blob: 8d9516cace4f67627b9faa89b98615abf1b47f29 [file] [log] [blame]
Simon Xu6f224942013-12-06 11:51:16 +08001/* SCTP kernel Implementation
mridge5ba96af2004-02-23 16:17:34 +00002 * Copyright (c) 2003 Hewlett-Packard Development Company, L.P
3 * (C) Copyright IBM Corp. 2004
4 *
5 * This file has test cases to test the send() call for 1-1 style sockets
6 *
7 * TEST1: Bad socket descriptor
8 * TEST2: Invalid socket
9 * TEST3: On a listening socket
10 * TEST4: On a closed association
11 * TEST5: Invalid message address
Simon Xu6f224942013-12-06 11:51:16 +080012 * TEST6: send from client to server
13 * TEST7: send from server to client
mridge5ba96af2004-02-23 16:17:34 +000014 * TEST8: sending partial data from a buffer
15 *
Simon Xu6f224942013-12-06 11:51:16 +080016 * The SCTP implementation is free software;
mridge5ba96af2004-02-23 16:17:34 +000017 * you can redistribute it and/or modify it under the terms of
18 * the GNU General Public License as published by
19 * the Free Software Foundation; either version 2, or (at your option)
20 * any later version.
21 *
Simon Xu6f224942013-12-06 11:51:16 +080022 * The SCTP implementation is distributed in the hope that it
mridge5ba96af2004-02-23 16:17:34 +000023 * will be useful, but WITHOUT ANY WARRANTY; without even the implied
24 * ************************
25 * warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
26 * See the GNU General Public License for more details.
27 *
28 * You should have received a copy of the GNU General Public License
29 * along with GNU CC; see the file COPYING. If not, write to
30 * the Free Software Foundation, 59 Temple Place - Suite 330,
31 * Boston, MA 02111-1307, USA.
32 *
33 * Please send any bug reports or fixes you make to the
34 * email address(es):
35 * lksctp developers <lksctp-developers@lists.sourceforge.net>
36 *
37 * Or submit a bug report through the following website:
38 * http://www.sf.net/projects/lksctp
39 *
40 * Any bugs reported given to us we will try to fix... any fixes shared will
41 * be incorporated into the next SCTP release
42 *
43 */
44
45#include <stdio.h>
46#include <unistd.h>
47#include <fcntl.h>
48#include <stdlib.h>
49#include <string.h>
50#include <sys/types.h>
51#include <sys/socket.h>
Simon Xu6f224942013-12-06 11:51:16 +080052#include <netinet/in.h> /* for sockaddr_in */
mridge5ba96af2004-02-23 16:17:34 +000053#include <arpa/inet.h>
54#include <errno.h>
55#include <netinet/sctp.h>
56#include <sys/uio.h>
mridge64a341f2006-01-03 19:16:46 +000057#include <linux/socket.h>
mridge5ba96af2004-02-23 16:17:34 +000058#include <sctputil.h>
59
60char *TCID = __FILE__;
61int TST_TOTAL = 8;
62int TST_CNT = 0;
63
Simon Xu6f224942013-12-06 11:51:16 +080064int
65main(int argc, char *argv[])
mridge5ba96af2004-02-23 16:17:34 +000066{
Simon Xu6f224942013-12-06 11:51:16 +080067 socklen_t len,len_snd;
mridge64a341f2006-01-03 19:16:46 +000068 int msg_count;
Simon Xu6f224942013-12-06 11:51:16 +080069 int sk,sk1,pf_class,lstn_sk,acpt_sk,acpt1_sk, flag, count;
70 char *message = "hello, world!\n";
71 char *message_rcv;
Simon Xu8c1e85d2013-12-16 13:20:28 +080072 int fd, err_no = 0;
73 char filename[21];
mridge5ba96af2004-02-23 16:17:34 +000074
Simon Xu6f224942013-12-06 11:51:16 +080075 struct sockaddr_in conn_addr,lstn_addr,svr_addr;
mridge5ba96af2004-02-23 16:17:34 +000076
77 /* Rather than fflush() throughout the code, set stdout to
Simon Xu6f224942013-12-06 11:51:16 +080078 * be unbuffered.
79 */
80 setvbuf(stdout, NULL, _IONBF, 0);
81 setvbuf(stderr, NULL, _IONBF, 0);
mridge5ba96af2004-02-23 16:17:34 +000082
Simon Xu6f224942013-12-06 11:51:16 +080083 pf_class = PF_INET;
mridge5ba96af2004-02-23 16:17:34 +000084
Simon Xu6f224942013-12-06 11:51:16 +080085 sk = test_socket(pf_class, SOCK_STREAM, IPPROTO_SCTP);
mridge5ba96af2004-02-23 16:17:34 +000086
Simon Xu6f224942013-12-06 11:51:16 +080087 sk1 = test_socket(pf_class, SOCK_STREAM, IPPROTO_SCTP);
mridge5ba96af2004-02-23 16:17:34 +000088
Simon Xu6f224942013-12-06 11:51:16 +080089 lstn_sk = test_socket(pf_class, SOCK_STREAM, IPPROTO_SCTP);
mridge5ba96af2004-02-23 16:17:34 +000090
91 conn_addr.sin_family = AF_INET;
Simon Xu6f224942013-12-06 11:51:16 +080092 conn_addr.sin_addr.s_addr = SCTP_IP_LOOPBACK;
93 conn_addr.sin_port = htons(SCTP_TESTPORT_1);
mridge5ba96af2004-02-23 16:17:34 +000094
95 lstn_addr.sin_family = AF_INET;
Simon Xu6f224942013-12-06 11:51:16 +080096 lstn_addr.sin_addr.s_addr = SCTP_IP_LOOPBACK;
97 lstn_addr.sin_port = htons(SCTP_TESTPORT_1);
mridge5ba96af2004-02-23 16:17:34 +000098
Simon Xu6f224942013-12-06 11:51:16 +080099 /*Binding the listen socket*/
100 test_bind(lstn_sk, (struct sockaddr *) &lstn_addr, sizeof(lstn_addr));
mridge5ba96af2004-02-23 16:17:34 +0000101
Simon Xu6f224942013-12-06 11:51:16 +0800102 /*Listening the socket*/
103 test_listen(lstn_sk, 10);
mridge5ba96af2004-02-23 16:17:34 +0000104
105 len = sizeof(struct sockaddr_in);
Simon Xu6f224942013-12-06 11:51:16 +0800106
107 test_connect(sk, (struct sockaddr *) &conn_addr, len);
mridge5ba96af2004-02-23 16:17:34 +0000108
109 acpt_sk = test_accept(lstn_sk, (struct sockaddr *)&svr_addr, &len);
110
111 len_snd = (strlen(message) + 1);
112
113 flag = MSG_NOSIGNAL;
Simon Xu6f224942013-12-06 11:51:16 +0800114 /*send () TEST1: Bad socket descriptor, EBADF Expected error*/
mridge5ba96af2004-02-23 16:17:34 +0000115 count = send(-1, message, len_snd, flag);
116 if (count != -1 || errno != EBADF)
Simon Xu6f224942013-12-06 11:51:16 +0800117 tst_brkm(TBROK, tst_exit, "send with a bad socket "
mridge5ba96af2004-02-23 16:17:34 +0000118 "descriptor count:%d, errno:%d", count, errno);
119
120 tst_resm(TPASS, "send() with a bad socket descriptor - EBADF");
Simon Xu6f224942013-12-06 11:51:16 +0800121
122 /*send () TEST2: Invalid socket, ENOTSOCK Expected error*/
Simon Xu8c1e85d2013-12-16 13:20:28 +0800123 strcpy(filename, "/tmp/sctptest.XXXXXX");
124 fd = mkstemp(filename);
125 if (fd == -1)
126 tst_brkm(TBROK, tst_exit, "Failed to mkstemp %s: %s",
127 filename, strerror(errno));
128 count = send(fd, message, len_snd, flag);
129 if (count == -1)
130 err_no = errno;
131 close(fd);
132 unlink(filename);
133 if (count != -1 || err_no != ENOTSOCK)
Simon Xu6f224942013-12-06 11:51:16 +0800134 tst_brkm(TBROK, tst_exit, "send with invalid socket "
Simon Xu8c1e85d2013-12-16 13:20:28 +0800135 "count:%d, errno:%d", count, err_no);
mridge5ba96af2004-02-23 16:17:34 +0000136
137 tst_resm(TPASS, "send() with invalid socket - ENOTSOCK");
138
Simon Xu6f224942013-12-06 11:51:16 +0800139 /*send () TEST3: send on listening socket, EPIPE Expected error*/
mridge5ba96af2004-02-23 16:17:34 +0000140 count = send(lstn_sk, message, len_snd, flag);
141 if (count != -1 || errno != EPIPE)
Simon Xu6f224942013-12-06 11:51:16 +0800142 tst_brkm(TBROK, tst_exit, "send on a listening socket "
mridge5ba96af2004-02-23 16:17:34 +0000143 "count:%d, errno:%d", count, errno);
144
145 tst_resm(TPASS, "send() on a listening socket - EPIPE");
146#if 0
Simon Xu6f224942013-12-06 11:51:16 +0800147 /*send () TEST4: Invalid message address, EFAULT Expected error*/
148 /* FIXME this test should pass. Don't catch why... */
mridge5ba96af2004-02-23 16:17:34 +0000149 count = send(sk, (char *)0x1, len_snd, flag);
150 if (count != -1 || errno != EFAULT)
Simon Xu6f224942013-12-06 11:51:16 +0800151 tst_brkm(TBROK, tst_exit, "send with invalid message "
mridge5ba96af2004-02-23 16:17:34 +0000152 "pointer count:%d, errno:%d", count, errno);
153
154 tst_resm(TPASS, "send() with invalid message ptr - EFAULT");
155#endif
156
Simon Xu6f224942013-12-06 11:51:16 +0800157 test_connect(sk1, (struct sockaddr *) &lstn_addr, len);
158
mridge5ba96af2004-02-23 16:17:34 +0000159 count = test_send(sk1, message, len_snd, flag);
160
161 close(sk1);
162
163 acpt1_sk = test_accept(lstn_sk, (struct sockaddr *)&conn_addr, &len);
164
Simon Xu6f224942013-12-06 11:51:16 +0800165 /*send () TEST5: send on closed association, EPIPE Expected error*/
mridge5ba96af2004-02-23 16:17:34 +0000166 count = send(acpt1_sk, message, len_snd, flag);
167 if (count != -1 || errno != EPIPE)
Simon Xu6f224942013-12-06 11:51:16 +0800168 tst_brkm(TBROK, tst_exit, "send on a closed association "
mridge5ba96af2004-02-23 16:17:34 +0000169 "count:%d, errno:%d", count, errno);
170
171 tst_resm(TPASS, "send() on a closed association - EPIPE");
172
Simon Xu6f224942013-12-06 11:51:16 +0800173 close(acpt1_sk);
mridge5ba96af2004-02-23 16:17:34 +0000174 close(sk);
175 close(lstn_sk);
176 close(acpt_sk);
177
Simon Xu6f224942013-12-06 11:51:16 +0800178 sk = test_socket(pf_class, SOCK_STREAM, IPPROTO_SCTP);
mridge5ba96af2004-02-23 16:17:34 +0000179
Simon Xu6f224942013-12-06 11:51:16 +0800180 lstn_sk = test_socket(pf_class, SOCK_STREAM, IPPROTO_SCTP);
mridge5ba96af2004-02-23 16:17:34 +0000181
182 message_rcv = malloc(512);
183
Simon Xu6f224942013-12-06 11:51:16 +0800184 /*Binding the listen socket*/
185 test_bind(lstn_sk, (struct sockaddr *) &lstn_addr, sizeof(lstn_addr));
mridge5ba96af2004-02-23 16:17:34 +0000186
Simon Xu6f224942013-12-06 11:51:16 +0800187 /*Listening the socket*/
188 test_listen(lstn_sk, 10);
mridge5ba96af2004-02-23 16:17:34 +0000189
190 conn_addr.sin_family = AF_INET;
Simon Xu6f224942013-12-06 11:51:16 +0800191 conn_addr.sin_addr.s_addr = SCTP_IP_LOOPBACK;
192 conn_addr.sin_port = htons(SCTP_TESTPORT_1);
mridge5ba96af2004-02-23 16:17:34 +0000193
194 len = sizeof(struct sockaddr_in);
195
Simon Xu6f224942013-12-06 11:51:16 +0800196 test_connect(sk, (struct sockaddr *) &conn_addr, len);
mridge5ba96af2004-02-23 16:17:34 +0000197
198 acpt_sk = test_accept(lstn_sk, (struct sockaddr *)&svr_addr, &len);
Simon Xu6f224942013-12-06 11:51:16 +0800199
mridge5ba96af2004-02-23 16:17:34 +0000200 msg_count = strlen(message) + 1;
201
Simon Xu6f224942013-12-06 11:51:16 +0800202 /*send() TEST6: Sending data from client socket to server socket*/
mridge5ba96af2004-02-23 16:17:34 +0000203 count = send(sk, message, msg_count, flag);
204 if (count != msg_count)
Simon Xu6f224942013-12-06 11:51:16 +0800205 tst_brkm(TBROK, tst_exit, "send from client to server "
206 "count:%d, errno:%d", count, errno);
mridge5ba96af2004-02-23 16:17:34 +0000207
208 tst_resm(TPASS, "send() from client to server - SUCCESS");
209
210 test_recv(acpt_sk, message_rcv, msg_count, flag);
211
Simon Xu6f224942013-12-06 11:51:16 +0800212 strncpy(message_rcv,"\0",512);
mridge5ba96af2004-02-23 16:17:34 +0000213
Simon Xu6f224942013-12-06 11:51:16 +0800214 /*send() TEST7: Sending data from accept socket to client socket*/
mridge5ba96af2004-02-23 16:17:34 +0000215 count = send(acpt_sk, message, msg_count, flag);
216 if (count != msg_count)
Simon Xu6f224942013-12-06 11:51:16 +0800217 tst_brkm(TBROK, tst_exit, "send from accept socket to client "
218 "count:%d, errno:%d", count, errno);
mridge5ba96af2004-02-23 16:17:34 +0000219
220 tst_resm(TPASS, "send() from accept socket to client - SUCCESS");
221
222 test_recv(sk, message_rcv, msg_count, flag);
223
Simon Xu6f224942013-12-06 11:51:16 +0800224 /*send() TEST8: Sending less number of data from the buffer*/
225 /*Sending only 5 bytes so that only hello is received*/
226 test_send(sk, message, 5 , flag);
mridge5ba96af2004-02-23 16:17:34 +0000227 test_recv(acpt_sk, message_rcv, 5, flag);
Simon Xu6f224942013-12-06 11:51:16 +0800228
mridge5ba96af2004-02-23 16:17:34 +0000229 tst_resm(TPASS, "send() partial data from a buffer - SUCCESS");
230
mridge64a341f2006-01-03 19:16:46 +0000231 /* TEST9: sctp_send with no sinfo */
Simon Xu6f224942013-12-06 11:51:16 +0800232 test_sctp_send(sk, message, strlen(message) + 1 , NULL, flag);
mridge64a341f2006-01-03 19:16:46 +0000233 test_recv(acpt_sk, message_rcv, strlen(message) + 1, flag);
234 tst_resm(TPASS, "sctp_send() with no sinfo - SUCCESS");
235
mridge5ba96af2004-02-23 16:17:34 +0000236 close(sk1);
237 close(lstn_sk);
238 close(acpt_sk);
239
Simon Xu6f224942013-12-06 11:51:16 +0800240 return 0;
Chris Dearmanec6edca2012-10-17 19:54:01 -0700241}