summaryrefslogtreecommitdiff
path: root/source4
diff options
context:
space:
mode:
Diffstat (limited to 'source4')
-rw-r--r--source4/torture/local/socket.c108
1 files changed, 108 insertions, 0 deletions
diff --git a/source4/torture/local/socket.c b/source4/torture/local/socket.c
index cdd379e934..6a6f867fa0 100644
--- a/source4/torture/local/socket.c
+++ b/source4/torture/local/socket.c
@@ -45,6 +45,8 @@ static BOOL test_udp(TALLOC_CTX *mem_ctx)
size_t sent, nread;
BOOL ret = True;
+ printf("TESTING UDP SOCKETS\n");
+
status = socket_create("ip", SOCKET_TYPE_DGRAM, &sock1, 0);
CHECK_STATUS(status, NT_STATUS_OK);
talloc_steal(mem_ctx, sock1);
@@ -123,12 +125,118 @@ done:
return ret;
}
+/*
+ basic testing of tcp routines
+*/
+static BOOL test_tcp(TALLOC_CTX *mem_ctx)
+{
+ struct socket_context *sock1, *sock2, *sock3;
+ NTSTATUS status;
+ int srv_port, from_port;
+ const char *srv_addr, *from_addr;
+ size_t size = 100 + (random() % 100);
+ DATA_BLOB blob, blob2;
+ size_t sent, nread;
+ BOOL ret = True;
+
+ printf("TESTING TCP SOCKETS\n");
+
+ status = socket_create("ip", SOCKET_TYPE_STREAM, &sock1, 0);
+ CHECK_STATUS(status, NT_STATUS_OK);
+ talloc_steal(mem_ctx, sock1);
+
+ status = socket_create("ip", SOCKET_TYPE_STREAM, &sock2, 0);
+ CHECK_STATUS(status, NT_STATUS_OK);
+ talloc_steal(mem_ctx, sock2);
+
+ status = socket_listen(sock1, "127.0.0.1", 0, 0, 0);
+ CHECK_STATUS(status, NT_STATUS_OK);
+
+ srv_addr = socket_get_my_addr(sock1, mem_ctx);
+ if (srv_addr == NULL || strcmp(srv_addr, "127.0.0.1") != 0) {
+ printf("Expected server address of 127.0.0.1 but got %s\n", srv_addr);
+ return False;
+ }
+
+ srv_port = socket_get_my_port(sock1);
+ printf("server port is %d\n", srv_port);
+
+ status = socket_connect(sock2, NULL, 0, srv_addr, srv_port, 0);
+ CHECK_STATUS(status, NT_STATUS_OK);
+
+ status = socket_accept(sock1, &sock3);
+ CHECK_STATUS(status, NT_STATUS_OK);
+ talloc_steal(mem_ctx, sock3);
+ talloc_free(sock1);
+
+ blob = data_blob_talloc(mem_ctx, NULL, size);
+ blob2 = data_blob_talloc(mem_ctx, NULL, size);
+ generate_random_buffer(blob.data, blob.length);
+
+ sent = size;
+ status = socket_send(sock2, &blob, &sent, 0);
+ CHECK_STATUS(status, NT_STATUS_OK);
+
+ status = socket_recv(sock3, blob2.data, size, &nread, 0);
+ CHECK_STATUS(status, NT_STATUS_OK);
+
+ from_addr = socket_get_peer_addr(sock3, mem_ctx);
+ from_port = socket_get_peer_port(sock3);
+
+ if (strcmp(from_addr, srv_addr) != 0) {
+ printf("Unexpected recvfrom addr %s\n", from_addr);
+ ret = False;
+ }
+ if (nread != size) {
+ printf("Unexpected recvfrom size %d should be %d\n", nread, size);
+ ret = False;
+ }
+
+ if (memcmp(blob2.data, blob.data, size) != 0) {
+ printf("Bad data in recvfrom\n");
+ ret = False;
+ }
+
+ generate_random_buffer(blob.data, blob.length);
+ status = socket_send(sock3, &blob, &sent, 0);
+ CHECK_STATUS(status, NT_STATUS_OK);
+
+ status = socket_recv(sock2, blob2.data, size, &nread, 0);
+ CHECK_STATUS(status, NT_STATUS_OK);
+
+ from_addr = socket_get_peer_addr(sock2, mem_ctx);
+ from_port = socket_get_peer_port(sock2);
+
+ if (strcmp(from_addr, srv_addr) != 0) {
+ printf("Unexpected recvfrom addr %s\n", from_addr);
+ ret = False;
+ }
+ if (nread != size) {
+ printf("Unexpected recvfrom size %d should be %d\n", nread, size);
+ ret = False;
+ }
+ if (from_port != srv_port) {
+ printf("Unexpected recvfrom port %d should be %d\n",
+ from_port, srv_port);
+ ret = False;
+ }
+ if (memcmp(blob2.data, blob.data, size) != 0) {
+ printf("Bad data in recvfrom\n");
+ ret = False;
+ }
+
+done:
+
+ return ret;
+}
+
BOOL torture_local_socket(void)
{
BOOL ret = True;
TALLOC_CTX *mem_ctx = talloc_new(NULL);
ret &= test_udp(mem_ctx);
+ ret &= test_tcp(mem_ctx);
return ret;
}