summaryrefslogtreecommitdiffstats
path: root/tests/ngtcp2_conn_test.c
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-28 07:30:55 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-28 07:30:55 +0000
commit17e81f2cd1843f01838245eae7b5ed5edf83d6be (patch)
treea0f685dff11ce5a2dc546a7b46a48bae5d1c0140 /tests/ngtcp2_conn_test.c
parentInitial commit. (diff)
downloadngtcp2-upstream.tar.xz
ngtcp2-upstream.zip
Adding upstream version 0.12.1+dfsg.upstream/0.12.1+dfsgupstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'tests/ngtcp2_conn_test.c')
-rw-r--r--tests/ngtcp2_conn_test.c9351
1 files changed, 9351 insertions, 0 deletions
diff --git a/tests/ngtcp2_conn_test.c b/tests/ngtcp2_conn_test.c
new file mode 100644
index 0000000..f982aea
--- /dev/null
+++ b/tests/ngtcp2_conn_test.c
@@ -0,0 +1,9351 @@
+/*
+ * ngtcp2
+ *
+ * Copyright (c) 2017 ngtcp2 contributors
+ *
+ * Permission is hereby granted, free of charge, to any person obtaining
+ * a copy of this software and associated documentation files (the
+ * "Software"), to deal in the Software without restriction, including
+ * without limitation the rights to use, copy, modify, merge, publish,
+ * distribute, sublicense, and/or sell copies of the Software, and to
+ * permit persons to whom the Software is furnished to do so, subject to
+ * the following conditions:
+ *
+ * The above copyright notice and this permission notice shall be
+ * included in all copies or substantial portions of the Software.
+ *
+ * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
+ * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
+ * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
+ * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
+ * LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
+ * OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
+ * WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
+ */
+#include "ngtcp2_conn_test.h"
+
+#include <assert.h>
+
+#include <CUnit/CUnit.h>
+
+#include "ngtcp2_conn.h"
+#include "ngtcp2_test_helper.h"
+#include "ngtcp2_mem.h"
+#include "ngtcp2_pkt.h"
+#include "ngtcp2_cid.h"
+#include "ngtcp2_conv.h"
+#include "ngtcp2_vec.h"
+#include "ngtcp2_rcvry.h"
+#include "ngtcp2_addr.h"
+#include "ngtcp2_net.h"
+
+static void qlog_write(void *user_data, uint32_t flags, const void *data,
+ size_t datalen) {
+ (void)user_data;
+ (void)flags;
+ (void)data;
+ (void)datalen;
+}
+
+static int null_encrypt(uint8_t *dest, const ngtcp2_crypto_aead *aead,
+ const ngtcp2_crypto_aead_ctx *aead_ctx,
+ const uint8_t *plaintext, size_t plaintextlen,
+ const uint8_t *nonce, size_t noncelen,
+ const uint8_t *aad, size_t aadlen) {
+ (void)dest;
+ (void)aead;
+ (void)aead_ctx;
+ (void)plaintext;
+ (void)plaintextlen;
+ (void)nonce;
+ (void)noncelen;
+ (void)aad;
+ (void)aadlen;
+
+ if (plaintextlen && plaintext != dest) {
+ memcpy(dest, plaintext, plaintextlen);
+ }
+ memset(dest + plaintextlen, 0, NGTCP2_FAKE_AEAD_OVERHEAD);
+
+ return 0;
+}
+
+static int null_decrypt(uint8_t *dest, const ngtcp2_crypto_aead *aead,
+ const ngtcp2_crypto_aead_ctx *aead_ctx,
+ const uint8_t *ciphertext, size_t ciphertextlen,
+ const uint8_t *nonce, size_t noncelen,
+ const uint8_t *aad, size_t aadlen) {
+ (void)dest;
+ (void)aead;
+ (void)aead_ctx;
+ (void)ciphertext;
+ (void)nonce;
+ (void)noncelen;
+ (void)aad;
+ (void)aadlen;
+ assert(ciphertextlen >= NGTCP2_FAKE_AEAD_OVERHEAD);
+ memmove(dest, ciphertext, ciphertextlen - NGTCP2_FAKE_AEAD_OVERHEAD);
+ return 0;
+}
+
+static int fail_decrypt(uint8_t *dest, const ngtcp2_crypto_aead *aead,
+ const ngtcp2_crypto_aead_ctx *aead_ctx,
+ const uint8_t *ciphertext, size_t ciphertextlen,
+ const uint8_t *nonce, size_t noncelen,
+ const uint8_t *aad, size_t aadlen) {
+ (void)dest;
+ (void)aead;
+ (void)aead_ctx;
+ (void)ciphertext;
+ (void)ciphertextlen;
+ (void)nonce;
+ (void)noncelen;
+ (void)aad;
+ (void)aadlen;
+ return NGTCP2_ERR_DECRYPT;
+}
+
+static int null_hp_mask(uint8_t *dest, const ngtcp2_crypto_cipher *hp,
+ const ngtcp2_crypto_cipher_ctx *hp_ctx,
+ const uint8_t *sample) {
+ (void)hp;
+ (void)hp_ctx;
+ (void)sample;
+ memcpy(dest, NGTCP2_FAKE_HP_MASK, sizeof(NGTCP2_FAKE_HP_MASK) - 1);
+ return 0;
+}
+
+static int get_new_connection_id(ngtcp2_conn *conn, ngtcp2_cid *cid,
+ uint8_t *token, size_t cidlen,
+ void *user_data) {
+ (void)user_data;
+ memset(cid->data, 0, cidlen);
+ cid->data[0] = (uint8_t)(conn->scid.last_seq + 1);
+ cid->datalen = cidlen;
+ memset(token, 0, NGTCP2_STATELESS_RESET_TOKENLEN);
+ return 0;
+}
+
+static uint8_t null_secret[32];
+static uint8_t null_iv[16];
+static uint8_t null_data[4096];
+
+static ngtcp2_crypto_km null_ckm = {
+ {NULL, 0}, {0}, {null_iv, sizeof(null_iv)},
+ -1, 0, NGTCP2_CRYPTO_KM_FLAG_NONE,
+};
+
+static ngtcp2_path_storage null_path;
+static ngtcp2_path_storage new_path;
+static ngtcp2_path_storage new_nat_path;
+
+static ngtcp2_pkt_info null_pi;
+
+void init_static_path(void) {
+ path_init(&null_path, 0, 0, 0, 0);
+ path_init(&new_path, 1, 0, 2, 0);
+ path_init(&new_nat_path, 0, 0, 0, 1);
+}
+
+static ngtcp2_vec *null_datav(ngtcp2_vec *datav, size_t len) {
+ datav->base = null_data;
+ datav->len = len;
+ return datav;
+}
+
+static void init_crypto_ctx(ngtcp2_crypto_ctx *ctx) {
+ memset(ctx, 0, sizeof(*ctx));
+ ctx->aead.max_overhead = NGTCP2_FAKE_AEAD_OVERHEAD;
+ ctx->max_encryption = 9999;
+ ctx->max_decryption_failure = 8888;
+}
+
+static void init_initial_crypto_ctx(ngtcp2_crypto_ctx *ctx) {
+ memset(ctx, 0, sizeof(*ctx));
+ ctx->aead.max_overhead = NGTCP2_INITIAL_AEAD_OVERHEAD;
+ ctx->max_encryption = 9999;
+ ctx->max_decryption_failure = 8888;
+}
+
+typedef struct {
+ uint64_t pkt_num;
+ /* stream_data is intended to store the arguments passed in
+ recv_stream_data callback. */
+ struct {
+ int64_t stream_id;
+ uint32_t flags;
+ size_t datalen;
+ } stream_data;
+ struct {
+ uint32_t flags;
+ const uint8_t *data;
+ size_t datalen;
+ uint64_t dgram_id;
+ } datagram;
+ struct {
+ uint32_t flags;
+ int64_t stream_id;
+ uint64_t app_error_code;
+ } stream_close;
+} my_user_data;
+
+static int client_initial(ngtcp2_conn *conn, void *user_data) {
+ (void)user_data;
+
+ ngtcp2_conn_submit_crypto_data(conn, NGTCP2_CRYPTO_LEVEL_INITIAL, null_data,
+ 217);
+
+ return 0;
+}
+
+static int client_initial_early_data(ngtcp2_conn *conn, void *user_data) {
+ ngtcp2_crypto_aead_ctx aead_ctx = {0};
+ ngtcp2_crypto_cipher_ctx hp_ctx = {0};
+ ngtcp2_crypto_ctx crypto_ctx;
+
+ (void)user_data;
+
+ ngtcp2_conn_submit_crypto_data(conn, NGTCP2_CRYPTO_LEVEL_INITIAL, null_data,
+ 217);
+
+ init_crypto_ctx(&crypto_ctx);
+
+ ngtcp2_conn_set_early_crypto_ctx(conn, &crypto_ctx);
+ ngtcp2_conn_install_early_key(conn, &aead_ctx, null_iv, sizeof(null_iv),
+ &hp_ctx);
+
+ return 0;
+}
+
+static int client_initial_large_crypto_early_data(ngtcp2_conn *conn,
+ void *user_data) {
+ ngtcp2_crypto_aead_ctx aead_ctx = {0};
+ ngtcp2_crypto_cipher_ctx hp_ctx = {0};
+ ngtcp2_crypto_ctx crypto_ctx;
+
+ (void)user_data;
+
+ /* Initial CRYPTO data which is larger than a typical single
+ datagram. */
+ ngtcp2_conn_submit_crypto_data(conn, NGTCP2_CRYPTO_LEVEL_INITIAL, null_data,
+ 1500);
+
+ init_crypto_ctx(&crypto_ctx);
+
+ ngtcp2_conn_set_early_crypto_ctx(conn, &crypto_ctx);
+ ngtcp2_conn_install_early_key(conn, &aead_ctx, null_iv, sizeof(null_iv),
+ &hp_ctx);
+
+ return 0;
+}
+
+static int recv_client_initial_no_remote_transport_params(
+ ngtcp2_conn *conn, const ngtcp2_cid *dcid, void *user_data) {
+ ngtcp2_crypto_aead_ctx aead_ctx = {0};
+ ngtcp2_crypto_cipher_ctx hp_ctx = {0};
+ ngtcp2_crypto_ctx ctx;
+
+ (void)dcid;
+ (void)user_data;
+
+ init_initial_crypto_ctx(&ctx);
+
+ ngtcp2_conn_set_initial_crypto_ctx(conn, &ctx);
+ ngtcp2_conn_install_initial_key(conn, &aead_ctx, null_iv, &hp_ctx, &aead_ctx,
+ null_iv, &hp_ctx, sizeof(null_iv));
+
+ init_crypto_ctx(&ctx);
+
+ ngtcp2_conn_set_crypto_ctx(conn, &ctx);
+ conn->negotiated_version = conn->client_chosen_version;
+ ngtcp2_conn_install_rx_handshake_key(conn, &aead_ctx, null_iv,
+ sizeof(null_iv), &hp_ctx);
+ ngtcp2_conn_install_tx_handshake_key(conn, &aead_ctx, null_iv,
+ sizeof(null_iv), &hp_ctx);
+
+ return 0;
+}
+
+static int recv_client_initial(ngtcp2_conn *conn, const ngtcp2_cid *dcid,
+ void *user_data) {
+ ngtcp2_transport_params params;
+
+ recv_client_initial_no_remote_transport_params(conn, dcid, user_data);
+
+ ngtcp2_transport_params_default(&params);
+ params.initial_scid = conn->dcid.current.cid;
+ params.original_dcid = conn->rcid;
+ ngtcp2_conn_set_remote_transport_params(conn, &params);
+
+ return 0;
+}
+
+static int recv_client_initial_early(ngtcp2_conn *conn, const ngtcp2_cid *dcid,
+ void *user_data) {
+ ngtcp2_crypto_aead_ctx aead_ctx = {0};
+ ngtcp2_crypto_cipher_ctx hp_ctx = {0};
+ ngtcp2_crypto_ctx ctx;
+
+ recv_client_initial(conn, dcid, user_data);
+
+ init_crypto_ctx(&ctx);
+
+ ngtcp2_conn_set_early_crypto_ctx(conn, &ctx);
+ ngtcp2_conn_install_early_key(conn, &aead_ctx, null_iv, sizeof(null_iv),
+ &hp_ctx);
+
+ return 0;
+}
+
+static int recv_crypto_data(ngtcp2_conn *conn, ngtcp2_crypto_level crypto_level,
+ uint64_t offset, const uint8_t *data,
+ size_t datalen, void *user_data) {
+ (void)conn;
+ (void)crypto_level;
+ (void)offset;
+ (void)data;
+ (void)datalen;
+ (void)user_data;
+ return 0;
+}
+
+static int recv_crypto_data_server_early_data(ngtcp2_conn *conn,
+ ngtcp2_crypto_level crypto_level,
+ uint64_t offset,
+ const uint8_t *data,
+ size_t datalen, void *user_data) {
+ ngtcp2_crypto_aead_ctx aead_ctx = {0};
+ ngtcp2_crypto_cipher_ctx hp_ctx = {0};
+
+ (void)offset;
+ (void)crypto_level;
+ (void)data;
+ (void)datalen;
+ (void)user_data;
+
+ assert(conn->server);
+
+ ngtcp2_conn_submit_crypto_data(conn, NGTCP2_CRYPTO_LEVEL_INITIAL, null_data,
+ 179);
+
+ ngtcp2_conn_install_tx_key(conn, null_secret, sizeof(null_secret), &aead_ctx,
+ null_iv, sizeof(null_iv), &hp_ctx);
+
+ conn->callbacks.recv_crypto_data = recv_crypto_data;
+
+ return 0;
+}
+
+static int update_key(ngtcp2_conn *conn, uint8_t *rx_secret, uint8_t *tx_secret,
+ ngtcp2_crypto_aead_ctx *rx_aead_ctx, uint8_t *rx_iv,
+ ngtcp2_crypto_aead_ctx *tx_aead_ctx, uint8_t *tx_iv,
+ const uint8_t *current_rx_secret,
+ const uint8_t *current_tx_secret, size_t secretlen,
+ void *user_data) {
+ (void)conn;
+ (void)current_rx_secret;
+ (void)current_tx_secret;
+ (void)user_data;
+ (void)secretlen;
+
+ assert(sizeof(null_secret) == secretlen);
+
+ memset(rx_secret, 0xff, sizeof(null_secret));
+ memset(tx_secret, 0xff, sizeof(null_secret));
+ rx_aead_ctx->native_handle = NULL;
+ memset(rx_iv, 0xff, sizeof(null_iv));
+ tx_aead_ctx->native_handle = NULL;
+ memset(tx_iv, 0xff, sizeof(null_iv));
+
+ return 0;
+}
+
+static int recv_crypto_handshake_error(ngtcp2_conn *conn,
+ ngtcp2_crypto_level crypto_level,
+ uint64_t offset, const uint8_t *data,
+ size_t datalen, void *user_data) {
+ (void)conn;
+ (void)crypto_level;
+ (void)offset;
+ (void)data;
+ (void)datalen;
+ (void)user_data;
+ return NGTCP2_ERR_CRYPTO;
+}
+
+static int recv_crypto_fatal_alert_generated(ngtcp2_conn *conn,
+ ngtcp2_crypto_level crypto_level,
+ uint64_t offset,
+ const uint8_t *data,
+ size_t datalen, void *user_data) {
+ (void)conn;
+ (void)crypto_level;
+ (void)offset;
+ (void)data;
+ (void)datalen;
+ (void)user_data;
+ return NGTCP2_ERR_CRYPTO;
+}
+
+static int recv_crypto_data_server(ngtcp2_conn *conn,
+ ngtcp2_crypto_level crypto_level,
+ uint64_t offset, const uint8_t *data,
+ size_t datalen, void *user_data) {
+ (void)offset;
+ (void)data;
+ (void)datalen;
+ (void)user_data;
+
+ ngtcp2_conn_submit_crypto_data(conn,
+ crypto_level == NGTCP2_CRYPTO_LEVEL_INITIAL
+ ? NGTCP2_CRYPTO_LEVEL_INITIAL
+ : NGTCP2_CRYPTO_LEVEL_HANDSHAKE,
+ null_data, 218);
+
+ return 0;
+}
+
+static int recv_stream_data(ngtcp2_conn *conn, uint32_t flags,
+ int64_t stream_id, uint64_t offset,
+ const uint8_t *data, size_t datalen,
+ void *user_data, void *stream_user_data) {
+ my_user_data *ud = user_data;
+ (void)conn;
+ (void)offset;
+ (void)data;
+ (void)stream_user_data;
+
+ if (ud) {
+ ud->stream_data.stream_id = stream_id;
+ ud->stream_data.flags = flags;
+ ud->stream_data.datalen = datalen;
+ }
+
+ return 0;
+}
+
+static int
+recv_stream_data_shutdown_stream_read(ngtcp2_conn *conn, uint32_t flags,
+ int64_t stream_id, uint64_t offset,
+ const uint8_t *data, size_t datalen,
+ void *user_data, void *stream_user_data) {
+ int rv;
+
+ recv_stream_data(conn, flags, stream_id, offset, data, datalen, user_data,
+ stream_user_data);
+
+ rv = ngtcp2_conn_shutdown_stream_read(conn, stream_id, NGTCP2_APP_ERR01);
+ if (rv != 0) {
+ return NGTCP2_ERR_CALLBACK_FAILURE;
+ }
+
+ return 0;
+}
+
+static int stream_close(ngtcp2_conn *conn, uint32_t flags, int64_t stream_id,
+ uint64_t app_error_code, void *user_data,
+ void *stream_user_data) {
+ my_user_data *ud = user_data;
+ (void)conn;
+ (void)stream_user_data;
+
+ if (ud) {
+ ud->stream_close.flags = flags;
+ ud->stream_close.stream_id = stream_id;
+ ud->stream_close.app_error_code = app_error_code;
+ }
+
+ return 0;
+}
+
+static int recv_retry(ngtcp2_conn *conn, const ngtcp2_pkt_hd *hd,
+ void *user_data) {
+ (void)conn;
+ (void)hd;
+ (void)user_data;
+ return 0;
+}
+
+static void genrand(uint8_t *dest, size_t destlen,
+ const ngtcp2_rand_ctx *rand_ctx) {
+ (void)rand_ctx;
+
+ memset(dest, 0, destlen);
+}
+
+static int recv_datagram(ngtcp2_conn *conn, uint32_t flags, const uint8_t *data,
+ size_t datalen, void *user_data) {
+ my_user_data *ud = user_data;
+ (void)conn;
+ (void)flags;
+
+ if (ud) {
+ ud->datagram.flags = flags;
+ ud->datagram.data = data;
+ ud->datagram.datalen = datalen;
+ }
+
+ return 0;
+}
+
+static int ack_datagram(ngtcp2_conn *conn, uint64_t dgram_id, void *user_data) {
+ my_user_data *ud = user_data;
+ (void)conn;
+
+ if (ud) {
+ ud->datagram.dgram_id = dgram_id;
+ }
+
+ return 0;
+}
+
+static int get_path_challenge_data(ngtcp2_conn *conn, uint8_t *data,
+ void *user_data) {
+ (void)conn;
+ (void)user_data;
+
+ memset(data, 0, NGTCP2_PATH_CHALLENGE_DATALEN);
+
+ return 0;
+}
+
+static int version_negotiation(ngtcp2_conn *conn, uint32_t version,
+ const ngtcp2_cid *client_dcid, void *user_data) {
+ ngtcp2_crypto_aead_ctx aead_ctx = {0};
+ ngtcp2_crypto_cipher_ctx hp_ctx = {0};
+ (void)client_dcid;
+ (void)user_data;
+
+ ngtcp2_conn_install_vneg_initial_key(conn, version, &aead_ctx, null_iv,
+ &hp_ctx, &aead_ctx, null_iv, &hp_ctx,
+ sizeof(null_iv));
+
+ return 0;
+}
+
+static void delete_crypto_aead_ctx(ngtcp2_conn *conn,
+ ngtcp2_crypto_aead_ctx *aead_ctx,
+ void *user_data) {
+ (void)conn;
+ (void)aead_ctx;
+ (void)user_data;
+}
+
+static void delete_crypto_cipher_ctx(ngtcp2_conn *conn,
+ ngtcp2_crypto_cipher_ctx *cipher_ctx,
+ void *user_data) {
+ (void)conn;
+ (void)cipher_ctx;
+ (void)user_data;
+}
+
+static void server_default_settings(ngtcp2_settings *settings) {
+ memset(settings, 0, sizeof(*settings));
+ settings->log_printf = NULL;
+ settings->initial_ts = 0;
+ settings->initial_rtt = NGTCP2_DEFAULT_INITIAL_RTT;
+ settings->max_tx_udp_payload_size = 2048;
+ settings->no_tx_udp_payload_size_shaping = 1;
+ settings->handshake_timeout = NGTCP2_DEFAULT_HANDSHAKE_TIMEOUT;
+}
+
+static void server_default_transport_params(ngtcp2_transport_params *params) {
+ size_t i;
+
+ memset(params, 0, sizeof(*params));
+ params->initial_max_stream_data_bidi_local = 65535;
+ params->initial_max_stream_data_bidi_remote = 65535;
+ params->initial_max_stream_data_uni = 65535;
+ params->initial_max_data = 128 * 1024;
+ params->initial_max_streams_bidi = 3;
+ params->initial_max_streams_uni = 2;
+ params->max_idle_timeout = 60 * NGTCP2_SECONDS;
+ params->max_udp_payload_size = 65535;
+ params->stateless_reset_token_present = 1;
+ params->active_connection_id_limit = 8;
+ for (i = 0; i < NGTCP2_STATELESS_RESET_TOKENLEN; ++i) {
+ params->stateless_reset_token[i] = (uint8_t)i;
+ }
+}
+
+static void server_default_callbacks(ngtcp2_callbacks *cb) {
+ memset(cb, 0, sizeof(*cb));
+ cb->recv_client_initial = recv_client_initial;
+ cb->recv_crypto_data = recv_crypto_data_server;
+ cb->decrypt = null_decrypt;
+ cb->encrypt = null_encrypt;
+ cb->hp_mask = null_hp_mask;
+ cb->rand = genrand;
+ cb->get_new_connection_id = get_new_connection_id;
+ cb->update_key = update_key;
+ cb->delete_crypto_aead_ctx = delete_crypto_aead_ctx;
+ cb->delete_crypto_cipher_ctx = delete_crypto_cipher_ctx;
+ cb->get_path_challenge_data = get_path_challenge_data;
+ cb->version_negotiation = version_negotiation;
+}
+
+static void server_early_callbacks(ngtcp2_callbacks *cb) {
+ server_default_callbacks(cb);
+
+ cb->recv_client_initial = recv_client_initial_early;
+ cb->recv_crypto_data = recv_crypto_data_server_early_data;
+}
+
+static void client_default_settings(ngtcp2_settings *settings) {
+ memset(settings, 0, sizeof(*settings));
+ settings->log_printf = NULL;
+ settings->initial_ts = 0;
+ settings->initial_rtt = NGTCP2_DEFAULT_INITIAL_RTT;
+ settings->max_tx_udp_payload_size = 2048;
+ settings->no_tx_udp_payload_size_shaping = 1;
+}
+
+static void client_default_transport_params(ngtcp2_transport_params *params) {
+ memset(params, 0, sizeof(*params));
+ params->initial_max_stream_data_bidi_local = 65535;
+ params->initial_max_stream_data_bidi_remote = 65535;
+ params->initial_max_stream_data_uni = 65535;
+ params->initial_max_data = 128 * 1024;
+ params->initial_max_streams_bidi = 0;
+ params->initial_max_streams_uni = 2;
+ params->max_idle_timeout = 60 * NGTCP2_SECONDS;
+ params->max_udp_payload_size = 65535;
+ params->stateless_reset_token_present = 0;
+ params->active_connection_id_limit = 8;
+}
+
+static void client_default_callbacks(ngtcp2_callbacks *cb) {
+ memset(cb, 0, sizeof(*cb));
+ cb->client_initial = client_initial;
+ cb->recv_crypto_data = recv_crypto_data;
+ cb->decrypt = null_decrypt;
+ cb->encrypt = null_encrypt;
+ cb->hp_mask = null_hp_mask;
+ cb->recv_retry = recv_retry;
+ cb->rand = genrand;
+ cb->get_new_connection_id = get_new_connection_id;
+ cb->update_key = update_key;
+ cb->delete_crypto_aead_ctx = delete_crypto_aead_ctx;
+ cb->delete_crypto_cipher_ctx = delete_crypto_cipher_ctx;
+ cb->get_path_challenge_data = get_path_challenge_data;
+ cb->version_negotiation = version_negotiation;
+}
+
+static void client_early_callbacks(ngtcp2_callbacks *cb) {
+ client_default_callbacks(cb);
+
+ cb->client_initial = client_initial_early_data;
+}
+
+static void conn_set_scid_used(ngtcp2_conn *conn) {
+ ngtcp2_scid *scid;
+ ngtcp2_ksl_it it;
+ int rv;
+ (void)rv;
+
+ assert(1 + (conn->local.transport_params.preferred_address_present != 0) ==
+ ngtcp2_ksl_len(&conn->scid.set));
+
+ it = ngtcp2_ksl_begin(&conn->scid.set);
+ scid = ngtcp2_ksl_it_get(&it);
+ scid->flags |= NGTCP2_SCID_FLAG_USED;
+
+ assert(NGTCP2_PQ_BAD_INDEX == scid->pe.index);
+
+ rv = ngtcp2_pq_push(&conn->scid.used, &scid->pe);
+
+ assert(0 == rv);
+}
+
+static void
+setup_default_server_settings(ngtcp2_conn **pconn, const ngtcp2_path *path,
+ const ngtcp2_settings *settings,
+ const ngtcp2_transport_params *params) {
+ ngtcp2_callbacks cb;
+ ngtcp2_cid dcid, scid;
+ ngtcp2_transport_params remote_params;
+ ngtcp2_crypto_aead_ctx aead_ctx = {0};
+ ngtcp2_crypto_cipher_ctx hp_ctx = {0};
+ ngtcp2_crypto_ctx crypto_ctx;
+
+ dcid_init(&dcid);
+ scid_init(&scid);
+
+ init_crypto_ctx(&crypto_ctx);
+
+ server_default_callbacks(&cb);
+
+ ngtcp2_conn_server_new(pconn, &dcid, &scid, path, NGTCP2_PROTO_VER_V1, &cb,
+ settings, params,
+ /* mem = */ NULL, NULL);
+ ngtcp2_conn_set_crypto_ctx(*pconn, &crypto_ctx);
+ ngtcp2_conn_install_rx_handshake_key(*pconn, &aead_ctx, null_iv,
+ sizeof(null_iv), &hp_ctx);
+ ngtcp2_conn_install_tx_handshake_key(*pconn, &aead_ctx, null_iv,
+ sizeof(null_iv), &hp_ctx);
+ ngtcp2_conn_install_rx_key(*pconn, null_secret, sizeof(null_secret),
+ &aead_ctx, null_iv, sizeof(null_iv), &hp_ctx);
+ ngtcp2_conn_install_tx_key(*pconn, null_secret, sizeof(null_secret),
+ &aead_ctx, null_iv, sizeof(null_iv), &hp_ctx);
+ (*pconn)->state = NGTCP2_CS_POST_HANDSHAKE;
+ (*pconn)->flags |= NGTCP2_CONN_FLAG_CONN_ID_NEGOTIATED |
+ NGTCP2_CONN_FLAG_HANDSHAKE_COMPLETED |
+ NGTCP2_CONN_FLAG_HANDSHAKE_COMPLETED_HANDLED |
+ NGTCP2_CONN_FLAG_HANDSHAKE_CONFIRMED;
+ (*pconn)->dcid.current.flags |= NGTCP2_DCID_FLAG_PATH_VALIDATED;
+ conn_set_scid_used(*pconn);
+ memset(&remote_params, 0, sizeof(remote_params));
+ remote_params.initial_max_stream_data_bidi_local = 64 * 1024;
+ remote_params.initial_max_stream_data_bidi_remote = 64 * 1024;
+ remote_params.initial_max_stream_data_uni = 64 * 1024;
+ remote_params.initial_max_streams_bidi = 0;
+ remote_params.initial_max_streams_uni = 1;
+ remote_params.initial_max_data = 64 * 1024;
+ remote_params.active_connection_id_limit = 8;
+ remote_params.max_udp_payload_size = NGTCP2_DEFAULT_MAX_RECV_UDP_PAYLOAD_SIZE;
+ ngtcp2_transport_params_copy_new(&(*pconn)->remote.transport_params,
+ &remote_params, (*pconn)->mem);
+ (*pconn)->local.bidi.max_streams = remote_params.initial_max_streams_bidi;
+ (*pconn)->local.uni.max_streams = remote_params.initial_max_streams_uni;
+ (*pconn)->tx.max_offset = remote_params.initial_max_data;
+ (*pconn)->negotiated_version = (*pconn)->client_chosen_version;
+}
+
+static void setup_default_server(ngtcp2_conn **pconn) {
+ ngtcp2_settings settings;
+ ngtcp2_transport_params params;
+
+ server_default_settings(&settings);
+ server_default_transport_params(&params);
+
+ setup_default_server_settings(pconn, &null_path.path, &settings, &params);
+}
+
+static void setup_default_client(ngtcp2_conn **pconn) {
+ ngtcp2_callbacks cb;
+ ngtcp2_settings settings;
+ ngtcp2_transport_params params;
+ ngtcp2_cid dcid, scid;
+ ngtcp2_transport_params remote_params;
+ ngtcp2_crypto_aead_ctx aead_ctx = {0};
+ ngtcp2_crypto_cipher_ctx hp_ctx = {0};
+ ngtcp2_crypto_ctx crypto_ctx;
+
+ dcid_init(&dcid);
+ scid_init(&scid);
+
+ init_crypto_ctx(&crypto_ctx);
+
+ client_default_callbacks(&cb);
+ client_default_settings(&settings);
+ client_default_transport_params(&params);
+
+ ngtcp2_conn_client_new(pconn, &dcid, &scid, &null_path.path,
+ NGTCP2_PROTO_VER_V1, &cb, &settings, &params,
+ /* mem = */ NULL, NULL);
+ ngtcp2_conn_set_crypto_ctx(*pconn, &crypto_ctx);
+ ngtcp2_conn_install_rx_handshake_key(*pconn, &aead_ctx, null_iv,
+ sizeof(null_iv), &hp_ctx);
+ ngtcp2_conn_install_tx_handshake_key(*pconn, &aead_ctx, null_iv,
+ sizeof(null_iv), &hp_ctx);
+ ngtcp2_conn_install_rx_key(*pconn, null_secret, sizeof(null_secret),
+ &aead_ctx, null_iv, sizeof(null_iv), &hp_ctx);
+ ngtcp2_conn_install_tx_key(*pconn, null_secret, sizeof(null_secret),
+ &aead_ctx, null_iv, sizeof(null_iv), &hp_ctx);
+ (*pconn)->state = NGTCP2_CS_POST_HANDSHAKE;
+ (*pconn)->flags |= NGTCP2_CONN_FLAG_CONN_ID_NEGOTIATED |
+ NGTCP2_CONN_FLAG_HANDSHAKE_COMPLETED |
+ NGTCP2_CONN_FLAG_HANDSHAKE_COMPLETED_HANDLED |
+ NGTCP2_CONN_FLAG_HANDSHAKE_CONFIRMED;
+ (*pconn)->dcid.current.flags |= NGTCP2_DCID_FLAG_PATH_VALIDATED;
+ conn_set_scid_used(*pconn);
+ memset(&remote_params, 0, sizeof(remote_params));
+ remote_params.initial_max_stream_data_bidi_local = 64 * 1024;
+ remote_params.initial_max_stream_data_bidi_remote = 64 * 1024;
+ remote_params.initial_max_stream_data_uni = 64 * 1024;
+ remote_params.initial_max_streams_bidi = 1;
+ remote_params.initial_max_streams_uni = 1;
+ remote_params.initial_max_data = 64 * 1024;
+ remote_params.active_connection_id_limit = 8;
+ remote_params.max_udp_payload_size = NGTCP2_DEFAULT_MAX_RECV_UDP_PAYLOAD_SIZE;
+ ngtcp2_transport_params_copy_new(&(*pconn)->remote.transport_params,
+ &remote_params, (*pconn)->mem);
+ (*pconn)->local.bidi.max_streams = remote_params.initial_max_streams_bidi;
+ (*pconn)->local.uni.max_streams = remote_params.initial_max_streams_uni;
+ (*pconn)->tx.max_offset = remote_params.initial_max_data;
+ (*pconn)->negotiated_version = (*pconn)->client_chosen_version;
+
+ (*pconn)->dcid.current.flags |= NGTCP2_DCID_FLAG_TOKEN_PRESENT;
+ memset((*pconn)->dcid.current.token, 0xf1, NGTCP2_STATELESS_RESET_TOKENLEN);
+}
+
+static void setup_handshake_server(ngtcp2_conn **pconn) {
+ ngtcp2_callbacks cb;
+ ngtcp2_settings settings;
+ ngtcp2_transport_params params;
+ ngtcp2_cid dcid, scid;
+ uint32_t preferred_versions[] = {
+ NGTCP2_PROTO_VER_V2_DRAFT,
+ NGTCP2_PROTO_VER_V1,
+ };
+
+ dcid_init(&dcid);
+ scid_init(&scid);
+
+ server_default_callbacks(&cb);
+ server_default_settings(&settings);
+ server_default_transport_params(&params);
+
+ settings.preferred_versions = preferred_versions;
+ settings.preferred_versionslen = ngtcp2_arraylen(preferred_versions);
+
+ ngtcp2_conn_server_new(pconn, &dcid, &scid, &null_path.path,
+ NGTCP2_PROTO_VER_V1, &cb, &settings, &params,
+ /* mem = */ NULL, NULL);
+}
+
+static void setup_handshake_client_version(ngtcp2_conn **pconn,
+ uint32_t client_chosen_version) {
+ ngtcp2_callbacks cb;
+ ngtcp2_settings settings;
+ ngtcp2_transport_params params;
+ ngtcp2_cid rcid, scid;
+ ngtcp2_crypto_aead retry_aead = {0, NGTCP2_FAKE_AEAD_OVERHEAD};
+ ngtcp2_crypto_aead_ctx aead_ctx = {0};
+ ngtcp2_crypto_cipher_ctx hp_ctx = {0};
+ ngtcp2_crypto_ctx crypto_ctx;
+ uint32_t preferred_versions[] = {
+ NGTCP2_PROTO_VER_V2_DRAFT,
+ NGTCP2_PROTO_VER_V1,
+ };
+ uint32_t other_versions[] = {
+ NGTCP2_PROTO_VER_V1,
+ NGTCP2_PROTO_VER_V2_DRAFT,
+ };
+
+ rcid_init(&rcid);
+ scid_init(&scid);
+
+ init_initial_crypto_ctx(&crypto_ctx);
+
+ client_default_callbacks(&cb);
+ client_default_settings(&settings);
+ client_default_transport_params(&params);
+
+ settings.preferred_versions = preferred_versions;
+ settings.preferred_versionslen = ngtcp2_arraylen(preferred_versions);
+
+ settings.other_versions = other_versions;
+ settings.other_versionslen = ngtcp2_arraylen(other_versions);
+
+ ngtcp2_conn_client_new(pconn, &rcid, &scid, &null_path.path,
+ client_chosen_version, &cb, &settings, &params,
+ /* mem = */ NULL, NULL);
+ ngtcp2_conn_set_initial_crypto_ctx(*pconn, &crypto_ctx);
+ ngtcp2_conn_install_initial_key(*pconn, &aead_ctx, null_iv, &hp_ctx,
+ &aead_ctx, null_iv, &hp_ctx, sizeof(null_iv));
+ ngtcp2_conn_set_retry_aead(*pconn, &retry_aead, &aead_ctx);
+}
+
+static void setup_handshake_client(ngtcp2_conn **pconn) {
+ setup_handshake_client_version(pconn, NGTCP2_PROTO_VER_V1);
+}
+
+static void setup_early_server(ngtcp2_conn **pconn) {
+ ngtcp2_callbacks cb;
+ ngtcp2_settings settings;
+ ngtcp2_transport_params params;
+ ngtcp2_cid dcid, scid;
+
+ dcid_init(&dcid);
+ scid_init(&scid);
+
+ server_early_callbacks(&cb);
+ server_default_settings(&settings);
+ server_default_transport_params(&params);
+
+ ngtcp2_conn_server_new(pconn, &dcid, &scid, &null_path.path,
+ NGTCP2_PROTO_VER_V1, &cb, &settings, &params,
+ /* mem = */ NULL, NULL);
+}
+
+static void setup_early_client(ngtcp2_conn **pconn) {
+ ngtcp2_callbacks cb;
+ ngtcp2_settings settings;
+ ngtcp2_transport_params params;
+ ngtcp2_cid rcid, scid;
+ ngtcp2_crypto_aead_ctx aead_ctx = {0};
+ ngtcp2_crypto_cipher_ctx hp_ctx = {0};
+ ngtcp2_crypto_ctx crypto_ctx;
+
+ rcid_init(&rcid);
+ scid_init(&scid);
+
+ init_initial_crypto_ctx(&crypto_ctx);
+
+ client_early_callbacks(&cb);
+ client_default_settings(&settings);
+ client_default_transport_params(&params);
+
+ ngtcp2_conn_client_new(pconn, &rcid, &scid, &null_path.path,
+ NGTCP2_PROTO_VER_V1, &cb, &settings, &params,
+ /* mem = */ NULL, NULL);
+ ngtcp2_conn_set_initial_crypto_ctx(*pconn, &crypto_ctx);
+ ngtcp2_conn_install_initial_key(*pconn, &aead_ctx, null_iv, &hp_ctx,
+ &aead_ctx, null_iv, &hp_ctx, sizeof(null_iv));
+
+ memset(&params, 0, sizeof(params));
+ params.initial_max_stream_data_bidi_local = 64 * 1024;
+ params.initial_max_stream_data_bidi_remote = 64 * 1024;
+ params.initial_max_stream_data_uni = 64 * 1024;
+ params.initial_max_streams_bidi = 1;
+ params.initial_max_streams_uni = 1;
+ params.initial_max_data = 64 * 1024;
+ params.active_connection_id_limit = 8;
+ params.max_udp_payload_size = NGTCP2_DEFAULT_MAX_RECV_UDP_PAYLOAD_SIZE;
+
+ ngtcp2_conn_set_early_remote_transport_params(*pconn, &params);
+}
+
+void test_ngtcp2_conn_stream_open_close(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[2048];
+ size_t pktlen;
+ ngtcp2_ssize spktlen;
+ int rv;
+ ngtcp2_frame fr;
+ ngtcp2_strm *strm;
+ int64_t stream_id;
+
+ setup_default_server(&conn);
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.flags = 0;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 0;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = 17;
+ fr.stream.data[0].base = null_data;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 1, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, NULL, buf, pktlen, 1);
+
+ CU_ASSERT(0 == rv);
+
+ strm = ngtcp2_conn_find_stream(conn, 4);
+
+ CU_ASSERT(NGTCP2_STRM_FLAG_NONE == strm->flags);
+
+ fr.stream.fin = 1;
+ fr.stream.offset = 17;
+ fr.stream.datacnt = 0;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 2, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, NULL, buf, pktlen, 2);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NGTCP2_STRM_FLAG_SHUT_RD == strm->flags);
+ CU_ASSERT(fr.stream.offset == strm->rx.last_offset);
+ CU_ASSERT(fr.stream.offset == ngtcp2_strm_rx_offset(strm));
+
+ spktlen =
+ ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf), NULL,
+ NGTCP2_WRITE_STREAM_FLAG_FIN, 4, NULL, 0, 3);
+
+ CU_ASSERT(spktlen > 0);
+
+ strm = ngtcp2_conn_find_stream(conn, 4);
+
+ CU_ASSERT(NULL != strm);
+
+ /* Open a remote unidirectional stream */
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.flags = 0;
+ fr.stream.stream_id = 2;
+ fr.stream.fin = 0;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = 19;
+ fr.stream.data[0].base = null_data;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 3, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 3);
+
+ CU_ASSERT(0 == rv);
+
+ strm = ngtcp2_conn_find_stream(conn, 2);
+
+ CU_ASSERT(NGTCP2_STRM_FLAG_SHUT_WR == strm->flags);
+ CU_ASSERT(fr.stream.data[0].len == strm->rx.last_offset);
+ CU_ASSERT(fr.stream.data[0].len == ngtcp2_strm_rx_offset(strm));
+
+ /* Open a local unidirectional stream */
+ rv = ngtcp2_conn_open_uni_stream(conn, &stream_id, NULL);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(3 == stream_id);
+
+ rv = ngtcp2_conn_open_uni_stream(conn, &stream_id, NULL);
+
+ CU_ASSERT(NGTCP2_ERR_STREAM_ID_BLOCKED == rv);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_stream_rx_flow_control(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[2048];
+ size_t pktlen;
+ ngtcp2_ssize spktlen;
+ int rv;
+ ngtcp2_frame fr;
+ ngtcp2_strm *strm;
+ size_t i;
+ int64_t stream_id;
+
+ setup_default_server(&conn);
+
+ conn->local.transport_params.initial_max_stream_data_bidi_remote = 2047;
+
+ for (i = 0; i < 3; ++i) {
+ stream_id = (int64_t)(i * 4);
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.flags = 0;
+ fr.stream.stream_id = stream_id;
+ fr.stream.fin = 0;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = 1024;
+ fr.stream.data[0].base = null_data;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, (int64_t)i, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 1);
+
+ CU_ASSERT(0 == rv);
+
+ strm = ngtcp2_conn_find_stream(conn, stream_id);
+
+ CU_ASSERT(NULL != strm);
+
+ rv = ngtcp2_conn_extend_max_stream_offset(conn, stream_id,
+ fr.stream.data[0].len);
+
+ CU_ASSERT(0 == rv);
+ }
+
+ CU_ASSERT(3 == ngtcp2_pq_size(&conn->tx.strmq));
+
+ strm = ngtcp2_conn_find_stream(conn, 0);
+
+ CU_ASSERT(ngtcp2_strm_is_tx_queued(strm));
+
+ strm = ngtcp2_conn_find_stream(conn, 4);
+
+ CU_ASSERT(ngtcp2_strm_is_tx_queued(strm));
+
+ strm = ngtcp2_conn_find_stream(conn, 8);
+
+ CU_ASSERT(ngtcp2_strm_is_tx_queued(strm));
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), 2);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(ngtcp2_pq_empty(&conn->tx.strmq));
+
+ for (i = 0; i < 3; ++i) {
+ stream_id = (int64_t)(i * 4);
+ strm = ngtcp2_conn_find_stream(conn, stream_id);
+
+ CU_ASSERT(2047 + 1024 == strm->rx.max_offset);
+ }
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_stream_rx_flow_control_error(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[2048];
+ size_t pktlen;
+ int rv;
+ ngtcp2_frame fr;
+
+ setup_default_server(&conn);
+
+ conn->local.transport_params.initial_max_stream_data_bidi_remote = 1023;
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.flags = 0;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 0;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = 1024;
+ fr.stream.data[0].base = null_data;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 1, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 1);
+
+ CU_ASSERT(NGTCP2_ERR_FLOW_CONTROL == rv);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_stream_tx_flow_control(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[2048];
+ size_t pktlen;
+ ngtcp2_ssize spktlen;
+ int rv;
+ ngtcp2_frame fr;
+ ngtcp2_strm *strm;
+ ngtcp2_ssize nwrite;
+ int64_t stream_id;
+
+ setup_default_client(&conn);
+
+ conn->remote.transport_params->initial_max_stream_data_bidi_remote = 2047;
+
+ rv = ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+
+ CU_ASSERT(0 == rv);
+
+ strm = ngtcp2_conn_find_stream(conn, stream_id);
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf),
+ &nwrite, NGTCP2_WRITE_STREAM_FLAG_NONE,
+ stream_id, null_data, 1024, 1);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(1024 == nwrite);
+ CU_ASSERT(1024 == strm->tx.offset);
+
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf),
+ &nwrite, NGTCP2_WRITE_STREAM_FLAG_NONE,
+ stream_id, null_data, 1024, 2);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(1023 == nwrite);
+ CU_ASSERT(2047 == strm->tx.offset);
+
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf),
+ &nwrite, NGTCP2_WRITE_STREAM_FLAG_NONE,
+ stream_id, null_data, 1024, 3);
+
+ CU_ASSERT(NGTCP2_ERR_STREAM_DATA_BLOCKED == spktlen);
+
+ /* We can write 0 length STREAM frame */
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf),
+ &nwrite, NGTCP2_WRITE_STREAM_FLAG_NONE,
+ stream_id, null_data, 0, 3);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(0 == nwrite);
+ CU_ASSERT(2047 == strm->tx.offset);
+
+ fr.type = NGTCP2_FRAME_MAX_STREAM_DATA;
+ fr.max_stream_data.stream_id = stream_id;
+ fr.max_stream_data.max_stream_data = 2048;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 1, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 4);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(2048 == strm->tx.max_offset);
+
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf),
+ &nwrite, NGTCP2_WRITE_STREAM_FLAG_NONE,
+ stream_id, null_data, 1024, 5);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(1 == nwrite);
+ CU_ASSERT(2048 == strm->tx.offset);
+
+ ngtcp2_conn_del(conn);
+
+ /* CWND left is round up to the maximum UDP packet size */
+ setup_default_client(&conn);
+
+ conn->cstat.cwnd = 1;
+
+ rv = ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+
+ CU_ASSERT(0 == rv);
+
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf),
+ &nwrite, NGTCP2_WRITE_STREAM_FLAG_FIN,
+ stream_id, null_data, 1024, 1);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(1024 == nwrite);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_rx_flow_control(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[2048];
+ size_t pktlen;
+ ngtcp2_ssize spktlen;
+ int rv;
+ ngtcp2_frame fr;
+
+ setup_default_server(&conn);
+
+ conn->local.transport_params.initial_max_data = 1024;
+ conn->rx.window = 1024;
+ conn->rx.max_offset = 1024;
+ conn->rx.unsent_max_offset = 1024;
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.flags = 0;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 0;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = 1023;
+ fr.stream.data[0].base = null_data;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 1, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 1);
+
+ CU_ASSERT(0 == rv);
+
+ ngtcp2_conn_extend_max_offset(conn, 1023);
+
+ CU_ASSERT(1024 + 1023 == conn->rx.unsent_max_offset);
+ CU_ASSERT(1024 == conn->rx.max_offset);
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.flags = 0;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 0;
+ fr.stream.offset = 1023;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = 1;
+ fr.stream.data[0].base = null_data;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 2, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 2);
+
+ CU_ASSERT(0 == rv);
+
+ ngtcp2_conn_extend_max_offset(conn, 1);
+
+ CU_ASSERT(2048 == conn->rx.unsent_max_offset);
+ CU_ASSERT(1024 == conn->rx.max_offset);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), 3);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(2048 == conn->rx.max_offset);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_rx_flow_control_error(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[2048];
+ size_t pktlen;
+ int rv;
+ ngtcp2_frame fr;
+
+ setup_default_server(&conn);
+
+ conn->local.transport_params.initial_max_data = 1024;
+ conn->rx.window = 1024;
+ conn->rx.max_offset = 1024;
+ conn->rx.unsent_max_offset = 1024;
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.flags = 0;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 0;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = 1025;
+ fr.stream.data[0].base = null_data;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 1, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 1);
+
+ CU_ASSERT(NGTCP2_ERR_FLOW_CONTROL == rv);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_tx_flow_control(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[2048];
+ size_t pktlen;
+ ngtcp2_ssize spktlen;
+ int rv;
+ ngtcp2_frame fr;
+ ngtcp2_ssize nwrite;
+ int64_t stream_id;
+
+ setup_default_client(&conn);
+
+ conn->remote.transport_params->initial_max_data = 2048;
+ conn->tx.max_offset = 2048;
+
+ rv = ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+
+ CU_ASSERT(0 == rv);
+
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf),
+ &nwrite, NGTCP2_WRITE_STREAM_FLAG_NONE,
+ stream_id, null_data, 1024, 1);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(1024 == nwrite);
+ CU_ASSERT(1024 == conn->tx.offset);
+
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf),
+ &nwrite, NGTCP2_WRITE_STREAM_FLAG_NONE,
+ stream_id, null_data, 1023, 2);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(1023 == nwrite);
+ CU_ASSERT(1024 + 1023 == conn->tx.offset);
+
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf),
+ &nwrite, NGTCP2_WRITE_STREAM_FLAG_NONE,
+ stream_id, null_data, 1024, 3);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(1 == nwrite);
+ CU_ASSERT(2048 == conn->tx.offset);
+
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf),
+ &nwrite, NGTCP2_WRITE_STREAM_FLAG_NONE,
+ stream_id, null_data, 1024, 4);
+
+ CU_ASSERT(spktlen == 0);
+ CU_ASSERT(-1 == nwrite);
+
+ fr.type = NGTCP2_FRAME_MAX_DATA;
+ fr.max_data.max_data = 3072;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 1, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 5);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(3072 == conn->tx.max_offset);
+
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf),
+ &nwrite, NGTCP2_WRITE_STREAM_FLAG_NONE,
+ stream_id, null_data, 1024, 4);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(1024 == nwrite);
+ CU_ASSERT(3072 == conn->tx.offset);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_shutdown_stream_write(void) {
+ ngtcp2_conn *conn;
+ int rv;
+ ngtcp2_frame_chain *frc;
+ uint8_t buf[2048];
+ ngtcp2_frame fr;
+ size_t pktlen;
+ ngtcp2_ssize spktlen;
+ ngtcp2_strm *strm;
+ int64_t stream_id;
+
+ /* Stream not found */
+ setup_default_server(&conn);
+
+ rv = ngtcp2_conn_shutdown_stream_write(conn, 4, NGTCP2_APP_ERR01);
+
+ CU_ASSERT(0 == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* Check final_size */
+ setup_default_client(&conn);
+
+ ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+ ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf), NULL,
+ NGTCP2_WRITE_STREAM_FLAG_NONE, stream_id, null_data,
+ 1239, 1);
+ rv = ngtcp2_conn_shutdown_stream_write(conn, stream_id, NGTCP2_APP_ERR01);
+
+ CU_ASSERT(0 == rv);
+
+ for (frc = conn->pktns.tx.frq; frc; frc = frc->next) {
+ if (frc->fr.type == NGTCP2_FRAME_RESET_STREAM) {
+ break;
+ }
+ }
+
+ CU_ASSERT(NULL != frc);
+ CU_ASSERT(stream_id == frc->fr.reset_stream.stream_id);
+ CU_ASSERT(NGTCP2_APP_ERR01 == frc->fr.reset_stream.app_error_code);
+ CU_ASSERT(1239 == frc->fr.reset_stream.final_size);
+
+ strm = ngtcp2_conn_find_stream(conn, stream_id);
+
+ CU_ASSERT(NULL != strm);
+ CU_ASSERT(NGTCP2_APP_ERR01 == strm->app_error_code);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), 2);
+
+ CU_ASSERT(spktlen > 0);
+
+ fr.type = NGTCP2_FRAME_RESET_STREAM;
+ fr.reset_stream.stream_id = stream_id;
+ fr.reset_stream.app_error_code = NGTCP2_APP_ERR02;
+ fr.reset_stream.final_size = 100;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 890, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 2);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NULL != ngtcp2_conn_find_stream(conn, stream_id));
+
+ fr.type = NGTCP2_FRAME_ACK;
+ fr.ack.largest_ack = conn->pktns.tx.last_pkt_num;
+ fr.ack.ack_delay = 0;
+ fr.ack.first_ack_range = 0;
+ fr.ack.rangecnt = 0;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 899, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 2);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NULL == ngtcp2_conn_find_stream(conn, stream_id));
+
+ ngtcp2_conn_del(conn);
+
+ /* Check that stream is closed when RESET_STREAM is acknowledged */
+ setup_default_client(&conn);
+
+ ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.stream_id = stream_id;
+ fr.stream.fin = 0;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 0;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 119, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 1);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NULL != ngtcp2_conn_find_stream(conn, stream_id));
+
+ rv = ngtcp2_conn_shutdown_stream_write(conn, stream_id, NGTCP2_APP_ERR01);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NULL != ngtcp2_conn_find_stream(conn, stream_id));
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), 2);
+
+ CU_ASSERT(spktlen > 0);
+
+ /* Incoming FIN does not close stream */
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.fin = 1;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 0;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 121, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 2);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NULL != ngtcp2_conn_find_stream(conn, stream_id));
+
+ fr.type = NGTCP2_FRAME_ACK;
+ fr.ack.largest_ack = conn->pktns.tx.last_pkt_num;
+ fr.ack.ack_delay = 0;
+ fr.ack.first_ack_range = 0;
+ fr.ack.rangecnt = 0;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 332, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 3);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NULL == ngtcp2_conn_find_stream(conn, stream_id));
+
+ ngtcp2_conn_del(conn);
+
+ /* RESET_STREAM is not sent if all tx data are acknowledged */
+ setup_default_client(&conn);
+
+ ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf), NULL,
+ NGTCP2_WRITE_STREAM_FLAG_FIN, stream_id,
+ null_data, 0, 3);
+
+ CU_ASSERT(spktlen > 0);
+
+ fr.type = NGTCP2_FRAME_ACK;
+ fr.ack.largest_ack = conn->pktns.tx.last_pkt_num;
+ fr.ack.ack_delay = 0;
+ fr.ack.first_ack_range = 0;
+ fr.ack.rangecnt = 0;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 999, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 7);
+
+ CU_ASSERT(0 == rv);
+
+ rv = ngtcp2_conn_shutdown_stream_write(conn, stream_id, NGTCP2_APP_ERR01);
+
+ CU_ASSERT(0 == rv);
+
+ strm = ngtcp2_conn_find_stream(conn, stream_id);
+
+ CU_ASSERT(!(strm->flags & NGTCP2_STRM_FLAG_SENT_RST));
+
+ spktlen =
+ ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf), NULL,
+ NGTCP2_WRITE_STREAM_FLAG_FIN, -1, NULL, 0, 11);
+
+ CU_ASSERT(0 == spktlen);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_recv_reset_stream(void) {
+ ngtcp2_conn *conn;
+ int rv;
+ uint8_t buf[2048];
+ ngtcp2_frame fr;
+ size_t pktlen;
+ ngtcp2_ssize spktlen;
+ ngtcp2_strm *strm;
+ int64_t stream_id;
+
+ /* Receive RESET_STREAM */
+ setup_default_server(&conn);
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.flags = 0;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 0;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = 955;
+ fr.stream.data[0].base = null_data;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 1, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 1);
+
+ CU_ASSERT(0 == rv);
+
+ ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf), NULL,
+ NGTCP2_WRITE_STREAM_FLAG_NONE, 4, null_data, 354, 2);
+
+ fr.type = NGTCP2_FRAME_RESET_STREAM;
+ fr.reset_stream.stream_id = 4;
+ fr.reset_stream.app_error_code = NGTCP2_APP_ERR02;
+ fr.reset_stream.final_size = 955;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 2, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 3);
+
+ CU_ASSERT(0 == rv);
+
+ strm = ngtcp2_conn_find_stream(conn, 4);
+
+ CU_ASSERT(strm->flags & NGTCP2_STRM_FLAG_SHUT_RD);
+ CU_ASSERT(strm->flags & NGTCP2_STRM_FLAG_RECV_RST);
+
+ ngtcp2_conn_del(conn);
+
+ /* Receive RESET_STREAM after sending STOP_SENDING */
+ setup_default_server(&conn);
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.flags = 0;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 0;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = 955;
+ fr.stream.data[0].base = null_data;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 1, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 1);
+
+ CU_ASSERT(0 == rv);
+
+ ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf), NULL,
+ NGTCP2_WRITE_STREAM_FLAG_NONE, 4, null_data, 354, 2);
+ ngtcp2_conn_shutdown_stream_read(conn, 4, NGTCP2_APP_ERR01);
+ ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), 3);
+
+ fr.type = NGTCP2_FRAME_RESET_STREAM;
+ fr.reset_stream.stream_id = 4;
+ fr.reset_stream.app_error_code = NGTCP2_APP_ERR02;
+ fr.reset_stream.final_size = 955;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 2, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 4);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NULL != ngtcp2_conn_find_stream(conn, 4));
+
+ ngtcp2_conn_del(conn);
+
+ /* Receive RESET_STREAM after sending RESET_STREAM */
+ setup_default_server(&conn);
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.flags = 0;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 0;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = 955;
+ fr.stream.data[0].base = null_data;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 1, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 1);
+
+ CU_ASSERT(0 == rv);
+
+ ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf), NULL,
+ NGTCP2_WRITE_STREAM_FLAG_NONE, 4, null_data, 354, 2);
+ ngtcp2_conn_shutdown_stream_write(conn, 4, NGTCP2_APP_ERR01);
+ ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), 3);
+
+ fr.type = NGTCP2_FRAME_RESET_STREAM;
+ fr.reset_stream.stream_id = 4;
+ fr.reset_stream.app_error_code = NGTCP2_APP_ERR02;
+ fr.reset_stream.final_size = 955;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 2, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 4);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NULL != ngtcp2_conn_find_stream(conn, 4));
+
+ fr.type = NGTCP2_FRAME_ACK;
+ fr.ack.largest_ack = conn->pktns.tx.last_pkt_num;
+ fr.ack.ack_delay = 0;
+ fr.ack.first_ack_range = 0;
+ fr.ack.rangecnt = 0;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 3, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 5);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NULL == ngtcp2_conn_find_stream(conn, 4));
+
+ ngtcp2_conn_del(conn);
+
+ /* Receive RESET_STREAM after receiving STOP_SENDING */
+ setup_default_server(&conn);
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.flags = 0;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 0;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = 955;
+ fr.stream.data[0].base = null_data;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 1, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 1);
+
+ CU_ASSERT(0 == rv);
+
+ ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf), NULL,
+ NGTCP2_WRITE_STREAM_FLAG_NONE, 4, null_data, 354, 2);
+
+ fr.type = NGTCP2_FRAME_STOP_SENDING;
+ fr.stop_sending.stream_id = 4;
+ fr.stop_sending.app_error_code = NGTCP2_APP_ERR01;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 2, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 3);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NULL != ngtcp2_conn_find_stream(conn, 4));
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), 4);
+
+ CU_ASSERT(spktlen > 0);
+
+ fr.type = NGTCP2_FRAME_RESET_STREAM;
+ fr.reset_stream.stream_id = 4;
+ fr.reset_stream.app_error_code = NGTCP2_APP_ERR02;
+ fr.reset_stream.final_size = 955;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 3, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 4);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NULL != ngtcp2_conn_find_stream(conn, 4));
+
+ fr.type = NGTCP2_FRAME_ACK;
+ fr.ack.largest_ack = conn->pktns.tx.last_pkt_num;
+ fr.ack.ack_delay = 0;
+ fr.ack.first_ack_range = 0;
+ fr.ack.rangecnt = 0;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 4, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 5);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NULL == ngtcp2_conn_find_stream(conn, 4));
+
+ ngtcp2_conn_del(conn);
+
+ /* final_size in RESET_STREAM exceeds the already received offset */
+ setup_default_server(&conn);
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.flags = 0;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 0;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = 955;
+ fr.stream.data[0].base = null_data;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 1, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 1);
+
+ CU_ASSERT(0 == rv);
+
+ fr.type = NGTCP2_FRAME_RESET_STREAM;
+ fr.reset_stream.stream_id = 4;
+ fr.reset_stream.app_error_code = NGTCP2_APP_ERR02;
+ fr.reset_stream.final_size = 954;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 2, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 2);
+
+ CU_ASSERT(NGTCP2_ERR_FINAL_SIZE == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* final_size in RESET_STREAM differs from the final offset which
+ STREAM frame with fin indicated. */
+ setup_default_server(&conn);
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.flags = 0;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 1;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = 955;
+ fr.stream.data[0].base = null_data;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 1, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 1);
+
+ CU_ASSERT(0 == rv);
+
+ fr.type = NGTCP2_FRAME_RESET_STREAM;
+ fr.reset_stream.stream_id = 4;
+ fr.reset_stream.app_error_code = NGTCP2_APP_ERR02;
+ fr.reset_stream.final_size = 956;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 2, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 2);
+
+ CU_ASSERT(NGTCP2_ERR_FINAL_SIZE == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* RESET_STREAM against local stream which has not been initiated. */
+ setup_default_server(&conn);
+
+ fr.type = NGTCP2_FRAME_RESET_STREAM;
+ fr.reset_stream.stream_id = 1;
+ fr.reset_stream.app_error_code = NGTCP2_APP_ERR01;
+ fr.reset_stream.final_size = 0;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 1, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 1);
+
+ CU_ASSERT(NGTCP2_ERR_STREAM_STATE == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* RESET_STREAM against remote stream which has not been initiated */
+ setup_default_server(&conn);
+
+ fr.type = NGTCP2_FRAME_RESET_STREAM;
+ fr.reset_stream.stream_id = 0;
+ fr.reset_stream.app_error_code = NGTCP2_APP_ERR01;
+ fr.reset_stream.final_size = 1999;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 1, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 1);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NULL == ngtcp2_conn_find_stream(conn, 0));
+ CU_ASSERT(4 == conn->remote.bidi.unsent_max_streams);
+
+ ngtcp2_conn_del(conn);
+
+ /* RESET_STREAM against remote stream which is larger than allowed
+ maximum */
+ setup_default_server(&conn);
+
+ fr.type = NGTCP2_FRAME_RESET_STREAM;
+ fr.reset_stream.stream_id = 16;
+ fr.reset_stream.app_error_code = NGTCP2_APP_ERR01;
+ fr.reset_stream.final_size = 0;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 1, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 1);
+
+ CU_ASSERT(NGTCP2_ERR_STREAM_LIMIT == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* RESET_STREAM against remote stream which is allowed, and no
+ ngtcp2_strm object has been created */
+ setup_default_server(&conn);
+
+ fr.type = NGTCP2_FRAME_RESET_STREAM;
+ fr.reset_stream.stream_id = 4;
+ fr.reset_stream.app_error_code = NGTCP2_APP_ERR01;
+ fr.reset_stream.final_size = 0;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 1, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 1);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(
+ ngtcp2_idtr_is_open(&conn->remote.bidi.idtr, fr.reset_stream.stream_id));
+
+ ngtcp2_conn_del(conn);
+
+ /* RESET_STREAM against remote stream which is allowed, and no
+ ngtcp2_strm object has been created, and final_size violates
+ connection-level flow control. */
+ setup_default_server(&conn);
+
+ conn->local.transport_params.initial_max_stream_data_bidi_remote = 1 << 21;
+
+ fr.type = NGTCP2_FRAME_RESET_STREAM;
+ fr.reset_stream.stream_id = 4;
+ fr.reset_stream.app_error_code = NGTCP2_APP_ERR01;
+ fr.reset_stream.final_size = 1 << 20;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 1, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 1);
+
+ CU_ASSERT(NGTCP2_ERR_FLOW_CONTROL == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* RESET_STREAM against remote stream which is allowed, and no
+ ngtcp2_strm object has been created, and final_size violates
+ stream-level flow control. */
+ setup_default_server(&conn);
+
+ conn->rx.max_offset = 1 << 21;
+
+ fr.type = NGTCP2_FRAME_RESET_STREAM;
+ fr.reset_stream.stream_id = 4;
+ fr.reset_stream.app_error_code = NGTCP2_APP_ERR01;
+ fr.reset_stream.final_size = 1 << 20;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 1, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 1);
+
+ CU_ASSERT(NGTCP2_ERR_FLOW_CONTROL == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* final_size in RESET_STREAM violates connection-level flow
+ control */
+ setup_default_server(&conn);
+
+ conn->local.transport_params.initial_max_stream_data_bidi_remote = 1 << 21;
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.flags = 0;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 0;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = 955;
+ fr.stream.data[0].base = null_data;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 1, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 1);
+
+ CU_ASSERT(0 == rv);
+
+ fr.type = NGTCP2_FRAME_RESET_STREAM;
+ fr.reset_stream.stream_id = 4;
+ fr.reset_stream.app_error_code = NGTCP2_APP_ERR02;
+ fr.reset_stream.final_size = 1024 * 1024;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 2, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 2);
+
+ CU_ASSERT(NGTCP2_ERR_FLOW_CONTROL == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* final_size in RESET_STREAM violates stream-level flow control */
+ setup_default_server(&conn);
+
+ conn->rx.max_offset = 1 << 21;
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.flags = 0;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 0;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = 955;
+ fr.stream.data[0].base = null_data;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 1, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 1);
+
+ CU_ASSERT(0 == rv);
+
+ fr.type = NGTCP2_FRAME_RESET_STREAM;
+ fr.reset_stream.stream_id = 4;
+ fr.reset_stream.app_error_code = NGTCP2_APP_ERR02;
+ fr.reset_stream.final_size = 1024 * 1024;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 2, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 2);
+
+ CU_ASSERT(NGTCP2_ERR_FLOW_CONTROL == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* Receiving RESET_STREAM for a local unidirectional stream is a
+ protocol violation. */
+ setup_default_server(&conn);
+
+ rv = ngtcp2_conn_open_uni_stream(conn, &stream_id, NULL);
+
+ CU_ASSERT(0 == rv);
+
+ fr.type = NGTCP2_FRAME_RESET_STREAM;
+ fr.reset_stream.stream_id = stream_id;
+ fr.reset_stream.app_error_code = NGTCP2_APP_ERR02;
+ fr.reset_stream.final_size = 0;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 1, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 1);
+
+ CU_ASSERT(NGTCP2_ERR_PROTO == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* RESET_STREAM extends connection window including buffered data */
+ setup_default_server(&conn);
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.flags = 0;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 0;
+ fr.stream.offset = 1;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = 955;
+ fr.stream.data[0].base = null_data;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 1, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 1);
+
+ CU_ASSERT(0 == rv);
+
+ fr.type = NGTCP2_FRAME_RESET_STREAM;
+ fr.reset_stream.stream_id = 4;
+ fr.reset_stream.app_error_code = NGTCP2_APP_ERR02;
+ fr.reset_stream.final_size = 1024;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 2, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 2);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(1024 == conn->rx.offset);
+ CU_ASSERT(128 * 1024 + 1024 == conn->rx.unsent_max_offset);
+
+ /* Receiving same RESET_STREAM does not increase rx offsets. */
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 3);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(1024 == conn->rx.offset);
+ CU_ASSERT(128 * 1024 + 1024 == conn->rx.unsent_max_offset);
+
+ ngtcp2_conn_del(conn);
+
+ /* Verify that connection window is properly updated when
+ RESET_STREAM is received after sending STOP_SENDING */
+ setup_default_server(&conn);
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.flags = 0;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 0;
+ fr.stream.offset = 1;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = 955;
+ fr.stream.data[0].base = null_data;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 1, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 1);
+
+ CU_ASSERT(0 == rv);
+
+ ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf), NULL,
+ NGTCP2_WRITE_STREAM_FLAG_NONE, 4, null_data, 354, 2);
+ ngtcp2_conn_shutdown_stream_read(conn, 4, NGTCP2_APP_ERR01);
+ ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), 3);
+
+ CU_ASSERT(128 * 1024 + 956 == conn->rx.unsent_max_offset);
+
+ fr.type = NGTCP2_FRAME_RESET_STREAM;
+ fr.reset_stream.stream_id = 4;
+ fr.reset_stream.app_error_code = NGTCP2_APP_ERR02;
+ fr.reset_stream.final_size = 957;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 2, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 4);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NULL != ngtcp2_conn_find_stream(conn, 4));
+ CU_ASSERT(128 * 1024 + 956 + 1 == conn->rx.unsent_max_offset);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_recv_stop_sending(void) {
+ ngtcp2_conn *conn;
+ int rv;
+ uint8_t buf[2048];
+ ngtcp2_frame fr;
+ size_t pktlen;
+ ngtcp2_ssize spktlen;
+ ngtcp2_strm *strm;
+ ngtcp2_tstamp t = 0;
+ int64_t pkt_num = 0;
+ ngtcp2_frame_chain *frc;
+ int64_t stream_id;
+
+ /* Receive STOP_SENDING */
+ setup_default_client(&conn);
+
+ ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+ ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf), NULL,
+ NGTCP2_WRITE_STREAM_FLAG_NONE, stream_id, null_data,
+ 333, ++t);
+
+ fr.type = NGTCP2_FRAME_STOP_SENDING;
+ fr.stop_sending.stream_id = stream_id;
+ fr.stop_sending.app_error_code = NGTCP2_APP_ERR01;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ strm = ngtcp2_conn_find_stream(conn, stream_id);
+
+ CU_ASSERT(strm->flags & NGTCP2_STRM_FLAG_SHUT_WR);
+ CU_ASSERT(strm->flags & NGTCP2_STRM_FLAG_SENT_RST);
+
+ for (frc = conn->pktns.tx.frq; frc; frc = frc->next) {
+ if (frc->fr.type == NGTCP2_FRAME_RESET_STREAM) {
+ break;
+ }
+ }
+
+ CU_ASSERT(NULL != frc);
+ CU_ASSERT(NGTCP2_APP_ERR01 == frc->fr.reset_stream.app_error_code);
+ CU_ASSERT(333 == frc->fr.reset_stream.final_size);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ for (frc = conn->pktns.tx.frq; frc; frc = frc->next) {
+ if (frc->fr.type == NGTCP2_FRAME_RESET_STREAM) {
+ break;
+ }
+ }
+
+ CU_ASSERT(NULL == frc);
+
+ /* Make sure that receiving duplicated STOP_SENDING does not trigger
+ another RESET_STREAM. */
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ strm = ngtcp2_conn_find_stream(conn, stream_id);
+
+ CU_ASSERT(strm->flags & NGTCP2_STRM_FLAG_SHUT_WR);
+ CU_ASSERT(strm->flags & NGTCP2_STRM_FLAG_SENT_RST);
+
+ for (frc = conn->pktns.tx.frq; frc; frc = frc->next) {
+ if (frc->fr.type == NGTCP2_FRAME_RESET_STREAM) {
+ break;
+ }
+ }
+
+ CU_ASSERT(NULL == frc);
+
+ ngtcp2_conn_del(conn);
+
+ /* Receive STOP_SENDING after receiving RESET_STREAM */
+ setup_default_client(&conn);
+
+ ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+ ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf), NULL,
+ NGTCP2_WRITE_STREAM_FLAG_NONE, stream_id, null_data,
+ 333, ++t);
+
+ fr.type = NGTCP2_FRAME_RESET_STREAM;
+ fr.reset_stream.stream_id = stream_id;
+ fr.reset_stream.app_error_code = NGTCP2_APP_ERR01;
+ fr.reset_stream.final_size = 0;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ fr.type = NGTCP2_FRAME_STOP_SENDING;
+ fr.stop_sending.stream_id = stream_id;
+ fr.stop_sending.app_error_code = NGTCP2_APP_ERR01;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NULL != ngtcp2_conn_find_stream(conn, stream_id));
+
+ for (frc = conn->pktns.tx.frq; frc; frc = frc->next) {
+ if (frc->fr.type == NGTCP2_FRAME_RESET_STREAM) {
+ break;
+ }
+ }
+
+ CU_ASSERT(NULL != frc);
+ CU_ASSERT(NGTCP2_APP_ERR01 == frc->fr.reset_stream.app_error_code);
+ CU_ASSERT(333 == frc->fr.reset_stream.final_size);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ fr.type = NGTCP2_FRAME_ACK;
+ fr.ack.largest_ack = conn->pktns.tx.last_pkt_num;
+ fr.ack.ack_delay = 0;
+ fr.ack.first_ack_range = 0;
+ fr.ack.rangecnt = 0;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NULL == ngtcp2_conn_find_stream(conn, stream_id));
+
+ ngtcp2_conn_del(conn);
+
+ /* STOP_SENDING against remote bidirectional stream which has not
+ been initiated. */
+ setup_default_server(&conn);
+
+ fr.type = NGTCP2_FRAME_STOP_SENDING;
+ fr.stop_sending.stream_id = 0;
+ fr.stop_sending.app_error_code = NGTCP2_APP_ERR01;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 1, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 1);
+
+ CU_ASSERT(0 == rv);
+
+ strm = ngtcp2_conn_find_stream(conn, 0);
+
+ CU_ASSERT(NULL != strm);
+ CU_ASSERT(strm->flags & NGTCP2_STRM_FLAG_SHUT_WR);
+
+ ngtcp2_conn_del(conn);
+
+ /* STOP_SENDING against local bidirectional stream which has not
+ been initiated. */
+ setup_default_server(&conn);
+
+ fr.type = NGTCP2_FRAME_STOP_SENDING;
+ fr.stop_sending.stream_id = 1;
+ fr.stop_sending.app_error_code = NGTCP2_APP_ERR01;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 1, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 1);
+
+ CU_ASSERT(NGTCP2_ERR_STREAM_STATE == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* Receiving STOP_SENDING for a local unidirectional stream */
+ setup_default_server(&conn);
+
+ rv = ngtcp2_conn_open_uni_stream(conn, &stream_id, NULL);
+
+ CU_ASSERT(0 == rv);
+
+ fr.type = NGTCP2_FRAME_STOP_SENDING;
+ fr.stop_sending.stream_id = stream_id;
+ fr.stop_sending.app_error_code = NGTCP2_APP_ERR01;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 1, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 1);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NGTCP2_FRAME_RESET_STREAM == conn->pktns.tx.frq->fr.type);
+
+ ngtcp2_conn_del(conn);
+
+ /* STOP_SENDING against local unidirectional stream which has not
+ been initiated. */
+ setup_default_server(&conn);
+
+ fr.type = NGTCP2_FRAME_STOP_SENDING;
+ fr.stop_sending.stream_id = 3;
+ fr.stop_sending.app_error_code = NGTCP2_APP_ERR01;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 1, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 1);
+
+ CU_ASSERT(NGTCP2_ERR_STREAM_STATE == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* STOP_SENDING against local bidirectional stream in Data Sent
+ state. Because all data have been acknowledged, and FIN is sent,
+ RESET_STREAM is not necessary. */
+ setup_default_client(&conn);
+
+ rv = ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+
+ CU_ASSERT(0 == rv);
+
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf), NULL,
+ NGTCP2_WRITE_STREAM_FLAG_FIN, stream_id,
+ null_data, 1, ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ fr.type = NGTCP2_FRAME_ACK;
+ fr.ack.largest_ack = conn->pktns.tx.last_pkt_num;
+ fr.ack.ack_delay = 0;
+ fr.ack.first_ack_range = 0;
+ fr.ack.rangecnt = 0;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 0, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 1);
+
+ CU_ASSERT(0 == rv);
+
+ fr.type = NGTCP2_FRAME_STOP_SENDING;
+ fr.stop_sending.stream_id = stream_id;
+ fr.stop_sending.app_error_code = NGTCP2_APP_ERR01;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 1, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 1);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NULL == conn->pktns.tx.frq);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_recv_conn_id_omitted(void) {
+ ngtcp2_conn *conn;
+ int rv;
+ uint8_t buf[2048];
+ ngtcp2_frame fr;
+ size_t pktlen;
+ ngtcp2_ksl_it it;
+ ngtcp2_scid *scid;
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.flags = 0;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 0;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = 100;
+ fr.stream.data[0].base = null_data;
+
+ /* Receiving packet which has no connection ID while SCID of server
+ is not empty. */
+ setup_default_server(&conn);
+
+ pktlen = write_pkt(buf, sizeof(buf), /* dcid = */ NULL, 1, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 1);
+
+ /* packet is just ignored */
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NULL == ngtcp2_conn_find_stream(conn, 4));
+
+ ngtcp2_conn_del(conn);
+
+ /* Allow omission of connection ID */
+ setup_default_server(&conn);
+ ngtcp2_cid_zero(&conn->oscid);
+
+ it = ngtcp2_ksl_begin(&conn->scid.set);
+ scid = ngtcp2_ksl_it_get(&it);
+ ngtcp2_cid_zero(&scid->cid);
+
+ pktlen = write_pkt(buf, sizeof(buf), /* dcid = */ NULL, 1, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 1);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NULL != ngtcp2_conn_find_stream(conn, 4));
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_short_pkt_type(void) {
+ ngtcp2_conn *conn;
+ ngtcp2_pkt_hd hd;
+ uint8_t buf[2048];
+ ngtcp2_ssize spktlen;
+ int64_t stream_id;
+
+ /* 1 octet pkt num */
+ setup_default_client(&conn);
+
+ ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf), NULL,
+ NGTCP2_WRITE_STREAM_FLAG_NONE, stream_id,
+ null_data, 19, 1);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(pkt_decode_hd_short_mask(&hd, buf, (size_t)spktlen,
+ conn->oscid.datalen) > 0);
+ CU_ASSERT(1 == hd.pkt_numlen);
+
+ ngtcp2_conn_del(conn);
+
+ /* 2 octets pkt num */
+ setup_default_client(&conn);
+ conn->pktns.rtb.largest_acked_tx_pkt_num = 0x6afa2f;
+ conn->pktns.tx.last_pkt_num = 0x6afd78;
+
+ ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf), NULL,
+ NGTCP2_WRITE_STREAM_FLAG_NONE, stream_id,
+ null_data, 19, 1);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(pkt_decode_hd_short_mask(&hd, buf, (size_t)spktlen,
+ conn->oscid.datalen) > 0);
+ CU_ASSERT(2 == hd.pkt_numlen);
+
+ ngtcp2_conn_del(conn);
+
+ /* 4 octets pkt num */
+ setup_default_client(&conn);
+ conn->pktns.rtb.largest_acked_tx_pkt_num = 0x6afa2f;
+ conn->pktns.tx.last_pkt_num = 0x6bc106;
+
+ ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf), NULL,
+ NGTCP2_WRITE_STREAM_FLAG_NONE, stream_id,
+ null_data, 19, 1);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(pkt_decode_hd_short_mask(&hd, buf, (size_t)spktlen,
+ conn->oscid.datalen) > 0);
+ CU_ASSERT(3 == hd.pkt_numlen);
+
+ ngtcp2_conn_del(conn);
+
+ /* 1 octet pkt num (largest)*/
+ setup_default_client(&conn);
+ conn->pktns.rtb.largest_acked_tx_pkt_num = 1;
+ conn->pktns.tx.last_pkt_num = 128;
+
+ ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf), NULL,
+ NGTCP2_WRITE_STREAM_FLAG_NONE, stream_id,
+ null_data, 19, 1);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(pkt_decode_hd_short_mask(&hd, buf, (size_t)spktlen,
+ conn->oscid.datalen) > 0);
+ CU_ASSERT(1 == hd.pkt_numlen);
+
+ ngtcp2_conn_del(conn);
+
+ /* 2 octet pkt num (shortest)*/
+ setup_default_client(&conn);
+ conn->pktns.rtb.largest_acked_tx_pkt_num = 1;
+ conn->pktns.tx.last_pkt_num = 129;
+
+ ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf), NULL,
+ NGTCP2_WRITE_STREAM_FLAG_NONE, stream_id,
+ null_data, 19, 1);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(pkt_decode_hd_short_mask(&hd, buf, (size_t)spktlen,
+ conn->oscid.datalen) > 0);
+ CU_ASSERT(2 == hd.pkt_numlen);
+
+ ngtcp2_conn_del(conn);
+
+ /* 2 octet pkt num (largest)*/
+ setup_default_client(&conn);
+ conn->pktns.rtb.largest_acked_tx_pkt_num = 1;
+ conn->pktns.tx.last_pkt_num = 32768;
+
+ ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf), NULL,
+ NGTCP2_WRITE_STREAM_FLAG_NONE, stream_id,
+ null_data, 19, 1);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(
+ pkt_decode_hd_short(&hd, buf, (size_t)spktlen, conn->oscid.datalen) > 0);
+ CU_ASSERT(2 == hd.pkt_numlen);
+
+ ngtcp2_conn_del(conn);
+
+ /* 3 octet pkt num (shortest) */
+ setup_default_client(&conn);
+ conn->pktns.rtb.largest_acked_tx_pkt_num = 1;
+ conn->pktns.tx.last_pkt_num = 32769;
+
+ ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf), NULL,
+ NGTCP2_WRITE_STREAM_FLAG_NONE, stream_id,
+ null_data, 19, 1);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(
+ pkt_decode_hd_short(&hd, buf, (size_t)spktlen, conn->oscid.datalen) > 0);
+ CU_ASSERT(3 == hd.pkt_numlen);
+
+ ngtcp2_conn_del(conn);
+
+ /* 3 octet pkt num (largest) */
+ setup_default_client(&conn);
+ conn->pktns.rtb.largest_acked_tx_pkt_num = 1;
+ conn->pktns.tx.last_pkt_num = 8388608;
+
+ ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf), NULL,
+ NGTCP2_WRITE_STREAM_FLAG_NONE, stream_id,
+ null_data, 19, 1);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(
+ pkt_decode_hd_short(&hd, buf, (size_t)spktlen, conn->oscid.datalen) > 0);
+ CU_ASSERT(3 == hd.pkt_numlen);
+
+ ngtcp2_conn_del(conn);
+
+ /* 4 octet pkt num (shortest)*/
+ setup_default_client(&conn);
+ conn->pktns.rtb.largest_acked_tx_pkt_num = 1;
+ conn->pktns.tx.last_pkt_num = 8388609;
+
+ ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf), NULL,
+ NGTCP2_WRITE_STREAM_FLAG_NONE, stream_id,
+ null_data, 19, 1);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(
+ pkt_decode_hd_short(&hd, buf, (size_t)spktlen, conn->oscid.datalen) > 0);
+ CU_ASSERT(4 == hd.pkt_numlen);
+
+ ngtcp2_conn_del(conn);
+
+ /* Overflow */
+ setup_default_client(&conn);
+ conn->pktns.rtb.largest_acked_tx_pkt_num = 1;
+ conn->pktns.tx.last_pkt_num = NGTCP2_MAX_PKT_NUM - 1;
+
+ ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf), NULL,
+ NGTCP2_WRITE_STREAM_FLAG_NONE, stream_id,
+ null_data, 19, 1);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(
+ pkt_decode_hd_short(&hd, buf, (size_t)spktlen, conn->oscid.datalen) > 0);
+ CU_ASSERT(4 == hd.pkt_numlen);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_recv_stateless_reset(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[256];
+ ngtcp2_ssize spktlen;
+ int rv;
+ size_t i;
+ uint8_t token[NGTCP2_STATELESS_RESET_TOKENLEN];
+
+ for (i = 0; i < NGTCP2_STATELESS_RESET_TOKENLEN; ++i) {
+ token[i] = (uint8_t)~i;
+ }
+
+ /* server */
+ setup_default_server(&conn);
+ conn->callbacks.decrypt = fail_decrypt;
+ conn->pktns.rx.max_pkt_num = 24324325;
+
+ ngtcp2_dcid_set_token(&conn->dcid.current, token);
+
+ spktlen = ngtcp2_pkt_write_stateless_reset(
+ buf, sizeof(buf), token, null_data, NGTCP2_MIN_STATELESS_RESET_RANDLEN);
+
+ CU_ASSERT(spktlen > 0);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf,
+ (size_t)spktlen, 1);
+
+ CU_ASSERT(NGTCP2_ERR_DRAINING == rv);
+ CU_ASSERT(NGTCP2_CS_DRAINING == conn->state);
+
+ ngtcp2_conn_del(conn);
+
+ /* client */
+ setup_default_client(&conn);
+ conn->callbacks.decrypt = fail_decrypt;
+ conn->pktns.rx.max_pkt_num = 3255454;
+
+ ngtcp2_dcid_set_token(&conn->dcid.current, token);
+
+ spktlen =
+ ngtcp2_pkt_write_stateless_reset(buf, sizeof(buf), token, null_data, 29);
+
+ CU_ASSERT(spktlen > 0);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf,
+ (size_t)spktlen, 1);
+
+ CU_ASSERT(NGTCP2_ERR_DRAINING == rv);
+ CU_ASSERT(NGTCP2_CS_DRAINING == conn->state);
+
+ ngtcp2_conn_del(conn);
+
+ /* stateless reset in long packet */
+ setup_default_server(&conn);
+ conn->callbacks.decrypt = fail_decrypt;
+ conn->pktns.rx.max_pkt_num = 754233;
+
+ ngtcp2_dcid_set_token(&conn->dcid.current, token);
+
+ spktlen = ngtcp2_pkt_write_stateless_reset(
+ buf, sizeof(buf), token, null_data, NGTCP2_MIN_STATELESS_RESET_RANDLEN);
+
+ CU_ASSERT(spktlen > 0);
+
+ /* long packet */
+ buf[0] |= NGTCP2_HEADER_FORM_BIT;
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf,
+ (size_t)spktlen, 1);
+
+ CU_ASSERT(NGTCP2_ERR_DRAINING == rv);
+ CU_ASSERT(NGTCP2_CS_DRAINING == conn->state);
+
+ ngtcp2_conn_del(conn);
+
+ /* stateless reset in long packet; parsing long header fails */
+ setup_default_server(&conn);
+ conn->callbacks.decrypt = fail_decrypt;
+ conn->pktns.rx.max_pkt_num = 754233;
+
+ ngtcp2_dcid_set_token(&conn->dcid.current, token);
+
+ spktlen = ngtcp2_pkt_write_stateless_reset(
+ buf, 41, token, null_data, NGTCP2_MIN_STATELESS_RESET_RANDLEN);
+
+ CU_ASSERT(spktlen > 0);
+
+ /* long packet */
+ buf[0] |= NGTCP2_HEADER_FORM_BIT;
+ buf[0] |= 0x30;
+ /* Make version nonzero so that it does not look like Version
+ Negotiation packet */
+ buf[1] = 0xff;
+ /* Make largest CID so that ngtcp2_pkt_decode_hd_long fails */
+ buf[5] = 0xff;
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf,
+ (size_t)spktlen, 1);
+
+ CU_ASSERT(NGTCP2_ERR_DRAINING == rv);
+ CU_ASSERT(NGTCP2_CS_DRAINING == conn->state);
+
+ ngtcp2_conn_del(conn);
+
+ /* token does not match */
+ setup_default_client(&conn);
+ conn->callbacks.decrypt = fail_decrypt;
+ conn->pktns.rx.max_pkt_num = 24324325;
+
+ spktlen =
+ ngtcp2_pkt_write_stateless_reset(buf, sizeof(buf), token, null_data, 29);
+
+ CU_ASSERT(spktlen > 0);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf,
+ (size_t)spktlen, 1);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NGTCP2_CS_DRAINING != conn->state);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_recv_retry(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[2048];
+ ngtcp2_ssize spktlen;
+ uint64_t t = 0;
+ ngtcp2_cid dcid;
+ const uint8_t token[] = "address-validation-token";
+ size_t i;
+ int64_t stream_id;
+ ngtcp2_ssize datalen;
+ int rv;
+ ngtcp2_vec datav;
+ ngtcp2_strm *strm;
+ ngtcp2_crypto_aead aead = {0};
+ ngtcp2_crypto_aead_ctx aead_ctx = {0};
+
+ dcid_init(&dcid);
+ setup_handshake_client(&conn);
+ conn->callbacks.recv_retry = recv_retry;
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ spktlen = ngtcp2_pkt_write_retry(
+ buf, sizeof(buf), NGTCP2_PROTO_VER_V1, &conn->oscid, &dcid,
+ ngtcp2_conn_get_dcid(conn), token, strsize(token), null_encrypt, &aead,
+ &aead_ctx);
+
+ CU_ASSERT(spktlen > 0);
+
+ for (i = 0; i < 2; ++i) {
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf,
+ (size_t)spktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ if (i == 1) {
+ /* Retry packet was ignored */
+ CU_ASSERT(spktlen == 0);
+ } else {
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(1 == conn->in_pktns->tx.last_pkt_num);
+ CU_ASSERT(ngtcp2_cid_eq(&dcid, ngtcp2_conn_get_dcid(conn)));
+ CU_ASSERT(conn->flags & NGTCP2_CONN_FLAG_RECV_RETRY);
+ }
+ }
+
+ ngtcp2_conn_del(conn);
+
+ /* Retry packet with non-matching tag is rejected */
+ setup_handshake_client(&conn);
+ conn->callbacks.recv_retry = recv_retry;
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ spktlen = ngtcp2_pkt_write_retry(
+ buf, sizeof(buf), NGTCP2_PROTO_VER_V1, &conn->oscid, &dcid,
+ ngtcp2_conn_get_dcid(conn), token, strsize(token), null_encrypt, &aead,
+ &aead_ctx);
+
+ CU_ASSERT(spktlen > 0);
+
+ /* Change tag */
+ buf[spktlen - 1] = 1;
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf,
+ (size_t)spktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(0 == spktlen);
+
+ ngtcp2_conn_del(conn);
+
+ /* Make sure that 0RTT packets are retransmitted */
+ setup_early_client(&conn);
+ conn->callbacks.recv_retry = recv_retry;
+
+ rv = ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+
+ CU_ASSERT(0 == rv);
+
+ spktlen =
+ ngtcp2_conn_writev_stream(conn, NULL, NULL, buf, sizeof(buf), &datalen,
+ NGTCP2_WRITE_STREAM_FLAG_NONE, stream_id,
+ null_datav(&datav, 219), 1, ++t);
+
+ CU_ASSERT(sizeof(buf) == spktlen);
+ CU_ASSERT(219 == datalen);
+
+ spktlen =
+ ngtcp2_conn_writev_stream(conn, NULL, NULL, buf, sizeof(buf), &datalen,
+ NGTCP2_WRITE_STREAM_FLAG_NONE, stream_id,
+ null_datav(&datav, 119), 1, ++t);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(119 == datalen);
+
+ spktlen = ngtcp2_pkt_write_retry(
+ buf, sizeof(buf), NGTCP2_PROTO_VER_V1, &conn->oscid, &dcid,
+ ngtcp2_conn_get_dcid(conn), token, strsize(token), null_encrypt, &aead,
+ &aead_ctx);
+
+ CU_ASSERT(spktlen > 0);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf,
+ (size_t)spktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ /* Make sure that resent 0RTT packet is padded */
+ CU_ASSERT(sizeof(buf) == spktlen);
+ CU_ASSERT(2 == conn->pktns.tx.last_pkt_num);
+
+ strm = ngtcp2_conn_find_stream(conn, stream_id);
+
+ CU_ASSERT(0 == ngtcp2_ksl_len(strm->tx.streamfrq));
+
+ /* ngtcp2_conn_write_stream sends new 0RTT packet. */
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf),
+ &datalen, NGTCP2_WRITE_STREAM_FLAG_NONE,
+ stream_id, null_data, 120, ++t);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(3 == conn->pktns.tx.last_pkt_num);
+ CU_ASSERT(120 == datalen);
+ CU_ASSERT(NULL == conn->pktns.tx.frq);
+ CU_ASSERT(!ngtcp2_rtb_empty(&conn->pktns.rtb));
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_recv_delayed_handshake_pkt(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[2048];
+ size_t pktlen;
+ ngtcp2_frame fr;
+ int rv;
+
+ setup_default_client(&conn);
+
+ fr.type = NGTCP2_FRAME_CRYPTO;
+ fr.crypto.offset = 0;
+ fr.crypto.datacnt = 1;
+ fr.crypto.data[0].len = 567;
+ fr.crypto.data[0].base = null_data;
+
+ pktlen = write_handshake_pkt(buf, sizeof(buf), &conn->oscid,
+ ngtcp2_conn_get_dcid(conn), 1,
+ NGTCP2_PROTO_VER_V1, &fr, 1, &null_ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 1);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(1 == ngtcp2_ksl_len(&conn->hs_pktns->acktr.ents));
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_recv_max_streams(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[2048];
+ size_t pktlen;
+ int rv;
+ ngtcp2_frame fr;
+
+ setup_default_client(&conn);
+
+ fr.type = NGTCP2_FRAME_MAX_STREAMS_UNI;
+ fr.max_streams.max_streams = 999;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 1, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 1);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(999 == conn->local.uni.max_streams);
+
+ fr.type = NGTCP2_FRAME_MAX_STREAMS_BIDI;
+ fr.max_streams.max_streams = 997;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 2, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 2);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(997 == conn->local.bidi.max_streams);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_handshake(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[2048];
+ size_t pktlen;
+ ngtcp2_ssize spktlen;
+ ngtcp2_frame fr;
+ int64_t pkt_num = 12345689;
+ ngtcp2_tstamp t = 0;
+ ngtcp2_cid rcid;
+ int rv;
+ int64_t stream_id;
+ ngtcp2_ssize nwrite;
+ ngtcp2_crypto_aead_ctx aead_ctx = {0};
+ ngtcp2_crypto_cipher_ctx hp_ctx = {0};
+ ngtcp2_crypto_ctx crypto_ctx;
+
+ rcid_init(&rcid);
+
+ /* Make sure server Initial is padded */
+ setup_handshake_server(&conn);
+ fr.type = NGTCP2_FRAME_CRYPTO;
+ fr.crypto.offset = 0;
+ fr.crypto.datacnt = 1;
+ fr.crypto.data[0].len = 1200;
+ fr.crypto.data[0].base = null_data;
+
+ pktlen = write_initial_pkt(
+ buf, sizeof(buf), &rcid, ngtcp2_conn_get_dcid(conn), ++pkt_num,
+ conn->client_chosen_version, NULL, 0, &fr, 1, &null_ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen >= 1200);
+
+ ngtcp2_conn_del(conn);
+
+ /* Make sure server Handshake is padded when ack-eliciting Initial
+ is coalesced. */
+ setup_handshake_server(&conn);
+ fr.type = NGTCP2_FRAME_CRYPTO;
+ fr.crypto.offset = 0;
+ fr.crypto.datacnt = 1;
+ fr.crypto.data[0].len = 1200;
+ fr.crypto.data[0].base = null_data;
+
+ pktlen = write_initial_pkt(
+ buf, sizeof(buf), &rcid, ngtcp2_conn_get_dcid(conn), ++pkt_num,
+ conn->client_chosen_version, NULL, 0, &fr, 1, &null_ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ ngtcp2_conn_submit_crypto_data(conn, NGTCP2_CRYPTO_LEVEL_HANDSHAKE, null_data,
+ 91);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen >= 1200);
+ CU_ASSERT(1 == ngtcp2_ksl_len(&conn->hs_pktns->rtb.ents));
+
+ ngtcp2_conn_del(conn);
+
+ /* Make sure that client packet is padded if it includes Initial and
+ 0RTT packets */
+ setup_early_client(&conn);
+
+ conn->callbacks.client_initial = client_initial_large_crypto_early_data;
+
+ rv = ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+
+ CU_ASSERT(0 == rv);
+
+ /* First packet should only includes Initial. No space for 0RTT. */
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, NULL, buf, 1280, &nwrite,
+ NGTCP2_WRITE_STREAM_FLAG_NONE, stream_id,
+ null_data, 10, ++t);
+
+ CU_ASSERT(1280 == spktlen);
+ CU_ASSERT(-1 == nwrite);
+
+ /* Second packet has a room for 0RTT. */
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, NULL, buf, 1280, &nwrite,
+ NGTCP2_WRITE_STREAM_FLAG_NONE, stream_id,
+ null_data, 10, ++t);
+
+ CU_ASSERT(1280 == spktlen);
+ CU_ASSERT(10 == nwrite);
+
+ /* We have no data to send. */
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, 1280, ++t);
+
+ CU_ASSERT(0 == spktlen);
+
+ ngtcp2_conn_del(conn);
+
+ /* Make sure that client non ack-eliciting Initial triggers
+ padding. */
+ setup_handshake_client(&conn);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen >= 1200);
+
+ fr.type = NGTCP2_FRAME_CRYPTO;
+ fr.crypto.offset = 0;
+ fr.crypto.datacnt = 1;
+ fr.crypto.data[0].len = 1200;
+ fr.crypto.data[0].base = null_data;
+
+ pktlen = write_initial_pkt(
+ buf, sizeof(buf), &conn->oscid, ngtcp2_conn_get_dcid(conn), ++pkt_num,
+ conn->client_chosen_version, NULL, 0, &fr, 1, &null_ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ init_crypto_ctx(&crypto_ctx);
+ ngtcp2_conn_set_crypto_ctx(conn, &crypto_ctx);
+ ngtcp2_conn_install_rx_handshake_key(conn, &aead_ctx, null_iv,
+ sizeof(null_iv), &hp_ctx);
+ ngtcp2_conn_install_tx_handshake_key(conn, &aead_ctx, null_iv,
+ sizeof(null_iv), &hp_ctx);
+
+ pktlen = write_handshake_pkt(buf, sizeof(buf), &conn->oscid,
+ ngtcp2_conn_get_dcid(conn), ++pkt_num,
+ conn->client_chosen_version, &fr, 1, &null_ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen >= 1200);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_handshake_error(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[2048];
+ size_t pktlen;
+ ngtcp2_ssize spktlen;
+ ngtcp2_frame fr;
+ int64_t pkt_num = 107;
+ ngtcp2_tstamp t = 0;
+ ngtcp2_cid rcid;
+ int rv;
+
+ rcid_init(&rcid);
+
+ /* client side */
+ setup_handshake_client(&conn);
+ conn->callbacks.recv_crypto_data = recv_crypto_handshake_error;
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ fr.type = NGTCP2_FRAME_CRYPTO;
+ fr.crypto.offset = 0;
+ fr.crypto.datacnt = 1;
+ fr.crypto.data[0].len = 333;
+ fr.crypto.data[0].base = null_data;
+
+ pktlen = write_initial_pkt(
+ buf, sizeof(buf), &conn->oscid, ngtcp2_conn_get_dcid(conn), ++pkt_num,
+ conn->client_chosen_version, NULL, 0, &fr, 1, &null_ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(NGTCP2_ERR_CRYPTO == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* server side */
+ setup_handshake_server(&conn);
+ conn->callbacks.recv_crypto_data = recv_crypto_handshake_error;
+
+ fr.type = NGTCP2_FRAME_CRYPTO;
+ fr.crypto.offset = 0;
+ fr.crypto.datacnt = 1;
+ fr.crypto.data[0].len = 1200;
+ fr.crypto.data[0].base = null_data;
+
+ pktlen = write_initial_pkt(
+ buf, sizeof(buf), &rcid, ngtcp2_conn_get_dcid(conn), ++pkt_num,
+ conn->client_chosen_version, NULL, 0, &fr, 1, &null_ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(NGTCP2_ERR_CRYPTO == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* server side; wrong version */
+ setup_handshake_server(&conn);
+ conn->callbacks.recv_crypto_data = recv_crypto_handshake_error;
+
+ fr.type = NGTCP2_FRAME_CRYPTO;
+ fr.crypto.offset = 0;
+ fr.crypto.datacnt = 1;
+ fr.crypto.data[0].len = 1201;
+ fr.crypto.data[0].base = null_data;
+
+ pktlen =
+ write_initial_pkt(buf, sizeof(buf), &rcid, ngtcp2_conn_get_dcid(conn),
+ ++pkt_num, 0xffff, NULL, 0, &fr, 1, &null_ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(NGTCP2_ERR_DROP_CONN == rv);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_retransmit_protected(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[2048];
+ ngtcp2_ssize spktlen;
+ ngtcp2_tstamp t = 0;
+ int64_t stream_id, stream_id_a, stream_id_b;
+ ngtcp2_ksl_it it;
+ ngtcp2_frame fr;
+ size_t pktlen;
+ ngtcp2_vec datav;
+ int accepted;
+ int rv;
+ ngtcp2_strm *strm;
+
+ /* Retransmit a packet completely */
+ setup_default_client(&conn);
+
+ ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf), NULL,
+ NGTCP2_WRITE_STREAM_FLAG_NONE, stream_id,
+ null_data, 126, ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ /* Kick delayed ACK timer */
+ t += NGTCP2_SECONDS;
+
+ conn->pktns.tx.last_pkt_num = 1000000009;
+ conn->pktns.rtb.largest_acked_tx_pkt_num = 1000000007;
+ it = ngtcp2_rtb_head(&conn->pktns.rtb);
+ ngtcp2_conn_detect_lost_pkt(conn, &conn->pktns, &conn->cstat, ++t);
+
+ strm = ngtcp2_conn_find_stream(conn, stream_id);
+
+ CU_ASSERT(1 == strm->tx.loss_count);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(NULL == conn->pktns.tx.frq);
+
+ it = ngtcp2_rtb_head(&conn->pktns.rtb);
+
+ CU_ASSERT(!ngtcp2_ksl_it_end(&it));
+
+ ngtcp2_conn_del(conn);
+
+ /* Retransmission takes place per frame basis. */
+ setup_default_client(&conn);
+ conn->local.bidi.max_streams = 3;
+
+ ngtcp2_conn_open_bidi_stream(conn, &stream_id_a, NULL);
+ ngtcp2_conn_open_bidi_stream(conn, &stream_id_b, NULL);
+
+ ngtcp2_conn_shutdown_stream_write(conn, stream_id_a, NGTCP2_APP_ERR01);
+ ngtcp2_conn_shutdown_stream_write(conn, stream_id_b, NGTCP2_APP_ERR01);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ /* Kick delayed ACK timer */
+ t += NGTCP2_SECONDS;
+
+ conn->pktns.tx.last_pkt_num = 1000000009;
+ conn->pktns.rtb.largest_acked_tx_pkt_num = 1000000007;
+ it = ngtcp2_rtb_head(&conn->pktns.rtb);
+ ngtcp2_conn_detect_lost_pkt(conn, &conn->pktns, &conn->cstat, ++t);
+ spktlen =
+ ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, (size_t)(spktlen - 1), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ it = ngtcp2_rtb_head(&conn->pktns.rtb);
+
+ CU_ASSERT(!ngtcp2_ksl_it_end(&it));
+ CU_ASSERT(NULL != conn->pktns.tx.frq);
+
+ ngtcp2_conn_del(conn);
+
+ /* DATAGRAM frame must not be retransmitted */
+ setup_default_client(&conn);
+
+ conn->callbacks.ack_datagram = ack_datagram;
+ conn->remote.transport_params->max_datagram_frame_size = 65535;
+
+ ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ fr.type = NGTCP2_FRAME_ACK;
+ fr.ack.largest_ack = conn->pktns.tx.last_pkt_num;
+ fr.ack.ack_delay = 0;
+ fr.ack.first_ack_range = 0;
+ fr.ack.rangecnt = 0;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 0, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ datav.base = null_data;
+ datav.len = 99;
+
+ spktlen = ngtcp2_conn_writev_datagram(
+ conn, NULL, NULL, buf, sizeof(buf), &accepted,
+ NGTCP2_WRITE_DATAGRAM_FLAG_NONE, 1000000009, &datav, 1, ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ /* Kick delayed ACK timer */
+ t += NGTCP2_SECONDS;
+
+ conn->pktns.tx.last_pkt_num = 1000000009;
+ conn->pktns.rtb.largest_acked_tx_pkt_num = 1000000007;
+ it = ngtcp2_rtb_head(&conn->pktns.rtb);
+ ngtcp2_conn_detect_lost_pkt(conn, &conn->pktns, &conn->cstat, ++t);
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(0 == spktlen);
+ CU_ASSERT(NULL == conn->pktns.tx.frq);
+
+ it = ngtcp2_rtb_head(&conn->pktns.rtb);
+
+ CU_ASSERT(!ngtcp2_ksl_it_end(&it));
+
+ ngtcp2_conn_del(conn);
+
+ /* Retransmit an empty STREAM frame */
+ setup_default_client(&conn);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ fr.type = NGTCP2_FRAME_ACK;
+ fr.ack.largest_ack = conn->pktns.tx.last_pkt_num;
+ fr.ack.ack_delay = 0;
+ fr.ack.first_ack_range = 0;
+ fr.ack.rangecnt = 0;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 0, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf), NULL,
+ NGTCP2_WRITE_STREAM_FLAG_NONE, stream_id,
+ NULL, 0, ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ /* Kick delayed ACK timer */
+ t += NGTCP2_SECONDS;
+
+ conn->pktns.tx.last_pkt_num = 1000000009;
+ conn->pktns.rtb.largest_acked_tx_pkt_num = 1000000007;
+ it = ngtcp2_rtb_head(&conn->pktns.rtb);
+ ngtcp2_conn_detect_lost_pkt(conn, &conn->pktns, &conn->cstat, ++t);
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(NULL == conn->pktns.tx.frq);
+
+ it = ngtcp2_rtb_head(&conn->pktns.rtb);
+
+ CU_ASSERT(!ngtcp2_ksl_it_end(&it));
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_send_max_stream_data(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[2048];
+ size_t pktlen;
+ ngtcp2_strm *strm;
+ int64_t pkt_num = 890;
+ ngtcp2_tstamp t = 0;
+ ngtcp2_frame fr;
+ int rv;
+ const uint32_t datalen = 1024;
+
+ /* MAX_STREAM_DATA should be sent */
+ setup_default_server(&conn);
+ conn->local.transport_params.initial_max_stream_data_bidi_remote = datalen;
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 0;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = datalen;
+ fr.stream.data[0].base = null_data;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ rv = ngtcp2_conn_extend_max_stream_offset(conn, 4, datalen);
+
+ CU_ASSERT(0 == rv);
+
+ strm = ngtcp2_conn_find_stream(conn, 4);
+
+ CU_ASSERT(ngtcp2_strm_is_tx_queued(strm));
+
+ ngtcp2_conn_del(conn);
+
+ /* MAX_STREAM_DATA should not be sent on incoming fin */
+ setup_default_server(&conn);
+ conn->local.transport_params.initial_max_stream_data_bidi_remote = datalen;
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 1;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = datalen;
+ fr.stream.data[0].base = null_data;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ rv = ngtcp2_conn_extend_max_stream_offset(conn, 4, datalen);
+
+ CU_ASSERT(0 == rv);
+
+ strm = ngtcp2_conn_find_stream(conn, 4);
+
+ CU_ASSERT(!ngtcp2_strm_is_tx_queued(strm));
+
+ ngtcp2_conn_del(conn);
+
+ /* MAX_STREAM_DATA should not be sent if STOP_SENDING frame is being
+ sent by local endpoint */
+ setup_default_server(&conn);
+ conn->local.transport_params.initial_max_stream_data_bidi_remote = datalen;
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 0;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = datalen;
+ fr.stream.data[0].base = null_data;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ rv = ngtcp2_conn_shutdown_stream_read(conn, 4, NGTCP2_APP_ERR01);
+
+ CU_ASSERT(0 == rv);
+
+ rv = ngtcp2_conn_extend_max_stream_offset(conn, 4, datalen);
+
+ CU_ASSERT(0 == rv);
+
+ strm = ngtcp2_conn_find_stream(conn, 4);
+
+ CU_ASSERT(!ngtcp2_strm_is_tx_queued(strm));
+
+ ngtcp2_conn_del(conn);
+
+ /* MAX_STREAM_DATA should not be sent if stream is being reset by
+ remote endpoint */
+ setup_default_server(&conn);
+ conn->local.transport_params.initial_max_stream_data_bidi_remote = datalen;
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 0;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = datalen;
+ fr.stream.data[0].base = null_data;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ fr.type = NGTCP2_FRAME_RESET_STREAM;
+ fr.reset_stream.stream_id = 4;
+ fr.reset_stream.app_error_code = NGTCP2_APP_ERR01;
+ fr.reset_stream.final_size = datalen;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ rv = ngtcp2_conn_extend_max_stream_offset(conn, 4, datalen);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(ngtcp2_pq_empty(&conn->tx.strmq));
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_recv_stream_data(void) {
+ uint8_t buf[1024];
+ ngtcp2_conn *conn;
+ my_user_data ud;
+ int64_t pkt_num = 612;
+ ngtcp2_tstamp t = 0;
+ ngtcp2_frame fr;
+ size_t pktlen;
+ int rv;
+ int64_t stream_id;
+ size_t i;
+
+ /* 2 STREAM frames are received in the correct order. */
+ setup_default_server(&conn);
+ conn->callbacks.recv_stream_data = recv_stream_data;
+ conn->user_data = &ud;
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 0;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = 111;
+ fr.stream.data[0].base = null_data;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ memset(&ud, 0, sizeof(ud));
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(4 == ud.stream_data.stream_id);
+ CU_ASSERT(!(ud.stream_data.flags & NGTCP2_STREAM_DATA_FLAG_FIN));
+ CU_ASSERT(!(ud.stream_data.flags & NGTCP2_STREAM_DATA_FLAG_EARLY));
+ CU_ASSERT(111 == ud.stream_data.datalen);
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 1;
+ fr.stream.offset = 111;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = 99;
+ fr.stream.data[0].base = null_data;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ memset(&ud, 0, sizeof(ud));
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(4 == ud.stream_data.stream_id);
+ CU_ASSERT(ud.stream_data.flags & NGTCP2_STREAM_DATA_FLAG_FIN);
+ CU_ASSERT(99 == ud.stream_data.datalen);
+
+ ngtcp2_conn_del(conn);
+
+ /* 2 STREAM frames are received in the correct order, and 2nd STREAM
+ frame has 0 length, and FIN bit set. */
+ setup_default_server(&conn);
+ conn->callbacks.recv_stream_data = recv_stream_data;
+ conn->user_data = &ud;
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 0;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = 111;
+ fr.stream.data[0].base = null_data;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ memset(&ud, 0, sizeof(ud));
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(4 == ud.stream_data.stream_id);
+ CU_ASSERT(!(ud.stream_data.flags & NGTCP2_STREAM_DATA_FLAG_FIN));
+ CU_ASSERT(111 == ud.stream_data.datalen);
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 1;
+ fr.stream.offset = 111;
+ fr.stream.datacnt = 0;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ memset(&ud, 0, sizeof(ud));
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(4 == ud.stream_data.stream_id);
+ CU_ASSERT(ud.stream_data.flags & NGTCP2_STREAM_DATA_FLAG_FIN);
+ CU_ASSERT(0 == ud.stream_data.datalen);
+
+ ngtcp2_conn_del(conn);
+
+ /* 2 identical STREAM frames with FIN bit set are received. The
+ recv_stream_data callback should not be called for sencond STREAM
+ frame. */
+ setup_default_server(&conn);
+ conn->callbacks.recv_stream_data = recv_stream_data;
+ conn->user_data = &ud;
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 1;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = 111;
+ fr.stream.data[0].base = null_data;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ memset(&ud, 0, sizeof(ud));
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(4 == ud.stream_data.stream_id);
+ CU_ASSERT(ud.stream_data.flags & NGTCP2_STREAM_DATA_FLAG_FIN);
+ CU_ASSERT(111 == ud.stream_data.datalen);
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ memset(&ud, 0, sizeof(ud));
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(0 == ud.stream_data.stream_id);
+ CU_ASSERT(!(ud.stream_data.flags & NGTCP2_STREAM_DATA_FLAG_FIN));
+ CU_ASSERT(0 == ud.stream_data.datalen);
+
+ ngtcp2_conn_del(conn);
+
+ /* Re-ordered STREAM frame; we first gets 0 length STREAM frame with
+ FIN bit set. Then the remaining STREAM frame is received. */
+ setup_default_server(&conn);
+ conn->callbacks.recv_stream_data = recv_stream_data;
+ conn->user_data = &ud;
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 1;
+ fr.stream.offset = 599;
+ fr.stream.datacnt = 0;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ memset(&ud, 0, sizeof(ud));
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(0 == ud.stream_data.stream_id);
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 0;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = 599;
+ fr.stream.data[0].base = null_data;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ memset(&ud, 0, sizeof(ud));
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(4 == ud.stream_data.stream_id);
+ CU_ASSERT(ud.stream_data.flags & NGTCP2_STREAM_DATA_FLAG_FIN);
+ CU_ASSERT(599 == ud.stream_data.datalen);
+
+ ngtcp2_conn_del(conn);
+
+ /* Simulate the case where packet is lost. We first gets 0 length
+ STREAM frame with FIN bit set. Then the lost STREAM frame is
+ retransmitted with FIN bit set is received. */
+ setup_default_server(&conn);
+ conn->callbacks.recv_stream_data = recv_stream_data;
+ conn->user_data = &ud;
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 1;
+ fr.stream.offset = 599;
+ fr.stream.datacnt = 0;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ memset(&ud, 0, sizeof(ud));
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(0 == ud.stream_data.stream_id);
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 1;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = 599;
+ fr.stream.data[0].base = null_data;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ memset(&ud, 0, sizeof(ud));
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(4 == ud.stream_data.stream_id);
+ CU_ASSERT(ud.stream_data.flags & NGTCP2_STREAM_DATA_FLAG_FIN);
+ CU_ASSERT(599 == ud.stream_data.datalen);
+
+ ngtcp2_conn_del(conn);
+
+ /* Receive an unidirectional stream data */
+ setup_default_client(&conn);
+ conn->callbacks.recv_stream_data = recv_stream_data;
+ conn->user_data = &ud;
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.stream_id = 3;
+ fr.stream.fin = 0;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = 911;
+ fr.stream.data[0].base = null_data;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ memset(&ud, 0, sizeof(ud));
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(3 == ud.stream_data.stream_id);
+ CU_ASSERT(!(ud.stream_data.flags & NGTCP2_STREAM_DATA_FLAG_FIN));
+ CU_ASSERT(911 == ud.stream_data.datalen);
+
+ ngtcp2_conn_del(conn);
+
+ /* Receive an unidirectional stream which is beyond the limit. */
+ setup_default_server(&conn);
+ conn->callbacks.recv_stream_data = recv_stream_data;
+ conn->remote.uni.max_streams = 0;
+ conn->user_data = &ud;
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.stream_id = 2;
+ fr.stream.fin = 0;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = 911;
+ fr.stream.data[0].base = null_data;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ memset(&ud, 0, sizeof(ud));
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(NGTCP2_ERR_STREAM_LIMIT == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* Receiving nonzero payload for an local unidirectional stream is a
+ protocol violation. */
+ setup_default_client(&conn);
+
+ rv = ngtcp2_conn_open_uni_stream(conn, &stream_id, NULL);
+
+ CU_ASSERT(0 == rv);
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.stream_id = stream_id;
+ fr.stream.fin = 0;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = 9;
+ fr.stream.data[0].base = null_data;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(NGTCP2_ERR_STREAM_STATE == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* DATA on crypto stream, and TLS alert is generated. */
+ setup_default_server(&conn);
+ conn->callbacks.recv_crypto_data = recv_crypto_fatal_alert_generated;
+
+ fr.type = NGTCP2_FRAME_CRYPTO;
+ fr.crypto.offset = 0;
+ fr.crypto.datacnt = 1;
+ fr.crypto.data[0].len = 139;
+ fr.crypto.data[0].base = null_data;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(NGTCP2_ERR_CRYPTO == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* 0 length STREAM frame is allowed */
+ setup_default_server(&conn);
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 0;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 0;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NULL != ngtcp2_conn_find_stream(conn, 4));
+
+ ngtcp2_conn_del(conn);
+
+ /* After sending STOP_SENDING, receiving 2 STREAM frames with fin
+ bit set must not invoke recv_stream_data callback. */
+ setup_default_server(&conn);
+ conn->callbacks.recv_stream_data = recv_stream_data;
+ conn->user_data = &ud;
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 0;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 0;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NULL != ngtcp2_conn_find_stream(conn, 4));
+
+ rv = ngtcp2_conn_shutdown_stream_read(conn, 4, 99);
+
+ CU_ASSERT(0 == rv);
+
+ for (i = 0; i < 2; ++i) {
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 1;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].base = null_data;
+ fr.stream.data[0].len = 19;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ ud.stream_data.stream_id = 0;
+ rv =
+ ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(0 == ud.stream_data.stream_id);
+ CU_ASSERT(19 == conn->rx.offset);
+ CU_ASSERT(19 == conn->rx.unsent_max_offset -
+ conn->local.transport_params.initial_max_data);
+ CU_ASSERT(conn->local.transport_params.initial_max_data ==
+ conn->rx.max_offset);
+ }
+
+ ngtcp2_conn_del(conn);
+
+ /* After receiving RESET_STREAM, recv_stream_data callback must not
+ be invoked */
+ setup_default_server(&conn);
+ conn->callbacks.recv_stream_data = recv_stream_data;
+ conn->user_data = &ud;
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.stream_id = 0;
+ fr.stream.fin = 0;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 0;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NULL != ngtcp2_conn_find_stream(conn, 0));
+
+ fr.type = NGTCP2_FRAME_RESET_STREAM;
+ fr.reset_stream.stream_id = 0;
+ fr.reset_stream.app_error_code = 999;
+ fr.reset_stream.final_size = 199;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NULL != ngtcp2_conn_find_stream(conn, 0));
+ CU_ASSERT(199 == conn->rx.unsent_max_offset -
+ conn->local.transport_params.initial_max_data);
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.stream_id = 0;
+ fr.stream.fin = 0;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].base = null_data;
+ fr.stream.data[0].len = 198;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ ud.stream_data.stream_id = -1;
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(-1 == ud.stream_data.stream_id);
+ CU_ASSERT(199 == conn->rx.unsent_max_offset -
+ conn->local.transport_params.initial_max_data);
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.stream_id = 0;
+ fr.stream.fin = 1;
+ fr.stream.offset = 198;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].base = null_data;
+ fr.stream.data[0].len = 1;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ ud.stream_data.stream_id = -1;
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(-1 == ud.stream_data.stream_id);
+ CU_ASSERT(199 == conn->rx.unsent_max_offset -
+ conn->local.transport_params.initial_max_data);
+
+ ngtcp2_conn_del(conn);
+
+ /* ngtcp2_conn_shutdown_stream_read is called in recv_stream_data
+ callback. Further recv_stream_data callback must not be
+ called. */
+ setup_default_server(&conn);
+ conn->callbacks.recv_stream_data = recv_stream_data_shutdown_stream_read;
+ conn->user_data = &ud;
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 0;
+ fr.stream.offset = 599;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = 1;
+ fr.stream.data[0].base = null_data;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ memset(&ud, 0, sizeof(ud));
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(0 == ud.stream_data.stream_id);
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 0;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = 599;
+ fr.stream.data[0].base = null_data;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ memset(&ud, 0, sizeof(ud));
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(4 == ud.stream_data.stream_id);
+ CU_ASSERT(!(ud.stream_data.flags & NGTCP2_STREAM_DATA_FLAG_FIN));
+ CU_ASSERT(599 == ud.stream_data.datalen);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_recv_ping(void) {
+ uint8_t buf[1024];
+ ngtcp2_conn *conn;
+ int64_t pkt_num = 133;
+ ngtcp2_tstamp t = 0;
+ ngtcp2_frame fr;
+ size_t pktlen;
+ int rv;
+
+ setup_default_client(&conn);
+
+ fr.type = NGTCP2_FRAME_PING;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NULL == conn->pktns.tx.frq);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_recv_max_stream_data(void) {
+ uint8_t buf[1024];
+ ngtcp2_conn *conn;
+ int64_t pkt_num = 1000000007;
+ ngtcp2_tstamp t = 0;
+ ngtcp2_frame fr;
+ size_t pktlen;
+ int rv;
+ ngtcp2_strm *strm;
+
+ /* Receiving MAX_STREAM_DATA to an uninitiated local bidirectional
+ stream ID is an error */
+ setup_default_client(&conn);
+
+ fr.type = NGTCP2_FRAME_MAX_STREAM_DATA;
+ fr.max_stream_data.stream_id = 4;
+ fr.max_stream_data.max_stream_data = 8092;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(NGTCP2_ERR_STREAM_STATE == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* Receiving MAX_STREAM_DATA to an uninitiated local unidirectional
+ stream ID is an error */
+ setup_default_client(&conn);
+
+ fr.type = NGTCP2_FRAME_MAX_STREAM_DATA;
+ fr.max_stream_data.stream_id = 2;
+ fr.max_stream_data.max_stream_data = 8092;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(NGTCP2_ERR_STREAM_STATE == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* Receiving MAX_STREAM_DATA to a remote bidirectional stream which
+ exceeds limit */
+ setup_default_client(&conn);
+
+ fr.type = NGTCP2_FRAME_MAX_STREAM_DATA;
+ fr.max_stream_data.stream_id = 1;
+ fr.max_stream_data.max_stream_data = 1000000009;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(NGTCP2_ERR_STREAM_LIMIT == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* Receiving MAX_STREAM_DATA to a remote bidirectional stream which
+ the local endpoint has not received yet. */
+ setup_default_server(&conn);
+
+ fr.type = NGTCP2_FRAME_MAX_STREAM_DATA;
+ fr.max_stream_data.stream_id = 4;
+ fr.max_stream_data.max_stream_data = 1000000009;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ strm = ngtcp2_conn_find_stream(conn, 4);
+
+ CU_ASSERT(NULL != strm);
+ CU_ASSERT(1000000009 == strm->tx.max_offset);
+
+ ngtcp2_conn_del(conn);
+
+ /* Receiving MAX_STREAM_DATA to a idle remote unidirectional stream
+ is a protocol violation. */
+ setup_default_server(&conn);
+
+ fr.type = NGTCP2_FRAME_MAX_STREAM_DATA;
+ fr.max_stream_data.stream_id = 2;
+ fr.max_stream_data.max_stream_data = 1000000009;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(NGTCP2_ERR_STREAM_STATE == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* Receiving MAX_STREAM_DATA to an existing bidirectional stream */
+ setup_default_server(&conn);
+
+ strm = open_stream(conn, 4);
+
+ fr.type = NGTCP2_FRAME_MAX_STREAM_DATA;
+ fr.max_stream_data.stream_id = 4;
+ fr.max_stream_data.max_stream_data = 1000000009;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(1000000009 == strm->tx.max_offset);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_send_early_data(void) {
+ ngtcp2_conn *conn;
+ ngtcp2_ssize spktlen;
+ ngtcp2_ssize datalen;
+ uint8_t buf[1024];
+ int64_t stream_id;
+ int rv;
+ ngtcp2_tstamp t = 0;
+ ngtcp2_vec datav;
+
+ setup_early_client(&conn);
+
+ rv = ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+
+ CU_ASSERT(0 == rv);
+
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf),
+ &datalen, NGTCP2_WRITE_STREAM_FLAG_FIN,
+ stream_id, null_data, 1024, ++t);
+
+ CU_ASSERT((ngtcp2_ssize)sizeof(buf) == spktlen);
+ CU_ASSERT(670 == datalen);
+
+ ngtcp2_conn_del(conn);
+
+ /* Verify that Handshake packet and 0-RTT packet are coalesced into
+ one UDP packet. */
+ setup_early_client(&conn);
+
+ rv = ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+
+ CU_ASSERT(0 == rv);
+
+ spktlen =
+ ngtcp2_conn_writev_stream(conn, NULL, NULL, buf, sizeof(buf), &datalen,
+ NGTCP2_WRITE_STREAM_FLAG_NONE, stream_id,
+ null_datav(&datav, 199), 1, ++t);
+
+ CU_ASSERT(sizeof(buf) == spktlen);
+ CU_ASSERT(199 == datalen);
+
+ ngtcp2_conn_del(conn);
+
+ /* 0 length 0-RTT packet with FIN bit set */
+ setup_early_client(&conn);
+
+ rv = ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+
+ CU_ASSERT(0 == rv);
+
+ spktlen = ngtcp2_conn_writev_stream(conn, NULL, NULL, buf, sizeof(buf),
+ &datalen, NGTCP2_WRITE_STREAM_FLAG_FIN,
+ stream_id, NULL, 0, ++t);
+
+ CU_ASSERT(sizeof(buf) == spktlen);
+ CU_ASSERT(0 == datalen);
+
+ ngtcp2_conn_del(conn);
+
+ /* Can write 0 length STREAM frame */
+ setup_early_client(&conn);
+
+ rv = ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+
+ CU_ASSERT(0 == rv);
+
+ spktlen = ngtcp2_conn_writev_stream(conn, NULL, NULL, buf, sizeof(buf),
+ &datalen, NGTCP2_WRITE_STREAM_FLAG_NONE,
+ -1, NULL, 0, ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ /* We have written Initial. Now check that STREAM frame is
+ written. */
+ spktlen = ngtcp2_conn_writev_stream(conn, NULL, NULL, buf, sizeof(buf),
+ &datalen, NGTCP2_WRITE_STREAM_FLAG_NONE,
+ stream_id, NULL, 0, ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ ngtcp2_conn_del(conn);
+
+ /* Could not send 0-RTT data because buffer is too small. */
+ setup_early_client(&conn);
+
+ rv = ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+
+ CU_ASSERT(0 == rv);
+
+ spktlen = ngtcp2_conn_writev_stream(
+ conn, NULL, NULL, buf,
+ NGTCP2_MIN_LONG_HEADERLEN + 1 + ngtcp2_conn_get_dcid(conn)->datalen +
+ conn->oscid.datalen + 300,
+ &datalen, NGTCP2_WRITE_STREAM_FLAG_FIN, stream_id, NULL, 0, ++t);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(-1 == datalen);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_recv_early_data(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[2048];
+ size_t pktlen;
+ ngtcp2_ssize spktlen;
+ ngtcp2_frame fr;
+ int64_t pkt_num = 1;
+ ngtcp2_tstamp t = 0;
+ ngtcp2_strm *strm;
+ ngtcp2_cid rcid;
+ int rv;
+ my_user_data ud;
+
+ rcid_init(&rcid);
+
+ setup_early_server(&conn);
+ conn->callbacks.recv_stream_data = recv_stream_data;
+ conn->user_data = &ud;
+
+ fr.type = NGTCP2_FRAME_CRYPTO;
+ fr.crypto.offset = 0;
+ fr.crypto.datacnt = 1;
+ fr.crypto.data[0].len = 1221;
+ fr.crypto.data[0].base = null_data;
+
+ pktlen = write_initial_pkt(
+ buf, sizeof(buf), &rcid, ngtcp2_conn_get_dcid(conn), ++pkt_num,
+ conn->client_chosen_version, NULL, 0, &fr, 1, &null_ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 1;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = 911;
+ fr.stream.data[0].base = null_data;
+
+ pktlen =
+ write_0rtt_pkt(buf, sizeof(buf), &rcid, ngtcp2_conn_get_dcid(conn),
+ ++pkt_num, conn->client_chosen_version, &fr, 1, &null_ckm);
+
+ memset(&ud, 0, sizeof(ud));
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(4 == ud.stream_data.stream_id);
+ CU_ASSERT(ud.stream_data.flags & NGTCP2_STREAM_DATA_FLAG_EARLY);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ strm = ngtcp2_conn_find_stream(conn, 4);
+
+ CU_ASSERT(NULL != strm);
+ CU_ASSERT(911 == strm->rx.last_offset);
+
+ ngtcp2_conn_del(conn);
+
+ /* Re-ordered 0-RTT packet */
+ setup_early_server(&conn);
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 1;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = 119;
+ fr.stream.data[0].base = null_data;
+
+ pktlen =
+ write_0rtt_pkt(buf, sizeof(buf), &rcid, ngtcp2_conn_get_dcid(conn),
+ ++pkt_num, conn->client_chosen_version, &fr, 1, &null_ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(NGTCP2_ERR_RETRY == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* Compound packet */
+ setup_early_server(&conn);
+
+ fr.type = NGTCP2_FRAME_CRYPTO;
+ fr.crypto.offset = 0;
+ fr.crypto.datacnt = 1;
+ fr.crypto.data[0].len = 111;
+ fr.crypto.data[0].base = null_data;
+
+ pktlen = write_initial_pkt(
+ buf, sizeof(buf), &rcid, ngtcp2_conn_get_dcid(conn), ++pkt_num,
+ conn->client_chosen_version, NULL, 0, &fr, 1, &null_ckm);
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 1;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = 999;
+ fr.stream.data[0].base = null_data;
+
+ pktlen += write_0rtt_pkt(buf + pktlen, sizeof(buf) - pktlen, &rcid,
+ ngtcp2_conn_get_dcid(conn), ++pkt_num,
+ conn->client_chosen_version, &fr, 1, &null_ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ strm = ngtcp2_conn_find_stream(conn, 4);
+
+ CU_ASSERT(NULL != strm);
+ CU_ASSERT(999 == strm->rx.last_offset);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_recv_compound_pkt(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[2048];
+ size_t pktlen;
+ ngtcp2_ssize spktlen;
+ ngtcp2_frame fr;
+ int64_t pkt_num = 1;
+ ngtcp2_tstamp t = 0;
+ ngtcp2_acktr_entry *ackent;
+ int rv;
+ ngtcp2_ksl_it it;
+
+ /* 2 QUIC long packets in one UDP packet */
+ setup_handshake_server(&conn);
+
+ fr.type = NGTCP2_FRAME_CRYPTO;
+ fr.crypto.offset = 0;
+ fr.crypto.datacnt = 1;
+ fr.crypto.data[0].len = 611;
+ fr.crypto.data[0].base = null_data;
+
+ pktlen = write_initial_pkt(
+ buf, sizeof(buf), &conn->oscid, ngtcp2_conn_get_dcid(conn), ++pkt_num,
+ conn->client_chosen_version, NULL, 0, &fr, 1, &null_ckm);
+
+ pktlen += write_initial_pkt(buf + pktlen, sizeof(buf) - pktlen, &conn->oscid,
+ ngtcp2_conn_get_dcid(conn), ++pkt_num,
+ conn->client_chosen_version, NULL, 0, &fr, 1,
+ &null_ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ it = ngtcp2_acktr_get(&conn->in_pktns->acktr);
+ ackent = ngtcp2_ksl_it_get(&it);
+
+ CU_ASSERT(pkt_num == ackent->pkt_num);
+ CU_ASSERT(2 == ackent->len);
+
+ ngtcp2_ksl_it_next(&it);
+
+ CU_ASSERT(ngtcp2_ksl_it_end(&it));
+
+ ngtcp2_conn_del(conn);
+
+ /* 1 long packet and 1 short packet in one UDP packet */
+ setup_default_server(&conn);
+
+ fr.type = NGTCP2_FRAME_PADDING;
+ fr.padding.len = 1;
+
+ pktlen = write_handshake_pkt(buf, sizeof(buf), &conn->oscid,
+ ngtcp2_conn_get_dcid(conn), ++pkt_num,
+ conn->client_chosen_version, &fr, 1, &null_ckm);
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 0;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = 426;
+ fr.stream.data[0].base = null_data;
+
+ pktlen += write_pkt(buf + pktlen, sizeof(buf) - pktlen, &conn->oscid,
+ ++pkt_num, &fr, 1, conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ it = ngtcp2_acktr_get(&conn->pktns.acktr);
+ ackent = ngtcp2_ksl_it_get(&it);
+
+ CU_ASSERT(ackent->pkt_num == pkt_num);
+
+ it = ngtcp2_acktr_get(&conn->hs_pktns->acktr);
+
+ CU_ASSERT(!ngtcp2_ksl_it_end(&it));
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_pkt_payloadlen(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[2048];
+ size_t pktlen;
+ ngtcp2_frame fr;
+ int64_t pkt_num = 1;
+ ngtcp2_tstamp t = 0;
+ uint64_t payloadlen;
+ int rv;
+ const ngtcp2_cid *dcid;
+
+ /* Payload length is invalid */
+ setup_handshake_server(&conn);
+
+ fr.type = NGTCP2_FRAME_CRYPTO;
+ fr.crypto.offset = 0;
+ fr.crypto.datacnt = 1;
+ fr.crypto.data[0].len = 1231;
+ fr.crypto.data[0].base = null_data;
+
+ dcid = ngtcp2_conn_get_dcid(conn);
+
+ pktlen = write_initial_pkt(buf, sizeof(buf), &conn->oscid, dcid, ++pkt_num,
+ conn->client_chosen_version, NULL, 0, &fr, 1,
+ &null_ckm);
+
+ payloadlen = read_pkt_payloadlen(buf, dcid, &conn->oscid);
+ write_pkt_payloadlen(buf, dcid, &conn->oscid, payloadlen + 1);
+
+ /* This first packet which does not increase initial packet number
+ space CRYPTO offset or it does not get buffered as 0RTT is an
+ error. But it is unsecured Initial, so we just ignore it. */
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(NGTCP2_ERR_DROP_CONN == rv);
+ CU_ASSERT(NGTCP2_CS_SERVER_INITIAL == conn->state);
+
+ ngtcp2_conn_del(conn);
+
+ /* Client Initial packet included in UDP datagram smaller than 1200
+ is discarded. */
+ setup_handshake_server(&conn);
+
+ fr.type = NGTCP2_FRAME_CRYPTO;
+ fr.crypto.offset = 0;
+ fr.crypto.datacnt = 1;
+ fr.crypto.data[0].len = 1000;
+ fr.crypto.data[0].base = null_data;
+
+ pktlen = write_initial_pkt(buf, sizeof(buf), &conn->oscid,
+ ngtcp2_conn_get_dcid(conn), 0, NGTCP2_PROTO_VER_V1,
+ NULL, 0, &fr, 1, &null_ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(NGTCP2_ERR_DROP_CONN == rv);
+ CU_ASSERT(NGTCP2_CS_SERVER_INITIAL == conn->state);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_writev_stream(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[2048];
+ ngtcp2_ssize spktlen;
+ ngtcp2_tstamp t = 0;
+ int rv;
+ int64_t stream_id;
+ ngtcp2_vec datav = {null_data, 10};
+ ngtcp2_ssize datalen;
+ size_t left;
+
+ /* 0 length STREAM should not be written if we supply nonzero length
+ data. */
+ setup_default_client(&conn);
+
+ /* This will sends NEW_CONNECTION_ID frames */
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ rv = ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+
+ CU_ASSERT(0 == rv);
+
+ /*
+ * Long header (1+18+1)
+ * STREAM overhead (+3)
+ * AEAD overhead (16)
+ */
+ spktlen = ngtcp2_conn_writev_stream(conn, NULL, NULL, buf, 39, &datalen,
+ NGTCP2_WRITE_STREAM_FLAG_NONE, stream_id,
+ &datav, 1, ++t);
+
+ CU_ASSERT(0 == spktlen);
+ CU_ASSERT(-1 == datalen);
+
+ ngtcp2_conn_del(conn);
+
+ /* +1 buffer size */
+ setup_default_client(&conn);
+
+ /* This will sends NEW_CONNECTION_ID frames */
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ rv = ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+
+ CU_ASSERT(0 == rv);
+
+ spktlen = ngtcp2_conn_writev_stream(conn, NULL, NULL, buf, 40, &datalen,
+ NGTCP2_WRITE_STREAM_FLAG_NONE, stream_id,
+ &datav, 1, ++t);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(1 == datalen);
+
+ ngtcp2_conn_del(conn);
+
+ /* Coalesces multiple STREAM frames */
+ setup_default_client(&conn);
+ conn->local.bidi.max_streams = 100;
+
+ rv = ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+
+ CU_ASSERT(0 == rv);
+
+ spktlen = ngtcp2_conn_writev_stream(conn, NULL, NULL, buf, 1200, &datalen,
+ NGTCP2_WRITE_STREAM_FLAG_MORE, stream_id,
+ &datav, 1, ++t);
+
+ CU_ASSERT(NGTCP2_ERR_WRITE_MORE == spktlen);
+ CU_ASSERT(10 == datalen);
+
+ left = ngtcp2_ppe_left(&conn->pkt.ppe);
+
+ rv = ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+
+ CU_ASSERT(0 == rv);
+
+ spktlen = ngtcp2_conn_writev_stream(conn, NULL, NULL, buf, 1200, &datalen,
+ NGTCP2_WRITE_STREAM_FLAG_MORE, stream_id,
+ &datav, 1, ++t);
+
+ CU_ASSERT(NGTCP2_ERR_WRITE_MORE == spktlen);
+ CU_ASSERT(10 == datalen);
+ CU_ASSERT(ngtcp2_ppe_left(&conn->pkt.ppe) < left);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ ngtcp2_conn_del(conn);
+
+ /* 0RTT: Coalesces multiple STREAM frames */
+ setup_early_client(&conn);
+ conn->local.bidi.max_streams = 100;
+
+ rv = ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+
+ CU_ASSERT(0 == rv);
+
+ spktlen = ngtcp2_conn_writev_stream(conn, NULL, NULL, buf, 1200, &datalen,
+ NGTCP2_WRITE_STREAM_FLAG_MORE, stream_id,
+ &datav, 1, ++t);
+
+ CU_ASSERT(NGTCP2_ERR_WRITE_MORE == spktlen);
+ CU_ASSERT(10 == datalen);
+
+ left = ngtcp2_ppe_left(&conn->pkt.ppe);
+
+ rv = ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+
+ CU_ASSERT(0 == rv);
+
+ spktlen = ngtcp2_conn_writev_stream(conn, NULL, NULL, buf, 1200, &datalen,
+ NGTCP2_WRITE_STREAM_FLAG_MORE, stream_id,
+ &datav, 1, ++t);
+
+ CU_ASSERT(NGTCP2_ERR_WRITE_MORE == spktlen);
+ CU_ASSERT(10 == datalen);
+ CU_ASSERT(ngtcp2_ppe_left(&conn->pkt.ppe) < left);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ /* Make sure that packet is padded */
+ CU_ASSERT(1200 == spktlen);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_writev_datagram(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[2048];
+ ngtcp2_ssize spktlen;
+ ngtcp2_tstamp t = 0;
+ ngtcp2_vec datav = {null_data, 10};
+ ngtcp2_vec vec;
+ int accepted;
+ my_user_data ud;
+ ngtcp2_frame fr;
+ size_t pktlen;
+ int rv;
+
+ setup_default_client(&conn);
+ conn->callbacks.ack_datagram = ack_datagram;
+ conn->remote.transport_params->max_datagram_frame_size = 1 + 1 + 10;
+ conn->user_data = &ud;
+
+ spktlen = ngtcp2_conn_writev_datagram(
+ conn, NULL, NULL, buf, sizeof(buf), &accepted,
+ NGTCP2_WRITE_DATAGRAM_FLAG_NONE, 1000000009, &datav, 1, ++t);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(0 != accepted);
+
+ fr.type = NGTCP2_FRAME_ACK;
+ fr.ack.largest_ack = conn->pktns.tx.last_pkt_num;
+ fr.ack.ack_delay = 0;
+ fr.ack.first_ack_range = 0;
+ fr.ack.rangecnt = 0;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 0, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ ud.datagram.dgram_id = 0;
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(1000000009 == ud.datagram.dgram_id);
+
+ ngtcp2_conn_del(conn);
+
+ /* Coalesces multiple DATAGRAM frames into a single QUIC packet */
+ setup_default_client(&conn);
+ conn->remote.transport_params->max_datagram_frame_size = 65535;
+
+ spktlen = ngtcp2_conn_writev_datagram(
+ conn, NULL, NULL, buf, sizeof(buf), &accepted,
+ NGTCP2_WRITE_DATAGRAM_FLAG_MORE, 1000000007, &datav, 1, ++t);
+
+ CU_ASSERT(NGTCP2_ERR_WRITE_MORE == spktlen);
+ CU_ASSERT(0 != accepted);
+
+ spktlen = ngtcp2_conn_writev_datagram(
+ conn, NULL, NULL, buf, sizeof(buf), &accepted,
+ NGTCP2_WRITE_DATAGRAM_FLAG_MORE, 1000000007, &datav, 1, ++t);
+
+ CU_ASSERT(NGTCP2_ERR_WRITE_MORE == spktlen);
+ CU_ASSERT(0 != accepted);
+
+ spktlen = ngtcp2_conn_writev_datagram(
+ conn, NULL, NULL, buf, sizeof(buf), &accepted,
+ NGTCP2_WRITE_DATAGRAM_FLAG_NONE, 0, &datav, 1, ++t);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(0 != accepted);
+
+ ngtcp2_conn_del(conn);
+
+ /* DATAGRAM cannot fit into QUIC packet because the other frames
+ occupy the space */
+ setup_default_client(&conn);
+ conn->remote.transport_params->max_datagram_frame_size =
+ 1 + ngtcp2_put_uvarintlen(2000) + 2000;
+
+ vec.base = null_data;
+ vec.len = 2000;
+
+ spktlen = ngtcp2_conn_writev_datagram(
+ conn, NULL, NULL, buf, sizeof(buf), &accepted,
+ NGTCP2_WRITE_DATAGRAM_FLAG_NONE, 987, &vec, 1, ++t);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(0 == accepted);
+
+ spktlen = ngtcp2_conn_writev_datagram(
+ conn, NULL, NULL, buf, sizeof(buf), &accepted,
+ NGTCP2_WRITE_DATAGRAM_FLAG_NONE, 545, &vec, 1, ++t);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(0 != accepted);
+
+ ngtcp2_conn_del(conn);
+
+ /* Calling ngtcp2_conn_writev_datagram without receiving positive
+ max_datagram_frame_size is an error */
+ setup_default_client(&conn);
+
+ spktlen = ngtcp2_conn_writev_datagram(
+ conn, NULL, NULL, buf, sizeof(buf), &accepted,
+ NGTCP2_WRITE_DATAGRAM_FLAG_NONE, 999, &datav, 1, ++t);
+
+ CU_ASSERT(NGTCP2_ERR_INVALID_STATE == spktlen);
+
+ ngtcp2_conn_del(conn);
+
+ /* Sending DATAGRAM which is larger than the value of received
+ max_datagram_frame_size is an error */
+ setup_default_client(&conn);
+ conn->remote.transport_params->max_datagram_frame_size = 9;
+
+ spktlen = ngtcp2_conn_writev_datagram(
+ conn, NULL, NULL, buf, sizeof(buf), &accepted,
+ NGTCP2_WRITE_DATAGRAM_FLAG_NONE, 4433, &datav, 1, ++t);
+
+ CU_ASSERT(NGTCP2_ERR_INVALID_ARGUMENT == spktlen);
+
+ ngtcp2_conn_del(conn);
+
+ /* Send DATAGRAM frame in a 0RTT packet */
+ setup_early_client(&conn);
+
+ conn->remote.transport_params->max_datagram_frame_size = 4311;
+
+ spktlen = ngtcp2_conn_writev_datagram(
+ conn, NULL, NULL, buf, sizeof(buf), &accepted,
+ NGTCP2_WRITE_DATAGRAM_FLAG_NONE, 22360679, &datav, 1, ++t);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(0 != accepted);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_recv_datagram(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[2048];
+ ngtcp2_frame fr;
+ size_t pktlen;
+ int64_t pkt_num = 0;
+ ngtcp2_tstamp t = 0;
+ my_user_data ud;
+ int rv;
+ ngtcp2_cid rcid;
+
+ rcid_init(&rcid);
+
+ setup_default_server(&conn);
+ conn->user_data = &ud;
+ conn->callbacks.recv_datagram = recv_datagram;
+ conn->local.transport_params.max_datagram_frame_size = 1 + 1111;
+
+ fr.type = NGTCP2_FRAME_DATAGRAM;
+ fr.datagram.data = fr.datagram.rdata;
+ fr.datagram.data->base = null_data;
+ fr.datagram.data->len = 1111;
+ fr.datagram.datacnt = 1;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ memset(&ud, 0, sizeof(ud));
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(1111 == ud.datagram.datalen);
+ CU_ASSERT(!(NGTCP2_DATAGRAM_FLAG_EARLY & ud.datagram.flags));
+
+ ngtcp2_conn_del(conn);
+
+ /* Receiving DATAGRAM frame which is strictly larger than the
+ declared limit is an error */
+ setup_default_server(&conn);
+ conn->local.transport_params.max_datagram_frame_size = 1 + 1111 - 1;
+
+ fr.type = NGTCP2_FRAME_DATAGRAM;
+ fr.datagram.data = fr.datagram.rdata;
+ fr.datagram.data->base = null_data;
+ fr.datagram.data->len = 1111;
+ fr.datagram.datacnt = 1;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(NGTCP2_ERR_PROTO == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* Receiving DATAGRAM frame in a 0RTT packet */
+ setup_early_server(&conn);
+ conn->user_data = &ud;
+ conn->callbacks.recv_datagram = recv_datagram;
+ conn->local.transport_params.max_datagram_frame_size = 1 + 1111;
+
+ fr.type = NGTCP2_FRAME_CRYPTO;
+ fr.crypto.offset = 0;
+ fr.crypto.datacnt = 1;
+ fr.crypto.data[0].len = 1199;
+ fr.crypto.data[0].base = null_data;
+
+ pktlen = write_initial_pkt(
+ buf, sizeof(buf), &rcid, ngtcp2_conn_get_dcid(conn), ++pkt_num,
+ conn->client_chosen_version, NULL, 0, &fr, 1, &null_ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ fr.type = NGTCP2_FRAME_DATAGRAM;
+ fr.datagram.data = fr.datagram.rdata;
+ fr.datagram.data->base = null_data;
+ fr.datagram.data->len = 1111;
+ fr.datagram.datacnt = 1;
+
+ pktlen =
+ write_0rtt_pkt(buf, sizeof(buf), &rcid, ngtcp2_conn_get_dcid(conn),
+ ++pkt_num, conn->client_chosen_version, &fr, 1, &null_ckm);
+
+ memset(&ud, 0, sizeof(ud));
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(1111 == ud.datagram.datalen);
+ CU_ASSERT(NGTCP2_DATAGRAM_FLAG_EARLY & ud.datagram.flags);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_recv_new_connection_id(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[2048];
+ size_t pktlen;
+ ngtcp2_ssize spktlen;
+ ngtcp2_tstamp t = 0;
+ int64_t pkt_num = 0;
+ ngtcp2_frame fr;
+ ngtcp2_frame frs[16];
+ const uint8_t cid[] = {0xf0, 0xf1, 0xf2, 0xf3};
+ const uint8_t token[NGTCP2_STATELESS_RESET_TOKENLEN] = {0xff};
+ const uint8_t cid2[] = {0xf0, 0xf1, 0xf2, 0xf4};
+ const uint8_t token2[NGTCP2_STATELESS_RESET_TOKENLEN] = {0xfe};
+ const uint8_t cid3[] = {0xf0, 0xf1, 0xf2, 0xf5};
+ const uint8_t token3[NGTCP2_STATELESS_RESET_TOKENLEN] = {0xfd};
+ ngtcp2_dcid *dcid;
+ int rv;
+ ngtcp2_frame_chain *frc;
+ size_t i;
+
+ setup_default_client(&conn);
+
+ /* This will send NEW_CONNECTION_ID frames */
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ fr.type = NGTCP2_FRAME_NEW_CONNECTION_ID;
+ fr.new_connection_id.seq = 1;
+ fr.new_connection_id.retire_prior_to = 0;
+ ngtcp2_cid_init(&fr.new_connection_id.cid, cid, sizeof(cid));
+ memcpy(fr.new_connection_id.stateless_reset_token, token, sizeof(token));
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(1 == ngtcp2_ringbuf_len(&conn->dcid.unused.rb));
+
+ assert(ngtcp2_ringbuf_len(&conn->dcid.unused.rb));
+ dcid = ngtcp2_ringbuf_get(&conn->dcid.unused.rb, 0);
+
+ CU_ASSERT(ngtcp2_cid_eq(&fr.new_connection_id.cid, &dcid->cid));
+ CU_ASSERT(dcid->flags & NGTCP2_DCID_FLAG_TOKEN_PRESENT);
+ CU_ASSERT(0 == memcmp(fr.new_connection_id.stateless_reset_token, dcid->token,
+ sizeof(fr.new_connection_id.stateless_reset_token)));
+
+ fr.type = NGTCP2_FRAME_NEW_CONNECTION_ID;
+ fr.new_connection_id.seq = 2;
+ fr.new_connection_id.retire_prior_to = 2;
+ ngtcp2_cid_init(&fr.new_connection_id.cid, cid2, sizeof(cid2));
+ memcpy(fr.new_connection_id.stateless_reset_token, token2, sizeof(token2));
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(0 == ngtcp2_ringbuf_len(&conn->dcid.bound.rb));
+ CU_ASSERT(0 == ngtcp2_ringbuf_len(&conn->dcid.unused.rb));
+ CU_ASSERT(2 == conn->dcid.current.seq);
+ CU_ASSERT(NULL != conn->pktns.tx.frq);
+ CU_ASSERT(2 == conn->dcid.retire_prior_to);
+
+ frc = conn->pktns.tx.frq;
+
+ CU_ASSERT(NGTCP2_FRAME_RETIRE_CONNECTION_ID == frc->fr.type);
+
+ frc = frc->next;
+
+ CU_ASSERT(NGTCP2_FRAME_RETIRE_CONNECTION_ID == frc->fr.type);
+ CU_ASSERT(NULL == frc->next);
+
+ /* This will send RETIRE_CONNECTION_ID frames */
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ ngtcp2_conn_del(conn);
+
+ /* Received connection ID is immediately retired due to packet
+ reordering */
+ setup_default_client(&conn);
+
+ /* This will send NEW_CONNECTION_ID frames */
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ fr.type = NGTCP2_FRAME_NEW_CONNECTION_ID;
+ fr.new_connection_id.seq = 2;
+ fr.new_connection_id.retire_prior_to = 2;
+ ngtcp2_cid_init(&fr.new_connection_id.cid, cid, sizeof(cid));
+ memcpy(fr.new_connection_id.stateless_reset_token, token, sizeof(token));
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(0 == ngtcp2_ringbuf_len(&conn->dcid.unused.rb));
+ CU_ASSERT(2 == conn->dcid.current.seq);
+ CU_ASSERT(2 == conn->dcid.retire_prior_to);
+
+ frc = conn->pktns.tx.frq;
+
+ CU_ASSERT(NGTCP2_FRAME_RETIRE_CONNECTION_ID == frc->fr.type);
+ CU_ASSERT(NULL == frc->next);
+
+ /* This will send RETIRE_CONNECTION_ID frames */
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ fr.type = NGTCP2_FRAME_NEW_CONNECTION_ID;
+ fr.new_connection_id.seq = 1;
+ fr.new_connection_id.retire_prior_to = 0;
+ ngtcp2_cid_init(&fr.new_connection_id.cid, cid2, sizeof(cid2));
+ memcpy(fr.new_connection_id.stateless_reset_token, token2, sizeof(token2));
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(0 == ngtcp2_ringbuf_len(&conn->dcid.unused.rb));
+ CU_ASSERT(2 == conn->dcid.current.seq);
+ CU_ASSERT(2 == conn->dcid.retire_prior_to);
+
+ frc = conn->pktns.tx.frq;
+
+ CU_ASSERT(NGTCP2_FRAME_RETIRE_CONNECTION_ID == frc->fr.type);
+ CU_ASSERT(NULL == frc->next);
+
+ ngtcp2_conn_del(conn);
+
+ /* ngtcp2_pv contains DCIDs that should be retired. */
+ setup_default_server(&conn);
+
+ /* This will send NEW_CONNECTION_ID frames */
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ assert(NULL == conn->pv);
+
+ frs[0].type = NGTCP2_FRAME_PING;
+ frs[1].type = NGTCP2_FRAME_NEW_CONNECTION_ID;
+ frs[1].new_connection_id.seq = 1;
+ frs[1].new_connection_id.retire_prior_to = 0;
+ ngtcp2_cid_init(&frs[1].new_connection_id.cid, cid, sizeof(cid));
+ memcpy(frs[1].new_connection_id.stateless_reset_token, token, sizeof(token));
+ frs[2].type = NGTCP2_FRAME_NEW_CONNECTION_ID;
+ frs[2].new_connection_id.seq = 2;
+ frs[2].new_connection_id.retire_prior_to = 0;
+ ngtcp2_cid_init(&frs[2].new_connection_id.cid, cid2, sizeof(cid2));
+ memcpy(frs[2].new_connection_id.stateless_reset_token, token2,
+ sizeof(token2));
+ frs[3].type = NGTCP2_FRAME_NEW_CONNECTION_ID;
+ frs[3].new_connection_id.seq = 3;
+ frs[3].new_connection_id.retire_prior_to = 0;
+ ngtcp2_cid_init(&frs[3].new_connection_id.cid, cid3, sizeof(cid3));
+ memcpy(frs[3].new_connection_id.stateless_reset_token, token3,
+ sizeof(token3));
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, frs, 4,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &new_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ assert(NULL != conn->pv);
+
+ CU_ASSERT(conn->pv->flags & NGTCP2_PV_FLAG_FALLBACK_ON_FAILURE);
+ CU_ASSERT(1 == conn->pv->dcid.seq);
+ CU_ASSERT(0 == conn->pv->fallback_dcid.seq);
+ CU_ASSERT(2 == ngtcp2_ringbuf_len(&conn->dcid.unused.rb));
+
+ fr.type = NGTCP2_FRAME_NEW_CONNECTION_ID;
+ fr.new_connection_id.seq = 3;
+ fr.new_connection_id.retire_prior_to = 2;
+ ngtcp2_cid_init(&fr.new_connection_id.cid, cid3, sizeof(cid3));
+ memcpy(fr.new_connection_id.stateless_reset_token, token3, sizeof(token3));
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &new_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(0 == ngtcp2_ringbuf_len(&conn->dcid.unused.rb));
+ CU_ASSERT(conn->pv->flags & NGTCP2_PV_FLAG_FALLBACK_ON_FAILURE);
+ CU_ASSERT(2 == conn->pv->dcid.seq);
+ CU_ASSERT(3 == conn->pv->fallback_dcid.seq);
+
+ frc = conn->pktns.tx.frq;
+
+ CU_ASSERT(NGTCP2_FRAME_RETIRE_CONNECTION_ID == frc->fr.type);
+ CU_ASSERT(0 == frc->fr.retire_connection_id.seq);
+ frc = frc->next;
+
+ CU_ASSERT(NGTCP2_FRAME_RETIRE_CONNECTION_ID == frc->fr.type);
+ CU_ASSERT(1 == frc->fr.retire_connection_id.seq);
+ CU_ASSERT(NULL == frc->next);
+
+ ngtcp2_conn_del(conn);
+
+ /* ngtcp2_pv contains DCID in fallback that should be retired and
+ there is not enough connection ID left. */
+ setup_default_server(&conn);
+
+ /* This will send NEW_CONNECTION_ID frames */
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ assert(NULL == conn->pv);
+
+ frs[0].type = NGTCP2_FRAME_PING;
+ frs[1].type = NGTCP2_FRAME_NEW_CONNECTION_ID;
+ frs[1].new_connection_id.seq = 1;
+ frs[1].new_connection_id.retire_prior_to = 0;
+ ngtcp2_cid_init(&frs[1].new_connection_id.cid, cid, sizeof(cid));
+ memcpy(frs[1].new_connection_id.stateless_reset_token, token, sizeof(token));
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, frs, 2,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &new_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ assert(NULL != conn->pv);
+
+ CU_ASSERT(conn->pv->flags & NGTCP2_PV_FLAG_FALLBACK_ON_FAILURE);
+ CU_ASSERT(1 == conn->pv->dcid.seq);
+ CU_ASSERT(0 == conn->pv->fallback_dcid.seq);
+ CU_ASSERT(0 == ngtcp2_ringbuf_len(&conn->dcid.unused.rb));
+
+ fr.type = NGTCP2_FRAME_NEW_CONNECTION_ID;
+ fr.new_connection_id.seq = 2;
+ fr.new_connection_id.retire_prior_to = 2;
+ ngtcp2_cid_init(&fr.new_connection_id.cid, cid2, sizeof(cid2));
+ memcpy(fr.new_connection_id.stateless_reset_token, token2, sizeof(token2));
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &new_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(2 == conn->dcid.current.seq);
+ CU_ASSERT(0 == ngtcp2_ringbuf_len(&conn->dcid.unused.rb));
+ CU_ASSERT(NULL == conn->pv);
+
+ frc = conn->pktns.tx.frq;
+
+ CU_ASSERT(NGTCP2_FRAME_RETIRE_CONNECTION_ID == frc->fr.type);
+ CU_ASSERT(0 == frc->fr.retire_connection_id.seq);
+
+ frc = frc->next;
+
+ CU_ASSERT(NGTCP2_FRAME_RETIRE_CONNECTION_ID == frc->fr.type);
+ CU_ASSERT(1 == frc->fr.retire_connection_id.seq);
+ CU_ASSERT(NULL == frc->next);
+
+ ngtcp2_conn_del(conn);
+
+ /* ngtcp2_pv contains DCIDs that should be retired and there is not
+ enough connection ID left to continue path validation. */
+ setup_default_server(&conn);
+
+ /* This will send NEW_CONNECTION_ID frames */
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ assert(NULL == conn->pv);
+
+ frs[0].type = NGTCP2_FRAME_PING;
+ frs[1].type = NGTCP2_FRAME_NEW_CONNECTION_ID;
+ frs[1].new_connection_id.seq = 1;
+ frs[1].new_connection_id.retire_prior_to = 0;
+ ngtcp2_cid_init(&frs[1].new_connection_id.cid, cid, sizeof(cid));
+ memcpy(frs[1].new_connection_id.stateless_reset_token, token, sizeof(token));
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, frs, 2,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &new_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ assert(NULL != conn->pv);
+
+ CU_ASSERT(conn->pv->flags & NGTCP2_PV_FLAG_FALLBACK_ON_FAILURE);
+ CU_ASSERT(1 == conn->pv->dcid.seq);
+ CU_ASSERT(0 == conn->pv->fallback_dcid.seq);
+ CU_ASSERT(0 == ngtcp2_ringbuf_len(&conn->dcid.unused.rb));
+
+ /* Overwrite seq in pv->dcid so that pv->dcid cannot be renewed. */
+ conn->pv->dcid.seq = 2;
+ /* Internally we assume that if primary dcid and pv->dcid differ,
+ then no fallback dcid is present. */
+ conn->pv->flags &= (uint8_t)~NGTCP2_PV_FLAG_FALLBACK_ON_FAILURE;
+
+ fr.type = NGTCP2_FRAME_NEW_CONNECTION_ID;
+ fr.new_connection_id.seq = 3;
+ fr.new_connection_id.retire_prior_to = 3;
+ ngtcp2_cid_init(&fr.new_connection_id.cid, cid3, sizeof(cid3));
+ memcpy(fr.new_connection_id.stateless_reset_token, token3, sizeof(token3));
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &new_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(3 == conn->dcid.current.seq);
+ CU_ASSERT(0 == ngtcp2_ringbuf_len(&conn->dcid.unused.rb));
+ CU_ASSERT(NULL == conn->pv);
+
+ frc = conn->pktns.tx.frq;
+
+ CU_ASSERT(NGTCP2_FRAME_RETIRE_CONNECTION_ID == frc->fr.type);
+ CU_ASSERT(2 == frc->fr.retire_connection_id.seq);
+
+ frc = frc->next;
+
+ CU_ASSERT(NGTCP2_FRAME_RETIRE_CONNECTION_ID == frc->fr.type);
+ CU_ASSERT(1 == frc->fr.retire_connection_id.seq);
+ CU_ASSERT(NULL == frc->next);
+
+ ngtcp2_conn_del(conn);
+
+ /* Receiving more than advertised CID is treated as error */
+ setup_default_server(&conn);
+ conn->local.transport_params.active_connection_id_limit = 2;
+
+ /* This will send NEW_CONNECTION_ID frames */
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ assert(NULL == conn->pv);
+
+ frs[0].type = NGTCP2_FRAME_NEW_CONNECTION_ID;
+ frs[0].new_connection_id.seq = 1;
+ frs[0].new_connection_id.retire_prior_to = 0;
+ ngtcp2_cid_init(&frs[0].new_connection_id.cid, cid, sizeof(cid));
+ memcpy(frs[0].new_connection_id.stateless_reset_token, token, sizeof(token));
+ frs[1].type = NGTCP2_FRAME_NEW_CONNECTION_ID;
+ frs[1].new_connection_id.seq = 2;
+ frs[1].new_connection_id.retire_prior_to = 0;
+ ngtcp2_cid_init(&frs[1].new_connection_id.cid, cid2, sizeof(cid2));
+ memcpy(frs[1].new_connection_id.stateless_reset_token, token2,
+ sizeof(token2));
+ frs[2].type = NGTCP2_FRAME_NEW_CONNECTION_ID;
+ frs[2].new_connection_id.seq = 3;
+ frs[2].new_connection_id.retire_prior_to = 0;
+ ngtcp2_cid_init(&frs[2].new_connection_id.cid, cid3, sizeof(cid3));
+ memcpy(frs[2].new_connection_id.stateless_reset_token, token3,
+ sizeof(token3));
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, frs, 3,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &new_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(NGTCP2_ERR_CONNECTION_ID_LIMIT == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* Receiving duplicated NEW_CONNECTION_ID frame */
+ setup_default_server(&conn);
+
+ /* This will send NEW_CONNECTION_ID frames */
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ frs[0].type = NGTCP2_FRAME_PING;
+
+ frs[1].type = NGTCP2_FRAME_NEW_CONNECTION_ID;
+ frs[1].new_connection_id.seq = 1;
+ frs[1].new_connection_id.retire_prior_to = 1;
+ ngtcp2_cid_init(&frs[1].new_connection_id.cid, cid, sizeof(cid));
+ memcpy(frs[1].new_connection_id.stateless_reset_token, token, sizeof(token));
+
+ frs[2].type = NGTCP2_FRAME_NEW_CONNECTION_ID;
+ frs[2].new_connection_id.seq = 2;
+ frs[2].new_connection_id.retire_prior_to = 1;
+ ngtcp2_cid_init(&frs[2].new_connection_id.cid, cid2, sizeof(cid2));
+ memcpy(frs[2].new_connection_id.stateless_reset_token, token2,
+ sizeof(token2));
+
+ frs[3].type = NGTCP2_FRAME_PADDING;
+ frs[3].padding.len = 1200;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, frs, 4,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &new_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(0 == ngtcp2_ringbuf_len(&conn->dcid.unused.rb));
+ CU_ASSERT(2 == conn->dcid.current.seq);
+ CU_ASSERT(NULL != conn->pv);
+ CU_ASSERT(ngtcp2_cid_eq(&frs[1].new_connection_id.cid,
+ &conn->pv->fallback_dcid.cid));
+
+ /* This will send PATH_CHALLENGE frame */
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen >= 1200);
+
+ fr.type = NGTCP2_FRAME_PATH_RESPONSE;
+ memset(fr.path_response.data, 0, sizeof(fr.path_response.data));
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &new_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ /* Server starts probing old path */
+ CU_ASSERT(NULL != conn->pv);
+ CU_ASSERT(ngtcp2_path_eq(&null_path.path, &conn->pv->dcid.ps.path));
+
+ /* Receive NEW_CONNECTION_ID seq=1 again, which should be ignored. */
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, frs, 2,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &new_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(0 == ngtcp2_ringbuf_len(&conn->dcid.unused.rb));
+ CU_ASSERT(2 == conn->dcid.current.seq);
+
+ ngtcp2_conn_del(conn);
+
+ /* Exceeding the limit for the number of unacknowledged
+ RETIRE_CONNECTION_ID leads to NGTCP2_ERR_CONNECTION_ID_LIMIT. */
+ setup_default_server(&conn);
+
+ /* This will send NEW_CONNECTION_ID frames */
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ for (i = 0; i < 7; ++i) {
+ frs[i].type = NGTCP2_FRAME_NEW_CONNECTION_ID;
+ frs[i].new_connection_id.seq = i + 1;
+ frs[i].new_connection_id.retire_prior_to = 0;
+ ngtcp2_cid_init(&frs[i].new_connection_id.cid, cid, sizeof(cid));
+ frs[i].new_connection_id.cid.data[0] = (uint8_t)i;
+ memcpy(frs[i].new_connection_id.stateless_reset_token, token,
+ sizeof(token));
+ }
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, frs, 7,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ for (i = 0; i < 8; ++i) {
+ frs[i].type = NGTCP2_FRAME_NEW_CONNECTION_ID;
+ frs[i].new_connection_id.seq = i + 8;
+ frs[i].new_connection_id.retire_prior_to = 8;
+ ngtcp2_cid_init(&frs[i].new_connection_id.cid, cid, sizeof(cid));
+ frs[i].new_connection_id.cid.data[0] = (uint8_t)(i + 8);
+ memcpy(frs[i].new_connection_id.stateless_reset_token, token,
+ sizeof(token));
+ }
+
+ for (i = 0; i < 8; ++i) {
+ frs[i + 8].type = NGTCP2_FRAME_NEW_CONNECTION_ID;
+ frs[i + 8].new_connection_id.seq = i + 16;
+ frs[i + 8].new_connection_id.retire_prior_to = 16;
+ ngtcp2_cid_init(&frs[i + 8].new_connection_id.cid, cid, sizeof(cid));
+ frs[i + 8].new_connection_id.cid.data[0] = (uint8_t)(i + 16);
+ memcpy(frs[i + 8].new_connection_id.stateless_reset_token, token,
+ sizeof(token));
+ }
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, frs, 16,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ frs[0].type = NGTCP2_FRAME_NEW_CONNECTION_ID;
+ frs[0].new_connection_id.seq = 24;
+ frs[0].new_connection_id.retire_prior_to = 17;
+ ngtcp2_cid_init(&frs[0].new_connection_id.cid, cid, sizeof(cid));
+ frs[0].new_connection_id.cid.data[0] = (uint8_t)(i + 24);
+ memcpy(frs[0].new_connection_id.stateless_reset_token, token, sizeof(token));
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, frs, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(NGTCP2_ERR_CONNECTION_ID_LIMIT == rv);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_recv_retire_connection_id(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[2048];
+ size_t pktlen;
+ ngtcp2_ssize spktlen;
+ ngtcp2_tstamp t = 1000000009;
+ int64_t pkt_num = 0;
+ ngtcp2_frame fr;
+ int rv;
+ ngtcp2_ksl_it it;
+ ngtcp2_scid *scid;
+ uint64_t seq;
+
+ setup_default_client(&conn);
+ conn->remote.transport_params->active_connection_id_limit = 7;
+
+ /* This will send NEW_CONNECTION_ID frames */
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), t);
+
+ CU_ASSERT(spktlen > 0);
+
+ it = ngtcp2_ksl_begin(&conn->scid.set);
+ scid = ngtcp2_ksl_it_get(&it);
+ seq = scid->seq;
+
+ CU_ASSERT(NGTCP2_SCID_FLAG_NONE == scid->flags);
+ CU_ASSERT(UINT64_MAX == scid->retired_ts);
+ CU_ASSERT(1 == ngtcp2_pq_size(&conn->scid.used));
+
+ fr.type = NGTCP2_FRAME_RETIRE_CONNECTION_ID;
+ fr.retire_connection_id.seq = seq;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NGTCP2_SCID_FLAG_RETIRED == scid->flags);
+ CU_ASSERT(1000000010 == scid->retired_ts);
+ CU_ASSERT(2 == ngtcp2_pq_size(&conn->scid.used));
+ CU_ASSERT(7 == ngtcp2_ksl_len(&conn->scid.set));
+ CU_ASSERT(1 == conn->scid.num_retired);
+
+ /* One NEW_CONNECTION_ID frame is sent as a replacement. */
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(8 == ngtcp2_ksl_len(&conn->scid.set));
+ CU_ASSERT(1 == conn->scid.num_retired);
+
+ /* No NEW_CONNECTION_ID frames should be sent. */
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen == 0);
+ CU_ASSERT(8 == ngtcp2_ksl_len(&conn->scid.set));
+ CU_ASSERT(1 == conn->scid.num_retired);
+
+ /* Now time passed and retired connection ID is removed */
+ t += 7 * NGTCP2_DEFAULT_INITIAL_RTT;
+
+ ngtcp2_conn_handle_expiry(conn, t);
+
+ CU_ASSERT(7 == ngtcp2_ksl_len(&conn->scid.set));
+ CU_ASSERT(0 == conn->scid.num_retired);
+
+ ngtcp2_conn_del(conn);
+
+ /* Receiving RETIRE_CONNECTION_ID with seq which is greater than the
+ sequence number previously sent must be treated as error */
+ setup_default_server(&conn);
+
+ fr.type = NGTCP2_FRAME_RETIRE_CONNECTION_ID;
+ fr.retire_connection_id.seq = 1;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(NGTCP2_ERR_PROTO == rv);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_server_path_validation(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[2048];
+ size_t pktlen;
+ ngtcp2_ssize spktlen;
+ ngtcp2_tstamp t = 900;
+ int64_t pkt_num = 0;
+ ngtcp2_frame fr;
+ int rv;
+ const uint8_t raw_cid[] = {0x0f, 0x00, 0x00, 0x00};
+ ngtcp2_cid cid, *new_cid;
+ const uint8_t token[NGTCP2_STATELESS_RESET_TOKENLEN] = {0xff};
+ ngtcp2_path_storage new_path1, new_path2;
+ ngtcp2_ksl_it it;
+
+ path_init(&new_path1, 0, 0, 2, 0);
+ path_init(&new_path2, 0, 0, 3, 0);
+
+ ngtcp2_cid_init(&cid, raw_cid, sizeof(raw_cid));
+
+ setup_default_server(&conn);
+
+ /* This will send NEW_CONNECTION_ID frames */
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(ngtcp2_ksl_len(&conn->scid.set) > 1);
+
+ fr.type = NGTCP2_FRAME_NEW_CONNECTION_ID;
+ fr.new_connection_id.seq = 1;
+ fr.new_connection_id.retire_prior_to = 0;
+ fr.new_connection_id.cid = cid;
+ memcpy(fr.new_connection_id.stateless_reset_token, token, sizeof(token));
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ fr.type = NGTCP2_FRAME_PING;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &new_path1.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NULL != conn->pv);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(ngtcp2_ringbuf_len(&conn->pv->ents.rb) > 0);
+
+ fr.type = NGTCP2_FRAME_PATH_RESPONSE;
+ memset(fr.path_response.data, 0, sizeof(fr.path_response.data));
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &new_path1.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(ngtcp2_path_eq(&new_path1.path, &conn->dcid.current.ps.path));
+ /* DCID does not change because the client does not change its
+ DCID. */
+ CU_ASSERT(!ngtcp2_cid_eq(&cid, &conn->dcid.current.cid));
+
+ /* A remote endpoint changes DCID as well */
+ fr.type = NGTCP2_FRAME_PING;
+
+ it = ngtcp2_ksl_begin(&conn->scid.set);
+
+ assert(!ngtcp2_ksl_it_end(&it));
+
+ new_cid = &(((ngtcp2_scid *)ngtcp2_ksl_it_get(&it))->cid);
+
+ pktlen = write_pkt(buf, sizeof(buf), new_cid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &new_path2.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NULL != conn->pv);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(ngtcp2_ringbuf_len(&conn->pv->ents.rb) > 0);
+
+ fr.type = NGTCP2_FRAME_PATH_RESPONSE;
+ memset(fr.path_response.data, 0, sizeof(fr.path_response.data));
+
+ pktlen = write_pkt(buf, sizeof(buf), new_cid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &new_path2.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(ngtcp2_path_eq(&new_path2.path, &conn->dcid.current.ps.path));
+ CU_ASSERT(ngtcp2_cid_eq(&cid, &conn->dcid.current.cid));
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_client_connection_migration(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[2048];
+ size_t pktlen;
+ ngtcp2_tstamp t = 900;
+ int64_t pkt_num = 0;
+ ngtcp2_frame fr;
+ int rv;
+ const uint8_t raw_cid[] = {0x0f, 0x00, 0x00, 0x00};
+ ngtcp2_cid cid;
+ const uint8_t token[NGTCP2_STATELESS_RESET_TOKENLEN] = {0xff};
+ my_user_data ud;
+ ngtcp2_ssize spktlen;
+ ngtcp2_path_storage to_path;
+
+ ngtcp2_cid_init(&cid, raw_cid, sizeof(raw_cid));
+
+ /* immediate migration */
+ setup_default_client(&conn);
+
+ fr.type = NGTCP2_FRAME_NEW_CONNECTION_ID;
+ fr.new_connection_id.seq = 1;
+ fr.new_connection_id.retire_prior_to = 0;
+ fr.new_connection_id.cid = cid;
+ memcpy(fr.new_connection_id.stateless_reset_token, token, sizeof(token));
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ ngtcp2_path_storage_init2(&to_path, &new_path.path);
+ to_path.path.user_data = &ud;
+
+ rv = ngtcp2_conn_initiate_immediate_migration(conn, &to_path.path, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NULL != conn->pv);
+ CU_ASSERT(ngtcp2_path_eq(&to_path.path, &conn->dcid.current.ps.path));
+ CU_ASSERT(&ud == conn->dcid.current.ps.path.user_data);
+ CU_ASSERT(ngtcp2_cid_eq(&cid, &conn->dcid.current.cid));
+ CU_ASSERT(ngtcp2_path_eq(&to_path.path, &conn->pv->dcid.ps.path));
+ CU_ASSERT(&ud == conn->pv->dcid.ps.path.user_data);
+ CU_ASSERT(ngtcp2_cid_eq(&cid, &conn->pv->dcid.cid));
+
+ ngtcp2_conn_del(conn);
+
+ /* migrate after successful path validation */
+ setup_default_client(&conn);
+
+ fr.type = NGTCP2_FRAME_NEW_CONNECTION_ID;
+ fr.new_connection_id.seq = 1;
+ fr.new_connection_id.retire_prior_to = 0;
+ fr.new_connection_id.cid = cid;
+ memcpy(fr.new_connection_id.stateless_reset_token, token, sizeof(token));
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ ngtcp2_path_storage_init2(&to_path, &new_path.path);
+ to_path.path.user_data = &ud;
+
+ rv = ngtcp2_conn_initiate_migration(conn, &to_path.path, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NULL != conn->pv);
+ CU_ASSERT(ngtcp2_path_eq(&null_path.path, &conn->dcid.current.ps.path));
+ CU_ASSERT(NULL == conn->dcid.current.ps.path.user_data);
+ CU_ASSERT(ngtcp2_cid_eq(&conn->rcid, &conn->dcid.current.cid));
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(0 < spktlen);
+
+ fr.type = NGTCP2_FRAME_PATH_RESPONSE;
+ memset(fr.path_response.data, 0, sizeof(fr.path_response.data));
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NULL == conn->pv);
+ CU_ASSERT(ngtcp2_path_eq(&to_path.path, &conn->dcid.current.ps.path));
+ CU_ASSERT(&ud == conn->dcid.current.ps.path.user_data);
+ CU_ASSERT(ngtcp2_cid_eq(&cid, &conn->dcid.current.cid));
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_recv_path_challenge(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[2048];
+ size_t pktlen;
+ ngtcp2_ssize spktlen;
+ ngtcp2_tstamp t = 11;
+ int64_t pkt_num = 0;
+ ngtcp2_frame fr;
+ ngtcp2_frame frs[2];
+ int rv;
+ const uint8_t raw_cid[] = {0x0f, 0x00, 0x00, 0x00};
+ ngtcp2_cid cid;
+ const uint8_t token[NGTCP2_STATELESS_RESET_TOKENLEN] = {0xff};
+ const uint8_t data[] = {0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, 0xf8};
+ const uint8_t data2[] = {0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, 0xf9};
+ ngtcp2_path_storage ps;
+ ngtcp2_ssize shdlen;
+ ngtcp2_pkt_hd hd;
+ ngtcp2_dcid *dcid;
+ ngtcp2_settings settings;
+ ngtcp2_transport_params params;
+
+ ngtcp2_cid_init(&cid, raw_cid, sizeof(raw_cid));
+
+ setup_default_server(&conn);
+
+ fr.type = NGTCP2_FRAME_NEW_CONNECTION_ID;
+ fr.new_connection_id.seq = 1;
+ fr.new_connection_id.retire_prior_to = 0;
+ fr.new_connection_id.cid = cid;
+ memcpy(fr.new_connection_id.stateless_reset_token, token, sizeof(token));
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ frs[0].type = NGTCP2_FRAME_PATH_CHALLENGE;
+ memcpy(frs[0].path_challenge.data, data, sizeof(frs[0].path_challenge.data));
+ frs[1].type = NGTCP2_FRAME_PADDING;
+ frs[1].padding.len = 1200;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, frs, 2,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &new_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(ngtcp2_ringbuf_len(&conn->rx.path_challenge.rb) > 0);
+
+ ngtcp2_path_storage_zero(&ps);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, &ps.path, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen >= 1200);
+ CU_ASSERT(ngtcp2_path_eq(&new_path.path, &ps.path));
+ CU_ASSERT(0 == ngtcp2_ringbuf_len(&conn->rx.path_challenge.rb));
+ CU_ASSERT(1 == ngtcp2_ringbuf_len(&conn->dcid.bound.rb));
+
+ dcid = ngtcp2_ringbuf_get(&conn->dcid.bound.rb, 0);
+
+ CU_ASSERT((uint64_t)spktlen == dcid->bytes_sent);
+
+ shdlen = ngtcp2_pkt_decode_hd_short(&hd, buf, (size_t)spktlen, cid.datalen);
+
+ CU_ASSERT(shdlen > 0);
+ CU_ASSERT(ngtcp2_cid_eq(&cid, &hd.dcid));
+
+ /* Use same bound DCID for PATH_CHALLENGE from the same path. */
+ fr.type = NGTCP2_FRAME_PATH_CHALLENGE;
+ memcpy(fr.path_challenge.data, data2, sizeof(fr.path_challenge.data));
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &new_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(ngtcp2_ringbuf_len(&conn->rx.path_challenge.rb) > 0);
+
+ ngtcp2_path_storage_zero(&ps);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, &ps.path, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(ngtcp2_path_eq(&new_path.path, &ps.path));
+ CU_ASSERT(0 == ngtcp2_ringbuf_len(&conn->rx.path_challenge.rb));
+ CU_ASSERT(1 == ngtcp2_ringbuf_len(&conn->dcid.bound.rb));
+
+ shdlen = ngtcp2_pkt_decode_hd_short(&hd, buf, (size_t)spktlen, cid.datalen);
+
+ CU_ASSERT(shdlen > 0);
+ CU_ASSERT(ngtcp2_cid_eq(&cid, &hd.dcid));
+
+ ngtcp2_conn_del(conn);
+
+ /* PATH_CHALLENGE from the current path */
+ setup_default_server(&conn);
+
+ fr.type = NGTCP2_FRAME_NEW_CONNECTION_ID;
+ fr.new_connection_id.seq = 1;
+ fr.new_connection_id.retire_prior_to = 0;
+ fr.new_connection_id.cid = cid;
+ memcpy(fr.new_connection_id.stateless_reset_token, token, sizeof(token));
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ frs[0].type = NGTCP2_FRAME_PATH_CHALLENGE;
+ memcpy(frs[0].path_challenge.data, data, sizeof(frs[0].path_challenge.data));
+ frs[1].type = NGTCP2_FRAME_PADDING;
+ frs[1].padding.len = 1200;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, frs, 2,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(ngtcp2_ringbuf_len(&conn->rx.path_challenge.rb) > 0);
+
+ ngtcp2_path_storage_zero(&ps);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, &ps.path, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen >= 1200);
+ CU_ASSERT(ngtcp2_path_eq(&null_path.path, &ps.path));
+ CU_ASSERT(0 == ngtcp2_ringbuf_len(&conn->rx.path_challenge.rb));
+ CU_ASSERT(0 == ngtcp2_ringbuf_len(&conn->dcid.bound.rb));
+ CU_ASSERT((uint64_t)spktlen == conn->dcid.current.bytes_sent);
+
+ ngtcp2_conn_del(conn);
+
+ /* PATH_CHALLENGE should be ignored with server
+ disable_active_migration */
+ setup_default_server(&conn);
+
+ conn->local.transport_params.disable_active_migration = 1;
+
+ fr.type = NGTCP2_FRAME_NEW_CONNECTION_ID;
+ fr.new_connection_id.seq = 1;
+ fr.new_connection_id.retire_prior_to = 0;
+ fr.new_connection_id.cid = cid;
+ memcpy(fr.new_connection_id.stateless_reset_token, token, sizeof(token));
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ frs[0].type = NGTCP2_FRAME_PATH_CHALLENGE;
+ memcpy(frs[0].path_challenge.data, data, sizeof(frs[0].path_challenge.data));
+ frs[1].type = NGTCP2_FRAME_PADDING;
+ frs[1].padding.len = 1200;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, frs, 2,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &new_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(0 == ngtcp2_ringbuf_len(&conn->rx.path_challenge.rb));
+
+ ngtcp2_conn_del(conn);
+
+ /* PATH_CHALLENGE on NAT rebinding (passive migration) should be
+ accepted with server disable_active_migration */
+ setup_default_server(&conn);
+
+ conn->local.transport_params.disable_active_migration = 1;
+
+ fr.type = NGTCP2_FRAME_NEW_CONNECTION_ID;
+ fr.new_connection_id.seq = 1;
+ fr.new_connection_id.retire_prior_to = 0;
+ fr.new_connection_id.cid = cid;
+ memcpy(fr.new_connection_id.stateless_reset_token, token, sizeof(token));
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ frs[0].type = NGTCP2_FRAME_PATH_CHALLENGE;
+ memcpy(frs[0].path_challenge.data, data, sizeof(frs[0].path_challenge.data));
+ frs[1].type = NGTCP2_FRAME_PADDING;
+ frs[1].padding.len = 1200;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, frs, 2,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &new_nat_path.path, &null_pi, buf, pktlen,
+ ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(ngtcp2_ringbuf_len(&conn->rx.path_challenge.rb) > 0);
+
+ ngtcp2_conn_del(conn);
+
+ /* PATH_CHALLENGE to preferred address should be accepted with
+ server disable_active_migration */
+ server_default_transport_params(&params);
+ params.disable_active_migration = 1;
+ params.preferred_address_present = 1;
+ params.preferred_address.cid = cid;
+
+ /* Set local address of new_path */
+ assert(AF_INET == new_path.path.local.addr->sa_family);
+
+ params.preferred_address.ipv4_present = 1;
+ memcpy(&params.preferred_address.ipv4, new_path.path.local.addr,
+ sizeof(params.preferred_address.ipv4));
+
+ server_default_settings(&settings);
+
+ setup_default_server_settings(&conn, &null_path.path, &settings, &params);
+
+ fr.type = NGTCP2_FRAME_NEW_CONNECTION_ID;
+ fr.new_connection_id.seq = 1;
+ fr.new_connection_id.retire_prior_to = 0;
+ fr.new_connection_id.cid = cid;
+ memcpy(fr.new_connection_id.stateless_reset_token, token, sizeof(token));
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ frs[0].type = NGTCP2_FRAME_PATH_CHALLENGE;
+ memcpy(frs[0].path_challenge.data, data, sizeof(frs[0].path_challenge.data));
+ frs[1].type = NGTCP2_FRAME_PADDING;
+ frs[1].padding.len = 1200;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, frs, 2,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &new_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(ngtcp2_ringbuf_len(&conn->rx.path_challenge.rb) > 0);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_key_update(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[2048];
+ size_t pktlen;
+ ngtcp2_ssize spktlen;
+ ngtcp2_tstamp t = 19393;
+ int64_t pkt_num = -1;
+ ngtcp2_frame fr;
+ int rv;
+ int64_t stream_id;
+ ngtcp2_ssize nwrite;
+
+ setup_default_server(&conn);
+
+ /* The remote endpoint initiates key update */
+ fr.type = NGTCP2_FRAME_PING;
+
+ pktlen =
+ write_pkt_flags(buf, sizeof(buf), NGTCP2_PKT_FLAG_KEY_PHASE, &conn->oscid,
+ ++pkt_num, &fr, 1, conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NULL != conn->crypto.key_update.old_rx_ckm);
+ CU_ASSERT(NULL == conn->crypto.key_update.new_tx_ckm);
+ CU_ASSERT(NULL == conn->crypto.key_update.new_rx_ckm);
+ CU_ASSERT(UINT64_MAX == conn->crypto.key_update.confirmed_ts);
+ CU_ASSERT(conn->flags & NGTCP2_CONN_FLAG_KEY_UPDATE_NOT_CONFIRMED);
+ CU_ASSERT(!(conn->flags & NGTCP2_CONN_FLAG_KEY_UPDATE_INITIATOR));
+
+ t += NGTCP2_SECONDS;
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), t);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(t == conn->crypto.key_update.confirmed_ts);
+ CU_ASSERT(!(conn->flags & NGTCP2_CONN_FLAG_KEY_UPDATE_NOT_CONFIRMED));
+ CU_ASSERT(!(conn->flags & NGTCP2_CONN_FLAG_KEY_UPDATE_INITIATOR));
+
+ t += ngtcp2_conn_get_pto(conn) + 1;
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), t);
+
+ CU_ASSERT(0 == spktlen);
+ CU_ASSERT(NULL == conn->crypto.key_update.old_rx_ckm);
+ CU_ASSERT(NULL != conn->crypto.key_update.new_tx_ckm);
+ CU_ASSERT(NULL != conn->crypto.key_update.new_rx_ckm);
+
+ /* The local endpoint initiates key update */
+ t += ngtcp2_conn_get_pto(conn) * 2;
+
+ rv = ngtcp2_conn_initiate_key_update(conn, t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NULL != conn->crypto.key_update.old_rx_ckm);
+ CU_ASSERT(NULL == conn->crypto.key_update.new_tx_ckm);
+ CU_ASSERT(NULL == conn->crypto.key_update.new_rx_ckm);
+ CU_ASSERT(conn->flags & NGTCP2_CONN_FLAG_KEY_UPDATE_NOT_CONFIRMED);
+ CU_ASSERT(conn->flags & NGTCP2_CONN_FLAG_KEY_UPDATE_INITIATOR);
+
+ rv = ngtcp2_conn_open_uni_stream(conn, &stream_id, NULL);
+
+ CU_ASSERT(0 == rv);
+
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf),
+ &nwrite, NGTCP2_WRITE_STREAM_FLAG_NONE,
+ stream_id, null_data, 1024, ++t);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(conn->flags & NGTCP2_CONN_FLAG_KEY_UPDATE_NOT_CONFIRMED);
+
+ fr.type = NGTCP2_FRAME_ACK;
+ fr.ack.largest_ack = conn->pktns.tx.last_pkt_num;
+ fr.ack.ack_delay = 0;
+ fr.ack.first_ack_range = 0;
+ fr.ack.rangecnt = 0;
+
+ pktlen =
+ write_pkt_flags(buf, sizeof(buf), NGTCP2_PKT_FLAG_KEY_PHASE, &conn->oscid,
+ ++pkt_num, &fr, 1, conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(t == conn->crypto.key_update.confirmed_ts);
+ CU_ASSERT(!(conn->flags & NGTCP2_CONN_FLAG_KEY_UPDATE_NOT_CONFIRMED));
+ CU_ASSERT(!(conn->flags & NGTCP2_CONN_FLAG_KEY_UPDATE_INITIATOR));
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_crypto_buffer_exceeded(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[2048];
+ size_t pktlen;
+ ngtcp2_tstamp t = 11111;
+ int64_t pkt_num = -1;
+ ngtcp2_frame fr;
+ int rv;
+
+ setup_default_client(&conn);
+
+ fr.type = NGTCP2_FRAME_CRYPTO;
+ fr.crypto.offset = 1000000;
+ fr.crypto.datacnt = 1;
+ fr.crypto.data[0].base = null_data;
+ fr.crypto.data[0].len = 1;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(NGTCP2_ERR_CRYPTO_BUFFER_EXCEEDED == rv);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_handshake_probe(void) {
+ ngtcp2_conn *conn;
+ ngtcp2_tstamp t = 0;
+ ngtcp2_ssize spktlen;
+ size_t pktlen;
+ uint8_t buf[1200];
+ ngtcp2_frame fr;
+ ngtcp2_rtb_entry *ent;
+ ngtcp2_ksl_it it;
+ int rv;
+ ngtcp2_crypto_aead_ctx aead_ctx = {0};
+ ngtcp2_crypto_cipher_ctx hp_ctx = {0};
+ ngtcp2_crypto_ctx crypto_ctx;
+
+ /* Retransmit first Initial on PTO timer */
+ setup_handshake_client(&conn);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(1 == conn->in_pktns->rtb.num_ack_eliciting);
+
+ rv = ngtcp2_conn_on_loss_detection_timer(conn, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(1 == conn->in_pktns->rtb.probe_pkt_left);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(1 == conn->in_pktns->rtb.num_retransmittable);
+ CU_ASSERT(2 == conn->in_pktns->rtb.num_ack_eliciting);
+ CU_ASSERT(0 == conn->in_pktns->rtb.probe_pkt_left);
+
+ fr.type = NGTCP2_FRAME_ACK;
+ fr.ack.largest_ack = 0;
+ fr.ack.ack_delay = 0;
+ fr.ack.first_ack_range = 0;
+ fr.ack.rangecnt = 0;
+
+ pktlen = write_initial_pkt(buf, sizeof(buf), &conn->oscid,
+ ngtcp2_conn_get_dcid(conn), 0, NGTCP2_PROTO_VER_V1,
+ NULL, 0, &fr, 1, &null_ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(1 == conn->in_pktns->rtb.num_ack_eliciting);
+
+ rv = ngtcp2_conn_on_loss_detection_timer(conn, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(1 == conn->in_pktns->rtb.num_retransmittable);
+ CU_ASSERT(1 == conn->in_pktns->rtb.num_ack_eliciting);
+ CU_ASSERT(1 == conn->in_pktns->rtb.probe_pkt_left);
+
+ /* This sends anti-deadlock padded Initial packet even if we have
+ nothing to send. */
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(0 == conn->in_pktns->rtb.num_retransmittable);
+ CU_ASSERT(2 == conn->in_pktns->rtb.num_ack_eliciting);
+ CU_ASSERT(0 == conn->in_pktns->rtb.probe_pkt_left);
+
+ it = ngtcp2_rtb_head(&conn->in_pktns->rtb);
+ ent = ngtcp2_ksl_it_get(&it);
+
+ CU_ASSERT(ent->flags & NGTCP2_RTB_ENTRY_FLAG_PROBE);
+ CU_ASSERT(sizeof(buf) == ent->pktlen);
+
+ init_crypto_ctx(&crypto_ctx);
+ ngtcp2_conn_set_crypto_ctx(conn, &crypto_ctx);
+ conn->negotiated_version = conn->client_chosen_version;
+ ngtcp2_conn_install_rx_handshake_key(conn, &aead_ctx, null_iv,
+ sizeof(null_iv), &hp_ctx);
+ ngtcp2_conn_install_tx_handshake_key(conn, &aead_ctx, null_iv,
+ sizeof(null_iv), &hp_ctx);
+
+ rv = ngtcp2_conn_on_loss_detection_timer(conn, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(2 == conn->in_pktns->rtb.num_ack_eliciting);
+ CU_ASSERT(1 == conn->hs_pktns->rtb.probe_pkt_left);
+
+ /* This sends anti-deadlock Handshake packet even if we have nothing
+ to send. */
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(0 == conn->hs_pktns->rtb.num_retransmittable);
+ CU_ASSERT(1 == conn->hs_pktns->rtb.num_ack_eliciting);
+ CU_ASSERT(0 == conn->hs_pktns->rtb.probe_pkt_left);
+
+ it = ngtcp2_rtb_head(&conn->hs_pktns->rtb);
+ ent = ngtcp2_ksl_it_get(&it);
+
+ CU_ASSERT(ent->flags & NGTCP2_RTB_ENTRY_FLAG_PROBE);
+ CU_ASSERT(sizeof(buf) > ent->pktlen);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_handshake_loss(void) {
+ ngtcp2_conn *conn;
+ ngtcp2_tstamp t = 0;
+ ngtcp2_ssize spktlen;
+ size_t i;
+ size_t pktlen;
+ uint8_t buf[1252];
+ ngtcp2_frame fr;
+ ngtcp2_frame frs[2];
+ ngtcp2_cid rcid;
+ int rv;
+ int64_t pkt_num = -1;
+ ngtcp2_ksl_it it;
+ ngtcp2_rtb_entry *ent;
+
+ rcid_init(&rcid);
+ setup_handshake_server(&conn);
+ conn->callbacks.recv_crypto_data = recv_crypto_data;
+
+ frs[0].type = NGTCP2_FRAME_CRYPTO;
+ frs[0].crypto.offset = 0;
+ frs[0].crypto.datacnt = 1;
+ frs[0].crypto.data[0].len = 123;
+ frs[0].crypto.data[0].base = null_data;
+
+ frs[1].type = NGTCP2_FRAME_PADDING;
+ frs[1].padding.len = 1005;
+
+ pktlen = write_initial_pkt(
+ buf, sizeof(buf), &rcid, ngtcp2_conn_get_dcid(conn), ++pkt_num,
+ conn->client_chosen_version, NULL, 0, frs, 2, &null_ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ /* Increase anti-amplification factor for easier testing */
+ conn->dcid.current.bytes_recv += 10000;
+
+ ngtcp2_conn_submit_crypto_data(conn, NGTCP2_CRYPTO_LEVEL_INITIAL, null_data,
+ 123);
+ ngtcp2_conn_submit_crypto_data(conn, NGTCP2_CRYPTO_LEVEL_HANDSHAKE, null_data,
+ 163);
+ ngtcp2_conn_submit_crypto_data(conn, NGTCP2_CRYPTO_LEVEL_HANDSHAKE, null_data,
+ 2369);
+ ngtcp2_conn_submit_crypto_data(conn, NGTCP2_CRYPTO_LEVEL_HANDSHAKE, null_data,
+ 79);
+ ngtcp2_conn_submit_crypto_data(conn, NGTCP2_CRYPTO_LEVEL_HANDSHAKE, null_data,
+ 36);
+
+ /* Initial and first Handshake are coalesced into 1 packet. */
+ for (i = 0; i < 3; ++i) {
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+ CU_ASSERT(spktlen > 0);
+ }
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(0 == spktlen);
+
+ t += 30 * NGTCP2_MILLISECONDS;
+
+ ngtcp2_conn_on_loss_detection_timer(conn, t);
+
+ CU_ASSERT(1 == conn->in_pktns->rtb.probe_pkt_left);
+ CU_ASSERT(1 == conn->hs_pktns->rtb.probe_pkt_left);
+
+ /* Send a PTO probe packet */
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(0 == spktlen);
+
+ it = ngtcp2_ksl_begin(&conn->hs_pktns->rtb.ents);
+ ent = ngtcp2_ksl_it_get(&it);
+
+ CU_ASSERT(0 == ent->frc->fr.crypto.offset);
+ CU_ASSERT(987 == ngtcp2_vec_len(ent->frc->fr.crypto.data,
+ ent->frc->fr.crypto.datacnt));
+ CU_ASSERT(3 == ent->hd.pkt_num);
+
+ fr.type = NGTCP2_FRAME_ACK;
+ fr.ack.largest_ack = 2;
+ fr.ack.ack_delay = 0;
+ fr.ack.ack_delay_unscaled = 0;
+ fr.ack.first_ack_range = 0;
+ fr.ack.rangecnt = 0;
+
+ pktlen = write_handshake_pkt(buf, sizeof(buf), &conn->oscid,
+ ngtcp2_conn_get_dcid(conn), ++pkt_num,
+ conn->client_chosen_version, &fr, 1, &null_ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, t);
+
+ CU_ASSERT(0 == rv);
+
+ t += 40 * NGTCP2_MILLISECONDS;
+
+ ngtcp2_conn_on_loss_detection_timer(conn, t);
+
+ CU_ASSERT(0 == conn->hs_pktns->rtb.probe_pkt_left);
+
+ /* Retransmits the contents of lost packet */
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ it = ngtcp2_ksl_begin(&conn->hs_pktns->rtb.ents);
+ ent = ngtcp2_ksl_it_get(&it);
+
+ CU_ASSERT(NGTCP2_FRAME_CRYPTO == ent->frc->fr.type);
+ CU_ASSERT(987 == ent->frc->fr.crypto.offset);
+ CU_ASSERT(1 == ent->frc->fr.crypto.datacnt);
+ CU_ASSERT(1183 == ngtcp2_vec_len(ent->frc->fr.crypto.data,
+ ent->frc->fr.crypto.datacnt));
+ CU_ASSERT(4 == ent->hd.pkt_num);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(0 == spktlen);
+
+ t += 30 * NGTCP2_MILLISECONDS;
+
+ ngtcp2_conn_on_loss_detection_timer(conn, t);
+
+ CU_ASSERT(1 == conn->hs_pktns->rtb.probe_pkt_left);
+
+ /* Send a PTO probe packet */
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ it = ngtcp2_ksl_begin(&conn->hs_pktns->rtb.ents);
+ ent = ngtcp2_ksl_it_get(&it);
+
+ CU_ASSERT(NGTCP2_FRAME_CRYPTO == ent->frc->fr.type);
+ CU_ASSERT(0 == ent->frc->fr.crypto.offset);
+ CU_ASSERT(2 == ent->frc->fr.crypto.datacnt);
+ CU_ASSERT(987 == ngtcp2_vec_len(ent->frc->fr.crypto.data,
+ ent->frc->fr.crypto.datacnt));
+ CU_ASSERT(5 == ent->hd.pkt_num);
+
+ ngtcp2_conn_del(conn);
+
+ /* Retransmission splits CRYPTO frame */
+ setup_handshake_server(&conn);
+ conn->callbacks.recv_crypto_data = recv_crypto_data;
+
+ frs[0].type = NGTCP2_FRAME_CRYPTO;
+ frs[0].crypto.offset = 0;
+ frs[0].crypto.datacnt = 1;
+ frs[0].crypto.data[0].len = 123;
+ frs[0].crypto.data[0].base = null_data;
+
+ frs[1].type = NGTCP2_FRAME_PADDING;
+ frs[1].padding.len = 1005;
+
+ pktlen = write_initial_pkt(
+ buf, sizeof(buf), &rcid, ngtcp2_conn_get_dcid(conn), ++pkt_num,
+ conn->client_chosen_version, NULL, 0, frs, 2, &null_ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ /* Increase anti-amplification factor for easier testing */
+ conn->dcid.current.bytes_recv += 10000;
+
+ ngtcp2_conn_submit_crypto_data(conn, NGTCP2_CRYPTO_LEVEL_INITIAL, null_data,
+ 123);
+ ngtcp2_conn_submit_crypto_data(conn, NGTCP2_CRYPTO_LEVEL_HANDSHAKE, null_data,
+ 3000);
+ /* Initial and first Handshake are coalesced into 1 packet. */
+ for (i = 0; i < 3; ++i) {
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+ CU_ASSERT(spktlen > 0);
+ }
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(0 == spktlen);
+
+ it = ngtcp2_ksl_begin(&conn->hs_pktns->rtb.ents);
+ ent = ngtcp2_ksl_it_get(&it);
+
+ CU_ASSERT(NGTCP2_FRAME_CRYPTO == ent->frc->fr.type);
+ CU_ASSERT(2170 == ent->frc->fr.crypto.offset);
+ CU_ASSERT(830 == ngtcp2_vec_len(ent->frc->fr.crypto.data,
+ ent->frc->fr.crypto.datacnt));
+ CU_ASSERT(2 == ent->hd.pkt_num);
+
+ t += 30 * NGTCP2_MILLISECONDS;
+
+ ngtcp2_conn_on_loss_detection_timer(conn, t);
+
+ CU_ASSERT(1 == conn->in_pktns->rtb.probe_pkt_left);
+ CU_ASSERT(1 == conn->hs_pktns->rtb.probe_pkt_left);
+
+ /* 1st PTO */
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+ CU_ASSERT(spktlen > 0);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(0 == spktlen);
+
+ it = ngtcp2_ksl_begin(&conn->hs_pktns->rtb.ents);
+ ent = ngtcp2_ksl_it_get(&it);
+
+ CU_ASSERT(NGTCP2_FRAME_CRYPTO == ent->frc->fr.type);
+ CU_ASSERT(0 == ent->frc->fr.crypto.offset);
+ CU_ASSERT(987 == ngtcp2_vec_len(ent->frc->fr.crypto.data,
+ ent->frc->fr.crypto.datacnt));
+ CU_ASSERT(3 == ent->hd.pkt_num);
+
+ t += 30 * NGTCP2_MILLISECONDS;
+
+ ngtcp2_conn_on_loss_detection_timer(conn, t);
+
+ CU_ASSERT(1 == conn->in_pktns->rtb.probe_pkt_left);
+ CU_ASSERT(1 == conn->hs_pktns->rtb.probe_pkt_left);
+
+ /* 2nd PTO. Initial and Handshake packets are coalesced. Handshake
+ CRYPTO is split into 2 because of Initial CRYPTO. */
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+ CU_ASSERT(spktlen > 0);
+
+ it = ngtcp2_ksl_begin(&conn->hs_pktns->rtb.ents);
+ ent = ngtcp2_ksl_it_get(&it);
+
+ CU_ASSERT(NGTCP2_FRAME_CRYPTO == ent->frc->fr.type);
+ CU_ASSERT(987 == ent->frc->fr.crypto.offset);
+ CU_ASSERT(991 == ngtcp2_vec_len(ent->frc->fr.crypto.data,
+ ent->frc->fr.crypto.datacnt));
+ CU_ASSERT(4 == ent->hd.pkt_num);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+ CU_ASSERT(spktlen > 0);
+
+ it = ngtcp2_ksl_begin(&conn->hs_pktns->rtb.ents);
+ ent = ngtcp2_ksl_it_get(&it);
+
+ CU_ASSERT(NGTCP2_FRAME_CRYPTO == ent->frc->fr.type);
+ CU_ASSERT(1978 == ent->frc->fr.crypto.offset);
+ CU_ASSERT(192 == ngtcp2_vec_len(ent->frc->fr.crypto.data,
+ ent->frc->fr.crypto.datacnt));
+ CU_ASSERT(5 == ent->hd.pkt_num);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+ CU_ASSERT(0 == spktlen);
+
+ fr.type = NGTCP2_FRAME_ACK;
+ fr.ack.largest_ack = 0;
+ fr.ack.ack_delay = 0;
+ fr.ack.ack_delay_unscaled = 0;
+ fr.ack.first_ack_range = 0;
+ fr.ack.rangecnt = 0;
+
+ pktlen = write_handshake_pkt(buf, sizeof(buf), &conn->oscid,
+ ngtcp2_conn_get_dcid(conn), ++pkt_num,
+ conn->client_chosen_version, &fr, 1, &null_ckm);
+
+ t += NGTCP2_MILLISECONDS;
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, t);
+
+ CU_ASSERT(0 == rv);
+
+ t += 40 * NGTCP2_MILLISECONDS;
+
+ ngtcp2_conn_on_loss_detection_timer(conn, t);
+
+ CU_ASSERT(1 == conn->hs_pktns->rtb.probe_pkt_left);
+
+ /* 3rd PTO */
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+ CU_ASSERT(0 == spktlen);
+
+ it = ngtcp2_ksl_begin(&conn->hs_pktns->rtb.ents);
+ ent = ngtcp2_ksl_it_get(&it);
+
+ CU_ASSERT(NGTCP2_FRAME_CRYPTO == ent->frc->fr.type);
+ CU_ASSERT(2170 == ent->frc->fr.crypto.offset);
+ CU_ASSERT(830 == ngtcp2_vec_len(ent->frc->fr.crypto.data,
+ ent->frc->fr.crypto.datacnt));
+ CU_ASSERT(6 == ent->hd.pkt_num);
+ CU_ASSERT(NULL == ent->frc->next);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_recv_client_initial_retry(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[2048];
+ size_t pktlen;
+ ngtcp2_frame fr;
+ int64_t pkt_num = -1;
+ ngtcp2_tstamp t = 0;
+ ngtcp2_cid rcid;
+ int rv;
+
+ rcid_init(&rcid);
+
+ setup_handshake_server(&conn);
+ fr.type = NGTCP2_FRAME_CRYPTO;
+ fr.crypto.offset = 1;
+ fr.crypto.datacnt = 1;
+ fr.crypto.data[0].len = 1245;
+ fr.crypto.data[0].base = null_data;
+
+ pktlen = write_initial_pkt(
+ buf, sizeof(buf), &rcid, ngtcp2_conn_get_dcid(conn), ++pkt_num,
+ conn->client_chosen_version, NULL, 0, &fr, 1, &null_ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(NGTCP2_ERR_RETRY == rv);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_recv_client_initial_token(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[2048];
+ size_t pktlen;
+ ngtcp2_frame fr;
+ int64_t pkt_num = -1;
+ ngtcp2_tstamp t = 0;
+ ngtcp2_cid rcid;
+ int rv;
+ const uint8_t raw_token[] = {0xff, 0x12, 0x31, 0x04, 0xab};
+ ngtcp2_vec token;
+ const ngtcp2_mem *mem;
+
+ rcid_init(&rcid);
+
+ setup_handshake_server(&conn);
+ mem = conn->mem;
+
+ token.base = ngtcp2_mem_malloc(mem, sizeof(raw_token));
+ memcpy(token.base, raw_token, sizeof(raw_token));
+ token.len = sizeof(raw_token);
+
+ conn->local.settings.token = token;
+
+ fr.type = NGTCP2_FRAME_CRYPTO;
+ fr.crypto.offset = 0;
+ fr.crypto.datacnt = 1;
+ fr.crypto.data[0].len = 1181;
+ fr.crypto.data[0].base = null_data;
+
+ pktlen =
+ write_initial_pkt(buf, sizeof(buf), &rcid, ngtcp2_conn_get_dcid(conn),
+ ++pkt_num, conn->client_chosen_version, raw_token,
+ sizeof(raw_token), &fr, 1, &null_ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(1181 == ngtcp2_strm_rx_offset(&conn->in_pktns->crypto.strm));
+
+ ngtcp2_conn_del(conn);
+
+ /* Specifying invalid token lets server drop the packet */
+ setup_handshake_server(&conn);
+ mem = conn->mem;
+
+ token.base = ngtcp2_mem_malloc(mem, sizeof(raw_token));
+ memcpy(token.base, raw_token, sizeof(raw_token));
+ token.len = sizeof(raw_token) - 1;
+
+ conn->local.settings.token = token;
+
+ fr.type = NGTCP2_FRAME_CRYPTO;
+ fr.crypto.offset = 0;
+ fr.crypto.datacnt = 1;
+ fr.crypto.data[0].len = 1179;
+ fr.crypto.data[0].base = null_data;
+
+ pktlen =
+ write_initial_pkt(buf, sizeof(buf), &rcid, ngtcp2_conn_get_dcid(conn),
+ ++pkt_num, conn->client_chosen_version, raw_token,
+ sizeof(raw_token), &fr, 1, &null_ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(NGTCP2_ERR_DROP_CONN == rv);
+ CU_ASSERT(0 == ngtcp2_strm_rx_offset(&conn->in_pktns->crypto.strm));
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_get_active_dcid(void) {
+ ngtcp2_conn *conn;
+ ngtcp2_cid_token cid_token[2];
+ ngtcp2_cid dcid;
+ static uint8_t token[] = {0xf1, 0xf1, 0xf1, 0xf1, 0xf1, 0xf1, 0xf1, 0xf1,
+ 0xf1, 0xf1, 0xf1, 0xf1, 0xf1, 0xf1, 0xf1, 0xf1};
+
+ dcid_init(&dcid);
+ setup_default_client(&conn);
+
+ CU_ASSERT(1 == ngtcp2_conn_get_num_active_dcid(conn));
+ CU_ASSERT(1 == ngtcp2_conn_get_active_dcid(conn, cid_token));
+ CU_ASSERT(0 == cid_token[0].seq);
+ CU_ASSERT(ngtcp2_cid_eq(&dcid, &cid_token[0].cid));
+ CU_ASSERT(ngtcp2_path_eq(&null_path.path, &cid_token[0].ps.path));
+ CU_ASSERT(1 == cid_token[0].token_present);
+ CU_ASSERT(0 ==
+ memcmp(token, cid_token[0].token, NGTCP2_STATELESS_RESET_TOKENLEN));
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_recv_version_negotiation(void) {
+ ngtcp2_conn *conn;
+ const ngtcp2_cid *dcid;
+ ngtcp2_ssize spktlen;
+ uint8_t buf[1500];
+ uint32_t nsv[3];
+ int rv;
+ ngtcp2_tstamp t = 0;
+
+ setup_handshake_client(&conn);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ dcid = ngtcp2_conn_get_dcid(conn);
+
+ nsv[0] = 0xffffffff;
+
+ spktlen = ngtcp2_pkt_write_version_negotiation(
+ buf, sizeof(buf), 0xfe, conn->oscid.data, conn->oscid.datalen, dcid->data,
+ dcid->datalen, nsv, 1);
+
+ CU_ASSERT(spktlen > 0);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf,
+ (size_t)spktlen, ++t);
+
+ CU_ASSERT(NGTCP2_ERR_RECV_VERSION_NEGOTIATION == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* Ignore Version Negotiation if it contains version selected by
+ client */
+ setup_handshake_client(&conn);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ dcid = ngtcp2_conn_get_dcid(conn);
+
+ nsv[0] = 0xfffffff0;
+ nsv[1] = conn->client_chosen_version;
+
+ spktlen = ngtcp2_pkt_write_version_negotiation(
+ buf, sizeof(buf), 0x50, conn->oscid.data, conn->oscid.datalen, dcid->data,
+ dcid->datalen, nsv, 2);
+
+ CU_ASSERT(spktlen > 0);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf,
+ (size_t)spktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* Ignore Version Negotiation if client reacted upon Version
+ Negotiation */
+ setup_handshake_client(&conn);
+
+ conn->local.settings.original_version = NGTCP2_PROTO_VER_V2_DRAFT;
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ dcid = ngtcp2_conn_get_dcid(conn);
+
+ nsv[0] = 0xffffffff;
+
+ spktlen = ngtcp2_pkt_write_version_negotiation(
+ buf, sizeof(buf), 0xfe, conn->oscid.data, conn->oscid.datalen, dcid->data,
+ dcid->datalen, nsv, 1);
+
+ CU_ASSERT(spktlen > 0);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf,
+ (size_t)spktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_send_initial_token(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[2048];
+ ngtcp2_callbacks cb;
+ ngtcp2_settings settings;
+ ngtcp2_transport_params params;
+ ngtcp2_cid rcid, scid;
+ ngtcp2_crypto_aead retry_aead = {0, NGTCP2_FAKE_AEAD_OVERHEAD};
+ uint8_t token[] = "this is token";
+ ngtcp2_ssize spktlen, shdlen;
+ ngtcp2_tstamp t = 0;
+ ngtcp2_pkt_hd hd;
+ ngtcp2_crypto_aead_ctx aead_ctx = {0};
+ ngtcp2_crypto_cipher_ctx hp_ctx = {0};
+ ngtcp2_crypto_ctx crypto_ctx;
+
+ rcid_init(&rcid);
+ scid_init(&scid);
+
+ init_initial_crypto_ctx(&crypto_ctx);
+
+ client_default_callbacks(&cb);
+ client_default_settings(&settings);
+ client_default_transport_params(&params);
+
+ settings.token.base = token;
+ settings.token.len = sizeof(token);
+
+ ngtcp2_conn_client_new(&conn, &rcid, &scid, &null_path.path,
+ NGTCP2_PROTO_VER_V1, &cb, &settings, &params,
+ /* mem = */ NULL, NULL);
+ ngtcp2_conn_set_initial_crypto_ctx(conn, &crypto_ctx);
+ ngtcp2_conn_install_initial_key(conn, &aead_ctx, null_iv, &hp_ctx, &aead_ctx,
+ null_iv, &hp_ctx, sizeof(null_iv));
+ ngtcp2_conn_set_retry_aead(conn, &retry_aead, &aead_ctx);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ shdlen = ngtcp2_pkt_decode_hd_long(&hd, buf, (size_t)spktlen);
+
+ CU_ASSERT(shdlen > 0);
+ CU_ASSERT(sizeof(token) == hd.token.len);
+ CU_ASSERT(0 == memcmp(token, hd.token.base, sizeof(token)));
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_set_remote_transport_params(void) {
+ ngtcp2_conn *conn;
+ ngtcp2_transport_params params;
+ int rv;
+ ngtcp2_cid dcid;
+ uint8_t other_versions[2 * sizeof(uint32_t)];
+
+ dcid_init(&dcid);
+
+ /* client: Successful case */
+ setup_handshake_client(&conn);
+
+ conn->negotiated_version = conn->client_chosen_version;
+
+ memset(&params, 0, sizeof(params));
+ params.active_connection_id_limit = NGTCP2_DEFAULT_ACTIVE_CONNECTION_ID_LIMIT;
+ params.max_udp_payload_size = 1450;
+ params.initial_scid = conn->dcid.current.cid;
+ params.original_dcid = conn->rcid;
+
+ rv = ngtcp2_conn_set_remote_transport_params(conn, &params);
+
+ CU_ASSERT(0 == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* client: Wrong original_dcid */
+ setup_handshake_client(&conn);
+
+ conn->negotiated_version = conn->client_chosen_version;
+
+ memset(&params, 0, sizeof(params));
+ params.active_connection_id_limit = NGTCP2_DEFAULT_ACTIVE_CONNECTION_ID_LIMIT;
+ params.max_udp_payload_size = 1450;
+ params.initial_scid = conn->dcid.current.cid;
+
+ rv = ngtcp2_conn_set_remote_transport_params(conn, &params);
+
+ CU_ASSERT(NGTCP2_ERR_TRANSPORT_PARAM == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* client: Wrong initial_scid */
+ setup_handshake_client(&conn);
+
+ conn->negotiated_version = conn->client_chosen_version;
+
+ memset(&params, 0, sizeof(params));
+ params.active_connection_id_limit = NGTCP2_DEFAULT_ACTIVE_CONNECTION_ID_LIMIT;
+ params.max_udp_payload_size = 1450;
+ params.original_dcid = conn->rcid;
+
+ rv = ngtcp2_conn_set_remote_transport_params(conn, &params);
+
+ CU_ASSERT(NGTCP2_ERR_TRANSPORT_PARAM == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* client: Receiving retry_scid when retry is not attempted */
+ setup_handshake_client(&conn);
+
+ conn->negotiated_version = conn->client_chosen_version;
+
+ memset(&params, 0, sizeof(params));
+ params.active_connection_id_limit = NGTCP2_DEFAULT_ACTIVE_CONNECTION_ID_LIMIT;
+ params.max_udp_payload_size = 1450;
+ params.initial_scid = conn->dcid.current.cid;
+ params.original_dcid = conn->rcid;
+ params.retry_scid_present = 1;
+
+ rv = ngtcp2_conn_set_remote_transport_params(conn, &params);
+
+ CU_ASSERT(NGTCP2_ERR_TRANSPORT_PARAM == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* client: Receiving retry_scid */
+ setup_handshake_client(&conn);
+
+ conn->flags |= NGTCP2_CONN_FLAG_RECV_RETRY;
+ conn->retry_scid = dcid;
+ conn->negotiated_version = conn->client_chosen_version;
+
+ memset(&params, 0, sizeof(params));
+ params.active_connection_id_limit = NGTCP2_DEFAULT_ACTIVE_CONNECTION_ID_LIMIT;
+ params.max_udp_payload_size = 1450;
+ params.initial_scid = conn->dcid.current.cid;
+ params.original_dcid = conn->rcid;
+ params.retry_scid_present = 1;
+ params.retry_scid = dcid;
+
+ rv = ngtcp2_conn_set_remote_transport_params(conn, &params);
+
+ CU_ASSERT(0 == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* client: Not receiving retry_scid when retry is attempted */
+ setup_handshake_client(&conn);
+
+ conn->flags |= NGTCP2_CONN_FLAG_RECV_RETRY;
+ conn->retry_scid = dcid;
+ conn->negotiated_version = conn->client_chosen_version;
+
+ memset(&params, 0, sizeof(params));
+ params.active_connection_id_limit = NGTCP2_DEFAULT_ACTIVE_CONNECTION_ID_LIMIT;
+ params.max_udp_payload_size = 1450;
+ params.initial_scid = conn->dcid.current.cid;
+ params.original_dcid = conn->rcid;
+
+ rv = ngtcp2_conn_set_remote_transport_params(conn, &params);
+
+ CU_ASSERT(NGTCP2_ERR_TRANSPORT_PARAM == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* client: Special handling for QUIC v1 regarding Version
+ Negotiation */
+ setup_handshake_client(&conn);
+
+ conn->local.settings.original_version = NGTCP2_PROTO_VER_V2_DRAFT;
+ conn->negotiated_version = conn->client_chosen_version;
+
+ memset(&params, 0, sizeof(params));
+ params.active_connection_id_limit = NGTCP2_DEFAULT_ACTIVE_CONNECTION_ID_LIMIT;
+ params.max_udp_payload_size = 1450;
+ params.initial_scid = conn->dcid.current.cid;
+ params.original_dcid = conn->rcid;
+
+ rv = ngtcp2_conn_set_remote_transport_params(conn, &params);
+
+ CU_ASSERT(0 == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* client: No version_information after Version Negotiation */
+ setup_handshake_client_version(&conn, NGTCP2_PROTO_VER_V2_DRAFT);
+
+ conn->local.settings.original_version = NGTCP2_PROTO_VER_V1;
+ conn->negotiated_version = conn->client_chosen_version;
+
+ memset(&params, 0, sizeof(params));
+ params.active_connection_id_limit = NGTCP2_DEFAULT_ACTIVE_CONNECTION_ID_LIMIT;
+ params.max_udp_payload_size = 1450;
+ params.initial_scid = conn->dcid.current.cid;
+ params.original_dcid = conn->rcid;
+
+ rv = ngtcp2_conn_set_remote_transport_params(conn, &params);
+
+ CU_ASSERT(NGTCP2_ERR_VERSION_NEGOTIATION_FAILURE == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* client: other_versions includes the version that the client
+ initially attempted. */
+ setup_handshake_client(&conn);
+
+ conn->local.settings.original_version = NGTCP2_PROTO_VER_V2_DRAFT;
+ conn->negotiated_version = conn->client_chosen_version;
+
+ ngtcp2_put_uint32be(other_versions, NGTCP2_PROTO_VER_V1);
+ ngtcp2_put_uint32be(other_versions + sizeof(uint32_t),
+ NGTCP2_PROTO_VER_V2_DRAFT);
+
+ memset(&params, 0, sizeof(params));
+ params.active_connection_id_limit = NGTCP2_DEFAULT_ACTIVE_CONNECTION_ID_LIMIT;
+ params.max_udp_payload_size = 1450;
+ params.initial_scid = conn->dcid.current.cid;
+ params.original_dcid = conn->rcid;
+ params.version_info_present = 1;
+ params.version_info.chosen_version = conn->negotiated_version;
+ params.version_info.other_versions = other_versions;
+ params.version_info.other_versionslen = 2 * sizeof(uint32_t);
+
+ rv = ngtcp2_conn_set_remote_transport_params(conn, &params);
+
+ CU_ASSERT(NGTCP2_ERR_VERSION_NEGOTIATION_FAILURE == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* client: client is unable to choose client chosen version from
+ server's other_versions and chosen version. */
+ setup_handshake_client(&conn);
+
+ conn->local.settings.original_version = NGTCP2_PROTO_VER_V2_DRAFT;
+ conn->negotiated_version = 0xff000000u;
+
+ conn->local.settings.preferred_versions[0] = 0xff000001u;
+ conn->local.settings.preferred_versionslen = 1;
+
+ ngtcp2_put_uint32be(conn->vneg.other_versions, NGTCP2_PROTO_VER_V1);
+ ngtcp2_put_uint32be(conn->vneg.other_versions + sizeof(uint32_t),
+ 0xff000000u);
+
+ ngtcp2_put_uint32be(other_versions, 0xff000000u);
+
+ memset(&params, 0, sizeof(params));
+ params.active_connection_id_limit = NGTCP2_DEFAULT_ACTIVE_CONNECTION_ID_LIMIT;
+ params.max_udp_payload_size = 1450;
+ params.initial_scid = conn->dcid.current.cid;
+ params.original_dcid = conn->rcid;
+ params.version_info_present = 1;
+ params.version_info.chosen_version = conn->negotiated_version;
+ params.version_info.other_versions = other_versions;
+ params.version_info.other_versionslen = 1;
+
+ rv = ngtcp2_conn_set_remote_transport_params(conn, &params);
+
+ CU_ASSERT(NGTCP2_ERR_VERSION_NEGOTIATION_FAILURE == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* client: client chooses version which differs from client chosen
+ version from server's other_versions and chosen version. */
+ setup_handshake_client(&conn);
+
+ conn->local.settings.original_version = NGTCP2_PROTO_VER_V2_DRAFT;
+ conn->negotiated_version = 0xff000000u;
+
+ conn->local.settings.preferred_versions[0] = 0xff000000u;
+ conn->local.settings.preferred_versionslen = 1;
+
+ ngtcp2_put_uint32be(conn->vneg.other_versions, NGTCP2_PROTO_VER_V1);
+ ngtcp2_put_uint32be(conn->vneg.other_versions + sizeof(uint32_t),
+ 0xff000000u);
+
+ ngtcp2_put_uint32be(other_versions, 0xff000000u);
+
+ memset(&params, 0, sizeof(params));
+ params.active_connection_id_limit = NGTCP2_DEFAULT_ACTIVE_CONNECTION_ID_LIMIT;
+ params.max_udp_payload_size = 1450;
+ params.initial_scid = conn->dcid.current.cid;
+ params.original_dcid = conn->rcid;
+ params.version_info_present = 1;
+ params.version_info.chosen_version = conn->negotiated_version;
+ params.version_info.other_versions = other_versions;
+ params.version_info.other_versionslen = 1;
+
+ rv = ngtcp2_conn_set_remote_transport_params(conn, &params);
+
+ CU_ASSERT(NGTCP2_ERR_VERSION_NEGOTIATION_FAILURE == rv);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_write_connection_close(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[1200];
+ ngtcp2_ssize spktlen, shdlen;
+ ngtcp2_pkt_hd hd;
+ const uint8_t *p;
+ ngtcp2_crypto_aead_ctx aead_ctx = {0};
+ ngtcp2_crypto_cipher_ctx hp_ctx = {0};
+ ngtcp2_crypto_ctx crypto_ctx;
+ ngtcp2_connection_close_error ccerr;
+
+ /* Client only Initial key */
+ setup_handshake_client(&conn);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), 0);
+
+ CU_ASSERT(spktlen > 0);
+
+ ngtcp2_connection_close_error_set_transport_error(&ccerr, NGTCP2_NO_ERROR,
+ (const uint8_t *)"foo", 3);
+
+ spktlen = ngtcp2_conn_write_connection_close(conn, NULL, NULL, buf,
+ sizeof(buf), &ccerr, 0);
+
+ CU_ASSERT(spktlen >= NGTCP2_MAX_UDP_PAYLOAD_SIZE);
+
+ shdlen = ngtcp2_pkt_decode_hd_long(&hd, buf, (size_t)spktlen);
+
+ CU_ASSERT(shdlen > 0);
+ CU_ASSERT(NGTCP2_PKT_INITIAL == hd.type);
+ CU_ASSERT(shdlen + (ngtcp2_ssize)hd.len == spktlen);
+
+ ngtcp2_conn_del(conn);
+
+ /* Client has Initial and Handshake keys */
+ setup_handshake_client(&conn);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), 0);
+
+ CU_ASSERT(spktlen > 0);
+
+ init_crypto_ctx(&crypto_ctx);
+
+ ngtcp2_conn_set_crypto_ctx(conn, &crypto_ctx);
+ conn->negotiated_version = conn->client_chosen_version;
+ ngtcp2_conn_install_tx_handshake_key(conn, &aead_ctx, null_iv,
+ sizeof(null_iv), &hp_ctx);
+
+ ngtcp2_connection_close_error_set_transport_error_liberr(&ccerr, 0, NULL, 0);
+
+ spktlen = ngtcp2_conn_write_connection_close(conn, NULL, NULL, buf,
+ sizeof(buf), &ccerr, 0);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(spktlen < NGTCP2_MAX_UDP_PAYLOAD_SIZE);
+
+ shdlen = ngtcp2_pkt_decode_hd_long(&hd, buf, (size_t)spktlen);
+
+ CU_ASSERT(shdlen > 0);
+ CU_ASSERT(NGTCP2_PKT_HANDSHAKE == hd.type);
+ CU_ASSERT(shdlen + (ngtcp2_ssize)hd.len == spktlen);
+
+ ngtcp2_conn_del(conn);
+
+ /* Client has all keys and has not confirmed handshake */
+ setup_handshake_client(&conn);
+
+ init_crypto_ctx(&crypto_ctx);
+
+ ngtcp2_conn_set_crypto_ctx(conn, &crypto_ctx);
+ conn->negotiated_version = conn->client_chosen_version;
+ ngtcp2_conn_install_tx_handshake_key(conn, &aead_ctx, null_iv,
+ sizeof(null_iv), &hp_ctx);
+ ngtcp2_conn_install_tx_key(conn, null_secret, sizeof(null_secret), &aead_ctx,
+ null_iv, sizeof(null_iv), &hp_ctx);
+
+ conn->state = NGTCP2_CS_POST_HANDSHAKE;
+
+ ngtcp2_connection_close_error_set_transport_error(&ccerr, NGTCP2_NO_ERROR,
+ NULL, 0);
+
+ spktlen = ngtcp2_conn_write_connection_close(conn, NULL, NULL, buf,
+ sizeof(buf), &ccerr, 0);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(spktlen < NGTCP2_MAX_UDP_PAYLOAD_SIZE);
+
+ p = buf;
+
+ shdlen = ngtcp2_pkt_decode_hd_long(&hd, p, (size_t)spktlen);
+
+ CU_ASSERT(shdlen > 0);
+ CU_ASSERT(NGTCP2_PKT_HANDSHAKE == hd.type);
+
+ p += shdlen + (ngtcp2_ssize)hd.len;
+ spktlen -= shdlen + (ngtcp2_ssize)hd.len;
+
+ shdlen = ngtcp2_pkt_decode_hd_short(&hd, p, (size_t)spktlen,
+ conn->dcid.current.cid.datalen);
+ CU_ASSERT(shdlen > 0);
+ CU_ASSERT(NGTCP2_PKT_1RTT == hd.type);
+
+ ngtcp2_conn_del(conn);
+
+ /* Client has confirmed handshake */
+ setup_default_client(&conn);
+
+ ngtcp2_connection_close_error_set_transport_error(&ccerr, NGTCP2_NO_ERROR,
+ NULL, 0);
+
+ spktlen = ngtcp2_conn_write_connection_close(conn, NULL, NULL, buf,
+ sizeof(buf), &ccerr, 0);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(spktlen < NGTCP2_MAX_UDP_PAYLOAD_SIZE);
+
+ shdlen = ngtcp2_pkt_decode_hd_short(&hd, buf, (size_t)spktlen,
+ conn->dcid.current.cid.datalen);
+
+ CU_ASSERT(shdlen > 0);
+ CU_ASSERT(NGTCP2_PKT_1RTT == hd.type);
+
+ ngtcp2_conn_del(conn);
+
+ /* Server has Initial and Handshake key */
+ setup_handshake_server(&conn);
+
+ conn->dcid.current.bytes_recv = NGTCP2_MAX_UDP_PAYLOAD_SIZE;
+
+ init_initial_crypto_ctx(&crypto_ctx);
+
+ ngtcp2_conn_set_initial_crypto_ctx(conn, &crypto_ctx);
+ ngtcp2_conn_install_initial_key(conn, &aead_ctx, null_iv, &hp_ctx, &aead_ctx,
+ null_iv, &hp_ctx, sizeof(null_iv));
+
+ init_crypto_ctx(&crypto_ctx);
+
+ ngtcp2_conn_set_crypto_ctx(conn, &crypto_ctx);
+ conn->negotiated_version = conn->client_chosen_version;
+ ngtcp2_conn_install_tx_handshake_key(conn, &aead_ctx, null_iv,
+ sizeof(null_iv), &hp_ctx);
+
+ ngtcp2_connection_close_error_set_transport_error(&ccerr, NGTCP2_NO_ERROR,
+ NULL, 0);
+
+ spktlen = ngtcp2_conn_write_connection_close(conn, NULL, NULL, buf,
+ sizeof(buf), &ccerr, 0);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(spktlen < NGTCP2_MAX_UDP_PAYLOAD_SIZE);
+
+ p = buf;
+
+ shdlen = ngtcp2_pkt_decode_hd_long(&hd, p, (size_t)spktlen);
+
+ CU_ASSERT(shdlen > 0);
+ CU_ASSERT(NGTCP2_PKT_INITIAL == hd.type);
+
+ p += shdlen + (ngtcp2_ssize)hd.len;
+ spktlen -= shdlen + (ngtcp2_ssize)hd.len;
+
+ shdlen = ngtcp2_pkt_decode_hd_long(&hd, p, (size_t)spktlen);
+
+ CU_ASSERT(shdlen > 0);
+ CU_ASSERT(NGTCP2_PKT_HANDSHAKE == hd.type);
+ CU_ASSERT(shdlen + (ngtcp2_ssize)hd.len == spktlen);
+
+ ngtcp2_conn_del(conn);
+
+ /* Server has all keys and has not confirmed handshake */
+ setup_handshake_server(&conn);
+
+ conn->dcid.current.bytes_recv = NGTCP2_MAX_UDP_PAYLOAD_SIZE;
+
+ init_initial_crypto_ctx(&crypto_ctx);
+
+ ngtcp2_conn_set_initial_crypto_ctx(conn, &crypto_ctx);
+ ngtcp2_conn_install_initial_key(conn, &aead_ctx, null_iv, &hp_ctx, &aead_ctx,
+ null_iv, &hp_ctx, sizeof(null_iv));
+
+ init_crypto_ctx(&crypto_ctx);
+
+ ngtcp2_conn_set_crypto_ctx(conn, &crypto_ctx);
+ conn->negotiated_version = conn->client_chosen_version;
+ ngtcp2_conn_install_tx_handshake_key(conn, &aead_ctx, null_iv,
+ sizeof(null_iv), &hp_ctx);
+ ngtcp2_conn_install_tx_key(conn, null_secret, sizeof(null_secret), &aead_ctx,
+ null_iv, sizeof(null_iv), &hp_ctx);
+
+ conn->state = NGTCP2_CS_POST_HANDSHAKE;
+
+ ngtcp2_connection_close_error_set_transport_error(&ccerr, NGTCP2_NO_ERROR,
+ NULL, 0);
+
+ spktlen = ngtcp2_conn_write_connection_close(conn, NULL, NULL, buf,
+ sizeof(buf), &ccerr, 0);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(spktlen < NGTCP2_MAX_UDP_PAYLOAD_SIZE);
+
+ p = buf;
+
+ shdlen = ngtcp2_pkt_decode_hd_long(&hd, p, (size_t)spktlen);
+
+ CU_ASSERT(shdlen > 0);
+ CU_ASSERT(NGTCP2_PKT_INITIAL == hd.type);
+
+ p += shdlen + (ngtcp2_ssize)hd.len;
+ spktlen -= shdlen + (ngtcp2_ssize)hd.len;
+
+ shdlen = ngtcp2_pkt_decode_hd_long(&hd, p, (size_t)spktlen);
+
+ CU_ASSERT(shdlen > 0);
+ CU_ASSERT(NGTCP2_PKT_HANDSHAKE == hd.type);
+
+ p += shdlen + (ngtcp2_ssize)hd.len;
+ spktlen -= shdlen + (ngtcp2_ssize)hd.len;
+
+ shdlen = ngtcp2_pkt_decode_hd_short(&hd, p, (size_t)spktlen,
+ conn->dcid.current.cid.datalen);
+
+ CU_ASSERT(shdlen > 0);
+ CU_ASSERT(NGTCP2_PKT_1RTT == hd.type);
+
+ ngtcp2_conn_del(conn);
+
+ /* Server has confirmed handshake */
+ setup_default_server(&conn);
+
+ ngtcp2_connection_close_error_set_transport_error(&ccerr, NGTCP2_NO_ERROR,
+ NULL, 0);
+
+ spktlen = ngtcp2_conn_write_connection_close(conn, NULL, NULL, buf,
+ sizeof(buf), &ccerr, 0);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(spktlen < NGTCP2_MAX_UDP_PAYLOAD_SIZE);
+
+ shdlen = ngtcp2_pkt_decode_hd_short(&hd, buf, (size_t)spktlen,
+ conn->dcid.current.cid.datalen);
+
+ CU_ASSERT(shdlen > 0);
+ CU_ASSERT(NGTCP2_PKT_1RTT == hd.type);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_write_application_close(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[1200];
+ ngtcp2_ssize spktlen, shdlen;
+ ngtcp2_pkt_hd hd;
+ const uint8_t *p;
+ ngtcp2_crypto_aead_ctx aead_ctx = {0};
+ ngtcp2_crypto_cipher_ctx hp_ctx = {0};
+ uint64_t app_err_code = 0;
+ ngtcp2_crypto_ctx crypto_ctx;
+ ngtcp2_connection_close_error ccerr;
+
+ /* Client only Initial key */
+ setup_handshake_client(&conn);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), 0);
+
+ CU_ASSERT(spktlen > 0);
+
+ ngtcp2_connection_close_error_set_application_error(
+ &ccerr, app_err_code, (const uint8_t *)"foo", 3);
+
+ spktlen = ngtcp2_conn_write_connection_close(conn, NULL, NULL, buf,
+ sizeof(buf), &ccerr, 0);
+
+ CU_ASSERT(spktlen >= NGTCP2_MAX_UDP_PAYLOAD_SIZE);
+
+ shdlen = ngtcp2_pkt_decode_hd_long(&hd, buf, (size_t)spktlen);
+
+ CU_ASSERT(shdlen > 0);
+ CU_ASSERT(NGTCP2_PKT_INITIAL == hd.type);
+ CU_ASSERT(shdlen + (ngtcp2_ssize)hd.len == spktlen);
+
+ ngtcp2_conn_del(conn);
+
+ /* Client has Initial and Handshake keys */
+ setup_handshake_client(&conn);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), 0);
+
+ CU_ASSERT(spktlen > 0);
+
+ init_crypto_ctx(&crypto_ctx);
+
+ ngtcp2_conn_set_crypto_ctx(conn, &crypto_ctx);
+ conn->negotiated_version = conn->client_chosen_version;
+ ngtcp2_conn_install_tx_handshake_key(conn, &aead_ctx, null_iv,
+ sizeof(null_iv), &hp_ctx);
+
+ ngtcp2_connection_close_error_set_application_error(&ccerr, app_err_code,
+ NULL, 0);
+
+ spktlen = ngtcp2_conn_write_connection_close(conn, NULL, NULL, buf,
+ sizeof(buf), &ccerr, 0);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(spktlen < NGTCP2_MAX_UDP_PAYLOAD_SIZE);
+
+ shdlen = ngtcp2_pkt_decode_hd_long(&hd, buf, (size_t)spktlen);
+
+ CU_ASSERT(shdlen > 0);
+ CU_ASSERT(NGTCP2_PKT_HANDSHAKE == hd.type);
+ CU_ASSERT(shdlen + (ngtcp2_ssize)hd.len == spktlen);
+
+ ngtcp2_conn_del(conn);
+
+ /* Client has all keys and has not confirmed handshake */
+ setup_handshake_client(&conn);
+
+ init_crypto_ctx(&crypto_ctx);
+
+ ngtcp2_conn_set_crypto_ctx(conn, &crypto_ctx);
+ conn->negotiated_version = conn->client_chosen_version;
+ ngtcp2_conn_install_tx_handshake_key(conn, &aead_ctx, null_iv,
+ sizeof(null_iv), &hp_ctx);
+ ngtcp2_conn_install_tx_key(conn, null_secret, sizeof(null_secret), &aead_ctx,
+ null_iv, sizeof(null_iv), &hp_ctx);
+
+ conn->state = NGTCP2_CS_POST_HANDSHAKE;
+
+ ngtcp2_connection_close_error_set_application_error(&ccerr, app_err_code,
+ NULL, 0);
+
+ spktlen = ngtcp2_conn_write_connection_close(conn, NULL, NULL, buf,
+ sizeof(buf), &ccerr, 0);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(spktlen < NGTCP2_MAX_UDP_PAYLOAD_SIZE);
+
+ p = buf;
+
+ shdlen = ngtcp2_pkt_decode_hd_long(&hd, p, (size_t)spktlen);
+
+ CU_ASSERT(shdlen > 0);
+ CU_ASSERT(NGTCP2_PKT_HANDSHAKE == hd.type);
+
+ p += shdlen + (ngtcp2_ssize)hd.len;
+ spktlen -= shdlen + (ngtcp2_ssize)hd.len;
+
+ shdlen = ngtcp2_pkt_decode_hd_short(&hd, p, (size_t)spktlen,
+ conn->dcid.current.cid.datalen);
+ CU_ASSERT(shdlen > 0);
+ CU_ASSERT(NGTCP2_PKT_1RTT == hd.type);
+
+ ngtcp2_conn_del(conn);
+
+ /* Client has confirmed handshake */
+ setup_default_client(&conn);
+
+ ngtcp2_connection_close_error_set_application_error(&ccerr, app_err_code,
+ NULL, 0);
+
+ spktlen = ngtcp2_conn_write_connection_close(conn, NULL, NULL, buf,
+ sizeof(buf), &ccerr, 0);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(spktlen < NGTCP2_MAX_UDP_PAYLOAD_SIZE);
+
+ shdlen = ngtcp2_pkt_decode_hd_short(&hd, buf, (size_t)spktlen,
+ conn->dcid.current.cid.datalen);
+
+ CU_ASSERT(shdlen > 0);
+ CU_ASSERT(NGTCP2_PKT_1RTT == hd.type);
+
+ ngtcp2_conn_del(conn);
+
+ /* Server has Initial and Handshake key */
+ setup_handshake_server(&conn);
+
+ conn->dcid.current.bytes_recv = NGTCP2_MAX_UDP_PAYLOAD_SIZE;
+
+ init_initial_crypto_ctx(&crypto_ctx);
+
+ ngtcp2_conn_set_initial_crypto_ctx(conn, &crypto_ctx);
+ ngtcp2_conn_install_initial_key(conn, &aead_ctx, null_iv, &hp_ctx, &aead_ctx,
+ null_iv, &hp_ctx, sizeof(null_iv));
+
+ init_crypto_ctx(&crypto_ctx);
+
+ ngtcp2_conn_set_crypto_ctx(conn, &crypto_ctx);
+ conn->negotiated_version = conn->client_chosen_version;
+ ngtcp2_conn_install_tx_handshake_key(conn, &aead_ctx, null_iv,
+ sizeof(null_iv), &hp_ctx);
+
+ ngtcp2_connection_close_error_set_application_error(&ccerr, app_err_code,
+ NULL, 0);
+
+ spktlen = ngtcp2_conn_write_connection_close(conn, NULL, NULL, buf,
+ sizeof(buf), &ccerr, 0);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(spktlen < NGTCP2_MAX_UDP_PAYLOAD_SIZE);
+
+ p = buf;
+
+ shdlen = ngtcp2_pkt_decode_hd_long(&hd, p, (size_t)spktlen);
+
+ CU_ASSERT(shdlen > 0);
+ CU_ASSERT(NGTCP2_PKT_INITIAL == hd.type);
+
+ p += shdlen + (ngtcp2_ssize)hd.len;
+ spktlen -= shdlen + (ngtcp2_ssize)hd.len;
+
+ shdlen = ngtcp2_pkt_decode_hd_long(&hd, p, (size_t)spktlen);
+
+ CU_ASSERT(shdlen > 0);
+ CU_ASSERT(NGTCP2_PKT_HANDSHAKE == hd.type);
+ CU_ASSERT(shdlen + (ngtcp2_ssize)hd.len == spktlen);
+
+ ngtcp2_conn_del(conn);
+
+ /* Server has all keys and has not confirmed handshake */
+ setup_handshake_server(&conn);
+
+ conn->dcid.current.bytes_recv = NGTCP2_MAX_UDP_PAYLOAD_SIZE;
+
+ init_initial_crypto_ctx(&crypto_ctx);
+
+ ngtcp2_conn_set_initial_crypto_ctx(conn, &crypto_ctx);
+ ngtcp2_conn_install_initial_key(conn, &aead_ctx, null_iv, &hp_ctx, &aead_ctx,
+ null_iv, &hp_ctx, sizeof(null_iv));
+
+ init_crypto_ctx(&crypto_ctx);
+
+ ngtcp2_conn_set_crypto_ctx(conn, &crypto_ctx);
+ conn->negotiated_version = conn->client_chosen_version;
+ ngtcp2_conn_install_tx_handshake_key(conn, &aead_ctx, null_iv,
+ sizeof(null_iv), &hp_ctx);
+ ngtcp2_conn_install_tx_key(conn, null_secret, sizeof(null_secret), &aead_ctx,
+ null_iv, sizeof(null_iv), &hp_ctx);
+
+ ngtcp2_connection_close_error_set_application_error(&ccerr, app_err_code,
+ NULL, 0);
+
+ spktlen = ngtcp2_conn_write_connection_close(conn, NULL, NULL, buf,
+ sizeof(buf), &ccerr, 0);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(spktlen < NGTCP2_MAX_UDP_PAYLOAD_SIZE);
+
+ p = buf;
+
+ shdlen = ngtcp2_pkt_decode_hd_long(&hd, p, (size_t)spktlen);
+
+ CU_ASSERT(shdlen > 0);
+ CU_ASSERT(NGTCP2_PKT_INITIAL == hd.type);
+
+ p += shdlen + (ngtcp2_ssize)hd.len;
+ spktlen -= shdlen + (ngtcp2_ssize)hd.len;
+
+ shdlen = ngtcp2_pkt_decode_hd_long(&hd, p, (size_t)spktlen);
+
+ CU_ASSERT(shdlen > 0);
+ CU_ASSERT(NGTCP2_PKT_HANDSHAKE == hd.type);
+
+ p += shdlen + (ngtcp2_ssize)hd.len;
+ spktlen -= shdlen + (ngtcp2_ssize)hd.len;
+
+ shdlen = ngtcp2_pkt_decode_hd_short(&hd, p, (size_t)spktlen,
+ conn->dcid.current.cid.datalen);
+
+ CU_ASSERT(shdlen > 0);
+ CU_ASSERT(NGTCP2_PKT_1RTT == hd.type);
+
+ ngtcp2_conn_del(conn);
+
+ /* Server has confirmed handshake */
+ setup_default_server(&conn);
+
+ ngtcp2_connection_close_error_set_application_error(&ccerr, app_err_code,
+ NULL, 0);
+
+ spktlen = ngtcp2_conn_write_connection_close(conn, NULL, NULL, buf,
+ sizeof(buf), &ccerr, 0);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT(spktlen < NGTCP2_MAX_UDP_PAYLOAD_SIZE);
+
+ shdlen = ngtcp2_pkt_decode_hd_short(&hd, buf, (size_t)spktlen,
+ conn->dcid.current.cid.datalen);
+
+ CU_ASSERT(shdlen > 0);
+ CU_ASSERT(NGTCP2_PKT_1RTT == hd.type);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_rtb_reclaim_on_pto(void) {
+ ngtcp2_conn *conn;
+ int rv;
+ int64_t stream_id;
+ uint8_t buf[2048];
+ ngtcp2_ssize nwrite;
+ ngtcp2_ssize spktlen;
+ size_t i;
+ size_t num_reclaim_pkt;
+ ngtcp2_rtb_entry *ent;
+ ngtcp2_ksl_it it;
+
+ setup_default_client(&conn);
+
+ rv = ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+
+ CU_ASSERT(0 == rv);
+
+ for (i = 0; i < 5; ++i) {
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf),
+ &nwrite, NGTCP2_WRITE_STREAM_FLAG_NONE,
+ stream_id, null_data, 1024, 1);
+
+ CU_ASSERT(0 < spktlen);
+ }
+
+ CU_ASSERT(5 == ngtcp2_ksl_len(&conn->pktns.rtb.ents));
+
+ rv = ngtcp2_conn_on_loss_detection_timer(conn, 3 * NGTCP2_SECONDS);
+
+ CU_ASSERT(0 == rv);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf),
+ 3 * NGTCP2_SECONDS);
+
+ CU_ASSERT(spktlen > 0);
+
+ it = ngtcp2_ksl_begin(&conn->pktns.rtb.ents);
+ num_reclaim_pkt = 0;
+ for (; !ngtcp2_ksl_it_end(&it); ngtcp2_ksl_it_next(&it)) {
+ ent = ngtcp2_ksl_it_get(&it);
+ if (ent->flags & NGTCP2_RTB_ENTRY_FLAG_PTO_RECLAIMED) {
+ ++num_reclaim_pkt;
+ }
+ }
+
+ CU_ASSERT(1 == num_reclaim_pkt);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_rtb_reclaim_on_pto_datagram(void) {
+ ngtcp2_conn *conn;
+ int rv;
+ int64_t stream_id;
+ uint8_t buf[2048];
+ ngtcp2_ssize nwrite;
+ ngtcp2_ssize spktlen;
+ size_t num_reclaim_pkt;
+ ngtcp2_rtb_entry *ent;
+ ngtcp2_ksl_it it;
+ ngtcp2_vec datav;
+ int accepted;
+ ngtcp2_frame_chain *frc;
+
+ /* DATAGRAM frame must not be reclaimed on PTO */
+ setup_default_client(&conn);
+
+ conn->callbacks.ack_datagram = ack_datagram;
+ conn->remote.transport_params->max_datagram_frame_size = 65535;
+
+ rv = ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+
+ CU_ASSERT(0 == rv);
+
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf),
+ &nwrite, NGTCP2_WRITE_STREAM_FLAG_NONE,
+ stream_id, null_data, 1024, 1);
+
+ CU_ASSERT(0 < spktlen);
+
+ datav.base = null_data;
+ datav.len = 10;
+
+ spktlen = ngtcp2_conn_writev_datagram(
+ conn, NULL, NULL, buf, sizeof(buf), &accepted,
+ NGTCP2_WRITE_DATAGRAM_FLAG_NONE, 1000000007, &datav, 1, 1);
+
+ CU_ASSERT(accepted);
+ CU_ASSERT(0 < spktlen);
+ CU_ASSERT(2 == ngtcp2_ksl_len(&conn->pktns.rtb.ents));
+
+ rv = ngtcp2_conn_on_loss_detection_timer(conn, 3 * NGTCP2_SECONDS);
+
+ CU_ASSERT(0 == rv);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf),
+ 3 * NGTCP2_SECONDS);
+
+ CU_ASSERT(spktlen > 0);
+
+ it = ngtcp2_ksl_begin(&conn->pktns.rtb.ents);
+ num_reclaim_pkt = 0;
+ for (; !ngtcp2_ksl_it_end(&it); ngtcp2_ksl_it_next(&it)) {
+ ent = ngtcp2_ksl_it_get(&it);
+ if (ent->flags & NGTCP2_RTB_ENTRY_FLAG_PTO_RECLAIMED) {
+ ++num_reclaim_pkt;
+ for (frc = ent->frc; frc; frc = frc->next) {
+ CU_ASSERT(NGTCP2_FRAME_DATAGRAM != frc->fr.type);
+ }
+ }
+ }
+
+ CU_ASSERT(1 == num_reclaim_pkt);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_validate_ecn(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[2048];
+ ngtcp2_ssize spktlen;
+ ngtcp2_pkt_info pi;
+ size_t pktlen;
+ int rv;
+ ngtcp2_frame fr;
+ int64_t stream_id;
+ ngtcp2_ssize nwrite;
+ size_t i;
+ ngtcp2_tstamp t = 0;
+
+ setup_default_client(&conn);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, &pi, buf, sizeof(buf), 1);
+
+ CU_ASSERT(0 < spktlen);
+ CU_ASSERT(NGTCP2_ECN_ECT_0 == pi.ecn);
+ CU_ASSERT(NGTCP2_ECN_STATE_TESTING == conn->tx.ecn.state);
+ CU_ASSERT(1 == conn->tx.ecn.validation_start_ts);
+ CU_ASSERT(0 == conn->pktns.tx.ecn.start_pkt_num);
+
+ fr.type = NGTCP2_FRAME_ACK_ECN;
+ fr.ack.largest_ack = 0;
+ fr.ack.ack_delay = 0;
+ fr.ack.first_ack_range = 0;
+ fr.ack.rangecnt = 0;
+ fr.ack.ecn.ect0 = 1;
+ fr.ack.ecn.ect1 = 0;
+ fr.ack.ecn.ce = 0;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 0, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 2);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NGTCP2_ECN_STATE_CAPABLE == conn->tx.ecn.state);
+
+ rv = ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+
+ CU_ASSERT(0 == rv);
+
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, &pi, buf, sizeof(buf), &nwrite,
+ NGTCP2_WRITE_STREAM_FLAG_NONE, stream_id,
+ null_data, 1024, 2);
+
+ CU_ASSERT(0 < spktlen);
+
+ /* Receiving ACK frame containing less ECN counts fails
+ validation */
+ fr.type = NGTCP2_FRAME_ACK_ECN;
+ fr.ack.largest_ack = 1;
+ fr.ack.ack_delay = 0;
+ fr.ack.first_ack_range = 0;
+ fr.ack.rangecnt = 0;
+ fr.ack.ecn.ect0 = 0;
+ fr.ack.ecn.ect1 = 0;
+ fr.ack.ecn.ce = 0;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 1, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 3);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NGTCP2_ECN_STATE_FAILED == conn->tx.ecn.state);
+
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, &pi, buf, sizeof(buf), &nwrite,
+ NGTCP2_WRITE_STREAM_FLAG_NONE, stream_id,
+ null_data, 1024, 2);
+
+ CU_ASSERT(0 < spktlen);
+ CU_ASSERT(NGTCP2_ECN_NOT_ECT == pi.ecn);
+
+ ngtcp2_conn_del(conn);
+
+ /* Receiving ACK frame without ECN counts invalidates ECN
+ capability */
+ setup_default_server(&conn);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, &pi, buf, sizeof(buf), 1);
+
+ CU_ASSERT(0 < spktlen);
+ CU_ASSERT(NGTCP2_ECN_ECT_0 == pi.ecn);
+ CU_ASSERT(NGTCP2_ECN_STATE_TESTING == conn->tx.ecn.state);
+ CU_ASSERT(1 == conn->tx.ecn.validation_start_ts);
+ CU_ASSERT(0 == conn->pktns.tx.ecn.start_pkt_num);
+
+ fr.type = NGTCP2_FRAME_ACK;
+ fr.ack.largest_ack = 0;
+ fr.ack.ack_delay = 0;
+ fr.ack.first_ack_range = 0;
+ fr.ack.rangecnt = 0;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 0, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 2);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NGTCP2_ECN_STATE_FAILED == conn->tx.ecn.state);
+
+ ngtcp2_conn_del(conn);
+
+ /* CE counts must be considered */
+ setup_default_client(&conn);
+
+ rv = ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+
+ CU_ASSERT(0 == rv);
+
+ for (i = 0; i < 2; ++i) {
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, &pi, buf, sizeof(buf),
+ &nwrite, NGTCP2_WRITE_STREAM_FLAG_NONE,
+ stream_id, null_data, 1024, 2);
+
+ CU_ASSERT(0 < spktlen);
+ CU_ASSERT(NGTCP2_ECN_ECT_0 == pi.ecn);
+ }
+
+ CU_ASSERT(NGTCP2_ECN_STATE_TESTING == conn->tx.ecn.state);
+ CU_ASSERT(2 == conn->tx.ecn.validation_start_ts);
+ CU_ASSERT(0 == conn->pktns.tx.ecn.start_pkt_num);
+
+ fr.type = NGTCP2_FRAME_ACK_ECN;
+ fr.ack.largest_ack = 1;
+ fr.ack.ack_delay = 0;
+ fr.ack.first_ack_range = 1;
+ fr.ack.rangecnt = 0;
+ fr.ack.ecn.ect0 = 1;
+ fr.ack.ecn.ect1 = 0;
+ fr.ack.ecn.ce = 1;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 0, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 2);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NGTCP2_ECN_STATE_CAPABLE == conn->tx.ecn.state);
+ CU_ASSERT(0 == ngtcp2_ksl_len(&conn->pktns.rtb.ents));
+
+ ngtcp2_conn_del(conn);
+
+ /* If increments of ECN counts is less than the number of
+ acknowledged ECN entries, ECN validation fails. */
+ setup_default_client(&conn);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, &pi, buf, sizeof(buf), 1);
+
+ CU_ASSERT(0 < spktlen);
+ CU_ASSERT(NGTCP2_ECN_ECT_0 == pi.ecn);
+ CU_ASSERT(NGTCP2_ECN_STATE_TESTING == conn->tx.ecn.state);
+ CU_ASSERT(1 == conn->tx.ecn.validation_start_ts);
+ CU_ASSERT(0 == conn->pktns.tx.ecn.start_pkt_num);
+
+ fr.type = NGTCP2_FRAME_ACK_ECN;
+ fr.ack.largest_ack = 0;
+ fr.ack.ack_delay = 0;
+ fr.ack.first_ack_range = 0;
+ fr.ack.rangecnt = 0;
+ fr.ack.ecn.ect0 = 0;
+ fr.ack.ecn.ect1 = 1;
+ fr.ack.ecn.ce = 0;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 0, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 2);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NGTCP2_ECN_STATE_FAILED == conn->tx.ecn.state);
+
+ ngtcp2_conn_del(conn);
+
+ /* If ECT count is larger than the number of ECT marked packet, ECN
+ validation fails. */
+ setup_default_client(&conn);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, &pi, buf, sizeof(buf), 1);
+
+ CU_ASSERT(0 < spktlen);
+ CU_ASSERT(NGTCP2_ECN_ECT_0 == pi.ecn);
+ CU_ASSERT(NGTCP2_ECN_STATE_TESTING == conn->tx.ecn.state);
+ CU_ASSERT(1 == conn->tx.ecn.validation_start_ts);
+ CU_ASSERT(0 == conn->pktns.tx.ecn.start_pkt_num);
+
+ fr.type = NGTCP2_FRAME_ACK_ECN;
+ fr.ack.largest_ack = 0;
+ fr.ack.ack_delay = 0;
+ fr.ack.first_ack_range = 0;
+ fr.ack.rangecnt = 0;
+ fr.ack.ecn.ect0 = 2;
+ fr.ack.ecn.ect1 = 0;
+ fr.ack.ecn.ce = 0;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 0, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, 2);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NGTCP2_ECN_STATE_FAILED == conn->tx.ecn.state);
+
+ ngtcp2_conn_del(conn);
+
+ /* ECN validation fails if all ECN marked packets are lost */
+ setup_default_client(&conn);
+
+ t = 0;
+
+ rv = ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+
+ CU_ASSERT(0 == rv);
+
+ for (i = 0; i < NGTCP2_ECN_MAX_NUM_VALIDATION_PKTS; ++i) {
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, &pi, buf, sizeof(buf),
+ &nwrite, NGTCP2_WRITE_STREAM_FLAG_NONE,
+ stream_id, null_data, 25, t);
+
+ CU_ASSERT(0 < spktlen);
+ CU_ASSERT(NGTCP2_ECN_ECT_0 == pi.ecn);
+ }
+
+ CU_ASSERT(NGTCP2_ECN_STATE_UNKNOWN == conn->tx.ecn.state);
+ CU_ASSERT(NGTCP2_ECN_MAX_NUM_VALIDATION_PKTS == conn->tx.ecn.dgram_sent);
+
+ t += NGTCP2_MILLISECONDS;
+
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, &pi, buf, sizeof(buf), &nwrite,
+ NGTCP2_WRITE_STREAM_FLAG_NONE, stream_id,
+ null_data, 25, t);
+
+ CU_ASSERT(0 < spktlen);
+ CU_ASSERT(NGTCP2_ECN_NOT_ECT == pi.ecn);
+ CU_ASSERT(NGTCP2_ECN_STATE_UNKNOWN == conn->tx.ecn.state);
+ CU_ASSERT(0 == conn->tx.ecn.validation_start_ts);
+ CU_ASSERT(0 == conn->pktns.tx.ecn.start_pkt_num);
+ CU_ASSERT(NGTCP2_ECN_MAX_NUM_VALIDATION_PKTS == conn->tx.ecn.dgram_sent);
+ CU_ASSERT(0 == conn->pktns.tx.ecn.validation_pkt_lost);
+
+ fr.type = NGTCP2_FRAME_ACK;
+ fr.ack.largest_ack = NGTCP2_ECN_MAX_NUM_VALIDATION_PKTS;
+ fr.ack.ack_delay = 0;
+ fr.ack.first_ack_range = 0;
+ fr.ack.rangecnt = 0;
+
+ t += NGTCP2_MILLISECONDS;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 0, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, t);
+
+ CU_ASSERT(0 == rv);
+
+ CU_ASSERT(NGTCP2_ECN_STATE_FAILED == conn->tx.ecn.state);
+ CU_ASSERT(NGTCP2_ECN_MAX_NUM_VALIDATION_PKTS ==
+ conn->pktns.tx.ecn.validation_pkt_lost);
+
+ ngtcp2_conn_del(conn);
+
+ /* ECN validation fails if all ECN marked packets sent in last 3 *
+ RTT are lost */
+ setup_default_client(&conn);
+
+ rv = ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+
+ CU_ASSERT(0 == rv);
+
+ for (i = 0; i < 2; ++i) {
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, &pi, buf, sizeof(buf),
+ &nwrite, NGTCP2_WRITE_STREAM_FLAG_NONE,
+ stream_id, null_data, 25, 0);
+
+ CU_ASSERT(0 < spktlen);
+ CU_ASSERT(NGTCP2_ECN_ECT_0 == pi.ecn);
+ }
+
+ CU_ASSERT(NGTCP2_ECN_STATE_TESTING == conn->tx.ecn.state);
+ CU_ASSERT(2 == conn->tx.ecn.dgram_sent);
+
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, &pi, buf, sizeof(buf), &nwrite,
+ NGTCP2_WRITE_STREAM_FLAG_NONE, stream_id,
+ null_data, 25, 3 * NGTCP2_SECONDS);
+
+ CU_ASSERT(0 < spktlen);
+ CU_ASSERT(NGTCP2_ECN_NOT_ECT == pi.ecn);
+ CU_ASSERT(NGTCP2_ECN_STATE_UNKNOWN == conn->tx.ecn.state);
+ CU_ASSERT(0 == conn->tx.ecn.validation_start_ts);
+ CU_ASSERT(0 == conn->pktns.tx.ecn.start_pkt_num);
+ CU_ASSERT(2 == conn->pktns.tx.ecn.validation_pkt_sent);
+ CU_ASSERT(0 == conn->pktns.tx.ecn.validation_pkt_lost);
+
+ fr.type = NGTCP2_FRAME_ACK;
+ fr.ack.largest_ack = 2;
+ fr.ack.ack_delay = 0;
+ fr.ack.first_ack_range = 0;
+ fr.ack.rangecnt = 0;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, 0, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen,
+ 4 * NGTCP2_SECONDS);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NGTCP2_ECN_STATE_FAILED == conn->tx.ecn.state);
+ CU_ASSERT(2 == conn->pktns.tx.ecn.validation_pkt_lost);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_path_validation(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[2048];
+ size_t pktlen;
+ ngtcp2_ssize spktlen;
+ ngtcp2_tstamp t = 0;
+ int64_t pkt_num = 0;
+ ngtcp2_frame frs[4];
+ int rv;
+ ngtcp2_path_storage rpath, wpath;
+ ngtcp2_pv_entry *ent;
+
+ /* server starts path validation in NAT rebinding scenario. */
+ setup_default_server(&conn);
+
+ /* This will send NEW_CONNECTION_ID frames */
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ frs[0].type = NGTCP2_FRAME_PING;
+
+ /* Just change remote port */
+ path_init(&rpath, 0, 0, 0, 1);
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, frs, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &rpath.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NULL != conn->pv);
+ CU_ASSERT(0 == conn->pv->dcid.seq);
+ CU_ASSERT(ngtcp2_path_eq(&conn->pv->dcid.ps.path, &rpath.path));
+
+ ngtcp2_path_storage_zero(&wpath);
+ spktlen =
+ ngtcp2_conn_write_pkt(conn, &wpath.path, NULL, buf, sizeof(buf), ++t);
+
+ /* Server has not received enough bytes to pad probing packet. */
+ CU_ASSERT(1200 > spktlen);
+ CU_ASSERT(ngtcp2_path_eq(&rpath.path, &wpath.path));
+ CU_ASSERT(1 == ngtcp2_ringbuf_len(&conn->pv->ents.rb));
+
+ ent = ngtcp2_ringbuf_get(&conn->pv->ents.rb, 0);
+
+ CU_ASSERT(ent->flags & NGTCP2_PV_ENTRY_FLAG_UNDERSIZED);
+ CU_ASSERT(conn->pv->flags & NGTCP2_PV_FLAG_FALLBACK_ON_FAILURE);
+ CU_ASSERT(!(conn->pv->flags & NGTCP2_PV_FLAG_MTU_PROBE));
+
+ frs[0].type = NGTCP2_FRAME_PATH_RESPONSE;
+ memcpy(frs[0].path_response.data, ent->data, sizeof(ent->data));
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, frs, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &rpath.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ /* Start another path validation to probe least MTU */
+ CU_ASSERT(NULL != conn->pv);
+ CU_ASSERT(conn->pv->flags & NGTCP2_PV_FLAG_FALLBACK_ON_FAILURE);
+ CU_ASSERT(conn->pv->flags & NGTCP2_PV_FLAG_MTU_PROBE);
+
+ ngtcp2_path_storage_zero(&wpath);
+ spktlen =
+ ngtcp2_conn_write_pkt(conn, &wpath.path, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(1200 <= spktlen);
+ CU_ASSERT(ngtcp2_path_eq(&rpath.path, &wpath.path));
+ CU_ASSERT(1 == ngtcp2_ringbuf_len(&conn->pv->ents.rb));
+
+ ent = ngtcp2_ringbuf_get(&conn->pv->ents.rb, 0);
+ frs[0].type = NGTCP2_FRAME_PATH_RESPONSE;
+ memcpy(frs[0].path_response.data, ent->data, sizeof(ent->data));
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, frs, 1,
+ conn->pktns.crypto.rx.ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &rpath.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ /* Now perform another validation to old path */
+ CU_ASSERT(NULL != conn->pv);
+ CU_ASSERT(!(conn->pv->flags & NGTCP2_PV_FLAG_FALLBACK_ON_FAILURE));
+ CU_ASSERT(!(conn->pv->flags & NGTCP2_PV_FLAG_MTU_PROBE));
+ CU_ASSERT(conn->pv->flags & NGTCP2_PV_FLAG_DONT_CARE);
+
+ ngtcp2_path_storage_zero(&wpath);
+ spktlen =
+ ngtcp2_conn_write_pkt(conn, &wpath.path, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(1200 <= spktlen);
+ CU_ASSERT(ngtcp2_path_eq(&null_path.path, &wpath.path));
+ CU_ASSERT(1 == ngtcp2_ringbuf_len(&conn->pv->ents.rb));
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_early_data_sync_stream_data_limit(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[1024];
+ ngtcp2_ssize spktlen;
+ ngtcp2_ssize datalen;
+ int64_t bidi_stream_id, uni_stream_id;
+ int rv;
+ ngtcp2_frame fr;
+ size_t pktlen;
+ ngtcp2_crypto_aead_ctx aead_ctx = {0};
+ ngtcp2_crypto_cipher_ctx hp_ctx = {0};
+ ngtcp2_transport_params params;
+ ngtcp2_strm *strm;
+ ngtcp2_tstamp t = 0;
+
+ setup_early_client(&conn);
+
+ rv = ngtcp2_conn_open_bidi_stream(conn, &bidi_stream_id, NULL);
+
+ CU_ASSERT(0 == rv);
+
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf),
+ &datalen, NGTCP2_WRITE_STREAM_FLAG_FIN,
+ bidi_stream_id, null_data, 1024, ++t);
+
+ CU_ASSERT((ngtcp2_ssize)sizeof(buf) == spktlen);
+ CU_ASSERT(670 == datalen);
+
+ rv = ngtcp2_conn_open_uni_stream(conn, &uni_stream_id, NULL);
+
+ CU_ASSERT(0 == rv);
+
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf),
+ &datalen, NGTCP2_WRITE_STREAM_FLAG_FIN,
+ uni_stream_id, null_data, 1024, ++t);
+
+ CU_ASSERT((ngtcp2_ssize)sizeof(buf) == spktlen);
+ CU_ASSERT(958);
+
+ fr.type = NGTCP2_FRAME_CRYPTO;
+ fr.crypto.offset = 0;
+ fr.crypto.datacnt = 1;
+ fr.crypto.data[0].len = 198;
+ fr.crypto.data[0].base = null_data;
+
+ pktlen = write_initial_pkt(buf, sizeof(buf), &conn->oscid,
+ ngtcp2_conn_get_dcid(conn), 0, NGTCP2_PROTO_VER_V1,
+ NULL, 0, &fr, 1, &null_ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ rv = ngtcp2_conn_install_rx_handshake_key(conn, &aead_ctx, null_iv,
+ sizeof(null_iv), &hp_ctx);
+
+ CU_ASSERT(0 == rv);
+
+ rv = ngtcp2_conn_install_tx_handshake_key(conn, &aead_ctx, null_iv,
+ sizeof(null_iv), &hp_ctx);
+
+ CU_ASSERT(0 == rv);
+
+ rv = ngtcp2_conn_install_rx_key(conn, null_secret, sizeof(null_secret),
+ &aead_ctx, null_iv, sizeof(null_iv), &hp_ctx);
+
+ CU_ASSERT(0 == rv);
+
+ memset(&params, 0, sizeof(params));
+ ngtcp2_cid_init(&params.initial_scid, conn->dcid.current.cid.data,
+ conn->dcid.current.cid.datalen);
+ ngtcp2_cid_init(&params.original_dcid, conn->rcid.data, conn->rcid.datalen);
+ params.max_udp_payload_size = 1200;
+ params.initial_max_stream_data_bidi_local =
+ conn->early.transport_params.initial_max_stream_data_bidi_local;
+ params.initial_max_stream_data_bidi_remote = 640 * 1024;
+ params.initial_max_stream_data_uni = 320 * 1024;
+ params.initial_max_data = conn->early.transport_params.initial_max_data;
+ params.initial_max_streams_bidi =
+ conn->early.transport_params.initial_max_streams_bidi;
+ params.initial_max_streams_uni =
+ conn->early.transport_params.initial_max_streams_uni;
+ params.active_connection_id_limit =
+ conn->early.transport_params.active_connection_id_limit;
+
+ rv = ngtcp2_conn_set_remote_transport_params(conn, &params);
+
+ CU_ASSERT(0 == rv);
+
+ rv = ngtcp2_conn_install_tx_key(conn, null_secret, sizeof(null_secret),
+ &aead_ctx, null_iv, sizeof(null_iv), &hp_ctx);
+
+ CU_ASSERT(0 == rv);
+
+ ngtcp2_conn_handshake_completed(conn);
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(0 < spktlen);
+
+ strm = ngtcp2_conn_find_stream(conn, bidi_stream_id);
+
+ CU_ASSERT(params.initial_max_stream_data_bidi_remote == strm->tx.max_offset);
+
+ strm = ngtcp2_conn_find_stream(conn, uni_stream_id);
+
+ CU_ASSERT(params.initial_max_stream_data_uni == strm->tx.max_offset);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_early_data_rejected(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[1024];
+ ngtcp2_ssize spktlen;
+ ngtcp2_ssize datalen;
+ int64_t bidi_stream_id, uni_stream_id;
+ int rv;
+ ngtcp2_frame fr;
+ size_t pktlen;
+ ngtcp2_crypto_aead_ctx aead_ctx = {0};
+ ngtcp2_crypto_cipher_ctx hp_ctx = {0};
+ ngtcp2_transport_params params;
+ ngtcp2_tstamp t = 0;
+
+ setup_early_client(&conn);
+
+ rv = ngtcp2_conn_open_bidi_stream(conn, &bidi_stream_id, NULL);
+
+ CU_ASSERT(0 == rv);
+
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf),
+ &datalen, NGTCP2_WRITE_STREAM_FLAG_FIN,
+ bidi_stream_id, null_data, 1024, ++t);
+
+ CU_ASSERT((ngtcp2_ssize)sizeof(buf) == spktlen);
+ CU_ASSERT(670 == datalen);
+
+ rv = ngtcp2_conn_open_uni_stream(conn, &uni_stream_id, NULL);
+
+ CU_ASSERT(0 == rv);
+
+ ngtcp2_conn_extend_max_offset(conn, 1000);
+ ngtcp2_conn_extend_max_streams_bidi(conn, 7);
+ ngtcp2_conn_extend_max_streams_uni(conn, 5);
+
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf),
+ &datalen, NGTCP2_WRITE_STREAM_FLAG_FIN,
+ uni_stream_id, null_data, 300, ++t);
+
+ CU_ASSERT(0 < spktlen);
+ CU_ASSERT(0 < conn->tx.offset);
+ CU_ASSERT(conn->local.transport_params.initial_max_data + 1000 ==
+ conn->rx.unsent_max_offset);
+ CU_ASSERT(conn->local.transport_params.initial_max_streams_bidi + 7 ==
+ conn->remote.bidi.unsent_max_streams);
+ CU_ASSERT(conn->local.transport_params.initial_max_streams_bidi + 7 ==
+ conn->remote.bidi.max_streams);
+ CU_ASSERT(conn->local.transport_params.initial_max_streams_uni + 5 ==
+ conn->remote.uni.unsent_max_streams);
+ CU_ASSERT(conn->local.transport_params.initial_max_streams_uni + 5 ==
+ conn->remote.uni.max_streams);
+
+ fr.type = NGTCP2_FRAME_CRYPTO;
+ fr.crypto.offset = 0;
+ fr.crypto.datacnt = 1;
+ fr.crypto.data[0].len = 198;
+ fr.crypto.data[0].base = null_data;
+
+ pktlen = write_initial_pkt(buf, sizeof(buf), &conn->oscid,
+ ngtcp2_conn_get_dcid(conn), 0, NGTCP2_PROTO_VER_V1,
+ NULL, 0, &fr, 1, &null_ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ rv = ngtcp2_conn_install_rx_handshake_key(conn, &aead_ctx, null_iv,
+ sizeof(null_iv), &hp_ctx);
+
+ CU_ASSERT(0 == rv);
+
+ rv = ngtcp2_conn_install_tx_handshake_key(conn, &aead_ctx, null_iv,
+ sizeof(null_iv), &hp_ctx);
+
+ CU_ASSERT(0 == rv);
+
+ rv = ngtcp2_conn_install_rx_key(conn, null_secret, sizeof(null_secret),
+ &aead_ctx, null_iv, sizeof(null_iv), &hp_ctx);
+
+ CU_ASSERT(0 == rv);
+
+ /* Stream limits in transport parameters can be reduced if early
+ data is rejected. */
+ memset(&params, 0, sizeof(params));
+ ngtcp2_cid_init(&params.initial_scid, conn->dcid.current.cid.data,
+ conn->dcid.current.cid.datalen);
+ ngtcp2_cid_init(&params.original_dcid, conn->rcid.data, conn->rcid.datalen);
+ params.max_udp_payload_size = 1200;
+ params.initial_max_stream_data_bidi_local =
+ conn->early.transport_params.initial_max_stream_data_bidi_local;
+ params.initial_max_stream_data_bidi_remote =
+ conn->early.transport_params.initial_max_stream_data_bidi_remote / 2;
+ params.initial_max_stream_data_uni = 0;
+ params.initial_max_data = conn->early.transport_params.initial_max_data;
+ params.initial_max_streams_bidi =
+ conn->early.transport_params.initial_max_streams_bidi;
+ params.initial_max_streams_uni =
+ conn->early.transport_params.initial_max_streams_uni;
+ params.active_connection_id_limit =
+ conn->early.transport_params.active_connection_id_limit;
+
+ rv = ngtcp2_conn_set_remote_transport_params(conn, &params);
+
+ CU_ASSERT(0 == rv);
+
+ rv = ngtcp2_conn_install_tx_key(conn, null_secret, sizeof(null_secret),
+ &aead_ctx, null_iv, sizeof(null_iv), &hp_ctx);
+
+ CU_ASSERT(0 == rv);
+
+ ngtcp2_conn_handshake_completed(conn);
+ ngtcp2_conn_early_data_rejected(conn);
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(0 < spktlen);
+ CU_ASSERT(NULL == ngtcp2_conn_find_stream(conn, bidi_stream_id));
+ CU_ASSERT(NULL == ngtcp2_conn_find_stream(conn, uni_stream_id));
+ CU_ASSERT(0 == conn->tx.offset);
+ CU_ASSERT(conn->local.transport_params.initial_max_data ==
+ conn->rx.max_offset);
+ CU_ASSERT(conn->local.transport_params.initial_max_data ==
+ conn->rx.unsent_max_offset);
+ CU_ASSERT(conn->local.transport_params.initial_max_streams_bidi ==
+ conn->remote.bidi.max_streams);
+ CU_ASSERT(conn->local.transport_params.initial_max_streams_bidi ==
+ conn->remote.bidi.unsent_max_streams);
+ CU_ASSERT(conn->local.transport_params.initial_max_streams_uni ==
+ conn->remote.uni.max_streams);
+ CU_ASSERT(conn->local.transport_params.initial_max_streams_uni ==
+ conn->remote.uni.unsent_max_streams);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_keep_alive(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[2048];
+ ngtcp2_ssize spktlen;
+ ngtcp2_pkt_info pi;
+ ngtcp2_tstamp t = 0;
+ int rv;
+
+ setup_default_client(&conn);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, &pi, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(0 < spktlen);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, &pi, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(0 == spktlen);
+
+ ngtcp2_conn_set_keep_alive_timeout(conn, 10 * NGTCP2_SECONDS);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, &pi, buf, sizeof(buf), t);
+
+ CU_ASSERT(0 == spktlen);
+
+ t += 10 * NGTCP2_SECONDS;
+
+ rv = ngtcp2_conn_handle_expiry(conn, t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(conn->flags & NGTCP2_CONN_FLAG_KEEP_ALIVE_CANCELLED);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, &pi, buf, sizeof(buf), t);
+
+ CU_ASSERT(0 < spktlen);
+ CU_ASSERT(t == conn->keep_alive.last_ts);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_retire_stale_bound_dcid(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[2048];
+ size_t pktlen;
+ ngtcp2_tstamp t = 0;
+ ngtcp2_tstamp expiry;
+ int64_t pkt_num = 0;
+ ngtcp2_frame fr;
+ int rv;
+ ngtcp2_cid cid;
+ const uint8_t raw_cid[] = {0x0f, 0x00, 0x00, 0x00};
+ const uint8_t token[NGTCP2_STATELESS_RESET_TOKENLEN] = {0xff};
+ const uint8_t data[] = {0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, 0xf8};
+
+ ngtcp2_cid_init(&cid, raw_cid, sizeof(raw_cid));
+
+ setup_default_server(&conn);
+
+ fr.type = NGTCP2_FRAME_NEW_CONNECTION_ID;
+ fr.new_connection_id.seq = 1;
+ fr.new_connection_id.retire_prior_to = 0;
+ fr.new_connection_id.cid = cid;
+ memcpy(fr.new_connection_id.stateless_reset_token, token, sizeof(token));
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ fr.type = NGTCP2_FRAME_PATH_CHALLENGE;
+ memcpy(fr.path_challenge.data, data, sizeof(fr.path_challenge.data));
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &new_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(ngtcp2_ringbuf_len(&conn->rx.path_challenge.rb) > 0);
+ CU_ASSERT(ngtcp2_ringbuf_len(&conn->dcid.bound.rb) > 0);
+
+ expiry = ngtcp2_conn_get_expiry(conn);
+
+ CU_ASSERT(UINT64_MAX != expiry);
+
+ t += 3 * ngtcp2_conn_get_pto(conn);
+
+ rv = ngtcp2_conn_handle_expiry(conn, t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(0 == ngtcp2_ringbuf_len(&conn->dcid.bound.rb));
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_get_scid(void) {
+ ngtcp2_conn *conn;
+ ngtcp2_settings settings;
+ ngtcp2_transport_params params;
+ ngtcp2_cid dcid, scid;
+ ngtcp2_callbacks cb;
+ const uint8_t raw_cid[] = {0x0f, 0x00, 0x00, 0x00};
+ ngtcp2_cid scids[16];
+
+ dcid_init(&dcid);
+ dcid_init(&scid);
+
+ server_default_callbacks(&cb);
+ server_default_settings(&settings);
+
+ /* Without preferred address */
+ server_default_transport_params(&params);
+
+ ngtcp2_conn_server_new(&conn, &dcid, &scid, &null_path.path,
+ NGTCP2_PROTO_VER_V1, &cb, &settings, &params,
+ /* mem = */ NULL, NULL);
+
+ CU_ASSERT(1 == ngtcp2_conn_get_num_scid(conn));
+
+ ngtcp2_conn_get_scid(conn, scids);
+
+ CU_ASSERT(ngtcp2_cid_eq(&scid, &scids[0]));
+
+ ngtcp2_conn_del(conn);
+
+ /* With preferred address */
+ server_default_transport_params(&params);
+ params.preferred_address_present = 1;
+ ngtcp2_cid_init(&params.preferred_address.cid, raw_cid, sizeof(raw_cid));
+
+ ngtcp2_conn_server_new(&conn, &dcid, &scid, &null_path.path,
+ NGTCP2_PROTO_VER_V1, &cb, &settings, &params,
+ /* mem = */ NULL, NULL);
+
+ CU_ASSERT(2 == ngtcp2_conn_get_num_scid(conn));
+
+ ngtcp2_conn_get_scid(conn, scids);
+
+ CU_ASSERT(ngtcp2_cid_eq(&scid, &scids[0]));
+ CU_ASSERT(ngtcp2_cid_eq(&params.preferred_address.cid, &scids[1]));
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_stream_close(void) {
+ ngtcp2_conn *conn;
+ int rv;
+ uint8_t buf[2048];
+ ngtcp2_frame frs[2];
+ size_t pktlen;
+ int64_t pkt_num = 0;
+ my_user_data ud;
+ ngtcp2_strm *strm;
+ ngtcp2_tstamp t = 0;
+ ngtcp2_ssize spktlen;
+ int64_t stream_id;
+
+ /* Receive RESET_STREAM and STOP_SENDING from client */
+ setup_default_server(&conn);
+ conn->callbacks.stream_close = stream_close;
+ conn->user_data = &ud;
+
+ open_stream(conn, 0);
+
+ frs[0].type = NGTCP2_FRAME_RESET_STREAM;
+ frs[0].reset_stream.stream_id = 0;
+ frs[0].reset_stream.app_error_code = NGTCP2_APP_ERR01;
+ frs[0].reset_stream.final_size = 999;
+
+ frs[1].type = NGTCP2_FRAME_STOP_SENDING;
+ frs[1].stop_sending.stream_id = 0;
+ frs[1].stop_sending.app_error_code = NGTCP2_APP_ERR02;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, frs, 2,
+ conn->pktns.crypto.tx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ strm = ngtcp2_conn_find_stream(conn, 0);
+
+ CU_ASSERT(NGTCP2_APP_ERR01 == strm->app_error_code);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT((size_t)spktlen < sizeof(buf));
+
+ frs[0].type = NGTCP2_FRAME_ACK;
+ frs[0].ack.largest_ack = 0;
+ frs[0].ack.ack_delay = 0;
+ frs[0].ack.first_ack_range = 0;
+ frs[0].ack.rangecnt = 0;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, frs, 1,
+ conn->pktns.crypto.tx.ckm);
+
+ ud.stream_close.flags = NGTCP2_STREAM_CLOSE_FLAG_NONE;
+ ud.stream_close.stream_id = -1;
+ ud.stream_close.app_error_code = 0;
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ CU_ASSERT(NGTCP2_STREAM_CLOSE_FLAG_APP_ERROR_CODE_SET &
+ ud.stream_close.flags);
+ CU_ASSERT(0 == ud.stream_close.stream_id);
+ CU_ASSERT(NGTCP2_APP_ERR01 == ud.stream_close.app_error_code);
+
+ ngtcp2_conn_del(conn);
+
+ /* Client sends STOP_SENDING and then STREAM and fin */
+ pkt_num = 0;
+
+ setup_default_server(&conn);
+ conn->callbacks.stream_close = stream_close;
+ conn->callbacks.recv_stream_data = recv_stream_data;
+ conn->user_data = &ud;
+
+ frs[0].type = NGTCP2_FRAME_STOP_SENDING;
+ frs[0].stop_sending.stream_id = 0;
+ frs[0].stop_sending.app_error_code = NGTCP2_APP_ERR01;
+
+ frs[1].type = NGTCP2_FRAME_STREAM;
+ frs[1].stream.flags = 0;
+ frs[1].stream.fin = 1;
+ frs[1].stream.stream_id = 0;
+ frs[1].stream.offset = 0;
+ frs[1].stream.datacnt = 0;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, frs, 2,
+ conn->pktns.crypto.tx.ckm);
+
+ ud.stream_data.stream_id = -1;
+ ud.stream_data.flags = NGTCP2_STREAM_DATA_FLAG_NONE;
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(0 == ud.stream_data.stream_id);
+ CU_ASSERT((ud.stream_data.flags & NGTCP2_STREAM_DATA_FLAG_FIN) != 0);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+ CU_ASSERT((size_t)spktlen < sizeof(buf));
+
+ frs[0].type = NGTCP2_FRAME_ACK;
+ frs[0].ack.largest_ack = 0;
+ frs[0].ack.ack_delay = 0;
+ frs[0].ack.first_ack_range = 0;
+ frs[0].ack.rangecnt = 0;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, frs, 1,
+ conn->pktns.crypto.tx.ckm);
+
+ ud.stream_close.flags = NGTCP2_STREAM_CLOSE_FLAG_NONE;
+ ud.stream_close.stream_id = -1;
+ ud.stream_close.app_error_code = 0;
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ CU_ASSERT(NGTCP2_STREAM_CLOSE_FLAG_APP_ERROR_CODE_SET &
+ ud.stream_close.flags);
+ CU_ASSERT(0 == ud.stream_close.stream_id);
+ CU_ASSERT(NGTCP2_APP_ERR01 == ud.stream_close.app_error_code);
+
+ ngtcp2_conn_del(conn);
+
+ /* Client calls ngtcp2_conn_shutdown_stream, and before sending
+ STOP_SENDING, it receives STREAM with fin bit set. */
+ pkt_num = 0;
+
+ setup_default_client(&conn);
+ conn->callbacks.stream_close = stream_close;
+ conn->user_data = &ud;
+
+ rv = ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+
+ CU_ASSERT(0 == rv);
+
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf), NULL,
+ NGTCP2_WRITE_STREAM_FLAG_FIN, stream_id,
+ null_data, 1, ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ frs[0].type = NGTCP2_FRAME_ACK;
+ frs[0].ack.largest_ack = conn->pktns.tx.last_pkt_num;
+ frs[0].ack.ack_delay = 0;
+ frs[0].ack.first_ack_range = 0;
+ frs[0].ack.rangecnt = 0;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, frs, 1,
+ conn->pktns.crypto.tx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ rv = ngtcp2_conn_shutdown_stream(conn, stream_id, NGTCP2_APP_ERR01);
+
+ CU_ASSERT(0 == rv);
+
+ frs[0].type = NGTCP2_FRAME_STREAM;
+ frs[0].stream.flags = 0;
+ frs[0].stream.fin = 1;
+ frs[0].stream.stream_id = stream_id;
+ frs[0].stream.offset = 0;
+ frs[0].stream.datacnt = 1;
+ frs[0].stream.data[0].len = 97;
+ frs[0].stream.data[0].base = null_data;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, frs, 1,
+ conn->pktns.crypto.tx.ckm);
+
+ ud.stream_close.flags = NGTCP2_STREAM_CLOSE_FLAG_NONE;
+ ud.stream_close.stream_id = -1;
+ ud.stream_close.app_error_code = 0;
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NGTCP2_STREAM_CLOSE_FLAG_APP_ERROR_CODE_SET &
+ ud.stream_close.flags);
+ CU_ASSERT(stream_id == ud.stream_close.stream_id);
+ CU_ASSERT(NGTCP2_APP_ERR01 == ud.stream_close.app_error_code);
+
+ ngtcp2_conn_del(conn);
+
+ /* Client sends STREAM fin and then RESET_STREAM. It receives ACK
+ for the STREAM frame, then response fin. No ACK for
+ RESET_STREAM. */
+ pkt_num = 0;
+
+ setup_default_client(&conn);
+ conn->callbacks.stream_close = stream_close;
+ conn->user_data = &ud;
+
+ rv = ngtcp2_conn_open_bidi_stream(conn, &stream_id, NULL);
+
+ CU_ASSERT(0 == rv);
+
+ spktlen = ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf), NULL,
+ NGTCP2_WRITE_STREAM_FLAG_FIN, stream_id,
+ null_data, 1, ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ rv = ngtcp2_conn_shutdown_stream_write(conn, stream_id, NGTCP2_APP_ERR01);
+
+ CU_ASSERT(0 == rv);
+
+ frs[0].type = NGTCP2_FRAME_STREAM;
+ frs[0].stream.flags = 0;
+ frs[0].stream.fin = 1;
+ frs[0].stream.stream_id = stream_id;
+ frs[0].stream.offset = 0;
+ frs[0].stream.datacnt = 0;
+
+ frs[1].type = NGTCP2_FRAME_ACK;
+ frs[1].ack.largest_ack = conn->pktns.tx.last_pkt_num;
+ frs[1].ack.ack_delay = 0;
+ frs[1].ack.first_ack_range = 0;
+ frs[1].ack.rangecnt = 0;
+
+ spktlen =
+ ngtcp2_conn_write_stream(conn, NULL, NULL, buf, sizeof(buf), NULL,
+ NGTCP2_WRITE_STREAM_FLAG_NONE, -1, NULL, 0, ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, frs, 2,
+ conn->pktns.crypto.tx.ckm);
+
+ ud.stream_close.flags = NGTCP2_STREAM_CLOSE_FLAG_NONE;
+ ud.stream_close.stream_id = -1;
+ ud.stream_close.app_error_code = 0;
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NGTCP2_STREAM_CLOSE_FLAG_APP_ERROR_CODE_SET &
+ ud.stream_close.flags);
+ CU_ASSERT(stream_id == ud.stream_close.stream_id);
+ CU_ASSERT(NGTCP2_APP_ERR01 == ud.stream_close.app_error_code);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_buffer_pkt(void) {
+ ngtcp2_conn *conn;
+ int rv;
+ uint8_t buf[2048];
+ ngtcp2_frame fr;
+ ngtcp2_frame frs[2];
+ size_t pktlen, in_pktlen;
+ int64_t pkt_num = 0;
+ ngtcp2_tstamp t = 0;
+ ngtcp2_ssize spktlen;
+ ngtcp2_crypto_aead_ctx aead_ctx = {0};
+ ngtcp2_crypto_cipher_ctx hp_ctx = {0};
+ ngtcp2_ksl_it it;
+ ngtcp2_pkt_chain *pc;
+
+ /* Server should buffer Short packet if it does not complete
+ handshake even if it has application tx key. */
+ setup_handshake_server(&conn);
+
+ fr.type = NGTCP2_FRAME_CRYPTO;
+ fr.crypto.offset = 0;
+ fr.crypto.datacnt = 1;
+ fr.crypto.data[0].len = 1193;
+ fr.crypto.data[0].base = null_data;
+
+ pktlen = write_initial_pkt(buf, sizeof(buf), &conn->oscid,
+ ngtcp2_conn_get_dcid(conn), pkt_num++,
+ NGTCP2_PROTO_VER_V1, NULL, 0, &fr, 1, &null_ckm);
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ rv = ngtcp2_conn_install_tx_key(conn, null_secret, sizeof(null_secret),
+ &aead_ctx, null_iv, sizeof(null_iv), &hp_ctx);
+
+ assert(0 == rv);
+
+ rv = ngtcp2_conn_install_rx_key(conn, null_secret, sizeof(null_secret),
+ &aead_ctx, null_iv, sizeof(null_iv), &hp_ctx);
+
+ assert(0 == rv);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ fr.type = NGTCP2_FRAME_PING;
+
+ in_pktlen = write_initial_pkt(
+ buf, sizeof(buf), &conn->oscid, ngtcp2_conn_get_dcid(conn), pkt_num++,
+ NGTCP2_PROTO_VER_V1, NULL, 0, &fr, 1, &null_ckm);
+
+ frs[0].type = NGTCP2_FRAME_PING;
+ frs[1].type = NGTCP2_FRAME_PADDING;
+ frs[1].padding.len = 1200;
+
+ pktlen = write_pkt(buf + in_pktlen, sizeof(buf) - in_pktlen, &conn->oscid,
+ pkt_num++, frs, 2, &null_ckm);
+
+ CU_ASSERT(!conn->pktns.rx.buffed_pkts);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf,
+ in_pktlen + pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ pc = conn->pktns.rx.buffed_pkts;
+
+ CU_ASSERT(pktlen == pc->pktlen);
+ CU_ASSERT(in_pktlen + pktlen == pc->dgramlen);
+
+ it = ngtcp2_acktr_get(&conn->pktns.acktr);
+
+ CU_ASSERT(ngtcp2_ksl_it_end(&it));
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_handshake_timeout(void) {
+ ngtcp2_conn *conn;
+ int rv;
+
+ /* handshake has just timed out */
+ setup_handshake_server(&conn);
+
+ rv = ngtcp2_conn_handle_expiry(conn,
+ conn->local.settings.initial_ts +
+ conn->local.settings.handshake_timeout);
+
+ CU_ASSERT(NGTCP2_ERR_HANDSHAKE_TIMEOUT == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* handshake is still in progress */
+ setup_handshake_server(&conn);
+
+ rv = ngtcp2_conn_handle_expiry(
+ conn, conn->local.settings.initial_ts +
+ conn->local.settings.handshake_timeout - 1);
+
+ CU_ASSERT(0 == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* handshake timeout should be ignored after handshake has
+ completed. */
+ setup_default_server(&conn);
+
+ rv = ngtcp2_conn_handle_expiry(conn,
+ conn->local.settings.initial_ts +
+ conn->local.settings.handshake_timeout);
+
+ CU_ASSERT(0 == rv);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_get_connection_close_error(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[2048];
+ ngtcp2_frame frs[2];
+ size_t pktlen;
+ uint8_t reason[2048];
+ ngtcp2_tstamp t = 0;
+ int64_t pkt_num = 0;
+ int rv;
+ ngtcp2_connection_close_error ccerr;
+
+ memset(reason, 'a', sizeof(reason));
+
+ setup_default_server(&conn);
+
+ /* Record the last error. */
+ frs[0].type = NGTCP2_FRAME_CONNECTION_CLOSE_APP;
+ frs[0].connection_close.error_code = 1;
+ frs[0].connection_close.frame_type = 99;
+ frs[0].connection_close.reasonlen = 10;
+ frs[0].connection_close.reason = reason;
+
+ frs[1].type = NGTCP2_FRAME_CONNECTION_CLOSE;
+ frs[1].connection_close.error_code = NGTCP2_PROTOCOL_VIOLATION;
+ frs[1].connection_close.frame_type = 1000000007;
+ frs[1].connection_close.reasonlen =
+ NGTCP2_CONNECTION_CLOSE_ERROR_MAX_REASONLEN + 1;
+ frs[1].connection_close.reason = reason;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, ++pkt_num, frs,
+ ngtcp2_arraylen(frs), conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(NGTCP2_ERR_DRAINING == rv);
+
+ ngtcp2_conn_get_connection_close_error(conn, &ccerr);
+
+ CU_ASSERT(NGTCP2_PROTOCOL_VIOLATION == ccerr.error_code);
+ CU_ASSERT(NGTCP2_CONNECTION_CLOSE_ERROR_CODE_TYPE_TRANSPORT == ccerr.type);
+ CU_ASSERT(1000000007 == ccerr.frame_type);
+ CU_ASSERT(0 == memcmp(reason, ccerr.reason, ccerr.reasonlen));
+ CU_ASSERT(NGTCP2_CONNECTION_CLOSE_ERROR_MAX_REASONLEN == ccerr.reasonlen);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_version_negotiation(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[2048];
+ ngtcp2_frame fr;
+ ngtcp2_tstamp t = 0;
+ ngtcp2_ssize spktlen;
+ int64_t pkt_num = 0;
+ size_t pktlen;
+ int rv;
+ ngtcp2_transport_params remote_params;
+ uint8_t other_versions[sizeof(uint32_t) * 2];
+ uint32_t version;
+
+ ngtcp2_put_uint32be(&other_versions[0], NGTCP2_PROTO_VER_V1);
+ ngtcp2_put_uint32be(&other_versions[4], NGTCP2_PROTO_VER_V2_DRAFT);
+
+ /* Client sees the change version in Initial packet which contains
+ CRYPTO frame. It generates new Initial keys and sets negotiated
+ version. */
+ setup_handshake_client(&conn);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ fr.type = NGTCP2_FRAME_CRYPTO;
+ fr.crypto.offset = 0;
+ fr.crypto.datacnt = 1;
+ fr.crypto.data[0].len = 133;
+ fr.crypto.data[0].base = null_data;
+
+ pktlen = write_initial_pkt(
+ buf, sizeof(buf), &conn->oscid, ngtcp2_conn_get_dcid(conn), pkt_num++,
+ NGTCP2_PROTO_VER_V2_DRAFT, NULL, 0, &fr, 1, &null_ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NGTCP2_PROTO_VER_V2_DRAFT == conn->negotiated_version);
+ CU_ASSERT(NGTCP2_PROTO_VER_V2_DRAFT == conn->vneg.version);
+ CU_ASSERT(conn->vneg.rx.ckm != NULL);
+ CU_ASSERT(conn->vneg.tx.ckm != NULL);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ ngtcp2_get_uint32(&version, &buf[1]);
+
+ CU_ASSERT(NGTCP2_PROTO_VER_V2_DRAFT == version);
+
+ ngtcp2_conn_del(conn);
+
+ /* Client receives Initial packet which does not change version and
+ does not contain CRYPTO frame. It leaves negotiated version
+ unchanged. */
+ setup_handshake_client(&conn);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ fr.type = NGTCP2_FRAME_PADDING;
+ fr.padding.len = 1;
+
+ pktlen = write_initial_pkt(buf, sizeof(buf), &conn->oscid,
+ ngtcp2_conn_get_dcid(conn), pkt_num++,
+ NGTCP2_PROTO_VER_V1, NULL, 0, &fr, 1, &null_ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(0 == conn->negotiated_version);
+ CU_ASSERT(0 == conn->vneg.version);
+ CU_ASSERT(conn->vneg.rx.ckm == NULL);
+ CU_ASSERT(conn->vneg.tx.ckm == NULL);
+
+ ngtcp2_conn_del(conn);
+
+ /* Server sees client supports QUIC v2. It chooses QUIC v2 as the
+ negotiated version, and generates new Initial keys. */
+ setup_handshake_server(&conn);
+
+ conn->callbacks.recv_client_initial =
+ recv_client_initial_no_remote_transport_params;
+
+ fr.type = NGTCP2_FRAME_CRYPTO;
+ fr.crypto.offset = 0;
+ fr.crypto.datacnt = 1;
+ fr.crypto.data[0].len = 1233;
+ fr.crypto.data[0].base = null_data;
+
+ pktlen = write_initial_pkt(buf, sizeof(buf), &conn->oscid,
+ ngtcp2_conn_get_dcid(conn), pkt_num++,
+ NGTCP2_PROTO_VER_V1, NULL, 0, &fr, 1, &null_ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ ngtcp2_transport_params_default(&remote_params);
+ ngtcp2_cid_init(&remote_params.initial_scid, conn->dcid.current.cid.data,
+ conn->dcid.current.cid.datalen);
+ remote_params.version_info_present = 1;
+ remote_params.version_info.chosen_version = NGTCP2_PROTO_VER_V1;
+ remote_params.version_info.other_versions = other_versions;
+ remote_params.version_info.other_versionslen = sizeof(other_versions);
+
+ rv = ngtcp2_conn_set_remote_transport_params(conn, &remote_params);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(NGTCP2_PROTO_VER_V2_DRAFT == conn->negotiated_version);
+ CU_ASSERT(NGTCP2_PROTO_VER_V2_DRAFT == conn->vneg.version);
+ CU_ASSERT(conn->vneg.rx.ckm != NULL);
+ CU_ASSERT(conn->vneg.tx.ckm != NULL);
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ ngtcp2_get_uint32(&version, &buf[1]);
+
+ CU_ASSERT(NGTCP2_PROTO_VER_V2_DRAFT == version);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_server_negotiate_version(void) {
+ ngtcp2_conn *conn;
+ ngtcp2_version_info version_info = {0};
+ uint8_t client_other_versions[sizeof(uint32_t) * 2];
+
+ setup_handshake_server(&conn);
+
+ version_info.chosen_version = conn->client_chosen_version;
+
+ /* Empty version_info.other_versions */
+ version_info.other_versions = NULL;
+ version_info.other_versionslen = 0;
+
+ CU_ASSERT(conn->client_chosen_version ==
+ ngtcp2_conn_server_negotiate_version(conn, &version_info));
+
+ /* version_info.other_versions and preferred_versions do not share
+ any version. */
+ ngtcp2_put_uint32be(&client_other_versions[0], 0xff000001);
+ ngtcp2_put_uint32be(&client_other_versions[4], 0xff000002);
+
+ version_info.other_versions = client_other_versions;
+ version_info.other_versionslen = sizeof(uint32_t) * 2;
+
+ CU_ASSERT(conn->client_chosen_version ==
+ ngtcp2_conn_server_negotiate_version(conn, &version_info));
+
+ /* version_info.other_versions and preferred_versions share the
+ version. */
+ ngtcp2_put_uint32be(&client_other_versions[0], 0xff000001);
+ ngtcp2_put_uint32be(&client_other_versions[4], NGTCP2_PROTO_VER_V2_DRAFT);
+
+ version_info.other_versions = client_other_versions;
+ version_info.other_versionslen = sizeof(uint32_t) * 2;
+
+ CU_ASSERT(NGTCP2_PROTO_VER_V2_DRAFT ==
+ ngtcp2_conn_server_negotiate_version(conn, &version_info));
+
+ ngtcp2_conn_del(conn);
+
+ /* Without preferred_versions */
+ setup_handshake_server(&conn);
+
+ ngtcp2_mem_free(conn->mem, conn->vneg.preferred_versions);
+ conn->vneg.preferred_versions = NULL;
+ conn->vneg.preferred_versionslen = 0;
+
+ ngtcp2_put_uint32be(&client_other_versions[0], 0xff000001);
+ ngtcp2_put_uint32be(&client_other_versions[4], NGTCP2_PROTO_VER_V2_DRAFT);
+
+ version_info.other_versions = client_other_versions;
+ version_info.other_versionslen = sizeof(uint32_t) * 2;
+
+ CU_ASSERT(conn->client_chosen_version ==
+ ngtcp2_conn_server_negotiate_version(conn, &version_info));
+
+ ngtcp2_conn_del(conn);
+
+ /* original version is the most preferred version */
+ setup_handshake_server(&conn);
+
+ conn->vneg.preferred_versions[0] = NGTCP2_PROTO_VER_V1;
+ conn->vneg.preferred_versions[1] = NGTCP2_PROTO_VER_V2_DRAFT;
+
+ ngtcp2_put_uint32be(&client_other_versions[0], NGTCP2_PROTO_VER_V2_DRAFT);
+ ngtcp2_put_uint32be(&client_other_versions[4], NGTCP2_PROTO_VER_V1);
+
+ version_info.other_versions = client_other_versions;
+ version_info.other_versionslen = sizeof(uint32_t) * 2;
+
+ CU_ASSERT(conn->client_chosen_version ==
+ ngtcp2_conn_server_negotiate_version(conn, &version_info));
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_pmtud_loss(void) {
+ ngtcp2_conn *conn;
+ uint8_t buf[2048];
+ ngtcp2_ssize spktlen;
+ uint64_t t = 0;
+ ngtcp2_frame fr;
+ int64_t pkt_num = 0;
+ size_t pktlen;
+ int rv;
+
+ setup_default_client(&conn);
+
+ ngtcp2_conn_start_pmtud(conn);
+
+ /* This sends PMTUD packet. */
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(1406 == spktlen);
+
+ t += NGTCP2_SECONDS;
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(spktlen > 0);
+
+ fr.type = NGTCP2_FRAME_ACK;
+ fr.ack.largest_ack = conn->pktns.tx.last_pkt_num;
+ fr.ack.ack_delay = 0;
+ fr.ack.first_ack_range = 0;
+ fr.ack.rangecnt = 0;
+
+ pktlen = write_pkt(buf, sizeof(buf), &conn->oscid, pkt_num++, &fr, 1,
+ conn->pktns.crypto.rx.ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(1 == conn->pktns.rtb.num_lost_pkts);
+ CU_ASSERT(1 == conn->pktns.rtb.num_lost_pmtud_pkts);
+ CU_ASSERT(0 == conn->pktns.rtb.cc_bytes_in_flight);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_conn_amplification(void) {
+ ngtcp2_conn *conn;
+ ngtcp2_frame fr;
+ size_t pktlen;
+ uint8_t buf[2048];
+ ngtcp2_cid rcid;
+ int64_t pkt_num = 0;
+ ngtcp2_tstamp t = 0;
+ ngtcp2_ssize spktlen;
+ int rv;
+
+ rcid_init(&rcid);
+
+ /* ACK only frame should not be sent due to amplification limit. */
+ setup_early_server(&conn);
+
+ fr.type = NGTCP2_FRAME_CRYPTO;
+ fr.crypto.offset = 0;
+ fr.crypto.datacnt = 1;
+ fr.crypto.data[0].len = 1200;
+ fr.crypto.data[0].base = null_data;
+
+ pktlen = write_initial_pkt(
+ buf, sizeof(buf), &rcid, ngtcp2_conn_get_dcid(conn), ++pkt_num,
+ conn->client_chosen_version, NULL, 0, &fr, 1, &null_ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.stream_id = 4;
+ fr.stream.fin = 0;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = 111;
+ fr.stream.data[0].base = null_data;
+
+ pktlen =
+ write_0rtt_pkt(buf, sizeof(buf), &rcid, ngtcp2_conn_get_dcid(conn),
+ ++pkt_num, conn->client_chosen_version, &fr, 1, &null_ckm);
+
+ rv = ngtcp2_conn_read_pkt(conn, &null_path.path, &null_pi, buf, pktlen, ++t);
+
+ CU_ASSERT(0 == rv);
+
+ /* Adjust condition so that the execution path goes into sending ACK
+ only frame. */
+ conn->dcid.current.bytes_sent = conn->dcid.current.bytes_recv * 3 - 1;
+ conn->cstat.bytes_in_flight = conn->cstat.cwnd;
+
+ spktlen = ngtcp2_conn_write_pkt(conn, NULL, NULL, buf, sizeof(buf), ++t);
+
+ CU_ASSERT(0 == spktlen);
+
+ ngtcp2_conn_del(conn);
+}
+
+typedef struct failmalloc {
+ size_t nmalloc;
+ size_t fail_start;
+} failmalloc;
+
+static void *failmalloc_malloc(size_t size, void *user_data) {
+ failmalloc *mc = user_data;
+
+ if (mc->fail_start <= ++mc->nmalloc) {
+ return NULL;
+ }
+
+ return malloc(size);
+}
+
+static void failmalloc_free(void *ptr, void *user_data) {
+ (void)user_data;
+
+ free(ptr);
+}
+
+static void *failmalloc_calloc(size_t nmemb, size_t size, void *user_data) {
+ failmalloc *mc = user_data;
+
+ if (mc->fail_start <= ++mc->nmalloc) {
+ return NULL;
+ }
+
+ return calloc(nmemb, size);
+}
+
+static void *failmalloc_realloc(void *ptr, size_t size, void *user_data) {
+ failmalloc *mc = user_data;
+
+ if (mc->fail_start <= ++mc->nmalloc) {
+ return NULL;
+ }
+
+ return realloc(ptr, size);
+}
+
+void test_ngtcp2_conn_new_failmalloc(void) {
+ ngtcp2_conn *conn;
+ ngtcp2_callbacks cb;
+ ngtcp2_settings settings;
+ ngtcp2_transport_params params;
+ failmalloc mc;
+ ngtcp2_mem mem = {
+ &mc,
+ failmalloc_malloc,
+ failmalloc_free,
+ failmalloc_calloc,
+ failmalloc_realloc,
+ };
+ ngtcp2_vec token = {
+ (uint8_t *)"token",
+ sizeof("token") - 1,
+ };
+ uint32_t preferred_versions[] = {
+ NGTCP2_PROTO_VER_V1,
+ NGTCP2_PROTO_VER_V2_DRAFT,
+ };
+ uint32_t other_versions[] = {
+ NGTCP2_PROTO_VER_V2_DRAFT,
+ NGTCP2_PROTO_VER_V1,
+ 0x5a9aeaca,
+ };
+ ngtcp2_cid dcid, scid;
+ int rv;
+ size_t i;
+ size_t nmalloc;
+
+ dcid_init(&dcid);
+ scid_init(&scid);
+
+ ngtcp2_settings_default(&settings);
+ ngtcp2_transport_params_default(&params);
+
+ settings.qlog.write = qlog_write;
+ settings.token = token;
+ settings.preferred_versions = preferred_versions;
+ settings.preferred_versionslen = ngtcp2_arraylen(preferred_versions);
+ settings.other_versions = other_versions;
+ settings.other_versionslen = ngtcp2_arraylen(other_versions);
+
+ /* server */
+ server_default_callbacks(&cb);
+
+ mc.nmalloc = 0;
+ mc.fail_start = SIZE_MAX;
+
+ rv = ngtcp2_conn_server_new(&conn, &dcid, &scid, &null_path.path,
+ NGTCP2_PROTO_VER_V1, &cb, &settings, &params,
+ &mem, NULL);
+
+ CU_ASSERT(0 == rv);
+
+ ngtcp2_conn_del(conn);
+
+ nmalloc = mc.nmalloc;
+
+ for (i = 0; i <= nmalloc; ++i) {
+ mc.nmalloc = 0;
+ mc.fail_start = i;
+
+ rv = ngtcp2_conn_server_new(&conn, &dcid, &scid, &null_path.path,
+ NGTCP2_PROTO_VER_V1, &cb, &settings, &params,
+ &mem, NULL);
+
+ CU_ASSERT(NGTCP2_ERR_NOMEM == rv);
+ }
+
+ mc.nmalloc = 0;
+ mc.fail_start = nmalloc + 1;
+
+ rv = ngtcp2_conn_server_new(&conn, &dcid, &scid, &null_path.path,
+ NGTCP2_PROTO_VER_V1, &cb, &settings, &params,
+ &mem, NULL);
+
+ CU_ASSERT(0 == rv);
+
+ ngtcp2_conn_del(conn);
+
+ /* client */
+ client_default_callbacks(&cb);
+
+ mc.nmalloc = 0;
+ mc.fail_start = SIZE_MAX;
+
+ rv = ngtcp2_conn_client_new(&conn, &dcid, &scid, &null_path.path,
+ NGTCP2_PROTO_VER_V1, &cb, &settings, &params,
+ &mem, NULL);
+
+ CU_ASSERT(0 == rv);
+
+ ngtcp2_conn_del(conn);
+
+ nmalloc = mc.nmalloc;
+
+ for (i = 0; i <= nmalloc; ++i) {
+ mc.nmalloc = 0;
+ mc.fail_start = i;
+
+ rv = ngtcp2_conn_client_new(&conn, &dcid, &scid, &null_path.path,
+ NGTCP2_PROTO_VER_V1, &cb, &settings, &params,
+ &mem, NULL);
+
+ CU_ASSERT(NGTCP2_ERR_NOMEM == rv);
+ }
+
+ mc.nmalloc = 0;
+ mc.fail_start = nmalloc + 1;
+
+ rv = ngtcp2_conn_client_new(&conn, &dcid, &scid, &null_path.path,
+ NGTCP2_PROTO_VER_V1, &cb, &settings, &params,
+ &mem, NULL);
+
+ CU_ASSERT(0 == rv);
+
+ ngtcp2_conn_del(conn);
+}
+
+void test_ngtcp2_accept(void) {
+ size_t pktlen;
+ uint8_t buf[2048];
+ ngtcp2_cid dcid, scid;
+ ngtcp2_frame fr;
+ int rv;
+ ngtcp2_pkt_hd hd;
+
+ dcid_init(&dcid);
+ scid_init(&scid);
+
+ /* Initial packet */
+ memset(&hd, 0, sizeof(hd));
+
+ fr.type = NGTCP2_FRAME_CRYPTO;
+ fr.crypto.offset = 0;
+ fr.crypto.datacnt = 1;
+ fr.crypto.data[0].len = 1200;
+ fr.crypto.data[0].base = null_data;
+
+ pktlen = write_initial_pkt(buf, sizeof(buf), &dcid, &scid, 0,
+ NGTCP2_PROTO_VER_V1, NULL, 0, &fr, 1, &null_ckm);
+
+ CU_ASSERT(pktlen >= 1200);
+
+ rv = ngtcp2_accept(&hd, buf, pktlen);
+
+ CU_ASSERT(0 == rv);
+ CU_ASSERT(ngtcp2_cid_eq(&dcid, &hd.dcid));
+ CU_ASSERT(ngtcp2_cid_eq(&scid, &hd.scid));
+ CU_ASSERT(0 == hd.token.len);
+ CU_ASSERT(hd.len > 0);
+ CU_ASSERT(NGTCP2_PROTO_VER_V1 == hd.version);
+ CU_ASSERT(NGTCP2_PKT_INITIAL == hd.type);
+ CU_ASSERT(hd.flags & NGTCP2_PKT_FLAG_LONG_FORM);
+
+ /* 0RTT packet */
+ memset(&hd, 0, sizeof(hd));
+
+ fr.type = NGTCP2_FRAME_STREAM;
+ fr.stream.flags = 0;
+ fr.stream.stream_id = 0;
+ fr.stream.fin = 0;
+ fr.stream.offset = 0;
+ fr.stream.datacnt = 1;
+ fr.stream.data[0].len = 1200;
+ fr.stream.data[0].base = null_data;
+
+ pktlen = write_0rtt_pkt(buf, sizeof(buf), &dcid, &scid, 1,
+ NGTCP2_PROTO_VER_V1, &fr, 1, &null_ckm);
+
+ CU_ASSERT(pktlen >= 1200);
+
+ rv = ngtcp2_accept(&hd, buf, pktlen);
+
+ CU_ASSERT(NGTCP2_ERR_RETRY == rv);
+ CU_ASSERT(ngtcp2_cid_eq(&dcid, &hd.dcid));
+ CU_ASSERT(ngtcp2_cid_eq(&scid, &hd.scid));
+ CU_ASSERT(0 == hd.token.len);
+ CU_ASSERT(hd.len > 0);
+ CU_ASSERT(NGTCP2_PROTO_VER_V1 == hd.version);
+ CU_ASSERT(NGTCP2_PKT_0RTT == hd.type);
+ CU_ASSERT(hd.flags & NGTCP2_PKT_FLAG_LONG_FORM);
+
+ /* Unknown version */
+ memset(&hd, 0, sizeof(hd));
+
+ fr.type = NGTCP2_FRAME_CRYPTO;
+ fr.crypto.offset = 0;
+ fr.crypto.datacnt = 1;
+ fr.crypto.data[0].len = 1200;
+ fr.crypto.data[0].base = null_data;
+
+ pktlen = write_initial_pkt(buf, sizeof(buf), &dcid, &scid, 0, 0x2, NULL, 0,
+ &fr, 1, &null_ckm);
+
+ CU_ASSERT(pktlen >= 1200);
+
+ rv = ngtcp2_accept(&hd, buf, pktlen);
+
+ /* Unknown version should be filtered out by earlier call of
+ ngtcp2_pkt_decode_version_cid, that is, only supported versioned
+ packet should be passed to ngtcp2_accept. */
+ CU_ASSERT(NGTCP2_ERR_INVALID_ARGUMENT == rv);
+
+ /* Unknown version and the UDP payload size is less than
+ NGTCP2_MAX_UDP_PAYLOAD_SIZE. */
+ memset(&hd, 0, sizeof(hd));
+
+ fr.type = NGTCP2_FRAME_CRYPTO;
+ fr.crypto.offset = 0;
+ fr.crypto.datacnt = 1;
+ fr.crypto.data[0].len = 1127;
+ fr.crypto.data[0].base = null_data;
+
+ pktlen = write_initial_pkt(buf, sizeof(buf), &dcid, &scid, 0, 0x2, NULL, 0,
+ &fr, 1, &null_ckm);
+
+ CU_ASSERT(1199 == pktlen);
+
+ rv = ngtcp2_accept(&hd, buf, pktlen);
+
+ CU_ASSERT(NGTCP2_ERR_INVALID_ARGUMENT == rv);
+
+ /* Short packet */
+ memset(&hd, 0, sizeof(hd));
+
+ fr.type = NGTCP2_FRAME_CRYPTO;
+ fr.crypto.offset = 0;
+ fr.crypto.datacnt = 1;
+ fr.crypto.data[0].len = 1200;
+ fr.crypto.data[0].base = null_data;
+
+ pktlen = write_pkt(buf, sizeof(buf), &dcid, 0, &fr, 1, &null_ckm);
+
+ CU_ASSERT(pktlen >= 1200);
+
+ rv = ngtcp2_accept(&hd, buf, pktlen);
+
+ CU_ASSERT(NGTCP2_ERR_INVALID_ARGUMENT == rv);
+
+ /* Unable to decode packet header */
+ memset(&hd, 0, sizeof(hd));
+
+ memset(buf, 0, 4);
+ buf[0] = NGTCP2_HEADER_FORM_BIT;
+
+ rv = ngtcp2_accept(&hd, buf, 4);
+
+ CU_ASSERT(NGTCP2_ERR_INVALID_ARGUMENT == rv);
+}
+
+void test_ngtcp2_select_version(void) {
+ CU_ASSERT(0 == ngtcp2_select_version(NULL, 0, NULL, 0));
+
+ {
+ uint32_t preferred_versions[] = {NGTCP2_PROTO_VER_V1,
+ NGTCP2_PROTO_VER_V2_DRAFT};
+ uint32_t offered_versions[] = {0x00000004, 0x00000003,
+ NGTCP2_PROTO_VER_V2_DRAFT};
+
+ CU_ASSERT(NGTCP2_PROTO_VER_V2_DRAFT ==
+ ngtcp2_select_version(
+ preferred_versions, ngtcp2_arraylen(preferred_versions),
+ offered_versions, ngtcp2_arraylen(offered_versions)));
+ }
+
+ {
+ uint32_t preferred_versions[] = {NGTCP2_PROTO_VER_V1,
+ NGTCP2_PROTO_VER_V2_DRAFT};
+ uint32_t offered_versions[] = {0x00000004, 0x00000003};
+
+ CU_ASSERT(0 == ngtcp2_select_version(
+ preferred_versions, ngtcp2_arraylen(preferred_versions),
+ offered_versions, ngtcp2_arraylen(offered_versions)));
+ }
+}
+
+void test_ngtcp2_pkt_write_connection_close(void) {
+ ngtcp2_ssize spktlen;
+ uint8_t buf[1200];
+ ngtcp2_cid dcid, scid;
+ ngtcp2_crypto_aead aead = {0, NGTCP2_INITIAL_AEAD_OVERHEAD};
+ ngtcp2_crypto_cipher hp_mask = {0};
+ ngtcp2_crypto_aead_ctx aead_ctx = {0};
+ ngtcp2_crypto_cipher_ctx hp_ctx = {0};
+
+ dcid_init(&dcid);
+ scid_init(&scid);
+
+ spktlen = ngtcp2_pkt_write_connection_close(
+ buf, sizeof(buf), NGTCP2_PROTO_VER_V1, &dcid, &scid, NGTCP2_INVALID_TOKEN,
+ (const uint8_t *)"foo", 3, null_encrypt, &aead, &aead_ctx, null_iv,
+ null_hp_mask, &hp_mask, &hp_ctx);
+
+ CU_ASSERT(spktlen > 0);
+
+ spktlen = ngtcp2_pkt_write_connection_close(
+ buf, 16, NGTCP2_PROTO_VER_V1, &dcid, &scid, NGTCP2_INVALID_TOKEN, NULL, 0,
+ null_encrypt, &aead, &aead_ctx, null_iv, null_hp_mask, &hp_mask, &hp_ctx);
+
+ CU_ASSERT(NGTCP2_ERR_NOBUF == spktlen);
+}