summaryrefslogtreecommitdiffstats
path: root/nsock/tests/run_tests.sh
blob: c0392f8114fda2bafbd65d9bc8efe3aabe86389e (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
#!/bin/sh

# nsock regression test suite
# Same license as nmap -- see https://nmap.org/book/man-legal.html

# hackish, I should consider using a configuration file.
PORT_UDP=$(grep "PORT_UDP " test-common.h | awk '{print $3}')
PORT_TCP=$(grep "PORT_TCP " test-common.h | awk '{print $3}')
PORT_TCPSSL=$(grep "PORT_TCPSSL " test-common.h | awk '{print $3}')

EXEC_MAIN=./tests_main

NCAT=${NCAT:-ncat}
if [ ! -x "$NCAT" -a -z "$(which $NCAT)" ]; then
    echo "Can't find your ncat: $NCAT"
    echo "Trying ../../ncat/ncat"
    NCAT="../../ncat/ncat"
    if [ ! -x "$NCAT" ]; then
        echo "You haven't built Ncat."
        echo "Skipping nsock tests."
        exit 0
    fi
fi


if [ -n "$1" ]
then
  case "$1" in
    "gdb")
        TRACER="gdb --args"
        ;;

    "trace")
        TRACER="strace"
        ;;

    "leak")
        TRACER="valgrind --leak-check=yes"
        ;;

    "-h")
        echo "Usage: `basename $0` [gdb|trace|leak]"
        exit 0
        ;;

    *)
        echo "Unknown mode $1"
        exit 1
        ;;
  esac
fi


setup_echo_udp() {
  $NCAT -l --udp --sh-exec cat 127.0.0.1 $PORT_UDP &
  pid_udp=$!
  echo "started UDP listener on port $PORT_UDP (pid $pid_udp)"
}

setup_echo_tcp() {
  $NCAT -l --keep-open --sh-exec cat 127.0.0.1 $PORT_TCP &
  pid_tcp=$!
  echo "started TCP listener on port $PORT_TCP (pid $pid_tcp)"
}

setup_echo_tcpssl() {
  $NCAT -l --ssl --keep-open --sh-exec cat 127.0.0.1 $PORT_TCPSSL &
  pid_tcpssl=$!
  echo "started TCP SSL listener on port $PORT_TCPSSL (pid $pid_tcpssl)"
}

cleanup_all() {
  kill -s KILL $@ 2>&1 >> /dev/null
}

main() {
  setup_echo_udp $PORT_UDP
  setup_echo_tcp $PORT_TCP
  $EXEC_MAIN --ssl && setup_echo_tcpssl $PORT_TCPSSL

  $TRACER $EXEC_MAIN

  cleanup_all $pid_udp $pid_tcp $pid_tcpssl
}

main