summaryrefslogtreecommitdiff
path: root/auto_tests/TCP_test.c
diff options
context:
space:
mode:
Diffstat (limited to 'auto_tests/TCP_test.c')
-rw-r--r--auto_tests/TCP_test.c40
1 files changed, 37 insertions, 3 deletions
diff --git a/auto_tests/TCP_test.c b/auto_tests/TCP_test.c
index 989867b4..6e46492c 100644
--- a/auto_tests/TCP_test.c
+++ b/auto_tests/TCP_test.c
@@ -229,17 +229,51 @@ START_TEST(test_some)
229 ck_assert_msg(data[1] == 16, "connection not refused %u", data[1]); 229 ck_assert_msg(data[1] == 16, "connection not refused %u", data[1]);
230 ck_assert_msg(memcmp(data + 2, con1->public_key, crypto_box_PUBLICKEYBYTES) == 0, "key in packet wrong"); 230 ck_assert_msg(memcmp(data + 2, con1->public_key, crypto_box_PUBLICKEYBYTES) == 0, "key in packet wrong");
231 231
232 uint8_t test_packet[1024] = {16}; 232 uint8_t test_packet[512] = {16, 17, 16, 86, 99, 127, 255, 189, 78};
233 write_packet_TCP_secure_connection(con3, test_packet, sizeof(test_packet)); 233 write_packet_TCP_secure_connection(con3, test_packet, sizeof(test_packet));
234 write_packet_TCP_secure_connection(con3, test_packet, sizeof(test_packet));
235 write_packet_TCP_secure_connection(con3, test_packet, sizeof(test_packet));
236 c_sleep(50);
234 do_TCP_server(tcp_s); 237 do_TCP_server(tcp_s);
235 c_sleep(50); 238 c_sleep(50);
236 len = read_packet_sec_TCP(con1, data, 2 + 2 + crypto_box_MACBYTES); 239 len = read_packet_sec_TCP(con1, data, 2 + 2 + crypto_box_MACBYTES);
237 ck_assert_msg(len == 2, "wrong len %u", len); 240 ck_assert_msg(len == 2, "wrong len %u", len);
238 ck_assert_msg(data[0] == 2, "wrong packet id %u", data[0]); 241 ck_assert_msg(data[0] == 2, "wrong packet id %u", data[0]);
239 ck_assert_msg(data[1] == 16, "wrong peer id %u", data[1]); 242 ck_assert_msg(data[1] == 16, "wrong peer id %u", data[1]);
243 len = read_packet_sec_TCP(con3, data, 2 + 2 + crypto_box_MACBYTES);
244 ck_assert_msg(len == 2, "wrong len %u", len);
245 ck_assert_msg(data[0] == 2, "wrong packet id %u", data[0]);
246 ck_assert_msg(data[1] == 16, "wrong peer id %u", data[1]);
240 len = read_packet_sec_TCP(con1, data, 2 + sizeof(test_packet) + crypto_box_MACBYTES); 247 len = read_packet_sec_TCP(con1, data, 2 + sizeof(test_packet) + crypto_box_MACBYTES);
241 ck_assert_msg(len == 1024, "wrong len %u", len); 248 ck_assert_msg(len == sizeof(test_packet), "wrong len %u", len);
242 ck_assert_msg(memcmp(data, test_packet, sizeof(test_packet)) == 0, "packet is wrong"); 249 ck_assert_msg(memcmp(data, test_packet, sizeof(test_packet)) == 0, "packet is wrong %u %u %u %u", data[0], data[1],
250 data[sizeof(test_packet) - 2], data[sizeof(test_packet) - 1]);
251 len = read_packet_sec_TCP(con1, data, 2 + sizeof(test_packet) + crypto_box_MACBYTES);
252 ck_assert_msg(len == sizeof(test_packet), "wrong len %u", len);
253 ck_assert_msg(memcmp(data, test_packet, sizeof(test_packet)) == 0, "packet is wrong %u %u %u %u", data[0], data[1],
254 data[sizeof(test_packet) - 2], data[sizeof(test_packet) - 1]);
255 len = read_packet_sec_TCP(con1, data, 2 + sizeof(test_packet) + crypto_box_MACBYTES);
256 ck_assert_msg(len == sizeof(test_packet), "wrong len %u", len);
257 ck_assert_msg(memcmp(data, test_packet, sizeof(test_packet)) == 0, "packet is wrong %u %u %u %u", data[0], data[1],
258 data[sizeof(test_packet) - 2], data[sizeof(test_packet) - 1]);
259 write_packet_TCP_secure_connection(con1, test_packet, sizeof(test_packet));
260 write_packet_TCP_secure_connection(con1, test_packet, sizeof(test_packet));
261 write_packet_TCP_secure_connection(con1, test_packet, sizeof(test_packet));
262 c_sleep(50);
263 do_TCP_server(tcp_s);
264 c_sleep(50);
265 len = read_packet_sec_TCP(con3, data, 2 + sizeof(test_packet) + crypto_box_MACBYTES);
266 ck_assert_msg(len == sizeof(test_packet), "wrong len %u", len);
267 ck_assert_msg(memcmp(data, test_packet, sizeof(test_packet)) == 0, "packet is wrong %u %u %u %u", data[0], data[1],
268 data[sizeof(test_packet) - 2], data[sizeof(test_packet) - 1]);
269 len = read_packet_sec_TCP(con3, data, 2 + sizeof(test_packet) + crypto_box_MACBYTES);
270 ck_assert_msg(len == sizeof(test_packet), "wrong len %u", len);
271 ck_assert_msg(memcmp(data, test_packet, sizeof(test_packet)) == 0, "packet is wrong %u %u %u %u", data[0], data[1],
272 data[sizeof(test_packet) - 2], data[sizeof(test_packet) - 1]);
273 len = read_packet_sec_TCP(con3, data, 2 + sizeof(test_packet) + crypto_box_MACBYTES);
274 ck_assert_msg(len == sizeof(test_packet), "wrong len %u", len);
275 ck_assert_msg(memcmp(data, test_packet, sizeof(test_packet)) == 0, "packet is wrong %u %u %u %u", data[0], data[1],
276 data[sizeof(test_packet) - 2], data[sizeof(test_packet) - 1]);
243} 277}
244END_TEST 278END_TEST
245 279