640e6cace fix(toxav): remove extra copy of video frame on encode Tested and works, but there might be alignment issues and other stuff. 6f7f51554 chore(toxav): use realtime deadline for vp8 encoder Technically all this does is choose a quality based on frame duration, which we always set to 1, and as such is always realtime. (In same timebase as pts, which we use as a frame counter...) 5047ae5a2 chore: make the source tarball exhibit the old behavior 14804a4b8 chore: Fix sonar-scan CI action. e2db7d946 cleanup: Exclude lan_discovery test from running on macos, instead of excluding it from the project. 3accade67 chore: Fix CI, disabling some tests that no longer run on CI. ef8d767e6 cleanup: Fix comment formatting errors. 34ec822da cleanup: Fix some clang-19 format warnings. 40b3f0b46 refactor: Use clang's nullability qualifiers instead of attributes. f81e30679 refactor: Use per-parameter nullability annotations. REVERT: 1701691d5 chore(toxav): use realtime deadline for vp8 encoder Technically all this does is choose a quality based on frame duration, which we always set to 1, and as such is always realtime. (In same timebase as pts, which we use as a frame counter...) REVERT: a87505867 fix(toxav): remove extra copy of video frame on encode Tested and works, but there might be alignment issues and other stuff. git-subtree-dir: external/toxcore/c-toxcore git-subtree-split: 640e6cace81b4412c45977b94eb9c41e53c54035
67 lines
2.1 KiB
C
67 lines
2.1 KiB
C
/* SPDX-License-Identifier: GPL-3.0-or-later
|
|
* Copyright © 2016-2025 The TokTok team.
|
|
* Copyright © 2013 Tox project.
|
|
*/
|
|
|
|
#include "crypto_core_pack.h"
|
|
|
|
#include <string.h>
|
|
|
|
#include "bin_pack.h"
|
|
#include "bin_unpack.h"
|
|
#include "ccompat.h"
|
|
#include "crypto_core.h"
|
|
|
|
bool pack_extended_public_key(const Extended_Public_Key *_Nonnull key, Bin_Pack *_Nonnull bp)
|
|
{
|
|
uint8_t ext_key[EXT_PUBLIC_KEY_SIZE];
|
|
static_assert(sizeof(ext_key) == sizeof(key->enc) + sizeof(key->sig),
|
|
"extended secret key size is not the sum of the encryption and sign secret key sizes");
|
|
memcpy(ext_key, key->enc, sizeof(key->enc));
|
|
memcpy(&ext_key[sizeof(key->enc)], key->sig, sizeof(key->sig));
|
|
|
|
return bin_pack_bin(bp, ext_key, sizeof(ext_key));
|
|
}
|
|
|
|
bool pack_extended_secret_key(const Extended_Secret_Key *_Nonnull key, Bin_Pack *_Nonnull bp)
|
|
{
|
|
uint8_t ext_key[EXT_SECRET_KEY_SIZE];
|
|
static_assert(sizeof(ext_key) == sizeof(key->enc) + sizeof(key->sig),
|
|
"extended secret key size is not the sum of the encryption and sign secret key sizes");
|
|
memcpy(ext_key, key->enc, sizeof(key->enc));
|
|
memcpy(&ext_key[sizeof(key->enc)], key->sig, sizeof(key->sig));
|
|
|
|
const bool result = bin_pack_bin(bp, ext_key, sizeof(ext_key));
|
|
crypto_memzero(ext_key, sizeof(ext_key));
|
|
return result;
|
|
}
|
|
|
|
bool unpack_extended_public_key(Extended_Public_Key *_Nonnull key, Bin_Unpack *_Nonnull bu)
|
|
{
|
|
uint8_t ext_key[EXT_PUBLIC_KEY_SIZE];
|
|
|
|
if (!bin_unpack_bin_fixed(bu, ext_key, sizeof(ext_key))) {
|
|
return false;
|
|
}
|
|
|
|
memcpy(key->enc, ext_key, sizeof(key->enc));
|
|
memcpy(key->sig, &ext_key[sizeof(key->enc)], sizeof(key->sig));
|
|
|
|
return true;
|
|
}
|
|
|
|
bool unpack_extended_secret_key(Extended_Secret_Key *_Nonnull key, Bin_Unpack *_Nonnull bu)
|
|
{
|
|
uint8_t ext_key[EXT_SECRET_KEY_SIZE];
|
|
|
|
if (!bin_unpack_bin_fixed(bu, ext_key, sizeof(ext_key))) {
|
|
return false;
|
|
}
|
|
|
|
memcpy(key->enc, ext_key, sizeof(key->enc));
|
|
memcpy(key->sig, &ext_key[sizeof(key->enc)], sizeof(key->sig));
|
|
crypto_memzero(ext_key, sizeof(ext_key));
|
|
|
|
return true;
|
|
}
|