complete r8400 commit
git-svn-id: http://svn.freeswitch.org/svn/freeswitch/trunk@8406 d0543943-73ff-0310-b7d9-9358b9ac24b2
This commit is contained in:
parent
deba14a301
commit
dd9f6af78d
|
@ -0,0 +1,120 @@
|
|||
/*
|
||||
* This file is part of the Sofia-SIP package
|
||||
*
|
||||
* Copyright (C) 2007 Nokia Corporation.
|
||||
*
|
||||
* Contact: Pekka Pessi <pekka.pessi@nokia.com>
|
||||
*
|
||||
* This library is free software; you can redistribute it and/or
|
||||
* modify it under the terms of the GNU Lesser General Public License
|
||||
* as published by the Free Software Foundation; either version 2.1 of
|
||||
* the License, or (at your option) any later version.
|
||||
*
|
||||
* This library is distributed in the hope that it will be useful, but
|
||||
* WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
* Lesser General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU Lesser General Public
|
||||
* License along with this library; if not, write to the Free Software
|
||||
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
|
||||
* 02110-1301 USA
|
||||
*
|
||||
*/
|
||||
|
||||
/**@CFILE check2_sofia.c
|
||||
*
|
||||
* @brief Check-driven tester for Sofia SIP User Agent library
|
||||
*
|
||||
* @author Pekka Pessi <Pekka.Pessi@nokia.com>
|
||||
*
|
||||
* @copyright (C) 2007 Nokia Corporation.
|
||||
*/
|
||||
|
||||
#include "config.h"
|
||||
|
||||
#include "check_nua.h"
|
||||
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include <stdio.h>
|
||||
|
||||
#if HAVE_FNMATCH_H
|
||||
#include <fnmatch.h>
|
||||
#endif
|
||||
|
||||
static char const * const default_patterns[] = { "*", NULL };
|
||||
static char const * const *test_patterns = default_patterns;
|
||||
|
||||
void check_nua_tcase_add_test(TCase *tc, TFun tf, char const *name)
|
||||
{
|
||||
char const * const *patterns;
|
||||
|
||||
#if HAVE_FNMATCH_H
|
||||
for (patterns = test_patterns; *patterns; patterns++) {
|
||||
if (!fnmatch(*patterns, name, 0)) {
|
||||
if (strcmp(*patterns, "*")) {
|
||||
printf("%s: match with %s\n", name, *patterns);
|
||||
}
|
||||
_tcase_add_test(tc, tf, name, 0, 0, 1);
|
||||
return;
|
||||
}
|
||||
}
|
||||
#else
|
||||
for (patterns = test_patterns; *patterns; patterns++) {
|
||||
if (!strcmp(*patterns, name) || !strcmp(*patterns, "*")) {
|
||||
if (strcmp(*patterns, "*")) {
|
||||
printf("%s: match with %s\n", name, *patterns);
|
||||
}
|
||||
_tcase_add_test(tc, tf, name, 0, 0, 1);
|
||||
return;
|
||||
}
|
||||
}
|
||||
#endif
|
||||
printf("%s: no match\n", name);
|
||||
}
|
||||
|
||||
int main(int argc, char *argv[])
|
||||
{
|
||||
int failed = 0;
|
||||
|
||||
Suite *suite = suite_create("Unit tests for Sofia-SIP UA Engine");
|
||||
SRunner *runner;
|
||||
|
||||
if (getenv("CHECK_NUA_CASES")) {
|
||||
size_t i;
|
||||
char *s, **patterns;
|
||||
char *cases = strdup(getenv("CHECK_NUA_CASES"));
|
||||
|
||||
/* Count commas */
|
||||
for (i = 2, s = cases; (s = strchr(s, ',')); s++, i++);
|
||||
|
||||
patterns = calloc(i, sizeof *patterns);
|
||||
|
||||
for (i = 0, s = cases;; i++) {
|
||||
patterns[i] = s;
|
||||
if (s == NULL)
|
||||
break;
|
||||
s = strchr(s, ',');
|
||||
if (s)
|
||||
*s++ = '\0';
|
||||
}
|
||||
|
||||
test_patterns = (char const * const *)patterns;
|
||||
}
|
||||
|
||||
check_register_cases(suite);
|
||||
check_session_cases(suite);
|
||||
|
||||
runner = srunner_create(suite);
|
||||
|
||||
if (argv[1]) {
|
||||
srunner_set_xml(runner, argv[1]);
|
||||
}
|
||||
srunner_run_all(runner, CK_ENV);
|
||||
|
||||
failed = srunner_ntests_failed(runner);
|
||||
srunner_free(runner);
|
||||
|
||||
exit(failed ? EXIT_FAILURE : EXIT_SUCCESS);
|
||||
}
|
|
@ -0,0 +1,15 @@
|
|||
#ifndef CHECK_NUA_H
|
||||
|
||||
#include <check.h>
|
||||
|
||||
#undef tcase_add_test
|
||||
#define tcase_add_test(tc, tf) \
|
||||
check_nua_tcase_add_test(tc, tf, "" #tf "")
|
||||
|
||||
void check_nua_tcase_add_test(TCase *, TFun, char const *name);
|
||||
|
||||
void check_session_cases(Suite *suite);
|
||||
void check_register_cases(Suite *suite);
|
||||
|
||||
#endif
|
||||
|
|
@ -0,0 +1,741 @@
|
|||
/*
|
||||
* This file is part of the Sofia-SIP package
|
||||
*
|
||||
* Copyright (C) 2008 Nokia Corporation.
|
||||
*
|
||||
* Contact: Pekka Pessi <pekka.pessi@nokia.com>
|
||||
*
|
||||
* This library is free software; you can redistribute it and/or
|
||||
* modify it under the terms of the GNU Lesser General Public License
|
||||
* as published by the Free Software Foundation; either version 2.1 of
|
||||
* the License, or (at your option) any later version.
|
||||
*
|
||||
* This library is distributed in the hope that it will be useful, but
|
||||
* WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
* Lesser General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU Lesser General Public
|
||||
* License along with this library; if not, write to the Free Software
|
||||
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
|
||||
* 02110-1301 USA
|
||||
*
|
||||
*/
|
||||
|
||||
/**@CFILE check_register.c
|
||||
*
|
||||
* @brief Check-driven tester for Sofia SIP User Agent library
|
||||
*
|
||||
* @author Pekka Pessi <Pekka.Pessi@nokia.com>
|
||||
*
|
||||
* @copyright (C) 2008 Nokia Corporation.
|
||||
*/
|
||||
|
||||
#include "config.h"
|
||||
|
||||
#include "check_nua.h"
|
||||
|
||||
#include "test_s2.h"
|
||||
|
||||
#include <sofia-sip/sip_status.h>
|
||||
#include <sofia-sip/sip_header.h>
|
||||
#include <sofia-sip/soa.h>
|
||||
#include <sofia-sip/su_tagarg.h>
|
||||
#include <sofia-sip/su_tag_io.h>
|
||||
#include <sofia-sip/su_log.h>
|
||||
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include <assert.h>
|
||||
|
||||
SOFIAPUBVAR su_log_t tport_log[];
|
||||
|
||||
static nua_t *nua;
|
||||
|
||||
static void register_setup(void)
|
||||
{
|
||||
nua = s2_nua_setup(TAG_END());
|
||||
}
|
||||
|
||||
static void register_pingpong_setup(void)
|
||||
{
|
||||
nua = s2_nua_setup(TPTAG_PINGPONG(20000),
|
||||
TPTAG_KEEPALIVE(10000),
|
||||
TAG_END());
|
||||
tport_set_params(s2->tcp.tport, TPTAG_PONG2PING(1), TAG_END());
|
||||
}
|
||||
|
||||
|
||||
static void register_teardown(void)
|
||||
{
|
||||
nua_shutdown(nua);
|
||||
fail_unless(s2_check_event(nua_r_shutdown, 200));
|
||||
s2_nua_teardown();
|
||||
}
|
||||
|
||||
|
||||
/* ---------------------------------------------------------------------- */
|
||||
|
||||
START_TEST(register_1_0_1)
|
||||
{
|
||||
nua_handle_t *nh = nua_handle(nua, NULL, TAG_END());
|
||||
struct message *m;
|
||||
|
||||
s2_case("1.0.1", "Failed Register", "REGISTER returned 403 response");
|
||||
|
||||
nua_register(nh, TAG_END());
|
||||
|
||||
fail_unless((m = s2_wait_for_request(SIP_METHOD_REGISTER)) != NULL, NULL);
|
||||
|
||||
s2_respond_to(m, NULL,
|
||||
SIP_403_FORBIDDEN,
|
||||
TAG_END());
|
||||
s2_free_message(m);
|
||||
|
||||
nua_handle_destroy(nh);
|
||||
|
||||
} END_TEST
|
||||
|
||||
|
||||
START_TEST(register_1_1_1)
|
||||
{
|
||||
s2_case("1.1.1", "Basic Register", "REGISTER returning 200 OK");
|
||||
|
||||
s2_register_setup();
|
||||
|
||||
s2_register_teardown();
|
||||
|
||||
} END_TEST
|
||||
|
||||
|
||||
START_TEST(register_1_1_2)
|
||||
{
|
||||
nua_handle_t *nh;
|
||||
struct message *m;
|
||||
|
||||
s2_case("1.1.2", "Register with dual authentication",
|
||||
"Register, authenticate");
|
||||
|
||||
nh = nua_handle(nua, NULL, TAG_END());
|
||||
|
||||
nua_register(nh, TAG_END());
|
||||
|
||||
m = s2_wait_for_request(SIP_METHOD_REGISTER); fail_if(!m);
|
||||
s2_respond_to(m, NULL,
|
||||
SIP_407_PROXY_AUTH_REQUIRED,
|
||||
SIPTAG_PROXY_AUTHENTICATE_STR(s2_auth_digest_str),
|
||||
TAG_END());
|
||||
s2_free_message(m);
|
||||
s2_check_event(nua_r_register, 407);
|
||||
|
||||
nua_authenticate(nh, NUTAG_AUTH(s2_auth_credentials), TAG_END());
|
||||
|
||||
m = s2_wait_for_request(SIP_METHOD_REGISTER); fail_if(!m);
|
||||
s2_respond_to(m, NULL,
|
||||
SIP_401_UNAUTHORIZED,
|
||||
SIPTAG_WWW_AUTHENTICATE_STR(s2_auth2_digest_str),
|
||||
SIPTAG_PROXY_AUTHENTICATE_STR(s2_auth_digest_str),
|
||||
TAG_END());
|
||||
s2_free_message(m);
|
||||
s2_check_event(nua_r_register, 401);
|
||||
|
||||
nua_authenticate(nh, NUTAG_AUTH(s2_auth2_credentials), TAG_END());
|
||||
|
||||
m = s2_wait_for_request(SIP_METHOD_REGISTER);
|
||||
fail_if(!m);
|
||||
fail_if(!m->sip->sip_authorization);
|
||||
fail_if(!m->sip->sip_proxy_authorization);
|
||||
s2_save_register(m);
|
||||
|
||||
s2_respond_to(m, NULL,
|
||||
SIP_200_OK,
|
||||
SIPTAG_CONTACT(s2->registration->contact),
|
||||
TAG_END());
|
||||
s2_free_message(m);
|
||||
|
||||
assert(s2->registration->contact != NULL);
|
||||
s2_check_event(nua_r_register, 200);
|
||||
|
||||
s2->registration->nh = nh;
|
||||
|
||||
s2_register_teardown();
|
||||
|
||||
} END_TEST
|
||||
|
||||
/* ---------------------------------------------------------------------- */
|
||||
|
||||
static char const *receive_natted = "received=4.255.255.9";
|
||||
|
||||
/* Return Via that looks very natted */
|
||||
static sip_via_t *natted_via(struct message *m)
|
||||
{
|
||||
su_home_t *h;
|
||||
sip_via_t *via;
|
||||
|
||||
h = msg_home(m->msg);
|
||||
via = sip_via_dup(h, m->sip->sip_via);
|
||||
msg_header_replace_param(h, via->v_common, receive_natted);
|
||||
|
||||
if (via->v_protocol == sip_transport_udp)
|
||||
msg_header_replace_param(h, via->v_common, "rport=9");
|
||||
|
||||
if (via->v_protocol == sip_transport_tcp && via->v_rport) {
|
||||
tp_name_t const *tpn = tport_name(m->tport);
|
||||
char *rport = su_sprintf(h, "rport=%s", tpn->tpn_port);
|
||||
msg_header_replace_param(h, via->v_common, rport);
|
||||
}
|
||||
|
||||
return via;
|
||||
}
|
||||
|
||||
/* ---------------------------------------------------------------------- */
|
||||
|
||||
START_TEST(register_1_2_1) {
|
||||
nua_handle_t *nh;
|
||||
struct message *m;
|
||||
|
||||
s2_case("1.2.1", "Register behind NAT",
|
||||
"Register through NAT, detect NAT, re-REGISTER");
|
||||
|
||||
nh = nua_handle(nua, NULL, TAG_END());
|
||||
|
||||
nua_register(nh, TAG_END());
|
||||
|
||||
m = s2_wait_for_request(SIP_METHOD_REGISTER);
|
||||
fail_if(!m);
|
||||
fail_if(!m->sip->sip_contact || m->sip->sip_contact->m_next);
|
||||
s2_save_register(m);
|
||||
|
||||
s2_respond_to(m, NULL,
|
||||
SIP_200_OK,
|
||||
SIPTAG_CONTACT(s2->registration->contact),
|
||||
SIPTAG_VIA(natted_via(m)),
|
||||
TAG_END());
|
||||
s2_free_message(m);
|
||||
|
||||
assert(s2->registration->contact != NULL);
|
||||
s2_check_event(nua_r_register, 100);
|
||||
|
||||
m = s2_wait_for_request(SIP_METHOD_REGISTER);
|
||||
fail_if(!m);
|
||||
fail_if(!m->sip->sip_contact || !m->sip->sip_contact->m_next);
|
||||
s2_save_register(m);
|
||||
|
||||
s2_respond_to(m, NULL,
|
||||
SIP_200_OK,
|
||||
SIPTAG_CONTACT(s2->registration->contact),
|
||||
SIPTAG_VIA(natted_via(m)),
|
||||
TAG_END());
|
||||
s2_free_message(m);
|
||||
|
||||
fail_unless(s2->registration->contact != NULL);
|
||||
fail_if(s2->registration->contact->m_next != NULL);
|
||||
s2_check_event(nua_r_register, 200);
|
||||
|
||||
s2->registration->nh = nh;
|
||||
|
||||
s2_register_teardown();
|
||||
|
||||
} END_TEST
|
||||
|
||||
|
||||
static nua_handle_t *make_auth_natted_register(
|
||||
nua_handle_t *nh,
|
||||
tag_type_t tag, tag_value_t value, ...)
|
||||
{
|
||||
struct message *m;
|
||||
|
||||
ta_list ta;
|
||||
ta_start(ta, tag, value);
|
||||
nua_register(nh, ta_tags(ta));
|
||||
ta_end(ta);
|
||||
|
||||
m = s2_wait_for_request(SIP_METHOD_REGISTER); fail_if(!m);
|
||||
s2_respond_to(m, NULL,
|
||||
SIP_401_UNAUTHORIZED,
|
||||
SIPTAG_WWW_AUTHENTICATE_STR(s2_auth_digest_str),
|
||||
SIPTAG_VIA(natted_via(m)),
|
||||
TAG_END());
|
||||
s2_free_message(m);
|
||||
|
||||
s2_check_event(nua_r_register, 401);
|
||||
|
||||
nua_authenticate(nh, NUTAG_AUTH(s2_auth_credentials), TAG_END());
|
||||
|
||||
m = s2_wait_for_request(SIP_METHOD_REGISTER);
|
||||
fail_if(!m);
|
||||
fail_if(!m->sip->sip_authorization);
|
||||
s2_save_register(m);
|
||||
|
||||
s2_respond_to(m, NULL,
|
||||
SIP_200_OK,
|
||||
SIPTAG_CONTACT(s2->registration->contact),
|
||||
SIPTAG_VIA(natted_via(m)),
|
||||
TAG_END());
|
||||
s2_free_message(m);
|
||||
|
||||
assert(s2->registration->contact != NULL);
|
||||
s2_check_event(nua_r_register, 200);
|
||||
|
||||
return nh;
|
||||
}
|
||||
|
||||
START_TEST(register_1_2_2_1)
|
||||
{
|
||||
nua_handle_t *nh = nua_handle(nua, NULL, TAG_END());
|
||||
|
||||
s2_case("1.2.2.1", "Register behind NAT",
|
||||
"Authenticate, outbound activated");
|
||||
|
||||
mark_point();
|
||||
make_auth_natted_register(nh, TAG_END());
|
||||
s2->registration->nh = nh;
|
||||
s2_register_teardown();
|
||||
}
|
||||
END_TEST
|
||||
|
||||
START_TEST(register_1_2_2_2)
|
||||
{
|
||||
nua_handle_t *nh = nua_handle(nua, NULL, TAG_END());
|
||||
struct message *m;
|
||||
|
||||
s2_case("1.2.2.2", "Register behind NAT",
|
||||
"Authenticate, outbound activated, "
|
||||
"authenticate OPTIONS probe, "
|
||||
"NAT binding change");
|
||||
|
||||
mark_point();
|
||||
make_auth_natted_register(nh, TAG_END());
|
||||
s2->registration->nh = nh;
|
||||
|
||||
mark_point();
|
||||
|
||||
m = s2_wait_for_request(SIP_METHOD_OPTIONS);
|
||||
fail_if(!m);
|
||||
s2_respond_to(m, NULL,
|
||||
SIP_407_PROXY_AUTH_REQUIRED,
|
||||
SIPTAG_VIA(natted_via(m)),
|
||||
SIPTAG_PROXY_AUTHENTICATE_STR(s2_auth_digest_str),
|
||||
TAG_END());
|
||||
s2_free_message(m);
|
||||
mark_point();
|
||||
|
||||
m = s2_wait_for_request(SIP_METHOD_OPTIONS);
|
||||
fail_if(!m); fail_if(!m->sip->sip_proxy_authorization);
|
||||
s2_respond_to(m, NULL,
|
||||
SIP_200_OK,
|
||||
SIPTAG_VIA(natted_via(m)),
|
||||
TAG_END());
|
||||
s2_free_message(m);
|
||||
|
||||
su_root_step(s2->root, 20); su_root_step(s2->root, 20);
|
||||
s2_fast_forward(120); /* Default keepalive interval */
|
||||
mark_point();
|
||||
|
||||
m = s2_wait_for_request(SIP_METHOD_OPTIONS);
|
||||
s2_respond_to(m, NULL,
|
||||
SIP_200_OK,
|
||||
SIPTAG_VIA(natted_via(m)),
|
||||
TAG_END());
|
||||
s2_free_message(m);
|
||||
|
||||
su_root_step(s2->root, 20); su_root_step(s2->root, 20);
|
||||
s2_fast_forward(120); /* Default keepalive interval */
|
||||
mark_point();
|
||||
|
||||
receive_natted = "received=4.255.255.10";
|
||||
|
||||
m = s2_wait_for_request(SIP_METHOD_OPTIONS);
|
||||
s2_respond_to(m, NULL,
|
||||
SIP_200_OK,
|
||||
SIPTAG_VIA(natted_via(m)),
|
||||
TAG_END());
|
||||
s2_free_message(m);
|
||||
|
||||
s2_check_event(nua_i_outbound, 0);
|
||||
|
||||
m = s2_wait_for_request(SIP_METHOD_REGISTER);
|
||||
fail_if(!m); fail_if(!m->sip->sip_authorization);
|
||||
fail_if(!m->sip->sip_contact || !m->sip->sip_contact->m_next);
|
||||
s2_save_register(m);
|
||||
|
||||
s2_respond_to(m, NULL,
|
||||
SIP_200_OK,
|
||||
SIPTAG_CONTACT(s2->registration->contact),
|
||||
SIPTAG_VIA(natted_via(m)),
|
||||
TAG_END());
|
||||
s2_free_message(m);
|
||||
|
||||
s2_check_event(nua_r_register, 200);
|
||||
|
||||
fail_unless(s2->registration->contact != NULL);
|
||||
fail_if(s2->registration->contact->m_next != NULL);
|
||||
|
||||
s2_register_teardown();
|
||||
|
||||
} END_TEST
|
||||
|
||||
|
||||
START_TEST(register_1_2_2_3)
|
||||
{
|
||||
nua_handle_t *nh = nua_handle(nua, NULL, TAG_END());
|
||||
struct message *m;
|
||||
|
||||
s2_case("1.2.2.3", "Register behind NAT",
|
||||
"Authenticate, outbound activated, "
|
||||
"detect NAT binding change when re-REGISTERing");
|
||||
|
||||
mark_point();
|
||||
|
||||
make_auth_natted_register(nh,
|
||||
NUTAG_OUTBOUND("no-options-keepalive"),
|
||||
TAG_END());
|
||||
s2->registration->nh = nh;
|
||||
|
||||
receive_natted = "received=4.255.255.10";
|
||||
|
||||
s2_fast_forward(3600);
|
||||
mark_point();
|
||||
|
||||
m = s2_wait_for_request(SIP_METHOD_REGISTER);
|
||||
fail_if(!m); fail_if(!m->sip->sip_authorization);
|
||||
s2_save_register(m);
|
||||
|
||||
s2_respond_to(m, NULL,
|
||||
SIP_200_OK,
|
||||
SIPTAG_CONTACT(s2->registration->contact),
|
||||
SIPTAG_VIA(natted_via(m)),
|
||||
TAG_END());
|
||||
s2_free_message(m);
|
||||
|
||||
s2_check_event(nua_r_register, 100);
|
||||
|
||||
m = s2_wait_for_request(SIP_METHOD_REGISTER);
|
||||
fail_if(!m); fail_if(!m->sip->sip_authorization);
|
||||
fail_if(!m->sip->sip_contact || !m->sip->sip_contact->m_next);
|
||||
s2_save_register(m);
|
||||
|
||||
s2_respond_to(m, NULL,
|
||||
SIP_200_OK,
|
||||
SIPTAG_CONTACT(s2->registration->contact),
|
||||
SIPTAG_VIA(natted_via(m)),
|
||||
TAG_END());
|
||||
s2_free_message(m);
|
||||
|
||||
fail_unless(s2->registration->contact != NULL);
|
||||
fail_if(s2->registration->contact->m_next != NULL);
|
||||
|
||||
s2_check_event(nua_r_register, 200);
|
||||
|
||||
s2_register_teardown();
|
||||
|
||||
} END_TEST
|
||||
|
||||
|
||||
START_TEST(register_1_2_3) {
|
||||
nua_handle_t *nh;
|
||||
struct message *m;
|
||||
|
||||
s2_case("1.2.3", "Register behind NAT",
|
||||
"Outbound activated by error response");
|
||||
|
||||
nh = nua_handle(nua, NULL, TAG_END());
|
||||
nua_register(nh, TAG_END());
|
||||
|
||||
mark_point();
|
||||
|
||||
m = s2_wait_for_request(SIP_METHOD_REGISTER);
|
||||
fail_if(!m);
|
||||
fail_if(!m->sip->sip_contact || m->sip->sip_contact->m_next);
|
||||
|
||||
s2_respond_to(m, NULL,
|
||||
400, "Bad Contact",
|
||||
SIPTAG_VIA(natted_via(m)),
|
||||
TAG_END());
|
||||
s2_free_message(m);
|
||||
|
||||
s2_check_event(nua_r_register, 100);
|
||||
|
||||
m = s2_wait_for_request(SIP_METHOD_REGISTER);
|
||||
fail_if(!m);
|
||||
s2_save_register(m);
|
||||
|
||||
s2_respond_to(m, NULL,
|
||||
SIP_200_OK,
|
||||
SIPTAG_CONTACT(s2->registration->contact),
|
||||
SIPTAG_VIA(natted_via(m)),
|
||||
TAG_END());
|
||||
s2_free_message(m);
|
||||
|
||||
fail_unless(s2->registration->contact != NULL);
|
||||
fail_if(s2->registration->contact->m_next != NULL);
|
||||
s2_check_event(nua_r_register, 200);
|
||||
|
||||
s2->registration->nh = nh;
|
||||
|
||||
s2_register_teardown();
|
||||
|
||||
} END_TEST
|
||||
|
||||
|
||||
/* ---------------------------------------------------------------------- */
|
||||
|
||||
START_TEST(register_1_3_1)
|
||||
{
|
||||
nua_handle_t *nh;
|
||||
struct message *m;
|
||||
|
||||
s2_case("1.3.1", "Register over TCP via NAT",
|
||||
"REGISTER via TCP, detect NTA, re-REGISTER");
|
||||
|
||||
nh = nua_handle(nua, NULL, TAG_END());
|
||||
|
||||
nua_register(nh, NUTAG_PROXY(s2->tcp.contact->m_url), TAG_END());
|
||||
|
||||
m = s2_wait_for_request(SIP_METHOD_REGISTER);
|
||||
fail_if(!m); fail_if(!m->sip->sip_contact || m->sip->sip_contact->m_next);
|
||||
fail_if(!tport_is_tcp(m->tport));
|
||||
s2_save_register(m);
|
||||
|
||||
s2_respond_to(m, NULL,
|
||||
SIP_200_OK,
|
||||
SIPTAG_CONTACT(s2->registration->contact),
|
||||
SIPTAG_VIA(natted_via(m)),
|
||||
TAG_END());
|
||||
s2_free_message(m);
|
||||
|
||||
assert(s2->registration->contact != NULL);
|
||||
s2_check_event(nua_r_register, 100);
|
||||
|
||||
m = s2_wait_for_request(SIP_METHOD_REGISTER);
|
||||
fail_if(!m);
|
||||
fail_if(!m->sip->sip_contact || !m->sip->sip_contact->m_next);
|
||||
s2_save_register(m);
|
||||
|
||||
s2_respond_to(m, NULL,
|
||||
SIP_200_OK,
|
||||
SIPTAG_CONTACT(s2->registration->contact),
|
||||
SIPTAG_VIA(natted_via(m)),
|
||||
TAG_END());
|
||||
s2_free_message(m);
|
||||
|
||||
fail_unless(s2->registration->contact != NULL);
|
||||
fail_if(s2->registration->contact->m_next != NULL);
|
||||
fail_unless(
|
||||
url_has_param(s2->registration->contact->m_url, "transport=tcp"));
|
||||
s2_check_event(nua_r_register, 200);
|
||||
|
||||
s2->registration->nh = nh;
|
||||
|
||||
s2_register_teardown();
|
||||
|
||||
} END_TEST
|
||||
|
||||
|
||||
START_TEST(register_1_3_2_1)
|
||||
{
|
||||
nua_handle_t *nh = nua_handle(nua, NULL, TAG_END());
|
||||
|
||||
s2_case("1.3.2.1", "Register behind NAT",
|
||||
"Authenticate, outbound activated");
|
||||
|
||||
mark_point();
|
||||
s2->registration->nh = nh;
|
||||
make_auth_natted_register(nh, NUTAG_PROXY(s2->tcp.contact->m_url), TAG_END());
|
||||
fail_if(!tport_is_tcp(s2->registration->tport));
|
||||
s2_register_teardown();
|
||||
}
|
||||
END_TEST
|
||||
|
||||
|
||||
START_TEST(register_1_3_2_2)
|
||||
{
|
||||
nua_handle_t *nh = nua_handle(nua, NULL, TAG_END());
|
||||
struct message *m;
|
||||
|
||||
s2_case("1.3.2.2", "Register behind NAT with TCP",
|
||||
"Detect NAT over TCP using rport. "
|
||||
"Authenticate, detect NAT, "
|
||||
"close TCP at server, wait for re-REGISTERs.");
|
||||
|
||||
nua_set_params(nua, NTATAG_TCP_RPORT(1), TAG_END());
|
||||
s2_check_event(nua_r_set_params, 200);
|
||||
|
||||
mark_point();
|
||||
s2->registration->nh = nh;
|
||||
make_auth_natted_register(
|
||||
nh, NUTAG_PROXY(s2->tcp.contact->m_url),
|
||||
NUTAG_OUTBOUND("no-options-keepalive, no-validate"),
|
||||
TAG_END());
|
||||
fail_if(!tport_is_tcp(s2->registration->tport));
|
||||
tport_shutdown(s2->registration->tport, 2);
|
||||
|
||||
m = s2_wait_for_request(SIP_METHOD_REGISTER);
|
||||
fail_if(!m); fail_if(!m->sip->sip_authorization);
|
||||
s2_save_register(m);
|
||||
|
||||
s2_respond_to(m, NULL,
|
||||
SIP_200_OK,
|
||||
SIPTAG_CONTACT(s2->registration->contact),
|
||||
SIPTAG_VIA(natted_via(m)),
|
||||
TAG_END());
|
||||
s2_free_message(m);
|
||||
|
||||
/* The "NAT binding" changed when new TCP connection is established */
|
||||
/* => NUA re-REGISTERs with newly detected contact */
|
||||
s2_check_event(nua_r_register, 100);
|
||||
|
||||
m = s2_wait_for_request(SIP_METHOD_REGISTER);
|
||||
fail_if(!m); fail_if(!m->sip->sip_authorization);
|
||||
fail_if(!m->sip->sip_contact || !m->sip->sip_contact->m_next);
|
||||
s2_save_register(m);
|
||||
|
||||
s2_respond_to(m, NULL,
|
||||
SIP_200_OK,
|
||||
SIPTAG_CONTACT(s2->registration->contact),
|
||||
SIPTAG_VIA(natted_via(m)),
|
||||
TAG_END());
|
||||
s2_free_message(m);
|
||||
|
||||
s2_check_event(nua_r_register, 200);
|
||||
|
||||
fail_unless(s2->registration->contact != NULL);
|
||||
fail_if(s2->registration->contact->m_next != NULL);
|
||||
|
||||
s2_register_teardown();
|
||||
}
|
||||
END_TEST
|
||||
|
||||
START_TEST(register_1_3_3_1)
|
||||
{
|
||||
nua_handle_t *nh = nua_handle(nua, NULL, TAG_END());
|
||||
struct message *m;
|
||||
tport_t *tcp;
|
||||
|
||||
s2_case("1.3.3.1", "Register behind NAT with UDP and TCP",
|
||||
"Register with UDP, UDP time-outing, then w/ TCP using rport. ");
|
||||
|
||||
nua_set_params(nua, NTATAG_TCP_RPORT(1), TAG_END());
|
||||
s2_check_event(nua_r_set_params, 200);
|
||||
|
||||
mark_point();
|
||||
s2->registration->nh = nh;
|
||||
|
||||
nua_register(nh,
|
||||
NUTAG_OUTBOUND("no-options-keepalive, no-validate"),
|
||||
TAG_END());
|
||||
|
||||
/* NTA tries with UDP, we drop them */
|
||||
for (;;) {
|
||||
m = s2_wait_for_request(SIP_METHOD_REGISTER); fail_if(!m);
|
||||
if (!tport_is_udp(m->tport)) /* Drop UDP */
|
||||
break;
|
||||
s2_free_message(m);
|
||||
s2_fast_forward(4);
|
||||
}
|
||||
|
||||
tcp = tport_ref(m->tport);
|
||||
|
||||
/* Respond to request over TCP */
|
||||
s2_respond_to(m, NULL,
|
||||
SIP_401_UNAUTHORIZED,
|
||||
SIPTAG_WWW_AUTHENTICATE_STR(s2_auth_digest_str),
|
||||
SIPTAG_VIA(natted_via(m)),
|
||||
TAG_END());
|
||||
s2_free_message(m);
|
||||
s2_check_event(nua_r_register, 401);
|
||||
nua_authenticate(nh, NUTAG_AUTH(s2_auth_credentials), TAG_END());
|
||||
|
||||
/* Turn off pong */
|
||||
tport_set_params(tcp, TPTAG_PONG2PING(0), TAG_END());
|
||||
|
||||
/* Now request over UDP ... registering TCP contact! */
|
||||
m = s2_wait_for_request(SIP_METHOD_REGISTER);
|
||||
fail_if(!m); fail_if(!m->sip->sip_authorization);
|
||||
s2_save_register(m);
|
||||
fail_unless(
|
||||
url_has_param(s2->registration->contact->m_url, "transport=tcp"));
|
||||
s2_respond_to(m, NULL,
|
||||
SIP_200_OK,
|
||||
SIPTAG_CONTACT(s2->registration->contact),
|
||||
SIPTAG_VIA(natted_via(m)),
|
||||
TAG_END());
|
||||
s2_free_message(m);
|
||||
|
||||
/* NUA detects oops... re-registers UDP */
|
||||
s2_check_event(nua_r_register, 100);
|
||||
|
||||
m = s2_wait_for_request(SIP_METHOD_REGISTER);
|
||||
fail_if(!m); fail_if(!m->sip->sip_authorization);
|
||||
fail_if(!m->sip->sip_contact || !m->sip->sip_contact->m_next);
|
||||
s2_save_register(m);
|
||||
|
||||
s2_respond_to(m, NULL,
|
||||
SIP_200_OK,
|
||||
SIPTAG_CONTACT(s2->registration->contact),
|
||||
SIPTAG_VIA(natted_via(m)),
|
||||
TAG_END());
|
||||
s2_free_message(m);
|
||||
|
||||
s2_check_event(nua_r_register, 200);
|
||||
|
||||
fail_unless(s2->registration->contact != NULL);
|
||||
fail_if(s2->registration->contact->m_next != NULL);
|
||||
|
||||
/* Wait until ping-pong failure closes the TCP connection */
|
||||
{
|
||||
int i;
|
||||
for (i = 0; i < 5; i++) {
|
||||
su_root_step(s2->root, 5);
|
||||
su_root_step(s2->root, 5);
|
||||
su_root_step(s2->root, 5);
|
||||
s2_fast_forward(5);
|
||||
}
|
||||
}
|
||||
|
||||
s2_register_teardown();
|
||||
}
|
||||
END_TEST
|
||||
|
||||
/* ---------------------------------------------------------------------- */
|
||||
|
||||
TCase *register_tcase(void)
|
||||
{
|
||||
TCase *tc = tcase_create("1 - REGISTER");
|
||||
/* Each testcase is run in different process */
|
||||
tcase_add_checked_fixture(tc, register_setup, register_teardown);
|
||||
{
|
||||
tcase_add_test(tc, register_1_0_1);
|
||||
tcase_add_test(tc, register_1_1_1);
|
||||
tcase_add_test(tc, register_1_1_2);
|
||||
tcase_add_test(tc, register_1_2_1);
|
||||
tcase_add_test(tc, register_1_2_2_1);
|
||||
tcase_add_test(tc, register_1_2_2_2);
|
||||
tcase_add_test(tc, register_1_2_2_3);
|
||||
tcase_add_test(tc, register_1_2_3);
|
||||
tcase_add_test(tc, register_1_3_1);
|
||||
tcase_add_test(tc, register_1_3_2_1);
|
||||
tcase_add_test(tc, register_1_3_2_2);
|
||||
}
|
||||
tcase_set_timeout(tc, 5);
|
||||
return tc;
|
||||
}
|
||||
|
||||
TCase *pingpong_tcase(void)
|
||||
{
|
||||
TCase *tc = tcase_create("1 - REGISTER with PingPong");
|
||||
/* Each testcase is run in different process */
|
||||
tcase_add_checked_fixture(tc, register_pingpong_setup, register_teardown);
|
||||
{
|
||||
tcase_add_test(tc, register_1_3_3_1);
|
||||
}
|
||||
tcase_set_timeout(tc, 5);
|
||||
return tc;
|
||||
}
|
||||
|
||||
void check_register_cases(Suite *suite)
|
||||
{
|
||||
suite_add_tcase(suite, register_tcase());
|
||||
suite_add_tcase(suite, pingpong_tcase());
|
||||
}
|
||||
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
|
@ -0,0 +1,174 @@
|
|||
/*
|
||||
* This file is part of the Sofia-SIP package
|
||||
*
|
||||
* Copyright (C) 2008 Nokia Corporation.
|
||||
*
|
||||
* Contact: Pekka Pessi <pekka.pessi@nokia.com>
|
||||
*
|
||||
* This library is free software; you can redistribute it and/or
|
||||
* modify it under the terms of the GNU Lesser General Public License
|
||||
* as published by the Free Software Foundation; either version 2.1 of
|
||||
* the License, or (at your option) any later version.
|
||||
*
|
||||
* This library is distributed in the hope that it will be useful, but
|
||||
* WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||
* Lesser General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU Lesser General Public
|
||||
* License along with this library; if not, write to the Free Software
|
||||
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
|
||||
* 02110-1301 USA
|
||||
*/
|
||||
|
||||
#ifndef S2TESTER_H
|
||||
#define S2TESTER_H
|
||||
|
||||
#define TP_STACK_T struct tester
|
||||
#define SU_ROOT_MAGIC_T struct tester
|
||||
|
||||
#include <sofia-sip/su_wait.h>
|
||||
#include <sofia-sip/sip.h>
|
||||
#include <sofia-sip/tport.h>
|
||||
#include <sofia-sip/nua.h>
|
||||
|
||||
struct tester
|
||||
{
|
||||
su_home_t home[1];
|
||||
|
||||
su_root_t *root;
|
||||
msg_mclass_t const *mclass;
|
||||
int flags;
|
||||
|
||||
char const *hostname;
|
||||
tport_t *master;
|
||||
|
||||
sip_to_t *local;
|
||||
sip_contact_t *contact;
|
||||
struct {
|
||||
sip_contact_t *contact;
|
||||
tport_t *tport;
|
||||
} udp, tcp, tls;
|
||||
|
||||
struct message {
|
||||
struct message *next, **prev;
|
||||
msg_t *msg;
|
||||
sip_t *sip;
|
||||
tport_t *tport;
|
||||
su_time_t when;
|
||||
} *received;
|
||||
|
||||
struct {
|
||||
su_socket_t socket;
|
||||
su_wait_t wait[1];
|
||||
int reg;
|
||||
} dns;
|
||||
|
||||
nua_t *nua;
|
||||
|
||||
struct event {
|
||||
struct event *next, **prev;
|
||||
nua_saved_event_t event[1];
|
||||
nua_handle_t *nh;
|
||||
nua_event_data_t const *data;
|
||||
su_time_t when;
|
||||
} *events;
|
||||
|
||||
struct {
|
||||
nua_handle_t *nh;
|
||||
sip_to_t *aor;
|
||||
sip_contact_t *contact;
|
||||
tport_t *tport;
|
||||
} registration[1];
|
||||
|
||||
unsigned long tid;
|
||||
|
||||
/* Settings */
|
||||
int server_uses_rport;
|
||||
};
|
||||
|
||||
struct dialog
|
||||
{
|
||||
su_home_t home[1];
|
||||
sip_from_t *local;
|
||||
sip_to_t *remote;
|
||||
sip_call_id_t *call_id;
|
||||
uint32_t lseq, rseq;
|
||||
sip_contact_t *target;
|
||||
sip_route_t *route;
|
||||
sip_contact_t *contact;
|
||||
|
||||
tport_t *tport;
|
||||
msg_t *invite; /* latest invite sent */
|
||||
};
|
||||
|
||||
extern struct tester *s2;
|
||||
extern tp_stack_class_t const s2_stack[1];
|
||||
|
||||
extern unsigned s2_default_registration_duration;
|
||||
extern char const s2_auth_digest_str[];
|
||||
extern char const s2_auth_credentials[];
|
||||
|
||||
extern char const s2_auth2_digest_str[];
|
||||
extern char const s2_auth2_credentials[];
|
||||
|
||||
extern char const s2_auth3_digest_str[];
|
||||
extern char const s2_auth3_credentials[];
|
||||
|
||||
void s2_fast_forward(unsigned long seconds);
|
||||
|
||||
void s2_case(char const *tag,
|
||||
char const *title,
|
||||
char const *description);
|
||||
|
||||
struct event *s2_remove_event(struct event *);
|
||||
void s2_free_event(struct event *);
|
||||
void s2_flush_events(void);
|
||||
|
||||
struct event *s2_next_event(void);
|
||||
struct event *s2_wait_for_event(nua_event_t event, int status);
|
||||
int s2_check_event(nua_event_t event, int status);
|
||||
int s2_check_callstate(enum nua_callstate state);
|
||||
|
||||
struct message *s2_remove_message(struct message *m);
|
||||
void s2_free_message(struct message *m);
|
||||
void s2_flush_messages(void);
|
||||
|
||||
struct message *s2_next_response(void);
|
||||
struct message *s2_wait_for_response(int status, sip_method_t , char const *);
|
||||
int s2_check_response(int status, sip_method_t method, char const *name);
|
||||
|
||||
struct message *s2_next_request(void);
|
||||
struct message *s2_wait_for_request(sip_method_t method, char const *name);
|
||||
int s2_check_request(sip_method_t method, char const *name);
|
||||
|
||||
#define SIP_METHOD_UNKNOWN sip_method_unknown, NULL
|
||||
|
||||
struct message *s2_respond_to(struct message *m, struct dialog *d,
|
||||
int status, char const *phrase,
|
||||
tag_type_t tag, tag_value_t value, ...);
|
||||
|
||||
int s2_request_to(struct dialog *d,
|
||||
sip_method_t method, char const *name,
|
||||
tport_t *tport,
|
||||
tag_type_t tag, tag_value_t value, ...);
|
||||
|
||||
int s2_update_dialog(struct dialog *d, struct message *response);
|
||||
|
||||
int s2_save_register(struct message *m);
|
||||
|
||||
void s2_flush_all(void);
|
||||
|
||||
void s2_setup_base(char const *hostname);
|
||||
void s2_setup_logs(int level);
|
||||
void s2_setup_tport(char const * const *protocols,
|
||||
tag_type_t tag, tag_value_t value, ...);
|
||||
void s2_teardown(void);
|
||||
|
||||
nua_t *s2_nua_setup(tag_type_t tag, tag_value_t value, ...);
|
||||
void s2_nua_teardown(void);
|
||||
|
||||
void s2_register_setup(void);
|
||||
void s2_register_teardown(void);
|
||||
|
||||
#endif
|
Loading…
Reference in New Issue