forked from Green-Sky/tomato
Squashed 'external/toxcore/c-toxcore/' changes from 55752a2e2ef..f785959eace
f785959eace chore: add to_string functions for netprof enums a95b7957288 cleanup: Heap allocate network profile objects a3c80149edd feat: Implement Tox network profiler ac812871a2e feat: implement the last 2 missing network struct functions and make use of them 29d1043be0b test: friend request test now tests min/max message sizes 93aafd78c1f fix: friend requests with very long messages are no longer dropped 819aa2b2618 feat: Add option to disable DNS lookups in toxcore. 0ac23cee035 fix: windows use of REUSEADDR 7d2811d302d chore(ci): make bazel server shutdown faster 1dc399ba20d chore: Use vcpkg instead of conan in the MSVC build. 14d823165d9 chore: Migrate to conan 2. bdd17c16787 cleanup: Allocate logger using tox memory allocator. b396c061515 chore(deps): bump third_party/cmp from `2ac6bca` to `52bfcfa` 2e94da60d09 feat(net): add missing connect to network struct 41fb1839c7b chore: Add check to ensure version numbers agree. 934a8301113 chore: Release 0.2.20 3acef4bf044 fix: Add missing free in dht_get_nodes_response event. git-subtree-dir: external/toxcore/c-toxcore git-subtree-split: f785959eacebc59590f756b133b52601c335a1d1
This commit is contained in:
@ -10,44 +10,57 @@
|
||||
#include "../toxcore/tox.h"
|
||||
#include "../toxcore/util.h"
|
||||
#include "../testing/misc_tools.h"
|
||||
|
||||
#include "auto_test_support.h"
|
||||
#include "check_compat.h"
|
||||
|
||||
#define FR_MESSAGE "Gentoo"
|
||||
#define REQUEST_MESSAGE "Hello, I would like to be your friend. Please respond."
|
||||
|
||||
static void accept_friend_request(const Tox_Event_Friend_Request *event,
|
||||
void *userdata)
|
||||
typedef struct Callback_Data {
|
||||
Tox *tox1; // request sender
|
||||
Tox *tox2; // request receiver
|
||||
uint8_t message[TOX_MAX_FRIEND_REQUEST_LENGTH];
|
||||
uint16_t length;
|
||||
} Callback_Data;
|
||||
|
||||
static void accept_friend_request(const Tox_Event_Friend_Request *event, void *userdata)
|
||||
{
|
||||
Tox *state_tox = (Tox *)userdata;
|
||||
Callback_Data *cb_data = (Callback_Data *)userdata;
|
||||
|
||||
const uint8_t *public_key = tox_event_friend_request_get_public_key(event);
|
||||
const uint8_t *data = tox_event_friend_request_get_message(event);
|
||||
const size_t length = tox_event_friend_request_get_message_length(event);
|
||||
|
||||
ck_assert_msg(length == sizeof(FR_MESSAGE) && memcmp(FR_MESSAGE, data, sizeof(FR_MESSAGE)) == 0,
|
||||
ck_assert_msg(length == cb_data->length && memcmp(cb_data->message, data, cb_data->length) == 0,
|
||||
"unexpected friend request message");
|
||||
tox_friend_add_norequest(state_tox, public_key, nullptr);
|
||||
|
||||
fprintf(stderr, "Tox2 accepts friend request.\n");
|
||||
|
||||
Tox_Err_Friend_Add err;
|
||||
tox_friend_add_norequest(cb_data->tox2, public_key, &err);
|
||||
|
||||
ck_assert_msg(err == TOX_ERR_FRIEND_ADD_OK, "tox_friend_add_norequest failed: %d", err);
|
||||
}
|
||||
|
||||
static void iterate2_wait(const Tox_Dispatch *dispatch, Tox *tox1, Tox *tox2)
|
||||
static void iterate2_wait(const Tox_Dispatch *dispatch, Callback_Data *cb_data)
|
||||
{
|
||||
Tox_Err_Events_Iterate err;
|
||||
Tox_Events *events;
|
||||
|
||||
events = tox_events_iterate(tox1, true, &err);
|
||||
events = tox_events_iterate(cb_data->tox1, true, &err);
|
||||
ck_assert(err == TOX_ERR_EVENTS_ITERATE_OK);
|
||||
tox_dispatch_invoke(dispatch, events, tox1);
|
||||
tox_dispatch_invoke(dispatch, events, cb_data);
|
||||
tox_events_free(events);
|
||||
|
||||
events = tox_events_iterate(tox2, true, &err);
|
||||
events = tox_events_iterate(cb_data->tox2, true, &err);
|
||||
ck_assert(err == TOX_ERR_EVENTS_ITERATE_OK);
|
||||
tox_dispatch_invoke(dispatch, events, tox2);
|
||||
tox_dispatch_invoke(dispatch, events, cb_data);
|
||||
tox_events_free(events);
|
||||
|
||||
c_sleep(ITERATION_INTERVAL);
|
||||
}
|
||||
|
||||
static void test_friend_request(void)
|
||||
static void test_friend_request(const uint8_t *message, uint16_t length)
|
||||
{
|
||||
printf("Initialising 2 toxes.\n");
|
||||
uint32_t index[] = { 1, 2 };
|
||||
@ -60,7 +73,7 @@ static void test_friend_request(void)
|
||||
tox_events_init(tox1);
|
||||
tox_events_init(tox2);
|
||||
|
||||
printf("Bootstrapping tox2 off tox1.\n");
|
||||
printf("Bootstrapping Tox2 off Tox1.\n");
|
||||
uint8_t dht_key[TOX_PUBLIC_KEY_SIZE];
|
||||
tox_self_get_dht_id(tox1, dht_key);
|
||||
const uint16_t dht_port = tox_self_get_udp_port(tox1, nullptr);
|
||||
@ -70,25 +83,36 @@ static void test_friend_request(void)
|
||||
Tox_Dispatch *dispatch = tox_dispatch_new(nullptr);
|
||||
ck_assert(dispatch != nullptr);
|
||||
|
||||
Callback_Data cb_data = {nullptr};
|
||||
cb_data.tox1 = tox1;
|
||||
cb_data.tox2 = tox2;
|
||||
|
||||
ck_assert(length <= sizeof(cb_data.message));
|
||||
memcpy(cb_data.message, message, length);
|
||||
cb_data.length = length;
|
||||
|
||||
do {
|
||||
iterate2_wait(dispatch, tox1, tox2);
|
||||
iterate2_wait(dispatch, &cb_data);
|
||||
} while (tox_self_get_connection_status(tox1) == TOX_CONNECTION_NONE ||
|
||||
tox_self_get_connection_status(tox2) == TOX_CONNECTION_NONE);
|
||||
|
||||
printf("Toxes are online, took %lu seconds.\n", (unsigned long)(time(nullptr) - cur_time));
|
||||
const time_t con_time = time(nullptr);
|
||||
|
||||
printf("Tox1 adds tox2 as friend, tox2 accepts.\n");
|
||||
printf("Tox1 adds Tox2 as friend. Waiting for Tox2 to accept.\n");
|
||||
tox_events_callback_friend_request(dispatch, accept_friend_request);
|
||||
|
||||
uint8_t address[TOX_ADDRESS_SIZE];
|
||||
tox_self_get_address(tox2, address);
|
||||
|
||||
const uint32_t test = tox_friend_add(tox1, address, (const uint8_t *)FR_MESSAGE, sizeof(FR_MESSAGE), nullptr);
|
||||
Tox_Err_Friend_Add err;
|
||||
const uint32_t test = tox_friend_add(tox1, address, message, length, &err);
|
||||
|
||||
ck_assert_msg(err == TOX_ERR_FRIEND_ADD_OK, "tox_friend_add failed: %d", err);
|
||||
ck_assert_msg(test == 0, "failed to add friend error code: %u", test);
|
||||
|
||||
do {
|
||||
iterate2_wait(dispatch, tox1, tox2);
|
||||
iterate2_wait(dispatch, &cb_data);
|
||||
} while (tox_friend_get_connection_status(tox1, 0, nullptr) != TOX_CONNECTION_UDP ||
|
||||
tox_friend_get_connection_status(tox2, 0, nullptr) != TOX_CONNECTION_UDP);
|
||||
|
||||
@ -104,6 +128,20 @@ int main(void)
|
||||
{
|
||||
setvbuf(stdout, nullptr, _IONBF, 0);
|
||||
|
||||
test_friend_request();
|
||||
fprintf(stderr, "Testing friend request with the smallest allowed message length.\n");
|
||||
test_friend_request((const uint8_t *)"a", 1);
|
||||
|
||||
fprintf(stderr, "Testing friend request with an average sized message length.\n");
|
||||
test_friend_request((const uint8_t *)REQUEST_MESSAGE, sizeof(REQUEST_MESSAGE) - 1);
|
||||
|
||||
uint8_t long_message[TOX_MAX_FRIEND_REQUEST_LENGTH];
|
||||
|
||||
for (uint16_t i = 0; i < sizeof(long_message); ++i) {
|
||||
long_message[i] = 'a';
|
||||
}
|
||||
|
||||
fprintf(stderr, "Testing friend request with the largest allowed message length.\n");
|
||||
test_friend_request(long_message, sizeof(long_message));
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
Reference in New Issue
Block a user