generated from guanyuankai/bonus-edge-proxy
1736 lines
54 KiB
C
1736 lines
54 KiB
C
/*******************************************************************************
|
|
* Copyright (c) 2012, 2025 IBM Corp., Ian Craggs and others
|
|
*
|
|
* All rights reserved. This program and the accompanying materials
|
|
* are made available under the terms of the Eclipse Public License v2.0
|
|
* and Eclipse Distribution License v1.0 which accompany this distribution.
|
|
*
|
|
* The Eclipse Public License is available at
|
|
* https://www.eclipse.org/legal/epl-2.0/
|
|
* and the Eclipse Distribution License is available at
|
|
* http://www.eclipse.org/org/documents/edl-v10.php.
|
|
*
|
|
* Contributors:
|
|
* Allan Stockdill-Mander - initial API and implementation and/or initial documentation
|
|
* Ian Craggs - add SSL options NULL test
|
|
*******************************************************************************/
|
|
|
|
/**
|
|
* @file
|
|
* SSL tests for the Eclipse Paho MQTT C client
|
|
*/
|
|
|
|
#include "MQTTClient.h"
|
|
#include <string.h>
|
|
#include <stdlib.h>
|
|
|
|
#if defined(_WINDOWS)
|
|
#include <windows.h>
|
|
#include <openssl/applink.c>
|
|
#define MAXHOSTNAMELEN 256
|
|
#define snprintf _snprintf
|
|
#define setenv(a, b, c) _putenv_s(a, b)
|
|
#else
|
|
#include <sys/time.h>
|
|
#include <sys/socket.h>
|
|
#include <unistd.h>
|
|
#include <errno.h>
|
|
#endif
|
|
|
|
#if defined(IOS)
|
|
char skeytmp[1024];
|
|
char ckeytmp[1024];
|
|
char persistenceStore[1024];
|
|
#else
|
|
char* persistenceStore = NULL;
|
|
#endif
|
|
|
|
#define LOGA_DEBUG 0
|
|
#define LOGA_INFO 1
|
|
#include <stdarg.h>
|
|
#include <time.h>
|
|
#include <sys/timeb.h>
|
|
|
|
#define ARRAY_SIZE(a) (sizeof(a) / sizeof(a[0]))
|
|
|
|
void usage(void)
|
|
{
|
|
printf("Options:\n");
|
|
printf("\t--test_no <test_no> - Run test number <test_no>\n");
|
|
printf("\t--connection <mqtt URL> - Connect to <mqtt URL> for tests\n");
|
|
printf("\t--haconnections \"<mqtt URLs>\" - Use \"<mqtt URLs>\" as the list of servers for HA tests (space separated)\n");
|
|
printf("\t--client_key <key_file> - Use <key_file> as the client certificate for SSL authentication\n");
|
|
printf("\t--client_key_pass <password> - Use <password> to access the private key in the client certificate\n");
|
|
printf("\t--client_privatekey <file> - Client private key file if not in certificate file\n");
|
|
printf("\t--server_key <key_file> - Use <key_file> as the trusted certificate for server\n");
|
|
printf("\t--verbose - Enable verbose output \n");
|
|
printf("\tserver connection URLs should be in the form; (tcp|ssl)://hostname:port\n");
|
|
printf("\t--help - This help output\n");
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
struct Options
|
|
{
|
|
char connection[100];
|
|
char mutual_auth_connection[100]; /**< connection to system under test. */
|
|
char nocert_mutual_auth_connection[100];
|
|
char server_auth_connection[100];
|
|
char anon_connection[100];
|
|
char psk_connection[100];
|
|
char** haconnections; /**< connection to system under test. */
|
|
int hacount;
|
|
char* client_key_file;
|
|
char* client_key_pass;
|
|
char* server_key_file;
|
|
char* client_private_key_file;
|
|
int verbose;
|
|
int test_no;
|
|
int websockets;
|
|
} options =
|
|
{
|
|
"tls://localhost:18883",
|
|
"mqtts://localhost:18884",
|
|
"ssl://localhost:18887",
|
|
"mqtts://localhost:18885",
|
|
"ssl://localhost:18886",
|
|
"mqtts://localhost:18888",
|
|
NULL,
|
|
0,
|
|
"../../../test/ssl/client.pem",
|
|
NULL,
|
|
"../../../test/ssl/test-root-ca.crt",
|
|
NULL,
|
|
0,
|
|
0,
|
|
0,
|
|
};
|
|
|
|
|
|
char* test_map[] =
|
|
{
|
|
"none",
|
|
"1", // 1
|
|
"2a_s", // 2
|
|
"2a_m", // 3
|
|
"2b", // 4
|
|
"2c", // 5
|
|
"3a_s", // 6
|
|
"3a_m", // 7
|
|
"3b", // 8
|
|
"4s", // 9
|
|
"4m", // 10
|
|
"5a", // 11
|
|
"5b", // 12
|
|
"5c", // 13
|
|
};
|
|
|
|
|
|
void getopts(int argc, char** argv)
|
|
{
|
|
int count = 1;
|
|
|
|
while (count < argc)
|
|
{
|
|
if (strcmp(argv[count], "--help") == 0)
|
|
usage();
|
|
else if (strcmp(argv[count], "--test_no") == 0)
|
|
{
|
|
if (++count < argc)
|
|
{
|
|
int i;
|
|
|
|
for (i = 1; i < ARRAY_SIZE(test_map); ++i)
|
|
{
|
|
if (strcmp(argv[count], test_map[i]) == 0)
|
|
{
|
|
options.test_no = i;
|
|
break;
|
|
}
|
|
}
|
|
if (options.test_no == 0)
|
|
options.test_no = atoi(argv[count]);
|
|
|
|
}
|
|
else
|
|
usage();
|
|
}
|
|
else if (strcmp(argv[count], "--hostname") == 0)
|
|
{
|
|
if (++count < argc)
|
|
{
|
|
char* prefix = (options.websockets) ? "wss" : "ssl";
|
|
|
|
sprintf(options.connection, "%s://%s:18883", prefix, argv[count]);
|
|
printf("Setting connection to %s\n", options.connection);
|
|
sprintf(options.mutual_auth_connection, "%s://%s:18884", prefix, argv[count]);
|
|
printf("Setting mutual_auth_connection to %s\n", options.mutual_auth_connection);
|
|
sprintf(options.nocert_mutual_auth_connection, "%s://%s:18887", prefix, argv[count]);
|
|
printf("Setting nocert_mutual_auth_connection to %s\n",
|
|
options.nocert_mutual_auth_connection);
|
|
sprintf(options.server_auth_connection, "%s://%s:18885", prefix, argv[count]);
|
|
printf("Setting server_auth_connection to %s\n", options.server_auth_connection);
|
|
sprintf(options.anon_connection, "%s://%s:18886", prefix, argv[count]);
|
|
printf("Setting anon_connection to %s\n", options.anon_connection);
|
|
sprintf(options.psk_connection, "%s://%s:18888", prefix, argv[count]);
|
|
printf("Setting psk_connection to %s\n", options.psk_connection);
|
|
}
|
|
else
|
|
usage();
|
|
}
|
|
else if (strcmp(argv[count], "--haconnections") == 0)
|
|
{
|
|
if (++count < argc)
|
|
{
|
|
char* tok = strtok(argv[count], " ");
|
|
options.hacount = 0;
|
|
options.haconnections = malloc(sizeof(char*) * 5);
|
|
while (tok)
|
|
{
|
|
options.haconnections[options.hacount] = malloc(strlen(tok) + 1);
|
|
strcpy(options.haconnections[options.hacount], tok);
|
|
options.hacount++;
|
|
tok = strtok(NULL, " ");
|
|
}
|
|
}
|
|
else
|
|
usage();
|
|
}
|
|
else if (strcmp(argv[count], "--client_key") == 0)
|
|
{
|
|
if (++count < argc)
|
|
{
|
|
#if defined(IOS)
|
|
strcat(ckeytmp, getenv("HOME"));
|
|
strcat(ckeytmp, argv[count]);
|
|
options.client_key_file = ckeytmp;
|
|
#else
|
|
options.client_key_file = argv[count];
|
|
#endif
|
|
}
|
|
else
|
|
usage();
|
|
}
|
|
else if (strcmp(argv[count], "--client_privatekey") == 0)
|
|
{
|
|
if (++count < argc)
|
|
{
|
|
#if defined(IOS)
|
|
strcat(ckeytmp, getenv("HOME"));
|
|
strcat(ckeytmp, argv[count]);
|
|
options.client_private_key_file = ckeytmp;
|
|
#else
|
|
options.client_private_key_file = argv[count];
|
|
#endif
|
|
}
|
|
else
|
|
usage();
|
|
}
|
|
else if (strcmp(argv[count], "--client_key_pass") == 0)
|
|
{
|
|
if (++count < argc)
|
|
options.client_key_pass = argv[count];
|
|
else
|
|
usage();
|
|
}
|
|
else if (strcmp(argv[count], "--server_key") == 0)
|
|
{
|
|
if (++count < argc)
|
|
{
|
|
#if defined(IOS)
|
|
strcat(skeytmp, getenv("HOME"));
|
|
strcat(skeytmp, argv[count]);
|
|
options.server_key_file = skeytmp;
|
|
#else
|
|
options.server_key_file = argv[count];
|
|
#endif
|
|
}
|
|
else
|
|
usage();
|
|
}
|
|
else if (strcmp(argv[count], "--verbose") == 0)
|
|
{
|
|
options.verbose = 1;
|
|
printf("\nSetting verbose on\n");
|
|
}
|
|
else if (strcmp(argv[count], "--ws") == 0)
|
|
{
|
|
options.websockets = 1;
|
|
printf("\nSetting websockets on\n");
|
|
}
|
|
count++;
|
|
}
|
|
#if defined(IOS)
|
|
strcpy(persistenceStore, getenv("HOME"));
|
|
strcat(persistenceStore, "/Library/Caches");
|
|
#endif
|
|
}
|
|
|
|
void MyLog(int LOGA_level, char* format, ...)
|
|
{
|
|
static char msg_buf[256];
|
|
va_list args;
|
|
#if defined(_WIN32) || defined(_WINDOWS)
|
|
struct timeb ts;
|
|
#else
|
|
struct timeval ts;
|
|
#endif
|
|
struct tm timeinfo;
|
|
|
|
if (LOGA_level == LOGA_DEBUG && options.verbose == 0)
|
|
return;
|
|
|
|
#if defined(_WIN32) || defined(_WINDOWS)
|
|
ftime(&ts);
|
|
localtime_s(&timeinfo, &ts.time);
|
|
#else
|
|
gettimeofday(&ts, NULL);
|
|
localtime_r(&ts.tv_sec, &timeinfo);
|
|
#endif
|
|
strftime(msg_buf, 80, "%Y%m%d %H%M%S", &timeinfo);
|
|
|
|
#if defined(_WIN32) || defined(_WINDOWS)
|
|
sprintf(&msg_buf[strlen(msg_buf)], ".%.3hu ", ts.millitm);
|
|
#else
|
|
sprintf(&msg_buf[strlen(msg_buf)], ".%.3lu ", ts.tv_usec / 1000L);
|
|
#endif
|
|
|
|
va_start(args, format);
|
|
vsnprintf(&msg_buf[strlen(msg_buf)], sizeof(msg_buf) - strlen(msg_buf), format, args);
|
|
va_end(args);
|
|
|
|
printf("%s\n", msg_buf);
|
|
fflush(stdout);
|
|
}
|
|
|
|
|
|
#if defined(_WIN32) || defined(_WINDOWS)
|
|
#define mqsleep(A) Sleep(1000*A)
|
|
#define START_TIME_TYPE DWORD
|
|
static DWORD start_time = 0;
|
|
START_TIME_TYPE start_clock(void)
|
|
{
|
|
return GetTickCount();
|
|
}
|
|
#elif defined(AIX)
|
|
#define mqsleep sleep
|
|
#define START_TIME_TYPE struct timespec
|
|
START_TIME_TYPE start_clock(void)
|
|
{
|
|
static struct timespec start;
|
|
clock_gettime(CLOCK_REALTIME, &start);
|
|
return start;
|
|
}
|
|
#else
|
|
#define mqsleep sleep
|
|
#define START_TIME_TYPE struct timeval
|
|
/* TODO - unused - remove? static struct timeval start_time; */
|
|
START_TIME_TYPE start_clock(void)
|
|
{
|
|
struct timeval start_time;
|
|
gettimeofday(&start_time, NULL);
|
|
return start_time;
|
|
}
|
|
#endif
|
|
|
|
|
|
#if defined(_WIN32)
|
|
long elapsed(START_TIME_TYPE start_time)
|
|
{
|
|
return GetTickCount() - start_time;
|
|
}
|
|
#elif defined(AIX)
|
|
#define assert(a)
|
|
long elapsed(struct timespec start)
|
|
{
|
|
struct timespec now, res;
|
|
|
|
clock_gettime(CLOCK_REALTIME, &now);
|
|
ntimersub(now, start, res);
|
|
return (res.tv_sec)*1000L + (res.tv_nsec)/1000000L;
|
|
}
|
|
#else
|
|
long elapsed(START_TIME_TYPE start_time)
|
|
{
|
|
struct timeval now, res;
|
|
|
|
gettimeofday(&now, NULL);
|
|
timersub(&now, &start_time, &res);
|
|
return (res.tv_sec)*1000 + (res.tv_usec)/1000;
|
|
}
|
|
#endif
|
|
|
|
|
|
#define assert(a, b, c, d) myassert(__FILE__, __LINE__, a, b, c, d)
|
|
#define assert1(a, b, c, d, e) myassert(__FILE__, __LINE__, a, b, c, d, e)
|
|
|
|
|
|
int tests = 0;
|
|
int failures = 0;
|
|
FILE* xml;
|
|
START_TIME_TYPE global_start_time;
|
|
char output[3000];
|
|
char* cur_output = output;
|
|
|
|
|
|
void write_test_result(void)
|
|
{
|
|
long duration = elapsed(global_start_time);
|
|
|
|
fprintf(xml, " time=\"%ld.%.3ld\" >\n", duration / 1000, duration % 1000);
|
|
if (cur_output != output)
|
|
{
|
|
fprintf(xml, "%s", output);
|
|
cur_output = output;
|
|
}
|
|
fprintf(xml, "</testcase>\n");
|
|
}
|
|
|
|
|
|
int myassert(char* filename, int lineno, char* description, int value, char* format, ...)
|
|
{
|
|
++tests;
|
|
if (!value)
|
|
{
|
|
va_list args;
|
|
|
|
++failures;
|
|
printf("Assertion failed, file %s, line %d, description: %s\n", filename, lineno, description);
|
|
|
|
va_start(args, format);
|
|
vprintf(format, args);
|
|
va_end(args);
|
|
|
|
cur_output += sprintf(cur_output, "<failure type=\"%s\">file %s, line %d </failure>\n",
|
|
description, filename, lineno);
|
|
}
|
|
else
|
|
MyLog(LOGA_DEBUG, "Assertion succeeded, file %s, line %d, description: %s", filename, lineno, description);
|
|
return value;
|
|
}
|
|
|
|
|
|
/*********************************************************************
|
|
|
|
Test: single-threaded client
|
|
|
|
*********************************************************************/
|
|
void singleThread_sendAndReceive(MQTTClient* c, int qos, char* test_topic)
|
|
{
|
|
MQTTClient_deliveryToken dt;
|
|
MQTTClient_message pubmsg = MQTTClient_message_initializer;
|
|
MQTTClient_message* m = NULL;
|
|
char* topicName = NULL;
|
|
int topicLen;
|
|
int i = 0;
|
|
int iterations = 50;
|
|
int rc;
|
|
|
|
MyLog(LOGA_DEBUG, "%d messages at QoS %d", iterations, qos);
|
|
pubmsg.payload = "a much longer message that we can shorten to the extent that we need to payload up to 11";
|
|
pubmsg.payloadlen = 11;
|
|
pubmsg.qos = qos;
|
|
pubmsg.retained = 0;
|
|
|
|
for (i = 0; i< iterations; ++i)
|
|
{
|
|
if (i % 10 == 0)
|
|
rc = MQTTClient_publish(c, test_topic, pubmsg.payloadlen, pubmsg.payload, pubmsg.qos, pubmsg.retained, NULL);
|
|
else
|
|
rc = MQTTClient_publishMessage(c, test_topic, &pubmsg, &dt);
|
|
assert("Good rc from publish", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc);
|
|
|
|
if (qos > 0)
|
|
{
|
|
rc = MQTTClient_waitForCompletion(c, dt, 20000L);
|
|
assert("Good rc from waitforCompletion", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc);
|
|
}
|
|
|
|
rc = MQTTClient_receive(c, &topicName, &topicLen, &m, 10000);
|
|
assert("Good rc from receive", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc);
|
|
if (topicName)
|
|
{
|
|
MyLog(LOGA_DEBUG, "Message received on topic %s is %.*s", topicName, m->payloadlen, (char*)(m->payload));
|
|
if (pubmsg.payloadlen != m->payloadlen ||
|
|
memcmp(m->payload, pubmsg.payload, m->payloadlen) != 0)
|
|
{
|
|
failures++;
|
|
MyLog(LOGA_INFO, "Error: wrong data - received lengths %d %d", pubmsg.payloadlen, m->payloadlen);
|
|
break;
|
|
}
|
|
MQTTClient_free(topicName);
|
|
MQTTClient_freeMessage(&m);
|
|
}
|
|
else
|
|
printf("No message received within timeout period\n");
|
|
}
|
|
|
|
/* receive any outstanding messages */
|
|
MQTTClient_receive(c, &topicName, &topicLen, &m, 1000);
|
|
while (topicName)
|
|
{
|
|
printf("Message received on topic %s is %.*s.\n", topicName, m->payloadlen, (char*)(m->payload));
|
|
MQTTClient_free(topicName);
|
|
MQTTClient_freeMessage(&m);
|
|
MQTTClient_receive(c, &topicName, &topicLen, &m, 1000);
|
|
}
|
|
}
|
|
|
|
/*********************************************************************
|
|
|
|
Test: multi-threaded client using callbacks
|
|
|
|
*********************************************************************/
|
|
volatile int multiThread_arrivedcount = 0;
|
|
int multiThread_deliveryCompleted = 0;
|
|
MQTTClient_message multiThread_pubmsg = MQTTClient_message_initializer;
|
|
|
|
void multiThread_deliveryComplete(void* context, MQTTClient_deliveryToken dt)
|
|
{
|
|
++multiThread_deliveryCompleted;
|
|
}
|
|
|
|
int multiThread_messageArrived(void* context, char* topicName, int topicLen, MQTTClient_message* m)
|
|
{
|
|
++multiThread_arrivedcount;
|
|
MyLog(LOGA_DEBUG, "Callback: %d message received on topic %s is %.*s.",
|
|
multiThread_arrivedcount, topicName, m->payloadlen, (char*)(m->payload));
|
|
if (multiThread_pubmsg.payloadlen != m->payloadlen ||
|
|
memcmp(m->payload, multiThread_pubmsg.payload, m->payloadlen) != 0)
|
|
{
|
|
failures++;
|
|
MyLog(LOGA_INFO, "Error: wrong data received lengths %d %d\n", multiThread_pubmsg.payloadlen, m->payloadlen);
|
|
}
|
|
MQTTClient_free(topicName);
|
|
MQTTClient_freeMessage(&m);
|
|
return 1;
|
|
}
|
|
|
|
|
|
void multiThread_sendAndReceive(MQTTClient* c, int qos, char* test_topic)
|
|
{
|
|
MQTTClient_deliveryToken dt;
|
|
int i = 0;
|
|
int iterations = 50;
|
|
int rc = 0;
|
|
int wait_seconds = 0;
|
|
|
|
multiThread_deliveryCompleted = 0;
|
|
multiThread_arrivedcount = 0;
|
|
|
|
MyLog(LOGA_DEBUG, "%d messages at QoS %d", iterations, qos);
|
|
multiThread_pubmsg.payload = "a much longer message that we can shorten to the extent that we need to";
|
|
multiThread_pubmsg.payloadlen = 27;
|
|
multiThread_pubmsg.qos = qos;
|
|
multiThread_pubmsg.retained = 0;
|
|
|
|
for (i = 1; i <= iterations; ++i)
|
|
{
|
|
if (i % 10 == 0)
|
|
rc = MQTTClient_publish(c, test_topic, multiThread_pubmsg.payloadlen, multiThread_pubmsg.payload,
|
|
multiThread_pubmsg.qos, multiThread_pubmsg.retained, NULL);
|
|
else
|
|
rc = MQTTClient_publishMessage(c, test_topic, &multiThread_pubmsg, &dt);
|
|
assert("Good rc from publish", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc);
|
|
|
|
#if defined(_WIN32)
|
|
Sleep(100);
|
|
#else
|
|
usleep(100000L);
|
|
#endif
|
|
|
|
wait_seconds = 20;
|
|
while ((multiThread_arrivedcount < i) && (wait_seconds-- > 0))
|
|
{
|
|
MyLog(LOGA_DEBUG, "Arrived %d count %d", multiThread_arrivedcount, i);
|
|
#if defined(_WIN32)
|
|
Sleep(1000);
|
|
#else
|
|
usleep(1000000L);
|
|
#endif
|
|
}
|
|
assert("Message Arrived", wait_seconds > 0,
|
|
"Time out waiting for message %d\n", i );
|
|
}
|
|
if (qos > 0)
|
|
{
|
|
/* MQ Telemetry can send a message to a subscriber before the server has
|
|
completed the QoS 2 handshake with the publisher. For QoS 1 and 2,
|
|
allow time for the final delivery complete callback before checking
|
|
that all expected callbacks have been made */
|
|
wait_seconds = 10;
|
|
while ((multiThread_deliveryCompleted < iterations) && (wait_seconds-- > 0))
|
|
{
|
|
MyLog(LOGA_DEBUG, "Delivery Completed %d count %d", multiThread_deliveryCompleted, i);
|
|
#if defined(_WIN32)
|
|
Sleep(1000);
|
|
#else
|
|
usleep(1000000L);
|
|
#endif
|
|
}
|
|
assert("All Deliveries Complete", wait_seconds > 0,
|
|
"Number of deliveryCompleted callbacks was %d\n",
|
|
multiThread_deliveryCompleted);
|
|
}
|
|
}
|
|
|
|
|
|
/*********************************************************************
|
|
|
|
Test1: SSL connection to non SSL MQTT server
|
|
|
|
*********************************************************************/
|
|
int test1(struct Options options)
|
|
{
|
|
char* testname = "test1";
|
|
char* test_topic = "C client SSL test1";
|
|
int subsqos = 2;
|
|
MQTTClient c;
|
|
MQTTClient_connectOptions opts = MQTTClient_connectOptions_initializer;
|
|
MQTTClient_willOptions wopts = MQTTClient_willOptions_initializer;
|
|
MQTTClient_SSLOptions sslopts = MQTTClient_SSLOptions_initializer;
|
|
int rc = 0;
|
|
|
|
failures = 0;
|
|
MyLog(LOGA_INFO, "Starting SSL test 1 - connection to nonSSL MQTT server");
|
|
fprintf(xml, "<testcase classname=\"test3\" name=\"SSL connect fail to nonSSL MQTT server\"");
|
|
global_start_time = start_clock();
|
|
|
|
rc = MQTTClient_create(&c, "a b://wrong protocol", "test1", MQTTCLIENT_PERSISTENCE_DEFAULT, persistenceStore);
|
|
assert("bad rc from create", rc == MQTTCLIENT_BAD_PROTOCOL, "rc was %d \n", rc);
|
|
|
|
rc = MQTTClient_create(&c, options.connection, "test1", MQTTCLIENT_PERSISTENCE_DEFAULT, persistenceStore);
|
|
if (!(assert("good rc from create", rc == MQTTCLIENT_SUCCESS, "rc was %d \n", rc)))
|
|
goto exit;
|
|
|
|
opts.keepAliveInterval = 20;
|
|
opts.cleansession = 1;
|
|
opts.username = "testuser";
|
|
opts.password = "testpassword";
|
|
if (options.haconnections != NULL)
|
|
{
|
|
opts.serverURIs = options.haconnections;
|
|
opts.serverURIcount = options.hacount;
|
|
}
|
|
|
|
/* Try with ssl opts == NULL - should get error */
|
|
rc = MQTTClient_connect(c, &opts);
|
|
assert("Connect should fail", rc == MQTTCLIENT_NULL_PARAMETER, "rc was %d ", rc);
|
|
|
|
opts.ssl = &sslopts;
|
|
if (options.server_key_file != NULL)
|
|
opts.ssl->trustStore = options.server_key_file; /*file of certificates trusted by client*/
|
|
|
|
MyLog(LOGA_DEBUG, "Connecting");
|
|
|
|
rc = MQTTClient_connect(c, &opts);
|
|
if (!(assert("Connect should fail", rc == MQTTCLIENT_FAILURE, "rc was %d ", rc)))
|
|
goto exit;
|
|
|
|
exit:
|
|
MQTTClient_destroy(&c);
|
|
MyLog(LOGA_INFO, "%s: test %s. %d tests run, %d failures.",
|
|
(failures == 0) ? "passed" : "failed", testname, tests, failures);
|
|
write_test_result();
|
|
return failures;
|
|
}
|
|
|
|
|
|
/*********************************************************************
|
|
|
|
Test2a: Mutual SSL Authentication - Certificates in place on client and server - single threaded
|
|
|
|
*********************************************************************/
|
|
|
|
int test2a_s(struct Options options)
|
|
{
|
|
char* testname = "test2a_s";
|
|
char* test_topic = "C client test2a_s";
|
|
int subsqos = 2;
|
|
MQTTClient c;
|
|
MQTTClient_connectOptions opts = MQTTClient_connectOptions_initializer;
|
|
MQTTClient_willOptions wopts = MQTTClient_willOptions_initializer;
|
|
MQTTClient_SSLOptions sslopts = MQTTClient_SSLOptions_initializer;
|
|
int rc = 0;
|
|
|
|
failures = 0;
|
|
MyLog(LOGA_INFO, "Starting test 2a_s - Mutual SSL authentication - single threaded client using receive");
|
|
fprintf(xml, "<testcase classname=\"test3\" name=\"test 2a_s\"");
|
|
global_start_time = start_clock();
|
|
|
|
rc = MQTTClient_create(&c, options.server_auth_connection, "test2a_s", MQTTCLIENT_PERSISTENCE_DEFAULT, persistenceStore);
|
|
if (!(assert("good rc from create", rc == MQTTCLIENT_SUCCESS, "rc was %d\n", rc)))
|
|
goto exit;
|
|
|
|
opts.keepAliveInterval = 20;
|
|
opts.cleansession = 1;
|
|
opts.username = "testuser";
|
|
opts.password = "testpassword";
|
|
if (options.haconnections != NULL) {
|
|
opts.serverURIs = options.haconnections;
|
|
opts.serverURIcount = options.hacount;
|
|
}
|
|
|
|
opts.ssl = &sslopts;
|
|
if (options.server_key_file)
|
|
opts.ssl->trustStore = options.server_key_file; /*file of certificates trusted by client*/
|
|
opts.ssl->keyStore = options.client_key_file; /*file of certificate for client to present to server*/
|
|
if (options.client_key_pass)
|
|
opts.ssl->privateKeyPassword = options.client_key_pass;
|
|
if (options.client_private_key_file)
|
|
opts.ssl->privateKey = options.client_private_key_file;
|
|
opts.ssl->verify = 1;
|
|
|
|
MyLog(LOGA_DEBUG, "Connecting");
|
|
|
|
rc = MQTTClient_connect(c, &opts);
|
|
if (!(assert("Good rc from connect", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
|
|
rc = MQTTClient_subscribe(c, test_topic, subsqos);
|
|
if (!(assert("Good rc from subscribe", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
|
|
singleThread_sendAndReceive(c, 0, test_topic);
|
|
singleThread_sendAndReceive(c, 1, test_topic);
|
|
singleThread_sendAndReceive(c, 2, test_topic);
|
|
|
|
MyLog(LOGA_DEBUG, "Stopping\n");
|
|
|
|
rc = MQTTClient_unsubscribe(c, test_topic);
|
|
if (!(assert("Unsubscribe successful", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
rc = MQTTClient_disconnect(c, 0);
|
|
if (!(assert("Disconnect successful", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
|
|
/* Just to make sure we can connect again */
|
|
rc = MQTTClient_connect(c, &opts);
|
|
if (!(assert("Connect successful", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
rc = MQTTClient_disconnect(c, 0);
|
|
if (!(assert("Disconnect successful", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
|
|
exit:
|
|
MQTTClient_destroy(&c);
|
|
MyLog(LOGA_INFO, "%s: test %s. %d tests run, %d failures.",
|
|
(failures == 0) ? "passed" : "failed", testname, tests, failures);
|
|
write_test_result();
|
|
return failures;
|
|
}
|
|
|
|
/*********************************************************************
|
|
|
|
Test2a: Mutual SSL Authentication - Certificates in place on client and server - multi threaded
|
|
|
|
*********************************************************************/
|
|
|
|
int test2a_m(struct Options options)
|
|
{
|
|
char* testname = "test2a_m";
|
|
char* test_topic = "C client test2a_m";
|
|
int subsqos = 2;
|
|
/* TODO - usused - remove ? MQTTClient_deliveryToken* dt = NULL; */
|
|
MQTTClient c;
|
|
MQTTClient_connectOptions opts = MQTTClient_connectOptions_initializer;
|
|
MQTTClient_willOptions wopts = MQTTClient_willOptions_initializer;
|
|
MQTTClient_SSLOptions sslopts = MQTTClient_SSLOptions_initializer;
|
|
int rc = 0;
|
|
|
|
failures = 0;
|
|
MyLog(LOGA_INFO, "Starting test 2a_m - Mutual SSL authentication - multi-threaded client using callbacks");
|
|
fprintf(xml, "<testcase classname=\"test3\" name=\"test 2a_m\"");
|
|
global_start_time = start_clock();
|
|
|
|
rc = MQTTClient_create(&c, options.mutual_auth_connection, "test2a_m", MQTTCLIENT_PERSISTENCE_DEFAULT, persistenceStore);
|
|
if (!(assert("good rc from create", rc == MQTTCLIENT_SUCCESS, "rc was %d\n", rc)))
|
|
goto exit;
|
|
|
|
opts.keepAliveInterval = 20;
|
|
opts.cleansession = 1;
|
|
opts.username = "testuser";
|
|
opts.password = "testpassword";
|
|
if (options.haconnections != NULL)
|
|
{
|
|
opts.serverURIs = options.haconnections;
|
|
opts.serverURIcount = options.hacount;
|
|
}
|
|
|
|
opts.ssl = &sslopts;
|
|
if (options.server_key_file)
|
|
opts.ssl->trustStore = options.server_key_file; /*file of certificates trusted by client*/
|
|
opts.ssl->keyStore = options.client_key_file; /*file of certificate for client to present to server*/
|
|
if (options.client_key_pass)
|
|
opts.ssl->privateKeyPassword = options.client_key_pass;
|
|
if (options.client_private_key_file)
|
|
opts.ssl->privateKey = options.client_private_key_file;
|
|
//opts.ssl->enabledCipherSuites = "DEFAULT";
|
|
//opts.ssl->enabledServerCertAuth = 1;
|
|
|
|
rc = MQTTClient_setCallbacks(c, NULL, NULL, multiThread_messageArrived, multiThread_deliveryComplete);
|
|
if (!(assert("Good rc from setCallbacks", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
|
|
MyLog(LOGA_DEBUG, "Connecting");
|
|
|
|
rc = MQTTClient_connect(c, &opts);
|
|
if (!(assert("Good rc from connect", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
|
|
rc = MQTTClient_subscribe(c, test_topic, subsqos);
|
|
if (!(assert("Good rc from subscribe", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
|
|
multiThread_sendAndReceive(c, 0, test_topic);
|
|
multiThread_sendAndReceive(c, 1, test_topic);
|
|
multiThread_sendAndReceive(c, 2, test_topic);
|
|
|
|
MyLog(LOGA_DEBUG, "Stopping");
|
|
|
|
rc = MQTTClient_unsubscribe(c, test_topic);
|
|
if (!(assert("Unsubscribe successful", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
rc = MQTTClient_disconnect(c, 0);
|
|
if (!(assert("Disconnect successful", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
|
|
exit:
|
|
MQTTClient_destroy(&c);
|
|
MyLog(LOGA_INFO, "%s: test %s. %d tests run, %d failures.",
|
|
(failures == 0) ? "passed" : "failed", testname, tests, failures);
|
|
write_test_result();
|
|
return failures;
|
|
}
|
|
|
|
/*********************************************************************
|
|
|
|
Test2b: Mutual SSL Authentication - Server does not have Client cert, connection fails
|
|
|
|
*********************************************************************/
|
|
int test2b(struct Options options)
|
|
{
|
|
char* testname = "test2b";
|
|
char* test_topic = "C client test2b";
|
|
int subsqos = 2;
|
|
MQTTClient c;
|
|
MQTTClient_connectOptions opts = MQTTClient_connectOptions_initializer;
|
|
MQTTClient_willOptions wopts = MQTTClient_willOptions_initializer;
|
|
MQTTClient_SSLOptions sslopts = MQTTClient_SSLOptions_initializer;
|
|
int rc = 0;
|
|
|
|
failures = 0;
|
|
MyLog(LOGA_INFO, "Starting test 2b - connection to SSL MQTT server with clientauth=req but server does not have client cert");
|
|
fprintf(xml, "<testcase classname=\"test3\" name=\"test 2b\"");
|
|
global_start_time = start_clock();
|
|
|
|
rc = MQTTClient_create(&c, options.nocert_mutual_auth_connection, "test2b", MQTTCLIENT_PERSISTENCE_DEFAULT, persistenceStore);
|
|
if (!(assert("good rc from create", rc == MQTTCLIENT_SUCCESS, "rc was %d\n", rc)))
|
|
goto exit;
|
|
|
|
opts.keepAliveInterval = 20;
|
|
opts.cleansession = 1;
|
|
opts.username = "testuser";
|
|
opts.password = "testpassword";
|
|
if (options.haconnections != NULL)
|
|
{
|
|
opts.serverURIs = options.haconnections;
|
|
opts.serverURIcount = options.hacount;
|
|
}
|
|
|
|
opts.ssl = &sslopts;
|
|
if (options.server_key_file)
|
|
opts.ssl->trustStore = options.server_key_file; /*file of certificates trusted by client*/
|
|
opts.ssl->keyStore = options.client_key_file; /*file of certificate for client to present to server*/
|
|
if (options.client_key_pass)
|
|
opts.ssl->privateKeyPassword = options.client_key_pass;
|
|
if (options.client_private_key_file)
|
|
opts.ssl->privateKey = options.client_private_key_file;
|
|
//opts.ssl->enabledCipherSuites = "DEFAULT";
|
|
//opts.ssl->enabledServerCertAuth = 0;
|
|
|
|
MyLog(LOGA_DEBUG, "Connecting");
|
|
|
|
rc = MQTTClient_connect(c, &opts);
|
|
if (!(assert("Bad rc from connect", rc == MQTTCLIENT_FAILURE, "rc was %d\n", rc)))
|
|
goto exit;
|
|
|
|
exit:
|
|
MQTTClient_destroy(&c);
|
|
MyLog(LOGA_INFO, "%s: test %s. %d tests run, %d failures.",
|
|
(failures == 0) ? "passed" : "failed", testname, tests, failures);
|
|
write_test_result();
|
|
return failures;
|
|
}
|
|
|
|
/*********************************************************************
|
|
|
|
Test2c: Mutual SSL Authentication - Client does not have Server cert
|
|
|
|
*********************************************************************/
|
|
int test2c(struct Options options)
|
|
{
|
|
char* testname = "test2c";
|
|
char* test_topic = "C client test2c";
|
|
int subsqos = 2;
|
|
MQTTClient c;
|
|
MQTTClient_connectOptions opts = MQTTClient_connectOptions_initializer;
|
|
MQTTClient_willOptions wopts = MQTTClient_willOptions_initializer;
|
|
MQTTClient_SSLOptions sslopts = MQTTClient_SSLOptions_initializer;
|
|
int rc = 0;
|
|
|
|
failures = 0;
|
|
MyLog(LOGA_INFO, "Starting test 2c - connection to SSL MQTT server, server auth enabled but unknown cert");
|
|
fprintf(xml, "<testcase classname=\"test3\" name=\"test 2c\"");
|
|
global_start_time = start_clock();
|
|
|
|
rc = MQTTClient_create(&c, options.mutual_auth_connection, "test2c", MQTTCLIENT_PERSISTENCE_DEFAULT, persistenceStore);
|
|
if (!(assert("good rc from create", rc == MQTTCLIENT_SUCCESS, "rc was %d\n", rc)))
|
|
goto exit;
|
|
|
|
opts.keepAliveInterval = 20;
|
|
opts.cleansession = 1;
|
|
opts.username = "testuser";
|
|
opts.password = "testpassword";
|
|
if (options.haconnections != NULL)
|
|
{
|
|
opts.serverURIs = options.haconnections;
|
|
opts.serverURIcount = options.hacount;
|
|
}
|
|
|
|
opts.ssl = &sslopts;
|
|
//if (options.server_key_file)
|
|
// opts.ssl->trustStore = options.server_key_file; /*file of certificates trusted by client*/
|
|
opts.ssl->keyStore = options.client_key_file; /*file of certificate for client to present to server*/
|
|
if (options.client_key_pass)
|
|
opts.ssl->privateKeyPassword = options.client_key_pass;
|
|
if (options.client_private_key_file)
|
|
opts.ssl->privateKey = options.client_private_key_file;
|
|
//opts.ssl->enabledCipherSuites = "DEFAULT";
|
|
//opts.ssl->enabledServerCertAuth = 0;
|
|
|
|
MyLog(LOGA_DEBUG, "Connecting");
|
|
|
|
rc = MQTTClient_connect(c, &opts);
|
|
if (!(assert("Good rc from connect", rc == MQTTCLIENT_FAILURE, "rc was %d", rc)))
|
|
goto exit;
|
|
|
|
exit:
|
|
MQTTClient_destroy(&c);
|
|
MyLog(LOGA_INFO, "%s: test %s. %d tests run, %d failures.",
|
|
(failures == 0) ? "passed" : "failed", testname, tests, failures);
|
|
write_test_result();
|
|
return failures;
|
|
}
|
|
|
|
/*********************************************************************
|
|
|
|
Test2e: Mutual SSL Authentication - high availability
|
|
|
|
*********************************************************************/
|
|
|
|
int test2e_s(struct Options options)
|
|
{
|
|
char* testname = "test2e_s";
|
|
char* test_topic = "C client test2e_s";
|
|
int subsqos = 2;
|
|
MQTTClient c;
|
|
MQTTClient_connectOptions opts = MQTTClient_connectOptions_initializer;
|
|
MQTTClient_willOptions wopts = MQTTClient_willOptions_initializer;
|
|
MQTTClient_SSLOptions sslopts = MQTTClient_SSLOptions_initializer;
|
|
char* uris[2] = {"wrong", options.mutual_auth_connection};
|
|
int rc = 0;
|
|
|
|
failures = 0;
|
|
MyLog(LOGA_INFO, "Starting test 2e_s - Mutual SSL authentication - HA");
|
|
fprintf(xml, "<testcase classname=\"test3\" name=\"test 2e_s\"");
|
|
global_start_time = start_clock();
|
|
|
|
rc = MQTTClient_create(&c, "not used", "test2e_s", MQTTCLIENT_PERSISTENCE_DEFAULT, persistenceStore);
|
|
if (!(assert("good rc from create", rc == MQTTCLIENT_SUCCESS, "rc was %d\n", rc)))
|
|
goto exit;
|
|
|
|
opts.keepAliveInterval = 20;
|
|
opts.cleansession = 1;
|
|
opts.username = "testuser";
|
|
opts.password = "testpassword";
|
|
opts.serverURIs = uris;
|
|
opts.serverURIcount = 2;
|
|
|
|
opts.ssl = &sslopts;
|
|
if (options.server_key_file)
|
|
opts.ssl->trustStore = options.server_key_file; /*file of certificates trusted by client*/
|
|
opts.ssl->keyStore = options.client_key_file; /*file of certificate for client to present to server*/
|
|
if (options.client_key_pass)
|
|
opts.ssl->privateKeyPassword = options.client_key_pass;
|
|
if (options.client_private_key_file)
|
|
opts.ssl->privateKey = options.client_private_key_file;
|
|
opts.ssl->verify = 1;
|
|
|
|
MyLog(LOGA_DEBUG, "Connecting");
|
|
|
|
rc = MQTTClient_connect(c, &opts);
|
|
if (!(assert("Good rc from connect", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
|
|
rc = MQTTClient_subscribe(c, test_topic, subsqos);
|
|
if (!(assert("Good rc from subscribe", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
|
|
singleThread_sendAndReceive(c, 0, test_topic);
|
|
singleThread_sendAndReceive(c, 1, test_topic);
|
|
singleThread_sendAndReceive(c, 2, test_topic);
|
|
|
|
MyLog(LOGA_DEBUG, "Stopping\n");
|
|
|
|
rc = MQTTClient_unsubscribe(c, test_topic);
|
|
if (!(assert("Unsubscribe successful", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
rc = MQTTClient_disconnect(c, 0);
|
|
if (!(assert("Disconnect successful", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
|
|
/* Just to make sure we can connect again */
|
|
rc = MQTTClient_connect(c, &opts);
|
|
if (!(assert("Connect successful", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
rc = MQTTClient_disconnect(c, 0);
|
|
if (!(assert("Disconnect successful", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
|
|
exit:
|
|
MQTTClient_destroy(&c);
|
|
MyLog(LOGA_INFO, "%s: test %s. %d tests run, %d failures.",
|
|
(failures == 0) ? "passed" : "failed", testname, tests, failures);
|
|
write_test_result();
|
|
return failures;
|
|
}
|
|
|
|
/*********************************************************************
|
|
|
|
Test3a: Server Authentication - server certificate in client trust store - single threaded
|
|
|
|
*********************************************************************/
|
|
|
|
int test3a_s(struct Options options)
|
|
{
|
|
char* testname = "test3a_s";
|
|
char* test_topic = "C client test3a_s";
|
|
int subsqos = 2;
|
|
MQTTClient c;
|
|
MQTTClient_connectOptions opts = MQTTClient_connectOptions_initializer;
|
|
MQTTClient_willOptions wopts = MQTTClient_willOptions_initializer;
|
|
MQTTClient_SSLOptions sslopts = MQTTClient_SSLOptions_initializer;
|
|
int rc = 0;
|
|
|
|
failures = 0;
|
|
MyLog(LOGA_INFO, "Starting test 3a_s - Server authentication - single threaded client using receive");
|
|
fprintf(xml, "<testcase classname=\"test3\" name=\"test 3a_s\"");
|
|
global_start_time = start_clock();
|
|
|
|
rc = MQTTClient_create(&c, options.server_auth_connection, "test3a_s", MQTTCLIENT_PERSISTENCE_DEFAULT, persistenceStore);
|
|
if (!(assert("good rc from create", rc == MQTTCLIENT_SUCCESS, "rc was %d\n", rc)))
|
|
goto exit;
|
|
|
|
opts.keepAliveInterval = 20;
|
|
opts.cleansession = 1;
|
|
opts.username = "testuser";
|
|
opts.password = "testpassword";
|
|
if (options.haconnections != NULL)
|
|
{
|
|
opts.serverURIs = options.haconnections;
|
|
opts.serverURIcount = options.hacount;
|
|
}
|
|
|
|
opts.ssl = &sslopts;
|
|
if (options.server_key_file != NULL)
|
|
opts.ssl->trustStore = options.server_key_file; /*file of certificates trusted by client*/
|
|
|
|
MyLog(LOGA_DEBUG, "Connecting");
|
|
|
|
rc = MQTTClient_connect(c, &opts);
|
|
if (!(assert("Good rc from connect", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
|
|
rc = MQTTClient_subscribe(c, test_topic, subsqos);
|
|
if (!(assert("Good rc from subscribe", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
|
|
singleThread_sendAndReceive(c, 0, test_topic);
|
|
singleThread_sendAndReceive(c, 1, test_topic);
|
|
singleThread_sendAndReceive(c, 2, test_topic);
|
|
|
|
MyLog(LOGA_DEBUG, "Stopping\n");
|
|
|
|
rc = MQTTClient_unsubscribe(c, test_topic);
|
|
if (!(assert("Unsubscribe successful", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
rc = MQTTClient_disconnect(c, 0);
|
|
if (!(assert("Disconnect successful", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
|
|
/* Just to make sure we can connect again */
|
|
|
|
rc = MQTTClient_connect(c, &opts);
|
|
if (!(assert("Connect successful", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
rc = MQTTClient_disconnect(c, 0);
|
|
if (!(assert("Disconnect successful", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
|
|
exit:
|
|
MQTTClient_destroy(&c);
|
|
MyLog(LOGA_INFO, "%s: test %s. %d tests run, %d failures.",
|
|
(failures == 0) ? "passed" : "failed", testname, tests, failures);
|
|
write_test_result();
|
|
return failures;
|
|
}
|
|
|
|
/*********************************************************************
|
|
|
|
Test3a: Server Authentication - server certificate in client trust store - multi threaded
|
|
|
|
*********************************************************************/
|
|
|
|
int test3a_m(struct Options options)
|
|
{
|
|
char* testname = "test3a_m";
|
|
char* test_topic = "C client test3a_m";
|
|
int subsqos = 2;
|
|
MQTTClient c;
|
|
MQTTClient_connectOptions opts = MQTTClient_connectOptions_initializer;
|
|
MQTTClient_willOptions wopts = MQTTClient_willOptions_initializer;
|
|
MQTTClient_SSLOptions sslopts = MQTTClient_SSLOptions_initializer;
|
|
int rc = 0;
|
|
|
|
failures = 0;
|
|
MyLog(LOGA_INFO, "Starting test 3a_m - Server authentication - multi-threaded client using callbacks");
|
|
fprintf(xml, "<testcase classname=\"test3\" name=\"test 3a_m\"");
|
|
global_start_time = start_clock();
|
|
|
|
rc = MQTTClient_create(&c, options.server_auth_connection, "test3a_m", MQTTCLIENT_PERSISTENCE_DEFAULT, persistenceStore);
|
|
if (!(assert("good rc from create", rc == MQTTCLIENT_SUCCESS, "rc was %d\n", rc)))
|
|
goto exit;
|
|
|
|
opts.keepAliveInterval = 20;
|
|
opts.cleansession = 1;
|
|
opts.username = "testuser";
|
|
opts.password = "testpassword";
|
|
if (options.haconnections != NULL)
|
|
{
|
|
opts.serverURIs = options.haconnections;
|
|
opts.serverURIcount = options.hacount;
|
|
}
|
|
|
|
opts.ssl = &sslopts;
|
|
if (options.server_key_file != NULL)
|
|
opts.ssl->trustStore = options.server_key_file; /*file of certificates trusted by client*/
|
|
|
|
rc = MQTTClient_setCallbacks(c, NULL, NULL, multiThread_messageArrived, multiThread_deliveryComplete);
|
|
if (!(assert("Good rc from setCallbacks", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
|
|
MyLog(LOGA_DEBUG, "Connecting");
|
|
|
|
rc = MQTTClient_connect(c, &opts);
|
|
if (!(assert("Good rc from connect", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
|
|
rc = MQTTClient_subscribe(c, test_topic, subsqos);
|
|
if (!(assert("Good rc from subscribe", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
|
|
multiThread_sendAndReceive(c, 0, test_topic);
|
|
multiThread_sendAndReceive(c, 1, test_topic);
|
|
multiThread_sendAndReceive(c, 2, test_topic);
|
|
|
|
MyLog(LOGA_DEBUG, "Stopping\n");
|
|
|
|
rc = MQTTClient_unsubscribe(c, test_topic);
|
|
if (!(assert("Unsubscribe successful", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
rc = MQTTClient_disconnect(c, 0);
|
|
if (!(assert("Disconnect successful", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
|
|
exit:
|
|
MQTTClient_destroy(&c);
|
|
MyLog(LOGA_INFO, "%s: test %s. %d tests run, %d failures.",
|
|
(failures == 0) ? "passed" : "failed", testname, tests, failures);
|
|
write_test_result();
|
|
return failures;
|
|
}
|
|
|
|
/*********************************************************************
|
|
|
|
Test3b: Server Authentication - Client does not have server cert
|
|
|
|
*********************************************************************/
|
|
int test3b(struct Options options)
|
|
{
|
|
char* testname = "test3b";
|
|
char* test_topic = "C client test3b";
|
|
int subsqos = 2;
|
|
MQTTClient c;
|
|
MQTTClient_connectOptions opts = MQTTClient_connectOptions_initializer;
|
|
MQTTClient_willOptions wopts = MQTTClient_willOptions_initializer;
|
|
MQTTClient_SSLOptions sslopts = MQTTClient_SSLOptions_initializer;
|
|
int rc = 0;
|
|
|
|
failures = 0;
|
|
MyLog(LOGA_INFO, "Starting test 3b - connection to SSL MQTT server with clientauth=opt but client does not have server cert");
|
|
fprintf(xml, "<testcase classname=\"test3\" name=\"test 3b\"");
|
|
global_start_time = start_clock();
|
|
|
|
rc = MQTTClient_create(&c, options.server_auth_connection, "test3b", MQTTCLIENT_PERSISTENCE_DEFAULT, persistenceStore);
|
|
if (!(assert("good rc from create", rc == MQTTCLIENT_SUCCESS, "rc was %d\n", rc)))
|
|
goto exit;
|
|
|
|
opts.keepAliveInterval = 20;
|
|
opts.cleansession = 1;
|
|
opts.username = "testuser";
|
|
opts.password = "testpassword";
|
|
if (options.haconnections != NULL)
|
|
{
|
|
opts.serverURIs = options.haconnections;
|
|
opts.serverURIcount = options.hacount;
|
|
}
|
|
|
|
opts.ssl = &sslopts;
|
|
|
|
MyLog(LOGA_DEBUG, "Connecting");
|
|
|
|
rc = MQTTClient_connect(c, &opts);
|
|
if (!(assert("Bad rc from connect", rc == MQTTCLIENT_FAILURE, "rc was %d", rc)))
|
|
goto exit;
|
|
|
|
exit:
|
|
MQTTClient_destroy(&c);
|
|
MyLog(LOGA_INFO, "%s: test %s. %d tests run, %d failures.",
|
|
(failures == 0) ? "passed" : "failed", testname, tests, failures);
|
|
write_test_result();
|
|
return failures;
|
|
}
|
|
|
|
/*********************************************************************
|
|
|
|
Test4_s: Accept invalid server certificates - single threaded
|
|
|
|
*********************************************************************/
|
|
|
|
int test4_s(struct Options options)
|
|
{
|
|
char* testname = "test4_s";
|
|
char* test_topic = "C client test4_s";
|
|
int subsqos = 2;
|
|
MQTTClient c;
|
|
MQTTClient_connectOptions opts = MQTTClient_connectOptions_initializer;
|
|
MQTTClient_willOptions wopts = MQTTClient_willOptions_initializer;
|
|
MQTTClient_SSLOptions sslopts = MQTTClient_SSLOptions_initializer;
|
|
int rc = 0;
|
|
|
|
failures = 0;
|
|
MyLog(LOGA_INFO, "Starting test 4_s - accept invalid server certificates - single threaded");
|
|
fprintf(xml, "<testcase classname=\"test3\" name=\"test 4_s\"");
|
|
global_start_time = start_clock();
|
|
|
|
rc = MQTTClient_create(&c, options.server_auth_connection, "test4_s", MQTTCLIENT_PERSISTENCE_DEFAULT, persistenceStore);
|
|
if (!(assert("good rc from create", rc == MQTTCLIENT_SUCCESS, "rc was %d\n", rc)))
|
|
goto exit;
|
|
|
|
opts.keepAliveInterval = 20;
|
|
opts.cleansession = 1;
|
|
opts.username = "testuser";
|
|
opts.password = "testpassword";
|
|
if (options.haconnections != NULL)
|
|
{
|
|
opts.serverURIs = options.haconnections;
|
|
opts.serverURIcount = options.hacount;
|
|
}
|
|
|
|
opts.ssl = &sslopts;
|
|
opts.ssl->enableServerCertAuth = 0;
|
|
|
|
MyLog(LOGA_DEBUG, "Connecting");
|
|
|
|
rc = MQTTClient_connect(c, &opts);
|
|
if (!(assert("Good rc from connect", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
rc = MQTTClient_subscribe(c, test_topic, subsqos);
|
|
if (!(assert("Good rc from subscribe", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
|
|
singleThread_sendAndReceive(c, 0, test_topic);
|
|
singleThread_sendAndReceive(c, 1, test_topic);
|
|
singleThread_sendAndReceive(c, 2, test_topic);
|
|
|
|
MyLog(LOGA_DEBUG, "Stopping\n");
|
|
|
|
rc = MQTTClient_unsubscribe(c, test_topic);
|
|
if (!(assert("Unsubscribe successful", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
rc = MQTTClient_disconnect(c, 0);
|
|
if (!(assert("Disconnect successful", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
|
|
/* Just to make sure we can connect again */
|
|
rc = MQTTClient_connect(c, &opts);
|
|
if (!(assert("Connect successful", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
rc = MQTTClient_disconnect(c, 0);
|
|
if (!(assert("Disconnect successful", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
|
|
exit:
|
|
MQTTClient_destroy(&c);
|
|
MyLog(LOGA_INFO, "%s: test %s. %d tests run, %d failures.",
|
|
(failures == 0) ? "passed" : "failed", testname, tests, failures);
|
|
write_test_result();
|
|
return failures;
|
|
}
|
|
|
|
/*********************************************************************
|
|
|
|
Test4_m: Accept invalid server certificates - multi threaded
|
|
|
|
*********************************************************************/
|
|
|
|
int test4_m(struct Options options)
|
|
{
|
|
char* testname = "test4_m";
|
|
char* test_topic = "C client test4_m";
|
|
int subsqos = 2;
|
|
MQTTClient c;
|
|
MQTTClient_connectOptions opts = MQTTClient_connectOptions_initializer;
|
|
MQTTClient_willOptions wopts = MQTTClient_willOptions_initializer;
|
|
MQTTClient_SSLOptions sslopts = MQTTClient_SSLOptions_initializer;
|
|
int rc = 0;
|
|
|
|
failures = 0;
|
|
MyLog(LOGA_INFO, "Starting test 4_m - accept invalid server certificates - multi-threaded");
|
|
fprintf(xml, "<testcase classname=\"test3\" name=\"test 4_m\"");
|
|
global_start_time = start_clock();
|
|
|
|
rc = MQTTClient_create(&c, options.server_auth_connection, "test4_m", MQTTCLIENT_PERSISTENCE_DEFAULT, persistenceStore);
|
|
if (!(assert("good rc from create", rc == MQTTCLIENT_SUCCESS, "rc was %d\n", rc)))
|
|
goto exit;
|
|
|
|
opts.keepAliveInterval = 20;
|
|
opts.cleansession = 1;
|
|
opts.username = "testuser";
|
|
opts.password = "testpassword";
|
|
if (options.haconnections != NULL)
|
|
{
|
|
opts.serverURIs = options.haconnections;
|
|
opts.serverURIcount = options.hacount;
|
|
}
|
|
|
|
opts.ssl = &sslopts;
|
|
opts.ssl->enableServerCertAuth = 0;
|
|
|
|
rc = MQTTClient_setCallbacks(c, NULL, NULL, multiThread_messageArrived, multiThread_deliveryComplete);
|
|
if (!(assert("Good rc from setCallbacks", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
|
|
MyLog(LOGA_DEBUG, "Connecting");
|
|
|
|
rc = MQTTClient_connect(c, &opts);
|
|
if (!(assert("Good rc from connect", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
rc = MQTTClient_subscribe(c, test_topic, subsqos);
|
|
if (!(assert("Good rc from subscribe", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
|
|
multiThread_sendAndReceive(c, 0, test_topic);
|
|
multiThread_sendAndReceive(c, 1, test_topic);
|
|
multiThread_sendAndReceive(c, 2, test_topic);
|
|
|
|
MyLog(LOGA_DEBUG, "Stopping");
|
|
|
|
rc = MQTTClient_unsubscribe(c, test_topic);
|
|
if (!(assert("Unsubscribe successful", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
rc = MQTTClient_disconnect(c, 0);
|
|
if (!(assert("Disconnect successful", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
|
|
exit:
|
|
MQTTClient_destroy(&c);
|
|
|
|
MyLog(LOGA_INFO, "%s: test %s. %d tests run, %d failures.",
|
|
(failures == 0) ? "passed" : "failed", testname, tests, failures);
|
|
write_test_result();
|
|
return failures;
|
|
}
|
|
|
|
/*********************************************************************
|
|
|
|
Test5a: Anonymous ciphers - server auth disabled
|
|
|
|
*********************************************************************/
|
|
|
|
int test5a(struct Options options)
|
|
{
|
|
char* testname = "test5a";
|
|
char* test_topic = "C client SSL test5a";
|
|
int subsqos = 2;
|
|
MQTTClient c;
|
|
MQTTClient_connectOptions opts = MQTTClient_connectOptions_initializer;
|
|
MQTTClient_willOptions wopts = MQTTClient_willOptions_initializer;
|
|
MQTTClient_SSLOptions sslopts = MQTTClient_SSLOptions_initializer;
|
|
int rc = 0;
|
|
|
|
failures = 0;
|
|
MyLog(LOGA_INFO, "Starting SSL test 5a - Anonymous ciphers - server authentication disabled");
|
|
fprintf(xml, "<testcase classname=\"test3\" name=\"test 5a\"");
|
|
global_start_time = start_clock();
|
|
|
|
rc = MQTTClient_create(&c, options.anon_connection, "test5a", MQTTCLIENT_PERSISTENCE_DEFAULT, persistenceStore);
|
|
if (!(assert("good rc from create", rc == MQTTCLIENT_SUCCESS, "rc was %d\n", rc)))
|
|
goto exit;
|
|
|
|
opts.keepAliveInterval = 20;
|
|
opts.cleansession = 1;
|
|
opts.username = "testuser";
|
|
opts.password = "testpassword";
|
|
if (options.haconnections != NULL)
|
|
{
|
|
opts.serverURIs = options.haconnections;
|
|
opts.serverURIcount = options.hacount;
|
|
}
|
|
|
|
opts.ssl = &sslopts;
|
|
opts.ssl->enabledCipherSuites = "aNULL";
|
|
opts.ssl->enableServerCertAuth = 0;
|
|
|
|
MyLog(LOGA_DEBUG, "Connecting");
|
|
|
|
rc = MQTTClient_connect(c, &opts);
|
|
if (!(assert("Good rc from connect", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
rc = MQTTClient_subscribe(c, test_topic, subsqos);
|
|
if (!(assert("Good rc from subscribe", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
|
|
singleThread_sendAndReceive(c, 0, test_topic);
|
|
singleThread_sendAndReceive(c, 1, test_topic);
|
|
singleThread_sendAndReceive(c, 2, test_topic);
|
|
|
|
MyLog(LOGA_DEBUG, "Stopping\n");
|
|
|
|
rc = MQTTClient_unsubscribe(c, test_topic);
|
|
if (!(assert("Unsubscribe successful", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
rc = MQTTClient_disconnect(c, 0);
|
|
if (!(assert("Disconnect successful", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
|
|
/* Just to make sure we can connect again */
|
|
|
|
rc = MQTTClient_connect(c, &opts);
|
|
if (!(assert("Connect successful", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
rc = MQTTClient_disconnect(c, 0);
|
|
if (!(assert("Disconnect successful", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
|
|
exit:
|
|
MQTTClient_destroy(&c);
|
|
MyLog(LOGA_INFO, "%s: test %s. %d tests run, %d failures.",
|
|
(failures == 0) ? "passed" : "failed", testname, tests, failures);
|
|
write_test_result();
|
|
return failures;
|
|
}
|
|
|
|
/*********************************************************************
|
|
|
|
Test5b: Anonymous ciphers - server auth enabled
|
|
|
|
*********************************************************************/
|
|
|
|
int test5b(struct Options options)
|
|
{
|
|
char* testname = "test5b";
|
|
char* test_topic = "C client SSL test5b";
|
|
int subsqos = 2;
|
|
MQTTClient c;
|
|
MQTTClient_connectOptions opts = MQTTClient_connectOptions_initializer;
|
|
MQTTClient_willOptions wopts = MQTTClient_willOptions_initializer;
|
|
MQTTClient_SSLOptions sslopts = MQTTClient_SSLOptions_initializer;
|
|
int rc = 0;
|
|
|
|
failures = 0;
|
|
MyLog(LOGA_INFO, "Starting SSL test 5b - Anonymous ciphers - server authentication enabled");
|
|
fprintf(xml, "<testcase classname=\"test3\" name=\"test 5b\"");
|
|
global_start_time = start_clock();
|
|
|
|
rc = MQTTClient_create(&c, options.anon_connection, "test5b", MQTTCLIENT_PERSISTENCE_DEFAULT, persistenceStore);
|
|
if (!(assert("good rc from create", rc == MQTTCLIENT_SUCCESS, "rc was %d\n", rc)))
|
|
goto exit;
|
|
|
|
opts.keepAliveInterval = 20;
|
|
opts.cleansession = 1;
|
|
opts.username = "testuser";
|
|
opts.password = "testpassword";
|
|
if (options.haconnections != NULL)
|
|
{
|
|
opts.serverURIs = options.haconnections;
|
|
opts.serverURIcount = options.hacount;
|
|
}
|
|
|
|
opts.ssl = &sslopts;
|
|
//opts.ssl->trustStore = /*file of certificates trusted by client*/
|
|
//opts.ssl->keyStore = options.client_key_file; /*file of certificate for client to present to server*/
|
|
//if (options.client_key_pass != NULL) opts.ssl->privateKeyPassword = options.client_key_pass;
|
|
opts.ssl->enabledCipherSuites = "aNULL";
|
|
opts.ssl->enableServerCertAuth = 1;
|
|
|
|
MyLog(LOGA_DEBUG, "Connecting");
|
|
|
|
rc = MQTTClient_connect(c, &opts);
|
|
if (!(assert("Good rc from connect", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
rc = MQTTClient_subscribe(c, test_topic, subsqos);
|
|
if (!(assert("Good rc from subscribe", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
|
|
singleThread_sendAndReceive(c, 0, test_topic);
|
|
singleThread_sendAndReceive(c, 1, test_topic);
|
|
singleThread_sendAndReceive(c, 2, test_topic);
|
|
|
|
MyLog(LOGA_DEBUG, "Stopping\n");
|
|
|
|
rc = MQTTClient_unsubscribe(c, test_topic);
|
|
if (!(assert("Unsubscribe successful", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
rc = MQTTClient_disconnect(c, 0);
|
|
if (!(assert("Disconnect successful", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
|
|
/* Just to make sure we can connect again */
|
|
rc = MQTTClient_connect(c, &opts);
|
|
if (!(assert("Connect successful", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
rc = MQTTClient_disconnect(c, 0);
|
|
if (!(assert("Disconnect successful", rc == MQTTCLIENT_SUCCESS, "rc was %d", rc)))
|
|
goto exit;
|
|
|
|
exit:
|
|
MQTTClient_destroy(&c);
|
|
MyLog(LOGA_INFO, "%s: test %s. %d tests run, %d failures.",
|
|
(failures == 0) ? "passed" : "failed", testname, tests, failures);
|
|
write_test_result();
|
|
return failures;
|
|
}
|
|
|
|
|
|
/*********************************************************************
|
|
|
|
Test5c: Anonymous ciphers - client not using anonymous ciphers
|
|
|
|
*********************************************************************/
|
|
|
|
int test5c(struct Options options)
|
|
{
|
|
char* testname = "test5c";
|
|
char* test_topic = "C client SSL test5c";
|
|
int subsqos = 2;
|
|
MQTTClient c;
|
|
MQTTClient_connectOptions opts = MQTTClient_connectOptions_initializer;
|
|
MQTTClient_willOptions wopts = MQTTClient_willOptions_initializer;
|
|
MQTTClient_SSLOptions sslopts = MQTTClient_SSLOptions_initializer;
|
|
int rc = 0;
|
|
|
|
failures = 0;
|
|
MyLog(LOGA_INFO, "Starting SSL test 5c - Anonymous ciphers - client not using anonymous cipher");
|
|
fprintf(xml, "<testcase classname=\"test3\" name=\"test 5c\"");
|
|
global_start_time = start_clock();
|
|
|
|
rc = MQTTClient_create(&c, options.anon_connection, "test5c", MQTTCLIENT_PERSISTENCE_DEFAULT, persistenceStore);
|
|
if (!(assert("good rc from create", rc == MQTTCLIENT_SUCCESS, "rc was %d\n", rc)))
|
|
goto exit;
|
|
|
|
opts.keepAliveInterval = 20;
|
|
opts.cleansession = 1;
|
|
opts.username = "testuser";
|
|
opts.password = "testpassword";
|
|
if (options.haconnections != NULL)
|
|
{
|
|
opts.serverURIs = options.haconnections;
|
|
opts.serverURIcount = options.hacount;
|
|
}
|
|
|
|
opts.ssl = &sslopts;
|
|
//opts.ssl->trustStore = /*file of certificates trusted by client*/
|
|
//opts.ssl->keyStore = options.client_key_file; /*file of certificate for client to present to server*/
|
|
//if (options.client_key_pass != NULL) opts.ssl->privateKeyPassword = options.client_key_pass;
|
|
opts.ssl->enabledCipherSuites = "DEFAULT";
|
|
opts.ssl->enableServerCertAuth = 0;
|
|
|
|
MyLog(LOGA_DEBUG, "Connecting");
|
|
|
|
rc = MQTTClient_connect(c, &opts);
|
|
if (!(assert("Good rc from connect", rc == MQTTCLIENT_FAILURE, "rc was %d", rc)))
|
|
goto exit;
|
|
|
|
exit:
|
|
MQTTClient_destroy(&c);
|
|
MyLog(LOGA_INFO, "%s: test %s. %d tests run, %d failures.",
|
|
(failures == 0) ? "passed" : "failed", testname, tests, failures);
|
|
write_test_result();
|
|
return failures;
|
|
}
|
|
|
|
|
|
/*********************************************************************
|
|
|
|
Test6: TLS-PSK - client and server has a common pre-shared key
|
|
|
|
*********************************************************************/
|
|
static unsigned int onPSKAuth(const char* hint,
|
|
char* identity,
|
|
unsigned int max_identity_len,
|
|
unsigned char* psk,
|
|
unsigned int max_psk_len,
|
|
void* context)
|
|
{
|
|
unsigned char test_psk[] = {0x50, 0x53, 0x4B, 0x00}; /* {'P', 'S', 'K', '\0' } */
|
|
MyLog(LOGA_DEBUG, "PSK auth callback");
|
|
|
|
if (!(assert("Good application context in onPSKAuth", context == (void *) 42, "context was %d\n", context)))
|
|
return 0;
|
|
|
|
strncpy(identity, "id", max_identity_len);
|
|
memcpy(psk, test_psk, sizeof(test_psk));
|
|
return sizeof(test_psk);
|
|
}
|
|
|
|
|
|
int test6(struct Options options)
|
|
{
|
|
char* testname = "test6";
|
|
MQTTClient c;
|
|
MQTTClient_connectOptions opts = MQTTClient_connectOptions_initializer;
|
|
MQTTClient_willOptions wopts = MQTTClient_willOptions_initializer;
|
|
MQTTClient_SSLOptions sslopts = MQTTClient_SSLOptions_initializer;
|
|
int rc = 0;
|
|
|
|
failures = 0;
|
|
MyLog(LOGA_INFO, "Starting test 6 - TLS-PSK - client and server has a common pre-shared key");
|
|
fprintf(xml, "<testcase classname=\"test6\" name=\"test 6\"");
|
|
global_start_time = start_clock();
|
|
|
|
rc = MQTTClient_create(&c, options.psk_connection, "test6", MQTTCLIENT_PERSISTENCE_DEFAULT, persistenceStore);
|
|
if (!(assert("good rc from create", rc == MQTTCLIENT_SUCCESS, "rc was %d\n", rc)))
|
|
goto exit;
|
|
|
|
opts.keepAliveInterval = 20;
|
|
opts.cleansession = 1;
|
|
opts.username = "testuser";
|
|
opts.password = "testpassword";
|
|
if (options.haconnections != NULL)
|
|
{
|
|
opts.serverURIs = options.haconnections;
|
|
opts.serverURIcount = options.hacount;
|
|
}
|
|
|
|
opts.ssl = &sslopts;
|
|
opts.ssl->ssl_psk_cb = onPSKAuth;
|
|
opts.ssl->ssl_psk_context = (void *) 42;
|
|
opts.ssl->enabledCipherSuites = "PSK-AES128-CBC-SHA";
|
|
|
|
MyLog(LOGA_DEBUG, "Connecting");
|
|
|
|
rc = MQTTClient_connect(c, &opts);
|
|
if (!(assert("Good rc from connect", rc == MQTTCLIENT_SUCCESS, "rc was %d\n", rc)))
|
|
goto exit;
|
|
|
|
MyLog(LOGA_DEBUG, "Stopping\n");
|
|
|
|
rc = MQTTClient_disconnect(c, 0);
|
|
if (!(assert("Disconnect successful", rc == MQTTCLIENT_SUCCESS, "rc was %d\n", rc)))
|
|
goto exit;
|
|
exit:
|
|
MQTTClient_destroy(&c);
|
|
MyLog(LOGA_INFO, "%s: test %s. %d tests run, %d failures.",
|
|
(failures == 0) ? "passed" : "failed", testname, tests, failures);
|
|
write_test_result();
|
|
return failures;
|
|
}
|
|
|
|
|
|
typedef struct
|
|
{
|
|
char* clientID; /**< the string id of the client */
|
|
char* username; /**< MQTT v3.1 user name */
|
|
char* password; /**< MQTT v3.1 password */
|
|
unsigned int cleansession : 1; /**< MQTT clean session flag */
|
|
unsigned int connected : 1; /**< whether it is currently connected */
|
|
unsigned int good : 1; /**< if we have an error on the socket we turn this off */
|
|
unsigned int ping_outstanding : 1;
|
|
unsigned int connect_state : 2;
|
|
int socket;
|
|
int msgID;
|
|
int keepAliveInterval;
|
|
int retryInterval;
|
|
int maxInflightMessages;
|
|
time_t lastContact;
|
|
void* will;
|
|
void* inboundMsgs;
|
|
void* outboundMsgs; /**< in flight */
|
|
void* messageQueue;
|
|
void* phandle; /* the persistence handle */
|
|
MQTTClient_persistence* persistence; /* a persistence implementation */
|
|
int connectOptionsVersion;
|
|
} Clients;
|
|
|
|
typedef struct
|
|
{
|
|
char* serverURI;
|
|
Clients* c;
|
|
MQTTClient_connectionLost* cl;
|
|
MQTTClient_messageArrived* ma;
|
|
MQTTClient_deliveryComplete* dc;
|
|
void* context;
|
|
|
|
int connect_sem;
|
|
int rc; /* getsockopt return code in connect */
|
|
int connack_sem;
|
|
int suback_sem;
|
|
int unsuback_sem;
|
|
void* pack;
|
|
} MQTTClients;
|
|
|
|
|
|
int main(int argc, char** argv)
|
|
{
|
|
int* numtests = &tests;
|
|
int rc = 0;
|
|
int (*tests[])(struct Options) = {NULL, test1, test2a_s, test2a_m, test2b, test2c, test3a_s, test3a_m, test3b, test4_s, test4_m, test6,
|
|
test2e_s /*test5a, test5b,test5c */};
|
|
//MQTTClient_nameValue* info;
|
|
|
|
xml = fopen("TEST-test3.xml", "w");
|
|
fprintf(xml, "<testsuite name=\"test3\" tests=\"%d\">\n", (int)(ARRAY_SIZE(tests) - 1));
|
|
|
|
setenv("MQTT_C_CLIENT_TRACE", "ON", 1);
|
|
setenv("MQTT_C_CLIENT_TRACE_LEVEL", "ERROR", 1);
|
|
getopts(argc, argv);
|
|
if (options.test_no == 0)
|
|
{ /* run all the tests */
|
|
for (options.test_no = 1; options.test_no < ARRAY_SIZE(tests); ++options.test_no)
|
|
rc += tests[options.test_no](options); /* return number of failures. 0 = test succeeded */
|
|
}
|
|
else
|
|
rc = tests[options.test_no](options); /* run just the selected test */
|
|
|
|
MyLog(LOGA_INFO, "Total tests run: %d", *numtests);
|
|
if (rc == 0)
|
|
MyLog(LOGA_INFO, "verdict pass");
|
|
else
|
|
MyLog(LOGA_INFO, "verdict fail");
|
|
|
|
fprintf(xml, "</testsuite>\n");
|
|
fclose(xml);
|
|
|
|
return rc;
|
|
}
|