1 /* Copyright (c) 2014, Google Inc.
2 *
3 * Permission to use, copy, modify, and/or distribute this software for any
4 * purpose with or without fee is hereby granted, provided that the above
5 * copyright notice and this permission notice appear in all copies.
6 *
7 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
8 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
9 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
10 * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
11 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
12 * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
13 * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */
14
15 #include "test_config.h"
16
17 #include <stdio.h>
18 #include <stdlib.h>
19 #include <string.h>
20
21 #include <memory>
22
23 #include <openssl/base64.h>
24
25 namespace {
26
27 template <typename T>
28 struct Flag {
29 const char *flag;
30 T TestConfig::*member;
31 };
32
33 // FindField looks for the flag in |flags| that matches |flag|. If one is found,
34 // it returns a pointer to the corresponding field in |config|. Otherwise, it
35 // returns NULL.
36 template<typename T, size_t N>
FindField(TestConfig * config,const Flag<T> (& flags)[N],const char * flag)37 T *FindField(TestConfig *config, const Flag<T> (&flags)[N], const char *flag) {
38 for (size_t i = 0; i < N; i++) {
39 if (strcmp(flag, flags[i].flag) == 0) {
40 return &(config->*(flags[i].member));
41 }
42 }
43 return NULL;
44 }
45
46 const Flag<bool> kBoolFlags[] = {
47 { "-server", &TestConfig::is_server },
48 { "-dtls", &TestConfig::is_dtls },
49 { "-fallback-scsv", &TestConfig::fallback_scsv },
50 { "-require-any-client-certificate",
51 &TestConfig::require_any_client_certificate },
52 { "-false-start", &TestConfig::false_start },
53 { "-async", &TestConfig::async },
54 { "-write-different-record-sizes",
55 &TestConfig::write_different_record_sizes },
56 { "-cbc-record-splitting", &TestConfig::cbc_record_splitting },
57 { "-partial-write", &TestConfig::partial_write },
58 { "-no-tls13", &TestConfig::no_tls13 },
59 { "-no-tls12", &TestConfig::no_tls12 },
60 { "-no-tls11", &TestConfig::no_tls11 },
61 { "-no-tls1", &TestConfig::no_tls1 },
62 { "-no-ssl3", &TestConfig::no_ssl3 },
63 { "-enable-channel-id", &TestConfig::enable_channel_id },
64 { "-shim-writes-first", &TestConfig::shim_writes_first },
65 { "-expect-session-miss", &TestConfig::expect_session_miss },
66 { "-decline-alpn", &TestConfig::decline_alpn },
67 { "-expect-extended-master-secret",
68 &TestConfig::expect_extended_master_secret },
69 { "-enable-ocsp-stapling", &TestConfig::enable_ocsp_stapling },
70 { "-enable-signed-cert-timestamps",
71 &TestConfig::enable_signed_cert_timestamps },
72 { "-implicit-handshake", &TestConfig::implicit_handshake },
73 { "-use-early-callback", &TestConfig::use_early_callback },
74 { "-fail-early-callback", &TestConfig::fail_early_callback },
75 { "-install-ddos-callback", &TestConfig::install_ddos_callback },
76 { "-fail-ddos-callback", &TestConfig::fail_ddos_callback },
77 { "-fail-second-ddos-callback", &TestConfig::fail_second_ddos_callback },
78 { "-fail-cert-callback", &TestConfig::fail_cert_callback },
79 { "-handshake-never-done", &TestConfig::handshake_never_done },
80 { "-use-export-context", &TestConfig::use_export_context },
81 { "-tls-unique", &TestConfig::tls_unique },
82 { "-expect-ticket-renewal", &TestConfig::expect_ticket_renewal },
83 { "-expect-no-session", &TestConfig::expect_no_session },
84 { "-expect-early-data-info", &TestConfig::expect_early_data_info },
85 { "-use-ticket-callback", &TestConfig::use_ticket_callback },
86 { "-renew-ticket", &TestConfig::renew_ticket },
87 { "-enable-early-data", &TestConfig::enable_early_data },
88 { "-enable-client-custom-extension",
89 &TestConfig::enable_client_custom_extension },
90 { "-enable-server-custom-extension",
91 &TestConfig::enable_server_custom_extension },
92 { "-custom-extension-skip", &TestConfig::custom_extension_skip },
93 { "-custom-extension-fail-add", &TestConfig::custom_extension_fail_add },
94 { "-check-close-notify", &TestConfig::check_close_notify },
95 { "-shim-shuts-down", &TestConfig::shim_shuts_down },
96 { "-verify-fail", &TestConfig::verify_fail },
97 { "-verify-peer", &TestConfig::verify_peer },
98 { "-verify-peer-if-no-obc", &TestConfig::verify_peer_if_no_obc },
99 { "-expect-verify-result", &TestConfig::expect_verify_result },
100 { "-renegotiate-once", &TestConfig::renegotiate_once },
101 { "-renegotiate-freely", &TestConfig::renegotiate_freely },
102 { "-renegotiate-ignore", &TestConfig::renegotiate_ignore },
103 { "-p384-only", &TestConfig::p384_only },
104 { "-enable-all-curves", &TestConfig::enable_all_curves },
105 { "-use-old-client-cert-callback",
106 &TestConfig::use_old_client_cert_callback },
107 { "-send-alert", &TestConfig::send_alert },
108 { "-peek-then-read", &TestConfig::peek_then_read },
109 { "-enable-grease", &TestConfig::enable_grease },
110 { "-use-exporter-between-reads", &TestConfig::use_exporter_between_reads },
111 { "-retain-only-sha256-client-cert-initial",
112 &TestConfig::retain_only_sha256_client_cert_initial },
113 { "-retain-only-sha256-client-cert-resume",
114 &TestConfig::retain_only_sha256_client_cert_resume },
115 { "-expect-sha256-client-cert-initial",
116 &TestConfig::expect_sha256_client_cert_initial },
117 { "-expect-sha256-client-cert-resume",
118 &TestConfig::expect_sha256_client_cert_resume },
119 { "-read-with-unfinished-write", &TestConfig::read_with_unfinished_write },
120 { "-expect-secure-renegotiation",
121 &TestConfig::expect_secure_renegotiation },
122 { "-expect-no-secure-renegotiation",
123 &TestConfig::expect_no_secure_renegotiation },
124 { "-expect-session-id", &TestConfig::expect_session_id },
125 { "-expect-no-session-id", &TestConfig::expect_no_session_id },
126 { "-expect-accept-early-data", &TestConfig::expect_accept_early_data },
127 { "-expect-reject-early-data", &TestConfig::expect_reject_early_data },
128 { "-no-op-extra-handshake", &TestConfig::no_op_extra_handshake },
129 { "-handshake-twice", &TestConfig::handshake_twice },
130 { "-allow-unknown-alpn-protos", &TestConfig::allow_unknown_alpn_protos },
131 { "-enable-ed25519", &TestConfig::enable_ed25519 },
132 };
133
134 const Flag<std::string> kStringFlags[] = {
135 { "-write-settings", &TestConfig::write_settings },
136 { "-digest-prefs", &TestConfig::digest_prefs },
137 { "-key-file", &TestConfig::key_file },
138 { "-cert-file", &TestConfig::cert_file },
139 { "-expect-server-name", &TestConfig::expected_server_name },
140 { "-advertise-npn", &TestConfig::advertise_npn },
141 { "-expect-next-proto", &TestConfig::expected_next_proto },
142 { "-select-next-proto", &TestConfig::select_next_proto },
143 { "-send-channel-id", &TestConfig::send_channel_id },
144 { "-host-name", &TestConfig::host_name },
145 { "-advertise-alpn", &TestConfig::advertise_alpn },
146 { "-expect-alpn", &TestConfig::expected_alpn },
147 { "-expect-late-alpn", &TestConfig::expected_late_alpn },
148 { "-expect-advertised-alpn", &TestConfig::expected_advertised_alpn },
149 { "-select-alpn", &TestConfig::select_alpn },
150 { "-psk", &TestConfig::psk },
151 { "-psk-identity", &TestConfig::psk_identity },
152 { "-srtp-profiles", &TestConfig::srtp_profiles },
153 { "-cipher", &TestConfig::cipher },
154 { "-export-label", &TestConfig::export_label },
155 { "-export-context", &TestConfig::export_context },
156 { "-expect-peer-cert-file", &TestConfig::expect_peer_cert_file },
157 { "-use-client-ca-list", &TestConfig::use_client_ca_list },
158 { "-expect-client-ca-list", &TestConfig::expected_client_ca_list },
159 };
160
161 const Flag<std::string> kBase64Flags[] = {
162 { "-expect-certificate-types", &TestConfig::expected_certificate_types },
163 { "-expect-channel-id", &TestConfig::expected_channel_id },
164 { "-expect-ocsp-response", &TestConfig::expected_ocsp_response },
165 { "-expect-signed-cert-timestamps",
166 &TestConfig::expected_signed_cert_timestamps },
167 { "-ocsp-response", &TestConfig::ocsp_response },
168 { "-signed-cert-timestamps", &TestConfig::signed_cert_timestamps },
169 { "-ticket-key", &TestConfig::ticket_key },
170 };
171
172 const Flag<int> kIntFlags[] = {
173 { "-port", &TestConfig::port },
174 { "-resume-count", &TestConfig::resume_count },
175 { "-min-version", &TestConfig::min_version },
176 { "-max-version", &TestConfig::max_version },
177 { "-expect-version", &TestConfig::expect_version },
178 { "-mtu", &TestConfig::mtu },
179 { "-export-keying-material", &TestConfig::export_keying_material },
180 { "-expect-total-renegotiations", &TestConfig::expect_total_renegotiations },
181 { "-expect-peer-signature-algorithm",
182 &TestConfig::expect_peer_signature_algorithm },
183 { "-expect-curve-id", &TestConfig::expect_curve_id },
184 { "-initial-timeout-duration-ms", &TestConfig::initial_timeout_duration_ms },
185 { "-max-cert-list", &TestConfig::max_cert_list },
186 { "-expect-cipher-aes", &TestConfig::expect_cipher_aes },
187 { "-expect-cipher-no-aes", &TestConfig::expect_cipher_no_aes },
188 { "-resumption-delay", &TestConfig::resumption_delay },
189 { "-max-send-fragment", &TestConfig::max_send_fragment },
190 { "-read-size", &TestConfig::read_size },
191 { "-expect-ticket-age-skew", &TestConfig::expect_ticket_age_skew },
192 { "-tls13-variant", &TestConfig::tls13_variant },
193 };
194
195 const Flag<std::vector<int>> kIntVectorFlags[] = {
196 { "-signing-prefs", &TestConfig::signing_prefs },
197 { "-verify-prefs", &TestConfig::verify_prefs },
198 };
199
ParseFlag(char * flag,int argc,char ** argv,int * i,bool skip,TestConfig * out_config)200 bool ParseFlag(char *flag, int argc, char **argv, int *i,
201 bool skip, TestConfig *out_config) {
202 bool *bool_field = FindField(out_config, kBoolFlags, flag);
203 if (bool_field != NULL) {
204 if (!skip) {
205 *bool_field = true;
206 }
207 return true;
208 }
209
210 std::string *string_field = FindField(out_config, kStringFlags, flag);
211 if (string_field != NULL) {
212 *i = *i + 1;
213 if (*i >= argc) {
214 fprintf(stderr, "Missing parameter\n");
215 return false;
216 }
217 if (!skip) {
218 string_field->assign(argv[*i]);
219 }
220 return true;
221 }
222
223 std::string *base64_field = FindField(out_config, kBase64Flags, flag);
224 if (base64_field != NULL) {
225 *i = *i + 1;
226 if (*i >= argc) {
227 fprintf(stderr, "Missing parameter\n");
228 return false;
229 }
230 size_t len;
231 if (!EVP_DecodedLength(&len, strlen(argv[*i]))) {
232 fprintf(stderr, "Invalid base64: %s\n", argv[*i]);
233 return false;
234 }
235 std::unique_ptr<uint8_t[]> decoded(new uint8_t[len]);
236 if (!EVP_DecodeBase64(decoded.get(), &len, len,
237 reinterpret_cast<const uint8_t *>(argv[*i]),
238 strlen(argv[*i]))) {
239 fprintf(stderr, "Invalid base64: %s\n", argv[*i]);
240 return false;
241 }
242 if (!skip) {
243 base64_field->assign(reinterpret_cast<const char *>(decoded.get()),
244 len);
245 }
246 return true;
247 }
248
249 int *int_field = FindField(out_config, kIntFlags, flag);
250 if (int_field) {
251 *i = *i + 1;
252 if (*i >= argc) {
253 fprintf(stderr, "Missing parameter\n");
254 return false;
255 }
256 if (!skip) {
257 *int_field = atoi(argv[*i]);
258 }
259 return true;
260 }
261
262 std::vector<int> *int_vector_field =
263 FindField(out_config, kIntVectorFlags, flag);
264 if (int_vector_field) {
265 *i = *i + 1;
266 if (*i >= argc) {
267 fprintf(stderr, "Missing parameter\n");
268 return false;
269 }
270
271 // Each instance of the flag adds to the list.
272 if (!skip) {
273 int_vector_field->push_back(atoi(argv[*i]));
274 }
275 return true;
276 }
277
278 fprintf(stderr, "Unknown argument: %s\n", flag);
279 return false;
280 }
281
282 const char kInit[] = "-on-initial";
283 const char kResume[] = "-on-resume";
284 const char kRetry[] = "-on-retry";
285
286 } // namespace
287
ParseConfig(int argc,char ** argv,TestConfig * out_initial,TestConfig * out_resume,TestConfig * out_retry)288 bool ParseConfig(int argc, char **argv,
289 TestConfig *out_initial,
290 TestConfig *out_resume,
291 TestConfig *out_retry) {
292 for (int i = 0; i < argc; i++) {
293 bool skip = false;
294 char *flag = argv[i];
295 if (strncmp(flag, kInit, strlen(kInit)) == 0) {
296 if (!ParseFlag(flag + strlen(kInit), argc, argv, &i, skip, out_initial)) {
297 return false;
298 }
299 } else if (strncmp(flag, kResume, strlen(kResume)) == 0) {
300 if (!ParseFlag(flag + strlen(kResume), argc, argv, &i, skip,
301 out_resume)) {
302 return false;
303 }
304 } else if (strncmp(flag, kRetry, strlen(kRetry)) == 0) {
305 if (!ParseFlag(flag + strlen(kRetry), argc, argv, &i, skip, out_retry)) {
306 return false;
307 }
308 } else {
309 int i_init = i;
310 int i_resume = i;
311 if (!ParseFlag(flag, argc, argv, &i_init, skip, out_initial) ||
312 !ParseFlag(flag, argc, argv, &i_resume, skip, out_resume) ||
313 !ParseFlag(flag, argc, argv, &i, skip, out_retry)) {
314 return false;
315 }
316 }
317 }
318
319 return true;
320 }
321