2014-06-26 18:26:42 +01:00
|
|
|
/* Copyright (c) 2014, Google Inc.
|
|
|
|
*
|
|
|
|
* Permission to use, copy, modify, and/or distribute this software for any
|
|
|
|
* purpose with or without fee is hereby granted, provided that the above
|
|
|
|
* copyright notice and this permission notice appear in all copies.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
|
|
|
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
|
|
|
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
|
|
|
|
* SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
|
|
|
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
|
|
|
|
* OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
|
|
|
|
* CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */
|
2014-06-20 20:00:00 +01:00
|
|
|
|
|
|
|
#define _BSD_SOURCE
|
|
|
|
|
|
|
|
#include <arpa/inet.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <netinet/in.h>
|
2014-08-04 20:06:28 +01:00
|
|
|
#include <string.h>
|
2014-06-20 20:00:00 +01:00
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
|
|
|
|
#include <openssl/bio.h>
|
|
|
|
#include <openssl/err.h>
|
|
|
|
|
|
|
|
|
|
|
|
static int test_socket_connect() {
|
|
|
|
int listening_sock = socket(AF_INET, SOCK_STREAM, 0);
|
|
|
|
int sock;
|
|
|
|
struct sockaddr_in sin;
|
|
|
|
socklen_t sockaddr_len = sizeof(sin);
|
|
|
|
static const char kTestMessage[] = "test";
|
|
|
|
char hostname[80], buf[5];
|
|
|
|
BIO *bio;
|
|
|
|
|
|
|
|
memset(&sin, 0, sizeof(sin));
|
|
|
|
sin.sin_family = AF_INET;
|
|
|
|
if (!inet_aton("127.0.0.1", &sin.sin_addr)) {
|
|
|
|
perror("inet_aton");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (bind(listening_sock, (struct sockaddr *)&sin, sizeof(sin)) != 0) {
|
|
|
|
perror("bind");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (listen(listening_sock, 1)) {
|
|
|
|
perror("listen");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (getsockname(listening_sock, (struct sockaddr *)&sin, &sockaddr_len) ||
|
|
|
|
sockaddr_len != sizeof(sin)) {
|
|
|
|
perror("getsockname");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
snprintf(hostname, sizeof(hostname), "%s:%d", "127.0.0.1",
|
|
|
|
ntohs(sin.sin_port));
|
|
|
|
bio = BIO_new_connect(hostname);
|
|
|
|
if (!bio) {
|
|
|
|
fprintf(stderr, "BIO_new_connect failed.\n");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (BIO_write(bio, kTestMessage, sizeof(kTestMessage)) !=
|
|
|
|
sizeof(kTestMessage)) {
|
|
|
|
fprintf(stderr, "BIO_write failed.\n");
|
|
|
|
BIO_print_errors_fp(stderr);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
sock = accept(listening_sock, (struct sockaddr *) &sin, &sockaddr_len);
|
|
|
|
if (sock < 0) {
|
|
|
|
perror("accept");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (read(sock, buf, sizeof(buf)) != sizeof(kTestMessage)) {
|
|
|
|
perror("read");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (memcmp(buf, kTestMessage, sizeof(kTestMessage))) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
close(sock);
|
|
|
|
close(listening_sock);
|
|
|
|
BIO_free(bio);
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2014-08-04 20:06:28 +01:00
|
|
|
static int test_printf() {
|
|
|
|
/* Test a short output, a very long one, and various sizes around
|
|
|
|
* 256 (the size of the buffer) to ensure edge cases are correct. */
|
|
|
|
static const size_t kLengths[] = { 5, 250, 251, 252, 253, 254, 1023 };
|
|
|
|
BIO *bio;
|
|
|
|
char string[1024];
|
|
|
|
int ret;
|
|
|
|
const uint8_t *contents;
|
2014-08-04 23:24:41 +01:00
|
|
|
size_t i, len;
|
2014-08-04 20:06:28 +01:00
|
|
|
|
|
|
|
bio = BIO_new(BIO_s_mem());
|
|
|
|
if (!bio) {
|
|
|
|
fprintf(stderr, "BIO_new failed\n");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-08-04 23:24:41 +01:00
|
|
|
for (i = 0; i < sizeof(kLengths) / sizeof(kLengths[0]); i++) {
|
2014-08-04 20:06:28 +01:00
|
|
|
if (kLengths[i] >= sizeof(string)) {
|
|
|
|
fprintf(stderr, "Bad test string length\n");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
memset(string, 'a', sizeof(string));
|
|
|
|
string[kLengths[i]] = '\0';
|
|
|
|
|
|
|
|
ret = BIO_printf(bio, "test %s", string);
|
|
|
|
if (ret != 5 + kLengths[i]) {
|
|
|
|
fprintf(stderr, "BIO_printf failed\n");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (!BIO_mem_contents(bio, &contents, &len)) {
|
|
|
|
fprintf(stderr, "BIO_mem_contents failed\n");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (len != 5 + kLengths[i] ||
|
|
|
|
strncmp((const char *)contents, "test ", 5) != 0 ||
|
|
|
|
strncmp((const char *)contents + 5, string, kLengths[i]) != 0) {
|
|
|
|
fprintf(stderr, "Contents did not match: %.*s\n", (int)len, contents);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!BIO_reset(bio)) {
|
|
|
|
fprintf(stderr, "BIO_reset failed\n");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
BIO_free(bio);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2014-06-20 20:00:00 +01:00
|
|
|
int main() {
|
|
|
|
ERR_load_crypto_strings();
|
|
|
|
|
|
|
|
if (!test_socket_connect()) {
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2014-08-04 20:06:28 +01:00
|
|
|
if (!test_printf()) {
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2014-06-20 20:00:00 +01:00
|
|
|
printf("PASS\n");
|
|
|
|
return 0;
|
|
|
|
}
|