Index: third_party/grpc/test/core/security/secure_endpoint_test.c |
diff --git a/third_party/grpc/test/core/security/secure_endpoint_test.c b/third_party/grpc/test/core/security/secure_endpoint_test.c |
new file mode 100644 |
index 0000000000000000000000000000000000000000..0e8c38a53ec3cf8795cf9029626ca969c12e55c5 |
--- /dev/null |
+++ b/third_party/grpc/test/core/security/secure_endpoint_test.c |
@@ -0,0 +1,197 @@ |
+/* |
+ * |
+ * Copyright 2015-2016, Google Inc. |
+ * All rights reserved. |
+ * |
+ * Redistribution and use in source and binary forms, with or without |
+ * modification, are permitted provided that the following conditions are |
+ * met: |
+ * |
+ * * Redistributions of source code must retain the above copyright |
+ * notice, this list of conditions and the following disclaimer. |
+ * * Redistributions in binary form must reproduce the above |
+ * copyright notice, this list of conditions and the following disclaimer |
+ * in the documentation and/or other materials provided with the |
+ * distribution. |
+ * * Neither the name of Google Inc. nor the names of its |
+ * contributors may be used to endorse or promote products derived from |
+ * this software without specific prior written permission. |
+ * |
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
+ * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
+ * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR |
+ * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT |
+ * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
+ * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
+ * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
+ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
+ * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
+ * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
+ * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
+ * |
+ */ |
+ |
+#include "test/core/iomgr/endpoint_tests.h" |
+ |
+#include <fcntl.h> |
+#include <sys/types.h> |
+ |
+#include <grpc/grpc.h> |
+#include <grpc/support/alloc.h> |
+#include <grpc/support/log.h> |
+#include "src/core/iomgr/endpoint_pair.h" |
+#include "src/core/iomgr/iomgr.h" |
+#include "src/core/security/secure_endpoint.h" |
+#include "src/core/tsi/fake_transport_security.h" |
+#include "test/core/util/test_config.h" |
+ |
+static gpr_mu *g_mu; |
+static grpc_pollset *g_pollset; |
+ |
+static grpc_endpoint_test_fixture secure_endpoint_create_fixture_tcp_socketpair( |
+ size_t slice_size, gpr_slice *leftover_slices, size_t leftover_nslices) { |
+ grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT; |
+ tsi_frame_protector *fake_read_protector = tsi_create_fake_protector(NULL); |
+ tsi_frame_protector *fake_write_protector = tsi_create_fake_protector(NULL); |
+ grpc_endpoint_test_fixture f; |
+ grpc_endpoint_pair tcp; |
+ |
+ tcp = grpc_iomgr_create_endpoint_pair("fixture", slice_size); |
+ grpc_endpoint_add_to_pollset(&exec_ctx, tcp.client, g_pollset); |
+ grpc_endpoint_add_to_pollset(&exec_ctx, tcp.server, g_pollset); |
+ |
+ if (leftover_nslices == 0) { |
+ f.client_ep = |
+ grpc_secure_endpoint_create(fake_read_protector, tcp.client, NULL, 0); |
+ } else { |
+ unsigned i; |
+ tsi_result result; |
+ size_t still_pending_size; |
+ size_t total_buffer_size = 8192; |
+ size_t buffer_size = total_buffer_size; |
+ uint8_t *encrypted_buffer = gpr_malloc(buffer_size); |
+ uint8_t *cur = encrypted_buffer; |
+ gpr_slice encrypted_leftover; |
+ for (i = 0; i < leftover_nslices; i++) { |
+ gpr_slice plain = leftover_slices[i]; |
+ uint8_t *message_bytes = GPR_SLICE_START_PTR(plain); |
+ size_t message_size = GPR_SLICE_LENGTH(plain); |
+ while (message_size > 0) { |
+ size_t protected_buffer_size_to_send = buffer_size; |
+ size_t processed_message_size = message_size; |
+ result = tsi_frame_protector_protect( |
+ fake_write_protector, message_bytes, &processed_message_size, cur, |
+ &protected_buffer_size_to_send); |
+ GPR_ASSERT(result == TSI_OK); |
+ message_bytes += processed_message_size; |
+ message_size -= processed_message_size; |
+ cur += protected_buffer_size_to_send; |
+ GPR_ASSERT(buffer_size >= protected_buffer_size_to_send); |
+ buffer_size -= protected_buffer_size_to_send; |
+ } |
+ gpr_slice_unref(plain); |
+ } |
+ do { |
+ size_t protected_buffer_size_to_send = buffer_size; |
+ result = tsi_frame_protector_protect_flush(fake_write_protector, cur, |
+ &protected_buffer_size_to_send, |
+ &still_pending_size); |
+ GPR_ASSERT(result == TSI_OK); |
+ cur += protected_buffer_size_to_send; |
+ GPR_ASSERT(buffer_size >= protected_buffer_size_to_send); |
+ buffer_size -= protected_buffer_size_to_send; |
+ } while (still_pending_size > 0); |
+ encrypted_leftover = gpr_slice_from_copied_buffer( |
+ (const char *)encrypted_buffer, total_buffer_size - buffer_size); |
+ f.client_ep = grpc_secure_endpoint_create(fake_read_protector, tcp.client, |
+ &encrypted_leftover, 1); |
+ gpr_slice_unref(encrypted_leftover); |
+ gpr_free(encrypted_buffer); |
+ } |
+ |
+ f.server_ep = |
+ grpc_secure_endpoint_create(fake_write_protector, tcp.server, NULL, 0); |
+ grpc_exec_ctx_finish(&exec_ctx); |
+ return f; |
+} |
+ |
+static grpc_endpoint_test_fixture |
+secure_endpoint_create_fixture_tcp_socketpair_noleftover(size_t slice_size) { |
+ return secure_endpoint_create_fixture_tcp_socketpair(slice_size, NULL, 0); |
+} |
+ |
+static grpc_endpoint_test_fixture |
+secure_endpoint_create_fixture_tcp_socketpair_leftover(size_t slice_size) { |
+ gpr_slice s = |
+ gpr_slice_from_copied_string("hello world 12345678900987654321"); |
+ grpc_endpoint_test_fixture f; |
+ |
+ f = secure_endpoint_create_fixture_tcp_socketpair(slice_size, &s, 1); |
+ return f; |
+} |
+ |
+static void clean_up(void) {} |
+ |
+static grpc_endpoint_test_config configs[] = { |
+ {"secure_ep/tcp_socketpair", |
+ secure_endpoint_create_fixture_tcp_socketpair_noleftover, clean_up}, |
+ {"secure_ep/tcp_socketpair_leftover", |
+ secure_endpoint_create_fixture_tcp_socketpair_leftover, clean_up}, |
+}; |
+ |
+static void inc_call_ctr(grpc_exec_ctx *exec_ctx, void *arg, bool success) { |
+ ++*(int *)arg; |
+} |
+ |
+static void test_leftover(grpc_endpoint_test_config config, size_t slice_size) { |
+ grpc_endpoint_test_fixture f = config.create_fixture(slice_size); |
+ gpr_slice_buffer incoming; |
+ gpr_slice s = |
+ gpr_slice_from_copied_string("hello world 12345678900987654321"); |
+ grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT; |
+ int n = 0; |
+ grpc_closure done_closure; |
+ gpr_log(GPR_INFO, "Start test left over"); |
+ |
+ gpr_slice_buffer_init(&incoming); |
+ grpc_closure_init(&done_closure, inc_call_ctr, &n); |
+ grpc_endpoint_read(&exec_ctx, f.client_ep, &incoming, &done_closure); |
+ grpc_exec_ctx_finish(&exec_ctx); |
+ GPR_ASSERT(n == 1); |
+ GPR_ASSERT(incoming.count == 1); |
+ GPR_ASSERT(0 == gpr_slice_cmp(s, incoming.slices[0])); |
+ |
+ grpc_endpoint_shutdown(&exec_ctx, f.client_ep); |
+ grpc_endpoint_shutdown(&exec_ctx, f.server_ep); |
+ grpc_endpoint_destroy(&exec_ctx, f.client_ep); |
+ grpc_endpoint_destroy(&exec_ctx, f.server_ep); |
+ grpc_exec_ctx_finish(&exec_ctx); |
+ gpr_slice_unref(s); |
+ gpr_slice_buffer_destroy(&incoming); |
+ |
+ clean_up(); |
+} |
+ |
+static void destroy_pollset(grpc_exec_ctx *exec_ctx, void *p, bool success) { |
+ grpc_pollset_destroy(p); |
+} |
+ |
+int main(int argc, char **argv) { |
+ grpc_closure destroyed; |
+ grpc_exec_ctx exec_ctx = GRPC_EXEC_CTX_INIT; |
+ grpc_test_init(argc, argv); |
+ |
+ grpc_init(); |
+ g_pollset = gpr_malloc(grpc_pollset_size()); |
+ grpc_pollset_init(g_pollset, &g_mu); |
+ grpc_endpoint_tests(configs[0], g_pollset, g_mu); |
+ test_leftover(configs[1], 1); |
+ grpc_closure_init(&destroyed, destroy_pollset, g_pollset); |
+ grpc_pollset_shutdown(&exec_ctx, g_pollset, &destroyed); |
+ grpc_exec_ctx_finish(&exec_ctx); |
+ grpc_shutdown(); |
+ |
+ gpr_free(g_pollset); |
+ |
+ return 0; |
+} |