blob: 1fa40bc6a8ee9e2b8dc002efbe6d59ad66619080 [file] [log] [blame]
David Pursell0eb8e1b2016-01-14 17:18:27 -08001/*
2 * Copyright (C) 2015 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17// Tests socket functionality using loopback connections. Requires IPv4 and
David Pursell756e1c82016-01-29 10:39:41 -080018// IPv6 capabilities. These tests assume that no UDP packets are lost, which
19// should be the case for loopback communication, but is not guaranteed.
David Pursell0eb8e1b2016-01-14 17:18:27 -080020
Mark Salyzyn52bd37e2016-11-07 09:39:30 -080021#include <string.h>
Mark Salyzyn547e0dc2016-10-27 08:04:48 -070022#include <sys/socket.h>
23#include <sys/types.h>
David Pursell572bce22016-01-15 14:19:56 -080024#include <time.h>
25
Mark Salyzyn547e0dc2016-10-27 08:04:48 -070026#include <cutils/sockets.h>
David Pursell0eb8e1b2016-01-14 17:18:27 -080027#include <gtest/gtest.h>
28
David Pursell0eb8e1b2016-01-14 17:18:27 -080029// Makes sure the passed sockets are valid, sends data between them, and closes
30// them. Any failures are logged with gtest.
31//
32// On Mac recvfrom() will not fill in the address for TCP sockets, so we need
33// separate logic paths depending on socket type.
34static void TestConnectedSockets(cutils_socket_t server, cutils_socket_t client,
35 int type) {
36 ASSERT_NE(INVALID_SOCKET, server);
37 ASSERT_NE(INVALID_SOCKET, client);
38
David Pursell8385fb22016-01-29 13:49:25 -080039 char buffer[128];
David Pursell0eb8e1b2016-01-14 17:18:27 -080040 sockaddr_storage addr;
41 socklen_t addr_size = sizeof(addr);
42
43 // Send client -> server first to get the UDP client's address.
44 ASSERT_EQ(3, send(client, "foo", 3, 0));
45 if (type == SOCK_DGRAM) {
David Pursell8385fb22016-01-29 13:49:25 -080046 EXPECT_EQ(3, recvfrom(server, buffer, sizeof(buffer), 0,
David Pursell756e1c82016-01-29 10:39:41 -080047 reinterpret_cast<sockaddr*>(&addr), &addr_size));
David Pursell0eb8e1b2016-01-14 17:18:27 -080048 } else {
David Pursell8385fb22016-01-29 13:49:25 -080049 EXPECT_EQ(3, recv(server, buffer, sizeof(buffer), 0));
David Pursell0eb8e1b2016-01-14 17:18:27 -080050 }
51 EXPECT_EQ(0, memcmp(buffer, "foo", 3));
52
53 // Now send server -> client.
54 if (type == SOCK_DGRAM) {
David Pursell756e1c82016-01-29 10:39:41 -080055 ASSERT_EQ(3, sendto(server, "bar", 3, 0,
56 reinterpret_cast<sockaddr*>(&addr), addr_size));
David Pursell0eb8e1b2016-01-14 17:18:27 -080057 } else {
David Pursell756e1c82016-01-29 10:39:41 -080058 ASSERT_EQ(3, send(server, "bar", 3, 0));
David Pursell0eb8e1b2016-01-14 17:18:27 -080059 }
David Pursell8385fb22016-01-29 13:49:25 -080060 EXPECT_EQ(3, recv(client, buffer, sizeof(buffer), 0));
David Pursell0eb8e1b2016-01-14 17:18:27 -080061 EXPECT_EQ(0, memcmp(buffer, "bar", 3));
62
David Pursell8385fb22016-01-29 13:49:25 -080063 // Send multiple buffers using socket_send_buffers().
64 std::string data[] = {"foo", "bar", "12345"};
David Pursellb34e4a02016-02-01 09:42:09 -080065 cutils_socket_buffer_t socket_buffers[] = { {data[0].data(), data[0].length()},
66 {data[1].data(), data[1].length()},
67 {data[2].data(), data[2].length()} };
David Pursell8385fb22016-01-29 13:49:25 -080068 EXPECT_EQ(11, socket_send_buffers(client, socket_buffers, 3));
69 EXPECT_EQ(11, recv(server, buffer, sizeof(buffer), 0));
70 EXPECT_EQ(0, memcmp(buffer, "foobar12345", 11));
71
David Pursell0eb8e1b2016-01-14 17:18:27 -080072 EXPECT_EQ(0, socket_close(server));
73 EXPECT_EQ(0, socket_close(client));
74}
75
David Pursell756e1c82016-01-29 10:39:41 -080076// Tests socket_get_local_port().
77TEST(SocketsTest, TestGetLocalPort) {
78 cutils_socket_t server;
79
80 // Check a bunch of ports so that we can ignore any conflicts in case
81 // of ports already being taken, but if a server is able to start up we
82 // should always be able to read its port.
83 for (int port : {10000, 12345, 15999, 20202, 25000}) {
84 for (int type : {SOCK_DGRAM, SOCK_STREAM}) {
Greg Hackmann7c60ec32017-02-22 10:42:34 -080085 server = socket_inaddr_any_server(port, type);
David Pursell756e1c82016-01-29 10:39:41 -080086 if (server != INVALID_SOCKET) {
87 EXPECT_EQ(port, socket_get_local_port(server));
88 }
89 socket_close(server);
90 }
91 }
92
93 // Check expected failure for an invalid socket.
94 EXPECT_EQ(-1, socket_get_local_port(INVALID_SOCKET));
95}
96
David Pursell0eb8e1b2016-01-14 17:18:27 -080097// Tests socket_inaddr_any_server() and socket_network_client() for IPv4 UDP.
98TEST(SocketsTest, TestIpv4UdpLoopback) {
David Pursell756e1c82016-01-29 10:39:41 -080099 cutils_socket_t server = socket_inaddr_any_server(0, SOCK_DGRAM);
100 cutils_socket_t client = socket_network_client(
101 "127.0.0.1", socket_get_local_port(server), SOCK_DGRAM);
David Pursell0eb8e1b2016-01-14 17:18:27 -0800102
103 TestConnectedSockets(server, client, SOCK_DGRAM);
104}
105
106// Tests socket_inaddr_any_server() and socket_network_client() for IPv4 TCP.
107TEST(SocketsTest, TestIpv4TcpLoopback) {
David Pursell756e1c82016-01-29 10:39:41 -0800108 cutils_socket_t server = socket_inaddr_any_server(0, SOCK_STREAM);
David Pursell0eb8e1b2016-01-14 17:18:27 -0800109 ASSERT_NE(INVALID_SOCKET, server);
110
David Pursell756e1c82016-01-29 10:39:41 -0800111 cutils_socket_t client = socket_network_client(
112 "127.0.0.1", socket_get_local_port(server), SOCK_STREAM);
David Pursell0eb8e1b2016-01-14 17:18:27 -0800113 cutils_socket_t handler = accept(server, nullptr, nullptr);
114 EXPECT_EQ(0, socket_close(server));
115
116 TestConnectedSockets(handler, client, SOCK_STREAM);
117}
118
119// Tests socket_inaddr_any_server() and socket_network_client() for IPv6 UDP.
120TEST(SocketsTest, TestIpv6UdpLoopback) {
David Pursell756e1c82016-01-29 10:39:41 -0800121 cutils_socket_t server = socket_inaddr_any_server(0, SOCK_DGRAM);
122 cutils_socket_t client = socket_network_client(
123 "::1", socket_get_local_port(server), SOCK_DGRAM);
David Pursell0eb8e1b2016-01-14 17:18:27 -0800124
125 TestConnectedSockets(server, client, SOCK_DGRAM);
126}
127
128// Tests socket_inaddr_any_server() and socket_network_client() for IPv6 TCP.
129TEST(SocketsTest, TestIpv6TcpLoopback) {
David Pursell756e1c82016-01-29 10:39:41 -0800130 cutils_socket_t server = socket_inaddr_any_server(0, SOCK_STREAM);
David Pursell0eb8e1b2016-01-14 17:18:27 -0800131 ASSERT_NE(INVALID_SOCKET, server);
132
David Pursell756e1c82016-01-29 10:39:41 -0800133 cutils_socket_t client = socket_network_client(
134 "::1", socket_get_local_port(server), SOCK_STREAM);
David Pursell0eb8e1b2016-01-14 17:18:27 -0800135 cutils_socket_t handler = accept(server, nullptr, nullptr);
136 EXPECT_EQ(0, socket_close(server));
137
138 TestConnectedSockets(handler, client, SOCK_STREAM);
139}
David Pursell572bce22016-01-15 14:19:56 -0800140
David Pursell8385fb22016-01-29 13:49:25 -0800141// Tests socket_send_buffers() failure.
142TEST(SocketsTest, TestSocketSendBuffersFailure) {
143 EXPECT_EQ(-1, socket_send_buffers(INVALID_SOCKET, nullptr, 0));
144}