aboutsummaryrefslogtreecommitdiff
path: root/tests
diff options
context:
space:
mode:
Diffstat (limited to 'tests')
-rw-r--r--tests/CMakeLists.txt1
-rw-r--r--tests/tls.c634
2 files changed, 0 insertions, 635 deletions
diff --git a/tests/CMakeLists.txt b/tests/CMakeLists.txt
index 40828eff..35a3b44f 100644
--- a/tests/CMakeLists.txt
+++ b/tests/CMakeLists.txt
@@ -138,7 +138,6 @@ add_nng_test(pipe 5)
add_nng_test(pollfd 5)
add_nng_test(scalability 20 ON)
add_nng_test(synch 5)
-add_nng_test(tls 60)
add_nng_test(tcpsupp 10)
add_nng_test(tcp 180)
add_nng_test(tcp6 60)
diff --git a/tests/tls.c b/tests/tls.c
deleted file mode 100644
index c218a5a6..00000000
--- a/tests/tls.c
+++ /dev/null
@@ -1,634 +0,0 @@
-//
-// Copyright 2018 Capitar IT Group BV <info@capitar.com>
-// Copyright 2024 Staysail Systems, Inc. <info@staysail.tech>
-//
-// This software is supplied under the terms of the MIT License, a
-// copy of which should be located in the distribution where this
-// file was obtained (LICENSE.txt). A copy of the license may also be
-// found online at https://opensource.org/licenses/MIT.
-//
-
-// TLS tests.
-
-#ifndef _WIN32
-#include <arpa/inet.h>
-#endif
-
-#include <nng/nng.h>
-#include <nng/protocol/pair1/pair.h>
-#include <nng/supplemental/tls/tls.h>
-
-#include "convey.h"
-#include "stubs.h"
-#include "trantest.h"
-
-// These keys are for demonstration purposes ONLY. DO NOT USE.
-// The certificate is valid for 100 years, because I don't want to
-// have to regenerate it ever again. The CN is 127.0.0.1, and self-signed.
-//
-
-static const char cert[] =
- "-----BEGIN CERTIFICATE-----\n"
- "MIIDRzCCAi8CFCOIJGs6plMawgBYdDuCRV7UuJuyMA0GCSqGSIb3DQEBCwUAMF8x\n"
- "CzAJBgNVBAYTAlhYMQ8wDQYDVQQIDAZVdG9waWExETAPBgNVBAcMCFBhcmFkaXNl\n"
- "MRgwFgYDVQQKDA9OTkcgVGVzdHMsIEluYy4xEjAQBgNVBAMMCWxvY2FsaG9zdDAg\n"
- "Fw0yMDA1MjMyMzMxMTlaGA8yMTIwMDQyOTIzMzExOVowXzELMAkGA1UEBhMCWFgx\n"
- "DzANBgNVBAgMBlV0b3BpYTERMA8GA1UEBwwIUGFyYWRpc2UxGDAWBgNVBAoMD05O\n"
- "RyBUZXN0cywgSW5jLjESMBAGA1UEAwwJbG9jYWxob3N0MIIBIjANBgkqhkiG9w0B\n"
- "AQEFAAOCAQ8AMIIBCgKCAQEAyPdnRbMrQj9902TGQsmMbG6xTSl9XKbJr55BcnyZ\n"
- "ifsrqA7BbNSkndVw9Qq+OJQIDBTfRhGdG+o9j3h6SDVvIb62fWtwJ5Fe0eUmeYwP\n"
- "c1PKQzOmMFlMYekXiZsx60yu5LeuUhGlb84+csImH+m3NbutInPJcStSq0WfSV6V\n"
- "Nk6DN3535ex66zV2Ms6ikys1vCC434YqIpe1VxUh+IC2widJcLDCxmmJt3TOlx5f\n"
- "9OcKMkxuH4fMAzgjIEpIrUjdb19CGNVvsNrEEB2CShBMgBdqMaAnKFxpKgfzS0JF\n"
- "ulxRGNtpsrweki+j+a4sJXTv40kELkRQS6uB6wWZNjcPywIDAQABMA0GCSqGSIb3\n"
- "DQEBCwUAA4IBAQA86Fqrd4aiih6R3fwiMLwV6IQJv+u5rQeqA4D0xu6v6siP42SJ\n"
- "YMaI2DkNGrWdSFVSHUK/efceCrhnMlW7VM8I1cyl2F/qKMfnT72cxqqquiKtQKdT\n"
- "NDTzv61QMUP9n86HxMzGS7jg0Pknu55BsIRNK6ndDvI3D/K/rzZs4xbqWSSfNfQs\n"
- "fNFBbOuDrkS6/1h3p8SY1uPM18WLVv3GO2T3aeNMHn7YJAKSn+sfaxzAPyPIK3UT\n"
- "W8ecGQSHOqBJJQELyUfMu7lx/FCYKUhN7/1uhU5Qf1pCR8hkIMegtqr64yVBNMOn\n"
- "248fuiHbs9BRknuA/PqjxIDDZTwtDrfVSO/S\n"
- "-----END CERTIFICATE-----\n";
-
-static const char key[] =
- "-----BEGIN RSA PRIVATE KEY-----\n"
- "MIIEowIBAAKCAQEAyPdnRbMrQj9902TGQsmMbG6xTSl9XKbJr55BcnyZifsrqA7B\n"
- "bNSkndVw9Qq+OJQIDBTfRhGdG+o9j3h6SDVvIb62fWtwJ5Fe0eUmeYwPc1PKQzOm\n"
- "MFlMYekXiZsx60yu5LeuUhGlb84+csImH+m3NbutInPJcStSq0WfSV6VNk6DN353\n"
- "5ex66zV2Ms6ikys1vCC434YqIpe1VxUh+IC2widJcLDCxmmJt3TOlx5f9OcKMkxu\n"
- "H4fMAzgjIEpIrUjdb19CGNVvsNrEEB2CShBMgBdqMaAnKFxpKgfzS0JFulxRGNtp\n"
- "srweki+j+a4sJXTv40kELkRQS6uB6wWZNjcPywIDAQABAoIBAQCGSUsot+BgFCzv\n"
- "5JbWafb7Pbwb421xS8HZJ9Zzue6e1McHNVTqc+zLyqQAGX2iMMhvykKnf32L+anJ\n"
- "BKgxOANaeSVYCUKYLfs+JfDfp0druMGexhR2mjT/99FSkfF5WXREQLiq/j+dxiLU\n"
- "bActq+5QaWf3bYddp6VF7O/TBvCNqBfD0+S0o0wtBdvxXItrKPTD5iKr9JfLWdAt\n"
- "YNAk2QgFywFtY5zc2wt4queghF9GHeBzzZCuVj9QvPA4WdVq0mePaPTmvTYQUD0j\n"
- "GT6X5j9JhqCwfh7trb/HfkmLHwwc62zPDFps+Dxao80+vss5b/EYZ4zY3S/K3vpG\n"
- "f/e42S2BAoGBAP51HQYFJGC/wsNtOcX8RtXnRo8eYmyboH6MtBFrZxWl6ERigKCN\n"
- "5Tjni7EI3nwi3ONg0ENPFkoQ8h0bcVFS7iW5kz5te73WaOFtpkU9rmuFDUz37eLP\n"
- "d+JLZ5Kwfn2FM9HoiSAZAHowE0MIlmmIEXSnFtqA2zzorPQLO/4QlR+VAoGBAMov\n"
- "R0yaHg3qPlxmCNyLXKiGaGNzvsvWjYw825uCGmVZfhzDhOiCFMaMb51BS5Uw/gwm\n"
- "zHxmJjoqak8JjxaQ1qKPoeY1TJ5ps1+TRq9Wzm2/zGqJHOXnRPlqwBQ6AFllAMgt\n"
- "Rlp5uqb8QJ+YEo6/1kdGhw9kZWCZEEue6MNQjxnfAoGARLkUkZ+p54di7qz9QX+V\n"
- "EghYgibOpk6R1hviNiIvwSUByhZgbvxjwC6pB7NBg31W8wIevU8K0g4plbrnq/Md\n"
- "5opsPhwLo4XY5albkq/J/7f7k6ISWYN2+WMsIe4Q+42SJUsMXeLiwh1h1mTnWrEp\n"
- "JbxK69CJZbXhoDe4iDGqVNECgYAjlgS3n9ywWE1XmAHxR3osk1OmRYYMfJv3VfLV\n"
- "QSYCNqkyyNsIzXR4qdkvVYHHJZNhcibFsnkB/dsuRCFyOFX+0McPLMxqiXIv3U0w\n"
- "qVe2C28gRTfX40fJmpdqN/c9xMBJe2aJoClRIM8DCBIkG/HMI8a719DcGrS6iqKv\n"
- "VeuKAwKBgEgD+KWW1KtoSjCBlS0NP8HjC/Rq7j99YhKE6b9h2slIa7JTO8RZKCa0\n"
- "qbuomdUeJA3R8h+5CFkEKWqO2/0+dUdLNOjG+CaTFHaUJevzHOzIjpn+VsfCLV13\n"
- "yupGzHG+tGtdrWgLn9Dzdp67cDfSnsSh+KODPECAAFfo+wPvD8DS\n"
- "-----END RSA PRIVATE KEY-----\n";
-
-static int
-check_props_v4(nng_msg *msg)
-{
- nng_pipe p;
- size_t z;
- bool b;
- nng_sockaddr la;
- nng_sockaddr ra;
-
- p = nng_msg_get_pipe(msg);
- So(nng_pipe_id(p) > 0);
-
- // Typed access
- So(nng_pipe_get_addr(p, NNG_OPT_LOCADDR, &la) == 0);
- So(la.s_family == NNG_AF_INET);
- So(la.s_in.sa_port == htons(trantest_port - 1));
- So(la.s_in.sa_port != 0);
- So(la.s_in.sa_addr == htonl(0x7f000001));
-
- // Untyped access
- z = sizeof(nng_sockaddr);
- So(nng_pipe_get(p, NNG_OPT_REMADDR, &ra, &z) == 0);
- So(z == sizeof(ra));
- So(ra.s_family == NNG_AF_INET);
- So(ra.s_in.sa_port != 0);
- So(ra.s_in.sa_addr == htonl(0x7f000001));
-
- So(nng_pipe_get_bool(p, NNG_OPT_TCP_KEEPALIVE, &b) == 0);
- So(b == false); // default
-
- So(nng_pipe_get_bool(p, NNG_OPT_TCP_NODELAY, &b) == 0);
- So(b == true); // default
-
- // Check for type enforcement
- int i;
- So(nng_pipe_get_int(p, NNG_OPT_REMADDR, &i) == NNG_EBADTYPE);
-
- z = 1;
- So(nng_pipe_get(p, NNG_OPT_REMADDR, &ra, &z) == NNG_EINVAL);
-
- return (0);
-}
-
-static int
-init_dialer_tls_ex(nng_dialer d, bool own_cert)
-{
- nng_tls_config *cfg;
- int rv;
-
- if ((rv = nng_tls_config_alloc(&cfg, NNG_TLS_MODE_CLIENT)) != 0) {
- return (rv);
- }
-
- if ((rv = nng_tls_config_ca_chain(cfg, cert, NULL)) != 0) {
- goto out;
- }
-
- if ((rv = nng_tls_config_server_name(cfg, "localhost")) != 0) {
- goto out;
- }
- nng_tls_config_auth_mode(cfg, NNG_TLS_AUTH_MODE_REQUIRED);
-
- if (own_cert) {
- if ((rv = nng_tls_config_own_cert(cfg, cert, key, NULL)) !=
- 0) {
- goto out;
- }
- }
-
- rv = nng_dialer_set_ptr(d, NNG_OPT_TLS_CONFIG, cfg);
-
-out:
- nng_tls_config_free(cfg);
- return (rv);
-}
-
-static int
-init_dialer_tls(nng_dialer d)
-{
- return (init_dialer_tls_ex(d, false));
-}
-
-static int
-init_listener_tls_ex(nng_listener l, int auth_mode)
-{
- nng_tls_config *cfg;
- int rv;
-
- if ((rv = nng_tls_config_alloc(&cfg, NNG_TLS_MODE_SERVER)) != 0) {
- return (rv);
- }
- if ((rv = nng_tls_config_own_cert(cfg, cert, key, NULL)) != 0) {
- goto out;
- }
- if ((rv = nng_listener_set_ptr(l, NNG_OPT_TLS_CONFIG, cfg)) != 0) {
- goto out;
- }
- switch (auth_mode) {
- case NNG_TLS_AUTH_MODE_REQUIRED:
- case NNG_TLS_AUTH_MODE_OPTIONAL:
- if ((rv = nng_tls_config_ca_chain(cfg, cert, NULL)) != 0) {
- goto out;
- }
- break;
- default:
- break;
- }
- if ((rv = nng_tls_config_auth_mode(cfg, auth_mode)) != 0) {
- goto out;
- }
-out:
- nng_tls_config_free(cfg);
- return (0);
-}
-
-static int
-init_listener_tls(nng_listener l)
-{
- return (init_listener_tls_ex(l, NNG_TLS_AUTH_MODE_NONE));
-}
-
-static int
-init_dialer_tls_file(nng_dialer d)
-{
- int rv;
- char *tmpdir;
- char *pth;
-
- if ((tmpdir = nni_plat_temp_dir()) == NULL) {
- return (NNG_ENOTSUP);
- }
- if ((pth = nni_file_join(tmpdir, "tls_test_cacert.pem")) == NULL) {
- nni_strfree(tmpdir);
- return (NNG_ENOMEM);
- }
- nni_strfree(tmpdir);
-
- if ((rv = nni_file_put(pth, cert, strlen(cert))) != 0) {
- nni_strfree(pth);
- return (rv);
- }
-
- rv = nng_dialer_set_string(d, NNG_OPT_TLS_CA_FILE, pth);
- nni_file_delete(pth);
- nni_strfree(pth);
-
- return (rv);
-}
-
-static int
-init_listener_tls_file(nng_listener l)
-{
- int rv;
- char *tmpdir;
- char *pth;
- char *certkey;
-
- if ((tmpdir = nni_plat_temp_dir()) == NULL) {
- return (NNG_ENOTSUP);
- }
-
- if ((pth = nni_file_join(tmpdir, "tls_test_certkey.pem")) == NULL) {
- nni_strfree(tmpdir);
- return (NNG_ENOMEM);
- }
- nni_strfree(tmpdir);
-
- if ((rv = nni_asprintf(&certkey, "%s\r\n%s\r\n", cert, key)) != 0) {
- nni_strfree(pth);
- return (rv);
- }
-
- rv = nni_file_put(pth, certkey, strlen(certkey));
- nni_strfree(certkey);
- if (rv != 0) {
- nni_strfree(pth);
- return (rv);
- }
-
- rv = nng_listener_set_string(l, NNG_OPT_TLS_CERT_KEY_FILE, pth);
- if (rv != 0) {
- // We can wind up with EBUSY from the server already
- // running.
- if (rv == NNG_EBUSY) {
- rv = 0;
- }
- }
-
- nni_file_delete(pth);
- nni_strfree(pth);
- return (rv);
-}
-
-TestMain("TLS Transport", {
- static trantest tt;
-
- nng_log_set_logger(nng_stderr_logger);
- nng_log_set_level(NNG_LOG_INFO);
-
- if (strcmp(nng_tls_engine_name(), "none") == 0) {
- Skip("TLS not enabled");
- }
-
- tt.dialer_init = init_dialer_tls;
- tt.listener_init = init_listener_tls;
- tt.tmpl = "tls+tcp://127.0.0.1:";
- tt.proptest = check_props_v4;
-
- trantest_test(&tt);
-
- Convey("We cannot connect to wild cards", {
- nng_socket s;
- char addr[NNG_MAXADDRLEN];
-
- So(nng_pair_open(&s) == 0);
- Reset({ nng_close(s); });
- trantest_next_address(addr, "tls+tcp://*:");
- So(nng_dial(s, addr, NULL, 0) == NNG_EADDRINVAL);
- });
-
- Convey("We can bind to wild card", {
- nng_socket s1;
- nng_socket s2;
- char addr[NNG_MAXADDRLEN];
- nng_listener l;
- nng_dialer d;
-
- So(nng_pair_open(&s1) == 0);
- So(nng_pair_open(&s2) == 0);
- Reset({
- nng_close(s2);
- nng_close(s1);
- });
- trantest_next_address(addr, "tls+tcp://*:");
- So(nng_listener_create(&l, s1, addr) == 0);
- So(init_listener_tls(l) == 0);
- // reset port back one
- trantest_prev_address(addr, "tls+tcp://127.0.0.1:");
- So(nng_dialer_create(&d, s2, addr) == 0);
- So(init_dialer_tls(d) == 0);
- So(nng_dialer_set_int(
- d, NNG_OPT_TLS_AUTH_MODE, NNG_TLS_AUTH_MODE_NONE) == 0);
- So(nng_listener_start(l, 0) == 0);
- So(nng_dialer_start(d, 0) == 0);
- });
-
- SkipConvey("We can bind to port zero", {
- nng_socket s1;
- nng_socket s2;
- nng_listener l;
- nng_dialer d;
- char *addr;
-
- So(nng_pair_open(&s1) == 0);
- So(nng_pair_open(&s2) == 0);
- Reset({
- nng_close(s2);
- nng_close(s1);
- });
- So(nng_listener_create(&l, s1, "tls+tcp://127.0.0.1:0") == 0);
- So(init_listener_tls(l) == 0);
- So(nng_listener_start(l, 0) == 0);
- So(nng_listener_get_string(l, NNG_OPT_URL, &addr) == 0);
- So(nng_dialer_create(&d, s2, addr) == 0);
- So(init_dialer_tls(d) == 0);
- So(nng_dialer_set_int(
- d, NNG_OPT_TLS_AUTH_MODE, NNG_TLS_AUTH_MODE_NONE) == 0);
- So(nng_dialer_start(d, 0) == 0);
- nng_strfree(addr);
- });
-
- Convey("Malformed TLS addresses do not panic", {
- nng_socket s1;
-
- So(nng_pair_open(&s1) == 0);
- Reset({ nng_close(s1); });
-
- // Note that if we listen to an unspecified port, then we
- // get a random port. So we don't look at that. This allows
- // a user to obtain a port at random and then query to see
- // which one was chosen.
-
- So(nng_dial(s1, "tls+tcp://127.0.0.1", NULL, 0) ==
- NNG_EADDRINVAL);
- So(nng_dial(s1, "tls+tcp://127.0.0.1.32", NULL, 0) ==
- NNG_EADDRINVAL);
- So(nng_dial(s1, "tls+tcp://127.0.x.1.32", NULL, 0) ==
- NNG_EADDRINVAL);
- So(nng_listen(s1, "tls+tcp://127.0.0.1.32", NULL, 0) ==
- NNG_EADDRINVAL);
- So(nng_listen(s1, "tls+tcp://127.0.x.1.32", NULL, 0) ==
- NNG_EADDRINVAL);
- });
-
- Convey("We can use local interface to connect", {
- nng_socket s1;
- nng_socket s2;
- nng_listener l;
- nng_dialer d;
- char addr[NNG_MAXADDRLEN];
-
- So(nng_pair_open(&s1) == 0);
- So(nng_pair_open(&s2) == 0);
- Reset({
- nng_close(s2);
- nng_close(s1);
- });
- trantest_next_address(addr, "tls+tcp://127.0.0.1:");
- So(nng_listener_create(&l, s1, addr) == 0);
- So(init_listener_tls(l) == 0);
- So(nng_listener_start(l, 0) == 0);
- // reset port back one
- trantest_prev_address(addr, "tls+tcp://127.0.0.1;127.0.0.1:");
- So(nng_dialer_create(&d, s2, addr) == 0);
- So(init_dialer_tls(d) == 0);
- So(nng_dialer_start(d, 0) == 0);
- });
-
- Convey("Botched local interfaces fail reasonably", {
- nng_socket s1;
-
- So(nng_pair_open(&s1) == 0);
- Reset({ nng_close(s1); });
- So(nng_dial(s1, "tcp://1x.2;127.0.0.1:80", NULL, 0) ==
- NNG_EADDRINVAL);
- });
-
- Convey("Can't specify address that isn't ours", {
- nng_socket s1;
-
- So(nng_pair_open(&s1) == 0);
- Reset({ nng_close(s1); });
- So(nng_dial(s1, "tcp://8.8.8.8;127.0.0.1:80", NULL, 0) ==
- NNG_EADDRINVAL);
- });
-
- // We really need to have pipe start/negotiate as one of the key steps
- // during connect establish. Until that happens, we cannot verify the
- // peer. See bug #208.
- SkipConvey("Verify works", {
- nng_socket s1;
- nng_socket s2;
- nng_listener l;
- size_t sz;
- char addr[NNG_MAXADDRLEN];
-
- So(nng_pair_open(&s1) == 0);
- So(nng_pair_open(&s2) == 0);
- Reset({
- nng_close(s2);
- nng_close(s1);
- });
- trantest_next_address(addr, "tls+tcp://:");
- So(nng_listener_create(&l, s1, addr) == 0);
- So(init_listener_tls_file(NULL, l) == 0);
- So(nng_listener_start(l, 0) == 0);
- nng_msleep(100);
-
- // reset port back one
- trantest_prev_address(addr, "tls+tcp://127.0.0.1:");
- So(nng_socket_set_int(s2, NNG_OPT_TLS_AUTH_MODE,
- NNG_TLS_AUTH_MODE_REQUIRED) == 0);
-
- So(nng_dial(s2, addr, NULL, 0) == NNG_EPEERAUTH);
- });
-
- Convey("No verify works", {
- nng_socket s1; // server
- nng_socket s2; // client
- nng_listener l;
- char addr[NNG_MAXADDRLEN];
- nng_msg *msg;
- nng_pipe p;
- bool b;
- nng_dialer d;
-
- So(nng_pair_open(&s1) == 0);
- So(nng_pair_open(&s2) == 0);
- Reset({
- nng_close(s2);
- nng_close(s1);
- });
- trantest_next_address(addr, "tls+tcp://*:");
- So(nng_listener_create(&l, s1, addr) == 0);
- So(init_listener_tls_file(l) == 0);
- So(nng_listener_set_int(l, NNG_OPT_TLS_AUTH_MODE,
- NNG_TLS_AUTH_MODE_OPTIONAL) == 0);
- So(nng_listener_start(l, 0) == 0);
- nng_msleep(100);
-
- // reset port back one
- trantest_prev_address(addr, "tls+tcp://127.0.0.1:");
- So(nng_socket_set_ms(s2, NNG_OPT_RECVTIMEO, 200) == 0);
- So(nng_dialer_create(&d, s2, addr) == 0);
- So(init_dialer_tls_file(d) == 0);
- So(nng_dialer_set_string(
- d, NNG_OPT_TLS_SERVER_NAME, "localhost") == 0);
- So(nng_dialer_start(d, 0) == 0);
-
- So(nng_send(s2, "hello", 6, 0) == 0);
- So(nng_recvmsg(s1, &msg, 0) == 0);
- So(msg != NULL);
- So(nng_msg_len(msg) == 6);
- So(strcmp(nng_msg_body(msg), "hello") == 0);
- p = nng_msg_get_pipe(msg);
- So(nng_pipe_id(p) > 0);
- So(nng_pipe_get_bool(p, NNG_OPT_TLS_VERIFIED, &b) == 0);
- So(b == false);
- nng_msg_free(msg);
- });
-
- Convey("Valid verify works", {
- nng_socket s1;
- nng_socket s2;
- nng_listener l;
- nng_dialer d;
- char addr[NNG_MAXADDRLEN];
- nng_msg *msg;
- nng_pipe p;
- bool b;
-
- So(nng_pair_open(&s1) == 0);
- So(nng_pair_open(&s2) == 0);
- Reset({
- nng_close(s2);
- nng_close(s1);
- });
- trantest_next_address(addr, "tls+tcp4://*:");
- So(nng_listener_create(&l, s1, addr) == 0);
- So(init_listener_tls_ex(l, NNG_TLS_AUTH_MODE_REQUIRED) == 0);
- So(nng_listener_start(l, 0) == 0);
-
- nng_msleep(100);
-
- // reset port back one
- trantest_prev_address(addr, "tls+tcp4://localhost:");
- So(nng_dialer_create(&d, s2, addr) == 0);
- So(init_dialer_tls_ex(d, true) == 0);
-
- So(nng_socket_set_ms(s2, NNG_OPT_RECVTIMEO, 200) == 0);
- So(nng_dialer_start(d, 0) == 0);
- nng_msleep(100);
-
- // send from the server to the client-- the client always
- // verifies the server.
- So(nng_send(s2, "hello", 6, 0) == 0);
- So(nng_recvmsg(s1, &msg, 0) == 0);
- So(msg != NULL);
- So(nng_msg_len(msg) == 6);
- So(strcmp(nng_msg_body(msg), "hello") == 0);
- p = nng_msg_get_pipe(msg);
- So(nng_pipe_id(p) > 0);
- So(nng_pipe_get_bool(p, NNG_OPT_TLS_VERIFIED, &b) == 0);
- So(b == true);
- int i;
- So(nng_pipe_get_int(p, NNG_OPT_TLS_VERIFIED, &i) ==
- NNG_EBADTYPE);
- nng_msg_free(msg);
- });
-
- Convey("No delay option", {
- nng_socket s;
- nng_dialer d;
- nng_listener l;
- bool v;
- int x;
-
- So(nng_pair_open(&s) == 0);
- Reset({ nng_close(s); });
- So(nng_socket_get_bool(s, NNG_OPT_TCP_NODELAY, &v) == 0);
- So(v == true);
- So(nng_dialer_create(&d, s, "tcp://127.0.0.1:4999") == 0);
- So(nng_dialer_get_bool(d, NNG_OPT_TCP_NODELAY, &v) == 0);
- So(v == true);
- So(nng_dialer_set_bool(d, NNG_OPT_TCP_NODELAY, false) == 0);
- So(nng_dialer_get_bool(d, NNG_OPT_TCP_NODELAY, &v) == 0);
- So(v == false);
- So(nng_dialer_get_int(d, NNG_OPT_TCP_NODELAY, &x) ==
- NNG_EBADTYPE);
- x = 0;
- So(nng_dialer_set_int(d, NNG_OPT_TCP_NODELAY, x) ==
- NNG_EBADTYPE);
- // This assumes sizeof (bool) != sizeof (int)
- So(nng_dialer_set(d, NNG_OPT_TCP_NODELAY, &x, sizeof(x)) ==
- NNG_EINVAL);
-
- So(nng_listener_create(&l, s, "tcp://127.0.0.1:4999") == 0);
- So(nng_listener_get_bool(l, NNG_OPT_TCP_NODELAY, &v) == 0);
- So(v == true);
- x = 0;
- So(nng_listener_set_int(l, NNG_OPT_TCP_NODELAY, x) ==
- NNG_EBADTYPE);
- // This assumes sizeof (bool) != sizeof (int)
- So(nng_listener_set(l, NNG_OPT_TCP_NODELAY, &x, sizeof(x)) ==
- NNG_EINVAL);
-
- nng_dialer_close(d);
- nng_listener_close(l);
-
- // Make sure socket wide defaults apply.
- So(nng_socket_set_bool(s, NNG_OPT_TCP_NODELAY, true) == 0);
- v = false;
- So(nng_socket_get_bool(s, NNG_OPT_TCP_NODELAY, &v) == 0);
- So(v == true);
- So(nng_socket_set_bool(s, NNG_OPT_TCP_NODELAY, false) == 0);
- So(nng_dialer_create(&d, s, "tcp://127.0.0.1:4999") == 0);
- So(nng_dialer_get_bool(d, NNG_OPT_TCP_NODELAY, &v) == 0);
- So(v == false);
- });
-
- Convey("Keepalive option", {
- nng_socket s;
- nng_dialer d;
- nng_listener l;
- bool v;
- int x;
-
- So(nng_pair_open(&s) == 0);
- Reset({ nng_close(s); });
- So(nng_socket_get_bool(s, NNG_OPT_TCP_KEEPALIVE, &v) == 0);
- So(v == false);
- So(nng_dialer_create(&d, s, "tcp://127.0.0.1:4999") == 0);
- So(nng_dialer_get_bool(d, NNG_OPT_TCP_KEEPALIVE, &v) == 0);
- So(v == false);
- So(nng_dialer_set_bool(d, NNG_OPT_TCP_KEEPALIVE, true) == 0);
- So(nng_dialer_get_bool(d, NNG_OPT_TCP_KEEPALIVE, &v) == 0);
- So(v == true);
- So(nng_dialer_get_int(d, NNG_OPT_TCP_KEEPALIVE, &x) ==
- NNG_EBADTYPE);
- x = 1;
- So(nng_dialer_set_int(d, NNG_OPT_TCP_KEEPALIVE, x) ==
- NNG_EBADTYPE);
-
- So(nng_listener_create(&l, s, "tcp://127.0.0.1:4999") == 0);
- So(nng_listener_get_bool(l, NNG_OPT_TCP_KEEPALIVE, &v) == 0);
- So(v == false);
- x = 1;
- So(nng_listener_set_int(l, NNG_OPT_TCP_KEEPALIVE, x) ==
- NNG_EBADTYPE);
-
- nng_dialer_close(d);
- nng_listener_close(l);
-
- // Make sure socket wide defaults apply.
- So(nng_socket_set_bool(s, NNG_OPT_TCP_KEEPALIVE, false) == 0);
- v = true;
- So(nng_socket_get_bool(s, NNG_OPT_TCP_KEEPALIVE, &v) == 0);
- So(v == false);
- So(nng_socket_set_bool(s, NNG_OPT_TCP_KEEPALIVE, true) == 0);
- So(nng_dialer_create(&d, s, "tcp://127.0.0.1:4999") == 0);
- So(nng_dialer_get_bool(d, NNG_OPT_TCP_KEEPALIVE, &v) == 0);
- So(v == true);
- });
-})