]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/test/test-socket-util.c
tree-wide: beautify remaining copyright statements
[thirdparty/systemd.git] / src / test / test-socket-util.c
1 /* SPDX-License-Identifier: LGPL-2.1+ */
2 /***
3 Copyright © 2014 Ronny Chevalier
4 ***/
5
6 #include <sys/types.h>
7 #include <unistd.h>
8 #include <grp.h>
9
10 #include "alloc-util.h"
11 #include "async.h"
12 #include "fd-util.h"
13 #include "in-addr-util.h"
14 #include "log.h"
15 #include "macro.h"
16 #include "process-util.h"
17 #include "socket-util.h"
18 #include "string-util.h"
19 #include "util.h"
20
21 static void test_ifname_valid(void) {
22 assert(ifname_valid("foo"));
23 assert(ifname_valid("eth0"));
24
25 assert(!ifname_valid("0"));
26 assert(!ifname_valid("99"));
27 assert(ifname_valid("a99"));
28 assert(ifname_valid("99a"));
29
30 assert(!ifname_valid(NULL));
31 assert(!ifname_valid(""));
32 assert(!ifname_valid(" "));
33 assert(!ifname_valid(" foo"));
34 assert(!ifname_valid("bar\n"));
35 assert(!ifname_valid("."));
36 assert(!ifname_valid(".."));
37 assert(ifname_valid("foo.bar"));
38 assert(!ifname_valid("x:y"));
39
40 assert(ifname_valid("xxxxxxxxxxxxxxx"));
41 assert(!ifname_valid("xxxxxxxxxxxxxxxx"));
42 }
43
44 static void test_socket_address_parse(void) {
45 SocketAddress a;
46
47 assert_se(socket_address_parse(&a, "junk") < 0);
48 assert_se(socket_address_parse(&a, "192.168.1.1") < 0);
49 assert_se(socket_address_parse(&a, ".168.1.1") < 0);
50 assert_se(socket_address_parse(&a, "989.168.1.1") < 0);
51 assert_se(socket_address_parse(&a, "192.168.1.1:65536") < 0);
52 assert_se(socket_address_parse(&a, "192.168.1.1:0") < 0);
53 assert_se(socket_address_parse(&a, "0") < 0);
54 assert_se(socket_address_parse(&a, "65536") < 0);
55
56 assert_se(socket_address_parse(&a, "65535") >= 0);
57
58 /* The checks below will pass even if ipv6 is disabled in
59 * kernel. The underlying glibc's inet_pton() is just a string
60 * parser and doesn't make any syscalls. */
61
62 assert_se(socket_address_parse(&a, "[::1]") < 0);
63 assert_se(socket_address_parse(&a, "[::1]8888") < 0);
64 assert_se(socket_address_parse(&a, "::1") < 0);
65 assert_se(socket_address_parse(&a, "[::1]:0") < 0);
66 assert_se(socket_address_parse(&a, "[::1]:65536") < 0);
67 assert_se(socket_address_parse(&a, "[a:b:1]:8888") < 0);
68
69 assert_se(socket_address_parse(&a, "8888") >= 0);
70 assert_se(a.sockaddr.sa.sa_family == (socket_ipv6_is_supported() ? AF_INET6 : AF_INET));
71
72 assert_se(socket_address_parse(&a, "[2001:0db8:0000:85a3:0000:0000:ac1f:8001]:8888") >= 0);
73 assert_se(a.sockaddr.sa.sa_family == AF_INET6);
74
75 assert_se(socket_address_parse(&a, "[::1]:8888") >= 0);
76 assert_se(a.sockaddr.sa.sa_family == AF_INET6);
77
78 assert_se(socket_address_parse(&a, "192.168.1.254:8888") >= 0);
79 assert_se(a.sockaddr.sa.sa_family == AF_INET);
80
81 assert_se(socket_address_parse(&a, "/foo/bar") >= 0);
82 assert_se(a.sockaddr.sa.sa_family == AF_UNIX);
83
84 assert_se(socket_address_parse(&a, "@abstract") >= 0);
85 assert_se(a.sockaddr.sa.sa_family == AF_UNIX);
86
87 assert_se(socket_address_parse(&a, "vsock::1234") >= 0);
88 assert_se(a.sockaddr.sa.sa_family == AF_VSOCK);
89 assert_se(socket_address_parse(&a, "vsock:2:1234") >= 0);
90 assert_se(a.sockaddr.sa.sa_family == AF_VSOCK);
91 assert_se(socket_address_parse(&a, "vsock:2:1234x") < 0);
92 assert_se(socket_address_parse(&a, "vsock:2x:1234") < 0);
93 assert_se(socket_address_parse(&a, "vsock:2") < 0);
94 }
95
96 static void test_socket_address_parse_netlink(void) {
97 SocketAddress a;
98
99 assert_se(socket_address_parse_netlink(&a, "junk") < 0);
100 assert_se(socket_address_parse_netlink(&a, "") < 0);
101
102 assert_se(socket_address_parse_netlink(&a, "route") >= 0);
103 assert_se(socket_address_parse_netlink(&a, "route 10") >= 0);
104 assert_se(a.sockaddr.sa.sa_family == AF_NETLINK);
105 assert_se(a.protocol == NETLINK_ROUTE);
106
107 /* With spaces and tabs */
108 assert_se(socket_address_parse_netlink(&a, " kobject-uevent ") >= 0);
109 assert_se(socket_address_parse_netlink(&a, " \t kobject-uevent \t 10 \t") >= 0);
110 assert_se(a.sockaddr.sa.sa_family == AF_NETLINK);
111 assert_se(a.protocol == NETLINK_KOBJECT_UEVENT);
112
113 assert_se(socket_address_parse_netlink(&a, "kobject-uevent\t10") >= 0);
114 assert_se(a.sockaddr.sa.sa_family == AF_NETLINK);
115 assert_se(a.protocol == NETLINK_KOBJECT_UEVENT);
116
117 /* oss-fuzz #6884 */
118 assert_se(socket_address_parse_netlink(&a, "\xff") < 0);
119 }
120
121 static void test_socket_address_equal(void) {
122 SocketAddress a;
123 SocketAddress b;
124
125 assert_se(socket_address_parse(&a, "192.168.1.1:8888") >= 0);
126 assert_se(socket_address_parse(&b, "192.168.1.1:888") >= 0);
127 assert_se(!socket_address_equal(&a, &b));
128
129 assert_se(socket_address_parse(&a, "192.168.1.1:8888") >= 0);
130 assert_se(socket_address_parse(&b, "192.16.1.1:8888") >= 0);
131 assert_se(!socket_address_equal(&a, &b));
132
133 assert_se(socket_address_parse(&a, "192.168.1.1:8888") >= 0);
134 assert_se(socket_address_parse(&b, "8888") >= 0);
135 assert_se(!socket_address_equal(&a, &b));
136
137 assert_se(socket_address_parse(&a, "192.168.1.1:8888") >= 0);
138 assert_se(socket_address_parse(&b, "/foo/bar/") >= 0);
139 assert_se(!socket_address_equal(&a, &b));
140
141 assert_se(socket_address_parse(&a, "192.168.1.1:8888") >= 0);
142 assert_se(socket_address_parse(&b, "192.168.1.1:8888") >= 0);
143 assert_se(socket_address_equal(&a, &b));
144
145 assert_se(socket_address_parse(&a, "/foo/bar") >= 0);
146 assert_se(socket_address_parse(&b, "/foo/bar") >= 0);
147 assert_se(socket_address_equal(&a, &b));
148
149 assert_se(socket_address_parse(&a, "[::1]:8888") >= 0);
150 assert_se(socket_address_parse(&b, "[::1]:8888") >= 0);
151 assert_se(socket_address_equal(&a, &b));
152
153 assert_se(socket_address_parse(&a, "@abstract") >= 0);
154 assert_se(socket_address_parse(&b, "@abstract") >= 0);
155 assert_se(socket_address_equal(&a, &b));
156
157 assert_se(socket_address_parse_netlink(&a, "firewall") >= 0);
158 assert_se(socket_address_parse_netlink(&b, "firewall") >= 0);
159 assert_se(socket_address_equal(&a, &b));
160
161 assert_se(socket_address_parse(&a, "vsock:2:1234") >= 0);
162 assert_se(socket_address_parse(&b, "vsock:2:1234") >= 0);
163 assert_se(socket_address_equal(&a, &b));
164 assert_se(socket_address_parse(&b, "vsock:2:1235") >= 0);
165 assert_se(!socket_address_equal(&a, &b));
166 assert_se(socket_address_parse(&b, "vsock:3:1234") >= 0);
167 assert_se(!socket_address_equal(&a, &b));
168 }
169
170 static void test_socket_address_get_path(void) {
171 SocketAddress a;
172
173 assert_se(socket_address_parse(&a, "192.168.1.1:8888") >= 0);
174 assert_se(!socket_address_get_path(&a));
175
176 assert_se(socket_address_parse(&a, "@abstract") >= 0);
177 assert_se(!socket_address_get_path(&a));
178
179 assert_se(socket_address_parse(&a, "[::1]:8888") >= 0);
180 assert_se(!socket_address_get_path(&a));
181
182 assert_se(socket_address_parse(&a, "/foo/bar") >= 0);
183 assert_se(streq(socket_address_get_path(&a), "/foo/bar"));
184
185 assert_se(socket_address_parse(&a, "vsock:2:1234") >= 0);
186 assert_se(!socket_address_get_path(&a));
187 }
188
189 static void test_socket_address_is(void) {
190 SocketAddress a;
191
192 assert_se(socket_address_parse(&a, "192.168.1.1:8888") >= 0);
193 assert_se(socket_address_is(&a, "192.168.1.1:8888", SOCK_STREAM));
194 assert_se(!socket_address_is(&a, "route", SOCK_STREAM));
195 assert_se(!socket_address_is(&a, "192.168.1.1:8888", SOCK_RAW));
196 }
197
198 static void test_socket_address_is_netlink(void) {
199 SocketAddress a;
200
201 assert_se(socket_address_parse_netlink(&a, "route 10") >= 0);
202 assert_se(socket_address_is_netlink(&a, "route 10"));
203 assert_se(!socket_address_is_netlink(&a, "192.168.1.1:8888"));
204 assert_se(!socket_address_is_netlink(&a, "route 1"));
205 }
206
207 static void test_in_addr_is_null(void) {
208
209 union in_addr_union i = {};
210
211 assert_se(in_addr_is_null(AF_INET, &i) == true);
212 assert_se(in_addr_is_null(AF_INET6, &i) == true);
213
214 i.in.s_addr = 0x1000000;
215 assert_se(in_addr_is_null(AF_INET, &i) == false);
216 assert_se(in_addr_is_null(AF_INET6, &i) == false);
217
218 assert_se(in_addr_is_null(-1, &i) == -EAFNOSUPPORT);
219 }
220
221 static void test_in_addr_prefix_intersect_one(unsigned f, const char *a, unsigned apl, const char *b, unsigned bpl, int result) {
222 union in_addr_union ua, ub;
223
224 assert_se(in_addr_from_string(f, a, &ua) >= 0);
225 assert_se(in_addr_from_string(f, b, &ub) >= 0);
226
227 assert_se(in_addr_prefix_intersect(f, &ua, apl, &ub, bpl) == result);
228 }
229
230 static void test_in_addr_prefix_intersect(void) {
231
232 test_in_addr_prefix_intersect_one(AF_INET, "255.255.255.255", 32, "255.255.255.254", 32, 0);
233 test_in_addr_prefix_intersect_one(AF_INET, "255.255.255.255", 0, "255.255.255.255", 32, 1);
234 test_in_addr_prefix_intersect_one(AF_INET, "0.0.0.0", 0, "47.11.8.15", 32, 1);
235
236 test_in_addr_prefix_intersect_one(AF_INET, "1.1.1.1", 24, "1.1.1.1", 24, 1);
237 test_in_addr_prefix_intersect_one(AF_INET, "2.2.2.2", 24, "1.1.1.1", 24, 0);
238
239 test_in_addr_prefix_intersect_one(AF_INET, "1.1.1.1", 24, "1.1.1.127", 25, 1);
240 test_in_addr_prefix_intersect_one(AF_INET, "1.1.1.1", 24, "1.1.1.127", 26, 1);
241 test_in_addr_prefix_intersect_one(AF_INET, "1.1.1.1", 25, "1.1.1.127", 25, 1);
242 test_in_addr_prefix_intersect_one(AF_INET, "1.1.1.1", 25, "1.1.1.255", 25, 0);
243
244 test_in_addr_prefix_intersect_one(AF_INET6, "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff", 128, "ffff:ffff:ffff:ffff:ffff:ffff:ffff:fffe", 128, 0);
245 test_in_addr_prefix_intersect_one(AF_INET6, "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff", 0, "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff", 128, 1);
246 test_in_addr_prefix_intersect_one(AF_INET6, "::", 0, "beef:beef:beef:beef:beef:beef:beef:beef", 128, 1);
247
248 test_in_addr_prefix_intersect_one(AF_INET6, "1::2", 64, "1::2", 64, 1);
249 test_in_addr_prefix_intersect_one(AF_INET6, "2::2", 64, "1::2", 64, 0);
250
251 test_in_addr_prefix_intersect_one(AF_INET6, "1::1", 120, "1::007f", 121, 1);
252 test_in_addr_prefix_intersect_one(AF_INET6, "1::1", 120, "1::007f", 122, 1);
253 test_in_addr_prefix_intersect_one(AF_INET6, "1::1", 121, "1::007f", 121, 1);
254 test_in_addr_prefix_intersect_one(AF_INET6, "1::1", 121, "1::00ff", 121, 0);
255 }
256
257 static void test_in_addr_prefix_next_one(unsigned f, const char *before, unsigned pl, const char *after) {
258 union in_addr_union ubefore, uafter, t;
259
260 assert_se(in_addr_from_string(f, before, &ubefore) >= 0);
261
262 t = ubefore;
263 assert_se((in_addr_prefix_next(f, &t, pl) > 0) == !!after);
264
265 if (after) {
266 assert_se(in_addr_from_string(f, after, &uafter) >= 0);
267 assert_se(in_addr_equal(f, &t, &uafter) > 0);
268 }
269 }
270
271 static void test_in_addr_prefix_next(void) {
272
273 test_in_addr_prefix_next_one(AF_INET, "192.168.0.0", 24, "192.168.1.0");
274 test_in_addr_prefix_next_one(AF_INET, "192.168.0.0", 16, "192.169.0.0");
275 test_in_addr_prefix_next_one(AF_INET, "192.168.0.0", 20, "192.168.16.0");
276
277 test_in_addr_prefix_next_one(AF_INET, "0.0.0.0", 32, "0.0.0.1");
278 test_in_addr_prefix_next_one(AF_INET, "255.255.255.255", 32, NULL);
279 test_in_addr_prefix_next_one(AF_INET, "255.255.255.0", 24, NULL);
280
281 test_in_addr_prefix_next_one(AF_INET6, "4400::", 128, "4400::0001");
282 test_in_addr_prefix_next_one(AF_INET6, "4400::", 120, "4400::0100");
283 test_in_addr_prefix_next_one(AF_INET6, "4400::", 127, "4400::0002");
284 test_in_addr_prefix_next_one(AF_INET6, "4400::", 8, "4500::");
285 test_in_addr_prefix_next_one(AF_INET6, "4400::", 7, "4600::");
286
287 test_in_addr_prefix_next_one(AF_INET6, "::", 128, "::1");
288
289 test_in_addr_prefix_next_one(AF_INET6, "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff", 128, NULL);
290 test_in_addr_prefix_next_one(AF_INET6, "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ff00", 120, NULL);
291
292 }
293
294 static void test_in_addr_to_string_one(int f, const char *addr) {
295 union in_addr_union ua;
296 _cleanup_free_ char *r = NULL;
297
298 assert_se(in_addr_from_string(f, addr, &ua) >= 0);
299 assert_se(in_addr_to_string(f, &ua, &r) >= 0);
300 printf("test_in_addr_to_string_one: %s == %s\n", addr, r);
301 assert_se(streq(addr, r));
302 }
303
304 static void test_in_addr_to_string(void) {
305 test_in_addr_to_string_one(AF_INET, "192.168.0.1");
306 test_in_addr_to_string_one(AF_INET, "10.11.12.13");
307 test_in_addr_to_string_one(AF_INET6, "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff");
308 test_in_addr_to_string_one(AF_INET6, "::1");
309 test_in_addr_to_string_one(AF_INET6, "fe80::");
310 }
311
312 static void test_in_addr_ifindex_to_string_one(int f, const char *a, int ifindex, const char *b) {
313 _cleanup_free_ char *r = NULL;
314 union in_addr_union ua, uuaa;
315 int ff, ifindex2;
316
317 assert_se(in_addr_from_string(f, a, &ua) >= 0);
318 assert_se(in_addr_ifindex_to_string(f, &ua, ifindex, &r) >= 0);
319 printf("test_in_addr_ifindex_to_string_one: %s == %s\n", b, r);
320 assert_se(streq(b, r));
321
322 assert_se(in_addr_ifindex_from_string_auto(b, &ff, &uuaa, &ifindex2) >= 0);
323 assert_se(ff == f);
324 assert_se(in_addr_equal(f, &ua, &uuaa));
325 assert_se(ifindex2 == ifindex || ifindex2 == 0);
326 }
327
328 static void test_in_addr_ifindex_to_string(void) {
329 test_in_addr_ifindex_to_string_one(AF_INET, "192.168.0.1", 7, "192.168.0.1");
330 test_in_addr_ifindex_to_string_one(AF_INET, "10.11.12.13", 9, "10.11.12.13");
331 test_in_addr_ifindex_to_string_one(AF_INET6, "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff", 10, "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff");
332 test_in_addr_ifindex_to_string_one(AF_INET6, "::1", 11, "::1");
333 test_in_addr_ifindex_to_string_one(AF_INET6, "fe80::", 12, "fe80::%12");
334 test_in_addr_ifindex_to_string_one(AF_INET6, "fe80::", 0, "fe80::");
335 test_in_addr_ifindex_to_string_one(AF_INET6, "fe80::14", 12, "fe80::14%12");
336 test_in_addr_ifindex_to_string_one(AF_INET6, "fe80::15", -7, "fe80::15");
337 test_in_addr_ifindex_to_string_one(AF_INET6, "fe80::16", LOOPBACK_IFINDEX, "fe80::16%1");
338 }
339
340 static void test_in_addr_ifindex_from_string_auto(void) {
341 int family, ifindex;
342 union in_addr_union ua;
343
344 /* Most in_addr_ifindex_from_string_auto() invocations have already been tested above, but let's test some more */
345
346 assert_se(in_addr_ifindex_from_string_auto("fe80::17", &family, &ua, &ifindex) >= 0);
347 assert_se(family == AF_INET6);
348 assert_se(ifindex == 0);
349
350 assert_se(in_addr_ifindex_from_string_auto("fe80::18%19", &family, &ua, &ifindex) >= 0);
351 assert_se(family == AF_INET6);
352 assert_se(ifindex == 19);
353
354 assert_se(in_addr_ifindex_from_string_auto("fe80::18%lo", &family, &ua, &ifindex) >= 0);
355 assert_se(family == AF_INET6);
356 assert_se(ifindex == LOOPBACK_IFINDEX);
357
358 assert_se(in_addr_ifindex_from_string_auto("fe80::19%thisinterfacecantexist", &family, &ua, &ifindex) == -ENODEV);
359 }
360
361 static void test_sockaddr_equal(void) {
362 union sockaddr_union a = {
363 .in.sin_family = AF_INET,
364 .in.sin_port = 0,
365 .in.sin_addr.s_addr = htobe32(INADDR_ANY),
366 };
367 union sockaddr_union b = {
368 .in.sin_family = AF_INET,
369 .in.sin_port = 0,
370 .in.sin_addr.s_addr = htobe32(INADDR_ANY),
371 };
372 union sockaddr_union c = {
373 .in.sin_family = AF_INET,
374 .in.sin_port = 0,
375 .in.sin_addr.s_addr = htobe32(1234),
376 };
377 union sockaddr_union d = {
378 .in6.sin6_family = AF_INET6,
379 .in6.sin6_port = 0,
380 .in6.sin6_addr = IN6ADDR_ANY_INIT,
381 };
382 union sockaddr_union e = {
383 .vm.svm_family = AF_VSOCK,
384 .vm.svm_port = 0,
385 .vm.svm_cid = VMADDR_CID_ANY,
386 };
387 assert_se(sockaddr_equal(&a, &a));
388 assert_se(sockaddr_equal(&a, &b));
389 assert_se(sockaddr_equal(&d, &d));
390 assert_se(sockaddr_equal(&e, &e));
391 assert_se(!sockaddr_equal(&a, &c));
392 assert_se(!sockaddr_equal(&b, &c));
393 assert_se(!sockaddr_equal(&a, &e));
394 }
395
396 static void test_sockaddr_un_len(void) {
397 static const struct sockaddr_un fs = {
398 .sun_family = AF_UNIX,
399 .sun_path = "/foo/bar/waldo",
400 };
401
402 static const struct sockaddr_un abstract = {
403 .sun_family = AF_UNIX,
404 .sun_path = "\0foobar",
405 };
406
407 assert_se(SOCKADDR_UN_LEN(fs) == offsetof(struct sockaddr_un, sun_path) + strlen(fs.sun_path));
408 assert_se(SOCKADDR_UN_LEN(abstract) == offsetof(struct sockaddr_un, sun_path) + 1 + strlen(abstract.sun_path + 1));
409 }
410
411 static void test_in_addr_is_multicast(void) {
412 union in_addr_union a, b;
413 int f;
414
415 assert_se(in_addr_from_string_auto("192.168.3.11", &f, &a) >= 0);
416 assert_se(in_addr_is_multicast(f, &a) == 0);
417
418 assert_se(in_addr_from_string_auto("224.0.0.1", &f, &a) >= 0);
419 assert_se(in_addr_is_multicast(f, &a) == 1);
420
421 assert_se(in_addr_from_string_auto("FF01:0:0:0:0:0:0:1", &f, &b) >= 0);
422 assert_se(in_addr_is_multicast(f, &b) == 1);
423
424 assert_se(in_addr_from_string_auto("2001:db8::c:69b:aeff:fe53:743e", &f, &b) >= 0);
425 assert_se(in_addr_is_multicast(f, &b) == 0);
426 }
427
428 static void test_getpeercred_getpeergroups(void) {
429 int r;
430
431 r = safe_fork("(getpeercred)", FORK_DEATHSIG|FORK_LOG|FORK_WAIT, NULL);
432 assert_se(r >= 0);
433
434 if (r == 0) {
435 static const gid_t gids[] = { 3, 4, 5, 6, 7 };
436 gid_t *test_gids;
437 _cleanup_free_ gid_t *peer_groups = NULL;
438 size_t n_test_gids;
439 uid_t test_uid;
440 gid_t test_gid;
441 struct ucred ucred;
442 int pair[2];
443
444 if (geteuid() == 0) {
445 test_uid = 1;
446 test_gid = 2;
447 test_gids = (gid_t*) gids;
448 n_test_gids = ELEMENTSOF(gids);
449
450 assert_se(setgroups(n_test_gids, test_gids) >= 0);
451 assert_se(setresgid(test_gid, test_gid, test_gid) >= 0);
452 assert_se(setresuid(test_uid, test_uid, test_uid) >= 0);
453
454 } else {
455 long ngroups_max;
456
457 test_uid = getuid();
458 test_gid = getgid();
459
460 ngroups_max = sysconf(_SC_NGROUPS_MAX);
461 assert(ngroups_max > 0);
462
463 test_gids = newa(gid_t, ngroups_max);
464
465 r = getgroups(ngroups_max, test_gids);
466 assert_se(r >= 0);
467 n_test_gids = (size_t) r;
468 }
469
470 assert_se(socketpair(AF_UNIX, SOCK_STREAM, 0, pair) >= 0);
471
472 assert_se(getpeercred(pair[0], &ucred) >= 0);
473
474 assert_se(ucred.uid == test_uid);
475 assert_se(ucred.gid == test_gid);
476 assert_se(ucred.pid == getpid_cached());
477
478 r = getpeergroups(pair[0], &peer_groups);
479 assert_se(r >= 0 || IN_SET(r, -EOPNOTSUPP, -ENOPROTOOPT));
480
481 if (r >= 0) {
482 assert_se((size_t) r == n_test_gids);
483 assert_se(memcmp(peer_groups, test_gids, sizeof(gid_t) * n_test_gids) == 0);
484 }
485
486 safe_close_pair(pair);
487 }
488 }
489
490 int main(int argc, char *argv[]) {
491
492 log_set_max_level(LOG_DEBUG);
493
494 test_ifname_valid();
495
496 test_socket_address_parse();
497 test_socket_address_parse_netlink();
498 test_socket_address_equal();
499 test_socket_address_get_path();
500 test_socket_address_is();
501 test_socket_address_is_netlink();
502
503 test_in_addr_is_null();
504 test_in_addr_prefix_intersect();
505 test_in_addr_prefix_next();
506 test_in_addr_to_string();
507 test_in_addr_ifindex_to_string();
508 test_in_addr_ifindex_from_string_auto();
509
510 test_sockaddr_equal();
511
512 test_sockaddr_un_len();
513
514 test_in_addr_is_multicast();
515
516 test_getpeercred_getpeergroups();
517
518 return 0;
519 }