| /* SPDX-License-Identifier: LGPL-2.1-or-later */ |
| /*** |
| Copyright © 2013 Intel Corporation. All rights reserved. |
| ***/ |
| |
| #include <errno.h> |
| #include <net/if.h> |
| #include <net/if_arp.h> |
| #include <stdio.h> |
| #include <sys/socket.h> |
| #include <unistd.h> |
| |
| #include "sd-dhcp-client.h" |
| #include "sd-event.h" |
| |
| #include "alloc-util.h" |
| #include "dhcp-identifier.h" |
| #include "dhcp-internal.h" |
| #include "dhcp-protocol.h" |
| #include "fd-util.h" |
| #include "random-util.h" |
| #include "tests.h" |
| #include "util.h" |
| |
| static uint8_t mac_addr[] = {'A', 'B', 'C', '1', '2', '3'}; |
| static uint8_t bcast_addr[] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }; |
| |
| typedef int (*test_callback_recv_t)(size_t size, DHCPMessage *dhcp); |
| |
| static bool verbose = true; |
| static int test_fd[2]; |
| static test_callback_recv_t callback_recv; |
| static be32_t xid; |
| static sd_event_source *test_hangcheck; |
| |
| static int test_dhcp_hangcheck(sd_event_source *s, uint64_t usec, void *userdata) { |
| assert_not_reached("Test case should have completed in 2 seconds"); |
| |
| return 0; |
| } |
| |
| static void test_request_basic(sd_event *e) { |
| int r; |
| |
| sd_dhcp_client *client; |
| |
| if (verbose) |
| printf("* %s\n", __FUNCTION__); |
| |
| /* Initialize client without Anonymize settings. */ |
| r = sd_dhcp_client_new(&client, false); |
| |
| assert_se(r >= 0); |
| assert_se(client); |
| |
| r = sd_dhcp_client_attach_event(client, e, 0); |
| assert_se(r >= 0); |
| |
| assert_se(sd_dhcp_client_set_request_option(NULL, 0) == -EINVAL); |
| assert_se(sd_dhcp_client_set_request_address(NULL, NULL) == -EINVAL); |
| assert_se(sd_dhcp_client_set_ifindex(NULL, 0) == -EINVAL); |
| |
| assert_se(sd_dhcp_client_set_ifindex(client, 15) == 0); |
| assert_se(sd_dhcp_client_set_ifindex(client, -42) == -EINVAL); |
| assert_se(sd_dhcp_client_set_ifindex(client, -1) == -EINVAL); |
| assert_se(sd_dhcp_client_set_ifindex(client, 0) == -EINVAL); |
| assert_se(sd_dhcp_client_set_ifindex(client, 1) == 0); |
| |
| assert_se(sd_dhcp_client_set_hostname(client, "host") == 1); |
| assert_se(sd_dhcp_client_set_hostname(client, "host.domain") == 1); |
| assert_se(sd_dhcp_client_set_hostname(client, NULL) == 1); |
| assert_se(sd_dhcp_client_set_hostname(client, "~host") == -EINVAL); |
| assert_se(sd_dhcp_client_set_hostname(client, "~host.domain") == -EINVAL); |
| |
| assert_se(sd_dhcp_client_set_request_option(client, SD_DHCP_OPTION_SUBNET_MASK) == 0); |
| assert_se(sd_dhcp_client_set_request_option(client, SD_DHCP_OPTION_ROUTER) == 0); |
| /* This PRL option is not set when using Anonymize, but in this test |
| * Anonymize settings are not being used. */ |
| assert_se(sd_dhcp_client_set_request_option(client, SD_DHCP_OPTION_HOST_NAME) == 0); |
| assert_se(sd_dhcp_client_set_request_option(client, SD_DHCP_OPTION_DOMAIN_NAME) == 0); |
| assert_se(sd_dhcp_client_set_request_option(client, SD_DHCP_OPTION_DOMAIN_NAME_SERVER) == 0); |
| |
| assert_se(sd_dhcp_client_set_request_option(client, SD_DHCP_OPTION_PAD) == -EINVAL); |
| assert_se(sd_dhcp_client_set_request_option(client, SD_DHCP_OPTION_END) == -EINVAL); |
| assert_se(sd_dhcp_client_set_request_option(client, SD_DHCP_OPTION_MESSAGE_TYPE) == -EINVAL); |
| assert_se(sd_dhcp_client_set_request_option(client, SD_DHCP_OPTION_OVERLOAD) == -EINVAL); |
| assert_se(sd_dhcp_client_set_request_option(client, SD_DHCP_OPTION_PARAMETER_REQUEST_LIST) == -EINVAL); |
| |
| /* RFC7844: option 33 (SD_DHCP_OPTION_STATIC_ROUTE) is set in the |
| * default PRL when using Anonymize, so it is changed to other option |
| * that is not set by default, to check that it was set successfully. |
| * Options not set by default (using or not anonymize) are option 17 |
| * (SD_DHCP_OPTION_ROOT_PATH) and 42 (SD_DHCP_OPTION_NTP_SERVER) */ |
| assert_se(sd_dhcp_client_set_request_option(client, 17) == 1); |
| assert_se(sd_dhcp_client_set_request_option(client, 17) == 0); |
| assert_se(sd_dhcp_client_set_request_option(client, 42) == 1); |
| assert_se(sd_dhcp_client_set_request_option(client, 17) == 0); |
| |
| sd_dhcp_client_unref(client); |
| } |
| |
| static void test_request_anonymize(sd_event *e) { |
| int r; |
| |
| sd_dhcp_client *client; |
| |
| if (verbose) |
| printf("* %s\n", __FUNCTION__); |
| |
| /* Initialize client with Anonymize settings. */ |
| r = sd_dhcp_client_new(&client, true); |
| |
| assert_se(r >= 0); |
| assert_se(client); |
| |
| r = sd_dhcp_client_attach_event(client, e, 0); |
| assert_se(r >= 0); |
| |
| assert_se(sd_dhcp_client_set_request_option(client, SD_DHCP_OPTION_NETBIOS_NAMESERVER) == 0); |
| /* This PRL option is not set when using Anonymize */ |
| assert_se(sd_dhcp_client_set_request_option(client, SD_DHCP_OPTION_HOST_NAME) == 1); |
| assert_se(sd_dhcp_client_set_request_option(client, SD_DHCP_OPTION_PARAMETER_REQUEST_LIST) == -EINVAL); |
| |
| /* RFC7844: option 101 (SD_DHCP_OPTION_NEW_TZDB_TIMEZONE) is not set in the |
| * default PRL when using Anonymize, */ |
| assert_se(sd_dhcp_client_set_request_option(client, 101) == 1); |
| assert_se(sd_dhcp_client_set_request_option(client, 101) == 0); |
| |
| sd_dhcp_client_unref(client); |
| } |
| |
| static void test_checksum(void) { |
| uint8_t buf[20] = { |
| 0x45, 0x00, 0x02, 0x40, 0x00, 0x00, 0x00, 0x00, |
| 0x40, 0x11, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0xff, 0xff, 0xff, 0xff |
| }; |
| |
| if (verbose) |
| printf("* %s\n", __FUNCTION__); |
| |
| assert_se(dhcp_packet_checksum((uint8_t*)&buf, 20) == be16toh(0x78ae)); |
| } |
| |
| static void test_dhcp_identifier_set_iaid(void) { |
| uint32_t iaid_legacy; |
| be32_t iaid; |
| int ifindex; |
| |
| for (;;) { |
| char ifname[IFNAMSIZ]; |
| |
| /* try to find an ifindex which does not exist. I causes dhcp_identifier_set_iaid() |
| * to hash the MAC address. */ |
| pseudo_random_bytes(&ifindex, sizeof(ifindex)); |
| if (ifindex > 0 && !if_indextoname(ifindex, ifname)) |
| break; |
| } |
| |
| assert_se(dhcp_identifier_set_iaid(ifindex, mac_addr, sizeof(mac_addr), true, &iaid_legacy) >= 0); |
| assert_se(dhcp_identifier_set_iaid(ifindex, mac_addr, sizeof(mac_addr), false, &iaid) >= 0); |
| |
| /* we expect, that the MAC address was hashed. The legacy value is in native |
| * endianness. */ |
| assert_se(iaid_legacy == 0x8dde4ba8u); |
| assert_se(iaid == htole32(0x8dde4ba8u)); |
| #if __BYTE_ORDER == __LITTLE_ENDIAN |
| assert_se(iaid == iaid_legacy); |
| #else |
| assert_se(iaid == __bswap_32(iaid_legacy)); |
| #endif |
| } |
| |
| static int check_options(uint8_t code, uint8_t len, const void *option, void *userdata) { |
| switch(code) { |
| case SD_DHCP_OPTION_CLIENT_IDENTIFIER: |
| { |
| uint32_t iaid; |
| struct duid duid; |
| size_t duid_len; |
| |
| assert_se(dhcp_identifier_set_duid_en(&duid, &duid_len) >= 0); |
| assert_se(dhcp_identifier_set_iaid(42, mac_addr, ETH_ALEN, true, &iaid) >= 0); |
| |
| assert_se(len == sizeof(uint8_t) + sizeof(uint32_t) + duid_len); |
| assert_se(len == 19); |
| assert_se(((uint8_t*) option)[0] == 0xff); |
| |
| assert_se(memcmp((uint8_t*) option + 1, &iaid, sizeof(iaid)) == 0); |
| assert_se(memcmp((uint8_t*) option + 5, &duid, duid_len) == 0); |
| break; |
| } |
| |
| default: |
| break; |
| } |
| |
| return 0; |
| } |
| |
| int dhcp_network_send_raw_socket(int s, const union sockaddr_union *link, const void *packet, size_t len) { |
| size_t size; |
| _cleanup_free_ DHCPPacket *discover; |
| uint16_t ip_check, udp_check; |
| |
| assert_se(s >= 0); |
| assert_se(packet); |
| |
| size = sizeof(DHCPPacket); |
| assert_se(len > size); |
| |
| discover = memdup(packet, len); |
| |
| assert_se(discover->ip.ttl == IPDEFTTL); |
| assert_se(discover->ip.protocol == IPPROTO_UDP); |
| assert_se(discover->ip.saddr == INADDR_ANY); |
| assert_se(discover->ip.daddr == INADDR_BROADCAST); |
| assert_se(discover->udp.source == be16toh(DHCP_PORT_CLIENT)); |
| assert_se(discover->udp.dest == be16toh(DHCP_PORT_SERVER)); |
| |
| ip_check = discover->ip.check; |
| |
| discover->ip.ttl = 0; |
| discover->ip.check = discover->udp.len; |
| |
| udp_check = ~dhcp_packet_checksum((uint8_t*)&discover->ip.ttl, len - 8); |
| assert_se(udp_check == 0xffff); |
| |
| discover->ip.ttl = IPDEFTTL; |
| discover->ip.check = ip_check; |
| |
| ip_check = ~dhcp_packet_checksum((uint8_t*)&discover->ip, sizeof(discover->ip)); |
| assert_se(ip_check == 0xffff); |
| |
| assert_se(discover->dhcp.xid); |
| assert_se(memcmp(discover->dhcp.chaddr, &mac_addr, ETH_ALEN) == 0); |
| |
| size = len - sizeof(struct iphdr) - sizeof(struct udphdr); |
| |
| assert_se(callback_recv); |
| callback_recv(size, &discover->dhcp); |
| |
| return 575; |
| } |
| |
| int dhcp_network_bind_raw_socket( |
| int ifindex, |
| union sockaddr_union *link, |
| uint32_t id, |
| const uint8_t *addr, size_t addr_len, |
| const uint8_t *bcaddr, size_t bcaddr_len, |
| uint16_t arp_type, uint16_t port) { |
| |
| if (socketpair(AF_UNIX, SOCK_STREAM | SOCK_CLOEXEC | SOCK_NONBLOCK, 0, test_fd) < 0) |
| return -errno; |
| |
| return test_fd[0]; |
| } |
| |
| int dhcp_network_bind_udp_socket(int ifindex, be32_t address, uint16_t port, int ip_service_type) { |
| int fd; |
| |
| fd = socket(AF_INET, SOCK_DGRAM | SOCK_CLOEXEC | SOCK_NONBLOCK, 0); |
| if (fd < 0) |
| return -errno; |
| |
| return fd; |
| } |
| |
| int dhcp_network_send_udp_socket(int s, be32_t address, uint16_t port, const void *packet, size_t len) { |
| return 0; |
| } |
| |
| static int test_discover_message_verify(size_t size, struct DHCPMessage *dhcp) { |
| int res; |
| |
| res = dhcp_option_parse(dhcp, size, check_options, NULL, NULL); |
| assert_se(res == DHCP_DISCOVER); |
| |
| if (verbose) |
| printf(" recv DHCP Discover 0x%08x\n", be32toh(dhcp->xid)); |
| |
| return 0; |
| } |
| |
| static void test_discover_message(sd_event *e) { |
| sd_dhcp_client *client; |
| int res, r; |
| |
| if (verbose) |
| printf("* %s\n", __FUNCTION__); |
| |
| r = sd_dhcp_client_new(&client, false); |
| assert_se(r >= 0); |
| assert_se(client); |
| |
| r = sd_dhcp_client_attach_event(client, e, 0); |
| assert_se(r >= 0); |
| |
| assert_se(sd_dhcp_client_set_ifindex(client, 42) >= 0); |
| assert_se(sd_dhcp_client_set_mac(client, mac_addr, bcast_addr, ETH_ALEN, ARPHRD_ETHER) >= 0); |
| |
| assert_se(sd_dhcp_client_set_request_option(client, 248) >= 0); |
| |
| callback_recv = test_discover_message_verify; |
| |
| res = sd_dhcp_client_start(client); |
| |
| assert_se(IN_SET(res, 0, -EINPROGRESS)); |
| |
| sd_event_run(e, (uint64_t) -1); |
| |
| sd_dhcp_client_stop(client); |
| sd_dhcp_client_unref(client); |
| |
| test_fd[1] = safe_close(test_fd[1]); |
| |
| callback_recv = NULL; |
| } |
| |
| static uint8_t test_addr_acq_offer[] = { |
| 0x45, 0x10, 0x01, 0x48, 0x00, 0x00, 0x00, 0x00, |
| 0x80, 0x11, 0xb3, 0x84, 0xc0, 0xa8, 0x02, 0x01, |
| 0xc0, 0xa8, 0x02, 0xbf, 0x00, 0x43, 0x00, 0x44, |
| 0x01, 0x34, 0x00, 0x00, 0x02, 0x01, 0x06, 0x00, |
| 0x6f, 0x95, 0x2f, 0x30, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0xc0, 0xa8, 0x02, 0xbf, |
| 0xc0, 0xa8, 0x02, 0x01, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x63, 0x82, 0x53, 0x63, 0x35, 0x01, 0x02, 0x36, |
| 0x04, 0xc0, 0xa8, 0x02, 0x01, 0x33, 0x04, 0x00, |
| 0x00, 0x02, 0x58, 0x01, 0x04, 0xff, 0xff, 0xff, |
| 0x00, 0x2a, 0x04, 0xc0, 0xa8, 0x02, 0x01, 0x0f, |
| 0x09, 0x6c, 0x61, 0x62, 0x2e, 0x69, 0x6e, 0x74, |
| 0x72, 0x61, 0x03, 0x04, 0xc0, 0xa8, 0x02, 0x01, |
| 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| }; |
| |
| static uint8_t test_addr_acq_ack[] = { |
| 0x45, 0x10, 0x01, 0x48, 0x00, 0x00, 0x00, 0x00, |
| 0x80, 0x11, 0xb3, 0x84, 0xc0, 0xa8, 0x02, 0x01, |
| 0xc0, 0xa8, 0x02, 0xbf, 0x00, 0x43, 0x00, 0x44, |
| 0x01, 0x34, 0x00, 0x00, 0x02, 0x01, 0x06, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0xc0, 0xa8, 0x02, 0xbf, |
| 0xc0, 0xa8, 0x02, 0x01, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x63, 0x82, 0x53, 0x63, 0x35, 0x01, 0x05, 0x36, |
| 0x04, 0xc0, 0xa8, 0x02, 0x01, 0x33, 0x04, 0x00, |
| 0x00, 0x02, 0x58, 0x01, 0x04, 0xff, 0xff, 0xff, |
| 0x00, 0x2a, 0x04, 0xc0, 0xa8, 0x02, 0x01, 0x0f, |
| 0x09, 0x6c, 0x61, 0x62, 0x2e, 0x69, 0x6e, 0x74, |
| 0x72, 0x61, 0x03, 0x04, 0xc0, 0xa8, 0x02, 0x01, |
| 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| }; |
| |
| static int test_addr_acq_acquired(sd_dhcp_client *client, int event, |
| void *userdata) { |
| sd_event *e = userdata; |
| sd_dhcp_lease *lease; |
| struct in_addr addr; |
| const struct in_addr *addrs; |
| |
| assert_se(client); |
| assert_se(IN_SET(event, SD_DHCP_CLIENT_EVENT_IP_ACQUIRE, SD_DHCP_CLIENT_EVENT_SELECTING)); |
| |
| assert_se(sd_dhcp_client_get_lease(client, &lease) >= 0); |
| assert_se(lease); |
| |
| assert_se(sd_dhcp_lease_get_address(lease, &addr) >= 0); |
| assert_se(memcmp(&addr.s_addr, &test_addr_acq_ack[44], |
| sizeof(addr.s_addr)) == 0); |
| |
| assert_se(sd_dhcp_lease_get_netmask(lease, &addr) >= 0); |
| assert_se(memcmp(&addr.s_addr, &test_addr_acq_ack[285], |
| sizeof(addr.s_addr)) == 0); |
| |
| assert_se(sd_dhcp_lease_get_router(lease, &addrs) == 1); |
| assert_se(memcmp(&addrs[0].s_addr, &test_addr_acq_ack[308], |
| sizeof(addrs[0].s_addr)) == 0); |
| |
| if (verbose) |
| printf(" DHCP address acquired\n"); |
| |
| sd_event_exit(e, 0); |
| |
| return 0; |
| } |
| |
| static int test_addr_acq_recv_request(size_t size, DHCPMessage *request) { |
| uint16_t udp_check = 0; |
| uint8_t *msg_bytes = (uint8_t *)request; |
| int res; |
| |
| res = dhcp_option_parse(request, size, check_options, NULL, NULL); |
| assert_se(res == DHCP_REQUEST); |
| assert_se(xid == request->xid); |
| |
| assert_se(msg_bytes[size - 1] == SD_DHCP_OPTION_END); |
| |
| if (verbose) |
| printf(" recv DHCP Request 0x%08x\n", be32toh(xid)); |
| |
| memcpy(&test_addr_acq_ack[26], &udp_check, sizeof(udp_check)); |
| memcpy(&test_addr_acq_ack[32], &xid, sizeof(xid)); |
| memcpy(&test_addr_acq_ack[56], &mac_addr, ETHER_ADDR_LEN); |
| |
| callback_recv = NULL; |
| |
| res = write(test_fd[1], test_addr_acq_ack, |
| sizeof(test_addr_acq_ack)); |
| assert_se(res == sizeof(test_addr_acq_ack)); |
| |
| if (verbose) |
| printf(" send DHCP Ack\n"); |
| |
| return 0; |
| }; |
| |
| static int test_addr_acq_recv_discover(size_t size, DHCPMessage *discover) { |
| uint16_t udp_check = 0; |
| uint8_t *msg_bytes = (uint8_t *)discover; |
| int res; |
| |
| res = dhcp_option_parse(discover, size, check_options, NULL, NULL); |
| assert_se(res == DHCP_DISCOVER); |
| |
| assert_se(msg_bytes[size - 1] == SD_DHCP_OPTION_END); |
| |
| xid = discover->xid; |
| |
| if (verbose) |
| printf(" recv DHCP Discover 0x%08x\n", be32toh(xid)); |
| |
| memcpy(&test_addr_acq_offer[26], &udp_check, sizeof(udp_check)); |
| memcpy(&test_addr_acq_offer[32], &xid, sizeof(xid)); |
| memcpy(&test_addr_acq_offer[56], &mac_addr, ETHER_ADDR_LEN); |
| |
| callback_recv = test_addr_acq_recv_request; |
| |
| res = write(test_fd[1], test_addr_acq_offer, |
| sizeof(test_addr_acq_offer)); |
| assert_se(res == sizeof(test_addr_acq_offer)); |
| |
| if (verbose) |
| printf(" sent DHCP Offer\n"); |
| |
| return 0; |
| } |
| |
| static void test_addr_acq(sd_event *e) { |
| sd_dhcp_client *client; |
| int res, r; |
| |
| if (verbose) |
| printf("* %s\n", __FUNCTION__); |
| |
| r = sd_dhcp_client_new(&client, false); |
| assert_se(r >= 0); |
| assert_se(client); |
| |
| r = sd_dhcp_client_attach_event(client, e, 0); |
| assert_se(r >= 0); |
| |
| assert_se(sd_dhcp_client_set_ifindex(client, 42) >= 0); |
| assert_se(sd_dhcp_client_set_mac(client, mac_addr, bcast_addr, ETH_ALEN, ARPHRD_ETHER) >= 0); |
| |
| assert_se(sd_dhcp_client_set_callback(client, test_addr_acq_acquired, e) >= 0); |
| |
| callback_recv = test_addr_acq_recv_discover; |
| |
| assert_se(sd_event_add_time_relative( |
| e, &test_hangcheck, |
| clock_boottime_or_monotonic(), |
| 2 * USEC_PER_SEC, 0, |
| test_dhcp_hangcheck, NULL) >= 0); |
| |
| res = sd_dhcp_client_start(client); |
| assert_se(IN_SET(res, 0, -EINPROGRESS)); |
| |
| assert_se(sd_event_loop(e) >= 0); |
| |
| test_hangcheck = sd_event_source_unref(test_hangcheck); |
| |
| assert_se(sd_dhcp_client_set_callback(client, NULL, NULL) >= 0); |
| assert_se(sd_dhcp_client_stop(client) >= 0); |
| sd_dhcp_client_unref(client); |
| |
| test_fd[1] = safe_close(test_fd[1]); |
| |
| callback_recv = NULL; |
| xid = 0; |
| } |
| |
| int main(int argc, char *argv[]) { |
| _cleanup_(sd_event_unrefp) sd_event *e; |
| |
| test_setup_logging(LOG_DEBUG); |
| |
| assert_se(sd_event_new(&e) >= 0); |
| |
| test_request_basic(e); |
| test_request_anonymize(e); |
| test_checksum(); |
| test_dhcp_identifier_set_iaid(); |
| |
| test_discover_message(e); |
| test_addr_acq(e); |
| |
| #if VALGRIND |
| /* Make sure the async_close thread has finished. |
| * valgrind would report some of the phread_* structures |
| * as not cleaned up properly. */ |
| sleep(1); |
| #endif |
| |
| return 0; |
| } |