2013-12-18 07:55:28 +08:00
|
|
|
#ifdef HAVE_CONFIG_H
|
|
|
|
#include "config.h"
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <stdint.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <check.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <time.h>
|
|
|
|
|
|
|
|
#include "../toxcore/tox.h"
|
|
|
|
|
2014-08-08 04:59:47 +08:00
|
|
|
#include "helpers.h"
|
|
|
|
|
2014-01-20 07:18:25 +08:00
|
|
|
#if defined(_WIN32) || defined(__WIN32__) || defined (WIN32)
|
2013-12-18 07:55:28 +08:00
|
|
|
#define c_sleep(x) Sleep(1*x)
|
|
|
|
#else
|
|
|
|
#include <unistd.h>
|
|
|
|
#define c_sleep(x) usleep(1000*x)
|
|
|
|
#endif
|
|
|
|
|
2014-06-11 06:35:55 +08:00
|
|
|
void accept_friend_request(Tox *m, const uint8_t *public_key, const uint8_t *data, uint16_t length, void *userdata)
|
2013-12-18 07:55:28 +08:00
|
|
|
{
|
2014-03-17 01:24:39 +08:00
|
|
|
if (*((uint32_t *)userdata) != 974536)
|
|
|
|
return;
|
2013-12-18 07:55:28 +08:00
|
|
|
|
2014-01-18 02:35:40 +08:00
|
|
|
if (length == 7 && memcmp("Gentoo", data, 7) == 0) {
|
2014-03-17 01:24:39 +08:00
|
|
|
tox_add_friend_norequest(m, public_key);
|
2014-01-18 02:35:40 +08:00
|
|
|
}
|
2013-12-18 07:55:28 +08:00
|
|
|
}
|
2013-12-23 11:30:14 +08:00
|
|
|
uint32_t messages_received;
|
|
|
|
|
2014-07-03 04:04:41 +08:00
|
|
|
void print_message(Tox *m, int friendnumber, const uint8_t *string, uint16_t length, void *userdata)
|
2013-12-23 11:30:14 +08:00
|
|
|
{
|
|
|
|
if (*((uint32_t *)userdata) != 974536)
|
|
|
|
return;
|
|
|
|
|
2014-06-02 08:48:02 +08:00
|
|
|
uint8_t cmp_msg[TOX_MAX_MESSAGE_LENGTH];
|
|
|
|
memset(cmp_msg, 'G', sizeof(cmp_msg));
|
|
|
|
|
|
|
|
if (length == TOX_MAX_MESSAGE_LENGTH && memcmp(string, cmp_msg, sizeof(cmp_msg)) == 0)
|
2013-12-23 11:30:14 +08:00
|
|
|
++messages_received;
|
|
|
|
}
|
|
|
|
|
|
|
|
uint32_t name_changes;
|
|
|
|
|
2014-07-03 04:04:41 +08:00
|
|
|
void print_nickchange(Tox *m, int friendnumber, const uint8_t *string, uint16_t length, void *userdata)
|
2013-12-23 11:30:14 +08:00
|
|
|
{
|
|
|
|
if (*((uint32_t *)userdata) != 974536)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (length == sizeof("Gentoo") && memcmp(string, "Gentoo", sizeof("Gentoo")) == 0)
|
|
|
|
++name_changes;
|
|
|
|
}
|
2013-12-18 07:55:28 +08:00
|
|
|
|
2014-02-19 02:49:17 +08:00
|
|
|
uint32_t typing_changes;
|
|
|
|
|
2014-03-21 08:32:37 +08:00
|
|
|
void print_typingchange(Tox *m, int friendnumber, uint8_t typing, void *userdata)
|
2014-02-19 02:49:17 +08:00
|
|
|
{
|
|
|
|
if (*((uint32_t *)userdata) != 974536)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (!typing)
|
|
|
|
typing_changes = 1;
|
|
|
|
else
|
|
|
|
typing_changes = 2;
|
|
|
|
}
|
|
|
|
|
2014-09-09 00:20:44 +08:00
|
|
|
uint32_t custom_packet;
|
|
|
|
|
|
|
|
int handle_custom_packet(void *object, const uint8_t *data, uint32_t len)
|
|
|
|
{
|
|
|
|
uint8_t number = *((uint32_t *)object);
|
|
|
|
|
|
|
|
if (len != TOX_MAX_CUSTOM_PACKET_SIZE)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
uint8_t f_data[len];
|
|
|
|
memset(f_data, number, len);
|
2014-11-26 04:31:46 +08:00
|
|
|
|
2014-09-09 00:20:44 +08:00
|
|
|
if (memcmp(f_data, data, len) == 0) {
|
|
|
|
++custom_packet;
|
|
|
|
} else {
|
2014-11-26 04:31:46 +08:00
|
|
|
printf("Custom packet fail. %u\n", number );
|
2014-09-09 00:20:44 +08:00
|
|
|
}
|
2014-09-22 02:55:23 +08:00
|
|
|
|
|
|
|
return 0;
|
2014-09-09 00:20:44 +08:00
|
|
|
}
|
|
|
|
|
2014-02-20 06:16:47 +08:00
|
|
|
uint8_t filenum;
|
|
|
|
uint32_t file_accepted;
|
|
|
|
uint64_t file_size;
|
2014-07-03 04:04:41 +08:00
|
|
|
void file_request_accept(Tox *m, int friendnumber, uint8_t filenumber, uint64_t filesize, const uint8_t *filename,
|
2014-02-20 06:16:47 +08:00
|
|
|
uint16_t filename_length, void *userdata)
|
|
|
|
{
|
|
|
|
if (*((uint32_t *)userdata) != 974536)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (filename_length == sizeof("Gentoo.exe") && memcmp(filename, "Gentoo.exe", sizeof("Gentoo.exe")) == 0)
|
|
|
|
++file_accepted;
|
|
|
|
|
|
|
|
file_size = filesize;
|
|
|
|
tox_file_send_control(m, friendnumber, 1, filenumber, TOX_FILECONTROL_ACCEPT, NULL, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
uint32_t file_sent;
|
|
|
|
uint32_t sendf_ok;
|
2014-08-05 03:18:18 +08:00
|
|
|
void file_print_control(Tox *m, int friendnumber, uint8_t receive_send, uint8_t filenumber, uint8_t control_type,
|
2014-07-03 04:04:41 +08:00
|
|
|
const uint8_t *data, uint16_t length, void *userdata)
|
2014-02-20 06:16:47 +08:00
|
|
|
{
|
|
|
|
if (*((uint32_t *)userdata) != 974536)
|
|
|
|
return;
|
|
|
|
|
2014-08-05 03:18:18 +08:00
|
|
|
if (receive_send == 0 && control_type == TOX_FILECONTROL_FINISHED)
|
|
|
|
tox_file_send_control(m, friendnumber, 1, filenumber, TOX_FILECONTROL_FINISHED, NULL, 0);
|
|
|
|
|
|
|
|
if (receive_send == 1 && control_type == TOX_FILECONTROL_FINISHED)
|
2014-02-20 06:16:47 +08:00
|
|
|
file_sent = 1;
|
|
|
|
|
2014-08-05 03:18:18 +08:00
|
|
|
if (receive_send == 1 && control_type == TOX_FILECONTROL_ACCEPT)
|
2014-02-20 06:16:47 +08:00
|
|
|
sendf_ok = 1;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
uint64_t size_recv;
|
2014-05-10 09:46:37 +08:00
|
|
|
uint8_t num;
|
2014-07-03 04:04:41 +08:00
|
|
|
void write_file(Tox *m, int friendnumber, uint8_t filenumber, const uint8_t *data, uint16_t length, void *userdata)
|
2014-02-20 06:16:47 +08:00
|
|
|
{
|
|
|
|
if (*((uint32_t *)userdata) != 974536)
|
|
|
|
return;
|
|
|
|
|
2014-09-09 00:20:44 +08:00
|
|
|
uint8_t f_data[length];
|
2014-05-10 09:46:37 +08:00
|
|
|
memset(f_data, num, length);
|
|
|
|
++num;
|
2014-02-20 06:16:47 +08:00
|
|
|
|
2014-05-10 09:46:37 +08:00
|
|
|
if (memcmp(f_data, data, length) == 0) {
|
2014-02-20 06:16:47 +08:00
|
|
|
size_recv += length;
|
2014-05-10 09:46:37 +08:00
|
|
|
} else {
|
|
|
|
printf("FILE_CORRUPTED\n");
|
|
|
|
}
|
2014-02-20 06:16:47 +08:00
|
|
|
}
|
|
|
|
|
2013-12-18 07:55:28 +08:00
|
|
|
START_TEST(test_few_clients)
|
|
|
|
{
|
2014-04-17 01:53:51 +08:00
|
|
|
long long unsigned int con_time, cur_time = time(NULL);
|
2014-08-15 06:34:20 +08:00
|
|
|
Tox *tox1 = tox_new(0);
|
|
|
|
Tox *tox2 = tox_new(0);
|
|
|
|
Tox *tox3 = tox_new(0);
|
2013-12-18 07:55:28 +08:00
|
|
|
ck_assert_msg(tox1 || tox2 || tox3, "Failed to create 3 tox instances");
|
2014-03-17 01:24:39 +08:00
|
|
|
uint32_t to_compare = 974536;
|
|
|
|
tox_callback_friend_request(tox2, accept_friend_request, &to_compare);
|
2013-12-18 07:55:28 +08:00
|
|
|
uint8_t address[TOX_FRIEND_ADDRESS_SIZE];
|
|
|
|
tox_get_address(tox2, address);
|
2014-01-19 07:35:28 +08:00
|
|
|
int test = tox_add_friend(tox3, address, (uint8_t *)"Gentoo", 7);
|
2013-12-18 07:55:28 +08:00
|
|
|
ck_assert_msg(test == 0, "Failed to add friend error code: %i", test);
|
|
|
|
|
2014-01-18 02:35:40 +08:00
|
|
|
uint8_t off = 1;
|
|
|
|
|
2013-12-18 07:55:28 +08:00
|
|
|
while (1) {
|
|
|
|
tox_do(tox1);
|
|
|
|
tox_do(tox2);
|
|
|
|
tox_do(tox3);
|
|
|
|
|
2014-01-18 02:35:40 +08:00
|
|
|
if (tox_isconnected(tox1) && tox_isconnected(tox2) && tox_isconnected(tox3) && off) {
|
|
|
|
printf("Toxes are online, took %llu seconds\n", time(NULL) - cur_time);
|
2014-04-17 01:53:51 +08:00
|
|
|
con_time = time(NULL);
|
2014-01-18 02:35:40 +08:00
|
|
|
off = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-12-18 07:55:28 +08:00
|
|
|
if (tox_get_friend_connection_status(tox2, 0) == 1 && tox_get_friend_connection_status(tox3, 0) == 1)
|
|
|
|
break;
|
|
|
|
|
|
|
|
c_sleep(50);
|
|
|
|
}
|
|
|
|
|
2014-04-17 01:53:51 +08:00
|
|
|
printf("tox clients connected took %llu seconds\n", time(NULL) - con_time);
|
2014-03-17 01:24:39 +08:00
|
|
|
to_compare = 974536;
|
2013-12-23 11:30:14 +08:00
|
|
|
tox_callback_friend_message(tox3, print_message, &to_compare);
|
2014-06-02 08:48:02 +08:00
|
|
|
uint8_t msgs[TOX_MAX_MESSAGE_LENGTH + 1];
|
|
|
|
memset(msgs, 'G', sizeof(msgs));
|
|
|
|
ck_assert_msg(tox_send_message(tox2, 0, msgs, TOX_MAX_MESSAGE_LENGTH + 1) == 0,
|
|
|
|
"TOX_MAX_MESSAGE_LENGTH is too small\n");
|
|
|
|
ck_assert_msg(tox_send_message(tox2, 0, msgs, TOX_MAX_MESSAGE_LENGTH) != 0, "TOX_MAX_MESSAGE_LENGTH is too big\n");
|
2013-12-23 11:30:14 +08:00
|
|
|
|
|
|
|
while (1) {
|
|
|
|
messages_received = 0;
|
|
|
|
tox_do(tox1);
|
|
|
|
tox_do(tox2);
|
|
|
|
tox_do(tox3);
|
|
|
|
|
|
|
|
if (messages_received)
|
|
|
|
break;
|
|
|
|
|
|
|
|
c_sleep(50);
|
|
|
|
}
|
|
|
|
|
|
|
|
printf("tox clients messaging succeeded\n");
|
|
|
|
|
|
|
|
tox_callback_name_change(tox3, print_nickchange, &to_compare);
|
2014-01-19 07:35:28 +08:00
|
|
|
tox_set_name(tox2, (uint8_t *)"Gentoo", sizeof("Gentoo"));
|
2013-12-23 11:30:14 +08:00
|
|
|
|
|
|
|
while (1) {
|
|
|
|
name_changes = 0;
|
|
|
|
tox_do(tox1);
|
|
|
|
tox_do(tox2);
|
|
|
|
tox_do(tox3);
|
|
|
|
|
|
|
|
if (name_changes)
|
|
|
|
break;
|
|
|
|
|
|
|
|
c_sleep(50);
|
|
|
|
}
|
|
|
|
|
|
|
|
uint8_t temp_name[sizeof("Gentoo")];
|
|
|
|
tox_get_name(tox3, 0, temp_name);
|
|
|
|
ck_assert_msg(memcmp(temp_name, "Gentoo", sizeof("Gentoo")) == 0, "Name not correct");
|
2014-02-19 02:49:17 +08:00
|
|
|
|
|
|
|
tox_callback_typing_change(tox2, &print_typingchange, &to_compare);
|
|
|
|
tox_set_user_is_typing(tox3, 0, 1);
|
|
|
|
|
|
|
|
while (1) {
|
|
|
|
typing_changes = 0;
|
|
|
|
tox_do(tox1);
|
|
|
|
tox_do(tox2);
|
|
|
|
tox_do(tox3);
|
|
|
|
|
|
|
|
|
|
|
|
if (typing_changes == 2)
|
|
|
|
break;
|
|
|
|
else
|
|
|
|
ck_assert_msg(typing_changes == 0, "Typing fail");
|
|
|
|
|
|
|
|
c_sleep(50);
|
|
|
|
}
|
|
|
|
|
|
|
|
ck_assert_msg(tox_get_is_typing(tox2, 0) == 1, "Typing fail");
|
|
|
|
tox_set_user_is_typing(tox3, 0, 0);
|
|
|
|
|
|
|
|
while (1) {
|
|
|
|
typing_changes = 0;
|
|
|
|
tox_do(tox1);
|
|
|
|
tox_do(tox2);
|
|
|
|
tox_do(tox3);
|
|
|
|
|
|
|
|
if (typing_changes == 1)
|
|
|
|
break;
|
|
|
|
else
|
|
|
|
ck_assert_msg(typing_changes == 0, "Typing fail");
|
|
|
|
|
|
|
|
c_sleep(50);
|
|
|
|
}
|
|
|
|
|
|
|
|
ck_assert_msg(tox_get_is_typing(tox2, 0) == 0, "Typing fail");
|
2014-02-20 06:16:47 +08:00
|
|
|
|
2014-09-09 00:20:44 +08:00
|
|
|
uint32_t packet_number = 160;
|
|
|
|
int ret = tox_lossless_packet_registerhandler(tox3, 0, packet_number, handle_custom_packet, &packet_number);
|
|
|
|
ck_assert_msg(ret == 0, "tox_lossless_packet_registerhandler fail %i", ret);
|
|
|
|
uint8_t data_c[TOX_MAX_CUSTOM_PACKET_SIZE + 1];
|
|
|
|
memset(data_c, ((uint8_t)packet_number), sizeof(data_c));
|
|
|
|
ret = tox_send_lossless_packet(tox2, 0, data_c, sizeof(data_c));
|
|
|
|
ck_assert_msg(ret == -1, "tox_send_lossless_packet bigger fail %i", ret);
|
|
|
|
ret = tox_send_lossless_packet(tox2, 0, data_c, TOX_MAX_CUSTOM_PACKET_SIZE);
|
|
|
|
ck_assert_msg(ret == 0, "tox_send_lossless_packet fail %i", ret);
|
|
|
|
|
|
|
|
while (1) {
|
|
|
|
custom_packet = 0;
|
|
|
|
tox_do(tox1);
|
|
|
|
tox_do(tox2);
|
|
|
|
tox_do(tox3);
|
|
|
|
|
|
|
|
if (custom_packet == 1)
|
|
|
|
break;
|
|
|
|
else
|
|
|
|
ck_assert_msg(custom_packet == 0, "Lossless packet fail");
|
|
|
|
|
|
|
|
c_sleep(50);
|
|
|
|
}
|
2014-11-26 04:31:46 +08:00
|
|
|
|
2014-09-09 00:20:44 +08:00
|
|
|
packet_number = 200;
|
|
|
|
ret = tox_lossy_packet_registerhandler(tox3, 0, packet_number, handle_custom_packet, &packet_number);
|
|
|
|
ck_assert_msg(ret == 0, "tox_lossy_packet_registerhandler fail %i", ret);
|
|
|
|
memset(data_c, ((uint8_t)packet_number), sizeof(data_c));
|
|
|
|
ret = tox_send_lossy_packet(tox2, 0, data_c, sizeof(data_c));
|
|
|
|
ck_assert_msg(ret == -1, "tox_send_lossy_packet bigger fail %i", ret);
|
|
|
|
ret = tox_send_lossy_packet(tox2, 0, data_c, TOX_MAX_CUSTOM_PACKET_SIZE);
|
|
|
|
ck_assert_msg(ret == 0, "tox_send_lossy_packet fail %i", ret);
|
|
|
|
|
|
|
|
while (1) {
|
|
|
|
custom_packet = 0;
|
|
|
|
tox_do(tox1);
|
|
|
|
tox_do(tox2);
|
|
|
|
tox_do(tox3);
|
|
|
|
|
|
|
|
if (custom_packet == 1)
|
|
|
|
break;
|
|
|
|
else
|
|
|
|
ck_assert_msg(custom_packet == 0, "lossy packet fail");
|
|
|
|
|
|
|
|
c_sleep(50);
|
|
|
|
}
|
|
|
|
|
2014-02-20 06:16:47 +08:00
|
|
|
filenum = file_accepted = file_size = file_sent = sendf_ok = size_recv = 0;
|
|
|
|
long long unsigned int f_time = time(NULL);
|
|
|
|
tox_callback_file_data(tox3, write_file, &to_compare);
|
|
|
|
tox_callback_file_control(tox2, file_print_control, &to_compare);
|
|
|
|
tox_callback_file_control(tox3, file_print_control, &to_compare);
|
|
|
|
tox_callback_file_send_request(tox3, file_request_accept, &to_compare);
|
|
|
|
uint64_t totalf_size = 100 * 1024 * 1024;
|
|
|
|
int fnum = tox_new_file_sender(tox2, 0, totalf_size, (uint8_t *)"Gentoo.exe", sizeof("Gentoo.exe"));
|
|
|
|
ck_assert_msg(fnum != -1, "tox_new_file_sender fail");
|
|
|
|
int fpiece_size = tox_file_data_size(tox2, 0);
|
2014-09-09 00:20:44 +08:00
|
|
|
uint8_t f_data[fpiece_size];
|
2014-05-10 09:46:37 +08:00
|
|
|
uint8_t num = 0;
|
|
|
|
memset(f_data, num, fpiece_size);
|
2014-05-26 00:27:48 +08:00
|
|
|
|
2014-02-20 06:16:47 +08:00
|
|
|
while (1) {
|
|
|
|
file_sent = 0;
|
|
|
|
tox_do(tox1);
|
|
|
|
tox_do(tox2);
|
|
|
|
tox_do(tox3);
|
|
|
|
|
|
|
|
if (sendf_ok)
|
|
|
|
while (tox_file_send_data(tox2, 0, fnum, f_data, fpiece_size < totalf_size ? fpiece_size : totalf_size) == 0) {
|
|
|
|
if (totalf_size <= fpiece_size) {
|
|
|
|
sendf_ok = 0;
|
|
|
|
tox_file_send_control(tox2, 0, 0, fnum, TOX_FILECONTROL_FINISHED, NULL, 0);
|
|
|
|
}
|
2014-05-26 00:27:48 +08:00
|
|
|
|
2014-05-10 09:46:37 +08:00
|
|
|
++num;
|
|
|
|
memset(f_data, num, fpiece_size);
|
2014-02-20 06:16:47 +08:00
|
|
|
|
|
|
|
totalf_size -= fpiece_size;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (file_sent && size_recv == file_size)
|
|
|
|
break;
|
|
|
|
|
2014-05-31 11:01:17 +08:00
|
|
|
uint32_t tox1_interval = tox_do_interval(tox1);
|
|
|
|
uint32_t tox2_interval = tox_do_interval(tox2);
|
|
|
|
uint32_t tox3_interval = tox_do_interval(tox3);
|
2014-06-02 08:48:02 +08:00
|
|
|
|
2014-05-31 11:01:17 +08:00
|
|
|
if (tox2_interval > tox3_interval) {
|
|
|
|
c_sleep(tox3_interval);
|
|
|
|
} else {
|
|
|
|
c_sleep(tox2_interval);
|
|
|
|
}
|
2014-02-20 06:16:47 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
printf("100MB file sent in %llu seconds\n", time(NULL) - f_time);
|
|
|
|
|
2013-12-18 07:55:28 +08:00
|
|
|
printf("test_few_clients succeeded, took %llu seconds\n", time(NULL) - cur_time);
|
2014-06-06 21:50:19 +08:00
|
|
|
|
|
|
|
tox_kill(tox1);
|
|
|
|
tox_kill(tox2);
|
|
|
|
tox_kill(tox3);
|
2013-12-18 07:55:28 +08:00
|
|
|
}
|
|
|
|
END_TEST
|
|
|
|
|
2014-02-27 01:46:11 +08:00
|
|
|
#define NUM_TOXES 66
|
2014-09-05 08:54:55 +08:00
|
|
|
#define NUM_FRIENDS 50
|
2013-12-19 09:34:11 +08:00
|
|
|
|
|
|
|
START_TEST(test_many_clients)
|
|
|
|
{
|
|
|
|
long long unsigned int cur_time = time(NULL);
|
|
|
|
Tox *toxes[NUM_TOXES];
|
|
|
|
uint32_t i, j;
|
2014-07-28 07:54:43 +08:00
|
|
|
uint32_t to_comp = 974536;
|
2013-12-19 09:34:11 +08:00
|
|
|
|
|
|
|
for (i = 0; i < NUM_TOXES; ++i) {
|
2014-08-15 06:34:20 +08:00
|
|
|
toxes[i] = tox_new(0);
|
2013-12-19 09:34:11 +08:00
|
|
|
ck_assert_msg(toxes[i] != 0, "Failed to create tox instances %u", i);
|
2014-03-17 01:24:39 +08:00
|
|
|
tox_callback_friend_request(toxes[i], accept_friend_request, &to_comp);
|
2013-12-19 09:34:11 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
struct {
|
|
|
|
uint16_t tox1;
|
|
|
|
uint16_t tox2;
|
|
|
|
} pairs[NUM_FRIENDS];
|
|
|
|
|
|
|
|
uint8_t address[TOX_FRIEND_ADDRESS_SIZE];
|
|
|
|
|
|
|
|
for (i = 0; i < NUM_FRIENDS; ++i) {
|
|
|
|
loop_top:
|
|
|
|
pairs[i].tox1 = rand() % NUM_TOXES;
|
|
|
|
pairs[i].tox2 = (pairs[i].tox1 + rand() % (NUM_TOXES - 1) + 1) % NUM_TOXES;
|
2014-05-14 00:09:40 +08:00
|
|
|
|
|
|
|
for (j = 0; j < i; ++j) {
|
|
|
|
if (pairs[j].tox2 == pairs[i].tox1 && pairs[j].tox1 == pairs[i].tox2)
|
|
|
|
goto loop_top;
|
|
|
|
}
|
|
|
|
|
2013-12-19 09:34:11 +08:00
|
|
|
tox_get_address(toxes[pairs[i].tox1], address);
|
2014-01-19 07:35:28 +08:00
|
|
|
int test = tox_add_friend(toxes[pairs[i].tox2], address, (uint8_t *)"Gentoo", 7);
|
2013-12-19 09:34:11 +08:00
|
|
|
|
|
|
|
if (test == TOX_FAERR_ALREADYSENT) {
|
|
|
|
goto loop_top;
|
|
|
|
}
|
|
|
|
|
|
|
|
ck_assert_msg(test >= 0, "Failed to add friend error code: %i", test);
|
|
|
|
}
|
|
|
|
|
|
|
|
while (1) {
|
|
|
|
uint16_t counter = 0;
|
|
|
|
|
|
|
|
for (i = 0; i < NUM_TOXES; ++i) {
|
|
|
|
for (j = 0; j < tox_count_friendlist(toxes[i]); ++j)
|
|
|
|
if (tox_get_friend_connection_status(toxes[i], j) == 1)
|
|
|
|
++counter;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (counter == NUM_FRIENDS * 2) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < NUM_TOXES; ++i) {
|
|
|
|
tox_do(toxes[i]);
|
|
|
|
}
|
|
|
|
|
|
|
|
c_sleep(50);
|
|
|
|
}
|
|
|
|
|
|
|
|
printf("test_many_clients succeeded, took %llu seconds\n", time(NULL) - cur_time);
|
2014-06-06 21:50:19 +08:00
|
|
|
|
|
|
|
for (i = 0; i < NUM_TOXES; ++i) {
|
|
|
|
tox_kill(toxes[i]);
|
|
|
|
}
|
2013-12-19 09:34:11 +08:00
|
|
|
}
|
|
|
|
END_TEST
|
2013-12-18 07:55:28 +08:00
|
|
|
|
|
|
|
Suite *tox_suite(void)
|
|
|
|
{
|
|
|
|
Suite *s = suite_create("Tox");
|
|
|
|
|
2014-02-20 06:16:47 +08:00
|
|
|
DEFTESTCASE_SLOW(few_clients, 50);
|
2014-04-17 01:53:51 +08:00
|
|
|
DEFTESTCASE_SLOW(many_clients, 150);
|
2013-12-18 07:55:28 +08:00
|
|
|
return s;
|
|
|
|
}
|
|
|
|
|
|
|
|
int main(int argc, char *argv[])
|
|
|
|
{
|
|
|
|
srand((unsigned int) time(NULL));
|
|
|
|
|
|
|
|
Suite *tox = tox_suite();
|
|
|
|
SRunner *test_runner = srunner_create(tox);
|
|
|
|
|
|
|
|
int number_failed = 0;
|
|
|
|
srunner_run_all(test_runner, CK_NORMAL);
|
|
|
|
number_failed = srunner_ntests_failed(test_runner);
|
|
|
|
|
|
|
|
srunner_free(test_runner);
|
|
|
|
|
|
|
|
return number_failed;
|
|
|
|
}
|
|
|
|
|