9ed2fa80d fix(toxav): remove extra copy of video frame on encode de30cf3ad docs: Add new file kinds, that should be useful to all clients. d5b5e879d fix(DHT): Correct node skipping logic timed out nodes. 30e71fe97 refactor: Generate event dispatch functions and add tox_events_dispatch. 8fdbb0b50 style: Format parameter lists in event handlers. d00dee12b refactor: Add warning logs when losing chat invites. b144e8db1 feat: Add a way to look up a file number by ID. 849281ea0 feat: Add a way to fetch groups by chat ID. a2c177396 refactor: Harden event system and improve type safety. 8f5caa656 refactor: Add MessagePack string support to bin_pack. 34e8d5ad5 chore: Add GitHub CodeQL workflow and local Docker runner. f7b068010 refactor: Add nullability annotations to event headers. 788abe651 refactor(toxav): Use system allocator for mutexes. 2e4b423eb refactor: Use specific typedefs for public API arrays. 2baf34775 docs(toxav): update idle iteration interval see 679444751876fa3882a717772918ebdc8f083354 2f87ac67b feat: Add Event Loop abstraction (Ev). f8dfc38d8 test: Fix data race in ToxScenario virtual_clock. 38313921e test(TCP): Add regression test for TCP priority queue integrity. f94a50d9a refactor(toxav): Replace mutable_mutex with dynamically allocated mutex. ad054511e refactor: Internalize DHT structs and add debug helpers. 8b467cc96 fix: Prevent potential integer overflow in group chat handshake. 4962bdbb8 test: Improve TCP simulation and add tests 5f0227093 refactor: Allow nullable data in group chat handlers. e97b18ea9 chore: Improve Windows Docker support. b14943bbd refactor: Move Logger out of Messenger into Tox. dd3136250 cleanup: Apply nullability qualifiers to C++ codebase. 1849f70fc refactor: Extract low-level networking code to net and os_network. 8fec75421 refactor: Delete tox_random, align on rng and os_random. a03ae8051 refactor: Delete tox_memory, align on mem and os_memory. 4c88fed2c refactor: Use `std::` prefixes more consistently in C++ code. 72452f2ae test: Add some more tests for onion and shared key cache. d5a51b09a cleanup: Use tox_attributes.h in tox_private.h and install it. b6f5b9fc5 test: Add some benchmarks for various high level things. 8a8d02785 test(support): Introduce threaded Tox runner and simulation barrier d68d1d095 perf(toxav): optimize audio and video intermediate buffers by keeping them around REVERT: c9cdae001 fix(toxav): remove extra copy of video frame on encode git-subtree-dir: external/toxcore/c-toxcore git-subtree-split: 9ed2fa80d582c714d6bdde6a7648220a92cddff8
179 lines
3.9 KiB
C++
179 lines
3.9 KiB
C++
// clang-format off
|
|
#include "../testing/support/public/simulated_environment.hh"
|
|
#include "network.h"
|
|
// clang-format on
|
|
|
|
#include <gtest/gtest.h>
|
|
|
|
#include <cstring>
|
|
|
|
#include "network_test_util.hh"
|
|
|
|
namespace {
|
|
|
|
TEST(SimulatedEnvironment, ProducesNonNullNetwork)
|
|
{
|
|
tox::test::SimulatedEnvironment env;
|
|
auto node = env.create_node(0);
|
|
struct Network net = node->c_network;
|
|
EXPECT_NE(net.funcs, nullptr);
|
|
EXPECT_NE(net.obj, nullptr);
|
|
}
|
|
|
|
TEST(IpNtoa, DoesntWriteOutOfBounds)
|
|
{
|
|
Ip_Ntoa ip_str;
|
|
IP ip;
|
|
ip.family = net_family_ipv6();
|
|
ip.ip.v6.uint64[0] = -1;
|
|
ip.ip.v6.uint64[1] = -1;
|
|
|
|
net_ip_ntoa(&ip, &ip_str);
|
|
|
|
EXPECT_EQ(std::string(ip_str.buf), "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff");
|
|
EXPECT_LT(std::string(ip_str.buf).length(), IP_NTOA_LEN);
|
|
}
|
|
|
|
TEST(IpNtoa, ReportsInvalidIpFamily)
|
|
{
|
|
Ip_Ntoa ip_str;
|
|
IP ip;
|
|
ip.family.value = 255 - net_family_ipv6().value;
|
|
ip.ip.v4.uint32 = 0;
|
|
|
|
net_ip_ntoa(&ip, &ip_str);
|
|
|
|
EXPECT_EQ(std::string(ip_str.buf), "(IP invalid, family 245)");
|
|
}
|
|
|
|
TEST(IpNtoa, FormatsIPv4)
|
|
{
|
|
Ip_Ntoa ip_str;
|
|
IP ip;
|
|
ip.family = net_family_ipv4();
|
|
ip.ip.v4.uint8[0] = 192;
|
|
ip.ip.v4.uint8[1] = 168;
|
|
ip.ip.v4.uint8[2] = 0;
|
|
ip.ip.v4.uint8[3] = 13;
|
|
|
|
net_ip_ntoa(&ip, &ip_str);
|
|
|
|
EXPECT_EQ(std::string(ip_str.buf), "192.168.0.13");
|
|
}
|
|
|
|
TEST(IpParseAddr, FormatsIPv4)
|
|
{
|
|
char ip_str[IP_NTOA_LEN];
|
|
IP ip;
|
|
ip.family = net_family_ipv4();
|
|
ip.ip.v4.uint8[0] = 192;
|
|
ip.ip.v4.uint8[1] = 168;
|
|
ip.ip.v4.uint8[2] = 0;
|
|
ip.ip.v4.uint8[3] = 13;
|
|
|
|
ip_parse_addr(&ip, ip_str, sizeof(ip_str));
|
|
|
|
EXPECT_EQ(std::string(ip_str), "192.168.0.13");
|
|
}
|
|
|
|
TEST(IpParseAddr, FormatsIPv6)
|
|
{
|
|
char ip_str[IP_NTOA_LEN];
|
|
IP ip;
|
|
ip.family = net_family_ipv6();
|
|
ip.ip.v6.uint64[0] = -1;
|
|
ip.ip.v6.uint64[1] = -1;
|
|
|
|
ip_parse_addr(&ip, ip_str, sizeof(ip_str));
|
|
|
|
EXPECT_EQ(std::string(ip_str), "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff");
|
|
}
|
|
|
|
TEST(IpportCmp, BehavesLikeMemcmp)
|
|
{
|
|
auto cmp_val = [](int val) { return val < 0 ? -1 : val > 0 ? 1 : 0; };
|
|
|
|
IP_Port a = {0};
|
|
IP_Port b = {0};
|
|
|
|
a.ip.family = net_family_ipv4();
|
|
b.ip.family = net_family_ipv4();
|
|
|
|
a.port = 10;
|
|
b.port = 20;
|
|
|
|
EXPECT_EQ( //
|
|
ipport_cmp_handler(&a, &b, sizeof(IP_Port)), -1)
|
|
<< "a=" << a << "\n"
|
|
<< "b=" << b;
|
|
EXPECT_EQ( //
|
|
ipport_cmp_handler(&a, &b, sizeof(IP_Port)), //
|
|
cmp_val(std::memcmp(&a, &b, sizeof(IP_Port))))
|
|
<< "a=" << a << "\n"
|
|
<< "b=" << b;
|
|
|
|
a.ip.ip.v4.uint8[0] = 192;
|
|
b.ip.ip.v4.uint8[0] = 10;
|
|
|
|
EXPECT_EQ( //
|
|
ipport_cmp_handler(&a, &b, sizeof(IP_Port)), 1)
|
|
<< "a=" << a << "\n"
|
|
<< "b=" << b;
|
|
EXPECT_EQ( //
|
|
ipport_cmp_handler(&a, &b, sizeof(IP_Port)), //
|
|
cmp_val(std::memcmp(&a, &b, sizeof(IP_Port))))
|
|
<< "a=" << a << "\n"
|
|
<< "b=" << b;
|
|
}
|
|
|
|
TEST(IpportCmp, Ipv6BeginAndEndCompareCorrectly)
|
|
{
|
|
IP_Port a = {0};
|
|
IP_Port b = {0};
|
|
|
|
a.ip.family = net_family_ipv6();
|
|
b.ip.family = net_family_ipv6();
|
|
|
|
a.ip.ip.v6.uint8[0] = 0xab;
|
|
b.ip.ip.v6.uint8[0] = 0xba;
|
|
|
|
EXPECT_EQ(ipport_cmp_handler(&a, &b, sizeof(IP_Port)), -1);
|
|
|
|
a.ip.ip.v6.uint8[0] = 0;
|
|
b.ip.ip.v6.uint8[0] = 0;
|
|
|
|
a.ip.ip.v6.uint8[15] = 0xba;
|
|
|
|
EXPECT_EQ(ipport_cmp_handler(&a, &b, sizeof(IP_Port)), 1);
|
|
}
|
|
|
|
TEST(IpportCmp, UnspecAlwaysComparesEqual)
|
|
{
|
|
IP_Port a = {0};
|
|
IP_Port b = {0};
|
|
|
|
a.ip.family = net_family_unspec();
|
|
b.ip.family = net_family_unspec();
|
|
|
|
a.ip.ip.v4.uint8[0] = 0xab;
|
|
b.ip.ip.v4.uint8[0] = 0xba;
|
|
|
|
EXPECT_EQ(ipport_cmp_handler(&a, &b, sizeof(IP_Port)), 0);
|
|
}
|
|
|
|
TEST(IpportCmp, InvalidAlwaysComparesEqual)
|
|
{
|
|
IP_Port a = {0};
|
|
IP_Port b = {0};
|
|
|
|
a.ip.family.value = 0xff;
|
|
b.ip.family.value = 0xff;
|
|
|
|
a.ip.ip.v4.uint8[0] = 0xab;
|
|
b.ip.ip.v4.uint8[0] = 0xba;
|
|
|
|
EXPECT_EQ(ipport_cmp_handler(&a, &b, sizeof(IP_Port)), 0);
|
|
}
|
|
|
|
} // namespace
|