Green Sky
aae086cc65
b03b571272 fix: flaky tcp test This only fixes the symptoms, not the real problem. Sometimes or consistently on some platforms a socket might need a moment before it can be written to. 32e67ab4c2 cleanup: use typedef for private message ID's in callback 7b1db6adc1 feat: add message IDs to private group messages 99e0bcc27d refactor: Observers/ignored peers can now send and receive custom packets b3c3c49d26 fix: Disable IPv6 in Windows cross-compilation tests e742deddff feat: Check hashes of Windows dependencies when cross-compiling dfb9a0b02b fix: Test the current Windows Dockerfile, not an old Dockerhub image 14de93ccec chore: Use WineHQ's Wine as Debian Bookworm's crashes ed37616249 docs: Update the Windows cross-compilation section 9bb79c174f cleanup: Remove a couple of unnecessary misc_tools dependencies 19475adb70 chore: Statically link OpenMP into the cracker fun util on Windows 1be311e51f feat: Build the fun utils when cross-compiling to Windows 88133f8446 chore: Strip Windows binaries 3cc0ae7535 refactor: Copy over all of the required static dependencies c4fa8f7fb1 feat: Generate .def, .exp and .lib files when building for Windows 74bbac5363 feat: Let CMake create the dll instead of doing so ourselves 246642e9ae feat: Harden Windows cross-compilation 8d431c0d11 chore: Bump Windows build dependency versions e519f7998b fix: Remove unnecessary wsock32 dependency on Windows ed2b60c217 chore: Use a specific non-broken slimcc version. d7f21010a1 chore: Update github actions. e71a68b7f2 docs: Update the list of CMake options 77e08876ff chore: Remove mod and founder from group API naming scheme 12bc042767 docs: add the experimental api build option to INSTALL.md e1fa5cae96 refactor: Rename Queries to Query to align with other enums. be82a3ea30 fix: Correct type for conference offline peer numbers. 0627c36716 test: Add pkgsrc build. 92578afe4b test: Add FreeBSD VM action on GitHub. 52ece0f57b test: Build toxcore on NetBSD (VM). 3fe8ee2c11 chore: Only install tox_private.h on request. 9a8dfa06ab fix: save_compatibility_test failing on big-endian systems 86f5e55578 fix: Don't serve files from websockify. 710eb674a5 fix: Correctly pass extended public keys to group moderation code. 021db7031c refactor: Use `struct`s for extended public/secret keys. a1e999fd80 chore: Compile libsodium reference implementation with compcert. fbe3c19cf5 cleanup: correct a few nullable annotations 623e3ee5c3 cleanup: Don't use `memcpy` to cast arbitrary `struct`s to `uint8_t[]`. c71567dc18 fix: Pass array, not array pointer, to `memcmp`. 9b46a08144 cleanup: Never pass `void*` directly to `memcpy`. 5d7b7a7bbc refactor: Use tox rng to seed the keypair generation. 961891d568 cleanup: Small improvements found by PVS Studio. 8201019f0d chore: Disable NGC saving by default, enable through Tox_Options. 5dd9ee3f65 cleanup: Replace pointer arithmetic with explicit `&arr[i]`. ca4606d49d refactor: Use strong typedef for NGC peer id. 442213b722 cleanup: Simplify custom packet length check in NGC. 08d3393def fix: Correct a few potential null derefs in bootstrap daemon. b9877b32b0 fix: Add missing memunlock of local variable when it goes out of scope. dab5fe44b9 fix: Zero out stack-allocated secret key before return. f058103299 refactor: Make prune_gc_sanctions_list more obviously correct. 3ba7a0dec9 docs: Add static analysis tool list to README. 8d0811a0f3 docs: Run prettier-markdown on markdown files. 969e3a2bfc refactor: Fix network test not using the strong typedef 93c83fbc7c refactor: Use strong typedef instead of struct for `Socket`. 9fe18b176f fix: Fix some false positive from PVS Studio. 7c44379ccb cleanup: Check that WINXP macro exists before comparing it. 5c93231bef refactor: Make tox mutex non-recursive. aacff73939 docs: Fix up doxyfile. d55fc85ff5 docs: Add more documentation to crypto_core. 5bdaaaedb6 refactor: Remove `Tox *` from `tox_dispatch`. e202341e76 refactor: Don't rely on tox_dispatch passing tox in tests. 34df938f52 chore: Use C++ mode for clang-tidy. 8b05296a78 chore: Check that both gtest and gmock exist for tests. 42010660e1 test: Add slimcc compiler compatibility test. b473630321 chore: Add some comments to the astyle config. b7404f24f6 cleanup: Remove implicit bool conversions. 4e2dba4d9f chore: Reformat sources with astyle. 4359e3a6bc chore: Rename C++ headers to .hh suffixes. 0c05566e58 cleanup: Further `#include` cleanups. 8d29935b7a chore: Only check the bootstrap daemon checksum on release. f70e588bc6 cleanup: Add more `const` where possible. 511bfe39c8 cleanup: Use Bazel modules to enforce proper `#include` hygiene. 1710a0d091 refactor: Move pack/unpack `IP_Port` from DHT into network module. a975943564 chore: Really fix coverage docker image build. c08409390f chore: Fix post-submit coverage image. 39aadf8922 fix: Don't use `memcmp` to compare `IP_Port`s. d94246a906 fix: partially fix a bug that prevented group part messages from sending. eeaa039222 chore: Fix rpm build; add a CI check for it. 8328449c1a chore: Speed up docker builds a bit by reducing layer count. d6d67d56f3 cleanup: Add `const` where possible in auto tests. 6aa9e6850d cleanup: Minor cleanup of event unpack code. bdf460a3a9 refactor: Rename `system_{memory,...}` to `os_{memory,...}`. 203e1af81e fix: a few off by one errors in group autotests 5c093c4888 cleanup: Remove all uses of `SIZEOF_VLA`. 662c2140f3 test: Add goblint static analyser. 8f07755834 cleanup: Use `memzero(x, s)` instead of `memset(x, 0, s)`. a7258e40cf cleanup: Use explicit 0 instead of `PACKET_ID_PADDING`. 6370d0f15d cleanup: Expand the `Tox_Options` accessor macros. 14a1a0b9bd cleanup: Remove plan9 support. a05dccad13 test: Add a simple new/delete test for Tox. 1cdcf938b9 cleanup: Add comment after every `#endif`. ba99d4dc4b test: Fix comment I broke in the events test PR. e07248debb refactor: Migrate auto_tests to new events API. bdd42b5452 refactor: Add common msgpack array packer with callback. 3c659f5288 cleanup: Rename group to conference in groupav documentation. 89957be230 cleanup: Ensure handler params are named after callback params. c650d9d345 refactor: Pass `this` pointer as first param to s11n callbacks. e7fb91ddb8 refactor: Allow NULL pointers for byte arrays in events. 5e2c8cabc1 cleanup: make some improvements to group moderation test 259de4867e cleanup: Remove `bin_pack_{new,free}`. 21a8ff5895 cleanup: skip a do_gc iteration before removing peers marked for deletion 16809dc36e feat: Add dht_get_nodes_response event to the events system. git-subtree-dir: external/toxcore/c-toxcore git-subtree-split: b03b5712720de9a9901ea12fd741f177327a7021
376 lines
14 KiB
C
376 lines
14 KiB
C
/* File transfer test.
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <time.h>
|
|
|
|
#include "../testing/misc_tools.h"
|
|
#include "../toxcore/ccompat.h"
|
|
#include "../toxcore/tox.h"
|
|
#include "../toxcore/util.h"
|
|
#include "auto_test_support.h"
|
|
#include "check_compat.h"
|
|
|
|
#ifndef USE_IPV6
|
|
#define USE_IPV6 1
|
|
#endif
|
|
|
|
#ifdef TOX_LOCALHOST
|
|
#undef TOX_LOCALHOST
|
|
#endif
|
|
#if USE_IPV6
|
|
#define TOX_LOCALHOST "::1"
|
|
#else
|
|
#define TOX_LOCALHOST "127.0.0.1"
|
|
#endif
|
|
|
|
static void accept_friend_request(const Tox_Event_Friend_Request *event, void *userdata)
|
|
{
|
|
Tox *tox = (Tox *)userdata;
|
|
|
|
const uint8_t *public_key = tox_event_friend_request_get_public_key(event);
|
|
const uint8_t *data = tox_event_friend_request_get_message(event);
|
|
const size_t length = tox_event_friend_request_get_message_length(event);
|
|
|
|
if (length == 7 && memcmp("Gentoo", data, 7) == 0) {
|
|
tox_friend_add_norequest(tox, public_key, nullptr);
|
|
}
|
|
}
|
|
|
|
static uint64_t size_recv;
|
|
static uint64_t sending_pos;
|
|
|
|
static uint8_t file_cmp_id[TOX_FILE_ID_LENGTH];
|
|
static uint32_t file_accepted;
|
|
static uint64_t file_size;
|
|
static void tox_file_receive(const Tox_Event_File_Recv *event, void *userdata)
|
|
{
|
|
Tox *state_tox = (Tox *)userdata;
|
|
|
|
const uint32_t friend_number = tox_event_file_recv_get_friend_number(event);
|
|
const uint32_t file_number = tox_event_file_recv_get_file_number(event);
|
|
const uint32_t kind = tox_event_file_recv_get_kind(event);
|
|
const uint64_t filesize = tox_event_file_recv_get_file_size(event);
|
|
const uint8_t *filename = tox_event_file_recv_get_filename(event);
|
|
const size_t filename_length = tox_event_file_recv_get_filename_length(event);
|
|
|
|
ck_assert_msg(kind == TOX_FILE_KIND_DATA, "bad kind");
|
|
|
|
ck_assert_msg(filename_length == sizeof("Gentoo.exe")
|
|
&& memcmp(filename, "Gentoo.exe", sizeof("Gentoo.exe")) == 0, "bad filename");
|
|
|
|
uint8_t file_id[TOX_FILE_ID_LENGTH];
|
|
|
|
ck_assert_msg(tox_file_get_file_id(state_tox, friend_number, file_number, file_id, nullptr), "tox_file_get_file_id error");
|
|
|
|
ck_assert_msg(memcmp(file_id, file_cmp_id, TOX_FILE_ID_LENGTH) == 0, "bad file_id");
|
|
|
|
const uint8_t empty[TOX_FILE_ID_LENGTH] = {0};
|
|
|
|
ck_assert_msg(memcmp(empty, file_cmp_id, TOX_FILE_ID_LENGTH) != 0, "empty file_id");
|
|
|
|
file_size = filesize;
|
|
|
|
if (filesize) {
|
|
sending_pos = size_recv = 1337;
|
|
|
|
Tox_Err_File_Seek err_s;
|
|
|
|
ck_assert_msg(tox_file_seek(state_tox, friend_number, file_number, 1337, &err_s), "tox_file_seek error");
|
|
|
|
ck_assert_msg(err_s == TOX_ERR_FILE_SEEK_OK, "tox_file_seek wrong error");
|
|
|
|
} else {
|
|
sending_pos = size_recv = 0;
|
|
}
|
|
|
|
Tox_Err_File_Control error;
|
|
|
|
ck_assert_msg(tox_file_control(state_tox, friend_number, file_number, TOX_FILE_CONTROL_RESUME, &error),
|
|
"tox_file_control failed. %i", error);
|
|
++file_accepted;
|
|
|
|
Tox_Err_File_Seek err_s;
|
|
|
|
ck_assert_msg(!tox_file_seek(state_tox, friend_number, file_number, 1234, &err_s), "tox_file_seek no error");
|
|
|
|
ck_assert_msg(err_s == TOX_ERR_FILE_SEEK_DENIED, "tox_file_seek wrong error");
|
|
}
|
|
|
|
static uint32_t sendf_ok;
|
|
static void file_print_control(const Tox_Event_File_Recv_Control *event,
|
|
void *userdata)
|
|
{
|
|
const uint32_t file_number = tox_event_file_recv_control_get_file_number(event);
|
|
const Tox_File_Control control = tox_event_file_recv_control_get_control(event);
|
|
|
|
/* First send file num is 0.*/
|
|
if (file_number == 0 && control == TOX_FILE_CONTROL_RESUME) {
|
|
sendf_ok = 1;
|
|
}
|
|
}
|
|
|
|
static uint64_t max_sending;
|
|
static bool m_send_reached;
|
|
static uint8_t sending_num;
|
|
static bool file_sending_done;
|
|
static void tox_file_chunk_request(const Tox_Event_File_Chunk_Request *event, void *user_data)
|
|
{
|
|
Tox *state_tox = (Tox *)user_data;
|
|
|
|
const uint32_t friend_number = tox_event_file_chunk_request_get_friend_number(event);
|
|
const uint32_t file_number = tox_event_file_chunk_request_get_file_number(event);
|
|
const uint64_t position = tox_event_file_chunk_request_get_position(event);
|
|
size_t length = tox_event_file_chunk_request_get_length(event);
|
|
|
|
ck_assert_msg(sendf_ok, "didn't get resume control");
|
|
|
|
ck_assert_msg(sending_pos == position, "bad position %lu (should be %lu)", (unsigned long)position, (unsigned long)sending_pos);
|
|
|
|
if (length == 0) {
|
|
ck_assert_msg(!file_sending_done, "file sending already done");
|
|
|
|
file_sending_done = 1;
|
|
return;
|
|
}
|
|
|
|
if (position + length > max_sending) {
|
|
ck_assert_msg(!m_send_reached, "requested done file transfer");
|
|
|
|
length = max_sending - position;
|
|
m_send_reached = 1;
|
|
}
|
|
|
|
VLA(uint8_t, f_data, length);
|
|
memset(f_data, sending_num, length);
|
|
|
|
Tox_Err_File_Send_Chunk error;
|
|
tox_file_send_chunk(state_tox, friend_number, file_number, position, f_data, length, &error);
|
|
|
|
ck_assert_msg(error == TOX_ERR_FILE_SEND_CHUNK_OK,
|
|
"could not send chunk, error num=%d pos=%d len=%d", (int)error, (int)position, (int)length);
|
|
|
|
++sending_num;
|
|
sending_pos += length;
|
|
}
|
|
|
|
static uint8_t num;
|
|
static bool file_recv;
|
|
static void write_file(const Tox_Event_File_Recv_Chunk *event, void *user_data)
|
|
{
|
|
const uint64_t position = tox_event_file_recv_chunk_get_position(event);
|
|
const uint8_t *data = tox_event_file_recv_chunk_get_data(event);
|
|
const size_t length = tox_event_file_recv_chunk_get_data_length(event);
|
|
|
|
ck_assert_msg(size_recv == position, "bad position");
|
|
|
|
if (length == 0) {
|
|
file_recv = 1;
|
|
return;
|
|
}
|
|
|
|
VLA(uint8_t, f_data, length);
|
|
memset(f_data, num, length);
|
|
++num;
|
|
|
|
ck_assert_msg(memcmp(f_data, data, length) == 0, "FILE_CORRUPTED");
|
|
|
|
size_recv += length;
|
|
}
|
|
|
|
static void iterate_and_dispatch(const Tox_Dispatch *dispatch, Tox *tox)
|
|
{
|
|
Tox_Err_Events_Iterate err;
|
|
Tox_Events *events;
|
|
|
|
events = tox_events_iterate(tox, true, &err);
|
|
ck_assert(err == TOX_ERR_EVENTS_ITERATE_OK);
|
|
tox_dispatch_invoke(dispatch, events, tox);
|
|
tox_events_free(events);
|
|
}
|
|
|
|
static void file_transfer_test(void)
|
|
{
|
|
printf("Starting test: few_clients\n");
|
|
uint32_t index[] = { 1, 2, 3 };
|
|
long long unsigned int cur_time = time(nullptr);
|
|
Tox_Err_New t_n_error;
|
|
Tox *tox1 = tox_new_log(nullptr, &t_n_error, &index[0]);
|
|
ck_assert_msg(t_n_error == TOX_ERR_NEW_OK, "wrong error");
|
|
Tox *tox2 = tox_new_log(nullptr, &t_n_error, &index[1]);
|
|
ck_assert_msg(t_n_error == TOX_ERR_NEW_OK, "wrong error");
|
|
Tox *tox3 = tox_new_log(nullptr, &t_n_error, &index[2]);
|
|
ck_assert_msg(t_n_error == TOX_ERR_NEW_OK, "wrong error");
|
|
|
|
ck_assert_msg(tox1 && tox2 && tox3, "Failed to create 3 tox instances");
|
|
|
|
tox_events_init(tox1);
|
|
tox_events_init(tox2);
|
|
tox_events_init(tox3);
|
|
|
|
Tox_Dispatch *dispatch1 = tox_dispatch_new(nullptr);
|
|
ck_assert(dispatch1 != nullptr);
|
|
Tox_Dispatch *dispatch2 = tox_dispatch_new(nullptr);
|
|
ck_assert(dispatch2 != nullptr);
|
|
Tox_Dispatch *dispatch3 = tox_dispatch_new(nullptr);
|
|
ck_assert(dispatch3 != nullptr);
|
|
|
|
tox_events_callback_friend_request(dispatch2, accept_friend_request);
|
|
|
|
uint8_t address[TOX_ADDRESS_SIZE];
|
|
tox_self_get_address(tox2, address);
|
|
uint32_t test = tox_friend_add(tox3, address, (const uint8_t *)"Gentoo", 7, nullptr);
|
|
ck_assert_msg(test == 0, "Failed to add friend error code: %u", test);
|
|
|
|
uint8_t dht_key[TOX_PUBLIC_KEY_SIZE];
|
|
tox_self_get_dht_id(tox1, dht_key);
|
|
uint16_t dht_port = tox_self_get_udp_port(tox1, nullptr);
|
|
|
|
tox_bootstrap(tox2, TOX_LOCALHOST, dht_port, dht_key, nullptr);
|
|
tox_bootstrap(tox3, TOX_LOCALHOST, dht_port, dht_key, nullptr);
|
|
|
|
printf("Waiting for toxes to come online\n");
|
|
|
|
do {
|
|
iterate_and_dispatch(dispatch1, tox1);
|
|
iterate_and_dispatch(dispatch2, tox2);
|
|
iterate_and_dispatch(dispatch3, tox3);
|
|
|
|
printf("Connections: self (%d, %d, %d), friends (%d, %d)\n",
|
|
tox_self_get_connection_status(tox1),
|
|
tox_self_get_connection_status(tox2),
|
|
tox_self_get_connection_status(tox3),
|
|
tox_friend_get_connection_status(tox2, 0, nullptr),
|
|
tox_friend_get_connection_status(tox3, 0, nullptr));
|
|
c_sleep(ITERATION_INTERVAL);
|
|
} while (tox_self_get_connection_status(tox1) == TOX_CONNECTION_NONE ||
|
|
tox_self_get_connection_status(tox2) == TOX_CONNECTION_NONE ||
|
|
tox_self_get_connection_status(tox3) == TOX_CONNECTION_NONE ||
|
|
tox_friend_get_connection_status(tox2, 0, nullptr) == TOX_CONNECTION_NONE ||
|
|
tox_friend_get_connection_status(tox3, 0, nullptr) == TOX_CONNECTION_NONE);
|
|
|
|
printf("Starting file transfer test: 100MiB file.\n");
|
|
|
|
file_accepted = file_size = sendf_ok = size_recv = 0;
|
|
file_recv = 0;
|
|
max_sending = UINT64_MAX;
|
|
uint64_t f_time = time(nullptr);
|
|
tox_events_callback_file_recv_chunk(dispatch3, write_file);
|
|
tox_events_callback_file_recv_control(dispatch2, file_print_control);
|
|
tox_events_callback_file_chunk_request(dispatch2, tox_file_chunk_request);
|
|
tox_events_callback_file_recv_control(dispatch3, file_print_control);
|
|
tox_events_callback_file_recv(dispatch3, tox_file_receive);
|
|
uint64_t totalf_size = 100 * 1024 * 1024;
|
|
uint32_t fnum = tox_file_send(tox2, 0, TOX_FILE_KIND_DATA, totalf_size, nullptr, (const uint8_t *)"Gentoo.exe",
|
|
sizeof("Gentoo.exe"), nullptr);
|
|
ck_assert_msg(fnum != UINT32_MAX, "tox_new_file_sender fail");
|
|
|
|
Tox_Err_File_Get gfierr;
|
|
ck_assert_msg(!tox_file_get_file_id(tox2, 1, fnum, file_cmp_id, &gfierr), "tox_file_get_file_id didn't fail");
|
|
ck_assert_msg(gfierr == TOX_ERR_FILE_GET_FRIEND_NOT_FOUND, "wrong error");
|
|
ck_assert_msg(!tox_file_get_file_id(tox2, 0, fnum + 1, file_cmp_id, &gfierr), "tox_file_get_file_id didn't fail");
|
|
ck_assert_msg(gfierr == TOX_ERR_FILE_GET_NOT_FOUND, "wrong error");
|
|
ck_assert_msg(tox_file_get_file_id(tox2, 0, fnum, file_cmp_id, &gfierr), "tox_file_get_file_id failed");
|
|
ck_assert_msg(gfierr == TOX_ERR_FILE_GET_OK, "wrong error");
|
|
|
|
const size_t max_iterations = INT16_MAX;
|
|
|
|
for (size_t i = 0; i < max_iterations; i++) {
|
|
iterate_and_dispatch(dispatch1, tox1);
|
|
iterate_and_dispatch(dispatch2, tox2);
|
|
iterate_and_dispatch(dispatch3, tox3);
|
|
|
|
if (file_sending_done) {
|
|
ck_assert_msg(sendf_ok && file_recv && totalf_size == file_size && size_recv == file_size && sending_pos == size_recv
|
|
&& file_accepted == 1,
|
|
"Something went wrong in file transfer %u %u %u %u %u %u %lu %lu %lu",
|
|
sendf_ok, file_recv, totalf_size == file_size, size_recv == file_size, sending_pos == size_recv,
|
|
file_accepted == 1, (unsigned long)totalf_size, (unsigned long)size_recv,
|
|
(unsigned long)sending_pos);
|
|
break;
|
|
}
|
|
|
|
uint32_t tox1_interval = tox_iteration_interval(tox1);
|
|
uint32_t tox2_interval = tox_iteration_interval(tox2);
|
|
uint32_t tox3_interval = tox_iteration_interval(tox3);
|
|
|
|
if ((i + 1) % 500 == 0) {
|
|
printf("after %u iterations: %.2fMiB done\n", (unsigned int)i + 1, (double)size_recv / 1024 / 1024);
|
|
}
|
|
|
|
c_sleep(min_u32(tox1_interval, min_u32(tox2_interval, tox3_interval)));
|
|
}
|
|
|
|
ck_assert_msg(file_sending_done, "file sending did not complete after %u iterations: sendf_ok:%u file_recv:%u "
|
|
"totalf_size==file_size:%u size_recv==file_size:%u sending_pos==size_recv:%u file_accepted:%u "
|
|
"totalf_size:%lu size_recv:%lu sending_pos:%lu",
|
|
(unsigned int)max_iterations, sendf_ok, file_recv,
|
|
totalf_size == file_size, size_recv == file_size, sending_pos == size_recv, file_accepted == 1,
|
|
(unsigned long)totalf_size, (unsigned long)size_recv,
|
|
(unsigned long)sending_pos);
|
|
|
|
printf("100MiB file sent in %lu seconds\n", (unsigned long)(time(nullptr) - f_time));
|
|
|
|
printf("starting file 0 transfer test.\n");
|
|
|
|
file_sending_done = 0;
|
|
file_accepted = 0;
|
|
file_size = 0;
|
|
sendf_ok = 0;
|
|
size_recv = 0;
|
|
file_recv = 0;
|
|
tox_events_callback_file_recv_chunk(dispatch3, write_file);
|
|
tox_events_callback_file_recv_control(dispatch2, file_print_control);
|
|
tox_events_callback_file_chunk_request(dispatch2, tox_file_chunk_request);
|
|
tox_events_callback_file_recv_control(dispatch3, file_print_control);
|
|
tox_events_callback_file_recv(dispatch3, tox_file_receive);
|
|
totalf_size = 0;
|
|
fnum = tox_file_send(tox2, 0, TOX_FILE_KIND_DATA, totalf_size, nullptr,
|
|
(const uint8_t *)"Gentoo.exe", sizeof("Gentoo.exe"), nullptr);
|
|
ck_assert_msg(fnum != UINT32_MAX, "tox_new_file_sender fail");
|
|
|
|
ck_assert_msg(!tox_file_get_file_id(tox2, 1, fnum, file_cmp_id, &gfierr), "tox_file_get_file_id didn't fail");
|
|
ck_assert_msg(gfierr == TOX_ERR_FILE_GET_FRIEND_NOT_FOUND, "wrong error");
|
|
ck_assert_msg(!tox_file_get_file_id(tox2, 0, fnum + 1, file_cmp_id, &gfierr), "tox_file_get_file_id didn't fail");
|
|
ck_assert_msg(gfierr == TOX_ERR_FILE_GET_NOT_FOUND, "wrong error");
|
|
ck_assert_msg(tox_file_get_file_id(tox2, 0, fnum, file_cmp_id, &gfierr), "tox_file_get_file_id failed");
|
|
ck_assert_msg(gfierr == TOX_ERR_FILE_GET_OK, "wrong error");
|
|
|
|
do {
|
|
uint32_t tox1_interval = tox_iteration_interval(tox1);
|
|
uint32_t tox2_interval = tox_iteration_interval(tox2);
|
|
uint32_t tox3_interval = tox_iteration_interval(tox3);
|
|
|
|
c_sleep(min_u32(tox1_interval, min_u32(tox2_interval, tox3_interval)));
|
|
|
|
iterate_and_dispatch(dispatch1, tox1);
|
|
iterate_and_dispatch(dispatch2, tox2);
|
|
iterate_and_dispatch(dispatch3, tox3);
|
|
} while (!file_sending_done);
|
|
|
|
ck_assert_msg(sendf_ok && file_recv && totalf_size == file_size && size_recv == file_size
|
|
&& sending_pos == size_recv && file_accepted == 1,
|
|
"something went wrong in file transfer %u %u %u %u %u %u %llu %llu %llu", sendf_ok, file_recv,
|
|
totalf_size == file_size, size_recv == file_size, sending_pos == size_recv, file_accepted == 1,
|
|
(unsigned long long)totalf_size, (unsigned long long)size_recv,
|
|
(unsigned long long)sending_pos);
|
|
|
|
printf("file_transfer_test succeeded, took %llu seconds\n", time(nullptr) - cur_time);
|
|
|
|
tox_dispatch_free(dispatch3);
|
|
tox_dispatch_free(dispatch2);
|
|
tox_dispatch_free(dispatch1);
|
|
tox_kill(tox3);
|
|
tox_kill(tox2);
|
|
tox_kill(tox1);
|
|
}
|
|
|
|
int main(void)
|
|
{
|
|
setvbuf(stdout, nullptr, _IONBF, 0);
|
|
file_transfer_test();
|
|
return 0;
|
|
}
|