mirror of
https://github.com/openssl/openssl.git
synced 2024-12-03 05:41:46 +08:00
21d2041da0
If either endpoint issues a PING frame while we are introducing noise into the communication then there is a danger that the connection itself will fail. We detect the PING and then back off on generating noise for a short while. It should be sufficient to just ensure that the next datagram does not get dropped for each endpoint. Fixes #22199 Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22243)
1608 lines
48 KiB
C
1608 lines
48 KiB
C
/*
|
|
* Copyright 2022-2023 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
* in the file LICENSE in the source distribution or at
|
|
* https://www.openssl.org/source/license.html
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
|
|
#include <openssl/opensslconf.h>
|
|
#include <openssl/quic.h>
|
|
#include <openssl/rand.h>
|
|
|
|
#include "helpers/ssltestlib.h"
|
|
#include "helpers/quictestlib.h"
|
|
#include "testutil.h"
|
|
#include "testutil/output.h"
|
|
#include "../ssl/ssl_local.h"
|
|
|
|
static OSSL_LIB_CTX *libctx = NULL;
|
|
static OSSL_PROVIDER *defctxnull = NULL;
|
|
static char *certsdir = NULL;
|
|
static char *cert = NULL;
|
|
static char *ccert = NULL;
|
|
static char *cauthca = NULL;
|
|
static char *privkey = NULL;
|
|
static char *cprivkey = NULL;
|
|
static char *datadir = NULL;
|
|
|
|
static int is_fips = 0;
|
|
|
|
/* The ssltrace test assumes some options are switched on/off */
|
|
#if !defined(OPENSSL_NO_SSL_TRACE) \
|
|
&& defined(OPENSSL_NO_BROTLI) && defined(OPENSSL_NO_ZSTD) \
|
|
&& !defined(OPENSSL_NO_ECX) && !defined(OPENSSL_NO_DH)
|
|
# define DO_SSL_TRACE_TEST
|
|
#endif
|
|
|
|
/*
|
|
* Test that we read what we've written.
|
|
* Test 0: Non-blocking
|
|
* Test 1: Blocking
|
|
* Test 2: Blocking, introduce socket error, test error handling.
|
|
*/
|
|
static int test_quic_write_read(int idx)
|
|
{
|
|
SSL_CTX *cctx = SSL_CTX_new_ex(libctx, NULL, OSSL_QUIC_client_method());
|
|
SSL_CTX *sctx = NULL;
|
|
SSL *clientquic = NULL;
|
|
QUIC_TSERVER *qtserv = NULL;
|
|
int j, k, ret = 0;
|
|
unsigned char buf[20];
|
|
static char *msg = "A test message";
|
|
size_t msglen = strlen(msg);
|
|
size_t numbytes = 0;
|
|
int ssock = 0, csock = 0;
|
|
uint64_t sid = UINT64_MAX;
|
|
SSL_SESSION *sess = NULL;
|
|
|
|
if (idx >= 1 && !qtest_supports_blocking())
|
|
return TEST_skip("Blocking tests not supported in this build");
|
|
|
|
for (k = 0; k < 2; k++) {
|
|
if (!TEST_ptr(cctx)
|
|
|| !TEST_true(qtest_create_quic_objects(libctx, cctx, sctx,
|
|
cert, privkey,
|
|
idx >= 1
|
|
? QTEST_FLAG_BLOCK
|
|
: 0,
|
|
&qtserv, &clientquic,
|
|
NULL, NULL))
|
|
|| !TEST_true(SSL_set_tlsext_host_name(clientquic, "localhost")))
|
|
goto end;
|
|
|
|
if (sess != NULL && !TEST_true(SSL_set_session(clientquic, sess)))
|
|
goto end;
|
|
|
|
if (!TEST_true(qtest_create_quic_connection(qtserv, clientquic)))
|
|
goto end;
|
|
|
|
if (idx >= 1) {
|
|
if (!TEST_true(BIO_get_fd(ossl_quic_tserver_get0_rbio(qtserv),
|
|
&ssock)))
|
|
goto end;
|
|
if (!TEST_int_gt(csock = SSL_get_rfd(clientquic), 0))
|
|
goto end;
|
|
}
|
|
|
|
sid = 0; /* client-initiated bidirectional stream */
|
|
|
|
for (j = 0; j < 2; j++) {
|
|
/* Check that sending and receiving app data is ok */
|
|
if (!TEST_true(SSL_write_ex(clientquic, msg, msglen, &numbytes))
|
|
|| !TEST_size_t_eq(numbytes, msglen))
|
|
goto end;
|
|
if (idx >= 1) {
|
|
do {
|
|
if (!TEST_true(wait_until_sock_readable(ssock)))
|
|
goto end;
|
|
|
|
ossl_quic_tserver_tick(qtserv);
|
|
|
|
if (!TEST_true(ossl_quic_tserver_read(qtserv, sid, buf,
|
|
sizeof(buf),
|
|
&numbytes)))
|
|
goto end;
|
|
} while (numbytes == 0);
|
|
|
|
if (!TEST_mem_eq(buf, numbytes, msg, msglen))
|
|
goto end;
|
|
}
|
|
|
|
if (idx >= 2 && j > 0)
|
|
/* Introduce permanent socket error */
|
|
BIO_closesocket(csock);
|
|
|
|
ossl_quic_tserver_tick(qtserv);
|
|
if (!TEST_true(ossl_quic_tserver_write(qtserv, sid,
|
|
(unsigned char *)msg,
|
|
msglen, &numbytes)))
|
|
goto end;
|
|
ossl_quic_tserver_tick(qtserv);
|
|
SSL_handle_events(clientquic);
|
|
|
|
if (idx >= 2 && j > 0) {
|
|
if (!TEST_false(SSL_read_ex(clientquic, buf, 1, &numbytes))
|
|
|| !TEST_int_eq(SSL_get_error(clientquic, 0),
|
|
SSL_ERROR_SYSCALL)
|
|
|| !TEST_false(SSL_write_ex(clientquic, msg, msglen,
|
|
&numbytes))
|
|
|| !TEST_int_eq(SSL_get_error(clientquic, 0),
|
|
SSL_ERROR_SYSCALL))
|
|
goto end;
|
|
break;
|
|
}
|
|
|
|
/*
|
|
* In blocking mode the SSL_read_ex call will block until the socket
|
|
* is readable and has our data. In non-blocking mode we're doing
|
|
* everything in memory, so it should be immediately available
|
|
*/
|
|
if (!TEST_true(SSL_read_ex(clientquic, buf, 1, &numbytes))
|
|
|| !TEST_size_t_eq(numbytes, 1)
|
|
|| !TEST_true(SSL_has_pending(clientquic))
|
|
|| !TEST_int_eq(SSL_pending(clientquic), msglen - 1)
|
|
|| !TEST_true(SSL_read_ex(clientquic, buf + 1,
|
|
sizeof(buf) - 1, &numbytes))
|
|
|| !TEST_mem_eq(buf, numbytes + 1, msg, msglen))
|
|
goto end;
|
|
}
|
|
|
|
if (sess == NULL) {
|
|
/* We didn't supply a session so we're not expecting resumption */
|
|
if (!TEST_false(SSL_session_reused(clientquic)))
|
|
goto end;
|
|
/* We should have a session ticket by now */
|
|
sess = SSL_get1_session(clientquic);
|
|
if (!TEST_ptr(sess))
|
|
goto end;
|
|
} else {
|
|
/* We supplied a session so we should have resumed */
|
|
if (!TEST_true(SSL_session_reused(clientquic)))
|
|
goto end;
|
|
}
|
|
|
|
if (!TEST_true(qtest_shutdown(qtserv, clientquic)))
|
|
goto end;
|
|
|
|
if (sctx == NULL) {
|
|
sctx = ossl_quic_tserver_get0_ssl_ctx(qtserv);
|
|
if (!TEST_true(SSL_CTX_up_ref(sctx))) {
|
|
sctx = NULL;
|
|
goto end;
|
|
}
|
|
}
|
|
ossl_quic_tserver_free(qtserv);
|
|
qtserv = NULL;
|
|
SSL_free(clientquic);
|
|
clientquic = NULL;
|
|
|
|
if (idx >= 2)
|
|
break;
|
|
}
|
|
|
|
ret = 1;
|
|
|
|
end:
|
|
SSL_SESSION_free(sess);
|
|
ossl_quic_tserver_free(qtserv);
|
|
SSL_free(clientquic);
|
|
SSL_CTX_free(cctx);
|
|
SSL_CTX_free(sctx);
|
|
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
* Test that sending FIN with no data to a client blocking in SSL_read_ex() will
|
|
* wake up the client.
|
|
*/
|
|
static int test_fin_only_blocking(void)
|
|
{
|
|
SSL_CTX *cctx = SSL_CTX_new_ex(libctx, NULL, OSSL_QUIC_client_method());
|
|
SSL_CTX *sctx = NULL;
|
|
SSL *clientquic = NULL;
|
|
QUIC_TSERVER *qtserv = NULL;
|
|
const char *msg = "Hello World";
|
|
uint64_t sid;
|
|
size_t numbytes;
|
|
unsigned char buf[32];
|
|
int ret = 0;
|
|
OSSL_TIME timer, timediff;
|
|
|
|
if (!qtest_supports_blocking())
|
|
return TEST_skip("Blocking tests not supported in this build");
|
|
|
|
if (!TEST_ptr(cctx)
|
|
|| !TEST_true(qtest_create_quic_objects(libctx, cctx, sctx,
|
|
cert, privkey,
|
|
QTEST_FLAG_BLOCK,
|
|
&qtserv, &clientquic,
|
|
NULL, NULL))
|
|
|| !TEST_true(SSL_set_tlsext_host_name(clientquic, "localhost")))
|
|
goto end;
|
|
|
|
if (!TEST_true(qtest_create_quic_connection(qtserv, clientquic)))
|
|
goto end;
|
|
|
|
if (!TEST_true(ossl_quic_tserver_stream_new(qtserv, 0, &sid))
|
|
|| !TEST_true(ossl_quic_tserver_write(qtserv, sid,
|
|
(unsigned char *)msg,
|
|
strlen(msg), &numbytes))
|
|
|| !TEST_size_t_eq(strlen(msg), numbytes))
|
|
goto end;
|
|
|
|
ossl_quic_tserver_tick(qtserv);
|
|
|
|
if (!TEST_true(SSL_read_ex(clientquic, buf, sizeof(buf), &numbytes))
|
|
|| !TEST_mem_eq(msg, strlen(msg), buf, numbytes))
|
|
|
|
|
|
goto end;
|
|
|
|
if (!TEST_true(ossl_quic_tserver_conclude(qtserv, sid)))
|
|
goto end;
|
|
|
|
timer = ossl_time_now();
|
|
if (!TEST_false(SSL_read_ex(clientquic, buf, sizeof(buf), &numbytes)))
|
|
goto end;
|
|
timediff = ossl_time_subtract(ossl_time_now(), timer);
|
|
|
|
if (!TEST_int_eq(SSL_get_error(clientquic, 0), SSL_ERROR_ZERO_RETURN)
|
|
/*
|
|
* We expect the SSL_read_ex to not have blocked so this should
|
|
* be very fast. 20ms should be plenty.
|
|
*/
|
|
|| !TEST_uint64_t_le(ossl_time2ms(timediff), 20))
|
|
goto end;
|
|
|
|
if (!TEST_true(qtest_shutdown(qtserv, clientquic)))
|
|
goto end;
|
|
|
|
ret = 1;
|
|
|
|
end:
|
|
ossl_quic_tserver_free(qtserv);
|
|
SSL_free(clientquic);
|
|
SSL_CTX_free(cctx);
|
|
SSL_CTX_free(sctx);
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* Test that a vanilla QUIC SSL object has the expected ciphersuites available */
|
|
static int test_ciphersuites(void)
|
|
{
|
|
SSL_CTX *ctx = SSL_CTX_new_ex(libctx, NULL, OSSL_QUIC_client_method());
|
|
SSL *ssl;
|
|
int testresult = 0;
|
|
const STACK_OF(SSL_CIPHER) *ciphers = NULL;
|
|
const SSL_CIPHER *cipher;
|
|
/* We expect this exact list of ciphersuites by default */
|
|
int cipherids[] = {
|
|
TLS1_3_CK_AES_256_GCM_SHA384,
|
|
#if !defined(OPENSSL_NO_CHACHA) && !defined(OPENSSL_NO_POLY1305)
|
|
TLS1_3_CK_CHACHA20_POLY1305_SHA256,
|
|
#endif
|
|
TLS1_3_CK_AES_128_GCM_SHA256
|
|
};
|
|
size_t i, j;
|
|
|
|
if (!TEST_ptr(ctx))
|
|
return 0;
|
|
|
|
ssl = SSL_new(ctx);
|
|
if (!TEST_ptr(ssl))
|
|
goto err;
|
|
|
|
ciphers = SSL_get_ciphers(ssl);
|
|
|
|
for (i = 0, j = 0; i < OSSL_NELEM(cipherids); i++) {
|
|
if (cipherids[i] == TLS1_3_CK_CHACHA20_POLY1305_SHA256 && is_fips)
|
|
continue;
|
|
cipher = sk_SSL_CIPHER_value(ciphers, j++);
|
|
if (!TEST_ptr(cipher))
|
|
goto err;
|
|
if (!TEST_uint_eq(SSL_CIPHER_get_id(cipher), cipherids[i]))
|
|
goto err;
|
|
}
|
|
|
|
/* We should have checked all the ciphers in the stack */
|
|
if (!TEST_int_eq(sk_SSL_CIPHER_num(ciphers), j))
|
|
goto err;
|
|
|
|
testresult = 1;
|
|
err:
|
|
SSL_free(ssl);
|
|
SSL_CTX_free(ctx);
|
|
|
|
return testresult;
|
|
}
|
|
|
|
static int test_cipher_find(void)
|
|
{
|
|
SSL_CTX *cctx = SSL_CTX_new_ex(libctx, NULL, OSSL_QUIC_client_method());
|
|
SSL *clientquic = NULL;
|
|
struct {
|
|
const unsigned char *cipherbytes;
|
|
int ok;
|
|
} testciphers[] = {
|
|
{ TLS13_AES_128_GCM_SHA256_BYTES, 1 },
|
|
{ TLS13_AES_256_GCM_SHA384_BYTES, 1 },
|
|
{ TLS13_CHACHA20_POLY1305_SHA256_BYTES, 1 },
|
|
{ TLS13_AES_128_CCM_SHA256_BYTES, 0 },
|
|
{ TLS13_AES_128_CCM_8_SHA256_BYTES, 0 }
|
|
};
|
|
size_t i;
|
|
int testresult = 0;
|
|
|
|
if (!TEST_ptr(cctx))
|
|
goto err;
|
|
|
|
clientquic = SSL_new(cctx);
|
|
if (!TEST_ptr(clientquic))
|
|
goto err;
|
|
|
|
for (i = 0; i < OSSL_NELEM(testciphers); i++)
|
|
if (testciphers[i].ok) {
|
|
if (!TEST_ptr(SSL_CIPHER_find(clientquic,
|
|
testciphers[i].cipherbytes)))
|
|
goto err;
|
|
} else {
|
|
if (!TEST_ptr_null(SSL_CIPHER_find(clientquic,
|
|
testciphers[i].cipherbytes)))
|
|
goto err;
|
|
}
|
|
|
|
testresult = 1;
|
|
err:
|
|
SSL_free(clientquic);
|
|
SSL_CTX_free(cctx);
|
|
|
|
return testresult;
|
|
}
|
|
|
|
/*
|
|
* Test that SSL_version, SSL_get_version, SSL_is_quic, SSL_is_tls and
|
|
* SSL_is_dtls return the expected results for a QUIC connection. Compare with
|
|
* test_version() in sslapitest.c which does the same thing for TLS/DTLS
|
|
* connections.
|
|
*/
|
|
static int test_version(void)
|
|
{
|
|
SSL_CTX *cctx = SSL_CTX_new_ex(libctx, NULL, OSSL_QUIC_client_method());
|
|
SSL *clientquic = NULL;
|
|
QUIC_TSERVER *qtserv = NULL;
|
|
int testresult = 0;
|
|
|
|
if (!TEST_ptr(cctx)
|
|
|| !TEST_true(qtest_create_quic_objects(libctx, cctx, NULL, cert,
|
|
privkey, 0, &qtserv,
|
|
&clientquic, NULL, NULL))
|
|
|| !TEST_true(qtest_create_quic_connection(qtserv, clientquic)))
|
|
goto err;
|
|
|
|
if (!TEST_int_eq(SSL_version(clientquic), OSSL_QUIC1_VERSION)
|
|
|| !TEST_str_eq(SSL_get_version(clientquic), "QUICv1"))
|
|
goto err;
|
|
|
|
if (!TEST_true(SSL_is_quic(clientquic))
|
|
|| !TEST_false(SSL_is_tls(clientquic))
|
|
|| !TEST_false(SSL_is_dtls(clientquic)))
|
|
goto err;
|
|
|
|
|
|
testresult = 1;
|
|
err:
|
|
ossl_quic_tserver_free(qtserv);
|
|
SSL_free(clientquic);
|
|
SSL_CTX_free(cctx);
|
|
|
|
return testresult;
|
|
}
|
|
|
|
#if defined(DO_SSL_TRACE_TEST)
|
|
static void strip_line_ends(char *str)
|
|
{
|
|
size_t i;
|
|
|
|
for (i = strlen(str);
|
|
i > 0 && (str[i - 1] == '\n' || str[i - 1] == '\r');
|
|
i--);
|
|
|
|
str[i] = '\0';
|
|
}
|
|
|
|
static int compare_with_file(BIO *membio)
|
|
{
|
|
BIO *file = NULL, *newfile = NULL;
|
|
char buf1[512], buf2[512];
|
|
char *reffile;
|
|
int ret = 0;
|
|
size_t i;
|
|
|
|
#ifdef OPENSSL_NO_ZLIB
|
|
reffile = test_mk_file_path(datadir, "ssltraceref.txt");
|
|
#else
|
|
reffile = test_mk_file_path(datadir, "ssltraceref-zlib.txt");
|
|
#endif
|
|
if (!TEST_ptr(reffile))
|
|
goto err;
|
|
|
|
file = BIO_new_file(reffile, "rb");
|
|
if (!TEST_ptr(file))
|
|
goto err;
|
|
|
|
newfile = BIO_new_file("ssltraceref-new.txt", "wb");
|
|
if (!TEST_ptr(newfile))
|
|
goto err;
|
|
|
|
while (BIO_gets(membio, buf2, sizeof(buf2)) > 0)
|
|
if (BIO_puts(newfile, buf2) <= 0) {
|
|
TEST_error("Failed writing new file data");
|
|
goto err;
|
|
}
|
|
|
|
if (!TEST_int_ge(BIO_seek(membio, 0), 0))
|
|
goto err;
|
|
|
|
while (BIO_gets(file, buf1, sizeof(buf1)) > 0) {
|
|
if (BIO_gets(membio, buf2, sizeof(buf2)) <= 0) {
|
|
TEST_error("Failed reading mem data");
|
|
goto err;
|
|
}
|
|
strip_line_ends(buf1);
|
|
strip_line_ends(buf2);
|
|
if (strlen(buf1) != strlen(buf2)) {
|
|
TEST_error("Actual and ref line data length mismatch");
|
|
TEST_info("%s", buf1);
|
|
TEST_info("%s", buf2);
|
|
goto err;
|
|
}
|
|
for (i = 0; i < strlen(buf1); i++) {
|
|
/* '?' is a wild card character in the reference text */
|
|
if (buf1[i] == '?')
|
|
buf2[i] = '?';
|
|
}
|
|
if (!TEST_str_eq(buf1, buf2))
|
|
goto err;
|
|
}
|
|
if (!TEST_true(BIO_eof(file))
|
|
|| !TEST_true(BIO_eof(membio)))
|
|
goto err;
|
|
|
|
ret = 1;
|
|
err:
|
|
OPENSSL_free(reffile);
|
|
BIO_free(file);
|
|
BIO_free(newfile);
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
* Tests that the SSL_trace() msg_callback works as expected with a QUIC
|
|
* connection. This also provides testing of the msg_callback at the same time.
|
|
*/
|
|
static int test_ssl_trace(void)
|
|
{
|
|
SSL_CTX *cctx = SSL_CTX_new_ex(libctx, NULL, OSSL_QUIC_client_method());
|
|
SSL *clientquic = NULL;
|
|
QUIC_TSERVER *qtserv = NULL;
|
|
int testresult = 0;
|
|
BIO *bio = BIO_new(BIO_s_mem());
|
|
|
|
/*
|
|
* Ensure we only configure ciphersuites that are available with both the
|
|
* default and fips providers to get the same output in both cases
|
|
*/
|
|
if (!TEST_true(SSL_CTX_set_ciphersuites(cctx, "TLS_AES_128_GCM_SHA256")))
|
|
goto err;
|
|
|
|
if (!TEST_ptr(cctx)
|
|
|| !TEST_ptr(bio)
|
|
|| !TEST_true(qtest_create_quic_objects(libctx, cctx, NULL, cert,
|
|
privkey,
|
|
QTEST_FLAG_FAKE_TIME,
|
|
&qtserv,
|
|
&clientquic, NULL, NULL)))
|
|
goto err;
|
|
|
|
SSL_set_msg_callback(clientquic, SSL_trace);
|
|
SSL_set_msg_callback_arg(clientquic, bio);
|
|
|
|
if (!TEST_true(qtest_create_quic_connection(qtserv, clientquic)))
|
|
goto err;
|
|
|
|
if (!TEST_true(compare_with_file(bio)))
|
|
goto err;
|
|
|
|
testresult = 1;
|
|
err:
|
|
ossl_quic_tserver_free(qtserv);
|
|
SSL_free(clientquic);
|
|
SSL_CTX_free(cctx);
|
|
BIO_free(bio);
|
|
|
|
return testresult;
|
|
}
|
|
#endif
|
|
|
|
static int ensure_valid_ciphers(const STACK_OF(SSL_CIPHER) *ciphers)
|
|
{
|
|
size_t i;
|
|
|
|
/* Ensure ciphersuite list is suitably subsetted. */
|
|
for (i = 0; i < (size_t)sk_SSL_CIPHER_num(ciphers); ++i) {
|
|
const SSL_CIPHER *cipher = sk_SSL_CIPHER_value(ciphers, i);
|
|
switch (SSL_CIPHER_get_id(cipher)) {
|
|
case TLS1_3_CK_AES_128_GCM_SHA256:
|
|
case TLS1_3_CK_AES_256_GCM_SHA384:
|
|
case TLS1_3_CK_CHACHA20_POLY1305_SHA256:
|
|
break;
|
|
default:
|
|
TEST_error("forbidden cipher: %s", SSL_CIPHER_get_name(cipher));
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
/*
|
|
* Test that handshake-layer APIs which shouldn't work don't work with QUIC.
|
|
*/
|
|
static int test_quic_forbidden_apis_ctx(void)
|
|
{
|
|
int testresult = 0;
|
|
SSL_CTX *ctx = NULL;
|
|
|
|
if (!TEST_ptr(ctx = SSL_CTX_new_ex(libctx, NULL, OSSL_QUIC_client_method())))
|
|
goto err;
|
|
|
|
#ifndef OPENSSL_NO_SRTP
|
|
/* This function returns 0 on success and 1 on error, and should fail. */
|
|
if (!TEST_true(SSL_CTX_set_tlsext_use_srtp(ctx, "SRTP_AEAD_AES_128_GCM")))
|
|
goto err;
|
|
#endif
|
|
|
|
/*
|
|
* List of ciphersuites we do and don't allow in QUIC.
|
|
*/
|
|
#define QUIC_CIPHERSUITES \
|
|
"TLS_AES_128_GCM_SHA256:" \
|
|
"TLS_AES_256_GCM_SHA384:" \
|
|
"TLS_CHACHA20_POLY1305_SHA256"
|
|
|
|
#define NON_QUIC_CIPHERSUITES \
|
|
"TLS_AES_128_CCM_SHA256:" \
|
|
"TLS_AES_256_CCM_SHA384:" \
|
|
"TLS_AES_128_CCM_8_SHA256"
|
|
|
|
/* Set TLSv1.3 ciphersuite list for the SSL_CTX. */
|
|
if (!TEST_true(SSL_CTX_set_ciphersuites(ctx,
|
|
QUIC_CIPHERSUITES ":"
|
|
NON_QUIC_CIPHERSUITES)))
|
|
goto err;
|
|
|
|
/*
|
|
* Forbidden ciphersuites should show up in SSL_CTX accessors, they are only
|
|
* filtered in SSL_get1_supported_ciphers, so we don't check for
|
|
* non-inclusion here.
|
|
*/
|
|
|
|
testresult = 1;
|
|
err:
|
|
SSL_CTX_free(ctx);
|
|
return testresult;
|
|
}
|
|
|
|
static int test_quic_forbidden_apis(void)
|
|
{
|
|
int testresult = 0;
|
|
SSL_CTX *ctx = NULL;
|
|
SSL *ssl = NULL;
|
|
STACK_OF(SSL_CIPHER) *ciphers = NULL;
|
|
|
|
if (!TEST_ptr(ctx = SSL_CTX_new_ex(libctx, NULL, OSSL_QUIC_client_method())))
|
|
goto err;
|
|
|
|
if (!TEST_ptr(ssl = SSL_new(ctx)))
|
|
goto err;
|
|
|
|
#ifndef OPENSSL_NO_SRTP
|
|
/* This function returns 0 on success and 1 on error, and should fail. */
|
|
if (!TEST_true(SSL_set_tlsext_use_srtp(ssl, "SRTP_AEAD_AES_128_GCM")))
|
|
goto err;
|
|
#endif
|
|
|
|
/* Set TLSv1.3 ciphersuite list for the SSL_CTX. */
|
|
if (!TEST_true(SSL_set_ciphersuites(ssl,
|
|
QUIC_CIPHERSUITES ":"
|
|
NON_QUIC_CIPHERSUITES)))
|
|
goto err;
|
|
|
|
/* Non-QUIC ciphersuites must not appear in supported ciphers list. */
|
|
if (!TEST_ptr(ciphers = SSL_get1_supported_ciphers(ssl))
|
|
|| !TEST_true(ensure_valid_ciphers(ciphers)))
|
|
goto err;
|
|
|
|
testresult = 1;
|
|
err:
|
|
sk_SSL_CIPHER_free(ciphers);
|
|
SSL_free(ssl);
|
|
SSL_CTX_free(ctx);
|
|
return testresult;
|
|
}
|
|
|
|
static int test_quic_forbidden_options(void)
|
|
{
|
|
int testresult = 0;
|
|
SSL_CTX *ctx = NULL;
|
|
SSL *ssl = NULL;
|
|
char buf[16];
|
|
size_t len;
|
|
|
|
if (!TEST_ptr(ctx = SSL_CTX_new_ex(libctx, NULL, OSSL_QUIC_client_method())))
|
|
goto err;
|
|
|
|
/* QUIC options restrictions do not affect SSL_CTX */
|
|
SSL_CTX_set_options(ctx, UINT64_MAX);
|
|
|
|
if (!TEST_uint64_t_eq(SSL_CTX_get_options(ctx), UINT64_MAX))
|
|
goto err;
|
|
|
|
/* Set options on CTX which should not be inherited (tested below). */
|
|
SSL_CTX_set_read_ahead(ctx, 1);
|
|
SSL_CTX_set_max_early_data(ctx, 1);
|
|
SSL_CTX_set_recv_max_early_data(ctx, 1);
|
|
SSL_CTX_set_quiet_shutdown(ctx, 1);
|
|
|
|
if (!TEST_ptr(ssl = SSL_new(ctx)))
|
|
goto err;
|
|
|
|
/* Only permitted options get transferred to SSL object */
|
|
if (!TEST_uint64_t_eq(SSL_get_options(ssl), OSSL_QUIC_PERMITTED_OPTIONS))
|
|
goto err;
|
|
|
|
/* Try again using SSL_set_options */
|
|
SSL_set_options(ssl, UINT64_MAX);
|
|
|
|
if (!TEST_uint64_t_eq(SSL_get_options(ssl), OSSL_QUIC_PERMITTED_OPTIONS))
|
|
goto err;
|
|
|
|
/* Clear everything */
|
|
SSL_clear_options(ssl, UINT64_MAX);
|
|
|
|
if (!TEST_uint64_t_eq(SSL_get_options(ssl), 0))
|
|
goto err;
|
|
|
|
/* Readahead */
|
|
if (!TEST_false(SSL_get_read_ahead(ssl)))
|
|
goto err;
|
|
|
|
SSL_set_read_ahead(ssl, 1);
|
|
if (!TEST_false(SSL_get_read_ahead(ssl)))
|
|
goto err;
|
|
|
|
/* Block padding */
|
|
if (!TEST_true(SSL_set_block_padding(ssl, 0))
|
|
|| !TEST_true(SSL_set_block_padding(ssl, 1))
|
|
|| !TEST_false(SSL_set_block_padding(ssl, 2)))
|
|
goto err;
|
|
|
|
/* Max fragment length */
|
|
if (!TEST_true(SSL_set_tlsext_max_fragment_length(ssl, TLSEXT_max_fragment_length_DISABLED))
|
|
|| !TEST_false(SSL_set_tlsext_max_fragment_length(ssl, TLSEXT_max_fragment_length_512)))
|
|
goto err;
|
|
|
|
/* Max early data */
|
|
if (!TEST_false(SSL_set_recv_max_early_data(ssl, 1))
|
|
|| !TEST_false(SSL_set_max_early_data(ssl, 1)))
|
|
goto err;
|
|
|
|
/* Read/Write */
|
|
if (!TEST_false(SSL_read_early_data(ssl, buf, sizeof(buf), &len))
|
|
|| !TEST_false(SSL_write_early_data(ssl, buf, sizeof(buf), &len)))
|
|
goto err;
|
|
|
|
/* Buffer Management */
|
|
if (!TEST_true(SSL_alloc_buffers(ssl))
|
|
|| !TEST_false(SSL_free_buffers(ssl)))
|
|
goto err;
|
|
|
|
/* Pipelining */
|
|
if (!TEST_false(SSL_set_max_send_fragment(ssl, 2))
|
|
|| !TEST_false(SSL_set_split_send_fragment(ssl, 2))
|
|
|| !TEST_false(SSL_set_max_pipelines(ssl, 2)))
|
|
goto err;
|
|
|
|
/* HRR */
|
|
if (!TEST_false(SSL_stateless(ssl)))
|
|
goto err;
|
|
|
|
/* Quiet Shutdown */
|
|
if (!TEST_false(SSL_get_quiet_shutdown(ssl)))
|
|
goto err;
|
|
|
|
/* No duplication */
|
|
if (!TEST_ptr_null(SSL_dup(ssl)))
|
|
goto err;
|
|
|
|
/* No clear */
|
|
if (!TEST_false(SSL_clear(ssl)))
|
|
goto err;
|
|
|
|
testresult = 1;
|
|
err:
|
|
SSL_free(ssl);
|
|
SSL_CTX_free(ctx);
|
|
return testresult;
|
|
}
|
|
|
|
static int test_quic_set_fd(int idx)
|
|
{
|
|
int testresult = 0;
|
|
SSL_CTX *ctx = NULL;
|
|
SSL *ssl = NULL;
|
|
int fd = -1, resfd = -1;
|
|
BIO *bio = NULL;
|
|
|
|
if (!TEST_ptr(ctx = SSL_CTX_new_ex(libctx, NULL, OSSL_QUIC_client_method())))
|
|
goto err;
|
|
|
|
if (!TEST_ptr(ssl = SSL_new(ctx)))
|
|
goto err;
|
|
|
|
if (!TEST_int_ge(fd = BIO_socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP, 0), 0))
|
|
goto err;
|
|
|
|
if (idx == 0) {
|
|
if (!TEST_true(SSL_set_fd(ssl, fd)))
|
|
goto err;
|
|
if (!TEST_ptr(bio = SSL_get_rbio(ssl)))
|
|
goto err;
|
|
if (!TEST_ptr_eq(bio, SSL_get_wbio(ssl)))
|
|
goto err;
|
|
} else if (idx == 1) {
|
|
if (!TEST_true(SSL_set_rfd(ssl, fd)))
|
|
goto err;
|
|
if (!TEST_ptr(bio = SSL_get_rbio(ssl)))
|
|
goto err;
|
|
if (!TEST_ptr_null(SSL_get_wbio(ssl)))
|
|
goto err;
|
|
} else {
|
|
if (!TEST_true(SSL_set_wfd(ssl, fd)))
|
|
goto err;
|
|
if (!TEST_ptr(bio = SSL_get_wbio(ssl)))
|
|
goto err;
|
|
if (!TEST_ptr_null(SSL_get_rbio(ssl)))
|
|
goto err;
|
|
}
|
|
|
|
if (!TEST_int_eq(BIO_method_type(bio), BIO_TYPE_DGRAM))
|
|
goto err;
|
|
|
|
if (!TEST_true(BIO_get_fd(bio, &resfd))
|
|
|| !TEST_int_eq(resfd, fd))
|
|
goto err;
|
|
|
|
testresult = 1;
|
|
err:
|
|
SSL_free(ssl);
|
|
SSL_CTX_free(ctx);
|
|
if (fd >= 0)
|
|
BIO_closesocket(fd);
|
|
return testresult;
|
|
}
|
|
|
|
#define MAXLOOPS 1000
|
|
|
|
static int test_bio_ssl(void)
|
|
{
|
|
/*
|
|
* We just use OSSL_QUIC_client_method() rather than
|
|
* OSSL_QUIC_client_thread_method(). We will never leave the connection idle
|
|
* so we will always be implicitly handling time events anyway via other
|
|
* IO calls.
|
|
*/
|
|
SSL_CTX *cctx = SSL_CTX_new_ex(libctx, NULL, OSSL_QUIC_client_method());
|
|
SSL *clientquic = NULL, *stream = NULL;
|
|
QUIC_TSERVER *qtserv = NULL;
|
|
int testresult = 0;
|
|
BIO *cbio = NULL, *strbio = NULL, *thisbio;
|
|
const char *msg = "Hello world";
|
|
int abortctr = 0, err, clienterr = 0, servererr = 0, retc = 0, rets = 0;
|
|
size_t written, readbytes, msglen;
|
|
int sid = 0, i;
|
|
unsigned char buf[80];
|
|
|
|
if (!TEST_ptr(cctx))
|
|
goto err;
|
|
|
|
cbio = BIO_new_ssl(cctx, 1);
|
|
if (!TEST_ptr(cbio))
|
|
goto err;
|
|
|
|
/*
|
|
* We must configure the ALPN/peer address etc so we get the SSL object in
|
|
* order to pass it to qtest_create_quic_objects for configuration.
|
|
*/
|
|
if (!TEST_int_eq(BIO_get_ssl(cbio, &clientquic), 1))
|
|
goto err;
|
|
|
|
if (!TEST_true(qtest_create_quic_objects(libctx, NULL, NULL, cert, privkey,
|
|
0, &qtserv, &clientquic, NULL,
|
|
NULL)))
|
|
goto err;
|
|
|
|
msglen = strlen(msg);
|
|
|
|
do {
|
|
err = BIO_FLAGS_WRITE;
|
|
while (!clienterr && !retc && err == BIO_FLAGS_WRITE) {
|
|
retc = BIO_write_ex(cbio, msg, msglen, &written);
|
|
if (!retc) {
|
|
if (BIO_should_retry(cbio))
|
|
err = BIO_retry_type(cbio);
|
|
else
|
|
err = 0;
|
|
}
|
|
}
|
|
|
|
if (!clienterr && retc <= 0 && err != BIO_FLAGS_READ) {
|
|
TEST_info("BIO_write_ex() failed %d, %d", retc, err);
|
|
TEST_openssl_errors();
|
|
clienterr = 1;
|
|
}
|
|
|
|
if (!servererr && rets <= 0) {
|
|
ossl_quic_tserver_tick(qtserv);
|
|
servererr = ossl_quic_tserver_is_term_any(qtserv);
|
|
if (!servererr)
|
|
rets = ossl_quic_tserver_is_handshake_confirmed(qtserv);
|
|
}
|
|
|
|
if (clienterr && servererr)
|
|
goto err;
|
|
|
|
if (++abortctr == MAXLOOPS) {
|
|
TEST_info("No progress made");
|
|
goto err;
|
|
}
|
|
} while ((!retc && !clienterr) || (rets <= 0 && !servererr));
|
|
|
|
/*
|
|
* 2 loops: The first using the default stream, and the second using a new
|
|
* client initiated bidi stream.
|
|
*/
|
|
for (i = 0, thisbio = cbio; i < 2; i++) {
|
|
if (!TEST_true(ossl_quic_tserver_read(qtserv, sid, buf, sizeof(buf),
|
|
&readbytes))
|
|
|| !TEST_mem_eq(msg, msglen, buf, readbytes))
|
|
goto err;
|
|
|
|
if (!TEST_true(ossl_quic_tserver_write(qtserv, sid, (unsigned char *)msg,
|
|
msglen, &written)))
|
|
goto err;
|
|
ossl_quic_tserver_tick(qtserv);
|
|
|
|
if (!TEST_true(BIO_read_ex(thisbio, buf, sizeof(buf), &readbytes))
|
|
|| !TEST_mem_eq(msg, msglen, buf, readbytes))
|
|
goto err;
|
|
|
|
if (i == 1)
|
|
break;
|
|
|
|
/*
|
|
* Now create a new stream and repeat. The bottom two bits of the stream
|
|
* id represents whether the stream is bidi and whether it is client
|
|
* initiated or not. For client initiated bidi they are both 0. So the
|
|
* first client initiated bidi stream is 0 and the next one is 4.
|
|
*/
|
|
sid = 4;
|
|
stream = SSL_new_stream(clientquic, 0);
|
|
if (!TEST_ptr(stream))
|
|
goto err;
|
|
|
|
thisbio = strbio = BIO_new(BIO_f_ssl());
|
|
if (!TEST_ptr(strbio))
|
|
goto err;
|
|
|
|
if (!TEST_int_eq(BIO_set_ssl(thisbio, stream, BIO_CLOSE), 1))
|
|
goto err;
|
|
stream = NULL;
|
|
|
|
if (!TEST_true(BIO_write_ex(thisbio, msg, msglen, &written)))
|
|
goto err;
|
|
|
|
ossl_quic_tserver_tick(qtserv);
|
|
}
|
|
|
|
testresult = 1;
|
|
err:
|
|
BIO_free_all(cbio);
|
|
BIO_free_all(strbio);
|
|
SSL_free(stream);
|
|
ossl_quic_tserver_free(qtserv);
|
|
SSL_CTX_free(cctx);
|
|
|
|
return testresult;
|
|
}
|
|
|
|
#define BACK_PRESSURE_NUM_LOOPS 10000
|
|
/*
|
|
* Test that sending data from the client to the server faster than the server
|
|
* can process it eventually results in back pressure on the client.
|
|
*/
|
|
static int test_back_pressure(void)
|
|
{
|
|
SSL_CTX *cctx = SSL_CTX_new_ex(libctx, NULL, OSSL_QUIC_client_method());
|
|
SSL *clientquic = NULL;
|
|
QUIC_TSERVER *qtserv = NULL;
|
|
int testresult = 0;
|
|
unsigned char *msg = NULL;
|
|
const size_t msglen = 1024;
|
|
unsigned char buf[64];
|
|
size_t readbytes, written;
|
|
int i;
|
|
|
|
if (!TEST_ptr(cctx)
|
|
|| !TEST_true(qtest_create_quic_objects(libctx, cctx, NULL, cert,
|
|
privkey, 0, &qtserv,
|
|
&clientquic, NULL, NULL))
|
|
|| !TEST_true(qtest_create_quic_connection(qtserv, clientquic)))
|
|
goto err;
|
|
|
|
msg = OPENSSL_malloc(msglen);
|
|
if (!TEST_ptr(msg))
|
|
goto err;
|
|
if (!TEST_int_eq(RAND_bytes_ex(libctx, msg, msglen, 0), 1))
|
|
goto err;
|
|
|
|
/*
|
|
* Limit to 10000 loops. If we've not seen any back pressure after that
|
|
* we're going to run out of memory, so abort.
|
|
*/
|
|
for (i = 0; i < BACK_PRESSURE_NUM_LOOPS; i++) {
|
|
/* Send data from the client */
|
|
if (!SSL_write_ex(clientquic, msg, msglen, &written)) {
|
|
/* Check if we are seeing back pressure */
|
|
if (SSL_get_error(clientquic, 0) == SSL_ERROR_WANT_WRITE)
|
|
break;
|
|
TEST_error("Unexpected client failure");
|
|
goto err;
|
|
}
|
|
|
|
/* Receive data at the server */
|
|
ossl_quic_tserver_tick(qtserv);
|
|
if (!TEST_true(ossl_quic_tserver_read(qtserv, 0, buf, sizeof(buf),
|
|
&readbytes)))
|
|
goto err;
|
|
}
|
|
|
|
if (i == BACK_PRESSURE_NUM_LOOPS) {
|
|
TEST_error("No back pressure seen");
|
|
goto err;
|
|
}
|
|
|
|
testresult = 1;
|
|
err:
|
|
SSL_free(clientquic);
|
|
ossl_quic_tserver_free(qtserv);
|
|
SSL_CTX_free(cctx);
|
|
OPENSSL_free(msg);
|
|
|
|
return testresult;
|
|
}
|
|
|
|
|
|
static int dgram_ctr = 0;
|
|
|
|
static void dgram_cb(int write_p, int version, int content_type,
|
|
const void *buf, size_t msglen, SSL *ssl, void *arg)
|
|
{
|
|
if (!write_p)
|
|
return;
|
|
|
|
if (content_type != SSL3_RT_QUIC_DATAGRAM)
|
|
return;
|
|
|
|
dgram_ctr++;
|
|
}
|
|
|
|
/* Test that we send multiple datagrams in one go when appropriate */
|
|
static int test_multiple_dgrams(void)
|
|
{
|
|
SSL_CTX *cctx = SSL_CTX_new_ex(libctx, NULL, OSSL_QUIC_client_method());
|
|
SSL *clientquic = NULL;
|
|
QUIC_TSERVER *qtserv = NULL;
|
|
int testresult = 0;
|
|
unsigned char *buf;
|
|
const size_t buflen = 1400;
|
|
size_t written;
|
|
|
|
buf = OPENSSL_zalloc(buflen);
|
|
|
|
if (!TEST_ptr(cctx)
|
|
|| !TEST_ptr(buf)
|
|
|| !TEST_true(qtest_create_quic_objects(libctx, cctx, NULL, cert,
|
|
privkey, 0, &qtserv,
|
|
&clientquic, NULL, NULL))
|
|
|| !TEST_true(qtest_create_quic_connection(qtserv, clientquic)))
|
|
goto err;
|
|
|
|
dgram_ctr = 0;
|
|
SSL_set_msg_callback(clientquic, dgram_cb);
|
|
if (!TEST_true(SSL_write_ex(clientquic, buf, buflen, &written))
|
|
|| !TEST_size_t_eq(written, buflen)
|
|
/* We wrote enough data for 2 datagrams */
|
|
|| !TEST_int_eq(dgram_ctr, 2))
|
|
goto err;
|
|
|
|
testresult = 1;
|
|
err:
|
|
OPENSSL_free(buf);
|
|
SSL_free(clientquic);
|
|
ossl_quic_tserver_free(qtserv);
|
|
SSL_CTX_free(cctx);
|
|
|
|
return testresult;
|
|
}
|
|
|
|
static int non_io_retry_cert_verify_cb(X509_STORE_CTX *ctx, void *arg)
|
|
{
|
|
int idx = SSL_get_ex_data_X509_STORE_CTX_idx();
|
|
SSL *ssl;
|
|
int *ctr = (int *)arg;
|
|
|
|
/* this should not happen but check anyway */
|
|
if (idx < 0
|
|
|| (ssl = X509_STORE_CTX_get_ex_data(ctx, idx)) == NULL)
|
|
return 0;
|
|
|
|
/* If this is the first time we've been called then retry */
|
|
if (((*ctr)++) == 0)
|
|
return SSL_set_retry_verify(ssl);
|
|
|
|
/* Otherwise do nothing - verification succeeds. Continue as normal */
|
|
return 1;
|
|
}
|
|
|
|
/* Test that we can handle a non-io related retry error
|
|
* Test 0: Non-blocking
|
|
* Test 1: Blocking
|
|
*/
|
|
static int test_non_io_retry(int idx)
|
|
{
|
|
SSL_CTX *cctx;
|
|
SSL *clientquic = NULL;
|
|
QUIC_TSERVER *qtserv = NULL;
|
|
int testresult = 0;
|
|
int flags = 0, ctr = 0;
|
|
|
|
if (idx >= 1 && !qtest_supports_blocking())
|
|
return TEST_skip("Blocking tests not supported in this build");
|
|
|
|
cctx = SSL_CTX_new_ex(libctx, NULL, OSSL_QUIC_client_method());
|
|
if (!TEST_ptr(cctx))
|
|
goto err;
|
|
|
|
SSL_CTX_set_cert_verify_callback(cctx, non_io_retry_cert_verify_cb, &ctr);
|
|
|
|
flags = (idx >= 1) ? QTEST_FLAG_BLOCK : 0;
|
|
if (!TEST_true(qtest_create_quic_objects(libctx, cctx, NULL, cert, privkey,
|
|
flags, &qtserv, &clientquic, NULL,
|
|
NULL))
|
|
|| !TEST_true(qtest_create_quic_connection_ex(qtserv, clientquic,
|
|
SSL_ERROR_WANT_RETRY_VERIFY))
|
|
|| !TEST_int_eq(SSL_want(clientquic), SSL_RETRY_VERIFY)
|
|
|| !TEST_true(qtest_create_quic_connection(qtserv, clientquic)))
|
|
goto err;
|
|
|
|
testresult = 1;
|
|
err:
|
|
SSL_free(clientquic);
|
|
ossl_quic_tserver_free(qtserv);
|
|
SSL_CTX_free(cctx);
|
|
|
|
return testresult;
|
|
}
|
|
|
|
static int use_session_cb_cnt = 0;
|
|
static int find_session_cb_cnt = 0;
|
|
static const char *pskid = "Identity";
|
|
static SSL_SESSION *serverpsk = NULL, *clientpsk = NULL;
|
|
|
|
static int use_session_cb(SSL *ssl, const EVP_MD *md, const unsigned char **id,
|
|
size_t *idlen, SSL_SESSION **sess)
|
|
{
|
|
use_session_cb_cnt++;
|
|
|
|
if (clientpsk == NULL)
|
|
return 0;
|
|
|
|
SSL_SESSION_up_ref(clientpsk);
|
|
|
|
*sess = clientpsk;
|
|
*id = (const unsigned char *)pskid;
|
|
*idlen = strlen(pskid);
|
|
|
|
return 1;
|
|
}
|
|
|
|
static int find_session_cb(SSL *ssl, const unsigned char *identity,
|
|
size_t identity_len, SSL_SESSION **sess)
|
|
{
|
|
find_session_cb_cnt++;
|
|
|
|
if (serverpsk == NULL)
|
|
return 0;
|
|
|
|
/* Identity should match that set by the client */
|
|
if (strlen(pskid) != identity_len
|
|
|| strncmp(pskid, (const char *)identity, identity_len) != 0)
|
|
return 0;
|
|
|
|
SSL_SESSION_up_ref(serverpsk);
|
|
*sess = serverpsk;
|
|
|
|
return 1;
|
|
}
|
|
|
|
static int test_quic_psk(void)
|
|
{
|
|
SSL_CTX *cctx = SSL_CTX_new_ex(libctx, NULL, OSSL_QUIC_client_method());
|
|
SSL *clientquic = NULL;
|
|
QUIC_TSERVER *qtserv = NULL;
|
|
int testresult = 0;
|
|
|
|
if (!TEST_ptr(cctx)
|
|
/* No cert or private key for the server, i.e. PSK only */
|
|
|| !TEST_true(qtest_create_quic_objects(libctx, cctx, NULL, NULL,
|
|
NULL, 0, &qtserv,
|
|
&clientquic, NULL, NULL)))
|
|
goto end;
|
|
|
|
SSL_set_psk_use_session_callback(clientquic, use_session_cb);
|
|
ossl_quic_tserver_set_psk_find_session_cb(qtserv, find_session_cb);
|
|
use_session_cb_cnt = 0;
|
|
find_session_cb_cnt = 0;
|
|
|
|
clientpsk = serverpsk = create_a_psk(clientquic, SHA384_DIGEST_LENGTH);
|
|
if (!TEST_ptr(clientpsk))
|
|
goto end;
|
|
/* We already had one ref. Add another one */
|
|
SSL_SESSION_up_ref(clientpsk);
|
|
|
|
if (!TEST_true(qtest_create_quic_connection(qtserv, clientquic))
|
|
|| !TEST_int_eq(1, find_session_cb_cnt)
|
|
|| !TEST_int_eq(1, use_session_cb_cnt)
|
|
/* Check that we actually used the PSK */
|
|
|| !TEST_true(SSL_session_reused(clientquic)))
|
|
goto end;
|
|
|
|
testresult = 1;
|
|
|
|
end:
|
|
SSL_free(clientquic);
|
|
ossl_quic_tserver_free(qtserv);
|
|
SSL_CTX_free(cctx);
|
|
SSL_SESSION_free(clientpsk);
|
|
SSL_SESSION_free(serverpsk);
|
|
clientpsk = serverpsk = NULL;
|
|
|
|
return testresult;
|
|
}
|
|
|
|
static int test_client_auth(int idx)
|
|
{
|
|
SSL_CTX *cctx = SSL_CTX_new_ex(libctx, NULL, OSSL_QUIC_client_method());
|
|
SSL_CTX *sctx = SSL_CTX_new_ex(libctx, NULL, TLS_method());
|
|
SSL *clientquic = NULL;
|
|
QUIC_TSERVER *qtserv = NULL;
|
|
int testresult = 0;
|
|
unsigned char buf[20];
|
|
static char *msg = "A test message";
|
|
size_t msglen = strlen(msg);
|
|
size_t numbytes = 0;
|
|
|
|
if (!TEST_ptr(cctx) || !TEST_ptr(sctx))
|
|
goto err;
|
|
|
|
SSL_CTX_set_verify(sctx, SSL_VERIFY_PEER | SSL_VERIFY_FAIL_IF_NO_PEER_CERT
|
|
| SSL_VERIFY_CLIENT_ONCE, NULL);
|
|
|
|
if (!TEST_true(SSL_CTX_load_verify_file(sctx, cauthca)))
|
|
goto err;
|
|
|
|
if (idx > 0
|
|
&& (!TEST_true(SSL_CTX_use_certificate_chain_file(cctx, ccert))
|
|
|| !TEST_true(SSL_CTX_use_PrivateKey_file(cctx, cprivkey,
|
|
SSL_FILETYPE_PEM))))
|
|
goto err;
|
|
|
|
if (!TEST_true(qtest_create_quic_objects(libctx, cctx, sctx, cert,
|
|
privkey, 0, &qtserv,
|
|
&clientquic, NULL, NULL)))
|
|
goto err;
|
|
|
|
if (idx == 0) {
|
|
if (!TEST_false(qtest_create_quic_connection(qtserv, clientquic)))
|
|
goto err;
|
|
|
|
/* negative test passed */
|
|
testresult = 1;
|
|
goto err;
|
|
}
|
|
|
|
if (!TEST_true(qtest_create_quic_connection(qtserv, clientquic)))
|
|
goto err;
|
|
|
|
/* Check that sending and receiving app data is ok */
|
|
if (!TEST_true(SSL_write_ex(clientquic, msg, msglen, &numbytes))
|
|
|| !TEST_size_t_eq(numbytes, msglen))
|
|
goto err;
|
|
|
|
ossl_quic_tserver_tick(qtserv);
|
|
if (!TEST_true(ossl_quic_tserver_write(qtserv, 0,
|
|
(unsigned char *)msg,
|
|
msglen, &numbytes)))
|
|
goto err;
|
|
|
|
ossl_quic_tserver_tick(qtserv);
|
|
SSL_handle_events(clientquic);
|
|
|
|
if (!TEST_true(SSL_read_ex(clientquic, buf, sizeof(buf), &numbytes))
|
|
|| !TEST_size_t_eq(numbytes, msglen)
|
|
|| !TEST_mem_eq(buf, numbytes, msg, msglen))
|
|
goto err;
|
|
|
|
if (!TEST_true(qtest_shutdown(qtserv, clientquic)))
|
|
goto err;
|
|
|
|
testresult = 1;
|
|
|
|
err:
|
|
SSL_free(clientquic);
|
|
ossl_quic_tserver_free(qtserv);
|
|
SSL_CTX_free(sctx);
|
|
SSL_CTX_free(cctx);
|
|
|
|
return testresult;
|
|
}
|
|
|
|
/*
|
|
* Test that we correctly handle ALPN supplied by the application
|
|
* Test 0: ALPN is provided
|
|
* Test 1: No ALPN is provided
|
|
*/
|
|
static int test_alpn(int idx)
|
|
{
|
|
SSL_CTX *cctx = SSL_CTX_new_ex(libctx, NULL, OSSL_QUIC_client_method());
|
|
SSL *clientquic = NULL;
|
|
QUIC_TSERVER *qtserv = NULL;
|
|
int testresult = 0;
|
|
int ret;
|
|
|
|
/*
|
|
* Ensure we only configure ciphersuites that are available with both the
|
|
* default and fips providers to get the same output in both cases
|
|
*/
|
|
if (!TEST_true(SSL_CTX_set_ciphersuites(cctx, "TLS_AES_128_GCM_SHA256")))
|
|
goto err;
|
|
|
|
if (!TEST_ptr(cctx)
|
|
|| !TEST_true(qtest_create_quic_objects(libctx, cctx, NULL, cert,
|
|
privkey,
|
|
QTEST_FLAG_FAKE_TIME,
|
|
&qtserv,
|
|
&clientquic, NULL, NULL)))
|
|
goto err;
|
|
|
|
if (idx == 0) {
|
|
/*
|
|
* Clear the ALPN we set in qtest_create_quic_objects. We use TEST_false
|
|
* because SSL_set_alpn_protos returns 0 for success.
|
|
*/
|
|
if (!TEST_false(SSL_set_alpn_protos(clientquic, NULL, 0)))
|
|
goto err;
|
|
}
|
|
|
|
ret = SSL_connect(clientquic);
|
|
if (!TEST_int_le(ret, 0))
|
|
goto err;
|
|
if (idx == 0) {
|
|
/* We expect an immediate error due to lack of ALPN */
|
|
if (!TEST_int_eq(SSL_get_error(clientquic, ret), SSL_ERROR_SSL))
|
|
goto err;
|
|
} else {
|
|
/* ALPN was provided so we expect the connection to succeed */
|
|
if (!TEST_int_eq(SSL_get_error(clientquic, ret), SSL_ERROR_WANT_READ)
|
|
|| !TEST_true(qtest_create_quic_connection(qtserv, clientquic)))
|
|
goto err;
|
|
}
|
|
|
|
testresult = 1;
|
|
err:
|
|
ossl_quic_tserver_free(qtserv);
|
|
SSL_free(clientquic);
|
|
SSL_CTX_free(cctx);
|
|
|
|
return testresult;
|
|
}
|
|
|
|
#define MAX_LOOPS 2000
|
|
|
|
/*
|
|
* Keep retrying SSL_read_ex until it succeeds or we give up. Accept a stream
|
|
* if we don't already have one
|
|
*/
|
|
static int unreliable_client_read(SSL *clientquic, SSL **stream, void *buf,
|
|
size_t buflen, size_t *readbytes,
|
|
QUIC_TSERVER *qtserv)
|
|
{
|
|
int abortctr;
|
|
|
|
/* We just do this in a loop with a sleep for simplicity */
|
|
for (abortctr = 0; abortctr < MAX_LOOPS; abortctr++) {
|
|
if (*stream == NULL) {
|
|
SSL_handle_events(clientquic);
|
|
*stream = SSL_accept_stream(clientquic, 0);
|
|
}
|
|
|
|
if (*stream != NULL) {
|
|
if (SSL_read_ex(*stream, buf, buflen, readbytes))
|
|
return 1;
|
|
if (!TEST_int_eq(SSL_get_error(*stream, 0), SSL_ERROR_WANT_READ))
|
|
return 0;
|
|
}
|
|
ossl_quic_tserver_tick(qtserv);
|
|
qtest_add_time(1);
|
|
qtest_wait_for_timeout(clientquic, qtserv);
|
|
}
|
|
|
|
TEST_error("No progress made");
|
|
return 0;
|
|
}
|
|
|
|
/* Keep retrying ossl_quic_tserver_read until it succeeds or we give up */
|
|
static int unreliable_server_read(QUIC_TSERVER *qtserv, uint64_t sid,
|
|
void *buf, size_t buflen, size_t *readbytes,
|
|
SSL *clientquic)
|
|
{
|
|
int abortctr;
|
|
|
|
/* We just do this in a loop with a sleep for simplicity */
|
|
for (abortctr = 0; abortctr < MAX_LOOPS; abortctr++) {
|
|
if (ossl_quic_tserver_read(qtserv, sid, buf, buflen, readbytes)
|
|
&& *readbytes > 1)
|
|
return 1;
|
|
ossl_quic_tserver_tick(qtserv);
|
|
SSL_handle_events(clientquic);
|
|
qtest_add_time(1);
|
|
qtest_wait_for_timeout(clientquic, qtserv);
|
|
}
|
|
|
|
TEST_error("No progress made");
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* Create a connection and send data using an unreliable transport. We introduce
|
|
* random noise to drop, delay and duplicate datagrams.
|
|
* Test 0: Introduce random noise to datagrams
|
|
* Test 1: As with test 0 but also split datagrams containing multiple packets
|
|
* into individual datagrams so that individual packets can be affected
|
|
* by noise - not just a whole datagram.
|
|
*/
|
|
static int test_noisy_dgram(int idx)
|
|
{
|
|
SSL_CTX *cctx = SSL_CTX_new_ex(libctx, NULL, OSSL_QUIC_client_method());
|
|
SSL *clientquic = NULL, *stream[2] = { NULL, NULL };
|
|
QUIC_TSERVER *qtserv = NULL;
|
|
int testresult = 0;
|
|
uint64_t sid = 0;
|
|
char *msg = "Hello world!";
|
|
size_t msglen = strlen(msg), written, readbytes, i, j;
|
|
unsigned char buf[80];
|
|
int flags = QTEST_FLAG_NOISE | QTEST_FLAG_FAKE_TIME;
|
|
QTEST_FAULT *fault = NULL;
|
|
|
|
if (idx == 1)
|
|
flags |= QTEST_FLAG_PACKET_SPLIT;
|
|
|
|
if (!TEST_ptr(cctx)
|
|
|| !TEST_true(qtest_create_quic_objects(libctx, cctx, NULL, cert,
|
|
privkey, flags,
|
|
&qtserv,
|
|
&clientquic, &fault, NULL)))
|
|
goto err;
|
|
|
|
if (!TEST_true(qtest_create_quic_connection(qtserv, clientquic)))
|
|
goto err;
|
|
|
|
if (!TEST_true(SSL_set_incoming_stream_policy(clientquic,
|
|
SSL_INCOMING_STREAM_POLICY_ACCEPT,
|
|
0))
|
|
|| !TEST_true(SSL_set_default_stream_mode(clientquic,
|
|
SSL_DEFAULT_STREAM_MODE_NONE)))
|
|
goto err;
|
|
|
|
for (j = 0; j < 2; j++) {
|
|
if (!TEST_true(ossl_quic_tserver_stream_new(qtserv, 0, &sid)))
|
|
goto err;
|
|
ossl_quic_tserver_tick(qtserv);
|
|
qtest_add_time(1);
|
|
|
|
/*
|
|
* Send data from the server to the client. Some datagrams may get lost,
|
|
* dropped or re-ordered. We repeat 10 times to ensure we are sending
|
|
* enough datagrams for problems to be noticed.
|
|
*/
|
|
for (i = 0; i < 10; i++) {
|
|
if (!TEST_true(ossl_quic_tserver_write(qtserv, sid,
|
|
(unsigned char *)msg, msglen,
|
|
&written))
|
|
|| !TEST_size_t_eq(msglen, written))
|
|
goto err;
|
|
ossl_quic_tserver_tick(qtserv);
|
|
qtest_add_time(1);
|
|
|
|
/*
|
|
* Since the underlying BIO is now noisy we may get failures that
|
|
* need to be retried - so we use unreliable_client_read() to handle
|
|
* that
|
|
*/
|
|
if (!TEST_true(unreliable_client_read(clientquic, &stream[j], buf,
|
|
sizeof(buf), &readbytes,
|
|
qtserv))
|
|
|| !TEST_mem_eq(msg, msglen, buf, readbytes))
|
|
goto err;
|
|
}
|
|
|
|
/* Send data from the client to the server */
|
|
for (i = 0; i < 10; i++) {
|
|
if (!TEST_true(SSL_write_ex(stream[j], (unsigned char *)msg,
|
|
msglen, &written))
|
|
|| !TEST_size_t_eq(msglen, written))
|
|
goto err;
|
|
|
|
ossl_quic_tserver_tick(qtserv);
|
|
qtest_add_time(1);
|
|
|
|
/*
|
|
* Since the underlying BIO is now noisy we may get failures that
|
|
* need to be retried - so we use unreliable_server_read() to handle
|
|
* that
|
|
*/
|
|
if (!TEST_true(unreliable_server_read(qtserv, sid, buf, sizeof(buf),
|
|
&readbytes, clientquic))
|
|
|| !TEST_mem_eq(msg, msglen, buf, readbytes))
|
|
goto err;
|
|
}
|
|
}
|
|
|
|
testresult = 1;
|
|
err:
|
|
ossl_quic_tserver_free(qtserv);
|
|
SSL_free(stream[0]);
|
|
SSL_free(stream[1]);
|
|
SSL_free(clientquic);
|
|
SSL_CTX_free(cctx);
|
|
qtest_fault_free(fault);
|
|
|
|
return testresult;
|
|
}
|
|
|
|
|
|
OPT_TEST_DECLARE_USAGE("provider config certsdir datadir\n")
|
|
|
|
int setup_tests(void)
|
|
{
|
|
char *modulename;
|
|
char *configfile;
|
|
|
|
libctx = OSSL_LIB_CTX_new();
|
|
if (!TEST_ptr(libctx))
|
|
return 0;
|
|
|
|
defctxnull = OSSL_PROVIDER_load(NULL, "null");
|
|
|
|
/*
|
|
* Verify that the default and fips providers in the default libctx are not
|
|
* available
|
|
*/
|
|
if (!TEST_false(OSSL_PROVIDER_available(NULL, "default"))
|
|
|| !TEST_false(OSSL_PROVIDER_available(NULL, "fips")))
|
|
goto err;
|
|
|
|
if (!test_skip_common_options()) {
|
|
TEST_error("Error parsing test options\n");
|
|
goto err;
|
|
}
|
|
|
|
if (!TEST_ptr(modulename = test_get_argument(0))
|
|
|| !TEST_ptr(configfile = test_get_argument(1))
|
|
|| !TEST_ptr(certsdir = test_get_argument(2))
|
|
|| !TEST_ptr(datadir = test_get_argument(3)))
|
|
goto err;
|
|
|
|
if (!TEST_true(OSSL_LIB_CTX_load_config(libctx, configfile)))
|
|
goto err;
|
|
|
|
/* Check we have the expected provider available */
|
|
if (!TEST_true(OSSL_PROVIDER_available(libctx, modulename)))
|
|
goto err;
|
|
|
|
/* Check the default provider is not available */
|
|
if (strcmp(modulename, "default") != 0
|
|
&& !TEST_false(OSSL_PROVIDER_available(libctx, "default")))
|
|
goto err;
|
|
|
|
if (strcmp(modulename, "fips") == 0)
|
|
is_fips = 1;
|
|
|
|
cert = test_mk_file_path(certsdir, "servercert.pem");
|
|
if (cert == NULL)
|
|
goto err;
|
|
|
|
ccert = test_mk_file_path(certsdir, "ee-client-chain.pem");
|
|
if (ccert == NULL)
|
|
goto err;
|
|
|
|
cauthca = test_mk_file_path(certsdir, "root-cert.pem");
|
|
if (cauthca == NULL)
|
|
goto err;
|
|
|
|
privkey = test_mk_file_path(certsdir, "serverkey.pem");
|
|
if (privkey == NULL)
|
|
goto err;
|
|
|
|
cprivkey = test_mk_file_path(certsdir, "ee-key.pem");
|
|
if (privkey == NULL)
|
|
goto err;
|
|
|
|
ADD_ALL_TESTS(test_quic_write_read, 3);
|
|
ADD_TEST(test_fin_only_blocking);
|
|
ADD_TEST(test_ciphersuites);
|
|
ADD_TEST(test_cipher_find);
|
|
ADD_TEST(test_version);
|
|
#if defined(DO_SSL_TRACE_TEST)
|
|
ADD_TEST(test_ssl_trace);
|
|
#endif
|
|
ADD_TEST(test_quic_forbidden_apis_ctx);
|
|
ADD_TEST(test_quic_forbidden_apis);
|
|
ADD_TEST(test_quic_forbidden_options);
|
|
ADD_ALL_TESTS(test_quic_set_fd, 3);
|
|
ADD_TEST(test_bio_ssl);
|
|
ADD_TEST(test_back_pressure);
|
|
ADD_TEST(test_multiple_dgrams);
|
|
ADD_ALL_TESTS(test_non_io_retry, 2);
|
|
ADD_TEST(test_quic_psk);
|
|
ADD_ALL_TESTS(test_client_auth, 2);
|
|
ADD_ALL_TESTS(test_alpn, 2);
|
|
ADD_ALL_TESTS(test_noisy_dgram, 2);
|
|
|
|
return 1;
|
|
err:
|
|
cleanup_tests();
|
|
return 0;
|
|
}
|
|
|
|
void cleanup_tests(void)
|
|
{
|
|
bio_f_noisy_dgram_filter_free();
|
|
bio_f_pkt_split_dgram_filter_free();
|
|
OPENSSL_free(cert);
|
|
OPENSSL_free(privkey);
|
|
OPENSSL_free(ccert);
|
|
OPENSSL_free(cauthca);
|
|
OPENSSL_free(cprivkey);
|
|
OSSL_PROVIDER_unload(defctxnull);
|
|
OSSL_LIB_CTX_free(libctx);
|
|
}
|