*/
static long long unsigned int port;
+/**
+ * Peer's port
+ */
+static char * test_addr;
+
/**
* Our scheduler.
*/
static GNUNET_SCHEDULER_TaskIdentifier ti_send;
-const struct GNUNET_PeerIdentity * p;
+//const struct GNUNET_PeerIdentity * p;
/**
* buffer for data to send
static int fail_addr_to_str;
/**
- * Test: connect to peer without peer identification
+ * No. of msgs transmitted successfully to local addresses
*/
-static struct HTTP_Transfer test_no_ident;
+static int fail_msgs_transmited_to_local_addrs;
/**
- * Test: connect to peer without peer identification
+ * Test: transmit msg of max. size
*/
-static struct HTTP_Transfer test_too_short_ident;
+static int fail_msg_transmited_bigger_max_size;
/**
- * Test: connect to peer without peer identification
+ * Test: transmit msg of max. size
*/
-static struct HTTP_Transfer test_too_long_ident;
+static int fail_msg_transmited_max_size;
/**
- * Test: connect to peer and send message bigger then content length
+ * Test: transmit 2 msgs. in in send operation
*/
-static struct HTTP_Transfer test_msg_too_big;
+static int fail_multiple_msgs_in_transmission;
/**
- * Test: connect to peer and send message bigger GNUNET_SERVER_MAX_MESSAGE_SIZE
+ * Test: connect to peer without peer identification
*/
-//static struct HTTP_Transfer test_msg_bigger_max;
+static struct HTTP_Transfer test_no_ident;
/**
- * Test: connect to peer and send message smaller then content length
+ * Test: connect to peer without peer identification
*/
-//static struct HTTP_Transfer test_msg_too_small;
+static struct HTTP_Transfer test_too_short_ident;
+
+/**
+ * Test: connect to peer without peer identification
+ */
+static struct HTTP_Transfer test_too_long_ident;
/**
* Test: connect to peer with valid peer identification
static int fail;
/**
- * Recieved message already returned to sender?
+ * Number of local addresses
*/
-static int sent;
+static unsigned int count_str_addr;
CURL *curl_handle;
static void
shutdown_clean ()
{
+ struct Plugin_Address * cur;
+ struct Plugin_Address * tmp;
/* Evaluate results */
- if ((fail_notify_address == GNUNET_NO) && (fail_pretty_printer == GNUNET_NO) && (fail_addr_to_str == GNUNET_NO) &&
- (test_no_ident.test_failed == GNUNET_NO) && (test_too_short_ident.test_failed == GNUNET_NO) && (test_too_long_ident.test_failed == GNUNET_NO) &&
- (test_valid_ident.test_failed == GNUNET_NO))
+ fail = 0;
+ if ((fail_notify_address == GNUNET_YES) || (fail_pretty_printer == GNUNET_YES) || (fail_addr_to_str == GNUNET_YES))
{
- GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Tests successful\n");
- fail = 0;
+ GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Test plugin functions failed\n");
+ fail = 1;
}
- else
+ if ((test_no_ident.test_failed == GNUNET_YES) || (test_too_short_ident.test_failed == GNUNET_YES) || (test_too_long_ident.test_failed == GNUNET_YES) || (test_valid_ident.test_failed == GNUNET_YES))
+ {
+ GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Test connect with wrong data failed\n");
+ fail = 1;
+ }
+ if ((fail_msgs_transmited_to_local_addrs != count_str_addr) || (fail_msg_transmited_max_size == GNUNET_YES) || (fail_msg_transmited_bigger_max_size == GNUNET_YES) || (fail_multiple_msgs_in_transmission != GNUNET_NO))
{
- GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Tests failed\n");
+ GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Test sending with plugin failed\n");
fail = 1;
}
+ if (fail != 1)
+ {
+ GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "All tests successful\n");
+ }
curl_multi_cleanup(multi_handle);
if (NULL != curl_handle)
curl_easy_cleanup (curl_handle);
+ /* cleaning addresses */
+ while (addr_head != NULL)
+ {
+ cur = addr_head;
+ tmp = addr_head->next;
+ GNUNET_free (addr_head->addr);
+ GNUNET_free (addr_head);
+ addr_head=tmp;
+ }
if (ti_send != GNUNET_SCHEDULER_NO_TASK)
{
GNUNET_SCHEDULER_cancel(sched,ti_timeout);
ti_timeout = GNUNET_SCHEDULER_NO_TASK;
}
+
+ GNUNET_free(test_addr);
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Unloading http plugin\n");
GNUNET_assert (NULL == GNUNET_PLUGIN_unload ("libgnunet_plugin_transport_http", api));
GNUNET_SCHEDULER_shutdown(sched);
+ GNUNET_DISK_directory_remove ("/tmp/test_plugin_transport_http");
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Exiting testcase\n");
exit(fail);
}
-#if 0
/**
* Continuation called after plugin send message
* @cls closure
* @target target
* @result GNUNET_OK or GNUNET_SYSERR
*/
+
static void task_send_cont (void *cls,
const struct GNUNET_PeerIdentity * target,
int result)
{
- GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Message was sent!\n");
- fail = GNUNET_NO;
- shutdown_clean();
+ struct Plugin_Address * tmp_addr;
+ tmp_addr = addr_head;
+
+ if ((cls == &fail_msgs_transmited_to_local_addrs) && (result == GNUNET_OK))
+ {
+ fail_msgs_transmited_to_local_addrs++;
+ if (fail_msgs_transmited_to_local_addrs == count_str_addr)
+ {
+ GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Message sent to %u addresses!\n",fail_msgs_transmited_to_local_addrs);
+ }
+ return;
+ }
+
+ if ((cls == &fail_msg_transmited_bigger_max_size) && (result == GNUNET_SYSERR))
+ {
+ GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Message bigger max msg size was not sent!\n");
+ fail_msg_transmited_bigger_max_size = GNUNET_NO;
+ return;
+ }
+
+ if ((cls == &fail_msg_transmited_max_size) && (result == GNUNET_OK))
+ {
+ GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Message with max msg size succesfully sent!\n",fail_msgs_transmited_to_local_addrs);
+ fail_msg_transmited_max_size = GNUNET_NO;
+ shutdown_clean();
+ }
}
-#endif
+#if 0
/**
* Task sending recieved message back to peer
* @cls closure
*/
sent = GNUNET_YES;
}
-
+#endif
/**
* Recieves messages from plugin, in real world transport
const char *sender_address,
uint16_t sender_address_len)
{
- GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Testcase recieved new message from peer `%s' with type %u and length %u\n", GNUNET_i2s(peer),ntohs(message->type),ntohs(message->size));
-
- /* take recieved message and send it back to peer */
-
-
- p = peer;
- void * c = (void *) message;
- ti_send =GNUNET_SCHEDULER_add_delayed (sched, WAIT_INTERVALL, &task_send, c);
-
+ GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Testcase recieved new message from peer `%s' with type %u and length %u\n", GNUNET_i2s(peer), ntohs(message->type), ntohs(message->size));
+ if ((ntohs(message->type) == 40) && (fail_multiple_msgs_in_transmission == 1))
+ fail_multiple_msgs_in_transmission++;
+ if ((ntohs(message->type) == 41) && (fail_multiple_msgs_in_transmission == 2))
+ fail_multiple_msgs_in_transmission = GNUNET_NO;
return GNUNET_TIME_UNIT_ZERO;
}
static size_t send_function (void *stream, size_t size, size_t nmemb, void *ptr)
{
unsigned int len;
- struct HTTP_Transfer * test = (struct HTTP_Transfer *) ptr;
len = buffer_out.len;
- if (test == &test_msg_too_big)
- {
- if (buffer_out.pos > len)
- return 0;
- if ( (2*len) < (size * nmemb))
- memcpy(stream, buffer_out.buf, 2* len);
- buffer_out.pos = 2* len;
- return 2* len;
- }
-
if (( buffer_out.pos == len) || (len > (size * nmemb)))
return 0;
memcpy(stream, buffer_out.buf, len);
static size_t send_prepare( struct HTTP_Transfer * result);
-static void run_connection_tests( void );
+static void run_connection_tests( );
static void send_execute (void *cls,
const struct GNUNET_SCHEDULER_TaskContext *tc)
{
msg = curl_multi_info_read (multi_handle, &running);
- GNUNET_break (msg != NULL);
if (msg == NULL)
break;
/* get session for affected curl handle */
__LINE__,
curl_easy_strerror (msg->data.result));
/* sending msg failed*/
+ curl_easy_cleanup(curl_handle);
+ curl_handle=NULL;
+
+ run_connection_tests();
}
if (res == &test_no_ident)
{
/**
* Runs every single test to test the plugin
*/
-static void run_connection_tests( void )
+static void run_connection_tests( )
{
- char * host_str;
-
+ char * host_str = NULL;
/* resetting buffers */
buffer_in.size = HTTP_BUFFER_SIZE;
buffer_in.pos = 0;
if (test_no_ident.test_executed == GNUNET_NO)
{
/* Connecting to peer without identification */
- host_str = GNUNET_malloc (strlen ("http://localhost:12389/")+1);
- GNUNET_asprintf (&host_str, "http://localhost:%u/",port);
+ char * ident = "";
+ host_str = GNUNET_malloc (strlen ("http:///")+ 1 + strlen (test_addr)+ strlen (ident));
+ GNUNET_asprintf (&host_str, "http://%s/%s",test_addr,ident);
GNUNET_log (GNUNET_ERROR_TYPE_INFO, _("Connecting to peer without any peer identification.\n"));
test_no_ident.test_executed = GNUNET_YES;
send_data ( &test_no_ident, host_str);
GNUNET_free (host_str);
-
return;
}
-
if (test_too_short_ident.test_executed == GNUNET_NO)
{
char * ident = "AAAAAAAAAA";
/* Connecting to peer with too short identification */
- host_str = GNUNET_malloc (strlen ("http://localhost:12389/") + strlen (ident));
- GNUNET_asprintf (&host_str, "http://localhost:%u/%s",port,ident);
+ host_str = GNUNET_malloc (strlen ("http:///")+ 1 + strlen (test_addr)+ strlen (ident));
+ GNUNET_asprintf (&host_str, "http://%s/%s",test_addr,ident);
GNUNET_log (GNUNET_ERROR_TYPE_INFO, _("Connecting to peer with too short peer identification.\n"));
test_too_short_ident.test_executed = GNUNET_YES;
send_data ( &test_too_short_ident, host_str);
GNUNET_free (host_str);
-
return;
}
char * ident = "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA";
/* Connecting to peer with too long identification */
- host_str = GNUNET_malloc (strlen ("http://localhost:12389/") + strlen (ident));
- GNUNET_asprintf (&host_str, "http://localhost:%u/%s",port,ident);
-
+ host_str = GNUNET_malloc (strlen ("http:///")+ 1 + strlen (test_addr)+ strlen (ident));
+ GNUNET_asprintf (&host_str, "http://%s/%s",test_addr,ident);
GNUNET_log (GNUNET_ERROR_TYPE_INFO, _("Connecting to peer with too long peer identification.\n"));
test_too_long_ident.test_executed = GNUNET_YES;
send_data ( &test_too_long_ident, host_str);
GNUNET_free (host_str);
-
return;
}
if (test_valid_ident.test_executed == GNUNET_NO)
{
- struct GNUNET_CRYPTO_HashAsciiEncoded result;
-
- GNUNET_CRYPTO_hash_to_enc(&my_identity.hashPubKey,&result);
- host_str = GNUNET_malloc (strlen ("http://localhost:12389/") + strlen ((const char *) &result));
- GNUNET_asprintf (&host_str, "http://localhost:%u/%s",port,(char *) &result);
+ struct GNUNET_CRYPTO_HashAsciiEncoded ident;
+ GNUNET_CRYPTO_hash_to_enc(&my_identity.hashPubKey,&ident);
+ host_str = GNUNET_malloc (strlen ("http:///")+ 1 + strlen (test_addr)+ strlen ((char *) &ident));
+ GNUNET_asprintf (&host_str, "http://%s/%s",test_addr,(char *) &ident);
GNUNET_log (GNUNET_ERROR_TYPE_INFO, _("Connecting to peer with valid peer identification.\n"));
test_valid_ident.test_executed = GNUNET_YES;
send_data ( &test_valid_ident, host_str);
GNUNET_free (host_str);
-
return;
}
-/*
- if (test_msg_too_big.test_executed == GNUNET_NO)
- {
- struct GNUNET_CRYPTO_HashAsciiEncoded result;
- unsigned int c;
+ /* Using one of the addresses the plugin proposed */
+ GNUNET_assert (addr_head->addr != NULL);
- GNUNET_CRYPTO_hash_to_enc(&my_identity.hashPubKey,&result);
- host_str = GNUNET_malloc (strlen ("http://localhost:12389/") + strlen ((const char *) &result));
- GNUNET_asprintf (&host_str, "http://localhost:%u/%s",port,(char *) &result);
-
- buffer_out.len = 50;
- c = 0;
- for (c=0; c<100; c++)
- buffer_out.buf[c] = 'A';
+ struct Plugin_Address * tmp_addr;
+ struct GNUNET_MessageHeader msg;
+ char * tmp = GNUNET_malloc(sizeof(struct GNUNET_MessageHeader));
+ char address[INET6_ADDRSTRLEN];
+ unsigned int port;
+ unsigned int type = 10;
- GNUNET_log (GNUNET_ERROR_TYPE_INFO, _("Connecting to peer with message bigger content length.\n"));
- test_msg_too_big.test_executed = GNUNET_YES;
- send_data ( &test_msg_too_big, host_str);
- GNUNET_free (host_str);
+ msg.size=htons(sizeof(struct GNUNET_MessageHeader));
+ tmp_addr = addr_head;
+ /* send a message to all addresses advertised by plugin */
- return;
+ int count = 0;
+ while (tmp_addr != NULL)
+ {
+ if (tmp_addr->addrlen == (sizeof (struct IPv4HttpAddress)))
+ {
+ inet_ntop(AF_INET, (struct in_addr *) tmp_addr->addr,address,INET_ADDRSTRLEN);
+ port = ntohs(((struct IPv4HttpAddress *) tmp_addr->addr)->u_port);
+ GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,"Sending message to addres no. %u: `%s':%u\n", count,address, port);
+ }
+ else if (tmp_addr->addrlen == (sizeof (struct IPv6HttpAddress)))
+ {
+ inet_ntop(AF_INET6, (struct in6_addr *) tmp_addr->addr,address,INET6_ADDRSTRLEN);
+ port = ntohs(((struct IPv6HttpAddress *) tmp_addr->addr)->u6_port);
+ GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,"Sending message to addres no. %u: `%s':%u\n", count,address,port);
+ }
+ else
+ {
+ GNUNET_break (0);
+ return;
+ }
+ msg.type=htons(type);
+ memcpy(tmp,&msg,sizeof(struct GNUNET_MessageHeader));
+ api->send(api->cls, &my_identity, tmp, sizeof(struct GNUNET_MessageHeader), 0, TIMEOUT, NULL,tmp_addr->addr, tmp_addr->addrlen, GNUNET_YES, &task_send_cont, &fail_msgs_transmited_to_local_addrs);
+ tmp_addr = tmp_addr->next;
+ count ++;
+ type ++;
}
-*/
+
+ /* send a multiple GNUNET_messages at a time*/
+ GNUNET_free(tmp);
+ tmp = GNUNET_malloc(4 * sizeof(struct GNUNET_MessageHeader));
+ struct GNUNET_MessageHeader * msg1 = (struct GNUNET_MessageHeader *) tmp;
+ msg1->size = htons(2 * sizeof(struct GNUNET_MessageHeader));
+ msg1->type = htons(40);
+ struct GNUNET_MessageHeader * msg2 = &msg1[2];
+ msg2->size = htons(2 * sizeof(struct GNUNET_MessageHeader));
+ msg2->type = htons(41);
+ api->send(api->cls, &my_identity, tmp, 4 * sizeof(struct GNUNET_MessageHeader), 0, TIMEOUT, NULL,addr_head->addr, addr_head->addrlen, GNUNET_YES, &task_send_cont, &fail_multiple_msgs_in_transmission);
+
+
+ /* send a multiple GNUNET_messages at a time, second message has incorrect size*/
+ GNUNET_free(tmp);
+ tmp = GNUNET_malloc(4 * sizeof(struct GNUNET_MessageHeader));
+ msg1 = (struct GNUNET_MessageHeader *) tmp;
+ msg1->size = htons(2 * sizeof(struct GNUNET_MessageHeader));
+ msg1->type = htons(40);
+ msg2 = &msg1[2];
+ msg2->size = htons(3 * sizeof(struct GNUNET_MessageHeader));
+ msg2->type = htons(41);
+ api->send(api->cls, &my_identity, tmp, 4 * sizeof(struct GNUNET_MessageHeader), 0, TIMEOUT, NULL,addr_head->addr, addr_head->addrlen, GNUNET_YES, &task_send_cont, NULL);
+
+
+ /* send a multiple GNUNET_messages at a time, second message has incorrect size*/
+/* GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,"Ping Hello Message\n");
+ GNUNET_free(tmp);
+ tmp = GNUNET_malloc(425);
+ msg1 = (struct GNUNET_MessageHeader *) tmp;
+ msg1->size = htons(353);
+ msg1->type = htons(16);
+ msg2 = &tmp[353];
+ msg2->size = htons(72);
+ msg2->type = htons(32);
+ api->send(api->cls, &my_identity, tmp, 425, 0, TIMEOUT, NULL,addr_head->addr, addr_head->addrlen, GNUNET_YES, &task_send_cont, NULL);*/
+
+
+ /* send a message with size GNUNET_SERVER_MAX_MESSAGE_SIZE )*/
+ GNUNET_free(tmp);
+ tmp = GNUNET_malloc(GNUNET_SERVER_MAX_MESSAGE_SIZE);
+ uint16_t t2 = (uint16_t)GNUNET_SERVER_MAX_MESSAGE_SIZE;
+ msg.size = htons(t2);
+ memcpy(tmp,&msg,sizeof(struct GNUNET_MessageHeader));
+ api->send(api->cls, &my_identity, tmp, GNUNET_SERVER_MAX_MESSAGE_SIZE, 0, TIMEOUT, NULL,addr_head->addr, addr_head->addrlen, GNUNET_YES, &task_send_cont, &fail_msg_transmited_bigger_max_size);
+
+ /* send a message with size GNUNET_SERVER_MAX_MESSAGE_SIZE-1 */
+ GNUNET_free(tmp);
+ tmp = GNUNET_malloc(GNUNET_SERVER_MAX_MESSAGE_SIZE-1);
+ uint16_t t = (uint16_t)GNUNET_SERVER_MAX_MESSAGE_SIZE-1;
+ msg.size = htons(t);
+ memcpy(tmp,&msg,sizeof(struct GNUNET_MessageHeader));
+ api->send(api->cls, &my_identity, tmp, GNUNET_SERVER_MAX_MESSAGE_SIZE-1, 0, TIMEOUT, NULL,addr_head->addr, addr_head->addrlen, GNUNET_YES, &task_send_cont, &fail_msg_transmited_max_size);
+ GNUNET_free(tmp);
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,"No more tests to run\n");
- shutdown_clean();
}
char *keyfile;
unsigned long long tneigh;
struct Plugin_Address * cur;
- struct Plugin_Address * tmp;
const char * addr_str;
- unsigned int count_str_addr;
+
unsigned int suggest_res;
fail_pretty_printer = GNUNET_YES;
fail_notify_address = GNUNET_YES;
fail_addr_to_str = GNUNET_YES;
+ fail_msgs_transmited_to_local_addrs = 0;
+ fail_msg_transmited_max_size = GNUNET_YES;
+ fail_multiple_msgs_in_transmission = GNUNET_YES;
addr_head = NULL;
count_str_addr = 0;
"transport-http",
"PORT",
&port)) ||
- (port > 65535) )
+ (port > 65535) || (port == 0))
{
GNUNET_log_from (GNUNET_ERROR_TYPE_ERROR,
"http",
("Require valid port number for transport plugin `%s' in configuration!\n"),
"transport-http");
}
+
max_connect_per_transport = (uint32_t) tneigh;
my_private_key = GNUNET_CRYPTO_rsa_key_create_from_file (keyfile);
GNUNET_free (keyfile);
fail = 1;
return;
}
+
GNUNET_CRYPTO_rsa_key_get_public (my_private_key, &my_public_key);
- GNUNET_CRYPTO_hash (&my_public_key,
- sizeof (my_public_key), &my_identity.hashPubKey);
+ GNUNET_CRYPTO_hash (&my_public_key, sizeof (my_public_key), &my_identity.hashPubKey);
+
+ /* assertions before start */
+ GNUNET_assert ((port > 0) && (port <= 65535));
+ GNUNET_assert(&my_public_key != NULL);
+ GNUNET_assert(&my_identity.hashPubKey != NULL);
/* load plugins... */
setup_plugin_environment ();
GNUNET_log (GNUNET_ERROR_TYPE_INFO, _("Transport plugin returned %u addresses to connect to\n"), fail_notify_address_count);
/* testing pretty printer with all addresses obtained from the plugin*/
- while (addr_head != NULL)
+ cur = addr_head;
+ while (cur != NULL)
{
- cur = addr_head;
api->address_pretty_printer (NULL,"http",cur->addr,cur->addrlen,GNUNET_NO,TEST_TIMEOUT,&pretty_printer_cb,NULL);
addr_str = api->address_to_string (NULL,cur->addr,cur->addrlen);
GNUNET_assert (GNUNET_OK == suggest_res);
GNUNET_assert (NULL != addr_str);
count_str_addr++;
-
- tmp = addr_head->next;
- GNUNET_free (addr_head->addr);
- GNUNET_free (addr_head);
- GNUNET_free ((char *) addr_str);
- addr_head=tmp;
+ GNUNET_free ( (char *) addr_str);
+ cur = cur->next;
}
-
-
+ GNUNET_assert (fail_pretty_printer_count > 0);
GNUNET_assert (fail_pretty_printer_count==fail_notify_address_count);
GNUNET_assert (fail_pretty_printer_count==count_str_addr);
fail_pretty_printer=GNUNET_NO;
/* Suggesting addresses with wrong port*/
struct IPv4HttpAddress failing_addr;
- failing_addr.ipv4_addr = INADDR_LOOPBACK;
- failing_addr.u_port = 0;
+ failing_addr.ipv4_addr = htonl(INADDR_LOOPBACK);
+ failing_addr.u_port = htons(0);
suggest_res = api->check_address (NULL,&failing_addr,sizeof (struct IPv4HttpAddress));
GNUNET_assert (GNUNET_SYSERR == suggest_res);
/* Suggesting addresses with wrong size*/
- failing_addr.ipv4_addr = INADDR_LOOPBACK;
- failing_addr.u_port = 0;
+ failing_addr.ipv4_addr = htonl(INADDR_LOOPBACK);
+ failing_addr.u_port = htons(0);
suggest_res = api->check_address (NULL,&failing_addr,sizeof (struct IPv6HttpAddress));
GNUNET_assert (GNUNET_SYSERR == suggest_res);
/* Suggesting addresses with wrong address*/
- failing_addr.ipv4_addr = 0;
- failing_addr.u_port = 12389;
+ failing_addr.ipv4_addr = htonl(INADDR_LOOPBACK);
+ failing_addr.u_port = htons(12389);
suggest_res = api->check_address (NULL,&failing_addr,sizeof (struct IPv4HttpAddress));
GNUNET_assert (GNUNET_SYSERR == suggest_res);
test_valid_ident.test_executed = GNUNET_NO;
test_valid_ident.test_failed = GNUNET_YES;
- /* Test: connecting with valid identification */
- test_msg_too_big.test_executed = GNUNET_NO;
- test_msg_too_big.test_failed = GNUNET_YES;
-
+ test_addr = (char *) api->address_to_string (NULL,addr_head->addr,addr_head->addrlen);
run_connection_tests();
/* testing finished */