/* Copyright (c) 2008, Arvid Norberg All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of the author nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ #include "libtorrent/magnet_uri.hpp" #include "libtorrent/parse_url.hpp" #include "libtorrent/http_tracker_connection.hpp" #include "libtorrent/buffer.hpp" #include "libtorrent/xml_parse.hpp" #include "libtorrent/upnp.hpp" #include "libtorrent/entry.hpp" #include "libtorrent/bitfield.hpp" #include "libtorrent/torrent_info.hpp" #include "libtorrent/escape_string.hpp" #include "libtorrent/broadcast_socket.hpp" #include "libtorrent/identify_client.hpp" #include "libtorrent/file.hpp" #include "libtorrent/packet_buffer.hpp" #include "libtorrent/session.hpp" #include "libtorrent/bencode.hpp" #include "libtorrent/timestamp_history.hpp" #include "libtorrent/enum_net.hpp" #include "libtorrent/bloom_filter.hpp" #include "libtorrent/aux_/session_impl.hpp" #include "libtorrent/rsa.hpp" #ifndef TORRENT_DISABLE_DHT #include "libtorrent/kademlia/node_id.hpp" #include "libtorrent/kademlia/routing_table.hpp" #include "libtorrent/kademlia/node.hpp" #endif #include #include #include #include #include "test.hpp" using namespace libtorrent; using namespace boost::tuples; namespace libtorrent { TORRENT_EXPORT std::string sanitize_path(std::string const& p); namespace dht { TORRENT_EXPORT libtorrent::dht::node_id generate_id_impl( address const& ip_, boost::uint32_t r); } } sha1_hash to_hash(char const* s) { sha1_hash ret; from_hex(s, 40, (char*)&ret[0]); return ret; } tuple feed_bytes(http_parser& parser, char const* str) { tuple ret(0, 0, false); tuple prev(0, 0, false); for (int chunks = 1; chunks < 70; ++chunks) { ret = make_tuple(0, 0, false); parser.reset(); buffer::const_interval recv_buf(str, str); for (; *str;) { int chunk_size = (std::min)(chunks, int(strlen(recv_buf.end))); if (chunk_size == 0) break; recv_buf.end += chunk_size; int payload, protocol; bool error = false; tie(payload, protocol) = parser.incoming(recv_buf, error); ret.get<0>() += payload; ret.get<1>() += protocol; ret.get<2>() |= error; // std::cerr << payload << ", " << protocol << ", " << chunk_size << std::endl; TORRENT_ASSERT(payload + protocol == chunk_size); } TEST_CHECK(prev == make_tuple(0, 0, false) || ret == prev); TEST_EQUAL(ret.get<0>() + ret.get<1>(), strlen(str)); prev = ret; } return ret; } void parser_callback(std::string& out, int token, char const* s, char const* val) { switch (token) { case xml_start_tag: out += "B"; break; case xml_end_tag: out += "F"; break; case xml_empty_tag: out += "E"; break; case xml_declaration_tag: out += "D"; break; case xml_comment: out += "C"; break; case xml_string: out += "S"; break; case xml_attribute: out += "A"; break; case xml_parse_error: out += "P"; break; case xml_tag_content: out += "T"; break; default: TEST_CHECK(false); } out += s; if (token == xml_attribute) { TEST_CHECK(val != 0); out += "V"; out += val; } else { TEST_CHECK(val == 0); } } #ifndef TORRENT_DISABLE_DHT void add_and_replace(libtorrent::dht::node_id& dst, libtorrent::dht::node_id const& add) { bool carry = false; for (int k = 19; k >= 0; --k) { int sum = dst[k] + add[k] + (carry?1:0); dst[k] = sum & 255; carry = sum > 255; } } void node_push_back(void* userdata, libtorrent::dht::node_entry const& n) { using namespace libtorrent::dht; std::vector* nv = (std::vector*)userdata; nv->push_back(n); } void nop(void* userdata, libtorrent::dht::node_entry const& n) {} #endif char upnp_xml[] = "" "" "1" "0" "" "http://192.168.0.1:5678" "" "" "urn:schemas-upnp-org:device:InternetGatewayDevice:1" "" "http://192.168.0.1:80" "D-Link Router" "D-Link" "http://www.dlink.com" "Internet Access Router" "D-Link Router" "uuid:upnp-InternetGatewayDevice-1_0-12345678900001" "123456789001" "" "" "urn:schemas-upnp-org:service:Layer3Forwarding:1" "urn:upnp-org:serviceId:L3Forwarding1" "/Layer3Forwarding" "/Layer3Forwarding" "/Layer3Forwarding.xml" "" "" "" "" "urn:schemas-upnp-org:device:WANDevice:1" "WANDevice" "D-Link" "http://www.dlink.com" "Internet Access Router" "D-Link Router" "1" "http://support.dlink.com" "12345678900001" "uuid:upnp-WANDevice-1_0-12345678900001" "123456789001" "" "" "" "urn:schemas-upnp-org:service:WANCommonInterfaceConfig:1" "" "urn:upnp-org:serviceId:WANCommonInterfaceConfig" "/WANCommonInterfaceConfig" "/WANCommonInterfaceConfig" "/WANCommonInterfaceConfig.xml" "" "" "" "" "urn:schemas-upnp-org:device:WANConnectionDevice:1" "WAN Connection Device" "D-Link" "http://www.dlink.com" "Internet Access Router" "D-Link Router" "1" "http://support.dlink.com" "12345678900001" "uuid:upnp-WANConnectionDevice-1_0-12345678900001" "123456789001" "" "" "urn:schemas-upnp-org:service:WANIPConnection:1" "urn:upnp-org:serviceId:WANIPConnection" "/WANIPConnection" "/WANIPConnection" "/WANIPConnection.xml" "" "" "" "" "" "" "" ""; char upnp_xml2[] = "" "" "1" "0" "" "http://192.168.1.1:49152" "" "" "urn:schemas-upnp-org:device:InternetGatewayDevice:1" "" "LINKSYS WAG200G Gateway" "LINKSYS" "http://www.linksys.com" "LINKSYS WAG200G Gateway" "Wireless-G ADSL Home Gateway" "WAG200G" "http://www.linksys.com" "123456789" "uuid:8d401597-1dd2-11b2-a7d4-001ee5947cac" "WAG200G" "" "" "urn:schemas-upnp-org:service:Layer3Forwarding:1" "urn:upnp-org:serviceId:L3Forwarding1" "/upnp/control/L3Forwarding1" "/upnp/event/L3Forwarding1" "/l3frwd.xml" "" "" "" "" "urn:schemas-upnp-org:device:WANDevice:1" "WANDevice" "LINKSYS" "http://www.linksys.com/" "Residential Gateway" "Internet Connection Sharing" "1" "http://www.linksys.com/" "0000001" "uuid:8d401596-1dd2-11b2-a7d4-001ee5947cac" "WAG200G" "" "" "" "urn:schemas-upnp-org:service:WANCommonInterfaceConfig:1" "" "urn:upnp-org:serviceId:WANCommonIFC1" "/upnp/control/WANCommonIFC1" "/upnp/event/WANCommonIFC1" "/cmnicfg.xml" "" "" "" "" "urn:schemas-upnp-org:device:WANConnectionDevice:1" "WANConnectionDevice" "LINKSYS" "http://www.linksys.com/" "Residential Gateway" "Internet Connection Sharing" "1" "http://www.linksys.com/" "0000001" "uuid:8d401597-1dd2-11b2-a7d3-001ee5947cac" "WAG200G" "" "" "" "urn:schemas-upnp-org:service:WANEthernetLinkConfig:1" "" "urn:upnp-org:serviceId:WANEthLinkC1" "/upnp/control/WANEthLinkC1" "/upnp/event/WANEthLinkC1" "/wanelcfg.xml" "" "" "urn:schemas-upnp-org:service:WANPPPConnection:1" "urn:upnp-org:serviceId:WANPPPConn1" "/upnp/control/WANPPPConn1" "/upnp/event/WANPPPConn1" "/pppcfg.xml" "" "" "" "" "" "" "urn:schemas-upnp-org:device:LANDevice:1" "LANDevice" "LINKSYS" "http://www.linksys.com/" "Residential Gateway" "Residential Gateway" "1" "http://www.linksys.com/" "0000001" "uuid:8d401596-1dd2-11b2-a7d3-001ee5947cac" "WAG200G" "" "" "" "urn:schemas-upnp-org:service:LANHostConfigManagement:1" "" "urn:upnp-org:serviceId:LANHostCfg1" "/upnp/control/LANHostCfg1" "/upnp/event/LANHostCfg1" "/lanhostc.xml" "" "" "" "" "http://192.168.1.1/index.htm" "" ""; struct parse_state { parse_state(): in_service(false) {} void reset(char const* st) { in_service = false; service_type = st; tag_stack.clear(); control_url.clear(); model.clear(); url_base.clear(); } bool in_service; std::list tag_stack; std::string control_url; char const* service_type; std::string model; std::string url_base; }; namespace libtorrent { // defined in torrent_info.cpp TORRENT_EXPORT bool verify_encoding(std::string& target, bool path = true); } TORRENT_EXPORT void find_control_url(int type, char const* string, parse_state& state); address rand_v4() { return address_v4((rand() << 16 | rand()) & 0xffffffff); } int test_main() { using namespace libtorrent; using namespace libtorrent::dht; error_code ec; int ret = 0; // make sure the retry interval keeps growing // on failing announces announce_entry ae("dummy"); int last = 0; session_settings sett; sett.tracker_backoff = 250; for (int i = 0; i < 10; ++i) { ae.failed(sett, 5); int delay = ae.next_announce_in(); TEST_CHECK(delay > last); last = delay; fprintf(stderr, "%d, ", delay); } fprintf(stderr, "\n"); #if defined TORRENT_USE_OPENSSL // test sign_rsa and verify_rsa char private_key[1192]; int private_len = sizeof(private_key); char public_key[268]; int public_len = sizeof(public_key); ret = generate_rsa_keys(public_key, &public_len, private_key, &private_len, 2048); fprintf(stderr, "keysizes: pub: %d priv: %d\n", public_len, private_len); TEST_CHECK(ret); char test_message[1024]; std::generate(test_message, test_message + 1024, &std::rand); char signature[256]; int sig_len = sign_rsa(hasher(test_message, sizeof(test_message)).final() , private_key, private_len, signature, sizeof(signature)); TEST_CHECK(sig_len == 256); ret = verify_rsa(hasher(test_message, sizeof(test_message)).final() , public_key, public_len, signature, sig_len); TEST_CHECK(ret == 1); #endif // test verify_message const static key_desc_t msg_desc[] = { {"A", lazy_entry::string_t, 4, 0}, {"B", lazy_entry::dict_t, 0, key_desc_t::optional | key_desc_t::parse_children}, {"B1", lazy_entry::string_t, 0, 0}, {"B2", lazy_entry::string_t, 0, key_desc_t::last_child}, {"C", lazy_entry::dict_t, 0, key_desc_t::optional | key_desc_t::parse_children}, {"C1", lazy_entry::string_t, 0, 0}, {"C2", lazy_entry::string_t, 0, key_desc_t::last_child}, }; lazy_entry const* msg_keys[7]; lazy_entry ent; char const test_msg[] = "d1:A4:test1:Bd2:B15:test22:B25:test3ee"; lazy_bdecode(test_msg, test_msg + sizeof(test_msg)-1, ent, ec); fprintf(stderr, "%s\n", print_entry(ent).c_str()); char error_string[200]; ret = verify_message(&ent, msg_desc, msg_keys, 7, error_string, sizeof(error_string)); TEST_CHECK(ret); TEST_CHECK(msg_keys[0]); if (msg_keys[0]) TEST_EQUAL(msg_keys[0]->string_value(), "test"); TEST_CHECK(msg_keys[1]); TEST_CHECK(msg_keys[2]); if (msg_keys[2]) TEST_EQUAL(msg_keys[2]->string_value(), "test2"); TEST_CHECK(msg_keys[3]); if (msg_keys[3]) TEST_EQUAL(msg_keys[3]->string_value(), "test3"); TEST_CHECK(msg_keys[4] == 0); TEST_CHECK(msg_keys[5] == 0); TEST_CHECK(msg_keys[6] == 0); char const test_msg2[] = "d1:A4:test1:Cd2:C15:test22:C25:test3ee"; lazy_bdecode(test_msg2, test_msg2 + sizeof(test_msg2)-1, ent, ec); fprintf(stderr, "%s\n", print_entry(ent).c_str()); ret = verify_message(&ent, msg_desc, msg_keys, 7, error_string, sizeof(error_string)); TEST_CHECK(ret); TEST_CHECK(msg_keys[0]); if (msg_keys[0]) TEST_EQUAL(msg_keys[0]->string_value(), "test"); TEST_CHECK(msg_keys[1] == 0); TEST_CHECK(msg_keys[2] == 0); TEST_CHECK(msg_keys[3] == 0); TEST_CHECK(msg_keys[4]); TEST_CHECK(msg_keys[5]); if (msg_keys[5]) TEST_EQUAL(msg_keys[5]->string_value(), "test2"); TEST_CHECK(msg_keys[6]); if (msg_keys[6]) TEST_EQUAL(msg_keys[6]->string_value(), "test3"); char const test_msg3[] = "d1:Cd2:C15:test22:C25:test3ee"; lazy_bdecode(test_msg3, test_msg3 + sizeof(test_msg3)-1, ent, ec); fprintf(stderr, "%s\n", print_entry(ent).c_str()); ret = verify_message(&ent, msg_desc, msg_keys, 7, error_string, sizeof(error_string)); TEST_CHECK(!ret); fprintf(stderr, "%s\n", error_string); TEST_EQUAL(error_string, std::string("missing 'A' key")); char const test_msg4[] = "d1:A6:foobare"; lazy_bdecode(test_msg4, test_msg4 + sizeof(test_msg4)-1, ent, ec); fprintf(stderr, "%s\n", print_entry(ent).c_str()); ret = verify_message(&ent, msg_desc, msg_keys, 7, error_string, sizeof(error_string)); TEST_CHECK(!ret); fprintf(stderr, "%s\n", error_string); TEST_EQUAL(error_string, std::string("invalid value for 'A'")); char const test_msg5[] = "d1:A4:test1:Cd2:C15:test2ee"; lazy_bdecode(test_msg5, test_msg5 + sizeof(test_msg5)-1, ent, ec); fprintf(stderr, "%s\n", print_entry(ent).c_str()); ret = verify_message(&ent, msg_desc, msg_keys, 7, error_string, sizeof(error_string)); TEST_CHECK(!ret); fprintf(stderr, "%s\n", error_string); TEST_EQUAL(error_string, std::string("missing 'C2' key")); // test empty strings [ { "":1 }, "" ] char const test_msg6[] = "ld0:i1ee0:e"; lazy_bdecode(test_msg6, test_msg6 + sizeof(test_msg6)-1, ent, ec); fprintf(stderr, "%s\n", print_entry(ent).c_str()); TEST_CHECK(ent.type() == lazy_entry::list_t); if (ent.type() == lazy_entry::list_t) { TEST_CHECK(ent.list_size() == 2); if (ent.list_size() == 2) { TEST_CHECK(ent.list_at(0)->dict_find_int_value("") == 1); TEST_CHECK(ent.list_at(1)->string_value() == ""); } } // test external ip voting aux::session_impl* ses = new aux::session_impl(std::pair(0,0) , fingerprint("LT", 0, 0, 0, 0), "0.0.0.0", 0 #if defined TORRENT_VERBOSE_LOGGING || defined TORRENT_LOGGING || defined TORRENT_ERROR_LOGGING , "" #endif ); // test a single malicious node // adds 50 legitimate responses from different peers // and 50 malicious responses from the same peer address real_external = address_v4::from_string("5.5.5.5"); address malicious = address_v4::from_string("4.4.4.4"); for (int i = 0; i < 50; ++i) { ses->set_external_address(real_external, aux::session_impl::source_dht, rand_v4()); ses->set_external_address(rand_v4(), aux::session_impl::source_dht, malicious); } TEST_CHECK(ses->external_address() == real_external); ses->abort(); #if defined TORRENT_VERBOSE_LOGGING || defined TORRENT_LOGGING || defined TORRENT_ERROR_LOGGING ses->m_logger.reset(); #endif delete ses; ses = new aux::session_impl(std::pair(0,0) , fingerprint("LT", 0, 0, 0, 0), "0.0.0.0", 0 #if defined TORRENT_VERBOSE_LOGGING || defined TORRENT_LOGGING || defined TORRENT_ERROR_LOGGING , "" #endif ); // test a single malicious node // adds 50 legitimate responses from different peers // and 50 consistent malicious responses from the same peer real_external = address_v4::from_string("5.5.5.5"); malicious = address_v4::from_string("4.4.4.4"); address malicious_external = address_v4::from_string("3.3.3.3"); for (int i = 0; i < 50; ++i) { ses->set_external_address(real_external, aux::session_impl::source_dht, rand_v4()); ses->set_external_address(malicious_external, aux::session_impl::source_dht, malicious); } TEST_CHECK(ses->external_address() == real_external); ses->abort(); #if defined TORRENT_VERBOSE_LOGGING || defined TORRENT_LOGGING || defined TORRENT_ERROR_LOGGING ses->m_logger.reset(); #endif delete ses; // test bloom_filter bloom_filter<32> filter; sha1_hash k1 = hasher("test1", 5).final(); sha1_hash k2 = hasher("test2", 5).final(); sha1_hash k3 = hasher("test3", 5).final(); sha1_hash k4 = hasher("test4", 5).final(); TEST_CHECK(!filter.find(k1)); TEST_CHECK(!filter.find(k2)); TEST_CHECK(!filter.find(k3)); TEST_CHECK(!filter.find(k4)); filter.set(k1); TEST_CHECK(filter.find(k1)); TEST_CHECK(!filter.find(k2)); TEST_CHECK(!filter.find(k3)); TEST_CHECK(!filter.find(k4)); filter.set(k4); TEST_CHECK(filter.find(k1)); TEST_CHECK(!filter.find(k2)); TEST_CHECK(!filter.find(k3)); TEST_CHECK(filter.find(k4)); // test timestamp_history { timestamp_history h; TEST_EQUAL(h.add_sample(0x32, false), 0); TEST_EQUAL(h.base(), 0x32); TEST_EQUAL(h.add_sample(0x33, false), 0x1); TEST_EQUAL(h.base(), 0x32); TEST_EQUAL(h.add_sample(0x3433, false), 0x3401); TEST_EQUAL(h.base(), 0x32); TEST_EQUAL(h.add_sample(0x30, false), 0); TEST_EQUAL(h.base(), 0x30); // test that wrapping of the timestamp is properly handled h.add_sample(0xfffffff3, false); TEST_EQUAL(h.base(), 0xfffffff3); } // test packet_buffer { packet_buffer pb; TEST_EQUAL(pb.capacity(), 0); TEST_EQUAL(pb.size(), 0); TEST_EQUAL(pb.span(), 0); pb.insert(123, (void*)123); TEST_EQUAL(pb.at(123 + 16), 0); TEST_CHECK(pb.at(123) == (void*)123); TEST_CHECK(pb.capacity() > 0); TEST_EQUAL(pb.size(), 1); TEST_EQUAL(pb.span(), 1); TEST_EQUAL(pb.cursor(), 123); pb.insert(125, (void*)125); TEST_CHECK(pb.at(125) == (void*)125); TEST_EQUAL(pb.size(), 2); TEST_EQUAL(pb.span(), 3); TEST_EQUAL(pb.cursor(), 123); pb.insert(500, (void*)500); TEST_EQUAL(pb.size(), 3); TEST_EQUAL(pb.span(), 501 - 123); TEST_EQUAL(pb.capacity(), 512); pb.insert(500, (void*)501); TEST_EQUAL(pb.size(), 3); pb.insert(500, (void*)500); TEST_EQUAL(pb.size(), 3); TEST_CHECK(pb.remove(123) == (void*)123); TEST_EQUAL(pb.size(), 2); TEST_EQUAL(pb.span(), 501 - 125); TEST_EQUAL(pb.cursor(), 125); TEST_CHECK(pb.remove(125) == (void*)125); TEST_EQUAL(pb.size(), 1); TEST_EQUAL(pb.span(), 1); TEST_EQUAL(pb.cursor(), 500); TEST_CHECK(pb.remove(500) == (void*)500); TEST_EQUAL(pb.size(), 0); TEST_EQUAL(pb.span(), 0); for (int i = 0; i < 0xff; ++i) { int index = (i + 0xfff0) & 0xffff; pb.insert(index, (void*)(index + 1)); fprintf(stderr, "insert: %u (mask: %x)\n", index, int(pb.capacity() - 1)); TEST_EQUAL(pb.capacity(), 512); if (i >= 14) { index = (index - 14) & 0xffff; fprintf(stderr, "remove: %u\n", index); TEST_CHECK(pb.remove(index) == (void*)(index + 1)); TEST_EQUAL(pb.size(), 14); } } } { // test wrapping the indices packet_buffer pb; TEST_EQUAL(pb.size(), 0); pb.insert(0xfffe, (void*)1); TEST_CHECK(pb.at(0xfffe) == (void*)1); pb.insert(2, (void*)2); TEST_CHECK(pb.at(2) == (void*)2); pb.remove(0xfffe); TEST_CHECK(pb.at(0xfffe) == (void*)0); TEST_CHECK(pb.at(2) == (void*)2); } TEST_CHECK(error_code(errors::http_error).message() == "HTTP error"); TEST_CHECK(error_code(errors::missing_file_sizes).message() == "missing or invalid 'file sizes' entry"); TEST_CHECK(error_code(errors::unsupported_protocol_version).message() == "unsupported protocol version"); TEST_CHECK(error_code(errors::no_i2p_router).message() == "no i2p router is set up"); TEST_CHECK(error_code(errors::http_parse_error).message() == "Invalid HTTP header"); TEST_CHECK(error_code(errors::error_code_max).message() == "Unknown error"); TEST_CHECK(errors::reserved129 == 129); TEST_CHECK(errors::reserved159 == 159); TEST_CHECK(errors::reserved114 == 114); { // test session state load/restore session* s = new session(fingerprint("LT",0,0,0,0), 0); session_settings sett; sett.user_agent = "test"; sett.tracker_receive_timeout = 1234; sett.file_pool_size = 543; sett.urlseed_wait_retry = 74; sett.file_pool_size = 754; sett.initial_picker_threshold = 351; sett.upnp_ignore_nonrouters = 5326; sett.coalesce_writes = 623; sett.auto_scrape_interval = 753; sett.close_redundant_connections = 245; sett.auto_scrape_interval = 235; sett.auto_scrape_min_interval = 62; s->set_settings(sett); #ifndef TORRENT_DISABLE_DHT dht_settings dhts; dhts.max_peers_reply = 70; s->set_dht_settings(dhts); #endif /* #ifndef TORRENT_DISABLE_DHT dht_settings dht_sett; s->set_dht_settings(dht_sett); #endif */ entry session_state; s->save_state(session_state); // test magnet link parsing add_torrent_params p; p.save_path = "."; error_code ec; p.url = "magnet:?xt=urn:btih:cdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcd" "&tr=http://1" "&tr=http://2" "&tr=http://3" "&dn=foo" "&dht=127.0.0.1:43"; torrent_handle t = s->add_torrent(p, ec); TEST_CHECK(!ec); if (ec) fprintf(stderr, "%s\n", ec.message().c_str()); std::vector trackers = t.trackers(); TEST_EQUAL(trackers.size(), 3); if (trackers.size() > 0) { TEST_EQUAL(trackers[0].url, "http://1"); fprintf(stderr, "1: %s\n", trackers[0].url.c_str()); } if (trackers.size() > 1) { TEST_EQUAL(trackers[1].url, "http://2"); fprintf(stderr, "2: %s\n", trackers[1].url.c_str()); } if (trackers.size() > 2) { TEST_EQUAL(trackers[2].url, "http://3"); fprintf(stderr, "3: %s\n", trackers[2].url.c_str()); } p.url = "magnet:" "?tr=http://1" "&tr=http://2" "&dn=foo" "&dht=127.0.0.1:43" "&xt=urn:btih:c352cdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcd"; torrent_handle t2 = s->add_torrent(p, ec); TEST_CHECK(!ec); if (ec) fprintf(stderr, "%s\n", ec.message().c_str()); trackers = t2.trackers(); TEST_EQUAL(trackers.size(), 2); p.url = "magnet:" "?tr=udp%3A%2F%2Ftracker.openbittorrent.com%3A80" "&tr=udp%3A%2F%2Ftracker.publicbt.com%3A80" "&tr=udp%3A%2F%2Ftracker.ccc.de%3A80" "&xt=urn:btih:a38d02c287893842a32825aa866e00828a318f07" "&dn=Ubuntu+11.04+%28Final%29"; torrent_handle t3 = s->add_torrent(p, ec); TEST_CHECK(!ec); if (ec) fprintf(stderr, "%s\n", ec.message().c_str()); trackers = t3.trackers(); TEST_EQUAL(trackers.size(), 3); if (trackers.size() > 0) { TEST_EQUAL(trackers[0].url, "udp://tracker.openbittorrent.com:80"); fprintf(stderr, "1: %s\n", trackers[0].url.c_str()); } if (trackers.size() > 1) { TEST_EQUAL(trackers[1].url, "udp://tracker.publicbt.com:80"); fprintf(stderr, "2: %s\n", trackers[1].url.c_str()); } if (trackers.size() > 2) { TEST_EQUAL(trackers[2].url, "udp://tracker.ccc.de:80"); fprintf(stderr, "3: %s\n", trackers[2].url.c_str()); } TEST_EQUAL(to_hex(t.info_hash().to_string()), "cdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcdcd"); delete s; s = new session(fingerprint("LT",0,0,0,0), 0); std::vector buf; bencode(std::back_inserter(buf), session_state); lazy_entry session_state2; ret = lazy_bdecode(&buf[0], &buf[0] + buf.size(), session_state2, ec); TEST_CHECK(ret == 0); fprintf(stderr, "session_state\n%s\n", print_entry(session_state2).c_str()); // make sure settings that haven't been changed from their defaults are not saved TEST_CHECK(session_state2.dict_find("settings")->dict_find("optimistic_disk_retry") == 0); s->load_state(session_state2); #define CMP_SET(x) TEST_CHECK(s->settings().x == sett.x) CMP_SET(user_agent); CMP_SET(tracker_receive_timeout); CMP_SET(file_pool_size); CMP_SET(urlseed_wait_retry); CMP_SET(file_pool_size); CMP_SET(initial_picker_threshold); CMP_SET(upnp_ignore_nonrouters); CMP_SET(coalesce_writes); CMP_SET(auto_scrape_interval); CMP_SET(close_redundant_connections); CMP_SET(auto_scrape_interval); CMP_SET(auto_scrape_min_interval); CMP_SET(max_peerlist_size); CMP_SET(max_paused_peerlist_size); CMP_SET(min_announce_interval); CMP_SET(prioritize_partial_pieces); CMP_SET(auto_manage_startup); CMP_SET(rate_limit_ip_overhead); CMP_SET(announce_to_all_trackers); CMP_SET(announce_to_all_tiers); CMP_SET(prefer_udp_trackers); CMP_SET(strict_super_seeding); CMP_SET(seeding_piece_quota); delete s; } // test path functions TEST_EQUAL(combine_path("test1/", "test2"), "test1/test2"); #ifdef TORRENT_WINDOWS TEST_EQUAL(combine_path("test1\\", "test2"), "test1\\test2"); TEST_EQUAL(combine_path("test1", "test2"), "test1\\test2"); #else TEST_EQUAL(combine_path("test1", "test2"), "test1/test2"); #endif #if TORRENT_USE_UNC_PATHS TEST_EQUAL(canonicalize_path("c:\\a\\..\\b"), "c:\\b"); TEST_EQUAL(canonicalize_path("a\\..\\b"), "b"); TEST_EQUAL(canonicalize_path("a\\..\\.\\b"), "b"); TEST_EQUAL(canonicalize_path("\\.\\a"), "\\a"); TEST_EQUAL(canonicalize_path("\\\\bla\\.\\a"), "\\\\bla\\a"); TEST_EQUAL(canonicalize_path("c:\\bla\\a"), "c:\\bla\\a"); #endif TEST_EQUAL(extension("blah"), ""); TEST_EQUAL(extension("blah.exe"), ".exe"); TEST_EQUAL(extension("blah.foo.bar"), ".bar"); TEST_EQUAL(extension("blah.foo."), "."); TEST_EQUAL(filename("blah"), "blah"); TEST_EQUAL(filename("/blah/foo/bar"), "bar"); TEST_EQUAL(filename("/blah/foo/bar/"), "bar"); TEST_EQUAL(filename("blah/"), "blah"); #ifdef TORRENT_WINDOWS TEST_EQUAL(is_root_path("c:\\blah"), false); TEST_EQUAL(is_root_path("c:\\"), true); TEST_EQUAL(is_root_path("\\\\"), true); TEST_EQUAL(is_root_path("\\\\foobar"), true); TEST_EQUAL(is_root_path("\\\\foobar\\"), true); TEST_EQUAL(is_root_path("\\\\foobar/"), true); TEST_EQUAL(is_root_path("\\\\foo/bar"), false); TEST_EQUAL(is_root_path("\\\\foo\\bar\\"), false); #else TEST_EQUAL(is_root_path("/blah"), false); TEST_EQUAL(is_root_path("/"), true); #endif // if has_parent_path() returns false // parent_path() should return the empty string TEST_EQUAL(parent_path("blah"), ""); TEST_EQUAL(has_parent_path("blah"), false); TEST_EQUAL(parent_path("/blah/foo/bar"), "/blah/foo/"); TEST_EQUAL(has_parent_path("/blah/foo/bar"), true); TEST_EQUAL(parent_path("/blah/foo/bar/"), "/blah/foo/"); TEST_EQUAL(has_parent_path("/blah/foo/bar/"), true); TEST_EQUAL(parent_path("/a"), "/"); TEST_EQUAL(has_parent_path("/a"), true); TEST_EQUAL(parent_path("/"), ""); TEST_EQUAL(has_parent_path("/"), false); TEST_EQUAL(parent_path(""), ""); TEST_EQUAL(has_parent_path(""), false); #ifdef TORRENT_WINDOWS TEST_EQUAL(parent_path("\\\\"), ""); TEST_EQUAL(has_parent_path("\\\\"), false); TEST_EQUAL(parent_path("c:\\"), ""); TEST_EQUAL(has_parent_path("c:\\"), false); TEST_EQUAL(parent_path("c:\\a"), "c:\\"); TEST_EQUAL(has_parent_path("c:\\a"), true); TEST_EQUAL(has_parent_path("\\\\a"), false); TEST_EQUAL(has_parent_path("\\\\foobar/"), false); TEST_EQUAL(has_parent_path("\\\\foobar\\"), false); TEST_EQUAL(has_parent_path("\\\\foo/bar\\"), true); #endif #ifdef TORRENT_WINDOWS TEST_EQUAL(is_complete("c:\\"), true); TEST_EQUAL(is_complete("c:\\foo\\bar"), true); TEST_EQUAL(is_complete("\\\\foo\\bar"), true); TEST_EQUAL(is_complete("foo/bar"), false); TEST_EQUAL(is_complete("\\\\"), true); #else TEST_EQUAL(is_complete("/foo/bar"), true); TEST_EQUAL(is_complete("foo/bar"), false); TEST_EQUAL(is_complete("/"), true); TEST_EQUAL(is_complete(""), false); #endif // test split_string char const* tags[10]; char tags_str[] = " this is\ta test\t string\x01to be split and it cannot " "extend over the limit of elements \t"; ret = split_string(tags, 10, tags_str); TEST_CHECK(ret == 10); TEST_CHECK(strcmp(tags[0], "this") == 0); TEST_CHECK(strcmp(tags[1], "is") == 0); TEST_CHECK(strcmp(tags[2], "a") == 0); TEST_CHECK(strcmp(tags[3], "test") == 0); TEST_CHECK(strcmp(tags[4], "string") == 0); TEST_CHECK(strcmp(tags[5], "to") == 0); TEST_CHECK(strcmp(tags[6], "be") == 0); TEST_CHECK(strcmp(tags[7], "split") == 0); TEST_CHECK(strcmp(tags[8], "and") == 0); TEST_CHECK(strcmp(tags[9], "it") == 0); // test snprintf char msg[10]; snprintf(msg, sizeof(msg), "too %s format string", "long"); TEST_CHECK(strcmp(msg, "too long ") == 0); // test maybe_url_encode TEST_EQUAL(maybe_url_encode("http://test:test@abc.com/abc<>abc"), "http://test:test@abc.com:80/abc%3c%3eabc"); TEST_EQUAL(maybe_url_encode("http://abc.com/foo bar"), "http://abc.com:80/foo%20bar"); TEST_EQUAL(maybe_url_encode("abc"), "abc"); TEST_EQUAL(maybe_url_encode("http://abc.com/abc"), "http://abc.com/abc"); // test sanitize_path #ifdef TORRENT_WINDOWS TEST_EQUAL(sanitize_path("/a/b/c"), "a\\b\\c"); TEST_EQUAL(sanitize_path("a/../c"), "a\\c"); #else TEST_EQUAL(sanitize_path("/a/b/c"), "a/b/c"); TEST_EQUAL(sanitize_path("a/../c"), "a/c"); #endif TEST_EQUAL(sanitize_path("/.././c"), "c"); TEST_EQUAL(sanitize_path("dev:"), ""); TEST_EQUAL(sanitize_path("c:/b"), "b"); #ifdef TORRENT_WINDOWS TEST_EQUAL(sanitize_path("c:\\.\\c"), "c"); TEST_EQUAL(sanitize_path("\\c"), "c"); #else TEST_EQUAL(sanitize_path("//./c"), "c"); #endif // make sure the time classes have correct semantics TEST_EQUAL(total_milliseconds(milliseconds(100)), 100); TEST_EQUAL(total_milliseconds(milliseconds(1)), 1); TEST_EQUAL(total_milliseconds(seconds(1)), 1000); if (supports_ipv6()) { // make sure the assumption we use in policy's peer list hold std::multimap peers; std::multimap::iterator i; peers.insert(std::make_pair(address::from_string("::1", ec), 0)); peers.insert(std::make_pair(address::from_string("::2", ec), 3)); peers.insert(std::make_pair(address::from_string("::3", ec), 5)); i = peers.find(address::from_string("::2", ec)); TEST_CHECK(i != peers.end()); if (i != peers.end()) { TEST_CHECK(i->first == address::from_string("::2", ec)); TEST_CHECK(i->second == 3); } } // test identify_client TEST_CHECK(identify_client(peer_id("-AZ1234-............")) == "Azureus 1.2.3.4"); TEST_CHECK(identify_client(peer_id("-AZ1230-............")) == "Azureus 1.2.3"); TEST_CHECK(identify_client(peer_id("S123--..............")) == "Shadow 1.2.3"); TEST_CHECK(identify_client(peer_id("M1-2-3--............")) == "Mainline 1.2.3"); // test to/from hex conversion char const* str = "0123456789012345678901234567890123456789"; char bin[20]; TEST_CHECK(from_hex(str, 40, bin)); char hex[41]; to_hex(bin, 20, hex); TEST_CHECK(strcmp(hex, str) == 0); // test is_space TEST_CHECK(!is_space('C')); TEST_CHECK(!is_space('\b')); TEST_CHECK(!is_space('8')); TEST_CHECK(!is_space('=')); TEST_CHECK(is_space(' ')); TEST_CHECK(is_space('\t')); TEST_CHECK(is_space('\n')); TEST_CHECK(is_space('\r')); // test to_lower TEST_CHECK(to_lower('C') == 'c'); TEST_CHECK(to_lower('c') == 'c'); TEST_CHECK(to_lower('-') == '-'); TEST_CHECK(to_lower('&') == '&'); // test string_equal_no_case TEST_CHECK(string_equal_no_case("foobar", "FoobAR")); TEST_CHECK(string_equal_no_case("foobar", "foobar")); TEST_CHECK(!string_equal_no_case("foobar", "foobar ")); TEST_CHECK(!string_equal_no_case("foobar", "F00")); // test string_begins_no_case TEST_CHECK(string_begins_no_case("foobar", "FoobAR --")); TEST_CHECK(!string_begins_no_case("foobar", "F00")); // test itoa TEST_CHECK(to_string(345).elems == std::string("345")); TEST_CHECK(to_string(-345).elems == std::string("-345")); TEST_CHECK(to_string(0).elems == std::string("0")); TEST_CHECK(to_string(1000000000).elems == std::string("1000000000")); // test url parsing TEST_CHECK(parse_url_components("http://foo:bar@host.com:80/path/to/file", ec) == make_tuple("http", "foo:bar", "host.com", 80, "/path/to/file")); TEST_CHECK(parse_url_components("http://host.com/path/to/file", ec) == make_tuple("http", "", "host.com", 80, "/path/to/file")); TEST_CHECK(parse_url_components("ftp://host.com:21/path/to/file", ec) == make_tuple("ftp", "", "host.com", 21, "/path/to/file")); TEST_CHECK(parse_url_components("http://host.com/path?foo:bar@foo:", ec) == make_tuple("http", "", "host.com", 80, "/path?foo:bar@foo:")); TEST_CHECK(parse_url_components("http://192.168.0.1/path/to/file", ec) == make_tuple("http", "", "192.168.0.1", 80, "/path/to/file")); TEST_CHECK(parse_url_components("http://[2001:ff00::1]:42/path/to/file", ec) == make_tuple("http", "", "[2001:ff00::1]", 42, "/path/to/file")); // base64 test vectors from http://www.faqs.org/rfcs/rfc4648.html TEST_CHECK(base64encode("") == ""); TEST_CHECK(base64encode("f") == "Zg=="); TEST_CHECK(base64encode("fo") == "Zm8="); TEST_CHECK(base64encode("foo") == "Zm9v"); TEST_CHECK(base64encode("foob") == "Zm9vYg=="); TEST_CHECK(base64encode("fooba") == "Zm9vYmE="); TEST_CHECK(base64encode("foobar") == "Zm9vYmFy"); // base32 test vectors from http://www.faqs.org/rfcs/rfc4648.html TEST_CHECK(base32encode("") == ""); TEST_CHECK(base32encode("f") == "MY======"); TEST_CHECK(base32encode("fo") == "MZXQ===="); TEST_CHECK(base32encode("foo") == "MZXW6==="); TEST_CHECK(base32encode("foob") == "MZXW6YQ="); TEST_CHECK(base32encode("fooba") == "MZXW6YTB"); TEST_CHECK(base32encode("foobar") == "MZXW6YTBOI======"); TEST_CHECK(base32decode("") == ""); TEST_CHECK(base32decode("MY======") == "f"); TEST_CHECK(base32decode("MZXQ====") == "fo"); TEST_CHECK(base32decode("MZXW6===") == "foo"); TEST_CHECK(base32decode("MZXW6YQ=") == "foob"); TEST_CHECK(base32decode("MZXW6YTB") == "fooba"); TEST_CHECK(base32decode("MZXW6YTBOI======") == "foobar"); TEST_CHECK(base32decode("MY") == "f"); TEST_CHECK(base32decode("MZXW6YQ") == "foob"); TEST_CHECK(base32decode("MZXW6YTBOI") == "foobar"); TEST_CHECK(base32decode("mZXw6yTBO1======") == "foobar"); std::string test; for (int i = 0; i < 255; ++i) test += char(i); TEST_CHECK(base32decode(base32encode(test)) == test); // url_has_argument TEST_CHECK(url_has_argument("http://127.0.0.1/test", "test") == ""); TEST_CHECK(url_has_argument("http://127.0.0.1/test?foo=24", "bar") == ""); TEST_CHECK(url_has_argument("http://127.0.0.1/test?foo=24", "foo") == "24"); TEST_CHECK(url_has_argument("http://127.0.0.1/test?foo=24&bar=23", "foo") == "24"); TEST_CHECK(url_has_argument("http://127.0.0.1/test?foo=24&bar=23", "bar") == "23"); TEST_CHECK(url_has_argument("http://127.0.0.1/test?foo=24&bar=23&a=e", "bar") == "23"); TEST_CHECK(url_has_argument("http://127.0.0.1/test?foo=24&bar=23&a=e", "a") == "e"); TEST_CHECK(url_has_argument("http://127.0.0.1/test?foo=24&bar=23&a=e", "b") == ""); // escape_string char const* test_string = "!@#$%^&*()-_=+/,. %?"; TEST_EQUAL(escape_string(test_string, strlen(test_string)) , "!%40%23%24%25%5e%26*()-_%3d%2b%2f%2c.%20%25%3f"); // escape_path TEST_EQUAL(escape_path(test_string, strlen(test_string)) , "!%40%23%24%25%5e%26*()-_%3d%2b/%2c.%20%25%3f"); TEST_CHECK(unescape_string(escape_path(test_string, strlen(test_string)), ec) == test_string); TEST_CHECK(!ec); // need_encoding char const* test_string2 = "!@$&()-_/,.%?"; TEST_CHECK(need_encoding(test_string, strlen(test_string)) == true); TEST_CHECK(need_encoding(test_string2, strlen(test_string2)) == false); TEST_CHECK(need_encoding("\n", 1) == true); // maybe_url_encode TEST_CHECK(maybe_url_encode("http://bla.com/\n") == "http://bla.com:80/%0a"); std::cerr << maybe_url_encode("http://bla.com/\n") << std::endl; TEST_CHECK(maybe_url_encode("?&") == "?&"); // unescape_string TEST_CHECK(unescape_string(escape_string(test_string, strlen(test_string)), ec) == test_string); std::cerr << unescape_string(escape_string(test_string, strlen(test_string)), ec) << std::endl; // verify_encoding test = "\b?filename=4"; TEST_CHECK(!verify_encoding(test)); #ifdef TORRENT_WINDOWS TEST_CHECK(test == "__filename=4"); #else TEST_CHECK(test == "_?filename=4"); #endif test = "filename=4"; TEST_CHECK(verify_encoding(test)); TEST_CHECK(test == "filename=4"); // file class file f; #if TORRENT_USE_UNC_PATHS || !defined WIN32 TEST_CHECK(f.open("con", file::read_write, ec)); #else TEST_CHECK(f.open("test_file", file::read_write, ec)); #endif TEST_CHECK(!ec); file::iovec_t b = {(void*)"test", 4}; TEST_CHECK(f.writev(0, &b, 1, ec) == 4); TEST_CHECK(!ec); char test_buf[5] = {0}; b.iov_base = test_buf; b.iov_len = 4; TEST_CHECK(f.readv(0, &b, 1, ec) == 4); TEST_CHECK(!ec); TEST_CHECK(strcmp(test_buf, "test") == 0); f.close(); // HTTP request parser http_parser parser; boost::tuple received; received = feed_bytes(parser , "HTTP/1.1 200 OK\r\n" "Content-Length: 4\r\n" "Content-Type: text/plain\r\n" "\r\n" "test"); TEST_CHECK(received == make_tuple(4, 64, false)); TEST_CHECK(parser.finished()); TEST_CHECK(std::equal(parser.get_body().begin, parser.get_body().end, "test")); TEST_CHECK(parser.header("content-type") == "text/plain"); TEST_CHECK(atoi(parser.header("content-length").c_str()) == 4); parser.reset(); TEST_CHECK(!parser.finished()); char const* upnp_response = "HTTP/1.1 200 OK\r\n" "ST:upnp:rootdevice\r\n" "USN:uuid:000f-66d6-7296000099dc::upnp:rootdevice\r\n" "Location: http://192.168.1.1:5431/dyndev/uuid:000f-66d6-7296000099dc\r\n" "Server: Custom/1.0 UPnP/1.0 Proc/Ver\r\n" "EXT:\r\n" "Cache-Control:max-age=180\r\n" "DATE: Fri, 02 Jan 1970 08:10:38 GMT\r\n\r\n"; received = feed_bytes(parser, upnp_response); TEST_CHECK(received == make_tuple(0, int(strlen(upnp_response)), false)); TEST_CHECK(parser.get_body().left() == 0); TEST_CHECK(parser.header("st") == "upnp:rootdevice"); TEST_CHECK(parser.header("location") == "http://192.168.1.1:5431/dyndev/uuid:000f-66d6-7296000099dc"); TEST_CHECK(parser.header("ext") == ""); TEST_CHECK(parser.header("date") == "Fri, 02 Jan 1970 08:10:38 GMT"); parser.reset(); TEST_CHECK(!parser.finished()); char const* upnp_notify = "NOTIFY * HTTP/1.1\r\n" "Host:239.255.255.250:1900\r\n" "NT:urn:schemas-upnp-org:device:MediaServer:1\r\n" "NTS:ssdp:alive\r\n" "Location:http://10.0.1.15:2353/upnphost/udhisapi.dll?content=uuid:c17f2c31-d19b-4912-af94-651945c8a84e\r\n" "USN:uuid:c17f0c32-d1db-4be8-ae94-25f94583026e::urn:schemas-upnp-org:device:MediaServer:1\r\n" "Cache-Control:max-age=900\r\n" "Server:Microsoft-Windows-NT/5.1 UPnP/1.0 UPnP-Device-Host/1.0\r\n"; received = feed_bytes(parser, upnp_notify); TEST_CHECK(received == make_tuple(0, int(strlen(upnp_notify)), false)); TEST_CHECK(parser.method() == "notify"); TEST_CHECK(parser.path() == "*"); parser.reset(); TEST_CHECK(!parser.finished()); char const* bt_lsd = "BT-SEARCH * HTTP/1.1\r\n" "Host: 239.192.152.143:6771\r\n" "Port: 6881\r\n" "Infohash: 12345678901234567890\r\n" "\r\n"; received = feed_bytes(parser, bt_lsd); TEST_CHECK(received == make_tuple(0, int(strlen(bt_lsd)), false)); TEST_CHECK(parser.method() == "bt-search"); TEST_CHECK(parser.path() == "*"); TEST_CHECK(atoi(parser.header("port").c_str()) == 6881); TEST_CHECK(parser.header("infohash") == "12345678901234567890"); TEST_CHECK(parser.finished()); parser.reset(); TEST_CHECK(!parser.finished()); // test chunked encoding char const* chunked_test = "HTTP/1.1 200 OK\r\n" "Content-Length: 20\r\n" "Content-Type: text/plain\r\n" "Transfer-Encoding: chunked\r\n" "\r\n" "4\r\n" "test\r\n" "10\r\n" "0123456789abcdef\r\n" "0\r\n" "Test-header: foobar\r\n" "\r\n"; received = feed_bytes(parser, chunked_test); printf("payload: %d protocol: %d\n", received.get<0>(), received.get<1>()); TEST_CHECK(received == make_tuple(20, strlen(chunked_test) - 20, false)); TEST_CHECK(parser.finished()); TEST_CHECK(std::equal(parser.get_body().begin, parser.get_body().end , "4\r\ntest\r\n10\r\n0123456789abcdef")); TEST_CHECK(parser.header("test-header") == "foobar"); TEST_CHECK(parser.header("content-type") == "text/plain"); TEST_CHECK(atoi(parser.header("content-length").c_str()) == 20); TEST_CHECK(parser.chunked_encoding()); typedef std::pair chunk_range; std::vector cmp; cmp.push_back(chunk_range(96, 100)); cmp.push_back(chunk_range(106, 122)); TEST_CHECK(cmp == parser.chunks()); // make sure we support trackers with incorrect line endings char const* tracker_response = "HTTP/1.1 200 OK\n" "content-length: 5\n" "content-type: test/plain\n" "\n" "\ntest"; received = feed_bytes(parser, tracker_response); TEST_CHECK(received == make_tuple(5, int(strlen(tracker_response) - 5), false)); TEST_CHECK(parser.get_body().left() == 5); parser.reset(); // make sure we support content-range responses // and that we're case insensitive char const* web_seed_response = "HTTP/1.1 206 OK\n" "contEnt-rAngE: bYTes 0-4\n" "conTent-TyPe: test/plain\n" "\n" "\ntest"; received = feed_bytes(parser, web_seed_response); TEST_CHECK(received == make_tuple(5, int(strlen(web_seed_response) - 5), false)); TEST_CHECK(parser.content_range() == (std::pair(0, 4))); TEST_CHECK(parser.content_length() == 5); parser.reset(); // make sure we support content-range responses // and that we're case insensitive char const* one_hundred_response = "HTTP/1.1 100 Continue\n" "\r\n" "HTTP/1.1 200 OK\n" "Content-Length: 4\r\n" "Content-Type: test/plain\r\n" "\r\n" "test"; received = feed_bytes(parser, one_hundred_response); TEST_CHECK(received == make_tuple(4, int(strlen(one_hundred_response) - 4), false)); TEST_EQUAL(parser.content_length(), 4); { // test chunked encoding parser char const chunk_header1[] = "f;this is a comment\r\n"; size_type chunk_size; int header_size; bool ret = parser.parse_chunk_header(buffer::const_interval(chunk_header1, chunk_header1 + 10) , &chunk_size, &header_size); TEST_EQUAL(ret, false); ret = parser.parse_chunk_header(buffer::const_interval(chunk_header1, chunk_header1 + sizeof(chunk_header1)) , &chunk_size, &header_size); TEST_EQUAL(ret, true); TEST_EQUAL(chunk_size, 15); TEST_EQUAL(header_size, sizeof(chunk_header1) - 1); char const chunk_header2[] = "0;this is a comment\r\n" "test1: foo\r\n" "test2: bar\r\n" "\r\n"; ret = parser.parse_chunk_header(buffer::const_interval(chunk_header2, chunk_header2 + sizeof(chunk_header2)) , &chunk_size, &header_size); TEST_EQUAL(ret, true); TEST_EQUAL(chunk_size, 0); TEST_EQUAL(header_size, sizeof(chunk_header2) - 1); TEST_EQUAL(parser.headers().find("test1")->second, "foo"); TEST_EQUAL(parser.headers().find("test2")->second, "bar"); } // test xml parser char xml1[] = "foobar"; std::string out1; xml_parse(xml1, xml1 + sizeof(xml1) - 1, boost::bind(&parser_callback , boost::ref(out1), _1, _2, _3)); std::cerr << out1 << std::endl; TEST_CHECK(out1 == "BaSfooEbSbarFa"); char xml2[] = ""; std::string out2; xml_parse(xml2, xml2 + sizeof(xml2) - 1, boost::bind(&parser_callback , boost::ref(out2), _1, _2, _3)); std::cerr << out2 << std::endl; TEST_CHECK(out2 == "DxmlAversionV1.0EcAxV1AyV3BdAfooVbarFdAbooVfooCcomment"); char xml3[] = "foo