blob: f6f9c362883055690676340b2f9578d22482dbef [file] [log] [blame]
David Pursell0eb8e1b2016-01-14 17:18:27 -08001/*
2 * Copyright (C) 2015 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17// Tests socket functionality using loopback connections. Requires IPv4 and
David Pursell756e1c82016-01-29 10:39:41 -080018// IPv6 capabilities. These tests assume that no UDP packets are lost, which
19// should be the case for loopback communication, but is not guaranteed.
David Pursell0eb8e1b2016-01-14 17:18:27 -080020
Mark Salyzyn52bd37e2016-11-07 09:39:30 -080021#include <string.h>
David Pursell572bce22016-01-15 14:19:56 -080022#include <time.h>
23
Mark Salyzyn547e0dc2016-10-27 08:04:48 -070024#include <cutils/sockets.h>
David Pursell0eb8e1b2016-01-14 17:18:27 -080025#include <gtest/gtest.h>
26
David Pursell0eb8e1b2016-01-14 17:18:27 -080027// Makes sure the passed sockets are valid, sends data between them, and closes
28// them. Any failures are logged with gtest.
29//
30// On Mac recvfrom() will not fill in the address for TCP sockets, so we need
31// separate logic paths depending on socket type.
32static void TestConnectedSockets(cutils_socket_t server, cutils_socket_t client,
33 int type) {
34 ASSERT_NE(INVALID_SOCKET, server);
35 ASSERT_NE(INVALID_SOCKET, client);
36
David Pursell8385fb22016-01-29 13:49:25 -080037 char buffer[128];
David Pursell0eb8e1b2016-01-14 17:18:27 -080038 sockaddr_storage addr;
39 socklen_t addr_size = sizeof(addr);
40
41 // Send client -> server first to get the UDP client's address.
42 ASSERT_EQ(3, send(client, "foo", 3, 0));
43 if (type == SOCK_DGRAM) {
David Pursell8385fb22016-01-29 13:49:25 -080044 EXPECT_EQ(3, recvfrom(server, buffer, sizeof(buffer), 0,
David Pursell756e1c82016-01-29 10:39:41 -080045 reinterpret_cast<sockaddr*>(&addr), &addr_size));
David Pursell0eb8e1b2016-01-14 17:18:27 -080046 } else {
David Pursell8385fb22016-01-29 13:49:25 -080047 EXPECT_EQ(3, recv(server, buffer, sizeof(buffer), 0));
David Pursell0eb8e1b2016-01-14 17:18:27 -080048 }
49 EXPECT_EQ(0, memcmp(buffer, "foo", 3));
50
51 // Now send server -> client.
52 if (type == SOCK_DGRAM) {
David Pursell756e1c82016-01-29 10:39:41 -080053 ASSERT_EQ(3, sendto(server, "bar", 3, 0,
54 reinterpret_cast<sockaddr*>(&addr), addr_size));
David Pursell0eb8e1b2016-01-14 17:18:27 -080055 } else {
David Pursell756e1c82016-01-29 10:39:41 -080056 ASSERT_EQ(3, send(server, "bar", 3, 0));
David Pursell0eb8e1b2016-01-14 17:18:27 -080057 }
David Pursell8385fb22016-01-29 13:49:25 -080058 EXPECT_EQ(3, recv(client, buffer, sizeof(buffer), 0));
David Pursell0eb8e1b2016-01-14 17:18:27 -080059 EXPECT_EQ(0, memcmp(buffer, "bar", 3));
60
David Pursell8385fb22016-01-29 13:49:25 -080061 // Send multiple buffers using socket_send_buffers().
62 std::string data[] = {"foo", "bar", "12345"};
David Pursellb34e4a02016-02-01 09:42:09 -080063 cutils_socket_buffer_t socket_buffers[] = { {data[0].data(), data[0].length()},
64 {data[1].data(), data[1].length()},
65 {data[2].data(), data[2].length()} };
David Pursell8385fb22016-01-29 13:49:25 -080066 EXPECT_EQ(11, socket_send_buffers(client, socket_buffers, 3));
67 EXPECT_EQ(11, recv(server, buffer, sizeof(buffer), 0));
68 EXPECT_EQ(0, memcmp(buffer, "foobar12345", 11));
69
David Pursell0eb8e1b2016-01-14 17:18:27 -080070 EXPECT_EQ(0, socket_close(server));
71 EXPECT_EQ(0, socket_close(client));
72}
73
David Pursell756e1c82016-01-29 10:39:41 -080074// Tests socket_get_local_port().
75TEST(SocketsTest, TestGetLocalPort) {
76 cutils_socket_t server;
77
78 // Check a bunch of ports so that we can ignore any conflicts in case
79 // of ports already being taken, but if a server is able to start up we
80 // should always be able to read its port.
81 for (int port : {10000, 12345, 15999, 20202, 25000}) {
82 for (int type : {SOCK_DGRAM, SOCK_STREAM}) {
Greg Hackmann7c60ec32017-02-22 10:42:34 -080083 server = socket_inaddr_any_server(port, type);
David Pursell756e1c82016-01-29 10:39:41 -080084 if (server != INVALID_SOCKET) {
85 EXPECT_EQ(port, socket_get_local_port(server));
86 }
87 socket_close(server);
88 }
89 }
90
91 // Check expected failure for an invalid socket.
92 EXPECT_EQ(-1, socket_get_local_port(INVALID_SOCKET));
93}
94
David Pursell0eb8e1b2016-01-14 17:18:27 -080095// Tests socket_inaddr_any_server() and socket_network_client() for IPv4 UDP.
96TEST(SocketsTest, TestIpv4UdpLoopback) {
David Pursell756e1c82016-01-29 10:39:41 -080097 cutils_socket_t server = socket_inaddr_any_server(0, SOCK_DGRAM);
98 cutils_socket_t client = socket_network_client(
99 "127.0.0.1", socket_get_local_port(server), SOCK_DGRAM);
David Pursell0eb8e1b2016-01-14 17:18:27 -0800100
101 TestConnectedSockets(server, client, SOCK_DGRAM);
102}
103
104// Tests socket_inaddr_any_server() and socket_network_client() for IPv4 TCP.
105TEST(SocketsTest, TestIpv4TcpLoopback) {
David Pursell756e1c82016-01-29 10:39:41 -0800106 cutils_socket_t server = socket_inaddr_any_server(0, SOCK_STREAM);
David Pursell0eb8e1b2016-01-14 17:18:27 -0800107 ASSERT_NE(INVALID_SOCKET, server);
108
David Pursell756e1c82016-01-29 10:39:41 -0800109 cutils_socket_t client = socket_network_client(
110 "127.0.0.1", socket_get_local_port(server), SOCK_STREAM);
David Pursell0eb8e1b2016-01-14 17:18:27 -0800111 cutils_socket_t handler = accept(server, nullptr, nullptr);
112 EXPECT_EQ(0, socket_close(server));
113
114 TestConnectedSockets(handler, client, SOCK_STREAM);
115}
116
117// Tests socket_inaddr_any_server() and socket_network_client() for IPv6 UDP.
118TEST(SocketsTest, TestIpv6UdpLoopback) {
David Pursell756e1c82016-01-29 10:39:41 -0800119 cutils_socket_t server = socket_inaddr_any_server(0, SOCK_DGRAM);
120 cutils_socket_t client = socket_network_client(
121 "::1", socket_get_local_port(server), SOCK_DGRAM);
David Pursell0eb8e1b2016-01-14 17:18:27 -0800122
123 TestConnectedSockets(server, client, SOCK_DGRAM);
124}
125
126// Tests socket_inaddr_any_server() and socket_network_client() for IPv6 TCP.
127TEST(SocketsTest, TestIpv6TcpLoopback) {
David Pursell756e1c82016-01-29 10:39:41 -0800128 cutils_socket_t server = socket_inaddr_any_server(0, SOCK_STREAM);
David Pursell0eb8e1b2016-01-14 17:18:27 -0800129 ASSERT_NE(INVALID_SOCKET, server);
130
David Pursell756e1c82016-01-29 10:39:41 -0800131 cutils_socket_t client = socket_network_client(
132 "::1", socket_get_local_port(server), SOCK_STREAM);
David Pursell0eb8e1b2016-01-14 17:18:27 -0800133 cutils_socket_t handler = accept(server, nullptr, nullptr);
134 EXPECT_EQ(0, socket_close(server));
135
136 TestConnectedSockets(handler, client, SOCK_STREAM);
137}
David Pursell572bce22016-01-15 14:19:56 -0800138
David Pursell8385fb22016-01-29 13:49:25 -0800139// Tests socket_send_buffers() failure.
140TEST(SocketsTest, TestSocketSendBuffersFailure) {
141 EXPECT_EQ(-1, socket_send_buffers(INVALID_SOCKET, nullptr, 0));
142}