(QtNetworkSettings::httpServerName(), 443); enterLoop(10); QVERIFY(readChannelFinishedSpy.size()); } #endif // QT_CONFIG(openssl) void tst_QSslSocket::unsupportedProtocols_data() { QTest::addColumn("unsupportedProtocol"); QTest::newRow("DtlsV1_0") << Test::DtlsV1_0; QTest::newRow("DtlsV1_2") << QSsl::DtlsV1_2; QTest::newRow("DtlsV1_0OrLater") << Test::DtlsV1_0OrLater; QTest::newRow("DtlsV1_2OrLater") << QSsl::DtlsV1_2OrLater; QTest::newRow("UnknownProtocol") << QSsl::UnknownProtocol; } void tst_QSslSocket::unsupportedProtocols() { QFETCH_GLOBAL(const bool, setProxy); if (setProxy) return; QFETCH(const QSsl::SslProtocol, unsupportedProtocol); const int timeoutMS = 500; // Test a client socket. { // 0. connectToHostEncrypted: client-side, non-blocking API, error is discovered // early, preventing any real connection from ever starting. QSslSocket socket; socket.setProtocol(unsupportedProtocol); QCOMPARE(socket.error(), QAbstractSocket::UnknownSocketError); socket.connectToHostEncrypted(QStringLiteral("doesnotmatter.org"), 1010); QCOMPARE(socket.error(), QAbstractSocket::SslInvalidUserDataError); QCOMPARE(socket.state(), QAbstractSocket::UnconnectedState); } { // 1. startClientEncryption: client-side, non blocking API, but wants a socket in // the 'connected' state (otherwise just returns false not setting any error code). SslServer server; QVERIFY(server.listen()); QSslSocket socket; QCOMPARE(socket.error(), QAbstractSocket::UnknownSocketError); socket.connectToHost(QHostAddress::LocalHost, server.serverPort()); QVERIFY(socket.waitForConnected(timeoutMS)); socket.setProtocol(unsupportedProtocol); socket.startClientEncryption(); QCOMPARE(socket.error(), QAbstractSocket::SslInvalidUserDataError); } { // 2. waitForEncrypted: client-side, blocking API plus requires from us // to call ... connectToHostEncrypted(), which will notice an error and // will prevent any connect at all. Nothing to test. } // Test a server side, relatively simple: server does not connect, it listens/accepts // and then calls startServerEncryption() (which must fall). { SslServer server; server.protocol = unsupportedProtocol; QVERIFY(server.listen()); QTestEventLoop loop; connect(&server, &SslServer::socketError, [&loop](QAbstractSocket::SocketError) {loop.exitLoop();}); QTcpSocket client; client.connectToHost(QHostAddress::LocalHost, server.serverPort()); loop.enterLoopMSecs(timeoutMS); QVERIFY(!loop.timeout()); QVERIFY(server.socket); QCOMPARE(server.socket->error(), QAbstractSocket::SslInvalidUserDataError); } } void tst_QSslSocket::oldErrorsOnSocketReuse() { QFETCH_GLOBAL(bool, setProxy); if (setProxy) return; // not relevant SslServer server; if (!isTestingOpenSsl) server.protocol = Test::TlsV1_1; server.m_certFile = testDataDir + "certs/fluke.cert"; server.m_keyFile = testDataDir + "certs/fluke.key"; QVERIFY(server.listen(QHostAddress::SpecialAddress::LocalHost)); QSslSocket socket; if (!isTestingOpenSsl) socket.setProtocol(Test::TlsV1_1); QList errorList; auto connection = connect(&socket, QOverload &>::of(&QSslSocket::sslErrors), [&socket, &errorList](const QList &errors) { errorList += errors; socket.ignoreSslErrors(errors); socket.resume(); }); socket.connectToHostEncrypted(QString::fromLatin1("localhost"), server.serverPort()); QVERIFY(QTest::qWaitFor([&socket](){ return socket.isEncrypted(); })); socket.disconnectFromHost(); if (socket.state() != QAbstractSocket::UnconnectedState) { QVERIFY(QTest::qWaitFor( [&socket](){ return socket.state() == QAbstractSocket::UnconnectedState; })); } auto oldList = errorList; errorList.clear(); server.close(); server.m_certFile = testDataDir + "certs/bogus-client.crt"; server.m_keyFile = testDataDir + "certs/bogus-client.key"; QVERIFY(server.listen(QHostAddress::SpecialAddress::LocalHost)); socket.connectToHostEncrypted(QString::fromLatin1("localhost"), server.serverPort()); QVERIFY(QTest::qWaitFor([&socket](){ return socket.isEncrypted(); })); for (const auto &error : oldList) { QVERIFY2(!errorList.contains(error), "The new errors should not contain any of the old ones"); } } #if QT_CONFIG(openssl) void tst_QSslSocket::alertMissingCertificate() { // In this test we want a server to abort the connection due to the failing // client authentication. The server expected to send an alert before closing // the connection, and the client expected to receive this alert and report it. if (!isTestingOpenSsl) QSKIP("This test requires the OpenSSL backend"); QFETCH_GLOBAL(const bool, setProxy); if (setProxy) // Not what we test here, bail out. return; SslServer server; if (!server.listen(QHostAddress::LocalHost)) QSKIP("SslServer::listen() returned false"); // We want a certificate request to be sent to the client: server.peerVerifyMode = QSslSocket::VerifyPeer; // The only way we can force OpenSSL to send an alert - is to use // a special option (so we fail before handshake is finished): server.config.setMissingCertificateIsFatal(true); QSslSocket clientSocket; connect(&clientSocket, &QSslSocket::sslErrors, [&clientSocket](const QList &errors){ clientSocket.ignoreSslErrors(errors); }); QSignalSpy serverSpy(&server, &SslServer::alertSent); QSignalSpy clientSpy(&clientSocket, &QSslSocket::alertReceived); clientSocket.connectToHostEncrypted(server.serverAddress().toString(), server.serverPort()); QTestEventLoop runner; auto *context = &runner; QTimer::singleShot(500, context, [&runner](){ runner.exitLoop(); }); int waitFor = 2; auto earlyQuitter = [&runner, &waitFor](QAbstractSocket::SocketError) { if (!--waitFor) runner.exitLoop(); }; // Presumably, RemoteHostClosedError for the client and SslHandshakeError // for the server: connect(&clientSocket, &QAbstractSocket::errorOccurred, earlyQuitter); connect(&server, &SslServer::socketError, earlyQuitter); runner.enterLoopMSecs(1000); if (clientSocket.isEncrypted()) { // When using TLS 1.3 the client side thinks it is connected very // quickly, before the server has finished processing. So wait for the // inevitable disconnect. QCOMPARE(clientSocket.sessionProtocol(), QSsl::TlsV1_3); connect(&clientSocket, &QSslSocket::disconnected, &runner, &QTestEventLoop::exitLoop); runner.enterLoopMSecs(10000); } QVERIFY(serverSpy.size() > 0); QVERIFY(clientSpy.size() > 0); QVERIFY(server.socket && !server.socket->isEncrypted()); QVERIFY(!clientSocket.isEncrypted()); } void tst_QSslSocket::alertInvalidCertificate() { // In this test a client will not ignore verification errors, // it also will do 'early' checks, meaning the reported and // not ignored _during_ the hanshake, not after. This ensures // OpenSSL sends an alert. if (!isTestingOpenSsl) QSKIP("This test requires the OpenSSL backend"); QFETCH_GLOBAL(const bool, setProxy); if (setProxy) // Not what we test here, bail out. return; SslServer server; if (!server.listen(QHostAddress::LocalHost)) QSKIP("SslServer::listen() returned false"); QSslSocket clientSocket; auto configuration = QSslConfiguration::defaultConfiguration(); configuration.setHandshakeMustInterruptOnError(true); QVERIFY(configuration.handshakeMustInterruptOnError()); clientSocket.setSslConfiguration(configuration); QSignalSpy serverSpy(&server, &SslServer::gotAlert); QSignalSpy clientSpy(&clientSocket, &QSslSocket::alertSent); QSignalSpy interruptedSpy(&clientSocket, &QSslSocket::handshakeInterruptedOnError); clientSocket.connectToHostEncrypted(server.serverAddress().toString(), server.serverPort()); QTestEventLoop runner; auto *context = &runner; QTimer::singleShot(500, context, [&runner](){ runner.exitLoop(); }); int waitFor = 2; auto earlyQuitter = [&runner, &waitFor](QAbstractSocket::SocketError) { if (!--waitFor) runner.exitLoop(); }; // Presumably, RemoteHostClosedError for the server and SslHandshakeError // for the client: connect(&clientSocket, &QAbstractSocket::errorOccurred, earlyQuitter); connect(&server, &SslServer::socketError, earlyQuitter); runner.enterLoopMSecs(1000); QVERIFY(serverSpy.size() > 0); QVERIFY(clientSpy.size() > 0); QVERIFY(interruptedSpy.size() > 0); QVERIFY(server.socket && !server.socket->isEncrypted()); QVERIFY(!clientSocket.isEncrypted()); } void tst_QSslSocket::selfSignedCertificates_data() { if (!isTestingOpenSsl) QSKIP("The active TLS backend does not detect the required error"); QTest::addColumn("clientKnown"); QTest::newRow("Client known") << true; QTest::newRow("Client unknown") << false; } void tst_QSslSocket::selfSignedCertificates() { // In this test we want to check the behavior of the client/server when // self-signed certificates are used and the client is un/known to the server. QFETCH(bool, clientKnown); QFETCH_GLOBAL(const bool, setProxy); if (setProxy) // Not what we test here, bail out. return; SslServer server(testDataDir + "certs/selfsigned-server.key", testDataDir + "certs/selfsigned-server.crt"); server.protocol = QSsl::TlsV1_2; server.ignoreSslErrors = false; server.peerVerifyMode = QSslSocket::VerifyPeer; if (!server.listen(QHostAddress::LocalHost)) QSKIP("SslServer::listen() returned false"); QFile clientFile(testDataDir + "certs/selfsigned-client.key"); QVERIFY(clientFile.open(QIODevice::ReadOnly)); QSslKey clientKey(clientFile.readAll(), QSsl::Rsa, QSsl::Pem, QSsl::PrivateKey); QSslCertificate clientCert = QSslCertificate::fromPath(testDataDir + "certs/selfsigned-client.crt").first(); server.config.setCiphers({QSslCipher("DHE-RSA-AES256-SHA256")}); server.config.setHandshakeMustInterruptOnError(true); server.config.setMissingCertificateIsFatal(true); if (clientKnown) server.config.setCaCertificates({clientCert}); connect(&server, &SslServer::sslErrors, [](const QList &errors) { QCOMPARE(errors.size(), 1); QVERIFY(errors.first().error() == QSslError::SelfSignedCertificate); } ); connect(&server, &SslServer::socketError, [](QAbstractSocket::SocketError socketError) { QVERIFY(socketError == QAbstractSocket::SslHandshakeFailedError); } ); connect(&server, &SslServer::handshakeInterruptedOnError, [&server](const QSslError& error) { QVERIFY(error.error() == QSslError::SelfSignedCertificate); server.socket->continueInterruptedHandshake(); } ); QSslSocket clientSocket; auto configuration = QSslConfiguration::defaultConfiguration(); configuration.setProtocol(QSsl::TlsV1_2); configuration.setCiphers({QSslCipher("DHE-RSA-AES256-SHA256")}); configuration.setPrivateKey(clientKey); configuration.setLocalCertificate(clientCert); configuration.setPeerVerifyMode(QSslSocket::VerifyPeer); configuration.setHandshakeMustInterruptOnError(true); configuration.setMissingCertificateIsFatal(true); clientSocket.setSslConfiguration(configuration); connect(&clientSocket, &QSslSocket::sslErrors, [&clientSocket](const QList &errors) { for (const auto &error : errors) { if (error.error() == QSslError::HostNameMismatch) { QVERIFY(errors.size() == 2); clientSocket.ignoreSslErrors(errors); } else { QVERIFY(error.error() == QSslError::SelfSignedCertificate); } } } ); connect(&clientSocket, &QAbstractSocket::errorOccurred, [](QAbstractSocket::SocketError socketError) { QVERIFY(socketError == QAbstractSocket::RemoteHostClosedError); } ); connect(&clientSocket, &QSslSocket::handshakeInterruptedOnError, [&clientSocket](const QSslError& error) { QVERIFY(error.error() == QSslError::SelfSignedCertificate); clientSocket.continueInterruptedHandshake(); } ); QSignalSpy serverSpy(&server, &SslServer::alertSent); QSignalSpy clientSpy(&clientSocket, &QSslSocket::alertReceived); clientSocket.connectToHostEncrypted(server.serverAddress().toString(), server.serverPort()); QTestEventLoop runner; auto *context = &runner; QTimer::singleShot(500, context, [&runner]() { runner.exitLoop(); } ); int waitFor = 2; auto earlyQuitter = [&runner, &waitFor](QAbstractSocket::SocketError) { if (!--waitFor) runner.exitLoop(); }; // Presumably, RemoteHostClosedError for the client and SslHandshakeError // for the server: connect(&clientSocket, &QAbstractSocket::errorOccurred, earlyQuitter); connect(&server, &SslServer::socketError, earlyQuitter); runner.enterLoopMSecs(1000); if (clientKnown) { QCOMPARE(serverSpy.size(), 0); QCOMPARE(clientSpy.size(), 0); QVERIFY(server.socket && server.socket->isEncrypted()); QVERIFY(clientSocket.isEncrypted()); } else { QVERIFY(serverSpy.size() > 0); QEXPECT_FAIL("", "Failing to trigger signal, QTBUG-81661", Continue); QVERIFY(clientSpy.size() > 0); QVERIFY(server.socket && !server.socket->isEncrypted()); QVERIFY(!clientSocket.isEncrypted()); } } void tst_QSslSocket::pskHandshake_data() { if (!isTestingOpenSsl) QSKIP("The active TLS backend does not support PSK"); QTest::addColumn("pskRight"); QTest::newRow("Psk right") << true; QTest::newRow("Psk wrong") << false; } void tst_QSslSocket::pskHandshake() { // In this test we want to check the behavior of the // client/server when a preshared key (right/wrong) is used. QFETCH(bool, pskRight); QFETCH_GLOBAL(const bool, setProxy); if (setProxy) // Not what we test here, bail out. return; SslServer server(testDataDir + "certs/selfsigned-server.key", testDataDir + "certs/selfsigned-server.crt"); server.protocol = QSsl::TlsV1_2; server.ignoreSslErrors = false; server.peerVerifyMode = QSslSocket::VerifyPeer; if (!server.listen(QHostAddress::LocalHost)) QSKIP("SslServer::listen() returned false"); QFile clientFile(testDataDir + "certs/selfsigned-client.key"); QVERIFY(clientFile.open(QIODevice::ReadOnly)); QSslKey clientKey(clientFile.readAll(), QSsl::Rsa, QSsl::Pem, QSsl::PrivateKey); QSslCertificate clientCert = QSslCertificate::fromPath(testDataDir + "certs/selfsigned-client.crt").first(); server.config.setCiphers({QSslCipher("RSA-PSK-AES128-CBC-SHA256")}); server.config.setHandshakeMustInterruptOnError(true); server.config.setMissingCertificateIsFatal(true); connect(&server, &SslServer::sslErrors, [&server](const QList &errors) { QCOMPARE(errors.size(), 1); QVERIFY(errors.first().error() == QSslError::SelfSignedCertificate); server.socket->ignoreSslErrors(errors); } ); connect(&server, &SslServer::socketError, [](QAbstractSocket::SocketError socketError) { QVERIFY(socketError == QAbstractSocket::SslHandshakeFailedError); } ); connect(&server, &SslServer::handshakeInterruptedOnError, [&server](const QSslError& error) { QVERIFY(error.error() == QSslError::SelfSignedCertificate); server.socket->continueInterruptedHandshake(); } ); QSslSocket clientSocket; auto configuration = QSslConfiguration::defaultConfiguration(); configuration.setProtocol(QSsl::TlsV1_2); configuration.setCiphers({QSslCipher("RSA-PSK-AES128-CBC-SHA256")}); configuration.setPrivateKey(clientKey); configuration.setLocalCertificate(clientCert); configuration.setPeerVerifyMode(QSslSocket::VerifyPeer); configuration.setHandshakeMustInterruptOnError(true); configuration.setMissingCertificateIsFatal(true); clientSocket.setSslConfiguration(configuration); connect(&clientSocket, &QSslSocket::preSharedKeyAuthenticationRequired, [pskRight](QSslPreSharedKeyAuthenticator *authenticator) { authenticator->setPreSharedKey(pskRight ? "123456": "654321"); } ); connect(&clientSocket, &QSslSocket::sslErrors, [&clientSocket](const QList &errors) { for (const auto &error : errors) { if (error.error() == QSslError::HostNameMismatch) { QVERIFY(errors.size() == 2); clientSocket.ignoreSslErrors(errors); } else { QVERIFY(error.error() == QSslError::SelfSignedCertificate); } } } ); connect(&clientSocket, &QAbstractSocket::errorOccurred, [](QAbstractSocket::SocketError socketError) { QVERIFY(socketError == QAbstractSocket::SslHandshakeFailedError); } ); connect(&clientSocket, &QSslSocket::handshakeInterruptedOnError, [&clientSocket](const QSslError& error) { QVERIFY(error.error() == QSslError::SelfSignedCertificate); clientSocket.continueInterruptedHandshake(); } ); QSignalSpy serverSpy(&server, &SslServer::alertSent); QSignalSpy clientSpy(&clientSocket, &QSslSocket::alertReceived); clientSocket.connectToHostEncrypted(server.serverAddress().toString(), server.serverPort()); QTestEventLoop runner; auto *context = &runner; QTimer::singleShot(500, context, [&runner]() { runner.exitLoop(); }); int waitFor = 2; auto earlyQuitter = [&runner, &waitFor](QAbstractSocket::SocketError) { if (!--waitFor) runner.exitLoop(); }; // Presumably, RemoteHostClosedError for the client and SslHandshakeError // for the server: connect(&clientSocket, &QAbstractSocket::errorOccurred, earlyQuitter); connect(&server, &SslServer::socketError, earlyQuitter); runner.enterLoopMSecs(1000); if (pskRight) { QCOMPARE(serverSpy.size(), 0); QCOMPARE(clientSpy.size(), 0); QVERIFY(server.socket && server.socket->isEncrypted()); QVERIFY(clientSocket.isEncrypted()); } else { QVERIFY(serverSpy.size() > 0); QCOMPARE(serverSpy.first().at(0).toInt(), static_cast(QSsl::AlertLevel::Fatal)); QCOMPARE(serverSpy.first().at(1).toInt(), static_cast(QSsl::AlertType::BadRecordMac)); QVERIFY(clientSpy.size() > 0); QCOMPARE(clientSpy.first().at(0).toInt(), static_cast(QSsl::AlertLevel::Fatal)); QCOMPARE(clientSpy.first().at(1).toInt(), static_cast(QSsl::AlertType::BadRecordMac)); QVERIFY(server.socket && !server.socket->isEncrypted()); QVERIFY(!clientSocket.isEncrypted()); } } #endif // QT_CONFIG(openssl) #endif // QT_CONFIG(ssl) QTEST_MAIN(tst_QSslSocket) #include "tst_qsslsocket.moc"