// // // Copyright 2015 gRPC authors. // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. // // #include "src/core/ext/transport/chttp2/alpn/alpn.h" #include #include #include #include #include #include "src/core/lib/gpr/useful.h" #include "src/core/lib/iomgr/error.h" #include "test/core/bad_ssl/server_common.h" #include "test/core/util/tls_utils.h" #define CA_CERT_PATH "src/core/tsi/test_creds/ca.pem" #define SERVER_CERT_PATH "src/core/tsi/test_creds/server1.pem" #define SERVER_KEY_PATH "src/core/tsi/test_creds/server1.key" // This test starts a server that is configured to advertise (via alpn and npn) // a protocol that the connecting client does not support. It does this by // overriding the functions declared in alpn.c from the core library. static const char* const fake_versions[] = {"not-h2"}; int grpc_chttp2_is_alpn_version_supported(const char* version, size_t size) { size_t i; for (i = 0; i < GPR_ARRAY_SIZE(fake_versions); i++) { if (!strncmp(version, fake_versions[i], size)) return 1; } return 0; } size_t grpc_chttp2_num_alpn_versions(void) { return GPR_ARRAY_SIZE(fake_versions); } const char* grpc_chttp2_get_alpn_version_index(size_t i) { GPR_ASSERT(i < GPR_ARRAY_SIZE(fake_versions)); return fake_versions[i]; } int main(int argc, char** argv) { const char* addr = bad_ssl_addr(argc, argv); std::string server_cert = grpc_core::testing::GetFileContents(SERVER_CERT_PATH); std::string server_key = grpc_core::testing::GetFileContents(SERVER_KEY_PATH); grpc_ssl_pem_key_cert_pair pem_key_cert_pair = {server_key.c_str(), server_cert.c_str()}; grpc_server_credentials* ssl_creds; grpc_server* server; grpc_init(); ssl_creds = grpc_ssl_server_credentials_create(nullptr, &pem_key_cert_pair, 1, 0, nullptr); server = grpc_server_create(nullptr, nullptr); GPR_ASSERT(grpc_server_add_http2_port(server, addr, ssl_creds)); grpc_server_credentials_release(ssl_creds); bad_ssl_run(server); grpc_shutdown(); return 0; }