1 /*
2 *
3 * Copyright 2016 gRPC authors.
4 *
5 * Licensed under the Apache License, Version 2.0 (the "License");
6 * you may not use this file except in compliance with the License.
7 * You may obtain a copy of the License at
8 *
9 * http://www.apache.org/licenses/LICENSE-2.0
10 *
11 * Unless required by applicable law or agreed to in writing, software
12 * distributed under the License is distributed on an "AS IS" BASIS,
13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 * See the License for the specific language governing permissions and
15 * limitations under the License.
16 *
17 */
18
19 #include <arpa/inet.h>
20 #include <openssl/err.h>
21 #include <openssl/ssl.h>
22 #include <string.h>
23 #include <sys/socket.h>
24 #include <unistd.h>
25
26 #include <grpc/grpc.h>
27 #include <grpc/grpc_security.h>
28 #include <grpc/support/alloc.h>
29 #include <grpc/support/log.h>
30 #include <grpc/support/string_util.h>
31 #include <grpc/support/sync.h>
32
33 #include "src/core/lib/iomgr/load_file.h"
34 #include "test/core/util/port.h"
35 #include "test/core/util/test_config.h"
36
37 #include "test/core/handshake/server_ssl_common.h"
38
main(int argc,char * argv[])39 int main(int argc, char* argv[]) {
40 // Handshake succeeeds when the client supplies the standard ALPN list.
41 const char* full_alpn_list[] = {"grpc-exp", "h2"};
42 GPR_ASSERT(server_ssl_test(full_alpn_list, 2, "grpc-exp"));
43 // Handshake succeeeds when the client supplies only h2 as the ALPN list. This
44 // covers legacy gRPC clients which don't support grpc-exp.
45 const char* h2_only_alpn_list[] = {"h2"};
46 GPR_ASSERT(server_ssl_test(h2_only_alpn_list, 1, "h2"));
47 // Handshake succeeds when the client supplies superfluous ALPN entries and
48 // also when h2 precedes gprc-exp.
49 const char* extra_alpn_list[] = {"foo", "h2", "bar", "grpc-exp"};
50 GPR_ASSERT(server_ssl_test(extra_alpn_list, 4, "h2"));
51 // Handshake fails when the client uses a fake protocol as its only ALPN
52 // preference. This validates the server is correctly validating ALPN
53 // and sanity checks the server_ssl_test.
54 const char* fake_alpn_list[] = {"foo"};
55 GPR_ASSERT(!server_ssl_test(fake_alpn_list, 1, "foo"));
56 return 0;
57 }
58