mirror of
https://github.com/espressif/esp-idf.git
synced 2024-10-05 20:47:46 -04:00
a71fa82177
* Fix thread safety issues in non-core locking * Add option to verify thread safety issues in lwip (core-lock assertion) * Make esp_sntp.h thread safe API * Fix sntp examples * Fix openthread libs Closes https://github.com/espressif/esp-idf/issues/9908 Closes https://github.com/espressif/esp-idf/issues/10502 Closes https://github.com/espressif/esp-idf/issues/10466
318 lines
10 KiB
C
318 lines
10 KiB
C
/*
|
|
* SPDX-FileCopyrightText: 2022-2023 Espressif Systems (Shanghai) CO LTD
|
|
*
|
|
* SPDX-License-Identifier: Apache-2.0
|
|
*/
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include <esp_types.h>
|
|
|
|
#include "freertos/FreeRTOS.h"
|
|
#include "freertos/event_groups.h"
|
|
#include "test_utils.h"
|
|
#include "unity.h"
|
|
#include "unity_fixture.h"
|
|
|
|
#include "soc/soc_caps.h"
|
|
|
|
#include "lwip/inet.h"
|
|
#include "lwip/netdb.h"
|
|
#include "lwip/sockets.h"
|
|
#include "lwip/tcpip.h"
|
|
#include "lwip/prot/iana.h"
|
|
#include "ping/ping_sock.h"
|
|
#include "dhcpserver/dhcpserver.h"
|
|
#include "dhcpserver/dhcpserver_options.h"
|
|
#include "esp_sntp.h"
|
|
|
|
#define ETH_PING_END_BIT BIT(1)
|
|
#define ETH_PING_DURATION_MS (5000)
|
|
#define ETH_PING_END_TIMEOUT_MS (ETH_PING_DURATION_MS * 2)
|
|
#define TEST_ICMP_DESTINATION_DOMAIN_NAME "127.0.0.1"
|
|
|
|
|
|
TEST_GROUP(lwip);
|
|
|
|
TEST_SETUP(lwip)
|
|
{
|
|
}
|
|
|
|
TEST_TEAR_DOWN(lwip)
|
|
{
|
|
}
|
|
|
|
static void test_on_ping_success(esp_ping_handle_t hdl, void *args)
|
|
{
|
|
uint8_t ttl;
|
|
uint16_t seqno;
|
|
uint32_t elapsed_time, recv_len;
|
|
ip_addr_t target_addr;
|
|
esp_ping_get_profile(hdl, ESP_PING_PROF_SEQNO, &seqno, sizeof(seqno));
|
|
esp_ping_get_profile(hdl, ESP_PING_PROF_TTL, &ttl, sizeof(ttl));
|
|
esp_ping_get_profile(hdl, ESP_PING_PROF_IPADDR, &target_addr, sizeof(target_addr));
|
|
esp_ping_get_profile(hdl, ESP_PING_PROF_SIZE, &recv_len, sizeof(recv_len));
|
|
esp_ping_get_profile(hdl, ESP_PING_PROF_TIMEGAP, &elapsed_time, sizeof(elapsed_time));
|
|
printf("%" PRId32 "bytes from %s icmp_seq=%d ttl=%d time=%" PRId32 " ms\n",
|
|
recv_len, inet_ntoa(target_addr.u_addr.ip4), seqno, ttl, elapsed_time);
|
|
}
|
|
|
|
static void test_on_ping_timeout(esp_ping_handle_t hdl, void *args)
|
|
{
|
|
uint16_t seqno;
|
|
ip_addr_t target_addr;
|
|
esp_ping_get_profile(hdl, ESP_PING_PROF_SEQNO, &seqno, sizeof(seqno));
|
|
esp_ping_get_profile(hdl, ESP_PING_PROF_IPADDR, &target_addr, sizeof(target_addr));
|
|
printf("From %s icmp_seq=%d timeout\n", inet_ntoa(target_addr.u_addr.ip4), seqno);
|
|
}
|
|
|
|
static void test_on_ping_end(esp_ping_handle_t hdl, void *args)
|
|
{
|
|
EventGroupHandle_t eth_event_group = (EventGroupHandle_t)args;
|
|
uint32_t transmitted;
|
|
uint32_t received;
|
|
uint32_t total_time_ms;
|
|
|
|
esp_ping_get_profile(hdl, ESP_PING_PROF_REQUEST, &transmitted, sizeof(transmitted));
|
|
esp_ping_get_profile(hdl, ESP_PING_PROF_REPLY, &received, sizeof(received));
|
|
esp_ping_get_profile(hdl, ESP_PING_PROF_DURATION, &total_time_ms, sizeof(total_time_ms));
|
|
printf("%" PRId32 " packets transmitted, %" PRId32 " received, time %" PRId32 "ms\n", transmitted, received, total_time_ms);
|
|
if (transmitted == received) {
|
|
xEventGroupSetBits(eth_event_group, ETH_PING_END_BIT);
|
|
}
|
|
}
|
|
|
|
TEST(lwip, localhost_ping_test)
|
|
{
|
|
EventBits_t bits;
|
|
EventGroupHandle_t eth_event_group = xEventGroupCreate();
|
|
TEST_ASSERT(eth_event_group != NULL);
|
|
test_case_uses_tcpip();
|
|
|
|
// Parse IP address: Destination is a localhost address, so we don't need any interface (esp-netif/driver)
|
|
ip_addr_t target_addr;
|
|
struct addrinfo hint;
|
|
struct addrinfo *res = NULL;
|
|
memset(&hint, 0, sizeof(hint));
|
|
memset(&target_addr, 0, sizeof(target_addr));
|
|
/* convert URL to IP */
|
|
TEST_ASSERT(getaddrinfo(TEST_ICMP_DESTINATION_DOMAIN_NAME, NULL, &hint, &res) == 0);
|
|
struct in_addr addr4 = ((struct sockaddr_in *)(res->ai_addr))->sin_addr;
|
|
inet_addr_to_ip4addr(ip_2_ip4(&target_addr), &addr4);
|
|
freeaddrinfo(res);
|
|
|
|
esp_ping_config_t ping_config = ESP_PING_DEFAULT_CONFIG();
|
|
ping_config.timeout_ms = 2000;
|
|
ping_config.target_addr = target_addr;
|
|
ping_config.count = 0; // ping in infinite mode
|
|
/* set callback functions */
|
|
esp_ping_callbacks_t cbs;
|
|
cbs.on_ping_success = test_on_ping_success;
|
|
cbs.on_ping_timeout = test_on_ping_timeout;
|
|
cbs.on_ping_end = test_on_ping_end;
|
|
cbs.cb_args = eth_event_group;
|
|
|
|
esp_ping_handle_t ping;
|
|
TEST_ESP_OK(esp_ping_new_session(&ping_config, &cbs, &ping));
|
|
/* start ping */
|
|
TEST_ESP_OK(esp_ping_start(ping));
|
|
/* ping for a while */
|
|
vTaskDelay(pdMS_TO_TICKS(ETH_PING_DURATION_MS));
|
|
/* stop ping */
|
|
TEST_ESP_OK(esp_ping_stop(ping));
|
|
/* wait for end of ping */
|
|
bits = xEventGroupWaitBits(eth_event_group, ETH_PING_END_BIT, true, true, pdMS_TO_TICKS(ETH_PING_END_TIMEOUT_MS));
|
|
TEST_ASSERT((bits & ETH_PING_END_BIT) == ETH_PING_END_BIT);
|
|
/* restart ping */
|
|
TEST_ESP_OK(esp_ping_start(ping));
|
|
vTaskDelay(pdMS_TO_TICKS(ETH_PING_DURATION_MS));
|
|
TEST_ESP_OK(esp_ping_stop(ping));
|
|
bits = xEventGroupWaitBits(eth_event_group, ETH_PING_END_BIT, true, true, pdMS_TO_TICKS(ETH_PING_END_TIMEOUT_MS));
|
|
TEST_ASSERT((bits & ETH_PING_END_BIT) == ETH_PING_END_BIT);
|
|
/* de-initialize ping process */
|
|
TEST_ESP_OK(esp_ping_delete_session(ping));
|
|
|
|
vEventGroupDelete(eth_event_group);
|
|
}
|
|
|
|
TEST(lwip, dhcp_server_init_deinit)
|
|
{
|
|
dhcps_t *dhcps = dhcps_new();
|
|
TEST_ASSERT_NOT_NULL(dhcps);
|
|
ip4_addr_t ip = { .addr = IPADDR_ANY };
|
|
TEST_ASSERT(dhcps_start(dhcps, NULL, ip) == ERR_ARG);
|
|
TEST_ASSERT(dhcps_stop(dhcps, NULL) == ERR_ARG);
|
|
dhcps_delete(dhcps);
|
|
}
|
|
|
|
struct dhcps_api {
|
|
EventGroupHandle_t event;
|
|
ip4_addr_t netmask;
|
|
ip4_addr_t ip;
|
|
err_t ret_start;
|
|
err_t ret_stop;
|
|
};
|
|
|
|
static void dhcps_test_net_classes_api(void* ctx)
|
|
{
|
|
struct netif *netif;
|
|
struct dhcps_api *api = ctx;
|
|
|
|
NETIF_FOREACH(netif) {
|
|
if (netif->name[0] == 'l' && netif->name[1] == 'o') {
|
|
break;
|
|
}
|
|
}
|
|
TEST_ASSERT_NOT_NULL(netif);
|
|
|
|
dhcps_t *dhcps = dhcps_new();
|
|
dhcps_set_option_info(dhcps, SUBNET_MASK, (void*)&api->netmask, sizeof(api->netmask));
|
|
api->ret_start = dhcps_start(dhcps, netif, api->ip);
|
|
api->ret_stop = dhcps_stop(dhcps, netif);
|
|
dhcps_delete(dhcps);
|
|
xEventGroupSetBits(api->event, 1);
|
|
}
|
|
|
|
static void dhcps_test_net_classes(uint32_t ip, uint32_t mask, bool pass)
|
|
{
|
|
|
|
struct dhcps_api api = {
|
|
.ret_start = ERR_IF,
|
|
.ret_stop = ERR_IF,
|
|
.ip = {.addr = PP_HTONL(ip)},
|
|
.netmask = {.addr = PP_HTONL(mask)},
|
|
.event = xEventGroupCreate()
|
|
};
|
|
|
|
tcpip_callback(dhcps_test_net_classes_api, &api);
|
|
xEventGroupWaitBits(api.event, 1, true, true, pdMS_TO_TICKS(5000));
|
|
vEventGroupDelete(api.event);
|
|
err_t ret_start_expected = pass ? ERR_OK : ERR_ARG;
|
|
TEST_ASSERT(api.ret_start == ret_start_expected);
|
|
TEST_ASSERT(api.ret_stop == ERR_OK);
|
|
|
|
}
|
|
|
|
TEST(lwip, dhcp_server_start_stop_localhost)
|
|
{
|
|
test_case_uses_tcpip();
|
|
|
|
// Class A: IP: 127.0.0.1, Mask: 255.0.0.0
|
|
dhcps_test_net_classes(0x7f000001, 0xFF000000, true);
|
|
|
|
// Class B: IP: 128.1.1.1, Mask: 255.255.0.0
|
|
dhcps_test_net_classes(0x80010101, 0xFFFF0000, true);
|
|
|
|
// Class C: IP: 192.168.1.1, Mask: 255.255.255.0
|
|
dhcps_test_net_classes(0xC0A80101, 0xFFFFFF00, true);
|
|
|
|
// Class A: IP: 127.0.0.1, with Class C Mask: 255.255.255.0
|
|
// expect dhcps_start() to fail
|
|
dhcps_test_net_classes(0x7f000001, 0xFFFFFF00, false);
|
|
|
|
}
|
|
|
|
|
|
int test_sntp_server_create(void)
|
|
{
|
|
struct sockaddr_in dest_addr_ip4;
|
|
int sock = -1;
|
|
dest_addr_ip4.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
|
|
dest_addr_ip4.sin_family = AF_INET;
|
|
dest_addr_ip4.sin_port = htons(LWIP_IANA_PORT_SNTP);
|
|
sock = socket(AF_INET, SOCK_DGRAM, IPPROTO_IP);
|
|
TEST_ASSERT_GREATER_OR_EQUAL(0, sock);
|
|
int reuse_en = 1;
|
|
TEST_ASSERT_GREATER_OR_EQUAL(0, setsockopt(sock, SOL_SOCKET, SO_REUSEADDR, &reuse_en, sizeof(reuse_en)));
|
|
TEST_ASSERT_GREATER_OR_EQUAL(0, bind(sock, (struct sockaddr*) &dest_addr_ip4, sizeof(dest_addr_ip4)));
|
|
return sock;
|
|
}
|
|
|
|
bool test_sntp_server_reply_with_time(int sock, int year, bool msb_flag)
|
|
{
|
|
struct sntp_timestamp {
|
|
uint32_t seconds;
|
|
uint32_t fraction;
|
|
};
|
|
const int SNTP_MSG_LEN = 48;
|
|
const int SNTP_MODE_CLIENT = 0x03;
|
|
const int SNTP_MODE_SERVER = 0x04;
|
|
const int SNTP_MODE_MASK = 0x07;
|
|
const int SNTP_OFFSET_STRATUM = 1;
|
|
|
|
char rx_buffer[SNTP_MSG_LEN];
|
|
struct sockaddr_storage source_addr;
|
|
socklen_t socklen = sizeof(source_addr);
|
|
|
|
int len = recvfrom(sock, rx_buffer, SNTP_MSG_LEN, 0, (struct sockaddr *)&source_addr, &socklen);
|
|
if (len == SNTP_MSG_LEN && source_addr.ss_family == PF_INET && (SNTP_MODE_MASK & rx_buffer[0]) == SNTP_MODE_CLIENT) {
|
|
// modify the client's request to act as a server's response with the injected *xmit* timestamp
|
|
rx_buffer[0] &= ~SNTP_MODE_CLIENT;
|
|
rx_buffer[0] |= SNTP_MODE_SERVER;
|
|
rx_buffer[SNTP_OFFSET_STRATUM] = 0x1;
|
|
// set the desired timestamp
|
|
struct sntp_timestamp *timestamp = (struct sntp_timestamp *)(rx_buffer + SNTP_MSG_LEN - sizeof(struct sntp_timestamp)); // xmit is the last timestamp in the datagram
|
|
int64_t seconds_since_1900 = (365*24*60*60 /* seconds per year */ + 24*60*60/4 /* ~ seconds per leap year */ )*(year-1900);
|
|
// apply the MSB convention (set: 1968-2036, cleared: 2036-2104)
|
|
timestamp->seconds = htonl( (msb_flag ? 0x80000000 : 0) | (0xFFFFFFFF & seconds_since_1900) );
|
|
len = sendto(sock, rx_buffer, SNTP_MSG_LEN, 0, (struct sockaddr *)&source_addr, sizeof(source_addr));
|
|
if (len == SNTP_MSG_LEN) {
|
|
return true;
|
|
}
|
|
}
|
|
return false;
|
|
}
|
|
|
|
void test_sntp_timestamps(int year, bool msb_flag)
|
|
{
|
|
int sock = test_sntp_server_create();
|
|
|
|
// init and start the SNTP
|
|
esp_sntp_setoperatingmode(SNTP_OPMODE_POLL);
|
|
esp_sntp_setservername(0, "127.0.0.1");
|
|
esp_sntp_init();
|
|
// wait until time sync
|
|
int retry = 0;
|
|
while (sntp_get_sync_status() == SNTP_SYNC_STATUS_RESET) {
|
|
TEST_ASSERT_TRUE(test_sntp_server_reply_with_time(sock, year, msb_flag)); // post the SNTP server's reply
|
|
retry++;
|
|
TEST_ASSERT_LESS_THAN(3, retry);
|
|
}
|
|
|
|
// check time and assert the year
|
|
time_t now;
|
|
struct tm timeinfo;
|
|
time(&now);
|
|
localtime_r(&now, &timeinfo);
|
|
TEST_ASSERT_EQUAL(year, 1900 + timeinfo.tm_year);
|
|
|
|
// close the SNTP and the fake server
|
|
esp_sntp_stop();
|
|
close(sock);
|
|
}
|
|
|
|
TEST(lwip, sntp_client_time_2015)
|
|
{
|
|
test_case_uses_tcpip();
|
|
test_sntp_timestamps(2015, true); // NTP timestamp MSB is set for time before 2036
|
|
}
|
|
|
|
TEST(lwip, sntp_client_time_2048)
|
|
{
|
|
test_case_uses_tcpip();
|
|
test_sntp_timestamps(2048, false); // NTP timestamp MSB is cleared for time after 2036
|
|
}
|
|
|
|
TEST_GROUP_RUNNER(lwip)
|
|
{
|
|
RUN_TEST_CASE(lwip, localhost_ping_test)
|
|
RUN_TEST_CASE(lwip, dhcp_server_init_deinit)
|
|
RUN_TEST_CASE(lwip, dhcp_server_start_stop_localhost)
|
|
RUN_TEST_CASE(lwip, sntp_client_time_2015)
|
|
RUN_TEST_CASE(lwip, sntp_client_time_2048)
|
|
}
|
|
|
|
void app_main(void)
|
|
{
|
|
UNITY_MAIN(lwip);
|
|
}
|