complete r8400 commit

git-svn-id: http://svn.freeswitch.org/svn/freeswitch/trunk@8406 d0543943-73ff-0310-b7d9-9358b9ac24b2
This commit is contained in:
Michael Jerris 2008-05-14 19:10:54 +00:00
parent deba14a301
commit dd9f6af78d
29 changed files with 4203 additions and 0 deletions

View File

@ -0,0 +1,120 @@
/*
* This file is part of the Sofia-SIP package
*
* Copyright (C) 2007 Nokia Corporation.
*
* Contact: Pekka Pessi <pekka.pessi@nokia.com>
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public License
* as published by the Free Software Foundation; either version 2.1 of
* the License, or (at your option) any later version.
*
* This library is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this library; if not, write to the Free Software
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
* 02110-1301 USA
*
*/
/**@CFILE check2_sofia.c
*
* @brief Check-driven tester for Sofia SIP User Agent library
*
* @author Pekka Pessi <Pekka.Pessi@nokia.com>
*
* @copyright (C) 2007 Nokia Corporation.
*/
#include "config.h"
#include "check_nua.h"
#include <stdlib.h>
#include <string.h>
#include <stdio.h>
#if HAVE_FNMATCH_H
#include <fnmatch.h>
#endif
static char const * const default_patterns[] = { "*", NULL };
static char const * const *test_patterns = default_patterns;
void check_nua_tcase_add_test(TCase *tc, TFun tf, char const *name)
{
char const * const *patterns;
#if HAVE_FNMATCH_H
for (patterns = test_patterns; *patterns; patterns++) {
if (!fnmatch(*patterns, name, 0)) {
if (strcmp(*patterns, "*")) {
printf("%s: match with %s\n", name, *patterns);
}
_tcase_add_test(tc, tf, name, 0, 0, 1);
return;
}
}
#else
for (patterns = test_patterns; *patterns; patterns++) {
if (!strcmp(*patterns, name) || !strcmp(*patterns, "*")) {
if (strcmp(*patterns, "*")) {
printf("%s: match with %s\n", name, *patterns);
}
_tcase_add_test(tc, tf, name, 0, 0, 1);
return;
}
}
#endif
printf("%s: no match\n", name);
}
int main(int argc, char *argv[])
{
int failed = 0;
Suite *suite = suite_create("Unit tests for Sofia-SIP UA Engine");
SRunner *runner;
if (getenv("CHECK_NUA_CASES")) {
size_t i;
char *s, **patterns;
char *cases = strdup(getenv("CHECK_NUA_CASES"));
/* Count commas */
for (i = 2, s = cases; (s = strchr(s, ',')); s++, i++);
patterns = calloc(i, sizeof *patterns);
for (i = 0, s = cases;; i++) {
patterns[i] = s;
if (s == NULL)
break;
s = strchr(s, ',');
if (s)
*s++ = '\0';
}
test_patterns = (char const * const *)patterns;
}
check_register_cases(suite);
check_session_cases(suite);
runner = srunner_create(suite);
if (argv[1]) {
srunner_set_xml(runner, argv[1]);
}
srunner_run_all(runner, CK_ENV);
failed = srunner_ntests_failed(runner);
srunner_free(runner);
exit(failed ? EXIT_FAILURE : EXIT_SUCCESS);
}

View File

@ -0,0 +1,15 @@
#ifndef CHECK_NUA_H
#include <check.h>
#undef tcase_add_test
#define tcase_add_test(tc, tf) \
check_nua_tcase_add_test(tc, tf, "" #tf "")
void check_nua_tcase_add_test(TCase *, TFun, char const *name);
void check_session_cases(Suite *suite);
void check_register_cases(Suite *suite);
#endif

View File

@ -0,0 +1,741 @@
/*
* This file is part of the Sofia-SIP package
*
* Copyright (C) 2008 Nokia Corporation.
*
* Contact: Pekka Pessi <pekka.pessi@nokia.com>
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public License
* as published by the Free Software Foundation; either version 2.1 of
* the License, or (at your option) any later version.
*
* This library is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this library; if not, write to the Free Software
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
* 02110-1301 USA
*
*/
/**@CFILE check_register.c
*
* @brief Check-driven tester for Sofia SIP User Agent library
*
* @author Pekka Pessi <Pekka.Pessi@nokia.com>
*
* @copyright (C) 2008 Nokia Corporation.
*/
#include "config.h"
#include "check_nua.h"
#include "test_s2.h"
#include <sofia-sip/sip_status.h>
#include <sofia-sip/sip_header.h>
#include <sofia-sip/soa.h>
#include <sofia-sip/su_tagarg.h>
#include <sofia-sip/su_tag_io.h>
#include <sofia-sip/su_log.h>
#include <stdlib.h>
#include <string.h>
#include <assert.h>
SOFIAPUBVAR su_log_t tport_log[];
static nua_t *nua;
static void register_setup(void)
{
nua = s2_nua_setup(TAG_END());
}
static void register_pingpong_setup(void)
{
nua = s2_nua_setup(TPTAG_PINGPONG(20000),
TPTAG_KEEPALIVE(10000),
TAG_END());
tport_set_params(s2->tcp.tport, TPTAG_PONG2PING(1), TAG_END());
}
static void register_teardown(void)
{
nua_shutdown(nua);
fail_unless(s2_check_event(nua_r_shutdown, 200));
s2_nua_teardown();
}
/* ---------------------------------------------------------------------- */
START_TEST(register_1_0_1)
{
nua_handle_t *nh = nua_handle(nua, NULL, TAG_END());
struct message *m;
s2_case("1.0.1", "Failed Register", "REGISTER returned 403 response");
nua_register(nh, TAG_END());
fail_unless((m = s2_wait_for_request(SIP_METHOD_REGISTER)) != NULL, NULL);
s2_respond_to(m, NULL,
SIP_403_FORBIDDEN,
TAG_END());
s2_free_message(m);
nua_handle_destroy(nh);
} END_TEST
START_TEST(register_1_1_1)
{
s2_case("1.1.1", "Basic Register", "REGISTER returning 200 OK");
s2_register_setup();
s2_register_teardown();
} END_TEST
START_TEST(register_1_1_2)
{
nua_handle_t *nh;
struct message *m;
s2_case("1.1.2", "Register with dual authentication",
"Register, authenticate");
nh = nua_handle(nua, NULL, TAG_END());
nua_register(nh, TAG_END());
m = s2_wait_for_request(SIP_METHOD_REGISTER); fail_if(!m);
s2_respond_to(m, NULL,
SIP_407_PROXY_AUTH_REQUIRED,
SIPTAG_PROXY_AUTHENTICATE_STR(s2_auth_digest_str),
TAG_END());
s2_free_message(m);
s2_check_event(nua_r_register, 407);
nua_authenticate(nh, NUTAG_AUTH(s2_auth_credentials), TAG_END());
m = s2_wait_for_request(SIP_METHOD_REGISTER); fail_if(!m);
s2_respond_to(m, NULL,
SIP_401_UNAUTHORIZED,
SIPTAG_WWW_AUTHENTICATE_STR(s2_auth2_digest_str),
SIPTAG_PROXY_AUTHENTICATE_STR(s2_auth_digest_str),
TAG_END());
s2_free_message(m);
s2_check_event(nua_r_register, 401);
nua_authenticate(nh, NUTAG_AUTH(s2_auth2_credentials), TAG_END());
m = s2_wait_for_request(SIP_METHOD_REGISTER);
fail_if(!m);
fail_if(!m->sip->sip_authorization);
fail_if(!m->sip->sip_proxy_authorization);
s2_save_register(m);
s2_respond_to(m, NULL,
SIP_200_OK,
SIPTAG_CONTACT(s2->registration->contact),
TAG_END());
s2_free_message(m);
assert(s2->registration->contact != NULL);
s2_check_event(nua_r_register, 200);
s2->registration->nh = nh;
s2_register_teardown();
} END_TEST
/* ---------------------------------------------------------------------- */
static char const *receive_natted = "received=4.255.255.9";
/* Return Via that looks very natted */
static sip_via_t *natted_via(struct message *m)
{
su_home_t *h;
sip_via_t *via;
h = msg_home(m->msg);
via = sip_via_dup(h, m->sip->sip_via);
msg_header_replace_param(h, via->v_common, receive_natted);
if (via->v_protocol == sip_transport_udp)
msg_header_replace_param(h, via->v_common, "rport=9");
if (via->v_protocol == sip_transport_tcp && via->v_rport) {
tp_name_t const *tpn = tport_name(m->tport);
char *rport = su_sprintf(h, "rport=%s", tpn->tpn_port);
msg_header_replace_param(h, via->v_common, rport);
}
return via;
}
/* ---------------------------------------------------------------------- */
START_TEST(register_1_2_1) {
nua_handle_t *nh;
struct message *m;
s2_case("1.2.1", "Register behind NAT",
"Register through NAT, detect NAT, re-REGISTER");
nh = nua_handle(nua, NULL, TAG_END());
nua_register(nh, TAG_END());
m = s2_wait_for_request(SIP_METHOD_REGISTER);
fail_if(!m);
fail_if(!m->sip->sip_contact || m->sip->sip_contact->m_next);
s2_save_register(m);
s2_respond_to(m, NULL,
SIP_200_OK,
SIPTAG_CONTACT(s2->registration->contact),
SIPTAG_VIA(natted_via(m)),
TAG_END());
s2_free_message(m);
assert(s2->registration->contact != NULL);
s2_check_event(nua_r_register, 100);
m = s2_wait_for_request(SIP_METHOD_REGISTER);
fail_if(!m);
fail_if(!m->sip->sip_contact || !m->sip->sip_contact->m_next);
s2_save_register(m);
s2_respond_to(m, NULL,
SIP_200_OK,
SIPTAG_CONTACT(s2->registration->contact),
SIPTAG_VIA(natted_via(m)),
TAG_END());
s2_free_message(m);
fail_unless(s2->registration->contact != NULL);
fail_if(s2->registration->contact->m_next != NULL);
s2_check_event(nua_r_register, 200);
s2->registration->nh = nh;
s2_register_teardown();
} END_TEST
static nua_handle_t *make_auth_natted_register(
nua_handle_t *nh,
tag_type_t tag, tag_value_t value, ...)
{
struct message *m;
ta_list ta;
ta_start(ta, tag, value);
nua_register(nh, ta_tags(ta));
ta_end(ta);
m = s2_wait_for_request(SIP_METHOD_REGISTER); fail_if(!m);
s2_respond_to(m, NULL,
SIP_401_UNAUTHORIZED,
SIPTAG_WWW_AUTHENTICATE_STR(s2_auth_digest_str),
SIPTAG_VIA(natted_via(m)),
TAG_END());
s2_free_message(m);
s2_check_event(nua_r_register, 401);
nua_authenticate(nh, NUTAG_AUTH(s2_auth_credentials), TAG_END());
m = s2_wait_for_request(SIP_METHOD_REGISTER);
fail_if(!m);
fail_if(!m->sip->sip_authorization);
s2_save_register(m);
s2_respond_to(m, NULL,
SIP_200_OK,
SIPTAG_CONTACT(s2->registration->contact),
SIPTAG_VIA(natted_via(m)),
TAG_END());
s2_free_message(m);
assert(s2->registration->contact != NULL);
s2_check_event(nua_r_register, 200);
return nh;
}
START_TEST(register_1_2_2_1)
{
nua_handle_t *nh = nua_handle(nua, NULL, TAG_END());
s2_case("1.2.2.1", "Register behind NAT",
"Authenticate, outbound activated");
mark_point();
make_auth_natted_register(nh, TAG_END());
s2->registration->nh = nh;
s2_register_teardown();
}
END_TEST
START_TEST(register_1_2_2_2)
{
nua_handle_t *nh = nua_handle(nua, NULL, TAG_END());
struct message *m;
s2_case("1.2.2.2", "Register behind NAT",
"Authenticate, outbound activated, "
"authenticate OPTIONS probe, "
"NAT binding change");
mark_point();
make_auth_natted_register(nh, TAG_END());
s2->registration->nh = nh;
mark_point();
m = s2_wait_for_request(SIP_METHOD_OPTIONS);
fail_if(!m);
s2_respond_to(m, NULL,
SIP_407_PROXY_AUTH_REQUIRED,
SIPTAG_VIA(natted_via(m)),
SIPTAG_PROXY_AUTHENTICATE_STR(s2_auth_digest_str),
TAG_END());
s2_free_message(m);
mark_point();
m = s2_wait_for_request(SIP_METHOD_OPTIONS);
fail_if(!m); fail_if(!m->sip->sip_proxy_authorization);
s2_respond_to(m, NULL,
SIP_200_OK,
SIPTAG_VIA(natted_via(m)),
TAG_END());
s2_free_message(m);
su_root_step(s2->root, 20); su_root_step(s2->root, 20);
s2_fast_forward(120); /* Default keepalive interval */
mark_point();
m = s2_wait_for_request(SIP_METHOD_OPTIONS);
s2_respond_to(m, NULL,
SIP_200_OK,
SIPTAG_VIA(natted_via(m)),
TAG_END());
s2_free_message(m);
su_root_step(s2->root, 20); su_root_step(s2->root, 20);
s2_fast_forward(120); /* Default keepalive interval */
mark_point();
receive_natted = "received=4.255.255.10";
m = s2_wait_for_request(SIP_METHOD_OPTIONS);
s2_respond_to(m, NULL,
SIP_200_OK,
SIPTAG_VIA(natted_via(m)),
TAG_END());
s2_free_message(m);
s2_check_event(nua_i_outbound, 0);
m = s2_wait_for_request(SIP_METHOD_REGISTER);
fail_if(!m); fail_if(!m->sip->sip_authorization);
fail_if(!m->sip->sip_contact || !m->sip->sip_contact->m_next);
s2_save_register(m);
s2_respond_to(m, NULL,
SIP_200_OK,
SIPTAG_CONTACT(s2->registration->contact),
SIPTAG_VIA(natted_via(m)),
TAG_END());
s2_free_message(m);
s2_check_event(nua_r_register, 200);
fail_unless(s2->registration->contact != NULL);
fail_if(s2->registration->contact->m_next != NULL);
s2_register_teardown();
} END_TEST
START_TEST(register_1_2_2_3)
{
nua_handle_t *nh = nua_handle(nua, NULL, TAG_END());
struct message *m;
s2_case("1.2.2.3", "Register behind NAT",
"Authenticate, outbound activated, "
"detect NAT binding change when re-REGISTERing");
mark_point();
make_auth_natted_register(nh,
NUTAG_OUTBOUND("no-options-keepalive"),
TAG_END());
s2->registration->nh = nh;
receive_natted = "received=4.255.255.10";
s2_fast_forward(3600);
mark_point();
m = s2_wait_for_request(SIP_METHOD_REGISTER);
fail_if(!m); fail_if(!m->sip->sip_authorization);
s2_save_register(m);
s2_respond_to(m, NULL,
SIP_200_OK,
SIPTAG_CONTACT(s2->registration->contact),
SIPTAG_VIA(natted_via(m)),
TAG_END());
s2_free_message(m);
s2_check_event(nua_r_register, 100);
m = s2_wait_for_request(SIP_METHOD_REGISTER);
fail_if(!m); fail_if(!m->sip->sip_authorization);
fail_if(!m->sip->sip_contact || !m->sip->sip_contact->m_next);
s2_save_register(m);
s2_respond_to(m, NULL,
SIP_200_OK,
SIPTAG_CONTACT(s2->registration->contact),
SIPTAG_VIA(natted_via(m)),
TAG_END());
s2_free_message(m);
fail_unless(s2->registration->contact != NULL);
fail_if(s2->registration->contact->m_next != NULL);
s2_check_event(nua_r_register, 200);
s2_register_teardown();
} END_TEST
START_TEST(register_1_2_3) {
nua_handle_t *nh;
struct message *m;
s2_case("1.2.3", "Register behind NAT",
"Outbound activated by error response");
nh = nua_handle(nua, NULL, TAG_END());
nua_register(nh, TAG_END());
mark_point();
m = s2_wait_for_request(SIP_METHOD_REGISTER);
fail_if(!m);
fail_if(!m->sip->sip_contact || m->sip->sip_contact->m_next);
s2_respond_to(m, NULL,
400, "Bad Contact",
SIPTAG_VIA(natted_via(m)),
TAG_END());
s2_free_message(m);
s2_check_event(nua_r_register, 100);
m = s2_wait_for_request(SIP_METHOD_REGISTER);
fail_if(!m);
s2_save_register(m);
s2_respond_to(m, NULL,
SIP_200_OK,
SIPTAG_CONTACT(s2->registration->contact),
SIPTAG_VIA(natted_via(m)),
TAG_END());
s2_free_message(m);
fail_unless(s2->registration->contact != NULL);
fail_if(s2->registration->contact->m_next != NULL);
s2_check_event(nua_r_register, 200);
s2->registration->nh = nh;
s2_register_teardown();
} END_TEST
/* ---------------------------------------------------------------------- */
START_TEST(register_1_3_1)
{
nua_handle_t *nh;
struct message *m;
s2_case("1.3.1", "Register over TCP via NAT",
"REGISTER via TCP, detect NTA, re-REGISTER");
nh = nua_handle(nua, NULL, TAG_END());
nua_register(nh, NUTAG_PROXY(s2->tcp.contact->m_url), TAG_END());
m = s2_wait_for_request(SIP_METHOD_REGISTER);
fail_if(!m); fail_if(!m->sip->sip_contact || m->sip->sip_contact->m_next);
fail_if(!tport_is_tcp(m->tport));
s2_save_register(m);
s2_respond_to(m, NULL,
SIP_200_OK,
SIPTAG_CONTACT(s2->registration->contact),
SIPTAG_VIA(natted_via(m)),
TAG_END());
s2_free_message(m);
assert(s2->registration->contact != NULL);
s2_check_event(nua_r_register, 100);
m = s2_wait_for_request(SIP_METHOD_REGISTER);
fail_if(!m);
fail_if(!m->sip->sip_contact || !m->sip->sip_contact->m_next);
s2_save_register(m);
s2_respond_to(m, NULL,
SIP_200_OK,
SIPTAG_CONTACT(s2->registration->contact),
SIPTAG_VIA(natted_via(m)),
TAG_END());
s2_free_message(m);
fail_unless(s2->registration->contact != NULL);
fail_if(s2->registration->contact->m_next != NULL);
fail_unless(
url_has_param(s2->registration->contact->m_url, "transport=tcp"));
s2_check_event(nua_r_register, 200);
s2->registration->nh = nh;
s2_register_teardown();
} END_TEST
START_TEST(register_1_3_2_1)
{
nua_handle_t *nh = nua_handle(nua, NULL, TAG_END());
s2_case("1.3.2.1", "Register behind NAT",
"Authenticate, outbound activated");
mark_point();
s2->registration->nh = nh;
make_auth_natted_register(nh, NUTAG_PROXY(s2->tcp.contact->m_url), TAG_END());
fail_if(!tport_is_tcp(s2->registration->tport));
s2_register_teardown();
}
END_TEST
START_TEST(register_1_3_2_2)
{
nua_handle_t *nh = nua_handle(nua, NULL, TAG_END());
struct message *m;
s2_case("1.3.2.2", "Register behind NAT with TCP",
"Detect NAT over TCP using rport. "
"Authenticate, detect NAT, "
"close TCP at server, wait for re-REGISTERs.");
nua_set_params(nua, NTATAG_TCP_RPORT(1), TAG_END());
s2_check_event(nua_r_set_params, 200);
mark_point();
s2->registration->nh = nh;
make_auth_natted_register(
nh, NUTAG_PROXY(s2->tcp.contact->m_url),
NUTAG_OUTBOUND("no-options-keepalive, no-validate"),
TAG_END());
fail_if(!tport_is_tcp(s2->registration->tport));
tport_shutdown(s2->registration->tport, 2);
m = s2_wait_for_request(SIP_METHOD_REGISTER);
fail_if(!m); fail_if(!m->sip->sip_authorization);
s2_save_register(m);
s2_respond_to(m, NULL,
SIP_200_OK,
SIPTAG_CONTACT(s2->registration->contact),
SIPTAG_VIA(natted_via(m)),
TAG_END());
s2_free_message(m);
/* The "NAT binding" changed when new TCP connection is established */
/* => NUA re-REGISTERs with newly detected contact */
s2_check_event(nua_r_register, 100);
m = s2_wait_for_request(SIP_METHOD_REGISTER);
fail_if(!m); fail_if(!m->sip->sip_authorization);
fail_if(!m->sip->sip_contact || !m->sip->sip_contact->m_next);
s2_save_register(m);
s2_respond_to(m, NULL,
SIP_200_OK,
SIPTAG_CONTACT(s2->registration->contact),
SIPTAG_VIA(natted_via(m)),
TAG_END());
s2_free_message(m);
s2_check_event(nua_r_register, 200);
fail_unless(s2->registration->contact != NULL);
fail_if(s2->registration->contact->m_next != NULL);
s2_register_teardown();
}
END_TEST
START_TEST(register_1_3_3_1)
{
nua_handle_t *nh = nua_handle(nua, NULL, TAG_END());
struct message *m;
tport_t *tcp;
s2_case("1.3.3.1", "Register behind NAT with UDP and TCP",
"Register with UDP, UDP time-outing, then w/ TCP using rport. ");
nua_set_params(nua, NTATAG_TCP_RPORT(1), TAG_END());
s2_check_event(nua_r_set_params, 200);
mark_point();
s2->registration->nh = nh;
nua_register(nh,
NUTAG_OUTBOUND("no-options-keepalive, no-validate"),
TAG_END());
/* NTA tries with UDP, we drop them */
for (;;) {
m = s2_wait_for_request(SIP_METHOD_REGISTER); fail_if(!m);
if (!tport_is_udp(m->tport)) /* Drop UDP */
break;
s2_free_message(m);
s2_fast_forward(4);
}
tcp = tport_ref(m->tport);
/* Respond to request over TCP */
s2_respond_to(m, NULL,
SIP_401_UNAUTHORIZED,
SIPTAG_WWW_AUTHENTICATE_STR(s2_auth_digest_str),
SIPTAG_VIA(natted_via(m)),
TAG_END());
s2_free_message(m);
s2_check_event(nua_r_register, 401);
nua_authenticate(nh, NUTAG_AUTH(s2_auth_credentials), TAG_END());
/* Turn off pong */
tport_set_params(tcp, TPTAG_PONG2PING(0), TAG_END());
/* Now request over UDP ... registering TCP contact! */
m = s2_wait_for_request(SIP_METHOD_REGISTER);
fail_if(!m); fail_if(!m->sip->sip_authorization);
s2_save_register(m);
fail_unless(
url_has_param(s2->registration->contact->m_url, "transport=tcp"));
s2_respond_to(m, NULL,
SIP_200_OK,
SIPTAG_CONTACT(s2->registration->contact),
SIPTAG_VIA(natted_via(m)),
TAG_END());
s2_free_message(m);
/* NUA detects oops... re-registers UDP */
s2_check_event(nua_r_register, 100);
m = s2_wait_for_request(SIP_METHOD_REGISTER);
fail_if(!m); fail_if(!m->sip->sip_authorization);
fail_if(!m->sip->sip_contact || !m->sip->sip_contact->m_next);
s2_save_register(m);
s2_respond_to(m, NULL,
SIP_200_OK,
SIPTAG_CONTACT(s2->registration->contact),
SIPTAG_VIA(natted_via(m)),
TAG_END());
s2_free_message(m);
s2_check_event(nua_r_register, 200);
fail_unless(s2->registration->contact != NULL);
fail_if(s2->registration->contact->m_next != NULL);
/* Wait until ping-pong failure closes the TCP connection */
{
int i;
for (i = 0; i < 5; i++) {
su_root_step(s2->root, 5);
su_root_step(s2->root, 5);
su_root_step(s2->root, 5);
s2_fast_forward(5);
}
}
s2_register_teardown();
}
END_TEST
/* ---------------------------------------------------------------------- */
TCase *register_tcase(void)
{
TCase *tc = tcase_create("1 - REGISTER");
/* Each testcase is run in different process */
tcase_add_checked_fixture(tc, register_setup, register_teardown);
{
tcase_add_test(tc, register_1_0_1);
tcase_add_test(tc, register_1_1_1);
tcase_add_test(tc, register_1_1_2);
tcase_add_test(tc, register_1_2_1);
tcase_add_test(tc, register_1_2_2_1);
tcase_add_test(tc, register_1_2_2_2);
tcase_add_test(tc, register_1_2_2_3);
tcase_add_test(tc, register_1_2_3);
tcase_add_test(tc, register_1_3_1);
tcase_add_test(tc, register_1_3_2_1);
tcase_add_test(tc, register_1_3_2_2);
}
tcase_set_timeout(tc, 5);
return tc;
}
TCase *pingpong_tcase(void)
{
TCase *tc = tcase_create("1 - REGISTER with PingPong");
/* Each testcase is run in different process */
tcase_add_checked_fixture(tc, register_pingpong_setup, register_teardown);
{
tcase_add_test(tc, register_1_3_3_1);
}
tcase_set_timeout(tc, 5);
return tc;
}
void check_register_cases(Suite *suite)
{
suite_add_tcase(suite, register_tcase());
suite_add_tcase(suite, pingpong_tcase());
}

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@ -0,0 +1,174 @@
/*
* This file is part of the Sofia-SIP package
*
* Copyright (C) 2008 Nokia Corporation.
*
* Contact: Pekka Pessi <pekka.pessi@nokia.com>
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public License
* as published by the Free Software Foundation; either version 2.1 of
* the License, or (at your option) any later version.
*
* This library is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this library; if not, write to the Free Software
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
* 02110-1301 USA
*/
#ifndef S2TESTER_H
#define S2TESTER_H
#define TP_STACK_T struct tester
#define SU_ROOT_MAGIC_T struct tester
#include <sofia-sip/su_wait.h>
#include <sofia-sip/sip.h>
#include <sofia-sip/tport.h>
#include <sofia-sip/nua.h>
struct tester
{
su_home_t home[1];
su_root_t *root;
msg_mclass_t const *mclass;
int flags;
char const *hostname;
tport_t *master;
sip_to_t *local;
sip_contact_t *contact;
struct {
sip_contact_t *contact;
tport_t *tport;
} udp, tcp, tls;
struct message {
struct message *next, **prev;
msg_t *msg;
sip_t *sip;
tport_t *tport;
su_time_t when;
} *received;
struct {
su_socket_t socket;
su_wait_t wait[1];
int reg;
} dns;
nua_t *nua;
struct event {
struct event *next, **prev;
nua_saved_event_t event[1];
nua_handle_t *nh;
nua_event_data_t const *data;
su_time_t when;
} *events;
struct {
nua_handle_t *nh;
sip_to_t *aor;
sip_contact_t *contact;
tport_t *tport;
} registration[1];
unsigned long tid;
/* Settings */
int server_uses_rport;
};
struct dialog
{
su_home_t home[1];
sip_from_t *local;
sip_to_t *remote;
sip_call_id_t *call_id;
uint32_t lseq, rseq;
sip_contact_t *target;
sip_route_t *route;
sip_contact_t *contact;
tport_t *tport;
msg_t *invite; /* latest invite sent */
};
extern struct tester *s2;
extern tp_stack_class_t const s2_stack[1];
extern unsigned s2_default_registration_duration;
extern char const s2_auth_digest_str[];
extern char const s2_auth_credentials[];
extern char const s2_auth2_digest_str[];
extern char const s2_auth2_credentials[];
extern char const s2_auth3_digest_str[];
extern char const s2_auth3_credentials[];
void s2_fast_forward(unsigned long seconds);
void s2_case(char const *tag,
char const *title,
char const *description);
struct event *s2_remove_event(struct event *);
void s2_free_event(struct event *);
void s2_flush_events(void);
struct event *s2_next_event(void);
struct event *s2_wait_for_event(nua_event_t event, int status);
int s2_check_event(nua_event_t event, int status);
int s2_check_callstate(enum nua_callstate state);
struct message *s2_remove_message(struct message *m);
void s2_free_message(struct message *m);
void s2_flush_messages(void);
struct message *s2_next_response(void);
struct message *s2_wait_for_response(int status, sip_method_t , char const *);
int s2_check_response(int status, sip_method_t method, char const *name);
struct message *s2_next_request(void);
struct message *s2_wait_for_request(sip_method_t method, char const *name);
int s2_check_request(sip_method_t method, char const *name);
#define SIP_METHOD_UNKNOWN sip_method_unknown, NULL
struct message *s2_respond_to(struct message *m, struct dialog *d,
int status, char const *phrase,
tag_type_t tag, tag_value_t value, ...);
int s2_request_to(struct dialog *d,
sip_method_t method, char const *name,
tport_t *tport,
tag_type_t tag, tag_value_t value, ...);
int s2_update_dialog(struct dialog *d, struct message *response);
int s2_save_register(struct message *m);
void s2_flush_all(void);
void s2_setup_base(char const *hostname);
void s2_setup_logs(int level);
void s2_setup_tport(char const * const *protocols,
tag_type_t tag, tag_value_t value, ...);
void s2_teardown(void);
nua_t *s2_nua_setup(tag_type_t tag, tag_value_t value, ...);
void s2_nua_teardown(void);
void s2_register_setup(void);
void s2_register_teardown(void);
#endif