2 * SPDX-License-Identifier: BSD-2-Clause-FreeBSD
4 * Copyright (c) 2018 Alan Somers.
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * 2. Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
15 * THIS SOFTWARE IS PROVIDED BY AUTHOR AND CONTRIBUTORS ``AS IS'' AND
16 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
17 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
18 * ARE DISCLAIMED. IN NO EVENT SHALL AUTHOR OR CONTRIBUTORS BE LIABLE
19 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
20 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
21 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
22 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
23 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
24 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
28 #include <sys/cdefs.h>
29 __FBSDID("$FreeBSD$");
31 #include <sys/param.h>
32 #include <sys/socket.h>
36 #include <netinet/in.h>
47 static const uint16_t BASEPORT = 6969;
48 static const char pidfile[] = "tftpd.pid";
49 static int protocol = PF_UNSPEC;
50 static int s = -1; /* tftp client socket */
51 static struct sockaddr_storage addr; /* Destination address for the client */
52 static bool s_flag = false; /* Pass -s to tftpd */
53 static bool w_flag = false; /* Pass -w to tftpd */
56 static void require_bufeq(const char *expected, ssize_t expected_len,
57 const char *actual, ssize_t len);
60 * Receive a response from tftpd
61 * @param hdr The reply's expected header, as a char array
62 * @param contents The reply's expected contents, as a char array
63 * @param contents_len Length of contents
65 #define RECV(hdr, contents, contents_len) do { \
67 struct sockaddr_storage from; \
68 socklen_t fromlen = sizeof(from); \
69 ssize_t r = recvfrom(s, buffer, sizeof(buffer), 0, \
70 (struct sockaddr*)&from, &fromlen); \
72 require_bufeq((hdr), sizeof(hdr), buffer, \
73 MIN(r, (ssize_t)sizeof(hdr))); \
74 require_bufeq((const char*) (contents), (contents_len), \
75 &buffer[sizeof(hdr)], r - sizeof(hdr)); \
76 if (protocol == PF_INET) { \
77 ((struct sockaddr_in*)&addr)->sin_port = \
78 ((struct sockaddr_in*)&from)->sin_port; \
80 ((struct sockaddr_in6*)&addr)->sin6_port = \
81 ((struct sockaddr_in6*)&from)->sin6_port; \
86 recv_ack(uint16_t blocknum)
88 char hdr[] = {0, 4, blocknum >> 8, blocknum & 0xFF};
93 * Receive a data packet from tftpd
94 * @param blocknum Expected block number to be received
95 * @param contents Pointer to expected contents
96 * @param contents_len Length of contents expected to receive
99 recv_data(uint16_t blocknum, const char* contents, size_t contents_len)
101 char hdr[] = {0, 3, blocknum >> 8, blocknum & 0xFF};
102 RECV(hdr, contents, contents_len);
105 #define RECV_ERROR(code, msg) do { \
106 char hdr[] = {0, 5, code >> 8, code & 0xFF}; \
107 RECV(hdr, msg, sizeof(msg)); \
111 * send a command to tftpd.
112 * @param cmd Command to send, as a char array
115 send_bytes(const void* cmd, ssize_t len)
119 r = sendto(s, cmd, len, 0, (struct sockaddr*)(&addr), addr.ss_len);
120 ATF_REQUIRE_EQ(r, len);
124 send_data(uint16_t blocknum, const char* contents, size_t contents_len)
128 buffer[0] = 0; /* DATA opcode high byte */
129 buffer[1] = 3; /* DATA opcode low byte */
130 buffer[2] = blocknum >> 8;
131 buffer[3] = blocknum & 0xFF;
132 memmove(&buffer[4], contents, contents_len);
133 send_bytes(buffer, 4 + contents_len);
137 * send a command to tftpd.
138 * @param cmd Command to send, as a const string
139 * (terminating NUL will be ignored)
141 #define SEND_STR(cmd) ATF_REQUIRE_EQ( \
142 sendto(s, (cmd), sizeof(cmd) - 1, 0, (struct sockaddr*)(&addr), \
147 * Acknowledge block blocknum
150 send_ack(uint16_t blocknum)
153 0, 4, /* ACK opcode in BE */
158 send_bytes(packet, sizeof(packet));
163 * send a read request to tftpd.
164 * @param filename filename as a string, absolute or relative
165 * @param mode either "octet" or "netascii"
167 #define SEND_RRQ(filename, mode) SEND_STR("\0\001" filename "\0" mode "\0")
170 * send a write request to tftpd.
171 * @param filename filename as a string, absolute or relative
172 * @param mode either "octet" or "netascii"
174 #define SEND_WRQ(filename, mode) SEND_STR("\0\002" filename "\0" mode "\0")
176 /* Define a test case, for both IPv4 and IPv6 */
177 #define TFTPD_TC_DEFINE(name, head, ...) \
179 name ## _body(void); \
180 ATF_TC_WITH_CLEANUP(name ## _v4); \
181 ATF_TC_HEAD(name ## _v4, tc) \
185 ATF_TC_BODY(name ## _v4, tc) \
188 protocol = AF_INET; \
189 s = setup(&addr, __COUNTER__); \
193 ATF_TC_CLEANUP(name ## _v4, tc) \
197 ATF_TC_WITH_CLEANUP(name ## _v6); \
198 ATF_TC_HEAD(name ## _v6, tc) \
202 ATF_TC_BODY(name ## _v6, tc) \
205 protocol = AF_INET6; \
206 s = setup(&addr, __COUNTER__); \
210 ATF_TC_CLEANUP(name ## _v6, tc) \
217 /* Add the IPv4 and IPv6 versions of a test case */
218 #define TFTPD_TC_ADD(tp, name ) \
220 ATF_TP_ADD_TC(tp, name ## _v4); \
221 ATF_TP_ADD_TC(tp, name ## _v6); \
224 /* Standard cleanup used by all testcases */
231 f = fopen(pidfile, "r");
234 if (fscanf(f, "%d", &pid) == 1) {
236 waitpid(pid, NULL, 0);
242 /* Assert that two binary buffers are identical */
244 require_bufeq(const char *expected, ssize_t expected_len, const char *actual,
249 ATF_REQUIRE_EQ_MSG(expected_len, len,
250 "Expected %zd bytes but got %zd", expected_len, len);
251 for (i = 0; i < len; i++) {
252 ATF_REQUIRE_EQ_MSG(actual[i], expected[i],
253 "Expected %#hhx at position %zd; got %hhx instead",
254 expected[i], i, actual[i]);
259 * Start tftpd and return its communicating socket
260 * @param to Will be filled in for use with sendto
261 * @param idx Unique identifier of the test case
262 * @return Socket ready to use
265 setup(struct sockaddr_storage *to, uint16_t idx)
267 int client_s, server_s, pid, argv_idx;
268 char execname[] = "/usr/libexec/tftpd";
269 char s_flag_str[] = "-s";
270 char w_flag_str[] = "-w";
271 char pwd[MAXPATHLEN];
273 struct sockaddr_in addr4;
274 struct sockaddr_in6 addr6;
275 struct sockaddr *server_addr;
277 uint16_t port = BASEPORT + idx;
280 if (protocol == PF_INET) {
284 addr4.sin_family = PF_INET;
285 addr4.sin_port = htons(port);
286 server_addr = (struct sockaddr*)&addr4;
290 addr6.sin6_len = len;
291 addr6.sin6_family = PF_INET6;
292 addr6.sin6_port = htons(port);
293 server_addr = (struct sockaddr*)&addr6;
296 ATF_REQUIRE_EQ(getcwd(pwd, sizeof(pwd)), pwd);
298 /* Must bind(2) pre-fork so it happens before the client's send(2) */
299 ATF_REQUIRE((server_s = socket(protocol, SOCK_DGRAM, 0)) > 0);
300 ATF_REQUIRE_EQ_MSG(bind(server_s, server_addr, len), 0,
301 "bind failed with error %s", strerror(errno));
306 atf_tc_fail("fork failed");
310 pfh = pidfile_open(pidfile, 0644, NULL);
311 ATF_REQUIRE_MSG(pfh != NULL,
312 "pidfile_open: %s", strerror(errno));
313 ATF_REQUIRE_EQ(pidfile_write(pfh), 0);
314 ATF_REQUIRE_EQ(pidfile_close(pfh), 0);
316 bzero(argv, sizeof(argv));
320 argv[argv_idx++] = w_flag_str;
322 argv[argv_idx++] = s_flag_str;
323 argv[argv_idx++] = pwd;
324 ATF_REQUIRE_EQ(dup2(server_s, STDOUT_FILENO), STDOUT_FILENO);
325 ATF_REQUIRE_EQ(dup2(server_s, STDIN_FILENO), STDIN_FILENO);
326 ATF_REQUIRE_EQ(dup2(server_s, STDERR_FILENO), STDERR_FILENO);
327 execv(execname, argv);
328 atf_tc_fail("exec failed");
332 bzero(to, sizeof(*to));
333 if (protocol == PF_INET) {
334 struct sockaddr_in *to4 = (struct sockaddr_in*)to;
335 to4->sin_len = sizeof(*to4);
336 to4->sin_family = PF_INET;
337 to4->sin_port = htons(port);
338 to4->sin_addr.s_addr = htonl(INADDR_LOOPBACK);
340 struct in6_addr loopback = IN6ADDR_LOOPBACK_INIT;
341 struct sockaddr_in6 *to6 = (struct sockaddr_in6*)to;
342 to6->sin6_len = sizeof(*to6);
343 to6->sin6_family = PF_INET6;
344 to6->sin6_port = htons(port);
345 to6->sin6_addr = loopback;
349 ATF_REQUIRE((client_s = socket(protocol, SOCK_DGRAM, 0)) > 0);
353 /* Clear the client's umask. Test cases will specify exact modes */
359 /* Like write(2), but never returns less than the requested length */
361 write_all(int fd, const void *buf, size_t nbytes)
366 r = write(fd, buf, nbytes);
369 buf = (const char*)buf + r;
379 * Read a file, specified by absolute pathname.
381 TFTPD_TC_DEFINE(abspath,)
386 char suffix[] = {'\0', 'o', 'c', 't', 'e', 't', '\0'};
388 command[0] = 0; /* RRQ high byte */
389 command[1] = 1; /* RRQ low byte */
390 ATF_REQUIRE(getcwd(&command[2], sizeof(command) - 2) != NULL);
391 pathlen = strlcat(&command[2], "/abspath.txt", sizeof(command) - 2);
392 ATF_REQUIRE(pathlen + sizeof(suffix) < sizeof(command) - 2);
393 memmove(&command[2 + pathlen], suffix, sizeof(suffix));
395 fd = open("abspath.txt", O_CREAT | O_RDONLY, 0644);
396 ATF_REQUIRE(fd >= 0);
399 send_bytes(command, 2 + pathlen + sizeof(suffix));
400 recv_data(1, NULL, 0);
405 * Attempt to read a file outside of the allowed directory(ies)
407 TFTPD_TC_DEFINE(dotdot,)
409 ATF_REQUIRE_EQ(mkdir("subdir", 0777), 0);
410 SEND_RRQ("../disallowed.txt", "octet");
411 RECV_ERROR(2, "Access violation");
412 s = setup(&addr, __COUNTER__); \
413 SEND_RRQ("subdir/../../disallowed.txt", "octet");
414 RECV_ERROR(2, "Access violation");
415 s = setup(&addr, __COUNTER__); \
416 SEND_RRQ("/etc/passwd", "octet");
417 RECV_ERROR(2, "Access violation");
421 * With "-s", tftpd should chroot to the specified directory
423 TFTPD_TC_DEFINE(s_flag, atf_tc_set_md_var(tc, "require.user", "root");,
427 char contents[] = "small";
429 fd = open("small.txt", O_RDWR | O_CREAT, 0644);
430 ATF_REQUIRE(fd >= 0);
431 write_all(fd, contents, strlen(contents) + 1);
434 SEND_RRQ("/small.txt", "octet");
435 recv_data(1, contents, strlen(contents) + 1);
440 * Read a file, and simulate a dropped ACK packet
442 TFTPD_TC_DEFINE(rrq_dropped_ack,)
445 char contents[] = "small";
447 fd = open("small.txt", O_RDWR | O_CREAT, 0644);
448 ATF_REQUIRE(fd >= 0);
449 write_all(fd, contents, strlen(contents) + 1);
452 SEND_RRQ("small.txt", "octet");
453 recv_data(1, contents, strlen(contents) + 1);
455 * client "sends" the ack, but network drops it
456 * Eventually, tftpd should resend the data packet
458 recv_data(1, contents, strlen(contents) + 1);
463 * Read a file, and simulate a dropped DATA packet
465 TFTPD_TC_DEFINE(rrq_dropped_data,)
469 uint32_t contents[192];
472 for (i = 0; i < nitems(contents); i++)
475 fd = open("medium.txt", O_RDWR | O_CREAT, 0644);
476 ATF_REQUIRE(fd >= 0);
477 write_all(fd, contents, sizeof(contents));
480 SEND_RRQ("medium.txt", "octet");
481 recv_data(1, (const char*)&contents[0], 512);
483 (void) recvfrom(s, buffer, sizeof(buffer), 0, NULL, NULL);
485 * server "sends" the data, but network drops it
486 * Eventually, client should resend the last ACK
489 recv_data(2, (const char*)&contents[128], 256);
494 * Read a medium file, and simulate a duplicated ACK packet
496 TFTPD_TC_DEFINE(rrq_duped_ack,)
500 uint32_t contents[192];
502 for (i = 0; i < nitems(contents); i++)
505 fd = open("medium.txt", O_RDWR | O_CREAT, 0644);
506 ATF_REQUIRE(fd >= 0);
507 write_all(fd, contents, sizeof(contents));
510 SEND_RRQ("medium.txt", "octet");
511 recv_data(1, (const char*)&contents[0], 512);
513 send_ack(1); /* Dupe an ACK packet */
514 recv_data(2, (const char*)&contents[128], 256);
515 recv_data(2, (const char*)&contents[128], 256);
521 * Attempt to read a file without read permissions
523 TFTPD_TC_DEFINE(rrq_eaccess,)
527 fd = open("empty.txt", O_CREAT | O_RDONLY, 0000);
528 ATF_REQUIRE(fd >= 0);
531 SEND_RRQ("empty.txt", "octet");
532 RECV_ERROR(2, "Access violation");
538 TFTPD_TC_DEFINE(rrq_empty,)
542 fd = open("empty.txt", O_CREAT | O_RDONLY, 0644);
543 ATF_REQUIRE(fd >= 0);
546 SEND_RRQ("empty.txt", "octet");
547 recv_data(1, NULL, 0);
552 * Read a medium file of more than one block
554 TFTPD_TC_DEFINE(rrq_medium,)
558 uint32_t contents[192];
560 for (i = 0; i < nitems(contents); i++)
563 fd = open("medium.txt", O_RDWR | O_CREAT, 0644);
564 ATF_REQUIRE(fd >= 0);
565 write_all(fd, contents, sizeof(contents));
568 SEND_RRQ("medium.txt", "octet");
569 recv_data(1, (const char*)&contents[0], 512);
571 recv_data(2, (const char*)&contents[128], 256);
576 * Read a file in netascii format
578 TFTPD_TC_DEFINE(rrq_netascii,)
581 char contents[] = "foo\nbar\rbaz\n";
583 * Weirdly, RFC-764 says that CR must be followed by NUL if a line feed
586 char expected[] = "foo\r\nbar\r\0baz\r\n";
588 fd = open("unix.txt", O_RDWR | O_CREAT, 0644);
589 ATF_REQUIRE(fd >= 0);
590 write_all(fd, contents, strlen(contents) + 1);
593 SEND_RRQ("unix.txt", "netascii");
594 recv_data(1, expected, sizeof(expected));
599 * Read a file that doesn't exist
601 TFTPD_TC_DEFINE(rrq_nonexistent,)
603 SEND_RRQ("nonexistent.txt", "octet");
604 RECV_ERROR(1, "File not found");
608 * Attempt to read a file whose name exceeds PATH_MAX
610 TFTPD_TC_DEFINE(rrq_path_max,)
612 #define AReallyBigFileName \
613 "AReallyBigFileNameXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"\
614 "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"\
615 "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"\
616 "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"\
617 "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"\
618 "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"\
619 "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"\
620 "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"\
621 "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"\
622 "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"\
623 "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"\
624 "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"\
625 "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"\
626 "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"\
627 "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"\
628 "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"\
630 ATF_REQUIRE_MSG(strlen(AReallyBigFileName) > PATH_MAX,
631 "Somebody increased PATH_MAX. Update the test");
632 SEND_RRQ(AReallyBigFileName, "octet");
633 RECV_ERROR(4, "Illegal TFTP operation");
637 * Read a small file of less than one block
639 TFTPD_TC_DEFINE(rrq_small,)
642 char contents[] = "small";
644 fd = open("small.txt", O_RDWR | O_CREAT, 0644);
645 ATF_REQUIRE(fd >= 0);
646 write_all(fd, contents, strlen(contents) + 1);
649 SEND_RRQ("small.txt", "octet");
650 recv_data(1, contents, strlen(contents) + 1);
655 * Try to transfer a file with an unknown mode.
657 TFTPD_TC_DEFINE(unknown_modes,)
659 SEND_RRQ("foo.txt", "ascii"); /* Misspelling of "ascii" */
660 RECV_ERROR(4, "Illegal TFTP operation");
661 s = setup(&addr, __COUNTER__); \
662 SEND_RRQ("foo.txt", "binary"); /* Obsolete. Use "octet" instead */
663 RECV_ERROR(4, "Illegal TFTP operation");
664 s = setup(&addr, __COUNTER__); \
665 SEND_RRQ("foo.txt", "en_US.UTF-8");
666 RECV_ERROR(4, "Illegal TFTP operation");
667 s = setup(&addr, __COUNTER__); \
668 SEND_RRQ("foo.txt", "mail"); /* Obsolete in RFC-1350 */
669 RECV_ERROR(4, "Illegal TFTP operation");
673 * Send an unknown opcode. tftpd should respond with the appropriate error
675 TFTPD_TC_DEFINE(unknown_opcode,)
677 /* Looks like an RRQ or WRQ request, but with a bad opcode */
678 SEND_STR("\0\007foo.txt\0octet\0");
679 RECV_ERROR(4, "Illegal TFTP operation");
683 * Invoke tftpd with "-w" and write to a nonexistent file.
685 TFTPD_TC_DEFINE(w_flag,, w_flag = 1;)
689 char contents[] = "small";
693 contents_len = strlen(contents) + 1;
694 SEND_WRQ("small.txt", "octet");
696 send_data(1, contents, contents_len);
699 fd = open("small.txt", O_RDONLY);
700 ATF_REQUIRE(fd >= 0);
701 r = read(fd, buffer, sizeof(buffer));
703 require_bufeq(contents, contents_len, buffer, r);
707 * Write a medium file, and simulate a dropped ACK packet
709 TFTPD_TC_DEFINE(wrq_dropped_ack,)
714 uint32_t contents[192];
717 for (i = 0; i < nitems(contents); i++)
720 fd = open("medium.txt", O_RDWR | O_CREAT, 0666);
721 ATF_REQUIRE(fd >= 0);
724 SEND_WRQ("medium.txt", "octet");
726 send_data(1, (const char*)&contents[0], 512);
728 * Servers "sends" an ACK packet, but network drops it.
729 * Eventually, server should resend the last ACK
731 (void) recvfrom(s, buffer, sizeof(buffer), 0, NULL, NULL);
733 send_data(2, (const char*)&contents[128], 256);
736 fd = open("medium.txt", O_RDONLY);
737 ATF_REQUIRE(fd >= 0);
738 r = read(fd, buffer, sizeof(buffer));
740 require_bufeq((const char*)contents, 768, buffer, r);
744 * Write a small file, and simulate a dropped DATA packet
746 TFTPD_TC_DEFINE(wrq_dropped_data,)
750 char contents[] = "small";
754 fd = open("small.txt", O_RDWR | O_CREAT, 0666);
755 ATF_REQUIRE(fd >= 0);
757 contents_len = strlen(contents) + 1;
759 SEND_WRQ("small.txt", "octet");
762 * Client "sends" a DATA packet, but network drops it.
763 * Eventually, server should resend the last ACK
766 send_data(1, contents, contents_len);
769 fd = open("small.txt", O_RDONLY);
770 ATF_REQUIRE(fd >= 0);
771 r = read(fd, buffer, sizeof(buffer));
773 require_bufeq(contents, contents_len, buffer, r);
777 * Write a medium file, and simulate a duplicated DATA packet
779 TFTPD_TC_DEFINE(wrq_duped_data,)
784 uint32_t contents[192];
787 for (i = 0; i < nitems(contents); i++)
790 fd = open("medium.txt", O_RDWR | O_CREAT, 0666);
791 ATF_REQUIRE(fd >= 0);
794 SEND_WRQ("medium.txt", "octet");
796 send_data(1, (const char*)&contents[0], 512);
797 send_data(1, (const char*)&contents[0], 512);
800 send_data(2, (const char*)&contents[128], 256);
803 fd = open("medium.txt", O_RDONLY);
804 ATF_REQUIRE(fd >= 0);
805 r = read(fd, buffer, sizeof(buffer));
807 require_bufeq((const char*)contents, 768, buffer, r);
811 * Attempt to write a file without write permissions
813 TFTPD_TC_DEFINE(wrq_eaccess,)
817 fd = open("empty.txt", O_CREAT | O_RDONLY, 0440);
818 ATF_REQUIRE(fd >= 0);
821 SEND_WRQ("empty.txt", "octet");
822 RECV_ERROR(2, "Access violation");
826 * Attempt to write a file without world write permissions, but with world
829 TFTPD_TC_DEFINE(wrq_eaccess_world_readable,)
833 fd = open("empty.txt", O_CREAT | O_RDONLY, 0444);
834 ATF_REQUIRE(fd >= 0);
837 SEND_WRQ("empty.txt", "octet");
838 RECV_ERROR(2, "Access violation");
843 * Write a medium file of more than one block
845 TFTPD_TC_DEFINE(wrq_medium,)
850 uint32_t contents[192];
853 for (i = 0; i < nitems(contents); i++)
856 fd = open("medium.txt", O_RDWR | O_CREAT, 0666);
857 ATF_REQUIRE(fd >= 0);
860 SEND_WRQ("medium.txt", "octet");
862 send_data(1, (const char*)&contents[0], 512);
864 send_data(2, (const char*)&contents[128], 256);
867 fd = open("medium.txt", O_RDONLY);
868 ATF_REQUIRE(fd >= 0);
869 r = read(fd, buffer, sizeof(buffer));
871 require_bufeq((const char*)contents, 768, buffer, r);
875 * Write a file in netascii format
877 TFTPD_TC_DEFINE(wrq_netascii,)
882 * Weirdly, RFC-764 says that CR must be followed by NUL if a line feed
885 char contents[] = "foo\r\nbar\r\0baz\r\n";
886 char expected[] = "foo\nbar\rbaz\n";
890 fd = open("unix.txt", O_RDWR | O_CREAT, 0666);
891 ATF_REQUIRE(fd >= 0);
893 contents_len = sizeof(contents);
895 SEND_WRQ("unix.txt", "netascii");
897 send_data(1, contents, contents_len);
900 fd = open("unix.txt", O_RDONLY);
901 ATF_REQUIRE(fd >= 0);
902 r = read(fd, buffer, sizeof(buffer));
904 require_bufeq(expected, sizeof(expected), buffer, r);
908 * Attempt to write to a nonexistent file. With the default options, this
911 TFTPD_TC_DEFINE(wrq_nonexistent,)
913 SEND_WRQ("nonexistent.txt", "octet");
914 RECV_ERROR(1, "File not found");
918 * Write a small file of less than one block
920 TFTPD_TC_DEFINE(wrq_small,)
924 char contents[] = "small";
928 fd = open("small.txt", O_RDWR | O_CREAT, 0666);
929 ATF_REQUIRE(fd >= 0);
931 contents_len = strlen(contents) + 1;
933 SEND_WRQ("small.txt", "octet");
935 send_data(1, contents, contents_len);
938 fd = open("small.txt", O_RDONLY);
939 ATF_REQUIRE(fd >= 0);
940 r = read(fd, buffer, sizeof(buffer));
942 require_bufeq(contents, contents_len, buffer, r);
946 * Write an empty file over a non-empty one
948 TFTPD_TC_DEFINE(wrq_truncate,)
951 char contents[] = "small";
954 fd = open("small.txt", O_RDWR | O_CREAT, 0666);
955 ATF_REQUIRE(fd >= 0);
956 write_all(fd, contents, strlen(contents) + 1);
959 SEND_WRQ("small.txt", "octet");
961 send_data(1, NULL, 0);
964 ATF_REQUIRE_EQ(stat("small.txt", &sb), 0);
965 ATF_REQUIRE_EQ(sb.st_size, 0);
975 TFTPD_TC_ADD(tp, abspath);
976 TFTPD_TC_ADD(tp, dotdot);
977 TFTPD_TC_ADD(tp, s_flag);
978 TFTPD_TC_ADD(tp, rrq_dropped_ack);
979 TFTPD_TC_ADD(tp, rrq_dropped_data);
980 TFTPD_TC_ADD(tp, rrq_duped_ack);
981 TFTPD_TC_ADD(tp, rrq_eaccess);
982 TFTPD_TC_ADD(tp, rrq_empty);
983 TFTPD_TC_ADD(tp, rrq_medium);
984 TFTPD_TC_ADD(tp, rrq_netascii);
985 TFTPD_TC_ADD(tp, rrq_nonexistent);
986 TFTPD_TC_ADD(tp, rrq_path_max);
987 TFTPD_TC_ADD(tp, rrq_small);
988 TFTPD_TC_ADD(tp, unknown_modes);
989 TFTPD_TC_ADD(tp, unknown_opcode);
990 TFTPD_TC_ADD(tp, w_flag);
991 TFTPD_TC_ADD(tp, wrq_dropped_ack);
992 TFTPD_TC_ADD(tp, wrq_dropped_data);
993 TFTPD_TC_ADD(tp, wrq_duped_data);
994 TFTPD_TC_ADD(tp, wrq_eaccess);
995 TFTPD_TC_ADD(tp, wrq_eaccess_world_readable);
996 TFTPD_TC_ADD(tp, wrq_medium);
997 TFTPD_TC_ADD(tp, wrq_netascii);
998 TFTPD_TC_ADD(tp, wrq_nonexistent);
999 TFTPD_TC_ADD(tp, wrq_small);
1000 TFTPD_TC_ADD(tp, wrq_truncate);
1002 return (atf_no_error());