+
+/*
+ Connection oriented tests.
+*/
+static int conn( ) {
+ int errors = 0;
+ int state;
+ int cfd = 3; // fd for close
+ char* buf;
+
+ state = SIconnect( si_ctx, "localhost:4567" ); // driver regular connect
+ errors += fail_if_true( state < 0, "connect to low port failed" );
+
+ state = SIconnect( si_ctx, "localhost:43086" ); // drive save connect with good return code
+ errors += fail_if_true( state < 0, "connect to high port failed" );
+
+ tpem_set_addr_dup_state( 1 ); // force get sockket name emulation to return a duplicate address
+ state = SIconnect( si_ctx, "localhost:43086" ); // drive save connect with good return code
+ errors += fail_if_true( state >= 0, "forced dup connect did not return error" );
+
+ tpem_set_addr_dup_state( 0 ); // back to normal
+ tpem_set_conn_state( -1 );
+ state = SIconnect( si_ctx, "localhost:4567" ); // driver regular connect
+ errors += fail_if_true( state >= 0, "connect to low port successful when failure expected" );
+ tpem_set_conn_state( 3 );
+
+ tpem_set_sock_state( 1 ); // make scoket calls fail
+ state = SIconnect( si_ctx, "localhost:4567" ); // driver regular connect
+ errors += fail_if_true( state >= 0, "connect to low port successful when socket based failure expected" );
+
+ tpem_set_sock_state( 0 );
+
+ state = SIlistener( si_ctx, TCP_DEVICE, "0.0.0.0:4567" );
+ errors += fail_if_true( state < 0, "listen failed" );
+
+ tpem_set_bind_state( 1 );
+ state = SIlistener( si_ctx, TCP_DEVICE, "0.0.0.0:4567" );
+ errors += fail_if_true( state >= 0, "listen successful when bind error set" );
+ tpem_set_bind_state( 0 );
+
+ SIbldpoll( si_ctx ); // for coverage. no return value and nothing we can check
+
+ state = SIclose( NULL, 0 ); //coverage
+ errors += fail_if_true( state != SI_ERROR, "close given nil context returned success" );
+
+ state = SIclose( si_ctx, cfd );
+ errors += fail_if_true( state == SI_ERROR, "close given good context and good fd returned error" );
+
+ state = SIclose( si_ctx, 5000 ); // out of range fd
+ errors += fail_if_true( state != SI_ERROR, "close given good context and bad fd returned success" );
+
+ state = SIclose( si_ctx, TCP_LISTEN_PORT ); // close listener
+ errors += fail_if_true( state == SI_ERROR, "close given good context and listener fd returned error" );
+
+ state = SIclose( si_ctx, UDP_PORT ); // close first open udp port (should not be there)
+ errors += fail_if_true( state != SI_ERROR, "close given good context and udp generic fd returned error" );
+
+ buf = SIgetname( 3 );
+ if( fail_if_true( buf == NULL, "get name failed to return a buffer" ) ) {
+ errors++;
+ } else {
+ errors += fail_if_true( buf[0] == 0, "get name returned buf with emtpy string" );
+ free( buf );
+ }
+
+ buf = SIgetname( -1 ); // invalid fd
+ errors += fail_not_nil( buf, "get name returned buf with non-emtpy string when given bad fd" );
+
+ fprintf( stderr, "<INFO> conn module finished with %d errors\n", errors );
+ return errors;
+}
+
+/*
+ Misc tests that just don't fit in another bucket.
+*/
+static int misc( ) {
+ int errors = 0;
+ char buf[1024];
+
+ SIcbreg( NULL, SI_CB_SECURITY, test_cb, NULL ); // coverage only, no return value no verification
+ SIcbreg( si_ctx, SI_CB_SECURITY, test_cb, NULL );
+
+ buf[0] = 0;
+ SIgetaddr( si_ctx, buf );
+ errors += fail_if_true( buf[0] == 0, "get address failed" );
+ fprintf( stderr, "<INFO> get address returns (%s)\n", buf );
+
+ fprintf( stderr, "<INFO> misc module finished with %d errors\n", errors );
+ return errors;
+}
+
+
+/*
+ New session (accept) testing.
+*/
+static int new_sess( ) {
+ int errors = 0;
+ char buf[1024];
+ struct tp_blk *tpptr;
+ int status;
+
+ tpptr = SInew( TP_BLK );
+ tpptr->fd = 3;
+ tpptr->flags |= TPF_LISTENFD;
+
+ tpem_set_accept_fd( -1 ); // accept will "fail" for coverage
+ status = SInewsession( si_ctx, tpptr );
+ errors += fail_if_true( status != SI_ERROR, "newsession did not fail when accept fails" );
+
+ tpem_set_accept_fd( 5 ); // accept will return a good fd
+ SIcbreg( si_ctx, SI_CB_SECURITY, test_cb_err, NULL ); // register error and drive new session for error coverage
+ status = SInewsession( si_ctx, tpptr );
+ errors += fail_if_true( status >= 0, "newsession did failed when accept was good" );
+
+ tpem_set_accept_fd( 6 ); // accept will return a good fd
+ SIset_tflags( si_ctx, SI_TF_NODELAY | SI_TF_FASTACK ); // flip options for coverage in new sess
+ SIcbreg( si_ctx, SI_CB_CONN, test_cb, NULL ); // drive connection for coverage
+ SIcbreg( si_ctx, SI_CB_SECURITY, test_cb, NULL );
+ status = SInewsession( si_ctx, tpptr );
+ errors += fail_if_true( status < 0, "newsession did failed when accept was good" );
+
+ fprintf( stderr, "<INFO> new_sess module finished with %d errors\n", errors );
+ return errors;
+}
+
+/*
+ Send tests
+*/
+static int send_tests( ) {
+ int errors = 0;
+ char buf[1024];
+ int len;
+ int state;
+
+ len = snprintf( buf, 100, "Heaven knows I'm miserable now!" );
+
+ state = SIsendt( si_ctx, 9999, buf, len );
+ errors += fail_if_true( state >= 0, "send given fd out of range did not fail" );
+
+ state = SIsendt( si_ctx, -1, buf, len );
+ errors += fail_if_true( state >= 0, "send given neg fd did not fail" );
+
+ SIsendt( si_ctx, 6, buf, len );
+
+ tpem_set_send_err( 99 );
+ SIsendt( si_ctx, 6, buf, len );
+
+ tpem_set_send_err( 0 );
+ tpem_set_sel_blk( 1 );
+ SIsendt( si_ctx, 6, buf, len );
+
+ tpem_set_sel_blk( 0 );
+ tpem_set_selef_fd( 6 ); // will cause send to fail and fd6 to close
+ SIsendt( si_ctx, 6, buf, len );
+
+ return errors;
+}
+
+
+// ----------------------------------------------------------------------------------------
+