Home | History | Annotate | Download | only in test
      1 /* Copyright (c) 2014, Google Inc.
      2  *
      3  * Permission to use, copy, modify, and/or distribute this software for any
      4  * purpose with or without fee is hereby granted, provided that the above
      5  * copyright notice and this permission notice appear in all copies.
      6  *
      7  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
      8  * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
      9  * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
     10  * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
     11  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
     12  * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
     13  * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */
     14 
     15 #include "test_config.h"
     16 
     17 #include <stdio.h>
     18 #include <stdlib.h>
     19 #include <string.h>
     20 
     21 #include <memory>
     22 
     23 #include <openssl/base64.h>
     24 
     25 namespace {
     26 
     27 template <typename T>
     28 struct Flag {
     29   const char *flag;
     30   T TestConfig::*member;
     31 };
     32 
     33 // FindField looks for the flag in |flags| that matches |flag|. If one is found,
     34 // it returns a pointer to the corresponding field in |config|. Otherwise, it
     35 // returns NULL.
     36 template<typename T, size_t N>
     37 T *FindField(TestConfig *config, const Flag<T> (&flags)[N], const char *flag) {
     38   for (size_t i = 0; i < N; i++) {
     39     if (strcmp(flag, flags[i].flag) == 0) {
     40       return &(config->*(flags[i].member));
     41     }
     42   }
     43   return NULL;
     44 }
     45 
     46 const Flag<bool> kBoolFlags[] = {
     47   { "-server", &TestConfig::is_server },
     48   { "-dtls", &TestConfig::is_dtls },
     49   { "-fallback-scsv", &TestConfig::fallback_scsv },
     50   { "-require-any-client-certificate",
     51     &TestConfig::require_any_client_certificate },
     52   { "-false-start", &TestConfig::false_start },
     53   { "-async", &TestConfig::async },
     54   { "-write-different-record-sizes",
     55     &TestConfig::write_different_record_sizes },
     56   { "-cbc-record-splitting", &TestConfig::cbc_record_splitting },
     57   { "-partial-write", &TestConfig::partial_write },
     58   { "-no-tls13", &TestConfig::no_tls13 },
     59   { "-no-tls12", &TestConfig::no_tls12 },
     60   { "-no-tls11", &TestConfig::no_tls11 },
     61   { "-no-tls1", &TestConfig::no_tls1 },
     62   { "-no-ssl3", &TestConfig::no_ssl3 },
     63   { "-enable-channel-id", &TestConfig::enable_channel_id },
     64   { "-shim-writes-first", &TestConfig::shim_writes_first },
     65   { "-expect-session-miss", &TestConfig::expect_session_miss },
     66   { "-decline-alpn", &TestConfig::decline_alpn },
     67   { "-expect-extended-master-secret",
     68     &TestConfig::expect_extended_master_secret },
     69   { "-enable-ocsp-stapling", &TestConfig::enable_ocsp_stapling },
     70   { "-enable-signed-cert-timestamps",
     71     &TestConfig::enable_signed_cert_timestamps },
     72   { "-implicit-handshake", &TestConfig::implicit_handshake },
     73   { "-use-early-callback", &TestConfig::use_early_callback },
     74   { "-fail-early-callback", &TestConfig::fail_early_callback },
     75   { "-install-ddos-callback", &TestConfig::install_ddos_callback },
     76   { "-fail-ddos-callback", &TestConfig::fail_ddos_callback },
     77   { "-fail-second-ddos-callback", &TestConfig::fail_second_ddos_callback },
     78   { "-fail-cert-callback", &TestConfig::fail_cert_callback },
     79   { "-handshake-never-done", &TestConfig::handshake_never_done },
     80   { "-use-export-context", &TestConfig::use_export_context },
     81   { "-tls-unique", &TestConfig::tls_unique },
     82   { "-expect-ticket-renewal", &TestConfig::expect_ticket_renewal },
     83   { "-expect-no-session", &TestConfig::expect_no_session },
     84   { "-expect-early-data-info", &TestConfig::expect_early_data_info },
     85   { "-use-ticket-callback", &TestConfig::use_ticket_callback },
     86   { "-renew-ticket", &TestConfig::renew_ticket },
     87   { "-enable-early-data", &TestConfig::enable_early_data },
     88   { "-enable-client-custom-extension",
     89     &TestConfig::enable_client_custom_extension },
     90   { "-enable-server-custom-extension",
     91     &TestConfig::enable_server_custom_extension },
     92   { "-custom-extension-skip", &TestConfig::custom_extension_skip },
     93   { "-custom-extension-fail-add", &TestConfig::custom_extension_fail_add },
     94   { "-check-close-notify", &TestConfig::check_close_notify },
     95   { "-shim-shuts-down", &TestConfig::shim_shuts_down },
     96   { "-verify-fail", &TestConfig::verify_fail },
     97   { "-verify-peer", &TestConfig::verify_peer },
     98   { "-verify-peer-if-no-obc", &TestConfig::verify_peer_if_no_obc },
     99   { "-expect-verify-result", &TestConfig::expect_verify_result },
    100   { "-renegotiate-once", &TestConfig::renegotiate_once },
    101   { "-renegotiate-freely", &TestConfig::renegotiate_freely },
    102   { "-renegotiate-ignore", &TestConfig::renegotiate_ignore },
    103   { "-p384-only", &TestConfig::p384_only },
    104   { "-enable-all-curves", &TestConfig::enable_all_curves },
    105   { "-use-old-client-cert-callback",
    106     &TestConfig::use_old_client_cert_callback },
    107   { "-send-alert", &TestConfig::send_alert },
    108   { "-peek-then-read", &TestConfig::peek_then_read },
    109   { "-enable-grease", &TestConfig::enable_grease },
    110   { "-use-exporter-between-reads", &TestConfig::use_exporter_between_reads },
    111   { "-retain-only-sha256-client-cert-initial",
    112     &TestConfig::retain_only_sha256_client_cert_initial },
    113   { "-retain-only-sha256-client-cert-resume",
    114     &TestConfig::retain_only_sha256_client_cert_resume },
    115   { "-expect-sha256-client-cert-initial",
    116     &TestConfig::expect_sha256_client_cert_initial },
    117   { "-expect-sha256-client-cert-resume",
    118     &TestConfig::expect_sha256_client_cert_resume },
    119   { "-read-with-unfinished-write", &TestConfig::read_with_unfinished_write },
    120   { "-expect-secure-renegotiation",
    121     &TestConfig::expect_secure_renegotiation },
    122   { "-expect-no-secure-renegotiation",
    123     &TestConfig::expect_no_secure_renegotiation },
    124   { "-expect-session-id", &TestConfig::expect_session_id },
    125   { "-expect-no-session-id", &TestConfig::expect_no_session_id },
    126   { "-expect-accept-early-data", &TestConfig::expect_accept_early_data },
    127   { "-expect-reject-early-data", &TestConfig::expect_reject_early_data },
    128   { "-no-op-extra-handshake", &TestConfig::no_op_extra_handshake },
    129   { "-handshake-twice", &TestConfig::handshake_twice },
    130   { "-allow-unknown-alpn-protos", &TestConfig::allow_unknown_alpn_protos },
    131   { "-enable-ed25519", &TestConfig::enable_ed25519 },
    132 };
    133 
    134 const Flag<std::string> kStringFlags[] = {
    135   { "-write-settings", &TestConfig::write_settings },
    136   { "-digest-prefs", &TestConfig::digest_prefs },
    137   { "-key-file", &TestConfig::key_file },
    138   { "-cert-file", &TestConfig::cert_file },
    139   { "-expect-server-name", &TestConfig::expected_server_name },
    140   { "-advertise-npn", &TestConfig::advertise_npn },
    141   { "-expect-next-proto", &TestConfig::expected_next_proto },
    142   { "-select-next-proto", &TestConfig::select_next_proto },
    143   { "-send-channel-id", &TestConfig::send_channel_id },
    144   { "-host-name", &TestConfig::host_name },
    145   { "-advertise-alpn", &TestConfig::advertise_alpn },
    146   { "-expect-alpn", &TestConfig::expected_alpn },
    147   { "-expect-late-alpn", &TestConfig::expected_late_alpn },
    148   { "-expect-advertised-alpn", &TestConfig::expected_advertised_alpn },
    149   { "-select-alpn", &TestConfig::select_alpn },
    150   { "-psk", &TestConfig::psk },
    151   { "-psk-identity", &TestConfig::psk_identity },
    152   { "-srtp-profiles", &TestConfig::srtp_profiles },
    153   { "-cipher", &TestConfig::cipher },
    154   { "-export-label", &TestConfig::export_label },
    155   { "-export-context", &TestConfig::export_context },
    156   { "-expect-peer-cert-file", &TestConfig::expect_peer_cert_file },
    157   { "-use-client-ca-list", &TestConfig::use_client_ca_list },
    158   { "-expect-client-ca-list", &TestConfig::expected_client_ca_list },
    159 };
    160 
    161 const Flag<std::string> kBase64Flags[] = {
    162   { "-expect-certificate-types", &TestConfig::expected_certificate_types },
    163   { "-expect-channel-id", &TestConfig::expected_channel_id },
    164   { "-expect-ocsp-response", &TestConfig::expected_ocsp_response },
    165   { "-expect-signed-cert-timestamps",
    166     &TestConfig::expected_signed_cert_timestamps },
    167   { "-ocsp-response", &TestConfig::ocsp_response },
    168   { "-signed-cert-timestamps", &TestConfig::signed_cert_timestamps },
    169   { "-ticket-key", &TestConfig::ticket_key },
    170 };
    171 
    172 const Flag<int> kIntFlags[] = {
    173   { "-port", &TestConfig::port },
    174   { "-resume-count", &TestConfig::resume_count },
    175   { "-min-version", &TestConfig::min_version },
    176   { "-max-version", &TestConfig::max_version },
    177   { "-expect-version", &TestConfig::expect_version },
    178   { "-mtu", &TestConfig::mtu },
    179   { "-export-keying-material", &TestConfig::export_keying_material },
    180   { "-expect-total-renegotiations", &TestConfig::expect_total_renegotiations },
    181   { "-expect-peer-signature-algorithm",
    182     &TestConfig::expect_peer_signature_algorithm },
    183   { "-expect-curve-id", &TestConfig::expect_curve_id },
    184   { "-initial-timeout-duration-ms", &TestConfig::initial_timeout_duration_ms },
    185   { "-max-cert-list", &TestConfig::max_cert_list },
    186   { "-expect-cipher-aes", &TestConfig::expect_cipher_aes },
    187   { "-expect-cipher-no-aes", &TestConfig::expect_cipher_no_aes },
    188   { "-resumption-delay", &TestConfig::resumption_delay },
    189   { "-max-send-fragment", &TestConfig::max_send_fragment },
    190   { "-read-size", &TestConfig::read_size },
    191   { "-expect-ticket-age-skew", &TestConfig::expect_ticket_age_skew },
    192   { "-tls13-variant", &TestConfig::tls13_variant },
    193 };
    194 
    195 const Flag<std::vector<int>> kIntVectorFlags[] = {
    196   { "-signing-prefs", &TestConfig::signing_prefs },
    197   { "-verify-prefs", &TestConfig::verify_prefs },
    198 };
    199 
    200 bool ParseFlag(char *flag, int argc, char **argv, int *i,
    201                bool skip, TestConfig *out_config) {
    202   bool *bool_field = FindField(out_config, kBoolFlags, flag);
    203   if (bool_field != NULL) {
    204     if (!skip) {
    205       *bool_field = true;
    206     }
    207     return true;
    208   }
    209 
    210   std::string *string_field = FindField(out_config, kStringFlags, flag);
    211   if (string_field != NULL) {
    212     *i = *i + 1;
    213     if (*i >= argc) {
    214       fprintf(stderr, "Missing parameter\n");
    215       return false;
    216     }
    217     if (!skip) {
    218       string_field->assign(argv[*i]);
    219     }
    220     return true;
    221   }
    222 
    223   std::string *base64_field = FindField(out_config, kBase64Flags, flag);
    224   if (base64_field != NULL) {
    225     *i = *i + 1;
    226     if (*i >= argc) {
    227       fprintf(stderr, "Missing parameter\n");
    228       return false;
    229     }
    230     size_t len;
    231     if (!EVP_DecodedLength(&len, strlen(argv[*i]))) {
    232       fprintf(stderr, "Invalid base64: %s\n", argv[*i]);
    233       return false;
    234     }
    235     std::unique_ptr<uint8_t[]> decoded(new uint8_t[len]);
    236     if (!EVP_DecodeBase64(decoded.get(), &len, len,
    237                           reinterpret_cast<const uint8_t *>(argv[*i]),
    238                           strlen(argv[*i]))) {
    239       fprintf(stderr, "Invalid base64: %s\n", argv[*i]);
    240       return false;
    241     }
    242     if (!skip) {
    243       base64_field->assign(reinterpret_cast<const char *>(decoded.get()),
    244                            len);
    245     }
    246     return true;
    247   }
    248 
    249   int *int_field = FindField(out_config, kIntFlags, flag);
    250   if (int_field) {
    251     *i = *i + 1;
    252     if (*i >= argc) {
    253       fprintf(stderr, "Missing parameter\n");
    254       return false;
    255     }
    256     if (!skip) {
    257       *int_field = atoi(argv[*i]);
    258     }
    259     return true;
    260   }
    261 
    262   std::vector<int> *int_vector_field =
    263       FindField(out_config, kIntVectorFlags, flag);
    264   if (int_vector_field) {
    265     *i = *i + 1;
    266     if (*i >= argc) {
    267       fprintf(stderr, "Missing parameter\n");
    268       return false;
    269     }
    270 
    271     // Each instance of the flag adds to the list.
    272     if (!skip) {
    273       int_vector_field->push_back(atoi(argv[*i]));
    274     }
    275     return true;
    276   }
    277 
    278   fprintf(stderr, "Unknown argument: %s\n", flag);
    279   return false;
    280 }
    281 
    282 const char kInit[] = "-on-initial";
    283 const char kResume[] = "-on-resume";
    284 const char kRetry[] = "-on-retry";
    285 
    286 }  // namespace
    287 
    288 bool ParseConfig(int argc, char **argv,
    289                  TestConfig *out_initial,
    290                  TestConfig *out_resume,
    291                  TestConfig *out_retry) {
    292   for (int i = 0; i < argc; i++) {
    293     bool skip = false;
    294     char *flag = argv[i];
    295     if (strncmp(flag, kInit, strlen(kInit)) == 0) {
    296       if (!ParseFlag(flag + strlen(kInit), argc, argv, &i, skip, out_initial)) {
    297         return false;
    298       }
    299     } else if (strncmp(flag, kResume, strlen(kResume)) == 0) {
    300       if (!ParseFlag(flag + strlen(kResume), argc, argv, &i, skip,
    301                      out_resume)) {
    302         return false;
    303       }
    304     } else if (strncmp(flag, kRetry, strlen(kRetry)) == 0) {
    305       if (!ParseFlag(flag + strlen(kRetry), argc, argv, &i, skip, out_retry)) {
    306         return false;
    307       }
    308     } else {
    309       int i_init = i;
    310       int i_resume = i;
    311       if (!ParseFlag(flag, argc, argv, &i_init, skip, out_initial) ||
    312           !ParseFlag(flag, argc, argv, &i_resume, skip, out_resume) ||
    313           !ParseFlag(flag, argc, argv, &i, skip, out_retry)) {
    314         return false;
    315       }
    316     }
    317   }
    318 
    319   return true;
    320 }
    321