Lines Matching +full:recv +full:- +full:not +full:- +full:empty

1 /*-
2 * SPDX-License-Identifier: BSD-2-Clause
16 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
44 #include <atf-c.h>
100 * - fd[0] to send, fd[1] to receive in ATF_TC_BODY()
101 * - buf[maxdgram] for data in ATF_TC_BODY()
105 ATF_REQUIRE(socketpair(PF_UNIX, SOCK_DGRAM, 0, fd) != -1); in ATF_TC_BODY()
117 ATF_REQUIRE(send(fd[0], buf, maxdgram + 1, 0) == -1); in ATF_TC_BODY()
124 ATF_REQUIRE(recv(fd[1], buf, maxdgram, MSG_PEEK) == (ssize_t)maxdgram); in ATF_TC_BODY()
140 /* Empty: block. */ in ATF_TC_BODY()
144 ATF_REQUIRE(recv(fd[1], buf, maxdgram, 0) == -1); in ATF_TC_BODY()
149 ATF_REQUIRE(recv(fd[1], buf, maxdgram, MSG_DONTWAIT) == -1); in ATF_TC_BODY()
153 ATF_REQUIRE(fcntl(fd[1], F_SETFL, O_NONBLOCK) != -1); in ATF_TC_BODY()
154 ATF_REQUIRE(recv(fd[1], buf, maxdgram, 0) == -1); in ATF_TC_BODY()
159 ATF_REQUIRE(send(fd[0], buf, maxdgram, 0) == -1); in ATF_TC_BODY()
166 ATF_REQUIRE(fcntl(fd[0], F_SETFL, O_NONBLOCK) != -1); in ATF_TC_BODY()
167 ATF_REQUIRE(send(fd[0], buf, maxdgram, 0) == -1); in ATF_TC_BODY()
170 /* Remote side closed -> ECONNRESET. */ in ATF_TC_BODY()
172 ATF_REQUIRE(send(fd[0], buf, maxdgram, 0) == -1); in ATF_TC_BODY()
187 ATF_REQUIRE(listen(one, -1) != 0); in ATF_TC_BODY()
195 ATF_REQUIRE(accept(one, NULL, NULL) == -1); in ATF_TC_BODY()
200 * historically existing edge case that is not explicitly described in ATF_TC_BODY()
205 ATF_REQUIRE(recv(one, buf, sizeof(buf), 0) == 42); in ATF_TC_BODY()
210 * One sender can not fill the receive side. Other senders can in ATF_TC_BODY()
217 * latter is empty. Otherwise discard it, to prevent against in ATF_TC_BODY()
218 * connect-fill-close attack. in ATF_TC_BODY()
232 ATF_REQUIRE(recv(one, buf, sizeof(buf), 0) == sizeof(buf)); in ATF_TC_BODY()
234 ATF_REQUIRE(recv(one, buf, sizeof(buf), 0) == sizeof(buf)); in ATF_TC_BODY()
239 ATF_REQUIRE(send(many[0], flooder, BUFSIZE, 0) == -1); in ATF_TC_BODY()
242 ATF_REQUIRE(recv(one, buf, sizeof(buf), 0) == sizeof(buf)); in ATF_TC_BODY()
244 ATF_REQUIRE(recv(one, buf, sizeof(buf), 0) == sizeof(buf)); in ATF_TC_BODY()
248 ATF_REQUIRE(recv(one, buf, sizeof(buf), MSG_PEEK) == sizeof(buf)); in ATF_TC_BODY()
251 ATF_REQUIRE(recv(one, buf, sizeof(buf), MSG_PEEK) == sizeof(buf)); in ATF_TC_BODY()
253 ATF_REQUIRE(recv(one, buf, sizeof(buf), 0) == sizeof(buf)); in ATF_TC_BODY()
255 ATF_REQUIRE(recv(one, buf, sizeof(buf), 0) == sizeof(buf)); in ATF_TC_BODY()
258 /* Disconnect in presence of data from not connected. */ in ATF_TC_BODY()
262 ATF_REQUIRE(recv(one, buf, sizeof(buf), 0) == sizeof(buf)); in ATF_TC_BODY()
264 ATF_REQUIRE(recv(one, buf, sizeof(buf), MSG_DONTWAIT) == -1); in ATF_TC_BODY()
267 /* Disconnect in absence of data from not connected. */ in ATF_TC_BODY()
270 ATF_REQUIRE(recv(one, buf, sizeof(buf), 0) == sizeof(buf)); in ATF_TC_BODY()
276 ATF_REQUIRE(recv(one, buf, sizeof(buf), MSG_PEEK) == 42); in ATF_TC_BODY()
293 ATF_REQUIRE(ioctl(fd, FIONREAD, &data) != -1); in test42()
308 ATF_REQUIRE((kq = kqueue()) != -1); in test42()
354 ATF_REQUIRE(socketpair(PF_UNIX, SOCK_DGRAM, 0, fd) != -1); in ATF_TC_BODY()
360 /* Not-connected send */ in ATF_TC_BODY()
380 ATF_REQUIRE(sd != -1); in ATF_TC_BODY()
409 ATF_REQUIRE(sd != -1); in ATF_TC_BODY()
412 ATF_REQUIRE_ERRNO(EINVAL, error == -1); in ATF_TC_BODY()
427 ATF_REQUIRE_ERRNO(EINVAL, error == -1); in ATF_TC_BODY()