diff options
Diffstat (limited to 'auto_tests/TCP_test.c')
-rw-r--r-- | auto_tests/TCP_test.c | 40 |
1 files changed, 37 insertions, 3 deletions
diff --git a/auto_tests/TCP_test.c b/auto_tests/TCP_test.c index 989867b4..6e46492c 100644 --- a/auto_tests/TCP_test.c +++ b/auto_tests/TCP_test.c | |||
@@ -229,17 +229,51 @@ START_TEST(test_some) | |||
229 | ck_assert_msg(data[1] == 16, "connection not refused %u", data[1]); | 229 | ck_assert_msg(data[1] == 16, "connection not refused %u", data[1]); |
230 | ck_assert_msg(memcmp(data + 2, con1->public_key, crypto_box_PUBLICKEYBYTES) == 0, "key in packet wrong"); | 230 | ck_assert_msg(memcmp(data + 2, con1->public_key, crypto_box_PUBLICKEYBYTES) == 0, "key in packet wrong"); |
231 | 231 | ||
232 | uint8_t test_packet[1024] = {16}; | 232 | uint8_t test_packet[512] = {16, 17, 16, 86, 99, 127, 255, 189, 78}; |
233 | write_packet_TCP_secure_connection(con3, test_packet, sizeof(test_packet)); | 233 | write_packet_TCP_secure_connection(con3, test_packet, sizeof(test_packet)); |
234 | write_packet_TCP_secure_connection(con3, test_packet, sizeof(test_packet)); | ||
235 | write_packet_TCP_secure_connection(con3, test_packet, sizeof(test_packet)); | ||
236 | c_sleep(50); | ||
234 | do_TCP_server(tcp_s); | 237 | do_TCP_server(tcp_s); |
235 | c_sleep(50); | 238 | c_sleep(50); |
236 | len = read_packet_sec_TCP(con1, data, 2 + 2 + crypto_box_MACBYTES); | 239 | len = read_packet_sec_TCP(con1, data, 2 + 2 + crypto_box_MACBYTES); |
237 | ck_assert_msg(len == 2, "wrong len %u", len); | 240 | ck_assert_msg(len == 2, "wrong len %u", len); |
238 | ck_assert_msg(data[0] == 2, "wrong packet id %u", data[0]); | 241 | ck_assert_msg(data[0] == 2, "wrong packet id %u", data[0]); |
239 | ck_assert_msg(data[1] == 16, "wrong peer id %u", data[1]); | 242 | ck_assert_msg(data[1] == 16, "wrong peer id %u", data[1]); |
243 | len = read_packet_sec_TCP(con3, data, 2 + 2 + crypto_box_MACBYTES); | ||
244 | ck_assert_msg(len == 2, "wrong len %u", len); | ||
245 | ck_assert_msg(data[0] == 2, "wrong packet id %u", data[0]); | ||
246 | ck_assert_msg(data[1] == 16, "wrong peer id %u", data[1]); | ||
240 | len = read_packet_sec_TCP(con1, data, 2 + sizeof(test_packet) + crypto_box_MACBYTES); | 247 | len = read_packet_sec_TCP(con1, data, 2 + sizeof(test_packet) + crypto_box_MACBYTES); |
241 | ck_assert_msg(len == 1024, "wrong len %u", len); | 248 | ck_assert_msg(len == sizeof(test_packet), "wrong len %u", len); |
242 | ck_assert_msg(memcmp(data, test_packet, sizeof(test_packet)) == 0, "packet is wrong"); | 249 | ck_assert_msg(memcmp(data, test_packet, sizeof(test_packet)) == 0, "packet is wrong %u %u %u %u", data[0], data[1], |
250 | data[sizeof(test_packet) - 2], data[sizeof(test_packet) - 1]); | ||
251 | len = read_packet_sec_TCP(con1, data, 2 + sizeof(test_packet) + crypto_box_MACBYTES); | ||
252 | ck_assert_msg(len == sizeof(test_packet), "wrong len %u", len); | ||
253 | ck_assert_msg(memcmp(data, test_packet, sizeof(test_packet)) == 0, "packet is wrong %u %u %u %u", data[0], data[1], | ||
254 | data[sizeof(test_packet) - 2], data[sizeof(test_packet) - 1]); | ||
255 | len = read_packet_sec_TCP(con1, data, 2 + sizeof(test_packet) + crypto_box_MACBYTES); | ||
256 | ck_assert_msg(len == sizeof(test_packet), "wrong len %u", len); | ||
257 | ck_assert_msg(memcmp(data, test_packet, sizeof(test_packet)) == 0, "packet is wrong %u %u %u %u", data[0], data[1], | ||
258 | data[sizeof(test_packet) - 2], data[sizeof(test_packet) - 1]); | ||
259 | write_packet_TCP_secure_connection(con1, test_packet, sizeof(test_packet)); | ||
260 | write_packet_TCP_secure_connection(con1, test_packet, sizeof(test_packet)); | ||
261 | write_packet_TCP_secure_connection(con1, test_packet, sizeof(test_packet)); | ||
262 | c_sleep(50); | ||
263 | do_TCP_server(tcp_s); | ||
264 | c_sleep(50); | ||
265 | len = read_packet_sec_TCP(con3, data, 2 + sizeof(test_packet) + crypto_box_MACBYTES); | ||
266 | ck_assert_msg(len == sizeof(test_packet), "wrong len %u", len); | ||
267 | ck_assert_msg(memcmp(data, test_packet, sizeof(test_packet)) == 0, "packet is wrong %u %u %u %u", data[0], data[1], | ||
268 | data[sizeof(test_packet) - 2], data[sizeof(test_packet) - 1]); | ||
269 | len = read_packet_sec_TCP(con3, data, 2 + sizeof(test_packet) + crypto_box_MACBYTES); | ||
270 | ck_assert_msg(len == sizeof(test_packet), "wrong len %u", len); | ||
271 | ck_assert_msg(memcmp(data, test_packet, sizeof(test_packet)) == 0, "packet is wrong %u %u %u %u", data[0], data[1], | ||
272 | data[sizeof(test_packet) - 2], data[sizeof(test_packet) - 1]); | ||
273 | len = read_packet_sec_TCP(con3, data, 2 + sizeof(test_packet) + crypto_box_MACBYTES); | ||
274 | ck_assert_msg(len == sizeof(test_packet), "wrong len %u", len); | ||
275 | ck_assert_msg(memcmp(data, test_packet, sizeof(test_packet)) == 0, "packet is wrong %u %u %u %u", data[0], data[1], | ||
276 | data[sizeof(test_packet) - 2], data[sizeof(test_packet) - 1]); | ||
243 | } | 277 | } |
244 | END_TEST | 278 | END_TEST |
245 | 279 | ||