ws2_32/tests: Test SIO_ROUTING_INTERFACE_QUERY.
[wine/wine-gecko.git] / dlls / ws2_32 / tests / sock.c
blobabe0934d2855f9add46a7ab28428b22000364e5b
1 /*
2 * Unit test suite for winsock functions
4 * Copyright 2002 Martin Wilck
5 * Copyright 2005 Thomas Kho
6 * Copyright 2008 Jeff Zaroyko
8 * This library is free software; you can redistribute it and/or
9 * modify it under the terms of the GNU Lesser General Public
10 * License as published by the Free Software Foundation; either
11 * version 2.1 of the License, or (at your option) any later version.
13 * This library is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 * Lesser General Public License for more details.
18 * You should have received a copy of the GNU Lesser General Public
19 * License along with this library; if not, write to the Free Software
20 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
23 #include <ntstatus.h>
24 #define WIN32_NO_STATUS
25 #include <windows.h>
26 #include <ws2tcpip.h>
27 #include <mswsock.h>
28 #include <stdio.h>
29 #include "wine/test.h"
31 #define MAX_CLIENTS 4 /* Max number of clients */
32 #define NUM_TESTS 4 /* Number of tests performed */
33 #define FIRST_CHAR 'A' /* First character in transferred pattern */
34 #define BIND_SLEEP 10 /* seconds to wait between attempts to bind() */
35 #define BIND_TRIES 6 /* Number of bind() attempts */
36 #define TEST_TIMEOUT 30 /* seconds to wait before killing child threads
37 after server initialization, if something hangs */
39 #define NUM_UDP_PEERS 3 /* Number of UDP sockets to create and test > 1 */
41 #define NUM_THREADS 3 /* Number of threads to run getservbyname */
42 #define NUM_QUERIES 250 /* Number of getservbyname queries per thread */
44 #define SERVERIP "127.0.0.1" /* IP to bind to */
45 #define SERVERPORT 9374 /* Port number to bind to */
47 #define wsa_ok(op, cond, msg) \
48 do { \
49 int tmp, err = 0; \
50 tmp = op; \
51 if ( !(cond tmp) ) err = WSAGetLastError(); \
52 ok ( cond tmp, msg, GetCurrentThreadId(), err); \
53 } while (0);
55 /* Function pointers */
56 static void (WINAPI *pFreeAddrInfoW)(PADDRINFOW) = 0;
57 static int (WINAPI *pGetAddrInfoW)(LPCWSTR,LPCWSTR,const ADDRINFOW *,PADDRINFOW *) = 0;
58 static PCSTR (WINAPI *pInetNtop)(INT,LPVOID,LPSTR,ULONG) = 0;
60 /**************** Structs and typedefs ***************/
62 typedef struct thread_info
64 HANDLE thread;
65 DWORD id;
66 } thread_info;
68 /* Information in the server about open client connections */
69 typedef struct sock_info
71 SOCKET s;
72 struct sockaddr_in addr;
73 struct sockaddr_in peer;
74 char *buf;
75 int n_recvd;
76 int n_sent;
77 } sock_info;
79 /* Test parameters for both server & client */
80 typedef struct test_params
82 int sock_type;
83 int sock_prot;
84 const char *inet_addr;
85 short inet_port;
86 int chunk_size;
87 int n_chunks;
88 int n_clients;
89 } test_params;
91 /* server-specific test parameters */
92 typedef struct server_params
94 test_params *general;
95 DWORD sock_flags;
96 int buflen;
97 } server_params;
99 /* client-specific test parameters */
100 typedef struct client_params
102 test_params *general;
103 DWORD sock_flags;
104 int buflen;
105 } client_params;
107 /* This type combines all information for setting up a test scenario */
108 typedef struct test_setup
110 test_params general;
111 LPVOID srv;
112 server_params srv_params;
113 LPVOID clt;
114 client_params clt_params;
115 } test_setup;
117 /* Thread local storage for server */
118 typedef struct server_memory
120 SOCKET s;
121 struct sockaddr_in addr;
122 sock_info sock[MAX_CLIENTS];
123 } server_memory;
125 /* Thread local storage for client */
126 typedef struct client_memory
128 SOCKET s;
129 struct sockaddr_in addr;
130 char *send_buf;
131 char *recv_buf;
132 } client_memory;
134 /* SelectReadThread thread parameters */
135 typedef struct select_thread_params
137 SOCKET s;
138 BOOL ReadKilled;
139 } select_thread_params;
141 /**************** Static variables ***************/
143 static DWORD tls; /* Thread local storage index */
144 static HANDLE thread[1+MAX_CLIENTS];
145 static DWORD thread_id[1+MAX_CLIENTS];
146 static HANDLE server_ready;
147 static HANDLE client_ready[MAX_CLIENTS];
148 static int client_id;
150 /**************** General utility functions ***************/
152 static int tcp_socketpair(SOCKET *src, SOCKET *dst)
154 SOCKET server = INVALID_SOCKET;
155 struct sockaddr_in addr;
156 int len;
157 int ret;
159 *src = INVALID_SOCKET;
160 *dst = INVALID_SOCKET;
162 *src = socket(AF_INET, SOCK_STREAM, 0);
163 if (*src == INVALID_SOCKET)
164 goto end;
166 server = socket(AF_INET, SOCK_STREAM, 0);
167 if (server == INVALID_SOCKET)
168 goto end;
170 memset(&addr, 0, sizeof(addr));
171 addr.sin_family = AF_INET;
172 addr.sin_addr.s_addr = inet_addr("127.0.0.1");
173 ret = bind(server, (struct sockaddr*)&addr, sizeof(addr));
174 if (ret != 0)
175 goto end;
177 len = sizeof(addr);
178 ret = getsockname(server, (struct sockaddr*)&addr, &len);
179 if (ret != 0)
180 goto end;
182 ret = listen(server, 1);
183 if (ret != 0)
184 goto end;
186 ret = connect(*src, (struct sockaddr*)&addr, sizeof(addr));
187 if (ret != 0)
188 goto end;
190 len = sizeof(addr);
191 *dst = accept(server, (struct sockaddr*)&addr, &len);
193 end:
194 if (server != INVALID_SOCKET)
195 closesocket(server);
196 if (*src != INVALID_SOCKET && *dst != INVALID_SOCKET)
197 return 0;
198 closesocket(*src);
199 closesocket(*dst);
200 return -1;
203 static void set_so_opentype ( BOOL overlapped )
205 int optval = !overlapped, newval, len = sizeof (int);
207 ok ( setsockopt ( INVALID_SOCKET, SOL_SOCKET, SO_OPENTYPE,
208 (LPVOID) &optval, sizeof (optval) ) == 0,
209 "setting SO_OPENTYPE failed\n" );
210 ok ( getsockopt ( INVALID_SOCKET, SOL_SOCKET, SO_OPENTYPE,
211 (LPVOID) &newval, &len ) == 0,
212 "getting SO_OPENTYPE failed\n" );
213 ok ( optval == newval, "failed to set SO_OPENTYPE\n" );
216 static int set_blocking ( SOCKET s, BOOL blocking )
218 u_long val = !blocking;
219 return ioctlsocket ( s, FIONBIO, &val );
222 static void fill_buffer ( char *buf, int chunk_size, int n_chunks )
224 char c, *p;
225 for ( c = FIRST_CHAR, p = buf; c < FIRST_CHAR + n_chunks; c++, p += chunk_size )
226 memset ( p, c, chunk_size );
229 static int test_buffer ( char *buf, int chunk_size, int n_chunks )
231 char c, *p;
232 int i;
233 for ( c = FIRST_CHAR, p = buf; c < FIRST_CHAR + n_chunks; c++, p += chunk_size )
235 for ( i = 0; i < chunk_size; i++ )
236 if ( p[i] != c ) return i;
238 return -1;
242 * This routine is called when a client / server does not expect any more data,
243 * but needs to acknowledge the closing of the connection (by reading 0 bytes).
245 static void read_zero_bytes ( SOCKET s )
247 char buf[256];
248 int tmp, n = 0;
249 while ( ( tmp = recv ( s, buf, 256, 0 ) ) > 0 )
250 n += tmp;
251 ok ( n <= 0, "garbage data received: %d bytes\n", n );
254 static int do_synchronous_send ( SOCKET s, char *buf, int buflen, int sendlen )
256 char* last = buf + buflen, *p;
257 int n = 1;
258 for ( p = buf; n > 0 && p < last; p += n )
259 n = send ( s, p, min ( sendlen, last - p ), 0 );
260 wsa_ok ( n, 0 <=, "do_synchronous_send (%x): error %d\n" );
261 return p - buf;
264 static int do_synchronous_recv ( SOCKET s, char *buf, int buflen, int recvlen )
266 char* last = buf + buflen, *p;
267 int n = 1;
268 for ( p = buf; n > 0 && p < last; p += n )
269 n = recv ( s, p, min ( recvlen, last - p ), 0 );
270 wsa_ok ( n, 0 <=, "do_synchronous_recv (%x): error %d:\n" );
271 return p - buf;
274 static int do_synchronous_recvfrom ( SOCKET s, char *buf, int buflen,int flags,struct sockaddr *from, int *fromlen, int recvlen )
276 char* last = buf + buflen, *p;
277 int n = 1;
278 for ( p = buf; n > 0 && p < last; p += n )
279 n = recvfrom ( s, p, min ( recvlen, last - p ), 0, from, fromlen );
280 wsa_ok ( n, 0 <=, "do_synchronous_recv (%x): error %d:\n" );
281 return p - buf;
285 * Call this routine right after thread startup.
286 * SO_OPENTYPE must by 0, regardless what the server did.
288 static void check_so_opentype (void)
290 int tmp = 1, len;
291 len = sizeof (tmp);
292 getsockopt ( INVALID_SOCKET, SOL_SOCKET, SO_OPENTYPE, (LPVOID) &tmp, &len );
293 ok ( tmp == 0, "check_so_opentype: wrong startup value of SO_OPENTYPE: %d\n", tmp );
296 /**************** Server utility functions ***************/
299 * Even if we have closed our server socket cleanly,
300 * the OS may mark the address "in use" for some time -
301 * this happens with native Linux apps, too.
303 static void do_bind ( SOCKET s, struct sockaddr* addr, int addrlen )
305 int err, wsaerr = 0, n_try = BIND_TRIES;
307 while ( ( err = bind ( s, addr, addrlen ) ) != 0 &&
308 ( wsaerr = WSAGetLastError () ) == WSAEADDRINUSE &&
309 n_try-- >= 0)
311 trace ( "address in use, waiting ...\n" );
312 Sleep ( 1000 * BIND_SLEEP );
314 ok ( err == 0, "failed to bind: %d\n", wsaerr );
317 static void server_start ( server_params *par )
319 int i;
320 test_params *gen = par->general;
321 server_memory *mem = LocalAlloc ( LPTR, sizeof ( server_memory ) );
323 TlsSetValue ( tls, mem );
324 mem->s = WSASocketA ( AF_INET, gen->sock_type, gen->sock_prot,
325 NULL, 0, par->sock_flags );
326 ok ( mem->s != INVALID_SOCKET, "Server: WSASocket failed\n" );
328 mem->addr.sin_family = AF_INET;
329 mem->addr.sin_addr.s_addr = inet_addr ( gen->inet_addr );
330 mem->addr.sin_port = htons ( gen->inet_port );
332 for (i = 0; i < MAX_CLIENTS; i++)
334 mem->sock[i].s = INVALID_SOCKET;
335 mem->sock[i].buf = LocalAlloc ( LPTR, gen->n_chunks * gen->chunk_size );
336 mem->sock[i].n_recvd = 0;
337 mem->sock[i].n_sent = 0;
340 if ( gen->sock_type == SOCK_STREAM )
341 do_bind ( mem->s, (struct sockaddr*) &mem->addr, sizeof (mem->addr) );
344 static void server_stop (void)
346 int i;
347 server_memory *mem = TlsGetValue ( tls );
349 for (i = 0; i < MAX_CLIENTS; i++ )
351 LocalFree ( mem->sock[i].buf );
352 if ( mem->sock[i].s != INVALID_SOCKET )
353 closesocket ( mem->sock[i].s );
355 ok ( closesocket ( mem->s ) == 0, "closesocket failed\n" );
356 LocalFree ( mem );
357 ExitThread ( GetCurrentThreadId () );
360 /**************** Client utilitiy functions ***************/
362 static void client_start ( client_params *par )
364 test_params *gen = par->general;
365 client_memory *mem = LocalAlloc (LPTR, sizeof (client_memory));
367 TlsSetValue ( tls, mem );
369 WaitForSingleObject ( server_ready, INFINITE );
371 mem->s = WSASocketA ( AF_INET, gen->sock_type, gen->sock_prot,
372 NULL, 0, par->sock_flags );
374 mem->addr.sin_family = AF_INET;
375 mem->addr.sin_addr.s_addr = inet_addr ( gen->inet_addr );
376 mem->addr.sin_port = htons ( gen->inet_port );
378 ok ( mem->s != INVALID_SOCKET, "Client: WSASocket failed\n" );
380 mem->send_buf = LocalAlloc ( LPTR, 2 * gen->n_chunks * gen->chunk_size );
381 mem->recv_buf = mem->send_buf + gen->n_chunks * gen->chunk_size;
382 fill_buffer ( mem->send_buf, gen->chunk_size, gen->n_chunks );
384 SetEvent ( client_ready[client_id] );
385 /* Wait for the other clients to come up */
386 WaitForMultipleObjects ( min ( gen->n_clients, MAX_CLIENTS ), client_ready, TRUE, INFINITE );
389 static void client_stop (void)
391 client_memory *mem = TlsGetValue ( tls );
392 wsa_ok ( closesocket ( mem->s ), 0 ==, "closesocket error (%x): %d\n" );
393 LocalFree ( mem->send_buf );
394 LocalFree ( mem );
395 ExitThread(0);
398 /**************** Servers ***************/
401 * simple_server: A very basic server doing synchronous IO.
403 static VOID WINAPI simple_server ( server_params *par )
405 test_params *gen = par->general;
406 server_memory *mem;
407 int pos, n_recvd, n_sent, n_expected = gen->n_chunks * gen->chunk_size, tmp, i,
408 id = GetCurrentThreadId();
410 trace ( "simple_server (%x) starting\n", id );
412 set_so_opentype ( FALSE ); /* non-overlapped */
413 server_start ( par );
414 mem = TlsGetValue ( tls );
416 wsa_ok ( set_blocking ( mem->s, TRUE ), 0 ==, "simple_server (%x): failed to set blocking mode: %d\n");
417 wsa_ok ( listen ( mem->s, SOMAXCONN ), 0 ==, "simple_server (%x): listen failed: %d\n");
419 trace ( "simple_server (%x) ready\n", id );
420 SetEvent ( server_ready ); /* notify clients */
422 for ( i = 0; i < min ( gen->n_clients, MAX_CLIENTS ); i++ )
424 trace ( "simple_server (%x): waiting for client\n", id );
426 /* accept a single connection */
427 tmp = sizeof ( mem->sock[0].peer );
428 mem->sock[0].s = accept ( mem->s, (struct sockaddr*) &mem->sock[0].peer, &tmp );
429 wsa_ok ( mem->sock[0].s, INVALID_SOCKET !=, "simple_server (%x): accept failed: %d\n" );
431 ok ( mem->sock[0].peer.sin_addr.s_addr == inet_addr ( gen->inet_addr ),
432 "simple_server (%x): strange peer address\n", id );
434 /* Receive data & check it */
435 n_recvd = do_synchronous_recv ( mem->sock[0].s, mem->sock[0].buf, n_expected, par->buflen );
436 ok ( n_recvd == n_expected,
437 "simple_server (%x): received less data than expected: %d of %d\n", id, n_recvd, n_expected );
438 pos = test_buffer ( mem->sock[0].buf, gen->chunk_size, gen->n_chunks );
439 ok ( pos == -1, "simple_server (%x): test pattern error: %d\n", id, pos);
441 /* Echo data back */
442 n_sent = do_synchronous_send ( mem->sock[0].s, mem->sock[0].buf, n_expected, par->buflen );
443 ok ( n_sent == n_expected,
444 "simple_server (%x): sent less data than expected: %d of %d\n", id, n_sent, n_expected );
446 /* cleanup */
447 read_zero_bytes ( mem->sock[0].s );
448 wsa_ok ( closesocket ( mem->sock[0].s ), 0 ==, "simple_server (%x): closesocket error: %d\n" );
449 mem->sock[0].s = INVALID_SOCKET;
452 trace ( "simple_server (%x) exiting\n", id );
453 server_stop ();
457 * select_server: A non-blocking server.
459 static VOID WINAPI select_server ( server_params *par )
461 test_params *gen = par->general;
462 server_memory *mem;
463 int n_expected = gen->n_chunks * gen->chunk_size, tmp, i,
464 id = GetCurrentThreadId(), n_connections = 0, n_sent, n_recvd,
465 n_set, delta, n_ready;
466 struct timeval timeout = {0,10}; /* wait for 10 milliseconds */
467 fd_set fds_recv, fds_send, fds_openrecv, fds_opensend;
469 trace ( "select_server (%x) starting\n", id );
471 set_so_opentype ( FALSE ); /* non-overlapped */
472 server_start ( par );
473 mem = TlsGetValue ( tls );
475 wsa_ok ( set_blocking ( mem->s, FALSE ), 0 ==, "select_server (%x): failed to set blocking mode: %d\n");
476 wsa_ok ( listen ( mem->s, SOMAXCONN ), 0 ==, "select_server (%x): listen failed: %d\n");
478 trace ( "select_server (%x) ready\n", id );
479 SetEvent ( server_ready ); /* notify clients */
481 FD_ZERO ( &fds_openrecv );
482 FD_ZERO ( &fds_recv );
483 FD_ZERO ( &fds_send );
484 FD_ZERO ( &fds_opensend );
486 FD_SET ( mem->s, &fds_openrecv );
488 while(1)
490 fds_recv = fds_openrecv;
491 fds_send = fds_opensend;
493 n_set = 0;
495 wsa_ok ( ( n_ready = select ( 0, &fds_recv, &fds_send, NULL, &timeout ) ), SOCKET_ERROR !=,
496 "select_server (%x): select() failed: %d\n" );
498 /* check for incoming requests */
499 if ( FD_ISSET ( mem->s, &fds_recv ) ) {
500 n_set += 1;
502 trace ( "select_server (%x): accepting client connection\n", id );
504 /* accept a single connection */
505 tmp = sizeof ( mem->sock[n_connections].peer );
506 mem->sock[n_connections].s = accept ( mem->s, (struct sockaddr*) &mem->sock[n_connections].peer, &tmp );
507 wsa_ok ( mem->sock[n_connections].s, INVALID_SOCKET !=, "select_server (%x): accept() failed: %d\n" );
509 ok ( mem->sock[n_connections].peer.sin_addr.s_addr == inet_addr ( gen->inet_addr ),
510 "select_server (%x): strange peer address\n", id );
512 /* add to list of open connections */
513 FD_SET ( mem->sock[n_connections].s, &fds_openrecv );
514 FD_SET ( mem->sock[n_connections].s, &fds_opensend );
516 n_connections++;
519 /* handle open requests */
521 for ( i = 0; i < n_connections; i++ )
523 if ( FD_ISSET( mem->sock[i].s, &fds_recv ) ) {
524 n_set += 1;
526 if ( mem->sock[i].n_recvd < n_expected ) {
527 /* Receive data & check it */
528 n_recvd = recv ( mem->sock[i].s, mem->sock[i].buf + mem->sock[i].n_recvd, min ( n_expected - mem->sock[i].n_recvd, par->buflen ), 0 );
529 ok ( n_recvd != SOCKET_ERROR, "select_server (%x): error in recv(): %d\n", id, WSAGetLastError() );
530 mem->sock[i].n_recvd += n_recvd;
532 if ( mem->sock[i].n_recvd == n_expected ) {
533 int pos = test_buffer ( mem->sock[i].buf, gen->chunk_size, gen->n_chunks );
534 ok ( pos == -1, "select_server (%x): test pattern error: %d\n", id, pos );
535 FD_CLR ( mem->sock[i].s, &fds_openrecv );
538 ok ( mem->sock[i].n_recvd <= n_expected, "select_server (%x): received too many bytes: %d\n", id, mem->sock[i].n_recvd );
542 /* only echo back what we've received */
543 delta = mem->sock[i].n_recvd - mem->sock[i].n_sent;
545 if ( FD_ISSET ( mem->sock[i].s, &fds_send ) ) {
546 n_set += 1;
548 if ( ( delta > 0 ) && ( mem->sock[i].n_sent < n_expected ) ) {
549 /* Echo data back */
550 n_sent = send ( mem->sock[i].s, mem->sock[i].buf + mem->sock[i].n_sent, min ( delta, par->buflen ), 0 );
551 ok ( n_sent != SOCKET_ERROR, "select_server (%x): error in send(): %d\n", id, WSAGetLastError() );
552 mem->sock[i].n_sent += n_sent;
554 if ( mem->sock[i].n_sent == n_expected ) {
555 FD_CLR ( mem->sock[i].s, &fds_opensend );
558 ok ( mem->sock[i].n_sent <= n_expected, "select_server (%x): sent too many bytes: %d\n", id, mem->sock[i].n_sent );
563 /* check that select returned the correct number of ready sockets */
564 ok ( ( n_set == n_ready ), "select_server (%x): select() returns wrong number of ready sockets\n", id );
566 /* check if all clients are done */
567 if ( ( fds_opensend.fd_count == 0 )
568 && ( fds_openrecv.fd_count == 1 ) /* initial socket that accepts clients */
569 && ( n_connections == min ( gen->n_clients, MAX_CLIENTS ) ) ) {
570 break;
574 for ( i = 0; i < min ( gen->n_clients, MAX_CLIENTS ); i++ )
576 /* cleanup */
577 read_zero_bytes ( mem->sock[i].s );
578 wsa_ok ( closesocket ( mem->sock[i].s ), 0 ==, "select_server (%x): closesocket error: %d\n" );
579 mem->sock[i].s = INVALID_SOCKET;
582 trace ( "select_server (%x) exiting\n", id );
583 server_stop ();
586 /**************** Clients ***************/
589 * simple_client: A very basic client doing synchronous IO.
591 static VOID WINAPI simple_client ( client_params *par )
593 test_params *gen = par->general;
594 client_memory *mem;
595 int pos, n_sent, n_recvd, n_expected = gen->n_chunks * gen->chunk_size, id;
597 id = GetCurrentThreadId();
598 trace ( "simple_client (%x): starting\n", id );
599 /* wait here because we want to call set_so_opentype before creating a socket */
600 WaitForSingleObject ( server_ready, INFINITE );
601 trace ( "simple_client (%x): server ready\n", id );
603 check_so_opentype ();
604 set_so_opentype ( FALSE ); /* non-overlapped */
605 client_start ( par );
606 mem = TlsGetValue ( tls );
608 /* Connect */
609 wsa_ok ( connect ( mem->s, (struct sockaddr*) &mem->addr, sizeof ( mem->addr ) ),
610 0 ==, "simple_client (%x): connect error: %d\n" );
611 ok ( set_blocking ( mem->s, TRUE ) == 0,
612 "simple_client (%x): failed to set blocking mode\n", id );
613 trace ( "simple_client (%x) connected\n", id );
615 /* send data to server */
616 n_sent = do_synchronous_send ( mem->s, mem->send_buf, n_expected, par->buflen );
617 ok ( n_sent == n_expected,
618 "simple_client (%x): sent less data than expected: %d of %d\n", id, n_sent, n_expected );
620 /* shutdown send direction */
621 wsa_ok ( shutdown ( mem->s, SD_SEND ), 0 ==, "simple_client (%x): shutdown failed: %d\n" );
623 /* Receive data echoed back & check it */
624 n_recvd = do_synchronous_recv ( mem->s, mem->recv_buf, n_expected, par->buflen );
625 ok ( n_recvd == n_expected,
626 "simple_client (%x): received less data than expected: %d of %d\n", id, n_recvd, n_expected );
628 /* check data */
629 pos = test_buffer ( mem->recv_buf, gen->chunk_size, gen->n_chunks );
630 ok ( pos == -1, "simple_client (%x): test pattern error: %d\n", id, pos);
632 /* cleanup */
633 read_zero_bytes ( mem->s );
634 trace ( "simple_client (%x) exiting\n", id );
635 client_stop ();
639 * simple_mixed_client: mixing send and recvfrom
641 static VOID WINAPI simple_mixed_client ( client_params *par )
643 test_params *gen = par->general;
644 client_memory *mem;
645 int pos, n_sent, n_recvd, n_expected = gen->n_chunks * gen->chunk_size, id;
646 int fromLen = sizeof(mem->addr);
647 struct sockaddr test;
649 id = GetCurrentThreadId();
650 trace ( "simple_client (%x): starting\n", id );
651 /* wait here because we want to call set_so_opentype before creating a socket */
652 WaitForSingleObject ( server_ready, INFINITE );
653 trace ( "simple_client (%x): server ready\n", id );
655 check_so_opentype ();
656 set_so_opentype ( FALSE ); /* non-overlapped */
657 client_start ( par );
658 mem = TlsGetValue ( tls );
660 /* Connect */
661 wsa_ok ( connect ( mem->s, (struct sockaddr*) &mem->addr, sizeof ( mem->addr ) ),
662 0 ==, "simple_client (%x): connect error: %d\n" );
663 ok ( set_blocking ( mem->s, TRUE ) == 0,
664 "simple_client (%x): failed to set blocking mode\n", id );
665 trace ( "simple_client (%x) connected\n", id );
667 /* send data to server */
668 n_sent = do_synchronous_send ( mem->s, mem->send_buf, n_expected, par->buflen );
669 ok ( n_sent == n_expected,
670 "simple_client (%x): sent less data than expected: %d of %d\n", id, n_sent, n_expected );
672 /* shutdown send direction */
673 wsa_ok ( shutdown ( mem->s, SD_SEND ), 0 ==, "simple_client (%x): shutdown failed: %d\n" );
675 /* this shouldn't change, since lpFrom, is not updated on
676 connection oriented sockets - exposed by bug 11640
678 ((struct sockaddr_in*)&test)->sin_addr.s_addr = inet_addr("0.0.0.0");
680 /* Receive data echoed back & check it */
681 n_recvd = do_synchronous_recvfrom ( mem->s,
682 mem->recv_buf,
683 n_expected,
685 (struct sockaddr *)&test,
686 &fromLen,
687 par->buflen );
688 ok ( n_recvd == n_expected,
689 "simple_client (%x): received less data than expected: %d of %d\n", id, n_recvd, n_expected );
691 /* check that lpFrom was not updated */
692 ok(0 ==
693 strcmp(
694 inet_ntoa(((struct sockaddr_in*)&test)->sin_addr),
695 "0.0.0.0"), "lpFrom shouldn't be updated on connection oriented sockets\n");
697 /* check data */
698 pos = test_buffer ( mem->recv_buf, gen->chunk_size, gen->n_chunks );
699 ok ( pos == -1, "simple_client (%x): test pattern error: %d\n", id, pos);
701 /* cleanup */
702 read_zero_bytes ( mem->s );
703 trace ( "simple_client (%x) exiting\n", id );
704 client_stop ();
708 * event_client: An event-driven client
710 static void WINAPI event_client ( client_params *par )
712 test_params *gen = par->general;
713 client_memory *mem;
714 int id = GetCurrentThreadId(), n_expected = gen->n_chunks * gen->chunk_size,
715 tmp, err, n;
716 HANDLE event;
717 WSANETWORKEVENTS wsa_events;
718 char *send_last, *recv_last, *send_p, *recv_p;
719 LONG mask = FD_READ | FD_WRITE | FD_CLOSE;
721 trace ( "event_client (%x): starting\n", id );
722 client_start ( par );
723 trace ( "event_client (%x): server ready\n", id );
725 mem = TlsGetValue ( tls );
727 /* Prepare event notification for connect, makes socket nonblocking */
728 event = WSACreateEvent ();
729 WSAEventSelect ( mem->s, event, FD_CONNECT );
730 tmp = connect ( mem->s, (struct sockaddr*) &mem->addr, sizeof ( mem->addr ) );
731 if ( tmp != 0 ) {
732 err = WSAGetLastError ();
733 ok ( err == WSAEWOULDBLOCK, "event_client (%x): connect error: %d\n", id, err );
734 tmp = WaitForSingleObject ( event, INFINITE );
735 ok ( tmp == WAIT_OBJECT_0, "event_client (%x): wait for connect event failed: %d\n", id, tmp );
736 err = WSAEnumNetworkEvents ( mem->s, event, &wsa_events );
737 wsa_ok ( err, 0 ==, "event_client (%x): WSAEnumNetworkEvents error: %d\n" );
738 err = wsa_events.iErrorCode[ FD_CONNECT_BIT ];
739 ok ( err == 0, "event_client (%x): connect error: %d\n", id, err );
740 if ( err ) goto out;
743 trace ( "event_client (%x) connected\n", id );
745 WSAEventSelect ( mem->s, event, mask );
747 recv_p = mem->recv_buf;
748 recv_last = mem->recv_buf + n_expected;
749 send_p = mem->send_buf;
750 send_last = mem->send_buf + n_expected;
752 while ( TRUE )
754 err = WaitForSingleObject ( event, INFINITE );
755 ok ( err == WAIT_OBJECT_0, "event_client (%x): wait failed\n", id );
757 err = WSAEnumNetworkEvents ( mem->s, event, &wsa_events );
758 wsa_ok ( err, 0 ==, "event_client (%x): WSAEnumNetworkEvents error: %d\n" );
760 if ( wsa_events.lNetworkEvents & FD_WRITE )
762 err = wsa_events.iErrorCode[ FD_WRITE_BIT ];
763 ok ( err == 0, "event_client (%x): FD_WRITE error code: %d\n", id, err );
765 if ( err== 0 )
768 n = send ( mem->s, send_p, min ( send_last - send_p, par->buflen ), 0 );
769 if ( n < 0 )
771 err = WSAGetLastError ();
772 ok ( err == WSAEWOULDBLOCK, "event_client (%x): send error: %d\n", id, err );
774 else
775 send_p += n;
777 while ( n >= 0 && send_p < send_last );
779 if ( send_p == send_last )
781 trace ( "event_client (%x): all data sent - shutdown\n", id );
782 shutdown ( mem->s, SD_SEND );
783 mask &= ~FD_WRITE;
784 WSAEventSelect ( mem->s, event, mask );
787 if ( wsa_events.lNetworkEvents & FD_READ )
789 err = wsa_events.iErrorCode[ FD_READ_BIT ];
790 ok ( err == 0, "event_client (%x): FD_READ error code: %d\n", id, err );
791 if ( err != 0 ) break;
793 /* First read must succeed */
794 n = recv ( mem->s, recv_p, min ( recv_last - recv_p, par->buflen ), 0 );
795 wsa_ok ( n, 0 <=, "event_client (%x): recv error: %d\n" );
797 while ( n >= 0 ) {
798 recv_p += n;
799 if ( recv_p == recv_last )
801 mask &= ~FD_READ;
802 trace ( "event_client (%x): all data received\n", id );
803 WSAEventSelect ( mem->s, event, mask );
804 break;
806 n = recv ( mem->s, recv_p, min ( recv_last - recv_p, par->buflen ), 0 );
807 if ( n < 0 && ( err = WSAGetLastError()) != WSAEWOULDBLOCK )
808 ok ( 0, "event_client (%x): read error: %d\n", id, err );
812 if ( wsa_events.lNetworkEvents & FD_CLOSE )
814 trace ( "event_client (%x): close event\n", id );
815 err = wsa_events.iErrorCode[ FD_CLOSE_BIT ];
816 ok ( err == 0, "event_client (%x): FD_CLOSE error code: %d\n", id, err );
817 break;
821 n = send_p - mem->send_buf;
822 ok ( send_p == send_last,
823 "simple_client (%x): sent less data than expected: %d of %d\n", id, n, n_expected );
824 n = recv_p - mem->recv_buf;
825 ok ( recv_p == recv_last,
826 "simple_client (%x): received less data than expected: %d of %d\n", id, n, n_expected );
827 n = test_buffer ( mem->recv_buf, gen->chunk_size, gen->n_chunks );
828 ok ( n == -1, "event_client (%x): test pattern error: %d\n", id, n);
830 out:
831 WSACloseEvent ( event );
832 trace ( "event_client (%x) exiting\n", id );
833 client_stop ();
836 /* Tests for WSAStartup */
838 /* This should fail. WSAStartup should be called before any network function is used. */
839 static void test_WithoutWSAStartup(void)
841 LPVOID ptr;
843 WSASetLastError(0xdeadbeef);
844 ptr = gethostbyname("localhost");
846 todo_wine ok(ptr == NULL, "gethostbyname() succeeded unexpectedly: %d\n", WSAGetLastError());
847 todo_wine ok(WSAGetLastError() == WSANOTINITIALISED, "gethostbyname() failed with unexpected error: %d\n",
848 WSAGetLastError());
851 static void test_WithWSAStartup(void)
853 WSADATA data;
854 WORD version = MAKEWORD( 2, 2 );
855 INT res;
856 LPVOID ptr;
858 res = WSAStartup( version, &data );
859 ok(res == 0, "WSAStartup() failed unexpectedly: %d\n", res);
861 ptr = gethostbyname("localhost");
862 ok(ptr != NULL, "gethostbyname() failed unexpectedly: %d\n", WSAGetLastError());
864 WSACleanup();
867 /**************** Main program utility functions ***************/
869 static void Init (void)
871 WORD ver = MAKEWORD (2, 2);
872 WSADATA data;
873 HMODULE hws2_32 = GetModuleHandle("ws2_32.dll");
875 pFreeAddrInfoW = (void *)GetProcAddress(hws2_32, "FreeAddrInfoW");
876 pGetAddrInfoW = (void *)GetProcAddress(hws2_32, "GetAddrInfoW");
877 pInetNtop = (void *)GetProcAddress(hws2_32, "inet_ntop");
879 ok ( WSAStartup ( ver, &data ) == 0, "WSAStartup failed\n" );
880 tls = TlsAlloc();
883 static void Exit (void)
885 INT ret, err;
886 TlsFree ( tls );
887 ret = WSACleanup();
888 err = WSAGetLastError();
889 ok ( ret == 0, "WSACleanup failed ret = %d GetLastError is %d\n", ret, err);
890 ret = WSACleanup();
891 err = WSAGetLastError();
892 ok ( (ret == SOCKET_ERROR && err == WSANOTINITIALISED) ||
893 broken(ret == 0), /* WinME */
894 "WSACleanup returned %d GetLastError is %d\n", ret, err);
897 static void StartServer (LPTHREAD_START_ROUTINE routine,
898 test_params *general, server_params *par)
900 par->general = general;
901 thread[0] = CreateThread ( NULL, 0, routine, par, 0, &thread_id[0] );
902 ok ( thread[0] != NULL, "Failed to create server thread\n" );
905 static void StartClients (LPTHREAD_START_ROUTINE routine,
906 test_params *general, client_params *par)
908 int i;
909 par->general = general;
910 for ( i = 1; i <= min ( general->n_clients, MAX_CLIENTS ); i++ )
912 client_id = i - 1;
913 thread[i] = CreateThread ( NULL, 0, routine, par, 0, &thread_id[i] );
914 ok ( thread[i] != NULL, "Failed to create client thread\n" );
915 /* Make sure the client is up and running */
916 WaitForSingleObject ( client_ready[client_id], INFINITE );
920 static void do_test( test_setup *test )
922 DWORD i, n = min (test->general.n_clients, MAX_CLIENTS);
923 DWORD wait;
925 server_ready = CreateEventA ( NULL, TRUE, FALSE, NULL );
926 for (i = 0; i <= n; i++)
927 client_ready[i] = CreateEventA ( NULL, TRUE, FALSE, NULL );
929 StartServer ( test->srv, &test->general, &test->srv_params );
930 StartClients ( test->clt, &test->general, &test->clt_params );
931 WaitForSingleObject ( server_ready, INFINITE );
933 wait = WaitForMultipleObjects ( 1 + n, thread, TRUE, 1000 * TEST_TIMEOUT );
934 ok ( wait <= WAIT_OBJECT_0 + n ,
935 "some threads have not completed: %x\n", wait );
937 if ( ! ( wait <= WAIT_OBJECT_0 + n ) )
939 for (i = 0; i <= n; i++)
941 if ( WaitForSingleObject ( thread[i], 0 ) != WAIT_OBJECT_0 )
943 trace ("terminating thread %08x\n", thread_id[i]);
944 TerminateThread ( thread [i], 0 );
948 CloseHandle ( server_ready );
949 for (i = 0; i <= n; i++)
950 CloseHandle ( client_ready[i] );
953 /********* some tests for getsockopt(setsockopt(X)) == X ***********/
954 /* optname = SO_LINGER */
955 LINGER linger_testvals[] = {
956 {0,0},
957 {0,73},
958 {1,0},
959 {5,189}
962 /* optname = SO_RCVTIMEO, SOSNDTIMEO */
963 #define SOCKTIMEOUT1 63000 /* 63 seconds. Do not test fractional part because of a
964 bug in the linux kernel (fixed in 2.6.8) */
965 #define SOCKTIMEOUT2 997000 /* 997 seconds */
967 static void test_set_getsockopt(void)
969 SOCKET s;
970 int i, err, lasterr;
971 int timeout;
972 LINGER lingval;
973 int size;
975 s = socket(AF_INET, SOCK_STREAM, 0);
976 ok(s!=INVALID_SOCKET, "socket() failed error: %d\n", WSAGetLastError());
977 if( s == INVALID_SOCKET) return;
978 /* SO_RCVTIMEO */
979 timeout = SOCKTIMEOUT1;
980 size = sizeof(timeout);
981 err = setsockopt(s, SOL_SOCKET, SO_RCVTIMEO, (char *) &timeout, size);
982 if( !err)
983 err = getsockopt(s, SOL_SOCKET, SO_RCVTIMEO, (char *) &timeout, &size);
984 ok( !err, "get/setsockopt(SO_RCVTIMEO) failed error: %d\n", WSAGetLastError());
985 ok( timeout == SOCKTIMEOUT1, "getsockopt(SO_RCVTIMEO) returned wrong value %d\n", timeout);
987 timeout = 0;
988 size = sizeof(timeout);
989 err = setsockopt(s, SOL_SOCKET, SO_RCVTIMEO, (char *) &timeout, size);
990 if( !err)
991 err = getsockopt(s, SOL_SOCKET, SO_RCVTIMEO, (char *) &timeout, &size);
992 ok( !err, "get/setsockopt(SO_RCVTIMEO) failed error: %d\n", WSAGetLastError());
993 ok( timeout == 0, "getsockopt(SO_RCVTIMEO) returned wrong value %d\n", timeout);
995 /* SO_SNDTIMEO */
996 timeout = SOCKTIMEOUT2; /* 997 seconds. See remark above */
997 size = sizeof(timeout);
998 err = setsockopt(s, SOL_SOCKET, SO_SNDTIMEO, (char *) &timeout, size);
999 if( !err)
1000 err = getsockopt(s, SOL_SOCKET, SO_SNDTIMEO, (char *) &timeout, &size);
1001 ok( !err, "get/setsockopt(SO_SNDTIMEO) failed error: %d\n", WSAGetLastError());
1002 ok( timeout == SOCKTIMEOUT2, "getsockopt(SO_SNDTIMEO) returned wrong value %d\n", timeout);
1003 /* SO_LINGER */
1004 for( i = 0; i < sizeof(linger_testvals)/sizeof(LINGER);i++) {
1005 size = sizeof(lingval);
1006 lingval = linger_testvals[i];
1007 err = setsockopt(s, SOL_SOCKET, SO_LINGER, (char *) &lingval, size);
1008 if( !err)
1009 err = getsockopt(s, SOL_SOCKET, SO_LINGER, (char *) &lingval, &size);
1010 ok( !err, "get/setsockopt(SO_LINGER) failed error: %d\n", WSAGetLastError());
1011 ok( !lingval.l_onoff == !linger_testvals[i].l_onoff &&
1012 (lingval.l_linger == linger_testvals[i].l_linger ||
1013 (!lingval.l_linger && !linger_testvals[i].l_onoff))
1014 , "getsockopt(SO_LINGER #%d) returned wrong value %d,%d not %d,%d\n", i,
1015 lingval.l_onoff, lingval.l_linger,
1016 linger_testvals[i].l_onoff, linger_testvals[i].l_linger);
1018 /* Test for erroneously passing a value instead of a pointer as optval */
1019 size = sizeof(char);
1020 err = setsockopt(s, SOL_SOCKET, SO_DONTROUTE, (char *)1, size);
1021 ok(err == SOCKET_ERROR, "setsockopt with optval being a value passed "
1022 "instead of failing.\n");
1023 lasterr = WSAGetLastError();
1024 ok(lasterr == WSAEFAULT, "setsockopt with optval being a value "
1025 "returned 0x%08x, not WSAEFAULT(0x%08x)\n",
1026 lasterr, WSAEFAULT);
1028 /* SO_RCVTIMEO with invalid values for level */
1029 size = sizeof(timeout);
1030 timeout = SOCKTIMEOUT1;
1031 SetLastError(0xdeadbeef);
1032 err = setsockopt(s, 0xffffffff, SO_RCVTIMEO, (char *) &timeout, size);
1033 ok( (err == SOCKET_ERROR) && (WSAGetLastError() == WSAEINVAL),
1034 "got %d with %d (expected SOCKET_ERROR with WSAEINVAL\n",
1035 err, WSAGetLastError());
1037 timeout = SOCKTIMEOUT1;
1038 SetLastError(0xdeadbeef);
1039 err = setsockopt(s, 0x00008000, SO_RCVTIMEO, (char *) &timeout, size);
1040 ok( (err == SOCKET_ERROR) && (WSAGetLastError() == WSAEINVAL),
1041 "got %d with %d (expected SOCKET_ERROR with WSAEINVAL\n",
1042 err, WSAGetLastError());
1044 closesocket(s);
1047 static void test_so_reuseaddr(void)
1049 struct sockaddr_in saddr;
1050 SOCKET s1,s2;
1051 unsigned int rc,reuse;
1052 int size;
1054 saddr.sin_family = AF_INET;
1055 saddr.sin_port = htons(9375);
1056 saddr.sin_addr.s_addr = inet_addr("127.0.0.1");
1058 s1=socket(AF_INET, SOCK_STREAM, 0);
1059 ok(s1!=INVALID_SOCKET, "socket() failed error: %d\n", WSAGetLastError());
1060 rc = bind(s1, (struct sockaddr*)&saddr, sizeof(saddr));
1061 ok(rc!=SOCKET_ERROR, "bind(s1) failed error: %d\n", WSAGetLastError());
1063 s2=socket(AF_INET, SOCK_STREAM, 0);
1064 ok(s2!=INVALID_SOCKET, "socket() failed error: %d\n", WSAGetLastError());
1066 reuse=0x1234;
1067 size=sizeof(reuse);
1068 rc=getsockopt(s2, SOL_SOCKET, SO_REUSEADDR, (char*)&reuse, &size );
1069 ok(rc==0 && reuse==0,"wrong result in getsockopt(SO_REUSEADDR): rc=%d reuse=%d\n",rc,reuse);
1071 rc = bind(s2, (struct sockaddr*)&saddr, sizeof(saddr));
1072 ok(rc==SOCKET_ERROR, "bind() succeeded\n");
1074 reuse = 1;
1075 rc = setsockopt(s2, SOL_SOCKET, SO_REUSEADDR, (char*)&reuse, sizeof(reuse));
1076 ok(rc==0, "setsockopt() failed error: %d\n", WSAGetLastError());
1078 /* On Win2k3 and above, all SO_REUSEADDR seems to do is to allow binding to
1079 * a port immediately after closing another socket on that port, so
1080 * basically following the BSD socket semantics here. */
1081 closesocket(s1);
1082 rc = bind(s2, (struct sockaddr*)&saddr, sizeof(saddr));
1083 ok(rc==0, "bind() failed error: %d\n", WSAGetLastError());
1085 closesocket(s2);
1088 /************* Array containing the tests to run **********/
1090 #define STD_STREAM_SOCKET \
1091 SOCK_STREAM, \
1092 0, \
1093 SERVERIP, \
1094 SERVERPORT
1096 static test_setup tests [NUM_TESTS] =
1098 /* Test 0: synchronous client and server */
1101 STD_STREAM_SOCKET,
1102 2048,
1106 simple_server,
1108 NULL,
1112 simple_client,
1114 NULL,
1119 /* Test 1: event-driven client, synchronous server */
1122 STD_STREAM_SOCKET,
1123 2048,
1127 simple_server,
1129 NULL,
1133 event_client,
1135 NULL,
1136 WSA_FLAG_OVERLAPPED,
1140 /* Test 2: synchronous client, non-blocking server via select() */
1143 STD_STREAM_SOCKET,
1144 2048,
1148 select_server,
1150 NULL,
1154 simple_client,
1156 NULL,
1161 /* Test 3: synchronous mixed client and server */
1164 STD_STREAM_SOCKET,
1165 2048,
1169 simple_server,
1171 NULL,
1175 simple_mixed_client,
1177 NULL,
1184 static void test_UDP(void)
1186 /* This function tests UDP sendto() and recvfrom(). UDP is unreliable, so it is
1187 possible that this test fails due to dropped packets. */
1189 /* peer 0 receives data from all other peers */
1190 struct sock_info peer[NUM_UDP_PEERS];
1191 char buf[16];
1192 int ss, i, n_recv, n_sent;
1194 memset (buf,0,sizeof(buf));
1195 for ( i = NUM_UDP_PEERS - 1; i >= 0; i-- ) {
1196 ok ( ( peer[i].s = socket ( AF_INET, SOCK_DGRAM, 0 ) ) != INVALID_SOCKET, "UDP: socket failed\n" );
1198 peer[i].addr.sin_family = AF_INET;
1199 peer[i].addr.sin_addr.s_addr = inet_addr ( SERVERIP );
1201 if ( i == 0 ) {
1202 peer[i].addr.sin_port = htons ( SERVERPORT );
1203 } else {
1204 peer[i].addr.sin_port = htons ( 0 );
1207 do_bind ( peer[i].s, (struct sockaddr *) &peer[i].addr, sizeof( peer[i].addr ) );
1209 /* test getsockname() to get peer's port */
1210 ss = sizeof ( peer[i].addr );
1211 ok ( getsockname ( peer[i].s, (struct sockaddr *) &peer[i].addr, &ss ) != SOCKET_ERROR, "UDP: could not getsockname()\n" );
1212 ok ( peer[i].addr.sin_port != htons ( 0 ), "UDP: bind() did not associate port\n" );
1215 /* test getsockname() */
1216 ok ( peer[0].addr.sin_port == htons ( SERVERPORT ), "UDP: getsockname returned incorrect peer port\n" );
1218 for ( i = 1; i < NUM_UDP_PEERS; i++ ) {
1219 /* send client's ip */
1220 memcpy( buf, &peer[i].addr.sin_port, sizeof(peer[i].addr.sin_port) );
1221 n_sent = sendto ( peer[i].s, buf, sizeof(buf), 0, (struct sockaddr*) &peer[0].addr, sizeof(peer[0].addr) );
1222 ok ( n_sent == sizeof(buf), "UDP: sendto() sent wrong amount of data or socket error: %d\n", n_sent );
1225 for ( i = 1; i < NUM_UDP_PEERS; i++ ) {
1226 n_recv = recvfrom ( peer[0].s, buf, sizeof(buf), 0,(struct sockaddr *) &peer[0].peer, &ss );
1227 ok ( n_recv == sizeof(buf), "UDP: recvfrom() received wrong amount of data or socket error: %d\n", n_recv );
1228 ok ( memcmp ( &peer[0].peer.sin_port, buf, sizeof(peer[0].addr.sin_port) ) == 0, "UDP: port numbers do not match\n" );
1232 static void WINAPI do_getservbyname( HANDLE *starttest )
1234 struct {
1235 const char *name;
1236 const char *proto;
1237 int port;
1238 } serv[2] = { {"domain", "udp", 53}, {"telnet", "tcp", 23} };
1240 int i, j;
1241 struct servent *pserv[2];
1243 ok ( WaitForSingleObject ( *starttest, TEST_TIMEOUT * 1000 ) != WAIT_TIMEOUT, "test_getservbyname: timeout waiting for start signal\n");
1245 /* ensure that necessary buffer resizes are completed */
1246 for ( j = 0; j < 2; j++) {
1247 pserv[j] = getservbyname ( serv[j].name, serv[j].proto );
1250 for ( i = 0; i < NUM_QUERIES / 2; i++ ) {
1251 for ( j = 0; j < 2; j++ ) {
1252 pserv[j] = getservbyname ( serv[j].name, serv[j].proto );
1253 ok ( pserv[j] != NULL, "getservbyname could not retrieve information for %s: %d\n", serv[j].name, WSAGetLastError() );
1254 ok ( pserv[j]->s_port == htons(serv[j].port), "getservbyname returned the wrong port for %s: %d\n", serv[j].name, ntohs(pserv[j]->s_port) );
1255 ok ( !strcmp ( pserv[j]->s_proto, serv[j].proto ), "getservbyname returned the wrong protocol for %s: %s\n", serv[j].name, pserv[j]->s_proto );
1256 ok ( !strcmp ( pserv[j]->s_name, serv[j].name ), "getservbyname returned the wrong name for %s: %s\n", serv[j].name, pserv[j]->s_name );
1259 ok ( pserv[0] == pserv[1], "getservbyname: winsock resized servent buffer when not necessary\n" );
1263 static void test_getservbyname(void)
1265 int i;
1266 HANDLE starttest, thread[NUM_THREADS];
1267 DWORD thread_id[NUM_THREADS];
1269 starttest = CreateEvent ( NULL, 1, 0, "test_getservbyname_starttest" );
1271 /* create threads */
1272 for ( i = 0; i < NUM_THREADS; i++ ) {
1273 thread[i] = CreateThread ( NULL, 0, (LPTHREAD_START_ROUTINE) &do_getservbyname, &starttest, 0, &thread_id[i] );
1276 /* signal threads to start */
1277 SetEvent ( starttest );
1279 for ( i = 0; i < NUM_THREADS; i++) {
1280 WaitForSingleObject ( thread[i], TEST_TIMEOUT * 1000 );
1284 static void test_WSASocket(void)
1286 SOCKET sock = INVALID_SOCKET;
1287 WSAPROTOCOL_INFOA *pi;
1288 int providers[] = {6, 0};
1289 int ret, err;
1290 UINT pi_size;
1292 /* Set pi_size explicitly to a value below 2*sizeof(WSAPROTOCOL_INFOA)
1293 * to avoid a crash on win98.
1295 pi_size = 0;
1296 ret = WSAEnumProtocolsA(providers, NULL, &pi_size);
1297 ok(ret == SOCKET_ERROR, "WSAEnumProtocolsA({6,0}, NULL, 0) returned %d\n",
1298 ret);
1299 err = WSAGetLastError();
1300 ok(err == WSAENOBUFS, "WSAEnumProtocolsA error is %d, not WSAENOBUFS(%d)\n",
1301 err, WSAENOBUFS);
1303 pi = HeapAlloc(GetProcessHeap(), 0, pi_size);
1304 ok(pi != NULL, "Failed to allocate memory\n");
1305 if (pi == NULL) {
1306 skip("Can't continue without memory.\n");
1307 return;
1310 ret = WSAEnumProtocolsA(providers, pi, &pi_size);
1311 ok(ret != SOCKET_ERROR, "WSAEnumProtocolsA failed, last error is %d\n",
1312 WSAGetLastError());
1314 if (ret == 0) {
1315 skip("No protocols enumerated.\n");
1316 HeapFree(GetProcessHeap(), 0, pi);
1317 return;
1320 sock = WSASocketA(FROM_PROTOCOL_INFO, FROM_PROTOCOL_INFO,
1321 FROM_PROTOCOL_INFO, &pi[0], 0, 0);
1322 ok(sock != INVALID_SOCKET, "Failed to create socket: %d\n",
1323 WSAGetLastError());
1325 closesocket(sock);
1326 HeapFree(GetProcessHeap(), 0, pi);
1329 static void test_WSAAddressToStringA(void)
1331 SOCKET v6 = INVALID_SOCKET;
1332 INT ret;
1333 DWORD len;
1334 int GLE;
1335 SOCKADDR_IN sockaddr;
1336 CHAR address[22]; /* 12 digits + 3 dots + ':' + 5 digits + '\0' */
1338 CHAR expect1[] = "0.0.0.0";
1339 CHAR expect2[] = "255.255.255.255";
1340 CHAR expect3[] = "0.0.0.0:65535";
1341 CHAR expect4[] = "255.255.255.255:65535";
1343 SOCKADDR_IN6 sockaddr6;
1344 CHAR address6[54]; /* 32 digits + 7':' + '[' + '%" + 5 digits + ']:' + 5 digits + '\0' */
1346 CHAR addr6_1[] = {0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x01};
1347 CHAR addr6_2[] = {0x20,0xab,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x01};
1348 CHAR addr6_3[] = {0x20,0xab,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x20,0x01};
1350 CHAR expect6_1[] = "::1";
1351 CHAR expect6_2[] = "20ab::1";
1352 CHAR expect6_3[] = "[20ab::2001]:33274";
1353 CHAR expect6_3_2[] = "[20ab::2001%4660]:33274";
1354 CHAR expect6_3_3[] = "20ab::2001%4660";
1356 len = 0;
1358 sockaddr.sin_family = AF_INET;
1359 sockaddr.sin_port = 0;
1360 sockaddr.sin_addr.s_addr = 0;
1362 ret = WSAAddressToStringA( (SOCKADDR*)&sockaddr, sizeof(sockaddr), NULL, address, &len );
1363 GLE = WSAGetLastError();
1364 ok( (ret == SOCKET_ERROR && GLE == WSAEFAULT) || (ret == 0),
1365 "WSAAddressToStringA() failed unexpectedly: WSAGetLastError()=%d, ret=%d\n",
1366 GLE, ret );
1368 len = sizeof(address);
1370 sockaddr.sin_family = AF_INET;
1371 sockaddr.sin_port = 0;
1372 sockaddr.sin_addr.s_addr = 0;
1374 ret = WSAAddressToStringA( (SOCKADDR*)&sockaddr, sizeof(sockaddr), NULL, address, &len );
1375 ok( !ret, "WSAAddressToStringA() failed unexpectedly: %d\n", WSAGetLastError() );
1377 ok( !strcmp( address, expect1 ), "Expected: %s, got: %s\n", expect1, address );
1378 ok( len == sizeof( expect1 ), "Got size %d\n", len);
1380 len = sizeof(address);
1382 sockaddr.sin_family = AF_INET;
1383 sockaddr.sin_port = 0;
1384 sockaddr.sin_addr.s_addr = 0xffffffff;
1386 ret = WSAAddressToStringA( (SOCKADDR*)&sockaddr, sizeof(sockaddr), NULL, address, &len );
1387 ok( !ret, "WSAAddressToStringA() failed unexpectedly: %d\n", WSAGetLastError() );
1389 ok( !strcmp( address, expect2 ), "Expected: %s, got: %s\n", expect2, address );
1391 len = sizeof(address);
1393 sockaddr.sin_family = AF_INET;
1394 sockaddr.sin_port = 0xffff;
1395 sockaddr.sin_addr.s_addr = 0;
1397 ret = WSAAddressToStringA( (SOCKADDR*)&sockaddr, sizeof(sockaddr), NULL, address, &len );
1398 ok( !ret, "WSAAddressToStringA() failed unexpectedly: %d\n", WSAGetLastError() );
1400 ok( !strcmp( address, expect3 ), "Expected: %s, got: %s\n", expect3, address );
1402 len = sizeof(address);
1404 sockaddr.sin_family = AF_INET;
1405 sockaddr.sin_port = 0xffff;
1406 sockaddr.sin_addr.s_addr = 0xffffffff;
1408 ret = WSAAddressToStringA( (SOCKADDR*)&sockaddr, sizeof(sockaddr), NULL, address, &len );
1409 ok( !ret, "WSAAddressToStringA() failed unexpectedly: %d\n", WSAGetLastError() );
1411 ok( !strcmp( address, expect4 ), "Expected: %s, got: %s\n", expect4, address );
1412 ok( len == sizeof( expect4 ), "Got size %d\n", len);
1414 /*check to see it IPv6 is available */
1415 v6 = socket(AF_INET6, SOCK_STREAM, IPPROTO_TCP);
1416 if (v6 == INVALID_SOCKET) {
1417 skip("Could not create IPv6 socket (LastError: %d; %d expected if IPv6 not available).\n",
1418 WSAGetLastError(), WSAEAFNOSUPPORT);
1419 goto end;
1421 /* Test a short IPv6 address */
1422 len = sizeof(address6);
1424 sockaddr6.sin6_family = AF_INET6;
1425 sockaddr6.sin6_port = 0x0000;
1426 sockaddr6.sin6_scope_id = 0;
1427 memcpy (sockaddr6.sin6_addr.s6_addr, addr6_1, sizeof(addr6_1));
1429 ret = WSAAddressToStringA( (SOCKADDR*)&sockaddr6, sizeof(sockaddr6), NULL, address6, &len );
1430 ok( !ret, "WSAAddressToStringA() failed unexpectedly: %d\n", WSAGetLastError() );
1431 ok( !strcmp( address6, expect6_1 ), "Expected: %s, got: %s\n", expect6_1, address6 );
1432 ok( len == sizeof(expect6_1), "Got size %d\n", len);
1434 /* Test a longer IPv6 address */
1435 len = sizeof(address6);
1437 sockaddr6.sin6_family = AF_INET6;
1438 sockaddr6.sin6_port = 0x0000;
1439 sockaddr6.sin6_scope_id = 0;
1440 memcpy (sockaddr6.sin6_addr.s6_addr, addr6_2, sizeof(addr6_2));
1442 ret = WSAAddressToStringA( (SOCKADDR*)&sockaddr6, sizeof(sockaddr6), NULL, address6, &len );
1443 ok( !ret, "WSAAddressToStringA() failed unexpectedly: %d\n", WSAGetLastError() );
1444 ok( !strcmp( address6, expect6_2 ), "Expected: %s, got: %s\n", expect6_2, address6 );
1445 ok( len == sizeof(expect6_2), "Got size %d\n", len);
1447 /* Test IPv6 address and port number */
1448 len = sizeof(address6);
1450 sockaddr6.sin6_family = AF_INET6;
1451 sockaddr6.sin6_port = 0xfa81;
1452 sockaddr6.sin6_scope_id = 0;
1453 memcpy (sockaddr6.sin6_addr.s6_addr, addr6_3, sizeof(addr6_3));
1455 ret = WSAAddressToStringA( (SOCKADDR*)&sockaddr6, sizeof(sockaddr6), NULL, address6, &len );
1456 ok( !ret, "WSAAddressToStringA() failed unexpectedly: %d\n", WSAGetLastError() );
1457 ok( !strcmp( address6, expect6_3 ), "Expected: %s, got: %s\n", expect6_3, address6 );
1458 ok( len == sizeof(expect6_3), "Got size %d\n", len);
1460 /* Test IPv6 address, port number and scope_id */
1461 len = sizeof(address6);
1463 sockaddr6.sin6_family = AF_INET6;
1464 sockaddr6.sin6_port = 0xfa81;
1465 sockaddr6.sin6_scope_id = 0x1234;
1466 memcpy (sockaddr6.sin6_addr.s6_addr, addr6_3, sizeof(addr6_3));
1468 ret = WSAAddressToStringA( (SOCKADDR*)&sockaddr6, sizeof(sockaddr6), NULL, address6, &len );
1469 ok( !ret, "WSAAddressToStringA() failed unexpectedly: %d\n", WSAGetLastError() );
1470 ok( !strcmp( address6, expect6_3_2 ), "Expected: %s, got: %s\n", expect6_3_2, address6 );
1471 ok( len == sizeof(expect6_3_2), "Got size %d\n", len);
1473 /* Test IPv6 address and scope_id */
1474 len = sizeof(address6);
1476 sockaddr6.sin6_family = AF_INET6;
1477 sockaddr6.sin6_port = 0x0000;
1478 sockaddr6.sin6_scope_id = 0x1234;
1479 memcpy (sockaddr6.sin6_addr.s6_addr, addr6_3, sizeof(addr6_3));
1481 ret = WSAAddressToStringA( (SOCKADDR*)&sockaddr6, sizeof(sockaddr6), NULL, address6, &len );
1482 ok( !ret, "WSAAddressToStringA() failed unexpectedly: %d\n", WSAGetLastError() );
1483 ok( !strcmp( address6, expect6_3_3 ), "Expected: %s, got: %s\n", expect6_3_3, address6 );
1484 ok( len == sizeof(expect6_3_3), "Got size %d\n", len);
1486 end:
1487 if (v6 != INVALID_SOCKET)
1488 closesocket(v6);
1491 static void test_WSAAddressToStringW(void)
1493 SOCKET v6 = INVALID_SOCKET;
1494 INT ret;
1495 DWORD len;
1496 int GLE;
1497 SOCKADDR_IN sockaddr;
1498 WCHAR address[22]; /* 12 digits + 3 dots + ':' + 5 digits + '\0' */
1500 WCHAR expect1[] = { '0','.','0','.','0','.','0', 0 };
1501 WCHAR expect2[] = { '2','5','5','.','2','5','5','.','2','5','5','.','2','5','5', 0 };
1502 WCHAR expect3[] = { '0','.','0','.','0','.','0', ':', '6', '5', '5', '3', '5', 0 };
1503 WCHAR expect4[] = { '2','5','5','.','2','5','5','.','2','5','5','.','2','5','5', ':',
1504 '6', '5', '5', '3', '5', 0 };
1506 SOCKADDR_IN6 sockaddr6;
1507 WCHAR address6[54]; /* 32 digits + 7':' + '[' + '%" + 5 digits + ']:' + 5 digits + '\0' */
1509 CHAR addr6_1[] = {0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x01};
1510 CHAR addr6_2[] = {0x20,0xab,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x01};
1511 CHAR addr6_3[] = {0x20,0xab,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x20,0x01};
1513 WCHAR expect6_1[] = {':',':','1',0};
1514 WCHAR expect6_2[] = {'2','0','a','b',':',':','1',0};
1515 WCHAR expect6_3[] = {'[','2','0','a','b',':',':','2','0','0','1',']',':','3','3','2','7','4',0};
1516 WCHAR expect6_3_2[] = {'[','2','0','a','b',':',':','2','0','0','1','%','4','6','6','0',']',':','3','3','2','7','4',0};
1517 WCHAR expect6_3_3[] = {'2','0','a','b',':',':','2','0','0','1','%','6','5','5','3','4',0};
1519 len = 0;
1521 sockaddr.sin_family = AF_INET;
1522 sockaddr.sin_port = 0;
1523 sockaddr.sin_addr.s_addr = 0;
1525 ret = WSAAddressToStringW( (SOCKADDR*)&sockaddr, sizeof(sockaddr), NULL, address, &len );
1526 GLE = WSAGetLastError();
1527 ok( (ret == SOCKET_ERROR && GLE == WSAEFAULT) || (ret == 0),
1528 "WSAAddressToStringW() failed unexpectedly: WSAGetLastError()=%d, ret=%d\n",
1529 GLE, ret );
1531 len = sizeof(address);
1533 sockaddr.sin_family = AF_INET;
1534 sockaddr.sin_port = 0;
1535 sockaddr.sin_addr.s_addr = 0;
1537 ret = WSAAddressToStringW( (SOCKADDR*)&sockaddr, sizeof(sockaddr), NULL, address, &len );
1538 ok( !ret, "WSAAddressToStringW() failed unexpectedly: %d\n", WSAGetLastError() );
1540 ok( !lstrcmpW( address, expect1 ), "Expected different address string\n" );
1541 ok( len == sizeof( expect1 )/sizeof( WCHAR ), "Got size %d\n", len);
1543 len = sizeof(address);
1545 sockaddr.sin_family = AF_INET;
1546 sockaddr.sin_port = 0;
1547 sockaddr.sin_addr.s_addr = 0xffffffff;
1549 ret = WSAAddressToStringW( (SOCKADDR*)&sockaddr, sizeof(sockaddr), NULL, address, &len );
1550 ok( !ret, "WSAAddressToStringW() failed unexpectedly: %d\n", WSAGetLastError() );
1552 ok( !lstrcmpW( address, expect2 ), "Expected different address string\n" );
1554 len = sizeof(address);
1556 sockaddr.sin_family = AF_INET;
1557 sockaddr.sin_port = 0xffff;
1558 sockaddr.sin_addr.s_addr = 0;
1560 ret = WSAAddressToStringW( (SOCKADDR*)&sockaddr, sizeof(sockaddr), NULL, address, &len );
1561 ok( !ret, "WSAAddressToStringW() failed unexpectedly: %d\n", WSAGetLastError() );
1563 ok( !lstrcmpW( address, expect3 ), "Expected different address string\n" );
1565 len = sizeof(address);
1567 sockaddr.sin_family = AF_INET;
1568 sockaddr.sin_port = 0xffff;
1569 sockaddr.sin_addr.s_addr = 0xffffffff;
1571 ret = WSAAddressToStringW( (SOCKADDR*)&sockaddr, sizeof(sockaddr), NULL, address, &len );
1572 ok( !ret, "WSAAddressToStringW() failed unexpectedly: %d\n", WSAGetLastError() );
1574 ok( !lstrcmpW( address, expect4 ), "Expected different address string\n" );
1575 ok( len == sizeof( expect4 )/sizeof( WCHAR ), "Got %d\n", len);
1577 /*check to see it IPv6 is available */
1578 v6 = socket(AF_INET6, SOCK_STREAM, IPPROTO_TCP);
1579 if (v6 == INVALID_SOCKET) {
1580 skip("Could not create IPv6 socket (LastError: %d; %d expected if IPv6 not available).\n",
1581 WSAGetLastError(), WSAEAFNOSUPPORT);
1582 goto end;
1585 /* Test a short IPv6 address */
1586 len = sizeof(address6)/sizeof(WCHAR);
1588 sockaddr6.sin6_family = AF_INET6;
1589 sockaddr6.sin6_port = 0x0000;
1590 sockaddr6.sin6_scope_id = 0;
1591 memcpy (sockaddr6.sin6_addr.s6_addr, addr6_1, sizeof(addr6_1));
1593 ret = WSAAddressToStringW( (SOCKADDR*)&sockaddr6, sizeof(sockaddr6), NULL, address6, &len );
1594 ok( !ret, "WSAAddressToStringW() failed unexpectedly: %d\n", WSAGetLastError() );
1595 ok( !lstrcmpW( address6, expect6_1 ), "Wrong string returned\n" );
1596 ok( len == sizeof(expect6_1)/sizeof(WCHAR), "Got %d\n", len);
1598 /* Test a longer IPv6 address */
1599 len = sizeof(address6)/sizeof(WCHAR);
1601 sockaddr6.sin6_family = AF_INET6;
1602 sockaddr6.sin6_port = 0x0000;
1603 sockaddr6.sin6_scope_id = 0;
1604 memcpy (sockaddr6.sin6_addr.s6_addr, addr6_2, sizeof(addr6_2));
1606 ret = WSAAddressToStringW( (SOCKADDR*)&sockaddr6, sizeof(sockaddr6), NULL, address6, &len );
1607 ok( !ret, "WSAAddressToStringW() failed unexpectedly: %d\n", WSAGetLastError() );
1609 ok( !lstrcmpW( address6, expect6_2 ), "Wrong string returned\n" );
1610 ok( len == sizeof(expect6_2)/sizeof(WCHAR), "Got %d\n", len);
1612 /* Test IPv6 address and port number */
1613 len = sizeof(address6)/sizeof(WCHAR);
1615 sockaddr6.sin6_family = AF_INET6;
1616 sockaddr6.sin6_port = 0xfa81;
1617 sockaddr6.sin6_scope_id = 0;
1618 memcpy (sockaddr6.sin6_addr.s6_addr, addr6_3, sizeof(addr6_3));
1620 ret = WSAAddressToStringW( (SOCKADDR*)&sockaddr6, sizeof(sockaddr6), NULL, address6, &len );
1621 ok( !ret, "WSAAddressToStringW() failed unexpectedly: %d\n", WSAGetLastError() );
1622 ok( !lstrcmpW( address6, expect6_3 ), "Wrong string returned\n" );
1623 ok( len == sizeof(expect6_3)/sizeof(WCHAR), "Got %d\n", len);
1625 /* Test IPv6 address, port number and scope_id */
1626 len = sizeof(address6)/sizeof(WCHAR);
1628 sockaddr6.sin6_family = AF_INET6;
1629 sockaddr6.sin6_port = 0xfa81;
1630 sockaddr6.sin6_scope_id = 0x1234;
1631 memcpy (sockaddr6.sin6_addr.s6_addr, addr6_3, sizeof(addr6_3));
1633 ret = WSAAddressToStringW( (SOCKADDR*)&sockaddr6, sizeof(sockaddr6), NULL, address6, &len );
1634 ok( !ret, "WSAAddressToStringW() failed unexpectedly: %d\n", WSAGetLastError() );
1635 ok( !lstrcmpW( address6, expect6_3_2 ), "Wrong string returned\n" );
1636 ok( len == sizeof(expect6_3_2)/sizeof(WCHAR), "Got %d\n", len);
1638 /* Test IPv6 address and scope_id */
1639 len = sizeof(address6)/sizeof(WCHAR);
1641 sockaddr6.sin6_family = AF_INET6;
1642 sockaddr6.sin6_port = 0x0000;
1643 sockaddr6.sin6_scope_id = 0xfffe;
1644 memcpy (sockaddr6.sin6_addr.s6_addr, addr6_3, sizeof(addr6_3));
1646 ret = WSAAddressToStringW( (SOCKADDR*)&sockaddr6, sizeof(sockaddr6), NULL, address6, &len );
1647 ok( !ret, "WSAAddressToStringW() failed unexpectedly: %d\n", WSAGetLastError() );
1648 ok( !lstrcmpW( address6, expect6_3_3 ), "Wrong string returned\n" );
1649 ok( len == sizeof(expect6_3_3)/sizeof(WCHAR), "Got %d\n", len);
1651 end:
1652 if (v6 != INVALID_SOCKET)
1653 closesocket(v6);
1656 static void test_WSAStringToAddressA(void)
1658 INT ret, len;
1659 SOCKADDR_IN sockaddr;
1660 SOCKADDR_IN6 sockaddr6;
1661 int GLE;
1663 CHAR address1[] = "0.0.0.0";
1664 CHAR address2[] = "127.127.127.127";
1665 CHAR address3[] = "255.255.255.255";
1666 CHAR address4[] = "127.127.127.127:65535";
1667 CHAR address5[] = "255.255.255.255:65535";
1668 CHAR address6[] = "::1";
1669 CHAR address7[] = "[::1]";
1670 CHAR address8[] = "[::1]:65535";
1672 len = 0;
1673 sockaddr.sin_family = AF_INET;
1675 ret = WSAStringToAddressA( address1, AF_INET, NULL, (SOCKADDR*)&sockaddr, &len );
1676 ok( ret == SOCKET_ERROR, "WSAStringToAddressA() succeeded unexpectedly: %d\n",
1677 WSAGetLastError() );
1679 len = sizeof(sockaddr);
1680 sockaddr.sin_port = 0;
1681 sockaddr.sin_addr.s_addr = 0;
1683 ret = WSAStringToAddressA( address1, AF_INET, NULL, (SOCKADDR*)&sockaddr, &len );
1684 ok( !ret && sockaddr.sin_addr.s_addr == 0,
1685 "WSAStringToAddressA() failed unexpectedly: %d\n", WSAGetLastError() );
1687 len = sizeof(sockaddr);
1688 sockaddr.sin_port = 0;
1689 sockaddr.sin_addr.s_addr = 0;
1691 ret = WSAStringToAddressA( address2, AF_INET, NULL, (SOCKADDR*)&sockaddr, &len );
1692 ok( !ret && sockaddr.sin_addr.s_addr == 0x7f7f7f7f,
1693 "WSAStringToAddressA() failed unexpectedly: %d\n", WSAGetLastError() );
1695 len = sizeof(sockaddr);
1696 sockaddr.sin_port = 0;
1697 sockaddr.sin_addr.s_addr = 0;
1699 ret = WSAStringToAddressA( address3, AF_INET, NULL, (SOCKADDR*)&sockaddr, &len );
1700 GLE = WSAGetLastError();
1701 ok( (ret == 0 && sockaddr.sin_addr.s_addr == 0xffffffff) ||
1702 (ret == SOCKET_ERROR && (GLE == ERROR_INVALID_PARAMETER || GLE == WSAEINVAL)),
1703 "WSAStringToAddressA() failed unexpectedly: %d\n", GLE );
1705 len = sizeof(sockaddr);
1706 sockaddr.sin_port = 0;
1707 sockaddr.sin_addr.s_addr = 0;
1709 ret = WSAStringToAddressA( address4, AF_INET, NULL, (SOCKADDR*)&sockaddr, &len );
1710 ok( !ret && sockaddr.sin_addr.s_addr == 0x7f7f7f7f && sockaddr.sin_port == 0xffff,
1711 "WSAStringToAddressA() failed unexpectedly: %d\n", WSAGetLastError() );
1713 len = sizeof(sockaddr);
1714 sockaddr.sin_port = 0;
1715 sockaddr.sin_addr.s_addr = 0;
1717 ret = WSAStringToAddressA( address5, AF_INET, NULL, (SOCKADDR*)&sockaddr, &len );
1718 GLE = WSAGetLastError();
1719 ok( (ret == 0 && sockaddr.sin_addr.s_addr == 0xffffffff && sockaddr.sin_port == 0xffff) ||
1720 (ret == SOCKET_ERROR && (GLE == ERROR_INVALID_PARAMETER || GLE == WSAEINVAL)),
1721 "WSAStringToAddressA() failed unexpectedly: %d\n", GLE );
1723 len = sizeof(sockaddr6);
1724 memset(&sockaddr6, 0, len);
1725 sockaddr6.sin6_family = AF_INET6;
1727 ret = WSAStringToAddressA( address6, AF_INET6, NULL, (SOCKADDR*)&sockaddr6,
1728 &len );
1729 GLE = WSAGetLastError();
1730 ok( ret == 0 || (ret == SOCKET_ERROR && GLE == WSAEINVAL),
1731 "WSAStringToAddressA() failed for IPv6 address: %d\n", GLE);
1733 len = sizeof(sockaddr6);
1734 memset(&sockaddr6, 0, len);
1735 sockaddr6.sin6_family = AF_INET6;
1737 ret = WSAStringToAddressA( address7, AF_INET6, NULL, (SOCKADDR*)&sockaddr6,
1738 &len );
1739 GLE = WSAGetLastError();
1740 ok( ret == 0 || (ret == SOCKET_ERROR && GLE == WSAEINVAL),
1741 "WSAStringToAddressA() failed for IPv6 address: %d\n", GLE);
1743 len = sizeof(sockaddr6);
1744 memset(&sockaddr6, 0, len);
1745 sockaddr6.sin6_family = AF_INET6;
1747 ret = WSAStringToAddressA( address8, AF_INET6, NULL, (SOCKADDR*)&sockaddr6,
1748 &len );
1749 GLE = WSAGetLastError();
1750 ok( (ret == 0 && sockaddr6.sin6_port == 0xffff) ||
1751 (ret == SOCKET_ERROR && GLE == WSAEINVAL),
1752 "WSAStringToAddressA() failed for IPv6 address: %d\n", GLE);
1756 static void test_WSAStringToAddressW(void)
1758 INT ret, len;
1759 SOCKADDR_IN sockaddr;
1760 SOCKADDR_IN6 sockaddr6;
1761 int GLE;
1763 WCHAR address1[] = { '0','.','0','.','0','.','0', 0 };
1764 WCHAR address2[] = { '1','2','7','.','1','2','7','.','1','2','7','.','1','2','7', 0 };
1765 WCHAR address3[] = { '2','5','5','.','2','5','5','.','2','5','5','.','2','5','5', 0 };
1766 WCHAR address4[] = { '1','2','7','.','1','2','7','.','1','2','7','.','1','2','7',
1767 ':', '6', '5', '5', '3', '5', 0 };
1768 WCHAR address5[] = { '2','5','5','.','2','5','5','.','2','5','5','.','2','5','5', ':',
1769 '6', '5', '5', '3', '5', 0 };
1770 WCHAR address6[] = {':',':','1','\0'};
1771 WCHAR address7[] = {'[',':',':','1',']','\0'};
1772 WCHAR address8[] = {'[',':',':','1',']',':','6','5','5','3','5','\0'};
1774 len = 0;
1775 sockaddr.sin_family = AF_INET;
1777 ret = WSAStringToAddressW( address1, AF_INET, NULL, (SOCKADDR*)&sockaddr, &len );
1778 ok( ret == SOCKET_ERROR, "WSAStringToAddressW() failed unexpectedly: %d\n",
1779 WSAGetLastError() );
1781 len = sizeof(sockaddr);
1782 sockaddr.sin_port = 0;
1783 sockaddr.sin_addr.s_addr = 0;
1785 ret = WSAStringToAddressW( address1, AF_INET, NULL, (SOCKADDR*)&sockaddr, &len );
1786 ok( !ret && sockaddr.sin_addr.s_addr == 0,
1787 "WSAStringToAddressW() failed unexpectedly: %d\n", WSAGetLastError() );
1789 len = sizeof(sockaddr);
1790 sockaddr.sin_port = 0;
1791 sockaddr.sin_addr.s_addr = 0;
1793 ret = WSAStringToAddressW( address2, AF_INET, NULL, (SOCKADDR*)&sockaddr, &len );
1794 ok( !ret && sockaddr.sin_addr.s_addr == 0x7f7f7f7f,
1795 "WSAStringToAddressW() failed unexpectedly: %d\n", WSAGetLastError() );
1797 len = sizeof(sockaddr);
1798 sockaddr.sin_port = 0;
1799 sockaddr.sin_addr.s_addr = 0;
1801 ret = WSAStringToAddressW( address3, AF_INET, NULL, (SOCKADDR*)&sockaddr, &len );
1802 GLE = WSAGetLastError();
1803 ok( (ret == 0 && sockaddr.sin_addr.s_addr == 0xffffffff) ||
1804 (ret == SOCKET_ERROR && (GLE == ERROR_INVALID_PARAMETER || GLE == WSAEINVAL)),
1805 "WSAStringToAddressW() failed unexpectedly: %d\n", GLE );
1807 len = sizeof(sockaddr);
1808 sockaddr.sin_port = 0;
1809 sockaddr.sin_addr.s_addr = 0;
1811 ret = WSAStringToAddressW( address4, AF_INET, NULL, (SOCKADDR*)&sockaddr, &len );
1812 ok( !ret && sockaddr.sin_addr.s_addr == 0x7f7f7f7f && sockaddr.sin_port == 0xffff,
1813 "WSAStringToAddressW() failed unexpectedly: %d\n", WSAGetLastError() );
1815 len = sizeof(sockaddr);
1816 sockaddr.sin_port = 0;
1817 sockaddr.sin_addr.s_addr = 0;
1819 ret = WSAStringToAddressW( address5, AF_INET, NULL, (SOCKADDR*)&sockaddr, &len );
1820 ok( (ret == 0 && sockaddr.sin_addr.s_addr == 0xffffffff && sockaddr.sin_port == 0xffff) ||
1821 (ret == SOCKET_ERROR && (GLE == ERROR_INVALID_PARAMETER || GLE == WSAEINVAL)),
1822 "WSAStringToAddressW() failed unexpectedly: %d\n", GLE );
1824 len = sizeof(sockaddr6);
1825 memset(&sockaddr6, 0, len);
1826 sockaddr6.sin6_family = AF_INET6;
1828 ret = WSAStringToAddressW( address6, AF_INET6, NULL, (SOCKADDR*)&sockaddr6,
1829 &len );
1830 GLE = WSAGetLastError();
1831 ok( ret == 0 || (ret == SOCKET_ERROR && GLE == WSAEINVAL),
1832 "WSAStringToAddressW() failed for IPv6 address: %d\n", GLE);
1834 len = sizeof(sockaddr6);
1835 memset(&sockaddr6, 0, len);
1836 sockaddr6.sin6_family = AF_INET6;
1838 ret = WSAStringToAddressW( address7, AF_INET6, NULL, (SOCKADDR*)&sockaddr6,
1839 &len );
1840 GLE = WSAGetLastError();
1841 ok( ret == 0 || (ret == SOCKET_ERROR && GLE == WSAEINVAL),
1842 "WSAStringToAddressW() failed for IPv6 address: %d\n", GLE);
1844 len = sizeof(sockaddr6);
1845 memset(&sockaddr6, 0, len);
1846 sockaddr6.sin6_family = AF_INET6;
1848 ret = WSAStringToAddressW( address8, AF_INET6, NULL, (SOCKADDR*)&sockaddr6,
1849 &len );
1850 GLE = WSAGetLastError();
1851 ok( (ret == 0 && sockaddr6.sin6_port == 0xffff) ||
1852 (ret == SOCKET_ERROR && GLE == WSAEINVAL),
1853 "WSAStringToAddressW() failed for IPv6 address: %d\n", GLE);
1857 static VOID WINAPI SelectReadThread(select_thread_params *par)
1859 fd_set readfds;
1860 int ret;
1861 struct sockaddr_in addr;
1862 struct timeval select_timeout;
1864 FD_ZERO(&readfds);
1865 FD_SET(par->s, &readfds);
1866 select_timeout.tv_sec=5;
1867 select_timeout.tv_usec=0;
1868 addr.sin_family = AF_INET;
1869 addr.sin_addr.s_addr = inet_addr(SERVERIP);
1870 addr.sin_port = htons(SERVERPORT);
1872 do_bind(par->s, (struct sockaddr *)&addr, sizeof(addr));
1873 wsa_ok(listen(par->s, SOMAXCONN ), 0 ==, "SelectReadThread (%x): listen failed: %d\n");
1875 SetEvent(server_ready);
1876 ret = select(par->s+1, &readfds, NULL, NULL, &select_timeout);
1877 par->ReadKilled = (ret == 1);
1880 static void test_select(void)
1882 SOCKET fdRead, fdWrite;
1883 fd_set readfds, writefds, exceptfds;
1884 unsigned int maxfd;
1885 int ret;
1886 struct timeval select_timeout;
1887 select_thread_params thread_params;
1888 HANDLE thread_handle;
1889 DWORD id;
1891 fdRead = socket(AF_INET, SOCK_STREAM, 0);
1892 ok( (fdRead != INVALID_SOCKET), "socket failed unexpectedly: %d\n", WSAGetLastError() );
1893 fdWrite = socket(AF_INET, SOCK_STREAM, 0);
1894 ok( (fdWrite != INVALID_SOCKET), "socket failed unexpectedly: %d\n", WSAGetLastError() );
1896 FD_ZERO(&readfds);
1897 FD_ZERO(&writefds);
1898 FD_ZERO(&exceptfds);
1899 FD_SET(fdRead, &readfds);
1900 FD_SET(fdWrite, &writefds);
1901 FD_SET(fdRead, &exceptfds);
1902 FD_SET(fdWrite, &exceptfds);
1903 select_timeout.tv_sec=0;
1904 select_timeout.tv_usec=500;
1906 maxfd = fdRead;
1907 if (fdWrite > maxfd)
1908 maxfd = fdWrite;
1910 todo_wine {
1911 ret = select(maxfd+1, &readfds, &writefds, &exceptfds, &select_timeout);
1912 ok ( (ret == 0), "select should not return any socket handles\n");
1913 ok ( !FD_ISSET(fdRead, &readfds), "FD should not be set\n");
1914 ok ( !FD_ISSET(fdWrite, &writefds), "FD should not be set\n");
1917 ok ( !FD_ISSET(fdRead, &exceptfds), "FD should not be set\n");
1918 ok ( !FD_ISSET(fdWrite, &exceptfds), "FD should not be set\n");
1920 todo_wine {
1921 ok ((listen(fdWrite, SOMAXCONN) == SOCKET_ERROR), "listen did not fail\n");
1923 ret = closesocket(fdWrite);
1924 ok ( (ret == 0), "closesocket failed unexpectedly: %d\n", ret);
1926 thread_params.s = fdRead;
1927 thread_params.ReadKilled = FALSE;
1928 server_ready = CreateEventA(NULL, TRUE, FALSE, NULL);
1929 thread_handle = CreateThread (NULL, 0, (LPTHREAD_START_ROUTINE) &SelectReadThread, &thread_params, 0, &id );
1930 ok ( (thread_handle != NULL), "CreateThread failed unexpectedly: %d\n", GetLastError());
1932 WaitForSingleObject (server_ready, INFINITE);
1933 Sleep(200);
1934 ret = closesocket(fdRead);
1935 ok ( (ret == 0), "closesocket failed unexpectedly: %d\n", ret);
1937 WaitForSingleObject (thread_handle, 1000);
1938 ok ( (thread_params.ReadKilled) ||
1939 broken(thread_params.ReadKilled == 0), /*Win98*/
1940 "closesocket did not wakeup select\n");
1942 /* Test selecting invalid handles */
1943 FD_ZERO(&readfds);
1944 FD_ZERO(&writefds);
1945 FD_ZERO(&exceptfds);
1946 FD_SET(INVALID_SOCKET, &readfds);
1947 SetLastError(0);
1948 ret = select(maxfd+1, &readfds, &writefds, &exceptfds, &select_timeout);
1949 ok ( (ret == SOCKET_ERROR), "expected SOCKET_ERROR, got %i\n", ret);
1950 ok ( GetLastError() == WSAENOTSOCK, "expected WSAENOTSOCK, got %i\n", ret);
1951 ok ( !FD_ISSET(fdRead, &readfds), "FD should not be set\n");
1953 FD_ZERO(&readfds);
1954 FD_SET(INVALID_SOCKET, &writefds);
1955 SetLastError(0);
1956 ret = select(maxfd+1, &readfds, &writefds, &exceptfds, &select_timeout);
1957 ok ( (ret == SOCKET_ERROR), "expected SOCKET_ERROR, got %i\n", ret);
1958 ok ( GetLastError() == WSAENOTSOCK, "expected WSAENOTSOCK, got %i\n", ret);
1959 ok ( !FD_ISSET(fdRead, &writefds), "FD should not be set\n");
1961 FD_ZERO(&writefds);
1962 FD_SET(INVALID_SOCKET, &exceptfds);
1963 SetLastError(0);
1964 ret = select(maxfd+1, &readfds, &writefds, &exceptfds, &select_timeout);
1965 ok ( (ret == SOCKET_ERROR), "expected SOCKET_ERROR, got %i\n", ret);
1966 ok ( GetLastError() == WSAENOTSOCK, "expected WSAENOTSOCK, got %i\n", ret);
1967 ok ( !FD_ISSET(fdRead, &exceptfds), "FD should not be set\n");
1970 static DWORD WINAPI AcceptKillThread(select_thread_params *par)
1972 struct sockaddr_in address;
1973 int len = sizeof(address);
1974 SOCKET client_socket;
1976 SetEvent(server_ready);
1977 client_socket = accept(par->s, (struct sockaddr*) &address, &len);
1978 if (client_socket != INVALID_SOCKET)
1979 closesocket(client_socket);
1980 par->ReadKilled = (client_socket == INVALID_SOCKET);
1981 return 0;
1985 static int CALLBACK AlwaysDeferConditionFunc(LPWSABUF lpCallerId, LPWSABUF lpCallerData, LPQOS pQos,
1986 LPQOS lpGQOS, LPWSABUF lpCalleeId, LPWSABUF lpCalleeData,
1987 GROUP FAR * g, DWORD_PTR dwCallbackData)
1989 return CF_DEFER;
1992 static void test_accept(void)
1994 int ret;
1995 SOCKET server_socket = INVALID_SOCKET, accepted = INVALID_SOCKET, connector = INVALID_SOCKET;
1996 struct sockaddr_in address;
1997 int socklen;
1998 select_thread_params thread_params;
1999 HANDLE thread_handle = NULL;
2000 DWORD id;
2002 server_socket = socket(AF_INET, SOCK_STREAM, 0);
2003 if (server_socket == INVALID_SOCKET)
2005 trace("error creating server socket: %d\n", WSAGetLastError());
2006 goto done;
2009 memset(&address, 0, sizeof(address));
2010 address.sin_addr.s_addr = inet_addr("127.0.0.1");
2011 address.sin_family = AF_INET;
2012 ret = bind(server_socket, (struct sockaddr*) &address, sizeof(address));
2013 if (ret != 0)
2015 trace("error binding server socket: %d\n", WSAGetLastError());
2016 goto done;
2019 socklen = sizeof(address);
2020 ret = getsockname(server_socket, (struct sockaddr*)&address, &socklen);
2021 if (ret != 0) {
2022 skip("failed to lookup bind address, error %d\n", WSAGetLastError());
2023 goto done;
2026 ret = listen(server_socket, 5);
2027 if (ret != 0)
2029 trace("error making server socket listen: %d\n", WSAGetLastError());
2030 goto done;
2033 trace("Blocking accept next\n");
2035 connector = socket(AF_INET, SOCK_STREAM, 0);
2036 ok(connector != INVALID_SOCKET, "Failed to create connector socket, error %d\n", WSAGetLastError());
2038 ret = connect(connector, (struct sockaddr*)&address, sizeof(address));
2039 ok(ret == 0, "connecting to accepting socket failed, error %d\n", WSAGetLastError());
2041 accepted = WSAAccept(server_socket, NULL, NULL, (LPCONDITIONPROC) AlwaysDeferConditionFunc, 0);
2042 ok(accepted == INVALID_SOCKET && WSAGetLastError() == WSATRY_AGAIN, "Failed to defer connection, %d\n", WSAGetLastError());
2044 accepted = accept(server_socket, NULL, 0);
2045 ok(accepted != INVALID_SOCKET, "Failed to accept deferred connection, error %d\n", WSAGetLastError());
2047 server_ready = CreateEventA(NULL, TRUE, FALSE, NULL);
2048 if (server_ready == INVALID_HANDLE_VALUE)
2050 trace("error creating event: %d\n", GetLastError());
2051 goto done;
2054 thread_params.s = server_socket;
2055 thread_params.ReadKilled = FALSE;
2056 thread_handle = CreateThread(NULL, 0, (LPTHREAD_START_ROUTINE) AcceptKillThread,
2057 &thread_params, 0, &id);
2058 if (thread_handle == NULL)
2060 trace("error creating thread: %d\n", GetLastError());
2061 goto done;
2064 WaitForSingleObject(server_ready, INFINITE);
2065 Sleep(200);
2066 ret = closesocket(server_socket);
2067 if (ret != 0)
2069 trace("closesocket failed: %d\n", WSAGetLastError());
2070 goto done;
2073 WaitForSingleObject(thread_handle, 1000);
2074 ok(thread_params.ReadKilled || broken(!thread_params.ReadKilled) /* Win98/ME, after accept */,
2075 "closesocket did not wakeup accept\n");
2077 done:
2078 if (accepted != INVALID_SOCKET)
2079 closesocket(accepted);
2080 if (connector != INVALID_SOCKET)
2081 closesocket(connector);
2082 if (thread_handle != NULL)
2083 CloseHandle(thread_handle);
2084 if (server_ready != INVALID_HANDLE_VALUE)
2085 CloseHandle(server_ready);
2086 if (server_socket != INVALID_SOCKET)
2087 closesocket(server_socket);
2090 static void test_extendedSocketOptions(void)
2092 WSADATA wsa;
2093 SOCKET sock;
2094 struct sockaddr_in sa;
2095 int sa_len = sizeof(struct sockaddr_in);
2096 int optval, optlen = sizeof(int), ret;
2097 BOOL bool_opt_val;
2098 LINGER linger_val;
2100 if(WSAStartup(MAKEWORD(2,0), &wsa)){
2101 trace("Winsock failed: %d. Aborting test\n", WSAGetLastError());
2102 return;
2105 memset(&sa, 0, sa_len);
2107 sa.sin_family = AF_INET;
2108 sa.sin_port = htons(0);
2109 sa.sin_addr.s_addr = htonl(INADDR_ANY);
2111 if((sock = socket(PF_INET, SOCK_DGRAM, IPPROTO_IP)) == INVALID_SOCKET) {
2112 trace("Creating the socket failed: %d\n", WSAGetLastError());
2113 WSACleanup();
2114 return;
2117 if(bind(sock, (struct sockaddr *) &sa, sa_len) < 0){
2118 trace("Failed to bind socket: %d\n", WSAGetLastError());
2119 closesocket(sock);
2120 WSACleanup();
2121 return;
2124 ret = getsockopt(sock, SOL_SOCKET, SO_MAX_MSG_SIZE, (char *)&optval, &optlen);
2126 ok(ret == 0, "getsockopt failed to query SO_MAX_MSG_SIZE, return value is 0x%08x\n", ret);
2127 ok((optval == 65507) || (optval == 65527),
2128 "SO_MAX_MSG_SIZE reported %d, expected 65507 or 65527\n", optval);
2130 /* IE 3 use 0xffffffff instead of SOL_SOCKET (0xffff) */
2131 SetLastError(0xdeadbeef);
2132 optval = 0xdeadbeef;
2133 optlen = sizeof(int);
2134 ret = getsockopt(sock, 0xffffffff, SO_MAX_MSG_SIZE, (char *)&optval, &optlen);
2135 ok( (ret == SOCKET_ERROR) && (WSAGetLastError() == WSAEINVAL),
2136 "got %d with %d and optval: 0x%x/%d (expected SOCKET_ERROR with WSAEINVAL)\n",
2137 ret, WSAGetLastError(), optval, optval);
2139 /* more invalid values for level */
2140 SetLastError(0xdeadbeef);
2141 optval = 0xdeadbeef;
2142 optlen = sizeof(int);
2143 ret = getsockopt(sock, 0x1234ffff, SO_MAX_MSG_SIZE, (char *)&optval, &optlen);
2144 ok( (ret == SOCKET_ERROR) && (WSAGetLastError() == WSAEINVAL),
2145 "got %d with %d and optval: 0x%x/%d (expected SOCKET_ERROR with WSAEINVAL)\n",
2146 ret, WSAGetLastError(), optval, optval);
2148 SetLastError(0xdeadbeef);
2149 optval = 0xdeadbeef;
2150 optlen = sizeof(int);
2151 ret = getsockopt(sock, 0x8000ffff, SO_MAX_MSG_SIZE, (char *)&optval, &optlen);
2152 ok( (ret == SOCKET_ERROR) && (WSAGetLastError() == WSAEINVAL),
2153 "got %d with %d and optval: 0x%x/%d (expected SOCKET_ERROR with WSAEINVAL)\n",
2154 ret, WSAGetLastError(), optval, optval);
2156 SetLastError(0xdeadbeef);
2157 optval = 0xdeadbeef;
2158 optlen = sizeof(int);
2159 ret = getsockopt(sock, 0x00008000, SO_MAX_MSG_SIZE, (char *)&optval, &optlen);
2160 ok( (ret == SOCKET_ERROR) && (WSAGetLastError() == WSAEINVAL),
2161 "got %d with %d and optval: 0x%x/%d (expected SOCKET_ERROR with WSAEINVAL)\n",
2162 ret, WSAGetLastError(), optval, optval);
2164 SetLastError(0xdeadbeef);
2165 optval = 0xdeadbeef;
2166 optlen = sizeof(int);
2167 ret = getsockopt(sock, 0x00000800, SO_MAX_MSG_SIZE, (char *)&optval, &optlen);
2168 ok( (ret == SOCKET_ERROR) && (WSAGetLastError() == WSAEINVAL),
2169 "got %d with %d and optval: 0x%x/%d (expected SOCKET_ERROR with WSAEINVAL)\n",
2170 ret, WSAGetLastError(), optval, optval);
2172 optlen = sizeof(LINGER);
2173 ret = getsockopt(sock, SOL_SOCKET, SO_LINGER, (char *)&linger_val, &optlen);
2174 todo_wine{
2175 ok(ret == SOCKET_ERROR, "getsockopt should fail for UDP sockets but return value is 0x%08x\n", ret);
2178 closesocket(sock);
2180 if((sock = socket(PF_INET, SOCK_STREAM, IPPROTO_IP)) == INVALID_SOCKET) {
2181 trace("Creating the socket failed: %d\n", WSAGetLastError());
2182 WSACleanup();
2183 return;
2186 if(bind(sock, (struct sockaddr *) &sa, sa_len) < 0){
2187 trace("Failed to bind socket: %d\n", WSAGetLastError());
2188 closesocket(sock);
2189 WSACleanup();
2190 return;
2193 ret = getsockopt(sock, SOL_SOCKET, SO_LINGER, (char *)&linger_val, &optlen);
2194 ok(ret == 0, "getsockopt failed to query SO_LINGER, return value is 0x%08x\n", ret);
2196 optlen = sizeof(BOOL);
2197 ret = getsockopt(sock, SOL_SOCKET, SO_DONTLINGER, (char *)&bool_opt_val, &optlen);
2198 ok(ret == 0, "getsockopt failed to query SO_DONTLINGER, return value is 0x%08x\n", ret);
2199 ok((linger_val.l_onoff && !bool_opt_val) || (!linger_val.l_onoff && bool_opt_val),
2200 "Return value of SO_DONTLINGER is %d, but SO_LINGER returned l_onoff == %d.\n",
2201 bool_opt_val, linger_val.l_onoff);
2203 closesocket(sock);
2204 WSACleanup();
2207 static void test_getsockname(void)
2209 WSADATA wsa;
2210 SOCKET sock;
2211 struct sockaddr_in sa_set, sa_get;
2212 int sa_set_len = sizeof(struct sockaddr_in);
2213 int sa_get_len = sa_set_len;
2214 static const unsigned char null_padding[] = {0,0,0,0,0,0,0,0};
2215 int ret;
2217 if(WSAStartup(MAKEWORD(2,0), &wsa)){
2218 trace("Winsock failed: %d. Aborting test\n", WSAGetLastError());
2219 return;
2222 memset(&sa_set, 0, sa_set_len);
2224 sa_set.sin_family = AF_INET;
2225 sa_set.sin_port = htons(0);
2226 sa_set.sin_addr.s_addr = htonl(INADDR_ANY);
2228 if((sock = socket(PF_INET, SOCK_STREAM, IPPROTO_IP)) == INVALID_SOCKET) {
2229 trace("Creating the socket failed: %d\n", WSAGetLastError());
2230 WSACleanup();
2231 return;
2234 memcpy(&sa_get, &sa_set, sizeof(sa_set));
2235 if (getsockname(sock, (struct sockaddr*) &sa_get, &sa_get_len) == 0)
2236 ok(0, "getsockname on unbound socket should fail\n");
2237 else {
2238 ok(WSAGetLastError() == WSAEINVAL, "getsockname on unbound socket "
2239 "failed with %d, expected %d\n", WSAGetLastError(), WSAEINVAL);
2240 ok(memcmp(&sa_get, &sa_set, sizeof(sa_get)) == 0,
2241 "failed getsockname modified sockaddr when it shouldn't\n");
2244 if(bind(sock, (struct sockaddr *) &sa_set, sa_set_len) < 0){
2245 trace("Failed to bind socket: %d\n", WSAGetLastError());
2246 closesocket(sock);
2247 WSACleanup();
2248 return;
2251 if(getsockname(sock, (struct sockaddr *) &sa_get, &sa_get_len) != 0){
2252 trace("Failed to call getsockname: %d\n", WSAGetLastError());
2253 closesocket(sock);
2254 WSACleanup();
2255 return;
2258 ret = memcmp(sa_get.sin_zero, null_padding, 8);
2259 ok(ret == 0 || broken(ret != 0), /* NT4 */
2260 "getsockname did not zero the sockaddr_in structure\n");
2262 closesocket(sock);
2263 WSACleanup();
2266 static void test_dns(void)
2268 struct hostent *h;
2270 h = gethostbyname("");
2271 ok(h != NULL, "gethostbyname(\"\") failed with %d\n", h_errno);
2274 /* Our winsock headers don't define gethostname because it conflicts with the
2275 * definition in unistd.h. Define it here to get rid of the warning. */
2277 int WINAPI gethostname(char *name, int namelen);
2279 static void test_gethostbyname_hack(void)
2281 struct hostent *he;
2282 char name[256];
2283 static BYTE loopback[] = {127, 0, 0, 1};
2284 static BYTE magic_loopback[] = {127, 12, 34, 56};
2285 int ret;
2287 ret = gethostname(name, 256);
2288 ok(ret == 0, "gethostname() call failed: %d\n", WSAGetLastError());
2290 he = gethostbyname("localhost");
2291 ok(he != NULL, "gethostbyname(\"localhost\") failed: %d\n", h_errno);
2292 if(he)
2294 if(he->h_length != 4)
2296 skip("h_length is %d, not IPv4, skipping test.\n", he->h_length);
2297 return;
2300 ok(memcmp(he->h_addr_list[0], loopback, he->h_length) == 0,
2301 "gethostbyname(\"localhost\") returned %d.%d.%d.%d\n",
2302 he->h_addr_list[0][0], he->h_addr_list[0][1], he->h_addr_list[0][2],
2303 he->h_addr_list[0][3]);
2306 /* No reason to test further with NULL hostname */
2307 if(name == NULL)
2308 return;
2310 if(strcmp(name, "localhost") == 0)
2312 skip("hostname seems to be \"localhost\", skipping test.\n");
2313 return;
2316 he = NULL;
2317 he = gethostbyname(name);
2318 ok(he != NULL, "gethostbyname(\"%s\") failed: %d\n", name, h_errno);
2319 if(he)
2321 if(he->h_length != 4)
2323 skip("h_length is %d, not IPv4, skipping test.\n", he->h_length);
2324 return;
2327 if (he->h_addr_list[0][0] == 127)
2329 ok(memcmp(he->h_addr_list[0], magic_loopback, he->h_length) == 0,
2330 "gethostbyname(\"%s\") returned %d.%d.%d.%d not 127.12.34.56\n",
2331 name, he->h_addr_list[0][0], he->h_addr_list[0][1],
2332 he->h_addr_list[0][2], he->h_addr_list[0][3]);
2336 he = NULL;
2337 he = gethostbyname("nonexistent.winehq.org");
2338 /* Don't check for the return value, as some braindead ISPs will kindly
2339 * resolve nonexistent host names to addresses of the ISP's spam pages. */
2342 static void test_inet_addr(void)
2344 u_long addr;
2346 addr = inet_addr(NULL);
2347 ok(addr == INADDR_NONE, "inet_addr succeeded unexpectedly\n");
2350 static void test_addr_to_print(void)
2352 char dst[16];
2353 char dst6[64];
2354 const char * pdst;
2355 struct in_addr in;
2356 struct in6_addr in6;
2358 u_long addr0_Num = 0x00000000;
2359 PCSTR addr0_Str = "0.0.0.0";
2360 u_long addr1_Num = 0x20201015;
2361 PCSTR addr1_Str = "21.16.32.32";
2362 u_char addr2_Num[16] = {0,0,0,0,0,0,0,0,0,0,0xff,0xfe,0xcC,0x98,0xbd,0x74};
2363 PCSTR addr2_Str = "::fffe:cc98:bd74";
2364 u_char addr3_Num[16] = {0x20,0x30,0xa4,0xb1};
2365 PCSTR addr3_Str = "2030:a4b1::";
2366 u_char addr4_Num[16] = {0,0,0,0,0,0,0,0,0,0,0,0,0xcC,0x98,0xbd,0x74};
2367 PCSTR addr4_Str = "::204.152.189.116";
2369 /* Test IPv4 addresses */
2370 in.s_addr = addr0_Num;
2372 pdst = inet_ntoa(*((struct in_addr*)&in.s_addr));
2373 ok(pdst != NULL, "inet_ntoa failed %s\n", dst);
2374 ok(!strcmp(pdst, addr0_Str),"Address %s != %s\n", pdst, addr0_Str);
2376 /* Test that inet_ntoa and inet_ntop return the same value */
2377 in.S_un.S_addr = addr1_Num;
2378 pdst = inet_ntoa(*((struct in_addr*)&in.s_addr));
2379 ok(pdst != NULL, "inet_ntoa failed %s\n", dst);
2380 ok(!strcmp(pdst, addr1_Str),"Address %s != %s\n", pdst, addr1_Str);
2382 /* InetNtop became available in Vista and Win2008 */
2383 if (!pInetNtop)
2385 win_skip("InetNtop not present, not executing tests\n");
2386 return;
2389 /* Second part of test */
2390 pdst = pInetNtop(AF_INET,(void*)&in.s_addr, dst, sizeof(dst));
2391 ok(pdst != NULL, "InetNtop failed %s\n", dst);
2392 ok(!strcmp(pdst, addr1_Str),"Address %s != %s\n", pdst, addr1_Str);
2394 /* Test invalid parm conditions */
2395 pdst = pInetNtop(1, (void*)&in.s_addr, dst, sizeof(dst));
2396 ok(pdst == NULL, "The pointer should not be returned (%p)\n", pdst);
2397 ok(WSAGetLastError() == WSAEAFNOSUPPORT, "Should be WSAEAFNOSUPPORT\n");
2399 /* Test Null destination */
2400 pdst = NULL;
2401 pdst = pInetNtop(AF_INET, (void*)&in.s_addr, NULL, sizeof(dst));
2402 ok(pdst == NULL, "The pointer should not be returned (%p)\n", pdst);
2403 ok(WSAGetLastError() == STATUS_INVALID_PARAMETER || WSAGetLastError() == WSAEINVAL /* Win7 */,
2404 "Should be STATUS_INVALID_PARAMETER or WSAEINVAL not 0x%x\n", WSAGetLastError());
2406 /* Test zero length passed */
2407 WSASetLastError(0);
2408 pdst = NULL;
2409 pdst = pInetNtop(AF_INET, (void*)&in.s_addr, dst, 0);
2410 ok(pdst == NULL, "The pointer should not be returned (%p)\n", pdst);
2411 ok(WSAGetLastError() == STATUS_INVALID_PARAMETER || WSAGetLastError() == WSAEINVAL /* Win7 */,
2412 "Should be STATUS_INVALID_PARAMETER or WSAEINVAL not 0x%x\n", WSAGetLastError());
2414 /* Test length one shorter than the address length */
2415 WSASetLastError(0);
2416 pdst = NULL;
2417 pdst = pInetNtop(AF_INET, (void*)&in.s_addr, dst, 6);
2418 ok(pdst == NULL, "The pointer should not be returned (%p)\n", pdst);
2419 ok(WSAGetLastError() == STATUS_INVALID_PARAMETER || WSAGetLastError() == WSAEINVAL /* Win7 */,
2420 "Should be STATUS_INVALID_PARAMETER or WSAEINVAL not 0x%x\n", WSAGetLastError());
2422 /* Test longer length is ok */
2423 WSASetLastError(0);
2424 pdst = NULL;
2425 pdst = pInetNtop(AF_INET, (void*)&in.s_addr, dst, sizeof(dst)+1);
2426 ok(pdst != NULL, "The pointer should be returned (%p)\n", pdst);
2427 ok(!strcmp(pdst, addr1_Str),"Address %s != %s\n", pdst, addr1_Str);
2429 /* Test the IPv6 addresses */
2431 /* Test an zero prefixed IPV6 address */
2432 memcpy(in6.u.Byte, addr2_Num, sizeof(addr2_Num));
2433 pdst = pInetNtop(AF_INET6,(void*)&in6.s6_addr, dst6, sizeof(dst6));
2434 ok(pdst != NULL, "InetNtop failed %s\n", dst6);
2435 ok(!strcmp(pdst, addr2_Str),"Address %s != %s\n", pdst, addr2_Str);
2437 /* Test an zero suffixed IPV6 address */
2438 memcpy(in6.s6_addr, addr3_Num, sizeof(addr3_Num));
2439 pdst = pInetNtop(AF_INET6,(void*)&in6.s6_addr, dst6, sizeof(dst6));
2440 ok(pdst != NULL, "InetNtop failed %s\n", dst6);
2441 ok(!strcmp(pdst, addr3_Str),"Address %s != %s\n", pdst, addr3_Str);
2443 /* Test the IPv6 address contains the IPv4 address in IPv4 notation */
2444 memcpy(in6.s6_addr, addr4_Num, sizeof(addr4_Num));
2445 pdst = pInetNtop(AF_INET6, (void*)&in6.s6_addr, dst6, sizeof(dst6));
2446 ok(pdst != NULL, "InetNtop failed %s\n", dst6);
2447 ok(!strcmp(pdst, addr4_Str),"Address %s != %s\n", pdst, addr4_Str);
2449 /* Test invalid parm conditions */
2450 memcpy(in6.u.Byte, addr2_Num, sizeof(addr2_Num));
2452 /* Test Null destination */
2453 pdst = NULL;
2454 pdst = pInetNtop(AF_INET6, (void*)&in6.s6_addr, NULL, sizeof(dst6));
2455 ok(pdst == NULL, "The pointer should not be returned (%p)\n", pdst);
2456 ok(WSAGetLastError() == STATUS_INVALID_PARAMETER || WSAGetLastError() == WSAEINVAL /* Win7 */,
2457 "Should be STATUS_INVALID_PARAMETER or WSAEINVAL not 0x%x\n", WSAGetLastError());
2459 /* Test zero length passed */
2460 WSASetLastError(0);
2461 pdst = NULL;
2462 pdst = pInetNtop(AF_INET6, (void*)&in6.s6_addr, dst6, 0);
2463 ok(pdst == NULL, "The pointer should not be returned (%p)\n", pdst);
2464 ok(WSAGetLastError() == STATUS_INVALID_PARAMETER || WSAGetLastError() == WSAEINVAL /* Win7 */,
2465 "Should be STATUS_INVALID_PARAMETER or WSAEINVAL not 0x%x\n", WSAGetLastError());
2467 /* Test length one shorter than the address length */
2468 WSASetLastError(0);
2469 pdst = NULL;
2470 pdst = pInetNtop(AF_INET6, (void*)&in6.s6_addr, dst6, 16);
2471 ok(pdst == NULL, "The pointer should not be returned (%p)\n", pdst);
2472 ok(WSAGetLastError() == STATUS_INVALID_PARAMETER || WSAGetLastError() == WSAEINVAL /* Win7 */,
2473 "Should be STATUS_INVALID_PARAMETER or WSAEINVAL not 0x%x\n", WSAGetLastError());
2475 /* Test longer length is ok */
2476 WSASetLastError(0);
2477 pdst = NULL;
2478 pdst = pInetNtop(AF_INET6, (void*)&in6.s6_addr, dst6, 18);
2479 ok(pdst != NULL, "The pointer should be returned (%p)\n", pdst);
2482 static void test_ioctlsocket(void)
2484 SOCKET sock;
2485 int ret;
2486 static const LONG cmds[] = {FIONBIO, FIONREAD, SIOCATMARK};
2487 UINT i;
2488 u_long arg = 0;
2490 sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
2491 ok(sock != INVALID_SOCKET, "Creating the socket failed: %d\n", WSAGetLastError());
2492 if(sock == INVALID_SOCKET)
2494 skip("Can't continue without a socket.\n");
2495 return;
2498 for(i = 0; i < sizeof(cmds)/sizeof(cmds[0]); i++)
2500 /* broken apps like defcon pass the argp value directly instead of a pointer to it */
2501 ret = ioctlsocket(sock, cmds[i], (u_long *)1);
2502 ok(ret == SOCKET_ERROR, "ioctlsocket succeeded unexpectedly\n");
2503 ret = WSAGetLastError();
2504 ok(ret == WSAEFAULT, "expected WSAEFAULT, got %d instead\n", ret);
2507 /* A fresh and not connected socket has no urgent data, this test shows
2508 * that normal(not urgent) data returns a non-zero value for SIOCATMARK. */
2510 ret = ioctlsocket(sock, SIOCATMARK, &arg);
2511 if(ret != SOCKET_ERROR)
2512 todo_wine ok(arg, "expected a non-zero value\n");
2515 static int drain_pause=0;
2516 static DWORD WINAPI drain_socket_thread(LPVOID arg)
2518 char buffer[1024];
2519 SOCKET sock = *(SOCKET*)arg;
2520 int ret;
2522 while ((ret = recv(sock, buffer, sizeof(buffer), 0)) != 0)
2524 if (ret < 0)
2526 if (WSAGetLastError() == WSAEWOULDBLOCK)
2528 fd_set readset;
2529 FD_ZERO(&readset);
2530 FD_SET(sock, &readset);
2531 select(0, &readset, NULL, NULL, NULL);
2532 while (drain_pause)
2533 Sleep(100);
2535 else
2536 break;
2539 return 0;
2542 static void test_send(void)
2544 SOCKET src = INVALID_SOCKET;
2545 SOCKET dst = INVALID_SOCKET;
2546 HANDLE hThread = NULL;
2547 const int buflen = 1024*1024;
2548 char *buffer = NULL;
2549 int ret;
2550 DWORD id;
2552 if (tcp_socketpair(&src, &dst) != 0)
2554 ok(0, "creating socket pair failed, skipping test\n");
2555 return;
2558 hThread = CreateThread(NULL, 0, drain_socket_thread, &dst, 0, &id);
2559 if (hThread == NULL)
2561 ok(0, "CreateThread failed, error %d\n", GetLastError());
2562 goto end;
2565 buffer = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, buflen);
2566 if (buffer == NULL)
2568 ok(0, "HeapAlloc failed, error %d\n", GetLastError());
2569 goto end;
2572 ret = send(src, buffer, buflen, 0);
2573 if (ret >= 0)
2574 ok(ret == buflen, "send should have sent %d bytes, but it only sent %d\n", buflen, ret);
2575 else
2576 ok(0, "send failed, error %d\n", WSAGetLastError());
2578 end:
2579 if (src != INVALID_SOCKET)
2580 closesocket(src);
2581 if (dst != INVALID_SOCKET)
2582 closesocket(dst);
2583 if (hThread != NULL)
2584 CloseHandle(hThread);
2585 HeapFree(GetProcessHeap(), 0, buffer);
2588 typedef struct async_message
2590 SOCKET socket;
2591 LPARAM lparam;
2592 struct async_message *next;
2593 } async_message;
2595 static struct async_message *messages_received;
2597 #define WM_SOCKET (WM_USER+100)
2598 static LRESULT CALLBACK ws2_test_WndProc(HWND hwnd, UINT msg, WPARAM wparam, LPARAM lparam)
2600 struct async_message *message;
2602 switch (msg)
2604 case WM_SOCKET:
2605 message = HeapAlloc(GetProcessHeap(), 0, sizeof(*message));
2606 message->socket = (SOCKET) wparam;
2607 message->lparam = lparam;
2608 message->next = NULL;
2610 if (messages_received)
2612 struct async_message *last = messages_received;
2613 while (last->next) last = last->next;
2614 last->next = message;
2616 else
2617 messages_received = message;
2618 return 0;
2621 return DefWindowProc(hwnd, msg, wparam, lparam);
2624 static void get_event_details(int event, int *bit, char *name)
2626 switch (event)
2628 case FD_ACCEPT:
2629 if (bit) *bit = FD_ACCEPT_BIT;
2630 if (name) strcpy(name, "FD_ACCEPT");
2631 break;
2632 case FD_CONNECT:
2633 if (bit) *bit = FD_CONNECT_BIT;
2634 if (name) strcpy(name, "FD_CONNECT");
2635 break;
2636 case FD_READ:
2637 if (bit) *bit = FD_READ_BIT;
2638 if (name) strcpy(name, "FD_READ");
2639 break;
2640 case FD_OOB:
2641 if (bit) *bit = FD_OOB_BIT;
2642 if (name) strcpy(name, "FD_OOB");
2643 break;
2644 case FD_WRITE:
2645 if (bit) *bit = FD_WRITE_BIT;
2646 if (name) strcpy(name, "FD_WRITE");
2647 break;
2648 case FD_CLOSE:
2649 if (bit) *bit = FD_CLOSE_BIT;
2650 if (name) strcpy(name, "FD_CLOSE");
2651 break;
2652 default:
2653 if (bit) *bit = -1;
2654 if (name) sprintf(name, "bad%x", event);
2658 static const char *dbgstr_event_seq(const LPARAM *seq)
2660 static char message[1024];
2661 char name[12];
2662 int len = 1;
2664 message[0] = '[';
2665 message[1] = 0;
2666 while (*seq)
2668 get_event_details(WSAGETSELECTEVENT(*seq), NULL, name);
2669 len += sprintf(message + len, "%s(%d) ", name, WSAGETSELECTERROR(*seq));
2670 seq++;
2672 if (len > 1) len--;
2673 strcpy( message + len, "]" );
2674 return message;
2677 static char *dbgstr_event_seq_result(SOCKET s, WSANETWORKEVENTS *netEvents)
2679 static char message[1024];
2680 struct async_message *curr = messages_received;
2681 int index, error, bit = 0;
2682 char name[12];
2683 int len = 1;
2685 message[0] = '[';
2686 message[1] = 0;
2687 while (1)
2689 if (netEvents)
2691 if (bit >= FD_MAX_EVENTS) break;
2692 if ( !(netEvents->lNetworkEvents & (1 << bit)) )
2694 bit++;
2695 continue;
2697 get_event_details(1 << bit, &index, name);
2698 error = netEvents->iErrorCode[index];
2699 bit++;
2701 else
2703 if (!curr) break;
2704 if (curr->socket != s)
2706 curr = curr->next;
2707 continue;
2709 get_event_details(WSAGETSELECTEVENT(curr->lparam), NULL, name);
2710 error = WSAGETSELECTERROR(curr->lparam);
2711 curr = curr->next;
2714 len += sprintf(message + len, "%s(%d) ", name, error);
2716 if (len > 1) len--;
2717 strcpy( message + len, "]" );
2718 return message;
2721 static void flush_events(SOCKET s, HANDLE hEvent)
2723 WSANETWORKEVENTS netEvents;
2724 struct async_message *prev = NULL, *curr = messages_received;
2725 int ret;
2726 DWORD dwRet;
2728 if (hEvent != INVALID_HANDLE_VALUE)
2730 dwRet = WaitForSingleObject(hEvent, 100);
2731 if (dwRet == WAIT_OBJECT_0)
2733 ret = WSAEnumNetworkEvents(s, hEvent, &netEvents);
2734 if (ret)
2735 ok(0, "WSAEnumNetworkEvents failed, error %d\n", ret);
2738 else
2740 while (curr)
2742 if (curr->socket == s)
2744 if (prev) prev->next = curr->next;
2745 else messages_received = curr->next;
2747 HeapFree(GetProcessHeap(), 0, curr);
2749 if (prev) curr = prev->next;
2750 else curr = messages_received;
2752 else
2754 prev = curr;
2755 curr = curr->next;
2761 static int match_event_sequence(SOCKET s, WSANETWORKEVENTS *netEvents, const LPARAM *seq)
2763 int event, index, error, events;
2764 struct async_message *curr;
2766 if (netEvents)
2768 events = netEvents->lNetworkEvents;
2769 while (*seq)
2771 event = WSAGETSELECTEVENT(*seq);
2772 error = WSAGETSELECTERROR(*seq);
2773 get_event_details(event, &index, NULL);
2775 if (!(events & event) && index != -1)
2776 return 0;
2777 if (events & event && index != -1)
2779 if (netEvents->iErrorCode[index] != error)
2780 return 0;
2782 events &= ~event;
2783 seq++;
2785 if (events)
2786 return 0;
2788 else
2790 curr = messages_received;
2791 while (curr)
2793 if (curr->socket == s)
2795 if (!*seq) return 0;
2796 if (*seq != curr->lparam) return 0;
2797 seq++;
2799 curr = curr->next;
2801 if (*seq)
2802 return 0;
2804 return 1;
2807 /* checks for a sequence of events, (order only checked if window is used) */
2808 static void ok_event_sequence(SOCKET s, HANDLE hEvent, const LPARAM *seq, const LPARAM **broken_seqs, int completelyBroken)
2810 MSG msg;
2811 WSANETWORKEVENTS events, *netEvents = NULL;
2812 int ret;
2813 DWORD dwRet;
2815 if (hEvent != INVALID_HANDLE_VALUE)
2817 netEvents = &events;
2819 dwRet = WaitForSingleObject(hEvent, 200);
2820 if (dwRet == WAIT_OBJECT_0)
2822 ret = WSAEnumNetworkEvents(s, hEvent, netEvents);
2823 if (ret)
2825 winetest_ok(0, "WSAEnumNetworkEvents failed, error %d\n", ret);
2826 return;
2829 else
2830 memset(netEvents, 0, sizeof(*netEvents));
2832 else
2834 Sleep(200);
2835 /* Run the message loop a little */
2836 while (PeekMessageA( &msg, 0, 0, 0, PM_REMOVE ))
2838 DispatchMessageA(&msg);
2842 if (match_event_sequence(s, netEvents, seq))
2844 winetest_ok(1, "Sequence matches expected: %s\n", dbgstr_event_seq(seq));
2845 flush_events(s, hEvent);
2846 return;
2849 if (broken_seqs)
2851 for (; *broken_seqs; broken_seqs++)
2853 if (match_event_sequence(s, netEvents, *broken_seqs))
2855 winetest_ok(broken(1), "Sequence matches broken: %s, expected %s\n", dbgstr_event_seq_result(s, netEvents), dbgstr_event_seq(seq));
2856 flush_events(s, hEvent);
2857 return;
2862 winetest_ok(broken(completelyBroken), "Expected event sequence %s, got %s\n", dbgstr_event_seq(seq),
2863 dbgstr_event_seq_result(s, netEvents));
2864 flush_events(s, hEvent);
2867 #define ok_event_seq (winetest_set_location(__FILE__, __LINE__), 0) ? (void)0 : ok_event_sequence
2869 static void test_events(int useMessages)
2871 SOCKET server = INVALID_SOCKET;
2872 SOCKET src = INVALID_SOCKET, src2 = INVALID_SOCKET;
2873 SOCKET dst = INVALID_SOCKET, dst2 = INVALID_SOCKET;
2874 struct sockaddr_in addr;
2875 HANDLE hThread = NULL;
2876 HANDLE hEvent = INVALID_HANDLE_VALUE, hEvent2 = INVALID_HANDLE_VALUE;
2877 WNDCLASSEX wndclass;
2878 HWND hWnd = NULL;
2879 char *buffer = NULL;
2880 int bufferSize = 1024*1024;
2881 WSABUF bufs;
2882 OVERLAPPED ov, ov2;
2883 DWORD flags = 0;
2884 DWORD bytesReturned;
2885 DWORD id;
2886 int len;
2887 int ret;
2888 DWORD dwRet;
2889 BOOL bret;
2890 static char szClassName[] = "wstestclass";
2891 const LPARAM *broken_seq[3];
2892 static const LPARAM empty_seq[] = { 0 };
2893 static const LPARAM close_seq[] = { WSAMAKESELECTREPLY(FD_CLOSE, 0), 0 };
2894 static const LPARAM write_seq[] = { WSAMAKESELECTREPLY(FD_WRITE, 0), 0 };
2895 static const LPARAM read_seq[] = { WSAMAKESELECTREPLY(FD_READ, 0), 0 };
2896 static const LPARAM oob_seq[] = { WSAMAKESELECTREPLY(FD_OOB, 0), 0 };
2897 static const LPARAM connect_seq[] = { WSAMAKESELECTREPLY(FD_CONNECT, 0),
2898 WSAMAKESELECTREPLY(FD_WRITE, 0), 0 };
2899 static const LPARAM read_read_seq[] = { WSAMAKESELECTREPLY(FD_READ, 0),
2900 WSAMAKESELECTREPLY(FD_READ, 0), 0 };
2901 static const LPARAM read_write_seq[] = { WSAMAKESELECTREPLY(FD_READ, 0),
2902 WSAMAKESELECTREPLY(FD_WRITE, 0), 0 };
2903 static const LPARAM read_close_seq[] = { WSAMAKESELECTREPLY(FD_READ, 0),
2904 WSAMAKESELECTREPLY(FD_CLOSE, 0), 0 };
2906 memset(&ov, 0, sizeof(ov));
2907 memset(&ov2, 0, sizeof(ov2));
2909 /* don't use socketpair, we want connection event */
2910 src = socket(AF_INET, SOCK_STREAM, 0);
2911 if (src == INVALID_SOCKET)
2913 ok(0, "creating socket pair failed (%d), skipping test\n", GetLastError());
2914 goto end;
2917 src2 = socket(AF_INET, SOCK_STREAM, 0);
2918 if (src2 == INVALID_SOCKET)
2920 ok(0, "creating socket pair failed (%d), skipping test\n", GetLastError());
2921 goto end;
2924 len = sizeof(BOOL);
2925 if (getsockopt(src, SOL_SOCKET, SO_OOBINLINE, (void *)&bret, &len) == SOCKET_ERROR)
2927 ok(0, "failed to get oobinline status, %d\n", GetLastError());
2928 goto end;
2930 ok(bret == FALSE, "OOB not inline\n");
2932 if (useMessages)
2934 trace("Event test using messages\n");
2936 wndclass.cbSize = sizeof(wndclass);
2937 wndclass.style = CS_HREDRAW | CS_VREDRAW;
2938 wndclass.lpfnWndProc = ws2_test_WndProc;
2939 wndclass.cbClsExtra = 0;
2940 wndclass.cbWndExtra = 0;
2941 wndclass.hInstance = GetModuleHandle(NULL);
2942 wndclass.hIcon = LoadIcon(NULL, IDI_APPLICATION);
2943 wndclass.hIconSm = LoadIcon(NULL, IDI_APPLICATION);
2944 wndclass.hCursor = LoadCursor(NULL, IDC_ARROW);
2945 wndclass.hbrBackground = (HBRUSH)(COLOR_WINDOW + 1);
2946 wndclass.lpszClassName = szClassName;
2947 wndclass.lpszMenuName = NULL;
2948 RegisterClassEx(&wndclass);
2950 hWnd = CreateWindow(szClassName, "WS2Test", WS_OVERLAPPEDWINDOW, 0, 0, 500, 500, NULL, NULL, GetModuleHandle(NULL), NULL);
2951 if (!hWnd)
2953 ok(0, "failed to create window: %d\n", GetLastError());
2954 return;
2957 ret = WSAAsyncSelect(src, hWnd, WM_SOCKET, FD_CONNECT | FD_READ | FD_OOB | FD_WRITE | FD_CLOSE);
2958 if (ret)
2960 ok(0, "WSAAsyncSelect failed, error %d\n", ret);
2961 goto end;
2964 ret = WSAAsyncSelect(src2, hWnd, WM_SOCKET, FD_CONNECT | FD_READ | FD_OOB | FD_WRITE | FD_CLOSE);
2965 if (ret)
2967 ok(0, "WSAAsyncSelect failed, error %d\n", ret);
2968 goto end;
2971 else
2973 trace("Event test using events\n");
2975 hEvent = WSACreateEvent();
2976 if (hEvent == INVALID_HANDLE_VALUE)
2978 ok(0, "WSACreateEvent failed, error %d\n", GetLastError());
2979 goto end;
2982 hEvent2 = WSACreateEvent();
2983 if (hEvent2 == INVALID_HANDLE_VALUE)
2985 ok(0, "WSACreateEvent failed, error %d\n", GetLastError());
2986 goto end;
2989 ret = WSAEventSelect(src, hEvent, FD_CONNECT | FD_READ | FD_OOB | FD_WRITE | FD_CLOSE);
2990 if (ret)
2992 ok(0, "WSAEventSelect failed, error %d\n", ret);
2993 goto end;
2996 ret = WSAEventSelect(src2, hEvent2, FD_CONNECT | FD_READ | FD_OOB | FD_WRITE | FD_CLOSE);
2997 if (ret)
2999 ok(0, "WSAEventSelect failed, error %d\n", ret);
3000 goto end;
3004 server = socket(AF_INET, SOCK_STREAM, 0);
3005 if (server == INVALID_SOCKET)
3007 ok(0, "creating socket pair failed (%d), skipping test\n", GetLastError());
3008 goto end;
3011 memset(&addr, 0, sizeof(addr));
3012 addr.sin_family = AF_INET;
3013 addr.sin_addr.s_addr = inet_addr("127.0.0.1");
3014 ret = bind(server, (struct sockaddr*)&addr, sizeof(addr));
3015 if (ret != 0)
3017 ok(0, "creating socket pair failed (%d), skipping test\n", GetLastError());
3018 goto end;
3021 len = sizeof(addr);
3022 ret = getsockname(server, (struct sockaddr*)&addr, &len);
3023 if (ret != 0)
3025 ok(0, "creating socket pair failed (%d), skipping test\n", GetLastError());
3026 goto end;
3029 ret = listen(server, 2);
3030 if (ret != 0)
3032 ok(0, "creating socket pair failed (%d), skipping test\n", GetLastError());
3033 goto end;
3036 ret = connect(src, (struct sockaddr*)&addr, sizeof(addr));
3037 if (ret == SOCKET_ERROR && WSAGetLastError() != WSAEWOULDBLOCK)
3039 ok(0, "creating socket pair failed (%d), skipping test\n", GetLastError());
3040 goto end;
3043 ret = connect(src2, (struct sockaddr*)&addr, sizeof(addr));
3044 if (ret == SOCKET_ERROR && WSAGetLastError() != WSAEWOULDBLOCK)
3046 ok(0, "creating socket pair failed (%d), skipping test\n", GetLastError());
3047 goto end;
3050 len = sizeof(addr);
3051 dst = accept(server, (struct sockaddr*)&addr, &len);
3052 if (dst == INVALID_SOCKET)
3054 ok(0, "creating socket pair failed (%d), skipping test\n", GetLastError());
3055 goto end;
3058 len = sizeof(addr);
3059 dst2 = accept(server, (struct sockaddr*)&addr, &len);
3060 if (dst2 == INVALID_SOCKET)
3062 ok(0, "creating socket pair failed (%d), skipping test\n", GetLastError());
3063 goto end;
3066 closesocket(server);
3067 server = INVALID_SOCKET;
3069 /* On Windows it seems when a non-blocking socket sends to a
3070 blocking socket on the same host, the send() is BLOCKING,
3071 so make both sockets non-blocking. src is already non-blocking
3072 from the async select */
3074 if (set_blocking(dst, FALSE))
3076 ok(0, "ioctlsocket failed, error %d\n", WSAGetLastError());
3077 goto end;
3080 buffer = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, bufferSize);
3081 if (buffer == NULL)
3083 ok(0, "could not allocate memory for test\n");
3084 goto end;
3087 ov.hEvent = CreateEvent(NULL, FALSE, FALSE, NULL);
3088 if (ov.hEvent == NULL)
3090 ok(0, "could not create event object, errno = %d\n", GetLastError());
3091 goto end;
3094 ov2.hEvent = CreateEvent(NULL, FALSE, FALSE, NULL);
3095 if (ov2.hEvent == NULL)
3097 ok(0, "could not create event object, errno = %d\n", GetLastError());
3098 goto end;
3101 /* FD_WRITE should be set initially, and allow us to send at least 1 byte */
3102 ok_event_seq(src, hEvent, connect_seq, NULL, 1);
3103 ok_event_seq(src2, hEvent2, connect_seq, NULL, 1);
3104 /* broken on all windows - FD_CONNECT error is garbage */
3106 /* Test simple send/recv */
3107 ret = send(dst, buffer, 100, 0);
3108 ok(ret == 100, "Failed to send buffer %d err %d\n", ret, GetLastError());
3109 ok_event_seq(src, hEvent, read_seq, NULL, 0);
3111 ret = recv(src, buffer, 50, 0);
3112 ok(ret == 50, "Failed to recv buffer %d err %d\n", ret, GetLastError());
3113 ok_event_seq(src, hEvent, read_seq, NULL, 0);
3115 ret = recv(src, buffer, 50, 0);
3116 ok(ret == 50, "Failed to recv buffer %d err %d\n", ret, GetLastError());
3117 ok_event_seq(src, hEvent, empty_seq, NULL, 0);
3119 /* fun fact - events are reenabled even on failure, but only for messages */
3120 ret = send(dst, "1", 1, 0);
3121 ok(ret == 1, "Failed to send buffer %d err %d\n", ret, GetLastError());
3122 ok_event_seq(src, hEvent, read_seq, NULL, 0);
3124 ret = recv(src, buffer, -1, 0);
3125 ok(ret == SOCKET_ERROR && (GetLastError() == WSAEFAULT || GetLastError() == WSAENOBUFS),
3126 "Failed to recv buffer %d err %d\n", ret, GetLastError());
3127 if (useMessages)
3129 broken_seq[0] = empty_seq; /* win9x */
3130 broken_seq[1] = NULL;
3131 todo_wine ok_event_seq(src, hEvent, read_seq, broken_seq, 0);
3133 else
3134 ok_event_seq(src, hEvent, empty_seq, NULL, 0);
3136 ret = recv(src, buffer, 1, 0);
3137 ok(ret == 1, "Failed to recv buffer %d err %d\n", ret, GetLastError());
3138 ok_event_seq(src, hEvent, empty_seq, NULL, 0);
3140 /* Interaction with overlapped */
3141 bufs.len = sizeof(char);
3142 bufs.buf = buffer;
3143 ret = WSARecv(src, &bufs, 1, &bytesReturned, &flags, &ov, NULL);
3144 ok(ret == SOCKET_ERROR && GetLastError() == ERROR_IO_PENDING,
3145 "WSARecv failed - %d error %d\n", ret, GetLastError());
3147 bufs.len = sizeof(char);
3148 bufs.buf = buffer+1;
3149 ret = WSARecv(src, &bufs, 1, &bytesReturned, &flags, &ov2, NULL);
3150 ok(ret == SOCKET_ERROR && GetLastError() == ERROR_IO_PENDING,
3151 "WSARecv failed - %d error %d\n", ret, GetLastError());
3153 ret = send(dst, "12", 2, 0);
3154 ok(ret == 2, "Failed to send buffer %d err %d\n", ret, GetLastError());
3155 broken_seq[0] = read_read_seq; /* win9x */
3156 broken_seq[1] = NULL;
3157 ok_event_seq(src, hEvent, empty_seq, broken_seq, 0);
3159 dwRet = WaitForSingleObject(ov.hEvent, 100);
3160 ok(dwRet == WAIT_OBJECT_0, "Failed to wait for recv message: %d - %d\n", dwRet, GetLastError());
3161 if (dwRet == WAIT_OBJECT_0)
3163 bret = GetOverlappedResult((HANDLE)src, &ov, &bytesReturned, FALSE);
3164 ok((bret && bytesReturned == 1) || broken(!bret && GetLastError() == ERROR_IO_INCOMPLETE) /* win9x */,
3165 "Got %d instead of 1 (%d - %d)\n", bytesReturned, bret, GetLastError());
3166 ok(buffer[0] == '1', "Got %c instead of 1\n", buffer[0]);
3169 dwRet = WaitForSingleObject(ov2.hEvent, 100);
3170 ok(dwRet == WAIT_OBJECT_0, "Failed to wait for recv message: %d - %d\n", dwRet, GetLastError());
3171 if (dwRet == WAIT_OBJECT_0)
3173 bret = GetOverlappedResult((HANDLE)src, &ov2, &bytesReturned, FALSE);
3174 ok((bret && bytesReturned == 1) || broken(!bret && GetLastError() == ERROR_IO_INCOMPLETE) /* win9x */,
3175 "Got %d instead of 1 (%d - %d)\n", bytesReturned, bret, GetLastError());
3176 ok(buffer[1] == '2', "Got %c instead of 2\n", buffer[1]);
3179 ret = send(dst, "1", 1, 0);
3180 ok(ret == 1, "Failed to send buffer %d err %d\n", ret, GetLastError());
3181 ok_event_seq(src, hEvent, read_seq, NULL, 0);
3183 ret = recv(src, buffer, 1, 0);
3184 ok(ret == 1, "Failed to empty buffer: %d - %d\n", ret, GetLastError());
3185 ok_event_seq(src, hEvent, empty_seq, NULL, 0);
3187 /* Notifications are delivered as soon as possible, blocked only on
3188 * async requests on the same type */
3189 bufs.len = sizeof(char);
3190 bufs.buf = buffer;
3191 ret = WSARecv(src, &bufs, 1, &bytesReturned, &flags, &ov, NULL);
3192 ok(ret == SOCKET_ERROR && GetLastError() == ERROR_IO_PENDING,
3193 "WSARecv failed - %d error %d\n", ret, GetLastError());
3195 if (0) {
3196 ret = send(dst, "1", 1, MSG_OOB);
3197 ok(ret == 1, "Failed to send buffer %d err %d\n", ret, GetLastError());
3198 ok_event_seq(src, hEvent, oob_seq, NULL, 0);
3201 dwRet = WaitForSingleObject(ov.hEvent, 100);
3202 ok(dwRet == WAIT_TIMEOUT, "OOB message activated read?: %d - %d\n", dwRet, GetLastError());
3204 ret = send(dst, "2", 1, 0);
3205 ok(ret == 1, "Failed to send buffer %d err %d\n", ret, GetLastError());
3206 broken_seq[0] = read_seq; /* win98 */
3207 broken_seq[1] = NULL;
3208 ok_event_seq(src, hEvent, empty_seq, broken_seq, 0);
3210 dwRet = WaitForSingleObject(ov.hEvent, 100);
3211 ok(dwRet == WAIT_OBJECT_0 || broken(dwRet == WAIT_TIMEOUT),
3212 "Failed to wait for recv message: %d - %d\n", dwRet, GetLastError());
3213 if (dwRet == WAIT_OBJECT_0)
3215 bret = GetOverlappedResult((HANDLE)src, &ov, &bytesReturned, FALSE);
3216 ok((bret && bytesReturned == 1) || broken(!bret && GetLastError() == ERROR_IO_INCOMPLETE) /* win9x */,
3217 "Got %d instead of 1 (%d - %d)\n", bytesReturned, bret, GetLastError());
3218 ok(buffer[0] == '2', "Got %c instead of 2\n", buffer[0]);
3220 else if (dwRet == WAIT_TIMEOUT)
3222 /* this happens on win98. We get an FD_READ later on the next test */
3223 CancelIo((HANDLE) src);
3226 if (0) {
3227 ret = recv(src, buffer, 1, MSG_OOB);
3228 todo_wine ok(ret == 1, "Failed to empty buffer: %d - %d\n", ret, GetLastError());
3229 /* We get OOB notification, but no data on wine */
3230 ok_event_seq(src, hEvent, empty_seq, NULL, 0);
3233 /* Flood the send queue */
3234 hThread = CreateThread(NULL, 0, drain_socket_thread, &dst, 0, &id);
3235 if (hThread == NULL)
3237 ok(0, "CreateThread failed, error %d\n", GetLastError());
3238 goto end;
3241 /* Now FD_WRITE should not be set, because the socket send buffer isn't full yet */
3242 ok_event_seq(src, hEvent, empty_seq, NULL, 0);
3244 /* Now if we send a ton of data and the 'server' does not drain it fast
3245 * enough (set drain_pause to be sure), the socket send buffer will only
3246 * take some of it, and we will get a short write. This will trigger
3247 * another FD_WRITE event as soon as data is sent and more space becomes
3248 * available, but not any earlier. */
3249 drain_pause=1;
3252 ret = send(src, buffer, bufferSize, 0);
3253 } while (ret == bufferSize);
3254 drain_pause=0;
3255 if (ret >= 0 || WSAGetLastError() == WSAEWOULDBLOCK)
3257 Sleep(400); /* win9x */
3258 broken_seq[0] = read_write_seq;
3259 broken_seq[1] = NULL;
3260 ok_event_seq(src, hEvent, write_seq, broken_seq, 0);
3262 else
3264 ok(0, "sending a lot of data failed with error %d\n", WSAGetLastError());
3267 /* Test how FD_CLOSE is handled */
3268 ret = send(dst, "12", 2, 0);
3269 ok(ret == 2, "Failed to send buffer %d err %d\n", ret, GetLastError());
3271 /* Wait a little and let the send complete */
3272 Sleep(100);
3273 closesocket(dst);
3274 dst = INVALID_SOCKET;
3275 Sleep(100);
3277 /* We can never implement this in wine, best we can hope for is
3278 sending FD_CLOSE after the reads complete */
3279 broken_seq[0] = read_seq; /* win9x */
3280 broken_seq[1] = NULL;
3281 todo_wine ok_event_seq(src, hEvent, read_close_seq, broken_seq, 0);
3283 ret = recv(src, buffer, 1, 0);
3284 ok(ret == 1, "Failed to empty buffer: %d - %d\n", ret, GetLastError());
3285 ok_event_seq(src, hEvent, read_seq, NULL, 0);
3287 ret = recv(src, buffer, 1, 0);
3288 ok(ret == 1, "Failed to empty buffer: %d - %d\n", ret, GetLastError());
3289 /* want it? it's here, but you can't have it */
3290 broken_seq[0] = close_seq; /* win9x */
3291 broken_seq[1] = NULL;
3292 todo_wine ok_event_seq(src, hEvent, empty_seq, /* wine sends FD_CLOSE here */
3293 broken_seq, 0);
3295 /* Test how FD_CLOSE is handled */
3296 ret = send(dst2, "12", 2, 0);
3297 ok(ret == 2, "Failed to send buffer %d err %d\n", ret, GetLastError());
3299 Sleep(200);
3300 shutdown(dst2, SD_SEND);
3301 Sleep(200);
3303 /* Some of the below are technically todo_wine, but our event sequence is still valid, so to prevent
3304 regressions, don't mark them as todo_wine, and mark windows as broken */
3305 broken_seq[0] = read_close_seq;
3306 broken_seq[1] = close_seq;
3307 broken_seq[2] = NULL;
3308 ok_event_seq(src2, hEvent2, read_seq, broken_seq, 0);
3310 ret = recv(src2, buffer, 1, 0);
3311 ok(ret == 1 || broken(!ret), "Failed to empty buffer: %d - %d\n", ret, GetLastError());
3312 broken_seq[0] = close_seq; /* win98 */
3313 broken_seq[1] = NULL;
3314 ok_event_seq(src2, hEvent2, read_seq, broken_seq, 0);
3316 ret = recv(src2, buffer, 1, 0);
3317 ok(ret == 1 || broken(!ret), "Failed to empty buffer: %d - %d\n", ret, GetLastError());
3318 broken_seq[0] = empty_seq;
3319 broken_seq[1] = NULL;
3320 ok_event_seq(src2, hEvent2, close_seq, broken_seq, 0);
3322 ret = send(src2, "1", 1, 0);
3323 ok(ret == 1, "Sending to half-closed socket failed %d err %d\n", ret, GetLastError());
3324 ok_event_seq(src2, hEvent2, empty_seq, NULL, 0);
3326 ret = send(src2, "1", 1, 0);
3327 ok(ret == 1, "Sending to half-closed socket failed %d err %d\n", ret, GetLastError());
3328 ok_event_seq(src2, hEvent2, empty_seq, NULL, 0);
3330 end:
3331 if (src != INVALID_SOCKET)
3333 flush_events(src, hEvent);
3334 closesocket(src);
3336 if (src2 != INVALID_SOCKET)
3338 flush_events(src2, hEvent2);
3339 closesocket(src2);
3341 HeapFree(GetProcessHeap(), 0, buffer);
3342 if (server != INVALID_SOCKET)
3343 closesocket(server);
3344 if (dst != INVALID_SOCKET)
3345 closesocket(dst);
3346 if (dst2 != INVALID_SOCKET)
3347 closesocket(dst2);
3348 if (hThread != NULL)
3349 CloseHandle(hThread);
3350 if (hWnd != NULL)
3351 CloseHandle(hWnd);
3352 if (hEvent != NULL)
3353 CloseHandle(hEvent);
3354 if (hEvent2 != NULL)
3355 CloseHandle(hEvent2);
3356 if (ov.hEvent != NULL)
3357 CloseHandle(ov.hEvent);
3358 if (ov2.hEvent != NULL)
3359 CloseHandle(ov2.hEvent);
3362 static void test_ipv6only(void)
3364 SOCKET v4 = INVALID_SOCKET,
3365 v6 = INVALID_SOCKET;
3366 struct sockaddr_in sin4;
3367 struct sockaddr_in6 sin6;
3368 int ret;
3370 memset(&sin4, 0, sizeof(sin4));
3371 sin4.sin_family = AF_INET;
3372 sin4.sin_port = htons(SERVERPORT);
3374 memset(&sin6, 0, sizeof(sin6));
3375 sin6.sin6_family = AF_INET6;
3376 sin6.sin6_port = htons(SERVERPORT);
3378 v6 = socket(AF_INET6, SOCK_STREAM, IPPROTO_TCP);
3379 if (v6 == INVALID_SOCKET) {
3380 skip("Could not create IPv6 socket (LastError: %d; %d expected if IPv6 not available).\n",
3381 WSAGetLastError(), WSAEAFNOSUPPORT);
3382 goto end;
3384 ret = bind(v6, (struct sockaddr*)&sin6, sizeof(sin6));
3385 if (ret) {
3386 skip("Could not bind IPv6 address (LastError: %d).\n",
3387 WSAGetLastError());
3388 goto end;
3391 v4 = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
3392 if (v4 == INVALID_SOCKET) {
3393 skip("Could not create IPv4 socket (LastError: %d).\n",
3394 WSAGetLastError());
3395 goto end;
3397 ret = bind(v4, (struct sockaddr*)&sin4, sizeof(sin4));
3398 ok(!ret, "Could not bind IPv4 address (LastError: %d; %d expected if IPv6 binds to IPv4 as well).\n",
3399 WSAGetLastError(), WSAEADDRINUSE);
3401 end:
3402 if (v4 != INVALID_SOCKET)
3403 closesocket(v4);
3404 if (v6 != INVALID_SOCKET)
3405 closesocket(v6);
3408 static void test_WSASendTo(void)
3410 SOCKET s;
3411 struct sockaddr_in addr;
3412 char buf[12] = "hello world";
3413 WSABUF data_buf;
3414 DWORD bytesSent;
3416 addr.sin_family = AF_INET;
3417 addr.sin_port = htons(139);
3418 addr.sin_addr.s_addr = inet_addr("127.0.0.1");
3419 data_buf.len = sizeof(buf);
3420 data_buf.buf = buf;
3422 if( (s = socket(AF_INET, SOCK_DGRAM, 0)) == INVALID_SOCKET) {
3423 ok(0, "socket() failed error: %d\n", WSAGetLastError());
3424 return;
3427 WSASetLastError(12345);
3428 if(WSASendTo(s, &data_buf, 1, &bytesSent, 0, (struct sockaddr*)&addr, sizeof(addr), NULL, NULL)) {
3429 ok(0, "WSASendTo() failed error: %d\n", WSAGetLastError());
3430 return;
3432 ok(!WSAGetLastError(), "WSAGetLastError() should return zero after "
3433 "a successful call to WSASendTo()\n");
3436 static void test_WSARecv(void)
3438 SOCKET src, dest;
3439 char buf[20];
3440 WSABUF bufs;
3441 WSAOVERLAPPED ov;
3442 DWORD bytesReturned;
3443 DWORD flags;
3444 struct linger ling;
3445 int iret;
3446 DWORD dwret;
3447 BOOL bret;
3449 tcp_socketpair(&src, &dest);
3450 if (src == INVALID_SOCKET || dest == INVALID_SOCKET)
3452 skip("failed to create sockets\n");
3453 goto end;
3456 bufs.len = sizeof(buf);
3457 bufs.buf = buf;
3458 flags = 0;
3460 memset(&ov, 0, sizeof(ov));
3461 ov.hEvent = CreateEvent(NULL, FALSE, FALSE, NULL);
3462 ok(ov.hEvent != NULL, "could not create event object, errno = %d\n", GetLastError());
3463 if (!ov.hEvent)
3464 goto end;
3466 ling.l_onoff = 1;
3467 ling.l_linger = 0;
3468 ok(!setsockopt (src, SOL_SOCKET, SO_LINGER, (char *) &ling, sizeof(ling)), "Failed to set linger %d\n", GetLastError());
3470 iret = WSARecv(dest, &bufs, 1, &bytesReturned, &flags, &ov, NULL);
3471 ok(iret == SOCKET_ERROR && GetLastError() == ERROR_IO_PENDING, "WSARecv failed - %d error %d\n", iret, GetLastError());
3473 closesocket(src);
3474 src = INVALID_SOCKET;
3476 dwret = WaitForSingleObject(ov.hEvent, 1000);
3477 ok(dwret == WAIT_OBJECT_0, "Waiting for disconnect event failed with %d + errno %d\n", dwret, GetLastError());
3479 bret = GetOverlappedResult((HANDLE)dest, &ov, &bytesReturned, FALSE);
3480 todo_wine ok(!bret && (GetLastError() == ERROR_NETNAME_DELETED || broken(GetLastError() == ERROR_IO_INCOMPLETE) /* win9x */),
3481 "Did not get disconnect event: %d, error %d\n", bret, GetLastError());
3482 ok(bytesReturned == 0, "Bytes received is %d\n", bytesReturned);
3484 end:
3485 if (dest != INVALID_SOCKET)
3486 closesocket(dest);
3487 if (src != INVALID_SOCKET)
3488 closesocket(src);
3489 if (ov.hEvent)
3490 WSACloseEvent(ov.hEvent);
3493 static void test_GetAddrInfoW(void)
3495 static const WCHAR port[] = {'8','0',0};
3496 static const WCHAR empty[] = {0};
3497 static const WCHAR localhost[] = {'l','o','c','a','l','h','o','s','t',0};
3499 int ret;
3500 ADDRINFOW *result, hint;
3502 if (!pGetAddrInfoW || !pFreeAddrInfoW)
3504 win_skip("GetAddrInfoW and/or FreeAddrInfoW not present\n");
3505 return;
3508 memset(&hint, 0, sizeof(ADDRINFOW));
3510 ret = pGetAddrInfoW(NULL, NULL, NULL, &result);
3511 ok(ret == WSAHOST_NOT_FOUND, "got %d expected WSAHOST_NOT_FOUND\n", ret);
3513 result = NULL;
3514 ret = pGetAddrInfoW(empty, NULL, NULL, &result);
3515 todo_wine
3517 ok(!ret, "GetAddrInfoW failed with %d\n", WSAGetLastError());
3518 ok(result != NULL, "GetAddrInfoW failed\n");
3520 pFreeAddrInfoW(result);
3522 ret = pGetAddrInfoW(localhost, NULL, NULL, &result);
3523 ok(!ret, "GetAddrInfoW failed with %d\n", WSAGetLastError());
3524 pFreeAddrInfoW(result);
3526 ret = pGetAddrInfoW(localhost, port, NULL, &result);
3527 ok(!ret, "GetAddrInfoW failed with %d\n", WSAGetLastError());
3528 pFreeAddrInfoW(result);
3530 ret = pGetAddrInfoW(localhost, port, &hint, &result);
3531 ok(!ret, "GetAddrInfoW failed with %d\n", WSAGetLastError());
3532 pFreeAddrInfoW(result);
3535 static void test_ConnectEx(void)
3537 SOCKET listener = INVALID_SOCKET;
3538 SOCKET acceptor = INVALID_SOCKET;
3539 SOCKET connector = INVALID_SOCKET;
3540 struct sockaddr_in address, conaddress;
3541 int addrlen;
3542 OVERLAPPED overlapped;
3543 LPFN_CONNECTEX pConnectEx;
3544 GUID connectExGuid = WSAID_CONNECTEX;
3545 DWORD bytesReturned;
3546 char buffer[1024];
3547 BOOL bret;
3548 DWORD dwret;
3549 int iret;
3551 memset(&overlapped, 0, sizeof(overlapped));
3553 listener = socket(AF_INET, SOCK_STREAM, 0);
3554 if (listener == INVALID_SOCKET) {
3555 skip("could not create listener socket, error %d\n", WSAGetLastError());
3556 goto end;
3559 connector = socket(AF_INET, SOCK_STREAM, 0);
3560 if (connector == INVALID_SOCKET) {
3561 skip("could not create connector socket, error %d\n", WSAGetLastError());
3562 goto end;
3565 memset(&address, 0, sizeof(address));
3566 address.sin_family = AF_INET;
3567 address.sin_addr.s_addr = inet_addr("127.0.0.1");
3568 iret = bind(listener, (struct sockaddr*)&address, sizeof(address));
3569 if (iret != 0) {
3570 skip("failed to bind, error %d\n", WSAGetLastError());
3571 goto end;
3574 addrlen = sizeof(address);
3575 iret = getsockname(listener, (struct sockaddr*)&address, &addrlen);
3576 if (iret != 0) {
3577 skip("failed to lookup bind address, error %d\n", WSAGetLastError());
3578 goto end;
3581 if (set_blocking(listener, TRUE)) {
3582 skip("couldn't make socket non-blocking, error %d\n", WSAGetLastError());
3583 goto end;
3586 iret = WSAIoctl(connector, SIO_GET_EXTENSION_FUNCTION_POINTER, &connectExGuid, sizeof(connectExGuid),
3587 &pConnectEx, sizeof(pConnectEx), &bytesReturned, NULL, NULL);
3588 if (iret) {
3589 win_skip("WSAIoctl failed to get ConnectEx with ret %d + errno %d\n", iret, WSAGetLastError());
3590 goto end;
3593 bret = pConnectEx(INVALID_SOCKET, (struct sockaddr*)&address, addrlen, NULL, 0, &bytesReturned, &overlapped);
3594 ok(bret == FALSE && WSAGetLastError() == WSAENOTSOCK, "ConnectEx on invalid socket "
3595 "returned %d + errno %d\n", bret, WSAGetLastError());
3597 bret = pConnectEx(connector, (struct sockaddr*)&address, addrlen, NULL, 0, &bytesReturned, &overlapped);
3598 todo_wine ok(bret == FALSE && WSAGetLastError() == WSAEINVAL, "ConnectEx on a unbound socket "
3599 "returned %d + errno %d\n", bret, WSAGetLastError());
3600 if (bret == TRUE || WSAGetLastError() != WSAEINVAL)
3602 acceptor = accept(listener, NULL, NULL);
3603 if (acceptor != INVALID_SOCKET) {
3604 closesocket(acceptor);
3605 acceptor = INVALID_SOCKET;
3608 closesocket(connector);
3609 connector = socket(AF_INET, SOCK_STREAM, 0);
3610 if (connector == INVALID_SOCKET) {
3611 skip("could not create connector socket, error %d\n", WSAGetLastError());
3612 goto end;
3616 /* ConnectEx needs a bound socket */
3617 memset(&conaddress, 0, sizeof(conaddress));
3618 conaddress.sin_family = AF_INET;
3619 conaddress.sin_addr.s_addr = inet_addr("127.0.0.1");
3620 iret = bind(connector, (struct sockaddr*)&conaddress, sizeof(conaddress));
3621 if (iret != 0) {
3622 skip("failed to bind, error %d\n", WSAGetLastError());
3623 goto end;
3626 bret = pConnectEx(connector, (struct sockaddr*)&address, addrlen, NULL, 0, &bytesReturned, NULL);
3627 ok(bret == FALSE && WSAGetLastError() == ERROR_INVALID_PARAMETER, "ConnectEx on a NULL overlapped "
3628 "returned %d + errno %d\n", bret, WSAGetLastError());
3630 overlapped.hEvent = CreateEvent(NULL, FALSE, FALSE, NULL);
3631 if (overlapped.hEvent == NULL) {
3632 skip("could not create event object, errno = %d\n", GetLastError());
3633 goto end;
3636 iret = listen(listener, 1);
3637 if (iret != 0) {
3638 skip("listening failed, errno = %d\n", WSAGetLastError());
3639 goto end;
3642 bret = pConnectEx(connector, (struct sockaddr*)&address, addrlen, NULL, 0, &bytesReturned, &overlapped);
3643 ok(bret == FALSE && WSAGetLastError() == ERROR_IO_PENDING, "ConnectEx failed: "
3644 "returned %d + errno %d\n", bret, WSAGetLastError());
3645 dwret = WaitForSingleObject(overlapped.hEvent, 15000);
3646 ok(dwret == WAIT_OBJECT_0, "Waiting for connect event failed with %d + errno %d\n", dwret, GetLastError());
3648 bret = GetOverlappedResult((HANDLE)connector, &overlapped, &bytesReturned, FALSE);
3649 ok(bret, "Connecting failed, error %d\n", GetLastError());
3650 ok(bytesReturned == 0, "Bytes sent is %d\n", bytesReturned);
3652 closesocket(connector);
3653 connector = socket(AF_INET, SOCK_STREAM, 0);
3654 if (connector == INVALID_SOCKET) {
3655 skip("could not create connector socket, error %d\n", WSAGetLastError());
3656 goto end;
3658 /* ConnectEx needs a bound socket */
3659 memset(&conaddress, 0, sizeof(conaddress));
3660 conaddress.sin_family = AF_INET;
3661 conaddress.sin_addr.s_addr = inet_addr("127.0.0.1");
3662 iret = bind(connector, (struct sockaddr*)&conaddress, sizeof(conaddress));
3663 if (iret != 0) {
3664 skip("failed to bind, error %d\n", WSAGetLastError());
3665 goto end;
3668 acceptor = accept(listener, NULL, NULL);
3669 if (acceptor != INVALID_SOCKET) {
3670 closesocket(acceptor);
3671 acceptor = INVALID_SOCKET;
3674 buffer[0] = '1';
3675 buffer[1] = '2';
3676 buffer[2] = '3';
3677 bret = pConnectEx(connector, (struct sockaddr*)&address, addrlen, buffer, 3, &bytesReturned, &overlapped);
3678 ok(bret == FALSE && WSAGetLastError() == ERROR_IO_PENDING, "ConnectEx failed: "
3679 "returned %d + errno %d\n", bret, WSAGetLastError());
3680 dwret = WaitForSingleObject(overlapped.hEvent, 15000);
3681 ok(dwret == WAIT_OBJECT_0, "Waiting for connect event failed with %d + errno %d\n", dwret, GetLastError());
3683 bret = GetOverlappedResult((HANDLE)connector, &overlapped, &bytesReturned, FALSE);
3684 ok(bret, "Connecting failed, error %d\n", GetLastError());
3685 ok(bytesReturned == 3, "Bytes sent is %d\n", bytesReturned);
3687 acceptor = accept(listener, NULL, NULL);
3688 ok(acceptor != INVALID_SOCKET, "could not accept socket error %d\n", WSAGetLastError());
3690 bytesReturned = recv(acceptor, buffer, 3, 0);
3691 buffer[4] = 0;
3692 ok(bytesReturned == 3, "Didn't get all sent data, got only %d\n", bytesReturned);
3693 ok(buffer[0] == '1' && buffer[1] == '2' && buffer[2] == '3',
3694 "Failed to get the right data, expected '123', got '%s'\n", buffer);
3696 closesocket(connector);
3697 connector = socket(AF_INET, SOCK_STREAM, 0);
3698 if (connector == INVALID_SOCKET) {
3699 skip("could not create connector socket, error %d\n", WSAGetLastError());
3700 goto end;
3702 /* ConnectEx needs a bound socket */
3703 memset(&conaddress, 0, sizeof(conaddress));
3704 conaddress.sin_family = AF_INET;
3705 conaddress.sin_addr.s_addr = inet_addr("127.0.0.1");
3706 iret = bind(connector, (struct sockaddr*)&conaddress, sizeof(conaddress));
3707 if (iret != 0) {
3708 skip("failed to bind, error %d\n", WSAGetLastError());
3709 goto end;
3712 if (acceptor != INVALID_SOCKET) {
3713 closesocket(acceptor);
3714 acceptor = INVALID_SOCKET;
3717 /* Connect with error */
3718 closesocket(listener);
3719 listener = INVALID_SOCKET;
3721 address.sin_port = 1;
3723 bret = pConnectEx(connector, (struct sockaddr*)&address, addrlen, NULL, 0, &bytesReturned, &overlapped);
3724 ok(bret == FALSE && GetLastError(), "ConnectEx to bad destination failed: "
3725 "returned %d + errno %d\n", bret, GetLastError());
3727 if (GetLastError() == ERROR_IO_PENDING)
3729 dwret = WaitForSingleObject(overlapped.hEvent, 15000);
3730 ok(dwret == WAIT_OBJECT_0, "Waiting for connect event failed with %d + errno %d\n", dwret, GetLastError());
3732 bret = GetOverlappedResult((HANDLE)connector, &overlapped, &bytesReturned, FALSE);
3733 ok(bret == FALSE && GetLastError() == ERROR_CONNECTION_REFUSED,
3734 "Connecting to a disconnected host returned error %d - %d\n", bret, WSAGetLastError());
3736 else {
3737 ok(GetLastError() == WSAECONNREFUSED,
3738 "Connecting to a disconnected host returned error %d - %d\n", bret, WSAGetLastError());
3741 end:
3742 if (overlapped.hEvent)
3743 WSACloseEvent(overlapped.hEvent);
3744 if (listener != INVALID_SOCKET)
3745 closesocket(listener);
3746 if (acceptor != INVALID_SOCKET)
3747 closesocket(acceptor);
3748 if (connector != INVALID_SOCKET)
3749 closesocket(connector);
3752 static void test_AcceptEx(void)
3754 SOCKET listener = INVALID_SOCKET;
3755 SOCKET acceptor = INVALID_SOCKET;
3756 SOCKET connector = INVALID_SOCKET;
3757 SOCKET connector2 = INVALID_SOCKET;
3758 struct sockaddr_in bindAddress;
3759 int socklen;
3760 GUID acceptExGuid = WSAID_ACCEPTEX;
3761 LPFN_ACCEPTEX pAcceptEx = NULL;
3762 fd_set fds_accept, fds_send;
3763 struct timeval timeout = {0,10}; /* wait for 10 milliseconds */
3764 int got, conn1, i;
3765 DWORD bytesReturned;
3766 char buffer[1024];
3767 OVERLAPPED overlapped;
3768 int iret;
3769 BOOL bret;
3770 DWORD dwret;
3772 memset(&overlapped, 0, sizeof(overlapped));
3774 listener = socket(AF_INET, SOCK_STREAM, 0);
3775 if (listener == INVALID_SOCKET) {
3776 skip("could not create listener socket, error %d\n", WSAGetLastError());
3777 goto end;
3780 acceptor = socket(AF_INET, SOCK_STREAM, 0);
3781 if (acceptor == INVALID_SOCKET) {
3782 skip("could not create acceptor socket, error %d\n", WSAGetLastError());
3783 goto end;
3786 connector = socket(AF_INET, SOCK_STREAM, 0);
3787 if (connector == INVALID_SOCKET) {
3788 skip("could not create connector socket, error %d\n", WSAGetLastError());
3789 goto end;
3792 memset(&bindAddress, 0, sizeof(bindAddress));
3793 bindAddress.sin_family = AF_INET;
3794 bindAddress.sin_addr.s_addr = inet_addr("127.0.0.1");
3795 iret = bind(listener, (struct sockaddr*)&bindAddress, sizeof(bindAddress));
3796 if (iret != 0) {
3797 skip("failed to bind, error %d\n", WSAGetLastError());
3798 goto end;
3801 socklen = sizeof(bindAddress);
3802 iret = getsockname(listener, (struct sockaddr*)&bindAddress, &socklen);
3803 if (iret != 0) {
3804 skip("failed to lookup bind address, error %d\n", WSAGetLastError());
3805 goto end;
3808 if (set_blocking(listener, FALSE)) {
3809 skip("couldn't make socket non-blocking, error %d\n", WSAGetLastError());
3810 goto end;
3813 iret = WSAIoctl(listener, SIO_GET_EXTENSION_FUNCTION_POINTER, &acceptExGuid, sizeof(acceptExGuid),
3814 &pAcceptEx, sizeof(pAcceptEx), &bytesReturned, NULL, NULL);
3815 if (iret) {
3816 skip("WSAIoctl failed to get AcceptEx with ret %d + errno %d\n", iret, WSAGetLastError());
3817 goto end;
3820 bret = pAcceptEx(INVALID_SOCKET, acceptor, buffer, sizeof(buffer) - 2*(sizeof(struct sockaddr_in) + 16),
3821 sizeof(struct sockaddr_in) + 16, sizeof(struct sockaddr_in) + 16,
3822 &bytesReturned, &overlapped);
3823 ok(bret == FALSE && WSAGetLastError() == WSAENOTSOCK, "AcceptEx on invalid listening socket "
3824 "returned %d + errno %d\n", bret, WSAGetLastError());
3826 bret = pAcceptEx(listener, INVALID_SOCKET, buffer, sizeof(buffer) - 2*(sizeof(struct sockaddr_in) + 16),
3827 sizeof(struct sockaddr_in) + 16, sizeof(struct sockaddr_in) + 16,
3828 &bytesReturned, &overlapped);
3829 ok(bret == FALSE && WSAGetLastError() == WSAEINVAL, "AcceptEx on invalid accepting socket "
3830 "returned %d + errno %d\n", bret, WSAGetLastError());
3832 bret = pAcceptEx(listener, acceptor, NULL, sizeof(buffer) - 2*(sizeof(struct sockaddr_in) + 16),
3833 sizeof(struct sockaddr_in) + 16, sizeof(struct sockaddr_in) + 16,
3834 &bytesReturned, &overlapped);
3835 ok(bret == FALSE &&
3836 (WSAGetLastError() == WSAEINVAL ||
3837 broken(WSAGetLastError() == WSAEFAULT)), /* NT4 */
3838 "AcceptEx on NULL buffer returned %d + errno %d\n", bret, WSAGetLastError());
3840 bret = pAcceptEx(listener, acceptor, buffer, 0, 0, sizeof(struct sockaddr_in) + 16,
3841 &bytesReturned, &overlapped);
3842 todo_wine ok(bret == FALSE && WSAGetLastError() == WSAEINVAL, "AcceptEx on too small local address size "
3843 "returned %d + errno %d\n", bret, WSAGetLastError());
3845 bret = pAcceptEx(listener, acceptor, buffer, 0, sizeof(struct sockaddr_in) + 16, 0,
3846 &bytesReturned, &overlapped);
3847 todo_wine ok(bret == FALSE && WSAGetLastError() == WSAEINVAL, "AcceptEx on too small remote address size "
3848 "returned %d + errno %d\n", bret, WSAGetLastError());
3850 bret = pAcceptEx(listener, acceptor, buffer, 0,
3851 sizeof(struct sockaddr_in) + 16, sizeof(struct sockaddr_in) + 16,
3852 &bytesReturned, NULL);
3853 ok(bret == FALSE && WSAGetLastError() == ERROR_INVALID_PARAMETER, "AcceptEx on a NULL overlapped "
3854 "returned %d + errno %d\n", bret, WSAGetLastError());
3856 bret = pAcceptEx(listener, acceptor, buffer, sizeof(buffer) - 2*(sizeof(struct sockaddr_in) + 16),
3857 sizeof(struct sockaddr_in) + 16, sizeof(struct sockaddr_in) + 16,
3858 &bytesReturned, &overlapped);
3859 todo_wine ok(bret == FALSE && WSAGetLastError() == WSAEINVAL, "AcceptEx on a non-listening socket "
3860 "returned %d + errno %d\n", bret, WSAGetLastError());
3862 iret = listen(listener, 5);
3863 if (iret != 0) {
3864 skip("listening failed, errno = %d\n", WSAGetLastError());
3865 goto end;
3868 overlapped.hEvent = CreateEvent(NULL, FALSE, FALSE, NULL);
3869 if (overlapped.hEvent == NULL) {
3870 skip("could not create event object, errno = %d\n", GetLastError());
3871 goto end;
3874 bret = pAcceptEx(listener, acceptor, buffer, 0,
3875 sizeof(struct sockaddr_in) + 16, sizeof(struct sockaddr_in) + 16,
3876 &bytesReturned, &overlapped);
3877 ok(bret == FALSE && WSAGetLastError() == ERROR_IO_PENDING, "AcceptEx returned %d + errno %d\n", bret, WSAGetLastError());
3879 bret = pAcceptEx(listener, acceptor, buffer, 0,
3880 sizeof(struct sockaddr_in) + 16, sizeof(struct sockaddr_in) + 16,
3881 &bytesReturned, &overlapped);
3882 todo_wine ok((bret == FALSE && WSAGetLastError() == WSAEINVAL) || broken(bret == FALSE && WSAGetLastError() == ERROR_IO_PENDING) /* NT4 */,
3883 "AcceptEx on already pending socket returned %d + errno %d\n", bret, WSAGetLastError());
3884 if (bret == FALSE && WSAGetLastError() == ERROR_IO_PENDING) {
3885 /* We need to cancel this call, otherwise things fail */
3886 bret = CancelIo((HANDLE) listener);
3887 ok(bret, "Failed to cancel failed test. Bailing...\n");
3888 if (!bret) return;
3889 WaitForSingleObject(overlapped.hEvent, 0);
3891 bret = pAcceptEx(listener, acceptor, buffer, 0,
3892 sizeof(struct sockaddr_in) + 16, sizeof(struct sockaddr_in) + 16,
3893 &bytesReturned, &overlapped);
3894 ok(bret == FALSE && WSAGetLastError() == ERROR_IO_PENDING, "AcceptEx returned %d + errno %d\n", bret, WSAGetLastError());
3897 iret = connect(acceptor, (struct sockaddr*)&bindAddress, sizeof(bindAddress));
3898 todo_wine ok((iret == SOCKET_ERROR && WSAGetLastError() == WSAEINVAL) || broken(!iret) /* NT4 */,
3899 "connecting to acceptex acceptor succeeded? return %d + errno %d\n", iret, WSAGetLastError());
3900 if (!iret || (iret == SOCKET_ERROR && WSAGetLastError() == WSAEWOULDBLOCK)) {
3901 /* We need to cancel this call, otherwise things fail */
3902 closesocket(acceptor);
3903 acceptor = socket(AF_INET, SOCK_STREAM, 0);
3904 if (acceptor == INVALID_SOCKET) {
3905 skip("could not create acceptor socket, error %d\n", WSAGetLastError());
3906 goto end;
3909 bret = CancelIo((HANDLE) listener);
3910 ok(bret, "Failed to cancel failed test. Bailing...\n");
3911 if (!bret) return;
3913 bret = pAcceptEx(listener, acceptor, buffer, 0,
3914 sizeof(struct sockaddr_in) + 16, sizeof(struct sockaddr_in) + 16,
3915 &bytesReturned, &overlapped);
3916 ok(bret == FALSE && WSAGetLastError() == ERROR_IO_PENDING, "AcceptEx returned %d + errno %d\n", bret, WSAGetLastError());
3919 iret = connect(connector, (struct sockaddr*)&bindAddress, sizeof(bindAddress));
3920 ok(iret == 0, "connecting to accepting socket failed, error %d\n", WSAGetLastError());
3922 dwret = WaitForSingleObject(overlapped.hEvent, INFINITE);
3923 ok(dwret == WAIT_OBJECT_0, "Waiting for accept event failed with %d + errno %d\n", dwret, GetLastError());
3925 bret = GetOverlappedResult((HANDLE)listener, &overlapped, &bytesReturned, FALSE);
3926 ok(bret, "GetOverlappedResult failed, error %d\n", GetLastError());
3927 ok(bytesReturned == 0, "bytesReturned isn't supposed to be %d\n", bytesReturned);
3929 closesocket(connector);
3930 connector = INVALID_SOCKET;
3931 closesocket(acceptor);
3932 acceptor = INVALID_SOCKET;
3934 /* Test short reads */
3936 acceptor = socket(AF_INET, SOCK_STREAM, 0);
3937 if (acceptor == INVALID_SOCKET) {
3938 skip("could not create acceptor socket, error %d\n", WSAGetLastError());
3939 goto end;
3941 connector = socket(AF_INET, SOCK_STREAM, 0);
3942 if (connector == INVALID_SOCKET) {
3943 skip("could not create connector socket, error %d\n", WSAGetLastError());
3944 goto end;
3946 bret = pAcceptEx(listener, acceptor, buffer, 2,
3947 sizeof(struct sockaddr_in) + 16, sizeof(struct sockaddr_in) + 16,
3948 &bytesReturned, &overlapped);
3949 ok(bret == FALSE && WSAGetLastError() == ERROR_IO_PENDING, "AcceptEx returned %d + errno %d\n", bret, WSAGetLastError());
3951 iret = connect(connector, (struct sockaddr*)&bindAddress, sizeof(bindAddress));
3952 ok(iret == 0, "connecting to accepting socket failed, error %d\n", WSAGetLastError());
3954 dwret = WaitForSingleObject(overlapped.hEvent, 0);
3955 ok(dwret == WAIT_TIMEOUT, "Waiting for accept event timeout failed with %d + errno %d\n", dwret, GetLastError());
3957 iret = send(connector, buffer, 1, 0);
3958 ok(iret == 1, "could not send 1 byte: send %d errno %d\n", iret, WSAGetLastError());
3960 dwret = WaitForSingleObject(overlapped.hEvent, 1000);
3961 ok(dwret == WAIT_OBJECT_0, "Waiting for accept event failed with %d + errno %d\n", dwret, GetLastError());
3963 bret = GetOverlappedResult((HANDLE)listener, &overlapped, &bytesReturned, FALSE);
3964 ok(bret, "GetOverlappedResult failed, error %d\n", GetLastError());
3965 ok(bytesReturned == 1, "bytesReturned isn't supposed to be %d\n", bytesReturned);
3967 closesocket(connector);
3968 connector = INVALID_SOCKET;
3969 closesocket(acceptor);
3970 acceptor = INVALID_SOCKET;
3972 /* Test CF_DEFER & AcceptEx interaction */
3974 acceptor = socket(AF_INET, SOCK_STREAM, 0);
3975 if (acceptor == INVALID_SOCKET) {
3976 skip("could not create acceptor socket, error %d\n", WSAGetLastError());
3977 goto end;
3979 connector = socket(AF_INET, SOCK_STREAM, 0);
3980 if (connector == INVALID_SOCKET) {
3981 skip("could not create connector socket, error %d\n", WSAGetLastError());
3982 goto end;
3984 connector2 = socket(AF_INET, SOCK_STREAM, 0);
3985 if (connector == INVALID_SOCKET) {
3986 skip("could not create connector socket, error %d\n", WSAGetLastError());
3987 goto end;
3990 if (set_blocking(connector, FALSE)) {
3991 skip("couldn't make socket non-blocking, error %d\n", WSAGetLastError());
3992 goto end;
3995 if (set_blocking(connector2, FALSE)) {
3996 skip("couldn't make socket non-blocking, error %d\n", WSAGetLastError());
3997 goto end;
4000 /* Connect socket #1 */
4001 iret = connect(connector, (struct sockaddr*)&bindAddress, sizeof(bindAddress));
4002 ok(iret == SOCKET_ERROR && WSAGetLastError() == WSAEWOULDBLOCK, "connecting to accepting socket failed, error %d\n", WSAGetLastError());
4004 FD_ZERO ( &fds_accept );
4005 FD_ZERO ( &fds_send );
4007 FD_SET ( listener, &fds_accept );
4008 FD_SET ( connector, &fds_send );
4010 buffer[0] = '0';
4011 got = 0;
4012 conn1 = 0;
4014 for (i = 0; i < 4000; ++i)
4016 fd_set fds_openaccept = fds_accept, fds_opensend = fds_send;
4018 wsa_ok ( ( select ( 0, &fds_openaccept, &fds_opensend, NULL, &timeout ) ), SOCKET_ERROR !=,
4019 "acceptex test(%d): could not select on socket, errno %d\n" );
4021 /* check for incoming requests */
4022 if ( FD_ISSET ( listener, &fds_openaccept ) ) {
4023 got++;
4024 if (got == 1) {
4025 SOCKET tmp = WSAAccept(listener, NULL, NULL, (LPCONDITIONPROC) AlwaysDeferConditionFunc, 0);
4026 ok(tmp == INVALID_SOCKET && WSAGetLastError() == WSATRY_AGAIN, "Failed to defer connection, %d\n", WSAGetLastError());
4027 bret = pAcceptEx(listener, acceptor, buffer, 0,
4028 sizeof(struct sockaddr_in) + 16, sizeof(struct sockaddr_in) + 16,
4029 &bytesReturned, &overlapped);
4030 ok(bret == FALSE && WSAGetLastError() == ERROR_IO_PENDING, "AcceptEx returned %d + errno %d\n", bret, WSAGetLastError());
4032 else if (got == 2) {
4033 /* this should be socket #2 */
4034 SOCKET tmp = accept(listener, NULL, NULL);
4035 ok(tmp != INVALID_SOCKET, "accept failed %d\n", WSAGetLastError());
4036 closesocket(tmp);
4038 else {
4039 ok(FALSE, "Got more than 2 connections?\n");
4042 if ( conn1 && FD_ISSET ( connector2, &fds_opensend ) ) {
4043 /* Send data on second socket, and stop */
4044 send(connector2, "2", 1, 0);
4045 FD_CLR ( connector2, &fds_send );
4047 break;
4049 if ( FD_ISSET ( connector, &fds_opensend ) ) {
4050 /* Once #1 is connected, allow #2 to connect */
4051 conn1 = 1;
4053 send(connector, "1", 1, 0);
4054 FD_CLR ( connector, &fds_send );
4056 iret = connect(connector2, (struct sockaddr*)&bindAddress, sizeof(bindAddress));
4057 ok(iret == SOCKET_ERROR && WSAGetLastError() == WSAEWOULDBLOCK, "connecting to accepting socket failed, error %d\n", WSAGetLastError());
4058 FD_SET ( connector2, &fds_send );
4062 ok (got == 2 || broken(got == 1) /* NT4 */,
4063 "Did not get both connections, got %d\n", got);
4065 dwret = WaitForSingleObject(overlapped.hEvent, 0);
4066 ok(dwret == WAIT_OBJECT_0, "Waiting for accept event failed with %d + errno %d\n", dwret, GetLastError());
4068 bret = GetOverlappedResult((HANDLE)listener, &overlapped, &bytesReturned, FALSE);
4069 ok(bret, "GetOverlappedResult failed, error %d\n", GetLastError());
4070 ok(bytesReturned == 0, "bytesReturned isn't supposed to be %d\n", bytesReturned);
4072 set_blocking(acceptor, TRUE);
4073 iret = recv( acceptor, buffer, 2, 0);
4074 ok(iret == 1, "Failed to get data, %d, errno: %d\n", iret, WSAGetLastError());
4076 ok(buffer[0] == '1', "The wrong first client was accepted by acceptex: %c != 1\n", buffer[0]);
4078 closesocket(connector);
4079 connector = INVALID_SOCKET;
4080 closesocket(acceptor);
4081 acceptor = INVALID_SOCKET;
4083 /* clean up in case of failures */
4084 while ((acceptor = accept(listener, NULL, NULL)) != INVALID_SOCKET)
4085 closesocket(acceptor);
4087 /* Disconnect during receive? */
4089 acceptor = socket(AF_INET, SOCK_STREAM, 0);
4090 if (acceptor == INVALID_SOCKET) {
4091 skip("could not create acceptor socket, error %d\n", WSAGetLastError());
4092 goto end;
4094 connector = socket(AF_INET, SOCK_STREAM, 0);
4095 if (connector == INVALID_SOCKET) {
4096 skip("could not create connector socket, error %d\n", WSAGetLastError());
4097 goto end;
4099 bret = pAcceptEx(listener, acceptor, buffer, sizeof(buffer) - 2*(sizeof(struct sockaddr_in) + 16),
4100 sizeof(struct sockaddr_in) + 16, sizeof(struct sockaddr_in) + 16,
4101 &bytesReturned, &overlapped);
4102 ok(bret == FALSE && WSAGetLastError() == ERROR_IO_PENDING, "AcceptEx returned %d + errno %d\n", bret, WSAGetLastError());
4104 iret = connect(connector, (struct sockaddr*)&bindAddress, sizeof(bindAddress));
4105 ok(iret == 0, "connecting to accepting socket failed, error %d\n", WSAGetLastError());
4107 closesocket(connector);
4108 connector = INVALID_SOCKET;
4110 dwret = WaitForSingleObject(overlapped.hEvent, 1000);
4111 ok(dwret == WAIT_OBJECT_0, "Waiting for accept event failed with %d + errno %d\n", dwret, GetLastError());
4113 bret = GetOverlappedResult((HANDLE)listener, &overlapped, &bytesReturned, FALSE);
4114 ok(bret, "GetOverlappedResult failed, error %d\n", GetLastError());
4115 ok(bytesReturned == 0, "bytesReturned isn't supposed to be %d\n", bytesReturned);
4117 closesocket(acceptor);
4118 acceptor = INVALID_SOCKET;
4120 /* Test closing with pending requests */
4122 acceptor = socket(AF_INET, SOCK_STREAM, 0);
4123 if (acceptor == INVALID_SOCKET) {
4124 skip("could not create acceptor socket, error %d\n", WSAGetLastError());
4125 goto end;
4127 bret = pAcceptEx(listener, acceptor, buffer, sizeof(buffer) - 2*(sizeof(struct sockaddr_in) + 16),
4128 sizeof(struct sockaddr_in) + 16, sizeof(struct sockaddr_in) + 16,
4129 &bytesReturned, &overlapped);
4130 ok(bret == FALSE && WSAGetLastError() == ERROR_IO_PENDING, "AcceptEx returned %d + errno %d\n", bret, WSAGetLastError());
4132 closesocket(acceptor);
4133 acceptor = INVALID_SOCKET;
4135 dwret = WaitForSingleObject(overlapped.hEvent, 1000);
4136 todo_wine ok(dwret == WAIT_OBJECT_0 || broken(dwret == WAIT_TIMEOUT) /* NT4/2000 */,
4137 "Waiting for accept event failed with %d + errno %d\n", dwret, GetLastError());
4139 if (dwret != WAIT_TIMEOUT) {
4140 bret = GetOverlappedResult((HANDLE)listener, &overlapped, &bytesReturned, FALSE);
4141 ok(!bret && GetLastError() == ERROR_OPERATION_ABORTED, "GetOverlappedResult failed, error %d\n", GetLastError());
4143 else {
4144 bret = CancelIo((HANDLE) listener);
4145 ok(bret, "Failed to cancel failed test. Bailing...\n");
4146 if (!bret) return;
4147 WaitForSingleObject(overlapped.hEvent, 0);
4150 acceptor = socket(AF_INET, SOCK_STREAM, 0);
4151 if (acceptor == INVALID_SOCKET) {
4152 skip("could not create acceptor socket, error %d\n", WSAGetLastError());
4153 goto end;
4155 bret = pAcceptEx(listener, acceptor, buffer, sizeof(buffer) - 2*(sizeof(struct sockaddr_in) + 16),
4156 sizeof(struct sockaddr_in) + 16, sizeof(struct sockaddr_in) + 16,
4157 &bytesReturned, &overlapped);
4158 ok(bret == FALSE && WSAGetLastError() == ERROR_IO_PENDING, "AcceptEx returned %d + errno %d\n", bret, WSAGetLastError());
4160 CancelIo((HANDLE) acceptor);
4162 dwret = WaitForSingleObject(overlapped.hEvent, 1000);
4163 ok(dwret == WAIT_TIMEOUT, "Waiting for timeout failed with %d + errno %d\n", dwret, GetLastError());
4165 closesocket(acceptor);
4166 acceptor = INVALID_SOCKET;
4168 acceptor = socket(AF_INET, SOCK_STREAM, 0);
4169 if (acceptor == INVALID_SOCKET) {
4170 skip("could not create acceptor socket, error %d\n", WSAGetLastError());
4171 goto end;
4173 bret = pAcceptEx(listener, acceptor, buffer, sizeof(buffer) - 2*(sizeof(struct sockaddr_in) + 16),
4174 sizeof(struct sockaddr_in) + 16, sizeof(struct sockaddr_in) + 16,
4175 &bytesReturned, &overlapped);
4176 ok(bret == FALSE && WSAGetLastError() == ERROR_IO_PENDING, "AcceptEx returned %d + errno %d\n", bret, WSAGetLastError());
4178 closesocket(listener);
4179 listener = INVALID_SOCKET;
4181 dwret = WaitForSingleObject(overlapped.hEvent, 1000);
4182 ok(dwret == WAIT_OBJECT_0, "Waiting for accept event failed with %d + errno %d\n", dwret, GetLastError());
4184 bret = GetOverlappedResult((HANDLE)listener, &overlapped, &bytesReturned, FALSE);
4185 ok(!bret && GetLastError() == ERROR_OPERATION_ABORTED, "GetOverlappedResult failed, error %d\n", GetLastError());
4187 end:
4188 if (overlapped.hEvent)
4189 WSACloseEvent(overlapped.hEvent);
4190 if (listener != INVALID_SOCKET)
4191 closesocket(listener);
4192 if (acceptor != INVALID_SOCKET)
4193 closesocket(acceptor);
4194 if (connector != INVALID_SOCKET)
4195 closesocket(connector);
4196 if (connector2 != INVALID_SOCKET)
4197 closesocket(connector2);
4200 static void test_getpeername(void)
4202 SOCKET sock;
4203 struct sockaddr_in sa, sa_out;
4204 int sa_len;
4205 const char buf[] = "hello world";
4206 int ret;
4208 /* Test the parameter validation order. */
4209 ret = getpeername(INVALID_SOCKET, NULL, NULL);
4210 ok(ret == SOCKET_ERROR, "Expected getpeername to return SOCKET_ERROR, got %d\n", ret);
4211 ok(WSAGetLastError() == WSAENOTSOCK,
4212 "Expected WSAGetLastError() to return WSAENOTSOCK, got %d\n", WSAGetLastError());
4214 sock = socket(PF_INET, SOCK_DGRAM, IPPROTO_IP);
4215 ok(sock != INVALID_SOCKET, "Expected socket to return a valid socket\n");
4216 if (sock == INVALID_SOCKET)
4218 skip("Socket creation failed with %d\n", WSAGetLastError());
4219 return;
4222 ret = getpeername(sock, NULL, NULL);
4223 ok(ret == SOCKET_ERROR, "Expected getpeername to return SOCKET_ERROR, got %d\n", ret);
4224 ok(WSAGetLastError() == WSAENOTCONN ||
4225 broken(WSAGetLastError() == WSAEFAULT), /* Win9x and WinMe */
4226 "Expected WSAGetLastError() to return WSAENOTCONN, got %d\n", WSAGetLastError());
4228 memset(&sa, 0, sizeof(sa));
4229 sa.sin_family = AF_INET;
4230 sa.sin_port = htons(139);
4231 sa.sin_addr.s_addr = inet_addr("127.0.0.1");
4233 /* sendto does not change a socket's connection state. */
4234 ret = sendto(sock, buf, sizeof(buf), 0, (struct sockaddr*)&sa, sizeof(sa));
4235 ok(ret != SOCKET_ERROR,
4236 "Expected sendto to succeed, WSAGetLastError() = %d\n", WSAGetLastError());
4238 ret = getpeername(sock, NULL, NULL);
4239 ok(ret == SOCKET_ERROR, "Expected getpeername to return SOCKET_ERROR, got %d\n", ret);
4240 ok(WSAGetLastError() == WSAENOTCONN ||
4241 broken(WSAGetLastError() == WSAEFAULT), /* Win9x and WinMe */
4242 "Expected WSAGetLastError() to return WSAENOTCONN, got %d\n", WSAGetLastError());
4244 ret = connect(sock, (struct sockaddr*)&sa, sizeof(sa));
4245 ok(ret == 0,
4246 "Expected connect to succeed, WSAGetLastError() = %d\n", WSAGetLastError());
4248 ret = getpeername(sock, NULL, NULL);
4249 ok(ret == SOCKET_ERROR, "Expected getpeername to return SOCKET_ERROR, got %d\n", ret);
4250 ok(WSAGetLastError() == WSAEFAULT,
4251 "Expected WSAGetLastError() to return WSAEFAULT, got %d\n", WSAGetLastError());
4253 /* Test crashes on Wine. */
4254 if (0)
4256 ret = getpeername(sock, (void*)0xdeadbeef, (void*)0xcafebabe);
4257 ok(ret == SOCKET_ERROR, "Expected getpeername to return SOCKET_ERROR, got %d\n", ret);
4258 ok(WSAGetLastError() == WSAEFAULT,
4259 "Expected WSAGetLastError() to return WSAEFAULT, got %d\n", WSAGetLastError());
4262 sa_len = 0;
4263 ret = getpeername(sock, (struct sockaddr*)&sa_out, &sa_len);
4264 ok(ret == SOCKET_ERROR, "Expected getpeername to return 0, got %d\n", ret);
4265 ok(WSAGetLastError() == WSAEFAULT,
4266 "Expected WSAGetLastError() to return WSAEFAULT, got %d\n", WSAGetLastError());
4268 sa_len = sizeof(sa_out);
4269 ret = getpeername(sock, (struct sockaddr*)&sa_out, &sa_len);
4270 ok(ret == 0, "Expected getpeername to return 0, got %d\n", ret);
4271 ok(!memcmp(&sa, &sa_out, sizeof(sa)),
4272 "Expected the returned structure to be identical to the connect structure\n");
4274 closesocket(sock);
4277 static void test_sioRoutingInterfaceQuery(void)
4279 int ret;
4280 SOCKET sock;
4281 SOCKADDR_IN sin = { 0 }, sout = { 0 };
4282 DWORD bytesReturned;
4284 sock = socket(PF_INET, SOCK_DGRAM, IPPROTO_IP);
4285 ok(sock != INVALID_SOCKET, "Expected socket to return a valid socket\n");
4286 if (sock == INVALID_SOCKET)
4288 skip("Socket creation failed with %d\n", WSAGetLastError());
4289 return;
4291 ret = WSAIoctl(sock, SIO_ROUTING_INTERFACE_QUERY, NULL, 0, NULL, 0, NULL,
4292 NULL, NULL);
4293 todo_wine
4294 ok(ret == SOCKET_ERROR && WSAGetLastError() == WSAEFAULT,
4295 "expected WSAEFAULT, got %d\n", WSAGetLastError());
4296 ret = WSAIoctl(sock, SIO_ROUTING_INTERFACE_QUERY, &sin, sizeof(sin),
4297 NULL, 0, NULL, NULL, NULL);
4298 todo_wine
4299 ok(ret == SOCKET_ERROR && WSAGetLastError() == WSAEFAULT,
4300 "expected WSAEFAULT, got %d\n", WSAGetLastError());
4301 ret = WSAIoctl(sock, SIO_ROUTING_INTERFACE_QUERY, &sin, sizeof(sin),
4302 NULL, 0, &bytesReturned, NULL, NULL);
4303 todo_wine
4304 ok(ret == SOCKET_ERROR &&
4305 (WSAGetLastError() == WSAEFAULT /* Win98 */ ||
4306 WSAGetLastError() == WSAEINVAL /* NT4 */||
4307 WSAGetLastError() == WSAEAFNOSUPPORT),
4308 "expected WSAEFAULT or WSAEINVAL or WSAEAFNOSUPPORT, got %d\n",
4309 WSAGetLastError());
4310 sin.sin_family = AF_INET;
4311 ret = WSAIoctl(sock, SIO_ROUTING_INTERFACE_QUERY, &sin, sizeof(sin),
4312 NULL, 0, &bytesReturned, NULL, NULL);
4313 todo_wine
4314 ok(ret == SOCKET_ERROR &&
4315 (WSAGetLastError() == WSAEFAULT /* Win98 */ ||
4316 WSAGetLastError() == WSAEINVAL),
4317 "expected WSAEFAULT or WSAEINVAL, got %d\n", WSAGetLastError());
4318 sin.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
4319 ret = WSAIoctl(sock, SIO_ROUTING_INTERFACE_QUERY, &sin, sizeof(sin),
4320 NULL, 0, &bytesReturned, NULL, NULL);
4321 todo_wine
4322 ok(ret == SOCKET_ERROR &&
4323 (WSAGetLastError() == WSAEINVAL /* NT4 */ ||
4324 WSAGetLastError() == WSAEFAULT),
4325 "expected WSAEINVAL or WSAEFAULT, got %d\n", WSAGetLastError());
4326 ret = WSAIoctl(sock, SIO_ROUTING_INTERFACE_QUERY, &sin, sizeof(sin),
4327 &sout, sizeof(sout), &bytesReturned, NULL, NULL);
4328 todo_wine
4329 ok(!ret || broken(WSAGetLastError() == WSAEINVAL /* NT4 */),
4330 "WSAIoctl failed: %d\n", WSAGetLastError());
4331 if (!ret)
4333 ok(sout.sin_family == AF_INET, "expected AF_INET, got %d\n",
4334 sout.sin_family);
4335 if (sout.sin_family == AF_INET)
4336 ok(sout.sin_addr.s_addr == htonl(INADDR_LOOPBACK),
4337 "expected %08x, got %08x\n", htonl(INADDR_LOOPBACK),
4338 htonl(sout.sin_addr.s_addr));
4340 closesocket(sock);
4344 /**************** Main program ***************/
4346 START_TEST( sock )
4348 int i;
4350 /* Leave these tests at the beginning. They depend on WSAStartup not having been
4351 * called, which is done by Init() below. */
4352 test_WithoutWSAStartup();
4353 test_WithWSAStartup();
4355 Init();
4357 test_set_getsockopt();
4358 test_so_reuseaddr();
4359 test_extendedSocketOptions();
4361 for (i = 0; i < NUM_TESTS; i++)
4363 trace ( " **** STARTING TEST %d ****\n", i );
4364 do_test ( &tests[i] );
4365 trace ( " **** TEST %d COMPLETE ****\n", i );
4368 test_UDP();
4370 test_getservbyname();
4371 test_WSASocket();
4373 test_WSAAddressToStringA();
4374 test_WSAAddressToStringW();
4376 test_WSAStringToAddressA();
4377 test_WSAStringToAddressW();
4379 test_select();
4380 test_accept();
4381 test_getpeername();
4382 test_getsockname();
4383 test_inet_addr();
4384 test_addr_to_print();
4385 test_ioctlsocket();
4386 test_dns();
4387 test_gethostbyname_hack();
4389 test_WSASendTo();
4390 test_WSARecv();
4392 test_events(0);
4393 test_events(1);
4395 test_ipv6only();
4396 test_GetAddrInfoW();
4398 test_AcceptEx();
4399 test_ConnectEx();
4401 test_sioRoutingInterfaceQuery();
4403 /* this is a io heavy test, do it at the end so the kernel doesn't start dropping packets */
4404 test_send();
4406 Exit();