From 17e81f2cd1843f01838245eae7b5ed5edf83d6be Mon Sep 17 00:00:00 2001 From: Daniel Baumann Date: Sun, 28 Apr 2024 09:30:55 +0200 Subject: Adding upstream version 0.12.1+dfsg. Signed-off-by: Daniel Baumann --- examples/h09client.cc | 2604 +++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 2604 insertions(+) create mode 100644 examples/h09client.cc (limited to 'examples/h09client.cc') diff --git a/examples/h09client.cc b/examples/h09client.cc new file mode 100644 index 0000000..4df12ca --- /dev/null +++ b/examples/h09client.cc @@ -0,0 +1,2604 @@ +/* + * ngtcp2 + * + * Copyright (c) 2017 ngtcp2 contributors + * + * Permission is hereby granted, free of charge, to any person obtaining + * a copy of this software and associated documentation files (the + * "Software"), to deal in the Software without restriction, including + * without limitation the rights to use, copy, modify, merge, publish, + * distribute, sublicense, and/or sell copies of the Software, and to + * permit persons to whom the Software is furnished to do so, subject to + * the following conditions: + * + * The above copyright notice and this permission notice shall be + * included in all copies or substantial portions of the Software. + * + * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, + * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF + * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND + * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE + * LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION + * OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION + * WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. + */ +#include +#include +#include +#include +#include +#include +#include +#include + +#include +#include +#include +#include +#include +#include +#include +#include + +#include + +#include "h09client.h" +#include "network.h" +#include "debug.h" +#include "util.h" +#include "shared.h" + +using namespace ngtcp2; +using namespace std::literals; + +namespace { +auto randgen = util::make_mt19937(); +} // namespace + +namespace { +constexpr size_t max_preferred_versionslen = 4; +} // namespace + +Config config{}; + +Stream::Stream(const Request &req, int64_t stream_id) + : req(req), stream_id(stream_id), fd(-1) { + nghttp3_buf_init(&reqbuf); +} + +Stream::~Stream() { + if (fd != -1) { + close(fd); + } +} + +int Stream::open_file(const std::string_view &path) { + assert(fd == -1); + + std::string_view filename; + + auto it = std::find(std::rbegin(path), std::rend(path), '/').base(); + if (it == std::end(path)) { + filename = "index.html"sv; + } else { + filename = std::string_view{it, static_cast(std::end(path) - it)}; + if (filename == ".."sv || filename == "."sv) { + std::cerr << "Invalid file name: " << filename << std::endl; + return -1; + } + } + + auto fname = std::string{config.download}; + fname += '/'; + fname += filename; + + fd = open(fname.c_str(), O_WRONLY | O_CREAT | O_TRUNC, + S_IRUSR | S_IWUSR | S_IRGRP | S_IROTH); + if (fd == -1) { + std::cerr << "open: Could not open file " << fname << ": " + << strerror(errno) << std::endl; + return -1; + } + + return 0; +} + +namespace { +void writecb(struct ev_loop *loop, ev_io *w, int revents) { + auto c = static_cast(w->data); + + c->on_write(); +} +} // namespace + +namespace { +void readcb(struct ev_loop *loop, ev_io *w, int revents) { + auto ep = static_cast(w->data); + auto c = ep->client; + + if (c->on_read(*ep) != 0) { + return; + } + + c->on_write(); +} +} // namespace + +namespace { +void timeoutcb(struct ev_loop *loop, ev_timer *w, int revents) { + int rv; + auto c = static_cast(w->data); + + rv = c->handle_expiry(); + if (rv != 0) { + return; + } + + c->on_write(); +} +} // namespace + +namespace { +void change_local_addrcb(struct ev_loop *loop, ev_timer *w, int revents) { + auto c = static_cast(w->data); + + c->change_local_addr(); +} +} // namespace + +namespace { +void key_updatecb(struct ev_loop *loop, ev_timer *w, int revents) { + auto c = static_cast(w->data); + + if (c->initiate_key_update() != 0) { + c->disconnect(); + } +} +} // namespace + +namespace { +void delay_streamcb(struct ev_loop *loop, ev_timer *w, int revents) { + auto c = static_cast(w->data); + + ev_timer_stop(loop, w); + c->on_extend_max_streams(); + c->on_write(); +} +} // namespace + +namespace { +void siginthandler(struct ev_loop *loop, ev_signal *w, int revents) { + ev_break(loop, EVBREAK_ALL); +} +} // namespace + +Client::Client(struct ev_loop *loop, uint32_t client_chosen_version, + uint32_t original_version) + : remote_addr_{}, + loop_(loop), + addr_(nullptr), + port_(nullptr), + nstreams_done_(0), + nstreams_closed_(0), + nkey_update_(0), + client_chosen_version_(client_chosen_version), + original_version_(original_version), + early_data_(false), + should_exit_(false), + should_exit_on_handshake_confirmed_(false), + handshake_confirmed_(false), + tx_{} { + ev_io_init(&wev_, writecb, 0, EV_WRITE); + wev_.data = this; + ev_timer_init(&timer_, timeoutcb, 0., 0.); + timer_.data = this; + ev_timer_init(&change_local_addr_timer_, change_local_addrcb, + static_cast(config.change_local_addr) / NGTCP2_SECONDS, + 0.); + change_local_addr_timer_.data = this; + ev_timer_init(&key_update_timer_, key_updatecb, + static_cast(config.key_update) / NGTCP2_SECONDS, 0.); + key_update_timer_.data = this; + ev_timer_init(&delay_stream_timer_, delay_streamcb, + static_cast(config.delay_stream) / NGTCP2_SECONDS, 0.); + delay_stream_timer_.data = this; + ev_signal_init(&sigintev_, siginthandler, SIGINT); +} + +Client::~Client() { disconnect(); } + +void Client::disconnect() { + tx_.send_blocked = false; + + handle_error(); + + config.tx_loss_prob = 0; + + ev_timer_stop(loop_, &delay_stream_timer_); + ev_timer_stop(loop_, &key_update_timer_); + ev_timer_stop(loop_, &change_local_addr_timer_); + ev_timer_stop(loop_, &timer_); + + ev_io_stop(loop_, &wev_); + + for (auto &ep : endpoints_) { + ev_io_stop(loop_, &ep.rev); + close(ep.fd); + } + + endpoints_.clear(); + + ev_signal_stop(loop_, &sigintev_); +} + +namespace { +int recv_crypto_data(ngtcp2_conn *conn, ngtcp2_crypto_level crypto_level, + uint64_t offset, const uint8_t *data, size_t datalen, + void *user_data) { + if (!config.quiet && !config.no_quic_dump) { + debug::print_crypto_data(crypto_level, data, datalen); + } + + return ngtcp2_crypto_recv_crypto_data_cb(conn, crypto_level, offset, data, + datalen, user_data); +} +} // namespace + +namespace { +int recv_stream_data(ngtcp2_conn *conn, uint32_t flags, int64_t stream_id, + uint64_t offset, const uint8_t *data, size_t datalen, + void *user_data, void *stream_user_data) { + if (!config.quiet && !config.no_quic_dump) { + debug::print_stream_data(stream_id, data, datalen); + } + + auto c = static_cast(user_data); + + if (c->recv_stream_data(flags, stream_id, data, datalen) != 0) { + return NGTCP2_ERR_CALLBACK_FAILURE; + } + + return 0; +} +} // namespace + +namespace { +int acked_stream_data_offset(ngtcp2_conn *conn, int64_t stream_id, + uint64_t offset, uint64_t datalen, void *user_data, + void *stream_user_data) { + auto c = static_cast(user_data); + if (c->acked_stream_data_offset(stream_id, offset, datalen) != 0) { + return NGTCP2_ERR_CALLBACK_FAILURE; + } + return 0; +} +} // namespace + +namespace { +int handshake_completed(ngtcp2_conn *conn, void *user_data) { + auto c = static_cast(user_data); + + if (!config.quiet) { + debug::handshake_completed(conn, user_data); + } + + if (c->handshake_completed() != 0) { + return NGTCP2_ERR_CALLBACK_FAILURE; + } + + return 0; +} +} // namespace + +int Client::handshake_completed() { + if (early_data_ && !tls_session_.get_early_data_accepted()) { + if (!config.quiet) { + std::cerr << "Early data was rejected by server" << std::endl; + } + + // Some TLS backends only report early data rejection after + // handshake completion (e.g., OpenSSL). For TLS backends which + // report it early (e.g., BoringSSL and PicoTLS), the following + // functions are noop. + if (auto rv = ngtcp2_conn_early_data_rejected(conn_); rv != 0) { + std::cerr << "ngtcp2_conn_early_data_rejected: " << ngtcp2_strerror(rv) + << std::endl; + return -1; + } + } + + if (!config.quiet) { + std::cerr << "Negotiated cipher suite is " << tls_session_.get_cipher_name() + << std::endl; + std::cerr << "Negotiated ALPN is " << tls_session_.get_selected_alpn() + << std::endl; + } + + if (config.tp_file) { + auto params = ngtcp2_conn_get_remote_transport_params(conn_); + + if (write_transport_params(config.tp_file, params) != 0) { + std::cerr << "Could not write transport parameters in " << config.tp_file + << std::endl; + } + } + + return 0; +} + +namespace { +int handshake_confirmed(ngtcp2_conn *conn, void *user_data) { + auto c = static_cast(user_data); + + if (!config.quiet) { + debug::handshake_confirmed(conn, user_data); + } + + if (c->handshake_confirmed() != 0) { + return NGTCP2_ERR_CALLBACK_FAILURE; + } + + return 0; +} +} // namespace + +int Client::handshake_confirmed() { + handshake_confirmed_ = true; + + if (config.change_local_addr) { + start_change_local_addr_timer(); + } + if (config.key_update) { + start_key_update_timer(); + } + if (config.delay_stream) { + start_delay_stream_timer(); + } + + if (should_exit_on_handshake_confirmed_) { + should_exit_ = true; + } + + return 0; +} + +namespace { +int recv_version_negotiation(ngtcp2_conn *conn, const ngtcp2_pkt_hd *hd, + const uint32_t *sv, size_t nsv, void *user_data) { + auto c = static_cast(user_data); + + c->recv_version_negotiation(sv, nsv); + + return 0; +} +} // namespace + +void Client::recv_version_negotiation(const uint32_t *sv, size_t nsv) { + offered_versions_.resize(nsv); + std::copy_n(sv, nsv, std::begin(offered_versions_)); +} + +namespace { +int stream_close(ngtcp2_conn *conn, uint32_t flags, int64_t stream_id, + uint64_t app_error_code, void *user_data, + void *stream_user_data) { + auto c = static_cast(user_data); + + if (c->on_stream_close(stream_id, app_error_code) != 0) { + return NGTCP2_ERR_CALLBACK_FAILURE; + } + + return 0; +} +} // namespace + +namespace { +int extend_max_streams_bidi(ngtcp2_conn *conn, uint64_t max_streams, + void *user_data) { + auto c = static_cast(user_data); + + if (c->on_extend_max_streams() != 0) { + return NGTCP2_ERR_CALLBACK_FAILURE; + } + + return 0; +} +} // namespace + +namespace { +void rand(uint8_t *dest, size_t destlen, const ngtcp2_rand_ctx *rand_ctx) { + auto dis = std::uniform_int_distribution(0, 255); + std::generate(dest, dest + destlen, [&dis]() { return dis(randgen); }); +} +} // namespace + +namespace { +int get_new_connection_id(ngtcp2_conn *conn, ngtcp2_cid *cid, uint8_t *token, + size_t cidlen, void *user_data) { + if (util::generate_secure_random(cid->data, cidlen) != 0) { + return NGTCP2_ERR_CALLBACK_FAILURE; + } + + cid->datalen = cidlen; + if (ngtcp2_crypto_generate_stateless_reset_token( + token, config.static_secret.data(), config.static_secret.size(), + cid) != 0) { + return NGTCP2_ERR_CALLBACK_FAILURE; + } + + return 0; +} +} // namespace + +namespace { +int do_hp_mask(uint8_t *dest, const ngtcp2_crypto_cipher *hp, + const ngtcp2_crypto_cipher_ctx *hp_ctx, const uint8_t *sample) { + if (ngtcp2_crypto_hp_mask(dest, hp, hp_ctx, sample) != 0) { + return NGTCP2_ERR_CALLBACK_FAILURE; + } + + if (!config.quiet && config.show_secret) { + debug::print_hp_mask(dest, NGTCP2_HP_MASKLEN, sample, NGTCP2_HP_SAMPLELEN); + } + + return 0; +} +} // namespace + +namespace { +int update_key(ngtcp2_conn *conn, uint8_t *rx_secret, uint8_t *tx_secret, + ngtcp2_crypto_aead_ctx *rx_aead_ctx, uint8_t *rx_iv, + ngtcp2_crypto_aead_ctx *tx_aead_ctx, uint8_t *tx_iv, + const uint8_t *current_rx_secret, + const uint8_t *current_tx_secret, size_t secretlen, + void *user_data) { + auto c = static_cast(user_data); + + if (c->update_key(rx_secret, tx_secret, rx_aead_ctx, rx_iv, tx_aead_ctx, + tx_iv, current_rx_secret, current_tx_secret, + secretlen) != 0) { + return NGTCP2_ERR_CALLBACK_FAILURE; + } + + return 0; +} +} // namespace + +namespace { +int path_validation(ngtcp2_conn *conn, uint32_t flags, const ngtcp2_path *path, + ngtcp2_path_validation_result res, void *user_data) { + if (!config.quiet) { + debug::path_validation(path, res); + } + + if (flags & NGTCP2_PATH_VALIDATION_FLAG_PREFERRED_ADDR) { + auto c = static_cast(user_data); + + c->set_remote_addr(path->remote); + } + + return 0; +} +} // namespace + +void Client::set_remote_addr(const ngtcp2_addr &remote_addr) { + memcpy(&remote_addr_.su, remote_addr.addr, remote_addr.addrlen); + remote_addr_.len = remote_addr.addrlen; +} + +namespace { +int select_preferred_address(ngtcp2_conn *conn, ngtcp2_path *dest, + const ngtcp2_preferred_addr *paddr, + void *user_data) { + auto c = static_cast(user_data); + Address remote_addr; + + if (config.no_preferred_addr) { + return 0; + } + + if (c->select_preferred_address(remote_addr, paddr) != 0) { + return 0; + } + + auto ep = c->endpoint_for(remote_addr); + if (!ep) { + return NGTCP2_ERR_CALLBACK_FAILURE; + } + + ngtcp2_addr_copy_byte(&dest->local, &(*ep)->addr.su.sa, (*ep)->addr.len); + ngtcp2_addr_copy_byte(&dest->remote, &remote_addr.su.sa, remote_addr.len); + dest->user_data = *ep; + + return 0; +} +} // namespace + +namespace { +int extend_max_stream_data(ngtcp2_conn *conn, int64_t stream_id, + uint64_t max_data, void *user_data, + void *stream_user_data) { + auto c = static_cast(user_data); + if (c->extend_max_stream_data(stream_id, max_data) != 0) { + return NGTCP2_ERR_CALLBACK_FAILURE; + } + return 0; +} +} // namespace + +int Client::extend_max_stream_data(int64_t stream_id, uint64_t max_data) { + auto it = streams_.find(stream_id); + assert(it != std::end(streams_)); + auto &stream = (*it).second; + + if (nghttp3_buf_len(&stream->reqbuf)) { + sendq_.emplace(stream.get()); + } + + return 0; +} + +namespace { +int recv_new_token(ngtcp2_conn *conn, const ngtcp2_vec *token, + void *user_data) { + if (config.token_file.empty()) { + return 0; + } + + auto f = BIO_new_file(config.token_file.data(), "w"); + if (f == nullptr) { + std::cerr << "Could not write token in " << config.token_file << std::endl; + return 0; + } + + PEM_write_bio(f, "QUIC TOKEN", "", token->base, token->len); + BIO_free(f); + + return 0; +} +} // namespace + +namespace { +int early_data_rejected(ngtcp2_conn *conn, void *user_data) { + auto c = static_cast(user_data); + + c->early_data_rejected(); + + return 0; +} +} // namespace + +void Client::early_data_rejected() { + nstreams_done_ = 0; + streams_.clear(); +} + +int Client::init(int fd, const Address &local_addr, const Address &remote_addr, + const char *addr, const char *port, + TLSClientContext &tls_ctx) { + endpoints_.reserve(4); + + endpoints_.emplace_back(); + auto &ep = endpoints_.back(); + ep.addr = local_addr; + ep.client = this; + ep.fd = fd; + ev_io_init(&ep.rev, readcb, fd, EV_READ); + ep.rev.data = &ep; + + remote_addr_ = remote_addr; + addr_ = addr; + port_ = port; + + auto callbacks = ngtcp2_callbacks{ + ngtcp2_crypto_client_initial_cb, + nullptr, // recv_client_initial + ::recv_crypto_data, + ::handshake_completed, + ::recv_version_negotiation, + ngtcp2_crypto_encrypt_cb, + ngtcp2_crypto_decrypt_cb, + do_hp_mask, + ::recv_stream_data, + ::acked_stream_data_offset, + nullptr, // stream_open + stream_close, + nullptr, // recv_stateless_reset + ngtcp2_crypto_recv_retry_cb, + extend_max_streams_bidi, + nullptr, // extend_max_streams_uni + rand, + get_new_connection_id, + nullptr, // remove_connection_id + ::update_key, + path_validation, + ::select_preferred_address, + nullptr, // stream_reset + nullptr, // extend_max_remote_streams_bidi, + nullptr, // extend_max_remote_streams_uni, + ::extend_max_stream_data, + nullptr, // dcid_status + ::handshake_confirmed, + ::recv_new_token, + ngtcp2_crypto_delete_crypto_aead_ctx_cb, + ngtcp2_crypto_delete_crypto_cipher_ctx_cb, + nullptr, // recv_datagram + nullptr, // ack_datagram + nullptr, // lost_datagram + ngtcp2_crypto_get_path_challenge_data_cb, + nullptr, // stream_stop_sending + ngtcp2_crypto_version_negotiation_cb, + nullptr, // recv_rx_key + nullptr, // recv_tx_key + ::early_data_rejected, + }; + + ngtcp2_cid scid, dcid; + scid.datalen = 17; + if (util::generate_secure_random(scid.data, scid.datalen) != 0) { + std::cerr << "Could not generate source connection ID" << std::endl; + return -1; + } + if (config.dcid.datalen == 0) { + dcid.datalen = 18; + if (util::generate_secure_random(dcid.data, dcid.datalen) != 0) { + std::cerr << "Could not generate destination connection ID" << std::endl; + return -1; + } + } else { + dcid = config.dcid; + } + + ngtcp2_settings settings; + ngtcp2_settings_default(&settings); + settings.log_printf = config.quiet ? nullptr : debug::log_printf; + if (!config.qlog_file.empty() || !config.qlog_dir.empty()) { + std::string path; + if (!config.qlog_file.empty()) { + path = config.qlog_file; + } else { + path = std::string{config.qlog_dir}; + path += '/'; + path += util::format_hex(scid.data, scid.datalen); + path += ".sqlog"; + } + qlog_ = fopen(path.c_str(), "w"); + if (qlog_ == nullptr) { + std::cerr << "Could not open qlog file " << std::quoted(path) << ": " + << strerror(errno) << std::endl; + return -1; + } + settings.qlog.write = qlog_write_cb; + } + + settings.cc_algo = config.cc_algo; + settings.initial_ts = util::timestamp(loop_); + settings.initial_rtt = config.initial_rtt; + settings.max_window = config.max_window; + settings.max_stream_window = config.max_stream_window; + if (config.max_udp_payload_size) { + settings.max_tx_udp_payload_size = config.max_udp_payload_size; + settings.no_tx_udp_payload_size_shaping = 1; + } + settings.handshake_timeout = config.handshake_timeout; + settings.no_pmtud = config.no_pmtud; + settings.ack_thresh = config.ack_thresh; + + std::string token; + + if (!config.token_file.empty()) { + std::cerr << "Reading token file " << config.token_file << std::endl; + + auto t = util::read_token(config.token_file); + if (t) { + token = std::move(*t); + settings.token.base = reinterpret_cast(token.data()); + settings.token.len = token.size(); + } + } + + if (!config.other_versions.empty()) { + settings.other_versions = config.other_versions.data(); + settings.other_versionslen = config.other_versions.size(); + } + + if (!config.preferred_versions.empty()) { + settings.preferred_versions = config.preferred_versions.data(); + settings.preferred_versionslen = config.preferred_versions.size(); + } + + settings.original_version = original_version_; + + ngtcp2_transport_params params; + ngtcp2_transport_params_default(¶ms); + params.initial_max_stream_data_bidi_local = config.max_stream_data_bidi_local; + params.initial_max_stream_data_bidi_remote = + config.max_stream_data_bidi_remote; + params.initial_max_stream_data_uni = config.max_stream_data_uni; + params.initial_max_data = config.max_data; + params.initial_max_streams_bidi = config.max_streams_bidi; + params.initial_max_streams_uni = 0; + params.max_idle_timeout = config.timeout; + params.active_connection_id_limit = 7; + + auto path = ngtcp2_path{ + { + const_cast(&ep.addr.su.sa), + ep.addr.len, + }, + { + const_cast(&remote_addr.su.sa), + remote_addr.len, + }, + &ep, + }; + auto rv = ngtcp2_conn_client_new(&conn_, &dcid, &scid, &path, + client_chosen_version_, &callbacks, + &settings, ¶ms, nullptr, this); + + if (rv != 0) { + std::cerr << "ngtcp2_conn_client_new: " << ngtcp2_strerror(rv) << std::endl; + return -1; + } + + if (tls_session_.init(early_data_, tls_ctx, addr_, this, + client_chosen_version_, AppProtocol::HQ) != 0) { + return -1; + } + + ngtcp2_conn_set_tls_native_handle(conn_, tls_session_.get_native_handle()); + + if (early_data_ && config.tp_file) { + ngtcp2_transport_params params; + if (read_transport_params(config.tp_file, ¶ms) != 0) { + std::cerr << "Could not read transport parameters from " << config.tp_file + << std::endl; + early_data_ = false; + } else { + ngtcp2_conn_set_early_remote_transport_params(conn_, ¶ms); + if (make_stream_early() != 0) { + return -1; + } + } + } + + ev_io_start(loop_, &ep.rev); + + ev_signal_start(loop_, &sigintev_); + + return 0; +} + +int Client::feed_data(const Endpoint &ep, const sockaddr *sa, socklen_t salen, + const ngtcp2_pkt_info *pi, uint8_t *data, + size_t datalen) { + auto path = ngtcp2_path{ + { + const_cast(&ep.addr.su.sa), + ep.addr.len, + }, + { + const_cast(sa), + salen, + }, + const_cast(&ep), + }; + if (auto rv = ngtcp2_conn_read_pkt(conn_, &path, pi, data, datalen, + util::timestamp(loop_)); + rv != 0) { + std::cerr << "ngtcp2_conn_read_pkt: " << ngtcp2_strerror(rv) << std::endl; + if (!last_error_.error_code) { + if (rv == NGTCP2_ERR_CRYPTO) { + ngtcp2_connection_close_error_set_transport_error_tls_alert( + &last_error_, ngtcp2_conn_get_tls_alert(conn_), nullptr, 0); + } else { + ngtcp2_connection_close_error_set_transport_error_liberr( + &last_error_, rv, nullptr, 0); + } + } + disconnect(); + return -1; + } + return 0; +} + +int Client::on_read(const Endpoint &ep) { + std::array buf; + sockaddr_union su; + size_t pktcnt = 0; + ngtcp2_pkt_info pi; + + iovec msg_iov; + msg_iov.iov_base = buf.data(); + msg_iov.iov_len = buf.size(); + + msghdr msg{}; + msg.msg_name = &su; + msg.msg_iov = &msg_iov; + msg.msg_iovlen = 1; + + uint8_t msg_ctrl[CMSG_SPACE(sizeof(uint8_t))]; + msg.msg_control = msg_ctrl; + + for (;;) { + msg.msg_namelen = sizeof(su); + msg.msg_controllen = sizeof(msg_ctrl); + + auto nread = recvmsg(ep.fd, &msg, 0); + + if (nread == -1) { + if (errno != EAGAIN && errno != EWOULDBLOCK) { + std::cerr << "recvmsg: " << strerror(errno) << std::endl; + } + break; + } + + pi.ecn = msghdr_get_ecn(&msg, su.storage.ss_family); + + if (!config.quiet) { + std::cerr << "Received packet: local=" + << util::straddr(&ep.addr.su.sa, ep.addr.len) + << " remote=" << util::straddr(&su.sa, msg.msg_namelen) + << " ecn=0x" << std::hex << pi.ecn << std::dec << " " << nread + << " bytes" << std::endl; + } + + if (debug::packet_lost(config.rx_loss_prob)) { + if (!config.quiet) { + std::cerr << "** Simulated incoming packet loss **" << std::endl; + } + break; + } + + if (feed_data(ep, &su.sa, msg.msg_namelen, &pi, buf.data(), nread) != 0) { + return -1; + } + + if (++pktcnt >= 10) { + break; + } + } + + if (should_exit_) { + disconnect(); + return -1; + } + + update_timer(); + + return 0; +} + +int Client::handle_expiry() { + auto now = util::timestamp(loop_); + if (auto rv = ngtcp2_conn_handle_expiry(conn_, now); rv != 0) { + std::cerr << "ngtcp2_conn_handle_expiry: " << ngtcp2_strerror(rv) + << std::endl; + ngtcp2_connection_close_error_set_transport_error_liberr(&last_error_, rv, + nullptr, 0); + disconnect(); + return -1; + } + + return 0; +} + +int Client::on_write() { + if (tx_.send_blocked) { + if (auto rv = send_blocked_packet(); rv != 0) { + return rv; + } + + if (tx_.send_blocked) { + return 0; + } + } + + if (auto rv = write_streams(); rv != 0) { + return rv; + } + + if (should_exit_) { + disconnect(); + return -1; + } + + update_timer(); + return 0; +} + +int Client::write_streams() { + ngtcp2_vec vec; + ngtcp2_path_storage ps; + size_t pktcnt = 0; + auto max_udp_payload_size = ngtcp2_conn_get_max_tx_udp_payload_size(conn_); + auto max_pktcnt = ngtcp2_conn_get_send_quantum(conn_) / max_udp_payload_size; + auto ts = util::timestamp(loop_); + + ngtcp2_path_storage_zero(&ps); + + for (;;) { + int64_t stream_id = -1; + size_t vcnt = 0; + uint32_t flags = NGTCP2_WRITE_STREAM_FLAG_MORE; + Stream *stream = nullptr; + + if (!sendq_.empty() && ngtcp2_conn_get_max_data_left(conn_)) { + stream = *std::begin(sendq_); + + stream_id = stream->stream_id; + vec.base = stream->reqbuf.pos; + vec.len = nghttp3_buf_len(&stream->reqbuf); + vcnt = 1; + flags |= NGTCP2_WRITE_STREAM_FLAG_FIN; + } + + ngtcp2_ssize ndatalen; + ngtcp2_pkt_info pi; + + auto nwrite = ngtcp2_conn_writev_stream( + conn_, &ps.path, &pi, tx_.data.data(), max_udp_payload_size, &ndatalen, + flags, stream_id, &vec, vcnt, ts); + if (nwrite < 0) { + switch (nwrite) { + case NGTCP2_ERR_STREAM_DATA_BLOCKED: + case NGTCP2_ERR_STREAM_SHUT_WR: + assert(ndatalen == -1); + sendq_.erase(std::begin(sendq_)); + continue; + case NGTCP2_ERR_WRITE_MORE: + assert(ndatalen >= 0); + stream->reqbuf.pos += ndatalen; + if (nghttp3_buf_len(&stream->reqbuf) == 0) { + sendq_.erase(std::begin(sendq_)); + } + continue; + } + + assert(ndatalen == -1); + + std::cerr << "ngtcp2_conn_write_stream: " << ngtcp2_strerror(nwrite) + << std::endl; + ngtcp2_connection_close_error_set_transport_error_liberr( + &last_error_, nwrite, nullptr, 0); + disconnect(); + return -1; + } else if (ndatalen >= 0) { + stream->reqbuf.pos += ndatalen; + if (nghttp3_buf_len(&stream->reqbuf) == 0) { + sendq_.erase(std::begin(sendq_)); + } + } + + if (nwrite == 0) { + // We are congestion limited. + ngtcp2_conn_update_pkt_tx_time(conn_, ts); + ev_io_stop(loop_, &wev_); + return 0; + } + + auto &ep = *static_cast(ps.path.user_data); + + if (auto rv = + send_packet(ep, ps.path.remote, pi.ecn, tx_.data.data(), nwrite); + rv != NETWORK_ERR_OK) { + if (rv != NETWORK_ERR_SEND_BLOCKED) { + ngtcp2_connection_close_error_set_transport_error_liberr( + &last_error_, NGTCP2_ERR_INTERNAL, nullptr, 0); + disconnect(); + + return rv; + } + + ngtcp2_conn_update_pkt_tx_time(conn_, ts); + on_send_blocked(ep, ps.path.remote, pi.ecn, nwrite); + + return 0; + } + + if (++pktcnt == max_pktcnt) { + ngtcp2_conn_update_pkt_tx_time(conn_, ts); + start_wev_endpoint(ep); + return 0; + } + } +} + +void Client::update_timer() { + auto expiry = ngtcp2_conn_get_expiry(conn_); + auto now = util::timestamp(loop_); + + if (expiry <= now) { + if (!config.quiet) { + auto t = static_cast(now - expiry) / NGTCP2_SECONDS; + std::cerr << "Timer has already expired: " << t << "s" << std::endl; + } + + ev_feed_event(loop_, &timer_, EV_TIMER); + + return; + } + + auto t = static_cast(expiry - now) / NGTCP2_SECONDS; + if (!config.quiet) { + std::cerr << "Set timer=" << std::fixed << t << "s" << std::defaultfloat + << std::endl; + } + timer_.repeat = t; + ev_timer_again(loop_, &timer_); +} + +#ifdef HAVE_LINUX_RTNETLINK_H +namespace { +int bind_addr(Address &local_addr, int fd, const in_addr_union *iau, + int family) { + addrinfo hints{}; + addrinfo *res, *rp; + + hints.ai_family = family; + hints.ai_socktype = SOCK_DGRAM; + hints.ai_flags = AI_PASSIVE; + + char *node; + std::array nodebuf; + + if (iau) { + if (inet_ntop(family, iau, nodebuf.data(), nodebuf.size()) == nullptr) { + std::cerr << "inet_ntop: " << strerror(errno) << std::endl; + return -1; + } + + node = nodebuf.data(); + } else { + node = nullptr; + } + + if (auto rv = getaddrinfo(node, "0", &hints, &res); rv != 0) { + std::cerr << "getaddrinfo: " << gai_strerror(rv) << std::endl; + return -1; + } + + auto res_d = defer(freeaddrinfo, res); + + for (rp = res; rp; rp = rp->ai_next) { + if (bind(fd, rp->ai_addr, rp->ai_addrlen) != -1) { + break; + } + } + + if (!rp) { + std::cerr << "Could not bind" << std::endl; + return -1; + } + + socklen_t len = sizeof(local_addr.su.storage); + if (getsockname(fd, &local_addr.su.sa, &len) == -1) { + std::cerr << "getsockname: " << strerror(errno) << std::endl; + return -1; + } + local_addr.len = len; + local_addr.ifindex = 0; + + return 0; +} +} // namespace +#endif // HAVE_LINUX_RTNETLINK_H + +#ifndef HAVE_LINUX_RTNETLINK_H +namespace { +int connect_sock(Address &local_addr, int fd, const Address &remote_addr) { + if (connect(fd, &remote_addr.su.sa, remote_addr.len) != 0) { + std::cerr << "connect: " << strerror(errno) << std::endl; + return -1; + } + + socklen_t len = sizeof(local_addr.su.storage); + if (getsockname(fd, &local_addr.su.sa, &len) == -1) { + std::cerr << "getsockname: " << strerror(errno) << std::endl; + return -1; + } + local_addr.len = len; + local_addr.ifindex = 0; + + return 0; +} +} // namespace +#endif // !HAVE_LINUX_RTNETLINK_H + +namespace { +int udp_sock(int family) { + auto fd = util::create_nonblock_socket(family, SOCK_DGRAM, IPPROTO_UDP); + if (fd == -1) { + return -1; + } + + fd_set_recv_ecn(fd, family); + fd_set_ip_mtu_discover(fd, family); + fd_set_ip_dontfrag(fd, family); + + return fd; +} +} // namespace + +namespace { +int create_sock(Address &remote_addr, const char *addr, const char *port) { + addrinfo hints{}; + addrinfo *res, *rp; + + hints.ai_family = AF_UNSPEC; + hints.ai_socktype = SOCK_DGRAM; + + if (auto rv = getaddrinfo(addr, port, &hints, &res); rv != 0) { + std::cerr << "getaddrinfo: " << gai_strerror(rv) << std::endl; + return -1; + } + + auto res_d = defer(freeaddrinfo, res); + + int fd = -1; + + for (rp = res; rp; rp = rp->ai_next) { + fd = udp_sock(rp->ai_family); + if (fd == -1) { + continue; + } + + break; + } + + if (!rp) { + std::cerr << "Could not create socket" << std::endl; + return -1; + } + + remote_addr.len = rp->ai_addrlen; + memcpy(&remote_addr.su, rp->ai_addr, rp->ai_addrlen); + + return fd; +} +} // namespace + +std::optional Client::endpoint_for(const Address &remote_addr) { +#ifdef HAVE_LINUX_RTNETLINK_H + in_addr_union iau; + + if (get_local_addr(iau, remote_addr) != 0) { + std::cerr << "Could not get local address for a selected preferred address" + << std::endl; + return nullptr; + } + + auto current_path = ngtcp2_conn_get_path(conn_); + auto current_ep = static_cast(current_path->user_data); + if (addreq(¤t_ep->addr.su.sa, iau)) { + return current_ep; + } +#endif // HAVE_LINUX_RTNETLINK_H + + auto fd = udp_sock(remote_addr.su.sa.sa_family); + if (fd == -1) { + return nullptr; + } + + Address local_addr; + +#ifdef HAVE_LINUX_RTNETLINK_H + if (bind_addr(local_addr, fd, &iau, remote_addr.su.sa.sa_family) != 0) { + close(fd); + return nullptr; + } +#else // !HAVE_LINUX_RTNETLINK_H + if (connect_sock(local_addr, fd, remote_addr) != 0) { + close(fd); + return nullptr; + } +#endif // !HAVE_LINUX_RTNETLINK_H + + endpoints_.emplace_back(); + auto &ep = endpoints_.back(); + ep.addr = local_addr; + ep.client = this; + ep.fd = fd; + ev_io_init(&ep.rev, readcb, fd, EV_READ); + ep.rev.data = &ep; + + ev_io_start(loop_, &ep.rev); + + return &ep; +} + +void Client::start_change_local_addr_timer() { + ev_timer_start(loop_, &change_local_addr_timer_); +} + +int Client::change_local_addr() { + Address local_addr; + + if (!config.quiet) { + std::cerr << "Changing local address" << std::endl; + } + + auto nfd = udp_sock(remote_addr_.su.sa.sa_family); + if (nfd == -1) { + return -1; + } + +#ifdef HAVE_LINUX_RTNETLINK_H + in_addr_union iau; + + if (get_local_addr(iau, remote_addr_) != 0) { + std::cerr << "Could not get local address" << std::endl; + close(nfd); + return -1; + } + + if (bind_addr(local_addr, nfd, &iau, remote_addr_.su.sa.sa_family) != 0) { + close(nfd); + return -1; + } +#else // !HAVE_LINUX_RTNETLINK_H + if (connect_sock(local_addr, nfd, remote_addr_) != 0) { + close(nfd); + return -1; + } +#endif // !HAVE_LINUX_RTNETLINK_H + + if (!config.quiet) { + std::cerr << "Local address is now " + << util::straddr(&local_addr.su.sa, local_addr.len) << std::endl; + } + + endpoints_.emplace_back(); + auto &ep = endpoints_.back(); + ep.addr = local_addr; + ep.client = this; + ep.fd = nfd; + ev_io_init(&ep.rev, readcb, nfd, EV_READ); + ep.rev.data = &ep; + + ngtcp2_addr addr; + ngtcp2_addr_init(&addr, &local_addr.su.sa, local_addr.len); + + if (config.nat_rebinding) { + ngtcp2_conn_set_local_addr(conn_, &addr); + ngtcp2_conn_set_path_user_data(conn_, &ep); + } else { + auto path = ngtcp2_path{ + addr, + { + const_cast(&remote_addr_.su.sa), + remote_addr_.len, + }, + &ep, + }; + if (auto rv = ngtcp2_conn_initiate_immediate_migration( + conn_, &path, util::timestamp(loop_)); + rv != 0) { + std::cerr << "ngtcp2_conn_initiate_immediate_migration: " + << ngtcp2_strerror(rv) << std::endl; + } + } + + ev_io_start(loop_, &ep.rev); + + return 0; +} + +void Client::start_key_update_timer() { + ev_timer_start(loop_, &key_update_timer_); +} + +int Client::update_key(uint8_t *rx_secret, uint8_t *tx_secret, + ngtcp2_crypto_aead_ctx *rx_aead_ctx, uint8_t *rx_iv, + ngtcp2_crypto_aead_ctx *tx_aead_ctx, uint8_t *tx_iv, + const uint8_t *current_rx_secret, + const uint8_t *current_tx_secret, size_t secretlen) { + if (!config.quiet) { + std::cerr << "Updating traffic key" << std::endl; + } + + auto crypto_ctx = ngtcp2_conn_get_crypto_ctx(conn_); + auto aead = &crypto_ctx->aead; + auto keylen = ngtcp2_crypto_aead_keylen(aead); + auto ivlen = ngtcp2_crypto_packet_protection_ivlen(aead); + + ++nkey_update_; + + std::array rx_key, tx_key; + + if (ngtcp2_crypto_update_key(conn_, rx_secret, tx_secret, rx_aead_ctx, + rx_key.data(), rx_iv, tx_aead_ctx, tx_key.data(), + tx_iv, current_rx_secret, current_tx_secret, + secretlen) != 0) { + return -1; + } + + if (!config.quiet && config.show_secret) { + std::cerr << "application_traffic rx secret " << nkey_update_ << std::endl; + debug::print_secrets(rx_secret, secretlen, rx_key.data(), keylen, rx_iv, + ivlen); + std::cerr << "application_traffic tx secret " << nkey_update_ << std::endl; + debug::print_secrets(tx_secret, secretlen, tx_key.data(), keylen, tx_iv, + ivlen); + } + + return 0; +} + +int Client::initiate_key_update() { + if (!config.quiet) { + std::cerr << "Initiate key update" << std::endl; + } + + if (auto rv = ngtcp2_conn_initiate_key_update(conn_, util::timestamp(loop_)); + rv != 0) { + std::cerr << "ngtcp2_conn_initiate_key_update: " << ngtcp2_strerror(rv) + << std::endl; + return -1; + } + + return 0; +} + +void Client::start_delay_stream_timer() { + ev_timer_start(loop_, &delay_stream_timer_); +} + +int Client::send_packet(const Endpoint &ep, const ngtcp2_addr &remote_addr, + unsigned int ecn, const uint8_t *data, size_t datalen) { + if (debug::packet_lost(config.tx_loss_prob)) { + if (!config.quiet) { + std::cerr << "** Simulated outgoing packet loss **" << std::endl; + } + return NETWORK_ERR_OK; + } + + iovec msg_iov; + msg_iov.iov_base = const_cast(data); + msg_iov.iov_len = datalen; + + msghdr msg{}; +#ifdef HAVE_LINUX_RTNETLINK_H + msg.msg_name = const_cast(remote_addr.addr); + msg.msg_namelen = remote_addr.addrlen; +#endif // HAVE_LINUX_RTNETLINK_H + msg.msg_iov = &msg_iov; + msg.msg_iovlen = 1; + + fd_set_ecn(ep.fd, remote_addr.addr->sa_family, ecn); + + ssize_t nwrite = 0; + + do { + nwrite = sendmsg(ep.fd, &msg, 0); + } while (nwrite == -1 && errno == EINTR); + + if (nwrite == -1) { + if (errno == EAGAIN || errno == EWOULDBLOCK) { + return NETWORK_ERR_SEND_BLOCKED; + } + std::cerr << "sendmsg: " << strerror(errno) << std::endl; + if (errno == EMSGSIZE) { + return 0; + } + return NETWORK_ERR_FATAL; + } + + assert(static_cast(nwrite) == datalen); + + if (!config.quiet) { + std::cerr << "Sent packet: local=" + << util::straddr(&ep.addr.su.sa, ep.addr.len) << " remote=" + << util::straddr(remote_addr.addr, remote_addr.addrlen) + << " ecn=0x" << std::hex << ecn << std::dec << " " << nwrite + << " bytes" << std::endl; + } + + return NETWORK_ERR_OK; +} + +void Client::on_send_blocked(const Endpoint &ep, const ngtcp2_addr &remote_addr, + unsigned int ecn, size_t datalen) { + assert(!tx_.send_blocked); + + tx_.send_blocked = true; + + memcpy(&tx_.blocked.remote_addr.su, remote_addr.addr, remote_addr.addrlen); + tx_.blocked.remote_addr.len = remote_addr.addrlen; + tx_.blocked.ecn = ecn; + tx_.blocked.datalen = datalen; + tx_.blocked.endpoint = &ep; + + start_wev_endpoint(ep); +} + +void Client::start_wev_endpoint(const Endpoint &ep) { + // We do not close ep.fd, so we can expect that each Endpoint has + // unique fd. + if (ep.fd != wev_.fd) { + if (ev_is_active(&wev_)) { + ev_io_stop(loop_, &wev_); + } + + ev_io_set(&wev_, ep.fd, EV_WRITE); + } + + ev_io_start(loop_, &wev_); +} + +int Client::send_blocked_packet() { + assert(tx_.send_blocked); + + ngtcp2_addr remote_addr{ + .addr = &tx_.blocked.remote_addr.su.sa, + .addrlen = tx_.blocked.remote_addr.len, + }; + + auto rv = send_packet(*tx_.blocked.endpoint, remote_addr, tx_.blocked.ecn, + tx_.data.data(), tx_.blocked.datalen); + if (rv != 0) { + if (rv == NETWORK_ERR_SEND_BLOCKED) { + assert(wev_.fd == tx_.blocked.endpoint->fd); + + ev_io_start(loop_, &wev_); + + return 0; + } + + ngtcp2_connection_close_error_set_transport_error_liberr( + &last_error_, NGTCP2_ERR_INTERNAL, nullptr, 0); + disconnect(); + + return rv; + } + + tx_.send_blocked = false; + + return 0; +} + +int Client::handle_error() { + if (!conn_ || ngtcp2_conn_is_in_closing_period(conn_) || + ngtcp2_conn_is_in_draining_period(conn_)) { + return 0; + } + + std::array buf; + + ngtcp2_path_storage ps; + + ngtcp2_path_storage_zero(&ps); + + ngtcp2_pkt_info pi; + + auto nwrite = ngtcp2_conn_write_connection_close( + conn_, &ps.path, &pi, buf.data(), buf.size(), &last_error_, + util::timestamp(loop_)); + if (nwrite < 0) { + std::cerr << "ngtcp2_conn_write_connection_close: " + << ngtcp2_strerror(nwrite) << std::endl; + return -1; + } + + if (nwrite == 0) { + return 0; + } + + return send_packet(*static_cast(ps.path.user_data), + ps.path.remote, pi.ecn, buf.data(), nwrite); +} + +int Client::on_stream_close(int64_t stream_id, uint64_t app_error_code) { + auto it = streams_.find(stream_id); + assert(it != std::end(streams_)); + auto &stream = (*it).second; + + sendq_.erase(stream.get()); + + ++nstreams_closed_; + + if (config.exit_on_first_stream_close || + (config.exit_on_all_streams_close && config.nstreams == nstreams_done_ && + nstreams_closed_ == nstreams_done_)) { + if (handshake_confirmed_) { + should_exit_ = true; + } else { + should_exit_on_handshake_confirmed_ = true; + } + } + + if (!ngtcp2_is_bidi_stream(stream_id)) { + assert(!ngtcp2_conn_is_local_stream(conn_, stream_id)); + ngtcp2_conn_extend_max_streams_uni(conn_, 1); + } + + if (!config.quiet) { + std::cerr << "HTTP stream " << stream_id << " closed with error code " + << app_error_code << std::endl; + } + streams_.erase(it); + + return 0; +} + +int Client::make_stream_early() { return on_extend_max_streams(); } + +int Client::on_extend_max_streams() { + int64_t stream_id; + + if ((config.delay_stream && !handshake_confirmed_) || + ev_is_active(&delay_stream_timer_)) { + return 0; + } + + for (; nstreams_done_ < config.nstreams; ++nstreams_done_) { + if (auto rv = ngtcp2_conn_open_bidi_stream(conn_, &stream_id, nullptr); + rv != 0) { + assert(NGTCP2_ERR_STREAM_ID_BLOCKED == rv); + break; + } + + auto stream = std::make_unique( + config.requests[nstreams_done_ % config.requests.size()], stream_id); + + if (submit_http_request(stream.get()) != 0) { + break; + } + + if (!config.download.empty()) { + stream->open_file(stream->req.path); + } + streams_.emplace(stream_id, std::move(stream)); + } + return 0; +} + +int Client::submit_http_request(Stream *stream) { + const auto &req = stream->req; + + stream->rawreqbuf = config.http_method; + stream->rawreqbuf += ' '; + stream->rawreqbuf += req.path; + stream->rawreqbuf += "\r\n"; + + nghttp3_buf_init(&stream->reqbuf); + stream->reqbuf.begin = reinterpret_cast(stream->rawreqbuf.data()); + stream->reqbuf.pos = stream->reqbuf.begin; + stream->reqbuf.end = stream->reqbuf.last = + stream->reqbuf.begin + stream->rawreqbuf.size(); + + if (!config.quiet) { + auto nva = std::array{ + util::make_nv_nn(":method", config.http_method), + util::make_nv_nn(":path", req.path), + }; + debug::print_http_request_headers(stream->stream_id, nva.data(), + nva.size()); + } + + sendq_.emplace(stream); + + return 0; +} + +int Client::recv_stream_data(uint32_t flags, int64_t stream_id, + const uint8_t *data, size_t datalen) { + auto it = streams_.find(stream_id); + assert(it != std::end(streams_)); + auto &stream = (*it).second; + + ngtcp2_conn_extend_max_stream_offset(conn_, stream_id, datalen); + ngtcp2_conn_extend_max_offset(conn_, datalen); + + if (stream->fd == -1) { + return 0; + } + + ssize_t nwrite; + do { + nwrite = write(stream->fd, data, datalen); + } while (nwrite == -1 && errno == EINTR); + + return 0; +} + +int Client::acked_stream_data_offset(int64_t stream_id, uint64_t offset, + uint64_t datalen) { + auto it = streams_.find(stream_id); + assert(it != std::end(streams_)); + auto &stream = (*it).second; + (void)stream; + assert(static_cast(stream->reqbuf.end - stream->reqbuf.begin) >= + offset + datalen); + return 0; +} + +int Client::select_preferred_address(Address &selected_addr, + const ngtcp2_preferred_addr *paddr) { + auto path = ngtcp2_conn_get_path(conn_); + + switch (path->local.addr->sa_family) { + case AF_INET: + if (!paddr->ipv4_present) { + return -1; + } + selected_addr.su.in = paddr->ipv4; + selected_addr.len = sizeof(paddr->ipv4); + break; + case AF_INET6: + if (!paddr->ipv6_present) { + return -1; + } + selected_addr.su.in6 = paddr->ipv6; + selected_addr.len = sizeof(paddr->ipv6); + break; + default: + return -1; + } + + char host[NI_MAXHOST], service[NI_MAXSERV]; + if (auto rv = getnameinfo(&selected_addr.su.sa, selected_addr.len, host, + sizeof(host), service, sizeof(service), + NI_NUMERICHOST | NI_NUMERICSERV); + rv != 0) { + std::cerr << "getnameinfo: " << gai_strerror(rv) << std::endl; + return -1; + } + + if (!config.quiet) { + std::cerr << "selected server preferred_address is [" << host + << "]:" << service << std::endl; + } + + return 0; +} + +const std::vector &Client::get_offered_versions() const { + return offered_versions_; +} + +namespace { +int run(Client &c, const char *addr, const char *port, + TLSClientContext &tls_ctx) { + Address remote_addr, local_addr; + + auto fd = create_sock(remote_addr, addr, port); + if (fd == -1) { + return -1; + } + +#ifdef HAVE_LINUX_RTNETLINK_H + in_addr_union iau; + + if (get_local_addr(iau, remote_addr) != 0) { + std::cerr << "Could not get local address" << std::endl; + close(fd); + return -1; + } + + if (bind_addr(local_addr, fd, &iau, remote_addr.su.sa.sa_family) != 0) { + close(fd); + return -1; + } +#else // !HAVE_LINUX_RTNETLINK_H + if (connect_sock(local_addr, fd, remote_addr) != 0) { + close(fd); + return -1; + } +#endif // !HAVE_LINUX_RTNETLINK_H + + if (c.init(fd, local_addr, remote_addr, addr, port, tls_ctx) != 0) { + return -1; + } + + // TODO Do we need this ? + if (auto rv = c.on_write(); rv != 0) { + return rv; + } + + ev_run(EV_DEFAULT, 0); + + return 0; +} +} // namespace + +namespace { +std::string_view get_string(const char *uri, const http_parser_url &u, + http_parser_url_fields f) { + auto p = &u.field_data[f]; + return {uri + p->off, p->len}; +} +} // namespace + +namespace { +int parse_uri(Request &req, const char *uri) { + http_parser_url u; + + http_parser_url_init(&u); + if (http_parser_parse_url(uri, strlen(uri), /* is_connect = */ 0, &u) != 0) { + return -1; + } + + if (!(u.field_set & (1 << UF_SCHEMA)) || !(u.field_set & (1 << UF_HOST))) { + return -1; + } + + req.scheme = get_string(uri, u, UF_SCHEMA); + + req.authority = get_string(uri, u, UF_HOST); + if (util::numeric_host(req.authority.c_str(), AF_INET6)) { + req.authority = '[' + req.authority + ']'; + } + if (u.field_set & (1 << UF_PORT)) { + req.authority += ':'; + req.authority += get_string(uri, u, UF_PORT); + } + + if (u.field_set & (1 << UF_PATH)) { + req.path = get_string(uri, u, UF_PATH); + } else { + req.path = "/"; + } + + if (u.field_set & (1 << UF_QUERY)) { + req.path += '?'; + req.path += get_string(uri, u, UF_QUERY); + } + + return 0; +} +} // namespace + +namespace { +int parse_requests(char **argv, size_t argvlen) { + for (size_t i = 0; i < argvlen; ++i) { + auto uri = argv[i]; + Request req; + if (parse_uri(req, uri) != 0) { + std::cerr << "Could not parse URI: " << uri << std::endl; + return -1; + } + config.requests.emplace_back(std::move(req)); + } + return 0; +} +} // namespace + +std::ofstream keylog_file; + +namespace { +void print_usage() { + std::cerr << "Usage: h09client [OPTIONS] [...]" + << std::endl; +} +} // namespace + +namespace { +void config_set_default(Config &config) { + config = Config{}; + config.tx_loss_prob = 0.; + config.rx_loss_prob = 0.; + config.fd = -1; + config.ciphers = util::crypto_default_ciphers(); + config.groups = util::crypto_default_groups(); + config.nstreams = 0; + config.data = nullptr; + config.datalen = 0; + config.version = NGTCP2_PROTO_VER_V1; + config.timeout = 30 * NGTCP2_SECONDS; + config.http_method = "GET"sv; + config.max_data = 15_m; + config.max_stream_data_bidi_local = 6_m; + config.max_stream_data_bidi_remote = 6_m; + config.max_stream_data_uni = 6_m; + config.max_window = 24_m; + config.max_stream_window = 16_m; + config.max_streams_uni = 100; + config.cc_algo = NGTCP2_CC_ALGO_CUBIC; + config.initial_rtt = NGTCP2_DEFAULT_INITIAL_RTT; + config.handshake_timeout = NGTCP2_DEFAULT_HANDSHAKE_TIMEOUT; + config.ack_thresh = 2; +} +} // namespace + +namespace { +void print_help() { + print_usage(); + + config_set_default(config); + + std::cout << R"( + Remote server host (DNS name or IP address). In case of + DNS name, it will be sent in TLS SNI extension. + Remote server port + Remote URI +Options: + -t, --tx-loss=

+ The probability of losing outgoing packets.

must be + [0.0, 1.0], inclusive. 0.0 means no packet loss. 1.0 + means 100% packet loss. + -r, --rx-loss=

+ The probability of losing incoming packets.

must be + [0.0, 1.0], inclusive. 0.0 means no packet loss. 1.0 + means 100% packet loss. + -d, --data= + Read data from , and send them as STREAM data. + -n, --nstreams= + The number of requests. s are used in the order of + appearance in the command-line. If the number of + list is less than , list is wrapped. It + defaults to 0 which means the number of specified. + -v, --version= + Specify QUIC version to use in hex string. If the given + version is not supported by libngtcp2, client will use + QUIC v1 long packet types. Instead of specifying hex + string, there are special aliases available: "v1" + indicates QUIC v1, and "v2draft" indicates QUIC v2 + draft. + Default: )" + << std::hex << "0x" << config.version << std::dec << R"( + --preferred-versions=[[,]...] + Specify QUIC versions in hex string in the order of + preference. Client chooses one of those versions if + client received Version Negotiation packet from server. + These versions must be supported by libngtcp2. Instead + of specifying hex string, there are special aliases + available: "v1" indicates QUIC v1, and "v2draft" + indicates QUIC v2 draft. + --other-versions=[[,]...] + Specify QUIC versions in hex string that are sent in + other_versions field of version_information transport + parameter. This list can include a version which is not + supported by libngtcp2. Instead of specifying hex + string, there are special aliases available: "v1" + indicates QUIC v1, and "v2draft" indicates QUIC v2 + draft. + -q, --quiet Suppress debug output. + -s, --show-secret + Print out secrets unless --quiet is used. + --timeout= + Specify idle timeout. + Default: )" + << util::format_duration(config.timeout) << R"( + --ciphers= + Specify the cipher suite list to enable. + Default: )" + << config.ciphers << R"( + --groups= + Specify the supported groups. + Default: )" + << config.groups << R"( + --session-file= + Read/write TLS session from/to . To resume a + session, the previous session must be supplied with this + option. + --tp-file= + Read/write QUIC transport parameters from/to . To + send 0-RTT data, the transport parameters received from + the previous session must be supplied with this option. + --dcid= + Specify initial DCID. is hex string. When + decoded as binary, it should be at least 8 bytes and at + most 18 bytes long. + --change-local-addr= + Client changes local address when elapse + after handshake completes. + --nat-rebinding + When used with --change-local-addr, simulate NAT + rebinding. In other words, client changes local + address, but it does not start path validation. + --key-update= + Client initiates key update when elapse after + handshake completes. + -m, --http-method= + Specify HTTP method. Default: )" + << config.http_method << R"( + --delay-stream= + Delay sending STREAM data in 1-RTT for after + handshake completes. + --no-preferred-addr + Do not try to use preferred address offered by server. + --key= + The path to client private key PEM file. + --cert= + The path to client certificate PEM file. + --download= + The path to the directory to save a downloaded content. + It is undefined if 2 concurrent requests write to the + same file. If a request path does not contain a path + component usable as a file name, it defaults to + "index.html". + --no-quic-dump + Disables printing QUIC STREAM and CRYPTO frame data out. + --no-http-dump + Disables printing HTTP response body out. + --qlog-file= + The path to write qlog. This option and --qlog-dir are + mutually exclusive. + --qlog-dir= + Path to the directory where qlog file is stored. The + file name of each qlog is the Source Connection ID of + client. This option and --qlog-file are mutually + exclusive. + --max-data= + The initial connection-level flow control window. + Default: )" + << util::format_uint_iec(config.max_data) << R"( + --max-stream-data-bidi-local= + The initial stream-level flow control window for a + bidirectional stream that the local endpoint initiates. + Default: )" + << util::format_uint_iec(config.max_stream_data_bidi_local) << R"( + --max-stream-data-bidi-remote= + The initial stream-level flow control window for a + bidirectional stream that the remote endpoint initiates. + Default: )" + << util::format_uint_iec(config.max_stream_data_bidi_remote) << R"( + --max-stream-data-uni= + The initial stream-level flow control window for a + unidirectional stream. + Default: )" + << util::format_uint_iec(config.max_stream_data_uni) << R"( + --max-streams-bidi= + The number of the concurrent bidirectional streams. + Default: )" + << config.max_streams_bidi << R"( + --max-streams-uni= + The number of the concurrent unidirectional streams. + Default: )" + << config.max_streams_uni << R"( + --exit-on-first-stream-close + Exit when a first HTTP stream is closed. + --exit-on-all-streams-close + Exit when all HTTP streams are closed. + --disable-early-data + Disable early data. + --cc=(cubic|reno|bbr|bbr2) + The name of congestion controller algorithm. + Default: )" + << util::strccalgo(config.cc_algo) << R"( + --token-file= + Read/write token from/to . Token is obtained from + NEW_TOKEN frame from server. + --sni= + Send in TLS SNI, overriding the DNS name + specified in . + --initial-rtt= + Set an initial RTT. + Default: )" + << util::format_duration(config.initial_rtt) << R"( + --max-window= + Maximum connection-level flow control window size. The + window auto-tuning is enabled if nonzero value is given, + and window size is scaled up to this value. + Default: )" + << util::format_uint_iec(config.max_window) << R"( + --max-stream-window= + Maximum stream-level flow control window size. The + window auto-tuning is enabled if nonzero value is given, + and window size is scaled up to this value. + Default: )" + << util::format_uint_iec(config.max_stream_window) << R"( + --max-udp-payload-size= + Override maximum UDP payload size that client transmits. + --handshake-timeout= + Set the QUIC handshake timeout. + Default: )" + << util::format_duration(config.handshake_timeout) << R"( + --no-pmtud Disables Path MTU Discovery. + --ack-thresh= + The minimum number of the received ACK eliciting packets + that triggers immediate acknowledgement. + Default: )" + << config.ack_thresh << R"( + -h, --help Display this help and exit. + +--- + + The argument is an integer and an optional unit (e.g., 10K is + 10 * 1024). Units are K, M and G (powers of 1024). + + The argument is an integer and an optional unit (e.g., 1s + is 1 second and 500ms is 500 milliseconds). Units are h, m, s, ms, + us, or ns (hours, minutes, seconds, milliseconds, microseconds, and + nanoseconds respectively). If a unit is omitted, a second is used + as unit. + + The argument is an hex string which must start with "0x" + (e.g., 0x00000001).)" + << std::endl; +} +} // namespace + +int main(int argc, char **argv) { + config_set_default(config); + char *data_path = nullptr; + const char *private_key_file = nullptr; + const char *cert_file = nullptr; + + for (;;) { + static int flag = 0; + constexpr static option long_opts[] = { + {"help", no_argument, nullptr, 'h'}, + {"tx-loss", required_argument, nullptr, 't'}, + {"rx-loss", required_argument, nullptr, 'r'}, + {"data", required_argument, nullptr, 'd'}, + {"http-method", required_argument, nullptr, 'm'}, + {"nstreams", required_argument, nullptr, 'n'}, + {"version", required_argument, nullptr, 'v'}, + {"quiet", no_argument, nullptr, 'q'}, + {"show-secret", no_argument, nullptr, 's'}, + {"ciphers", required_argument, &flag, 1}, + {"groups", required_argument, &flag, 2}, + {"timeout", required_argument, &flag, 3}, + {"session-file", required_argument, &flag, 4}, + {"tp-file", required_argument, &flag, 5}, + {"dcid", required_argument, &flag, 6}, + {"change-local-addr", required_argument, &flag, 7}, + {"key-update", required_argument, &flag, 8}, + {"nat-rebinding", no_argument, &flag, 9}, + {"delay-stream", required_argument, &flag, 10}, + {"no-preferred-addr", no_argument, &flag, 11}, + {"key", required_argument, &flag, 12}, + {"cert", required_argument, &flag, 13}, + {"download", required_argument, &flag, 14}, + {"no-quic-dump", no_argument, &flag, 15}, + {"no-http-dump", no_argument, &flag, 16}, + {"qlog-file", required_argument, &flag, 17}, + {"max-data", required_argument, &flag, 18}, + {"max-stream-data-bidi-local", required_argument, &flag, 19}, + {"max-stream-data-bidi-remote", required_argument, &flag, 20}, + {"max-stream-data-uni", required_argument, &flag, 21}, + {"max-streams-bidi", required_argument, &flag, 22}, + {"max-streams-uni", required_argument, &flag, 23}, + {"exit-on-first-stream-close", no_argument, &flag, 24}, + {"disable-early-data", no_argument, &flag, 25}, + {"qlog-dir", required_argument, &flag, 26}, + {"cc", required_argument, &flag, 27}, + {"exit-on-all-streams-close", no_argument, &flag, 28}, + {"token-file", required_argument, &flag, 29}, + {"sni", required_argument, &flag, 30}, + {"initial-rtt", required_argument, &flag, 31}, + {"max-window", required_argument, &flag, 32}, + {"max-stream-window", required_argument, &flag, 33}, + {"max-udp-payload-size", required_argument, &flag, 35}, + {"handshake-timeout", required_argument, &flag, 36}, + {"other-versions", required_argument, &flag, 37}, + {"no-pmtud", no_argument, &flag, 38}, + {"preferred-versions", required_argument, &flag, 39}, + {"ack-thresh", required_argument, &flag, 40}, + {nullptr, 0, nullptr, 0}, + }; + + auto optidx = 0; + auto c = getopt_long(argc, argv, "d:him:n:qr:st:v:", long_opts, &optidx); + if (c == -1) { + break; + } + switch (c) { + case 'd': + // --data + data_path = optarg; + break; + case 'h': + // --help + print_help(); + exit(EXIT_SUCCESS); + case 'm': + // --http-method + config.http_method = optarg; + break; + case 'n': + // --streams + if (auto n = util::parse_uint(optarg); !n) { + std::cerr << "streams: invalid argument" << std::endl; + exit(EXIT_FAILURE); + } else if (*n > NGTCP2_MAX_VARINT) { + std::cerr << "streams: must not exceed " << NGTCP2_MAX_VARINT + << std::endl; + exit(EXIT_FAILURE); + } else { + config.nstreams = *n; + } + break; + case 'q': + // --quiet + config.quiet = true; + break; + case 'r': + // --rx-loss + config.rx_loss_prob = strtod(optarg, nullptr); + break; + case 's': + // --show-secret + config.show_secret = true; + break; + case 't': + // --tx-loss + config.tx_loss_prob = strtod(optarg, nullptr); + break; + case 'v': { + // --version + if (optarg == "v1"sv) { + config.version = NGTCP2_PROTO_VER_V1; + break; + } + if (optarg == "v2draft"sv) { + config.version = NGTCP2_PROTO_VER_V2_DRAFT; + break; + } + auto rv = util::parse_version(optarg); + if (!rv) { + std::cerr << "version: invalid version " << std::quoted(optarg) + << std::endl; + exit(EXIT_FAILURE); + } + config.version = *rv; + break; + } + case '?': + print_usage(); + exit(EXIT_FAILURE); + case 0: + switch (flag) { + case 1: + // --ciphers + config.ciphers = optarg; + break; + case 2: + // --groups + config.groups = optarg; + break; + case 3: + // --timeout + if (auto t = util::parse_duration(optarg); !t) { + std::cerr << "timeout: invalid argument" << std::endl; + exit(EXIT_FAILURE); + } else { + config.timeout = *t; + } + break; + case 4: + // --session-file + config.session_file = optarg; + break; + case 5: + // --tp-file + config.tp_file = optarg; + break; + case 6: { + // --dcid + auto dcidlen2 = strlen(optarg); + if (dcidlen2 % 2 || dcidlen2 / 2 < 8 || dcidlen2 / 2 > 18) { + std::cerr << "dcid: wrong length" << std::endl; + exit(EXIT_FAILURE); + } + auto dcid = util::decode_hex(optarg); + ngtcp2_cid_init(&config.dcid, + reinterpret_cast(dcid.c_str()), + dcid.size()); + break; + } + case 7: + // --change-local-addr + if (auto t = util::parse_duration(optarg); !t) { + std::cerr << "change-local-addr: invalid argument" << std::endl; + exit(EXIT_FAILURE); + } else { + config.change_local_addr = *t; + } + break; + case 8: + // --key-update + if (auto t = util::parse_duration(optarg); !t) { + std::cerr << "key-update: invalid argument" << std::endl; + exit(EXIT_FAILURE); + } else { + config.key_update = *t; + } + break; + case 9: + // --nat-rebinding + config.nat_rebinding = true; + break; + case 10: + // --delay-stream + if (auto t = util::parse_duration(optarg); !t) { + std::cerr << "delay-stream: invalid argument" << std::endl; + exit(EXIT_FAILURE); + } else { + config.delay_stream = *t; + } + break; + case 11: + // --no-preferred-addr + config.no_preferred_addr = true; + break; + case 12: + // --key + private_key_file = optarg; + break; + case 13: + // --cert + cert_file = optarg; + break; + case 14: + // --download + config.download = optarg; + break; + case 15: + // --no-quic-dump + config.no_quic_dump = true; + break; + case 16: + // --no-http-dump + config.no_http_dump = true; + break; + case 17: + // --qlog-file + config.qlog_file = optarg; + break; + case 18: + // --max-data + if (auto n = util::parse_uint_iec(optarg); !n) { + std::cerr << "max-data: invalid argument" << std::endl; + exit(EXIT_FAILURE); + } else { + config.max_data = *n; + } + break; + case 19: + // --max-stream-data-bidi-local + if (auto n = util::parse_uint_iec(optarg); !n) { + std::cerr << "max-stream-data-bidi-local: invalid argument" + << std::endl; + exit(EXIT_FAILURE); + } else { + config.max_stream_data_bidi_local = *n; + } + break; + case 20: + // --max-stream-data-bidi-remote + if (auto n = util::parse_uint_iec(optarg); !n) { + std::cerr << "max-stream-data-bidi-remote: invalid argument" + << std::endl; + exit(EXIT_FAILURE); + } else { + config.max_stream_data_bidi_remote = *n; + } + break; + case 21: + // --max-stream-data-uni + if (auto n = util::parse_uint_iec(optarg); !n) { + std::cerr << "max-stream-data-uni: invalid argument" << std::endl; + exit(EXIT_FAILURE); + } else { + config.max_stream_data_uni = *n; + } + break; + case 22: + // --max-streams-bidi + if (auto n = util::parse_uint(optarg); !n) { + std::cerr << "max-streams-bidi: invalid argument" << std::endl; + exit(EXIT_FAILURE); + } else { + config.max_streams_bidi = *n; + } + break; + case 23: + // --max-streams-uni + if (auto n = util::parse_uint(optarg); !n) { + std::cerr << "max-streams-uni: invalid argument" << std::endl; + exit(EXIT_FAILURE); + } else { + config.max_streams_uni = *n; + } + break; + case 24: + // --exit-on-first-stream-close + config.exit_on_first_stream_close = true; + break; + case 25: + // --disable-early-data + config.disable_early_data = true; + break; + case 26: + // --qlog-dir + config.qlog_dir = optarg; + break; + case 27: + // --cc + if (strcmp("cubic", optarg) == 0) { + config.cc_algo = NGTCP2_CC_ALGO_CUBIC; + break; + } + if (strcmp("reno", optarg) == 0) { + config.cc_algo = NGTCP2_CC_ALGO_RENO; + break; + } + if (strcmp("bbr", optarg) == 0) { + config.cc_algo = NGTCP2_CC_ALGO_BBR; + break; + } + if (strcmp("bbr2", optarg) == 0) { + config.cc_algo = NGTCP2_CC_ALGO_BBR2; + break; + } + std::cerr << "cc: specify cubic, reno, bbr, or bbr2" << std::endl; + exit(EXIT_FAILURE); + case 28: + // --exit-on-all-streams-close + config.exit_on_all_streams_close = true; + break; + case 29: + // --token-file + config.token_file = optarg; + break; + case 30: + // --sni + config.sni = optarg; + break; + case 31: + // --initial-rtt + if (auto t = util::parse_duration(optarg); !t) { + std::cerr << "initial-rtt: invalid argument" << std::endl; + exit(EXIT_FAILURE); + } else { + config.initial_rtt = *t; + } + break; + case 32: + // --max-window + if (auto n = util::parse_uint_iec(optarg); !n) { + std::cerr << "max-window: invalid argument" << std::endl; + exit(EXIT_FAILURE); + } else { + config.max_window = *n; + } + break; + case 33: + // --max-stream-window + if (auto n = util::parse_uint_iec(optarg); !n) { + std::cerr << "max-stream-window: invalid argument" << std::endl; + exit(EXIT_FAILURE); + } else { + config.max_stream_window = *n; + } + break; + case 35: + // --max-udp-payload-size + if (auto n = util::parse_uint_iec(optarg); !n) { + std::cerr << "max-udp-payload-size: invalid argument" << std::endl; + exit(EXIT_FAILURE); + } else if (*n > 64_k) { + std::cerr << "max-udp-payload-size: must not exceed 65536" + << std::endl; + exit(EXIT_FAILURE); + } else if (*n == 0) { + std::cerr << "max-udp-payload-size: must not be 0" << std::endl; + } else { + config.max_udp_payload_size = *n; + } + break; + case 36: + // --handshake-timeout + if (auto t = util::parse_duration(optarg); !t) { + std::cerr << "handshake-timeout: invalid argument" << std::endl; + exit(EXIT_FAILURE); + } else { + config.handshake_timeout = *t; + } + break; + case 37: { + // --other-versions + if (strlen(optarg) == 0) { + config.other_versions.resize(0); + break; + } + auto l = util::split_str(optarg); + config.other_versions.resize(l.size()); + auto it = std::begin(config.other_versions); + for (const auto &k : l) { + if (k == "v1"sv) { + *it++ = NGTCP2_PROTO_VER_V1; + continue; + } + if (k == "v2draft"sv) { + *it++ = NGTCP2_PROTO_VER_V2_DRAFT; + continue; + } + auto rv = util::parse_version(k); + if (!rv) { + std::cerr << "other-versions: invalid version " << std::quoted(k) + << std::endl; + exit(EXIT_FAILURE); + } + *it++ = *rv; + } + break; + } + case 38: + // --no-pmtud + config.no_pmtud = true; + break; + case 39: { + // --preferred-versions + auto l = util::split_str(optarg); + if (l.size() > max_preferred_versionslen) { + std::cerr << "preferred-versions: too many versions > " + << max_preferred_versionslen << std::endl; + } + config.preferred_versions.resize(l.size()); + auto it = std::begin(config.preferred_versions); + for (const auto &k : l) { + if (k == "v1"sv) { + *it++ = NGTCP2_PROTO_VER_V1; + continue; + } + if (k == "v2draft"sv) { + *it++ = NGTCP2_PROTO_VER_V2_DRAFT; + continue; + } + auto rv = util::parse_version(k); + if (!rv) { + std::cerr << "preferred-versions: invalid version " + << std::quoted(k) << std::endl; + exit(EXIT_FAILURE); + } + if (!ngtcp2_is_supported_version(*rv)) { + std::cerr << "preferred-versions: unsupported version " + << std::quoted(k) << std::endl; + exit(EXIT_FAILURE); + } + *it++ = *rv; + } + break; + } + case 40: + // --ack-thresh + if (auto n = util::parse_uint(optarg); !n) { + std::cerr << "ack-thresh: invalid argument" << std::endl; + exit(EXIT_FAILURE); + } else if (*n > 100) { + std::cerr << "ack-thresh: must not exceed 100" << std::endl; + exit(EXIT_FAILURE); + } else { + config.ack_thresh = *n; + } + break; + } + break; + default: + break; + }; + } + + if (argc - optind < 2) { + std::cerr << "Too few arguments" << std::endl; + print_usage(); + exit(EXIT_FAILURE); + } + + if (!config.qlog_file.empty() && !config.qlog_dir.empty()) { + std::cerr << "qlog-file and qlog-dir are mutually exclusive" << std::endl; + exit(EXIT_FAILURE); + } + + if (config.exit_on_first_stream_close && config.exit_on_all_streams_close) { + std::cerr << "exit-on-first-stream-close and exit-on-all-streams-close are " + "mutually exclusive" + << std::endl; + exit(EXIT_FAILURE); + } + + if (data_path) { + auto fd = open(data_path, O_RDONLY); + if (fd == -1) { + std::cerr << "data: Could not open file " << data_path << ": " + << strerror(errno) << std::endl; + exit(EXIT_FAILURE); + } + struct stat st; + if (fstat(fd, &st) != 0) { + std::cerr << "data: Could not stat file " << data_path << ": " + << strerror(errno) << std::endl; + exit(EXIT_FAILURE); + } + config.fd = fd; + config.datalen = st.st_size; + auto addr = mmap(nullptr, config.datalen, PROT_READ, MAP_SHARED, fd, 0); + if (addr == MAP_FAILED) { + std::cerr << "data: Could not mmap file " << data_path << ": " + << strerror(errno) << std::endl; + exit(EXIT_FAILURE); + } + config.data = static_cast(addr); + } + + auto addr = argv[optind++]; + auto port = argv[optind++]; + + if (parse_requests(&argv[optind], argc - optind) != 0) { + exit(EXIT_FAILURE); + } + + if (!ngtcp2_is_reserved_version(config.version)) { + if (!config.preferred_versions.empty() && + std::find(std::begin(config.preferred_versions), + std::end(config.preferred_versions), + config.version) == std::end(config.preferred_versions)) { + std::cerr << "preferred-version: must include version " + << "0x" << config.version << std::endl; + exit(EXIT_FAILURE); + } + + if (!config.other_versions.empty() && + std::find(std::begin(config.other_versions), + std::end(config.other_versions), + config.version) == std::end(config.other_versions)) { + std::cerr << "other-versions: must include version " + << "0x" << config.version << std::endl; + exit(EXIT_FAILURE); + } + } + + if (config.nstreams == 0) { + config.nstreams = config.requests.size(); + } + + TLSClientContext tls_ctx; + if (tls_ctx.init(private_key_file, cert_file) != 0) { + exit(EXIT_FAILURE); + } + + auto ev_loop_d = defer(ev_loop_destroy, EV_DEFAULT); + + auto keylog_filename = getenv("SSLKEYLOGFILE"); + if (keylog_filename) { + keylog_file.open(keylog_filename, std::ios_base::app); + if (keylog_file) { + tls_ctx.enable_keylog(); + } + } + + if (util::generate_secret(config.static_secret.data(), + config.static_secret.size()) != 0) { + std::cerr << "Unable to generate static secret" << std::endl; + exit(EXIT_FAILURE); + } + + auto client_chosen_version = config.version; + + for (;;) { + Client c(EV_DEFAULT, client_chosen_version, config.version); + + if (run(c, addr, port, tls_ctx) != 0) { + exit(EXIT_FAILURE); + } + + if (config.preferred_versions.empty()) { + break; + } + + auto &offered_versions = c.get_offered_versions(); + if (offered_versions.empty()) { + break; + } + + client_chosen_version = ngtcp2_select_version( + config.preferred_versions.data(), config.preferred_versions.size(), + offered_versions.data(), offered_versions.size()); + + if (client_chosen_version == 0) { + std::cerr << "Unable to select a version" << std::endl; + exit(EXIT_FAILURE); + } + + if (!config.quiet) { + std::cerr << "Client selected version " << std::hex << "0x" + << client_chosen_version << std::dec << std::endl; + } + } + + return EXIT_SUCCESS; +} -- cgit v1.2.3