Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
N
nghttp2
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Analytics
Analytics
CI / CD
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Libraries
nghttp2
Commits
3dbe3b3e
Commit
3dbe3b3e
authored
Aug 25, 2019
by
Tatsuhiro Tsujikawa
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Follow ngtcp2 API changes and use libngtcp2_crypto_openssl
parent
7aa4bff9
Changes
8
Expand all
Hide whitespace changes
Inline
Side-by-side
Showing
8 changed files
with
125 additions
and
608 deletions
+125
-608
configure.ac
configure.ac
+10
-0
src/Makefile.am
src/Makefile.am
+2
-0
src/h2load.cc
src/h2load.cc
+4
-0
src/h2load.h
src/h2load.h
+13
-14
src/h2load_http3_session.cc
src/h2load_http3_session.cc
+0
-3
src/h2load_quic.cc
src/h2load_quic.cc
+95
-142
src/quic.cc
src/quic.cc
+0
-398
src/quic.h
src/quic.h
+1
-51
No files found.
configure.ac
View file @
3dbe3b3e
...
...
@@ -461,6 +461,15 @@ if test "x${have_libngtcp2}" = "xno"; then
AC_MSG_NOTICE($LIBNGTCP2_PKG_ERRORS)
fi
# ngtcp2_crypto_openssl (for src)
PKG_CHECK_MODULES([LIBNGTCP2_CRYPTO_OPENSSL],
[libngtcp2_crypto_openssl >= 0.0.0],
[have_libngtcp2_crypto_openssl=yes],
[have_libngtcp2_crypto_openssl=no])
if test "x${have_libngtcp2_crypto_openssl}" = "xno"; then
AC_MSG_NOTICE($LIBNGTCP2_CRYPTO_OPENSSL_PKG_ERRORS)
fi
# nghttp3 (for src)
PKG_CHECK_MODULES([LIBNGHTTP3], [libnghttp3 >= 0.0.0], [have_libnghttp3=yes],
[have_libnghttp3=no])
...
...
@@ -1026,6 +1035,7 @@ AC_MSG_NOTICE([summary of build options:
Libev: ${have_libev} (CFLAGS='${LIBEV_CFLAGS}' LIBS='${LIBEV_LIBS}')
Libc-ares: ${have_libcares} (CFLAGS='${LIBCARES_CFLAGS}' LIBS='${LIBCARES_LIBS}')
libngtcp2: ${have_libngtcp2} (CFLAGS='${LIBNGTCP2_CFLAGS}' LIBS='${LIBNGTCP2_LIBS}')
libngtcp2_crypto_openssl: ${have_libngtcp2_crypto_openssl} (CFLAGS='${LIBNGTCP2_CRYPTO_OPENSSL_CFLAGS}' LIBS='${LIBNGTCP2_CRYPTO_OPENSSL_LIBS}')
libnghttp3: ${have_libnghttp3} (CFLAGS='${LIBNGHTTP3_CFLAGS}' LIBS='${LIBNGHTTP3_LIBS}')
Libevent(SSL): ${have_libevent_openssl} (CFLAGS='${LIBEVENT_OPENSSL_CFLAGS}' LIBS='${LIBEVENT_OPENSSL_LIBS}')
Jansson: ${have_jansson} (CFLAGS='${JANSSON_CFLAGS}' LIBS='${JANSSON_LIBS}')
...
...
src/Makefile.am
View file @
3dbe3b3e
...
...
@@ -47,6 +47,7 @@ AM_CPPFLAGS = \
@OPENSSL_CFLAGS@
\
@LIBCARES_CFLAGS@
\
@LIBNGHTTP3_CFLAGS@
\
@LIBNGTCP2_CRYPTO_OPENSSL_CFLAGS@
\
@LIBNGTCP2_CFLAGS@
\
@JANSSON_CFLAGS@
\
@ZLIB_CFLAGS@
\
...
...
@@ -62,6 +63,7 @@ LDADD = $(top_builddir)/lib/libnghttp2.la \
@OPENSSL_LIBS@
\
@LIBCARES_LIBS@
\
@LIBNGHTTP3_LIBS@
\
@LIBNGTCP2_CRYPTO_OPENSSL_LIBS@
\
@LIBNGTCP2_LIBS@
\
@SYSTEMD_LIBS@
\
@JANSSON_LIBS@
\
...
...
src/h2load.cc
View file @
3dbe3b3e
...
...
@@ -2250,6 +2250,8 @@ Options:
}
}
// namespace
extern
ngtcp2_crypto_ctx
in_crypto_ctx
;
int
main
(
int
argc
,
char
**
argv
)
{
tls
::
libssl_init
();
...
...
@@ -2907,6 +2909,8 @@ int main(int argc, char **argv) {
exit
(
EXIT_FAILURE
);
}
ngtcp2_crypto_ctx_initial
(
&
in_crypto_ctx
);
resolve_host
();
std
::
cout
<<
"starting benchmark..."
<<
std
::
endl
;
...
...
src/h2load.h
View file @
3dbe3b3e
...
...
@@ -46,6 +46,7 @@
#include <nghttp2/nghttp2.h>
#include <ngtcp2/ngtcp2.h>
#include <ngtcp2/ngtcp2_crypto.h>
#include <ev.h>
...
...
@@ -331,6 +332,7 @@ struct Client {
ngtcp2_crypto_level
rx_crypto_level
;
std
::
vector
<
uint8_t
>
server_handshake
;
size_t
server_handshake_nread
;
ngtcp2_crypto_ctx
crypto_ctx
;
// Client never send CRYPTO in Short packet.
std
::
array
<
Crypto
,
2
>
crypto
;
size_t
max_pktlen
;
...
...
@@ -463,26 +465,23 @@ struct Client {
int
quic_recv_crypto_data
(
ngtcp2_crypto_level
crypto_level
,
const
uint8_t
*
data
,
size_t
datalen
);
int
quic_handshake_completed
();
int
quic_in_encrypt
(
uint8_t
*
dest
,
size_t
destlen
,
const
uint8_t
*
plaintext
,
size_t
plaintextlen
,
const
uint8_t
*
key
,
size_t
keylen
,
int
quic_in_encrypt
(
uint8_t
*
dest
,
const
uint8_t
*
plaintext
,
size_t
plaintextlen
,
const
uint8_t
*
key
,
const
uint8_t
*
nonce
,
size_t
noncelen
,
const
uint8_t
*
ad
,
size_t
adlen
);
int
quic_in_decrypt
(
uint8_t
*
dest
,
size_t
destlen
,
const
uint8_t
*
ciphertext
,
size_t
ciphertextlen
,
const
uint8_t
*
key
,
size_t
keylen
,
int
quic_in_decrypt
(
uint8_t
*
dest
,
const
uint8_t
*
ciphertext
,
size_t
ciphertextlen
,
const
uint8_t
*
key
,
const
uint8_t
*
nonce
,
size_t
noncelen
,
const
uint8_t
*
ad
,
size_t
adlen
);
int
quic_encrypt
(
uint8_t
*
dest
,
size_t
destlen
,
const
uint8_t
*
plaintext
,
size_t
plaintextlen
,
const
uint8_t
*
key
,
size_t
keylen
,
int
quic_encrypt
(
uint8_t
*
dest
,
const
uint8_t
*
plaintext
,
size_t
plaintextlen
,
const
uint8_t
*
key
,
const
uint8_t
*
nonce
,
size_t
noncelen
,
const
uint8_t
*
ad
,
size_t
adlen
);
int
quic_decrypt
(
uint8_t
*
dest
,
const
uint8_t
*
ciphertext
,
size_t
ciphertextlen
,
const
uint8_t
*
key
,
const
uint8_t
*
nonce
,
size_t
noncelen
,
const
uint8_t
*
ad
,
size_t
adlen
);
int
quic_decrypt
(
uint8_t
*
dest
,
size_t
destlen
,
const
uint8_t
*
ciphertext
,
size_t
ciphertextlen
,
const
uint8_t
*
key
,
size_t
keylen
,
const
uint8_t
*
nonce
,
size_t
noncelen
,
const
uint8_t
*
ad
,
size_t
adlen
);
int
quic_in_hp_mask
(
uint8_t
*
dest
,
size_t
destlen
,
const
uint8_t
*
key
,
size_t
keylen
,
const
uint8_t
*
sample
,
size_t
samplelen
);
int
quic_hp_mask
(
uint8_t
*
dest
,
size_t
destlen
,
const
uint8_t
*
key
,
size_t
keylen
,
const
uint8_t
*
sample
,
size_t
samplelen
);
int
quic_in_hp_mask
(
uint8_t
*
dest
,
const
uint8_t
*
key
,
const
uint8_t
*
sample
);
int
quic_hp_mask
(
uint8_t
*
dest
,
const
uint8_t
*
key
,
const
uint8_t
*
sample
);
int
quic_recv_stream_data
(
int64_t
stream_id
,
int
fin
,
const
uint8_t
*
data
,
size_t
datalen
);
int
quic_stream_close
(
int64_t
stream_id
,
uint64_t
app_error_code
);
...
...
src/h2load_http3_session.cc
View file @
3dbe3b3e
...
...
@@ -83,9 +83,6 @@ int64_t Http3Session::submit_request_internal() {
return
rv
;
}
rv
=
nghttp3_conn_end_stream
(
conn_
,
stream_id
);
assert
(
0
==
rv
);
client_
->
on_request
(
stream_id
);
auto
req_stat
=
client_
->
get_req_stat
(
stream_id
);
assert
(
req_stat
);
...
...
src/h2load_quic.cc
View file @
3dbe3b3e
This diff is collapsed.
Click to expand it.
src/quic.cc
View file @
3dbe3b3e
This diff is collapsed.
Click to expand it.
src/quic.h
View file @
3dbe3b3e
...
...
@@ -27,60 +27,10 @@
#include "nghttp2_config.h"
#include
<openssl/ssl.h>
#include
"stdint.h"
namespace
quic
{
const
EVP_CIPHER
*
aead
(
SSL
*
ssl
);
const
EVP_CIPHER
*
hp
(
SSL
*
ssl
);
const
EVP_MD
*
prf
(
SSL
*
ssl
);
size_t
aead_max_overhead
(
const
EVP_CIPHER
*
aead
);
int
hkdf_extract
(
uint8_t
*
dest
,
size_t
destlen
,
const
uint8_t
*
secret
,
size_t
secretlen
,
const
uint8_t
*
salt
,
size_t
saltlen
,
const
EVP_MD
*
prf
);
int
hkdf_expand
(
uint8_t
*
dest
,
size_t
destlen
,
const
uint8_t
*
secret
,
size_t
secretlen
,
const
uint8_t
*
info
,
size_t
infolen
,
const
EVP_MD
*
prf
);
int
hkdf_expand_label
(
uint8_t
*
dest
,
size_t
destlen
,
const
uint8_t
*
secret
,
size_t
secretlen
,
const
uint8_t
*
label
,
size_t
labellen
,
const
EVP_MD
*
prf
);
int
derive_initial_secret
(
uint8_t
*
dest
,
size_t
destlen
,
const
uint8_t
*
secret
,
size_t
secretlen
,
const
uint8_t
*
salt
,
size_t
saltlen
);
int
derive_client_initial_secret
(
uint8_t
*
dest
,
size_t
destlen
,
const
uint8_t
*
secret
,
size_t
secretlen
);
int
derive_server_initial_secret
(
uint8_t
*
dest
,
size_t
destlen
,
const
uint8_t
*
secret
,
size_t
secretlen
);
int
derive_packet_protection_key
(
uint8_t
*
key
,
size_t
&
keylen
,
uint8_t
*
iv
,
size_t
&
ivlen
,
const
uint8_t
*
secret
,
size_t
secretlen
,
const
EVP_CIPHER
*
aead
,
const
EVP_MD
*
prf
);
int
derive_header_protection_key
(
uint8_t
*
key
,
size_t
&
keylen
,
const
uint8_t
*
secret
,
size_t
secretlen
,
const
EVP_CIPHER
*
aead
,
const
EVP_MD
*
prf
);
ssize_t
encrypt
(
uint8_t
*
dest
,
size_t
destlen
,
const
uint8_t
*
plaintext
,
size_t
plaintextlen
,
const
uint8_t
*
key
,
size_t
keylen
,
const
uint8_t
*
nonce
,
size_t
noncelen
,
const
uint8_t
*
ad
,
size_t
adlen
,
const
EVP_CIPHER
*
aead
);
ssize_t
decrypt
(
uint8_t
*
dest
,
size_t
destlen
,
const
uint8_t
*
ciphertext
,
size_t
ciphertextlen
,
const
uint8_t
*
key
,
size_t
keylen
,
const
uint8_t
*
nonce
,
size_t
noncelen
,
const
uint8_t
*
ad
,
size_t
adlen
,
const
EVP_CIPHER
*
aead
);
ssize_t
hp_mask
(
uint8_t
*
dest
,
size_t
destlen
,
const
uint8_t
*
key
,
size_t
keylen
,
const
uint8_t
*
sample
,
size_t
samplelen
,
const
EVP_CIPHER
*
cipher
);
enum
class
ErrorType
{
Transport
,
TransportVersionNegotiation
,
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment