unicast_test.go 6.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250
  1. // Copyright 2012 The Go Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style
  3. // license that can be found in the LICENSE file.
  4. package ipv4_test
  5. import (
  6. "bytes"
  7. "net"
  8. "os"
  9. "runtime"
  10. "testing"
  11. "time"
  12. "golang.org/x/net/internal/iana"
  13. "golang.org/x/net/internal/icmp"
  14. "golang.org/x/net/internal/nettest"
  15. "golang.org/x/net/ipv4"
  16. )
  17. func TestPacketConnReadWriteUnicastUDP(t *testing.T) {
  18. switch runtime.GOOS {
  19. case "nacl", "plan9", "solaris", "windows":
  20. t.Skipf("not supported on %q", runtime.GOOS)
  21. }
  22. ifi := nettest.RoutedInterface("ip4", net.FlagUp|net.FlagLoopback)
  23. if ifi == nil {
  24. t.Skipf("not available on %q", runtime.GOOS)
  25. }
  26. c, err := net.ListenPacket("udp4", "127.0.0.1:0")
  27. if err != nil {
  28. t.Fatal(err)
  29. }
  30. defer c.Close()
  31. dst, err := net.ResolveUDPAddr("udp4", c.LocalAddr().String())
  32. if err != nil {
  33. t.Fatal(err)
  34. }
  35. p := ipv4.NewPacketConn(c)
  36. defer p.Close()
  37. cf := ipv4.FlagTTL | ipv4.FlagDst | ipv4.FlagInterface
  38. wb := []byte("HELLO-R-U-THERE")
  39. for i, toggle := range []bool{true, false, true} {
  40. if err := p.SetControlMessage(cf, toggle); err != nil {
  41. if nettest.ProtocolNotSupported(err) {
  42. t.Logf("not supported on %q", runtime.GOOS)
  43. continue
  44. }
  45. t.Fatal(err)
  46. }
  47. p.SetTTL(i + 1)
  48. if err := p.SetWriteDeadline(time.Now().Add(100 * time.Millisecond)); err != nil {
  49. t.Fatal(err)
  50. }
  51. if n, err := p.WriteTo(wb, nil, dst); err != nil {
  52. t.Fatal(err)
  53. } else if n != len(wb) {
  54. t.Fatalf("got %v; want %v", n, len(wb))
  55. }
  56. rb := make([]byte, 128)
  57. if err := p.SetReadDeadline(time.Now().Add(100 * time.Millisecond)); err != nil {
  58. t.Fatal(err)
  59. }
  60. if n, cm, _, err := p.ReadFrom(rb); err != nil {
  61. t.Fatal(err)
  62. } else if !bytes.Equal(rb[:n], wb) {
  63. t.Fatalf("got %v; want %v", rb[:n], wb)
  64. } else {
  65. t.Logf("rcvd cmsg: %v", cm)
  66. }
  67. }
  68. }
  69. func TestPacketConnReadWriteUnicastICMP(t *testing.T) {
  70. switch runtime.GOOS {
  71. case "nacl", "plan9", "solaris", "windows":
  72. t.Skipf("not supported on %q", runtime.GOOS)
  73. }
  74. if os.Getuid() != 0 {
  75. t.Skip("must be root")
  76. }
  77. ifi := nettest.RoutedInterface("ip4", net.FlagUp|net.FlagLoopback)
  78. if ifi == nil {
  79. t.Skipf("not available on %q", runtime.GOOS)
  80. }
  81. c, err := net.ListenPacket("ip4:icmp", "0.0.0.0")
  82. if err != nil {
  83. t.Fatal(err)
  84. }
  85. defer c.Close()
  86. dst, err := net.ResolveIPAddr("ip4", "127.0.0.1")
  87. if err != nil {
  88. t.Fatal(err)
  89. }
  90. p := ipv4.NewPacketConn(c)
  91. defer p.Close()
  92. cf := ipv4.FlagTTL | ipv4.FlagDst | ipv4.FlagInterface
  93. for i, toggle := range []bool{true, false, true} {
  94. wb, err := (&icmp.Message{
  95. Type: ipv4.ICMPTypeEcho, Code: 0,
  96. Body: &icmp.Echo{
  97. ID: os.Getpid() & 0xffff, Seq: i + 1,
  98. Data: []byte("HELLO-R-U-THERE"),
  99. },
  100. }).Marshal(nil)
  101. if err != nil {
  102. t.Fatal(err)
  103. }
  104. if err := p.SetControlMessage(cf, toggle); err != nil {
  105. if nettest.ProtocolNotSupported(err) {
  106. t.Logf("not supported on %q", runtime.GOOS)
  107. continue
  108. }
  109. t.Fatal(err)
  110. }
  111. p.SetTTL(i + 1)
  112. if err := p.SetWriteDeadline(time.Now().Add(100 * time.Millisecond)); err != nil {
  113. t.Fatal(err)
  114. }
  115. if n, err := p.WriteTo(wb, nil, dst); err != nil {
  116. t.Fatal(err)
  117. } else if n != len(wb) {
  118. t.Fatalf("got %v; want %v", n, len(wb))
  119. }
  120. rb := make([]byte, 128)
  121. loop:
  122. if err := p.SetReadDeadline(time.Now().Add(100 * time.Millisecond)); err != nil {
  123. t.Fatal(err)
  124. }
  125. if n, cm, _, err := p.ReadFrom(rb); err != nil {
  126. switch runtime.GOOS {
  127. case "darwin": // older darwin kernels have some limitation on receiving icmp packet through raw socket
  128. t.Logf("not supported on %q", runtime.GOOS)
  129. continue
  130. }
  131. t.Fatal(err)
  132. } else {
  133. t.Logf("rcvd cmsg: %v", cm)
  134. m, err := icmp.ParseMessage(iana.ProtocolICMP, rb[:n])
  135. if err != nil {
  136. t.Fatal(err)
  137. }
  138. if runtime.GOOS == "linux" && m.Type == ipv4.ICMPTypeEcho {
  139. // On Linux we must handle own sent packets.
  140. goto loop
  141. }
  142. if m.Type != ipv4.ICMPTypeEchoReply || m.Code != 0 {
  143. t.Fatalf("got type=%v, code=%v; want type=%v, code=%v", m.Type, m.Code, ipv4.ICMPTypeEchoReply, 0)
  144. }
  145. }
  146. }
  147. }
  148. func TestRawConnReadWriteUnicastICMP(t *testing.T) {
  149. switch runtime.GOOS {
  150. case "nacl", "plan9", "solaris", "windows":
  151. t.Skipf("not supported on %q", runtime.GOOS)
  152. }
  153. if os.Getuid() != 0 {
  154. t.Skip("must be root")
  155. }
  156. ifi := nettest.RoutedInterface("ip4", net.FlagUp|net.FlagLoopback)
  157. if ifi == nil {
  158. t.Skipf("not available on %q", runtime.GOOS)
  159. }
  160. c, err := net.ListenPacket("ip4:icmp", "0.0.0.0")
  161. if err != nil {
  162. t.Fatal(err)
  163. }
  164. defer c.Close()
  165. dst, err := net.ResolveIPAddr("ip4", "127.0.0.1")
  166. if err != nil {
  167. t.Fatal(err)
  168. }
  169. r, err := ipv4.NewRawConn(c)
  170. if err != nil {
  171. t.Fatal(err)
  172. }
  173. defer r.Close()
  174. cf := ipv4.FlagTTL | ipv4.FlagDst | ipv4.FlagInterface
  175. for i, toggle := range []bool{true, false, true} {
  176. wb, err := (&icmp.Message{
  177. Type: ipv4.ICMPTypeEcho, Code: 0,
  178. Body: &icmp.Echo{
  179. ID: os.Getpid() & 0xffff, Seq: i + 1,
  180. Data: []byte("HELLO-R-U-THERE"),
  181. },
  182. }).Marshal(nil)
  183. if err != nil {
  184. t.Fatal(err)
  185. }
  186. wh := &ipv4.Header{
  187. Version: ipv4.Version,
  188. Len: ipv4.HeaderLen,
  189. TOS: i + 1,
  190. TotalLen: ipv4.HeaderLen + len(wb),
  191. TTL: i + 1,
  192. Protocol: 1,
  193. Dst: dst.IP,
  194. }
  195. if err := r.SetControlMessage(cf, toggle); err != nil {
  196. if nettest.ProtocolNotSupported(err) {
  197. t.Logf("not supported on %q", runtime.GOOS)
  198. continue
  199. }
  200. t.Fatal(err)
  201. }
  202. if err := r.SetWriteDeadline(time.Now().Add(100 * time.Millisecond)); err != nil {
  203. t.Fatal(err)
  204. }
  205. if err := r.WriteTo(wh, wb, nil); err != nil {
  206. t.Fatal(err)
  207. }
  208. rb := make([]byte, ipv4.HeaderLen+128)
  209. loop:
  210. if err := r.SetReadDeadline(time.Now().Add(100 * time.Millisecond)); err != nil {
  211. t.Fatal(err)
  212. }
  213. if _, b, cm, err := r.ReadFrom(rb); err != nil {
  214. switch runtime.GOOS {
  215. case "darwin": // older darwin kernels have some limitation on receiving icmp packet through raw socket
  216. t.Logf("not supported on %q", runtime.GOOS)
  217. continue
  218. }
  219. t.Fatal(err)
  220. } else {
  221. t.Logf("rcvd cmsg: %v", cm)
  222. m, err := icmp.ParseMessage(iana.ProtocolICMP, b)
  223. if err != nil {
  224. t.Fatal(err)
  225. }
  226. if runtime.GOOS == "linux" && m.Type == ipv4.ICMPTypeEcho {
  227. // On Linux we must handle own sent packets.
  228. goto loop
  229. }
  230. if m.Type != ipv4.ICMPTypeEchoReply || m.Code != 0 {
  231. t.Fatalf("got type=%v, code=%v; want type=%v, code=%v", m.Type, m.Code, ipv4.ICMPTypeEchoReply, 0)
  232. }
  233. }
  234. }
  235. }