mirror of
https://github.com/irungentoo/toxcore.git
synced 2024-03-22 13:30:51 +08:00
ad26560516
- Any non-externally-visible declarations should be `static`. - Casting away the `const` qualifier from pointers-to-const is dangerous. All but one instance of this are now correct. The one instance where we can't keep `const` is one where toxav code actually writes to a chunk of memory marked as `const`. This code also assumes 4 byte alignment of data packets. I don't know whether that is a valid assumption, but it's likely unportable, and *not* obviously correct. - Replaced empty parameter lists with `(void)` to avoid passing parameters to it. Empty parameter lists are old style declarations for unknown number and type of arguments. - Commented out (as `#if DHT_HARDENING` block) the hardening code that was never executed. - Minor style fix: don't use `default` in enum-switches unless the number of enumerators in the default case is very large. In this case, it was 2, so we want to list them both explicitly to be warned about missing one if we add one in the future. - Removed the only two function declarations from nTox.h and put them into nTox.c. They are not used outside and nTox is not a library.
1406 lines
45 KiB
C
1406 lines
45 KiB
C
/* Auto Tests
|
|
*
|
|
* Tox Tests
|
|
*
|
|
* The following tests were written with a small Tox network in mind. Therefore,
|
|
* each test timeout was set to one for a small Tox Network. If connected to the
|
|
* 'Global' Tox Network, traversing the DHT would take MUCH longer than the
|
|
* timeouts allow. Because of this running these tests require NO other Tox
|
|
* clients running or accessible on/to localhost.
|
|
*
|
|
*/
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
#include "config.h"
|
|
#endif
|
|
|
|
#include <check.h>
|
|
#include <stdint.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <sys/param.h>
|
|
#include <sys/types.h>
|
|
#include <time.h>
|
|
|
|
#include "../toxcore/tox.h"
|
|
|
|
#include "helpers.h"
|
|
|
|
#if defined(_WIN32) || defined(__WIN32__) || defined (WIN32)
|
|
#define c_sleep(x) Sleep(1*x)
|
|
#else
|
|
#include <unistd.h>
|
|
#define c_sleep(x) usleep(1000*x)
|
|
#endif
|
|
|
|
/* The Travis-CI container responds poorly to ::1 as a localhost address
|
|
* You're encouraged to -D FORCE_TESTS_IPV6 on a local test */
|
|
#ifdef FORCE_TESTS_IPV6
|
|
#define TOX_LOCALHOST "::1"
|
|
#else
|
|
#define TOX_LOCALHOST "127.0.0.1"
|
|
#endif
|
|
|
|
static void accept_friend_request(Tox *m, const uint8_t *public_key, const uint8_t *data, size_t length, void *userdata)
|
|
{
|
|
if (*((uint32_t *)userdata) != 974536) {
|
|
return;
|
|
}
|
|
|
|
if (length == 7 && memcmp("Gentoo", data, 7) == 0) {
|
|
tox_friend_add_norequest(m, public_key, 0);
|
|
}
|
|
}
|
|
static uint32_t messages_received;
|
|
|
|
static void print_message(Tox *m, uint32_t friendnumber, TOX_MESSAGE_TYPE type, const uint8_t *string, size_t length,
|
|
void *userdata)
|
|
{
|
|
if (*((uint32_t *)userdata) != 974536) {
|
|
return;
|
|
}
|
|
|
|
if (type != TOX_MESSAGE_TYPE_NORMAL) {
|
|
ck_abort_msg("Bad type");
|
|
}
|
|
|
|
uint8_t cmp_msg[TOX_MAX_MESSAGE_LENGTH];
|
|
memset(cmp_msg, 'G', sizeof(cmp_msg));
|
|
|
|
if (length == TOX_MAX_MESSAGE_LENGTH && memcmp(string, cmp_msg, sizeof(cmp_msg)) == 0) {
|
|
++messages_received;
|
|
}
|
|
}
|
|
|
|
static uint32_t name_changes;
|
|
|
|
static void print_nickchange(Tox *m, uint32_t friendnumber, const uint8_t *string, size_t length, void *userdata)
|
|
{
|
|
if (*((uint32_t *)userdata) != 974536) {
|
|
return;
|
|
}
|
|
|
|
if (length == sizeof("Gentoo") && memcmp(string, "Gentoo", sizeof("Gentoo")) == 0) {
|
|
++name_changes;
|
|
}
|
|
}
|
|
|
|
static uint32_t status_m_changes;
|
|
static void print_status_m_change(Tox *tox, uint32_t friend_number, const uint8_t *message, size_t length,
|
|
void *user_data)
|
|
{
|
|
if (*((uint32_t *)user_data) != 974536) {
|
|
return;
|
|
}
|
|
|
|
if (length == sizeof("Installing Gentoo") && memcmp(message, "Installing Gentoo", sizeof("Installing Gentoo")) == 0) {
|
|
++status_m_changes;
|
|
}
|
|
}
|
|
|
|
static uint32_t typing_changes;
|
|
|
|
static void print_typingchange(Tox *m, uint32_t friendnumber, bool typing, void *userdata)
|
|
{
|
|
if (*((uint32_t *)userdata) != 974536) {
|
|
return;
|
|
}
|
|
|
|
if (!typing) {
|
|
typing_changes = 1;
|
|
} else {
|
|
typing_changes = 2;
|
|
}
|
|
}
|
|
|
|
static uint32_t custom_packet;
|
|
|
|
static void handle_custom_packet(Tox *m, uint32_t friend_num, const uint8_t *data, size_t len, void *object)
|
|
{
|
|
uint8_t number = *((uint32_t *)object);
|
|
|
|
if (len != TOX_MAX_CUSTOM_PACKET_SIZE) {
|
|
return;
|
|
}
|
|
|
|
uint8_t f_data[len];
|
|
memset(f_data, number, len);
|
|
|
|
if (memcmp(f_data, data, len) == 0) {
|
|
++custom_packet;
|
|
} else {
|
|
ck_abort_msg("Custom packet fail. %u", number);
|
|
}
|
|
|
|
return;
|
|
}
|
|
|
|
static uint64_t size_recv;
|
|
static uint64_t sending_pos;
|
|
|
|
static uint8_t file_cmp_id[TOX_FILE_ID_LENGTH];
|
|
static uint32_t file_accepted;
|
|
static uint64_t file_size;
|
|
static void tox_file_receive(Tox *tox, uint32_t friend_number, uint32_t file_number, uint32_t kind, uint64_t filesize,
|
|
const uint8_t *filename, size_t filename_length, void *userdata)
|
|
{
|
|
if (*((uint32_t *)userdata) != 974536) {
|
|
return;
|
|
}
|
|
|
|
if (kind != TOX_FILE_KIND_DATA) {
|
|
ck_abort_msg("Bad kind");
|
|
return;
|
|
}
|
|
|
|
if (!(filename_length == sizeof("Gentoo.exe") && memcmp(filename, "Gentoo.exe", sizeof("Gentoo.exe")) == 0)) {
|
|
ck_abort_msg("Bad filename");
|
|
return;
|
|
}
|
|
|
|
uint8_t file_id[TOX_FILE_ID_LENGTH];
|
|
|
|
if (!tox_file_get_file_id(tox, friend_number, file_number, file_id, 0)) {
|
|
ck_abort_msg("tox_file_get_file_id error");
|
|
}
|
|
|
|
if (memcmp(file_id, file_cmp_id, TOX_FILE_ID_LENGTH) != 0) {
|
|
ck_abort_msg("bad file_id");
|
|
}
|
|
|
|
uint8_t empty[TOX_FILE_ID_LENGTH] = {0};
|
|
|
|
if (memcmp(empty, file_cmp_id, TOX_FILE_ID_LENGTH) == 0) {
|
|
ck_abort_msg("empty file_id");
|
|
}
|
|
|
|
file_size = filesize;
|
|
|
|
if (filesize) {
|
|
sending_pos = size_recv = 1337;
|
|
|
|
TOX_ERR_FILE_SEEK err_s;
|
|
|
|
if (!tox_file_seek(tox, friend_number, file_number, 1337, &err_s)) {
|
|
ck_abort_msg("tox_file_seek error");
|
|
}
|
|
|
|
ck_assert_msg(err_s == TOX_ERR_FILE_SEEK_OK, "tox_file_seek wrong error");
|
|
} else {
|
|
sending_pos = size_recv = 0;
|
|
}
|
|
|
|
TOX_ERR_FILE_CONTROL error;
|
|
|
|
if (tox_file_control(tox, friend_number, file_number, TOX_FILE_CONTROL_RESUME, &error)) {
|
|
++file_accepted;
|
|
} else {
|
|
ck_abort_msg("tox_file_control failed. %i", error);
|
|
}
|
|
|
|
TOX_ERR_FILE_SEEK err_s;
|
|
|
|
if (tox_file_seek(tox, friend_number, file_number, 1234, &err_s)) {
|
|
ck_abort_msg("tox_file_seek no error");
|
|
}
|
|
|
|
ck_assert_msg(err_s == TOX_ERR_FILE_SEEK_DENIED, "tox_file_seek wrong error");
|
|
}
|
|
|
|
static uint32_t sendf_ok;
|
|
static void file_print_control(Tox *tox, uint32_t friend_number, uint32_t file_number, TOX_FILE_CONTROL control,
|
|
void *userdata)
|
|
{
|
|
if (*((uint32_t *)userdata) != 974536) {
|
|
return;
|
|
}
|
|
|
|
/* First send file num is 0.*/
|
|
if (file_number == 0 && control == TOX_FILE_CONTROL_RESUME) {
|
|
sendf_ok = 1;
|
|
}
|
|
}
|
|
|
|
static uint64_t max_sending;
|
|
static _Bool m_send_reached;
|
|
static uint8_t sending_num;
|
|
static _Bool file_sending_done;
|
|
static void tox_file_chunk_request(Tox *tox, uint32_t friend_number, uint32_t file_number, uint64_t position,
|
|
size_t length,
|
|
void *user_data)
|
|
{
|
|
if (*((uint32_t *)user_data) != 974536) {
|
|
return;
|
|
}
|
|
|
|
if (!sendf_ok) {
|
|
ck_abort_msg("Didn't get resume control");
|
|
}
|
|
|
|
if (sending_pos != position) {
|
|
ck_abort_msg("Bad position %llu", position);
|
|
return;
|
|
}
|
|
|
|
if (length == 0) {
|
|
if (file_sending_done) {
|
|
ck_abort_msg("File sending already done.");
|
|
}
|
|
|
|
file_sending_done = 1;
|
|
return;
|
|
}
|
|
|
|
if (position + length > max_sending) {
|
|
if (m_send_reached) {
|
|
ck_abort_msg("Requested done file tranfer.");
|
|
}
|
|
|
|
length = max_sending - position;
|
|
m_send_reached = 1;
|
|
}
|
|
|
|
TOX_ERR_FILE_SEND_CHUNK error;
|
|
uint8_t f_data[length];
|
|
memset(f_data, sending_num, length);
|
|
|
|
if (tox_file_send_chunk(tox, friend_number, file_number, position, f_data, length, &error)) {
|
|
++sending_num;
|
|
sending_pos += length;
|
|
} else {
|
|
ck_abort_msg("Could not send chunk %i", error);
|
|
}
|
|
|
|
if (error != TOX_ERR_FILE_SEND_CHUNK_OK) {
|
|
ck_abort_msg("Wrong error code");
|
|
}
|
|
}
|
|
|
|
|
|
static uint8_t num;
|
|
static _Bool file_recv;
|
|
static void write_file(Tox *tox, uint32_t friendnumber, uint32_t filenumber, uint64_t position, const uint8_t *data,
|
|
size_t length, void *user_data)
|
|
{
|
|
if (*((uint32_t *)user_data) != 974536) {
|
|
return;
|
|
}
|
|
|
|
if (size_recv != position) {
|
|
ck_abort_msg("Bad position");
|
|
return;
|
|
}
|
|
|
|
if (length == 0) {
|
|
file_recv = 1;
|
|
return;
|
|
}
|
|
|
|
uint8_t f_data[length];
|
|
memset(f_data, num, length);
|
|
++num;
|
|
|
|
if (memcmp(f_data, data, length) == 0) {
|
|
size_recv += length;
|
|
} else {
|
|
ck_abort_msg("FILE_CORRUPTED");
|
|
}
|
|
}
|
|
|
|
static unsigned int connected_t1;
|
|
static void tox_connection_status(Tox *tox, TOX_CONNECTION connection_status, void *user_data)
|
|
{
|
|
if (*((uint32_t *)user_data) != 974536) {
|
|
return;
|
|
}
|
|
|
|
if (connected_t1 && !connection_status) {
|
|
ck_abort_msg("Tox went offline");
|
|
}
|
|
|
|
ck_assert_msg(connection_status == TOX_CONNECTION_UDP, "wrong status %u", connection_status);
|
|
|
|
connected_t1 = connection_status;
|
|
}
|
|
|
|
START_TEST(test_one)
|
|
{
|
|
{
|
|
TOX_ERR_OPTIONS_NEW o_err;
|
|
struct Tox_Options *o1 = tox_options_new(&o_err);
|
|
struct Tox_Options o2;
|
|
tox_options_default(&o2);
|
|
ck_assert_msg(o_err == TOX_ERR_OPTIONS_NEW_OK, "tox_options_new wrong error");
|
|
ck_assert_msg(memcmp(o1, &o2, sizeof(struct Tox_Options)) == 0, "tox_options_new error");
|
|
tox_options_free(o1);
|
|
}
|
|
|
|
Tox *tox1 = tox_new(0, 0);
|
|
Tox *tox2 = tox_new(0, 0);
|
|
|
|
{
|
|
TOX_ERR_GET_PORT error;
|
|
ck_assert_msg(tox_self_get_udp_port(tox1, &error) == 33445, "First Tox instance did not bind to udp port 33445.\n");
|
|
ck_assert_msg(error == TOX_ERR_GET_PORT_OK, "wrong error");
|
|
}
|
|
|
|
uint8_t address[TOX_ADDRESS_SIZE];
|
|
tox_self_get_address(tox1, address);
|
|
TOX_ERR_FRIEND_ADD error;
|
|
uint32_t ret = tox_friend_add(tox1, address, (const uint8_t *)"m", 1, &error);
|
|
ck_assert_msg(ret == UINT32_MAX && error == TOX_ERR_FRIEND_ADD_OWN_KEY, "Adding own address worked.");
|
|
|
|
tox_self_get_address(tox2, address);
|
|
uint8_t message[TOX_MAX_FRIEND_REQUEST_LENGTH + 1];
|
|
ret = tox_friend_add(tox1, address, NULL, 0, &error);
|
|
ck_assert_msg(ret == UINT32_MAX && error == TOX_ERR_FRIEND_ADD_NULL, "Sending request with no message worked.");
|
|
ret = tox_friend_add(tox1, address, message, 0, &error);
|
|
ck_assert_msg(ret == UINT32_MAX && error == TOX_ERR_FRIEND_ADD_NO_MESSAGE, "Sending request with no message worked.");
|
|
ret = tox_friend_add(tox1, address, message, sizeof(message), &error);
|
|
ck_assert_msg(ret == UINT32_MAX && error == TOX_ERR_FRIEND_ADD_TOO_LONG,
|
|
"TOX_MAX_FRIEND_REQUEST_LENGTH is too big.");
|
|
|
|
address[0]++;
|
|
ret = tox_friend_add(tox1, address, (const uint8_t *)"m", 1, &error);
|
|
ck_assert_msg(ret == UINT32_MAX && error == TOX_ERR_FRIEND_ADD_BAD_CHECKSUM,
|
|
"Adding address with bad checksum worked.");
|
|
|
|
tox_self_get_address(tox2, address);
|
|
ret = tox_friend_add(tox1, address, message, TOX_MAX_FRIEND_REQUEST_LENGTH, &error);
|
|
ck_assert_msg(ret == 0 && error == TOX_ERR_FRIEND_ADD_OK, "Failed to add friend.");
|
|
ret = tox_friend_add(tox1, address, message, TOX_MAX_FRIEND_REQUEST_LENGTH, &error);
|
|
ck_assert_msg(ret == UINT32_MAX && error == TOX_ERR_FRIEND_ADD_ALREADY_SENT, "Adding friend twice worked.");
|
|
|
|
uint8_t name[TOX_MAX_NAME_LENGTH];
|
|
int i;
|
|
|
|
for (i = 0; i < TOX_MAX_NAME_LENGTH; ++i) {
|
|
name[i] = rand();
|
|
}
|
|
|
|
tox_self_set_name(tox1, name, sizeof(name), 0);
|
|
ck_assert_msg(tox_self_get_name_size(tox1) == sizeof(name), "Can't set name of TOX_MAX_NAME_LENGTH");
|
|
|
|
tox_self_get_address(tox1, address);
|
|
size_t save_size = tox_get_savedata_size(tox1);
|
|
uint8_t data[save_size];
|
|
tox_get_savedata(tox1, data);
|
|
|
|
tox_kill(tox2);
|
|
TOX_ERR_NEW err_n;
|
|
|
|
struct Tox_Options options;
|
|
tox_options_default(&options);
|
|
options.savedata_type = TOX_SAVEDATA_TYPE_TOX_SAVE;
|
|
options.savedata_data = data;
|
|
options.savedata_length = save_size;
|
|
tox2 = tox_new(&options, &err_n);
|
|
ck_assert_msg(err_n == TOX_ERR_NEW_OK, "Load failed");
|
|
|
|
ck_assert_msg(tox_self_get_name_size(tox2) == sizeof name, "Wrong name size.");
|
|
|
|
uint8_t address2[TOX_ADDRESS_SIZE];
|
|
tox_self_get_address(tox2, address2);
|
|
ck_assert_msg(memcmp(address2, address, TOX_ADDRESS_SIZE) == 0, "Wrong address.");
|
|
uint8_t new_name[TOX_MAX_NAME_LENGTH] = { 0 };
|
|
tox_self_get_name(tox2, new_name);
|
|
ck_assert_msg(memcmp(name, new_name, TOX_MAX_NAME_LENGTH) == 0, "Wrong name");
|
|
|
|
uint8_t sk[TOX_SECRET_KEY_SIZE];
|
|
tox_self_get_secret_key(tox2, sk);
|
|
tox_kill(tox2);
|
|
|
|
tox_options_default(&options);
|
|
options.savedata_type = TOX_SAVEDATA_TYPE_SECRET_KEY;
|
|
options.savedata_data = sk;
|
|
options.savedata_length = sizeof(sk);
|
|
tox2 = tox_new(&options, &err_n);
|
|
ck_assert_msg(err_n == TOX_ERR_NEW_OK, "Load failed");
|
|
uint8_t address3[TOX_ADDRESS_SIZE];
|
|
tox_self_get_address(tox2, address3);
|
|
ck_assert_msg(memcmp(address3, address, TOX_PUBLIC_KEY_SIZE) == 0, "Wrong public key.");
|
|
uint8_t pk[TOX_PUBLIC_KEY_SIZE];
|
|
tox_self_get_public_key(tox2, pk);
|
|
ck_assert_msg(memcmp(pk, address, TOX_PUBLIC_KEY_SIZE) == 0, "Wrong public key.");
|
|
|
|
tox_kill(tox1);
|
|
tox_kill(tox2);
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_few_clients)
|
|
{
|
|
long long unsigned int con_time, cur_time = time(NULL);
|
|
TOX_ERR_NEW t_n_error;
|
|
Tox *tox1 = tox_new(0, &t_n_error);
|
|
ck_assert_msg(t_n_error == TOX_ERR_NEW_OK, "wrong error");
|
|
Tox *tox2 = tox_new(0, &t_n_error);
|
|
ck_assert_msg(t_n_error == TOX_ERR_NEW_OK, "wrong error");
|
|
Tox *tox3 = tox_new(0, &t_n_error);
|
|
ck_assert_msg(t_n_error == TOX_ERR_NEW_OK, "wrong error");
|
|
|
|
ck_assert_msg(tox1 || tox2 || tox3, "Failed to create 3 tox instances");
|
|
|
|
{
|
|
TOX_ERR_GET_PORT error;
|
|
ck_assert_msg(tox_self_get_udp_port(tox1, &error) == 33445, "First Tox instance did not bind to udp port 33445.\n");
|
|
ck_assert_msg(error == TOX_ERR_GET_PORT_OK, "wrong error");
|
|
}
|
|
|
|
{
|
|
TOX_ERR_GET_PORT error;
|
|
ck_assert_msg(tox_self_get_udp_port(tox2, &error) == 33446, "Second Tox instance did not bind to udp port 33446.\n");
|
|
ck_assert_msg(error == TOX_ERR_GET_PORT_OK, "wrong error");
|
|
}
|
|
|
|
{
|
|
TOX_ERR_GET_PORT error;
|
|
ck_assert_msg(tox_self_get_udp_port(tox3, &error) == 33447, "Third Tox instance did not bind to udp port 33447.\n");
|
|
ck_assert_msg(error == TOX_ERR_GET_PORT_OK, "wrong error");
|
|
}
|
|
|
|
uint32_t to_compare = 974536;
|
|
connected_t1 = 0;
|
|
tox_callback_self_connection_status(tox1, tox_connection_status);
|
|
tox_callback_friend_request(tox2, accept_friend_request);
|
|
uint8_t address[TOX_ADDRESS_SIZE];
|
|
tox_self_get_address(tox2, address);
|
|
uint32_t test = tox_friend_add(tox3, address, (const uint8_t *)"Gentoo", 7, 0);
|
|
ck_assert_msg(test == 0, "Failed to add friend error code: %i", test);
|
|
|
|
uint8_t off = 1;
|
|
|
|
while (1) {
|
|
tox_iterate(tox1, &to_compare);
|
|
tox_iterate(tox2, &to_compare);
|
|
tox_iterate(tox3, &to_compare);
|
|
|
|
if (tox_self_get_connection_status(tox1) && tox_self_get_connection_status(tox2)
|
|
&& tox_self_get_connection_status(tox3)) {
|
|
if (off) {
|
|
printf("Toxes are online, took %llu seconds\n", time(NULL) - cur_time);
|
|
con_time = time(NULL);
|
|
off = 0;
|
|
}
|
|
|
|
if (tox_friend_get_connection_status(tox2, 0, 0) == TOX_CONNECTION_UDP
|
|
&& tox_friend_get_connection_status(tox3, 0, 0) == TOX_CONNECTION_UDP) {
|
|
break;
|
|
}
|
|
}
|
|
|
|
c_sleep(50);
|
|
}
|
|
|
|
ck_assert_msg(connected_t1, "Tox1 isn't connected. %u", connected_t1);
|
|
printf("tox clients connected took %llu seconds\n", time(NULL) - con_time);
|
|
to_compare = 974536;
|
|
tox_callback_friend_message(tox3, print_message);
|
|
uint8_t msgs[TOX_MAX_MESSAGE_LENGTH + 1];
|
|
memset(msgs, 'G', sizeof(msgs));
|
|
TOX_ERR_FRIEND_SEND_MESSAGE errm;
|
|
tox_friend_send_message(tox2, 0, TOX_MESSAGE_TYPE_NORMAL, msgs, TOX_MAX_MESSAGE_LENGTH + 1, &errm);
|
|
ck_assert_msg(errm == TOX_ERR_FRIEND_SEND_MESSAGE_TOO_LONG, "TOX_MAX_MESSAGE_LENGTH is too small\n");
|
|
tox_friend_send_message(tox2, 0, TOX_MESSAGE_TYPE_NORMAL, msgs, TOX_MAX_MESSAGE_LENGTH, &errm);
|
|
ck_assert_msg(errm == TOX_ERR_FRIEND_SEND_MESSAGE_OK, "TOX_MAX_MESSAGE_LENGTH is too big\n");
|
|
|
|
while (1) {
|
|
messages_received = 0;
|
|
tox_iterate(tox1, &to_compare);
|
|
tox_iterate(tox2, &to_compare);
|
|
tox_iterate(tox3, &to_compare);
|
|
|
|
if (messages_received) {
|
|
break;
|
|
}
|
|
|
|
c_sleep(50);
|
|
}
|
|
|
|
printf("tox clients messaging succeeded\n");
|
|
|
|
unsigned int save_size1 = tox_get_savedata_size(tox2);
|
|
ck_assert_msg(save_size1 != 0 && save_size1 < 4096, "save is invalid size %u", save_size1);
|
|
printf("%u\n", save_size1);
|
|
uint8_t save1[save_size1];
|
|
tox_get_savedata(tox2, save1);
|
|
tox_kill(tox2);
|
|
|
|
struct Tox_Options options;
|
|
tox_options_default(&options);
|
|
options.savedata_type = TOX_SAVEDATA_TYPE_TOX_SAVE;
|
|
options.savedata_data = save1;
|
|
options.savedata_length = save_size1;
|
|
tox2 = tox_new(&options, NULL);
|
|
cur_time = time(NULL);
|
|
off = 1;
|
|
|
|
while (1) {
|
|
tox_iterate(tox1, &to_compare);
|
|
tox_iterate(tox2, &to_compare);
|
|
tox_iterate(tox3, &to_compare);
|
|
|
|
if (tox_self_get_connection_status(tox1) && tox_self_get_connection_status(tox2)
|
|
&& tox_self_get_connection_status(tox3)) {
|
|
if (off) {
|
|
printf("Toxes are online again after reloading, took %llu seconds\n", time(NULL) - cur_time);
|
|
con_time = time(NULL);
|
|
off = 0;
|
|
}
|
|
|
|
if (tox_friend_get_connection_status(tox2, 0, 0) == TOX_CONNECTION_UDP
|
|
&& tox_friend_get_connection_status(tox3, 0, 0) == TOX_CONNECTION_UDP) {
|
|
break;
|
|
}
|
|
}
|
|
|
|
c_sleep(50);
|
|
}
|
|
|
|
printf("tox clients connected took %llu seconds\n", time(NULL) - con_time);
|
|
tox_callback_friend_name(tox3, print_nickchange);
|
|
TOX_ERR_SET_INFO err_n;
|
|
bool succ = tox_self_set_name(tox2, (const uint8_t *)"Gentoo", sizeof("Gentoo"), &err_n);
|
|
ck_assert_msg(succ && err_n == TOX_ERR_SET_INFO_OK, "tox_self_set_name failed because %u\n", err_n);
|
|
|
|
while (1) {
|
|
name_changes = 0;
|
|
tox_iterate(tox1, &to_compare);
|
|
tox_iterate(tox2, &to_compare);
|
|
tox_iterate(tox3, &to_compare);
|
|
|
|
if (name_changes) {
|
|
break;
|
|
}
|
|
|
|
c_sleep(50);
|
|
}
|
|
|
|
ck_assert_msg(tox_friend_get_name_size(tox3, 0, 0) == sizeof("Gentoo"), "Name length not correct");
|
|
uint8_t temp_name[sizeof("Gentoo")];
|
|
tox_friend_get_name(tox3, 0, temp_name, 0);
|
|
ck_assert_msg(memcmp(temp_name, "Gentoo", sizeof("Gentoo")) == 0, "Name not correct");
|
|
|
|
tox_callback_friend_status_message(tox3, print_status_m_change);
|
|
succ = tox_self_set_status_message(tox2, (const uint8_t *)"Installing Gentoo", sizeof("Installing Gentoo"), &err_n);
|
|
ck_assert_msg(succ && err_n == TOX_ERR_SET_INFO_OK, "tox_self_set_status_message failed because %u\n", err_n);
|
|
|
|
while (1) {
|
|
status_m_changes = 0;
|
|
tox_iterate(tox1, &to_compare);
|
|
tox_iterate(tox2, &to_compare);
|
|
tox_iterate(tox3, &to_compare);
|
|
|
|
if (status_m_changes) {
|
|
break;
|
|
}
|
|
|
|
c_sleep(50);
|
|
}
|
|
|
|
ck_assert_msg(tox_friend_get_status_message_size(tox3, 0, 0) == sizeof("Installing Gentoo"),
|
|
"status message length not correct");
|
|
uint8_t temp_status_m[sizeof("Installing Gentoo")];
|
|
tox_friend_get_status_message(tox3, 0, temp_status_m, 0);
|
|
ck_assert_msg(memcmp(temp_status_m, "Installing Gentoo", sizeof("Installing Gentoo")) == 0,
|
|
"status message not correct");
|
|
|
|
tox_callback_friend_typing(tox2, &print_typingchange);
|
|
tox_self_set_typing(tox3, 0, 1, 0);
|
|
|
|
while (1) {
|
|
typing_changes = 0;
|
|
tox_iterate(tox1, &to_compare);
|
|
tox_iterate(tox2, &to_compare);
|
|
tox_iterate(tox3, &to_compare);
|
|
|
|
if (typing_changes == 2) {
|
|
break;
|
|
}
|
|
|
|
ck_assert_msg(typing_changes == 0, "Typing fail");
|
|
|
|
c_sleep(50);
|
|
}
|
|
|
|
ck_assert_msg(tox_friend_get_typing(tox2, 0, 0) == 1, "Typing fail");
|
|
tox_self_set_typing(tox3, 0, 0, 0);
|
|
|
|
while (1) {
|
|
typing_changes = 0;
|
|
tox_iterate(tox1, &to_compare);
|
|
tox_iterate(tox2, &to_compare);
|
|
tox_iterate(tox3, &to_compare);
|
|
|
|
if (typing_changes == 1) {
|
|
break;
|
|
}
|
|
|
|
ck_assert_msg(typing_changes == 0, "Typing fail");
|
|
|
|
c_sleep(50);
|
|
}
|
|
|
|
TOX_ERR_FRIEND_QUERY err_t;
|
|
ck_assert_msg(tox_friend_get_typing(tox2, 0, &err_t) == 0, "Typing fail");
|
|
ck_assert_msg(err_t == TOX_ERR_FRIEND_QUERY_OK, "Typing fail");
|
|
|
|
uint32_t packet_number = 160;
|
|
tox_callback_friend_lossless_packet(tox3, &handle_custom_packet, &packet_number);
|
|
uint8_t data_c[TOX_MAX_CUSTOM_PACKET_SIZE + 1];
|
|
memset(data_c, ((uint8_t)packet_number), sizeof(data_c));
|
|
int ret = tox_friend_send_lossless_packet(tox2, 0, data_c, sizeof(data_c), 0);
|
|
ck_assert_msg(ret == 0, "tox_friend_send_lossless_packet bigger fail %i", ret);
|
|
ret = tox_friend_send_lossless_packet(tox2, 0, data_c, TOX_MAX_CUSTOM_PACKET_SIZE, 0);
|
|
ck_assert_msg(ret == 1, "tox_friend_send_lossless_packet fail %i", ret);
|
|
|
|
while (1) {
|
|
custom_packet = 0;
|
|
tox_iterate(tox1, &to_compare);
|
|
tox_iterate(tox2, &to_compare);
|
|
tox_iterate(tox3, &to_compare);
|
|
|
|
if (custom_packet == 1) {
|
|
break;
|
|
}
|
|
|
|
ck_assert_msg(custom_packet == 0, "Lossless packet fail");
|
|
|
|
c_sleep(50);
|
|
}
|
|
|
|
packet_number = 200;
|
|
tox_callback_friend_lossy_packet(tox3, &handle_custom_packet, &packet_number);
|
|
memset(data_c, ((uint8_t)packet_number), sizeof(data_c));
|
|
ret = tox_friend_send_lossy_packet(tox2, 0, data_c, sizeof(data_c), 0);
|
|
ck_assert_msg(ret == 0, "tox_friend_send_lossy_packet bigger fail %i", ret);
|
|
ret = tox_friend_send_lossy_packet(tox2, 0, data_c, TOX_MAX_CUSTOM_PACKET_SIZE, 0);
|
|
ck_assert_msg(ret == 1, "tox_friend_send_lossy_packet fail %i", ret);
|
|
|
|
while (1) {
|
|
custom_packet = 0;
|
|
tox_iterate(tox1, &to_compare);
|
|
tox_iterate(tox2, &to_compare);
|
|
tox_iterate(tox3, &to_compare);
|
|
|
|
if (custom_packet == 1) {
|
|
break;
|
|
}
|
|
|
|
ck_assert_msg(custom_packet == 0, "lossy packet fail");
|
|
|
|
c_sleep(50);
|
|
}
|
|
|
|
printf("Starting file transfer test.\n");
|
|
|
|
file_accepted = file_size = sendf_ok = size_recv = 0;
|
|
file_recv = 0;
|
|
max_sending = UINT64_MAX;
|
|
long long unsigned int f_time = time(NULL);
|
|
tox_callback_file_recv_chunk(tox3, write_file, &to_compare);
|
|
tox_callback_file_recv_control(tox2, file_print_control, &to_compare);
|
|
tox_callback_file_chunk_request(tox2, tox_file_chunk_request, &to_compare);
|
|
tox_callback_file_recv_control(tox3, file_print_control, &to_compare);
|
|
tox_callback_file_recv(tox3, tox_file_receive, &to_compare);
|
|
uint64_t totalf_size = 100 * 1024 * 1024;
|
|
uint32_t fnum = tox_file_send(tox2, 0, TOX_FILE_KIND_DATA, totalf_size, 0, (const uint8_t *)"Gentoo.exe",
|
|
sizeof("Gentoo.exe"), 0);
|
|
ck_assert_msg(fnum != UINT32_MAX, "tox_new_file_sender fail");
|
|
|
|
TOX_ERR_FILE_GET gfierr;
|
|
ck_assert_msg(!tox_file_get_file_id(tox2, 1, fnum, file_cmp_id, &gfierr), "tox_file_get_file_id didn't fail");
|
|
ck_assert_msg(gfierr == TOX_ERR_FILE_GET_FRIEND_NOT_FOUND, "wrong error");
|
|
ck_assert_msg(!tox_file_get_file_id(tox2, 0, fnum + 1, file_cmp_id, &gfierr), "tox_file_get_file_id didn't fail");
|
|
ck_assert_msg(gfierr == TOX_ERR_FILE_GET_NOT_FOUND, "wrong error");
|
|
ck_assert_msg(tox_file_get_file_id(tox2, 0, fnum, file_cmp_id, &gfierr), "tox_file_get_file_id failed");
|
|
ck_assert_msg(gfierr == TOX_ERR_FILE_GET_OK, "wrong error");
|
|
|
|
while (1) {
|
|
tox_iterate(tox1, &to_compare);
|
|
tox_iterate(tox2, &to_compare);
|
|
tox_iterate(tox3, &to_compare);
|
|
|
|
if (file_sending_done) {
|
|
if (sendf_ok && file_recv && totalf_size == file_size && size_recv == file_size && sending_pos == size_recv
|
|
&& file_accepted == 1) {
|
|
break;
|
|
}
|
|
|
|
ck_abort_msg("Something went wrong in file transfer %u %u %u %u %u %u %llu %llu %llu", sendf_ok, file_recv,
|
|
totalf_size == file_size, size_recv == file_size, sending_pos == size_recv, file_accepted == 1, totalf_size, size_recv,
|
|
sending_pos);
|
|
}
|
|
|
|
uint32_t tox1_interval = tox_iteration_interval(tox1);
|
|
uint32_t tox2_interval = tox_iteration_interval(tox2);
|
|
uint32_t tox3_interval = tox_iteration_interval(tox3);
|
|
|
|
c_sleep(MIN(tox1_interval, MIN(tox2_interval, tox3_interval)));
|
|
}
|
|
|
|
printf("100MB file sent in %llu seconds\n", time(NULL) - f_time);
|
|
|
|
printf("Starting file streaming transfer test.\n");
|
|
|
|
file_sending_done = file_accepted = file_size = sendf_ok = size_recv = 0;
|
|
file_recv = 0;
|
|
tox_callback_file_recv_chunk(tox3, write_file, &to_compare);
|
|
tox_callback_file_recv_control(tox2, file_print_control, &to_compare);
|
|
tox_callback_file_chunk_request(tox2, tox_file_chunk_request, &to_compare);
|
|
tox_callback_file_recv_control(tox3, file_print_control, &to_compare);
|
|
tox_callback_file_recv(tox3, tox_file_receive, &to_compare);
|
|
totalf_size = UINT64_MAX;
|
|
fnum = tox_file_send(tox2, 0, TOX_FILE_KIND_DATA, totalf_size, 0, (const uint8_t *)"Gentoo.exe", sizeof("Gentoo.exe"),
|
|
0);
|
|
ck_assert_msg(fnum != UINT32_MAX, "tox_new_file_sender fail");
|
|
|
|
ck_assert_msg(!tox_file_get_file_id(tox2, 1, fnum, file_cmp_id, &gfierr), "tox_file_get_file_id didn't fail");
|
|
ck_assert_msg(gfierr == TOX_ERR_FILE_GET_FRIEND_NOT_FOUND, "wrong error");
|
|
ck_assert_msg(!tox_file_get_file_id(tox2, 0, fnum + 1, file_cmp_id, &gfierr), "tox_file_get_file_id didn't fail");
|
|
ck_assert_msg(gfierr == TOX_ERR_FILE_GET_NOT_FOUND, "wrong error");
|
|
ck_assert_msg(tox_file_get_file_id(tox2, 0, fnum, file_cmp_id, &gfierr), "tox_file_get_file_id failed");
|
|
ck_assert_msg(gfierr == TOX_ERR_FILE_GET_OK, "wrong error");
|
|
|
|
max_sending = 100 * 1024;
|
|
m_send_reached = 0;
|
|
|
|
while (1) {
|
|
tox_iterate(tox1, &to_compare);
|
|
tox_iterate(tox2, &to_compare);
|
|
tox_iterate(tox3, &to_compare);
|
|
|
|
if (file_sending_done) {
|
|
if (sendf_ok && file_recv && m_send_reached && totalf_size == file_size && size_recv == max_sending
|
|
&& sending_pos == size_recv && file_accepted == 1) {
|
|
break;
|
|
}
|
|
|
|
ck_abort_msg("Something went wrong in file transfer %u %u %u %u %u %u %u %llu %llu %llu %llu", sendf_ok, file_recv,
|
|
m_send_reached, totalf_size == file_size, size_recv == max_sending, sending_pos == size_recv, file_accepted == 1,
|
|
totalf_size, file_size,
|
|
size_recv, sending_pos);
|
|
}
|
|
|
|
uint32_t tox1_interval = tox_iteration_interval(tox1);
|
|
uint32_t tox2_interval = tox_iteration_interval(tox2);
|
|
uint32_t tox3_interval = tox_iteration_interval(tox3);
|
|
|
|
c_sleep(MIN(tox1_interval, MIN(tox2_interval, tox3_interval)));
|
|
}
|
|
|
|
printf("Starting file 0 transfer test.\n");
|
|
|
|
file_sending_done = file_accepted = file_size = sendf_ok = size_recv = 0;
|
|
file_recv = 0;
|
|
tox_callback_file_recv_chunk(tox3, write_file, &to_compare);
|
|
tox_callback_file_recv_control(tox2, file_print_control, &to_compare);
|
|
tox_callback_file_chunk_request(tox2, tox_file_chunk_request, &to_compare);
|
|
tox_callback_file_recv_control(tox3, file_print_control, &to_compare);
|
|
tox_callback_file_recv(tox3, tox_file_receive, &to_compare);
|
|
totalf_size = 0;
|
|
fnum = tox_file_send(tox2, 0, TOX_FILE_KIND_DATA, totalf_size, 0, (const uint8_t *)"Gentoo.exe", sizeof("Gentoo.exe"),
|
|
0);
|
|
ck_assert_msg(fnum != UINT32_MAX, "tox_new_file_sender fail");
|
|
|
|
ck_assert_msg(!tox_file_get_file_id(tox2, 1, fnum, file_cmp_id, &gfierr), "tox_file_get_file_id didn't fail");
|
|
ck_assert_msg(gfierr == TOX_ERR_FILE_GET_FRIEND_NOT_FOUND, "wrong error");
|
|
ck_assert_msg(!tox_file_get_file_id(tox2, 0, fnum + 1, file_cmp_id, &gfierr), "tox_file_get_file_id didn't fail");
|
|
ck_assert_msg(gfierr == TOX_ERR_FILE_GET_NOT_FOUND, "wrong error");
|
|
ck_assert_msg(tox_file_get_file_id(tox2, 0, fnum, file_cmp_id, &gfierr), "tox_file_get_file_id failed");
|
|
ck_assert_msg(gfierr == TOX_ERR_FILE_GET_OK, "wrong error");
|
|
|
|
while (1) {
|
|
tox_iterate(tox1, &to_compare);
|
|
tox_iterate(tox2, &to_compare);
|
|
tox_iterate(tox3, &to_compare);
|
|
|
|
if (file_sending_done) {
|
|
if (sendf_ok && file_recv && totalf_size == file_size && size_recv == file_size && sending_pos == size_recv
|
|
&& file_accepted == 1) {
|
|
break;
|
|
}
|
|
|
|
ck_abort_msg("Something went wrong in file transfer %u %u %u %u %u %u %llu %llu %llu", sendf_ok, file_recv,
|
|
totalf_size == file_size, size_recv == file_size, sending_pos == size_recv, file_accepted == 1, totalf_size, size_recv,
|
|
sending_pos);
|
|
}
|
|
|
|
uint32_t tox1_interval = tox_iteration_interval(tox1);
|
|
uint32_t tox2_interval = tox_iteration_interval(tox2);
|
|
uint32_t tox3_interval = tox_iteration_interval(tox3);
|
|
|
|
c_sleep(MIN(tox1_interval, MIN(tox2_interval, tox3_interval)));
|
|
}
|
|
|
|
printf("test_few_clients succeeded, took %llu seconds\n", time(NULL) - cur_time);
|
|
|
|
tox_kill(tox1);
|
|
tox_kill(tox2);
|
|
tox_kill(tox3);
|
|
}
|
|
END_TEST
|
|
|
|
#define NUM_TOXES 90
|
|
#define NUM_FRIENDS 50
|
|
|
|
START_TEST(test_many_clients)
|
|
{
|
|
long long unsigned int cur_time = time(NULL);
|
|
Tox *toxes[NUM_TOXES];
|
|
uint32_t i, j;
|
|
uint32_t to_comp = 974536;
|
|
|
|
for (i = 0; i < NUM_TOXES; ++i) {
|
|
toxes[i] = tox_new(0, 0);
|
|
ck_assert_msg(toxes[i] != 0, "Failed to create tox instances %u", i);
|
|
tox_callback_friend_request(toxes[i], accept_friend_request);
|
|
}
|
|
|
|
{
|
|
TOX_ERR_GET_PORT error;
|
|
ck_assert_msg(tox_self_get_udp_port(toxes[0], &error) == 33445, "First Tox instance did not bind to udp port 33445.\n");
|
|
ck_assert_msg(error == TOX_ERR_GET_PORT_OK, "wrong error");
|
|
}
|
|
|
|
struct {
|
|
uint16_t tox1;
|
|
uint16_t tox2;
|
|
} pairs[NUM_FRIENDS];
|
|
|
|
uint8_t address[TOX_ADDRESS_SIZE];
|
|
|
|
unsigned int num_f = 0;
|
|
|
|
for (i = 0; i < NUM_TOXES; ++i) {
|
|
num_f += tox_self_get_friend_list_size(toxes[i]);
|
|
}
|
|
|
|
ck_assert_msg(num_f == 0, "bad num friends: %u", num_f);
|
|
|
|
for (i = 0; i < NUM_FRIENDS; ++i) {
|
|
loop_top:
|
|
pairs[i].tox1 = rand() % NUM_TOXES;
|
|
pairs[i].tox2 = (pairs[i].tox1 + rand() % (NUM_TOXES - 1) + 1) % NUM_TOXES;
|
|
|
|
for (j = 0; j < i; ++j) {
|
|
if (pairs[j].tox2 == pairs[i].tox1 && pairs[j].tox1 == pairs[i].tox2) {
|
|
goto loop_top;
|
|
}
|
|
}
|
|
|
|
tox_self_get_address(toxes[pairs[i].tox1], address);
|
|
|
|
TOX_ERR_FRIEND_ADD test;
|
|
uint32_t num = tox_friend_add(toxes[pairs[i].tox2], address, (const uint8_t *)"Gentoo", 7, &test);
|
|
|
|
if (test == TOX_ERR_FRIEND_ADD_ALREADY_SENT) {
|
|
goto loop_top;
|
|
}
|
|
|
|
ck_assert_msg(num != UINT32_MAX && test == TOX_ERR_FRIEND_ADD_OK, "Failed to add friend error code: %i", test);
|
|
}
|
|
|
|
for (i = 0; i < NUM_TOXES; ++i) {
|
|
num_f += tox_self_get_friend_list_size(toxes[i]);
|
|
}
|
|
|
|
ck_assert_msg(num_f == NUM_FRIENDS, "bad num friends: %u", num_f);
|
|
|
|
while (1) {
|
|
uint16_t counter = 0;
|
|
|
|
for (i = 0; i < NUM_TOXES; ++i) {
|
|
for (j = 0; j < tox_self_get_friend_list_size(toxes[i]); ++j) {
|
|
if (tox_friend_get_connection_status(toxes[i], j, 0) == TOX_CONNECTION_UDP) {
|
|
++counter;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (counter == NUM_FRIENDS * 2) {
|
|
break;
|
|
}
|
|
|
|
for (i = 0; i < NUM_TOXES; ++i) {
|
|
tox_iterate(toxes[i], &to_comp);
|
|
}
|
|
|
|
c_sleep(50);
|
|
}
|
|
|
|
for (i = 0; i < NUM_TOXES; ++i) {
|
|
tox_kill(toxes[i]);
|
|
}
|
|
|
|
printf("test_many_clients succeeded, took %llu seconds\n", time(NULL) - cur_time);
|
|
}
|
|
END_TEST
|
|
|
|
#define NUM_TOXES_TCP 40
|
|
#define TCP_RELAY_PORT 33448
|
|
|
|
START_TEST(test_many_clients_tcp)
|
|
{
|
|
long long unsigned int cur_time = time(NULL);
|
|
Tox *toxes[NUM_TOXES_TCP];
|
|
uint32_t i, j;
|
|
uint32_t to_comp = 974536;
|
|
|
|
for (i = 0; i < NUM_TOXES_TCP; ++i) {
|
|
struct Tox_Options opts;
|
|
tox_options_default(&opts);
|
|
|
|
if (i == 0) {
|
|
opts.tcp_port = TCP_RELAY_PORT;
|
|
} else {
|
|
opts.udp_enabled = 0;
|
|
}
|
|
|
|
toxes[i] = tox_new(&opts, 0);
|
|
ck_assert_msg(toxes[i] != 0, "Failed to create tox instances %u", i);
|
|
tox_callback_friend_request(toxes[i], accept_friend_request);
|
|
uint8_t dpk[TOX_PUBLIC_KEY_SIZE];
|
|
tox_self_get_dht_id(toxes[0], dpk);
|
|
TOX_ERR_BOOTSTRAP error = 0;
|
|
ck_assert_msg(tox_add_tcp_relay(toxes[i], TOX_LOCALHOST, TCP_RELAY_PORT, dpk, &error), "add relay error, %i, %i", i,
|
|
error);
|
|
ck_assert_msg(tox_bootstrap(toxes[i], TOX_LOCALHOST, 33445, dpk, 0), "Bootstrap error");
|
|
}
|
|
|
|
{
|
|
TOX_ERR_GET_PORT error;
|
|
ck_assert_msg(tox_self_get_udp_port(toxes[0], &error) == 33445, "First Tox instance did not bind to udp port 33445.\n");
|
|
ck_assert_msg(error == TOX_ERR_GET_PORT_OK, "wrong error");
|
|
ck_assert_msg(tox_self_get_tcp_port(toxes[0], &error) == TCP_RELAY_PORT,
|
|
"First Tox instance did not bind to tcp port %u.\n", TCP_RELAY_PORT);
|
|
ck_assert_msg(error == TOX_ERR_GET_PORT_OK, "wrong error");
|
|
}
|
|
|
|
struct {
|
|
uint16_t tox1;
|
|
uint16_t tox2;
|
|
} pairs[NUM_FRIENDS];
|
|
|
|
uint8_t address[TOX_ADDRESS_SIZE];
|
|
|
|
for (i = 0; i < NUM_FRIENDS; ++i) {
|
|
loop_top:
|
|
pairs[i].tox1 = rand() % NUM_TOXES_TCP;
|
|
pairs[i].tox2 = (pairs[i].tox1 + rand() % (NUM_TOXES_TCP - 1) + 1) % NUM_TOXES_TCP;
|
|
|
|
for (j = 0; j < i; ++j) {
|
|
if (pairs[j].tox2 == pairs[i].tox1 && pairs[j].tox1 == pairs[i].tox2) {
|
|
goto loop_top;
|
|
}
|
|
}
|
|
|
|
tox_self_get_address(toxes[pairs[i].tox1], address);
|
|
|
|
TOX_ERR_FRIEND_ADD test;
|
|
uint32_t num = tox_friend_add(toxes[pairs[i].tox2], address, (const uint8_t *)"Gentoo", 7, &test);
|
|
|
|
if (test == TOX_ERR_FRIEND_ADD_ALREADY_SENT) {
|
|
goto loop_top;
|
|
}
|
|
|
|
ck_assert_msg(num != UINT32_MAX && test == TOX_ERR_FRIEND_ADD_OK, "Failed to add friend error code: %i", test);
|
|
}
|
|
|
|
while (1) {
|
|
uint16_t counter = 0;
|
|
|
|
for (i = 0; i < NUM_TOXES_TCP; ++i) {
|
|
for (j = 0; j < tox_self_get_friend_list_size(toxes[i]); ++j) {
|
|
if (tox_friend_get_connection_status(toxes[i], j, 0) == TOX_CONNECTION_TCP) {
|
|
++counter;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (counter == NUM_FRIENDS * 2) {
|
|
break;
|
|
}
|
|
|
|
for (i = 0; i < NUM_TOXES_TCP; ++i) {
|
|
tox_iterate(toxes[i], &to_comp);
|
|
}
|
|
|
|
c_sleep(50);
|
|
}
|
|
|
|
for (i = 0; i < NUM_TOXES_TCP; ++i) {
|
|
tox_kill(toxes[i]);
|
|
}
|
|
|
|
printf("test_many_clients_tcp succeeded, took %llu seconds\n", time(NULL) - cur_time);
|
|
}
|
|
END_TEST
|
|
|
|
#define NUM_TCP_RELAYS 3
|
|
|
|
START_TEST(test_many_clients_tcp_b)
|
|
{
|
|
long long unsigned int cur_time = time(NULL);
|
|
Tox *toxes[NUM_TOXES_TCP];
|
|
uint32_t i, j;
|
|
uint32_t to_comp = 974536;
|
|
|
|
for (i = 0; i < NUM_TOXES_TCP; ++i) {
|
|
struct Tox_Options opts;
|
|
tox_options_default(&opts);
|
|
|
|
if (i < NUM_TCP_RELAYS) {
|
|
opts.tcp_port = TCP_RELAY_PORT + i;
|
|
} else {
|
|
opts.udp_enabled = 0;
|
|
}
|
|
|
|
toxes[i] = tox_new(&opts, 0);
|
|
ck_assert_msg(toxes[i] != 0, "Failed to create tox instances %u", i);
|
|
tox_callback_friend_request(toxes[i], accept_friend_request);
|
|
uint8_t dpk[TOX_PUBLIC_KEY_SIZE];
|
|
tox_self_get_dht_id(toxes[(i % NUM_TCP_RELAYS)], dpk);
|
|
ck_assert_msg(tox_add_tcp_relay(toxes[i], TOX_LOCALHOST, TCP_RELAY_PORT + (i % NUM_TCP_RELAYS), dpk, 0),
|
|
"add relay error");
|
|
tox_self_get_dht_id(toxes[0], dpk);
|
|
ck_assert_msg(tox_bootstrap(toxes[i], TOX_LOCALHOST, 33445, dpk, 0), "Bootstrap error");
|
|
}
|
|
|
|
{
|
|
TOX_ERR_GET_PORT error;
|
|
ck_assert_msg(tox_self_get_udp_port(toxes[0], &error) == 33445, "First Tox instance did not bind to udp port 33445.\n");
|
|
ck_assert_msg(error == TOX_ERR_GET_PORT_OK, "wrong error");
|
|
ck_assert_msg(tox_self_get_tcp_port(toxes[0], &error) == TCP_RELAY_PORT,
|
|
"First Tox instance did not bind to tcp port %u.\n", TCP_RELAY_PORT);
|
|
ck_assert_msg(error == TOX_ERR_GET_PORT_OK, "wrong error");
|
|
}
|
|
|
|
struct {
|
|
uint16_t tox1;
|
|
uint16_t tox2;
|
|
} pairs[NUM_FRIENDS];
|
|
|
|
uint8_t address[TOX_ADDRESS_SIZE];
|
|
|
|
for (i = 0; i < NUM_FRIENDS; ++i) {
|
|
loop_top:
|
|
pairs[i].tox1 = rand() % NUM_TOXES_TCP;
|
|
pairs[i].tox2 = (pairs[i].tox1 + rand() % (NUM_TOXES_TCP - 1) + 1) % NUM_TOXES_TCP;
|
|
|
|
for (j = 0; j < i; ++j) {
|
|
if (pairs[j].tox2 == pairs[i].tox1 && pairs[j].tox1 == pairs[i].tox2) {
|
|
goto loop_top;
|
|
}
|
|
}
|
|
|
|
tox_self_get_address(toxes[pairs[i].tox1], address);
|
|
|
|
TOX_ERR_FRIEND_ADD test;
|
|
uint32_t num = tox_friend_add(toxes[pairs[i].tox2], address, (const uint8_t *)"Gentoo", 7, &test);
|
|
|
|
if (test == TOX_ERR_FRIEND_ADD_ALREADY_SENT) {
|
|
goto loop_top;
|
|
}
|
|
|
|
ck_assert_msg(num != UINT32_MAX && test == TOX_ERR_FRIEND_ADD_OK, "Failed to add friend error code: %i", test);
|
|
}
|
|
|
|
while (1) {
|
|
uint16_t counter = 0;
|
|
|
|
for (i = 0; i < NUM_TOXES_TCP; ++i) {
|
|
for (j = 0; j < tox_self_get_friend_list_size(toxes[i]); ++j) {
|
|
if (tox_friend_get_connection_status(toxes[i], j, 0) == TOX_CONNECTION_TCP) {
|
|
++counter;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (counter == NUM_FRIENDS * 2) {
|
|
break;
|
|
}
|
|
|
|
for (i = 0; i < NUM_TOXES_TCP; ++i) {
|
|
tox_iterate(toxes[i], &to_comp);
|
|
}
|
|
|
|
c_sleep(30);
|
|
}
|
|
|
|
for (i = 0; i < NUM_TOXES_TCP; ++i) {
|
|
tox_kill(toxes[i]);
|
|
}
|
|
|
|
printf("test_many_clients_tcp_b succeeded, took %llu seconds\n", time(NULL) - cur_time);
|
|
}
|
|
END_TEST
|
|
|
|
|
|
#define NUM_GROUP_TOX 32
|
|
|
|
static void g_accept_friend_request(Tox *m, const uint8_t *public_key, const uint8_t *data, size_t length,
|
|
void *userdata)
|
|
{
|
|
if (*((uint32_t *)userdata) != 234212) {
|
|
return;
|
|
}
|
|
|
|
if (length == 7 && memcmp("Gentoo", data, 7) == 0) {
|
|
tox_friend_add_norequest(m, public_key, 0);
|
|
}
|
|
}
|
|
|
|
static Tox *invite_tox;
|
|
static unsigned int invite_counter;
|
|
|
|
static void print_group_invite_callback(Tox *tox, int32_t friendnumber, uint8_t type, const uint8_t *data,
|
|
uint16_t length,
|
|
void *userdata)
|
|
{
|
|
if (*((uint32_t *)userdata) != 234212) {
|
|
return;
|
|
}
|
|
|
|
if (type != TOX_GROUPCHAT_TYPE_TEXT) {
|
|
return;
|
|
}
|
|
|
|
int g_num;
|
|
|
|
if ((g_num = tox_join_groupchat(tox, friendnumber, data, length)) == -1) {
|
|
return;
|
|
}
|
|
|
|
ck_assert_msg(g_num == 0, "Group number was not 0");
|
|
ck_assert_msg(tox_join_groupchat(tox, friendnumber, data, length) == -1,
|
|
"Joining groupchat twice should be impossible.");
|
|
|
|
invite_tox = tox;
|
|
invite_counter = 4;
|
|
}
|
|
|
|
static unsigned int num_recv;
|
|
|
|
static void print_group_message(Tox *tox, int groupnumber, int peernumber, const uint8_t *message, uint16_t length,
|
|
void *userdata)
|
|
{
|
|
if (*((uint32_t *)userdata) != 234212) {
|
|
return;
|
|
}
|
|
|
|
if (length == (sizeof("Install Gentoo") - 1) && memcmp(message, "Install Gentoo", sizeof("Install Gentoo") - 1) == 0) {
|
|
++num_recv;
|
|
}
|
|
}
|
|
|
|
START_TEST(test_many_group)
|
|
{
|
|
long long unsigned int cur_time = time(NULL);
|
|
Tox *toxes[NUM_GROUP_TOX];
|
|
unsigned int i, j, k;
|
|
uint32_t to_comp = 234212;
|
|
int test_run = 0;
|
|
|
|
group_test_restart:
|
|
|
|
for (i = 0; i < NUM_GROUP_TOX; ++i) {
|
|
toxes[i] = tox_new(0, 0);
|
|
ck_assert_msg(toxes[i] != 0, "Failed to create tox instances %u", i);
|
|
tox_callback_friend_request(toxes[i], &g_accept_friend_request);
|
|
tox_callback_group_invite(toxes[i], &print_group_invite_callback, &to_comp);
|
|
}
|
|
|
|
{
|
|
TOX_ERR_GET_PORT error;
|
|
ck_assert_msg(tox_self_get_udp_port(toxes[0], &error) == 33445, "First Tox instance did not bind to udp port 33445.\n");
|
|
ck_assert_msg(error == TOX_ERR_GET_PORT_OK, "wrong error");
|
|
}
|
|
|
|
uint8_t address[TOX_ADDRESS_SIZE];
|
|
tox_self_get_address(toxes[NUM_GROUP_TOX - 1], address);
|
|
|
|
for (i = 0; i < NUM_GROUP_TOX; ++i) {
|
|
ck_assert_msg(tox_friend_add(toxes[i], address, (const uint8_t *)"Gentoo", 7, 0) == 0, "Failed to add friend");
|
|
|
|
tox_self_get_address(toxes[i], address);
|
|
}
|
|
|
|
while (1) {
|
|
for (i = 0; i < NUM_GROUP_TOX; ++i) {
|
|
if (tox_friend_get_connection_status(toxes[i], 0, 0) != TOX_CONNECTION_UDP) {
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (i == NUM_GROUP_TOX) {
|
|
break;
|
|
}
|
|
|
|
for (i = 0; i < NUM_GROUP_TOX; ++i) {
|
|
tox_iterate(toxes[i], &to_comp);
|
|
}
|
|
|
|
c_sleep(25);
|
|
}
|
|
|
|
printf("friends connected, took %llu seconds\n", time(NULL) - cur_time);
|
|
|
|
ck_assert_msg(tox_add_groupchat(toxes[0]) != -1, "Failed to create group");
|
|
ck_assert_msg(tox_invite_friend(toxes[0], 0, 0) == 0, "Failed to invite friend");
|
|
ck_assert_msg(tox_group_set_title(toxes[0], 0, (const uint8_t *)"Gentoo", sizeof("Gentoo") - 1) == 0,
|
|
"Failed to set group title");
|
|
invite_counter = ~0;
|
|
|
|
unsigned int done = ~0;
|
|
done -= 5;
|
|
|
|
while (1) {
|
|
for (i = 0; i < NUM_GROUP_TOX; ++i) {
|
|
tox_iterate(toxes[i], NULL);
|
|
}
|
|
|
|
if (!invite_counter) {
|
|
ck_assert_msg(tox_invite_friend(invite_tox, 0, 0) == 0, "Failed to invite friend");
|
|
}
|
|
|
|
if (done == invite_counter) {
|
|
break;
|
|
}
|
|
|
|
--invite_counter;
|
|
c_sleep(50);
|
|
}
|
|
|
|
for (i = 0; i < NUM_GROUP_TOX; ++i) {
|
|
int num_peers = tox_group_number_peers(toxes[i], 0);
|
|
|
|
/**
|
|
* Group chats fail unpredictably, currently they'll rerun as many times
|
|
* as they need to until they pass the test, or the time out is reached
|
|
* Either way in this case it's fine */
|
|
if (num_peers != NUM_GROUP_TOX) {
|
|
++test_run;
|
|
printf("\tError starting up the first group, going to restart this test. This is attempt %i\n", test_run);
|
|
|
|
for (j = 0; j < NUM_GROUP_TOX; ++j) {
|
|
tox_kill(toxes[j]);
|
|
}
|
|
|
|
c_sleep(1000);
|
|
|
|
goto group_test_restart;
|
|
}
|
|
|
|
/**
|
|
* This check will never fail because it'll jump before this event
|
|
* I've decided to leave it in because eventually, we may want to only
|
|
* restart this test once, in which case this check will become
|
|
* important again.
|
|
*/
|
|
ck_assert_msg(num_peers == NUM_GROUP_TOX, "\n\tBad number of group peers (pre check)."
|
|
"\n\t\t\tExpected: %u but tox_instance(%u) only has: %i\n\n",
|
|
NUM_GROUP_TOX, i, num_peers);
|
|
|
|
uint8_t title[2048];
|
|
int ret = tox_group_get_title(toxes[i], 0, title, sizeof(title));
|
|
ck_assert_msg(ret == sizeof("Gentoo") - 1, "Wrong title length");
|
|
ck_assert_msg(memcmp("Gentoo", title, ret) == 0, "Wrong title");
|
|
}
|
|
|
|
printf("group connected\n");
|
|
|
|
for (i = 0; i < NUM_GROUP_TOX; ++i) {
|
|
tox_callback_group_message(toxes[i], &print_group_message, &to_comp);
|
|
}
|
|
|
|
ck_assert_msg(tox_group_message_send(toxes[rand() % NUM_GROUP_TOX], 0, (const uint8_t *)"Install Gentoo",
|
|
sizeof("Install Gentoo") - 1) == 0, "Failed to send group message.");
|
|
num_recv = 0;
|
|
|
|
for (j = 0; j < 20; ++j) {
|
|
for (i = 0; i < NUM_GROUP_TOX; ++i) {
|
|
tox_iterate(toxes[i], NULL);
|
|
}
|
|
|
|
c_sleep(25);
|
|
}
|
|
|
|
c_sleep(25);
|
|
ck_assert_msg(num_recv == NUM_GROUP_TOX, "Failed to recv group messages.");
|
|
|
|
for (k = NUM_GROUP_TOX; k != 0 ; --k) {
|
|
tox_del_groupchat(toxes[k - 1], 0);
|
|
|
|
for (j = 0; j < 10; ++j) {
|
|
for (i = 0; i < NUM_GROUP_TOX; ++i) {
|
|
tox_iterate(toxes[i], NULL);
|
|
}
|
|
|
|
c_sleep(50);
|
|
}
|
|
|
|
for (i = 0; i < (k - 1); ++i) {
|
|
int num_peers = tox_group_number_peers(toxes[i], 0);
|
|
ck_assert_msg(num_peers == (k - 1), "\n\tBad number of group peers (post check)."
|
|
"\n\t\t\tExpected: %u but tox_instance(%u) only has: %i\n\n",
|
|
(k - 1), i, num_peers);
|
|
}
|
|
}
|
|
|
|
for (i = 0; i < NUM_GROUP_TOX; ++i) {
|
|
tox_kill(toxes[i]);
|
|
}
|
|
|
|
printf("test_many_group succeeded, took %llu seconds\n", time(NULL) - cur_time);
|
|
}
|
|
END_TEST
|
|
|
|
#ifdef TRAVIS_ENV
|
|
uint8_t timeout_mux = 20;
|
|
#else
|
|
uint8_t timeout_mux = 10;
|
|
#endif
|
|
|
|
static Suite *tox_suite(void)
|
|
{
|
|
Suite *s = suite_create("Tox");
|
|
|
|
DEFTESTCASE(one);
|
|
DEFTESTCASE_SLOW(few_clients, 8 * timeout_mux);
|
|
DEFTESTCASE_SLOW(many_clients, 8 * timeout_mux);
|
|
|
|
/* Each tox connects to a single tox TCP */
|
|
DEFTESTCASE_SLOW(many_clients_tcp, 4 * timeout_mux);
|
|
|
|
/* Try to make a connection to each "older sibling" tox instance via TCP */
|
|
DEFTESTCASE_SLOW(many_clients_tcp_b, 8 * timeout_mux);
|
|
|
|
/* This test works VERY unreliably. So it's worthless in its current state.
|
|
* Anyone reading this is welcome to try to fix it, but because there is a
|
|
* new version of group chats for Tox already completed, and nearly ready to
|
|
* merge, No one is willing/available to give this test the time in needs */
|
|
#ifndef DISABLE_GROUP_TESTS
|
|
DEFTESTCASE_SLOW(many_group, 80);
|
|
#endif
|
|
|
|
return s;
|
|
}
|
|
|
|
int main(int argc, char *argv[])
|
|
{
|
|
srand((unsigned int) time(NULL));
|
|
|
|
Suite *tox = tox_suite();
|
|
SRunner *test_runner = srunner_create(tox);
|
|
|
|
int number_failed = 0;
|
|
srunner_run_all(test_runner, CK_NORMAL);
|
|
number_failed = srunner_ntests_failed(test_runner);
|
|
|
|
srunner_free(test_runner);
|
|
|
|
return number_failed;
|
|
}
|