ws2_32/tests: Update hostent struct tests.
[wine/wine-gecko.git] / dlls / ws2_32 / tests / sock.c
blob9fd6abbce1d3895b6cc5e6b6f9786538ddf88e12
1 /*
2 * Unit test suite for winsock functions
4 * Copyright 2002 Martin Wilck
5 * Copyright 2005 Thomas Kho
6 * Copyright 2008 Jeff Zaroyko
8 * This library is free software; you can redistribute it and/or
9 * modify it under the terms of the GNU Lesser General Public
10 * License as published by the Free Software Foundation; either
11 * version 2.1 of the License, or (at your option) any later version.
13 * This library is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 * Lesser General Public License for more details.
18 * You should have received a copy of the GNU Lesser General Public
19 * License along with this library; if not, write to the Free Software
20 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
23 #include <ntstatus.h>
24 #define WIN32_NO_STATUS
25 #include <winsock2.h>
26 #include <windows.h>
27 #include <ws2tcpip.h>
28 #include <mswsock.h>
29 #include <mstcpip.h>
30 #include <stdio.h>
31 #include "wine/test.h"
33 #define MAX_CLIENTS 4 /* Max number of clients */
34 #define FIRST_CHAR 'A' /* First character in transferred pattern */
35 #define BIND_SLEEP 10 /* seconds to wait between attempts to bind() */
36 #define BIND_TRIES 6 /* Number of bind() attempts */
37 #define TEST_TIMEOUT 30 /* seconds to wait before killing child threads
38 after server initialization, if something hangs */
40 #define NUM_UDP_PEERS 3 /* Number of UDP sockets to create and test > 1 */
42 #define NUM_THREADS 3 /* Number of threads to run getservbyname */
43 #define NUM_QUERIES 250 /* Number of getservbyname queries per thread */
45 #define SERVERIP "127.0.0.1" /* IP to bind to */
46 #define SERVERPORT 9374 /* Port number to bind to */
48 #define wsa_ok(op, cond, msg) \
49 do { \
50 int tmp, err = 0; \
51 tmp = op; \
52 if ( !(cond tmp) ) err = WSAGetLastError(); \
53 ok ( cond tmp, msg, GetCurrentThreadId(), err); \
54 } while (0);
56 #define make_keepalive(k, enable, time, interval) \
57 k.onoff = enable; \
58 k.keepalivetime = time; \
59 k.keepaliveinterval = interval;
61 /* Function pointers */
62 static void (WINAPI *pfreeaddrinfo)(struct addrinfo *);
63 static int (WINAPI *pgetaddrinfo)(LPCSTR,LPCSTR,const struct addrinfo *,struct addrinfo **);
64 static void (WINAPI *pFreeAddrInfoW)(PADDRINFOW);
65 static int (WINAPI *pGetAddrInfoW)(LPCWSTR,LPCWSTR,const ADDRINFOW *,PADDRINFOW *);
66 static PCSTR (WINAPI *pInetNtop)(INT,LPVOID,LPSTR,ULONG);
68 /**************** Structs and typedefs ***************/
70 typedef struct thread_info
72 HANDLE thread;
73 DWORD id;
74 } thread_info;
76 /* Information in the server about open client connections */
77 typedef struct sock_info
79 SOCKET s;
80 struct sockaddr_in addr;
81 struct sockaddr_in peer;
82 char *buf;
83 int n_recvd;
84 int n_sent;
85 } sock_info;
87 /* Test parameters for both server & client */
88 typedef struct test_params
90 int sock_type;
91 int sock_prot;
92 const char *inet_addr;
93 short inet_port;
94 int chunk_size;
95 int n_chunks;
96 int n_clients;
97 } test_params;
99 /* server-specific test parameters */
100 typedef struct server_params
102 test_params *general;
103 DWORD sock_flags;
104 int buflen;
105 } server_params;
107 /* client-specific test parameters */
108 typedef struct client_params
110 test_params *general;
111 DWORD sock_flags;
112 int buflen;
113 } client_params;
115 /* This type combines all information for setting up a test scenario */
116 typedef struct test_setup
118 test_params general;
119 LPVOID srv;
120 server_params srv_params;
121 LPVOID clt;
122 client_params clt_params;
123 } test_setup;
125 /* Thread local storage for server */
126 typedef struct server_memory
128 SOCKET s;
129 struct sockaddr_in addr;
130 sock_info sock[MAX_CLIENTS];
131 } server_memory;
133 /* Thread local storage for client */
134 typedef struct client_memory
136 SOCKET s;
137 struct sockaddr_in addr;
138 char *send_buf;
139 char *recv_buf;
140 } client_memory;
142 /* SelectReadThread thread parameters */
143 typedef struct select_thread_params
145 SOCKET s;
146 BOOL ReadKilled;
147 } select_thread_params;
149 /**************** Static variables ***************/
151 static DWORD tls; /* Thread local storage index */
152 static HANDLE thread[1+MAX_CLIENTS];
153 static DWORD thread_id[1+MAX_CLIENTS];
154 static HANDLE server_ready;
155 static HANDLE client_ready[MAX_CLIENTS];
156 static int client_id;
158 /**************** General utility functions ***************/
160 static int tcp_socketpair(SOCKET *src, SOCKET *dst)
162 SOCKET server = INVALID_SOCKET;
163 struct sockaddr_in addr;
164 int len;
165 int ret;
167 *src = INVALID_SOCKET;
168 *dst = INVALID_SOCKET;
170 *src = socket(AF_INET, SOCK_STREAM, 0);
171 if (*src == INVALID_SOCKET)
172 goto end;
174 server = socket(AF_INET, SOCK_STREAM, 0);
175 if (server == INVALID_SOCKET)
176 goto end;
178 memset(&addr, 0, sizeof(addr));
179 addr.sin_family = AF_INET;
180 addr.sin_addr.s_addr = inet_addr("127.0.0.1");
181 ret = bind(server, (struct sockaddr*)&addr, sizeof(addr));
182 if (ret != 0)
183 goto end;
185 len = sizeof(addr);
186 ret = getsockname(server, (struct sockaddr*)&addr, &len);
187 if (ret != 0)
188 goto end;
190 ret = listen(server, 1);
191 if (ret != 0)
192 goto end;
194 ret = connect(*src, (struct sockaddr*)&addr, sizeof(addr));
195 if (ret != 0)
196 goto end;
198 len = sizeof(addr);
199 *dst = accept(server, (struct sockaddr*)&addr, &len);
201 end:
202 if (server != INVALID_SOCKET)
203 closesocket(server);
204 if (*src != INVALID_SOCKET && *dst != INVALID_SOCKET)
205 return 0;
206 closesocket(*src);
207 closesocket(*dst);
208 return -1;
211 static void set_so_opentype ( BOOL overlapped )
213 int optval = !overlapped, newval, len = sizeof (int);
215 ok ( setsockopt ( INVALID_SOCKET, SOL_SOCKET, SO_OPENTYPE,
216 (LPVOID) &optval, sizeof (optval) ) == 0,
217 "setting SO_OPENTYPE failed\n" );
218 ok ( getsockopt ( INVALID_SOCKET, SOL_SOCKET, SO_OPENTYPE,
219 (LPVOID) &newval, &len ) == 0,
220 "getting SO_OPENTYPE failed\n" );
221 ok ( optval == newval, "failed to set SO_OPENTYPE\n" );
224 static int set_blocking ( SOCKET s, BOOL blocking )
226 u_long val = !blocking;
227 return ioctlsocket ( s, FIONBIO, &val );
230 static void fill_buffer ( char *buf, int chunk_size, int n_chunks )
232 char c, *p;
233 for ( c = FIRST_CHAR, p = buf; c < FIRST_CHAR + n_chunks; c++, p += chunk_size )
234 memset ( p, c, chunk_size );
237 static int test_buffer ( char *buf, int chunk_size, int n_chunks )
239 char c, *p;
240 int i;
241 for ( c = FIRST_CHAR, p = buf; c < FIRST_CHAR + n_chunks; c++, p += chunk_size )
243 for ( i = 0; i < chunk_size; i++ )
244 if ( p[i] != c ) return i;
246 return -1;
250 * This routine is called when a client / server does not expect any more data,
251 * but needs to acknowledge the closing of the connection (by reading 0 bytes).
253 static void read_zero_bytes ( SOCKET s )
255 char buf[256];
256 int tmp, n = 0;
257 while ( ( tmp = recv ( s, buf, 256, 0 ) ) > 0 )
258 n += tmp;
259 ok ( n <= 0, "garbage data received: %d bytes\n", n );
262 static int do_oob_send ( SOCKET s, char *buf, int buflen, int sendlen )
264 char* last = buf + buflen, *p;
265 int n = 1;
266 for ( p = buf; n > 0 && p < last; p += n )
267 n = send ( s, p, min ( sendlen, last - p ), MSG_OOB );
268 wsa_ok ( n, 0 <=, "do_oob_send (%x): error %d\n" );
269 return p - buf;
272 static int do_synchronous_send ( SOCKET s, char *buf, int buflen, int sendlen )
274 char* last = buf + buflen, *p;
275 int n = 1;
276 for ( p = buf; n > 0 && p < last; p += n )
277 n = send ( s, p, min ( sendlen, last - p ), 0 );
278 wsa_ok ( n, 0 <=, "do_synchronous_send (%x): error %d\n" );
279 return p - buf;
282 static int do_synchronous_recv ( SOCKET s, char *buf, int buflen, int recvlen )
284 char* last = buf + buflen, *p;
285 int n = 1;
286 for ( p = buf; n > 0 && p < last; p += n )
287 n = recv ( s, p, min ( recvlen, last - p ), 0 );
288 wsa_ok ( n, 0 <=, "do_synchronous_recv (%x): error %d:\n" );
289 return p - buf;
292 static int do_synchronous_recvfrom ( SOCKET s, char *buf, int buflen,int flags,struct sockaddr *from, int *fromlen, int recvlen )
294 char* last = buf + buflen, *p;
295 int n = 1;
296 for ( p = buf; n > 0 && p < last; p += n )
297 n = recvfrom ( s, p, min ( recvlen, last - p ), 0, from, fromlen );
298 wsa_ok ( n, 0 <=, "do_synchronous_recv (%x): error %d:\n" );
299 return p - buf;
303 * Call this routine right after thread startup.
304 * SO_OPENTYPE must by 0, regardless what the server did.
306 static void check_so_opentype (void)
308 int tmp = 1, len;
309 len = sizeof (tmp);
310 getsockopt ( INVALID_SOCKET, SOL_SOCKET, SO_OPENTYPE, (LPVOID) &tmp, &len );
311 ok ( tmp == 0, "check_so_opentype: wrong startup value of SO_OPENTYPE: %d\n", tmp );
314 /**************** Server utility functions ***************/
317 * Even if we have closed our server socket cleanly,
318 * the OS may mark the address "in use" for some time -
319 * this happens with native Linux apps, too.
321 static void do_bind ( SOCKET s, struct sockaddr* addr, int addrlen )
323 int err, wsaerr = 0, n_try = BIND_TRIES;
325 while ( ( err = bind ( s, addr, addrlen ) ) != 0 &&
326 ( wsaerr = WSAGetLastError () ) == WSAEADDRINUSE &&
327 n_try-- >= 0)
329 trace ( "address in use, waiting ...\n" );
330 Sleep ( 1000 * BIND_SLEEP );
332 ok ( err == 0, "failed to bind: %d\n", wsaerr );
335 static void server_start ( server_params *par )
337 int i;
338 test_params *gen = par->general;
339 server_memory *mem = LocalAlloc ( LPTR, sizeof ( server_memory ) );
341 TlsSetValue ( tls, mem );
342 mem->s = WSASocketA ( AF_INET, gen->sock_type, gen->sock_prot,
343 NULL, 0, par->sock_flags );
344 ok ( mem->s != INVALID_SOCKET, "Server: WSASocket failed\n" );
346 mem->addr.sin_family = AF_INET;
347 mem->addr.sin_addr.s_addr = inet_addr ( gen->inet_addr );
348 mem->addr.sin_port = htons ( gen->inet_port );
350 for (i = 0; i < MAX_CLIENTS; i++)
352 mem->sock[i].s = INVALID_SOCKET;
353 mem->sock[i].buf = LocalAlloc ( LPTR, gen->n_chunks * gen->chunk_size );
354 mem->sock[i].n_recvd = 0;
355 mem->sock[i].n_sent = 0;
358 if ( gen->sock_type == SOCK_STREAM )
359 do_bind ( mem->s, (struct sockaddr*) &mem->addr, sizeof (mem->addr) );
362 static void server_stop (void)
364 int i;
365 server_memory *mem = TlsGetValue ( tls );
367 for (i = 0; i < MAX_CLIENTS; i++ )
369 LocalFree ( mem->sock[i].buf );
370 if ( mem->sock[i].s != INVALID_SOCKET )
371 closesocket ( mem->sock[i].s );
373 ok ( closesocket ( mem->s ) == 0, "closesocket failed\n" );
374 LocalFree ( mem );
375 ExitThread ( GetCurrentThreadId () );
378 /**************** Client utilitiy functions ***************/
380 static void client_start ( client_params *par )
382 test_params *gen = par->general;
383 client_memory *mem = LocalAlloc (LPTR, sizeof (client_memory));
385 TlsSetValue ( tls, mem );
387 WaitForSingleObject ( server_ready, INFINITE );
389 mem->s = WSASocketA ( AF_INET, gen->sock_type, gen->sock_prot,
390 NULL, 0, par->sock_flags );
392 mem->addr.sin_family = AF_INET;
393 mem->addr.sin_addr.s_addr = inet_addr ( gen->inet_addr );
394 mem->addr.sin_port = htons ( gen->inet_port );
396 ok ( mem->s != INVALID_SOCKET, "Client: WSASocket failed\n" );
398 mem->send_buf = LocalAlloc ( LPTR, 2 * gen->n_chunks * gen->chunk_size );
399 mem->recv_buf = mem->send_buf + gen->n_chunks * gen->chunk_size;
400 fill_buffer ( mem->send_buf, gen->chunk_size, gen->n_chunks );
402 SetEvent ( client_ready[client_id] );
403 /* Wait for the other clients to come up */
404 WaitForMultipleObjects ( min ( gen->n_clients, MAX_CLIENTS ), client_ready, TRUE, INFINITE );
407 static void client_stop (void)
409 client_memory *mem = TlsGetValue ( tls );
410 wsa_ok ( closesocket ( mem->s ), 0 ==, "closesocket error (%x): %d\n" );
411 LocalFree ( mem->send_buf );
412 LocalFree ( mem );
413 ExitThread(0);
416 /**************** Servers ***************/
419 * simple_server: A very basic server doing synchronous IO.
421 static VOID WINAPI simple_server ( server_params *par )
423 test_params *gen = par->general;
424 server_memory *mem;
425 int pos, n_recvd, n_sent, n_expected = gen->n_chunks * gen->chunk_size, tmp, i,
426 id = GetCurrentThreadId();
428 trace ( "simple_server (%x) starting\n", id );
430 set_so_opentype ( FALSE ); /* non-overlapped */
431 server_start ( par );
432 mem = TlsGetValue ( tls );
434 wsa_ok ( set_blocking ( mem->s, TRUE ), 0 ==, "simple_server (%x): failed to set blocking mode: %d\n");
435 wsa_ok ( listen ( mem->s, SOMAXCONN ), 0 ==, "simple_server (%x): listen failed: %d\n");
437 trace ( "simple_server (%x) ready\n", id );
438 SetEvent ( server_ready ); /* notify clients */
440 for ( i = 0; i < min ( gen->n_clients, MAX_CLIENTS ); i++ )
442 trace ( "simple_server (%x): waiting for client\n", id );
444 /* accept a single connection */
445 tmp = sizeof ( mem->sock[0].peer );
446 mem->sock[0].s = accept ( mem->s, (struct sockaddr*) &mem->sock[0].peer, &tmp );
447 wsa_ok ( mem->sock[0].s, INVALID_SOCKET !=, "simple_server (%x): accept failed: %d\n" );
449 ok ( mem->sock[0].peer.sin_addr.s_addr == inet_addr ( gen->inet_addr ),
450 "simple_server (%x): strange peer address\n", id );
452 /* Receive data & check it */
453 n_recvd = do_synchronous_recv ( mem->sock[0].s, mem->sock[0].buf, n_expected, par->buflen );
454 ok ( n_recvd == n_expected,
455 "simple_server (%x): received less data than expected: %d of %d\n", id, n_recvd, n_expected );
456 pos = test_buffer ( mem->sock[0].buf, gen->chunk_size, gen->n_chunks );
457 ok ( pos == -1, "simple_server (%x): test pattern error: %d\n", id, pos);
459 /* Echo data back */
460 n_sent = do_synchronous_send ( mem->sock[0].s, mem->sock[0].buf, n_expected, par->buflen );
461 ok ( n_sent == n_expected,
462 "simple_server (%x): sent less data than expected: %d of %d\n", id, n_sent, n_expected );
464 /* cleanup */
465 read_zero_bytes ( mem->sock[0].s );
466 wsa_ok ( closesocket ( mem->sock[0].s ), 0 ==, "simple_server (%x): closesocket error: %d\n" );
467 mem->sock[0].s = INVALID_SOCKET;
470 trace ( "simple_server (%x) exiting\n", id );
471 server_stop ();
475 * oob_server: A very basic server receiving out-of-band data.
477 static VOID WINAPI oob_server ( server_params *par )
479 test_params *gen = par->general;
480 server_memory *mem;
481 u_long atmark = 0;
482 int pos, n_recvd, n_expected = gen->n_chunks * gen->chunk_size, tmp,
483 id = GetCurrentThreadId();
485 trace ( "oob_server (%x) starting\n", id );
487 set_so_opentype ( FALSE ); /* non-overlapped */
488 server_start ( par );
489 mem = TlsGetValue ( tls );
491 wsa_ok ( set_blocking ( mem->s, TRUE ), 0 ==, "oob_server (%x): failed to set blocking mode: %d\n");
492 wsa_ok ( listen ( mem->s, SOMAXCONN ), 0 ==, "oob_server (%x): listen failed: %d\n");
494 trace ( "oob_server (%x) ready\n", id );
495 SetEvent ( server_ready ); /* notify clients */
497 trace ( "oob_server (%x): waiting for client\n", id );
499 /* accept a single connection */
500 tmp = sizeof ( mem->sock[0].peer );
501 mem->sock[0].s = accept ( mem->s, (struct sockaddr*) &mem->sock[0].peer, &tmp );
502 wsa_ok ( mem->sock[0].s, INVALID_SOCKET !=, "oob_server (%x): accept failed: %d\n" );
504 ok ( mem->sock[0].peer.sin_addr.s_addr == inet_addr ( gen->inet_addr ),
505 "oob_server (%x): strange peer address\n", id );
507 /* check atmark state */
508 ioctlsocket ( mem->sock[0].s, SIOCATMARK, &atmark );
509 ok ( atmark == 1, "oob_server (%x): unexpectedly at the OOB mark: %i\n", id, atmark );
511 /* Receive normal data and check atmark state */
512 n_recvd = do_synchronous_recv ( mem->sock[0].s, mem->sock[0].buf, n_expected, par->buflen );
513 ok ( n_recvd == n_expected,
514 "simple_server (%x): received less data than expected: %d of %d\n", id, n_recvd, n_expected );
515 pos = test_buffer ( mem->sock[0].buf, gen->chunk_size, gen->n_chunks );
516 ok ( pos == -1, "simple_server (%x): test pattern error: %d\n", id, pos);
518 ioctlsocket ( mem->sock[0].s, SIOCATMARK, &atmark );
519 ok ( atmark == 1, "oob_server (%x): unexpectedly at the OOB mark: %i\n", id, atmark );
521 /* Receive a part of the out-of-band data and check atmark state */
522 n_recvd = do_synchronous_recv ( mem->sock[0].s, mem->sock[0].buf, 8, par->buflen );
523 ok ( n_recvd == 8,
524 "oob_server (%x): received less data than expected: %d of %d\n", id, n_recvd, 8 );
525 n_expected -= 8;
527 ioctlsocket ( mem->sock[0].s, SIOCATMARK, &atmark );
528 todo_wine ok ( atmark == 0, "oob_server (%x): not at the OOB mark: %i\n", id, atmark );
530 /* Receive the rest of the out-of-band data and check atmark state */
531 do_synchronous_recv ( mem->sock[0].s, mem->sock[0].buf, n_expected, par->buflen );
533 ioctlsocket ( mem->sock[0].s, SIOCATMARK, &atmark );
534 todo_wine ok ( atmark == 0, "oob_server (%x): not at the OOB mark: %i\n", id, atmark );
536 /* cleanup */
537 wsa_ok ( closesocket ( mem->sock[0].s ), 0 ==, "oob_server (%x): closesocket error: %d\n" );
538 mem->sock[0].s = INVALID_SOCKET;
540 trace ( "oob_server (%x) exiting\n", id );
541 server_stop ();
545 * select_server: A non-blocking server.
547 static VOID WINAPI select_server ( server_params *par )
549 test_params *gen = par->general;
550 server_memory *mem;
551 int n_expected = gen->n_chunks * gen->chunk_size, tmp, i,
552 id = GetCurrentThreadId(), n_connections = 0, n_sent, n_recvd,
553 n_set, delta, n_ready;
554 struct timeval timeout = {0,10}; /* wait for 10 milliseconds */
555 fd_set fds_recv, fds_send, fds_openrecv, fds_opensend;
557 trace ( "select_server (%x) starting\n", id );
559 set_so_opentype ( FALSE ); /* non-overlapped */
560 server_start ( par );
561 mem = TlsGetValue ( tls );
563 wsa_ok ( set_blocking ( mem->s, FALSE ), 0 ==, "select_server (%x): failed to set blocking mode: %d\n");
564 wsa_ok ( listen ( mem->s, SOMAXCONN ), 0 ==, "select_server (%x): listen failed: %d\n");
566 trace ( "select_server (%x) ready\n", id );
567 SetEvent ( server_ready ); /* notify clients */
569 FD_ZERO ( &fds_openrecv );
570 FD_ZERO ( &fds_recv );
571 FD_ZERO ( &fds_send );
572 FD_ZERO ( &fds_opensend );
574 FD_SET ( mem->s, &fds_openrecv );
576 while(1)
578 fds_recv = fds_openrecv;
579 fds_send = fds_opensend;
581 n_set = 0;
583 wsa_ok ( ( n_ready = select ( 0, &fds_recv, &fds_send, NULL, &timeout ) ), SOCKET_ERROR !=,
584 "select_server (%x): select() failed: %d\n" );
586 /* check for incoming requests */
587 if ( FD_ISSET ( mem->s, &fds_recv ) ) {
588 n_set += 1;
590 trace ( "select_server (%x): accepting client connection\n", id );
592 /* accept a single connection */
593 tmp = sizeof ( mem->sock[n_connections].peer );
594 mem->sock[n_connections].s = accept ( mem->s, (struct sockaddr*) &mem->sock[n_connections].peer, &tmp );
595 wsa_ok ( mem->sock[n_connections].s, INVALID_SOCKET !=, "select_server (%x): accept() failed: %d\n" );
597 ok ( mem->sock[n_connections].peer.sin_addr.s_addr == inet_addr ( gen->inet_addr ),
598 "select_server (%x): strange peer address\n", id );
600 /* add to list of open connections */
601 FD_SET ( mem->sock[n_connections].s, &fds_openrecv );
602 FD_SET ( mem->sock[n_connections].s, &fds_opensend );
604 n_connections++;
607 /* handle open requests */
609 for ( i = 0; i < n_connections; i++ )
611 if ( FD_ISSET( mem->sock[i].s, &fds_recv ) ) {
612 n_set += 1;
614 if ( mem->sock[i].n_recvd < n_expected ) {
615 /* Receive data & check it */
616 n_recvd = recv ( mem->sock[i].s, mem->sock[i].buf + mem->sock[i].n_recvd, min ( n_expected - mem->sock[i].n_recvd, par->buflen ), 0 );
617 ok ( n_recvd != SOCKET_ERROR, "select_server (%x): error in recv(): %d\n", id, WSAGetLastError() );
618 mem->sock[i].n_recvd += n_recvd;
620 if ( mem->sock[i].n_recvd == n_expected ) {
621 int pos = test_buffer ( mem->sock[i].buf, gen->chunk_size, gen->n_chunks );
622 ok ( pos == -1, "select_server (%x): test pattern error: %d\n", id, pos );
623 FD_CLR ( mem->sock[i].s, &fds_openrecv );
626 ok ( mem->sock[i].n_recvd <= n_expected, "select_server (%x): received too many bytes: %d\n", id, mem->sock[i].n_recvd );
630 /* only echo back what we've received */
631 delta = mem->sock[i].n_recvd - mem->sock[i].n_sent;
633 if ( FD_ISSET ( mem->sock[i].s, &fds_send ) ) {
634 n_set += 1;
636 if ( ( delta > 0 ) && ( mem->sock[i].n_sent < n_expected ) ) {
637 /* Echo data back */
638 n_sent = send ( mem->sock[i].s, mem->sock[i].buf + mem->sock[i].n_sent, min ( delta, par->buflen ), 0 );
639 ok ( n_sent != SOCKET_ERROR, "select_server (%x): error in send(): %d\n", id, WSAGetLastError() );
640 mem->sock[i].n_sent += n_sent;
642 if ( mem->sock[i].n_sent == n_expected ) {
643 FD_CLR ( mem->sock[i].s, &fds_opensend );
646 ok ( mem->sock[i].n_sent <= n_expected, "select_server (%x): sent too many bytes: %d\n", id, mem->sock[i].n_sent );
651 /* check that select returned the correct number of ready sockets */
652 ok ( ( n_set == n_ready ), "select_server (%x): select() returns wrong number of ready sockets\n", id );
654 /* check if all clients are done */
655 if ( ( fds_opensend.fd_count == 0 )
656 && ( fds_openrecv.fd_count == 1 ) /* initial socket that accepts clients */
657 && ( n_connections == min ( gen->n_clients, MAX_CLIENTS ) ) ) {
658 break;
662 for ( i = 0; i < min ( gen->n_clients, MAX_CLIENTS ); i++ )
664 /* cleanup */
665 read_zero_bytes ( mem->sock[i].s );
666 wsa_ok ( closesocket ( mem->sock[i].s ), 0 ==, "select_server (%x): closesocket error: %d\n" );
667 mem->sock[i].s = INVALID_SOCKET;
670 trace ( "select_server (%x) exiting\n", id );
671 server_stop ();
674 /**************** Clients ***************/
677 * simple_client: A very basic client doing synchronous IO.
679 static VOID WINAPI simple_client ( client_params *par )
681 test_params *gen = par->general;
682 client_memory *mem;
683 int pos, n_sent, n_recvd, n_expected = gen->n_chunks * gen->chunk_size, id;
685 id = GetCurrentThreadId();
686 trace ( "simple_client (%x): starting\n", id );
687 /* wait here because we want to call set_so_opentype before creating a socket */
688 WaitForSingleObject ( server_ready, INFINITE );
689 trace ( "simple_client (%x): server ready\n", id );
691 check_so_opentype ();
692 set_so_opentype ( FALSE ); /* non-overlapped */
693 client_start ( par );
694 mem = TlsGetValue ( tls );
696 /* Connect */
697 wsa_ok ( connect ( mem->s, (struct sockaddr*) &mem->addr, sizeof ( mem->addr ) ),
698 0 ==, "simple_client (%x): connect error: %d\n" );
699 ok ( set_blocking ( mem->s, TRUE ) == 0,
700 "simple_client (%x): failed to set blocking mode\n", id );
701 trace ( "simple_client (%x) connected\n", id );
703 /* send data to server */
704 n_sent = do_synchronous_send ( mem->s, mem->send_buf, n_expected, par->buflen );
705 ok ( n_sent == n_expected,
706 "simple_client (%x): sent less data than expected: %d of %d\n", id, n_sent, n_expected );
708 /* shutdown send direction */
709 wsa_ok ( shutdown ( mem->s, SD_SEND ), 0 ==, "simple_client (%x): shutdown failed: %d\n" );
711 /* Receive data echoed back & check it */
712 n_recvd = do_synchronous_recv ( mem->s, mem->recv_buf, n_expected, par->buflen );
713 ok ( n_recvd == n_expected,
714 "simple_client (%x): received less data than expected: %d of %d\n", id, n_recvd, n_expected );
716 /* check data */
717 pos = test_buffer ( mem->recv_buf, gen->chunk_size, gen->n_chunks );
718 ok ( pos == -1, "simple_client (%x): test pattern error: %d\n", id, pos);
720 /* cleanup */
721 read_zero_bytes ( mem->s );
722 trace ( "simple_client (%x) exiting\n", id );
723 client_stop ();
727 * oob_client: A very basic client sending out-of-band data.
729 static VOID WINAPI oob_client ( client_params *par )
731 test_params *gen = par->general;
732 client_memory *mem;
733 int n_sent, n_expected = gen->n_chunks * gen->chunk_size, id;
735 id = GetCurrentThreadId();
736 trace ( "oob_client (%x): starting\n", id );
737 /* wait here because we want to call set_so_opentype before creating a socket */
738 WaitForSingleObject ( server_ready, INFINITE );
739 trace ( "oob_client (%x): server ready\n", id );
741 check_so_opentype ();
742 set_so_opentype ( FALSE ); /* non-overlapped */
743 client_start ( par );
744 mem = TlsGetValue ( tls );
746 /* Connect */
747 wsa_ok ( connect ( mem->s, (struct sockaddr*) &mem->addr, sizeof ( mem->addr ) ),
748 0 ==, "oob_client (%x): connect error: %d\n" );
749 ok ( set_blocking ( mem->s, TRUE ) == 0,
750 "oob_client (%x): failed to set blocking mode\n", id );
751 trace ( "oob_client (%x) connected\n", id );
753 /* send data to server */
754 n_sent = do_synchronous_send ( mem->s, mem->send_buf, n_expected, par->buflen );
755 ok ( n_sent == n_expected,
756 "oob_client (%x): sent less data than expected: %d of %d\n", id, n_sent, n_expected );
758 /* send out-of-band data to server */
759 n_sent = do_oob_send ( mem->s, mem->send_buf, n_expected, par->buflen );
760 ok ( n_sent == n_expected,
761 "oob_client (%x): sent less data than expected: %d of %d\n", id, n_sent, n_expected );
763 /* shutdown send direction */
764 wsa_ok ( shutdown ( mem->s, SD_SEND ), 0 ==, "simple_client (%x): shutdown failed: %d\n" );
766 /* cleanup */
767 read_zero_bytes ( mem->s );
768 trace ( "oob_client (%x) exiting\n", id );
769 client_stop ();
773 * simple_mixed_client: mixing send and recvfrom
775 static VOID WINAPI simple_mixed_client ( client_params *par )
777 test_params *gen = par->general;
778 client_memory *mem;
779 int pos, n_sent, n_recvd, n_expected = gen->n_chunks * gen->chunk_size, id;
780 int fromLen = sizeof(mem->addr);
781 struct sockaddr test;
783 id = GetCurrentThreadId();
784 trace ( "simple_client (%x): starting\n", id );
785 /* wait here because we want to call set_so_opentype before creating a socket */
786 WaitForSingleObject ( server_ready, INFINITE );
787 trace ( "simple_client (%x): server ready\n", id );
789 check_so_opentype ();
790 set_so_opentype ( FALSE ); /* non-overlapped */
791 client_start ( par );
792 mem = TlsGetValue ( tls );
794 /* Connect */
795 wsa_ok ( connect ( mem->s, (struct sockaddr*) &mem->addr, sizeof ( mem->addr ) ),
796 0 ==, "simple_client (%x): connect error: %d\n" );
797 ok ( set_blocking ( mem->s, TRUE ) == 0,
798 "simple_client (%x): failed to set blocking mode\n", id );
799 trace ( "simple_client (%x) connected\n", id );
801 /* send data to server */
802 n_sent = do_synchronous_send ( mem->s, mem->send_buf, n_expected, par->buflen );
803 ok ( n_sent == n_expected,
804 "simple_client (%x): sent less data than expected: %d of %d\n", id, n_sent, n_expected );
806 /* shutdown send direction */
807 wsa_ok ( shutdown ( mem->s, SD_SEND ), 0 ==, "simple_client (%x): shutdown failed: %d\n" );
809 /* this shouldn't change, since lpFrom, is not updated on
810 connection oriented sockets - exposed by bug 11640
812 ((struct sockaddr_in*)&test)->sin_addr.s_addr = inet_addr("0.0.0.0");
814 /* Receive data echoed back & check it */
815 n_recvd = do_synchronous_recvfrom ( mem->s,
816 mem->recv_buf,
817 n_expected,
819 (struct sockaddr *)&test,
820 &fromLen,
821 par->buflen );
822 ok ( n_recvd == n_expected,
823 "simple_client (%x): received less data than expected: %d of %d\n", id, n_recvd, n_expected );
825 /* check that lpFrom was not updated */
826 ok(0 ==
827 strcmp(
828 inet_ntoa(((struct sockaddr_in*)&test)->sin_addr),
829 "0.0.0.0"), "lpFrom shouldn't be updated on connection oriented sockets\n");
831 /* check data */
832 pos = test_buffer ( mem->recv_buf, gen->chunk_size, gen->n_chunks );
833 ok ( pos == -1, "simple_client (%x): test pattern error: %d\n", id, pos);
835 /* cleanup */
836 read_zero_bytes ( mem->s );
837 trace ( "simple_client (%x) exiting\n", id );
838 client_stop ();
842 * event_client: An event-driven client
844 static void WINAPI event_client ( client_params *par )
846 test_params *gen = par->general;
847 client_memory *mem;
848 int id = GetCurrentThreadId(), n_expected = gen->n_chunks * gen->chunk_size,
849 tmp, err, n;
850 HANDLE event;
851 WSANETWORKEVENTS wsa_events;
852 char *send_last, *recv_last, *send_p, *recv_p;
853 LONG mask = FD_READ | FD_WRITE | FD_CLOSE;
855 trace ( "event_client (%x): starting\n", id );
856 client_start ( par );
857 trace ( "event_client (%x): server ready\n", id );
859 mem = TlsGetValue ( tls );
861 /* Prepare event notification for connect, makes socket nonblocking */
862 event = WSACreateEvent ();
863 WSAEventSelect ( mem->s, event, FD_CONNECT );
864 tmp = connect ( mem->s, (struct sockaddr*) &mem->addr, sizeof ( mem->addr ) );
865 if ( tmp != 0 ) {
866 err = WSAGetLastError ();
867 ok ( err == WSAEWOULDBLOCK, "event_client (%x): connect error: %d\n", id, err );
868 tmp = WaitForSingleObject ( event, INFINITE );
869 ok ( tmp == WAIT_OBJECT_0, "event_client (%x): wait for connect event failed: %d\n", id, tmp );
870 err = WSAEnumNetworkEvents ( mem->s, event, &wsa_events );
871 ok ( err == 0, "event_client (%x): WSAEnumNetworkEvents error: %d\n", id, err );
872 err = wsa_events.iErrorCode[ FD_CONNECT_BIT ];
873 ok ( err == 0, "event_client (%x): connect error: %d\n", id, err );
874 if ( err ) goto out;
877 trace ( "event_client (%x) connected\n", id );
879 WSAEventSelect ( mem->s, event, mask );
881 recv_p = mem->recv_buf;
882 recv_last = mem->recv_buf + n_expected;
883 send_p = mem->send_buf;
884 send_last = mem->send_buf + n_expected;
886 while ( TRUE )
888 err = WaitForSingleObject ( event, INFINITE );
889 ok ( err == WAIT_OBJECT_0, "event_client (%x): wait failed\n", id );
891 err = WSAEnumNetworkEvents ( mem->s, event, &wsa_events );
892 ok( err == 0, "event_client (%x): WSAEnumNetworkEvents error: %d\n", id, err );
894 if ( wsa_events.lNetworkEvents & FD_WRITE )
896 err = wsa_events.iErrorCode[ FD_WRITE_BIT ];
897 ok ( err == 0, "event_client (%x): FD_WRITE error code: %d\n", id, err );
899 if ( err== 0 )
902 n = send ( mem->s, send_p, min ( send_last - send_p, par->buflen ), 0 );
903 if ( n < 0 )
905 err = WSAGetLastError ();
906 ok ( err == WSAEWOULDBLOCK, "event_client (%x): send error: %d\n", id, err );
908 else
909 send_p += n;
911 while ( n >= 0 && send_p < send_last );
913 if ( send_p == send_last )
915 trace ( "event_client (%x): all data sent - shutdown\n", id );
916 shutdown ( mem->s, SD_SEND );
917 mask &= ~FD_WRITE;
918 WSAEventSelect ( mem->s, event, mask );
921 if ( wsa_events.lNetworkEvents & FD_READ )
923 err = wsa_events.iErrorCode[ FD_READ_BIT ];
924 ok ( err == 0, "event_client (%x): FD_READ error code: %d\n", id, err );
925 if ( err != 0 ) break;
927 /* First read must succeed */
928 n = recv ( mem->s, recv_p, min ( recv_last - recv_p, par->buflen ), 0 );
929 wsa_ok ( n, 0 <=, "event_client (%x): recv error: %d\n" );
931 while ( n >= 0 ) {
932 recv_p += n;
933 if ( recv_p == recv_last )
935 mask &= ~FD_READ;
936 trace ( "event_client (%x): all data received\n", id );
937 WSAEventSelect ( mem->s, event, mask );
938 break;
940 n = recv ( mem->s, recv_p, min ( recv_last - recv_p, par->buflen ), 0 );
941 if ( n < 0 && ( err = WSAGetLastError()) != WSAEWOULDBLOCK )
942 ok ( 0, "event_client (%x): read error: %d\n", id, err );
946 if ( wsa_events.lNetworkEvents & FD_CLOSE )
948 trace ( "event_client (%x): close event\n", id );
949 err = wsa_events.iErrorCode[ FD_CLOSE_BIT ];
950 ok ( err == 0, "event_client (%x): FD_CLOSE error code: %d\n", id, err );
951 break;
955 n = send_p - mem->send_buf;
956 ok ( send_p == send_last,
957 "simple_client (%x): sent less data than expected: %d of %d\n", id, n, n_expected );
958 n = recv_p - mem->recv_buf;
959 ok ( recv_p == recv_last,
960 "simple_client (%x): received less data than expected: %d of %d\n", id, n, n_expected );
961 n = test_buffer ( mem->recv_buf, gen->chunk_size, gen->n_chunks );
962 ok ( n == -1, "event_client (%x): test pattern error: %d\n", id, n);
964 out:
965 WSACloseEvent ( event );
966 trace ( "event_client (%x) exiting\n", id );
967 client_stop ();
970 /* Tests for WSAStartup */
971 static void test_WithoutWSAStartup(void)
973 LPVOID ptr;
975 WSASetLastError(0xdeadbeef);
976 ptr = gethostbyname("localhost");
978 ok(ptr == NULL, "gethostbyname() succeeded unexpectedly: %d\n", WSAGetLastError());
979 ok(WSAGetLastError() == WSANOTINITIALISED, "gethostbyname() failed with unexpected error: %d\n",
980 WSAGetLastError());
983 static void test_WithWSAStartup(void)
985 WSADATA data;
986 WORD version = MAKEWORD( 2, 2 );
987 INT res;
988 LPVOID ptr;
990 res = WSAStartup( version, &data );
991 ok(res == 0, "WSAStartup() failed unexpectedly: %d\n", res);
993 ptr = gethostbyname("localhost");
994 ok(ptr != NULL, "gethostbyname() failed unexpectedly: %d\n", WSAGetLastError());
996 WSACleanup();
999 /**************** Main program utility functions ***************/
1001 static void Init (void)
1003 WORD ver = MAKEWORD (2, 2);
1004 WSADATA data;
1005 HMODULE hws2_32 = GetModuleHandle("ws2_32.dll");
1007 pfreeaddrinfo = (void *)GetProcAddress(hws2_32, "freeaddrinfo");
1008 pgetaddrinfo = (void *)GetProcAddress(hws2_32, "getaddrinfo");
1009 pFreeAddrInfoW = (void *)GetProcAddress(hws2_32, "FreeAddrInfoW");
1010 pGetAddrInfoW = (void *)GetProcAddress(hws2_32, "GetAddrInfoW");
1011 pInetNtop = (void *)GetProcAddress(hws2_32, "inet_ntop");
1013 ok ( WSAStartup ( ver, &data ) == 0, "WSAStartup failed\n" );
1014 tls = TlsAlloc();
1017 static void Exit (void)
1019 INT ret, err;
1020 TlsFree ( tls );
1021 ret = WSACleanup();
1022 err = WSAGetLastError();
1023 ok ( ret == 0, "WSACleanup failed ret = %d GetLastError is %d\n", ret, err);
1024 ret = WSACleanup();
1025 err = WSAGetLastError();
1026 ok ( (ret == SOCKET_ERROR && err == WSANOTINITIALISED) ||
1027 broken(ret == 0), /* WinME */
1028 "WSACleanup returned %d GetLastError is %d\n", ret, err);
1031 static void StartServer (LPTHREAD_START_ROUTINE routine,
1032 test_params *general, server_params *par)
1034 par->general = general;
1035 thread[0] = CreateThread ( NULL, 0, routine, par, 0, &thread_id[0] );
1036 ok ( thread[0] != NULL, "Failed to create server thread\n" );
1039 static void StartClients (LPTHREAD_START_ROUTINE routine,
1040 test_params *general, client_params *par)
1042 int i;
1043 par->general = general;
1044 for ( i = 1; i <= min ( general->n_clients, MAX_CLIENTS ); i++ )
1046 client_id = i - 1;
1047 thread[i] = CreateThread ( NULL, 0, routine, par, 0, &thread_id[i] );
1048 ok ( thread[i] != NULL, "Failed to create client thread\n" );
1049 /* Make sure the client is up and running */
1050 WaitForSingleObject ( client_ready[client_id], INFINITE );
1054 static void do_test( test_setup *test )
1056 DWORD i, n = min (test->general.n_clients, MAX_CLIENTS);
1057 DWORD wait;
1059 server_ready = CreateEventA ( NULL, TRUE, FALSE, NULL );
1060 for (i = 0; i <= n; i++)
1061 client_ready[i] = CreateEventA ( NULL, TRUE, FALSE, NULL );
1063 StartServer ( test->srv, &test->general, &test->srv_params );
1064 StartClients ( test->clt, &test->general, &test->clt_params );
1065 WaitForSingleObject ( server_ready, INFINITE );
1067 wait = WaitForMultipleObjects ( 1 + n, thread, TRUE, 1000 * TEST_TIMEOUT );
1068 ok ( wait <= WAIT_OBJECT_0 + n ,
1069 "some threads have not completed: %x\n", wait );
1071 if ( ! ( wait <= WAIT_OBJECT_0 + n ) )
1073 for (i = 0; i <= n; i++)
1075 if ( WaitForSingleObject ( thread[i], 0 ) != WAIT_OBJECT_0 )
1077 trace ("terminating thread %08x\n", thread_id[i]);
1078 TerminateThread ( thread [i], 0 );
1082 CloseHandle ( server_ready );
1083 for (i = 0; i <= n; i++)
1084 CloseHandle ( client_ready[i] );
1087 /********* some tests for getsockopt(setsockopt(X)) == X ***********/
1088 /* optname = SO_LINGER */
1089 static const LINGER linger_testvals[] = {
1090 {0,0},
1091 {0,73},
1092 {1,0},
1093 {5,189}
1096 /* optname = SO_RCVTIMEO, SOSNDTIMEO */
1097 #define SOCKTIMEOUT1 63000 /* 63 seconds. Do not test fractional part because of a
1098 bug in the linux kernel (fixed in 2.6.8) */
1099 #define SOCKTIMEOUT2 997000 /* 997 seconds */
1101 static void test_set_getsockopt(void)
1103 SOCKET s;
1104 int i, err, lasterr;
1105 int timeout;
1106 LINGER lingval;
1107 int size;
1109 s = socket(AF_INET, SOCK_STREAM, 0);
1110 ok(s!=INVALID_SOCKET, "socket() failed error: %d\n", WSAGetLastError());
1111 if( s == INVALID_SOCKET) return;
1112 /* SO_RCVTIMEO */
1113 timeout = SOCKTIMEOUT1;
1114 size = sizeof(timeout);
1115 err = setsockopt(s, SOL_SOCKET, SO_RCVTIMEO, (char *) &timeout, size);
1116 if( !err)
1117 err = getsockopt(s, SOL_SOCKET, SO_RCVTIMEO, (char *) &timeout, &size);
1118 ok( !err, "get/setsockopt(SO_RCVTIMEO) failed error: %d\n", WSAGetLastError());
1119 ok( timeout == SOCKTIMEOUT1, "getsockopt(SO_RCVTIMEO) returned wrong value %d\n", timeout);
1121 timeout = 0;
1122 size = sizeof(timeout);
1123 err = setsockopt(s, SOL_SOCKET, SO_RCVTIMEO, (char *) &timeout, size);
1124 if( !err)
1125 err = getsockopt(s, SOL_SOCKET, SO_RCVTIMEO, (char *) &timeout, &size);
1126 ok( !err, "get/setsockopt(SO_RCVTIMEO) failed error: %d\n", WSAGetLastError());
1127 ok( timeout == 0, "getsockopt(SO_RCVTIMEO) returned wrong value %d\n", timeout);
1129 /* SO_SNDTIMEO */
1130 timeout = SOCKTIMEOUT2; /* 997 seconds. See remark above */
1131 size = sizeof(timeout);
1132 err = setsockopt(s, SOL_SOCKET, SO_SNDTIMEO, (char *) &timeout, size);
1133 if( !err)
1134 err = getsockopt(s, SOL_SOCKET, SO_SNDTIMEO, (char *) &timeout, &size);
1135 ok( !err, "get/setsockopt(SO_SNDTIMEO) failed error: %d\n", WSAGetLastError());
1136 ok( timeout == SOCKTIMEOUT2, "getsockopt(SO_SNDTIMEO) returned wrong value %d\n", timeout);
1137 /* SO_LINGER */
1138 for( i = 0; i < sizeof(linger_testvals)/sizeof(LINGER);i++) {
1139 size = sizeof(lingval);
1140 lingval = linger_testvals[i];
1141 err = setsockopt(s, SOL_SOCKET, SO_LINGER, (char *) &lingval, size);
1142 if( !err)
1143 err = getsockopt(s, SOL_SOCKET, SO_LINGER, (char *) &lingval, &size);
1144 ok( !err, "get/setsockopt(SO_LINGER) failed error: %d\n", WSAGetLastError());
1145 ok( !lingval.l_onoff == !linger_testvals[i].l_onoff &&
1146 (lingval.l_linger == linger_testvals[i].l_linger ||
1147 (!lingval.l_linger && !linger_testvals[i].l_onoff))
1148 , "getsockopt(SO_LINGER #%d) returned wrong value %d,%d not %d,%d\n", i,
1149 lingval.l_onoff, lingval.l_linger,
1150 linger_testvals[i].l_onoff, linger_testvals[i].l_linger);
1153 size = sizeof(lingval);
1154 err = setsockopt(s, SOL_SOCKET, SO_LINGER, NULL, size);
1155 ok(err == SOCKET_ERROR && WSAGetLastError() == WSAEFAULT,
1156 "got %d with %d (expected SOCKET_ERROR with WSAEFAULT)\n", err, WSAGetLastError());
1157 err = setsockopt(s, SOL_SOCKET, SO_LINGER, NULL, 0);
1158 ok(err == SOCKET_ERROR && WSAGetLastError() == WSAEFAULT,
1159 "got %d with %d (expected SOCKET_ERROR with WSAEFAULT)\n", err, WSAGetLastError());
1161 size = sizeof(BOOL);
1162 err = setsockopt(s, SOL_SOCKET, SO_DONTLINGER, NULL, size);
1163 ok(err == SOCKET_ERROR && WSAGetLastError() == WSAEFAULT,
1164 "got %d with %d (expected SOCKET_ERROR with WSAEFAULT)\n", err, WSAGetLastError());
1165 err = setsockopt(s, SOL_SOCKET, SO_DONTLINGER, NULL, 0);
1166 ok(err == SOCKET_ERROR && WSAGetLastError() == WSAEFAULT,
1167 "got %d with %d (expected SOCKET_ERROR with WSAEFAULT)\n", err, WSAGetLastError());
1169 /* Test for erroneously passing a value instead of a pointer as optval */
1170 size = sizeof(char);
1171 err = setsockopt(s, SOL_SOCKET, SO_DONTROUTE, (char *)1, size);
1172 ok(err == SOCKET_ERROR, "setsockopt with optval being a value passed "
1173 "instead of failing.\n");
1174 lasterr = WSAGetLastError();
1175 ok(lasterr == WSAEFAULT, "setsockopt with optval being a value "
1176 "returned 0x%08x, not WSAEFAULT(0x%08x)\n",
1177 lasterr, WSAEFAULT);
1179 /* SO_RCVTIMEO with invalid values for level */
1180 size = sizeof(timeout);
1181 timeout = SOCKTIMEOUT1;
1182 SetLastError(0xdeadbeef);
1183 err = setsockopt(s, 0xffffffff, SO_RCVTIMEO, (char *) &timeout, size);
1184 ok( (err == SOCKET_ERROR) && (WSAGetLastError() == WSAEINVAL),
1185 "got %d with %d (expected SOCKET_ERROR with WSAEINVAL\n",
1186 err, WSAGetLastError());
1188 timeout = SOCKTIMEOUT1;
1189 SetLastError(0xdeadbeef);
1190 err = setsockopt(s, 0x00008000, SO_RCVTIMEO, (char *) &timeout, size);
1191 ok( (err == SOCKET_ERROR) && (WSAGetLastError() == WSAEINVAL),
1192 "got %d with %d (expected SOCKET_ERROR with WSAEINVAL\n",
1193 err, WSAGetLastError());
1195 closesocket(s);
1198 static void test_so_reuseaddr(void)
1200 struct sockaddr_in saddr;
1201 SOCKET s1,s2;
1202 unsigned int rc,reuse;
1203 int size;
1205 saddr.sin_family = AF_INET;
1206 saddr.sin_port = htons(9375);
1207 saddr.sin_addr.s_addr = inet_addr("127.0.0.1");
1209 s1=socket(AF_INET, SOCK_STREAM, 0);
1210 ok(s1!=INVALID_SOCKET, "socket() failed error: %d\n", WSAGetLastError());
1211 rc = bind(s1, (struct sockaddr*)&saddr, sizeof(saddr));
1212 ok(rc!=SOCKET_ERROR, "bind(s1) failed error: %d\n", WSAGetLastError());
1214 s2=socket(AF_INET, SOCK_STREAM, 0);
1215 ok(s2!=INVALID_SOCKET, "socket() failed error: %d\n", WSAGetLastError());
1217 reuse=0x1234;
1218 size=sizeof(reuse);
1219 rc=getsockopt(s2, SOL_SOCKET, SO_REUSEADDR, (char*)&reuse, &size );
1220 ok(rc==0 && reuse==0,"wrong result in getsockopt(SO_REUSEADDR): rc=%d reuse=%d\n",rc,reuse);
1222 rc = bind(s2, (struct sockaddr*)&saddr, sizeof(saddr));
1223 ok(rc==SOCKET_ERROR, "bind() succeeded\n");
1225 reuse = 1;
1226 rc = setsockopt(s2, SOL_SOCKET, SO_REUSEADDR, (char*)&reuse, sizeof(reuse));
1227 ok(rc==0, "setsockopt() failed error: %d\n", WSAGetLastError());
1229 /* On Win2k3 and above, all SO_REUSEADDR seems to do is to allow binding to
1230 * a port immediately after closing another socket on that port, so
1231 * basically following the BSD socket semantics here. */
1232 closesocket(s1);
1233 rc = bind(s2, (struct sockaddr*)&saddr, sizeof(saddr));
1234 ok(rc==0, "bind() failed error: %d\n", WSAGetLastError());
1236 closesocket(s2);
1239 #define IP_PKTINFO_LEN (sizeof(WSACMSGHDR) + WSA_CMSG_ALIGN(sizeof(struct in_pktinfo)))
1241 static void test_ip_pktinfo(void)
1243 ULONG addresses[2] = {inet_addr("127.0.0.1"), htonl(INADDR_ANY)};
1244 char recvbuf[10], pktbuf[512], msg[] = "HELLO";
1245 struct sockaddr_in s1addr, s2addr, s3addr;
1246 GUID WSARecvMsg_GUID = WSAID_WSARECVMSG;
1247 LPFN_WSARECVMSG pWSARecvMsg = NULL;
1248 unsigned int rc, foundhdr, yes = 1;
1249 DWORD dwBytes, dwSize, dwFlags;
1250 socklen_t addrlen;
1251 WSACMSGHDR *cmsg;
1252 WSAOVERLAPPED ov;
1253 WSABUF iovec[1];
1254 SOCKET s1, s2;
1255 WSAMSG hdr;
1256 int i, err;
1258 memset(&ov, 0, sizeof(ov));
1259 ov.hEvent = CreateEvent(NULL, FALSE, FALSE, NULL);
1260 if (ov.hEvent == INVALID_HANDLE_VALUE)
1262 skip("Could not create event object, some tests will be skipped. errno = %d\n", GetLastError());
1263 return;
1266 memset(&hdr, 0x00, sizeof(hdr));
1267 s1addr.sin_family = AF_INET;
1268 s1addr.sin_port = htons(0);
1269 /* Note: s1addr.sin_addr is set below */
1270 iovec[0].buf = recvbuf;
1271 iovec[0].len = sizeof(recvbuf);
1272 hdr.name = (struct sockaddr*)&s3addr;
1273 hdr.namelen = sizeof(s3addr);
1274 hdr.lpBuffers = &iovec[0];
1275 hdr.dwBufferCount = 1;
1276 hdr.Control.buf = pktbuf;
1277 /* Note: hdr.Control.len is set below */
1278 hdr.dwFlags = 0;
1280 for (i=0;i<sizeof(addresses)/sizeof(UINT32);i++)
1282 s1addr.sin_addr.s_addr = addresses[i];
1284 /* Build "server" side socket */
1285 s1=socket(AF_INET, SOCK_DGRAM, 0);
1286 if (s1 == INVALID_SOCKET)
1288 skip("socket() failed error, some tests skipped: %d\n", WSAGetLastError());
1289 goto cleanup;
1292 /* Obtain the WSARecvMsg function */
1293 WSAIoctl(s1, SIO_GET_EXTENSION_FUNCTION_POINTER, &WSARecvMsg_GUID, sizeof(WSARecvMsg_GUID),
1294 &pWSARecvMsg, sizeof(pWSARecvMsg), &dwBytes, NULL, NULL);
1295 if (!pWSARecvMsg)
1297 win_skip("WSARecvMsg is unsupported, some tests will be skipped.\n");
1298 closesocket(s1);
1299 goto cleanup;
1302 /* Setup the server side socket */
1303 rc=bind(s1, (struct sockaddr*)&s1addr, sizeof(s1addr));
1304 ok(rc != SOCKET_ERROR, "bind() failed error: %d\n", WSAGetLastError());
1305 rc=setsockopt(s1, IPPROTO_IP, IP_PKTINFO, (const char*)&yes, sizeof(yes));
1306 ok(rc == 0, "failed to set IPPROTO_IP flag IP_PKTINFO!\n");
1308 /* Build "client" side socket */
1309 addrlen = sizeof(s2addr);
1310 if (getsockname(s1, (struct sockaddr *) &s2addr, &addrlen) != 0)
1312 skip("Failed to call getsockname, some tests skipped: %d\n", WSAGetLastError());
1313 closesocket(s1);
1314 goto cleanup;
1316 s2addr.sin_addr.s_addr = addresses[0]; /* Always target the local adapter address */
1317 s2=socket(AF_INET, SOCK_DGRAM, 0);
1318 if (s2 == INVALID_SOCKET)
1320 skip("socket() failed error, some tests skipped: %d\n", WSAGetLastError());
1321 closesocket(s1);
1322 goto cleanup;
1325 /* Test an empty message header */
1326 rc=pWSARecvMsg(s1, NULL, NULL, NULL, NULL);
1327 err=WSAGetLastError();
1328 ok(rc == SOCKET_ERROR && err == WSAEFAULT, "WSARecvMsg() failed error: %d (ret = %d)\n", err, rc);
1331 * Send a packet from the client to the server and test for specifying
1332 * a short control header.
1334 rc=sendto(s2, msg, sizeof(msg), 0, (struct sockaddr*)&s2addr, sizeof(s2addr));
1335 ok(rc == sizeof(msg), "sendto() failed error: %d\n", WSAGetLastError());
1336 hdr.Control.len = 1;
1337 rc=pWSARecvMsg(s1, &hdr, &dwSize, NULL, NULL);
1338 err=WSAGetLastError();
1339 ok(rc == SOCKET_ERROR && err == WSAEMSGSIZE && (hdr.dwFlags & MSG_CTRUNC),
1340 "WSARecvMsg() failed error: %d (ret: %d, flags: %d)\n", err, rc, hdr.dwFlags);
1341 hdr.dwFlags = 0; /* Reset flags */
1343 /* Perform another short control header test, this time with an overlapped receive */
1344 hdr.Control.len = 1;
1345 rc=pWSARecvMsg(s1, &hdr, NULL, &ov, NULL);
1346 err=WSAGetLastError();
1347 ok(rc != 0 && err == WSA_IO_PENDING, "WSARecvMsg() failed error: %d\n", err);
1348 rc=sendto(s2, msg, sizeof(msg), 0, (struct sockaddr*)&s2addr, sizeof(s2addr));
1349 ok(rc == sizeof(msg), "sendto() failed error: %d\n", WSAGetLastError());
1350 if (WaitForSingleObject(ov.hEvent, 100) != WAIT_OBJECT_0)
1352 skip("Server side did not receive packet, some tests skipped.\n");
1353 closesocket(s2);
1354 closesocket(s1);
1355 continue;
1357 dwFlags = 0;
1358 WSAGetOverlappedResult(s1, &ov, NULL, FALSE, &dwFlags);
1359 ok(dwFlags == 0,
1360 "WSAGetOverlappedResult() returned unexpected flags %d!\n", dwFlags);
1361 ok(hdr.dwFlags == MSG_CTRUNC,
1362 "WSARecvMsg() overlapped operation set unexpected flags %d.\n", hdr.dwFlags);
1363 hdr.dwFlags = 0; /* Reset flags */
1366 * Setup an overlapped receive, send a packet, then wait for the packet to be retrieved
1367 * on the server end and check that the returned packet matches what was sent.
1369 hdr.Control.len = sizeof(pktbuf);
1370 rc=pWSARecvMsg(s1, &hdr, NULL, &ov, NULL);
1371 err=WSAGetLastError();
1372 ok(rc != 0 && err == WSA_IO_PENDING, "WSARecvMsg() failed error: %d\n", err);
1373 ok(hdr.Control.len == sizeof(pktbuf),
1374 "WSARecvMsg() control length mismatch (%d != sizeof pktbuf).\n", hdr.Control.len);
1375 rc=sendto(s2, msg, sizeof(msg), 0, (struct sockaddr*)&s2addr, sizeof(s2addr));
1376 ok(rc == sizeof(msg), "sendto() failed error: %d\n", WSAGetLastError());
1377 if (WaitForSingleObject(ov.hEvent, 100) != WAIT_OBJECT_0)
1379 skip("Server side did not receive packet, some tests skipped.\n");
1380 closesocket(s2);
1381 closesocket(s1);
1382 continue;
1384 dwSize = 0;
1385 WSAGetOverlappedResult(s1, &ov, &dwSize, FALSE, NULL);
1386 ok(dwSize == sizeof(msg),
1387 "WSARecvMsg() buffer length does not match transmitted data!\n");
1388 ok(strncmp(iovec[0].buf, msg, sizeof(msg)) == 0,
1389 "WSARecvMsg() buffer does not match transmitted data!\n");
1390 ok(hdr.Control.len == IP_PKTINFO_LEN,
1391 "WSARecvMsg() control length mismatch (%d).\n", hdr.Control.len);
1393 /* Test for the expected IP_PKTINFO return information. */
1394 foundhdr = FALSE;
1395 for (cmsg = WSA_CMSG_FIRSTHDR(&hdr); cmsg != NULL; cmsg = WSA_CMSG_NXTHDR(&hdr, cmsg))
1397 if (cmsg->cmsg_level == IPPROTO_IP && cmsg->cmsg_type == IP_PKTINFO)
1399 struct in_pktinfo *pi = (struct in_pktinfo *)WSA_CMSG_DATA(cmsg);
1401 ok(pi->ipi_addr.s_addr == s2addr.sin_addr.s_addr, "destination ip mismatch!\n");
1402 foundhdr = TRUE;
1405 ok(foundhdr, "IP_PKTINFO header information was not returned!\n");
1407 closesocket(s2);
1408 closesocket(s1);
1411 cleanup:
1412 CloseHandle(ov.hEvent);
1415 /************* Array containing the tests to run **********/
1417 #define STD_STREAM_SOCKET \
1418 SOCK_STREAM, \
1419 0, \
1420 SERVERIP, \
1421 SERVERPORT
1423 static test_setup tests [] =
1425 /* Test 0: synchronous client and server */
1428 STD_STREAM_SOCKET,
1429 2048,
1433 simple_server,
1435 NULL,
1439 simple_client,
1441 NULL,
1446 /* Test 1: event-driven client, synchronous server */
1449 STD_STREAM_SOCKET,
1450 2048,
1454 simple_server,
1456 NULL,
1460 event_client,
1462 NULL,
1463 WSA_FLAG_OVERLAPPED,
1467 /* Test 2: synchronous client, non-blocking server via select() */
1470 STD_STREAM_SOCKET,
1471 2048,
1475 select_server,
1477 NULL,
1481 simple_client,
1483 NULL,
1488 /* Test 3: OOB client, OOB server */
1491 STD_STREAM_SOCKET,
1492 128,
1496 oob_server,
1498 NULL,
1502 oob_client,
1504 NULL,
1509 /* Test 4: synchronous mixed client and server */
1512 STD_STREAM_SOCKET,
1513 2048,
1517 simple_server,
1519 NULL,
1523 simple_mixed_client,
1525 NULL,
1532 static void test_UDP(void)
1534 /* This function tests UDP sendto() and recvfrom(). UDP is unreliable, so it is
1535 possible that this test fails due to dropped packets. */
1537 /* peer 0 receives data from all other peers */
1538 struct sock_info peer[NUM_UDP_PEERS];
1539 char buf[16];
1540 int ss, i, n_recv, n_sent;
1542 memset (buf,0,sizeof(buf));
1543 for ( i = NUM_UDP_PEERS - 1; i >= 0; i-- ) {
1544 ok ( ( peer[i].s = socket ( AF_INET, SOCK_DGRAM, 0 ) ) != INVALID_SOCKET, "UDP: socket failed\n" );
1546 peer[i].addr.sin_family = AF_INET;
1547 peer[i].addr.sin_addr.s_addr = inet_addr ( SERVERIP );
1549 if ( i == 0 ) {
1550 peer[i].addr.sin_port = htons ( SERVERPORT );
1551 } else {
1552 peer[i].addr.sin_port = htons ( 0 );
1555 do_bind ( peer[i].s, (struct sockaddr *) &peer[i].addr, sizeof( peer[i].addr ) );
1557 /* test getsockname() to get peer's port */
1558 ss = sizeof ( peer[i].addr );
1559 ok ( getsockname ( peer[i].s, (struct sockaddr *) &peer[i].addr, &ss ) != SOCKET_ERROR, "UDP: could not getsockname()\n" );
1560 ok ( peer[i].addr.sin_port != htons ( 0 ), "UDP: bind() did not associate port\n" );
1563 /* test getsockname() */
1564 ok ( peer[0].addr.sin_port == htons ( SERVERPORT ), "UDP: getsockname returned incorrect peer port\n" );
1566 for ( i = 1; i < NUM_UDP_PEERS; i++ ) {
1567 /* send client's ip */
1568 memcpy( buf, &peer[i].addr.sin_port, sizeof(peer[i].addr.sin_port) );
1569 n_sent = sendto ( peer[i].s, buf, sizeof(buf), 0, (struct sockaddr*) &peer[0].addr, sizeof(peer[0].addr) );
1570 ok ( n_sent == sizeof(buf), "UDP: sendto() sent wrong amount of data or socket error: %d\n", n_sent );
1573 for ( i = 1; i < NUM_UDP_PEERS; i++ ) {
1574 n_recv = recvfrom ( peer[0].s, buf, sizeof(buf), 0,(struct sockaddr *) &peer[0].peer, &ss );
1575 ok ( n_recv == sizeof(buf), "UDP: recvfrom() received wrong amount of data or socket error: %d\n", n_recv );
1576 ok ( memcmp ( &peer[0].peer.sin_port, buf, sizeof(peer[0].addr.sin_port) ) == 0, "UDP: port numbers do not match\n" );
1580 static DWORD WINAPI do_getservbyname( void *param )
1582 struct {
1583 const char *name;
1584 const char *proto;
1585 int port;
1586 } serv[2] = { {"domain", "udp", 53}, {"telnet", "tcp", 23} };
1588 HANDLE *starttest = param;
1589 int i, j;
1590 struct servent *pserv[2];
1592 ok ( WaitForSingleObject ( *starttest, TEST_TIMEOUT * 1000 ) != WAIT_TIMEOUT, "test_getservbyname: timeout waiting for start signal\n");
1594 /* ensure that necessary buffer resizes are completed */
1595 for ( j = 0; j < 2; j++) {
1596 pserv[j] = getservbyname ( serv[j].name, serv[j].proto );
1599 for ( i = 0; i < NUM_QUERIES / 2; i++ ) {
1600 for ( j = 0; j < 2; j++ ) {
1601 pserv[j] = getservbyname ( serv[j].name, serv[j].proto );
1602 ok ( pserv[j] != NULL, "getservbyname could not retrieve information for %s: %d\n", serv[j].name, WSAGetLastError() );
1603 ok ( pserv[j]->s_port == htons(serv[j].port), "getservbyname returned the wrong port for %s: %d\n", serv[j].name, ntohs(pserv[j]->s_port) );
1604 ok ( !strcmp ( pserv[j]->s_proto, serv[j].proto ), "getservbyname returned the wrong protocol for %s: %s\n", serv[j].name, pserv[j]->s_proto );
1605 ok ( !strcmp ( pserv[j]->s_name, serv[j].name ), "getservbyname returned the wrong name for %s: %s\n", serv[j].name, pserv[j]->s_name );
1608 ok ( pserv[0] == pserv[1], "getservbyname: winsock resized servent buffer when not necessary\n" );
1611 return 0;
1614 static void test_getservbyname(void)
1616 int i;
1617 HANDLE starttest, thread[NUM_THREADS];
1618 DWORD thread_id[NUM_THREADS];
1620 starttest = CreateEvent ( NULL, 1, 0, "test_getservbyname_starttest" );
1622 /* create threads */
1623 for ( i = 0; i < NUM_THREADS; i++ ) {
1624 thread[i] = CreateThread ( NULL, 0, do_getservbyname, &starttest, 0, &thread_id[i] );
1627 /* signal threads to start */
1628 SetEvent ( starttest );
1630 for ( i = 0; i < NUM_THREADS; i++) {
1631 WaitForSingleObject ( thread[i], TEST_TIMEOUT * 1000 );
1635 static void test_WSASocket(void)
1637 SOCKET sock = INVALID_SOCKET;
1638 WSAPROTOCOL_INFOA *pi;
1639 int providers[] = {6, 0};
1640 int ret, err;
1641 UINT pi_size;
1643 /* Set pi_size explicitly to a value below 2*sizeof(WSAPROTOCOL_INFOA)
1644 * to avoid a crash on win98.
1646 pi_size = 0;
1647 ret = WSAEnumProtocolsA(providers, NULL, &pi_size);
1648 ok(ret == SOCKET_ERROR, "WSAEnumProtocolsA({6,0}, NULL, 0) returned %d\n",
1649 ret);
1650 err = WSAGetLastError();
1651 ok(err == WSAENOBUFS, "WSAEnumProtocolsA error is %d, not WSAENOBUFS(%d)\n",
1652 err, WSAENOBUFS);
1654 pi = HeapAlloc(GetProcessHeap(), 0, pi_size);
1655 ok(pi != NULL, "Failed to allocate memory\n");
1656 if (pi == NULL) {
1657 skip("Can't continue without memory.\n");
1658 return;
1661 ret = WSAEnumProtocolsA(providers, pi, &pi_size);
1662 ok(ret != SOCKET_ERROR, "WSAEnumProtocolsA failed, last error is %d\n",
1663 WSAGetLastError());
1665 if (ret == 0) {
1666 skip("No protocols enumerated.\n");
1667 HeapFree(GetProcessHeap(), 0, pi);
1668 return;
1671 sock = WSASocketA(FROM_PROTOCOL_INFO, FROM_PROTOCOL_INFO,
1672 FROM_PROTOCOL_INFO, &pi[0], 0, 0);
1673 ok(sock != INVALID_SOCKET, "Failed to create socket: %d\n",
1674 WSAGetLastError());
1676 closesocket(sock);
1677 HeapFree(GetProcessHeap(), 0, pi);
1680 static void test_WSAAddressToStringA(void)
1682 SOCKET v6 = INVALID_SOCKET;
1683 INT ret;
1684 DWORD len;
1685 int GLE;
1686 SOCKADDR_IN sockaddr;
1687 CHAR address[22]; /* 12 digits + 3 dots + ':' + 5 digits + '\0' */
1689 CHAR expect1[] = "0.0.0.0";
1690 CHAR expect2[] = "255.255.255.255";
1691 CHAR expect3[] = "0.0.0.0:65535";
1692 CHAR expect4[] = "255.255.255.255:65535";
1694 SOCKADDR_IN6 sockaddr6;
1695 CHAR address6[54]; /* 32 digits + 7':' + '[' + '%" + 5 digits + ']:' + 5 digits + '\0' */
1697 CHAR addr6_1[] = {0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x01};
1698 CHAR addr6_2[] = {0x20,0xab,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x01};
1699 CHAR addr6_3[] = {0x20,0xab,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x20,0x01};
1701 CHAR expect6_1[] = "::1";
1702 CHAR expect6_2[] = "20ab::1";
1703 CHAR expect6_3[] = "[20ab::2001]:33274";
1704 CHAR expect6_3_nt[] = "20ab::2001@33274";
1705 CHAR expect6_3_w2k[] = "20ab::2001";
1706 CHAR expect6_3_2[] = "[20ab::2001%4660]:33274";
1707 CHAR expect6_3_2_nt[] = "4660/20ab::2001@33274";
1708 CHAR expect6_3_2_w2k[] = "20ab::2001%4660";
1709 CHAR expect6_3_3[] = "20ab::2001%4660";
1710 CHAR expect6_3_3_nt[] = "4660/20ab::2001";
1712 len = 0;
1714 sockaddr.sin_family = AF_INET;
1715 sockaddr.sin_port = 0;
1716 sockaddr.sin_addr.s_addr = 0;
1718 ret = WSAAddressToStringA( (SOCKADDR*)&sockaddr, sizeof(sockaddr), NULL, address, &len );
1719 GLE = WSAGetLastError();
1720 ok( (ret == SOCKET_ERROR && GLE == WSAEFAULT) || (ret == 0),
1721 "WSAAddressToStringA() failed unexpectedly: WSAGetLastError()=%d, ret=%d\n",
1722 GLE, ret );
1724 len = sizeof(address);
1726 sockaddr.sin_family = AF_INET;
1727 sockaddr.sin_port = 0;
1728 sockaddr.sin_addr.s_addr = 0;
1730 ret = WSAAddressToStringA( (SOCKADDR*)&sockaddr, sizeof(sockaddr), NULL, address, &len );
1731 ok( !ret, "WSAAddressToStringA() failed unexpectedly: %d\n", WSAGetLastError() );
1733 ok( !strcmp( address, expect1 ), "Expected: %s, got: %s\n", expect1, address );
1734 ok( len == sizeof( expect1 ), "Got size %d\n", len);
1736 len = sizeof(address);
1738 sockaddr.sin_family = AF_INET;
1739 sockaddr.sin_port = 0;
1740 sockaddr.sin_addr.s_addr = 0xffffffff;
1742 ret = WSAAddressToStringA( (SOCKADDR*)&sockaddr, sizeof(sockaddr), NULL, address, &len );
1743 ok( !ret, "WSAAddressToStringA() failed unexpectedly: %d\n", WSAGetLastError() );
1745 ok( !strcmp( address, expect2 ), "Expected: %s, got: %s\n", expect2, address );
1747 len = sizeof(address);
1749 sockaddr.sin_family = AF_INET;
1750 sockaddr.sin_port = 0xffff;
1751 sockaddr.sin_addr.s_addr = 0;
1753 ret = WSAAddressToStringA( (SOCKADDR*)&sockaddr, sizeof(sockaddr), NULL, address, &len );
1754 ok( !ret, "WSAAddressToStringA() failed unexpectedly: %d\n", WSAGetLastError() );
1756 ok( !strcmp( address, expect3 ), "Expected: %s, got: %s\n", expect3, address );
1758 len = sizeof(address);
1760 sockaddr.sin_family = AF_INET;
1761 sockaddr.sin_port = 0xffff;
1762 sockaddr.sin_addr.s_addr = 0xffffffff;
1764 ret = WSAAddressToStringA( (SOCKADDR*)&sockaddr, sizeof(sockaddr), NULL, address, &len );
1765 ok( !ret, "WSAAddressToStringA() failed unexpectedly: %d\n", WSAGetLastError() );
1767 ok( !strcmp( address, expect4 ), "Expected: %s, got: %s\n", expect4, address );
1768 ok( len == sizeof( expect4 ), "Got size %d\n", len);
1770 /*check to see it IPv6 is available */
1771 v6 = socket(AF_INET6, SOCK_STREAM, IPPROTO_TCP);
1772 if (v6 == INVALID_SOCKET) {
1773 skip("Could not create IPv6 socket (LastError: %d; %d expected if IPv6 not available).\n",
1774 WSAGetLastError(), WSAEAFNOSUPPORT);
1775 goto end;
1777 /* Test a short IPv6 address */
1778 len = sizeof(address6);
1780 sockaddr6.sin6_family = AF_INET6;
1781 sockaddr6.sin6_port = 0x0000;
1782 sockaddr6.sin6_scope_id = 0;
1783 memcpy (sockaddr6.sin6_addr.s6_addr, addr6_1, sizeof(addr6_1));
1785 ret = WSAAddressToStringA( (SOCKADDR*)&sockaddr6, sizeof(sockaddr6), NULL, address6, &len );
1786 ok( !ret, "WSAAddressToStringA() failed unexpectedly: %d\n", WSAGetLastError() );
1787 ok( !strcmp( address6, expect6_1 ), "Expected: %s, got: %s\n", expect6_1, address6 );
1788 ok( len == sizeof(expect6_1), "Got size %d\n", len);
1790 /* Test a longer IPv6 address */
1791 len = sizeof(address6);
1793 sockaddr6.sin6_family = AF_INET6;
1794 sockaddr6.sin6_port = 0x0000;
1795 sockaddr6.sin6_scope_id = 0;
1796 memcpy (sockaddr6.sin6_addr.s6_addr, addr6_2, sizeof(addr6_2));
1798 ret = WSAAddressToStringA( (SOCKADDR*)&sockaddr6, sizeof(sockaddr6), NULL, address6, &len );
1799 ok( !ret, "WSAAddressToStringA() failed unexpectedly: %d\n", WSAGetLastError() );
1800 ok( !strcmp( address6, expect6_2 ), "Expected: %s, got: %s\n", expect6_2, address6 );
1801 ok( len == sizeof(expect6_2), "Got size %d\n", len);
1803 /* Test IPv6 address and port number */
1804 len = sizeof(address6);
1806 sockaddr6.sin6_family = AF_INET6;
1807 sockaddr6.sin6_port = 0xfa81;
1808 sockaddr6.sin6_scope_id = 0;
1809 memcpy (sockaddr6.sin6_addr.s6_addr, addr6_3, sizeof(addr6_3));
1811 ret = WSAAddressToStringA( (SOCKADDR*)&sockaddr6, sizeof(sockaddr6), NULL, address6, &len );
1812 ok( !ret, "WSAAddressToStringA() failed unexpectedly: %d\n", WSAGetLastError() );
1813 ok( !strcmp( address6, expect6_3 ) ||
1814 broken( !strcmp( address6, expect6_3_nt ) ) || /* NT4 */
1815 broken( !strcmp( address6, expect6_3_w2k ) ), /* Win2000 */
1816 "Expected: %s, got: %s\n", expect6_3, address6 );
1817 ok( len == sizeof(expect6_3) ||
1818 broken( len == sizeof(expect6_3_nt) ) || /* NT4 */
1819 broken( len == sizeof(expect6_3_w2k) ), /* Win2000 */
1820 "Got size %d\n", len);
1822 /* Test IPv6 address, port number and scope_id */
1823 len = sizeof(address6);
1825 sockaddr6.sin6_family = AF_INET6;
1826 sockaddr6.sin6_port = 0xfa81;
1827 sockaddr6.sin6_scope_id = 0x1234;
1828 memcpy (sockaddr6.sin6_addr.s6_addr, addr6_3, sizeof(addr6_3));
1830 ret = WSAAddressToStringA( (SOCKADDR*)&sockaddr6, sizeof(sockaddr6), NULL, address6, &len );
1831 ok( !ret, "WSAAddressToStringA() failed unexpectedly: %d\n", WSAGetLastError() );
1832 ok( !strcmp( address6, expect6_3_2 ) ||
1833 broken( !strcmp( address6, expect6_3_2_nt ) ) || /* NT4 */
1834 broken( !strcmp( address6, expect6_3_2_w2k ) ), /* Win2000 */
1835 "Expected: %s, got: %s\n", expect6_3_2, address6 );
1836 ok( len == sizeof(expect6_3_2) ||
1837 broken( len == sizeof(expect6_3_2_nt) ) || /* NT4 */
1838 broken( len == sizeof(expect6_3_2_w2k) ), /* Win2000 */
1839 "Got size %d\n", len);
1841 /* Test IPv6 address and scope_id */
1842 len = sizeof(address6);
1844 sockaddr6.sin6_family = AF_INET6;
1845 sockaddr6.sin6_port = 0x0000;
1846 sockaddr6.sin6_scope_id = 0x1234;
1847 memcpy (sockaddr6.sin6_addr.s6_addr, addr6_3, sizeof(addr6_3));
1849 ret = WSAAddressToStringA( (SOCKADDR*)&sockaddr6, sizeof(sockaddr6), NULL, address6, &len );
1850 ok( !ret, "WSAAddressToStringA() failed unexpectedly: %d\n", WSAGetLastError() );
1851 ok( !strcmp( address6, expect6_3_3 ) ||
1852 broken( !strcmp( address6, expect6_3_3_nt ) ), /* NT4 */
1853 "Expected: %s, got: %s\n", expect6_3_3, address6 );
1854 ok( len == sizeof(expect6_3_3) ||
1855 broken( len == sizeof(expect6_3_3_nt) ), /* NT4 */
1856 "Got size %d\n", len);
1858 end:
1859 if (v6 != INVALID_SOCKET)
1860 closesocket(v6);
1863 static void test_WSAAddressToStringW(void)
1865 SOCKET v6 = INVALID_SOCKET;
1866 INT ret;
1867 DWORD len;
1868 int GLE;
1869 SOCKADDR_IN sockaddr;
1870 WCHAR address[22]; /* 12 digits + 3 dots + ':' + 5 digits + '\0' */
1872 WCHAR expect1[] = { '0','.','0','.','0','.','0', 0 };
1873 WCHAR expect2[] = { '2','5','5','.','2','5','5','.','2','5','5','.','2','5','5', 0 };
1874 WCHAR expect3[] = { '0','.','0','.','0','.','0', ':', '6', '5', '5', '3', '5', 0 };
1875 WCHAR expect4[] = { '2','5','5','.','2','5','5','.','2','5','5','.','2','5','5', ':',
1876 '6', '5', '5', '3', '5', 0 };
1878 SOCKADDR_IN6 sockaddr6;
1879 WCHAR address6[54]; /* 32 digits + 7':' + '[' + '%" + 5 digits + ']:' + 5 digits + '\0' */
1881 CHAR addr6_1[] = {0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x01};
1882 CHAR addr6_2[] = {0x20,0xab,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x01};
1883 CHAR addr6_3[] = {0x20,0xab,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x20,0x01};
1885 WCHAR expect6_1[] = {':',':','1',0};
1886 WCHAR expect6_2[] = {'2','0','a','b',':',':','1',0};
1887 WCHAR expect6_3[] = {'[','2','0','a','b',':',':','2','0','0','1',']',':','3','3','2','7','4',0};
1888 WCHAR expect6_3_nt[] = {'2','0','a','b',':',':','2','0','0','1','@','3','3','2','7','4',0};
1889 WCHAR expect6_3_w2k[] = {'2','0','a','b',':',':','2','0','0','1',0};
1890 WCHAR expect6_3_2[] = {'[','2','0','a','b',':',':','2','0','0','1','%','4','6','6','0',']',':','3','3','2','7','4',0};
1891 WCHAR expect6_3_2_nt[] = {'4','6','6','0','/','2','0','a','b',':',':','2','0','0','1','@','3','3','2','7','4',0};
1892 WCHAR expect6_3_2_w2k[] = {'2','0','a','b',':',':','2','0','0','1','%','4','6','6','0',0};
1893 WCHAR expect6_3_3[] = {'2','0','a','b',':',':','2','0','0','1','%','6','5','5','3','4',0};
1894 WCHAR expect6_3_3_nt[] = {'6','5','5','3','4','/','2','0','a','b',':',':','2','0','0','1',0};
1896 len = 0;
1898 sockaddr.sin_family = AF_INET;
1899 sockaddr.sin_port = 0;
1900 sockaddr.sin_addr.s_addr = 0;
1902 ret = WSAAddressToStringW( (SOCKADDR*)&sockaddr, sizeof(sockaddr), NULL, address, &len );
1903 GLE = WSAGetLastError();
1904 ok( (ret == SOCKET_ERROR && GLE == WSAEFAULT) || (ret == 0),
1905 "WSAAddressToStringW() failed unexpectedly: WSAGetLastError()=%d, ret=%d\n",
1906 GLE, ret );
1908 len = sizeof(address);
1910 sockaddr.sin_family = AF_INET;
1911 sockaddr.sin_port = 0;
1912 sockaddr.sin_addr.s_addr = 0;
1914 ret = WSAAddressToStringW( (SOCKADDR*)&sockaddr, sizeof(sockaddr), NULL, address, &len );
1915 ok( !ret, "WSAAddressToStringW() failed unexpectedly: %d\n", WSAGetLastError() );
1917 ok( !lstrcmpW( address, expect1 ), "Expected different address string\n" );
1918 ok( len == sizeof( expect1 )/sizeof( WCHAR ), "Got size %d\n", len);
1920 len = sizeof(address);
1922 sockaddr.sin_family = AF_INET;
1923 sockaddr.sin_port = 0;
1924 sockaddr.sin_addr.s_addr = 0xffffffff;
1926 ret = WSAAddressToStringW( (SOCKADDR*)&sockaddr, sizeof(sockaddr), NULL, address, &len );
1927 ok( !ret, "WSAAddressToStringW() failed unexpectedly: %d\n", WSAGetLastError() );
1929 ok( !lstrcmpW( address, expect2 ), "Expected different address string\n" );
1931 len = sizeof(address);
1933 sockaddr.sin_family = AF_INET;
1934 sockaddr.sin_port = 0xffff;
1935 sockaddr.sin_addr.s_addr = 0;
1937 ret = WSAAddressToStringW( (SOCKADDR*)&sockaddr, sizeof(sockaddr), NULL, address, &len );
1938 ok( !ret, "WSAAddressToStringW() failed unexpectedly: %d\n", WSAGetLastError() );
1940 ok( !lstrcmpW( address, expect3 ), "Expected different address string\n" );
1942 len = sizeof(address);
1944 sockaddr.sin_family = AF_INET;
1945 sockaddr.sin_port = 0xffff;
1946 sockaddr.sin_addr.s_addr = 0xffffffff;
1948 ret = WSAAddressToStringW( (SOCKADDR*)&sockaddr, sizeof(sockaddr), NULL, address, &len );
1949 ok( !ret, "WSAAddressToStringW() failed unexpectedly: %d\n", WSAGetLastError() );
1951 ok( !lstrcmpW( address, expect4 ), "Expected different address string\n" );
1952 ok( len == sizeof( expect4 )/sizeof( WCHAR ), "Got %d\n", len);
1954 /*check to see it IPv6 is available */
1955 v6 = socket(AF_INET6, SOCK_STREAM, IPPROTO_TCP);
1956 if (v6 == INVALID_SOCKET) {
1957 skip("Could not create IPv6 socket (LastError: %d; %d expected if IPv6 not available).\n",
1958 WSAGetLastError(), WSAEAFNOSUPPORT);
1959 goto end;
1962 /* Test a short IPv6 address */
1963 len = sizeof(address6)/sizeof(WCHAR);
1965 sockaddr6.sin6_family = AF_INET6;
1966 sockaddr6.sin6_port = 0x0000;
1967 sockaddr6.sin6_scope_id = 0;
1968 memcpy (sockaddr6.sin6_addr.s6_addr, addr6_1, sizeof(addr6_1));
1970 ret = WSAAddressToStringW( (SOCKADDR*)&sockaddr6, sizeof(sockaddr6), NULL, address6, &len );
1971 ok( !ret, "WSAAddressToStringW() failed unexpectedly: %d\n", WSAGetLastError() );
1972 ok( !lstrcmpW( address6, expect6_1 ), "Wrong string returned\n" );
1973 ok( len == sizeof(expect6_1)/sizeof(WCHAR), "Got %d\n", len);
1975 /* Test a longer IPv6 address */
1976 len = sizeof(address6)/sizeof(WCHAR);
1978 sockaddr6.sin6_family = AF_INET6;
1979 sockaddr6.sin6_port = 0x0000;
1980 sockaddr6.sin6_scope_id = 0;
1981 memcpy (sockaddr6.sin6_addr.s6_addr, addr6_2, sizeof(addr6_2));
1983 ret = WSAAddressToStringW( (SOCKADDR*)&sockaddr6, sizeof(sockaddr6), NULL, address6, &len );
1984 ok( !ret, "WSAAddressToStringW() failed unexpectedly: %d\n", WSAGetLastError() );
1986 ok( !lstrcmpW( address6, expect6_2 ), "Wrong string returned\n" );
1987 ok( len == sizeof(expect6_2)/sizeof(WCHAR), "Got %d\n", len);
1989 /* Test IPv6 address and port number */
1990 len = sizeof(address6)/sizeof(WCHAR);
1992 sockaddr6.sin6_family = AF_INET6;
1993 sockaddr6.sin6_port = 0xfa81;
1994 sockaddr6.sin6_scope_id = 0;
1995 memcpy (sockaddr6.sin6_addr.s6_addr, addr6_3, sizeof(addr6_3));
1997 ret = WSAAddressToStringW( (SOCKADDR*)&sockaddr6, sizeof(sockaddr6), NULL, address6, &len );
1998 ok( !ret, "WSAAddressToStringW() failed unexpectedly: %d\n", WSAGetLastError() );
1999 ok( !lstrcmpW( address6, expect6_3 ) ||
2000 broken( !lstrcmpW( address6, expect6_3_nt ) ) || /* NT4 */
2001 broken( !lstrcmpW( address6, expect6_3_w2k ) ), /* Win2000 */
2002 "Expected: %s, got: %s\n", wine_dbgstr_w(expect6_3),
2003 wine_dbgstr_w(address6) );
2004 ok( len == sizeof(expect6_3)/sizeof(WCHAR) ||
2005 broken(len == sizeof(expect6_3_nt)/sizeof(WCHAR) ) || /* NT4 */
2006 broken(len == sizeof(expect6_3_w2k)/sizeof(WCHAR) ), /* Win2000 */
2007 "Got %d\n", len);
2009 /* Test IPv6 address, port number and scope_id */
2010 len = sizeof(address6)/sizeof(WCHAR);
2012 sockaddr6.sin6_family = AF_INET6;
2013 sockaddr6.sin6_port = 0xfa81;
2014 sockaddr6.sin6_scope_id = 0x1234;
2015 memcpy (sockaddr6.sin6_addr.s6_addr, addr6_3, sizeof(addr6_3));
2017 ret = WSAAddressToStringW( (SOCKADDR*)&sockaddr6, sizeof(sockaddr6), NULL, address6, &len );
2018 ok( !ret, "WSAAddressToStringW() failed unexpectedly: %d\n", WSAGetLastError() );
2019 ok( !lstrcmpW( address6, expect6_3_2 ) ||
2020 broken( !lstrcmpW( address6, expect6_3_2_nt ) ) || /* NT4 */
2021 broken( !lstrcmpW( address6, expect6_3_2_w2k ) ), /* Win2000 */
2022 "Expected: %s, got: %s\n", wine_dbgstr_w(expect6_3_2),
2023 wine_dbgstr_w(address6) );
2024 ok( len == sizeof(expect6_3_2)/sizeof(WCHAR) ||
2025 broken( len == sizeof(expect6_3_2_nt)/sizeof(WCHAR) ) || /* NT4 */
2026 broken( len == sizeof(expect6_3_2_w2k)/sizeof(WCHAR) ), /* Win2000 */
2027 "Got %d\n", len);
2029 /* Test IPv6 address and scope_id */
2030 len = sizeof(address6)/sizeof(WCHAR);
2032 sockaddr6.sin6_family = AF_INET6;
2033 sockaddr6.sin6_port = 0x0000;
2034 sockaddr6.sin6_scope_id = 0xfffe;
2035 memcpy (sockaddr6.sin6_addr.s6_addr, addr6_3, sizeof(addr6_3));
2037 ret = WSAAddressToStringW( (SOCKADDR*)&sockaddr6, sizeof(sockaddr6), NULL, address6, &len );
2038 ok( !ret, "WSAAddressToStringW() failed unexpectedly: %d\n", WSAGetLastError() );
2039 ok( !lstrcmpW( address6, expect6_3_3 ) ||
2040 broken( !lstrcmpW( address6, expect6_3_3_nt ) ), /* NT4 */
2041 "Expected: %s, got: %s\n", wine_dbgstr_w(expect6_3_3),
2042 wine_dbgstr_w(address6) );
2043 ok( len == sizeof(expect6_3_3)/sizeof(WCHAR) ||
2044 broken( len == sizeof(expect6_3_3_nt)/sizeof(WCHAR) ), /* NT4 */
2045 "Got %d\n", len);
2047 end:
2048 if (v6 != INVALID_SOCKET)
2049 closesocket(v6);
2052 static void test_WSAStringToAddressA(void)
2054 INT ret, len;
2055 SOCKADDR_IN sockaddr;
2056 SOCKADDR_IN6 sockaddr6;
2057 int GLE;
2059 CHAR address1[] = "0.0.0.0";
2060 CHAR address2[] = "127.127.127.127";
2061 CHAR address3[] = "255.255.255.255";
2062 CHAR address4[] = "127.127.127.127:65535";
2063 CHAR address5[] = "255.255.255.255:65535";
2064 CHAR address6[] = "::1";
2065 CHAR address7[] = "[::1]";
2066 CHAR address8[] = "[::1]:65535";
2068 len = 0;
2069 sockaddr.sin_family = AF_INET;
2071 ret = WSAStringToAddressA( address1, AF_INET, NULL, (SOCKADDR*)&sockaddr, &len );
2072 ok( ret == SOCKET_ERROR, "WSAStringToAddressA() succeeded unexpectedly: %d\n",
2073 WSAGetLastError() );
2075 len = sizeof(sockaddr);
2076 sockaddr.sin_port = 0;
2077 sockaddr.sin_addr.s_addr = 0;
2079 ret = WSAStringToAddressA( address1, AF_INET, NULL, (SOCKADDR*)&sockaddr, &len );
2080 ok( !ret && sockaddr.sin_addr.s_addr == 0,
2081 "WSAStringToAddressA() failed unexpectedly: %d\n", WSAGetLastError() );
2083 len = sizeof(sockaddr);
2084 sockaddr.sin_port = 0;
2085 sockaddr.sin_addr.s_addr = 0;
2087 ret = WSAStringToAddressA( address2, AF_INET, NULL, (SOCKADDR*)&sockaddr, &len );
2088 ok( !ret && sockaddr.sin_addr.s_addr == 0x7f7f7f7f,
2089 "WSAStringToAddressA() failed unexpectedly: %d\n", WSAGetLastError() );
2091 len = sizeof(sockaddr);
2092 sockaddr.sin_port = 0;
2093 sockaddr.sin_addr.s_addr = 0;
2095 ret = WSAStringToAddressA( address3, AF_INET, NULL, (SOCKADDR*)&sockaddr, &len );
2096 GLE = WSAGetLastError();
2097 ok( (ret == 0 && sockaddr.sin_addr.s_addr == 0xffffffff) ||
2098 (ret == SOCKET_ERROR && (GLE == ERROR_INVALID_PARAMETER || GLE == WSAEINVAL)),
2099 "WSAStringToAddressA() failed unexpectedly: %d\n", GLE );
2101 len = sizeof(sockaddr);
2102 sockaddr.sin_port = 0;
2103 sockaddr.sin_addr.s_addr = 0;
2105 ret = WSAStringToAddressA( address4, AF_INET, NULL, (SOCKADDR*)&sockaddr, &len );
2106 ok( !ret && sockaddr.sin_addr.s_addr == 0x7f7f7f7f && sockaddr.sin_port == 0xffff,
2107 "WSAStringToAddressA() failed unexpectedly: %d\n", WSAGetLastError() );
2109 len = sizeof(sockaddr);
2110 sockaddr.sin_port = 0;
2111 sockaddr.sin_addr.s_addr = 0;
2113 ret = WSAStringToAddressA( address5, AF_INET, NULL, (SOCKADDR*)&sockaddr, &len );
2114 GLE = WSAGetLastError();
2115 ok( (ret == 0 && sockaddr.sin_addr.s_addr == 0xffffffff && sockaddr.sin_port == 0xffff) ||
2116 (ret == SOCKET_ERROR && (GLE == ERROR_INVALID_PARAMETER || GLE == WSAEINVAL)),
2117 "WSAStringToAddressA() failed unexpectedly: %d\n", GLE );
2119 len = sizeof(sockaddr6);
2120 memset(&sockaddr6, 0, len);
2121 sockaddr6.sin6_family = AF_INET6;
2123 ret = WSAStringToAddressA( address6, AF_INET6, NULL, (SOCKADDR*)&sockaddr6,
2124 &len );
2125 GLE = WSAGetLastError();
2126 ok( ret == 0 || (ret == SOCKET_ERROR && GLE == WSAEINVAL),
2127 "WSAStringToAddressA() failed for IPv6 address: %d\n", GLE);
2129 len = sizeof(sockaddr6);
2130 memset(&sockaddr6, 0, len);
2131 sockaddr6.sin6_family = AF_INET6;
2133 ret = WSAStringToAddressA( address7, AF_INET6, NULL, (SOCKADDR*)&sockaddr6,
2134 &len );
2135 GLE = WSAGetLastError();
2136 ok( ret == 0 || (ret == SOCKET_ERROR && GLE == WSAEINVAL),
2137 "WSAStringToAddressA() failed for IPv6 address: %d\n", GLE);
2139 len = sizeof(sockaddr6);
2140 memset(&sockaddr6, 0, len);
2141 sockaddr6.sin6_family = AF_INET6;
2143 ret = WSAStringToAddressA( address8, AF_INET6, NULL, (SOCKADDR*)&sockaddr6,
2144 &len );
2145 GLE = WSAGetLastError();
2146 ok( (ret == 0 && sockaddr6.sin6_port == 0xffff) ||
2147 (ret == SOCKET_ERROR && GLE == WSAEINVAL),
2148 "WSAStringToAddressA() failed for IPv6 address: %d\n", GLE);
2152 static void test_WSAStringToAddressW(void)
2154 INT ret, len;
2155 SOCKADDR_IN sockaddr, *sin;
2156 SOCKADDR_IN6 sockaddr6;
2157 SOCKADDR_STORAGE sockaddr_storage;
2158 int GLE;
2160 WCHAR address1[] = { '0','.','0','.','0','.','0', 0 };
2161 WCHAR address2[] = { '1','2','7','.','1','2','7','.','1','2','7','.','1','2','7', 0 };
2162 WCHAR address3[] = { '2','5','5','.','2','5','5','.','2','5','5','.','2','5','5', 0 };
2163 WCHAR address4[] = { '1','2','7','.','1','2','7','.','1','2','7','.','1','2','7',
2164 ':', '6', '5', '5', '3', '5', 0 };
2165 WCHAR address5[] = { '2','5','5','.','2','5','5','.','2','5','5','.','2','5','5', ':',
2166 '6', '5', '5', '3', '5', 0 };
2167 WCHAR address6[] = {':',':','1','\0'};
2168 WCHAR address7[] = {'[',':',':','1',']','\0'};
2169 WCHAR address8[] = {'[',':',':','1',']',':','6','5','5','3','5','\0'};
2171 len = 0;
2172 sockaddr.sin_family = AF_INET;
2174 ret = WSAStringToAddressW( address1, AF_INET, NULL, (SOCKADDR*)&sockaddr, &len );
2175 ok( ret == SOCKET_ERROR, "WSAStringToAddressW() failed unexpectedly: %d\n",
2176 WSAGetLastError() );
2178 len = sizeof(sockaddr);
2179 sockaddr.sin_port = 0;
2180 sockaddr.sin_addr.s_addr = 0;
2182 ret = WSAStringToAddressW( address1, AF_INET, NULL, (SOCKADDR*)&sockaddr, &len );
2183 ok( !ret && sockaddr.sin_addr.s_addr == 0,
2184 "WSAStringToAddressW() failed unexpectedly: %d\n", WSAGetLastError() );
2186 len = sizeof(sockaddr);
2187 sockaddr.sin_port = 0;
2188 sockaddr.sin_addr.s_addr = 0;
2190 ret = WSAStringToAddressW( address2, AF_INET, NULL, (SOCKADDR*)&sockaddr, &len );
2191 ok( !ret && sockaddr.sin_addr.s_addr == 0x7f7f7f7f,
2192 "WSAStringToAddressW() failed unexpectedly: %d\n", WSAGetLastError() );
2194 len = sizeof(sockaddr);
2195 sockaddr.sin_port = 0;
2196 sockaddr.sin_addr.s_addr = 0;
2198 ret = WSAStringToAddressW( address3, AF_INET, NULL, (SOCKADDR*)&sockaddr, &len );
2199 GLE = WSAGetLastError();
2200 ok( (ret == 0 && sockaddr.sin_addr.s_addr == 0xffffffff) ||
2201 (ret == SOCKET_ERROR && (GLE == ERROR_INVALID_PARAMETER || GLE == WSAEINVAL)),
2202 "WSAStringToAddressW() failed unexpectedly: %d\n", GLE );
2204 len = sizeof(sockaddr);
2205 sockaddr.sin_port = 0;
2206 sockaddr.sin_addr.s_addr = 0;
2208 ret = WSAStringToAddressW( address4, AF_INET, NULL, (SOCKADDR*)&sockaddr, &len );
2209 ok( !ret && sockaddr.sin_addr.s_addr == 0x7f7f7f7f && sockaddr.sin_port == 0xffff,
2210 "WSAStringToAddressW() failed unexpectedly: %d\n", WSAGetLastError() );
2212 len = sizeof(sockaddr);
2213 sockaddr.sin_port = 0;
2214 sockaddr.sin_addr.s_addr = 0;
2216 ret = WSAStringToAddressW( address5, AF_INET, NULL, (SOCKADDR*)&sockaddr, &len );
2217 ok( (ret == 0 && sockaddr.sin_addr.s_addr == 0xffffffff && sockaddr.sin_port == 0xffff) ||
2218 (ret == SOCKET_ERROR && (GLE == ERROR_INVALID_PARAMETER || GLE == WSAEINVAL)),
2219 "WSAStringToAddressW() failed unexpectedly: %d\n", GLE );
2221 /* Test with a larger buffer than necessary */
2222 len = sizeof(sockaddr_storage);
2223 sin = (SOCKADDR_IN *)&sockaddr_storage;
2224 sin->sin_port = 0;
2225 sin->sin_addr.s_addr = 0;
2227 ret = WSAStringToAddressW( address5, AF_INET, NULL, (SOCKADDR*)sin, &len );
2228 ok( (ret == 0 && sin->sin_addr.s_addr == 0xffffffff && sin->sin_port == 0xffff) ||
2229 (ret == SOCKET_ERROR && (GLE == ERROR_INVALID_PARAMETER || GLE == WSAEINVAL)),
2230 "WSAStringToAddressW() failed unexpectedly: %d\n", GLE );
2231 ok( len == sizeof(SOCKADDR_IN) ||
2232 broken(len == sizeof(SOCKADDR_STORAGE)) /* NT4/2k */,
2233 "unexpected length %d\n", len );
2235 len = sizeof(sockaddr6);
2236 memset(&sockaddr6, 0, len);
2237 sockaddr6.sin6_family = AF_INET6;
2239 ret = WSAStringToAddressW( address6, AF_INET6, NULL, (SOCKADDR*)&sockaddr6,
2240 &len );
2241 GLE = WSAGetLastError();
2242 ok( ret == 0 || (ret == SOCKET_ERROR && GLE == WSAEINVAL),
2243 "WSAStringToAddressW() failed for IPv6 address: %d\n", GLE);
2245 len = sizeof(sockaddr6);
2246 memset(&sockaddr6, 0, len);
2247 sockaddr6.sin6_family = AF_INET6;
2249 ret = WSAStringToAddressW( address7, AF_INET6, NULL, (SOCKADDR*)&sockaddr6,
2250 &len );
2251 GLE = WSAGetLastError();
2252 ok( ret == 0 || (ret == SOCKET_ERROR && GLE == WSAEINVAL),
2253 "WSAStringToAddressW() failed for IPv6 address: %d\n", GLE);
2255 len = sizeof(sockaddr6);
2256 memset(&sockaddr6, 0, len);
2257 sockaddr6.sin6_family = AF_INET6;
2259 ret = WSAStringToAddressW( address8, AF_INET6, NULL, (SOCKADDR*)&sockaddr6,
2260 &len );
2261 GLE = WSAGetLastError();
2262 ok( (ret == 0 && sockaddr6.sin6_port == 0xffff) ||
2263 (ret == SOCKET_ERROR && GLE == WSAEINVAL),
2264 "WSAStringToAddressW() failed for IPv6 address: %d\n", GLE);
2268 static DWORD WINAPI SelectReadThread(void *param)
2270 select_thread_params *par = param;
2271 fd_set readfds;
2272 int ret;
2273 struct sockaddr_in addr;
2274 struct timeval select_timeout;
2276 FD_ZERO(&readfds);
2277 FD_SET(par->s, &readfds);
2278 select_timeout.tv_sec=5;
2279 select_timeout.tv_usec=0;
2280 addr.sin_family = AF_INET;
2281 addr.sin_addr.s_addr = inet_addr(SERVERIP);
2282 addr.sin_port = htons(SERVERPORT);
2284 do_bind(par->s, (struct sockaddr *)&addr, sizeof(addr));
2285 wsa_ok(listen(par->s, SOMAXCONN ), 0 ==, "SelectReadThread (%x): listen failed: %d\n");
2287 SetEvent(server_ready);
2288 ret = select(par->s+1, &readfds, NULL, NULL, &select_timeout);
2289 par->ReadKilled = (ret == 1);
2291 return 0;
2294 static void test_errors(void)
2296 SOCKET sock;
2297 SOCKADDR_IN SockAddr;
2298 int ret, err;
2300 WSASetLastError(NO_ERROR);
2301 sock = socket(PF_INET, SOCK_STREAM, 0);
2302 ok( (sock != INVALID_SOCKET), "socket failed unexpectedly: %d\n", WSAGetLastError() );
2303 memset(&SockAddr, 0, sizeof(SockAddr));
2304 SockAddr.sin_family = AF_INET;
2305 SockAddr.sin_port = htons(6924);
2306 SockAddr.sin_addr.s_addr = inet_addr("127.0.0.1");
2308 ret = connect(sock, (PSOCKADDR)&SockAddr, sizeof(SockAddr));
2309 ok( (ret == SOCKET_ERROR), "expected SOCKET_ERROR, got: %d\n", ret );
2310 if (ret == SOCKET_ERROR)
2312 err = WSAGetLastError();
2313 ok( (err == WSAECONNREFUSED), "expected WSAECONNREFUSED, got: %d\n", err );
2317 TIMEVAL timeval;
2318 fd_set set = {1, {sock}};
2320 timeval.tv_sec = 0;
2321 timeval.tv_usec = 50000;
2323 ret = select(1, NULL, &set, NULL, &timeval);
2324 ok( (ret == 0), "expected 0 (timeout), got: %d\n", ret );
2327 ret = closesocket(sock);
2328 ok ( (ret == 0), "closesocket failed unexpectedly: %d\n", WSAGetLastError());
2331 static void test_select(void)
2333 SOCKET fdRead, fdWrite;
2334 fd_set readfds, writefds, exceptfds;
2335 unsigned int maxfd;
2336 int ret;
2337 char buffer;
2338 struct timeval select_timeout;
2339 select_thread_params thread_params;
2340 HANDLE thread_handle;
2341 DWORD id;
2343 fdRead = socket(AF_INET, SOCK_STREAM, 0);
2344 ok( (fdRead != INVALID_SOCKET), "socket failed unexpectedly: %d\n", WSAGetLastError() );
2345 fdWrite = socket(AF_INET, SOCK_STREAM, 0);
2346 ok( (fdWrite != INVALID_SOCKET), "socket failed unexpectedly: %d\n", WSAGetLastError() );
2348 FD_ZERO(&readfds);
2349 FD_ZERO(&writefds);
2350 FD_ZERO(&exceptfds);
2351 FD_SET(fdRead, &readfds);
2352 FD_SET(fdWrite, &writefds);
2353 FD_SET(fdRead, &exceptfds);
2354 FD_SET(fdWrite, &exceptfds);
2355 select_timeout.tv_sec=0;
2356 select_timeout.tv_usec=500;
2358 maxfd = fdRead;
2359 if (fdWrite > maxfd)
2360 maxfd = fdWrite;
2362 todo_wine {
2363 ret = select(maxfd+1, &readfds, &writefds, &exceptfds, &select_timeout);
2364 ok ( (ret == 0), "select should not return any socket handles\n");
2365 ok ( !FD_ISSET(fdRead, &readfds), "FD should not be set\n");
2367 ok ( !FD_ISSET(fdWrite, &writefds), "FD should not be set\n");
2369 ok ( !FD_ISSET(fdRead, &exceptfds), "FD should not be set\n");
2370 ok ( !FD_ISSET(fdWrite, &exceptfds), "FD should not be set\n");
2372 todo_wine {
2373 ok ((listen(fdWrite, SOMAXCONN) == SOCKET_ERROR), "listen did not fail\n");
2375 ret = closesocket(fdWrite);
2376 ok ( (ret == 0), "closesocket failed unexpectedly: %d\n", ret);
2378 thread_params.s = fdRead;
2379 thread_params.ReadKilled = FALSE;
2380 server_ready = CreateEventA(NULL, TRUE, FALSE, NULL);
2381 thread_handle = CreateThread (NULL, 0, SelectReadThread, &thread_params, 0, &id );
2382 ok ( (thread_handle != NULL), "CreateThread failed unexpectedly: %d\n", GetLastError());
2384 WaitForSingleObject (server_ready, INFINITE);
2385 Sleep(200);
2386 ret = closesocket(fdRead);
2387 ok ( (ret == 0), "closesocket failed unexpectedly: %d\n", ret);
2389 WaitForSingleObject (thread_handle, 1000);
2390 ok ( (thread_params.ReadKilled) ||
2391 broken(thread_params.ReadKilled == 0), /*Win98*/
2392 "closesocket did not wakeup select\n");
2393 ret = recv(fdRead, &buffer, 1, MSG_PEEK);
2394 ok( (ret == -1), "peek at closed socket expected -1 got %d\n", ret);
2396 /* Test selecting invalid handles */
2397 FD_ZERO(&readfds);
2398 FD_ZERO(&writefds);
2399 FD_ZERO(&exceptfds);
2401 SetLastError(0);
2402 ret = select(maxfd+1, 0, 0, 0, &select_timeout);
2403 ok ( (ret == SOCKET_ERROR), "expected SOCKET_ERROR, got %i\n", ret);
2404 ok ( WSAGetLastError() == WSAEINVAL, "expected WSAEINVAL, got %i\n", WSAGetLastError());
2406 SetLastError(0);
2407 ret = select(maxfd+1, &readfds, &writefds, &exceptfds, &select_timeout);
2408 ok ( (ret == SOCKET_ERROR), "expected SOCKET_ERROR, got %i\n", ret);
2409 ok ( WSAGetLastError() == WSAEINVAL, "expected WSAEINVAL, got %i\n", WSAGetLastError());
2411 FD_SET(INVALID_SOCKET, &readfds);
2412 SetLastError(0);
2413 ret = select(maxfd+1, &readfds, &writefds, &exceptfds, &select_timeout);
2414 ok ( (ret == SOCKET_ERROR), "expected SOCKET_ERROR, got %i\n", ret);
2415 ok ( WSAGetLastError() == WSAENOTSOCK, "expected WSAENOTSOCK, got %i\n", WSAGetLastError());
2416 ok ( !FD_ISSET(fdRead, &readfds), "FD should not be set\n");
2418 FD_ZERO(&readfds);
2419 FD_SET(INVALID_SOCKET, &writefds);
2420 SetLastError(0);
2421 ret = select(maxfd+1, &readfds, &writefds, &exceptfds, &select_timeout);
2422 ok ( (ret == SOCKET_ERROR), "expected SOCKET_ERROR, got %i\n", ret);
2423 ok ( WSAGetLastError() == WSAENOTSOCK, "expected WSAENOTSOCK, got %i\n", WSAGetLastError());
2424 ok ( !FD_ISSET(fdRead, &writefds), "FD should not be set\n");
2426 FD_ZERO(&writefds);
2427 FD_SET(INVALID_SOCKET, &exceptfds);
2428 SetLastError(0);
2429 ret = select(maxfd+1, &readfds, &writefds, &exceptfds, &select_timeout);
2430 ok ( (ret == SOCKET_ERROR), "expected SOCKET_ERROR, got %i\n", ret);
2431 ok ( WSAGetLastError() == WSAENOTSOCK, "expected WSAENOTSOCK, got %i\n", WSAGetLastError());
2432 ok ( !FD_ISSET(fdRead, &exceptfds), "FD should not be set\n");
2435 static DWORD WINAPI AcceptKillThread(void *param)
2437 select_thread_params *par = param;
2438 struct sockaddr_in address;
2439 int len = sizeof(address);
2440 SOCKET client_socket;
2442 SetEvent(server_ready);
2443 client_socket = accept(par->s, (struct sockaddr*) &address, &len);
2444 if (client_socket != INVALID_SOCKET)
2445 closesocket(client_socket);
2446 par->ReadKilled = (client_socket == INVALID_SOCKET);
2447 return 0;
2451 static int CALLBACK AlwaysDeferConditionFunc(LPWSABUF lpCallerId, LPWSABUF lpCallerData, LPQOS pQos,
2452 LPQOS lpGQOS, LPWSABUF lpCalleeId, LPWSABUF lpCalleeData,
2453 GROUP FAR * g, DWORD_PTR dwCallbackData)
2455 return CF_DEFER;
2458 static void test_accept(void)
2460 int ret;
2461 SOCKET server_socket = INVALID_SOCKET, accepted = INVALID_SOCKET, connector = INVALID_SOCKET;
2462 struct sockaddr_in address;
2463 int socklen;
2464 select_thread_params thread_params;
2465 HANDLE thread_handle = NULL;
2466 DWORD id;
2468 server_socket = socket(AF_INET, SOCK_STREAM, 0);
2469 if (server_socket == INVALID_SOCKET)
2471 trace("error creating server socket: %d\n", WSAGetLastError());
2472 goto done;
2475 memset(&address, 0, sizeof(address));
2476 address.sin_addr.s_addr = inet_addr("127.0.0.1");
2477 address.sin_family = AF_INET;
2478 ret = bind(server_socket, (struct sockaddr*) &address, sizeof(address));
2479 if (ret != 0)
2481 trace("error binding server socket: %d\n", WSAGetLastError());
2482 goto done;
2485 socklen = sizeof(address);
2486 ret = getsockname(server_socket, (struct sockaddr*)&address, &socklen);
2487 if (ret != 0) {
2488 skip("failed to lookup bind address, error %d\n", WSAGetLastError());
2489 goto done;
2492 ret = listen(server_socket, 5);
2493 if (ret != 0)
2495 trace("error making server socket listen: %d\n", WSAGetLastError());
2496 goto done;
2499 trace("Blocking accept next\n");
2501 connector = socket(AF_INET, SOCK_STREAM, 0);
2502 ok(connector != INVALID_SOCKET, "Failed to create connector socket, error %d\n", WSAGetLastError());
2504 ret = connect(connector, (struct sockaddr*)&address, sizeof(address));
2505 ok(ret == 0, "connecting to accepting socket failed, error %d\n", WSAGetLastError());
2507 accepted = WSAAccept(server_socket, NULL, NULL, AlwaysDeferConditionFunc, 0);
2508 ok(accepted == INVALID_SOCKET && WSAGetLastError() == WSATRY_AGAIN, "Failed to defer connection, %d\n", WSAGetLastError());
2510 accepted = accept(server_socket, NULL, 0);
2511 ok(accepted != INVALID_SOCKET, "Failed to accept deferred connection, error %d\n", WSAGetLastError());
2513 server_ready = CreateEventA(NULL, TRUE, FALSE, NULL);
2514 if (server_ready == INVALID_HANDLE_VALUE)
2516 trace("error creating event: %d\n", GetLastError());
2517 goto done;
2520 thread_params.s = server_socket;
2521 thread_params.ReadKilled = FALSE;
2522 thread_handle = CreateThread(NULL, 0, AcceptKillThread, &thread_params, 0, &id);
2523 if (thread_handle == NULL)
2525 trace("error creating thread: %d\n", GetLastError());
2526 goto done;
2529 WaitForSingleObject(server_ready, INFINITE);
2530 Sleep(200);
2531 ret = closesocket(server_socket);
2532 if (ret != 0)
2534 trace("closesocket failed: %d\n", WSAGetLastError());
2535 goto done;
2538 WaitForSingleObject(thread_handle, 1000);
2539 ok(thread_params.ReadKilled || broken(!thread_params.ReadKilled) /* Win98/ME, after accept */,
2540 "closesocket did not wakeup accept\n");
2542 done:
2543 if (accepted != INVALID_SOCKET)
2544 closesocket(accepted);
2545 if (connector != INVALID_SOCKET)
2546 closesocket(connector);
2547 if (thread_handle != NULL)
2548 CloseHandle(thread_handle);
2549 if (server_ready != INVALID_HANDLE_VALUE)
2550 CloseHandle(server_ready);
2551 if (server_socket != INVALID_SOCKET)
2552 closesocket(server_socket);
2555 static void test_extendedSocketOptions(void)
2557 WSADATA wsa;
2558 SOCKET sock;
2559 struct sockaddr_in sa;
2560 int sa_len = sizeof(struct sockaddr_in);
2561 int optval, optlen = sizeof(int), ret;
2562 BOOL bool_opt_val;
2563 LINGER linger_val;
2565 if(WSAStartup(MAKEWORD(2,0), &wsa)){
2566 trace("Winsock failed: %d. Aborting test\n", WSAGetLastError());
2567 return;
2570 memset(&sa, 0, sa_len);
2572 sa.sin_family = AF_INET;
2573 sa.sin_port = htons(0);
2574 sa.sin_addr.s_addr = htonl(INADDR_ANY);
2576 if((sock = socket(PF_INET, SOCK_DGRAM, IPPROTO_IP)) == INVALID_SOCKET) {
2577 trace("Creating the socket failed: %d\n", WSAGetLastError());
2578 WSACleanup();
2579 return;
2582 if(bind(sock, (struct sockaddr *) &sa, sa_len) < 0){
2583 trace("Failed to bind socket: %d\n", WSAGetLastError());
2584 closesocket(sock);
2585 WSACleanup();
2586 return;
2589 ret = getsockopt(sock, SOL_SOCKET, SO_MAX_MSG_SIZE, (char *)&optval, &optlen);
2591 ok(ret == 0, "getsockopt failed to query SO_MAX_MSG_SIZE, return value is 0x%08x\n", ret);
2592 ok((optval == 65507) || (optval == 65527),
2593 "SO_MAX_MSG_SIZE reported %d, expected 65507 or 65527\n", optval);
2595 /* IE 3 use 0xffffffff instead of SOL_SOCKET (0xffff) */
2596 SetLastError(0xdeadbeef);
2597 optval = 0xdeadbeef;
2598 optlen = sizeof(int);
2599 ret = getsockopt(sock, 0xffffffff, SO_MAX_MSG_SIZE, (char *)&optval, &optlen);
2600 ok( (ret == SOCKET_ERROR) && (WSAGetLastError() == WSAEINVAL),
2601 "got %d with %d and optval: 0x%x/%d (expected SOCKET_ERROR with WSAEINVAL)\n",
2602 ret, WSAGetLastError(), optval, optval);
2604 /* more invalid values for level */
2605 SetLastError(0xdeadbeef);
2606 optval = 0xdeadbeef;
2607 optlen = sizeof(int);
2608 ret = getsockopt(sock, 0x1234ffff, SO_MAX_MSG_SIZE, (char *)&optval, &optlen);
2609 ok( (ret == SOCKET_ERROR) && (WSAGetLastError() == WSAEINVAL),
2610 "got %d with %d and optval: 0x%x/%d (expected SOCKET_ERROR with WSAEINVAL)\n",
2611 ret, WSAGetLastError(), optval, optval);
2613 SetLastError(0xdeadbeef);
2614 optval = 0xdeadbeef;
2615 optlen = sizeof(int);
2616 ret = getsockopt(sock, 0x8000ffff, SO_MAX_MSG_SIZE, (char *)&optval, &optlen);
2617 ok( (ret == SOCKET_ERROR) && (WSAGetLastError() == WSAEINVAL),
2618 "got %d with %d and optval: 0x%x/%d (expected SOCKET_ERROR with WSAEINVAL)\n",
2619 ret, WSAGetLastError(), optval, optval);
2621 SetLastError(0xdeadbeef);
2622 optval = 0xdeadbeef;
2623 optlen = sizeof(int);
2624 ret = getsockopt(sock, 0x00008000, SO_MAX_MSG_SIZE, (char *)&optval, &optlen);
2625 ok( (ret == SOCKET_ERROR) && (WSAGetLastError() == WSAEINVAL),
2626 "got %d with %d and optval: 0x%x/%d (expected SOCKET_ERROR with WSAEINVAL)\n",
2627 ret, WSAGetLastError(), optval, optval);
2629 SetLastError(0xdeadbeef);
2630 optval = 0xdeadbeef;
2631 optlen = sizeof(int);
2632 ret = getsockopt(sock, 0x00000800, SO_MAX_MSG_SIZE, (char *)&optval, &optlen);
2633 ok( (ret == SOCKET_ERROR) && (WSAGetLastError() == WSAEINVAL),
2634 "got %d with %d and optval: 0x%x/%d (expected SOCKET_ERROR with WSAEINVAL)\n",
2635 ret, WSAGetLastError(), optval, optval);
2637 SetLastError(0xdeadbeef);
2638 optlen = sizeof(LINGER);
2639 ret = getsockopt(sock, SOL_SOCKET, SO_LINGER, (char *)&linger_val, &optlen);
2640 ok( (ret == SOCKET_ERROR) && (WSAGetLastError() == WSAENOPROTOOPT),
2641 "getsockopt should fail for UDP sockets setting last error to WSAENOPROTOOPT, got %d with %d\n",
2642 ret, WSAGetLastError());
2643 closesocket(sock);
2645 if((sock = socket(PF_INET, SOCK_STREAM, IPPROTO_IP)) == INVALID_SOCKET) {
2646 trace("Creating the socket failed: %d\n", WSAGetLastError());
2647 WSACleanup();
2648 return;
2651 if(bind(sock, (struct sockaddr *) &sa, sa_len) < 0){
2652 trace("Failed to bind socket: %d\n", WSAGetLastError());
2653 closesocket(sock);
2654 WSACleanup();
2655 return;
2658 ret = getsockopt(sock, SOL_SOCKET, SO_LINGER, (char *)&linger_val, &optlen);
2659 ok(ret == 0, "getsockopt failed to query SO_LINGER, return value is 0x%08x\n", ret);
2661 optlen = sizeof(BOOL);
2662 ret = getsockopt(sock, SOL_SOCKET, SO_DONTLINGER, (char *)&bool_opt_val, &optlen);
2663 ok(ret == 0, "getsockopt failed to query SO_DONTLINGER, return value is 0x%08x\n", ret);
2664 ok((linger_val.l_onoff && !bool_opt_val) || (!linger_val.l_onoff && bool_opt_val),
2665 "Return value of SO_DONTLINGER is %d, but SO_LINGER returned l_onoff == %d.\n",
2666 bool_opt_val, linger_val.l_onoff);
2668 closesocket(sock);
2669 WSACleanup();
2672 static void test_getsockname(void)
2674 WSADATA wsa;
2675 SOCKET sock;
2676 struct sockaddr_in sa_set, sa_get;
2677 int sa_set_len = sizeof(struct sockaddr_in);
2678 int sa_get_len = sa_set_len;
2679 static const unsigned char null_padding[] = {0,0,0,0,0,0,0,0};
2680 int ret;
2682 if(WSAStartup(MAKEWORD(2,0), &wsa)){
2683 trace("Winsock failed: %d. Aborting test\n", WSAGetLastError());
2684 return;
2687 memset(&sa_set, 0, sa_set_len);
2689 sa_set.sin_family = AF_INET;
2690 sa_set.sin_port = htons(0);
2691 sa_set.sin_addr.s_addr = htonl(INADDR_ANY);
2693 if((sock = socket(PF_INET, SOCK_STREAM, IPPROTO_IP)) == INVALID_SOCKET) {
2694 trace("Creating the socket failed: %d\n", WSAGetLastError());
2695 WSACleanup();
2696 return;
2699 memcpy(&sa_get, &sa_set, sizeof(sa_set));
2700 if (getsockname(sock, (struct sockaddr*) &sa_get, &sa_get_len) == 0)
2701 ok(0, "getsockname on unbound socket should fail\n");
2702 else {
2703 ok(WSAGetLastError() == WSAEINVAL, "getsockname on unbound socket "
2704 "failed with %d, expected %d\n", WSAGetLastError(), WSAEINVAL);
2705 ok(memcmp(&sa_get, &sa_set, sizeof(sa_get)) == 0,
2706 "failed getsockname modified sockaddr when it shouldn't\n");
2709 if(bind(sock, (struct sockaddr *) &sa_set, sa_set_len) < 0){
2710 trace("Failed to bind socket: %d\n", WSAGetLastError());
2711 closesocket(sock);
2712 WSACleanup();
2713 return;
2716 if(getsockname(sock, (struct sockaddr *) &sa_get, &sa_get_len) != 0){
2717 trace("Failed to call getsockname: %d\n", WSAGetLastError());
2718 closesocket(sock);
2719 WSACleanup();
2720 return;
2723 ret = memcmp(sa_get.sin_zero, null_padding, 8);
2724 ok(ret == 0 || broken(ret != 0), /* NT4 */
2725 "getsockname did not zero the sockaddr_in structure\n");
2727 closesocket(sock);
2728 WSACleanup();
2731 static void test_dns(void)
2733 struct hostent *h;
2734 union memaddress
2736 char *chr;
2737 void *mem;
2738 } addr;
2739 char **ptr;
2740 int acount;
2742 h = gethostbyname("");
2743 ok(h != NULL, "gethostbyname(\"\") failed with %d\n", h_errno);
2745 /* Use an address with valid alias names if possible */
2746 h = gethostbyname("source.winehq.org");
2747 if(!h)
2749 skip("Can't test the hostent structure because gethostbyname failed\n");
2750 return;
2753 /* The returned struct must be allocated in a very strict way. First we need to
2754 * count how many aliases there are because they must be located right after
2755 * the struct hostent size. Knowing the amount of aliases we know the exact
2756 * location of the first IP returned. Rule valid for >= XP, for older OS's
2757 * it's somewhat the opposite. */
2758 addr.mem = h + 1;
2759 if(h->h_addr_list == addr.mem) /* <= W2K */
2761 skip("Skipping hostent tests since this OS is unsupported\n");
2762 return;
2765 todo_wine ok(h->h_aliases == addr.mem,
2766 "hostent->h_aliases should be in %p, it is in %p\n", addr.mem, h->h_aliases);
2768 for(ptr = h->h_aliases, acount = 1; *ptr; ptr++) acount++;
2769 addr.chr += sizeof(*ptr) * acount;
2770 todo_wine ok(h->h_addr_list == addr.mem,
2771 "hostent->h_addr_list should be in %p, it is in %p\n", addr.mem, h->h_addr_list);
2773 for(ptr = h->h_addr_list, acount = 1; *ptr; ptr++) acount++;
2775 addr.chr += sizeof(*ptr) * acount;
2776 todo_wine ok(h->h_addr_list[0] == addr.mem,
2777 "hostent->h_addr_list[0] should be in %p, it is in %p\n", addr.mem, h->h_addr_list[0]);
2780 /* Our winsock headers don't define gethostname because it conflicts with the
2781 * definition in unistd.h. Define it here to get rid of the warning. */
2783 int WINAPI gethostname(char *name, int namelen);
2785 static void test_gethostbyname_hack(void)
2787 struct hostent *he;
2788 char name[256];
2789 static BYTE loopback[] = {127, 0, 0, 1};
2790 static BYTE magic_loopback[] = {127, 12, 34, 56};
2791 int ret;
2793 ret = gethostname(name, 256);
2794 ok(ret == 0, "gethostname() call failed: %d\n", WSAGetLastError());
2796 he = gethostbyname("localhost");
2797 ok(he != NULL, "gethostbyname(\"localhost\") failed: %d\n", h_errno);
2798 if(he)
2800 if(he->h_length != 4)
2802 skip("h_length is %d, not IPv4, skipping test.\n", he->h_length);
2803 return;
2806 ok(memcmp(he->h_addr_list[0], loopback, he->h_length) == 0,
2807 "gethostbyname(\"localhost\") returned %d.%d.%d.%d\n",
2808 he->h_addr_list[0][0], he->h_addr_list[0][1], he->h_addr_list[0][2],
2809 he->h_addr_list[0][3]);
2812 if(strcmp(name, "localhost") == 0)
2814 skip("hostname seems to be \"localhost\", skipping test.\n");
2815 return;
2818 he = NULL;
2819 he = gethostbyname(name);
2820 ok(he != NULL, "gethostbyname(\"%s\") failed: %d\n", name, h_errno);
2821 if(he)
2823 if(he->h_length != 4)
2825 skip("h_length is %d, not IPv4, skipping test.\n", he->h_length);
2826 return;
2829 if (he->h_addr_list[0][0] == 127)
2831 ok(memcmp(he->h_addr_list[0], magic_loopback, he->h_length) == 0,
2832 "gethostbyname(\"%s\") returned %d.%d.%d.%d not 127.12.34.56\n",
2833 name, he->h_addr_list[0][0], he->h_addr_list[0][1],
2834 he->h_addr_list[0][2], he->h_addr_list[0][3]);
2838 gethostbyname("nonexistent.winehq.org");
2839 /* Don't check for the return value, as some braindead ISPs will kindly
2840 * resolve nonexistent host names to addresses of the ISP's spam pages. */
2843 static void test_inet_addr(void)
2845 u_long addr;
2847 addr = inet_addr(NULL);
2848 ok(addr == INADDR_NONE, "inet_addr succeeded unexpectedly\n");
2851 static void test_addr_to_print(void)
2853 char dst[16];
2854 char dst6[64];
2855 const char * pdst;
2856 struct in_addr in;
2857 struct in6_addr in6;
2859 u_long addr0_Num = 0x00000000;
2860 PCSTR addr0_Str = "0.0.0.0";
2861 u_long addr1_Num = 0x20201015;
2862 PCSTR addr1_Str = "21.16.32.32";
2863 u_char addr2_Num[16] = {0,0,0,0,0,0,0,0,0,0,0xff,0xfe,0xcC,0x98,0xbd,0x74};
2864 PCSTR addr2_Str = "::fffe:cc98:bd74";
2865 u_char addr3_Num[16] = {0x20,0x30,0xa4,0xb1};
2866 PCSTR addr3_Str = "2030:a4b1::";
2867 u_char addr4_Num[16] = {0,0,0,0,0,0,0,0,0,0,0,0,0xcC,0x98,0xbd,0x74};
2868 PCSTR addr4_Str = "::204.152.189.116";
2870 /* Test IPv4 addresses */
2871 in.s_addr = addr0_Num;
2873 pdst = inet_ntoa(*((struct in_addr*)&in.s_addr));
2874 ok(pdst != NULL, "inet_ntoa failed %s\n", dst);
2875 ok(!strcmp(pdst, addr0_Str),"Address %s != %s\n", pdst, addr0_Str);
2877 /* Test that inet_ntoa and inet_ntop return the same value */
2878 in.S_un.S_addr = addr1_Num;
2879 pdst = inet_ntoa(*((struct in_addr*)&in.s_addr));
2880 ok(pdst != NULL, "inet_ntoa failed %s\n", dst);
2881 ok(!strcmp(pdst, addr1_Str),"Address %s != %s\n", pdst, addr1_Str);
2883 /* InetNtop became available in Vista and Win2008 */
2884 if (!pInetNtop)
2886 win_skip("InetNtop not present, not executing tests\n");
2887 return;
2890 /* Second part of test */
2891 pdst = pInetNtop(AF_INET,(void*)&in.s_addr, dst, sizeof(dst));
2892 ok(pdst != NULL, "InetNtop failed %s\n", dst);
2893 ok(!strcmp(pdst, addr1_Str),"Address %s != %s\n", pdst, addr1_Str);
2895 /* Test invalid parm conditions */
2896 pdst = pInetNtop(1, (void*)&in.s_addr, dst, sizeof(dst));
2897 ok(pdst == NULL, "The pointer should not be returned (%p)\n", pdst);
2898 ok(WSAGetLastError() == WSAEAFNOSUPPORT, "Should be WSAEAFNOSUPPORT\n");
2900 /* Test Null destination */
2901 pdst = NULL;
2902 pdst = pInetNtop(AF_INET, (void*)&in.s_addr, NULL, sizeof(dst));
2903 ok(pdst == NULL, "The pointer should not be returned (%p)\n", pdst);
2904 ok(WSAGetLastError() == STATUS_INVALID_PARAMETER || WSAGetLastError() == WSAEINVAL /* Win7 */,
2905 "Should be STATUS_INVALID_PARAMETER or WSAEINVAL not 0x%x\n", WSAGetLastError());
2907 /* Test zero length passed */
2908 WSASetLastError(0);
2909 pdst = NULL;
2910 pdst = pInetNtop(AF_INET, (void*)&in.s_addr, dst, 0);
2911 ok(pdst == NULL, "The pointer should not be returned (%p)\n", pdst);
2912 ok(WSAGetLastError() == STATUS_INVALID_PARAMETER || WSAGetLastError() == WSAEINVAL /* Win7 */,
2913 "Should be STATUS_INVALID_PARAMETER or WSAEINVAL not 0x%x\n", WSAGetLastError());
2915 /* Test length one shorter than the address length */
2916 WSASetLastError(0);
2917 pdst = NULL;
2918 pdst = pInetNtop(AF_INET, (void*)&in.s_addr, dst, 6);
2919 ok(pdst == NULL, "The pointer should not be returned (%p)\n", pdst);
2920 ok(WSAGetLastError() == STATUS_INVALID_PARAMETER || WSAGetLastError() == WSAEINVAL /* Win7 */,
2921 "Should be STATUS_INVALID_PARAMETER or WSAEINVAL not 0x%x\n", WSAGetLastError());
2923 /* Test longer length is ok */
2924 WSASetLastError(0);
2925 pdst = NULL;
2926 pdst = pInetNtop(AF_INET, (void*)&in.s_addr, dst, sizeof(dst)+1);
2927 ok(pdst != NULL, "The pointer should be returned (%p)\n", pdst);
2928 ok(!strcmp(pdst, addr1_Str),"Address %s != %s\n", pdst, addr1_Str);
2930 /* Test the IPv6 addresses */
2932 /* Test an zero prefixed IPV6 address */
2933 memcpy(in6.u.Byte, addr2_Num, sizeof(addr2_Num));
2934 pdst = pInetNtop(AF_INET6,(void*)&in6.s6_addr, dst6, sizeof(dst6));
2935 ok(pdst != NULL, "InetNtop failed %s\n", dst6);
2936 ok(!strcmp(pdst, addr2_Str),"Address %s != %s\n", pdst, addr2_Str);
2938 /* Test an zero suffixed IPV6 address */
2939 memcpy(in6.s6_addr, addr3_Num, sizeof(addr3_Num));
2940 pdst = pInetNtop(AF_INET6,(void*)&in6.s6_addr, dst6, sizeof(dst6));
2941 ok(pdst != NULL, "InetNtop failed %s\n", dst6);
2942 ok(!strcmp(pdst, addr3_Str),"Address %s != %s\n", pdst, addr3_Str);
2944 /* Test the IPv6 address contains the IPv4 address in IPv4 notation */
2945 memcpy(in6.s6_addr, addr4_Num, sizeof(addr4_Num));
2946 pdst = pInetNtop(AF_INET6, (void*)&in6.s6_addr, dst6, sizeof(dst6));
2947 ok(pdst != NULL, "InetNtop failed %s\n", dst6);
2948 ok(!strcmp(pdst, addr4_Str),"Address %s != %s\n", pdst, addr4_Str);
2950 /* Test invalid parm conditions */
2951 memcpy(in6.u.Byte, addr2_Num, sizeof(addr2_Num));
2953 /* Test Null destination */
2954 pdst = NULL;
2955 pdst = pInetNtop(AF_INET6, (void*)&in6.s6_addr, NULL, sizeof(dst6));
2956 ok(pdst == NULL, "The pointer should not be returned (%p)\n", pdst);
2957 ok(WSAGetLastError() == STATUS_INVALID_PARAMETER || WSAGetLastError() == WSAEINVAL /* Win7 */,
2958 "Should be STATUS_INVALID_PARAMETER or WSAEINVAL not 0x%x\n", WSAGetLastError());
2960 /* Test zero length passed */
2961 WSASetLastError(0);
2962 pdst = NULL;
2963 pdst = pInetNtop(AF_INET6, (void*)&in6.s6_addr, dst6, 0);
2964 ok(pdst == NULL, "The pointer should not be returned (%p)\n", pdst);
2965 ok(WSAGetLastError() == STATUS_INVALID_PARAMETER || WSAGetLastError() == WSAEINVAL /* Win7 */,
2966 "Should be STATUS_INVALID_PARAMETER or WSAEINVAL not 0x%x\n", WSAGetLastError());
2968 /* Test length one shorter than the address length */
2969 WSASetLastError(0);
2970 pdst = NULL;
2971 pdst = pInetNtop(AF_INET6, (void*)&in6.s6_addr, dst6, 16);
2972 ok(pdst == NULL, "The pointer should not be returned (%p)\n", pdst);
2973 ok(WSAGetLastError() == STATUS_INVALID_PARAMETER || WSAGetLastError() == WSAEINVAL /* Win7 */,
2974 "Should be STATUS_INVALID_PARAMETER or WSAEINVAL not 0x%x\n", WSAGetLastError());
2976 /* Test longer length is ok */
2977 WSASetLastError(0);
2978 pdst = NULL;
2979 pdst = pInetNtop(AF_INET6, (void*)&in6.s6_addr, dst6, 18);
2980 ok(pdst != NULL, "The pointer should be returned (%p)\n", pdst);
2983 static void test_ioctlsocket(void)
2985 SOCKET sock;
2986 struct tcp_keepalive kalive;
2987 int ret, optval;
2988 static const LONG cmds[] = {FIONBIO, FIONREAD, SIOCATMARK};
2989 UINT i;
2990 u_long arg = 0;
2992 sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
2993 ok(sock != INVALID_SOCKET, "Creating the socket failed: %d\n", WSAGetLastError());
2994 if(sock == INVALID_SOCKET)
2996 skip("Can't continue without a socket.\n");
2997 return;
3000 for(i = 0; i < sizeof(cmds)/sizeof(cmds[0]); i++)
3002 /* broken apps like defcon pass the argp value directly instead of a pointer to it */
3003 ret = ioctlsocket(sock, cmds[i], (u_long *)1);
3004 ok(ret == SOCKET_ERROR, "ioctlsocket succeeded unexpectedly\n");
3005 ret = WSAGetLastError();
3006 ok(ret == WSAEFAULT, "expected WSAEFAULT, got %d instead\n", ret);
3009 /* A fresh and not connected socket has no urgent data, this test shows
3010 * that normal(not urgent) data returns a non-zero value for SIOCATMARK. */
3012 ret = ioctlsocket(sock, SIOCATMARK, &arg);
3013 ok(ret != SOCKET_ERROR, "ioctlsocket failed unexpectedly\n");
3014 ok(arg, "SIOCATMARK expected a non-zero value\n");
3016 /* when SO_OOBINLINE is set SIOCATMARK must always return TRUE */
3017 optval = 1;
3018 ret = setsockopt(sock, SOL_SOCKET, SO_OOBINLINE, (void *)&optval, sizeof(optval));
3019 ok(ret != SOCKET_ERROR, "setsockopt failed unexpectedly\n");
3020 arg = 0;
3021 ret = ioctlsocket(sock, SIOCATMARK, &arg);
3022 ok(ret != SOCKET_ERROR, "ioctlsocket failed unexpectedly\n");
3023 ok(arg, "SIOCATMARK expected a non-zero value\n");
3025 /* disable SO_OOBINLINE and get the same old bahavior */
3026 optval = 0;
3027 ret = setsockopt(sock, SOL_SOCKET, SO_OOBINLINE, (void *)&optval, sizeof(optval));
3028 ok(ret != SOCKET_ERROR, "setsockopt failed unexpectedly\n");
3029 arg = 0;
3030 ret = ioctlsocket(sock, SIOCATMARK, &arg);
3031 ok(arg, "SIOCATMARK expected a non-zero value\n");
3033 ret = WSAIoctl(sock, SIO_KEEPALIVE_VALS, &arg, 0, NULL, 0, &arg, NULL, NULL);
3034 ok(ret == SOCKET_ERROR, "WSAIoctl succeeded unexpectedly\n");
3035 ret = WSAGetLastError();
3036 ok(ret == WSAEFAULT || broken(ret == WSAEINVAL), "expected WSAEFAULT, got %d instead\n", ret);
3038 ret = WSAIoctl(sock, SIO_KEEPALIVE_VALS, NULL, sizeof(struct tcp_keepalive), NULL, 0, &arg, NULL, NULL);
3039 ok(ret == SOCKET_ERROR, "WSAIoctl succeeded unexpectedly\n");
3040 ret = WSAGetLastError();
3041 ok(ret == WSAEFAULT || broken(ret == WSAEINVAL), "expected WSAEFAULT, got %d instead\n", ret);
3043 /* broken used to catch W95, W98, NT4 */
3044 make_keepalive(kalive, 0, 0, 0);
3045 ret = WSAIoctl(sock, SIO_KEEPALIVE_VALS, &kalive, sizeof(struct tcp_keepalive), NULL, 0, &arg, NULL, NULL);
3046 ok(ret == 0 || broken(ret == SOCKET_ERROR), "WSAIoctl failed unexpectedly\n");
3048 make_keepalive(kalive, 1, 0, 0);
3049 ret = WSAIoctl(sock, SIO_KEEPALIVE_VALS, &kalive, sizeof(struct tcp_keepalive), NULL, 0, &arg, NULL, NULL);
3050 ok(ret == 0 || broken(ret == SOCKET_ERROR), "WSAIoctl failed unexpectedly\n");
3052 make_keepalive(kalive, 1, 1000, 1000);
3053 ret = WSAIoctl(sock, SIO_KEEPALIVE_VALS, &kalive, sizeof(struct tcp_keepalive), NULL, 0, &arg, NULL, NULL);
3054 ok(ret == 0 || broken(ret == SOCKET_ERROR), "WSAIoctl failed unexpectedly\n");
3056 make_keepalive(kalive, 1, 10000, 10000);
3057 ret = WSAIoctl(sock, SIO_KEEPALIVE_VALS, &kalive, sizeof(struct tcp_keepalive), NULL, 0, &arg, NULL, NULL);
3058 ok(ret == 0 || broken(ret == SOCKET_ERROR), "WSAIoctl failed unexpectedly\n");
3060 make_keepalive(kalive, 1, 100, 100);
3061 ret = WSAIoctl(sock, SIO_KEEPALIVE_VALS, &kalive, sizeof(struct tcp_keepalive), NULL, 0, &arg, NULL, NULL);
3062 ok(ret == 0 || broken(ret == SOCKET_ERROR), "WSAIoctl failed unexpectedly\n");
3064 make_keepalive(kalive, 0, 100, 100);
3065 ret = WSAIoctl(sock, SIO_KEEPALIVE_VALS, &kalive, sizeof(struct tcp_keepalive), NULL, 0, &arg, NULL, NULL);
3066 ok(ret == 0 || broken(ret == SOCKET_ERROR), "WSAIoctl failed unexpectedly\n");
3068 closesocket(sock);
3071 static int drain_pause=0;
3072 static DWORD WINAPI drain_socket_thread(LPVOID arg)
3074 char buffer[1024];
3075 SOCKET sock = *(SOCKET*)arg;
3076 int ret;
3078 while ((ret = recv(sock, buffer, sizeof(buffer), 0)) != 0)
3080 if (ret < 0)
3082 if (WSAGetLastError() == WSAEWOULDBLOCK)
3084 fd_set readset;
3085 FD_ZERO(&readset);
3086 FD_SET(sock, &readset);
3087 select(sock+1, &readset, NULL, NULL, NULL);
3088 while (drain_pause)
3089 Sleep(100);
3091 else
3092 break;
3095 return 0;
3098 static void test_send(void)
3100 SOCKET src = INVALID_SOCKET;
3101 SOCKET dst = INVALID_SOCKET;
3102 HANDLE hThread = NULL;
3103 const int buflen = 1024*1024;
3104 char *buffer = NULL;
3105 int ret, i, zero = 0;
3106 WSABUF buf;
3107 OVERLAPPED ov;
3108 BOOL bret;
3109 DWORD id, bytes_sent, dwRet;
3111 memset(&ov, 0, sizeof(ov));
3113 if (tcp_socketpair(&src, &dst) != 0)
3115 ok(0, "creating socket pair failed, skipping test\n");
3116 return;
3119 set_blocking(dst, FALSE);
3120 /* force disable buffering so we can get a pending overlapped request */
3121 ret = setsockopt(dst, SOL_SOCKET, SO_SNDBUF, (char *) &zero, sizeof(zero));
3122 ok(!ret, "setsockopt SO_SNDBUF failed: %d - %d\n", ret, GetLastError());
3124 hThread = CreateThread(NULL, 0, drain_socket_thread, &dst, 0, &id);
3125 if (hThread == NULL)
3127 ok(0, "CreateThread failed, error %d\n", GetLastError());
3128 goto end;
3131 buffer = HeapAlloc(GetProcessHeap(), 0, buflen);
3132 if (buffer == NULL)
3134 ok(0, "HeapAlloc failed, error %d\n", GetLastError());
3135 goto end;
3138 /* fill the buffer with some nonsense */
3139 for (i = 0; i < buflen; ++i)
3141 buffer[i] = (char) i;
3144 ret = send(src, buffer, buflen, 0);
3145 if (ret >= 0)
3146 ok(ret == buflen, "send should have sent %d bytes, but it only sent %d\n", buflen, ret);
3147 else
3148 ok(0, "send failed, error %d\n", WSAGetLastError());
3150 buf.buf = buffer;
3151 buf.len = buflen;
3153 ov.hEvent = CreateEvent(NULL, FALSE, FALSE, NULL);
3154 ok(ov.hEvent != NULL, "could not create event object, errno = %d\n", GetLastError());
3155 if (!ov.hEvent)
3156 goto end;
3158 bytes_sent = 0;
3159 WSASetLastError(12345);
3160 ret = WSASend(dst, &buf, 1, &bytes_sent, 0, &ov, NULL);
3161 ok((ret == SOCKET_ERROR && WSAGetLastError() == ERROR_IO_PENDING) || broken(bytes_sent == buflen),
3162 "Failed to start overlapped send %d - %d - %d/%d\n", ret, WSAGetLastError(), bytes_sent, buflen);
3164 /* don't check for completion yet, we may need to drain the buffer while still sending */
3165 set_blocking(src, FALSE);
3166 for (i = 0; i < buflen; ++i)
3168 int j = 0;
3170 ret = recv(src, buffer, 1, 0);
3171 while (ret == SOCKET_ERROR && GetLastError() == WSAEWOULDBLOCK && j < 100)
3173 j++;
3174 Sleep(50);
3175 ret = recv(src, buffer, 1, 0);
3178 ok(ret == 1, "Failed to receive data %d - %d (got %d/%d)\n", ret, GetLastError(), i, buflen);
3179 if (ret != 1)
3180 break;
3182 ok(buffer[0] == (char) i, "Received bad data at position %d\n", i);
3185 dwRet = WaitForSingleObject(ov.hEvent, 1000);
3186 ok(dwRet == WAIT_OBJECT_0, "Failed to wait for recv message: %d - %d\n", dwRet, GetLastError());
3187 if (dwRet == WAIT_OBJECT_0)
3189 bret = GetOverlappedResult((HANDLE)dst, &ov, &bytes_sent, FALSE);
3190 ok((bret && bytes_sent == buflen) || broken(!bret && GetLastError() == ERROR_IO_INCOMPLETE) /* win9x */,
3191 "Got %d instead of %d (%d - %d)\n", bytes_sent, buflen, bret, GetLastError());
3194 WSASetLastError(12345);
3195 ret = WSASend(INVALID_SOCKET, &buf, 1, NULL, 0, &ov, NULL);
3196 ok(ret == SOCKET_ERROR && WSAGetLastError() == WSAENOTSOCK,
3197 "WSASend failed %d - %d\n", ret, WSAGetLastError());
3199 WSASetLastError(12345);
3200 ret = WSASend(dst, &buf, 1, NULL, 0, &ov, NULL);
3201 ok(ret == SOCKET_ERROR && WSAGetLastError() == ERROR_IO_PENDING,
3202 "Failed to start overlapped send %d - %d\n", ret, WSAGetLastError());
3204 end:
3205 if (src != INVALID_SOCKET)
3206 closesocket(src);
3207 if (dst != INVALID_SOCKET)
3208 closesocket(dst);
3209 if (hThread != NULL)
3210 CloseHandle(hThread);
3211 if (ov.hEvent)
3212 CloseHandle(ov.hEvent);
3213 HeapFree(GetProcessHeap(), 0, buffer);
3216 typedef struct async_message
3218 SOCKET socket;
3219 LPARAM lparam;
3220 struct async_message *next;
3221 } async_message;
3223 static struct async_message *messages_received;
3225 #define WM_SOCKET (WM_USER+100)
3226 static LRESULT CALLBACK ws2_test_WndProc(HWND hwnd, UINT msg, WPARAM wparam, LPARAM lparam)
3228 struct async_message *message;
3230 switch (msg)
3232 case WM_SOCKET:
3233 message = HeapAlloc(GetProcessHeap(), 0, sizeof(*message));
3234 message->socket = (SOCKET) wparam;
3235 message->lparam = lparam;
3236 message->next = NULL;
3238 if (messages_received)
3240 struct async_message *last = messages_received;
3241 while (last->next) last = last->next;
3242 last->next = message;
3244 else
3245 messages_received = message;
3246 return 0;
3249 return DefWindowProc(hwnd, msg, wparam, lparam);
3252 static void get_event_details(int event, int *bit, char *name)
3254 switch (event)
3256 case FD_ACCEPT:
3257 if (bit) *bit = FD_ACCEPT_BIT;
3258 if (name) strcpy(name, "FD_ACCEPT");
3259 break;
3260 case FD_CONNECT:
3261 if (bit) *bit = FD_CONNECT_BIT;
3262 if (name) strcpy(name, "FD_CONNECT");
3263 break;
3264 case FD_READ:
3265 if (bit) *bit = FD_READ_BIT;
3266 if (name) strcpy(name, "FD_READ");
3267 break;
3268 case FD_OOB:
3269 if (bit) *bit = FD_OOB_BIT;
3270 if (name) strcpy(name, "FD_OOB");
3271 break;
3272 case FD_WRITE:
3273 if (bit) *bit = FD_WRITE_BIT;
3274 if (name) strcpy(name, "FD_WRITE");
3275 break;
3276 case FD_CLOSE:
3277 if (bit) *bit = FD_CLOSE_BIT;
3278 if (name) strcpy(name, "FD_CLOSE");
3279 break;
3280 default:
3281 if (bit) *bit = -1;
3282 if (name) sprintf(name, "bad%x", event);
3286 static const char *dbgstr_event_seq(const LPARAM *seq)
3288 static char message[1024];
3289 char name[12];
3290 int len = 1;
3292 message[0] = '[';
3293 message[1] = 0;
3294 while (*seq)
3296 get_event_details(WSAGETSELECTEVENT(*seq), NULL, name);
3297 len += sprintf(message + len, "%s(%d) ", name, WSAGETSELECTERROR(*seq));
3298 seq++;
3300 if (len > 1) len--;
3301 strcpy( message + len, "]" );
3302 return message;
3305 static char *dbgstr_event_seq_result(SOCKET s, WSANETWORKEVENTS *netEvents)
3307 static char message[1024];
3308 struct async_message *curr = messages_received;
3309 int index, error, bit = 0;
3310 char name[12];
3311 int len = 1;
3313 message[0] = '[';
3314 message[1] = 0;
3315 while (1)
3317 if (netEvents)
3319 if (bit >= FD_MAX_EVENTS) break;
3320 if ( !(netEvents->lNetworkEvents & (1 << bit)) )
3322 bit++;
3323 continue;
3325 get_event_details(1 << bit, &index, name);
3326 error = netEvents->iErrorCode[index];
3327 bit++;
3329 else
3331 if (!curr) break;
3332 if (curr->socket != s)
3334 curr = curr->next;
3335 continue;
3337 get_event_details(WSAGETSELECTEVENT(curr->lparam), NULL, name);
3338 error = WSAGETSELECTERROR(curr->lparam);
3339 curr = curr->next;
3342 len += sprintf(message + len, "%s(%d) ", name, error);
3344 if (len > 1) len--;
3345 strcpy( message + len, "]" );
3346 return message;
3349 static void flush_events(SOCKET s, HANDLE hEvent)
3351 WSANETWORKEVENTS netEvents;
3352 struct async_message *prev = NULL, *curr = messages_received;
3353 int ret;
3354 DWORD dwRet;
3356 if (hEvent != INVALID_HANDLE_VALUE)
3358 dwRet = WaitForSingleObject(hEvent, 100);
3359 if (dwRet == WAIT_OBJECT_0)
3361 ret = WSAEnumNetworkEvents(s, hEvent, &netEvents);
3362 if (ret)
3363 ok(0, "WSAEnumNetworkEvents failed, error %d\n", ret);
3366 else
3368 while (curr)
3370 if (curr->socket == s)
3372 if (prev) prev->next = curr->next;
3373 else messages_received = curr->next;
3375 HeapFree(GetProcessHeap(), 0, curr);
3377 if (prev) curr = prev->next;
3378 else curr = messages_received;
3380 else
3382 prev = curr;
3383 curr = curr->next;
3389 static int match_event_sequence(SOCKET s, WSANETWORKEVENTS *netEvents, const LPARAM *seq)
3391 int event, index, error, events;
3392 struct async_message *curr;
3394 if (netEvents)
3396 events = netEvents->lNetworkEvents;
3397 while (*seq)
3399 event = WSAGETSELECTEVENT(*seq);
3400 error = WSAGETSELECTERROR(*seq);
3401 get_event_details(event, &index, NULL);
3403 if (!(events & event) && index != -1)
3404 return 0;
3405 if (events & event && index != -1)
3407 if (netEvents->iErrorCode[index] != error)
3408 return 0;
3410 events &= ~event;
3411 seq++;
3413 if (events)
3414 return 0;
3416 else
3418 curr = messages_received;
3419 while (curr)
3421 if (curr->socket == s)
3423 if (!*seq) return 0;
3424 if (*seq != curr->lparam) return 0;
3425 seq++;
3427 curr = curr->next;
3429 if (*seq)
3430 return 0;
3432 return 1;
3435 /* checks for a sequence of events, (order only checked if window is used) */
3436 static void ok_event_sequence(SOCKET s, HANDLE hEvent, const LPARAM *seq, const LPARAM **broken_seqs, int completelyBroken)
3438 MSG msg;
3439 WSANETWORKEVENTS events, *netEvents = NULL;
3440 int ret;
3441 DWORD dwRet;
3443 if (hEvent != INVALID_HANDLE_VALUE)
3445 netEvents = &events;
3447 dwRet = WaitForSingleObject(hEvent, 200);
3448 if (dwRet == WAIT_OBJECT_0)
3450 ret = WSAEnumNetworkEvents(s, hEvent, netEvents);
3451 if (ret)
3453 winetest_ok(0, "WSAEnumNetworkEvents failed, error %d\n", ret);
3454 return;
3457 else
3458 memset(netEvents, 0, sizeof(*netEvents));
3460 else
3462 Sleep(200);
3463 /* Run the message loop a little */
3464 while (PeekMessageA( &msg, 0, 0, 0, PM_REMOVE ))
3466 DispatchMessageA(&msg);
3470 if (match_event_sequence(s, netEvents, seq))
3472 winetest_ok(1, "Sequence matches expected: %s\n", dbgstr_event_seq(seq));
3473 flush_events(s, hEvent);
3474 return;
3477 if (broken_seqs)
3479 for (; *broken_seqs; broken_seqs++)
3481 if (match_event_sequence(s, netEvents, *broken_seqs))
3483 winetest_ok(broken(1), "Sequence matches broken: %s, expected %s\n", dbgstr_event_seq_result(s, netEvents), dbgstr_event_seq(seq));
3484 flush_events(s, hEvent);
3485 return;
3490 winetest_ok(broken(completelyBroken), "Expected event sequence %s, got %s\n", dbgstr_event_seq(seq),
3491 dbgstr_event_seq_result(s, netEvents));
3492 flush_events(s, hEvent);
3495 #define ok_event_seq (winetest_set_location(__FILE__, __LINE__), 0) ? (void)0 : ok_event_sequence
3497 static void test_events(int useMessages)
3499 SOCKET server = INVALID_SOCKET;
3500 SOCKET src = INVALID_SOCKET, src2 = INVALID_SOCKET;
3501 SOCKET dst = INVALID_SOCKET, dst2 = INVALID_SOCKET;
3502 struct sockaddr_in addr;
3503 HANDLE hThread = NULL;
3504 HANDLE hEvent = INVALID_HANDLE_VALUE, hEvent2 = INVALID_HANDLE_VALUE;
3505 WNDCLASSEX wndclass;
3506 HWND hWnd = NULL;
3507 char *buffer = NULL;
3508 int bufferSize = 1024*1024;
3509 WSABUF bufs;
3510 OVERLAPPED ov, ov2;
3511 DWORD flags = 0;
3512 DWORD bytesReturned;
3513 DWORD id;
3514 int len;
3515 int ret;
3516 DWORD dwRet;
3517 BOOL bret;
3518 static char szClassName[] = "wstestclass";
3519 const LPARAM *broken_seq[3];
3520 static const LPARAM empty_seq[] = { 0 };
3521 static const LPARAM close_seq[] = { WSAMAKESELECTREPLY(FD_CLOSE, 0), 0 };
3522 static const LPARAM write_seq[] = { WSAMAKESELECTREPLY(FD_WRITE, 0), 0 };
3523 static const LPARAM read_seq[] = { WSAMAKESELECTREPLY(FD_READ, 0), 0 };
3524 static const LPARAM oob_seq[] = { WSAMAKESELECTREPLY(FD_OOB, 0), 0 };
3525 static const LPARAM connect_seq[] = { WSAMAKESELECTREPLY(FD_CONNECT, 0),
3526 WSAMAKESELECTREPLY(FD_WRITE, 0), 0 };
3527 static const LPARAM read_read_seq[] = { WSAMAKESELECTREPLY(FD_READ, 0),
3528 WSAMAKESELECTREPLY(FD_READ, 0), 0 };
3529 static const LPARAM read_write_seq[] = { WSAMAKESELECTREPLY(FD_READ, 0),
3530 WSAMAKESELECTREPLY(FD_WRITE, 0), 0 };
3531 static const LPARAM read_close_seq[] = { WSAMAKESELECTREPLY(FD_READ, 0),
3532 WSAMAKESELECTREPLY(FD_CLOSE, 0), 0 };
3534 memset(&ov, 0, sizeof(ov));
3535 memset(&ov2, 0, sizeof(ov2));
3537 /* don't use socketpair, we want connection event */
3538 src = socket(AF_INET, SOCK_STREAM, 0);
3539 if (src == INVALID_SOCKET)
3541 ok(0, "creating socket pair failed (%d), skipping test\n", GetLastError());
3542 goto end;
3545 src2 = socket(AF_INET, SOCK_STREAM, 0);
3546 if (src2 == INVALID_SOCKET)
3548 ok(0, "creating socket pair failed (%d), skipping test\n", GetLastError());
3549 goto end;
3552 len = sizeof(BOOL);
3553 if (getsockopt(src, SOL_SOCKET, SO_OOBINLINE, (void *)&bret, &len) == SOCKET_ERROR)
3555 ok(0, "failed to get oobinline status, %d\n", GetLastError());
3556 goto end;
3558 ok(bret == FALSE, "OOB not inline\n");
3560 if (useMessages)
3562 trace("Event test using messages\n");
3564 wndclass.cbSize = sizeof(wndclass);
3565 wndclass.style = CS_HREDRAW | CS_VREDRAW;
3566 wndclass.lpfnWndProc = ws2_test_WndProc;
3567 wndclass.cbClsExtra = 0;
3568 wndclass.cbWndExtra = 0;
3569 wndclass.hInstance = GetModuleHandle(NULL);
3570 wndclass.hIcon = LoadIcon(NULL, IDI_APPLICATION);
3571 wndclass.hIconSm = LoadIcon(NULL, IDI_APPLICATION);
3572 wndclass.hCursor = LoadCursor(NULL, IDC_ARROW);
3573 wndclass.hbrBackground = (HBRUSH)(COLOR_WINDOW + 1);
3574 wndclass.lpszClassName = szClassName;
3575 wndclass.lpszMenuName = NULL;
3576 RegisterClassEx(&wndclass);
3578 hWnd = CreateWindow(szClassName, "WS2Test", WS_OVERLAPPEDWINDOW, 0, 0, 500, 500, NULL, NULL, GetModuleHandle(NULL), NULL);
3579 if (!hWnd)
3581 ok(0, "failed to create window: %d\n", GetLastError());
3582 return;
3585 ret = WSAAsyncSelect(src, hWnd, WM_SOCKET, FD_CONNECT | FD_READ | FD_OOB | FD_WRITE | FD_CLOSE);
3586 if (ret)
3588 ok(0, "WSAAsyncSelect failed, error %d\n", ret);
3589 goto end;
3592 ret = WSAAsyncSelect(src2, hWnd, WM_SOCKET, FD_CONNECT | FD_READ | FD_OOB | FD_WRITE | FD_CLOSE);
3593 if (ret)
3595 ok(0, "WSAAsyncSelect failed, error %d\n", ret);
3596 goto end;
3599 else
3601 trace("Event test using events\n");
3603 hEvent = WSACreateEvent();
3604 if (hEvent == INVALID_HANDLE_VALUE)
3606 ok(0, "WSACreateEvent failed, error %d\n", GetLastError());
3607 goto end;
3610 hEvent2 = WSACreateEvent();
3611 if (hEvent2 == INVALID_HANDLE_VALUE)
3613 ok(0, "WSACreateEvent failed, error %d\n", GetLastError());
3614 goto end;
3617 ret = WSAEventSelect(src, hEvent, FD_CONNECT | FD_READ | FD_OOB | FD_WRITE | FD_CLOSE);
3618 if (ret)
3620 ok(0, "WSAEventSelect failed, error %d\n", ret);
3621 goto end;
3624 ret = WSAEventSelect(src2, hEvent2, FD_CONNECT | FD_READ | FD_OOB | FD_WRITE | FD_CLOSE);
3625 if (ret)
3627 ok(0, "WSAEventSelect failed, error %d\n", ret);
3628 goto end;
3632 server = socket(AF_INET, SOCK_STREAM, 0);
3633 if (server == INVALID_SOCKET)
3635 ok(0, "creating socket pair failed (%d), skipping test\n", GetLastError());
3636 goto end;
3639 memset(&addr, 0, sizeof(addr));
3640 addr.sin_family = AF_INET;
3641 addr.sin_addr.s_addr = inet_addr("127.0.0.1");
3642 ret = bind(server, (struct sockaddr*)&addr, sizeof(addr));
3643 if (ret != 0)
3645 ok(0, "creating socket pair failed (%d), skipping test\n", GetLastError());
3646 goto end;
3649 len = sizeof(addr);
3650 ret = getsockname(server, (struct sockaddr*)&addr, &len);
3651 if (ret != 0)
3653 ok(0, "creating socket pair failed (%d), skipping test\n", GetLastError());
3654 goto end;
3657 ret = listen(server, 2);
3658 if (ret != 0)
3660 ok(0, "creating socket pair failed (%d), skipping test\n", GetLastError());
3661 goto end;
3664 ret = connect(src, (struct sockaddr*)&addr, sizeof(addr));
3665 if (ret == SOCKET_ERROR && WSAGetLastError() != WSAEWOULDBLOCK)
3667 ok(0, "creating socket pair failed (%d), skipping test\n", GetLastError());
3668 goto end;
3671 ret = connect(src2, (struct sockaddr*)&addr, sizeof(addr));
3672 if (ret == SOCKET_ERROR && WSAGetLastError() != WSAEWOULDBLOCK)
3674 ok(0, "creating socket pair failed (%d), skipping test\n", GetLastError());
3675 goto end;
3678 len = sizeof(addr);
3679 dst = accept(server, (struct sockaddr*)&addr, &len);
3680 if (dst == INVALID_SOCKET)
3682 ok(0, "creating socket pair failed (%d), skipping test\n", GetLastError());
3683 goto end;
3686 len = sizeof(addr);
3687 dst2 = accept(server, (struct sockaddr*)&addr, &len);
3688 if (dst2 == INVALID_SOCKET)
3690 ok(0, "creating socket pair failed (%d), skipping test\n", GetLastError());
3691 goto end;
3694 closesocket(server);
3695 server = INVALID_SOCKET;
3697 /* On Windows it seems when a non-blocking socket sends to a
3698 blocking socket on the same host, the send() is BLOCKING,
3699 so make both sockets non-blocking. src is already non-blocking
3700 from the async select */
3702 if (set_blocking(dst, FALSE))
3704 ok(0, "ioctlsocket failed, error %d\n", WSAGetLastError());
3705 goto end;
3708 buffer = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, bufferSize);
3709 if (buffer == NULL)
3711 ok(0, "could not allocate memory for test\n");
3712 goto end;
3715 ov.hEvent = CreateEvent(NULL, FALSE, FALSE, NULL);
3716 if (ov.hEvent == NULL)
3718 ok(0, "could not create event object, errno = %d\n", GetLastError());
3719 goto end;
3722 ov2.hEvent = CreateEvent(NULL, FALSE, FALSE, NULL);
3723 if (ov2.hEvent == NULL)
3725 ok(0, "could not create event object, errno = %d\n", GetLastError());
3726 goto end;
3729 /* FD_WRITE should be set initially, and allow us to send at least 1 byte */
3730 ok_event_seq(src, hEvent, connect_seq, NULL, 1);
3731 ok_event_seq(src2, hEvent2, connect_seq, NULL, 1);
3732 /* broken on all windows - FD_CONNECT error is garbage */
3734 /* Test simple send/recv */
3735 ret = send(dst, buffer, 100, 0);
3736 ok(ret == 100, "Failed to send buffer %d err %d\n", ret, GetLastError());
3737 ok_event_seq(src, hEvent, read_seq, NULL, 0);
3739 ret = recv(src, buffer, 1, MSG_PEEK);
3740 ok(ret == 1, "Failed to peek at recv buffer %d err %d\n", ret, GetLastError());
3741 ok_event_seq(src, hEvent, read_seq, NULL, 0);
3743 ret = recv(src, buffer, 50, 0);
3744 ok(ret == 50, "Failed to recv buffer %d err %d\n", ret, GetLastError());
3745 ok_event_seq(src, hEvent, read_seq, NULL, 0);
3747 ret = recv(src, buffer, 50, 0);
3748 ok(ret == 50, "Failed to recv buffer %d err %d\n", ret, GetLastError());
3749 ok_event_seq(src, hEvent, empty_seq, NULL, 0);
3751 /* fun fact - events are reenabled even on failure, but only for messages */
3752 ret = send(dst, "1", 1, 0);
3753 ok(ret == 1, "Failed to send buffer %d err %d\n", ret, GetLastError());
3754 ok_event_seq(src, hEvent, read_seq, NULL, 0);
3756 ret = recv(src, buffer, -1, 0);
3757 ok(ret == SOCKET_ERROR && (GetLastError() == WSAEFAULT || GetLastError() == WSAENOBUFS),
3758 "Failed to recv buffer %d err %d\n", ret, GetLastError());
3759 if (useMessages)
3761 broken_seq[0] = empty_seq; /* win9x */
3762 broken_seq[1] = NULL;
3763 todo_wine ok_event_seq(src, hEvent, read_seq, broken_seq, 0);
3765 else
3766 ok_event_seq(src, hEvent, empty_seq, NULL, 0);
3768 ret = recv(src, buffer, 1, 0);
3769 ok(ret == 1, "Failed to recv buffer %d err %d\n", ret, GetLastError());
3770 ok_event_seq(src, hEvent, empty_seq, NULL, 0);
3772 /* Interaction with overlapped */
3773 bufs.len = sizeof(char);
3774 bufs.buf = buffer;
3775 ret = WSARecv(src, &bufs, 1, &bytesReturned, &flags, &ov, NULL);
3776 ok(ret == SOCKET_ERROR && GetLastError() == ERROR_IO_PENDING,
3777 "WSARecv failed - %d error %d\n", ret, GetLastError());
3779 bufs.len = sizeof(char);
3780 bufs.buf = buffer+1;
3781 ret = WSARecv(src, &bufs, 1, &bytesReturned, &flags, &ov2, NULL);
3782 ok(ret == SOCKET_ERROR && GetLastError() == ERROR_IO_PENDING,
3783 "WSARecv failed - %d error %d\n", ret, GetLastError());
3785 ret = send(dst, "12", 2, 0);
3786 ok(ret == 2, "Failed to send buffer %d err %d\n", ret, GetLastError());
3787 broken_seq[0] = read_read_seq; /* win9x */
3788 broken_seq[1] = NULL;
3789 ok_event_seq(src, hEvent, empty_seq, broken_seq, 0);
3791 dwRet = WaitForSingleObject(ov.hEvent, 100);
3792 ok(dwRet == WAIT_OBJECT_0, "Failed to wait for recv message: %d - %d\n", dwRet, GetLastError());
3793 if (dwRet == WAIT_OBJECT_0)
3795 bret = GetOverlappedResult((HANDLE)src, &ov, &bytesReturned, FALSE);
3796 ok((bret && bytesReturned == 1) || broken(!bret && GetLastError() == ERROR_IO_INCOMPLETE) /* win9x */,
3797 "Got %d instead of 1 (%d - %d)\n", bytesReturned, bret, GetLastError());
3798 ok(buffer[0] == '1', "Got %c instead of 1\n", buffer[0]);
3801 dwRet = WaitForSingleObject(ov2.hEvent, 100);
3802 ok(dwRet == WAIT_OBJECT_0, "Failed to wait for recv message: %d - %d\n", dwRet, GetLastError());
3803 if (dwRet == WAIT_OBJECT_0)
3805 bret = GetOverlappedResult((HANDLE)src, &ov2, &bytesReturned, FALSE);
3806 ok((bret && bytesReturned == 1) || broken(!bret && GetLastError() == ERROR_IO_INCOMPLETE) /* win9x */,
3807 "Got %d instead of 1 (%d - %d)\n", bytesReturned, bret, GetLastError());
3808 ok(buffer[1] == '2', "Got %c instead of 2\n", buffer[1]);
3811 ret = send(dst, "1", 1, 0);
3812 ok(ret == 1, "Failed to send buffer %d err %d\n", ret, GetLastError());
3813 ok_event_seq(src, hEvent, read_seq, NULL, 0);
3815 ret = recv(src, buffer, 1, 0);
3816 ok(ret == 1, "Failed to empty buffer: %d - %d\n", ret, GetLastError());
3817 ok_event_seq(src, hEvent, empty_seq, NULL, 0);
3819 /* Notifications are delivered as soon as possible, blocked only on
3820 * async requests on the same type */
3821 bufs.len = sizeof(char);
3822 bufs.buf = buffer;
3823 ret = WSARecv(src, &bufs, 1, &bytesReturned, &flags, &ov, NULL);
3824 ok(ret == SOCKET_ERROR && GetLastError() == ERROR_IO_PENDING,
3825 "WSARecv failed - %d error %d\n", ret, GetLastError());
3827 if (0) {
3828 ret = send(dst, "1", 1, MSG_OOB);
3829 ok(ret == 1, "Failed to send buffer %d err %d\n", ret, GetLastError());
3830 ok_event_seq(src, hEvent, oob_seq, NULL, 0);
3833 dwRet = WaitForSingleObject(ov.hEvent, 100);
3834 ok(dwRet == WAIT_TIMEOUT, "OOB message activated read?: %d - %d\n", dwRet, GetLastError());
3836 ret = send(dst, "2", 1, 0);
3837 ok(ret == 1, "Failed to send buffer %d err %d\n", ret, GetLastError());
3838 broken_seq[0] = read_seq; /* win98 */
3839 broken_seq[1] = NULL;
3840 ok_event_seq(src, hEvent, empty_seq, broken_seq, 0);
3842 dwRet = WaitForSingleObject(ov.hEvent, 100);
3843 ok(dwRet == WAIT_OBJECT_0 || broken(dwRet == WAIT_TIMEOUT),
3844 "Failed to wait for recv message: %d - %d\n", dwRet, GetLastError());
3845 if (dwRet == WAIT_OBJECT_0)
3847 bret = GetOverlappedResult((HANDLE)src, &ov, &bytesReturned, FALSE);
3848 ok((bret && bytesReturned == 1) || broken(!bret && GetLastError() == ERROR_IO_INCOMPLETE) /* win9x */,
3849 "Got %d instead of 1 (%d - %d)\n", bytesReturned, bret, GetLastError());
3850 ok(buffer[0] == '2', "Got %c instead of 2\n", buffer[0]);
3852 else if (dwRet == WAIT_TIMEOUT)
3854 /* this happens on win98. We get an FD_READ later on the next test */
3855 CancelIo((HANDLE) src);
3858 if (0) {
3859 ret = recv(src, buffer, 1, MSG_OOB);
3860 todo_wine ok(ret == 1, "Failed to empty buffer: %d - %d\n", ret, GetLastError());
3861 /* We get OOB notification, but no data on wine */
3862 ok_event_seq(src, hEvent, empty_seq, NULL, 0);
3865 /* Flood the send queue */
3866 hThread = CreateThread(NULL, 0, drain_socket_thread, &dst, 0, &id);
3867 if (hThread == NULL)
3869 ok(0, "CreateThread failed, error %d\n", GetLastError());
3870 goto end;
3873 /* Now FD_WRITE should not be set, because the socket send buffer isn't full yet */
3874 ok_event_seq(src, hEvent, empty_seq, NULL, 0);
3876 /* Now if we send a ton of data and the 'server' does not drain it fast
3877 * enough (set drain_pause to be sure), the socket send buffer will only
3878 * take some of it, and we will get a short write. This will trigger
3879 * another FD_WRITE event as soon as data is sent and more space becomes
3880 * available, but not any earlier. */
3881 drain_pause=1;
3884 ret = send(src, buffer, bufferSize, 0);
3885 } while (ret == bufferSize);
3886 drain_pause=0;
3887 if (ret >= 0 || WSAGetLastError() == WSAEWOULDBLOCK)
3889 Sleep(400); /* win9x */
3890 broken_seq[0] = read_write_seq;
3891 broken_seq[1] = NULL;
3892 ok_event_seq(src, hEvent, write_seq, broken_seq, 0);
3894 else
3896 ok(0, "sending a lot of data failed with error %d\n", WSAGetLastError());
3899 /* Test how FD_CLOSE is handled */
3900 ret = send(dst, "12", 2, 0);
3901 ok(ret == 2, "Failed to send buffer %d err %d\n", ret, GetLastError());
3903 /* Wait a little and let the send complete */
3904 Sleep(100);
3905 closesocket(dst);
3906 dst = INVALID_SOCKET;
3907 Sleep(100);
3909 /* We can never implement this in wine, best we can hope for is
3910 sending FD_CLOSE after the reads complete */
3911 broken_seq[0] = read_seq; /* win9x */
3912 broken_seq[1] = NULL;
3913 todo_wine ok_event_seq(src, hEvent, read_close_seq, broken_seq, 0);
3915 ret = recv(src, buffer, 1, 0);
3916 ok(ret == 1, "Failed to empty buffer: %d - %d\n", ret, GetLastError());
3917 ok_event_seq(src, hEvent, read_seq, NULL, 0);
3919 ret = recv(src, buffer, 1, 0);
3920 ok(ret == 1, "Failed to empty buffer: %d - %d\n", ret, GetLastError());
3921 /* want it? it's here, but you can't have it */
3922 broken_seq[0] = close_seq; /* win9x */
3923 broken_seq[1] = NULL;
3924 todo_wine ok_event_seq(src, hEvent, empty_seq, /* wine sends FD_CLOSE here */
3925 broken_seq, 0);
3927 /* Test how FD_CLOSE is handled */
3928 ret = send(dst2, "12", 2, 0);
3929 ok(ret == 2, "Failed to send buffer %d err %d\n", ret, GetLastError());
3931 Sleep(200);
3932 shutdown(dst2, SD_SEND);
3933 Sleep(200);
3935 /* Some of the below are technically todo_wine, but our event sequence is still valid, so to prevent
3936 regressions, don't mark them as todo_wine, and mark windows as broken */
3937 broken_seq[0] = read_close_seq;
3938 broken_seq[1] = close_seq;
3939 broken_seq[2] = NULL;
3940 ok_event_seq(src2, hEvent2, read_seq, broken_seq, 0);
3942 ret = recv(src2, buffer, 1, 0);
3943 ok(ret == 1 || broken(!ret), "Failed to empty buffer: %d - %d\n", ret, GetLastError());
3944 broken_seq[0] = close_seq; /* win98 */
3945 broken_seq[1] = NULL;
3946 ok_event_seq(src2, hEvent2, read_seq, broken_seq, 0);
3948 ret = recv(src2, buffer, 1, 0);
3949 ok(ret == 1 || broken(!ret), "Failed to empty buffer: %d - %d\n", ret, GetLastError());
3950 broken_seq[0] = empty_seq;
3951 broken_seq[1] = NULL;
3952 ok_event_seq(src2, hEvent2, close_seq, broken_seq, 0);
3954 ret = send(src2, "1", 1, 0);
3955 ok(ret == 1, "Sending to half-closed socket failed %d err %d\n", ret, GetLastError());
3956 ok_event_seq(src2, hEvent2, empty_seq, NULL, 0);
3958 ret = send(src2, "1", 1, 0);
3959 ok(ret == 1, "Sending to half-closed socket failed %d err %d\n", ret, GetLastError());
3960 ok_event_seq(src2, hEvent2, empty_seq, NULL, 0);
3962 end:
3963 if (src != INVALID_SOCKET)
3965 flush_events(src, hEvent);
3966 closesocket(src);
3968 if (src2 != INVALID_SOCKET)
3970 flush_events(src2, hEvent2);
3971 closesocket(src2);
3973 HeapFree(GetProcessHeap(), 0, buffer);
3974 if (server != INVALID_SOCKET)
3975 closesocket(server);
3976 if (dst != INVALID_SOCKET)
3977 closesocket(dst);
3978 if (dst2 != INVALID_SOCKET)
3979 closesocket(dst2);
3980 if (hThread != NULL)
3981 CloseHandle(hThread);
3982 if (hWnd != NULL)
3983 DestroyWindow(hWnd);
3984 if (hEvent != NULL)
3985 CloseHandle(hEvent);
3986 if (hEvent2 != NULL)
3987 CloseHandle(hEvent2);
3988 if (ov.hEvent != NULL)
3989 CloseHandle(ov.hEvent);
3990 if (ov2.hEvent != NULL)
3991 CloseHandle(ov2.hEvent);
3994 static void test_ipv6only(void)
3996 SOCKET v4 = INVALID_SOCKET,
3997 v6 = INVALID_SOCKET;
3998 struct sockaddr_in sin4;
3999 struct sockaddr_in6 sin6;
4000 int ret;
4002 memset(&sin4, 0, sizeof(sin4));
4003 sin4.sin_family = AF_INET;
4004 sin4.sin_port = htons(SERVERPORT);
4006 memset(&sin6, 0, sizeof(sin6));
4007 sin6.sin6_family = AF_INET6;
4008 sin6.sin6_port = htons(SERVERPORT);
4010 v6 = socket(AF_INET6, SOCK_STREAM, IPPROTO_TCP);
4011 if (v6 == INVALID_SOCKET) {
4012 skip("Could not create IPv6 socket (LastError: %d; %d expected if IPv6 not available).\n",
4013 WSAGetLastError(), WSAEAFNOSUPPORT);
4014 goto end;
4016 ret = bind(v6, (struct sockaddr*)&sin6, sizeof(sin6));
4017 if (ret) {
4018 skip("Could not bind IPv6 address (LastError: %d).\n",
4019 WSAGetLastError());
4020 goto end;
4023 v4 = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
4024 if (v4 == INVALID_SOCKET) {
4025 skip("Could not create IPv4 socket (LastError: %d).\n",
4026 WSAGetLastError());
4027 goto end;
4029 ret = bind(v4, (struct sockaddr*)&sin4, sizeof(sin4));
4030 ok(!ret, "Could not bind IPv4 address (LastError: %d; %d expected if IPv6 binds to IPv4 as well).\n",
4031 WSAGetLastError(), WSAEADDRINUSE);
4033 end:
4034 if (v4 != INVALID_SOCKET)
4035 closesocket(v4);
4036 if (v6 != INVALID_SOCKET)
4037 closesocket(v6);
4040 static void test_WSASendTo(void)
4042 SOCKET s;
4043 struct sockaddr_in addr;
4044 char buf[12] = "hello world";
4045 WSABUF data_buf;
4046 DWORD bytesSent;
4047 int ret;
4049 addr.sin_family = AF_INET;
4050 addr.sin_port = htons(139);
4051 addr.sin_addr.s_addr = inet_addr("127.0.0.1");
4052 data_buf.len = sizeof(buf);
4053 data_buf.buf = buf;
4055 if( (s = socket(AF_INET, SOCK_DGRAM, 0)) == INVALID_SOCKET) {
4056 ok(0, "socket() failed error: %d\n", WSAGetLastError());
4057 return;
4060 WSASetLastError(12345);
4061 ret = WSASendTo(INVALID_SOCKET, &data_buf, 1, NULL, 0, (struct sockaddr*)&addr, sizeof(addr), NULL, NULL);
4062 ok(ret == SOCKET_ERROR && WSAGetLastError() == WSAENOTSOCK,
4063 "WSASendTo() failed: %d/%d\n", ret, WSAGetLastError());
4065 WSASetLastError(12345);
4066 ret = WSASendTo(s, &data_buf, 1, NULL, 0, (struct sockaddr*)&addr, sizeof(addr), NULL, NULL);
4067 ok(ret == SOCKET_ERROR && WSAGetLastError() == WSAEFAULT,
4068 "WSASendTo() failed: %d/%d\n", ret, WSAGetLastError());
4070 WSASetLastError(12345);
4071 if(WSASendTo(s, &data_buf, 1, &bytesSent, 0, (struct sockaddr*)&addr, sizeof(addr), NULL, NULL)) {
4072 ok(0, "WSASendTo() failed error: %d\n", WSAGetLastError());
4073 return;
4075 ok(!WSAGetLastError(), "WSAGetLastError() should return zero after "
4076 "a successful call to WSASendTo()\n");
4079 static DWORD WINAPI recv_thread(LPVOID arg)
4081 SOCKET sock = *(SOCKET *)arg;
4082 char buffer[32];
4083 WSABUF wsa;
4084 WSAOVERLAPPED ov;
4085 DWORD flags = 0;
4087 wsa.buf = buffer;
4088 wsa.len = sizeof(buffer);
4089 ov.hEvent = WSACreateEvent();
4090 WSARecv(sock, &wsa, 1, NULL, &flags, &ov, NULL);
4092 WaitForSingleObject(ov.hEvent, 1000);
4093 WSACloseEvent(ov.hEvent);
4094 return 0;
4097 static void test_WSARecv(void)
4099 SOCKET src, dest, server = INVALID_SOCKET;
4100 char buf[20];
4101 WSABUF bufs;
4102 WSAOVERLAPPED ov;
4103 DWORD bytesReturned, flags, id;
4104 struct linger ling;
4105 struct sockaddr_in addr;
4106 int iret, len;
4107 DWORD dwret;
4108 BOOL bret;
4109 HANDLE thread;
4111 memset(&ov, 0, sizeof(ov));
4113 tcp_socketpair(&src, &dest);
4114 if (src == INVALID_SOCKET || dest == INVALID_SOCKET)
4116 skip("failed to create sockets\n");
4117 goto end;
4120 bufs.len = sizeof(buf);
4121 bufs.buf = buf;
4122 flags = 0;
4124 ov.hEvent = CreateEvent(NULL, FALSE, FALSE, NULL);
4125 ok(ov.hEvent != NULL, "could not create event object, errno = %d\n", GetLastError());
4126 if (!ov.hEvent)
4127 goto end;
4129 ling.l_onoff = 1;
4130 ling.l_linger = 0;
4131 iret = setsockopt (src, SOL_SOCKET, SO_LINGER, (char *) &ling, sizeof(ling));
4132 ok(!iret, "Failed to set linger %d\n", GetLastError());
4134 iret = WSARecv(dest, &bufs, 1, NULL, &flags, &ov, NULL);
4135 ok(iret == SOCKET_ERROR && GetLastError() == ERROR_IO_PENDING, "WSARecv failed - %d error %d\n", iret, GetLastError());
4137 iret = WSARecv(dest, &bufs, 1, &bytesReturned, &flags, &ov, NULL);
4138 ok(iret == SOCKET_ERROR && GetLastError() == ERROR_IO_PENDING, "WSARecv failed - %d error %d\n", iret, GetLastError());
4140 closesocket(src);
4141 src = INVALID_SOCKET;
4143 dwret = WaitForSingleObject(ov.hEvent, 1000);
4144 ok(dwret == WAIT_OBJECT_0, "Waiting for disconnect event failed with %d + errno %d\n", dwret, GetLastError());
4146 bret = GetOverlappedResult((HANDLE)dest, &ov, &bytesReturned, FALSE);
4147 todo_wine ok(!bret && (GetLastError() == ERROR_NETNAME_DELETED || broken(GetLastError() == ERROR_IO_INCOMPLETE) /* win9x */),
4148 "Did not get disconnect event: %d, error %d\n", bret, GetLastError());
4149 ok(bytesReturned == 0, "Bytes received is %d\n", bytesReturned);
4151 src = WSASocketW(AF_INET, SOCK_STREAM, IPPROTO_TCP, NULL, 0, 0);
4152 ok(src != INVALID_SOCKET, "failed to create socket %d\n", WSAGetLastError());
4153 if (src == INVALID_SOCKET) goto end;
4155 server = WSASocketW(AF_INET, SOCK_STREAM, IPPROTO_TCP, NULL, 0, WSA_FLAG_OVERLAPPED);
4156 ok(server != INVALID_SOCKET, "failed to create socket %d\n", WSAGetLastError());
4157 if (server == INVALID_SOCKET) goto end;
4159 memset(&addr, 0, sizeof(addr));
4160 addr.sin_family = AF_INET;
4161 addr.sin_addr.s_addr = inet_addr("127.0.0.1");
4162 iret = bind(server, (struct sockaddr *)&addr, sizeof(addr));
4163 if (iret) goto end;
4165 len = sizeof(addr);
4166 iret = getsockname(server, (struct sockaddr *)&addr, &len);
4167 if (iret) goto end;
4169 iret = listen(server, 1);
4170 if (iret) goto end;
4172 iret = connect(src, (struct sockaddr *)&addr, sizeof(addr));
4173 if (iret) goto end;
4175 len = sizeof(addr);
4176 dest = accept(server, (struct sockaddr *)&addr, &len);
4177 ok(dest != INVALID_SOCKET, "failed to create socket %d\n", WSAGetLastError());
4178 if (dest == INVALID_SOCKET) goto end;
4180 send(src, "test message", sizeof("test message"), 0);
4181 thread = CreateThread(NULL, 0, recv_thread, &dest, 0, &id);
4182 CloseHandle(thread);
4184 end:
4185 if (server != INVALID_SOCKET)
4186 closesocket(server);
4187 if (dest != INVALID_SOCKET)
4188 closesocket(dest);
4189 if (src != INVALID_SOCKET)
4190 closesocket(src);
4191 if (ov.hEvent)
4192 WSACloseEvent(ov.hEvent);
4195 static void test_GetAddrInfoW(void)
4197 static const WCHAR port[] = {'8','0',0};
4198 static const WCHAR empty[] = {0};
4199 static const WCHAR localhost[] = {'l','o','c','a','l','h','o','s','t',0};
4200 static const WCHAR zero[] = {'0',0};
4201 int ret;
4202 ADDRINFOW *result, hint;
4204 if (!pGetAddrInfoW || !pFreeAddrInfoW)
4206 win_skip("GetAddrInfoW and/or FreeAddrInfoW not present\n");
4207 return;
4209 memset(&hint, 0, sizeof(ADDRINFOW));
4211 ret = pGetAddrInfoW(NULL, NULL, NULL, &result);
4212 ok(ret == WSAHOST_NOT_FOUND, "got %d expected WSAHOST_NOT_FOUND\n", ret);
4214 result = NULL;
4215 ret = pGetAddrInfoW(empty, NULL, NULL, &result);
4216 ok(!ret, "GetAddrInfoW failed with %d\n", WSAGetLastError());
4217 ok(result != NULL, "GetAddrInfoW failed\n");
4218 pFreeAddrInfoW(result);
4220 result = NULL;
4221 ret = pGetAddrInfoW(NULL, zero, NULL, &result);
4222 ok(!ret, "GetAddrInfoW failed with %d\n", WSAGetLastError());
4223 ok(result != NULL, "GetAddrInfoW failed\n");
4224 pFreeAddrInfoW(result);
4226 result = NULL;
4227 ret = pGetAddrInfoW(empty, zero, NULL, &result);
4228 ok(!ret, "GetAddrInfoW failed with %d\n", WSAGetLastError());
4229 ok(result != NULL, "GetAddrInfoW failed\n");
4230 pFreeAddrInfoW(result);
4232 result = NULL;
4233 ret = pGetAddrInfoW(localhost, NULL, NULL, &result);
4234 ok(!ret, "GetAddrInfoW failed with %d\n", WSAGetLastError());
4235 pFreeAddrInfoW(result);
4237 result = NULL;
4238 ret = pGetAddrInfoW(localhost, empty, NULL, &result);
4239 ok(!ret, "GetAddrInfoW failed with %d\n", WSAGetLastError());
4240 pFreeAddrInfoW(result);
4242 result = NULL;
4243 ret = pGetAddrInfoW(localhost, zero, NULL, &result);
4244 ok(!ret, "GetAddrInfoW failed with %d\n", WSAGetLastError());
4245 pFreeAddrInfoW(result);
4247 result = NULL;
4248 ret = pGetAddrInfoW(localhost, port, NULL, &result);
4249 ok(!ret, "GetAddrInfoW failed with %d\n", WSAGetLastError());
4250 pFreeAddrInfoW(result);
4252 result = NULL;
4253 ret = pGetAddrInfoW(localhost, port, &hint, &result);
4254 ok(!ret, "GetAddrInfoW failed with %d\n", WSAGetLastError());
4255 pFreeAddrInfoW(result);
4258 static void test_getaddrinfo(void)
4260 int ret;
4261 ADDRINFOA *result, hint;
4263 if (!pgetaddrinfo || !pfreeaddrinfo)
4265 win_skip("getaddrinfo and/or freeaddrinfo not present\n");
4266 return;
4268 memset(&hint, 0, sizeof(ADDRINFOA));
4270 ret = pgetaddrinfo(NULL, NULL, NULL, &result);
4271 ok(ret == WSAHOST_NOT_FOUND, "got %d expected WSAHOST_NOT_FOUND\n", ret);
4273 result = NULL;
4274 ret = pgetaddrinfo("", NULL, NULL, &result);
4275 ok(!ret, "getaddrinfo failed with %d\n", WSAGetLastError());
4276 ok(result != NULL, "getaddrinfo failed\n");
4277 pfreeaddrinfo(result);
4279 result = NULL;
4280 ret = pgetaddrinfo(NULL, "0", NULL, &result);
4281 ok(!ret, "getaddrinfo failed with %d\n", WSAGetLastError());
4282 ok(result != NULL, "getaddrinfo failed\n");
4283 pfreeaddrinfo(result);
4285 result = NULL;
4286 ret = pgetaddrinfo("", "0", NULL, &result);
4287 ok(!ret, "getaddrinfo failed with %d\n", WSAGetLastError());
4288 ok(result != NULL, "getaddrinfo failed\n");
4289 pfreeaddrinfo(result);
4291 result = NULL;
4292 ret = pgetaddrinfo("localhost", NULL, NULL, &result);
4293 ok(!ret, "getaddrinfo failed with %d\n", WSAGetLastError());
4294 pfreeaddrinfo(result);
4296 result = NULL;
4297 ret = pgetaddrinfo("localhost", "", NULL, &result);
4298 ok(!ret, "getaddrinfo failed with %d\n", WSAGetLastError());
4299 pfreeaddrinfo(result);
4301 result = NULL;
4302 ret = pgetaddrinfo("localhost", "0", NULL, &result);
4303 ok(!ret, "getaddrinfo failed with %d\n", WSAGetLastError());
4304 pfreeaddrinfo(result);
4306 result = NULL;
4307 ret = pgetaddrinfo("localhost", "80", NULL, &result);
4308 ok(!ret, "getaddrinfo failed with %d\n", WSAGetLastError());
4309 pfreeaddrinfo(result);
4311 result = NULL;
4312 ret = pgetaddrinfo("localhost", "80", &hint, &result);
4313 ok(!ret, "getaddrinfo failed with %d\n", WSAGetLastError());
4314 pfreeaddrinfo(result);
4317 static void test_ConnectEx(void)
4319 SOCKET listener = INVALID_SOCKET;
4320 SOCKET acceptor = INVALID_SOCKET;
4321 SOCKET connector = INVALID_SOCKET;
4322 struct sockaddr_in address, conaddress;
4323 int addrlen;
4324 OVERLAPPED overlapped;
4325 LPFN_CONNECTEX pConnectEx;
4326 GUID connectExGuid = WSAID_CONNECTEX;
4327 DWORD bytesReturned;
4328 char buffer[1024];
4329 BOOL bret;
4330 DWORD dwret;
4331 int iret;
4333 memset(&overlapped, 0, sizeof(overlapped));
4335 listener = socket(AF_INET, SOCK_STREAM, 0);
4336 if (listener == INVALID_SOCKET) {
4337 skip("could not create listener socket, error %d\n", WSAGetLastError());
4338 goto end;
4341 connector = socket(AF_INET, SOCK_STREAM, 0);
4342 if (connector == INVALID_SOCKET) {
4343 skip("could not create connector socket, error %d\n", WSAGetLastError());
4344 goto end;
4347 memset(&address, 0, sizeof(address));
4348 address.sin_family = AF_INET;
4349 address.sin_addr.s_addr = inet_addr("127.0.0.1");
4350 iret = bind(listener, (struct sockaddr*)&address, sizeof(address));
4351 if (iret != 0) {
4352 skip("failed to bind, error %d\n", WSAGetLastError());
4353 goto end;
4356 addrlen = sizeof(address);
4357 iret = getsockname(listener, (struct sockaddr*)&address, &addrlen);
4358 if (iret != 0) {
4359 skip("failed to lookup bind address, error %d\n", WSAGetLastError());
4360 goto end;
4363 if (set_blocking(listener, TRUE)) {
4364 skip("couldn't make socket non-blocking, error %d\n", WSAGetLastError());
4365 goto end;
4368 iret = WSAIoctl(connector, SIO_GET_EXTENSION_FUNCTION_POINTER, &connectExGuid, sizeof(connectExGuid),
4369 &pConnectEx, sizeof(pConnectEx), &bytesReturned, NULL, NULL);
4370 if (iret) {
4371 win_skip("WSAIoctl failed to get ConnectEx with ret %d + errno %d\n", iret, WSAGetLastError());
4372 goto end;
4375 bret = pConnectEx(INVALID_SOCKET, (struct sockaddr*)&address, addrlen, NULL, 0, &bytesReturned, &overlapped);
4376 ok(bret == FALSE && WSAGetLastError() == WSAENOTSOCK, "ConnectEx on invalid socket "
4377 "returned %d + errno %d\n", bret, WSAGetLastError());
4379 bret = pConnectEx(connector, (struct sockaddr*)&address, addrlen, NULL, 0, &bytesReturned, &overlapped);
4380 todo_wine ok(bret == FALSE && WSAGetLastError() == WSAEINVAL, "ConnectEx on a unbound socket "
4381 "returned %d + errno %d\n", bret, WSAGetLastError());
4382 if (bret == TRUE || WSAGetLastError() != WSAEINVAL)
4384 acceptor = accept(listener, NULL, NULL);
4385 if (acceptor != INVALID_SOCKET) {
4386 closesocket(acceptor);
4387 acceptor = INVALID_SOCKET;
4390 closesocket(connector);
4391 connector = socket(AF_INET, SOCK_STREAM, 0);
4392 if (connector == INVALID_SOCKET) {
4393 skip("could not create connector socket, error %d\n", WSAGetLastError());
4394 goto end;
4398 /* ConnectEx needs a bound socket */
4399 memset(&conaddress, 0, sizeof(conaddress));
4400 conaddress.sin_family = AF_INET;
4401 conaddress.sin_addr.s_addr = inet_addr("127.0.0.1");
4402 iret = bind(connector, (struct sockaddr*)&conaddress, sizeof(conaddress));
4403 if (iret != 0) {
4404 skip("failed to bind, error %d\n", WSAGetLastError());
4405 goto end;
4408 bret = pConnectEx(connector, (struct sockaddr*)&address, addrlen, NULL, 0, &bytesReturned, NULL);
4409 ok(bret == FALSE && WSAGetLastError() == ERROR_INVALID_PARAMETER, "ConnectEx on a NULL overlapped "
4410 "returned %d + errno %d\n", bret, WSAGetLastError());
4412 overlapped.hEvent = CreateEvent(NULL, FALSE, FALSE, NULL);
4413 if (overlapped.hEvent == NULL) {
4414 skip("could not create event object, errno = %d\n", GetLastError());
4415 goto end;
4418 iret = listen(listener, 1);
4419 if (iret != 0) {
4420 skip("listening failed, errno = %d\n", WSAGetLastError());
4421 goto end;
4424 bret = pConnectEx(connector, (struct sockaddr*)&address, addrlen, NULL, 0, &bytesReturned, &overlapped);
4425 ok(bret == FALSE && WSAGetLastError() == ERROR_IO_PENDING, "ConnectEx failed: "
4426 "returned %d + errno %d\n", bret, WSAGetLastError());
4427 dwret = WaitForSingleObject(overlapped.hEvent, 15000);
4428 ok(dwret == WAIT_OBJECT_0, "Waiting for connect event failed with %d + errno %d\n", dwret, GetLastError());
4430 bret = GetOverlappedResult((HANDLE)connector, &overlapped, &bytesReturned, FALSE);
4431 ok(bret, "Connecting failed, error %d\n", GetLastError());
4432 ok(bytesReturned == 0, "Bytes sent is %d\n", bytesReturned);
4434 closesocket(connector);
4435 connector = socket(AF_INET, SOCK_STREAM, 0);
4436 if (connector == INVALID_SOCKET) {
4437 skip("could not create connector socket, error %d\n", WSAGetLastError());
4438 goto end;
4440 /* ConnectEx needs a bound socket */
4441 memset(&conaddress, 0, sizeof(conaddress));
4442 conaddress.sin_family = AF_INET;
4443 conaddress.sin_addr.s_addr = inet_addr("127.0.0.1");
4444 iret = bind(connector, (struct sockaddr*)&conaddress, sizeof(conaddress));
4445 if (iret != 0) {
4446 skip("failed to bind, error %d\n", WSAGetLastError());
4447 goto end;
4450 acceptor = accept(listener, NULL, NULL);
4451 if (acceptor != INVALID_SOCKET) {
4452 closesocket(acceptor);
4455 buffer[0] = '1';
4456 buffer[1] = '2';
4457 buffer[2] = '3';
4458 bret = pConnectEx(connector, (struct sockaddr*)&address, addrlen, buffer, 3, &bytesReturned, &overlapped);
4459 ok(bret == FALSE && WSAGetLastError() == ERROR_IO_PENDING, "ConnectEx failed: "
4460 "returned %d + errno %d\n", bret, WSAGetLastError());
4461 dwret = WaitForSingleObject(overlapped.hEvent, 15000);
4462 ok(dwret == WAIT_OBJECT_0, "Waiting for connect event failed with %d + errno %d\n", dwret, GetLastError());
4464 bret = GetOverlappedResult((HANDLE)connector, &overlapped, &bytesReturned, FALSE);
4465 ok(bret, "Connecting failed, error %d\n", GetLastError());
4466 ok(bytesReturned == 3, "Bytes sent is %d\n", bytesReturned);
4468 acceptor = accept(listener, NULL, NULL);
4469 ok(acceptor != INVALID_SOCKET, "could not accept socket error %d\n", WSAGetLastError());
4471 bytesReturned = recv(acceptor, buffer, 3, 0);
4472 buffer[4] = 0;
4473 ok(bytesReturned == 3, "Didn't get all sent data, got only %d\n", bytesReturned);
4474 ok(buffer[0] == '1' && buffer[1] == '2' && buffer[2] == '3',
4475 "Failed to get the right data, expected '123', got '%s'\n", buffer);
4477 closesocket(connector);
4478 connector = socket(AF_INET, SOCK_STREAM, 0);
4479 if (connector == INVALID_SOCKET) {
4480 skip("could not create connector socket, error %d\n", WSAGetLastError());
4481 goto end;
4483 /* ConnectEx needs a bound socket */
4484 memset(&conaddress, 0, sizeof(conaddress));
4485 conaddress.sin_family = AF_INET;
4486 conaddress.sin_addr.s_addr = inet_addr("127.0.0.1");
4487 iret = bind(connector, (struct sockaddr*)&conaddress, sizeof(conaddress));
4488 if (iret != 0) {
4489 skip("failed to bind, error %d\n", WSAGetLastError());
4490 goto end;
4493 if (acceptor != INVALID_SOCKET) {
4494 closesocket(acceptor);
4495 acceptor = INVALID_SOCKET;
4498 /* Connect with error */
4499 closesocket(listener);
4500 listener = INVALID_SOCKET;
4502 address.sin_port = htons(1);
4504 bret = pConnectEx(connector, (struct sockaddr*)&address, addrlen, NULL, 0, &bytesReturned, &overlapped);
4505 ok(bret == FALSE && GetLastError(), "ConnectEx to bad destination failed: "
4506 "returned %d + errno %d\n", bret, GetLastError());
4508 if (GetLastError() == ERROR_IO_PENDING)
4510 dwret = WaitForSingleObject(overlapped.hEvent, 15000);
4511 ok(dwret == WAIT_OBJECT_0, "Waiting for connect event failed with %d + errno %d\n", dwret, GetLastError());
4513 bret = GetOverlappedResult((HANDLE)connector, &overlapped, &bytesReturned, FALSE);
4514 ok(bret == FALSE && GetLastError() == ERROR_CONNECTION_REFUSED,
4515 "Connecting to a disconnected host returned error %d - %d\n", bret, WSAGetLastError());
4517 else {
4518 ok(GetLastError() == WSAECONNREFUSED,
4519 "Connecting to a disconnected host returned error %d - %d\n", bret, WSAGetLastError());
4522 end:
4523 if (overlapped.hEvent)
4524 WSACloseEvent(overlapped.hEvent);
4525 if (listener != INVALID_SOCKET)
4526 closesocket(listener);
4527 if (acceptor != INVALID_SOCKET)
4528 closesocket(acceptor);
4529 if (connector != INVALID_SOCKET)
4530 closesocket(connector);
4533 static void test_AcceptEx(void)
4535 SOCKET listener = INVALID_SOCKET;
4536 SOCKET acceptor = INVALID_SOCKET;
4537 SOCKET connector = INVALID_SOCKET;
4538 SOCKET connector2 = INVALID_SOCKET;
4539 struct sockaddr_in bindAddress, peerAddress, *readBindAddress, *readRemoteAddress;
4540 int socklen, optlen;
4541 GUID acceptExGuid = WSAID_ACCEPTEX, getAcceptExGuid = WSAID_GETACCEPTEXSOCKADDRS;
4542 LPFN_ACCEPTEX pAcceptEx = NULL;
4543 LPFN_GETACCEPTEXSOCKADDRS pGetAcceptExSockaddrs = NULL;
4544 fd_set fds_accept, fds_send;
4545 struct timeval timeout = {0,10}; /* wait for 10 milliseconds */
4546 int got, conn1, i;
4547 DWORD bytesReturned, connect_time;
4548 char buffer[1024], ipbuffer[32];
4549 OVERLAPPED overlapped;
4550 int iret, localSize = sizeof(struct sockaddr_in), remoteSize = localSize;
4551 BOOL bret;
4552 DWORD dwret;
4554 memset(&overlapped, 0, sizeof(overlapped));
4556 listener = socket(AF_INET, SOCK_STREAM, 0);
4557 if (listener == INVALID_SOCKET) {
4558 skip("could not create listener socket, error %d\n", WSAGetLastError());
4559 goto end;
4562 acceptor = socket(AF_INET, SOCK_STREAM, 0);
4563 if (acceptor == INVALID_SOCKET) {
4564 skip("could not create acceptor socket, error %d\n", WSAGetLastError());
4565 goto end;
4568 connector = socket(AF_INET, SOCK_STREAM, 0);
4569 if (connector == INVALID_SOCKET) {
4570 skip("could not create connector socket, error %d\n", WSAGetLastError());
4571 goto end;
4574 memset(&bindAddress, 0, sizeof(bindAddress));
4575 bindAddress.sin_family = AF_INET;
4576 bindAddress.sin_addr.s_addr = inet_addr("127.0.0.1");
4577 iret = bind(listener, (struct sockaddr*)&bindAddress, sizeof(bindAddress));
4578 if (iret != 0) {
4579 skip("failed to bind, error %d\n", WSAGetLastError());
4580 goto end;
4583 socklen = sizeof(bindAddress);
4584 iret = getsockname(listener, (struct sockaddr*)&bindAddress, &socklen);
4585 if (iret != 0) {
4586 skip("failed to lookup bind address, error %d\n", WSAGetLastError());
4587 goto end;
4590 if (set_blocking(listener, FALSE)) {
4591 skip("couldn't make socket non-blocking, error %d\n", WSAGetLastError());
4592 goto end;
4595 iret = WSAIoctl(listener, SIO_GET_EXTENSION_FUNCTION_POINTER, &acceptExGuid, sizeof(acceptExGuid),
4596 &pAcceptEx, sizeof(pAcceptEx), &bytesReturned, NULL, NULL);
4597 if (iret) {
4598 skip("WSAIoctl failed to get AcceptEx with ret %d + errno %d\n", iret, WSAGetLastError());
4599 goto end;
4602 iret = WSAIoctl(listener, SIO_GET_EXTENSION_FUNCTION_POINTER, &getAcceptExGuid, sizeof(getAcceptExGuid),
4603 &pGetAcceptExSockaddrs, sizeof(pGetAcceptExSockaddrs), &bytesReturned, NULL, NULL);
4604 if (iret) {
4605 skip("WSAIoctl failed to get GetAcceptExSockaddrs with ret %d + errno %d\n", iret, WSAGetLastError());
4606 goto end;
4609 bret = pAcceptEx(INVALID_SOCKET, acceptor, buffer, sizeof(buffer) - 2*(sizeof(struct sockaddr_in) + 16),
4610 sizeof(struct sockaddr_in) + 16, sizeof(struct sockaddr_in) + 16,
4611 &bytesReturned, &overlapped);
4612 ok(bret == FALSE && WSAGetLastError() == WSAENOTSOCK, "AcceptEx on invalid listening socket "
4613 "returned %d + errno %d\n", bret, WSAGetLastError());
4615 bret = pAcceptEx(listener, INVALID_SOCKET, buffer, sizeof(buffer) - 2*(sizeof(struct sockaddr_in) + 16),
4616 sizeof(struct sockaddr_in) + 16, sizeof(struct sockaddr_in) + 16,
4617 &bytesReturned, &overlapped);
4618 ok(bret == FALSE && WSAGetLastError() == WSAEINVAL, "AcceptEx on invalid accepting socket "
4619 "returned %d + errno %d\n", bret, WSAGetLastError());
4621 bret = pAcceptEx(listener, acceptor, NULL, sizeof(buffer) - 2*(sizeof(struct sockaddr_in) + 16),
4622 sizeof(struct sockaddr_in) + 16, sizeof(struct sockaddr_in) + 16,
4623 &bytesReturned, &overlapped);
4624 ok(bret == FALSE &&
4625 (WSAGetLastError() == WSAEINVAL ||
4626 broken(WSAGetLastError() == WSAEFAULT)), /* NT4 */
4627 "AcceptEx on NULL buffer returned %d + errno %d\n", bret, WSAGetLastError());
4629 bret = pAcceptEx(listener, acceptor, buffer, 0, 0, sizeof(struct sockaddr_in) + 16,
4630 &bytesReturned, &overlapped);
4631 todo_wine ok(bret == FALSE && WSAGetLastError() == WSAEINVAL, "AcceptEx on too small local address size "
4632 "returned %d + errno %d\n", bret, WSAGetLastError());
4634 bret = pAcceptEx(listener, acceptor, buffer, 0, sizeof(struct sockaddr_in) + 16, 0,
4635 &bytesReturned, &overlapped);
4636 todo_wine ok(bret == FALSE && WSAGetLastError() == WSAEINVAL, "AcceptEx on too small remote address size "
4637 "returned %d + errno %d\n", bret, WSAGetLastError());
4639 bret = pAcceptEx(listener, acceptor, buffer, 0,
4640 sizeof(struct sockaddr_in) + 16, sizeof(struct sockaddr_in) + 16,
4641 &bytesReturned, NULL);
4642 ok(bret == FALSE && WSAGetLastError() == ERROR_INVALID_PARAMETER, "AcceptEx on a NULL overlapped "
4643 "returned %d + errno %d\n", bret, WSAGetLastError());
4645 bret = pAcceptEx(listener, acceptor, buffer, sizeof(buffer) - 2*(sizeof(struct sockaddr_in) + 16),
4646 sizeof(struct sockaddr_in) + 16, sizeof(struct sockaddr_in) + 16,
4647 &bytesReturned, &overlapped);
4648 todo_wine ok(bret == FALSE && WSAGetLastError() == WSAEINVAL, "AcceptEx on a non-listening socket "
4649 "returned %d + errno %d\n", bret, WSAGetLastError());
4651 iret = listen(listener, 5);
4652 if (iret != 0) {
4653 skip("listening failed, errno = %d\n", WSAGetLastError());
4654 goto end;
4657 overlapped.hEvent = CreateEvent(NULL, FALSE, FALSE, NULL);
4658 if (overlapped.hEvent == NULL) {
4659 skip("could not create event object, errno = %d\n", GetLastError());
4660 goto end;
4663 bret = pAcceptEx(listener, acceptor, buffer, 0,
4664 sizeof(struct sockaddr_in) + 16, sizeof(struct sockaddr_in) + 16,
4665 &bytesReturned, &overlapped);
4666 ok(bret == FALSE && WSAGetLastError() == ERROR_IO_PENDING, "AcceptEx returned %d + errno %d\n", bret, WSAGetLastError());
4668 bret = pAcceptEx(listener, acceptor, buffer, 0,
4669 sizeof(struct sockaddr_in) + 16, sizeof(struct sockaddr_in) + 16,
4670 &bytesReturned, &overlapped);
4671 todo_wine ok((bret == FALSE && WSAGetLastError() == WSAEINVAL) || broken(bret == FALSE && WSAGetLastError() == ERROR_IO_PENDING) /* NT4 */,
4672 "AcceptEx on already pending socket returned %d + errno %d\n", bret, WSAGetLastError());
4673 if (bret == FALSE && WSAGetLastError() == ERROR_IO_PENDING) {
4674 /* We need to cancel this call, otherwise things fail */
4675 bret = CancelIo((HANDLE) listener);
4676 ok(bret, "Failed to cancel failed test. Bailing...\n");
4677 if (!bret) return;
4678 WaitForSingleObject(overlapped.hEvent, 0);
4680 bret = pAcceptEx(listener, acceptor, buffer, 0,
4681 sizeof(struct sockaddr_in) + 16, sizeof(struct sockaddr_in) + 16,
4682 &bytesReturned, &overlapped);
4683 ok(bret == FALSE && WSAGetLastError() == ERROR_IO_PENDING, "AcceptEx returned %d + errno %d\n", bret, WSAGetLastError());
4686 iret = connect(acceptor, (struct sockaddr*)&bindAddress, sizeof(bindAddress));
4687 todo_wine ok((iret == SOCKET_ERROR && WSAGetLastError() == WSAEINVAL) || broken(!iret) /* NT4 */,
4688 "connecting to acceptex acceptor succeeded? return %d + errno %d\n", iret, WSAGetLastError());
4689 if (!iret || (iret == SOCKET_ERROR && WSAGetLastError() == WSAEWOULDBLOCK)) {
4690 /* We need to cancel this call, otherwise things fail */
4691 closesocket(acceptor);
4692 acceptor = socket(AF_INET, SOCK_STREAM, 0);
4693 if (acceptor == INVALID_SOCKET) {
4694 skip("could not create acceptor socket, error %d\n", WSAGetLastError());
4695 goto end;
4698 bret = CancelIo((HANDLE) listener);
4699 ok(bret, "Failed to cancel failed test. Bailing...\n");
4700 if (!bret) return;
4702 bret = pAcceptEx(listener, acceptor, buffer, 0,
4703 sizeof(struct sockaddr_in) + 16, sizeof(struct sockaddr_in) + 16,
4704 &bytesReturned, &overlapped);
4705 ok(bret == FALSE && WSAGetLastError() == ERROR_IO_PENDING, "AcceptEx returned %d + errno %d\n", bret, WSAGetLastError());
4708 iret = connect(connector, (struct sockaddr*)&bindAddress, sizeof(bindAddress));
4709 ok(iret == 0, "connecting to accepting socket failed, error %d\n", WSAGetLastError());
4711 dwret = WaitForSingleObject(overlapped.hEvent, INFINITE);
4712 ok(dwret == WAIT_OBJECT_0, "Waiting for accept event failed with %d + errno %d\n", dwret, GetLastError());
4714 bret = GetOverlappedResult((HANDLE)listener, &overlapped, &bytesReturned, FALSE);
4715 ok(bret, "GetOverlappedResult failed, error %d\n", GetLastError());
4716 ok(bytesReturned == 0, "bytesReturned isn't supposed to be %d\n", bytesReturned);
4718 closesocket(connector);
4719 connector = INVALID_SOCKET;
4720 closesocket(acceptor);
4722 /* Test short reads */
4724 acceptor = socket(AF_INET, SOCK_STREAM, 0);
4725 if (acceptor == INVALID_SOCKET) {
4726 skip("could not create acceptor socket, error %d\n", WSAGetLastError());
4727 goto end;
4729 connector = socket(AF_INET, SOCK_STREAM, 0);
4730 if (connector == INVALID_SOCKET) {
4731 skip("could not create connector socket, error %d\n", WSAGetLastError());
4732 goto end;
4734 bret = pAcceptEx(listener, acceptor, buffer, 2,
4735 sizeof(struct sockaddr_in) + 16, sizeof(struct sockaddr_in) + 16,
4736 &bytesReturned, &overlapped);
4737 ok(bret == FALSE && WSAGetLastError() == ERROR_IO_PENDING, "AcceptEx returned %d + errno %d\n", bret, WSAGetLastError());
4739 connect_time = 0xdeadbeef;
4740 optlen = sizeof(connect_time);
4741 iret = getsockopt(connector, SOL_SOCKET, SO_CONNECT_TIME, (char *)&connect_time, &optlen);
4742 ok(!iret, "getsockopt failed %d\n", WSAGetLastError());
4743 ok(connect_time == ~0u, "unexpected connect time %u\n", connect_time);
4745 iret = connect(connector, (struct sockaddr*)&bindAddress, sizeof(bindAddress));
4746 ok(iret == 0, "connecting to accepting socket failed, error %d\n", WSAGetLastError());
4748 connect_time = 0xdeadbeef;
4749 optlen = sizeof(connect_time);
4750 iret = getsockopt(connector, SOL_SOCKET, SO_CONNECT_TIME, (char *)&connect_time, &optlen);
4751 ok(!iret, "getsockopt failed %d\n", WSAGetLastError());
4752 ok(connect_time < 0xdeadbeef, "unexpected connect time %u\n", connect_time);
4754 dwret = WaitForSingleObject(overlapped.hEvent, 0);
4755 ok(dwret == WAIT_TIMEOUT, "Waiting for accept event timeout failed with %d + errno %d\n", dwret, GetLastError());
4757 iret = getsockname( connector, (struct sockaddr *)&peerAddress, &remoteSize);
4758 ok( !iret, "getsockname failed.\n");
4760 /* Check if the buffer from AcceptEx is decoded correclty */
4761 pGetAcceptExSockaddrs(buffer, 2, sizeof(struct sockaddr_in) + 16, sizeof(struct sockaddr_in) + 16,
4762 (struct sockaddr **)&readBindAddress, &localSize,
4763 (struct sockaddr **)&readRemoteAddress, &remoteSize);
4764 strcpy( ipbuffer, inet_ntoa(readBindAddress->sin_addr));
4765 ok( readBindAddress->sin_addr.s_addr == bindAddress.sin_addr.s_addr,
4766 "Local socket address is different %s != %s\n",
4767 ipbuffer, inet_ntoa(bindAddress.sin_addr));
4768 ok( readBindAddress->sin_port == bindAddress.sin_port,
4769 "Local socket port is different: %d != %d\n",
4770 readBindAddress->sin_port, bindAddress.sin_port);
4771 strcpy( ipbuffer, inet_ntoa(readRemoteAddress->sin_addr));
4772 ok( readRemoteAddress->sin_addr.s_addr == peerAddress.sin_addr.s_addr,
4773 "Remote socket address is different %s != %s\n",
4774 ipbuffer, inet_ntoa(peerAddress.sin_addr));
4775 ok( readRemoteAddress->sin_port == peerAddress.sin_port,
4776 "Remote socket port is different: %d != %d\n",
4777 readRemoteAddress->sin_port, peerAddress.sin_port);
4779 iret = send(connector, buffer, 1, 0);
4780 ok(iret == 1, "could not send 1 byte: send %d errno %d\n", iret, WSAGetLastError());
4782 dwret = WaitForSingleObject(overlapped.hEvent, 1000);
4783 ok(dwret == WAIT_OBJECT_0, "Waiting for accept event failed with %d + errno %d\n", dwret, GetLastError());
4785 bret = GetOverlappedResult((HANDLE)listener, &overlapped, &bytesReturned, FALSE);
4786 ok(bret, "GetOverlappedResult failed, error %d\n", GetLastError());
4787 ok(bytesReturned == 1, "bytesReturned isn't supposed to be %d\n", bytesReturned);
4789 closesocket(connector);
4790 connector = INVALID_SOCKET;
4791 closesocket(acceptor);
4793 /* Test CF_DEFER & AcceptEx interaction */
4795 acceptor = socket(AF_INET, SOCK_STREAM, 0);
4796 if (acceptor == INVALID_SOCKET) {
4797 skip("could not create acceptor socket, error %d\n", WSAGetLastError());
4798 goto end;
4800 connector = socket(AF_INET, SOCK_STREAM, 0);
4801 if (connector == INVALID_SOCKET) {
4802 skip("could not create connector socket, error %d\n", WSAGetLastError());
4803 goto end;
4805 connector2 = socket(AF_INET, SOCK_STREAM, 0);
4806 if (connector == INVALID_SOCKET) {
4807 skip("could not create connector socket, error %d\n", WSAGetLastError());
4808 goto end;
4811 if (set_blocking(connector, FALSE)) {
4812 skip("couldn't make socket non-blocking, error %d\n", WSAGetLastError());
4813 goto end;
4816 if (set_blocking(connector2, FALSE)) {
4817 skip("couldn't make socket non-blocking, error %d\n", WSAGetLastError());
4818 goto end;
4821 /* Connect socket #1 */
4822 iret = connect(connector, (struct sockaddr*)&bindAddress, sizeof(bindAddress));
4823 ok(iret == SOCKET_ERROR && WSAGetLastError() == WSAEWOULDBLOCK, "connecting to accepting socket failed, error %d\n", WSAGetLastError());
4825 FD_ZERO ( &fds_accept );
4826 FD_ZERO ( &fds_send );
4828 FD_SET ( listener, &fds_accept );
4829 FD_SET ( connector, &fds_send );
4831 buffer[0] = '0';
4832 got = 0;
4833 conn1 = 0;
4835 for (i = 0; i < 4000; ++i)
4837 fd_set fds_openaccept = fds_accept, fds_opensend = fds_send;
4839 wsa_ok ( ( select ( 0, &fds_openaccept, &fds_opensend, NULL, &timeout ) ), SOCKET_ERROR !=,
4840 "acceptex test(%d): could not select on socket, errno %d\n" );
4842 /* check for incoming requests */
4843 if ( FD_ISSET ( listener, &fds_openaccept ) ) {
4844 got++;
4845 if (got == 1) {
4846 SOCKET tmp = WSAAccept(listener, NULL, NULL, (LPCONDITIONPROC) AlwaysDeferConditionFunc, 0);
4847 ok(tmp == INVALID_SOCKET && WSAGetLastError() == WSATRY_AGAIN, "Failed to defer connection, %d\n", WSAGetLastError());
4848 bret = pAcceptEx(listener, acceptor, buffer, 0,
4849 sizeof(struct sockaddr_in) + 16, sizeof(struct sockaddr_in) + 16,
4850 &bytesReturned, &overlapped);
4851 ok(bret == FALSE && WSAGetLastError() == ERROR_IO_PENDING, "AcceptEx returned %d + errno %d\n", bret, WSAGetLastError());
4853 else if (got == 2) {
4854 /* this should be socket #2 */
4855 SOCKET tmp = accept(listener, NULL, NULL);
4856 ok(tmp != INVALID_SOCKET, "accept failed %d\n", WSAGetLastError());
4857 closesocket(tmp);
4859 else {
4860 ok(FALSE, "Got more than 2 connections?\n");
4863 if ( conn1 && FD_ISSET ( connector2, &fds_opensend ) ) {
4864 /* Send data on second socket, and stop */
4865 send(connector2, "2", 1, 0);
4866 FD_CLR ( connector2, &fds_send );
4868 break;
4870 if ( FD_ISSET ( connector, &fds_opensend ) ) {
4871 /* Once #1 is connected, allow #2 to connect */
4872 conn1 = 1;
4874 send(connector, "1", 1, 0);
4875 FD_CLR ( connector, &fds_send );
4877 iret = connect(connector2, (struct sockaddr*)&bindAddress, sizeof(bindAddress));
4878 ok(iret == SOCKET_ERROR && WSAGetLastError() == WSAEWOULDBLOCK, "connecting to accepting socket failed, error %d\n", WSAGetLastError());
4879 FD_SET ( connector2, &fds_send );
4883 ok (got == 2 || broken(got == 1) /* NT4 */,
4884 "Did not get both connections, got %d\n", got);
4886 dwret = WaitForSingleObject(overlapped.hEvent, 0);
4887 ok(dwret == WAIT_OBJECT_0, "Waiting for accept event failed with %d + errno %d\n", dwret, GetLastError());
4889 bret = GetOverlappedResult((HANDLE)listener, &overlapped, &bytesReturned, FALSE);
4890 ok(bret, "GetOverlappedResult failed, error %d\n", GetLastError());
4891 ok(bytesReturned == 0, "bytesReturned isn't supposed to be %d\n", bytesReturned);
4893 set_blocking(acceptor, TRUE);
4894 iret = recv( acceptor, buffer, 2, 0);
4895 ok(iret == 1, "Failed to get data, %d, errno: %d\n", iret, WSAGetLastError());
4897 ok(buffer[0] == '1', "The wrong first client was accepted by acceptex: %c != 1\n", buffer[0]);
4899 closesocket(connector);
4900 connector = INVALID_SOCKET;
4901 closesocket(acceptor);
4903 /* clean up in case of failures */
4904 while ((acceptor = accept(listener, NULL, NULL)) != INVALID_SOCKET)
4905 closesocket(acceptor);
4907 /* Disconnect during receive? */
4909 acceptor = socket(AF_INET, SOCK_STREAM, 0);
4910 if (acceptor == INVALID_SOCKET) {
4911 skip("could not create acceptor socket, error %d\n", WSAGetLastError());
4912 goto end;
4914 connector = socket(AF_INET, SOCK_STREAM, 0);
4915 if (connector == INVALID_SOCKET) {
4916 skip("could not create connector socket, error %d\n", WSAGetLastError());
4917 goto end;
4919 bret = pAcceptEx(listener, acceptor, buffer, sizeof(buffer) - 2*(sizeof(struct sockaddr_in) + 16),
4920 sizeof(struct sockaddr_in) + 16, sizeof(struct sockaddr_in) + 16,
4921 &bytesReturned, &overlapped);
4922 ok(bret == FALSE && WSAGetLastError() == ERROR_IO_PENDING, "AcceptEx returned %d + errno %d\n", bret, WSAGetLastError());
4924 iret = connect(connector, (struct sockaddr*)&bindAddress, sizeof(bindAddress));
4925 ok(iret == 0, "connecting to accepting socket failed, error %d\n", WSAGetLastError());
4927 closesocket(connector);
4928 connector = INVALID_SOCKET;
4930 dwret = WaitForSingleObject(overlapped.hEvent, 1000);
4931 ok(dwret == WAIT_OBJECT_0, "Waiting for accept event failed with %d + errno %d\n", dwret, GetLastError());
4933 bret = GetOverlappedResult((HANDLE)listener, &overlapped, &bytesReturned, FALSE);
4934 ok(bret, "GetOverlappedResult failed, error %d\n", GetLastError());
4935 ok(bytesReturned == 0, "bytesReturned isn't supposed to be %d\n", bytesReturned);
4937 closesocket(acceptor);
4939 /* Test closing with pending requests */
4941 acceptor = socket(AF_INET, SOCK_STREAM, 0);
4942 if (acceptor == INVALID_SOCKET) {
4943 skip("could not create acceptor socket, error %d\n", WSAGetLastError());
4944 goto end;
4946 bret = pAcceptEx(listener, acceptor, buffer, sizeof(buffer) - 2*(sizeof(struct sockaddr_in) + 16),
4947 sizeof(struct sockaddr_in) + 16, sizeof(struct sockaddr_in) + 16,
4948 &bytesReturned, &overlapped);
4949 ok(bret == FALSE && WSAGetLastError() == ERROR_IO_PENDING, "AcceptEx returned %d + errno %d\n", bret, WSAGetLastError());
4951 closesocket(acceptor);
4953 dwret = WaitForSingleObject(overlapped.hEvent, 1000);
4954 todo_wine ok(dwret == WAIT_OBJECT_0 || broken(dwret == WAIT_TIMEOUT) /* NT4/2000 */,
4955 "Waiting for accept event failed with %d + errno %d\n", dwret, GetLastError());
4957 if (dwret != WAIT_TIMEOUT) {
4958 bret = GetOverlappedResult((HANDLE)listener, &overlapped, &bytesReturned, FALSE);
4959 ok(!bret && GetLastError() == ERROR_OPERATION_ABORTED, "GetOverlappedResult failed, error %d\n", GetLastError());
4961 else {
4962 bret = CancelIo((HANDLE) listener);
4963 ok(bret, "Failed to cancel failed test. Bailing...\n");
4964 if (!bret) return;
4965 WaitForSingleObject(overlapped.hEvent, 0);
4968 acceptor = socket(AF_INET, SOCK_STREAM, 0);
4969 if (acceptor == INVALID_SOCKET) {
4970 skip("could not create acceptor socket, error %d\n", WSAGetLastError());
4971 goto end;
4973 bret = pAcceptEx(listener, acceptor, buffer, sizeof(buffer) - 2*(sizeof(struct sockaddr_in) + 16),
4974 sizeof(struct sockaddr_in) + 16, sizeof(struct sockaddr_in) + 16,
4975 &bytesReturned, &overlapped);
4976 ok(bret == FALSE && WSAGetLastError() == ERROR_IO_PENDING, "AcceptEx returned %d + errno %d\n", bret, WSAGetLastError());
4978 CancelIo((HANDLE) acceptor);
4980 dwret = WaitForSingleObject(overlapped.hEvent, 1000);
4981 ok(dwret == WAIT_TIMEOUT, "Waiting for timeout failed with %d + errno %d\n", dwret, GetLastError());
4983 closesocket(acceptor);
4985 acceptor = socket(AF_INET, SOCK_STREAM, 0);
4986 if (acceptor == INVALID_SOCKET) {
4987 skip("could not create acceptor socket, error %d\n", WSAGetLastError());
4988 goto end;
4990 bret = pAcceptEx(listener, acceptor, buffer, sizeof(buffer) - 2*(sizeof(struct sockaddr_in) + 16),
4991 sizeof(struct sockaddr_in) + 16, sizeof(struct sockaddr_in) + 16,
4992 &bytesReturned, &overlapped);
4993 ok(bret == FALSE && WSAGetLastError() == ERROR_IO_PENDING, "AcceptEx returned %d + errno %d\n", bret, WSAGetLastError());
4995 closesocket(listener);
4996 listener = INVALID_SOCKET;
4998 dwret = WaitForSingleObject(overlapped.hEvent, 1000);
4999 ok(dwret == WAIT_OBJECT_0, "Waiting for accept event failed with %d + errno %d\n", dwret, GetLastError());
5001 bret = GetOverlappedResult((HANDLE)listener, &overlapped, &bytesReturned, FALSE);
5002 ok(!bret && GetLastError() == ERROR_OPERATION_ABORTED, "GetOverlappedResult failed, error %d\n", GetLastError());
5004 end:
5005 if (overlapped.hEvent)
5006 WSACloseEvent(overlapped.hEvent);
5007 if (listener != INVALID_SOCKET)
5008 closesocket(listener);
5009 if (acceptor != INVALID_SOCKET)
5010 closesocket(acceptor);
5011 if (connector != INVALID_SOCKET)
5012 closesocket(connector);
5013 if (connector2 != INVALID_SOCKET)
5014 closesocket(connector2);
5017 static void test_getpeername(void)
5019 SOCKET sock;
5020 struct sockaddr_in sa, sa_out;
5021 int sa_len;
5022 const char buf[] = "hello world";
5023 int ret;
5025 /* Test the parameter validation order. */
5026 ret = getpeername(INVALID_SOCKET, NULL, NULL);
5027 ok(ret == SOCKET_ERROR, "Expected getpeername to return SOCKET_ERROR, got %d\n", ret);
5028 ok(WSAGetLastError() == WSAENOTSOCK,
5029 "Expected WSAGetLastError() to return WSAENOTSOCK, got %d\n", WSAGetLastError());
5031 sock = socket(PF_INET, SOCK_DGRAM, IPPROTO_IP);
5032 ok(sock != INVALID_SOCKET, "Expected socket to return a valid socket\n");
5033 if (sock == INVALID_SOCKET)
5035 skip("Socket creation failed with %d\n", WSAGetLastError());
5036 return;
5039 ret = getpeername(sock, NULL, NULL);
5040 ok(ret == SOCKET_ERROR, "Expected getpeername to return SOCKET_ERROR, got %d\n", ret);
5041 ok(WSAGetLastError() == WSAENOTCONN ||
5042 broken(WSAGetLastError() == WSAEFAULT), /* Win9x and WinMe */
5043 "Expected WSAGetLastError() to return WSAENOTCONN, got %d\n", WSAGetLastError());
5045 memset(&sa, 0, sizeof(sa));
5046 sa.sin_family = AF_INET;
5047 sa.sin_port = htons(139);
5048 sa.sin_addr.s_addr = inet_addr("127.0.0.1");
5050 /* sendto does not change a socket's connection state. */
5051 ret = sendto(sock, buf, sizeof(buf), 0, (struct sockaddr*)&sa, sizeof(sa));
5052 ok(ret != SOCKET_ERROR,
5053 "Expected sendto to succeed, WSAGetLastError() = %d\n", WSAGetLastError());
5055 ret = getpeername(sock, NULL, NULL);
5056 ok(ret == SOCKET_ERROR, "Expected getpeername to return SOCKET_ERROR, got %d\n", ret);
5057 ok(WSAGetLastError() == WSAENOTCONN ||
5058 broken(WSAGetLastError() == WSAEFAULT), /* Win9x and WinMe */
5059 "Expected WSAGetLastError() to return WSAENOTCONN, got %d\n", WSAGetLastError());
5061 ret = connect(sock, (struct sockaddr*)&sa, sizeof(sa));
5062 ok(ret == 0,
5063 "Expected connect to succeed, WSAGetLastError() = %d\n", WSAGetLastError());
5065 ret = getpeername(sock, NULL, NULL);
5066 ok(ret == SOCKET_ERROR, "Expected getpeername to return SOCKET_ERROR, got %d\n", ret);
5067 ok(WSAGetLastError() == WSAEFAULT,
5068 "Expected WSAGetLastError() to return WSAEFAULT, got %d\n", WSAGetLastError());
5070 /* Test crashes on Wine. */
5071 if (0)
5073 ret = getpeername(sock, (void*)0xdeadbeef, (void*)0xcafebabe);
5074 ok(ret == SOCKET_ERROR, "Expected getpeername to return SOCKET_ERROR, got %d\n", ret);
5075 ok(WSAGetLastError() == WSAEFAULT,
5076 "Expected WSAGetLastError() to return WSAEFAULT, got %d\n", WSAGetLastError());
5079 sa_len = 0;
5080 ret = getpeername(sock, (struct sockaddr*)&sa_out, &sa_len);
5081 ok(ret == SOCKET_ERROR, "Expected getpeername to return 0, got %d\n", ret);
5082 ok(WSAGetLastError() == WSAEFAULT,
5083 "Expected WSAGetLastError() to return WSAEFAULT, got %d\n", WSAGetLastError());
5085 sa_len = sizeof(sa_out);
5086 ret = getpeername(sock, (struct sockaddr*)&sa_out, &sa_len);
5087 ok(ret == 0, "Expected getpeername to return 0, got %d\n", ret);
5088 ok(!memcmp(&sa, &sa_out, sizeof(sa)),
5089 "Expected the returned structure to be identical to the connect structure\n");
5091 closesocket(sock);
5094 static void test_sioRoutingInterfaceQuery(void)
5096 int ret;
5097 SOCKET sock;
5098 SOCKADDR_IN sin = { 0 }, sout = { 0 };
5099 DWORD bytesReturned;
5101 sock = socket(PF_INET, SOCK_DGRAM, IPPROTO_IP);
5102 ok(sock != INVALID_SOCKET, "Expected socket to return a valid socket\n");
5103 if (sock == INVALID_SOCKET)
5105 skip("Socket creation failed with %d\n", WSAGetLastError());
5106 return;
5108 ret = WSAIoctl(sock, SIO_ROUTING_INTERFACE_QUERY, NULL, 0, NULL, 0, NULL,
5109 NULL, NULL);
5110 ok(ret == SOCKET_ERROR && WSAGetLastError() == WSAEFAULT,
5111 "expected WSAEFAULT, got %d\n", WSAGetLastError());
5112 ret = WSAIoctl(sock, SIO_ROUTING_INTERFACE_QUERY, &sin, sizeof(sin),
5113 NULL, 0, NULL, NULL, NULL);
5114 ok(ret == SOCKET_ERROR && WSAGetLastError() == WSAEFAULT,
5115 "expected WSAEFAULT, got %d\n", WSAGetLastError());
5116 ret = WSAIoctl(sock, SIO_ROUTING_INTERFACE_QUERY, &sin, sizeof(sin),
5117 NULL, 0, &bytesReturned, NULL, NULL);
5118 ok(ret == SOCKET_ERROR &&
5119 (WSAGetLastError() == WSAEFAULT /* Win98 */ ||
5120 WSAGetLastError() == WSAEINVAL /* NT4 */||
5121 WSAGetLastError() == WSAEAFNOSUPPORT),
5122 "expected WSAEFAULT or WSAEINVAL or WSAEAFNOSUPPORT, got %d\n",
5123 WSAGetLastError());
5124 sin.sin_family = AF_INET;
5125 ret = WSAIoctl(sock, SIO_ROUTING_INTERFACE_QUERY, &sin, sizeof(sin),
5126 NULL, 0, &bytesReturned, NULL, NULL);
5127 ok(ret == SOCKET_ERROR &&
5128 (WSAGetLastError() == WSAEFAULT /* Win98 */ ||
5129 WSAGetLastError() == WSAEINVAL),
5130 "expected WSAEFAULT or WSAEINVAL, got %d\n", WSAGetLastError());
5131 sin.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
5132 ret = WSAIoctl(sock, SIO_ROUTING_INTERFACE_QUERY, &sin, sizeof(sin),
5133 NULL, 0, &bytesReturned, NULL, NULL);
5134 ok(ret == SOCKET_ERROR &&
5135 (WSAGetLastError() == WSAEINVAL /* NT4 */ ||
5136 WSAGetLastError() == WSAEFAULT),
5137 "expected WSAEINVAL or WSAEFAULT, got %d\n", WSAGetLastError());
5138 ret = WSAIoctl(sock, SIO_ROUTING_INTERFACE_QUERY, &sin, sizeof(sin),
5139 &sout, sizeof(sout), &bytesReturned, NULL, NULL);
5140 ok(!ret || broken(WSAGetLastError() == WSAEINVAL /* NT4 */),
5141 "WSAIoctl failed: %d\n", WSAGetLastError());
5142 if (!ret)
5144 ok(sout.sin_family == AF_INET, "expected AF_INET, got %d\n",
5145 sout.sin_family);
5146 /* We expect the source address to be INADDR_LOOPBACK as well, but
5147 * there's no guarantee that a route to the loopback address exists,
5148 * so rather than introduce spurious test failures we do not test the
5149 * source address.
5152 closesocket(sock);
5155 static void test_synchronous_WSAIoctl(void)
5157 HANDLE previous_port, io_port;
5158 WSAOVERLAPPED overlapped, *olp;
5159 SOCKET socket;
5160 ULONG on;
5161 ULONG_PTR key;
5162 DWORD num_bytes;
5163 BOOL ret;
5164 int res;
5166 previous_port = CreateIoCompletionPort( INVALID_HANDLE_VALUE, NULL, 0, 0 );
5167 ok( previous_port != NULL, "failed to create completion port %u\n", GetLastError() );
5169 socket = WSASocketW( AF_INET, SOCK_STREAM, IPPROTO_TCP, NULL, 0, WSA_FLAG_OVERLAPPED );
5170 ok( socket != INVALID_SOCKET, "failed to create socket %d\n", WSAGetLastError() );
5172 io_port = CreateIoCompletionPort( (HANDLE)socket, previous_port, 0, 0 );
5173 ok( io_port != NULL, "failed to create completion port %u\n", GetLastError() );
5175 on = 1;
5176 memset( &overlapped, 0, sizeof(overlapped) );
5177 res = WSAIoctl( socket, FIONBIO, &on, sizeof(on), NULL, 0, &num_bytes, &overlapped, NULL );
5178 ok( !res, "WSAIoctl failed %d\n", WSAGetLastError() );
5180 ret = GetQueuedCompletionStatus( io_port, &num_bytes, &key, &olp, 10000 );
5181 ok( ret, "failed to get completion status %u\n", GetLastError() );
5183 CloseHandle( io_port );
5184 closesocket( socket );
5185 CloseHandle( previous_port );
5188 #define WM_ASYNCCOMPLETE (WM_USER + 100)
5189 static HWND create_async_message_window(void)
5191 static const char class_name[] = "ws2_32 async message window class";
5193 WNDCLASSEXA wndclass;
5194 HWND hWnd;
5196 wndclass.cbSize = sizeof(wndclass);
5197 wndclass.style = CS_HREDRAW | CS_VREDRAW;
5198 wndclass.lpfnWndProc = DefWindowProcA;
5199 wndclass.cbClsExtra = 0;
5200 wndclass.cbWndExtra = 0;
5201 wndclass.hInstance = GetModuleHandleA(NULL);
5202 wndclass.hIcon = LoadIconA(NULL, IDI_APPLICATION);
5203 wndclass.hIconSm = LoadIconA(NULL, IDI_APPLICATION);
5204 wndclass.hCursor = LoadCursorA(NULL, IDC_ARROW);
5205 wndclass.hbrBackground = (HBRUSH)(COLOR_WINDOW + 1);
5206 wndclass.lpszClassName = class_name;
5207 wndclass.lpszMenuName = NULL;
5209 RegisterClassExA(&wndclass);
5211 hWnd = CreateWindow(class_name, "ws2_32 async message window", WS_OVERLAPPEDWINDOW,
5212 0, 0, 500, 500, NULL, NULL, GetModuleHandleA(NULL), NULL);
5213 if (!hWnd)
5215 ok(0, "failed to create window: %u\n", GetLastError());
5216 return NULL;
5219 return hWnd;
5222 static void test_WSAAsyncGetServByPort(void)
5224 HWND hwnd = create_async_message_window();
5225 HANDLE ret;
5226 char buffer[MAXGETHOSTSTRUCT];
5228 if (!hwnd)
5229 return;
5231 /* FIXME: The asynchronous window messages should be tested. */
5233 /* Parameters are not checked when initiating the asynchronous operation. */
5234 ret = WSAAsyncGetServByPort(NULL, 0, 0, NULL, NULL, 0);
5235 ok(ret != NULL, "WSAAsyncGetServByPort returned NULL\n");
5237 ret = WSAAsyncGetServByPort(hwnd, WM_ASYNCCOMPLETE, 0, NULL, NULL, 0);
5238 ok(ret != NULL, "WSAAsyncGetServByPort returned NULL\n");
5240 ret = WSAAsyncGetServByPort(hwnd, WM_ASYNCCOMPLETE, htons(80), NULL, NULL, 0);
5241 ok(ret != NULL, "WSAAsyncGetServByPort returned NULL\n");
5243 ret = WSAAsyncGetServByPort(hwnd, WM_ASYNCCOMPLETE, htons(80), NULL, buffer, MAXGETHOSTSTRUCT);
5244 ok(ret != NULL, "WSAAsyncGetServByPort returned NULL\n");
5246 DestroyWindow(hwnd);
5249 static void test_WSAAsyncGetServByName(void)
5251 HWND hwnd = create_async_message_window();
5252 HANDLE ret;
5253 char buffer[MAXGETHOSTSTRUCT];
5255 if (!hwnd)
5256 return;
5258 /* FIXME: The asynchronous window messages should be tested. */
5260 /* Parameters are not checked when initiating the asynchronous operation. */
5261 ret = WSAAsyncGetServByName(hwnd, WM_ASYNCCOMPLETE, "", NULL, NULL, 0);
5262 ok(ret != NULL, "WSAAsyncGetServByName returned NULL\n");
5264 ret = WSAAsyncGetServByName(hwnd, WM_ASYNCCOMPLETE, "", "", buffer, MAXGETHOSTSTRUCT);
5265 ok(ret != NULL, "WSAAsyncGetServByName returned NULL\n");
5267 ret = WSAAsyncGetServByName(hwnd, WM_ASYNCCOMPLETE, "http", NULL, NULL, 0);
5268 ok(ret != NULL, "WSAAsyncGetServByName returned NULL\n");
5270 ret = WSAAsyncGetServByName(hwnd, WM_ASYNCCOMPLETE, "http", "tcp", buffer, MAXGETHOSTSTRUCT);
5271 ok(ret != NULL, "WSAAsyncGetServByName returned NULL\n");
5273 DestroyWindow(hwnd);
5276 static void test_completion_port(void)
5278 HANDLE previous_port, io_port;
5279 WSAOVERLAPPED ov, *olp;
5280 SOCKET src, dest, connector = INVALID_SOCKET;
5281 char buf[1024];
5282 WSABUF bufs;
5283 DWORD num_bytes, flags;
5284 struct linger ling;
5285 int iret;
5286 BOOL bret;
5287 ULONG_PTR key;
5288 struct sockaddr_in bindAddress;
5289 GUID acceptExGuid = WSAID_ACCEPTEX;
5290 LPFN_ACCEPTEX pAcceptEx = NULL;
5291 int socklen;
5293 previous_port = CreateIoCompletionPort(INVALID_HANDLE_VALUE, NULL, 0, 0);
5294 ok( previous_port != NULL, "Failed to create completion port %u\n", GetLastError());
5296 memset(&ov, 0, sizeof(ov));
5298 tcp_socketpair(&src, &dest);
5299 if (src == INVALID_SOCKET || dest == INVALID_SOCKET)
5301 skip("failed to create sockets\n");
5302 goto end;
5305 bufs.len = sizeof(buf);
5306 bufs.buf = buf;
5307 flags = 0;
5309 ling.l_onoff = 1;
5310 ling.l_linger = 0;
5311 iret = setsockopt (src, SOL_SOCKET, SO_LINGER, (char *) &ling, sizeof(ling));
5312 ok(!iret, "Failed to set linger %d\n", GetLastError());
5314 io_port = CreateIoCompletionPort( (HANDLE)dest, previous_port, 125, 0 );
5315 ok(io_port != NULL, "Failed to create completion port %u\n", GetLastError());
5317 SetLastError(0xdeadbeef);
5319 iret = WSARecv(dest, &bufs, 1, &num_bytes, &flags, &ov, NULL);
5320 ok(iret == SOCKET_ERROR, "WSARecv returned %d\n", iret);
5321 ok(GetLastError() == ERROR_IO_PENDING, "Last error was %d\n", GetLastError());
5323 closesocket(src);
5324 src = INVALID_SOCKET;
5326 SetLastError(0xdeadbeef);
5327 key = 0xdeadbeef;
5328 num_bytes = 0xdeadbeef;
5329 olp = (WSAOVERLAPPED *)0xdeadbeef;
5331 bret = GetQueuedCompletionStatus(io_port, &num_bytes, &key, &olp, 100);
5332 todo_wine ok(bret == FALSE, "GetQueuedCompletionStatus returned %d\n", bret);
5333 todo_wine ok(GetLastError() == ERROR_NETNAME_DELETED, "Last error was %d\n", GetLastError());
5334 ok(key == 125, "Key is %lu\n", key);
5335 ok(num_bytes == 0, "Number of bytes received is %u\n", num_bytes);
5336 ok(olp == &ov, "Overlapped structure is at %p\n", olp);
5338 SetLastError(0xdeadbeef);
5339 key = 0xdeadbeef;
5340 num_bytes = 0xdeadbeef;
5341 olp = (WSAOVERLAPPED *)0xdeadbeef;
5343 bret = GetQueuedCompletionStatus(io_port, &num_bytes, &key, &olp, 100);
5344 ok(bret == FALSE, "GetQueuedCompletionStatus returned %d\n", bret );
5345 ok(GetLastError() == WAIT_TIMEOUT, "Last error was %d\n", GetLastError());
5346 ok(key == 0xdeadbeef, "Key is %lu\n", key);
5347 ok(num_bytes == 0xdeadbeef, "Number of bytes transferred is %u\n", num_bytes);
5348 ok(!olp, "Overlapped structure is at %p\n", olp);
5350 if (dest != INVALID_SOCKET)
5351 closesocket(dest);
5352 if (src != INVALID_SOCKET)
5353 closesocket(src);
5355 memset(&ov, 0, sizeof(ov));
5357 tcp_socketpair(&src, &dest);
5358 if (src == INVALID_SOCKET || dest == INVALID_SOCKET)
5360 skip("failed to create sockets\n");
5361 goto end;
5364 bufs.len = sizeof(buf);
5365 bufs.buf = buf;
5366 flags = 0;
5368 ling.l_onoff = 1;
5369 ling.l_linger = 0;
5370 iret = setsockopt (src, SOL_SOCKET, SO_LINGER, (char *) &ling, sizeof(ling));
5371 ok(!iret, "Failed to set linger %d\n", GetLastError());
5373 io_port = CreateIoCompletionPort((HANDLE)dest, previous_port, 125, 0);
5374 ok(io_port != NULL, "failed to create completion port %u\n", GetLastError());
5376 set_blocking(dest, FALSE);
5378 closesocket(src);
5379 src = INVALID_SOCKET;
5380 num_bytes = 0xdeadbeef;
5381 SetLastError(0xdeadbeef);
5383 iret = WSASend(dest, &bufs, 1, &num_bytes, 0, &ov, NULL);
5384 ok(iret == SOCKET_ERROR, "WSASend failed - %d\n", iret);
5385 ok(GetLastError() == WSAECONNRESET, "Last error was %d\n", GetLastError());
5386 ok(num_bytes == 0xdeadbeef, "Managed to send %d\n", num_bytes);
5388 SetLastError(0xdeadbeef);
5389 key = 0xdeadbeef;
5390 num_bytes = 0xdeadbeef;
5391 olp = (WSAOVERLAPPED *)0xdeadbeef;
5393 bret = GetQueuedCompletionStatus( io_port, &num_bytes, &key, &olp, 200 );
5394 ok(bret == FALSE, "GetQueuedCompletionStatus returned %u\n", bret );
5395 ok(GetLastError() == WAIT_TIMEOUT, "Last error was %d\n", GetLastError());
5396 ok(key == 0xdeadbeef, "Key is %lu\n", key);
5397 ok(num_bytes == 0xdeadbeef, "Number of bytes transferred is %u\n", num_bytes);
5398 ok(!olp, "Overlapped structure is at %p\n", olp);
5400 if (dest != INVALID_SOCKET)
5401 closesocket(dest);
5404 src = socket(AF_INET, SOCK_STREAM, 0);
5405 if (src == INVALID_SOCKET)
5407 skip("could not create listener socket, error %d\n", WSAGetLastError());
5408 goto end;
5411 dest = socket(AF_INET, SOCK_STREAM, 0);
5412 if (dest == INVALID_SOCKET)
5414 skip("could not create acceptor socket, error %d\n", WSAGetLastError());
5415 goto end;
5418 iret = WSAIoctl(src, SIO_GET_EXTENSION_FUNCTION_POINTER, &acceptExGuid, sizeof(acceptExGuid),
5419 &pAcceptEx, sizeof(pAcceptEx), &num_bytes, NULL, NULL);
5420 if (iret)
5422 skip("WSAIoctl failed to get AcceptEx with ret %d + errno %d\n", iret, WSAGetLastError());
5423 goto end;
5426 memset(&bindAddress, 0, sizeof(bindAddress));
5427 bindAddress.sin_family = AF_INET;
5428 bindAddress.sin_addr.s_addr = inet_addr("127.0.0.1");
5429 iret = bind(src, (struct sockaddr*)&bindAddress, sizeof(bindAddress));
5430 if (iret != 0)
5432 skip("failed to bind, error %d\n", WSAGetLastError());
5433 goto end;
5436 if (set_blocking(src, FALSE))
5438 skip("couldn't make socket non-blocking, error %d\n", WSAGetLastError());
5439 goto end;
5442 iret = listen(src, 5);
5443 if (iret != 0)
5445 skip("listening failed, errno = %d\n", WSAGetLastError());
5446 goto end;
5449 SetLastError(0xdeadbeef);
5451 bret = pAcceptEx(src, dest, buf, sizeof(buf) - 2*(sizeof(struct sockaddr_in) + 16),
5452 sizeof(struct sockaddr_in) + 16, sizeof(struct sockaddr_in) + 16,
5453 &num_bytes, &ov);
5454 ok(bret == FALSE, "AcceptEx returned %d\n", bret);
5455 ok(GetLastError() == ERROR_IO_PENDING, "Last error was %d\n", GetLastError());
5457 io_port = CreateIoCompletionPort((HANDLE)src, previous_port, 125, 0);
5458 ok(io_port != NULL, "failed to create completion port %u\n", GetLastError());
5460 closesocket(src);
5461 src = INVALID_SOCKET;
5463 SetLastError(0xdeadbeef);
5464 key = 0xdeadbeef;
5465 num_bytes = 0xdeadbeef;
5466 olp = (WSAOVERLAPPED *)0xdeadbeef;
5468 bret = GetQueuedCompletionStatus(io_port, &num_bytes, &key, &olp, 100);
5469 ok(bret == FALSE, "failed to get completion status %u\n", bret);
5470 todo_wine ok(GetLastError() == ERROR_OPERATION_ABORTED, "Last error was %d\n", GetLastError());
5471 todo_wine ok(key == 125, "Key is %lu\n", key);
5472 todo_wine ok(num_bytes == 0, "Number of bytes transferred is %u\n", num_bytes);
5473 todo_wine ok(olp == &ov, "Overlapped structure is at %p\n", olp);
5474 todo_wine ok(olp && (olp->Internal == (ULONG)STATUS_CANCELLED), "Internal status is %lx\n", olp ? olp->Internal : 0);
5476 SetLastError(0xdeadbeef);
5477 key = 0xdeadbeef;
5478 num_bytes = 0xdeadbeef;
5479 olp = (WSAOVERLAPPED *)0xdeadbeef;
5480 bret = GetQueuedCompletionStatus( io_port, &num_bytes, &key, &olp, 200 );
5481 ok(bret == FALSE, "failed to get completion status %u\n", bret);
5482 ok(GetLastError() == WAIT_TIMEOUT, "Last error was %d\n", GetLastError());
5483 ok(key == 0xdeadbeef, "Key is %lu\n", key);
5484 ok(num_bytes == 0xdeadbeef, "Number of bytes transferred is %u\n", num_bytes);
5485 ok(!olp, "Overlapped structure is at %p\n", olp);
5487 src = socket(AF_INET, SOCK_STREAM, 0);
5488 if (src == INVALID_SOCKET)
5490 skip("could not create listener socket, error %d\n", WSAGetLastError());
5491 goto end;
5494 memset(&bindAddress, 0, sizeof(bindAddress));
5495 bindAddress.sin_family = AF_INET;
5496 bindAddress.sin_addr.s_addr = inet_addr("127.0.0.1");
5497 iret = bind(src, (struct sockaddr*)&bindAddress, sizeof(bindAddress));
5498 if (iret != 0)
5500 skip("failed to bind, error %d\n", WSAGetLastError());
5501 goto end;
5504 socklen = sizeof(bindAddress);
5505 iret = getsockname(src, (struct sockaddr*)&bindAddress, &socklen);
5506 if (iret != 0) {
5507 skip("failed to lookup bind address, error %d\n", WSAGetLastError());
5508 goto end;
5511 if (set_blocking(src, FALSE))
5513 skip("couldn't make socket non-blocking, error %d\n", WSAGetLastError());
5514 goto end;
5517 iret = listen(src, 5);
5518 if (iret != 0)
5520 skip("listening failed, errno = %d\n", WSAGetLastError());
5521 goto end;
5524 connector = socket(AF_INET, SOCK_STREAM, 0);
5525 if (connector == INVALID_SOCKET) {
5526 skip("could not create connector socket, error %d\n", WSAGetLastError());
5527 goto end;
5530 io_port = CreateIoCompletionPort((HANDLE)src, previous_port, 125, 0);
5531 ok(io_port != NULL, "failed to create completion port %u\n", GetLastError());
5533 io_port = CreateIoCompletionPort((HANDLE)dest, previous_port, 236, 0);
5534 ok(io_port != NULL, "failed to create completion port %u\n", GetLastError());
5536 bret = pAcceptEx(src, dest, buf, sizeof(buf) - 2*(sizeof(struct sockaddr_in) + 16),
5537 sizeof(struct sockaddr_in) + 16, sizeof(struct sockaddr_in) + 16,
5538 &num_bytes, &ov);
5539 ok(bret == FALSE, "AcceptEx returned %d\n", bret);
5540 ok(GetLastError() == ERROR_IO_PENDING, "Last error was %d\n", GetLastError());
5542 iret = connect(connector, (struct sockaddr*)&bindAddress, sizeof(bindAddress));
5543 ok(iret == 0, "connecting to accepting socket failed, error %d\n", GetLastError());
5545 closesocket(connector);
5546 connector = INVALID_SOCKET;
5548 SetLastError(0xdeadbeef);
5549 key = 0xdeadbeef;
5550 num_bytes = 0xdeadbeef;
5551 olp = (WSAOVERLAPPED *)0xdeadbeef;
5553 bret = GetQueuedCompletionStatus(io_port, &num_bytes, &key, &olp, 100);
5554 ok(bret == TRUE, "failed to get completion status %u\n", bret);
5555 ok(GetLastError() == 0xdeadbeef, "Last error was %d\n", GetLastError());
5556 ok(key == 125, "Key is %lu\n", key);
5557 ok(num_bytes == 0, "Number of bytes transferred is %u\n", num_bytes);
5558 ok(olp == &ov, "Overlapped structure is at %p\n", olp);
5559 ok(olp && (olp->Internal == (ULONG)STATUS_SUCCESS), "Internal status is %lx\n", olp ? olp->Internal : 0);
5561 SetLastError(0xdeadbeef);
5562 key = 0xdeadbeef;
5563 num_bytes = 0xdeadbeef;
5564 olp = (WSAOVERLAPPED *)0xdeadbeef;
5565 bret = GetQueuedCompletionStatus( io_port, &num_bytes, &key, &olp, 200 );
5566 ok(bret == FALSE, "failed to get completion status %u\n", bret);
5567 ok(GetLastError() == WAIT_TIMEOUT, "Last error was %d\n", GetLastError());
5568 ok(key == 0xdeadbeef, "Key is %lu\n", key);
5569 ok(num_bytes == 0xdeadbeef, "Number of bytes transferred is %u\n", num_bytes);
5570 ok(!olp, "Overlapped structure is at %p\n", olp);
5572 if (dest != INVALID_SOCKET)
5573 closesocket(dest);
5574 if (src != INVALID_SOCKET)
5575 closesocket(dest);
5577 src = socket(AF_INET, SOCK_STREAM, 0);
5578 if (src == INVALID_SOCKET)
5580 skip("could not create listener socket, error %d\n", WSAGetLastError());
5581 goto end;
5584 memset(&bindAddress, 0, sizeof(bindAddress));
5585 bindAddress.sin_family = AF_INET;
5586 bindAddress.sin_addr.s_addr = inet_addr("127.0.0.1");
5587 iret = bind(src, (struct sockaddr*)&bindAddress, sizeof(bindAddress));
5588 if (iret != 0)
5590 skip("failed to bind, error %d\n", WSAGetLastError());
5591 goto end;
5594 socklen = sizeof(bindAddress);
5595 iret = getsockname(src, (struct sockaddr*)&bindAddress, &socklen);
5596 if (iret != 0) {
5597 skip("failed to lookup bind address, error %d\n", WSAGetLastError());
5598 goto end;
5601 if (set_blocking(src, FALSE))
5603 skip("couldn't make socket non-blocking, error %d\n", WSAGetLastError());
5604 goto end;
5607 iret = listen(src, 5);
5608 if (iret != 0)
5610 skip("listening failed, errno = %d\n", WSAGetLastError());
5611 goto end;
5614 dest = socket(AF_INET, SOCK_STREAM, 0);
5615 if (dest == INVALID_SOCKET)
5617 skip("could not create acceptor socket, error %d\n", WSAGetLastError());
5618 goto end;
5621 connector = socket(AF_INET, SOCK_STREAM, 0);
5622 if (connector == INVALID_SOCKET) {
5623 skip("could not create connector socket, error %d\n", WSAGetLastError());
5624 goto end;
5627 io_port = CreateIoCompletionPort((HANDLE)src, previous_port, 125, 0);
5628 ok(io_port != NULL, "failed to create completion port %u\n", GetLastError());
5630 io_port = CreateIoCompletionPort((HANDLE)dest, previous_port, 236, 0);
5631 ok(io_port != NULL, "failed to create completion port %u\n", GetLastError());
5633 bret = pAcceptEx(src, dest, buf, sizeof(buf) - 2*(sizeof(struct sockaddr_in) + 16),
5634 sizeof(struct sockaddr_in) + 16, sizeof(struct sockaddr_in) + 16,
5635 &num_bytes, &ov);
5636 ok(bret == FALSE, "AcceptEx returned %d\n", bret);
5637 ok(GetLastError() == ERROR_IO_PENDING, "Last error was %d\n", GetLastError());
5639 iret = connect(connector, (struct sockaddr*)&bindAddress, sizeof(bindAddress));
5640 ok(iret == 0, "connecting to accepting socket failed, error %d\n", GetLastError());
5642 iret = send(connector, buf, 1, 0);
5643 ok(iret == 1, "could not send 1 byte: send %d errno %d\n", iret, WSAGetLastError());
5645 closesocket(dest);
5646 dest = INVALID_SOCKET;
5648 SetLastError(0xdeadbeef);
5649 key = 0xdeadbeef;
5650 num_bytes = 0xdeadbeef;
5651 olp = (WSAOVERLAPPED *)0xdeadbeef;
5653 bret = GetQueuedCompletionStatus(io_port, &num_bytes, &key, &olp, 100);
5654 ok(bret == TRUE, "failed to get completion status %u\n", bret);
5655 ok(GetLastError() == 0xdeadbeef, "Last error was %d\n", GetLastError());
5656 ok(key == 125, "Key is %lu\n", key);
5657 ok(num_bytes == 1, "Number of bytes transferred is %u\n", num_bytes);
5658 ok(olp == &ov, "Overlapped structure is at %p\n", olp);
5659 ok(olp && (olp->Internal == (ULONG)STATUS_SUCCESS), "Internal status is %lx\n", olp ? olp->Internal : 0);
5661 SetLastError(0xdeadbeef);
5662 key = 0xdeadbeef;
5663 num_bytes = 0xdeadbeef;
5664 olp = (WSAOVERLAPPED *)0xdeadbeef;
5665 bret = GetQueuedCompletionStatus( io_port, &num_bytes, &key, &olp, 200 );
5666 ok(bret == FALSE, "failed to get completion status %u\n", bret);
5667 ok(GetLastError() == WAIT_TIMEOUT, "Last error was %d\n", GetLastError());
5668 ok(key == 0xdeadbeef, "Key is %lu\n", key);
5669 ok(num_bytes == 0xdeadbeef, "Number of bytes transferred is %u\n", num_bytes);
5670 ok(!olp, "Overlapped structure is at %p\n", olp);
5672 if (src != INVALID_SOCKET)
5673 closesocket(src);
5674 if (connector != INVALID_SOCKET)
5675 closesocket(connector);
5677 src = socket(AF_INET, SOCK_STREAM, 0);
5678 if (src == INVALID_SOCKET)
5680 skip("could not create listener socket, error %d\n", WSAGetLastError());
5681 goto end;
5684 memset(&bindAddress, 0, sizeof(bindAddress));
5685 bindAddress.sin_family = AF_INET;
5686 bindAddress.sin_addr.s_addr = inet_addr("127.0.0.1");
5687 iret = bind(src, (struct sockaddr*)&bindAddress, sizeof(bindAddress));
5688 if (iret != 0)
5690 skip("failed to bind, error %d\n", WSAGetLastError());
5691 goto end;
5694 socklen = sizeof(bindAddress);
5695 iret = getsockname(src, (struct sockaddr*)&bindAddress, &socklen);
5696 if (iret != 0) {
5697 skip("failed to lookup bind address, error %d\n", WSAGetLastError());
5698 goto end;
5701 if (set_blocking(src, FALSE))
5703 skip("couldn't make socket non-blocking, error %d\n", WSAGetLastError());
5704 goto end;
5707 iret = listen(src, 5);
5708 if (iret != 0)
5710 skip("listening failed, errno = %d\n", WSAGetLastError());
5711 goto end;
5714 dest = socket(AF_INET, SOCK_STREAM, 0);
5715 if (dest == INVALID_SOCKET)
5717 skip("could not create acceptor socket, error %d\n", WSAGetLastError());
5718 goto end;
5721 connector = socket(AF_INET, SOCK_STREAM, 0);
5722 if (connector == INVALID_SOCKET) {
5723 skip("could not create connector socket, error %d\n", WSAGetLastError());
5724 goto end;
5727 io_port = CreateIoCompletionPort((HANDLE)src, previous_port, 125, 0);
5728 ok(io_port != NULL, "failed to create completion port %u\n", GetLastError());
5730 io_port = CreateIoCompletionPort((HANDLE)dest, previous_port, 236, 0);
5731 ok(io_port != NULL, "failed to create completion port %u\n", GetLastError());
5733 bret = pAcceptEx(src, dest, buf, sizeof(buf) - 2*(sizeof(struct sockaddr_in) + 16),
5734 sizeof(struct sockaddr_in) + 16, sizeof(struct sockaddr_in) + 16,
5735 &num_bytes, &ov);
5736 ok(bret == FALSE, "AcceptEx returned %d\n", bret);
5737 ok(GetLastError() == ERROR_IO_PENDING, "Last error was %d\n", GetLastError());
5739 iret = connect(connector, (struct sockaddr*)&bindAddress, sizeof(bindAddress));
5740 ok(iret == 0, "connecting to accepting socket failed, error %d\n", GetLastError());
5742 closesocket(dest);
5743 dest = INVALID_SOCKET;
5745 SetLastError(0xdeadbeef);
5746 key = 0xdeadbeef;
5747 num_bytes = 0xdeadbeef;
5748 olp = (WSAOVERLAPPED *)0xdeadbeef;
5750 bret = GetQueuedCompletionStatus(io_port, &num_bytes, &key, &olp, 100);
5751 ok(bret == FALSE, "failed to get completion status %u\n", bret);
5752 todo_wine ok((GetLastError() == ERROR_NETNAME_DELETED) || (GetLastError() == ERROR_CONNECTION_ABORTED), "Last error was %d\n", GetLastError());
5753 ok(key == 125, "Key is %lu\n", key);
5754 ok(num_bytes == 0, "Number of bytes transferred is %u\n", num_bytes);
5755 ok(olp == &ov, "Overlapped structure is at %p\n", olp);
5756 todo_wine ok(olp && ((olp->Internal == (ULONG)STATUS_LOCAL_DISCONNECT)
5757 || (olp->Internal == (ULONG)STATUS_CONNECTION_ABORTED)), "Internal status is %lx\n", olp ? olp->Internal : 0);
5759 SetLastError(0xdeadbeef);
5760 key = 0xdeadbeef;
5761 num_bytes = 0xdeadbeef;
5762 olp = (WSAOVERLAPPED *)0xdeadbeef;
5763 bret = GetQueuedCompletionStatus( io_port, &num_bytes, &key, &olp, 200 );
5764 ok(bret == FALSE, "failed to get completion status %u\n", bret);
5765 ok(GetLastError() == WAIT_TIMEOUT, "Last error was %d\n", GetLastError());
5766 ok(key == 0xdeadbeef, "Key is %lu\n", key);
5767 ok(num_bytes == 0xdeadbeef, "Number of bytes transferred is %u\n", num_bytes);
5768 ok(!olp, "Overlapped structure is at %p\n", olp);
5771 end:
5772 if (dest != INVALID_SOCKET)
5773 closesocket(dest);
5774 if (src != INVALID_SOCKET)
5775 closesocket(src);
5776 if (connector != INVALID_SOCKET)
5777 closesocket(connector);
5778 CloseHandle(previous_port);
5781 /**************** Main program ***************/
5783 START_TEST( sock )
5785 int i;
5787 /* Leave these tests at the beginning. They depend on WSAStartup not having been
5788 * called, which is done by Init() below. */
5789 test_WithoutWSAStartup();
5790 test_WithWSAStartup();
5792 Init();
5794 test_set_getsockopt();
5795 test_so_reuseaddr();
5796 test_ip_pktinfo();
5797 test_extendedSocketOptions();
5799 for (i = 0; i < sizeof(tests)/sizeof(tests[0]); i++)
5801 trace ( " **** STARTING TEST %d ****\n", i );
5802 do_test ( &tests[i] );
5803 trace ( " **** TEST %d COMPLETE ****\n", i );
5806 test_UDP();
5808 test_getservbyname();
5809 test_WSASocket();
5811 test_WSAAddressToStringA();
5812 test_WSAAddressToStringW();
5814 test_WSAStringToAddressA();
5815 test_WSAStringToAddressW();
5817 test_errors();
5818 test_select();
5819 test_accept();
5820 test_getpeername();
5821 test_getsockname();
5822 test_inet_addr();
5823 test_addr_to_print();
5824 test_ioctlsocket();
5825 test_dns();
5826 test_gethostbyname_hack();
5828 test_WSASendTo();
5829 test_WSARecv();
5831 test_events(0);
5832 test_events(1);
5834 test_ipv6only();
5835 test_GetAddrInfoW();
5836 test_getaddrinfo();
5837 test_AcceptEx();
5838 test_ConnectEx();
5840 test_sioRoutingInterfaceQuery();
5842 test_WSAAsyncGetServByPort();
5843 test_WSAAsyncGetServByName();
5845 test_completion_port();
5847 /* this is a io heavy test, do it at the end so the kernel doesn't start dropping packets */
5848 test_send();
5849 test_synchronous_WSAIoctl();
5851 Exit();