1b7b85f24SRobert Watson /*-
2b7b85f24SRobert Watson * Copyright (c) 2005 Robert N. M. Watson
3b7b85f24SRobert Watson * All rights reserved.
4b7b85f24SRobert Watson *
5b7b85f24SRobert Watson * Redistribution and use in source and binary forms, with or without
6b7b85f24SRobert Watson * modification, are permitted provided that the following conditions
7b7b85f24SRobert Watson * are met:
8b7b85f24SRobert Watson * 1. Redistributions of source code must retain the above copyright
9b7b85f24SRobert Watson * notice, this list of conditions and the following disclaimer.
10b7b85f24SRobert Watson * 2. Redistributions in binary form must reproduce the above copyright
11b7b85f24SRobert Watson * notice, this list of conditions and the following disclaimer in the
12b7b85f24SRobert Watson * documentation and/or other materials provided with the distribution.
13b7b85f24SRobert Watson *
14b7b85f24SRobert Watson * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15b7b85f24SRobert Watson * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16b7b85f24SRobert Watson * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17b7b85f24SRobert Watson * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18b7b85f24SRobert Watson * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19b7b85f24SRobert Watson * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20b7b85f24SRobert Watson * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21b7b85f24SRobert Watson * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22b7b85f24SRobert Watson * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23b7b85f24SRobert Watson * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24b7b85f24SRobert Watson * SUCH DAMAGE.
25b7b85f24SRobert Watson */
26b7b85f24SRobert Watson
27b7b85f24SRobert Watson #include <sys/types.h>
28b7b85f24SRobert Watson #include <sys/socket.h>
29b7b85f24SRobert Watson
30b7b85f24SRobert Watson #include <netinet/in.h>
31b7b85f24SRobert Watson
32b7b85f24SRobert Watson #include <arpa/inet.h>
33b7b85f24SRobert Watson
34b7b85f24SRobert Watson #include <err.h>
35b7b85f24SRobert Watson #include <errno.h>
36b7b85f24SRobert Watson #include <fcntl.h>
37b7b85f24SRobert Watson #include <stdio.h>
38b7b85f24SRobert Watson #include <string.h>
39b7b85f24SRobert Watson #include <unistd.h>
40b7b85f24SRobert Watson
41b7b85f24SRobert Watson /*
42b7b85f24SRobert Watson * Regression test for multicast sockets and options:
43b7b85f24SRobert Watson *
44b7b85f24SRobert Watson * - Check the defaults for ttl, if, and loopback. Make sure they can be set
45b7b85f24SRobert Watson * and then read.
46b7b85f24SRobert Watson *
47b7b85f24SRobert Watson * - Check that adding and removing multicast addresses seems to work.
48b7b85f24SRobert Watson *
49b7b85f24SRobert Watson * - Send a test message over loop back multicast and make sure it arrives.
50b7b85f24SRobert Watson *
51b7b85f24SRobert Watson * NB:
52b7b85f24SRobert Watson *
53b7b85f24SRobert Watson * Would be nice to use BPF or if_tap to actually check packet contents and
54b7b85f24SRobert Watson * layout, make sure that the ttl is set right, etc.
55b7b85f24SRobert Watson *
56b7b85f24SRobert Watson * Would be nice if attempts to use multicast options on TCP sockets returned
57b7b85f24SRobert Watson * an error, as the docs suggest it might.
58b7b85f24SRobert Watson */
59b7b85f24SRobert Watson
60b7b85f24SRobert Watson #ifdef WARN_TCP
61b7b85f24SRobert Watson #define WARN_SUCCESS 0x00000001 /* Set for TCP to warn on success. */
62b7b85f24SRobert Watson #else
63b7b85f24SRobert Watson #define WARN_SUCCESS 0x00000000
64b7b85f24SRobert Watson #endif
65b7b85f24SRobert Watson
66b7b85f24SRobert Watson /*
67b7b85f24SRobert Watson * Multicast test address, picked arbitrarily. Will be used with the
68b7b85f24SRobert Watson * loopback interface.
69b7b85f24SRobert Watson */
70b7b85f24SRobert Watson #define TEST_MADDR "224.100.100.100"
71b7b85f24SRobert Watson
72b7b85f24SRobert Watson /*
73b7b85f24SRobert Watson * Test that a given IP socket option (optname) has a default value of
74b7b85f24SRobert Watson * 'defaultv', that we can set it to 'modifiedv', and use 'fakev' as a dummy
75b7b85f24SRobert Watson * value that shouldn't be returned at any point during the tests. Perform
76b7b85f24SRobert Watson * the tests on the raw socket, tcp socket, and upd socket passed.
77b7b85f24SRobert Watson * 'optstring' is used in printing warnings and errors as needed.
78b7b85f24SRobert Watson */
79b7b85f24SRobert Watson static void
test_u_char(int optname,const char * optstring,u_char defaultv,u_char modifiedv,u_char fakev,const char * socktype,int sock,int flags)80b7b85f24SRobert Watson test_u_char(int optname, const char *optstring, u_char defaultv,
81b7b85f24SRobert Watson u_char modifiedv, u_char fakev, const char *socktype, int sock,
82b7b85f24SRobert Watson int flags)
83b7b85f24SRobert Watson {
84b7b85f24SRobert Watson socklen_t socklen;
85b7b85f24SRobert Watson u_char uc;
86b7b85f24SRobert Watson int ret;
87b7b85f24SRobert Watson
88b7b85f24SRobert Watson /*
89b7b85f24SRobert Watson * Check that we read back the expected default.
90b7b85f24SRobert Watson */
91b7b85f24SRobert Watson uc = fakev;
92b7b85f24SRobert Watson socklen = sizeof(uc);
93b7b85f24SRobert Watson
94b7b85f24SRobert Watson ret = getsockopt(sock, IPPROTO_IP, optname, &uc, &socklen);
95b7b85f24SRobert Watson if (ret < 0)
96b7b85f24SRobert Watson err(-1, "FAIL: getsockopt(%s, IPPROTO_IP, %s)",
97b7b85f24SRobert Watson socktype, optstring);
98b7b85f24SRobert Watson if (ret == 0 && (flags & WARN_SUCCESS))
99b7b85f24SRobert Watson warnx("WARN: getsockopt(%s, IPPROTO_IP, %s) returned 0",
100b7b85f24SRobert Watson socktype, optstring);
101b7b85f24SRobert Watson if (uc != defaultv)
102b7b85f24SRobert Watson errx(-1, "FAIL: getsockopt(%s, IPPROTO_IP, %s) default is "
103b7b85f24SRobert Watson "%d not %d", socktype, optstring, uc, defaultv);
104b7b85f24SRobert Watson
105b7b85f24SRobert Watson /*
106b7b85f24SRobert Watson * Set to a modifiedv value, read it back and make sure it got there.
107b7b85f24SRobert Watson */
108b7b85f24SRobert Watson uc = modifiedv;
109b7b85f24SRobert Watson ret = setsockopt(sock, IPPROTO_IP, optname, &uc, sizeof(uc));
110b7b85f24SRobert Watson if (ret == -1)
111b7b85f24SRobert Watson err(-1, "FAIL: setsockopt(%s, IPPROTO_IP, %s)",
112b7b85f24SRobert Watson socktype, optstring);
113b7b85f24SRobert Watson if (ret == 0 && (flags & WARN_SUCCESS))
114b7b85f24SRobert Watson warnx("WARN: setsockopt(%s, IPPROTO_IP, %s) returned 0",
115b7b85f24SRobert Watson socktype, optstring);
116b7b85f24SRobert Watson
117b7b85f24SRobert Watson uc = fakev;
118b7b85f24SRobert Watson socklen = sizeof(uc);
119b7b85f24SRobert Watson ret = getsockopt(sock, IPPROTO_IP, optname, &uc, &socklen);
120b7b85f24SRobert Watson if (ret < 0)
121b7b85f24SRobert Watson err(-1, "FAIL: getsockopt(%s, IPPROTO_IP, %s)",
122b7b85f24SRobert Watson socktype, optstring);
123b7b85f24SRobert Watson if (ret == 0 && (flags & WARN_SUCCESS))
124b7b85f24SRobert Watson warnx("WARN: getsockopt(%s, IPPROTO_IP, %s) returned 0",
125b7b85f24SRobert Watson socktype, optstring);
126b7b85f24SRobert Watson if (uc != modifiedv)
127b7b85f24SRobert Watson errx(-1, "FAIL: getsockopt(%s, IPPROTO_IP, %s) set value is "
128b7b85f24SRobert Watson "%d not %d", socktype, optstring, uc, modifiedv);
129b7b85f24SRobert Watson }
130b7b85f24SRobert Watson
131b7b85f24SRobert Watson /*
132b7b85f24SRobert Watson * test_in_addr() is like test_u_char(), only it runs on a struct in_addr
133b7b85f24SRobert Watson * (surprise).
134b7b85f24SRobert Watson */
135b7b85f24SRobert Watson static void
test_in_addr(int optname,const char * optstring,struct in_addr defaultv,struct in_addr modifiedv,struct in_addr fakev,const char * socktype,int sock,int flags)136b7b85f24SRobert Watson test_in_addr(int optname, const char *optstring, struct in_addr defaultv,
137b7b85f24SRobert Watson struct in_addr modifiedv, struct in_addr fakev, const char *socktype,
138b7b85f24SRobert Watson int sock, int flags)
139b7b85f24SRobert Watson {
140b7b85f24SRobert Watson socklen_t socklen;
141b7b85f24SRobert Watson struct in_addr ia;
142b7b85f24SRobert Watson int ret;
143b7b85f24SRobert Watson
144b7b85f24SRobert Watson /*
145b7b85f24SRobert Watson * Check that we read back the expected default.
146b7b85f24SRobert Watson */
147b7b85f24SRobert Watson ia = fakev;
148b7b85f24SRobert Watson socklen = sizeof(ia);
149b7b85f24SRobert Watson
150b7b85f24SRobert Watson ret = getsockopt(sock, IPPROTO_IP, optname, &ia, &socklen);
151b7b85f24SRobert Watson if (ret < 0)
152b7b85f24SRobert Watson err(-1, "FAIL: getsockopt(%s, IPPROTO_IP, %s)",
153b7b85f24SRobert Watson socktype, optstring);
154b7b85f24SRobert Watson if (ret == 0 && (flags & WARN_SUCCESS))
155b7b85f24SRobert Watson warnx("WARN: getsockopt(%s, IPPROTO_IP, %s) returned 0",
156b7b85f24SRobert Watson socktype, optstring);
157b7b85f24SRobert Watson if (memcmp(&ia, &defaultv, sizeof(struct in_addr)))
158b7b85f24SRobert Watson errx(-1, "FAIL: getsockopt(%s, IPPROTO_IP, %s) default is "
159b7b85f24SRobert Watson "%s not %s", socktype, optstring, inet_ntoa(ia),
160b7b85f24SRobert Watson inet_ntoa(defaultv));
161b7b85f24SRobert Watson
162b7b85f24SRobert Watson /*
163b7b85f24SRobert Watson * Set to a modifiedv value, read it back and make sure it got there.
164b7b85f24SRobert Watson */
165b7b85f24SRobert Watson ia = modifiedv;
166b7b85f24SRobert Watson ret = setsockopt(sock, IPPROTO_IP, optname, &ia, sizeof(ia));
167b7b85f24SRobert Watson if (ret == -1)
168b7b85f24SRobert Watson err(-1, "FAIL: setsockopt(%s, IPPROTO_IP, %s)",
169b7b85f24SRobert Watson socktype, optstring);
170b7b85f24SRobert Watson if (ret == 0 && (flags & WARN_SUCCESS))
171b7b85f24SRobert Watson warnx("WARN: setsockopt(%s, IPPROTO_IP, %s) returned 0",
172b7b85f24SRobert Watson socktype, optstring);
173b7b85f24SRobert Watson
174b7b85f24SRobert Watson ia = fakev;
175b7b85f24SRobert Watson socklen = sizeof(ia);
176b7b85f24SRobert Watson ret = getsockopt(sock, IPPROTO_IP, optname, &ia, &socklen);
177b7b85f24SRobert Watson if (ret < 0)
178b7b85f24SRobert Watson err(-1, "FAIL: getsockopt(%s, IPPROTO_IP, %s)",
179b7b85f24SRobert Watson socktype, optstring);
180b7b85f24SRobert Watson if (ret == 0 && (flags & WARN_SUCCESS))
181b7b85f24SRobert Watson warnx("WARN: getsockopt(%s, IPPROTO_IP, %s) returned 0",
182b7b85f24SRobert Watson socktype, optstring);
183b7b85f24SRobert Watson if (memcmp(&ia, &modifiedv, sizeof(struct in_addr)))
184b7b85f24SRobert Watson errx(-1, "FAIL: getsockopt(%s, IPPROTO_IP, %s) set value is "
185b7b85f24SRobert Watson "%s not %s", socktype, optstring, inet_ntoa(ia),
186b7b85f24SRobert Watson inet_ntoa(modifiedv));
187b7b85f24SRobert Watson }
188b7b85f24SRobert Watson
189b7b85f24SRobert Watson static void
test_ttl(int raw_sock,int tcp_sock,int udp_sock)190b7b85f24SRobert Watson test_ttl(int raw_sock, int tcp_sock, int udp_sock)
191b7b85f24SRobert Watson {
192b7b85f24SRobert Watson
193b7b85f24SRobert Watson test_u_char(IP_MULTICAST_TTL, "IP_MULTICAST_TTL", 1, 2, 243,
194b7b85f24SRobert Watson "raw_sock", raw_sock, 0);
195b7b85f24SRobert Watson test_u_char(IP_MULTICAST_TTL, "IP_MULTICAST_TTL", 1, 2, 243,
196b7b85f24SRobert Watson "tcp_sock", tcp_sock, WARN_SUCCESS);
197b7b85f24SRobert Watson test_u_char(IP_MULTICAST_TTL, "IP_MULTICAST_TTL", 1, 2, 243,
198b7b85f24SRobert Watson "udp_sock", udp_sock, 0);
199b7b85f24SRobert Watson }
200b7b85f24SRobert Watson
201b7b85f24SRobert Watson static void
test_loop(int raw_sock,int tcp_sock,int udp_sock)202b7b85f24SRobert Watson test_loop(int raw_sock, int tcp_sock, int udp_sock)
203b7b85f24SRobert Watson {
204b7b85f24SRobert Watson
205b7b85f24SRobert Watson test_u_char(IP_MULTICAST_LOOP, "IP_MULTICAST_LOOP", 1, 0, 243,
206b7b85f24SRobert Watson "raw_sock", raw_sock, 0);
207b7b85f24SRobert Watson test_u_char(IP_MULTICAST_LOOP, "IP_MULTICAST_LOOP", 1, 0, 243,
208b7b85f24SRobert Watson "tcp_sock", tcp_sock, WARN_SUCCESS);
209b7b85f24SRobert Watson test_u_char(IP_MULTICAST_LOOP, "IP_MULTICAST_LOOP", 1, 0, 243,
210b7b85f24SRobert Watson "udp_sock", udp_sock, 0);
211b7b85f24SRobert Watson }
212b7b85f24SRobert Watson
213b7b85f24SRobert Watson static void
test_if(int raw_sock,int tcp_sock,int udp_sock)214b7b85f24SRobert Watson test_if(int raw_sock, int tcp_sock, int udp_sock)
215b7b85f24SRobert Watson {
216b7b85f24SRobert Watson struct in_addr defaultv, modifiedv, fakev;
217b7b85f24SRobert Watson
218b7b85f24SRobert Watson defaultv.s_addr = inet_addr("0.0.0.0");
219b7b85f24SRobert Watson
220b7b85f24SRobert Watson /* Should be valid on all hosts. */
221b7b85f24SRobert Watson modifiedv.s_addr = inet_addr("127.0.0.1");
222b7b85f24SRobert Watson
223b7b85f24SRobert Watson /* Should not happen. */
224b7b85f24SRobert Watson fakev.s_addr = inet_addr("255.255.255.255");
225b7b85f24SRobert Watson
226b7b85f24SRobert Watson test_in_addr(IP_MULTICAST_IF, "IP_MULTICAST_IF", defaultv, modifiedv,
227b7b85f24SRobert Watson fakev, "raw_sock", raw_sock, 0);
228b7b85f24SRobert Watson test_in_addr(IP_MULTICAST_IF, "IP_MULTICAST_IF", defaultv, modifiedv,
229b7b85f24SRobert Watson fakev, "tcp_sock", tcp_sock, WARN_SUCCESS);
230b7b85f24SRobert Watson test_in_addr(IP_MULTICAST_IF, "IP_MULTICAST_IF", defaultv, modifiedv,
231b7b85f24SRobert Watson fakev, "udp_sock", udp_sock, 0);
232b7b85f24SRobert Watson }
233b7b85f24SRobert Watson
234b7b85f24SRobert Watson /*
235b7b85f24SRobert Watson * Add a multicast address to an interface. Warn if appropriate. No query
236b7b85f24SRobert Watson * interface so can't check if it's there directly; instead we have to try
237b7b85f24SRobert Watson * to add it a second time and make sure we get back EADDRINUSE.
238b7b85f24SRobert Watson */
239b7b85f24SRobert Watson static void
test_add_multi(int sock,const char * socktype,struct ip_mreq imr,int flags)240b7b85f24SRobert Watson test_add_multi(int sock, const char *socktype, struct ip_mreq imr,
241b7b85f24SRobert Watson int flags)
242b7b85f24SRobert Watson {
243b7b85f24SRobert Watson char buf[128];
244b7b85f24SRobert Watson int ret;
245b7b85f24SRobert Watson
246b7b85f24SRobert Watson ret = setsockopt(sock, IPPROTO_IP, IP_ADD_MEMBERSHIP, &imr,
247b7b85f24SRobert Watson sizeof(imr));
248b7b85f24SRobert Watson if (ret < 0) {
249b7b85f24SRobert Watson strlcpy(buf, inet_ntoa(imr.imr_multiaddr), 128);
250b7b85f24SRobert Watson err(-1, "FAIL: setsockopt(%s, IPPROTO_IP, IP_ADD_MEMBERSHIP "
251b7b85f24SRobert Watson "%s, %s)", socktype, buf, inet_ntoa(imr.imr_interface));
252b7b85f24SRobert Watson }
253b7b85f24SRobert Watson if (ret == 0 && (flags & WARN_SUCCESS)) {
254b7b85f24SRobert Watson strlcpy(buf, inet_ntoa(imr.imr_multiaddr), 128);
255b7b85f24SRobert Watson warnx("WARN: setsockopt(%s, IPPROTO_IP, IP_ADD_MEMBERSHIP "
256b7b85f24SRobert Watson "%s, %s) returned 0", socktype, buf,
257b7b85f24SRobert Watson inet_ntoa(imr.imr_interface));
258b7b85f24SRobert Watson }
259b7b85f24SRobert Watson
260b7b85f24SRobert Watson /* Try to add a second time to make sure it got there. */
261b7b85f24SRobert Watson ret = setsockopt(sock, IPPROTO_IP, IP_ADD_MEMBERSHIP, &imr,
262b7b85f24SRobert Watson sizeof(imr));
263b7b85f24SRobert Watson if (ret == 0) {
264b7b85f24SRobert Watson strlcpy(buf, inet_ntoa(imr.imr_multiaddr), 128);
265b7b85f24SRobert Watson err(-1, "FAIL: setsockopt(%s, IPPROTO_IP, IP_ADD_MEMBERSHIP "
266b7b85f24SRobert Watson "%s, %s) dup returned 0", socktype, buf,
267b7b85f24SRobert Watson inet_ntoa(imr.imr_interface));
268b7b85f24SRobert Watson }
269b7b85f24SRobert Watson if (ret < 0 && errno != EADDRINUSE) {
270b7b85f24SRobert Watson strlcpy(buf, inet_ntoa(imr.imr_multiaddr), 128);
271b7b85f24SRobert Watson err(-1, "FAIL: setsockopt(%s, IPPROTO_IP, IP_ADD_MEMBERSHIP "
272b7b85f24SRobert Watson "%s, %s)", socktype, buf, inet_ntoa(imr.imr_interface));
273b7b85f24SRobert Watson }
274b7b85f24SRobert Watson }
275b7b85f24SRobert Watson
276b7b85f24SRobert Watson /*
277b7b85f24SRobert Watson * Drop a multicast address from an interface. Warn if appropriate. No
278b7b85f24SRobert Watson * query interface so can't check if it's gone directly; instead we have to
279b7b85f24SRobert Watson * try to drop it a second time and make sure we get back EADDRNOTAVAIL.
280b7b85f24SRobert Watson */
281b7b85f24SRobert Watson static void
test_drop_multi(int sock,const char * socktype,struct ip_mreq imr,int flags)282b7b85f24SRobert Watson test_drop_multi(int sock, const char *socktype, struct ip_mreq imr,
283b7b85f24SRobert Watson int flags)
284b7b85f24SRobert Watson {
285b7b85f24SRobert Watson char buf[128];
286b7b85f24SRobert Watson int ret;
287b7b85f24SRobert Watson
288b7b85f24SRobert Watson ret = setsockopt(sock, IPPROTO_IP, IP_DROP_MEMBERSHIP, &imr,
289b7b85f24SRobert Watson sizeof(imr));
290b7b85f24SRobert Watson if (ret < 0) {
291b7b85f24SRobert Watson strlcpy(buf, inet_ntoa(imr.imr_multiaddr), 128);
292b7b85f24SRobert Watson err(-1, "FAIL: setsockopt(%s, IPPROTO_IP, IP_DROP_MEMBERSHIP "
293b7b85f24SRobert Watson "%s, %s)", socktype, buf, inet_ntoa(imr.imr_interface));
294b7b85f24SRobert Watson }
295b7b85f24SRobert Watson if (ret == 0 && (flags & WARN_SUCCESS)) {
296b7b85f24SRobert Watson strlcpy(buf, inet_ntoa(imr.imr_multiaddr), 128);
297b7b85f24SRobert Watson warnx("WARN: setsockopt(%s, IPPROTO_IP, IP_DROP_MEMBERSHIP "
298b7b85f24SRobert Watson "%s, %s) returned 0", socktype, buf,
299b7b85f24SRobert Watson inet_ntoa(imr.imr_interface));
300b7b85f24SRobert Watson }
301b7b85f24SRobert Watson
302b7b85f24SRobert Watson /* Try a second time to make sure it's gone. */
303b7b85f24SRobert Watson ret = setsockopt(sock, IPPROTO_IP, IP_DROP_MEMBERSHIP, &imr,
304b7b85f24SRobert Watson sizeof(imr));
305b7b85f24SRobert Watson if (ret == 0) {
306b7b85f24SRobert Watson strlcpy(buf, inet_ntoa(imr.imr_multiaddr), 128);
307b7b85f24SRobert Watson err(-1, "FAIL: setsockopt(%s, IPPROTO_IP, IP_DROP_MEMBERSHIP "
308b7b85f24SRobert Watson "%s, %s) returned 0", socktype, buf,
309b7b85f24SRobert Watson inet_ntoa(imr.imr_interface));
310b7b85f24SRobert Watson }
311b7b85f24SRobert Watson if (ret < 0 && errno != EADDRNOTAVAIL) {
312b7b85f24SRobert Watson strlcpy(buf, inet_ntoa(imr.imr_multiaddr), 128);
313b7b85f24SRobert Watson err(-1, "FAIL: setsockopt(%s, IPPROTO_IP, IP_DROP_MEMBERSHIP "
314b7b85f24SRobert Watson "%s, %s)", socktype, buf, inet_ntoa(imr.imr_interface));
315b7b85f24SRobert Watson }
316b7b85f24SRobert Watson }
317b7b85f24SRobert Watson
318b7b85f24SRobert Watson /*
319b7b85f24SRobert Watson * Should really also test trying to add an invalid address, delete one
320b7b85f24SRobert Watson * that's not there, etc.
321b7b85f24SRobert Watson */
322b7b85f24SRobert Watson static void
test_addr(int raw_sock,int tcp_sock,int udp_sock)323b7b85f24SRobert Watson test_addr(int raw_sock, int tcp_sock, int udp_sock)
324b7b85f24SRobert Watson {
325b7b85f24SRobert Watson struct ip_mreq imr;
326b7b85f24SRobert Watson
327b7b85f24SRobert Watson /* Arbitrary. */
328b7b85f24SRobert Watson imr.imr_multiaddr.s_addr = inet_addr(TEST_MADDR);
329b7b85f24SRobert Watson
330b7b85f24SRobert Watson /* Localhost should be OK. */
331b7b85f24SRobert Watson imr.imr_interface.s_addr = inet_addr("127.0.0.1");
332b7b85f24SRobert Watson
333b7b85f24SRobert Watson test_add_multi(raw_sock, "raw_sock", imr, 0);
334b7b85f24SRobert Watson test_drop_multi(raw_sock, "raw_sock", imr, 0);
335b7b85f24SRobert Watson
336b7b85f24SRobert Watson test_add_multi(tcp_sock, "raw_sock", imr, WARN_SUCCESS);
337b7b85f24SRobert Watson test_drop_multi(tcp_sock, "raw_sock", imr, WARN_SUCCESS);
338b7b85f24SRobert Watson
339b7b85f24SRobert Watson test_add_multi(udp_sock, "raw_sock", imr, 0);
340b7b85f24SRobert Watson test_drop_multi(udp_sock, "raw_sock", imr, 0);
341b7b85f24SRobert Watson }
342b7b85f24SRobert Watson
343b7b85f24SRobert Watson /*
344b7b85f24SRobert Watson * Test an actual simple UDP message - send a single byte to an address we're
345b7b85f24SRobert Watson * subscribed to, and hope to get it back. We create a new UDP socket for
346b7b85f24SRobert Watson * this purpose because we will need to bind it.
347b7b85f24SRobert Watson */
348b7b85f24SRobert Watson #define UDP_PORT 5012
349b7b85f24SRobert Watson static void
test_udp(void)350b7b85f24SRobert Watson test_udp(void)
351b7b85f24SRobert Watson {
352b7b85f24SRobert Watson struct sockaddr_in sin;
353b7b85f24SRobert Watson struct ip_mreq imr;
354b7b85f24SRobert Watson struct in_addr if_addr;
355b7b85f24SRobert Watson char message;
356b7b85f24SRobert Watson ssize_t len;
357b7b85f24SRobert Watson int sock;
358b7b85f24SRobert Watson
359b7b85f24SRobert Watson sock = socket(PF_INET, SOCK_DGRAM, 0);
360b7b85f24SRobert Watson if (sock < 0)
361b7b85f24SRobert Watson err(-1, "FAIL: test_udp: socket(PF_INET, SOCK_DGRAM)");
362b7b85f24SRobert Watson
363b7b85f24SRobert Watson if (fcntl(sock, F_SETFL, O_NONBLOCK) < 0)
364b7b85f24SRobert Watson err(-1, "FAIL: test_udp: fcntl(F_SETFL, O_NONBLOCK)");
365b7b85f24SRobert Watson
366b7b85f24SRobert Watson bzero(&sin, sizeof(sin));
367b7b85f24SRobert Watson sin.sin_len = sizeof(sin);
368b7b85f24SRobert Watson sin.sin_family = AF_INET;
369b7b85f24SRobert Watson sin.sin_port = htons(UDP_PORT);
370b7b85f24SRobert Watson sin.sin_addr.s_addr = inet_addr(TEST_MADDR);
371b7b85f24SRobert Watson
372b7b85f24SRobert Watson if (bind(sock, (struct sockaddr *)&sin, sizeof(sin)) < 0)
373b7b85f24SRobert Watson err(-1, "FAIL: test_udp: bind(udp_sock, 127.0.0.1:%d",
374b7b85f24SRobert Watson UDP_PORT);
375b7b85f24SRobert Watson
376b7b85f24SRobert Watson /* Arbitrary. */
377b7b85f24SRobert Watson imr.imr_multiaddr.s_addr = inet_addr(TEST_MADDR);
378b7b85f24SRobert Watson
379b7b85f24SRobert Watson /* Localhost should be OK. */
380b7b85f24SRobert Watson imr.imr_interface.s_addr = inet_addr("127.0.0.1");
381b7b85f24SRobert Watson
382b7b85f24SRobert Watson /*
383b7b85f24SRobert Watson * Tell socket what interface to send on -- use localhost.
384b7b85f24SRobert Watson */
385b7b85f24SRobert Watson if_addr.s_addr = inet_addr("127.0.0.1");
386b7b85f24SRobert Watson if (setsockopt(sock, IPPROTO_IP, IP_MULTICAST_IF, &if_addr,
387b7b85f24SRobert Watson sizeof(if_addr)) < 0)
388b7b85f24SRobert Watson err(-1, "test_udp: setsockopt(IPPROTO_IP, IP_MULTICAST_IF)");
389b7b85f24SRobert Watson
390b7b85f24SRobert Watson test_add_multi(sock, "udp_sock", imr, 0);
391b7b85f24SRobert Watson
392b7b85f24SRobert Watson bzero(&sin, sizeof(sin));
393b7b85f24SRobert Watson sin.sin_len = sizeof(sin);
394b7b85f24SRobert Watson sin.sin_family = AF_INET;
395b7b85f24SRobert Watson sin.sin_port = htons(UDP_PORT);
396b7b85f24SRobert Watson sin.sin_addr.s_addr = inet_addr(TEST_MADDR);
397b7b85f24SRobert Watson
398b7b85f24SRobert Watson message = 'A';
399b7b85f24SRobert Watson len = sizeof(message);
400b7b85f24SRobert Watson len = sendto(sock, &message, len, 0, (struct sockaddr *)&sin,
401b7b85f24SRobert Watson sizeof(sin));
402b7b85f24SRobert Watson if (len < 0)
403b7b85f24SRobert Watson err(-1, "test_udp: sendto");
404b7b85f24SRobert Watson
405b7b85f24SRobert Watson if (len != sizeof(message))
406b7b85f24SRobert Watson errx(-1, "test_udp: sendto: expected to send %d, instead %d",
407b7b85f24SRobert Watson sizeof(message), len);
408b7b85f24SRobert Watson
409b7b85f24SRobert Watson message = 'B';
410b7b85f24SRobert Watson len = sizeof(sin);
411b7b85f24SRobert Watson len = recvfrom(sock, &message, sizeof(message), 0,
412b7b85f24SRobert Watson (struct sockaddr *)&sin, &len);
413b7b85f24SRobert Watson if (len < 0)
414b7b85f24SRobert Watson err(-1, "test_udp: recvfrom");
415b7b85f24SRobert Watson
416b7b85f24SRobert Watson if (len != sizeof(message))
417b7b85f24SRobert Watson errx(-1, "test_udp: recvfrom: len %d != message len %d",
418b7b85f24SRobert Watson len, sizeof(message));
419b7b85f24SRobert Watson
420b7b85f24SRobert Watson if (message != 'A')
421b7b85f24SRobert Watson errx(-1, "test_udp: recvfrom: expected 'A', got '%c'",
422b7b85f24SRobert Watson message);
423b7b85f24SRobert Watson
424b7b85f24SRobert Watson test_drop_multi(sock, "udp_sock", imr, 0);
425b7b85f24SRobert Watson
426b7b85f24SRobert Watson close(sock);
427b7b85f24SRobert Watson }
428b7b85f24SRobert Watson #undef UDP_PORT
429b7b85f24SRobert Watson
430b7b85f24SRobert Watson int
main(int argc,char * argv[])431b7b85f24SRobert Watson main(int argc, char *argv[])
432b7b85f24SRobert Watson {
433b7b85f24SRobert Watson int raw_sock, tcp_sock, udp_sock;
434b7b85f24SRobert Watson
435b7b85f24SRobert Watson if (geteuid() != 0)
436b7b85f24SRobert Watson errx(-1, "FAIL: root privilege required");
437b7b85f24SRobert Watson
438b7b85f24SRobert Watson raw_sock = socket(PF_INET, SOCK_RAW, 0);
439b7b85f24SRobert Watson if (raw_sock == -1)
440b7b85f24SRobert Watson err(-1, "FAIL: socket(PF_INET, SOCK_RAW)");
441b7b85f24SRobert Watson
442b7b85f24SRobert Watson tcp_sock = socket(PF_INET, SOCK_STREAM, 0);
443b7b85f24SRobert Watson if (raw_sock == -1)
444b7b85f24SRobert Watson err(-1, "FAIL: socket(PF_INET, SOCK_STREAM)");
445b7b85f24SRobert Watson
446b7b85f24SRobert Watson udp_sock = socket(PF_INET, SOCK_DGRAM, 0);
447b7b85f24SRobert Watson if (raw_sock == -1)
448b7b85f24SRobert Watson err(-1, "FAIL: socket(PF_INET, SOCK_DGRAM)");
449b7b85f24SRobert Watson
450b7b85f24SRobert Watson test_ttl(raw_sock, tcp_sock, udp_sock);
451b7b85f24SRobert Watson test_loop(raw_sock, tcp_sock, udp_sock);
452b7b85f24SRobert Watson test_if(raw_sock, tcp_sock, udp_sock);
453b7b85f24SRobert Watson test_addr(raw_sock, tcp_sock, udp_sock);
454b7b85f24SRobert Watson
455b7b85f24SRobert Watson close(udp_sock);
456b7b85f24SRobert Watson close(tcp_sock);
457b7b85f24SRobert Watson close(raw_sock);
458b7b85f24SRobert Watson
459b7b85f24SRobert Watson test_udp();
460b7b85f24SRobert Watson
461b7b85f24SRobert Watson return (0);
462b7b85f24SRobert Watson }
463