ipc/chromium/src/third_party/libevent/test/regress_bufferevent.c

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

     1 /*
     2  * Copyright (c) 2003-2007 Niels Provos <provos@citi.umich.edu>
     3  * Copyright (c) 2007-2012 Niels Provos and Nick Mathewson
     4  *
     5  * Redistribution and use in source and binary forms, with or without
     6  * modification, are permitted provided that the following conditions
     7  * are met:
     8  * 1. Redistributions of source code must retain the above copyright
     9  *    notice, this list of conditions and the following disclaimer.
    10  * 2. Redistributions in binary form must reproduce the above copyright
    11  *    notice, this list of conditions and the following disclaimer in the
    12  *    documentation and/or other materials provided with the distribution.
    13  * 3. The name of the author may not be used to endorse or promote products
    14  *    derived from this software without specific prior written permission.
    15  *
    16  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
    17  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
    18  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
    19  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
    20  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
    21  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
    22  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
    23  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
    24  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
    25  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
    26  */
    28 /* The old tests here need assertions to work. */
    29 #undef NDEBUG
    31 #ifdef WIN32
    32 #include <winsock2.h>
    33 #include <windows.h>
    34 #endif
    36 #include "event2/event-config.h"
    38 #include <sys/types.h>
    39 #include <sys/stat.h>
    40 #ifdef _EVENT_HAVE_SYS_TIME_H
    41 #include <sys/time.h>
    42 #endif
    43 #include <sys/queue.h>
    44 #ifndef WIN32
    45 #include <sys/socket.h>
    46 #include <sys/wait.h>
    47 #include <signal.h>
    48 #include <unistd.h>
    49 #include <netdb.h>
    50 #include <netinet/in.h>
    51 #endif
    52 #include <fcntl.h>
    53 #include <signal.h>
    54 #include <stdlib.h>
    55 #include <stdio.h>
    56 #include <string.h>
    57 #include <errno.h>
    58 #include <assert.h>
    60 #ifdef _EVENT_HAVE_ARPA_INET_H
    61 #include <arpa/inet.h>
    62 #endif
    64 #include "event2/event-config.h"
    65 #include "event2/event.h"
    66 #include "event2/event_struct.h"
    67 #include "event2/event_compat.h"
    68 #include "event2/tag.h"
    69 #include "event2/buffer.h"
    70 #include "event2/bufferevent.h"
    71 #include "event2/bufferevent_compat.h"
    72 #include "event2/bufferevent_struct.h"
    73 #include "event2/listener.h"
    74 #include "event2/util.h"
    76 #include "bufferevent-internal.h"
    77 #include "util-internal.h"
    78 #ifdef WIN32
    79 #include "iocp-internal.h"
    80 #endif
    82 #include "regress.h"
    83 #include "regress_testutils.h"
    85 /*
    86  * simple bufferevent test
    87  */
    89 static void
    90 readcb(struct bufferevent *bev, void *arg)
    91 {
    92 	if (evbuffer_get_length(bev->input) == 8333) {
    93 		struct evbuffer *evbuf = evbuffer_new();
    94 		assert(evbuf != NULL);
    96 		/* gratuitous test of bufferevent_read_buffer */
    97 		bufferevent_read_buffer(bev, evbuf);
    99 		bufferevent_disable(bev, EV_READ);
   101 		if (evbuffer_get_length(evbuf) == 8333) {
   102 			test_ok++;
   103 		}
   105 		evbuffer_free(evbuf);
   106 	}
   107 }
   109 static void
   110 writecb(struct bufferevent *bev, void *arg)
   111 {
   112 	if (evbuffer_get_length(bev->output) == 0) {
   113 		test_ok++;
   114 	}
   115 }
   117 static void
   118 errorcb(struct bufferevent *bev, short what, void *arg)
   119 {
   120 	test_ok = -2;
   121 }
   123 static void
   124 test_bufferevent_impl(int use_pair)
   125 {
   126 	struct bufferevent *bev1 = NULL, *bev2 = NULL;
   127 	char buffer[8333];
   128 	int i;
   130 	if (use_pair) {
   131 		struct bufferevent *pair[2];
   132 		tt_assert(0 == bufferevent_pair_new(NULL, 0, pair));
   133 		bev1 = pair[0];
   134 		bev2 = pair[1];
   135 		bufferevent_setcb(bev1, readcb, writecb, errorcb, NULL);
   136 		bufferevent_setcb(bev2, readcb, writecb, errorcb, NULL);
   137 		tt_int_op(bufferevent_getfd(bev1), ==, -1);
   138 		tt_ptr_op(bufferevent_get_underlying(bev1), ==, NULL);
   139 		tt_ptr_op(bufferevent_pair_get_partner(bev1), ==, bev2);
   140 		tt_ptr_op(bufferevent_pair_get_partner(bev2), ==, bev1);
   141 	} else {
   142 		bev1 = bufferevent_new(pair[0], readcb, writecb, errorcb, NULL);
   143 		bev2 = bufferevent_new(pair[1], readcb, writecb, errorcb, NULL);
   144 		tt_int_op(bufferevent_getfd(bev1), ==, pair[0]);
   145 		tt_ptr_op(bufferevent_get_underlying(bev1), ==, NULL);
   146 		tt_ptr_op(bufferevent_pair_get_partner(bev1), ==, NULL);
   147 		tt_ptr_op(bufferevent_pair_get_partner(bev2), ==, NULL);
   148 	}
   150 	bufferevent_disable(bev1, EV_READ);
   151 	bufferevent_enable(bev2, EV_READ);
   153 	tt_int_op(bufferevent_get_enabled(bev1), ==, EV_WRITE);
   154 	tt_int_op(bufferevent_get_enabled(bev2), ==, EV_WRITE|EV_READ);
   156 	for (i = 0; i < (int)sizeof(buffer); i++)
   157 		buffer[i] = i;
   159 	bufferevent_write(bev1, buffer, sizeof(buffer));
   161 	event_dispatch();
   163 	bufferevent_free(bev1);
   164 	tt_ptr_op(bufferevent_pair_get_partner(bev2), ==, NULL);
   165 	bufferevent_free(bev2);
   167 	if (test_ok != 2)
   168 		test_ok = 0;
   169 end:
   170 	;
   171 }
   173 static void
   174 test_bufferevent(void)
   175 {
   176 	test_bufferevent_impl(0);
   177 }
   179 static void
   180 test_bufferevent_pair(void)
   181 {
   182 	test_bufferevent_impl(1);
   183 }
   185 /*
   186  * test watermarks and bufferevent
   187  */
   189 static void
   190 wm_readcb(struct bufferevent *bev, void *arg)
   191 {
   192 	struct evbuffer *evbuf = evbuffer_new();
   193 	int len = (int)evbuffer_get_length(bev->input);
   194 	static int nread;
   196 	assert(len >= 10 && len <= 20);
   198 	assert(evbuf != NULL);
   200 	/* gratuitous test of bufferevent_read_buffer */
   201 	bufferevent_read_buffer(bev, evbuf);
   203 	nread += len;
   204 	if (nread == 65000) {
   205 		bufferevent_disable(bev, EV_READ);
   206 		test_ok++;
   207 	}
   209 	evbuffer_free(evbuf);
   210 }
   212 static void
   213 wm_writecb(struct bufferevent *bev, void *arg)
   214 {
   215 	assert(evbuffer_get_length(bev->output) <= 100);
   216 	if (evbuffer_get_length(bev->output) == 0) {
   217 		evbuffer_drain(bev->output, evbuffer_get_length(bev->output));
   218 		test_ok++;
   219 	}
   220 }
   222 static void
   223 wm_errorcb(struct bufferevent *bev, short what, void *arg)
   224 {
   225 	test_ok = -2;
   226 }
   228 static void
   229 test_bufferevent_watermarks_impl(int use_pair)
   230 {
   231 	struct bufferevent *bev1 = NULL, *bev2 = NULL;
   232 	char buffer[65000];
   233 	int i;
   234 	test_ok = 0;
   236 	if (use_pair) {
   237 		struct bufferevent *pair[2];
   238 		tt_assert(0 == bufferevent_pair_new(NULL, 0, pair));
   239 		bev1 = pair[0];
   240 		bev2 = pair[1];
   241 		bufferevent_setcb(bev1, NULL, wm_writecb, errorcb, NULL);
   242 		bufferevent_setcb(bev2, wm_readcb, NULL, errorcb, NULL);
   243 	} else {
   244 		bev1 = bufferevent_new(pair[0], NULL, wm_writecb, wm_errorcb, NULL);
   245 		bev2 = bufferevent_new(pair[1], wm_readcb, NULL, wm_errorcb, NULL);
   246 	}
   247 	tt_assert(bev1);
   248 	tt_assert(bev2);
   249 	bufferevent_disable(bev1, EV_READ);
   250 	bufferevent_enable(bev2, EV_READ);
   252 	for (i = 0; i < (int)sizeof(buffer); i++)
   253 		buffer[i] = (char)i;
   255 	/* limit the reading on the receiving bufferevent */
   256 	bufferevent_setwatermark(bev2, EV_READ, 10, 20);
   258 	/* Tell the sending bufferevent not to notify us till it's down to
   259 	   100 bytes. */
   260 	bufferevent_setwatermark(bev1, EV_WRITE, 100, 2000);
   262 	bufferevent_write(bev1, buffer, sizeof(buffer));
   264 	event_dispatch();
   266 	tt_int_op(test_ok, ==, 2);
   268 	/* The write callback drained all the data from outbuf, so we
   269 	 * should have removed the write event... */
   270 	tt_assert(!event_pending(&bev2->ev_write, EV_WRITE, NULL));
   272 end:
   273 	if (bev1)
   274 		bufferevent_free(bev1);
   275 	if (bev2)
   276 		bufferevent_free(bev2);
   277 }
   279 static void
   280 test_bufferevent_watermarks(void)
   281 {
   282 	test_bufferevent_watermarks_impl(0);
   283 }
   285 static void
   286 test_bufferevent_pair_watermarks(void)
   287 {
   288 	test_bufferevent_watermarks_impl(1);
   289 }
   291 /*
   292  * Test bufferevent filters
   293  */
   295 /* strip an 'x' from each byte */
   297 static enum bufferevent_filter_result
   298 bufferevent_input_filter(struct evbuffer *src, struct evbuffer *dst,
   299     ev_ssize_t lim, enum bufferevent_flush_mode state, void *ctx)
   300 {
   301 	const unsigned char *buffer;
   302 	unsigned i;
   304 	buffer = evbuffer_pullup(src, evbuffer_get_length(src));
   305 	for (i = 0; i < evbuffer_get_length(src); i += 2) {
   306 		assert(buffer[i] == 'x');
   307 		evbuffer_add(dst, buffer + i + 1, 1);
   309 		if (i + 2 > evbuffer_get_length(src))
   310 			break;
   311 	}
   313 	evbuffer_drain(src, i);
   314 	return (BEV_OK);
   315 }
   317 /* add an 'x' before each byte */
   319 static enum bufferevent_filter_result
   320 bufferevent_output_filter(struct evbuffer *src, struct evbuffer *dst,
   321     ev_ssize_t lim, enum bufferevent_flush_mode state, void *ctx)
   322 {
   323 	const unsigned char *buffer;
   324 	unsigned i;
   326 	buffer = evbuffer_pullup(src, evbuffer_get_length(src));
   327 	for (i = 0; i < evbuffer_get_length(src); ++i) {
   328 		evbuffer_add(dst, "x", 1);
   329 		evbuffer_add(dst, buffer + i, 1);
   330 	}
   332 	evbuffer_drain(src, evbuffer_get_length(src));
   333 	return (BEV_OK);
   334 }
   336 static void
   337 test_bufferevent_filters_impl(int use_pair)
   338 {
   339 	struct bufferevent *bev1 = NULL, *bev2 = NULL;
   340 	struct bufferevent *bev1_base = NULL, *bev2_base = NULL;
   341 	char buffer[8333];
   342 	int i;
   344 	test_ok = 0;
   346 	if (use_pair) {
   347 		struct bufferevent *pair[2];
   348 		tt_assert(0 == bufferevent_pair_new(NULL, 0, pair));
   349 		bev1 = pair[0];
   350 		bev2 = pair[1];
   351 	} else {
   352 		bev1 = bufferevent_socket_new(NULL, pair[0], 0);
   353 		bev2 = bufferevent_socket_new(NULL, pair[1], 0);
   354 	}
   355 	bev1_base = bev1;
   356 	bev2_base = bev2;
   358 	for (i = 0; i < (int)sizeof(buffer); i++)
   359 		buffer[i] = i;
   361 	bev1 = bufferevent_filter_new(bev1, NULL, bufferevent_output_filter,
   362 				      BEV_OPT_CLOSE_ON_FREE, NULL, NULL);
   364 	bev2 = bufferevent_filter_new(bev2, bufferevent_input_filter,
   365 				      NULL, BEV_OPT_CLOSE_ON_FREE, NULL, NULL);
   366 	bufferevent_setcb(bev1, NULL, writecb, errorcb, NULL);
   367 	bufferevent_setcb(bev2, readcb, NULL, errorcb, NULL);
   369 	tt_ptr_op(bufferevent_get_underlying(bev1), ==, bev1_base);
   370 	tt_ptr_op(bufferevent_get_underlying(bev2), ==, bev2_base);
   371 	tt_int_op(bufferevent_getfd(bev1), ==, -1);
   372 	tt_int_op(bufferevent_getfd(bev2), ==, -1);
   374 	bufferevent_disable(bev1, EV_READ);
   375 	bufferevent_enable(bev2, EV_READ);
   376 	/* insert some filters */
   377 	bufferevent_write(bev1, buffer, sizeof(buffer));
   379 	event_dispatch();
   381 	if (test_ok != 2)
   382 		test_ok = 0;
   384 end:
   385 	if (bev1)
   386 		bufferevent_free(bev1);
   387 	if (bev2)
   388 		bufferevent_free(bev2);
   390 }
   392 static void
   393 test_bufferevent_filters(void)
   394 {
   395 	test_bufferevent_filters_impl(0);
   396 }
   398 static void
   399 test_bufferevent_pair_filters(void)
   400 {
   401 	test_bufferevent_filters_impl(1);
   402 }
   405 static void
   406 sender_writecb(struct bufferevent *bev, void *ctx)
   407 {
   408 	if (evbuffer_get_length(bufferevent_get_output(bev)) == 0) {
   409 		bufferevent_disable(bev,EV_READ|EV_WRITE);
   410 		bufferevent_free(bev);
   411 	}
   412 }
   414 static void
   415 sender_errorcb(struct bufferevent *bev, short what, void *ctx)
   416 {
   417 	TT_FAIL(("Got sender error %d",(int)what));
   418 }
   420 static int bufferevent_connect_test_flags = 0;
   421 static int n_strings_read = 0;
   422 static int n_reads_invoked = 0;
   424 #define TEST_STR "Now is the time for all good events to signal for " \
   425 	"the good of their protocol"
   426 static void
   427 listen_cb(struct evconnlistener *listener, evutil_socket_t fd,
   428     struct sockaddr *sa, int socklen, void *arg)
   429 {
   430 	struct event_base *base = arg;
   431 	struct bufferevent *bev;
   432 	const char s[] = TEST_STR;
   433 	TT_BLATHER(("Got a request on socket %d", (int)fd ));
   434 	bev = bufferevent_socket_new(base, fd, bufferevent_connect_test_flags);
   435 	tt_assert(bev);
   436 	bufferevent_setcb(bev, NULL, sender_writecb, sender_errorcb, NULL);
   437 	bufferevent_write(bev, s, sizeof(s));
   438 end:
   439 	;
   440 }
   442 static void
   443 reader_eventcb(struct bufferevent *bev, short what, void *ctx)
   444 {
   445 	struct event_base *base = ctx;
   446 	if (what & BEV_EVENT_ERROR) {
   447 		perror("foobar");
   448 		TT_FAIL(("got connector error %d", (int)what));
   449 		return;
   450 	}
   451 	if (what & BEV_EVENT_CONNECTED) {
   452 		bufferevent_enable(bev, EV_READ);
   453 	}
   454 	if (what & BEV_EVENT_EOF) {
   455 		char buf[512];
   456 		size_t n;
   457 		n = bufferevent_read(bev, buf, sizeof(buf)-1);
   458 		buf[n] = '\0';
   459 		tt_str_op(buf, ==, TEST_STR);
   460 		if (++n_strings_read == 2)
   461 			event_base_loopexit(base, NULL);
   462 	}
   463 end:
   464 	;
   465 }
   467 static void
   468 reader_readcb(struct bufferevent *bev, void *ctx)
   469 {
   470 	n_reads_invoked++;
   471 }
   473 static void
   474 test_bufferevent_connect(void *arg)
   475 {
   476 	struct basic_test_data *data = arg;
   477 	struct evconnlistener *lev=NULL;
   478 	struct bufferevent *bev1=NULL, *bev2=NULL;
   479 	struct sockaddr_in localhost;
   480 	struct sockaddr_storage ss;
   481 	struct sockaddr *sa;
   482 	ev_socklen_t slen;
   484 	int be_flags=BEV_OPT_CLOSE_ON_FREE;
   486 	if (strstr((char*)data->setup_data, "defer")) {
   487 		be_flags |= BEV_OPT_DEFER_CALLBACKS;
   488 	}
   489 	if (strstr((char*)data->setup_data, "unlocked")) {
   490 		be_flags |= BEV_OPT_UNLOCK_CALLBACKS;
   491 	}
   492 	if (strstr((char*)data->setup_data, "lock")) {
   493 		be_flags |= BEV_OPT_THREADSAFE;
   494 	}
   495 	bufferevent_connect_test_flags = be_flags;
   496 #ifdef WIN32
   497 	if (!strcmp((char*)data->setup_data, "unset_connectex")) {
   498 		struct win32_extension_fns *ext =
   499 		    (struct win32_extension_fns *)
   500 		    event_get_win32_extension_fns();
   501 		ext->ConnectEx = NULL;
   502 	}
   503 #endif
   505 	memset(&localhost, 0, sizeof(localhost));
   507 	localhost.sin_port = 0; /* pick-a-port */
   508 	localhost.sin_addr.s_addr = htonl(0x7f000001L);
   509 	localhost.sin_family = AF_INET;
   510 	sa = (struct sockaddr *)&localhost;
   511 	lev = evconnlistener_new_bind(data->base, listen_cb, data->base,
   512 	    LEV_OPT_CLOSE_ON_FREE|LEV_OPT_REUSEABLE,
   513 	    16, sa, sizeof(localhost));
   514 	tt_assert(lev);
   516 	sa = (struct sockaddr *)&ss;
   517 	slen = sizeof(ss);
   518 	if (regress_get_listener_addr(lev, sa, &slen) < 0) {
   519 		tt_abort_perror("getsockname");
   520 	}
   522 	tt_assert(!evconnlistener_enable(lev));
   523 	bev1 = bufferevent_socket_new(data->base, -1, be_flags);
   524 	bev2 = bufferevent_socket_new(data->base, -1, be_flags);
   525 	tt_assert(bev1);
   526 	tt_assert(bev2);
   527 	bufferevent_setcb(bev1, reader_readcb,NULL, reader_eventcb, data->base);
   528 	bufferevent_setcb(bev2, reader_readcb,NULL, reader_eventcb, data->base);
   530 	bufferevent_enable(bev1, EV_READ);
   531 	bufferevent_enable(bev2, EV_READ);
   533 	tt_want(!bufferevent_socket_connect(bev1, sa, sizeof(localhost)));
   534 	tt_want(!bufferevent_socket_connect(bev2, sa, sizeof(localhost)));
   536 	event_base_dispatch(data->base);
   538 	tt_int_op(n_strings_read, ==, 2);
   539 	tt_int_op(n_reads_invoked, >=, 2);
   540 end:
   541 	if (lev)
   542 		evconnlistener_free(lev);
   544 	if (bev1)
   545 		bufferevent_free(bev1);
   547 	if (bev2)
   548 		bufferevent_free(bev2);
   549 }
   551 static void
   552 want_fail_eventcb(struct bufferevent *bev, short what, void *ctx)
   553 {
   554 	struct event_base *base = ctx;
   555 	const char *err;
   556 	evutil_socket_t s;
   558 	if (what & BEV_EVENT_ERROR) {
   559 		s = bufferevent_getfd(bev);
   560 		err = evutil_socket_error_to_string(evutil_socket_geterror(s));
   561 		TT_BLATHER(("connection failure on "EV_SOCK_FMT": %s",
   562 			EV_SOCK_ARG(s), err));
   563 		test_ok = 1;
   564 	} else {
   565 		TT_FAIL(("didn't fail? what %hd", what));
   566 	}
   568 	event_base_loopexit(base, NULL);
   569 }
   571 static void
   572 close_socket_cb(evutil_socket_t fd, short what, void *arg)
   573 {
   574 	evutil_socket_t *fdp = arg;
   575 	if (*fdp >= 0) {
   576 		evutil_closesocket(*fdp);
   577 		*fdp = -1;
   578 	}
   579 }
   581 static void
   582 test_bufferevent_connect_fail(void *arg)
   583 {
   584 	struct basic_test_data *data = arg;
   585 	struct bufferevent *bev=NULL;
   586 	struct sockaddr_in localhost;
   587 	struct sockaddr *sa = (struct sockaddr*)&localhost;
   588 	evutil_socket_t fake_listener = -1;
   589 	ev_socklen_t slen = sizeof(localhost);
   590 	struct event close_listener_event;
   591 	int close_listener_event_added = 0;
   592 	struct timeval one_second = { 1, 0 };
   593 	int r;
   595 	test_ok = 0;
   597 	memset(&localhost, 0, sizeof(localhost));
   598 	localhost.sin_port = 0; /* have the kernel pick a port */
   599 	localhost.sin_addr.s_addr = htonl(0x7f000001L);
   600 	localhost.sin_family = AF_INET;
   602 	/* bind, but don't listen or accept. should trigger
   603 	   "Connection refused" reliably on most platforms. */
   604 	fake_listener = socket(localhost.sin_family, SOCK_STREAM, 0);
   605 	tt_assert(fake_listener >= 0);
   606 	tt_assert(bind(fake_listener, sa, slen) == 0);
   607 	tt_assert(getsockname(fake_listener, sa, &slen) == 0);
   608 	bev = bufferevent_socket_new(data->base, -1,
   609 		BEV_OPT_CLOSE_ON_FREE | BEV_OPT_DEFER_CALLBACKS);
   610 	tt_assert(bev);
   611 	bufferevent_setcb(bev, NULL, NULL, want_fail_eventcb, data->base);
   613 	r = bufferevent_socket_connect(bev, sa, slen);
   614 	/* XXXX we'd like to test the '0' case everywhere, but FreeBSD tells
   615 	 * detects the error immediately, which is not really wrong of it. */
   616 	tt_want(r == 0 || r == -1);
   618 	/* Close the listener socket after a second. This should trigger
   619 	   "connection refused" on some other platforms, including OSX. */
   620 	evtimer_assign(&close_listener_event, data->base, close_socket_cb,
   621 	    &fake_listener);
   622 	event_add(&close_listener_event, &one_second);
   623 	close_listener_event_added = 1;
   625 	event_base_dispatch(data->base);
   627 	tt_int_op(test_ok, ==, 1);
   629 end:
   630 	if (fake_listener >= 0)
   631 		evutil_closesocket(fake_listener);
   633 	if (bev)
   634 		bufferevent_free(bev);
   636 	if (close_listener_event_added)
   637 		event_del(&close_listener_event);
   638 }
   640 struct timeout_cb_result {
   641 	struct timeval read_timeout_at;
   642 	struct timeval write_timeout_at;
   643 	struct timeval last_wrote_at;
   644 	int n_read_timeouts;
   645 	int n_write_timeouts;
   646 	int total_calls;
   647 };
   649 static void
   650 bev_timeout_write_cb(struct bufferevent *bev, void *arg)
   651 {
   652 	struct timeout_cb_result *res = arg;
   653 	evutil_gettimeofday(&res->last_wrote_at, NULL);
   654 }
   656 static void
   657 bev_timeout_event_cb(struct bufferevent *bev, short what, void *arg)
   658 {
   659 	struct timeout_cb_result *res = arg;
   660 	++res->total_calls;
   662 	if ((what & (BEV_EVENT_READING|BEV_EVENT_TIMEOUT))
   663 	    == (BEV_EVENT_READING|BEV_EVENT_TIMEOUT)) {
   664 		evutil_gettimeofday(&res->read_timeout_at, NULL);
   665 		++res->n_read_timeouts;
   666 	}
   667 	if ((what & (BEV_EVENT_WRITING|BEV_EVENT_TIMEOUT))
   668 	    == (BEV_EVENT_WRITING|BEV_EVENT_TIMEOUT)) {
   669 		evutil_gettimeofday(&res->write_timeout_at, NULL);
   670 		++res->n_write_timeouts;
   671 	}
   672 }
   674 static void
   675 test_bufferevent_timeouts(void *arg)
   676 {
   677 	/* "arg" is a string containing "pair" and/or "filter". */
   678 	struct bufferevent *bev1 = NULL, *bev2 = NULL;
   679 	struct basic_test_data *data = arg;
   680 	int use_pair = 0, use_filter = 0;
   681 	struct timeval tv_w, tv_r, started_at;
   682 	struct timeout_cb_result res1, res2;
   683 	char buf[1024];
   685 	memset(&res1, 0, sizeof(res1));
   686 	memset(&res2, 0, sizeof(res2));
   688 	if (strstr((char*)data->setup_data, "pair"))
   689 		use_pair = 1;
   690 	if (strstr((char*)data->setup_data, "filter"))
   691 		use_filter = 1;
   693 	if (use_pair) {
   694 		struct bufferevent *p[2];
   695 		tt_int_op(0, ==, bufferevent_pair_new(data->base, 0, p));
   696 		bev1 = p[0];
   697 		bev2 = p[1];
   698 	} else {
   699 		bev1 = bufferevent_socket_new(data->base, data->pair[0], 0);
   700 		bev2 = bufferevent_socket_new(data->base, data->pair[1], 0);
   701 	}
   703 	tt_assert(bev1);
   704 	tt_assert(bev2);
   706 	if (use_filter) {
   707 		struct bufferevent *bevf1, *bevf2;
   708 		bevf1 = bufferevent_filter_new(bev1, NULL, NULL,
   709 		    BEV_OPT_CLOSE_ON_FREE, NULL, NULL);
   710 		bevf2 = bufferevent_filter_new(bev2, NULL, NULL,
   711 		    BEV_OPT_CLOSE_ON_FREE, NULL, NULL);
   712 		tt_assert(bevf1);
   713 		tt_assert(bevf2);
   714 		bev1 = bevf1;
   715 		bev2 = bevf2;
   716 	}
   718 	/* Do this nice and early. */
   719 	bufferevent_disable(bev2, EV_READ);
   721 	/* bev1 will try to write and read.  Both will time out. */
   722 	evutil_gettimeofday(&started_at, NULL);
   723 	tv_w.tv_sec = tv_r.tv_sec = 0;
   724 	tv_w.tv_usec = 100*1000;
   725 	tv_r.tv_usec = 150*1000;
   726 	bufferevent_setcb(bev1, NULL, bev_timeout_write_cb,
   727 	    bev_timeout_event_cb, &res1);
   728 	bufferevent_setwatermark(bev1, EV_WRITE, 1024*1024+10, 0);
   729 	bufferevent_set_timeouts(bev1, &tv_r, &tv_w);
   730 	if (use_pair) {
   731 		/* For a pair, the fact that the other side isn't reading
   732 		 * makes the writer stall */
   733 		bufferevent_write(bev1, "ABCDEFG", 7);
   734 	} else {
   735 		/* For a real socket, the kernel's TCP buffers can eat a
   736 		 * fair number of bytes; make sure that at some point we
   737 		 * have some bytes that will stall. */
   738 		struct evbuffer *output = bufferevent_get_output(bev1);
   739 		int i;
   740 		memset(buf, 0xbb, sizeof(buf));
   741 		for (i=0;i<1024;++i) {
   742 			evbuffer_add_reference(output, buf, sizeof(buf),
   743 			    NULL, NULL);
   744 		}
   745 	}
   746 	bufferevent_enable(bev1, EV_READ|EV_WRITE);
   748 	/* bev2 has nothing to say, and isn't listening. */
   749 	bufferevent_setcb(bev2, NULL,  bev_timeout_write_cb,
   750 	    bev_timeout_event_cb, &res2);
   751 	tv_w.tv_sec = tv_r.tv_sec = 0;
   752 	tv_w.tv_usec = 200*1000;
   753 	tv_r.tv_usec = 100*1000;
   754 	bufferevent_set_timeouts(bev2, &tv_r, &tv_w);
   755 	bufferevent_enable(bev2, EV_WRITE);
   757 	tv_r.tv_sec = 1;
   758 	tv_r.tv_usec = 0;
   760 	event_base_loopexit(data->base, &tv_r);
   761 	event_base_dispatch(data->base);
   763 	/* XXXX Test that actually reading or writing a little resets the
   764 	 * timeouts. */
   766 	/* Each buf1 timeout happens, and happens only once. */
   767 	tt_want(res1.n_read_timeouts);
   768 	tt_want(res1.n_write_timeouts);
   769 	tt_want(res1.n_read_timeouts == 1);
   770 	tt_want(res1.n_write_timeouts == 1);
   772 	test_timeval_diff_eq(&started_at, &res1.read_timeout_at, 150);
   773 	test_timeval_diff_eq(&started_at, &res1.write_timeout_at, 100);
   775 end:
   776 	if (bev1)
   777 		bufferevent_free(bev1);
   778 	if (bev2)
   779 		bufferevent_free(bev2);
   780 }
   782 struct testcase_t bufferevent_testcases[] = {
   784 	LEGACY(bufferevent, TT_ISOLATED),
   785 	LEGACY(bufferevent_pair, TT_ISOLATED),
   786 	LEGACY(bufferevent_watermarks, TT_ISOLATED),
   787 	LEGACY(bufferevent_pair_watermarks, TT_ISOLATED),
   788 	LEGACY(bufferevent_filters, TT_ISOLATED),
   789 	LEGACY(bufferevent_pair_filters, TT_ISOLATED),
   790 	{ "bufferevent_connect", test_bufferevent_connect, TT_FORK|TT_NEED_BASE,
   791 	  &basic_setup, (void*)"" },
   792 	{ "bufferevent_connect_defer", test_bufferevent_connect,
   793 	  TT_FORK|TT_NEED_BASE, &basic_setup, (void*)"defer" },
   794 	{ "bufferevent_connect_lock", test_bufferevent_connect,
   795 	  TT_FORK|TT_NEED_BASE|TT_NEED_THREADS, &basic_setup, (void*)"lock" },
   796 	{ "bufferevent_connect_lock_defer", test_bufferevent_connect,
   797 	  TT_FORK|TT_NEED_BASE|TT_NEED_THREADS, &basic_setup,
   798 	  (void*)"defer lock" },
   799 	{ "bufferevent_connect_unlocked_cbs", test_bufferevent_connect,
   800 	  TT_FORK|TT_NEED_BASE|TT_NEED_THREADS, &basic_setup,
   801 	  (void*)"lock defer unlocked" },
   802 	{ "bufferevent_connect_fail", test_bufferevent_connect_fail,
   803 	  TT_FORK|TT_NEED_BASE, &basic_setup, NULL },
   804 	{ "bufferevent_timeout", test_bufferevent_timeouts,
   805 	  TT_FORK|TT_NEED_BASE|TT_NEED_SOCKETPAIR, &basic_setup, (void*)"" },
   806 	{ "bufferevent_timeout_pair", test_bufferevent_timeouts,
   807 	  TT_FORK|TT_NEED_BASE, &basic_setup, (void*)"pair" },
   808 	{ "bufferevent_timeout_filter", test_bufferevent_timeouts,
   809 	  TT_FORK|TT_NEED_BASE, &basic_setup, (void*)"filter" },
   810 	{ "bufferevent_timeout_filter_pair", test_bufferevent_timeouts,
   811 	  TT_FORK|TT_NEED_BASE, &basic_setup, (void*)"filter pair" },
   812 #ifdef _EVENT_HAVE_LIBZ
   813 	LEGACY(bufferevent_zlib, TT_ISOLATED),
   814 #else
   815 	{ "bufferevent_zlib", NULL, TT_SKIP, NULL, NULL },
   816 #endif
   818 	END_OF_TESTCASES,
   819 };
   821 struct testcase_t bufferevent_iocp_testcases[] = {
   823 	LEGACY(bufferevent, TT_ISOLATED|TT_ENABLE_IOCP),
   824 	LEGACY(bufferevent_watermarks, TT_ISOLATED|TT_ENABLE_IOCP),
   825 	LEGACY(bufferevent_filters, TT_ISOLATED|TT_ENABLE_IOCP),
   826 	{ "bufferevent_connect", test_bufferevent_connect,
   827 	  TT_FORK|TT_NEED_BASE|TT_ENABLE_IOCP, &basic_setup, (void*)"" },
   828 	{ "bufferevent_connect_defer", test_bufferevent_connect,
   829 	  TT_FORK|TT_NEED_BASE|TT_ENABLE_IOCP, &basic_setup, (void*)"defer" },
   830 	{ "bufferevent_connect_lock", test_bufferevent_connect,
   831 	  TT_FORK|TT_NEED_BASE|TT_NEED_THREADS|TT_ENABLE_IOCP, &basic_setup,
   832 	  (void*)"lock" },
   833 	{ "bufferevent_connect_lock_defer", test_bufferevent_connect,
   834 	  TT_FORK|TT_NEED_BASE|TT_NEED_THREADS|TT_ENABLE_IOCP, &basic_setup,
   835 	  (void*)"defer lock" },
   836 	{ "bufferevent_connect_fail", test_bufferevent_connect_fail,
   837 	  TT_FORK|TT_NEED_BASE|TT_ENABLE_IOCP, &basic_setup, NULL },
   838 	{ "bufferevent_connect_nonblocking", test_bufferevent_connect,
   839 	  TT_FORK|TT_NEED_BASE|TT_ENABLE_IOCP, &basic_setup,
   840 	  (void*)"unset_connectex" },
   842 	END_OF_TESTCASES,
   843 };

mercurial