2 This file is part of GNUnet.
3 (C) 2009 Christian Grothoff (and other contributing authors)
5 GNUnet is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published
7 by the Free Software Foundation; either version 3, or (at your
8 option) any later version.
10 GNUnet is distributed in the hope that it will be useful, but
11 WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 General Public License for more details.
15 You should have received a copy of the GNU General Public License
16 along with GNUnet; see the file COPYING. If not, write to the
17 Free Software Foundation, Inc., 59 Temple Place - Suite 330,
18 Boston, MA 02111-1307, USA.
21 * @file dht/gnunet-dht-driver.c
22 * @brief Driver for setting up a group of gnunet peers and
23 * then issuing GETS and PUTS on the DHT. Coarse results
24 * are reported, fine grained results (if requested) are
25 * logged to a (mysql) database, or to file.
26 * @author Nathan Evans (who to blame)
29 #ifndef HAVE_MALICIOUS
32 #include "gnunet_testing_lib.h"
33 #include "gnunet_core_service.h"
34 #include "gnunet_dht_service.h"
39 #define VERBOSE GNUNET_NO
41 /* Timeout for entire driver to run */
42 #define DEFAULT_TIMEOUT GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_MINUTES, 5)
44 /* Timeout for waiting for (individual) replies to get requests */
45 #define DEFAULT_GET_TIMEOUT GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, 90)
47 #define DEFAULT_TOPOLOGY_CAPTURE_TIMEOUT GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, 90)
49 /* Timeout for waiting for gets to be sent to the service */
50 #define DEFAULT_GET_DELAY GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, 10)
52 /* Timeout for waiting for puts to be sent to the service */
53 #define DEFAULT_PUT_DELAY GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, 10)
55 /* Time to allow a find peer request to take */
56 #define DEFAULT_FIND_PEER_DELAY GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, 40)
58 /* Time to wait for all peers disconnected due to to churn to actually be removed from system */
59 #define DEFAULT_PEER_DISCONNECT_TIMEOUT GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_MINUTES, 5)
61 #define DEFAULT_SECONDS_PER_PEER_START GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, 45)
63 #define DEFAULT_TEST_DATA_SIZE 8
65 #define DEFAULT_BUCKET_SIZE 4
67 #define FIND_PEER_THRESHOLD 1
69 /* If more than this many peers are added, slow down sending */
70 #define MAX_FIND_PEER_CUTOFF 4000
72 /* If less than this many peers are added, speed up sending */
73 #define MIN_FIND_PEER_CUTOFF 500
75 #define DEFAULT_MAX_OUTSTANDING_PUTS 10
77 #define DEFAULT_MAX_OUTSTANDING_FIND_PEERS 196
79 #define DEFAULT_FIND_PEER_OFFSET GNUNET_TIME_relative_divide (DEFAULT_FIND_PEER_DELAY, DEFAULT_MAX_OUTSTANDING_FIND_PEERS)
81 #define DEFAULT_MAX_OUTSTANDING_GETS 10
83 #define DEFAULT_CONNECT_TIMEOUT 60
85 #define DEFAULT_TOPOLOGY_TIMEOUT GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_MINUTES, 8)
87 #define DEFAULT_RECONNECT_ATTEMPTS 8
90 * Default frequency for sending malicious get messages
92 #define DEFAULT_MALICIOUS_GET_FREQUENCY GNUNET_TIME_UNIT_SECONDS
95 * Default frequency for sending malicious put messages
97 #define DEFAULT_MALICIOUS_PUT_FREQUENCY GNUNET_TIME_UNIT_SECONDS
101 struct MaliciousContext
104 * Handle to DHT service (via the API)
106 struct GNUNET_DHT_Handle *dht_handle;
109 * Handle to the peer daemon
111 struct GNUNET_TESTING_Daemon *daemon;
114 * Task for disconnecting DHT handles
116 GNUNET_SCHEDULER_TaskIdentifier disconnect_task;
119 * What type of malicious to set this peer to.
126 /* This is a linked list */
127 struct TestFindPeer *next;
129 /* Handle to the bigger context */
130 struct FindPeerContext *find_peer_context;
133 * Handle to the peer's DHT service (via the API)
135 struct GNUNET_DHT_Handle *dht_handle;
138 * Handle to the peer daemon
140 struct GNUNET_TESTING_Daemon *daemon;
143 * Task for disconnecting DHT handles
145 GNUNET_SCHEDULER_TaskIdentifier disconnect_task;
148 struct TestPutContext
150 /* This is a linked list */
151 struct TestPutContext *next;
154 * Handle to the first peers DHT service (via the API)
156 struct GNUNET_DHT_Handle *dht_handle;
159 * Handle to the PUT peer daemon
161 struct GNUNET_TESTING_Daemon *daemon;
164 * Identifier for this PUT
169 * Task for disconnecting DHT handles
171 GNUNET_SCHEDULER_TaskIdentifier disconnect_task;
174 struct TestGetContext
176 /* This is a linked list */
177 struct TestGetContext *next;
180 * Handle to the first peers DHT service (via the API)
182 struct GNUNET_DHT_Handle *dht_handle;
185 * Handle for the DHT get request
187 struct GNUNET_DHT_GetHandle *get_handle;
190 * Handle to the GET peer daemon
192 struct GNUNET_TESTING_Daemon *daemon;
195 * Identifier for this GET
200 * Task for disconnecting DHT handles (and stopping GET)
202 GNUNET_SCHEDULER_TaskIdentifier disconnect_task;
205 * Whether or not this request has been fulfilled already.
211 * Simple struct to keep track of progress, and print a
212 * nice little percentage meter for long running tasks.
222 unsigned int completed;
226 char *startup_string;
230 * Linked list of information for populating statistics
231 * before ending trial.
233 struct StatisticsIteratorContext
235 const struct GNUNET_PeerIdentity *peer;
236 unsigned int stat_routes;
237 unsigned int stat_route_forwards;
238 unsigned int stat_results;
239 unsigned int stat_results_to_client;
240 unsigned int stat_result_forwards;
241 unsigned int stat_gets;
242 unsigned int stat_puts;
243 unsigned int stat_puts_inserted;
244 unsigned int stat_find_peer;
245 unsigned int stat_find_peer_start;
246 unsigned int stat_get_start;
247 unsigned int stat_put_start;
248 unsigned int stat_find_peer_reply;
249 unsigned int stat_get_reply;
250 unsigned int stat_find_peer_answer;
251 unsigned int stat_get_response_start;
255 * Context for getting a topology, logging it, and continuing
256 * on with some next operation.
258 struct TopologyIteratorContext
260 unsigned int total_iterations;
261 unsigned int current_iteration;
262 unsigned int total_connections;
263 unsigned int total_peers;
264 struct GNUNET_CONTAINER_MultiHashMap *peers_seen;
265 struct GNUNET_PeerIdentity *peer;
266 GNUNET_SCHEDULER_Task cont;
268 struct GNUNET_TIME_Relative timeout;
274 /** Node in the heap */
275 struct GNUNET_CONTAINER_HeapNode *heap_node;
277 /** Peer the count refers to */
278 struct GNUNET_PeerIdentity peer_id;
280 /** Count of connections this peer has */
285 * Context for sending out find peer requests.
287 struct FindPeerContext
290 * How long to send find peer requests, once the settle time
291 * is over don't send any more out!
293 * TODO: Add option for settle time and find peer sending time?
295 struct GNUNET_TIME_Absolute endtime;
298 * Number of connections in the current topology
299 * (after this round of find peer requests has ended).
301 unsigned int current_peers;
304 * Number of connections in the current topology
305 * (before this round of find peer requests started).
307 unsigned int previous_peers;
310 * Number of find peer requests we have currently
313 unsigned int outstanding;
316 * Number of find peer requests to send in this round.
321 * Number of find peer requests sent last time around.
323 unsigned int last_sent;
326 * Hashmap of peers in the current topology, value
327 * is a PeerCount, with the number of connections
330 struct GNUNET_CONTAINER_MultiHashMap *peer_hash;
333 * Min heap which orders values in the peer_hash for
336 struct GNUNET_CONTAINER_Heap *peer_min_heap;
339 * Callback for counting the peers in the current topology.
341 GNUNET_TESTING_NotifyTopology count_peers_cb;
347 * Next full round (puts + gets).
352 * Next round of gets.
357 * Next round of puts.
362 * Next round of churn.
372 * Timeout to let all GET requests happen.
374 static struct GNUNET_TIME_Relative all_get_timeout;
379 static struct GNUNET_TIME_Relative get_timeout;
382 * Time to allow for GET requests to be sent to service.
384 static struct GNUNET_TIME_Relative get_delay;
387 * Time to allow for PUT requests to be sent to service.
389 static struct GNUNET_TIME_Relative put_delay;
392 * Delay between sending find peer requests (if
393 * handled by the driver, no effect if sent by service).
395 static struct GNUNET_TIME_Relative find_peer_delay;
398 * Time between find peer requests
399 * (find_peer_delay / max_outstanding_find_peer)
401 static struct GNUNET_TIME_Relative find_peer_offset;
404 * How many seconds to allow each peer to start.
406 static struct GNUNET_TIME_Relative seconds_per_peer_start;
409 * Boolean value, should the driver issue find peer requests
410 * (GNUNET_YES) or should it be left to the service (GNUNET_NO)
412 static unsigned int do_find_peer;
415 * Boolean value, should replication be done by the dht
416 * service (GNUNET_YES) or by the driver (GNUNET_NO)
418 static unsigned int in_dht_replication;
421 * Size of test data to insert/retrieve during testing.
423 static unsigned long long test_data_size = DEFAULT_TEST_DATA_SIZE;
426 * Maximum number of concurrent PUT requests.
428 static unsigned long long max_outstanding_puts = DEFAULT_MAX_OUTSTANDING_PUTS;
431 * Maximum number of concurrent GET requests.
433 static unsigned long long max_outstanding_gets = DEFAULT_MAX_OUTSTANDING_GETS;
436 * Number of nodes issuing malicious GET messages.
438 static unsigned long long malicious_getters;
441 * Maximum number of concurrent find peer messages being sent.
443 static unsigned long long max_outstanding_find_peers;
446 * Number of nodes issuing malicious PUT messages.
448 static unsigned long long malicious_putters;
451 * Time (in seconds) to delay between rounds.
453 static unsigned long long round_delay;
456 * How many malicious droppers to seed in the network.
458 static unsigned long long malicious_droppers;
461 * Bloom filter to restrict malicious nodes chosen.
463 struct GNUNET_CONTAINER_BloomFilter *malicious_bloom;
466 * Whether malicious droppers should be chosen based on proximity to a key.
468 static int malicious_sybil;
471 * Target for the malicious sybil nodes (choose the closest to this key).
473 static GNUNET_HashCode sybil_target;
476 * How often to send malicious GET messages.
478 static struct GNUNET_TIME_Relative malicious_get_frequency;
481 * How often to send malicious PUT messages.
483 static struct GNUNET_TIME_Relative malicious_put_frequency;
486 * How long to send find peer requests.
488 static unsigned long long settle_time;
491 * Handle to the dhtlog service.
493 static struct GNUNET_DHTLOG_Handle *dhtlog_handle;
496 * Replication value for GET requests.
498 static unsigned long long get_replication;
501 * Replication value for PUT requests.
503 static unsigned long long put_replication;
506 * If GNUNET_YES, insert data at the same peers every time.
507 * Otherwise, choose a new random peer to insert at each time.
509 static unsigned int replicate_same;
512 * If GNUNET_YES, issue GET requests at the same peers every time.
513 * Otherwise, choose a new random peer/data combination to search
516 static unsigned int get_from_same;
519 * Should malicious peers be set after allowing for settle time?
520 * Default is to set them malicious after initial connection setup.
522 static unsigned int malicious_after_settle;
525 * Number of rounds for testing (PUTS + GETS)
527 static unsigned long long total_rounds;
530 * Target number of connections (will stop sending find peer
531 * messages when this number is exceeded)
533 static unsigned long long target_total_connections;
536 * Number of rounds already run
538 static unsigned int rounds_finished;
541 * Number of rounds of churn to read from the file (first line, should be a single number).
543 static unsigned int churn_rounds;
546 * Current round we are in for churn, tells us how many peers to connect/disconnect.
548 static unsigned int current_churn_round;
551 * Number of times to churn per round
553 static unsigned long long churns_per_round;
556 * Array of churn values.
558 static unsigned int *churn_array;
561 * Hash map of stats contexts.
563 static struct GNUNET_CONTAINER_MultiHashMap *stats_map;
566 * LL of malicious settings.
568 struct MaliciousContext *all_malicious;
571 * List of GETS to perform
573 struct TestGetContext *all_gets;
576 * List of PUTS to perform
578 struct TestPutContext *all_puts;
581 * Directory to store temporary data in, defined in config file
583 static char *test_directory;
586 * Variable used to store the number of connections we should wait for.
588 static unsigned int expected_connections;
591 * Variable used to keep track of how many peers aren't yet started.
593 static unsigned long long peers_left;
596 * Handle to the set of all peers run for this test.
598 static struct GNUNET_TESTING_PeerGroup *pg;
602 * Global config handle.
604 static const struct GNUNET_CONFIGURATION_Handle *config;
607 * Total number of peers to run, set based on config file.
609 static unsigned long long num_peers;
612 * Total number of items to insert.
614 static unsigned long long num_puts;
617 * How many puts do we currently have in flight?
619 static unsigned long long outstanding_puts;
622 * How many puts are done?
624 static unsigned long long puts_completed;
627 * Total number of items to attempt to get.
629 static unsigned long long num_gets;
632 * How many puts do we currently have in flight?
634 static unsigned long long outstanding_gets;
637 * How many gets are done?
639 static unsigned long long gets_completed;
642 * How many gets failed?
644 static unsigned long long gets_failed;
647 * How many malicious control messages do
648 * we currently have in flight?
650 static unsigned long long outstanding_malicious;
653 * How many set malicious peers are done?
655 static unsigned long long malicious_completed;
658 * Global used to count how many connections we have currently
659 * been notified about (how many times has topology_callback been called
662 static unsigned int total_connections;
665 * Global used to count how many failed connections we have
666 * been notified about (how many times has topology_callback
667 * been called with failure?)
669 static unsigned int failed_connections;
671 /* Task handle to use to schedule shutdown if something goes wrong */
672 GNUNET_SCHEDULER_TaskIdentifier die_task;
674 static char *blacklist_transports;
676 static enum GNUNET_TESTING_Topology topology;
678 static enum GNUNET_TESTING_Topology blacklist_topology = GNUNET_TESTING_TOPOLOGY_NONE; /* Don't do any blacklisting */
680 static enum GNUNET_TESTING_Topology connect_topology = GNUNET_TESTING_TOPOLOGY_NONE; /* NONE actually means connect all allowed peers */
682 static enum GNUNET_TESTING_TopologyOption connect_topology_option = GNUNET_TESTING_TOPOLOGY_OPTION_ALL;
684 static double connect_topology_option_modifier = 0.0;
686 static struct ProgressMeter *hostkey_meter;
688 static struct ProgressMeter *peer_start_meter;
690 static struct ProgressMeter *peer_connect_meter;
692 static struct ProgressMeter *put_meter;
694 static struct ProgressMeter *get_meter;
696 static GNUNET_HashCode *known_keys;
698 /* Global return value (0 for success, anything else for failure) */
702 * Create a meter to keep track of the progress of some task.
704 * @param total the total number of items to complete
705 * @param start_string a string to prefix the meter with (if printing)
706 * @param print GNUNET_YES to print the meter, GNUNET_NO to count
709 * @return the progress meter
711 static struct ProgressMeter *
712 create_meter(unsigned int total, char * start_string, int print)
714 struct ProgressMeter *ret;
715 ret = GNUNET_malloc(sizeof(struct ProgressMeter));
718 ret->modnum = total / 4;
719 ret->dotnum = (total / 50) + 1;
720 if (start_string != NULL)
721 ret->startup_string = GNUNET_strdup(start_string);
723 ret->startup_string = GNUNET_strdup("");
729 * Update progress meter (increment by one).
731 * @param meter the meter to update and print info for
733 * @return GNUNET_YES if called the total requested,
734 * GNUNET_NO if more items expected
737 update_meter(struct ProgressMeter *meter)
739 if (meter->print == GNUNET_YES)
741 if (meter->completed % meter->modnum == 0)
743 if (meter->completed == 0)
745 fprintf(stdout, "%sProgress: [0%%", meter->startup_string);
748 fprintf(stdout, "%d%%", (int)(((float)meter->completed / meter->total) * 100));
750 else if (meter->completed % meter->dotnum == 0)
751 fprintf(stdout, ".");
753 if (meter->completed + 1 == meter->total)
754 fprintf(stdout, "%d%%]\n", 100);
759 if (meter->completed == meter->total)
765 * Reset progress meter.
767 * @param meter the meter to reset
769 * @return GNUNET_YES if meter reset,
770 * GNUNET_SYSERR on error
773 reset_meter(struct ProgressMeter *meter)
776 return GNUNET_SYSERR;
778 meter->completed = 0;
783 * Release resources for meter
785 * @param meter the meter to free
788 free_meter(struct ProgressMeter *meter)
790 GNUNET_free_non_null (meter->startup_string);
795 * Check whether peers successfully shut down.
798 shutdown_callback (void *cls,
809 * Task to release DHT handles for PUT
812 put_disconnect_task (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
814 struct TestPutContext *test_put = cls;
815 test_put->disconnect_task = GNUNET_SCHEDULER_NO_TASK;
816 GNUNET_DHT_disconnect(test_put->dht_handle);
817 test_put->dht_handle = NULL;
818 if (replicate_same == GNUNET_NO)
819 test_put->daemon = GNUNET_TESTING_daemon_get(pg, GNUNET_CRYPTO_random_u32(GNUNET_CRYPTO_QUALITY_WEAK, num_peers));
823 * Function scheduled to be run on the successful completion of this
827 finish_testing (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
829 GNUNET_log (GNUNET_ERROR_TYPE_WARNING, "Ending test normally!\n", (char *)cls);
830 GNUNET_assert (pg != NULL);
831 struct TestPutContext *test_put = all_puts;
832 struct TestGetContext *test_get = all_gets;
834 while (test_put != NULL)
836 if (test_put->disconnect_task != GNUNET_SCHEDULER_NO_TASK)
837 GNUNET_SCHEDULER_cancel(test_put->disconnect_task);
838 if (test_put->dht_handle != NULL)
839 GNUNET_DHT_disconnect(test_put->dht_handle);
840 test_put = test_put->next;
843 while (test_get != NULL)
845 if (test_get->disconnect_task != GNUNET_SCHEDULER_NO_TASK)
846 GNUNET_SCHEDULER_cancel(test_get->disconnect_task);
847 if (test_get->get_handle != NULL)
848 GNUNET_DHT_get_stop(test_get->get_handle);
849 if (test_get->dht_handle != NULL)
850 GNUNET_DHT_disconnect(test_get->dht_handle);
851 test_get = test_get->next;
854 GNUNET_TESTING_daemons_stop (pg, DEFAULT_TIMEOUT, &shutdown_callback, NULL);
856 if (dhtlog_handle != NULL)
858 fprintf(stderr, "Update trial endtime\n");
859 dhtlog_handle->update_trial (gets_completed);
860 GNUNET_DHTLOG_disconnect(dhtlog_handle);
861 dhtlog_handle = NULL;
864 if (hostkey_meter != NULL)
865 free_meter(hostkey_meter);
866 if (peer_start_meter != NULL)
867 free_meter(peer_start_meter);
868 if (peer_connect_meter != NULL)
869 free_meter(peer_connect_meter);
870 if (put_meter != NULL)
871 free_meter(put_meter);
872 if (get_meter != NULL)
873 free_meter(get_meter);
879 * Callback for iterating over all the peer connections of a peer group.
882 log_topology_cb (void *cls,
883 const struct GNUNET_PeerIdentity *first,
884 const struct GNUNET_PeerIdentity *second,
887 struct TopologyIteratorContext *topo_ctx = cls;
888 if ((first != NULL) && (second != NULL))
890 /* GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "According to CORE, peer %s is connected to %s\n", GNUNET_i2s(first), GNUNET_h2s(&second->hashPubKey));*/
891 if ((topo_ctx->peers_seen != NULL) && (GNUNET_NO == GNUNET_CONTAINER_multihashmap_contains(topo_ctx->peers_seen, &first->hashPubKey)))
893 GNUNET_CONTAINER_multihashmap_put(topo_ctx->peers_seen, &first->hashPubKey, NULL, GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY);
894 topo_ctx->total_peers++;
896 topo_ctx->total_connections++;
897 if (GNUNET_YES == GNUNET_CONFIGURATION_get_value_yesno(config, "dht_testing", "mysql_logging"))
898 dhtlog_handle->insert_extended_topology(first, second);
902 GNUNET_assert(dhtlog_handle != NULL);
903 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Topology iteration (%u/%u) finished (%u connections, %u peers)\n", topo_ctx->current_iteration, topo_ctx->total_iterations, topo_ctx->total_connections, topo_ctx->total_peers);
904 dhtlog_handle->update_topology(topo_ctx->total_connections);
905 if (topo_ctx->cont != NULL)
906 GNUNET_SCHEDULER_add_now (topo_ctx->cont, topo_ctx->cls);
907 if (topo_ctx->peers_seen != NULL)
908 GNUNET_CONTAINER_multihashmap_destroy(topo_ctx->peers_seen);
909 GNUNET_free(topo_ctx);
914 * Iterator over hash map entries.
916 * @param cls closure - always NULL
917 * @param key current key code
918 * @param value value in the hash map, a stats context
919 * @return GNUNET_YES if we should continue to
923 static int stats_iterate (void *cls,
924 const GNUNET_HashCode * key,
927 struct StatisticsIteratorContext *stats_ctx;
931 dhtlog_handle->insert_stat(stats_ctx->peer, stats_ctx->stat_routes, stats_ctx->stat_route_forwards, stats_ctx->stat_results,
932 stats_ctx->stat_results_to_client, stats_ctx->stat_result_forwards, stats_ctx->stat_gets,
933 stats_ctx->stat_puts, stats_ctx->stat_puts_inserted, stats_ctx->stat_find_peer,
934 stats_ctx->stat_find_peer_start, stats_ctx->stat_get_start, stats_ctx->stat_put_start,
935 stats_ctx->stat_find_peer_reply, stats_ctx->stat_get_reply, stats_ctx->stat_find_peer_answer,
936 stats_ctx->stat_get_response_start);
937 GNUNET_free(stats_ctx);
942 stats_finished (void *cls, int result)
944 fprintf(stderr, "Finished getting all peers statistics, iterating!\n");
945 GNUNET_CONTAINER_multihashmap_iterate(stats_map, &stats_iterate, NULL);
946 GNUNET_CONTAINER_multihashmap_destroy(stats_map);
947 GNUNET_SCHEDULER_add_now (&finish_testing, NULL);
951 * Callback function to process statistic values.
954 * @param peer the peer the statistics belong to
955 * @param subsystem name of subsystem that created the statistic
956 * @param name the name of the datum
957 * @param value the current value
958 * @param is_persistent GNUNET_YES if the value is persistent, GNUNET_NO if not
959 * @return GNUNET_OK to continue, GNUNET_SYSERR to abort iteration
961 static int stats_handle (void *cls,
962 const struct GNUNET_PeerIdentity *peer,
963 const char *subsystem,
968 struct StatisticsIteratorContext *stats_ctx;
970 if (dhtlog_handle != NULL)
971 dhtlog_handle->add_generic_stat(peer, name, subsystem, value);
972 if (GNUNET_CONTAINER_multihashmap_contains(stats_map, &peer->hashPubKey))
974 stats_ctx = GNUNET_CONTAINER_multihashmap_get(stats_map, &peer->hashPubKey);
978 stats_ctx = GNUNET_malloc(sizeof(struct StatisticsIteratorContext));
979 stats_ctx->peer = peer;
980 GNUNET_CONTAINER_multihashmap_put(stats_map, &peer->hashPubKey, stats_ctx, GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY);
982 GNUNET_assert(stats_ctx != NULL);
984 if (strcmp(name, STAT_ROUTES) == 0)
985 stats_ctx->stat_routes = value;
986 else if (strcmp(name, STAT_ROUTE_FORWARDS) == 0)
987 stats_ctx->stat_route_forwards = value;
988 else if (strcmp(name, STAT_RESULTS) == 0)
989 stats_ctx->stat_results = value;
990 else if (strcmp(name, STAT_RESULTS_TO_CLIENT) == 0)
991 stats_ctx->stat_results_to_client = value;
992 else if (strcmp(name, STAT_RESULT_FORWARDS) == 0)
993 stats_ctx->stat_result_forwards = value;
994 else if (strcmp(name, STAT_GETS) == 0)
995 stats_ctx->stat_gets = value;
996 else if (strcmp(name, STAT_PUTS) == 0)
997 stats_ctx->stat_puts = value;
998 else if (strcmp(name, STAT_PUTS_INSERTED) == 0)
999 stats_ctx->stat_puts_inserted = value;
1000 else if (strcmp(name, STAT_FIND_PEER) == 0)
1001 stats_ctx->stat_find_peer = value;
1002 else if (strcmp(name, STAT_FIND_PEER_START) == 0)
1003 stats_ctx->stat_find_peer_start = value;
1004 else if (strcmp(name, STAT_GET_START) == 0)
1005 stats_ctx->stat_get_start = value;
1006 else if (strcmp(name, STAT_PUT_START) == 0)
1007 stats_ctx->stat_put_start = value;
1008 else if (strcmp(name, STAT_FIND_PEER_REPLY) == 0)
1009 stats_ctx->stat_find_peer_reply = value;
1010 else if (strcmp(name, STAT_GET_REPLY) == 0)
1011 stats_ctx->stat_get_reply = value;
1012 else if (strcmp(name, STAT_FIND_PEER_ANSWER) == 0)
1013 stats_ctx->stat_find_peer_answer = value;
1014 else if (strcmp(name, STAT_GET_RESPONSE_START) == 0)
1015 stats_ctx->stat_get_response_start = value;
1021 * Connect to statistics service for each peer and get the appropriate
1022 * dht statistics for safe keeping.
1025 log_dht_statistics (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
1027 stats_map = GNUNET_CONTAINER_multihashmap_create(num_peers);
1028 fprintf(stderr, "Starting statistics logging\n");
1029 GNUNET_TESTING_get_statistics(pg, &stats_finished, &stats_handle, NULL);
1034 * Connect to all peers in the peer group and iterate over their
1038 capture_current_topology (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
1040 struct TopologyIteratorContext *topo_ctx = cls;
1041 dhtlog_handle->insert_topology(0);
1042 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Called capture_current_topology\n");
1043 GNUNET_TESTING_get_topology (pg, &log_topology_cb, topo_ctx);
1048 * Check if the get_handle is being used, if so stop the request. Either
1049 * way, schedule the end_badly_cont function which actually shuts down the
1053 end_badly (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
1055 GNUNET_log (GNUNET_ERROR_TYPE_WARNING, "Failing test with error: `%s'!\n", (char *)cls);
1057 struct TestPutContext *test_put = all_puts;
1058 struct TestGetContext *test_get = all_gets;
1060 while (test_put != NULL)
1062 if (test_put->disconnect_task != GNUNET_SCHEDULER_NO_TASK)
1063 GNUNET_SCHEDULER_cancel(test_put->disconnect_task);
1064 if (test_put->dht_handle != NULL)
1065 GNUNET_DHT_disconnect(test_put->dht_handle);
1066 test_put = test_put->next;
1069 while (test_get != NULL)
1071 if (test_get->disconnect_task != GNUNET_SCHEDULER_NO_TASK)
1072 GNUNET_SCHEDULER_cancel(test_get->disconnect_task);
1073 if (test_get->get_handle != NULL)
1074 GNUNET_DHT_get_stop(test_get->get_handle);
1075 if (test_get->dht_handle != NULL)
1076 GNUNET_DHT_disconnect(test_get->dht_handle);
1077 test_get = test_get->next;
1080 GNUNET_TESTING_daemons_stop (pg, DEFAULT_TIMEOUT, &shutdown_callback, NULL);
1082 if (dhtlog_handle != NULL)
1084 fprintf(stderr, "Update trial endtime\n");
1085 dhtlog_handle->update_trial (gets_completed);
1086 GNUNET_DHTLOG_disconnect(dhtlog_handle);
1087 dhtlog_handle = NULL;
1090 if (hostkey_meter != NULL)
1091 free_meter(hostkey_meter);
1092 if (peer_start_meter != NULL)
1093 free_meter(peer_start_meter);
1094 if (peer_connect_meter != NULL)
1095 free_meter(peer_connect_meter);
1096 if (put_meter != NULL)
1097 free_meter(put_meter);
1098 if (get_meter != NULL)
1099 free_meter(get_meter);
1105 * Forward declaration.
1108 do_put (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc);
1111 * Forward declaration.
1114 do_get (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc);
1117 * Iterator over hash map entries.
1119 * @param cls closure
1120 * @param key current key code
1121 * @param value value in the hash map
1122 * @return GNUNET_YES if we should continue to
1126 static int remove_peer_count (void *cls,
1127 const GNUNET_HashCode * key,
1130 struct FindPeerContext *find_peer_ctx = cls;
1131 struct PeerCount *peer_count = value;
1132 GNUNET_CONTAINER_heap_remove_node(find_peer_ctx->peer_min_heap, peer_count->heap_node);
1133 GNUNET_free(peer_count);
1139 * Connect to all peers in the peer group and iterate over their
1143 count_new_peers (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
1145 struct FindPeerContext *find_peer_context = cls;
1146 find_peer_context->previous_peers = find_peer_context->current_peers;
1147 find_peer_context->current_peers = 0;
1148 GNUNET_TESTING_get_topology (pg, find_peer_context->count_peers_cb, find_peer_context);
1152 decrement_find_peers (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
1154 struct TestFindPeer *test_find_peer = cls;
1155 GNUNET_assert(test_find_peer->find_peer_context->outstanding > 0);
1156 test_find_peer->find_peer_context->outstanding--;
1157 test_find_peer->find_peer_context->total--;
1158 if (0 == test_find_peer->find_peer_context->total)
1160 GNUNET_SCHEDULER_add_now(&count_new_peers, test_find_peer->find_peer_context);
1162 GNUNET_free(test_find_peer);
1166 * A find peer request has been sent to the server, now we will schedule a task
1167 * to wait the appropriate time to allow the request to go out and back.
1169 * @param cls closure - a TestFindPeer struct
1170 * @param tc context the task is being called with
1173 handle_find_peer_sent (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
1175 struct TestFindPeer *test_find_peer = cls;
1177 GNUNET_DHT_disconnect(test_find_peer->dht_handle);
1178 GNUNET_SCHEDULER_add_delayed(GNUNET_TIME_relative_divide(find_peer_delay, 2), &decrement_find_peers, test_find_peer);
1183 send_find_peer_request (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
1185 struct TestFindPeer *test_find_peer = cls;
1187 if (test_find_peer->find_peer_context->outstanding > max_outstanding_find_peers)
1189 GNUNET_SCHEDULER_add_delayed(find_peer_offset, &send_find_peer_request, test_find_peer);
1193 test_find_peer->find_peer_context->outstanding++;
1194 if (GNUNET_TIME_absolute_get_remaining(test_find_peer->find_peer_context->endtime).rel_value == 0)
1196 GNUNET_SCHEDULER_add_now(&decrement_find_peers, test_find_peer);
1200 test_find_peer->dht_handle = GNUNET_DHT_connect(test_find_peer->daemon->cfg, 1);
1201 GNUNET_assert(test_find_peer->dht_handle != NULL);
1202 GNUNET_DHT_find_peers (test_find_peer->dht_handle,
1203 &handle_find_peer_sent, test_find_peer);
1208 * Add a connection to the find_peer_context given. This may
1209 * be complete overkill, but allows us to choose the peers with
1210 * the least connections to initiate find peer requests from.
1212 static void add_new_connection(struct FindPeerContext *find_peer_context,
1213 const struct GNUNET_PeerIdentity *first,
1214 const struct GNUNET_PeerIdentity *second)
1216 struct PeerCount *first_count;
1217 struct PeerCount *second_count;
1219 if (GNUNET_CONTAINER_multihashmap_contains(find_peer_context->peer_hash, &first->hashPubKey))
1221 first_count = GNUNET_CONTAINER_multihashmap_get(find_peer_context->peer_hash, &first->hashPubKey);
1222 GNUNET_assert(first_count != NULL);
1223 first_count->count++;
1224 GNUNET_CONTAINER_heap_update_cost(find_peer_context->peer_min_heap, first_count->heap_node, first_count->count);
1228 first_count = GNUNET_malloc(sizeof(struct PeerCount));
1229 first_count->count = 1;
1230 memcpy(&first_count->peer_id, first, sizeof(struct GNUNET_PeerIdentity));
1231 first_count->heap_node = GNUNET_CONTAINER_heap_insert(find_peer_context->peer_min_heap, first_count, first_count->count);
1232 GNUNET_CONTAINER_multihashmap_put(find_peer_context->peer_hash, &first->hashPubKey, first_count, GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY);
1235 if (GNUNET_CONTAINER_multihashmap_contains(find_peer_context->peer_hash, &second->hashPubKey))
1237 second_count = GNUNET_CONTAINER_multihashmap_get(find_peer_context->peer_hash, &second->hashPubKey);
1238 GNUNET_assert(second_count != NULL);
1239 second_count->count++;
1240 GNUNET_CONTAINER_heap_update_cost(find_peer_context->peer_min_heap, second_count->heap_node, second_count->count);
1244 second_count = GNUNET_malloc(sizeof(struct PeerCount));
1245 second_count->count = 1;
1246 memcpy(&second_count->peer_id, second, sizeof(struct GNUNET_PeerIdentity));
1247 second_count->heap_node = GNUNET_CONTAINER_heap_insert(find_peer_context->peer_min_heap, second_count, second_count->count);
1248 GNUNET_CONTAINER_multihashmap_put(find_peer_context->peer_hash, &second->hashPubKey, second_count, GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY);
1254 * Iterate over min heap of connections per peer. For any
1255 * peer that has 0 connections, attempt to connect them to
1258 * @param cls closure a struct FindPeerContext
1259 * @param node internal node of the heap
1260 * @param element value stored, a struct PeerCount
1261 * @param cost cost associated with the node
1262 * @return GNUNET_YES if we should continue to iterate,
1265 static int iterate_min_heap_peers (void *cls,
1266 struct GNUNET_CONTAINER_HeapNode *node,
1268 GNUNET_CONTAINER_HeapCostType cost)
1270 struct FindPeerContext *find_peer_context = cls;
1271 struct PeerCount *peer_count = element;
1272 struct GNUNET_TESTING_Daemon *d1;
1273 struct GNUNET_TESTING_Daemon *d2;
1274 struct GNUNET_TIME_Relative timeout;
1277 d1 = GNUNET_TESTING_daemon_get_by_id (pg, &peer_count->peer_id);
1278 GNUNET_assert(d1 != NULL);
1280 while ((d2 == d1) || (GNUNET_YES != GNUNET_TESTING_daemon_running(d2)))
1282 d2 = GNUNET_TESTING_daemon_get(pg, GNUNET_CRYPTO_random_u32(GNUNET_CRYPTO_QUALITY_WEAK, num_peers));
1283 GNUNET_assert(d2 != NULL);
1286 /** Just try to connect the peers, don't worry about callbacks, etc. **/
1287 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Peer %s has 0 connections. Trying to connect to %s...\n", GNUNET_i2s(&peer_count->peer_id), d2->shortname);
1288 timeout = GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, DEFAULT_CONNECT_TIMEOUT);
1289 if (GNUNET_TIME_relative_to_absolute(timeout).abs_value > find_peer_context->endtime.abs_value)
1291 timeout = GNUNET_TIME_absolute_get_remaining(find_peer_context->endtime);
1293 GNUNET_TESTING_daemons_connect(d1, d2, timeout, DEFAULT_RECONNECT_ATTEMPTS, NULL, NULL);
1295 if (GNUNET_TIME_absolute_get_remaining(find_peer_context->endtime).rel_value > 0)
1302 * Forward declaration.
1305 schedule_churn_find_peer_requests (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc);
1308 * Callback for iterating over all the peer connections of a peer group.
1309 * Used after we have churned on some peers to find which ones have zero
1310 * connections so we can make them issue find peer requests.
1313 count_peers_churn_cb (void *cls,
1314 const struct GNUNET_PeerIdentity *first,
1315 const struct GNUNET_PeerIdentity *second,
1318 struct FindPeerContext *find_peer_context = cls;
1319 struct TopologyIteratorContext *topo_ctx;
1320 struct PeerCount *peer_count;
1322 if ((first != NULL) && (second != NULL))
1324 add_new_connection(find_peer_context, first, second);
1325 find_peer_context->current_peers++;
1329 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Peer count finished (%u connections)\n",
1330 find_peer_context->current_peers);
1331 peer_count = GNUNET_CONTAINER_heap_peek(find_peer_context->peer_min_heap);
1332 GNUNET_assert(peer_count != NULL);
1333 /* WAIT. When peers are churned they will come back with their peers (at least in peerinfo), because the HOSTS file doesn't likely get removed. CRAP. */
1334 /* NO they won't, because we have disabled peerinfo writing to disk (remember?) so we WILL have to give them new connections */
1335 /* Best course of action: have DHT automatically try to add peers from peerinfo on startup. This way IF peerinfo writes to file
1336 * then some peers will end up connected.
1338 * Also, find any peers that have zero connections here and set up a task to choose at random another peer in the network to
1339 * connect to. Of course, if they are blacklisted from that peer they won't be able to connect, so we will have to keep trying
1340 * until they get a peer.
1342 /* However, they won't automatically be connected to any of their previous peers... How can we handle that? */
1343 /* So now we have choices: do we want them to come back with all their connections? Probably not, but it solves this mess. */
1345 /* Second problem, which is still a problem, is that a FIND_PEER request won't work when a peer has no connections */
1348 * Okay, so here's how this *should* work now.
1350 * 1. We check the min heap for any peers that have 0 connections.
1351 * a. If any are found, we iterate over the heap and just randomly
1352 * choose another peer and ask testing to please connect the two.
1353 * This takes care of the case that a peer just randomly joins the
1354 * network. However, if there are strict topology restrictions
1355 * (imagine a ring) choosing randomly most likely won't help.
1356 * We make sure the connection attempt doesn't take longer than
1357 * the total timeout, but don't care too much about the result.
1358 * b. After that, we still schedule the find peer requests (concurrently
1359 * with the connect attempts most likely). This handles the case
1360 * that the DHT iterates over peerinfo and just needs to try to send
1361 * a message to get connected. This should handle the case that the
1362 * topology is very strict.
1364 * 2. If all peers have > 0 connections, we still send find peer requests
1365 * as long as possible (until timeout is reached) to help out those
1366 * peers that were newly churned and need more connections. This is because
1367 * once all new peers have established a single connection, they won't be
1370 * 3. Once we reach the timeout, we can do no more. We must schedule the
1371 * next iteration of get requests regardless of connections that peers
1372 * may or may not have.
1374 * Caveat: it would be nice to get peers to take data offline with them and
1375 * come back with it (or not) based on the testing framework. The
1376 * same goes for remembering previous connections, but putting either
1377 * into the general testing churn options seems like overkill because
1378 * these are very specialized cases.
1380 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Out of %u peers, fewest connections is %d\n", GNUNET_CONTAINER_heap_get_size(find_peer_context->peer_min_heap), peer_count->count);
1381 if ((peer_count->count == 0) && (GNUNET_TIME_absolute_get_remaining(find_peer_context->endtime).rel_value > 0))
1383 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Found peer with no connections, will choose some peer(s) at random to connect to!\n");
1384 GNUNET_CONTAINER_heap_iterate (find_peer_context->peer_min_heap, &iterate_min_heap_peers, find_peer_context);
1385 GNUNET_SCHEDULER_add_now(&schedule_churn_find_peer_requests, find_peer_context);
1387 else if ((GNUNET_TIME_absolute_get_remaining(find_peer_context->endtime).rel_value > 0) && (find_peer_context->last_sent != 0))
1389 GNUNET_SCHEDULER_add_now(&schedule_churn_find_peer_requests, find_peer_context);
1393 GNUNET_CONTAINER_multihashmap_iterate(find_peer_context->peer_hash, &remove_peer_count, find_peer_context);
1394 GNUNET_CONTAINER_multihashmap_destroy(find_peer_context->peer_hash);
1395 GNUNET_CONTAINER_heap_destroy(find_peer_context->peer_min_heap);
1396 GNUNET_free(find_peer_context);
1397 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Churn round %u of %llu finished, scheduling next GET round.\n", current_churn_round, churn_rounds);
1398 if (dhtlog_handle != NULL)
1400 topo_ctx = GNUNET_malloc(sizeof(struct TopologyIteratorContext));
1401 topo_ctx->cont = &do_get;
1402 topo_ctx->cls = all_gets;
1403 topo_ctx->timeout = DEFAULT_GET_TIMEOUT;
1404 topo_ctx->peers_seen = GNUNET_CONTAINER_multihashmap_create(num_peers);
1405 die_task = GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_relative_add(GNUNET_TIME_relative_add(DEFAULT_GET_TIMEOUT, all_get_timeout), DEFAULT_TOPOLOGY_CAPTURE_TIMEOUT),
1406 &end_badly, "from do gets (count_peers_churn_cb)");
1407 GNUNET_SCHEDULER_add_now(&capture_current_topology, topo_ctx);
1411 die_task = GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_relative_add(GNUNET_TIME_relative_add(DEFAULT_GET_TIMEOUT, all_get_timeout), DEFAULT_TOPOLOGY_CAPTURE_TIMEOUT),
1412 &end_badly, "from do gets (count_peers_churn_cb)");
1413 GNUNET_SCHEDULER_add_now(&do_get, all_gets);
1420 * Set up a single find peer request for each peer in the topology. Do this
1421 * until the settle time is over, limited by the number of outstanding requests
1422 * and the time allowed for each one!
1425 schedule_churn_find_peer_requests (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
1427 struct FindPeerContext *find_peer_ctx = cls;
1428 struct TestFindPeer *test_find_peer;
1429 struct PeerCount *peer_count;
1432 if (find_peer_ctx->previous_peers == 0) /* First time, go slowly */
1433 find_peer_ctx->total = 1;
1434 else if (find_peer_ctx->current_peers - find_peer_ctx->previous_peers < MIN_FIND_PEER_CUTOFF)
1435 find_peer_ctx->total = find_peer_ctx->total / 2;
1436 else if (find_peer_ctx->current_peers - find_peer_ctx->previous_peers > MAX_FIND_PEER_CUTOFF) /* Found LOTS of peers, still go slowly */
1437 find_peer_ctx->total = find_peer_ctx->last_sent - (find_peer_ctx->last_sent / 4);
1439 find_peer_ctx->total = find_peer_ctx->last_sent * 4;
1441 if (find_peer_ctx->total > max_outstanding_find_peers)
1442 find_peer_ctx->total = max_outstanding_find_peers;
1444 find_peer_ctx->last_sent = find_peer_ctx->total;
1445 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Sending %u find peer messages (after churn)\n", find_peer_ctx->total);
1447 if (find_peer_ctx->total > 0)
1448 find_peer_offset = GNUNET_TIME_relative_divide(find_peer_delay, find_peer_ctx->total);
1451 find_peer_ctx->previous_peers = find_peer_ctx->current_peers;
1452 find_peer_ctx->current_peers = 0;
1453 GNUNET_TESTING_get_topology (pg, &count_peers_churn_cb, find_peer_ctx);
1457 for (i = 0; i < find_peer_ctx->total; i++)
1459 test_find_peer = GNUNET_malloc(sizeof(struct TestFindPeer));
1460 /* If we have sent requests, choose peers with a low number of connections to send requests from */
1461 peer_count = GNUNET_CONTAINER_heap_remove_root(find_peer_ctx->peer_min_heap);
1462 GNUNET_assert(peer_count != NULL);
1463 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Sending find peer request from peer with %u connections\n", peer_count->count);
1464 GNUNET_CONTAINER_multihashmap_remove(find_peer_ctx->peer_hash, &peer_count->peer_id.hashPubKey, peer_count);
1465 test_find_peer->daemon = GNUNET_TESTING_daemon_get_by_id(pg, &peer_count->peer_id);
1466 GNUNET_assert(test_find_peer->daemon != NULL);
1467 test_find_peer->find_peer_context = find_peer_ctx;
1468 GNUNET_SCHEDULER_add_delayed(GNUNET_TIME_relative_multiply(find_peer_offset, i), &send_find_peer_request, test_find_peer);
1471 if ((find_peer_ctx->peer_hash == NULL) && (find_peer_ctx->peer_min_heap == NULL))
1473 find_peer_ctx->peer_hash = GNUNET_CONTAINER_multihashmap_create(num_peers);
1474 find_peer_ctx->peer_min_heap = GNUNET_CONTAINER_heap_create(GNUNET_CONTAINER_HEAP_ORDER_MIN);
1478 GNUNET_CONTAINER_multihashmap_iterate(find_peer_ctx->peer_hash, &remove_peer_count, find_peer_ctx);
1479 GNUNET_CONTAINER_multihashmap_destroy(find_peer_ctx->peer_hash);
1480 find_peer_ctx->peer_hash = GNUNET_CONTAINER_multihashmap_create(num_peers);
1483 GNUNET_assert(0 == GNUNET_CONTAINER_multihashmap_size(find_peer_ctx->peer_hash));
1484 GNUNET_assert(0 == GNUNET_CONTAINER_heap_get_size(find_peer_ctx->peer_min_heap));
1487 static void schedule_churn_get_topology (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
1489 struct FindPeerContext *find_peer_context = cls;
1490 GNUNET_TESTING_get_topology (pg, &count_peers_churn_cb, find_peer_context);
1494 * Called when churning of the topology has finished.
1496 * @param cls closure unused
1497 * @param emsg NULL on success, or a printable error on failure
1499 static void churn_complete (void *cls, const char *emsg)
1501 struct FindPeerContext *find_peer_context = cls;
1502 struct PeerCount *peer_count;
1504 struct GNUNET_TESTING_Daemon *temp_daemon;
1505 struct TopologyIteratorContext *topo_ctx;
1506 struct GNUNET_TIME_Relative calc_timeout;
1511 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Ending test, churning of peers failed with error `%s'", emsg);
1512 GNUNET_SCHEDULER_add_now(&end_badly, (void *)emsg);
1517 * If we switched any peers on, we have to somehow force connect the new peer to
1518 * SOME bootstrap peer in the network. First schedule a task to find all peers
1519 * with no connections, then choose a random peer for each and connect them.
1521 if (find_peer_context != NULL)
1523 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "We have churned on some peers, so we must schedule find peer requests for them!\n");
1525 for (i = 0; i < num_peers; i ++)
1527 temp_daemon = GNUNET_TESTING_daemon_get(pg, i);
1528 if (GNUNET_YES == GNUNET_TESTING_daemon_running(temp_daemon))
1530 peer_count = GNUNET_malloc (sizeof(struct PeerCount));
1531 memcpy(&peer_count->peer_id, &temp_daemon->id, sizeof(struct GNUNET_PeerIdentity));
1532 GNUNET_assert(peer_count->count == 0);
1533 peer_count->heap_node = GNUNET_CONTAINER_heap_insert(find_peer_context->peer_min_heap, peer_count, peer_count->count);
1534 GNUNET_CONTAINER_multihashmap_put(find_peer_context->peer_hash, &temp_daemon->id.hashPubKey, peer_count, GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY);
1538 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Added %d peers to heap, total size %d\n", count_added, GNUNET_CONTAINER_heap_get_size(find_peer_context->peer_min_heap));
1539 GNUNET_SCHEDULER_add_delayed(DEFAULT_PEER_DISCONNECT_TIMEOUT, &schedule_churn_get_topology, find_peer_context);
1540 //GNUNET_TESTING_get_topology (pg, &count_peers_churn_cb, find_peer_context);
1544 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Only churned off peers, no find peer requests, scheduling more gets (after allowing time for peers to disconnect properly!)...\n");
1545 if (dhtlog_handle != NULL)
1547 topo_ctx = GNUNET_malloc(sizeof(struct TopologyIteratorContext));
1548 topo_ctx->cont = &do_get;
1549 topo_ctx->cls = all_gets;
1550 topo_ctx->timeout = DEFAULT_GET_TIMEOUT;
1551 topo_ctx->peers_seen = GNUNET_CONTAINER_multihashmap_create(num_peers);
1552 calc_timeout = GNUNET_TIME_relative_add(DEFAULT_GET_TIMEOUT, all_get_timeout);
1553 calc_timeout = GNUNET_TIME_relative_add(calc_timeout, DEFAULT_TOPOLOGY_CAPTURE_TIMEOUT);
1554 calc_timeout = GNUNET_TIME_relative_add(calc_timeout, DEFAULT_PEER_DISCONNECT_TIMEOUT);
1555 die_task = GNUNET_SCHEDULER_add_delayed (calc_timeout,
1556 &end_badly, "from do gets (churn_complete)");
1557 GNUNET_SCHEDULER_add_delayed(DEFAULT_PEER_DISCONNECT_TIMEOUT, &capture_current_topology, topo_ctx);
1561 calc_timeout = GNUNET_TIME_relative_add(DEFAULT_GET_TIMEOUT, all_get_timeout);
1562 calc_timeout = GNUNET_TIME_relative_add(calc_timeout, DEFAULT_PEER_DISCONNECT_TIMEOUT);
1563 die_task = GNUNET_SCHEDULER_add_delayed (calc_timeout,
1564 &end_badly, "from do gets (churn_complete)");
1565 if (dhtlog_handle != NULL)
1566 dhtlog_handle->insert_round(DHT_ROUND_GET, rounds_finished);
1567 GNUNET_SCHEDULER_add_delayed(DEFAULT_PEER_DISCONNECT_TIMEOUT, &do_get, all_gets);
1573 * Decide how many peers to turn on or off in this round, make sure the
1574 * numbers actually make sense, then do so. This function sets in motion
1575 * churn, find peer requests for newly joined peers, and issuing get
1576 * requests once the new peers have done so.
1578 * @param cls closure (unused)
1579 * @param tc task context (unused)
1582 churn_peers (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
1584 unsigned int count_running;
1585 unsigned int churn_up;
1586 unsigned int churn_down;
1587 struct GNUNET_TIME_Relative timeout;
1588 struct FindPeerContext *find_peer_context;
1590 churn_up = churn_down = 0;
1591 count_running = GNUNET_TESTING_daemons_running(pg);
1592 if (count_running > churn_array[current_churn_round])
1593 churn_down = count_running - churn_array[current_churn_round];
1594 else if (count_running < churn_array[current_churn_round])
1595 churn_up = churn_array[current_churn_round] - count_running;
1597 GNUNET_log(GNUNET_ERROR_TYPE_DEBUG, "Not churning any peers, topology unchanged.\n");
1599 if (churn_up > num_peers - count_running)
1601 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Churn file specified %u peers (up); only have %u!", churn_array[current_churn_round], num_peers);
1602 churn_up = num_peers - count_running;
1604 else if (churn_down > count_running)
1606 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Churn file specified %u peers (down); only have %u!", churn_array[current_churn_round], count_running);
1607 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "This will leave NO peers running (mistake in churn configuration?)!");
1608 churn_down = count_running;
1610 //timeout = GNUNET_TIME_relative_multiply(seconds_per_peer_start, churn_up > 0 ? churn_up : churn_down);
1611 //timeout = GNUNET_TIME_relative_multiply (seconds_per_peer_start, churn_up > 0 ? churn_up : churn_down);
1612 timeout = GNUNET_TIME_relative_multiply(DEFAULT_TIMEOUT, 2); /* FIXME: Lack of intelligent choice here */
1613 find_peer_context = NULL;
1614 if (churn_up > 0) /* Only need to do find peer requests if we turned new peers on */
1616 find_peer_context = GNUNET_malloc(sizeof(struct FindPeerContext));
1617 find_peer_context->count_peers_cb = &count_peers_churn_cb;
1618 find_peer_context->previous_peers = 0;
1619 find_peer_context->current_peers = 0;
1620 find_peer_context->endtime = GNUNET_TIME_relative_to_absolute(timeout);
1621 find_peer_context->peer_hash = GNUNET_CONTAINER_multihashmap_create(num_peers);
1622 find_peer_context->peer_min_heap = GNUNET_CONTAINER_heap_create(GNUNET_CONTAINER_HEAP_ORDER_MIN);
1624 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "churn_peers: want %u total, %u running, starting %u, stopping %u\n",
1625 churn_array[current_churn_round], count_running, churn_up, churn_down);
1626 GNUNET_TESTING_daemons_churn (pg, churn_down, churn_up, timeout, &churn_complete, find_peer_context);
1627 current_churn_round++;
1631 * Task to release DHT handle associated with GET request.
1634 get_stop_finished (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
1636 struct TestGetContext *test_get = cls;
1637 struct TopologyIteratorContext *topo_ctx;
1639 /* The dht_handle may be null if this get was scheduled from a down peer */
1640 if (test_get->dht_handle != NULL)
1642 GNUNET_DHT_disconnect(test_get->dht_handle);
1643 outstanding_gets--; /* GET is really finished */
1644 test_get->dht_handle = NULL;
1647 /* Reset the uid (which item to search for) and the daemon (which peer to search from) for later get request iterations */
1648 if (get_from_same == GNUNET_NO)
1650 test_get->uid = GNUNET_CRYPTO_random_u32(GNUNET_CRYPTO_QUALITY_WEAK, num_puts);
1651 test_get->daemon = GNUNET_TESTING_daemon_get(pg, GNUNET_CRYPTO_random_u32(GNUNET_CRYPTO_QUALITY_WEAK, num_peers));
1655 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "%d gets succeeded, %d gets failed!\n", gets_completed, gets_failed);
1657 update_meter(get_meter);
1658 if ((gets_completed + gets_failed == num_gets) && (outstanding_gets == 0))
1660 fprintf(stderr, "Canceling die task (get_stop_finished) %llu gets completed, %llu gets failed\n", gets_completed, gets_failed);
1661 GNUNET_SCHEDULER_cancel(die_task);
1662 reset_meter(put_meter);
1663 reset_meter(get_meter);
1666 * 1) Testing is completely finished, call the topology iteration dealy and die
1667 * 2) Testing is not finished, churn the network and do gets again (current_churn_round < churn_rounds)
1668 * 3) Testing is not finished, reschedule all the PUTS *and* GETS again (num_rounds > 1)
1670 if (rounds_finished == total_rounds - 1) /* Everything is finished, end testing */
1672 if (dhtlog_handle != NULL)
1674 topo_ctx = GNUNET_malloc(sizeof(struct TopologyIteratorContext));
1675 topo_ctx->cont = &log_dht_statistics;
1676 topo_ctx->peers_seen = GNUNET_CONTAINER_multihashmap_create(num_peers);
1677 GNUNET_SCHEDULER_add_now(&capture_current_topology, topo_ctx);
1680 GNUNET_SCHEDULER_add_now (&finish_testing, NULL);
1682 else if (current_churn_round < churns_per_round * (rounds_finished + 1)) /* Do next round of churn */
1684 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Current churn round %u, real round %u, scheduling next round of churn.\n", current_churn_round, rounds_finished + 1);
1688 if (dhtlog_handle != NULL)
1689 dhtlog_handle->insert_round(DHT_ROUND_CHURN, rounds_finished);
1691 GNUNET_SCHEDULER_add_now(&churn_peers, NULL);
1693 else if (rounds_finished < total_rounds - 1) /* Start a new complete round */
1698 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Round %u of %llu finished, scheduling next round.\n", rounds_finished, total_rounds);
1700 /** We reset the peer daemon for puts and gets on each disconnect, so all we need to do is start another round! */
1701 if (GNUNET_YES == in_dht_replication) /* Replication done in DHT, don't redo puts! */
1703 if (dhtlog_handle != NULL)
1704 dhtlog_handle->insert_round(DHT_ROUND_GET, rounds_finished);
1706 die_task = GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_relative_add(GNUNET_TIME_relative_add(GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, round_delay), all_get_timeout), DEFAULT_TOPOLOGY_CAPTURE_TIMEOUT),
1707 &end_badly, "from do gets (next round)");
1708 GNUNET_SCHEDULER_add_delayed(GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, round_delay), &do_get, all_gets);
1712 if (dhtlog_handle != NULL)
1713 dhtlog_handle->insert_round(DHT_ROUND_NORMAL, rounds_finished);
1714 die_task = GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_relative_add(GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, round_delay), GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, num_puts * 2)),
1715 &end_badly, "from do puts");
1716 GNUNET_SCHEDULER_add_delayed(GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, round_delay), &do_put, all_puts);
1723 * Task to release get handle.
1726 get_stop_task (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
1728 struct TestGetContext *test_get = cls;
1730 if (tc->reason == GNUNET_SCHEDULER_REASON_TIMEOUT)
1732 GNUNET_assert(test_get->get_handle != NULL);
1733 GNUNET_DHT_get_stop(test_get->get_handle);
1734 test_get->get_handle = NULL;
1735 test_get->disconnect_task = GNUNET_SCHEDULER_NO_TASK;
1736 GNUNET_SCHEDULER_add_now (&get_stop_finished, test_get);
1740 * Iterator called if the GET request initiated returns a response.
1742 * @param cls closure
1743 * @param exp when will this value expire
1744 * @param key key of the result
1745 * @param get_path NULL-terminated array of pointers
1746 * to the peers on reverse GET path (or NULL if not recorded)
1747 * @param put_path NULL-terminated array of pointers
1748 * to the peers on the PUT path (or NULL if not recorded)
1749 * @param type type of the result
1750 * @param size number of bytes in data
1751 * @param data pointer to the result data
1754 get_result_iterator (void *cls,
1755 struct GNUNET_TIME_Absolute exp,
1756 const GNUNET_HashCode * key,
1757 const struct GNUNET_PeerIdentity * const *get_path,
1758 const struct GNUNET_PeerIdentity * const *put_path,
1759 enum GNUNET_BLOCK_Type type,
1763 struct TestGetContext *test_get = cls;
1765 if (test_get->succeeded == GNUNET_YES)
1766 return; /* Get has already been successful, probably ending now */
1768 if (0 != memcmp(&known_keys[test_get->uid], key, sizeof (GNUNET_HashCode))) /* || (0 != memcmp(original_data, data, sizeof(original_data))))*/
1771 GNUNET_log (GNUNET_ERROR_TYPE_WARNING, "Key or data is not the same as was inserted!\n");
1776 test_get->succeeded = GNUNET_YES;
1779 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Received correct GET response!\n");
1781 GNUNET_SCHEDULER_cancel(test_get->disconnect_task);
1782 GNUNET_SCHEDULER_add_continuation(&get_stop_task, test_get, GNUNET_SCHEDULER_REASON_PREREQ_DONE);
1788 * Set up some data, and call API PUT function
1791 do_get (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
1793 struct TestGetContext *test_get = cls;
1797 GNUNET_SCHEDULER_cancel(die_task);
1798 GNUNET_SCHEDULER_add_now(&finish_testing, NULL);
1801 if (test_get == NULL)
1802 return; /* End of the list */
1804 /* Set this here in case we are re-running gets */
1805 test_get->succeeded = GNUNET_NO;
1807 if (GNUNET_YES != GNUNET_TESTING_daemon_running(test_get->daemon)) /* If the peer has been churned off, don't try issuing request from it! */
1809 GNUNET_log(GNUNET_ERROR_TYPE_DEBUG, "Peer we should issue get request from is down, skipping.\n");
1811 GNUNET_SCHEDULER_add_now (&get_stop_finished, test_get);
1812 GNUNET_SCHEDULER_add_now (&do_get, test_get->next);
1816 /* Check if more gets are outstanding than should be */
1817 if (outstanding_gets > max_outstanding_gets)
1819 GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_MILLISECONDS, 200), &do_get, test_get);
1823 /* Connect to the first peer's DHT */
1824 test_get->dht_handle = GNUNET_DHT_connect(test_get->daemon->cfg, 10);
1825 GNUNET_assert(test_get->dht_handle != NULL);
1828 /* Insert the data at the first peer */
1829 test_get->get_handle = GNUNET_DHT_get_start(test_get->dht_handle,
1831 GNUNET_BLOCK_TYPE_TEST,
1832 &known_keys[test_get->uid],
1837 &get_result_iterator,
1841 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Starting get for uid %u from peer %s\n",
1843 test_get->daemon->shortname);
1845 test_get->disconnect_task = GNUNET_SCHEDULER_add_delayed(get_timeout, &get_stop_task, test_get);
1847 /* Schedule the next request in the linked list of get requests */
1848 GNUNET_SCHEDULER_add_now (&do_get, test_get->next);
1852 * Called when the PUT request has been transmitted to the DHT service.
1853 * Schedule the GET request for some time in the future.
1856 put_finished (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
1858 struct TestPutContext *test_put = cls;
1859 struct TopologyIteratorContext *topo_ctx;
1863 if (tc->reason == GNUNET_SCHEDULER_REASON_TIMEOUT)
1864 fprintf(stderr, "PUT Request failed!\n");
1866 /* Reset the daemon (which peer to insert at) for later put request iterations */
1867 if (replicate_same == GNUNET_NO)
1868 test_put->daemon = GNUNET_TESTING_daemon_get(pg, GNUNET_CRYPTO_random_u32(GNUNET_CRYPTO_QUALITY_WEAK, num_peers));
1870 GNUNET_SCHEDULER_cancel(test_put->disconnect_task);
1871 test_put->disconnect_task = GNUNET_SCHEDULER_add_now(&put_disconnect_task, test_put);
1872 if (GNUNET_YES == update_meter(put_meter))
1874 GNUNET_assert(outstanding_puts == 0);
1875 GNUNET_SCHEDULER_cancel (die_task);
1876 if (dhtlog_handle != NULL)
1878 topo_ctx = GNUNET_malloc(sizeof(struct TopologyIteratorContext));
1879 topo_ctx->cont = &do_get;
1880 topo_ctx->cls = all_gets;
1881 topo_ctx->timeout = DEFAULT_GET_TIMEOUT;
1882 topo_ctx->peers_seen = GNUNET_CONTAINER_multihashmap_create(num_peers);
1883 die_task = GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_relative_add(GNUNET_TIME_relative_add(DEFAULT_GET_TIMEOUT, all_get_timeout), DEFAULT_TOPOLOGY_CAPTURE_TIMEOUT),
1884 &end_badly, "from do gets (put finished)");
1885 GNUNET_SCHEDULER_add_now(&capture_current_topology, topo_ctx);
1889 fprintf(stderr, "Scheduling die task (put finished)\n");
1890 die_task = GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_relative_add(DEFAULT_GET_TIMEOUT, all_get_timeout),
1891 &end_badly, "from do gets (put finished)");
1892 GNUNET_SCHEDULER_add_delayed(DEFAULT_GET_TIMEOUT, &do_get, all_gets);
1899 * Set up some data, and call API PUT function
1902 do_put (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
1904 struct TestPutContext *test_put = cls;
1905 char data[test_data_size]; /* Made up data to store */
1909 if (test_put == NULL)
1910 return; /* End of list */
1912 if (GNUNET_YES != GNUNET_TESTING_daemon_running(test_put->daemon)) /* If the peer has been churned off, don't try issuing request from it! */
1914 GNUNET_log(GNUNET_ERROR_TYPE_DEBUG, "Peer we should issue put request at is down, skipping.\n");
1915 update_meter(put_meter);
1916 GNUNET_SCHEDULER_add_now (&do_put, test_put->next);
1920 for (i = 0; i < sizeof(data); i++)
1922 memset(&data[i], GNUNET_CRYPTO_random_u32(GNUNET_CRYPTO_QUALITY_WEAK, UINT32_MAX), 1);
1925 if (outstanding_puts > max_outstanding_puts)
1927 GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_MILLISECONDS, 200), &do_put, test_put);
1932 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Starting put for uid %u from peer %s\n",
1934 test_put->daemon->shortname);
1936 test_put->dht_handle = GNUNET_DHT_connect(test_put->daemon->cfg, 10);
1938 GNUNET_assert(test_put->dht_handle != NULL);
1940 GNUNET_DHT_put(test_put->dht_handle,
1941 &known_keys[test_put->uid],
1944 GNUNET_BLOCK_TYPE_TEST,
1946 GNUNET_TIME_UNIT_FOREVER_ABS,
1948 &put_finished, test_put);
1949 test_put->disconnect_task = GNUNET_SCHEDULER_add_delayed(GNUNET_TIME_relative_get_forever(), &put_disconnect_task, test_put);
1950 rand = GNUNET_CRYPTO_random_u32(GNUNET_CRYPTO_QUALITY_WEAK, 2);
1951 GNUNET_SCHEDULER_add_delayed(GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, rand), &do_put, test_put->next);
1955 schedule_find_peer_requests (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc);
1958 setup_malicious_peers (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc);
1961 * Given a number of total peers and a bucket size, estimate the number of
1962 * connections in a perfect kademlia topology.
1964 static unsigned int connection_estimate(unsigned int peer_count, unsigned int bucket_size)
1967 unsigned int filled;
1971 while (i >= bucket_size)
1976 filled++; /* Add one filled bucket to account for one "half full" and some miscellaneous */
1977 return filled * bucket_size * peer_count;
1983 * Callback for iterating over all the peer connections of a peer group.
1986 count_peers_cb (void *cls,
1987 const struct GNUNET_PeerIdentity *first,
1988 const struct GNUNET_PeerIdentity *second,
1991 struct FindPeerContext *find_peer_context = cls;
1992 if ((first != NULL) && (second != NULL))
1994 add_new_connection(find_peer_context, first, second);
1995 find_peer_context->current_peers++;
1999 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Peer count finished (%u connections), %u new peers, connection estimate %u (target %u)\n",
2000 find_peer_context->current_peers,
2001 find_peer_context->current_peers - find_peer_context->previous_peers,
2002 connection_estimate(num_peers, DEFAULT_BUCKET_SIZE),
2003 target_total_connections);
2005 if ((find_peer_context->last_sent < 8) ||
2006 ((find_peer_context->current_peers - find_peer_context->previous_peers > FIND_PEER_THRESHOLD) &&
2007 (find_peer_context->current_peers < 2 * connection_estimate(num_peers, DEFAULT_BUCKET_SIZE)) &&
2008 (GNUNET_TIME_absolute_get_remaining(find_peer_context->endtime).rel_value > 0) &&
2009 (find_peer_context->current_peers < target_total_connections)))
2011 GNUNET_SCHEDULER_add_now(&schedule_find_peer_requests, find_peer_context);
2015 GNUNET_CONTAINER_multihashmap_iterate(find_peer_context->peer_hash, &remove_peer_count, find_peer_context);
2016 GNUNET_CONTAINER_multihashmap_destroy(find_peer_context->peer_hash);
2017 GNUNET_CONTAINER_heap_destroy(find_peer_context->peer_min_heap);
2018 GNUNET_free(find_peer_context);
2019 fprintf(stderr, "Not sending any more find peer requests.\n");
2022 if (GNUNET_YES == malicious_after_settle)
2024 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "calling setup_malicious_peers\n");
2025 GNUNET_SCHEDULER_add_now(&setup_malicious_peers, NULL);
2034 * Set up a single find peer request for each peer in the topology. Do this
2035 * until the settle time is over, limited by the number of outstanding requests
2036 * and the time allowed for each one!
2039 schedule_find_peer_requests (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
2041 struct FindPeerContext *find_peer_ctx = cls;
2042 struct TestFindPeer *test_find_peer;
2043 struct PeerCount *peer_count;
2047 if (find_peer_ctx->previous_peers == 0) /* First time, go slowly */
2048 find_peer_ctx->total = 1;
2049 else if (find_peer_ctx->current_peers - find_peer_ctx->previous_peers > MAX_FIND_PEER_CUTOFF) /* Found LOTS of peers, still go slowly */
2050 find_peer_ctx->total = find_peer_ctx->last_sent - (find_peer_ctx->last_sent / 8);
2052 find_peer_ctx->total = find_peer_ctx->last_sent * 2;
2054 if (find_peer_ctx->total > max_outstanding_find_peers)
2055 find_peer_ctx->total = max_outstanding_find_peers;
2057 if (find_peer_ctx->total > num_peers) /* Don't try to send more messages than we have peers! */
2058 find_peer_ctx->total = num_peers;
2060 find_peer_ctx->last_sent = find_peer_ctx->total;
2061 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Sending %u find peer messages (goal at least %u connections)\n", find_peer_ctx->total, target_total_connections);
2063 find_peer_offset = GNUNET_TIME_relative_divide(find_peer_delay, find_peer_ctx->total);
2064 for (i = 0; i < find_peer_ctx->total; i++)
2066 test_find_peer = GNUNET_malloc(sizeof(struct TestFindPeer));
2067 if (find_peer_ctx->previous_peers == 0) /* If we haven't sent any requests yet, choose random peers */
2070 * Attempt to spread find peer requests across even sections of the peer address
2071 * space. Choose basically 1 peer in every num_peers / max_outstanding_requests
2072 * each time, then offset it by a randomish value.
2074 * For instance, if num_peers is 100 and max_outstanding is 10, first chosen peer
2075 * will be between 0 - 10, second between 10 - 20, etc.
2077 random = (num_peers / find_peer_ctx->total) * i;
2078 random = random + GNUNET_CRYPTO_random_u32(GNUNET_CRYPTO_QUALITY_WEAK, (num_peers / find_peer_ctx->total));
2079 if (random >= num_peers)
2081 random = random - num_peers;
2084 random = GNUNET_CRYPTO_random_u32(GNUNET_CRYPTO_QUALITY_WEAK, num_peers);
2086 test_find_peer->daemon = GNUNET_TESTING_daemon_get(pg, random);
2088 else /* If we have sent requests, choose peers with a low number of connections to send requests from */
2090 peer_count = GNUNET_CONTAINER_heap_remove_root(find_peer_ctx->peer_min_heap);
2091 GNUNET_assert(GNUNET_YES == GNUNET_CONTAINER_multihashmap_remove(find_peer_ctx->peer_hash, &peer_count->peer_id.hashPubKey, peer_count));
2092 test_find_peer->daemon = GNUNET_TESTING_daemon_get_by_id(pg, &peer_count->peer_id);
2093 GNUNET_assert(test_find_peer->daemon != NULL);
2096 test_find_peer->find_peer_context = find_peer_ctx;
2097 GNUNET_SCHEDULER_add_delayed(GNUNET_TIME_relative_multiply(find_peer_offset, i), &send_find_peer_request, test_find_peer);
2100 if ((find_peer_ctx->peer_hash == NULL) && (find_peer_ctx->peer_min_heap == NULL))
2102 find_peer_ctx->peer_hash = GNUNET_CONTAINER_multihashmap_create(num_peers);
2103 find_peer_ctx->peer_min_heap = GNUNET_CONTAINER_heap_create(GNUNET_CONTAINER_HEAP_ORDER_MIN);
2107 GNUNET_CONTAINER_multihashmap_iterate(find_peer_ctx->peer_hash, &remove_peer_count, find_peer_ctx);
2108 GNUNET_CONTAINER_multihashmap_destroy(find_peer_ctx->peer_hash);
2109 find_peer_ctx->peer_hash = GNUNET_CONTAINER_multihashmap_create(num_peers);
2112 GNUNET_assert(0 == GNUNET_CONTAINER_multihashmap_size(find_peer_ctx->peer_hash));
2113 GNUNET_assert(0 == GNUNET_CONTAINER_heap_get_size(find_peer_ctx->peer_min_heap));
2118 * Convert unique ID to hash code.
2120 * @param uid unique ID to convert
2121 * @param hash set to uid (extended with zeros)
2124 hash_from_uid (uint32_t uid, GNUNET_HashCode *hash)
2126 memset (hash, 0, sizeof (GNUNET_HashCode));
2127 *((uint32_t *) hash) = uid;
2132 * Set up all of the put and get operations we want to do
2133 * in the current round. Allocate data structure for each,
2134 * add to list, then schedule the actual PUT operations.
2137 setup_puts_and_gets (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
2140 struct TestPutContext *test_put;
2141 struct TestGetContext *test_get;
2143 GNUNET_HashCode uid_hash;
2145 int remember[num_puts][num_peers];
2146 memset(&remember, 0, sizeof(int) * num_puts * num_peers);
2148 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "in setup_puts_and_gets\n");
2149 known_keys = GNUNET_malloc(sizeof(GNUNET_HashCode) * num_puts);
2150 for (i = 0; i < num_puts; i++)
2152 test_put = GNUNET_malloc(sizeof(struct TestPutContext));
2154 GNUNET_CRYPTO_hash_create_random (GNUNET_CRYPTO_QUALITY_WEAK, &known_keys[i]);
2155 /* Set first X bits to match the chosen sybil location if we want to do the sybil attack! */
2156 if (GNUNET_YES == malicious_sybil)
2158 memcpy(&known_keys[i], &sybil_target, sizeof(GNUNET_HashCode) / 2);
2159 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Distance between sybil location and key is %d\n", GNUNET_CRYPTO_hash_matching_bits(&known_keys[i], &sybil_target));
2161 temp_peer = GNUNET_CRYPTO_random_u32(GNUNET_CRYPTO_QUALITY_WEAK, num_peers);
2162 test_put->daemon = GNUNET_TESTING_daemon_get(pg, temp_peer);
2163 /* Don't start PUTs at malicious peers! */
2164 if (malicious_bloom != NULL)
2166 hash_from_uid(temp_peer, &uid_hash);
2167 while (GNUNET_YES == GNUNET_CONTAINER_bloomfilter_test(malicious_bloom, &uid_hash))
2169 temp_peer = GNUNET_CRYPTO_random_u32(GNUNET_CRYPTO_QUALITY_WEAK, num_peers);
2170 hash_from_uid(temp_peer, &uid_hash);
2171 test_put->daemon = GNUNET_TESTING_daemon_get(pg, temp_peer);
2175 test_put->next = all_puts;
2176 all_puts = test_put;
2179 for (i = 0; i < num_gets; i++)
2181 test_get = GNUNET_malloc(sizeof(struct TestGetContext));
2182 test_get->uid = GNUNET_CRYPTO_random_u32(GNUNET_CRYPTO_QUALITY_WEAK, num_puts);
2184 while (remember[test_get->uid][temp_daemon] == 1)
2185 temp_daemon = GNUNET_CRYPTO_random_u32(GNUNET_CRYPTO_QUALITY_WEAK, num_peers);
2186 remember[test_get->uid][temp_daemon] = 1;
2188 temp_peer = GNUNET_CRYPTO_random_u32(GNUNET_CRYPTO_QUALITY_WEAK, num_peers);
2189 test_get->daemon = GNUNET_TESTING_daemon_get(pg, temp_peer);
2190 /* Don't start GETs at malicious peers! */
2191 if (malicious_bloom != NULL)
2193 hash_from_uid(temp_peer, &uid_hash);
2194 while (GNUNET_YES == GNUNET_CONTAINER_bloomfilter_test(malicious_bloom, &uid_hash))
2196 temp_peer = GNUNET_CRYPTO_random_u32(GNUNET_CRYPTO_QUALITY_WEAK, num_peers);
2197 hash_from_uid(temp_peer, &uid_hash);
2198 test_get->daemon = GNUNET_TESTING_daemon_get(pg, temp_peer);
2201 test_get->next = all_gets;
2202 all_gets = test_get;
2205 /*GNUNET_SCHEDULER_cancel (die_task);*/
2206 die_task = GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, num_puts * 2),
2207 &end_badly, "from do puts");
2208 GNUNET_SCHEDULER_add_now (&do_put, all_puts);
2213 * Set up some all of the put and get operations we want
2214 * to do. Allocate data structure for each, add to list,
2215 * then call actual insert functions.
2218 continue_puts_and_gets (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
2222 struct TopologyIteratorContext *topo_ctx;
2223 struct FindPeerContext *find_peer_context;
2224 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "In continue_puts_and_gets\n");
2225 if (dhtlog_handle != NULL)
2227 if (settle_time >= 180 * 2)
2228 max = (settle_time / 180) - 2;
2231 for (i = 1; i < max; i++)
2233 topo_ctx = GNUNET_malloc(sizeof(struct TopologyIteratorContext));
2234 topo_ctx->current_iteration = i;
2235 topo_ctx->total_iterations = max;
2236 topo_ctx->peers_seen = GNUNET_CONTAINER_multihashmap_create(num_peers);
2237 //fprintf(stderr, "scheduled topology iteration in %d minutes\n", i);
2238 GNUNET_SCHEDULER_add_delayed(GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_MINUTES, i * 3), &capture_current_topology, topo_ctx);
2240 topo_ctx = GNUNET_malloc(sizeof(struct TopologyIteratorContext));
2241 topo_ctx->cont = &setup_puts_and_gets;
2242 topo_ctx->peers_seen = GNUNET_CONTAINER_multihashmap_create(num_peers);
2243 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "setting setup_puts_and_gets for %d seconds in the future\n", settle_time + 90);
2244 GNUNET_SCHEDULER_add_delayed(GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, (settle_time + 90)), &capture_current_topology, topo_ctx);
2247 GNUNET_SCHEDULER_add_delayed(GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, (settle_time + 90)), &setup_puts_and_gets, NULL);
2249 if (dhtlog_handle != NULL)
2250 dhtlog_handle->insert_round(DHT_ROUND_NORMAL, rounds_finished);
2253 if (GNUNET_YES != malicious_after_settle)
2255 GNUNET_SCHEDULER_add_now(&setup_malicious_peers, NULL);
2259 if (GNUNET_YES == do_find_peer)
2261 GNUNET_log(GNUNET_ERROR_TYPE_DEBUG, "Scheduling find peer requests during \"settle\" time.\n");
2262 find_peer_context = GNUNET_malloc(sizeof(struct FindPeerContext));
2263 find_peer_context->count_peers_cb = &count_peers_cb;
2264 find_peer_context->endtime = GNUNET_TIME_relative_to_absolute(GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, settle_time));
2265 GNUNET_SCHEDULER_add_now(&schedule_find_peer_requests, find_peer_context);
2269 GNUNET_log(GNUNET_ERROR_TYPE_DEBUG, "Assuming automatic DHT find peer requests.\n");
2274 * Task to release DHT handles
2277 malicious_disconnect_task (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
2279 struct MaliciousContext *ctx = cls;
2280 outstanding_malicious--;
2281 malicious_completed++;
2282 ctx->disconnect_task = GNUNET_SCHEDULER_NO_TASK;
2283 GNUNET_DHT_disconnect(ctx->dht_handle);
2284 ctx->dht_handle = NULL;
2287 if (malicious_completed == malicious_getters + malicious_putters + malicious_droppers)
2289 fprintf(stderr, "Finished setting all malicious peers up!\n");
2295 * Task to release DHT handles
2298 malicious_done_task (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
2300 struct MaliciousContext *ctx = cls;
2301 GNUNET_SCHEDULER_cancel(ctx->disconnect_task);
2302 GNUNET_SCHEDULER_add_now(&malicious_disconnect_task, ctx);
2306 * Set up some data, and call API PUT function
2309 set_malicious (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
2311 struct MaliciousContext *ctx = cls;
2313 if (outstanding_malicious > DEFAULT_MAX_OUTSTANDING_GETS)
2315 GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_MILLISECONDS, 100), &set_malicious, ctx);
2319 if (ctx->dht_handle == NULL)
2321 ctx->dht_handle = GNUNET_DHT_connect(ctx->daemon->cfg, 1);
2322 outstanding_malicious++;
2325 GNUNET_assert(ctx->dht_handle != NULL);
2329 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Setting peer %s malicious type %d\n",
2330 ctx->daemon->shortname, ctx->malicious_type);
2333 switch (ctx->malicious_type)
2335 case GNUNET_MESSAGE_TYPE_DHT_MALICIOUS_GET:
2336 GNUNET_DHT_set_malicious_getter(ctx->dht_handle, malicious_get_frequency);
2337 GNUNET_SCHEDULER_add_now (&malicious_done_task, ctx);
2339 case GNUNET_MESSAGE_TYPE_DHT_MALICIOUS_PUT:
2340 GNUNET_DHT_set_malicious_putter(ctx->dht_handle, malicious_put_frequency);
2341 GNUNET_SCHEDULER_add_now (&malicious_done_task, ctx);
2343 case GNUNET_MESSAGE_TYPE_DHT_MALICIOUS_DROP:
2344 GNUNET_DHT_set_malicious_dropper(ctx->dht_handle);
2345 GNUNET_SCHEDULER_add_now (&malicious_done_task, ctx);
2351 ctx->disconnect_task = GNUNET_SCHEDULER_add_delayed(GNUNET_TIME_UNIT_FOREVER_REL,
2352 &malicious_disconnect_task, ctx);
2358 * Choose the next peer from the peer group to set as malicious.
2359 * If we are doing a sybil attack, find the nearest peer to the
2360 * sybil location that has not already been set malicious. Otherwise
2361 * just choose a random not already chosen peer.
2363 * @param pg the peer group
2364 * @param bloom the bloomfilter which contains all peer already
2365 * chosen to be malicious
2368 choose_next_malicious (struct GNUNET_TESTING_PeerGroup *pg, struct GNUNET_CONTAINER_BloomFilter *bloom)
2374 struct GNUNET_TESTING_Daemon *temp_daemon;
2375 GNUNET_HashCode uid_hash;
2378 GNUNET_assert (bloom != NULL);
2380 if (GNUNET_YES == malicious_sybil)
2382 for (i = 0; i < num_peers; i++)
2384 temp_daemon = GNUNET_TESTING_daemon_get(pg, i);
2385 hash_from_uid(i, &uid_hash);
2386 /* Check if this peer matches the bloomfilter */
2387 if ((GNUNET_NO == GNUNET_TESTING_daemon_running(temp_daemon)) || (GNUNET_YES == GNUNET_CONTAINER_bloomfilter_test (bloom, &uid_hash)))
2390 bits_match = GNUNET_CRYPTO_hash_matching_bits (&temp_daemon->id.hashPubKey, &sybil_target);
2391 if (bits_match >= curr_distance)
2393 GNUNET_log(GNUNET_ERROR_TYPE_DEBUG, "Found nearer peer %s to %s, old matching bits %d, new %d\n", GNUNET_i2s(&temp_daemon->id), GNUNET_h2s(&sybil_target), curr_distance, bits_match);
2395 curr_distance = bits_match;
2401 nearest = GNUNET_CRYPTO_random_u32(GNUNET_CRYPTO_QUALITY_WEAK, num_peers);
2402 hash_from_uid(nearest, &uid_hash);
2403 while (GNUNET_YES == GNUNET_CONTAINER_bloomfilter_test (bloom, &uid_hash))
2405 nearest = GNUNET_CRYPTO_random_u32(GNUNET_CRYPTO_QUALITY_WEAK, num_peers);
2413 * Select randomly from set of known peers,
2414 * set the desired number of peers to the
2415 * proper malicious types.
2418 setup_malicious_peers (void *cls, const struct GNUNET_SCHEDULER_TaskContext * tc)
2420 struct MaliciousContext *ctx;
2422 uint32_t temp_daemon;
2423 GNUNET_HashCode uid_hash;
2425 for (i = 0; i < malicious_getters; i++)
2427 ctx = GNUNET_malloc(sizeof(struct MaliciousContext));
2428 temp_daemon = choose_next_malicious(pg, malicious_bloom);
2429 ctx->daemon = GNUNET_TESTING_daemon_get(pg, temp_daemon);
2430 hash_from_uid(temp_daemon, &uid_hash);
2431 GNUNET_CONTAINER_bloomfilter_add(malicious_bloom, &uid_hash);
2432 ctx->malicious_type = GNUNET_MESSAGE_TYPE_DHT_MALICIOUS_GET;
2433 GNUNET_SCHEDULER_add_now (&set_malicious, ctx);
2437 for (i = 0; i < malicious_putters; i++)
2439 ctx = GNUNET_malloc(sizeof(struct MaliciousContext));
2440 temp_daemon = choose_next_malicious(pg, malicious_bloom);
2441 ctx->daemon = GNUNET_TESTING_daemon_get(pg, temp_daemon);
2442 hash_from_uid(temp_daemon, &uid_hash);
2443 GNUNET_CONTAINER_bloomfilter_add(malicious_bloom, &uid_hash);
2444 ctx->malicious_type = GNUNET_MESSAGE_TYPE_DHT_MALICIOUS_PUT;
2445 GNUNET_SCHEDULER_add_now (&set_malicious, ctx);
2449 for (i = 0; i < malicious_droppers; i++)
2451 ctx = GNUNET_malloc(sizeof(struct MaliciousContext));
2452 temp_daemon = choose_next_malicious(pg, malicious_bloom);
2453 ctx->daemon = GNUNET_TESTING_daemon_get(pg, temp_daemon);
2454 hash_from_uid(temp_daemon, &uid_hash);
2455 GNUNET_CONTAINER_bloomfilter_add(malicious_bloom, &uid_hash);
2456 ctx->malicious_type = GNUNET_MESSAGE_TYPE_DHT_MALICIOUS_DROP;
2457 GNUNET_SCHEDULER_add_now (&set_malicious, ctx);
2463 * This function is called whenever a connection attempt is finished between two of
2464 * the started peers (started with GNUNET_TESTING_daemons_start). The total
2465 * number of times this function is called should equal the number returned
2466 * from the GNUNET_TESTING_connect_topology call.
2468 * The emsg variable is NULL on success (peers connected), and non-NULL on
2469 * failure (peers failed to connect).
2472 topology_callback (void *cls,
2473 const struct GNUNET_PeerIdentity *first,
2474 const struct GNUNET_PeerIdentity *second,
2476 const struct GNUNET_CONFIGURATION_Handle *first_cfg,
2477 const struct GNUNET_CONFIGURATION_Handle *second_cfg,
2478 struct GNUNET_TESTING_Daemon *first_daemon,
2479 struct GNUNET_TESTING_Daemon *second_daemon,
2482 struct TopologyIteratorContext *topo_ctx;
2485 total_connections++;
2487 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "connected peer %s to peer %s, distance %u\n",
2488 first_daemon->shortname,
2489 second_daemon->shortname,
2495 failed_connections++;
2496 GNUNET_log (GNUNET_ERROR_TYPE_WARNING, "Failed to connect peer %s to peer %s with error :\n%s\n",
2497 first_daemon->shortname,
2498 second_daemon->shortname, emsg);
2500 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Failed to connect peer %s to peer %s with error :\n%s\n",
2501 first_daemon->shortname,
2502 second_daemon->shortname, emsg);
2506 GNUNET_assert(peer_connect_meter != NULL);
2507 if (GNUNET_YES == update_meter(peer_connect_meter))
2510 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
2511 "Created %d total connections, which is our target number! Starting next phase of testing.\n",
2514 if (failed_connections > 0)
2515 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "While connecting, had %u failed connections.\n", failed_connections);
2516 if (dhtlog_handle != NULL)
2518 dhtlog_handle->update_connections (total_connections);
2519 dhtlog_handle->insert_topology(expected_connections);
2522 GNUNET_SCHEDULER_cancel (die_task);
2524 if ((dhtlog_handle != NULL) && (settle_time > 0))
2526 topo_ctx = GNUNET_malloc(sizeof(struct TopologyIteratorContext));
2527 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Setting continue gets and puts as topo_cont\n");
2528 topo_ctx->cont = &continue_puts_and_gets;
2529 topo_ctx->peers_seen = GNUNET_CONTAINER_multihashmap_create(num_peers);
2530 GNUNET_SCHEDULER_add_now(&capture_current_topology, topo_ctx);
2533 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "For some reason, NOT scheduling final topology capture (settle_time %d, dhtlog_handle %s)!\n", settle_time, dhtlog_handle);
2535 else if (total_connections + failed_connections == expected_connections)
2537 GNUNET_SCHEDULER_cancel (die_task);
2538 die_task = GNUNET_SCHEDULER_add_now (&end_badly, "from topology_callback (too many failed connections)");
2543 peers_started_callback (void *cls,
2544 const struct GNUNET_PeerIdentity *id,
2545 const struct GNUNET_CONFIGURATION_Handle *cfg,
2546 struct GNUNET_TESTING_Daemon *d, const char *emsg)
2550 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Failed to start daemon with error: `%s'\n",
2554 GNUNET_assert (id != NULL);
2557 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Started daemon %llu out of %llu\n",
2558 (num_peers - peers_left) + 1, num_peers);
2563 if (GNUNET_YES == update_meter(peer_start_meter))
2566 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
2567 "All %d daemons started, now connecting peers!\n",
2570 GNUNET_SCHEDULER_cancel (die_task);
2572 expected_connections = UINT_MAX;
2573 if ((pg != NULL) && (peers_left == 0))
2575 expected_connections = GNUNET_TESTING_connect_topology (pg, connect_topology, connect_topology_option, connect_topology_option_modifier, NULL, NULL);
2577 peer_connect_meter = create_meter(expected_connections, "Peer connection ", GNUNET_YES);
2578 fprintf(stderr, "Have %d expected connections\n", expected_connections);
2581 if (expected_connections == GNUNET_SYSERR)
2583 die_task = GNUNET_SCHEDULER_add_now (&end_badly, "from connect topology (bad return)");
2586 die_task = GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, DEFAULT_CONNECT_TIMEOUT * expected_connections),
2587 &end_badly, "from connect topology (timeout)");
2596 peers_left = num_peers; /* Reset counter */
2597 if (GNUNET_TESTING_create_topology (pg, topology, blacklist_topology, blacklist_transports) != GNUNET_SYSERR)
2600 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
2601 "Topology set up, now starting peers!\n");
2603 GNUNET_TESTING_daemons_continue_startup(pg);
2607 GNUNET_SCHEDULER_cancel (die_task);
2608 die_task = GNUNET_SCHEDULER_add_now (&end_badly, "from create topology (bad return)");
2610 GNUNET_free_non_null(blacklist_transports);
2611 GNUNET_SCHEDULER_cancel (die_task);
2612 die_task = GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_relative_multiply(seconds_per_peer_start, num_peers),
2613 &end_badly, "from continue startup (timeout)");
2617 * Callback indicating that the hostkey was created for a peer.
2620 * @param id the peer identity
2621 * @param d the daemon handle (pretty useless at this point, remove?)
2622 * @param emsg non-null on failure
2625 hostkey_callback (void *cls,
2626 const struct GNUNET_PeerIdentity *id,
2627 struct GNUNET_TESTING_Daemon *d,
2632 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Hostkey callback received error: %s\n", emsg);
2636 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
2637 "Hostkey (%d/%d) created for peer `%s'\n",
2638 num_peers - peers_left, num_peers, GNUNET_i2s(id));
2642 if (GNUNET_YES == update_meter(hostkey_meter))
2645 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
2646 "All %d hostkeys created, now creating topology!\n",
2649 GNUNET_SCHEDULER_cancel (die_task);
2650 /* Set up task in case topology creation doesn't finish
2651 * within a reasonable amount of time */
2652 die_task = GNUNET_SCHEDULER_add_delayed (DEFAULT_TOPOLOGY_TIMEOUT,
2653 &end_badly, "from create_topology");
2654 GNUNET_SCHEDULER_add_now(&create_topology, NULL);
2663 const char *cfgfile, const struct GNUNET_CONFIGURATION_Handle *cfg)
2666 struct GNUNET_DHTLOG_TrialInfo trial_info;
2667 struct GNUNET_TESTING_Host *hosts;
2668 struct GNUNET_TESTING_Host *temphost;
2669 struct GNUNET_TESTING_Host *tempnext;
2671 char *connect_topology_str;
2672 char *blacklist_topology_str;
2673 char *connect_topology_option_str;
2674 char *connect_topology_option_modifier_string;
2676 char *topology_percentage_str;
2677 float topology_percentage;
2678 char *topology_probability_str;
2680 float topology_probability;
2681 unsigned long long temp_config_number;
2682 unsigned long long trial_to_run;
2685 int strict_kademlia;
2689 char *churn_filename;
2696 rounds_finished = 0;
2697 memset(&trial_info, 0, sizeof(struct GNUNET_DHTLOG_TrialInfo));
2698 /* Get path from configuration file */
2699 if (GNUNET_YES != GNUNET_CONFIGURATION_get_value_string(cfg, "paths", "servicehome", &test_directory))
2705 /* Get number of peers to start from configuration */
2706 if (GNUNET_SYSERR ==
2707 GNUNET_CONFIGURATION_get_value_number (cfg, "testing", "num_peers",
2710 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
2711 "Number of peers must be specified in section %s option %s\n", "TESTING", "NUM_PEERS");
2713 GNUNET_assert(num_peers > 0 && num_peers < ULONG_MAX);
2716 * Get DHT specific testing options.
2718 if ((GNUNET_YES == GNUNET_CONFIGURATION_get_value_yesno(cfg, "dht_testing", "mysql_logging")) ||
2719 (GNUNET_YES == GNUNET_CONFIGURATION_get_value_yesno(cfg, "dht_testing", "mysql_logging_extended")))
2721 dhtlog_handle = GNUNET_DHTLOG_connect(cfg);
2722 if (dhtlog_handle == NULL)
2724 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
2725 "Could not connect to mysql server for logging, will NOT log dht operations!");
2731 stop_closest = GNUNET_CONFIGURATION_get_value_yesno(cfg, "dht", "stop_on_closest");
2732 if (stop_closest == GNUNET_SYSERR)
2733 stop_closest = GNUNET_NO;
2735 stop_found = GNUNET_CONFIGURATION_get_value_yesno(cfg, "dht", "stop_found");
2736 if (stop_found == GNUNET_SYSERR)
2737 stop_found = GNUNET_NO;
2739 strict_kademlia = GNUNET_CONFIGURATION_get_value_yesno(cfg, "dht", "strict_kademlia");
2740 if (strict_kademlia == GNUNET_SYSERR)
2741 strict_kademlia = GNUNET_NO;
2744 GNUNET_CONFIGURATION_get_value_string (cfg, "dht_testing", "comment",
2746 trialmessage = NULL;
2749 /** Check for a churn file to do churny simulation */
2751 GNUNET_CONFIGURATION_get_value_string(cfg, "dht_testing", "churn_file",
2754 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Reading churn data from %s\n", churn_filename);
2755 if (GNUNET_OK != GNUNET_DISK_file_test (churn_filename))
2757 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Error reading churn file!\n");
2758 GNUNET_free_non_null(trialmessage);
2759 GNUNET_free(churn_filename);
2762 if ((0 != STAT (churn_filename, &frstat)) || (frstat.st_size == 0))
2764 GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
2765 "Could not open file specified for churn data, ending test!");
2767 GNUNET_free_non_null(trialmessage);
2768 GNUNET_free(churn_filename);
2772 churn_data = GNUNET_malloc_large (frstat.st_size);
2773 GNUNET_assert(churn_data != NULL);
2774 if (frstat.st_size !=
2775 GNUNET_DISK_fn_read (churn_filename, churn_data, frstat.st_size))
2777 GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
2778 "Could not read file %s specified for churn, ending test!", churn_filename);
2779 GNUNET_free (churn_filename);
2780 GNUNET_free (churn_data);
2781 GNUNET_free_non_null(trialmessage);
2785 GNUNET_free_non_null(churn_filename);
2789 /* Read the first line */
2790 while (count < frstat.st_size)
2793 if (((churn_data[count] == '\n')) && (buf != &churn_data[count]))
2795 churn_data[count] = '\0';
2796 if (1 != sscanf(buf, "%u", &churn_rounds))
2798 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Failed to read number of rounds from churn file, ending test!\n");
2800 GNUNET_free_non_null(trialmessage);
2801 GNUNET_free_non_null(churn_data);
2804 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Read %u rounds from churn file\n", churn_rounds);
2805 buf = &churn_data[count + 1];
2806 churn_array = GNUNET_malloc(sizeof(unsigned int) * churn_rounds);
2807 break; /* Done with this part */
2811 if (GNUNET_OK != GNUNET_CONFIGURATION_get_value_number(cfg, "dht_testing", "churns_per_round", &churns_per_round))
2813 churns_per_round = (unsigned long long)churn_rounds;
2817 while ((count < frstat.st_size) && (line_number < churn_rounds))
2820 if (((churn_data[count] == '\n')) && (buf != &churn_data[count]))
2822 churn_data[count] = '\0';
2824 ret = sscanf(buf, "%u", &churn_array[line_number]);
2827 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Read %u peers in round %u\n", churn_array[line_number], line_number);
2832 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Error reading line `%s' in hostfile\n", buf);
2833 buf = &churn_data[count + 1];
2836 buf = &churn_data[count + 1];
2838 else if (churn_data[count] == '\n') /* Blank line */
2839 buf = &churn_data[count + 1];
2842 GNUNET_free_non_null(churn_data);
2844 /* Check for a hostfile containing user@host:port triples */
2846 GNUNET_CONFIGURATION_get_value_string (cfg, "testing", "hostfile",
2853 if (hostfile != NULL)
2855 if (GNUNET_OK != GNUNET_DISK_file_test (hostfile))
2856 GNUNET_DISK_fn_write (hostfile, NULL, 0, GNUNET_DISK_PERM_USER_READ
2857 | GNUNET_DISK_PERM_USER_WRITE);
2858 if ((0 != STAT (hostfile, &frstat)) || (frstat.st_size == 0))
2860 GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
2861 "Could not open file specified for host list, ending test!");
2863 GNUNET_free_non_null(trialmessage);
2864 GNUNET_free(hostfile);
2868 data = GNUNET_malloc_large (frstat.st_size);
2869 GNUNET_assert(data != NULL);
2870 if (frstat.st_size !=
2871 GNUNET_DISK_fn_read (hostfile, data, frstat.st_size))
2873 GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
2874 "Could not read file %s specified for host list, ending test!", hostfile);
2875 GNUNET_free (hostfile);
2877 GNUNET_free_non_null(trialmessage);
2881 GNUNET_free_non_null(hostfile);
2885 while (count < frstat.st_size - 1)
2888 /* if (((data[count] == '\n') || (data[count] == '\0')) && (buf != &data[count]))*/
2889 if (((data[count] == '\n')) && (buf != &data[count]))
2892 temphost = GNUNET_malloc(sizeof(struct GNUNET_TESTING_Host));
2893 ret = sscanf(buf, "%a[a-zA-Z0-9]@%a[a-zA-Z0-9.]:%hd", &temphost->username, &temphost->hostname, &temphost->port);
2896 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Successfully read host %s, port %d and user %s from file\n", temphost->hostname, temphost->port, temphost->username);
2900 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Error reading line `%s' in hostfile\n", buf);
2901 GNUNET_free(temphost);
2902 buf = &data[count + 1];
2905 /* temphost->hostname = buf; */
2906 temphost->next = hosts;
2908 buf = &data[count + 1];
2910 else if ((data[count] == '\n') || (data[count] == '\0'))
2911 buf = &data[count + 1];
2914 GNUNET_free_non_null(data);
2916 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "malicious_getters",
2917 &malicious_getters))
2918 malicious_getters = 0;
2921 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "malicious_putters",
2922 &malicious_putters))
2923 malicious_putters = 0;
2926 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "malicious_droppers",
2927 &malicious_droppers))
2928 malicious_droppers = 0;
2931 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "settle_time",
2935 if (GNUNET_SYSERR ==
2936 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "num_puts",
2938 num_puts = num_peers;
2940 if (GNUNET_SYSERR ==
2941 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "put_replication",
2943 put_replication = DEFAULT_PUT_REPLICATION;
2945 if (GNUNET_SYSERR ==
2946 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "num_gets",
2948 num_gets = num_peers;
2950 if (GNUNET_SYSERR ==
2951 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "get_replication",
2953 get_replication = DEFAULT_GET_REPLICATION;
2956 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "find_peer_delay",
2957 &temp_config_number))
2958 find_peer_delay = GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, temp_config_number);
2960 find_peer_delay = DEFAULT_FIND_PEER_DELAY;
2963 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "concurrent_find_peers",
2964 &temp_config_number))
2965 max_outstanding_find_peers = temp_config_number;
2967 max_outstanding_find_peers = DEFAULT_MAX_OUTSTANDING_FIND_PEERS;
2970 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "get_timeout",
2971 &temp_config_number))
2972 get_timeout = GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, temp_config_number);
2974 get_timeout = DEFAULT_GET_TIMEOUT;
2977 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "concurrent_puts",
2978 &temp_config_number))
2979 max_outstanding_puts = temp_config_number;
2981 max_outstanding_puts = DEFAULT_MAX_OUTSTANDING_PUTS;
2984 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "concurrent_gets",
2985 &temp_config_number))
2986 max_outstanding_gets = temp_config_number;
2988 max_outstanding_gets = DEFAULT_MAX_OUTSTANDING_GETS;
2991 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "timeout",
2992 &temp_config_number))
2993 all_get_timeout = GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, temp_config_number);
2995 all_get_timeout.rel_value = get_timeout.rel_value * num_gets;
2998 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "get_delay",
2999 &temp_config_number))
3000 get_delay = GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, temp_config_number);
3002 get_delay = DEFAULT_GET_DELAY;
3005 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "put_delay",
3006 &temp_config_number))
3007 put_delay = GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, temp_config_number);
3009 put_delay = DEFAULT_PUT_DELAY;
3012 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "peer_start_timeout",
3013 &temp_config_number))
3014 seconds_per_peer_start = GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, temp_config_number);
3016 seconds_per_peer_start = DEFAULT_SECONDS_PER_PEER_START;
3019 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "data_size",
3020 &temp_config_number))
3021 test_data_size = temp_config_number;
3023 test_data_size = DEFAULT_TEST_DATA_SIZE;
3026 * Get testing related options.
3028 if (GNUNET_YES == GNUNET_CONFIGURATION_get_value_yesno(cfg, "DHT_TESTING", "REPLICATE_SAME"))
3029 replicate_same = GNUNET_YES;
3032 * Get testing related options.
3034 if (GNUNET_YES == GNUNET_CONFIGURATION_get_value_yesno(cfg, "DHT_TESTING", "GET_FROM_SAME"))
3035 get_from_same = GNUNET_YES;
3038 if (GNUNET_NO == GNUNET_CONFIGURATION_get_value_time (cfg, "DHT_TESTING",
3039 "MALICIOUS_GET_FREQUENCY",
3040 &malicious_get_frequency))
3041 malicious_get_frequency = DEFAULT_MALICIOUS_GET_FREQUENCY;
3044 if (GNUNET_NO == GNUNET_CONFIGURATION_get_value_time (cfg, "DHT_TESTING",
3045 "MALICIOUS_PUT_FREQUENCY",
3046 &malicious_put_frequency))
3047 malicious_put_frequency = DEFAULT_MALICIOUS_PUT_FREQUENCY;
3049 if (GNUNET_YES == GNUNET_CONFIGURATION_get_value_yesno(cfg, "DHT_TESTING", "MALICIOUS_AFTER_SETTLE"))
3050 malicious_after_settle = GNUNET_YES;
3052 if (GNUNET_YES == GNUNET_CONFIGURATION_get_value_yesno(cfg, "DHT_TESTING", "MALICIOUS_SYBIL"))
3054 /* Set up the malicious target at random for this round */
3055 GNUNET_CRYPTO_hash_create_random (GNUNET_CRYPTO_QUALITY_WEAK, &sybil_target);
3056 malicious_sybil = GNUNET_YES;
3059 /* Create the bloomfilter for choosing which peers to set malicious */
3060 malicious_bloom = GNUNET_CONTAINER_bloomfilter_init (NULL, DHT_BLOOM_SIZE, DHT_BLOOM_K);
3062 /* The normal behavior of the DHT is to do find peer requests
3063 * on its own. Only if this is explicitly turned off should
3064 * the testing driver issue find peer requests (even though
3065 * this is likely the default when testing).
3068 GNUNET_CONFIGURATION_get_value_yesno(cfg, "dht",
3071 do_find_peer = GNUNET_YES;
3075 GNUNET_CONFIGURATION_get_value_yesno(cfg, "dht",
3078 in_dht_replication = GNUNET_YES;
3081 if (GNUNET_YES != GNUNET_CONFIGURATION_get_value_number (cfg, "DHT_TESTING",
3088 if (GNUNET_YES == GNUNET_CONFIGURATION_get_value_number (cfg, "DHT_TESTING",
3090 &temp_config_number))
3092 find_peer_delay = GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, temp_config_number);
3095 find_peer_delay = DEFAULT_FIND_PEER_DELAY;
3097 if (GNUNET_YES != GNUNET_CONFIGURATION_get_value_number(cfg, "DHT_TESTING", "ROUND_DELAY", &round_delay))
3100 if (GNUNET_NO == GNUNET_CONFIGURATION_get_value_number (cfg, "DHT_TESTING",
3101 "OUTSTANDING_FIND_PEERS",
3102 &max_outstanding_find_peers))
3103 max_outstanding_find_peers = DEFAULT_MAX_OUTSTANDING_FIND_PEERS;
3105 if (GNUNET_YES == GNUNET_CONFIGURATION_get_value_yesno(cfg, "dht", "strict_kademlia"))
3106 max_outstanding_find_peers = max_outstanding_find_peers * 1;
3108 find_peer_offset = GNUNET_TIME_relative_divide (find_peer_delay, max_outstanding_find_peers);
3110 if (GNUNET_SYSERR ==
3111 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "num_rounds",
3117 if ((GNUNET_SYSERR ==
3118 GNUNET_CONFIGURATION_get_value_number (cfg, "dht_testing", "target_total_connections",
3119 &target_total_connections)) ||
3120 (target_total_connections == 0))
3122 target_total_connections = connection_estimate(num_peers, DEFAULT_BUCKET_SIZE);
3125 topology_str = NULL;
3127 GNUNET_CONFIGURATION_get_value_string(cfg, "testing", "topology",
3128 &topology_str)) && (GNUNET_NO == GNUNET_TESTING_topology_get(&topology, topology_str)))
3130 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
3131 "Invalid topology `%s' given for section %s option %s\n", topology_str, "TESTING", "TOPOLOGY");
3132 topology = GNUNET_TESTING_TOPOLOGY_CLIQUE; /* Defaults to NONE, so set better default here */
3136 GNUNET_CONFIGURATION_get_value_string (cfg, "testing", "percentage",
3137 &topology_percentage_str))
3138 topology_percentage = 0.5;
3141 topology_percentage = atof (topology_percentage_str);
3142 GNUNET_free(topology_percentage_str);
3146 GNUNET_CONFIGURATION_get_value_string (cfg, "testing", "probability",
3147 &topology_probability_str))
3148 topology_probability = 0.5;
3151 topology_probability = atof (topology_probability_str);
3152 GNUNET_free(topology_probability_str);
3156 GNUNET_CONFIGURATION_get_value_string(cfg, "testing", "connect_topology",
3157 &connect_topology_str)) && (GNUNET_NO == GNUNET_TESTING_topology_get(&connect_topology, connect_topology_str)))
3159 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
3160 "Invalid connect topology `%s' given for section %s option %s\n", connect_topology_str, "TESTING", "CONNECT_TOPOLOGY");
3162 GNUNET_free_non_null(connect_topology_str);
3165 GNUNET_CONFIGURATION_get_value_string(cfg, "testing", "connect_topology_option",
3166 &connect_topology_option_str)) && (GNUNET_NO == GNUNET_TESTING_topology_option_get(&connect_topology_option, connect_topology_option_str)))
3168 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
3169 "Invalid connect topology option `%s' given for section %s option %s\n", connect_topology_option_str, "TESTING", "CONNECT_TOPOLOGY_OPTION");
3170 connect_topology_option = GNUNET_TESTING_TOPOLOGY_OPTION_ALL; /* Defaults to NONE, set to ALL */
3172 GNUNET_free_non_null(connect_topology_option_str);
3175 GNUNET_CONFIGURATION_get_value_string (cfg, "testing", "connect_topology_option_modifier",
3176 &connect_topology_option_modifier_string))
3178 if (sscanf(connect_topology_option_modifier_string, "%lf", &connect_topology_option_modifier) != 1)
3180 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
3181 _("Invalid value `%s' for option `%s' in section `%s': expected float\n"),
3182 connect_topology_option_modifier_string,
3183 "connect_topology_option_modifier",
3186 GNUNET_free (connect_topology_option_modifier_string);
3189 if (GNUNET_YES != GNUNET_CONFIGURATION_get_value_string (cfg, "testing", "blacklist_transports",
3190 &blacklist_transports))
3191 blacklist_transports = NULL;
3194 GNUNET_CONFIGURATION_get_value_string(cfg, "testing", "blacklist_topology",
3195 &blacklist_topology_str)) &&
3196 (GNUNET_NO == GNUNET_TESTING_topology_get(&blacklist_topology, blacklist_topology_str)))
3198 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
3199 "Invalid topology `%s' given for section %s option %s\n", topology_str, "TESTING", "BLACKLIST_TOPOLOGY");
3201 GNUNET_free_non_null(topology_str);
3202 GNUNET_free_non_null(blacklist_topology_str);
3204 /* Set peers_left so we know when all peers started */
3205 peers_left = num_peers;
3208 /* Set up a task to end testing if peer start fails */
3209 die_task = GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_relative_multiply(seconds_per_peer_start, num_peers),
3210 &end_badly, "didn't generate all hostkeys within allowed startup time!");
3212 if (dhtlog_handle == NULL)
3213 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
3214 "dhtlog_handle is NULL!");
3216 trial_info.other_identifier = (unsigned int)trial_to_run;
3217 trial_info.num_nodes = peers_left;
3218 trial_info.topology = topology;
3219 trial_info.blacklist_topology = blacklist_topology;
3220 trial_info.connect_topology = connect_topology;
3221 trial_info.connect_topology_option = connect_topology_option;
3222 trial_info.connect_topology_option_modifier = connect_topology_option_modifier;
3223 trial_info.topology_percentage = topology_percentage;
3224 trial_info.topology_probability = topology_probability;
3225 trial_info.puts = num_puts;
3226 trial_info.gets = num_gets;
3227 trial_info.concurrent = max_outstanding_gets;
3228 trial_info.settle_time = settle_time;
3229 trial_info.num_rounds = total_rounds;
3230 trial_info.malicious_getters = malicious_getters;
3231 trial_info.malicious_putters = malicious_putters;
3232 trial_info.malicious_droppers = malicious_droppers;
3233 trial_info.malicious_get_frequency = malicious_get_frequency.rel_value;
3234 trial_info.malicious_put_frequency = malicious_put_frequency.rel_value;
3235 trial_info.stop_closest = stop_closest;
3236 trial_info.stop_found = stop_found;
3237 trial_info.strict_kademlia = strict_kademlia;
3239 if (trialmessage != NULL)
3240 trial_info.message = trialmessage;
3242 trial_info.message = "";
3244 if (dhtlog_handle != NULL)
3245 dhtlog_handle->insert_trial(&trial_info);
3247 GNUNET_free_non_null(trialmessage);
3249 hostkey_meter = create_meter(peers_left, "Hostkeys created ", GNUNET_YES);
3250 peer_start_meter = create_meter(peers_left, "Peers started ", GNUNET_YES);
3252 put_meter = create_meter(num_puts, "Puts completed ", GNUNET_YES);
3253 get_meter = create_meter(num_gets, "Gets completed ", GNUNET_YES);
3254 pg = GNUNET_TESTING_daemons_start (cfg,
3256 GNUNET_TIME_relative_multiply(seconds_per_peer_start, num_peers),
3257 &hostkey_callback, NULL,
3258 &peers_started_callback, NULL,
3259 &topology_callback, NULL,
3262 while (temphost != NULL)
3264 tempnext = temphost->next;
3265 GNUNET_free (temphost->username);
3266 GNUNET_free (temphost->hostname);
3267 GNUNET_free (temphost);
3268 temphost = tempnext;
3273 main (int argc, char *argv[])
3276 struct GNUNET_GETOPT_CommandLineOption options[] = {
3277 GNUNET_GETOPT_OPTION_END
3280 ret = GNUNET_PROGRAM_run (argc,
3281 argv, "gnunet-dht-driver", "nohelp",
3282 options, &run, &ok);
3284 if (malicious_bloom != NULL)
3285 GNUNET_CONTAINER_bloomfilter_free (malicious_bloom);
3287 if (ret != GNUNET_OK)
3289 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "`gnunet-dht-driver': Failed with error code %d\n", ret);
3293 * Need to remove base directory, subdirectories taken care
3294 * of by the testing framework.
3296 if (GNUNET_DISK_directory_remove (test_directory) != GNUNET_OK)
3298 GNUNET_log(GNUNET_ERROR_TYPE_WARNING, "Failed to remove testing directory %s\n", test_directory);
3303 /* end of gnunet-dht-driver.c */