diff options
Diffstat (limited to 'auto_tests/TCP_test.c')
-rw-r--r-- | auto_tests/TCP_test.c | 117 |
1 files changed, 117 insertions, 0 deletions
diff --git a/auto_tests/TCP_test.c b/auto_tests/TCP_test.c new file mode 100644 index 00000000..983b07d2 --- /dev/null +++ b/auto_tests/TCP_test.c | |||
@@ -0,0 +1,117 @@ | |||
1 | #ifdef HAVE_CONFIG_H | ||
2 | #include "config.h" | ||
3 | #endif | ||
4 | |||
5 | #include <sys/types.h> | ||
6 | #include <stdint.h> | ||
7 | #include <string.h> | ||
8 | #include <check.h> | ||
9 | #include <stdlib.h> | ||
10 | #include <time.h> | ||
11 | |||
12 | #include "../toxcore/TCP_server.h" | ||
13 | #include "../toxcore/util.h" | ||
14 | |||
15 | #if defined(_WIN32) || defined(__WIN32__) || defined (WIN32) | ||
16 | #define c_sleep(x) Sleep(1*x) | ||
17 | #else | ||
18 | #include <unistd.h> | ||
19 | #define c_sleep(x) usleep(1000*x) | ||
20 | #endif | ||
21 | |||
22 | #define NUM_PORTS 3 | ||
23 | |||
24 | START_TEST(test_basic) | ||
25 | { | ||
26 | uint16_t ports[NUM_PORTS] = {12345, 33445, 25643}; | ||
27 | uint8_t self_public_key[crypto_box_PUBLICKEYBYTES]; | ||
28 | uint8_t self_secret_key[crypto_box_SECRETKEYBYTES]; | ||
29 | crypto_box_keypair(self_public_key, self_secret_key); | ||
30 | TCP_Server *tcp_s = new_TCP_server(1, NUM_PORTS, ports, self_public_key, self_secret_key); | ||
31 | ck_assert_msg(tcp_s != NULL, "Failed to create TCP relay server"); | ||
32 | |||
33 | sock_t sock = socket(AF_INET6, SOCK_STREAM, IPPROTO_TCP); | ||
34 | struct sockaddr_in6 addr6_loopback = {0}; | ||
35 | addr6_loopback.sin6_family = AF_INET6; | ||
36 | addr6_loopback.sin6_port = htons(ports[rand() % NUM_PORTS]); | ||
37 | addr6_loopback.sin6_addr = in6addr_loopback; | ||
38 | |||
39 | int ret = connect(sock, (struct sockaddr *)&addr6_loopback, sizeof(addr6_loopback)); | ||
40 | ck_assert_msg(ret == 0, "Failed to connect to TCP relay server"); | ||
41 | |||
42 | uint8_t f_public_key[crypto_box_PUBLICKEYBYTES]; | ||
43 | uint8_t f_secret_key[crypto_box_SECRETKEYBYTES]; | ||
44 | uint8_t f_nonce[crypto_box_NONCEBYTES]; | ||
45 | crypto_box_keypair(f_public_key, f_secret_key); | ||
46 | random_nonce(f_nonce); | ||
47 | |||
48 | uint8_t t_secret_key[crypto_box_SECRETKEYBYTES]; | ||
49 | uint8_t handshake_plain[TCP_HANDSHAKE_PLAIN_SIZE]; | ||
50 | crypto_box_keypair(handshake_plain, t_secret_key); | ||
51 | memcpy(handshake_plain + crypto_box_PUBLICKEYBYTES, f_nonce, crypto_box_NONCEBYTES); | ||
52 | uint8_t handshake[TCP_CLIENT_HANDSHAKE_SIZE]; | ||
53 | memcpy(handshake, f_public_key, crypto_box_PUBLICKEYBYTES); | ||
54 | new_nonce(handshake + crypto_box_PUBLICKEYBYTES); | ||
55 | |||
56 | ret = encrypt_data(self_public_key, f_secret_key, handshake + crypto_box_PUBLICKEYBYTES, handshake_plain, | ||
57 | TCP_HANDSHAKE_PLAIN_SIZE, handshake + crypto_box_PUBLICKEYBYTES + crypto_box_NONCEBYTES); | ||
58 | ck_assert_msg(ret == TCP_CLIENT_HANDSHAKE_SIZE - (crypto_box_PUBLICKEYBYTES + crypto_box_NONCEBYTES), | ||
59 | "Encrypt failed."); | ||
60 | ck_assert_msg(send(sock, handshake, TCP_CLIENT_HANDSHAKE_SIZE - 1, 0) == TCP_CLIENT_HANDSHAKE_SIZE - 1, "send Failed."); | ||
61 | c_sleep(50); | ||
62 | do_TCP_server(tcp_s); | ||
63 | c_sleep(50); | ||
64 | do_TCP_server(tcp_s); | ||
65 | c_sleep(50); | ||
66 | ck_assert_msg(send(sock, handshake + (TCP_CLIENT_HANDSHAKE_SIZE - 1), 1, 0) == 1, "send Failed."); | ||
67 | c_sleep(50); | ||
68 | do_TCP_server(tcp_s); | ||
69 | c_sleep(50); | ||
70 | do_TCP_server(tcp_s); | ||
71 | c_sleep(50); | ||
72 | uint8_t response[TCP_SERVER_HANDSHAKE_SIZE]; | ||
73 | uint8_t response_plain[TCP_HANDSHAKE_PLAIN_SIZE]; | ||
74 | ck_assert_msg(recv(sock, response, TCP_SERVER_HANDSHAKE_SIZE, 0) == TCP_SERVER_HANDSHAKE_SIZE, "recv Failed."); | ||
75 | ret = decrypt_data(self_public_key, f_secret_key, response, response + crypto_box_NONCEBYTES, | ||
76 | TCP_SERVER_HANDSHAKE_SIZE - crypto_box_NONCEBYTES, response_plain); | ||
77 | ck_assert_msg(ret == TCP_HANDSHAKE_PLAIN_SIZE, "Decrypt Failed."); | ||
78 | uint8_t f_nonce_r[crypto_box_NONCEBYTES]; | ||
79 | uint8_t f_shared_key[crypto_box_BEFORENMBYTES]; | ||
80 | encrypt_precompute(response_plain, t_secret_key, f_shared_key); | ||
81 | memcpy(f_nonce_r, response_plain + crypto_box_BEFORENMBYTES, crypto_box_NONCEBYTES); | ||
82 | |||
83 | |||
84 | } | ||
85 | END_TEST | ||
86 | |||
87 | #define DEFTESTCASE(NAME) \ | ||
88 | TCase *tc_##NAME = tcase_create(#NAME); \ | ||
89 | tcase_add_test(tc_##NAME, test_##NAME); \ | ||
90 | suite_add_tcase(s, tc_##NAME); | ||
91 | |||
92 | #define DEFTESTCASE_SLOW(NAME, TIMEOUT) \ | ||
93 | DEFTESTCASE(NAME) \ | ||
94 | tcase_set_timeout(tc_##NAME, TIMEOUT); | ||
95 | Suite *TCP_suite(void) | ||
96 | { | ||
97 | Suite *s = suite_create("TCP"); | ||
98 | |||
99 | DEFTESTCASE_SLOW(basic, 5); | ||
100 | return s; | ||
101 | } | ||
102 | |||
103 | int main(int argc, char *argv[]) | ||
104 | { | ||
105 | srand((unsigned int) time(NULL)); | ||
106 | |||
107 | Suite *TCP = TCP_suite(); | ||
108 | SRunner *test_runner = srunner_create(TCP); | ||
109 | |||
110 | int number_failed = 0; | ||
111 | srunner_run_all(test_runner, CK_NORMAL); | ||
112 | number_failed = srunner_ntests_failed(test_runner); | ||
113 | |||
114 | srunner_free(test_runner); | ||
115 | |||
116 | return number_failed; | ||
117 | } | ||