GNUnet is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published
- by the Free Software Foundation; either version 2, or (at your
+ by the Free Software Foundation; either version 3, or (at your
option) any later version.
GNUnet is distributed in the hope that it will be useful, but
#define TIMEOUT GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_SECONDS, 90)
/**
- * How long until we give up on transmitting the message?
+ * Testcase timeout
*/
-#define TEST_TIMEOUT GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_SECONDS, 10)
+#define TEST_TIMEOUT GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_SECONDS, 180)
/**
* How long between recieve and send?
static long long unsigned int port;
/**
- * Peer's port
+ * Peer's addr
*/
static char * test_addr;
*/
static struct HTTP_Transfer test_valid_ident;
+/**
+ * Test: session selection, use any existing
+ */
+static int fail_session_selection_any;
+
+/**
+ * Test: session selection, use existing inbound session
+ */
+static int fail_session_selection_session;
+
+/**
+ * Test: session selection, use existing inbound session
+ * max message, not fitting in send & recv buffers at one time
+ */
+static int fail_session_selection_session_big;
+
+/**
+* Test: session selection, use reliable existing
+ */
+static int fail_session_selection_reliable;
+
/**
* Did the test pass or fail?
*/
fail = 0;
if ((fail_notify_address == GNUNET_YES) || (fail_pretty_printer == GNUNET_YES) || (fail_addr_to_str == GNUNET_YES))
{
- GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Test plugin functions failed\n");
+ GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Phase 0: Test plugin functions failed\n");
fail = 1;
}
if ((test_no_ident.test_failed == GNUNET_YES) || (test_too_short_ident.test_failed == GNUNET_YES) || (test_too_long_ident.test_failed == GNUNET_YES) || (test_valid_ident.test_failed == GNUNET_YES))
{
- GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Test connect with wrong data failed\n");
+ GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Phase 1: Test connect with wrong data failed\n");
+ fail = 1;
+ }
+ if ((fail_session_selection_any != GNUNET_NO) || (fail_session_selection_reliable != GNUNET_NO) || (fail_session_selection_session != GNUNET_NO) || (fail_session_selection_session_big != GNUNET_NO))
+ {
+ GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Phase 2: Test session selection failed\n");
fail = 1;
}
if ((fail_msgs_transmited_to_local_addrs != count_str_addr) || (fail_multiple_msgs_in_transmission != 2) || (fail_msg_transmited_max_size == GNUNET_YES))
{
- GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Test sending with plugin failed\n");
+ GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Phase 3: Test sending with plugin failed\n");
fail = 1;
}
if (fail != 1)
{
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Message with max msg size succesfully sent!\n",fail_msgs_transmited_to_local_addrs);
fail_msg_transmited_max_size = GNUNET_NO;
- //shutdown_clean();
}
}
-static void run_connection_tests( int );
+static void run_connection_tests( int phase , void * cls);
/**
* Recieves messages from plugin, in real world transport
const char *sender_address,
uint16_t sender_address_len)
{
- GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Testcase recieved new message from peer `%s' with type %u and length %u\n", GNUNET_i2s(peer), ntohs(message->type), ntohs(message->size));
+ GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Testcase recieved new message from peer `%s' with type %u and length %u, session %X\n", GNUNET_i2s(peer), ntohs(message->type), ntohs(message->size),session);
- if ((ntohs(message->type)>=10) && (ntohs(message->type)<=20))
+ if ((ntohs(message->type)>=10) && (ntohs(message->type)<20))
{
fail_msgs_transmited_to_local_addrs++;
if (fail_msgs_transmited_to_local_addrs == count_str_addr)
- run_connection_tests(2);
+ run_connection_tests(2, session);
+ }
+
+
+ if ((ntohs(message->type)==20))
+ {
+ fail_session_selection_reliable = GNUNET_NO;
+ }
+
+ if ((ntohs(message->type)==21))
+ {
+ fail_session_selection_any = GNUNET_NO;
+ }
+ if ((ntohs(message->type)==22))
+ {
+ fail_session_selection_session = GNUNET_NO;
}
- if ((ntohs(message->type)==40) || (ntohs(message->type)==41))
+ if ((ntohs(message->type)==23))
+ {
+ fail_session_selection_session_big = GNUNET_NO;
+ run_connection_tests(3, NULL);
+ }
+
+ if ((ntohs(message->type)==30) || (ntohs(message->type)==31))
{
fail_multiple_msgs_in_transmission ++;
}
- if (ntohs(message->size) == GNUNET_SERVER_MAX_MESSAGE_SIZE-1)
+ if ((ntohs(message->type)==32) && (ntohs(message->size) == GNUNET_SERVER_MAX_MESSAGE_SIZE-1))
{
fail_msg_transmited_max_size = GNUNET_NO;
- //shutdown_clean();
+ shutdown_clean();
}
return GNUNET_TIME_UNIT_ZERO;
static size_t send_prepare( struct HTTP_Transfer * result);
-static void run_connection_tests( );
+
static void send_execute (void *cls,
const struct GNUNET_SCHEDULER_TaskContext *tc)
curl_easy_cleanup(curl_handle);
curl_handle=NULL;
- run_connection_tests(1);
+ run_connection_tests(0, NULL);
}
if (res == &test_no_ident)
{
{
if ((res->http_result_code==404) && (buffer_in.len==208))
{
- GNUNET_log (GNUNET_ERROR_TYPE_INFO, _("Connecting to peer with too long peer identification: test passed\n"));
+ GNUNET_log (GNUNET_ERROR_TYPE_INFO, _("Connecting to peer with too long peer identification: test passed\n"));
res->test_failed = GNUNET_NO;
}
else
}
curl_easy_cleanup(curl_handle);
curl_handle=NULL;
-
- run_connection_tests(1);
+ if ((res == &test_valid_ident) && (res->test_failed == GNUNET_NO))
+ run_connection_tests(1, NULL);
+ run_connection_tests(0, NULL);
return;
default:
break;
}
else
{
- GNUNET_break (0);
+ GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
+ _("Unknown address size: ipv6 has %u ipv4 has %u but this has %u\n"),
+ sizeof (struct IPv6HttpAddress),
+ sizeof (struct IPv4HttpAddress),
+ addrlen);
return;
}
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
fail_notify_address = GNUNET_NO;
}
+static void
+plugin_env_session_end (void *cls,
+ const struct GNUNET_PeerIdentity *peer,
+ struct Session *session)
+{
+ GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,"Session ended: `%s' %X\n", GNUNET_i2s(peer), session);
+}
+
+
/**
* Setup plugin environment
*/
env.receive = &receive;
env.notify_address = ¬ify_address;
env.max_connections = max_connect_per_transport;
+ env.session_end = &plugin_env_session_end;
}
/**
* Runs every single test to test the plugin
*/
-static void run_connection_tests( int phase )
+static void run_connection_tests( int phase , void * cls)
{
+ struct GNUNET_MessageHeader * msg;
+ unsigned int size;
- char * host_str = NULL;
- /* resetting buffers */
- buffer_in.size = HTTP_BUFFER_SIZE;
- buffer_in.pos = 0;
- buffer_in.len = 0;
+ if (phase==0)
+ {
+ char * host_str = NULL;
+ /* resetting buffers */
+ buffer_in.size = HTTP_BUFFER_SIZE;
+ buffer_in.pos = 0;
+ buffer_in.len = 0;
- buffer_out.size = HTTP_BUFFER_SIZE;
- buffer_out.pos = 0;
- buffer_out.len = 0;
+ buffer_out.size = HTTP_BUFFER_SIZE;
+ buffer_out.pos = 0;
+ buffer_out.len = 0;
- if (test_no_ident.test_executed == GNUNET_NO)
- {
- /* Connecting to peer without identification */
- char * ident = "";
- host_str = GNUNET_malloc (strlen ("http:///")+ 1 + strlen (test_addr)+ strlen (ident));
- GNUNET_asprintf (&host_str, "http://%s/%s",test_addr,ident);
- GNUNET_log (GNUNET_ERROR_TYPE_INFO, _("Connecting to peer without any peer identification.\n"));
- test_no_ident.test_executed = GNUNET_YES;
- send_data ( &test_no_ident, host_str);
- GNUNET_free (host_str);
- return;
- }
- if (test_too_short_ident.test_executed == GNUNET_NO)
- {
- char * ident = "AAAAAAAAAA";
- /* Connecting to peer with too short identification */
- host_str = GNUNET_malloc (strlen ("http:///")+ 1 + strlen (test_addr)+ strlen (ident));
- GNUNET_asprintf (&host_str, "http://%s/%s",test_addr,ident);
- GNUNET_log (GNUNET_ERROR_TYPE_INFO, _("Connecting to peer with too short peer identification.\n"));
- test_too_short_ident.test_executed = GNUNET_YES;
- send_data ( &test_too_short_ident, host_str);
- GNUNET_free (host_str);
- return;
- }
+ if (test_no_ident.test_executed == GNUNET_NO)
+ {
+ /* Connecting to peer without identification */
+ char * ident = "";
+ GNUNET_asprintf (&host_str, "http://%s/%s",test_addr,ident);
+ GNUNET_log (GNUNET_ERROR_TYPE_INFO, _("Connecting to peer without any peer identification.\n"));
+ test_no_ident.test_executed = GNUNET_YES;
+ send_data ( &test_no_ident, host_str);
+ GNUNET_free (host_str);
+ return;
+ }
+ if (test_too_short_ident.test_executed == GNUNET_NO)
+ {
+ char * ident = "AAAAAAAAAA";
+ /* Connecting to peer with too short identification */
+ GNUNET_asprintf (&host_str, "http://%s/%s",test_addr,ident);
+ GNUNET_log (GNUNET_ERROR_TYPE_INFO, _("Connecting to peer with too short peer identification.\n"));
+ test_too_short_ident.test_executed = GNUNET_YES;
+ send_data ( &test_too_short_ident, host_str);
+ GNUNET_free (host_str);
+ return;
+ }
- if (test_too_long_ident.test_executed == GNUNET_NO)
- {
- char * ident = "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA";
-
- /* Connecting to peer with too long identification */
- host_str = GNUNET_malloc (strlen ("http:///")+ 1 + strlen (test_addr)+ strlen (ident));
- GNUNET_asprintf (&host_str, "http://%s/%s",test_addr,ident);
- GNUNET_log (GNUNET_ERROR_TYPE_INFO, _("Connecting to peer with too long peer identification.\n"));
- test_too_long_ident.test_executed = GNUNET_YES;
- send_data ( &test_too_long_ident, host_str);
- GNUNET_free (host_str);
- return;
- }
- if (test_valid_ident.test_executed == GNUNET_NO)
- {
- struct GNUNET_CRYPTO_HashAsciiEncoded ident;
- GNUNET_CRYPTO_hash_to_enc(&my_identity.hashPubKey,&ident);
- host_str = GNUNET_malloc (strlen ("http:///")+ 1 + strlen (test_addr)+ strlen ((char *) &ident));
- GNUNET_asprintf (&host_str, "http://%s/%s",test_addr,(char *) &ident);
-
- GNUNET_log (GNUNET_ERROR_TYPE_INFO, _("Connecting to peer with valid peer identification.\n"));
- test_valid_ident.test_executed = GNUNET_YES;
- send_data ( &test_valid_ident, host_str);
- GNUNET_free (host_str);
- return;
+ if (test_too_long_ident.test_executed == GNUNET_NO)
+ {
+ char * ident = "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA";
+
+ /* Connecting to peer with too long identification */
+ GNUNET_asprintf (&host_str, "http://%s/%s",test_addr,ident);
+ GNUNET_log (GNUNET_ERROR_TYPE_INFO, _("Connecting to peer with too long peer identification.\n"));
+ test_too_long_ident.test_executed = GNUNET_YES;
+ send_data ( &test_too_long_ident, host_str);
+ GNUNET_free (host_str);
+ return;
+ }
+ if (test_valid_ident.test_executed == GNUNET_NO)
+ {
+ struct GNUNET_CRYPTO_HashAsciiEncoded ident;
+ GNUNET_CRYPTO_hash_to_enc(&my_identity.hashPubKey,&ident);
+ GNUNET_asprintf (&host_str, "http://%s/%s%s",test_addr,(char *) &ident,";0");
+ GNUNET_log (GNUNET_ERROR_TYPE_INFO, _("Connecting to peer with valid peer identification.\n"));
+ test_valid_ident.test_executed = GNUNET_YES;
+ send_data ( &test_valid_ident, host_str);
+ GNUNET_free (host_str);
+ return;
+ }
}
-
if (phase==1)
{
+ GNUNET_log (GNUNET_ERROR_TYPE_INFO, _("\nPhase 1: transmit data to all suggested addresses\n\n"));
/* Using one of the addresses the plugin proposed */
GNUNET_assert (addr_head->addr != NULL);
memcpy(tmp,&msg,sizeof(struct GNUNET_MessageHeader));
api->send(api->cls, &my_identity, tmp, sizeof(struct GNUNET_MessageHeader), 0, TIMEOUT, NULL,tmp_addr->addr, tmp_addr->addrlen, GNUNET_YES, &task_send_cont, &fail_msgs_transmited_to_local_addrs);
tmp_addr = tmp_addr->next;
+
count ++;
type ++;
}
if (phase==2)
{
+ struct Session * session = cls;
+ msg = GNUNET_malloc (sizeof(struct GNUNET_MessageHeader));
+
+ GNUNET_log (GNUNET_ERROR_TYPE_INFO, _("\nPhase 2: session selection\n\n"));
+ size = sizeof(struct GNUNET_MessageHeader);
+ msg->size=htons(size);
+ msg->type = htons(20);
+ api->send(api->cls, &my_identity, (const char *) msg, size, 0, TIMEOUT, NULL, NULL, 0, GNUNET_NO, &task_send_cont, NULL);
+
+ msg->type = htons(21);
+ api->send(api->cls, &my_identity, (const char *) msg, size, 0, TIMEOUT, NULL, NULL, 0, GNUNET_SYSERR, &task_send_cont, NULL);
+
+ /* answer on session*/
+ size = sizeof( struct GNUNET_MessageHeader);
+ msg->size = htons(size);
+ msg->type = htons(22);
+ api->send(api->cls, &my_identity, (const char *) msg, size, 0, TIMEOUT, session, NULL, 0, GNUNET_SYSERR, &task_send_cont, NULL);
+
+ GNUNET_free(msg);
+
+ /* answer on session with big message not fitting in mhd send buffer*/
+ size = GNUNET_SERVER_MAX_MESSAGE_SIZE-1;
+ msg = GNUNET_malloc (size);
+ msg->size=htons(size);
+ msg->type = htons(23);
+ api->send(api->cls, &my_identity, (const char *) msg, size, 0, TIMEOUT, session, NULL, 0, GNUNET_NO, &task_send_cont, NULL);
+ GNUNET_free(msg);
+ return;
+ }
+
+ if (phase==3)
+ {
+
+ GNUNET_log (GNUNET_ERROR_TYPE_INFO, _("\nPhase 3: send multiple or big messages after disconnect\n\n"));
+ /* disconnect from peer, so new connections are created */
+ //GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,"Disconnect from peer: `%s'\n", GNUNET_i2s(&my_identity));
+ //api->disconnect(api->cls, &my_identity);
- struct GNUNET_MessageHeader msg;
- char * tmp = GNUNET_malloc(sizeof(struct GNUNET_MessageHeader));
/* send a multiple GNUNET_messages at a time*/
- GNUNET_free(tmp);
- tmp = GNUNET_malloc(4 * sizeof(struct GNUNET_MessageHeader));
- struct GNUNET_MessageHeader * msg1 = (struct GNUNET_MessageHeader *) tmp;
- msg1->size = htons(2 * sizeof(struct GNUNET_MessageHeader));
- msg1->type = htons(40);
- struct GNUNET_MessageHeader * msg2 = &msg1[2];
- msg2->size = htons(2 * sizeof(struct GNUNET_MessageHeader));
- msg2->type = htons(41);
- api->send(api->cls, &my_identity, tmp, 4 * sizeof(struct GNUNET_MessageHeader), 0, TIMEOUT, NULL,addr_head->addr, addr_head->addrlen, GNUNET_YES, &task_send_cont, &fail_multiple_msgs_in_transmission);
+ size = 2 * sizeof(struct GNUNET_MessageHeader);
+ msg = GNUNET_malloc( 2* size);
+ msg->size = htons(size);
+ msg->type = htons(30);
+ struct GNUNET_MessageHeader * msg2 = &msg[2];
+ msg2->size = htons(2 * sizeof(struct GNUNET_MessageHeader));
+ msg2->type = htons(31);
+ api->send(api->cls, &my_identity, (const char *) msg, 4 * sizeof(struct GNUNET_MessageHeader), 0, TIMEOUT, NULL,addr_head->addr, addr_head->addrlen, GNUNET_NO, &task_send_cont, &fail_multiple_msgs_in_transmission);
+ GNUNET_free(msg);
/* send a message with size GNUNET_SERVER_MAX_MESSAGE_SIZE-1 */
- GNUNET_free(tmp);
- tmp = GNUNET_malloc(GNUNET_SERVER_MAX_MESSAGE_SIZE-1);
- uint16_t t = (uint16_t)GNUNET_SERVER_MAX_MESSAGE_SIZE-1;
- msg.size = htons(t);
- memcpy(tmp,&msg,sizeof(struct GNUNET_MessageHeader));
- api->send(api->cls, &my_identity, tmp, GNUNET_SERVER_MAX_MESSAGE_SIZE-1, 0, TIMEOUT, NULL,addr_head->addr, addr_head->addrlen, GNUNET_YES, &task_send_cont, &fail_msg_transmited_max_size);
- GNUNET_free(tmp);
+
+ size = GNUNET_SERVER_MAX_MESSAGE_SIZE-1;
+ msg = GNUNET_malloc(size);
+ msg->size = htons(size);
+ msg->type = htons(32);
+ api->send(api->cls, &my_identity, (const char *) msg, size, 0, TIMEOUT, NULL,addr_head->addr, addr_head->addrlen, GNUNET_NO, &task_send_cont, &fail_msg_transmited_max_size);
+ GNUNET_free(msg);
}
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,"No more tests to run\n");
}
fail_msgs_transmited_to_local_addrs = 0;
fail_msg_transmited_max_size = GNUNET_YES;
fail_multiple_msgs_in_transmission = 0;
+ fail_session_selection_reliable = GNUNET_YES;
+ fail_session_selection_reliable = GNUNET_YES;
+ fail_session_selection_session = GNUNET_YES;
+ fail_session_selection_session_big = GNUNET_YES;
addr_head = NULL;
count_str_addr = 0;
test_valid_ident.test_failed = GNUNET_YES;
test_addr = (char *) api->address_to_string (api->cls,addr_head->addr,addr_head->addrlen);
- run_connection_tests(0);
+
+ GNUNET_log (GNUNET_ERROR_TYPE_INFO, _("\nPhase 0\n\n"));
+ run_connection_tests(0, NULL);
/* testing finished */