68be56d282
Fixing the bug with shadowed ret variable (and hence not returning timeout error) reveled another bug in TCP server tests. Here, the listening context was incorrectly used to receive new data, and since it never arrived, the function timed out. This commits fixes that issue, and limits the retransmission timeout to ensure that Nagle's algorithm impact does not affect test timings. Signed-off-by: Robert Lubos <robert.lubos@nordicsemi.no>
56 lines
1.1 KiB
Plaintext
56 lines
1.1 KiB
Plaintext
CONFIG_TEST=y
|
|
CONFIG_NETWORKING=y
|
|
CONFIG_NET_TEST=y
|
|
CONFIG_NET_L2_DUMMY=y
|
|
CONFIG_NET_L2_ETHERNET=n
|
|
|
|
CONFIG_NET_TCP=y
|
|
CONFIG_NET_MAX_CONN=64
|
|
CONFIG_NET_IPV6=y
|
|
CONFIG_NET_IPV4=y
|
|
|
|
CONFIG_NET_BUF=y
|
|
|
|
CONFIG_MAIN_STACK_SIZE=2048
|
|
CONFIG_NET_PKT_RX_COUNT=30
|
|
CONFIG_NET_PKT_TX_COUNT=30
|
|
CONFIG_NET_BUF_RX_COUNT=30
|
|
CONFIG_NET_BUF_TX_COUNT=30
|
|
|
|
CONFIG_NET_MAX_CONTEXTS=10
|
|
CONFIG_NET_LOG=y
|
|
CONFIG_NET_STATISTICS=y
|
|
|
|
CONFIG_ENTROPY_GENERATOR=y
|
|
CONFIG_TEST_RANDOM_GENERATOR=y
|
|
|
|
CONFIG_NET_IF_MAX_IPV4_COUNT=2
|
|
CONFIG_NET_IF_UNICAST_IPV4_ADDR_COUNT=3
|
|
CONFIG_NET_TCP_CHECKSUM=n
|
|
CONFIG_NET_TCP_RANDOMIZED_RTO=n
|
|
CONFIG_NET_TCP_INIT_RETRANSMISSION_TIMEOUT=100
|
|
|
|
CONFIG_NET_IPV6_ND=n
|
|
CONFIG_NET_IPV6_DAD=n
|
|
CONFIG_NET_IPV6_NBR_CACHE=n
|
|
CONFIG_NET_IPV6_MLD=n
|
|
|
|
CONFIG_ZTEST=y
|
|
CONFIG_ZTEST_NEW_API=y
|
|
CONFIG_ZTEST_STACK_SIZE=3072
|
|
|
|
CONFIG_HEAP_MEM_POOL_SIZE=8192
|
|
|
|
# Test purpose keep it short
|
|
CONFIG_NET_TCP_TIME_WAIT_DELAY=100
|
|
|
|
CONFIG_LOG=y
|
|
CONFIG_NET_LOG=y
|
|
# Useful for debugging these tests
|
|
#CONFIG_NET_CONN_LOG_LEVEL_DBG=y
|
|
#CONFIG_NET_CONTEXT_LOG_LEVEL_DBG=y
|
|
#CONFIG_NET_TCP_LOG_LEVEL_DBG=y
|
|
#CONFIG_NET_IPV4_LOG_LEVEL_DBG=y
|
|
#CONFIG_NET_IPV6_LOG_LEVEL_DBG=y
|
|
#CONFIG_NET_CORE_LOG_LEVEL_DBG=y
|