Home | History | Annotate | Download | only in func_tests
      1 /* SCTP kernel Implementation
      2  * Copyright (c) 2003 Hewlett-Packard Development Company, L.P
      3  * (C) Copyright IBM Corp. 2004
      4  *
      5  * This file has test cases to test the accept () and close () call for
      6  * 1-1 style sockets
      7  *
      8  * accept () Tests:
      9  * ---------------
     10  * TEST1: Bad socket descriptor
     11  * TEST2: Invalid socket
     12  * TEST3: Invalid address
     13  * TEST4: On a non-listening socket
     14  * TEST5: On a established socket
     15  * TEST6: On a CLOSED association
     16  * TEST7: Extracting the association on the listening socket
     17  *
     18  * close () Tests:
     19  * --------------
     20  * TEST8: Bad socket descriptor
     21  * TEST9: valid socket descriptor
     22  * TEST10: Closed socket descriptor
     23  *
     24  * The SCTP implementation is free software;
     25  * you can redistribute it and/or modify it under the terms of
     26  * the GNU General Public License as published by
     27  * the Free Software Foundation; either version 2, or (at your option)
     28  * any later version.
     29  *
     30  * The SCTP implementation is distributed in the hope that it
     31  * will be useful, but WITHOUT ANY WARRANTY; without even the implied
     32  *                 ************************
     33  * warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
     34  * See the GNU General Public License for more details.
     35  *
     36  * You should have received a copy of the GNU General Public License
     37  * along with GNU CC; see the file COPYING.  If not, write to
     38  * the Free Software Foundation, 59 Temple Place - Suite 330,
     39  * Boston, MA 02111-1307, USA.
     40  *
     41  * Please send any bug reports or fixes you make to the
     42  * email address(es):
     43  *    lksctp developers <lksctp-developers (at) lists.sourceforge.net>
     44  *
     45  * Or submit a bug report through the following website:
     46  *    http://www.sf.net/projects/lksctp
     47  *
     48  * Any bugs reported given to us we will try to fix... any fixes shared will
     49  * be incorporated into the next SCTP release.
     50  *
     51  */
     52 
     53 #include <stdio.h>
     54 #include <unistd.h>
     55 #include <fcntl.h>
     56 #include <stdlib.h>
     57 #include <string.h>
     58 #include <sys/types.h>
     59 #include <sys/socket.h>
     60 #include <netinet/in.h>         /* for sockaddr_in */
     61 #include <arpa/inet.h>
     62 #include <errno.h>
     63 #include <netinet/sctp.h>
     64 #include <sys/uio.h>
     65 #include <sctputil.h>
     66 
     67 char *TCID = __FILE__;
     68 int TST_TOTAL = 10;
     69 int TST_CNT = 0;
     70 
     71 #define SK_MAX  10
     72 
     73 int
     74 main(int argc, char *argv[])
     75 {
     76         socklen_t len;
     77 	int i;
     78 	int sk,lstn_sk,clnt_sk[SK_MAX],acpt_sk,pf_class;
     79 	int new_sk[SK_MAX],clnt2_sk[SK_MAX];
     80 	int error;
     81 	int fd, err_no = 0;
     82 	char filename[21];
     83 
     84         struct sockaddr_in conn_addr,lstn_addr,acpt_addr;
     85 
     86 	/* Rather than fflush() throughout the code, set stdout to
     87          * be unbuffered.
     88          */
     89         setvbuf(stdout, NULL, _IONBF, 0);
     90         setvbuf(stderr, NULL, _IONBF, 0);
     91 
     92         pf_class = PF_INET;
     93 
     94         sk = test_socket(pf_class, SOCK_STREAM, IPPROTO_SCTP);
     95 
     96 	for (i=0 ; i < SK_MAX ; i++)
     97 		new_sk[i] = test_socket(pf_class, SOCK_STREAM, IPPROTO_SCTP);
     98 
     99 	/* Creating a regular socket */
    100 	for (i = 0 ; i < SK_MAX ; i++)
    101 		clnt_sk[i] = test_socket(pf_class, SOCK_STREAM, IPPROTO_SCTP);
    102 
    103 	for (i = 0 ; i < SK_MAX ; i++)
    104 		clnt2_sk[i] = test_socket(pf_class, SOCK_STREAM, IPPROTO_SCTP);
    105 
    106 	/* Creating a listen socket */
    107         lstn_sk = test_socket(pf_class, SOCK_STREAM, IPPROTO_SCTP);
    108 
    109 	conn_addr.sin_family = AF_INET;
    110         conn_addr.sin_addr.s_addr = SCTP_IP_LOOPBACK;
    111         conn_addr.sin_port = htons(SCTP_TESTPORT_1);
    112 
    113 	lstn_addr.sin_family = AF_INET;
    114         lstn_addr.sin_addr.s_addr = SCTP_IP_LOOPBACK;
    115         lstn_addr.sin_port = htons(SCTP_TESTPORT_1);
    116 
    117 	/* Binding the listen socket */
    118 	test_bind(lstn_sk, (struct sockaddr *) &lstn_addr, sizeof(lstn_addr));
    119 
    120 	/* Listening many sockets as we are calling too many connect here */
    121 	test_listen(lstn_sk, SK_MAX );
    122 
    123 	/* connect() is called just to make sure accept() doesn't block the
    124 	 * program
    125 	 */
    126 	i = 0;
    127 	len = sizeof(struct sockaddr_in);
    128 	test_connect(clnt_sk[i++], (struct sockaddr *) &conn_addr, len);
    129 
    130 	/* accept() TEST1: Bad socket descriptor EBADF, Expected error */
    131         error = accept(-1, (struct sockaddr *) &acpt_addr, &len);
    132         if (error != -1 || errno != EBADF)
    133 		tst_brkm(TBROK, tst_exit, "accept with a bad socket descriptor"
    134                          "error:%d, errno:%d", error, errno);
    135 
    136 	tst_resm(TPASS, "accept() with a bad socket descriptor - EBADF");
    137 
    138         /*accept() TEST2: Invalid socket ENOTSOCK, Expected error*/
    139 	strcpy(filename, "/tmp/sctptest.XXXXXX");
    140 	fd = mkstemp(filename);
    141 	if (fd == -1)
    142 		tst_brkm(TBROK, tst_exit, "Failed to mkstemp %s: %s",
    143 				filename, strerror(errno));
    144 	error = accept(fd, (struct sockaddr *) &acpt_addr, &len);
    145 	if (error == -1)
    146 		err_no = errno;
    147 	close(fd);
    148 	unlink(filename);
    149 	if (error != -1 || err_no != ENOTSOCK)
    150 		tst_brkm(TBROK, tst_exit, "accept with invalid socket"
    151                          "error:%d, errno:%d", error, err_no);
    152 
    153 	tst_resm(TPASS, "accept() with invalid socket - ENOTSOCK");
    154 
    155         /*accept() TEST3: Invalid address EFAULT, Expected error*/
    156         error = accept(lstn_sk, (struct sockaddr *) -1, &len);
    157         if (error != -1 || errno != EFAULT)
    158 		tst_brkm(TBROK, tst_exit, "accept with invalid address"
    159                          "error:%d, errno:%d", error, errno);
    160 
    161 	tst_resm(TPASS, "accept() with invalid address - EFAULT");
    162 
    163 	test_connect(clnt_sk[i++], (struct sockaddr *) &conn_addr, len);
    164 
    165         /*accept() TEST4: on a non-listening socket EINVAL, Expected error*/
    166         error = accept(sk, (struct sockaddr *) &acpt_addr, &len);
    167         if (error != -1 || errno != EINVAL)
    168 		tst_brkm(TBROK, tst_exit, "accept on a non-listening socket"
    169                          "error:%d, errno:%d", error, errno);
    170 
    171 	tst_resm(TPASS, "accept() on a non-listening socket - EINVAL");
    172 
    173 	test_connect(clnt_sk[i++], (struct sockaddr *) &conn_addr, len);
    174 
    175 	/*Calling accept to establish the connection*/
    176 	acpt_sk = test_accept(lstn_sk, (struct sockaddr *) &acpt_addr, &len);
    177 
    178 	/*accept() TEST5: On a established socket EINVAL, Expected error*/
    179 	error = accept(acpt_sk, (struct sockaddr *) &acpt_addr, &len);
    180 	if (error != -1 || (errno != EINVAL && errno != EACCES)) {
    181 		tst_brkm(TBROK, tst_exit, "accept on an established socket"
    182 		         "error:%d, errno:%d", error, errno);
    183 	}
    184 
    185 	tst_resm(TPASS, "accept() on an established socket - %s",
    186 		tst_strerrno(errno));
    187 
    188 	/*Closing the previously established association*/
    189 	close(acpt_sk);
    190 
    191 	test_connect(clnt_sk[i], (struct sockaddr *) &conn_addr, len);
    192 
    193 	/*accept() TEST6: On the CLOSED association should succeed*/
    194 	acpt_sk = accept(lstn_sk, (struct sockaddr *) &acpt_addr, &len);
    195         if (acpt_sk < 0)
    196 		tst_brkm(TBROK, tst_exit, "accept a closed association"
    197                          "error:%d, errno:%d", error, errno);
    198 
    199 	tst_resm(TPASS, "accept() a closed association - SUCCESS");
    200 
    201 	close(acpt_sk);
    202 
    203 	/*accept() TEST7: Extracting the association on the listening socket
    204 	as new socket, new socket socket descriptor should return*/
    205 	for (i = 0 ; i < (SK_MAX - 1); i++)
    206 		test_connect(clnt2_sk[i], (struct sockaddr *) &conn_addr, len);
    207 
    208 	for (i = 0 ; i < (SK_MAX - 1); i++)
    209 		new_sk[i] = test_accept(lstn_sk, (struct sockaddr *)&acpt_addr,
    210 					&len);
    211 
    212 	tst_resm(TPASS, "accept() on a listening socket - SUCCESS");
    213 
    214 
    215         /*close() TEST8: Bad socket descriptor, EBADF Expected error*/
    216 	error = close(-1);
    217 	if (error != -1 || errno != EBADF)
    218 		tst_brkm(TBROK, tst_exit, "close with a bad socket descriptor "
    219                          "error:%d, errno:%d", error, errno);
    220 
    221 	tst_resm(TPASS, "close() with a bad socket descriptor - EBADF");
    222 
    223 	/*close() TEST9: valid socket descriptor should succeed*/
    224 	error = close(sk);
    225 	if (error < 0)
    226 		tst_brkm(TBROK, tst_exit, "close with a valid socket descriptor"
    227                          " error:%d, errno:%d", error, errno);
    228 
    229 	tst_resm(TPASS, "close() with a valid socket descriptor - SUCCESS");
    230 
    231 	/*close() TEST10: closed socket descriptor, EBADF Expected error*/
    232         error = close(sk);
    233         if (error != -1 || errno != EBADF)
    234 		tst_brkm(TBROK, tst_exit, "close with a closed socket "
    235 			 "descriptor error:%d, errno:%d", error, errno);
    236 
    237 	tst_resm(TPASS, "close() with a closed socket descriptor - EBADF");
    238 
    239 	for (i = 0 ; i < SK_MAX ; i++) {
    240 		close(clnt_sk[i]);
    241 		close(new_sk[i]);
    242 		close(clnt2_sk[i]);
    243 	}
    244 
    245 	return 0;
    246 }
    247