mirror of
https://github.com/irungentoo/toxcore.git
synced 2024-03-22 13:30:51 +08:00
dd8a568141
**What are we doing?** We are moving towards stateless callbacks. This means that when registering a callback, you no longer pass a user data pointer. Instead, you pass a user data pointer to tox_iterate. This pointer is threaded through the code, passed to each callback. The callback can modify the data pointed at. An extra indirection will be needed if the pointer itself can change. **Why?** Currently, callbacks are registered with a user data pointer. This means the library has N pointers for N different callbacks. These pointers need to be managed by the client code. Managing the lifetime of the pointee can be difficult. In C++, it takes special effort to ensure that the lifetime of user data extends at least beyond the lifetime of the Tox instance. For other languages, the situation is much worse. Java and other garbage collected languages may move objects in memory, so the pointers are not stable. Tox4j goes through a lot of effort to make the Java/Scala user experience a pleasant one by keeping a global array of Tox+userdata on the C++ side, and communicating via protobufs. A Haskell FFI would have to do similarly complex tricks. Stateless callbacks ensure that a user data pointer only needs to live during a single function call. This means that the user code (or language runtime) can move the data around at will, as long as it sets the new location in the callback. **How?** We are doing this change one callback at a time. After each callback, we ensure that everything still works as expected. This means the toxcore change will require 15 Pull Requests.
1373 lines
45 KiB
C
1373 lines
45 KiB
C
/* Auto Tests
|
|
*
|
|
* Tox Tests
|
|
*
|
|
* The following tests were written with a small Tox network in mind. Therefore,
|
|
* each test timeout was set to one for a small Tox Network. If connected to the
|
|
* 'Global' Tox Network, traversing the DHT would take MUCH longer than the
|
|
* timeouts allow. Because of this running these tests require NO other Tox
|
|
* clients running or accessible on/to localhost.
|
|
*
|
|
*/
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
#include "config.h"
|
|
#endif
|
|
|
|
#include <sys/types.h>
|
|
#include <stdint.h>
|
|
#include <string.h>
|
|
#include <stdio.h>
|
|
#include <check.h>
|
|
#include <stdlib.h>
|
|
#include <time.h>
|
|
|
|
#include "../toxcore/tox.h"
|
|
|
|
#include "helpers.h"
|
|
|
|
#if defined(_WIN32) || defined(__WIN32__) || defined (WIN32)
|
|
#define c_sleep(x) Sleep(1*x)
|
|
#else
|
|
#include <unistd.h>
|
|
#define c_sleep(x) usleep(1000*x)
|
|
#endif
|
|
|
|
/* The Travis-CI container responds poorly to ::1 as a localhost address
|
|
* You're encouraged to -D FORCE_TESTS_IPV6 on a local test */
|
|
#ifdef FORCE_TESTS_IPV6
|
|
#define TOX_LOCALHOST "::1"
|
|
#else
|
|
#define TOX_LOCALHOST "127.0.0.1"
|
|
#endif
|
|
|
|
void accept_friend_request(Tox *m, const uint8_t *public_key, const uint8_t *data, size_t length, void *userdata)
|
|
{
|
|
if (*((uint32_t *)userdata) != 974536)
|
|
return;
|
|
|
|
if (length == 7 && memcmp("Gentoo", data, 7) == 0) {
|
|
tox_friend_add_norequest(m, public_key, 0);
|
|
}
|
|
}
|
|
uint32_t messages_received;
|
|
|
|
void print_message(Tox *m, uint32_t friendnumber, TOX_MESSAGE_TYPE type, const uint8_t *string, size_t length,
|
|
void *userdata)
|
|
{
|
|
if (*((uint32_t *)userdata) != 974536)
|
|
return;
|
|
|
|
if (type != TOX_MESSAGE_TYPE_NORMAL) {
|
|
ck_abort_msg("Bad type");
|
|
}
|
|
|
|
uint8_t cmp_msg[TOX_MAX_MESSAGE_LENGTH];
|
|
memset(cmp_msg, 'G', sizeof(cmp_msg));
|
|
|
|
if (length == TOX_MAX_MESSAGE_LENGTH && memcmp(string, cmp_msg, sizeof(cmp_msg)) == 0)
|
|
++messages_received;
|
|
}
|
|
|
|
uint32_t name_changes;
|
|
|
|
void print_nickchange(Tox *m, uint32_t friendnumber, const uint8_t *string, size_t length, void *userdata)
|
|
{
|
|
if (*((uint32_t *)userdata) != 974536)
|
|
return;
|
|
|
|
if (length == sizeof("Gentoo") && memcmp(string, "Gentoo", sizeof("Gentoo")) == 0)
|
|
++name_changes;
|
|
}
|
|
|
|
uint32_t status_m_changes;
|
|
void print_status_m_change(Tox *tox, uint32_t friend_number, const uint8_t *message, size_t length, void *user_data)
|
|
{
|
|
if (*((uint32_t *)user_data) != 974536)
|
|
return;
|
|
|
|
if (length == sizeof("Installing Gentoo") && memcmp(message, "Installing Gentoo", sizeof("Installing Gentoo")) == 0)
|
|
++status_m_changes;
|
|
}
|
|
|
|
uint32_t typing_changes;
|
|
|
|
void print_typingchange(Tox *m, uint32_t friendnumber, bool typing, void *userdata)
|
|
{
|
|
if (*((uint32_t *)userdata) != 974536)
|
|
return;
|
|
|
|
if (!typing)
|
|
typing_changes = 1;
|
|
else
|
|
typing_changes = 2;
|
|
}
|
|
|
|
uint32_t custom_packet;
|
|
|
|
void handle_custom_packet(Tox *m, uint32_t friend_num, const uint8_t *data, size_t len, void *object)
|
|
{
|
|
uint8_t number = *((uint32_t *)object);
|
|
|
|
if (len != TOX_MAX_CUSTOM_PACKET_SIZE)
|
|
return;
|
|
|
|
uint8_t f_data[len];
|
|
memset(f_data, number, len);
|
|
|
|
if (memcmp(f_data, data, len) == 0) {
|
|
++custom_packet;
|
|
} else {
|
|
ck_abort_msg("Custom packet fail. %u", number);
|
|
}
|
|
|
|
return;
|
|
}
|
|
|
|
uint64_t size_recv;
|
|
uint64_t sending_pos;
|
|
|
|
uint8_t file_cmp_id[TOX_FILE_ID_LENGTH];
|
|
uint8_t filenum;
|
|
uint32_t file_accepted;
|
|
uint64_t file_size;
|
|
void tox_file_receive(Tox *tox, uint32_t friend_number, uint32_t file_number, uint32_t kind, uint64_t filesize,
|
|
const uint8_t *filename, size_t filename_length, void *userdata)
|
|
{
|
|
if (*((uint32_t *)userdata) != 974536)
|
|
return;
|
|
|
|
if (kind != TOX_FILE_KIND_DATA) {
|
|
ck_abort_msg("Bad kind");
|
|
return;
|
|
}
|
|
|
|
if (!(filename_length == sizeof("Gentoo.exe") && memcmp(filename, "Gentoo.exe", sizeof("Gentoo.exe")) == 0)) {
|
|
ck_abort_msg("Bad filename");
|
|
return;
|
|
}
|
|
|
|
uint8_t file_id[TOX_FILE_ID_LENGTH];
|
|
|
|
if (!tox_file_get_file_id(tox, friend_number, file_number, file_id, 0)) {
|
|
ck_abort_msg("tox_file_get_file_id error");
|
|
}
|
|
|
|
if (memcmp(file_id, file_cmp_id, TOX_FILE_ID_LENGTH) != 0) {
|
|
ck_abort_msg("bad file_id");
|
|
}
|
|
|
|
uint8_t empty[TOX_FILE_ID_LENGTH] = {0};
|
|
|
|
if (memcmp(empty, file_cmp_id, TOX_FILE_ID_LENGTH) == 0) {
|
|
ck_abort_msg("empty file_id");
|
|
}
|
|
|
|
file_size = filesize;
|
|
|
|
if (filesize) {
|
|
sending_pos = size_recv = 1337;
|
|
|
|
TOX_ERR_FILE_SEEK err_s;
|
|
|
|
if (!tox_file_seek(tox, friend_number, file_number, 1337, &err_s)) {
|
|
ck_abort_msg("tox_file_seek error");
|
|
}
|
|
|
|
ck_assert_msg(err_s == TOX_ERR_FILE_SEEK_OK, "tox_file_seek wrong error");
|
|
} else {
|
|
sending_pos = size_recv = 0;
|
|
}
|
|
|
|
TOX_ERR_FILE_CONTROL error;
|
|
|
|
if (tox_file_control(tox, friend_number, file_number, TOX_FILE_CONTROL_RESUME, &error)) {
|
|
++file_accepted;
|
|
} else {
|
|
ck_abort_msg("tox_file_control failed. %i", error);
|
|
}
|
|
|
|
TOX_ERR_FILE_SEEK err_s;
|
|
|
|
if (tox_file_seek(tox, friend_number, file_number, 1234, &err_s)) {
|
|
ck_abort_msg("tox_file_seek no error");
|
|
}
|
|
|
|
ck_assert_msg(err_s == TOX_ERR_FILE_SEEK_DENIED, "tox_file_seek wrong error");
|
|
}
|
|
|
|
uint32_t sendf_ok;
|
|
void file_print_control(Tox *tox, uint32_t friend_number, uint32_t file_number, TOX_FILE_CONTROL control,
|
|
void *userdata)
|
|
{
|
|
if (*((uint32_t *)userdata) != 974536)
|
|
return;
|
|
|
|
/* First send file num is 0.*/
|
|
if (file_number == 0 && control == TOX_FILE_CONTROL_RESUME)
|
|
sendf_ok = 1;
|
|
}
|
|
|
|
uint64_t max_sending;
|
|
_Bool m_send_reached;
|
|
uint8_t sending_num;
|
|
_Bool file_sending_done;
|
|
void tox_file_chunk_request(Tox *tox, uint32_t friend_number, uint32_t file_number, uint64_t position, size_t length,
|
|
void *user_data)
|
|
{
|
|
if (*((uint32_t *)user_data) != 974536)
|
|
return;
|
|
|
|
if (!sendf_ok) {
|
|
ck_abort_msg("Didn't get resume control");
|
|
}
|
|
|
|
if (sending_pos != position) {
|
|
ck_abort_msg("Bad position %llu", position);
|
|
return;
|
|
}
|
|
|
|
if (length == 0) {
|
|
if (file_sending_done) {
|
|
ck_abort_msg("File sending already done.");
|
|
}
|
|
|
|
file_sending_done = 1;
|
|
return;
|
|
}
|
|
|
|
if (position + length > max_sending) {
|
|
if (m_send_reached) {
|
|
ck_abort_msg("Requested done file tranfer.");
|
|
}
|
|
|
|
length = max_sending - position;
|
|
m_send_reached = 1;
|
|
}
|
|
|
|
TOX_ERR_FILE_SEND_CHUNK error;
|
|
uint8_t f_data[length];
|
|
memset(f_data, sending_num, length);
|
|
|
|
if (tox_file_send_chunk(tox, friend_number, file_number, position, f_data, length, &error)) {
|
|
++sending_num;
|
|
sending_pos += length;
|
|
} else {
|
|
ck_abort_msg("Could not send chunk %i", error);
|
|
}
|
|
|
|
if (error != TOX_ERR_FILE_SEND_CHUNK_OK) {
|
|
ck_abort_msg("Wrong error code");
|
|
}
|
|
}
|
|
|
|
|
|
uint8_t num;
|
|
_Bool file_recv;
|
|
void write_file(Tox *tox, uint32_t friendnumber, uint32_t filenumber, uint64_t position, const uint8_t *data,
|
|
size_t length, void *user_data)
|
|
{
|
|
if (*((uint32_t *)user_data) != 974536)
|
|
return;
|
|
|
|
if (size_recv != position) {
|
|
ck_abort_msg("Bad position");
|
|
return;
|
|
}
|
|
|
|
if (length == 0) {
|
|
file_recv = 1;
|
|
return;
|
|
}
|
|
|
|
uint8_t f_data[length];
|
|
memset(f_data, num, length);
|
|
++num;
|
|
|
|
if (memcmp(f_data, data, length) == 0) {
|
|
size_recv += length;
|
|
} else {
|
|
ck_abort_msg("FILE_CORRUPTED");
|
|
}
|
|
}
|
|
|
|
unsigned int connected_t1;
|
|
void tox_connection_status(Tox *tox, TOX_CONNECTION connection_status, void *user_data)
|
|
{
|
|
if (*((uint32_t *)user_data) != 974536)
|
|
return;
|
|
|
|
if (connected_t1 && !connection_status)
|
|
ck_abort_msg("Tox went offline");
|
|
|
|
ck_assert_msg(connection_status == TOX_CONNECTION_UDP, "wrong status %u", connection_status);
|
|
|
|
connected_t1 = connection_status;
|
|
}
|
|
|
|
START_TEST(test_one)
|
|
{
|
|
{
|
|
TOX_ERR_OPTIONS_NEW o_err;
|
|
struct Tox_Options *o1 = tox_options_new(&o_err);
|
|
struct Tox_Options o2;
|
|
tox_options_default(&o2);
|
|
ck_assert_msg(o_err == TOX_ERR_OPTIONS_NEW_OK, "tox_options_new wrong error");
|
|
ck_assert_msg(memcmp(o1, &o2, sizeof(struct Tox_Options)) == 0, "tox_options_new error");
|
|
tox_options_free(o1);
|
|
}
|
|
|
|
Tox *tox1 = tox_new(0, 0);
|
|
Tox *tox2 = tox_new(0, 0);
|
|
|
|
{
|
|
TOX_ERR_GET_PORT error;
|
|
ck_assert_msg(tox_self_get_udp_port(tox1, &error) == 33445, "First Tox instance did not bind to udp port 33445.\n");
|
|
ck_assert_msg(error == TOX_ERR_GET_PORT_OK, "wrong error");
|
|
}
|
|
|
|
uint8_t address[TOX_ADDRESS_SIZE];
|
|
tox_self_get_address(tox1, address);
|
|
TOX_ERR_FRIEND_ADD error;
|
|
uint32_t ret = tox_friend_add(tox1, address, (uint8_t *)"m", 1, &error);
|
|
ck_assert_msg(ret == UINT32_MAX && error == TOX_ERR_FRIEND_ADD_OWN_KEY, "Adding own address worked.");
|
|
|
|
tox_self_get_address(tox2, address);
|
|
uint8_t message[TOX_MAX_FRIEND_REQUEST_LENGTH + 1];
|
|
ret = tox_friend_add(tox1, address, NULL, 0, &error);
|
|
ck_assert_msg(ret == UINT32_MAX && error == TOX_ERR_FRIEND_ADD_NULL, "Sending request with no message worked.");
|
|
ret = tox_friend_add(tox1, address, message, 0, &error);
|
|
ck_assert_msg(ret == UINT32_MAX && error == TOX_ERR_FRIEND_ADD_NO_MESSAGE, "Sending request with no message worked.");
|
|
ret = tox_friend_add(tox1, address, message, sizeof(message), &error);
|
|
ck_assert_msg(ret == UINT32_MAX && error == TOX_ERR_FRIEND_ADD_TOO_LONG,
|
|
"TOX_MAX_FRIEND_REQUEST_LENGTH is too big.");
|
|
|
|
address[0]++;
|
|
ret = tox_friend_add(tox1, address, (uint8_t *)"m", 1, &error);
|
|
ck_assert_msg(ret == UINT32_MAX && error == TOX_ERR_FRIEND_ADD_BAD_CHECKSUM,
|
|
"Adding address with bad checksum worked.");
|
|
|
|
tox_self_get_address(tox2, address);
|
|
ret = tox_friend_add(tox1, address, message, TOX_MAX_FRIEND_REQUEST_LENGTH, &error);
|
|
ck_assert_msg(ret == 0 && error == TOX_ERR_FRIEND_ADD_OK, "Failed to add friend.");
|
|
ret = tox_friend_add(tox1, address, message, TOX_MAX_FRIEND_REQUEST_LENGTH, &error);
|
|
ck_assert_msg(ret == UINT32_MAX && error == TOX_ERR_FRIEND_ADD_ALREADY_SENT, "Adding friend twice worked.");
|
|
|
|
uint8_t name[TOX_MAX_NAME_LENGTH];
|
|
int i;
|
|
|
|
for (i = 0; i < TOX_MAX_NAME_LENGTH; ++i) {
|
|
name[i] = rand();
|
|
}
|
|
|
|
tox_self_set_name(tox1, name, sizeof(name), 0);
|
|
ck_assert_msg(tox_self_get_name_size(tox1) == sizeof(name), "Can't set name of TOX_MAX_NAME_LENGTH");
|
|
|
|
tox_self_get_address(tox1, address);
|
|
size_t save_size = tox_get_savedata_size(tox1);
|
|
uint8_t data[save_size];
|
|
tox_get_savedata(tox1, data);
|
|
|
|
tox_kill(tox2);
|
|
TOX_ERR_NEW err_n;
|
|
|
|
struct Tox_Options options;
|
|
tox_options_default(&options);
|
|
options.savedata_type = TOX_SAVEDATA_TYPE_TOX_SAVE;
|
|
options.savedata_data = data;
|
|
options.savedata_length = save_size;
|
|
tox2 = tox_new(&options, &err_n);
|
|
ck_assert_msg(err_n == TOX_ERR_NEW_OK, "Load failed");
|
|
|
|
ck_assert_msg(tox_self_get_name_size(tox2) == sizeof name, "Wrong name size.");
|
|
|
|
uint8_t address2[TOX_ADDRESS_SIZE];
|
|
tox_self_get_address(tox2, address2);
|
|
ck_assert_msg(memcmp(address2, address, TOX_ADDRESS_SIZE) == 0, "Wrong address.");
|
|
uint8_t new_name[TOX_MAX_NAME_LENGTH] = { 0 };
|
|
tox_self_get_name(tox2, new_name);
|
|
ck_assert_msg(memcmp(name, new_name, TOX_MAX_NAME_LENGTH) == 0, "Wrong name");
|
|
|
|
uint8_t sk[TOX_SECRET_KEY_SIZE];
|
|
tox_self_get_secret_key(tox2, sk);
|
|
tox_kill(tox2);
|
|
|
|
tox_options_default(&options);
|
|
options.savedata_type = TOX_SAVEDATA_TYPE_SECRET_KEY;
|
|
options.savedata_data = sk;
|
|
options.savedata_length = sizeof(sk);
|
|
tox2 = tox_new(&options, &err_n);
|
|
ck_assert_msg(err_n == TOX_ERR_NEW_OK, "Load failed");
|
|
uint8_t address3[TOX_ADDRESS_SIZE];
|
|
tox_self_get_address(tox2, address3);
|
|
ck_assert_msg(memcmp(address3, address, TOX_PUBLIC_KEY_SIZE) == 0, "Wrong public key.");
|
|
uint8_t pk[TOX_PUBLIC_KEY_SIZE];
|
|
tox_self_get_public_key(tox2, pk);
|
|
ck_assert_msg(memcmp(pk, address, TOX_PUBLIC_KEY_SIZE) == 0, "Wrong public key.");
|
|
|
|
tox_kill(tox1);
|
|
tox_kill(tox2);
|
|
}
|
|
END_TEST
|
|
|
|
START_TEST(test_few_clients)
|
|
{
|
|
long long unsigned int con_time, cur_time = time(NULL);
|
|
TOX_ERR_NEW t_n_error;
|
|
Tox *tox1 = tox_new(0, &t_n_error);
|
|
ck_assert_msg(t_n_error == TOX_ERR_NEW_OK, "wrong error");
|
|
Tox *tox2 = tox_new(0, &t_n_error);
|
|
ck_assert_msg(t_n_error == TOX_ERR_NEW_OK, "wrong error");
|
|
Tox *tox3 = tox_new(0, &t_n_error);
|
|
ck_assert_msg(t_n_error == TOX_ERR_NEW_OK, "wrong error");
|
|
|
|
ck_assert_msg(tox1 || tox2 || tox3, "Failed to create 3 tox instances");
|
|
|
|
{
|
|
TOX_ERR_GET_PORT error;
|
|
ck_assert_msg(tox_self_get_udp_port(tox1, &error) == 33445, "First Tox instance did not bind to udp port 33445.\n");
|
|
ck_assert_msg(error == TOX_ERR_GET_PORT_OK, "wrong error");
|
|
}
|
|
|
|
{
|
|
TOX_ERR_GET_PORT error;
|
|
ck_assert_msg(tox_self_get_udp_port(tox2, &error) == 33446, "Second Tox instance did not bind to udp port 33446.\n");
|
|
ck_assert_msg(error == TOX_ERR_GET_PORT_OK, "wrong error");
|
|
}
|
|
|
|
{
|
|
TOX_ERR_GET_PORT error;
|
|
ck_assert_msg(tox_self_get_udp_port(tox3, &error) == 33447, "Third Tox instance did not bind to udp port 33447.\n");
|
|
ck_assert_msg(error == TOX_ERR_GET_PORT_OK, "wrong error");
|
|
}
|
|
|
|
uint32_t to_compare = 974536;
|
|
connected_t1 = 0;
|
|
tox_callback_self_connection_status(tox1, tox_connection_status);
|
|
tox_callback_friend_request(tox2, accept_friend_request, &to_compare);
|
|
uint8_t address[TOX_ADDRESS_SIZE];
|
|
tox_self_get_address(tox2, address);
|
|
uint32_t test = tox_friend_add(tox3, address, (uint8_t *)"Gentoo", 7, 0);
|
|
ck_assert_msg(test == 0, "Failed to add friend error code: %i", test);
|
|
|
|
uint8_t off = 1;
|
|
|
|
while (1) {
|
|
tox_iterate(tox1, &to_compare);
|
|
tox_iterate(tox2, &to_compare);
|
|
tox_iterate(tox3, &to_compare);
|
|
|
|
if (tox_self_get_connection_status(tox1) && tox_self_get_connection_status(tox2)
|
|
&& tox_self_get_connection_status(tox3)) {
|
|
if (off) {
|
|
printf("Toxes are online, took %llu seconds\n", time(NULL) - cur_time);
|
|
con_time = time(NULL);
|
|
off = 0;
|
|
}
|
|
|
|
if (tox_friend_get_connection_status(tox2, 0, 0) == TOX_CONNECTION_UDP
|
|
&& tox_friend_get_connection_status(tox3, 0, 0) == TOX_CONNECTION_UDP)
|
|
break;
|
|
}
|
|
|
|
c_sleep(50);
|
|
}
|
|
|
|
ck_assert_msg(connected_t1, "Tox1 isn't connected. %u", connected_t1);
|
|
printf("tox clients connected took %llu seconds\n", time(NULL) - con_time);
|
|
to_compare = 974536;
|
|
tox_callback_friend_message(tox3, print_message, &to_compare);
|
|
uint8_t msgs[TOX_MAX_MESSAGE_LENGTH + 1];
|
|
memset(msgs, 'G', sizeof(msgs));
|
|
TOX_ERR_FRIEND_SEND_MESSAGE errm;
|
|
tox_friend_send_message(tox2, 0, TOX_MESSAGE_TYPE_NORMAL, msgs, TOX_MAX_MESSAGE_LENGTH + 1, &errm);
|
|
ck_assert_msg(errm == TOX_ERR_FRIEND_SEND_MESSAGE_TOO_LONG, "TOX_MAX_MESSAGE_LENGTH is too small\n");
|
|
tox_friend_send_message(tox2, 0, TOX_MESSAGE_TYPE_NORMAL, msgs, TOX_MAX_MESSAGE_LENGTH, &errm);
|
|
ck_assert_msg(errm == TOX_ERR_FRIEND_SEND_MESSAGE_OK, "TOX_MAX_MESSAGE_LENGTH is too big\n");
|
|
|
|
while (1) {
|
|
messages_received = 0;
|
|
tox_iterate(tox1, &to_compare);
|
|
tox_iterate(tox2, &to_compare);
|
|
tox_iterate(tox3, &to_compare);
|
|
|
|
if (messages_received)
|
|
break;
|
|
|
|
c_sleep(50);
|
|
}
|
|
|
|
printf("tox clients messaging succeeded\n");
|
|
|
|
unsigned int save_size1 = tox_get_savedata_size(tox2);
|
|
ck_assert_msg(save_size1 != 0 && save_size1 < 4096, "save is invalid size %u", save_size1);
|
|
printf("%u\n", save_size1);
|
|
uint8_t save1[save_size1];
|
|
tox_get_savedata(tox2, save1);
|
|
tox_kill(tox2);
|
|
|
|
struct Tox_Options options;
|
|
tox_options_default(&options);
|
|
options.savedata_type = TOX_SAVEDATA_TYPE_TOX_SAVE;
|
|
options.savedata_data = save1;
|
|
options.savedata_length = save_size1;
|
|
tox2 = tox_new(&options, NULL);
|
|
cur_time = time(NULL);
|
|
off = 1;
|
|
|
|
while (1) {
|
|
tox_iterate(tox1, &to_compare);
|
|
tox_iterate(tox2, &to_compare);
|
|
tox_iterate(tox3, &to_compare);
|
|
|
|
if (tox_self_get_connection_status(tox1) && tox_self_get_connection_status(tox2)
|
|
&& tox_self_get_connection_status(tox3)) {
|
|
if (off) {
|
|
printf("Toxes are online again after reloading, took %llu seconds\n", time(NULL) - cur_time);
|
|
con_time = time(NULL);
|
|
off = 0;
|
|
}
|
|
|
|
if (tox_friend_get_connection_status(tox2, 0, 0) == TOX_CONNECTION_UDP
|
|
&& tox_friend_get_connection_status(tox3, 0, 0) == TOX_CONNECTION_UDP)
|
|
break;
|
|
}
|
|
|
|
c_sleep(50);
|
|
}
|
|
|
|
printf("tox clients connected took %llu seconds\n", time(NULL) - con_time);
|
|
tox_callback_friend_name(tox3, print_nickchange, &to_compare);
|
|
TOX_ERR_SET_INFO err_n;
|
|
bool succ = tox_self_set_name(tox2, (uint8_t *)"Gentoo", sizeof("Gentoo"), &err_n);
|
|
ck_assert_msg(succ && err_n == TOX_ERR_SET_INFO_OK, "tox_self_set_name failed because %u\n", err_n);
|
|
|
|
while (1) {
|
|
name_changes = 0;
|
|
tox_iterate(tox1, &to_compare);
|
|
tox_iterate(tox2, &to_compare);
|
|
tox_iterate(tox3, &to_compare);
|
|
|
|
if (name_changes)
|
|
break;
|
|
|
|
c_sleep(50);
|
|
}
|
|
|
|
ck_assert_msg(tox_friend_get_name_size(tox3, 0, 0) == sizeof("Gentoo"), "Name length not correct");
|
|
uint8_t temp_name[sizeof("Gentoo")];
|
|
tox_friend_get_name(tox3, 0, temp_name, 0);
|
|
ck_assert_msg(memcmp(temp_name, "Gentoo", sizeof("Gentoo")) == 0, "Name not correct");
|
|
|
|
tox_callback_friend_status_message(tox3, print_status_m_change, &to_compare);
|
|
succ = tox_self_set_status_message(tox2, (uint8_t *)"Installing Gentoo", sizeof("Installing Gentoo"), &err_n);
|
|
ck_assert_msg(succ && err_n == TOX_ERR_SET_INFO_OK, "tox_self_set_status_message failed because %u\n", err_n);
|
|
|
|
while (1) {
|
|
status_m_changes = 0;
|
|
tox_iterate(tox1, &to_compare);
|
|
tox_iterate(tox2, &to_compare);
|
|
tox_iterate(tox3, &to_compare);
|
|
|
|
if (status_m_changes)
|
|
break;
|
|
|
|
c_sleep(50);
|
|
}
|
|
|
|
ck_assert_msg(tox_friend_get_status_message_size(tox3, 0, 0) == sizeof("Installing Gentoo"),
|
|
"status message length not correct");
|
|
uint8_t temp_status_m[sizeof("Installing Gentoo")];
|
|
tox_friend_get_status_message(tox3, 0, temp_status_m, 0);
|
|
ck_assert_msg(memcmp(temp_status_m, "Installing Gentoo", sizeof("Installing Gentoo")) == 0,
|
|
"status message not correct");
|
|
|
|
tox_callback_friend_typing(tox2, &print_typingchange, &to_compare);
|
|
tox_self_set_typing(tox3, 0, 1, 0);
|
|
|
|
while (1) {
|
|
typing_changes = 0;
|
|
tox_iterate(tox1, &to_compare);
|
|
tox_iterate(tox2, &to_compare);
|
|
tox_iterate(tox3, &to_compare);
|
|
|
|
|
|
if (typing_changes == 2)
|
|
break;
|
|
else
|
|
ck_assert_msg(typing_changes == 0, "Typing fail");
|
|
|
|
c_sleep(50);
|
|
}
|
|
|
|
ck_assert_msg(tox_friend_get_typing(tox2, 0, 0) == 1, "Typing fail");
|
|
tox_self_set_typing(tox3, 0, 0, 0);
|
|
|
|
while (1) {
|
|
typing_changes = 0;
|
|
tox_iterate(tox1, &to_compare);
|
|
tox_iterate(tox2, &to_compare);
|
|
tox_iterate(tox3, &to_compare);
|
|
|
|
if (typing_changes == 1)
|
|
break;
|
|
else
|
|
ck_assert_msg(typing_changes == 0, "Typing fail");
|
|
|
|
c_sleep(50);
|
|
}
|
|
|
|
TOX_ERR_FRIEND_QUERY err_t;
|
|
ck_assert_msg(tox_friend_get_typing(tox2, 0, &err_t) == 0, "Typing fail");
|
|
ck_assert_msg(err_t == TOX_ERR_FRIEND_QUERY_OK, "Typing fail");
|
|
|
|
uint32_t packet_number = 160;
|
|
tox_callback_friend_lossless_packet(tox3, &handle_custom_packet, &packet_number);
|
|
uint8_t data_c[TOX_MAX_CUSTOM_PACKET_SIZE + 1];
|
|
memset(data_c, ((uint8_t)packet_number), sizeof(data_c));
|
|
int ret = tox_friend_send_lossless_packet(tox2, 0, data_c, sizeof(data_c), 0);
|
|
ck_assert_msg(ret == 0, "tox_friend_send_lossless_packet bigger fail %i", ret);
|
|
ret = tox_friend_send_lossless_packet(tox2, 0, data_c, TOX_MAX_CUSTOM_PACKET_SIZE, 0);
|
|
ck_assert_msg(ret == 1, "tox_friend_send_lossless_packet fail %i", ret);
|
|
|
|
while (1) {
|
|
custom_packet = 0;
|
|
tox_iterate(tox1, &to_compare);
|
|
tox_iterate(tox2, &to_compare);
|
|
tox_iterate(tox3, &to_compare);
|
|
|
|
if (custom_packet == 1)
|
|
break;
|
|
else
|
|
ck_assert_msg(custom_packet == 0, "Lossless packet fail");
|
|
|
|
c_sleep(50);
|
|
}
|
|
|
|
packet_number = 200;
|
|
tox_callback_friend_lossy_packet(tox3, &handle_custom_packet, &packet_number);
|
|
memset(data_c, ((uint8_t)packet_number), sizeof(data_c));
|
|
ret = tox_friend_send_lossy_packet(tox2, 0, data_c, sizeof(data_c), 0);
|
|
ck_assert_msg(ret == 0, "tox_friend_send_lossy_packet bigger fail %i", ret);
|
|
ret = tox_friend_send_lossy_packet(tox2, 0, data_c, TOX_MAX_CUSTOM_PACKET_SIZE, 0);
|
|
ck_assert_msg(ret == 1, "tox_friend_send_lossy_packet fail %i", ret);
|
|
|
|
while (1) {
|
|
custom_packet = 0;
|
|
tox_iterate(tox1, &to_compare);
|
|
tox_iterate(tox2, &to_compare);
|
|
tox_iterate(tox3, &to_compare);
|
|
|
|
if (custom_packet == 1)
|
|
break;
|
|
else
|
|
ck_assert_msg(custom_packet == 0, "lossy packet fail");
|
|
|
|
c_sleep(50);
|
|
}
|
|
|
|
printf("Starting file transfer test.\n");
|
|
|
|
file_accepted = file_size = file_recv = sendf_ok = size_recv = 0;
|
|
max_sending = UINT64_MAX;
|
|
long long unsigned int f_time = time(NULL);
|
|
tox_callback_file_recv_chunk(tox3, write_file, &to_compare);
|
|
tox_callback_file_recv_control(tox2, file_print_control, &to_compare);
|
|
tox_callback_file_chunk_request(tox2, tox_file_chunk_request, &to_compare);
|
|
tox_callback_file_recv_control(tox3, file_print_control, &to_compare);
|
|
tox_callback_file_recv(tox3, tox_file_receive, &to_compare);
|
|
uint64_t totalf_size = 100 * 1024 * 1024;
|
|
uint32_t fnum = tox_file_send(tox2, 0, TOX_FILE_KIND_DATA, totalf_size, 0, (uint8_t *)"Gentoo.exe",
|
|
sizeof("Gentoo.exe"), 0);
|
|
ck_assert_msg(fnum != UINT32_MAX, "tox_new_file_sender fail");
|
|
|
|
TOX_ERR_FILE_GET gfierr;
|
|
ck_assert_msg(!tox_file_get_file_id(tox2, 1, fnum, file_cmp_id, &gfierr), "tox_file_get_file_id didn't fail");
|
|
ck_assert_msg(gfierr == TOX_ERR_FILE_GET_FRIEND_NOT_FOUND, "wrong error");
|
|
ck_assert_msg(!tox_file_get_file_id(tox2, 0, fnum + 1, file_cmp_id, &gfierr), "tox_file_get_file_id didn't fail");
|
|
ck_assert_msg(gfierr == TOX_ERR_FILE_GET_NOT_FOUND, "wrong error");
|
|
ck_assert_msg(tox_file_get_file_id(tox2, 0, fnum, file_cmp_id, &gfierr), "tox_file_get_file_id failed");
|
|
ck_assert_msg(gfierr == TOX_ERR_FILE_GET_OK, "wrong error");
|
|
|
|
while (1) {
|
|
tox_iterate(tox1, &to_compare);
|
|
tox_iterate(tox2, &to_compare);
|
|
tox_iterate(tox3, &to_compare);
|
|
|
|
if (file_sending_done) {
|
|
if (sendf_ok && file_recv && totalf_size == file_size && size_recv == file_size && sending_pos == size_recv
|
|
&& file_accepted == 1) {
|
|
break;
|
|
} else {
|
|
ck_abort_msg("Something went wrong in file transfer %u %u %u %u %u %u %llu %llu %llu", sendf_ok, file_recv,
|
|
totalf_size == file_size, size_recv == file_size, sending_pos == size_recv, file_accepted == 1, totalf_size, size_recv,
|
|
sending_pos);
|
|
}
|
|
}
|
|
|
|
uint32_t tox1_interval = tox_iteration_interval(tox1);
|
|
uint32_t tox2_interval = tox_iteration_interval(tox2);
|
|
uint32_t tox3_interval = tox_iteration_interval(tox3);
|
|
|
|
if (tox2_interval > tox3_interval) {
|
|
c_sleep(tox3_interval);
|
|
} else {
|
|
c_sleep(tox2_interval);
|
|
}
|
|
}
|
|
|
|
printf("100MB file sent in %llu seconds\n", time(NULL) - f_time);
|
|
|
|
printf("Starting file streaming transfer test.\n");
|
|
|
|
file_sending_done = file_accepted = file_size = file_recv = sendf_ok = size_recv = 0;
|
|
f_time = time(NULL);
|
|
tox_callback_file_recv_chunk(tox3, write_file, &to_compare);
|
|
tox_callback_file_recv_control(tox2, file_print_control, &to_compare);
|
|
tox_callback_file_chunk_request(tox2, tox_file_chunk_request, &to_compare);
|
|
tox_callback_file_recv_control(tox3, file_print_control, &to_compare);
|
|
tox_callback_file_recv(tox3, tox_file_receive, &to_compare);
|
|
totalf_size = UINT64_MAX;
|
|
fnum = tox_file_send(tox2, 0, TOX_FILE_KIND_DATA, totalf_size, 0, (uint8_t *)"Gentoo.exe", sizeof("Gentoo.exe"), 0);
|
|
ck_assert_msg(fnum != UINT32_MAX, "tox_new_file_sender fail");
|
|
|
|
ck_assert_msg(!tox_file_get_file_id(tox2, 1, fnum, file_cmp_id, &gfierr), "tox_file_get_file_id didn't fail");
|
|
ck_assert_msg(gfierr == TOX_ERR_FILE_GET_FRIEND_NOT_FOUND, "wrong error");
|
|
ck_assert_msg(!tox_file_get_file_id(tox2, 0, fnum + 1, file_cmp_id, &gfierr), "tox_file_get_file_id didn't fail");
|
|
ck_assert_msg(gfierr == TOX_ERR_FILE_GET_NOT_FOUND, "wrong error");
|
|
ck_assert_msg(tox_file_get_file_id(tox2, 0, fnum, file_cmp_id, &gfierr), "tox_file_get_file_id failed");
|
|
ck_assert_msg(gfierr == TOX_ERR_FILE_GET_OK, "wrong error");
|
|
|
|
max_sending = 100 * 1024;
|
|
m_send_reached = 0;
|
|
|
|
while (1) {
|
|
tox_iterate(tox1, &to_compare);
|
|
tox_iterate(tox2, &to_compare);
|
|
tox_iterate(tox3, &to_compare);
|
|
|
|
if (file_sending_done) {
|
|
if (sendf_ok && file_recv && m_send_reached && totalf_size == file_size && size_recv == max_sending
|
|
&& sending_pos == size_recv && file_accepted == 1) {
|
|
break;
|
|
} else {
|
|
ck_abort_msg("Something went wrong in file transfer %u %u %u %u %u %u %u %llu %llu %llu %llu", sendf_ok, file_recv,
|
|
m_send_reached, totalf_size == file_size, size_recv == max_sending, sending_pos == size_recv, file_accepted == 1,
|
|
totalf_size, file_size,
|
|
size_recv, sending_pos);
|
|
}
|
|
}
|
|
|
|
uint32_t tox1_interval = tox_iteration_interval(tox1);
|
|
uint32_t tox2_interval = tox_iteration_interval(tox2);
|
|
uint32_t tox3_interval = tox_iteration_interval(tox3);
|
|
|
|
if (tox2_interval > tox3_interval) {
|
|
c_sleep(tox3_interval);
|
|
} else {
|
|
c_sleep(tox2_interval);
|
|
}
|
|
}
|
|
|
|
printf("Starting file 0 transfer test.\n");
|
|
|
|
file_sending_done = file_accepted = file_size = file_recv = sendf_ok = size_recv = 0;
|
|
f_time = time(NULL);
|
|
tox_callback_file_recv_chunk(tox3, write_file, &to_compare);
|
|
tox_callback_file_recv_control(tox2, file_print_control, &to_compare);
|
|
tox_callback_file_chunk_request(tox2, tox_file_chunk_request, &to_compare);
|
|
tox_callback_file_recv_control(tox3, file_print_control, &to_compare);
|
|
tox_callback_file_recv(tox3, tox_file_receive, &to_compare);
|
|
totalf_size = 0;
|
|
fnum = tox_file_send(tox2, 0, TOX_FILE_KIND_DATA, totalf_size, 0, (uint8_t *)"Gentoo.exe", sizeof("Gentoo.exe"), 0);
|
|
ck_assert_msg(fnum != UINT32_MAX, "tox_new_file_sender fail");
|
|
|
|
ck_assert_msg(!tox_file_get_file_id(tox2, 1, fnum, file_cmp_id, &gfierr), "tox_file_get_file_id didn't fail");
|
|
ck_assert_msg(gfierr == TOX_ERR_FILE_GET_FRIEND_NOT_FOUND, "wrong error");
|
|
ck_assert_msg(!tox_file_get_file_id(tox2, 0, fnum + 1, file_cmp_id, &gfierr), "tox_file_get_file_id didn't fail");
|
|
ck_assert_msg(gfierr == TOX_ERR_FILE_GET_NOT_FOUND, "wrong error");
|
|
ck_assert_msg(tox_file_get_file_id(tox2, 0, fnum, file_cmp_id, &gfierr), "tox_file_get_file_id failed");
|
|
ck_assert_msg(gfierr == TOX_ERR_FILE_GET_OK, "wrong error");
|
|
|
|
|
|
while (1) {
|
|
tox_iterate(tox1, &to_compare);
|
|
tox_iterate(tox2, &to_compare);
|
|
tox_iterate(tox3, &to_compare);
|
|
|
|
if (file_sending_done) {
|
|
if (sendf_ok && file_recv && totalf_size == file_size && size_recv == file_size && sending_pos == size_recv
|
|
&& file_accepted == 1) {
|
|
break;
|
|
} else {
|
|
ck_abort_msg("Something went wrong in file transfer %u %u %u %u %u %u %llu %llu %llu", sendf_ok, file_recv,
|
|
totalf_size == file_size, size_recv == file_size, sending_pos == size_recv, file_accepted == 1, totalf_size, size_recv,
|
|
sending_pos);
|
|
}
|
|
}
|
|
|
|
uint32_t tox1_interval = tox_iteration_interval(tox1);
|
|
uint32_t tox2_interval = tox_iteration_interval(tox2);
|
|
uint32_t tox3_interval = tox_iteration_interval(tox3);
|
|
|
|
if (tox2_interval > tox3_interval) {
|
|
c_sleep(tox3_interval);
|
|
} else {
|
|
c_sleep(tox2_interval);
|
|
}
|
|
}
|
|
|
|
printf("test_few_clients succeeded, took %llu seconds\n", time(NULL) - cur_time);
|
|
|
|
tox_kill(tox1);
|
|
tox_kill(tox2);
|
|
tox_kill(tox3);
|
|
}
|
|
END_TEST
|
|
|
|
#define NUM_TOXES 90
|
|
#define NUM_FRIENDS 50
|
|
|
|
START_TEST(test_many_clients)
|
|
{
|
|
long long unsigned int cur_time = time(NULL);
|
|
Tox *toxes[NUM_TOXES];
|
|
uint32_t i, j;
|
|
uint32_t to_comp = 974536;
|
|
|
|
for (i = 0; i < NUM_TOXES; ++i) {
|
|
toxes[i] = tox_new(0, 0);
|
|
ck_assert_msg(toxes[i] != 0, "Failed to create tox instances %u", i);
|
|
tox_callback_friend_request(toxes[i], accept_friend_request, &to_comp);
|
|
}
|
|
|
|
{
|
|
TOX_ERR_GET_PORT error;
|
|
ck_assert_msg(tox_self_get_udp_port(toxes[0], &error) == 33445, "First Tox instance did not bind to udp port 33445.\n");
|
|
ck_assert_msg(error == TOX_ERR_GET_PORT_OK, "wrong error");
|
|
}
|
|
|
|
struct {
|
|
uint16_t tox1;
|
|
uint16_t tox2;
|
|
} pairs[NUM_FRIENDS];
|
|
|
|
uint8_t address[TOX_ADDRESS_SIZE];
|
|
|
|
unsigned int num_f = 0;
|
|
|
|
for (i = 0; i < NUM_TOXES; ++i) {
|
|
num_f += tox_self_get_friend_list_size(toxes[i]);
|
|
}
|
|
|
|
ck_assert_msg(num_f == 0, "bad num friends: %u", num_f);
|
|
|
|
for (i = 0; i < NUM_FRIENDS; ++i) {
|
|
loop_top:
|
|
pairs[i].tox1 = rand() % NUM_TOXES;
|
|
pairs[i].tox2 = (pairs[i].tox1 + rand() % (NUM_TOXES - 1) + 1) % NUM_TOXES;
|
|
|
|
for (j = 0; j < i; ++j) {
|
|
if (pairs[j].tox2 == pairs[i].tox1 && pairs[j].tox1 == pairs[i].tox2)
|
|
goto loop_top;
|
|
}
|
|
|
|
tox_self_get_address(toxes[pairs[i].tox1], address);
|
|
|
|
TOX_ERR_FRIEND_ADD test;
|
|
uint32_t num = tox_friend_add(toxes[pairs[i].tox2], address, (uint8_t *)"Gentoo", 7, &test);
|
|
|
|
if (test == TOX_ERR_FRIEND_ADD_ALREADY_SENT) {
|
|
goto loop_top;
|
|
}
|
|
|
|
ck_assert_msg(num != UINT32_MAX && test == TOX_ERR_FRIEND_ADD_OK, "Failed to add friend error code: %i", test);
|
|
}
|
|
|
|
for (i = 0; i < NUM_TOXES; ++i) {
|
|
num_f += tox_self_get_friend_list_size(toxes[i]);
|
|
}
|
|
|
|
ck_assert_msg(num_f == NUM_FRIENDS, "bad num friends: %u", num_f);
|
|
|
|
while (1) {
|
|
uint16_t counter = 0;
|
|
|
|
for (i = 0; i < NUM_TOXES; ++i) {
|
|
for (j = 0; j < tox_self_get_friend_list_size(toxes[i]); ++j)
|
|
if (tox_friend_get_connection_status(toxes[i], j, 0) == TOX_CONNECTION_UDP)
|
|
++counter;
|
|
}
|
|
|
|
if (counter == NUM_FRIENDS * 2) {
|
|
break;
|
|
}
|
|
|
|
for (i = 0; i < NUM_TOXES; ++i) {
|
|
tox_iterate(toxes[i], NULL);
|
|
}
|
|
|
|
c_sleep(50);
|
|
}
|
|
|
|
for (i = 0; i < NUM_TOXES; ++i) {
|
|
tox_kill(toxes[i]);
|
|
}
|
|
|
|
printf("test_many_clients succeeded, took %llu seconds\n", time(NULL) - cur_time);
|
|
}
|
|
END_TEST
|
|
|
|
#define NUM_TOXES_TCP 40
|
|
#define TCP_RELAY_PORT 33448
|
|
|
|
START_TEST(test_many_clients_tcp)
|
|
{
|
|
long long unsigned int cur_time = time(NULL);
|
|
Tox *toxes[NUM_TOXES_TCP];
|
|
uint32_t i, j;
|
|
uint32_t to_comp = 974536;
|
|
|
|
for (i = 0; i < NUM_TOXES_TCP; ++i) {
|
|
struct Tox_Options opts;
|
|
tox_options_default(&opts);
|
|
|
|
if (i == 0) {
|
|
opts.tcp_port = TCP_RELAY_PORT;
|
|
} else {
|
|
opts.udp_enabled = 0;
|
|
}
|
|
|
|
toxes[i] = tox_new(&opts, 0);
|
|
ck_assert_msg(toxes[i] != 0, "Failed to create tox instances %u", i);
|
|
tox_callback_friend_request(toxes[i], accept_friend_request, &to_comp);
|
|
uint8_t dpk[TOX_PUBLIC_KEY_SIZE];
|
|
tox_self_get_dht_id(toxes[0], dpk);
|
|
TOX_ERR_BOOTSTRAP error = 0;
|
|
ck_assert_msg(tox_add_tcp_relay(toxes[i], TOX_LOCALHOST, TCP_RELAY_PORT, dpk, &error), "add relay error, %i, %i", i,
|
|
error);
|
|
ck_assert_msg(tox_bootstrap(toxes[i], TOX_LOCALHOST, 33445, dpk, 0), "Bootstrap error");
|
|
}
|
|
|
|
{
|
|
TOX_ERR_GET_PORT error;
|
|
ck_assert_msg(tox_self_get_udp_port(toxes[0], &error) == 33445, "First Tox instance did not bind to udp port 33445.\n");
|
|
ck_assert_msg(error == TOX_ERR_GET_PORT_OK, "wrong error");
|
|
ck_assert_msg(tox_self_get_tcp_port(toxes[0], &error) == TCP_RELAY_PORT,
|
|
"First Tox instance did not bind to tcp port %u.\n", TCP_RELAY_PORT);
|
|
ck_assert_msg(error == TOX_ERR_GET_PORT_OK, "wrong error");
|
|
}
|
|
|
|
struct {
|
|
uint16_t tox1;
|
|
uint16_t tox2;
|
|
} pairs[NUM_FRIENDS];
|
|
|
|
uint8_t address[TOX_ADDRESS_SIZE];
|
|
|
|
for (i = 0; i < NUM_FRIENDS; ++i) {
|
|
loop_top:
|
|
pairs[i].tox1 = rand() % NUM_TOXES_TCP;
|
|
pairs[i].tox2 = (pairs[i].tox1 + rand() % (NUM_TOXES_TCP - 1) + 1) % NUM_TOXES_TCP;
|
|
|
|
for (j = 0; j < i; ++j) {
|
|
if (pairs[j].tox2 == pairs[i].tox1 && pairs[j].tox1 == pairs[i].tox2)
|
|
goto loop_top;
|
|
}
|
|
|
|
tox_self_get_address(toxes[pairs[i].tox1], address);
|
|
|
|
TOX_ERR_FRIEND_ADD test;
|
|
uint32_t num = tox_friend_add(toxes[pairs[i].tox2], address, (uint8_t *)"Gentoo", 7, &test);
|
|
|
|
if (test == TOX_ERR_FRIEND_ADD_ALREADY_SENT) {
|
|
goto loop_top;
|
|
}
|
|
|
|
ck_assert_msg(num != UINT32_MAX && test == TOX_ERR_FRIEND_ADD_OK, "Failed to add friend error code: %i", test);
|
|
}
|
|
|
|
while (1) {
|
|
uint16_t counter = 0, cc = 0;
|
|
|
|
for (i = 0; i < NUM_TOXES_TCP; ++i) {
|
|
for (j = 0; j < tox_self_get_friend_list_size(toxes[i]); ++j)
|
|
if (tox_friend_get_connection_status(toxes[i], j, 0) == TOX_CONNECTION_TCP)
|
|
++counter;
|
|
|
|
}
|
|
|
|
if (counter == NUM_FRIENDS * 2) {
|
|
break;
|
|
}
|
|
|
|
for (i = 0; i < NUM_TOXES_TCP; ++i) {
|
|
tox_iterate(toxes[i], NULL);
|
|
}
|
|
|
|
c_sleep(50);
|
|
}
|
|
|
|
for (i = 0; i < NUM_TOXES_TCP; ++i) {
|
|
tox_kill(toxes[i]);
|
|
}
|
|
|
|
printf("test_many_clients_tcp succeeded, took %llu seconds\n", time(NULL) - cur_time);
|
|
}
|
|
END_TEST
|
|
|
|
#define NUM_TCP_RELAYS 3
|
|
|
|
START_TEST(test_many_clients_tcp_b)
|
|
{
|
|
long long unsigned int cur_time = time(NULL);
|
|
Tox *toxes[NUM_TOXES_TCP];
|
|
uint32_t i, j;
|
|
uint32_t to_comp = 974536;
|
|
|
|
for (i = 0; i < NUM_TOXES_TCP; ++i) {
|
|
struct Tox_Options opts;
|
|
tox_options_default(&opts);
|
|
|
|
if (i < NUM_TCP_RELAYS) {
|
|
opts.tcp_port = TCP_RELAY_PORT + i;
|
|
} else {
|
|
opts.udp_enabled = 0;
|
|
}
|
|
|
|
toxes[i] = tox_new(&opts, 0);
|
|
ck_assert_msg(toxes[i] != 0, "Failed to create tox instances %u", i);
|
|
tox_callback_friend_request(toxes[i], accept_friend_request, &to_comp);
|
|
uint8_t dpk[TOX_PUBLIC_KEY_SIZE];
|
|
tox_self_get_dht_id(toxes[(i % NUM_TCP_RELAYS)], dpk);
|
|
ck_assert_msg(tox_add_tcp_relay(toxes[i], TOX_LOCALHOST, TCP_RELAY_PORT + (i % NUM_TCP_RELAYS), dpk, 0),
|
|
"add relay error");
|
|
tox_self_get_dht_id(toxes[0], dpk);
|
|
ck_assert_msg(tox_bootstrap(toxes[i], TOX_LOCALHOST, 33445, dpk, 0), "Bootstrap error");
|
|
}
|
|
|
|
{
|
|
TOX_ERR_GET_PORT error;
|
|
ck_assert_msg(tox_self_get_udp_port(toxes[0], &error) == 33445, "First Tox instance did not bind to udp port 33445.\n");
|
|
ck_assert_msg(error == TOX_ERR_GET_PORT_OK, "wrong error");
|
|
ck_assert_msg(tox_self_get_tcp_port(toxes[0], &error) == TCP_RELAY_PORT,
|
|
"First Tox instance did not bind to tcp port %u.\n", TCP_RELAY_PORT);
|
|
ck_assert_msg(error == TOX_ERR_GET_PORT_OK, "wrong error");
|
|
}
|
|
|
|
struct {
|
|
uint16_t tox1;
|
|
uint16_t tox2;
|
|
} pairs[NUM_FRIENDS];
|
|
|
|
uint8_t address[TOX_ADDRESS_SIZE];
|
|
|
|
for (i = 0; i < NUM_FRIENDS; ++i) {
|
|
loop_top:
|
|
pairs[i].tox1 = rand() % NUM_TOXES_TCP;
|
|
pairs[i].tox2 = (pairs[i].tox1 + rand() % (NUM_TOXES_TCP - 1) + 1) % NUM_TOXES_TCP;
|
|
|
|
for (j = 0; j < i; ++j) {
|
|
if (pairs[j].tox2 == pairs[i].tox1 && pairs[j].tox1 == pairs[i].tox2)
|
|
goto loop_top;
|
|
}
|
|
|
|
tox_self_get_address(toxes[pairs[i].tox1], address);
|
|
|
|
TOX_ERR_FRIEND_ADD test;
|
|
uint32_t num = tox_friend_add(toxes[pairs[i].tox2], address, (uint8_t *)"Gentoo", 7, &test);
|
|
|
|
if (test == TOX_ERR_FRIEND_ADD_ALREADY_SENT) {
|
|
goto loop_top;
|
|
}
|
|
|
|
ck_assert_msg(num != UINT32_MAX && test == TOX_ERR_FRIEND_ADD_OK, "Failed to add friend error code: %i", test);
|
|
}
|
|
|
|
while (1) {
|
|
uint16_t counter = 0;
|
|
|
|
for (i = 0; i < NUM_TOXES_TCP; ++i) {
|
|
for (j = 0; j < tox_self_get_friend_list_size(toxes[i]); ++j)
|
|
if (tox_friend_get_connection_status(toxes[i], j, 0) == TOX_CONNECTION_TCP)
|
|
++counter;
|
|
}
|
|
|
|
if (counter == NUM_FRIENDS * 2) {
|
|
break;
|
|
}
|
|
|
|
for (i = 0; i < NUM_TOXES_TCP; ++i) {
|
|
tox_iterate(toxes[i], NULL);
|
|
}
|
|
|
|
c_sleep(30);
|
|
}
|
|
|
|
for (i = 0; i < NUM_TOXES_TCP; ++i) {
|
|
tox_kill(toxes[i]);
|
|
}
|
|
|
|
printf("test_many_clients_tcp_b succeeded, took %llu seconds\n", time(NULL) - cur_time);
|
|
}
|
|
END_TEST
|
|
|
|
|
|
#define NUM_GROUP_TOX 32
|
|
|
|
void g_accept_friend_request(Tox *m, const uint8_t *public_key, const uint8_t *data, size_t length, void *userdata)
|
|
{
|
|
if (*((uint32_t *)userdata) != 234212)
|
|
return;
|
|
|
|
if (length == 7 && memcmp("Gentoo", data, 7) == 0) {
|
|
tox_friend_add_norequest(m, public_key, 0);
|
|
}
|
|
}
|
|
|
|
static Tox *invite_tox;
|
|
static unsigned int invite_counter;
|
|
|
|
void print_group_invite_callback(Tox *tox, int32_t friendnumber, uint8_t type, const uint8_t *data, uint16_t length,
|
|
void *userdata)
|
|
{
|
|
if (*((uint32_t *)userdata) != 234212)
|
|
return;
|
|
|
|
if (type != TOX_GROUPCHAT_TYPE_TEXT)
|
|
return;
|
|
|
|
int g_num;
|
|
|
|
if ((g_num = tox_join_groupchat(tox, friendnumber, data, length)) == -1)
|
|
return;
|
|
|
|
ck_assert_msg(g_num == 0, "Group number was not 0");
|
|
ck_assert_msg(tox_join_groupchat(tox, friendnumber, data, length) == -1,
|
|
"Joining groupchat twice should be impossible.");
|
|
|
|
invite_tox = tox;
|
|
invite_counter = 4;
|
|
}
|
|
|
|
static unsigned int num_recv;
|
|
|
|
void print_group_message(Tox *tox, int groupnumber, int peernumber, const uint8_t *message, uint16_t length,
|
|
void *userdata)
|
|
{
|
|
if (*((uint32_t *)userdata) != 234212)
|
|
return;
|
|
|
|
if (length == (sizeof("Install Gentoo") - 1) && memcmp(message, "Install Gentoo", sizeof("Install Gentoo") - 1) == 0) {
|
|
++num_recv;
|
|
}
|
|
}
|
|
|
|
START_TEST(test_many_group)
|
|
{
|
|
long long unsigned int cur_time = time(NULL);
|
|
Tox *toxes[NUM_GROUP_TOX];
|
|
unsigned int i, j, k;
|
|
uint32_t to_comp = 234212;
|
|
int test_run = 0;
|
|
|
|
group_test_restart:
|
|
|
|
for (i = 0; i < NUM_GROUP_TOX; ++i) {
|
|
toxes[i] = tox_new(0, 0);
|
|
ck_assert_msg(toxes[i] != 0, "Failed to create tox instances %u", i);
|
|
tox_callback_friend_request(toxes[i], &g_accept_friend_request, &to_comp);
|
|
tox_callback_group_invite(toxes[i], &print_group_invite_callback, &to_comp);
|
|
}
|
|
|
|
{
|
|
TOX_ERR_GET_PORT error;
|
|
ck_assert_msg(tox_self_get_udp_port(toxes[0], &error) == 33445, "First Tox instance did not bind to udp port 33445.\n");
|
|
ck_assert_msg(error == TOX_ERR_GET_PORT_OK, "wrong error");
|
|
}
|
|
|
|
uint8_t address[TOX_ADDRESS_SIZE];
|
|
tox_self_get_address(toxes[NUM_GROUP_TOX - 1], address);
|
|
|
|
for (i = 0; i < NUM_GROUP_TOX; ++i) {
|
|
ck_assert_msg(tox_friend_add(toxes[i], address, (uint8_t *)"Gentoo", 7, 0) == 0, "Failed to add friend");
|
|
|
|
tox_self_get_address(toxes[i], address);
|
|
}
|
|
|
|
while (1) {
|
|
for (i = 0; i < NUM_GROUP_TOX; ++i) {
|
|
if (tox_friend_get_connection_status(toxes[i], 0, 0) != TOX_CONNECTION_UDP) {
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (i == NUM_GROUP_TOX)
|
|
break;
|
|
|
|
for (i = 0; i < NUM_GROUP_TOX; ++i) {
|
|
tox_iterate(toxes[i], NULL);
|
|
}
|
|
|
|
c_sleep(25);
|
|
}
|
|
|
|
printf("friends connected, took %llu seconds\n", time(NULL) - cur_time);
|
|
|
|
ck_assert_msg(tox_add_groupchat(toxes[0]) != -1, "Failed to create group");
|
|
ck_assert_msg(tox_invite_friend(toxes[0], 0, 0) == 0, "Failed to invite friend");
|
|
ck_assert_msg(tox_group_set_title(toxes[0], 0, "Gentoo", sizeof("Gentoo") - 1) == 0, "Failed to set group title");
|
|
invite_counter = ~0;
|
|
|
|
unsigned int done = ~0;
|
|
done -= 5;
|
|
|
|
while (1) {
|
|
for (i = 0; i < NUM_GROUP_TOX; ++i) {
|
|
tox_iterate(toxes[i], NULL);
|
|
}
|
|
|
|
if (!invite_counter) {
|
|
ck_assert_msg(tox_invite_friend(invite_tox, 0, 0) == 0, "Failed to invite friend");
|
|
}
|
|
|
|
if (done == invite_counter) {
|
|
break;
|
|
}
|
|
|
|
--invite_counter;
|
|
c_sleep(50);
|
|
}
|
|
|
|
for (i = 0; i < NUM_GROUP_TOX; ++i) {
|
|
int num_peers = tox_group_number_peers(toxes[i], 0);
|
|
|
|
/**
|
|
* Group chats fail unpredictably, currently they'll rerun as many times
|
|
* as they need to until they pass the test, or the time out is reached
|
|
* Either way in this case it's fine */
|
|
if (num_peers != NUM_GROUP_TOX) {
|
|
++test_run;
|
|
printf("\tError starting up the first group, going to restart this test. This is attempt %i\n", test_run);
|
|
|
|
for (j = 0; j < NUM_GROUP_TOX; ++j) {
|
|
tox_kill(toxes[j]);
|
|
}
|
|
|
|
c_sleep(1000);
|
|
|
|
goto group_test_restart;
|
|
}
|
|
|
|
/**
|
|
* This check will never fail because it'll jump before this event
|
|
* I've decided to leave it in because eventually, we may want to only
|
|
* restart this test once, in which case this check will become
|
|
* important again.
|
|
*/
|
|
ck_assert_msg(num_peers == NUM_GROUP_TOX, "\n\tBad number of group peers (pre check)."
|
|
"\n\t\t\tExpected: %u but tox_instance(%u) only has: %i\n\n",
|
|
NUM_GROUP_TOX, i, num_peers);
|
|
|
|
uint8_t title[2048];
|
|
int ret = tox_group_get_title(toxes[i], 0, title, sizeof(title));
|
|
ck_assert_msg(ret == sizeof("Gentoo") - 1, "Wrong title length");
|
|
ck_assert_msg(memcmp("Gentoo", title, ret) == 0, "Wrong title");
|
|
}
|
|
|
|
printf("group connected\n");
|
|
|
|
for (i = 0; i < NUM_GROUP_TOX; ++i) {
|
|
tox_callback_group_message(toxes[i], &print_group_message, &to_comp);
|
|
}
|
|
|
|
ck_assert_msg(tox_group_message_send(toxes[rand() % NUM_GROUP_TOX], 0, (uint8_t *)"Install Gentoo",
|
|
sizeof("Install Gentoo") - 1) == 0, "Failed to send group message.");
|
|
num_recv = 0;
|
|
|
|
for (j = 0; j < 20; ++j) {
|
|
for (i = 0; i < NUM_GROUP_TOX; ++i) {
|
|
tox_iterate(toxes[i], NULL);
|
|
}
|
|
|
|
c_sleep(25);
|
|
}
|
|
|
|
c_sleep(25);
|
|
ck_assert_msg(num_recv == NUM_GROUP_TOX, "Failed to recv group messages.");
|
|
|
|
for (k = NUM_GROUP_TOX; k != 0 ; --k) {
|
|
tox_del_groupchat(toxes[k - 1], 0);
|
|
|
|
for (j = 0; j < 10; ++j) {
|
|
for (i = 0; i < NUM_GROUP_TOX; ++i) {
|
|
tox_iterate(toxes[i], NULL);
|
|
}
|
|
|
|
c_sleep(50);
|
|
}
|
|
|
|
for (i = 0; i < (k - 1); ++i) {
|
|
int num_peers = tox_group_number_peers(toxes[i], 0);
|
|
ck_assert_msg(num_peers == (k - 1), "\n\tBad number of group peers (post check)."
|
|
"\n\t\t\tExpected: %u but tox_instance(%u) only has: %i\n\n",
|
|
(k - 1), i, num_peers);
|
|
}
|
|
}
|
|
|
|
for (i = 0; i < NUM_GROUP_TOX; ++i) {
|
|
tox_kill(toxes[i]);
|
|
}
|
|
|
|
printf("test_many_group succeeded, took %llu seconds\n", time(NULL) - cur_time);
|
|
}
|
|
END_TEST
|
|
|
|
#ifdef TRAVIS_ENV
|
|
uint8_t timeout_mux = 100;
|
|
#else
|
|
uint8_t timeout_mux = 10;
|
|
#endif
|
|
|
|
Suite *tox_suite(void)
|
|
{
|
|
Suite *s = suite_create("Tox");
|
|
|
|
DEFTESTCASE(one);
|
|
DEFTESTCASE_SLOW(few_clients, 8 * timeout_mux);
|
|
DEFTESTCASE_SLOW(many_clients, 8 * timeout_mux);
|
|
|
|
/* Each tox connects to a single tox TCP */
|
|
DEFTESTCASE_SLOW(many_clients_tcp, 4 * timeout_mux);
|
|
|
|
/* Try to make a connection to each "older sibling" tox instance via TCP */
|
|
DEFTESTCASE_SLOW(many_clients_tcp_b, 8 * timeout_mux);
|
|
|
|
/* This test works VERY unreliably. So it's worthless in its current state.
|
|
* Anyone reading this is welcome to try to fix it, but because there is a
|
|
* new version of group chats for Tox already completed, and nearly ready to
|
|
* merge, No one is willing/available to give this test the time in needs */
|
|
#ifndef TRAVIS_ENV
|
|
DEFTESTCASE_SLOW(many_group, 80);
|
|
#endif
|
|
|
|
return s;
|
|
}
|
|
|
|
int main(int argc, char *argv[])
|
|
{
|
|
srand((unsigned int) time(NULL));
|
|
|
|
Suite *tox = tox_suite();
|
|
SRunner *test_runner = srunner_create(tox);
|
|
|
|
int number_failed = 0;
|
|
srunner_run_all(test_runner, CK_NORMAL);
|
|
number_failed = srunner_ntests_failed(test_runner);
|
|
|
|
srunner_free(test_runner);
|
|
|
|
return number_failed;
|
|
}
|
|
|