xref: /freebsd/tests/sys/netinet/tcp_md5_getsockopt.c (revision 046c625e9382e17da953767b881aaa782fa73af8)
1 /*-
2  * SPDX-License-Identifier: BSD-2-Clause
3  *
4  * Copyright (c) 2022, Klara Inc.
5  * Copyright (c) 2022, Claudio Jeker <claudio@openbsd.org>
6  *
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted provided that the following conditions are
9  * met:
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in
14  *    the documentation and/or other materials provided with the
15  *    distribution.
16  *
17  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
18  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
21  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27  * SUCH DAMAGE.
28  */
29 
30 #include <sys/param.h>
31 #include <sys/linker.h>
32 #include <sys/socket.h>
33 
34 #include <netinet/in.h>
35 #include <netinet/tcp.h>
36 
37 #include <fcntl.h>
38 #include <unistd.h>
39 #include <err.h>
40 
41 #include <atf-c.h>
42 
43 void test_tcp_md5_getsockopt(int);
44 
45 void
46 test_tcp_md5_getsockopt(int v6)
47 {
48         struct sockaddr_in *s;
49         struct sockaddr_in6 s6 = { 0 };
50         struct sockaddr_in s4 = { 0 };
51         socklen_t len;
52         int csock, ssock, opt;
53 	int pf;
54 
55 	if (v6) {
56 		pf = PF_INET6;
57 		len = sizeof(s6);
58 
59 		s6.sin6_family = pf;
60 		s6.sin6_len = sizeof(s6);
61 		s6.sin6_addr = in6addr_loopback;
62 		s6.sin6_port = 0;
63 
64 		s = (struct sockaddr_in *)&s6;
65 	} else {
66 		pf = PF_INET;
67 		len = sizeof(s4);
68 
69 		s4.sin_family = pf;
70 		s4.sin_len = sizeof(s4);
71 		s4.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
72 		s4.sin_port = 0;
73 
74 		s = &s4;
75 	}
76 
77         if ((ssock = socket(pf, SOCK_STREAM, 0)) == -1)
78                 atf_tc_fail("creating server socket");
79 
80 	fcntl(ssock, F_SETFL, O_NONBLOCK);
81 
82 	if ((bind(ssock, (struct sockaddr *)s, len) == -1))
83 		atf_tc_fail("binding to localhost");
84 
85 	getsockname(ssock, (struct sockaddr *)s, &len);
86 
87 	listen(ssock, 1);
88 
89         if ((csock = socket(pf, SOCK_STREAM, 0)) == -1)
90                 atf_tc_fail("creating client socket");
91 
92         if (connect(csock, (struct sockaddr *)s, len) == -1)
93                 atf_tc_fail("connecting to server instance");
94 
95         if (getsockopt(csock, IPPROTO_TCP, TCP_MD5SIG, &opt, &len) == -1)
96                 atf_tc_fail("getsockopt");
97 
98 	close(csock);
99 	close(ssock);
100 
101 	atf_tc_pass();
102 }
103 
104 ATF_TC(tcp_md5_getsockopt_v4);
105 ATF_TC_HEAD(tcp_md5_getsockopt_v4, tc)
106 {
107 	atf_tc_set_md_var(tc, "descr", "Test getsockopt for TCP MD5 SIG (IPv4)");
108 	atf_tc_set_md_var(tc, "require.kmods", "tcpmd5");
109 }
110 
111 ATF_TC_BODY(tcp_md5_getsockopt_v4, tc)
112 {
113 	test_tcp_md5_getsockopt(0);
114 }
115 
116 ATF_TC(tcp_md5_getsockopt_v6);
117 ATF_TC_HEAD(tcp_md5_getsockopt_v6, tc)
118 {
119 	atf_tc_set_md_var(tc, "descr", "Test getsockopt for TCP MD5 SIG (IPv6)");
120 	atf_tc_set_md_var(tc, "require.kmods", "tcpmd5");
121 }
122 
123 ATF_TC_BODY(tcp_md5_getsockopt_v6, tc)
124 {
125 	test_tcp_md5_getsockopt(1);
126 }
127 
128 ATF_TP_ADD_TCS(tp)
129 {
130 	ATF_TP_ADD_TC(tp, tcp_md5_getsockopt_v4);
131 	ATF_TP_ADD_TC(tp, tcp_md5_getsockopt_v6);
132 
133 	return atf_no_error();
134 }
135