1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
|
/* Try to overflow the net_crypto packet buffer.
*/
#ifdef HAVE_CONFIG_H
#include "config.h"
#endif
#include <stdint.h>
typedef struct State {
uint32_t index;
uint64_t clock;
uint32_t recv_count;
} State;
#include "run_auto_test.h"
#define NUM_MSGS 40000
static void handle_friend_message(Tox *tox, uint32_t friend_number, TOX_MESSAGE_TYPE type,
const uint8_t *message, size_t length, void *user_data)
{
State *state = (State *)user_data;
state->recv_count++;
}
static void net_crypto_overflow_test(Tox **toxes, State *state)
{
tox_callback_friend_message(toxes[0], handle_friend_message);
printf("sending many messages to tox0\n");
for (uint32_t tox_index = 1; tox_index < 3; tox_index++) {
for (uint32_t i = 0; i < NUM_MSGS; i++) {
uint8_t message[128] = {0};
snprintf((char *)message, sizeof(message), "%u-%u", tox_index, i);
TOX_ERR_FRIEND_SEND_MESSAGE err;
tox_friend_send_message(toxes[tox_index], 0, TOX_MESSAGE_TYPE_NORMAL, message, sizeof message, &err);
if (err == TOX_ERR_FRIEND_SEND_MESSAGE_SENDQ) {
printf("tox%u sent %u messages to friend 0\n", tox_index, i);
break;
}
ck_assert_msg(err == TOX_ERR_FRIEND_SEND_MESSAGE_OK,
"tox%u failed to send message number %u: %d", tox_index, i, err);
}
}
// TODO(iphydf): Wait until all messages have arrived. Currently, not all
// messages arrive, so this test would always fail.
for (uint32_t i = 0; i < 200; i++) {
iterate_all_wait(3, toxes, state, ITERATION_INTERVAL);
}
printf("tox%u received %u messages\n", state[0].index, state[0].recv_count);
}
int main(void)
{
setvbuf(stdout, nullptr, _IONBF, 0);
run_auto_test(3, net_crypto_overflow_test);
return 0;
}
|