mirror of
https://github.com/curl/curl.git
synced 2026-04-11 12:01:42 +08:00
openssl: auto-pause on verify callback retry
When an application install its own OpenSSL verify callback and that callback invokes `SSL_set_retry_verify()`, the transfer is automatically paused and does not progress the connect attempt any further until unpaused via `curl_easy_pause(). Added test758 to verify. Ref: #18284 Original PR by @Natris Bug: https://curl.se/mail/lib-2025-08/0012.html Closes #18288
This commit is contained in:
parent
c5f76b8096
commit
a5f0ab7995
@ -60,7 +60,9 @@ callbacks to add additional validation code for certificates, and even to
|
||||
change the actual URI of an HTTPS request.
|
||||
|
||||
For OpenSSL, asynchronous certificate verification via *SSL_set_retry_verify*
|
||||
is supported. (Added in 8.3.0)
|
||||
is supported. When *SSL_set_retry_verify* is set, the transfer is paused.
|
||||
When verification should continue, call curl_easy_pause(3) to unpause
|
||||
the transfer. (Added in 8.3.0, Pausing added in 8.16.0)
|
||||
|
||||
The CURLOPT_SSL_CTX_FUNCTION(3) callback allows the application to reach in
|
||||
and modify SSL details in the connection without libcurl itself knowing
|
||||
|
||||
42
lib/multi.c
42
lib/multi.c
@ -1026,9 +1026,13 @@ CURLMcode Curl_multi_pollset(struct Curl_easy *data,
|
||||
|
||||
case MSTATE_CONNECTING:
|
||||
case MSTATE_TUNNELING:
|
||||
result = mstate_connecting_pollset(data, ps);
|
||||
if(!result)
|
||||
result = Curl_conn_adjust_pollset(data, data->conn, ps);
|
||||
if(!Curl_xfer_recv_is_paused(data)) {
|
||||
result = mstate_connecting_pollset(data, ps);
|
||||
if(!result)
|
||||
result = Curl_conn_adjust_pollset(data, data->conn, ps);
|
||||
}
|
||||
else
|
||||
expect_sockets = FALSE;
|
||||
break;
|
||||
|
||||
case MSTATE_PROTOCONNECT:
|
||||
@ -2434,22 +2438,24 @@ static CURLMcode multi_runsingle(struct Curl_multi *multi,
|
||||
case MSTATE_CONNECTING:
|
||||
/* awaiting a completion of an asynch TCP connect */
|
||||
DEBUGASSERT(data->conn);
|
||||
result = Curl_conn_connect(data, FIRSTSOCKET, FALSE, &connected);
|
||||
if(connected && !result) {
|
||||
if(!data->conn->bits.reuse &&
|
||||
Curl_conn_is_multiplex(data->conn, FIRSTSOCKET)) {
|
||||
/* new connection, can multiplex, wake pending handles */
|
||||
process_pending_handles(data->multi);
|
||||
if(!Curl_xfer_recv_is_paused(data)) {
|
||||
result = Curl_conn_connect(data, FIRSTSOCKET, FALSE, &connected);
|
||||
if(connected && !result) {
|
||||
if(!data->conn->bits.reuse &&
|
||||
Curl_conn_is_multiplex(data->conn, FIRSTSOCKET)) {
|
||||
/* new connection, can multiplex, wake pending handles */
|
||||
process_pending_handles(data->multi);
|
||||
}
|
||||
rc = CURLM_CALL_MULTI_PERFORM;
|
||||
multistate(data, MSTATE_PROTOCONNECT);
|
||||
}
|
||||
else if(result) {
|
||||
/* failure detected */
|
||||
multi_posttransfer(data);
|
||||
multi_done(data, result, TRUE);
|
||||
stream_error = TRUE;
|
||||
break;
|
||||
}
|
||||
rc = CURLM_CALL_MULTI_PERFORM;
|
||||
multistate(data, MSTATE_PROTOCONNECT);
|
||||
}
|
||||
else if(result) {
|
||||
/* failure detected */
|
||||
multi_posttransfer(data);
|
||||
multi_done(data, result, TRUE);
|
||||
stream_error = TRUE;
|
||||
break;
|
||||
}
|
||||
break;
|
||||
|
||||
|
||||
@ -61,6 +61,7 @@
|
||||
#include "../vauth/vauth.h"
|
||||
#include "keylog.h"
|
||||
#include "hostcheck.h"
|
||||
#include "../transfer.h"
|
||||
#include "../multiif.h"
|
||||
#include "../curlx/strparse.h"
|
||||
#include "../strdup.h"
|
||||
@ -4602,7 +4603,7 @@ static CURLcode ossl_connect_step2(struct Curl_cfilter *cf,
|
||||
#ifdef SSL_ERROR_WANT_RETRY_VERIFY
|
||||
if(SSL_ERROR_WANT_RETRY_VERIFY == detail) {
|
||||
CURL_TRC_CF(data, cf, "SSL_connect() -> want retry_verify");
|
||||
connssl->io_need = CURL_SSL_IO_NEED_RECV;
|
||||
Curl_xfer_pause_recv(data, TRUE);
|
||||
return CURLE_AGAIN;
|
||||
}
|
||||
#endif
|
||||
|
||||
@ -108,7 +108,7 @@ test718 test719 test720 test721 test722 test723 test724 test725 test726 \
|
||||
test727 test728 test729 test730 test731 test732 test733 test734 test735 \
|
||||
test736 test737 test738 test739 test740 test741 test742 test743 test744 \
|
||||
test745 test746 test747 test748 test749 test750 test751 test752 test753 \
|
||||
test754 test755 test756 test757 \
|
||||
test754 test755 test756 test757 test758 \
|
||||
test780 test781 test782 test783 test784 test785 test786 test787 test788 \
|
||||
test789 test790 test791 test792 test793 test794 test796 test797 \
|
||||
\
|
||||
|
||||
53
tests/data/test758
Normal file
53
tests/data/test758
Normal file
@ -0,0 +1,53 @@
|
||||
<testcase>
|
||||
<info>
|
||||
<keywords>
|
||||
multi
|
||||
HTTPS
|
||||
</keywords>
|
||||
</info>
|
||||
|
||||
# Server-side
|
||||
<reply>
|
||||
<data nocheck="yes">
|
||||
HTTP/1.1 200 OK
|
||||
Date: Tue, 09 Nov 2010 14:49:00 GMT
|
||||
Server: test-server/fake
|
||||
Last-Modified: Tue, 13 Jun 2000 12:10:00 GMT
|
||||
ETag: "21025-dc7-39462498"
|
||||
Accept-Ranges: bytes
|
||||
Content-Length: 6007
|
||||
Connection: close
|
||||
Content-Type: text/html
|
||||
Funny-head: yesyes
|
||||
|
||||
-foo-
|
||||
%repeat[1000 x foobar]%
|
||||
</data>
|
||||
</reply>
|
||||
|
||||
<features>
|
||||
OpenSSL
|
||||
</features>
|
||||
|
||||
# Client-side
|
||||
<client>
|
||||
<server>
|
||||
https
|
||||
</server>
|
||||
<tool>
|
||||
lib%TESTNUMBER
|
||||
</tool>
|
||||
<name>
|
||||
multi_socket interface transfer with callbacks returning error
|
||||
</name>
|
||||
<command>
|
||||
https://localhost:%HTTPSPORT/file%TESTNUMBER
|
||||
</command>
|
||||
</client>
|
||||
|
||||
# Verify data after the test has been "shot"
|
||||
<verify>
|
||||
<protocol>
|
||||
</protocol>
|
||||
</verify>
|
||||
</testcase>
|
||||
@ -71,7 +71,7 @@ TESTS_C = \
|
||||
lib661.c lib666.c lib667.c lib668.c \
|
||||
lib670.c lib674.c lib676.c lib677.c lib678.c \
|
||||
lib694.c lib695.c \
|
||||
lib751.c lib753.c \
|
||||
lib751.c lib753.c lib758.c \
|
||||
lib757.c \
|
||||
lib1156.c \
|
||||
lib1301.c lib1308.c \
|
||||
|
||||
515
tests/libtest/lib758.c
Normal file
515
tests/libtest/lib758.c
Normal file
@ -0,0 +1,515 @@
|
||||
/***************************************************************************
|
||||
* _ _ ____ _
|
||||
* Project ___| | | | _ \| |
|
||||
* / __| | | | |_) | |
|
||||
* | (__| |_| | _ <| |___
|
||||
* \___|\___/|_| \_\_____|
|
||||
*
|
||||
* Copyright (C) Daniel Stenberg, <daniel@haxx.se>, et al.
|
||||
*
|
||||
* This software is licensed as described in the file COPYING, which
|
||||
* you should have received as part of this distribution. The terms
|
||||
* are also available at https://curl.se/docs/copyright.html.
|
||||
*
|
||||
* You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
||||
* copies of the Software, and permit persons to whom the Software is
|
||||
* furnished to do so, under the terms of the COPYING file.
|
||||
*
|
||||
* This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
||||
* KIND, either express or implied.
|
||||
*
|
||||
* SPDX-License-Identifier: curl
|
||||
*
|
||||
***************************************************************************/
|
||||
|
||||
/*
|
||||
* The purpose of this test is to make sure that if CURLMOPT_SOCKETFUNCTION or
|
||||
* CURLMOPT_TIMERFUNCTION returns error, the associated transfer should be
|
||||
* aborted correctly.
|
||||
*/
|
||||
|
||||
#include "first.h"
|
||||
|
||||
#include "testtrace.h"
|
||||
#include "memdebug.h"
|
||||
|
||||
#ifdef USE_OPENSSL
|
||||
|
||||
#include <openssl/x509.h>
|
||||
#include <openssl/ssl.h>
|
||||
|
||||
#if ((OPENSSL_VERSION_NUMBER >= 0x30000000L) && \
|
||||
!defined(LIBRESSL_VERSION_NUMBER) && \
|
||||
!defined(OPENSSL_IS_BORINGSSL))
|
||||
#define T578_ENABLED
|
||||
#endif
|
||||
#endif
|
||||
|
||||
#ifdef T578_ENABLED
|
||||
|
||||
static struct t758_ctx {
|
||||
int socket_calls;
|
||||
int max_socket_calls;
|
||||
int timer_calls;
|
||||
int max_timer_calls;
|
||||
int fake_async_cert_verification_pending;
|
||||
int fake_async_cert_verification_finished;
|
||||
int number_of_cert_verify_callbacks;
|
||||
char buf[1024];
|
||||
} t758_ctx;
|
||||
|
||||
static const char *t758_tag(void)
|
||||
{
|
||||
curl_msnprintf(t758_ctx.buf, sizeof(t758_ctx.buf),
|
||||
"[T758-%d-%d] [%d/%d]",
|
||||
t758_ctx.max_socket_calls, t758_ctx.max_timer_calls,
|
||||
t758_ctx.socket_calls, t758_ctx.timer_calls);
|
||||
return t758_ctx.buf;
|
||||
}
|
||||
|
||||
static void t758_msg(const char *msg)
|
||||
{
|
||||
curl_mfprintf(stderr, "%s %s\n", t758_tag(), msg);
|
||||
}
|
||||
|
||||
|
||||
struct t758_Sockets {
|
||||
curl_socket_t *sockets;
|
||||
int count; /* number of sockets actually stored in array */
|
||||
int max_count; /* max number of sockets that fit in allocated array */
|
||||
};
|
||||
|
||||
struct t758_ReadWriteSockets {
|
||||
struct t758_Sockets read, write;
|
||||
};
|
||||
|
||||
/**
|
||||
* Remove a file descriptor from a sockets array.
|
||||
*/
|
||||
static void t758_removeFd(struct t758_Sockets *sockets, curl_socket_t fd,
|
||||
int mention)
|
||||
{
|
||||
int i;
|
||||
|
||||
if(mention)
|
||||
curl_mfprintf(stderr, "%s remove socket fd %" FMT_SOCKET_T "\n",
|
||||
t758_tag(), fd);
|
||||
|
||||
for(i = 0; i < sockets->count; ++i) {
|
||||
if(sockets->sockets[i] == fd) {
|
||||
if(i < sockets->count - 1)
|
||||
memmove(&sockets->sockets[i], &sockets->sockets[i + 1],
|
||||
sizeof(curl_socket_t) * (sockets->count - (i + 1)));
|
||||
--sockets->count;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Add a file descriptor to a sockets array.
|
||||
* Return 0 on success, 1 on error.
|
||||
*/
|
||||
static int t758_addFd(struct t758_Sockets *sockets, curl_socket_t fd,
|
||||
const char *what)
|
||||
{
|
||||
/**
|
||||
* To ensure we only have each file descriptor once, we remove it then add
|
||||
* it again.
|
||||
*/
|
||||
curl_mfprintf(stderr, "%s add socket fd %" FMT_SOCKET_T " for %s\n",
|
||||
t758_tag(), fd, what);
|
||||
t758_removeFd(sockets, fd, 0);
|
||||
/*
|
||||
* Allocate array storage when required.
|
||||
*/
|
||||
if(!sockets->sockets) {
|
||||
sockets->sockets = malloc(sizeof(curl_socket_t) * 20U);
|
||||
if(!sockets->sockets)
|
||||
return 1;
|
||||
sockets->max_count = 20;
|
||||
}
|
||||
else if(sockets->count + 1 > sockets->max_count) {
|
||||
curl_socket_t *ptr = realloc(sockets->sockets, sizeof(curl_socket_t) *
|
||||
(sockets->max_count + 20));
|
||||
if(!ptr)
|
||||
/* cleanup in test_cleanup */
|
||||
return 1;
|
||||
sockets->sockets = ptr;
|
||||
sockets->max_count += 20;
|
||||
}
|
||||
/*
|
||||
* Add file descriptor to array.
|
||||
*/
|
||||
sockets->sockets[sockets->count] = fd;
|
||||
++sockets->count;
|
||||
return 0;
|
||||
}
|
||||
|
||||
/**
|
||||
* Callback invoked by curl to poll reading / writing of a socket.
|
||||
*/
|
||||
static int t758_curlSocketCallback(CURL *easy, curl_socket_t s, int action,
|
||||
void *userp, void *socketp)
|
||||
{
|
||||
struct t758_ReadWriteSockets *sockets = userp;
|
||||
|
||||
(void)easy;
|
||||
(void)socketp;
|
||||
|
||||
t758_ctx.socket_calls++;
|
||||
t758_msg("-> CURLMOPT_SOCKETFUNCTION");
|
||||
if(t758_ctx.socket_calls == t758_ctx.max_socket_calls) {
|
||||
t758_msg("<- CURLMOPT_SOCKETFUNCTION returns error");
|
||||
return -1;
|
||||
}
|
||||
|
||||
if(action == CURL_POLL_IN || action == CURL_POLL_INOUT)
|
||||
if(t758_addFd(&sockets->read, s, "read"))
|
||||
return -1; /* bail out */
|
||||
|
||||
if(action == CURL_POLL_OUT || action == CURL_POLL_INOUT)
|
||||
if(t758_addFd(&sockets->write, s, "write"))
|
||||
return -1;
|
||||
|
||||
if(action == CURL_POLL_REMOVE) {
|
||||
t758_removeFd(&sockets->read, s, 1);
|
||||
t758_removeFd(&sockets->write, s, 0);
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
/**
|
||||
* Callback invoked by curl to set a timeout.
|
||||
*/
|
||||
static int t758_curlTimerCallback(CURLM *multi, long timeout_ms, void *userp)
|
||||
{
|
||||
struct curltime *timeout = userp;
|
||||
|
||||
(void)multi; /* unused */
|
||||
t758_ctx.timer_calls++;
|
||||
t758_msg("-> CURLMOPT_TIMERFUNCTION");
|
||||
if(t758_ctx.timer_calls == t758_ctx.max_timer_calls) {
|
||||
t758_msg("<- CURLMOPT_TIMERFUNCTION returns error");
|
||||
return -1;
|
||||
}
|
||||
if(timeout_ms != -1) {
|
||||
*timeout = curlx_now();
|
||||
timeout->tv_usec += (int)timeout_ms * 1000;
|
||||
}
|
||||
else {
|
||||
timeout->tv_sec = -1;
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int t758_cert_verify_callback(X509_STORE_CTX *ctx, void *arg)
|
||||
{
|
||||
SSL * ssl;
|
||||
(void)arg; /* unused */
|
||||
ssl = (SSL *)X509_STORE_CTX_get_ex_data(ctx,
|
||||
SSL_get_ex_data_X509_STORE_CTX_idx());
|
||||
t758_ctx.number_of_cert_verify_callbacks++;
|
||||
if(!t758_ctx.fake_async_cert_verification_pending) {
|
||||
t758_ctx.fake_async_cert_verification_pending = 1;
|
||||
t758_msg(" initial t758_cert_verify_callback");
|
||||
return SSL_set_retry_verify(ssl);
|
||||
}
|
||||
else if(t758_ctx.fake_async_cert_verification_finished) {
|
||||
t758_msg(" final t758_cert_verify_callback");
|
||||
return 1; /* success */
|
||||
}
|
||||
else {
|
||||
t758_msg(" pending t758_cert_verify_callback");
|
||||
return SSL_set_retry_verify(ssl);
|
||||
}
|
||||
}
|
||||
|
||||
static CURLcode
|
||||
t758_set_ssl_ctx_callback(CURL *curl, void *ssl_ctx, void *clientp)
|
||||
{
|
||||
SSL_CTX *ctx = (SSL_CTX *) ssl_ctx;
|
||||
(void)curl; /* unused */
|
||||
SSL_CTX_set_cert_verify_callback(ctx, t758_cert_verify_callback, clientp);
|
||||
return CURLE_OK;
|
||||
}
|
||||
|
||||
/**
|
||||
* Check for curl completion.
|
||||
*/
|
||||
static int t758_checkForCompletion(CURLM *curl, int *success)
|
||||
{
|
||||
int result = 0;
|
||||
*success = 0;
|
||||
while(1) {
|
||||
int numMessages;
|
||||
CURLMsg *message = curl_multi_info_read(curl, &numMessages);
|
||||
if(!message)
|
||||
break;
|
||||
if(message->msg == CURLMSG_DONE) {
|
||||
result = 1;
|
||||
if(message->data.result == CURLE_OK)
|
||||
*success = 1;
|
||||
else
|
||||
*success = 0;
|
||||
}
|
||||
else {
|
||||
curl_mfprintf(stderr, "%s got an unexpected message from curl: %i\n",
|
||||
t758_tag(), message->msg);
|
||||
result = 1;
|
||||
*success = 0;
|
||||
}
|
||||
}
|
||||
return result;
|
||||
}
|
||||
|
||||
static ssize_t t758_getMicroSecondTimeout(struct curltime *timeout)
|
||||
{
|
||||
struct curltime now;
|
||||
ssize_t result;
|
||||
now = curlx_now();
|
||||
result = (ssize_t)((timeout->tv_sec - now.tv_sec) * 1000000 +
|
||||
timeout->tv_usec - now.tv_usec);
|
||||
if(result < 0)
|
||||
result = 0;
|
||||
|
||||
return result;
|
||||
}
|
||||
|
||||
/**
|
||||
* Update a fd_set with all of the sockets in use.
|
||||
*/
|
||||
static void t758_updateFdSet(struct t758_Sockets *sockets, fd_set* fdset,
|
||||
curl_socket_t *maxFd)
|
||||
{
|
||||
int i;
|
||||
for(i = 0; i < sockets->count; ++i) {
|
||||
#ifdef __DJGPP__
|
||||
#pragma GCC diagnostic push
|
||||
#pragma GCC diagnostic ignored "-Warith-conversion"
|
||||
#endif
|
||||
FD_SET(sockets->sockets[i], fdset);
|
||||
#ifdef __DJGPP__
|
||||
#pragma GCC diagnostic pop
|
||||
#endif
|
||||
if(*maxFd < sockets->sockets[i] + 1) {
|
||||
*maxFd = sockets->sockets[i] + 1;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
static CURLMcode t758_saction(CURLM *curl, curl_socket_t s,
|
||||
int evBitmask, const char *info)
|
||||
{
|
||||
int numhandles = 0;
|
||||
CURLMcode result = curl_multi_socket_action(curl, s, evBitmask, &numhandles);
|
||||
if(result != CURLM_OK) {
|
||||
curl_mfprintf(stderr, "%s Curl error on %s (%i) %s\n",
|
||||
t758_tag(), info, result, curl_multi_strerror(result));
|
||||
}
|
||||
return result;
|
||||
}
|
||||
|
||||
/**
|
||||
* Invoke curl when a file descriptor is set.
|
||||
*/
|
||||
static CURLMcode t758_checkFdSet(CURLM *curl, struct t758_Sockets *sockets,
|
||||
fd_set *fdset, int evBitmask,
|
||||
const char *name)
|
||||
{
|
||||
int i;
|
||||
CURLMcode result = CURLM_OK;
|
||||
for(i = 0; i < sockets->count; ++i) {
|
||||
if(FD_ISSET(sockets->sockets[i], fdset)) {
|
||||
result = t758_saction(curl, sockets->sockets[i], evBitmask, name);
|
||||
if(result)
|
||||
break;
|
||||
}
|
||||
}
|
||||
return result;
|
||||
}
|
||||
|
||||
static CURLcode t758_one(const char *URL, int timer_fail_at,
|
||||
int socket_fail_at)
|
||||
{
|
||||
CURLcode res = CURLE_OK;
|
||||
CURL *curl = NULL; CURLM *m = NULL;
|
||||
struct t758_ReadWriteSockets sockets = {{NULL, 0, 0}, {NULL, 0, 0}};
|
||||
int success = 0;
|
||||
struct curltime timeout = {0};
|
||||
timeout.tv_sec = (time_t)-1;
|
||||
|
||||
/* set the limits */
|
||||
memset(&t758_ctx, 0, sizeof(t758_ctx));
|
||||
t758_ctx.max_timer_calls = timer_fail_at;
|
||||
t758_ctx.max_socket_calls = socket_fail_at;
|
||||
|
||||
t758_msg("start");
|
||||
start_test_timing();
|
||||
|
||||
if(curl_global_sslset(CURLSSLBACKEND_OPENSSL, NULL, NULL) != CURLSSLSET_OK) {
|
||||
t758_msg("could not set OpenSSL as backend");
|
||||
res = CURLE_FAILED_INIT;
|
||||
return res;
|
||||
}
|
||||
|
||||
res_global_init(CURL_GLOBAL_ALL);
|
||||
if(res != CURLE_OK)
|
||||
return res;
|
||||
|
||||
curl_global_trace("all");
|
||||
|
||||
|
||||
easy_init(curl);
|
||||
debug_config.nohex = TRUE;
|
||||
debug_config.tracetime = TRUE;
|
||||
test_setopt(curl, CURLOPT_DEBUGDATA, &debug_config);
|
||||
easy_setopt(curl, CURLOPT_DEBUGFUNCTION, libtest_debug_cb);
|
||||
easy_setopt(curl, CURLOPT_VERBOSE, 1L);
|
||||
|
||||
/* specify target */
|
||||
easy_setopt(curl, CURLOPT_URL, URL);
|
||||
|
||||
/* go verbose */
|
||||
easy_setopt(curl, CURLOPT_VERBOSE, 1L);
|
||||
|
||||
easy_setopt(curl, CURLOPT_SSL_CTX_FUNCTION, t758_set_ssl_ctx_callback);
|
||||
|
||||
multi_init(m);
|
||||
|
||||
multi_setopt(m, CURLMOPT_SOCKETFUNCTION, t758_curlSocketCallback);
|
||||
multi_setopt(m, CURLMOPT_SOCKETDATA, &sockets);
|
||||
|
||||
multi_setopt(m, CURLMOPT_TIMERFUNCTION, t758_curlTimerCallback);
|
||||
multi_setopt(m, CURLMOPT_TIMERDATA, &timeout);
|
||||
|
||||
multi_add_handle(m, curl);
|
||||
|
||||
if(t758_saction(m, CURL_SOCKET_TIMEOUT, 0, "timeout")) {
|
||||
res = TEST_ERR_MAJOR_BAD;
|
||||
goto test_cleanup;
|
||||
}
|
||||
while(!t758_checkForCompletion(m, &success)) {
|
||||
fd_set readSet, writeSet;
|
||||
curl_socket_t maxFd = 0;
|
||||
struct timeval tv = {0};
|
||||
tv.tv_sec = 10;
|
||||
|
||||
if(t758_ctx.fake_async_cert_verification_pending &&
|
||||
!t758_ctx.fake_async_cert_verification_finished) {
|
||||
if(sockets.read.count || sockets.write.count) {
|
||||
t758_msg("during verification there should be no sockets scheduled");
|
||||
res = TEST_ERR_MAJOR_BAD;
|
||||
goto test_cleanup;
|
||||
}
|
||||
if(t758_ctx.number_of_cert_verify_callbacks != 1) {
|
||||
t758_msg("expecting exactly one cert verify callback here");
|
||||
res = TEST_ERR_MAJOR_BAD;
|
||||
goto test_cleanup;
|
||||
}
|
||||
t758_ctx.fake_async_cert_verification_finished = 1;
|
||||
if(t758_saction(m, CURL_SOCKET_TIMEOUT, 0, "timeout")) {
|
||||
t758_msg("spurious retry cert action");
|
||||
res = TEST_ERR_MAJOR_BAD;
|
||||
goto test_cleanup;
|
||||
}
|
||||
curl_easy_pause(curl, CURLPAUSE_CONT);
|
||||
if(t758_saction(m, CURL_SOCKET_TIMEOUT, 0, "timeout")) {
|
||||
t758_msg("unblocking transfer after cert verification finished");
|
||||
res = TEST_ERR_MAJOR_BAD;
|
||||
goto test_cleanup;
|
||||
}
|
||||
if(t758_ctx.number_of_cert_verify_callbacks != 2) {
|
||||
t758_msg("this should have triggered the callback again, right?");
|
||||
res = TEST_ERR_MAJOR_BAD;
|
||||
goto test_cleanup;
|
||||
}
|
||||
t758_msg("TEST: all fine?");
|
||||
}
|
||||
FD_ZERO(&readSet);
|
||||
FD_ZERO(&writeSet);
|
||||
t758_updateFdSet(&sockets.read, &readSet, &maxFd);
|
||||
t758_updateFdSet(&sockets.write, &writeSet, &maxFd);
|
||||
|
||||
if(timeout.tv_sec != (time_t)-1) {
|
||||
int usTimeout = curlx_sztosi(t758_getMicroSecondTimeout(&timeout));
|
||||
tv.tv_sec = usTimeout / 1000000;
|
||||
tv.tv_usec = usTimeout % 1000000;
|
||||
}
|
||||
else if(maxFd <= 0) {
|
||||
tv.tv_sec = 0;
|
||||
tv.tv_usec = 100000;
|
||||
}
|
||||
|
||||
select_test((int)maxFd, &readSet, &writeSet, NULL, &tv);
|
||||
|
||||
/* Check the sockets for reading / writing */
|
||||
if(t758_checkFdSet(m, &sockets.read, &readSet, CURL_CSELECT_IN,
|
||||
"read")) {
|
||||
res = TEST_ERR_MAJOR_BAD;
|
||||
goto test_cleanup;
|
||||
}
|
||||
if(t758_checkFdSet(m, &sockets.write, &writeSet, CURL_CSELECT_OUT,
|
||||
"write")) {
|
||||
res = TEST_ERR_MAJOR_BAD;
|
||||
goto test_cleanup;
|
||||
}
|
||||
|
||||
if(timeout.tv_sec != (time_t)-1 &&
|
||||
t758_getMicroSecondTimeout(&timeout) == 0) {
|
||||
/* Curl's timer has elapsed. */
|
||||
if(t758_saction(m, CURL_SOCKET_TIMEOUT, 0, "timeout")) {
|
||||
res = TEST_ERR_BAD_TIMEOUT;
|
||||
goto test_cleanup;
|
||||
}
|
||||
}
|
||||
|
||||
abort_on_test_timeout();
|
||||
}
|
||||
if(success && t758_ctx.number_of_cert_verify_callbacks != 2) {
|
||||
t758_msg("unexpected invocations of cert verify callback");
|
||||
res = TEST_ERR_MAJOR_BAD;
|
||||
goto test_cleanup;
|
||||
}
|
||||
|
||||
if(!success) {
|
||||
t758_msg("Error getting file.");
|
||||
res = TEST_ERR_MAJOR_BAD;
|
||||
}
|
||||
|
||||
test_cleanup:
|
||||
|
||||
/* proper cleanup sequence */
|
||||
t758_msg("cleanup");
|
||||
curl_multi_remove_handle(m, curl);
|
||||
curl_easy_cleanup(curl);
|
||||
curl_multi_cleanup(m);
|
||||
curl_global_cleanup();
|
||||
|
||||
/* free local memory */
|
||||
free(sockets.read.sockets);
|
||||
free(sockets.write.sockets);
|
||||
t758_msg("done");
|
||||
|
||||
return res;
|
||||
}
|
||||
|
||||
static CURLcode test_lib758(const char *URL)
|
||||
{
|
||||
CURLcode rc;
|
||||
/* rerun the same transfer multiple times and make it fail in different
|
||||
callback calls */
|
||||
rc = t758_one(URL, 0, 0); /* no callback fails */
|
||||
if(rc)
|
||||
curl_mfprintf(stderr, "%s FAILED: %d\n", t758_tag(), rc);
|
||||
|
||||
return rc;
|
||||
}
|
||||
|
||||
#else /* T578_ENABLED */
|
||||
static CURLcode test_lib758(const char *URL)
|
||||
{
|
||||
(void)URL;
|
||||
return CURLE_OK;
|
||||
}
|
||||
#endif
|
||||
Loading…
Reference in New Issue
Block a user