Class: EchSpec::Spec::Spec7_1_1_5

Inherits:
WithSocket show all
Defined in:
lib/echspec/spec/7.1.1-5.rb

Class Method Summary collapse

Instance Method Summary collapse

Methods inherited from WithSocket

#initialize, #message_stack, #with_socket

Constructor Details

This class inherits a constructor from EchSpec::Spec::WithSocket

Class Method Details

.spec_groupEchSpec::SpecGroup

Returns:



14
15
16
17
18
19
20
21
22
23
24
# File 'lib/echspec/spec/7.1.1-5.rb', line 14

def self.spec_group
  SpecGroup.new(
    '7.1.1-5',
    [
      SpecCase.new(
        'MUST abort with a "decrypt_error" alert, if fails to decrypt 2nd ClientHelloOuter.',
        method(:validate_undecryptable_2nd_ch_outer)
      )
    ]
  )
end

.validate_undecryptable_2nd_ch_outer(hostname, port, ech_config) ⇒ EchSpec::Ok | Err

Parameters:

  • hostname (String)
  • port (Integer)
  • ech_config (ECHConfig)

Returns:



31
32
33
# File 'lib/echspec/spec/7.1.1-5.rb', line 31

def self.validate_undecryptable_2nd_ch_outer(hostname, port, ech_config)
  Spec7_1_1_5.new.do_validate_undecryptable_2nd_ch_outer(hostname, port, ech_config)
end

Instance Method Details

#do_validate_undecryptable_2nd_ch_outer(hostname, port, ech_config) ⇒ EchSpec::Ok | Err

Parameters:

  • hostname (String)
  • port (Integer)
  • ech_config (ECHConfig)

Returns:



40
41
42
43
44
45
46
47
48
# File 'lib/echspec/spec/7.1.1-5.rb', line 40

def do_validate_undecryptable_2nd_ch_outer(hostname, port, ech_config)
  with_socket(hostname, port) do |socket|
    recv = send_2nd_ch_with_undecryptable_ech(socket, hostname, ech_config)
    return Err.new('did not send expected alert: decrypt_error', message_stack) \
      unless Spec.expect_alert(recv, :decrypt_error)

    Ok.new(nil)
  end
end

#send_2nd_ch_with_undecryptable_ech(socket, hostname, ech_config) ⇒ Object



50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
# File 'lib/echspec/spec/7.1.1-5.rb', line 50

def send_2nd_ch_with_undecryptable_ech(socket, hostname, ech_config)
  conn, _inner1, ch1, hrr, ech_state = TLS13Client.recv_hrr(socket, hostname, ech_config, @stack)
  # send 2nd ClientHello with undecryptable ech
  new_exs = TLS13Client.gen_newch_extensions(ch1, hrr)
  inner = TTTLS13::Message::ClientHello.new(
    legacy_version: ch1.legacy_version,
    random: ch1.random,
    legacy_session_id: ch1.legacy_session_id,
    cipher_suites: ch1.cipher_suites,
    legacy_compression_methods: ch1.legacy_compression_methods,
    extensions: new_exs
  )
  ech_state.ctx.increment_seq # invalidly increment of the sequence number
  ch, inner = TTTLS13::Ech.offer_new_ech(inner, ech_state)
  conn.send_record(
    TTTLS13::Message::Record.new(
      type: TTTLS13::Message::ContentType::HANDSHAKE,
      messages: [ch],
      cipher: TTTLS13::Cryptograph::Passer.new
    )
  )
  @stack << inner
  @stack << ch

  recv, = conn.recv_message(TTTLS13::Cryptograph::Passer.new)
  @stack << recv

  recv, = conn.recv_message(TTTLS13::Cryptograph::Passer.new) \
    if recv.is_a?(TTTLS13::Message::ChangeCipherSpec)
  recv
end