1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645 |
- /*
- * Copyright 2022-2023 The OpenSSL Project Authors. All Rights Reserved.
- *
- * Licensed under the Apache License 2.0 (the "License"). You may not use
- * this file except in compliance with the License. You can obtain a copy
- * in the file LICENSE in the source distribution or at
- * https://www.openssl.org/source/license.html
- */
- #include "internal/packet.h"
- #include "internal/quic_wire.h"
- #include "internal/quic_wire_pkt.h"
- #include "testutil.h"
- struct encode_test_case {
- int (*serializer)(WPACKET *pkt);
- const unsigned char *expect_buf;
- size_t expect_buf_len;
- /*
- * fail: -1 if not truncated (function should test for success), else number
- * of bytes to which the input has been truncated (function should test that
- * decoding fails)
- */
- int (*deserializer)(PACKET *pkt, ossl_ssize_t fail);
- };
- /* 1. PADDING */
- static int encode_case_1_enc(WPACKET *pkt)
- {
- if (!TEST_int_eq(ossl_quic_wire_encode_padding(pkt, 3), 1))
- return 0;
- return 1;
- }
- static int encode_case_1_dec(PACKET *pkt, ossl_ssize_t fail)
- {
- if (fail >= 0)
- /* No failure modes for padding */
- return 1;
- if (!TEST_int_eq(ossl_quic_wire_decode_padding(pkt), 3))
- return 0;
- return 1;
- }
- static const unsigned char encode_case_1_expect[] = {
- 0, 0, 0
- };
- /* 2. PING */
- static int encode_case_2_enc(WPACKET *pkt)
- {
- if (!TEST_int_eq(ossl_quic_wire_encode_frame_ping(pkt), 1))
- return 0;
- return 1;
- }
- static int encode_case_2_dec(PACKET *pkt, ossl_ssize_t fail)
- {
- if (!TEST_int_eq(ossl_quic_wire_decode_frame_ping(pkt), fail < 0))
- return 0;
- return 1;
- }
- static const unsigned char encode_case_2_expect[] = {
- 0x01
- };
- /* 3. ACK */
- static const OSSL_QUIC_ACK_RANGE encode_case_3_ranges[] = {
- { 20, 30 },
- { 0, 10 }
- };
- static const OSSL_QUIC_FRAME_ACK encode_case_3_f = {
- (OSSL_QUIC_ACK_RANGE *)encode_case_3_ranges,
- OSSL_NELEM(encode_case_3_ranges),
- { OSSL_TIME_MS },
- 60, 70, 80, 1
- };
- static int encode_case_3_enc(WPACKET *pkt)
- {
- if (!TEST_int_eq(ossl_quic_wire_encode_frame_ack(pkt, 3, &encode_case_3_f), 1))
- return 0;
- return 1;
- }
- static int encode_case_3_dec(PACKET *pkt, ossl_ssize_t fail)
- {
- OSSL_QUIC_ACK_RANGE ranges[4] = {0};
- OSSL_QUIC_FRAME_ACK f = {0};
- uint64_t total_ranges = 0, peek_total_ranges = 0;
- int ret;
- f.ack_ranges = ranges;
- f.num_ack_ranges = OSSL_NELEM(ranges);
- ret = ossl_quic_wire_peek_frame_ack_num_ranges(pkt, &peek_total_ranges);
- if (fail < 0 && !TEST_int_eq(ret, 1))
- return 0;
- if (!TEST_int_eq(ossl_quic_wire_decode_frame_ack(pkt, 3, &f, &total_ranges), fail < 0))
- return 0;
- if (ret == 1 && !TEST_uint64_t_eq(peek_total_ranges, 2))
- return 0;
- if (fail >= 0)
- return 1;
- if (!TEST_uint64_t_eq(total_ranges, peek_total_ranges))
- return 0;
- if (!TEST_uint64_t_le(f.num_ack_ranges * sizeof(OSSL_QUIC_ACK_RANGE),
- SIZE_MAX)
- || !TEST_uint64_t_le(encode_case_3_f.num_ack_ranges
- * sizeof(OSSL_QUIC_ACK_RANGE),
- SIZE_MAX))
- return 0;
- if (!TEST_mem_eq(f.ack_ranges,
- (size_t)f.num_ack_ranges * sizeof(OSSL_QUIC_ACK_RANGE),
- encode_case_3_f.ack_ranges,
- (size_t)encode_case_3_f.num_ack_ranges * sizeof(OSSL_QUIC_ACK_RANGE)))
- return 0;
- if (!TEST_uint64_t_eq(ossl_time2ticks(f.delay_time),
- ossl_time2ticks(encode_case_3_f.delay_time)))
- return 0;
- if (!TEST_true(f.ecn_present))
- return 0;
- if (!TEST_uint64_t_eq(f.ect0, encode_case_3_f.ect0))
- return 0;
- if (!TEST_uint64_t_eq(f.ect1, encode_case_3_f.ect1))
- return 0;
- if (!TEST_uint64_t_eq(f.ecnce, encode_case_3_f.ecnce))
- return 0;
- return 1;
- }
- static const unsigned char encode_case_3_expect[] = {
- 0x03, /* Type */
- 0x1E, /* Largest Acknowledged */
- 0x40, 0x7d, /* ACK Delay */
- 1, /* ACK Range Count */
- 10, /* First ACK Range */
- 8, /* Gap */
- 10, /* Length */
- 0x3c, /* ECT0 Count */
- 0x40, 0x46, /* ECT1 Count */
- 0x40, 0x50, /* ECNCE Count */
- };
- /* 4. RESET_STREAM */
- static const OSSL_QUIC_FRAME_RESET_STREAM encode_case_4_f = {
- 0x1234, 0x9781, 0x11717
- };
- static int encode_case_4_enc(WPACKET *pkt)
- {
- if (!TEST_int_eq(ossl_quic_wire_encode_frame_reset_stream(pkt,
- &encode_case_4_f), 1))
- return 0;
- return 1;
- }
- static int encode_case_4_dec(PACKET *pkt, ossl_ssize_t fail)
- {
- OSSL_QUIC_FRAME_RESET_STREAM f = {0};
- if (!TEST_int_eq(ossl_quic_wire_decode_frame_reset_stream(pkt, &f), fail < 0))
- return 0;
- if (fail >= 0)
- return 1;
- if (!TEST_mem_eq(&f, sizeof(f), &encode_case_4_f, sizeof(encode_case_4_f)))
- return 0;
- return 1;
- }
- static const unsigned char encode_case_4_expect[] = {
- 0x04, /* Type */
- 0x52, 0x34, /* Stream ID */
- 0x80, 0x00, 0x97, 0x81, /* App Error Code */
- 0x80, 0x01, 0x17, 0x17, /* Final Size */
- };
- /* 5. STOP_SENDING */
- static const OSSL_QUIC_FRAME_STOP_SENDING encode_case_5_f = {
- 0x1234, 0x9781
- };
- static int encode_case_5_enc(WPACKET *pkt)
- {
- if (!TEST_int_eq(ossl_quic_wire_encode_frame_stop_sending(pkt,
- &encode_case_5_f), 1))
- return 0;
- return 1;
- }
- static int encode_case_5_dec(PACKET *pkt, ossl_ssize_t fail)
- {
- OSSL_QUIC_FRAME_STOP_SENDING f = {0};
- if (!TEST_int_eq(ossl_quic_wire_decode_frame_stop_sending(pkt, &f), fail < 0))
- return 0;
- if (fail >= 0)
- return 1;
- if (!TEST_mem_eq(&f, sizeof(f), &encode_case_5_f, sizeof(encode_case_5_f)))
- return 0;
- return 1;
- }
- static const unsigned char encode_case_5_expect[] = {
- 0x05, /* Type */
- 0x52, 0x34, /* Stream ID */
- 0x80, 0x00, 0x97, 0x81 /* App Error Code */
- };
- /* 6. CRYPTO */
- static const unsigned char encode_case_6_data[] = {
- 93, 18, 17, 102, 33
- };
- static const OSSL_QUIC_FRAME_CRYPTO encode_case_6_f = {
- 0x1234, sizeof(encode_case_6_data), encode_case_6_data
- };
- static int encode_case_6_enc(WPACKET *pkt)
- {
- if (!TEST_ptr(ossl_quic_wire_encode_frame_crypto(pkt,
- &encode_case_6_f)))
- return 0;
- return 1;
- }
- static int encode_case_6_dec(PACKET *pkt, ossl_ssize_t fail)
- {
- OSSL_QUIC_FRAME_CRYPTO f = {0};
- if (!TEST_int_eq(ossl_quic_wire_decode_frame_crypto(pkt, 0, &f), fail < 0))
- return 0;
- if (fail >= 0)
- return 1;
- if (!TEST_uint64_t_eq(f.offset, 0x1234))
- return 0;
- if (!TEST_uint64_t_le(f.len, SIZE_MAX))
- return 0;
- if (!TEST_mem_eq(f.data, (size_t)f.len,
- encode_case_6_data, sizeof(encode_case_6_data)))
- return 0;
- return 1;
- }
- static const unsigned char encode_case_6_expect[] = {
- 0x06, /* Type */
- 0x52, 0x34, /* Offset */
- 0x05, /* Length */
- 93, 18, 17, 102, 33 /* Data */
- };
- /* 7. NEW_TOKEN */
- static const unsigned char encode_case_7_token[] = {
- 0xde, 0x06, 0xcb, 0x76, 0x5d, 0xb1, 0xa7, 0x71,
- 0x78, 0x09, 0xbb, 0xe8, 0x50, 0x19, 0x12, 0x9a
- };
- static int encode_case_7_enc(WPACKET *pkt)
- {
- if (!TEST_int_eq(ossl_quic_wire_encode_frame_new_token(pkt,
- encode_case_7_token,
- sizeof(encode_case_7_token)), 1))
- return 0;
- return 1;
- }
- static int encode_case_7_dec(PACKET *pkt, ossl_ssize_t fail)
- {
- const unsigned char *token = NULL;
- size_t token_len = 0;
- if (!TEST_int_eq(ossl_quic_wire_decode_frame_new_token(pkt,
- &token,
- &token_len), fail < 0))
- return 0;
- if (fail >= 0)
- return 1;
- if (!TEST_mem_eq(token, token_len,
- encode_case_7_token, sizeof(encode_case_7_token)))
- return 0;
- return 1;
- }
- static const unsigned char encode_case_7_expect[] = {
- 0x07, /* Type */
- 0x10, /* Length */
- 0xde, 0x06, 0xcb, 0x76, 0x5d, 0xb1, 0xa7, 0x71, /* Token */
- 0x78, 0x09, 0xbb, 0xe8, 0x50, 0x19, 0x12, 0x9a
- };
- /* 8. STREAM (no length, no offset, no fin) */
- static const unsigned char encode_case_8_data[] = {
- 0xde, 0x06, 0xcb, 0x76, 0x5d
- };
- static const OSSL_QUIC_FRAME_STREAM encode_case_8_f = {
- 0x1234, 0, 5, encode_case_8_data, 0, 0
- };
- static int encode_case_8_enc(WPACKET *pkt)
- {
- if (!TEST_ptr(ossl_quic_wire_encode_frame_stream(pkt,
- &encode_case_8_f)))
- return 0;
- return 1;
- }
- static int encode_case_8_dec(PACKET *pkt, ossl_ssize_t fail)
- {
- OSSL_QUIC_FRAME_STREAM f = {0};
- if (fail >= 3)
- /*
- * This case uses implicit length signalling so truncation will not
- * cause it to fail unless the header (which is 3 bytes) is truncated.
- */
- return 1;
- if (!TEST_int_eq(ossl_quic_wire_decode_frame_stream(pkt, 0, &f), fail < 0))
- return 0;
- if (fail >= 0)
- return 1;
- if (!TEST_uint64_t_le(f.len, SIZE_MAX))
- return 0;
- if (!TEST_mem_eq(f.data, (size_t)f.len,
- encode_case_8_data, sizeof(encode_case_8_data)))
- return 0;
- if (!TEST_uint64_t_eq(f.stream_id, 0x1234))
- return 0;
- if (!TEST_uint64_t_eq(f.offset, 0))
- return 0;
- if (!TEST_int_eq(f.has_explicit_len, 0))
- return 0;
- if (!TEST_int_eq(f.is_fin, 0))
- return 0;
- return 1;
- }
- static const unsigned char encode_case_8_expect[] = {
- 0x08, /* Type (OFF=0, LEN=0, FIN=0) */
- 0x52, 0x34, /* Stream ID */
- 0xde, 0x06, 0xcb, 0x76, 0x5d /* Data */
- };
- /* 9. STREAM (length, offset, fin) */
- static const unsigned char encode_case_9_data[] = {
- 0xde, 0x06, 0xcb, 0x76, 0x5d
- };
- static const OSSL_QUIC_FRAME_STREAM encode_case_9_f = {
- 0x1234, 0x39, 5, encode_case_9_data, 1, 1
- };
- static int encode_case_9_enc(WPACKET *pkt)
- {
- if (!TEST_ptr(ossl_quic_wire_encode_frame_stream(pkt,
- &encode_case_9_f)))
- return 0;
- return 1;
- }
- static int encode_case_9_dec(PACKET *pkt, ossl_ssize_t fail)
- {
- OSSL_QUIC_FRAME_STREAM f = {0};
- if (!TEST_int_eq(ossl_quic_wire_decode_frame_stream(pkt, 0, &f), fail < 0))
- return 0;
- if (fail >= 0)
- return 1;
- if (!TEST_uint64_t_le(f.len, SIZE_MAX))
- return 0;
- if (!TEST_mem_eq(f.data, (size_t)f.len,
- encode_case_9_data, sizeof(encode_case_9_data)))
- return 0;
- if (!TEST_uint64_t_eq(f.stream_id, 0x1234))
- return 0;
- if (!TEST_uint64_t_eq(f.offset, 0x39))
- return 0;
- if (!TEST_int_eq(f.has_explicit_len, 1))
- return 0;
- if (!TEST_int_eq(f.is_fin, 1))
- return 0;
- return 1;
- }
- static const unsigned char encode_case_9_expect[] = {
- 0x0f, /* Type (OFF=1, LEN=1, FIN=1) */
- 0x52, 0x34, /* Stream ID */
- 0x39, /* Offset */
- 0x05, /* Length */
- 0xde, 0x06, 0xcb, 0x76, 0x5d /* Data */
- };
- /* 10. MAX_DATA */
- static int encode_case_10_enc(WPACKET *pkt)
- {
- if (!TEST_int_eq(ossl_quic_wire_encode_frame_max_data(pkt, 0x1234), 1))
- return 0;
- return 1;
- }
- static int encode_case_10_dec(PACKET *pkt, ossl_ssize_t fail)
- {
- uint64_t max_data = 0;
- if (!TEST_int_eq(ossl_quic_wire_decode_frame_max_data(pkt, &max_data), fail < 0))
- return 0;
- if (fail >= 0)
- return 1;
- if (!TEST_uint64_t_eq(max_data, 0x1234))
- return 0;
- return 1;
- }
- static const unsigned char encode_case_10_expect[] = {
- 0x10, /* Type */
- 0x52, 0x34, /* Max Data */
- };
- /* 11. MAX_STREAM_DATA */
- static int encode_case_11_enc(WPACKET *pkt)
- {
- if (!TEST_int_eq(ossl_quic_wire_encode_frame_max_stream_data(pkt,
- 0x1234,
- 0x9781), 1))
- return 0;
- return 1;
- }
- static int encode_case_11_dec(PACKET *pkt, ossl_ssize_t fail)
- {
- uint64_t stream_id = 0, max_data = 0;
- if (!TEST_int_eq(ossl_quic_wire_decode_frame_max_stream_data(pkt,
- &stream_id,
- &max_data), fail < 0))
- return 0;
- if (fail >= 0)
- return 1;
- if (!TEST_uint64_t_eq(stream_id, 0x1234))
- return 0;
- if (!TEST_uint64_t_eq(max_data, 0x9781))
- return 0;
- return 1;
- }
- static const unsigned char encode_case_11_expect[] = {
- 0x11, /* Type */
- 0x52, 0x34, /* Stream ID */
- 0x80, 0x00, 0x97, 0x81, /* Max Data */
- };
- /* 12. MAX_STREAMS */
- static int encode_case_12_enc(WPACKET *pkt)
- {
- if (!TEST_int_eq(ossl_quic_wire_encode_frame_max_streams(pkt, 0, 0x1234), 1))
- return 0;
- if (!TEST_int_eq(ossl_quic_wire_encode_frame_max_streams(pkt, 1, 0x9781), 1))
- return 0;
- return 1;
- }
- static int encode_case_12_dec(PACKET *pkt, ossl_ssize_t fail)
- {
- uint64_t max_streams_1 = 0, max_streams_2 = 0,
- frame_type_1 = 0, frame_type_2 = 0;
- int is_minimal = 1, success_if;
- success_if = (fail < 0 || fail >= 1);
- if (!TEST_int_eq(ossl_quic_wire_peek_frame_header(pkt, &frame_type_1,
- &is_minimal),
- success_if))
- return 0;
- if (!TEST_true(!success_if || is_minimal))
- return 0;
- success_if = (fail < 0 || fail >= 3);
- if (!TEST_int_eq(ossl_quic_wire_decode_frame_max_streams(pkt,
- &max_streams_1),
- success_if))
- return 0;
- success_if = (fail < 0 || fail >= 4);
- if (!TEST_int_eq(ossl_quic_wire_peek_frame_header(pkt, &frame_type_2,
- &is_minimal),
- success_if))
- return 0;
- if (!TEST_true(!success_if || is_minimal))
- return 0;
- success_if = (fail < 0);
- if (!TEST_int_eq(ossl_quic_wire_decode_frame_max_streams(pkt,
- &max_streams_2),
- success_if))
- return 0;
- if ((fail < 0 || fail >= 3)
- && !TEST_uint64_t_eq(frame_type_1, OSSL_QUIC_FRAME_TYPE_MAX_STREAMS_BIDI))
- return 0;
- if ((fail < 0 || fail >= 3)
- && !TEST_uint64_t_eq(max_streams_1, 0x1234))
- return 0;
- if ((fail < 0 || fail >= 8)
- && !TEST_uint64_t_eq(frame_type_2, OSSL_QUIC_FRAME_TYPE_MAX_STREAMS_UNI))
- return 0;
- if ((fail < 0 || fail >= 8)
- && !TEST_uint64_t_eq(max_streams_2, 0x9781))
- return 0;
- return 1;
- }
- static const unsigned char encode_case_12_expect[] = {
- 0x12, /* Type (MAX_STREAMS Bidirectional) */
- 0x52, 0x34, /* Max Streams */
- 0x13, /* Type (MAX_STREAMS Unidirectional) */
- 0x80, 0x00, 0x97, 0x81, /* Max Streams */
- };
- /* 13. DATA_BLOCKED */
- static int encode_case_13_enc(WPACKET *pkt)
- {
- if (!TEST_int_eq(ossl_quic_wire_encode_frame_data_blocked(pkt, 0x1234), 1))
- return 0;
- return 1;
- }
- static int encode_case_13_dec(PACKET *pkt, ossl_ssize_t fail)
- {
- uint64_t max_data = 0;
- if (!TEST_int_eq(ossl_quic_wire_decode_frame_data_blocked(pkt,
- &max_data), fail < 0))
- return 0;
- if (fail >= 0)
- return 1;
- if (!TEST_uint64_t_eq(max_data, 0x1234))
- return 0;
- return 1;
- }
- static const unsigned char encode_case_13_expect[] = {
- 0x14, /* Type */
- 0x52, 0x34, /* Max Data */
- };
- /* 14. STREAM_DATA_BLOCKED */
- static int encode_case_14_enc(WPACKET *pkt)
- {
- if (!TEST_int_eq(ossl_quic_wire_encode_frame_stream_data_blocked(pkt,
- 0x1234,
- 0x9781), 1))
- return 0;
- return 1;
- }
- static int encode_case_14_dec(PACKET *pkt, ossl_ssize_t fail)
- {
- uint64_t stream_id = 0, max_data = 0;
- if (!TEST_int_eq(ossl_quic_wire_decode_frame_stream_data_blocked(pkt,
- &stream_id,
- &max_data), fail < 0))
- return 0;
- if (fail >= 0)
- return 1;
- if (!TEST_uint64_t_eq(stream_id, 0x1234))
- return 0;
- if (!TEST_uint64_t_eq(max_data, 0x9781))
- return 0;
- return 1;
- }
- static const unsigned char encode_case_14_expect[] = {
- 0x15, /* Type */
- 0x52, 0x34, /* Stream ID */
- 0x80, 0x00, 0x97, 0x81, /* Max Data */
- };
- /* 15. STREAMS_BLOCKED */
- static int encode_case_15_enc(WPACKET *pkt)
- {
- if (!TEST_int_eq(ossl_quic_wire_encode_frame_streams_blocked(pkt, 0, 0x1234), 1))
- return 0;
- if (!TEST_int_eq(ossl_quic_wire_encode_frame_streams_blocked(pkt, 1, 0x9781), 1))
- return 0;
- return 1;
- }
- static int encode_case_15_dec(PACKET *pkt, ossl_ssize_t fail)
- {
- uint64_t max_streams_1 = 0, max_streams_2 = 0,
- frame_type_1 = 0, frame_type_2 = 0;
- int is_minimal = 1, success_if;
- success_if = (fail < 0 || fail >= 1);
- if (!TEST_int_eq(ossl_quic_wire_peek_frame_header(pkt, &frame_type_1,
- &is_minimal),
- success_if))
- return 0;
- if (!TEST_true(!success_if || is_minimal))
- return 0;
- success_if = (fail < 0 || fail >= 3);
- if (!TEST_int_eq(ossl_quic_wire_decode_frame_streams_blocked(pkt,
- &max_streams_1),
- success_if))
- return 0;
- success_if = (fail < 0 || fail >= 4);
- if (!TEST_int_eq(ossl_quic_wire_peek_frame_header(pkt, &frame_type_2,
- &is_minimal),
- success_if))
- return 0;
- if (!TEST_true(!success_if || is_minimal))
- return 0;
- if (!TEST_int_eq(ossl_quic_wire_decode_frame_streams_blocked(pkt,
- &max_streams_2),
- fail < 0 || fail >= 8))
- return 0;
- if ((fail < 0 || fail >= 1)
- && !TEST_uint64_t_eq(frame_type_1, OSSL_QUIC_FRAME_TYPE_STREAMS_BLOCKED_BIDI))
- return 0;
- if ((fail < 0 || fail >= 3)
- && !TEST_uint64_t_eq(max_streams_1, 0x1234))
- return 0;
- if ((fail < 0 || fail >= 4)
- && !TEST_uint64_t_eq(frame_type_2, OSSL_QUIC_FRAME_TYPE_STREAMS_BLOCKED_UNI))
- return 0;
- if ((fail < 0 || fail >= 8)
- && !TEST_uint64_t_eq(max_streams_2, 0x9781))
- return 0;
- return 1;
- }
- static const unsigned char encode_case_15_expect[] = {
- 0x16, /* Type (STREAMS_BLOCKED Bidirectional) */
- 0x52, 0x34, /* Max Streams */
- 0x17, /* Type (STREAMS_BLOCKED Unidirectional) */
- 0x80, 0x00, 0x97, 0x81, /* Max Streams */
- };
- /* 16. NEW_CONNECTION_ID */
- static const unsigned char encode_case_16_conn_id[] = {
- 0x33, 0x44, 0x55, 0x66
- };
- static const OSSL_QUIC_FRAME_NEW_CONN_ID encode_case_16_f = {
- 0x9781,
- 0x1234,
- {
- 0x4,
- {0x33, 0x44, 0x55, 0x66}
- },
- {
- {
- 0xde, 0x06, 0xcb, 0x76, 0x5d, 0xb1, 0xa7, 0x71,
- 0x78, 0x09, 0xbb, 0xe8, 0x50, 0x19, 0x12, 0x9a
- }
- }
- };
- static int encode_case_16_enc(WPACKET *pkt)
- {
- if (!TEST_int_eq(ossl_quic_wire_encode_frame_new_conn_id(pkt,
- &encode_case_16_f), 1))
- return 0;
- return 1;
- }
- static int encode_case_16_dec(PACKET *pkt, ossl_ssize_t fail)
- {
- OSSL_QUIC_FRAME_NEW_CONN_ID f = {0};
- if (!TEST_int_eq(ossl_quic_wire_decode_frame_new_conn_id(pkt, &f), fail < 0))
- return 0;
- if (fail >= 0)
- return 1;
- if (!TEST_uint64_t_eq(f.seq_num, 0x9781))
- return 0;
- if (!TEST_uint64_t_eq(f.retire_prior_to, 0x1234))
- return 0;
- if (!TEST_uint64_t_eq(f.conn_id.id_len, sizeof(encode_case_16_conn_id)))
- return 0;
- if (!TEST_mem_eq(f.conn_id.id, f.conn_id.id_len,
- encode_case_16_conn_id, sizeof(encode_case_16_conn_id)))
- return 0;
- if (!TEST_mem_eq(f.stateless_reset.token,
- sizeof(f.stateless_reset.token),
- encode_case_16_f.stateless_reset.token,
- sizeof(encode_case_16_f.stateless_reset.token)))
- return 0;
- return 1;
- }
- static const unsigned char encode_case_16_expect[] = {
- 0x18, /* Type */
- 0x80, 0x00, 0x97, 0x81, /* Sequence Number */
- 0x52, 0x34, /* Retire Prior To */
- 0x04, /* Connection ID Length */
- 0x33, 0x44, 0x55, 0x66, /* Connection ID */
- 0xde, 0x06, 0xcb, 0x76, 0x5d, 0xb1, 0xa7, 0x71, /* Stateless Reset Token */
- 0x78, 0x09, 0xbb, 0xe8, 0x50, 0x19, 0x12, 0x9a
- };
- /* 16b. NEW_CONNECTION_ID seq_num < retire_prior_to */
- static const OSSL_QUIC_FRAME_NEW_CONN_ID encode_case_16b_f = {
- 0x1234,
- 0x9781,
- {
- 0x4,
- {0x33, 0x44, 0x55, 0x66}
- },
- {
- {
- 0xde, 0x06, 0xcb, 0x76, 0x5d, 0xb1, 0xa7, 0x71,
- 0x78, 0x09, 0xbb, 0xe8, 0x50, 0x19, 0x12, 0x9a
- }
- }
- };
- static int encode_case_16b_enc(WPACKET *pkt)
- {
- if (!TEST_int_eq(ossl_quic_wire_encode_frame_new_conn_id(pkt,
- &encode_case_16b_f), 1))
- return 0;
- return 1;
- }
- static int encode_case_16b_dec(PACKET *pkt, ossl_ssize_t fail)
- {
- OSSL_QUIC_FRAME_NEW_CONN_ID f = {0};
- if (!TEST_int_eq(ossl_quic_wire_decode_frame_new_conn_id(pkt, &f), 0))
- return 0;
- if (!TEST_true(PACKET_forward(pkt, PACKET_remaining(pkt))))
- return 0;
- return 1;
- }
- static const unsigned char encode_case_16b_expect[] = {
- 0x18, /* Type */
- 0x52, 0x34, /* Sequence Number */
- 0x80, 0x00, 0x97, 0x81, /* Retire Prior To */
- 0x04, /* Connection ID Length */
- 0x33, 0x44, 0x55, 0x66, /* Connection ID */
- 0xde, 0x06, 0xcb, 0x76, 0x5d, 0xb1, 0xa7, 0x71, /* Stateless Reset Token */
- 0x78, 0x09, 0xbb, 0xe8, 0x50, 0x19, 0x12, 0x9a
- };
- /* 17. RETIRE_CONNECTION_ID */
- static int encode_case_17_enc(WPACKET *pkt)
- {
- if (!TEST_int_eq(ossl_quic_wire_encode_frame_retire_conn_id(pkt, 0x1234), 1))
- return 0;
- return 1;
- }
- static int encode_case_17_dec(PACKET *pkt, ossl_ssize_t fail)
- {
- uint64_t seq_num = 0;
- if (!TEST_int_eq(ossl_quic_wire_decode_frame_retire_conn_id(pkt, &seq_num), fail < 0))
- return 0;
- if (fail >= 0)
- return 1;
- if (!TEST_uint64_t_eq(seq_num, 0x1234))
- return 0;
- return 1;
- }
- static const unsigned char encode_case_17_expect[] = {
- 0x19, /* Type */
- 0x52, 0x34, /* Seq Num */
- };
- /* 18. PATH_CHALLENGE */
- static const uint64_t encode_case_18_data
- = (((uint64_t)0x5f4b12)<<40) | (uint64_t)0x731834UL;
- static int encode_case_18_enc(WPACKET *pkt)
- {
- if (!TEST_int_eq(ossl_quic_wire_encode_frame_path_challenge(pkt,
- encode_case_18_data), 1))
- return 0;
- return 1;
- }
- static int encode_case_18_dec(PACKET *pkt, ossl_ssize_t fail)
- {
- uint64_t challenge = 0;
- if (!TEST_int_eq(ossl_quic_wire_decode_frame_path_challenge(pkt, &challenge), fail < 0))
- return 0;
- if (fail >= 0)
- return 1;
- if (!TEST_uint64_t_eq(challenge, encode_case_18_data))
- return 0;
- return 1;
- }
- static const unsigned char encode_case_18_expect[] = {
- 0x1A, /* Type */
- 0x5f, 0x4b, 0x12, 0x00, 0x00, 0x73, 0x18, 0x34, /* Data */
- };
- /* 19. PATH_RESPONSE */
- static const uint64_t encode_case_19_data
- = (((uint64_t)0x5f4b12)<<40) | (uint64_t)0x731834UL;
- static int encode_case_19_enc(WPACKET *pkt)
- {
- if (!TEST_int_eq(ossl_quic_wire_encode_frame_path_response(pkt,
- encode_case_19_data), 1))
- return 0;
- return 1;
- }
- static int encode_case_19_dec(PACKET *pkt, ossl_ssize_t fail)
- {
- uint64_t challenge = 0;
- if (!TEST_int_eq(ossl_quic_wire_decode_frame_path_response(pkt, &challenge), fail < 0))
- return 0;
- if (fail >= 0)
- return 1;
- if (!TEST_uint64_t_eq(challenge, encode_case_19_data))
- return 0;
- return 1;
- }
- static const unsigned char encode_case_19_expect[] = {
- 0x1B, /* Type */
- 0x5f, 0x4b, 0x12, 0x00, 0x00, 0x73, 0x18, 0x34, /* Data */
- };
- /* 20. CONNECTION_CLOSE (transport) */
- static const char encode_case_20_reason[] = {
- /* "reason for closure" */
- 0x72, 0x65, 0x61, 0x73, 0x6f, 0x6e, 0x20, 0x66, 0x6f,
- 0x72, 0x20, 0x63, 0x6c, 0x6f, 0x73, 0x75, 0x72, 0x65
- };
- static const OSSL_QUIC_FRAME_CONN_CLOSE encode_case_20_f = {
- 0,
- 0x1234,
- 0x9781,
- (char *)encode_case_20_reason,
- sizeof(encode_case_20_reason)
- };
- static int encode_case_20_enc(WPACKET *pkt)
- {
- if (!TEST_int_eq(ossl_quic_wire_encode_frame_conn_close(pkt,
- &encode_case_20_f), 1))
- return 0;
- return 1;
- }
- static int encode_case_20_dec(PACKET *pkt, ossl_ssize_t fail)
- {
- OSSL_QUIC_FRAME_CONN_CLOSE f = {0};
- if (!TEST_int_eq(ossl_quic_wire_decode_frame_conn_close(pkt, &f), fail < 0))
- return 0;
- if (fail >= 0)
- return 1;
- if (!TEST_int_eq(f.is_app, 0))
- return 0;
- if (!TEST_uint64_t_eq(f.error_code, 0x1234))
- return 0;
- if (!TEST_uint64_t_eq(f.frame_type, 0x9781))
- return 0;
- if (!TEST_size_t_eq(f.reason_len, 18))
- return 0;
- if (!TEST_mem_eq(f.reason, f.reason_len,
- encode_case_20_f.reason, encode_case_20_f.reason_len))
- return 0;
- return 1;
- }
- static const unsigned char encode_case_20_expect[] = {
- 0x1C, /* Type */
- 0x52, 0x34, /* Sequence Number */
- 0x80, 0x00, 0x97, 0x81, /* Frame Type */
- 0x12, /* Reason Length */
- 0x72, 0x65, 0x61, 0x73, 0x6f, 0x6e, 0x20, 0x66, 0x6f, /* Reason */
- 0x72, 0x20, 0x63, 0x6c, 0x6f, 0x73, 0x75, 0x72, 0x65
- };
- /* 21. HANDSHAKE_DONE */
- static int encode_case_21_enc(WPACKET *pkt)
- {
- if (!TEST_int_eq(ossl_quic_wire_encode_frame_handshake_done(pkt), 1))
- return 0;
- return 1;
- }
- static int encode_case_21_dec(PACKET *pkt, ossl_ssize_t fail)
- {
- if (!TEST_int_eq(ossl_quic_wire_decode_frame_handshake_done(pkt), fail < 0))
- return 0;
- return 1;
- }
- static const unsigned char encode_case_21_expect[] = {
- 0x1E
- };
- /* 22. Buffer Transport Parameter */
- static const unsigned char encode_case_22_data[] = {0x55,0x77,0x32,0x46,0x99};
- static int encode_case_22_enc(WPACKET *pkt)
- {
- unsigned char *p;
- if (!TEST_ptr(ossl_quic_wire_encode_transport_param_bytes(pkt, 0x1234,
- encode_case_22_data,
- sizeof(encode_case_22_data))))
- return 0;
- if (!TEST_ptr(p = ossl_quic_wire_encode_transport_param_bytes(pkt, 0x9781,
- NULL, 2)))
- return 0;
- p[0] = 0x33;
- p[1] = 0x44;
- return 1;
- }
- static int encode_case_22_dec(PACKET *pkt, ossl_ssize_t fail)
- {
- uint64_t id = 0;
- size_t len = 0;
- const unsigned char *p;
- static const unsigned char data[] = {0x33, 0x44};
- if (!TEST_int_eq(ossl_quic_wire_peek_transport_param(pkt, &id),
- fail < 0 || fail >= 2))
- return 0;
- if ((fail < 0 || fail >= 2)
- && !TEST_uint64_t_eq(id, 0x1234))
- return 0;
- id = 0;
- p = ossl_quic_wire_decode_transport_param_bytes(pkt, &id, &len);
- if (fail < 0 || fail >= 8) {
- if (!TEST_ptr(p))
- return 0;
- } else {
- if (!TEST_ptr_null(p))
- return 0;
- }
- if ((fail < 0 || fail >= 8)
- && !TEST_uint64_t_eq(id, 0x1234))
- return 0;
- if ((fail < 0 || fail >= 8)
- && !TEST_mem_eq(p, len, encode_case_22_data, sizeof(encode_case_22_data)))
- return 0;
- if ((fail < 0 || fail >= 8)
- && !TEST_int_eq(ossl_quic_wire_peek_transport_param(pkt, &id),
- fail < 0 || fail >= 12))
- return 0;
- if ((fail < 0 || fail >= 12)
- && !TEST_uint64_t_eq(id, 0x9781))
- return 0;
- id = 0;
- p = ossl_quic_wire_decode_transport_param_bytes(pkt, &id, &len);
- if (fail < 0 || fail >= 15) {
- if (!TEST_ptr(p))
- return 0;
- } else {
- if (!TEST_ptr_null(p))
- return 0;
- }
- if ((fail < 0 || fail >= 15)
- && !TEST_uint64_t_eq(id, 0x9781))
- return 0;
- if ((fail < 0 || fail >= 15)
- && !TEST_mem_eq(p, len, data, sizeof(data)))
- return 0;
- return 1;
- }
- static const unsigned char encode_case_22_expect[] = {
- 0x52, 0x34, /* ID */
- 0x05, /* Length */
- 0x55, 0x77, 0x32, 0x46, 0x99, /* Data */
- 0x80, 0x00, 0x97, 0x81, /* ID */
- 0x02, /* Length */
- 0x33, 0x44 /* Data */
- };
- /* 23. Integer Transport Parameter */
- static int encode_case_23_enc(WPACKET *pkt)
- {
- if (!TEST_int_eq(ossl_quic_wire_encode_transport_param_int(pkt, 0x1234, 0x9781), 1))
- return 0;
- if (!TEST_int_eq(ossl_quic_wire_encode_transport_param_int(pkt, 0x2233, 0x4545), 1))
- return 0;
- return 1;
- }
- static int encode_case_23_dec(PACKET *pkt, ossl_ssize_t fail)
- {
- uint64_t id = 0, value = 0;
- if (!TEST_int_eq(ossl_quic_wire_decode_transport_param_int(pkt,
- &id, &value),
- fail < 0 || fail >= 7))
- return 0;
- if ((fail < 0 || fail >= 7)
- && !TEST_uint64_t_eq(id, 0x1234))
- return 0;
- if ((fail < 0 || fail >= 7)
- && !TEST_uint64_t_eq(value, 0x9781))
- return 0;
- if (!TEST_int_eq(ossl_quic_wire_decode_transport_param_int(pkt,
- &id, &value),
- fail < 0 || fail >= 14))
- return 0;
- if ((fail < 0 || fail >= 14)
- && !TEST_uint64_t_eq(id, 0x2233))
- return 0;
- if ((fail < 0 || fail >= 14)
- && !TEST_uint64_t_eq(value, 0x4545))
- return 0;
- return 1;
- }
- static const unsigned char encode_case_23_expect[] = {
- 0x52, 0x34,
- 0x04,
- 0x80, 0x00, 0x97, 0x81,
- 0x62, 0x33,
- 0x04,
- 0x80, 0x00, 0x45, 0x45,
- };
- #define ENCODE_CASE(n) \
- { \
- encode_case_##n##_enc, \
- encode_case_##n##_expect, \
- OSSL_NELEM(encode_case_##n##_expect), \
- encode_case_##n##_dec \
- },
- static const struct encode_test_case encode_cases[] = {
- ENCODE_CASE(1)
- ENCODE_CASE(2)
- ENCODE_CASE(3)
- ENCODE_CASE(4)
- ENCODE_CASE(5)
- ENCODE_CASE(6)
- ENCODE_CASE(7)
- ENCODE_CASE(8)
- ENCODE_CASE(9)
- ENCODE_CASE(10)
- ENCODE_CASE(11)
- ENCODE_CASE(12)
- ENCODE_CASE(13)
- ENCODE_CASE(14)
- ENCODE_CASE(15)
- ENCODE_CASE(16)
- ENCODE_CASE(16b)
- ENCODE_CASE(17)
- ENCODE_CASE(18)
- ENCODE_CASE(19)
- ENCODE_CASE(20)
- ENCODE_CASE(21)
- ENCODE_CASE(22)
- ENCODE_CASE(23)
- };
- static int test_wire_encode(int idx)
- {
- int testresult = 0;
- WPACKET wpkt;
- PACKET pkt;
- BUF_MEM *buf = NULL;
- size_t written;
- const struct encode_test_case *c = &encode_cases[idx];
- int have_wpkt = 0;
- size_t i;
- if (!TEST_ptr(buf = BUF_MEM_new()))
- goto err;
- if (!TEST_int_eq(WPACKET_init(&wpkt, buf), 1))
- goto err;
- have_wpkt = 1;
- if (!TEST_int_eq(c->serializer(&wpkt), 1))
- goto err;
- if (!TEST_int_eq(WPACKET_get_total_written(&wpkt, &written), 1))
- goto err;
- if (!TEST_mem_eq(buf->data, written, c->expect_buf, c->expect_buf_len))
- goto err;
- if (!TEST_int_eq(PACKET_buf_init(&pkt, (unsigned char *)buf->data, written), 1))
- goto err;
- if (!TEST_int_eq(c->deserializer(&pkt, -1), 1))
- goto err;
- if (!TEST_false(PACKET_remaining(&pkt)))
- goto err;
- for (i = 0; i < c->expect_buf_len; ++i) {
- PACKET pkt2;
- /*
- * Check parsing truncated (i.e., malformed) input is handled correctly.
- * Generate all possible truncations of our reference encoding and
- * verify that they are handled correctly. The number of bytes of the
- * truncated encoding is passed as an argument to the deserializer to
- * help it determine whether decoding should fail or not.
- */
- if (!TEST_int_eq(PACKET_buf_init(&pkt2, (unsigned char *)c->expect_buf, i), 1))
- goto err;
- if (!TEST_int_eq(c->deserializer(&pkt2, i), 1))
- goto err;
- }
- testresult = 1;
- err:
- if (have_wpkt)
- WPACKET_finish(&wpkt);
- BUF_MEM_free(buf);
- return testresult;
- }
- struct ack_test_case {
- const unsigned char *input_buf;
- size_t input_buf_len;
- int (*deserializer)(PACKET *pkt);
- int expect_fail;
- };
- /* ACK Frame with Excessive First ACK Range Field */
- static const unsigned char ack_case_1_input[] = {
- 0x02, /* ACK Without ECN */
- 0x08, /* Largest Acknowledged */
- 0x01, /* ACK Delay */
- 0x00, /* ACK Range Count */
- 0x09, /* First ACK Range */
- };
- /* ACK Frame with Valid ACK Range Field */
- static const unsigned char ack_case_2_input[] = {
- 0x02, /* ACK Without ECN */
- 0x08, /* Largest Acknowledged */
- 0x01, /* ACK Delay */
- 0x00, /* ACK Range Count */
- 0x08, /* First ACK Range */
- };
- /* ACK Frame with Excessive ACK Range Gap */
- static const unsigned char ack_case_3_input[] = {
- 0x02, /* ACK Without ECN */
- 0x08, /* Largest Acknowledged */
- 0x01, /* ACK Delay */
- 0x01, /* ACK Range Count */
- 0x01, /* First ACK Range */
- 0x05, /* Gap */
- 0x01, /* ACK Range Length */
- };
- /* ACK Frame with Valid ACK Range */
- static const unsigned char ack_case_4_input[] = {
- 0x02, /* ACK Without ECN */
- 0x08, /* Largest Acknowledged */
- 0x01, /* ACK Delay */
- 0x01, /* ACK Range Count */
- 0x01, /* First ACK Range */
- 0x04, /* Gap */
- 0x01, /* ACK Range Length */
- };
- /* ACK Frame with Excessive ACK Range Length */
- static const unsigned char ack_case_5_input[] = {
- 0x02, /* ACK Without ECN */
- 0x08, /* Largest Acknowledged */
- 0x01, /* ACK Delay */
- 0x01, /* ACK Range Count */
- 0x01, /* First ACK Range */
- 0x04, /* Gap */
- 0x02, /* ACK Range Length */
- };
- /* ACK Frame with Multiple ACK Ranges, Final Having Excessive Length */
- static const unsigned char ack_case_6_input[] = {
- 0x02, /* ACK Without ECN */
- 0x08, /* Largest Acknowledged */
- 0x01, /* ACK Delay */
- 0x02, /* ACK Range Count */
- 0x01, /* First ACK Range */
- 0x01, /* Gap */
- 0x02, /* ACK Range Length */
- 0x00, /* Gap */
- 0x01, /* ACK Range Length */
- };
- /* ACK Frame with Multiple ACK Ranges, Valid */
- static const unsigned char ack_case_7_input[] = {
- 0x02, /* ACK Without ECN */
- 0x08, /* Largest Acknowledged */
- 0x01, /* ACK Delay */
- 0x02, /* ACK Range Count */
- 0x01, /* First ACK Range */
- 0x01, /* Gap */
- 0x02, /* ACK Range Length */
- 0x00, /* Gap */
- 0x00, /* ACK Range Length */
- };
- static int ack_generic_decode(PACKET *pkt)
- {
- OSSL_QUIC_ACK_RANGE ranges[8] = {0};
- OSSL_QUIC_FRAME_ACK f = {0};
- uint64_t total_ranges = 0, peek_total_ranges = 0;
- int r;
- size_t i;
- f.ack_ranges = ranges;
- f.num_ack_ranges = OSSL_NELEM(ranges);
- if (!TEST_int_eq(ossl_quic_wire_peek_frame_ack_num_ranges(pkt,
- &peek_total_ranges), 1))
- return 0;
- r = ossl_quic_wire_decode_frame_ack(pkt, 3, &f, &total_ranges);
- if (r == 0)
- return 0;
- if (!TEST_uint64_t_eq(total_ranges, peek_total_ranges))
- return 0;
- for (i = 0; i < f.num_ack_ranges; ++i) {
- if (!TEST_uint64_t_le(f.ack_ranges[i].start, f.ack_ranges[i].end))
- return 0;
- if (!TEST_uint64_t_lt(f.ack_ranges[i].end, 1000))
- return 0;
- }
- return 1;
- }
- #define ACK_CASE(n, expect_fail, dec) \
- { \
- ack_case_##n##_input, \
- sizeof(ack_case_##n##_input), \
- (dec), \
- (expect_fail) \
- },
- static const struct ack_test_case ack_cases[] = {
- ACK_CASE(1, 1, ack_generic_decode)
- ACK_CASE(2, 0, ack_generic_decode)
- ACK_CASE(3, 1, ack_generic_decode)
- ACK_CASE(4, 0, ack_generic_decode)
- ACK_CASE(5, 1, ack_generic_decode)
- ACK_CASE(6, 1, ack_generic_decode)
- ACK_CASE(7, 0, ack_generic_decode)
- };
- static int test_wire_ack(int idx)
- {
- int testresult = 0, r;
- PACKET pkt;
- const struct ack_test_case *c = &ack_cases[idx];
- if (!TEST_int_eq(PACKET_buf_init(&pkt,
- (unsigned char *)c->input_buf,
- c->input_buf_len), 1))
- goto err;
- r = c->deserializer(&pkt);
- if (c->expect_fail) {
- if (!TEST_int_eq(r, 0))
- goto err;
- } else {
- if (!TEST_int_eq(r, 1))
- goto err;
- if (!TEST_false(PACKET_remaining(&pkt)))
- goto err;
- }
- testresult = 1;
- err:
- return testresult;
- }
- /* Packet Header PN Encoding Tests */
- struct pn_test {
- QUIC_PN pn, tx_largest_acked, rx_largest_pn;
- char expected_len;
- unsigned char expected_bytes[4];
- };
- static const struct pn_test pn_tests[] = {
- /* RFC 9000 Section A.2 */
- { 0xac5c02, 0xabe8b3, 0xabe8b3, 2, {0x5c,0x02} },
- { 0xace8fe, 0xabe8b3, 0xabe8b3, 3, {0xac,0xe8,0xfe} },
- /* RFC 9000 Section A.3 */
- { 0xa82f9b32, 0xa82f30ea, 0xa82f30ea, 2, {0x9b,0x32} },
- /* Boundary Cases */
- { 1, 0, 0, 1, {0x01} },
- { 256, 255, 255, 1, {0x00} },
- { 257, 255, 255, 1, {0x01} },
- { 256, 128, 128, 1, {0x00} },
- { 256, 127, 127, 2, {0x01,0x00} },
- { 65536, 32768, 32768, 2, {0x00,0x00} },
- { 65537, 32769, 32769, 2, {0x00,0x01} },
- { 65536, 32767, 32767, 3, {0x01,0x00,0x00} },
- { 65537, 32768, 32768, 3, {0x01,0x00,0x01} },
- { 16777216, 8388608, 8388608, 3, {0x00,0x00,0x00} },
- { 16777217, 8388609, 8388609, 3, {0x00,0x00,0x01} },
- { 16777216, 8388607, 8388607, 4, {0x01,0x00,0x00,0x00} },
- { 16777217, 8388608, 8388608, 4, {0x01,0x00,0x00,0x01} },
- { 4294967296, 2147483648, 2147483648, 4, {0x00,0x00,0x00,0x00} },
- { 4294967297, 2147483648, 2147483648, 4, {0x00,0x00,0x00,0x01} },
- };
- static int test_wire_pkt_hdr_pn(int tidx)
- {
- int testresult = 0;
- const struct pn_test *t = &pn_tests[tidx];
- unsigned char buf[4];
- int pn_len;
- QUIC_PN res_pn;
- pn_len = ossl_quic_wire_determine_pn_len(t->pn, t->tx_largest_acked);
- if (!TEST_int_eq(pn_len, (int)t->expected_len))
- goto err;
- if (!TEST_true(ossl_quic_wire_encode_pkt_hdr_pn(t->pn, buf, pn_len)))
- goto err;
- if (!TEST_mem_eq(t->expected_bytes, t->expected_len, buf, pn_len))
- goto err;
- if (!TEST_true(ossl_quic_wire_decode_pkt_hdr_pn(buf, pn_len,
- t->rx_largest_pn, &res_pn)))
- goto err;
- if (!TEST_uint64_t_eq(res_pn, t->pn))
- goto err;
- testresult = 1;
- err:
- return testresult;
- }
- /* RFC 9001 s. A.4 */
- static const QUIC_CONN_ID retry_orig_dcid = {
- 8, { 0x83, 0x94, 0xc8, 0xf0, 0x3e, 0x51, 0x57, 0x08 }
- };
- static const unsigned char retry_encoded[] = {
- 0xff, /* Long Header, Retry */
- 0x00, 0x00, 0x00, 0x01, /* Version 1 */
- 0x00, /* DCID */
- 0x08, 0xf0, 0x67, 0xa5, 0x50, 0x2a, 0x42, 0x62, 0xb5, /* SCID */
- /* Retry Token */
- 0x74, 0x6f, 0x6b, 0x65, 0x6e,
- /* Retry Integrity Tag */
- 0x04, 0xa2, 0x65, 0xba, 0x2e, 0xff, 0x4d, 0x82, 0x90, 0x58, 0xfb, 0x3f, 0x0f,
- 0x24, 0x96, 0xba
- };
- static int test_wire_retry_integrity_tag(void)
- {
- int testresult = 0;
- PACKET pkt = {0};
- QUIC_PKT_HDR hdr = {0};
- unsigned char got_tag[QUIC_RETRY_INTEGRITY_TAG_LEN] = {0};
- if (!TEST_true(PACKET_buf_init(&pkt, retry_encoded, sizeof(retry_encoded))))
- goto err;
- if (!TEST_true(ossl_quic_wire_decode_pkt_hdr(&pkt, 0, 0, 0, &hdr, NULL)))
- goto err;
- if (!TEST_int_eq(hdr.type, QUIC_PKT_TYPE_RETRY))
- goto err;
- if (!TEST_true(ossl_quic_calculate_retry_integrity_tag(NULL, NULL, &hdr,
- &retry_orig_dcid,
- got_tag)))
- goto err;
- if (!TEST_mem_eq(got_tag, sizeof(got_tag),
- retry_encoded + sizeof(retry_encoded)
- - QUIC_RETRY_INTEGRITY_TAG_LEN,
- QUIC_RETRY_INTEGRITY_TAG_LEN))
- goto err;
- if (!TEST_true(ossl_quic_validate_retry_integrity_tag(NULL, NULL, &hdr,
- &retry_orig_dcid)))
- goto err;
- testresult = 1;
- err:
- return testresult;
- }
- /* is_minimal=0 test */
- static const unsigned char non_minimal_1[] = {
- 0x40, 0x00,
- };
- static const unsigned char non_minimal_2[] = {
- 0x40, 0x3F,
- };
- static const unsigned char non_minimal_3[] = {
- 0x80, 0x00, 0x00, 0x00,
- };
- static const unsigned char non_minimal_4[] = {
- 0x80, 0x00, 0x3F, 0xFF,
- };
- static const unsigned char non_minimal_5[] = {
- 0xC0, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
- };
- static const unsigned char non_minimal_6[] = {
- 0xC0, 0x00, 0x00, 0x00, 0x3F, 0xFF, 0xFF, 0xFF
- };
- static const unsigned char *const non_minimal[] = {
- non_minimal_1,
- non_minimal_2,
- non_minimal_3,
- non_minimal_4,
- non_minimal_5,
- non_minimal_6,
- };
- static const size_t non_minimal_len[] = {
- OSSL_NELEM(non_minimal_1),
- OSSL_NELEM(non_minimal_2),
- OSSL_NELEM(non_minimal_3),
- OSSL_NELEM(non_minimal_4),
- OSSL_NELEM(non_minimal_5),
- OSSL_NELEM(non_minimal_6),
- };
- static int test_wire_minimal(int idx)
- {
- int testresult = 0;
- int is_minimal;
- uint64_t frame_type;
- PACKET pkt;
- if (!TEST_true(PACKET_buf_init(&pkt, non_minimal[idx],
- non_minimal_len[idx])))
- goto err;
- if (!TEST_true(ossl_quic_wire_peek_frame_header(&pkt, &frame_type,
- &is_minimal)))
- goto err;
- if (!TEST_false(is_minimal))
- goto err;
- testresult = 1;
- err:
- return testresult;
- }
- int setup_tests(void)
- {
- ADD_ALL_TESTS(test_wire_encode, OSSL_NELEM(encode_cases));
- ADD_ALL_TESTS(test_wire_ack, OSSL_NELEM(ack_cases));
- ADD_ALL_TESTS(test_wire_pkt_hdr_pn, OSSL_NELEM(pn_tests));
- ADD_TEST(test_wire_retry_integrity_tag);
- ADD_ALL_TESTS(test_wire_minimal, OSSL_NELEM(non_minimal_len));
- return 1;
- }
|