summaryrefslogtreecommitdiffstats
path: root/test
diff options
context:
space:
mode:
authorHugo Landau <hlandau@openssl.org>2022-07-11 19:16:20 +0100
committerPauli <pauli@openssl.org>2022-07-29 16:28:37 +1000
commitdffafaf48174497a724d546c3483d2493fc9b64c (patch)
treede3b4e5aac3398f1aa9258d363221b7d12cc03eb /test
parent205957405d08ef199e6ab654e333a627bbca9ccc (diff)
QUIC Frame Encoding and Decoding Functions
This adds functions for encoding and decoding QUIC frames. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/18795)
Diffstat (limited to 'test')
-rw-r--r--test/build.info6
-rw-r--r--test/quic_wire_test.c1364
-rw-r--r--test/recipes/70-test_quic_wire.t19
3 files changed, 1388 insertions, 1 deletions
diff --git a/test/build.info b/test/build.info
index 2047cf29b8..500999ca34 100644
--- a/test/build.info
+++ b/test/build.info
@@ -278,6 +278,10 @@ IF[{- !$disabled{tests} -}]
INCLUDE[packettest]=../include ../apps/include
DEPEND[packettest]=../libcrypto libtestutil.a
+ SOURCE[quic_wire_test]=quic_wire_test.c
+ INCLUDE[quic_wire_test]=../include ../apps/include
+ DEPEND[quic_wire_test]=../libcrypto.a ../libssl.a libtestutil.a
+
SOURCE[asynctest]=asynctest.c
INCLUDE[asynctest]=../include ../apps/include
DEPEND[asynctest]=../libcrypto
@@ -953,7 +957,7 @@ ENDIF
DEPEND[build_wincrypt_test]=../libssl ../libcrypto
IF[{- !$disabled{'quic'} -}]
- PROGRAMS{noinst}=quicapitest
+ PROGRAMS{noinst}=quicapitest quic_wire_test
ENDIF
SOURCE[quicapitest]=quicapitest.c helpers/ssltestlib.c
diff --git a/test/quic_wire_test.c b/test/quic_wire_test.c
new file mode 100644
index 0000000000..55d18aa27c
--- /dev/null
+++ b/test/quic_wire_test.c
@@ -0,0 +1,1364 @@
+/*
+ * Copyright 2015-2018 The OpenSSL Project Authors. All Rights Reserved.
+ *
+ * Licensed under the Apache License 2.0 (the "License"). You may not use
+ * this file except in compliance with the License. You can obtain a copy
+ * in the file LICENSE in the source distribution or at
+ * https://www.openssl.org/source/license.html
+ */
+
+#include "internal/packet.h"
+#include "internal/quic_wire.h"
+#include "testutil.h"
+
+struct encode_test_case {
+ int (*serializer)(WPACKET *pkt);
+ const unsigned char *expect_buf;
+ size_t expect_buf_len;
+ /*
+ * fail: -1 if not truncated (function should test for success), else number
+ * of bytes to which the input has been truncated (function should test that
+ * decoding fails)
+ */
+ int (*deserializer)(PACKET *pkt, ossl_ssize_t fail);
+};
+
+/* 1. PADDING */
+static int encode_case_1_enc(WPACKET *pkt)
+{
+ if (!TEST_int_eq(ossl_quic_wire_encode_padding(pkt, 3), 1))
+ return 0;
+
+ return 1;
+}
+
+static int encode_case_1_dec(PACKET *pkt, ossl_ssize_t fail)
+{
+ if (fail >= 0)
+ /* No failure modes for padding */
+ return 1;
+
+ if (!TEST_int_eq(ossl_quic_wire_decode_padding(pkt), 3))
+ return 0;
+
+ return 1;
+}
+
+static const unsigned char encode_case_1_expect[] = {
+ 0, 0, 0
+};
+
+/* 2. PING */
+static int encode_case_2_enc(WPACKET *pkt)
+{
+
+ if (!TEST_int_eq(ossl_quic_wire_encode_frame_ping(pkt), 1))
+ return 0;
+
+ return 1;
+}
+
+static int encode_case_2_dec(PACKET *pkt, ossl_ssize_t fail)
+{
+
+ if (!TEST_int_eq(ossl_quic_wire_decode_frame_ping(pkt), fail < 0))
+ return 0;
+
+ return 1;
+}
+
+static const unsigned char encode_case_2_expect[] = {
+ 0x01
+};
+
+/* 3. ACK */
+static const OSSL_QUIC_ACK_RANGE encode_case_3_ranges[] = {
+ { 20, 30 },
+ { 0, 10 }
+};
+
+static const OSSL_QUIC_FRAME_ACK encode_case_3_f = {
+ (OSSL_QUIC_ACK_RANGE *)encode_case_3_ranges,
+ OSSL_NELEM(encode_case_3_ranges),
+ OSSL_TIME_MS,
+ 60, 70, 80, 1
+};
+
+static int encode_case_3_enc(WPACKET *pkt)
+{
+ if (!TEST_int_eq(ossl_quic_wire_encode_frame_ack(pkt, 3, &encode_case_3_f), 1))
+ return 0;
+
+ return 1;
+}
+
+static int encode_case_3_dec(PACKET *pkt, ossl_ssize_t fail)
+{
+ OSSL_QUIC_ACK_RANGE ranges[4] = {0};
+ OSSL_QUIC_FRAME_ACK f = {0};
+ uint64_t total_ranges = 0, peek_total_ranges = 0;
+ int ret;
+
+ f.ack_ranges = ranges;
+ f.num_ack_ranges = OSSL_NELEM(ranges);
+
+ ret = ossl_quic_wire_peek_frame_ack_num_ranges(pkt, &peek_total_ranges);
+ if (fail < 0 && !TEST_int_eq(ret, 1))
+ return 0;
+
+ if (!TEST_int_eq(ossl_quic_wire_decode_frame_ack(pkt, 3, &f, &total_ranges), fail < 0))
+ return 0;
+
+ if (ret == 1 && !TEST_uint64_t_eq(peek_total_ranges, 2))
+ return 0;
+
+ if (fail >= 0)
+ return 1;
+
+ if (!TEST_uint64_t_eq(total_ranges, peek_total_ranges))
+ return 0;
+
+ if (!TEST_mem_eq(f.ack_ranges, f.num_ack_ranges * sizeof(OSSL_QUIC_ACK_RANGE),
+ encode_case_3_f.ack_ranges,
+ encode_case_3_f.num_ack_ranges * sizeof(OSSL_QUIC_ACK_RANGE)))
+ return 0;
+
+ if (!TEST_uint64_t_eq(f.delay_time, encode_case_3_f.delay_time))
+ return 0;
+
+ if (!TEST_true(f.ecn_present))
+ return 0;
+
+ if (!TEST_uint64_t_eq(f.ect0, encode_case_3_f.ect0))
+ return 0;
+
+ if (!TEST_uint64_t_eq(f.ect1, encode_case_3_f.ect1))
+ return 0;
+
+ if (!TEST_uint64_t_eq(f.ecnce, encode_case_3_f.ecnce))
+ return 0;
+
+ return 1;
+}
+
+static const unsigned char encode_case_3_expect[] = {
+ 0x03, /* Type */
+ 0x1E, /* Largest Acknowledged */
+ 0x40, 0x7d, /* ACK Delay */
+ 1, /* ACK Range Count */
+ 10, /* First ACK Range */
+
+ 8, /* Gap */
+ 10, /* Length */
+
+ 0x3c, /* ECT0 Count */
+ 0x40, 0x46, /* ECT1 Count */
+ 0x40, 0x50, /* ECNCE Count */
+};
+
+/* 4. RESET_STREAM */
+static const OSSL_QUIC_FRAME_RESET_STREAM encode_case_4_f = {
+ 0x1234, 0x9781, 0x11717
+};
+
+static int encode_case_4_enc(WPACKET *pkt)
+{
+ if (!TEST_int_eq(ossl_quic_wire_encode_frame_reset_stream(pkt,
+ &encode_case_4_f), 1))
+ return 0;
+
+ return 1;
+}
+
+static int encode_case_4_dec(PACKET *pkt, ossl_ssize_t fail)
+{
+ OSSL_QUIC_FRAME_RESET_STREAM f = {0};
+
+ if (!TEST_int_eq(ossl_quic_wire_decode_frame_reset_stream(pkt, &f), fail < 0))
+ return 0;
+
+ if (fail >= 0)
+ return 1;
+
+ if (!TEST_mem_eq(&f, sizeof(f), &encode_case_4_f, sizeof(encode_case_4_f)))
+ return 0;
+
+ return 1;
+}
+
+static const unsigned char encode_case_4_expect[] = {
+ 0x04, /* Type */
+ 0x52, 0x34, /* Stream ID */
+ 0x80, 0x00, 0x97, 0x81, /* App Error Code */
+ 0x80, 0x01, 0x17, 0x17, /* Final Size */
+};
+
+/* 5. STOP_SENDING */
+static const OSSL_QUIC_FRAME_STOP_SENDING encode_case_5_f = {
+ 0x1234, 0x9781
+};
+
+static int encode_case_5_enc(WPACKET *pkt)
+{
+ if (!TEST_int_eq(ossl_quic_wire_encode_frame_stop_sending(pkt,
+ &encode_case_5_f), 1))
+ return 0;
+
+ return 1;
+}
+
+static int encode_case_5_dec(PACKET *pkt, ossl_ssize_t fail)
+{
+ OSSL_QUIC_FRAME_STOP_SENDING f = {0};
+
+ if (!TEST_int_eq(ossl_quic_wire_decode_frame_stop_sending(pkt, &f), fail < 0))
+ return 0;
+
+ if (fail >= 0)
+ return 1;
+
+ if (!TEST_mem_eq(&f, sizeof(f), &encode_case_5_f, sizeof(encode_case_5_f)))
+ return 0;
+
+ return 1;
+}
+
+static const unsigned char encode_case_5_expect[] = {
+ 0x05, /* Type */
+ 0x52, 0x34, /* Stream ID */
+ 0x80, 0x00, 0x97, 0x81 /* App Error Code */
+};
+
+/* 6. CRYPTO */
+static const unsigned char encode_case_6_data[] = {
+ 93, 18, 17, 102, 33
+};
+
+static const OSSL_QUIC_FRAME_CRYPTO encode_case_6_f = {
+ 0x1234, sizeof(encode_case_6_data), encode_case_6_data
+};
+
+static int encode_case_6_enc(WPACKET *pkt)
+{
+ if (!TEST_ptr(ossl_quic_wire_encode_frame_crypto(pkt,
+ &encode_case_6_f)))
+ return 0;
+
+ return 1;
+}
+
+static int encode_case_6_dec(PACKET *pkt, ossl_ssize_t fail)
+{
+ OSSL_QUIC_FRAME_CRYPTO f = {0};
+
+ if (!TEST_int_eq(ossl_quic_wire_decode_frame_crypto(pkt, &f), fail < 0))
+ return 0;
+
+ if (fail >= 0)
+ return 1;
+
+ if (!TEST_uint64_t_eq(f.offset, 0x1234))
+ return 0;
+
+ if (!TEST_mem_eq(f.data, f.len, encode_case_6_data, sizeof(encode_case_6_data)))
+ return 0;
+
+ return 1;
+}
+
+static const unsigned char encode_case_6_expect[] = {
+ 0x06, /* Type */
+ 0x52, 0x34, /* Offset */
+ 0x05, /* Length */
+ 93, 18, 17, 102, 33 /* Data */
+};
+
+/* 7. NEW_TOKEN */
+static const unsigned char encode_case_7_token[] = {
+ 0xde, 0x06, 0xcb, 0x76, 0x5d, 0xb1, 0xa7, 0x71,
+ 0x78, 0x09, 0xbb, 0xe8, 0x50, 0x19, 0x12, 0x9a
+};
+
+static int encode_case_7_enc(WPACKET *pkt)
+{
+ if (!TEST_int_eq(ossl_quic_wire_encode_frame_new_token(pkt,
+ encode_case_7_token,
+ sizeof(encode_case_7_token)), 1))
+ return 0;
+
+ return 1;
+}
+
+static int encode_case_7_dec(PACKET *pkt, ossl_ssize_t fail)
+{
+ const unsigned char *token = NULL;
+ size_t token_len = 0;
+
+ if (!TEST_int_eq(ossl_quic_wire_decode_frame_new_token(pkt,
+ &token,
+ &token_len), fail < 0))
+ return 0;
+
+ if (fail >= 0)
+ return 1;
+
+ if (!TEST_mem_eq(token, token_len,
+ encode_case_7_token, sizeof(encode_case_7_token)))
+ return 0;
+
+ return 1;
+}
+
+static const unsigned char encode_case_7_expect[] = {
+ 0x07, /* Type */
+ 0x10, /* Length */
+ 0xde, 0x06, 0xcb, 0x76, 0x5d, 0xb1, 0xa7, 0x71, /* Token */
+ 0x78, 0x09, 0xbb, 0xe8, 0x50, 0x19, 0x12, 0x9a
+};
+
+/* 8. STREAM (no length, no offset, no fin) */
+static const unsigned char encode_case_8_data[] = {
+ 0xde, 0x06, 0xcb, 0x76, 0x5d
+};
+static const OSSL_QUIC_FRAME_STREAM encode_case_8_f = {
+ 0x1234, 0, 5, encode_case_8_data, 0, 0
+};
+
+static int encode_case_8_enc(WPACKET *pkt)
+{
+ if (!TEST_ptr(ossl_quic_wire_encode_frame_stream(pkt,
+ &encode_case_8_f)))
+ return 0;
+
+ return 1;
+}
+
+static int encode_case_8_dec(PACKET *pkt, ossl_ssize_t fail)
+{
+ OSSL_QUIC_FRAME_STREAM f = {0};
+
+ if (fail >= 3)
+ /*
+ * This case uses implicit length signalling so truncation will not
+ * cause it to fail unless the header (which is 3 bytes) is truncated.
+ */
+ return 1;
+
+ if (!TEST_int_eq(ossl_quic_wire_decode_frame_stream(pkt, &f), fail < 0))
+ return 0;
+
+ if (fail >= 0)
+ return 1;
+
+ if (!TEST_mem_eq(f.data, f.len,
+ encode_case_8_data, sizeof(encode_case_8_data)))
+ return 0;
+
+ if (!TEST_uint64_t_eq(f.stream_id, 0x1234))
+ return 0;
+
+ if (!TEST_uint64_t_eq(f.offset, 0))
+ return 0;
+
+ if (!TEST_int_eq(f.has_explicit_len, 0))
+ return 0;
+
+ if (!TEST_int_eq(f.is_fin, 0))
+ return 0;
+
+ return 1;
+}
+
+static const unsigned char encode_case_8_expect[] = {
+ 0x08, /* Type (OFF=0, LEN=0, FIN=0) */
+ 0x52, 0x34, /* Stream ID */
+ 0xde, 0x06, 0xcb, 0x76, 0x5d /* Data */
+};
+
+/* 9. STREAM (length, offset, fin) */
+static const unsigned char encode_case_9_data[] = {
+ 0xde, 0x06, 0xcb, 0x76, 0x5d
+};
+static const OSSL_QUIC_FRAME_STREAM encode_case_9_f = {
+ 0x1234, 0x39, 5, encode_case_9_data, 1, 1
+};
+
+static int encode_case_9_enc(WPACKET *pkt)
+{
+ if (!TEST_ptr(ossl_quic_wire_encode_frame_stream(pkt,
+ &encode_case_9_f)))
+ return 0;
+
+ return 1;
+}
+
+static int encode_case_9_dec(PACKET *pkt, ossl_ssize_t fail)
+{
+ OSSL_QUIC_FRAME_STREAM f = {0};
+
+ if (!TEST_int_eq(ossl_quic_wire_decode_frame_stream(pkt, &f), fail < 0))
+ return 0;
+
+ if (fail >= 0)
+ return 1;
+
+ if (!TEST_mem_eq(f.data, f.len,
+ encode_case_9_data, sizeof(encode_case_9_data)))
+ return 0;
+
+ if (!TEST_uint64_t_eq(f.stream_id, 0x1234))
+ return 0;
+
+ if (!TEST_uint64_t_eq(f.offset, 0x39))
+ return 0;
+
+ if (!TEST_int_eq(f.has_explicit_len, 1))
+ return 0;
+
+ if (!TEST_int_eq(f.is_fin, 1))
+ return 0;
+
+ return 1;
+}
+
+static const unsigned char encode_case_9_expect[] = {
+ 0x0f, /* Type (OFF=1, LEN=1, FIN=1) */
+ 0x52, 0x34, /* Stream ID */
+ 0x39, /* Offset */
+ 0x05, /* Length */
+ 0xde, 0x06, 0xcb, 0x76, 0x5d /* Data */
+};
+
+/* 10. MAX_DATA */
+static int encode_case_10_enc(WPACKET *pkt)
+{
+ if (!TEST_int_eq(ossl_quic_wire_encode_frame_max_data(pkt, 0x1234), 1))
+ return 0;
+
+ return 1;
+}
+
+static int encode_case_10_dec(PACKET *pkt, ossl_ssize_t fail)
+{
+ uint64_t max_data = 0;
+
+ if (!TEST_int_eq(ossl_quic_wire_decode_frame_max_data(pkt, &max_data), fail < 0))
+ return 0;
+
+ if (fail >= 0)
+ return 1;
+
+ if (!TEST_uint64_t_eq(max_data, 0x1234))
+ return 0;
+
+ return 1;
+}
+
+static const unsigned char encode_case_10_expect[] = {
+ 0x10, /* Type */
+ 0x52, 0x34, /* Max Data */
+};
+
+/* 11. MAX_STREAM_DATA */
+static int encode_case_11_enc(WPACKET *pkt)
+{
+ if (!TEST_int_eq(ossl_quic_wire_encode_frame_max_stream_data(pkt,
+ 0x1234,
+ 0x9781), 1))
+ return 0;
+
+ return 1;
+}
+
+static int encode_case_11_dec(PACKET *pkt, ossl_ssize_t fail)
+{
+ uint64_t stream_id = 0, max_data = 0;
+
+ if (!TEST_int_eq(ossl_quic_wire_decode_frame_max_stream_data(pkt,
+ &stream_id,
+ &max_data), fail < 0))
+ return 0;
+
+ if (fail >= 0)
+ return 1;
+
+ if (!TEST_uint64_t_eq(stream_id, 0x1234))
+ return 0;
+
+ if (!TEST_uint64_t_eq(max_data, 0x9781))
+ return 0;
+
+ return 1;
+}
+
+static const unsigned char encode_case_11_expect[] = {
+ 0x11, /* Type */
+ 0x52, 0x34, /* Stream ID */
+ 0x80, 0x00, 0x97, 0x81, /* Max Data */
+};
+
+/* 12. MAX_STREAMS */
+static int encode_case_12_enc(WPACKET *pkt)
+{
+ if (!TEST_int_eq(ossl_quic_wire_encode_frame_max_streams(pkt, 0, 0x1234), 1))
+ return 0;
+
+ if (!TEST_int_eq(ossl_quic_wire_encode_frame_max_streams(pkt, 1, 0x9781), 1))
+ return 0;
+
+ return 1;
+}
+
+static int encode_case_12_dec(PACKET *pkt, ossl_ssize_t fail)
+{
+ uint64_t max_streams_1 = 0, max_streams_2 = 0,
+ frame_type_1 = 0, frame_type_2 = 0;
+
+ if (!TEST_int_eq(ossl_quic_wire_peek_frame_header(pkt, &frame_type_1),
+ fail < 0 || fail >= 1))
+ return 0;
+
+ if (!TEST_int_eq(ossl_quic_wire_decode_frame_max_streams(pkt,
+ &max_streams_1),
+ fail < 0 || fail >= 3))
+ return 0;
+
+ if (!TEST_int_eq(ossl_quic_wire_peek_frame_header(pkt, &frame_type_2),
+ fail < 0 || fail >= 4))
+ return 0;
+
+ if (!TEST_int_eq(ossl_quic_wire_decode_frame_max_streams(pkt,
+ &max_streams_2),
+ fail < 0))
+ return 0;
+
+ if ((fail < 0 || fail >= 3)
+ && !TEST_uint64_t_eq(frame_type_1, OSSL_QUIC_FRAME_TYPE_MAX_STREAMS_BIDI))
+ return 0;
+
+ if ((fail < 0 || fail >= 3)
+ && !TEST_uint64_t_eq(max_streams_1, 0x1234))
+ return 0;
+
+ if ((fail < 0 || fail >= 8)
+ && !TEST_uint64_t_eq(frame_type_2, OSSL_QUIC_FRAME_TYPE_MAX_STREAMS_UNI))
+ return 0;
+
+ if ((fail < 0 || fail >= 8)
+ && !TEST_uint64_t_eq(max_streams_2, 0x9781))
+ return 0;
+
+ return 1;
+}
+
+static const unsigned char encode_case_12_expect[] = {
+ 0x12, /* Type (MAX_STREAMS Bidirectional) */
+ 0x52, 0x34, /* Max Streams */
+ 0x13, /* Type (MAX_STREAMS Unidirectional) */
+ 0x80, 0x00, 0x97, 0x81, /* Max Streams */
+};
+
+/* 13. DATA_BLOCKED */
+static int encode_case_13_enc(WPACKET *pkt)
+{
+ if (!TEST_int_eq(ossl_quic_wire_encode_frame_data_blocked(pkt, 0x1234), 1))
+ return 0;
+
+ return 1;
+}
+
+static int encode_case_13_dec(PACKET *pkt, ossl_ssize_t fail)
+{
+ uint64_t max_data = 0;
+
+ if (!TEST_int_eq(ossl_quic_wire_decode_frame_data_blocked(pkt,
+ &max_data), fail < 0))
+ return 0;
+
+ if (fail >= 0)
+ return 1;
+
+ if (!TEST_uint64_t_eq(max_data, 0x1234))
+ return 0;
+
+ return 1;
+}
+
+static const unsigned char encode_case_13_expect[] = {
+ 0x14, /* Type */
+ 0x52, 0x34, /* Max Data */
+};
+
+/* 14. STREAM_DATA_BLOCKED */
+static int encode_case_14_enc(WPACKET *pkt)
+{
+ if (!TEST_int_eq(ossl_quic_wire_encode_frame_stream_data_blocked(pkt,
+ 0x1234,
+ 0x9781), 1))
+ return 0;
+
+ return 1;
+}
+
+static int encode_case_14_dec(PACKET *pkt, ossl_ssize_t fail)
+{
+ uint64_t stream_id = 0, max_data = 0;
+
+ if (!TEST_int_eq(ossl_quic_wire_decode_frame_stream_data_blocked(pkt,
+ &stream_id,
+ &max_data), fail < 0))
+ return 0;
+
+ if (fail >= 0)
+ return 1;
+
+ if (!TEST_uint64_t_eq(stream_id, 0x1234))
+ return 0;
+
+ if (!TEST_uint64_t_eq(max_data, 0x9781))
+ return 0;
+
+ return 1;
+}
+
+static const unsigned char encode_case_14_expect[] = {
+ 0x15, /* Type */
+ 0x52, 0x34, /* Stream ID */
+ 0x80, 0x00, 0x97, 0x81, /* Max Data */
+};
+
+/* 15. STREAMS_BLOCKED */
+static int encode_case_15_enc(WPACKET *pkt)
+{
+ if (!TEST_int_eq(ossl_quic_wire_encode_frame_streams_blocked(pkt, 0, 0x1234), 1))
+ return 0;
+
+ if (!TEST_int_eq(ossl_quic_wire_encode_frame_streams_blocked(pkt, 1, 0x9781), 1))
+ return 0;
+
+ return 1;
+}
+
+static int encode_case_15_dec(PACKET *pkt, ossl_ssize_t fail)
+{
+ uint64_t max_streams_1 = 0, max_streams_2 = 0,
+ frame_type_1 = 0, frame_type_2 = 0;
+
+ if (!TEST_int_eq(ossl_quic_wire_peek_frame_header(pkt, &frame_type_1),
+ fail < 0 || fail >= 1))
+ return 0;
+
+ if (!TEST_int_eq(ossl_quic_wire_decode_frame_streams_blocked(pkt,
+ &max_streams_1),
+ fail < 0 || fail >= 3))
+ return 0;
+
+ if (!TEST_int_eq(ossl_quic_wire_peek_frame_header(pkt, &frame_type_2),
+ fail < 0 || fail >= 4))
+ return 0;
+
+ if (!TEST_int_eq(ossl_quic_wire_decode_frame_streams_blocked(pkt,
+ &max_streams_2),
+ fail < 0 || fail >= 8))
+ return 0;
+
+ if ((fail < 0 || fail >= 1)
+ && !TEST_uint64_t_eq(frame_type_1, OSSL_QUIC_FRAME_TYPE_STREAMS_BLOCKED_BIDI))
+ return 0;
+
+ if ((fail < 0 || fail >= 3)
+ && !TEST_uint64_t_eq(max_streams_1, 0x1234))
+ return 0;
+
+ if ((fail < 0 || fail >= 4)
+ && !TEST_uint64_t_eq(frame_type_2, OSSL_QUIC_FRAME_TYPE_STREAMS_BLOCKED_UNI))
+ return 0;
+
+ if ((fail < 0 || fail >= 8)
+ && !TEST_uint64_t_eq(max_streams_2, 0x9781))
+ return 0;
+
+ return 1;
+}
+
+static const unsigned char encode_case_15_expect[] = {
+ 0x16, /* Type (STREAMS_BLOCKED Bidirectional) */
+ 0x52, 0x34, /* Max Streams */
+ 0x17, /* Type (STREAMS_BLOCKED Unidirectional) */
+ 0x80, 0x00, 0x97, 0x81, /* Max Streams */
+};
+
+/* 16. NEW_CONNECTION_ID */
+static const unsigned char encode_case_16_conn_id[] = {
+ 0x33, 0x44, 0x55, 0x66
+};
+
+static const OSSL_QUIC_FRAME_NEW_CONN_ID encode_case_16_f = {
+ 0x1234,
+ 0x9781,
+ {
+ 0x4,
+ {0x33, 0x44, 0x55, 0x66}
+ },
+ {
+ 0xde, 0x06, 0xcb, 0x76, 0x5d, 0xb1, 0xa7, 0x71,
+ 0x78, 0x09, 0xbb, 0xe8, 0x50, 0x19, 0x12, 0x9a
+ }
+};
+
+static int encode_case_16_enc(WPACKET *pkt)
+{
+ if (!TEST_int_eq(ossl_quic_wire_encode_frame_new_conn_id(pkt,
+ &encode_case_16_f), 1))
+ return 0;
+
+ return 1;
+}
+
+static int encode_case_16_dec(PACKET *pkt, ossl_ssize_t fail)
+{
+ OSSL_QUIC_FRAME_NEW_CONN_ID f = {0};
+
+ if (!TEST_int_eq(ossl_quic_wire_decode_frame_new_conn_id(pkt, &f), fail < 0))
+ return 0;
+
+ if (fail >= 0)
+ return 1;
+
+ if (!TEST_uint64_t_eq(f.seq_num, 0x1234))
+ return 0;
+
+ if (!TEST_uint64_t_eq(f.retire_prior_to, 0x9781))
+ return 0;
+
+ if (!TEST_uint64_t_eq(f.conn_id.id_len, sizeof(encode_case_16_conn_id)))
+ return 0;
+
+ if (!TEST_mem_eq(f.conn_id.id, f.conn_id.id_len,
+ encode_case_16_conn_id, sizeof(encode_case_16_conn_id)))
+ return 0;
+
+ if (!TEST_mem_eq(f.stateless_reset_token,
+ sizeof(f.stateless_reset_token),
+ encode_case_16_f.stateless_reset_token,
+ sizeof(encode_case_16_f.stateless_reset_token)))
+ return 0;
+
+ return 1;
+}
+
+static const unsigned char encode_case_16_expect[] = {
+ 0x18, /* Type */
+ 0x52, 0x34, /* Sequence Number */
+ 0x80, 0x00, 0x97, 0x81, /* Retire Prior To */
+ 0x04, /* Connection ID Length */
+ 0x33, 0x44, 0x55, 0x66, /* Connection ID */
+ 0xde, 0x06, 0xcb, 0x76, 0x5d, 0xb1, 0xa7, 0x71, /* Stateless Reset Token */
+ 0x78, 0x09, 0xbb, 0xe8, 0x50, 0x19, 0x12, 0x9a
+};
+
+/* 17. RETIRE_CONNECTION_ID */
+static int encode_case_17_enc(WPACKET *pkt)
+{
+ if (!TEST_int_eq(ossl_quic_wire_encode_frame_retire_conn_id(pkt, 0x1234), 1))
+ return 0;
+
+ return 1;
+}
+
+static int encode_case_17_dec(PACKET *pkt, ossl_ssize_t fail)
+{
+ uint64_t seq_num = 0;
+
+ if (!TEST_int_eq(ossl_quic_wire_decode_frame_retire_conn_id(pkt, &seq_num), fail < 0))
+ return 0;
+
+ if (fail >= 0)
+ return 1;
+
+ if (!TEST_uint64_t_eq(seq_num, 0x1234))
+ return 0;
+
+ return 1;
+}
+
+static const unsigned char encode_case_17_expect[] = {
+ 0x19, /* Type */
+ 0x52, 0x34, /* Seq Num */
+};
+
+/* 18. PATH_CHALLENGE */
+static const uint64_t encode_case_18_data
+ = (((uint64_t)0x5f4b12)<<40) | (uint64_t)0x731834UL;
+
+static int encode_case_18_enc(WPACKET *pkt)
+{
+ if (!TEST_int_eq(ossl_quic_wire_encode_frame_path_challenge(pkt,
+ encode_case_18_data), 1))
+ return 0;
+
+ return 1;
+}
+
+static int encode_case_18_dec(PACKET *pkt, ossl_ssize_t fail)
+{
+ uint64_t challenge = 0;
+
+ if (!TEST_int_eq(ossl_quic_wire_decode_frame_path_challenge(pkt, &challenge), fail < 0))
+ return 0;
+
+ if (fail >= 0)
+ return 1;
+
+ if (!TEST_uint64_t_eq(challenge, encode_case_18_data))
+ return 0;
+
+ return 1;
+}
+
+static const unsigned char encode_case_18_expect[] = {
+ 0x1A, /* Type */
+ 0x5f, 0x4b, 0x12, 0x00, 0x00, 0x73, 0x18, 0x34, /* Data */
+};
+
+/* 19. PATH_RESPONSE */
+static const uint64_t encode_case_19_data
+ = (((uint64_t)0x5f4b12)<<40) | (uint64_t)0x731834UL;
+
+static int encode_case_19_enc(WPACKET *pkt)
+{
+ if (!TEST_int_eq(ossl_quic_wire_encode_frame_path_response(pkt,
+ encode_case_19_data), 1))
+ return 0;
+
+ return 1;
+}
+
+static int encode_case_19_dec(PACKET *pkt, ossl_ssize_t fail)
+{
+ uint64_t challenge = 0;
+
+ if (!TEST_int_eq(ossl_quic_wire_decode_frame_path_response(pkt, &challenge), fail < 0))
+ return 0;
+
+ if (fail >= 0)
+ return 1;
+
+ if (!TEST_uint64_t_eq(challenge, encode_case_19_data))
+ return 0;
+
+ return 1;
+}
+
+static const unsigned char encode_case_19_expect[] = {
+ 0x1B, /* Type */
+ 0x5f, 0x4b, 0x12, 0x00, 0x00, 0x73, 0x18, 0x34, /* Data */
+};
+
+/* 20. CONNECTION_CLOSE (transport) */
+static const char encode_case_20_reason[] = {
+ /* "reason for closure" */
+ 0x72, 0x65, 0x61, 0x73, 0x6f, 0x6e, 0x20, 0x66, 0x6f,
+ 0x72, 0x20, 0x63, 0x6c, 0x6f, 0x73, 0x75, 0x72, 0x65
+};
+
+static const OSSL_QUIC_FRAME_CONN_CLOSE encode_case_20_f = {
+ 0,
+ 0x1234,
+ 0x9781,
+ encode_case_20_reason,
+ sizeof(encode_case_20_reason)
+};
+
+static int encode_case_20_enc(WPACKET *pkt)
+{
+ if (!TEST_int_eq(ossl_quic_wire_encode_frame_conn_close(pkt,
+ &encode_case_20_f), 1))
+ return 0;
+
+ return 1;
+}
+
+static int encode_case_20_dec(PACKET *pkt, ossl_ssize_t fail)
+{
+ OSSL_QUIC_FRAME_CONN_CLOSE f = {0};
+
+ if (!TEST_int_eq(ossl_quic_wire_decode_frame_conn_close(pkt, &f), fail < 0))
+ return 0;
+
+ if (fail >= 0)
+ return 1;
+
+ if (!TEST_int_eq(f.is_app, 0))
+ return 0;
+
+ if (!TEST_uint64_t_eq(f.error_code, 0x1234))
+ return 0;
+
+ if (!TEST_uint64_t_eq(f.frame_type, 0x9781))
+ return 0;
+
+ if (!TEST_size_t_eq(f.reason_len, 18))
+ return 0;
+
+ if (!TEST_mem_eq(f.reason, f.reason_len,
+ encode_case_20_f.reason, encode_case_20_f.reason_len))
+ return 0;
+
+ return 1;
+}
+
+static const unsigned char encode_case_20_expect[] = {
+ 0x1C, /* Type */
+ 0x52, 0x34, /* Sequence Number */
+ 0x80, 0x00, 0x97, 0x81, /* Frame Type */
+ 0x12, /* Reason Length */
+ 0x72, 0x65, 0x61, 0x73, 0x6f, 0x6e, 0x20, 0x66, 0x6f, /* Reason */
+ 0x72, 0x20, 0x63, 0x6c, 0x6f, 0x73, 0x75, 0x72, 0x65
+};
+
+/* 21. HANDSHAKE_DONE */
+static int encode_case_21_enc(WPACKET *pkt)
+{
+
+ if (!TEST_int_eq(ossl_quic_wire_encode_frame_handshake_done(pkt), 1))
+ return 0;
+
+ return 1;
+}
+
+static int encode_case_21_dec(PACKET *pkt, ossl_ssize_t fail)
+{
+
+ if (!TEST_int_eq(ossl_quic_wire_decode_frame_handshake_done(pkt), fail < 0))
+ return 0;
+
+ return 1;
+}
+
+static const unsigned char encode_case_21_expect[] = {
+ 0x1E
+};
+
+/* 22. Buffer Transport Parameter */
+static const unsigned char encode_case_22_data[] = {0x55,0x77,0x32,0x46,0x99};
+
+static int encode_case_22_enc(WPACKET *pkt)
+{
+ unsigned char *p;
+
+ if (!TEST_ptr(ossl_quic_wire_encode_transport_param_bytes(pkt, 0x1234,
+ encode_case_22_data,
+ sizeof(encode_case_22_data))))
+ return 0;
+
+ if (!TEST_ptr(p = ossl_quic_wire_encode_transport_param_bytes(pkt, 0x9781,
+ NULL, 2)))
+ return 0;
+
+ p[0] = 0x33;
+ p[1] = 0x44;
+
+ return 1;
+}
+
+static int encode_case_22_dec(PACKET *pkt, ossl_ssize_t fail)
+{
+ uint64_t id = 0;
+ size_t len = 0;
+ const unsigned char *p;
+ static const unsigned char data[] = {0x33, 0x44};
+
+ if (!TEST_int_eq(ossl_quic_wire_peek_transport_param(pkt, &id),
+ fail < 0 || fail >= 2))
+ return 0;
+
+ if ((fail < 0 || fail >= 2)
+ && !TEST_uint64_t_eq(id, 0x1234))
+ return 0;
+
+ id = 0;
+
+ p = ossl_quic_wire_decode_transport_param_bytes(pkt, &id, &len);
+ if (fail < 0 || fail >= 8) {
+ if (!TEST_ptr(p))
+ return 0;
+ } else {
+ if (!TEST_ptr_null(p))
+ return 0;
+ }
+
+ if ((fail < 0 || fail >= 8)
+ && !TEST_uint64_t_eq(id, 0x1234))
+ return 0;
+
+ if ((fail < 0 || fail >= 8)
+ && !TEST_mem_eq(p, len, encode_case_22_data, sizeof(encode_case_22_data)))
+ return 0;
+
+ if ((fail < 0 || fail >= 8)
+ && !TEST_int_eq(ossl_quic_wire_peek_transport_param(pkt, &id),
+ fail < 0 || fail >= 12))
+ return 0;
+
+ if ((fail < 0 || fail >= 12)
+ && !TEST_uint64_t_eq(id, 0x9781))
+ return 0;
+
+ id = 0;
+
+ p = ossl_quic_wire_decode_transport_param_bytes(pkt, &id, &len);
+ if (fail < 0 || fail >= 15) {
+ if (!TEST_ptr(p))
+ return 0;
+ } else {
+ if (!TEST_ptr_null(p))
+ return 0;
+ }
+
+ if ((fail < 0 || fail >= 15)
+ && !TEST_uint64_t_eq(id, 0x9781))
+ return 0;
+
+ if ((fail < 0 || fail >= 15)
+ && !TEST_mem_eq(p, len, data, sizeof(data)))
+ return 0;
+
+ return 1;
+}
+
+static const unsigned char encode_case_22_expect[] = {
+ 0x52, 0x34, /* ID */
+ 0x05, /* Length */
+ 0x55, 0x77, 0x32, 0x46, 0x99, /* Data */
+
+ 0x80, 0x00, 0x97, 0x81, /* ID */
+ 0x02, /* Length */
+ 0x33, 0x44 /* Data */
+};
+
+/* 23. Integer Transport Parameter */
+static int encode_case_23_enc(WPACKET *pkt)
+{
+ if (!TEST_int_eq(ossl_quic_wire_encode_transport_param_int(pkt, 0x1234, 0x9781), 1))
+ return 0;
+
+ if (!TEST_int_eq(ossl_quic_wire_encode_transport_param_int(pkt, 0x2233, 0x4545), 1))
+ return 0;
+
+ return 1;
+}
+
+static int encode_case_23_dec(PACKET *pkt, ossl_ssize_t fail)
+{
+ uint64_t id = 0, value = 0;
+
+ if (!TEST_int_eq(ossl_quic_wire_decode_transport_param_int(pkt,
+ &id, &value),
+ fail < 0 || fail >= 7))
+ return 0;
+
+ if ((fail < 0 || fail >= 7)
+ && !TEST_uint64_t_eq(id, 0x1234))
+ return 0;
+
+ if ((fail < 0 || fail >= 7)
+ && !TEST_uint64_t_eq(value, 0x9781))
+ return 0;
+
+ if (!TEST_int_eq(ossl_quic_wire_decode_transport_param_int(pkt,
+ &id, &value),
+ fail < 0 || fail >= 14))
+ return 0;
+
+ if ((fail < 0 || fail >= 14)
+ && !TEST_uint64_t_eq(id, 0x2233))
+ return 0;
+
+ if ((fail < 0 || fai