Compare commits

..

No commits in common. "b95f0498b6ed5b2168f685805b6078c992f7f353" and "7495a50723cf2e78bb81b79a81e92b529b311e92" have entirely different histories.

78 changed files with 409 additions and 886 deletions

View File

@ -6,7 +6,6 @@ CACHEDIR="$HOME/cache"
. ".github/scripts/flags-$CC.sh" . ".github/scripts/flags-$CC.sh"
add_flag -Werror add_flag -Werror
add_flag -D_DEBUG
add_flag -fdiagnostics-color=always add_flag -fdiagnostics-color=always
add_flag -fno-omit-frame-pointer add_flag -fno-omit-frame-pointer
add_flag -fno-sanitize-recover=all add_flag -fno-sanitize-recover=all

View File

@ -9,6 +9,7 @@ bazel-opt_task:
- /src/workspace/tools/inject-repo c-toxcore - /src/workspace/tools/inject-repo c-toxcore
test_all_script: test_all_script:
- cd /src/workspace && bazel test -k - cd /src/workspace && bazel test -k
--config=ci
--build_tag_filters=-haskell --build_tag_filters=-haskell
--test_tag_filters=-haskell --test_tag_filters=-haskell
-- --
@ -25,6 +26,7 @@ bazel-dbg_task:
- /src/workspace/tools/inject-repo c-toxcore - /src/workspace/tools/inject-repo c-toxcore
test_all_script: test_all_script:
- cd /src/workspace && bazel test -k - cd /src/workspace && bazel test -k
--config=ci
--build_tag_filters=-haskell --build_tag_filters=-haskell
--test_tag_filters=-haskell --test_tag_filters=-haskell
-- --
@ -41,19 +43,8 @@ cimple_task:
- /src/workspace/tools/inject-repo c-toxcore - /src/workspace/tools/inject-repo c-toxcore
test_all_script: test_all_script:
- cd /src/workspace && bazel test -k - cd /src/workspace && bazel test -k
--config=ci
--build_tag_filters=haskell --build_tag_filters=haskell
--test_tag_filters=haskell --test_tag_filters=haskell
-- --
//c-toxcore/... //c-toxcore/...
freebsd_task:
container:
image: toxchat/freebsd:latest
cpu: 2
memory: 4G
kvm: true
configure_script:
- git submodule update --init --recursive
- cd .. && mv cirrus-ci-build /work/c-toxcore && mkdir cirrus-ci-build
test_all_script:
- cd /work/c-toxcore && .github/scripts/cmake-freebsd

View File

@ -1,2 +0,0 @@
/_build
/_install

View File

@ -1,55 +0,0 @@
#!/bin/bash
# Copyright (C) 2018-2023 nurupo
# Toxcore building
set -eux
cd .. # /work
. cmake-alpine-run.sh
# === Get VM ready to build the code ===
start_vm
RUN apk add cmake g++ ninja
mv c-toxcore /
# Copy over toxcore code from host to qemu
scp -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no -P "$SSH_PORT" -r /c-toxcore root@localhost:~
cd /c-toxcore
. ".github/scripts/flags-gcc.sh"
# Make compilation error on a warning
add_flag -Werror
# - disabling toxav because vpx doesn't work on s390x.
# - disabling bootstrap daemons because we don't need them for testing (saving time).
# - disabling shared libraries because it saves a lot of time on building PIC objects.
# - enable unity build because it saves a lot of time as well (fewer objects to build).
RUN "cmake -B_build -Hc-toxcore -GNinja \
-DCMAKE_C_FLAGS='$C_FLAGS' \
-DCMAKE_CXX_FLAGS='$CXX_FLAGS' \
-DCMAKE_EXE_LINKER_FLAGS='$LD_FLAGS' \
-DCMAKE_SHARED_LINKER_FLAGS='$LD_FLAGS' \
-DCMAKE_INSTALL_PREFIX:PATH='_install' \
-DCMAKE_UNITY_BUILD=ON \
-DMIN_LOGGER_LEVEL=TRACE \
-DNON_HERMETIC_TESTS=ON \
-DENABLE_SHARED=OFF \
-DBUILD_TOXAV=OFF \
-DDHT_BOOTSTRAP=OFF \
-DBOOTSTRAP_DAEMON=OFF \
-DSTRICT_ABI=ON \
-DTEST_TIMEOUT_SECONDS=90 \
-DUSE_IPV6=OFF \
-DAUTOTEST=ON"
RUN 'cmake --build _build --parallel 2 --target install -- -k 0'
RUN 'cd _build && ctest -j50 --output-on-failure --rerun-failed --repeat until-pass:1 --timeout 90 || true' &
# Give the tests 5 minutes to run. Sometimes, the per-test timeout doesn't
# work, so we put a global timeout here for everything.
sleep 300

View File

@ -1,58 +0,0 @@
#!/bin/bash
# Copyright (C) 2018-2023 nurupo
# Toxcore building
set -eux
cd .. # /work
. cmake-freebsd-run.sh
# === Get VM ready to build the code ===
# Unpack image only if it's compressed.
if [ -f "$IMAGE_NAME.gz" ]; then
gunzip "$IMAGE_NAME.gz"
fi
mv c-toxcore /
start_vm
# Copy over toxcore code from host to qemu
scp -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no -P "$SSH_PORT" -r /c-toxcore root@localhost:~
RUN ls -lh
cd /c-toxcore
. '.github/scripts/flags-clang.sh'
add_ld_flag -Wl,-z,defs
# Make compilation error on a warning.
add_flag -Werror
# This triggers on FreeBSD's clang.
add_flag -Wno-format
add_flag -Wno-unsafe-buffer-usage
RUN "cmake -B_build -Hc-toxcore \
-DCMAKE_C_FLAGS='$C_FLAGS' \
-DCMAKE_CXX_FLAGS='$CXX_FLAGS' \
-DCMAKE_EXE_LINKER_FLAGS='$LD_FLAGS' \
-DCMAKE_SHARED_LINKER_FLAGS='$LD_FLAGS' \
-DCMAKE_INSTALL_PREFIX:PATH='_install' \
-DMIN_LOGGER_LEVEL=TRACE \
-DMUST_BUILD_TOXAV=ON \
-DNON_HERMETIC_TESTS=ON \
-DSTRICT_ABI=ON \
-DTEST_TIMEOUT_SECONDS=120 \
-DUSE_IPV6=OFF \
-DAUTOTEST=ON"
# We created the VM with the same number of cores as the host, so the host-ran `nproc` here is fine.
RUN 'cmake --build _build --parallel "$NPROC" --target install -- -k'
RUN 'cd _build && ctest -j50 --output-on-failure --rerun-failed --repeat until-pass:2 --timeout 120 || true'
# Gracefully shut down the VM.
stop_vm

View File

@ -0,0 +1,52 @@
#!/bin/bash
# Copyright (C) 2018-2021 nurupo
# Toxcore building
set -eux
if [ "$PWD" != "/work" ]; then
cd ..
mv c-toxcore /
mkdir c-toxcore
cd /work
fi
. cmake-freebsd-run.sh
# === Get VM ready to build the code ===
gunzip "$IMAGE_NAME.gz"
start_vm
# Copy over toxcore code from host to qemu
scp -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no -P "$SSH_PORT" -r /c-toxcore root@localhost:~
RUN ls -lh
cd /c-toxcore
. ".github/scripts/flags-clang.sh"
add_ld_flag -Wl,-z,defs
# Make compilation error on a warning
add_flag -Werror
RUN 'cmake -B_build -Hc-toxcore \
-DCMAKE_C_FLAGS="$C_FLAGS" \
-DCMAKE_CXX_FLAGS="$CXX_FLAGS" \
-DCMAKE_EXE_LINKER_FLAGS="$LD_FLAGS" \
-DCMAKE_SHARED_LINKER_FLAGS="$LD_FLAGS" \
-DCMAKE_INSTALL_PREFIX:PATH="_install" \
-DMIN_LOGGER_LEVEL=TRACE \
-DMUST_BUILD_TOXAV=ON \
-DNON_HERMETIC_TESTS=ON \
-DSTRICT_ABI=ON \
-DTEST_TIMEOUT_SECONDS=90 \
-DUSE_IPV6=OFF \
-DAUTOTEST=ON'
# We created the VM with the same number of cores as the host, so the host-ran `nproc` here is fine
RUN 'gmake "-j$NPROC" -k install -C_build'
RUN 'gmake "-j$NPROC" test ARGS="-j50" -C_build || true'

View File

@ -28,6 +28,8 @@ add_flag -O3 -march=native
# Warn on non-ISO C. # Warn on non-ISO C.
add_c_flag -pedantic add_c_flag -pedantic
add_c_flag -std=c99
add_cxx_flag -std=c++11
add_flag -g3 add_flag -g3
add_flag -ftrapv add_flag -ftrapv

View File

@ -12,52 +12,36 @@ branches:
protection: protection:
required_status_checks: required_status_checks:
contexts: contexts:
- "bazel-asan"
- "bazel-dbg" - "bazel-dbg"
- "bazel-opt" - "bazel-opt"
- "build-alpine-s390x" - "bazel-tsan"
- "build-android"
- "build-compcert" - "build-compcert"
- "build-macos" - "build-macos"
- "build-nacl" - "build-nacl"
- "build-tcc" - "build-tcc"
- "build-win32" - "build-win32"
- "build-win64" - "build-win64"
- "CodeFactor"
- "common / buildifier"
- "coverage-linux"
- "ci/circleci: asan" - "ci/circleci: asan"
- "ci/circleci: bazel-asan"
- "ci/circleci: bazel-msan"
- "ci/circleci: bazel-tsan"
- "ci/circleci: clang-analyze" - "ci/circleci: clang-analyze"
- "ci/circleci: clang-tidy" - "ci/circleci: clang-tidy"
- "ci/circleci: cpplint" - "ci/circleci: cpplint"
- "ci/circleci: infer" - "ci/circleci: infer"
- "ci/circleci: msan"
- "ci/circleci: static-analysis" - "ci/circleci: static-analysis"
- "ci/circleci: tsan" - "ci/circleci: tsan"
- "ci/circleci: ubsan" - "ci/circleci: ubsan"
- "cimple" - "cimple"
- "cimplefmt"
- "CodeFactor"
- "code-review/reviewable" - "code-review/reviewable"
- "common / buildifier" - "continuous-integration/appveyor/pr"
- "coverage-linux"
- "docker-bootstrap-node" - "docker-bootstrap-node"
- "docker-bootstrap-node-websocket" - "docker-bootstrap-node-websocket"
- "docker-clusterfuzz"
- "docker-esp32"
- "docker-fuzzer"
- "docker-toxcore-js" - "docker-toxcore-js"
- "docker-win32"
- "docker-win64"
- "doxygen"
- "freebsd"
- "Hound"
- "misra"
- "mypy" - "mypy"
- "program-analysis"
- "sonar-scan" - "sonar-scan"
- "tokstyle"
- "TokTok.c-toxcore"
- "TokTok.c-toxcore (windows_msvc_conan shared)"
- "TokTok.c-toxcore (windows_msvc_conan static)"
# Labels specific to c-toxcore. # Labels specific to c-toxcore.
labels: labels:

View File

@ -60,6 +60,15 @@ jobs:
with: with:
file: other/docker/misra/Dockerfile file: other/docker/misra/Dockerfile
cimplefmt:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v2
with:
submodules: recursive
- name: Run cimplefmt
run: other/docker/cimplefmt/run -u $(find tox* -name "*.[ch]")
build-nacl: build-nacl:
runs-on: ubuntu-latest runs-on: ubuntu-latest
steps: steps:
@ -70,45 +79,6 @@ jobs:
with: with:
file: other/docker/autotools/Dockerfile file: other/docker/autotools/Dockerfile
build-tcc:
runs-on: ubuntu-latest
steps:
- name: Set up Docker Buildx
uses: docker/setup-buildx-action@v1
- name: Docker Build
uses: docker/build-push-action@v2
with:
file: other/docker/tcc/Dockerfile
build-compcert:
runs-on: ubuntu-latest
steps:
- name: Set up Docker Buildx
uses: docker/setup-buildx-action@v1
- name: Docker Build
uses: docker/build-push-action@v2
with:
file: other/docker/compcert/Dockerfile
build-alpine-s390x:
runs-on: ubuntu-latest
steps:
- name: Set up Docker Buildx
uses: docker/setup-buildx-action@v1
- name: Docker Build
uses: docker/build-push-action@v2
with:
file: other/docker/alpine-s390x/Dockerfile
cimplefmt:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v2
with:
submodules: recursive
- name: Run cimplefmt
run: other/docker/cimplefmt/run -u $(find tox* -name "*.[ch]")
build-win32: build-win32:
runs-on: ubuntu-latest runs-on: ubuntu-latest
steps: steps:
@ -127,6 +97,16 @@ jobs:
- name: Cross compilation - name: Cross compilation
run: .github/scripts/cmake-win64 script run: .github/scripts/cmake-win64 script
build-freebsd:
runs-on: ubuntu-latest
container: toxchat/freebsd
steps:
- uses: actions/checkout@v2
with:
submodules: recursive
- name: Build on FreeBSD
run: .github/scripts/cmake-freebsd-stage2
build-macos: build-macos:
runs-on: macos-latest runs-on: macos-latest
steps: steps:
@ -145,6 +125,81 @@ jobs:
- name: Build, test, and upload coverage - name: Build, test, and upload coverage
run: .github/scripts/coverage-linux run: .github/scripts/coverage-linux
build-tcc:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v2
with:
submodules: recursive
- name: Install dependencies
run:
sudo apt-get install -y --no-install-recommends
tcc
libconfig-dev
libopus-dev
libsodium-dev
libvpx-dev
- name: Build with TCC
run:
tcc
-Dinline=static
-o send_message_test
-Wall -Werror
-bench -g
auto_tests/auto_test_support.c
auto_tests/send_message_test.c
testing/misc_tools.c
toxav/*.c
toxcore/*.c
toxcore/*/*.c
toxencryptsave/*.c
third_party/cmp/*.c
$(pkg-config --cflags --libs libsodium opus vpx)
- name: Run the test
run: "./send_message_test | grep 'tox clients connected'"
- name: Build amalgamation file with TCC
run:
other/make_single_file
auto_tests/auto_test_support.c
auto_tests/send_message_test.c
testing/misc_tools.c |
tcc -
-o send_message_test
-Wall -Werror
-bench -g
$(pkg-config --cflags --libs libsodium opus vpx)
- name: Run the test again
run: "./send_message_test | grep 'tox clients connected'"
build-compcert:
runs-on: ubuntu-latest
container: toxchat/compcert
steps:
- uses: actions/checkout@v2
with:
submodules: recursive
- name: Build with CompCert
run:
ccomp
-o send_message_test
-Wall -Werror
-Wno-c11-extensions
-Wno-unknown-pragmas
-Wno-unused-variable
-fstruct-passing -fno-unprototyped -g
auto_tests/auto_test_support.c
auto_tests/send_message_test.c
testing/misc_tools.c
toxav/*.c
toxcore/*.c
toxcore/*/*.c
toxencryptsave/*.c
third_party/cmp/*.c
-D__COMPCERT__ -DDISABLE_VLA -Dinline=
-lpthread $(pkg-config --cflags --libs libsodium opus vpx)
- name: Run the test
run: "./send_message_test | grep 'tox clients connected'"
build-android: build-android:
runs-on: ubuntu-latest runs-on: ubuntu-latest
steps: steps:

View File

@ -6,11 +6,6 @@ on:
pull_request: pull_request:
branches: [master] branches: [master]
# Cancel old PR builds when pushing new commits.
concurrency:
group: docker-${{ github.event.pull_request.number || github.ref }}
cancel-in-progress: true
jobs: jobs:
docker-bootstrap-node: docker-bootstrap-node:
runs-on: ubuntu-latest runs-on: ubuntu-latest

View File

@ -6,16 +6,11 @@ on:
pull_request: pull_request:
branches: [master] branches: [master]
# Cancel old PR builds when pushing new commits.
concurrency:
group: scan-${{ github.event.pull_request.number || github.ref }}
cancel-in-progress: true
jobs: jobs:
sonar-scan: sonar-scan:
runs-on: ubuntu-latest runs-on: ubuntu-latest
env: env:
SONAR_SCANNER_VERSION: 5.0.1.3006 SONAR_SCANNER_VERSION: 4.4.0.2170
SONAR_SERVER_URL: "https://sonarcloud.io" SONAR_SERVER_URL: "https://sonarcloud.io"
BUILD_WRAPPER_OUT_DIR: build_wrapper_output_directory # Directory where build-wrapper output will be placed BUILD_WRAPPER_OUT_DIR: build_wrapper_output_directory # Directory where build-wrapper output will be placed
steps: steps:
@ -23,10 +18,10 @@ jobs:
with: with:
fetch-depth: 0 # Shallow clones should be disabled for a better relevancy of analysis fetch-depth: 0 # Shallow clones should be disabled for a better relevancy of analysis
submodules: recursive submodules: recursive
- name: Set up JDK 17 - name: Set up JDK 11
uses: actions/setup-java@v1 uses: actions/setup-java@v1
with: with:
java-version: 17 java-version: 11
- name: Download and set up sonar-scanner - name: Download and set up sonar-scanner
env: env:
SONAR_SCANNER_DOWNLOAD_URL: https://binaries.sonarsource.com/Distribution/sonar-scanner-cli/sonar-scanner-cli-${{ env.SONAR_SCANNER_VERSION }}-linux.zip SONAR_SCANNER_DOWNLOAD_URL: https://binaries.sonarsource.com/Distribution/sonar-scanner-cli/sonar-scanner-cli-${{ env.SONAR_SCANNER_VERSION }}-linux.zip

View File

@ -1,6 +1,8 @@
load("@rules_cc//cc:defs.bzl", "cc_library") load("@rules_cc//cc:defs.bzl", "cc_library")
load("//tools/project:build_defs.bzl", "project") load("//tools/project:build_defs.bzl", "project")
package(features = ["layering_check"])
project() project()
genrule( genrule(
@ -8,19 +10,16 @@ genrule(
srcs = [ srcs = [
"//c-toxcore/toxav:toxav.h", "//c-toxcore/toxav:toxav.h",
"//c-toxcore/toxcore:tox.h", "//c-toxcore/toxcore:tox.h",
"//c-toxcore/toxcore:tox_private.h",
"//c-toxcore/toxencryptsave:toxencryptsave.h", "//c-toxcore/toxencryptsave:toxencryptsave.h",
], ],
outs = [ outs = [
"tox/toxav.h", "tox/toxav.h",
"tox/tox.h", "tox/tox.h",
"tox/tox_private.h",
"tox/toxencryptsave.h", "tox/toxencryptsave.h",
], ],
cmd = """ cmd = """
cp $(location //c-toxcore/toxav:toxav.h) $(GENDIR)/c-toxcore/tox/toxav.h cp $(location //c-toxcore/toxav:toxav.h) $(GENDIR)/c-toxcore/tox/toxav.h
cp $(location //c-toxcore/toxcore:tox.h) $(GENDIR)/c-toxcore/tox/tox.h cp $(location //c-toxcore/toxcore:tox.h) $(GENDIR)/c-toxcore/tox/tox.h
cp $(location //c-toxcore/toxcore:tox_private.h) $(GENDIR)/c-toxcore/tox/tox_private.h
cp $(location //c-toxcore/toxencryptsave:toxencryptsave.h) $(GENDIR)/c-toxcore/tox/toxencryptsave.h cp $(location //c-toxcore/toxencryptsave:toxencryptsave.h) $(GENDIR)/c-toxcore/tox/toxencryptsave.h
""", """,
visibility = ["//visibility:public"], visibility = ["//visibility:public"],

View File

@ -14,8 +14,8 @@
# #
################################################################################ ################################################################################
cmake_minimum_required(VERSION 3.5) cmake_minimum_required(VERSION 2.8.12)
cmake_policy(VERSION 3.5) cmake_policy(VERSION 2.8.12)
project(toxcore) project(toxcore)
list(APPEND CMAKE_MODULE_PATH ${toxcore_SOURCE_DIR}/cmake) list(APPEND CMAKE_MODULE_PATH ${toxcore_SOURCE_DIR}/cmake)
@ -79,19 +79,21 @@ enable_testing()
set(CMAKE_MACOSX_RPATH ON) set(CMAKE_MACOSX_RPATH ON)
# Set standard version for compiler. if(${CMAKE_VERSION} VERSION_LESS "3.1.0")
if(MSVC) if(NOT MSVC)
# https://developercommunity.visualstudio.com/t/older-winsdk-headers-are-incompatible-with-zcprepr/1593479 set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -std=c99")
set(CMAKE_C_STANDARD 99) set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} -std=c++17")
else()
set(CMAKE_C_STANDARD 11)
endif() endif()
else()
# Set standard version for compiler.
set(CMAKE_C_STANDARD 99)
set(CMAKE_CXX_STANDARD 17) set(CMAKE_CXX_STANDARD 17)
set(CMAKE_C_EXTENSIONS OFF) set(CMAKE_C_EXTENSIONS OFF)
set(CMAKE_CXX_EXTENSIONS OFF) set(CMAKE_CXX_EXTENSIONS OFF)
message(STATUS "Supported C compiler features = ${CMAKE_C_COMPILE_FEATURES}") message(STATUS "Supported C compiler features = ${CMAKE_C_COMPILE_FEATURES}")
message(STATUS "Supported C++ compiler features = ${CMAKE_CXX_COMPILE_FEATURES}") message(STATUS "Supported C++ compiler features = ${CMAKE_CXX_COMPILE_FEATURES}")
endif()
set(MIN_LOGGER_LEVEL "" CACHE STRING "Logging level to use (TRACE, DEBUG, INFO, WARNING, ERROR)") set(MIN_LOGGER_LEVEL "" CACHE STRING "Logging level to use (TRACE, DEBUG, INFO, WARNING, ERROR)")
if(MIN_LOGGER_LEVEL) if(MIN_LOGGER_LEVEL)
@ -334,8 +336,7 @@ set(toxcore_PKGCONFIG_REQUIRES ${toxcore_PKGCONFIG_REQUIRES} libsodium)
set(toxcore_API_HEADERS set(toxcore_API_HEADERS
${toxcore_SOURCE_DIR}/toxcore/tox.h^tox ${toxcore_SOURCE_DIR}/toxcore/tox.h^tox
${toxcore_SOURCE_DIR}/toxcore/tox_events.h^tox ${toxcore_SOURCE_DIR}/toxcore/tox_events.h^tox
${toxcore_SOURCE_DIR}/toxcore/tox_dispatch.h^tox ${toxcore_SOURCE_DIR}/toxcore/tox_dispatch.h^tox)
${toxcore_SOURCE_DIR}/toxcore/tox_private.h^tox)
################################################################################ ################################################################################
# #

View File

@ -4,6 +4,8 @@
[**Website**](https://tox.chat) **|** [**Wiki**](https://wiki.tox.chat/) **|** [**Blog**](https://blog.tox.chat/) **|** [**FAQ**](https://wiki.tox.chat/doku.php?id=users:faq) **|** [**Binaries/Downloads**](https://tox.chat/download.html) **|** [**Clients**](https://wiki.tox.chat/doku.php?id=clients) **|** [**Compiling**](/INSTALL.md) [**Website**](https://tox.chat) **|** [**Wiki**](https://wiki.tox.chat/) **|** [**Blog**](https://blog.tox.chat/) **|** [**FAQ**](https://wiki.tox.chat/doku.php?id=users:faq) **|** [**Binaries/Downloads**](https://tox.chat/download.html) **|** [**Clients**](https://wiki.tox.chat/doku.php?id=clients) **|** [**Compiling**](/INSTALL.md)
**IRC Channels:** Users: [#tox@libera.chat](https://web.libera.chat/#tox), Developers: [#toktok@libera.chat](https://web.libera.chat/#toktok)
## What is Tox ## What is Tox
Tox is a peer to peer (serverless) instant messenger aimed at making security Tox is a peer to peer (serverless) instant messenger aimed at making security

View File

@ -1,5 +1,7 @@
load("@rules_cc//cc:defs.bzl", "cc_library", "cc_test") load("@rules_cc//cc:defs.bzl", "cc_library", "cc_test")
package(features = ["layering_check"])
cc_library( cc_library(
name = "check_compat", name = "check_compat",
testonly = True, testonly = True,

View File

@ -269,30 +269,6 @@ static void test_large_data_symmetric(void)
free(m1); free(m1);
} }
static void test_very_large_data(void)
{
const Random *rng = system_random();
ck_assert(rng != nullptr);
uint8_t nonce[CRYPTO_NONCE_SIZE] = {0};
uint8_t pk[CRYPTO_PUBLIC_KEY_SIZE];
uint8_t sk[CRYPTO_SECRET_KEY_SIZE];
crypto_new_keypair(rng, pk, sk);
// 100 MiB of data (all zeroes, doesn't matter what's inside).
const uint32_t plain_size = 100 * 1024 * 1024;
uint8_t *plain = (uint8_t *)malloc(plain_size);
uint8_t *encrypted = (uint8_t *)malloc(plain_size + CRYPTO_MAC_SIZE);
ck_assert(plain != nullptr);
ck_assert(encrypted != nullptr);
encrypt_data(pk, sk, nonce, plain, plain_size, encrypted);
free(encrypted);
free(plain);
}
static void increment_nonce_number_cmp(uint8_t *nonce, uint32_t num) static void increment_nonce_number_cmp(uint8_t *nonce, uint32_t num)
{ {
uint32_t num1 = 0; uint32_t num1 = 0;
@ -364,7 +340,6 @@ int main(void)
test_endtoend(); /* waiting up to 15 seconds */ test_endtoend(); /* waiting up to 15 seconds */
test_large_data(); test_large_data();
test_large_data_symmetric(); test_large_data_symmetric();
test_very_large_data();
test_increment_nonce(); test_increment_nonce();
test_memzero(); test_memzero();

View File

@ -123,7 +123,7 @@ static void test_dht_getnodes(AutoTox *autotoxes)
tox_self_get_dht_id(autotoxes[i].tox, public_key_list[i]); tox_self_get_dht_id(autotoxes[i].tox, public_key_list[i]);
tox_callback_dht_get_nodes_response(autotoxes[i].tox, getnodes_response_cb); tox_callback_dht_get_nodes_response(autotoxes[i].tox, getnodes_response_cb);
printf("Peer %zu dht closenode count total/announce-capable: %d/%d\n", printf("Peer %zu dht closenode count total/annouce-capable: %d/%d\n",
i, i,
tox_dht_get_num_closelist(autotoxes[i].tox), tox_dht_get_num_closelist(autotoxes[i].tox),
tox_dht_get_num_closelist_announce_capable(autotoxes[i].tox) tox_dht_get_num_closelist_announce_capable(autotoxes[i].tox)

View File

@ -44,10 +44,6 @@ typedef struct State {
#define TEST_CUSTOM_PACKET "Why'd ya spill yer beans?" #define TEST_CUSTOM_PACKET "Why'd ya spill yer beans?"
#define TEST_CUSTOM_PACKET_LEN (sizeof(TEST_CUSTOM_PACKET) - 1) #define TEST_CUSTOM_PACKET_LEN (sizeof(TEST_CUSTOM_PACKET) - 1)
#define TEST_CUSTOM_PACKET_LARGE "Where is it I've read that someone condemned to death says or thinks, an hour before his death, that if he had to live on some high rock, on such a narrow ledge that he'd only room to stand, and the ocean, everlasting darkness, everlasting solitude, everlasting tempest around him, if he had to remain standing on a square yard of space all his life, a thousand years, eternity, it were better to live so than to die at once. Only to live, to live and live! Life, whatever it may be! ...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................0123456789"
#define TEST_CUSTOM_PACKET_LARGE_LEN (sizeof(TEST_CUSTOM_PACKET_LARGE) - 1)
static_assert(TEST_CUSTOM_PACKET_LARGE_LEN == TOX_GROUP_MAX_CUSTOM_LOSSY_PACKET_LENGTH, "Should be max");
#define TEST_CUSTOM_PRIVATE_PACKET "This is a custom private packet. Enjoy." #define TEST_CUSTOM_PRIVATE_PACKET "This is a custom private packet. Enjoy."
#define TEST_CUSTOM_PRIVATE_PACKET_LEN (sizeof(TEST_CUSTOM_PRIVATE_PACKET) - 1) #define TEST_CUSTOM_PRIVATE_PACKET_LEN (sizeof(TEST_CUSTOM_PRIVATE_PACKET) - 1)
@ -191,21 +187,6 @@ static void group_custom_packet_handler(Tox *tox, uint32_t groupnumber, uint32_t
++state->custom_packets_received; ++state->custom_packets_received;
} }
static void group_custom_packet_large_handler(Tox *tox, uint32_t groupnumber, uint32_t peer_id, const uint8_t *data,
size_t length, void *user_data)
{
ck_assert_msg(length == TEST_CUSTOM_PACKET_LARGE_LEN, "Failed to receive large custom packet. Invalid length: %zu\n", length);
ck_assert(memcmp(data, TEST_CUSTOM_PACKET_LARGE, length) == 0);
AutoTox *autotox = (AutoTox *)user_data;
ck_assert(autotox != nullptr);
State *state = (State *)autotox->state;
++state->custom_packets_received;
}
static void group_message_handler(Tox *tox, uint32_t groupnumber, uint32_t peer_id, TOX_MESSAGE_TYPE type, static void group_message_handler(Tox *tox, uint32_t groupnumber, uint32_t peer_id, TOX_MESSAGE_TYPE type,
const uint8_t *message, size_t length, uint32_t pseudo_msg_id, void *user_data) const uint8_t *message, size_t length, uint32_t pseudo_msg_id, void *user_data)
{ {
@ -469,19 +450,6 @@ static void group_message_test(AutoTox *autotoxes)
iterate_all_wait(autotoxes, NUM_GROUP_TOXES, ITERATION_INTERVAL); iterate_all_wait(autotoxes, NUM_GROUP_TOXES, ITERATION_INTERVAL);
} }
// tox0 sends a large max sized lossy custom packet
// overwrite callback for larger packet
tox_callback_group_custom_packet(tox0, group_custom_packet_large_handler);
tox_group_send_custom_packet(tox1, group_number, false, (const uint8_t *)TEST_CUSTOM_PACKET_LARGE, TEST_CUSTOM_PACKET_LARGE_LEN,
&c_err);
ck_assert_msg(c_err == TOX_ERR_GROUP_SEND_CUSTOM_PACKET_OK, "%d", c_err);
while (state0->custom_packets_received < 3) {
iterate_all_wait(autotoxes, NUM_GROUP_TOXES, ITERATION_INTERVAL);
}
uint8_t m[TOX_GROUP_MAX_MESSAGE_LENGTH] = {0}; uint8_t m[TOX_GROUP_MAX_MESSAGE_LENGTH] = {0};
fprintf(stderr, "Doing lossless packet test...\n"); fprintf(stderr, "Doing lossless packet test...\n");
@ -570,8 +538,6 @@ int main(void)
#undef TEST_PRIVATE_MESSAGE_LEN #undef TEST_PRIVATE_MESSAGE_LEN
#undef TEST_CUSTOM_PACKET #undef TEST_CUSTOM_PACKET
#undef TEST_CUSTOM_PACKET_LEN #undef TEST_CUSTOM_PACKET_LEN
#undef TEST_CUSTOM_PACKET_LARGE
#undef TEST_CUSTOM_PACKET_LARGE_LEN
#undef TEST_CUSTOM_PRIVATE_PACKET #undef TEST_CUSTOM_PRIVATE_PACKET
#undef TEST_CUSTOM_PRIVATE_PACKET_LEN #undef TEST_CUSTOM_PRIVATE_PACKET_LEN
#undef IGNORE_MESSAGE #undef IGNORE_MESSAGE

View File

@ -12,4 +12,4 @@ jobs:
- bash: python -m pip install conan==1.59.0 - bash: python -m pip install conan==1.59.0
- bash: git submodule update --init --recursive - bash: git submodule update --init --recursive
- bash: conan install -if _build -o with_tests=True -o shared=$(conan.shared) . - bash: conan install -if _build -o with_tests=True -o shared=$(conan.shared) .
- bash: CONAN_CPU_COUNT=50 CTEST_OUTPUT_ON_FAILURE=1 conan build -bf _build -if _build . || true - bash: CONAN_CPU_COUNT=50 CTEST_OUTPUT_ON_FAILURE=1 conan build -bf _build -if _build .

View File

@ -29,7 +29,7 @@ function(_make_version_script target)
list(GET sublib 1 ns) list(GET sublib 1 ns)
execute_process( execute_process(
COMMAND ${SHELL} -c "egrep '^\\w' ${header} | grep '${ns}_[a-z0-9_]*(' | grep -v '^typedef' | grep -o '${ns}_[a-z0-9_]*(' | egrep -o '[a-z0-9_]+' | sort -u" COMMAND ${SHELL} -c "egrep '^\\w' ${header} | grep '${ns}_[a-z0-9_]*(' | grep -v '^typedef' | grep -o '${ns}_[a-z0-9_]*(' | egrep -o '\\w+' | sort -u"
OUTPUT_VARIABLE sublib_SYMS OUTPUT_VARIABLE sublib_SYMS
OUTPUT_STRIP_TRAILING_WHITESPACE) OUTPUT_STRIP_TRAILING_WHITESPACE)
string(REPLACE "\n" ";" sublib_SYMS ${sublib_SYMS}) string(REPLACE "\n" ";" sublib_SYMS ${sublib_SYMS})

View File

@ -1,6 +1,8 @@
load("@rules_cc//cc:defs.bzl", "cc_binary") load("@rules_cc//cc:defs.bzl", "cc_binary")
load("//tools:no_undefined.bzl", "cc_library") load("//tools:no_undefined.bzl", "cc_library")
package(features = ["layering_check"])
cc_library( cc_library(
name = "bootstrap_node_packets", name = "bootstrap_node_packets",
srcs = ["bootstrap_node_packets.c"], srcs = ["bootstrap_node_packets.c"],

View File

@ -2,9 +2,6 @@
CHECKS="*" CHECKS="*"
# We don't use memcpy_s.
CHECKS="$CHECKS,-clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling"
# __attribute__((nonnull)) causes this warning on defensive null checks. # __attribute__((nonnull)) causes this warning on defensive null checks.
CHECKS="$CHECKS,-clang-diagnostic-pointer-bool-conversion" CHECKS="$CHECKS,-clang-diagnostic-pointer-bool-conversion"
CHECKS="$CHECKS,-clang-diagnostic-tautological-pointer-compare" CHECKS="$CHECKS,-clang-diagnostic-tautological-pointer-compare"
@ -60,27 +57,6 @@ CHECKS="$CHECKS,-readability-redundant-control-flow"
CHECKS="$CHECKS,-bugprone-narrowing-conversions" CHECKS="$CHECKS,-bugprone-narrowing-conversions"
CHECKS="$CHECKS,-cppcoreguidelines-narrowing-conversions" CHECKS="$CHECKS,-cppcoreguidelines-narrowing-conversions"
# Mistakenly thinks that
# const int a = 0, b = 1;
# assert(a < b);
# is a constant expression in C (it is in C++ though, which is probably why it's
# mistaken), suggesting to replace 'assert()' with 'static_assert()' in cases
# where that won't work.
#
# There are ways to make 'static_assert()' work, but they are rather annoying --
# they are somewhat ugly, hurting the readability, and some are error-prone:
#
# - Turning 'a' and 'b' into enum constants would make it work, but this falls
# apart if the enum types are compared against non-enums down the line
# error: enumerated and non-enumerated type in conditional expression [-Werror=extra]
#
# - Turning 'a' and 'b' into pre-processor macros is the only option left, but
# #defines and #undefs in the middle of a function hurt the readability and
# are less idiomatic than simply using 'const int'.
CHECKS="$CHECKS,-cert-dcl03-c"
CHECKS="$CHECKS,-hicpp-static-assert"
CHECKS="$CHECKS,-misc-static-assert"
# TODO(iphydf): We might want some of these. For the ones we don't want, add a # TODO(iphydf): We might want some of these. For the ones we don't want, add a
# comment explaining why not. # comment explaining why not.
CHECKS="$CHECKS,-clang-analyzer-optin.performance.Padding" CHECKS="$CHECKS,-clang-analyzer-optin.performance.Padding"

View File

@ -1,5 +1,7 @@
load("@rules_cc//cc:defs.bzl", "cc_binary") load("@rules_cc//cc:defs.bzl", "cc_binary")
package(features = ["layering_check"])
cc_binary( cc_binary(
name = "bootstrap_daemon", name = "bootstrap_daemon",
srcs = glob([ srcs = glob([

View File

@ -1,6 +1,6 @@
########################################################### ###########################################################
# Builder image: we compile the code here (static build) # Builder image: we compile the code here (static build)
FROM alpine:3.18.5 AS build FROM alpine:3.15.0 AS build
RUN ["apk", "--no-cache", "add",\ RUN ["apk", "--no-cache", "add",\
"build-base",\ "build-base",\
@ -62,7 +62,7 @@ RUN ["other/bootstrap_daemon/docker/get-nodes.py", "other/bootstrap_daemon/tox-b
########################################################### ###########################################################
# Final image build: this is what runs the bootstrap node # Final image build: this is what runs the bootstrap node
FROM debian:bookworm-slim FROM debian:bullseye-slim
COPY --from=build /usr/local/bin/tox-bootstrapd /usr/local/bin/ COPY --from=build /usr/local/bin/tox-bootstrapd /usr/local/bin/
COPY --from=build /src/c-toxcore/other/bootstrap_daemon/tox-bootstrapd.conf /etc/tox-bootstrapd.conf COPY --from=build /src/c-toxcore/other/bootstrap_daemon/tox-bootstrapd.conf /etc/tox-bootstrapd.conf

View File

@ -1 +1 @@
5aac1df4d6c1de289e8e9f646d06099c84fd4d9b80d19f45e3254eec3ece2bff /usr/local/bin/tox-bootstrapd b2996d73cab7c7453dc10ccf7ad733622558de3b1ad0db824a379cf96f500379 /usr/local/bin/tox-bootstrapd

View File

@ -3,7 +3,7 @@
set -eux set -eux
docker_build() { docker_build() {
DOCKER_BUILDKIT=1 docker build --progress=plain -f other/bootstrap_daemon/docker/Dockerfile -t toxchat/bootstrap-node . docker build -f other/bootstrap_daemon/docker/Dockerfile -t toxchat/bootstrap-node .
} }
# Run Docker build once. If it succeeds, we're good. # Run Docker build once. If it succeeds, we're good.
@ -12,11 +12,12 @@ if docker_build; then
fi fi
# We're not good. Run it again, but now capture the output. # We're not good. Run it again, but now capture the output.
OUTPUT=$(docker_build 2>&1 || true) OUTPUT=$(docker_build || true 2>&1)
if echo "$OUTPUT" | grep '/usr/local/bin/tox-bootstrapd: FAILED'; then if echo "$OUTPUT" | grep '/usr/local/bin/tox-bootstrapd: FAILED'; then
# This is a checksum warning, so we need to update it. # This is a checksum warning, so we need to update it.
echo "$OUTPUT" | grep -Eo '[0-9a-f]{64} /usr/local/bin/tox-bootstrapd' | tail -n1 >other/bootstrap_daemon/docker/tox-bootstrapd.sha256 IMAGE=$(echo "$OUTPUT" | grep '^ ---> [0-9a-f]*$' | grep -o '[0-9a-f]*$' | tail -n1)
docker run --rm "$IMAGE" sha256sum /usr/local/bin/tox-bootstrapd >other/bootstrap_daemon/docker/tox-bootstrapd.sha256
fi fi
# Run once last time to complete the build. # Run once last time to complete the build.

View File

@ -1,5 +1,5 @@
/* SPDX-License-Identifier: GPL-3.0-or-later /* SPDX-License-Identifier: GPL-3.0-or-later
* Copyright © 2016-2023 The TokTok team. * Copyright © 2016-2018 The TokTok team.
* Copyright © 2014-2016 Tox project. * Copyright © 2014-2016 Tox project.
*/ */
@ -39,28 +39,22 @@ static void parse_tcp_relay_ports_config(config_t *cfg, uint16_t **tcp_relay_por
log_write(LOG_LEVEL_WARNING, "No '%s' setting in the configuration file.\n", NAME_TCP_RELAY_PORTS); log_write(LOG_LEVEL_WARNING, "No '%s' setting in the configuration file.\n", NAME_TCP_RELAY_PORTS);
log_write(LOG_LEVEL_WARNING, "Using default '%s':\n", NAME_TCP_RELAY_PORTS); log_write(LOG_LEVEL_WARNING, "Using default '%s':\n", NAME_TCP_RELAY_PORTS);
uint16_t default_ports[] = {DEFAULT_TCP_RELAY_PORTS}; uint16_t default_ports[DEFAULT_TCP_RELAY_PORTS_COUNT] = {DEFAULT_TCP_RELAY_PORTS};
// Check to avoid calling malloc(0) later on for (int i = 0; i < DEFAULT_TCP_RELAY_PORTS_COUNT; ++i) {
// NOLINTNEXTLINE, clang-tidy: error: suspicious comparison of 'sizeof(expr)' to a constant [bugprone-sizeof-expression,-warnings-as-errors] log_write(LOG_LEVEL_INFO, "Port #%d: %u\n", i, default_ports[i]);
static_assert(sizeof(default_ports) > 0, "At least one default TCP relay port should be provided");
const size_t default_ports_count = sizeof(default_ports)/sizeof(*default_ports);
for (size_t i = 0; i < default_ports_count; ++i) {
log_write(LOG_LEVEL_INFO, "Port #%zu: %u\n", i, default_ports[i]);
} }
// similar procedure to the one of reading config file below // similar procedure to the one of reading config file below
*tcp_relay_ports = (uint16_t *)malloc(default_ports_count * sizeof(uint16_t)); *tcp_relay_ports = (uint16_t *)malloc(DEFAULT_TCP_RELAY_PORTS_COUNT * sizeof(uint16_t));
for (size_t i = 0; i < default_ports_count; ++i) { for (int i = 0; i < DEFAULT_TCP_RELAY_PORTS_COUNT; ++i) {
(*tcp_relay_ports)[*tcp_relay_port_count] = default_ports[i]; (*tcp_relay_ports)[*tcp_relay_port_count] = default_ports[i];
if ((*tcp_relay_ports)[*tcp_relay_port_count] < MIN_ALLOWED_PORT if ((*tcp_relay_ports)[*tcp_relay_port_count] < MIN_ALLOWED_PORT
|| (*tcp_relay_ports)[*tcp_relay_port_count] > MAX_ALLOWED_PORT) { || (*tcp_relay_ports)[*tcp_relay_port_count] > MAX_ALLOWED_PORT) {
log_write(LOG_LEVEL_WARNING, "Port #%zu: Invalid port: %u, should be in [%d, %d]. Skipping.\n", i, log_write(LOG_LEVEL_WARNING, "Port #%d: Invalid port: %u, should be in [%d, %d]. Skipping.\n", i,
(*tcp_relay_ports)[*tcp_relay_port_count], MIN_ALLOWED_PORT, MAX_ALLOWED_PORT); (*tcp_relay_ports)[*tcp_relay_port_count], MIN_ALLOWED_PORT, MAX_ALLOWED_PORT);
continue; continue;
} }

View File

@ -1,5 +1,5 @@
/* SPDX-License-Identifier: GPL-3.0-or-later /* SPDX-License-Identifier: GPL-3.0-or-later
* Copyright © 2016-2023 The TokTok team. * Copyright © 2016-2018 The TokTok team.
* Copyright © 2014-2016 Tox project. * Copyright © 2014-2016 Tox project.
*/ */
@ -19,7 +19,8 @@
#define DEFAULT_ENABLE_IPV4_FALLBACK 1 // 1 - true, 0 - false #define DEFAULT_ENABLE_IPV4_FALLBACK 1 // 1 - true, 0 - false
#define DEFAULT_ENABLE_LAN_DISCOVERY 1 // 1 - true, 0 - false #define DEFAULT_ENABLE_LAN_DISCOVERY 1 // 1 - true, 0 - false
#define DEFAULT_ENABLE_TCP_RELAY 1 // 1 - true, 0 - false #define DEFAULT_ENABLE_TCP_RELAY 1 // 1 - true, 0 - false
#define DEFAULT_TCP_RELAY_PORTS 443, 3389, 33445 // comma-separated list of ports #define DEFAULT_TCP_RELAY_PORTS 443, 3389, 33445 // comma-separated list of ports. make sure to adjust DEFAULT_TCP_RELAY_PORTS_COUNT accordingly
#define DEFAULT_TCP_RELAY_PORTS_COUNT 3
#define DEFAULT_ENABLE_MOTD 1 // 1 - true, 0 - false #define DEFAULT_ENABLE_MOTD 1 // 1 - true, 0 - false
#define DEFAULT_MOTD DAEMON_NAME #define DEFAULT_MOTD DAEMON_NAME

View File

@ -375,7 +375,6 @@ int main(int argc, char *argv[])
if (!onion) { if (!onion) {
log_write(LOG_LEVEL_ERROR, "Couldn't initialize Tox Onion. Exiting.\n"); log_write(LOG_LEVEL_ERROR, "Couldn't initialize Tox Onion. Exiting.\n");
kill_gca(group_announce);
kill_announcements(announce); kill_announcements(announce);
kill_forwarding(forwarding); kill_forwarding(forwarding);
kill_dht(dht); kill_dht(dht);

View File

@ -1,5 +1,7 @@
load("@io_bazel_rules_go//go:def.bzl", "go_binary", "go_library") load("@io_bazel_rules_go//go:def.bzl", "go_binary", "go_library")
package(features = ["-layering_check"])
go_library( go_library(
name = "go_default_library", name = "go_default_library",
srcs = ["websockify.go"], srcs = ["websockify.go"],

View File

@ -1,6 +0,0 @@
FROM toxchat/alpine-s390x:latest
WORKDIR /work/c-toxcore
COPY . /work/c-toxcore/
RUN [".github/scripts/cmake-alpine-s390x"]

View File

@ -1,5 +0,0 @@
#!/bin/sh
set -eux
BUILD=alpine-s390x
docker build -t "toxchat/c-toxcore:$BUILD" -f "other/docker/$BUILD/Dockerfile" .

View File

@ -1,5 +1,3 @@
#!/bin/sh #!/bin/sh
set -eux docker build -t toxchat/c-toxcore:autotools -f other/docker/autotools/Dockerfile .
BUILD=autotools
docker build -t "toxchat/c-toxcore:$BUILD" -f "other/docker/$BUILD/Dockerfile" .

View File

@ -5,4 +5,4 @@ if [ "$1" = "-u" ]; then
docker pull toxchat/haskell:hs-cimple docker pull toxchat/haskell:hs-cimple
docker build -t toxchat/cimplefmt -f other/docker/cimplefmt/Dockerfile . docker build -t toxchat/cimplefmt -f other/docker/cimplefmt/Dockerfile .
fi fi
docker run --name toxcore-cimplefmt --rm -v "$PWD:/work" toxchat/cimplefmt "$@" docker run --rm -v "$PWD:/work" toxchat/cimplefmt "$@"

View File

@ -3,4 +3,4 @@
SANITIZER="${1:-asan}" SANITIZER="${1:-asan}"
docker build -t toxchat/c-toxcore:circleci other/docker/circleci docker build -t toxchat/c-toxcore:circleci other/docker/circleci
docker run --name toxcore-circleci --rm -it -v "$PWD:/c-toxcore" toxchat/c-toxcore:circleci "$SANITIZER" docker run --rm -it -v "$PWD:/c-toxcore" toxchat/c-toxcore:circleci "$SANITIZER"

View File

@ -1,30 +0,0 @@
FROM toxchat/compcert:latest
WORKDIR /work
COPY auto_tests/ /work/auto_tests/
COPY testing/ /work/testing/
COPY toxav/ /work/toxav/
COPY toxcore/ /work/toxcore/
COPY toxencryptsave/ /work/toxencryptsave/
COPY third_party/ /work/third_party/
SHELL ["/bin/bash", "-o", "pipefail", "-c"]
RUN ccomp \
-o send_message_test \
-Wall -Werror \
-Wno-c11-extensions \
-Wno-unknown-pragmas \
-Wno-unused-variable \
-fstruct-passing -fno-unprototyped -g \
auto_tests/auto_test_support.c \
auto_tests/send_message_test.c \
testing/misc_tools.c \
toxav/*.c \
toxcore/*.c \
toxcore/*/*.c \
toxencryptsave/*.c \
third_party/cmp/*.c \
-D__COMPCERT__ -DDISABLE_VLA -Dinline= \
-lpthread $(pkg-config --cflags --libs libsodium opus vpx) \
&& ./send_message_test | grep 'tox clients connected'

View File

@ -1,5 +0,0 @@
#!/bin/sh
set -eux
BUILD=compcert
docker build -t "toxchat/c-toxcore:$BUILD" -f "other/docker/$BUILD/Dockerfile" .

View File

@ -4,4 +4,4 @@ set -eux
docker build -t toxchat/c-toxcore:sources -f other/docker/sources/Dockerfile . docker build -t toxchat/c-toxcore:sources -f other/docker/sources/Dockerfile .
docker build -t toxchat/c-toxcore:coverage other/docker/coverage docker build -t toxchat/c-toxcore:coverage other/docker/coverage
docker run --name toxcore-coverage --rm -it -p "28192:80" toxchat/c-toxcore:coverage docker run --rm -it -p "28192:80" toxchat/c-toxcore:coverage

View File

@ -3,4 +3,4 @@
set -eux set -eux
docker build -t toxchat/c-toxcore:docs -f other/docker/doxygen/Dockerfile . docker build -t toxchat/c-toxcore:docs -f other/docker/doxygen/Dockerfile .
docker run --name toxcore-docs --rm -it -p "28192:80" toxchat/c-toxcore:docs docker run --rm -it -p "28192:80" toxchat/c-toxcore:docs

View File

@ -1,6 +0,0 @@
FROM toxchat/freebsd:latest
WORKDIR /work/c-toxcore
COPY . /work/c-toxcore/
RUN [".github/scripts/cmake-freebsd"]

View File

@ -1,5 +0,0 @@
#!/bin/sh
set -eux
BUILD=freebsd
docker build -t "toxchat/c-toxcore:$BUILD" -f "other/docker/$BUILD/Dockerfile" .

View File

@ -1,5 +1,3 @@
#!/bin/sh #!/bin/sh
set -eux docker build -f other/docker/misra/Dockerfile .
BUILD=misra
docker build -t "toxchat/c-toxcore:$BUILD" -f "other/docker/$BUILD/Dockerfile" .

View File

@ -3,7 +3,7 @@
set -eux set -eux
docker build -t toxchat/c-toxcore:perf -f other/docker/perf/Dockerfile . docker build -t toxchat/c-toxcore:perf -f other/docker/perf/Dockerfile .
docker run --name toxcore-perf --privileged --rm -it \ docker run --privileged --rm -it \
-v "$PWD:/work/c-toxcore" \ -v "$PWD:/work/c-toxcore" \
toxchat/c-toxcore:perf \ toxchat/c-toxcore:perf \
"$@" "$@"

View File

@ -1,4 +1,4 @@
FROM ubuntu:22.04 FROM ubuntu:20.04
RUN apt-get update && \ RUN apt-get update && \
DEBIAN_FRONTEND="noninteractive" apt-get install -y --no-install-recommends \ DEBIAN_FRONTEND="noninteractive" apt-get install -y --no-install-recommends \
@ -17,9 +17,6 @@ COPY testing/ /work/testing/
COPY toxav/ /work/toxav/ COPY toxav/ /work/toxav/
COPY toxcore/ /work/toxcore/ COPY toxcore/ /work/toxcore/
COPY toxencryptsave/ /work/toxencryptsave/ COPY toxencryptsave/ /work/toxencryptsave/
COPY third_party/ /work/third_party/
SHELL ["/bin/bash", "-o", "pipefail", "-c"]
RUN tcc \ RUN tcc \
-Dinline=static \ -Dinline=static \
@ -34,9 +31,9 @@ RUN tcc \
toxcore/*/*.c \ toxcore/*/*.c \
toxencryptsave/*.c \ toxencryptsave/*.c \
third_party/cmp/*.c \ third_party/cmp/*.c \
$(pkg-config --cflags --libs libsodium opus vpx) \ $(pkg-config --cflags --libs libsodium opus vpx)
&& ./send_message_test | grep 'tox clients connected'
SHELL ["/bin/bash", "-o", "pipefail", "-c"]
COPY other/make_single_file /work/other/ COPY other/make_single_file /work/other/
RUN \ RUN \
other/make_single_file \ other/make_single_file \
@ -47,5 +44,4 @@ RUN \
-o send_message_test \ -o send_message_test \
-Wall -Werror \ -Wall -Werror \
-bench -g \ -bench -g \
$(pkg-config --cflags --libs libsodium opus vpx) \ $(pkg-config --cflags --libs libsodium opus vpx)
&& ./send_message_test | grep 'tox clients connected'

View File

@ -1,5 +1,5 @@
#!/bin/sh #!/bin/sh
set -eux set -eux
BUILD=tcc
docker build -t "toxchat/c-toxcore:$BUILD" -f "other/docker/$BUILD/Dockerfile" . docker build -t toxchat/c-toxcore:tcc -f other/docker/tcc/Dockerfile .

View File

@ -1,5 +1,3 @@
#!/bin/sh #!/bin/sh
set -eux docker build -f other/docker/tokstyle/Dockerfile .
BUILD=tokstyle
docker build -t "toxchat/c-toxcore:$BUILD" -f "other/docker/$BUILD/Dockerfile" .

View File

@ -1,5 +1,7 @@
load("@rules_cc//cc:defs.bzl", "cc_binary") load("@rules_cc//cc:defs.bzl", "cc_binary")
package(features = ["layering_check"])
#cc_binary( #cc_binary(
# name = "cracker", # name = "cracker",
# testonly = 1, # testonly = 1,

View File

@ -73,15 +73,10 @@ static void print_information(Tox *tox)
int length = snprintf(nospam_str, sizeof(nospam_str), "%08X", nospam); int length = snprintf(nospam_str, sizeof(nospam_str), "%08X", nospam);
nospam_str[length] = '\0'; nospam_str[length] = '\0';
size_t name_size = tox_self_get_name_size(tox); uint8_t *name = (uint8_t *)malloc(tox_self_get_name_size(tox) + 1);
uint8_t *name = (uint8_t *)malloc(name_size + 1); assert(name != nullptr);
if (!name) {
return;
}
tox_self_get_name(tox, name); tox_self_get_name(tox, name);
name[name_size] = '\0'; name[tox_self_get_name_size(tox)] = '\0';
printf("INFORMATION\n"); printf("INFORMATION\n");
printf("----------------------------------\n"); printf("----------------------------------\n");
@ -91,8 +86,6 @@ static void print_information(Tox *tox)
printf("Status message: %s.\n", GENERATED_STATUS_MESSAGE); printf("Status message: %s.\n", GENERATED_STATUS_MESSAGE);
printf("Number of friends: %zu.\n", tox_self_get_friend_list_size(tox)); printf("Number of friends: %zu.\n", tox_self_get_friend_list_size(tox));
printf("----------------------------------\n"); printf("----------------------------------\n");
free(name);
} }
int main(int argc, char *argv[]) int main(int argc, char *argv[])

View File

@ -1,5 +1,7 @@
load("@io_bazel_rules_go//go:def.bzl", "go_binary", "go_library") load("@io_bazel_rules_go//go:def.bzl", "go_binary", "go_library")
package(features = ["layering_check"])
go_library( go_library(
name = "go_default_library", name = "go_default_library",
srcs = ["proxy_server.go"], srcs = ["proxy_server.go"],

View File

@ -1,5 +1,7 @@
load("@rules_cc//cc:defs.bzl", "cc_binary") load("@rules_cc//cc:defs.bzl", "cc_binary")
package(features = ["layering_check"])
cc_binary( cc_binary(
name = "grencez_tok5", name = "grencez_tok5",
srcs = ["grencez_tok5.c"], srcs = ["grencez_tok5.c"],

View File

@ -1,5 +1,7 @@
load("@rules_cc//cc:defs.bzl", "cc_binary", "cc_library") load("@rules_cc//cc:defs.bzl", "cc_binary", "cc_library")
package(features = ["layering_check"])
CIMPLE_FILES = [ CIMPLE_FILES = [
"//c-toxcore/toxav:cimple_files", "//c-toxcore/toxav:cimple_files",
"//c-toxcore/toxcore:cimple_files", "//c-toxcore/toxcore:cimple_files",

View File

@ -2,6 +2,8 @@ load("@rules_cc//cc:defs.bzl", "cc_binary", "cc_library")
load("@rules_fuzzing//fuzzing:cc_defs.bzl", "cc_fuzz_test") load("@rules_fuzzing//fuzzing:cc_defs.bzl", "cc_fuzz_test")
load("@rules_fuzzing//fuzzing/private:binary.bzl", "fuzzing_binary") # buildifier: disable=bzl-visibility load("@rules_fuzzing//fuzzing/private:binary.bzl", "fuzzing_binary") # buildifier: disable=bzl-visibility
package(features = ["layering_check"])
cc_library( cc_library(
name = "fuzz_support", name = "fuzz_support",
srcs = [ srcs = [

View File

@ -1,5 +1,7 @@
load("//tools:no_undefined.bzl", "cc_library") load("//tools:no_undefined.bzl", "cc_library")
package(features = ["layering_check"])
cc_library( cc_library(
name = "cmp", name = "cmp",
srcs = ["cmp/cmp.c"], srcs = ["cmp/cmp.c"],

View File

@ -1,6 +1,8 @@
load("@rules_cc//cc:defs.bzl", "cc_test") load("@rules_cc//cc:defs.bzl", "cc_test")
load("//tools:no_undefined.bzl", "cc_library") load("//tools:no_undefined.bzl", "cc_library")
package(features = ["layering_check"])
exports_files( exports_files(
srcs = ["toxav.h"], srcs = ["toxav.h"],
visibility = ["//c-toxcore:__pkg__"], visibility = ["//c-toxcore:__pkg__"],

View File

@ -2,11 +2,10 @@ load("@rules_cc//cc:defs.bzl", "cc_test")
load("@rules_fuzzing//fuzzing:cc_defs.bzl", "cc_fuzz_test") load("@rules_fuzzing//fuzzing:cc_defs.bzl", "cc_fuzz_test")
load("//tools:no_undefined.bzl", "cc_library") load("//tools:no_undefined.bzl", "cc_library")
package(features = ["layering_check"])
exports_files( exports_files(
srcs = [ srcs = ["tox.h"],
"tox.h",
"tox_private.h",
],
visibility = ["//c-toxcore:__pkg__"], visibility = ["//c-toxcore:__pkg__"],
) )
@ -77,22 +76,6 @@ cc_test(
], ],
) )
cc_library(
name = "logger",
srcs = ["logger.c"],
hdrs = ["logger.h"],
visibility = [
"//c-toxcore/auto_tests:__pkg__",
"//c-toxcore/other:__pkg__",
"//c-toxcore/other/bootstrap_daemon:__pkg__",
"//c-toxcore/toxav:__pkg__",
],
deps = [
":attributes",
":ccompat",
],
)
cc_library( cc_library(
name = "bin_pack", name = "bin_pack",
srcs = ["bin_pack.c"], srcs = ["bin_pack.c"],
@ -101,7 +84,6 @@ cc_library(
deps = [ deps = [
":attributes", ":attributes",
":ccompat", ":ccompat",
":logger",
"//c-toxcore/third_party:cmp", "//c-toxcore/third_party:cmp",
], ],
) )
@ -176,6 +158,22 @@ cc_test(
], ],
) )
cc_library(
name = "logger",
srcs = ["logger.c"],
hdrs = ["logger.h"],
visibility = [
"//c-toxcore/auto_tests:__pkg__",
"//c-toxcore/other:__pkg__",
"//c-toxcore/other/bootstrap_daemon:__pkg__",
"//c-toxcore/toxav:__pkg__",
],
deps = [
":attributes",
":ccompat",
],
)
cc_library( cc_library(
name = "state", name = "state",
srcs = ["state.c"], srcs = ["state.c"],
@ -341,7 +339,6 @@ cc_library(
deps = [ deps = [
":LAN_discovery", ":LAN_discovery",
":attributes", ":attributes",
":bin_pack",
":ccompat", ":ccompat",
":crypto_core", ":crypto_core",
":logger", ":logger",
@ -369,7 +366,6 @@ cc_test(
cc_fuzz_test( cc_fuzz_test(
name = "DHT_fuzz_test", name = "DHT_fuzz_test",
size = "small",
srcs = ["DHT_fuzz_test.cc"], srcs = ["DHT_fuzz_test.cc"],
corpus = ["//tools/toktok-fuzzer/corpus:DHT_fuzz_test"], corpus = ["//tools/toktok-fuzzer/corpus:DHT_fuzz_test"],
deps = [ deps = [
@ -409,7 +405,6 @@ cc_library(
cc_fuzz_test( cc_fuzz_test(
name = "forwarding_fuzz_test", name = "forwarding_fuzz_test",
size = "small",
srcs = ["forwarding_fuzz_test.cc"], srcs = ["forwarding_fuzz_test.cc"],
#corpus = ["//tools/toktok-fuzzer/corpus:forwarding_fuzz_test"], #corpus = ["//tools/toktok-fuzzer/corpus:forwarding_fuzz_test"],
deps = [ deps = [
@ -608,7 +603,6 @@ cc_library(
cc_fuzz_test( cc_fuzz_test(
name = "group_announce_fuzz_test", name = "group_announce_fuzz_test",
size = "small",
srcs = ["group_announce_fuzz_test.cc"], srcs = ["group_announce_fuzz_test.cc"],
#corpus = ["//tools/toktok-fuzzer/corpus:group_announce_fuzz_test"], #corpus = ["//tools/toktok-fuzzer/corpus:group_announce_fuzz_test"],
deps = [ deps = [
@ -712,7 +706,6 @@ cc_test(
cc_fuzz_test( cc_fuzz_test(
name = "group_moderation_fuzz_test", name = "group_moderation_fuzz_test",
size = "small",
srcs = ["group_moderation_fuzz_test.cc"], srcs = ["group_moderation_fuzz_test.cc"],
corpus = ["//tools/toktok-fuzzer/corpus:group_moderation_fuzz_test"], corpus = ["//tools/toktok-fuzzer/corpus:group_moderation_fuzz_test"],
deps = [ deps = [
@ -869,7 +862,6 @@ cc_test(
cc_fuzz_test( cc_fuzz_test(
name = "tox_events_fuzz_test", name = "tox_events_fuzz_test",
size = "small",
srcs = ["tox_events_fuzz_test.cc"], srcs = ["tox_events_fuzz_test.cc"],
corpus = ["//tools/toktok-fuzzer/corpus:tox_events_fuzz_test"], corpus = ["//tools/toktok-fuzzer/corpus:tox_events_fuzz_test"],
deps = [ deps = [

View File

@ -9,12 +9,10 @@
#include "DHT.h" #include "DHT.h"
#include <assert.h> #include <assert.h>
#include <limits.h>
#include <stdlib.h> #include <stdlib.h>
#include <string.h> #include <string.h>
#include "LAN_discovery.h" #include "LAN_discovery.h"
#include "bin_pack.h"
#include "ccompat.h" #include "ccompat.h"
#include "logger.h" #include "logger.h"
#include "mono_time.h" #include "mono_time.h"
@ -362,32 +360,12 @@ int packed_node_size(Family ip_family)
} }
/** @brief Packs an IP structure. int pack_ip_port(const Logger *logger, uint8_t *data, uint16_t length, const IP_Port *ip_port)
*
* It's the caller's responsibility to make sure `is_ipv4` tells the truth. This
* function is an implementation detail of @ref bin_pack_ip_port.
*
* @param is_ipv4 whether this IP is an IP4 or IP6.
*
* @retval true on success.
*/
non_null()
static bool bin_pack_ip(Bin_Pack *bp, const IP *ip, bool is_ipv4)
{ {
if (is_ipv4) { if (data == nullptr) {
return bin_pack_bin_b(bp, ip->ip.v4.uint8, SIZE_IP4); return -1;
} else {
return bin_pack_bin_b(bp, ip->ip.v6.uint8, SIZE_IP6);
}
} }
/** @brief Packs an IP_Port structure.
*
* @retval true on success.
*/
non_null()
static bool bin_pack_ip_port(Bin_Pack *bp, const Logger *logger, const IP_Port *ip_port)
{
bool is_ipv4; bool is_ipv4;
uint8_t family; uint8_t family;
@ -409,34 +387,32 @@ static bool bin_pack_ip_port(Bin_Pack *bp, const Logger *logger, const IP_Port *
// TODO(iphydf): Find out why we're trying to pack invalid IPs, stop // TODO(iphydf): Find out why we're trying to pack invalid IPs, stop
// doing that, and turn this into an error. // doing that, and turn this into an error.
LOGGER_TRACE(logger, "cannot pack invalid IP: %s", net_ip_ntoa(&ip_port->ip, &ip_str)); LOGGER_TRACE(logger, "cannot pack invalid IP: %s", net_ip_ntoa(&ip_port->ip, &ip_str));
return false; return -1;
} }
return bin_pack_u08_b(bp, family) if (is_ipv4) {
&& bin_pack_ip(bp, &ip_port->ip, is_ipv4) const uint32_t size = 1 + SIZE_IP4 + sizeof(uint16_t);
&& bin_pack_u16_b(bp, net_ntohs(ip_port->port));
}
non_null()
static bool bin_pack_ip_port_handler(Bin_Pack *bp, const Logger *logger, const void *obj)
{
return bin_pack_ip_port(bp, logger, (const IP_Port *)obj);
}
int pack_ip_port(const Logger *logger, uint8_t *data, uint16_t length, const IP_Port *ip_port)
{
const uint32_t size = bin_pack_obj_size(bin_pack_ip_port_handler, logger, ip_port);
if (size > length) { if (size > length) {
return -1; return -1;
} }
if (!bin_pack_obj(bin_pack_ip_port_handler, logger, ip_port, data, length)) { data[0] = family;
memcpy(data + 1, &ip_port->ip.ip.v4, SIZE_IP4);
memcpy(data + 1 + SIZE_IP4, &ip_port->port, sizeof(uint16_t));
return size;
} else {
const uint32_t size = 1 + SIZE_IP6 + sizeof(uint16_t);
if (size > length) {
return -1; return -1;
} }
assert(size < INT_MAX); data[0] = family;
return (int)size; memcpy(data + 1, &ip_port->ip.ip.v6, SIZE_IP6);
memcpy(data + 1 + SIZE_IP6, &ip_port->port, sizeof(uint16_t));
return size;
}
} }
int dht_create_packet(const Memory *mem, const Random *rng, int dht_create_packet(const Memory *mem, const Random *rng,
@ -535,25 +511,33 @@ int unpack_ip_port(IP_Port *ip_port, const uint8_t *data, uint16_t length, bool
} }
} }
/** @brief Pack a single node from a node array.
*
* @retval true on success.
*/
non_null()
static bool bin_pack_node_handler(Bin_Pack *bp, const Logger *logger, const void *arr, uint32_t index)
{
const Node_format *nodes = (const Node_format *)arr;
return bin_pack_ip_port(bp, logger, &nodes[index].ip_port)
&& bin_pack_bin_b(bp, nodes[index].public_key, CRYPTO_PUBLIC_KEY_SIZE);
}
int pack_nodes(const Logger *logger, uint8_t *data, uint16_t length, const Node_format *nodes, uint16_t number) int pack_nodes(const Logger *logger, uint8_t *data, uint16_t length, const Node_format *nodes, uint16_t number)
{ {
const uint32_t size = bin_pack_obj_array_size(bin_pack_node_handler, logger, nodes, number); uint32_t packed_length = 0;
if (!bin_pack_obj_array(bin_pack_node_handler, logger, nodes, number, data, length)) {
for (uint32_t i = 0; i < number && packed_length < length; ++i) {
const int ipp_size = pack_ip_port(logger, data + packed_length, length - packed_length, &nodes[i].ip_port);
if (ipp_size == -1) {
return -1; return -1;
} }
return size;
packed_length += ipp_size;
if (packed_length + CRYPTO_PUBLIC_KEY_SIZE > length) {
return -1;
}
memcpy(data + packed_length, nodes[i].public_key, CRYPTO_PUBLIC_KEY_SIZE);
packed_length += CRYPTO_PUBLIC_KEY_SIZE;
#ifndef NDEBUG
const uint32_t increment = ipp_size + CRYPTO_PUBLIC_KEY_SIZE;
assert(increment == PACKED_NODE_SIZE_IP4 || increment == PACKED_NODE_SIZE_IP6);
#endif
}
return packed_length;
} }
int unpack_nodes(Node_format *nodes, uint16_t max_num_nodes, uint16_t *processed_data_len, const uint8_t *data, int unpack_nodes(Node_format *nodes, uint16_t max_num_nodes, uint16_t *processed_data_len, const uint8_t *data,
@ -2845,9 +2829,8 @@ void dht_save(const DHT *dht, uint8_t *data)
} }
} }
state_write_section_header( state_write_section_header(old_data, DHT_STATE_COOKIE_TYPE, pack_nodes(dht->log, data, sizeof(Node_format) * num,
old_data, DHT_STATE_COOKIE_TYPE, pack_nodes(dht->log, data, sizeof(Node_format) * num, clients, num), clients, num), DHT_STATE_TYPE_NODES);
DHT_STATE_TYPE_NODES);
mem_delete(dht->mem, clients); mem_delete(dht->mem, clients);
} }

View File

@ -214,16 +214,6 @@ int packed_node_size(Family ip_family);
non_null() non_null()
int pack_ip_port(const Logger *logger, uint8_t *data, uint16_t length, const IP_Port *ip_port); int pack_ip_port(const Logger *logger, uint8_t *data, uint16_t length, const IP_Port *ip_port);
/** @brief Unpack IP_Port structure from data of max size length into ip_port.
*
* len_processed is the offset of data currently unpacked.
*
* @return size of unpacked ip_port on success.
* @retval -1 on failure.
*/
non_null()
int unpack_ip_port(IP_Port *ip_port, const uint8_t *data, uint16_t length, bool tcp_enabled);
/** @brief Encrypt plain and write resulting DHT packet into packet with max size length. /** @brief Encrypt plain and write resulting DHT packet into packet with max size length.
* *
* @return size of packet on success. * @return size of packet on success.
@ -236,6 +226,16 @@ int dht_create_packet(const Memory *mem, const Random *rng,
const uint8_t *plain, size_t plain_length, const uint8_t *plain, size_t plain_length,
uint8_t *packet, size_t length); uint8_t *packet, size_t length);
/** @brief Unpack IP_Port structure from data of max size length into ip_port.
*
* len_processed is the offset of data currently unpacked.
*
* @return size of unpacked ip_port on success.
* @retval -1 on failure.
*/
non_null()
int unpack_ip_port(IP_Port *ip_port, const uint8_t *data, uint16_t length, bool tcp_enabled);
/** @brief Pack number of nodes into data of maxlength length. /** @brief Pack number of nodes into data of maxlength length.
* *
* @return length of packed nodes on success. * @return length of packed nodes on success.

View File

@ -1,8 +1,6 @@
#include "DHT.h" #include "DHT.h"
#include <cassert>
#include <cstdlib> #include <cstdlib>
#include <cstring>
#include <vector> #include <vector>
#include "../testing/fuzzing/fuzz_support.h" #include "../testing/fuzzing/fuzz_support.h"
@ -38,16 +36,6 @@ void TestUnpackNodes(Fuzz_Data &input)
LOGGER_ASSERT(logger, packed_size == processed_data_len, LOGGER_ASSERT(logger, packed_size == processed_data_len,
"packed size (%d) != unpacked size (%d)", packed_size, processed_data_len); "packed size (%d) != unpacked size (%d)", packed_size, processed_data_len);
logger_kill(logger); logger_kill(logger);
// Check that packed nodes can be unpacked again and result in the
// original unpacked nodes.
Node_format nodes2[node_count];
uint16_t processed_data_len2;
const int packed_count2 = unpack_nodes(
nodes2, node_count, &processed_data_len2, packed.data(), packed.size(), tcp_enabled);
assert(processed_data_len2 == processed_data_len);
assert(packed_count2 == packed_count);
assert(memcmp(nodes, nodes2, sizeof(Node_format) * packed_count) == 0);
} }
} }

View File

@ -1,8 +1,7 @@
lib_LTLIBRARIES += libtoxcore.la lib_LTLIBRARIES += libtoxcore.la
libtoxcore_la_include_HEADERS = \ libtoxcore_la_include_HEADERS = \
../toxcore/tox.h \ ../toxcore/tox.h
../toxcore/tox_private.h
libtoxcore_la_includedir = $(includedir)/tox libtoxcore_la_includedir = $(includedir)/tox

View File

@ -757,20 +757,6 @@ int m_set_statusmessage(Messenger *m, const uint8_t *status, uint16_t length)
return 0; return 0;
} }
static Userstatus userstatus_from_int(uint8_t status)
{
switch (status) {
case 0:
return USERSTATUS_NONE;
case 1:
return USERSTATUS_AWAY;
case 2:
return USERSTATUS_BUSY;
default:
return USERSTATUS_INVALID;
}
}
int m_set_userstatus(Messenger *m, uint8_t status) int m_set_userstatus(Messenger *m, uint8_t status)
{ {
if (status >= USERSTATUS_INVALID) { if (status >= USERSTATUS_INVALID) {
@ -781,7 +767,7 @@ int m_set_userstatus(Messenger *m, uint8_t status)
return 0; return 0;
} }
m->userstatus = userstatus_from_int(status); m->userstatus = (Userstatus)status;
for (uint32_t i = 0; i < m->numfriends; ++i) { for (uint32_t i = 0; i < m->numfriends; ++i) {
m->friendlist[i].userstatus_sent = false; m->friendlist[i].userstatus_sent = false;
@ -937,7 +923,7 @@ static int set_friend_statusmessage(const Messenger *m, int32_t friendnumber, co
non_null() non_null()
static void set_friend_userstatus(const Messenger *m, int32_t friendnumber, uint8_t status) static void set_friend_userstatus(const Messenger *m, int32_t friendnumber, uint8_t status)
{ {
m->friendlist[friendnumber].userstatus = userstatus_from_int(status); m->friendlist[friendnumber].userstatus = (Userstatus)status;
} }
non_null() non_null()
@ -2095,9 +2081,9 @@ static int m_handle_packet_userstatus(Messenger *m, const int i, const uint8_t *
return 0; return 0;
} }
const Userstatus status = userstatus_from_int(data[0]); const Userstatus status = (Userstatus)data[0];
if (status == USERSTATUS_INVALID) { if (status >= USERSTATUS_INVALID) {
return 0; return 0;
} }
@ -2641,7 +2627,7 @@ void do_messenger(Messenger *m, void *userdata)
if (m->tcp_server != nullptr) { if (m->tcp_server != nullptr) {
/* Add self tcp server. */ /* Add self tcp server. */
IP_Port local_ip_port; IP_Port local_ip_port;
local_ip_port.port = net_htons(m->options.tcp_server_port); local_ip_port.port = m->options.tcp_server_port;
local_ip_port.ip.family = net_family_ipv4(); local_ip_port.ip.family = net_family_ipv4();
local_ip_port.ip.ip.v4 = get_ip4_loopback(); local_ip_port.ip.ip.v4 = get_ip4_loopback();
add_tcp_relay(m->net_crypto, &local_ip_port, tcp_server_public_key(m->tcp_server)); add_tcp_relay(m->net_crypto, &local_ip_port, tcp_server_public_key(m->tcp_server));
@ -3167,7 +3153,7 @@ static void pack_groupchats(const GC_Session *c, Bin_Pack *bp)
} }
non_null() non_null()
static bool pack_groupchats_handler(Bin_Pack *bp, const Logger *log, const void *obj) static bool pack_groupchats_handler(Bin_Pack *bp, const void *obj)
{ {
pack_groupchats((const GC_Session *)obj, bp); pack_groupchats((const GC_Session *)obj, bp);
return true; // TODO(iphydf): Return bool from pack functions. return true; // TODO(iphydf): Return bool from pack functions.
@ -3177,7 +3163,7 @@ non_null()
static uint32_t saved_groups_size(const Messenger *m) static uint32_t saved_groups_size(const Messenger *m)
{ {
GC_Session *c = m->group_handler; GC_Session *c = m->group_handler;
return bin_pack_obj_size(pack_groupchats_handler, m->log, c); return bin_pack_obj_size(pack_groupchats_handler, c);
} }
non_null() non_null()
@ -3199,7 +3185,7 @@ static uint8_t *groups_save(const Messenger *m, uint8_t *data)
data = state_write_section_header(data, STATE_COOKIE_TYPE, len, STATE_TYPE_GROUPS); data = state_write_section_header(data, STATE_COOKIE_TYPE, len, STATE_TYPE_GROUPS);
if (!bin_pack_obj(pack_groupchats_handler, m->log, c, data, len)) { if (!bin_pack_obj(pack_groupchats_handler, c, data, len)) {
LOGGER_FATAL(m->log, "failed to pack group chats into buffer of length %u", len); LOGGER_FATAL(m->log, "failed to pack group chats into buffer of length %u", len);
return data; return data;
} }
@ -3636,9 +3622,7 @@ Messenger *new_messenger(Mono_Time *mono_time, const Memory *mem, const Random *
m->onion = new_onion(m->log, m->mem, m->mono_time, m->rng, m->dht); m->onion = new_onion(m->log, m->mem, m->mono_time, m->rng, m->dht);
m->onion_a = new_onion_announce(m->log, m->mem, m->rng, m->mono_time, m->dht); m->onion_a = new_onion_announce(m->log, m->mem, m->rng, m->mono_time, m->dht);
m->onion_c = new_onion_client(m->log, m->mem, m->rng, m->mono_time, m->net_crypto); m->onion_c = new_onion_client(m->log, m->mem, m->rng, m->mono_time, m->net_crypto);
if (m->onion_c != nullptr) {
m->fr_c = new_friend_connections(m->log, m->mono_time, m->ns, m->onion_c, options->local_discovery_enabled); m->fr_c = new_friend_connections(m->log, m->mono_time, m->ns, m->onion_c, options->local_discovery_enabled);
}
if ((options->dht_announcements_enabled && (m->forwarding == nullptr || m->announce == nullptr)) || if ((options->dht_announcements_enabled && (m->forwarding == nullptr || m->announce == nullptr)) ||
m->onion == nullptr || m->onion_a == nullptr || m->onion_c == nullptr || m->fr_c == nullptr) { m->onion == nullptr || m->onion_a == nullptr || m->onion_c == nullptr || m->fr_c == nullptr) {

View File

@ -18,7 +18,7 @@
#define GNU_PRINTF(f, a) #define GNU_PRINTF(f, a)
#endif #endif
#if defined(__GNUC__) && defined(_DEBUG) #if defined(__GNUC__) && defined(_DEBUG) && !defined(__OPTIMIZE__)
#define non_null(...) __attribute__((__nonnull__(__VA_ARGS__))) #define non_null(...) __attribute__((__nonnull__(__VA_ARGS__)))
#else #else
#define non_null(...) #define non_null(...)

View File

@ -62,47 +62,21 @@ static void bin_pack_init(Bin_Pack *bp, uint8_t *buf, uint32_t buf_size)
cmp_init(&bp->ctx, bp, null_reader, null_skipper, buf_writer); cmp_init(&bp->ctx, bp, null_reader, null_skipper, buf_writer);
} }
uint32_t bin_pack_obj_size(bin_pack_cb *callback, const Logger *logger, const void *obj) bool bin_pack_obj(bin_pack_cb *callback, const void *obj, uint8_t *buf, uint32_t buf_size)
{
Bin_Pack bp;
bin_pack_init(&bp, nullptr, 0);
if (!callback(&bp, logger, obj)) {
return UINT32_MAX;
}
return bp.bytes_pos;
}
bool bin_pack_obj(bin_pack_cb *callback, const Logger *logger, const void *obj, uint8_t *buf, uint32_t buf_size)
{ {
Bin_Pack bp; Bin_Pack bp;
bin_pack_init(&bp, buf, buf_size); bin_pack_init(&bp, buf, buf_size);
return callback(&bp, logger, obj); return callback(&bp, obj);
} }
uint32_t bin_pack_obj_array_size(bin_pack_array_cb *callback, const Logger *logger, const void *arr, uint32_t count) uint32_t bin_pack_obj_size(bin_pack_cb *callback, const void *obj)
{ {
Bin_Pack bp; Bin_Pack bp;
bin_pack_init(&bp, nullptr, 0); bin_pack_init(&bp, nullptr, 0);
for (uint32_t i = 0; i < count; ++i) { callback(&bp, obj);
if (!callback(&bp, logger, arr, i)) {
return UINT32_MAX;
}
}
return bp.bytes_pos; return bp.bytes_pos;
} }
bool bin_pack_obj_array(bin_pack_array_cb *callback, const Logger *logger, const void *arr, uint32_t count, uint8_t *buf, uint32_t buf_size)
{
Bin_Pack bp;
bin_pack_init(&bp, buf, buf_size);
for (uint32_t i = 0; i < count; ++i) {
if (!callback(&bp, logger, arr, i)) {
return false;
}
}
return true;
}
Bin_Pack *bin_pack_new(uint8_t *buf, uint32_t buf_size) Bin_Pack *bin_pack_new(uint8_t *buf, uint32_t buf_size)
{ {
Bin_Pack *bp = (Bin_Pack *)calloc(1, sizeof(Bin_Pack)); Bin_Pack *bp = (Bin_Pack *)calloc(1, sizeof(Bin_Pack));

View File

@ -8,7 +8,6 @@
#include <stdint.h> #include <stdint.h>
#include "attributes.h" #include "attributes.h"
#include "logger.h"
#ifdef __cplusplus #ifdef __cplusplus
extern "C" { extern "C" {
@ -24,29 +23,18 @@ typedef struct Bin_Pack Bin_Pack;
* This function would typically cast the `void *` to the actual object pointer type and then call * This function would typically cast the `void *` to the actual object pointer type and then call
* more appropriately typed packing functions. * more appropriately typed packing functions.
*/ */
typedef bool bin_pack_cb(Bin_Pack *bp, const Logger *logger, const void *obj); typedef bool bin_pack_cb(Bin_Pack *bp, const void *obj);
/** @brief Function used to pack an array of objects.
*
* This function would typically cast the `void *` to the actual object pointer type and then call
* more appropriately typed packing functions.
*
* @param arr is the object array as void pointer.
* @param index is the index in the object array that is currently being packed.
*/
typedef bool bin_pack_array_cb(Bin_Pack *bp, const Logger *logger, const void *arr, uint32_t index);
/** @brief Determine the serialised size of an object. /** @brief Determine the serialised size of an object.
* *
* @param callback The function called on the created packer and packed object. * @param callback The function called on the created packer and packed object.
* @param logger Optional logger object to pass to the callback.
* @param obj The object to be packed, passed as `obj` to the callback. * @param obj The object to be packed, passed as `obj` to the callback.
* *
* @return The packed size of the passed object according to the callback. * @return The packed size of the passed object according to the callback. UINT32_MAX in case of
* @retval UINT32_MAX in case of errors such as buffer overflow. * errors such as buffer overflow.
*/ */
non_null(1) nullable(2, 3) non_null(1) nullable(2)
uint32_t bin_pack_obj_size(bin_pack_cb *callback, const Logger *logger, const void *obj); uint32_t bin_pack_obj_size(bin_pack_cb *callback, const void *obj);
/** @brief Pack an object into a buffer of a given size. /** @brief Pack an object into a buffer of a given size.
* *
@ -57,57 +45,14 @@ uint32_t bin_pack_obj_size(bin_pack_cb *callback, const Logger *logger, const vo
* overflows `uint32_t`, this function returns `false`. * overflows `uint32_t`, this function returns `false`.
* *
* @param callback The function called on the created packer and packed object. * @param callback The function called on the created packer and packed object.
* @param logger Optional logger object to pass to the callback.
* @param obj The object to be packed, passed as `obj` to the callback. * @param obj The object to be packed, passed as `obj` to the callback.
* @param buf A byte array large enough to hold the serialised representation of `obj`. * @param buf A byte array large enough to hold the serialised representation of `obj`.
* @param buf_size The size of the byte array. Can be `UINT32_MAX` to disable bounds checking. * @param buf_size The size of the byte array. Can be `UINT32_MAX` to disable bounds checking.
* *
* @retval false if an error occurred (e.g. buffer overflow). * @retval false if an error occurred (e.g. buffer overflow).
*/ */
non_null(1, 4) nullable(2, 3)
bool bin_pack_obj(bin_pack_cb *callback, const Logger *logger, const void *obj, uint8_t *buf, uint32_t buf_size);
/** @brief Determine the serialised size of an object array.
*
* Calls the callback `count` times with increasing `index` argument from 0 to
* `count`. This function is here just so we don't need to write the same
* trivial loop many times and so we don't need an extra struct just to contain
* an array with size so it can be passed to `bin_pack_obj_size`.
*
* @param callback The function called on the created packer and each object to
* be packed.
* @param logger Optional logger object to pass to the callback.
* @param arr The object array to be packed, passed as `arr` to the callback.
* @param count The number of elements in the object array.
*
* @return The packed size of the passed object array according to the callback.
* @retval UINT32_MAX in case of errors such as buffer overflow.
*/
non_null(1, 3) nullable(2) non_null(1, 3) nullable(2)
uint32_t bin_pack_obj_array_size(bin_pack_array_cb *callback, const Logger *logger, const void *arr, uint32_t count); bool bin_pack_obj(bin_pack_cb *callback, const void *obj, uint8_t *buf, uint32_t buf_size);
/** @brief Pack an object array into a buffer of a given size.
*
* Calls the callback `count` times with increasing `index` argument from 0 to
* `count`. This function is here just so we don't need to write the same
* trivial loop many times and so we don't need an extra struct just to contain
* an array with size so it can be passed to `bin_pack_obj`.
*
* Similar to `bin_pack_obj` but for arrays. Does not write the array length, so
* if you need that, write it manually using `bin_pack_array`.
*
* @param callback The function called on the created packer and packed object
* array.
* @param logger Optional logger object to pass to the callback.
* @param arr The object array to be packed, passed as `arr` to the callback.
* @param count The number of elements in the object array.
* @param buf A byte array large enough to hold the serialised representation of `arr`.
* @param buf_size The size of the byte array. Can be `UINT32_MAX` to disable bounds checking.
*
* @retval false if an error occurred (e.g. buffer overflow).
*/
non_null(1, 3, 5) nullable(2)
bool bin_pack_obj_array(bin_pack_array_cb *callback, const Logger *logger, const void *arr, uint32_t count, uint8_t *buf, uint32_t buf_size);
/** @brief Allocate a new packer object. /** @brief Allocate a new packer object.
* *

View File

@ -12,30 +12,11 @@ namespace {
using HmacKey = std::array<uint8_t, CRYPTO_HMAC_KEY_SIZE>; using HmacKey = std::array<uint8_t, CRYPTO_HMAC_KEY_SIZE>;
using Hmac = std::array<uint8_t, CRYPTO_HMAC_SIZE>; using Hmac = std::array<uint8_t, CRYPTO_HMAC_SIZE>;
using PublicKey = std::array<uint8_t, CRYPTO_PUBLIC_KEY_SIZE>;
using SecretKey = std::array<uint8_t, CRYPTO_SECRET_KEY_SIZE>;
using ExtPublicKey = std::array<uint8_t, EXT_PUBLIC_KEY_SIZE>; using ExtPublicKey = std::array<uint8_t, EXT_PUBLIC_KEY_SIZE>;
using ExtSecretKey = std::array<uint8_t, EXT_SECRET_KEY_SIZE>; using ExtSecretKey = std::array<uint8_t, EXT_SECRET_KEY_SIZE>;
using Signature = std::array<uint8_t, CRYPTO_SIGNATURE_SIZE>; using Signature = std::array<uint8_t, CRYPTO_SIGNATURE_SIZE>;
using Nonce = std::array<uint8_t, CRYPTO_NONCE_SIZE>; using Nonce = std::array<uint8_t, CRYPTO_NONCE_SIZE>;
TEST(CryptoCore, EncryptLargeData)
{
const Random *rng = system_random();
ASSERT_NE(rng, nullptr);
Nonce nonce{};
PublicKey pk;
SecretKey sk;
crypto_new_keypair(rng, pk.data(), sk.data());
// 100 MiB of data (all zeroes, doesn't matter what's inside).
std::vector<uint8_t> plain(100 * 1024 * 1024);
std::vector<uint8_t> encrypted(plain.size() + CRYPTO_MAC_SIZE);
encrypt_data(pk.data(), sk.data(), nonce.data(), plain.data(), plain.size(), encrypted.data());
}
TEST(CryptoCore, IncrementNonce) TEST(CryptoCore, IncrementNonce)
{ {
Nonce nonce{}; Nonce nonce{};
@ -79,8 +60,7 @@ TEST(CryptoCore, Signatures)
EXPECT_TRUE(create_extended_keypair(pk.data(), sk.data())); EXPECT_TRUE(create_extended_keypair(pk.data(), sk.data()));
std::vector<uint8_t> message{0}; std::vector<uint8_t> message;
message.clear();
// Try a few different sizes, including empty 0 length message. // Try a few different sizes, including empty 0 length message.
for (uint8_t i = 0; i < 100; ++i) { for (uint8_t i = 0; i < 100; ++i) {
@ -102,8 +82,7 @@ TEST(CryptoCore, Hmac)
HmacKey sk; HmacKey sk;
new_hmac_key(rng, sk.data()); new_hmac_key(rng, sk.data());
std::vector<uint8_t> message{0}; std::vector<uint8_t> message;
message.clear();
// Try a few different sizes, including empty 0 length message. // Try a few different sizes, including empty 0 length message.
for (uint8_t i = 0; i < 100; ++i) { for (uint8_t i = 0; i < 100; ++i) {

View File

@ -50,10 +50,8 @@ TEST_F(Announces, CanBeCreatedAndDeleted)
GC_Public_Announce ann{}; GC_Public_Announce ann{};
ann.chat_public_key[0] = 0x88; ann.chat_public_key[0] = 0x88;
ASSERT_NE(gca_add_announce(mono_time_, gca_, &ann), nullptr); ASSERT_NE(gca_add_announce(mono_time_, gca_, &ann), nullptr);
#ifndef _DEBUG
ASSERT_EQ(gca_add_announce(mono_time_, gca_, nullptr), nullptr); ASSERT_EQ(gca_add_announce(mono_time_, gca_, nullptr), nullptr);
ASSERT_EQ(gca_add_announce(mono_time_, nullptr, &ann), nullptr); ASSERT_EQ(gca_add_announce(mono_time_, nullptr, &ann), nullptr);
#endif
} }
TEST_F(Announces, AnnouncesCanTimeOut) TEST_F(Announces, AnnouncesCanTimeOut)
@ -105,9 +103,7 @@ TEST_F(Announces, AnnouncesGetAndCleanup)
cleanup_gca(gca_, ann2.chat_public_key); cleanup_gca(gca_, ann2.chat_public_key);
ASSERT_EQ(gca_get_announces(gca_, &announces, 1, ann2.chat_public_key, empty_pk), 0); ASSERT_EQ(gca_get_announces(gca_, &announces, 1, ann2.chat_public_key, empty_pk), 0);
#ifndef _DEBUG
ASSERT_EQ(gca_get_announces(gca_, nullptr, 1, ann2.chat_public_key, empty_pk), -1); ASSERT_EQ(gca_get_announces(gca_, nullptr, 1, ann2.chat_public_key, empty_pk), -1);
#endif
} }
struct AnnouncesPack : ::testing::Test { struct AnnouncesPack : ::testing::Test {
@ -166,23 +162,19 @@ TEST_F(AnnouncesPack, PublicAnnounceCanBePackedAndUnpacked)
TEST_F(AnnouncesPack, UnpackEmptyPublicAnnounce) TEST_F(AnnouncesPack, UnpackEmptyPublicAnnounce)
{ {
#ifndef _DEBUG
GC_Public_Announce ann{}; GC_Public_Announce ann{};
std::vector<uint8_t> packed(GCA_PUBLIC_ANNOUNCE_MAX_SIZE); std::vector<uint8_t> packed(GCA_PUBLIC_ANNOUNCE_MAX_SIZE);
EXPECT_EQ(gca_unpack_public_announce(logger_, nullptr, 0, &ann), -1); EXPECT_EQ(gca_unpack_public_announce(logger_, nullptr, 0, &ann), -1);
EXPECT_EQ(gca_unpack_public_announce(logger_, packed.data(), packed.size(), nullptr), -1); EXPECT_EQ(gca_unpack_public_announce(logger_, packed.data(), packed.size(), nullptr), -1);
#endif
} }
TEST_F(AnnouncesPack, PackEmptyPublicAnnounce) TEST_F(AnnouncesPack, PackEmptyPublicAnnounce)
{ {
#ifndef _DEBUG
GC_Public_Announce ann{}; GC_Public_Announce ann{};
std::vector<uint8_t> packed(GCA_PUBLIC_ANNOUNCE_MAX_SIZE); std::vector<uint8_t> packed(GCA_PUBLIC_ANNOUNCE_MAX_SIZE);
EXPECT_EQ(gca_pack_public_announce(logger_, packed.data(), packed.size(), nullptr), -1); EXPECT_EQ(gca_pack_public_announce(logger_, packed.data(), packed.size(), nullptr), -1);
EXPECT_EQ(gca_pack_public_announce(logger_, nullptr, 0, &ann), -1); EXPECT_EQ(gca_pack_public_announce(logger_, nullptr, 0, &ann), -1);
#endif
} }
TEST_F(AnnouncesPack, PublicAnnouncePackNull) TEST_F(AnnouncesPack, PublicAnnouncePackNull)
@ -206,9 +198,7 @@ TEST_F(AnnouncesPack, PublicAnnouncePackNull)
TEST_F(AnnouncesPack, AnnouncesValidationCheck) TEST_F(AnnouncesPack, AnnouncesValidationCheck)
{ {
#ifndef _DEBUG
EXPECT_EQ(gca_is_valid_announce(nullptr), false); EXPECT_EQ(gca_is_valid_announce(nullptr), false);
#endif
GC_Announce announce = {0}; GC_Announce announce = {0};
EXPECT_EQ(gca_is_valid_announce(&announce), false); EXPECT_EQ(gca_is_valid_announce(&announce), false);
@ -227,10 +217,8 @@ TEST_F(AnnouncesPack, UnpackIncompleteAnnouncesList)
GC_Announce announce; GC_Announce announce;
EXPECT_EQ(gca_unpack_announces_list(logger_, data, sizeof(data), &announce, 1), -1); EXPECT_EQ(gca_unpack_announces_list(logger_, data, sizeof(data), &announce, 1), -1);
#ifndef _DEBUG
EXPECT_EQ(gca_unpack_announces_list(logger_, data, sizeof(data), nullptr, 1), -1); EXPECT_EQ(gca_unpack_announces_list(logger_, data, sizeof(data), nullptr, 1), -1);
EXPECT_EQ(gca_unpack_announces_list(logger_, nullptr, 0, &announce, 1), -1); EXPECT_EQ(gca_unpack_announces_list(logger_, nullptr, 0, &announce, 1), -1);
#endif
} }
TEST_F(AnnouncesPack, PackedAnnouncesListCanBeUnpacked) TEST_F(AnnouncesPack, PackedAnnouncesListCanBeUnpacked)
@ -258,21 +246,17 @@ TEST_F(AnnouncesPack, PackingEmptyAnnounceFails)
std::vector<uint8_t> packed(gca_pack_announces_list_size(1)); std::vector<uint8_t> packed(gca_pack_announces_list_size(1));
EXPECT_EQ( EXPECT_EQ(
gca_pack_announces_list(logger_, packed.data(), packed.size(), &announce, 1, nullptr), -1); gca_pack_announces_list(logger_, packed.data(), packed.size(), &announce, 1, nullptr), -1);
#ifndef _DEBUG
EXPECT_EQ( EXPECT_EQ(
gca_pack_announces_list(logger_, packed.data(), packed.size(), nullptr, 1, nullptr), -1); gca_pack_announces_list(logger_, packed.data(), packed.size(), nullptr, 1, nullptr), -1);
EXPECT_EQ(gca_pack_announces_list(logger_, nullptr, 0, &announce, 1, nullptr), -1); EXPECT_EQ(gca_pack_announces_list(logger_, nullptr, 0, &announce, 1, nullptr), -1);
#endif
} }
TEST_F(AnnouncesPack, PackAnnounceNull) TEST_F(AnnouncesPack, PackAnnounceNull)
{ {
#ifndef _DEBUG
std::vector<uint8_t> data(GCA_ANNOUNCE_MAX_SIZE); std::vector<uint8_t> data(GCA_ANNOUNCE_MAX_SIZE);
GC_Announce announce; GC_Announce announce;
ASSERT_EQ(gca_pack_announce(logger_, nullptr, 0, &announce), -1); ASSERT_EQ(gca_pack_announce(logger_, nullptr, 0, &announce), -1);
ASSERT_EQ(gca_pack_announce(logger_, data.data(), data.size(), nullptr), -1); ASSERT_EQ(gca_pack_announce(logger_, data.data(), data.size(), nullptr), -1);
#endif
} }
} // namespace } // namespace

View File

@ -182,7 +182,7 @@ static void kill_group_friend_connection(const GC_Session *c, const GC_Chat *cha
uint16_t gc_get_wrapped_packet_size(uint16_t length, Net_Packet_Type packet_type) uint16_t gc_get_wrapped_packet_size(uint16_t length, Net_Packet_Type packet_type)
{ {
assert(length <= (packet_type == NET_PACKET_GC_LOSSY ? MAX_GC_CUSTOM_LOSSY_PACKET_SIZE : MAX_GC_PACKET_CHUNK_SIZE)); assert(length <= MAX_GC_PACKET_CHUNK_SIZE);
const uint16_t min_header_size = packet_type == NET_PACKET_GC_LOSSY const uint16_t min_header_size = packet_type == NET_PACKET_GC_LOSSY
? GC_MIN_LOSSY_PAYLOAD_SIZE ? GC_MIN_LOSSY_PAYLOAD_SIZE
@ -226,20 +226,10 @@ GC_Connection *get_gc_connection(const GC_Chat *chat, int peer_number)
return &peer->gconn; return &peer->gconn;
} }
/** Returns the max packet size, not wrapped */
static uint16_t group_packet_max_packet_size(Net_Packet_Type net_packet_type)
{
if (net_packet_type == NET_PACKET_GC_LOSSY) {
return MAX_GC_CUSTOM_LOSSY_PACKET_SIZE;
} else {
return MAX_GC_PACKET_CHUNK_SIZE;
}
}
/** Returns the amount of empty padding a packet of designated length should have. */ /** Returns the amount of empty padding a packet of designated length should have. */
static uint16_t group_packet_padding_length(uint16_t length, uint16_t max_length) static uint16_t group_packet_padding_length(uint16_t length)
{ {
return (max_length - length) % GC_MAX_PACKET_PADDING; return (MAX_GC_PACKET_CHUNK_SIZE - length) % GC_MAX_PACKET_PADDING;
} }
void gc_get_self_nick(const GC_Chat *chat, uint8_t *nick) void gc_get_self_nick(const GC_Chat *chat, uint8_t *nick)
@ -1280,8 +1270,8 @@ static uint16_t unpack_gc_shared_state(GC_SharedState *shared_state, const uint8
memcpy(&voice_state, data + len_processed, sizeof(uint8_t)); memcpy(&voice_state, data + len_processed, sizeof(uint8_t));
len_processed += sizeof(uint8_t); len_processed += sizeof(uint8_t);
shared_state->voice_state = group_voice_state_from_int(voice_state); shared_state->voice_state = (Group_Voice_State)voice_state;
shared_state->privacy_state = group_privacy_state_from_int(privacy_state); shared_state->privacy_state = (Group_Privacy_State)privacy_state;
return len_processed; return len_processed;
} }
@ -1493,10 +1483,9 @@ static int group_packet_unwrap(const Logger *log, const GC_Connection *gconn, ui
int group_packet_wrap( int group_packet_wrap(
const Logger *log, const Random *rng, const uint8_t *self_pk, const uint8_t *shared_key, uint8_t *packet, const Logger *log, const Random *rng, const uint8_t *self_pk, const uint8_t *shared_key, uint8_t *packet,
uint16_t packet_size, const uint8_t *data, uint16_t length, uint64_t message_id, uint16_t packet_size, const uint8_t *data, uint16_t length, uint64_t message_id,
uint8_t gp_packet_type, Net_Packet_Type net_packet_type) uint8_t gp_packet_type, uint8_t net_packet_type)
{ {
const uint16_t max_packet_size = group_packet_max_packet_size(net_packet_type); const uint16_t padding_len = group_packet_padding_length(length);
const uint16_t padding_len = group_packet_padding_length(length, max_packet_size);
const uint16_t min_packet_size = net_packet_type == NET_PACKET_GC_LOSSLESS const uint16_t min_packet_size = net_packet_type == NET_PACKET_GC_LOSSLESS
? length + padding_len + CRYPTO_MAC_SIZE + 1 + ENC_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE + GC_MESSAGE_ID_BYTES + 1 ? length + padding_len + CRYPTO_MAC_SIZE + 1 + ENC_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE + GC_MESSAGE_ID_BYTES + 1
: length + padding_len + CRYPTO_MAC_SIZE + 1 + ENC_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE + 1; : length + padding_len + CRYPTO_MAC_SIZE + 1 + ENC_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE + 1;
@ -1506,8 +1495,8 @@ int group_packet_wrap(
return -1; return -1;
} }
if (length > max_packet_size) { if (length > MAX_GC_PACKET_CHUNK_SIZE) {
LOGGER_ERROR(log, "Packet payload size (%u) exceeds maximum (%u)", length, max_packet_size); LOGGER_ERROR(log, "Packet payload size (%u) exceeds maximum (%u)", length, MAX_GC_PACKET_CHUNK_SIZE);
return -1; return -1;
} }
@ -1574,7 +1563,7 @@ non_null()
static bool send_lossy_group_packet(const GC_Chat *chat, const GC_Connection *gconn, const uint8_t *data, static bool send_lossy_group_packet(const GC_Chat *chat, const GC_Connection *gconn, const uint8_t *data,
uint16_t length, uint8_t packet_type) uint16_t length, uint8_t packet_type)
{ {
assert(length <= MAX_GC_CUSTOM_LOSSY_PACKET_SIZE); assert(length <= MAX_GC_PACKET_CHUNK_SIZE);
if (!gconn->handshaked || gconn->pending_delete) { if (!gconn->handshaked || gconn->pending_delete) {
return false; return false;
@ -3521,8 +3510,8 @@ unsigned int gc_get_peer_connection_status(const GC_Chat *chat, uint32_t peer_id
{ {
const int peer_number = get_peer_number_of_peer_id(chat, peer_id); const int peer_number = get_peer_number_of_peer_id(chat, peer_id);
if (peer_number_is_self(peer_number)) { if (peer_number_is_self(peer_number)) { // we cannot have a connection with ourselves
return chat->self_udp_status == SELF_UDP_STATUS_NONE ? 1 : 2; return 0;
} }
const GC_Connection *gconn = get_gc_connection(chat, peer_number); const GC_Connection *gconn = get_gc_connection(chat, peer_number);
@ -7235,9 +7224,7 @@ static int get_new_group_index(GC_Session *c)
c->chats[new_index] = empty_gc_chat; c->chats[new_index] = empty_gc_chat;
for (size_t i = 0; i < sizeof(c->chats[new_index].saved_invites)/sizeof(*c->chats[new_index].saved_invites); ++i) { memset(&c->chats[new_index].saved_invites, -1, sizeof(c->chats[new_index].saved_invites));
c->chats[new_index].saved_invites[i] = -1;
}
++c->chats_index; ++c->chats_index;
@ -7292,7 +7279,7 @@ static bool init_gc_tcp_connection(const GC_Session *c, GC_Chat *chat)
/** Initializes default shared state values. */ /** Initializes default shared state values. */
non_null() non_null()
static void init_gc_shared_state(GC_Chat *chat, Group_Privacy_State privacy_state) static void init_gc_shared_state(GC_Chat *chat, const Group_Privacy_State privacy_state)
{ {
chat->shared_state.maxpeers = MAX_GC_PEERS_DEFAULT; chat->shared_state.maxpeers = MAX_GC_PEERS_DEFAULT;
chat->shared_state.privacy_state = privacy_state; chat->shared_state.privacy_state = privacy_state;

View File

@ -142,7 +142,7 @@ non_null(1, 2, 3, 4, 5) nullable(7)
int group_packet_wrap( int group_packet_wrap(
const Logger *log, const Random *rng, const uint8_t *self_pk, const uint8_t *shared_key, uint8_t *packet, const Logger *log, const Random *rng, const uint8_t *self_pk, const uint8_t *shared_key, uint8_t *packet,
uint16_t packet_size, const uint8_t *data, uint16_t length, uint64_t message_id, uint16_t packet_size, const uint8_t *data, uint16_t length, uint64_t message_id,
uint8_t gp_packet_type, Net_Packet_Type net_packet_type); uint8_t gp_packet_type, uint8_t net_packet_type);
/** @brief Returns the size of a wrapped/encrypted packet with a plain size of `length`. /** @brief Returns the size of a wrapped/encrypted packet with a plain size of `length`.
* *
@ -162,7 +162,7 @@ uint16_t gc_get_wrapped_packet_size(uint16_t length, Net_Packet_Type packet_type
* Returns -4 if the sender does not have permission to speak. * Returns -4 if the sender does not have permission to speak.
* Returns -5 if the packet fails to send. * Returns -5 if the packet fails to send.
*/ */
non_null(1, 2) nullable(5) non_null(1, 2, 3, 4) nullable(5)
int gc_send_message(const GC_Chat *chat, const uint8_t *message, uint16_t length, uint8_t type, int gc_send_message(const GC_Chat *chat, const uint8_t *message, uint16_t length, uint8_t type,
uint32_t *message_id); uint32_t *message_id);
@ -391,13 +391,10 @@ non_null(1) nullable(3)
int gc_get_peer_public_key_by_peer_id(const GC_Chat *chat, uint32_t peer_id, uint8_t *public_key); int gc_get_peer_public_key_by_peer_id(const GC_Chat *chat, uint32_t peer_id, uint8_t *public_key);
/** @brief Gets the connection status for peer associated with `peer_id`. /** @brief Gets the connection status for peer associated with `peer_id`.
*
* If `peer_id` designates ourself, the return value indicates whether we're capable
* of making UDP connections with other peers, or are limited to TCP connections.
* *
* Returns 2 if we have a direct (UDP) connection with a peer. * Returns 2 if we have a direct (UDP) connection with a peer.
* Returns 1 if we have an indirect (TCP) connection with a peer. * Returns 1 if we have an indirect (TCP) connection with a peer.
* Returns 0 if peer_id is invalid. * Returns 0 if peer_id is invalid or corresponds to ourselves.
* *
* Note: Return values must correspond to Tox_Connection enum in API. * Note: Return values must correspond to Tox_Connection enum in API.
*/ */

View File

@ -34,7 +34,7 @@
#define MAX_GC_MESSAGE_SIZE GROUP_MAX_MESSAGE_LENGTH #define MAX_GC_MESSAGE_SIZE GROUP_MAX_MESSAGE_LENGTH
#define MAX_GC_MESSAGE_RAW_SIZE (MAX_GC_MESSAGE_SIZE + GC_MESSAGE_PSEUDO_ID_SIZE) #define MAX_GC_MESSAGE_RAW_SIZE (MAX_GC_MESSAGE_SIZE + GC_MESSAGE_PSEUDO_ID_SIZE)
#define MAX_GC_CUSTOM_LOSSLESS_PACKET_SIZE 1373 #define MAX_GC_CUSTOM_LOSSLESS_PACKET_SIZE 1373
#define MAX_GC_CUSTOM_LOSSY_PACKET_SIZE 1373 #define MAX_GC_CUSTOM_LOSSY_PACKET_SIZE MAX_GC_PACKET_CHUNK_SIZE
#define MAX_GC_PASSWORD_SIZE 32 #define MAX_GC_PASSWORD_SIZE 32
#define MAX_GC_SAVED_INVITES 10 #define MAX_GC_SAVED_INVITES 10
#define MAX_GC_PEERS_DEFAULT 100 #define MAX_GC_PEERS_DEFAULT 100
@ -401,8 +401,7 @@ int unpack_gc_saved_peers(GC_Chat *chat, const uint8_t *data, uint16_t length);
/** @brief Packs all valid entries from saved peerlist into `data`. /** @brief Packs all valid entries from saved peerlist into `data`.
* *
* If `processed` is non-null it will be set to the length of the packed data * If `processed` is non-null it will be set to the length of the packed data.
* on success, and will be untouched on error.
* *
* Return the number of packed saved peers on success. * Return the number of packed saved peers on success.
* Return -1 if buffer is too small. * Return -1 if buffer is too small.

View File

@ -453,7 +453,6 @@ int gcc_handle_packet_fragment(const GC_Session *c, GC_Chat *chat, uint32_t peer
gconn = get_gc_connection(chat, peer_number); gconn = get_gc_connection(chat, peer_number);
if (gconn == nullptr) { if (gconn == nullptr) {
free(payload);
return 0; return 0;
} }

View File

@ -9,6 +9,7 @@
#include "group_pack.h" #include "group_pack.h"
#include <assert.h>
#include <stdint.h> #include <stdint.h>
#include <stdlib.h> #include <stdlib.h>
#include <string.h> #include <string.h>
@ -18,32 +19,6 @@
#include "ccompat.h" #include "ccompat.h"
#include "util.h" #include "util.h"
Group_Privacy_State group_privacy_state_from_int(uint8_t value)
{
switch (value) {
case 0:
return GI_PUBLIC;
case 1:
return GI_PRIVATE;
default:
return GI_PUBLIC;
}
}
Group_Voice_State group_voice_state_from_int(uint8_t value)
{
switch (value) {
case 0:
return GV_ALL;
case 1:
return GV_MODS;
case 2:
return GV_FOUNDER;
default:
return GV_ALL;
}
}
non_null() non_null()
static bool load_unpack_state_values(GC_Chat *chat, Bin_Unpack *bu) static bool load_unpack_state_values(GC_Chat *chat, Bin_Unpack *bu)
{ {
@ -69,8 +44,8 @@ static bool load_unpack_state_values(GC_Chat *chat, Bin_Unpack *bu)
} }
chat->connection_state = manually_disconnected ? CS_DISCONNECTED : CS_CONNECTING; chat->connection_state = manually_disconnected ? CS_DISCONNECTED : CS_CONNECTING;
chat->shared_state.privacy_state = group_privacy_state_from_int(privacy_state); chat->shared_state.privacy_state = (Group_Privacy_State)privacy_state;
chat->shared_state.voice_state = group_voice_state_from_int(voice_state); chat->shared_state.voice_state = (Group_Voice_State)voice_state;
// we always load saved groups as private in case the group became private while we were offline. // we always load saved groups as private in case the group became private while we were offline.
// this will have no detrimental effect if the group is public, as the correct privacy // this will have no detrimental effect if the group is public, as the correct privacy
@ -150,7 +125,7 @@ static bool load_unpack_mod_list(GC_Chat *chat, Bin_Unpack *bu)
if (chat->moderation.num_mods > MOD_MAX_NUM_MODERATORS) { if (chat->moderation.num_mods > MOD_MAX_NUM_MODERATORS) {
LOGGER_ERROR(chat->log, "moderation count %u exceeds maximum %u", chat->moderation.num_mods, MOD_MAX_NUM_MODERATORS); LOGGER_ERROR(chat->log, "moderation count %u exceeds maximum %u", chat->moderation.num_mods, MOD_MAX_NUM_MODERATORS);
chat->moderation.num_mods = MOD_MAX_NUM_MODERATORS; return false;
} }
uint8_t *packed_mod_list = (uint8_t *)malloc(chat->moderation.num_mods * MOD_LIST_ENTRY_SIZE); uint8_t *packed_mod_list = (uint8_t *)malloc(chat->moderation.num_mods * MOD_LIST_ENTRY_SIZE);
@ -218,10 +193,7 @@ static bool load_unpack_self_info(GC_Chat *chat, Bin_Unpack *bu)
return false; return false;
} }
if (self_nick_len > MAX_GC_NICK_SIZE) { assert(self_nick_len <= MAX_GC_NICK_SIZE);
LOGGER_ERROR(chat->log, "self_nick too big (%u bytes), truncating to %d", self_nick_len, MAX_GC_NICK_SIZE);
self_nick_len = MAX_GC_NICK_SIZE;
}
if (!bin_unpack_bin_fixed(bu, self_nick, self_nick_len)) { if (!bin_unpack_bin_fixed(bu, self_nick, self_nick_len)) {
LOGGER_ERROR(chat->log, "Failed to unpack self nick bytes"); LOGGER_ERROR(chat->log, "Failed to unpack self nick bytes");
@ -234,10 +206,7 @@ static bool load_unpack_self_info(GC_Chat *chat, Bin_Unpack *bu)
return false; return false;
} }
if (chat->numpeers == 0) { assert(chat->numpeers > 0);
LOGGER_ERROR(chat->log, "Failed to unpack self: numpeers should be > 0");
return false;
}
GC_Peer *self = &chat->group[0]; GC_Peer *self = &chat->group[0];
@ -400,12 +369,9 @@ static void save_pack_self_info(const GC_Chat *chat, Bin_Pack *bp)
{ {
bin_pack_array(bp, 4); bin_pack_array(bp, 4);
GC_Peer *self = &chat->group[0]; const GC_Peer *self = &chat->group[0];
if (self->nick_length > MAX_GC_NICK_SIZE) { assert(self->nick_length <= MAX_GC_NICK_SIZE);
LOGGER_ERROR(chat->log, "self_nick is too big (%u). Truncating to %d", self->nick_length, MAX_GC_NICK_SIZE);
self->nick_length = MAX_GC_NICK_SIZE;
}
bin_pack_u16(bp, self->nick_length); // 1 bin_pack_u16(bp, self->nick_length); // 1
bin_pack_u08(bp, (uint8_t)self->role); // 2 bin_pack_u08(bp, (uint8_t)self->role); // 2

View File

@ -32,7 +32,4 @@ void gc_save_pack_group(const GC_Chat *chat, Bin_Pack *bp);
non_null() non_null()
bool gc_load_unpack_group(GC_Chat *chat, Bin_Unpack *bu); bool gc_load_unpack_group(GC_Chat *chat, Bin_Unpack *bu);
Group_Privacy_State group_privacy_state_from_int(uint8_t value);
Group_Voice_State group_voice_state_from_int(uint8_t value);
#endif // GROUP_PACK_H #endif // GROUP_PACK_H

View File

@ -165,7 +165,7 @@ Mono_Time *mono_time_new(const Memory *mem, mono_time_current_time_cb *current_t
// Maximum reproducibility. Never return time = 0. // Maximum reproducibility. Never return time = 0.
mono_time->base_time = 1; mono_time->base_time = 1;
#else #else
mono_time->base_time = (uint64_t)time(nullptr) * 1000ULL - current_time_monotonic(mono_time); mono_time->base_time = (uint64_t)time(nullptr) - (current_time_monotonic(mono_time) / 1000ULL);
#endif #endif
mono_time_update(mono_time); mono_time_update(mono_time);
@ -190,13 +190,14 @@ void mono_time_free(const Memory *mem, Mono_Time *mono_time)
void mono_time_update(Mono_Time *mono_time) void mono_time_update(Mono_Time *mono_time)
{ {
uint64_t cur_time = 0;
#ifdef OS_WIN32 #ifdef OS_WIN32
/* we actually want to update the overflow state of mono_time here */ /* we actually want to update the overflow state of mono_time here */
pthread_mutex_lock(&mono_time->last_clock_lock); pthread_mutex_lock(&mono_time->last_clock_lock);
mono_time->last_clock_update = true; mono_time->last_clock_update = true;
#endif #endif
const uint64_t cur_time = cur_time = mono_time->current_time_callback(mono_time->user_data) / 1000ULL;
mono_time->base_time + mono_time->current_time_callback(mono_time->user_data); cur_time += mono_time->base_time;
#ifdef OS_WIN32 #ifdef OS_WIN32
pthread_mutex_unlock(&mono_time->last_clock_lock); pthread_mutex_unlock(&mono_time->last_clock_lock);
#endif #endif
@ -210,22 +211,21 @@ void mono_time_update(Mono_Time *mono_time)
#endif #endif
} }
uint64_t mono_time_get_ms(const Mono_Time *mono_time) uint64_t mono_time_get(const Mono_Time *mono_time)
{ {
#if !defined(ESP_PLATFORM) && !defined(FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION) #ifdef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
// Fuzzing is only single thread for now, no locking needed */ // Fuzzing is only single thread for now, no locking needed */
return mono_time->cur_time;
#else
#ifndef ESP_PLATFORM
pthread_rwlock_rdlock(mono_time->time_update_lock); pthread_rwlock_rdlock(mono_time->time_update_lock);
#endif #endif
const uint64_t cur_time = mono_time->cur_time; const uint64_t cur_time = mono_time->cur_time;
#if !defined(ESP_PLATFORM) && !defined(FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION) #ifndef ESP_PLATFORM
pthread_rwlock_unlock(mono_time->time_update_lock); pthread_rwlock_unlock(mono_time->time_update_lock);
#endif #endif
return cur_time; return cur_time;
} #endif
uint64_t mono_time_get(const Mono_Time *mono_time)
{
return mono_time_get_ms(mono_time) / 1000ULL;
} }
bool mono_time_is_timeout(const Mono_Time *mono_time, uint64_t timestamp, uint64_t timeout) bool mono_time_is_timeout(const Mono_Time *mono_time, uint64_t timestamp, uint64_t timeout)
@ -245,10 +245,9 @@ void mono_time_set_current_time_callback(Mono_Time *mono_time,
} }
} }
/** @brief Return current monotonic time in milliseconds (ms). /**
* * Return current monotonic time in milliseconds (ms). The starting point is
* The starting point is unspecified and in particular is likely not comparable * unspecified.
* to the return value of `mono_time_get_ms()`.
*/ */
uint64_t current_time_monotonic(Mono_Time *mono_time) uint64_t current_time_monotonic(Mono_Time *mono_time)
{ {

View File

@ -61,16 +61,8 @@ void mono_time_free(const Memory *mem, Mono_Time *mono_time);
non_null() non_null()
void mono_time_update(Mono_Time *mono_time); void mono_time_update(Mono_Time *mono_time);
/** @brief Return current monotonic time in milliseconds (ms). /**
* * Return unix time since epoch in seconds.
* The starting point is UNIX epoch as measured by `time()` in `mono_time_new()`.
*/
non_null()
uint64_t mono_time_get_ms(const Mono_Time *mono_time);
/** @brief Return a monotonically increasing time in seconds.
*
* The starting point is UNIX epoch as measured by `time()` in `mono_time_new()`.
*/ */
non_null() non_null()
uint64_t mono_time_get(const Mono_Time *mono_time); uint64_t mono_time_get(const Mono_Time *mono_time);
@ -81,10 +73,9 @@ uint64_t mono_time_get(const Mono_Time *mono_time);
non_null() non_null()
bool mono_time_is_timeout(const Mono_Time *mono_time, uint64_t timestamp, uint64_t timeout); bool mono_time_is_timeout(const Mono_Time *mono_time, uint64_t timestamp, uint64_t timeout);
/** @brief Return current monotonic time in milliseconds (ms). /**
* * Return current monotonic time in milliseconds (ms). The starting point is
* The starting point is unspecified and in particular is likely not comparable * unspecified.
* to the return value of `mono_time_get_ms()`.
*/ */
non_null() non_null()
uint64_t current_time_monotonic(Mono_Time *mono_time); uint64_t current_time_monotonic(Mono_Time *mono_time);

View File

@ -1184,11 +1184,11 @@ Networking_Core *new_networking_ex(
int n = 1024 * 1024 * 2; int n = 1024 * 1024 * 2;
if (net_setsockopt(ns, temp->sock, SOL_SOCKET, SO_RCVBUF, &n, sizeof(n)) != 0) { if (net_setsockopt(ns, temp->sock, SOL_SOCKET, SO_RCVBUF, &n, sizeof(n)) != 0) {
LOGGER_WARNING(log, "failed to set socket option %d", SO_RCVBUF); LOGGER_ERROR(log, "failed to set socket option %d", SO_RCVBUF);
} }
if (net_setsockopt(ns, temp->sock, SOL_SOCKET, SO_SNDBUF, &n, sizeof(n)) != 0) { if (net_setsockopt(ns, temp->sock, SOL_SOCKET, SO_SNDBUF, &n, sizeof(n)) != 0) {
LOGGER_WARNING(log, "failed to set socket option %d", SO_SNDBUF); LOGGER_ERROR(log, "failed to set socket option %d", SO_SNDBUF);
} }
/* Enable broadcast on socket */ /* Enable broadcast on socket */

View File

@ -3307,7 +3307,7 @@ uint32_t tox_group_max_message_length(void);
/** /**
* Maximum length of a group custom lossy packet. * Maximum length of a group custom lossy packet.
*/ */
#define TOX_GROUP_MAX_CUSTOM_LOSSY_PACKET_LENGTH 1373 #define TOX_GROUP_MAX_CUSTOM_LOSSY_PACKET_LENGTH 500
uint32_t tox_group_max_custom_lossy_packet_length(void); uint32_t tox_group_max_custom_lossy_packet_length(void);
@ -3967,8 +3967,7 @@ Tox_Group_Role tox_group_peer_get_role(const Tox *tox, uint32_t group_number, ui
/** /**
* Return the type of connection we have established with a peer. * Return the type of connection we have established with a peer.
* *
* If `peer_id` designates ourself, the return value indicates whether we're capable * This function will return an error if called on ourselves.
* of making UDP connections with other peers, or are limited to TCP connections.
* *
* @param group_number The group number of the group we wish to query. * @param group_number The group number of the group we wish to query.
* @param peer_id The ID of the peer whose connection status we wish to query. * @param peer_id The ID of the peer whose connection status we wish to query.

View File

@ -326,20 +326,20 @@ bool tox_events_unpack(Tox_Events *events, Bin_Unpack *bu)
return true; return true;
} }
non_null(1) nullable(2, 3) non_null(1) nullable(2)
static bool tox_events_bin_pack_handler(Bin_Pack *bp, const Logger *logger, const void *obj) static bool tox_events_bin_pack_handler(Bin_Pack *bp, const void *obj)
{ {
return tox_events_pack((const Tox_Events *)obj, bp); return tox_events_pack((const Tox_Events *)obj, bp);
} }
uint32_t tox_events_bytes_size(const Tox_Events *events) uint32_t tox_events_bytes_size(const Tox_Events *events)
{ {
return bin_pack_obj_size(tox_events_bin_pack_handler, nullptr, events); return bin_pack_obj_size(tox_events_bin_pack_handler, events);
} }
void tox_events_get_bytes(const Tox_Events *events, uint8_t *bytes) void tox_events_get_bytes(const Tox_Events *events, uint8_t *bytes)
{ {
bin_pack_obj(tox_events_bin_pack_handler, nullptr, events, bytes, UINT32_MAX); bin_pack_obj(tox_events_bin_pack_handler, events, bytes, UINT32_MAX);
} }
Tox_Events *tox_events_load(const Tox_System *sys, const uint8_t *bytes, uint32_t bytes_size) Tox_Events *tox_events_load(const Tox_System *sys, const uint8_t *bytes, uint32_t bytes_size)

View File

@ -9,17 +9,6 @@
#include "bin_unpack.h" #include "bin_unpack.h"
#include "ccompat.h" #include "ccompat.h"
static Tox_Conference_Type tox_conference_type_from_int(uint32_t value)
{
switch (value) {
case 0:
return TOX_CONFERENCE_TYPE_TEXT;
case 1:
return TOX_CONFERENCE_TYPE_AV;
default:
return TOX_CONFERENCE_TYPE_TEXT;
}
}
bool tox_unpack_conference_type(Bin_Unpack *bu, Tox_Conference_Type *val) bool tox_unpack_conference_type(Bin_Unpack *bu, Tox_Conference_Type *val)
{ {
uint32_t u32; uint32_t u32;
@ -28,23 +17,10 @@ bool tox_unpack_conference_type(Bin_Unpack *bu, Tox_Conference_Type *val)
return false; return false;
} }
*val = tox_conference_type_from_int(u32); *val = (Tox_Conference_Type)u32;
return true; return true;
} }
static Tox_Connection tox_connection_from_int(uint32_t value)
{
switch (value) {
case 0:
return TOX_CONNECTION_NONE;
case 1:
return TOX_CONNECTION_TCP;
case 2:
return TOX_CONNECTION_UDP;
default:
return TOX_CONNECTION_NONE;
}
}
bool tox_unpack_connection(Bin_Unpack *bu, Tox_Connection *val) bool tox_unpack_connection(Bin_Unpack *bu, Tox_Connection *val)
{ {
uint32_t u32; uint32_t u32;
@ -53,23 +29,10 @@ bool tox_unpack_connection(Bin_Unpack *bu, Tox_Connection *val)
return false; return false;
} }
*val = tox_connection_from_int(u32); *val = (Tox_Connection)u32;
return true; return true;
} }
static Tox_File_Control tox_file_control_from_int(uint32_t value)
{
switch (value) {
case 0:
return TOX_FILE_CONTROL_RESUME;
case 1:
return TOX_FILE_CONTROL_PAUSE;
case 2:
return TOX_FILE_CONTROL_CANCEL;
default:
return TOX_FILE_CONTROL_RESUME;
}
}
bool tox_unpack_file_control(Bin_Unpack *bu, Tox_File_Control *val) bool tox_unpack_file_control(Bin_Unpack *bu, Tox_File_Control *val)
{ {
uint32_t u32; uint32_t u32;
@ -78,21 +41,10 @@ bool tox_unpack_file_control(Bin_Unpack *bu, Tox_File_Control *val)
return false; return false;
} }
*val = tox_file_control_from_int(u32); *val = (Tox_File_Control)u32;
return true; return true;
} }
static Tox_Message_Type tox_message_type_from_int(uint32_t value)
{
switch (value) {
case 0:
return TOX_MESSAGE_TYPE_NORMAL;
case 1:
return TOX_MESSAGE_TYPE_ACTION;
default:
return TOX_MESSAGE_TYPE_NORMAL;
}
}
bool tox_unpack_message_type(Bin_Unpack *bu, Tox_Message_Type *val) bool tox_unpack_message_type(Bin_Unpack *bu, Tox_Message_Type *val)
{ {
uint32_t u32; uint32_t u32;
@ -101,23 +53,10 @@ bool tox_unpack_message_type(Bin_Unpack *bu, Tox_Message_Type *val)
return false; return false;
} }
*val = tox_message_type_from_int(u32); *val = (Tox_Message_Type)u32;
return true; return true;
} }
static Tox_User_Status tox_user_status_from_int(uint32_t value)
{
switch (value) {
case 0:
return TOX_USER_STATUS_NONE;
case 1:
return TOX_USER_STATUS_AWAY;
case 2:
return TOX_USER_STATUS_BUSY;
default:
return TOX_USER_STATUS_NONE;
}
}
bool tox_unpack_user_status(Bin_Unpack *bu, Tox_User_Status *val) bool tox_unpack_user_status(Bin_Unpack *bu, Tox_User_Status *val)
{ {
uint32_t u32; uint32_t u32;
@ -126,7 +65,7 @@ bool tox_unpack_user_status(Bin_Unpack *bu, Tox_User_Status *val)
return false; return false;
} }
*val = tox_user_status_from_int(u32); *val = (Tox_User_Status)u32;
return true; return true;
} }

View File

@ -1,5 +1,7 @@
load("//tools:no_undefined.bzl", "cc_library") load("//tools:no_undefined.bzl", "cc_library")
package(features = ["layering_check"])
exports_files( exports_files(
srcs = ["toxencryptsave.h"], srcs = ["toxencryptsave.h"],
visibility = ["//c-toxcore:__pkg__"], visibility = ["//c-toxcore:__pkg__"],