2 * Copyright 2022 The OpenSSL Project Authors. All Rights Reserved.
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
10 #include "internal/packet.h"
11 #include "internal/quic_wire.h"
12 #include "internal/quic_wire_pkt.h"
15 struct encode_test_case {
16 int (*serializer)(WPACKET *pkt);
17 const unsigned char *expect_buf;
18 size_t expect_buf_len;
20 * fail: -1 if not truncated (function should test for success), else number
21 * of bytes to which the input has been truncated (function should test that
24 int (*deserializer)(PACKET *pkt, ossl_ssize_t fail);
28 static int encode_case_1_enc(WPACKET *pkt)
30 if (!TEST_int_eq(ossl_quic_wire_encode_padding(pkt, 3), 1))
36 static int encode_case_1_dec(PACKET *pkt, ossl_ssize_t fail)
39 /* No failure modes for padding */
42 if (!TEST_int_eq(ossl_quic_wire_decode_padding(pkt), 3))
48 static const unsigned char encode_case_1_expect[] = {
53 static int encode_case_2_enc(WPACKET *pkt)
56 if (!TEST_int_eq(ossl_quic_wire_encode_frame_ping(pkt), 1))
62 static int encode_case_2_dec(PACKET *pkt, ossl_ssize_t fail)
65 if (!TEST_int_eq(ossl_quic_wire_decode_frame_ping(pkt), fail < 0))
71 static const unsigned char encode_case_2_expect[] = {
76 static const OSSL_QUIC_ACK_RANGE encode_case_3_ranges[] = {
81 static const OSSL_QUIC_FRAME_ACK encode_case_3_f = {
82 (OSSL_QUIC_ACK_RANGE *)encode_case_3_ranges,
83 OSSL_NELEM(encode_case_3_ranges),
88 static int encode_case_3_enc(WPACKET *pkt)
90 if (!TEST_int_eq(ossl_quic_wire_encode_frame_ack(pkt, 3, &encode_case_3_f), 1))
96 static int encode_case_3_dec(PACKET *pkt, ossl_ssize_t fail)
98 OSSL_QUIC_ACK_RANGE ranges[4] = {0};
99 OSSL_QUIC_FRAME_ACK f = {0};
100 uint64_t total_ranges = 0, peek_total_ranges = 0;
103 f.ack_ranges = ranges;
104 f.num_ack_ranges = OSSL_NELEM(ranges);
106 ret = ossl_quic_wire_peek_frame_ack_num_ranges(pkt, &peek_total_ranges);
107 if (fail < 0 && !TEST_int_eq(ret, 1))
110 if (!TEST_int_eq(ossl_quic_wire_decode_frame_ack(pkt, 3, &f, &total_ranges), fail < 0))
113 if (ret == 1 && !TEST_uint64_t_eq(peek_total_ranges, 2))
119 if (!TEST_uint64_t_eq(total_ranges, peek_total_ranges))
122 if (!TEST_uint64_t_le(f.num_ack_ranges * sizeof(OSSL_QUIC_ACK_RANGE),
124 || !TEST_uint64_t_le(encode_case_3_f.num_ack_ranges
125 * sizeof(OSSL_QUIC_ACK_RANGE),
129 if (!TEST_mem_eq(f.ack_ranges,
130 (size_t)f.num_ack_ranges * sizeof(OSSL_QUIC_ACK_RANGE),
131 encode_case_3_f.ack_ranges,
132 (size_t)encode_case_3_f.num_ack_ranges * sizeof(OSSL_QUIC_ACK_RANGE)))
135 if (!TEST_uint64_t_eq(ossl_time2ticks(f.delay_time),
136 ossl_time2ticks(encode_case_3_f.delay_time)))
139 if (!TEST_true(f.ecn_present))
142 if (!TEST_uint64_t_eq(f.ect0, encode_case_3_f.ect0))
145 if (!TEST_uint64_t_eq(f.ect1, encode_case_3_f.ect1))
148 if (!TEST_uint64_t_eq(f.ecnce, encode_case_3_f.ecnce))
154 static const unsigned char encode_case_3_expect[] = {
156 0x1E, /* Largest Acknowledged */
157 0x40, 0x7d, /* ACK Delay */
158 1, /* ACK Range Count */
159 10, /* First ACK Range */
164 0x3c, /* ECT0 Count */
165 0x40, 0x46, /* ECT1 Count */
166 0x40, 0x50, /* ECNCE Count */
169 /* 4. RESET_STREAM */
170 static const OSSL_QUIC_FRAME_RESET_STREAM encode_case_4_f = {
171 0x1234, 0x9781, 0x11717
174 static int encode_case_4_enc(WPACKET *pkt)
176 if (!TEST_int_eq(ossl_quic_wire_encode_frame_reset_stream(pkt,
177 &encode_case_4_f), 1))
183 static int encode_case_4_dec(PACKET *pkt, ossl_ssize_t fail)
185 OSSL_QUIC_FRAME_RESET_STREAM f = {0};
187 if (!TEST_int_eq(ossl_quic_wire_decode_frame_reset_stream(pkt, &f), fail < 0))
193 if (!TEST_mem_eq(&f, sizeof(f), &encode_case_4_f, sizeof(encode_case_4_f)))
199 static const unsigned char encode_case_4_expect[] = {
201 0x52, 0x34, /* Stream ID */
202 0x80, 0x00, 0x97, 0x81, /* App Error Code */
203 0x80, 0x01, 0x17, 0x17, /* Final Size */
206 /* 5. STOP_SENDING */
207 static const OSSL_QUIC_FRAME_STOP_SENDING encode_case_5_f = {
211 static int encode_case_5_enc(WPACKET *pkt)
213 if (!TEST_int_eq(ossl_quic_wire_encode_frame_stop_sending(pkt,
214 &encode_case_5_f), 1))
220 static int encode_case_5_dec(PACKET *pkt, ossl_ssize_t fail)
222 OSSL_QUIC_FRAME_STOP_SENDING f = {0};
224 if (!TEST_int_eq(ossl_quic_wire_decode_frame_stop_sending(pkt, &f), fail < 0))
230 if (!TEST_mem_eq(&f, sizeof(f), &encode_case_5_f, sizeof(encode_case_5_f)))
236 static const unsigned char encode_case_5_expect[] = {
238 0x52, 0x34, /* Stream ID */
239 0x80, 0x00, 0x97, 0x81 /* App Error Code */
243 static const unsigned char encode_case_6_data[] = {
247 static const OSSL_QUIC_FRAME_CRYPTO encode_case_6_f = {
248 0x1234, sizeof(encode_case_6_data), encode_case_6_data
251 static int encode_case_6_enc(WPACKET *pkt)
253 if (!TEST_ptr(ossl_quic_wire_encode_frame_crypto(pkt,
260 static int encode_case_6_dec(PACKET *pkt, ossl_ssize_t fail)
262 OSSL_QUIC_FRAME_CRYPTO f = {0};
264 if (!TEST_int_eq(ossl_quic_wire_decode_frame_crypto(pkt, 0, &f), fail < 0))
270 if (!TEST_uint64_t_eq(f.offset, 0x1234))
273 if (!TEST_uint64_t_le(f.len, SIZE_MAX))
276 if (!TEST_mem_eq(f.data, (size_t)f.len,
277 encode_case_6_data, sizeof(encode_case_6_data)))
283 static const unsigned char encode_case_6_expect[] = {
285 0x52, 0x34, /* Offset */
287 93, 18, 17, 102, 33 /* Data */
291 static const unsigned char encode_case_7_token[] = {
292 0xde, 0x06, 0xcb, 0x76, 0x5d, 0xb1, 0xa7, 0x71,
293 0x78, 0x09, 0xbb, 0xe8, 0x50, 0x19, 0x12, 0x9a
296 static int encode_case_7_enc(WPACKET *pkt)
298 if (!TEST_int_eq(ossl_quic_wire_encode_frame_new_token(pkt,
300 sizeof(encode_case_7_token)), 1))
306 static int encode_case_7_dec(PACKET *pkt, ossl_ssize_t fail)
308 const unsigned char *token = NULL;
309 size_t token_len = 0;
311 if (!TEST_int_eq(ossl_quic_wire_decode_frame_new_token(pkt,
313 &token_len), fail < 0))
319 if (!TEST_mem_eq(token, token_len,
320 encode_case_7_token, sizeof(encode_case_7_token)))
326 static const unsigned char encode_case_7_expect[] = {
329 0xde, 0x06, 0xcb, 0x76, 0x5d, 0xb1, 0xa7, 0x71, /* Token */
330 0x78, 0x09, 0xbb, 0xe8, 0x50, 0x19, 0x12, 0x9a
333 /* 8. STREAM (no length, no offset, no fin) */
334 static const unsigned char encode_case_8_data[] = {
335 0xde, 0x06, 0xcb, 0x76, 0x5d
337 static const OSSL_QUIC_FRAME_STREAM encode_case_8_f = {
338 0x1234, 0, 5, encode_case_8_data, 0, 0
341 static int encode_case_8_enc(WPACKET *pkt)
343 if (!TEST_ptr(ossl_quic_wire_encode_frame_stream(pkt,
350 static int encode_case_8_dec(PACKET *pkt, ossl_ssize_t fail)
352 OSSL_QUIC_FRAME_STREAM f = {0};
356 * This case uses implicit length signalling so truncation will not
357 * cause it to fail unless the header (which is 3 bytes) is truncated.
361 if (!TEST_int_eq(ossl_quic_wire_decode_frame_stream(pkt, 0, &f), fail < 0))
367 if (!TEST_uint64_t_le(f.len, SIZE_MAX))
370 if (!TEST_mem_eq(f.data, (size_t)f.len,
371 encode_case_8_data, sizeof(encode_case_8_data)))
374 if (!TEST_uint64_t_eq(f.stream_id, 0x1234))
377 if (!TEST_uint64_t_eq(f.offset, 0))
380 if (!TEST_int_eq(f.has_explicit_len, 0))
383 if (!TEST_int_eq(f.is_fin, 0))
389 static const unsigned char encode_case_8_expect[] = {
390 0x08, /* Type (OFF=0, LEN=0, FIN=0) */
391 0x52, 0x34, /* Stream ID */
392 0xde, 0x06, 0xcb, 0x76, 0x5d /* Data */
395 /* 9. STREAM (length, offset, fin) */
396 static const unsigned char encode_case_9_data[] = {
397 0xde, 0x06, 0xcb, 0x76, 0x5d
399 static const OSSL_QUIC_FRAME_STREAM encode_case_9_f = {
400 0x1234, 0x39, 5, encode_case_9_data, 1, 1
403 static int encode_case_9_enc(WPACKET *pkt)
405 if (!TEST_ptr(ossl_quic_wire_encode_frame_stream(pkt,
412 static int encode_case_9_dec(PACKET *pkt, ossl_ssize_t fail)
414 OSSL_QUIC_FRAME_STREAM f = {0};
416 if (!TEST_int_eq(ossl_quic_wire_decode_frame_stream(pkt, 0, &f), fail < 0))
422 if (!TEST_uint64_t_le(f.len, SIZE_MAX))
425 if (!TEST_mem_eq(f.data, (size_t)f.len,
426 encode_case_9_data, sizeof(encode_case_9_data)))
429 if (!TEST_uint64_t_eq(f.stream_id, 0x1234))
432 if (!TEST_uint64_t_eq(f.offset, 0x39))
435 if (!TEST_int_eq(f.has_explicit_len, 1))
438 if (!TEST_int_eq(f.is_fin, 1))
444 static const unsigned char encode_case_9_expect[] = {
445 0x0f, /* Type (OFF=1, LEN=1, FIN=1) */
446 0x52, 0x34, /* Stream ID */
449 0xde, 0x06, 0xcb, 0x76, 0x5d /* Data */
453 static int encode_case_10_enc(WPACKET *pkt)
455 if (!TEST_int_eq(ossl_quic_wire_encode_frame_max_data(pkt, 0x1234), 1))
461 static int encode_case_10_dec(PACKET *pkt, ossl_ssize_t fail)
463 uint64_t max_data = 0;
465 if (!TEST_int_eq(ossl_quic_wire_decode_frame_max_data(pkt, &max_data), fail < 0))
471 if (!TEST_uint64_t_eq(max_data, 0x1234))
477 static const unsigned char encode_case_10_expect[] = {
479 0x52, 0x34, /* Max Data */
482 /* 11. MAX_STREAM_DATA */
483 static int encode_case_11_enc(WPACKET *pkt)
485 if (!TEST_int_eq(ossl_quic_wire_encode_frame_max_stream_data(pkt,
493 static int encode_case_11_dec(PACKET *pkt, ossl_ssize_t fail)
495 uint64_t stream_id = 0, max_data = 0;
497 if (!TEST_int_eq(ossl_quic_wire_decode_frame_max_stream_data(pkt,
499 &max_data), fail < 0))
505 if (!TEST_uint64_t_eq(stream_id, 0x1234))
508 if (!TEST_uint64_t_eq(max_data, 0x9781))
514 static const unsigned char encode_case_11_expect[] = {
516 0x52, 0x34, /* Stream ID */
517 0x80, 0x00, 0x97, 0x81, /* Max Data */
520 /* 12. MAX_STREAMS */
521 static int encode_case_12_enc(WPACKET *pkt)
523 if (!TEST_int_eq(ossl_quic_wire_encode_frame_max_streams(pkt, 0, 0x1234), 1))
526 if (!TEST_int_eq(ossl_quic_wire_encode_frame_max_streams(pkt, 1, 0x9781), 1))
532 static int encode_case_12_dec(PACKET *pkt, ossl_ssize_t fail)
534 uint64_t max_streams_1 = 0, max_streams_2 = 0,
535 frame_type_1 = 0, frame_type_2 = 0;
536 int is_minimal = 1, success_if;
538 success_if = (fail < 0 || fail >= 1);
539 if (!TEST_int_eq(ossl_quic_wire_peek_frame_header(pkt, &frame_type_1,
544 if (!TEST_true(!success_if || is_minimal))
547 success_if = (fail < 0 || fail >= 3);
548 if (!TEST_int_eq(ossl_quic_wire_decode_frame_max_streams(pkt,
553 success_if = (fail < 0 || fail >= 4);
554 if (!TEST_int_eq(ossl_quic_wire_peek_frame_header(pkt, &frame_type_2,
559 if (!TEST_true(!success_if || is_minimal))
562 success_if = (fail < 0);
563 if (!TEST_int_eq(ossl_quic_wire_decode_frame_max_streams(pkt,
568 if ((fail < 0 || fail >= 3)
569 && !TEST_uint64_t_eq(frame_type_1, OSSL_QUIC_FRAME_TYPE_MAX_STREAMS_BIDI))
572 if ((fail < 0 || fail >= 3)
573 && !TEST_uint64_t_eq(max_streams_1, 0x1234))
576 if ((fail < 0 || fail >= 8)
577 && !TEST_uint64_t_eq(frame_type_2, OSSL_QUIC_FRAME_TYPE_MAX_STREAMS_UNI))
580 if ((fail < 0 || fail >= 8)
581 && !TEST_uint64_t_eq(max_streams_2, 0x9781))
587 static const unsigned char encode_case_12_expect[] = {
588 0x12, /* Type (MAX_STREAMS Bidirectional) */
589 0x52, 0x34, /* Max Streams */
590 0x13, /* Type (MAX_STREAMS Unidirectional) */
591 0x80, 0x00, 0x97, 0x81, /* Max Streams */
594 /* 13. DATA_BLOCKED */
595 static int encode_case_13_enc(WPACKET *pkt)
597 if (!TEST_int_eq(ossl_quic_wire_encode_frame_data_blocked(pkt, 0x1234), 1))
603 static int encode_case_13_dec(PACKET *pkt, ossl_ssize_t fail)
605 uint64_t max_data = 0;
607 if (!TEST_int_eq(ossl_quic_wire_decode_frame_data_blocked(pkt,
608 &max_data), fail < 0))
614 if (!TEST_uint64_t_eq(max_data, 0x1234))
620 static const unsigned char encode_case_13_expect[] = {
622 0x52, 0x34, /* Max Data */
625 /* 14. STREAM_DATA_BLOCKED */
626 static int encode_case_14_enc(WPACKET *pkt)
628 if (!TEST_int_eq(ossl_quic_wire_encode_frame_stream_data_blocked(pkt,
636 static int encode_case_14_dec(PACKET *pkt, ossl_ssize_t fail)
638 uint64_t stream_id = 0, max_data = 0;
640 if (!TEST_int_eq(ossl_quic_wire_decode_frame_stream_data_blocked(pkt,
642 &max_data), fail < 0))
648 if (!TEST_uint64_t_eq(stream_id, 0x1234))
651 if (!TEST_uint64_t_eq(max_data, 0x9781))
657 static const unsigned char encode_case_14_expect[] = {
659 0x52, 0x34, /* Stream ID */
660 0x80, 0x00, 0x97, 0x81, /* Max Data */
663 /* 15. STREAMS_BLOCKED */
664 static int encode_case_15_enc(WPACKET *pkt)
666 if (!TEST_int_eq(ossl_quic_wire_encode_frame_streams_blocked(pkt, 0, 0x1234), 1))
669 if (!TEST_int_eq(ossl_quic_wire_encode_frame_streams_blocked(pkt, 1, 0x9781), 1))
675 static int encode_case_15_dec(PACKET *pkt, ossl_ssize_t fail)
677 uint64_t max_streams_1 = 0, max_streams_2 = 0,
678 frame_type_1 = 0, frame_type_2 = 0;
679 int is_minimal = 1, success_if;
681 success_if = (fail < 0 || fail >= 1);
682 if (!TEST_int_eq(ossl_quic_wire_peek_frame_header(pkt, &frame_type_1,
687 if (!TEST_true(!success_if || is_minimal))
690 success_if = (fail < 0 || fail >= 3);
691 if (!TEST_int_eq(ossl_quic_wire_decode_frame_streams_blocked(pkt,
696 success_if = (fail < 0 || fail >= 4);
697 if (!TEST_int_eq(ossl_quic_wire_peek_frame_header(pkt, &frame_type_2,
702 if (!TEST_true(!success_if || is_minimal))
705 if (!TEST_int_eq(ossl_quic_wire_decode_frame_streams_blocked(pkt,
707 fail < 0 || fail >= 8))
710 if ((fail < 0 || fail >= 1)
711 && !TEST_uint64_t_eq(frame_type_1, OSSL_QUIC_FRAME_TYPE_STREAMS_BLOCKED_BIDI))
714 if ((fail < 0 || fail >= 3)
715 && !TEST_uint64_t_eq(max_streams_1, 0x1234))
718 if ((fail < 0 || fail >= 4)
719 && !TEST_uint64_t_eq(frame_type_2, OSSL_QUIC_FRAME_TYPE_STREAMS_BLOCKED_UNI))
722 if ((fail < 0 || fail >= 8)
723 && !TEST_uint64_t_eq(max_streams_2, 0x9781))
729 static const unsigned char encode_case_15_expect[] = {
730 0x16, /* Type (STREAMS_BLOCKED Bidirectional) */
731 0x52, 0x34, /* Max Streams */
732 0x17, /* Type (STREAMS_BLOCKED Unidirectional) */
733 0x80, 0x00, 0x97, 0x81, /* Max Streams */
736 /* 16. NEW_CONNECTION_ID */
737 static const unsigned char encode_case_16_conn_id[] = {
738 0x33, 0x44, 0x55, 0x66
741 static const OSSL_QUIC_FRAME_NEW_CONN_ID encode_case_16_f = {
746 {0x33, 0x44, 0x55, 0x66}
749 0xde, 0x06, 0xcb, 0x76, 0x5d, 0xb1, 0xa7, 0x71,
750 0x78, 0x09, 0xbb, 0xe8, 0x50, 0x19, 0x12, 0x9a
754 static int encode_case_16_enc(WPACKET *pkt)
756 if (!TEST_int_eq(ossl_quic_wire_encode_frame_new_conn_id(pkt,
757 &encode_case_16_f), 1))
763 static int encode_case_16_dec(PACKET *pkt, ossl_ssize_t fail)
765 OSSL_QUIC_FRAME_NEW_CONN_ID f = {0};
767 if (!TEST_int_eq(ossl_quic_wire_decode_frame_new_conn_id(pkt, &f), fail < 0))
773 if (!TEST_uint64_t_eq(f.seq_num, 0x9781))
776 if (!TEST_uint64_t_eq(f.retire_prior_to, 0x1234))
779 if (!TEST_uint64_t_eq(f.conn_id.id_len, sizeof(encode_case_16_conn_id)))
782 if (!TEST_mem_eq(f.conn_id.id, f.conn_id.id_len,
783 encode_case_16_conn_id, sizeof(encode_case_16_conn_id)))
786 if (!TEST_mem_eq(f.stateless_reset_token,
787 sizeof(f.stateless_reset_token),
788 encode_case_16_f.stateless_reset_token,
789 sizeof(encode_case_16_f.stateless_reset_token)))
795 static const unsigned char encode_case_16_expect[] = {
797 0x80, 0x00, 0x97, 0x81, /* Sequence Number */
798 0x52, 0x34, /* Retire Prior To */
799 0x04, /* Connection ID Length */
800 0x33, 0x44, 0x55, 0x66, /* Connection ID */
801 0xde, 0x06, 0xcb, 0x76, 0x5d, 0xb1, 0xa7, 0x71, /* Stateless Reset Token */
802 0x78, 0x09, 0xbb, 0xe8, 0x50, 0x19, 0x12, 0x9a
805 /* 16b. NEW_CONNECTION_ID seq_num < retire_prior_to */
806 static const OSSL_QUIC_FRAME_NEW_CONN_ID encode_case_16b_f = {
811 {0x33, 0x44, 0x55, 0x66}
814 0xde, 0x06, 0xcb, 0x76, 0x5d, 0xb1, 0xa7, 0x71,
815 0x78, 0x09, 0xbb, 0xe8, 0x50, 0x19, 0x12, 0x9a
819 static int encode_case_16b_enc(WPACKET *pkt)
821 if (!TEST_int_eq(ossl_quic_wire_encode_frame_new_conn_id(pkt,
822 &encode_case_16b_f), 1))
828 static int encode_case_16b_dec(PACKET *pkt, ossl_ssize_t fail)
830 OSSL_QUIC_FRAME_NEW_CONN_ID f = {0};
832 if (!TEST_int_eq(ossl_quic_wire_decode_frame_new_conn_id(pkt, &f), 0))
835 if (!TEST_true(PACKET_forward(pkt, PACKET_remaining(pkt))))
841 static const unsigned char encode_case_16b_expect[] = {
843 0x52, 0x34, /* Sequence Number */
844 0x80, 0x00, 0x97, 0x81, /* Retire Prior To */
845 0x04, /* Connection ID Length */
846 0x33, 0x44, 0x55, 0x66, /* Connection ID */
847 0xde, 0x06, 0xcb, 0x76, 0x5d, 0xb1, 0xa7, 0x71, /* Stateless Reset Token */
848 0x78, 0x09, 0xbb, 0xe8, 0x50, 0x19, 0x12, 0x9a
851 /* 17. RETIRE_CONNECTION_ID */
852 static int encode_case_17_enc(WPACKET *pkt)
854 if (!TEST_int_eq(ossl_quic_wire_encode_frame_retire_conn_id(pkt, 0x1234), 1))
860 static int encode_case_17_dec(PACKET *pkt, ossl_ssize_t fail)
862 uint64_t seq_num = 0;
864 if (!TEST_int_eq(ossl_quic_wire_decode_frame_retire_conn_id(pkt, &seq_num), fail < 0))
870 if (!TEST_uint64_t_eq(seq_num, 0x1234))
876 static const unsigned char encode_case_17_expect[] = {
878 0x52, 0x34, /* Seq Num */
881 /* 18. PATH_CHALLENGE */
882 static const uint64_t encode_case_18_data
883 = (((uint64_t)0x5f4b12)<<40) | (uint64_t)0x731834UL;
885 static int encode_case_18_enc(WPACKET *pkt)
887 if (!TEST_int_eq(ossl_quic_wire_encode_frame_path_challenge(pkt,
888 encode_case_18_data), 1))
894 static int encode_case_18_dec(PACKET *pkt, ossl_ssize_t fail)
896 uint64_t challenge = 0;
898 if (!TEST_int_eq(ossl_quic_wire_decode_frame_path_challenge(pkt, &challenge), fail < 0))
904 if (!TEST_uint64_t_eq(challenge, encode_case_18_data))
910 static const unsigned char encode_case_18_expect[] = {
912 0x5f, 0x4b, 0x12, 0x00, 0x00, 0x73, 0x18, 0x34, /* Data */
915 /* 19. PATH_RESPONSE */
916 static const uint64_t encode_case_19_data
917 = (((uint64_t)0x5f4b12)<<40) | (uint64_t)0x731834UL;
919 static int encode_case_19_enc(WPACKET *pkt)
921 if (!TEST_int_eq(ossl_quic_wire_encode_frame_path_response(pkt,
922 encode_case_19_data), 1))
928 static int encode_case_19_dec(PACKET *pkt, ossl_ssize_t fail)
930 uint64_t challenge = 0;
932 if (!TEST_int_eq(ossl_quic_wire_decode_frame_path_response(pkt, &challenge), fail < 0))
938 if (!TEST_uint64_t_eq(challenge, encode_case_19_data))
944 static const unsigned char encode_case_19_expect[] = {
946 0x5f, 0x4b, 0x12, 0x00, 0x00, 0x73, 0x18, 0x34, /* Data */
949 /* 20. CONNECTION_CLOSE (transport) */
950 static const char encode_case_20_reason[] = {
951 /* "reason for closure" */
952 0x72, 0x65, 0x61, 0x73, 0x6f, 0x6e, 0x20, 0x66, 0x6f,
953 0x72, 0x20, 0x63, 0x6c, 0x6f, 0x73, 0x75, 0x72, 0x65
956 static const OSSL_QUIC_FRAME_CONN_CLOSE encode_case_20_f = {
960 (char *)encode_case_20_reason,
961 sizeof(encode_case_20_reason)
964 static int encode_case_20_enc(WPACKET *pkt)
966 if (!TEST_int_eq(ossl_quic_wire_encode_frame_conn_close(pkt,
967 &encode_case_20_f), 1))
973 static int encode_case_20_dec(PACKET *pkt, ossl_ssize_t fail)
975 OSSL_QUIC_FRAME_CONN_CLOSE f = {0};
977 if (!TEST_int_eq(ossl_quic_wire_decode_frame_conn_close(pkt, &f), fail < 0))
983 if (!TEST_int_eq(f.is_app, 0))
986 if (!TEST_uint64_t_eq(f.error_code, 0x1234))
989 if (!TEST_uint64_t_eq(f.frame_type, 0x9781))
992 if (!TEST_size_t_eq(f.reason_len, 18))
995 if (!TEST_mem_eq(f.reason, f.reason_len,
996 encode_case_20_f.reason, encode_case_20_f.reason_len))
1002 static const unsigned char encode_case_20_expect[] = {
1004 0x52, 0x34, /* Sequence Number */
1005 0x80, 0x00, 0x97, 0x81, /* Frame Type */
1006 0x12, /* Reason Length */
1007 0x72, 0x65, 0x61, 0x73, 0x6f, 0x6e, 0x20, 0x66, 0x6f, /* Reason */
1008 0x72, 0x20, 0x63, 0x6c, 0x6f, 0x73, 0x75, 0x72, 0x65
1011 /* 21. HANDSHAKE_DONE */
1012 static int encode_case_21_enc(WPACKET *pkt)
1015 if (!TEST_int_eq(ossl_quic_wire_encode_frame_handshake_done(pkt), 1))
1021 static int encode_case_21_dec(PACKET *pkt, ossl_ssize_t fail)
1024 if (!TEST_int_eq(ossl_quic_wire_decode_frame_handshake_done(pkt), fail < 0))
1030 static const unsigned char encode_case_21_expect[] = {
1034 /* 22. Buffer Transport Parameter */
1035 static const unsigned char encode_case_22_data[] = {0x55,0x77,0x32,0x46,0x99};
1037 static int encode_case_22_enc(WPACKET *pkt)
1041 if (!TEST_ptr(ossl_quic_wire_encode_transport_param_bytes(pkt, 0x1234,
1042 encode_case_22_data,
1043 sizeof(encode_case_22_data))))
1046 if (!TEST_ptr(p = ossl_quic_wire_encode_transport_param_bytes(pkt, 0x9781,
1056 static int encode_case_22_dec(PACKET *pkt, ossl_ssize_t fail)
1060 const unsigned char *p;
1061 static const unsigned char data[] = {0x33, 0x44};
1063 if (!TEST_int_eq(ossl_quic_wire_peek_transport_param(pkt, &id),
1064 fail < 0 || fail >= 2))
1067 if ((fail < 0 || fail >= 2)
1068 && !TEST_uint64_t_eq(id, 0x1234))
1073 p = ossl_quic_wire_decode_transport_param_bytes(pkt, &id, &len);
1074 if (fail < 0 || fail >= 8) {
1078 if (!TEST_ptr_null(p))
1082 if ((fail < 0 || fail >= 8)
1083 && !TEST_uint64_t_eq(id, 0x1234))
1086 if ((fail < 0 || fail >= 8)
1087 && !TEST_mem_eq(p, len, encode_case_22_data, sizeof(encode_case_22_data)))
1090 if ((fail < 0 || fail >= 8)
1091 && !TEST_int_eq(ossl_quic_wire_peek_transport_param(pkt, &id),
1092 fail < 0 || fail >= 12))
1095 if ((fail < 0 || fail >= 12)
1096 && !TEST_uint64_t_eq(id, 0x9781))
1101 p = ossl_quic_wire_decode_transport_param_bytes(pkt, &id, &len);
1102 if (fail < 0 || fail >= 15) {
1106 if (!TEST_ptr_null(p))
1110 if ((fail < 0 || fail >= 15)
1111 && !TEST_uint64_t_eq(id, 0x9781))
1114 if ((fail < 0 || fail >= 15)
1115 && !TEST_mem_eq(p, len, data, sizeof(data)))
1121 static const unsigned char encode_case_22_expect[] = {
1122 0x52, 0x34, /* ID */
1124 0x55, 0x77, 0x32, 0x46, 0x99, /* Data */
1126 0x80, 0x00, 0x97, 0x81, /* ID */
1128 0x33, 0x44 /* Data */
1131 /* 23. Integer Transport Parameter */
1132 static int encode_case_23_enc(WPACKET *pkt)
1134 if (!TEST_int_eq(ossl_quic_wire_encode_transport_param_int(pkt, 0x1234, 0x9781), 1))
1137 if (!TEST_int_eq(ossl_quic_wire_encode_transport_param_int(pkt, 0x2233, 0x4545), 1))
1143 static int encode_case_23_dec(PACKET *pkt, ossl_ssize_t fail)
1145 uint64_t id = 0, value = 0;
1147 if (!TEST_int_eq(ossl_quic_wire_decode_transport_param_int(pkt,
1149 fail < 0 || fail >= 7))
1152 if ((fail < 0 || fail >= 7)
1153 && !TEST_uint64_t_eq(id, 0x1234))
1156 if ((fail < 0 || fail >= 7)
1157 && !TEST_uint64_t_eq(value, 0x9781))
1160 if (!TEST_int_eq(ossl_quic_wire_decode_transport_param_int(pkt,
1162 fail < 0 || fail >= 14))
1165 if ((fail < 0 || fail >= 14)
1166 && !TEST_uint64_t_eq(id, 0x2233))
1169 if ((fail < 0 || fail >= 14)
1170 && !TEST_uint64_t_eq(value, 0x4545))
1176 static const unsigned char encode_case_23_expect[] = {
1179 0x80, 0x00, 0x97, 0x81,
1183 0x80, 0x00, 0x45, 0x45,
1186 #define ENCODE_CASE(n) \
1188 encode_case_##n##_enc, \
1189 encode_case_##n##_expect, \
1190 OSSL_NELEM(encode_case_##n##_expect), \
1191 encode_case_##n##_dec \
1194 static const struct encode_test_case encode_cases[] = {
1221 static int test_wire_encode(int idx)
1226 BUF_MEM *buf = NULL;
1228 const struct encode_test_case *c = &encode_cases[idx];
1232 if (!TEST_ptr(buf = BUF_MEM_new()))
1235 if (!TEST_int_eq(WPACKET_init(&wpkt, buf), 1))
1239 if (!TEST_int_eq(c->serializer(&wpkt), 1))
1242 if (!TEST_int_eq(WPACKET_get_total_written(&wpkt, &written), 1))
1245 if (!TEST_mem_eq(buf->data, written, c->expect_buf, c->expect_buf_len))
1248 if (!TEST_int_eq(PACKET_buf_init(&pkt, (unsigned char *)buf->data, written), 1))
1251 if (!TEST_int_eq(c->deserializer(&pkt, -1), 1))
1254 if (!TEST_false(PACKET_remaining(&pkt)))
1257 for (i = 0; i < c->expect_buf_len; ++i) {
1261 * Check parsing truncated (i.e., malformed) input is handled correctly.
1262 * Generate all possible truncations of our reference encoding and
1263 * verify that they are handled correctly. The number of bytes of the
1264 * truncated encoding is passed as an argument to the deserializer to
1265 * help it determine whether decoding should fail or not.
1267 if (!TEST_int_eq(PACKET_buf_init(&pkt2, (unsigned char *)c->expect_buf, i), 1))
1270 if (!TEST_int_eq(c->deserializer(&pkt2, i), 1))
1277 WPACKET_finish(&wpkt);
1282 struct ack_test_case {
1283 const unsigned char *input_buf;
1284 size_t input_buf_len;
1285 int (*deserializer)(PACKET *pkt);
1289 /* ACK Frame with Excessive First ACK Range Field */
1290 static const unsigned char ack_case_1_input[] = {
1291 0x02, /* ACK Without ECN */
1292 0x08, /* Largest Acknowledged */
1293 0x01, /* ACK Delay */
1294 0x00, /* ACK Range Count */
1295 0x09, /* First ACK Range */
1298 /* ACK Frame with Valid ACK Range Field */
1299 static const unsigned char ack_case_2_input[] = {
1300 0x02, /* ACK Without ECN */
1301 0x08, /* Largest Acknowledged */
1302 0x01, /* ACK Delay */
1303 0x00, /* ACK Range Count */
1304 0x08, /* First ACK Range */
1307 /* ACK Frame with Excessive ACK Range Gap */
1308 static const unsigned char ack_case_3_input[] = {
1309 0x02, /* ACK Without ECN */
1310 0x08, /* Largest Acknowledged */
1311 0x01, /* ACK Delay */
1312 0x01, /* ACK Range Count */
1313 0x01, /* First ACK Range */
1316 0x01, /* ACK Range Length */
1319 /* ACK Frame with Valid ACK Range */
1320 static const unsigned char ack_case_4_input[] = {
1321 0x02, /* ACK Without ECN */
1322 0x08, /* Largest Acknowledged */
1323 0x01, /* ACK Delay */
1324 0x01, /* ACK Range Count */
1325 0x01, /* First ACK Range */
1328 0x01, /* ACK Range Length */
1331 /* ACK Frame with Excessive ACK Range Length */
1332 static const unsigned char ack_case_5_input[] = {
1333 0x02, /* ACK Without ECN */
1334 0x08, /* Largest Acknowledged */
1335 0x01, /* ACK Delay */
1336 0x01, /* ACK Range Count */
1337 0x01, /* First ACK Range */
1340 0x02, /* ACK Range Length */
1343 /* ACK Frame with Multiple ACK Ranges, Final Having Excessive Length */
1344 static const unsigned char ack_case_6_input[] = {
1345 0x02, /* ACK Without ECN */
1346 0x08, /* Largest Acknowledged */
1347 0x01, /* ACK Delay */
1348 0x02, /* ACK Range Count */
1349 0x01, /* First ACK Range */
1352 0x02, /* ACK Range Length */
1355 0x01, /* ACK Range Length */
1358 /* ACK Frame with Multiple ACK Ranges, Valid */
1359 static const unsigned char ack_case_7_input[] = {
1360 0x02, /* ACK Without ECN */
1361 0x08, /* Largest Acknowledged */
1362 0x01, /* ACK Delay */
1363 0x02, /* ACK Range Count */
1364 0x01, /* First ACK Range */
1367 0x02, /* ACK Range Length */
1370 0x00, /* ACK Range Length */
1373 static int ack_generic_decode(PACKET *pkt)
1375 OSSL_QUIC_ACK_RANGE ranges[8] = {0};
1376 OSSL_QUIC_FRAME_ACK f = {0};
1377 uint64_t total_ranges = 0, peek_total_ranges = 0;
1381 f.ack_ranges = ranges;
1382 f.num_ack_ranges = OSSL_NELEM(ranges);
1384 if (!TEST_int_eq(ossl_quic_wire_peek_frame_ack_num_ranges(pkt,
1385 &peek_total_ranges), 1))
1388 r = ossl_quic_wire_decode_frame_ack(pkt, 3, &f, &total_ranges);
1392 if (!TEST_uint64_t_eq(total_ranges, peek_total_ranges))
1395 for (i = 0; i < f.num_ack_ranges; ++i) {
1396 if (!TEST_uint64_t_le(f.ack_ranges[i].start, f.ack_ranges[i].end))
1398 if (!TEST_uint64_t_lt(f.ack_ranges[i].end, 1000))
1405 #define ACK_CASE(n, expect_fail, dec) \
1407 ack_case_##n##_input, \
1408 sizeof(ack_case_##n##_input), \
1413 static const struct ack_test_case ack_cases[] = {
1414 ACK_CASE(1, 1, ack_generic_decode)
1415 ACK_CASE(2, 0, ack_generic_decode)
1416 ACK_CASE(3, 1, ack_generic_decode)
1417 ACK_CASE(4, 0, ack_generic_decode)
1418 ACK_CASE(5, 1, ack_generic_decode)
1419 ACK_CASE(6, 1, ack_generic_decode)
1420 ACK_CASE(7, 0, ack_generic_decode)
1423 static int test_wire_ack(int idx)
1425 int testresult = 0, r;
1427 const struct ack_test_case *c = &ack_cases[idx];
1429 if (!TEST_int_eq(PACKET_buf_init(&pkt,
1430 (unsigned char *)c->input_buf,
1431 c->input_buf_len), 1))
1434 r = c->deserializer(&pkt);
1435 if (c->expect_fail) {
1436 if (!TEST_int_eq(r, 0))
1439 if (!TEST_int_eq(r, 1))
1442 if (!TEST_false(PACKET_remaining(&pkt)))
1451 /* Packet Header PN Encoding Tests */
1453 QUIC_PN pn, tx_largest_acked, rx_largest_pn;
1455 unsigned char expected_bytes[4];
1458 static const struct pn_test pn_tests[] = {
1459 /* RFC 9000 Section A.2 */
1460 { 0xac5c02, 0xabe8b3, 0xabe8b3, 2, {0x5c,0x02} },
1461 { 0xace8fe, 0xabe8b3, 0xabe8b3, 3, {0xac,0xe8,0xfe} },
1462 /* RFC 9000 Section A.3 */
1463 { 0xa82f9b32, 0xa82f30ea, 0xa82f30ea, 2, {0x9b,0x32} },
1464 /* Boundary Cases */
1465 { 1, 0, 0, 1, {0x01} },
1466 { 256, 255, 255, 1, {0x00} },
1467 { 257, 255, 255, 1, {0x01} },
1468 { 256, 128, 128, 1, {0x00} },
1469 { 256, 127, 127, 2, {0x01,0x00} },
1470 { 65536, 32768, 32768, 2, {0x00,0x00} },
1471 { 65537, 32769, 32769, 2, {0x00,0x01} },
1472 { 65536, 32767, 32767, 3, {0x01,0x00,0x00} },
1473 { 65537, 32768, 32768, 3, {0x01,0x00,0x01} },
1474 { 16777216, 8388608, 8388608, 3, {0x00,0x00,0x00} },
1475 { 16777217, 8388609, 8388609, 3, {0x00,0x00,0x01} },
1476 { 16777216, 8388607, 8388607, 4, {0x01,0x00,0x00,0x00} },
1477 { 16777217, 8388608, 8388608, 4, {0x01,0x00,0x00,0x01} },
1478 { 4294967296, 2147483648, 2147483648, 4, {0x00,0x00,0x00,0x00} },
1479 { 4294967297, 2147483648, 2147483648, 4, {0x00,0x00,0x00,0x01} },
1482 static int test_wire_pkt_hdr_pn(int tidx)
1485 const struct pn_test *t = &pn_tests[tidx];
1486 unsigned char buf[4];
1490 pn_len = ossl_quic_wire_determine_pn_len(t->pn, t->tx_largest_acked);
1491 if (!TEST_int_eq(pn_len, (int)t->expected_len))
1494 if (!TEST_true(ossl_quic_wire_encode_pkt_hdr_pn(t->pn, buf, pn_len)))
1497 if (!TEST_mem_eq(t->expected_bytes, t->expected_len, buf, pn_len))
1500 if (!TEST_true(ossl_quic_wire_decode_pkt_hdr_pn(buf, pn_len,
1501 t->rx_largest_pn, &res_pn)))
1504 if (!TEST_uint64_t_eq(res_pn, t->pn))
1512 /* RFC 9001 s. A.4 */
1513 static const QUIC_CONN_ID retry_orig_dcid = {
1514 8, { 0x83, 0x94, 0xc8, 0xf0, 0x3e, 0x51, 0x57, 0x08 }
1517 static const unsigned char retry_encoded[] = {
1518 0xff, /* Long Header, Retry */
1519 0x00, 0x00, 0x00, 0x01, /* Version 1 */
1521 0x08, 0xf0, 0x67, 0xa5, 0x50, 0x2a, 0x42, 0x62, 0xb5, /* SCID */
1524 0x74, 0x6f, 0x6b, 0x65, 0x6e,
1526 /* Retry Integrity Tag */
1527 0x04, 0xa2, 0x65, 0xba, 0x2e, 0xff, 0x4d, 0x82, 0x90, 0x58, 0xfb, 0x3f, 0x0f,
1531 static int test_wire_retry_integrity_tag(void)
1535 QUIC_PKT_HDR hdr = {0};
1536 unsigned char got_tag[QUIC_RETRY_INTEGRITY_TAG_LEN] = {0};
1538 if (!TEST_true(PACKET_buf_init(&pkt, retry_encoded, sizeof(retry_encoded))))
1541 if (!TEST_true(ossl_quic_wire_decode_pkt_hdr(&pkt, 0, 0, 0, &hdr, NULL)))
1544 if (!TEST_int_eq(hdr.type, QUIC_PKT_TYPE_RETRY))
1547 if (!TEST_true(ossl_quic_calculate_retry_integrity_tag(NULL, NULL, &hdr,
1552 if (!TEST_mem_eq(got_tag, sizeof(got_tag),
1553 retry_encoded + sizeof(retry_encoded)
1554 - QUIC_RETRY_INTEGRITY_TAG_LEN,
1555 QUIC_RETRY_INTEGRITY_TAG_LEN))
1558 if (!TEST_true(ossl_quic_validate_retry_integrity_tag(NULL, NULL, &hdr,
1567 /* is_minimal=0 test */
1568 static const unsigned char non_minimal_1[] = {
1572 static const unsigned char non_minimal_2[] = {
1576 static const unsigned char non_minimal_3[] = {
1577 0x80, 0x00, 0x00, 0x00,
1580 static const unsigned char non_minimal_4[] = {
1581 0x80, 0x00, 0x3F, 0xFF,
1584 static const unsigned char non_minimal_5[] = {
1585 0xC0, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
1588 static const unsigned char non_minimal_6[] = {
1589 0xC0, 0x00, 0x00, 0x00, 0x3F, 0xFF, 0xFF, 0xFF
1592 static const unsigned char *const non_minimal[] = {
1601 static const size_t non_minimal_len[] = {
1602 OSSL_NELEM(non_minimal_1),
1603 OSSL_NELEM(non_minimal_2),
1604 OSSL_NELEM(non_minimal_3),
1605 OSSL_NELEM(non_minimal_4),
1606 OSSL_NELEM(non_minimal_5),
1607 OSSL_NELEM(non_minimal_6),
1610 static int test_wire_minimal(int idx)
1614 uint64_t frame_type;
1617 if (!TEST_true(PACKET_buf_init(&pkt, non_minimal[idx],
1618 non_minimal_len[idx])))
1621 if (!TEST_true(ossl_quic_wire_peek_frame_header(&pkt, &frame_type,
1625 if (!TEST_false(is_minimal))
1633 int setup_tests(void)
1635 ADD_ALL_TESTS(test_wire_encode, OSSL_NELEM(encode_cases));
1636 ADD_ALL_TESTS(test_wire_ack, OSSL_NELEM(ack_cases));
1637 ADD_ALL_TESTS(test_wire_pkt_hdr_pn, OSSL_NELEM(pn_tests));
1638 ADD_TEST(test_wire_retry_integrity_tag);
1639 ADD_ALL_TESTS(test_wire_minimal, OSSL_NELEM(non_minimal_len));