toxcore/auto_tests/network_test.c

174 lines
5.7 KiB
C
Raw Normal View History

2013-09-18 04:28:39 +08:00
#include <stdlib.h>
2016-09-01 07:33:20 +08:00
#include <string.h>
2013-09-18 04:28:39 +08:00
#include "../testing/misc_tools.h"
2013-09-18 04:28:39 +08:00
#include "../toxcore/network.h"
#include "check_compat.h"
#ifndef USE_IPV6
#define USE_IPV6 1
#endif
static void test_addr_resolv_localhost(void)
2013-09-18 04:28:39 +08:00
{
#ifdef __CYGWIN__
/* force initialization of network stack
* normally this should happen automatically
* cygwin doesn't do it for every network related function though
* e.g. not for getaddrinfo... */
net_socket(0, 0, 0);
2013-09-18 04:28:39 +08:00
errno = 0;
#endif
const Network *ns = os_network();
ck_assert(ns != nullptr);
2013-09-18 04:28:39 +08:00
const char localhost[] = "localhost";
IP ip;
ip_init(&ip, 0); // ipv6enabled = 0
2013-09-18 04:28:39 +08:00
bool res = addr_resolve_or_parse_ip(ns, localhost, &ip, nullptr);
2013-09-18 04:28:39 +08:00
int error = net_error();
char *strerror = net_new_strerror(error);
ck_assert_msg(res, "Resolver failed: %d, %s", error, strerror);
net_kill_strerror(strerror);
2013-09-18 04:28:39 +08:00
Ip_Ntoa ip_str;
ck_assert_msg(net_family_is_ipv4(ip.family), "Expected family TOX_AF_INET, got %u.", ip.family.value);
2017-11-15 01:14:06 +08:00
const uint32_t loopback = get_ip4_loopback().uint32;
ck_assert_msg(ip.ip.v4.uint32 == loopback, "Expected 127.0.0.1, got %s.",
net_ip_ntoa(&ip, &ip_str));
2013-09-18 04:28:39 +08:00
ip_init(&ip, 1); // ipv6enabled = 1
res = addr_resolve_or_parse_ip(ns, localhost, &ip, nullptr);
2013-09-18 04:28:39 +08:00
#if USE_IPV6
int localhost_split = 0;
if (!net_family_is_ipv6(ip.family)) {
res = addr_resolve_or_parse_ip(ns, "ip6-localhost", &ip, nullptr);
localhost_split = 1;
2013-09-18 04:28:39 +08:00
}
error = net_error();
strerror = net_new_strerror(error);
ck_assert_msg(res, "Resolver failed: %d, %s", error, strerror);
net_kill_strerror(strerror);
2013-09-18 04:28:39 +08:00
ck_assert_msg(net_family_is_ipv6(ip.family), "Expected family TOX_AF_INET6 (%d), got %u.", TOX_AF_INET6,
ip.family.value);
2017-11-15 01:14:06 +08:00
IP6 ip6_loopback = get_ip6_loopback();
ck_assert_msg(!memcmp(&ip.ip.v6, &ip6_loopback, sizeof(IP6)), "Expected ::1, got %s.",
net_ip_ntoa(&ip, &ip_str));
2013-09-18 04:28:39 +08:00
if (localhost_split) {
printf("Localhost seems to be split in two.\n");
return;
2013-09-18 04:28:39 +08:00
}
#endif
ip_init(&ip, 1); // ipv6enabled = 1
ip.family = net_family_unspec();
IP extra;
ip_reset(&extra);
res = addr_resolve_or_parse_ip(ns, localhost, &ip, &extra);
error = net_error();
strerror = net_new_strerror(error);
ck_assert_msg(res, "Resolver failed: %d, %s", error, strerror);
net_kill_strerror(strerror);
#if USE_IPV6
ck_assert_msg(net_family_is_ipv6(ip.family), "Expected family TOX_AF_INET6 (%d), got %u.", TOX_AF_INET6,
ip.family.value);
ck_assert_msg(!memcmp(&ip.ip.v6, &ip6_loopback, sizeof(IP6)), "Expected ::1, got %s.",
net_ip_ntoa(&ip, &ip_str));
ck_assert_msg(net_family_is_ipv4(extra.family), "Expected family TOX_AF_INET (%d), got %u.", TOX_AF_INET,
extra.family.value);
ck_assert_msg(extra.ip.v4.uint32 == loopback, "Expected 127.0.0.1, got %s.",
net_ip_ntoa(&ip, &ip_str));
#elif 0
// TODO(iphydf): Fix this to work on IPv6-supporting systems.
ck_assert_msg(net_family_is_ipv4(ip.family), "Expected family TOX_AF_INET (%d), got %u.", TOX_AF_INET, ip.family.value);
ck_assert_msg(ip.ip.v4.uint32 == loopback, "Expected 127.0.0.1, got %s.",
net_ip_ntoa(&ip, &ip_str));
#endif
2013-09-18 04:28:39 +08:00
}
static void test_ip_equal(void)
2013-09-18 04:28:39 +08:00
{
int res;
IP ip1, ip2;
ip_reset(&ip1);
ip_reset(&ip2);
res = ip_equal(nullptr, nullptr);
2018-08-05 03:18:31 +08:00
ck_assert_msg(res == 0, "ip_equal(NULL, NULL): expected result 0, got %d.", res);
2013-09-18 04:28:39 +08:00
res = ip_equal(&ip1, nullptr);
2018-08-05 03:18:31 +08:00
ck_assert_msg(res == 0, "ip_equal(PTR, NULL): expected result 0, got %d.", res);
2013-09-18 04:28:39 +08:00
res = ip_equal(nullptr, &ip1);
2018-08-05 03:18:31 +08:00
ck_assert_msg(res == 0, "ip_equal(NULL, PTR): expected result 0, got %d.", res);
2013-09-18 04:28:39 +08:00
ip1.family = net_family_ipv4();
ip1.ip.v4.uint32 = net_htonl(0x7F000001);
2013-09-18 04:28:39 +08:00
res = ip_equal(&ip1, &ip2);
2017-03-19 03:34:51 +08:00
ck_assert_msg(res == 0, "ip_equal( {TOX_AF_INET, 127.0.0.1}, {TOX_AF_UNSPEC, 0} ): "
2018-08-05 03:18:31 +08:00
"expected result 0, got %d.", res);
2013-09-18 04:28:39 +08:00
ip2.family = net_family_ipv4();
ip2.ip.v4.uint32 = net_htonl(0x7F000001);
2013-09-18 04:28:39 +08:00
res = ip_equal(&ip1, &ip2);
2017-03-03 04:15:51 +08:00
ck_assert_msg(res != 0, "ip_equal( {TOX_AF_INET, 127.0.0.1}, {TOX_AF_INET, 127.0.0.1} ): "
"expected result != 0, got 0.");
2013-09-18 04:28:39 +08:00
ip2.ip.v4.uint32 = net_htonl(0x7F000002);
2013-09-18 04:28:39 +08:00
res = ip_equal(&ip1, &ip2);
2017-03-03 04:15:51 +08:00
ck_assert_msg(res == 0, "ip_equal( {TOX_AF_INET, 127.0.0.1}, {TOX_AF_INET, 127.0.0.2} ): "
2018-08-05 03:18:31 +08:00
"expected result 0, got %d.", res);
2013-09-18 04:28:39 +08:00
ip2.family = net_family_ipv6();
ip2.ip.v6.uint32[0] = 0;
ip2.ip.v6.uint32[1] = 0;
ip2.ip.v6.uint32[2] = net_htonl(0xFFFF);
ip2.ip.v6.uint32[3] = net_htonl(0x7F000001);
2013-09-18 04:28:39 +08:00
ck_assert_msg(ipv6_ipv4_in_v6(&ip2.ip.v6) != 0,
"ipv6_ipv4_in_v6(::ffff:127.0.0.1): expected != 0, got 0.");
2013-09-18 04:28:39 +08:00
res = ip_equal(&ip1, &ip2);
2017-03-03 04:15:51 +08:00
ck_assert_msg(res != 0, "ip_equal( {TOX_AF_INET, 127.0.0.1}, {TOX_AF_INET6, ::ffff:127.0.0.1} ): "
"expected result != 0, got 0.");
2013-09-18 04:28:39 +08:00
2017-11-15 01:14:06 +08:00
IP6 ip6_loopback = get_ip6_loopback();
memcpy(&ip2.ip.v6, &ip6_loopback, sizeof(IP6));
2013-09-18 04:28:39 +08:00
res = ip_equal(&ip1, &ip2);
2018-08-05 03:18:31 +08:00
ck_assert_msg(res == 0, "ip_equal( {TOX_AF_INET, 127.0.0.1}, {TOX_AF_INET6, ::1} ): expected result 0, got %d.", res);
2013-09-18 04:28:39 +08:00
memcpy(&ip1, &ip2, sizeof(IP));
res = ip_equal(&ip1, &ip2);
2017-03-03 04:15:51 +08:00
ck_assert_msg(res != 0, "ip_equal( {TOX_AF_INET6, ::1}, {TOX_AF_INET6, ::1} ): expected result != 0, got 0.");
2013-09-18 04:28:39 +08:00
ip2.ip.v6.uint8[15]++;
2013-09-18 04:28:39 +08:00
res = ip_equal(&ip1, &ip2);
2018-08-05 03:18:31 +08:00
ck_assert_msg(res == 0, "ip_equal( {TOX_AF_INET6, ::1}, {TOX_AF_INET6, ::2} ): expected result 0, got %d.", res);
2013-09-18 04:28:39 +08:00
}
int main(void)
2013-09-18 04:28:39 +08:00
{
2018-02-19 01:50:50 +08:00
setvbuf(stdout, nullptr, _IONBF, 0);
2013-09-18 04:28:39 +08:00
test_addr_resolv_localhost();
test_ip_equal();
2013-09-18 04:28:39 +08:00
return 0;
2013-09-18 04:28:39 +08:00
}