svn commit: samba r4832 - in
branches/SAMBA_4_0/source/torture/local: .
tridge at samba.org
tridge at samba.org
Wed Jan 19 03:33:50 GMT 2005
Author: tridge
Date: 2005-01-19 03:33:49 +0000 (Wed, 19 Jan 2005)
New Revision: 4832
WebSVN: http://websvn.samba.org/cgi-bin/viewcvs.cgi?view=rev&root=samba&rev=4832
Log:
added simple testing of tcp sockets to LOCAL-SOCKET test
Modified:
branches/SAMBA_4_0/source/torture/local/socket.c
Changeset:
Modified: branches/SAMBA_4_0/source/torture/local/socket.c
===================================================================
--- branches/SAMBA_4_0/source/torture/local/socket.c 2005-01-19 03:20:20 UTC (rev 4831)
+++ branches/SAMBA_4_0/source/torture/local/socket.c 2005-01-19 03:33:49 UTC (rev 4832)
@@ -45,6 +45,8 @@
size_t sent, nread;
BOOL ret = True;
+ printf("TESTING UDP SOCKETS\n");
+
status = socket_create("ip", SOCKET_TYPE_DGRAM, &sock1, 0);
CHECK_STATUS(status, NT_STATUS_OK);
talloc_steal(mem_ctx, sock1);
@@ -123,12 +125,118 @@
return ret;
}
+/*
+ basic testing of tcp routines
+*/
+static BOOL test_tcp(TALLOC_CTX *mem_ctx)
+{
+ struct socket_context *sock1, *sock2, *sock3;
+ NTSTATUS status;
+ int srv_port, from_port;
+ const char *srv_addr, *from_addr;
+ size_t size = 100 + (random() % 100);
+ DATA_BLOB blob, blob2;
+ size_t sent, nread;
+ BOOL ret = True;
+
+ printf("TESTING TCP SOCKETS\n");
+
+ status = socket_create("ip", SOCKET_TYPE_STREAM, &sock1, 0);
+ CHECK_STATUS(status, NT_STATUS_OK);
+ talloc_steal(mem_ctx, sock1);
+
+ status = socket_create("ip", SOCKET_TYPE_STREAM, &sock2, 0);
+ CHECK_STATUS(status, NT_STATUS_OK);
+ talloc_steal(mem_ctx, sock2);
+
+ status = socket_listen(sock1, "127.0.0.1", 0, 0, 0);
+ CHECK_STATUS(status, NT_STATUS_OK);
+
+ srv_addr = socket_get_my_addr(sock1, mem_ctx);
+ if (srv_addr == NULL || strcmp(srv_addr, "127.0.0.1") != 0) {
+ printf("Expected server address of 127.0.0.1 but got %s\n", srv_addr);
+ return False;
+ }
+
+ srv_port = socket_get_my_port(sock1);
+ printf("server port is %d\n", srv_port);
+
+ status = socket_connect(sock2, NULL, 0, srv_addr, srv_port, 0);
+ CHECK_STATUS(status, NT_STATUS_OK);
+
+ status = socket_accept(sock1, &sock3);
+ CHECK_STATUS(status, NT_STATUS_OK);
+ talloc_steal(mem_ctx, sock3);
+ talloc_free(sock1);
+
+ blob = data_blob_talloc(mem_ctx, NULL, size);
+ blob2 = data_blob_talloc(mem_ctx, NULL, size);
+ generate_random_buffer(blob.data, blob.length);
+
+ sent = size;
+ status = socket_send(sock2, &blob, &sent, 0);
+ CHECK_STATUS(status, NT_STATUS_OK);
+
+ status = socket_recv(sock3, blob2.data, size, &nread, 0);
+ CHECK_STATUS(status, NT_STATUS_OK);
+
+ from_addr = socket_get_peer_addr(sock3, mem_ctx);
+ from_port = socket_get_peer_port(sock3);
+
+ if (strcmp(from_addr, srv_addr) != 0) {
+ printf("Unexpected recvfrom addr %s\n", from_addr);
+ ret = False;
+ }
+ if (nread != size) {
+ printf("Unexpected recvfrom size %d should be %d\n", nread, size);
+ ret = False;
+ }
+
+ if (memcmp(blob2.data, blob.data, size) != 0) {
+ printf("Bad data in recvfrom\n");
+ ret = False;
+ }
+
+ generate_random_buffer(blob.data, blob.length);
+ status = socket_send(sock3, &blob, &sent, 0);
+ CHECK_STATUS(status, NT_STATUS_OK);
+
+ status = socket_recv(sock2, blob2.data, size, &nread, 0);
+ CHECK_STATUS(status, NT_STATUS_OK);
+
+ from_addr = socket_get_peer_addr(sock2, mem_ctx);
+ from_port = socket_get_peer_port(sock2);
+
+ if (strcmp(from_addr, srv_addr) != 0) {
+ printf("Unexpected recvfrom addr %s\n", from_addr);
+ ret = False;
+ }
+ if (nread != size) {
+ printf("Unexpected recvfrom size %d should be %d\n", nread, size);
+ ret = False;
+ }
+ if (from_port != srv_port) {
+ printf("Unexpected recvfrom port %d should be %d\n",
+ from_port, srv_port);
+ ret = False;
+ }
+ if (memcmp(blob2.data, blob.data, size) != 0) {
+ printf("Bad data in recvfrom\n");
+ ret = False;
+ }
+
+done:
+
+ return ret;
+}
+
BOOL torture_local_socket(void)
{
BOOL ret = True;
TALLOC_CTX *mem_ctx = talloc_new(NULL);
ret &= test_udp(mem_ctx);
+ ret &= test_tcp(mem_ctx);
return ret;
}
More information about the samba-cvs
mailing list