diff options
author | iphydf <iphydf@users.noreply.github.com> | 2018-07-05 10:31:29 +0000 |
---|---|---|
committer | iphydf <iphydf@users.noreply.github.com> | 2018-07-05 23:09:28 +0000 |
commit | 8739f7fccb7cafc54ca0f5fa074c9a740f7048ba (patch) | |
tree | 88e9f53fa6e734cd8095487d1896c56f844c782c /auto_tests | |
parent | 64d0297acc7d6a1697683052e15cc76383312c38 (diff) |
Make tox.c unambiguously parseable.
Rules:
1. Constants are uppercase names: THE_CONSTANT.
2. SUE[1] types start with an uppercase letter and have at least one
lowercase letter in it: The_Type, THE_Type.
3. Function types end in "_cb": tox_friend_connection_cb.
4. Variable and function names are all lowercase: the_function.
This makes it easier for humans reading the code to determine what an
identifier means. I'm not convinced by the enum type name change, but I
don't know a better rule. Currently, a lot of enum types are spelled like
constants, which is confusing.
[1] struct/union/enum
Diffstat (limited to 'auto_tests')
-rw-r--r-- | auto_tests/dht_test.c | 22 | ||||
-rw-r--r-- | auto_tests/messenger_test.c | 14 | ||||
-rw-r--r-- | auto_tests/onion_test.c | 38 |
3 files changed, 37 insertions, 37 deletions
diff --git a/auto_tests/dht_test.c b/auto_tests/dht_test.c index d51825ab..a63a55b0 100644 --- a/auto_tests/dht_test.c +++ b/auto_tests/dht_test.c | |||
@@ -330,7 +330,7 @@ static void test_addto_lists(IP ip) | |||
330 | Networking_Core *net = new_networking(log, ip, TOX_PORT_DEFAULT); | 330 | Networking_Core *net = new_networking(log, ip, TOX_PORT_DEFAULT); |
331 | ck_assert_msg(net != nullptr, "Failed to create Networking_Core"); | 331 | ck_assert_msg(net != nullptr, "Failed to create Networking_Core"); |
332 | 332 | ||
333 | DHT *dht = new_DHT(log, net, true); | 333 | DHT *dht = new_dht(log, net, true); |
334 | ck_assert_msg(dht != nullptr, "Failed to create DHT"); | 334 | ck_assert_msg(dht != nullptr, "Failed to create DHT"); |
335 | 335 | ||
336 | IP_Port ip_port; | 336 | IP_Port ip_port; |
@@ -391,7 +391,7 @@ static void test_addto_lists(IP ip) | |||
391 | test_addto_lists_good(dht, dht->friends_list[i].client_list, MAX_FRIEND_CLIENTS, &ip_port, | 391 | test_addto_lists_good(dht, dht->friends_list[i].client_list, MAX_FRIEND_CLIENTS, &ip_port, |
392 | dht->friends_list[i].public_key); | 392 | dht->friends_list[i].public_key); |
393 | 393 | ||
394 | kill_DHT(dht); | 394 | kill_dht(dht); |
395 | kill_networking(net); | 395 | kill_networking(net); |
396 | logger_kill(log); | 396 | logger_kill(log); |
397 | } | 397 | } |
@@ -475,7 +475,7 @@ static void test_list_main(void) | |||
475 | index[i] = i + 1; | 475 | index[i] = i + 1; |
476 | logger_callback_log(logs[i], (logger_cb *)print_debug_log, nullptr, &index[i]); | 476 | logger_callback_log(logs[i], (logger_cb *)print_debug_log, nullptr, &index[i]); |
477 | 477 | ||
478 | dhts[i] = new_DHT(logs[i], new_networking(logs[i], ip, DHT_DEFAULT_PORT + i), true); | 478 | dhts[i] = new_dht(logs[i], new_networking(logs[i], ip, DHT_DEFAULT_PORT + i), true); |
479 | ck_assert_msg(dhts[i] != nullptr, "Failed to create dht instances %u", i); | 479 | ck_assert_msg(dhts[i] != nullptr, "Failed to create dht instances %u", i); |
480 | ck_assert_msg(net_port(dhts[i]->net) != DHT_DEFAULT_PORT + i, | 480 | ck_assert_msg(net_port(dhts[i]->net) != DHT_DEFAULT_PORT + i, |
481 | "Bound to wrong port: %d", net_port(dhts[i]->net)); | 481 | "Bound to wrong port: %d", net_port(dhts[i]->net)); |
@@ -580,7 +580,7 @@ static void test_list_main(void) | |||
580 | 580 | ||
581 | for (i = 0; i < NUM_DHT; ++i) { | 581 | for (i = 0; i < NUM_DHT; ++i) { |
582 | Networking_Core *n = dhts[i]->net; | 582 | Networking_Core *n = dhts[i]->net; |
583 | kill_DHT(dhts[i]); | 583 | kill_dht(dhts[i]); |
584 | kill_networking(n); | 584 | kill_networking(n); |
585 | logger_kill(logs[i]); | 585 | logger_kill(logs[i]); |
586 | } | 586 | } |
@@ -620,7 +620,7 @@ START_TEST(test_DHT_test) | |||
620 | index[i] = i + 1; | 620 | index[i] = i + 1; |
621 | logger_callback_log(logs[i], (logger_cb *)print_debug_log, nullptr, &index[i]); | 621 | logger_callback_log(logs[i], (logger_cb *)print_debug_log, nullptr, &index[i]); |
622 | 622 | ||
623 | dhts[i] = new_DHT(logs[i], new_networking(logs[i], ip, DHT_DEFAULT_PORT + i), true); | 623 | dhts[i] = new_dht(logs[i], new_networking(logs[i], ip, DHT_DEFAULT_PORT + i), true); |
624 | ck_assert_msg(dhts[i] != nullptr, "Failed to create dht instances %u", i); | 624 | ck_assert_msg(dhts[i] != nullptr, "Failed to create dht instances %u", i); |
625 | ck_assert_msg(net_port(dhts[i]->net) != DHT_DEFAULT_PORT + i, "Bound to wrong port"); | 625 | ck_assert_msg(net_port(dhts[i]->net) != DHT_DEFAULT_PORT + i, "Bound to wrong port"); |
626 | } | 626 | } |
@@ -642,7 +642,7 @@ loop_top: | |||
642 | } | 642 | } |
643 | 643 | ||
644 | uint16_t lock_count = 0; | 644 | uint16_t lock_count = 0; |
645 | ck_assert_msg(DHT_addfriend(dhts[pairs[i].tox2], dhts[pairs[i].tox1]->self_public_key, &ip_callback, &to_comp, 1337, | 645 | ck_assert_msg(dht_addfriend(dhts[pairs[i].tox2], dhts[pairs[i].tox1]->self_public_key, &ip_callback, &to_comp, 1337, |
646 | &lock_count) == 0, "Failed to add friend"); | 646 | &lock_count) == 0, "Failed to add friend"); |
647 | ck_assert_msg(lock_count == 1, "bad lock count: %u %u", lock_count, i); | 647 | ck_assert_msg(lock_count == 1, "bad lock count: %u %u", lock_count, i); |
648 | } | 648 | } |
@@ -651,7 +651,7 @@ loop_top: | |||
651 | IP_Port ip_port; | 651 | IP_Port ip_port; |
652 | ip_port.ip = get_loopback(); | 652 | ip_port.ip = get_loopback(); |
653 | ip_port.port = net_htons(DHT_DEFAULT_PORT + i); | 653 | ip_port.port = net_htons(DHT_DEFAULT_PORT + i); |
654 | DHT_bootstrap(dhts[(i - 1) % NUM_DHT], ip_port, dhts[i]->self_public_key); | 654 | dht_bootstrap(dhts[(i - 1) % NUM_DHT], ip_port, dhts[i]->self_public_key); |
655 | } | 655 | } |
656 | 656 | ||
657 | while (1) { | 657 | while (1) { |
@@ -660,7 +660,7 @@ loop_top: | |||
660 | for (i = 0; i < NUM_DHT_FRIENDS; ++i) { | 660 | for (i = 0; i < NUM_DHT_FRIENDS; ++i) { |
661 | IP_Port a; | 661 | IP_Port a; |
662 | 662 | ||
663 | if (DHT_getfriendip(dhts[pairs[i].tox2], dhts[pairs[i].tox1]->self_public_key, &a) == 1) { | 663 | if (dht_getfriendip(dhts[pairs[i].tox2], dhts[pairs[i].tox1]->self_public_key, &a) == 1) { |
664 | ++counter; | 664 | ++counter; |
665 | } | 665 | } |
666 | } | 666 | } |
@@ -671,7 +671,7 @@ loop_top: | |||
671 | 671 | ||
672 | for (i = 0; i < NUM_DHT; ++i) { | 672 | for (i = 0; i < NUM_DHT; ++i) { |
673 | networking_poll(dhts[i]->net, nullptr); | 673 | networking_poll(dhts[i]->net, nullptr); |
674 | do_DHT(dhts[i]); | 674 | do_dht(dhts[i]); |
675 | } | 675 | } |
676 | 676 | ||
677 | c_sleep(500); | 677 | c_sleep(500); |
@@ -679,7 +679,7 @@ loop_top: | |||
679 | 679 | ||
680 | for (i = 0; i < NUM_DHT; ++i) { | 680 | for (i = 0; i < NUM_DHT; ++i) { |
681 | Networking_Core *n = dhts[i]->net; | 681 | Networking_Core *n = dhts[i]->net; |
682 | kill_DHT(dhts[i]); | 682 | kill_dht(dhts[i]); |
683 | kill_networking(n); | 683 | kill_networking(n); |
684 | logger_kill(logs[i]); | 684 | logger_kill(logs[i]); |
685 | } | 685 | } |
@@ -694,7 +694,7 @@ START_TEST(test_dht_create_packet) | |||
694 | uint8_t key[CRYPTO_SYMMETRIC_KEY_SIZE]; | 694 | uint8_t key[CRYPTO_SYMMETRIC_KEY_SIZE]; |
695 | new_symmetric_key(key); | 695 | new_symmetric_key(key); |
696 | 696 | ||
697 | int length = DHT_create_packet(key, key, NET_PACKET_GET_NODES, plain, sizeof(plain), pkt); | 697 | int length = dht_create_packet(key, key, NET_PACKET_GET_NODES, plain, sizeof(plain), pkt); |
698 | 698 | ||
699 | ck_assert_msg(pkt[0] == NET_PACKET_GET_NODES, "Malformed packet."); | 699 | ck_assert_msg(pkt[0] == NET_PACKET_GET_NODES, "Malformed packet."); |
700 | ck_assert_msg(memcmp(pkt + 1, key, CRYPTO_SYMMETRIC_KEY_SIZE) == 0, "Malformed packet."); | 700 | ck_assert_msg(memcmp(pkt + 1, key, CRYPTO_SYMMETRIC_KEY_SIZE) == 0, "Malformed packet."); |
diff --git a/auto_tests/messenger_test.c b/auto_tests/messenger_test.c index d7344f4d..cf42de49 100644 --- a/auto_tests/messenger_test.c +++ b/auto_tests/messenger_test.c | |||
@@ -241,18 +241,18 @@ START_TEST(test_dht_state_saveloadsave) | |||
241 | * c) a second save() is of equal size | 241 | * c) a second save() is of equal size |
242 | * d) the second save() is of equal content */ | 242 | * d) the second save() is of equal content */ |
243 | const size_t extra = 64; | 243 | const size_t extra = 64; |
244 | const size_t size = DHT_size(m->dht); | 244 | const size_t size = dht_size(m->dht); |
245 | VLA(uint8_t, buffer, size + 2 * extra); | 245 | VLA(uint8_t, buffer, size + 2 * extra); |
246 | memset(buffer, 0xCD, extra); | 246 | memset(buffer, 0xCD, extra); |
247 | memset(buffer + extra + size, 0xCD, extra); | 247 | memset(buffer + extra + size, 0xCD, extra); |
248 | DHT_save(m->dht, buffer + extra); | 248 | dht_save(m->dht, buffer + extra); |
249 | 249 | ||
250 | for (size_t i = 0; i < extra; i++) { | 250 | for (size_t i = 0; i < extra; i++) { |
251 | ck_assert_msg(buffer[i] == 0xCD, "Buffer underwritten from DHT_save() @%u", (unsigned)i); | 251 | ck_assert_msg(buffer[i] == 0xCD, "Buffer underwritten from dht_save() @%u", (unsigned)i); |
252 | ck_assert_msg(buffer[extra + size + i] == 0xCD, "Buffer overwritten from DHT_save() @%u", (unsigned)i); | 252 | ck_assert_msg(buffer[extra + size + i] == 0xCD, "Buffer overwritten from dht_save() @%u", (unsigned)i); |
253 | } | 253 | } |
254 | 254 | ||
255 | const int res = DHT_load(m->dht, buffer + extra, size); | 255 | const int res = dht_load(m->dht, buffer + extra, size); |
256 | 256 | ||
257 | if (res == -1) { | 257 | if (res == -1) { |
258 | ck_assert_msg(res == 0, "Failed to load back stored buffer: res == -1"); | 258 | ck_assert_msg(res == 0, "Failed to load back stored buffer: res == -1"); |
@@ -264,12 +264,12 @@ START_TEST(test_dht_state_saveloadsave) | |||
264 | (unsigned)offset, (unsigned)size, res & 0x0F); | 264 | (unsigned)offset, (unsigned)size, res & 0x0F); |
265 | } | 265 | } |
266 | 266 | ||
267 | const size_t size2 = DHT_size(m->dht); | 267 | const size_t size2 = dht_size(m->dht); |
268 | ck_assert_msg(size == size2, "Messenger \"grew\" in size from a store/load cycle: %u -> %u", (unsigned)size, | 268 | ck_assert_msg(size == size2, "Messenger \"grew\" in size from a store/load cycle: %u -> %u", (unsigned)size, |
269 | (unsigned)size2); | 269 | (unsigned)size2); |
270 | 270 | ||
271 | VLA(uint8_t, buffer2, size2); | 271 | VLA(uint8_t, buffer2, size2); |
272 | DHT_save(m->dht, buffer2); | 272 | dht_save(m->dht, buffer2); |
273 | 273 | ||
274 | ck_assert_msg(!memcmp(buffer + extra, buffer2, size), "DHT state changed by store/load/store cycle"); | 274 | ck_assert_msg(!memcmp(buffer + extra, buffer2, size), "DHT state changed by store/load/store cycle"); |
275 | } | 275 | } |
diff --git a/auto_tests/onion_test.c b/auto_tests/onion_test.c index 77dc7c49..a4f20cba 100644 --- a/auto_tests/onion_test.c +++ b/auto_tests/onion_test.c | |||
@@ -40,7 +40,7 @@ static inline IP get_loopback() | |||
40 | static void do_onion(Onion *onion) | 40 | static void do_onion(Onion *onion) |
41 | { | 41 | { |
42 | networking_poll(onion->net, nullptr); | 42 | networking_poll(onion->net, nullptr); |
43 | do_DHT(onion->dht); | 43 | do_dht(onion->dht); |
44 | } | 44 | } |
45 | 45 | ||
46 | static int handled_test_1; | 46 | static int handled_test_1; |
@@ -167,8 +167,8 @@ START_TEST(test_basic) | |||
167 | logger_callback_log(log2, (logger_cb *)print_debug_log, nullptr, &index[1]); | 167 | logger_callback_log(log2, (logger_cb *)print_debug_log, nullptr, &index[1]); |
168 | 168 | ||
169 | IP ip = get_loopback(); | 169 | IP ip = get_loopback(); |
170 | Onion *onion1 = new_onion(new_DHT(log1, new_networking(log1, ip, 36567), true)); | 170 | Onion *onion1 = new_onion(new_dht(log1, new_networking(log1, ip, 36567), true)); |
171 | Onion *onion2 = new_onion(new_DHT(log2, new_networking(log2, ip, 36568), true)); | 171 | Onion *onion2 = new_onion(new_dht(log2, new_networking(log2, ip, 36568), true)); |
172 | ck_assert_msg((onion1 != nullptr) && (onion2 != nullptr), "Onion failed initializing."); | 172 | ck_assert_msg((onion1 != nullptr) && (onion2 != nullptr), "Onion failed initializing."); |
173 | networking_registerhandler(onion2->net, NET_PACKET_ANNOUNCE_REQUEST, &handle_test_1, onion2); | 173 | networking_registerhandler(onion2->net, NET_PACKET_ANNOUNCE_REQUEST, &handle_test_1, onion2); |
174 | 174 | ||
@@ -256,7 +256,7 @@ START_TEST(test_basic) | |||
256 | Logger *log3 = logger_new(); | 256 | Logger *log3 = logger_new(); |
257 | logger_callback_log(log3, (logger_cb *)print_debug_log, nullptr, &index[2]); | 257 | logger_callback_log(log3, (logger_cb *)print_debug_log, nullptr, &index[2]); |
258 | 258 | ||
259 | Onion *onion3 = new_onion(new_DHT(log3, new_networking(log3, ip, 36569), true)); | 259 | Onion *onion3 = new_onion(new_dht(log3, new_networking(log3, ip, 36569), true)); |
260 | ck_assert_msg((onion3 != nullptr), "Onion failed initializing."); | 260 | ck_assert_msg((onion3 != nullptr), "Onion failed initializing."); |
261 | 261 | ||
262 | random_nonce(nonce); | 262 | random_nonce(nonce); |
@@ -282,7 +282,7 @@ START_TEST(test_basic) | |||
282 | Networking_Core *net = dht_get_net(onion->dht); | 282 | Networking_Core *net = dht_get_net(onion->dht); |
283 | DHT *dht = onion->dht; | 283 | DHT *dht = onion->dht; |
284 | kill_onion(onion); | 284 | kill_onion(onion); |
285 | kill_DHT(dht); | 285 | kill_dht(dht); |
286 | kill_networking(net); | 286 | kill_networking(net); |
287 | logger_kill(log3); | 287 | logger_kill(log3); |
288 | } | 288 | } |
@@ -293,7 +293,7 @@ START_TEST(test_basic) | |||
293 | Networking_Core *net = dht_get_net(onion->dht); | 293 | Networking_Core *net = dht_get_net(onion->dht); |
294 | DHT *dht = onion->dht; | 294 | DHT *dht = onion->dht; |
295 | kill_onion(onion); | 295 | kill_onion(onion); |
296 | kill_DHT(dht); | 296 | kill_dht(dht); |
297 | kill_networking(net); | 297 | kill_networking(net); |
298 | logger_kill(log2); | 298 | logger_kill(log2); |
299 | } | 299 | } |
@@ -304,7 +304,7 @@ START_TEST(test_basic) | |||
304 | Networking_Core *net = dht_get_net(onion->dht); | 304 | Networking_Core *net = dht_get_net(onion->dht); |
305 | DHT *dht = onion->dht; | 305 | DHT *dht = onion->dht; |
306 | kill_onion(onion); | 306 | kill_onion(onion); |
307 | kill_DHT(dht); | 307 | kill_dht(dht); |
308 | kill_networking(net); | 308 | kill_networking(net); |
309 | logger_kill(log1); | 309 | logger_kill(log1); |
310 | } | 310 | } |
@@ -345,7 +345,7 @@ static Onions *new_onions(uint16_t port, uint32_t *index) | |||
345 | return nullptr; | 345 | return nullptr; |
346 | } | 346 | } |
347 | 347 | ||
348 | DHT *dht = new_DHT(on->log, net, true); | 348 | DHT *dht = new_dht(on->log, net, true); |
349 | 349 | ||
350 | if (!dht) { | 350 | if (!dht) { |
351 | kill_networking(net); | 351 | kill_networking(net); |
@@ -357,7 +357,7 @@ static Onions *new_onions(uint16_t port, uint32_t *index) | |||
357 | on->onion = new_onion(dht); | 357 | on->onion = new_onion(dht); |
358 | 358 | ||
359 | if (!on->onion) { | 359 | if (!on->onion) { |
360 | kill_DHT(dht); | 360 | kill_dht(dht); |
361 | kill_networking(net); | 361 | kill_networking(net); |
362 | logger_kill(on->log); | 362 | logger_kill(on->log); |
363 | free(on); | 363 | free(on); |
@@ -368,7 +368,7 @@ static Onions *new_onions(uint16_t port, uint32_t *index) | |||
368 | 368 | ||
369 | if (!on->onion_a) { | 369 | if (!on->onion_a) { |
370 | kill_onion(on->onion); | 370 | kill_onion(on->onion); |
371 | kill_DHT(dht); | 371 | kill_dht(dht); |
372 | kill_networking(net); | 372 | kill_networking(net); |
373 | logger_kill(on->log); | 373 | logger_kill(on->log); |
374 | free(on); | 374 | free(on); |
@@ -381,7 +381,7 @@ static Onions *new_onions(uint16_t port, uint32_t *index) | |||
381 | if (!on->onion_c) { | 381 | if (!on->onion_c) { |
382 | kill_onion_announce(on->onion_a); | 382 | kill_onion_announce(on->onion_a); |
383 | kill_onion(on->onion); | 383 | kill_onion(on->onion); |
384 | kill_DHT(dht); | 384 | kill_dht(dht); |
385 | kill_networking(net); | 385 | kill_networking(net); |
386 | logger_kill(on->log); | 386 | logger_kill(on->log); |
387 | free(on); | 387 | free(on); |
@@ -394,7 +394,7 @@ static Onions *new_onions(uint16_t port, uint32_t *index) | |||
394 | static void do_onions(Onions *on) | 394 | static void do_onions(Onions *on) |
395 | { | 395 | { |
396 | networking_poll(on->onion->net, nullptr); | 396 | networking_poll(on->onion->net, nullptr); |
397 | do_DHT(on->onion->dht); | 397 | do_dht(on->onion->dht); |
398 | do_onion_client(on->onion_c); | 398 | do_onion_client(on->onion_c); |
399 | } | 399 | } |
400 | 400 | ||
@@ -407,7 +407,7 @@ static void kill_onions(Onions *on) | |||
407 | kill_onion_announce(on->onion_a); | 407 | kill_onion_announce(on->onion_a); |
408 | kill_onion(on->onion); | 408 | kill_onion(on->onion); |
409 | kill_net_crypto(c); | 409 | kill_net_crypto(c); |
410 | kill_DHT(dht); | 410 | kill_dht(dht); |
411 | kill_networking(net); | 411 | kill_networking(net); |
412 | logger_kill(on->log); | 412 | logger_kill(on->log); |
413 | free(on); | 413 | free(on); |
@@ -442,8 +442,8 @@ static void dht_pk_callback(void *object, int32_t number, const uint8_t *dht_pub | |||
442 | if ((NUM_FIRST == number && !first) || (NUM_LAST == number && !last)) { | 442 | if ((NUM_FIRST == number && !first) || (NUM_LAST == number && !last)) { |
443 | Onions *on = (Onions *)object; | 443 | Onions *on = (Onions *)object; |
444 | uint16_t count = 0; | 444 | uint16_t count = 0; |
445 | int ret = DHT_addfriend(on->onion->dht, dht_public_key, &dht_ip_callback, object, number, &count); | 445 | int ret = dht_addfriend(on->onion->dht, dht_public_key, &dht_ip_callback, object, number, &count); |
446 | ck_assert_msg(ret == 0, "DHT_addfriend() did not return 0"); | 446 | ck_assert_msg(ret == 0, "dht_addfriend() did not return 0"); |
447 | ck_assert_msg(count == 1, "Count not 1, count is %u", count); | 447 | ck_assert_msg(count == 1, "Count not 1, count is %u", count); |
448 | 448 | ||
449 | if (NUM_FIRST == number && !first) { | 449 | if (NUM_FIRST == number && !first) { |
@@ -486,11 +486,11 @@ START_TEST(test_announce) | |||
486 | 486 | ||
487 | for (i = 3; i < NUM_ONIONS; ++i) { | 487 | for (i = 3; i < NUM_ONIONS; ++i) { |
488 | IP_Port ip_port = {ip, net_port(onions[i - 1]->onion->net)}; | 488 | IP_Port ip_port = {ip, net_port(onions[i - 1]->onion->net)}; |
489 | DHT_bootstrap(onions[i]->onion->dht, ip_port, dht_get_self_public_key(onions[i - 1]->onion->dht)); | 489 | dht_bootstrap(onions[i]->onion->dht, ip_port, dht_get_self_public_key(onions[i - 1]->onion->dht)); |
490 | IP_Port ip_port1 = {ip, net_port(onions[i - 2]->onion->net)}; | 490 | IP_Port ip_port1 = {ip, net_port(onions[i - 2]->onion->net)}; |
491 | DHT_bootstrap(onions[i]->onion->dht, ip_port1, dht_get_self_public_key(onions[i - 2]->onion->dht)); | 491 | dht_bootstrap(onions[i]->onion->dht, ip_port1, dht_get_self_public_key(onions[i - 2]->onion->dht)); |
492 | IP_Port ip_port2 = {ip, net_port(onions[i - 3]->onion->net)}; | 492 | IP_Port ip_port2 = {ip, net_port(onions[i - 3]->onion->net)}; |
493 | DHT_bootstrap(onions[i]->onion->dht, ip_port2, dht_get_self_public_key(onions[i - 3]->onion->dht)); | 493 | dht_bootstrap(onions[i]->onion->dht, ip_port2, dht_get_self_public_key(onions[i - 3]->onion->dht)); |
494 | } | 494 | } |
495 | 495 | ||
496 | uint32_t connected = 0; | 496 | uint32_t connected = 0; |
@@ -500,7 +500,7 @@ START_TEST(test_announce) | |||
500 | 500 | ||
501 | for (i = 0; i < NUM_ONIONS; ++i) { | 501 | for (i = 0; i < NUM_ONIONS; ++i) { |
502 | do_onions(onions[i]); | 502 | do_onions(onions[i]); |
503 | connected += DHT_isconnected(onions[i]->onion->dht); | 503 | connected += dht_isconnected(onions[i]->onion->dht); |
504 | } | 504 | } |
505 | 505 | ||
506 | c_sleep(50); | 506 | c_sleep(50); |