Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(387)

Side by Side Diff: net/test/openssl_helper.cc

Issue 266243004: Clang format slam. Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Created 6 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 // This helper binary is only used for testing Chrome's SSL stack. 5 // This helper binary is only used for testing Chrome's SSL stack.
6 6
7 #include <sys/types.h> 7 #include <sys/types.h>
8 #include <sys/socket.h> 8 #include <sys/socket.h>
9 9
10 #include <openssl/bio.h> 10 #include <openssl/bio.h>
11 #include <openssl/ssl.h> 11 #include <openssl/ssl.h>
12 #include <openssl/err.h> 12 #include <openssl/err.h>
13 13
14 static const char kDefaultPEMFile[] = "net/data/ssl/certificates/ok_cert.pem"; 14 static const char kDefaultPEMFile[] = "net/data/ssl/certificates/ok_cert.pem";
15 15
16 // Server Name Indication callback from OpenSSL 16 // Server Name Indication callback from OpenSSL
17 static int sni_cb(SSL *s, int *ad, void *arg) { 17 static int sni_cb(SSL* s, int* ad, void* arg) {
18 const char* servername = SSL_get_servername(s, TLSEXT_NAMETYPE_host_name); 18 const char* servername = SSL_get_servername(s, TLSEXT_NAMETYPE_host_name);
19 if (servername && strcmp(servername, "test.example.com") == 0) 19 if (servername && strcmp(servername, "test.example.com") == 0)
20 *reinterpret_cast<bool*>(arg) = true; 20 *reinterpret_cast<bool*>(arg) = true;
21 21
22 return SSL_TLSEXT_ERR_OK; 22 return SSL_TLSEXT_ERR_OK;
23 } 23 }
24 24
25 // Client certificate verification callback from OpenSSL 25 // Client certificate verification callback from OpenSSL
26 static int verify_cb(int preverify_ok, X509_STORE_CTX *ctx) { 26 static int verify_cb(int preverify_ok, X509_STORE_CTX* ctx) {
27 return 1; 27 return 1;
28 } 28 }
29 29
30 // Next Protocol Negotiation callback from OpenSSL 30 // Next Protocol Negotiation callback from OpenSSL
31 static int next_proto_cb(SSL *ssl, const unsigned char **out, 31 static int next_proto_cb(SSL* ssl,
32 unsigned int *outlen, void *arg) { 32 const unsigned char** out,
33 unsigned int* outlen,
34 void* arg) {
33 bool* npn_mispredict = reinterpret_cast<bool*>(arg); 35 bool* npn_mispredict = reinterpret_cast<bool*>(arg);
34 static char kProtos[] = "\003foo\003bar"; 36 static char kProtos[] = "\003foo\003bar";
35 static char kProtos2[] = "\003baz\003boo"; 37 static char kProtos2[] = "\003baz\003boo";
36 static unsigned count = 0; 38 static unsigned count = 0;
37 39
38 if (!*npn_mispredict || count == 0) { 40 if (!*npn_mispredict || count == 0) {
39 *out = (const unsigned char*) kProtos; 41 *out = (const unsigned char*)kProtos;
40 *outlen = sizeof(kProtos) - 1; 42 *outlen = sizeof(kProtos) - 1;
41 } else { 43 } else {
42 *out = (const unsigned char*) kProtos2; 44 *out = (const unsigned char*)kProtos2;
43 *outlen = sizeof(kProtos2) - 1; 45 *outlen = sizeof(kProtos2) - 1;
44 } 46 }
45 count++; 47 count++;
46 return SSL_TLSEXT_ERR_OK; 48 return SSL_TLSEXT_ERR_OK;
47 } 49 }
48 50
49 int 51 int main(int argc, char** argv) {
50 main(int argc, char **argv) {
51 SSL_library_init(); 52 SSL_library_init();
52 ERR_load_crypto_strings(); 53 ERR_load_crypto_strings();
53 OpenSSL_add_all_algorithms(); 54 OpenSSL_add_all_algorithms();
54 SSL_load_error_strings(); 55 SSL_load_error_strings();
55 56
56 bool sni = false, sni_good = false, snap_start = false; 57 bool sni = false, sni_good = false, snap_start = false;
57 bool snap_start_recovery = false, sslv3 = false, session_tickets = false; 58 bool snap_start_recovery = false, sslv3 = false, session_tickets = false;
58 bool fail_resume = false, client_cert = false, npn = false; 59 bool fail_resume = false, client_cert = false, npn = false;
59 bool npn_mispredict = false; 60 bool npn_mispredict = false;
60 61
(...skipping 64 matching lines...) Expand 10 before | Expand all | Expand 10 after
125 SSL_CTX_set_tlsext_servername_callback(ctx, sni_cb); 126 SSL_CTX_set_tlsext_servername_callback(ctx, sni_cb);
126 SSL_CTX_set_tlsext_servername_arg(ctx, &sni_good); 127 SSL_CTX_set_tlsext_servername_arg(ctx, &sni_good);
127 } 128 }
128 129
129 BIO* key = BIO_new(BIO_s_file()); 130 BIO* key = BIO_new(BIO_s_file());
130 if (BIO_read_filename(key, key_file) <= 0) { 131 if (BIO_read_filename(key, key_file) <= 0) {
131 fprintf(stderr, "Failed to read %s\n", key_file); 132 fprintf(stderr, "Failed to read %s\n", key_file);
132 return 1; 133 return 1;
133 } 134 }
134 135
135 EVP_PKEY *pkey = PEM_read_bio_PrivateKey(key, NULL, NULL, NULL); 136 EVP_PKEY* pkey = PEM_read_bio_PrivateKey(key, NULL, NULL, NULL);
136 if (!pkey) { 137 if (!pkey) {
137 fprintf(stderr, "Failed to parse %s\n", key_file); 138 fprintf(stderr, "Failed to parse %s\n", key_file);
138 return 1; 139 return 1;
139 } 140 }
140 BIO_free(key); 141 BIO_free(key);
141 142
142
143 BIO* cert = BIO_new(BIO_s_file()); 143 BIO* cert = BIO_new(BIO_s_file());
144 if (BIO_read_filename(cert, cert_file) <= 0) { 144 if (BIO_read_filename(cert, cert_file) <= 0) {
145 fprintf(stderr, "Failed to read %s\n", cert_file); 145 fprintf(stderr, "Failed to read %s\n", cert_file);
146 return 1; 146 return 1;
147 } 147 }
148 148
149 X509 *pcert = PEM_read_bio_X509_AUX(cert, NULL, NULL, NULL); 149 X509* pcert = PEM_read_bio_X509_AUX(cert, NULL, NULL, NULL);
150 if (!pcert) { 150 if (!pcert) {
151 fprintf(stderr, "Failed to parse %s\n", cert_file); 151 fprintf(stderr, "Failed to parse %s\n", cert_file);
152 return 1; 152 return 1;
153 } 153 }
154 BIO_free(cert); 154 BIO_free(cert);
155 155
156 if (SSL_CTX_use_certificate(ctx, pcert) <= 0) { 156 if (SSL_CTX_use_certificate(ctx, pcert) <= 0) {
157 fprintf(stderr, "Failed to load %s\n", cert_file); 157 fprintf(stderr, "Failed to load %s\n", cert_file);
158 return 1; 158 return 1;
159 } 159 }
(...skipping 30 matching lines...) Expand all
190 190
191 for (unsigned connections = 0; connections < connection_limit; 191 for (unsigned connections = 0; connections < connection_limit;
192 connections++) { 192 connections++) {
193 const int fd = accept(3, NULL, NULL); 193 const int fd = accept(3, NULL, NULL);
194 194
195 SSL* server = SSL_new(ctx); 195 SSL* server = SSL_new(ctx);
196 BIO* bio = BIO_new_socket(fd, 1 /* take ownership of fd */); 196 BIO* bio = BIO_new_socket(fd, 1 /* take ownership of fd */);
197 SSL_set_bio(server, bio, bio); 197 SSL_set_bio(server, bio, bio);
198 198
199 if (fail_resume) { 199 if (fail_resume) {
200 SSL_set_session_id_context(server, (unsigned char*) &connections, 200 SSL_set_session_id_context(
201 sizeof(connections)); 201 server, (unsigned char*)&connections, sizeof(connections));
202 } 202 }
203 203
204 int err; 204 int err;
205 for (;;) { 205 for (;;) {
206 const int ret = SSL_accept(server); 206 const int ret = SSL_accept(server);
207 if (ret == 1) 207 if (ret == 1)
208 break; 208 break;
209 209
210 err = SSL_get_error(server, ret); 210 err = SSL_get_error(server, ret);
211 if (err == SSL_ERROR_WANT_READ) 211 if (err == SSL_ERROR_WANT_READ)
212 continue; 212 continue;
213 if (err == SSL_ERROR_SERVER_RANDOM_VALIDATION_PENDING && snap_start) { 213 if (err == SSL_ERROR_SERVER_RANDOM_VALIDATION_PENDING && snap_start) {
214 SSL_set_suggested_server_random_validity( 214 SSL_set_suggested_server_random_validity(server, !snap_start_recovery);
215 server, !snap_start_recovery);
216 continue; 215 continue;
217 } 216 }
218 ERR_print_errors_fp(stderr); 217 ERR_print_errors_fp(stderr);
219 fprintf(stderr, "SSL_accept failed: %d\n", err); 218 fprintf(stderr, "SSL_accept failed: %d\n", err);
220 return 1; 219 return 1;
221 } 220 }
222 221
223 if (sni && !sni_good) { 222 if (sni && !sni_good) {
224 fprintf(stderr, "SNI failed\n"); 223 fprintf(stderr, "SNI failed\n");
225 return 1; 224 return 1;
226 } 225 }
227 226
228 if (npn) { 227 if (npn) {
229 const unsigned char *data, *expected_data; 228 const unsigned char* data, *expected_data;
230 unsigned len, expected_len; 229 unsigned len, expected_len;
231 SSL_get0_next_proto_negotiated(server, &data, &len); 230 SSL_get0_next_proto_negotiated(server, &data, &len);
232 if (!npn_mispredict || connections == 0) { 231 if (!npn_mispredict || connections == 0) {
233 expected_data = (unsigned char*) "foo"; 232 expected_data = (unsigned char*)"foo";
234 expected_len = 3; 233 expected_len = 3;
235 } else { 234 } else {
236 expected_data = (unsigned char*) "baz"; 235 expected_data = (unsigned char*)"baz";
237 expected_len = 3; 236 expected_len = 3;
238 } 237 }
239 if (len != expected_len || memcmp(data, expected_data, len) != 0) { 238 if (len != expected_len || memcmp(data, expected_data, len) != 0) {
240 fprintf(stderr, "Bad NPN: %d\n", len); 239 fprintf(stderr, "Bad NPN: %d\n", len);
241 return 1; 240 return 1;
242 } 241 }
243 } 242 }
244 243
245 unsigned char buffer[6]; 244 unsigned char buffer[6];
246 245
247 int ret = SSL_read(server, buffer, sizeof(buffer)); 246 int ret = SSL_read(server, buffer, sizeof(buffer));
248 if (ret == -1) { 247 if (ret == -1) {
249 err = SSL_get_error(server, ret); 248 err = SSL_get_error(server, ret);
250 ERR_print_errors_fp(stderr); 249 ERR_print_errors_fp(stderr);
251 fprintf(stderr, "SSL_read failed: %d\n", err); 250 fprintf(stderr, "SSL_read failed: %d\n", err);
252 } 251 }
253 if (memcmp(buffer, "hello!", sizeof(buffer)) == 0) { 252 if (memcmp(buffer, "hello!", sizeof(buffer)) == 0) {
254 SSL_write(server, "goodbye!", 8); 253 SSL_write(server, "goodbye!", 8);
255 } 254 }
256 255
257 SSL_shutdown(server); 256 SSL_shutdown(server);
258 SSL_shutdown(server); 257 SSL_shutdown(server);
259 } 258 }
260 259
261 SSL_CTX_free(ctx); 260 SSL_CTX_free(ctx);
262 261
263 return 0; 262 return 0;
264 } 263 }
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698