1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
|
//
// Copyright 2018 Staysail Systems, Inc. <info@staysail.tech>
// Copyright 2018 Capitar IT Group BV <info@capitar.com>
//
// This software is supplied under the terms of the MIT License, a
// copy of which should be located in the distribution where this
// file was obtained (LICENSE.txt). A copy of the license may also be
// found online at https://opensource.org/licenses/MIT.
//
#include "convey.h"
#include "nng.h"
#include "protocol/pair1/pair.h"
#include "trantest.h"
#include "stubs.h"
// TCP tests.
#ifndef _WIN32
#include <arpa/inet.h>
#endif
static int
check_props_v4(nng_msg *msg)
{
nng_pipe p;
size_t z;
nng_sockaddr la;
nng_sockaddr ra;
p = nng_msg_get_pipe(msg);
So(p > 0);
z = sizeof(nng_sockaddr);
So(nng_pipe_getopt(p, NNG_OPT_LOCADDR, &la, &z) == 0);
So(z == sizeof(la));
So(la.s_family == NNG_AF_INET);
So(la.s_in.sa_port == htons(trantest_port - 1));
So(la.s_in.sa_port != 0);
So(la.s_in.sa_addr == htonl(0x7f000001));
z = sizeof(nng_sockaddr);
So(nng_pipe_getopt(p, NNG_OPT_REMADDR, &ra, &z) == 0);
So(z == sizeof(ra));
So(ra.s_family == NNG_AF_INET);
So(ra.s_in.sa_port != 0);
So(ra.s_in.sa_addr == htonl(0x7f000001));
return (0);
}
TestMain("TCP Transport", {
trantest_test_extended("tcp://127.0.0.1:%u", check_props_v4);
Convey("We cannot connect to wild cards", {
nng_socket s;
char addr[NNG_MAXADDRLEN];
So(nng_pair_open(&s) == 0);
Reset({ nng_close(s); });
trantest_next_address(addr, "tcp://*:%u");
So(nng_dial(s, addr, NULL, 0) == NNG_EADDRINVAL);
});
Convey("We can bind to wild card", {
nng_socket s1;
nng_socket s2;
char addr[NNG_MAXADDRLEN];
So(nng_pair_open(&s1) == 0);
So(nng_pair_open(&s2) == 0);
Reset({
nng_close(s2);
nng_close(s1);
});
trantest_next_address(addr, "tcp://*:%u");
So(nng_listen(s1, addr, NULL, 0) == 0);
// reset port back one
trantest_prev_address(addr, "tcp://127.0.0.1:%u");
So(nng_dial(s2, addr, NULL, 0) == 0);
});
Convey("We can bind to port zero", {
nng_socket s1;
nng_socket s2;
nng_listener l;
char addr[NNG_MAXADDRLEN];
size_t sz;
So(nng_pair_open(&s1) == 0);
So(nng_pair_open(&s2) == 0);
Reset({
nng_close(s2);
nng_close(s1);
});
So(nng_listen(s1, "tcp://127.0.0.1:0", &l, 0) == 0);
sz = NNG_MAXADDRLEN;
So(nng_listener_getopt(l, NNG_OPT_URL, addr, &sz) == 0);
So(nng_dial(s2, addr, NULL, 0) == 0);
});
Convey("Malformed TCP addresses do not panic", {
nng_socket s1;
So(nng_pair_open(&s1) == 0);
Reset({ nng_close(s1); });
So(nng_dial(s1, "tcp://127.0.0.1", NULL, 0) == NNG_EADDRINVAL);
So(nng_dial(s1, "tcp://127.0.0.1.32", NULL, 0) ==
NNG_EADDRINVAL);
So(nng_dial(s1, "tcp://127.0.x.1.32", NULL, 0) ==
NNG_EADDRINVAL);
So(nng_listen(s1, "tcp://127.0.0.1.32", NULL, 0) ==
NNG_EADDRINVAL);
So(nng_listen(s1, "tcp://127.0.x.1.32", NULL, 0) ==
NNG_EADDRINVAL);
});
nng_fini();
})
|