summaryrefslogtreecommitdiff
path: root/auto_tests
diff options
context:
space:
mode:
authoriphydf <iphydf@users.noreply.github.com>2018-07-05 10:31:29 +0000
committeriphydf <iphydf@users.noreply.github.com>2018-07-05 23:09:28 +0000
commit8739f7fccb7cafc54ca0f5fa074c9a740f7048ba (patch)
tree88e9f53fa6e734cd8095487d1896c56f844c782c /auto_tests
parent64d0297acc7d6a1697683052e15cc76383312c38 (diff)
Make tox.c unambiguously parseable.
Rules: 1. Constants are uppercase names: THE_CONSTANT. 2. SUE[1] types start with an uppercase letter and have at least one lowercase letter in it: The_Type, THE_Type. 3. Function types end in "_cb": tox_friend_connection_cb. 4. Variable and function names are all lowercase: the_function. This makes it easier for humans reading the code to determine what an identifier means. I'm not convinced by the enum type name change, but I don't know a better rule. Currently, a lot of enum types are spelled like constants, which is confusing. [1] struct/union/enum
Diffstat (limited to 'auto_tests')
-rw-r--r--auto_tests/dht_test.c22
-rw-r--r--auto_tests/messenger_test.c14
-rw-r--r--auto_tests/onion_test.c38
3 files changed, 37 insertions, 37 deletions
diff --git a/auto_tests/dht_test.c b/auto_tests/dht_test.c
index d51825ab..a63a55b0 100644
--- a/auto_tests/dht_test.c
+++ b/auto_tests/dht_test.c
@@ -330,7 +330,7 @@ static void test_addto_lists(IP ip)
330 Networking_Core *net = new_networking(log, ip, TOX_PORT_DEFAULT); 330 Networking_Core *net = new_networking(log, ip, TOX_PORT_DEFAULT);
331 ck_assert_msg(net != nullptr, "Failed to create Networking_Core"); 331 ck_assert_msg(net != nullptr, "Failed to create Networking_Core");
332 332
333 DHT *dht = new_DHT(log, net, true); 333 DHT *dht = new_dht(log, net, true);
334 ck_assert_msg(dht != nullptr, "Failed to create DHT"); 334 ck_assert_msg(dht != nullptr, "Failed to create DHT");
335 335
336 IP_Port ip_port; 336 IP_Port ip_port;
@@ -391,7 +391,7 @@ static void test_addto_lists(IP ip)
391 test_addto_lists_good(dht, dht->friends_list[i].client_list, MAX_FRIEND_CLIENTS, &ip_port, 391 test_addto_lists_good(dht, dht->friends_list[i].client_list, MAX_FRIEND_CLIENTS, &ip_port,
392 dht->friends_list[i].public_key); 392 dht->friends_list[i].public_key);
393 393
394 kill_DHT(dht); 394 kill_dht(dht);
395 kill_networking(net); 395 kill_networking(net);
396 logger_kill(log); 396 logger_kill(log);
397} 397}
@@ -475,7 +475,7 @@ static void test_list_main(void)
475 index[i] = i + 1; 475 index[i] = i + 1;
476 logger_callback_log(logs[i], (logger_cb *)print_debug_log, nullptr, &index[i]); 476 logger_callback_log(logs[i], (logger_cb *)print_debug_log, nullptr, &index[i]);
477 477
478 dhts[i] = new_DHT(logs[i], new_networking(logs[i], ip, DHT_DEFAULT_PORT + i), true); 478 dhts[i] = new_dht(logs[i], new_networking(logs[i], ip, DHT_DEFAULT_PORT + i), true);
479 ck_assert_msg(dhts[i] != nullptr, "Failed to create dht instances %u", i); 479 ck_assert_msg(dhts[i] != nullptr, "Failed to create dht instances %u", i);
480 ck_assert_msg(net_port(dhts[i]->net) != DHT_DEFAULT_PORT + i, 480 ck_assert_msg(net_port(dhts[i]->net) != DHT_DEFAULT_PORT + i,
481 "Bound to wrong port: %d", net_port(dhts[i]->net)); 481 "Bound to wrong port: %d", net_port(dhts[i]->net));
@@ -580,7 +580,7 @@ static void test_list_main(void)
580 580
581 for (i = 0; i < NUM_DHT; ++i) { 581 for (i = 0; i < NUM_DHT; ++i) {
582 Networking_Core *n = dhts[i]->net; 582 Networking_Core *n = dhts[i]->net;
583 kill_DHT(dhts[i]); 583 kill_dht(dhts[i]);
584 kill_networking(n); 584 kill_networking(n);
585 logger_kill(logs[i]); 585 logger_kill(logs[i]);
586 } 586 }
@@ -620,7 +620,7 @@ START_TEST(test_DHT_test)
620 index[i] = i + 1; 620 index[i] = i + 1;
621 logger_callback_log(logs[i], (logger_cb *)print_debug_log, nullptr, &index[i]); 621 logger_callback_log(logs[i], (logger_cb *)print_debug_log, nullptr, &index[i]);
622 622
623 dhts[i] = new_DHT(logs[i], new_networking(logs[i], ip, DHT_DEFAULT_PORT + i), true); 623 dhts[i] = new_dht(logs[i], new_networking(logs[i], ip, DHT_DEFAULT_PORT + i), true);
624 ck_assert_msg(dhts[i] != nullptr, "Failed to create dht instances %u", i); 624 ck_assert_msg(dhts[i] != nullptr, "Failed to create dht instances %u", i);
625 ck_assert_msg(net_port(dhts[i]->net) != DHT_DEFAULT_PORT + i, "Bound to wrong port"); 625 ck_assert_msg(net_port(dhts[i]->net) != DHT_DEFAULT_PORT + i, "Bound to wrong port");
626 } 626 }
@@ -642,7 +642,7 @@ loop_top:
642 } 642 }
643 643
644 uint16_t lock_count = 0; 644 uint16_t lock_count = 0;
645 ck_assert_msg(DHT_addfriend(dhts[pairs[i].tox2], dhts[pairs[i].tox1]->self_public_key, &ip_callback, &to_comp, 1337, 645 ck_assert_msg(dht_addfriend(dhts[pairs[i].tox2], dhts[pairs[i].tox1]->self_public_key, &ip_callback, &to_comp, 1337,
646 &lock_count) == 0, "Failed to add friend"); 646 &lock_count) == 0, "Failed to add friend");
647 ck_assert_msg(lock_count == 1, "bad lock count: %u %u", lock_count, i); 647 ck_assert_msg(lock_count == 1, "bad lock count: %u %u", lock_count, i);
648 } 648 }
@@ -651,7 +651,7 @@ loop_top:
651 IP_Port ip_port; 651 IP_Port ip_port;
652 ip_port.ip = get_loopback(); 652 ip_port.ip = get_loopback();
653 ip_port.port = net_htons(DHT_DEFAULT_PORT + i); 653 ip_port.port = net_htons(DHT_DEFAULT_PORT + i);
654 DHT_bootstrap(dhts[(i - 1) % NUM_DHT], ip_port, dhts[i]->self_public_key); 654 dht_bootstrap(dhts[(i - 1) % NUM_DHT], ip_port, dhts[i]->self_public_key);
655 } 655 }
656 656
657 while (1) { 657 while (1) {
@@ -660,7 +660,7 @@ loop_top:
660 for (i = 0; i < NUM_DHT_FRIENDS; ++i) { 660 for (i = 0; i < NUM_DHT_FRIENDS; ++i) {
661 IP_Port a; 661 IP_Port a;
662 662
663 if (DHT_getfriendip(dhts[pairs[i].tox2], dhts[pairs[i].tox1]->self_public_key, &a) == 1) { 663 if (dht_getfriendip(dhts[pairs[i].tox2], dhts[pairs[i].tox1]->self_public_key, &a) == 1) {
664 ++counter; 664 ++counter;
665 } 665 }
666 } 666 }
@@ -671,7 +671,7 @@ loop_top:
671 671
672 for (i = 0; i < NUM_DHT; ++i) { 672 for (i = 0; i < NUM_DHT; ++i) {
673 networking_poll(dhts[i]->net, nullptr); 673 networking_poll(dhts[i]->net, nullptr);
674 do_DHT(dhts[i]); 674 do_dht(dhts[i]);
675 } 675 }
676 676
677 c_sleep(500); 677 c_sleep(500);
@@ -679,7 +679,7 @@ loop_top:
679 679
680 for (i = 0; i < NUM_DHT; ++i) { 680 for (i = 0; i < NUM_DHT; ++i) {
681 Networking_Core *n = dhts[i]->net; 681 Networking_Core *n = dhts[i]->net;
682 kill_DHT(dhts[i]); 682 kill_dht(dhts[i]);
683 kill_networking(n); 683 kill_networking(n);
684 logger_kill(logs[i]); 684 logger_kill(logs[i]);
685 } 685 }
@@ -694,7 +694,7 @@ START_TEST(test_dht_create_packet)
694 uint8_t key[CRYPTO_SYMMETRIC_KEY_SIZE]; 694 uint8_t key[CRYPTO_SYMMETRIC_KEY_SIZE];
695 new_symmetric_key(key); 695 new_symmetric_key(key);
696 696
697 int length = DHT_create_packet(key, key, NET_PACKET_GET_NODES, plain, sizeof(plain), pkt); 697 int length = dht_create_packet(key, key, NET_PACKET_GET_NODES, plain, sizeof(plain), pkt);
698 698
699 ck_assert_msg(pkt[0] == NET_PACKET_GET_NODES, "Malformed packet."); 699 ck_assert_msg(pkt[0] == NET_PACKET_GET_NODES, "Malformed packet.");
700 ck_assert_msg(memcmp(pkt + 1, key, CRYPTO_SYMMETRIC_KEY_SIZE) == 0, "Malformed packet."); 700 ck_assert_msg(memcmp(pkt + 1, key, CRYPTO_SYMMETRIC_KEY_SIZE) == 0, "Malformed packet.");
diff --git a/auto_tests/messenger_test.c b/auto_tests/messenger_test.c
index d7344f4d..cf42de49 100644
--- a/auto_tests/messenger_test.c
+++ b/auto_tests/messenger_test.c
@@ -241,18 +241,18 @@ START_TEST(test_dht_state_saveloadsave)
241 * c) a second save() is of equal size 241 * c) a second save() is of equal size
242 * d) the second save() is of equal content */ 242 * d) the second save() is of equal content */
243 const size_t extra = 64; 243 const size_t extra = 64;
244 const size_t size = DHT_size(m->dht); 244 const size_t size = dht_size(m->dht);
245 VLA(uint8_t, buffer, size + 2 * extra); 245 VLA(uint8_t, buffer, size + 2 * extra);
246 memset(buffer, 0xCD, extra); 246 memset(buffer, 0xCD, extra);
247 memset(buffer + extra + size, 0xCD, extra); 247 memset(buffer + extra + size, 0xCD, extra);
248 DHT_save(m->dht, buffer + extra); 248 dht_save(m->dht, buffer + extra);
249 249
250 for (size_t i = 0; i < extra; i++) { 250 for (size_t i = 0; i < extra; i++) {
251 ck_assert_msg(buffer[i] == 0xCD, "Buffer underwritten from DHT_save() @%u", (unsigned)i); 251 ck_assert_msg(buffer[i] == 0xCD, "Buffer underwritten from dht_save() @%u", (unsigned)i);
252 ck_assert_msg(buffer[extra + size + i] == 0xCD, "Buffer overwritten from DHT_save() @%u", (unsigned)i); 252 ck_assert_msg(buffer[extra + size + i] == 0xCD, "Buffer overwritten from dht_save() @%u", (unsigned)i);
253 } 253 }
254 254
255 const int res = DHT_load(m->dht, buffer + extra, size); 255 const int res = dht_load(m->dht, buffer + extra, size);
256 256
257 if (res == -1) { 257 if (res == -1) {
258 ck_assert_msg(res == 0, "Failed to load back stored buffer: res == -1"); 258 ck_assert_msg(res == 0, "Failed to load back stored buffer: res == -1");
@@ -264,12 +264,12 @@ START_TEST(test_dht_state_saveloadsave)
264 (unsigned)offset, (unsigned)size, res & 0x0F); 264 (unsigned)offset, (unsigned)size, res & 0x0F);
265 } 265 }
266 266
267 const size_t size2 = DHT_size(m->dht); 267 const size_t size2 = dht_size(m->dht);
268 ck_assert_msg(size == size2, "Messenger \"grew\" in size from a store/load cycle: %u -> %u", (unsigned)size, 268 ck_assert_msg(size == size2, "Messenger \"grew\" in size from a store/load cycle: %u -> %u", (unsigned)size,
269 (unsigned)size2); 269 (unsigned)size2);
270 270
271 VLA(uint8_t, buffer2, size2); 271 VLA(uint8_t, buffer2, size2);
272 DHT_save(m->dht, buffer2); 272 dht_save(m->dht, buffer2);
273 273
274 ck_assert_msg(!memcmp(buffer + extra, buffer2, size), "DHT state changed by store/load/store cycle"); 274 ck_assert_msg(!memcmp(buffer + extra, buffer2, size), "DHT state changed by store/load/store cycle");
275} 275}
diff --git a/auto_tests/onion_test.c b/auto_tests/onion_test.c
index 77dc7c49..a4f20cba 100644
--- a/auto_tests/onion_test.c
+++ b/auto_tests/onion_test.c
@@ -40,7 +40,7 @@ static inline IP get_loopback()
40static void do_onion(Onion *onion) 40static void do_onion(Onion *onion)
41{ 41{
42 networking_poll(onion->net, nullptr); 42 networking_poll(onion->net, nullptr);
43 do_DHT(onion->dht); 43 do_dht(onion->dht);
44} 44}
45 45
46static int handled_test_1; 46static int handled_test_1;
@@ -167,8 +167,8 @@ START_TEST(test_basic)
167 logger_callback_log(log2, (logger_cb *)print_debug_log, nullptr, &index[1]); 167 logger_callback_log(log2, (logger_cb *)print_debug_log, nullptr, &index[1]);
168 168
169 IP ip = get_loopback(); 169 IP ip = get_loopback();
170 Onion *onion1 = new_onion(new_DHT(log1, new_networking(log1, ip, 36567), true)); 170 Onion *onion1 = new_onion(new_dht(log1, new_networking(log1, ip, 36567), true));
171 Onion *onion2 = new_onion(new_DHT(log2, new_networking(log2, ip, 36568), true)); 171 Onion *onion2 = new_onion(new_dht(log2, new_networking(log2, ip, 36568), true));
172 ck_assert_msg((onion1 != nullptr) && (onion2 != nullptr), "Onion failed initializing."); 172 ck_assert_msg((onion1 != nullptr) && (onion2 != nullptr), "Onion failed initializing.");
173 networking_registerhandler(onion2->net, NET_PACKET_ANNOUNCE_REQUEST, &handle_test_1, onion2); 173 networking_registerhandler(onion2->net, NET_PACKET_ANNOUNCE_REQUEST, &handle_test_1, onion2);
174 174
@@ -256,7 +256,7 @@ START_TEST(test_basic)
256 Logger *log3 = logger_new(); 256 Logger *log3 = logger_new();
257 logger_callback_log(log3, (logger_cb *)print_debug_log, nullptr, &index[2]); 257 logger_callback_log(log3, (logger_cb *)print_debug_log, nullptr, &index[2]);
258 258
259 Onion *onion3 = new_onion(new_DHT(log3, new_networking(log3, ip, 36569), true)); 259 Onion *onion3 = new_onion(new_dht(log3, new_networking(log3, ip, 36569), true));
260 ck_assert_msg((onion3 != nullptr), "Onion failed initializing."); 260 ck_assert_msg((onion3 != nullptr), "Onion failed initializing.");
261 261
262 random_nonce(nonce); 262 random_nonce(nonce);
@@ -282,7 +282,7 @@ START_TEST(test_basic)
282 Networking_Core *net = dht_get_net(onion->dht); 282 Networking_Core *net = dht_get_net(onion->dht);
283 DHT *dht = onion->dht; 283 DHT *dht = onion->dht;
284 kill_onion(onion); 284 kill_onion(onion);
285 kill_DHT(dht); 285 kill_dht(dht);
286 kill_networking(net); 286 kill_networking(net);
287 logger_kill(log3); 287 logger_kill(log3);
288 } 288 }
@@ -293,7 +293,7 @@ START_TEST(test_basic)
293 Networking_Core *net = dht_get_net(onion->dht); 293 Networking_Core *net = dht_get_net(onion->dht);
294 DHT *dht = onion->dht; 294 DHT *dht = onion->dht;
295 kill_onion(onion); 295 kill_onion(onion);
296 kill_DHT(dht); 296 kill_dht(dht);
297 kill_networking(net); 297 kill_networking(net);
298 logger_kill(log2); 298 logger_kill(log2);
299 } 299 }
@@ -304,7 +304,7 @@ START_TEST(test_basic)
304 Networking_Core *net = dht_get_net(onion->dht); 304 Networking_Core *net = dht_get_net(onion->dht);
305 DHT *dht = onion->dht; 305 DHT *dht = onion->dht;
306 kill_onion(onion); 306 kill_onion(onion);
307 kill_DHT(dht); 307 kill_dht(dht);
308 kill_networking(net); 308 kill_networking(net);
309 logger_kill(log1); 309 logger_kill(log1);
310 } 310 }
@@ -345,7 +345,7 @@ static Onions *new_onions(uint16_t port, uint32_t *index)
345 return nullptr; 345 return nullptr;
346 } 346 }
347 347
348 DHT *dht = new_DHT(on->log, net, true); 348 DHT *dht = new_dht(on->log, net, true);
349 349
350 if (!dht) { 350 if (!dht) {
351 kill_networking(net); 351 kill_networking(net);
@@ -357,7 +357,7 @@ static Onions *new_onions(uint16_t port, uint32_t *index)
357 on->onion = new_onion(dht); 357 on->onion = new_onion(dht);
358 358
359 if (!on->onion) { 359 if (!on->onion) {
360 kill_DHT(dht); 360 kill_dht(dht);
361 kill_networking(net); 361 kill_networking(net);
362 logger_kill(on->log); 362 logger_kill(on->log);
363 free(on); 363 free(on);
@@ -368,7 +368,7 @@ static Onions *new_onions(uint16_t port, uint32_t *index)
368 368
369 if (!on->onion_a) { 369 if (!on->onion_a) {
370 kill_onion(on->onion); 370 kill_onion(on->onion);
371 kill_DHT(dht); 371 kill_dht(dht);
372 kill_networking(net); 372 kill_networking(net);
373 logger_kill(on->log); 373 logger_kill(on->log);
374 free(on); 374 free(on);
@@ -381,7 +381,7 @@ static Onions *new_onions(uint16_t port, uint32_t *index)
381 if (!on->onion_c) { 381 if (!on->onion_c) {
382 kill_onion_announce(on->onion_a); 382 kill_onion_announce(on->onion_a);
383 kill_onion(on->onion); 383 kill_onion(on->onion);
384 kill_DHT(dht); 384 kill_dht(dht);
385 kill_networking(net); 385 kill_networking(net);
386 logger_kill(on->log); 386 logger_kill(on->log);
387 free(on); 387 free(on);
@@ -394,7 +394,7 @@ static Onions *new_onions(uint16_t port, uint32_t *index)
394static void do_onions(Onions *on) 394static void do_onions(Onions *on)
395{ 395{
396 networking_poll(on->onion->net, nullptr); 396 networking_poll(on->onion->net, nullptr);
397 do_DHT(on->onion->dht); 397 do_dht(on->onion->dht);
398 do_onion_client(on->onion_c); 398 do_onion_client(on->onion_c);
399} 399}
400 400
@@ -407,7 +407,7 @@ static void kill_onions(Onions *on)
407 kill_onion_announce(on->onion_a); 407 kill_onion_announce(on->onion_a);
408 kill_onion(on->onion); 408 kill_onion(on->onion);
409 kill_net_crypto(c); 409 kill_net_crypto(c);
410 kill_DHT(dht); 410 kill_dht(dht);
411 kill_networking(net); 411 kill_networking(net);
412 logger_kill(on->log); 412 logger_kill(on->log);
413 free(on); 413 free(on);
@@ -442,8 +442,8 @@ static void dht_pk_callback(void *object, int32_t number, const uint8_t *dht_pub
442 if ((NUM_FIRST == number && !first) || (NUM_LAST == number && !last)) { 442 if ((NUM_FIRST == number && !first) || (NUM_LAST == number && !last)) {
443 Onions *on = (Onions *)object; 443 Onions *on = (Onions *)object;
444 uint16_t count = 0; 444 uint16_t count = 0;
445 int ret = DHT_addfriend(on->onion->dht, dht_public_key, &dht_ip_callback, object, number, &count); 445 int ret = dht_addfriend(on->onion->dht, dht_public_key, &dht_ip_callback, object, number, &count);
446 ck_assert_msg(ret == 0, "DHT_addfriend() did not return 0"); 446 ck_assert_msg(ret == 0, "dht_addfriend() did not return 0");
447 ck_assert_msg(count == 1, "Count not 1, count is %u", count); 447 ck_assert_msg(count == 1, "Count not 1, count is %u", count);
448 448
449 if (NUM_FIRST == number && !first) { 449 if (NUM_FIRST == number && !first) {
@@ -486,11 +486,11 @@ START_TEST(test_announce)
486 486
487 for (i = 3; i < NUM_ONIONS; ++i) { 487 for (i = 3; i < NUM_ONIONS; ++i) {
488 IP_Port ip_port = {ip, net_port(onions[i - 1]->onion->net)}; 488 IP_Port ip_port = {ip, net_port(onions[i - 1]->onion->net)};
489 DHT_bootstrap(onions[i]->onion->dht, ip_port, dht_get_self_public_key(onions[i - 1]->onion->dht)); 489 dht_bootstrap(onions[i]->onion->dht, ip_port, dht_get_self_public_key(onions[i - 1]->onion->dht));
490 IP_Port ip_port1 = {ip, net_port(onions[i - 2]->onion->net)}; 490 IP_Port ip_port1 = {ip, net_port(onions[i - 2]->onion->net)};
491 DHT_bootstrap(onions[i]->onion->dht, ip_port1, dht_get_self_public_key(onions[i - 2]->onion->dht)); 491 dht_bootstrap(onions[i]->onion->dht, ip_port1, dht_get_self_public_key(onions[i - 2]->onion->dht));
492 IP_Port ip_port2 = {ip, net_port(onions[i - 3]->onion->net)}; 492 IP_Port ip_port2 = {ip, net_port(onions[i - 3]->onion->net)};
493 DHT_bootstrap(onions[i]->onion->dht, ip_port2, dht_get_self_public_key(onions[i - 3]->onion->dht)); 493 dht_bootstrap(onions[i]->onion->dht, ip_port2, dht_get_self_public_key(onions[i - 3]->onion->dht));
494 } 494 }
495 495
496 uint32_t connected = 0; 496 uint32_t connected = 0;
@@ -500,7 +500,7 @@ START_TEST(test_announce)
500 500
501 for (i = 0; i < NUM_ONIONS; ++i) { 501 for (i = 0; i < NUM_ONIONS; ++i) {
502 do_onions(onions[i]); 502 do_onions(onions[i]);
503 connected += DHT_isconnected(onions[i]->onion->dht); 503 connected += dht_isconnected(onions[i]->onion->dht);
504 } 504 }
505 505
506 c_sleep(50); 506 c_sleep(50);