2 This file is part of GNUnet.
3 (C) 2009 Christian Grothoff (and other contributing authors)
5 GNUnet is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published
7 by the Free Software Foundation; either version 3, or (at your
8 option) any later version.
10 GNUnet is distributed in the hope that it will be useful, but
11 WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 General Public License for more details.
15 You should have received a copy of the GNU General Public License
16 along with GNUnet; see the file COPYING. If not, write to the
17 Free Software Foundation, Inc., 59 Temple Place - Suite 330,
18 Boston, MA 02111-1307, USA.
21 * @file dht/gnunet-dht-driver.c
22 * @brief Driver for setting up a group of gnunet peers and
23 * then issuing GETS and PUTS on the DHT. Coarse results
24 * are reported, fine grained results (if requested) are
25 * logged to a (mysql) database, or to file.
26 * @author Nathan Evans (who to blame)
29 #ifndef HAVE_MALICIOUS
32 #include "gnunet_testing_lib.h"
33 #include "gnunet_core_service.h"
34 #include "gnunet_dht_service.h"
38 /* Specific DEBUG hack, do not use normally (may leak memory, segfault, or eat children.) */
39 #define ONLY_TESTING GNUNET_YES
42 #define VERBOSE GNUNET_NO
44 /* Timeout for entire driver to run */
45 #define DEFAULT_TIMEOUT GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_MINUTES, 5)
47 /* Timeout for waiting for (individual) replies to get requests */
48 #define DEFAULT_GET_TIMEOUT GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, 10)
50 #define DEFAULT_TOPOLOGY_CAPTURE_TIMEOUT GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, 90)
52 /* Timeout for waiting for gets to be sent to the service */
53 #define DEFAULT_GET_DELAY GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, 10)
55 /* Timeout for waiting for puts to be sent to the service */
56 #define DEFAULT_PUT_DELAY GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, 10)
58 /* Time to allow a find peer request to take */
59 #define DEFAULT_FIND_PEER_DELAY GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, 40)
61 /* Time to wait for all peers disconnected due to to churn to actually be removed from system */
62 #define DEFAULT_PEER_DISCONNECT_TIMEOUT GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_MINUTES, 5)
64 #define DEFAULT_SECONDS_PER_PEER_START GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, 45)
66 #define DEFAULT_TEST_DATA_SIZE 8
68 #define DEFAULT_BUCKET_SIZE 4
70 #define FIND_PEER_THRESHOLD 1
72 /* If more than this many peers are added, slow down sending */
73 #define MAX_FIND_PEER_CUTOFF 2000
75 /* If less than this many peers are added, speed up sending */
76 #define MIN_FIND_PEER_CUTOFF 500
78 /* How often (in seconds) to print out connection information */
79 #define CONN_UPDATE_DURATION 10
81 #define DEFAULT_MAX_OUTSTANDING_PUTS 10
83 #define DEFAULT_MAX_OUTSTANDING_FIND_PEERS 64
85 #define DEFAULT_FIND_PEER_OFFSET GNUNET_TIME_relative_divide (DEFAULT_FIND_PEER_DELAY, DEFAULT_MAX_OUTSTANDING_FIND_PEERS)
87 #define DEFAULT_MAX_OUTSTANDING_GETS 10
89 #define DEFAULT_CONNECT_TIMEOUT 60
91 #define DEFAULT_TOPOLOGY_TIMEOUT GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_MINUTES, 8)
93 #define DEFAULT_RECONNECT_ATTEMPTS 8
96 * Default frequency for sending malicious get messages
98 #define DEFAULT_MALICIOUS_GET_FREQUENCY GNUNET_TIME_UNIT_SECONDS
101 * Default frequency for sending malicious put messages
103 #define DEFAULT_MALICIOUS_PUT_FREQUENCY GNUNET_TIME_UNIT_SECONDS
107 struct MaliciousContext
110 * Handle to DHT service (via the API)
112 struct GNUNET_DHT_Handle *dht_handle;
115 * Handle to the peer daemon
117 struct GNUNET_TESTING_Daemon *daemon;
120 * Task for disconnecting DHT handles
122 GNUNET_SCHEDULER_TaskIdentifier disconnect_task;
125 * What type of malicious to set this peer to.
132 /* This is a linked list */
133 struct TestFindPeer *next;
135 /* Handle to the bigger context */
136 struct FindPeerContext *find_peer_context;
139 * Handle to the peer's DHT service (via the API)
141 struct GNUNET_DHT_Handle *dht_handle;
144 * Handle to the peer daemon
146 struct GNUNET_TESTING_Daemon *daemon;
149 * Task for disconnecting DHT handles
151 GNUNET_SCHEDULER_TaskIdentifier disconnect_task;
154 struct TestPutContext
156 /* This is a linked list */
157 struct TestPutContext *next;
160 * Handle to the first peers DHT service (via the API)
162 struct GNUNET_DHT_Handle *dht_handle;
165 * Handle to the PUT peer daemon
167 struct GNUNET_TESTING_Daemon *daemon;
170 * Identifier for this PUT
175 * Task for disconnecting DHT handles
177 GNUNET_SCHEDULER_TaskIdentifier disconnect_task;
180 struct TestGetContext
182 /* This is a linked list */
183 struct TestGetContext *next;
186 * Handle to the first peers DHT service (via the API)
188 struct GNUNET_DHT_Handle *dht_handle;
191 * Handle for the DHT get request
193 struct GNUNET_DHT_GetHandle *get_handle;
196 * Handle to the GET peer daemon
198 struct GNUNET_TESTING_Daemon *daemon;
201 * Identifier for this GET
206 * Task for disconnecting DHT handles (and stopping GET)
208 GNUNET_SCHEDULER_TaskIdentifier disconnect_task;
211 * Whether or not this request has been fulfilled already.
217 * Simple struct to keep track of progress, and print a
218 * nice little percentage meter for long running tasks.
228 unsigned int completed;
232 char *startup_string;
236 * Linked list of information for populating statistics
237 * before ending trial.
239 struct StatisticsIteratorContext
241 const struct GNUNET_PeerIdentity *peer;
242 unsigned int stat_routes;
243 unsigned int stat_route_forwards;
244 unsigned int stat_results;
245 unsigned int stat_results_to_client;
246 unsigned int stat_result_forwards;
247 unsigned int stat_gets;
248 unsigned int stat_puts;
249 unsigned int stat_puts_inserted;
250 unsigned int stat_find_peer;
251 unsigned int stat_find_peer_start;
252 unsigned int stat_get_start;
253 unsigned int stat_put_start;
254 unsigned int stat_find_peer_reply;
255 unsigned int stat_get_reply;
256 unsigned int stat_find_peer_answer;
257 unsigned int stat_get_response_start;
261 * Context for getting a topology, logging it, and continuing
262 * on with some next operation.
264 struct TopologyIteratorContext
266 unsigned int total_iterations;
267 unsigned int current_iteration;
268 unsigned int total_connections;
269 unsigned int total_peers;
270 struct GNUNET_CONTAINER_MultiHashMap *peers_seen;
271 struct GNUNET_PeerIdentity *peer;
272 GNUNET_SCHEDULER_Task cont;
274 struct GNUNET_TIME_Relative timeout;
280 /** Node in the heap */
281 struct GNUNET_CONTAINER_HeapNode *heap_node;
283 /** Peer the count refers to */
284 struct GNUNET_PeerIdentity peer_id;
286 /** Count of connections this peer has */
291 * Context for sending out find peer requests.
293 struct FindPeerContext
296 * How long to send find peer requests, once the settle time
297 * is over don't send any more out!
299 struct GNUNET_TIME_Absolute endtime;
302 * Number of connections in the current topology
303 * (after this round of find peer requests has ended).
305 unsigned int current_peers;
308 * Number of connections in the current topology
309 * (before this round of find peer requests started).
311 unsigned int previous_peers;
314 * Number of find peer requests we have currently
317 unsigned int outstanding;
320 * Number of find peer requests to send in this round.
325 * Number of find peer requests sent last time around.
327 unsigned int last_sent;
330 * Hashmap of peers in the current topology, value
331 * is a PeerCount, with the number of connections
334 struct GNUNET_CONTAINER_MultiHashMap *peer_hash;
337 * Min heap which orders values in the peer_hash for
340 struct GNUNET_CONTAINER_Heap *peer_min_heap;
343 * Callback for counting the peers in the current topology.
345 GNUNET_TESTING_NotifyTopology count_peers_cb;
351 * Next full round (puts + gets).
356 * Next round of gets.
361 * Next round of puts.
366 * Next round of churn.
376 * How long to try to connect two peers.
378 struct GNUNET_TIME_Relative connect_timeout;
381 * How many times to re-attempt connecting two peers.
383 static unsigned long long connect_attempts;
386 * Timeout to let all GET requests happen.
388 static struct GNUNET_TIME_Relative all_get_timeout;
393 static struct GNUNET_TIME_Relative get_timeout;
396 * Time to allow for GET requests to be sent to service.
398 static struct GNUNET_TIME_Relative get_delay;
401 * Time to allow for PUT requests to be sent to service.
403 static struct GNUNET_TIME_Relative put_delay;
406 * Delay between sending find peer requests (if
407 * handled by the driver, no effect if sent by service).
409 static struct GNUNET_TIME_Relative find_peer_delay;
412 * Time between find peer requests
413 * (find_peer_delay / max_outstanding_find_peer)
415 static struct GNUNET_TIME_Relative find_peer_offset;
418 * How many seconds to allow each peer to start.
420 static struct GNUNET_TIME_Relative seconds_per_peer_start;
423 * At what time did we start the connection process.
425 static struct GNUNET_TIME_Absolute connect_start_time;
428 * What was the last time we updated connection/second information.
430 static struct GNUNET_TIME_Absolute connect_last_time;
433 * Boolean value, should the driver issue find peer requests
434 * (GNUNET_YES) or should it be left to the service (GNUNET_NO)
436 static unsigned int do_find_peer;
440 * Are we currently trying to connect two peers repeatedly?
442 static unsigned int repeat_connect_mode;
445 * Task for repeating connects.
447 GNUNET_SCHEDULER_TaskIdentifier repeat_connect_task;
449 struct GNUNET_TESTING_Daemon *repeat_connect_peer1;
450 struct GNUNET_TESTING_Daemon *repeat_connect_peer2;
454 * Boolean value, should replication be done by the dht
455 * service (GNUNET_YES) or by the driver (GNUNET_NO)
457 static unsigned int in_dht_replication;
460 * Size of test data to insert/retrieve during testing.
462 static unsigned long long test_data_size = DEFAULT_TEST_DATA_SIZE;
465 * Maximum number of concurrent connections to peers.
467 static unsigned long long max_outstanding_connections;
470 * Maximum number of concurrent ssh instances to peers.
472 static unsigned long long max_concurrent_ssh;
475 * Maximum number of concurrent PUT requests.
477 static unsigned long long max_outstanding_puts = DEFAULT_MAX_OUTSTANDING_PUTS;
480 * Maximum number of concurrent GET requests.
482 static unsigned long long max_outstanding_gets = DEFAULT_MAX_OUTSTANDING_GETS;
485 * Number of nodes issuing malicious GET messages.
487 static unsigned long long malicious_getters;
490 * Maximum number of concurrent find peer messages being sent.
492 static unsigned long long max_outstanding_find_peers;
495 * Number of nodes issuing malicious PUT messages.
497 static unsigned long long malicious_putters;
500 * Time (in seconds) to delay between rounds.
502 static unsigned long long round_delay;
505 * How many malicious droppers to seed in the network.
507 static unsigned long long malicious_droppers;
510 * Bloom filter to restrict malicious nodes chosen.
512 struct GNUNET_CONTAINER_BloomFilter *malicious_bloom;
515 * Whether malicious droppers should be chosen based on proximity to a key.
517 static int malicious_sybil;
520 * Target for the malicious sybil nodes (choose the closest to this key).
522 static GNUNET_HashCode sybil_target;
525 * How often to send malicious GET messages.
527 static struct GNUNET_TIME_Relative malicious_get_frequency;
530 * How often to send malicious PUT messages.
532 static struct GNUNET_TIME_Relative malicious_put_frequency;
535 * How long to send find peer requests.
537 static unsigned long long settle_time;
540 * Handle to the dhtlog service.
542 static struct GNUNET_DHTLOG_Handle *dhtlog_handle;
545 * Replication value for GET requests.
547 static unsigned long long get_replication;
550 * Replication value for PUT requests.
552 static unsigned long long put_replication;
555 * If GNUNET_YES, insert data at the same peers every time.
556 * Otherwise, choose a new random peer to insert at each time.
558 static unsigned int replicate_same;
561 * If GNUNET_YES, issue GET requests at the same peers every time.
562 * Otherwise, choose a new random peer/data combination to search
565 static unsigned int get_from_same;
568 * Should malicious peers be set after allowing for settle time?
569 * Default is to set them malicious after initial connection setup.
571 static unsigned int malicious_after_settle;
574 * Number of rounds for testing (PUTS + GETS)
576 static unsigned long long total_rounds;
579 * Target number of connections (will stop sending find peer
580 * messages when this number is exceeded)
582 static unsigned long long target_total_connections;
585 * Number of rounds already run
587 static unsigned int rounds_finished;
590 * Number of rounds of churn to read from the file (first line, should be a single number).
592 static unsigned int churn_rounds;
595 * Current round we are in for churn, tells us how many peers to connect/disconnect.
597 static unsigned int current_churn_round;
600 * Number of times to churn per round
602 static unsigned long long churns_per_round;
605 * Array of churn values.
607 static unsigned int *churn_array;
610 * Hash map of stats contexts.
612 static struct GNUNET_CONTAINER_MultiHashMap *stats_map;
615 * LL of malicious settings.
617 struct MaliciousContext *all_malicious;
620 * List of GETS to perform
622 struct TestGetContext *all_gets;
625 * List of PUTS to perform
627 struct TestPutContext *all_puts;
630 * Directory to store temporary data in, defined in config file
632 static char *test_directory;
635 * Variable used to store the number of connections we should wait for.
637 static unsigned int expected_connections;
640 * Variable used to keep track of how many peers aren't yet started.
642 static unsigned long long peers_left;
645 * Handle to the set of all peers run for this test.
647 static struct GNUNET_TESTING_PeerGroup *pg;
651 * Global config handle.
653 static const struct GNUNET_CONFIGURATION_Handle *config;
656 * Total number of peers to run, set based on config file.
658 static unsigned long long num_peers;
661 * Total number of items to insert.
663 static unsigned long long num_puts;
666 * How many puts do we currently have in flight?
668 static unsigned long long outstanding_puts;
671 * How many puts are done?
673 static unsigned long long puts_completed;
676 * Total number of items to attempt to get.
678 static unsigned long long num_gets;
681 * How many puts do we currently have in flight?
683 static unsigned long long outstanding_gets;
686 * How many gets are done?
688 static unsigned long long gets_completed;
691 * How many gets failed?
693 static unsigned long long gets_failed;
696 * How many malicious control messages do
697 * we currently have in flight?
699 static unsigned long long outstanding_malicious;
702 * How many set malicious peers are done?
704 static unsigned long long malicious_completed;
707 * Global used to count how many connections we have currently
708 * been notified about (how many times has topology_callback been called
711 static unsigned int total_connections;
714 * Previous connections, for counting new connections during some duration.
716 static unsigned int previous_connections;
719 * For counting failed connections during some duration.
721 static unsigned int previous_failed_connections;
724 * Global used to count how many failed connections we have
725 * been notified about (how many times has topology_callback
726 * been called with failure?)
728 static unsigned int failed_connections;
731 * If GNUNET_YES, only log PUT/GET round data to mysql, otherwise
732 * log everything (including each dht service logging).
734 static unsigned int dhtlog_minimal;
736 /* Task handle to use to schedule shutdown if something goes wrong */
737 GNUNET_SCHEDULER_TaskIdentifier die_task;
739 static char *blacklist_transports;
741 static enum GNUNET_TESTING_Topology topology;
743 static enum GNUNET_TESTING_Topology blacklist_topology = GNUNET_TESTING_TOPOLOGY_NONE; /* Don't do any blacklisting */
745 static enum GNUNET_TESTING_Topology connect_topology = GNUNET_TESTING_TOPOLOGY_NONE; /* NONE actually means connect all allowed peers */
747 static enum GNUNET_TESTING_TopologyOption connect_topology_option = GNUNET_TESTING_TOPOLOGY_OPTION_ALL;
749 static double connect_topology_option_modifier = 0.0;
751 static struct ProgressMeter *hostkey_meter;
753 static struct ProgressMeter *peer_start_meter;
755 static struct ProgressMeter *peer_connect_meter;
757 static struct ProgressMeter *put_meter;
759 static struct ProgressMeter *get_meter;
761 static GNUNET_HashCode *known_keys;
763 /* Global return value (0 for success, anything else for failure) */
767 * Create a meter to keep track of the progress of some task.
769 * @param total the total number of items to complete
770 * @param start_string a string to prefix the meter with (if printing)
771 * @param print GNUNET_YES to print the meter, GNUNET_NO to count
774 * @return the progress meter
776 static struct ProgressMeter *
777 create_meter(unsigned int total, char * start_string, int print)
779 struct ProgressMeter *ret;
780 ret = GNUNET_malloc(sizeof(struct ProgressMeter));
783 ret->modnum = total / 4;
784 ret->dotnum = (total / 50) + 1;
785 if (start_string != NULL)
786 ret->startup_string = GNUNET_strdup(start_string);
788 ret->startup_string = GNUNET_strdup("");
794 * Update progress meter (increment by one).
796 * @param meter the meter to update and print info for
798 * @return GNUNET_YES if called the total requested,
799 * GNUNET_NO if more items expected
802 update_meter(struct ProgressMeter *meter)
804 if (meter->print == GNUNET_YES)
806 if (meter->completed % meter->modnum == 0)
808 if (meter->completed == 0)
810 fprintf(stdout, "%sProgress: [0%%", meter->startup_string);
813 fprintf(stdout, "%d%%", (int)(((float)meter->completed / meter->total) * 100));
815 else if (meter->completed % meter->dotnum == 0)
816 fprintf(stdout, ".");
818 if (meter->completed + 1 == meter->total)
819 fprintf(stdout, "%d%%]\n", 100);
824 if (meter->completed == meter->total)
830 * Reset progress meter.
832 * @param meter the meter to reset
834 * @return GNUNET_YES if meter reset,
835 * GNUNET_SYSERR on error
838 reset_meter(struct ProgressMeter *meter)
841 return GNUNET_SYSERR;
843 meter->completed = 0;
848 * Release resources for meter
850 * @param meter the meter to free
853 free_meter(struct ProgressMeter *meter)
855 GNUNET_free_non_null (meter->startup_string);
860 * Check whether peers successfully shut down.
863 shutdown_callback (void *cls,
874 * Task to release DHT handles for PUT
877 put_disconnect_task (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
879 struct TestPutContext *test_put = cls;
880 test_put->disconnect_task = GNUNET_SCHEDULER_NO_TASK;
881 GNUNET_DHT_disconnect(test_put->dht_handle);
882 test_put->dht_handle = NULL;
883 if (replicate_same == GNUNET_NO)
884 test_put->daemon = GNUNET_TESTING_daemon_get(pg, GNUNET_CRYPTO_random_u32(GNUNET_CRYPTO_QUALITY_WEAK, num_peers));
888 * Function scheduled to be run on the successful completion of this
892 finish_testing (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
894 GNUNET_log (GNUNET_ERROR_TYPE_WARNING, "Ending test normally!\n", (char *)cls);
895 GNUNET_assert (pg != NULL);
896 struct TestPutContext *test_put = all_puts;
897 struct TestGetContext *test_get = all_gets;
899 while (test_put != NULL)
901 if (test_put->disconnect_task != GNUNET_SCHEDULER_NO_TASK)
902 GNUNET_SCHEDULER_cancel(test_put->disconnect_task);
903 if (test_put->dht_handle != NULL)
904 GNUNET_DHT_disconnect(test_put->dht_handle);
905 test_put = test_put->next;
908 while (test_get != NULL)
910 if (test_get->disconnect_task != GNUNET_SCHEDULER_NO_TASK)
911 GNUNET_SCHEDULER_cancel(test_get->disconnect_task);
912 if (test_get->get_handle != NULL)
913 GNUNET_DHT_get_stop(test_get->get_handle);
914 if (test_get->dht_handle != NULL)
915 GNUNET_DHT_disconnect(test_get->dht_handle);
916 test_get = test_get->next;
919 GNUNET_TESTING_daemons_stop (pg, DEFAULT_TIMEOUT, &shutdown_callback, NULL);
921 if (dhtlog_handle != NULL)
923 fprintf(stderr, "Update trial endtime\n");
924 dhtlog_handle->update_trial (gets_completed);
925 GNUNET_DHTLOG_disconnect(dhtlog_handle);
926 dhtlog_handle = NULL;
929 if (hostkey_meter != NULL)
930 free_meter(hostkey_meter);
931 if (peer_start_meter != NULL)
932 free_meter(peer_start_meter);
933 if (peer_connect_meter != NULL)
934 free_meter(peer_connect_meter);
935 if (put_meter != NULL)
936 free_meter(put_meter);
937 if (get_meter != NULL)
938 free_meter(get_meter);
944 * Callback for iterating over all the peer connections of a peer group.
947 log_topology_cb (void *cls,
948 const struct GNUNET_PeerIdentity *first,
949 const struct GNUNET_PeerIdentity *second,
952 struct TopologyIteratorContext *topo_ctx = cls;
953 if ((first != NULL) && (second != NULL))
955 if ((topo_ctx->peers_seen != NULL) && (GNUNET_NO == GNUNET_CONTAINER_multihashmap_contains(topo_ctx->peers_seen, &first->hashPubKey)))
957 GNUNET_CONTAINER_multihashmap_put(topo_ctx->peers_seen, &first->hashPubKey, NULL, GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY);
958 topo_ctx->total_peers++;
960 topo_ctx->total_connections++;
961 if ((GNUNET_NO == dhtlog_minimal) && (dhtlog_handle != NULL))
962 dhtlog_handle->insert_extended_topology(first, second);
966 GNUNET_assert(dhtlog_handle != NULL);
967 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Topology iteration (%u/%u) finished (%u connections, %u peers)\n", topo_ctx->current_iteration, topo_ctx->total_iterations, topo_ctx->total_connections, topo_ctx->total_peers);
968 dhtlog_handle->update_topology(topo_ctx->total_connections);
969 if (topo_ctx->cont != NULL)
970 GNUNET_SCHEDULER_add_now (topo_ctx->cont, topo_ctx->cls);
971 if (topo_ctx->peers_seen != NULL)
972 GNUNET_CONTAINER_multihashmap_destroy(topo_ctx->peers_seen);
973 GNUNET_free(topo_ctx);
978 * Iterator over hash map entries.
980 * @param cls closure - always NULL
981 * @param key current key code
982 * @param value value in the hash map, a stats context
983 * @return GNUNET_YES if we should continue to
987 static int stats_iterate (void *cls,
988 const GNUNET_HashCode * key,
991 struct StatisticsIteratorContext *stats_ctx;
995 dhtlog_handle->insert_stat(stats_ctx->peer, stats_ctx->stat_routes, stats_ctx->stat_route_forwards, stats_ctx->stat_results,
996 stats_ctx->stat_results_to_client, stats_ctx->stat_result_forwards, stats_ctx->stat_gets,
997 stats_ctx->stat_puts, stats_ctx->stat_puts_inserted, stats_ctx->stat_find_peer,
998 stats_ctx->stat_find_peer_start, stats_ctx->stat_get_start, stats_ctx->stat_put_start,
999 stats_ctx->stat_find_peer_reply, stats_ctx->stat_get_reply, stats_ctx->stat_find_peer_answer,
1000 stats_ctx->stat_get_response_start);
1001 GNUNET_free(stats_ctx);
1006 stats_finished (void *cls, int result)
1008 fprintf(stderr, "Finished getting all peers statistics, iterating!\n");
1009 GNUNET_CONTAINER_multihashmap_iterate(stats_map, &stats_iterate, NULL);
1010 GNUNET_CONTAINER_multihashmap_destroy(stats_map);
1011 GNUNET_SCHEDULER_add_now (&finish_testing, NULL);
1015 * Callback function to process statistic values.
1017 * @param cls closure
1018 * @param peer the peer the statistics belong to
1019 * @param subsystem name of subsystem that created the statistic
1020 * @param name the name of the datum
1021 * @param value the current value
1022 * @param is_persistent GNUNET_YES if the value is persistent, GNUNET_NO if not
1023 * @return GNUNET_OK to continue, GNUNET_SYSERR to abort iteration
1025 static int stats_handle (void *cls,
1026 const struct GNUNET_PeerIdentity *peer,
1027 const char *subsystem,
1032 struct StatisticsIteratorContext *stats_ctx;
1034 if (dhtlog_handle != NULL)
1035 dhtlog_handle->add_generic_stat(peer, name, subsystem, value);
1036 if (GNUNET_CONTAINER_multihashmap_contains(stats_map, &peer->hashPubKey))
1038 stats_ctx = GNUNET_CONTAINER_multihashmap_get(stats_map, &peer->hashPubKey);
1042 stats_ctx = GNUNET_malloc(sizeof(struct StatisticsIteratorContext));
1043 stats_ctx->peer = peer;
1044 GNUNET_CONTAINER_multihashmap_put(stats_map, &peer->hashPubKey, stats_ctx, GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY);
1046 GNUNET_assert(stats_ctx != NULL);
1048 if (strcmp(name, STAT_ROUTES) == 0)
1049 stats_ctx->stat_routes = value;
1050 else if (strcmp(name, STAT_ROUTE_FORWARDS) == 0)
1051 stats_ctx->stat_route_forwards = value;
1052 else if (strcmp(name, STAT_RESULTS) == 0)
1053 stats_ctx->stat_results = value;
1054 else if (strcmp(name, STAT_RESULTS_TO_CLIENT) == 0)
1055 stats_ctx->stat_results_to_client = value;
1056 else if (strcmp(name, STAT_RESULT_FORWARDS) == 0)
1057 stats_ctx->stat_result_forwards = value;
1058 else if (strcmp(name, STAT_GETS) == 0)
1059 stats_ctx->stat_gets = value;
1060 else if (strcmp(name, STAT_PUTS) == 0)
1061 stats_ctx->stat_puts = value;
1062 else if (strcmp(name, STAT_PUTS_INSERTED) == 0)
1063 stats_ctx->stat_puts_inserted = value;
1064 else if (strcmp(name, STAT_FIND_PEER) == 0)
1065 stats_ctx->stat_find_peer = value;
1066 else if (strcmp(name, STAT_FIND_PEER_START) == 0)
1067 stats_ctx->stat_find_peer_start = value;
1068 else if (strcmp(name, STAT_GET_START) == 0)
1069 stats_ctx->stat_get_start = value;
1070 else if (strcmp(name, STAT_PUT_START) == 0)
1071 stats_ctx->stat_put_start = value;
1072 else if (strcmp(name, STAT_FIND_PEER_REPLY) == 0)
1073 stats_ctx->stat_find_peer_reply = value;
1074 else if (strcmp(name, STAT_GET_REPLY) == 0)
1075 stats_ctx->stat_get_reply = value;
1076 else if (strcmp(name, STAT_FIND_PEER_ANSWER) == 0)
1077 stats_ctx->stat_find_peer_answer = value;
1078 else if (strcmp(name, STAT_GET_RESPONSE_START) == 0)
1079 stats_ctx->stat_get_response_start = value;
1085 * Connect to statistics service for each peer and get the appropriate
1086 * dht statistics for safe keeping.
1089 log_dht_statistics (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
1091 stats_map = GNUNET_CONTAINER_multihashmap_create(num_peers);
1092 fprintf(stderr, "Starting statistics logging\n");
1093 GNUNET_TESTING_get_statistics(pg, &stats_finished, &stats_handle, NULL);
1098 * Connect to all peers in the peer group and iterate over their
1102 capture_current_topology (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
1104 struct TopologyIteratorContext *topo_ctx = cls;
1105 dhtlog_handle->insert_topology(0);
1106 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Called capture_current_topology\n");
1107 GNUNET_TESTING_get_topology (pg, &log_topology_cb, topo_ctx);
1112 * Check if the get_handle is being used, if so stop the request. Either
1113 * way, schedule the end_badly_cont function which actually shuts down the
1117 end_badly (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
1119 GNUNET_log (GNUNET_ERROR_TYPE_WARNING, "Failing test with error: `%s'!\n", (char *)cls);
1121 struct TestPutContext *test_put = all_puts;
1122 struct TestGetContext *test_get = all_gets;
1124 while (test_put != NULL)
1126 if (test_put->disconnect_task != GNUNET_SCHEDULER_NO_TASK)
1127 GNUNET_SCHEDULER_cancel(test_put->disconnect_task);
1128 if (test_put->dht_handle != NULL)
1129 GNUNET_DHT_disconnect(test_put->dht_handle);
1130 test_put = test_put->next;
1133 while (test_get != NULL)
1135 if (test_get->disconnect_task != GNUNET_SCHEDULER_NO_TASK)
1136 GNUNET_SCHEDULER_cancel(test_get->disconnect_task);
1137 if (test_get->get_handle != NULL)
1138 GNUNET_DHT_get_stop(test_get->get_handle);
1139 if (test_get->dht_handle != NULL)
1140 GNUNET_DHT_disconnect(test_get->dht_handle);
1141 test_get = test_get->next;
1144 GNUNET_TESTING_daemons_stop (pg, DEFAULT_TIMEOUT, &shutdown_callback, NULL);
1146 if (dhtlog_handle != NULL)
1148 fprintf(stderr, "Update trial endtime\n");
1149 dhtlog_handle->update_trial (gets_completed);
1150 GNUNET_DHTLOG_disconnect(dhtlog_handle);
1151 dhtlog_handle = NULL;
1154 if (hostkey_meter != NULL)
1155 free_meter(hostkey_meter);
1156 if (peer_start_meter != NULL)
1157 free_meter(peer_start_meter);
1158 if (peer_connect_meter != NULL)
1159 free_meter(peer_connect_meter);
1160 if (put_meter != NULL)
1161 free_meter(put_meter);
1162 if (get_meter != NULL)
1163 free_meter(get_meter);
1169 * Forward declaration.
1172 do_put (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc);
1175 * Forward declaration.
1178 do_get (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc);
1181 * Iterator over hash map entries.
1183 * @param cls closure
1184 * @param key current key code
1185 * @param value value in the hash map
1186 * @return GNUNET_YES if we should continue to
1190 static int remove_peer_count (void *cls,
1191 const GNUNET_HashCode * key,
1194 struct FindPeerContext *find_peer_ctx = cls;
1195 struct PeerCount *peer_count = value;
1196 GNUNET_CONTAINER_heap_remove_node(find_peer_ctx->peer_min_heap, peer_count->heap_node);
1197 GNUNET_free(peer_count);
1203 * Connect to all peers in the peer group and iterate over their
1207 count_new_peers (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
1209 struct FindPeerContext *find_peer_context = cls;
1210 find_peer_context->previous_peers = find_peer_context->current_peers;
1211 find_peer_context->current_peers = 0;
1212 GNUNET_TESTING_get_topology (pg, find_peer_context->count_peers_cb, find_peer_context);
1216 decrement_find_peers (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
1218 struct TestFindPeer *test_find_peer = cls;
1219 GNUNET_assert(test_find_peer->find_peer_context->outstanding > 0);
1220 test_find_peer->find_peer_context->outstanding--;
1221 test_find_peer->find_peer_context->total--;
1222 if (0 == test_find_peer->find_peer_context->total)
1224 GNUNET_SCHEDULER_add_now(&count_new_peers, test_find_peer->find_peer_context);
1226 GNUNET_free(test_find_peer);
1230 * A find peer request has been sent to the server, now we will schedule a task
1231 * to wait the appropriate time to allow the request to go out and back.
1233 * @param cls closure - a TestFindPeer struct
1234 * @param tc context the task is being called with
1237 handle_find_peer_sent (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
1239 struct TestFindPeer *test_find_peer = cls;
1241 GNUNET_DHT_disconnect(test_find_peer->dht_handle);
1242 GNUNET_SCHEDULER_add_delayed(GNUNET_TIME_relative_divide(find_peer_delay, 2), &decrement_find_peers, test_find_peer);
1247 send_find_peer_request (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
1249 struct TestFindPeer *test_find_peer = cls;
1251 if (test_find_peer->find_peer_context->outstanding > max_outstanding_find_peers)
1253 GNUNET_SCHEDULER_add_delayed(find_peer_offset, &send_find_peer_request, test_find_peer);
1257 test_find_peer->find_peer_context->outstanding++;
1258 if (GNUNET_TIME_absolute_get_remaining(test_find_peer->find_peer_context->endtime).rel_value == 0)
1260 GNUNET_SCHEDULER_add_now(&decrement_find_peers, test_find_peer);
1264 test_find_peer->dht_handle = GNUNET_DHT_connect(test_find_peer->daemon->cfg, 1);
1265 GNUNET_assert(test_find_peer->dht_handle != NULL);
1266 GNUNET_DHT_find_peers (test_find_peer->dht_handle,
1267 &handle_find_peer_sent, test_find_peer);
1272 * Add a connection to the find_peer_context given. This may
1273 * be complete overkill, but allows us to choose the peers with
1274 * the least connections to initiate find peer requests from.
1276 static void add_new_connection(struct FindPeerContext *find_peer_context,
1277 const struct GNUNET_PeerIdentity *first,
1278 const struct GNUNET_PeerIdentity *second)
1280 struct PeerCount *first_count;
1281 struct PeerCount *second_count;
1283 if (GNUNET_CONTAINER_multihashmap_contains(find_peer_context->peer_hash, &first->hashPubKey))
1285 first_count = GNUNET_CONTAINER_multihashmap_get(find_peer_context->peer_hash, &first->hashPubKey);
1286 GNUNET_assert(first_count != NULL);
1287 first_count->count++;
1288 GNUNET_CONTAINER_heap_update_cost(find_peer_context->peer_min_heap, first_count->heap_node, first_count->count);
1292 first_count = GNUNET_malloc(sizeof(struct PeerCount));
1293 first_count->count = 1;
1294 memcpy(&first_count->peer_id, first, sizeof(struct GNUNET_PeerIdentity));
1295 first_count->heap_node = GNUNET_CONTAINER_heap_insert(find_peer_context->peer_min_heap, first_count, first_count->count);
1296 GNUNET_CONTAINER_multihashmap_put(find_peer_context->peer_hash, &first->hashPubKey, first_count, GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY);
1299 if (GNUNET_CONTAINER_multihashmap_contains(find_peer_context->peer_hash, &second->hashPubKey))
1301 second_count = GNUNET_CONTAINER_multihashmap_get(find_peer_context->peer_hash, &second->hashPubKey);
1302 GNUNET_assert(second_count != NULL);
1303 second_count->count++;
1304 GNUNET_CONTAINER_heap_update_cost(find_peer_context->peer_min_heap, second_count->heap_node, second_count->count);
1308 second_count = GNUNET_malloc(sizeof(struct PeerCount));
1309 second_count->count = 1;
1310 memcpy(&second_count->peer_id, second, sizeof(struct GNUNET_PeerIdentity));
1311 second_count->heap_node = GNUNET_CONTAINER_heap_insert(find_peer_context->peer_min_heap, second_count, second_count->count);
1312 GNUNET_CONTAINER_multihashmap_put(find_peer_context->peer_hash, &second->hashPubKey, second_count, GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY);
1318 * Iterate over min heap of connections per peer. For any
1319 * peer that has 0 connections, attempt to connect them to
1322 * @param cls closure a struct FindPeerContext
1323 * @param node internal node of the heap
1324 * @param element value stored, a struct PeerCount
1325 * @param cost cost associated with the node
1326 * @return GNUNET_YES if we should continue to iterate,
1329 static int iterate_min_heap_peers (void *cls,
1330 struct GNUNET_CONTAINER_HeapNode *node,
1332 GNUNET_CONTAINER_HeapCostType cost)
1334 struct FindPeerContext *find_peer_context = cls;
1335 struct PeerCount *peer_count = element;
1336 struct GNUNET_TESTING_Daemon *d1;
1337 struct GNUNET_TESTING_Daemon *d2;
1338 struct GNUNET_TIME_Relative timeout;
1341 d1 = GNUNET_TESTING_daemon_get_by_id (pg, &peer_count->peer_id);
1342 GNUNET_assert(d1 != NULL);
1344 while ((d2 == d1) || (GNUNET_YES != GNUNET_TESTING_daemon_running(d2)))
1346 d2 = GNUNET_TESTING_daemon_get(pg, GNUNET_CRYPTO_random_u32(GNUNET_CRYPTO_QUALITY_WEAK, num_peers));
1347 GNUNET_assert(d2 != NULL);
1350 /** Just try to connect the peers, don't worry about callbacks, etc. **/
1351 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Peer %s has 0 connections. Trying to connect to %s...\n", GNUNET_i2s(&peer_count->peer_id), d2->shortname);
1352 timeout = GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, DEFAULT_CONNECT_TIMEOUT);
1353 if (GNUNET_TIME_relative_to_absolute(timeout).abs_value > find_peer_context->endtime.abs_value)
1355 timeout = GNUNET_TIME_absolute_get_remaining(find_peer_context->endtime);
1357 GNUNET_TESTING_daemons_connect(d1, d2, timeout, DEFAULT_RECONNECT_ATTEMPTS, NULL, NULL);
1359 if (GNUNET_TIME_absolute_get_remaining(find_peer_context->endtime).rel_value > 0)
1366 * Forward declaration.
1369 schedule_churn_find_peer_requests (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc);
1372 * Callback for iterating over all the peer connections of a peer group.
1373 * Used after we have churned on some peers to find which ones have zero
1374 * connections so we can make them issue find peer requests.
1377 count_peers_churn_cb (void *cls,
1378 const struct GNUNET_PeerIdentity *first,
1379 const struct GNUNET_PeerIdentity *second,
1382 struct FindPeerContext *find_peer_context = cls;
1383 struct TopologyIteratorContext *topo_ctx;
1384 struct PeerCount *peer_count;
1386 if ((first != NULL) && (second != NULL))
1388 add_new_connection(find_peer_context, first, second);
1389 find_peer_context->current_peers++;
1393 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Peer count finished (%u connections)\n",
1394 find_peer_context->current_peers);
1395 peer_count = GNUNET_CONTAINER_heap_peek(find_peer_context->peer_min_heap);
1396 GNUNET_assert(peer_count != NULL);
1397 /* WAIT. When peers are churned they will come back with their peers (at least in peerinfo), because the HOSTS file doesn't likely get removed. CRAP. */
1398 /* NO they won't, because we have disabled peerinfo writing to disk (remember?) so we WILL have to give them new connections */
1399 /* Best course of action: have DHT automatically try to add peers from peerinfo on startup. This way IF peerinfo writes to file
1400 * then some peers will end up connected.
1402 * Also, find any peers that have zero connections here and set up a task to choose at random another peer in the network to
1403 * connect to. Of course, if they are blacklisted from that peer they won't be able to connect, so we will have to keep trying
1404 * until they get a peer.
1406 /* However, they won't automatically be connected to any of their previous peers... How can we handle that? */
1407 /* So now we have choices: do we want them to come back with all their connections? Probably not, but it solves this mess. */
1409 /* Second problem, which is still a problem, is that a FIND_PEER request won't work when a peer has no connections */
1412 * Okay, so here's how this *should* work now.
1414 * 1. We check the min heap for any peers that have 0 connections.
1415 * a. If any are found, we iterate over the heap and just randomly
1416 * choose another peer and ask testing to please connect the two.
1417 * This takes care of the case that a peer just randomly joins the
1418 * network. However, if there are strict topology restrictions
1419 * (imagine a ring) choosing randomly most likely won't help.
1420 * We make sure the connection attempt doesn't take longer than
1421 * the total timeout, but don't care too much about the result.
1422 * b. After that, we still schedule the find peer requests (concurrently
1423 * with the connect attempts most likely). This handles the case
1424 * that the DHT iterates over peerinfo and just needs to try to send
1425 * a message to get connected. This should handle the case that the
1426 * topology is very strict.
1428 * 2. If all peers have > 0 connections, we still send find peer requests
1429 * as long as possible (until timeout is reached) to help out those
1430 * peers that were newly churned and need more connections. This is because
1431 * once all new peers have established a single connection, they won't be
1434 * 3. Once we reach the timeout, we can do no more. We must schedule the
1435 * next iteration of get requests regardless of connections that peers
1436 * may or may not have.
1438 * Caveat: it would be nice to get peers to take data offline with them and
1439 * come back with it (or not) based on the testing framework. The
1440 * same goes for remembering previous connections, but putting either
1441 * into the general testing churn options seems like overkill because
1442 * these are very specialized cases.
1444 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Out of %u peers, fewest connections is %d\n", GNUNET_CONTAINER_heap_get_size(find_peer_context->peer_min_heap), peer_count->count);
1445 if ((peer_count->count == 0) && (GNUNET_TIME_absolute_get_remaining(find_peer_context->endtime).rel_value > 0))
1447 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Found peer with no connections, will choose some peer(s) at random to connect to!\n");
1448 GNUNET_CONTAINER_heap_iterate (find_peer_context->peer_min_heap, &iterate_min_heap_peers, find_peer_context);
1449 GNUNET_SCHEDULER_add_now(&schedule_churn_find_peer_requests, find_peer_context);
1451 else if ((GNUNET_TIME_absolute_get_remaining(find_peer_context->endtime).rel_value > 0) && (find_peer_context->last_sent != 0))
1453 GNUNET_SCHEDULER_add_now(&schedule_churn_find_peer_requests, find_peer_context);
1457 GNUNET_CONTAINER_multihashmap_iterate(find_peer_context->peer_hash, &remove_peer_count, find_peer_context);
1458 GNUNET_CONTAINER_multihashmap_destroy(find_peer_context->peer_hash);
1459 GNUNET_CONTAINER_heap_destroy(find_peer_context->peer_min_heap);
1460 GNUNET_free(find_peer_context);
1461 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Churn round %u of %llu finished, scheduling next GET round.\n", current_churn_round, churn_rounds);
1462 if (dhtlog_handle != NULL)
1464 topo_ctx = GNUNET_malloc(sizeof(struct TopologyIteratorContext));
1465 topo_ctx->cont = &do_get;
1466 topo_ctx->cls = all_gets;
1467 topo_ctx->timeout = DEFAULT_GET_TIMEOUT;
1468 topo_ctx->peers_seen = GNUNET_CONTAINER_multihashmap_create(num_peers);
1469 die_task = GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_relative_add(GNUNET_TIME_relative_add(DEFAULT_GET_TIMEOUT, all_get_timeout), DEFAULT_TOPOLOGY_CAPTURE_TIMEOUT),
1470 &end_badly, "from do gets (count_peers_churn_cb)");
1471 GNUNET_SCHEDULER_add_now(&capture_current_topology, topo_ctx);
1475 die_task = GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_relative_add(GNUNET_TIME_relative_add(DEFAULT_GET_TIMEOUT, all_get_timeout), DEFAULT_TOPOLOGY_CAPTURE_TIMEOUT),
1476 &end_badly, "from do gets (count_peers_churn_cb)");
1477 GNUNET_SCHEDULER_add_now(&do_get, all_gets);
1484 * Set up a single find peer request for each peer in the topology. Do this
1485 * until the settle time is over, limited by the number of outstanding requests
1486 * and the time allowed for each one!
1489 schedule_churn_find_peer_requests (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
1491 struct FindPeerContext *find_peer_ctx = cls;
1492 struct TestFindPeer *test_find_peer;
1493 struct PeerCount *peer_count;
1496 if (find_peer_ctx->previous_peers == 0) /* First time, go slowly */
1497 find_peer_ctx->total = 1;
1498 else if (find_peer_ctx->current_peers - find_peer_ctx->previous_peers < MIN_FIND_PEER_CUTOFF)
1499 find_peer_ctx->total = find_peer_ctx->total / 2;
1500 else if (find_peer_ctx->current_peers - find_peer_ctx->previous_peers > MAX_FIND_PEER_CUTOFF) /* Found LOTS of peers, still go slowly */
1501 find_peer_ctx->total = find_peer_ctx->last_sent - (find_peer_ctx->last_sent / 4);
1503 find_peer_ctx->total = find_peer_ctx->last_sent * 4;
1505 if (find_peer_ctx->total > max_outstanding_find_peers)
1506 find_peer_ctx->total = max_outstanding_find_peers;
1508 find_peer_ctx->last_sent = find_peer_ctx->total;
1509 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Sending %u find peer messages (after churn)\n", find_peer_ctx->total);
1511 if (find_peer_ctx->total > 0)
1512 find_peer_offset = GNUNET_TIME_relative_divide(find_peer_delay, find_peer_ctx->total);
1515 find_peer_ctx->previous_peers = find_peer_ctx->current_peers;
1516 find_peer_ctx->current_peers = 0;
1517 GNUNET_TESTING_get_topology (pg, &count_peers_churn_cb, find_peer_ctx);
1521 for (i = 0; i < find_peer_ctx->total; i++)
1523 test_find_peer = GNUNET_malloc(sizeof(struct TestFindPeer));
1524 /* If we have sent requests, choose peers with a low number of connections to send requests from */
1525 peer_count = GNUNET_CONTAINER_heap_remove_root(find_peer_ctx->peer_min_heap);
1526 GNUNET_assert(peer_count != NULL);
1527 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Sending find peer request from peer with %u connections\n", peer_count->count);
1528 GNUNET_CONTAINER_multihashmap_remove(find_peer_ctx->peer_hash, &peer_count->peer_id.hashPubKey, peer_count);
1529 test_find_peer->daemon = GNUNET_TESTING_daemon_get_by_id(pg, &peer_count->peer_id);
1530 GNUNET_assert(test_find_peer->daemon != NULL);
1531 test_find_peer->find_peer_context = find_peer_ctx;
1532 GNUNET_SCHEDULER_add_delayed(GNUNET_TIME_relative_multiply(find_peer_offset, i), &send_find_peer_request, test_find_peer);
1535 if ((find_peer_ctx->peer_hash == NULL) && (find_peer_ctx->peer_min_heap == NULL))
1537 find_peer_ctx->peer_hash = GNUNET_CONTAINER_multihashmap_create(num_peers);
1538 find_peer_ctx->peer_min_heap = GNUNET_CONTAINER_heap_create(GNUNET_CONTAINER_HEAP_ORDER_MIN);
1542 GNUNET_CONTAINER_multihashmap_iterate(find_peer_ctx->peer_hash, &remove_peer_count, find_peer_ctx);
1543 GNUNET_CONTAINER_multihashmap_destroy(find_peer_ctx->peer_hash);
1544 find_peer_ctx->peer_hash = GNUNET_CONTAINER_multihashmap_create(num_peers);
1547 GNUNET_assert(0 == GNUNET_CONTAINER_multihashmap_size(find_peer_ctx->peer_hash));
1548 GNUNET_assert(0 == GNUNET_CONTAINER_heap_get_size(find_peer_ctx->peer_min_heap));
1551 static void schedule_churn_get_topology (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
1553 struct FindPeerContext *find_peer_context = cls;
1554 GNUNET_TESTING_get_topology (pg, &count_peers_churn_cb, find_peer_context);
1558 * Called when churning of the topology has finished.
1560 * @param cls closure unused
1561 * @param emsg NULL on success, or a printable error on failure
1563 static void churn_complete (void *cls, const char *emsg)
1565 struct FindPeerContext *find_peer_context = cls;
1566 struct PeerCount *peer_count;
1568 struct GNUNET_TESTING_Daemon *temp_daemon;
1569 struct TopologyIteratorContext *topo_ctx;
1570 struct GNUNET_TIME_Relative calc_timeout;
1575 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Ending test, churning of peers failed with error `%s'", emsg);
1576 GNUNET_SCHEDULER_add_now(&end_badly, (void *)emsg);
1581 * If we switched any peers on, we have to somehow force connect the new peer to
1582 * SOME bootstrap peer in the network. First schedule a task to find all peers
1583 * with no connections, then choose a random peer for each and connect them.
1585 if (find_peer_context != NULL)
1587 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "We have churned on some peers, so we must schedule find peer requests for them!\n");
1589 for (i = 0; i < num_peers; i ++)
1591 temp_daemon = GNUNET_TESTING_daemon_get(pg, i);
1592 if (GNUNET_YES == GNUNET_TESTING_daemon_running(temp_daemon))
1594 peer_count = GNUNET_malloc (sizeof(struct PeerCount));
1595 memcpy(&peer_count->peer_id, &temp_daemon->id, sizeof(struct GNUNET_PeerIdentity));
1596 GNUNET_assert(peer_count->count == 0);
1597 peer_count->heap_node = GNUNET_CONTAINER_heap_insert(find_peer_context->peer_min_heap, peer_count, peer_count->count);
1598 GNUNET_CONTAINER_multihashmap_put(find_peer_context->peer_hash, &temp_daemon->id.hashPubKey, peer_count, GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY);
1602 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Added %d peers to heap, total size %d\n", count_added, GNUNET_CONTAINER_heap_get_size(find_peer_context->peer_min_heap));
1603 GNUNET_SCHEDULER_add_delayed(DEFAULT_PEER_DISCONNECT_TIMEOUT, &schedule_churn_get_topology, find_peer_context);
1607 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Only churned off peers, no find peer requests, scheduling more gets (after allowing time for peers to disconnect properly!)...\n");
1608 if (dhtlog_handle != NULL)
1610 topo_ctx = GNUNET_malloc(sizeof(struct TopologyIteratorContext));
1611 topo_ctx->cont = &do_get;
1612 topo_ctx->cls = all_gets;
1613 topo_ctx->timeout = DEFAULT_GET_TIMEOUT;
1614 topo_ctx->peers_seen = GNUNET_CONTAINER_multihashmap_create(num_peers);
1615 calc_timeout = GNUNET_TIME_relative_add(DEFAULT_GET_TIMEOUT, all_get_timeout);
1616 calc_timeout = GNUNET_TIME_relative_add(calc_timeout, DEFAULT_TOPOLOGY_CAPTURE_TIMEOUT);
1617 calc_timeout = GNUNET_TIME_relative_add(calc_timeout, DEFAULT_PEER_DISCONNECT_TIMEOUT);
1618 die_task = GNUNET_SCHEDULER_add_delayed (calc_timeout,
1619 &end_badly, "from do gets (churn_complete)");
1620 GNUNET_SCHEDULER_add_delayed(DEFAULT_PEER_DISCONNECT_TIMEOUT, &capture_current_topology, topo_ctx);
1621 dhtlog_handle->insert_round(DHT_ROUND_GET, rounds_finished);
1625 calc_timeout = GNUNET_TIME_relative_add(DEFAULT_GET_TIMEOUT, all_get_timeout);
1626 calc_timeout = GNUNET_TIME_relative_add(calc_timeout, DEFAULT_PEER_DISCONNECT_TIMEOUT);
1627 die_task = GNUNET_SCHEDULER_add_delayed (calc_timeout,
1628 &end_badly, "from do gets (churn_complete)");
1629 GNUNET_SCHEDULER_add_delayed(DEFAULT_PEER_DISCONNECT_TIMEOUT, &do_get, all_gets);
1635 * Decide how many peers to turn on or off in this round, make sure the
1636 * numbers actually make sense, then do so. This function sets in motion
1637 * churn, find peer requests for newly joined peers, and issuing get
1638 * requests once the new peers have done so.
1640 * @param cls closure (unused)
1641 * @param tc task context (unused)
1644 churn_peers (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
1646 unsigned int count_running;
1647 unsigned int churn_up;
1648 unsigned int churn_down;
1649 struct GNUNET_TIME_Relative timeout;
1650 struct FindPeerContext *find_peer_context;
1652 churn_up = churn_down = 0;
1653 count_running = GNUNET_TESTING_daemons_running(pg);
1654 if (count_running > churn_array[current_churn_round])
1655 churn_down = count_running - churn_array[current_churn_round];
1656 else if (count_running < churn_array[current_churn_round])
1657 churn_up = churn_array[current_churn_round] - count_running;
1659 GNUNET_log(GNUNET_ERROR_TYPE_DEBUG, "Not churning any peers, topology unchanged.\n");
1661 if (churn_up > num_peers - count_running)
1663 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Churn file specified %u peers (up); only have %u!", churn_array[current_churn_round], num_peers);
1664 churn_up = num_peers - count_running;
1666 else if (churn_down > count_running)
1668 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Churn file specified %u peers (down); only have %u!", churn_array[current_churn_round], count_running);
1669 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "This will leave NO peers running (mistake in churn configuration?)!");
1670 churn_down = count_running;
1672 //timeout = GNUNET_TIME_relative_multiply(seconds_per_peer_start, churn_up > 0 ? churn_up : churn_down);
1673 //timeout = GNUNET_TIME_relative_multiply (seconds_per_peer_start, churn_up > 0 ? churn_up : churn_down);
1674 timeout = GNUNET_TIME_relative_multiply(DEFAULT_TIMEOUT, 2); /* FIXME: Lack of intelligent choice here */
1675 find_peer_context = NULL;
1676 if (churn_up > 0) /* Only need to do find peer requests if we turned new peers on */
1678 find_peer_context = GNUNET_malloc(sizeof(struct FindPeerContext));
1679 find_peer_context->count_peers_cb = &count_peers_churn_cb;
1680 find_peer_context->previous_peers = 0;
1681 find_peer_context->current_peers = 0;
1682 find_peer_context->endtime = GNUNET_TIME_relative_to_absolute(timeout);
1683 find_peer_context->peer_hash = GNUNET_CONTAINER_multihashmap_create(num_peers);
1684 find_peer_context->peer_min_heap = GNUNET_CONTAINER_heap_create(GNUNET_CONTAINER_HEAP_ORDER_MIN);
1686 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "churn_peers: want %u total, %u running, starting %u, stopping %u\n",
1687 churn_array[current_churn_round], count_running, churn_up, churn_down);
1688 GNUNET_TESTING_daemons_churn (pg, churn_down, churn_up, timeout, &churn_complete, find_peer_context);
1689 current_churn_round++;
1693 * Task to release DHT handle associated with GET request.
1696 get_stop_finished (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
1698 struct TestGetContext *test_get = cls;
1699 struct TopologyIteratorContext *topo_ctx;
1701 /* The dht_handle may be null if this get was scheduled from a down peer */
1702 if (test_get->dht_handle != NULL)
1704 GNUNET_DHT_disconnect(test_get->dht_handle);
1705 outstanding_gets--; /* GET is really finished */
1706 test_get->dht_handle = NULL;
1709 /* Reset the uid (which item to search for) and the daemon (which peer to search from) for later get request iterations */
1710 if (get_from_same == GNUNET_NO)
1712 test_get->uid = GNUNET_CRYPTO_random_u32(GNUNET_CRYPTO_QUALITY_WEAK, num_puts);
1713 test_get->daemon = GNUNET_TESTING_daemon_get(pg, GNUNET_CRYPTO_random_u32(GNUNET_CRYPTO_QUALITY_WEAK, num_peers));
1717 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "%d gets succeeded, %d gets failed!\n", gets_completed, gets_failed);
1719 update_meter(get_meter);
1720 if ((gets_completed + gets_failed == num_gets) && (outstanding_gets == 0))
1722 fprintf(stderr, "Canceling die task (get_stop_finished) %llu gets completed, %llu gets failed\n", gets_completed, gets_failed);
1723 if ((GNUNET_YES == dhtlog_minimal) && (NULL != dhtlog_handle))
1724 dhtlog_handle->insert_round_details(DHT_ROUND_GET, rounds_finished, num_gets, gets_completed);
1725 GNUNET_SCHEDULER_cancel(die_task);
1726 reset_meter(put_meter);
1727 reset_meter(get_meter);
1730 * 1) Testing is completely finished, call the topology iteration dealy and die
1731 * 2) Testing is not finished, churn the network and do gets again (current_churn_round < churn_rounds)
1732 * 3) Testing is not finished, reschedule all the PUTS *and* GETS again (num_rounds > 1)
1734 if (rounds_finished == total_rounds - 1) /* Everything is finished, end testing */
1736 if ((dhtlog_handle != NULL) && (GNUNET_NO == dhtlog_minimal))
1738 topo_ctx = GNUNET_malloc(sizeof(struct TopologyIteratorContext));
1739 topo_ctx->cont = &log_dht_statistics;
1740 topo_ctx->peers_seen = GNUNET_CONTAINER_multihashmap_create(num_peers);
1741 GNUNET_SCHEDULER_add_now(&capture_current_topology, topo_ctx);
1744 GNUNET_SCHEDULER_add_now (&finish_testing, NULL);
1746 else if (current_churn_round < churns_per_round * (rounds_finished + 1)) /* Do next round of churn */
1748 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Current churn round %u, real round %u, scheduling next round of churn.\n", current_churn_round, rounds_finished + 1);
1752 if (dhtlog_handle != NULL)
1753 dhtlog_handle->insert_round(DHT_ROUND_CHURN, rounds_finished);
1755 GNUNET_SCHEDULER_add_now(&churn_peers, NULL);
1757 else if (rounds_finished < total_rounds - 1) /* Start a new complete round */
1762 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Round %u of %llu finished, scheduling next round.\n", rounds_finished, total_rounds);
1764 /** We reset the peer daemon for puts and gets on each disconnect, so all we need to do is start another round! */
1765 if (GNUNET_YES == in_dht_replication) /* Replication done in DHT, don't redo puts! */
1767 if (dhtlog_handle != NULL)
1768 dhtlog_handle->insert_round(DHT_ROUND_GET, rounds_finished);
1770 die_task = GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_relative_add(GNUNET_TIME_relative_add(GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, round_delay), all_get_timeout), DEFAULT_TOPOLOGY_CAPTURE_TIMEOUT),
1771 &end_badly, "from do gets (next round)");
1772 GNUNET_SCHEDULER_add_delayed(GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, round_delay), &do_get, all_gets);
1776 if (dhtlog_handle != NULL)
1777 dhtlog_handle->insert_round(DHT_ROUND_NORMAL, rounds_finished);
1778 die_task = GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_relative_add(GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, round_delay), GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, num_puts * 2)),
1779 &end_badly, "from do puts");
1780 GNUNET_SCHEDULER_add_delayed(GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, round_delay), &do_put, all_puts);
1787 * Task to release get handle.
1790 get_stop_task (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
1792 struct TestGetContext *test_get = cls;
1794 if (tc->reason == GNUNET_SCHEDULER_REASON_TIMEOUT)
1796 GNUNET_assert(test_get->get_handle != NULL);
1797 GNUNET_DHT_get_stop(test_get->get_handle);
1798 test_get->get_handle = NULL;
1799 test_get->disconnect_task = GNUNET_SCHEDULER_NO_TASK;
1800 GNUNET_SCHEDULER_add_now (&get_stop_finished, test_get);
1804 * Iterator called if the GET request initiated returns a response.
1806 * @param cls closure
1807 * @param exp when will this value expire
1808 * @param key key of the result
1809 * @param get_path NULL-terminated array of pointers
1810 * to the peers on reverse GET path (or NULL if not recorded)
1811 * @param put_path NULL-terminated array of pointers
1812 * to the peers on the PUT path (or NULL if not recorded)
1813 * @param type type of the result
1814 * @param size number of bytes in data
1815 * @param data pointer to the result data
1818 get_result_iterator (void *cls,
1819 struct GNUNET_TIME_Absolute exp,
1820 const GNUNET_HashCode * key,
1821 const struct GNUNET_PeerIdentity * const *get_path,
1822 const struct GNUNET_PeerIdentity * const *put_path,
1823 enum GNUNET_BLOCK_Type type,
1827 struct TestGetContext *test_get = cls;
1829 if (test_get->succeeded == GNUNET_YES)
1830 return; /* Get has already been successful, probably ending now */
1832 if (0 != memcmp(&known_keys[test_get->uid], key, sizeof (GNUNET_HashCode))) /* || (0 != memcmp(original_data, data, sizeof(original_data))))*/
1835 GNUNET_log (GNUNET_ERROR_TYPE_WARNING, "Key or data is not the same as was inserted!\n");
1840 test_get->succeeded = GNUNET_YES;
1843 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Received correct GET response!\n");
1845 GNUNET_SCHEDULER_cancel(test_get->disconnect_task);
1846 GNUNET_SCHEDULER_add_continuation(&get_stop_task, test_get, GNUNET_SCHEDULER_REASON_PREREQ_DONE);
1852 * Set up some data, and call API PUT function
1855 do_get (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
1857 struct TestGetContext *test_get = cls;
1861 GNUNET_SCHEDULER_cancel(die_task);
1862 GNUNET_SCHEDULER_add_now(&finish_testing, NULL);
1865 if (test_get == NULL)
1866 return; /* End of the list */
1868 /* Set this here in case we are re-running gets */
1869 test_get->succeeded = GNUNET_NO;
1871 if (GNUNET_YES != GNUNET_TESTING_daemon_running(test_get->daemon)) /* If the peer has been churned off, don't try issuing request from it! */
1873 GNUNET_log(GNUNET_ERROR_TYPE_DEBUG, "Peer we should issue get request from is down, skipping.\n");
1875 GNUNET_SCHEDULER_add_now (&get_stop_finished, test_get);
1876 GNUNET_SCHEDULER_add_now (&do_get, test_get->next);
1880 /* Check if more gets are outstanding than should be */
1881 if (outstanding_gets > max_outstanding_gets)
1883 GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_MILLISECONDS, 200), &do_get, test_get);
1887 /* Connect to the first peer's DHT */
1888 test_get->dht_handle = GNUNET_DHT_connect(test_get->daemon->cfg, 10);
1889 GNUNET_assert(test_get->dht_handle != NULL);
1892 /* Insert the data at the first peer */
1893 test_get->get_handle = GNUNET_DHT_get_start(test_get->dht_handle,
1895 GNUNET_BLOCK_TYPE_TEST,
1896 &known_keys[test_get->uid],
1901 &get_result_iterator,
1905 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Starting get for uid %u from peer %s\n",
1907 test_get->daemon->shortname);
1909 test_get->disconnect_task = GNUNET_SCHEDULER_add_delayed(get_timeout, &get_stop_task, test_get);
1911 /* Schedule the next request in the linked list of get requests */
1912 GNUNET_SCHEDULER_add_now (&do_get, test_get->next);
1916 * Called when the PUT request has been transmitted to the DHT service.
1917 * Schedule the GET request for some time in the future.
1920 put_finished (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
1922 struct TestPutContext *test_put = cls;
1923 struct TopologyIteratorContext *topo_ctx;
1927 if (tc->reason == GNUNET_SCHEDULER_REASON_TIMEOUT)
1928 fprintf(stderr, "PUT Request failed!\n");
1930 /* Reset the daemon (which peer to insert at) for later put request iterations */
1931 if (replicate_same == GNUNET_NO)
1932 test_put->daemon = GNUNET_TESTING_daemon_get(pg, GNUNET_CRYPTO_random_u32(GNUNET_CRYPTO_QUALITY_WEAK, num_peers));
1934 GNUNET_SCHEDULER_cancel(test_put->disconnect_task);
1935 test_put->disconnect_task = GNUNET_SCHEDULER_add_now(&put_disconnect_task, test_put);
1936 if (GNUNET_YES == update_meter(put_meter))
1938 GNUNET_assert(outstanding_puts == 0);
1939 GNUNET_SCHEDULER_cancel (die_task);
1940 if ((dhtlog_handle != NULL) && (GNUNET_NO == dhtlog_minimal))
1942 topo_ctx = GNUNET_malloc(sizeof(struct TopologyIteratorContext));
1943 topo_ctx->cont = &do_get;
1944 topo_ctx->cls = all_gets;
1945 topo_ctx->timeout = DEFAULT_GET_TIMEOUT;
1946 topo_ctx->peers_seen = GNUNET_CONTAINER_multihashmap_create(num_peers);
1947 die_task = GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_relative_add(GNUNET_TIME_relative_add(DEFAULT_GET_TIMEOUT, all_get_timeout), DEFAULT_TOPOLOGY_CAPTURE_TIMEOUT),
1948 &end_badly, "from do gets (put finished)");
1949 GNUNET_SCHEDULER_add_now(&capture_current_topology, topo_ctx);
1953 fprintf(stderr, "Scheduling die task (put finished)\n");
1954 die_task = GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_relative_add(DEFAULT_GET_TIMEOUT, all_get_timeout),
1955 &end_badly, "from do gets (put finished)");
1956 GNUNET_SCHEDULER_add_delayed(DEFAULT_GET_TIMEOUT, &do_get, all_gets);
1963 * Set up some data, and call API PUT function
1966 do_put (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
1968 struct TestPutContext *test_put = cls;
1969 char data[test_data_size]; /* Made up data to store */
1973 if (test_put == NULL)
1974 return; /* End of list */
1976 if (GNUNET_YES != GNUNET_TESTING_daemon_running(test_put->daemon)) /* If the peer has been churned off, don't try issuing request from it! */
1978 GNUNET_log(GNUNET_ERROR_TYPE_DEBUG, "Peer we should issue put request at is down, skipping.\n");
1979 update_meter(put_meter);
1980 GNUNET_SCHEDULER_add_now (&do_put, test_put->next);
1984 for (i = 0; i < sizeof(data); i++)
1986 memset(&data[i], GNUNET_CRYPTO_random_u32(GNUNET_CRYPTO_QUALITY_WEAK, UINT32_MAX), 1);
1989 if (outstanding_puts > max_outstanding_puts)
1991 GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_MILLISECONDS, 200), &do_put, test_put);
1996 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Starting put for uid %u from peer %s\n",
1998 test_put->daemon->shortname);
2000 test_put->dht_handle = GNUNET_DHT_connect(test_put->daemon->cfg, 10);
2002 GNUNET_assert(test_put->dht_handle != NULL);
2004 GNUNET_DHT_put(test_put->dht_handle,
2005 &known_keys[test_put->uid],
2008 GNUNET_BLOCK_TYPE_TEST,
2010 GNUNET_TIME_UNIT_FOREVER_ABS,
2012 &put_finished, test_put);
2013 test_put->disconnect_task = GNUNET_SCHEDULER_add_delayed(GNUNET_TIME_relative_get_forever(), &put_disconnect_task, test_put);
2014 rand = GNUNET_CRYPTO_random_u32(GNUNET_CRYPTO_QUALITY_WEAK, 2);
2015 GNUNET_SCHEDULER_add_delayed(GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, rand), &do_put, test_put->next);
2019 schedule_find_peer_requests (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc);
2022 setup_malicious_peers (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc);
2025 * Given a number of total peers and a bucket size, estimate the number of
2026 * connections in a perfect kademlia topology.
2028 static unsigned int connection_estimate(unsigned int peer_count, unsigned int bucket_size)
2031 unsigned int filled;
2035 while (i >= bucket_size)
2040 filled++; /* Add one filled bucket to account for one "half full" and some miscellaneous */
2041 return filled * bucket_size * peer_count;
2047 * Callback for iterating over all the peer connections of a peer group.
2050 count_peers_cb (void *cls,
2051 const struct GNUNET_PeerIdentity *first,
2052 const struct GNUNET_PeerIdentity *second,
2055 struct FindPeerContext *find_peer_context = cls;
2056 if ((first != NULL) && (second != NULL))
2058 add_new_connection(find_peer_context, first, second);
2059 find_peer_context->current_peers++;
2063 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Peer count finished (%u connections), %u new peers, connection estimate %u (target %u)\n",
2064 find_peer_context->current_peers,
2065 find_peer_context->current_peers - find_peer_context->previous_peers,
2066 connection_estimate(num_peers, DEFAULT_BUCKET_SIZE),
2067 target_total_connections);
2069 if ((find_peer_context->last_sent < 8) ||
2070 ((find_peer_context->current_peers - find_peer_context->previous_peers > FIND_PEER_THRESHOLD) &&
2071 (find_peer_context->current_peers < 2 * connection_estimate(num_peers, DEFAULT_BUCKET_SIZE)) &&
2072 (GNUNET_TIME_absolute_get_remaining(find_peer_context->endtime).rel_value > 0) &&
2073 (find_peer_context->current_peers < target_total_connections)))
2075 GNUNET_SCHEDULER_add_now(&schedule_find_peer_requests, find_peer_context);
2079 GNUNET_CONTAINER_multihashmap_iterate(find_peer_context->peer_hash, &remove_peer_count, find_peer_context);
2080 GNUNET_CONTAINER_multihashmap_destroy(find_peer_context->peer_hash);
2081 GNUNET_CONTAINER_heap_destroy(find_peer_context->peer_min_heap);
2082 GNUNET_free(find_peer_context);
2083 fprintf(stderr, "Not sending any more find peer requests.\n");
2086 if (GNUNET_YES == malicious_after_settle)
2088 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "calling setup_malicious_peers\n");
2089 GNUNET_SCHEDULER_add_now(&setup_malicious_peers, NULL);
2098 * Set up a single find peer request for each peer in the topology. Do this
2099 * until the settle time is over, limited by the number of outstanding requests
2100 * and the time allowed for each one!
2103 schedule_find_peer_requests (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
2105 struct FindPeerContext *find_peer_ctx = cls;
2106 struct TestFindPeer *test_find_peer;
2107 struct PeerCount *peer_count;
2111 if (find_peer_ctx->previous_peers == 0) /* First time, go slowly */
2112 find_peer_ctx->total = 1;
2113 else if (find_peer_ctx->current_peers - find_peer_ctx->previous_peers > MAX_FIND_PEER_CUTOFF) /* Found LOTS of peers, still go slowly */
2114 find_peer_ctx->total = find_peer_ctx->last_sent - (find_peer_ctx->last_sent / 8);
2116 find_peer_ctx->total = find_peer_ctx->last_sent * 2;
2118 if (find_peer_ctx->total > max_outstanding_find_peers)
2119 find_peer_ctx->total = max_outstanding_find_peers;
2121 if (find_peer_ctx->total > num_peers) /* Don't try to send more messages than we have peers! */
2122 find_peer_ctx->total = num_peers;
2124 find_peer_ctx->last_sent = find_peer_ctx->total;
2125 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Sending %u find peer messages (goal at least %u connections)\n", find_peer_ctx->total, target_total_connections);
2127 find_peer_offset = GNUNET_TIME_relative_divide(find_peer_delay, find_peer_ctx->total);
2128 for (i = 0; i < find_peer_ctx->total; i++)
2130 test_find_peer = GNUNET_malloc(sizeof(struct TestFindPeer));
2131 /* If we haven't sent any requests yet, choose random peers */
2132 /* Also choose random in _half_ of all cases, so we don't
2133 * get stuck choosing topologically restricted peers with
2134 * few connections that will never be able to find any new
2136 if ((find_peer_ctx->previous_peers == 0) || (i % 2 == 0))
2139 * Attempt to spread find peer requests across even sections of the peer address
2140 * space. Choose basically 1 peer in every num_peers / max_outstanding_requests
2141 * each time, then offset it by a randomish value.
2143 * For instance, if num_peers is 100 and max_outstanding is 10, first chosen peer
2144 * will be between 0 - 10, second between 10 - 20, etc.
2146 random = (num_peers / find_peer_ctx->total) * i;
2147 random = random + GNUNET_CRYPTO_random_u32(GNUNET_CRYPTO_QUALITY_WEAK, (num_peers / find_peer_ctx->total));
2148 if (random >= num_peers)
2150 random = random - num_peers;
2153 random = GNUNET_CRYPTO_random_u32(GNUNET_CRYPTO_QUALITY_WEAK, num_peers);
2155 test_find_peer->daemon = GNUNET_TESTING_daemon_get(pg, random);
2157 else /* If we have sent requests, choose peers with a low number of connections to send requests from */
2159 peer_count = GNUNET_CONTAINER_heap_remove_root(find_peer_ctx->peer_min_heap);
2160 GNUNET_assert(GNUNET_YES == GNUNET_CONTAINER_multihashmap_remove(find_peer_ctx->peer_hash, &peer_count->peer_id.hashPubKey, peer_count));
2161 test_find_peer->daemon = GNUNET_TESTING_daemon_get_by_id(pg, &peer_count->peer_id);
2162 GNUNET_assert(test_find_peer->daemon != NULL);
2165 test_find_peer->find_peer_context = find_peer_ctx;
2166 GNUNET_SCHEDULER_add_delayed(GNUNET_TIME_relative_multiply(find_peer_offset, i), &send_find_peer_request, test_find_peer);
2169 if ((find_peer_ctx->peer_hash == NULL) && (find_peer_ctx->peer_min_heap == NULL))
2171 find_peer_ctx->peer_hash = GNUNET_CONTAINER_multihashmap_create(num_peers);
2172 find_peer_ctx->peer_min_heap = GNUNET_CONTAINER_heap_create(GNUNET_CONTAINER_HEAP_ORDER_MIN);
2176 GNUNET_CONTAINER_multihashmap_iterate(find_peer_ctx->peer_hash, &remove_peer_count, find_peer_ctx);
2177 GNUNET_CONTAINER_multihashmap_destroy(find_peer_ctx->peer_hash);
2178 find_peer_ctx->peer_hash = GNUNET_CONTAINER_multihashmap_create(num_peers);
2181 GNUNET_assert(0 == GNUNET_CONTAINER_multihashmap_size(find_peer_ctx->peer_hash));
2182 GNUNET_assert(0 == GNUNET_CONTAINER_heap_get_size(find_peer_ctx->peer_min_heap));
2187 * Convert unique ID to hash code.
2189 * @param uid unique ID to convert
2190 * @param hash set to uid (extended with zeros)
2193 hash_from_uid (uint32_t uid, GNUNET_HashCode *hash)
2195 memset (hash, 0, sizeof (GNUNET_HashCode));
2196 *((uint32_t *) hash) = uid;
2201 * Set up all of the put and get operations we want to do
2202 * in the current round. Allocate data structure for each,
2203 * add to list, then schedule the actual PUT operations.
2206 setup_puts_and_gets (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
2209 struct TestPutContext *test_put;
2210 struct TestGetContext *test_get;
2212 GNUNET_HashCode uid_hash;
2215 int remember[num_puts][num_peers];
2216 memset(&remember, 0, sizeof(int) * num_puts * num_peers);
2218 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "in setup_puts_and_gets\n");
2219 known_keys = GNUNET_malloc(sizeof(GNUNET_HashCode) * num_puts);
2220 for (i = 0; i < num_puts; i++)
2222 test_put = GNUNET_malloc(sizeof(struct TestPutContext));
2224 GNUNET_CRYPTO_hash_create_random (GNUNET_CRYPTO_QUALITY_WEAK, &known_keys[i]);
2225 /* Set first X bits to match the chosen sybil location if we want to do the sybil attack! */
2226 if (GNUNET_YES == malicious_sybil)
2228 memcpy(&known_keys[i], &sybil_target, sizeof(GNUNET_HashCode) / 2);
2229 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Distance between sybil location and key is %d\n", GNUNET_CRYPTO_hash_matching_bits(&known_keys[i], &sybil_target));
2231 temp_peer = GNUNET_CRYPTO_random_u32(GNUNET_CRYPTO_QUALITY_WEAK, num_peers);
2232 test_put->daemon = GNUNET_TESTING_daemon_get(pg, temp_peer);
2233 /* Don't start PUTs at malicious peers! */
2234 if (malicious_bloom != NULL)
2237 hash_from_uid(temp_peer, &uid_hash);
2238 while ((GNUNET_YES == GNUNET_CONTAINER_bloomfilter_test(malicious_bloom, &uid_hash)) && (count < num_peers))
2240 temp_peer = GNUNET_CRYPTO_random_u32(GNUNET_CRYPTO_QUALITY_WEAK, num_peers);
2241 hash_from_uid(temp_peer, &uid_hash);
2242 test_put->daemon = GNUNET_TESTING_daemon_get(pg, temp_peer);
2245 if (count == num_peers)
2246 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Couldn't find peer not in malicious bloom to select!\n");
2249 test_put->next = all_puts;
2250 all_puts = test_put;
2253 for (i = 0; i < num_gets; i++)
2255 test_get = GNUNET_malloc(sizeof(struct TestGetContext));
2256 test_get->uid = GNUNET_CRYPTO_random_u32(GNUNET_CRYPTO_QUALITY_WEAK, num_puts);
2258 while (remember[test_get->uid][temp_daemon] == 1)
2259 temp_daemon = GNUNET_CRYPTO_random_u32(GNUNET_CRYPTO_QUALITY_WEAK, num_peers);
2260 remember[test_get->uid][temp_daemon] = 1;
2262 temp_peer = GNUNET_CRYPTO_random_u32(GNUNET_CRYPTO_QUALITY_WEAK, num_peers);
2263 test_get->daemon = GNUNET_TESTING_daemon_get(pg, temp_peer);
2264 /* Don't start GETs at malicious peers! */
2265 if (malicious_bloom != NULL)
2267 hash_from_uid(temp_peer, &uid_hash);
2269 while ((GNUNET_YES == GNUNET_CONTAINER_bloomfilter_test(malicious_bloom, &uid_hash)) && (count < num_peers))
2271 temp_peer = GNUNET_CRYPTO_random_u32(GNUNET_CRYPTO_QUALITY_WEAK, num_peers);
2272 hash_from_uid(temp_peer, &uid_hash);
2273 test_get->daemon = GNUNET_TESTING_daemon_get(pg, temp_peer);
2276 if (count == num_peers)
2277 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Couldn't find peer not in malicious bloom to select!\n");
2279 test_get->next = all_gets;
2280 all_gets = test_get;
2283 /*GNUNET_SCHEDULER_cancel (die_task);*/
2284 die_task = GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, num_puts * 2),
2285 &end_badly, "from do puts");
2286 GNUNET_SCHEDULER_add_now (&do_put, all_puts);
2291 * Set up some all of the put and get operations we want
2292 * to do. Allocate data structure for each, add to list,
2293 * then call actual insert functions.
2296 continue_puts_and_gets (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
2300 struct TopologyIteratorContext *topo_ctx;
2301 struct FindPeerContext *find_peer_context;
2302 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "In continue_puts_and_gets\n");
2303 if ((dhtlog_handle != NULL) && (GNUNET_NO == dhtlog_minimal))
2305 if (settle_time >= 180 * 2)
2306 max = (settle_time / 180) - 2;
2309 for (i = 1; i < max; i++)
2311 topo_ctx = GNUNET_malloc(sizeof(struct TopologyIteratorContext));
2312 topo_ctx->current_iteration = i;
2313 topo_ctx->total_iterations = max;
2314 topo_ctx->peers_seen = GNUNET_CONTAINER_multihashmap_create(num_peers);
2315 //fprintf(stderr, "scheduled topology iteration in %d minutes\n", i);
2316 GNUNET_SCHEDULER_add_delayed(GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_MINUTES, i * 3), &capture_current_topology, topo_ctx);
2318 topo_ctx = GNUNET_malloc(sizeof(struct TopologyIteratorContext));
2319 topo_ctx->cont = &setup_puts_and_gets;
2320 topo_ctx->peers_seen = GNUNET_CONTAINER_multihashmap_create(num_peers);
2321 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "setting setup_puts_and_gets for %d seconds in the future\n", settle_time + 10);
2322 GNUNET_SCHEDULER_add_delayed(GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, (settle_time + 10)), &capture_current_topology, topo_ctx);
2325 GNUNET_SCHEDULER_add_delayed(GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, (settle_time + 10)), &setup_puts_and_gets, NULL);
2327 if (dhtlog_handle != NULL)
2328 dhtlog_handle->insert_round(DHT_ROUND_NORMAL, rounds_finished);
2331 if ((GNUNET_YES != malicious_after_settle) || (settle_time == 0))
2333 GNUNET_SCHEDULER_add_now(&setup_malicious_peers, NULL);
2337 if ((GNUNET_YES == do_find_peer) && (settle_time > 0))
2339 GNUNET_log(GNUNET_ERROR_TYPE_DEBUG, "Scheduling find peer requests during \"settle\" time.\n");
2340 find_peer_context = GNUNET_malloc(sizeof(struct FindPeerContext));
2341 find_peer_context->count_peers_cb = &count_peers_cb;
2342 find_peer_context->endtime = GNUNET_TIME_relative_to_absolute(GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, settle_time));
2343 GNUNET_SCHEDULER_add_now(&schedule_find_peer_requests, find_peer_context);
2347 GNUNET_log(GNUNET_ERROR_TYPE_DEBUG, "Assuming automatic DHT find peer requests.\n");
2352 * Task to release DHT handles
2355 malicious_disconnect_task (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
2357 struct MaliciousContext *ctx = cls;
2358 outstanding_malicious--;
2359 malicious_completed++;
2360 ctx->disconnect_task = GNUNET_SCHEDULER_NO_TASK;
2361 GNUNET_DHT_disconnect(ctx->dht_handle);
2362 ctx->dht_handle = NULL;
2365 if (malicious_completed == malicious_getters + malicious_putters + malicious_droppers)
2367 fprintf(stderr, "Finished setting all malicious peers up!\n");
2373 * Task to release DHT handles
2376 malicious_done_task (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
2378 struct MaliciousContext *ctx = cls;
2379 GNUNET_SCHEDULER_cancel(ctx->disconnect_task);
2380 GNUNET_SCHEDULER_add_now(&malicious_disconnect_task, ctx);
2384 * Set up some data, and call API PUT function
2387 set_malicious (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
2389 struct MaliciousContext *ctx = cls;
2391 if (outstanding_malicious > DEFAULT_MAX_OUTSTANDING_GETS)
2393 GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_MILLISECONDS, 100), &set_malicious, ctx);
2397 if (ctx->dht_handle == NULL)
2399 ctx->dht_handle = GNUNET_DHT_connect(ctx->daemon->cfg, 1);
2400 outstanding_malicious++;
2403 GNUNET_assert(ctx->dht_handle != NULL);
2407 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Setting peer %s malicious type %d\n",
2408 ctx->daemon->shortname, ctx->malicious_type);
2411 switch (ctx->malicious_type)
2413 case GNUNET_MESSAGE_TYPE_DHT_MALICIOUS_GET:
2414 GNUNET_DHT_set_malicious_getter(ctx->dht_handle, malicious_get_frequency);
2415 GNUNET_SCHEDULER_add_now (&malicious_done_task, ctx);
2417 case GNUNET_MESSAGE_TYPE_DHT_MALICIOUS_PUT:
2418 GNUNET_DHT_set_malicious_putter(ctx->dht_handle, malicious_put_frequency);
2419 GNUNET_SCHEDULER_add_now (&malicious_done_task, ctx);
2421 case GNUNET_MESSAGE_TYPE_DHT_MALICIOUS_DROP:
2422 GNUNET_DHT_set_malicious_dropper(ctx->dht_handle);
2423 GNUNET_SCHEDULER_add_now (&malicious_done_task, ctx);
2429 ctx->disconnect_task = GNUNET_SCHEDULER_add_delayed(GNUNET_TIME_UNIT_FOREVER_REL,
2430 &malicious_disconnect_task, ctx);
2436 * Choose the next peer from the peer group to set as malicious.
2437 * If we are doing a sybil attack, find the nearest peer to the
2438 * sybil location that has not already been set malicious. Otherwise
2439 * just choose a random not already chosen peer.
2441 * @param pg the peer group
2442 * @param bloom the bloomfilter which contains all peer already
2443 * chosen to be malicious
2446 choose_next_malicious (struct GNUNET_TESTING_PeerGroup *pg, struct GNUNET_CONTAINER_BloomFilter *bloom)
2453 struct GNUNET_TESTING_Daemon *temp_daemon;
2454 GNUNET_HashCode uid_hash;
2458 GNUNET_assert (bloom != NULL);
2460 if (GNUNET_YES == malicious_sybil)
2462 for (i = 0; i < num_peers; i++)
2464 temp_daemon = GNUNET_TESTING_daemon_get(pg, i);
2465 hash_from_uid(i, &uid_hash);
2466 /* Check if this peer matches the bloomfilter */
2467 if ((GNUNET_NO == GNUNET_TESTING_daemon_running(temp_daemon)) || (GNUNET_YES == GNUNET_CONTAINER_bloomfilter_test (bloom, &uid_hash)))
2470 bits_match = GNUNET_CRYPTO_hash_matching_bits (&temp_daemon->id.hashPubKey, &sybil_target);
2471 if (bits_match >= curr_distance)
2473 GNUNET_log(GNUNET_ERROR_TYPE_DEBUG, "Found nearer peer %s to %s, old matching bits %d, new %d\n", GNUNET_i2s(&temp_daemon->id), GNUNET_h2s(&sybil_target), curr_distance, bits_match);
2475 curr_distance = bits_match;
2481 nearest = GNUNET_CRYPTO_random_u32(GNUNET_CRYPTO_QUALITY_WEAK, num_peers);
2482 hash_from_uid(nearest, &uid_hash);
2484 while ((GNUNET_YES == GNUNET_CONTAINER_bloomfilter_test (bloom, &uid_hash)) && (count < num_peers))
2486 GNUNET_log(GNUNET_ERROR_TYPE_DEBUG, "Peer %d already in bloom (tried %d times)\n", nearest, count);
2487 nearest = GNUNET_CRYPTO_random_u32(GNUNET_CRYPTO_QUALITY_WEAK, num_peers);
2488 hash_from_uid(nearest, &uid_hash);
2491 if (count == num_peers)
2492 GNUNET_log(GNUNET_ERROR_TYPE_DEBUG, "Tried %d times to find a peer, selecting %d at random!!\n", count, nearest);
2499 * Select randomly from set of known peers,
2500 * set the desired number of peers to the
2501 * proper malicious types.
2504 setup_malicious_peers (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
2506 struct MaliciousContext *ctx;
2508 uint32_t temp_daemon;
2509 GNUNET_HashCode uid_hash;
2511 for (i = 0; i < malicious_getters; i++)
2513 ctx = GNUNET_malloc(sizeof(struct MaliciousContext));
2514 temp_daemon = choose_next_malicious(pg, malicious_bloom);
2515 ctx->daemon = GNUNET_TESTING_daemon_get(pg, temp_daemon);
2516 hash_from_uid(temp_daemon, &uid_hash);
2517 GNUNET_CONTAINER_bloomfilter_add(malicious_bloom, &uid_hash);
2518 ctx->malicious_type = GNUNET_MESSAGE_TYPE_DHT_MALICIOUS_GET;
2519 GNUNET_SCHEDULER_add_now (&set_malicious, ctx);
2523 for (i = 0; i < malicious_putters; i++)
2525 ctx = GNUNET_malloc(sizeof(struct MaliciousContext));
2526 temp_daemon = choose_next_malicious(pg, malicious_bloom);
2527 ctx->daemon = GNUNET_TESTING_daemon_get(pg, temp_daemon);
2528 hash_from_uid(temp_daemon, &uid_hash);
2529 GNUNET_CONTAINER_bloomfilter_add(malicious_bloom, &uid_hash);
2530 ctx->malicious_type = GNUNET_MESSAGE_TYPE_DHT_MALICIOUS_PUT;
2531 GNUNET_SCHEDULER_add_now (&set_malicious, ctx);
2535 for (i = 0; i < malicious_droppers; i++)
2537 ctx = GNUNET_malloc(sizeof(struct MaliciousContext));
2538 temp_daemon = choose_next_malicious(pg, malicious_bloom);
2539 ctx->daemon = GNUNET_TESTING_daemon_get(pg, temp_daemon);
2540 hash_from_uid(temp_daemon, &uid_hash);
2541 GNUNET_CONTAINER_bloomfilter_add(malicious_bloom, &uid_hash);
2542 ctx->malicious_type = GNUNET_MESSAGE_TYPE_DHT_MALICIOUS_DROP;
2543 GNUNET_SCHEDULER_add_now (&set_malicious, ctx);
2549 /* Forward declaration */
2551 topology_callback (void *cls,
2552 const struct GNUNET_PeerIdentity *first,
2553 const struct GNUNET_PeerIdentity *second,
2555 const struct GNUNET_CONFIGURATION_Handle *first_cfg,
2556 const struct GNUNET_CONFIGURATION_Handle *second_cfg,
2557 struct GNUNET_TESTING_Daemon *first_daemon,
2558 struct GNUNET_TESTING_Daemon *second_daemon,
2562 * Retry connecting two specific peers until they connect,
2563 * at a specific interval. These two peers previously failed
2564 * to connect, and we hope they continue to so that we can
2565 * debug the reason they are having issues.
2568 repeat_connect (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
2571 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Repeating connect attempt between %s and %s.\n", repeat_connect_peer1->shortname, repeat_connect_peer2->shortname);
2572 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Peer 1 configuration `%s'\n", repeat_connect_peer1->cfgfile);
2573 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Peer 2 configuration `%s'\n", repeat_connect_peer2->cfgfile);
2575 repeat_connect_task = GNUNET_SCHEDULER_NO_TASK;
2576 GNUNET_TESTING_daemons_connect(repeat_connect_peer1,
2577 repeat_connect_peer2,
2578 GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, 60),
2579 2, &topology_callback, NULL);
2584 * This function is called whenever a connection attempt is finished between two of
2585 * the started peers (started with GNUNET_TESTING_daemons_start). The total
2586 * number of times this function is called should equal the number returned
2587 * from the GNUNET_TESTING_connect_topology call.
2589 * The emsg variable is NULL on success (peers connected), and non-NULL on
2590 * failure (peers failed to connect).
2593 topology_callback (void *cls,
2594 const struct GNUNET_PeerIdentity *first,
2595 const struct GNUNET_PeerIdentity *second,
2597 const struct GNUNET_CONFIGURATION_Handle *first_cfg,
2598 const struct GNUNET_CONFIGURATION_Handle *second_cfg,
2599 struct GNUNET_TESTING_Daemon *first_daemon,
2600 struct GNUNET_TESTING_Daemon *second_daemon,
2603 struct TopologyIteratorContext *topo_ctx;
2604 unsigned long long duration;
2605 unsigned long long total_duration;
2606 unsigned int new_connections;
2607 unsigned int new_failed_connections;
2608 double conns_per_sec_recent;
2609 double conns_per_sec_total;
2610 double failed_conns_per_sec_recent;
2611 double failed_conns_per_sec_total;
2614 if (repeat_connect_mode == GNUNET_YES)
2616 if ((first_daemon == repeat_connect_peer1) &&
2617 (second_daemon == repeat_connect_peer2))
2619 if (emsg != NULL) /* Peers failed to connect again! */
2621 else /* Repeat peers actually connected! */
2623 if (repeat_connect_task != GNUNET_SCHEDULER_NO_TASK)
2624 GNUNET_SCHEDULER_cancel(repeat_connect_task);
2625 repeat_connect_peer1 = NULL;
2626 repeat_connect_peer2 = NULL;
2627 repeat_connect_mode = GNUNET_NO;
2628 GNUNET_TESTING_resume_connections(pg);
2629 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Resuming normal connection mode, debug connection was successful!\n");
2635 if (GNUNET_TIME_absolute_get_difference (connect_last_time,
2636 GNUNET_TIME_absolute_get()).rel_value > GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, CONN_UPDATE_DURATION).rel_value)
2638 /* Get number of new connections */
2639 new_connections = total_connections - previous_connections;
2641 /* Get number of new FAILED connections */
2642 new_failed_connections = failed_connections - previous_failed_connections;
2644 /* Get duration in seconds */
2645 duration = GNUNET_TIME_absolute_get_difference (connect_last_time,
2646 GNUNET_TIME_absolute_get()).rel_value / 1000;
2647 total_duration = GNUNET_TIME_absolute_get_difference (connect_start_time,
2648 GNUNET_TIME_absolute_get()).rel_value / 1000;
2650 failed_conns_per_sec_recent = (double)new_failed_connections / duration;
2651 failed_conns_per_sec_total = (double)failed_connections / total_duration;
2652 conns_per_sec_recent = (double)new_connections / duration;
2653 conns_per_sec_total = (double)total_connections / total_duration;
2654 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Recent: %.2f/s, Total: %.2f/s, Recent failed: %.2f/s, total failed %.2f/s\n",
2655 conns_per_sec_recent, CONN_UPDATE_DURATION, conns_per_sec_total,
2656 failed_conns_per_sec_recent, failed_conns_per_sec_total);
2657 connect_last_time = GNUNET_TIME_absolute_get();
2658 previous_connections = total_connections;
2659 previous_failed_connections = failed_connections;
2660 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "have %u total_connections, %u failed\n", total_connections, failed_connections);
2662 /* These conditions likely mean we've entered the death spiral of doom */
2663 if ((total_connections > 20000) &&
2664 (conns_per_sec_recent < 5.0) &&
2665 (conns_per_sec_total > 10.0) &&
2667 (repeat_connect_mode == GNUNET_NO))
2669 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Entering repeat connection attempt mode!\n");
2670 repeat_connect_peer1 = first_daemon;
2671 repeat_connect_peer2 = second_daemon;
2672 repeat_connect_mode = GNUNET_YES;
2673 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Stopping NEW connections from being scheduled!\n");
2674 GNUNET_TESTING_stop_connections(pg);
2675 repeat_connect_task = GNUNET_SCHEDULER_add_delayed(GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, 60), &repeat_connect, NULL);
2680 else if (repeat_connect_mode == GNUNET_YES)
2682 repeat_connect_task = GNUNET_SCHEDULER_add_delayed(GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, 60), &repeat_connect, NULL);
2688 total_connections++;
2690 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "connected peer %s to peer %s, distance %u\n",
2691 first_daemon->shortname,
2692 second_daemon->shortname,
2698 failed_connections++;
2700 GNUNET_log (GNUNET_ERROR_TYPE_WARNING, "Failed to connect peer %s to peer %s with error :\n%s\n",
2701 first_daemon->shortname,
2702 second_daemon->shortname, emsg);
2704 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Failed to connect peer %s to peer %s with error :\n%s\n",
2705 first_daemon->shortname,
2706 second_daemon->shortname, emsg);
2711 if (repeat_connect_mode == GNUNET_YES)
2715 GNUNET_assert(peer_connect_meter != NULL);
2716 if (GNUNET_YES == update_meter(peer_connect_meter))
2719 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
2720 "Created %d total connections, which is our target number! Starting next phase of testing.\n",
2723 if (failed_connections > 0)
2724 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "While connecting, had %u failed connections.\n", failed_connections);
2725 if (dhtlog_handle != NULL)
2727 dhtlog_handle->update_connections (total_connections);
2728 dhtlog_handle->insert_topology(expected_connections);
2731 GNUNET_SCHEDULER_cancel (die_task);
2733 if ((GNUNET_YES == dhtlog_minimal) && (NULL != dhtlog_handle))
2735 topo_ctx = GNUNET_malloc(sizeof(struct TopologyIteratorContext));
2736 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Setting continue gets and puts as topo_cont\n");
2737 topo_ctx->cont = &continue_puts_and_gets;
2738 topo_ctx->peers_seen = GNUNET_CONTAINER_multihashmap_create(num_peers);
2739 GNUNET_SCHEDULER_add_now(&capture_current_topology, topo_ctx);
2743 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "For some reason, NOT scheduling final topology capture (settle_time %d, dhtlog_handle %s)!\n", settle_time, dhtlog_handle);
2744 GNUNET_SCHEDULER_add_now(&continue_puts_and_gets, NULL);
2747 else if (total_connections + failed_connections == expected_connections)
2749 GNUNET_SCHEDULER_cancel (die_task);
2750 die_task = GNUNET_SCHEDULER_add_now (&end_badly, "from topology_callback (too many failed connections)");
2755 peers_started_callback (void *cls,
2756 const struct GNUNET_PeerIdentity *id,
2757 const struct GNUNET_CONFIGURATION_Handle *cfg,
2758 struct GNUNET_TESTING_Daemon *d, const char *emsg)
2762 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Failed to start daemon with error: `%s'\n",
2766 GNUNET_assert (id != NULL);
2769 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Started daemon %llu out of %llu\n",
2770 (num_peers - peers_left) + 1, num_peers);
2775 if (GNUNET_YES == update_meter(peer_start_meter))
2778 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
2779 "All %d daemons started, now connecting peers!\n",
2782 GNUNET_SCHEDULER_cancel (die_task);
2784 expected_connections = UINT_MAX;
2785 if ((pg != NULL) && (peers_left == 0))
2787 connect_start_time = GNUNET_TIME_absolute_get();
2788 expected_connections = GNUNET_TESTING_connect_topology(pg,
2789 connect_topology, connect_topology_option,
2790 connect_topology_option_modifier,
2791 connect_timeout, connect_attempts,
2794 peer_connect_meter = create_meter(expected_connections, "Peer connection ", GNUNET_YES);
2795 fprintf(stderr, "Have %d expected connections\n", expected_connections);
2798 if (expected_connections == GNUNET_SYSERR)
2800 die_task = GNUNET_SCHEDULER_add_now (&end_badly, "from connect topology (bad return)");
2803 die_task = GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, DEFAULT_CONNECT_TIMEOUT * expected_connections),
2804 &end_badly, "from connect topology (timeout)");
2813 peers_left = num_peers; /* Reset counter */
2814 if (GNUNET_TESTING_create_topology (pg, topology, blacklist_topology, blacklist_transports) != GNUNET_SYSERR)
2816 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
2817 "Topology set up, now starting peers!\n");
2818 GNUNET_TESTING_daemons_continue_startup(pg);
2822 GNUNET_SCHEDULER_cancel (die_task);
2823 die_task = GNUNET_SCHEDULER_add_now (&end_badly, "from create topology (bad return)");
2825 GNUNET_free_non_null(blacklist_transports);
2826 GNUNET_SCHEDULER_cancel (die_task);
2827 die_task = GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_relative_multiply(seconds_per_peer_start, num_peers),
2828 &end_badly, "from continue startup (timeout)");
2832 * Callback indicating that the hostkey was created for a peer.
2835 * @param id the peer identity
2836 * @param d the daemon handle (pretty useless at this point, remove?)
2837 * @param emsg non-null on failure
2840 hostkey_callback (void *cls,
2841 const struct GNUNET_PeerIdentity *id,
2842 struct GNUNET_TESTING_Daemon *d,
2847 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Hostkey callback received error: %s\n", emsg);
2851 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
2852 "Hostkey (%d/%d) created for peer `%s'\n",
2853 num_peers - peers_left, num_peers, GNUNET_i2s(id));
2857 if (GNUNET_YES == update_meter(hostkey_meter))
2859 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
2860 "All %d hostkeys created, now creating topology!\n",
2862 GNUNET_SCHEDULER_cancel (die_task);
2863 /* Set up task in case topology creation doesn't finish
2864 * within a reasonable amount of time */
2865 die_task = GNUNET_SCHEDULER_add_delayed (DEFAULT_TOPOLOGY_TIMEOUT,
2866 &end_badly, "from create_topology");
2867 GNUNET_SCHEDULER_add_now(&create_topology, NULL);
2876 const char *cfgfile, const struct GNUNET_CONFIGURATION_Handle *cfg)
2879 struct GNUNET_DHTLOG_TrialInfo trial_info;
2880 struct GNUNET_TESTING_Host *hosts;
2881 struct GNUNET_TESTING_Host *temphost;
2882 struct GNUNET_TESTING_Host *tempnext;
2884 char *connect_topology_str;
2885 char *blacklist_topology_str;
2886 char *connect_topology_option_str;
2887 char *connect_topology_option_modifier_string;
2889 char *topology_percentage_str;
2890 float topology_percentage;
2891 char *topology_probability_str;
2893 float topology_probability;
2894 unsigned long long temp_config_number;
2895 unsigned long long trial_to_run;
2898 int strict_kademlia;
2902 char *churn_filename;
2909 rounds_finished = 0;
2910 memset(&trial_info, 0, sizeof(struct GNUNET_DHTLOG_TrialInfo));
2911 /* Get path from configuration file */
2912 if (GNUNET_YES != GNUNET_CONFIGURATION_get_value_string(cfg, "paths", "servicehome", &test_directory))
2918 /* Get number of peers to start from configuration */
2919 if (GNUNET_SYSERR ==
2920 GNUNET_CONFIGURATION_get_value_number (cfg, "testing", "num_peers",
2923 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
2924 "Number of peers must be specified in section %s option %s\n", "TESTING", "NUM_PEERS");
2926 GNUNET_assert(num_peers > 0 && num_peers < ULONG_MAX);
2929 GNUNET_CONFIGURATION_get_value_number (cfg, "testing", "connect_timeout",
2930 &temp_config_number))
2932 GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_SECONDS, temp_config_number);
2935 GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "Must provide option %s:%s!\n", "testing", "connect_timeout");
2941 GNUNET_CONFIGURATION_get_value_number (cfg, "testing", "connect_attempts",
2944 GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "Must provide option %s:%s!\n", "testing", "connect_attempts");
2949 GNUNET_CONFIGURATION_get_value_number (cfg, "testing", "max_outstanding_connections",
2950 &max_outstanding_connections))
2952 GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "Must provide option %s:%s!\n", "testing", "max_outstanding_connections");
2957 GNUNET_CONFIGURATION_get_value_number (cfg, "testing", "max_concurrent_ssh",
2958 &max_concurrent_ssh))
2960 GNUNET_log(GNUNET_ERROR_TYPE_ERROR, "Must provide option %s:%s!\n", "testing", "max_concurrent_ssh");
2965 * Get DHT specific testing options.
2967 if ((GNUNET_YES == GNUNET_CONFIGURATION_get_value_yesno(cfg, "dht_testing", "mysql_logging")) ||
2968 (GNUNET_YES == GNUNET_CONFIGURATION_get_value_yesno(cfg, "dht_testing", "mysql_logging_extended")) ||
2969 (GNUNET_YES == GNUNET_CONFIGURATION_get_value_yesno(cfg, "dht_testing", "mysql_logging_minimal")))
2971 if (GNUNET_YES == GNUNET_CONFIGURATION_get_value_yesno(cfg, "dht_testing", "mysql_logging_minimal"))
2972 dhtlog_minimal = GNUNET_YES;
2974 dhtlog_handle = GNUNET_DHTLOG_connect(cfg);
2975 if (dhtlog_handle == NULL)
2977 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
2978 "Could not connect to mysql server for logging, will NOT log dht operations!");
2984 stop_closest = GNUNET_CONFIGURATION_get_value_yesno(cfg, "dht", "stop_on_closest");
2985 if (stop_closest == GNUNET_SYSERR)
2986 stop_closest = GNUNET_NO;
2988 stop_found = GNUNET_CONFIGURATION_get_value_yesno(cfg, "dht", "stop_found");
2989 if (stop_found == GNUNET_SYSERR)
2990 stop_found = GNUNET_NO;
2992 strict_kademlia = GNUNET_CONFIGURATION_get_value_yesno(cfg, "dht", "strict_kademlia");
2993 if (strict_kademlia == GNUNET_SYSERR)
2994 strict_kademlia = GNUNET_NO;
2997 GNUNET_CONFIGURATION_get_value_string (cfg, "dht_testing", "comment",
2999 trialmessage = NULL;
3002 /** Check for a churn file to do churny simulation */
3004 GNUNET_CONFIGURATION_get_value_string(cfg, "dht_testing", "churn_file",
3007 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Reading churn data from %s\n", churn_filename);
3008 if (GNUNET_OK != GNUNET_DISK_file_test (churn_filename))
3010 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Error reading churn file!\n");
3011 GNUNET_free_non_null(trialmessage);
3012 GNUNET_free(churn_filename);
3015 if ((0 != STAT (churn_filename, &frstat)) || (frstat.st_size == 0))
3017 GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
3018 "Could not open file specified for churn data, ending test!");
3020 GNUNET_free_non_null(trialmessage);
3021 GNUNET_free(churn_filename);
3025 churn_data = GNUNET_malloc_large (frstat.st_size);
3026 GNUNET_assert(churn_data != NULL);
3027 if (frstat.st_size !=
3028 GNUNET_DISK_fn_read (churn_filename, churn_data, frstat.st_size))
3030 GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
3031 "Could not read file %s specified for churn, ending test!", churn_filename);
3032 GNUNET_free (churn_filename);
3033 GNUNET_free (churn_data);
3034 GNUNET_free_non_null(trialmessage);
3038 GNUNET_free_non_null(churn_filename);
3042 /* Read the first line */
3043 while (count < frstat.st_size)
3046 if (((churn_data[count] == '\n')) && (buf != &churn_data[count]))
3048 churn_data[count] = '\0';
3049 if (1 != sscanf(buf, "%u", &churn_rounds))
3051 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Failed to read number of rounds from churn file, ending test!\n");
3053 GNUNET_free_non_null(trialmessage);
3054 GNUNET_free_non_null(churn_data);
3057 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Read %u rounds from churn file\n", churn_rounds);
3058 buf = &churn_data[count + 1];
3059 churn_array = GNUNET_malloc(sizeof(unsigned int) * churn_rounds);
3060 break; /* Done with this part */
3064 if (GNUNET_OK != GNUNET_CONFIGURATION_get_value_number(cfg, "dht_testing", "churns_per_round", &churns_per_round))
3066 churns_per_round = (unsigned long long)churn_rounds;
3070 while ((count < frstat.st_size) && (line_number < churn_rounds))
3073 if (((churn_data[count] == '\n')) && (buf != &churn_data[count]))
3075 churn_data[count] = '\0';
3077 ret = sscanf(buf, "%u", &churn_array[line_number]);
3080 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Read %u peers in round %u\n", churn_array[line_number], line_number);
3085 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Error reading line `%s' in hostfile\n", buf);
3086 buf = &churn_data[count + 1];
3089 buf = &churn_data[count + 1];
3091 else if (churn_data[count] == '\n') /* Blank line */
3092 buf = &churn_data[count + 1];
3095 GNUNET_free_non_null(churn_data);
3097 /* Check for a hostfile containing user@host:port triples */
3099 GNUNET_CONFIGURATION_get_value_string (cfg, "testing", "hostfile",
3106 if (hostfile != NULL)
3108 if (GNUNET_OK != GNUNET_DISK_file_test (hostfile))
3109 GNUNET_DISK_fn_write (hostfile, NULL, 0, GNUNET_DISK_PERM_USER_READ
3110 | GNUNET_DISK_PERM_USER_WRITE);
3111 if ((0 != STAT (hostfile, &frstat)) || (frstat.st_size == 0))
3113 GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
3114 "Could not open file specified for host list, ending test!");
3116 GNUNET_free_non_null(trialmessage);
3117 GNUNET_free(hostfile);
3121 data = GNUNET_malloc_large (frstat.st_size);
3122 GNUNET_assert(data != NULL);
3123 if (frstat.st_size !=
3124 GNUNET_DISK_fn_read (hostfile, data, frstat.st_size))
3126 GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
3127 "Could not read file %s specified for host list, ending test!", hostfile);
3128 GNUNET_free (hostfile);
3130 GNUNET_free_non_null(trialmessage);
3134 GNUNET_free_non_null(hostfile);
3138 while (count < frstat.st_size - 1)
3141 /* if (((data[count] == '\n') || (data[count] == '\0')) && (buf != &data[count]))*/
3142 if (((data[count] == '\n')) && (buf != &data[count]))
3145 temphost = GNUNET_malloc(sizeof(struct GNUNET_TESTING_Host));
3146 ret = sscanf(buf, "%a[a-zA-Z0-9_]@%a[a-zA-Z0-9.]:%hd", &temphost->username, &temphost->hostname, &temphost->port);
3149 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Successfully read host %s, port %d and user %s from file\n", temphost->hostname, temphost->port, temphost->username);
3153 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Error reading line `%s' in hostfile\n", buf);
3154 GNUNET_free(temphost);
3155 buf = &data[count + 1];
3158 /* temphost->hostname = buf; */
3159 temphost->next = hosts;
3161 buf = &data[count + 1];
3163 else if ((data[count] == '\n') || (data[count] == '\0'))
3164 buf = &data[count + 1];
3167 GNUNET_free_non_null(data);
3169 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "malicious_getters",
3170 &malicious_getters))
3171 malicious_getters = 0;
3174 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "malicious_putters",
3175 &malicious_putters))
3176 malicious_putters = 0;
3179 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "malicious_droppers",
3180 &malicious_droppers))
3181 malicious_droppers = 0;
3184 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "settle_time",
3188 if (GNUNET_SYSERR ==
3189 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "num_puts",
3191 num_puts = num_peers;
3193 if (GNUNET_SYSERR ==
3194 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "put_replication",
3196 put_replication = DEFAULT_PUT_REPLICATION;
3198 if (GNUNET_SYSERR ==
3199 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "num_gets",
3201 num_gets = num_peers;
3203 if (GNUNET_SYSERR ==
3204 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "get_replication",
3206 get_replication = DEFAULT_GET_REPLICATION;
3209 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "find_peer_delay",
3210 &temp_config_number))
3211 find_peer_delay = GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, temp_config_number);
3213 find_peer_delay = DEFAULT_FIND_PEER_DELAY;
3216 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "concurrent_find_peers",
3217 &temp_config_number))
3218 max_outstanding_find_peers = temp_config_number;
3220 max_outstanding_find_peers = DEFAULT_MAX_OUTSTANDING_FIND_PEERS;
3223 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "get_timeout",
3224 &temp_config_number))
3225 get_timeout = GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, temp_config_number);
3227 get_timeout = DEFAULT_GET_TIMEOUT;
3230 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "concurrent_puts",
3231 &temp_config_number))
3232 max_outstanding_puts = temp_config_number;
3234 max_outstanding_puts = DEFAULT_MAX_OUTSTANDING_PUTS;
3237 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "concurrent_gets",
3238 &temp_config_number))
3239 max_outstanding_gets = temp_config_number;
3241 max_outstanding_gets = DEFAULT_MAX_OUTSTANDING_GETS;
3244 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "timeout",
3245 &temp_config_number))
3246 all_get_timeout = GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, temp_config_number);
3248 all_get_timeout.rel_value = get_timeout.rel_value * num_gets;
3251 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "get_delay",
3252 &temp_config_number))
3253 get_delay = GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, temp_config_number);
3255 get_delay = DEFAULT_GET_DELAY;
3258 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "put_delay",
3259 &temp_config_number))
3260 put_delay = GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, temp_config_number);
3262 put_delay = DEFAULT_PUT_DELAY;
3265 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "peer_start_timeout",
3266 &temp_config_number))
3267 seconds_per_peer_start = GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, temp_config_number);
3269 seconds_per_peer_start = DEFAULT_SECONDS_PER_PEER_START;
3272 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "data_size",
3273 &temp_config_number))
3274 test_data_size = temp_config_number;
3276 test_data_size = DEFAULT_TEST_DATA_SIZE;
3279 * Get testing related options.
3281 if (GNUNET_YES == GNUNET_CONFIGURATION_get_value_yesno(cfg, "DHT_TESTING", "REPLICATE_SAME"))
3282 replicate_same = GNUNET_YES;
3285 * Get testing related options.
3287 if (GNUNET_YES == GNUNET_CONFIGURATION_get_value_yesno(cfg, "DHT_TESTING", "GET_FROM_SAME"))
3288 get_from_same = GNUNET_YES;
3291 if (GNUNET_NO == GNUNET_CONFIGURATION_get_value_time (cfg, "DHT_TESTING",
3292 "MALICIOUS_GET_FREQUENCY",
3293 &malicious_get_frequency))
3294 malicious_get_frequency = DEFAULT_MALICIOUS_GET_FREQUENCY;
3297 if (GNUNET_NO == GNUNET_CONFIGURATION_get_value_time (cfg, "DHT_TESTING",
3298 "MALICIOUS_PUT_FREQUENCY",
3299 &malicious_put_frequency))
3300 malicious_put_frequency = DEFAULT_MALICIOUS_PUT_FREQUENCY;
3302 if (GNUNET_YES == GNUNET_CONFIGURATION_get_value_yesno(cfg, "DHT_TESTING", "MALICIOUS_AFTER_SETTLE"))
3303 malicious_after_settle = GNUNET_YES;
3305 if (GNUNET_YES == GNUNET_CONFIGURATION_get_value_yesno(cfg, "DHT_TESTING", "MALICIOUS_SYBIL"))
3307 /* Set up the malicious target at random for this round */
3308 GNUNET_CRYPTO_hash_create_random (GNUNET_CRYPTO_QUALITY_WEAK, &sybil_target);
3309 malicious_sybil = GNUNET_YES;
3312 /* Create the bloomfilter for choosing which peers to set malicious */
3314 /* Bloomfilter size must be 2^k for some integer k */
3316 while (1 << k < malicious_droppers)
3318 if (malicious_droppers > 0)
3319 malicious_bloom = GNUNET_CONTAINER_bloomfilter_init (NULL, 1 << k, DHT_BLOOM_K);
3321 /* The normal behavior of the DHT is to do find peer requests
3322 * on its own. Only if this is explicitly turned off should
3323 * the testing driver issue find peer requests (even though
3324 * this is likely the default when testing).
3327 GNUNET_CONFIGURATION_get_value_yesno(cfg, "dht",
3330 do_find_peer = GNUNET_YES;
3334 GNUNET_CONFIGURATION_get_value_yesno(cfg, "dht",
3337 in_dht_replication = GNUNET_YES;
3340 if (GNUNET_YES != GNUNET_CONFIGURATION_get_value_number (cfg, "DHT_TESTING",
3347 if (GNUNET_YES == GNUNET_CONFIGURATION_get_value_number (cfg, "DHT_TESTING",
3349 &temp_config_number))
3351 find_peer_delay = GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, temp_config_number);
3354 find_peer_delay = DEFAULT_FIND_PEER_DELAY;
3356 if (GNUNET_YES != GNUNET_CONFIGURATION_get_value_number(cfg, "DHT_TESTING", "ROUND_DELAY", &round_delay))
3359 if (GNUNET_NO == GNUNET_CONFIGURATION_get_value_number (cfg, "DHT_TESTING",
3360 "OUTSTANDING_FIND_PEERS",
3361 &max_outstanding_find_peers))
3362 max_outstanding_find_peers = DEFAULT_MAX_OUTSTANDING_FIND_PEERS;
3364 if (GNUNET_YES == GNUNET_CONFIGURATION_get_value_yesno(cfg, "dht", "strict_kademlia"))
3365 max_outstanding_find_peers = max_outstanding_find_peers * 1;
3367 find_peer_offset = GNUNET_TIME_relative_divide (find_peer_delay, max_outstanding_find_peers);
3369 if (GNUNET_SYSERR ==
3370 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "num_rounds",
3376 if ((GNUNET_SYSERR ==
3377 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "target_total_connections",
3378 &target_total_connections)) ||
3379 (target_total_connections == 0))
3381 target_total_connections = connection_estimate(num_peers, DEFAULT_BUCKET_SIZE);
3384 topology_str = NULL;
3386 GNUNET_CONFIGURATION_get_value_string(cfg, "testing", "topology",
3387 &topology_str)) && (GNUNET_NO == GNUNET_TESTING_topology_get(&topology, topology_str)))
3389 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
3390 "Invalid topology `%s' given for section %s option %s\n", topology_str, "TESTING", "TOPOLOGY");
3391 topology = GNUNET_TESTING_TOPOLOGY_CLIQUE; /* Defaults to NONE, so set better default here */
3395 GNUNET_CONFIGURATION_get_value_string (cfg, "testing", "percentage",
3396 &topology_percentage_str))
3397 topology_percentage = 0.5;
3400 topology_percentage = atof (topology_percentage_str);
3401 GNUNET_free(topology_percentage_str);
3405 GNUNET_CONFIGURATION_get_value_string (cfg, "testing", "probability",
3406 &topology_probability_str))
3407 topology_probability = 0.5;
3410 topology_probability = atof (topology_probability_str);
3411 GNUNET_free(topology_probability_str);
3415 GNUNET_CONFIGURATION_get_value_string(cfg, "testing", "connect_topology",
3416 &connect_topology_str)) && (GNUNET_NO == GNUNET_TESTING_topology_get(&connect_topology, connect_topology_str)))
3418 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
3419 "Invalid connect topology `%s' given for section %s option %s\n", connect_topology_str, "TESTING", "CONNECT_TOPOLOGY");
3421 GNUNET_free_non_null(connect_topology_str);
3424 GNUNET_CONFIGURATION_get_value_string(cfg, "testing", "connect_topology_option",
3425 &connect_topology_option_str)) && (GNUNET_NO == GNUNET_TESTING_topology_option_get(&connect_topology_option, connect_topology_option_str)))
3427 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
3428 "Invalid connect topology option `%s' given for section %s option %s\n", connect_topology_option_str, "TESTING", "CONNECT_TOPOLOGY_OPTION");
3429 connect_topology_option = GNUNET_TESTING_TOPOLOGY_OPTION_ALL; /* Defaults to NONE, set to ALL */
3431 GNUNET_free_non_null(connect_topology_option_str);
3434 GNUNET_CONFIGURATION_get_value_string (cfg, "testing", "connect_topology_option_modifier",
3435 &connect_topology_option_modifier_string))
3437 if (sscanf(connect_topology_option_modifier_string, "%lf", &connect_topology_option_modifier) != 1)
3439 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
3440 _("Invalid value `%s' for option `%s' in section `%s': expected float\n"),
3441 connect_topology_option_modifier_string,
3442 "connect_topology_option_modifier",
3445 GNUNET_free (connect_topology_option_modifier_string);
3448 if (GNUNET_YES != GNUNET_CONFIGURATION_get_value_string (cfg, "testing", "blacklist_transports",
3449 &blacklist_transports))
3450 blacklist_transports = NULL;
3453 GNUNET_CONFIGURATION_get_value_string(cfg, "testing", "blacklist_topology",
3454 &blacklist_topology_str)) &&
3455 (GNUNET_NO == GNUNET_TESTING_topology_get(&blacklist_topology, blacklist_topology_str)))
3457 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
3458 "Invalid topology `%s' given for section %s option %s\n", topology_str, "TESTING", "BLACKLIST_TOPOLOGY");
3460 GNUNET_free_non_null(topology_str);
3461 GNUNET_free_non_null(blacklist_topology_str);
3463 /* Set peers_left so we know when all peers started */
3464 peers_left = num_peers;
3467 /* Set up a task to end testing if peer start fails */
3468 die_task = GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_relative_multiply(seconds_per_peer_start, num_peers),
3469 &end_badly, "didn't generate all hostkeys within allowed startup time!");
3471 if (dhtlog_handle == NULL)
3472 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
3473 "dhtlog_handle is NULL!");
3475 trial_info.other_identifier = (unsigned int)trial_to_run;
3476 trial_info.num_nodes = peers_left;
3477 trial_info.topology = topology;
3478 trial_info.blacklist_topology = blacklist_topology;
3479 trial_info.connect_topology = connect_topology;
3480 trial_info.connect_topology_option = connect_topology_option;
3481 trial_info.connect_topology_option_modifier = connect_topology_option_modifier;
3482 trial_info.topology_percentage = topology_percentage;
3483 trial_info.topology_probability = topology_probability;
3484 trial_info.puts = num_puts;
3485 trial_info.gets = num_gets;
3486 trial_info.concurrent = max_outstanding_gets;
3487 trial_info.settle_time = settle_time;
3488 trial_info.num_rounds = total_rounds;
3489 trial_info.malicious_getters = malicious_getters;
3490 trial_info.malicious_putters = malicious_putters;
3491 trial_info.malicious_droppers = malicious_droppers;
3492 trial_info.malicious_get_frequency = malicious_get_frequency.rel_value;
3493 trial_info.malicious_put_frequency = malicious_put_frequency.rel_value;
3494 trial_info.stop_closest = stop_closest;
3495 trial_info.stop_found = stop_found;
3496 trial_info.strict_kademlia = strict_kademlia;
3498 if (trialmessage != NULL)
3499 trial_info.message = trialmessage;
3501 trial_info.message = "";
3503 if (dhtlog_handle != NULL)
3504 dhtlog_handle->insert_trial(&trial_info);
3506 GNUNET_free_non_null(trialmessage);
3508 hostkey_meter = create_meter(peers_left, "Hostkeys created ", GNUNET_YES);
3509 peer_start_meter = create_meter(peers_left, "Peers started ", GNUNET_YES);
3511 put_meter = create_meter(num_puts, "Puts completed ", GNUNET_YES);
3512 get_meter = create_meter(num_gets, "Gets completed ", GNUNET_YES);
3513 pg = GNUNET_TESTING_daemons_start (cfg,
3515 max_outstanding_connections,
3517 GNUNET_TIME_relative_multiply(seconds_per_peer_start, num_peers),
3518 &hostkey_callback, NULL,
3519 &peers_started_callback, NULL,
3520 &topology_callback, NULL,
3523 while (temphost != NULL)
3525 tempnext = temphost->next;
3526 GNUNET_free (temphost->username);
3527 GNUNET_free (temphost->hostname);
3528 GNUNET_free (temphost);
3529 temphost = tempnext;
3534 main (int argc, char *argv[])
3537 struct GNUNET_GETOPT_CommandLineOption options[] = {
3538 GNUNET_GETOPT_OPTION_END
3541 ret = GNUNET_PROGRAM_run (argc,
3542 argv, "gnunet-dht-driver", "nohelp",
3543 options, &run, &ok);
3545 if (malicious_bloom != NULL)
3546 GNUNET_CONTAINER_bloomfilter_free (malicious_bloom);
3548 if (ret != GNUNET_OK)
3550 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "`gnunet-dht-driver': Failed with error code %d\n", ret);
3554 * Need to remove base directory, subdirectories taken care
3555 * of by the testing framework.
3557 if (GNUNET_DISK_directory_remove (test_directory) != GNUNET_OK)
3559 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Failed to remove testing directory %s\n", test_directory);
3564 /* end of gnunet-dht-driver.c */