#include <sys/ioctl.h>
#include <sys/socket.h>
#include <sys/sysctl.h>
#include <sys/mman.h>
#include <netinet/in.h>
#include <fcntl.h>
#include <stdlib.h>
#include <poll.h>
#include <pthread.h>
#include <openssl/ssl.h>
#include <openssl/err.h>
#include <openssl/bio.h>
#include <openssl/x509v3.h>
#include <atf-c.h>
#define FSIZE (size_t)(2 * 1024 * 1024)
struct ctx {
EVP_PKEY *pkey;
X509 *cert;
SSL_CTX *ctx;
SSL *cln;
SSL *srv;
int cs;
int ss;
int fd;
void *mfd;
uint16_t port;
pthread_t thr;
off_t offset;
size_t size;
bool nb;
ossl_ssize_t sbytes;
enum {
INIT,
READY,
RUNNING,
EXITING,
} state;
pthread_mutex_t mtx;
pthread_cond_t cv;
};
static void *server_thread(void *arg);
static void
common_init(struct ctx *c)
{
char hostname[sizeof("localhost:65536")];
char tempname[] = "/tmp/ssl_sendfile_test.XXXXXXXXXX";
X509_NAME *name;
X509_EXTENSION *ext;
SSL *ssl;
bool enable;
size_t len = sizeof(enable);
if (sysctlbyname("kern.ipc.tls.enable", &enable, &len, NULL, 0) == -1) {
if (errno == ENOENT)
atf_tc_skip("kernel does not have options KERN_TLS");
atf_libc_error(errno, "Failed to read kern.ipc.tls.enable");
}
if (!enable)
atf_tc_skip("kern.ipc.tls.enable is off");
c->state = INIT;
SSL_library_init();
OpenSSL_add_all_algorithms();
SSL_load_error_strings();
ATF_REQUIRE(c->pkey = EVP_RSA_gen(2048));
ATF_REQUIRE(c->cert = X509_new());
ASN1_INTEGER_set(X509_get_serialNumber(c->cert), 1);
X509_set_version(c->cert, 2);
X509_gmtime_adj(X509_get_notBefore(c->cert), 0);
X509_gmtime_adj(X509_get_notAfter(c->cert), 60L*60*24*365);
X509_set_pubkey(c->cert, c->pkey);
name = X509_get_subject_name(c->cert);
X509_NAME_add_entry_by_txt(name, "CN", MBSTRING_ASC,
(unsigned char *)"localhost", -1, -1, 0);
X509_set_issuer_name(c->cert, name);
ext = X509V3_EXT_conf_nid(NULL, NULL, NID_basic_constraints,
"critical,CA:FALSE");
X509_add_ext(c->cert, ext, -1);
X509_EXTENSION_free(ext);
ATF_REQUIRE(X509_sign(c->cert, c->pkey, EVP_sha256()) > 0);
ATF_REQUIRE((c->fd = mkstemp(tempname)) > 0);
ATF_REQUIRE(unlink(tempname) == 0);
ATF_REQUIRE(ftruncate(c->fd, FSIZE) == 0);
ATF_REQUIRE((c->mfd = mmap(NULL, FSIZE, PROT_READ | PROT_WRITE,
MAP_SHARED, c->fd, 0)) != MAP_FAILED);
arc4random_buf(c->mfd, FSIZE);
ATF_REQUIRE(pthread_mutex_init(&c->mtx, NULL) == 0);
ATF_REQUIRE(pthread_cond_init(&c->cv, NULL) == 0);
ATF_REQUIRE(pthread_mutex_lock(&c->mtx) == 0);
ATF_REQUIRE(pthread_create(&c->thr, NULL, server_thread, c) == 0);
if (c->state != READY)
ATF_REQUIRE(pthread_cond_wait(&c->cv, &c->mtx) == 0);
ATF_REQUIRE(c->state == READY);
ATF_REQUIRE(pthread_mutex_unlock(&c->mtx) == 0);
ATF_REQUIRE(c->ctx = SSL_CTX_new(TLS_client_method()));
ATF_REQUIRE(X509_STORE_add_cert(SSL_CTX_get_cert_store(c->ctx),
c->cert));
ATF_REQUIRE(ssl = c->cln = SSL_new(c->ctx));
ATF_REQUIRE((c->cs = socket(AF_INET, SOCK_STREAM, 0)) > 0);
ATF_REQUIRE(connect(c->cs, (struct sockaddr *)&(struct sockaddr_in)
{ .sin_family = AF_INET, .sin_len = sizeof(struct sockaddr_in),
.sin_addr.s_addr = htonl(INADDR_LOOPBACK), .sin_port = c->port },
sizeof(struct sockaddr_in)) == 0);
ATF_REQUIRE(SSL_set_fd(ssl, c->cs) == 1);
ATF_REQUIRE(snprintf(hostname, sizeof(hostname), "localhost:%u",
ntohs(c->port)) >= (int)sizeof("localhost:0"));
ATF_REQUIRE(SSL_set_tlsext_host_name(ssl, hostname) == 1);
SSL_set_verify(ssl, SSL_VERIFY_PEER, NULL);
ATF_REQUIRE(SSL_connect(ssl) == 1);
SSL_set_mode(ssl, SSL_MODE_AUTO_RETRY);
ATF_REQUIRE(fcntl(c->cs, F_SETFL, O_NONBLOCK) != -1);
}
static void
common_cleanup(struct ctx *c)
{
ATF_REQUIRE(pthread_mutex_lock(&c->mtx) == 0);
c->state = EXITING;
ATF_REQUIRE(pthread_cond_signal(&c->cv) == 0);
ATF_REQUIRE(pthread_mutex_unlock(&c->mtx) == 0);
ATF_REQUIRE(pthread_join(c->thr, NULL) == 0);
ATF_REQUIRE(pthread_mutex_destroy(&c->mtx) == 0);
ATF_REQUIRE(pthread_cond_destroy(&c->cv) == 0);
SSL_free(c->cln);
SSL_CTX_free(c->ctx);
X509_free(c->cert);
EVP_PKEY_free(c->pkey);
}
static void *
server_thread(void *arg) {
struct ctx *c = arg;
SSL_CTX *srv;
SSL *ssl;
struct sockaddr_in sin = {
.sin_family = AF_INET,
.sin_len = sizeof(sin),
.sin_addr.s_addr = htonl(INADDR_LOOPBACK),
};
int s;
ATF_REQUIRE(srv = SSL_CTX_new(TLS_server_method()));
ATF_REQUIRE(SSL_CTX_set_options(srv, SSL_OP_ENABLE_KTLS) &
SSL_OP_ENABLE_KTLS);
SSL_CTX_use_PrivateKey(srv, c->pkey);
SSL_CTX_use_certificate(srv, c->cert);
ATF_REQUIRE((s = socket(AF_INET, SOCK_STREAM, 0)) > 0);
ATF_REQUIRE(setsockopt(s, SOL_SOCKET, SO_REUSEADDR, &(socklen_t){1},
sizeof(int)) == 0);
ATF_REQUIRE(bind(s, (struct sockaddr *)&sin, sizeof(sin)) == 0);
ATF_REQUIRE(getsockname(s, (struct sockaddr *)&sin,
&(socklen_t){ sizeof(sin) }) == 0);
ATF_REQUIRE(listen(s, -1) == 0);
ATF_REQUIRE(pthread_mutex_lock(&c->mtx) == 0);
c->port = sin.sin_port;
c->state = READY;
ATF_REQUIRE(pthread_cond_signal(&c->cv) == 0);
ATF_REQUIRE(pthread_mutex_unlock(&c->mtx) == 0);
ATF_REQUIRE((c->ss = accept(s, NULL, NULL)) > 0);
ssl = c->srv = SSL_new(srv);
SSL_set_fd(ssl, c->ss);
SSL_set_mode(ssl, SSL_MODE_AUTO_RETRY);
ATF_REQUIRE(SSL_accept(ssl) > 0);
ATF_REQUIRE(pthread_mutex_lock(&c->mtx) == 0);
while (c->state != EXITING) {
if (c->state == RUNNING) {
ATF_REQUIRE(fcntl(c->ss, F_SETFL,
c->nb ? O_NONBLOCK : 0) != -1);
c->sbytes = SSL_sendfile(ssl, c->fd, c->offset,
c->size, 0);
c->state = READY;
}
ATF_REQUIRE(c->state == READY);
ATF_REQUIRE(pthread_cond_signal(&c->cv) == 0);
ATF_REQUIRE(pthread_cond_wait(&c->cv, &c->mtx) == 0);
}
ATF_REQUIRE(pthread_mutex_unlock(&c->mtx) == 0);
SSL_shutdown(ssl);
SSL_free(ssl);
close(c->ss);
SSL_CTX_free(srv);
close(s);
return (NULL);
}
static void
sendme_locked(struct ctx *c, off_t offset, size_t size, bool nb)
{
ATF_REQUIRE(c->state == READY);
c->state = RUNNING;
c->offset = offset;
c->size = size;
c->nb = nb;
ATF_REQUIRE(pthread_cond_signal(&c->cv) == 0);
}
static void
sendme(struct ctx *c, off_t offset, size_t size, bool nb)
{
ATF_REQUIRE(pthread_mutex_lock(&c->mtx) == 0);
sendme_locked(c, offset, size, nb);
ATF_REQUIRE(pthread_mutex_unlock(&c->mtx) == 0);
}
static int
SSL_read_b(SSL *ssl, void *buf, int size)
{
int rv, fd;
ATF_REQUIRE((fd = SSL_get_fd(ssl)) > 0);
while ((rv = SSL_read(ssl, buf, size)) <= 0 &&
SSL_get_error(ssl, rv) == SSL_ERROR_WANT_READ)
ATF_REQUIRE(poll(&(struct pollfd){ .fd = fd, .events = POLLIN },
1, INFTIM) == 1);
return (rv);
}
ATF_TC_WITHOUT_HEAD(basic);
ATF_TC_BODY(basic, tc)
{
struct ctx c;
char buf[64];
size_t nread;
int n;
common_init(&c);
sendme(&c, 0, 0, false);
nread = 0;
while (nread < FSIZE && (n = SSL_read_b(c.cln, buf, sizeof(buf))) > 0) {
ATF_REQUIRE(memcmp((char *)c.mfd + nread, buf, n) == 0);
nread += n;
}
ATF_REQUIRE(nread == FSIZE);
ATF_REQUIRE(c.sbytes == FSIZE);
common_cleanup(&c);
}
ATF_TC_WITHOUT_HEAD(random);
ATF_TC_BODY(random, tc)
{
struct ctx c;
#define RSIZE (256*1024)
common_init(&c);
for (u_int i = 0; i < 10; i++) {
char buf[RSIZE];
off_t offset;
size_t size, n, nread, expect;
offset = arc4random() % FSIZE;
size = arc4random() % RSIZE;
sendme(&c, offset, size, false);
expect = offset + size < FSIZE ? size : FSIZE - offset;
nread = 0;
while (nread < expect &&
(n = SSL_read_b(c.cln, buf, sizeof(buf))) > 0) {
ATF_REQUIRE(memcmp((char *)c.mfd + offset + nread, buf,
n) == 0);
nread += n;
}
ATF_REQUIRE(nread == expect);
ATF_REQUIRE(c.sbytes == (ssize_t)expect);
}
common_cleanup(&c);
}
ATF_TC_WITHOUT_HEAD(truncate);
ATF_TC_BODY(truncate, tc)
{
struct ctx c;
char buf[128 * 1024];
size_t nread;
int n;
#define TRUNC (FSIZE - 1024)
common_init(&c);
ATF_REQUIRE(setsockopt(c.ss, SOL_SOCKET, SO_SNDBUF, &(int){FSIZE / 16},
sizeof(int)) == 0);
ATF_REQUIRE(setsockopt(c.cs, SOL_SOCKET, SO_RCVBUF, &(int){FSIZE / 16},
sizeof(int)) == 0);
sendme(&c, 0, 0, false);
while (poll(&(struct pollfd){ .fd = c.ss, .events = POLLOUT }, 1, 1)
!= 0)
;
ATF_REQUIRE(ftruncate(c.fd, TRUNC) == 0);
nread = 0;
while (nread < TRUNC && (n = SSL_read_b(c.cln, buf, sizeof(buf))) > 0) {
ATF_REQUIRE(memcmp((char *)c.mfd + nread, buf, n) == 0);
nread += n;
}
ATF_REQUIRE(nread == TRUNC);
ATF_REQUIRE(pthread_mutex_lock(&c.mtx) == 0);
ATF_REQUIRE(c.sbytes == TRUNC);
ATF_REQUIRE(pthread_mutex_unlock(&c.mtx) == 0);
common_cleanup(&c);
}
ATF_TC_WITHOUT_HEAD(grow);
ATF_TC_BODY(grow, tc)
{
struct ctx c;
char buf[128 * 1024];
size_t nread;
void *map;
int n;
#define GROW (FSIZE/2)
common_init(&c);
ATF_REQUIRE(setsockopt(c.ss, SOL_SOCKET, SO_SNDBUF, &(int){FSIZE / 16},
sizeof(int)) == 0);
ATF_REQUIRE(setsockopt(c.cs, SOL_SOCKET, SO_RCVBUF, &(int){FSIZE / 16},
sizeof(int)) == 0);
sendme(&c, 0, 0, false);
while (poll(&(struct pollfd){ .fd = c.ss, .events = POLLOUT }, 1, 1)
!= 0)
;
ATF_REQUIRE(ftruncate(c.fd, FSIZE + GROW) == 0);
ATF_REQUIRE((map = mmap(NULL, GROW, PROT_READ | PROT_WRITE,
MAP_SHARED, c.fd, FSIZE)) != MAP_FAILED);
arc4random_buf(map, GROW);
nread = 0;
while (nread < FSIZE && (n = SSL_read_b(c.cln, buf,
FSIZE - nread > sizeof(buf) ? sizeof(buf) : FSIZE - nread)) > 0) {
ATF_REQUIRE(memcmp((char *)c.mfd + nread, buf, n) == 0);
nread += n;
}
ATF_REQUIRE(nread == FSIZE);
nread = 0;
while (nread < GROW && (n = SSL_read_b(c.cln, buf, sizeof(buf))) > 0) {
ATF_REQUIRE(memcmp((char *)map + nread, buf, n) == 0);
nread += n;
}
ATF_REQUIRE(nread == GROW);
ATF_REQUIRE(pthread_mutex_lock(&c.mtx) == 0);
ATF_REQUIRE(c.sbytes == FSIZE + GROW);
ATF_REQUIRE(pthread_mutex_unlock(&c.mtx) == 0);
common_cleanup(&c);
}
ATF_TC_WITHOUT_HEAD(offset_beyond_eof);
ATF_TC_BODY(offset_beyond_eof, tc)
{
struct ctx c;
common_init(&c);
c.sbytes = -1;
sendme(&c, FSIZE + 1, 0, false);
ATF_REQUIRE(pthread_mutex_lock(&c.mtx) == 0);
while (c.state != READY)
ATF_REQUIRE(pthread_cond_wait(&c.cv, &c.mtx) == 0);
ATF_REQUIRE(c.sbytes == 0);
ATF_REQUIRE(pthread_mutex_unlock(&c.mtx) == 0);
common_cleanup(&c);
}
ATF_TC_WITHOUT_HEAD(eagain_vs_eof);
ATF_TC_BODY(eagain_vs_eof, tc)
{
struct ctx c;
char buf[16 * 1024];
ssize_t nread;
int n;
common_init(&c);
ATF_REQUIRE(pthread_mutex_lock(&c.mtx) == 0);
sendme_locked(&c, 0, FSIZE, true);
while (c.state != READY)
ATF_REQUIRE(pthread_cond_wait(&c.cv, &c.mtx) == 0);
ATF_REQUIRE(c.sbytes > 0);
ATF_REQUIRE(SSL_get_error(c.srv, c.sbytes) == 0);
#if 0
ATF_REQUIRE(BIO_should_retry(SSL_get_wbio(c.srv)));
#endif
sendme_locked(&c, 0, FSIZE, true);
while (c.state != READY)
ATF_REQUIRE(pthread_cond_wait(&c.cv, &c.mtx) == 0);
ATF_REQUIRE(c.sbytes == -1);
ATF_REQUIRE(SSL_get_error(c.srv, c.sbytes) == SSL_ERROR_WANT_WRITE);
ATF_REQUIRE(BIO_should_retry(SSL_get_wbio(c.srv)));
nread = 0;
while (nread < c.sbytes &&
(n = SSL_read_b(c.cln, buf, sizeof(buf))) > 0) {
ATF_REQUIRE(memcmp((char *)c.mfd + nread, buf, n) == 0);
nread += n;
}
sendme_locked(&c, FSIZE, 0, true);
while (c.state != READY)
ATF_REQUIRE(pthread_cond_wait(&c.cv, &c.mtx) == 0);
ATF_REQUIRE(c.sbytes == 0);
ATF_REQUIRE(SSL_get_error(c.srv, c.sbytes) == SSL_ERROR_SYSCALL);
#if 0
ATF_REQUIRE(!BIO_should_retry(SSL_get_wbio(c.srv)));
#endif
sendme_locked(&c, FSIZE - 100, 0, true);
while (c.state != READY)
ATF_REQUIRE(pthread_cond_wait(&c.cv, &c.mtx) == 0);
ATF_REQUIRE(c.sbytes == 100);
ATF_REQUIRE(SSL_get_error(c.srv, c.sbytes) == 0);
#if 0
ATF_REQUIRE(!BIO_should_retry(SSL_get_wbio(c.srv)));
#endif
ATF_REQUIRE(pthread_mutex_unlock(&c.mtx) == 0);
common_cleanup(&c);
}
ATF_TP_ADD_TCS(tp)
{
ATF_TP_ADD_TC(tp, basic);
ATF_TP_ADD_TC(tp, random);
ATF_TP_ADD_TC(tp, truncate);
ATF_TP_ADD_TC(tp, grow);
ATF_TP_ADD_TC(tp, offset_beyond_eof);
ATF_TP_ADD_TC(tp, eagain_vs_eof);
return atf_no_error();
}