2013-12-18 07:55:28 +08:00
|
|
|
#ifdef HAVE_CONFIG_H
|
|
|
|
#include "config.h"
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <stdint.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <check.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <time.h>
|
|
|
|
|
|
|
|
#include "../toxcore/tox.h"
|
|
|
|
|
2014-08-08 04:59:47 +08:00
|
|
|
#include "helpers.h"
|
|
|
|
|
2014-01-20 07:18:25 +08:00
|
|
|
#if defined(_WIN32) || defined(__WIN32__) || defined (WIN32)
|
2013-12-18 07:55:28 +08:00
|
|
|
#define c_sleep(x) Sleep(1*x)
|
|
|
|
#else
|
|
|
|
#include <unistd.h>
|
|
|
|
#define c_sleep(x) usleep(1000*x)
|
|
|
|
#endif
|
|
|
|
|
2015-03-11 05:31:50 +08:00
|
|
|
|
2015-02-26 10:09:14 +08:00
|
|
|
void accept_friend_request(Tox *m, const uint8_t *public_key, const uint8_t *data, size_t length, void *userdata)
|
2013-12-18 07:55:28 +08:00
|
|
|
{
|
2014-03-17 01:24:39 +08:00
|
|
|
if (*((uint32_t *)userdata) != 974536)
|
|
|
|
return;
|
2013-12-18 07:55:28 +08:00
|
|
|
|
2014-01-18 02:35:40 +08:00
|
|
|
if (length == 7 && memcmp("Gentoo", data, 7) == 0) {
|
2015-02-26 10:09:14 +08:00
|
|
|
tox_friend_add_norequest(m, public_key, 0);
|
2014-01-18 02:35:40 +08:00
|
|
|
}
|
2013-12-18 07:55:28 +08:00
|
|
|
}
|
2013-12-23 11:30:14 +08:00
|
|
|
uint32_t messages_received;
|
|
|
|
|
2015-03-19 03:32:53 +08:00
|
|
|
void print_message(Tox *m, uint32_t friendnumber, TOX_MESSAGE_TYPE type, const uint8_t *string, size_t length,
|
|
|
|
void *userdata)
|
2013-12-23 11:30:14 +08:00
|
|
|
{
|
|
|
|
if (*((uint32_t *)userdata) != 974536)
|
|
|
|
return;
|
|
|
|
|
2015-03-19 05:14:57 +08:00
|
|
|
if (type != TOX_MESSAGE_TYPE_NORMAL) {
|
2015-03-19 03:32:53 +08:00
|
|
|
ck_abort_msg("Bad type");
|
|
|
|
}
|
|
|
|
|
2014-06-02 08:48:02 +08:00
|
|
|
uint8_t cmp_msg[TOX_MAX_MESSAGE_LENGTH];
|
|
|
|
memset(cmp_msg, 'G', sizeof(cmp_msg));
|
|
|
|
|
|
|
|
if (length == TOX_MAX_MESSAGE_LENGTH && memcmp(string, cmp_msg, sizeof(cmp_msg)) == 0)
|
2013-12-23 11:30:14 +08:00
|
|
|
++messages_received;
|
|
|
|
}
|
|
|
|
|
|
|
|
uint32_t name_changes;
|
|
|
|
|
2015-02-26 10:09:14 +08:00
|
|
|
void print_nickchange(Tox *m, uint32_t friendnumber, const uint8_t *string, size_t length, void *userdata)
|
2013-12-23 11:30:14 +08:00
|
|
|
{
|
|
|
|
if (*((uint32_t *)userdata) != 974536)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (length == sizeof("Gentoo") && memcmp(string, "Gentoo", sizeof("Gentoo")) == 0)
|
|
|
|
++name_changes;
|
|
|
|
}
|
2013-12-18 07:55:28 +08:00
|
|
|
|
2015-03-13 00:18:52 +08:00
|
|
|
uint32_t status_m_changes;
|
|
|
|
void print_status_m_change(Tox *tox, uint32_t friend_number, const uint8_t *message, size_t length, void *user_data)
|
|
|
|
{
|
|
|
|
if (*((uint32_t *)user_data) != 974536)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (length == sizeof("Installing Gentoo") && memcmp(message, "Installing Gentoo", sizeof("Installing Gentoo")) == 0)
|
|
|
|
++status_m_changes;
|
|
|
|
}
|
|
|
|
|
2014-02-19 02:49:17 +08:00
|
|
|
uint32_t typing_changes;
|
|
|
|
|
2015-02-26 10:09:14 +08:00
|
|
|
void print_typingchange(Tox *m, uint32_t friendnumber, bool typing, void *userdata)
|
2014-02-19 02:49:17 +08:00
|
|
|
{
|
|
|
|
if (*((uint32_t *)userdata) != 974536)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (!typing)
|
|
|
|
typing_changes = 1;
|
|
|
|
else
|
|
|
|
typing_changes = 2;
|
|
|
|
}
|
|
|
|
|
2014-09-09 00:20:44 +08:00
|
|
|
uint32_t custom_packet;
|
|
|
|
|
2015-02-26 21:24:19 +08:00
|
|
|
void handle_custom_packet(Tox *m, uint32_t friend_num, const uint8_t *data, size_t len, void *object)
|
2014-09-09 00:20:44 +08:00
|
|
|
{
|
|
|
|
uint8_t number = *((uint32_t *)object);
|
|
|
|
|
|
|
|
if (len != TOX_MAX_CUSTOM_PACKET_SIZE)
|
2015-02-26 21:24:19 +08:00
|
|
|
return;
|
2014-09-09 00:20:44 +08:00
|
|
|
|
|
|
|
uint8_t f_data[len];
|
|
|
|
memset(f_data, number, len);
|
2014-11-26 04:31:46 +08:00
|
|
|
|
2014-09-09 00:20:44 +08:00
|
|
|
if (memcmp(f_data, data, len) == 0) {
|
|
|
|
++custom_packet;
|
|
|
|
} else {
|
2015-03-11 05:31:50 +08:00
|
|
|
ck_abort_msg("Custom packet fail. %u", number);
|
2014-09-09 00:20:44 +08:00
|
|
|
}
|
2014-09-22 02:55:23 +08:00
|
|
|
|
2015-02-26 21:24:19 +08:00
|
|
|
return;
|
2014-09-09 00:20:44 +08:00
|
|
|
}
|
|
|
|
|
2015-03-18 03:05:17 +08:00
|
|
|
uint64_t size_recv;
|
|
|
|
uint64_t sending_pos;
|
|
|
|
|
2015-03-18 01:44:48 +08:00
|
|
|
uint8_t file_cmp_id[TOX_FILE_ID_LENGTH];
|
2014-02-20 06:16:47 +08:00
|
|
|
uint8_t filenum;
|
|
|
|
uint32_t file_accepted;
|
|
|
|
uint64_t file_size;
|
2015-03-14 04:33:55 +08:00
|
|
|
void tox_file_receive(Tox *tox, uint32_t friend_number, uint32_t file_number, uint32_t kind, uint64_t filesize,
|
2015-03-11 05:31:50 +08:00
|
|
|
const uint8_t *filename, size_t filename_length, void *userdata)
|
2014-02-20 06:16:47 +08:00
|
|
|
{
|
|
|
|
if (*((uint32_t *)userdata) != 974536)
|
|
|
|
return;
|
|
|
|
|
2015-03-11 05:31:50 +08:00
|
|
|
if (kind != TOX_FILE_KIND_DATA) {
|
|
|
|
ck_abort_msg("Bad kind");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!(filename_length == sizeof("Gentoo.exe") && memcmp(filename, "Gentoo.exe", sizeof("Gentoo.exe")) == 0)) {
|
|
|
|
ck_abort_msg("Bad filename");
|
|
|
|
return;
|
|
|
|
}
|
2014-02-20 06:16:47 +08:00
|
|
|
|
2015-03-18 01:44:48 +08:00
|
|
|
uint8_t file_id[TOX_FILE_ID_LENGTH];
|
|
|
|
|
|
|
|
if (!tox_file_get_file_id(tox, friend_number, file_number, file_id, 0)) {
|
|
|
|
ck_abort_msg("tox_file_get_file_id error");
|
|
|
|
}
|
|
|
|
|
|
|
|
if (memcmp(file_id, file_cmp_id, TOX_FILE_ID_LENGTH) != 0) {
|
|
|
|
ck_abort_msg("bad file_id");
|
|
|
|
}
|
|
|
|
|
|
|
|
uint8_t empty[TOX_FILE_ID_LENGTH] = {0};
|
|
|
|
|
|
|
|
if (memcmp(empty, file_cmp_id, TOX_FILE_ID_LENGTH) == 0) {
|
|
|
|
ck_abort_msg("empty file_id");
|
|
|
|
}
|
|
|
|
|
2014-02-20 06:16:47 +08:00
|
|
|
file_size = filesize;
|
2015-03-18 03:05:17 +08:00
|
|
|
|
2015-03-21 20:35:31 +08:00
|
|
|
if (filesize) {
|
|
|
|
sending_pos = size_recv = 1337;
|
2015-03-18 03:05:17 +08:00
|
|
|
|
2015-03-21 20:35:31 +08:00
|
|
|
TOX_ERR_FILE_SEEK err_s;
|
2015-03-18 03:05:17 +08:00
|
|
|
|
2015-03-21 20:58:54 +08:00
|
|
|
if (!tox_file_seek(tox, friend_number, file_number, 1337, &err_s)) {
|
|
|
|
ck_abort_msg("tox_file_seek error");
|
2015-03-21 20:35:31 +08:00
|
|
|
}
|
|
|
|
|
2015-03-21 20:58:54 +08:00
|
|
|
ck_assert_msg(err_s == TOX_ERR_FILE_SEEK_OK, "tox_file_seek wrong error");
|
2015-03-21 20:35:31 +08:00
|
|
|
} else {
|
|
|
|
sending_pos = size_recv = 0;
|
|
|
|
}
|
2015-03-11 05:31:50 +08:00
|
|
|
|
|
|
|
TOX_ERR_FILE_CONTROL error;
|
|
|
|
|
2015-03-21 20:58:54 +08:00
|
|
|
if (tox_file_control(tox, friend_number, file_number, TOX_FILE_CONTROL_RESUME, &error)) {
|
2015-03-11 05:31:50 +08:00
|
|
|
++file_accepted;
|
|
|
|
} else {
|
2015-03-21 20:58:54 +08:00
|
|
|
ck_abort_msg("tox_file_control failed. %i", error);
|
2015-03-11 05:31:50 +08:00
|
|
|
}
|
2015-03-18 03:05:17 +08:00
|
|
|
|
2015-03-21 20:35:31 +08:00
|
|
|
TOX_ERR_FILE_SEEK err_s;
|
|
|
|
|
2015-03-21 20:58:54 +08:00
|
|
|
if (tox_file_seek(tox, friend_number, file_number, 1234, &err_s)) {
|
|
|
|
ck_abort_msg("tox_file_seek no error");
|
2015-03-18 03:05:17 +08:00
|
|
|
}
|
|
|
|
|
2015-03-21 20:58:54 +08:00
|
|
|
ck_assert_msg(err_s == TOX_ERR_FILE_SEEK_DENIED, "tox_file_seek wrong error");
|
2014-02-20 06:16:47 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
uint32_t sendf_ok;
|
2015-03-11 05:31:50 +08:00
|
|
|
void file_print_control(Tox *tox, uint32_t friend_number, uint32_t file_number, TOX_FILE_CONTROL control,
|
|
|
|
void *userdata)
|
2014-02-20 06:16:47 +08:00
|
|
|
{
|
|
|
|
if (*((uint32_t *)userdata) != 974536)
|
|
|
|
return;
|
|
|
|
|
2015-03-11 05:31:50 +08:00
|
|
|
/* First send file num is 0.*/
|
|
|
|
if (file_number == 0 && control == TOX_FILE_CONTROL_RESUME)
|
|
|
|
sendf_ok = 1;
|
|
|
|
}
|
2014-08-05 03:18:18 +08:00
|
|
|
|
2015-03-21 08:12:07 +08:00
|
|
|
uint64_t max_sending;
|
|
|
|
_Bool m_send_reached;
|
2015-03-11 05:31:50 +08:00
|
|
|
uint8_t sending_num;
|
|
|
|
_Bool file_sending_done;
|
2015-03-19 06:19:26 +08:00
|
|
|
void tox_file_chunk_request(Tox *tox, uint32_t friend_number, uint32_t file_number, uint64_t position, size_t length,
|
2015-03-11 05:31:50 +08:00
|
|
|
void *user_data)
|
|
|
|
{
|
|
|
|
if (*((uint32_t *)user_data) != 974536)
|
|
|
|
return;
|
2014-02-20 06:16:47 +08:00
|
|
|
|
2015-03-11 05:31:50 +08:00
|
|
|
if (!sendf_ok) {
|
|
|
|
ck_abort_msg("Didn't get resume control");
|
|
|
|
}
|
|
|
|
|
|
|
|
if (sending_pos != position) {
|
2015-03-18 03:05:17 +08:00
|
|
|
ck_abort_msg("Bad position %llu", position);
|
2015-03-11 05:31:50 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (length == 0) {
|
2015-03-21 09:15:44 +08:00
|
|
|
if (file_sending_done) {
|
|
|
|
ck_abort_msg("File sending already done.");
|
|
|
|
}
|
|
|
|
|
2015-03-11 05:31:50 +08:00
|
|
|
file_sending_done = 1;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-03-21 08:12:07 +08:00
|
|
|
if (position + length > max_sending) {
|
|
|
|
if (m_send_reached) {
|
|
|
|
ck_abort_msg("Requested done file tranfer.");
|
|
|
|
}
|
|
|
|
|
|
|
|
length = max_sending - position;
|
|
|
|
m_send_reached = 1;
|
|
|
|
}
|
|
|
|
|
2015-03-11 05:31:50 +08:00
|
|
|
TOX_ERR_FILE_SEND_CHUNK error;
|
|
|
|
uint8_t f_data[length];
|
|
|
|
memset(f_data, sending_num, length);
|
2014-02-20 06:16:47 +08:00
|
|
|
|
2015-03-13 03:17:34 +08:00
|
|
|
if (tox_file_send_chunk(tox, friend_number, file_number, position, f_data, length, &error)) {
|
2015-03-11 05:31:50 +08:00
|
|
|
++sending_num;
|
|
|
|
sending_pos += length;
|
|
|
|
} else {
|
|
|
|
ck_abort_msg("Could not send chunk %i", error);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (error != TOX_ERR_FILE_SEND_CHUNK_OK) {
|
|
|
|
ck_abort_msg("Wrong error code");
|
|
|
|
}
|
2014-02-20 06:16:47 +08:00
|
|
|
}
|
|
|
|
|
2015-03-11 05:31:50 +08:00
|
|
|
|
2014-05-10 09:46:37 +08:00
|
|
|
uint8_t num;
|
2015-03-11 05:31:50 +08:00
|
|
|
_Bool file_recv;
|
|
|
|
void write_file(Tox *tox, uint32_t friendnumber, uint32_t filenumber, uint64_t position, const uint8_t *data,
|
|
|
|
size_t length, void *user_data)
|
2014-02-20 06:16:47 +08:00
|
|
|
{
|
2015-03-11 05:31:50 +08:00
|
|
|
if (*((uint32_t *)user_data) != 974536)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (size_recv != position) {
|
|
|
|
ck_abort_msg("Bad position");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (length == 0) {
|
|
|
|
file_recv = 1;
|
2014-02-20 06:16:47 +08:00
|
|
|
return;
|
2015-03-11 05:31:50 +08:00
|
|
|
}
|
2014-02-20 06:16:47 +08:00
|
|
|
|
2014-09-09 00:20:44 +08:00
|
|
|
uint8_t f_data[length];
|
2014-05-10 09:46:37 +08:00
|
|
|
memset(f_data, num, length);
|
|
|
|
++num;
|
2014-02-20 06:16:47 +08:00
|
|
|
|
2014-05-10 09:46:37 +08:00
|
|
|
if (memcmp(f_data, data, length) == 0) {
|
2014-02-20 06:16:47 +08:00
|
|
|
size_recv += length;
|
2014-05-10 09:46:37 +08:00
|
|
|
} else {
|
2015-03-11 05:31:50 +08:00
|
|
|
ck_abort_msg("FILE_CORRUPTED");
|
2014-05-10 09:46:37 +08:00
|
|
|
}
|
2014-02-20 06:16:47 +08:00
|
|
|
}
|
|
|
|
|
2015-03-12 03:37:25 +08:00
|
|
|
unsigned int connected_t1;
|
|
|
|
void tox_connection_status(Tox *tox, TOX_CONNECTION connection_status, void *user_data)
|
|
|
|
{
|
|
|
|
if (*((uint32_t *)user_data) != 974536)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (connected_t1 && !connection_status)
|
|
|
|
ck_abort_msg("Tox went offline");
|
|
|
|
|
|
|
|
connected_t1 = connection_status;
|
|
|
|
}
|
|
|
|
|
2014-12-11 01:12:37 +08:00
|
|
|
START_TEST(test_one)
|
|
|
|
{
|
2015-05-23 06:23:56 +08:00
|
|
|
Tox *tox1 = tox_new(0, 0);
|
|
|
|
Tox *tox2 = tox_new(0, 0);
|
2015-02-26 10:09:14 +08:00
|
|
|
|
2015-03-11 20:09:45 +08:00
|
|
|
{
|
|
|
|
TOX_ERR_GET_PORT error;
|
2015-03-12 06:26:25 +08:00
|
|
|
ck_assert_msg(tox_self_get_udp_port(tox1, &error) == 33445, "First Tox instance did not bind to udp port 33445.\n");
|
2015-03-11 20:09:45 +08:00
|
|
|
ck_assert_msg(error == TOX_ERR_GET_PORT_OK, "wrong error");
|
|
|
|
}
|
|
|
|
|
2015-02-26 10:09:14 +08:00
|
|
|
uint8_t address[TOX_ADDRESS_SIZE];
|
|
|
|
tox_self_get_address(tox1, address);
|
|
|
|
TOX_ERR_FRIEND_ADD error;
|
|
|
|
uint32_t ret = tox_friend_add(tox1, address, (uint8_t *)"m", 1, &error);
|
|
|
|
ck_assert_msg(ret == UINT32_MAX && error == TOX_ERR_FRIEND_ADD_OWN_KEY, "Adding own address worked.");
|
|
|
|
|
|
|
|
tox_self_get_address(tox2, address);
|
|
|
|
uint8_t message[TOX_MAX_FRIEND_REQUEST_LENGTH + 1];
|
|
|
|
ret = tox_friend_add(tox1, address, NULL, 0, &error);
|
|
|
|
ck_assert_msg(ret == UINT32_MAX && error == TOX_ERR_FRIEND_ADD_NULL, "Sending request with no message worked.");
|
|
|
|
ret = tox_friend_add(tox1, address, message, 0, &error);
|
|
|
|
ck_assert_msg(ret == UINT32_MAX && error == TOX_ERR_FRIEND_ADD_NO_MESSAGE, "Sending request with no message worked.");
|
|
|
|
ret = tox_friend_add(tox1, address, message, sizeof(message), &error);
|
|
|
|
ck_assert_msg(ret == UINT32_MAX && error == TOX_ERR_FRIEND_ADD_TOO_LONG,
|
|
|
|
"TOX_MAX_FRIEND_REQUEST_LENGTH is too big.");
|
2014-12-11 01:12:37 +08:00
|
|
|
|
|
|
|
address[0]++;
|
2015-02-26 10:09:14 +08:00
|
|
|
ret = tox_friend_add(tox1, address, (uint8_t *)"m", 1, &error);
|
|
|
|
ck_assert_msg(ret == UINT32_MAX && error == TOX_ERR_FRIEND_ADD_BAD_CHECKSUM,
|
2014-12-11 01:12:37 +08:00
|
|
|
"Adding address with bad checksum worked.");
|
|
|
|
|
2015-02-26 10:09:14 +08:00
|
|
|
tox_self_get_address(tox2, address);
|
|
|
|
ret = tox_friend_add(tox1, address, message, TOX_MAX_FRIEND_REQUEST_LENGTH, &error);
|
|
|
|
ck_assert_msg(ret == 0 && error == TOX_ERR_FRIEND_ADD_OK, "Failed to add friend.");
|
|
|
|
ret = tox_friend_add(tox1, address, message, TOX_MAX_FRIEND_REQUEST_LENGTH, &error);
|
|
|
|
ck_assert_msg(ret == UINT32_MAX && error == TOX_ERR_FRIEND_ADD_ALREADY_SENT, "Adding friend twice worked.");
|
2014-12-11 01:12:37 +08:00
|
|
|
|
2014-12-22 11:12:12 +08:00
|
|
|
uint8_t name[TOX_MAX_NAME_LENGTH];
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < TOX_MAX_NAME_LENGTH; ++i) {
|
|
|
|
name[i] = rand();
|
|
|
|
}
|
|
|
|
|
2015-02-26 10:09:14 +08:00
|
|
|
tox_self_set_name(tox1, name, sizeof(name), 0);
|
|
|
|
ck_assert_msg(tox_self_get_name_size(tox1) == sizeof(name), "Can't set name of TOX_MAX_NAME_LENGTH");
|
2014-12-22 11:12:12 +08:00
|
|
|
|
2015-05-22 08:39:47 +08:00
|
|
|
tox_self_get_address(tox1, address);
|
2015-03-18 04:20:38 +08:00
|
|
|
size_t save_size = tox_get_savedata_size(tox1);
|
2014-12-22 11:12:12 +08:00
|
|
|
uint8_t data[save_size];
|
2015-03-18 04:20:38 +08:00
|
|
|
tox_get_savedata(tox1, data);
|
2014-12-22 11:12:12 +08:00
|
|
|
|
|
|
|
tox_kill(tox2);
|
2015-02-26 10:09:14 +08:00
|
|
|
TOX_ERR_NEW err_n;
|
|
|
|
|
2015-05-23 06:23:56 +08:00
|
|
|
struct Tox_Options options;
|
|
|
|
tox_options_default(&options);
|
|
|
|
options.savedata_type = TOX_SAVEDATA_TYPE_TOX_SAVE;
|
|
|
|
options.savedata_data = data;
|
|
|
|
options.savedata_length = save_size;
|
|
|
|
tox2 = tox_new(&options, &err_n);
|
2015-02-26 10:09:14 +08:00
|
|
|
ck_assert_msg(err_n == TOX_ERR_NEW_OK, "Load failed");
|
2014-12-22 11:12:12 +08:00
|
|
|
|
2015-02-26 10:09:14 +08:00
|
|
|
ck_assert_msg(tox_self_get_name_size(tox2) == sizeof name, "Wrong name size.");
|
2014-12-22 11:12:12 +08:00
|
|
|
|
2015-05-22 08:39:47 +08:00
|
|
|
uint8_t address2[TOX_ADDRESS_SIZE];
|
|
|
|
tox_self_get_address(tox2, address2);
|
|
|
|
ck_assert_msg(memcmp(address2, address, TOX_ADDRESS_SIZE) == 0, "Wrong address.");
|
2014-12-22 11:12:12 +08:00
|
|
|
uint8_t new_name[TOX_MAX_NAME_LENGTH] = { 0 };
|
2015-02-26 10:09:14 +08:00
|
|
|
tox_self_get_name(tox2, new_name);
|
2014-12-22 11:12:12 +08:00
|
|
|
ck_assert_msg(memcmp(name, new_name, TOX_MAX_NAME_LENGTH) == 0, "Wrong name");
|
|
|
|
|
2015-06-02 08:16:03 +08:00
|
|
|
uint8_t sk[TOX_SECRET_KEY_SIZE];
|
|
|
|
tox_self_get_secret_key(tox2, sk);
|
|
|
|
tox_kill(tox2);
|
|
|
|
|
|
|
|
tox_options_default(&options);
|
|
|
|
options.savedata_type = TOX_SAVEDATA_TYPE_SECRET_KEY;
|
|
|
|
options.savedata_data = sk;
|
|
|
|
options.savedata_length = sizeof(sk);
|
|
|
|
tox2 = tox_new(&options, &err_n);
|
|
|
|
ck_assert_msg(err_n == TOX_ERR_NEW_OK, "Load failed");
|
|
|
|
uint8_t address3[TOX_ADDRESS_SIZE];
|
|
|
|
tox_self_get_address(tox2, address3);
|
|
|
|
ck_assert_msg(memcmp(address3, address, TOX_PUBLIC_KEY_SIZE) == 0, "Wrong public key.");
|
|
|
|
uint8_t pk[TOX_PUBLIC_KEY_SIZE];
|
|
|
|
tox_self_get_public_key(tox2, pk);
|
|
|
|
ck_assert_msg(memcmp(pk, address, TOX_PUBLIC_KEY_SIZE) == 0, "Wrong public key.");
|
|
|
|
|
2014-12-11 01:12:37 +08:00
|
|
|
tox_kill(tox1);
|
|
|
|
tox_kill(tox2);
|
|
|
|
}
|
|
|
|
END_TEST
|
|
|
|
|
2013-12-18 07:55:28 +08:00
|
|
|
START_TEST(test_few_clients)
|
|
|
|
{
|
2014-04-17 01:53:51 +08:00
|
|
|
long long unsigned int con_time, cur_time = time(NULL);
|
2015-03-13 03:17:34 +08:00
|
|
|
TOX_ERR_NEW t_n_error;
|
2015-05-23 06:23:56 +08:00
|
|
|
Tox *tox1 = tox_new(0, &t_n_error);
|
2015-03-13 03:17:34 +08:00
|
|
|
ck_assert_msg(t_n_error == TOX_ERR_NEW_OK, "wrong error");
|
2015-05-23 06:23:56 +08:00
|
|
|
Tox *tox2 = tox_new(0, &t_n_error);
|
2015-03-13 03:17:34 +08:00
|
|
|
ck_assert_msg(t_n_error == TOX_ERR_NEW_OK, "wrong error");
|
2015-05-23 06:23:56 +08:00
|
|
|
Tox *tox3 = tox_new(0, &t_n_error);
|
2015-03-13 03:17:34 +08:00
|
|
|
ck_assert_msg(t_n_error == TOX_ERR_NEW_OK, "wrong error");
|
|
|
|
|
2013-12-18 07:55:28 +08:00
|
|
|
ck_assert_msg(tox1 || tox2 || tox3, "Failed to create 3 tox instances");
|
2015-03-11 20:09:45 +08:00
|
|
|
|
|
|
|
{
|
|
|
|
TOX_ERR_GET_PORT error;
|
2015-03-12 06:26:25 +08:00
|
|
|
ck_assert_msg(tox_self_get_udp_port(tox1, &error) == 33445, "First Tox instance did not bind to udp port 33445.\n");
|
2015-03-11 20:09:45 +08:00
|
|
|
ck_assert_msg(error == TOX_ERR_GET_PORT_OK, "wrong error");
|
|
|
|
}
|
|
|
|
|
2015-03-13 07:04:49 +08:00
|
|
|
{
|
|
|
|
TOX_ERR_GET_PORT error;
|
2015-03-14 03:29:34 +08:00
|
|
|
ck_assert_msg(tox_self_get_udp_port(tox2, &error) == 33446, "Second Tox instance did not bind to udp port 33446.\n");
|
2015-03-13 07:04:49 +08:00
|
|
|
ck_assert_msg(error == TOX_ERR_GET_PORT_OK, "wrong error");
|
|
|
|
}
|
|
|
|
|
|
|
|
{
|
|
|
|
TOX_ERR_GET_PORT error;
|
2015-03-14 03:29:34 +08:00
|
|
|
ck_assert_msg(tox_self_get_udp_port(tox3, &error) == 33447, "Third Tox instance did not bind to udp port 33447.\n");
|
2015-03-13 07:04:49 +08:00
|
|
|
ck_assert_msg(error == TOX_ERR_GET_PORT_OK, "wrong error");
|
|
|
|
}
|
|
|
|
|
2014-03-17 01:24:39 +08:00
|
|
|
uint32_t to_compare = 974536;
|
2015-03-12 03:37:25 +08:00
|
|
|
connected_t1 = 0;
|
2015-03-19 03:18:36 +08:00
|
|
|
tox_callback_self_connection_status(tox1, tox_connection_status, &to_compare);
|
2014-03-17 01:24:39 +08:00
|
|
|
tox_callback_friend_request(tox2, accept_friend_request, &to_compare);
|
2015-02-26 21:24:19 +08:00
|
|
|
uint8_t address[TOX_ADDRESS_SIZE];
|
|
|
|
tox_self_get_address(tox2, address);
|
|
|
|
uint32_t test = tox_friend_add(tox3, address, (uint8_t *)"Gentoo", 7, 0);
|
2013-12-18 07:55:28 +08:00
|
|
|
ck_assert_msg(test == 0, "Failed to add friend error code: %i", test);
|
|
|
|
|
2014-01-18 02:35:40 +08:00
|
|
|
uint8_t off = 1;
|
|
|
|
|
2013-12-18 07:55:28 +08:00
|
|
|
while (1) {
|
2015-03-12 06:26:25 +08:00
|
|
|
tox_iterate(tox1);
|
|
|
|
tox_iterate(tox2);
|
|
|
|
tox_iterate(tox3);
|
2013-12-18 07:55:28 +08:00
|
|
|
|
2015-03-19 04:15:36 +08:00
|
|
|
if (tox_self_get_connection_status(tox1) && tox_self_get_connection_status(tox2)
|
|
|
|
&& tox_self_get_connection_status(tox3)) {
|
2015-03-12 03:37:25 +08:00
|
|
|
if (off) {
|
|
|
|
printf("Toxes are online, took %llu seconds\n", time(NULL) - cur_time);
|
|
|
|
con_time = time(NULL);
|
|
|
|
off = 0;
|
|
|
|
}
|
2014-01-18 02:35:40 +08:00
|
|
|
|
2015-03-12 03:37:25 +08:00
|
|
|
if (tox_friend_get_connection_status(tox2, 0, 0) == TOX_CONNECTION_UDP
|
|
|
|
&& tox_friend_get_connection_status(tox3, 0, 0) == TOX_CONNECTION_UDP)
|
|
|
|
break;
|
|
|
|
}
|
2013-12-18 07:55:28 +08:00
|
|
|
|
|
|
|
c_sleep(50);
|
|
|
|
}
|
|
|
|
|
2015-03-12 03:37:25 +08:00
|
|
|
ck_assert_msg(connected_t1, "Tox1 isn't connected. %u", connected_t1);
|
2014-04-17 01:53:51 +08:00
|
|
|
printf("tox clients connected took %llu seconds\n", time(NULL) - con_time);
|
2014-03-17 01:24:39 +08:00
|
|
|
to_compare = 974536;
|
2013-12-23 11:30:14 +08:00
|
|
|
tox_callback_friend_message(tox3, print_message, &to_compare);
|
2014-06-02 08:48:02 +08:00
|
|
|
uint8_t msgs[TOX_MAX_MESSAGE_LENGTH + 1];
|
|
|
|
memset(msgs, 'G', sizeof(msgs));
|
2015-03-12 06:26:25 +08:00
|
|
|
TOX_ERR_FRIEND_SEND_MESSAGE errm;
|
2015-03-19 05:14:57 +08:00
|
|
|
tox_friend_send_message(tox2, 0, TOX_MESSAGE_TYPE_NORMAL, msgs, TOX_MAX_MESSAGE_LENGTH + 1, &errm);
|
2015-03-12 06:26:25 +08:00
|
|
|
ck_assert_msg(errm == TOX_ERR_FRIEND_SEND_MESSAGE_TOO_LONG, "TOX_MAX_MESSAGE_LENGTH is too small\n");
|
2015-03-19 05:14:57 +08:00
|
|
|
tox_friend_send_message(tox2, 0, TOX_MESSAGE_TYPE_NORMAL, msgs, TOX_MAX_MESSAGE_LENGTH, &errm);
|
2015-03-12 06:26:25 +08:00
|
|
|
ck_assert_msg(errm == TOX_ERR_FRIEND_SEND_MESSAGE_OK, "TOX_MAX_MESSAGE_LENGTH is too big\n");
|
2013-12-23 11:30:14 +08:00
|
|
|
|
|
|
|
while (1) {
|
|
|
|
messages_received = 0;
|
2015-03-12 06:26:25 +08:00
|
|
|
tox_iterate(tox1);
|
|
|
|
tox_iterate(tox2);
|
|
|
|
tox_iterate(tox3);
|
2013-12-23 11:30:14 +08:00
|
|
|
|
|
|
|
if (messages_received)
|
|
|
|
break;
|
|
|
|
|
|
|
|
c_sleep(50);
|
|
|
|
}
|
|
|
|
|
|
|
|
printf("tox clients messaging succeeded\n");
|
|
|
|
|
2015-02-26 21:24:19 +08:00
|
|
|
tox_callback_friend_name(tox3, print_nickchange, &to_compare);
|
|
|
|
TOX_ERR_SET_INFO err_n;
|
|
|
|
bool succ = tox_self_set_name(tox2, (uint8_t *)"Gentoo", sizeof("Gentoo"), &err_n);
|
|
|
|
ck_assert_msg(succ && err_n == TOX_ERR_SET_INFO_OK, "tox_self_set_name failed because %u\n", err_n);
|
2013-12-23 11:30:14 +08:00
|
|
|
|
|
|
|
while (1) {
|
|
|
|
name_changes = 0;
|
2015-03-12 06:26:25 +08:00
|
|
|
tox_iterate(tox1);
|
|
|
|
tox_iterate(tox2);
|
|
|
|
tox_iterate(tox3);
|
2013-12-23 11:30:14 +08:00
|
|
|
|
|
|
|
if (name_changes)
|
|
|
|
break;
|
|
|
|
|
|
|
|
c_sleep(50);
|
|
|
|
}
|
|
|
|
|
2015-02-26 21:24:19 +08:00
|
|
|
ck_assert_msg(tox_friend_get_name_size(tox3, 0, 0) == sizeof("Gentoo"), "Name length not correct");
|
2013-12-23 11:30:14 +08:00
|
|
|
uint8_t temp_name[sizeof("Gentoo")];
|
2015-02-26 21:24:19 +08:00
|
|
|
tox_friend_get_name(tox3, 0, temp_name, 0);
|
2013-12-23 11:30:14 +08:00
|
|
|
ck_assert_msg(memcmp(temp_name, "Gentoo", sizeof("Gentoo")) == 0, "Name not correct");
|
2014-02-19 02:49:17 +08:00
|
|
|
|
2015-03-13 00:18:52 +08:00
|
|
|
tox_callback_friend_status_message(tox3, print_status_m_change, &to_compare);
|
|
|
|
succ = tox_self_set_status_message(tox2, (uint8_t *)"Installing Gentoo", sizeof("Installing Gentoo"), &err_n);
|
|
|
|
ck_assert_msg(succ && err_n == TOX_ERR_SET_INFO_OK, "tox_self_set_status_message failed because %u\n", err_n);
|
|
|
|
|
|
|
|
while (1) {
|
|
|
|
status_m_changes = 0;
|
2015-03-14 03:29:34 +08:00
|
|
|
tox_iterate(tox1);
|
|
|
|
tox_iterate(tox2);
|
|
|
|
tox_iterate(tox3);
|
2015-03-13 00:18:52 +08:00
|
|
|
|
|
|
|
if (status_m_changes)
|
|
|
|
break;
|
|
|
|
|
|
|
|
c_sleep(50);
|
|
|
|
}
|
|
|
|
|
|
|
|
ck_assert_msg(tox_friend_get_status_message_size(tox3, 0, 0) == sizeof("Installing Gentoo"),
|
|
|
|
"status message length not correct");
|
|
|
|
uint8_t temp_status_m[sizeof("Installing Gentoo")];
|
|
|
|
tox_friend_get_status_message(tox3, 0, temp_status_m, 0);
|
|
|
|
ck_assert_msg(memcmp(temp_status_m, "Installing Gentoo", sizeof("Installing Gentoo")) == 0,
|
|
|
|
"status message not correct");
|
|
|
|
|
2015-02-26 21:24:19 +08:00
|
|
|
tox_callback_friend_typing(tox2, &print_typingchange, &to_compare);
|
|
|
|
tox_self_set_typing(tox3, 0, 1, 0);
|
2014-02-19 02:49:17 +08:00
|
|
|
|
|
|
|
while (1) {
|
|
|
|
typing_changes = 0;
|
2015-03-12 06:26:25 +08:00
|
|
|
tox_iterate(tox1);
|
|
|
|
tox_iterate(tox2);
|
|
|
|
tox_iterate(tox3);
|
2014-02-19 02:49:17 +08:00
|
|
|
|
|
|
|
|
|
|
|
if (typing_changes == 2)
|
|
|
|
break;
|
|
|
|
else
|
|
|
|
ck_assert_msg(typing_changes == 0, "Typing fail");
|
|
|
|
|
|
|
|
c_sleep(50);
|
|
|
|
}
|
|
|
|
|
2015-02-26 21:24:19 +08:00
|
|
|
ck_assert_msg(tox_friend_get_typing(tox2, 0, 0) == 1, "Typing fail");
|
|
|
|
tox_self_set_typing(tox3, 0, 0, 0);
|
2014-02-19 02:49:17 +08:00
|
|
|
|
|
|
|
while (1) {
|
|
|
|
typing_changes = 0;
|
2015-03-12 06:26:25 +08:00
|
|
|
tox_iterate(tox1);
|
|
|
|
tox_iterate(tox2);
|
|
|
|
tox_iterate(tox3);
|
2014-02-19 02:49:17 +08:00
|
|
|
|
|
|
|
if (typing_changes == 1)
|
|
|
|
break;
|
|
|
|
else
|
|
|
|
ck_assert_msg(typing_changes == 0, "Typing fail");
|
|
|
|
|
|
|
|
c_sleep(50);
|
|
|
|
}
|
|
|
|
|
2015-02-26 21:24:19 +08:00
|
|
|
TOX_ERR_FRIEND_QUERY err_t;
|
|
|
|
ck_assert_msg(tox_friend_get_typing(tox2, 0, &err_t) == 0, "Typing fail");
|
|
|
|
ck_assert_msg(err_t == TOX_ERR_FRIEND_QUERY_OK, "Typing fail");
|
2014-02-20 06:16:47 +08:00
|
|
|
|
2014-09-09 00:20:44 +08:00
|
|
|
uint32_t packet_number = 160;
|
2015-02-26 21:24:19 +08:00
|
|
|
tox_callback_friend_lossless_packet(tox3, &handle_custom_packet, &packet_number);
|
2014-09-09 00:20:44 +08:00
|
|
|
uint8_t data_c[TOX_MAX_CUSTOM_PACKET_SIZE + 1];
|
|
|
|
memset(data_c, ((uint8_t)packet_number), sizeof(data_c));
|
2015-03-12 06:26:25 +08:00
|
|
|
int ret = tox_friend_send_lossless_packet(tox2, 0, data_c, sizeof(data_c), 0);
|
|
|
|
ck_assert_msg(ret == 0, "tox_friend_send_lossless_packet bigger fail %i", ret);
|
|
|
|
ret = tox_friend_send_lossless_packet(tox2, 0, data_c, TOX_MAX_CUSTOM_PACKET_SIZE, 0);
|
|
|
|
ck_assert_msg(ret == 1, "tox_friend_send_lossless_packet fail %i", ret);
|
2014-09-09 00:20:44 +08:00
|
|
|
|
|
|
|
while (1) {
|
|
|
|
custom_packet = 0;
|
2015-03-12 06:26:25 +08:00
|
|
|
tox_iterate(tox1);
|
|
|
|
tox_iterate(tox2);
|
|
|
|
tox_iterate(tox3);
|
2014-09-09 00:20:44 +08:00
|
|
|
|
|
|
|
if (custom_packet == 1)
|
|
|
|
break;
|
|
|
|
else
|
|
|
|
ck_assert_msg(custom_packet == 0, "Lossless packet fail");
|
|
|
|
|
|
|
|
c_sleep(50);
|
|
|
|
}
|
2014-11-26 04:31:46 +08:00
|
|
|
|
2014-09-09 00:20:44 +08:00
|
|
|
packet_number = 200;
|
2015-02-26 21:24:19 +08:00
|
|
|
tox_callback_friend_lossy_packet(tox3, &handle_custom_packet, &packet_number);
|
2014-09-09 00:20:44 +08:00
|
|
|
memset(data_c, ((uint8_t)packet_number), sizeof(data_c));
|
2015-03-12 06:26:25 +08:00
|
|
|
ret = tox_friend_send_lossy_packet(tox2, 0, data_c, sizeof(data_c), 0);
|
|
|
|
ck_assert_msg(ret == 0, "tox_friend_send_lossy_packet bigger fail %i", ret);
|
|
|
|
ret = tox_friend_send_lossy_packet(tox2, 0, data_c, TOX_MAX_CUSTOM_PACKET_SIZE, 0);
|
|
|
|
ck_assert_msg(ret == 1, "tox_friend_send_lossy_packet fail %i", ret);
|
2014-09-09 00:20:44 +08:00
|
|
|
|
|
|
|
while (1) {
|
|
|
|
custom_packet = 0;
|
2015-03-12 06:26:25 +08:00
|
|
|
tox_iterate(tox1);
|
|
|
|
tox_iterate(tox2);
|
|
|
|
tox_iterate(tox3);
|
2014-09-09 00:20:44 +08:00
|
|
|
|
|
|
|
if (custom_packet == 1)
|
|
|
|
break;
|
|
|
|
else
|
|
|
|
ck_assert_msg(custom_packet == 0, "lossy packet fail");
|
|
|
|
|
|
|
|
c_sleep(50);
|
|
|
|
}
|
|
|
|
|
2015-03-13 00:18:52 +08:00
|
|
|
printf("Starting file transfer test.\n");
|
|
|
|
|
2015-03-11 05:31:50 +08:00
|
|
|
file_accepted = file_size = file_recv = sendf_ok = size_recv = 0;
|
2015-03-21 08:12:07 +08:00
|
|
|
max_sending = UINT64_MAX;
|
2014-02-20 06:16:47 +08:00
|
|
|
long long unsigned int f_time = time(NULL);
|
2015-03-19 00:54:00 +08:00
|
|
|
tox_callback_file_recv_chunk(tox3, write_file, &to_compare);
|
2015-03-12 06:26:25 +08:00
|
|
|
tox_callback_file_recv_control(tox2, file_print_control, &to_compare);
|
2015-03-19 06:19:26 +08:00
|
|
|
tox_callback_file_chunk_request(tox2, tox_file_chunk_request, &to_compare);
|
2015-03-12 06:26:25 +08:00
|
|
|
tox_callback_file_recv_control(tox3, file_print_control, &to_compare);
|
2015-03-19 00:54:00 +08:00
|
|
|
tox_callback_file_recv(tox3, tox_file_receive, &to_compare);
|
2014-02-20 06:16:47 +08:00
|
|
|
uint64_t totalf_size = 100 * 1024 * 1024;
|
2015-03-18 01:44:48 +08:00
|
|
|
uint32_t fnum = tox_file_send(tox2, 0, TOX_FILE_KIND_DATA, totalf_size, 0, (uint8_t *)"Gentoo.exe",
|
|
|
|
sizeof("Gentoo.exe"), 0);
|
2015-03-11 05:31:50 +08:00
|
|
|
ck_assert_msg(fnum != UINT32_MAX, "tox_new_file_sender fail");
|
|
|
|
|
2015-03-18 01:44:48 +08:00
|
|
|
TOX_ERR_FILE_GET gfierr;
|
|
|
|
ck_assert_msg(!tox_file_get_file_id(tox2, 1, fnum, file_cmp_id, &gfierr), "tox_file_get_file_id didn't fail");
|
|
|
|
ck_assert_msg(gfierr == TOX_ERR_FILE_GET_FRIEND_NOT_FOUND, "wrong error");
|
|
|
|
ck_assert_msg(!tox_file_get_file_id(tox2, 0, fnum + 1, file_cmp_id, &gfierr), "tox_file_get_file_id didn't fail");
|
|
|
|
ck_assert_msg(gfierr == TOX_ERR_FILE_GET_NOT_FOUND, "wrong error");
|
|
|
|
ck_assert_msg(tox_file_get_file_id(tox2, 0, fnum, file_cmp_id, &gfierr), "tox_file_get_file_id failed");
|
|
|
|
ck_assert_msg(gfierr == TOX_ERR_FILE_GET_OK, "wrong error");
|
|
|
|
|
2014-02-20 06:16:47 +08:00
|
|
|
while (1) {
|
2015-03-12 06:26:25 +08:00
|
|
|
tox_iterate(tox1);
|
|
|
|
tox_iterate(tox2);
|
|
|
|
tox_iterate(tox3);
|
2014-02-20 06:16:47 +08:00
|
|
|
|
2015-03-11 05:31:50 +08:00
|
|
|
if (file_sending_done) {
|
2015-03-21 20:35:31 +08:00
|
|
|
if (sendf_ok && file_recv && totalf_size == file_size && size_recv == file_size && sending_pos == size_recv
|
|
|
|
&& file_accepted == 1) {
|
2015-03-11 05:31:50 +08:00
|
|
|
break;
|
|
|
|
} else {
|
2015-03-21 20:35:31 +08:00
|
|
|
ck_abort_msg("Something went wrong in file transfer %u %u %u %u %u %u %llu %llu %llu", sendf_ok, file_recv,
|
|
|
|
totalf_size == file_size, size_recv == file_size, sending_pos == size_recv, file_accepted == 1, totalf_size, size_recv,
|
|
|
|
sending_pos);
|
2014-02-20 06:16:47 +08:00
|
|
|
}
|
2015-03-11 05:31:50 +08:00
|
|
|
}
|
2014-02-20 06:16:47 +08:00
|
|
|
|
2015-02-26 21:24:19 +08:00
|
|
|
uint32_t tox1_interval = tox_iteration_interval(tox1);
|
|
|
|
uint32_t tox2_interval = tox_iteration_interval(tox2);
|
|
|
|
uint32_t tox3_interval = tox_iteration_interval(tox3);
|
2014-06-02 08:48:02 +08:00
|
|
|
|
2014-05-31 11:01:17 +08:00
|
|
|
if (tox2_interval > tox3_interval) {
|
|
|
|
c_sleep(tox3_interval);
|
|
|
|
} else {
|
|
|
|
c_sleep(tox2_interval);
|
|
|
|
}
|
2014-02-20 06:16:47 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
printf("100MB file sent in %llu seconds\n", time(NULL) - f_time);
|
|
|
|
|
2015-03-21 08:12:07 +08:00
|
|
|
printf("Starting file streaming transfer test.\n");
|
|
|
|
|
|
|
|
file_sending_done = file_accepted = file_size = file_recv = sendf_ok = size_recv = 0;
|
|
|
|
f_time = time(NULL);
|
|
|
|
tox_callback_file_recv_chunk(tox3, write_file, &to_compare);
|
|
|
|
tox_callback_file_recv_control(tox2, file_print_control, &to_compare);
|
|
|
|
tox_callback_file_chunk_request(tox2, tox_file_chunk_request, &to_compare);
|
|
|
|
tox_callback_file_recv_control(tox3, file_print_control, &to_compare);
|
|
|
|
tox_callback_file_recv(tox3, tox_file_receive, &to_compare);
|
|
|
|
totalf_size = UINT64_MAX;
|
|
|
|
fnum = tox_file_send(tox2, 0, TOX_FILE_KIND_DATA, totalf_size, 0, (uint8_t *)"Gentoo.exe", sizeof("Gentoo.exe"), 0);
|
|
|
|
ck_assert_msg(fnum != UINT32_MAX, "tox_new_file_sender fail");
|
|
|
|
|
|
|
|
ck_assert_msg(!tox_file_get_file_id(tox2, 1, fnum, file_cmp_id, &gfierr), "tox_file_get_file_id didn't fail");
|
|
|
|
ck_assert_msg(gfierr == TOX_ERR_FILE_GET_FRIEND_NOT_FOUND, "wrong error");
|
|
|
|
ck_assert_msg(!tox_file_get_file_id(tox2, 0, fnum + 1, file_cmp_id, &gfierr), "tox_file_get_file_id didn't fail");
|
|
|
|
ck_assert_msg(gfierr == TOX_ERR_FILE_GET_NOT_FOUND, "wrong error");
|
|
|
|
ck_assert_msg(tox_file_get_file_id(tox2, 0, fnum, file_cmp_id, &gfierr), "tox_file_get_file_id failed");
|
|
|
|
ck_assert_msg(gfierr == TOX_ERR_FILE_GET_OK, "wrong error");
|
|
|
|
|
|
|
|
max_sending = 100 * 1024;
|
|
|
|
m_send_reached = 0;
|
|
|
|
|
|
|
|
while (1) {
|
|
|
|
tox_iterate(tox1);
|
|
|
|
tox_iterate(tox2);
|
|
|
|
tox_iterate(tox3);
|
|
|
|
|
|
|
|
if (file_sending_done) {
|
|
|
|
if (sendf_ok && file_recv && m_send_reached && totalf_size == file_size && size_recv == max_sending
|
2015-03-21 20:35:31 +08:00
|
|
|
&& sending_pos == size_recv && file_accepted == 1) {
|
2015-03-21 08:12:07 +08:00
|
|
|
break;
|
|
|
|
} else {
|
2015-03-21 20:35:31 +08:00
|
|
|
ck_abort_msg("Something went wrong in file transfer %u %u %u %u %u %u %u %llu %llu %llu %llu", sendf_ok, file_recv,
|
|
|
|
m_send_reached, totalf_size == file_size, size_recv == max_sending, sending_pos == size_recv, file_accepted == 1,
|
|
|
|
totalf_size, file_size,
|
2015-03-21 08:12:07 +08:00
|
|
|
size_recv, sending_pos);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
uint32_t tox1_interval = tox_iteration_interval(tox1);
|
|
|
|
uint32_t tox2_interval = tox_iteration_interval(tox2);
|
|
|
|
uint32_t tox3_interval = tox_iteration_interval(tox3);
|
|
|
|
|
|
|
|
if (tox2_interval > tox3_interval) {
|
|
|
|
c_sleep(tox3_interval);
|
|
|
|
} else {
|
|
|
|
c_sleep(tox2_interval);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-03-21 20:35:31 +08:00
|
|
|
printf("Starting file 0 transfer test.\n");
|
|
|
|
|
|
|
|
file_sending_done = file_accepted = file_size = file_recv = sendf_ok = size_recv = 0;
|
|
|
|
f_time = time(NULL);
|
|
|
|
tox_callback_file_recv_chunk(tox3, write_file, &to_compare);
|
|
|
|
tox_callback_file_recv_control(tox2, file_print_control, &to_compare);
|
|
|
|
tox_callback_file_chunk_request(tox2, tox_file_chunk_request, &to_compare);
|
|
|
|
tox_callback_file_recv_control(tox3, file_print_control, &to_compare);
|
|
|
|
tox_callback_file_recv(tox3, tox_file_receive, &to_compare);
|
|
|
|
totalf_size = 0;
|
|
|
|
fnum = tox_file_send(tox2, 0, TOX_FILE_KIND_DATA, totalf_size, 0, (uint8_t *)"Gentoo.exe", sizeof("Gentoo.exe"), 0);
|
|
|
|
ck_assert_msg(fnum != UINT32_MAX, "tox_new_file_sender fail");
|
|
|
|
|
|
|
|
ck_assert_msg(!tox_file_get_file_id(tox2, 1, fnum, file_cmp_id, &gfierr), "tox_file_get_file_id didn't fail");
|
|
|
|
ck_assert_msg(gfierr == TOX_ERR_FILE_GET_FRIEND_NOT_FOUND, "wrong error");
|
|
|
|
ck_assert_msg(!tox_file_get_file_id(tox2, 0, fnum + 1, file_cmp_id, &gfierr), "tox_file_get_file_id didn't fail");
|
|
|
|
ck_assert_msg(gfierr == TOX_ERR_FILE_GET_NOT_FOUND, "wrong error");
|
|
|
|
ck_assert_msg(tox_file_get_file_id(tox2, 0, fnum, file_cmp_id, &gfierr), "tox_file_get_file_id failed");
|
|
|
|
ck_assert_msg(gfierr == TOX_ERR_FILE_GET_OK, "wrong error");
|
|
|
|
|
|
|
|
|
|
|
|
while (1) {
|
|
|
|
tox_iterate(tox1);
|
|
|
|
tox_iterate(tox2);
|
|
|
|
tox_iterate(tox3);
|
|
|
|
|
|
|
|
if (file_sending_done) {
|
|
|
|
if (sendf_ok && file_recv && totalf_size == file_size && size_recv == file_size && sending_pos == size_recv
|
|
|
|
&& file_accepted == 1) {
|
|
|
|
break;
|
|
|
|
} else {
|
|
|
|
ck_abort_msg("Something went wrong in file transfer %u %u %u %u %u %u %llu %llu %llu", sendf_ok, file_recv,
|
|
|
|
totalf_size == file_size, size_recv == file_size, sending_pos == size_recv, file_accepted == 1, totalf_size, size_recv,
|
|
|
|
sending_pos);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
uint32_t tox1_interval = tox_iteration_interval(tox1);
|
|
|
|
uint32_t tox2_interval = tox_iteration_interval(tox2);
|
|
|
|
uint32_t tox3_interval = tox_iteration_interval(tox3);
|
|
|
|
|
|
|
|
if (tox2_interval > tox3_interval) {
|
|
|
|
c_sleep(tox3_interval);
|
|
|
|
} else {
|
|
|
|
c_sleep(tox2_interval);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-12-18 07:55:28 +08:00
|
|
|
printf("test_few_clients succeeded, took %llu seconds\n", time(NULL) - cur_time);
|
2014-06-06 21:50:19 +08:00
|
|
|
|
|
|
|
tox_kill(tox1);
|
|
|
|
tox_kill(tox2);
|
|
|
|
tox_kill(tox3);
|
2013-12-18 07:55:28 +08:00
|
|
|
}
|
|
|
|
END_TEST
|
|
|
|
|
2014-02-27 01:46:11 +08:00
|
|
|
#define NUM_TOXES 66
|
2014-09-05 08:54:55 +08:00
|
|
|
#define NUM_FRIENDS 50
|
2013-12-19 09:34:11 +08:00
|
|
|
|
|
|
|
START_TEST(test_many_clients)
|
|
|
|
{
|
|
|
|
long long unsigned int cur_time = time(NULL);
|
|
|
|
Tox *toxes[NUM_TOXES];
|
|
|
|
uint32_t i, j;
|
2014-07-28 07:54:43 +08:00
|
|
|
uint32_t to_comp = 974536;
|
2013-12-19 09:34:11 +08:00
|
|
|
|
|
|
|
for (i = 0; i < NUM_TOXES; ++i) {
|
2015-05-23 06:23:56 +08:00
|
|
|
toxes[i] = tox_new(0, 0);
|
2013-12-19 09:34:11 +08:00
|
|
|
ck_assert_msg(toxes[i] != 0, "Failed to create tox instances %u", i);
|
2014-03-17 01:24:39 +08:00
|
|
|
tox_callback_friend_request(toxes[i], accept_friend_request, &to_comp);
|
2013-12-19 09:34:11 +08:00
|
|
|
}
|
|
|
|
|
2015-03-11 20:09:45 +08:00
|
|
|
{
|
|
|
|
TOX_ERR_GET_PORT error;
|
2015-03-12 06:26:25 +08:00
|
|
|
ck_assert_msg(tox_self_get_udp_port(toxes[0], &error) == 33445, "First Tox instance did not bind to udp port 33445.\n");
|
2015-03-11 20:09:45 +08:00
|
|
|
ck_assert_msg(error == TOX_ERR_GET_PORT_OK, "wrong error");
|
|
|
|
}
|
|
|
|
|
2013-12-19 09:34:11 +08:00
|
|
|
struct {
|
|
|
|
uint16_t tox1;
|
|
|
|
uint16_t tox2;
|
|
|
|
} pairs[NUM_FRIENDS];
|
|
|
|
|
2015-02-26 21:24:19 +08:00
|
|
|
uint8_t address[TOX_ADDRESS_SIZE];
|
2013-12-19 09:34:11 +08:00
|
|
|
|
|
|
|
for (i = 0; i < NUM_FRIENDS; ++i) {
|
|
|
|
loop_top:
|
|
|
|
pairs[i].tox1 = rand() % NUM_TOXES;
|
|
|
|
pairs[i].tox2 = (pairs[i].tox1 + rand() % (NUM_TOXES - 1) + 1) % NUM_TOXES;
|
2014-05-14 00:09:40 +08:00
|
|
|
|
|
|
|
for (j = 0; j < i; ++j) {
|
|
|
|
if (pairs[j].tox2 == pairs[i].tox1 && pairs[j].tox1 == pairs[i].tox2)
|
|
|
|
goto loop_top;
|
|
|
|
}
|
|
|
|
|
2015-02-26 21:24:19 +08:00
|
|
|
tox_self_get_address(toxes[pairs[i].tox1], address);
|
|
|
|
|
|
|
|
TOX_ERR_FRIEND_ADD test;
|
|
|
|
uint32_t num = tox_friend_add(toxes[pairs[i].tox2], address, (uint8_t *)"Gentoo", 7, &test);
|
2013-12-19 09:34:11 +08:00
|
|
|
|
2015-02-26 21:24:19 +08:00
|
|
|
if (test == TOX_ERR_FRIEND_ADD_ALREADY_SENT) {
|
2013-12-19 09:34:11 +08:00
|
|
|
goto loop_top;
|
|
|
|
}
|
|
|
|
|
2015-02-26 21:24:19 +08:00
|
|
|
ck_assert_msg(num != UINT32_MAX && test == TOX_ERR_FRIEND_ADD_OK, "Failed to add friend error code: %i", test);
|
2013-12-19 09:34:11 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
while (1) {
|
|
|
|
uint16_t counter = 0;
|
|
|
|
|
|
|
|
for (i = 0; i < NUM_TOXES; ++i) {
|
2015-03-16 10:25:06 +08:00
|
|
|
for (j = 0; j < tox_self_get_friend_list_size(toxes[i]); ++j)
|
2015-02-26 21:24:19 +08:00
|
|
|
if (tox_friend_get_connection_status(toxes[i], j, 0) == TOX_CONNECTION_UDP)
|
2013-12-19 09:34:11 +08:00
|
|
|
++counter;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (counter == NUM_FRIENDS * 2) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < NUM_TOXES; ++i) {
|
2015-03-12 06:26:25 +08:00
|
|
|
tox_iterate(toxes[i]);
|
2013-12-19 09:34:11 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
c_sleep(50);
|
|
|
|
}
|
|
|
|
|
2014-06-06 21:50:19 +08:00
|
|
|
for (i = 0; i < NUM_TOXES; ++i) {
|
|
|
|
tox_kill(toxes[i]);
|
|
|
|
}
|
2014-12-05 09:54:59 +08:00
|
|
|
|
|
|
|
printf("test_many_clients succeeded, took %llu seconds\n", time(NULL) - cur_time);
|
|
|
|
}
|
|
|
|
END_TEST
|
|
|
|
|
2015-05-12 00:41:53 +08:00
|
|
|
#define TCP_RELAY_PORT 33448
|
2015-05-09 10:03:24 +08:00
|
|
|
|
|
|
|
START_TEST(test_many_clients_tcp)
|
|
|
|
{
|
|
|
|
long long unsigned int cur_time = time(NULL);
|
|
|
|
Tox *toxes[NUM_TOXES];
|
|
|
|
uint32_t i, j;
|
|
|
|
uint32_t to_comp = 974536;
|
|
|
|
|
|
|
|
for (i = 0; i < NUM_TOXES; ++i) {
|
|
|
|
struct Tox_Options opts;
|
|
|
|
tox_options_default(&opts);
|
|
|
|
|
|
|
|
if (i == 0) {
|
|
|
|
opts.tcp_port = TCP_RELAY_PORT;
|
|
|
|
} else {
|
|
|
|
opts.udp_enabled = 0;
|
|
|
|
}
|
|
|
|
|
2015-05-23 06:23:56 +08:00
|
|
|
toxes[i] = tox_new(&opts, 0);
|
2015-05-09 10:03:24 +08:00
|
|
|
ck_assert_msg(toxes[i] != 0, "Failed to create tox instances %u", i);
|
|
|
|
tox_callback_friend_request(toxes[i], accept_friend_request, &to_comp);
|
|
|
|
uint8_t dpk[TOX_PUBLIC_KEY_SIZE];
|
|
|
|
tox_self_get_dht_id(toxes[0], dpk);
|
2015-05-12 00:41:53 +08:00
|
|
|
ck_assert_msg(tox_add_tcp_relay(toxes[i], "::1", TCP_RELAY_PORT, dpk, 0), "add relay error");
|
|
|
|
ck_assert_msg(tox_bootstrap(toxes[i], "::1", 33445, dpk, 0), "Bootstrap error");
|
2015-05-09 10:03:24 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
{
|
|
|
|
TOX_ERR_GET_PORT error;
|
|
|
|
ck_assert_msg(tox_self_get_udp_port(toxes[0], &error) == 33445, "First Tox instance did not bind to udp port 33445.\n");
|
|
|
|
ck_assert_msg(error == TOX_ERR_GET_PORT_OK, "wrong error");
|
|
|
|
ck_assert_msg(tox_self_get_tcp_port(toxes[0], &error) == TCP_RELAY_PORT,
|
|
|
|
"First Tox instance did not bind to tcp port %u.\n", TCP_RELAY_PORT);
|
|
|
|
ck_assert_msg(error == TOX_ERR_GET_PORT_OK, "wrong error");
|
|
|
|
}
|
|
|
|
|
|
|
|
struct {
|
|
|
|
uint16_t tox1;
|
|
|
|
uint16_t tox2;
|
|
|
|
} pairs[NUM_FRIENDS];
|
|
|
|
|
|
|
|
uint8_t address[TOX_ADDRESS_SIZE];
|
|
|
|
|
|
|
|
for (i = 0; i < NUM_FRIENDS; ++i) {
|
|
|
|
loop_top:
|
|
|
|
pairs[i].tox1 = rand() % NUM_TOXES;
|
|
|
|
pairs[i].tox2 = (pairs[i].tox1 + rand() % (NUM_TOXES - 1) + 1) % NUM_TOXES;
|
|
|
|
|
|
|
|
for (j = 0; j < i; ++j) {
|
|
|
|
if (pairs[j].tox2 == pairs[i].tox1 && pairs[j].tox1 == pairs[i].tox2)
|
|
|
|
goto loop_top;
|
|
|
|
}
|
|
|
|
|
|
|
|
tox_self_get_address(toxes[pairs[i].tox1], address);
|
|
|
|
|
|
|
|
TOX_ERR_FRIEND_ADD test;
|
|
|
|
uint32_t num = tox_friend_add(toxes[pairs[i].tox2], address, (uint8_t *)"Gentoo", 7, &test);
|
|
|
|
|
|
|
|
if (test == TOX_ERR_FRIEND_ADD_ALREADY_SENT) {
|
|
|
|
goto loop_top;
|
|
|
|
}
|
|
|
|
|
|
|
|
ck_assert_msg(num != UINT32_MAX && test == TOX_ERR_FRIEND_ADD_OK, "Failed to add friend error code: %i", test);
|
|
|
|
}
|
|
|
|
|
|
|
|
while (1) {
|
|
|
|
uint16_t counter = 0;
|
|
|
|
|
|
|
|
for (i = 0; i < NUM_TOXES; ++i) {
|
|
|
|
for (j = 0; j < tox_self_get_friend_list_size(toxes[i]); ++j)
|
|
|
|
if (tox_friend_get_connection_status(toxes[i], j, 0) == TOX_CONNECTION_TCP)
|
|
|
|
++counter;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (counter == NUM_FRIENDS * 2) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < NUM_TOXES; ++i) {
|
|
|
|
tox_iterate(toxes[i]);
|
|
|
|
}
|
|
|
|
|
|
|
|
c_sleep(50);
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < NUM_TOXES; ++i) {
|
|
|
|
tox_kill(toxes[i]);
|
|
|
|
}
|
|
|
|
|
|
|
|
printf("test_many_clients_tcp succeeded, took %llu seconds\n", time(NULL) - cur_time);
|
|
|
|
}
|
|
|
|
END_TEST
|
|
|
|
|
2015-05-15 09:07:29 +08:00
|
|
|
#define NUM_TCP_RELAYS 3
|
|
|
|
|
|
|
|
START_TEST(test_many_clients_tcp_b)
|
|
|
|
{
|
|
|
|
long long unsigned int cur_time = time(NULL);
|
|
|
|
Tox *toxes[NUM_TOXES];
|
|
|
|
uint32_t i, j;
|
|
|
|
uint32_t to_comp = 974536;
|
|
|
|
|
|
|
|
for (i = 0; i < NUM_TOXES; ++i) {
|
|
|
|
struct Tox_Options opts;
|
|
|
|
tox_options_default(&opts);
|
|
|
|
|
|
|
|
if (i < NUM_TCP_RELAYS) {
|
|
|
|
opts.tcp_port = TCP_RELAY_PORT + i;
|
|
|
|
} else {
|
|
|
|
opts.udp_enabled = 0;
|
|
|
|
}
|
|
|
|
|
2015-05-23 06:23:56 +08:00
|
|
|
toxes[i] = tox_new(&opts, 0);
|
2015-05-15 09:07:29 +08:00
|
|
|
ck_assert_msg(toxes[i] != 0, "Failed to create tox instances %u", i);
|
|
|
|
tox_callback_friend_request(toxes[i], accept_friend_request, &to_comp);
|
|
|
|
uint8_t dpk[TOX_PUBLIC_KEY_SIZE];
|
|
|
|
tox_self_get_dht_id(toxes[(i % NUM_TCP_RELAYS)], dpk);
|
|
|
|
ck_assert_msg(tox_add_tcp_relay(toxes[i], "::1", TCP_RELAY_PORT + (i % NUM_TCP_RELAYS), dpk, 0), "add relay error");
|
|
|
|
tox_self_get_dht_id(toxes[0], dpk);
|
|
|
|
ck_assert_msg(tox_bootstrap(toxes[i], "::1", 33445, dpk, 0), "Bootstrap error");
|
|
|
|
}
|
|
|
|
|
|
|
|
{
|
|
|
|
TOX_ERR_GET_PORT error;
|
|
|
|
ck_assert_msg(tox_self_get_udp_port(toxes[0], &error) == 33445, "First Tox instance did not bind to udp port 33445.\n");
|
|
|
|
ck_assert_msg(error == TOX_ERR_GET_PORT_OK, "wrong error");
|
|
|
|
ck_assert_msg(tox_self_get_tcp_port(toxes[0], &error) == TCP_RELAY_PORT,
|
|
|
|
"First Tox instance did not bind to tcp port %u.\n", TCP_RELAY_PORT);
|
|
|
|
ck_assert_msg(error == TOX_ERR_GET_PORT_OK, "wrong error");
|
|
|
|
}
|
|
|
|
|
|
|
|
struct {
|
|
|
|
uint16_t tox1;
|
|
|
|
uint16_t tox2;
|
|
|
|
} pairs[NUM_FRIENDS];
|
|
|
|
|
|
|
|
uint8_t address[TOX_ADDRESS_SIZE];
|
|
|
|
|
|
|
|
for (i = 0; i < NUM_FRIENDS; ++i) {
|
|
|
|
loop_top:
|
|
|
|
pairs[i].tox1 = rand() % NUM_TOXES;
|
|
|
|
pairs[i].tox2 = (pairs[i].tox1 + rand() % (NUM_TOXES - 1) + 1) % NUM_TOXES;
|
|
|
|
|
|
|
|
for (j = 0; j < i; ++j) {
|
|
|
|
if (pairs[j].tox2 == pairs[i].tox1 && pairs[j].tox1 == pairs[i].tox2)
|
|
|
|
goto loop_top;
|
|
|
|
}
|
|
|
|
|
|
|
|
tox_self_get_address(toxes[pairs[i].tox1], address);
|
|
|
|
|
|
|
|
TOX_ERR_FRIEND_ADD test;
|
|
|
|
uint32_t num = tox_friend_add(toxes[pairs[i].tox2], address, (uint8_t *)"Gentoo", 7, &test);
|
|
|
|
|
|
|
|
if (test == TOX_ERR_FRIEND_ADD_ALREADY_SENT) {
|
|
|
|
goto loop_top;
|
|
|
|
}
|
|
|
|
|
|
|
|
ck_assert_msg(num != UINT32_MAX && test == TOX_ERR_FRIEND_ADD_OK, "Failed to add friend error code: %i", test);
|
|
|
|
}
|
|
|
|
|
|
|
|
while (1) {
|
|
|
|
uint16_t counter = 0;
|
|
|
|
|
|
|
|
for (i = 0; i < NUM_TOXES; ++i) {
|
|
|
|
for (j = 0; j < tox_self_get_friend_list_size(toxes[i]); ++j)
|
|
|
|
if (tox_friend_get_connection_status(toxes[i], j, 0) == TOX_CONNECTION_TCP)
|
|
|
|
++counter;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (counter == NUM_FRIENDS * 2) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < NUM_TOXES; ++i) {
|
|
|
|
tox_iterate(toxes[i]);
|
|
|
|
}
|
|
|
|
|
|
|
|
c_sleep(50);
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < NUM_TOXES; ++i) {
|
|
|
|
tox_kill(toxes[i]);
|
|
|
|
}
|
|
|
|
|
|
|
|
printf("test_many_clients_tcp_b succeeded, took %llu seconds\n", time(NULL) - cur_time);
|
|
|
|
}
|
|
|
|
END_TEST
|
|
|
|
|
|
|
|
|
2014-12-06 11:37:02 +08:00
|
|
|
#define NUM_GROUP_TOX 32
|
2014-12-05 09:54:59 +08:00
|
|
|
|
2015-02-28 09:33:43 +08:00
|
|
|
void g_accept_friend_request(Tox *m, const uint8_t *public_key, const uint8_t *data, size_t length, void *userdata)
|
2014-12-05 09:54:59 +08:00
|
|
|
{
|
|
|
|
if (*((uint32_t *)userdata) != 234212)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (length == 7 && memcmp("Gentoo", data, 7) == 0) {
|
2015-02-28 09:33:43 +08:00
|
|
|
tox_friend_add_norequest(m, public_key, 0);
|
2014-12-05 09:54:59 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-12-06 11:37:02 +08:00
|
|
|
static Tox *invite_tox;
|
|
|
|
static unsigned int invite_counter;
|
|
|
|
|
2014-12-05 09:54:59 +08:00
|
|
|
void print_group_invite_callback(Tox *tox, int32_t friendnumber, uint8_t type, const uint8_t *data, uint16_t length,
|
|
|
|
void *userdata)
|
|
|
|
{
|
|
|
|
if (*((uint32_t *)userdata) != 234212)
|
|
|
|
return;
|
|
|
|
|
2014-12-12 09:10:57 +08:00
|
|
|
if (type != TOX_GROUPCHAT_TYPE_TEXT)
|
|
|
|
return;
|
|
|
|
|
2014-12-05 09:54:59 +08:00
|
|
|
int g_num;
|
|
|
|
|
|
|
|
if ((g_num = tox_join_groupchat(tox, friendnumber, data, length)) == -1)
|
|
|
|
return;
|
|
|
|
|
|
|
|
ck_assert_msg(g_num == 0, "Group number was not 0");
|
|
|
|
ck_assert_msg(tox_join_groupchat(tox, friendnumber, data, length) == -1,
|
|
|
|
"Joining groupchat twice should be impossible.");
|
|
|
|
|
2014-12-06 11:37:02 +08:00
|
|
|
invite_tox = tox;
|
|
|
|
invite_counter = 4;
|
2014-12-05 09:54:59 +08:00
|
|
|
}
|
|
|
|
|
2014-12-06 10:39:46 +08:00
|
|
|
static unsigned int num_recv;
|
|
|
|
|
|
|
|
void print_group_message(Tox *tox, int groupnumber, int peernumber, const uint8_t *message, uint16_t length,
|
|
|
|
void *userdata)
|
|
|
|
{
|
|
|
|
if (*((uint32_t *)userdata) != 234212)
|
|
|
|
return;
|
|
|
|
|
2014-12-10 07:13:39 +08:00
|
|
|
if (length == (sizeof("Install Gentoo") - 1) && memcmp(message, "Install Gentoo", sizeof("Install Gentoo") - 1) == 0) {
|
|
|
|
++num_recv;
|
|
|
|
}
|
2014-12-06 10:39:46 +08:00
|
|
|
}
|
|
|
|
|
2014-12-05 09:54:59 +08:00
|
|
|
START_TEST(test_many_group)
|
|
|
|
{
|
|
|
|
long long unsigned int cur_time = time(NULL);
|
|
|
|
Tox *toxes[NUM_GROUP_TOX];
|
2014-12-14 10:56:36 +08:00
|
|
|
unsigned int i, j, k;
|
2014-12-05 09:54:59 +08:00
|
|
|
|
|
|
|
uint32_t to_comp = 234212;
|
|
|
|
|
|
|
|
for (i = 0; i < NUM_GROUP_TOX; ++i) {
|
2015-05-23 06:23:56 +08:00
|
|
|
toxes[i] = tox_new(0, 0);
|
2014-12-05 09:54:59 +08:00
|
|
|
ck_assert_msg(toxes[i] != 0, "Failed to create tox instances %u", i);
|
|
|
|
tox_callback_friend_request(toxes[i], &g_accept_friend_request, &to_comp);
|
|
|
|
tox_callback_group_invite(toxes[i], &print_group_invite_callback, &to_comp);
|
|
|
|
}
|
|
|
|
|
2015-03-11 20:09:45 +08:00
|
|
|
{
|
|
|
|
TOX_ERR_GET_PORT error;
|
2015-03-12 06:26:25 +08:00
|
|
|
ck_assert_msg(tox_self_get_udp_port(toxes[0], &error) == 33445, "First Tox instance did not bind to udp port 33445.\n");
|
2015-03-11 20:09:45 +08:00
|
|
|
ck_assert_msg(error == TOX_ERR_GET_PORT_OK, "wrong error");
|
|
|
|
}
|
|
|
|
|
2015-02-28 09:33:43 +08:00
|
|
|
uint8_t address[TOX_ADDRESS_SIZE];
|
|
|
|
tox_self_get_address(toxes[NUM_GROUP_TOX - 1], address);
|
2014-12-05 09:54:59 +08:00
|
|
|
|
|
|
|
for (i = 0; i < NUM_GROUP_TOX; ++i) {
|
2015-02-28 09:33:43 +08:00
|
|
|
ck_assert_msg(tox_friend_add(toxes[i], address, (uint8_t *)"Gentoo", 7, 0) == 0, "Failed to add friend");
|
2014-12-05 09:54:59 +08:00
|
|
|
|
2015-02-28 09:33:43 +08:00
|
|
|
tox_self_get_address(toxes[i], address);
|
2014-12-05 09:54:59 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
while (1) {
|
|
|
|
for (i = 0; i < NUM_GROUP_TOX; ++i) {
|
2015-02-28 09:33:43 +08:00
|
|
|
if (tox_friend_get_connection_status(toxes[i], 0, 0) != TOX_CONNECTION_UDP) {
|
2014-12-05 09:54:59 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (i == NUM_GROUP_TOX)
|
|
|
|
break;
|
|
|
|
|
|
|
|
for (i = 0; i < NUM_GROUP_TOX; ++i) {
|
2015-03-12 06:26:25 +08:00
|
|
|
tox_iterate(toxes[i]);
|
2014-12-05 09:54:59 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
c_sleep(50);
|
|
|
|
}
|
|
|
|
|
|
|
|
printf("friends connected, took %llu seconds\n", time(NULL) - cur_time);
|
|
|
|
|
|
|
|
ck_assert_msg(tox_add_groupchat(toxes[0]) != -1, "Failed to create group");
|
|
|
|
ck_assert_msg(tox_invite_friend(toxes[0], 0, 0) == 0, "Failed to invite friend");
|
2014-12-21 12:12:43 +08:00
|
|
|
ck_assert_msg(tox_group_set_title(toxes[0], 0, "Gentoo", sizeof("Gentoo") - 1) == 0, "Failed to set group title");
|
2014-12-06 11:37:02 +08:00
|
|
|
invite_counter = ~0;
|
|
|
|
|
|
|
|
unsigned int done = ~0;
|
|
|
|
done -= 5;
|
2014-12-05 09:54:59 +08:00
|
|
|
|
|
|
|
while (1) {
|
|
|
|
for (i = 0; i < NUM_GROUP_TOX; ++i) {
|
2015-03-12 06:26:25 +08:00
|
|
|
tox_iterate(toxes[i]);
|
2014-12-05 09:54:59 +08:00
|
|
|
}
|
|
|
|
|
2014-12-06 11:37:02 +08:00
|
|
|
if (!invite_counter) {
|
|
|
|
ck_assert_msg(tox_invite_friend(invite_tox, 0, 0) == 0, "Failed to invite friend");
|
|
|
|
}
|
2014-12-05 09:54:59 +08:00
|
|
|
|
2014-12-06 11:37:02 +08:00
|
|
|
if (done == invite_counter) {
|
|
|
|
break;
|
2014-12-05 09:54:59 +08:00
|
|
|
}
|
|
|
|
|
2014-12-06 11:37:02 +08:00
|
|
|
--invite_counter;
|
2014-12-05 09:54:59 +08:00
|
|
|
c_sleep(50);
|
|
|
|
}
|
|
|
|
|
2014-12-06 11:37:02 +08:00
|
|
|
for (i = 0; i < NUM_GROUP_TOX; ++i) {
|
2014-12-14 10:56:36 +08:00
|
|
|
int num_peers = tox_group_number_peers(toxes[i], 0);
|
2014-12-15 09:33:31 +08:00
|
|
|
ck_assert_msg(num_peers == NUM_GROUP_TOX, "Bad number of group peers. expected: %u got: %i, tox %u", NUM_GROUP_TOX,
|
|
|
|
num_peers, i);
|
2014-12-21 12:12:43 +08:00
|
|
|
|
|
|
|
uint8_t title[2048];
|
|
|
|
int ret = tox_group_get_title(toxes[i], 0, title, sizeof(title));
|
|
|
|
ck_assert_msg(ret == sizeof("Gentoo") - 1, "Wrong title length");
|
|
|
|
ck_assert_msg(memcmp("Gentoo", title, ret) == 0, "Wrong title");
|
2014-12-06 11:37:02 +08:00
|
|
|
}
|
|
|
|
|
2014-12-06 10:39:46 +08:00
|
|
|
printf("group connected\n");
|
|
|
|
|
|
|
|
for (i = 0; i < NUM_GROUP_TOX; ++i) {
|
|
|
|
tox_callback_group_message(toxes[i], &print_group_message, &to_comp);
|
|
|
|
}
|
|
|
|
|
2014-12-10 07:13:39 +08:00
|
|
|
ck_assert_msg(tox_group_message_send(toxes[rand() % NUM_GROUP_TOX], 0, (uint8_t *)"Install Gentoo",
|
2014-12-06 10:39:46 +08:00
|
|
|
sizeof("Install Gentoo") - 1) == 0, "Failed to send group message.");
|
|
|
|
num_recv = 0;
|
|
|
|
|
|
|
|
for (j = 0; j < 20; ++j) {
|
|
|
|
for (i = 0; i < NUM_GROUP_TOX; ++i) {
|
2015-03-12 06:26:25 +08:00
|
|
|
tox_iterate(toxes[i]);
|
2014-12-06 10:39:46 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
c_sleep(50);
|
|
|
|
}
|
|
|
|
|
|
|
|
ck_assert_msg(num_recv == NUM_GROUP_TOX, "Failed to recv group messages.");
|
2014-12-15 09:33:31 +08:00
|
|
|
|
2014-12-14 10:56:36 +08:00
|
|
|
for (k = NUM_GROUP_TOX; k != 0 ; --k) {
|
|
|
|
tox_del_groupchat(toxes[k - 1], 0);
|
2014-12-12 09:10:57 +08:00
|
|
|
|
2014-12-14 10:56:36 +08:00
|
|
|
for (j = 0; j < 10; ++j) {
|
|
|
|
for (i = 0; i < NUM_GROUP_TOX; ++i) {
|
2015-03-12 06:26:25 +08:00
|
|
|
tox_iterate(toxes[i]);
|
2014-12-14 10:56:36 +08:00
|
|
|
}
|
2014-12-12 09:10:57 +08:00
|
|
|
|
2014-12-14 10:56:36 +08:00
|
|
|
c_sleep(50);
|
|
|
|
}
|
2014-12-12 09:10:57 +08:00
|
|
|
|
2014-12-14 10:56:36 +08:00
|
|
|
for (i = 0; i < (k - 1); ++i) {
|
|
|
|
int num_peers = tox_group_number_peers(toxes[i], 0);
|
|
|
|
ck_assert_msg(num_peers == (k - 1), "Bad number of group peers. expected: %u got: %i, tox %u", (k - 1), num_peers, i);
|
|
|
|
}
|
2014-12-12 09:10:57 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < NUM_GROUP_TOX; ++i) {
|
|
|
|
tox_kill(toxes[i]);
|
|
|
|
}
|
|
|
|
|
2014-12-05 09:54:59 +08:00
|
|
|
printf("test_many_group succeeded, took %llu seconds\n", time(NULL) - cur_time);
|
2013-12-19 09:34:11 +08:00
|
|
|
}
|
|
|
|
END_TEST
|
2013-12-18 07:55:28 +08:00
|
|
|
|
|
|
|
Suite *tox_suite(void)
|
|
|
|
{
|
|
|
|
Suite *s = suite_create("Tox");
|
|
|
|
|
2014-12-11 01:12:37 +08:00
|
|
|
DEFTESTCASE(one);
|
2014-02-20 06:16:47 +08:00
|
|
|
DEFTESTCASE_SLOW(few_clients, 50);
|
2015-06-02 08:16:03 +08:00
|
|
|
DEFTESTCASE_SLOW(many_clients, 80);
|
2015-05-20 07:55:43 +08:00
|
|
|
DEFTESTCASE_SLOW(many_clients_tcp, 20);
|
2015-05-15 09:07:29 +08:00
|
|
|
DEFTESTCASE_SLOW(many_clients_tcp_b, 20);
|
2014-12-05 09:54:59 +08:00
|
|
|
DEFTESTCASE_SLOW(many_group, 100);
|
2013-12-18 07:55:28 +08:00
|
|
|
return s;
|
|
|
|
}
|
|
|
|
|
|
|
|
int main(int argc, char *argv[])
|
|
|
|
{
|
|
|
|
srand((unsigned int) time(NULL));
|
|
|
|
|
|
|
|
Suite *tox = tox_suite();
|
|
|
|
SRunner *test_runner = srunner_create(tox);
|
|
|
|
|
|
|
|
int number_failed = 0;
|
|
|
|
srunner_run_all(test_runner, CK_NORMAL);
|
|
|
|
number_failed = srunner_ntests_failed(test_runner);
|
|
|
|
|
|
|
|
srunner_free(test_runner);
|
|
|
|
|
|
|
|
return number_failed;
|
|
|
|
}
|
|
|
|
|