2 * Unit test suite for winsock functions
4 * Copyright 2002 Martin Wilck
5 * Copyright 2005 Thomas Kho
6 * Copyright 2008 Jeff Zaroyko
8 * This library is free software; you can redistribute it and/or
9 * modify it under the terms of the GNU Lesser General Public
10 * License as published by the Free Software Foundation; either
11 * version 2.1 of the License, or (at your option) any later version.
13 * This library is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 * Lesser General Public License for more details.
18 * You should have received a copy of the GNU Lesser General Public
19 * License along with this library; if not, write to the Free Software
20 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
24 #define WIN32_NO_STATUS
31 #include "wine/test.h"
33 #define MAX_CLIENTS 4 /* Max number of clients */
34 #define FIRST_CHAR 'A' /* First character in transferred pattern */
35 #define BIND_SLEEP 10 /* seconds to wait between attempts to bind() */
36 #define BIND_TRIES 6 /* Number of bind() attempts */
37 #define TEST_TIMEOUT 30 /* seconds to wait before killing child threads
38 after server initialization, if something hangs */
40 #define NUM_UDP_PEERS 3 /* Number of UDP sockets to create and test > 1 */
42 #define NUM_THREADS 3 /* Number of threads to run getservbyname */
43 #define NUM_QUERIES 250 /* Number of getservbyname queries per thread */
45 #define SERVERIP "127.0.0.1" /* IP to bind to */
46 #define SERVERPORT 9374 /* Port number to bind to */
48 #define wsa_ok(op, cond, msg) \
52 if ( !(cond tmp) ) err = WSAGetLastError(); \
53 ok ( cond tmp, msg, GetCurrentThreadId(), err); \
56 #define make_keepalive(k, enable, time, interval) \
58 k.keepalivetime = time; \
59 k.keepaliveinterval = interval;
61 /* Function pointers */
62 static void (WINAPI
*pfreeaddrinfo
)(struct addrinfo
*);
63 static int (WINAPI
*pgetaddrinfo
)(LPCSTR
,LPCSTR
,const struct addrinfo
*,struct addrinfo
**);
64 static void (WINAPI
*pFreeAddrInfoW
)(PADDRINFOW
);
65 static int (WINAPI
*pGetAddrInfoW
)(LPCWSTR
,LPCWSTR
,const ADDRINFOW
*,PADDRINFOW
*);
66 static PCSTR (WINAPI
*pInetNtop
)(INT
,LPVOID
,LPSTR
,ULONG
);
68 /**************** Structs and typedefs ***************/
70 typedef struct thread_info
76 /* Information in the server about open client connections */
77 typedef struct sock_info
80 struct sockaddr_in addr
;
81 struct sockaddr_in peer
;
87 /* Test parameters for both server & client */
88 typedef struct test_params
92 const char *inet_addr
;
99 /* server-specific test parameters */
100 typedef struct server_params
102 test_params
*general
;
107 /* client-specific test parameters */
108 typedef struct client_params
110 test_params
*general
;
115 /* This type combines all information for setting up a test scenario */
116 typedef struct test_setup
120 server_params srv_params
;
122 client_params clt_params
;
125 /* Thread local storage for server */
126 typedef struct server_memory
129 struct sockaddr_in addr
;
130 sock_info sock
[MAX_CLIENTS
];
133 /* Thread local storage for client */
134 typedef struct client_memory
137 struct sockaddr_in addr
;
142 /* SelectReadThread thread parameters */
143 typedef struct select_thread_params
147 } select_thread_params
;
149 /**************** Static variables ***************/
151 static DWORD tls
; /* Thread local storage index */
152 static HANDLE thread
[1+MAX_CLIENTS
];
153 static DWORD thread_id
[1+MAX_CLIENTS
];
154 static HANDLE server_ready
;
155 static HANDLE client_ready
[MAX_CLIENTS
];
156 static int client_id
;
158 /**************** General utility functions ***************/
160 static int tcp_socketpair(SOCKET
*src
, SOCKET
*dst
)
162 SOCKET server
= INVALID_SOCKET
;
163 struct sockaddr_in addr
;
167 *src
= INVALID_SOCKET
;
168 *dst
= INVALID_SOCKET
;
170 *src
= socket(AF_INET
, SOCK_STREAM
, 0);
171 if (*src
== INVALID_SOCKET
)
174 server
= socket(AF_INET
, SOCK_STREAM
, 0);
175 if (server
== INVALID_SOCKET
)
178 memset(&addr
, 0, sizeof(addr
));
179 addr
.sin_family
= AF_INET
;
180 addr
.sin_addr
.s_addr
= inet_addr("127.0.0.1");
181 ret
= bind(server
, (struct sockaddr
*)&addr
, sizeof(addr
));
186 ret
= getsockname(server
, (struct sockaddr
*)&addr
, &len
);
190 ret
= listen(server
, 1);
194 ret
= connect(*src
, (struct sockaddr
*)&addr
, sizeof(addr
));
199 *dst
= accept(server
, (struct sockaddr
*)&addr
, &len
);
202 if (server
!= INVALID_SOCKET
)
204 if (*src
!= INVALID_SOCKET
&& *dst
!= INVALID_SOCKET
)
211 static void set_so_opentype ( BOOL overlapped
)
213 int optval
= !overlapped
, newval
, len
= sizeof (int);
215 ok ( setsockopt ( INVALID_SOCKET
, SOL_SOCKET
, SO_OPENTYPE
,
216 (LPVOID
) &optval
, sizeof (optval
) ) == 0,
217 "setting SO_OPENTYPE failed\n" );
218 ok ( getsockopt ( INVALID_SOCKET
, SOL_SOCKET
, SO_OPENTYPE
,
219 (LPVOID
) &newval
, &len
) == 0,
220 "getting SO_OPENTYPE failed\n" );
221 ok ( optval
== newval
, "failed to set SO_OPENTYPE\n" );
224 static int set_blocking ( SOCKET s
, BOOL blocking
)
226 u_long val
= !blocking
;
227 return ioctlsocket ( s
, FIONBIO
, &val
);
230 static void fill_buffer ( char *buf
, int chunk_size
, int n_chunks
)
233 for ( c
= FIRST_CHAR
, p
= buf
; c
< FIRST_CHAR
+ n_chunks
; c
++, p
+= chunk_size
)
234 memset ( p
, c
, chunk_size
);
237 static int test_buffer ( char *buf
, int chunk_size
, int n_chunks
)
241 for ( c
= FIRST_CHAR
, p
= buf
; c
< FIRST_CHAR
+ n_chunks
; c
++, p
+= chunk_size
)
243 for ( i
= 0; i
< chunk_size
; i
++ )
244 if ( p
[i
] != c
) return i
;
250 * This routine is called when a client / server does not expect any more data,
251 * but needs to acknowledge the closing of the connection (by reading 0 bytes).
253 static void read_zero_bytes ( SOCKET s
)
257 while ( ( tmp
= recv ( s
, buf
, 256, 0 ) ) > 0 )
259 ok ( n
<= 0, "garbage data received: %d bytes\n", n
);
262 static int do_oob_send ( SOCKET s
, char *buf
, int buflen
, int sendlen
)
264 char* last
= buf
+ buflen
, *p
;
266 for ( p
= buf
; n
> 0 && p
< last
; p
+= n
)
267 n
= send ( s
, p
, min ( sendlen
, last
- p
), MSG_OOB
);
268 wsa_ok ( n
, 0 <=, "do_oob_send (%x): error %d\n" );
272 static int do_synchronous_send ( SOCKET s
, char *buf
, int buflen
, int sendlen
)
274 char* last
= buf
+ buflen
, *p
;
276 for ( p
= buf
; n
> 0 && p
< last
; p
+= n
)
277 n
= send ( s
, p
, min ( sendlen
, last
- p
), 0 );
278 wsa_ok ( n
, 0 <=, "do_synchronous_send (%x): error %d\n" );
282 static int do_synchronous_recv ( SOCKET s
, char *buf
, int buflen
, int recvlen
)
284 char* last
= buf
+ buflen
, *p
;
286 for ( p
= buf
; n
> 0 && p
< last
; p
+= n
)
287 n
= recv ( s
, p
, min ( recvlen
, last
- p
), 0 );
288 wsa_ok ( n
, 0 <=, "do_synchronous_recv (%x): error %d:\n" );
292 static int do_synchronous_recvfrom ( SOCKET s
, char *buf
, int buflen
,int flags
,struct sockaddr
*from
, int *fromlen
, int recvlen
)
294 char* last
= buf
+ buflen
, *p
;
296 for ( p
= buf
; n
> 0 && p
< last
; p
+= n
)
297 n
= recvfrom ( s
, p
, min ( recvlen
, last
- p
), 0, from
, fromlen
);
298 wsa_ok ( n
, 0 <=, "do_synchronous_recv (%x): error %d:\n" );
303 * Call this routine right after thread startup.
304 * SO_OPENTYPE must by 0, regardless what the server did.
306 static void check_so_opentype (void)
310 getsockopt ( INVALID_SOCKET
, SOL_SOCKET
, SO_OPENTYPE
, (LPVOID
) &tmp
, &len
);
311 ok ( tmp
== 0, "check_so_opentype: wrong startup value of SO_OPENTYPE: %d\n", tmp
);
314 /**************** Server utility functions ***************/
317 * Even if we have closed our server socket cleanly,
318 * the OS may mark the address "in use" for some time -
319 * this happens with native Linux apps, too.
321 static void do_bind ( SOCKET s
, struct sockaddr
* addr
, int addrlen
)
323 int err
, wsaerr
= 0, n_try
= BIND_TRIES
;
325 while ( ( err
= bind ( s
, addr
, addrlen
) ) != 0 &&
326 ( wsaerr
= WSAGetLastError () ) == WSAEADDRINUSE
&&
329 trace ( "address in use, waiting ...\n" );
330 Sleep ( 1000 * BIND_SLEEP
);
332 ok ( err
== 0, "failed to bind: %d\n", wsaerr
);
335 static void server_start ( server_params
*par
)
338 test_params
*gen
= par
->general
;
339 server_memory
*mem
= LocalAlloc ( LPTR
, sizeof ( server_memory
) );
341 TlsSetValue ( tls
, mem
);
342 mem
->s
= WSASocketA ( AF_INET
, gen
->sock_type
, gen
->sock_prot
,
343 NULL
, 0, par
->sock_flags
);
344 ok ( mem
->s
!= INVALID_SOCKET
, "Server: WSASocket failed\n" );
346 mem
->addr
.sin_family
= AF_INET
;
347 mem
->addr
.sin_addr
.s_addr
= inet_addr ( gen
->inet_addr
);
348 mem
->addr
.sin_port
= htons ( gen
->inet_port
);
350 for (i
= 0; i
< MAX_CLIENTS
; i
++)
352 mem
->sock
[i
].s
= INVALID_SOCKET
;
353 mem
->sock
[i
].buf
= LocalAlloc ( LPTR
, gen
->n_chunks
* gen
->chunk_size
);
354 mem
->sock
[i
].n_recvd
= 0;
355 mem
->sock
[i
].n_sent
= 0;
358 if ( gen
->sock_type
== SOCK_STREAM
)
359 do_bind ( mem
->s
, (struct sockaddr
*) &mem
->addr
, sizeof (mem
->addr
) );
362 static void server_stop (void)
365 server_memory
*mem
= TlsGetValue ( tls
);
367 for (i
= 0; i
< MAX_CLIENTS
; i
++ )
369 LocalFree ( mem
->sock
[i
].buf
);
370 if ( mem
->sock
[i
].s
!= INVALID_SOCKET
)
371 closesocket ( mem
->sock
[i
].s
);
373 ok ( closesocket ( mem
->s
) == 0, "closesocket failed\n" );
375 ExitThread ( GetCurrentThreadId () );
378 /**************** Client utilitiy functions ***************/
380 static void client_start ( client_params
*par
)
382 test_params
*gen
= par
->general
;
383 client_memory
*mem
= LocalAlloc (LPTR
, sizeof (client_memory
));
385 TlsSetValue ( tls
, mem
);
387 WaitForSingleObject ( server_ready
, INFINITE
);
389 mem
->s
= WSASocketA ( AF_INET
, gen
->sock_type
, gen
->sock_prot
,
390 NULL
, 0, par
->sock_flags
);
392 mem
->addr
.sin_family
= AF_INET
;
393 mem
->addr
.sin_addr
.s_addr
= inet_addr ( gen
->inet_addr
);
394 mem
->addr
.sin_port
= htons ( gen
->inet_port
);
396 ok ( mem
->s
!= INVALID_SOCKET
, "Client: WSASocket failed\n" );
398 mem
->send_buf
= LocalAlloc ( LPTR
, 2 * gen
->n_chunks
* gen
->chunk_size
);
399 mem
->recv_buf
= mem
->send_buf
+ gen
->n_chunks
* gen
->chunk_size
;
400 fill_buffer ( mem
->send_buf
, gen
->chunk_size
, gen
->n_chunks
);
402 SetEvent ( client_ready
[client_id
] );
403 /* Wait for the other clients to come up */
404 WaitForMultipleObjects ( min ( gen
->n_clients
, MAX_CLIENTS
), client_ready
, TRUE
, INFINITE
);
407 static void client_stop (void)
409 client_memory
*mem
= TlsGetValue ( tls
);
410 wsa_ok ( closesocket ( mem
->s
), 0 ==, "closesocket error (%x): %d\n" );
411 LocalFree ( mem
->send_buf
);
416 /**************** Servers ***************/
419 * simple_server: A very basic server doing synchronous IO.
421 static VOID WINAPI
simple_server ( server_params
*par
)
423 test_params
*gen
= par
->general
;
425 int pos
, n_recvd
, n_sent
, n_expected
= gen
->n_chunks
* gen
->chunk_size
, tmp
, i
,
426 id
= GetCurrentThreadId();
428 trace ( "simple_server (%x) starting\n", id
);
430 set_so_opentype ( FALSE
); /* non-overlapped */
431 server_start ( par
);
432 mem
= TlsGetValue ( tls
);
434 wsa_ok ( set_blocking ( mem
->s
, TRUE
), 0 ==, "simple_server (%x): failed to set blocking mode: %d\n");
435 wsa_ok ( listen ( mem
->s
, SOMAXCONN
), 0 ==, "simple_server (%x): listen failed: %d\n");
437 trace ( "simple_server (%x) ready\n", id
);
438 SetEvent ( server_ready
); /* notify clients */
440 for ( i
= 0; i
< min ( gen
->n_clients
, MAX_CLIENTS
); i
++ )
442 trace ( "simple_server (%x): waiting for client\n", id
);
444 /* accept a single connection */
445 tmp
= sizeof ( mem
->sock
[0].peer
);
446 mem
->sock
[0].s
= accept ( mem
->s
, (struct sockaddr
*) &mem
->sock
[0].peer
, &tmp
);
447 wsa_ok ( mem
->sock
[0].s
, INVALID_SOCKET
!=, "simple_server (%x): accept failed: %d\n" );
449 ok ( mem
->sock
[0].peer
.sin_addr
.s_addr
== inet_addr ( gen
->inet_addr
),
450 "simple_server (%x): strange peer address\n", id
);
452 /* Receive data & check it */
453 n_recvd
= do_synchronous_recv ( mem
->sock
[0].s
, mem
->sock
[0].buf
, n_expected
, par
->buflen
);
454 ok ( n_recvd
== n_expected
,
455 "simple_server (%x): received less data than expected: %d of %d\n", id
, n_recvd
, n_expected
);
456 pos
= test_buffer ( mem
->sock
[0].buf
, gen
->chunk_size
, gen
->n_chunks
);
457 ok ( pos
== -1, "simple_server (%x): test pattern error: %d\n", id
, pos
);
460 n_sent
= do_synchronous_send ( mem
->sock
[0].s
, mem
->sock
[0].buf
, n_expected
, par
->buflen
);
461 ok ( n_sent
== n_expected
,
462 "simple_server (%x): sent less data than expected: %d of %d\n", id
, n_sent
, n_expected
);
465 read_zero_bytes ( mem
->sock
[0].s
);
466 wsa_ok ( closesocket ( mem
->sock
[0].s
), 0 ==, "simple_server (%x): closesocket error: %d\n" );
467 mem
->sock
[0].s
= INVALID_SOCKET
;
470 trace ( "simple_server (%x) exiting\n", id
);
475 * oob_server: A very basic server receiving out-of-band data.
477 static VOID WINAPI
oob_server ( server_params
*par
)
479 test_params
*gen
= par
->general
;
482 int pos
, n_recvd
, n_expected
= gen
->n_chunks
* gen
->chunk_size
, tmp
,
483 id
= GetCurrentThreadId();
485 trace ( "oob_server (%x) starting\n", id
);
487 set_so_opentype ( FALSE
); /* non-overlapped */
488 server_start ( par
);
489 mem
= TlsGetValue ( tls
);
491 wsa_ok ( set_blocking ( mem
->s
, TRUE
), 0 ==, "oob_server (%x): failed to set blocking mode: %d\n");
492 wsa_ok ( listen ( mem
->s
, SOMAXCONN
), 0 ==, "oob_server (%x): listen failed: %d\n");
494 trace ( "oob_server (%x) ready\n", id
);
495 SetEvent ( server_ready
); /* notify clients */
497 trace ( "oob_server (%x): waiting for client\n", id
);
499 /* accept a single connection */
500 tmp
= sizeof ( mem
->sock
[0].peer
);
501 mem
->sock
[0].s
= accept ( mem
->s
, (struct sockaddr
*) &mem
->sock
[0].peer
, &tmp
);
502 wsa_ok ( mem
->sock
[0].s
, INVALID_SOCKET
!=, "oob_server (%x): accept failed: %d\n" );
504 ok ( mem
->sock
[0].peer
.sin_addr
.s_addr
== inet_addr ( gen
->inet_addr
),
505 "oob_server (%x): strange peer address\n", id
);
507 /* check atmark state */
508 ioctlsocket ( mem
->sock
[0].s
, SIOCATMARK
, &atmark
);
509 ok ( atmark
== 1, "oob_server (%x): unexpectedly at the OOB mark: %i\n", id
, atmark
);
511 /* Receive normal data and check atmark state */
512 n_recvd
= do_synchronous_recv ( mem
->sock
[0].s
, mem
->sock
[0].buf
, n_expected
, par
->buflen
);
513 ok ( n_recvd
== n_expected
,
514 "simple_server (%x): received less data than expected: %d of %d\n", id
, n_recvd
, n_expected
);
515 pos
= test_buffer ( mem
->sock
[0].buf
, gen
->chunk_size
, gen
->n_chunks
);
516 ok ( pos
== -1, "simple_server (%x): test pattern error: %d\n", id
, pos
);
518 ioctlsocket ( mem
->sock
[0].s
, SIOCATMARK
, &atmark
);
519 ok ( atmark
== 1, "oob_server (%x): unexpectedly at the OOB mark: %i\n", id
, atmark
);
521 /* Receive a part of the out-of-band data and check atmark state */
522 n_recvd
= do_synchronous_recv ( mem
->sock
[0].s
, mem
->sock
[0].buf
, 8, par
->buflen
);
524 "oob_server (%x): received less data than expected: %d of %d\n", id
, n_recvd
, 8 );
527 ioctlsocket ( mem
->sock
[0].s
, SIOCATMARK
, &atmark
);
528 todo_wine
ok ( atmark
== 0, "oob_server (%x): not at the OOB mark: %i\n", id
, atmark
);
530 /* Receive the rest of the out-of-band data and check atmark state */
531 do_synchronous_recv ( mem
->sock
[0].s
, mem
->sock
[0].buf
, n_expected
, par
->buflen
);
533 ioctlsocket ( mem
->sock
[0].s
, SIOCATMARK
, &atmark
);
534 todo_wine
ok ( atmark
== 0, "oob_server (%x): not at the OOB mark: %i\n", id
, atmark
);
537 wsa_ok ( closesocket ( mem
->sock
[0].s
), 0 ==, "oob_server (%x): closesocket error: %d\n" );
538 mem
->sock
[0].s
= INVALID_SOCKET
;
540 trace ( "oob_server (%x) exiting\n", id
);
545 * select_server: A non-blocking server.
547 static VOID WINAPI
select_server ( server_params
*par
)
549 test_params
*gen
= par
->general
;
551 int n_expected
= gen
->n_chunks
* gen
->chunk_size
, tmp
, i
,
552 id
= GetCurrentThreadId(), n_connections
= 0, n_sent
, n_recvd
,
553 n_set
, delta
, n_ready
;
554 struct timeval timeout
= {0,10}; /* wait for 10 milliseconds */
555 fd_set fds_recv
, fds_send
, fds_openrecv
, fds_opensend
;
557 trace ( "select_server (%x) starting\n", id
);
559 set_so_opentype ( FALSE
); /* non-overlapped */
560 server_start ( par
);
561 mem
= TlsGetValue ( tls
);
563 wsa_ok ( set_blocking ( mem
->s
, FALSE
), 0 ==, "select_server (%x): failed to set blocking mode: %d\n");
564 wsa_ok ( listen ( mem
->s
, SOMAXCONN
), 0 ==, "select_server (%x): listen failed: %d\n");
566 trace ( "select_server (%x) ready\n", id
);
567 SetEvent ( server_ready
); /* notify clients */
569 FD_ZERO ( &fds_openrecv
);
570 FD_ZERO ( &fds_recv
);
571 FD_ZERO ( &fds_send
);
572 FD_ZERO ( &fds_opensend
);
574 FD_SET ( mem
->s
, &fds_openrecv
);
578 fds_recv
= fds_openrecv
;
579 fds_send
= fds_opensend
;
583 wsa_ok ( ( n_ready
= select ( 0, &fds_recv
, &fds_send
, NULL
, &timeout
) ), SOCKET_ERROR
!=,
584 "select_server (%x): select() failed: %d\n" );
586 /* check for incoming requests */
587 if ( FD_ISSET ( mem
->s
, &fds_recv
) ) {
590 trace ( "select_server (%x): accepting client connection\n", id
);
592 /* accept a single connection */
593 tmp
= sizeof ( mem
->sock
[n_connections
].peer
);
594 mem
->sock
[n_connections
].s
= accept ( mem
->s
, (struct sockaddr
*) &mem
->sock
[n_connections
].peer
, &tmp
);
595 wsa_ok ( mem
->sock
[n_connections
].s
, INVALID_SOCKET
!=, "select_server (%x): accept() failed: %d\n" );
597 ok ( mem
->sock
[n_connections
].peer
.sin_addr
.s_addr
== inet_addr ( gen
->inet_addr
),
598 "select_server (%x): strange peer address\n", id
);
600 /* add to list of open connections */
601 FD_SET ( mem
->sock
[n_connections
].s
, &fds_openrecv
);
602 FD_SET ( mem
->sock
[n_connections
].s
, &fds_opensend
);
607 /* handle open requests */
609 for ( i
= 0; i
< n_connections
; i
++ )
611 if ( FD_ISSET( mem
->sock
[i
].s
, &fds_recv
) ) {
614 if ( mem
->sock
[i
].n_recvd
< n_expected
) {
615 /* Receive data & check it */
616 n_recvd
= recv ( mem
->sock
[i
].s
, mem
->sock
[i
].buf
+ mem
->sock
[i
].n_recvd
, min ( n_expected
- mem
->sock
[i
].n_recvd
, par
->buflen
), 0 );
617 ok ( n_recvd
!= SOCKET_ERROR
, "select_server (%x): error in recv(): %d\n", id
, WSAGetLastError() );
618 mem
->sock
[i
].n_recvd
+= n_recvd
;
620 if ( mem
->sock
[i
].n_recvd
== n_expected
) {
621 int pos
= test_buffer ( mem
->sock
[i
].buf
, gen
->chunk_size
, gen
->n_chunks
);
622 ok ( pos
== -1, "select_server (%x): test pattern error: %d\n", id
, pos
);
623 FD_CLR ( mem
->sock
[i
].s
, &fds_openrecv
);
626 ok ( mem
->sock
[i
].n_recvd
<= n_expected
, "select_server (%x): received too many bytes: %d\n", id
, mem
->sock
[i
].n_recvd
);
630 /* only echo back what we've received */
631 delta
= mem
->sock
[i
].n_recvd
- mem
->sock
[i
].n_sent
;
633 if ( FD_ISSET ( mem
->sock
[i
].s
, &fds_send
) ) {
636 if ( ( delta
> 0 ) && ( mem
->sock
[i
].n_sent
< n_expected
) ) {
638 n_sent
= send ( mem
->sock
[i
].s
, mem
->sock
[i
].buf
+ mem
->sock
[i
].n_sent
, min ( delta
, par
->buflen
), 0 );
639 ok ( n_sent
!= SOCKET_ERROR
, "select_server (%x): error in send(): %d\n", id
, WSAGetLastError() );
640 mem
->sock
[i
].n_sent
+= n_sent
;
642 if ( mem
->sock
[i
].n_sent
== n_expected
) {
643 FD_CLR ( mem
->sock
[i
].s
, &fds_opensend
);
646 ok ( mem
->sock
[i
].n_sent
<= n_expected
, "select_server (%x): sent too many bytes: %d\n", id
, mem
->sock
[i
].n_sent
);
651 /* check that select returned the correct number of ready sockets */
652 ok ( ( n_set
== n_ready
), "select_server (%x): select() returns wrong number of ready sockets\n", id
);
654 /* check if all clients are done */
655 if ( ( fds_opensend
.fd_count
== 0 )
656 && ( fds_openrecv
.fd_count
== 1 ) /* initial socket that accepts clients */
657 && ( n_connections
== min ( gen
->n_clients
, MAX_CLIENTS
) ) ) {
662 for ( i
= 0; i
< min ( gen
->n_clients
, MAX_CLIENTS
); i
++ )
665 read_zero_bytes ( mem
->sock
[i
].s
);
666 wsa_ok ( closesocket ( mem
->sock
[i
].s
), 0 ==, "select_server (%x): closesocket error: %d\n" );
667 mem
->sock
[i
].s
= INVALID_SOCKET
;
670 trace ( "select_server (%x) exiting\n", id
);
674 /**************** Clients ***************/
677 * simple_client: A very basic client doing synchronous IO.
679 static VOID WINAPI
simple_client ( client_params
*par
)
681 test_params
*gen
= par
->general
;
683 int pos
, n_sent
, n_recvd
, n_expected
= gen
->n_chunks
* gen
->chunk_size
, id
;
685 id
= GetCurrentThreadId();
686 trace ( "simple_client (%x): starting\n", id
);
687 /* wait here because we want to call set_so_opentype before creating a socket */
688 WaitForSingleObject ( server_ready
, INFINITE
);
689 trace ( "simple_client (%x): server ready\n", id
);
691 check_so_opentype ();
692 set_so_opentype ( FALSE
); /* non-overlapped */
693 client_start ( par
);
694 mem
= TlsGetValue ( tls
);
697 wsa_ok ( connect ( mem
->s
, (struct sockaddr
*) &mem
->addr
, sizeof ( mem
->addr
) ),
698 0 ==, "simple_client (%x): connect error: %d\n" );
699 ok ( set_blocking ( mem
->s
, TRUE
) == 0,
700 "simple_client (%x): failed to set blocking mode\n", id
);
701 trace ( "simple_client (%x) connected\n", id
);
703 /* send data to server */
704 n_sent
= do_synchronous_send ( mem
->s
, mem
->send_buf
, n_expected
, par
->buflen
);
705 ok ( n_sent
== n_expected
,
706 "simple_client (%x): sent less data than expected: %d of %d\n", id
, n_sent
, n_expected
);
708 /* shutdown send direction */
709 wsa_ok ( shutdown ( mem
->s
, SD_SEND
), 0 ==, "simple_client (%x): shutdown failed: %d\n" );
711 /* Receive data echoed back & check it */
712 n_recvd
= do_synchronous_recv ( mem
->s
, mem
->recv_buf
, n_expected
, par
->buflen
);
713 ok ( n_recvd
== n_expected
,
714 "simple_client (%x): received less data than expected: %d of %d\n", id
, n_recvd
, n_expected
);
717 pos
= test_buffer ( mem
->recv_buf
, gen
->chunk_size
, gen
->n_chunks
);
718 ok ( pos
== -1, "simple_client (%x): test pattern error: %d\n", id
, pos
);
721 read_zero_bytes ( mem
->s
);
722 trace ( "simple_client (%x) exiting\n", id
);
727 * oob_client: A very basic client sending out-of-band data.
729 static VOID WINAPI
oob_client ( client_params
*par
)
731 test_params
*gen
= par
->general
;
733 int n_sent
, n_expected
= gen
->n_chunks
* gen
->chunk_size
, id
;
735 id
= GetCurrentThreadId();
736 trace ( "oob_client (%x): starting\n", id
);
737 /* wait here because we want to call set_so_opentype before creating a socket */
738 WaitForSingleObject ( server_ready
, INFINITE
);
739 trace ( "oob_client (%x): server ready\n", id
);
741 check_so_opentype ();
742 set_so_opentype ( FALSE
); /* non-overlapped */
743 client_start ( par
);
744 mem
= TlsGetValue ( tls
);
747 wsa_ok ( connect ( mem
->s
, (struct sockaddr
*) &mem
->addr
, sizeof ( mem
->addr
) ),
748 0 ==, "oob_client (%x): connect error: %d\n" );
749 ok ( set_blocking ( mem
->s
, TRUE
) == 0,
750 "oob_client (%x): failed to set blocking mode\n", id
);
751 trace ( "oob_client (%x) connected\n", id
);
753 /* send data to server */
754 n_sent
= do_synchronous_send ( mem
->s
, mem
->send_buf
, n_expected
, par
->buflen
);
755 ok ( n_sent
== n_expected
,
756 "oob_client (%x): sent less data than expected: %d of %d\n", id
, n_sent
, n_expected
);
758 /* send out-of-band data to server */
759 n_sent
= do_oob_send ( mem
->s
, mem
->send_buf
, n_expected
, par
->buflen
);
760 ok ( n_sent
== n_expected
,
761 "oob_client (%x): sent less data than expected: %d of %d\n", id
, n_sent
, n_expected
);
763 /* shutdown send direction */
764 wsa_ok ( shutdown ( mem
->s
, SD_SEND
), 0 ==, "simple_client (%x): shutdown failed: %d\n" );
767 read_zero_bytes ( mem
->s
);
768 trace ( "oob_client (%x) exiting\n", id
);
773 * simple_mixed_client: mixing send and recvfrom
775 static VOID WINAPI
simple_mixed_client ( client_params
*par
)
777 test_params
*gen
= par
->general
;
779 int pos
, n_sent
, n_recvd
, n_expected
= gen
->n_chunks
* gen
->chunk_size
, id
;
780 int fromLen
= sizeof(mem
->addr
);
781 struct sockaddr test
;
783 id
= GetCurrentThreadId();
784 trace ( "simple_client (%x): starting\n", id
);
785 /* wait here because we want to call set_so_opentype before creating a socket */
786 WaitForSingleObject ( server_ready
, INFINITE
);
787 trace ( "simple_client (%x): server ready\n", id
);
789 check_so_opentype ();
790 set_so_opentype ( FALSE
); /* non-overlapped */
791 client_start ( par
);
792 mem
= TlsGetValue ( tls
);
795 wsa_ok ( connect ( mem
->s
, (struct sockaddr
*) &mem
->addr
, sizeof ( mem
->addr
) ),
796 0 ==, "simple_client (%x): connect error: %d\n" );
797 ok ( set_blocking ( mem
->s
, TRUE
) == 0,
798 "simple_client (%x): failed to set blocking mode\n", id
);
799 trace ( "simple_client (%x) connected\n", id
);
801 /* send data to server */
802 n_sent
= do_synchronous_send ( mem
->s
, mem
->send_buf
, n_expected
, par
->buflen
);
803 ok ( n_sent
== n_expected
,
804 "simple_client (%x): sent less data than expected: %d of %d\n", id
, n_sent
, n_expected
);
806 /* shutdown send direction */
807 wsa_ok ( shutdown ( mem
->s
, SD_SEND
), 0 ==, "simple_client (%x): shutdown failed: %d\n" );
809 /* this shouldn't change, since lpFrom, is not updated on
810 connection oriented sockets - exposed by bug 11640
812 ((struct sockaddr_in
*)&test
)->sin_addr
.s_addr
= inet_addr("0.0.0.0");
814 /* Receive data echoed back & check it */
815 n_recvd
= do_synchronous_recvfrom ( mem
->s
,
819 (struct sockaddr
*)&test
,
822 ok ( n_recvd
== n_expected
,
823 "simple_client (%x): received less data than expected: %d of %d\n", id
, n_recvd
, n_expected
);
825 /* check that lpFrom was not updated */
828 inet_ntoa(((struct sockaddr_in
*)&test
)->sin_addr
),
829 "0.0.0.0"), "lpFrom shouldn't be updated on connection oriented sockets\n");
832 pos
= test_buffer ( mem
->recv_buf
, gen
->chunk_size
, gen
->n_chunks
);
833 ok ( pos
== -1, "simple_client (%x): test pattern error: %d\n", id
, pos
);
836 read_zero_bytes ( mem
->s
);
837 trace ( "simple_client (%x) exiting\n", id
);
842 * event_client: An event-driven client
844 static void WINAPI
event_client ( client_params
*par
)
846 test_params
*gen
= par
->general
;
848 int id
= GetCurrentThreadId(), n_expected
= gen
->n_chunks
* gen
->chunk_size
,
851 WSANETWORKEVENTS wsa_events
;
852 char *send_last
, *recv_last
, *send_p
, *recv_p
;
853 LONG mask
= FD_READ
| FD_WRITE
| FD_CLOSE
;
855 trace ( "event_client (%x): starting\n", id
);
856 client_start ( par
);
857 trace ( "event_client (%x): server ready\n", id
);
859 mem
= TlsGetValue ( tls
);
861 /* Prepare event notification for connect, makes socket nonblocking */
862 event
= WSACreateEvent ();
863 WSAEventSelect ( mem
->s
, event
, FD_CONNECT
);
864 tmp
= connect ( mem
->s
, (struct sockaddr
*) &mem
->addr
, sizeof ( mem
->addr
) );
866 err
= WSAGetLastError ();
867 ok ( err
== WSAEWOULDBLOCK
, "event_client (%x): connect error: %d\n", id
, err
);
868 tmp
= WaitForSingleObject ( event
, INFINITE
);
869 ok ( tmp
== WAIT_OBJECT_0
, "event_client (%x): wait for connect event failed: %d\n", id
, tmp
);
870 err
= WSAEnumNetworkEvents ( mem
->s
, event
, &wsa_events
);
871 ok ( err
== 0, "event_client (%x): WSAEnumNetworkEvents error: %d\n", id
, err
);
872 err
= wsa_events
.iErrorCode
[ FD_CONNECT_BIT
];
873 ok ( err
== 0, "event_client (%x): connect error: %d\n", id
, err
);
877 trace ( "event_client (%x) connected\n", id
);
879 WSAEventSelect ( mem
->s
, event
, mask
);
881 recv_p
= mem
->recv_buf
;
882 recv_last
= mem
->recv_buf
+ n_expected
;
883 send_p
= mem
->send_buf
;
884 send_last
= mem
->send_buf
+ n_expected
;
888 err
= WaitForSingleObject ( event
, INFINITE
);
889 ok ( err
== WAIT_OBJECT_0
, "event_client (%x): wait failed\n", id
);
891 err
= WSAEnumNetworkEvents ( mem
->s
, event
, &wsa_events
);
892 ok( err
== 0, "event_client (%x): WSAEnumNetworkEvents error: %d\n", id
, err
);
894 if ( wsa_events
.lNetworkEvents
& FD_WRITE
)
896 err
= wsa_events
.iErrorCode
[ FD_WRITE_BIT
];
897 ok ( err
== 0, "event_client (%x): FD_WRITE error code: %d\n", id
, err
);
902 n
= send ( mem
->s
, send_p
, min ( send_last
- send_p
, par
->buflen
), 0 );
905 err
= WSAGetLastError ();
906 ok ( err
== WSAEWOULDBLOCK
, "event_client (%x): send error: %d\n", id
, err
);
911 while ( n
>= 0 && send_p
< send_last
);
913 if ( send_p
== send_last
)
915 trace ( "event_client (%x): all data sent - shutdown\n", id
);
916 shutdown ( mem
->s
, SD_SEND
);
918 WSAEventSelect ( mem
->s
, event
, mask
);
921 if ( wsa_events
.lNetworkEvents
& FD_READ
)
923 err
= wsa_events
.iErrorCode
[ FD_READ_BIT
];
924 ok ( err
== 0, "event_client (%x): FD_READ error code: %d\n", id
, err
);
925 if ( err
!= 0 ) break;
927 /* First read must succeed */
928 n
= recv ( mem
->s
, recv_p
, min ( recv_last
- recv_p
, par
->buflen
), 0 );
929 wsa_ok ( n
, 0 <=, "event_client (%x): recv error: %d\n" );
933 if ( recv_p
== recv_last
)
936 trace ( "event_client (%x): all data received\n", id
);
937 WSAEventSelect ( mem
->s
, event
, mask
);
940 n
= recv ( mem
->s
, recv_p
, min ( recv_last
- recv_p
, par
->buflen
), 0 );
941 if ( n
< 0 && ( err
= WSAGetLastError()) != WSAEWOULDBLOCK
)
942 ok ( 0, "event_client (%x): read error: %d\n", id
, err
);
946 if ( wsa_events
.lNetworkEvents
& FD_CLOSE
)
948 trace ( "event_client (%x): close event\n", id
);
949 err
= wsa_events
.iErrorCode
[ FD_CLOSE_BIT
];
950 ok ( err
== 0, "event_client (%x): FD_CLOSE error code: %d\n", id
, err
);
955 n
= send_p
- mem
->send_buf
;
956 ok ( send_p
== send_last
,
957 "simple_client (%x): sent less data than expected: %d of %d\n", id
, n
, n_expected
);
958 n
= recv_p
- mem
->recv_buf
;
959 ok ( recv_p
== recv_last
,
960 "simple_client (%x): received less data than expected: %d of %d\n", id
, n
, n_expected
);
961 n
= test_buffer ( mem
->recv_buf
, gen
->chunk_size
, gen
->n_chunks
);
962 ok ( n
== -1, "event_client (%x): test pattern error: %d\n", id
, n
);
965 WSACloseEvent ( event
);
966 trace ( "event_client (%x) exiting\n", id
);
970 /* Tests for WSAStartup */
971 static void test_WithoutWSAStartup(void)
975 WSASetLastError(0xdeadbeef);
976 ptr
= gethostbyname("localhost");
978 ok(ptr
== NULL
, "gethostbyname() succeeded unexpectedly: %d\n", WSAGetLastError());
979 ok(WSAGetLastError() == WSANOTINITIALISED
, "gethostbyname() failed with unexpected error: %d\n",
983 static void test_WithWSAStartup(void)
986 WORD version
= MAKEWORD( 2, 2 );
990 res
= WSAStartup( version
, &data
);
991 ok(res
== 0, "WSAStartup() failed unexpectedly: %d\n", res
);
993 ptr
= gethostbyname("localhost");
994 ok(ptr
!= NULL
, "gethostbyname() failed unexpectedly: %d\n", WSAGetLastError());
999 /**************** Main program utility functions ***************/
1001 static void Init (void)
1003 WORD ver
= MAKEWORD (2, 2);
1005 HMODULE hws2_32
= GetModuleHandle("ws2_32.dll");
1007 pfreeaddrinfo
= (void *)GetProcAddress(hws2_32
, "freeaddrinfo");
1008 pgetaddrinfo
= (void *)GetProcAddress(hws2_32
, "getaddrinfo");
1009 pFreeAddrInfoW
= (void *)GetProcAddress(hws2_32
, "FreeAddrInfoW");
1010 pGetAddrInfoW
= (void *)GetProcAddress(hws2_32
, "GetAddrInfoW");
1011 pInetNtop
= (void *)GetProcAddress(hws2_32
, "inet_ntop");
1013 ok ( WSAStartup ( ver
, &data
) == 0, "WSAStartup failed\n" );
1017 static void Exit (void)
1022 err
= WSAGetLastError();
1023 ok ( ret
== 0, "WSACleanup failed ret = %d GetLastError is %d\n", ret
, err
);
1025 err
= WSAGetLastError();
1026 ok ( (ret
== SOCKET_ERROR
&& err
== WSANOTINITIALISED
) ||
1027 broken(ret
== 0), /* WinME */
1028 "WSACleanup returned %d GetLastError is %d\n", ret
, err
);
1031 static void StartServer (LPTHREAD_START_ROUTINE routine
,
1032 test_params
*general
, server_params
*par
)
1034 par
->general
= general
;
1035 thread
[0] = CreateThread ( NULL
, 0, routine
, par
, 0, &thread_id
[0] );
1036 ok ( thread
[0] != NULL
, "Failed to create server thread\n" );
1039 static void StartClients (LPTHREAD_START_ROUTINE routine
,
1040 test_params
*general
, client_params
*par
)
1043 par
->general
= general
;
1044 for ( i
= 1; i
<= min ( general
->n_clients
, MAX_CLIENTS
); i
++ )
1047 thread
[i
] = CreateThread ( NULL
, 0, routine
, par
, 0, &thread_id
[i
] );
1048 ok ( thread
[i
] != NULL
, "Failed to create client thread\n" );
1049 /* Make sure the client is up and running */
1050 WaitForSingleObject ( client_ready
[client_id
], INFINITE
);
1054 static void do_test( test_setup
*test
)
1056 DWORD i
, n
= min (test
->general
.n_clients
, MAX_CLIENTS
);
1059 server_ready
= CreateEventA ( NULL
, TRUE
, FALSE
, NULL
);
1060 for (i
= 0; i
<= n
; i
++)
1061 client_ready
[i
] = CreateEventA ( NULL
, TRUE
, FALSE
, NULL
);
1063 StartServer ( test
->srv
, &test
->general
, &test
->srv_params
);
1064 StartClients ( test
->clt
, &test
->general
, &test
->clt_params
);
1065 WaitForSingleObject ( server_ready
, INFINITE
);
1067 wait
= WaitForMultipleObjects ( 1 + n
, thread
, TRUE
, 1000 * TEST_TIMEOUT
);
1068 ok ( wait
<= WAIT_OBJECT_0
+ n
,
1069 "some threads have not completed: %x\n", wait
);
1071 if ( ! ( wait
<= WAIT_OBJECT_0
+ n
) )
1073 for (i
= 0; i
<= n
; i
++)
1075 if ( WaitForSingleObject ( thread
[i
], 0 ) != WAIT_OBJECT_0
)
1077 trace ("terminating thread %08x\n", thread_id
[i
]);
1078 TerminateThread ( thread
[i
], 0 );
1082 CloseHandle ( server_ready
);
1083 for (i
= 0; i
<= n
; i
++)
1084 CloseHandle ( client_ready
[i
] );
1087 /********* some tests for getsockopt(setsockopt(X)) == X ***********/
1088 /* optname = SO_LINGER */
1089 static const LINGER linger_testvals
[] = {
1096 /* optname = SO_RCVTIMEO, SOSNDTIMEO */
1097 #define SOCKTIMEOUT1 63000 /* 63 seconds. Do not test fractional part because of a
1098 bug in the linux kernel (fixed in 2.6.8) */
1099 #define SOCKTIMEOUT2 997000 /* 997 seconds */
1101 static void test_set_getsockopt(void)
1104 int i
, err
, lasterr
;
1109 s
= socket(AF_INET
, SOCK_STREAM
, 0);
1110 ok(s
!=INVALID_SOCKET
, "socket() failed error: %d\n", WSAGetLastError());
1111 if( s
== INVALID_SOCKET
) return;
1113 timeout
= SOCKTIMEOUT1
;
1114 size
= sizeof(timeout
);
1115 err
= setsockopt(s
, SOL_SOCKET
, SO_RCVTIMEO
, (char *) &timeout
, size
);
1117 err
= getsockopt(s
, SOL_SOCKET
, SO_RCVTIMEO
, (char *) &timeout
, &size
);
1118 ok( !err
, "get/setsockopt(SO_RCVTIMEO) failed error: %d\n", WSAGetLastError());
1119 ok( timeout
== SOCKTIMEOUT1
, "getsockopt(SO_RCVTIMEO) returned wrong value %d\n", timeout
);
1122 size
= sizeof(timeout
);
1123 err
= setsockopt(s
, SOL_SOCKET
, SO_RCVTIMEO
, (char *) &timeout
, size
);
1125 err
= getsockopt(s
, SOL_SOCKET
, SO_RCVTIMEO
, (char *) &timeout
, &size
);
1126 ok( !err
, "get/setsockopt(SO_RCVTIMEO) failed error: %d\n", WSAGetLastError());
1127 ok( timeout
== 0, "getsockopt(SO_RCVTIMEO) returned wrong value %d\n", timeout
);
1130 timeout
= SOCKTIMEOUT2
; /* 997 seconds. See remark above */
1131 size
= sizeof(timeout
);
1132 err
= setsockopt(s
, SOL_SOCKET
, SO_SNDTIMEO
, (char *) &timeout
, size
);
1134 err
= getsockopt(s
, SOL_SOCKET
, SO_SNDTIMEO
, (char *) &timeout
, &size
);
1135 ok( !err
, "get/setsockopt(SO_SNDTIMEO) failed error: %d\n", WSAGetLastError());
1136 ok( timeout
== SOCKTIMEOUT2
, "getsockopt(SO_SNDTIMEO) returned wrong value %d\n", timeout
);
1138 for( i
= 0; i
< sizeof(linger_testvals
)/sizeof(LINGER
);i
++) {
1139 size
= sizeof(lingval
);
1140 lingval
= linger_testvals
[i
];
1141 err
= setsockopt(s
, SOL_SOCKET
, SO_LINGER
, (char *) &lingval
, size
);
1143 err
= getsockopt(s
, SOL_SOCKET
, SO_LINGER
, (char *) &lingval
, &size
);
1144 ok( !err
, "get/setsockopt(SO_LINGER) failed error: %d\n", WSAGetLastError());
1145 ok( !lingval
.l_onoff
== !linger_testvals
[i
].l_onoff
&&
1146 (lingval
.l_linger
== linger_testvals
[i
].l_linger
||
1147 (!lingval
.l_linger
&& !linger_testvals
[i
].l_onoff
))
1148 , "getsockopt(SO_LINGER #%d) returned wrong value %d,%d not %d,%d\n", i
,
1149 lingval
.l_onoff
, lingval
.l_linger
,
1150 linger_testvals
[i
].l_onoff
, linger_testvals
[i
].l_linger
);
1153 size
= sizeof(lingval
);
1154 err
= setsockopt(s
, SOL_SOCKET
, SO_LINGER
, NULL
, size
);
1155 ok(err
== SOCKET_ERROR
&& WSAGetLastError() == WSAEFAULT
,
1156 "got %d with %d (expected SOCKET_ERROR with WSAEFAULT)\n", err
, WSAGetLastError());
1157 err
= setsockopt(s
, SOL_SOCKET
, SO_LINGER
, NULL
, 0);
1158 ok(err
== SOCKET_ERROR
&& WSAGetLastError() == WSAEFAULT
,
1159 "got %d with %d (expected SOCKET_ERROR with WSAEFAULT)\n", err
, WSAGetLastError());
1161 size
= sizeof(BOOL
);
1162 err
= setsockopt(s
, SOL_SOCKET
, SO_DONTLINGER
, NULL
, size
);
1163 ok(err
== SOCKET_ERROR
&& WSAGetLastError() == WSAEFAULT
,
1164 "got %d with %d (expected SOCKET_ERROR with WSAEFAULT)\n", err
, WSAGetLastError());
1165 err
= setsockopt(s
, SOL_SOCKET
, SO_DONTLINGER
, NULL
, 0);
1166 ok(err
== SOCKET_ERROR
&& WSAGetLastError() == WSAEFAULT
,
1167 "got %d with %d (expected SOCKET_ERROR with WSAEFAULT)\n", err
, WSAGetLastError());
1169 /* Test for erroneously passing a value instead of a pointer as optval */
1170 size
= sizeof(char);
1171 err
= setsockopt(s
, SOL_SOCKET
, SO_DONTROUTE
, (char *)1, size
);
1172 ok(err
== SOCKET_ERROR
, "setsockopt with optval being a value passed "
1173 "instead of failing.\n");
1174 lasterr
= WSAGetLastError();
1175 ok(lasterr
== WSAEFAULT
, "setsockopt with optval being a value "
1176 "returned 0x%08x, not WSAEFAULT(0x%08x)\n",
1177 lasterr
, WSAEFAULT
);
1179 /* SO_RCVTIMEO with invalid values for level */
1180 size
= sizeof(timeout
);
1181 timeout
= SOCKTIMEOUT1
;
1182 SetLastError(0xdeadbeef);
1183 err
= setsockopt(s
, 0xffffffff, SO_RCVTIMEO
, (char *) &timeout
, size
);
1184 ok( (err
== SOCKET_ERROR
) && (WSAGetLastError() == WSAEINVAL
),
1185 "got %d with %d (expected SOCKET_ERROR with WSAEINVAL)\n",
1186 err
, WSAGetLastError());
1188 timeout
= SOCKTIMEOUT1
;
1189 SetLastError(0xdeadbeef);
1190 err
= setsockopt(s
, 0x00008000, SO_RCVTIMEO
, (char *) &timeout
, size
);
1191 ok( (err
== SOCKET_ERROR
) && (WSAGetLastError() == WSAEINVAL
),
1192 "got %d with %d (expected SOCKET_ERROR with WSAEINVAL)\n",
1193 err
, WSAGetLastError());
1195 /* Test SO_ERROR set/get */
1196 SetLastError(0xdeadbeef);
1198 err
= setsockopt(s
, SOL_SOCKET
, SO_ERROR
, (char *) &i
, size
);
1200 ok( !err
&& !WSAGetLastError(),
1201 "got %d with %d (expected 0 with 0)\n",
1202 err
, WSAGetLastError());
1204 SetLastError(0xdeadbeef);
1206 err
= getsockopt(s
, SOL_SOCKET
, SO_ERROR
, (char *) &i
, &size
);
1208 ok( !err
&& !WSAGetLastError(),
1209 "got %d with %d (expected 0 with 0)\n",
1210 err
, WSAGetLastError());
1212 ok (i
== 1234, "got %d (expected 1234)\n", i
);
1214 /* Test invalid optlen */
1215 SetLastError(0xdeadbeef);
1217 err
= getsockopt(s
, SOL_SOCKET
, SO_ERROR
, (char *) &i
, &size
);
1219 ok( (err
== SOCKET_ERROR
) && (WSAGetLastError() == WSAEFAULT
),
1220 "got %d with %d (expected SOCKET_ERROR with WSAEFAULT)\n",
1221 err
, WSAGetLastError());
1226 static void test_so_reuseaddr(void)
1228 struct sockaddr_in saddr
;
1230 unsigned int rc
,reuse
;
1233 saddr
.sin_family
= AF_INET
;
1234 saddr
.sin_port
= htons(9375);
1235 saddr
.sin_addr
.s_addr
= inet_addr("127.0.0.1");
1237 s1
=socket(AF_INET
, SOCK_STREAM
, 0);
1238 ok(s1
!=INVALID_SOCKET
, "socket() failed error: %d\n", WSAGetLastError());
1239 rc
= bind(s1
, (struct sockaddr
*)&saddr
, sizeof(saddr
));
1240 ok(rc
!=SOCKET_ERROR
, "bind(s1) failed error: %d\n", WSAGetLastError());
1242 s2
=socket(AF_INET
, SOCK_STREAM
, 0);
1243 ok(s2
!=INVALID_SOCKET
, "socket() failed error: %d\n", WSAGetLastError());
1247 rc
=getsockopt(s2
, SOL_SOCKET
, SO_REUSEADDR
, (char*)&reuse
, &size
);
1248 ok(rc
==0 && reuse
==0,"wrong result in getsockopt(SO_REUSEADDR): rc=%d reuse=%d\n",rc
,reuse
);
1250 rc
= bind(s2
, (struct sockaddr
*)&saddr
, sizeof(saddr
));
1251 ok(rc
==SOCKET_ERROR
, "bind() succeeded\n");
1254 rc
= setsockopt(s2
, SOL_SOCKET
, SO_REUSEADDR
, (char*)&reuse
, sizeof(reuse
));
1255 ok(rc
==0, "setsockopt() failed error: %d\n", WSAGetLastError());
1257 /* On Win2k3 and above, all SO_REUSEADDR seems to do is to allow binding to
1258 * a port immediately after closing another socket on that port, so
1259 * basically following the BSD socket semantics here. */
1261 rc
= bind(s2
, (struct sockaddr
*)&saddr
, sizeof(saddr
));
1262 ok(rc
==0, "bind() failed error: %d\n", WSAGetLastError());
1267 #define IP_PKTINFO_LEN (sizeof(WSACMSGHDR) + WSA_CMSG_ALIGN(sizeof(struct in_pktinfo)))
1269 static void test_ip_pktinfo(void)
1271 ULONG addresses
[2] = {inet_addr("127.0.0.1"), htonl(INADDR_ANY
)};
1272 char recvbuf
[10], pktbuf
[512], msg
[] = "HELLO";
1273 struct sockaddr_in s1addr
, s2addr
, s3addr
;
1274 GUID WSARecvMsg_GUID
= WSAID_WSARECVMSG
;
1275 LPFN_WSARECVMSG pWSARecvMsg
= NULL
;
1276 unsigned int rc
, foundhdr
, yes
= 1;
1277 DWORD dwBytes
, dwSize
, dwFlags
;
1286 memset(&ov
, 0, sizeof(ov
));
1287 ov
.hEvent
= CreateEvent(NULL
, FALSE
, FALSE
, NULL
);
1288 if (ov
.hEvent
== INVALID_HANDLE_VALUE
)
1290 skip("Could not create event object, some tests will be skipped. errno = %d\n", GetLastError());
1294 memset(&hdr
, 0x00, sizeof(hdr
));
1295 s1addr
.sin_family
= AF_INET
;
1296 s1addr
.sin_port
= htons(0);
1297 /* Note: s1addr.sin_addr is set below */
1298 iovec
[0].buf
= recvbuf
;
1299 iovec
[0].len
= sizeof(recvbuf
);
1300 hdr
.name
= (struct sockaddr
*)&s3addr
;
1301 hdr
.namelen
= sizeof(s3addr
);
1302 hdr
.lpBuffers
= &iovec
[0];
1303 hdr
.dwBufferCount
= 1;
1304 hdr
.Control
.buf
= pktbuf
;
1305 /* Note: hdr.Control.len is set below */
1308 for (i
=0;i
<sizeof(addresses
)/sizeof(UINT32
);i
++)
1310 s1addr
.sin_addr
.s_addr
= addresses
[i
];
1312 /* Build "server" side socket */
1313 s1
=socket(AF_INET
, SOCK_DGRAM
, 0);
1314 if (s1
== INVALID_SOCKET
)
1316 skip("socket() failed error, some tests skipped: %d\n", WSAGetLastError());
1320 /* Obtain the WSARecvMsg function */
1321 WSAIoctl(s1
, SIO_GET_EXTENSION_FUNCTION_POINTER
, &WSARecvMsg_GUID
, sizeof(WSARecvMsg_GUID
),
1322 &pWSARecvMsg
, sizeof(pWSARecvMsg
), &dwBytes
, NULL
, NULL
);
1325 win_skip("WSARecvMsg is unsupported, some tests will be skipped.\n");
1330 /* Setup the server side socket */
1331 rc
=bind(s1
, (struct sockaddr
*)&s1addr
, sizeof(s1addr
));
1332 ok(rc
!= SOCKET_ERROR
, "bind() failed error: %d\n", WSAGetLastError());
1333 rc
=setsockopt(s1
, IPPROTO_IP
, IP_PKTINFO
, (const char*)&yes
, sizeof(yes
));
1334 ok(rc
== 0, "failed to set IPPROTO_IP flag IP_PKTINFO!\n");
1336 /* Build "client" side socket */
1337 addrlen
= sizeof(s2addr
);
1338 if (getsockname(s1
, (struct sockaddr
*) &s2addr
, &addrlen
) != 0)
1340 skip("Failed to call getsockname, some tests skipped: %d\n", WSAGetLastError());
1344 s2addr
.sin_addr
.s_addr
= addresses
[0]; /* Always target the local adapter address */
1345 s2
=socket(AF_INET
, SOCK_DGRAM
, 0);
1346 if (s2
== INVALID_SOCKET
)
1348 skip("socket() failed error, some tests skipped: %d\n", WSAGetLastError());
1353 /* Test an empty message header */
1354 rc
=pWSARecvMsg(s1
, NULL
, NULL
, NULL
, NULL
);
1355 err
=WSAGetLastError();
1356 ok(rc
== SOCKET_ERROR
&& err
== WSAEFAULT
, "WSARecvMsg() failed error: %d (ret = %d)\n", err
, rc
);
1359 * Send a packet from the client to the server and test for specifying
1360 * a short control header.
1362 rc
=sendto(s2
, msg
, sizeof(msg
), 0, (struct sockaddr
*)&s2addr
, sizeof(s2addr
));
1363 ok(rc
== sizeof(msg
), "sendto() failed error: %d\n", WSAGetLastError());
1364 hdr
.Control
.len
= 1;
1365 rc
=pWSARecvMsg(s1
, &hdr
, &dwSize
, NULL
, NULL
);
1366 err
=WSAGetLastError();
1367 ok(rc
== SOCKET_ERROR
&& err
== WSAEMSGSIZE
&& (hdr
.dwFlags
& MSG_CTRUNC
),
1368 "WSARecvMsg() failed error: %d (ret: %d, flags: %d)\n", err
, rc
, hdr
.dwFlags
);
1369 hdr
.dwFlags
= 0; /* Reset flags */
1371 /* Perform another short control header test, this time with an overlapped receive */
1372 hdr
.Control
.len
= 1;
1373 rc
=pWSARecvMsg(s1
, &hdr
, NULL
, &ov
, NULL
);
1374 err
=WSAGetLastError();
1375 ok(rc
!= 0 && err
== WSA_IO_PENDING
, "WSARecvMsg() failed error: %d\n", err
);
1376 rc
=sendto(s2
, msg
, sizeof(msg
), 0, (struct sockaddr
*)&s2addr
, sizeof(s2addr
));
1377 ok(rc
== sizeof(msg
), "sendto() failed error: %d\n", WSAGetLastError());
1378 if (WaitForSingleObject(ov
.hEvent
, 100) != WAIT_OBJECT_0
)
1380 skip("Server side did not receive packet, some tests skipped.\n");
1386 WSAGetOverlappedResult(s1
, &ov
, NULL
, FALSE
, &dwFlags
);
1388 "WSAGetOverlappedResult() returned unexpected flags %d!\n", dwFlags
);
1389 ok(hdr
.dwFlags
== MSG_CTRUNC
,
1390 "WSARecvMsg() overlapped operation set unexpected flags %d.\n", hdr
.dwFlags
);
1391 hdr
.dwFlags
= 0; /* Reset flags */
1394 * Setup an overlapped receive, send a packet, then wait for the packet to be retrieved
1395 * on the server end and check that the returned packet matches what was sent.
1397 hdr
.Control
.len
= sizeof(pktbuf
);
1398 rc
=pWSARecvMsg(s1
, &hdr
, NULL
, &ov
, NULL
);
1399 err
=WSAGetLastError();
1400 ok(rc
!= 0 && err
== WSA_IO_PENDING
, "WSARecvMsg() failed error: %d\n", err
);
1401 ok(hdr
.Control
.len
== sizeof(pktbuf
),
1402 "WSARecvMsg() control length mismatch (%d != sizeof pktbuf).\n", hdr
.Control
.len
);
1403 rc
=sendto(s2
, msg
, sizeof(msg
), 0, (struct sockaddr
*)&s2addr
, sizeof(s2addr
));
1404 ok(rc
== sizeof(msg
), "sendto() failed error: %d\n", WSAGetLastError());
1405 if (WaitForSingleObject(ov
.hEvent
, 100) != WAIT_OBJECT_0
)
1407 skip("Server side did not receive packet, some tests skipped.\n");
1413 WSAGetOverlappedResult(s1
, &ov
, &dwSize
, FALSE
, NULL
);
1414 ok(dwSize
== sizeof(msg
),
1415 "WSARecvMsg() buffer length does not match transmitted data!\n");
1416 ok(strncmp(iovec
[0].buf
, msg
, sizeof(msg
)) == 0,
1417 "WSARecvMsg() buffer does not match transmitted data!\n");
1418 ok(hdr
.Control
.len
== IP_PKTINFO_LEN
,
1419 "WSARecvMsg() control length mismatch (%d).\n", hdr
.Control
.len
);
1421 /* Test for the expected IP_PKTINFO return information. */
1423 for (cmsg
= WSA_CMSG_FIRSTHDR(&hdr
); cmsg
!= NULL
; cmsg
= WSA_CMSG_NXTHDR(&hdr
, cmsg
))
1425 if (cmsg
->cmsg_level
== IPPROTO_IP
&& cmsg
->cmsg_type
== IP_PKTINFO
)
1427 struct in_pktinfo
*pi
= (struct in_pktinfo
*)WSA_CMSG_DATA(cmsg
);
1429 ok(pi
->ipi_addr
.s_addr
== s2addr
.sin_addr
.s_addr
, "destination ip mismatch!\n");
1433 ok(foundhdr
, "IP_PKTINFO header information was not returned!\n");
1440 CloseHandle(ov
.hEvent
);
1443 /************* Array containing the tests to run **********/
1445 #define STD_STREAM_SOCKET \
1451 static test_setup tests
[] =
1453 /* Test 0: synchronous client and server */
1474 /* Test 1: event-driven client, synchronous server */
1491 WSA_FLAG_OVERLAPPED
,
1495 /* Test 2: synchronous client, non-blocking server via select() */
1516 /* Test 3: OOB client, OOB server */
1537 /* Test 4: synchronous mixed client and server */
1551 simple_mixed_client
,
1560 static void test_UDP(void)
1562 /* This function tests UDP sendto() and recvfrom(). UDP is unreliable, so it is
1563 possible that this test fails due to dropped packets. */
1565 /* peer 0 receives data from all other peers */
1566 struct sock_info peer
[NUM_UDP_PEERS
];
1568 int ss
, i
, n_recv
, n_sent
;
1570 memset (buf
,0,sizeof(buf
));
1571 for ( i
= NUM_UDP_PEERS
- 1; i
>= 0; i
-- ) {
1572 ok ( ( peer
[i
].s
= socket ( AF_INET
, SOCK_DGRAM
, 0 ) ) != INVALID_SOCKET
, "UDP: socket failed\n" );
1574 peer
[i
].addr
.sin_family
= AF_INET
;
1575 peer
[i
].addr
.sin_addr
.s_addr
= inet_addr ( SERVERIP
);
1578 peer
[i
].addr
.sin_port
= htons ( SERVERPORT
);
1580 peer
[i
].addr
.sin_port
= htons ( 0 );
1583 do_bind ( peer
[i
].s
, (struct sockaddr
*) &peer
[i
].addr
, sizeof( peer
[i
].addr
) );
1585 /* test getsockname() to get peer's port */
1586 ss
= sizeof ( peer
[i
].addr
);
1587 ok ( getsockname ( peer
[i
].s
, (struct sockaddr
*) &peer
[i
].addr
, &ss
) != SOCKET_ERROR
, "UDP: could not getsockname()\n" );
1588 ok ( peer
[i
].addr
.sin_port
!= htons ( 0 ), "UDP: bind() did not associate port\n" );
1591 /* test getsockname() */
1592 ok ( peer
[0].addr
.sin_port
== htons ( SERVERPORT
), "UDP: getsockname returned incorrect peer port\n" );
1594 for ( i
= 1; i
< NUM_UDP_PEERS
; i
++ ) {
1595 /* send client's ip */
1596 memcpy( buf
, &peer
[i
].addr
.sin_port
, sizeof(peer
[i
].addr
.sin_port
) );
1597 n_sent
= sendto ( peer
[i
].s
, buf
, sizeof(buf
), 0, (struct sockaddr
*) &peer
[0].addr
, sizeof(peer
[0].addr
) );
1598 ok ( n_sent
== sizeof(buf
), "UDP: sendto() sent wrong amount of data or socket error: %d\n", n_sent
);
1601 for ( i
= 1; i
< NUM_UDP_PEERS
; i
++ ) {
1602 n_recv
= recvfrom ( peer
[0].s
, buf
, sizeof(buf
), 0,(struct sockaddr
*) &peer
[0].peer
, &ss
);
1603 ok ( n_recv
== sizeof(buf
), "UDP: recvfrom() received wrong amount of data or socket error: %d\n", n_recv
);
1604 ok ( memcmp ( &peer
[0].peer
.sin_port
, buf
, sizeof(peer
[0].addr
.sin_port
) ) == 0, "UDP: port numbers do not match\n" );
1608 static DWORD WINAPI
do_getservbyname( void *param
)
1614 } serv
[2] = { {"domain", "udp", 53}, {"telnet", "tcp", 23} };
1616 HANDLE
*starttest
= param
;
1618 struct servent
*pserv
[2];
1620 ok ( WaitForSingleObject ( *starttest
, TEST_TIMEOUT
* 1000 ) != WAIT_TIMEOUT
, "test_getservbyname: timeout waiting for start signal\n");
1622 /* ensure that necessary buffer resizes are completed */
1623 for ( j
= 0; j
< 2; j
++) {
1624 pserv
[j
] = getservbyname ( serv
[j
].name
, serv
[j
].proto
);
1627 for ( i
= 0; i
< NUM_QUERIES
/ 2; i
++ ) {
1628 for ( j
= 0; j
< 2; j
++ ) {
1629 pserv
[j
] = getservbyname ( serv
[j
].name
, serv
[j
].proto
);
1630 ok ( pserv
[j
] != NULL
, "getservbyname could not retrieve information for %s: %d\n", serv
[j
].name
, WSAGetLastError() );
1631 if ( !pserv
[j
] ) continue;
1632 ok ( pserv
[j
]->s_port
== htons(serv
[j
].port
), "getservbyname returned the wrong port for %s: %d\n", serv
[j
].name
, ntohs(pserv
[j
]->s_port
) );
1633 ok ( !strcmp ( pserv
[j
]->s_proto
, serv
[j
].proto
), "getservbyname returned the wrong protocol for %s: %s\n", serv
[j
].name
, pserv
[j
]->s_proto
);
1634 ok ( !strcmp ( pserv
[j
]->s_name
, serv
[j
].name
), "getservbyname returned the wrong name for %s: %s\n", serv
[j
].name
, pserv
[j
]->s_name
);
1637 ok ( pserv
[0] == pserv
[1], "getservbyname: winsock resized servent buffer when not necessary\n" );
1643 static void test_getservbyname(void)
1646 HANDLE starttest
, thread
[NUM_THREADS
];
1647 DWORD thread_id
[NUM_THREADS
];
1649 starttest
= CreateEvent ( NULL
, 1, 0, "test_getservbyname_starttest" );
1651 /* create threads */
1652 for ( i
= 0; i
< NUM_THREADS
; i
++ ) {
1653 thread
[i
] = CreateThread ( NULL
, 0, do_getservbyname
, &starttest
, 0, &thread_id
[i
] );
1656 /* signal threads to start */
1657 SetEvent ( starttest
);
1659 for ( i
= 0; i
< NUM_THREADS
; i
++) {
1660 WaitForSingleObject ( thread
[i
], TEST_TIMEOUT
* 1000 );
1664 static void test_WSASocket(void)
1666 SOCKET sock
= INVALID_SOCKET
;
1667 WSAPROTOCOL_INFOA
*pi
;
1668 int providers
[] = {6, 0};
1672 /* Set pi_size explicitly to a value below 2*sizeof(WSAPROTOCOL_INFOA)
1673 * to avoid a crash on win98.
1676 ret
= WSAEnumProtocolsA(providers
, NULL
, &pi_size
);
1677 ok(ret
== SOCKET_ERROR
, "WSAEnumProtocolsA({6,0}, NULL, 0) returned %d\n",
1679 err
= WSAGetLastError();
1680 ok(err
== WSAENOBUFS
, "WSAEnumProtocolsA error is %d, not WSAENOBUFS(%d)\n",
1683 pi
= HeapAlloc(GetProcessHeap(), 0, pi_size
);
1684 ok(pi
!= NULL
, "Failed to allocate memory\n");
1686 skip("Can't continue without memory.\n");
1690 ret
= WSAEnumProtocolsA(providers
, pi
, &pi_size
);
1691 ok(ret
!= SOCKET_ERROR
, "WSAEnumProtocolsA failed, last error is %d\n",
1695 skip("No protocols enumerated.\n");
1696 HeapFree(GetProcessHeap(), 0, pi
);
1700 sock
= WSASocketA(FROM_PROTOCOL_INFO
, FROM_PROTOCOL_INFO
,
1701 FROM_PROTOCOL_INFO
, &pi
[0], 0, 0);
1702 ok(sock
!= INVALID_SOCKET
, "Failed to create socket: %d\n",
1706 HeapFree(GetProcessHeap(), 0, pi
);
1709 static void test_WSAAddressToStringA(void)
1711 SOCKET v6
= INVALID_SOCKET
;
1715 SOCKADDR_IN sockaddr
;
1716 CHAR address
[22]; /* 12 digits + 3 dots + ':' + 5 digits + '\0' */
1718 CHAR expect1
[] = "0.0.0.0";
1719 CHAR expect2
[] = "255.255.255.255";
1720 CHAR expect3
[] = "0.0.0.0:65535";
1721 CHAR expect4
[] = "255.255.255.255:65535";
1723 SOCKADDR_IN6 sockaddr6
;
1724 CHAR address6
[54]; /* 32 digits + 7':' + '[' + '%" + 5 digits + ']:' + 5 digits + '\0' */
1726 CHAR addr6_1
[] = {0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x01};
1727 CHAR addr6_2
[] = {0x20,0xab,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x01};
1728 CHAR addr6_3
[] = {0x20,0xab,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x20,0x01};
1730 CHAR expect6_1
[] = "::1";
1731 CHAR expect6_2
[] = "20ab::1";
1732 CHAR expect6_3
[] = "[20ab::2001]:33274";
1733 CHAR expect6_3_nt
[] = "20ab::2001@33274";
1734 CHAR expect6_3_w2k
[] = "20ab::2001";
1735 CHAR expect6_3_2
[] = "[20ab::2001%4660]:33274";
1736 CHAR expect6_3_2_nt
[] = "4660/20ab::2001@33274";
1737 CHAR expect6_3_2_w2k
[] = "20ab::2001%4660";
1738 CHAR expect6_3_3
[] = "20ab::2001%4660";
1739 CHAR expect6_3_3_nt
[] = "4660/20ab::2001";
1743 sockaddr
.sin_family
= AF_INET
;
1744 sockaddr
.sin_port
= 0;
1745 sockaddr
.sin_addr
.s_addr
= 0;
1747 ret
= WSAAddressToStringA( (SOCKADDR
*)&sockaddr
, sizeof(sockaddr
), NULL
, address
, &len
);
1748 GLE
= WSAGetLastError();
1749 ok( (ret
== SOCKET_ERROR
&& GLE
== WSAEFAULT
) || (ret
== 0),
1750 "WSAAddressToStringA() failed unexpectedly: WSAGetLastError()=%d, ret=%d\n",
1753 len
= sizeof(address
);
1755 sockaddr
.sin_family
= AF_INET
;
1756 sockaddr
.sin_port
= 0;
1757 sockaddr
.sin_addr
.s_addr
= 0;
1759 ret
= WSAAddressToStringA( (SOCKADDR
*)&sockaddr
, sizeof(sockaddr
), NULL
, address
, &len
);
1760 ok( !ret
, "WSAAddressToStringA() failed unexpectedly: %d\n", WSAGetLastError() );
1762 ok( !strcmp( address
, expect1
), "Expected: %s, got: %s\n", expect1
, address
);
1763 ok( len
== sizeof( expect1
), "Got size %d\n", len
);
1765 len
= sizeof(address
);
1767 sockaddr
.sin_family
= AF_INET
;
1768 sockaddr
.sin_port
= 0;
1769 sockaddr
.sin_addr
.s_addr
= 0xffffffff;
1771 ret
= WSAAddressToStringA( (SOCKADDR
*)&sockaddr
, sizeof(sockaddr
), NULL
, address
, &len
);
1772 ok( !ret
, "WSAAddressToStringA() failed unexpectedly: %d\n", WSAGetLastError() );
1774 ok( !strcmp( address
, expect2
), "Expected: %s, got: %s\n", expect2
, address
);
1776 len
= sizeof(address
);
1778 sockaddr
.sin_family
= AF_INET
;
1779 sockaddr
.sin_port
= 0xffff;
1780 sockaddr
.sin_addr
.s_addr
= 0;
1782 ret
= WSAAddressToStringA( (SOCKADDR
*)&sockaddr
, sizeof(sockaddr
), NULL
, address
, &len
);
1783 ok( !ret
, "WSAAddressToStringA() failed unexpectedly: %d\n", WSAGetLastError() );
1785 ok( !strcmp( address
, expect3
), "Expected: %s, got: %s\n", expect3
, address
);
1787 len
= sizeof(address
);
1789 sockaddr
.sin_family
= AF_INET
;
1790 sockaddr
.sin_port
= 0xffff;
1791 sockaddr
.sin_addr
.s_addr
= 0xffffffff;
1793 ret
= WSAAddressToStringA( (SOCKADDR
*)&sockaddr
, sizeof(sockaddr
), NULL
, address
, &len
);
1794 ok( !ret
, "WSAAddressToStringA() failed unexpectedly: %d\n", WSAGetLastError() );
1796 ok( !strcmp( address
, expect4
), "Expected: %s, got: %s\n", expect4
, address
);
1797 ok( len
== sizeof( expect4
), "Got size %d\n", len
);
1799 /*check to see it IPv6 is available */
1800 v6
= socket(AF_INET6
, SOCK_STREAM
, IPPROTO_TCP
);
1801 if (v6
== INVALID_SOCKET
) {
1802 skip("Could not create IPv6 socket (LastError: %d; %d expected if IPv6 not available).\n",
1803 WSAGetLastError(), WSAEAFNOSUPPORT
);
1806 /* Test a short IPv6 address */
1807 len
= sizeof(address6
);
1809 sockaddr6
.sin6_family
= AF_INET6
;
1810 sockaddr6
.sin6_port
= 0x0000;
1811 sockaddr6
.sin6_scope_id
= 0;
1812 memcpy (sockaddr6
.sin6_addr
.s6_addr
, addr6_1
, sizeof(addr6_1
));
1814 ret
= WSAAddressToStringA( (SOCKADDR
*)&sockaddr6
, sizeof(sockaddr6
), NULL
, address6
, &len
);
1815 ok( !ret
, "WSAAddressToStringA() failed unexpectedly: %d\n", WSAGetLastError() );
1816 ok( !strcmp( address6
, expect6_1
), "Expected: %s, got: %s\n", expect6_1
, address6
);
1817 ok( len
== sizeof(expect6_1
), "Got size %d\n", len
);
1819 /* Test a longer IPv6 address */
1820 len
= sizeof(address6
);
1822 sockaddr6
.sin6_family
= AF_INET6
;
1823 sockaddr6
.sin6_port
= 0x0000;
1824 sockaddr6
.sin6_scope_id
= 0;
1825 memcpy (sockaddr6
.sin6_addr
.s6_addr
, addr6_2
, sizeof(addr6_2
));
1827 ret
= WSAAddressToStringA( (SOCKADDR
*)&sockaddr6
, sizeof(sockaddr6
), NULL
, address6
, &len
);
1828 ok( !ret
, "WSAAddressToStringA() failed unexpectedly: %d\n", WSAGetLastError() );
1829 ok( !strcmp( address6
, expect6_2
), "Expected: %s, got: %s\n", expect6_2
, address6
);
1830 ok( len
== sizeof(expect6_2
), "Got size %d\n", len
);
1832 /* Test IPv6 address and port number */
1833 len
= sizeof(address6
);
1835 sockaddr6
.sin6_family
= AF_INET6
;
1836 sockaddr6
.sin6_port
= 0xfa81;
1837 sockaddr6
.sin6_scope_id
= 0;
1838 memcpy (sockaddr6
.sin6_addr
.s6_addr
, addr6_3
, sizeof(addr6_3
));
1840 ret
= WSAAddressToStringA( (SOCKADDR
*)&sockaddr6
, sizeof(sockaddr6
), NULL
, address6
, &len
);
1841 ok( !ret
, "WSAAddressToStringA() failed unexpectedly: %d\n", WSAGetLastError() );
1842 ok( !strcmp( address6
, expect6_3
) ||
1843 broken( !strcmp( address6
, expect6_3_nt
) ) || /* NT4 */
1844 broken( !strcmp( address6
, expect6_3_w2k
) ), /* Win2000 */
1845 "Expected: %s, got: %s\n", expect6_3
, address6
);
1846 ok( len
== sizeof(expect6_3
) ||
1847 broken( len
== sizeof(expect6_3_nt
) ) || /* NT4 */
1848 broken( len
== sizeof(expect6_3_w2k
) ), /* Win2000 */
1849 "Got size %d\n", len
);
1851 /* Test IPv6 address, port number and scope_id */
1852 len
= sizeof(address6
);
1854 sockaddr6
.sin6_family
= AF_INET6
;
1855 sockaddr6
.sin6_port
= 0xfa81;
1856 sockaddr6
.sin6_scope_id
= 0x1234;
1857 memcpy (sockaddr6
.sin6_addr
.s6_addr
, addr6_3
, sizeof(addr6_3
));
1859 ret
= WSAAddressToStringA( (SOCKADDR
*)&sockaddr6
, sizeof(sockaddr6
), NULL
, address6
, &len
);
1860 ok( !ret
, "WSAAddressToStringA() failed unexpectedly: %d\n", WSAGetLastError() );
1861 ok( !strcmp( address6
, expect6_3_2
) ||
1862 broken( !strcmp( address6
, expect6_3_2_nt
) ) || /* NT4 */
1863 broken( !strcmp( address6
, expect6_3_2_w2k
) ), /* Win2000 */
1864 "Expected: %s, got: %s\n", expect6_3_2
, address6
);
1865 ok( len
== sizeof(expect6_3_2
) ||
1866 broken( len
== sizeof(expect6_3_2_nt
) ) || /* NT4 */
1867 broken( len
== sizeof(expect6_3_2_w2k
) ), /* Win2000 */
1868 "Got size %d\n", len
);
1870 /* Test IPv6 address and scope_id */
1871 len
= sizeof(address6
);
1873 sockaddr6
.sin6_family
= AF_INET6
;
1874 sockaddr6
.sin6_port
= 0x0000;
1875 sockaddr6
.sin6_scope_id
= 0x1234;
1876 memcpy (sockaddr6
.sin6_addr
.s6_addr
, addr6_3
, sizeof(addr6_3
));
1878 ret
= WSAAddressToStringA( (SOCKADDR
*)&sockaddr6
, sizeof(sockaddr6
), NULL
, address6
, &len
);
1879 ok( !ret
, "WSAAddressToStringA() failed unexpectedly: %d\n", WSAGetLastError() );
1880 ok( !strcmp( address6
, expect6_3_3
) ||
1881 broken( !strcmp( address6
, expect6_3_3_nt
) ), /* NT4 */
1882 "Expected: %s, got: %s\n", expect6_3_3
, address6
);
1883 ok( len
== sizeof(expect6_3_3
) ||
1884 broken( len
== sizeof(expect6_3_3_nt
) ), /* NT4 */
1885 "Got size %d\n", len
);
1888 if (v6
!= INVALID_SOCKET
)
1892 static void test_WSAAddressToStringW(void)
1894 SOCKET v6
= INVALID_SOCKET
;
1898 SOCKADDR_IN sockaddr
;
1899 WCHAR address
[22]; /* 12 digits + 3 dots + ':' + 5 digits + '\0' */
1901 WCHAR expect1
[] = { '0','.','0','.','0','.','0', 0 };
1902 WCHAR expect2
[] = { '2','5','5','.','2','5','5','.','2','5','5','.','2','5','5', 0 };
1903 WCHAR expect3
[] = { '0','.','0','.','0','.','0', ':', '6', '5', '5', '3', '5', 0 };
1904 WCHAR expect4
[] = { '2','5','5','.','2','5','5','.','2','5','5','.','2','5','5', ':',
1905 '6', '5', '5', '3', '5', 0 };
1907 SOCKADDR_IN6 sockaddr6
;
1908 WCHAR address6
[54]; /* 32 digits + 7':' + '[' + '%" + 5 digits + ']:' + 5 digits + '\0' */
1910 CHAR addr6_1
[] = {0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x01};
1911 CHAR addr6_2
[] = {0x20,0xab,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x01};
1912 CHAR addr6_3
[] = {0x20,0xab,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x20,0x01};
1914 WCHAR expect6_1
[] = {':',':','1',0};
1915 WCHAR expect6_2
[] = {'2','0','a','b',':',':','1',0};
1916 WCHAR expect6_3
[] = {'[','2','0','a','b',':',':','2','0','0','1',']',':','3','3','2','7','4',0};
1917 WCHAR expect6_3_nt
[] = {'2','0','a','b',':',':','2','0','0','1','@','3','3','2','7','4',0};
1918 WCHAR expect6_3_w2k
[] = {'2','0','a','b',':',':','2','0','0','1',0};
1919 WCHAR expect6_3_2
[] = {'[','2','0','a','b',':',':','2','0','0','1','%','4','6','6','0',']',':','3','3','2','7','4',0};
1920 WCHAR expect6_3_2_nt
[] = {'4','6','6','0','/','2','0','a','b',':',':','2','0','0','1','@','3','3','2','7','4',0};
1921 WCHAR expect6_3_2_w2k
[] = {'2','0','a','b',':',':','2','0','0','1','%','4','6','6','0',0};
1922 WCHAR expect6_3_3
[] = {'2','0','a','b',':',':','2','0','0','1','%','6','5','5','3','4',0};
1923 WCHAR expect6_3_3_nt
[] = {'6','5','5','3','4','/','2','0','a','b',':',':','2','0','0','1',0};
1927 sockaddr
.sin_family
= AF_INET
;
1928 sockaddr
.sin_port
= 0;
1929 sockaddr
.sin_addr
.s_addr
= 0;
1931 ret
= WSAAddressToStringW( (SOCKADDR
*)&sockaddr
, sizeof(sockaddr
), NULL
, address
, &len
);
1932 GLE
= WSAGetLastError();
1933 ok( (ret
== SOCKET_ERROR
&& GLE
== WSAEFAULT
) || (ret
== 0),
1934 "WSAAddressToStringW() failed unexpectedly: WSAGetLastError()=%d, ret=%d\n",
1937 len
= sizeof(address
);
1939 sockaddr
.sin_family
= AF_INET
;
1940 sockaddr
.sin_port
= 0;
1941 sockaddr
.sin_addr
.s_addr
= 0;
1943 ret
= WSAAddressToStringW( (SOCKADDR
*)&sockaddr
, sizeof(sockaddr
), NULL
, address
, &len
);
1944 ok( !ret
, "WSAAddressToStringW() failed unexpectedly: %d\n", WSAGetLastError() );
1946 ok( !lstrcmpW( address
, expect1
), "Expected different address string\n" );
1947 ok( len
== sizeof( expect1
)/sizeof( WCHAR
), "Got size %d\n", len
);
1949 len
= sizeof(address
);
1951 sockaddr
.sin_family
= AF_INET
;
1952 sockaddr
.sin_port
= 0;
1953 sockaddr
.sin_addr
.s_addr
= 0xffffffff;
1955 ret
= WSAAddressToStringW( (SOCKADDR
*)&sockaddr
, sizeof(sockaddr
), NULL
, address
, &len
);
1956 ok( !ret
, "WSAAddressToStringW() failed unexpectedly: %d\n", WSAGetLastError() );
1958 ok( !lstrcmpW( address
, expect2
), "Expected different address string\n" );
1960 len
= sizeof(address
);
1962 sockaddr
.sin_family
= AF_INET
;
1963 sockaddr
.sin_port
= 0xffff;
1964 sockaddr
.sin_addr
.s_addr
= 0;
1966 ret
= WSAAddressToStringW( (SOCKADDR
*)&sockaddr
, sizeof(sockaddr
), NULL
, address
, &len
);
1967 ok( !ret
, "WSAAddressToStringW() failed unexpectedly: %d\n", WSAGetLastError() );
1969 ok( !lstrcmpW( address
, expect3
), "Expected different address string\n" );
1971 len
= sizeof(address
);
1973 sockaddr
.sin_family
= AF_INET
;
1974 sockaddr
.sin_port
= 0xffff;
1975 sockaddr
.sin_addr
.s_addr
= 0xffffffff;
1977 ret
= WSAAddressToStringW( (SOCKADDR
*)&sockaddr
, sizeof(sockaddr
), NULL
, address
, &len
);
1978 ok( !ret
, "WSAAddressToStringW() failed unexpectedly: %d\n", WSAGetLastError() );
1980 ok( !lstrcmpW( address
, expect4
), "Expected different address string\n" );
1981 ok( len
== sizeof( expect4
)/sizeof( WCHAR
), "Got %d\n", len
);
1983 /*check to see it IPv6 is available */
1984 v6
= socket(AF_INET6
, SOCK_STREAM
, IPPROTO_TCP
);
1985 if (v6
== INVALID_SOCKET
) {
1986 skip("Could not create IPv6 socket (LastError: %d; %d expected if IPv6 not available).\n",
1987 WSAGetLastError(), WSAEAFNOSUPPORT
);
1991 /* Test a short IPv6 address */
1992 len
= sizeof(address6
)/sizeof(WCHAR
);
1994 sockaddr6
.sin6_family
= AF_INET6
;
1995 sockaddr6
.sin6_port
= 0x0000;
1996 sockaddr6
.sin6_scope_id
= 0;
1997 memcpy (sockaddr6
.sin6_addr
.s6_addr
, addr6_1
, sizeof(addr6_1
));
1999 ret
= WSAAddressToStringW( (SOCKADDR
*)&sockaddr6
, sizeof(sockaddr6
), NULL
, address6
, &len
);
2000 ok( !ret
, "WSAAddressToStringW() failed unexpectedly: %d\n", WSAGetLastError() );
2001 ok( !lstrcmpW( address6
, expect6_1
), "Wrong string returned\n" );
2002 ok( len
== sizeof(expect6_1
)/sizeof(WCHAR
), "Got %d\n", len
);
2004 /* Test a longer IPv6 address */
2005 len
= sizeof(address6
)/sizeof(WCHAR
);
2007 sockaddr6
.sin6_family
= AF_INET6
;
2008 sockaddr6
.sin6_port
= 0x0000;
2009 sockaddr6
.sin6_scope_id
= 0;
2010 memcpy (sockaddr6
.sin6_addr
.s6_addr
, addr6_2
, sizeof(addr6_2
));
2012 ret
= WSAAddressToStringW( (SOCKADDR
*)&sockaddr6
, sizeof(sockaddr6
), NULL
, address6
, &len
);
2013 ok( !ret
, "WSAAddressToStringW() failed unexpectedly: %d\n", WSAGetLastError() );
2015 ok( !lstrcmpW( address6
, expect6_2
), "Wrong string returned\n" );
2016 ok( len
== sizeof(expect6_2
)/sizeof(WCHAR
), "Got %d\n", len
);
2018 /* Test IPv6 address and port number */
2019 len
= sizeof(address6
)/sizeof(WCHAR
);
2021 sockaddr6
.sin6_family
= AF_INET6
;
2022 sockaddr6
.sin6_port
= 0xfa81;
2023 sockaddr6
.sin6_scope_id
= 0;
2024 memcpy (sockaddr6
.sin6_addr
.s6_addr
, addr6_3
, sizeof(addr6_3
));
2026 ret
= WSAAddressToStringW( (SOCKADDR
*)&sockaddr6
, sizeof(sockaddr6
), NULL
, address6
, &len
);
2027 ok( !ret
, "WSAAddressToStringW() failed unexpectedly: %d\n", WSAGetLastError() );
2028 ok( !lstrcmpW( address6
, expect6_3
) ||
2029 broken( !lstrcmpW( address6
, expect6_3_nt
) ) || /* NT4 */
2030 broken( !lstrcmpW( address6
, expect6_3_w2k
) ), /* Win2000 */
2031 "Expected: %s, got: %s\n", wine_dbgstr_w(expect6_3
),
2032 wine_dbgstr_w(address6
) );
2033 ok( len
== sizeof(expect6_3
)/sizeof(WCHAR
) ||
2034 broken(len
== sizeof(expect6_3_nt
)/sizeof(WCHAR
) ) || /* NT4 */
2035 broken(len
== sizeof(expect6_3_w2k
)/sizeof(WCHAR
) ), /* Win2000 */
2038 /* Test IPv6 address, port number and scope_id */
2039 len
= sizeof(address6
)/sizeof(WCHAR
);
2041 sockaddr6
.sin6_family
= AF_INET6
;
2042 sockaddr6
.sin6_port
= 0xfa81;
2043 sockaddr6
.sin6_scope_id
= 0x1234;
2044 memcpy (sockaddr6
.sin6_addr
.s6_addr
, addr6_3
, sizeof(addr6_3
));
2046 ret
= WSAAddressToStringW( (SOCKADDR
*)&sockaddr6
, sizeof(sockaddr6
), NULL
, address6
, &len
);
2047 ok( !ret
, "WSAAddressToStringW() failed unexpectedly: %d\n", WSAGetLastError() );
2048 ok( !lstrcmpW( address6
, expect6_3_2
) ||
2049 broken( !lstrcmpW( address6
, expect6_3_2_nt
) ) || /* NT4 */
2050 broken( !lstrcmpW( address6
, expect6_3_2_w2k
) ), /* Win2000 */
2051 "Expected: %s, got: %s\n", wine_dbgstr_w(expect6_3_2
),
2052 wine_dbgstr_w(address6
) );
2053 ok( len
== sizeof(expect6_3_2
)/sizeof(WCHAR
) ||
2054 broken( len
== sizeof(expect6_3_2_nt
)/sizeof(WCHAR
) ) || /* NT4 */
2055 broken( len
== sizeof(expect6_3_2_w2k
)/sizeof(WCHAR
) ), /* Win2000 */
2058 /* Test IPv6 address and scope_id */
2059 len
= sizeof(address6
)/sizeof(WCHAR
);
2061 sockaddr6
.sin6_family
= AF_INET6
;
2062 sockaddr6
.sin6_port
= 0x0000;
2063 sockaddr6
.sin6_scope_id
= 0xfffe;
2064 memcpy (sockaddr6
.sin6_addr
.s6_addr
, addr6_3
, sizeof(addr6_3
));
2066 ret
= WSAAddressToStringW( (SOCKADDR
*)&sockaddr6
, sizeof(sockaddr6
), NULL
, address6
, &len
);
2067 ok( !ret
, "WSAAddressToStringW() failed unexpectedly: %d\n", WSAGetLastError() );
2068 ok( !lstrcmpW( address6
, expect6_3_3
) ||
2069 broken( !lstrcmpW( address6
, expect6_3_3_nt
) ), /* NT4 */
2070 "Expected: %s, got: %s\n", wine_dbgstr_w(expect6_3_3
),
2071 wine_dbgstr_w(address6
) );
2072 ok( len
== sizeof(expect6_3_3
)/sizeof(WCHAR
) ||
2073 broken( len
== sizeof(expect6_3_3_nt
)/sizeof(WCHAR
) ), /* NT4 */
2077 if (v6
!= INVALID_SOCKET
)
2081 static void test_WSAStringToAddressA(void)
2084 SOCKADDR_IN sockaddr
;
2085 SOCKADDR_IN6 sockaddr6
;
2088 CHAR address1
[] = "0.0.0.0";
2089 CHAR address2
[] = "127.127.127.127";
2090 CHAR address3
[] = "255.255.255.255";
2091 CHAR address4
[] = "127.127.127.127:65535";
2092 CHAR address5
[] = "255.255.255.255:65535";
2093 CHAR address6
[] = "::1";
2094 CHAR address7
[] = "[::1]";
2095 CHAR address8
[] = "[::1]:65535";
2098 sockaddr
.sin_family
= AF_INET
;
2100 ret
= WSAStringToAddressA( address1
, AF_INET
, NULL
, (SOCKADDR
*)&sockaddr
, &len
);
2101 ok( ret
== SOCKET_ERROR
, "WSAStringToAddressA() succeeded unexpectedly: %d\n",
2102 WSAGetLastError() );
2104 len
= sizeof(sockaddr
);
2105 sockaddr
.sin_port
= 0;
2106 sockaddr
.sin_addr
.s_addr
= 0;
2108 ret
= WSAStringToAddressA( address1
, AF_INET
, NULL
, (SOCKADDR
*)&sockaddr
, &len
);
2109 ok( !ret
&& sockaddr
.sin_addr
.s_addr
== 0,
2110 "WSAStringToAddressA() failed unexpectedly: %d\n", WSAGetLastError() );
2112 len
= sizeof(sockaddr
);
2113 sockaddr
.sin_port
= 0;
2114 sockaddr
.sin_addr
.s_addr
= 0;
2116 ret
= WSAStringToAddressA( address2
, AF_INET
, NULL
, (SOCKADDR
*)&sockaddr
, &len
);
2117 ok( !ret
&& sockaddr
.sin_addr
.s_addr
== 0x7f7f7f7f,
2118 "WSAStringToAddressA() failed unexpectedly: %d\n", WSAGetLastError() );
2120 len
= sizeof(sockaddr
);
2121 sockaddr
.sin_port
= 0;
2122 sockaddr
.sin_addr
.s_addr
= 0;
2124 ret
= WSAStringToAddressA( address3
, AF_INET
, NULL
, (SOCKADDR
*)&sockaddr
, &len
);
2125 GLE
= WSAGetLastError();
2126 ok( (ret
== 0 && sockaddr
.sin_addr
.s_addr
== 0xffffffff) ||
2127 (ret
== SOCKET_ERROR
&& (GLE
== ERROR_INVALID_PARAMETER
|| GLE
== WSAEINVAL
)),
2128 "WSAStringToAddressA() failed unexpectedly: %d\n", GLE
);
2130 len
= sizeof(sockaddr
);
2131 sockaddr
.sin_port
= 0;
2132 sockaddr
.sin_addr
.s_addr
= 0;
2134 ret
= WSAStringToAddressA( address4
, AF_INET
, NULL
, (SOCKADDR
*)&sockaddr
, &len
);
2135 ok( !ret
&& sockaddr
.sin_addr
.s_addr
== 0x7f7f7f7f && sockaddr
.sin_port
== 0xffff,
2136 "WSAStringToAddressA() failed unexpectedly: %d\n", WSAGetLastError() );
2138 len
= sizeof(sockaddr
);
2139 sockaddr
.sin_port
= 0;
2140 sockaddr
.sin_addr
.s_addr
= 0;
2142 ret
= WSAStringToAddressA( address5
, AF_INET
, NULL
, (SOCKADDR
*)&sockaddr
, &len
);
2143 GLE
= WSAGetLastError();
2144 ok( (ret
== 0 && sockaddr
.sin_addr
.s_addr
== 0xffffffff && sockaddr
.sin_port
== 0xffff) ||
2145 (ret
== SOCKET_ERROR
&& (GLE
== ERROR_INVALID_PARAMETER
|| GLE
== WSAEINVAL
)),
2146 "WSAStringToAddressA() failed unexpectedly: %d\n", GLE
);
2148 len
= sizeof(sockaddr6
);
2149 memset(&sockaddr6
, 0, len
);
2150 sockaddr6
.sin6_family
= AF_INET6
;
2152 ret
= WSAStringToAddressA( address6
, AF_INET6
, NULL
, (SOCKADDR
*)&sockaddr6
,
2154 GLE
= WSAGetLastError();
2155 ok( ret
== 0 || (ret
== SOCKET_ERROR
&& GLE
== WSAEINVAL
),
2156 "WSAStringToAddressA() failed for IPv6 address: %d\n", GLE
);
2158 len
= sizeof(sockaddr6
);
2159 memset(&sockaddr6
, 0, len
);
2160 sockaddr6
.sin6_family
= AF_INET6
;
2162 ret
= WSAStringToAddressA( address7
, AF_INET6
, NULL
, (SOCKADDR
*)&sockaddr6
,
2164 GLE
= WSAGetLastError();
2165 ok( ret
== 0 || (ret
== SOCKET_ERROR
&& GLE
== WSAEINVAL
),
2166 "WSAStringToAddressA() failed for IPv6 address: %d\n", GLE
);
2168 len
= sizeof(sockaddr6
);
2169 memset(&sockaddr6
, 0, len
);
2170 sockaddr6
.sin6_family
= AF_INET6
;
2172 ret
= WSAStringToAddressA( address8
, AF_INET6
, NULL
, (SOCKADDR
*)&sockaddr6
,
2174 GLE
= WSAGetLastError();
2175 ok( (ret
== 0 && sockaddr6
.sin6_port
== 0xffff) ||
2176 (ret
== SOCKET_ERROR
&& GLE
== WSAEINVAL
),
2177 "WSAStringToAddressA() failed for IPv6 address: %d\n", GLE
);
2181 static void test_WSAStringToAddressW(void)
2184 SOCKADDR_IN sockaddr
, *sin
;
2185 SOCKADDR_IN6 sockaddr6
;
2186 SOCKADDR_STORAGE sockaddr_storage
;
2189 WCHAR address1
[] = { '0','.','0','.','0','.','0', 0 };
2190 WCHAR address2
[] = { '1','2','7','.','1','2','7','.','1','2','7','.','1','2','7', 0 };
2191 WCHAR address3
[] = { '2','5','5','.','2','5','5','.','2','5','5','.','2','5','5', 0 };
2192 WCHAR address4
[] = { '1','2','7','.','1','2','7','.','1','2','7','.','1','2','7',
2193 ':', '6', '5', '5', '3', '5', 0 };
2194 WCHAR address5
[] = { '2','5','5','.','2','5','5','.','2','5','5','.','2','5','5', ':',
2195 '6', '5', '5', '3', '5', 0 };
2196 WCHAR address6
[] = {':',':','1','\0'};
2197 WCHAR address7
[] = {'[',':',':','1',']','\0'};
2198 WCHAR address8
[] = {'[',':',':','1',']',':','6','5','5','3','5','\0'};
2201 sockaddr
.sin_family
= AF_INET
;
2203 ret
= WSAStringToAddressW( address1
, AF_INET
, NULL
, (SOCKADDR
*)&sockaddr
, &len
);
2204 ok( ret
== SOCKET_ERROR
, "WSAStringToAddressW() failed unexpectedly: %d\n",
2205 WSAGetLastError() );
2207 len
= sizeof(sockaddr
);
2208 sockaddr
.sin_port
= 0;
2209 sockaddr
.sin_addr
.s_addr
= 0;
2211 ret
= WSAStringToAddressW( address1
, AF_INET
, NULL
, (SOCKADDR
*)&sockaddr
, &len
);
2212 ok( !ret
&& sockaddr
.sin_addr
.s_addr
== 0,
2213 "WSAStringToAddressW() failed unexpectedly: %d\n", WSAGetLastError() );
2215 len
= sizeof(sockaddr
);
2216 sockaddr
.sin_port
= 0;
2217 sockaddr
.sin_addr
.s_addr
= 0;
2219 ret
= WSAStringToAddressW( address2
, AF_INET
, NULL
, (SOCKADDR
*)&sockaddr
, &len
);
2220 ok( !ret
&& sockaddr
.sin_addr
.s_addr
== 0x7f7f7f7f,
2221 "WSAStringToAddressW() failed unexpectedly: %d\n", WSAGetLastError() );
2223 len
= sizeof(sockaddr
);
2224 sockaddr
.sin_port
= 0;
2225 sockaddr
.sin_addr
.s_addr
= 0;
2227 ret
= WSAStringToAddressW( address3
, AF_INET
, NULL
, (SOCKADDR
*)&sockaddr
, &len
);
2228 GLE
= WSAGetLastError();
2229 ok( (ret
== 0 && sockaddr
.sin_addr
.s_addr
== 0xffffffff) ||
2230 (ret
== SOCKET_ERROR
&& (GLE
== ERROR_INVALID_PARAMETER
|| GLE
== WSAEINVAL
)),
2231 "WSAStringToAddressW() failed unexpectedly: %d\n", GLE
);
2233 len
= sizeof(sockaddr
);
2234 sockaddr
.sin_port
= 0;
2235 sockaddr
.sin_addr
.s_addr
= 0;
2237 ret
= WSAStringToAddressW( address4
, AF_INET
, NULL
, (SOCKADDR
*)&sockaddr
, &len
);
2238 ok( !ret
&& sockaddr
.sin_addr
.s_addr
== 0x7f7f7f7f && sockaddr
.sin_port
== 0xffff,
2239 "WSAStringToAddressW() failed unexpectedly: %d\n", WSAGetLastError() );
2241 len
= sizeof(sockaddr
);
2242 sockaddr
.sin_port
= 0;
2243 sockaddr
.sin_addr
.s_addr
= 0;
2245 ret
= WSAStringToAddressW( address5
, AF_INET
, NULL
, (SOCKADDR
*)&sockaddr
, &len
);
2246 ok( (ret
== 0 && sockaddr
.sin_addr
.s_addr
== 0xffffffff && sockaddr
.sin_port
== 0xffff) ||
2247 (ret
== SOCKET_ERROR
&& (GLE
== ERROR_INVALID_PARAMETER
|| GLE
== WSAEINVAL
)),
2248 "WSAStringToAddressW() failed unexpectedly: %d\n", GLE
);
2250 /* Test with a larger buffer than necessary */
2251 len
= sizeof(sockaddr_storage
);
2252 sin
= (SOCKADDR_IN
*)&sockaddr_storage
;
2254 sin
->sin_addr
.s_addr
= 0;
2256 ret
= WSAStringToAddressW( address5
, AF_INET
, NULL
, (SOCKADDR
*)sin
, &len
);
2257 ok( (ret
== 0 && sin
->sin_addr
.s_addr
== 0xffffffff && sin
->sin_port
== 0xffff) ||
2258 (ret
== SOCKET_ERROR
&& (GLE
== ERROR_INVALID_PARAMETER
|| GLE
== WSAEINVAL
)),
2259 "WSAStringToAddressW() failed unexpectedly: %d\n", GLE
);
2260 ok( len
== sizeof(SOCKADDR_IN
) ||
2261 broken(len
== sizeof(SOCKADDR_STORAGE
)) /* NT4/2k */,
2262 "unexpected length %d\n", len
);
2264 len
= sizeof(sockaddr6
);
2265 memset(&sockaddr6
, 0, len
);
2266 sockaddr6
.sin6_family
= AF_INET6
;
2268 ret
= WSAStringToAddressW( address6
, AF_INET6
, NULL
, (SOCKADDR
*)&sockaddr6
,
2270 GLE
= WSAGetLastError();
2271 ok( ret
== 0 || (ret
== SOCKET_ERROR
&& GLE
== WSAEINVAL
),
2272 "WSAStringToAddressW() failed for IPv6 address: %d\n", GLE
);
2274 len
= sizeof(sockaddr6
);
2275 memset(&sockaddr6
, 0, len
);
2276 sockaddr6
.sin6_family
= AF_INET6
;
2278 ret
= WSAStringToAddressW( address7
, AF_INET6
, NULL
, (SOCKADDR
*)&sockaddr6
,
2280 GLE
= WSAGetLastError();
2281 ok( ret
== 0 || (ret
== SOCKET_ERROR
&& GLE
== WSAEINVAL
),
2282 "WSAStringToAddressW() failed for IPv6 address: %d\n", GLE
);
2284 len
= sizeof(sockaddr6
);
2285 memset(&sockaddr6
, 0, len
);
2286 sockaddr6
.sin6_family
= AF_INET6
;
2288 ret
= WSAStringToAddressW( address8
, AF_INET6
, NULL
, (SOCKADDR
*)&sockaddr6
,
2290 GLE
= WSAGetLastError();
2291 ok( (ret
== 0 && sockaddr6
.sin6_port
== 0xffff) ||
2292 (ret
== SOCKET_ERROR
&& GLE
== WSAEINVAL
),
2293 "WSAStringToAddressW() failed for IPv6 address: %d\n", GLE
);
2297 static DWORD WINAPI
SelectReadThread(void *param
)
2299 select_thread_params
*par
= param
;
2302 struct sockaddr_in addr
;
2303 struct timeval select_timeout
;
2306 FD_SET(par
->s
, &readfds
);
2307 select_timeout
.tv_sec
=5;
2308 select_timeout
.tv_usec
=0;
2309 addr
.sin_family
= AF_INET
;
2310 addr
.sin_addr
.s_addr
= inet_addr(SERVERIP
);
2311 addr
.sin_port
= htons(SERVERPORT
);
2313 do_bind(par
->s
, (struct sockaddr
*)&addr
, sizeof(addr
));
2314 wsa_ok(listen(par
->s
, SOMAXCONN
), 0 ==, "SelectReadThread (%x): listen failed: %d\n");
2316 SetEvent(server_ready
);
2317 ret
= select(par
->s
+1, &readfds
, NULL
, NULL
, &select_timeout
);
2318 par
->ReadKilled
= (ret
== 1);
2323 static void test_errors(void)
2326 SOCKADDR_IN SockAddr
;
2329 WSASetLastError(NO_ERROR
);
2330 sock
= socket(PF_INET
, SOCK_STREAM
, 0);
2331 ok( (sock
!= INVALID_SOCKET
), "socket failed unexpectedly: %d\n", WSAGetLastError() );
2332 memset(&SockAddr
, 0, sizeof(SockAddr
));
2333 SockAddr
.sin_family
= AF_INET
;
2334 SockAddr
.sin_port
= htons(6924);
2335 SockAddr
.sin_addr
.s_addr
= inet_addr("127.0.0.1");
2337 ret
= connect(sock
, (PSOCKADDR
)&SockAddr
, sizeof(SockAddr
));
2338 ok( (ret
== SOCKET_ERROR
), "expected SOCKET_ERROR, got: %d\n", ret
);
2339 if (ret
== SOCKET_ERROR
)
2341 err
= WSAGetLastError();
2342 ok( (err
== WSAECONNREFUSED
), "expected WSAECONNREFUSED, got: %d\n", err
);
2347 fd_set set
= {1, {sock
}};
2350 timeval
.tv_usec
= 50000;
2352 ret
= select(1, NULL
, &set
, NULL
, &timeval
);
2353 ok( (ret
== 0), "expected 0 (timeout), got: %d\n", ret
);
2356 ret
= closesocket(sock
);
2357 ok ( (ret
== 0), "closesocket failed unexpectedly: %d\n", WSAGetLastError());
2360 static void test_select(void)
2362 SOCKET fdRead
, fdWrite
;
2363 fd_set readfds
, writefds
, exceptfds
;
2367 struct timeval select_timeout
;
2368 select_thread_params thread_params
;
2369 HANDLE thread_handle
;
2372 fdRead
= socket(AF_INET
, SOCK_STREAM
, 0);
2373 ok( (fdRead
!= INVALID_SOCKET
), "socket failed unexpectedly: %d\n", WSAGetLastError() );
2374 fdWrite
= socket(AF_INET
, SOCK_STREAM
, 0);
2375 ok( (fdWrite
!= INVALID_SOCKET
), "socket failed unexpectedly: %d\n", WSAGetLastError() );
2379 FD_ZERO(&exceptfds
);
2380 FD_SET(fdRead
, &readfds
);
2381 FD_SET(fdWrite
, &writefds
);
2382 FD_SET(fdRead
, &exceptfds
);
2383 FD_SET(fdWrite
, &exceptfds
);
2384 select_timeout
.tv_sec
=0;
2385 select_timeout
.tv_usec
=500;
2388 if (fdWrite
> maxfd
)
2392 ret
= select(maxfd
+1, &readfds
, &writefds
, &exceptfds
, &select_timeout
);
2393 ok ( (ret
== 0), "select should not return any socket handles\n");
2394 ok ( !FD_ISSET(fdRead
, &readfds
), "FD should not be set\n");
2396 ok ( !FD_ISSET(fdWrite
, &writefds
), "FD should not be set\n");
2398 ok ( !FD_ISSET(fdRead
, &exceptfds
), "FD should not be set\n");
2399 ok ( !FD_ISSET(fdWrite
, &exceptfds
), "FD should not be set\n");
2402 ok ((listen(fdWrite
, SOMAXCONN
) == SOCKET_ERROR
), "listen did not fail\n");
2404 ret
= closesocket(fdWrite
);
2405 ok ( (ret
== 0), "closesocket failed unexpectedly: %d\n", ret
);
2407 thread_params
.s
= fdRead
;
2408 thread_params
.ReadKilled
= FALSE
;
2409 server_ready
= CreateEventA(NULL
, TRUE
, FALSE
, NULL
);
2410 thread_handle
= CreateThread (NULL
, 0, SelectReadThread
, &thread_params
, 0, &id
);
2411 ok ( (thread_handle
!= NULL
), "CreateThread failed unexpectedly: %d\n", GetLastError());
2413 WaitForSingleObject (server_ready
, INFINITE
);
2415 ret
= closesocket(fdRead
);
2416 ok ( (ret
== 0), "closesocket failed unexpectedly: %d\n", ret
);
2418 WaitForSingleObject (thread_handle
, 1000);
2419 ok ( (thread_params
.ReadKilled
) ||
2420 broken(thread_params
.ReadKilled
== 0), /*Win98*/
2421 "closesocket did not wakeup select\n");
2422 ret
= recv(fdRead
, &buffer
, 1, MSG_PEEK
);
2423 ok( (ret
== -1), "peek at closed socket expected -1 got %d\n", ret
);
2425 /* Test selecting invalid handles */
2428 FD_ZERO(&exceptfds
);
2431 ret
= select(maxfd
+1, 0, 0, 0, &select_timeout
);
2432 ok ( (ret
== SOCKET_ERROR
), "expected SOCKET_ERROR, got %i\n", ret
);
2433 ok ( WSAGetLastError() == WSAEINVAL
, "expected WSAEINVAL, got %i\n", WSAGetLastError());
2436 ret
= select(maxfd
+1, &readfds
, &writefds
, &exceptfds
, &select_timeout
);
2437 ok ( (ret
== SOCKET_ERROR
), "expected SOCKET_ERROR, got %i\n", ret
);
2438 ok ( WSAGetLastError() == WSAEINVAL
, "expected WSAEINVAL, got %i\n", WSAGetLastError());
2440 FD_SET(INVALID_SOCKET
, &readfds
);
2442 ret
= select(maxfd
+1, &readfds
, &writefds
, &exceptfds
, &select_timeout
);
2443 ok ( (ret
== SOCKET_ERROR
), "expected SOCKET_ERROR, got %i\n", ret
);
2444 ok ( WSAGetLastError() == WSAENOTSOCK
, "expected WSAENOTSOCK, got %i\n", WSAGetLastError());
2445 ok ( !FD_ISSET(fdRead
, &readfds
), "FD should not be set\n");
2448 FD_SET(INVALID_SOCKET
, &writefds
);
2450 ret
= select(maxfd
+1, &readfds
, &writefds
, &exceptfds
, &select_timeout
);
2451 ok ( (ret
== SOCKET_ERROR
), "expected SOCKET_ERROR, got %i\n", ret
);
2452 ok ( WSAGetLastError() == WSAENOTSOCK
, "expected WSAENOTSOCK, got %i\n", WSAGetLastError());
2453 ok ( !FD_ISSET(fdRead
, &writefds
), "FD should not be set\n");
2456 FD_SET(INVALID_SOCKET
, &exceptfds
);
2458 ret
= select(maxfd
+1, &readfds
, &writefds
, &exceptfds
, &select_timeout
);
2459 ok ( (ret
== SOCKET_ERROR
), "expected SOCKET_ERROR, got %i\n", ret
);
2460 ok ( WSAGetLastError() == WSAENOTSOCK
, "expected WSAENOTSOCK, got %i\n", WSAGetLastError());
2461 ok ( !FD_ISSET(fdRead
, &exceptfds
), "FD should not be set\n");
2464 static DWORD WINAPI
AcceptKillThread(void *param
)
2466 select_thread_params
*par
= param
;
2467 struct sockaddr_in address
;
2468 int len
= sizeof(address
);
2469 SOCKET client_socket
;
2471 SetEvent(server_ready
);
2472 client_socket
= accept(par
->s
, (struct sockaddr
*) &address
, &len
);
2473 if (client_socket
!= INVALID_SOCKET
)
2474 closesocket(client_socket
);
2475 par
->ReadKilled
= (client_socket
== INVALID_SOCKET
);
2480 static int CALLBACK
AlwaysDeferConditionFunc(LPWSABUF lpCallerId
, LPWSABUF lpCallerData
, LPQOS pQos
,
2481 LPQOS lpGQOS
, LPWSABUF lpCalleeId
, LPWSABUF lpCalleeData
,
2482 GROUP FAR
* g
, DWORD_PTR dwCallbackData
)
2487 static void test_accept(void)
2490 SOCKET server_socket
= INVALID_SOCKET
, accepted
= INVALID_SOCKET
, connector
= INVALID_SOCKET
;
2491 struct sockaddr_in address
;
2493 select_thread_params thread_params
;
2494 HANDLE thread_handle
= NULL
;
2497 server_socket
= socket(AF_INET
, SOCK_STREAM
, 0);
2498 if (server_socket
== INVALID_SOCKET
)
2500 trace("error creating server socket: %d\n", WSAGetLastError());
2504 memset(&address
, 0, sizeof(address
));
2505 address
.sin_addr
.s_addr
= inet_addr("127.0.0.1");
2506 address
.sin_family
= AF_INET
;
2507 ret
= bind(server_socket
, (struct sockaddr
*) &address
, sizeof(address
));
2510 trace("error binding server socket: %d\n", WSAGetLastError());
2514 socklen
= sizeof(address
);
2515 ret
= getsockname(server_socket
, (struct sockaddr
*)&address
, &socklen
);
2517 skip("failed to lookup bind address, error %d\n", WSAGetLastError());
2521 ret
= listen(server_socket
, 5);
2524 trace("error making server socket listen: %d\n", WSAGetLastError());
2528 trace("Blocking accept next\n");
2530 connector
= socket(AF_INET
, SOCK_STREAM
, 0);
2531 ok(connector
!= INVALID_SOCKET
, "Failed to create connector socket, error %d\n", WSAGetLastError());
2533 ret
= connect(connector
, (struct sockaddr
*)&address
, sizeof(address
));
2534 ok(ret
== 0, "connecting to accepting socket failed, error %d\n", WSAGetLastError());
2536 accepted
= WSAAccept(server_socket
, NULL
, NULL
, AlwaysDeferConditionFunc
, 0);
2537 ok(accepted
== INVALID_SOCKET
&& WSAGetLastError() == WSATRY_AGAIN
, "Failed to defer connection, %d\n", WSAGetLastError());
2539 accepted
= accept(server_socket
, NULL
, 0);
2540 ok(accepted
!= INVALID_SOCKET
, "Failed to accept deferred connection, error %d\n", WSAGetLastError());
2542 server_ready
= CreateEventA(NULL
, TRUE
, FALSE
, NULL
);
2543 if (server_ready
== INVALID_HANDLE_VALUE
)
2545 trace("error creating event: %d\n", GetLastError());
2549 thread_params
.s
= server_socket
;
2550 thread_params
.ReadKilled
= FALSE
;
2551 thread_handle
= CreateThread(NULL
, 0, AcceptKillThread
, &thread_params
, 0, &id
);
2552 if (thread_handle
== NULL
)
2554 trace("error creating thread: %d\n", GetLastError());
2558 WaitForSingleObject(server_ready
, INFINITE
);
2560 ret
= closesocket(server_socket
);
2563 trace("closesocket failed: %d\n", WSAGetLastError());
2567 WaitForSingleObject(thread_handle
, 1000);
2568 ok(thread_params
.ReadKilled
|| broken(!thread_params
.ReadKilled
) /* Win98/ME, after accept */,
2569 "closesocket did not wakeup accept\n");
2572 if (accepted
!= INVALID_SOCKET
)
2573 closesocket(accepted
);
2574 if (connector
!= INVALID_SOCKET
)
2575 closesocket(connector
);
2576 if (thread_handle
!= NULL
)
2577 CloseHandle(thread_handle
);
2578 if (server_ready
!= INVALID_HANDLE_VALUE
)
2579 CloseHandle(server_ready
);
2580 if (server_socket
!= INVALID_SOCKET
)
2581 closesocket(server_socket
);
2584 static void test_extendedSocketOptions(void)
2588 struct sockaddr_in sa
;
2589 int sa_len
= sizeof(struct sockaddr_in
);
2590 int optval
, optlen
= sizeof(int), ret
;
2594 if(WSAStartup(MAKEWORD(2,0), &wsa
)){
2595 trace("Winsock failed: %d. Aborting test\n", WSAGetLastError());
2599 memset(&sa
, 0, sa_len
);
2601 sa
.sin_family
= AF_INET
;
2602 sa
.sin_port
= htons(0);
2603 sa
.sin_addr
.s_addr
= htonl(INADDR_ANY
);
2605 if((sock
= socket(PF_INET
, SOCK_DGRAM
, IPPROTO_IP
)) == INVALID_SOCKET
) {
2606 trace("Creating the socket failed: %d\n", WSAGetLastError());
2611 if(bind(sock
, (struct sockaddr
*) &sa
, sa_len
) < 0){
2612 trace("Failed to bind socket: %d\n", WSAGetLastError());
2618 ret
= getsockopt(sock
, SOL_SOCKET
, SO_MAX_MSG_SIZE
, (char *)&optval
, &optlen
);
2620 ok(ret
== 0, "getsockopt failed to query SO_MAX_MSG_SIZE, return value is 0x%08x\n", ret
);
2621 ok((optval
== 65507) || (optval
== 65527),
2622 "SO_MAX_MSG_SIZE reported %d, expected 65507 or 65527\n", optval
);
2624 /* IE 3 use 0xffffffff instead of SOL_SOCKET (0xffff) */
2625 SetLastError(0xdeadbeef);
2626 optval
= 0xdeadbeef;
2627 optlen
= sizeof(int);
2628 ret
= getsockopt(sock
, 0xffffffff, SO_MAX_MSG_SIZE
, (char *)&optval
, &optlen
);
2629 ok( (ret
== SOCKET_ERROR
) && (WSAGetLastError() == WSAEINVAL
),
2630 "got %d with %d and optval: 0x%x/%d (expected SOCKET_ERROR with WSAEINVAL)\n",
2631 ret
, WSAGetLastError(), optval
, optval
);
2633 /* more invalid values for level */
2634 SetLastError(0xdeadbeef);
2635 optval
= 0xdeadbeef;
2636 optlen
= sizeof(int);
2637 ret
= getsockopt(sock
, 0x1234ffff, SO_MAX_MSG_SIZE
, (char *)&optval
, &optlen
);
2638 ok( (ret
== SOCKET_ERROR
) && (WSAGetLastError() == WSAEINVAL
),
2639 "got %d with %d and optval: 0x%x/%d (expected SOCKET_ERROR with WSAEINVAL)\n",
2640 ret
, WSAGetLastError(), optval
, optval
);
2642 SetLastError(0xdeadbeef);
2643 optval
= 0xdeadbeef;
2644 optlen
= sizeof(int);
2645 ret
= getsockopt(sock
, 0x8000ffff, SO_MAX_MSG_SIZE
, (char *)&optval
, &optlen
);
2646 ok( (ret
== SOCKET_ERROR
) && (WSAGetLastError() == WSAEINVAL
),
2647 "got %d with %d and optval: 0x%x/%d (expected SOCKET_ERROR with WSAEINVAL)\n",
2648 ret
, WSAGetLastError(), optval
, optval
);
2650 SetLastError(0xdeadbeef);
2651 optval
= 0xdeadbeef;
2652 optlen
= sizeof(int);
2653 ret
= getsockopt(sock
, 0x00008000, SO_MAX_MSG_SIZE
, (char *)&optval
, &optlen
);
2654 ok( (ret
== SOCKET_ERROR
) && (WSAGetLastError() == WSAEINVAL
),
2655 "got %d with %d and optval: 0x%x/%d (expected SOCKET_ERROR with WSAEINVAL)\n",
2656 ret
, WSAGetLastError(), optval
, optval
);
2658 SetLastError(0xdeadbeef);
2659 optval
= 0xdeadbeef;
2660 optlen
= sizeof(int);
2661 ret
= getsockopt(sock
, 0x00000800, SO_MAX_MSG_SIZE
, (char *)&optval
, &optlen
);
2662 ok( (ret
== SOCKET_ERROR
) && (WSAGetLastError() == WSAEINVAL
),
2663 "got %d with %d and optval: 0x%x/%d (expected SOCKET_ERROR with WSAEINVAL)\n",
2664 ret
, WSAGetLastError(), optval
, optval
);
2666 SetLastError(0xdeadbeef);
2667 optlen
= sizeof(LINGER
);
2668 ret
= getsockopt(sock
, SOL_SOCKET
, SO_LINGER
, (char *)&linger_val
, &optlen
);
2669 ok( (ret
== SOCKET_ERROR
) && (WSAGetLastError() == WSAENOPROTOOPT
),
2670 "getsockopt should fail for UDP sockets setting last error to WSAENOPROTOOPT, got %d with %d\n",
2671 ret
, WSAGetLastError());
2674 if((sock
= socket(PF_INET
, SOCK_STREAM
, IPPROTO_IP
)) == INVALID_SOCKET
) {
2675 trace("Creating the socket failed: %d\n", WSAGetLastError());
2680 if(bind(sock
, (struct sockaddr
*) &sa
, sa_len
) < 0){
2681 trace("Failed to bind socket: %d\n", WSAGetLastError());
2687 ret
= getsockopt(sock
, SOL_SOCKET
, SO_LINGER
, (char *)&linger_val
, &optlen
);
2688 ok(ret
== 0, "getsockopt failed to query SO_LINGER, return value is 0x%08x\n", ret
);
2690 optlen
= sizeof(BOOL
);
2691 ret
= getsockopt(sock
, SOL_SOCKET
, SO_DONTLINGER
, (char *)&bool_opt_val
, &optlen
);
2692 ok(ret
== 0, "getsockopt failed to query SO_DONTLINGER, return value is 0x%08x\n", ret
);
2693 ok((linger_val
.l_onoff
&& !bool_opt_val
) || (!linger_val
.l_onoff
&& bool_opt_val
),
2694 "Return value of SO_DONTLINGER is %d, but SO_LINGER returned l_onoff == %d.\n",
2695 bool_opt_val
, linger_val
.l_onoff
);
2701 static void test_getsockname(void)
2705 struct sockaddr_in sa_set
, sa_get
;
2706 int sa_set_len
= sizeof(struct sockaddr_in
);
2707 int sa_get_len
= sa_set_len
;
2708 static const unsigned char null_padding
[] = {0,0,0,0,0,0,0,0};
2711 if(WSAStartup(MAKEWORD(2,0), &wsa
)){
2712 trace("Winsock failed: %d. Aborting test\n", WSAGetLastError());
2716 memset(&sa_set
, 0, sa_set_len
);
2718 sa_set
.sin_family
= AF_INET
;
2719 sa_set
.sin_port
= htons(0);
2720 sa_set
.sin_addr
.s_addr
= htonl(INADDR_ANY
);
2722 if((sock
= socket(PF_INET
, SOCK_STREAM
, IPPROTO_IP
)) == INVALID_SOCKET
) {
2723 trace("Creating the socket failed: %d\n", WSAGetLastError());
2729 if (getsockname(sock
, (struct sockaddr
*) &sa_get
, &sa_get_len
) == 0)
2730 ok(0, "getsockname on unbound socket should fail\n");
2732 ok(WSAGetLastError() == WSAEINVAL
, "getsockname on unbound socket "
2733 "failed with %d, expected %d\n", WSAGetLastError(), WSAEINVAL
);
2734 ok(memcmp(&sa_get
, &sa_set
, sizeof(sa_get
)) == 0,
2735 "failed getsockname modified sockaddr when it shouldn't\n");
2738 if(bind(sock
, (struct sockaddr
*) &sa_set
, sa_set_len
) < 0){
2739 trace("Failed to bind socket: %d\n", WSAGetLastError());
2745 if(getsockname(sock
, (struct sockaddr
*) &sa_get
, &sa_get_len
) != 0){
2746 trace("Failed to call getsockname: %d\n", WSAGetLastError());
2752 ret
= memcmp(sa_get
.sin_zero
, null_padding
, 8);
2753 ok(ret
== 0 || broken(ret
!= 0), /* NT4 */
2754 "getsockname did not zero the sockaddr_in structure\n");
2760 static void test_dns(void)
2771 h
= gethostbyname("");
2772 ok(h
!= NULL
, "gethostbyname(\"\") failed with %d\n", h_errno
);
2774 /* Use an address with valid alias names if possible */
2775 h
= gethostbyname("source.winehq.org");
2778 skip("Can't test the hostent structure because gethostbyname failed\n");
2782 /* The returned struct must be allocated in a very strict way. First we need to
2783 * count how many aliases there are because they must be located right after
2784 * the struct hostent size. Knowing the amount of aliases we know the exact
2785 * location of the first IP returned. Rule valid for >= XP, for older OS's
2786 * it's somewhat the opposite. */
2788 if(h
->h_addr_list
== addr
.mem
) /* <= W2K */
2790 win_skip("Skipping hostent tests since this OS is unsupported\n");
2794 ok(h
->h_aliases
== addr
.mem
,
2795 "hostent->h_aliases should be in %p, it is in %p\n", addr
.mem
, h
->h_aliases
);
2797 for(ptr
= h
->h_aliases
, acount
= 1; *ptr
; ptr
++) acount
++;
2798 addr
.chr
+= sizeof(*ptr
) * acount
;
2799 ok(h
->h_addr_list
== addr
.mem
,
2800 "hostent->h_addr_list should be in %p, it is in %p\n", addr
.mem
, h
->h_addr_list
);
2802 for(ptr
= h
->h_addr_list
, acount
= 1; *ptr
; ptr
++) acount
++;
2804 addr
.chr
+= sizeof(*ptr
) * acount
;
2805 ok(h
->h_addr_list
[0] == addr
.mem
,
2806 "hostent->h_addr_list[0] should be in %p, it is in %p\n", addr
.mem
, h
->h_addr_list
[0]);
2809 /* Our winsock headers don't define gethostname because it conflicts with the
2810 * definition in unistd.h. Define it here to get rid of the warning. */
2812 int WINAPI
gethostname(char *name
, int namelen
);
2814 static void test_gethostbyname_hack(void)
2818 static BYTE loopback
[] = {127, 0, 0, 1};
2819 static BYTE magic_loopback
[] = {127, 12, 34, 56};
2822 ret
= gethostname(name
, 256);
2823 ok(ret
== 0, "gethostname() call failed: %d\n", WSAGetLastError());
2825 he
= gethostbyname("localhost");
2826 ok(he
!= NULL
, "gethostbyname(\"localhost\") failed: %d\n", h_errno
);
2829 if(he
->h_length
!= 4)
2831 skip("h_length is %d, not IPv4, skipping test.\n", he
->h_length
);
2835 ok(memcmp(he
->h_addr_list
[0], loopback
, he
->h_length
) == 0,
2836 "gethostbyname(\"localhost\") returned %d.%d.%d.%d\n",
2837 he
->h_addr_list
[0][0], he
->h_addr_list
[0][1], he
->h_addr_list
[0][2],
2838 he
->h_addr_list
[0][3]);
2841 if(strcmp(name
, "localhost") == 0)
2843 skip("hostname seems to be \"localhost\", skipping test.\n");
2848 he
= gethostbyname(name
);
2849 ok(he
!= NULL
, "gethostbyname(\"%s\") failed: %d\n", name
, h_errno
);
2852 if(he
->h_length
!= 4)
2854 skip("h_length is %d, not IPv4, skipping test.\n", he
->h_length
);
2858 if (he
->h_addr_list
[0][0] == 127)
2860 ok(memcmp(he
->h_addr_list
[0], magic_loopback
, he
->h_length
) == 0,
2861 "gethostbyname(\"%s\") returned %d.%d.%d.%d not 127.12.34.56\n",
2862 name
, he
->h_addr_list
[0][0], he
->h_addr_list
[0][1],
2863 he
->h_addr_list
[0][2], he
->h_addr_list
[0][3]);
2867 gethostbyname("nonexistent.winehq.org");
2868 /* Don't check for the return value, as some braindead ISPs will kindly
2869 * resolve nonexistent host names to addresses of the ISP's spam pages. */
2872 static void test_inet_addr(void)
2876 addr
= inet_addr(NULL
);
2877 ok(addr
== INADDR_NONE
, "inet_addr succeeded unexpectedly\n");
2880 static void test_addr_to_print(void)
2886 struct in6_addr in6
;
2888 u_long addr0_Num
= 0x00000000;
2889 PCSTR addr0_Str
= "0.0.0.0";
2890 u_long addr1_Num
= 0x20201015;
2891 PCSTR addr1_Str
= "21.16.32.32";
2892 u_char addr2_Num
[16] = {0,0,0,0,0,0,0,0,0,0,0xff,0xfe,0xcC,0x98,0xbd,0x74};
2893 PCSTR addr2_Str
= "::fffe:cc98:bd74";
2894 u_char addr3_Num
[16] = {0x20,0x30,0xa4,0xb1};
2895 PCSTR addr3_Str
= "2030:a4b1::";
2896 u_char addr4_Num
[16] = {0,0,0,0,0,0,0,0,0,0,0,0,0xcC,0x98,0xbd,0x74};
2897 PCSTR addr4_Str
= "::204.152.189.116";
2899 /* Test IPv4 addresses */
2900 in
.s_addr
= addr0_Num
;
2902 pdst
= inet_ntoa(*((struct in_addr
*)&in
.s_addr
));
2903 ok(pdst
!= NULL
, "inet_ntoa failed %s\n", dst
);
2904 ok(!strcmp(pdst
, addr0_Str
),"Address %s != %s\n", pdst
, addr0_Str
);
2906 /* Test that inet_ntoa and inet_ntop return the same value */
2907 in
.S_un
.S_addr
= addr1_Num
;
2908 pdst
= inet_ntoa(*((struct in_addr
*)&in
.s_addr
));
2909 ok(pdst
!= NULL
, "inet_ntoa failed %s\n", dst
);
2910 ok(!strcmp(pdst
, addr1_Str
),"Address %s != %s\n", pdst
, addr1_Str
);
2912 /* InetNtop became available in Vista and Win2008 */
2915 win_skip("InetNtop not present, not executing tests\n");
2919 /* Second part of test */
2920 pdst
= pInetNtop(AF_INET
,(void*)&in
.s_addr
, dst
, sizeof(dst
));
2921 ok(pdst
!= NULL
, "InetNtop failed %s\n", dst
);
2922 ok(!strcmp(pdst
, addr1_Str
),"Address %s != %s\n", pdst
, addr1_Str
);
2924 /* Test invalid parm conditions */
2925 pdst
= pInetNtop(1, (void*)&in
.s_addr
, dst
, sizeof(dst
));
2926 ok(pdst
== NULL
, "The pointer should not be returned (%p)\n", pdst
);
2927 ok(WSAGetLastError() == WSAEAFNOSUPPORT
, "Should be WSAEAFNOSUPPORT\n");
2929 /* Test Null destination */
2931 pdst
= pInetNtop(AF_INET
, (void*)&in
.s_addr
, NULL
, sizeof(dst
));
2932 ok(pdst
== NULL
, "The pointer should not be returned (%p)\n", pdst
);
2933 ok(WSAGetLastError() == STATUS_INVALID_PARAMETER
|| WSAGetLastError() == WSAEINVAL
/* Win7 */,
2934 "Should be STATUS_INVALID_PARAMETER or WSAEINVAL not 0x%x\n", WSAGetLastError());
2936 /* Test zero length passed */
2939 pdst
= pInetNtop(AF_INET
, (void*)&in
.s_addr
, dst
, 0);
2940 ok(pdst
== NULL
, "The pointer should not be returned (%p)\n", pdst
);
2941 ok(WSAGetLastError() == STATUS_INVALID_PARAMETER
|| WSAGetLastError() == WSAEINVAL
/* Win7 */,
2942 "Should be STATUS_INVALID_PARAMETER or WSAEINVAL not 0x%x\n", WSAGetLastError());
2944 /* Test length one shorter than the address length */
2947 pdst
= pInetNtop(AF_INET
, (void*)&in
.s_addr
, dst
, 6);
2948 ok(pdst
== NULL
, "The pointer should not be returned (%p)\n", pdst
);
2949 ok(WSAGetLastError() == STATUS_INVALID_PARAMETER
|| WSAGetLastError() == WSAEINVAL
/* Win7 */,
2950 "Should be STATUS_INVALID_PARAMETER or WSAEINVAL not 0x%x\n", WSAGetLastError());
2952 /* Test longer length is ok */
2955 pdst
= pInetNtop(AF_INET
, (void*)&in
.s_addr
, dst
, sizeof(dst
)+1);
2956 ok(pdst
!= NULL
, "The pointer should be returned (%p)\n", pdst
);
2957 ok(!strcmp(pdst
, addr1_Str
),"Address %s != %s\n", pdst
, addr1_Str
);
2959 /* Test the IPv6 addresses */
2961 /* Test an zero prefixed IPV6 address */
2962 memcpy(in6
.u
.Byte
, addr2_Num
, sizeof(addr2_Num
));
2963 pdst
= pInetNtop(AF_INET6
,(void*)&in6
.s6_addr
, dst6
, sizeof(dst6
));
2964 ok(pdst
!= NULL
, "InetNtop failed %s\n", dst6
);
2965 ok(!strcmp(pdst
, addr2_Str
),"Address %s != %s\n", pdst
, addr2_Str
);
2967 /* Test an zero suffixed IPV6 address */
2968 memcpy(in6
.s6_addr
, addr3_Num
, sizeof(addr3_Num
));
2969 pdst
= pInetNtop(AF_INET6
,(void*)&in6
.s6_addr
, dst6
, sizeof(dst6
));
2970 ok(pdst
!= NULL
, "InetNtop failed %s\n", dst6
);
2971 ok(!strcmp(pdst
, addr3_Str
),"Address %s != %s\n", pdst
, addr3_Str
);
2973 /* Test the IPv6 address contains the IPv4 address in IPv4 notation */
2974 memcpy(in6
.s6_addr
, addr4_Num
, sizeof(addr4_Num
));
2975 pdst
= pInetNtop(AF_INET6
, (void*)&in6
.s6_addr
, dst6
, sizeof(dst6
));
2976 ok(pdst
!= NULL
, "InetNtop failed %s\n", dst6
);
2977 ok(!strcmp(pdst
, addr4_Str
),"Address %s != %s\n", pdst
, addr4_Str
);
2979 /* Test invalid parm conditions */
2980 memcpy(in6
.u
.Byte
, addr2_Num
, sizeof(addr2_Num
));
2982 /* Test Null destination */
2984 pdst
= pInetNtop(AF_INET6
, (void*)&in6
.s6_addr
, NULL
, sizeof(dst6
));
2985 ok(pdst
== NULL
, "The pointer should not be returned (%p)\n", pdst
);
2986 ok(WSAGetLastError() == STATUS_INVALID_PARAMETER
|| WSAGetLastError() == WSAEINVAL
/* Win7 */,
2987 "Should be STATUS_INVALID_PARAMETER or WSAEINVAL not 0x%x\n", WSAGetLastError());
2989 /* Test zero length passed */
2992 pdst
= pInetNtop(AF_INET6
, (void*)&in6
.s6_addr
, dst6
, 0);
2993 ok(pdst
== NULL
, "The pointer should not be returned (%p)\n", pdst
);
2994 ok(WSAGetLastError() == STATUS_INVALID_PARAMETER
|| WSAGetLastError() == WSAEINVAL
/* Win7 */,
2995 "Should be STATUS_INVALID_PARAMETER or WSAEINVAL not 0x%x\n", WSAGetLastError());
2997 /* Test length one shorter than the address length */
3000 pdst
= pInetNtop(AF_INET6
, (void*)&in6
.s6_addr
, dst6
, 16);
3001 ok(pdst
== NULL
, "The pointer should not be returned (%p)\n", pdst
);
3002 ok(WSAGetLastError() == STATUS_INVALID_PARAMETER
|| WSAGetLastError() == WSAEINVAL
/* Win7 */,
3003 "Should be STATUS_INVALID_PARAMETER or WSAEINVAL not 0x%x\n", WSAGetLastError());
3005 /* Test longer length is ok */
3008 pdst
= pInetNtop(AF_INET6
, (void*)&in6
.s6_addr
, dst6
, 18);
3009 ok(pdst
!= NULL
, "The pointer should be returned (%p)\n", pdst
);
3012 static void test_ioctlsocket(void)
3015 struct tcp_keepalive kalive
;
3017 static const LONG cmds
[] = {FIONBIO
, FIONREAD
, SIOCATMARK
};
3021 sock
= socket(AF_INET
, SOCK_STREAM
, IPPROTO_TCP
);
3022 ok(sock
!= INVALID_SOCKET
, "Creating the socket failed: %d\n", WSAGetLastError());
3023 if(sock
== INVALID_SOCKET
)
3025 skip("Can't continue without a socket.\n");
3029 for(i
= 0; i
< sizeof(cmds
)/sizeof(cmds
[0]); i
++)
3031 /* broken apps like defcon pass the argp value directly instead of a pointer to it */
3032 ret
= ioctlsocket(sock
, cmds
[i
], (u_long
*)1);
3033 ok(ret
== SOCKET_ERROR
, "ioctlsocket succeeded unexpectedly\n");
3034 ret
= WSAGetLastError();
3035 ok(ret
== WSAEFAULT
, "expected WSAEFAULT, got %d instead\n", ret
);
3038 /* A fresh and not connected socket has no urgent data, this test shows
3039 * that normal(not urgent) data returns a non-zero value for SIOCATMARK. */
3041 ret
= ioctlsocket(sock
, SIOCATMARK
, &arg
);
3042 ok(ret
!= SOCKET_ERROR
, "ioctlsocket failed unexpectedly\n");
3043 ok(arg
, "SIOCATMARK expected a non-zero value\n");
3045 /* when SO_OOBINLINE is set SIOCATMARK must always return TRUE */
3047 ret
= setsockopt(sock
, SOL_SOCKET
, SO_OOBINLINE
, (void *)&optval
, sizeof(optval
));
3048 ok(ret
!= SOCKET_ERROR
, "setsockopt failed unexpectedly\n");
3050 ret
= ioctlsocket(sock
, SIOCATMARK
, &arg
);
3051 ok(ret
!= SOCKET_ERROR
, "ioctlsocket failed unexpectedly\n");
3052 ok(arg
, "SIOCATMARK expected a non-zero value\n");
3054 /* disable SO_OOBINLINE and get the same old behavior */
3056 ret
= setsockopt(sock
, SOL_SOCKET
, SO_OOBINLINE
, (void *)&optval
, sizeof(optval
));
3057 ok(ret
!= SOCKET_ERROR
, "setsockopt failed unexpectedly\n");
3059 ret
= ioctlsocket(sock
, SIOCATMARK
, &arg
);
3060 ok(arg
, "SIOCATMARK expected a non-zero value\n");
3062 ret
= WSAIoctl(sock
, SIO_KEEPALIVE_VALS
, &arg
, 0, NULL
, 0, &arg
, NULL
, NULL
);
3063 ok(ret
== SOCKET_ERROR
, "WSAIoctl succeeded unexpectedly\n");
3064 ret
= WSAGetLastError();
3065 ok(ret
== WSAEFAULT
|| broken(ret
== WSAEINVAL
), "expected WSAEFAULT, got %d instead\n", ret
);
3067 ret
= WSAIoctl(sock
, SIO_KEEPALIVE_VALS
, NULL
, sizeof(struct tcp_keepalive
), NULL
, 0, &arg
, NULL
, NULL
);
3068 ok(ret
== SOCKET_ERROR
, "WSAIoctl succeeded unexpectedly\n");
3069 ret
= WSAGetLastError();
3070 ok(ret
== WSAEFAULT
|| broken(ret
== WSAEINVAL
), "expected WSAEFAULT, got %d instead\n", ret
);
3072 /* broken used to catch W95, W98, NT4 */
3073 make_keepalive(kalive
, 0, 0, 0);
3074 ret
= WSAIoctl(sock
, SIO_KEEPALIVE_VALS
, &kalive
, sizeof(struct tcp_keepalive
), NULL
, 0, &arg
, NULL
, NULL
);
3075 ok(ret
== 0 || broken(ret
== SOCKET_ERROR
), "WSAIoctl failed unexpectedly\n");
3077 make_keepalive(kalive
, 1, 0, 0);
3078 ret
= WSAIoctl(sock
, SIO_KEEPALIVE_VALS
, &kalive
, sizeof(struct tcp_keepalive
), NULL
, 0, &arg
, NULL
, NULL
);
3079 ok(ret
== 0 || broken(ret
== SOCKET_ERROR
), "WSAIoctl failed unexpectedly\n");
3081 make_keepalive(kalive
, 1, 1000, 1000);
3082 ret
= WSAIoctl(sock
, SIO_KEEPALIVE_VALS
, &kalive
, sizeof(struct tcp_keepalive
), NULL
, 0, &arg
, NULL
, NULL
);
3083 ok(ret
== 0 || broken(ret
== SOCKET_ERROR
), "WSAIoctl failed unexpectedly\n");
3085 make_keepalive(kalive
, 1, 10000, 10000);
3086 ret
= WSAIoctl(sock
, SIO_KEEPALIVE_VALS
, &kalive
, sizeof(struct tcp_keepalive
), NULL
, 0, &arg
, NULL
, NULL
);
3087 ok(ret
== 0 || broken(ret
== SOCKET_ERROR
), "WSAIoctl failed unexpectedly\n");
3089 make_keepalive(kalive
, 1, 100, 100);
3090 ret
= WSAIoctl(sock
, SIO_KEEPALIVE_VALS
, &kalive
, sizeof(struct tcp_keepalive
), NULL
, 0, &arg
, NULL
, NULL
);
3091 ok(ret
== 0 || broken(ret
== SOCKET_ERROR
), "WSAIoctl failed unexpectedly\n");
3093 make_keepalive(kalive
, 0, 100, 100);
3094 ret
= WSAIoctl(sock
, SIO_KEEPALIVE_VALS
, &kalive
, sizeof(struct tcp_keepalive
), NULL
, 0, &arg
, NULL
, NULL
);
3095 ok(ret
== 0 || broken(ret
== SOCKET_ERROR
), "WSAIoctl failed unexpectedly\n");
3100 static int drain_pause
=0;
3101 static DWORD WINAPI
drain_socket_thread(LPVOID arg
)
3104 SOCKET sock
= *(SOCKET
*)arg
;
3107 while ((ret
= recv(sock
, buffer
, sizeof(buffer
), 0)) != 0)
3111 if (WSAGetLastError() == WSAEWOULDBLOCK
)
3115 FD_SET(sock
, &readset
);
3116 select(sock
+1, &readset
, NULL
, NULL
, NULL
);
3127 static void test_send(void)
3129 SOCKET src
= INVALID_SOCKET
;
3130 SOCKET dst
= INVALID_SOCKET
;
3131 HANDLE hThread
= NULL
;
3132 const int buflen
= 1024*1024;
3133 char *buffer
= NULL
;
3134 int ret
, i
, zero
= 0;
3138 DWORD id
, bytes_sent
, dwRet
;
3140 memset(&ov
, 0, sizeof(ov
));
3142 if (tcp_socketpair(&src
, &dst
) != 0)
3144 ok(0, "creating socket pair failed, skipping test\n");
3148 set_blocking(dst
, FALSE
);
3149 /* force disable buffering so we can get a pending overlapped request */
3150 ret
= setsockopt(dst
, SOL_SOCKET
, SO_SNDBUF
, (char *) &zero
, sizeof(zero
));
3151 ok(!ret
, "setsockopt SO_SNDBUF failed: %d - %d\n", ret
, GetLastError());
3153 hThread
= CreateThread(NULL
, 0, drain_socket_thread
, &dst
, 0, &id
);
3154 if (hThread
== NULL
)
3156 ok(0, "CreateThread failed, error %d\n", GetLastError());
3160 buffer
= HeapAlloc(GetProcessHeap(), 0, buflen
);
3163 ok(0, "HeapAlloc failed, error %d\n", GetLastError());
3167 /* fill the buffer with some nonsense */
3168 for (i
= 0; i
< buflen
; ++i
)
3170 buffer
[i
] = (char) i
;
3173 ret
= send(src
, buffer
, buflen
, 0);
3175 ok(ret
== buflen
, "send should have sent %d bytes, but it only sent %d\n", buflen
, ret
);
3177 ok(0, "send failed, error %d\n", WSAGetLastError());
3182 ov
.hEvent
= CreateEvent(NULL
, FALSE
, FALSE
, NULL
);
3183 ok(ov
.hEvent
!= NULL
, "could not create event object, errno = %d\n", GetLastError());
3188 WSASetLastError(12345);
3189 ret
= WSASend(dst
, &buf
, 1, &bytes_sent
, 0, &ov
, NULL
);
3190 ok((ret
== SOCKET_ERROR
&& WSAGetLastError() == ERROR_IO_PENDING
) || broken(bytes_sent
== buflen
),
3191 "Failed to start overlapped send %d - %d - %d/%d\n", ret
, WSAGetLastError(), bytes_sent
, buflen
);
3193 /* don't check for completion yet, we may need to drain the buffer while still sending */
3194 set_blocking(src
, FALSE
);
3195 for (i
= 0; i
< buflen
; ++i
)
3199 ret
= recv(src
, buffer
, 1, 0);
3200 while (ret
== SOCKET_ERROR
&& GetLastError() == WSAEWOULDBLOCK
&& j
< 100)
3204 ret
= recv(src
, buffer
, 1, 0);
3207 ok(ret
== 1, "Failed to receive data %d - %d (got %d/%d)\n", ret
, GetLastError(), i
, buflen
);
3211 ok(buffer
[0] == (char) i
, "Received bad data at position %d\n", i
);
3214 dwRet
= WaitForSingleObject(ov
.hEvent
, 1000);
3215 ok(dwRet
== WAIT_OBJECT_0
, "Failed to wait for recv message: %d - %d\n", dwRet
, GetLastError());
3216 if (dwRet
== WAIT_OBJECT_0
)
3218 bret
= GetOverlappedResult((HANDLE
)dst
, &ov
, &bytes_sent
, FALSE
);
3219 ok((bret
&& bytes_sent
== buflen
) || broken(!bret
&& GetLastError() == ERROR_IO_INCOMPLETE
) /* win9x */,
3220 "Got %d instead of %d (%d - %d)\n", bytes_sent
, buflen
, bret
, GetLastError());
3223 WSASetLastError(12345);
3224 ret
= WSASend(INVALID_SOCKET
, &buf
, 1, NULL
, 0, &ov
, NULL
);
3225 ok(ret
== SOCKET_ERROR
&& WSAGetLastError() == WSAENOTSOCK
,
3226 "WSASend failed %d - %d\n", ret
, WSAGetLastError());
3228 WSASetLastError(12345);
3229 ret
= WSASend(dst
, &buf
, 1, NULL
, 0, &ov
, NULL
);
3230 ok(ret
== SOCKET_ERROR
&& WSAGetLastError() == ERROR_IO_PENDING
,
3231 "Failed to start overlapped send %d - %d\n", ret
, WSAGetLastError());
3234 if (src
!= INVALID_SOCKET
)
3236 if (dst
!= INVALID_SOCKET
)
3238 if (hThread
!= NULL
)
3239 CloseHandle(hThread
);
3241 CloseHandle(ov
.hEvent
);
3242 HeapFree(GetProcessHeap(), 0, buffer
);
3245 typedef struct async_message
3249 struct async_message
*next
;
3252 static struct async_message
*messages_received
;
3254 #define WM_SOCKET (WM_USER+100)
3255 static LRESULT CALLBACK
ws2_test_WndProc(HWND hwnd
, UINT msg
, WPARAM wparam
, LPARAM lparam
)
3257 struct async_message
*message
;
3262 message
= HeapAlloc(GetProcessHeap(), 0, sizeof(*message
));
3263 message
->socket
= (SOCKET
) wparam
;
3264 message
->lparam
= lparam
;
3265 message
->next
= NULL
;
3267 if (messages_received
)
3269 struct async_message
*last
= messages_received
;
3270 while (last
->next
) last
= last
->next
;
3271 last
->next
= message
;
3274 messages_received
= message
;
3278 return DefWindowProc(hwnd
, msg
, wparam
, lparam
);
3281 static void get_event_details(int event
, int *bit
, char *name
)
3286 if (bit
) *bit
= FD_ACCEPT_BIT
;
3287 if (name
) strcpy(name
, "FD_ACCEPT");
3290 if (bit
) *bit
= FD_CONNECT_BIT
;
3291 if (name
) strcpy(name
, "FD_CONNECT");
3294 if (bit
) *bit
= FD_READ_BIT
;
3295 if (name
) strcpy(name
, "FD_READ");
3298 if (bit
) *bit
= FD_OOB_BIT
;
3299 if (name
) strcpy(name
, "FD_OOB");
3302 if (bit
) *bit
= FD_WRITE_BIT
;
3303 if (name
) strcpy(name
, "FD_WRITE");
3306 if (bit
) *bit
= FD_CLOSE_BIT
;
3307 if (name
) strcpy(name
, "FD_CLOSE");
3311 if (name
) sprintf(name
, "bad%x", event
);
3315 static const char *dbgstr_event_seq(const LPARAM
*seq
)
3317 static char message
[1024];
3325 get_event_details(WSAGETSELECTEVENT(*seq
), NULL
, name
);
3326 len
+= sprintf(message
+ len
, "%s(%d) ", name
, WSAGETSELECTERROR(*seq
));
3330 strcpy( message
+ len
, "]" );
3334 static char *dbgstr_event_seq_result(SOCKET s
, WSANETWORKEVENTS
*netEvents
)
3336 static char message
[1024];
3337 struct async_message
*curr
= messages_received
;
3338 int index
, error
, bit
= 0;
3348 if (bit
>= FD_MAX_EVENTS
) break;
3349 if ( !(netEvents
->lNetworkEvents
& (1 << bit
)) )
3354 get_event_details(1 << bit
, &index
, name
);
3355 error
= netEvents
->iErrorCode
[index
];
3361 if (curr
->socket
!= s
)
3366 get_event_details(WSAGETSELECTEVENT(curr
->lparam
), NULL
, name
);
3367 error
= WSAGETSELECTERROR(curr
->lparam
);
3371 len
+= sprintf(message
+ len
, "%s(%d) ", name
, error
);
3374 strcpy( message
+ len
, "]" );
3378 static void flush_events(SOCKET s
, HANDLE hEvent
)
3380 WSANETWORKEVENTS netEvents
;
3381 struct async_message
*prev
= NULL
, *curr
= messages_received
;
3385 if (hEvent
!= INVALID_HANDLE_VALUE
)
3387 dwRet
= WaitForSingleObject(hEvent
, 100);
3388 if (dwRet
== WAIT_OBJECT_0
)
3390 ret
= WSAEnumNetworkEvents(s
, hEvent
, &netEvents
);
3392 ok(0, "WSAEnumNetworkEvents failed, error %d\n", ret
);
3399 if (curr
->socket
== s
)
3401 if (prev
) prev
->next
= curr
->next
;
3402 else messages_received
= curr
->next
;
3404 HeapFree(GetProcessHeap(), 0, curr
);
3406 if (prev
) curr
= prev
->next
;
3407 else curr
= messages_received
;
3418 static int match_event_sequence(SOCKET s
, WSANETWORKEVENTS
*netEvents
, const LPARAM
*seq
)
3420 int event
, index
, error
, events
;
3421 struct async_message
*curr
;
3425 events
= netEvents
->lNetworkEvents
;
3428 event
= WSAGETSELECTEVENT(*seq
);
3429 error
= WSAGETSELECTERROR(*seq
);
3430 get_event_details(event
, &index
, NULL
);
3432 if (!(events
& event
) && index
!= -1)
3434 if (events
& event
&& index
!= -1)
3436 if (netEvents
->iErrorCode
[index
] != error
)
3447 curr
= messages_received
;
3450 if (curr
->socket
== s
)
3452 if (!*seq
) return 0;
3453 if (*seq
!= curr
->lparam
) return 0;
3464 /* checks for a sequence of events, (order only checked if window is used) */
3465 static void ok_event_sequence(SOCKET s
, HANDLE hEvent
, const LPARAM
*seq
, const LPARAM
**broken_seqs
, int completelyBroken
)
3468 WSANETWORKEVENTS events
, *netEvents
= NULL
;
3472 if (hEvent
!= INVALID_HANDLE_VALUE
)
3474 netEvents
= &events
;
3476 dwRet
= WaitForSingleObject(hEvent
, 200);
3477 if (dwRet
== WAIT_OBJECT_0
)
3479 ret
= WSAEnumNetworkEvents(s
, hEvent
, netEvents
);
3482 winetest_ok(0, "WSAEnumNetworkEvents failed, error %d\n", ret
);
3487 memset(netEvents
, 0, sizeof(*netEvents
));
3492 /* Run the message loop a little */
3493 while (PeekMessageA( &msg
, 0, 0, 0, PM_REMOVE
))
3495 DispatchMessageA(&msg
);
3499 if (match_event_sequence(s
, netEvents
, seq
))
3501 winetest_ok(1, "Sequence matches expected: %s\n", dbgstr_event_seq(seq
));
3502 flush_events(s
, hEvent
);
3508 for (; *broken_seqs
; broken_seqs
++)
3510 if (match_event_sequence(s
, netEvents
, *broken_seqs
))
3512 winetest_ok(broken(1), "Sequence matches broken: %s, expected %s\n", dbgstr_event_seq_result(s
, netEvents
), dbgstr_event_seq(seq
));
3513 flush_events(s
, hEvent
);
3519 winetest_ok(broken(completelyBroken
), "Expected event sequence %s, got %s\n", dbgstr_event_seq(seq
),
3520 dbgstr_event_seq_result(s
, netEvents
));
3521 flush_events(s
, hEvent
);
3524 #define ok_event_seq (winetest_set_location(__FILE__, __LINE__), 0) ? (void)0 : ok_event_sequence
3526 static void test_events(int useMessages
)
3528 SOCKET server
= INVALID_SOCKET
;
3529 SOCKET src
= INVALID_SOCKET
, src2
= INVALID_SOCKET
;
3530 SOCKET dst
= INVALID_SOCKET
, dst2
= INVALID_SOCKET
;
3531 struct sockaddr_in addr
;
3532 HANDLE hThread
= NULL
;
3533 HANDLE hEvent
= INVALID_HANDLE_VALUE
, hEvent2
= INVALID_HANDLE_VALUE
;
3534 WNDCLASSEX wndclass
;
3536 char *buffer
= NULL
;
3537 int bufferSize
= 1024*1024;
3541 DWORD bytesReturned
;
3547 static char szClassName
[] = "wstestclass";
3548 const LPARAM
*broken_seq
[3];
3549 static const LPARAM empty_seq
[] = { 0 };
3550 static const LPARAM close_seq
[] = { WSAMAKESELECTREPLY(FD_CLOSE
, 0), 0 };
3551 static const LPARAM write_seq
[] = { WSAMAKESELECTREPLY(FD_WRITE
, 0), 0 };
3552 static const LPARAM read_seq
[] = { WSAMAKESELECTREPLY(FD_READ
, 0), 0 };
3553 static const LPARAM oob_seq
[] = { WSAMAKESELECTREPLY(FD_OOB
, 0), 0 };
3554 static const LPARAM connect_seq
[] = { WSAMAKESELECTREPLY(FD_CONNECT
, 0),
3555 WSAMAKESELECTREPLY(FD_WRITE
, 0), 0 };
3556 static const LPARAM read_read_seq
[] = { WSAMAKESELECTREPLY(FD_READ
, 0),
3557 WSAMAKESELECTREPLY(FD_READ
, 0), 0 };
3558 static const LPARAM read_write_seq
[] = { WSAMAKESELECTREPLY(FD_READ
, 0),
3559 WSAMAKESELECTREPLY(FD_WRITE
, 0), 0 };
3560 static const LPARAM read_close_seq
[] = { WSAMAKESELECTREPLY(FD_READ
, 0),
3561 WSAMAKESELECTREPLY(FD_CLOSE
, 0), 0 };
3563 memset(&ov
, 0, sizeof(ov
));
3564 memset(&ov2
, 0, sizeof(ov2
));
3566 /* don't use socketpair, we want connection event */
3567 src
= socket(AF_INET
, SOCK_STREAM
, 0);
3568 if (src
== INVALID_SOCKET
)
3570 ok(0, "creating socket pair failed (%d), skipping test\n", GetLastError());
3574 src2
= socket(AF_INET
, SOCK_STREAM
, 0);
3575 if (src2
== INVALID_SOCKET
)
3577 ok(0, "creating socket pair failed (%d), skipping test\n", GetLastError());
3582 if (getsockopt(src
, SOL_SOCKET
, SO_OOBINLINE
, (void *)&bret
, &len
) == SOCKET_ERROR
)
3584 ok(0, "failed to get oobinline status, %d\n", GetLastError());
3587 ok(bret
== FALSE
, "OOB not inline\n");
3591 trace("Event test using messages\n");
3593 wndclass
.cbSize
= sizeof(wndclass
);
3594 wndclass
.style
= CS_HREDRAW
| CS_VREDRAW
;
3595 wndclass
.lpfnWndProc
= ws2_test_WndProc
;
3596 wndclass
.cbClsExtra
= 0;
3597 wndclass
.cbWndExtra
= 0;
3598 wndclass
.hInstance
= GetModuleHandle(NULL
);
3599 wndclass
.hIcon
= LoadIcon(NULL
, IDI_APPLICATION
);
3600 wndclass
.hIconSm
= LoadIcon(NULL
, IDI_APPLICATION
);
3601 wndclass
.hCursor
= LoadCursor(NULL
, IDC_ARROW
);
3602 wndclass
.hbrBackground
= (HBRUSH
)(COLOR_WINDOW
+ 1);
3603 wndclass
.lpszClassName
= szClassName
;
3604 wndclass
.lpszMenuName
= NULL
;
3605 RegisterClassEx(&wndclass
);
3607 hWnd
= CreateWindow(szClassName
, "WS2Test", WS_OVERLAPPEDWINDOW
, 0, 0, 500, 500, NULL
, NULL
, GetModuleHandle(NULL
), NULL
);
3610 ok(0, "failed to create window: %d\n", GetLastError());
3614 ret
= WSAAsyncSelect(src
, hWnd
, WM_SOCKET
, FD_CONNECT
| FD_READ
| FD_OOB
| FD_WRITE
| FD_CLOSE
);
3617 ok(0, "WSAAsyncSelect failed, error %d\n", ret
);
3621 ret
= WSAAsyncSelect(src2
, hWnd
, WM_SOCKET
, FD_CONNECT
| FD_READ
| FD_OOB
| FD_WRITE
| FD_CLOSE
);
3624 ok(0, "WSAAsyncSelect failed, error %d\n", ret
);
3630 trace("Event test using events\n");
3632 hEvent
= WSACreateEvent();
3633 if (hEvent
== INVALID_HANDLE_VALUE
)
3635 ok(0, "WSACreateEvent failed, error %d\n", GetLastError());
3639 hEvent2
= WSACreateEvent();
3640 if (hEvent2
== INVALID_HANDLE_VALUE
)
3642 ok(0, "WSACreateEvent failed, error %d\n", GetLastError());
3646 ret
= WSAEventSelect(src
, hEvent
, FD_CONNECT
| FD_READ
| FD_OOB
| FD_WRITE
| FD_CLOSE
);
3649 ok(0, "WSAEventSelect failed, error %d\n", ret
);
3653 ret
= WSAEventSelect(src2
, hEvent2
, FD_CONNECT
| FD_READ
| FD_OOB
| FD_WRITE
| FD_CLOSE
);
3656 ok(0, "WSAEventSelect failed, error %d\n", ret
);
3661 server
= socket(AF_INET
, SOCK_STREAM
, 0);
3662 if (server
== INVALID_SOCKET
)
3664 ok(0, "creating socket pair failed (%d), skipping test\n", GetLastError());
3668 memset(&addr
, 0, sizeof(addr
));
3669 addr
.sin_family
= AF_INET
;
3670 addr
.sin_addr
.s_addr
= inet_addr("127.0.0.1");
3671 ret
= bind(server
, (struct sockaddr
*)&addr
, sizeof(addr
));
3674 ok(0, "creating socket pair failed (%d), skipping test\n", GetLastError());
3679 ret
= getsockname(server
, (struct sockaddr
*)&addr
, &len
);
3682 ok(0, "creating socket pair failed (%d), skipping test\n", GetLastError());
3686 ret
= listen(server
, 2);
3689 ok(0, "creating socket pair failed (%d), skipping test\n", GetLastError());
3693 ret
= connect(src
, (struct sockaddr
*)&addr
, sizeof(addr
));
3694 if (ret
== SOCKET_ERROR
&& WSAGetLastError() != WSAEWOULDBLOCK
)
3696 ok(0, "creating socket pair failed (%d), skipping test\n", GetLastError());
3700 ret
= connect(src2
, (struct sockaddr
*)&addr
, sizeof(addr
));
3701 if (ret
== SOCKET_ERROR
&& WSAGetLastError() != WSAEWOULDBLOCK
)
3703 ok(0, "creating socket pair failed (%d), skipping test\n", GetLastError());
3708 dst
= accept(server
, (struct sockaddr
*)&addr
, &len
);
3709 if (dst
== INVALID_SOCKET
)
3711 ok(0, "creating socket pair failed (%d), skipping test\n", GetLastError());
3716 dst2
= accept(server
, (struct sockaddr
*)&addr
, &len
);
3717 if (dst2
== INVALID_SOCKET
)
3719 ok(0, "creating socket pair failed (%d), skipping test\n", GetLastError());
3723 closesocket(server
);
3724 server
= INVALID_SOCKET
;
3726 /* On Windows it seems when a non-blocking socket sends to a
3727 blocking socket on the same host, the send() is BLOCKING,
3728 so make both sockets non-blocking. src is already non-blocking
3729 from the async select */
3731 if (set_blocking(dst
, FALSE
))
3733 ok(0, "ioctlsocket failed, error %d\n", WSAGetLastError());
3737 buffer
= HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY
, bufferSize
);
3740 ok(0, "could not allocate memory for test\n");
3744 ov
.hEvent
= CreateEvent(NULL
, FALSE
, FALSE
, NULL
);
3745 if (ov
.hEvent
== NULL
)
3747 ok(0, "could not create event object, errno = %d\n", GetLastError());
3751 ov2
.hEvent
= CreateEvent(NULL
, FALSE
, FALSE
, NULL
);
3752 if (ov2
.hEvent
== NULL
)
3754 ok(0, "could not create event object, errno = %d\n", GetLastError());
3758 /* FD_WRITE should be set initially, and allow us to send at least 1 byte */
3759 ok_event_seq(src
, hEvent
, connect_seq
, NULL
, 1);
3760 ok_event_seq(src2
, hEvent2
, connect_seq
, NULL
, 1);
3761 /* broken on all windows - FD_CONNECT error is garbage */
3763 /* Test simple send/recv */
3764 ret
= send(dst
, buffer
, 100, 0);
3765 ok(ret
== 100, "Failed to send buffer %d err %d\n", ret
, GetLastError());
3766 ok_event_seq(src
, hEvent
, read_seq
, NULL
, 0);
3768 ret
= recv(src
, buffer
, 1, MSG_PEEK
);
3769 ok(ret
== 1, "Failed to peek at recv buffer %d err %d\n", ret
, GetLastError());
3770 ok_event_seq(src
, hEvent
, read_seq
, NULL
, 0);
3772 ret
= recv(src
, buffer
, 50, 0);
3773 ok(ret
== 50, "Failed to recv buffer %d err %d\n", ret
, GetLastError());
3774 ok_event_seq(src
, hEvent
, read_seq
, NULL
, 0);
3776 ret
= recv(src
, buffer
, 50, 0);
3777 ok(ret
== 50, "Failed to recv buffer %d err %d\n", ret
, GetLastError());
3778 ok_event_seq(src
, hEvent
, empty_seq
, NULL
, 0);
3780 /* fun fact - events are re-enabled even on failure, but only for messages */
3781 ret
= send(dst
, "1", 1, 0);
3782 ok(ret
== 1, "Failed to send buffer %d err %d\n", ret
, GetLastError());
3783 ok_event_seq(src
, hEvent
, read_seq
, NULL
, 0);
3785 ret
= recv(src
, buffer
, -1, 0);
3786 ok(ret
== SOCKET_ERROR
&& (GetLastError() == WSAEFAULT
|| GetLastError() == WSAENOBUFS
),
3787 "Failed to recv buffer %d err %d\n", ret
, GetLastError());
3790 broken_seq
[0] = empty_seq
; /* win9x */
3791 broken_seq
[1] = NULL
;
3792 todo_wine
ok_event_seq(src
, hEvent
, read_seq
, broken_seq
, 0);
3795 ok_event_seq(src
, hEvent
, empty_seq
, NULL
, 0);
3797 ret
= recv(src
, buffer
, 1, 0);
3798 ok(ret
== 1, "Failed to recv buffer %d err %d\n", ret
, GetLastError());
3799 ok_event_seq(src
, hEvent
, empty_seq
, NULL
, 0);
3801 /* Interaction with overlapped */
3802 bufs
.len
= sizeof(char);
3804 ret
= WSARecv(src
, &bufs
, 1, &bytesReturned
, &flags
, &ov
, NULL
);
3805 ok(ret
== SOCKET_ERROR
&& GetLastError() == ERROR_IO_PENDING
,
3806 "WSARecv failed - %d error %d\n", ret
, GetLastError());
3808 bufs
.len
= sizeof(char);
3809 bufs
.buf
= buffer
+1;
3810 ret
= WSARecv(src
, &bufs
, 1, &bytesReturned
, &flags
, &ov2
, NULL
);
3811 ok(ret
== SOCKET_ERROR
&& GetLastError() == ERROR_IO_PENDING
,
3812 "WSARecv failed - %d error %d\n", ret
, GetLastError());
3814 ret
= send(dst
, "12", 2, 0);
3815 ok(ret
== 2, "Failed to send buffer %d err %d\n", ret
, GetLastError());
3816 broken_seq
[0] = read_read_seq
; /* win9x */
3817 broken_seq
[1] = NULL
;
3818 ok_event_seq(src
, hEvent
, empty_seq
, broken_seq
, 0);
3820 dwRet
= WaitForSingleObject(ov
.hEvent
, 100);
3821 ok(dwRet
== WAIT_OBJECT_0
, "Failed to wait for recv message: %d - %d\n", dwRet
, GetLastError());
3822 if (dwRet
== WAIT_OBJECT_0
)
3824 bret
= GetOverlappedResult((HANDLE
)src
, &ov
, &bytesReturned
, FALSE
);
3825 ok((bret
&& bytesReturned
== 1) || broken(!bret
&& GetLastError() == ERROR_IO_INCOMPLETE
) /* win9x */,
3826 "Got %d instead of 1 (%d - %d)\n", bytesReturned
, bret
, GetLastError());
3827 ok(buffer
[0] == '1', "Got %c instead of 1\n", buffer
[0]);
3830 dwRet
= WaitForSingleObject(ov2
.hEvent
, 100);
3831 ok(dwRet
== WAIT_OBJECT_0
, "Failed to wait for recv message: %d - %d\n", dwRet
, GetLastError());
3832 if (dwRet
== WAIT_OBJECT_0
)
3834 bret
= GetOverlappedResult((HANDLE
)src
, &ov2
, &bytesReturned
, FALSE
);
3835 ok((bret
&& bytesReturned
== 1) || broken(!bret
&& GetLastError() == ERROR_IO_INCOMPLETE
) /* win9x */,
3836 "Got %d instead of 1 (%d - %d)\n", bytesReturned
, bret
, GetLastError());
3837 ok(buffer
[1] == '2', "Got %c instead of 2\n", buffer
[1]);
3840 ret
= send(dst
, "1", 1, 0);
3841 ok(ret
== 1, "Failed to send buffer %d err %d\n", ret
, GetLastError());
3842 ok_event_seq(src
, hEvent
, read_seq
, NULL
, 0);
3844 ret
= recv(src
, buffer
, 1, 0);
3845 ok(ret
== 1, "Failed to empty buffer: %d - %d\n", ret
, GetLastError());
3846 ok_event_seq(src
, hEvent
, empty_seq
, NULL
, 0);
3848 /* Notifications are delivered as soon as possible, blocked only on
3849 * async requests on the same type */
3850 bufs
.len
= sizeof(char);
3852 ret
= WSARecv(src
, &bufs
, 1, &bytesReturned
, &flags
, &ov
, NULL
);
3853 ok(ret
== SOCKET_ERROR
&& GetLastError() == ERROR_IO_PENDING
,
3854 "WSARecv failed - %d error %d\n", ret
, GetLastError());
3857 ret
= send(dst
, "1", 1, MSG_OOB
);
3858 ok(ret
== 1, "Failed to send buffer %d err %d\n", ret
, GetLastError());
3859 ok_event_seq(src
, hEvent
, oob_seq
, NULL
, 0);
3862 dwRet
= WaitForSingleObject(ov
.hEvent
, 100);
3863 ok(dwRet
== WAIT_TIMEOUT
, "OOB message activated read?: %d - %d\n", dwRet
, GetLastError());
3865 ret
= send(dst
, "2", 1, 0);
3866 ok(ret
== 1, "Failed to send buffer %d err %d\n", ret
, GetLastError());
3867 broken_seq
[0] = read_seq
; /* win98 */
3868 broken_seq
[1] = NULL
;
3869 ok_event_seq(src
, hEvent
, empty_seq
, broken_seq
, 0);
3871 dwRet
= WaitForSingleObject(ov
.hEvent
, 100);
3872 ok(dwRet
== WAIT_OBJECT_0
|| broken(dwRet
== WAIT_TIMEOUT
),
3873 "Failed to wait for recv message: %d - %d\n", dwRet
, GetLastError());
3874 if (dwRet
== WAIT_OBJECT_0
)
3876 bret
= GetOverlappedResult((HANDLE
)src
, &ov
, &bytesReturned
, FALSE
);
3877 ok((bret
&& bytesReturned
== 1) || broken(!bret
&& GetLastError() == ERROR_IO_INCOMPLETE
) /* win9x */,
3878 "Got %d instead of 1 (%d - %d)\n", bytesReturned
, bret
, GetLastError());
3879 ok(buffer
[0] == '2', "Got %c instead of 2\n", buffer
[0]);
3881 else if (dwRet
== WAIT_TIMEOUT
)
3883 /* this happens on win98. We get an FD_READ later on the next test */
3884 CancelIo((HANDLE
) src
);
3888 ret
= recv(src
, buffer
, 1, MSG_OOB
);
3889 todo_wine
ok(ret
== 1, "Failed to empty buffer: %d - %d\n", ret
, GetLastError());
3890 /* We get OOB notification, but no data on wine */
3891 ok_event_seq(src
, hEvent
, empty_seq
, NULL
, 0);
3894 /* Flood the send queue */
3895 hThread
= CreateThread(NULL
, 0, drain_socket_thread
, &dst
, 0, &id
);
3896 if (hThread
== NULL
)
3898 ok(0, "CreateThread failed, error %d\n", GetLastError());
3902 /* Now FD_WRITE should not be set, because the socket send buffer isn't full yet */
3903 ok_event_seq(src
, hEvent
, empty_seq
, NULL
, 0);
3905 /* Now if we send a ton of data and the 'server' does not drain it fast
3906 * enough (set drain_pause to be sure), the socket send buffer will only
3907 * take some of it, and we will get a short write. This will trigger
3908 * another FD_WRITE event as soon as data is sent and more space becomes
3909 * available, but not any earlier. */
3913 ret
= send(src
, buffer
, bufferSize
, 0);
3914 } while (ret
== bufferSize
);
3916 if (ret
>= 0 || WSAGetLastError() == WSAEWOULDBLOCK
)
3918 Sleep(400); /* win9x */
3919 broken_seq
[0] = read_write_seq
;
3920 broken_seq
[1] = NULL
;
3921 ok_event_seq(src
, hEvent
, write_seq
, broken_seq
, 0);
3925 ok(0, "sending a lot of data failed with error %d\n", WSAGetLastError());
3928 /* Test how FD_CLOSE is handled */
3929 ret
= send(dst
, "12", 2, 0);
3930 ok(ret
== 2, "Failed to send buffer %d err %d\n", ret
, GetLastError());
3932 /* Wait a little and let the send complete */
3935 dst
= INVALID_SOCKET
;
3938 /* We can never implement this in wine, best we can hope for is
3939 sending FD_CLOSE after the reads complete */
3940 broken_seq
[0] = read_seq
; /* win9x */
3941 broken_seq
[1] = NULL
;
3942 todo_wine
ok_event_seq(src
, hEvent
, read_close_seq
, broken_seq
, 0);
3944 ret
= recv(src
, buffer
, 1, 0);
3945 ok(ret
== 1, "Failed to empty buffer: %d - %d\n", ret
, GetLastError());
3946 ok_event_seq(src
, hEvent
, read_seq
, NULL
, 0);
3948 ret
= recv(src
, buffer
, 1, 0);
3949 ok(ret
== 1, "Failed to empty buffer: %d - %d\n", ret
, GetLastError());
3950 /* want it? it's here, but you can't have it */
3951 broken_seq
[0] = close_seq
; /* win9x */
3952 broken_seq
[1] = NULL
;
3953 todo_wine
ok_event_seq(src
, hEvent
, empty_seq
, /* wine sends FD_CLOSE here */
3956 /* Test how FD_CLOSE is handled */
3957 ret
= send(dst2
, "12", 2, 0);
3958 ok(ret
== 2, "Failed to send buffer %d err %d\n", ret
, GetLastError());
3961 shutdown(dst2
, SD_SEND
);
3964 /* Some of the below are technically todo_wine, but our event sequence is still valid, so to prevent
3965 regressions, don't mark them as todo_wine, and mark windows as broken */
3966 broken_seq
[0] = read_close_seq
;
3967 broken_seq
[1] = close_seq
;
3968 broken_seq
[2] = NULL
;
3969 ok_event_seq(src2
, hEvent2
, read_seq
, broken_seq
, 0);
3971 ret
= recv(src2
, buffer
, 1, 0);
3972 ok(ret
== 1 || broken(!ret
), "Failed to empty buffer: %d - %d\n", ret
, GetLastError());
3973 broken_seq
[0] = close_seq
; /* win98 */
3974 broken_seq
[1] = NULL
;
3975 ok_event_seq(src2
, hEvent2
, read_seq
, broken_seq
, 0);
3977 ret
= recv(src2
, buffer
, 1, 0);
3978 ok(ret
== 1 || broken(!ret
), "Failed to empty buffer: %d - %d\n", ret
, GetLastError());
3979 broken_seq
[0] = empty_seq
;
3980 broken_seq
[1] = NULL
;
3981 ok_event_seq(src2
, hEvent2
, close_seq
, broken_seq
, 0);
3983 ret
= send(src2
, "1", 1, 0);
3984 ok(ret
== 1, "Sending to half-closed socket failed %d err %d\n", ret
, GetLastError());
3985 ok_event_seq(src2
, hEvent2
, empty_seq
, NULL
, 0);
3987 ret
= send(src2
, "1", 1, 0);
3988 ok(ret
== 1, "Sending to half-closed socket failed %d err %d\n", ret
, GetLastError());
3989 ok_event_seq(src2
, hEvent2
, empty_seq
, NULL
, 0);
3992 if (src
!= INVALID_SOCKET
)
3994 flush_events(src
, hEvent
);
3997 if (src2
!= INVALID_SOCKET
)
3999 flush_events(src2
, hEvent2
);
4002 HeapFree(GetProcessHeap(), 0, buffer
);
4003 if (server
!= INVALID_SOCKET
)
4004 closesocket(server
);
4005 if (dst
!= INVALID_SOCKET
)
4007 if (dst2
!= INVALID_SOCKET
)
4009 if (hThread
!= NULL
)
4010 CloseHandle(hThread
);
4012 DestroyWindow(hWnd
);
4014 CloseHandle(hEvent
);
4015 if (hEvent2
!= NULL
)
4016 CloseHandle(hEvent2
);
4017 if (ov
.hEvent
!= NULL
)
4018 CloseHandle(ov
.hEvent
);
4019 if (ov2
.hEvent
!= NULL
)
4020 CloseHandle(ov2
.hEvent
);
4023 static void test_ipv6only(void)
4025 SOCKET v4
= INVALID_SOCKET
,
4026 v6
= INVALID_SOCKET
;
4027 struct sockaddr_in sin4
;
4028 struct sockaddr_in6 sin6
;
4031 memset(&sin4
, 0, sizeof(sin4
));
4032 sin4
.sin_family
= AF_INET
;
4033 sin4
.sin_port
= htons(SERVERPORT
);
4035 memset(&sin6
, 0, sizeof(sin6
));
4036 sin6
.sin6_family
= AF_INET6
;
4037 sin6
.sin6_port
= htons(SERVERPORT
);
4039 v6
= socket(AF_INET6
, SOCK_STREAM
, IPPROTO_TCP
);
4040 if (v6
== INVALID_SOCKET
) {
4041 skip("Could not create IPv6 socket (LastError: %d; %d expected if IPv6 not available).\n",
4042 WSAGetLastError(), WSAEAFNOSUPPORT
);
4045 ret
= bind(v6
, (struct sockaddr
*)&sin6
, sizeof(sin6
));
4047 skip("Could not bind IPv6 address (LastError: %d).\n",
4052 v4
= socket(AF_INET
, SOCK_STREAM
, IPPROTO_TCP
);
4053 if (v4
== INVALID_SOCKET
) {
4054 skip("Could not create IPv4 socket (LastError: %d).\n",
4058 ret
= bind(v4
, (struct sockaddr
*)&sin4
, sizeof(sin4
));
4059 ok(!ret
, "Could not bind IPv4 address (LastError: %d; %d expected if IPv6 binds to IPv4 as well).\n",
4060 WSAGetLastError(), WSAEADDRINUSE
);
4063 if (v4
!= INVALID_SOCKET
)
4065 if (v6
!= INVALID_SOCKET
)
4069 static void test_WSASendTo(void)
4072 struct sockaddr_in addr
;
4073 char buf
[12] = "hello world";
4078 addr
.sin_family
= AF_INET
;
4079 addr
.sin_port
= htons(139);
4080 addr
.sin_addr
.s_addr
= inet_addr("127.0.0.1");
4081 data_buf
.len
= sizeof(buf
);
4084 if( (s
= socket(AF_INET
, SOCK_DGRAM
, 0)) == INVALID_SOCKET
) {
4085 ok(0, "socket() failed error: %d\n", WSAGetLastError());
4089 WSASetLastError(12345);
4090 ret
= WSASendTo(INVALID_SOCKET
, &data_buf
, 1, NULL
, 0, (struct sockaddr
*)&addr
, sizeof(addr
), NULL
, NULL
);
4091 ok(ret
== SOCKET_ERROR
&& WSAGetLastError() == WSAENOTSOCK
,
4092 "WSASendTo() failed: %d/%d\n", ret
, WSAGetLastError());
4094 WSASetLastError(12345);
4095 ret
= WSASendTo(s
, &data_buf
, 1, NULL
, 0, (struct sockaddr
*)&addr
, sizeof(addr
), NULL
, NULL
);
4096 ok(ret
== SOCKET_ERROR
&& WSAGetLastError() == WSAEFAULT
,
4097 "WSASendTo() failed: %d/%d\n", ret
, WSAGetLastError());
4099 WSASetLastError(12345);
4100 if(WSASendTo(s
, &data_buf
, 1, &bytesSent
, 0, (struct sockaddr
*)&addr
, sizeof(addr
), NULL
, NULL
)) {
4101 ok(0, "WSASendTo() failed error: %d\n", WSAGetLastError());
4104 ok(!WSAGetLastError(), "WSAGetLastError() should return zero after "
4105 "a successful call to WSASendTo()\n");
4108 static DWORD WINAPI
recv_thread(LPVOID arg
)
4110 SOCKET sock
= *(SOCKET
*)arg
;
4117 wsa
.len
= sizeof(buffer
);
4118 ov
.hEvent
= WSACreateEvent();
4119 WSARecv(sock
, &wsa
, 1, NULL
, &flags
, &ov
, NULL
);
4121 WaitForSingleObject(ov
.hEvent
, 1000);
4122 WSACloseEvent(ov
.hEvent
);
4126 static void test_WSARecv(void)
4128 SOCKET src
, dest
, server
= INVALID_SOCKET
;
4132 DWORD bytesReturned
, flags
, id
;
4134 struct sockaddr_in addr
;
4140 memset(&ov
, 0, sizeof(ov
));
4142 tcp_socketpair(&src
, &dest
);
4143 if (src
== INVALID_SOCKET
|| dest
== INVALID_SOCKET
)
4145 skip("failed to create sockets\n");
4149 bufs
.len
= sizeof(buf
);
4153 ov
.hEvent
= CreateEvent(NULL
, FALSE
, FALSE
, NULL
);
4154 ok(ov
.hEvent
!= NULL
, "could not create event object, errno = %d\n", GetLastError());
4160 iret
= setsockopt (src
, SOL_SOCKET
, SO_LINGER
, (char *) &ling
, sizeof(ling
));
4161 ok(!iret
, "Failed to set linger %d\n", GetLastError());
4163 iret
= WSARecv(dest
, &bufs
, 1, NULL
, &flags
, &ov
, NULL
);
4164 ok(iret
== SOCKET_ERROR
&& GetLastError() == ERROR_IO_PENDING
, "WSARecv failed - %d error %d\n", iret
, GetLastError());
4166 iret
= WSARecv(dest
, &bufs
, 1, &bytesReturned
, &flags
, &ov
, NULL
);
4167 ok(iret
== SOCKET_ERROR
&& GetLastError() == ERROR_IO_PENDING
, "WSARecv failed - %d error %d\n", iret
, GetLastError());
4170 src
= INVALID_SOCKET
;
4172 dwret
= WaitForSingleObject(ov
.hEvent
, 1000);
4173 ok(dwret
== WAIT_OBJECT_0
, "Waiting for disconnect event failed with %d + errno %d\n", dwret
, GetLastError());
4175 bret
= GetOverlappedResult((HANDLE
)dest
, &ov
, &bytesReturned
, FALSE
);
4176 todo_wine
ok(!bret
&& (GetLastError() == ERROR_NETNAME_DELETED
|| broken(GetLastError() == ERROR_IO_INCOMPLETE
) /* win9x */),
4177 "Did not get disconnect event: %d, error %d\n", bret
, GetLastError());
4178 ok(bytesReturned
== 0, "Bytes received is %d\n", bytesReturned
);
4180 src
= WSASocketW(AF_INET
, SOCK_STREAM
, IPPROTO_TCP
, NULL
, 0, 0);
4181 ok(src
!= INVALID_SOCKET
, "failed to create socket %d\n", WSAGetLastError());
4182 if (src
== INVALID_SOCKET
) goto end
;
4184 server
= WSASocketW(AF_INET
, SOCK_STREAM
, IPPROTO_TCP
, NULL
, 0, WSA_FLAG_OVERLAPPED
);
4185 ok(server
!= INVALID_SOCKET
, "failed to create socket %d\n", WSAGetLastError());
4186 if (server
== INVALID_SOCKET
) goto end
;
4188 memset(&addr
, 0, sizeof(addr
));
4189 addr
.sin_family
= AF_INET
;
4190 addr
.sin_addr
.s_addr
= inet_addr("127.0.0.1");
4191 iret
= bind(server
, (struct sockaddr
*)&addr
, sizeof(addr
));
4195 iret
= getsockname(server
, (struct sockaddr
*)&addr
, &len
);
4198 iret
= listen(server
, 1);
4201 iret
= connect(src
, (struct sockaddr
*)&addr
, sizeof(addr
));
4205 dest
= accept(server
, (struct sockaddr
*)&addr
, &len
);
4206 ok(dest
!= INVALID_SOCKET
, "failed to create socket %d\n", WSAGetLastError());
4207 if (dest
== INVALID_SOCKET
) goto end
;
4209 send(src
, "test message", sizeof("test message"), 0);
4210 thread
= CreateThread(NULL
, 0, recv_thread
, &dest
, 0, &id
);
4211 CloseHandle(thread
);
4214 if (server
!= INVALID_SOCKET
)
4215 closesocket(server
);
4216 if (dest
!= INVALID_SOCKET
)
4218 if (src
!= INVALID_SOCKET
)
4221 WSACloseEvent(ov
.hEvent
);
4224 static void test_GetAddrInfoW(void)
4226 static const WCHAR port
[] = {'8','0',0};
4227 static const WCHAR empty
[] = {0};
4228 static const WCHAR localhost
[] = {'l','o','c','a','l','h','o','s','t',0};
4229 static const WCHAR zero
[] = {'0',0};
4231 ADDRINFOW
*result
, hint
;
4233 if (!pGetAddrInfoW
|| !pFreeAddrInfoW
)
4235 win_skip("GetAddrInfoW and/or FreeAddrInfoW not present\n");
4238 memset(&hint
, 0, sizeof(ADDRINFOW
));
4240 ret
= pGetAddrInfoW(NULL
, NULL
, NULL
, &result
);
4241 ok(ret
== WSAHOST_NOT_FOUND
, "got %d expected WSAHOST_NOT_FOUND\n", ret
);
4244 ret
= pGetAddrInfoW(empty
, NULL
, NULL
, &result
);
4245 ok(!ret
, "GetAddrInfoW failed with %d\n", WSAGetLastError());
4246 ok(result
!= NULL
, "GetAddrInfoW failed\n");
4247 pFreeAddrInfoW(result
);
4250 ret
= pGetAddrInfoW(NULL
, zero
, NULL
, &result
);
4251 ok(!ret
, "GetAddrInfoW failed with %d\n", WSAGetLastError());
4252 ok(result
!= NULL
, "GetAddrInfoW failed\n");
4253 pFreeAddrInfoW(result
);
4256 ret
= pGetAddrInfoW(empty
, zero
, NULL
, &result
);
4257 ok(!ret
, "GetAddrInfoW failed with %d\n", WSAGetLastError());
4258 ok(result
!= NULL
, "GetAddrInfoW failed\n");
4259 pFreeAddrInfoW(result
);
4262 ret
= pGetAddrInfoW(localhost
, NULL
, NULL
, &result
);
4263 ok(!ret
, "GetAddrInfoW failed with %d\n", WSAGetLastError());
4264 pFreeAddrInfoW(result
);
4267 ret
= pGetAddrInfoW(localhost
, empty
, NULL
, &result
);
4268 ok(!ret
, "GetAddrInfoW failed with %d\n", WSAGetLastError());
4269 pFreeAddrInfoW(result
);
4272 ret
= pGetAddrInfoW(localhost
, zero
, NULL
, &result
);
4273 ok(!ret
, "GetAddrInfoW failed with %d\n", WSAGetLastError());
4274 pFreeAddrInfoW(result
);
4277 ret
= pGetAddrInfoW(localhost
, port
, NULL
, &result
);
4278 ok(!ret
, "GetAddrInfoW failed with %d\n", WSAGetLastError());
4279 pFreeAddrInfoW(result
);
4282 ret
= pGetAddrInfoW(localhost
, port
, &hint
, &result
);
4283 ok(!ret
, "GetAddrInfoW failed with %d\n", WSAGetLastError());
4284 pFreeAddrInfoW(result
);
4287 static void test_getaddrinfo(void)
4290 ADDRINFOA
*result
, hint
;
4292 if (!pgetaddrinfo
|| !pfreeaddrinfo
)
4294 win_skip("getaddrinfo and/or freeaddrinfo not present\n");
4297 memset(&hint
, 0, sizeof(ADDRINFOA
));
4299 ret
= pgetaddrinfo(NULL
, NULL
, NULL
, &result
);
4300 ok(ret
== WSAHOST_NOT_FOUND
, "got %d expected WSAHOST_NOT_FOUND\n", ret
);
4303 ret
= pgetaddrinfo("", NULL
, NULL
, &result
);
4304 ok(!ret
, "getaddrinfo failed with %d\n", WSAGetLastError());
4305 ok(result
!= NULL
, "getaddrinfo failed\n");
4306 pfreeaddrinfo(result
);
4309 ret
= pgetaddrinfo(NULL
, "0", NULL
, &result
);
4310 ok(!ret
, "getaddrinfo failed with %d\n", WSAGetLastError());
4311 ok(result
!= NULL
, "getaddrinfo failed\n");
4312 pfreeaddrinfo(result
);
4315 ret
= pgetaddrinfo("", "0", NULL
, &result
);
4316 ok(!ret
, "getaddrinfo failed with %d\n", WSAGetLastError());
4317 ok(result
!= NULL
, "getaddrinfo failed\n");
4318 pfreeaddrinfo(result
);
4321 ret
= pgetaddrinfo("localhost", NULL
, NULL
, &result
);
4322 ok(!ret
, "getaddrinfo failed with %d\n", WSAGetLastError());
4323 pfreeaddrinfo(result
);
4326 ret
= pgetaddrinfo("localhost", "", NULL
, &result
);
4327 ok(!ret
, "getaddrinfo failed with %d\n", WSAGetLastError());
4328 pfreeaddrinfo(result
);
4331 ret
= pgetaddrinfo("localhost", "0", NULL
, &result
);
4332 ok(!ret
, "getaddrinfo failed with %d\n", WSAGetLastError());
4333 pfreeaddrinfo(result
);
4336 ret
= pgetaddrinfo("localhost", "80", NULL
, &result
);
4337 ok(!ret
, "getaddrinfo failed with %d\n", WSAGetLastError());
4338 pfreeaddrinfo(result
);
4341 ret
= pgetaddrinfo("localhost", "80", &hint
, &result
);
4342 ok(!ret
, "getaddrinfo failed with %d\n", WSAGetLastError());
4343 pfreeaddrinfo(result
);
4346 static void test_ConnectEx(void)
4348 SOCKET listener
= INVALID_SOCKET
;
4349 SOCKET acceptor
= INVALID_SOCKET
;
4350 SOCKET connector
= INVALID_SOCKET
;
4351 struct sockaddr_in address
, conaddress
;
4353 OVERLAPPED overlapped
;
4354 LPFN_CONNECTEX pConnectEx
;
4355 GUID connectExGuid
= WSAID_CONNECTEX
;
4356 DWORD bytesReturned
;
4362 memset(&overlapped
, 0, sizeof(overlapped
));
4364 listener
= socket(AF_INET
, SOCK_STREAM
, 0);
4365 if (listener
== INVALID_SOCKET
) {
4366 skip("could not create listener socket, error %d\n", WSAGetLastError());
4370 connector
= socket(AF_INET
, SOCK_STREAM
, 0);
4371 if (connector
== INVALID_SOCKET
) {
4372 skip("could not create connector socket, error %d\n", WSAGetLastError());
4376 memset(&address
, 0, sizeof(address
));
4377 address
.sin_family
= AF_INET
;
4378 address
.sin_addr
.s_addr
= inet_addr("127.0.0.1");
4379 iret
= bind(listener
, (struct sockaddr
*)&address
, sizeof(address
));
4381 skip("failed to bind, error %d\n", WSAGetLastError());
4385 addrlen
= sizeof(address
);
4386 iret
= getsockname(listener
, (struct sockaddr
*)&address
, &addrlen
);
4388 skip("failed to lookup bind address, error %d\n", WSAGetLastError());
4392 if (set_blocking(listener
, TRUE
)) {
4393 skip("couldn't make socket non-blocking, error %d\n", WSAGetLastError());
4397 iret
= WSAIoctl(connector
, SIO_GET_EXTENSION_FUNCTION_POINTER
, &connectExGuid
, sizeof(connectExGuid
),
4398 &pConnectEx
, sizeof(pConnectEx
), &bytesReturned
, NULL
, NULL
);
4400 win_skip("WSAIoctl failed to get ConnectEx with ret %d + errno %d\n", iret
, WSAGetLastError());
4404 bret
= pConnectEx(INVALID_SOCKET
, (struct sockaddr
*)&address
, addrlen
, NULL
, 0, &bytesReturned
, &overlapped
);
4405 ok(bret
== FALSE
&& WSAGetLastError() == WSAENOTSOCK
, "ConnectEx on invalid socket "
4406 "returned %d + errno %d\n", bret
, WSAGetLastError());
4408 bret
= pConnectEx(connector
, (struct sockaddr
*)&address
, addrlen
, NULL
, 0, &bytesReturned
, &overlapped
);
4409 todo_wine
ok(bret
== FALSE
&& WSAGetLastError() == WSAEINVAL
, "ConnectEx on a unbound socket "
4410 "returned %d + errno %d\n", bret
, WSAGetLastError());
4411 if (bret
== TRUE
|| WSAGetLastError() != WSAEINVAL
)
4413 acceptor
= accept(listener
, NULL
, NULL
);
4414 if (acceptor
!= INVALID_SOCKET
) {
4415 closesocket(acceptor
);
4416 acceptor
= INVALID_SOCKET
;
4419 closesocket(connector
);
4420 connector
= socket(AF_INET
, SOCK_STREAM
, 0);
4421 if (connector
== INVALID_SOCKET
) {
4422 skip("could not create connector socket, error %d\n", WSAGetLastError());
4427 /* ConnectEx needs a bound socket */
4428 memset(&conaddress
, 0, sizeof(conaddress
));
4429 conaddress
.sin_family
= AF_INET
;
4430 conaddress
.sin_addr
.s_addr
= inet_addr("127.0.0.1");
4431 iret
= bind(connector
, (struct sockaddr
*)&conaddress
, sizeof(conaddress
));
4433 skip("failed to bind, error %d\n", WSAGetLastError());
4437 bret
= pConnectEx(connector
, (struct sockaddr
*)&address
, addrlen
, NULL
, 0, &bytesReturned
, NULL
);
4438 ok(bret
== FALSE
&& WSAGetLastError() == ERROR_INVALID_PARAMETER
, "ConnectEx on a NULL overlapped "
4439 "returned %d + errno %d\n", bret
, WSAGetLastError());
4441 overlapped
.hEvent
= CreateEvent(NULL
, FALSE
, FALSE
, NULL
);
4442 if (overlapped
.hEvent
== NULL
) {
4443 skip("could not create event object, errno = %d\n", GetLastError());
4447 iret
= listen(listener
, 1);
4449 skip("listening failed, errno = %d\n", WSAGetLastError());
4453 bret
= pConnectEx(connector
, (struct sockaddr
*)&address
, addrlen
, NULL
, 0, &bytesReturned
, &overlapped
);
4454 ok(bret
== FALSE
&& WSAGetLastError() == ERROR_IO_PENDING
, "ConnectEx failed: "
4455 "returned %d + errno %d\n", bret
, WSAGetLastError());
4456 dwret
= WaitForSingleObject(overlapped
.hEvent
, 15000);
4457 ok(dwret
== WAIT_OBJECT_0
, "Waiting for connect event failed with %d + errno %d\n", dwret
, GetLastError());
4459 bret
= GetOverlappedResult((HANDLE
)connector
, &overlapped
, &bytesReturned
, FALSE
);
4460 ok(bret
, "Connecting failed, error %d\n", GetLastError());
4461 ok(bytesReturned
== 0, "Bytes sent is %d\n", bytesReturned
);
4463 closesocket(connector
);
4464 connector
= socket(AF_INET
, SOCK_STREAM
, 0);
4465 if (connector
== INVALID_SOCKET
) {
4466 skip("could not create connector socket, error %d\n", WSAGetLastError());
4469 /* ConnectEx needs a bound socket */
4470 memset(&conaddress
, 0, sizeof(conaddress
));
4471 conaddress
.sin_family
= AF_INET
;
4472 conaddress
.sin_addr
.s_addr
= inet_addr("127.0.0.1");
4473 iret
= bind(connector
, (struct sockaddr
*)&conaddress
, sizeof(conaddress
));
4475 skip("failed to bind, error %d\n", WSAGetLastError());
4479 acceptor
= accept(listener
, NULL
, NULL
);
4480 if (acceptor
!= INVALID_SOCKET
) {
4481 closesocket(acceptor
);
4487 bret
= pConnectEx(connector
, (struct sockaddr
*)&address
, addrlen
, buffer
, 3, &bytesReturned
, &overlapped
);
4488 ok(bret
== FALSE
&& WSAGetLastError() == ERROR_IO_PENDING
, "ConnectEx failed: "
4489 "returned %d + errno %d\n", bret
, WSAGetLastError());
4490 dwret
= WaitForSingleObject(overlapped
.hEvent
, 15000);
4491 ok(dwret
== WAIT_OBJECT_0
, "Waiting for connect event failed with %d + errno %d\n", dwret
, GetLastError());
4493 bret
= GetOverlappedResult((HANDLE
)connector
, &overlapped
, &bytesReturned
, FALSE
);
4494 ok(bret
, "Connecting failed, error %d\n", GetLastError());
4495 ok(bytesReturned
== 3, "Bytes sent is %d\n", bytesReturned
);
4497 acceptor
= accept(listener
, NULL
, NULL
);
4498 ok(acceptor
!= INVALID_SOCKET
, "could not accept socket error %d\n", WSAGetLastError());
4500 bytesReturned
= recv(acceptor
, buffer
, 3, 0);
4502 ok(bytesReturned
== 3, "Didn't get all sent data, got only %d\n", bytesReturned
);
4503 ok(buffer
[0] == '1' && buffer
[1] == '2' && buffer
[2] == '3',
4504 "Failed to get the right data, expected '123', got '%s'\n", buffer
);
4506 closesocket(connector
);
4507 connector
= socket(AF_INET
, SOCK_STREAM
, 0);
4508 if (connector
== INVALID_SOCKET
) {
4509 skip("could not create connector socket, error %d\n", WSAGetLastError());
4512 /* ConnectEx needs a bound socket */
4513 memset(&conaddress
, 0, sizeof(conaddress
));
4514 conaddress
.sin_family
= AF_INET
;
4515 conaddress
.sin_addr
.s_addr
= inet_addr("127.0.0.1");
4516 iret
= bind(connector
, (struct sockaddr
*)&conaddress
, sizeof(conaddress
));
4518 skip("failed to bind, error %d\n", WSAGetLastError());
4522 if (acceptor
!= INVALID_SOCKET
) {
4523 closesocket(acceptor
);
4524 acceptor
= INVALID_SOCKET
;
4527 /* Connect with error */
4528 closesocket(listener
);
4529 listener
= INVALID_SOCKET
;
4531 address
.sin_port
= htons(1);
4533 bret
= pConnectEx(connector
, (struct sockaddr
*)&address
, addrlen
, NULL
, 0, &bytesReturned
, &overlapped
);
4534 ok(bret
== FALSE
&& GetLastError(), "ConnectEx to bad destination failed: "
4535 "returned %d + errno %d\n", bret
, GetLastError());
4537 if (GetLastError() == ERROR_IO_PENDING
)
4539 dwret
= WaitForSingleObject(overlapped
.hEvent
, 15000);
4540 ok(dwret
== WAIT_OBJECT_0
, "Waiting for connect event failed with %d + errno %d\n", dwret
, GetLastError());
4542 bret
= GetOverlappedResult((HANDLE
)connector
, &overlapped
, &bytesReturned
, FALSE
);
4543 ok(bret
== FALSE
&& GetLastError() == ERROR_CONNECTION_REFUSED
,
4544 "Connecting to a disconnected host returned error %d - %d\n", bret
, WSAGetLastError());
4547 ok(GetLastError() == WSAECONNREFUSED
,
4548 "Connecting to a disconnected host returned error %d - %d\n", bret
, WSAGetLastError());
4552 if (overlapped
.hEvent
)
4553 WSACloseEvent(overlapped
.hEvent
);
4554 if (listener
!= INVALID_SOCKET
)
4555 closesocket(listener
);
4556 if (acceptor
!= INVALID_SOCKET
)
4557 closesocket(acceptor
);
4558 if (connector
!= INVALID_SOCKET
)
4559 closesocket(connector
);
4562 static void test_AcceptEx(void)
4564 SOCKET listener
= INVALID_SOCKET
;
4565 SOCKET acceptor
= INVALID_SOCKET
;
4566 SOCKET connector
= INVALID_SOCKET
;
4567 SOCKET connector2
= INVALID_SOCKET
;
4568 struct sockaddr_in bindAddress
, peerAddress
, *readBindAddress
, *readRemoteAddress
;
4569 int socklen
, optlen
;
4570 GUID acceptExGuid
= WSAID_ACCEPTEX
, getAcceptExGuid
= WSAID_GETACCEPTEXSOCKADDRS
;
4571 LPFN_ACCEPTEX pAcceptEx
= NULL
;
4572 LPFN_GETACCEPTEXSOCKADDRS pGetAcceptExSockaddrs
= NULL
;
4573 fd_set fds_accept
, fds_send
;
4574 struct timeval timeout
= {0,10}; /* wait for 10 milliseconds */
4576 DWORD bytesReturned
, connect_time
;
4577 char buffer
[1024], ipbuffer
[32];
4578 OVERLAPPED overlapped
;
4579 int iret
, localSize
= sizeof(struct sockaddr_in
), remoteSize
= localSize
;
4583 memset(&overlapped
, 0, sizeof(overlapped
));
4585 listener
= socket(AF_INET
, SOCK_STREAM
, 0);
4586 if (listener
== INVALID_SOCKET
) {
4587 skip("could not create listener socket, error %d\n", WSAGetLastError());
4591 acceptor
= socket(AF_INET
, SOCK_STREAM
, 0);
4592 if (acceptor
== INVALID_SOCKET
) {
4593 skip("could not create acceptor socket, error %d\n", WSAGetLastError());
4597 connector
= socket(AF_INET
, SOCK_STREAM
, 0);
4598 if (connector
== INVALID_SOCKET
) {
4599 skip("could not create connector socket, error %d\n", WSAGetLastError());
4603 memset(&bindAddress
, 0, sizeof(bindAddress
));
4604 bindAddress
.sin_family
= AF_INET
;
4605 bindAddress
.sin_addr
.s_addr
= inet_addr("127.0.0.1");
4606 iret
= bind(listener
, (struct sockaddr
*)&bindAddress
, sizeof(bindAddress
));
4608 skip("failed to bind, error %d\n", WSAGetLastError());
4612 socklen
= sizeof(bindAddress
);
4613 iret
= getsockname(listener
, (struct sockaddr
*)&bindAddress
, &socklen
);
4615 skip("failed to lookup bind address, error %d\n", WSAGetLastError());
4619 if (set_blocking(listener
, FALSE
)) {
4620 skip("couldn't make socket non-blocking, error %d\n", WSAGetLastError());
4624 iret
= WSAIoctl(listener
, SIO_GET_EXTENSION_FUNCTION_POINTER
, &acceptExGuid
, sizeof(acceptExGuid
),
4625 &pAcceptEx
, sizeof(pAcceptEx
), &bytesReturned
, NULL
, NULL
);
4627 skip("WSAIoctl failed to get AcceptEx with ret %d + errno %d\n", iret
, WSAGetLastError());
4631 iret
= WSAIoctl(listener
, SIO_GET_EXTENSION_FUNCTION_POINTER
, &getAcceptExGuid
, sizeof(getAcceptExGuid
),
4632 &pGetAcceptExSockaddrs
, sizeof(pGetAcceptExSockaddrs
), &bytesReturned
, NULL
, NULL
);
4634 skip("WSAIoctl failed to get GetAcceptExSockaddrs with ret %d + errno %d\n", iret
, WSAGetLastError());
4638 bret
= pAcceptEx(INVALID_SOCKET
, acceptor
, buffer
, sizeof(buffer
) - 2*(sizeof(struct sockaddr_in
) + 16),
4639 sizeof(struct sockaddr_in
) + 16, sizeof(struct sockaddr_in
) + 16,
4640 &bytesReturned
, &overlapped
);
4641 ok(bret
== FALSE
&& WSAGetLastError() == WSAENOTSOCK
, "AcceptEx on invalid listening socket "
4642 "returned %d + errno %d\n", bret
, WSAGetLastError());
4644 bret
= pAcceptEx(listener
, INVALID_SOCKET
, buffer
, sizeof(buffer
) - 2*(sizeof(struct sockaddr_in
) + 16),
4645 sizeof(struct sockaddr_in
) + 16, sizeof(struct sockaddr_in
) + 16,
4646 &bytesReturned
, &overlapped
);
4647 ok(bret
== FALSE
&& WSAGetLastError() == WSAEINVAL
, "AcceptEx on invalid accepting socket "
4648 "returned %d + errno %d\n", bret
, WSAGetLastError());
4650 bret
= pAcceptEx(listener
, acceptor
, NULL
, sizeof(buffer
) - 2*(sizeof(struct sockaddr_in
) + 16),
4651 sizeof(struct sockaddr_in
) + 16, sizeof(struct sockaddr_in
) + 16,
4652 &bytesReturned
, &overlapped
);
4654 (WSAGetLastError() == WSAEINVAL
||
4655 broken(WSAGetLastError() == WSAEFAULT
)), /* NT4 */
4656 "AcceptEx on NULL buffer returned %d + errno %d\n", bret
, WSAGetLastError());
4658 bret
= pAcceptEx(listener
, acceptor
, buffer
, 0, 0, sizeof(struct sockaddr_in
) + 16,
4659 &bytesReturned
, &overlapped
);
4660 todo_wine
ok(bret
== FALSE
&& WSAGetLastError() == WSAEINVAL
, "AcceptEx on too small local address size "
4661 "returned %d + errno %d\n", bret
, WSAGetLastError());
4663 bret
= pAcceptEx(listener
, acceptor
, buffer
, 0, sizeof(struct sockaddr_in
) + 16, 0,
4664 &bytesReturned
, &overlapped
);
4665 todo_wine
ok(bret
== FALSE
&& WSAGetLastError() == WSAEINVAL
, "AcceptEx on too small remote address size "
4666 "returned %d + errno %d\n", bret
, WSAGetLastError());
4668 bret
= pAcceptEx(listener
, acceptor
, buffer
, 0,
4669 sizeof(struct sockaddr_in
) + 16, sizeof(struct sockaddr_in
) + 16,
4670 &bytesReturned
, NULL
);
4671 ok(bret
== FALSE
&& WSAGetLastError() == ERROR_INVALID_PARAMETER
, "AcceptEx on a NULL overlapped "
4672 "returned %d + errno %d\n", bret
, WSAGetLastError());
4674 bret
= pAcceptEx(listener
, acceptor
, buffer
, sizeof(buffer
) - 2*(sizeof(struct sockaddr_in
) + 16),
4675 sizeof(struct sockaddr_in
) + 16, sizeof(struct sockaddr_in
) + 16,
4676 &bytesReturned
, &overlapped
);
4677 todo_wine
ok(bret
== FALSE
&& WSAGetLastError() == WSAEINVAL
, "AcceptEx on a non-listening socket "
4678 "returned %d + errno %d\n", bret
, WSAGetLastError());
4680 iret
= listen(listener
, 5);
4682 skip("listening failed, errno = %d\n", WSAGetLastError());
4686 overlapped
.hEvent
= CreateEvent(NULL
, FALSE
, FALSE
, NULL
);
4687 if (overlapped
.hEvent
== NULL
) {
4688 skip("could not create event object, errno = %d\n", GetLastError());
4692 bret
= pAcceptEx(listener
, acceptor
, buffer
, 0,
4693 sizeof(struct sockaddr_in
) + 16, sizeof(struct sockaddr_in
) + 16,
4694 &bytesReturned
, &overlapped
);
4695 ok(bret
== FALSE
&& WSAGetLastError() == ERROR_IO_PENDING
, "AcceptEx returned %d + errno %d\n", bret
, WSAGetLastError());
4697 bret
= pAcceptEx(listener
, acceptor
, buffer
, 0,
4698 sizeof(struct sockaddr_in
) + 16, sizeof(struct sockaddr_in
) + 16,
4699 &bytesReturned
, &overlapped
);
4700 todo_wine
ok((bret
== FALSE
&& WSAGetLastError() == WSAEINVAL
) || broken(bret
== FALSE
&& WSAGetLastError() == ERROR_IO_PENDING
) /* NT4 */,
4701 "AcceptEx on already pending socket returned %d + errno %d\n", bret
, WSAGetLastError());
4702 if (bret
== FALSE
&& WSAGetLastError() == ERROR_IO_PENDING
) {
4703 /* We need to cancel this call, otherwise things fail */
4704 bret
= CancelIo((HANDLE
) listener
);
4705 ok(bret
, "Failed to cancel failed test. Bailing...\n");
4707 WaitForSingleObject(overlapped
.hEvent
, 0);
4709 bret
= pAcceptEx(listener
, acceptor
, buffer
, 0,
4710 sizeof(struct sockaddr_in
) + 16, sizeof(struct sockaddr_in
) + 16,
4711 &bytesReturned
, &overlapped
);
4712 ok(bret
== FALSE
&& WSAGetLastError() == ERROR_IO_PENDING
, "AcceptEx returned %d + errno %d\n", bret
, WSAGetLastError());
4715 iret
= connect(acceptor
, (struct sockaddr
*)&bindAddress
, sizeof(bindAddress
));
4716 todo_wine
ok((iret
== SOCKET_ERROR
&& WSAGetLastError() == WSAEINVAL
) || broken(!iret
) /* NT4 */,
4717 "connecting to acceptex acceptor succeeded? return %d + errno %d\n", iret
, WSAGetLastError());
4718 if (!iret
|| (iret
== SOCKET_ERROR
&& WSAGetLastError() == WSAEWOULDBLOCK
)) {
4719 /* We need to cancel this call, otherwise things fail */
4720 closesocket(acceptor
);
4721 acceptor
= socket(AF_INET
, SOCK_STREAM
, 0);
4722 if (acceptor
== INVALID_SOCKET
) {
4723 skip("could not create acceptor socket, error %d\n", WSAGetLastError());
4727 bret
= CancelIo((HANDLE
) listener
);
4728 ok(bret
, "Failed to cancel failed test. Bailing...\n");
4731 bret
= pAcceptEx(listener
, acceptor
, buffer
, 0,
4732 sizeof(struct sockaddr_in
) + 16, sizeof(struct sockaddr_in
) + 16,
4733 &bytesReturned
, &overlapped
);
4734 ok(bret
== FALSE
&& WSAGetLastError() == ERROR_IO_PENDING
, "AcceptEx returned %d + errno %d\n", bret
, WSAGetLastError());
4737 iret
= connect(connector
, (struct sockaddr
*)&bindAddress
, sizeof(bindAddress
));
4738 ok(iret
== 0, "connecting to accepting socket failed, error %d\n", WSAGetLastError());
4740 dwret
= WaitForSingleObject(overlapped
.hEvent
, INFINITE
);
4741 ok(dwret
== WAIT_OBJECT_0
, "Waiting for accept event failed with %d + errno %d\n", dwret
, GetLastError());
4743 bret
= GetOverlappedResult((HANDLE
)listener
, &overlapped
, &bytesReturned
, FALSE
);
4744 ok(bret
, "GetOverlappedResult failed, error %d\n", GetLastError());
4745 ok(bytesReturned
== 0, "bytesReturned isn't supposed to be %d\n", bytesReturned
);
4747 closesocket(connector
);
4748 connector
= INVALID_SOCKET
;
4749 closesocket(acceptor
);
4751 /* Test short reads */
4753 acceptor
= socket(AF_INET
, SOCK_STREAM
, 0);
4754 if (acceptor
== INVALID_SOCKET
) {
4755 skip("could not create acceptor socket, error %d\n", WSAGetLastError());
4758 connector
= socket(AF_INET
, SOCK_STREAM
, 0);
4759 if (connector
== INVALID_SOCKET
) {
4760 skip("could not create connector socket, error %d\n", WSAGetLastError());
4763 bret
= pAcceptEx(listener
, acceptor
, buffer
, 2,
4764 sizeof(struct sockaddr_in
) + 16, sizeof(struct sockaddr_in
) + 16,
4765 &bytesReturned
, &overlapped
);
4766 ok(bret
== FALSE
&& WSAGetLastError() == ERROR_IO_PENDING
, "AcceptEx returned %d + errno %d\n", bret
, WSAGetLastError());
4768 connect_time
= 0xdeadbeef;
4769 optlen
= sizeof(connect_time
);
4770 iret
= getsockopt(connector
, SOL_SOCKET
, SO_CONNECT_TIME
, (char *)&connect_time
, &optlen
);
4771 ok(!iret
, "getsockopt failed %d\n", WSAGetLastError());
4772 ok(connect_time
== ~0u, "unexpected connect time %u\n", connect_time
);
4774 iret
= connect(connector
, (struct sockaddr
*)&bindAddress
, sizeof(bindAddress
));
4775 ok(iret
== 0, "connecting to accepting socket failed, error %d\n", WSAGetLastError());
4777 connect_time
= 0xdeadbeef;
4778 optlen
= sizeof(connect_time
);
4779 iret
= getsockopt(connector
, SOL_SOCKET
, SO_CONNECT_TIME
, (char *)&connect_time
, &optlen
);
4780 ok(!iret
, "getsockopt failed %d\n", WSAGetLastError());
4781 ok(connect_time
< 0xdeadbeef, "unexpected connect time %u\n", connect_time
);
4783 dwret
= WaitForSingleObject(overlapped
.hEvent
, 0);
4784 ok(dwret
== WAIT_TIMEOUT
, "Waiting for accept event timeout failed with %d + errno %d\n", dwret
, GetLastError());
4786 iret
= getsockname( connector
, (struct sockaddr
*)&peerAddress
, &remoteSize
);
4787 ok( !iret
, "getsockname failed.\n");
4789 /* Check if the buffer from AcceptEx is decoded correctly */
4790 pGetAcceptExSockaddrs(buffer
, 2, sizeof(struct sockaddr_in
) + 16, sizeof(struct sockaddr_in
) + 16,
4791 (struct sockaddr
**)&readBindAddress
, &localSize
,
4792 (struct sockaddr
**)&readRemoteAddress
, &remoteSize
);
4793 strcpy( ipbuffer
, inet_ntoa(readBindAddress
->sin_addr
));
4794 ok( readBindAddress
->sin_addr
.s_addr
== bindAddress
.sin_addr
.s_addr
,
4795 "Local socket address is different %s != %s\n",
4796 ipbuffer
, inet_ntoa(bindAddress
.sin_addr
));
4797 ok( readBindAddress
->sin_port
== bindAddress
.sin_port
,
4798 "Local socket port is different: %d != %d\n",
4799 readBindAddress
->sin_port
, bindAddress
.sin_port
);
4800 strcpy( ipbuffer
, inet_ntoa(readRemoteAddress
->sin_addr
));
4801 ok( readRemoteAddress
->sin_addr
.s_addr
== peerAddress
.sin_addr
.s_addr
,
4802 "Remote socket address is different %s != %s\n",
4803 ipbuffer
, inet_ntoa(peerAddress
.sin_addr
));
4804 ok( readRemoteAddress
->sin_port
== peerAddress
.sin_port
,
4805 "Remote socket port is different: %d != %d\n",
4806 readRemoteAddress
->sin_port
, peerAddress
.sin_port
);
4808 iret
= send(connector
, buffer
, 1, 0);
4809 ok(iret
== 1, "could not send 1 byte: send %d errno %d\n", iret
, WSAGetLastError());
4811 dwret
= WaitForSingleObject(overlapped
.hEvent
, 1000);
4812 ok(dwret
== WAIT_OBJECT_0
, "Waiting for accept event failed with %d + errno %d\n", dwret
, GetLastError());
4814 bret
= GetOverlappedResult((HANDLE
)listener
, &overlapped
, &bytesReturned
, FALSE
);
4815 ok(bret
, "GetOverlappedResult failed, error %d\n", GetLastError());
4816 ok(bytesReturned
== 1, "bytesReturned isn't supposed to be %d\n", bytesReturned
);
4818 closesocket(connector
);
4819 connector
= INVALID_SOCKET
;
4820 closesocket(acceptor
);
4822 /* Test CF_DEFER & AcceptEx interaction */
4824 acceptor
= socket(AF_INET
, SOCK_STREAM
, 0);
4825 if (acceptor
== INVALID_SOCKET
) {
4826 skip("could not create acceptor socket, error %d\n", WSAGetLastError());
4829 connector
= socket(AF_INET
, SOCK_STREAM
, 0);
4830 if (connector
== INVALID_SOCKET
) {
4831 skip("could not create connector socket, error %d\n", WSAGetLastError());
4834 connector2
= socket(AF_INET
, SOCK_STREAM
, 0);
4835 if (connector
== INVALID_SOCKET
) {
4836 skip("could not create connector socket, error %d\n", WSAGetLastError());
4840 if (set_blocking(connector
, FALSE
)) {
4841 skip("couldn't make socket non-blocking, error %d\n", WSAGetLastError());
4845 if (set_blocking(connector2
, FALSE
)) {
4846 skip("couldn't make socket non-blocking, error %d\n", WSAGetLastError());
4850 /* Connect socket #1 */
4851 iret
= connect(connector
, (struct sockaddr
*)&bindAddress
, sizeof(bindAddress
));
4852 ok(iret
== SOCKET_ERROR
&& WSAGetLastError() == WSAEWOULDBLOCK
, "connecting to accepting socket failed, error %d\n", WSAGetLastError());
4854 FD_ZERO ( &fds_accept
);
4855 FD_ZERO ( &fds_send
);
4857 FD_SET ( listener
, &fds_accept
);
4858 FD_SET ( connector
, &fds_send
);
4864 for (i
= 0; i
< 4000; ++i
)
4866 fd_set fds_openaccept
= fds_accept
, fds_opensend
= fds_send
;
4868 wsa_ok ( ( select ( 0, &fds_openaccept
, &fds_opensend
, NULL
, &timeout
) ), SOCKET_ERROR
!=,
4869 "acceptex test(%d): could not select on socket, errno %d\n" );
4871 /* check for incoming requests */
4872 if ( FD_ISSET ( listener
, &fds_openaccept
) ) {
4875 SOCKET tmp
= WSAAccept(listener
, NULL
, NULL
, (LPCONDITIONPROC
) AlwaysDeferConditionFunc
, 0);
4876 ok(tmp
== INVALID_SOCKET
&& WSAGetLastError() == WSATRY_AGAIN
, "Failed to defer connection, %d\n", WSAGetLastError());
4877 bret
= pAcceptEx(listener
, acceptor
, buffer
, 0,
4878 sizeof(struct sockaddr_in
) + 16, sizeof(struct sockaddr_in
) + 16,
4879 &bytesReturned
, &overlapped
);
4880 ok(bret
== FALSE
&& WSAGetLastError() == ERROR_IO_PENDING
, "AcceptEx returned %d + errno %d\n", bret
, WSAGetLastError());
4882 else if (got
== 2) {
4883 /* this should be socket #2 */
4884 SOCKET tmp
= accept(listener
, NULL
, NULL
);
4885 ok(tmp
!= INVALID_SOCKET
, "accept failed %d\n", WSAGetLastError());
4889 ok(FALSE
, "Got more than 2 connections?\n");
4892 if ( conn1
&& FD_ISSET ( connector2
, &fds_opensend
) ) {
4893 /* Send data on second socket, and stop */
4894 send(connector2
, "2", 1, 0);
4895 FD_CLR ( connector2
, &fds_send
);
4899 if ( FD_ISSET ( connector
, &fds_opensend
) ) {
4900 /* Once #1 is connected, allow #2 to connect */
4903 send(connector
, "1", 1, 0);
4904 FD_CLR ( connector
, &fds_send
);
4906 iret
= connect(connector2
, (struct sockaddr
*)&bindAddress
, sizeof(bindAddress
));
4907 ok(iret
== SOCKET_ERROR
&& WSAGetLastError() == WSAEWOULDBLOCK
, "connecting to accepting socket failed, error %d\n", WSAGetLastError());
4908 FD_SET ( connector2
, &fds_send
);
4912 ok (got
== 2 || broken(got
== 1) /* NT4 */,
4913 "Did not get both connections, got %d\n", got
);
4915 dwret
= WaitForSingleObject(overlapped
.hEvent
, 0);
4916 ok(dwret
== WAIT_OBJECT_0
, "Waiting for accept event failed with %d + errno %d\n", dwret
, GetLastError());
4918 bret
= GetOverlappedResult((HANDLE
)listener
, &overlapped
, &bytesReturned
, FALSE
);
4919 ok(bret
, "GetOverlappedResult failed, error %d\n", GetLastError());
4920 ok(bytesReturned
== 0, "bytesReturned isn't supposed to be %d\n", bytesReturned
);
4922 set_blocking(acceptor
, TRUE
);
4923 iret
= recv( acceptor
, buffer
, 2, 0);
4924 ok(iret
== 1, "Failed to get data, %d, errno: %d\n", iret
, WSAGetLastError());
4926 ok(buffer
[0] == '1', "The wrong first client was accepted by acceptex: %c != 1\n", buffer
[0]);
4928 closesocket(connector
);
4929 connector
= INVALID_SOCKET
;
4930 closesocket(acceptor
);
4932 /* clean up in case of failures */
4933 while ((acceptor
= accept(listener
, NULL
, NULL
)) != INVALID_SOCKET
)
4934 closesocket(acceptor
);
4936 /* Disconnect during receive? */
4938 acceptor
= socket(AF_INET
, SOCK_STREAM
, 0);
4939 if (acceptor
== INVALID_SOCKET
) {
4940 skip("could not create acceptor socket, error %d\n", WSAGetLastError());
4943 connector
= socket(AF_INET
, SOCK_STREAM
, 0);
4944 if (connector
== INVALID_SOCKET
) {
4945 skip("could not create connector socket, error %d\n", WSAGetLastError());
4948 bret
= pAcceptEx(listener
, acceptor
, buffer
, sizeof(buffer
) - 2*(sizeof(struct sockaddr_in
) + 16),
4949 sizeof(struct sockaddr_in
) + 16, sizeof(struct sockaddr_in
) + 16,
4950 &bytesReturned
, &overlapped
);
4951 ok(bret
== FALSE
&& WSAGetLastError() == ERROR_IO_PENDING
, "AcceptEx returned %d + errno %d\n", bret
, WSAGetLastError());
4953 iret
= connect(connector
, (struct sockaddr
*)&bindAddress
, sizeof(bindAddress
));
4954 ok(iret
== 0, "connecting to accepting socket failed, error %d\n", WSAGetLastError());
4956 closesocket(connector
);
4957 connector
= INVALID_SOCKET
;
4959 dwret
= WaitForSingleObject(overlapped
.hEvent
, 1000);
4960 ok(dwret
== WAIT_OBJECT_0
, "Waiting for accept event failed with %d + errno %d\n", dwret
, GetLastError());
4962 bret
= GetOverlappedResult((HANDLE
)listener
, &overlapped
, &bytesReturned
, FALSE
);
4963 ok(bret
, "GetOverlappedResult failed, error %d\n", GetLastError());
4964 ok(bytesReturned
== 0, "bytesReturned isn't supposed to be %d\n", bytesReturned
);
4966 closesocket(acceptor
);
4968 /* Test closing with pending requests */
4970 acceptor
= socket(AF_INET
, SOCK_STREAM
, 0);
4971 if (acceptor
== INVALID_SOCKET
) {
4972 skip("could not create acceptor socket, error %d\n", WSAGetLastError());
4975 bret
= pAcceptEx(listener
, acceptor
, buffer
, sizeof(buffer
) - 2*(sizeof(struct sockaddr_in
) + 16),
4976 sizeof(struct sockaddr_in
) + 16, sizeof(struct sockaddr_in
) + 16,
4977 &bytesReturned
, &overlapped
);
4978 ok(bret
== FALSE
&& WSAGetLastError() == ERROR_IO_PENDING
, "AcceptEx returned %d + errno %d\n", bret
, WSAGetLastError());
4980 closesocket(acceptor
);
4982 dwret
= WaitForSingleObject(overlapped
.hEvent
, 1000);
4983 todo_wine
ok(dwret
== WAIT_OBJECT_0
|| broken(dwret
== WAIT_TIMEOUT
) /* NT4/2000 */,
4984 "Waiting for accept event failed with %d + errno %d\n", dwret
, GetLastError());
4986 if (dwret
!= WAIT_TIMEOUT
) {
4987 bret
= GetOverlappedResult((HANDLE
)listener
, &overlapped
, &bytesReturned
, FALSE
);
4988 ok(!bret
&& GetLastError() == ERROR_OPERATION_ABORTED
, "GetOverlappedResult failed, error %d\n", GetLastError());
4991 bret
= CancelIo((HANDLE
) listener
);
4992 ok(bret
, "Failed to cancel failed test. Bailing...\n");
4994 WaitForSingleObject(overlapped
.hEvent
, 0);
4997 acceptor
= socket(AF_INET
, SOCK_STREAM
, 0);
4998 if (acceptor
== INVALID_SOCKET
) {
4999 skip("could not create acceptor socket, error %d\n", WSAGetLastError());
5002 bret
= pAcceptEx(listener
, acceptor
, buffer
, sizeof(buffer
) - 2*(sizeof(struct sockaddr_in
) + 16),
5003 sizeof(struct sockaddr_in
) + 16, sizeof(struct sockaddr_in
) + 16,
5004 &bytesReturned
, &overlapped
);
5005 ok(bret
== FALSE
&& WSAGetLastError() == ERROR_IO_PENDING
, "AcceptEx returned %d + errno %d\n", bret
, WSAGetLastError());
5007 CancelIo((HANDLE
) acceptor
);
5009 dwret
= WaitForSingleObject(overlapped
.hEvent
, 1000);
5010 ok(dwret
== WAIT_TIMEOUT
, "Waiting for timeout failed with %d + errno %d\n", dwret
, GetLastError());
5012 closesocket(acceptor
);
5014 acceptor
= socket(AF_INET
, SOCK_STREAM
, 0);
5015 if (acceptor
== INVALID_SOCKET
) {
5016 skip("could not create acceptor socket, error %d\n", WSAGetLastError());
5019 bret
= pAcceptEx(listener
, acceptor
, buffer
, sizeof(buffer
) - 2*(sizeof(struct sockaddr_in
) + 16),
5020 sizeof(struct sockaddr_in
) + 16, sizeof(struct sockaddr_in
) + 16,
5021 &bytesReturned
, &overlapped
);
5022 ok(bret
== FALSE
&& WSAGetLastError() == ERROR_IO_PENDING
, "AcceptEx returned %d + errno %d\n", bret
, WSAGetLastError());
5024 closesocket(listener
);
5025 listener
= INVALID_SOCKET
;
5027 dwret
= WaitForSingleObject(overlapped
.hEvent
, 1000);
5028 ok(dwret
== WAIT_OBJECT_0
, "Waiting for accept event failed with %d + errno %d\n", dwret
, GetLastError());
5030 bret
= GetOverlappedResult((HANDLE
)listener
, &overlapped
, &bytesReturned
, FALSE
);
5031 ok(!bret
&& GetLastError() == ERROR_OPERATION_ABORTED
, "GetOverlappedResult failed, error %d\n", GetLastError());
5034 if (overlapped
.hEvent
)
5035 WSACloseEvent(overlapped
.hEvent
);
5036 if (listener
!= INVALID_SOCKET
)
5037 closesocket(listener
);
5038 if (acceptor
!= INVALID_SOCKET
)
5039 closesocket(acceptor
);
5040 if (connector
!= INVALID_SOCKET
)
5041 closesocket(connector
);
5042 if (connector2
!= INVALID_SOCKET
)
5043 closesocket(connector2
);
5046 static void test_getpeername(void)
5049 struct sockaddr_in sa
, sa_out
;
5051 const char buf
[] = "hello world";
5054 /* Test the parameter validation order. */
5055 ret
= getpeername(INVALID_SOCKET
, NULL
, NULL
);
5056 ok(ret
== SOCKET_ERROR
, "Expected getpeername to return SOCKET_ERROR, got %d\n", ret
);
5057 ok(WSAGetLastError() == WSAENOTSOCK
,
5058 "Expected WSAGetLastError() to return WSAENOTSOCK, got %d\n", WSAGetLastError());
5060 sock
= socket(PF_INET
, SOCK_DGRAM
, IPPROTO_IP
);
5061 ok(sock
!= INVALID_SOCKET
, "Expected socket to return a valid socket\n");
5062 if (sock
== INVALID_SOCKET
)
5064 skip("Socket creation failed with %d\n", WSAGetLastError());
5068 ret
= getpeername(sock
, NULL
, NULL
);
5069 ok(ret
== SOCKET_ERROR
, "Expected getpeername to return SOCKET_ERROR, got %d\n", ret
);
5070 ok(WSAGetLastError() == WSAENOTCONN
||
5071 broken(WSAGetLastError() == WSAEFAULT
), /* Win9x and WinMe */
5072 "Expected WSAGetLastError() to return WSAENOTCONN, got %d\n", WSAGetLastError());
5074 memset(&sa
, 0, sizeof(sa
));
5075 sa
.sin_family
= AF_INET
;
5076 sa
.sin_port
= htons(139);
5077 sa
.sin_addr
.s_addr
= inet_addr("127.0.0.1");
5079 /* sendto does not change a socket's connection state. */
5080 ret
= sendto(sock
, buf
, sizeof(buf
), 0, (struct sockaddr
*)&sa
, sizeof(sa
));
5081 ok(ret
!= SOCKET_ERROR
,
5082 "Expected sendto to succeed, WSAGetLastError() = %d\n", WSAGetLastError());
5084 ret
= getpeername(sock
, NULL
, NULL
);
5085 ok(ret
== SOCKET_ERROR
, "Expected getpeername to return SOCKET_ERROR, got %d\n", ret
);
5086 ok(WSAGetLastError() == WSAENOTCONN
||
5087 broken(WSAGetLastError() == WSAEFAULT
), /* Win9x and WinMe */
5088 "Expected WSAGetLastError() to return WSAENOTCONN, got %d\n", WSAGetLastError());
5090 ret
= connect(sock
, (struct sockaddr
*)&sa
, sizeof(sa
));
5092 "Expected connect to succeed, WSAGetLastError() = %d\n", WSAGetLastError());
5094 ret
= getpeername(sock
, NULL
, NULL
);
5095 ok(ret
== SOCKET_ERROR
, "Expected getpeername to return SOCKET_ERROR, got %d\n", ret
);
5096 ok(WSAGetLastError() == WSAEFAULT
,
5097 "Expected WSAGetLastError() to return WSAEFAULT, got %d\n", WSAGetLastError());
5099 /* Test crashes on Wine. */
5102 ret
= getpeername(sock
, (void*)0xdeadbeef, (void*)0xcafebabe);
5103 ok(ret
== SOCKET_ERROR
, "Expected getpeername to return SOCKET_ERROR, got %d\n", ret
);
5104 ok(WSAGetLastError() == WSAEFAULT
,
5105 "Expected WSAGetLastError() to return WSAEFAULT, got %d\n", WSAGetLastError());
5109 ret
= getpeername(sock
, (struct sockaddr
*)&sa_out
, &sa_len
);
5110 ok(ret
== SOCKET_ERROR
, "Expected getpeername to return 0, got %d\n", ret
);
5111 ok(WSAGetLastError() == WSAEFAULT
,
5112 "Expected WSAGetLastError() to return WSAEFAULT, got %d\n", WSAGetLastError());
5114 sa_len
= sizeof(sa_out
);
5115 ret
= getpeername(sock
, (struct sockaddr
*)&sa_out
, &sa_len
);
5116 ok(ret
== 0, "Expected getpeername to return 0, got %d\n", ret
);
5117 ok(!memcmp(&sa
, &sa_out
, sizeof(sa
)),
5118 "Expected the returned structure to be identical to the connect structure\n");
5123 static void test_sioRoutingInterfaceQuery(void)
5127 SOCKADDR_IN sin
= { 0 }, sout
= { 0 };
5128 DWORD bytesReturned
;
5130 sock
= socket(PF_INET
, SOCK_DGRAM
, IPPROTO_IP
);
5131 ok(sock
!= INVALID_SOCKET
, "Expected socket to return a valid socket\n");
5132 if (sock
== INVALID_SOCKET
)
5134 skip("Socket creation failed with %d\n", WSAGetLastError());
5137 ret
= WSAIoctl(sock
, SIO_ROUTING_INTERFACE_QUERY
, NULL
, 0, NULL
, 0, NULL
,
5139 ok(ret
== SOCKET_ERROR
&& WSAGetLastError() == WSAEFAULT
,
5140 "expected WSAEFAULT, got %d\n", WSAGetLastError());
5141 ret
= WSAIoctl(sock
, SIO_ROUTING_INTERFACE_QUERY
, &sin
, sizeof(sin
),
5142 NULL
, 0, NULL
, NULL
, NULL
);
5143 ok(ret
== SOCKET_ERROR
&& WSAGetLastError() == WSAEFAULT
,
5144 "expected WSAEFAULT, got %d\n", WSAGetLastError());
5145 ret
= WSAIoctl(sock
, SIO_ROUTING_INTERFACE_QUERY
, &sin
, sizeof(sin
),
5146 NULL
, 0, &bytesReturned
, NULL
, NULL
);
5147 ok(ret
== SOCKET_ERROR
&&
5148 (WSAGetLastError() == WSAEFAULT
/* Win98 */ ||
5149 WSAGetLastError() == WSAEINVAL
/* NT4 */||
5150 WSAGetLastError() == WSAEAFNOSUPPORT
),
5151 "expected WSAEFAULT or WSAEINVAL or WSAEAFNOSUPPORT, got %d\n",
5153 sin
.sin_family
= AF_INET
;
5154 ret
= WSAIoctl(sock
, SIO_ROUTING_INTERFACE_QUERY
, &sin
, sizeof(sin
),
5155 NULL
, 0, &bytesReturned
, NULL
, NULL
);
5156 ok(ret
== SOCKET_ERROR
&&
5157 (WSAGetLastError() == WSAEFAULT
/* Win98 */ ||
5158 WSAGetLastError() == WSAEINVAL
),
5159 "expected WSAEFAULT or WSAEINVAL, got %d\n", WSAGetLastError());
5160 sin
.sin_addr
.s_addr
= htonl(INADDR_LOOPBACK
);
5161 ret
= WSAIoctl(sock
, SIO_ROUTING_INTERFACE_QUERY
, &sin
, sizeof(sin
),
5162 NULL
, 0, &bytesReturned
, NULL
, NULL
);
5163 ok(ret
== SOCKET_ERROR
&&
5164 (WSAGetLastError() == WSAEINVAL
/* NT4 */ ||
5165 WSAGetLastError() == WSAEFAULT
),
5166 "expected WSAEINVAL or WSAEFAULT, got %d\n", WSAGetLastError());
5167 ret
= WSAIoctl(sock
, SIO_ROUTING_INTERFACE_QUERY
, &sin
, sizeof(sin
),
5168 &sout
, sizeof(sout
), &bytesReturned
, NULL
, NULL
);
5169 ok(!ret
|| broken(WSAGetLastError() == WSAEINVAL
/* NT4 */),
5170 "WSAIoctl failed: %d\n", WSAGetLastError());
5173 ok(sout
.sin_family
== AF_INET
, "expected AF_INET, got %d\n",
5175 /* We expect the source address to be INADDR_LOOPBACK as well, but
5176 * there's no guarantee that a route to the loopback address exists,
5177 * so rather than introduce spurious test failures we do not test the
5184 static void test_synchronous_WSAIoctl(void)
5186 HANDLE previous_port
, io_port
;
5187 WSAOVERLAPPED overlapped
, *olp
;
5195 previous_port
= CreateIoCompletionPort( INVALID_HANDLE_VALUE
, NULL
, 0, 0 );
5196 ok( previous_port
!= NULL
, "failed to create completion port %u\n", GetLastError() );
5198 socket
= WSASocketW( AF_INET
, SOCK_STREAM
, IPPROTO_TCP
, NULL
, 0, WSA_FLAG_OVERLAPPED
);
5199 ok( socket
!= INVALID_SOCKET
, "failed to create socket %d\n", WSAGetLastError() );
5201 io_port
= CreateIoCompletionPort( (HANDLE
)socket
, previous_port
, 0, 0 );
5202 ok( io_port
!= NULL
, "failed to create completion port %u\n", GetLastError() );
5205 memset( &overlapped
, 0, sizeof(overlapped
) );
5206 res
= WSAIoctl( socket
, FIONBIO
, &on
, sizeof(on
), NULL
, 0, &num_bytes
, &overlapped
, NULL
);
5207 ok( !res
, "WSAIoctl failed %d\n", WSAGetLastError() );
5209 ret
= GetQueuedCompletionStatus( io_port
, &num_bytes
, &key
, &olp
, 10000 );
5210 ok( ret
, "failed to get completion status %u\n", GetLastError() );
5212 CloseHandle( io_port
);
5213 closesocket( socket
);
5214 CloseHandle( previous_port
);
5217 #define WM_ASYNCCOMPLETE (WM_USER + 100)
5218 static HWND
create_async_message_window(void)
5220 static const char class_name
[] = "ws2_32 async message window class";
5222 WNDCLASSEXA wndclass
;
5225 wndclass
.cbSize
= sizeof(wndclass
);
5226 wndclass
.style
= CS_HREDRAW
| CS_VREDRAW
;
5227 wndclass
.lpfnWndProc
= DefWindowProcA
;
5228 wndclass
.cbClsExtra
= 0;
5229 wndclass
.cbWndExtra
= 0;
5230 wndclass
.hInstance
= GetModuleHandleA(NULL
);
5231 wndclass
.hIcon
= LoadIconA(NULL
, IDI_APPLICATION
);
5232 wndclass
.hIconSm
= LoadIconA(NULL
, IDI_APPLICATION
);
5233 wndclass
.hCursor
= LoadCursorA(NULL
, IDC_ARROW
);
5234 wndclass
.hbrBackground
= (HBRUSH
)(COLOR_WINDOW
+ 1);
5235 wndclass
.lpszClassName
= class_name
;
5236 wndclass
.lpszMenuName
= NULL
;
5238 RegisterClassExA(&wndclass
);
5240 hWnd
= CreateWindow(class_name
, "ws2_32 async message window", WS_OVERLAPPEDWINDOW
,
5241 0, 0, 500, 500, NULL
, NULL
, GetModuleHandleA(NULL
), NULL
);
5244 ok(0, "failed to create window: %u\n", GetLastError());
5251 static void test_WSAAsyncGetServByPort(void)
5253 HWND hwnd
= create_async_message_window();
5255 char buffer
[MAXGETHOSTSTRUCT
];
5260 /* FIXME: The asynchronous window messages should be tested. */
5262 /* Parameters are not checked when initiating the asynchronous operation. */
5263 ret
= WSAAsyncGetServByPort(NULL
, 0, 0, NULL
, NULL
, 0);
5264 ok(ret
!= NULL
, "WSAAsyncGetServByPort returned NULL\n");
5266 ret
= WSAAsyncGetServByPort(hwnd
, WM_ASYNCCOMPLETE
, 0, NULL
, NULL
, 0);
5267 ok(ret
!= NULL
, "WSAAsyncGetServByPort returned NULL\n");
5269 ret
= WSAAsyncGetServByPort(hwnd
, WM_ASYNCCOMPLETE
, htons(80), NULL
, NULL
, 0);
5270 ok(ret
!= NULL
, "WSAAsyncGetServByPort returned NULL\n");
5272 ret
= WSAAsyncGetServByPort(hwnd
, WM_ASYNCCOMPLETE
, htons(80), NULL
, buffer
, MAXGETHOSTSTRUCT
);
5273 ok(ret
!= NULL
, "WSAAsyncGetServByPort returned NULL\n");
5275 DestroyWindow(hwnd
);
5278 static void test_WSAAsyncGetServByName(void)
5280 HWND hwnd
= create_async_message_window();
5282 char buffer
[MAXGETHOSTSTRUCT
];
5287 /* FIXME: The asynchronous window messages should be tested. */
5289 /* Parameters are not checked when initiating the asynchronous operation. */
5290 ret
= WSAAsyncGetServByName(hwnd
, WM_ASYNCCOMPLETE
, "", NULL
, NULL
, 0);
5291 ok(ret
!= NULL
, "WSAAsyncGetServByName returned NULL\n");
5293 ret
= WSAAsyncGetServByName(hwnd
, WM_ASYNCCOMPLETE
, "", "", buffer
, MAXGETHOSTSTRUCT
);
5294 ok(ret
!= NULL
, "WSAAsyncGetServByName returned NULL\n");
5296 ret
= WSAAsyncGetServByName(hwnd
, WM_ASYNCCOMPLETE
, "http", NULL
, NULL
, 0);
5297 ok(ret
!= NULL
, "WSAAsyncGetServByName returned NULL\n");
5299 ret
= WSAAsyncGetServByName(hwnd
, WM_ASYNCCOMPLETE
, "http", "tcp", buffer
, MAXGETHOSTSTRUCT
);
5300 ok(ret
!= NULL
, "WSAAsyncGetServByName returned NULL\n");
5302 DestroyWindow(hwnd
);
5306 * Provide consistent initialization for the AcceptEx IOCP tests.
5308 static SOCKET
setup_iocp_src(struct sockaddr_in
*bindAddress
)
5310 SOCKET src
, ret
= INVALID_SOCKET
;
5313 src
= socket(AF_INET
, SOCK_STREAM
, 0);
5314 if (src
== INVALID_SOCKET
)
5316 skip("could not create listener socket, error %d\n", WSAGetLastError());
5320 memset(bindAddress
, 0, sizeof(*bindAddress
));
5321 bindAddress
->sin_family
= AF_INET
;
5322 bindAddress
->sin_addr
.s_addr
= inet_addr("127.0.0.1");
5323 iret
= bind(src
, (struct sockaddr
*)bindAddress
, sizeof(*bindAddress
));
5326 skip("failed to bind, error %d\n", WSAGetLastError());
5330 socklen
= sizeof(*bindAddress
);
5331 iret
= getsockname(src
, (struct sockaddr
*)bindAddress
, &socklen
);
5333 skip("failed to lookup bind address, error %d\n", WSAGetLastError());
5337 if (set_blocking(src
, FALSE
))
5339 skip("couldn't make socket non-blocking, error %d\n", WSAGetLastError());
5343 iret
= listen(src
, 5);
5346 skip("listening failed, errno = %d\n", WSAGetLastError());
5352 if (src
!= ret
&& ret
== INVALID_SOCKET
)
5357 static void test_completion_port(void)
5359 HANDLE previous_port
, io_port
;
5360 WSAOVERLAPPED ov
, *olp
;
5361 SOCKET src
, dest
, dup
, connector
= INVALID_SOCKET
;
5362 WSAPROTOCOL_INFOA info
;
5365 DWORD num_bytes
, flags
;
5370 struct sockaddr_in bindAddress
;
5371 GUID acceptExGuid
= WSAID_ACCEPTEX
;
5372 LPFN_ACCEPTEX pAcceptEx
= NULL
;
5374 previous_port
= CreateIoCompletionPort(INVALID_HANDLE_VALUE
, NULL
, 0, 0);
5375 ok( previous_port
!= NULL
, "Failed to create completion port %u\n", GetLastError());
5377 memset(&ov
, 0, sizeof(ov
));
5379 tcp_socketpair(&src
, &dest
);
5380 if (src
== INVALID_SOCKET
|| dest
== INVALID_SOCKET
)
5382 skip("failed to create sockets\n");
5386 bufs
.len
= sizeof(buf
);
5392 iret
= setsockopt (src
, SOL_SOCKET
, SO_LINGER
, (char *) &ling
, sizeof(ling
));
5393 ok(!iret
, "Failed to set linger %d\n", GetLastError());
5395 io_port
= CreateIoCompletionPort( (HANDLE
)dest
, previous_port
, 125, 0 );
5396 ok(io_port
!= NULL
, "Failed to create completion port %u\n", GetLastError());
5398 SetLastError(0xdeadbeef);
5400 iret
= WSARecv(dest
, &bufs
, 1, &num_bytes
, &flags
, &ov
, NULL
);
5401 ok(iret
== SOCKET_ERROR
, "WSARecv returned %d\n", iret
);
5402 ok(GetLastError() == ERROR_IO_PENDING
, "Last error was %d\n", GetLastError());
5405 src
= INVALID_SOCKET
;
5407 SetLastError(0xdeadbeef);
5409 num_bytes
= 0xdeadbeef;
5410 olp
= (WSAOVERLAPPED
*)0xdeadbeef;
5412 bret
= GetQueuedCompletionStatus(io_port
, &num_bytes
, &key
, &olp
, 100);
5413 todo_wine
ok(bret
== FALSE
, "GetQueuedCompletionStatus returned %d\n", bret
);
5414 todo_wine
ok(GetLastError() == ERROR_NETNAME_DELETED
, "Last error was %d\n", GetLastError());
5415 ok(key
== 125, "Key is %lu\n", key
);
5416 ok(num_bytes
== 0, "Number of bytes received is %u\n", num_bytes
);
5417 ok(olp
== &ov
, "Overlapped structure is at %p\n", olp
);
5419 SetLastError(0xdeadbeef);
5421 num_bytes
= 0xdeadbeef;
5422 olp
= (WSAOVERLAPPED
*)0xdeadbeef;
5424 bret
= GetQueuedCompletionStatus(io_port
, &num_bytes
, &key
, &olp
, 100);
5425 ok(bret
== FALSE
, "GetQueuedCompletionStatus returned %d\n", bret
);
5426 ok(GetLastError() == WAIT_TIMEOUT
, "Last error was %d\n", GetLastError());
5427 ok(key
== 0xdeadbeef, "Key is %lu\n", key
);
5428 ok(num_bytes
== 0xdeadbeef, "Number of bytes transferred is %u\n", num_bytes
);
5429 ok(!olp
, "Overlapped structure is at %p\n", olp
);
5431 if (dest
!= INVALID_SOCKET
)
5434 memset(&ov
, 0, sizeof(ov
));
5436 tcp_socketpair(&src
, &dest
);
5437 if (src
== INVALID_SOCKET
|| dest
== INVALID_SOCKET
)
5439 skip("failed to create sockets\n");
5443 bufs
.len
= sizeof(buf
);
5449 iret
= setsockopt (src
, SOL_SOCKET
, SO_LINGER
, (char *) &ling
, sizeof(ling
));
5450 ok(!iret
, "Failed to set linger %d\n", GetLastError());
5452 io_port
= CreateIoCompletionPort((HANDLE
)dest
, previous_port
, 125, 0);
5453 ok(io_port
!= NULL
, "failed to create completion port %u\n", GetLastError());
5455 set_blocking(dest
, FALSE
);
5458 src
= INVALID_SOCKET
;
5459 num_bytes
= 0xdeadbeef;
5460 SetLastError(0xdeadbeef);
5462 iret
= WSASend(dest
, &bufs
, 1, &num_bytes
, 0, &ov
, NULL
);
5463 ok(iret
== SOCKET_ERROR
, "WSASend failed - %d\n", iret
);
5464 ok(GetLastError() == WSAECONNRESET
, "Last error was %d\n", GetLastError());
5465 ok(num_bytes
== 0xdeadbeef, "Managed to send %d\n", num_bytes
);
5467 SetLastError(0xdeadbeef);
5469 num_bytes
= 0xdeadbeef;
5470 olp
= (WSAOVERLAPPED
*)0xdeadbeef;
5472 bret
= GetQueuedCompletionStatus( io_port
, &num_bytes
, &key
, &olp
, 200 );
5473 ok(bret
== FALSE
, "GetQueuedCompletionStatus returned %u\n", bret
);
5474 ok(GetLastError() == WAIT_TIMEOUT
, "Last error was %d\n", GetLastError());
5475 ok(key
== 0xdeadbeef, "Key is %lu\n", key
);
5476 ok(num_bytes
== 0xdeadbeef, "Number of bytes transferred is %u\n", num_bytes
);
5477 ok(!olp
, "Overlapped structure is at %p\n", olp
);
5479 if (dest
!= INVALID_SOCKET
)
5482 dest
= socket(AF_INET
, SOCK_STREAM
, 0);
5483 if (dest
== INVALID_SOCKET
)
5485 skip("could not create acceptor socket, error %d\n", WSAGetLastError());
5489 iret
= WSAIoctl(dest
, SIO_GET_EXTENSION_FUNCTION_POINTER
, &acceptExGuid
, sizeof(acceptExGuid
),
5490 &pAcceptEx
, sizeof(pAcceptEx
), &num_bytes
, NULL
, NULL
);
5493 skip("WSAIoctl failed to get AcceptEx with ret %d + errno %d\n", iret
, WSAGetLastError());
5497 /* Test IOCP response on socket close (IOCP created after AcceptEx) */
5499 if ((src
= setup_iocp_src(&bindAddress
)) == INVALID_SOCKET
)
5502 SetLastError(0xdeadbeef);
5504 bret
= pAcceptEx(src
, dest
, buf
, sizeof(buf
) - 2*(sizeof(struct sockaddr_in
) + 16),
5505 sizeof(struct sockaddr_in
) + 16, sizeof(struct sockaddr_in
) + 16,
5507 ok(bret
== FALSE
, "AcceptEx returned %d\n", bret
);
5508 ok(GetLastError() == ERROR_IO_PENDING
, "Last error was %d\n", GetLastError());
5510 io_port
= CreateIoCompletionPort((HANDLE
)src
, previous_port
, 125, 0);
5511 ok(io_port
!= NULL
, "failed to create completion port %u\n", GetLastError());
5514 src
= INVALID_SOCKET
;
5516 SetLastError(0xdeadbeef);
5518 num_bytes
= 0xdeadbeef;
5519 olp
= (WSAOVERLAPPED
*)0xdeadbeef;
5521 bret
= GetQueuedCompletionStatus(io_port
, &num_bytes
, &key
, &olp
, 100);
5522 ok(bret
== FALSE
, "failed to get completion status %u\n", bret
);
5523 ok(GetLastError() == ERROR_OPERATION_ABORTED
, "Last error was %d\n", GetLastError());
5524 ok(key
== 125, "Key is %lu\n", key
);
5525 ok(num_bytes
== 0, "Number of bytes transferred is %u\n", num_bytes
);
5526 ok(olp
== &ov
, "Overlapped structure is at %p\n", olp
);
5527 ok(olp
&& (olp
->Internal
== (ULONG
)STATUS_CANCELLED
), "Internal status is %lx\n", olp
? olp
->Internal
: 0);
5529 SetLastError(0xdeadbeef);
5531 num_bytes
= 0xdeadbeef;
5532 olp
= (WSAOVERLAPPED
*)0xdeadbeef;
5533 bret
= GetQueuedCompletionStatus( io_port
, &num_bytes
, &key
, &olp
, 200 );
5534 ok(bret
== FALSE
, "failed to get completion status %u\n", bret
);
5535 ok(GetLastError() == WAIT_TIMEOUT
, "Last error was %d\n", GetLastError());
5536 ok(key
== 0xdeadbeef, "Key is %lu\n", key
);
5537 ok(num_bytes
== 0xdeadbeef, "Number of bytes transferred is %u\n", num_bytes
);
5538 ok(!olp
, "Overlapped structure is at %p\n", olp
);
5540 /* Test IOCP response on socket close (IOCP created before AcceptEx) */
5542 if ((src
= setup_iocp_src(&bindAddress
)) == INVALID_SOCKET
)
5545 SetLastError(0xdeadbeef);
5547 io_port
= CreateIoCompletionPort((HANDLE
)src
, previous_port
, 125, 0);
5548 ok(io_port
!= NULL
, "failed to create completion port %u\n", GetLastError());
5550 bret
= pAcceptEx(src
, dest
, buf
, sizeof(buf
) - 2*(sizeof(struct sockaddr_in
) + 16),
5551 sizeof(struct sockaddr_in
) + 16, sizeof(struct sockaddr_in
) + 16,
5553 ok(bret
== FALSE
, "AcceptEx returned %d\n", bret
);
5554 ok(GetLastError() == ERROR_IO_PENDING
, "Last error was %d\n", GetLastError());
5557 src
= INVALID_SOCKET
;
5559 SetLastError(0xdeadbeef);
5561 num_bytes
= 0xdeadbeef;
5562 olp
= (WSAOVERLAPPED
*)0xdeadbeef;
5564 bret
= GetQueuedCompletionStatus(io_port
, &num_bytes
, &key
, &olp
, 100);
5565 ok(bret
== FALSE
, "failed to get completion status %u\n", bret
);
5566 ok(GetLastError() == ERROR_OPERATION_ABORTED
, "Last error was %d\n", GetLastError());
5567 ok(key
== 125, "Key is %lu\n", key
);
5568 ok(num_bytes
== 0, "Number of bytes transferred is %u\n", num_bytes
);
5569 ok(olp
== &ov
, "Overlapped structure is at %p\n", olp
);
5570 ok(olp
&& (olp
->Internal
== (ULONG
)STATUS_CANCELLED
), "Internal status is %lx\n", olp
? olp
->Internal
: 0);
5572 SetLastError(0xdeadbeef);
5574 num_bytes
= 0xdeadbeef;
5575 olp
= (WSAOVERLAPPED
*)0xdeadbeef;
5576 bret
= GetQueuedCompletionStatus( io_port
, &num_bytes
, &key
, &olp
, 200 );
5577 ok(bret
== FALSE
, "failed to get completion status %u\n", bret
);
5578 ok(GetLastError() == WAIT_TIMEOUT
, "Last error was %d\n", GetLastError());
5579 ok(key
== 0xdeadbeef, "Key is %lu\n", key
);
5580 ok(num_bytes
== 0xdeadbeef, "Number of bytes transferred is %u\n", num_bytes
);
5581 ok(!olp
, "Overlapped structure is at %p\n", olp
);
5583 /* Test IOCP with duplicated handle */
5585 if ((src
= setup_iocp_src(&bindAddress
)) == INVALID_SOCKET
)
5588 SetLastError(0xdeadbeef);
5590 io_port
= CreateIoCompletionPort((HANDLE
)src
, previous_port
, 125, 0);
5591 ok(io_port
!= NULL
, "failed to create completion port %u\n", GetLastError());
5593 WSADuplicateSocket( src
, GetCurrentProcessId(), &info
);
5594 dup
= WSASocket(AF_INET
, SOCK_STREAM
, 0, &info
, 0, WSA_FLAG_OVERLAPPED
);
5595 ok(dup
!= INVALID_SOCKET
, "failed to duplicate socket!\n");
5597 bret
= pAcceptEx(dup
, dest
, buf
, sizeof(buf
) - 2*(sizeof(struct sockaddr_in
) + 16),
5598 sizeof(struct sockaddr_in
) + 16, sizeof(struct sockaddr_in
) + 16,
5600 ok(bret
== FALSE
, "AcceptEx returned %d\n", bret
);
5601 ok(GetLastError() == ERROR_IO_PENDING
, "Last error was %d\n", GetLastError());
5603 SetLastError(0xdeadbeef);
5605 num_bytes
= 0xdeadbeef;
5606 olp
= (WSAOVERLAPPED
*)0xdeadbeef;
5607 bret
= GetQueuedCompletionStatus( io_port
, &num_bytes
, &key
, &olp
, 200 );
5608 ok(bret
== FALSE
, "failed to get completion status %u\n", bret
);
5609 ok(GetLastError() == WAIT_TIMEOUT
, "Last error was %d\n", GetLastError());
5610 ok(key
== 0xdeadbeef, "Key is %lu\n", key
);
5611 ok(num_bytes
== 0xdeadbeef, "Number of bytes transferred is %u\n", num_bytes
);
5612 ok(!olp
, "Overlapped structure is at %p\n", olp
);
5615 src
= INVALID_SOCKET
;
5617 dup
= INVALID_SOCKET
;
5619 SetLastError(0xdeadbeef);
5621 num_bytes
= 0xdeadbeef;
5622 olp
= (WSAOVERLAPPED
*)0xdeadbeef;
5623 bret
= GetQueuedCompletionStatus(io_port
, &num_bytes
, &key
, &olp
, 100);
5624 ok(bret
== FALSE
, "failed to get completion status %u\n", bret
);
5625 ok(GetLastError() == ERROR_OPERATION_ABORTED
, "Last error was %d\n", GetLastError());
5626 ok(key
== 125, "Key is %lu\n", key
);
5627 ok(num_bytes
== 0, "Number of bytes transferred is %u\n", num_bytes
);
5628 ok(olp
== &ov
, "Overlapped structure is at %p\n", olp
);
5629 ok(olp
&& olp
->Internal
== (ULONG
)STATUS_CANCELLED
, "Internal status is %lx\n", olp
? olp
->Internal
: 0);
5631 SetLastError(0xdeadbeef);
5633 num_bytes
= 0xdeadbeef;
5634 olp
= (WSAOVERLAPPED
*)0xdeadbeef;
5635 bret
= GetQueuedCompletionStatus( io_port
, &num_bytes
, &key
, &olp
, 200 );
5636 ok(bret
== FALSE
, "failed to get completion status %u\n", bret
);
5637 ok(GetLastError() == WAIT_TIMEOUT
, "Last error was %d\n", GetLastError());
5638 ok(key
== 0xdeadbeef, "Key is %lu\n", key
);
5639 ok(num_bytes
== 0xdeadbeef, "Number of bytes transferred is %u\n", num_bytes
);
5640 ok(!olp
, "Overlapped structure is at %p\n", olp
);
5642 /* Test IOCP with duplicated handle (closing duplicated handle) */
5644 if ((src
= setup_iocp_src(&bindAddress
)) == INVALID_SOCKET
)
5647 SetLastError(0xdeadbeef);
5649 io_port
= CreateIoCompletionPort((HANDLE
)src
, previous_port
, 125, 0);
5650 ok(io_port
!= NULL
, "failed to create completion port %u\n", GetLastError());
5652 WSADuplicateSocket( src
, GetCurrentProcessId(), &info
);
5653 dup
= WSASocket(AF_INET
, SOCK_STREAM
, 0, &info
, 0, WSA_FLAG_OVERLAPPED
);
5654 ok(dup
!= INVALID_SOCKET
, "failed to duplicate socket!\n");
5656 bret
= pAcceptEx(dup
, dest
, buf
, sizeof(buf
) - 2*(sizeof(struct sockaddr_in
) + 16),
5657 sizeof(struct sockaddr_in
) + 16, sizeof(struct sockaddr_in
) + 16,
5659 ok(bret
== FALSE
, "AcceptEx returned %d\n", bret
);
5660 ok(GetLastError() == ERROR_IO_PENDING
, "Last error was %d\n", GetLastError());
5663 dup
= INVALID_SOCKET
;
5665 SetLastError(0xdeadbeef);
5667 num_bytes
= 0xdeadbeef;
5668 olp
= (WSAOVERLAPPED
*)0xdeadbeef;
5669 bret
= GetQueuedCompletionStatus( io_port
, &num_bytes
, &key
, &olp
, 200 );
5670 ok(bret
== FALSE
, "failed to get completion status %u\n", bret
);
5671 ok(GetLastError() == WAIT_TIMEOUT
, "Last error was %d\n", GetLastError());
5672 ok(key
== 0xdeadbeef, "Key is %lu\n", key
);
5673 ok(num_bytes
== 0xdeadbeef, "Number of bytes transferred is %u\n", num_bytes
);
5674 ok(!olp
, "Overlapped structure is at %p\n", olp
);
5676 SetLastError(0xdeadbeef);
5678 num_bytes
= 0xdeadbeef;
5679 olp
= (WSAOVERLAPPED
*)0xdeadbeef;
5680 bret
= GetQueuedCompletionStatus( io_port
, &num_bytes
, &key
, &olp
, 200 );
5681 ok(bret
== FALSE
, "failed to get completion status %u\n", bret
);
5682 ok(GetLastError() == WAIT_TIMEOUT
, "Last error was %d\n", GetLastError());
5683 ok(key
== 0xdeadbeef, "Key is %lu\n", key
);
5684 ok(num_bytes
== 0xdeadbeef, "Number of bytes transferred is %u\n", num_bytes
);
5685 ok(!olp
, "Overlapped structure is at %p\n", olp
);
5688 src
= INVALID_SOCKET
;
5690 bret
= GetQueuedCompletionStatus(io_port
, &num_bytes
, &key
, &olp
, 100);
5691 ok(bret
== FALSE
, "failed to get completion status %u\n", bret
);
5692 ok(GetLastError() == ERROR_OPERATION_ABORTED
, "Last error was %d\n", GetLastError());
5693 ok(key
== 125, "Key is %lu\n", key
);
5694 ok(num_bytes
== 0, "Number of bytes transferred is %u\n", num_bytes
);
5695 ok(olp
== &ov
, "Overlapped structure is at %p\n", olp
);
5696 ok(olp
&& (olp
->Internal
== (ULONG
)STATUS_CANCELLED
), "Internal status is %lx\n", olp
? olp
->Internal
: 0);
5698 SetLastError(0xdeadbeef);
5700 num_bytes
= 0xdeadbeef;
5701 olp
= (WSAOVERLAPPED
*)0xdeadbeef;
5702 bret
= GetQueuedCompletionStatus( io_port
, &num_bytes
, &key
, &olp
, 200 );
5703 ok(bret
== FALSE
, "failed to get completion status %u\n", bret
);
5704 ok(GetLastError() == WAIT_TIMEOUT
, "Last error was %d\n", GetLastError());
5705 ok(key
== 0xdeadbeef, "Key is %lu\n", key
);
5706 ok(num_bytes
== 0xdeadbeef, "Number of bytes transferred is %u\n", num_bytes
);
5707 ok(!olp
, "Overlapped structure is at %p\n", olp
);
5709 /* Test IOCP with duplicated handle (closing original handle) */
5711 if ((src
= setup_iocp_src(&bindAddress
)) == INVALID_SOCKET
)
5714 SetLastError(0xdeadbeef);
5716 io_port
= CreateIoCompletionPort((HANDLE
)src
, previous_port
, 125, 0);
5717 ok(io_port
!= NULL
, "failed to create completion port %u\n", GetLastError());
5719 WSADuplicateSocket( src
, GetCurrentProcessId(), &info
);
5720 dup
= WSASocket(AF_INET
, SOCK_STREAM
, 0, &info
, 0, WSA_FLAG_OVERLAPPED
);
5721 ok(dup
!= INVALID_SOCKET
, "failed to duplicate socket!\n");
5723 bret
= pAcceptEx(dup
, dest
, buf
, sizeof(buf
) - 2*(sizeof(struct sockaddr_in
) + 16),
5724 sizeof(struct sockaddr_in
) + 16, sizeof(struct sockaddr_in
) + 16,
5726 ok(bret
== FALSE
, "AcceptEx returned %d\n", bret
);
5727 ok(GetLastError() == ERROR_IO_PENDING
, "Last error was %d\n", GetLastError());
5730 src
= INVALID_SOCKET
;
5732 SetLastError(0xdeadbeef);
5734 num_bytes
= 0xdeadbeef;
5735 olp
= (WSAOVERLAPPED
*)0xdeadbeef;
5736 bret
= GetQueuedCompletionStatus( io_port
, &num_bytes
, &key
, &olp
, 200 );
5737 ok(bret
== FALSE
, "failed to get completion status %u\n", bret
);
5738 ok(GetLastError() == WAIT_TIMEOUT
, "Last error was %d\n", GetLastError());
5739 ok(key
== 0xdeadbeef, "Key is %lu\n", key
);
5740 ok(num_bytes
== 0xdeadbeef, "Number of bytes transferred is %u\n", num_bytes
);
5741 ok(!olp
, "Overlapped structure is at %p\n", olp
);
5744 dup
= INVALID_SOCKET
;
5746 bret
= GetQueuedCompletionStatus(io_port
, &num_bytes
, &key
, &olp
, 100);
5747 ok(bret
== FALSE
, "failed to get completion status %u\n", bret
);
5748 ok(GetLastError() == ERROR_OPERATION_ABORTED
, "Last error was %d\n", GetLastError());
5749 ok(key
== 125, "Key is %lu\n", key
);
5750 ok(num_bytes
== 0, "Number of bytes transferred is %u\n", num_bytes
);
5751 ok(olp
== &ov
, "Overlapped structure is at %p\n", olp
);
5752 ok(olp
&& (olp
->Internal
== (ULONG
)STATUS_CANCELLED
), "Internal status is %lx\n", olp
? olp
->Internal
: 0);
5754 SetLastError(0xdeadbeef);
5756 num_bytes
= 0xdeadbeef;
5757 olp
= (WSAOVERLAPPED
*)0xdeadbeef;
5758 bret
= GetQueuedCompletionStatus( io_port
, &num_bytes
, &key
, &olp
, 200 );
5759 ok(bret
== FALSE
, "failed to get completion status %u\n", bret
);
5760 ok(GetLastError() == WAIT_TIMEOUT
, "Last error was %d\n", GetLastError());
5761 ok(key
== 0xdeadbeef, "Key is %lu\n", key
);
5762 ok(num_bytes
== 0xdeadbeef, "Number of bytes transferred is %u\n", num_bytes
);
5763 ok(!olp
, "Overlapped structure is at %p\n", olp
);
5765 /* Test IOCP without AcceptEx */
5767 if ((src
= setup_iocp_src(&bindAddress
)) == INVALID_SOCKET
)
5770 SetLastError(0xdeadbeef);
5772 io_port
= CreateIoCompletionPort((HANDLE
)src
, previous_port
, 125, 0);
5773 ok(io_port
!= NULL
, "failed to create completion port %u\n", GetLastError());
5776 src
= INVALID_SOCKET
;
5778 SetLastError(0xdeadbeef);
5780 num_bytes
= 0xdeadbeef;
5781 olp
= (WSAOVERLAPPED
*)0xdeadbeef;
5782 bret
= GetQueuedCompletionStatus( io_port
, &num_bytes
, &key
, &olp
, 200 );
5783 ok(bret
== FALSE
, "failed to get completion status %u\n", bret
);
5784 ok(GetLastError() == WAIT_TIMEOUT
, "Last error was %d\n", GetLastError());
5785 ok(key
== 0xdeadbeef, "Key is %lu\n", key
);
5786 ok(num_bytes
== 0xdeadbeef, "Number of bytes transferred is %u\n", num_bytes
);
5787 ok(!olp
, "Overlapped structure is at %p\n", olp
);
5791 if ((src
= setup_iocp_src(&bindAddress
)) == INVALID_SOCKET
)
5794 connector
= socket(AF_INET
, SOCK_STREAM
, 0);
5795 if (connector
== INVALID_SOCKET
) {
5796 skip("could not create connector socket, error %d\n", WSAGetLastError());
5800 io_port
= CreateIoCompletionPort((HANDLE
)src
, previous_port
, 125, 0);
5801 ok(io_port
!= NULL
, "failed to create completion port %u\n", GetLastError());
5803 io_port
= CreateIoCompletionPort((HANDLE
)dest
, previous_port
, 236, 0);
5804 ok(io_port
!= NULL
, "failed to create completion port %u\n", GetLastError());
5806 bret
= pAcceptEx(src
, dest
, buf
, sizeof(buf
) - 2*(sizeof(struct sockaddr_in
) + 16),
5807 sizeof(struct sockaddr_in
) + 16, sizeof(struct sockaddr_in
) + 16,
5809 ok(bret
== FALSE
, "AcceptEx returned %d\n", bret
);
5810 ok(GetLastError() == ERROR_IO_PENDING
, "Last error was %d\n", GetLastError());
5812 iret
= connect(connector
, (struct sockaddr
*)&bindAddress
, sizeof(bindAddress
));
5813 ok(iret
== 0, "connecting to accepting socket failed, error %d\n", GetLastError());
5815 closesocket(connector
);
5816 connector
= INVALID_SOCKET
;
5818 SetLastError(0xdeadbeef);
5820 num_bytes
= 0xdeadbeef;
5821 olp
= (WSAOVERLAPPED
*)0xdeadbeef;
5823 bret
= GetQueuedCompletionStatus(io_port
, &num_bytes
, &key
, &olp
, 100);
5824 ok(bret
== TRUE
, "failed to get completion status %u\n", bret
);
5825 ok(GetLastError() == 0xdeadbeef, "Last error was %d\n", GetLastError());
5826 ok(key
== 125, "Key is %lu\n", key
);
5827 ok(num_bytes
== 0, "Number of bytes transferred is %u\n", num_bytes
);
5828 ok(olp
== &ov
, "Overlapped structure is at %p\n", olp
);
5829 ok(olp
&& (olp
->Internal
== (ULONG
)STATUS_SUCCESS
), "Internal status is %lx\n", olp
? olp
->Internal
: 0);
5831 SetLastError(0xdeadbeef);
5833 num_bytes
= 0xdeadbeef;
5834 olp
= (WSAOVERLAPPED
*)0xdeadbeef;
5835 bret
= GetQueuedCompletionStatus( io_port
, &num_bytes
, &key
, &olp
, 200 );
5836 ok(bret
== FALSE
, "failed to get completion status %u\n", bret
);
5837 ok(GetLastError() == WAIT_TIMEOUT
, "Last error was %d\n", GetLastError());
5838 ok(key
== 0xdeadbeef, "Key is %lu\n", key
);
5839 ok(num_bytes
== 0xdeadbeef, "Number of bytes transferred is %u\n", num_bytes
);
5840 ok(!olp
, "Overlapped structure is at %p\n", olp
);
5842 if (dest
!= INVALID_SOCKET
)
5844 if (src
!= INVALID_SOCKET
)
5849 if ((src
= setup_iocp_src(&bindAddress
)) == INVALID_SOCKET
)
5852 dest
= socket(AF_INET
, SOCK_STREAM
, 0);
5853 if (dest
== INVALID_SOCKET
)
5855 skip("could not create acceptor socket, error %d\n", WSAGetLastError());
5859 connector
= socket(AF_INET
, SOCK_STREAM
, 0);
5860 if (connector
== INVALID_SOCKET
) {
5861 skip("could not create connector socket, error %d\n", WSAGetLastError());
5865 io_port
= CreateIoCompletionPort((HANDLE
)src
, previous_port
, 125, 0);
5866 ok(io_port
!= NULL
, "failed to create completion port %u\n", GetLastError());
5868 io_port
= CreateIoCompletionPort((HANDLE
)dest
, previous_port
, 236, 0);
5869 ok(io_port
!= NULL
, "failed to create completion port %u\n", GetLastError());
5871 bret
= pAcceptEx(src
, dest
, buf
, sizeof(buf
) - 2*(sizeof(struct sockaddr_in
) + 16),
5872 sizeof(struct sockaddr_in
) + 16, sizeof(struct sockaddr_in
) + 16,
5874 ok(bret
== FALSE
, "AcceptEx returned %d\n", bret
);
5875 ok(GetLastError() == ERROR_IO_PENDING
, "Last error was %d\n", GetLastError());
5877 iret
= connect(connector
, (struct sockaddr
*)&bindAddress
, sizeof(bindAddress
));
5878 ok(iret
== 0, "connecting to accepting socket failed, error %d\n", GetLastError());
5880 iret
= send(connector
, buf
, 1, 0);
5881 ok(iret
== 1, "could not send 1 byte: send %d errno %d\n", iret
, WSAGetLastError());
5884 dest
= INVALID_SOCKET
;
5886 SetLastError(0xdeadbeef);
5888 num_bytes
= 0xdeadbeef;
5889 olp
= (WSAOVERLAPPED
*)0xdeadbeef;
5891 bret
= GetQueuedCompletionStatus(io_port
, &num_bytes
, &key
, &olp
, 100);
5892 ok(bret
== TRUE
, "failed to get completion status %u\n", bret
);
5893 ok(GetLastError() == 0xdeadbeef, "Last error was %d\n", GetLastError());
5894 ok(key
== 125, "Key is %lu\n", key
);
5895 ok(num_bytes
== 1, "Number of bytes transferred is %u\n", num_bytes
);
5896 ok(olp
== &ov
, "Overlapped structure is at %p\n", olp
);
5897 ok(olp
&& (olp
->Internal
== (ULONG
)STATUS_SUCCESS
), "Internal status is %lx\n", olp
? olp
->Internal
: 0);
5899 SetLastError(0xdeadbeef);
5901 num_bytes
= 0xdeadbeef;
5902 olp
= (WSAOVERLAPPED
*)0xdeadbeef;
5903 bret
= GetQueuedCompletionStatus( io_port
, &num_bytes
, &key
, &olp
, 200 );
5904 ok(bret
== FALSE
, "failed to get completion status %u\n", bret
);
5905 ok(GetLastError() == WAIT_TIMEOUT
, "Last error was %d\n", GetLastError());
5906 ok(key
== 0xdeadbeef, "Key is %lu\n", key
);
5907 ok(num_bytes
== 0xdeadbeef, "Number of bytes transferred is %u\n", num_bytes
);
5908 ok(!olp
, "Overlapped structure is at %p\n", olp
);
5910 if (src
!= INVALID_SOCKET
)
5912 if (connector
!= INVALID_SOCKET
)
5913 closesocket(connector
);
5917 if ((src
= setup_iocp_src(&bindAddress
)) == INVALID_SOCKET
)
5920 dest
= socket(AF_INET
, SOCK_STREAM
, 0);
5921 if (dest
== INVALID_SOCKET
)
5923 skip("could not create acceptor socket, error %d\n", WSAGetLastError());
5927 connector
= socket(AF_INET
, SOCK_STREAM
, 0);
5928 if (connector
== INVALID_SOCKET
) {
5929 skip("could not create connector socket, error %d\n", WSAGetLastError());
5933 io_port
= CreateIoCompletionPort((HANDLE
)src
, previous_port
, 125, 0);
5934 ok(io_port
!= NULL
, "failed to create completion port %u\n", GetLastError());
5936 io_port
= CreateIoCompletionPort((HANDLE
)dest
, previous_port
, 236, 0);
5937 ok(io_port
!= NULL
, "failed to create completion port %u\n", GetLastError());
5939 bret
= pAcceptEx(src
, dest
, buf
, sizeof(buf
) - 2*(sizeof(struct sockaddr_in
) + 16),
5940 sizeof(struct sockaddr_in
) + 16, sizeof(struct sockaddr_in
) + 16,
5942 ok(bret
== FALSE
, "AcceptEx returned %d\n", bret
);
5943 ok(GetLastError() == ERROR_IO_PENDING
, "Last error was %d\n", GetLastError());
5945 iret
= connect(connector
, (struct sockaddr
*)&bindAddress
, sizeof(bindAddress
));
5946 ok(iret
== 0, "connecting to accepting socket failed, error %d\n", GetLastError());
5949 dest
= INVALID_SOCKET
;
5951 SetLastError(0xdeadbeef);
5953 num_bytes
= 0xdeadbeef;
5954 olp
= (WSAOVERLAPPED
*)0xdeadbeef;
5956 bret
= GetQueuedCompletionStatus(io_port
, &num_bytes
, &key
, &olp
, 100);
5957 ok(bret
== FALSE
, "failed to get completion status %u\n", bret
);
5958 todo_wine
ok((GetLastError() == ERROR_NETNAME_DELETED
) || (GetLastError() == ERROR_CONNECTION_ABORTED
), "Last error was %d\n", GetLastError());
5959 ok(key
== 125, "Key is %lu\n", key
);
5960 ok(num_bytes
== 0, "Number of bytes transferred is %u\n", num_bytes
);
5961 ok(olp
== &ov
, "Overlapped structure is at %p\n", olp
);
5962 todo_wine
ok(olp
&& ((olp
->Internal
== (ULONG
)STATUS_LOCAL_DISCONNECT
)
5963 || (olp
->Internal
== (ULONG
)STATUS_CONNECTION_ABORTED
)), "Internal status is %lx\n", olp
? olp
->Internal
: 0);
5965 SetLastError(0xdeadbeef);
5967 num_bytes
= 0xdeadbeef;
5968 olp
= (WSAOVERLAPPED
*)0xdeadbeef;
5969 bret
= GetQueuedCompletionStatus( io_port
, &num_bytes
, &key
, &olp
, 200 );
5970 ok(bret
== FALSE
, "failed to get completion status %u\n", bret
);
5971 ok(GetLastError() == WAIT_TIMEOUT
, "Last error was %d\n", GetLastError());
5972 ok(key
== 0xdeadbeef, "Key is %lu\n", key
);
5973 ok(num_bytes
== 0xdeadbeef, "Number of bytes transferred is %u\n", num_bytes
);
5974 ok(!olp
, "Overlapped structure is at %p\n", olp
);
5978 if (dest
!= INVALID_SOCKET
)
5980 if (src
!= INVALID_SOCKET
)
5982 if (connector
!= INVALID_SOCKET
)
5983 closesocket(connector
);
5984 CloseHandle(previous_port
);
5987 /**************** Main program ***************/
5993 /* Leave these tests at the beginning. They depend on WSAStartup not having been
5994 * called, which is done by Init() below. */
5995 test_WithoutWSAStartup();
5996 test_WithWSAStartup();
6000 test_set_getsockopt();
6001 test_so_reuseaddr();
6003 test_extendedSocketOptions();
6005 for (i
= 0; i
< sizeof(tests
)/sizeof(tests
[0]); i
++)
6007 trace ( " **** STARTING TEST %d ****\n", i
);
6008 do_test ( &tests
[i
] );
6009 trace ( " **** TEST %d COMPLETE ****\n", i
);
6014 test_getservbyname();
6017 test_WSAAddressToStringA();
6018 test_WSAAddressToStringW();
6020 test_WSAStringToAddressA();
6021 test_WSAStringToAddressW();
6029 test_addr_to_print();
6032 test_gethostbyname_hack();
6041 test_GetAddrInfoW();
6046 test_sioRoutingInterfaceQuery();
6048 test_WSAAsyncGetServByPort();
6049 test_WSAAsyncGetServByName();
6051 test_completion_port();
6053 /* this is a io heavy test, do it at the end so the kernel doesn't start dropping packets */
6055 test_synchronous_WSAIoctl();