OXIESEC PANEL
- Current Dir:
/
/
opt
/
golang
/
1.22.0
/
src
/
net
Server IP: 2a02:4780:11:1084:0:327f:3464:10
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
02/02/2024 06:09:55 PM
rwxr-xr-x
📄
addrselect.go
9.69 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
addrselect_test.go
8.5 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_aix.go
582 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_android.go
272 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_bsd.go
343 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_darwin.go
298 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_linux.go
642 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_netbsd.go
276 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_openbsd.go
276 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_resnew.go
580 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_resold.go
579 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_socknew.go
753 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_sockold.go
842 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_solaris.go
343 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_stub.go
1.33 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_unix.go
11.35 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_unix_cgo.go
2.24 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_unix_cgo_darwin.go
461 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_unix_cgo_res.go
911 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_unix_cgo_resn.go
998 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_unix_syscall.go
2.99 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
cgo_unix_test.go
1.44 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
conf.go
15.63 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
conf_test.go
12.28 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
conn_test.go
1.82 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
dial.go
25.68 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
dial_test.go
30.14 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
dial_unix_test.go
2.77 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
dnsclient.go
5.65 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
dnsclient_test.go
1.51 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
dnsclient_unix.go
24.26 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
dnsclient_unix_test.go
69.13 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
dnsconfig.go
1.73 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
dnsconfig_unix.go
4.16 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
dnsconfig_unix_test.go
7.07 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
dnsconfig_windows.go
1.6 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
dnsname_test.go
1.96 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
error_plan9.go
224 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
error_plan9_test.go
437 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
error_posix.go
543 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
error_posix_test.go
981 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
error_test.go
20.32 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
error_unix.go
382 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
error_unix_test.go
723 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
error_windows.go
355 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
error_windows_test.go
757 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
example_test.go
8.45 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
external_test.go
4.05 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
fd_fake.go
3.79 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
fd_js.go
627 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
fd_plan9.go
3.56 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
fd_posix.go
4.29 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
fd_unix.go
5.43 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
fd_wasip1.go
496 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
fd_windows.go
6.14 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
file.go
1.69 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
file_plan9.go
2.72 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
file_stub.go
481 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
file_test.go
6.43 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
file_unix.go
2.5 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
file_unix_test.go
2.07 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
file_wasip1.go
2.2 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
file_wasip1_test.go
3.76 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
file_windows.go
521 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
hook.go
894 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
hook_plan9.go
211 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
hook_unix.go
658 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
hook_windows.go
720 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
hosts.go
3.48 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
hosts_test.go
5.6 KB
02/02/2024 06:09:55 PM
rw-r--r--
📁
http
-
02/02/2024 06:09:55 PM
rwxr-xr-x
📄
interface.go
7.26 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
interface_aix.go
4.46 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
interface_bsd.go
2.82 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
interface_bsd_test.go
1.44 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
interface_bsdvar.go
718 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
interface_darwin.go
1.29 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
interface_freebsd.go
1.29 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
interface_linux.go
6.96 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
interface_linux_test.go
3.65 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
interface_plan9.go
4.71 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
interface_solaris.go
2.13 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
interface_stub.go
814 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
interface_test.go
9.76 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
interface_unix_test.go
4.85 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
interface_windows.go
5.43 KB
02/02/2024 06:09:55 PM
rw-r--r--
📁
internal
-
02/02/2024 06:09:55 PM
rwxr-xr-x
📄
ip.go
13.88 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
ip_test.go
25.6 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
iprawsock.go
7.11 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
iprawsock_plan9.go
874 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
iprawsock_posix.go
3.89 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
iprawsock_test.go
5.98 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
ipsock.go
9.05 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
ipsock_plan9.go
7.48 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
ipsock_plan9_test.go
645 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
ipsock_posix.go
7.86 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
ipsock_test.go
6.81 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
listen_test.go
20.5 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
lookup.go
29.04 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
lookup_plan9.go
9.94 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
lookup_test.go
40.62 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
lookup_unix.go
3.35 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
lookup_windows.go
13.8 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
lookup_windows_test.go
8.93 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
mac.go
1.88 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
mac_test.go
3.26 KB
02/02/2024 06:09:55 PM
rw-r--r--
📁
mail
-
02/02/2024 06:09:55 PM
rwxr-xr-x
📄
main_cloexec_test.go
693 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
main_conf_test.go
1.39 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
main_noconf_test.go
467 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
main_plan9_test.go
392 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
main_posix_test.go
1.37 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
main_test.go
7.53 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
main_unix_test.go
1.19 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
main_wasm_test.go
284 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
main_windows_test.go
1 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
mockserver_test.go
10.77 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
mptcpsock_linux.go
3.96 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
mptcpsock_linux_test.go
4.06 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
mptcpsock_stub.go
542 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
net.go
24.56 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
net_fake.go
26.36 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
net_fake_test.go
2.79 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
net_test.go
14 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
net_windows_test.go
16.28 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
netcgo_off.go
222 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
netcgo_on.go
220 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
netgo_netcgo.go
453 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
netgo_off.go
220 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
netgo_on.go
218 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📁
netip
-
02/02/2024 06:09:55 PM
rwxr-xr-x
📄
nss.go
5.48 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
nss_test.go
3.4 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
packetconn_test.go
3.02 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
parse.go
6.04 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
parse_test.go
1.55 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
pipe.go
5.43 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
pipe_test.go
1.2 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
platform_test.go
4.33 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
port.go
1.46 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
port_test.go
1.34 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
port_unix.go
1.24 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
protoconn_test.go
7.44 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
rawconn.go
2.7 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
rawconn_stub_test.go
631 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
rawconn_test.go
4.33 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
rawconn_unix_test.go
2.96 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
rawconn_windows_test.go
3.12 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
resolverdialfunc_test.go
8.25 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
rlimit_js.go
346 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
rlimit_unix.go
1.1 KB
02/02/2024 06:09:55 PM
rw-r--r--
📁
rpc
-
02/02/2024 06:09:55 PM
rwxr-xr-x
📄
sendfile_linux.go
1.12 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
sendfile_linux_test.go
1.93 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
sendfile_stub.go
344 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
sendfile_test.go
8.25 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
sendfile_unix_alt.go
2.04 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
sendfile_windows.go
1.02 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
server_test.go
11.67 KB
02/02/2024 06:09:55 PM
rw-r--r--
📁
smtp
-
02/02/2024 06:09:55 PM
rwxr-xr-x
📄
sock_bsd.go
918 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
sock_cloexec.go
1.38 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
sock_linux.go
993 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
sock_linux_test.go
575 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
sock_plan9.go
262 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
sock_posix.go
6.29 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
sock_stub.go
390 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
sock_windows.go
802 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
sockaddr_posix.go
1.45 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
sockopt_aix.go
1.43 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
sockopt_bsd.go
2.21 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
sockopt_fake.go
955 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
sockopt_linux.go
1.25 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
sockopt_plan9.go
406 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
sockopt_posix.go
2.13 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
sockopt_solaris.go
1.25 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
sockopt_windows.go
1.51 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
sockoptip_bsdvar.go
867 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
sockoptip_linux.go
735 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
sockoptip_posix.go
1.38 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
sockoptip_stub.go
769 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
sockoptip_windows.go
786 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
splice_linux.go
1.69 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
splice_stub.go
376 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
splice_test.go
13.48 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
sys_cloexec.go
962 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
tcpsock.go
11.75 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
tcpsock_plan9.go
2.18 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
tcpsock_posix.go
6.16 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
tcpsock_test.go
17.68 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
tcpsock_unix_test.go
2.34 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
tcpsockopt_darwin.go
770 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
tcpsockopt_dragonfly.go
698 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
tcpsockopt_openbsd.go
365 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
tcpsockopt_plan9.go
525 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
tcpsockopt_posix.go
442 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
tcpsockopt_solaris.go
1.15 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
tcpsockopt_stub.go
399 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
tcpsockopt_unix.go
722 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
tcpsockopt_windows.go
741 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📁
testdata
-
02/02/2024 06:09:55 PM
rwxr-xr-x
📁
textproto
-
02/02/2024 06:09:55 PM
rwxr-xr-x
📄
timeout_test.go
29.11 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
udpsock.go
11.83 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
udpsock_plan9.go
4.64 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
udpsock_plan9_test.go
1.31 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
udpsock_posix.go
7.53 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
udpsock_test.go
17.24 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
unixsock.go
10.12 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
unixsock_linux_test.go
2.29 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
unixsock_plan9.go
1.24 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
unixsock_posix.go
6.64 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
unixsock_readmsg_cloexec.go
654 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
unixsock_readmsg_cmsg_cloexec.go
332 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
unixsock_readmsg_other.go
275 bytes
02/02/2024 06:09:55 PM
rw-r--r--
📄
unixsock_readmsg_test.go
2.51 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
unixsock_test.go
10.64 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
unixsock_windows_test.go
2.03 KB
02/02/2024 06:09:55 PM
rw-r--r--
📁
url
-
02/02/2024 06:09:55 PM
rwxr-xr-x
📄
write_unix_test.go
1.61 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
writev_test.go
5.03 KB
02/02/2024 06:09:55 PM
rw-r--r--
📄
writev_unix.go
666 bytes
02/02/2024 06:09:55 PM
rw-r--r--
Editing: listen_test.go
Close
// Copyright 2011 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. //go:build !plan9 package net import ( "fmt" "internal/testenv" "os" "runtime" "syscall" "testing" "time" ) func (ln *TCPListener) port() string { _, port, err := SplitHostPort(ln.Addr().String()) if err != nil { return "" } return port } func (c *UDPConn) port() string { _, port, err := SplitHostPort(c.LocalAddr().String()) if err != nil { return "" } return port } var tcpListenerTests = []struct { network string address string }{ {"tcp", ""}, {"tcp", "0.0.0.0"}, {"tcp", "::ffff:0.0.0.0"}, {"tcp", "::"}, {"tcp", "127.0.0.1"}, {"tcp", "::ffff:127.0.0.1"}, {"tcp", "::1"}, {"tcp4", ""}, {"tcp4", "0.0.0.0"}, {"tcp4", "::ffff:0.0.0.0"}, {"tcp4", "127.0.0.1"}, {"tcp4", "::ffff:127.0.0.1"}, {"tcp6", ""}, {"tcp6", "::"}, {"tcp6", "::1"}, } // TestTCPListener tests both single and double listen to a test // listener with same address family, same listening address and // same port. func TestTCPListener(t *testing.T) { switch runtime.GOOS { case "plan9": t.Skipf("not supported on %s", runtime.GOOS) } for _, tt := range tcpListenerTests { if !testableListenArgs(tt.network, JoinHostPort(tt.address, "0"), "") { t.Logf("skipping %s test", tt.network+" "+tt.address) continue } ln1, err := Listen(tt.network, JoinHostPort(tt.address, "0")) if err != nil { t.Fatal(err) } if err := checkFirstListener(tt.network, ln1); err != nil { ln1.Close() t.Fatal(err) } ln2, err := Listen(tt.network, JoinHostPort(tt.address, ln1.(*TCPListener).port())) if err == nil { ln2.Close() } if err := checkSecondListener(tt.network, tt.address, err); err != nil { ln1.Close() t.Fatal(err) } ln1.Close() } } var udpListenerTests = []struct { network string address string }{ {"udp", ""}, {"udp", "0.0.0.0"}, {"udp", "::ffff:0.0.0.0"}, {"udp", "::"}, {"udp", "127.0.0.1"}, {"udp", "::ffff:127.0.0.1"}, {"udp", "::1"}, {"udp4", ""}, {"udp4", "0.0.0.0"}, {"udp4", "::ffff:0.0.0.0"}, {"udp4", "127.0.0.1"}, {"udp4", "::ffff:127.0.0.1"}, {"udp6", ""}, {"udp6", "::"}, {"udp6", "::1"}, } // TestUDPListener tests both single and double listen to a test // listener with same address family, same listening address and // same port. func TestUDPListener(t *testing.T) { switch runtime.GOOS { case "plan9": t.Skipf("not supported on %s", runtime.GOOS) } for _, tt := range udpListenerTests { if !testableListenArgs(tt.network, JoinHostPort(tt.address, "0"), "") { t.Logf("skipping %s test", tt.network+" "+tt.address) continue } c1, err := ListenPacket(tt.network, JoinHostPort(tt.address, "0")) if err != nil { t.Fatal(err) } if err := checkFirstListener(tt.network, c1); err != nil { c1.Close() t.Fatal(err) } c2, err := ListenPacket(tt.network, JoinHostPort(tt.address, c1.(*UDPConn).port())) if err == nil { c2.Close() } if err := checkSecondListener(tt.network, tt.address, err); err != nil { c1.Close() t.Fatal(err) } c1.Close() } } var dualStackTCPListenerTests = []struct { network1, address1 string // first listener network2, address2 string // second listener xerr error // expected error value, nil or other }{ // Test cases and expected results for the attempting 2nd listen on the same port // 1st listen 2nd listen darwin freebsd linux openbsd // ------------------------------------------------------------------------------------ // "tcp" "" "tcp" "" - - - - // "tcp" "" "tcp" "0.0.0.0" - - - - // "tcp" "0.0.0.0" "tcp" "" - - - - // ------------------------------------------------------------------------------------ // "tcp" "" "tcp" "[::]" - - - ok // "tcp" "[::]" "tcp" "" - - - ok // "tcp" "0.0.0.0" "tcp" "[::]" - - - ok // "tcp" "[::]" "tcp" "0.0.0.0" - - - ok // "tcp" "[::ffff:0.0.0.0]" "tcp" "[::]" - - - ok // "tcp" "[::]" "tcp" "[::ffff:0.0.0.0]" - - - ok // ------------------------------------------------------------------------------------ // "tcp4" "" "tcp6" "" ok ok ok ok // "tcp6" "" "tcp4" "" ok ok ok ok // "tcp4" "0.0.0.0" "tcp6" "[::]" ok ok ok ok // "tcp6" "[::]" "tcp4" "0.0.0.0" ok ok ok ok // ------------------------------------------------------------------------------------ // "tcp" "127.0.0.1" "tcp" "[::1]" ok ok ok ok // "tcp" "[::1]" "tcp" "127.0.0.1" ok ok ok ok // "tcp4" "127.0.0.1" "tcp6" "[::1]" ok ok ok ok // "tcp6" "[::1]" "tcp4" "127.0.0.1" ok ok ok ok // // Platform default configurations: // darwin, kernel version 11.3.0 // net.inet6.ip6.v6only=0 (overridable by sysctl or IPV6_V6ONLY option) // freebsd, kernel version 8.2 // net.inet6.ip6.v6only=1 (overridable by sysctl or IPV6_V6ONLY option) // linux, kernel version 3.0.0 // net.ipv6.bindv6only=0 (overridable by sysctl or IPV6_V6ONLY option) // openbsd, kernel version 5.0 // net.inet6.ip6.v6only=1 (overriding is prohibited) {"tcp", "", "tcp", "", syscall.EADDRINUSE}, {"tcp", "", "tcp", "0.0.0.0", syscall.EADDRINUSE}, {"tcp", "0.0.0.0", "tcp", "", syscall.EADDRINUSE}, {"tcp", "", "tcp", "::", syscall.EADDRINUSE}, {"tcp", "::", "tcp", "", syscall.EADDRINUSE}, {"tcp", "0.0.0.0", "tcp", "::", syscall.EADDRINUSE}, {"tcp", "::", "tcp", "0.0.0.0", syscall.EADDRINUSE}, {"tcp", "::ffff:0.0.0.0", "tcp", "::", syscall.EADDRINUSE}, {"tcp", "::", "tcp", "::ffff:0.0.0.0", syscall.EADDRINUSE}, {"tcp4", "", "tcp6", "", nil}, {"tcp6", "", "tcp4", "", nil}, {"tcp4", "0.0.0.0", "tcp6", "::", nil}, {"tcp6", "::", "tcp4", "0.0.0.0", nil}, {"tcp", "127.0.0.1", "tcp", "::1", nil}, {"tcp", "::1", "tcp", "127.0.0.1", nil}, {"tcp4", "127.0.0.1", "tcp6", "::1", nil}, {"tcp6", "::1", "tcp4", "127.0.0.1", nil}, } // TestDualStackTCPListener tests both single and double listen // to a test listener with various address families, different // listening address and same port. // // On DragonFly BSD, we expect the kernel version of node under test // to be greater than or equal to 4.4. func TestDualStackTCPListener(t *testing.T) { switch runtime.GOOS { case "plan9": t.Skipf("not supported on %s", runtime.GOOS) } if !supportsIPv4() || !supportsIPv6() { t.Skip("both IPv4 and IPv6 are required") } for _, tt := range dualStackTCPListenerTests { if !testableListenArgs(tt.network1, JoinHostPort(tt.address1, "0"), "") { t.Logf("skipping %s test", tt.network1+" "+tt.address1) continue } if !supportsIPv4map() && differentWildcardAddr(tt.address1, tt.address2) { tt.xerr = nil } var firstErr, secondErr error for i := 0; i < 5; i++ { lns, err := newDualStackListener() if err != nil { t.Fatal(err) } port := lns[0].port() for _, ln := range lns { ln.Close() } var ln1 Listener ln1, firstErr = Listen(tt.network1, JoinHostPort(tt.address1, port)) if firstErr != nil { continue } if err := checkFirstListener(tt.network1, ln1); err != nil { ln1.Close() t.Fatal(err) } ln2, err := Listen(tt.network2, JoinHostPort(tt.address2, ln1.(*TCPListener).port())) if err == nil { ln2.Close() } if secondErr = checkDualStackSecondListener(tt.network2, tt.address2, err, tt.xerr); secondErr != nil { ln1.Close() continue } ln1.Close() break } if firstErr != nil { t.Error(firstErr) } if secondErr != nil { t.Error(secondErr) } } } var dualStackUDPListenerTests = []struct { network1, address1 string // first listener network2, address2 string // second listener xerr error // expected error value, nil or other }{ {"udp", "", "udp", "", syscall.EADDRINUSE}, {"udp", "", "udp", "0.0.0.0", syscall.EADDRINUSE}, {"udp", "0.0.0.0", "udp", "", syscall.EADDRINUSE}, {"udp", "", "udp", "::", syscall.EADDRINUSE}, {"udp", "::", "udp", "", syscall.EADDRINUSE}, {"udp", "0.0.0.0", "udp", "::", syscall.EADDRINUSE}, {"udp", "::", "udp", "0.0.0.0", syscall.EADDRINUSE}, {"udp", "::ffff:0.0.0.0", "udp", "::", syscall.EADDRINUSE}, {"udp", "::", "udp", "::ffff:0.0.0.0", syscall.EADDRINUSE}, {"udp4", "", "udp6", "", nil}, {"udp6", "", "udp4", "", nil}, {"udp4", "0.0.0.0", "udp6", "::", nil}, {"udp6", "::", "udp4", "0.0.0.0", nil}, {"udp", "127.0.0.1", "udp", "::1", nil}, {"udp", "::1", "udp", "127.0.0.1", nil}, {"udp4", "127.0.0.1", "udp6", "::1", nil}, {"udp6", "::1", "udp4", "127.0.0.1", nil}, } // TestDualStackUDPListener tests both single and double listen // to a test listener with various address families, different // listening address and same port. // // On DragonFly BSD, we expect the kernel version of node under test // to be greater than or equal to 4.4. func TestDualStackUDPListener(t *testing.T) { switch runtime.GOOS { case "plan9": t.Skipf("not supported on %s", runtime.GOOS) } if !supportsIPv4() || !supportsIPv6() { t.Skip("both IPv4 and IPv6 are required") } for _, tt := range dualStackUDPListenerTests { if !testableListenArgs(tt.network1, JoinHostPort(tt.address1, "0"), "") { t.Logf("skipping %s test", tt.network1+" "+tt.address1) continue } if !supportsIPv4map() && differentWildcardAddr(tt.address1, tt.address2) { tt.xerr = nil } var firstErr, secondErr error for i := 0; i < 5; i++ { cs, err := newDualStackPacketListener() if err != nil { t.Fatal(err) } port := cs[0].port() for _, c := range cs { c.Close() } var c1 PacketConn c1, firstErr = ListenPacket(tt.network1, JoinHostPort(tt.address1, port)) if firstErr != nil { continue } if err := checkFirstListener(tt.network1, c1); err != nil { c1.Close() t.Fatal(err) } c2, err := ListenPacket(tt.network2, JoinHostPort(tt.address2, c1.(*UDPConn).port())) if err == nil { c2.Close() } if secondErr = checkDualStackSecondListener(tt.network2, tt.address2, err, tt.xerr); secondErr != nil { c1.Close() continue } c1.Close() break } if firstErr != nil { t.Error(firstErr) } if secondErr != nil { t.Error(secondErr) } } } func differentWildcardAddr(i, j string) bool { if (i == "" || i == "0.0.0.0" || i == "::ffff:0.0.0.0") && (j == "" || j == "0.0.0.0" || j == "::ffff:0.0.0.0") { return false } if i == "[::]" && j == "[::]" { return false } return true } func checkFirstListener(network string, ln any) error { switch network { case "tcp": fd := ln.(*TCPListener).fd if err := checkDualStackAddrFamily(fd); err != nil { return err } case "tcp4": fd := ln.(*TCPListener).fd if fd.family != syscall.AF_INET { return fmt.Errorf("%v got %v; want %v", fd.laddr, fd.family, syscall.AF_INET) } case "tcp6": fd := ln.(*TCPListener).fd if fd.family != syscall.AF_INET6 { return fmt.Errorf("%v got %v; want %v", fd.laddr, fd.family, syscall.AF_INET6) } case "udp": fd := ln.(*UDPConn).fd if err := checkDualStackAddrFamily(fd); err != nil { return err } case "udp4": fd := ln.(*UDPConn).fd if fd.family != syscall.AF_INET { return fmt.Errorf("%v got %v; want %v", fd.laddr, fd.family, syscall.AF_INET) } case "udp6": fd := ln.(*UDPConn).fd if fd.family != syscall.AF_INET6 { return fmt.Errorf("%v got %v; want %v", fd.laddr, fd.family, syscall.AF_INET6) } default: return UnknownNetworkError(network) } return nil } func checkSecondListener(network, address string, err error) error { switch network { case "tcp", "tcp4", "tcp6": if err == nil { return fmt.Errorf("%s should fail", network+" "+address) } case "udp", "udp4", "udp6": if err == nil { return fmt.Errorf("%s should fail", network+" "+address) } default: return UnknownNetworkError(network) } return nil } func checkDualStackSecondListener(network, address string, err, xerr error) error { switch network { case "tcp", "tcp4", "tcp6": if xerr == nil && err != nil || xerr != nil && err == nil { return fmt.Errorf("%s got %v; want %v", network+" "+address, err, xerr) } case "udp", "udp4", "udp6": if xerr == nil && err != nil || xerr != nil && err == nil { return fmt.Errorf("%s got %v; want %v", network+" "+address, err, xerr) } default: return UnknownNetworkError(network) } return nil } func checkDualStackAddrFamily(fd *netFD) error { switch a := fd.laddr.(type) { case *TCPAddr: // If a node under test supports both IPv6 capability // and IPv6 IPv4-mapping capability, we can assume // that the node listens on a wildcard address with an // AF_INET6 socket. if supportsIPv4map() && fd.laddr.(*TCPAddr).isWildcard() { if fd.family != syscall.AF_INET6 { return fmt.Errorf("Listen(%s, %v) returns %v; want %v", fd.net, fd.laddr, fd.family, syscall.AF_INET6) } } else { if fd.family != a.family() { return fmt.Errorf("Listen(%s, %v) returns %v; want %v", fd.net, fd.laddr, fd.family, a.family()) } } case *UDPAddr: // If a node under test supports both IPv6 capability // and IPv6 IPv4-mapping capability, we can assume // that the node listens on a wildcard address with an // AF_INET6 socket. if supportsIPv4map() && fd.laddr.(*UDPAddr).isWildcard() { if fd.family != syscall.AF_INET6 { return fmt.Errorf("ListenPacket(%s, %v) returns %v; want %v", fd.net, fd.laddr, fd.family, syscall.AF_INET6) } } else { if fd.family != a.family() { return fmt.Errorf("ListenPacket(%s, %v) returns %v; want %v", fd.net, fd.laddr, fd.family, a.family()) } } default: return fmt.Errorf("unexpected protocol address type: %T", a) } return nil } func TestWildWildcardListener(t *testing.T) { testenv.MustHaveExternalNetwork(t) switch runtime.GOOS { case "plan9": t.Skipf("not supported on %s", runtime.GOOS) } defer func() { if p := recover(); p != nil { t.Fatalf("panicked: %v", p) } }() if ln, err := Listen("tcp", ""); err == nil { ln.Close() } if ln, err := ListenPacket("udp", ""); err == nil { ln.Close() } if ln, err := ListenTCP("tcp", nil); err == nil { ln.Close() } if ln, err := ListenUDP("udp", nil); err == nil { ln.Close() } if ln, err := ListenIP("ip:icmp", nil); err == nil { ln.Close() } } var ipv4MulticastListenerTests = []struct { net string gaddr *UDPAddr // see RFC 4727 }{ {"udp", &UDPAddr{IP: IPv4(224, 0, 0, 254), Port: 12345}}, {"udp4", &UDPAddr{IP: IPv4(224, 0, 0, 254), Port: 12345}}, } // TestIPv4MulticastListener tests both single and double listen to a // test listener with same address family, same group address and same // port. func TestIPv4MulticastListener(t *testing.T) { testenv.MustHaveExternalNetwork(t) switch runtime.GOOS { case "android", "plan9": t.Skipf("not supported on %s", runtime.GOOS) } if !supportsIPv4() { t.Skip("IPv4 is not supported") } closer := func(cs []*UDPConn) { for _, c := range cs { if c != nil { c.Close() } } } for _, ifi := range []*Interface{loopbackInterface(), nil} { // Note that multicast interface assignment by system // is not recommended because it usually relies on // routing stuff for finding out an appropriate // nexthop containing both network and link layer // adjacencies. if ifi == nil || !*testIPv4 { continue } for _, tt := range ipv4MulticastListenerTests { var err error cs := make([]*UDPConn, 2) if cs[0], err = ListenMulticastUDP(tt.net, ifi, tt.gaddr); err != nil { t.Fatal(err) } if err := checkMulticastListener(cs[0], tt.gaddr.IP); err != nil { closer(cs) t.Fatal(err) } if cs[1], err = ListenMulticastUDP(tt.net, ifi, tt.gaddr); err != nil { closer(cs) t.Fatal(err) } if err := checkMulticastListener(cs[1], tt.gaddr.IP); err != nil { closer(cs) t.Fatal(err) } closer(cs) } } } var ipv6MulticastListenerTests = []struct { net string gaddr *UDPAddr // see RFC 4727 }{ {"udp", &UDPAddr{IP: ParseIP("ff01::114"), Port: 12345}}, {"udp", &UDPAddr{IP: ParseIP("ff02::114"), Port: 12345}}, {"udp", &UDPAddr{IP: ParseIP("ff04::114"), Port: 12345}}, {"udp", &UDPAddr{IP: ParseIP("ff05::114"), Port: 12345}}, {"udp", &UDPAddr{IP: ParseIP("ff08::114"), Port: 12345}}, {"udp", &UDPAddr{IP: ParseIP("ff0e::114"), Port: 12345}}, {"udp6", &UDPAddr{IP: ParseIP("ff01::114"), Port: 12345}}, {"udp6", &UDPAddr{IP: ParseIP("ff02::114"), Port: 12345}}, {"udp6", &UDPAddr{IP: ParseIP("ff04::114"), Port: 12345}}, {"udp6", &UDPAddr{IP: ParseIP("ff05::114"), Port: 12345}}, {"udp6", &UDPAddr{IP: ParseIP("ff08::114"), Port: 12345}}, {"udp6", &UDPAddr{IP: ParseIP("ff0e::114"), Port: 12345}}, } // TestIPv6MulticastListener tests both single and double listen to a // test listener with same address family, same group address and same // port. func TestIPv6MulticastListener(t *testing.T) { testenv.MustHaveExternalNetwork(t) switch runtime.GOOS { case "plan9": t.Skipf("not supported on %s", runtime.GOOS) } if !supportsIPv6() { t.Skip("IPv6 is not supported") } if os.Getuid() != 0 { t.Skip("must be root") } closer := func(cs []*UDPConn) { for _, c := range cs { if c != nil { c.Close() } } } for _, ifi := range []*Interface{loopbackInterface(), nil} { // Note that multicast interface assignment by system // is not recommended because it usually relies on // routing stuff for finding out an appropriate // nexthop containing both network and link layer // adjacencies. if ifi == nil && !*testIPv6 { continue } for _, tt := range ipv6MulticastListenerTests { var err error cs := make([]*UDPConn, 2) if cs[0], err = ListenMulticastUDP(tt.net, ifi, tt.gaddr); err != nil { t.Fatal(err) } if err := checkMulticastListener(cs[0], tt.gaddr.IP); err != nil { closer(cs) t.Fatal(err) } if cs[1], err = ListenMulticastUDP(tt.net, ifi, tt.gaddr); err != nil { closer(cs) t.Fatal(err) } if err := checkMulticastListener(cs[1], tt.gaddr.IP); err != nil { closer(cs) t.Fatal(err) } closer(cs) } } } func checkMulticastListener(c *UDPConn, ip IP) error { if ok, err := multicastRIBContains(ip); err != nil { return err } else if !ok { return fmt.Errorf("%s not found in multicast rib", ip.String()) } la := c.LocalAddr() if la, ok := la.(*UDPAddr); !ok || la.Port == 0 { return fmt.Errorf("got %v; want a proper address with non-zero port number", la) } return nil } func multicastRIBContains(ip IP) (bool, error) { switch runtime.GOOS { case "aix", "dragonfly", "netbsd", "openbsd", "plan9", "solaris", "illumos", "windows": return true, nil // not implemented yet case "linux": if runtime.GOARCH == "arm" || runtime.GOARCH == "alpha" { return true, nil // not implemented yet } } ift, err := Interfaces() if err != nil { return false, err } for _, ifi := range ift { ifmat, err := ifi.MulticastAddrs() if err != nil { return false, err } for _, ifma := range ifmat { if ifma.(*IPAddr).IP.Equal(ip) { return true, nil } } } return false, nil } // Issue 21856. func TestClosingListener(t *testing.T) { ln := newLocalListener(t, "tcp") addr := ln.Addr() go func() { for { c, err := ln.Accept() if err != nil { return } c.Close() } }() // Let the goroutine start. We don't sleep long: if the // goroutine doesn't start, the test will pass without really // testing anything, which is OK. time.Sleep(time.Millisecond) ln.Close() ln2, err := Listen("tcp", addr.String()) if err != nil { t.Fatal(err) } ln2.Close() } func TestListenConfigControl(t *testing.T) { switch runtime.GOOS { case "plan9": t.Skipf("not supported on %s", runtime.GOOS) } t.Run("StreamListen", func(t *testing.T) { for _, network := range []string{"tcp", "tcp4", "tcp6", "unix", "unixpacket"} { if !testableNetwork(network) { continue } ln := newLocalListener(t, network, &ListenConfig{Control: controlOnConnSetup}) ln.Close() } }) t.Run("PacketListen", func(t *testing.T) { for _, network := range []string{"udp", "udp4", "udp6", "unixgram"} { if !testableNetwork(network) { continue } c := newLocalPacketListener(t, network, &ListenConfig{Control: controlOnConnSetup}) c.Close() } }) }