Merge commit '4f02c2b55b1eb57f39d69fe7f4319b4cbb50240e'
This commit is contained in:
commit
05d1648209
1
external/toxcore/c-toxcore/other/BUILD.bazel
vendored
1
external/toxcore/c-toxcore/other/BUILD.bazel
vendored
@ -16,6 +16,7 @@ cc_binary(
|
|||||||
testonly = 1,
|
testonly = 1,
|
||||||
srcs = ["DHT_bootstrap.c"],
|
srcs = ["DHT_bootstrap.c"],
|
||||||
deps = [
|
deps = [
|
||||||
|
":bootstrap_node_packets",
|
||||||
"//c-toxcore/testing:misc_tools",
|
"//c-toxcore/testing:misc_tools",
|
||||||
"//c-toxcore/toxcore:DHT",
|
"//c-toxcore/toxcore:DHT",
|
||||||
"//c-toxcore/toxcore:LAN_discovery",
|
"//c-toxcore/toxcore:LAN_discovery",
|
||||||
|
11
external/toxcore/c-toxcore/other/DHT_bootstrap.c
vendored
11
external/toxcore/c-toxcore/other/DHT_bootstrap.c
vendored
@ -31,11 +31,16 @@
|
|||||||
|
|
||||||
#include "../testing/misc_tools.h"
|
#include "../testing/misc_tools.h"
|
||||||
|
|
||||||
|
#define DHT_NODE_EXTRA_PACKETS
|
||||||
|
|
||||||
#ifdef DHT_NODE_EXTRA_PACKETS
|
#ifdef DHT_NODE_EXTRA_PACKETS
|
||||||
#include "./bootstrap_node_packets.h"
|
#include "./bootstrap_node_packets.h"
|
||||||
|
|
||||||
#define DHT_VERSION_NUMBER 1
|
#ifndef DAEMON_VERSION_NUMBER
|
||||||
#define DHT_MOTD "This is a test motd"
|
#define DAEMON_VERSION_NUMBER (1000000000UL + TOX_VERSION_MAJOR*1000000UL + TOX_VERSION_MINOR*1000UL + TOX_VERSION_PATCH*1UL)
|
||||||
|
#endif
|
||||||
|
|
||||||
|
static const char *motd_str = ""; //Change this to anything within 256 bytes(but 96 bytes maximum prefered)
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#define PORT 33445
|
#define PORT 33445
|
||||||
@ -152,7 +157,7 @@ int main(int argc, char *argv[])
|
|||||||
Onion_Announce *onion_a = new_onion_announce(logger, mem, rng, mono_time, dht);
|
Onion_Announce *onion_a = new_onion_announce(logger, mem, rng, mono_time, dht);
|
||||||
|
|
||||||
#ifdef DHT_NODE_EXTRA_PACKETS
|
#ifdef DHT_NODE_EXTRA_PACKETS
|
||||||
bootstrap_set_callbacks(dht_get_net(dht), DHT_VERSION_NUMBER, DHT_MOTD, sizeof(DHT_MOTD));
|
bootstrap_set_callbacks(dht_get_net(dht), (uint32_t)DAEMON_VERSION_NUMBER, (const uint8_t *) motd_str, strlen(motd_str)+1);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
if (!(onion && forwarding && onion_a)) {
|
if (!(onion && forwarding && onion_a)) {
|
||||||
|
@ -1 +1 @@
|
|||||||
9bec65f2a3093ebb49c3751dfad267482bc80d4b29ef9171f11d5ba53058d713 /usr/local/bin/tox-bootstrapd
|
b2996d73cab7c7453dc10ccf7ad733622558de3b1ad0db824a379cf96f500379 /usr/local/bin/tox-bootstrapd
|
||||||
|
30
external/toxcore/c-toxcore/toxcore/group_chats.c
vendored
30
external/toxcore/c-toxcore/toxcore/group_chats.c
vendored
@ -108,10 +108,19 @@ static_assert(GCC_BUFFER_SIZE <= UINT16_MAX,
|
|||||||
static_assert(MAX_GC_PACKET_CHUNK_SIZE < MAX_GC_PACKET_SIZE,
|
static_assert(MAX_GC_PACKET_CHUNK_SIZE < MAX_GC_PACKET_SIZE,
|
||||||
"MAX_GC_PACKET_CHUNK_SIZE must be < MAX_GC_PACKET_SIZE");
|
"MAX_GC_PACKET_CHUNK_SIZE must be < MAX_GC_PACKET_SIZE");
|
||||||
|
|
||||||
|
static_assert(MAX_GC_PACKET_INCOMING_CHUNK_SIZE < MAX_GC_PACKET_SIZE,
|
||||||
|
"MAX_GC_PACKET_INCOMING_CHUNK_SIZE must be < MAX_GC_PACKET_SIZE");
|
||||||
|
|
||||||
|
static_assert(MAX_GC_PACKET_INCOMING_CHUNK_SIZE >= MAX_GC_PACKET_CHUNK_SIZE,
|
||||||
|
"MAX_GC_PACKET_INCOMING_CHUNK_SIZE must be >= MAX_GC_PACKET_CHUNK_SIZE");
|
||||||
|
|
||||||
// size of a lossless handshake packet - lossless packets can't/shouldn't be split up
|
// size of a lossless handshake packet - lossless packets can't/shouldn't be split up
|
||||||
static_assert(MAX_GC_PACKET_CHUNK_SIZE >= 171,
|
static_assert(MAX_GC_PACKET_CHUNK_SIZE >= 171,
|
||||||
"MAX_GC_PACKET_CHUNK_SIZE must be >= 171");
|
"MAX_GC_PACKET_CHUNK_SIZE must be >= 171");
|
||||||
|
|
||||||
|
static_assert(MAX_GC_PACKET_INCOMING_CHUNK_SIZE >= 171,
|
||||||
|
"MAX_GC_PACKET_INCOMING_CHUNK_SIZE must be >= 171");
|
||||||
|
|
||||||
// group_moderation constants assume this is the max packet size.
|
// group_moderation constants assume this is the max packet size.
|
||||||
static_assert(MAX_GC_PACKET_SIZE >= 50000,
|
static_assert(MAX_GC_PACKET_SIZE >= 50000,
|
||||||
"MAX_GC_PACKET_SIZE doesn't match constants in group_moderation.h");
|
"MAX_GC_PACKET_SIZE doesn't match constants in group_moderation.h");
|
||||||
@ -119,6 +128,9 @@ static_assert(MAX_GC_PACKET_SIZE >= 50000,
|
|||||||
static_assert(MAX_GC_PACKET_SIZE <= UINT16_MAX - MAX_GC_PACKET_CHUNK_SIZE,
|
static_assert(MAX_GC_PACKET_SIZE <= UINT16_MAX - MAX_GC_PACKET_CHUNK_SIZE,
|
||||||
"MAX_GC_PACKET_SIZE must be <= UINT16_MAX - MAX_GC_PACKET_CHUNK_SIZE");
|
"MAX_GC_PACKET_SIZE must be <= UINT16_MAX - MAX_GC_PACKET_CHUNK_SIZE");
|
||||||
|
|
||||||
|
static_assert(MAX_GC_PACKET_SIZE <= UINT16_MAX - MAX_GC_PACKET_INCOMING_CHUNK_SIZE,
|
||||||
|
"MAX_GC_PACKET_SIZE must be <= UINT16_MAX - MAX_GC_PACKET_INCOMING_CHUNK_SIZE");
|
||||||
|
|
||||||
/** Types of broadcast messages. */
|
/** Types of broadcast messages. */
|
||||||
typedef enum Group_Message_Type {
|
typedef enum Group_Message_Type {
|
||||||
GC_MESSAGE_TYPE_NORMAL = 0x00,
|
GC_MESSAGE_TYPE_NORMAL = 0x00,
|
||||||
@ -6255,13 +6267,13 @@ static int handle_gc_tcp_packet(void *object, int id, const uint8_t *packet, uin
|
|||||||
|
|
||||||
if (length <= MIN_TCP_PACKET_SIZE) {
|
if (length <= MIN_TCP_PACKET_SIZE) {
|
||||||
LOGGER_WARNING(m->log, "Got tcp packet with invalid length: %u (expected %u to %u)", length,
|
LOGGER_WARNING(m->log, "Got tcp packet with invalid length: %u (expected %u to %u)", length,
|
||||||
MIN_TCP_PACKET_SIZE, MAX_GC_PACKET_CHUNK_SIZE + MIN_TCP_PACKET_SIZE + ENC_PUBLIC_KEY_SIZE);
|
MIN_TCP_PACKET_SIZE, MAX_GC_PACKET_INCOMING_CHUNK_SIZE + MIN_TCP_PACKET_SIZE + ENC_PUBLIC_KEY_SIZE);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (length > MAX_GC_PACKET_CHUNK_SIZE + MIN_TCP_PACKET_SIZE + ENC_PUBLIC_KEY_SIZE) {
|
if (length > MAX_GC_PACKET_INCOMING_CHUNK_SIZE + MIN_TCP_PACKET_SIZE + ENC_PUBLIC_KEY_SIZE) {
|
||||||
LOGGER_WARNING(m->log, "Got tcp packet with invalid length: %u (expected %u to %u)", length,
|
LOGGER_WARNING(m->log, "Got tcp packet with invalid length: %u (expected %u to %u)", length,
|
||||||
MIN_TCP_PACKET_SIZE, MAX_GC_PACKET_CHUNK_SIZE + MIN_TCP_PACKET_SIZE + ENC_PUBLIC_KEY_SIZE);
|
MIN_TCP_PACKET_SIZE, MAX_GC_PACKET_INCOMING_CHUNK_SIZE + MIN_TCP_PACKET_SIZE + ENC_PUBLIC_KEY_SIZE);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -6336,13 +6348,13 @@ static int handle_gc_tcp_oob_packet(void *object, const uint8_t *public_key, uns
|
|||||||
|
|
||||||
if (length <= GC_MIN_HS_PACKET_PAYLOAD_SIZE) {
|
if (length <= GC_MIN_HS_PACKET_PAYLOAD_SIZE) {
|
||||||
LOGGER_WARNING(m->log, "Got tcp oob packet with invalid length: %u (expected %u to %u)", length,
|
LOGGER_WARNING(m->log, "Got tcp oob packet with invalid length: %u (expected %u to %u)", length,
|
||||||
GC_MIN_HS_PACKET_PAYLOAD_SIZE, MAX_GC_PACKET_CHUNK_SIZE + CRYPTO_MAC_SIZE + CRYPTO_NONCE_SIZE);
|
GC_MIN_HS_PACKET_PAYLOAD_SIZE, MAX_GC_PACKET_INCOMING_CHUNK_SIZE + CRYPTO_MAC_SIZE + CRYPTO_NONCE_SIZE);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (length > MAX_GC_PACKET_CHUNK_SIZE + CRYPTO_MAC_SIZE + CRYPTO_NONCE_SIZE) {
|
if (length > MAX_GC_PACKET_INCOMING_CHUNK_SIZE + CRYPTO_MAC_SIZE + CRYPTO_NONCE_SIZE) {
|
||||||
LOGGER_WARNING(m->log, "Got tcp oob packet with invalid length: %u (expected %u to %u)", length,
|
LOGGER_WARNING(m->log, "Got tcp oob packet with invalid length: %u (expected %u to %u)", length,
|
||||||
GC_MIN_HS_PACKET_PAYLOAD_SIZE, MAX_GC_PACKET_CHUNK_SIZE + CRYPTO_MAC_SIZE + CRYPTO_NONCE_SIZE);
|
GC_MIN_HS_PACKET_PAYLOAD_SIZE, MAX_GC_PACKET_INCOMING_CHUNK_SIZE + CRYPTO_MAC_SIZE + CRYPTO_NONCE_SIZE);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -6392,13 +6404,13 @@ static int handle_gc_udp_packet(void *object, const IP_Port *ipp, const uint8_t
|
|||||||
|
|
||||||
if (length <= MIN_UDP_PACKET_SIZE) {
|
if (length <= MIN_UDP_PACKET_SIZE) {
|
||||||
LOGGER_WARNING(m->log, "Got UDP packet with invalid length: %u (expected %u to %u)", length,
|
LOGGER_WARNING(m->log, "Got UDP packet with invalid length: %u (expected %u to %u)", length,
|
||||||
MIN_UDP_PACKET_SIZE, MAX_GC_PACKET_CHUNK_SIZE + MIN_UDP_PACKET_SIZE + ENC_PUBLIC_KEY_SIZE);
|
MIN_UDP_PACKET_SIZE, MAX_GC_PACKET_INCOMING_CHUNK_SIZE + MIN_UDP_PACKET_SIZE + ENC_PUBLIC_KEY_SIZE);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (length > MAX_GC_PACKET_CHUNK_SIZE + MIN_UDP_PACKET_SIZE + ENC_PUBLIC_KEY_SIZE) {
|
if (length > MAX_GC_PACKET_INCOMING_CHUNK_SIZE + MIN_UDP_PACKET_SIZE + ENC_PUBLIC_KEY_SIZE) {
|
||||||
LOGGER_WARNING(m->log, "Got UDP packet with invalid length: %u (expected %u to %u)", length,
|
LOGGER_WARNING(m->log, "Got UDP packet with invalid length: %u (expected %u to %u)", length,
|
||||||
MIN_UDP_PACKET_SIZE, MAX_GC_PACKET_CHUNK_SIZE + MIN_UDP_PACKET_SIZE + ENC_PUBLIC_KEY_SIZE);
|
MIN_UDP_PACKET_SIZE, MAX_GC_PACKET_INCOMING_CHUNK_SIZE + MIN_UDP_PACKET_SIZE + ENC_PUBLIC_KEY_SIZE);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -28,6 +28,8 @@
|
|||||||
* For an explanation on why this value was chosen, see the following link: https://archive.ph/vsCOG
|
* For an explanation on why this value was chosen, see the following link: https://archive.ph/vsCOG
|
||||||
*/
|
*/
|
||||||
#define MAX_GC_PACKET_CHUNK_SIZE 500
|
#define MAX_GC_PACKET_CHUNK_SIZE 500
|
||||||
|
/* Max size of an incoming packet chunk that is allowed */
|
||||||
|
#define MAX_GC_PACKET_INCOMING_CHUNK_SIZE 1372
|
||||||
|
|
||||||
#define MAX_GC_MESSAGE_SIZE GROUP_MAX_MESSAGE_LENGTH
|
#define MAX_GC_MESSAGE_SIZE GROUP_MAX_MESSAGE_LENGTH
|
||||||
#define MAX_GC_MESSAGE_RAW_SIZE (MAX_GC_MESSAGE_SIZE + GC_MESSAGE_PSEUDO_ID_SIZE)
|
#define MAX_GC_MESSAGE_RAW_SIZE (MAX_GC_MESSAGE_SIZE + GC_MESSAGE_PSEUDO_ID_SIZE)
|
||||||
|
@ -366,7 +366,7 @@ static uint16_t reassemble_packet(const Logger *log, GC_Connection *gconn, uint8
|
|||||||
// search backwards in recv array until we find an empty slot or a non-fragment packet type
|
// search backwards in recv array until we find an empty slot or a non-fragment packet type
|
||||||
while (!array_entry_is_empty(entry) && entry->packet_type == GP_FRAGMENT) {
|
while (!array_entry_is_empty(entry) && entry->packet_type == GP_FRAGMENT) {
|
||||||
assert(entry->data != nullptr);
|
assert(entry->data != nullptr);
|
||||||
assert(entry->data_length <= MAX_GC_PACKET_CHUNK_SIZE);
|
assert(entry->data_length <= MAX_GC_PACKET_INCOMING_CHUNK_SIZE);
|
||||||
|
|
||||||
const uint16_t diff = packet_length + entry->data_length;
|
const uint16_t diff = packet_length + entry->data_length;
|
||||||
|
|
||||||
|
25
external/toxcore/c-toxcore/toxcore/tox.c
vendored
25
external/toxcore/c-toxcore/toxcore/tox.c
vendored
@ -858,12 +858,26 @@ Tox *tox_new(const struct Tox_Options *options, Tox_Err_New *error)
|
|||||||
|
|
||||||
if (load_savedata_tox
|
if (load_savedata_tox
|
||||||
&& tox_load(tox, tox_options_get_savedata_data(opts), tox_options_get_savedata_length(opts)) == -1) {
|
&& tox_load(tox, tox_options_get_savedata_data(opts), tox_options_get_savedata_length(opts)) == -1) {
|
||||||
|
kill_groupchats(tox->m->conferences_object);
|
||||||
|
kill_messenger(tox->m);
|
||||||
|
|
||||||
|
mono_time_free(tox->sys.mem, tox->mono_time);
|
||||||
|
tox_options_free(default_options);
|
||||||
|
tox_unlock(tox);
|
||||||
|
|
||||||
|
if (tox->mutex != nullptr) {
|
||||||
|
pthread_mutex_destroy(tox->mutex);
|
||||||
|
}
|
||||||
|
|
||||||
|
mem_delete(sys->mem, tox->mutex);
|
||||||
|
mem_delete(sys->mem, tox);
|
||||||
|
|
||||||
SET_ERROR_PARAMETER(error, TOX_ERR_NEW_LOAD_BAD_FORMAT);
|
SET_ERROR_PARAMETER(error, TOX_ERR_NEW_LOAD_BAD_FORMAT);
|
||||||
} else if (load_savedata_sk) {
|
return nullptr;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (load_savedata_sk) {
|
||||||
load_secret_key(tox->m->net_crypto, tox_options_get_savedata_data(opts));
|
load_secret_key(tox->m->net_crypto, tox_options_get_savedata_data(opts));
|
||||||
SET_ERROR_PARAMETER(error, TOX_ERR_NEW_OK);
|
|
||||||
} else {
|
|
||||||
SET_ERROR_PARAMETER(error, TOX_ERR_NEW_OK);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
m_callback_namechange(tox->m, tox_friend_name_handler);
|
m_callback_namechange(tox->m, tox_friend_name_handler);
|
||||||
@ -913,6 +927,9 @@ Tox *tox_new(const struct Tox_Options *options, Tox_Err_New *error)
|
|||||||
tox_options_free(default_options);
|
tox_options_free(default_options);
|
||||||
|
|
||||||
tox_unlock(tox);
|
tox_unlock(tox);
|
||||||
|
|
||||||
|
SET_ERROR_PARAMETER(error, TOX_ERR_NEW_OK);
|
||||||
|
|
||||||
return tox;
|
return tox;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
3
external/toxcore/c-toxcore/toxcore/tox.h
vendored
3
external/toxcore/c-toxcore/toxcore/tox.h
vendored
@ -890,9 +890,6 @@ typedef enum Tox_Err_New {
|
|||||||
* This function will bring the instance into a valid state. Running the event
|
* This function will bring the instance into a valid state. Running the event
|
||||||
* loop with a new instance will operate correctly.
|
* loop with a new instance will operate correctly.
|
||||||
*
|
*
|
||||||
* If loading failed or succeeded only partially, the new or partially loaded
|
|
||||||
* instance is returned and an error code is set.
|
|
||||||
*
|
|
||||||
* @param options An options object as described above. If this parameter is
|
* @param options An options object as described above. If this parameter is
|
||||||
* NULL, the default options are used.
|
* NULL, the default options are used.
|
||||||
*
|
*
|
||||||
|
Loading…
Reference in New Issue
Block a user