2014-01-01 12:18:37 +08:00
|
|
|
#ifdef HAVE_CONFIG_H
|
|
|
|
#include "config.h"
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <stdint.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <check.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <time.h>
|
|
|
|
|
|
|
|
#include "../toxcore/onion.h"
|
2014-01-05 08:40:43 +08:00
|
|
|
#include "../toxcore/onion_announce.h"
|
2014-01-30 09:59:50 +08:00
|
|
|
#include "../toxcore/onion_client.h"
|
2014-01-07 06:59:44 +08:00
|
|
|
#include "../toxcore/util.h"
|
2014-01-01 12:18:37 +08:00
|
|
|
|
2014-08-08 04:59:47 +08:00
|
|
|
#include "helpers.h"
|
|
|
|
|
2014-01-20 07:18:25 +08:00
|
|
|
#if defined(_WIN32) || defined(__WIN32__) || defined (WIN32)
|
2014-01-06 08:22:38 +08:00
|
|
|
#define c_sleep(x) Sleep(1*x)
|
|
|
|
#else
|
|
|
|
#include <unistd.h>
|
|
|
|
#define c_sleep(x) usleep(1000*x)
|
|
|
|
#endif
|
|
|
|
|
2014-01-01 12:18:37 +08:00
|
|
|
void do_onion(Onion *onion)
|
|
|
|
{
|
|
|
|
networking_poll(onion->net);
|
|
|
|
do_DHT(onion->dht);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int handled_test_1;
|
2014-11-22 09:18:29 +08:00
|
|
|
static int handle_test_1(void *object, IP_Port source, const uint8_t *packet, uint16_t length)
|
2014-01-01 12:18:37 +08:00
|
|
|
{
|
|
|
|
Onion *onion = object;
|
|
|
|
|
|
|
|
if (memcmp(packet, "Install Gentoo", sizeof("Install Gentoo")) != 0)
|
|
|
|
return 1;
|
|
|
|
|
2014-01-05 08:40:43 +08:00
|
|
|
if (send_onion_response(onion->net, source, (uint8_t *)"install gentoo", sizeof("install gentoo"),
|
2014-01-04 11:13:20 +08:00
|
|
|
packet + sizeof("Install Gentoo")) == -1)
|
2014-01-01 12:18:37 +08:00
|
|
|
return 1;
|
|
|
|
|
|
|
|
handled_test_1 = 1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int handled_test_2;
|
2014-11-22 09:18:29 +08:00
|
|
|
static int handle_test_2(void *object, IP_Port source, const uint8_t *packet, uint16_t length)
|
2014-01-01 12:18:37 +08:00
|
|
|
{
|
|
|
|
if (length != sizeof("install Gentoo"))
|
|
|
|
return 1;
|
|
|
|
|
2014-01-05 08:40:43 +08:00
|
|
|
if (memcmp(packet, (uint8_t *)"install gentoo", sizeof("install gentoo")) != 0)
|
2014-01-01 12:18:37 +08:00
|
|
|
return 1;
|
|
|
|
|
|
|
|
handled_test_2 = 1;
|
|
|
|
return 0;
|
|
|
|
}
|
2014-01-06 08:22:38 +08:00
|
|
|
/*
|
|
|
|
void print_client_id(uint8_t *client_id, uint32_t length)
|
|
|
|
{
|
|
|
|
uint32_t j;
|
|
|
|
|
|
|
|
for (j = 0; j < length; j++) {
|
|
|
|
printf("%02hhX", client_id[j]);
|
|
|
|
}
|
|
|
|
printf("\n");
|
|
|
|
}
|
|
|
|
*/
|
2014-01-09 09:15:35 +08:00
|
|
|
uint8_t sb_data[ONION_ANNOUNCE_SENDBACK_DATA_LENGTH];
|
2014-01-06 08:22:38 +08:00
|
|
|
static int handled_test_3;
|
|
|
|
uint8_t test_3_pub_key[crypto_box_PUBLICKEYBYTES];
|
|
|
|
uint8_t test_3_ping_id[crypto_hash_sha256_BYTES];
|
2014-11-22 09:18:29 +08:00
|
|
|
static int handle_test_3(void *object, IP_Port source, const uint8_t *packet, uint16_t length)
|
2014-01-06 08:22:38 +08:00
|
|
|
{
|
|
|
|
Onion *onion = object;
|
|
|
|
|
2014-01-20 03:41:29 +08:00
|
|
|
if (length != (1 + crypto_box_NONCEBYTES + ONION_ANNOUNCE_SENDBACK_DATA_LENGTH + 1 + crypto_hash_sha256_BYTES +
|
2014-01-09 09:15:35 +08:00
|
|
|
crypto_box_MACBYTES))
|
2014-01-06 08:22:38 +08:00
|
|
|
return 1;
|
|
|
|
|
2014-01-20 03:41:29 +08:00
|
|
|
uint8_t plain[1 + crypto_hash_sha256_BYTES];
|
2014-01-06 08:22:38 +08:00
|
|
|
//print_client_id(packet, length);
|
2014-04-24 00:29:24 +08:00
|
|
|
int len = decrypt_data(test_3_pub_key, onion->dht->self_secret_key, packet + 1 + ONION_ANNOUNCE_SENDBACK_DATA_LENGTH,
|
2014-01-10 08:54:42 +08:00
|
|
|
packet + 1 + ONION_ANNOUNCE_SENDBACK_DATA_LENGTH + crypto_box_NONCEBYTES,
|
2014-01-20 03:41:29 +08:00
|
|
|
1 + crypto_hash_sha256_BYTES + crypto_box_MACBYTES, plain);
|
2014-01-06 08:22:38 +08:00
|
|
|
|
|
|
|
if (len == -1)
|
|
|
|
return 1;
|
|
|
|
|
2014-01-10 08:54:42 +08:00
|
|
|
|
|
|
|
if (memcmp(packet + 1, sb_data, ONION_ANNOUNCE_SENDBACK_DATA_LENGTH) != 0)
|
2014-01-09 09:15:35 +08:00
|
|
|
return 1;
|
|
|
|
|
2014-01-20 03:41:29 +08:00
|
|
|
memcpy(test_3_ping_id, plain + 1, crypto_hash_sha256_BYTES);
|
2014-01-06 08:22:38 +08:00
|
|
|
//print_client_id(test_3_ping_id, sizeof(test_3_ping_id));
|
|
|
|
handled_test_3 = 1;
|
|
|
|
return 0;
|
|
|
|
}
|
2014-01-05 08:40:43 +08:00
|
|
|
|
2014-01-15 03:20:42 +08:00
|
|
|
uint8_t nonce[crypto_box_NONCEBYTES];
|
2014-01-07 06:59:44 +08:00
|
|
|
static int handled_test_4;
|
2014-11-22 09:18:29 +08:00
|
|
|
static int handle_test_4(void *object, IP_Port source, const uint8_t *packet, uint16_t length)
|
2014-01-07 06:59:44 +08:00
|
|
|
{
|
|
|
|
Onion *onion = object;
|
|
|
|
|
|
|
|
if (length != (1 + crypto_box_NONCEBYTES + crypto_box_PUBLICKEYBYTES + sizeof("Install gentoo") + crypto_box_MACBYTES))
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
uint8_t plain[sizeof("Install gentoo")] = {0};
|
2014-01-15 03:20:42 +08:00
|
|
|
|
|
|
|
if (memcmp(nonce, packet + 1, crypto_box_NONCEBYTES) != 0)
|
|
|
|
return 1;
|
|
|
|
|
2014-04-24 00:29:24 +08:00
|
|
|
int len = decrypt_data(packet + 1 + crypto_box_NONCEBYTES, onion->dht->self_secret_key, packet + 1,
|
2014-01-07 06:59:44 +08:00
|
|
|
packet + 1 + crypto_box_NONCEBYTES + crypto_box_PUBLICKEYBYTES, sizeof("Install gentoo") + crypto_box_MACBYTES, plain);
|
|
|
|
|
|
|
|
if (len == -1)
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
if (memcmp(plain, "Install gentoo", sizeof("Install gentoo")) != 0)
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
handled_test_4 = 1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-01-01 12:18:37 +08:00
|
|
|
START_TEST(test_basic)
|
|
|
|
{
|
|
|
|
IP ip;
|
|
|
|
ip_init(&ip, 1);
|
|
|
|
ip.ip6.uint8[15] = 1;
|
2014-04-24 00:29:24 +08:00
|
|
|
Onion *onion1 = new_onion(new_DHT(new_networking(ip, 34567)));
|
|
|
|
Onion *onion2 = new_onion(new_DHT(new_networking(ip, 34568)));
|
2014-01-01 12:18:37 +08:00
|
|
|
ck_assert_msg((onion1 != NULL) && (onion2 != NULL), "Onion failed initializing.");
|
|
|
|
networking_registerhandler(onion2->net, 'I', &handle_test_1, onion2);
|
|
|
|
|
|
|
|
IP_Port on1 = {ip, onion1->net->port};
|
|
|
|
Node_format n1;
|
2015-01-30 08:38:44 +08:00
|
|
|
memcpy(n1.public_key, onion1->dht->self_public_key, crypto_box_PUBLICKEYBYTES);
|
2014-01-01 12:18:37 +08:00
|
|
|
n1.ip_port = on1;
|
|
|
|
|
|
|
|
IP_Port on2 = {ip, onion2->net->port};
|
|
|
|
Node_format n2;
|
2015-01-30 08:38:44 +08:00
|
|
|
memcpy(n2.public_key, onion2->dht->self_public_key, crypto_box_PUBLICKEYBYTES);
|
2014-01-01 12:18:37 +08:00
|
|
|
n2.ip_port = on2;
|
|
|
|
|
|
|
|
Node_format nodes[4];
|
|
|
|
nodes[0] = n1;
|
|
|
|
nodes[1] = n2;
|
|
|
|
nodes[2] = n1;
|
|
|
|
nodes[3] = n2;
|
2014-02-27 01:46:11 +08:00
|
|
|
Onion_Path path;
|
|
|
|
create_onion_path(onion1->dht, &path, nodes);
|
|
|
|
int ret = send_onion_packet(onion1->net, &path, nodes[3].ip_port, (uint8_t *)"Install Gentoo",
|
|
|
|
sizeof("Install Gentoo"));
|
2014-01-01 12:18:37 +08:00
|
|
|
ck_assert_msg(ret == 0, "Failed to create/send onion packet.");
|
|
|
|
|
|
|
|
handled_test_1 = 0;
|
|
|
|
|
|
|
|
while (handled_test_1 == 0) {
|
|
|
|
do_onion(onion1);
|
|
|
|
do_onion(onion2);
|
|
|
|
}
|
|
|
|
|
|
|
|
networking_registerhandler(onion1->net, 'i', &handle_test_2, onion1);
|
|
|
|
handled_test_2 = 0;
|
|
|
|
|
|
|
|
while (handled_test_2 == 0) {
|
|
|
|
do_onion(onion1);
|
|
|
|
do_onion(onion2);
|
|
|
|
}
|
2014-01-06 08:22:38 +08:00
|
|
|
|
|
|
|
Onion_Announce *onion1_a = new_onion_announce(onion1->dht);
|
|
|
|
Onion_Announce *onion2_a = new_onion_announce(onion2->dht);
|
|
|
|
networking_registerhandler(onion1->net, NET_PACKET_ANNOUNCE_RESPONSE, &handle_test_3, onion1);
|
|
|
|
ck_assert_msg((onion1_a != NULL) && (onion2_a != NULL), "Onion_Announce failed initializing.");
|
|
|
|
uint8_t zeroes[64] = {0};
|
2014-01-09 09:15:35 +08:00
|
|
|
randombytes(sb_data, sizeof(sb_data));
|
2014-05-13 07:43:44 +08:00
|
|
|
uint64_t s;
|
|
|
|
memcpy(&s, sb_data, sizeof(uint64_t));
|
2015-01-30 08:38:44 +08:00
|
|
|
memcpy(test_3_pub_key, nodes[3].public_key, crypto_box_PUBLICKEYBYTES);
|
2014-04-24 00:29:24 +08:00
|
|
|
ret = send_announce_request(onion1->net, &path, nodes[3], onion1->dht->self_public_key,
|
|
|
|
onion1->dht->self_secret_key,
|
2014-05-13 07:43:44 +08:00
|
|
|
zeroes, onion1->dht->self_public_key, onion1->dht->self_public_key, s);
|
2014-01-06 08:22:38 +08:00
|
|
|
ck_assert_msg(ret == 0, "Failed to create/send onion announce_request packet.");
|
|
|
|
handled_test_3 = 0;
|
|
|
|
|
|
|
|
while (handled_test_3 == 0) {
|
|
|
|
do_onion(onion1);
|
|
|
|
do_onion(onion2);
|
2014-04-16 07:16:35 +08:00
|
|
|
c_sleep(50);
|
2014-01-06 08:22:38 +08:00
|
|
|
}
|
|
|
|
|
2014-01-09 09:15:35 +08:00
|
|
|
randombytes(sb_data, sizeof(sb_data));
|
2014-05-13 07:43:44 +08:00
|
|
|
memcpy(&s, sb_data, sizeof(uint64_t));
|
2014-01-07 06:59:44 +08:00
|
|
|
memcpy(onion2_a->entries[1].public_key, onion2->dht->self_public_key, crypto_box_PUBLICKEYBYTES);
|
|
|
|
onion2_a->entries[1].time = unix_time();
|
|
|
|
networking_registerhandler(onion1->net, NET_PACKET_ONION_DATA_RESPONSE, &handle_test_4, onion1);
|
2014-04-24 00:29:24 +08:00
|
|
|
send_announce_request(onion1->net, &path, nodes[3], onion1->dht->self_public_key, onion1->dht->self_secret_key,
|
2014-05-13 07:43:44 +08:00
|
|
|
test_3_ping_id, onion1->dht->self_public_key, onion1->dht->self_public_key, s);
|
2014-01-06 08:22:38 +08:00
|
|
|
|
2014-04-24 00:29:24 +08:00
|
|
|
while (memcmp(onion2_a->entries[ONION_ANNOUNCE_MAX_ENTRIES - 2].public_key, onion1->dht->self_public_key,
|
2014-01-06 08:22:38 +08:00
|
|
|
crypto_box_PUBLICKEYBYTES) != 0) {
|
|
|
|
do_onion(onion1);
|
|
|
|
do_onion(onion2);
|
|
|
|
c_sleep(50);
|
|
|
|
}
|
2014-01-07 06:59:44 +08:00
|
|
|
|
|
|
|
c_sleep(1000);
|
2014-04-24 00:29:24 +08:00
|
|
|
Onion *onion3 = new_onion(new_DHT(new_networking(ip, 34569)));
|
2014-01-07 06:59:44 +08:00
|
|
|
ck_assert_msg((onion3 != NULL), "Onion failed initializing.");
|
2014-01-15 03:20:42 +08:00
|
|
|
|
|
|
|
new_nonce(nonce);
|
2014-04-24 00:29:24 +08:00
|
|
|
ret = send_data_request(onion3->net, &path, nodes[3].ip_port, onion1->dht->self_public_key,
|
|
|
|
onion1->dht->self_public_key,
|
2014-01-20 03:41:29 +08:00
|
|
|
nonce, (uint8_t *)"Install gentoo", sizeof("Install gentoo"));
|
2014-01-07 06:59:44 +08:00
|
|
|
ck_assert_msg(ret == 0, "Failed to create/send onion data_request packet.");
|
|
|
|
handled_test_4 = 0;
|
|
|
|
|
|
|
|
while (handled_test_4 == 0) {
|
|
|
|
do_onion(onion1);
|
|
|
|
do_onion(onion2);
|
|
|
|
c_sleep(50);
|
|
|
|
}
|
2015-02-08 11:57:04 +08:00
|
|
|
|
|
|
|
kill_onion_announce(onion1_a);
|
|
|
|
kill_onion_announce(onion2_a);
|
|
|
|
|
|
|
|
{
|
|
|
|
Onion *onion = onion1;
|
|
|
|
|
|
|
|
Networking_Core *net = onion->dht->net;
|
|
|
|
DHT *dht = onion->dht;
|
|
|
|
kill_onion(onion);
|
|
|
|
kill_DHT(dht);
|
|
|
|
kill_networking(net);
|
|
|
|
}
|
|
|
|
|
|
|
|
{
|
|
|
|
Onion *onion = onion2;
|
|
|
|
|
|
|
|
Networking_Core *net = onion->dht->net;
|
|
|
|
DHT *dht = onion->dht;
|
|
|
|
kill_onion(onion);
|
|
|
|
kill_DHT(dht);
|
|
|
|
kill_networking(net);
|
|
|
|
}
|
|
|
|
|
|
|
|
{
|
|
|
|
Onion *onion = onion3;
|
|
|
|
|
|
|
|
Networking_Core *net = onion->dht->net;
|
|
|
|
DHT *dht = onion->dht;
|
|
|
|
kill_onion(onion);
|
|
|
|
kill_DHT(dht);
|
|
|
|
kill_networking(net);
|
|
|
|
}
|
2014-01-01 12:18:37 +08:00
|
|
|
}
|
|
|
|
END_TEST
|
|
|
|
|
2014-01-06 08:22:38 +08:00
|
|
|
typedef struct {
|
|
|
|
Onion *onion;
|
|
|
|
Onion_Announce *onion_a;
|
2014-01-30 09:59:50 +08:00
|
|
|
Onion_Client *onion_c;
|
2014-01-06 08:22:38 +08:00
|
|
|
} Onions;
|
|
|
|
|
|
|
|
Onions *new_onions(uint16_t port)
|
|
|
|
{
|
|
|
|
IP ip;
|
|
|
|
ip_init(&ip, 1);
|
|
|
|
ip.ip6.uint8[15] = 1;
|
|
|
|
Onions *on = malloc(sizeof(Onions));
|
2014-04-24 00:29:24 +08:00
|
|
|
DHT *dht = new_DHT(new_networking(ip, port));
|
2014-01-06 08:22:38 +08:00
|
|
|
on->onion = new_onion(dht);
|
|
|
|
on->onion_a = new_onion_announce(dht);
|
2015-04-07 03:57:23 +08:00
|
|
|
TCP_Proxy_Info inf = {0};
|
|
|
|
on->onion_c = new_onion_client(new_net_crypto(dht, &inf));
|
2014-01-06 08:22:38 +08:00
|
|
|
|
2014-01-30 09:59:50 +08:00
|
|
|
if (on->onion && on->onion_a && on->onion_c)
|
2014-01-06 08:22:38 +08:00
|
|
|
return on;
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2014-01-30 09:59:50 +08:00
|
|
|
void do_onions(Onions *on)
|
|
|
|
{
|
|
|
|
networking_poll(on->onion->net);
|
|
|
|
do_DHT(on->onion->dht);
|
|
|
|
do_onion_client(on->onion_c);
|
|
|
|
}
|
|
|
|
|
2015-02-08 11:57:04 +08:00
|
|
|
void kill_onions(Onions *on)
|
|
|
|
{
|
|
|
|
Networking_Core *net = on->onion->dht->net;
|
|
|
|
DHT *dht = on->onion->dht;
|
2015-04-07 03:57:23 +08:00
|
|
|
Net_Crypto *c = on->onion_c->c;
|
2015-02-08 11:57:04 +08:00
|
|
|
kill_onion_client(on->onion_c);
|
|
|
|
kill_onion_announce(on->onion_a);
|
|
|
|
kill_onion(on->onion);
|
2015-04-07 03:57:23 +08:00
|
|
|
kill_net_crypto(c);
|
2015-02-08 11:57:04 +08:00
|
|
|
kill_DHT(dht);
|
|
|
|
kill_networking(net);
|
|
|
|
free(on);
|
|
|
|
}
|
|
|
|
|
2014-01-31 03:59:31 +08:00
|
|
|
#define NUM_ONIONS 50
|
2015-04-07 03:57:23 +08:00
|
|
|
#define NUM_FIRST 7
|
|
|
|
#define NUM_LAST 37
|
|
|
|
|
|
|
|
_Bool first_ip, last_ip;
|
|
|
|
void dht_ip_callback(void *object, int32_t number, IP_Port ip_port)
|
|
|
|
{
|
|
|
|
if (NUM_FIRST == number) {
|
|
|
|
first_ip = 1;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (NUM_LAST == number) {
|
|
|
|
last_ip = 1;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
ck_abort_msg("Error.");
|
|
|
|
}
|
|
|
|
|
|
|
|
_Bool first, last;
|
|
|
|
uint8_t first_dht_pk[crypto_box_PUBLICKEYBYTES];
|
|
|
|
uint8_t last_dht_pk[crypto_box_PUBLICKEYBYTES];
|
|
|
|
|
|
|
|
static void dht_pk_callback(void *object, int32_t number, const uint8_t *dht_public_key)
|
|
|
|
{
|
2015-12-16 03:58:36 +08:00
|
|
|
if ((NUM_FIRST == number && !first) || (NUM_LAST == number && !last)) {
|
|
|
|
Onions *on = object;
|
|
|
|
uint16_t count = 0;
|
|
|
|
int ret = DHT_addfriend(on->onion->dht, dht_public_key, &dht_ip_callback, object, number, &count);
|
|
|
|
ck_assert_msg(ret == 0, "DHT_addfriend() did not return 0");
|
|
|
|
ck_assert_msg(count == 1, "Count not 1, count is %u", count);
|
2015-04-07 03:57:23 +08:00
|
|
|
|
2015-12-16 03:58:36 +08:00
|
|
|
if (NUM_FIRST == number && !first) {
|
|
|
|
first = 1;
|
2015-04-07 03:57:23 +08:00
|
|
|
|
2015-12-16 03:58:36 +08:00
|
|
|
if (memcmp(dht_public_key, last_dht_pk, crypto_box_PUBLICKEYBYTES) != 0) {
|
|
|
|
ck_abort_msg("Error wrong dht key.");
|
|
|
|
}
|
|
|
|
|
|
|
|
return;
|
2015-04-07 03:57:23 +08:00
|
|
|
}
|
|
|
|
|
2015-12-16 03:58:36 +08:00
|
|
|
if (NUM_LAST == number && !last) {
|
|
|
|
last = 1;
|
2015-04-07 03:57:23 +08:00
|
|
|
|
2015-12-16 03:58:36 +08:00
|
|
|
if (memcmp(dht_public_key, first_dht_pk, crypto_box_PUBLICKEYBYTES) != 0) {
|
|
|
|
ck_abort_msg("Error wrong dht key.");
|
|
|
|
}
|
2015-04-07 03:57:23 +08:00
|
|
|
|
2015-12-16 03:58:36 +08:00
|
|
|
return;
|
2015-04-07 03:57:23 +08:00
|
|
|
}
|
|
|
|
|
2015-12-16 03:58:36 +08:00
|
|
|
ck_abort_msg("Error.");
|
2015-04-07 03:57:23 +08:00
|
|
|
}
|
|
|
|
}
|
2014-01-06 08:22:38 +08:00
|
|
|
|
2014-01-05 08:40:43 +08:00
|
|
|
START_TEST(test_announce)
|
|
|
|
{
|
2014-02-28 05:59:17 +08:00
|
|
|
uint32_t i, j;
|
2014-01-06 08:22:38 +08:00
|
|
|
Onions *onions[NUM_ONIONS];
|
|
|
|
|
|
|
|
for (i = 0; i < NUM_ONIONS; ++i) {
|
|
|
|
onions[i] = new_onions(i + 34655);
|
|
|
|
ck_assert_msg(onions[i] != 0, "Failed to create onions. %u");
|
|
|
|
}
|
|
|
|
|
2014-01-30 09:59:50 +08:00
|
|
|
IP ip;
|
|
|
|
ip_init(&ip, 1);
|
|
|
|
ip.ip6.uint8[15] = 1;
|
|
|
|
|
2014-02-06 08:51:22 +08:00
|
|
|
for (i = 3; i < NUM_ONIONS; ++i) {
|
2014-01-30 09:59:50 +08:00
|
|
|
IP_Port ip_port = {ip, onions[i - 1]->onion->net->port};
|
|
|
|
DHT_bootstrap(onions[i]->onion->dht, ip_port, onions[i - 1]->onion->dht->self_public_key);
|
2014-02-06 08:51:22 +08:00
|
|
|
IP_Port ip_port1 = {ip, onions[i - 2]->onion->net->port};
|
|
|
|
DHT_bootstrap(onions[i]->onion->dht, ip_port1, onions[i - 2]->onion->dht->self_public_key);
|
|
|
|
IP_Port ip_port2 = {ip, onions[i - 3]->onion->net->port};
|
|
|
|
DHT_bootstrap(onions[i]->onion->dht, ip_port2, onions[i - 3]->onion->dht->self_public_key);
|
2014-01-30 09:59:50 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
uint32_t connected = 0;
|
|
|
|
|
|
|
|
while (connected != NUM_ONIONS) {
|
|
|
|
connected = 0;
|
|
|
|
|
|
|
|
for (i = 0; i < NUM_ONIONS; ++i) {
|
|
|
|
do_onions(onions[i]);
|
|
|
|
connected += DHT_isconnected(onions[i]->onion->dht);
|
|
|
|
}
|
2014-02-06 08:51:22 +08:00
|
|
|
|
|
|
|
c_sleep(50);
|
2014-01-30 09:59:50 +08:00
|
|
|
}
|
|
|
|
|
2015-04-07 03:57:23 +08:00
|
|
|
printf("connected\n");
|
|
|
|
|
2014-02-28 05:59:17 +08:00
|
|
|
for (i = 0; i < 25 * 2; ++i) {
|
|
|
|
for (j = 0; j < NUM_ONIONS; ++j) {
|
|
|
|
do_onions(onions[j]);
|
|
|
|
}
|
|
|
|
|
|
|
|
c_sleep(50);
|
|
|
|
}
|
|
|
|
|
2015-04-07 03:57:23 +08:00
|
|
|
memcpy(first_dht_pk, onions[NUM_FIRST]->onion->dht->self_public_key, crypto_box_PUBLICKEYBYTES);
|
|
|
|
memcpy(last_dht_pk, onions[NUM_LAST]->onion->dht->self_public_key, crypto_box_PUBLICKEYBYTES);
|
|
|
|
|
|
|
|
printf("adding friend\n");
|
|
|
|
int frnum_f = onion_addfriend(onions[NUM_FIRST]->onion_c, onions[NUM_LAST]->onion_c->c->self_public_key);
|
|
|
|
int frnum = onion_addfriend(onions[NUM_LAST]->onion_c, onions[NUM_FIRST]->onion_c->c->self_public_key);
|
|
|
|
|
|
|
|
onion_dht_pk_callback(onions[NUM_FIRST]->onion_c, frnum_f, &dht_pk_callback, onions[NUM_FIRST], NUM_FIRST);
|
|
|
|
onion_dht_pk_callback(onions[NUM_LAST]->onion_c, frnum, &dht_pk_callback, onions[NUM_LAST], NUM_LAST);
|
2014-02-06 08:51:22 +08:00
|
|
|
|
|
|
|
int ok = -1;
|
|
|
|
|
|
|
|
IP_Port ip_port;
|
|
|
|
|
2015-04-07 03:57:23 +08:00
|
|
|
while (!first || !last) {
|
2014-02-06 08:51:22 +08:00
|
|
|
for (i = 0; i < NUM_ONIONS; ++i) {
|
2015-04-07 03:57:23 +08:00
|
|
|
do_onions(onions[i]);
|
2014-02-06 08:51:22 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
c_sleep(50);
|
|
|
|
}
|
2014-01-30 09:59:50 +08:00
|
|
|
|
2015-04-07 03:57:23 +08:00
|
|
|
printf("Waiting for ips\n");
|
2014-01-30 09:59:50 +08:00
|
|
|
|
2015-04-07 03:57:23 +08:00
|
|
|
while (!first_ip || !last_ip) {
|
2014-01-31 03:59:31 +08:00
|
|
|
for (i = 0; i < NUM_ONIONS; ++i) {
|
|
|
|
do_onions(onions[i]);
|
|
|
|
}
|
2014-01-30 09:59:50 +08:00
|
|
|
|
2014-01-31 03:59:31 +08:00
|
|
|
c_sleep(50);
|
|
|
|
}
|
2014-02-06 08:51:22 +08:00
|
|
|
|
2015-04-07 03:57:23 +08:00
|
|
|
onion_getfriendip(onions[NUM_LAST]->onion_c, frnum, &ip_port);
|
|
|
|
ck_assert_msg(ip_port.port == onions[NUM_FIRST]->onion->net->port, "Port in returned ip not correct.");
|
2015-02-08 11:57:04 +08:00
|
|
|
|
|
|
|
for (i = 0; i < NUM_ONIONS; ++i) {
|
|
|
|
kill_onions(onions[i]);
|
|
|
|
}
|
2014-01-05 08:40:43 +08:00
|
|
|
}
|
|
|
|
END_TEST
|
2014-01-01 12:18:37 +08:00
|
|
|
|
|
|
|
Suite *onion_suite(void)
|
|
|
|
{
|
|
|
|
Suite *s = suite_create("Onion");
|
|
|
|
|
|
|
|
DEFTESTCASE_SLOW(basic, 5);
|
2015-04-07 03:57:23 +08:00
|
|
|
DEFTESTCASE_SLOW(announce, 70);
|
2014-01-01 12:18:37 +08:00
|
|
|
return s;
|
|
|
|
}
|
|
|
|
|
|
|
|
int main(int argc, char *argv[])
|
|
|
|
{
|
|
|
|
srand((unsigned int) time(NULL));
|
|
|
|
|
|
|
|
Suite *onion = onion_suite();
|
|
|
|
SRunner *test_runner = srunner_create(onion);
|
|
|
|
|
|
|
|
int number_failed = 0;
|
|
|
|
srunner_run_all(test_runner, CK_NORMAL);
|
|
|
|
number_failed = srunner_ntests_failed(test_runner);
|
|
|
|
|
|
|
|
srunner_free(test_runner);
|
|
|
|
|
|
|
|
return number_failed;
|
|
|
|
}
|