c9cdae001 fix(toxav): remove extra copy of video frame on encode 4f6d4546b test: Improve the fake network library. a2581e700 refactor(toxcore): generate `Friend_Request` and `Dht_Nodes_Response` 2aaa11770 refactor(toxcore): use Tox_Memory in generated events 5c367452b test(toxcore): fix incorrect mutex in tox_scenario_get_time 8f92e710f perf: Add a timed limit of number of cookie requests. 695b6417a test: Add some more simulated network support. 815ae9ce9 test(toxcore): fix thread-safety in scenario framework 6d85c754e test(toxcore): add unit tests for net_crypto 9c22e79cc test(support): add SimulatedEnvironment for deterministic testing f34fcb195 chore: Update windows Dockerfile to debian stable (trixie). ece0e8980 fix(group_moderation): allow validating unsorted sanction list signatures a4fa754d7 refactor: rename struct Packet to struct Net_Packet d6f330f85 cleanup: Fix some warnings from coverity. e206bffa2 fix(group_chats): fix sync packets reverting topics 0e4715598 test: Add new scenario testing framework. 668291f44 refactor(toxcore): decouple Network_Funcs from sockaddr via IP_Port fc4396cef fix: potential division by zero in toxav and unsafe hex parsing 8e8b352ab refactor: Add nullable annotations to struct members. 7740bb421 refactor: decouple net_crypto from DHT 1936d4296 test: add benchmark for toxav audio and video 46bfdc2df fix: correct printf format specifiers for unsigned integers REVERT: 1828c5356 fix(toxav): remove extra copy of video frame on encode git-subtree-dir: external/toxcore/c-toxcore git-subtree-split: c9cdae001341e701fca980c9bb9febfeb95d2902
54 lines
2.1 KiB
C
54 lines
2.1 KiB
C
/* SPDX-License-Identifier: GPL-3.0-or-later
|
|
* Copyright © 2016-2025 The TokTok team.
|
|
* Copyright © 2014 Tox project.
|
|
*/
|
|
|
|
/**
|
|
* Handle friend requests.
|
|
*/
|
|
#ifndef C_TOXCORE_TOXCORE_FRIEND_REQUESTS_H
|
|
#define C_TOXCORE_TOXCORE_FRIEND_REQUESTS_H
|
|
|
|
#include <stddef.h>
|
|
|
|
#include "attributes.h"
|
|
#include "friend_connection.h"
|
|
#include "mem.h"
|
|
|
|
// TODO(Jfreegman): This should be the maximum size that an onion client can handle.
|
|
#define MAX_FRIEND_REQUEST_DATA_SIZE (ONION_CLIENT_MAX_DATA_SIZE - 100)
|
|
|
|
typedef struct Friend_Requests Friend_Requests;
|
|
|
|
/** Set and get the nospam variable used to prevent one type of friend request spam. */
|
|
void set_nospam(Friend_Requests *_Nonnull fr, uint32_t num);
|
|
uint32_t get_nospam(const Friend_Requests *_Nonnull fr);
|
|
|
|
/** @brief Remove real_pk from received_requests list.
|
|
*
|
|
* @retval 0 if it removed it successfully.
|
|
* @retval -1 if it didn't find it.
|
|
*/
|
|
int remove_request_received(Friend_Requests *_Nonnull fr, const uint8_t *_Nonnull real_pk);
|
|
|
|
typedef void fr_friend_request_cb(void *_Nonnull object, const uint8_t *_Nonnull public_key, const uint8_t *_Nonnull message, size_t length,
|
|
void *_Nullable user_data);
|
|
|
|
/** Set the function that will be executed when a friend request for us is received. */
|
|
void callback_friendrequest(Friend_Requests *_Nonnull fr, fr_friend_request_cb *_Nullable function, void *_Nullable object);
|
|
|
|
typedef int filter_function_cb(void *_Nonnull object, const uint8_t *_Nonnull public_key);
|
|
|
|
/** @brief Set the function used to check if a friend request should be displayed to the user or not.
|
|
* It must return 0 if the request is ok (anything else if it is bad).
|
|
*/
|
|
void set_filter_function(Friend_Requests *_Nonnull fr, filter_function_cb *_Nullable function, void *_Nullable userdata);
|
|
|
|
/** Sets up friendreq packet handlers. */
|
|
void friendreq_init(Friend_Requests *_Nonnull fr, Friend_Connections *_Nonnull fr_c);
|
|
|
|
Friend_Requests *_Nullable friendreq_new(const Memory *_Nonnull mem);
|
|
|
|
void friendreq_kill(Friend_Requests *_Nullable fr);
|
|
#endif /* C_TOXCORE_TOXCORE_FRIEND_REQUESTS_H */
|