#include <sys/param.h>
#include <sys/socket.h>
#include <sys/stat.h>
#include <sys/time.h>
#include <sys/wait.h>
#include <netinet/in.h>
#include <errno.h>
#include <fcntl.h>
#include <signal.h>
#include <stdalign.h>
#include <stdio.h>
#include <unistd.h>
#include <atf-c.h>
#include <libutil.h>
static const uint16_t BASEPORT = 6969;
static const char pidfile[] = "tftpd.pid";
static int protocol = PF_UNSPEC;
static int s = -1;
static struct sockaddr_storage addr;
static bool s_flag = false;
static bool w_flag = false;
static void require_bufeq(const char *expected, size_t expected_len,
const char *actual, size_t len);
#define RECV(hdr, contents, contents_len) do { \
char buffer[1024]; \
struct sockaddr_storage from; \
socklen_t fromlen = sizeof(from); \
ssize_t r = recvfrom(s, buffer, sizeof(buffer), 0, \
(struct sockaddr *)&from, &fromlen); \
ATF_REQUIRE(r > 0); \
require_bufeq((hdr), sizeof(hdr), buffer, \
MIN((size_t)r, sizeof(hdr))); \
require_bufeq((const char *) (contents), (contents_len), \
&buffer[sizeof(hdr)], r - sizeof(hdr)); \
if (protocol == PF_INET) { \
((struct sockaddr_in *)&addr)->sin_port = \
((struct sockaddr_in *)&from)->sin_port; \
} else { \
((struct sockaddr_in6 *)&addr)->sin6_port = \
((struct sockaddr_in6 *)&from)->sin6_port; \
} \
} while(0)
static void
recv_ack(uint16_t blocknum)
{
char hdr[] = {0, 4, blocknum >> 8, blocknum & 0xFF};
RECV(hdr, NULL, 0);
}
static void
recv_oack(const char *options, size_t options_len)
{
char hdr[] = {0, 6};
RECV(hdr, options, options_len);
}
static void
recv_data(uint16_t blocknum, const char *contents, size_t contents_len)
{
char hdr[] = {0, 3, blocknum >> 8, blocknum & 0xFF};
RECV(hdr, contents, contents_len);
}
#define RECV_ERROR(code, msg) do { \
char hdr[] = {0, 5, code >> 8, code & 0xFF}; \
RECV(hdr, msg, sizeof(msg)); \
} while (0)
static void
send_bytes(const void *cmd, size_t len)
{
ssize_t r;
r = sendto(s, cmd, len, 0, (struct sockaddr *)(&addr), addr.ss_len);
ATF_REQUIRE(r >= 0);
ATF_REQUIRE_EQ(len, (size_t)r);
}
static void
send_data(uint16_t blocknum, const char *contents, size_t contents_len)
{
char buffer[1024];
buffer[0] = 0;
buffer[1] = 3;
buffer[2] = blocknum >> 8;
buffer[3] = blocknum & 0xFF;
memmove(&buffer[4], contents, contents_len);
send_bytes(buffer, 4 + contents_len);
}
#define SEND_STR(cmd) \
ATF_REQUIRE_EQ(sizeof(cmd) - 1, \
sendto(s, (cmd), sizeof(cmd) - 1, 0, \
(struct sockaddr *)(&addr), addr.ss_len))
static void
send_ack(uint16_t blocknum)
{
char packet[] = {
0, 4,
blocknum >> 8,
blocknum & 0xFF
};
send_bytes(packet, sizeof(packet));
}
#define OPTION_STR(name, value) name "\000" value "\000"
#define SEND_RRQ(filename, mode) \
SEND_STR("\0\001" filename "\0" mode "\0")
#define SEND_RRQ_OPT(filename, mode, options) \
SEND_STR("\0\001" filename "\0" mode "\000" options)
#define SEND_WRQ(filename, mode) \
SEND_STR("\0\002" filename "\0" mode "\0")
#define SEND_WRQ_OPT(filename, mode, options) \
SEND_STR("\0\002" filename "\0" mode "\000" options)
#define TFTPD_TC_DEFINE(name, head, ...) \
static void \
name ## _body(void); \
ATF_TC_WITH_CLEANUP(name ## _v4); \
ATF_TC_HEAD(name ## _v4, tc) \
{ \
head \
} \
ATF_TC_BODY(name ## _v4, tc) \
{ \
int exitcode = 0; \
__VA_ARGS__; \
protocol = AF_INET; \
s = setup(&addr, __COUNTER__); \
name ## _body(); \
close(s); \
if (exitcode >= 0) \
check_server(exitcode); \
} \
ATF_TC_CLEANUP(name ## _v4, tc) \
{ \
cleanup(); \
} \
ATF_TC_WITH_CLEANUP(name ## _v6); \
ATF_TC_HEAD(name ## _v6, tc) \
{ \
head \
} \
ATF_TC_BODY(name ## _v6, tc) \
{ \
int exitcode = 0; \
__VA_ARGS__; \
protocol = AF_INET6; \
s = setup(&addr, __COUNTER__); \
name ## _body(); \
close(s); \
if (exitcode >= 0) \
check_server(exitcode); \
} \
ATF_TC_CLEANUP(name ## _v6, tc) \
{ \
cleanup(); \
} \
static void \
name ## _body(void)
#define TFTPD_TC_ADD(tp, name) do { \
ATF_TP_ADD_TC(tp, name ## _v4); \
ATF_TP_ADD_TC(tp, name ## _v6); \
} while (0)
static void
sigalrm(int signo __unused)
{
}
static void
check_server(int exitcode)
{
struct sigaction sa = { .sa_handler = sigalrm };
struct itimerval it = { .it_value = { .tv_sec = 30 } };
FILE *f;
pid_t pid;
int wstatus;
f = fopen(pidfile, "r");
ATF_REQUIRE(f != NULL);
ATF_REQUIRE_INTEQ(1, fscanf(f, "%d", &pid));
ATF_CHECK_INTEQ(0, fclose(f));
ATF_REQUIRE_INTEQ(0, sigaction(SIGALRM, &sa, NULL));
ATF_REQUIRE_EQ(0, setitimer(ITIMER_REAL, &it, NULL));
ATF_REQUIRE_EQ(pid, waitpid(pid, &wstatus, 0));
ATF_CHECK(WIFEXITED(wstatus));
ATF_CHECK_INTEQ(exitcode, WEXITSTATUS(wstatus));
unlink(pidfile);
}
static void
cleanup(void)
{
FILE *f;
pid_t pid;
f = fopen(pidfile, "r");
if (f == NULL)
return;
unlink(pidfile);
if (fscanf(f, "%d", &pid) == 1) {
kill(pid, SIGTERM);
waitpid(pid, NULL, 0);
}
fclose(f);
}
static void
require_bufeq(const char *expected, size_t expected_len,
const char *actual, size_t len)
{
size_t i;
ATF_REQUIRE_EQ_MSG(expected_len, len,
"Expected %zu bytes but got %zu", expected_len, len);
for (i = 0; i < len; i++) {
ATF_REQUIRE_EQ_MSG(expected[i], actual[i],
"Expected %#hhx at position %zu; got %hhx instead",
expected[i], i, actual[i]);
}
}
static int
setup(struct sockaddr_storage *to, uint16_t idx)
{
int client_s, server_s, pid, argv_idx;
char execname[] = "/usr/libexec/tftpd";
char b_flag_str[] = "-b";
char s_flag_str[] = "-s";
char w_flag_str[] = "-w";
char pwd[MAXPATHLEN];
char *argv[10];
struct sockaddr_in addr4;
struct sockaddr_in6 addr6;
struct sockaddr *server_addr;
struct pidfh *pfh;
uint16_t port = BASEPORT + idx;
socklen_t len;
int pd[2];
ATF_REQUIRE_EQ(0, pipe2(pd, O_CLOEXEC));
if (protocol == PF_INET) {
len = sizeof(addr4);
bzero(&addr4, len);
addr4.sin_len = len;
addr4.sin_family = PF_INET;
addr4.sin_port = htons(port);
server_addr = (struct sockaddr *)&addr4;
} else {
len = sizeof(addr6);
bzero(&addr6, len);
addr6.sin6_len = len;
addr6.sin6_family = PF_INET6;
addr6.sin6_port = htons(port);
server_addr = (struct sockaddr *)&addr6;
}
ATF_REQUIRE_EQ(pwd, getcwd(pwd, sizeof(pwd)));
server_s = socket(protocol, SOCK_DGRAM, 0);
if (server_s < 0 && errno == EAFNOSUPPORT) {
atf_tc_skip("This test requires IPv%d support",
protocol == PF_INET ? 4 : 6);
}
ATF_REQUIRE_MSG(server_s >= 0,
"socket failed with error %s", strerror(errno));
ATF_REQUIRE_EQ_MSG(0, bind(server_s, server_addr, len),
"bind failed with error %s", strerror(errno));
pid = fork();
switch (pid) {
case -1:
atf_tc_fail("fork failed");
break;
case 0:
pfh = pidfile_open(pidfile, 0644, NULL);
ATF_REQUIRE_MSG(pfh != NULL,
"pidfile_open: %s", strerror(errno));
ATF_REQUIRE_EQ(0, pidfile_write(pfh));
ATF_REQUIRE_EQ(0, pidfile_close(pfh));
bzero(argv, sizeof(argv));
argv[0] = execname;
argv_idx = 1;
argv[argv_idx++] = b_flag_str;
if (w_flag)
argv[argv_idx++] = w_flag_str;
if (s_flag)
argv[argv_idx++] = s_flag_str;
argv[argv_idx++] = pwd;
ATF_REQUIRE_EQ(STDOUT_FILENO, dup2(server_s, STDOUT_FILENO));
ATF_REQUIRE_EQ(STDIN_FILENO, dup2(server_s, STDIN_FILENO));
ATF_REQUIRE_EQ(STDERR_FILENO, dup2(server_s, STDERR_FILENO));
execv(execname, argv);
atf_tc_fail("exec failed");
break;
default:
ATF_REQUIRE_INTEQ(0, close(pd[1]));
ATF_REQUIRE_INTEQ(0, read(pd[0], &pd[1], sizeof(pd[1])));
ATF_REQUIRE_INTEQ(0, close(pd[0]));
bzero(to, sizeof(*to));
if (protocol == PF_INET) {
struct sockaddr_in *to4 = (struct sockaddr_in *)to;
to4->sin_len = sizeof(*to4);
to4->sin_family = PF_INET;
to4->sin_port = htons(port);
to4->sin_addr.s_addr = htonl(INADDR_LOOPBACK);
} else {
struct in6_addr loopback = IN6ADDR_LOOPBACK_INIT;
struct sockaddr_in6 *to6 = (struct sockaddr_in6 *)to;
to6->sin6_len = sizeof(*to6);
to6->sin6_family = PF_INET6;
to6->sin6_port = htons(port);
to6->sin6_addr = loopback;
}
ATF_REQUIRE_INTEQ(0, close(server_s));
ATF_REQUIRE((client_s = socket(protocol, SOCK_DGRAM, 0)) > 0);
break;
}
umask(0000);
return (client_s);
}
static void
write_all(int fd, const void *buf, size_t nbytes)
{
ssize_t r;
while (nbytes > 0) {
r = write(fd, buf, nbytes);
ATF_REQUIRE(r > 0);
nbytes -= (size_t)r;
buf = (const char *)buf + (size_t)r;
}
}
TFTPD_TC_DEFINE(abspath,)
{
int fd;
char command[1024];
size_t pathlen;
char suffix[] = {'\0', 'o', 'c', 't', 'e', 't', '\0'};
command[0] = 0;
command[1] = 1;
ATF_REQUIRE(getcwd(&command[2], sizeof(command) - 2) != NULL);
pathlen = strlcat(&command[2], "/abspath.txt", sizeof(command) - 2);
ATF_REQUIRE(pathlen + sizeof(suffix) < sizeof(command) - 2);
memmove(&command[2 + pathlen], suffix, sizeof(suffix));
fd = open("abspath.txt", O_CREAT | O_RDONLY, 0644);
ATF_REQUIRE(fd >= 0);
close(fd);
send_bytes(command, 2 + pathlen + sizeof(suffix));
recv_data(1, NULL, 0);
send_ack(1);
}
TFTPD_TC_DEFINE(dotdot,)
{
ATF_REQUIRE_EQ(0, mkdir("subdir", 0777));
SEND_RRQ("../disallowed.txt", "octet");
RECV_ERROR(2, "Access violation");
s = setup(&addr, __COUNTER__);
SEND_RRQ("subdir/../../disallowed.txt", "octet");
RECV_ERROR(2, "Access violation");
s = setup(&addr, __COUNTER__);
SEND_RRQ("/etc/passwd", "octet");
RECV_ERROR(2, "Access violation");
}
TFTPD_TC_DEFINE(s_flag,
atf_tc_set_md_var(tc, "require.user", "root");,
s_flag = true)
{
int fd;
char contents[] = "small";
fd = open("small.txt", O_RDWR | O_CREAT, 0644);
ATF_REQUIRE(fd >= 0);
write_all(fd, contents, strlen(contents) + 1);
close(fd);
SEND_RRQ("/small.txt", "octet");
recv_data(1, contents, strlen(contents) + 1);
send_ack(1);
}
TFTPD_TC_DEFINE(rrq_dropped_ack,)
{
int fd;
char contents[] = "small";
fd = open("small.txt", O_RDWR | O_CREAT, 0644);
ATF_REQUIRE(fd >= 0);
write_all(fd, contents, strlen(contents) + 1);
close(fd);
SEND_RRQ("small.txt", "octet");
recv_data(1, contents, strlen(contents) + 1);
recv_data(1, contents, strlen(contents) + 1);
send_ack(1);
}
TFTPD_TC_DEFINE(rrq_dropped_data,)
{
int fd;
size_t i;
uint32_t contents[192];
char buffer[1024];
for (i = 0; i < nitems(contents); i++)
contents[i] = i;
fd = open("medium.txt", O_RDWR | O_CREAT, 0644);
ATF_REQUIRE(fd >= 0);
write_all(fd, contents, sizeof(contents));
close(fd);
SEND_RRQ("medium.txt", "octet");
recv_data(1, (const char *)&contents[0], 512);
send_ack(1);
(void) recvfrom(s, buffer, sizeof(buffer), 0, NULL, NULL);
send_ack(1);
recv_data(2, (const char *)&contents[128], 256);
send_ack(2);
}
TFTPD_TC_DEFINE(rrq_duped_ack,)
{
int fd;
size_t i;
uint32_t contents[192];
for (i = 0; i < nitems(contents); i++)
contents[i] = i;
fd = open("medium.txt", O_RDWR | O_CREAT, 0644);
ATF_REQUIRE(fd >= 0);
write_all(fd, contents, sizeof(contents));
close(fd);
SEND_RRQ("medium.txt", "octet");
recv_data(1, (const char *)&contents[0], 512);
send_ack(1);
send_ack(1);
recv_data(2, (const char *)&contents[128], 256);
recv_data(2, (const char *)&contents[128], 256);
send_ack(2);
}
TFTPD_TC_DEFINE(rrq_eaccess,)
{
int fd;
fd = open("empty.txt", O_CREAT | O_RDONLY, 0000);
ATF_REQUIRE(fd >= 0);
close(fd);
SEND_RRQ("empty.txt", "octet");
RECV_ERROR(2, "Access violation");
}
TFTPD_TC_DEFINE(rrq_empty,)
{
int fd;
fd = open("empty.txt", O_CREAT | O_RDONLY, 0644);
ATF_REQUIRE(fd >= 0);
close(fd);
SEND_RRQ("empty.txt", "octet");
recv_data(1, NULL, 0);
send_ack(1);
}
TFTPD_TC_DEFINE(rrq_medium,)
{
int fd;
size_t i;
uint32_t contents[192];
for (i = 0; i < nitems(contents); i++)
contents[i] = i;
fd = open("medium.txt", O_RDWR | O_CREAT, 0644);
ATF_REQUIRE(fd >= 0);
write_all(fd, contents, sizeof(contents));
close(fd);
SEND_RRQ("medium.txt", "octet");
recv_data(1, (const char *)&contents[0], 512);
send_ack(1);
recv_data(2, (const char *)&contents[128], 256);
send_ack(2);
}
TFTPD_TC_DEFINE(rrq_medium_window,)
{
int fd;
size_t i;
uint32_t contents[192];
char options[] = OPTION_STR("windowsize", "2");
for (i = 0; i < nitems(contents); i++)
contents[i] = i;
fd = open("medium.txt", O_RDWR | O_CREAT, 0644);
ATF_REQUIRE(fd >= 0);
write_all(fd, contents, sizeof(contents));
close(fd);
SEND_RRQ_OPT("medium.txt", "octet", OPTION_STR("windowsize", "2"));
recv_oack(options, sizeof(options) - 1);
send_ack(0);
recv_data(1, (const char *)&contents[0], 512);
recv_data(2, (const char *)&contents[128], 256);
send_ack(2);
}
TFTPD_TC_DEFINE(rrq_netascii,)
{
int fd;
char contents[] = "foo\nbar\rbaz\n";
char expected[] = "foo\r\nbar\r\0baz\r\n";
fd = open("unix.txt", O_RDWR | O_CREAT, 0644);
ATF_REQUIRE(fd >= 0);
write_all(fd, contents, strlen(contents) + 1);
close(fd);
SEND_RRQ("unix.txt", "netascii");
recv_data(1, expected, sizeof(expected));
send_ack(1);
}
TFTPD_TC_DEFINE(rrq_nonexistent,)
{
SEND_RRQ("nonexistent.txt", "octet");
RECV_ERROR(1, "File not found");
}
TFTPD_TC_DEFINE(rrq_path_max,)
{
#define AReallyBigFileName \
"AReallyBigFileNameXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"\
"XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"\
"XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"\
"XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"\
"XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"\
"XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"\
"XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"\
"XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"\
"XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"\
"XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"\
"XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"\
"XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"\
"XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"\
"XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"\
"XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"\
"XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"\
".txt"
ATF_REQUIRE_MSG(strlen(AReallyBigFileName) > PATH_MAX,
"Somebody increased PATH_MAX. Update the test");
SEND_RRQ(AReallyBigFileName, "octet");
RECV_ERROR(4, "Illegal TFTP operation");
}
TFTPD_TC_DEFINE(rrq_small,)
{
int fd;
char contents[] = "small";
fd = open("small.txt", O_RDWR | O_CREAT, 0644);
ATF_REQUIRE(fd >= 0);
write_all(fd, contents, strlen(contents) + 1);
close(fd);
SEND_RRQ("small.txt", "octet");
recv_data(1, contents, strlen(contents) + 1);
send_ack(1);
}
TFTPD_TC_DEFINE(rrq_window_rfc7440,)
{
int fd;
size_t i;
char options[] = OPTION_STR("windowsize", "4");
alignas(uint32_t) char contents[13 * 512 - 4];
uint32_t *u32p;
u32p = (uint32_t *)contents;
for (i = 0; i < sizeof(contents) / sizeof(uint32_t); i++)
u32p[i] = i;
fd = open("rfc7440.txt", O_RDWR | O_CREAT, 0644);
ATF_REQUIRE(fd >= 0);
write_all(fd, contents, sizeof(contents));
close(fd);
SEND_RRQ_OPT("rfc7440.txt", "octet", OPTION_STR("windowsize", "4"));
recv_oack(options, sizeof(options) - 1);
send_ack(0);
recv_data(1, &contents[0 * 512], 512);
recv_data(2, &contents[1 * 512], 512);
recv_data(3, &contents[2 * 512], 512);
recv_data(4, &contents[3 * 512], 512);
send_ack(4);
recv_data(5, &contents[4 * 512], 512);
recv_data(6, &contents[5 * 512], 512);
recv_data(7, &contents[6 * 512], 512);
recv_data(8, &contents[7 * 512], 512);
send_ack(5);
recv_data(6, &contents[5 * 512], 512);
recv_data(7, &contents[6 * 512], 512);
recv_data(8, &contents[7 * 512], 512);
recv_data(9, &contents[8 * 512], 512);
send_ack(9);
recv_data(10, &contents[9 * 512], 512);
recv_data(11, &contents[10 * 512], 512);
recv_data(12, &contents[11 * 512], 512);
recv_data(13, &contents[12 * 512], 508);
recv_data(10, &contents[9 * 512], 512);
recv_data(11, &contents[10 * 512], 512);
recv_data(12, &contents[11 * 512], 512);
recv_data(13, &contents[12 * 512], 508);
send_ack(13);
}
TFTPD_TC_DEFINE(unknown_modes,)
{
SEND_RRQ("foo.txt", "ascii");
RECV_ERROR(4, "Illegal TFTP operation");
s = setup(&addr, __COUNTER__);
SEND_RRQ("foo.txt", "binary");
RECV_ERROR(4, "Illegal TFTP operation");
s = setup(&addr, __COUNTER__);
SEND_RRQ("foo.txt", "en_US.UTF-8");
RECV_ERROR(4, "Illegal TFTP operation");
s = setup(&addr, __COUNTER__);
SEND_RRQ("foo.txt", "mail");
RECV_ERROR(4, "Illegal TFTP operation");
}
TFTPD_TC_DEFINE(unknown_opcode,)
{
SEND_STR("\0\007foo.txt\0octet\0");
RECV_ERROR(4, "Illegal TFTP operation");
}
TFTPD_TC_DEFINE(w_flag,, w_flag = 1;)
{
int fd;
ssize_t r;
char contents[] = "small";
char buffer[1024];
size_t contents_len;
contents_len = strlen(contents) + 1;
SEND_WRQ("small.txt", "octet");
recv_ack(0);
send_data(1, contents, contents_len);
recv_ack(1);
fd = open("small.txt", O_RDONLY);
ATF_REQUIRE(fd >= 0);
r = read(fd, buffer, sizeof(buffer));
ATF_REQUIRE(r > 0);
close(fd);
require_bufeq(contents, contents_len, buffer, (size_t)r);
}
TFTPD_TC_DEFINE(wrq_dropped_ack,)
{
int fd;
size_t i;
ssize_t r;
uint32_t contents[192];
char buffer[1024];
for (i = 0; i < nitems(contents); i++)
contents[i] = i;
fd = open("medium.txt", O_RDWR | O_CREAT, 0666);
ATF_REQUIRE(fd >= 0);
close(fd);
SEND_WRQ("medium.txt", "octet");
recv_ack(0);
send_data(1, (const char *)&contents[0], 512);
(void) recvfrom(s, buffer, sizeof(buffer), 0, NULL, NULL);
recv_ack(1);
send_data(2, (const char *)&contents[128], 256);
recv_ack(2);
fd = open("medium.txt", O_RDONLY);
ATF_REQUIRE(fd >= 0);
r = read(fd, buffer, sizeof(buffer));
ATF_REQUIRE(r > 0);
close(fd);
require_bufeq((const char *)contents, 768, buffer, (size_t)r);
}
TFTPD_TC_DEFINE(wrq_dropped_data,)
{
int fd;
ssize_t r;
char contents[] = "small";
size_t contents_len;
char buffer[1024];
fd = open("small.txt", O_RDWR | O_CREAT, 0666);
ATF_REQUIRE(fd >= 0);
close(fd);
contents_len = strlen(contents) + 1;
SEND_WRQ("small.txt", "octet");
recv_ack(0);
recv_ack(0);
send_data(1, contents, contents_len);
recv_ack(1);
fd = open("small.txt", O_RDONLY);
ATF_REQUIRE(fd >= 0);
r = read(fd, buffer, sizeof(buffer));
ATF_REQUIRE(r > 0);
close(fd);
require_bufeq(contents, contents_len, buffer, (size_t)r);
}
TFTPD_TC_DEFINE(wrq_duped_data,)
{
int fd;
size_t i;
ssize_t r;
uint32_t contents[192];
char buffer[1024];
for (i = 0; i < nitems(contents); i++)
contents[i] = i;
fd = open("medium.txt", O_RDWR | O_CREAT, 0666);
ATF_REQUIRE(fd >= 0);
close(fd);
SEND_WRQ("medium.txt", "octet");
recv_ack(0);
send_data(1, (const char *)&contents[0], 512);
send_data(1, (const char *)&contents[0], 512);
recv_ack(1);
recv_ack(1);
send_data(2, (const char *)&contents[128], 256);
recv_ack(2);
fd = open("medium.txt", O_RDONLY);
ATF_REQUIRE(fd >= 0);
r = read(fd, buffer, sizeof(buffer));
ATF_REQUIRE(r > 0);
close(fd);
require_bufeq((const char *)contents, 768, buffer, (size_t)r);
}
TFTPD_TC_DEFINE(wrq_eaccess,)
{
int fd;
fd = open("empty.txt", O_CREAT | O_RDONLY, 0440);
ATF_REQUIRE(fd >= 0);
close(fd);
SEND_WRQ("empty.txt", "octet");
RECV_ERROR(2, "Access violation");
}
TFTPD_TC_DEFINE(wrq_eaccess_world_readable,)
{
int fd;
fd = open("empty.txt", O_CREAT | O_RDONLY, 0444);
ATF_REQUIRE(fd >= 0);
close(fd);
SEND_WRQ("empty.txt", "octet");
RECV_ERROR(2, "Access violation");
}
TFTPD_TC_DEFINE(wrq_medium,)
{
int fd;
size_t i;
ssize_t r;
uint32_t contents[192];
char buffer[1024];
for (i = 0; i < nitems(contents); i++)
contents[i] = i;
fd = open("medium.txt", O_RDWR | O_CREAT, 0666);
ATF_REQUIRE(fd >= 0);
close(fd);
SEND_WRQ("medium.txt", "octet");
recv_ack(0);
send_data(1, (const char *)&contents[0], 512);
recv_ack(1);
send_data(2, (const char *)&contents[128], 256);
recv_ack(2);
fd = open("medium.txt", O_RDONLY);
ATF_REQUIRE(fd >= 0);
r = read(fd, buffer, sizeof(buffer));
ATF_REQUIRE(r > 0);
close(fd);
require_bufeq((const char *)contents, 768, buffer, (size_t)r);
}
TFTPD_TC_DEFINE(wrq_medium_window,)
{
int fd;
size_t i;
ssize_t r;
uint32_t contents[192];
char buffer[1024];
char options[] = OPTION_STR("windowsize", "2");
for (i = 0; i < nitems(contents); i++)
contents[i] = i;
fd = open("medium.txt", O_RDWR | O_CREAT, 0666);
ATF_REQUIRE(fd >= 0);
close(fd);
SEND_WRQ_OPT("medium.txt", "octet", OPTION_STR("windowsize", "2"));
recv_oack(options, sizeof(options) - 1);
send_data(1, (const char *)&contents[0], 512);
send_data(2, (const char *)&contents[128], 256);
recv_ack(2);
fd = open("medium.txt", O_RDONLY);
ATF_REQUIRE(fd >= 0);
r = read(fd, buffer, sizeof(buffer));
ATF_REQUIRE(r > 0);
close(fd);
require_bufeq((const char *)contents, 768, buffer, (size_t)r);
}
TFTPD_TC_DEFINE(wrq_netascii,)
{
int fd;
ssize_t r;
char contents[] = "foo\r\nbar\r\0baz\r\n";
char expected[] = "foo\nbar\rbaz\n";
size_t contents_len;
char buffer[1024];
fd = open("unix.txt", O_RDWR | O_CREAT, 0666);
ATF_REQUIRE(fd >= 0);
close(fd);
contents_len = sizeof(contents);
SEND_WRQ("unix.txt", "netascii");
recv_ack(0);
send_data(1, contents, contents_len);
recv_ack(1);
fd = open("unix.txt", O_RDONLY);
ATF_REQUIRE(fd >= 0);
r = read(fd, buffer, sizeof(buffer));
ATF_REQUIRE(r > 0);
close(fd);
require_bufeq(expected, sizeof(expected), buffer, (size_t)r);
}
TFTPD_TC_DEFINE(wrq_nonexistent,)
{
SEND_WRQ("nonexistent.txt", "octet");
RECV_ERROR(1, "File not found");
}
TFTPD_TC_DEFINE(wrq_small,)
{
int fd;
ssize_t r;
char contents[] = "small";
size_t contents_len;
char buffer[1024];
fd = open("small.txt", O_RDWR | O_CREAT, 0666);
ATF_REQUIRE(fd >= 0);
close(fd);
contents_len = strlen(contents) + 1;
SEND_WRQ("small.txt", "octet");
recv_ack(0);
send_data(1, contents, contents_len);
recv_ack(1);
fd = open("small.txt", O_RDONLY);
ATF_REQUIRE(fd >= 0);
r = read(fd, buffer, sizeof(buffer));
ATF_REQUIRE(r > 0);
close(fd);
require_bufeq(contents, contents_len, buffer, (size_t)r);
}
TFTPD_TC_DEFINE(wrq_truncate,)
{
int fd;
char contents[] = "small";
struct stat sb;
fd = open("small.txt", O_RDWR | O_CREAT, 0666);
ATF_REQUIRE(fd >= 0);
write_all(fd, contents, strlen(contents) + 1);
close(fd);
SEND_WRQ("small.txt", "octet");
recv_ack(0);
send_data(1, NULL, 0);
recv_ack(1);
ATF_REQUIRE_EQ(0, stat("small.txt", &sb));
ATF_REQUIRE_EQ(0, sb.st_size);
}
TFTPD_TC_DEFINE(wrq_window_rfc7440,)
{
int fd;
size_t i;
ssize_t r;
char options[] = OPTION_STR("windowsize", "4");
alignas(uint32_t) char contents[13 * 512 - 4];
char buffer[sizeof(contents)];
uint32_t *u32p;
u32p = (uint32_t *)contents;
for (i = 0; i < sizeof(contents) / sizeof(uint32_t); i++)
u32p[i] = i;
fd = open("rfc7440.txt", O_RDWR | O_CREAT, 0666);
ATF_REQUIRE(fd >= 0);
close(fd);
SEND_WRQ_OPT("rfc7440.txt", "octet", OPTION_STR("windowsize", "4"));
recv_oack(options, sizeof(options) - 1);
send_data(1, &contents[0 * 512], 512);
send_data(2, &contents[1 * 512], 512);
send_data(3, &contents[2 * 512], 512);
send_data(4, &contents[3 * 512], 512);
recv_ack(4);
send_data(5, &contents[4 * 512], 512);
recv_ack(5);
send_data(6, &contents[5 * 512], 512);
send_data(7, &contents[6 * 512], 512);
send_data(8, &contents[7 * 512], 512);
send_data(9, &contents[8 * 512], 512);
recv_ack(9);
send_data(10, &contents[9 * 512], 512);
send_data(12, &contents[11 * 512], 512);
recv_ack(10);
send_data(10, &contents[9 * 512], 512);
send_data(11, &contents[10 * 512], 512);
send_data(12, &contents[11 * 512], 512);
send_data(13, &contents[12 * 512], 508);
recv_ack(13);
fd = open("rfc7440.txt", O_RDONLY);
ATF_REQUIRE(fd >= 0);
r = read(fd, buffer, sizeof(buffer));
ATF_REQUIRE(r > 0);
close(fd);
require_bufeq(contents, sizeof(contents), buffer, (size_t)r);
}
TFTPD_TC_DEFINE(short_packet1, , exitcode = 1)
{
SEND_STR("\1");
}
TFTPD_TC_DEFINE(short_packet2, , exitcode = 1)
{
SEND_STR("\1\2");
}
TFTPD_TC_DEFINE(short_packet3, , exitcode = 1)
{
SEND_STR("\1\2\3");
}
ATF_TP_ADD_TCS(tp)
{
TFTPD_TC_ADD(tp, abspath);
TFTPD_TC_ADD(tp, dotdot);
TFTPD_TC_ADD(tp, s_flag);
TFTPD_TC_ADD(tp, rrq_dropped_ack);
TFTPD_TC_ADD(tp, rrq_dropped_data);
TFTPD_TC_ADD(tp, rrq_duped_ack);
TFTPD_TC_ADD(tp, rrq_eaccess);
TFTPD_TC_ADD(tp, rrq_empty);
TFTPD_TC_ADD(tp, rrq_medium);
TFTPD_TC_ADD(tp, rrq_medium_window);
TFTPD_TC_ADD(tp, rrq_netascii);
TFTPD_TC_ADD(tp, rrq_nonexistent);
TFTPD_TC_ADD(tp, rrq_path_max);
TFTPD_TC_ADD(tp, rrq_small);
TFTPD_TC_ADD(tp, rrq_window_rfc7440);
TFTPD_TC_ADD(tp, unknown_modes);
TFTPD_TC_ADD(tp, unknown_opcode);
TFTPD_TC_ADD(tp, w_flag);
TFTPD_TC_ADD(tp, wrq_dropped_ack);
TFTPD_TC_ADD(tp, wrq_dropped_data);
TFTPD_TC_ADD(tp, wrq_duped_data);
TFTPD_TC_ADD(tp, wrq_eaccess);
TFTPD_TC_ADD(tp, wrq_eaccess_world_readable);
TFTPD_TC_ADD(tp, wrq_medium);
TFTPD_TC_ADD(tp, wrq_medium_window);
TFTPD_TC_ADD(tp, wrq_netascii);
TFTPD_TC_ADD(tp, wrq_nonexistent);
TFTPD_TC_ADD(tp, wrq_small);
TFTPD_TC_ADD(tp, wrq_truncate);
TFTPD_TC_ADD(tp, wrq_window_rfc7440);
TFTPD_TC_ADD(tp, short_packet1);
TFTPD_TC_ADD(tp, short_packet2);
TFTPD_TC_ADD(tp, short_packet3);
return (atf_no_error());
}