/*- * SPDX-License-Identifier: BSD-2-Clause * * Copyright (c) 2023 Gleb Smirnoff * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */ #include #include #include #include #include #include static int tcp4_listensock(struct sockaddr_in *sin) { int l; ATF_REQUIRE((l = socket(PF_INET, SOCK_STREAM, 0)) > 0); ATF_REQUIRE(setsockopt(l, SOL_SOCKET, SO_REUSEADDR, &(socklen_t){1}, sizeof(int)) == 0); *sin = (struct sockaddr_in){ .sin_len = sizeof(sin), .sin_family = AF_INET, .sin_addr.s_addr = htonl(INADDR_LOOPBACK), }; ATF_REQUIRE(bind(l, (struct sockaddr *)sin, sizeof(*sin)) == 0); ATF_REQUIRE(getsockname(l, (struct sockaddr *)sin, &(socklen_t){ sizeof(*sin) }) == 0); ATF_REQUIRE(listen(l, -1) == 0); return (l); } static int tcp4_clientsock(struct sockaddr_in *sin) { int s; ATF_REQUIRE((s = socket(PF_INET, SOCK_STREAM, 0)) > 0); ATF_REQUIRE(connect(s, (struct sockaddr *)sin, sizeof(*sin)) == 0); return (s); } ATF_TC_WITHOUT_HEAD(tcp4_zerolen); ATF_TC_BODY(tcp4_zerolen, tc) { static char canary[sizeof(struct sockaddr_in)] = { [0 ... sizeof(struct sockaddr_in) - 1] = 0xa }; struct sockaddr_in sin, ret; socklen_t salen; int l; l = tcp4_listensock(&sin); (void )tcp4_clientsock(&sin); memcpy(&ret, &canary, sizeof(ret)); salen = 0; ATF_REQUIRE(accept(l, (struct sockaddr *)&ret, &salen) > 0); ATF_REQUIRE(memcmp(&ret, &canary, sizeof(ret)) == 0); ATF_REQUIRE(salen == sizeof(struct sockaddr_in)); /* Note: Linux will block for connection here, we fail immediately. */ ATF_REQUIRE(accept(l, (struct sockaddr *)&ret, NULL) == -1); ATF_REQUIRE(errno == EFAULT); } ATF_TC_WITHOUT_HEAD(tcp4); ATF_TC_BODY(tcp4, tc) { struct sockaddr_in sin, ret; socklen_t salen; int l, s; l = tcp4_listensock(&sin); s = tcp4_clientsock(&sin); salen = sizeof(struct sockaddr_in) + 2; ATF_REQUIRE(accept(l, (struct sockaddr *)&ret, &salen) > 0); ATF_REQUIRE(salen == sizeof(struct sockaddr_in)); ATF_REQUIRE(getsockname(s, (struct sockaddr *)&sin, &(socklen_t){ sizeof(sin) }) == 0); ATF_REQUIRE(memcmp(&ret, &sin, sizeof(sin)) == 0); } ATF_TC_WITHOUT_HEAD(tcp4_noaddr); ATF_TC_BODY(tcp4_noaddr, tc) { struct sockaddr_in sin; int l; l = tcp4_listensock(&sin); (void )tcp4_clientsock(&sin); ATF_REQUIRE(accept(l, NULL, NULL) > 0); } ATF_TP_ADD_TCS(tp) { ATF_TP_ADD_TC(tp, tcp4); ATF_TP_ADD_TC(tp, tcp4_noaddr); ATF_TP_ADD_TC(tp, tcp4_zerolen); return (atf_no_error()); }