640e6cace fix(toxav): remove extra copy of video frame on encode Tested and works, but there might be alignment issues and other stuff. 6f7f51554 chore(toxav): use realtime deadline for vp8 encoder Technically all this does is choose a quality based on frame duration, which we always set to 1, and as such is always realtime. (In same timebase as pts, which we use as a frame counter...) 5047ae5a2 chore: make the source tarball exhibit the old behavior 14804a4b8 chore: Fix sonar-scan CI action. e2db7d946 cleanup: Exclude lan_discovery test from running on macos, instead of excluding it from the project. 3accade67 chore: Fix CI, disabling some tests that no longer run on CI. ef8d767e6 cleanup: Fix comment formatting errors. 34ec822da cleanup: Fix some clang-19 format warnings. 40b3f0b46 refactor: Use clang's nullability qualifiers instead of attributes. f81e30679 refactor: Use per-parameter nullability annotations. REVERT: 1701691d5 chore(toxav): use realtime deadline for vp8 encoder Technically all this does is choose a quality based on frame duration, which we always set to 1, and as such is always realtime. (In same timebase as pts, which we use as a frame counter...) REVERT: a87505867 fix(toxav): remove extra copy of video frame on encode Tested and works, but there might be alignment issues and other stuff. git-subtree-dir: external/toxcore/c-toxcore git-subtree-split: 640e6cace81b4412c45977b94eb9c41e53c54035
49 lines
1.6 KiB
C
49 lines
1.6 KiB
C
/* SPDX-License-Identifier: GPL-3.0-or-later
|
|
* Copyright © 2019-2025 The TokTok team.
|
|
*/
|
|
#include "timed_auth.h"
|
|
|
|
#include <string.h>
|
|
|
|
#include "attributes.h"
|
|
#include "ccompat.h"
|
|
#include "crypto_core.h"
|
|
#include "mono_time.h"
|
|
|
|
static void create_timed_auth_to_hash(const Mono_Time *_Nonnull mono_time, uint16_t timeout, bool previous, const uint8_t *_Nullable data,
|
|
uint16_t length, uint8_t *_Nonnull to_hash)
|
|
{
|
|
const uint64_t t = (mono_time_get(mono_time) / timeout) - (previous ? 1 : 0);
|
|
memcpy(to_hash, &t, sizeof(t));
|
|
|
|
if (data != nullptr) {
|
|
memcpy(to_hash + sizeof(t), data, length);
|
|
}
|
|
}
|
|
|
|
void generate_timed_auth(const Mono_Time *mono_time, uint16_t timeout, const uint8_t *key,
|
|
const uint8_t *data, uint16_t length, uint8_t *timed_auth)
|
|
{
|
|
const uint16_t to_hash_size = sizeof(uint64_t) + length;
|
|
VLA(uint8_t, to_hash, to_hash_size);
|
|
create_timed_auth_to_hash(mono_time, timeout, false, data, length, to_hash);
|
|
crypto_hmac(timed_auth, key, to_hash, to_hash_size);
|
|
}
|
|
|
|
bool check_timed_auth(const Mono_Time *mono_time, uint16_t timeout, const uint8_t *key, const uint8_t *data,
|
|
uint16_t length, const uint8_t *timed_auth)
|
|
{
|
|
const uint16_t to_hash_size = sizeof(uint64_t) + length;
|
|
VLA(uint8_t, to_hash, to_hash_size);
|
|
|
|
for (uint8_t i = 0; i < 2; ++i) {
|
|
create_timed_auth_to_hash(mono_time, timeout, i != 0, data, length, to_hash);
|
|
|
|
if (crypto_hmac_verify(timed_auth, key, to_hash, to_hash_size)) {
|
|
return true;
|
|
}
|
|
}
|
|
|
|
return false;
|
|
}
|