• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /* Copyright (c) 2014, Google Inc.
2  *
3  * Permission to use, copy, modify, and/or distribute this software for any
4  * purpose with or without fee is hereby granted, provided that the above
5  * copyright notice and this permission notice appear in all copies.
6  *
7  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
8  * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
9  * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
10  * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
11  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
12  * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
13  * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */
14 
15 #include "test_config.h"
16 
17 #include <stdio.h>
18 #include <stdlib.h>
19 #include <string.h>
20 
21 #include <memory>
22 
23 #include <openssl/base64.h>
24 
25 namespace {
26 
27 template <typename T>
28 struct Flag {
29   const char *flag;
30   T TestConfig::*member;
31 };
32 
33 // FindField looks for the flag in |flags| that matches |flag|. If one is found,
34 // it returns a pointer to the corresponding field in |config|. Otherwise, it
35 // returns NULL.
36 template<typename T, size_t N>
FindField(TestConfig * config,const Flag<T> (& flags)[N],const char * flag)37 T *FindField(TestConfig *config, const Flag<T> (&flags)[N], const char *flag) {
38   for (size_t i = 0; i < N; i++) {
39     if (strcmp(flag, flags[i].flag) == 0) {
40       return &(config->*(flags[i].member));
41     }
42   }
43   return NULL;
44 }
45 
46 const Flag<bool> kBoolFlags[] = {
47   { "-server", &TestConfig::is_server },
48   { "-dtls", &TestConfig::is_dtls },
49   { "-fallback-scsv", &TestConfig::fallback_scsv },
50   { "-require-any-client-certificate",
51     &TestConfig::require_any_client_certificate },
52   { "-false-start", &TestConfig::false_start },
53   { "-async", &TestConfig::async },
54   { "-write-different-record-sizes",
55     &TestConfig::write_different_record_sizes },
56   { "-cbc-record-splitting", &TestConfig::cbc_record_splitting },
57   { "-partial-write", &TestConfig::partial_write },
58   { "-no-tls13", &TestConfig::no_tls13 },
59   { "-no-tls12", &TestConfig::no_tls12 },
60   { "-no-tls11", &TestConfig::no_tls11 },
61   { "-no-tls1", &TestConfig::no_tls1 },
62   { "-no-ssl3", &TestConfig::no_ssl3 },
63   { "-enable-channel-id", &TestConfig::enable_channel_id },
64   { "-shim-writes-first", &TestConfig::shim_writes_first },
65   { "-expect-session-miss", &TestConfig::expect_session_miss },
66   { "-decline-alpn", &TestConfig::decline_alpn },
67   { "-expect-extended-master-secret",
68     &TestConfig::expect_extended_master_secret },
69   { "-enable-ocsp-stapling", &TestConfig::enable_ocsp_stapling },
70   { "-enable-signed-cert-timestamps",
71     &TestConfig::enable_signed_cert_timestamps },
72   { "-implicit-handshake", &TestConfig::implicit_handshake },
73   { "-use-early-callback", &TestConfig::use_early_callback },
74   { "-fail-early-callback", &TestConfig::fail_early_callback },
75   { "-install-ddos-callback", &TestConfig::install_ddos_callback },
76   { "-fail-ddos-callback", &TestConfig::fail_ddos_callback },
77   { "-fail-second-ddos-callback", &TestConfig::fail_second_ddos_callback },
78   { "-fail-cert-callback", &TestConfig::fail_cert_callback },
79   { "-handshake-never-done", &TestConfig::handshake_never_done },
80   { "-use-export-context", &TestConfig::use_export_context },
81   { "-tls-unique", &TestConfig::tls_unique },
82   { "-expect-ticket-renewal", &TestConfig::expect_ticket_renewal },
83   { "-expect-no-session", &TestConfig::expect_no_session },
84   { "-expect-early-data-info", &TestConfig::expect_early_data_info },
85   { "-use-ticket-callback", &TestConfig::use_ticket_callback },
86   { "-renew-ticket", &TestConfig::renew_ticket },
87   { "-enable-early-data", &TestConfig::enable_early_data },
88   { "-enable-client-custom-extension",
89     &TestConfig::enable_client_custom_extension },
90   { "-enable-server-custom-extension",
91     &TestConfig::enable_server_custom_extension },
92   { "-custom-extension-skip", &TestConfig::custom_extension_skip },
93   { "-custom-extension-fail-add", &TestConfig::custom_extension_fail_add },
94   { "-check-close-notify", &TestConfig::check_close_notify },
95   { "-shim-shuts-down", &TestConfig::shim_shuts_down },
96   { "-verify-fail", &TestConfig::verify_fail },
97   { "-verify-peer", &TestConfig::verify_peer },
98   { "-verify-peer-if-no-obc", &TestConfig::verify_peer_if_no_obc },
99   { "-expect-verify-result", &TestConfig::expect_verify_result },
100   { "-renegotiate-once", &TestConfig::renegotiate_once },
101   { "-renegotiate-freely", &TestConfig::renegotiate_freely },
102   { "-renegotiate-ignore", &TestConfig::renegotiate_ignore },
103   { "-p384-only", &TestConfig::p384_only },
104   { "-enable-all-curves", &TestConfig::enable_all_curves },
105   { "-use-old-client-cert-callback",
106     &TestConfig::use_old_client_cert_callback },
107   { "-send-alert", &TestConfig::send_alert },
108   { "-peek-then-read", &TestConfig::peek_then_read },
109   { "-enable-grease", &TestConfig::enable_grease },
110   { "-use-exporter-between-reads", &TestConfig::use_exporter_between_reads },
111   { "-retain-only-sha256-client-cert-initial",
112     &TestConfig::retain_only_sha256_client_cert_initial },
113   { "-retain-only-sha256-client-cert-resume",
114     &TestConfig::retain_only_sha256_client_cert_resume },
115   { "-expect-sha256-client-cert-initial",
116     &TestConfig::expect_sha256_client_cert_initial },
117   { "-expect-sha256-client-cert-resume",
118     &TestConfig::expect_sha256_client_cert_resume },
119   { "-read-with-unfinished-write", &TestConfig::read_with_unfinished_write },
120   { "-expect-secure-renegotiation",
121     &TestConfig::expect_secure_renegotiation },
122   { "-expect-no-secure-renegotiation",
123     &TestConfig::expect_no_secure_renegotiation },
124   { "-expect-session-id", &TestConfig::expect_session_id },
125   { "-expect-no-session-id", &TestConfig::expect_no_session_id },
126   { "-expect-accept-early-data", &TestConfig::expect_accept_early_data },
127   { "-expect-reject-early-data", &TestConfig::expect_reject_early_data },
128   { "-no-op-extra-handshake", &TestConfig::no_op_extra_handshake },
129   { "-handshake-twice", &TestConfig::handshake_twice },
130   { "-allow-unknown-alpn-protos", &TestConfig::allow_unknown_alpn_protos },
131   { "-enable-ed25519", &TestConfig::enable_ed25519 },
132 };
133 
134 const Flag<std::string> kStringFlags[] = {
135   { "-write-settings", &TestConfig::write_settings },
136   { "-digest-prefs", &TestConfig::digest_prefs },
137   { "-key-file", &TestConfig::key_file },
138   { "-cert-file", &TestConfig::cert_file },
139   { "-expect-server-name", &TestConfig::expected_server_name },
140   { "-advertise-npn", &TestConfig::advertise_npn },
141   { "-expect-next-proto", &TestConfig::expected_next_proto },
142   { "-select-next-proto", &TestConfig::select_next_proto },
143   { "-send-channel-id", &TestConfig::send_channel_id },
144   { "-host-name", &TestConfig::host_name },
145   { "-advertise-alpn", &TestConfig::advertise_alpn },
146   { "-expect-alpn", &TestConfig::expected_alpn },
147   { "-expect-late-alpn", &TestConfig::expected_late_alpn },
148   { "-expect-advertised-alpn", &TestConfig::expected_advertised_alpn },
149   { "-select-alpn", &TestConfig::select_alpn },
150   { "-psk", &TestConfig::psk },
151   { "-psk-identity", &TestConfig::psk_identity },
152   { "-srtp-profiles", &TestConfig::srtp_profiles },
153   { "-cipher", &TestConfig::cipher },
154   { "-export-label", &TestConfig::export_label },
155   { "-export-context", &TestConfig::export_context },
156   { "-expect-peer-cert-file", &TestConfig::expect_peer_cert_file },
157   { "-use-client-ca-list", &TestConfig::use_client_ca_list },
158   { "-expect-client-ca-list", &TestConfig::expected_client_ca_list },
159 };
160 
161 const Flag<std::string> kBase64Flags[] = {
162   { "-expect-certificate-types", &TestConfig::expected_certificate_types },
163   { "-expect-channel-id", &TestConfig::expected_channel_id },
164   { "-expect-ocsp-response", &TestConfig::expected_ocsp_response },
165   { "-expect-signed-cert-timestamps",
166     &TestConfig::expected_signed_cert_timestamps },
167   { "-ocsp-response", &TestConfig::ocsp_response },
168   { "-signed-cert-timestamps", &TestConfig::signed_cert_timestamps },
169   { "-ticket-key", &TestConfig::ticket_key },
170 };
171 
172 const Flag<int> kIntFlags[] = {
173   { "-port", &TestConfig::port },
174   { "-resume-count", &TestConfig::resume_count },
175   { "-min-version", &TestConfig::min_version },
176   { "-max-version", &TestConfig::max_version },
177   { "-expect-version", &TestConfig::expect_version },
178   { "-mtu", &TestConfig::mtu },
179   { "-export-keying-material", &TestConfig::export_keying_material },
180   { "-expect-total-renegotiations", &TestConfig::expect_total_renegotiations },
181   { "-expect-peer-signature-algorithm",
182     &TestConfig::expect_peer_signature_algorithm },
183   { "-expect-curve-id", &TestConfig::expect_curve_id },
184   { "-initial-timeout-duration-ms", &TestConfig::initial_timeout_duration_ms },
185   { "-max-cert-list", &TestConfig::max_cert_list },
186   { "-expect-cipher-aes", &TestConfig::expect_cipher_aes },
187   { "-expect-cipher-no-aes", &TestConfig::expect_cipher_no_aes },
188   { "-resumption-delay", &TestConfig::resumption_delay },
189   { "-max-send-fragment", &TestConfig::max_send_fragment },
190   { "-read-size", &TestConfig::read_size },
191   { "-expect-ticket-age-skew", &TestConfig::expect_ticket_age_skew },
192   { "-tls13-variant", &TestConfig::tls13_variant },
193 };
194 
195 const Flag<std::vector<int>> kIntVectorFlags[] = {
196   { "-signing-prefs", &TestConfig::signing_prefs },
197   { "-verify-prefs", &TestConfig::verify_prefs },
198 };
199 
ParseFlag(char * flag,int argc,char ** argv,int * i,bool skip,TestConfig * out_config)200 bool ParseFlag(char *flag, int argc, char **argv, int *i,
201                bool skip, TestConfig *out_config) {
202   bool *bool_field = FindField(out_config, kBoolFlags, flag);
203   if (bool_field != NULL) {
204     if (!skip) {
205       *bool_field = true;
206     }
207     return true;
208   }
209 
210   std::string *string_field = FindField(out_config, kStringFlags, flag);
211   if (string_field != NULL) {
212     *i = *i + 1;
213     if (*i >= argc) {
214       fprintf(stderr, "Missing parameter\n");
215       return false;
216     }
217     if (!skip) {
218       string_field->assign(argv[*i]);
219     }
220     return true;
221   }
222 
223   std::string *base64_field = FindField(out_config, kBase64Flags, flag);
224   if (base64_field != NULL) {
225     *i = *i + 1;
226     if (*i >= argc) {
227       fprintf(stderr, "Missing parameter\n");
228       return false;
229     }
230     size_t len;
231     if (!EVP_DecodedLength(&len, strlen(argv[*i]))) {
232       fprintf(stderr, "Invalid base64: %s\n", argv[*i]);
233       return false;
234     }
235     std::unique_ptr<uint8_t[]> decoded(new uint8_t[len]);
236     if (!EVP_DecodeBase64(decoded.get(), &len, len,
237                           reinterpret_cast<const uint8_t *>(argv[*i]),
238                           strlen(argv[*i]))) {
239       fprintf(stderr, "Invalid base64: %s\n", argv[*i]);
240       return false;
241     }
242     if (!skip) {
243       base64_field->assign(reinterpret_cast<const char *>(decoded.get()),
244                            len);
245     }
246     return true;
247   }
248 
249   int *int_field = FindField(out_config, kIntFlags, flag);
250   if (int_field) {
251     *i = *i + 1;
252     if (*i >= argc) {
253       fprintf(stderr, "Missing parameter\n");
254       return false;
255     }
256     if (!skip) {
257       *int_field = atoi(argv[*i]);
258     }
259     return true;
260   }
261 
262   std::vector<int> *int_vector_field =
263       FindField(out_config, kIntVectorFlags, flag);
264   if (int_vector_field) {
265     *i = *i + 1;
266     if (*i >= argc) {
267       fprintf(stderr, "Missing parameter\n");
268       return false;
269     }
270 
271     // Each instance of the flag adds to the list.
272     if (!skip) {
273       int_vector_field->push_back(atoi(argv[*i]));
274     }
275     return true;
276   }
277 
278   fprintf(stderr, "Unknown argument: %s\n", flag);
279   return false;
280 }
281 
282 const char kInit[] = "-on-initial";
283 const char kResume[] = "-on-resume";
284 const char kRetry[] = "-on-retry";
285 
286 }  // namespace
287 
ParseConfig(int argc,char ** argv,TestConfig * out_initial,TestConfig * out_resume,TestConfig * out_retry)288 bool ParseConfig(int argc, char **argv,
289                  TestConfig *out_initial,
290                  TestConfig *out_resume,
291                  TestConfig *out_retry) {
292   for (int i = 0; i < argc; i++) {
293     bool skip = false;
294     char *flag = argv[i];
295     if (strncmp(flag, kInit, strlen(kInit)) == 0) {
296       if (!ParseFlag(flag + strlen(kInit), argc, argv, &i, skip, out_initial)) {
297         return false;
298       }
299     } else if (strncmp(flag, kResume, strlen(kResume)) == 0) {
300       if (!ParseFlag(flag + strlen(kResume), argc, argv, &i, skip,
301                      out_resume)) {
302         return false;
303       }
304     } else if (strncmp(flag, kRetry, strlen(kRetry)) == 0) {
305       if (!ParseFlag(flag + strlen(kRetry), argc, argv, &i, skip, out_retry)) {
306         return false;
307       }
308     } else {
309       int i_init = i;
310       int i_resume = i;
311       if (!ParseFlag(flag, argc, argv, &i_init, skip, out_initial) ||
312           !ParseFlag(flag, argc, argv, &i_resume, skip, out_resume) ||
313           !ParseFlag(flag, argc, argv, &i, skip, out_retry)) {
314         return false;
315       }
316     }
317   }
318 
319   return true;
320 }
321