forked from Green-Sky/tomato
c9cdae001 fix(toxav): remove extra copy of video frame on encode 4f6d4546b test: Improve the fake network library. a2581e700 refactor(toxcore): generate `Friend_Request` and `Dht_Nodes_Response` 2aaa11770 refactor(toxcore): use Tox_Memory in generated events 5c367452b test(toxcore): fix incorrect mutex in tox_scenario_get_time 8f92e710f perf: Add a timed limit of number of cookie requests. 695b6417a test: Add some more simulated network support. 815ae9ce9 test(toxcore): fix thread-safety in scenario framework 6d85c754e test(toxcore): add unit tests for net_crypto 9c22e79cc test(support): add SimulatedEnvironment for deterministic testing f34fcb195 chore: Update windows Dockerfile to debian stable (trixie). ece0e8980 fix(group_moderation): allow validating unsorted sanction list signatures a4fa754d7 refactor: rename struct Packet to struct Net_Packet d6f330f85 cleanup: Fix some warnings from coverity. e206bffa2 fix(group_chats): fix sync packets reverting topics 0e4715598 test: Add new scenario testing framework. 668291f44 refactor(toxcore): decouple Network_Funcs from sockaddr via IP_Port fc4396cef fix: potential division by zero in toxav and unsafe hex parsing 8e8b352ab refactor: Add nullable annotations to struct members. 7740bb421 refactor: decouple net_crypto from DHT 1936d4296 test: add benchmark for toxav audio and video 46bfdc2df fix: correct printf format specifiers for unsigned integers REVERT: 1828c5356 fix(toxav): remove extra copy of video frame on encode git-subtree-dir: external/toxcore/c-toxcore git-subtree-split: c9cdae001341e701fca980c9bb9febfeb95d2902
177 lines
3.9 KiB
C++
177 lines
3.9 KiB
C++
// clang-format off
|
|
#include "../testing/support/public/simulated_environment.hh"
|
|
#include "network.h"
|
|
// clang-format on
|
|
|
|
#include <gtest/gtest.h>
|
|
|
|
#include "network_test_util.hh"
|
|
|
|
namespace {
|
|
|
|
TEST(SimulatedEnvironment, ProducesNonNullNetwork)
|
|
{
|
|
tox::test::SimulatedEnvironment env;
|
|
auto node = env.create_node(0);
|
|
struct Network net = node->c_network;
|
|
EXPECT_NE(net.funcs, nullptr);
|
|
EXPECT_NE(net.obj, nullptr);
|
|
}
|
|
|
|
TEST(IpNtoa, DoesntWriteOutOfBounds)
|
|
{
|
|
Ip_Ntoa ip_str;
|
|
IP ip;
|
|
ip.family = net_family_ipv6();
|
|
ip.ip.v6.uint64[0] = -1;
|
|
ip.ip.v6.uint64[1] = -1;
|
|
|
|
net_ip_ntoa(&ip, &ip_str);
|
|
|
|
EXPECT_EQ(std::string(ip_str.buf), "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff");
|
|
EXPECT_LT(std::string(ip_str.buf).length(), IP_NTOA_LEN);
|
|
}
|
|
|
|
TEST(IpNtoa, ReportsInvalidIpFamily)
|
|
{
|
|
Ip_Ntoa ip_str;
|
|
IP ip;
|
|
ip.family.value = 255 - net_family_ipv6().value;
|
|
ip.ip.v4.uint32 = 0;
|
|
|
|
net_ip_ntoa(&ip, &ip_str);
|
|
|
|
EXPECT_EQ(std::string(ip_str.buf), "(IP invalid, family 245)");
|
|
}
|
|
|
|
TEST(IpNtoa, FormatsIPv4)
|
|
{
|
|
Ip_Ntoa ip_str;
|
|
IP ip;
|
|
ip.family = net_family_ipv4();
|
|
ip.ip.v4.uint8[0] = 192;
|
|
ip.ip.v4.uint8[1] = 168;
|
|
ip.ip.v4.uint8[2] = 0;
|
|
ip.ip.v4.uint8[3] = 13;
|
|
|
|
net_ip_ntoa(&ip, &ip_str);
|
|
|
|
EXPECT_EQ(std::string(ip_str.buf), "192.168.0.13");
|
|
}
|
|
|
|
TEST(IpParseAddr, FormatsIPv4)
|
|
{
|
|
char ip_str[IP_NTOA_LEN];
|
|
IP ip;
|
|
ip.family = net_family_ipv4();
|
|
ip.ip.v4.uint8[0] = 192;
|
|
ip.ip.v4.uint8[1] = 168;
|
|
ip.ip.v4.uint8[2] = 0;
|
|
ip.ip.v4.uint8[3] = 13;
|
|
|
|
ip_parse_addr(&ip, ip_str, sizeof(ip_str));
|
|
|
|
EXPECT_EQ(std::string(ip_str), "192.168.0.13");
|
|
}
|
|
|
|
TEST(IpParseAddr, FormatsIPv6)
|
|
{
|
|
char ip_str[IP_NTOA_LEN];
|
|
IP ip;
|
|
ip.family = net_family_ipv6();
|
|
ip.ip.v6.uint64[0] = -1;
|
|
ip.ip.v6.uint64[1] = -1;
|
|
|
|
ip_parse_addr(&ip, ip_str, sizeof(ip_str));
|
|
|
|
EXPECT_EQ(std::string(ip_str), "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff");
|
|
}
|
|
|
|
TEST(IpportCmp, BehavesLikeMemcmp)
|
|
{
|
|
auto cmp_val = [](int val) { return val < 0 ? -1 : val > 0 ? 1 : 0; };
|
|
|
|
IP_Port a = {0};
|
|
IP_Port b = {0};
|
|
|
|
a.ip.family = net_family_ipv4();
|
|
b.ip.family = net_family_ipv4();
|
|
|
|
a.port = 10;
|
|
b.port = 20;
|
|
|
|
EXPECT_EQ( //
|
|
ipport_cmp_handler(&a, &b, sizeof(IP_Port)), -1)
|
|
<< "a=" << a << "\n"
|
|
<< "b=" << b;
|
|
EXPECT_EQ( //
|
|
ipport_cmp_handler(&a, &b, sizeof(IP_Port)), //
|
|
cmp_val(memcmp(&a, &b, sizeof(IP_Port))))
|
|
<< "a=" << a << "\n"
|
|
<< "b=" << b;
|
|
|
|
a.ip.ip.v4.uint8[0] = 192;
|
|
b.ip.ip.v4.uint8[0] = 10;
|
|
|
|
EXPECT_EQ( //
|
|
ipport_cmp_handler(&a, &b, sizeof(IP_Port)), 1)
|
|
<< "a=" << a << "\n"
|
|
<< "b=" << b;
|
|
EXPECT_EQ( //
|
|
ipport_cmp_handler(&a, &b, sizeof(IP_Port)), //
|
|
cmp_val(memcmp(&a, &b, sizeof(IP_Port))))
|
|
<< "a=" << a << "\n"
|
|
<< "b=" << b;
|
|
}
|
|
|
|
TEST(IpportCmp, Ipv6BeginAndEndCompareCorrectly)
|
|
{
|
|
IP_Port a = {0};
|
|
IP_Port b = {0};
|
|
|
|
a.ip.family = net_family_ipv6();
|
|
b.ip.family = net_family_ipv6();
|
|
|
|
a.ip.ip.v6.uint8[0] = 0xab;
|
|
b.ip.ip.v6.uint8[0] = 0xba;
|
|
|
|
EXPECT_EQ(ipport_cmp_handler(&a, &b, sizeof(IP_Port)), -1);
|
|
|
|
a.ip.ip.v6.uint8[0] = 0;
|
|
b.ip.ip.v6.uint8[0] = 0;
|
|
|
|
a.ip.ip.v6.uint8[15] = 0xba;
|
|
|
|
EXPECT_EQ(ipport_cmp_handler(&a, &b, sizeof(IP_Port)), 1);
|
|
}
|
|
|
|
TEST(IpportCmp, UnspecAlwaysComparesEqual)
|
|
{
|
|
IP_Port a = {0};
|
|
IP_Port b = {0};
|
|
|
|
a.ip.family = net_family_unspec();
|
|
b.ip.family = net_family_unspec();
|
|
|
|
a.ip.ip.v4.uint8[0] = 0xab;
|
|
b.ip.ip.v4.uint8[0] = 0xba;
|
|
|
|
EXPECT_EQ(ipport_cmp_handler(&a, &b, sizeof(IP_Port)), 0);
|
|
}
|
|
|
|
TEST(IpportCmp, InvalidAlwaysComparesEqual)
|
|
{
|
|
IP_Port a = {0};
|
|
IP_Port b = {0};
|
|
|
|
a.ip.family.value = 0xff;
|
|
b.ip.family.value = 0xff;
|
|
|
|
a.ip.ip.v4.uint8[0] = 0xab;
|
|
b.ip.ip.v4.uint8[0] = 0xba;
|
|
|
|
EXPECT_EQ(ipport_cmp_handler(&a, &b, sizeof(IP_Port)), 0);
|
|
}
|
|
|
|
} // namespace
|