bugfix: reasion -> reason
This commit is contained in:
@@ -94,15 +94,15 @@ enum dup_traffic_flag session_get_dup_traffic_flag(const struct session *sess)
|
||||
return sess->dup_flag;
|
||||
}
|
||||
|
||||
// closing reasion
|
||||
void session_set_closing_reasion(struct session *sess, enum closing_reasion reasion)
|
||||
// closing reason
|
||||
void session_set_closing_reason(struct session *sess, enum closing_reason reason)
|
||||
{
|
||||
sess->closing_reasion = reasion;
|
||||
sess->closing_reason = reason;
|
||||
}
|
||||
|
||||
enum closing_reasion session_get_closing_reasion(const struct session *sess)
|
||||
enum closing_reason session_get_closing_reason(const struct session *sess)
|
||||
{
|
||||
return sess->closing_reasion;
|
||||
return sess->closing_reason;
|
||||
}
|
||||
|
||||
// session metrics
|
||||
@@ -470,9 +470,9 @@ static void udp_state_tostring(enum udp_state state, char *buffer, size_t buffer
|
||||
}
|
||||
}
|
||||
|
||||
const char *session_closing_reasion_tostring(enum closing_reasion reasion)
|
||||
const char *session_closing_reason_tostring(enum closing_reason reason)
|
||||
{
|
||||
switch (reasion)
|
||||
switch (reason)
|
||||
{
|
||||
case CLOSING_BY_TIMEOUT:
|
||||
return "CLOSING BY TIMEOUT";
|
||||
@@ -558,7 +558,7 @@ void session_dump(struct session *sess)
|
||||
printf("session state : %s\n", session_state_tostring(session_get_state(sess)));
|
||||
printf("session type : %s\n", session_type_tostring(session_get_type(sess)));
|
||||
printf("session dup traffic flag : %s\n", dup_traffic_flag_tostring(session_get_dup_traffic_flag(sess)));
|
||||
printf("session closing reasion : %s\n", session_closing_reasion_tostring(session_get_closing_reasion(sess)));
|
||||
printf("session closing reason : %s\n", session_closing_reason_tostring(session_get_closing_reason(sess)));
|
||||
printf("session c2s packets : %" PRIu64 "\n", session_get_c2s_packets(sess));
|
||||
printf("session c2s bytes : %" PRIu64 "\n", session_get_c2s_bytes(sess));
|
||||
printf("session s2c packets : %" PRIu64 "\n", session_get_s2c_packets(sess));
|
||||
|
||||
@@ -62,7 +62,7 @@ enum dup_traffic_flag
|
||||
DUP_TRAFFIC_YES = 0x1,
|
||||
};
|
||||
|
||||
enum closing_reasion
|
||||
enum closing_reason
|
||||
{
|
||||
CLOSING_BY_TIMEOUT = 0x1,
|
||||
CLOSING_BY_EVICTED = 0x2,
|
||||
@@ -102,9 +102,9 @@ enum session_type session_get_type(const struct session *sess);
|
||||
void session_set_dup_traffic_flag(struct session *sess, enum dup_traffic_flag flag);
|
||||
enum dup_traffic_flag session_get_dup_traffic_flag(const struct session *sess);
|
||||
|
||||
// closing reasion
|
||||
void session_set_closing_reasion(struct session *sess, enum closing_reasion reasion);
|
||||
enum closing_reasion session_get_closing_reasion(const struct session *sess);
|
||||
// closing reason
|
||||
void session_set_closing_reason(struct session *sess, enum closing_reason reason);
|
||||
enum closing_reason session_get_closing_reason(const struct session *sess);
|
||||
|
||||
// session metrics
|
||||
void session_inc_c2s_metrics(struct session *sess, uint64_t packets, uint64_t bytes);
|
||||
@@ -192,7 +192,7 @@ void session_run_expirecb(struct session *sess);
|
||||
* session dump
|
||||
******************************************************************************/
|
||||
|
||||
const char *session_closing_reasion_tostring(enum closing_reasion reasion);
|
||||
const char *session_closing_reason_tostring(enum closing_reason reason);
|
||||
const char *session_state_tostring(enum session_state state);
|
||||
const char *session_type_tostring(enum session_type type);
|
||||
const char *session_dir_tostring(enum session_dir dir);
|
||||
|
||||
@@ -112,9 +112,9 @@ static inline void tcp_init_timeout_cb(struct session *sess, void *arg)
|
||||
struct session_manager *mgr = (struct session_manager *)arg;
|
||||
assert(mgr != NULL);
|
||||
|
||||
if (session_get_closing_reasion(sess) == 0)
|
||||
if (session_get_closing_reason(sess) == 0)
|
||||
{
|
||||
session_set_closing_reasion(sess, CLOSING_BY_TIMEOUT);
|
||||
session_set_closing_reason(sess, CLOSING_BY_TIMEOUT);
|
||||
}
|
||||
session_manager_update_tcp_to_closing(mgr, sess, 1);
|
||||
}
|
||||
@@ -125,9 +125,9 @@ static inline void tcp_handshake_timeout_cb(struct session *sess, void *arg)
|
||||
struct session_manager *mgr = (struct session_manager *)arg;
|
||||
assert(mgr != NULL);
|
||||
|
||||
if (session_get_closing_reasion(sess) == 0)
|
||||
if (session_get_closing_reason(sess) == 0)
|
||||
{
|
||||
session_set_closing_reasion(sess, CLOSING_BY_TIMEOUT);
|
||||
session_set_closing_reason(sess, CLOSING_BY_TIMEOUT);
|
||||
}
|
||||
session_manager_update_tcp_to_closing(mgr, sess, 1);
|
||||
}
|
||||
@@ -138,9 +138,9 @@ static inline void tcp_data_timeout_cb(struct session *sess, void *arg)
|
||||
struct session_manager *mgr = (struct session_manager *)arg;
|
||||
assert(mgr != NULL);
|
||||
|
||||
if (session_get_closing_reasion(sess) == 0)
|
||||
if (session_get_closing_reason(sess) == 0)
|
||||
{
|
||||
session_set_closing_reasion(sess, CLOSING_BY_TIMEOUT);
|
||||
session_set_closing_reason(sess, CLOSING_BY_TIMEOUT);
|
||||
}
|
||||
session_manager_update_tcp_to_closing(mgr, sess, 1);
|
||||
}
|
||||
@@ -151,9 +151,9 @@ static inline void tcp_half_closed_timeout_cb(struct session *sess, void *arg)
|
||||
struct session_manager *mgr = (struct session_manager *)arg;
|
||||
assert(mgr != NULL);
|
||||
|
||||
if (session_get_closing_reasion(sess) == 0)
|
||||
if (session_get_closing_reason(sess) == 0)
|
||||
{
|
||||
session_set_closing_reasion(sess, CLOSING_BY_TIMEOUT);
|
||||
session_set_closing_reason(sess, CLOSING_BY_TIMEOUT);
|
||||
}
|
||||
session_manager_update_tcp_to_closing(mgr, sess, 1);
|
||||
}
|
||||
@@ -173,9 +173,9 @@ static inline void udp_data_timeout_cb(struct session *sess, void *arg)
|
||||
struct session_manager *mgr = (struct session_manager *)arg;
|
||||
assert(mgr != NULL);
|
||||
|
||||
if (session_get_closing_reasion(sess) == 0)
|
||||
if (session_get_closing_reason(sess) == 0)
|
||||
{
|
||||
session_set_closing_reasion(sess, CLOSING_BY_TIMEOUT);
|
||||
session_set_closing_reason(sess, CLOSING_BY_TIMEOUT);
|
||||
}
|
||||
session_manager_update_udp_to_closing(mgr, sess);
|
||||
}
|
||||
@@ -484,7 +484,7 @@ on packet update session
|
||||
|
||||
on closing update session
|
||||
[*] session_set_state
|
||||
[*] session_set_closing_reasion
|
||||
[*] session_set_closing_reason
|
||||
*/
|
||||
|
||||
static inline void session_manager_update_session_state(struct session_manager *mgr, struct session *sess, enum session_state state)
|
||||
@@ -705,7 +705,7 @@ static inline void session_manager_handle_tcp_on_opening(struct session_manager
|
||||
if (tcp_mod_state & (TCP_C2S_RST_RECVED | TCP_S2C_RST_RECVED))
|
||||
{
|
||||
SESSION_LOG_DEBUG("TCP %s RST received, session %lu opening -> closing", (tcp_curr_state & TCP_C2S_RST_RECVED ? "C2S" : "S2C"), session_get_id(sess));
|
||||
session_set_closing_reasion(sess, (tcp_mod_state & TCP_C2S_RST_RECVED) ? CLOSING_BY_CLIENT_RST : CLOSING_BY_SERVER_RST);
|
||||
session_set_closing_reason(sess, (tcp_mod_state & TCP_C2S_RST_RECVED) ? CLOSING_BY_CLIENT_RST : CLOSING_BY_SERVER_RST);
|
||||
session_manager_update_tcp_to_closing(mgr, sess, 1);
|
||||
return;
|
||||
}
|
||||
@@ -723,7 +723,7 @@ static inline void session_manager_handle_tcp_on_opening(struct session_manager
|
||||
{
|
||||
SESSION_LOG_DEBUG("TCP %s FIN received, session %lu opening -> opening", (tcp_curr_state & TCP_C2S_FIN_RECVED ? "C2S" : "S2C"), session_get_id(sess));
|
||||
// still opening, only update timeout
|
||||
session_set_closing_reasion(sess, (tcp_mod_state & TCP_C2S_FIN_RECVED) ? CLOSING_BY_CLIENT_FIN : CLOSING_BY_SERVER_FIN);
|
||||
session_set_closing_reason(sess, (tcp_mod_state & TCP_C2S_FIN_RECVED) ? CLOSING_BY_CLIENT_FIN : CLOSING_BY_SERVER_FIN);
|
||||
session_manager_update_session_timer(mgr, sess, tcp_half_closed_timeout_cb, mgr->config.tcp_timeout_half_closed);
|
||||
return;
|
||||
}
|
||||
@@ -772,7 +772,7 @@ static inline void session_manager_handle_tcp_on_active(struct session_manager *
|
||||
if (tcp_curr_state & (TCP_C2S_RST_RECVED | TCP_S2C_RST_RECVED))
|
||||
{
|
||||
SESSION_LOG_DEBUG("TCP %s RST received, session %lu active -> closing", (tcp_curr_state & TCP_C2S_RST_RECVED) ? "C2S" : "S2C", session_get_id(sess));
|
||||
session_set_closing_reasion(sess, (tcp_curr_state & TCP_C2S_RST_RECVED) ? CLOSING_BY_CLIENT_RST : CLOSING_BY_SERVER_RST);
|
||||
session_set_closing_reason(sess, (tcp_curr_state & TCP_C2S_RST_RECVED) ? CLOSING_BY_CLIENT_RST : CLOSING_BY_SERVER_RST);
|
||||
session_manager_update_tcp_to_closing(mgr, sess, 1);
|
||||
return;
|
||||
}
|
||||
@@ -782,7 +782,7 @@ static inline void session_manager_handle_tcp_on_active(struct session_manager *
|
||||
{
|
||||
SESSION_LOG_DEBUG("TCP %s FIN received, session %lu active -> active", (tcp_curr_state & TCP_C2S_FIN_RECVED) ? "C2S" : "S2C", session_get_id(sess));
|
||||
// still active
|
||||
session_set_closing_reasion(sess, (tcp_curr_state & TCP_C2S_FIN_RECVED) ? CLOSING_BY_CLIENT_FIN : CLOSING_BY_SERVER_FIN);
|
||||
session_set_closing_reason(sess, (tcp_curr_state & TCP_C2S_FIN_RECVED) ? CLOSING_BY_CLIENT_FIN : CLOSING_BY_SERVER_FIN);
|
||||
session_manager_update_session_timer(mgr, sess, tcp_half_closed_timeout_cb, mgr->config.tcp_timeout_half_closed);
|
||||
return;
|
||||
}
|
||||
@@ -981,7 +981,7 @@ static inline void session_manager_free_session(struct session_manager *mgr, str
|
||||
{
|
||||
if (sess)
|
||||
{
|
||||
SESSION_LOG_DEBUG("%s, session %lu closing -> closed", session_closing_reasion_tostring(session_get_closing_reasion(sess)), session_get_id(sess));
|
||||
SESSION_LOG_DEBUG("%s, session %lu closing -> closed", session_closing_reason_tostring(session_get_closing_reason(sess)), session_get_id(sess));
|
||||
session_manager_update_session_to_closed(mgr, sess);
|
||||
if (session_get_type(sess) == SESSION_TYPE_TCP)
|
||||
{
|
||||
@@ -1014,7 +1014,7 @@ static inline void session_manager_recycle_session(struct session_manager *mgr)
|
||||
|
||||
static inline void session_manager_evicte_session(struct session_manager *mgr, struct session *sess)
|
||||
{
|
||||
session_set_closing_reasion(sess, CLOSING_BY_EVICTED);
|
||||
session_set_closing_reason(sess, CLOSING_BY_EVICTED);
|
||||
session_manager_update_session_state(mgr, sess, SESSION_STATE_CLOSING);
|
||||
session_queue_push(mgr->sess_evicted_queue, sess);
|
||||
session_timer_del_session(mgr->sess_timer, sess);
|
||||
|
||||
@@ -30,8 +30,8 @@ struct session
|
||||
// dup traffic flag
|
||||
enum dup_traffic_flag dup_flag;
|
||||
|
||||
// closing reasion
|
||||
enum closing_reasion closing_reasion;
|
||||
// closing reason
|
||||
enum closing_reason closing_reason;
|
||||
|
||||
// session metrics
|
||||
uint64_t c2s_bytes;
|
||||
|
||||
@@ -59,7 +59,7 @@ TEST(OVERLOAD, EVICT_TCP_OLD_SESS)
|
||||
sess = session_manager_get_evicted_session(mgr);
|
||||
EXPECT_TRUE(sess);
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_CLOSING);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == CLOSING_BY_EVICTED);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == CLOSING_BY_EVICTED);
|
||||
|
||||
packet_parse(&pkt, (const char *)tcp_pkt1_c2s_syn, sizeof(tcp_pkt1_c2s_syn));
|
||||
overwrite_ipv4_saddr(&pkt, 1);
|
||||
|
||||
@@ -59,7 +59,7 @@ TEST(OVERLOAD, EVICT_UDP_OLD_SESS)
|
||||
sess = session_manager_get_evicted_session(mgr);
|
||||
EXPECT_TRUE(sess);
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_CLOSING);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == CLOSING_BY_EVICTED);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == CLOSING_BY_EVICTED);
|
||||
|
||||
packet_parse(&pkt, (const char *)udp_pkt1_dns_req, sizeof(udp_pkt1_dns_req));
|
||||
overwrite_ipv4_saddr(&pkt, 1);
|
||||
|
||||
@@ -21,7 +21,7 @@ static void build_active_tcp_session(struct session_manager *mgr, struct session
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_OPENING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == 0);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1);
|
||||
@@ -56,7 +56,7 @@ static void build_active_tcp_session(struct session_manager *mgr, struct session
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_ACTIVE);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == 0);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78 + 145);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1 + 1);
|
||||
@@ -111,7 +111,7 @@ TEST(TCP_ACTIVE_TO_CLOSING, BY_FIN_FIN)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_ACTIVE);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == CLOSING_BY_CLIENT_FIN);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == CLOSING_BY_CLIENT_FIN);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78 + 145 + 66);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1 + 1 + 1);
|
||||
@@ -145,7 +145,7 @@ TEST(TCP_ACTIVE_TO_CLOSING, BY_FIN_FIN)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_CLOSING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == CLOSING_BY_CLIENT_FIN);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == CLOSING_BY_CLIENT_FIN);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78 + 145 + 66);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 66);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1 + 1 + 1);
|
||||
@@ -209,7 +209,7 @@ TEST(TCP_ACTIVE_TO_CLOSING, BY_C2S_RST)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_CLOSING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == CLOSING_BY_CLIENT_RST);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == CLOSING_BY_CLIENT_RST);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78 + 145 + 66);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1 + 1 + 1);
|
||||
@@ -273,7 +273,7 @@ TEST(TCP_ACTIVE_TO_CLOSING, BY_S2C_RST)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_CLOSING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == CLOSING_BY_SERVER_RST);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == CLOSING_BY_SERVER_RST);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78 + 145);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 66);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1 + 1);
|
||||
@@ -356,7 +356,7 @@ TEST(TCP_ACTIVE_TO_CLOSING, BY_C2S_HALF_CLOSED_TIMEOUT)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_ACTIVE);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == CLOSING_BY_CLIENT_FIN);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == CLOSING_BY_CLIENT_FIN);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78 + 145 + 66);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1 + 1 + 1);
|
||||
@@ -413,7 +413,7 @@ TEST(TCP_ACTIVE_TO_CLOSING, BY_S2C_HALF_CLOSED_TIMEOUT)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_ACTIVE);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == CLOSING_BY_SERVER_FIN);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == CLOSING_BY_SERVER_FIN);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78 + 145);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 66);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1 + 1);
|
||||
|
||||
@@ -33,7 +33,7 @@ TEST(TCP_INIT_TO_OPENING, BY_SYN)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_OPENING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == 0);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1);
|
||||
@@ -88,7 +88,7 @@ TEST(TCP_INIT_TO_OPENING, BY_SYNACK)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_OPENING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == 0);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 0);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 74);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 0);
|
||||
@@ -143,7 +143,7 @@ TEST(TCP_INIT_TO_OPENING, BY_SYN_SYNACK)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_OPENING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == 0);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1);
|
||||
@@ -178,7 +178,7 @@ TEST(TCP_INIT_TO_OPENING, BY_SYN_SYNACK)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_OPENING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == 0);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 74);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1);
|
||||
@@ -233,7 +233,7 @@ TEST(TCP_INIT_TO_OPENING, BY_SYN_SYNACK_ACK)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_OPENING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == 0);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1);
|
||||
@@ -268,7 +268,7 @@ TEST(TCP_INIT_TO_OPENING, BY_SYN_SYNACK_ACK)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_OPENING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == 0);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 74);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1);
|
||||
@@ -303,7 +303,7 @@ TEST(TCP_INIT_TO_OPENING, BY_SYN_SYNACK_ACK)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_OPENING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == 0);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78 + 66);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 74);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1 + 1);
|
||||
@@ -359,7 +359,7 @@ TEST(TCP_INIT_TO_OPENING, BY_SYN_RETRANSMISSION)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_OPENING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == 0);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1);
|
||||
@@ -400,7 +400,7 @@ TEST(TCP_INIT_TO_OPENING, BY_SYN_RETRANSMISSION)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_OPENING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == 0);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78 + 78);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1 + 1);
|
||||
@@ -457,7 +457,7 @@ TEST(TCP_INIT_TO_OPENING, BY_SYNACK_RETRANSMISSION)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_OPENING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == 0);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 0);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 74);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 0);
|
||||
@@ -498,7 +498,7 @@ TEST(TCP_INIT_TO_OPENING, BY_SYNACK_RETRANSMISSION)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_OPENING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == 0);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 0);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 74 + 74);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 0);
|
||||
@@ -553,7 +553,7 @@ TEST(TCP_INIT_TO_OPENING, BY_C2S_ASMMETRIC)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_OPENING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == 0);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1);
|
||||
@@ -588,7 +588,7 @@ TEST(TCP_INIT_TO_OPENING, BY_C2S_ASMMETRIC)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_OPENING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == 0);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78 + 66);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1 + 1);
|
||||
@@ -643,7 +643,7 @@ TEST(TCP_INIT_TO_OPENING, BY_S2C_ASMMETRIC)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_OPENING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == 0);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 0);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 74);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 0);
|
||||
@@ -678,7 +678,7 @@ TEST(TCP_INIT_TO_OPENING, BY_S2C_ASMMETRIC)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_OPENING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == 0);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 0);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 74 + 66);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 0);
|
||||
|
||||
@@ -30,7 +30,7 @@ TEST(TCP_INIT_TO_OPENING_TO_ACTIVE_TO_CLOSING_TO_CLOSED, TEST)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_OPENING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == 0);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1);
|
||||
@@ -66,7 +66,7 @@ TEST(TCP_INIT_TO_OPENING_TO_ACTIVE_TO_CLOSING_TO_CLOSED, TEST)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_OPENING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == 0);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 74);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1);
|
||||
@@ -101,7 +101,7 @@ TEST(TCP_INIT_TO_OPENING_TO_ACTIVE_TO_CLOSING_TO_CLOSED, TEST)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_OPENING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == 0);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78 + 66);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 74);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1 + 1);
|
||||
@@ -136,7 +136,7 @@ TEST(TCP_INIT_TO_OPENING_TO_ACTIVE_TO_CLOSING_TO_CLOSED, TEST)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_ACTIVE);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == 0);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78 + 66 + 145);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 74);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1 + 1 + 1);
|
||||
@@ -171,7 +171,7 @@ TEST(TCP_INIT_TO_OPENING_TO_ACTIVE_TO_CLOSING_TO_CLOSED, TEST)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_ACTIVE);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == 0);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78 + 66 + 145);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 74 + 66);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1 + 1 + 1);
|
||||
@@ -206,7 +206,7 @@ TEST(TCP_INIT_TO_OPENING_TO_ACTIVE_TO_CLOSING_TO_CLOSED, TEST)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_ACTIVE);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == 0);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78 + 66 + 145);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 74 + 66 + 1354);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1 + 1 + 1);
|
||||
@@ -241,7 +241,7 @@ TEST(TCP_INIT_TO_OPENING_TO_ACTIVE_TO_CLOSING_TO_CLOSED, TEST)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_ACTIVE);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == 0);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78 + 66 + 145);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 74 + 66 + 1354 + 385);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1 + 1 + 1);
|
||||
@@ -276,7 +276,7 @@ TEST(TCP_INIT_TO_OPENING_TO_ACTIVE_TO_CLOSING_TO_CLOSED, TEST)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_ACTIVE);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == 0);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78 + 66 + 145 + 66);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 74 + 66 + 1354 + 385);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1 + 1 + 1 + 1);
|
||||
@@ -311,7 +311,7 @@ TEST(TCP_INIT_TO_OPENING_TO_ACTIVE_TO_CLOSING_TO_CLOSED, TEST)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_ACTIVE);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == CLOSING_BY_CLIENT_FIN);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == CLOSING_BY_CLIENT_FIN);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78 + 66 + 145 + 66 + 66);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 74 + 66 + 1354 + 385);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1 + 1 + 1 + 1 + 1);
|
||||
@@ -346,7 +346,7 @@ TEST(TCP_INIT_TO_OPENING_TO_ACTIVE_TO_CLOSING_TO_CLOSED, TEST)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_CLOSING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == CLOSING_BY_CLIENT_FIN);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == CLOSING_BY_CLIENT_FIN);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78 + 66 + 145 + 66 + 66);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 74 + 66 + 1354 + 385 + 66);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1 + 1 + 1 + 1 + 1);
|
||||
@@ -381,7 +381,7 @@ TEST(TCP_INIT_TO_OPENING_TO_ACTIVE_TO_CLOSING_TO_CLOSED, TEST)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_CLOSING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == CLOSING_BY_CLIENT_FIN);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == CLOSING_BY_CLIENT_FIN);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78 + 66 + 145 + 66 + 66 + 66);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 74 + 66 + 1354 + 385 + 66);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1 + 1 + 1 + 1 + 1 + 1);
|
||||
|
||||
@@ -33,7 +33,7 @@ TEST(TCP_OPENING_TO_ACTIVE, BY_SYN_C2S_DATA)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_OPENING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == 0);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1);
|
||||
@@ -68,7 +68,7 @@ TEST(TCP_OPENING_TO_ACTIVE, BY_SYN_C2S_DATA)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_ACTIVE);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == 0);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78 + 145);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1 + 1);
|
||||
@@ -122,7 +122,7 @@ TEST(TCP_OPENING_TO_ACTIVE, BY_SYNACK_S2C_DATA)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_OPENING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == 0);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 0);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 74);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 0);
|
||||
@@ -157,7 +157,7 @@ TEST(TCP_OPENING_TO_ACTIVE, BY_SYNACK_S2C_DATA)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_ACTIVE);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == 0);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 0);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 74 + 1354);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 0);
|
||||
|
||||
@@ -21,7 +21,7 @@ static void build_opening_tcp_session(struct session_manager *mgr, struct sessio
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_OPENING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == 0);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1);
|
||||
@@ -77,7 +77,7 @@ TEST(TCP_OPENING_TO_CLOSING, BY_FIN_FIN)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_OPENING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == CLOSING_BY_CLIENT_FIN);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == CLOSING_BY_CLIENT_FIN);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78 + 66);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1 + 1);
|
||||
@@ -111,7 +111,7 @@ TEST(TCP_OPENING_TO_CLOSING, BY_FIN_FIN)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_CLOSING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == CLOSING_BY_CLIENT_FIN);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == CLOSING_BY_CLIENT_FIN);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78 + 66);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 66);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1 + 1);
|
||||
@@ -175,7 +175,7 @@ TEST(TCP_OPENING_TO_CLOSING, BY_C2S_RST)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_CLOSING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == CLOSING_BY_CLIENT_RST);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == CLOSING_BY_CLIENT_RST);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78 + 66);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1 + 1);
|
||||
@@ -239,7 +239,7 @@ TEST(TCP_OPENING_TO_CLOSING, BY_S2C_RST)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_CLOSING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == CLOSING_BY_SERVER_RST);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == CLOSING_BY_SERVER_RST);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 66);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1);
|
||||
@@ -322,7 +322,7 @@ TEST(TCP_OPENING_TO_CLOSING, BY_HANDSHAKE_TIMEOUT)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_OPENING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == 0);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 74);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1);
|
||||
@@ -380,7 +380,7 @@ TEST(TCP_OPENING_TO_CLOSING, BY_DATA_TIMEOUT)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_OPENING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == 0);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 74);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1);
|
||||
@@ -415,7 +415,7 @@ TEST(TCP_OPENING_TO_CLOSING, BY_DATA_TIMEOUT)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_OPENING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == 0);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78 + 66);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 74);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1 + 1);
|
||||
@@ -472,7 +472,7 @@ TEST(TCP_OPENING_TO_CLOSING, BY_C2S_HALF_CLOSED_TIMEOUT)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_OPENING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == CLOSING_BY_CLIENT_FIN);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == CLOSING_BY_CLIENT_FIN);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78 + 66);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1 + 1);
|
||||
@@ -529,7 +529,7 @@ TEST(TCP_OPENING_TO_CLOSING, BY_S2C_HALF_CLOSED_TIMEOUT)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_OPENING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_TCP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == CLOSING_BY_SERVER_FIN);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == CLOSING_BY_SERVER_FIN);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 78);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 66);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1);
|
||||
|
||||
@@ -37,7 +37,7 @@ TEST(UDP_INIT_TO_OPENING_TO_ACTIVE_TO_CLOSING, TEST)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_OPENING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_UDP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == 0);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 74);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1);
|
||||
@@ -72,7 +72,7 @@ TEST(UDP_INIT_TO_OPENING_TO_ACTIVE_TO_CLOSING, TEST)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_ACTIVE);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_UDP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == 0);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 74);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 550);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1);
|
||||
|
||||
@@ -35,7 +35,7 @@ TEST(UDP_INIT_TO_OPENING_TO_CLOSING, BY_C2S)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_OPENING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_UDP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == 0);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 74);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 1);
|
||||
@@ -92,7 +92,7 @@ TEST(UDP_INIT_TO_OPENING_TO_CLOSING, BY_S2C)
|
||||
EXPECT_TRUE(session_get_state(sess) == SESSION_STATE_OPENING);
|
||||
EXPECT_TRUE(session_get_type(sess) == SESSION_TYPE_UDP);
|
||||
EXPECT_TRUE(session_get_dup_traffic_flag(sess) == DUP_TRAFFIC_NO);
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == 0);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == 0);
|
||||
EXPECT_TRUE(session_get_c2s_bytes(sess) == 0);
|
||||
EXPECT_TRUE(session_get_s2c_bytes(sess) == 550);
|
||||
EXPECT_TRUE(session_get_c2s_packets(sess) == 0);
|
||||
|
||||
@@ -65,7 +65,7 @@ __attribute__((unused)) static void __session_dispatch(struct session *sess)
|
||||
session_set_cur_dir(sess, SESSION_DIR_NONE);
|
||||
}
|
||||
|
||||
__attribute__((unused)) static void __session_manager_wait(struct session_manager *mgr, enum closing_reasion reason)
|
||||
__attribute__((unused)) static void __session_manager_wait(struct session_manager *mgr, enum closing_reason reason)
|
||||
{
|
||||
struct session *sess;
|
||||
for (int i = 0; i < 5; i++)
|
||||
@@ -75,13 +75,13 @@ __attribute__((unused)) static void __session_manager_wait(struct session_manage
|
||||
__session_dispatch(sess);
|
||||
if (sess && session_get_state(sess) == SESSION_STATE_CLOSING)
|
||||
{
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == reason);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == reason);
|
||||
}
|
||||
sess = session_manager_get_evicted_session(mgr);
|
||||
__session_dispatch(sess);
|
||||
if (sess && session_get_state(sess) == SESSION_STATE_CLOSING)
|
||||
{
|
||||
EXPECT_TRUE(session_get_closing_reasion(sess) == reason);
|
||||
EXPECT_TRUE(session_get_closing_reason(sess) == reason);
|
||||
}
|
||||
sleep(1);
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user