mirror of
https://github.com/openssl/openssl.git
synced 2025-04-18 20:40:45 +08:00
Check SSL_get_app_data() from QUIC cb in a failure situation
Ensure SSL_get_app_data() works even in a failure situation from SSL_free() Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/27091) (cherry picked from commit f2488a567ba3376c7d2e2cb4567a20111c6df23b)
This commit is contained in:
parent
948c776ba7
commit
a9b87830c9
@ -12588,6 +12588,7 @@ struct quic_tls_test_data {
|
||||
size_t params_len;
|
||||
int alert;
|
||||
int err;
|
||||
int forcefail;
|
||||
};
|
||||
|
||||
static int clientquicdata = 0xff, serverquicdata = 0xfe;
|
||||
@ -12600,7 +12601,7 @@ static int check_app_data(SSL *s)
|
||||
data = (int *)SSL_get_app_data(s);
|
||||
comparedata = SSL_is_server(s) ? &serverquicdata : &clientquicdata;
|
||||
|
||||
if (comparedata != data)
|
||||
if (!TEST_true(comparedata == data))
|
||||
return 0;
|
||||
|
||||
return 1;
|
||||
@ -12658,6 +12659,13 @@ static int crypto_release_rcd_cb(SSL *s, size_t bytes_read, void *arg)
|
||||
return 0;
|
||||
}
|
||||
|
||||
/* See if we need to force a failure in this callback */
|
||||
if (data->forcefail) {
|
||||
data->forcefail = 0;
|
||||
data->err = 1;
|
||||
return 0;
|
||||
}
|
||||
|
||||
if (!TEST_size_t_eq(bytes_read, data->rcd_data_len[data->renc_level])
|
||||
|| !TEST_size_t_gt(bytes_read, 0)) {
|
||||
data->err = 1;
|
||||
@ -12745,8 +12753,10 @@ static int alert_cb(SSL *s, unsigned char alert_code, void *arg)
|
||||
|
||||
/*
|
||||
* Test the QUIC TLS API
|
||||
* Test 0: Normal run
|
||||
* Test 1: Force a failure
|
||||
*/
|
||||
static int test_quic_tls(void)
|
||||
static int test_quic_tls(int idx)
|
||||
{
|
||||
SSL_CTX *sctx = NULL, *cctx = NULL;
|
||||
SSL *serverssl = NULL, *clientssl = NULL;
|
||||
@ -12777,6 +12787,8 @@ static int test_quic_tls(void)
|
||||
memset(&cdata, 0, sizeof(cdata));
|
||||
sdata.peer = &cdata;
|
||||
cdata.peer = &sdata;
|
||||
if (idx == 1)
|
||||
sdata.forcefail = 1;
|
||||
|
||||
if (!TEST_true(create_ssl_ctx_pair(libctx, TLS_server_method(),
|
||||
TLS_client_method(), TLS1_3_VERSION, 0,
|
||||
@ -12799,8 +12811,17 @@ static int test_quic_tls(void)
|
||||
sizeof(sparams))))
|
||||
goto end;
|
||||
|
||||
if (!TEST_true(create_ssl_connection(serverssl, clientssl, SSL_ERROR_NONE)))
|
||||
if (idx == 0) {
|
||||
if (!TEST_true(create_ssl_connection(serverssl, clientssl, SSL_ERROR_NONE)))
|
||||
goto end;
|
||||
} else {
|
||||
/* We expect this connection to fail */
|
||||
if (!TEST_false(create_ssl_connection(serverssl, clientssl, SSL_ERROR_NONE)))
|
||||
goto end;
|
||||
testresult = 1;
|
||||
sdata.err = 0;
|
||||
goto end;
|
||||
}
|
||||
|
||||
/* Check no problems during the handshake */
|
||||
if (!TEST_false(sdata.alert)
|
||||
@ -12838,6 +12859,10 @@ static int test_quic_tls(void)
|
||||
SSL_CTX_free(sctx);
|
||||
SSL_CTX_free(cctx);
|
||||
|
||||
/* Check that we didn't suddenly hit an unexpected failure during cleanup */
|
||||
if (!TEST_false(sdata.err) || !TEST_false(cdata.err))
|
||||
testresult = 0;
|
||||
|
||||
return testresult;
|
||||
}
|
||||
|
||||
@ -13319,7 +13344,7 @@ int setup_tests(void)
|
||||
#endif
|
||||
ADD_ALL_TESTS(test_alpn, 4);
|
||||
#if !defined(OSSL_NO_USABLE_TLS1_3)
|
||||
ADD_TEST(test_quic_tls);
|
||||
ADD_ALL_TESTS(test_quic_tls, 2);
|
||||
ADD_TEST(test_quic_tls_early_data);
|
||||
#endif
|
||||
return 1;
|
||||
|
Loading…
x
Reference in New Issue
Block a user