2009-09-27 05:38:41 +02:00
|
|
|
/*
|
|
|
|
|
|
|
|
Copyright (c) 2008, Arvid Norberg
|
|
|
|
All rights reserved.
|
|
|
|
|
|
|
|
Redistribution and use in source and binary forms, with or without
|
|
|
|
modification, are permitted provided that the following conditions
|
|
|
|
are met:
|
|
|
|
|
|
|
|
* Redistributions of source code must retain the above copyright
|
|
|
|
notice, this list of conditions and the following disclaimer.
|
|
|
|
* Redistributions in binary form must reproduce the above copyright
|
|
|
|
notice, this list of conditions and the following disclaimer in
|
|
|
|
the documentation and/or other materials provided with the distribution.
|
|
|
|
* Neither the name of the author nor the names of its
|
|
|
|
contributors may be used to endorse or promote products derived
|
|
|
|
from this software without specific prior written permission.
|
|
|
|
|
|
|
|
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
|
|
|
|
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
|
|
|
|
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
|
|
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
|
|
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
|
|
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
|
|
|
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
|
|
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
|
|
POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
|
|
|
|
*/
|
|
|
|
|
2010-02-05 09:40:08 +01:00
|
|
|
#ifndef TORRENT_DISABLE_DHT
|
|
|
|
|
2009-09-27 05:38:41 +02:00
|
|
|
#include "libtorrent/session.hpp"
|
2009-09-27 19:41:51 +02:00
|
|
|
#include "libtorrent/kademlia/node.hpp" // for verify_message
|
|
|
|
#include "libtorrent/bencode.hpp"
|
2011-05-23 02:45:36 +02:00
|
|
|
#include "libtorrent/socket_io.hpp" // for hash_address
|
2012-03-17 20:27:57 +01:00
|
|
|
#include "libtorrent/broadcast_socket.hpp" // for supports_ipv6
|
2012-04-30 07:39:35 +02:00
|
|
|
#include "libtorrent/alert_dispatcher.hpp"
|
2013-09-01 03:10:50 +02:00
|
|
|
|
|
|
|
#include "libtorrent/kademlia/node_id.hpp"
|
|
|
|
#include "libtorrent/kademlia/routing_table.hpp"
|
2013-10-22 07:20:00 +02:00
|
|
|
#include <numeric>
|
2009-09-27 05:38:41 +02:00
|
|
|
|
|
|
|
#include "test.hpp"
|
2013-06-26 21:16:21 +02:00
|
|
|
#include "setup_transfer.hpp"
|
2009-09-27 05:38:41 +02:00
|
|
|
|
2013-10-16 10:11:19 +02:00
|
|
|
#ifdef TORRENT_USE_VALGRIND
|
|
|
|
#include <valgrind/memcheck.h>
|
|
|
|
#endif
|
|
|
|
|
2013-10-22 07:20:00 +02:00
|
|
|
#if TORRENT_USE_IOSTREAM
|
|
|
|
#include <iostream>
|
|
|
|
#endif
|
|
|
|
|
2009-09-27 19:41:51 +02:00
|
|
|
using namespace libtorrent;
|
2011-01-19 06:57:44 +01:00
|
|
|
using namespace libtorrent::dht;
|
2009-09-27 05:38:41 +02:00
|
|
|
|
2013-09-01 03:10:50 +02:00
|
|
|
sha1_hash to_hash(char const* s)
|
|
|
|
{
|
|
|
|
sha1_hash ret;
|
|
|
|
from_hex(s, 40, (char*)&ret[0]);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
void add_and_replace(libtorrent::dht::node_id& dst, libtorrent::dht::node_id const& add)
|
|
|
|
{
|
|
|
|
bool carry = false;
|
|
|
|
for (int k = 19; k >= 0; --k)
|
|
|
|
{
|
|
|
|
int sum = dst[k] + add[k] + (carry?1:0);
|
|
|
|
dst[k] = sum & 255;
|
|
|
|
carry = sum > 255;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void node_push_back(void* userdata, libtorrent::dht::node_entry const& n)
|
|
|
|
{
|
|
|
|
using namespace libtorrent::dht;
|
|
|
|
std::vector<node_entry>* nv = (std::vector<node_entry>*)userdata;
|
|
|
|
nv->push_back(n);
|
|
|
|
}
|
|
|
|
|
|
|
|
void nop(void* userdata, libtorrent::dht::node_entry const& n) {}
|
|
|
|
|
2011-01-19 06:57:44 +01:00
|
|
|
std::list<std::pair<udp::endpoint, entry> > g_responses;
|
2009-09-27 05:38:41 +02:00
|
|
|
|
2012-04-30 07:39:35 +02:00
|
|
|
struct mock_socket : udp_socket_interface
|
2011-01-19 06:57:44 +01:00
|
|
|
{
|
2012-04-30 07:39:35 +02:00
|
|
|
bool send_packet(entry& msg, udp::endpoint const& ep, int flags)
|
|
|
|
{
|
|
|
|
g_responses.push_back(std::make_pair(ep, msg));
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
};
|
2011-01-19 06:57:44 +01:00
|
|
|
|
|
|
|
address rand_v4()
|
|
|
|
{
|
|
|
|
return address_v4((rand() << 16 | rand()) & 0xffffffff);
|
|
|
|
}
|
|
|
|
|
2013-01-18 07:17:30 +01:00
|
|
|
udp::endpoint rand_ep()
|
|
|
|
{
|
|
|
|
return udp::endpoint(rand_v4(), rand());
|
|
|
|
}
|
|
|
|
|
2011-01-19 06:57:44 +01:00
|
|
|
sha1_hash generate_next()
|
|
|
|
{
|
|
|
|
sha1_hash ret;
|
|
|
|
for (int i = 0; i < 20; ++i) ret[i] = rand();
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
boost::array<char, 64> generate_key()
|
|
|
|
{
|
|
|
|
boost::array<char, 64> ret;
|
|
|
|
for (int i = 0; i < 64; ++i) ret[i] = rand();
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2011-03-09 08:51:04 +01:00
|
|
|
static const std::string no;
|
|
|
|
|
2011-01-19 06:57:44 +01:00
|
|
|
void send_dht_msg(node_impl& node, char const* msg, udp::endpoint const& ep
|
|
|
|
, lazy_entry* reply, char const* t = "10", char const* info_hash = 0
|
2011-03-09 08:51:04 +01:00
|
|
|
, char const* name = 0, std::string const token = std::string(), int port = 0
|
2011-05-25 04:26:07 +02:00
|
|
|
, char const* target = 0, entry const* value = 0
|
|
|
|
, bool scrape = false, bool seed = false
|
|
|
|
, std::string const key = std::string(), std::string const sig = std::string()
|
2013-10-14 03:03:43 +02:00
|
|
|
, int seq = -1, char const* cas = 0, sha1_hash const* nid = NULL)
|
2009-09-27 19:41:51 +02:00
|
|
|
{
|
2011-01-22 19:44:48 +01:00
|
|
|
// we're about to clear out the backing buffer
|
|
|
|
// for this lazy_entry, so we better clear it now
|
|
|
|
reply->clear();
|
2009-09-27 19:41:51 +02:00
|
|
|
entry e;
|
|
|
|
e["q"] = msg;
|
|
|
|
e["t"] = t;
|
|
|
|
e["y"] = "q";
|
|
|
|
entry::dictionary_type& a = e["a"].dict();
|
2013-10-14 03:03:43 +02:00
|
|
|
if (nid == NULL) a["id"] = generate_next().to_string();
|
|
|
|
else a["id"] = nid->to_string();
|
2011-05-25 04:26:07 +02:00
|
|
|
if (info_hash) a["info_hash"] = std::string(info_hash, 20);
|
2010-11-27 04:09:28 +01:00
|
|
|
if (name) a["n"] = name;
|
2011-03-09 08:51:04 +01:00
|
|
|
if (!token.empty()) a["token"] = token;
|
2010-11-27 04:09:28 +01:00
|
|
|
if (port) a["port"] = port;
|
2011-05-25 04:26:07 +02:00
|
|
|
if (target) a["target"] = std::string(target, 20);
|
2011-05-23 07:07:52 +02:00
|
|
|
if (value) a["v"] = *value;
|
2011-05-25 04:26:07 +02:00
|
|
|
if (!sig.empty()) a["sig"] = sig;
|
|
|
|
if (!key.empty()) a["k"] = key;
|
2011-05-23 02:45:36 +02:00
|
|
|
if (scrape) a["scrape"] = 1;
|
|
|
|
if (seed) a["seed"] = 1;
|
2011-05-25 04:26:07 +02:00
|
|
|
if (seq >= 0) a["seq"] = seq;
|
2013-09-03 02:45:48 +02:00
|
|
|
if (cas) a["cas"] = std::string(cas, 20);
|
2009-09-27 19:41:51 +02:00
|
|
|
char msg_buf[1500];
|
|
|
|
int size = bencode(msg_buf, e);
|
2013-06-23 03:22:44 +02:00
|
|
|
#if defined TORRENT_DEBUG && TORRENT_USE_IOSTREAM
|
2013-06-23 10:07:39 +02:00
|
|
|
// this yields a lot of output. too much
|
|
|
|
// std::cerr << "sending: " << e << "\n";
|
2013-06-23 03:22:44 +02:00
|
|
|
#endif
|
2009-09-27 05:38:41 +02:00
|
|
|
|
2013-10-16 10:11:19 +02:00
|
|
|
#ifdef TORRENT_USE_VALGRIND
|
|
|
|
VALGRIND_CHECK_MEM_IS_DEFINED(msg_buf, size);
|
|
|
|
#endif
|
|
|
|
|
2011-01-19 06:57:44 +01:00
|
|
|
lazy_entry decoded;
|
2011-05-01 21:28:13 +02:00
|
|
|
error_code ec;
|
|
|
|
lazy_bdecode(msg_buf, msg_buf + size, decoded, ec);
|
|
|
|
if (ec) fprintf(stderr, "lazy_bdecode failed: %s\n", ec.message().c_str());
|
|
|
|
|
2011-01-19 06:57:44 +01:00
|
|
|
dht::msg m(decoded, ep);
|
|
|
|
node.incoming(m);
|
2009-09-27 05:38:41 +02:00
|
|
|
|
2011-01-19 06:57:44 +01:00
|
|
|
// by now the node should have invoked the send function and put the
|
|
|
|
// response in g_responses
|
2009-09-27 05:38:41 +02:00
|
|
|
|
2011-01-19 06:57:44 +01:00
|
|
|
std::list<std::pair<udp::endpoint, entry> >::iterator i
|
|
|
|
= std::find_if(g_responses.begin(), g_responses.end()
|
|
|
|
, boost::bind(&std::pair<udp::endpoint, entry>::first, _1) == ep);
|
|
|
|
if (i == g_responses.end())
|
|
|
|
{
|
|
|
|
TEST_ERROR("not response from DHT node");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
static char inbuf[1500];
|
|
|
|
int len = bencode(inbuf, i->second);
|
|
|
|
g_responses.erase(i);
|
|
|
|
int ret = lazy_bdecode(inbuf, inbuf + len, *reply, ec);
|
2009-09-27 05:38:41 +02:00
|
|
|
TEST_CHECK(ret == 0);
|
2009-09-27 19:41:51 +02:00
|
|
|
}
|
2009-09-27 05:38:41 +02:00
|
|
|
|
2011-01-19 06:57:44 +01:00
|
|
|
struct announce_item
|
2009-09-27 19:41:51 +02:00
|
|
|
{
|
2011-01-19 06:57:44 +01:00
|
|
|
sha1_hash next;
|
|
|
|
int num_peers;
|
|
|
|
entry ent;
|
|
|
|
sha1_hash target;
|
|
|
|
void gen()
|
|
|
|
{
|
2011-05-25 04:26:07 +02:00
|
|
|
num_peers = (rand() % 5) + 1;
|
2011-01-19 06:57:44 +01:00
|
|
|
ent["next"] = next.to_string();
|
|
|
|
ent["A"] = "a";
|
|
|
|
ent["B"] = "b";
|
|
|
|
ent["num_peers"] = num_peers;
|
|
|
|
|
|
|
|
char buf[512];
|
|
|
|
char* ptr = buf;
|
|
|
|
int len = bencode(ptr, ent);
|
|
|
|
target = hasher(buf, len).final();
|
|
|
|
}
|
|
|
|
};
|
2009-09-27 05:38:41 +02:00
|
|
|
|
2011-05-25 04:26:07 +02:00
|
|
|
void announce_immutable_items(node_impl& node, udp::endpoint const* eps
|
|
|
|
, announce_item const* items, int num_items)
|
2011-01-19 06:57:44 +01:00
|
|
|
{
|
2011-05-25 04:26:07 +02:00
|
|
|
std::string token;
|
2011-01-19 06:57:44 +01:00
|
|
|
for (int i = 0; i < 1000; ++i)
|
|
|
|
{
|
|
|
|
for (int j = 0; j < num_items; ++j)
|
|
|
|
{
|
|
|
|
if ((i % items[j].num_peers) == 0) continue;
|
|
|
|
lazy_entry response;
|
2011-05-23 07:07:52 +02:00
|
|
|
send_dht_msg(node, "get", eps[i], &response, "10", 0
|
2011-05-25 04:26:07 +02:00
|
|
|
, 0, no, 0, (char const*)&items[j].target[0]);
|
2011-01-19 06:57:44 +01:00
|
|
|
|
|
|
|
key_desc_t desc[] =
|
|
|
|
{
|
|
|
|
{ "r", lazy_entry::dict_t, 0, key_desc_t::parse_children },
|
|
|
|
{ "id", lazy_entry::string_t, 20, 0},
|
|
|
|
{ "token", lazy_entry::string_t, 0, 0},
|
|
|
|
{ "ip", lazy_entry::string_t, 0, key_desc_t::optional | key_desc_t::last_child},
|
|
|
|
{ "y", lazy_entry::string_t, 1, 0},
|
|
|
|
};
|
|
|
|
|
|
|
|
lazy_entry const* parsed[5];
|
|
|
|
char error_string[200];
|
|
|
|
|
2011-05-25 04:26:07 +02:00
|
|
|
// fprintf(stderr, "msg: %s\n", print_entry(response).c_str());
|
2011-01-19 06:57:44 +01:00
|
|
|
int ret = verify_message(&response, desc, parsed, 5, error_string, sizeof(error_string));
|
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
TEST_EQUAL(parsed[4]->string_value(), "r");
|
2011-05-25 04:26:07 +02:00
|
|
|
token = parsed[2]->string_value();
|
2013-08-18 18:01:20 +02:00
|
|
|
// fprintf(stderr, "got token: %s\n", token.c_str());
|
2011-01-19 06:57:44 +01:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2013-06-23 03:22:44 +02:00
|
|
|
fprintf(stderr, "msg: %s\n", print_entry(response).c_str());
|
2011-05-23 07:07:52 +02:00
|
|
|
fprintf(stderr, " invalid get response: %s\n", error_string);
|
2011-01-19 06:57:44 +01:00
|
|
|
TEST_ERROR(error_string);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (parsed[3])
|
|
|
|
{
|
|
|
|
address_v4::bytes_type b;
|
|
|
|
memcpy(&b[0], parsed[3]->string_ptr(), b.size());
|
|
|
|
address_v4 addr(b);
|
|
|
|
TEST_EQUAL(addr, eps[i].address());
|
|
|
|
}
|
|
|
|
|
2011-05-23 07:07:52 +02:00
|
|
|
send_dht_msg(node, "put", eps[i], &response, "10", 0
|
2011-05-25 04:26:07 +02:00
|
|
|
, 0, token, 0, (char const*)&items[j].target[0], &items[j].ent);
|
2011-01-19 06:57:44 +01:00
|
|
|
|
|
|
|
key_desc_t desc2[] =
|
|
|
|
{
|
|
|
|
{ "y", lazy_entry::string_t, 1, 0 }
|
|
|
|
};
|
|
|
|
|
|
|
|
ret = verify_message(&response, desc2, parsed, 1, error_string, sizeof(error_string));
|
|
|
|
if (ret)
|
|
|
|
{
|
2013-06-23 03:22:44 +02:00
|
|
|
if (parsed[0]->string_value() != "r")
|
|
|
|
fprintf(stderr, "msg: %s\n", print_entry(response).c_str());
|
|
|
|
|
2011-01-19 06:57:44 +01:00
|
|
|
TEST_EQUAL(parsed[0]->string_value(), "r");
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2013-06-23 03:22:44 +02:00
|
|
|
fprintf(stderr, "msg: %s\n", print_entry(response).c_str());
|
2011-05-23 07:07:52 +02:00
|
|
|
fprintf(stderr, " invalid put response: %s\n", error_string);
|
2011-01-19 06:57:44 +01:00
|
|
|
TEST_ERROR(error_string);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2009-09-27 05:38:41 +02:00
|
|
|
|
2011-01-19 06:57:44 +01:00
|
|
|
std::set<int> items_num;
|
|
|
|
for (int j = 0; j < num_items; ++j)
|
|
|
|
{
|
|
|
|
lazy_entry response;
|
2011-05-25 04:26:07 +02:00
|
|
|
send_dht_msg(node, "get", eps[j], &response, "10", 0
|
|
|
|
, 0, no, 0, (char const*)&items[j].target[0]);
|
2011-01-19 06:57:44 +01:00
|
|
|
|
|
|
|
key_desc_t desc[] =
|
|
|
|
{
|
|
|
|
{ "r", lazy_entry::dict_t, 0, key_desc_t::parse_children },
|
2011-05-25 04:26:07 +02:00
|
|
|
{ "v", lazy_entry::dict_t, 0, 0},
|
2011-01-19 06:57:44 +01:00
|
|
|
{ "id", lazy_entry::string_t, 20, key_desc_t::last_child},
|
|
|
|
{ "y", lazy_entry::string_t, 1, 0},
|
|
|
|
};
|
|
|
|
|
2011-05-25 04:26:07 +02:00
|
|
|
lazy_entry const* parsed[4];
|
2011-01-19 06:57:44 +01:00
|
|
|
char error_string[200];
|
|
|
|
|
2011-05-25 04:26:07 +02:00
|
|
|
int ret = verify_message(&response, desc, parsed, 4, error_string, sizeof(error_string));
|
2011-01-19 06:57:44 +01:00
|
|
|
if (ret)
|
|
|
|
{
|
2011-05-25 04:26:07 +02:00
|
|
|
items_num.insert(items_num.begin(), j);
|
2011-05-23 07:07:52 +02:00
|
|
|
}
|
2011-01-19 06:57:44 +01:00
|
|
|
}
|
2009-09-27 05:38:41 +02:00
|
|
|
|
2011-01-19 06:57:44 +01:00
|
|
|
TEST_EQUAL(items_num.size(), 4);
|
|
|
|
|
|
|
|
// items_num should contain 1,2 and 3
|
|
|
|
// #error this doesn't quite hold
|
|
|
|
// TEST_CHECK(items_num.find(1) != items_num.end());
|
|
|
|
// TEST_CHECK(items_num.find(2) != items_num.end());
|
|
|
|
// TEST_CHECK(items_num.find(3) != items_num.end());
|
|
|
|
}
|
|
|
|
|
2012-04-30 07:39:35 +02:00
|
|
|
struct print_alert : alert_dispatcher
|
|
|
|
{
|
|
|
|
virtual bool post_alert(alert* a)
|
|
|
|
{
|
|
|
|
fprintf(stderr, "ALERT: %s\n", a->message().c_str());
|
|
|
|
delete a;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2013-10-22 07:20:00 +02:00
|
|
|
int sum_distance_exp(int s, node_entry const& e, node_id const& ref)
|
|
|
|
{
|
|
|
|
return s + distance_exp(e.id, ref);
|
|
|
|
}
|
|
|
|
|
2013-09-09 09:08:02 +02:00
|
|
|
// TODO: 3 test find_data, obfuscated_get_peers and bootstrap
|
2011-01-19 06:57:44 +01:00
|
|
|
int test_main()
|
|
|
|
{
|
|
|
|
dht_settings sett;
|
|
|
|
sett.max_torrents = 4;
|
2011-05-23 07:07:52 +02:00
|
|
|
sett.max_dht_items = 4;
|
2013-10-14 03:03:43 +02:00
|
|
|
sett.enforce_node_id = false;
|
2011-01-19 06:57:44 +01:00
|
|
|
address ext = address::from_string("236.0.0.1");
|
2012-04-30 07:39:35 +02:00
|
|
|
mock_socket s;
|
|
|
|
print_alert ad;
|
2012-04-30 08:30:35 +02:00
|
|
|
dht::node_impl node(&ad, &s, sett, node_id(0), ext, 0);
|
2009-09-27 05:38:41 +02:00
|
|
|
|
2011-01-19 06:57:44 +01:00
|
|
|
// DHT should be running on port 48199 now
|
2009-09-27 19:41:51 +02:00
|
|
|
lazy_entry response;
|
2013-09-03 02:45:48 +02:00
|
|
|
lazy_entry const* parsed[10];
|
2009-09-27 19:41:51 +02:00
|
|
|
char error_string[200];
|
|
|
|
bool ret;
|
2011-01-22 19:44:48 +01:00
|
|
|
|
2009-09-27 19:41:51 +02:00
|
|
|
// ====== ping ======
|
2011-01-19 06:57:44 +01:00
|
|
|
udp::endpoint source(address::from_string("10.0.0.1"), 20);
|
|
|
|
send_dht_msg(node, "ping", source, &response, "10");
|
2009-09-27 19:41:51 +02:00
|
|
|
|
|
|
|
dht::key_desc_t pong_desc[] = {
|
|
|
|
{"y", lazy_entry::string_t, 1, 0},
|
|
|
|
{"t", lazy_entry::string_t, 2, 0},
|
2011-01-19 06:57:44 +01:00
|
|
|
{"r", lazy_entry::dict_t, 0, key_desc_t::parse_children},
|
|
|
|
{"id", lazy_entry::string_t, 20, key_desc_t::last_child},
|
2009-09-27 19:41:51 +02:00
|
|
|
};
|
|
|
|
|
2010-11-27 04:09:28 +01:00
|
|
|
fprintf(stderr, "msg: %s\n", print_entry(response).c_str());
|
2011-01-19 06:57:44 +01:00
|
|
|
ret = dht::verify_message(&response, pong_desc, parsed, 4, error_string, sizeof(error_string));
|
2009-09-27 19:41:51 +02:00
|
|
|
TEST_CHECK(ret);
|
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
TEST_CHECK(parsed[0]->string_value() == "r");
|
|
|
|
TEST_CHECK(parsed[1]->string_value() == "10");
|
|
|
|
}
|
2010-11-27 04:09:28 +01:00
|
|
|
else
|
|
|
|
{
|
2011-01-19 06:57:44 +01:00
|
|
|
fprintf(stderr, " invalid ping response: %s\n", error_string);
|
2010-11-27 04:09:28 +01:00
|
|
|
}
|
2009-09-27 19:41:51 +02:00
|
|
|
|
|
|
|
// ====== invalid message ======
|
|
|
|
|
2011-01-19 06:57:44 +01:00
|
|
|
send_dht_msg(node, "find_node", source, &response, "10");
|
2009-09-27 19:41:51 +02:00
|
|
|
|
|
|
|
dht::key_desc_t err_desc[] = {
|
|
|
|
{"y", lazy_entry::string_t, 1, 0},
|
2013-10-14 03:03:43 +02:00
|
|
|
{"e", lazy_entry::list_t, 2, 0}
|
2009-09-27 19:41:51 +02:00
|
|
|
};
|
|
|
|
|
2010-11-27 04:09:28 +01:00
|
|
|
fprintf(stderr, "msg: %s\n", print_entry(response).c_str());
|
2013-10-14 03:03:43 +02:00
|
|
|
ret = dht::verify_message(&response, err_desc, parsed, 2, error_string, sizeof(error_string));
|
2009-09-27 19:41:51 +02:00
|
|
|
TEST_CHECK(ret);
|
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
TEST_CHECK(parsed[0]->string_value() == "e");
|
2011-01-19 06:57:44 +01:00
|
|
|
if (parsed[1]->list_at(0)->type() == lazy_entry::int_t
|
2009-09-27 19:41:51 +02:00
|
|
|
&& parsed[1]->list_at(1)->type() == lazy_entry::string_t)
|
|
|
|
{
|
|
|
|
TEST_CHECK(parsed[1]->list_at(1)->string_value() == "missing 'target' key");
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
TEST_ERROR("invalid error response");
|
|
|
|
}
|
|
|
|
}
|
2010-11-27 04:09:28 +01:00
|
|
|
else
|
|
|
|
{
|
2011-01-19 06:57:44 +01:00
|
|
|
fprintf(stderr, " invalid error response: %s\n", error_string);
|
2010-11-27 04:09:28 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// ====== get_peers ======
|
|
|
|
|
2011-01-19 06:57:44 +01:00
|
|
|
send_dht_msg(node, "get_peers", source, &response, "10", "01010101010101010101");
|
2010-11-27 04:09:28 +01:00
|
|
|
|
|
|
|
dht::key_desc_t peer1_desc[] = {
|
|
|
|
{"y", lazy_entry::string_t, 1, 0},
|
2011-01-19 06:57:44 +01:00
|
|
|
{"r", lazy_entry::dict_t, 0, key_desc_t::parse_children},
|
2011-05-23 02:45:36 +02:00
|
|
|
{"token", lazy_entry::string_t, 0, 0},
|
2011-01-19 06:57:44 +01:00
|
|
|
{"id", lazy_entry::string_t, 20, key_desc_t::last_child},
|
2010-11-27 04:09:28 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
std::string token;
|
|
|
|
fprintf(stderr, "msg: %s\n", print_entry(response).c_str());
|
2011-05-23 02:45:36 +02:00
|
|
|
ret = dht::verify_message(&response, peer1_desc, parsed, 4, error_string, sizeof(error_string));
|
2010-11-27 04:09:28 +01:00
|
|
|
TEST_CHECK(ret);
|
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
TEST_CHECK(parsed[0]->string_value() == "r");
|
2011-05-23 02:45:36 +02:00
|
|
|
token = parsed[2]->string_value();
|
2013-08-18 18:01:20 +02:00
|
|
|
// fprintf(stderr, "got token: %s\n", token.c_str());
|
2010-11-27 04:09:28 +01:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2013-06-23 03:22:44 +02:00
|
|
|
fprintf(stderr, "msg: %s\n", print_entry(response).c_str());
|
2011-01-19 06:57:44 +01:00
|
|
|
fprintf(stderr, " invalid get_peers response: %s\n", error_string);
|
2010-11-27 04:09:28 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// ====== announce ======
|
|
|
|
|
2011-03-09 08:51:04 +01:00
|
|
|
send_dht_msg(node, "announce_peer", source, &response, "10", "01010101010101010101", "test", token, 8080);
|
2010-11-27 04:09:28 +01:00
|
|
|
|
|
|
|
dht::key_desc_t ann_desc[] = {
|
|
|
|
{"y", lazy_entry::string_t, 1, 0},
|
2011-01-19 06:57:44 +01:00
|
|
|
{"r", lazy_entry::dict_t, 0, key_desc_t::parse_children},
|
|
|
|
{"id", lazy_entry::string_t, 20, key_desc_t::last_child},
|
2010-11-27 04:09:28 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
fprintf(stderr, "msg: %s\n", print_entry(response).c_str());
|
2011-01-19 06:57:44 +01:00
|
|
|
ret = dht::verify_message(&response, ann_desc, parsed, 3, error_string, sizeof(error_string));
|
2010-11-27 04:09:28 +01:00
|
|
|
TEST_CHECK(ret);
|
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
TEST_CHECK(parsed[0]->string_value() == "r");
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2011-01-19 06:57:44 +01:00
|
|
|
fprintf(stderr, " invalid announce response: %s\n", error_string);
|
2010-11-27 04:09:28 +01:00
|
|
|
}
|
|
|
|
|
2011-05-23 02:45:36 +02:00
|
|
|
// announce from 100 random IPs and make sure scrape works
|
|
|
|
// 50 downloaders and 50 seeds
|
|
|
|
for (int i = 0; i < 100; ++i)
|
|
|
|
{
|
|
|
|
source = udp::endpoint(rand_v4(), 6000);
|
|
|
|
send_dht_msg(node, "get_peers", source, &response, "10", "01010101010101010101");
|
|
|
|
ret = dht::verify_message(&response, peer1_desc, parsed, 4, error_string, sizeof(error_string));
|
|
|
|
|
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
TEST_CHECK(parsed[0]->string_value() == "r");
|
|
|
|
token = parsed[2]->string_value();
|
2013-08-18 18:01:20 +02:00
|
|
|
// fprintf(stderr, "got token: %s\n", token.c_str());
|
2011-05-23 02:45:36 +02:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2013-06-23 03:22:44 +02:00
|
|
|
fprintf(stderr, "msg: %s\n", print_entry(response).c_str());
|
2011-05-23 02:45:36 +02:00
|
|
|
fprintf(stderr, " invalid get_peers response: %s\n", error_string);
|
|
|
|
}
|
|
|
|
response.clear();
|
|
|
|
send_dht_msg(node, "announce_peer", source, &response, "10", "01010101010101010101"
|
2011-05-25 04:26:07 +02:00
|
|
|
, "test", token, 8080, 0, 0, false, i >= 50);
|
2011-05-23 02:45:36 +02:00
|
|
|
response.clear();
|
|
|
|
}
|
|
|
|
|
2010-11-27 04:09:28 +01:00
|
|
|
// ====== get_peers ======
|
|
|
|
|
2011-05-23 02:45:36 +02:00
|
|
|
send_dht_msg(node, "get_peers", source, &response, "10", "01010101010101010101"
|
2011-05-25 04:26:07 +02:00
|
|
|
, 0, no, 0, 0, 0, true);
|
2010-11-27 04:09:28 +01:00
|
|
|
|
|
|
|
dht::key_desc_t peer2_desc[] = {
|
|
|
|
{"y", lazy_entry::string_t, 1, 0},
|
2011-01-19 06:57:44 +01:00
|
|
|
{"r", lazy_entry::dict_t, 0, key_desc_t::parse_children},
|
2011-05-23 02:45:36 +02:00
|
|
|
{"BFpe", lazy_entry::string_t, 256, 0},
|
|
|
|
{"BFse", lazy_entry::string_t, 256, 0},
|
2011-01-19 06:57:44 +01:00
|
|
|
{"id", lazy_entry::string_t, 20, key_desc_t::last_child},
|
2010-11-27 04:09:28 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
fprintf(stderr, "msg: %s\n", print_entry(response).c_str());
|
2011-05-23 02:45:36 +02:00
|
|
|
ret = dht::verify_message(&response, peer2_desc, parsed, 5, error_string, sizeof(error_string));
|
2010-11-27 04:09:28 +01:00
|
|
|
TEST_CHECK(ret);
|
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
TEST_CHECK(parsed[0]->string_value() == "r");
|
|
|
|
TEST_EQUAL(parsed[1]->dict_find_string_value("n"), "test");
|
2011-05-23 02:45:36 +02:00
|
|
|
|
|
|
|
bloom_filter<256> downloaders;
|
|
|
|
bloom_filter<256> seeds;
|
|
|
|
downloaders.from_string(parsed[2]->string_ptr());
|
|
|
|
seeds.from_string(parsed[3]->string_ptr());
|
|
|
|
|
|
|
|
fprintf(stderr, "seeds: %f\n", seeds.size());
|
|
|
|
fprintf(stderr, "downloaders: %f\n", downloaders.size());
|
|
|
|
|
2011-05-25 04:41:48 +02:00
|
|
|
TEST_CHECK(fabs(seeds.size() - 50.f) <= 3.f);
|
|
|
|
TEST_CHECK(fabs(downloaders.size() - 50.f) <= 3.f);
|
2010-11-27 04:09:28 +01:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2011-01-19 06:57:44 +01:00
|
|
|
fprintf(stderr, " invalid get_peers response: %s\n", error_string);
|
|
|
|
}
|
2011-01-22 19:44:48 +01:00
|
|
|
|
2013-10-14 03:03:43 +02:00
|
|
|
// ====== test node ID enforcement ======
|
|
|
|
|
|
|
|
// enable node_id enforcement
|
|
|
|
sett.enforce_node_id = true;
|
|
|
|
|
|
|
|
// this is one of the test vectors from:
|
|
|
|
// http://libtorrent.org/dht_sec.html
|
|
|
|
source = udp::endpoint(address::from_string("124.31.75.21"), 20);
|
|
|
|
node_id nid = to_hash("1712f6c70c5d6a4ec8a88e4c6ab4c28b95eee401");
|
|
|
|
send_dht_msg(node, "find_node", source, &response, "10", 0, 0, std::string()
|
|
|
|
, 0, "0101010101010101010101010101010101010101", 0, false, false, std::string(), std::string(), -1, 0, &nid);
|
|
|
|
|
|
|
|
dht::key_desc_t nodes_desc[] = {
|
|
|
|
{"y", lazy_entry::string_t, 1, 0},
|
|
|
|
{"r", lazy_entry::dict_t, 0, key_desc_t::parse_children},
|
|
|
|
{"id", lazy_entry::string_t, 20, key_desc_t::last_child},
|
|
|
|
};
|
|
|
|
|
|
|
|
fprintf(stderr, "msg: %s\n", print_entry(response).c_str());
|
|
|
|
ret = dht::verify_message(&response, nodes_desc, parsed, 3, error_string, sizeof(error_string));
|
|
|
|
TEST_CHECK(ret);
|
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
TEST_CHECK(parsed[0]->string_value() == "r");
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
fprintf(stderr, "msg: %s\n", print_entry(response).c_str());
|
|
|
|
fprintf(stderr, " invalid error response: %s\n", error_string);
|
|
|
|
}
|
|
|
|
|
|
|
|
// verify that we reject invalid node IDs
|
|
|
|
// this is now an invalid node-id for 'source'
|
|
|
|
nid[0] = 0x18;
|
|
|
|
send_dht_msg(node, "find_node", source, &response, "10", 0, 0, std::string()
|
|
|
|
, 0, "0101010101010101010101010101010101010101", 0, false, false, std::string(), std::string(), -1, 0, &nid);
|
|
|
|
|
|
|
|
ret = dht::verify_message(&response, err_desc, parsed, 2, error_string, sizeof(error_string));
|
|
|
|
TEST_CHECK(ret);
|
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
TEST_CHECK(parsed[0]->string_value() == "e");
|
|
|
|
if (parsed[1]->list_at(0)->type() == lazy_entry::int_t
|
|
|
|
&& parsed[1]->list_at(1)->type() == lazy_entry::string_t)
|
|
|
|
{
|
|
|
|
TEST_CHECK(parsed[1]->list_at(1)->string_value() == "invalid node ID");
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
fprintf(stderr, "msg: %s\n", print_entry(response).c_str());
|
|
|
|
TEST_ERROR("invalid error response");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
fprintf(stderr, "msg: %s\n", print_entry(response).c_str());
|
|
|
|
fprintf(stderr, " invalid error response: %s\n", error_string);
|
|
|
|
}
|
|
|
|
|
|
|
|
sett.enforce_node_id = false;
|
|
|
|
|
|
|
|
// ===========================
|
|
|
|
|
2011-05-23 02:45:36 +02:00
|
|
|
bloom_filter<256> test;
|
|
|
|
for (int i = 0; i < 256; ++i)
|
|
|
|
{
|
|
|
|
char adr[50];
|
|
|
|
snprintf(adr, 50, "192.0.2.%d", i);
|
|
|
|
address a = address::from_string(adr);
|
|
|
|
sha1_hash iphash;
|
|
|
|
hash_address(a, iphash);
|
|
|
|
test.set(iphash);
|
|
|
|
}
|
|
|
|
|
2012-03-17 20:27:57 +01:00
|
|
|
if (supports_ipv6())
|
2011-05-23 02:45:36 +02:00
|
|
|
{
|
2012-03-17 20:27:57 +01:00
|
|
|
for (int i = 0; i < 0x3E8; ++i)
|
|
|
|
{
|
|
|
|
char adr[50];
|
|
|
|
snprintf(adr, 50, "2001:db8::%x", i);
|
|
|
|
address a = address::from_string(adr);
|
|
|
|
sha1_hash iphash;
|
|
|
|
hash_address(a, iphash);
|
|
|
|
test.set(iphash);
|
|
|
|
}
|
2011-05-23 02:45:36 +02:00
|
|
|
}
|
|
|
|
|
2011-05-25 04:26:07 +02:00
|
|
|
// these are test vectors from BEP 33
|
|
|
|
// http://www.bittorrent.org/beps/bep_0033.html
|
2011-05-23 02:45:36 +02:00
|
|
|
fprintf(stderr, "test.size: %f\n", test.size());
|
|
|
|
fprintf(stderr, "%s\n", to_hex(test.to_string()).c_str());
|
2012-03-17 20:27:57 +01:00
|
|
|
if (supports_ipv6())
|
|
|
|
{
|
2012-03-19 01:42:12 +01:00
|
|
|
TEST_CHECK(fabs(test.size() - 1224.93f) < 0.001);
|
2012-03-17 20:27:57 +01:00
|
|
|
TEST_CHECK(to_hex(test.to_string()) == "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");
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2012-03-19 01:56:38 +01:00
|
|
|
TEST_CHECK(fabs(test.size() - 257.854f) < 0.001);
|
2012-03-17 20:27:57 +01:00
|
|
|
TEST_CHECK(to_hex(test.to_string()) == "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");
|
|
|
|
}
|
2011-05-23 02:45:36 +02:00
|
|
|
|
2011-01-22 19:44:48 +01:00
|
|
|
response.clear();
|
|
|
|
|
2011-05-23 07:07:52 +02:00
|
|
|
// ====== put ======
|
|
|
|
|
2011-01-19 06:57:44 +01:00
|
|
|
udp::endpoint eps[1000];
|
|
|
|
|
|
|
|
for (int i = 0; i < 1000; ++i)
|
|
|
|
eps[i] = udp::endpoint(rand_v4(), (rand() % 16534) + 1);
|
2009-09-27 05:38:41 +02:00
|
|
|
|
2011-01-19 06:57:44 +01:00
|
|
|
announce_item items[] =
|
|
|
|
{
|
2011-05-23 02:45:36 +02:00
|
|
|
{ generate_next(), 1 },
|
|
|
|
{ generate_next(), 2 },
|
|
|
|
{ generate_next(), 3 },
|
|
|
|
{ generate_next(), 4 },
|
|
|
|
{ generate_next(), 5 },
|
|
|
|
{ generate_next(), 6 },
|
|
|
|
{ generate_next(), 7 },
|
|
|
|
{ generate_next(), 8 }
|
2011-01-19 06:57:44 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
for (int i = 0; i < sizeof(items)/sizeof(items[0]); ++i)
|
|
|
|
items[i].gen();
|
|
|
|
|
2011-05-25 04:26:07 +02:00
|
|
|
announce_immutable_items(node, eps, items, sizeof(items)/sizeof(items[0]));
|
|
|
|
|
|
|
|
// ==== get / put mutable items ===
|
|
|
|
|
2013-08-18 18:01:20 +02:00
|
|
|
fprintf(stderr, "generating ed25519 keys\n");
|
|
|
|
unsigned char seed[32];
|
|
|
|
ed25519_create_seed(seed);
|
|
|
|
unsigned char private_key[64];
|
|
|
|
unsigned char public_key[32];
|
2011-05-25 04:26:07 +02:00
|
|
|
|
2013-08-18 18:01:20 +02:00
|
|
|
ed25519_create_keypair(public_key, private_key, seed);
|
|
|
|
fprintf(stderr, "pub: %s priv: %s\n"
|
|
|
|
, to_hex(std::string((char*)public_key, 32)).c_str()
|
|
|
|
, to_hex(std::string((char*)private_key, 64)).c_str());
|
2011-05-25 04:26:07 +02:00
|
|
|
|
|
|
|
TEST_CHECK(ret);
|
|
|
|
|
|
|
|
send_dht_msg(node, "get", source, &response, "10", 0
|
2013-08-18 18:01:20 +02:00
|
|
|
, 0, no, 0, (char*)&hasher((char*)public_key, 32).final()[0]
|
|
|
|
, 0, false, false, std::string(), std::string(), 64);
|
2011-05-25 04:26:07 +02:00
|
|
|
|
|
|
|
key_desc_t desc[] =
|
|
|
|
{
|
|
|
|
{ "r", lazy_entry::dict_t, 0, key_desc_t::parse_children },
|
|
|
|
{ "id", lazy_entry::string_t, 20, 0},
|
|
|
|
{ "token", lazy_entry::string_t, 0, 0},
|
|
|
|
{ "ip", lazy_entry::string_t, 0, key_desc_t::optional | key_desc_t::last_child},
|
|
|
|
{ "y", lazy_entry::string_t, 1, 0},
|
|
|
|
};
|
|
|
|
|
|
|
|
ret = verify_message(&response, desc, parsed, 5, error_string, sizeof(error_string));
|
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
TEST_EQUAL(parsed[4]->string_value(), "r");
|
|
|
|
token = parsed[2]->string_value();
|
2013-06-23 03:22:44 +02:00
|
|
|
fprintf(stderr, "got token: %s\n", token.c_str());
|
2011-05-25 04:26:07 +02:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2013-06-23 03:22:44 +02:00
|
|
|
fprintf(stderr, "msg: %s\n", print_entry(response).c_str());
|
2011-05-25 04:26:07 +02:00
|
|
|
fprintf(stderr, " invalid get response: %s\n%s\n"
|
|
|
|
, error_string, print_entry(response).c_str());
|
|
|
|
TEST_ERROR(error_string);
|
|
|
|
}
|
|
|
|
|
2013-08-18 18:01:20 +02:00
|
|
|
unsigned char signature[64];
|
|
|
|
char buffer[1200];
|
2011-05-25 04:26:07 +02:00
|
|
|
int seq = 4;
|
|
|
|
int pos = snprintf(buffer, sizeof(buffer), "3:seqi%de1:v", seq);
|
2013-08-18 18:01:20 +02:00
|
|
|
char* ptr = buffer + pos;
|
|
|
|
pos += bencode(ptr, items[0].ent);
|
2013-10-22 03:24:33 +02:00
|
|
|
ed25519_sign(signature, (unsigned char*)buffer, pos, public_key, private_key);
|
|
|
|
TEST_EQUAL(ed25519_verify(signature, (unsigned char*)buffer, pos, public_key), 1);
|
2013-10-16 10:11:19 +02:00
|
|
|
#ifdef TORRENT_USE_VALGRIND
|
|
|
|
VALGRIND_CHECK_MEM_IS_DEFINED(signature, 64);
|
|
|
|
#endif
|
2011-05-25 04:26:07 +02:00
|
|
|
|
|
|
|
send_dht_msg(node, "put", source, &response, "10", 0
|
|
|
|
, 0, token, 0, 0, &items[0].ent, false, false
|
2013-08-18 18:01:20 +02:00
|
|
|
, std::string((char*)public_key, 32)
|
|
|
|
, std::string((char*)signature, 64), seq);
|
2011-05-25 04:26:07 +02:00
|
|
|
|
|
|
|
key_desc_t desc2[] =
|
|
|
|
{
|
|
|
|
{ "y", lazy_entry::string_t, 1, 0 }
|
|
|
|
};
|
|
|
|
|
|
|
|
ret = verify_message(&response, desc2, parsed, 1, error_string, sizeof(error_string));
|
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
fprintf(stderr, "put response: %s\n"
|
|
|
|
, print_entry(response).c_str());
|
|
|
|
TEST_EQUAL(parsed[0]->string_value(), "r");
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
fprintf(stderr, " invalid put response: %s\n%s\n"
|
|
|
|
, error_string, print_entry(response).c_str());
|
|
|
|
TEST_ERROR(error_string);
|
|
|
|
}
|
2011-05-23 07:07:52 +02:00
|
|
|
|
2013-09-03 02:45:48 +02:00
|
|
|
send_dht_msg(node, "get", source, &response, "10", 0
|
|
|
|
, 0, no, 0, (char*)&hasher((char*)public_key, 32).final()[0]
|
|
|
|
, 0, false, false, std::string(), std::string(), 64);
|
|
|
|
|
|
|
|
key_desc_t desc3[] =
|
|
|
|
{
|
|
|
|
{ "r", lazy_entry::dict_t, 0, key_desc_t::parse_children },
|
|
|
|
{ "id", lazy_entry::string_t, 20, 0},
|
|
|
|
{ "v", lazy_entry::none_t, 0, 0},
|
|
|
|
{ "seq", lazy_entry::int_t, 0, 0},
|
|
|
|
{ "sig", lazy_entry::string_t, 0, 0},
|
|
|
|
{ "ip", lazy_entry::string_t, 0, key_desc_t::optional | key_desc_t::last_child},
|
|
|
|
{ "y", lazy_entry::string_t, 1, 0},
|
|
|
|
};
|
|
|
|
|
|
|
|
ret = verify_message(&response, desc3, parsed, 7, error_string, sizeof(error_string));
|
|
|
|
if (ret == 0)
|
|
|
|
{
|
|
|
|
fprintf(stderr, "msg: %s\n", print_entry(response).c_str());
|
|
|
|
fprintf(stderr, " invalid get response: %s\n%s\n"
|
|
|
|
, error_string, print_entry(response).c_str());
|
|
|
|
TEST_ERROR(error_string);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
char value[1020];
|
|
|
|
char* ptr = value;
|
|
|
|
int value_len = bencode(ptr, items[0].ent);
|
|
|
|
TEST_EQUAL(value_len, parsed[2]->data_section().second);
|
|
|
|
TEST_CHECK(memcmp(parsed[2]->data_section().first, value, value_len) == 0);
|
|
|
|
|
|
|
|
TEST_EQUAL(seq, parsed[3]->int_value());
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2013-10-22 03:24:33 +02:00
|
|
|
// also test that invalid signatures fail!
|
|
|
|
|
|
|
|
pos = snprintf(buffer, sizeof(buffer), "3:seqi%de1:v", seq);
|
|
|
|
ptr = buffer + pos;
|
|
|
|
pos += bencode(ptr, items[0].ent);
|
|
|
|
ed25519_sign(signature, (unsigned char*)buffer, pos, public_key, private_key);
|
|
|
|
TEST_EQUAL(ed25519_verify(signature, (unsigned char*)buffer, pos, public_key), 1);
|
|
|
|
#ifdef TORRENT_USE_VALGRIND
|
|
|
|
VALGRIND_CHECK_MEM_IS_DEFINED(signature, 64);
|
|
|
|
#endif
|
|
|
|
// break the signature
|
|
|
|
signature[2] ^= 0xaa;
|
|
|
|
|
|
|
|
TEST_CHECK(ed25519_verify(signature, (unsigned char*)buffer, pos, public_key) != 1);
|
|
|
|
|
|
|
|
send_dht_msg(node, "put", source, &response, "10", 0
|
|
|
|
, 0, token, 0, 0, &items[0].ent, false, false
|
|
|
|
, std::string((char*)public_key, 32)
|
|
|
|
, std::string((char*)signature, 64), seq);
|
|
|
|
|
|
|
|
key_desc_t desc_error[] =
|
|
|
|
{
|
|
|
|
{ "e", lazy_entry::list_t, 2, 0 },
|
|
|
|
{ "y", lazy_entry::string_t, 1, 0},
|
|
|
|
};
|
|
|
|
|
|
|
|
ret = verify_message(&response, desc_error, parsed, 2, error_string, sizeof(error_string));
|
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
fprintf(stderr, "put response: %s\n", print_entry(response).c_str());
|
|
|
|
TEST_EQUAL(parsed[1]->string_value(), "e");
|
|
|
|
// 206 is the code for invalid signature
|
|
|
|
TEST_EQUAL(parsed[0]->list_int_value_at(0), 206);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
fprintf(stderr, " invalid put response: %s\n%s\n"
|
|
|
|
, error_string, print_entry(response).c_str());
|
|
|
|
TEST_ERROR(error_string);
|
|
|
|
}
|
|
|
|
|
2013-09-03 02:45:48 +02:00
|
|
|
// === test CAS put ===
|
|
|
|
|
|
|
|
// this is the hash that we expect to be there
|
|
|
|
sha1_hash cas = hasher(buffer, pos).final();
|
|
|
|
// increment sequence number
|
|
|
|
++seq;
|
|
|
|
pos = snprintf(buffer, sizeof(buffer), "3:seqi%de1:v", seq);
|
|
|
|
ptr = buffer + pos;
|
|
|
|
// put item 1
|
|
|
|
pos += bencode(ptr, items[1].ent);
|
2013-10-22 03:24:33 +02:00
|
|
|
ed25519_sign(signature, (unsigned char*)buffer, pos, public_key, private_key);
|
|
|
|
TEST_EQUAL(ed25519_verify(signature, (unsigned char*)buffer, pos, public_key), 1);
|
2013-10-16 10:11:19 +02:00
|
|
|
#ifdef TORRENT_USE_VALGRIND
|
|
|
|
VALGRIND_CHECK_MEM_IS_DEFINED(signature, 64);
|
|
|
|
#endif
|
2013-09-03 02:45:48 +02:00
|
|
|
|
|
|
|
send_dht_msg(node, "put", source, &response, "10", 0
|
|
|
|
, 0, token, 0, 0, &items[1].ent, false, false
|
|
|
|
, std::string((char*)public_key, 32)
|
|
|
|
, std::string((char*)signature, 64), seq
|
|
|
|
, (char const*)&cas[0]);
|
|
|
|
|
|
|
|
ret = verify_message(&response, desc2, parsed, 1, error_string, sizeof(error_string));
|
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
fprintf(stderr, "put response: %s\n"
|
|
|
|
, print_entry(response).c_str());
|
|
|
|
TEST_EQUAL(parsed[0]->string_value(), "r");
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
fprintf(stderr, " invalid put response: %s\n%s\n"
|
|
|
|
, error_string, print_entry(response).c_str());
|
|
|
|
TEST_ERROR(error_string);
|
|
|
|
}
|
|
|
|
|
|
|
|
// put the same message again. This should fail because the
|
|
|
|
// CAS hash is outdated, it's not the hash of the value that's
|
|
|
|
// stored anymore
|
|
|
|
send_dht_msg(node, "put", source, &response, "10", 0
|
|
|
|
, 0, token, 0, 0, &items[1].ent, false, false
|
|
|
|
, std::string((char*)public_key, 32)
|
|
|
|
, std::string((char*)signature, 64), seq
|
|
|
|
, (char const*)&cas[0]);
|
|
|
|
|
2013-10-22 03:24:33 +02:00
|
|
|
ret = verify_message(&response, desc_error, parsed, 2, error_string, sizeof(error_string));
|
2013-09-03 02:45:48 +02:00
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
fprintf(stderr, "put response: %s\n"
|
|
|
|
, print_entry(response).c_str());
|
|
|
|
TEST_EQUAL(parsed[1]->string_value(), "e");
|
|
|
|
// 301 is the error code for CAS hash mismatch
|
|
|
|
TEST_EQUAL(parsed[0]->list_int_value_at(0), 301);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
fprintf(stderr, " invalid put response: %s\n%s\nExpected failure 301 (CAS hash mismatch)\n"
|
|
|
|
, error_string, print_entry(response).c_str());
|
|
|
|
TEST_ERROR(error_string);
|
|
|
|
}
|
|
|
|
|
2013-01-18 07:17:30 +01:00
|
|
|
// test routing table
|
|
|
|
|
|
|
|
{
|
|
|
|
sett.extended_routing_table = false;
|
2013-09-24 10:14:50 +02:00
|
|
|
node_id id = to_hash("1234876923549721020394873245098347598635");
|
|
|
|
node_id diff = to_hash("15764f7459456a9453f8719b09547c11d5f34061");
|
|
|
|
|
|
|
|
routing_table tbl(id, 8, sett);
|
2013-01-18 07:17:30 +01:00
|
|
|
|
|
|
|
// insert 256 nodes evenly distributed across the ID space.
|
|
|
|
// we expect to fill the top 5 buckets
|
|
|
|
for (int i = 0; i < 256; ++i)
|
|
|
|
{
|
2013-09-24 10:14:50 +02:00
|
|
|
// test a node with the same IP:port changing ID
|
|
|
|
add_and_replace(id, diff);
|
2013-01-18 07:17:30 +01:00
|
|
|
id[0] = i;
|
2013-09-24 10:14:50 +02:00
|
|
|
tbl.node_seen(id, rand_ep(), 20 + (id[19] & 0xff));
|
2013-01-18 07:17:30 +01:00
|
|
|
}
|
2013-09-24 10:14:50 +02:00
|
|
|
printf("num_active_buckets: %d\n", tbl.num_active_buckets());
|
2013-01-18 07:17:30 +01:00
|
|
|
TEST_EQUAL(tbl.num_active_buckets(), 6);
|
|
|
|
|
2013-01-19 08:01:03 +01:00
|
|
|
#if defined TORRENT_DHT_VERBOSE_LOGGING || defined TORRENT_DEBUG
|
2013-01-18 07:17:30 +01:00
|
|
|
tbl.print_state(std::cerr);
|
2013-01-19 08:01:03 +01:00
|
|
|
#endif
|
2013-01-18 07:17:30 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
{
|
|
|
|
sett.extended_routing_table = true;
|
2013-09-24 10:14:50 +02:00
|
|
|
node_id id = to_hash("1234876923549721020394873245098347598635");
|
|
|
|
node_id diff = to_hash("15764f7459456a9453f8719b09547c11d5f34061");
|
|
|
|
|
|
|
|
routing_table tbl(id, 8, sett);
|
2013-01-18 07:17:30 +01:00
|
|
|
for (int i = 0; i < 256; ++i)
|
|
|
|
{
|
2013-09-24 10:14:50 +02:00
|
|
|
add_and_replace(id, diff);
|
2013-01-18 07:17:30 +01:00
|
|
|
id[0] = i;
|
2013-09-24 10:14:50 +02:00
|
|
|
tbl.node_seen(id, rand_ep(), 20 + (id[19] & 0xff));
|
2013-01-18 07:17:30 +01:00
|
|
|
}
|
|
|
|
TEST_EQUAL(tbl.num_active_buckets(), 6);
|
|
|
|
|
2013-01-19 08:01:03 +01:00
|
|
|
#if defined TORRENT_DHT_VERBOSE_LOGGING || defined TORRENT_DEBUG
|
2013-01-18 07:17:30 +01:00
|
|
|
tbl.print_state(std::cerr);
|
2013-01-19 08:01:03 +01:00
|
|
|
#endif
|
2013-01-18 07:17:30 +01:00
|
|
|
}
|
|
|
|
|
2013-09-01 03:10:50 +02:00
|
|
|
// test verify_message
|
|
|
|
const static key_desc_t msg_desc[] = {
|
|
|
|
{"A", lazy_entry::string_t, 4, 0},
|
|
|
|
{"B", lazy_entry::dict_t, 0, key_desc_t::optional | key_desc_t::parse_children},
|
|
|
|
{"B1", lazy_entry::string_t, 0, 0},
|
|
|
|
{"B2", lazy_entry::string_t, 0, key_desc_t::last_child},
|
|
|
|
{"C", lazy_entry::dict_t, 0, key_desc_t::optional | key_desc_t::parse_children},
|
|
|
|
{"C1", lazy_entry::string_t, 0, 0},
|
|
|
|
{"C2", lazy_entry::string_t, 0, key_desc_t::last_child},
|
|
|
|
};
|
|
|
|
|
|
|
|
lazy_entry const* msg_keys[7];
|
|
|
|
|
|
|
|
lazy_entry ent;
|
|
|
|
|
|
|
|
error_code ec;
|
|
|
|
char const test_msg[] = "d1:A4:test1:Bd2:B15:test22:B25:test3ee";
|
|
|
|
lazy_bdecode(test_msg, test_msg + sizeof(test_msg)-1, ent, ec);
|
|
|
|
fprintf(stderr, "%s\n", print_entry(ent).c_str());
|
|
|
|
|
|
|
|
ret = verify_message(&ent, msg_desc, msg_keys, 7, error_string, sizeof(error_string));
|
|
|
|
TEST_CHECK(ret);
|
|
|
|
TEST_CHECK(msg_keys[0]);
|
|
|
|
if (msg_keys[0]) TEST_EQUAL(msg_keys[0]->string_value(), "test");
|
|
|
|
TEST_CHECK(msg_keys[1]);
|
|
|
|
TEST_CHECK(msg_keys[2]);
|
|
|
|
if (msg_keys[2]) TEST_EQUAL(msg_keys[2]->string_value(), "test2");
|
|
|
|
TEST_CHECK(msg_keys[3]);
|
|
|
|
if (msg_keys[3]) TEST_EQUAL(msg_keys[3]->string_value(), "test3");
|
|
|
|
TEST_CHECK(msg_keys[4] == 0);
|
|
|
|
TEST_CHECK(msg_keys[5] == 0);
|
|
|
|
TEST_CHECK(msg_keys[6] == 0);
|
|
|
|
|
|
|
|
char const test_msg2[] = "d1:A4:test1:Cd2:C15:test22:C25:test3ee";
|
|
|
|
lazy_bdecode(test_msg2, test_msg2 + sizeof(test_msg2)-1, ent, ec);
|
|
|
|
fprintf(stderr, "%s\n", print_entry(ent).c_str());
|
|
|
|
|
|
|
|
ret = verify_message(&ent, msg_desc, msg_keys, 7, error_string, sizeof(error_string));
|
|
|
|
TEST_CHECK(ret);
|
|
|
|
TEST_CHECK(msg_keys[0]);
|
|
|
|
if (msg_keys[0]) TEST_EQUAL(msg_keys[0]->string_value(), "test");
|
|
|
|
TEST_CHECK(msg_keys[1] == 0);
|
|
|
|
TEST_CHECK(msg_keys[2] == 0);
|
|
|
|
TEST_CHECK(msg_keys[3] == 0);
|
|
|
|
TEST_CHECK(msg_keys[4]);
|
|
|
|
TEST_CHECK(msg_keys[5]);
|
|
|
|
if (msg_keys[5]) TEST_EQUAL(msg_keys[5]->string_value(), "test2");
|
|
|
|
TEST_CHECK(msg_keys[6]);
|
|
|
|
if (msg_keys[6]) TEST_EQUAL(msg_keys[6]->string_value(), "test3");
|
|
|
|
|
|
|
|
|
|
|
|
char const test_msg3[] = "d1:Cd2:C15:test22:C25:test3ee";
|
|
|
|
lazy_bdecode(test_msg3, test_msg3 + sizeof(test_msg3)-1, ent, ec);
|
|
|
|
fprintf(stderr, "%s\n", print_entry(ent).c_str());
|
|
|
|
|
|
|
|
ret = verify_message(&ent, msg_desc, msg_keys, 7, error_string, sizeof(error_string));
|
|
|
|
TEST_CHECK(!ret);
|
|
|
|
fprintf(stderr, "%s\n", error_string);
|
|
|
|
TEST_EQUAL(error_string, std::string("missing 'A' key"));
|
|
|
|
|
|
|
|
char const test_msg4[] = "d1:A6:foobare";
|
|
|
|
lazy_bdecode(test_msg4, test_msg4 + sizeof(test_msg4)-1, ent, ec);
|
|
|
|
fprintf(stderr, "%s\n", print_entry(ent).c_str());
|
|
|
|
|
|
|
|
ret = verify_message(&ent, msg_desc, msg_keys, 7, error_string, sizeof(error_string));
|
|
|
|
TEST_CHECK(!ret);
|
|
|
|
fprintf(stderr, "%s\n", error_string);
|
|
|
|
TEST_EQUAL(error_string, std::string("invalid value for 'A'"));
|
|
|
|
|
|
|
|
char const test_msg5[] = "d1:A4:test1:Cd2:C15:test2ee";
|
|
|
|
lazy_bdecode(test_msg5, test_msg5 + sizeof(test_msg5)-1, ent, ec);
|
|
|
|
fprintf(stderr, "%s\n", print_entry(ent).c_str());
|
|
|
|
|
|
|
|
ret = verify_message(&ent, msg_desc, msg_keys, 7, error_string, sizeof(error_string));
|
|
|
|
TEST_CHECK(!ret);
|
|
|
|
fprintf(stderr, "%s\n", error_string);
|
|
|
|
TEST_EQUAL(error_string, std::string("missing 'C2' key"));
|
|
|
|
|
|
|
|
// test empty strings [ { "":1 }, "" ]
|
|
|
|
char const test_msg6[] = "ld0:i1ee0:e";
|
|
|
|
lazy_bdecode(test_msg6, test_msg6 + sizeof(test_msg6)-1, ent, ec);
|
|
|
|
fprintf(stderr, "%s\n", print_entry(ent).c_str());
|
|
|
|
TEST_CHECK(ent.type() == lazy_entry::list_t);
|
|
|
|
if (ent.type() == lazy_entry::list_t)
|
|
|
|
{
|
|
|
|
TEST_CHECK(ent.list_size() == 2);
|
|
|
|
if (ent.list_size() == 2)
|
|
|
|
{
|
|
|
|
TEST_CHECK(ent.list_at(0)->dict_find_int_value("") == 1);
|
|
|
|
TEST_CHECK(ent.list_at(1)->string_value() == "");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-10-22 07:20:00 +02:00
|
|
|
// test node-id functions
|
2013-09-01 03:10:50 +02:00
|
|
|
using namespace libtorrent::dht;
|
|
|
|
|
2013-10-22 07:20:00 +02:00
|
|
|
TEST_EQUAL(generate_prefix_mask(1), to_hash("8000000000000000000000000000000000000000"));
|
|
|
|
TEST_EQUAL(generate_prefix_mask(2), to_hash("c000000000000000000000000000000000000000"));
|
|
|
|
TEST_EQUAL(generate_prefix_mask(11), to_hash("ffe0000000000000000000000000000000000000"));
|
|
|
|
TEST_EQUAL(generate_prefix_mask(17), to_hash("ffff800000000000000000000000000000000000"));
|
|
|
|
|
|
|
|
// test kademlia functions
|
|
|
|
|
2013-10-14 10:52:45 +02:00
|
|
|
// this is a bit too expensive to do under valgrind
|
|
|
|
#ifndef TORRENT_USE_VALGRIND
|
2013-09-01 03:10:50 +02:00
|
|
|
for (int i = 0; i < 160; i += 8)
|
|
|
|
{
|
|
|
|
for (int j = 0; j < 160; j += 8)
|
|
|
|
{
|
|
|
|
node_id a(0);
|
|
|
|
a[(159-i) / 8] = 1 << (i & 7);
|
|
|
|
node_id b(0);
|
|
|
|
b[(159-j) / 8] = 1 << (j & 7);
|
|
|
|
int dist = distance_exp(a, b);
|
|
|
|
|
|
|
|
TEST_CHECK(dist >= 0 && dist < 160);
|
|
|
|
TEST_CHECK(dist == ((i == j)?0:(std::max)(i, j)));
|
|
|
|
|
|
|
|
for (int k = 0; k < 160; k += 8)
|
|
|
|
{
|
|
|
|
node_id c(0);
|
|
|
|
c[(159-k) / 8] = 1 << (k & 7);
|
|
|
|
|
|
|
|
bool cmp = compare_ref(a, b, c);
|
|
|
|
TEST_CHECK(cmp == (distance(a, c) < distance(b, c)));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2013-10-14 10:52:45 +02:00
|
|
|
#endif
|
2013-09-01 03:10:50 +02:00
|
|
|
|
|
|
|
{
|
|
|
|
// test kademlia routing table
|
|
|
|
dht_settings s;
|
2013-10-22 07:20:00 +02:00
|
|
|
s.extended_routing_table = false;
|
2013-09-01 03:10:50 +02:00
|
|
|
// s.restrict_routing_ips = false;
|
|
|
|
node_id id = to_hash("3123456789abcdef01232456789abcdef0123456");
|
2013-10-20 09:06:42 +02:00
|
|
|
const int bucket_size = 10;
|
|
|
|
dht::routing_table table(id, bucket_size, s);
|
2013-09-01 03:10:50 +02:00
|
|
|
std::vector<node_entry> nodes;
|
|
|
|
TEST_EQUAL(table.size().get<0>(), 0);
|
|
|
|
|
|
|
|
node_id tmp = id;
|
|
|
|
node_id diff = to_hash("15764f7459456a9453f8719b09547c11d5f34061");
|
|
|
|
|
|
|
|
// test a node with the same IP:port changing ID
|
|
|
|
add_and_replace(tmp, diff);
|
|
|
|
table.node_seen(tmp, udp::endpoint(address::from_string("4.4.4.4"), 4), 10);
|
|
|
|
table.find_node(id, nodes, 0, 10);
|
|
|
|
TEST_EQUAL(table.bucket_size(0), 1);
|
|
|
|
TEST_EQUAL(table.size().get<0>(), 1);
|
|
|
|
TEST_EQUAL(nodes.size(), 1);
|
|
|
|
if (!nodes.empty())
|
|
|
|
{
|
|
|
|
TEST_EQUAL(nodes[0].id, tmp);
|
|
|
|
TEST_EQUAL(nodes[0].addr(), address_v4::from_string("4.4.4.4"));
|
|
|
|
TEST_EQUAL(nodes[0].port(), 4);
|
|
|
|
TEST_EQUAL(nodes[0].timeout_count, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
// set timeout_count to 1
|
|
|
|
table.node_failed(tmp, udp::endpoint(address_v4::from_string("4.4.4.4"), 4));
|
|
|
|
|
|
|
|
nodes.clear();
|
|
|
|
table.for_each_node(node_push_back, nop, &nodes);
|
|
|
|
TEST_EQUAL(nodes.size(), 1);
|
|
|
|
if (!nodes.empty())
|
|
|
|
{
|
|
|
|
TEST_EQUAL(nodes[0].id, tmp);
|
|
|
|
TEST_EQUAL(nodes[0].addr(), address_v4::from_string("4.4.4.4"));
|
|
|
|
TEST_EQUAL(nodes[0].port(), 4);
|
|
|
|
TEST_EQUAL(nodes[0].timeout_count, 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
// add the exact same node again, it should set the timeout_count to 0
|
|
|
|
table.node_seen(tmp, udp::endpoint(address::from_string("4.4.4.4"), 4), 10);
|
|
|
|
nodes.clear();
|
|
|
|
table.for_each_node(node_push_back, nop, &nodes);
|
|
|
|
TEST_EQUAL(nodes.size(), 1);
|
|
|
|
if (!nodes.empty())
|
|
|
|
{
|
|
|
|
TEST_EQUAL(nodes[0].id, tmp);
|
|
|
|
TEST_EQUAL(nodes[0].addr(), address_v4::from_string("4.4.4.4"));
|
|
|
|
TEST_EQUAL(nodes[0].port(), 4);
|
|
|
|
TEST_EQUAL(nodes[0].timeout_count, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
// test adding the same IP:port again with a new node ID (should replace the old one)
|
|
|
|
add_and_replace(tmp, diff);
|
|
|
|
table.node_seen(tmp, udp::endpoint(address::from_string("4.4.4.4"), 4), 10);
|
|
|
|
table.find_node(id, nodes, 0, 10);
|
|
|
|
TEST_EQUAL(table.bucket_size(0), 1);
|
|
|
|
TEST_EQUAL(nodes.size(), 1);
|
|
|
|
if (!nodes.empty())
|
|
|
|
{
|
|
|
|
TEST_EQUAL(nodes[0].id, tmp);
|
|
|
|
TEST_EQUAL(nodes[0].addr(), address_v4::from_string("4.4.4.4"));
|
|
|
|
TEST_EQUAL(nodes[0].port(), 4);
|
|
|
|
}
|
|
|
|
|
|
|
|
// test adding the same node ID again with a different IP (should be ignored)
|
|
|
|
table.node_seen(tmp, udp::endpoint(address::from_string("4.4.4.4"), 5), 10);
|
|
|
|
table.find_node(id, nodes, 0, 10);
|
|
|
|
TEST_EQUAL(table.bucket_size(0), 1);
|
|
|
|
if (!nodes.empty())
|
|
|
|
{
|
|
|
|
TEST_EQUAL(nodes[0].id, tmp);
|
|
|
|
TEST_EQUAL(nodes[0].addr(), address_v4::from_string("4.4.4.4"));
|
|
|
|
TEST_EQUAL(nodes[0].port(), 4);
|
|
|
|
}
|
|
|
|
|
|
|
|
// test adding a node that ends up in the same bucket with an IP
|
|
|
|
// very close to the current one (should be ignored)
|
|
|
|
// if restrict_routing_ips == true
|
|
|
|
table.node_seen(tmp, udp::endpoint(address::from_string("4.4.4.5"), 5), 10);
|
|
|
|
table.find_node(id, nodes, 0, 10);
|
|
|
|
TEST_EQUAL(table.bucket_size(0), 1);
|
|
|
|
if (!nodes.empty())
|
|
|
|
{
|
|
|
|
TEST_EQUAL(nodes[0].id, tmp);
|
|
|
|
TEST_EQUAL(nodes[0].addr(), address_v4::from_string("4.4.4.4"));
|
|
|
|
TEST_EQUAL(nodes[0].port(), 4);
|
|
|
|
}
|
|
|
|
|
|
|
|
s.restrict_routing_ips = false;
|
|
|
|
|
|
|
|
add_and_replace(tmp, diff);
|
|
|
|
table.node_seen(id, udp::endpoint(rand_v4(), rand()), 10);
|
|
|
|
|
|
|
|
nodes.clear();
|
|
|
|
for (int i = 0; i < 7000; ++i)
|
|
|
|
{
|
2013-09-24 10:14:50 +02:00
|
|
|
table.node_seen(tmp, udp::endpoint(rand_v4(), rand()), 20 + (tmp[19] & 0xff));
|
2013-09-01 03:10:50 +02:00
|
|
|
add_and_replace(tmp, diff);
|
|
|
|
}
|
2013-09-24 10:14:50 +02:00
|
|
|
printf("active buckets: %d\n", table.num_active_buckets());
|
|
|
|
TEST_EQUAL(table.num_active_buckets(), 10);
|
2013-10-22 07:20:00 +02:00
|
|
|
TEST_CHECK(table.size().get<0>() >= 10 * 10);
|
2013-09-01 03:10:50 +02:00
|
|
|
//#error test num_global_nodes
|
|
|
|
//#error test need_refresh
|
|
|
|
|
|
|
|
#if defined TORRENT_DHT_VERBOSE_LOGGING || defined TORRENT_DEBUG
|
|
|
|
table.print_state(std::cerr);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
table.for_each_node(node_push_back, nop, &nodes);
|
|
|
|
|
2013-10-22 07:20:00 +02:00
|
|
|
printf("nodes: %d\n", int(nodes.size()));
|
2013-09-01 03:10:50 +02:00
|
|
|
|
|
|
|
std::vector<node_entry> temp;
|
|
|
|
|
|
|
|
std::generate(tmp.begin(), tmp.end(), &std::rand);
|
|
|
|
table.find_node(tmp, temp, 0, nodes.size() * 2);
|
2013-10-22 07:20:00 +02:00
|
|
|
printf("returned-all: %d\n", int(temp.size()));
|
2013-09-01 03:10:50 +02:00
|
|
|
TEST_EQUAL(temp.size(), nodes.size());
|
|
|
|
|
|
|
|
// This makes sure enough of the nodes returned are actually
|
|
|
|
// part of the closest nodes
|
2013-10-22 07:20:00 +02:00
|
|
|
std::set<node_id> duplicates;
|
2013-09-01 03:10:50 +02:00
|
|
|
|
2013-10-22 07:20:00 +02:00
|
|
|
#ifdef TORRENT_USE_VALGRIND
|
|
|
|
const int reps = 3;
|
|
|
|
#else
|
|
|
|
const int reps = 50;
|
|
|
|
#endif
|
2013-09-01 03:10:50 +02:00
|
|
|
|
2013-10-22 07:20:00 +02:00
|
|
|
for (int r = 0; r < reps; ++r)
|
2013-09-01 03:10:50 +02:00
|
|
|
{
|
2013-10-22 07:20:00 +02:00
|
|
|
std::generate(tmp.begin(), tmp.end(), &std::rand);
|
|
|
|
table.find_node(tmp, temp, 0, bucket_size * 2);
|
|
|
|
printf("returned: %d\n", int(temp.size()));
|
|
|
|
TEST_EQUAL(int(temp.size()), (std::min)(bucket_size * 2, int(nodes.size())));
|
|
|
|
|
|
|
|
std::sort(nodes.begin(), nodes.end(), boost::bind(&compare_ref
|
|
|
|
, boost::bind(&node_entry::id, _1)
|
|
|
|
, boost::bind(&node_entry::id, _2), tmp));
|
|
|
|
|
|
|
|
int expected = std::accumulate(nodes.begin(), nodes.begin() + (bucket_size * 2)
|
|
|
|
, 0, boost::bind(&sum_distance_exp, _1, _2, tmp));
|
|
|
|
int sum_hits = std::accumulate(temp.begin(), temp.end()
|
|
|
|
, 0, boost::bind(&sum_distance_exp, _1, _2, tmp));
|
|
|
|
TEST_EQUAL(bucket_size * 2, int(temp.size()));
|
|
|
|
printf("expected: %d actual: %d\n", expected, sum_hits);
|
|
|
|
TEST_EQUAL(expected, sum_hits);
|
|
|
|
|
|
|
|
duplicates.clear();
|
|
|
|
// This makes sure enough of the nodes returned are actually
|
|
|
|
// part of the closest nodes
|
|
|
|
for (std::vector<node_entry>::iterator i = temp.begin()
|
|
|
|
, end(temp.end()); i != end; ++i)
|
|
|
|
{
|
|
|
|
TEST_CHECK(duplicates.count(i->id) == 0);
|
|
|
|
duplicates.insert(i->id);
|
|
|
|
}
|
2013-09-01 03:10:50 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
using namespace libtorrent::dht;
|
|
|
|
|
|
|
|
char const* ips[] = {
|
|
|
|
"124.31.75.21",
|
|
|
|
"21.75.31.124",
|
|
|
|
"65.23.51.170",
|
|
|
|
"84.124.73.14",
|
|
|
|
"43.213.53.83",
|
|
|
|
};
|
|
|
|
|
|
|
|
int rs[] = { 1,86,22,65,90 };
|
|
|
|
|
|
|
|
boost::uint8_t prefixes[][4] =
|
|
|
|
{
|
|
|
|
{ 0x17, 0x12, 0xf6, 0xc7 },
|
|
|
|
{ 0x94, 0x64, 0x06, 0xc1 },
|
|
|
|
{ 0xfe, 0xfd, 0x92, 0x20 },
|
|
|
|
{ 0xaf, 0x15, 0x46, 0xdd },
|
|
|
|
{ 0xa9, 0xe9, 0x20, 0xbf }
|
|
|
|
};
|
|
|
|
|
|
|
|
for (int i = 0; i < 5; ++i)
|
|
|
|
{
|
|
|
|
address a = address_v4::from_string(ips[i]);
|
|
|
|
node_id id = generate_id_impl(a, rs[i]);
|
|
|
|
for (int j = 0; j < 4; ++j)
|
|
|
|
TEST_CHECK(id[j] == prefixes[i][j]);
|
|
|
|
TEST_CHECK(id[19] == rs[i]);
|
|
|
|
fprintf(stderr, "IP address: %s r: %d node ID: %s\n", ips[i]
|
|
|
|
, rs[i], to_hex(id.to_string()).c_str());
|
|
|
|
}
|
|
|
|
}
|
2009-09-27 05:38:41 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2010-02-05 09:40:08 +01:00
|
|
|
#else
|
|
|
|
|
|
|
|
int test_main()
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|