Home | History | Annotate | Download | only in func_tests
      1 /* SCTP kernel Implementation
      2  * Copyright (c) 2003 Hewlett-Packard Development Company, L.P
      3  * (C) Copyright IBM Corp. 2004
      4  *
      5  * This file has test cases to test the sctp_connectx () call for 1-1 style sockets
      6  *
      7  * TEST1: Bad socket descriptor
      8  * TEST2: Invalid socket
      9  * TEST3: Invalid address
     10  * TEST4: Invalid address length
     11  * TEST5: Invalid address family
     12  * TEST6: Valid blocking sctp_connectx
     13  * TEST7: Connect when accept queue is full
     14  * TEST8: On a listening socket
     15  * TEST9: On established socket
     16  * TEST10: Connect to re-establish a closed association.
     17  *
     18  * The SCTP implementation is free software;
     19  * you can redistribute it and/or modify it under the terms of
     20  * the GNU General Public License as published by
     21  * the Free Software Foundation; either version 2, or (at your option)
     22  * any later version.
     23  *
     24  * The SCTP implementation is distributed in the hope that it
     25  * will be useful, but WITHOUT ANY WARRANTY; without even the implied
     26  *                 ************************
     27  * warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
     28  * See the GNU General Public License for more details.
     29  *
     30  * You should have received a copy of the GNU General Public License
     31  * along with GNU CC; see the file COPYING.  If not, write to
     32  * the Free Software Foundation, 59 Temple Place - Suite 330,
     33  * Boston, MA 02111-1307, USA.
     34  *
     35  * Please send any bug reports or fixes you make to the
     36  * email address(es):
     37  *    lksctp developers <lksctp-developers (at) lists.sourceforge.net>
     38  *
     39  * Or submit a bug report through the following website:
     40  *    http://www.sf.net/projects/lksctp
     41  *
     42  * Any bugs reported given to us we will try to fix... any fixes shared will
     43  * be incorporated into the next SCTP release
     44  *
     45  */
     46 
     47 #include <stdio.h>
     48 #include <unistd.h>
     49 #include <fcntl.h>
     50 #include <stdlib.h>
     51 #include <string.h>
     52 #include <sys/types.h>
     53 #include <sys/socket.h>
     54 #include <linux/socket.h>
     55 #include <netinet/in.h>         /* for sockaddr_in */
     56 #include <arpa/inet.h>
     57 #include <sys/errno.h>
     58 #include <sys/uio.h>
     59 #include <netinet/sctp.h>
     60 #include "sctputil.h"
     61 
     62 char *TCID = __FILE__;
     63 int TST_TOTAL = 10;
     64 int TST_CNT = 0;
     65 
     66 #define SK_MAX 10
     67 
     68 int
     69 main(int argc, char *argv[])
     70 {
     71 	int error,i;
     72 	socklen_t len;
     73 	int sk,lstn_sk,clnt_sk[SK_MAX],acpt_sk[SK_MAX],pf_class;
     74 	int sk1,clnt2_sk;
     75 
     76 	struct sockaddr_in conn_addr,lstn_addr,acpt_addr;
     77 	struct sockaddr *tmp_addr;
     78 
     79 	/* Rather than fflush() throughout the code, set stdout to
     80 	 * be unbuffered.
     81 	 */
     82 	setvbuf(stdout, NULL, _IONBF, 0);
     83 	setvbuf(stderr, NULL, _IONBF, 0);
     84 
     85 	pf_class = PF_INET;
     86 
     87 	sk = test_socket(pf_class, SOCK_STREAM, IPPROTO_SCTP);
     88 	sk1 = test_socket(pf_class, SOCK_STREAM, IPPROTO_SCTP);
     89 
     90 	/*Creating a listen socket*/
     91 	lstn_sk = test_socket(pf_class, SOCK_STREAM, IPPROTO_SCTP);
     92 
     93 	/*Creating a regular socket*/
     94 	for (i = 0 ; i < SK_MAX ; i++)
     95 		clnt_sk[i] = test_socket(pf_class, SOCK_STREAM, IPPROTO_SCTP);
     96 
     97 	clnt2_sk = test_socket(pf_class, SOCK_STREAM, IPPROTO_SCTP);
     98 
     99 	conn_addr.sin_family = AF_INET;
    100 	conn_addr.sin_addr.s_addr = SCTP_IP_LOOPBACK;
    101 	conn_addr.sin_port = htons(SCTP_TESTPORT_1);
    102 
    103 	lstn_addr.sin_family = AF_INET;
    104 	lstn_addr.sin_addr.s_addr = SCTP_IP_LOOPBACK;
    105 	lstn_addr.sin_port = htons(SCTP_TESTPORT_1);
    106 
    107 	/*Binding the listen socket*/
    108 	test_bind(lstn_sk, (struct sockaddr *) &lstn_addr, sizeof(lstn_addr));
    109 
    110 	/*Listening the socket*/
    111 	test_listen(lstn_sk, SK_MAX-1);
    112 
    113 
    114 	/*sctp_connectx () TEST1: Bad socket descriptor, EBADF Expected error*/
    115 	len = sizeof(struct sockaddr_in);
    116 	error = sctp_connectx(-1, (struct sockaddr *) &conn_addr, 1, NULL);
    117 	if (error != -1 || errno != EBADF)
    118 		tst_brkm(TBROK, tst_exit, "sctp_connectx with bad socket "
    119 			 "descriptor error:%d, errno:%d", error, errno);
    120 
    121 	tst_resm(TPASS, "sctp_connectx() with bad socket descriptor - EBADF");
    122 
    123 	/*sctp_connectx () TEST2: Invalid socket, ENOTSOCK Expected error*/
    124 	error = sctp_connectx(0, (struct sockaddr *) &conn_addr, 1, NULL);
    125 	if (error != -1 || errno != ENOTSOCK)
    126 		tst_brkm(TBROK, tst_exit, "sctp_connectx with invalid socket "
    127 	                 "error:%d, errno:%d", error, errno);
    128 
    129 	tst_resm(TPASS, "sctp_connectx() with invalid socket - ENOTSOCK");
    130 
    131 	/*sctp_connectx () TEST3: Invalid address, EINVAL Expected error*/
    132 	tmp_addr = (struct sockaddr *) malloc(sizeof(struct sockaddr) - 1);
    133 	tmp_addr->sa_family = AF_INET;
    134 	error = sctp_connectx(sk, tmp_addr, 1, NULL);
    135 	if (error != -1 || errno != EINVAL)
    136 		tst_brkm(TBROK, tst_exit, "sctp_connectx with invalid address "
    137 	                 "error:%d, errno:%d", error, errno);
    138 
    139 	tst_resm(TPASS, "sctp_connectx() with invalid address - EINVAL");
    140 
    141 	/*sctp_connectx () TEST4: Invalid address length, EINVAL Expected error*/
    142 	error = sctp_connectx(sk, (struct sockaddr *) &conn_addr, 0, NULL);
    143 	if (error != -1 || errno != EINVAL)
    144 		tst_brkm(TBROK, tst_exit, "sctp_connectx with invalid address length "
    145 	                 "error:%d, errno:%d", error, errno);
    146 
    147 	tst_resm(TPASS, "sctp_connectx() with invalid address length - EINVAL");
    148 
    149 	/*sctp_connectx () TEST5: Invalid address family, EINVAL Expect error*/
    150 	conn_addr.sin_family = 9090; /*Assigning invalid address family*/
    151 	error = sctp_connectx(sk, (struct sockaddr *) &conn_addr, 1, NULL);
    152 	if (error != -1 || errno != EINVAL)
    153 		tst_brkm(TBROK, tst_exit, "sctp_connectx with invalid address family "
    154 	                 "error:%d, errno:%d", error, errno);
    155 
    156 	tst_resm(TPASS, "sctp_connectx() with invalid address family - EINVAL");
    157 
    158 	conn_addr.sin_family = AF_INET;
    159 
    160 	/*sctp_connectx () TEST6: Blocking sctp_connectx, should pass*/
    161 	/*All the be below blocking sctp_connectx should pass as socket will be
    162 	listening SK_MAX clients*/
    163 	for (i = 0 ; i < SK_MAX ; i++) {
    164 		error = sctp_connectx(clnt_sk[i], (struct sockaddr *)&conn_addr,
    165 			      1, NULL);
    166 		if (error < 0)
    167 			tst_brkm(TBROK, tst_exit, "valid blocking sctp_connectx "
    168 				 "error:%d, errno:%d", error, errno);
    169 	}
    170 
    171 	tst_resm(TPASS, "valid blocking sctp_connectx() - SUCCESS");
    172 
    173 	/*sctp_connectx () TEST7: sctp_connectx when accept queue is full, ECONNREFUSED
    174 	Expect error*/
    175 	/*Now that accept queue is full, the below sctp_connectx should fail*/
    176 	error = sctp_connectx(clnt2_sk, (struct sockaddr *) &conn_addr, 1, NULL);
    177 	if (error != -1 || errno != ECONNREFUSED)
    178 		tst_brkm(TBROK, tst_exit, "sctp_connectx when accept queue is full "
    179 	                 "error:%d, errno:%d", error, errno);
    180 
    181 	tst_resm(TPASS, "sctp_connectx() when accept queue is full - ECONNREFUSED");
    182 
    183 	/*Calling a accept first to estblish the pending sctp_connectxions*/
    184 	for (i=0 ; i < SK_MAX ; i++)
    185 		acpt_sk[i] = test_accept(lstn_sk,
    186 					 (struct sockaddr *) &acpt_addr, &len);
    187 
    188 	/*sctp_connectx () TEST8: from a listening socket, EISCONN Expect error*/
    189 	error = sctp_connectx(lstn_sk, (struct sockaddr *) &lstn_addr, 1, NULL);
    190 	if (error != -1 || errno != EISCONN)
    191 		tst_brkm(TBROK, tst_exit, "sctp_connectx on a listening socket "
    192 	                 "error:%d, errno:%d", error, errno);
    193 
    194 	tst_resm(TPASS, "sctp_connectx() on a listening socket - EISCONN");
    195 
    196 	/*sctp_connectx() TEST9: On established socket, EISCONN Expect error*/
    197 	i=0;
    198 	error = sctp_connectx(acpt_sk[i], (struct sockaddr *) &lstn_addr, 1, NULL);
    199 	if (error != -1 || errno != EISCONN)
    200 		tst_brkm(TBROK, tst_exit, "sctp_connectx on an established socket "
    201 	                 "error:%d, errno:%d", error, errno);
    202 
    203 	tst_resm(TPASS, "sctp_connectx() on an established socket - EISCONN");
    204 
    205 	for (i = 0 ; i < 4 ; i++) {
    206 		close(clnt_sk[i]);
    207 		close(acpt_sk[i]);
    208 	}
    209 
    210 	/* sctp_connectx() TEST10: Re-establish an association that is closed.
    211 	 * should succeed.
    212 	 */
    213 	error = sctp_connectx(sk1, (struct sockaddr *)&conn_addr, 1, NULL);
    214 	if (error < 0)
    215 		tst_brkm(TBROK, tst_exit, "Re-establish an association that "
    216 				 "is closed error:%d, errno:%d", error, errno);
    217 
    218 	tst_resm(TPASS, "sctp_connectx() to re-establish a closed association - "
    219 		 "SUCCESS");
    220 
    221 	close(sk);
    222 	close(sk1);
    223 	close(lstn_sk);
    224 
    225 	return 0;
    226 }
    227