summaryrefslogtreecommitdiff
path: root/auto_tests/TCP_test.c
diff options
context:
space:
mode:
Diffstat (limited to 'auto_tests/TCP_test.c')
-rw-r--r--auto_tests/TCP_test.c117
1 files changed, 117 insertions, 0 deletions
diff --git a/auto_tests/TCP_test.c b/auto_tests/TCP_test.c
new file mode 100644
index 00000000..983b07d2
--- /dev/null
+++ b/auto_tests/TCP_test.c
@@ -0,0 +1,117 @@
1#ifdef HAVE_CONFIG_H
2#include "config.h"
3#endif
4
5#include <sys/types.h>
6#include <stdint.h>
7#include <string.h>
8#include <check.h>
9#include <stdlib.h>
10#include <time.h>
11
12#include "../toxcore/TCP_server.h"
13#include "../toxcore/util.h"
14
15#if defined(_WIN32) || defined(__WIN32__) || defined (WIN32)
16#define c_sleep(x) Sleep(1*x)
17#else
18#include <unistd.h>
19#define c_sleep(x) usleep(1000*x)
20#endif
21
22#define NUM_PORTS 3
23
24START_TEST(test_basic)
25{
26 uint16_t ports[NUM_PORTS] = {12345, 33445, 25643};
27 uint8_t self_public_key[crypto_box_PUBLICKEYBYTES];
28 uint8_t self_secret_key[crypto_box_SECRETKEYBYTES];
29 crypto_box_keypair(self_public_key, self_secret_key);
30 TCP_Server *tcp_s = new_TCP_server(1, NUM_PORTS, ports, self_public_key, self_secret_key);
31 ck_assert_msg(tcp_s != NULL, "Failed to create TCP relay server");
32
33 sock_t sock = socket(AF_INET6, SOCK_STREAM, IPPROTO_TCP);
34 struct sockaddr_in6 addr6_loopback = {0};
35 addr6_loopback.sin6_family = AF_INET6;
36 addr6_loopback.sin6_port = htons(ports[rand() % NUM_PORTS]);
37 addr6_loopback.sin6_addr = in6addr_loopback;
38
39 int ret = connect(sock, (struct sockaddr *)&addr6_loopback, sizeof(addr6_loopback));
40 ck_assert_msg(ret == 0, "Failed to connect to TCP relay server");
41
42 uint8_t f_public_key[crypto_box_PUBLICKEYBYTES];
43 uint8_t f_secret_key[crypto_box_SECRETKEYBYTES];
44 uint8_t f_nonce[crypto_box_NONCEBYTES];
45 crypto_box_keypair(f_public_key, f_secret_key);
46 random_nonce(f_nonce);
47
48 uint8_t t_secret_key[crypto_box_SECRETKEYBYTES];
49 uint8_t handshake_plain[TCP_HANDSHAKE_PLAIN_SIZE];
50 crypto_box_keypair(handshake_plain, t_secret_key);
51 memcpy(handshake_plain + crypto_box_PUBLICKEYBYTES, f_nonce, crypto_box_NONCEBYTES);
52 uint8_t handshake[TCP_CLIENT_HANDSHAKE_SIZE];
53 memcpy(handshake, f_public_key, crypto_box_PUBLICKEYBYTES);
54 new_nonce(handshake + crypto_box_PUBLICKEYBYTES);
55
56 ret = encrypt_data(self_public_key, f_secret_key, handshake + crypto_box_PUBLICKEYBYTES, handshake_plain,
57 TCP_HANDSHAKE_PLAIN_SIZE, handshake + crypto_box_PUBLICKEYBYTES + crypto_box_NONCEBYTES);
58 ck_assert_msg(ret == TCP_CLIENT_HANDSHAKE_SIZE - (crypto_box_PUBLICKEYBYTES + crypto_box_NONCEBYTES),
59 "Encrypt failed.");
60 ck_assert_msg(send(sock, handshake, TCP_CLIENT_HANDSHAKE_SIZE - 1, 0) == TCP_CLIENT_HANDSHAKE_SIZE - 1, "send Failed.");
61 c_sleep(50);
62 do_TCP_server(tcp_s);
63 c_sleep(50);
64 do_TCP_server(tcp_s);
65 c_sleep(50);
66 ck_assert_msg(send(sock, handshake + (TCP_CLIENT_HANDSHAKE_SIZE - 1), 1, 0) == 1, "send Failed.");
67 c_sleep(50);
68 do_TCP_server(tcp_s);
69 c_sleep(50);
70 do_TCP_server(tcp_s);
71 c_sleep(50);
72 uint8_t response[TCP_SERVER_HANDSHAKE_SIZE];
73 uint8_t response_plain[TCP_HANDSHAKE_PLAIN_SIZE];
74 ck_assert_msg(recv(sock, response, TCP_SERVER_HANDSHAKE_SIZE, 0) == TCP_SERVER_HANDSHAKE_SIZE, "recv Failed.");
75 ret = decrypt_data(self_public_key, f_secret_key, response, response + crypto_box_NONCEBYTES,
76 TCP_SERVER_HANDSHAKE_SIZE - crypto_box_NONCEBYTES, response_plain);
77 ck_assert_msg(ret == TCP_HANDSHAKE_PLAIN_SIZE, "Decrypt Failed.");
78 uint8_t f_nonce_r[crypto_box_NONCEBYTES];
79 uint8_t f_shared_key[crypto_box_BEFORENMBYTES];
80 encrypt_precompute(response_plain, t_secret_key, f_shared_key);
81 memcpy(f_nonce_r, response_plain + crypto_box_BEFORENMBYTES, crypto_box_NONCEBYTES);
82
83
84}
85END_TEST
86
87#define DEFTESTCASE(NAME) \
88 TCase *tc_##NAME = tcase_create(#NAME); \
89 tcase_add_test(tc_##NAME, test_##NAME); \
90 suite_add_tcase(s, tc_##NAME);
91
92#define DEFTESTCASE_SLOW(NAME, TIMEOUT) \
93 DEFTESTCASE(NAME) \
94 tcase_set_timeout(tc_##NAME, TIMEOUT);
95Suite *TCP_suite(void)
96{
97 Suite *s = suite_create("TCP");
98
99 DEFTESTCASE_SLOW(basic, 5);
100 return s;
101}
102
103int main(int argc, char *argv[])
104{
105 srand((unsigned int) time(NULL));
106
107 Suite *TCP = TCP_suite();
108 SRunner *test_runner = srunner_create(TCP);
109
110 int number_failed = 0;
111 srunner_run_all(test_runner, CK_NORMAL);
112 number_failed = srunner_ntests_failed(test_runner);
113
114 srunner_free(test_runner);
115
116 return number_failed;
117}