2 * Copyright 2022 The OpenSSL Project Authors. All Rights Reserved.
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
9 #include <openssl/ssl.h>
10 #include <openssl/quic.h>
11 #include <openssl/bio.h>
12 #include "internal/common.h"
13 #include "internal/sockets.h"
14 #include "internal/quic_tserver.h"
15 #include "internal/quic_ssl.h"
16 #include "internal/time.h"
19 static const char msg1[] = "The quick brown fox jumped over the lazy dogs.";
20 static char msg2[1024], msg3[1024];
21 static OSSL_TIME fake_time;
22 static CRYPTO_RWLOCK *fake_time_lock;
24 static const char *certfile, *keyfile;
26 static int is_want(SSL *s, int ret)
28 int ec = SSL_get_error(s, ret);
30 return ec == SSL_ERROR_WANT_READ || ec == SSL_ERROR_WANT_WRITE;
33 static unsigned char scratch_buf[2048];
35 static OSSL_TIME fake_now(void *arg)
39 if (!CRYPTO_THREAD_read_lock(fake_time_lock))
40 return ossl_time_zero();
44 CRYPTO_THREAD_unlock(fake_time_lock);
48 static OSSL_TIME real_now(void *arg)
50 return ossl_time_now();
53 static int do_test(int use_thread_assist, int use_fake_time, int use_inject)
55 int testresult = 0, ret;
56 int s_fd = -1, c_fd = -1;
57 BIO *s_net_bio = NULL, *s_net_bio_own = NULL;
58 BIO *c_net_bio = NULL, *c_net_bio_own = NULL;
59 BIO *c_pair_own = NULL, *s_pair_own = NULL;
60 QUIC_TSERVER_ARGS tserver_args = {0};
61 QUIC_TSERVER *tserver = NULL;
62 BIO_ADDR *s_addr_ = NULL;
63 struct in_addr ina = {0};
64 union BIO_sock_info_u s_info = {0};
65 SSL_CTX *c_ctx = NULL;
68 int c_connected = 0, c_write_done = 0, c_begin_read = 0, s_read_done = 0;
69 int c_wait_eos = 0, c_done_eos = 0;
70 int c_start_idle_test = 0, c_done_idle_test = 0;
71 size_t l = 0, s_total_read = 0, s_total_written = 0, c_total_read = 0;
72 size_t idle_units_done = 0;
73 int s_begin_write = 0;
75 unsigned char alpn[] = { 8, 'o', 's', 's', 'l', 't', 'e', 's', 't' };
76 OSSL_TIME (*now_cb)(void *arg) = use_fake_time ? fake_now : real_now;
77 size_t limit_ms = 1000;
79 ina.s_addr = htonl(0x7f000001UL);
81 /* Setup test server. */
82 s_fd = BIO_socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP, 0);
83 if (!TEST_int_ge(s_fd, 0))
86 if (!TEST_true(BIO_socket_nbio(s_fd, 1)))
89 if (!TEST_ptr(s_addr_ = BIO_ADDR_new()))
92 if (!TEST_true(BIO_ADDR_rawmake(s_addr_, AF_INET, &ina, sizeof(ina),
96 if (!TEST_true(BIO_bind(s_fd, s_addr_, 0)))
99 s_info.addr = s_addr_;
100 if (!TEST_true(BIO_sock_info(s_fd, BIO_SOCK_INFO_ADDRESS, &s_info)))
103 if (!TEST_int_gt(BIO_ADDR_rawport(s_addr_), 0))
106 if (!TEST_ptr(s_net_bio = s_net_bio_own = BIO_new_dgram(s_fd, 0)))
109 if (!BIO_up_ref(s_net_bio))
112 fake_time = ossl_ms2time(1000);
114 tserver_args.net_rbio = s_net_bio;
115 tserver_args.net_wbio = s_net_bio;
117 tserver_args.now_cb = fake_now;
119 if (!TEST_ptr(tserver = ossl_quic_tserver_new(&tserver_args, certfile,
125 s_net_bio_own = NULL;
129 * In inject mode we create a dgram pair to feed to the QUIC client on
130 * the read side. We don't feed anything to this, it is just a
131 * placeholder to give the client something which never returns any
134 if (!TEST_true(BIO_new_bio_dgram_pair(&c_pair_own, 5000,
139 /* Setup test client. */
140 c_fd = BIO_socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP, 0);
141 if (!TEST_int_ge(c_fd, 0))
144 if (!TEST_true(BIO_socket_nbio(c_fd, 1)))
147 if (!TEST_ptr(c_net_bio = c_net_bio_own = BIO_new_dgram(c_fd, 0)))
150 if (!BIO_dgram_set_peer(c_net_bio, s_addr_))
153 if (!TEST_ptr(c_ctx = SSL_CTX_new(use_thread_assist
154 ? OSSL_QUIC_client_thread_method()
155 : OSSL_QUIC_client_method())))
158 if (!TEST_ptr(c_ssl = SSL_new(c_ctx)))
162 ossl_quic_conn_set_override_now_cb(c_ssl, fake_now, NULL);
164 /* 0 is a success for SSL_set_alpn_protos() */
165 if (!TEST_false(SSL_set_alpn_protos(c_ssl, alpn, sizeof(alpn))))
168 /* Takes ownership of our reference to the BIO. */
170 SSL_set0_rbio(c_ssl, c_pair_own);
173 SSL_set0_rbio(c_ssl, c_net_bio);
175 /* Get another reference to be transferred in the SSL_set0_wbio call. */
176 if (!TEST_true(BIO_up_ref(c_net_bio))) {
177 c_net_bio_own = NULL; /* SSL_free will free the first reference. */
182 SSL_set0_wbio(c_ssl, c_net_bio);
183 c_net_bio_own = NULL;
185 if (!TEST_true(SSL_set_blocking_mode(c_ssl, 0)))
188 start_time = now_cb(NULL);
191 if (ossl_time_compare(ossl_time_subtract(now_cb(NULL), start_time),
192 ossl_ms2time(limit_ms)) >= 0) {
193 TEST_error("timeout while attempting QUIC server test");
197 if (!c_start_idle_test) {
198 ret = SSL_connect(c_ssl);
199 if (!TEST_true(ret == 1 || is_want(c_ssl, ret)))
206 if (c_connected && !c_write_done) {
207 if (!TEST_int_eq(SSL_write(c_ssl, msg1, sizeof(msg1) - 1),
208 (int)sizeof(msg1) - 1))
211 if (!TEST_true(SSL_stream_conclude(c_ssl, 0)))
217 if (c_connected && c_write_done && !s_read_done) {
218 if (!ossl_quic_tserver_read(tserver,
219 (unsigned char *)msg2 + s_total_read,
220 sizeof(msg2) - s_total_read, &l)) {
221 if (!TEST_true(ossl_quic_tserver_has_read_ended(tserver)))
224 if (!TEST_mem_eq(msg1, sizeof(msg1) - 1, msg2, s_total_read))
230 if (!TEST_size_t_le(s_total_read, sizeof(msg1) - 1))
235 if (s_begin_write && s_total_written < sizeof(msg1) - 1) {
236 if (!TEST_true(ossl_quic_tserver_write(tserver,
237 (unsigned char *)msg2 + s_total_written,
238 sizeof(msg1) - 1 - s_total_written, &l)))
241 s_total_written += l;
243 if (s_total_written == sizeof(msg1) - 1) {
244 ossl_quic_tserver_conclude(tserver);
249 if (c_begin_read && c_total_read < sizeof(msg1) - 1) {
250 ret = SSL_read_ex(c_ssl, msg3 + c_total_read,
251 sizeof(msg1) - 1 - c_total_read, &l);
252 if (!TEST_true(ret == 1 || is_want(c_ssl, ret)))
257 if (c_total_read == sizeof(msg1) - 1) {
258 if (!TEST_mem_eq(msg1, sizeof(msg1) - 1,
266 if (c_wait_eos && !c_done_eos) {
269 ret = SSL_read_ex(c_ssl, &c, sizeof(c), &l);
270 if (!TEST_false(ret))
274 * Allow the implementation to take as long as it wants to finally
275 * notice EOS. Account for varied timings in OS networking stacks.
277 if (SSL_get_error(c_ssl, ret) != SSL_ERROR_WANT_READ) {
278 if (!TEST_int_eq(SSL_get_error(c_ssl, ret),
279 SSL_ERROR_ZERO_RETURN))
283 if (use_thread_assist && use_fake_time) {
284 if (!TEST_true(ossl_quic_tserver_is_connected(tserver)))
286 c_start_idle_test = 1;
287 limit_ms = 120000; /* extend time limit */
295 if (c_start_idle_test && !c_done_idle_test) {
296 /* This is more than our default idle timeout of 30s. */
297 if (idle_units_done < 600) {
298 if (!TEST_true(CRYPTO_THREAD_write_lock(fake_time_lock)))
300 fake_time = ossl_time_add(fake_time, ossl_ms2time(100));
301 CRYPTO_THREAD_unlock(fake_time_lock);
304 ossl_quic_conn_force_assist_thread_wake(c_ssl);
305 OSSL_sleep(1); /* Ensure CPU scheduling for test purposes */
307 c_done_idle_test = 1;
311 if (c_done_idle_test) {
313 * If we have finished the fake idling duration, the connection
314 * should still be healthy in TA mode.
316 if (!TEST_true(ossl_quic_tserver_is_connected(tserver)))
324 * This is inefficient because we spin until things work without
325 * blocking but this is just a test.
327 if (!c_start_idle_test || c_done_idle_test) {
328 /* Inhibit manual ticking during idle test to test TA mode. */
332 ossl_quic_tserver_tick(tserver);
336 size_t msgs_processed = 0;
340 * Manually spoonfeed received datagrams from the real BIO_dgram
341 * into QUIC via the injection interface, thereby testing the
342 * injection interface.
344 rmsg.data = scratch_buf;
345 rmsg.data_len = sizeof(scratch_buf);
347 if (!BIO_recvmmsg(c_net_bio, &rmsg, sizeof(rmsg), 1, 0, &msgs_processed)
348 || msgs_processed == 0 || rmsg.data_len == 0)
351 if (!TEST_true(SSL_inject_net_dgram(c_ssl, rmsg.data, rmsg.data_len,
362 ossl_quic_tserver_free(tserver);
363 BIO_ADDR_free(s_addr_);
364 BIO_free(s_net_bio_own);
365 BIO_free(c_net_bio_own);
366 BIO_free(c_pair_own);
367 BIO_free(s_pair_own);
369 BIO_closesocket(s_fd);
371 BIO_closesocket(c_fd);
375 static int test_tserver(int idx)
377 int use_thread_assist, use_inject;
379 use_thread_assist = idx % 2;
382 use_inject = idx % 2;
384 return test_tserver_actual(use_thread_assist, use_inject);
387 static int test_tserver_simple(void)
389 return do_test(/*thread_assisted=*/0, /*fake_time=*/0, /*use_inject=*/0);
392 static int test_tserver_thread(void)
394 return do_test(/*thread_assisted=*/1, /*fake_time=*/0, /*use_inject=*/0);
397 static int test_tserver_thread_fake_time(void)
399 return do_test(/*thread_assisted=*/1, /*fake_time=*/1, /*use_inject=*/0);
402 OPT_TEST_DECLARE_USAGE("certfile privkeyfile\n")
404 int setup_tests(void)
406 if (!test_skip_common_options()) {
407 TEST_error("Error parsing test options\n");
411 if (!TEST_ptr(certfile = test_get_argument(0))
412 || !TEST_ptr(keyfile = test_get_argument(1)))
415 if ((fake_time_lock = CRYPTO_THREAD_lock_new()) == NULL)
418 ADD_TEST(test_tserver_simple);
419 ADD_TEST(test_tserver_thread);
420 ADD_TEST(test_tserver_thread_fake_time);