1 /*
2 * Copyright 2023-2024 The OpenSSL Project Authors. All Rights Reserved.
3 *
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
8 */
9 #include <stdio.h>
10 #include <openssl/ssl.h>
11 #include <openssl/quic.h>
12 #include <openssl/bio.h>
13 #include "internal/common.h"
14 #include "internal/sockets.h"
15 #include "internal/time.h"
16 #include "testutil.h"
17
18 static const char msg1[] = "GET LICENSE.txt\r\n";
19 static char msg2[16000];
20
21 #define DST_PORT 4433
22 #define DST_ADDR 0x7f000001UL
23
is_want(SSL * s,int ret)24 static int is_want(SSL *s, int ret)
25 {
26 int ec = SSL_get_error(s, ret);
27
28 return ec == SSL_ERROR_WANT_READ || ec == SSL_ERROR_WANT_WRITE;
29 }
30
test_quic_client_ex(int fd_arg)31 static int test_quic_client_ex(int fd_arg)
32 {
33 int testresult = 0, ret;
34 int c_fd;
35 BIO *c_net_bio = NULL, *c_net_bio_own = NULL;
36 BIO_ADDR *s_addr_ = NULL;
37 struct in_addr ina = {0};
38 SSL_CTX *c_ctx = NULL;
39 SSL *c_ssl = NULL;
40 short port = DST_PORT;
41 int c_connected = 0, c_write_done = 0, c_shutdown = 0;
42 size_t l = 0, c_total_read = 0;
43 OSSL_TIME start_time;
44 unsigned char alpn[] = { 8, 'h', 't', 't', 'p', '/', '0', '.', '9' };
45
46
47 if (fd_arg == INVALID_SOCKET) {
48 /* Setup test client. */
49 c_fd = BIO_socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP, 0);
50 if (!TEST_int_ne(c_fd, INVALID_SOCKET))
51 goto err;
52
53 if (!TEST_true(BIO_socket_nbio(c_fd, 1)))
54 goto err;
55
56 if (!TEST_ptr(s_addr_ = BIO_ADDR_new()))
57 goto err;
58
59 ina.s_addr = htonl(DST_ADDR);
60 if (!TEST_true(BIO_ADDR_rawmake(s_addr_, AF_INET, &ina, sizeof(ina),
61 htons(port))))
62 goto err;
63 } else {
64 c_fd = fd_arg;
65 }
66
67 if (!TEST_ptr(c_net_bio = c_net_bio_own = BIO_new_dgram(c_fd, 0)))
68 goto err;
69
70 /* connected socket does not need to set peer */
71 if (s_addr_ != NULL && !BIO_dgram_set_peer(c_net_bio, s_addr_))
72 goto err;
73
74 if (!TEST_ptr(c_ctx = SSL_CTX_new(OSSL_QUIC_client_method())))
75 goto err;
76
77 if (!TEST_ptr(c_ssl = SSL_new(c_ctx)))
78 goto err;
79
80 /* 0 is a success for SSL_set_alpn_protos() */
81 if (!TEST_false(SSL_set_alpn_protos(c_ssl, alpn, sizeof(alpn))))
82 goto err;
83
84 /* Takes ownership of our reference to the BIO. */
85 SSL_set0_rbio(c_ssl, c_net_bio);
86
87 /* Get another reference to be transferred in the SSL_set0_wbio call. */
88 if (!TEST_true(BIO_up_ref(c_net_bio))) {
89 c_net_bio_own = NULL; /* SSL_free will free the first reference. */
90 goto err;
91 }
92
93 SSL_set0_wbio(c_ssl, c_net_bio);
94 c_net_bio_own = NULL;
95
96 if (!TEST_true(SSL_set_blocking_mode(c_ssl, 0)))
97 goto err;
98
99 start_time = ossl_time_now();
100
101 for (;;) {
102 if (ossl_time_compare(ossl_time_subtract(ossl_time_now(), start_time),
103 ossl_ms2time(10000)) >= 0) {
104 TEST_error("timeout while attempting QUIC client test");
105 goto err;
106 }
107
108 if (!c_connected) {
109 ret = SSL_connect(c_ssl);
110 if (!TEST_true(ret == 1 || is_want(c_ssl, ret)))
111 goto err;
112
113 if (ret == 1) {
114 c_connected = 1;
115 TEST_info("Connected!");
116 }
117 }
118
119 if (c_connected && !c_write_done) {
120 if (!TEST_int_eq(SSL_write(c_ssl, msg1, sizeof(msg1) - 1),
121 (int)sizeof(msg1) - 1))
122 goto err;
123
124 if (!TEST_true(SSL_stream_conclude(c_ssl, 0)))
125 goto err;
126
127 c_write_done = 1;
128 }
129
130 if (c_write_done && !c_shutdown && c_total_read < sizeof(msg2) - 1) {
131 ret = SSL_read_ex(c_ssl, msg2 + c_total_read,
132 sizeof(msg2) - 1 - c_total_read, &l);
133 if (ret != 1) {
134 if (SSL_get_error(c_ssl, ret) == SSL_ERROR_ZERO_RETURN) {
135 c_shutdown = 1;
136 TEST_info("Message:\n%s\n", msg2);
137 } else if (!TEST_true(is_want(c_ssl, ret))) {
138 goto err;
139 }
140 } else {
141 c_total_read += l;
142
143 if (!TEST_size_t_lt(c_total_read, sizeof(msg2) - 1))
144 goto err;
145 }
146 }
147
148 if (c_shutdown) {
149 ret = SSL_shutdown(c_ssl);
150 if (ret == 1)
151 break;
152 }
153
154 /*
155 * This is inefficient because we spin until things work without
156 * blocking but this is just a test.
157 */
158 OSSL_sleep(0);
159 SSL_handle_events(c_ssl);
160 }
161
162 testresult = 1;
163 err:
164 SSL_free(c_ssl);
165 SSL_CTX_free(c_ctx);
166 BIO_ADDR_free(s_addr_);
167 BIO_free(c_net_bio_own);
168 if (fd_arg == INVALID_SOCKET && c_fd != INVALID_SOCKET)
169 BIO_closesocket(c_fd);
170 return testresult;
171 }
172
test_quic_client(void)173 static int test_quic_client(void)
174 {
175 return (test_quic_client_ex(INVALID_SOCKET));
176 }
177
test_quic_client_connect_first(void)178 static int test_quic_client_connect_first(void)
179 {
180 struct sockaddr_in sin = {0};
181 int c_fd;
182 int rv;
183
184 #ifdef SA_LEN
185 sin.sin_len = sizeof(struct sockaddr_in);
186 #endif
187 sin.sin_family = AF_INET;
188 sin.sin_port = htons(DST_PORT);
189 sin.sin_addr.s_addr = htonl(DST_ADDR);
190
191 c_fd = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
192 if (!TEST_int_ne(c_fd, INVALID_SOCKET))
193 goto err;
194
195 if (!TEST_int_eq(connect(c_fd, (const struct sockaddr *)&sin, sizeof(sin)), 0))
196 goto err;
197
198 if (!TEST_true(BIO_socket_nbio(c_fd, 1)))
199 goto err;
200
201 rv = test_quic_client_ex(c_fd);
202
203 close(c_fd);
204
205 return (rv);
206
207 err:
208 if (c_fd != INVALID_SOCKET)
209 close(c_fd);
210 return (0);
211 }
212
213 OPT_TEST_DECLARE_USAGE("certfile privkeyfile\n")
214
setup_tests(void)215 int setup_tests(void)
216 {
217 if (!test_skip_common_options()) {
218 TEST_error("Error parsing test options\n");
219 return 0;
220 }
221
222 ADD_TEST(test_quic_client);
223 ADD_TEST(test_quic_client_connect_first);
224
225 return 1;
226 }
227