blob: 6990efa4526917595f12a58c7a19891bffcb1be6 [file] [log] [blame]
Erik Kline1c542da2015-05-14 17:20:39 +09001/*
2 * Copyright (C) 2010 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17
18#define LOG_TAG "MultinetworkApiTest"
19#include <utils/Log.h>
20
21#include <arpa/inet.h>
22#include <errno.h>
23#include <inttypes.h>
24#include <jni.h>
25#include <netdb.h>
26#include <stdio.h>
27#include <stdlib.h>
28#include <string.h>
29#include <sys/socket.h>
30#include <sys/time.h>
31#include <android/multinetwork.h>
32
Chih-Hung Hsieh60bd0b52016-06-09 13:32:31 -070033#define UNUSED(X) ((void) (X))
Erik Kline1c542da2015-05-14 17:20:39 +090034
35static const char kHostname[] = "connectivitycheck.android.com";
36
37
38JNIEXPORT jint Java_android_net_cts_MultinetworkApiTest_runGetaddrinfoCheck(
39 JNIEnv* env, jclass class, jlong nethandle) {
40 UNUSED(env);
41 UNUSED(class);
42 net_handle_t handle = (net_handle_t) nethandle;
43 struct addrinfo *res = NULL;
44
45 errno = 0;
46 int rval = android_getaddrinfofornetwork(handle, kHostname, NULL, NULL, &res);
47 const int saved_errno = errno;
48 freeaddrinfo(res);
49
50 ALOGD("android_getaddrinfofornetwork(%llu, %s) returned rval=%d errno=%d",
51 handle, kHostname, rval, saved_errno);
52 return rval == 0 ? 0 : -saved_errno;
53}
54
55JNIEXPORT jint Java_android_net_cts_MultinetworkApiTest_runSetprocnetwork(
56 JNIEnv* env, jclass class, jlong nethandle) {
57 UNUSED(env);
58 UNUSED(class);
59 net_handle_t handle = (net_handle_t) nethandle;
60
61 errno = 0;
62 int rval = android_setprocnetwork(handle);
63 const int saved_errno = errno;
64 ALOGD("android_setprocnetwork(%llu) returned rval=%d errno=%d",
65 handle, rval, saved_errno);
66 return rval == 0 ? 0 : -saved_errno;
67}
68
69JNIEXPORT jint Java_android_net_cts_MultinetworkApiTest_runSetsocknetwork(
70 JNIEnv* env, jclass class, jlong nethandle) {
71 UNUSED(env);
72 UNUSED(class);
73 net_handle_t handle = (net_handle_t) nethandle;
74
75 errno = 0;
76 int fd = socket(AF_INET6, SOCK_DGRAM, IPPROTO_UDP);
77 if (fd < 0) {
78 ALOGD("socket() failed, errno=%d", errno);
79 return -errno;
80 }
81
82 errno = 0;
83 int rval = android_setsocknetwork(handle, fd);
84 const int saved_errno = errno;
85 ALOGD("android_setprocnetwork(%llu, %d) returned rval=%d errno=%d",
86 handle, fd, rval, saved_errno);
87 close(fd);
88 return rval == 0 ? 0 : -saved_errno;
89}
90
91static const int kSockaddrStrLen = INET6_ADDRSTRLEN + strlen("[]:65535");
92
93void sockaddr_ntop(const struct sockaddr *sa, socklen_t salen, char *dst, const size_t size) {
94 char addrstr[INET6_ADDRSTRLEN];
95 char portstr[sizeof("65535")];
Erik Klinef19c63e2015-08-07 12:45:14 +090096 char buf[kSockaddrStrLen+1];
97
Erik Kline1c542da2015-05-14 17:20:39 +090098 int ret = getnameinfo(sa, salen,
99 addrstr, sizeof(addrstr),
100 portstr, sizeof(portstr),
101 NI_NUMERICHOST | NI_NUMERICSERV);
102 if (ret == 0) {
103 snprintf(buf, sizeof(buf),
104 (sa->sa_family == AF_INET6) ? "[%s]:%s" : "%s:%s",
105 addrstr, portstr);
106 } else {
107 sprintf(buf, "???");
108 }
109
Erik Klinef19c63e2015-08-07 12:45:14 +0900110 strlcpy(dst, buf, size);
Erik Kline1c542da2015-05-14 17:20:39 +0900111}
112
113JNIEXPORT jint Java_android_net_cts_MultinetworkApiTest_runDatagramCheck(
114 JNIEnv* env, jclass class, jlong nethandle) {
115 UNUSED(env);
116 UNUSED(class);
117 const struct addrinfo kHints = {
118 .ai_flags = AI_ADDRCONFIG,
119 .ai_family = AF_UNSPEC,
120 .ai_socktype = SOCK_DGRAM,
121 .ai_protocol = IPPROTO_UDP,
122 };
123 struct addrinfo *res = NULL;
124 net_handle_t handle = (net_handle_t) nethandle;
125
Erik Klinef19c63e2015-08-07 12:45:14 +0900126 static const char kPort[] = "443";
127 int rval = android_getaddrinfofornetwork(handle, kHostname, kPort, &kHints, &res);
Erik Kline1c542da2015-05-14 17:20:39 +0900128 if (rval != 0) {
129 ALOGD("android_getaddrinfofornetwork(%llu, %s) returned rval=%d errno=%d",
130 handle, kHostname, rval, errno);
131 freeaddrinfo(res);
132 return -errno;
133 }
134
135 // Rely upon getaddrinfo sorting the best destination to the front.
136 int fd = socket(res->ai_family, res->ai_socktype, res->ai_protocol);
137 if (fd < 0) {
138 ALOGD("socket(%d, %d, %d) failed, errno=%d",
139 res->ai_family, res->ai_socktype, res->ai_protocol, errno);
140 freeaddrinfo(res);
141 return -errno;
142 }
143
144 rval = android_setsocknetwork(handle, fd);
145 ALOGD("android_setprocnetwork(%llu, %d) returned rval=%d errno=%d",
146 handle, fd, rval, errno);
147 if (rval != 0) {
148 close(fd);
149 freeaddrinfo(res);
150 return -errno;
151 }
152
Erik Klinef19c63e2015-08-07 12:45:14 +0900153 char addrstr[kSockaddrStrLen+1];
Erik Kline1c542da2015-05-14 17:20:39 +0900154 sockaddr_ntop(res->ai_addr, res->ai_addrlen, addrstr, sizeof(addrstr));
Erik Klinef19c63e2015-08-07 12:45:14 +0900155 ALOGD("Attempting connect() to %s ...", addrstr);
Erik Kline1c542da2015-05-14 17:20:39 +0900156
157 rval = connect(fd, res->ai_addr, res->ai_addrlen);
158 if (rval != 0) {
159 close(fd);
160 freeaddrinfo(res);
161 return -errno;
162 }
163 freeaddrinfo(res);
164
165 struct sockaddr_storage src_addr;
166 socklen_t src_addrlen = sizeof(src_addr);
167 if (getsockname(fd, (struct sockaddr *)&src_addr, &src_addrlen) != 0) {
168 close(fd);
169 return -errno;
170 }
171 sockaddr_ntop((const struct sockaddr *)&src_addr, sizeof(src_addr), addrstr, sizeof(addrstr));
172 ALOGD("... from %s", addrstr);
173
174 // Don't let reads or writes block indefinitely.
Erik Klinef19c63e2015-08-07 12:45:14 +0900175 const struct timeval timeo = { 2, 0 }; // 2 seconds
Erik Kline1c542da2015-05-14 17:20:39 +0900176 setsockopt(fd, SOL_SOCKET, SO_RCVTIMEO, &timeo, sizeof(timeo));
177 setsockopt(fd, SOL_SOCKET, SO_SNDTIMEO, &timeo, sizeof(timeo));
178
Erik Klinef19c63e2015-08-07 12:45:14 +0900179 // For reference see:
180 // https://tools.ietf.org/html/draft-tsvwg-quic-protocol-01#section-6.1
Erik Kline1c542da2015-05-14 17:20:39 +0900181 uint8_t quic_packet[] = {
182 0x0c, // public flags: 64bit conn ID, 8bit sequence number
183 0, 0, 0, 0, 0, 0, 0, 0, // 64bit connection ID
184 0x01, // sequence number
185 0x00, // private flags
186 0x07, // type: regular frame type "PING"
187 };
188
189 arc4random_buf(quic_packet + 1, 8); // random connection ID
190
Erik Kline1c542da2015-05-14 17:20:39 +0900191 uint8_t response[1500];
Erik Klinef19c63e2015-08-07 12:45:14 +0900192 ssize_t sent, rcvd;
193 static const int MAX_RETRIES = 5;
194 int i, errnum = 0;
195
196 for (i = 0; i < MAX_RETRIES; i++) {
197 sent = send(fd, quic_packet, sizeof(quic_packet), 0);
198 if (sent < (ssize_t)sizeof(quic_packet)) {
199 errnum = errno;
200 ALOGD("send(QUIC packet) returned sent=%zd, errno=%d", sent, errnum);
201 close(fd);
202 return -errnum;
203 }
204
205 rcvd = recv(fd, response, sizeof(response), 0);
206 if (rcvd > 0) {
207 break;
208 } else {
209 errnum = errno;
210 ALOGD("[%d/%d] recv(QUIC response) returned rcvd=%zd, errno=%d",
211 i + 1, MAX_RETRIES, rcvd, errnum);
212 }
213 }
Erik Kline1c542da2015-05-14 17:20:39 +0900214 if (rcvd < sent) {
Erik Klinef19c63e2015-08-07 12:45:14 +0900215 ALOGD("QUIC UDP %s: sent=%zd but rcvd=%zd, errno=%d", kPort, sent, rcvd, errnum);
216 if (rcvd <= 0) {
217 ALOGD("Does this network block UDP port %s?", kPort);
218 }
Erik Kline1c542da2015-05-14 17:20:39 +0900219 close(fd);
Erik Klinef19c63e2015-08-07 12:45:14 +0900220 return -EPROTO;
Erik Kline1c542da2015-05-14 17:20:39 +0900221 }
222
223 int conn_id_cmp = memcmp(quic_packet + 1, response + 1, 8);
224 if (conn_id_cmp != 0) {
225 ALOGD("sent and received connection IDs do not match");
226 close(fd);
227 return -EPROTO;
228 }
229
230 // TODO: log, and compare to the IP address encoded in the
231 // response, since this should be a public reset packet.
232
233 close(fd);
234 return 0;
235}