mirror of https://github.com/openssl/openssl.git
				
				
				
			
		
			
				
	
	
		
			315 lines
		
	
	
		
			9.5 KiB
		
	
	
	
		
			C
		
	
	
	
			
		
		
	
	
			315 lines
		
	
	
		
			9.5 KiB
		
	
	
	
		
			C
		
	
	
	
| /*
 | |
|  * Copyright 2023 The OpenSSL Project Authors. All Rights Reserved.
 | |
|  *
 | |
|  * Licensed under the Apache License 2.0 (the "License").  You may not use
 | |
|  * this file except in compliance with the License.  You can obtain a copy
 | |
|  * in the file LICENSE in the source distribution or at
 | |
|  * https://www.openssl.org/source/license.html
 | |
|  */
 | |
| 
 | |
| /*
 | |
|  * This is a temporary test server for QUIC. It will eventually be replaced
 | |
|  * by s_server and removed once we have full QUIC server support.
 | |
|  */
 | |
| 
 | |
| #include <stdio.h>
 | |
| #include <openssl/bio.h>
 | |
| #include <openssl/ssl.h>
 | |
| #include <openssl/err.h>
 | |
| #include "internal/e_os.h"
 | |
| #include "internal/sockets.h"
 | |
| #include "internal/quic_tserver.h"
 | |
| #include "internal/quic_stream_map.h"
 | |
| #include "internal/time.h"
 | |
| 
 | |
| static BIO *bio_err = NULL;
 | |
| 
 | |
| static void wait_for_activity(QUIC_TSERVER *qtserv)
 | |
| {
 | |
|     fd_set readfds, writefds;
 | |
|     fd_set *readfdsp = NULL, *writefdsp = NULL;
 | |
|     struct timeval timeout, *timeoutp = NULL;
 | |
|     int width;
 | |
|     int sock;
 | |
|     BIO *bio = ossl_quic_tserver_get0_rbio(qtserv);
 | |
|     OSSL_TIME deadline;
 | |
| 
 | |
|     BIO_get_fd(bio, &sock);
 | |
| 
 | |
|     if (ossl_quic_tserver_get_net_read_desired(qtserv)) {
 | |
|         readfdsp = &readfds;
 | |
|         FD_ZERO(readfdsp);
 | |
|         openssl_fdset(sock, readfdsp);
 | |
|     }
 | |
| 
 | |
|     if (ossl_quic_tserver_get_net_write_desired(qtserv)) {
 | |
|         writefdsp = &writefds;
 | |
|         FD_ZERO(writefdsp);
 | |
|         openssl_fdset(sock, writefdsp);
 | |
|     }
 | |
| 
 | |
|     deadline = ossl_quic_tserver_get_deadline(qtserv);
 | |
| 
 | |
|     if (!ossl_time_is_infinite(deadline)) {
 | |
|         timeout = ossl_time_to_timeval(ossl_time_subtract(deadline,
 | |
|                                                           ossl_time_now()));
 | |
|         timeoutp = &timeout;
 | |
|     }
 | |
| 
 | |
|     width = sock + 1;
 | |
| 
 | |
|     if (readfdsp == NULL && writefdsp == NULL && timeoutp == NULL)
 | |
|         return;
 | |
| 
 | |
|     select(width, readfdsp, writefdsp, NULL, timeoutp);
 | |
| }
 | |
| 
 | |
| /* Helper function to create a BIO connected to the server */
 | |
| static BIO *create_dgram_bio(int family, const char *hostname, const char *port)
 | |
| {
 | |
|     int sock = -1;
 | |
|     BIO_ADDRINFO *res;
 | |
|     const BIO_ADDRINFO *ai = NULL;
 | |
|     BIO *bio;
 | |
| 
 | |
|     if (BIO_sock_init() != 1)
 | |
|         return NULL;
 | |
| 
 | |
|     /*
 | |
|      * Lookup IP address info for the server.
 | |
|      */
 | |
|     if (!BIO_lookup_ex(hostname, port, BIO_LOOKUP_SERVER, family, SOCK_DGRAM,
 | |
|                        0, &res))
 | |
|         return NULL;
 | |
| 
 | |
|     /*
 | |
|      * Loop through all the possible addresses for the server and find one
 | |
|      * we can create and start listening on
 | |
|      */
 | |
|     for (ai = res; ai != NULL; ai = BIO_ADDRINFO_next(ai)) {
 | |
|         /* Create the UDP socket */
 | |
|         sock = BIO_socket(BIO_ADDRINFO_family(ai), SOCK_DGRAM, 0, 0);
 | |
|         if (sock == -1)
 | |
|             continue;
 | |
| 
 | |
|         /* Start listening on the socket */
 | |
|         if (!BIO_listen(sock, BIO_ADDRINFO_address(ai), 0)) {
 | |
|             BIO_closesocket(sock);
 | |
|             continue;
 | |
|         }
 | |
| 
 | |
|         /* Set to non-blocking mode */
 | |
|         if (!BIO_socket_nbio(sock, 1)) {
 | |
|             BIO_closesocket(sock);
 | |
|             continue;
 | |
|         }
 | |
| 
 | |
|         break; /* stop searching if we found an addr */
 | |
|     }
 | |
| 
 | |
|     /* Free the address information resources we allocated earlier */
 | |
|     BIO_ADDRINFO_free(res);
 | |
| 
 | |
|     /* If we didn't bind any sockets, fail */
 | |
|     if (ai == NULL)
 | |
|         return NULL;
 | |
| 
 | |
|     /* Create a BIO to wrap the socket */
 | |
|     bio = BIO_new(BIO_s_datagram());
 | |
|     if (bio == NULL) {
 | |
|         BIO_closesocket(sock);
 | |
|         return NULL;
 | |
|     }
 | |
| 
 | |
|     /*
 | |
|      * Associate the newly created BIO with the underlying socket. By
 | |
|      * passing BIO_CLOSE here the socket will be automatically closed when
 | |
|      * the BIO is freed. Alternatively you can use BIO_NOCLOSE, in which
 | |
|      * case you must close the socket explicitly when it is no longer
 | |
|      * needed.
 | |
|      */
 | |
|     BIO_set_fd(bio, sock, BIO_CLOSE);
 | |
| 
 | |
|     return bio;
 | |
| }
 | |
| 
 | |
| static void usage(void)
 | |
| {
 | |
|     BIO_printf(bio_err, "quicserver [-6][-trace] hostname port certfile keyfile\n");
 | |
| }
 | |
| 
 | |
| int main(int argc, char *argv[])
 | |
| {
 | |
|     QUIC_TSERVER_ARGS tserver_args = {0};
 | |
|     QUIC_TSERVER *qtserv = NULL;
 | |
|     int ipv6 = 0, trace = 0;
 | |
|     int argnext = 1;
 | |
|     BIO *bio = NULL;
 | |
|     char *hostname, *port, *certfile, *keyfile;
 | |
|     int ret = EXIT_FAILURE;
 | |
|     unsigned char reqbuf[1024];
 | |
|     size_t numbytes, reqbytes = 0;
 | |
|     const char reqterm[] = {
 | |
|         '\r', '\n', '\r', '\n'
 | |
|     };
 | |
|     const char *response[] = {
 | |
|         "HTTP/1.0 200 ok\r\nContent-type: text/html\r\n\r\n<!DOCTYPE html>\n<html>\n<body>Hello world</body>\n</html>\n",
 | |
|         "HTTP/1.0 200 ok\r\nContent-type: text/html\r\n\r\n<!DOCTYPE html>\n<html>\n<body>Hello again</body>\n</html>\n",
 | |
|         "HTTP/1.0 200 ok\r\nContent-type: text/html\r\n\r\n<!DOCTYPE html>\n<html>\n<body>Another response</body>\n</html>\n",
 | |
|         "HTTP/1.0 200 ok\r\nContent-type: text/html\r\n\r\n<!DOCTYPE html>\n<html>\n<body>A message</body>\n</html>\n",
 | |
|     };
 | |
|     unsigned char alpn[] = { 8, 'h', 't', 't', 'p', '/', '1', '.', '0' };
 | |
|     int first = 1;
 | |
|     uint64_t streamid;
 | |
|     size_t respnum = 0;
 | |
| 
 | |
|     bio_err = BIO_new_fp(stderr, BIO_NOCLOSE | BIO_FP_TEXT);
 | |
|     if (argc == 0 || bio_err == NULL)
 | |
|         goto end2;
 | |
| 
 | |
|     while (argnext < argc) {
 | |
|         if (argv[argnext][0] != '-')
 | |
|             break;
 | |
|         if (strcmp(argv[argnext], "-6") == 0) {
 | |
|             ipv6 = 1;
 | |
|         } else if(strcmp(argv[argnext], "-trace") == 0) {
 | |
|             trace = 1;
 | |
|         } else {
 | |
|             BIO_printf(bio_err, "Unrecognised argument %s\n", argv[argnext]);
 | |
|             usage();
 | |
|             goto end2;
 | |
|         }
 | |
|         argnext++;
 | |
|     }
 | |
| 
 | |
|     if (argc - argnext != 4) {
 | |
|         usage();
 | |
|         goto end2;
 | |
|     }
 | |
|     hostname = argv[argnext++];
 | |
|     port = argv[argnext++];
 | |
|     certfile = argv[argnext++];
 | |
|     keyfile = argv[argnext++];
 | |
| 
 | |
|     bio = create_dgram_bio(ipv6 ? AF_INET6 : AF_INET, hostname, port);
 | |
|     if (bio == NULL || !BIO_up_ref(bio)) {
 | |
|         BIO_printf(bio_err, "Unable to create server socket\n");
 | |
|         goto end2;
 | |
|     }
 | |
| 
 | |
|     tserver_args.libctx = NULL;
 | |
|     tserver_args.net_rbio = bio;
 | |
|     tserver_args.net_wbio = bio;
 | |
|     tserver_args.alpn = alpn;
 | |
|     tserver_args.alpnlen = sizeof(alpn);
 | |
|     tserver_args.ctx = NULL;
 | |
| 
 | |
|     qtserv = ossl_quic_tserver_new(&tserver_args, certfile, keyfile);
 | |
|     if (qtserv == NULL) {
 | |
|         BIO_printf(bio_err, "Failed to create the QUIC_TSERVER\n");
 | |
|         goto end;
 | |
|     }
 | |
| 
 | |
|     BIO_printf(bio_err, "Starting quicserver\n");
 | |
|     BIO_printf(bio_err,
 | |
|                "Note that this utility will be removed in a future OpenSSL version.\n");
 | |
|     BIO_printf(bio_err,
 | |
|                "For test purposes only. Not for use in a production environment.\n");
 | |
| 
 | |
|     /* Ownership of the BIO is passed to qtserv */
 | |
|     bio = NULL;
 | |
| 
 | |
|     if (trace)
 | |
| #ifndef OPENSSL_NO_SSL_TRACE
 | |
|         ossl_quic_tserver_set_msg_callback(qtserv, SSL_trace, bio_err);
 | |
| #else
 | |
|         BIO_printf(bio_err,
 | |
|                    "Warning: -trace specified but no SSL tracing support present\n");
 | |
| #endif
 | |
| 
 | |
|     /* Wait for handshake to complete */
 | |
|     ossl_quic_tserver_tick(qtserv);
 | |
|     while(!ossl_quic_tserver_is_handshake_confirmed(qtserv)) {
 | |
|         wait_for_activity(qtserv);
 | |
|         ossl_quic_tserver_tick(qtserv);
 | |
|         if (ossl_quic_tserver_is_terminated(qtserv)) {
 | |
|             BIO_printf(bio_err, "Failed waiting for handshake completion\n");
 | |
|             ret = EXIT_FAILURE;
 | |
|             goto end;
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     for (;; respnum++) {
 | |
|         if (respnum >= OSSL_NELEM(response))
 | |
|             goto end;
 | |
|         /* Wait for an incoming stream */
 | |
|         do {
 | |
|             streamid = ossl_quic_tserver_pop_incoming_stream(qtserv);
 | |
|             if (streamid == UINT64_MAX)
 | |
|                 wait_for_activity(qtserv);
 | |
|             ossl_quic_tserver_tick(qtserv);
 | |
|             if (ossl_quic_tserver_is_terminated(qtserv)) {
 | |
|                 /* Assume we finished everything the clients wants from us */
 | |
|                 ret = EXIT_SUCCESS;
 | |
|                 goto end;
 | |
|             }
 | |
|         } while(streamid == UINT64_MAX);
 | |
| 
 | |
|         /* Read the request */
 | |
|         do {
 | |
|             if (first)
 | |
|                 first = 0;
 | |
|             else
 | |
|                 wait_for_activity(qtserv);
 | |
| 
 | |
|             ossl_quic_tserver_tick(qtserv);
 | |
|             if (ossl_quic_tserver_is_terminated(qtserv)) {
 | |
|                 BIO_printf(bio_err, "Failed reading request\n");
 | |
|                 ret = EXIT_FAILURE;
 | |
|                 goto end;
 | |
|             }
 | |
| 
 | |
|             if (ossl_quic_tserver_read(qtserv, streamid, reqbuf + reqbytes,
 | |
|                                     sizeof(reqbuf) - reqbytes,
 | |
|                                     &numbytes)) {
 | |
|                 if (numbytes > 0)
 | |
|                     fwrite(reqbuf + reqbytes, 1, numbytes, stdout);
 | |
|                 reqbytes += numbytes;
 | |
|             }
 | |
|         } while (reqbytes < sizeof(reqterm)
 | |
|                 || memcmp(reqbuf + reqbytes - sizeof(reqterm), reqterm,
 | |
|                         sizeof(reqterm)) != 0);
 | |
| 
 | |
|         if ((streamid & QUIC_STREAM_DIR_UNI) != 0) {
 | |
|             /*
 | |
|             * Incoming stream was uni-directional. Create a server initiated
 | |
|             * uni-directional stream for the response.
 | |
|             */
 | |
|             if (!ossl_quic_tserver_stream_new(qtserv, 1, &streamid)) {
 | |
|                 BIO_printf(bio_err, "Failed creating response stream\n");
 | |
|                 goto end;
 | |
|             }
 | |
|         }
 | |
| 
 | |
|         /* Send the response */
 | |
| 
 | |
|         ossl_quic_tserver_tick(qtserv);
 | |
|         if (!ossl_quic_tserver_write(qtserv, streamid,
 | |
|                                     (unsigned char *)response[respnum],
 | |
|                                     strlen(response[respnum]), &numbytes))
 | |
|             goto end;
 | |
| 
 | |
|         if (!ossl_quic_tserver_conclude(qtserv, streamid))
 | |
|             goto end;
 | |
|     }
 | |
| 
 | |
|  end:
 | |
|     /* Free twice because we did an up-ref */
 | |
|     BIO_free(bio);
 | |
|  end2:
 | |
|     BIO_free(bio);
 | |
|     ossl_quic_tserver_free(qtserv);
 | |
|     BIO_free(bio_err);
 | |
|     return ret;
 | |
| }
 |