mirror of https://github.com/openssl/openssl.git
				
				
				
			
		
			
				
	
	
		
			140 lines
		
	
	
		
			4.0 KiB
		
	
	
	
		
			C
		
	
	
	
			
		
		
	
	
			140 lines
		
	
	
		
			4.0 KiB
		
	
	
	
		
			C
		
	
	
	
| /*
 | |
|  * Copyright 2023-2025 The OpenSSL Project Authors. All Rights Reserved.
 | |
|  *
 | |
|  * Licensed under the Apache License 2.0 (the "License").  You may not use
 | |
|  * this file except in compliance with the License.  You can obtain a copy
 | |
|  * in the file LICENSE in the source distribution or at
 | |
|  * https://www.openssl.org/source/license.html
 | |
|  */
 | |
| 
 | |
| /*
 | |
|  * We need access to the deprecated low level HMAC APIs for legacy purposes
 | |
|  * when the deprecated calls are not hidden
 | |
|  */
 | |
| #ifndef OPENSSL_NO_DEPRECATED_3_0
 | |
| # define OPENSSL_SUPPRESS_DEPRECATED
 | |
| #endif
 | |
| 
 | |
| #include <stdio.h>
 | |
| #include <string.h>
 | |
| 
 | |
| #include <openssl/opensslconf.h>
 | |
| #include <openssl/bio.h>
 | |
| #include <openssl/crypto.h>
 | |
| #include <openssl/ssl.h>
 | |
| #include <openssl/engine.h>
 | |
| 
 | |
| #include "helpers/ssltestlib.h"
 | |
| #include "testutil.h"
 | |
| #include "testutil/output.h"
 | |
| #include "internal/ktls.h"
 | |
| #include "../ssl/ssl_local.h"
 | |
| #include "../ssl/statem/statem_local.h"
 | |
| #include "internal/ssl_unwrap.h"
 | |
| 
 | |
| static OSSL_LIB_CTX *libctx = NULL;
 | |
| static char *cert = NULL;
 | |
| static char *privkey = NULL;
 | |
| 
 | |
| /*
 | |
|  * Test 0: Clientside handshake RTT (TLSv1.2)
 | |
|  * Test 1: Serverside handshake RTT (TLSv1.2)
 | |
|  * Test 2: Clientside handshake RTT (TLSv1.3)
 | |
|  * Test 3: Serverside handshake RTT (TLSv1.3)
 | |
|  * Test 4: Clientside handshake RTT with Early Data (TLSv1.3)
 | |
|  */
 | |
| static int test_handshake_rtt(int tst)
 | |
| {
 | |
|     SSL_CTX *cctx = NULL, *sctx = NULL;
 | |
|     SSL *clientssl = NULL, *serverssl = NULL;
 | |
|     int testresult = 0;
 | |
|     SSL_CONNECTION *s = NULL;
 | |
|     OSSL_STATEM *st = NULL;
 | |
|     uint64_t rtt;
 | |
| 
 | |
| #ifdef OPENSSL_NO_TLS1_2
 | |
|     if (tst <= 1)
 | |
|         return 1;
 | |
| #endif
 | |
| #ifdef OSSL_NO_USABLE_TLS1_3
 | |
|     if (tst >= 2)
 | |
|         return 1;
 | |
| #endif
 | |
| 
 | |
|     if (!TEST_true(create_ssl_ctx_pair(libctx, TLS_server_method(),
 | |
|                                        TLS_client_method(),
 | |
|                                        TLS1_VERSION,
 | |
|                                        (tst <= 1) ? TLS1_2_VERSION
 | |
|                                                   : TLS1_3_VERSION,
 | |
|                                        &sctx, &cctx, cert, privkey))
 | |
|             || !TEST_true(create_ssl_objects(sctx, cctx, &serverssl, &clientssl,
 | |
|                                              NULL, NULL)))
 | |
|         goto end;
 | |
| 
 | |
|     s = SSL_CONNECTION_FROM_SSL(tst % 2 == 0 ? clientssl : serverssl);
 | |
|     if (!TEST_ptr(s) || !TEST_ptr(st = &s->statem))
 | |
|         return 0;
 | |
| 
 | |
|     /* implicitly set handshake rtt with a delay */
 | |
|     switch (tst) {
 | |
|     case 0:
 | |
|         st->hand_state = TLS_ST_CW_CLNT_HELLO;
 | |
|         ossl_statem_client_write_transition(s);
 | |
|         OSSL_sleep(1);
 | |
|         st->hand_state = TLS_ST_CR_SRVR_DONE;
 | |
|         ossl_statem_client_write_transition(s);
 | |
|         break;
 | |
|     case 1:
 | |
|         st->hand_state = TLS_ST_SW_SRVR_DONE;
 | |
|         ossl_statem_server_write_transition(s);
 | |
|         OSSL_sleep(1);
 | |
|         st->hand_state = TLS_ST_SR_FINISHED;
 | |
|         ossl_statem_server_write_transition(s);
 | |
|         break;
 | |
|     case 2:
 | |
|         st->hand_state = TLS_ST_CW_CLNT_HELLO;
 | |
|         ossl_statem_client_write_transition(s);
 | |
|         OSSL_sleep(1);
 | |
|         st->hand_state = TLS_ST_CR_SRVR_DONE;
 | |
|         ossl_statem_client_write_transition(s);
 | |
|         break;
 | |
|     case 3:
 | |
|         st->hand_state = TLS_ST_SW_SRVR_DONE;
 | |
|         ossl_statem_server_write_transition(s);
 | |
|         OSSL_sleep(1);
 | |
|         st->hand_state = TLS_ST_SR_FINISHED;
 | |
|         ossl_statem_server_write_transition(s);
 | |
|         break;
 | |
|     case 4:
 | |
|         st->hand_state = TLS_ST_EARLY_DATA;
 | |
|         ossl_statem_client_write_transition(s);
 | |
|         OSSL_sleep(1);
 | |
|         st->hand_state = TLS_ST_CR_SRVR_DONE;
 | |
|         ossl_statem_client_write_transition(s);
 | |
|         break;
 | |
|     }
 | |
| 
 | |
|     if (!TEST_int_gt(SSL_get_handshake_rtt(SSL_CONNECTION_GET_SSL(s), &rtt), 0))
 | |
|         goto end;
 | |
|     /* 1 millisec is the absolute minimum it could be given the delay */
 | |
|     if (!TEST_uint64_t_ge(rtt, 1000))
 | |
|         goto end;
 | |
| 
 | |
|     testresult = 1;
 | |
| 
 | |
|  end:
 | |
|     SSL_free(serverssl);
 | |
|     SSL_free(clientssl);
 | |
|     SSL_CTX_free(sctx);
 | |
|     SSL_CTX_free(cctx);
 | |
| 
 | |
|     return testresult;
 | |
| }
 | |
| 
 | |
| int setup_tests(void)
 | |
| {
 | |
|     ADD_ALL_TESTS(test_handshake_rtt, 5);
 | |
| 
 | |
|     return 1;
 | |
| }
 |