mirror of https://github.com/openssl/openssl.git
				
				
				
			
		
			
				
	
	
		
			315 lines
		
	
	
		
			9.5 KiB
		
	
	
	
		
			C
		
	
	
	
			
		
		
	
	
			315 lines
		
	
	
		
			9.5 KiB
		
	
	
	
		
			C
		
	
	
	
/*
 | 
						|
 * Copyright 2023 The OpenSSL Project Authors. All Rights Reserved.
 | 
						|
 *
 | 
						|
 * Licensed under the Apache License 2.0 (the "License").  You may not use
 | 
						|
 * this file except in compliance with the License.  You can obtain a copy
 | 
						|
 * in the file LICENSE in the source distribution or at
 | 
						|
 * https://www.openssl.org/source/license.html
 | 
						|
 */
 | 
						|
 | 
						|
/*
 | 
						|
 * This is a temporary test server for QUIC. It will eventually be replaced
 | 
						|
 * by s_server and removed once we have full QUIC server support.
 | 
						|
 */
 | 
						|
 | 
						|
#include <stdio.h>
 | 
						|
#include <openssl/bio.h>
 | 
						|
#include <openssl/ssl.h>
 | 
						|
#include <openssl/err.h>
 | 
						|
#include "internal/e_os.h"
 | 
						|
#include "internal/sockets.h"
 | 
						|
#include "internal/quic_tserver.h"
 | 
						|
#include "internal/quic_stream_map.h"
 | 
						|
#include "internal/time.h"
 | 
						|
 | 
						|
static BIO *bio_err = NULL;
 | 
						|
 | 
						|
static void wait_for_activity(QUIC_TSERVER *qtserv)
 | 
						|
{
 | 
						|
    fd_set readfds, writefds;
 | 
						|
    fd_set *readfdsp = NULL, *writefdsp = NULL;
 | 
						|
    struct timeval timeout, *timeoutp = NULL;
 | 
						|
    int width;
 | 
						|
    int sock;
 | 
						|
    BIO *bio = ossl_quic_tserver_get0_rbio(qtserv);
 | 
						|
    OSSL_TIME deadline;
 | 
						|
 | 
						|
    BIO_get_fd(bio, &sock);
 | 
						|
 | 
						|
    if (ossl_quic_tserver_get_net_read_desired(qtserv)) {
 | 
						|
        readfdsp = &readfds;
 | 
						|
        FD_ZERO(readfdsp);
 | 
						|
        openssl_fdset(sock, readfdsp);
 | 
						|
    }
 | 
						|
 | 
						|
    if (ossl_quic_tserver_get_net_write_desired(qtserv)) {
 | 
						|
        writefdsp = &writefds;
 | 
						|
        FD_ZERO(writefdsp);
 | 
						|
        openssl_fdset(sock, writefdsp);
 | 
						|
    }
 | 
						|
 | 
						|
    deadline = ossl_quic_tserver_get_deadline(qtserv);
 | 
						|
 | 
						|
    if (!ossl_time_is_infinite(deadline)) {
 | 
						|
        timeout = ossl_time_to_timeval(ossl_time_subtract(deadline,
 | 
						|
                                                          ossl_time_now()));
 | 
						|
        timeoutp = &timeout;
 | 
						|
    }
 | 
						|
 | 
						|
    width = sock + 1;
 | 
						|
 | 
						|
    if (readfdsp == NULL && writefdsp == NULL && timeoutp == NULL)
 | 
						|
        return;
 | 
						|
 | 
						|
    select(width, readfdsp, writefdsp, NULL, timeoutp);
 | 
						|
}
 | 
						|
 | 
						|
/* Helper function to create a BIO connected to the server */
 | 
						|
static BIO *create_dgram_bio(int family, const char *hostname, const char *port)
 | 
						|
{
 | 
						|
    int sock = -1;
 | 
						|
    BIO_ADDRINFO *res;
 | 
						|
    const BIO_ADDRINFO *ai = NULL;
 | 
						|
    BIO *bio;
 | 
						|
 | 
						|
    if (BIO_sock_init() != 1)
 | 
						|
        return NULL;
 | 
						|
 | 
						|
    /*
 | 
						|
     * Lookup IP address info for the server.
 | 
						|
     */
 | 
						|
    if (!BIO_lookup_ex(hostname, port, BIO_LOOKUP_SERVER, family, SOCK_DGRAM,
 | 
						|
                       0, &res))
 | 
						|
        return NULL;
 | 
						|
 | 
						|
    /*
 | 
						|
     * Loop through all the possible addresses for the server and find one
 | 
						|
     * we can create and start listening on
 | 
						|
     */
 | 
						|
    for (ai = res; ai != NULL; ai = BIO_ADDRINFO_next(ai)) {
 | 
						|
        /* Create the UDP socket */
 | 
						|
        sock = BIO_socket(BIO_ADDRINFO_family(ai), SOCK_DGRAM, 0, 0);
 | 
						|
        if (sock == -1)
 | 
						|
            continue;
 | 
						|
 | 
						|
        /* Start listening on the socket */
 | 
						|
        if (!BIO_listen(sock, BIO_ADDRINFO_address(ai), 0)) {
 | 
						|
            BIO_closesocket(sock);
 | 
						|
            continue;
 | 
						|
        }
 | 
						|
 | 
						|
        /* Set to non-blocking mode */
 | 
						|
        if (!BIO_socket_nbio(sock, 1)) {
 | 
						|
            BIO_closesocket(sock);
 | 
						|
            continue;
 | 
						|
        }
 | 
						|
 | 
						|
        break; /* stop searching if we found an addr */
 | 
						|
    }
 | 
						|
 | 
						|
    /* Free the address information resources we allocated earlier */
 | 
						|
    BIO_ADDRINFO_free(res);
 | 
						|
 | 
						|
    /* If we didn't bind any sockets, fail */
 | 
						|
    if (ai == NULL)
 | 
						|
        return NULL;
 | 
						|
 | 
						|
    /* Create a BIO to wrap the socket */
 | 
						|
    bio = BIO_new(BIO_s_datagram());
 | 
						|
    if (bio == NULL) {
 | 
						|
        BIO_closesocket(sock);
 | 
						|
        return NULL;
 | 
						|
    }
 | 
						|
 | 
						|
    /*
 | 
						|
     * Associate the newly created BIO with the underlying socket. By
 | 
						|
     * passing BIO_CLOSE here the socket will be automatically closed when
 | 
						|
     * the BIO is freed. Alternatively you can use BIO_NOCLOSE, in which
 | 
						|
     * case you must close the socket explicitly when it is no longer
 | 
						|
     * needed.
 | 
						|
     */
 | 
						|
    BIO_set_fd(bio, sock, BIO_CLOSE);
 | 
						|
 | 
						|
    return bio;
 | 
						|
}
 | 
						|
 | 
						|
static void usage(void)
 | 
						|
{
 | 
						|
    BIO_printf(bio_err, "quicserver [-6][-trace] hostname port certfile keyfile\n");
 | 
						|
}
 | 
						|
 | 
						|
int main(int argc, char *argv[])
 | 
						|
{
 | 
						|
    QUIC_TSERVER_ARGS tserver_args = {0};
 | 
						|
    QUIC_TSERVER *qtserv = NULL;
 | 
						|
    int ipv6 = 0, trace = 0;
 | 
						|
    int argnext = 1;
 | 
						|
    BIO *bio = NULL;
 | 
						|
    char *hostname, *port, *certfile, *keyfile;
 | 
						|
    int ret = EXIT_FAILURE;
 | 
						|
    unsigned char reqbuf[1024];
 | 
						|
    size_t numbytes, reqbytes = 0;
 | 
						|
    const char reqterm[] = {
 | 
						|
        '\r', '\n', '\r', '\n'
 | 
						|
    };
 | 
						|
    const char *response[] = {
 | 
						|
        "HTTP/1.0 200 ok\r\nContent-type: text/html\r\n\r\n<!DOCTYPE html>\n<html>\n<body>Hello world</body>\n</html>\n",
 | 
						|
        "HTTP/1.0 200 ok\r\nContent-type: text/html\r\n\r\n<!DOCTYPE html>\n<html>\n<body>Hello again</body>\n</html>\n",
 | 
						|
        "HTTP/1.0 200 ok\r\nContent-type: text/html\r\n\r\n<!DOCTYPE html>\n<html>\n<body>Another response</body>\n</html>\n",
 | 
						|
        "HTTP/1.0 200 ok\r\nContent-type: text/html\r\n\r\n<!DOCTYPE html>\n<html>\n<body>A message</body>\n</html>\n",
 | 
						|
    };
 | 
						|
    unsigned char alpn[] = { 8, 'h', 't', 't', 'p', '/', '1', '.', '0' };
 | 
						|
    int first = 1;
 | 
						|
    uint64_t streamid;
 | 
						|
    size_t respnum = 0;
 | 
						|
 | 
						|
    bio_err = BIO_new_fp(stderr, BIO_NOCLOSE | BIO_FP_TEXT);
 | 
						|
    if (argc == 0 || bio_err == NULL)
 | 
						|
        goto end2;
 | 
						|
 | 
						|
    while (argnext < argc) {
 | 
						|
        if (argv[argnext][0] != '-')
 | 
						|
            break;
 | 
						|
        if (strcmp(argv[argnext], "-6") == 0) {
 | 
						|
            ipv6 = 1;
 | 
						|
        } else if(strcmp(argv[argnext], "-trace") == 0) {
 | 
						|
            trace = 1;
 | 
						|
        } else {
 | 
						|
            BIO_printf(bio_err, "Unrecognised argument %s\n", argv[argnext]);
 | 
						|
            usage();
 | 
						|
            goto end2;
 | 
						|
        }
 | 
						|
        argnext++;
 | 
						|
    }
 | 
						|
 | 
						|
    if (argc - argnext != 4) {
 | 
						|
        usage();
 | 
						|
        goto end2;
 | 
						|
    }
 | 
						|
    hostname = argv[argnext++];
 | 
						|
    port = argv[argnext++];
 | 
						|
    certfile = argv[argnext++];
 | 
						|
    keyfile = argv[argnext++];
 | 
						|
 | 
						|
    bio = create_dgram_bio(ipv6 ? AF_INET6 : AF_INET, hostname, port);
 | 
						|
    if (bio == NULL || !BIO_up_ref(bio)) {
 | 
						|
        BIO_printf(bio_err, "Unable to create server socket\n");
 | 
						|
        goto end2;
 | 
						|
    }
 | 
						|
 | 
						|
    tserver_args.libctx = NULL;
 | 
						|
    tserver_args.net_rbio = bio;
 | 
						|
    tserver_args.net_wbio = bio;
 | 
						|
    tserver_args.alpn = alpn;
 | 
						|
    tserver_args.alpnlen = sizeof(alpn);
 | 
						|
    tserver_args.ctx = NULL;
 | 
						|
 | 
						|
    qtserv = ossl_quic_tserver_new(&tserver_args, certfile, keyfile);
 | 
						|
    if (qtserv == NULL) {
 | 
						|
        BIO_printf(bio_err, "Failed to create the QUIC_TSERVER\n");
 | 
						|
        goto end;
 | 
						|
    }
 | 
						|
 | 
						|
    BIO_printf(bio_err, "Starting quicserver\n");
 | 
						|
    BIO_printf(bio_err,
 | 
						|
               "Note that this utility will be removed in a future OpenSSL version.\n");
 | 
						|
    BIO_printf(bio_err,
 | 
						|
               "For test purposes only. Not for use in a production environment.\n");
 | 
						|
 | 
						|
    /* Ownership of the BIO is passed to qtserv */
 | 
						|
    bio = NULL;
 | 
						|
 | 
						|
    if (trace)
 | 
						|
#ifndef OPENSSL_NO_SSL_TRACE
 | 
						|
        ossl_quic_tserver_set_msg_callback(qtserv, SSL_trace, bio_err);
 | 
						|
#else
 | 
						|
        BIO_printf(bio_err,
 | 
						|
                   "Warning: -trace specified but no SSL tracing support present\n");
 | 
						|
#endif
 | 
						|
 | 
						|
    /* Wait for handshake to complete */
 | 
						|
    ossl_quic_tserver_tick(qtserv);
 | 
						|
    while(!ossl_quic_tserver_is_handshake_confirmed(qtserv)) {
 | 
						|
        wait_for_activity(qtserv);
 | 
						|
        ossl_quic_tserver_tick(qtserv);
 | 
						|
        if (ossl_quic_tserver_is_terminated(qtserv)) {
 | 
						|
            BIO_printf(bio_err, "Failed waiting for handshake completion\n");
 | 
						|
            ret = EXIT_FAILURE;
 | 
						|
            goto end;
 | 
						|
        }
 | 
						|
    }
 | 
						|
 | 
						|
    for (;; respnum++) {
 | 
						|
        if (respnum >= OSSL_NELEM(response))
 | 
						|
            goto end;
 | 
						|
        /* Wait for an incoming stream */
 | 
						|
        do {
 | 
						|
            streamid = ossl_quic_tserver_pop_incoming_stream(qtserv);
 | 
						|
            if (streamid == UINT64_MAX)
 | 
						|
                wait_for_activity(qtserv);
 | 
						|
            ossl_quic_tserver_tick(qtserv);
 | 
						|
            if (ossl_quic_tserver_is_terminated(qtserv)) {
 | 
						|
                /* Assume we finished everything the clients wants from us */
 | 
						|
                ret = EXIT_SUCCESS;
 | 
						|
                goto end;
 | 
						|
            }
 | 
						|
        } while(streamid == UINT64_MAX);
 | 
						|
 | 
						|
        /* Read the request */
 | 
						|
        do {
 | 
						|
            if (first)
 | 
						|
                first = 0;
 | 
						|
            else
 | 
						|
                wait_for_activity(qtserv);
 | 
						|
 | 
						|
            ossl_quic_tserver_tick(qtserv);
 | 
						|
            if (ossl_quic_tserver_is_terminated(qtserv)) {
 | 
						|
                BIO_printf(bio_err, "Failed reading request\n");
 | 
						|
                ret = EXIT_FAILURE;
 | 
						|
                goto end;
 | 
						|
            }
 | 
						|
 | 
						|
            if (ossl_quic_tserver_read(qtserv, streamid, reqbuf + reqbytes,
 | 
						|
                                    sizeof(reqbuf) - reqbytes,
 | 
						|
                                    &numbytes)) {
 | 
						|
                if (numbytes > 0)
 | 
						|
                    fwrite(reqbuf + reqbytes, 1, numbytes, stdout);
 | 
						|
                reqbytes += numbytes;
 | 
						|
            }
 | 
						|
        } while (reqbytes < sizeof(reqterm)
 | 
						|
                || memcmp(reqbuf + reqbytes - sizeof(reqterm), reqterm,
 | 
						|
                        sizeof(reqterm)) != 0);
 | 
						|
 | 
						|
        if ((streamid & QUIC_STREAM_DIR_UNI) != 0) {
 | 
						|
            /*
 | 
						|
            * Incoming stream was uni-directional. Create a server initiated
 | 
						|
            * uni-directional stream for the response.
 | 
						|
            */
 | 
						|
            if (!ossl_quic_tserver_stream_new(qtserv, 1, &streamid)) {
 | 
						|
                BIO_printf(bio_err, "Failed creating response stream\n");
 | 
						|
                goto end;
 | 
						|
            }
 | 
						|
        }
 | 
						|
 | 
						|
        /* Send the response */
 | 
						|
 | 
						|
        ossl_quic_tserver_tick(qtserv);
 | 
						|
        if (!ossl_quic_tserver_write(qtserv, streamid,
 | 
						|
                                    (unsigned char *)response[respnum],
 | 
						|
                                    strlen(response[respnum]), &numbytes))
 | 
						|
            goto end;
 | 
						|
 | 
						|
        if (!ossl_quic_tserver_conclude(qtserv, streamid))
 | 
						|
            goto end;
 | 
						|
    }
 | 
						|
 | 
						|
 end:
 | 
						|
    /* Free twice because we did an up-ref */
 | 
						|
    BIO_free(bio);
 | 
						|
 end2:
 | 
						|
    BIO_free(bio);
 | 
						|
    ossl_quic_tserver_free(qtserv);
 | 
						|
    BIO_free(bio_err);
 | 
						|
    return ret;
 | 
						|
}
 |