From 6b0a149769a7196d687d91020eb0c83c7abd14c1 Mon Sep 17 00:00:00 2001 From: Christian Grothoff Date: Tue, 9 Jul 2013 14:04:00 +0000 Subject: -testcase for monitoring, fails right now, as a good test should... --- src/namestore/test_namestore_api_monitoring.c | 350 ++++++++++++++++++++++++++ 1 file changed, 350 insertions(+) create mode 100644 src/namestore/test_namestore_api_monitoring.c (limited to 'src/namestore/test_namestore_api_monitoring.c') diff --git a/src/namestore/test_namestore_api_monitoring.c b/src/namestore/test_namestore_api_monitoring.c new file mode 100644 index 000000000..a55e8b525 --- /dev/null +++ b/src/namestore/test_namestore_api_monitoring.c @@ -0,0 +1,350 @@ +/* + This file is part of GNUnet. + (C) 2013 Christian Grothoff (and other contributing authors) + + GNUnet is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published + by the Free Software Foundation; either version 3, or (at your + option) any later version. + + GNUnet is distributed in the hope that it will be useful, but + WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + General Public License for more details. + + You should have received a copy of the GNU General Public License + along with GNUnet; see the file COPYING. If not, write to the + Free Software Foundation, Inc., 59 Temple Place - Suite 330, + Boston, MA 02111-1307, USA. +*/ +/** + * @file namestore/test_namestore_api_monitoring.c + * @brief testcase for zone iteration functionality: iterate of a specific zone + */ +#include "platform.h" +#include "gnunet_common.h" +#include "gnunet_namestore_service.h" +#include "gnunet_testing_lib.h" +#include "namestore.h" + + +#define TIMEOUT GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_SECONDS, 100) + + +static struct GNUNET_NAMESTORE_Handle * nsh; + +static GNUNET_SCHEDULER_TaskIdentifier endbadly_task; + +static GNUNET_SCHEDULER_TaskIdentifier stopiteration_task; + +static struct GNUNET_CRYPTO_EccPrivateKey * privkey; + +static struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded pubkey; + +static struct GNUNET_HashCode zone; + +static struct GNUNET_CRYPTO_EccPrivateKey * privkey2; + +static struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded pubkey2; + +static struct GNUNET_HashCode zone2; + +static struct GNUNET_NAMESTORE_ZoneMonitor *zm; + +static int res; + +static int returned_records; + +static struct GNUNET_CRYPTO_EccSignature *sig_1; + +static char * s_name_1; + +static struct GNUNET_NAMESTORE_RecordData *s_rd_1; + +static struct GNUNET_CRYPTO_EccSignature *sig_2; + +static char * s_name_2; + +static struct GNUNET_NAMESTORE_RecordData *s_rd_2; + +static struct GNUNET_CRYPTO_EccSignature *sig_3; + +static char * s_name_3; + +static struct GNUNET_NAMESTORE_RecordData *s_rd_3; + + +static void +do_shutdown () +{ + if (stopiteration_task != GNUNET_SCHEDULER_NO_TASK) + { + GNUNET_SCHEDULER_cancel (stopiteration_task); + stopiteration_task = GNUNET_SCHEDULER_NO_TASK; + } + if (NULL != zm) + { + GNUNET_NAMESTORE_zone_monitor_stop (zm); + zm = NULL; + } + if (NULL != nsh) + { + GNUNET_NAMESTORE_disconnect (nsh); + nsh = NULL; + } + GNUNET_free_non_null(sig_1); + GNUNET_free_non_null(sig_2); + GNUNET_free_non_null(sig_3); + GNUNET_free_non_null(s_name_1); + GNUNET_free_non_null(s_name_2); + GNUNET_free_non_null(s_name_3); + + if (s_rd_1 != NULL) + { + GNUNET_free ((void *)s_rd_1->data); + GNUNET_free (s_rd_1); + } + if (s_rd_2 != NULL) + { + GNUNET_free ((void *)s_rd_2->data); + GNUNET_free (s_rd_2); + } + if (s_rd_3 != NULL) + { + GNUNET_free ((void *)s_rd_3->data); + GNUNET_free (s_rd_3); + } + + if (NULL != privkey) + { + GNUNET_CRYPTO_ecc_key_free (privkey); + privkey = NULL; + } + if (NULL != privkey2) + { + GNUNET_CRYPTO_ecc_key_free (privkey2); + privkey2 = NULL; + } +} + + +/** + * Re-establish the connection to the service. + * + * @param cls handle to use to re-connect. + * @param tc scheduler context + */ +static void +endbadly (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc) +{ + do_shutdown (); + res = 1; +} + + +static void +end (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc) +{ + do_shutdown (); + res = 0; +} + + +static void +zone_proc (void *cls, + const struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded *zone_key, + struct GNUNET_TIME_Absolute expire, + const char *name, + unsigned int rd_count, + const struct GNUNET_NAMESTORE_RecordData *rd, + const struct GNUNET_CRYPTO_EccSignature *signature) +{ + fprintf (stderr, + "Monitor cb for %s\n", + name); + if (GNUNET_OK != GNUNET_NAMESTORE_verify_signature (zone_key, + expire, name, + rd_count, rd, + signature)) + { + struct GNUNET_HashCode zone_key_hash; + + GNUNET_CRYPTO_hash (zone_key, + sizeof (struct GNUNET_CRYPTO_EccPublicKeyBinaryEncoded), + &zone_key_hash); + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, + "Verifying signature for `%s' in zone `%s' with %u records and expiration %llu failed\n", + name, + GNUNET_h2s(&zone_key_hash), + rd_count, + expire.abs_value); + GNUNET_break (0); + } + + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, + "Comparing results name %s\n", + name); + if (0 == strcmp (name, s_name_1)) + { + if (GNUNET_YES != GNUNET_NAMESTORE_records_cmp(rd, s_rd_1)) + GNUNET_break (0); + } + if (0 == strcmp (name, s_name_2)) + { + if (GNUNET_YES != GNUNET_NAMESTORE_records_cmp(rd, s_rd_2)) + GNUNET_break (0); + } + if (0 == strcmp (name, s_name_3)) + { + if (GNUNET_YES != GNUNET_NAMESTORE_records_cmp(rd, s_rd_3)) + GNUNET_break (0); + } + if (3 == ++returned_records) + { + if (endbadly_task != GNUNET_SCHEDULER_NO_TASK) + { + GNUNET_SCHEDULER_cancel (endbadly_task); + endbadly_task = GNUNET_SCHEDULER_NO_TASK; + } + GNUNET_SCHEDULER_add_now (&end, NULL); + } +} + + +static void +put_cont (void *cls, int32_t success, const char *emsg) +{ + static int c = 0; + + if (success == GNUNET_OK) + { + c++; + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Created record %u\n", c); + } + else + { + GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "Failed to created records\n"); + GNUNET_break (0); + GNUNET_SCHEDULER_cancel (endbadly_task); + endbadly_task = GNUNET_SCHEDULER_add_now (&endbadly, NULL); + } +} + + +static struct GNUNET_NAMESTORE_RecordData * +create_record (unsigned int count) +{ + unsigned int c; + struct GNUNET_NAMESTORE_RecordData * rd; + + rd = GNUNET_malloc (count * sizeof (struct GNUNET_NAMESTORE_RecordData)); + for (c = 0; c < count; c++) + { + rd[c].expiration_time = GNUNET_TIME_relative_to_absolute (GNUNET_TIME_UNIT_HOURS).abs_value; + rd[c].record_type = 1111; + rd[c].data_size = 50; + rd[c].data = GNUNET_malloc(50); + memset ((char *) rd[c].data, 'a', 50); + } + return rd; +} + + +static void +run (void *cls, + const struct GNUNET_CONFIGURATION_Handle *cfg, + struct GNUNET_TESTING_Peer *peer) +{ + char *hostkey_file; + struct GNUNET_TIME_Absolute et; + + res = 1; + returned_records = 0; + zm = GNUNET_NAMESTORE_zone_monitor_start (cfg, + NULL, + &zone_proc, + NULL, + NULL); + if (NULL == zm) + { + GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "Failed to create zone monitor\n"); + GNUNET_break (0); + endbadly_task = GNUNET_SCHEDULER_add_now (&endbadly, NULL); + return; + } + endbadly_task = GNUNET_SCHEDULER_add_delayed (TIMEOUT, &endbadly, NULL); + nsh = GNUNET_NAMESTORE_connect (cfg); + GNUNET_break (NULL != nsh); + + GNUNET_asprintf(&hostkey_file, + "zonefiles%s%s", + DIR_SEPARATOR_STR, + "N0UJMP015AFUNR2BTNM3FKPBLG38913BL8IDMCO2H0A1LIB81960.zkey"); + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, + "Using zonekey file `%s' \n", hostkey_file); + privkey = GNUNET_CRYPTO_ecc_key_create_from_file(hostkey_file); + GNUNET_free (hostkey_file); + GNUNET_assert (privkey != NULL); + GNUNET_CRYPTO_ecc_key_get_public(privkey, &pubkey); + GNUNET_CRYPTO_hash(&pubkey, sizeof (pubkey), &zone); + + GNUNET_asprintf(&hostkey_file,"zonefiles%s%s", + DIR_SEPARATOR_STR, + "HGU0A0VCU334DN7F2I9UIUMVQMM7JMSD142LIMNUGTTV9R0CF4EG.zkey"); + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Using zonekey file `%s' \n", hostkey_file); + privkey2 = GNUNET_CRYPTO_ecc_key_create_from_file(hostkey_file); + GNUNET_free (hostkey_file); + + GNUNET_assert (privkey2 != NULL); + GNUNET_CRYPTO_ecc_key_get_public(privkey2, &pubkey2); + GNUNET_CRYPTO_hash(&pubkey2, sizeof (pubkey), &zone2); + + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Created record 1\n"); + + GNUNET_asprintf(&s_name_1, "dummy1"); + s_rd_1 = create_record(1); + et.abs_value = s_rd_1->expiration_time; + sig_1 = GNUNET_NAMESTORE_create_signature(privkey, et, s_name_1, s_rd_1, 1); + GNUNET_NAMESTORE_record_put_by_authority (nsh, privkey, s_name_1, + 1, s_rd_1, + &put_cont, NULL); + + + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Created record 2 \n"); + GNUNET_asprintf(&s_name_2, "dummy2"); + s_rd_2 = create_record(1); + + et.abs_value = s_rd_2->expiration_time; + sig_2 = GNUNET_NAMESTORE_create_signature(privkey, et, s_name_2, s_rd_2, 1); + GNUNET_NAMESTORE_record_put_by_authority (nsh, privkey, s_name_2, + 1, s_rd_2, + &put_cont, NULL); + + GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Created record 3\n"); + /* name in different zone */ + GNUNET_asprintf(&s_name_3, "dummy3"); + s_rd_3 = create_record(1); + et.abs_value = s_rd_3->expiration_time; + sig_3 = GNUNET_NAMESTORE_create_signature(privkey2, et, s_name_3, s_rd_3, 1); + GNUNET_NAMESTORE_record_put (nsh, &pubkey2, s_name_3, + GNUNET_TIME_UNIT_FOREVER_ABS, 1, s_rd_3, sig_3, + &put_cont, NULL); +} + + +int +main (int argc, char *argv[]) +{ + res = 1; + if (0 != + GNUNET_TESTING_service_run ("test-namestore-api-monitoring", + "namestore", + "test_namestore_api.conf", + &run, + NULL)) + return 1; + return res; +} + + +/* end of test_namestore_api_monitoring.c */ -- cgit v1.2.3