sockopt_test.go 2.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118
  1. // Copyright 2013 The Go Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style
  3. // license that can be found in the LICENSE file.
  4. package ipv6_test
  5. import (
  6. "code.google.com/p/go.net/ipv6"
  7. "net"
  8. "os"
  9. "runtime"
  10. "testing"
  11. )
  12. var condFatalf = func() func(*testing.T, string, ...interface{}) {
  13. // A few APIs are not implemented yet on some platforms.
  14. switch runtime.GOOS {
  15. case "darwin", "plan9", "windows":
  16. return (*testing.T).Logf
  17. }
  18. return (*testing.T).Fatalf
  19. }()
  20. func TestConnInitiatorPathMTU(t *testing.T) {
  21. switch runtime.GOOS {
  22. case "plan9", "windows":
  23. t.Skipf("not supported on %q", runtime.GOOS)
  24. }
  25. ln, err := net.Listen("tcp6", "[::1]:0")
  26. if err != nil {
  27. t.Fatalf("net.Listen failed: %v", err)
  28. }
  29. defer ln.Close()
  30. done := make(chan bool)
  31. go acceptor(t, ln, done)
  32. c, err := net.Dial("tcp6", ln.Addr().String())
  33. if err != nil {
  34. t.Fatalf("net.Dial failed: %v", err)
  35. }
  36. defer c.Close()
  37. if pmtu, err := ipv6.NewConn(c).PathMTU(); err != nil {
  38. condFatalf(t, "ipv6.Conn.PathMTU failed: %v", err)
  39. } else {
  40. t.Logf("path mtu for %v: %v", c.RemoteAddr(), pmtu)
  41. }
  42. <-done
  43. }
  44. func TestConnResponderPathMTU(t *testing.T) {
  45. switch runtime.GOOS {
  46. case "plan9", "windows":
  47. t.Skipf("not supported on %q", runtime.GOOS)
  48. }
  49. ln, err := net.Listen("tcp6", "[::1]:0")
  50. if err != nil {
  51. t.Fatalf("net.Listen failed: %v", err)
  52. }
  53. defer ln.Close()
  54. done := make(chan bool)
  55. go connector(t, "tcp6", ln.Addr().String(), done)
  56. c, err := ln.Accept()
  57. if err != nil {
  58. t.Fatalf("net.Accept failed: %v", err)
  59. }
  60. defer c.Close()
  61. if pmtu, err := ipv6.NewConn(c).PathMTU(); err != nil {
  62. condFatalf(t, "ipv6.Conn.PathMTU failed: %v", err)
  63. } else {
  64. t.Logf("path mtu for %v: %v", c.RemoteAddr(), pmtu)
  65. }
  66. <-done
  67. }
  68. func TestPacketConnChecksum(t *testing.T) {
  69. switch runtime.GOOS {
  70. case "plan9", "windows":
  71. t.Skipf("not supported on %q", runtime.GOOS)
  72. }
  73. if os.Getuid() != 0 {
  74. t.Skip("must be root")
  75. }
  76. c, err := net.ListenPacket("ip6:89", "::") // OSPF for IPv6
  77. if err != nil {
  78. t.Fatalf("net.ListenPacket failed: %v", err)
  79. }
  80. defer c.Close()
  81. p := ipv6.NewPacketConn(c)
  82. offset := 12 // see RFC 5340
  83. for _, toggle := range []bool{false, true} {
  84. if err := p.SetChecksum(toggle, offset); err != nil {
  85. if toggle {
  86. t.Fatalf("ipv6.PacketConn.SetChecksum(%v, %v) failed: %v", toggle, offset, err)
  87. } else {
  88. // Some platforms never allow to disable the kernel
  89. // checksum processing.
  90. t.Logf("ipv6.PacketConn.SetChecksum(%v, %v) failed: %v", toggle, offset, err)
  91. }
  92. }
  93. if on, offset, err := p.Checksum(); err != nil {
  94. t.Fatalf("ipv6.PacketConn.Checksum failed: %v", err)
  95. } else {
  96. t.Logf("kernel checksum processing enabled=%v, offset=%v", on, offset)
  97. }
  98. }
  99. }