[PATCH 1/4] ws2_32/tests: Add tests for IPv4 control messages

Zebediah Figura zfigura at codeweavers.com
Mon Sep 27 12:11:48 CDT 2021


On 9/27/21 9:40 AM, Alex Henrie wrote:
> IP_PKTINFO already had tests, but it doesn't hurt to add a few more.
> IP_RECVTTL and IP_RECVTCLASS didn't have any tests.
> 
> Signed-off-by: Alex Henrie <alexhenrie24 at gmail.com>
> ---
>   dlls/ws2_32/tests/sock.c | 120 +++++++++++++++++++++++++++++++++++++++
>   1 file changed, 120 insertions(+)
> 
> diff --git a/dlls/ws2_32/tests/sock.c b/dlls/ws2_32/tests/sock.c
> index 8cbb393b542..4105ce624b2 100644
> --- a/dlls/ws2_32/tests/sock.c
> +++ b/dlls/ws2_32/tests/sock.c
> @@ -1984,6 +1984,125 @@ static void test_ip_pktinfo(void)
>       CloseHandle(ov.hEvent);
>   }
>   
> +static void test_ipv4_cmsg(void)
> +{
> +    static const DWORD off = 0;
> +    static const DWORD on = 1;
> +    SOCKADDR_IN localhost = {0};
> +    SOCKET client, server;
> +    char payload[] = "HELLO";
> +    char control[100];
> +    WSABUF payload_buf = {sizeof(payload), payload};
> +    WSAMSG msg = {NULL, 0, &payload_buf, 1, {sizeof(control), control}, 0};
> +    WSACMSGHDR *header = (WSACMSGHDR *)control;
> +    LPFN_WSARECVMSG pWSARecvMsg;
> +    INT *int_data = (INT *)WSA_CMSG_DATA(header);
> +    IN_PKTINFO *pkt_info = (IN_PKTINFO *)WSA_CMSG_DATA(header);
> +    DWORD count, state;
> +    int rc;
> +
> +    localhost.sin_family = AF_INET;
> +    localhost.sin_port = htons(SERVERPORT);
> +    inet_pton(AF_INET, "127.0.0.1", &localhost.sin_addr);
> +
> +    client = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
> +    ok(client != INVALID_SOCKET, "failed to create socket, error %u\n", WSAGetLastError());
> +    server = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
> +    ok(server != INVALID_SOCKET, "failed to create socket, error %u\n", WSAGetLastError());
> +
> +    rc = bind(server, (SOCKADDR *)&localhost, sizeof(localhost));
> +    ok(rc != SOCKET_ERROR, "bind failed, error %u\n", WSAGetLastError());
> +    rc = connect(client, (SOCKADDR *)&localhost, sizeof(localhost));
> +    ok(rc != SOCKET_ERROR, "connect failed, error %u\n", WSAGetLastError());
> +
> +    rc = WSAIoctl(server, SIO_GET_EXTENSION_FUNCTION_POINTER, &WSARecvMsg_GUID, sizeof(WSARecvMsg_GUID),
> +                  &pWSARecvMsg, sizeof(pWSARecvMsg), &count, NULL, NULL);
> +    ok(!rc, "failed to get WSARecvMsg, error %u\n", WSAGetLastError());
> +
> +    memset(control, 0, sizeof(control));
> +    msg.Control.len = sizeof(control);
> +    rc = setsockopt(server, IPPROTO_IP, IP_RECVTTL, (const char *)&on, sizeof(on));
> +todo_wine
> +    ok(!rc, "failed to set IP_RECVTTL, error %u\n", WSAGetLastError());
> +    state = 0;
> +    count = sizeof(state);
> +    rc = getsockopt(server, IPPROTO_IP, IP_RECVTTL, (char *)&state, (INT *)&count);
> +todo_wine
> +    ok(!rc, "failed to get IP_RECVTTL, error %u\n", WSAGetLastError());
> +todo_wine
> +    ok(state == 1, "expected 1, got %u\n", state);
> +    rc = send(client, payload, sizeof(payload), 0);
> +    ok(rc == sizeof(payload), "send failed, error %u\n", WSAGetLastError());
> +    rc = pWSARecvMsg(server, &msg, &count, NULL, NULL);
> +    ok(!rc, "WSARecvMsg failed, error %u\n", WSAGetLastError());
> +    ok(count == sizeof(payload), "expected length %i, got %i\n", (INT)sizeof(payload), count);
> +    ok(header->cmsg_level == IPPROTO_IP, "expected IPPROTO_IP, got %i\n", header->cmsg_level);
> +todo_wine
> +    ok(header->cmsg_type == IP_TTL || broken(header->cmsg_type == IP_HOPLIMIT) /* win8 */,
> +       "expected IP_TTL, got %i\n", header->cmsg_type);

Actually, every version up to and including win10 v1607 returns 
IP_HOPLIMIT here. I'm also not sure I see a reason to mark it broken; it 
certainly can't be called incorrect.

> +todo_wine
> +    ok(header->cmsg_len == sizeof(*header) + sizeof(INT),
> +       "expected length %i, got %i\n", (INT)(sizeof(*header) + sizeof(INT)), (INT)header->cmsg_len);
> +todo_wine
> +    ok(*int_data >= 32, "expected at least 32, got %i\n", *int_data);
> +    setsockopt(server, IPPROTO_IP, IP_RECVTTL, (const char *)&off, sizeof(off));
> +    ok(!rc, "failed to clear IP_RECVTTL, error %u\n", WSAGetLastError());
> +
> +    memset(control, 0, sizeof(control));
> +    msg.Control.len = sizeof(control);
> +    rc = setsockopt(server, IPPROTO_IP, IP_PKTINFO, (const char *)&on, sizeof(on));
> +    ok(!rc, "failed to set IP_PKTINFO, error %u\n", WSAGetLastError());
> +    state = 0;
> +    count = sizeof(state);
> +    rc = getsockopt(server, IPPROTO_IP, IP_PKTINFO, (char *)&state, (INT *)&count);
> +    ok(!rc, "failed to get IP_PKTINFO, error %u\n", WSAGetLastError());
> +    ok(state == 1, "expected 1, got %u\n", state);
> +    rc = send(client, payload, sizeof(payload), 0);
> +    ok(rc == sizeof(payload), "send failed, error %u\n", WSAGetLastError());
> +    rc = pWSARecvMsg(server, &msg, &count, NULL, NULL);
> +    ok(!rc, "WSARecvMsg failed, error %u\n", WSAGetLastError());
> +    ok(count == sizeof(payload), "expected length %i, got %i\n", (INT)sizeof(payload), count);
> +    ok(header->cmsg_level == IPPROTO_IP, "expected IPPROTO_IP, got %i\n", header->cmsg_level);
> +    ok(header->cmsg_type == IP_PKTINFO, "expected IP_PKTINFO, got %i\n", header->cmsg_type);
> +    ok(header->cmsg_len == sizeof(*header) + sizeof(IN_PKTINFO),
> +       "expected length %i, got %i\n", (INT)(sizeof(*header) + sizeof(IN_PKTINFO)), (INT)header->cmsg_len);

These can be %zu or %Iu. There are many other instances in this patch. 
There are also many instances of using %i for an unsigned variable.

> +    ok(!memcmp(&pkt_info->ipi_addr, &localhost.sin_addr, sizeof(IN_ADDR)), "expected 127.0.0.1\n");
> +    rc = setsockopt(server, IPPROTO_IP, IP_PKTINFO, (const char *)&off, sizeof(off));
> +    ok(!rc, "failed to clear IP_PKTINFO, error %u\n", WSAGetLastError());
> +
> +    memset(control, 0, sizeof(control));
> +    msg.Control.len = sizeof(control);
> +    rc = setsockopt(server, IPPROTO_IP, IP_RECVTCLASS, (const char *)&on, sizeof(on));
> +todo_wine
> +    ok(!rc, "failed to set IP_RECVTCLASS, error %u\n", WSAGetLastError());
> +    state = 0;
> +    count = sizeof(state);
> +    rc = getsockopt(server, IPPROTO_IP, IP_RECVTCLASS, (char *)&state, (INT *)&count);
> +todo_wine
> +    ok(!rc, "failed to get IP_RECVTCLASS, error %u\n", WSAGetLastError());
> +todo_wine
> +    ok(state == 1, "expected 1, got %u\n", state);
> +    rc = send(client, payload, sizeof(payload), 0);
> +    ok(rc == sizeof(payload), "send failed, error %u\n", WSAGetLastError());
> +    rc = pWSARecvMsg(server, &msg, &count, NULL, NULL);
> +    ok(!rc, "WSARecvMsg failed, error %u\n", WSAGetLastError());
> +    ok(count == sizeof(payload), "expected length %i, got %i\n", (INT)sizeof(payload), count);
> +    ok(header->cmsg_level == IPPROTO_IP, "expected IPPROTO_IP, got %i\n", header->cmsg_level);
> +todo_wine
> +    ok(header->cmsg_type == IP_TOS || broken(header->cmsg_type == IP_TCLASS) /* win8 */,
> +       "expected IP_TOS, got %i\n", header->cmsg_type);

Same here, every version of Windows up to and including v1607 returns 
IP_TCLASS.

> +todo_wine
> +    ok(header->cmsg_len == sizeof(*header) + sizeof(INT),
> +       "expected length %i, got %i\n", (INT)(sizeof(*header) + sizeof(INT)), (INT)header->cmsg_len);
> +    ok(*int_data == 0, "expected 0, got %i\n", *int_data);
> +    rc = setsockopt(server, IPPROTO_IP, IP_RECVTCLASS, (const char *)&off, sizeof(off));
> +todo_wine
> +    ok(!rc, "failed to clear IP_RECVTCLASS, error %u\n", WSAGetLastError());
> +
> +    closesocket(server);
> +    closesocket(client);
> +}
> +
>   static void test_ipv6_cmsg(void)
>   {
>       static const DWORD off = 0;
> @@ -11767,6 +11886,7 @@ START_TEST( sock )
>       test_set_getsockopt();
>       test_so_reuseaddr();
>       test_ip_pktinfo();
> +    test_ipv4_cmsg();
>       test_ipv6_cmsg();
>       test_extendedSocketOptions();
>       test_so_debug();
> 



More information about the wine-devel mailing list