2013-09-18 04:28:39 +08:00
|
|
|
#ifdef HAVE_CONFIG_H
|
|
|
|
#include "config.h"
|
|
|
|
#endif
|
|
|
|
|
2017-06-05 04:58:28 +08:00
|
|
|
#include "check_compat.h"
|
|
|
|
|
2017-01-04 00:26:15 +08:00
|
|
|
#include <errno.h>
|
2016-09-01 07:33:20 +08:00
|
|
|
#include <stdint.h>
|
2013-09-18 04:28:39 +08:00
|
|
|
#include <stdlib.h>
|
2016-09-01 07:33:20 +08:00
|
|
|
#include <string.h>
|
|
|
|
#include <sys/types.h>
|
2013-09-18 04:28:39 +08:00
|
|
|
#include <time.h>
|
|
|
|
|
|
|
|
#include "../toxcore/network.h"
|
|
|
|
|
2014-08-08 04:59:47 +08:00
|
|
|
#include "helpers.h"
|
|
|
|
|
2017-12-09 14:06:09 +08:00
|
|
|
#ifndef USE_IPV6
|
|
|
|
#define USE_IPV6 1
|
|
|
|
#endif
|
|
|
|
|
2013-09-18 04:28:39 +08:00
|
|
|
START_TEST(test_addr_resolv_localhost)
|
|
|
|
{
|
|
|
|
#ifdef __CYGWIN__
|
|
|
|
/* force initialization of network stack
|
|
|
|
* normally this should happen automatically
|
|
|
|
* cygwin doesn't do it for every network related function though
|
|
|
|
* e.g. not for getaddrinfo... */
|
2017-01-07 16:28:53 +08:00
|
|
|
net_socket(0, 0, 0);
|
2013-09-18 04:28:39 +08:00
|
|
|
errno = 0;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
const char localhost[] = "localhost";
|
2014-01-22 00:14:16 +08:00
|
|
|
int localhost_split = 0;
|
2013-09-18 04:28:39 +08:00
|
|
|
|
|
|
|
IP ip;
|
2016-02-28 03:32:49 +08:00
|
|
|
ip_init(&ip, 0); // ipv6enabled = 0
|
2013-09-18 04:28:39 +08:00
|
|
|
|
2018-01-29 05:30:39 +08:00
|
|
|
int res = addr_resolve(localhost, &ip, nullptr);
|
2013-09-18 04:28:39 +08:00
|
|
|
|
2018-04-08 10:09:42 +08:00
|
|
|
int error = net_error();
|
|
|
|
const char *strerror = net_new_strerror(error);
|
|
|
|
ck_assert_msg(res > 0, "Resolver failed: %d, %s", error, strerror);
|
|
|
|
net_kill_strerror(strerror);
|
2013-09-18 04:28:39 +08:00
|
|
|
|
2017-01-07 16:28:53 +08:00
|
|
|
char ip_str[IP_NTOA_LEN];
|
2018-02-27 09:07:46 +08:00
|
|
|
ck_assert_msg(net_family_is_ipv4(ip.family), "Expected family TOX_AF_INET, got %u.", ip.family.value);
|
2017-11-15 01:14:06 +08:00
|
|
|
const uint32_t loopback = get_ip4_loopback().uint32;
|
2018-02-15 04:51:55 +08:00
|
|
|
ck_assert_msg(ip.ip.v4.uint32 == loopback, "Expected 127.0.0.1, got %s.",
|
2017-01-07 16:28:53 +08:00
|
|
|
ip_ntoa(&ip, ip_str, sizeof(ip_str)));
|
2013-09-18 04:28:39 +08:00
|
|
|
|
2016-02-28 03:32:49 +08:00
|
|
|
ip_init(&ip, 1); // ipv6enabled = 1
|
2018-01-29 05:30:39 +08:00
|
|
|
res = addr_resolve(localhost, &ip, nullptr);
|
2013-09-18 04:28:39 +08:00
|
|
|
|
2016-02-28 00:45:02 +08:00
|
|
|
if (!(res & TOX_ADDR_RESOLVE_INET6)) {
|
2018-01-29 05:30:39 +08:00
|
|
|
res = addr_resolve("ip6-localhost", &ip, nullptr);
|
2014-01-22 00:14:16 +08:00
|
|
|
localhost_split = 1;
|
2013-09-18 04:28:39 +08:00
|
|
|
}
|
|
|
|
|
2018-04-08 10:09:42 +08:00
|
|
|
error = net_error();
|
|
|
|
strerror = net_new_strerror(error);
|
|
|
|
ck_assert_msg(res > 0, "Resolver failed: %d, %s", error, strerror);
|
|
|
|
net_kill_strerror(strerror);
|
2013-09-18 04:28:39 +08:00
|
|
|
|
2018-02-27 09:07:46 +08:00
|
|
|
ck_assert_msg(net_family_is_ipv6(ip.family), "Expected family TOX_AF_INET6 (%u), got %u.", TOX_AF_INET6,
|
|
|
|
ip.family.value);
|
2017-11-15 01:14:06 +08:00
|
|
|
IP6 ip6_loopback = get_ip6_loopback();
|
2018-02-15 04:51:55 +08:00
|
|
|
ck_assert_msg(!memcmp(&ip.ip.v6, &ip6_loopback, sizeof(IP6)), "Expected ::1, got %s.",
|
2017-01-07 16:28:53 +08:00
|
|
|
ip_ntoa(&ip, ip_str, sizeof(ip_str)));
|
2013-09-18 04:28:39 +08:00
|
|
|
|
2017-01-07 16:28:53 +08:00
|
|
|
if (localhost_split) {
|
2014-01-22 00:14:16 +08:00
|
|
|
printf("Localhost seems to be split in two.\n");
|
2017-01-07 16:28:53 +08:00
|
|
|
return;
|
2013-09-18 04:28:39 +08:00
|
|
|
}
|
2017-01-07 16:28:53 +08:00
|
|
|
|
|
|
|
ip_init(&ip, 1); // ipv6enabled = 1
|
2018-02-27 09:07:46 +08:00
|
|
|
ip.family = net_family_unspec;
|
2017-01-07 16:28:53 +08:00
|
|
|
IP extra;
|
|
|
|
ip_reset(&extra);
|
|
|
|
res = addr_resolve(localhost, &ip, &extra);
|
2018-04-08 10:09:42 +08:00
|
|
|
error = net_error();
|
|
|
|
strerror = net_new_strerror(error);
|
|
|
|
ck_assert_msg(res > 0, "Resolver failed: %d, %s", error, strerror);
|
|
|
|
net_kill_strerror(strerror);
|
2017-01-07 16:28:53 +08:00
|
|
|
|
2017-12-09 14:06:09 +08:00
|
|
|
#if USE_IPV6
|
2018-02-27 09:07:46 +08:00
|
|
|
ck_assert_msg(net_family_is_ipv6(ip.family), "Expected family TOX_AF_INET6 (%u), got %u.", TOX_AF_INET6,
|
|
|
|
ip.family.value);
|
2018-02-15 04:51:55 +08:00
|
|
|
ck_assert_msg(!memcmp(&ip.ip.v6, &ip6_loopback, sizeof(IP6)), "Expected ::1, got %s.",
|
2017-01-07 16:28:53 +08:00
|
|
|
ip_ntoa(&ip, ip_str, sizeof(ip_str)));
|
|
|
|
|
2018-02-27 09:07:46 +08:00
|
|
|
ck_assert_msg(net_family_is_ipv4(extra.family), "Expected family TOX_AF_INET (%d), got %u.", TOX_AF_INET,
|
|
|
|
extra.family.value);
|
2018-02-15 04:51:55 +08:00
|
|
|
ck_assert_msg(extra.ip.v4.uint32 == loopback, "Expected 127.0.0.1, got %s.",
|
2017-01-07 16:28:53 +08:00
|
|
|
ip_ntoa(&ip, ip_str, sizeof(ip_str)));
|
2018-06-24 20:41:26 +08:00
|
|
|
#elif 0
|
|
|
|
// TODO(iphydf): Fix this to work on IPv6-supporting systems.
|
2018-02-27 09:07:46 +08:00
|
|
|
ck_assert_msg(net_family_is_ipv4(ip.family), "Expected family TOX_AF_INET (%d), got %u.", TOX_AF_INET, ip.family.value);
|
2018-02-15 04:51:55 +08:00
|
|
|
ck_assert_msg(ip.ip.v4.uint32 == loopback, "Expected 127.0.0.1, got %s.",
|
2017-12-09 14:06:09 +08:00
|
|
|
ip_ntoa(&ip, ip_str, sizeof(ip_str)));
|
|
|
|
#endif
|
2013-09-18 04:28:39 +08:00
|
|
|
}
|
|
|
|
END_TEST
|
|
|
|
|
|
|
|
START_TEST(test_ip_equal)
|
|
|
|
{
|
|
|
|
int res;
|
|
|
|
IP ip1, ip2;
|
|
|
|
ip_reset(&ip1);
|
|
|
|
ip_reset(&ip2);
|
|
|
|
|
2018-01-29 05:30:39 +08:00
|
|
|
res = ip_equal(nullptr, nullptr);
|
2013-09-18 04:28:39 +08:00
|
|
|
ck_assert_msg(res == 0, "ip_equal(NULL, NULL): expected result 0, got %u.", res);
|
|
|
|
|
2018-01-29 05:30:39 +08:00
|
|
|
res = ip_equal(&ip1, nullptr);
|
2013-09-18 04:28:39 +08:00
|
|
|
ck_assert_msg(res == 0, "ip_equal(PTR, NULL): expected result 0, got %u.", res);
|
|
|
|
|
2018-01-29 05:30:39 +08:00
|
|
|
res = ip_equal(nullptr, &ip1);
|
2013-09-18 04:28:39 +08:00
|
|
|
ck_assert_msg(res == 0, "ip_equal(NULL, PTR): expected result 0, got %u.", res);
|
|
|
|
|
2018-02-27 09:07:46 +08:00
|
|
|
ip1.family = net_family_ipv4;
|
2018-02-15 04:51:55 +08:00
|
|
|
ip1.ip.v4.uint32 = net_htonl(0x7F000001);
|
2013-09-18 04:28:39 +08:00
|
|
|
|
|
|
|
res = ip_equal(&ip1, &ip2);
|
2017-03-19 03:34:51 +08:00
|
|
|
ck_assert_msg(res == 0, "ip_equal( {TOX_AF_INET, 127.0.0.1}, {TOX_AF_UNSPEC, 0} ): "
|
2017-03-03 04:15:51 +08:00
|
|
|
"expected result 0, got %u.", res);
|
2013-09-18 04:28:39 +08:00
|
|
|
|
2018-02-27 09:07:46 +08:00
|
|
|
ip2.family = net_family_ipv4;
|
2018-02-15 04:51:55 +08:00
|
|
|
ip2.ip.v4.uint32 = net_htonl(0x7F000001);
|
2013-09-18 04:28:39 +08:00
|
|
|
|
|
|
|
res = ip_equal(&ip1, &ip2);
|
2017-03-03 04:15:51 +08:00
|
|
|
ck_assert_msg(res != 0, "ip_equal( {TOX_AF_INET, 127.0.0.1}, {TOX_AF_INET, 127.0.0.1} ): "
|
|
|
|
"expected result != 0, got 0.");
|
2013-09-18 04:28:39 +08:00
|
|
|
|
2018-02-15 04:51:55 +08:00
|
|
|
ip2.ip.v4.uint32 = net_htonl(0x7F000002);
|
2013-09-18 04:28:39 +08:00
|
|
|
|
|
|
|
res = ip_equal(&ip1, &ip2);
|
2017-03-03 04:15:51 +08:00
|
|
|
ck_assert_msg(res == 0, "ip_equal( {TOX_AF_INET, 127.0.0.1}, {TOX_AF_INET, 127.0.0.2} ): "
|
|
|
|
"expected result 0, got %u.", res);
|
2013-09-18 04:28:39 +08:00
|
|
|
|
2018-02-27 09:07:46 +08:00
|
|
|
ip2.family = net_family_ipv6;
|
2018-02-15 04:51:55 +08:00
|
|
|
ip2.ip.v6.uint32[0] = 0;
|
|
|
|
ip2.ip.v6.uint32[1] = 0;
|
|
|
|
ip2.ip.v6.uint32[2] = net_htonl(0xFFFF);
|
|
|
|
ip2.ip.v6.uint32[3] = net_htonl(0x7F000001);
|
2013-09-18 04:28:39 +08:00
|
|
|
|
2018-02-15 04:51:55 +08:00
|
|
|
ck_assert_msg(IPV6_IPV4_IN_V6(ip2.ip.v6) != 0,
|
2017-01-06 20:19:12 +08:00
|
|
|
"IPV6_IPV4_IN_V6(::ffff:127.0.0.1): expected != 0, got 0.");
|
2013-09-18 04:28:39 +08:00
|
|
|
|
|
|
|
res = ip_equal(&ip1, &ip2);
|
2017-03-03 04:15:51 +08:00
|
|
|
ck_assert_msg(res != 0, "ip_equal( {TOX_AF_INET, 127.0.0.1}, {TOX_AF_INET6, ::ffff:127.0.0.1} ): "
|
|
|
|
"expected result != 0, got 0.");
|
2013-09-18 04:28:39 +08:00
|
|
|
|
2017-11-15 01:14:06 +08:00
|
|
|
IP6 ip6_loopback = get_ip6_loopback();
|
2018-02-15 04:51:55 +08:00
|
|
|
memcpy(&ip2.ip.v6, &ip6_loopback, sizeof(IP6));
|
2013-09-18 04:28:39 +08:00
|
|
|
res = ip_equal(&ip1, &ip2);
|
2017-03-03 04:15:51 +08:00
|
|
|
ck_assert_msg(res == 0, "ip_equal( {TOX_AF_INET, 127.0.0.1}, {TOX_AF_INET6, ::1} ): expected result 0, got %u.", res);
|
2013-09-18 04:28:39 +08:00
|
|
|
|
|
|
|
memcpy(&ip1, &ip2, sizeof(IP));
|
|
|
|
res = ip_equal(&ip1, &ip2);
|
2017-03-03 04:15:51 +08:00
|
|
|
ck_assert_msg(res != 0, "ip_equal( {TOX_AF_INET6, ::1}, {TOX_AF_INET6, ::1} ): expected result != 0, got 0.");
|
2013-09-18 04:28:39 +08:00
|
|
|
|
2018-02-15 04:51:55 +08:00
|
|
|
ip2.ip.v6.uint8[15]++;
|
2013-09-18 04:28:39 +08:00
|
|
|
res = ip_equal(&ip1, &ip2);
|
2018-02-06 05:38:58 +08:00
|
|
|
ck_assert_msg(res == 0, "ip_equal( {TOX_AF_INET6, ::1}, {TOX_AF_INET6, ::2} ): expected result 0, got %u.", res);
|
2013-09-18 04:28:39 +08:00
|
|
|
}
|
|
|
|
END_TEST
|
|
|
|
|
2016-09-05 23:10:48 +08:00
|
|
|
static Suite *network_suite(void)
|
2013-09-18 04:28:39 +08:00
|
|
|
{
|
|
|
|
Suite *s = suite_create("Network");
|
|
|
|
|
2018-04-08 10:09:42 +08:00
|
|
|
networking_at_startup();
|
|
|
|
|
2013-09-18 04:28:39 +08:00
|
|
|
DEFTESTCASE(addr_resolv_localhost);
|
|
|
|
DEFTESTCASE(ip_equal);
|
|
|
|
|
|
|
|
return s;
|
|
|
|
}
|
|
|
|
|
2016-09-05 23:10:48 +08:00
|
|
|
int main(void)
|
2013-09-18 04:28:39 +08:00
|
|
|
{
|
2018-02-19 01:50:50 +08:00
|
|
|
setvbuf(stdout, nullptr, _IONBF, 0);
|
2018-01-29 05:30:39 +08:00
|
|
|
srand((unsigned int) time(nullptr));
|
2013-09-18 04:28:39 +08:00
|
|
|
|
|
|
|
Suite *network = network_suite();
|
|
|
|
SRunner *test_runner = srunner_create(network);
|
|
|
|
int number_failed = 0;
|
|
|
|
|
|
|
|
srunner_run_all(test_runner, CK_NORMAL);
|
|
|
|
number_failed = srunner_ntests_failed(test_runner);
|
|
|
|
|
|
|
|
srunner_free(test_runner);
|
|
|
|
|
|
|
|
return number_failed;
|
|
|
|
}
|