cae0ab9c5c
55752a2e2ef fix(toxav): pass video bit rate as kbit Previously we unintentionally made it Mbit. 7e573280a75 docs(toxav): fix docs of toxav.h - fix units to be more readable - use width before height consistently - video -> audio typo 5f88a084e8c fix: friend_connections leak on allocation failure clean up when it only contains connections in the NONE state 6d27a1ae178 fix: wrong comment for closelist ce4f29e8036 cleanup: Fix all `-Wsign-compare` warnings. 4d4251c397f chore: lower cirrus ci timeout drastically 40676284507 fix: events leak that can occur if allocation fails rare in practice, found by fuzzing 9610ac31c5f fix: Return an error instead of crashing on nullptr args in NGC. a57c2c8f956 refactor: Make ToxAV independent of toxcore internals. 5752fc29f86 refactor: Make tox-bootstrapd use bool instead of int df675786eb2 chore: Add release-drafter github action. 03fd7a69dcf chore: Use toktok's cmp instead of upstream. 350c0ba1205 cleanup: Sort apk/apt install commands in Dockerfiles. 8c1bda502cb chore(deps): bump golang.org/x/net ddb9d3210da chore: Upgrade to FreeBSD 14.1 in cirrus build. e9076f45bd3 chore(cmake): set options changes as cache and with force git-subtree-dir: external/toxcore/c-toxcore git-subtree-split: 55752a2e2ef894bfa6d7a2a21a0278e3f2bede7d
994 lines
26 KiB
C
994 lines
26 KiB
C
/* SPDX-License-Identifier: GPL-3.0-or-later
|
|
* Copyright © 2016-2018 The TokTok team.
|
|
* Copyright © 2013-2015 Tox project.
|
|
*/
|
|
#include "msi.h"
|
|
|
|
#include <assert.h>
|
|
#include <stdbool.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
|
|
#include "toxav_hacks.h"
|
|
|
|
#include "../toxcore/ccompat.h"
|
|
#include "../toxcore/logger.h"
|
|
#include "../toxcore/net_crypto.h"
|
|
#include "../toxcore/tox.h"
|
|
#include "../toxcore/tox_private.h"
|
|
#include "../toxcore/util.h"
|
|
|
|
#define MSI_MAXMSG_SIZE 256
|
|
|
|
/**
|
|
* Protocol:
|
|
*
|
|
* `|id [1 byte]| |size [1 byte]| |data [$size bytes]| |...{repeat}| |0 {end byte}|`
|
|
*/
|
|
|
|
typedef enum MSIHeaderID {
|
|
ID_REQUEST = 1,
|
|
ID_ERROR,
|
|
ID_CAPABILITIES,
|
|
} MSIHeaderID;
|
|
|
|
typedef enum MSIRequest {
|
|
REQU_INIT,
|
|
REQU_PUSH,
|
|
REQU_POP,
|
|
} MSIRequest;
|
|
|
|
typedef struct MSIHeaderRequest {
|
|
MSIRequest value;
|
|
bool exists;
|
|
} MSIHeaderRequest;
|
|
|
|
typedef struct MSIHeaderError {
|
|
MSIError value;
|
|
bool exists;
|
|
} MSIHeaderError;
|
|
|
|
typedef struct MSIHeaderCapabilities {
|
|
uint8_t value;
|
|
bool exists;
|
|
} MSIHeaderCapabilities;
|
|
|
|
typedef struct MSIMessage {
|
|
MSIHeaderRequest request;
|
|
MSIHeaderError error;
|
|
MSIHeaderCapabilities capabilities;
|
|
} MSIMessage;
|
|
|
|
static void msg_init(MSIMessage *dest, MSIRequest request);
|
|
static void kill_call(const Logger *log, MSICall *call);
|
|
static int msg_parse_in(const Logger *log, MSIMessage *dest, const uint8_t *data, uint16_t length);
|
|
static uint8_t *msg_parse_header_out(MSIHeaderID id, uint8_t *dest, const uint8_t *value, uint8_t value_len,
|
|
uint16_t *length);
|
|
static int send_message(const Logger *log, Tox *tox, uint32_t friend_number, const MSIMessage *msg);
|
|
static int send_error(const Logger *log, Tox *tox, uint32_t friend_number, MSIError error);
|
|
static MSICall *get_call(MSISession *session, uint32_t friend_number);
|
|
static MSICall *new_call(MSISession *session, uint32_t friend_number);
|
|
static bool invoke_callback(const Logger *log, MSICall *call, MSICallbackID cb);
|
|
static void handle_init(const Logger *log, MSICall *call, const MSIMessage *msg);
|
|
static void handle_push(const Logger *log, MSICall *call, const MSIMessage *msg);
|
|
static void handle_pop(const Logger *log, MSICall *call, const MSIMessage *msg);
|
|
static void handle_msi_packet(Tox *tox, uint32_t friend_number, const uint8_t *data, size_t length,
|
|
void *user_data);
|
|
|
|
/*
|
|
* Public functions
|
|
*/
|
|
|
|
void msi_callback_invite(MSISession *session, msi_action_cb *callback)
|
|
{
|
|
session->invite_callback = callback;
|
|
}
|
|
void msi_callback_start(MSISession *session, msi_action_cb *callback)
|
|
{
|
|
session->start_callback = callback;
|
|
}
|
|
void msi_callback_end(MSISession *session, msi_action_cb *callback)
|
|
{
|
|
session->end_callback = callback;
|
|
}
|
|
void msi_callback_error(MSISession *session, msi_action_cb *callback)
|
|
{
|
|
session->error_callback = callback;
|
|
}
|
|
void msi_callback_peertimeout(MSISession *session, msi_action_cb *callback)
|
|
{
|
|
session->peertimeout_callback = callback;
|
|
}
|
|
void msi_callback_capabilities(MSISession *session, msi_action_cb *callback)
|
|
{
|
|
session->capabilities_callback = callback;
|
|
}
|
|
|
|
MSISession *msi_new(const Logger *log, Tox *tox)
|
|
{
|
|
if (tox == nullptr) {
|
|
return nullptr;
|
|
}
|
|
|
|
MSISession *retu = (MSISession *)calloc(1, sizeof(MSISession));
|
|
|
|
if (retu == nullptr) {
|
|
LOGGER_ERROR(log, "Allocation failed! Program might misbehave!");
|
|
return nullptr;
|
|
}
|
|
|
|
if (create_recursive_mutex(retu->mutex) != 0) {
|
|
LOGGER_ERROR(log, "Failed to init mutex! Program might misbehave");
|
|
free(retu);
|
|
return nullptr;
|
|
}
|
|
|
|
retu->tox = tox;
|
|
|
|
// register callback
|
|
tox_callback_friend_lossless_packet_per_pktid(tox, handle_msi_packet, PACKET_ID_MSI);
|
|
|
|
LOGGER_DEBUG(log, "New msi session: %p ", (void *)retu);
|
|
return retu;
|
|
}
|
|
|
|
int msi_kill(const Logger *log, Tox *tox, MSISession *session)
|
|
{
|
|
if (session == nullptr) {
|
|
LOGGER_ERROR(log, "Tried to terminate non-existing session");
|
|
return -1;
|
|
}
|
|
|
|
// UN-register callback
|
|
tox_callback_friend_lossless_packet_per_pktid(tox, nullptr, PACKET_ID_MSI);
|
|
|
|
if (pthread_mutex_trylock(session->mutex) != 0) {
|
|
LOGGER_ERROR(log, "Failed to acquire lock on msi mutex");
|
|
return -1;
|
|
}
|
|
|
|
if (session->calls != nullptr) {
|
|
MSIMessage msg;
|
|
msg_init(&msg, REQU_POP);
|
|
|
|
MSICall *it = get_call(session, session->calls_head);
|
|
|
|
while (it != nullptr) {
|
|
send_message(log, session->tox, it->friend_number, &msg);
|
|
MSICall *temp_it = it;
|
|
it = it->next;
|
|
kill_call(log, temp_it); /* This will eventually free session->calls */
|
|
}
|
|
}
|
|
|
|
pthread_mutex_unlock(session->mutex);
|
|
pthread_mutex_destroy(session->mutex);
|
|
|
|
LOGGER_DEBUG(log, "Terminated session: %p", (void *)session);
|
|
free(session);
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* return true if friend is offline and the call was canceled.
|
|
*/
|
|
bool check_peer_offline_status(const Logger *log, const Tox *tox, MSISession *session, uint32_t friend_number)
|
|
{
|
|
if (tox == nullptr || session == nullptr) {
|
|
return false;
|
|
}
|
|
|
|
Tox_Err_Friend_Query f_con_query_error;
|
|
const Tox_Connection f_con_status = tox_friend_get_connection_status(tox, friend_number, &f_con_query_error);
|
|
|
|
if (f_con_status == TOX_CONNECTION_NONE) {
|
|
/* Friend is now offline */
|
|
LOGGER_DEBUG(log, "Friend %d is now offline", friend_number);
|
|
|
|
pthread_mutex_lock(session->mutex);
|
|
MSICall *call = get_call(session, friend_number);
|
|
|
|
if (call == nullptr) {
|
|
pthread_mutex_unlock(session->mutex);
|
|
return true;
|
|
}
|
|
|
|
invoke_callback(log, call, MSI_ON_PEERTIMEOUT); /* Failure is ignored */
|
|
kill_call(log, call);
|
|
pthread_mutex_unlock(session->mutex);
|
|
return true;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
int msi_invite(const Logger *log, MSISession *session, MSICall **call, uint32_t friend_number, uint8_t capabilities)
|
|
{
|
|
LOGGER_DEBUG(log, "msi_invite:session:%p", (void *)session);
|
|
|
|
if (session == nullptr) {
|
|
return -1;
|
|
}
|
|
|
|
LOGGER_DEBUG(log, "Session: %p Inviting friend: %u", (void *)session, friend_number);
|
|
|
|
if (pthread_mutex_trylock(session->mutex) != 0) {
|
|
LOGGER_ERROR(log, "Failed to acquire lock on msi mutex");
|
|
return -1;
|
|
}
|
|
|
|
if (get_call(session, friend_number) != nullptr) {
|
|
LOGGER_ERROR(log, "Already in a call");
|
|
pthread_mutex_unlock(session->mutex);
|
|
return -1;
|
|
}
|
|
|
|
MSICall *temp = new_call(session, friend_number);
|
|
|
|
if (temp == nullptr) {
|
|
pthread_mutex_unlock(session->mutex);
|
|
return -1;
|
|
}
|
|
|
|
temp->self_capabilities = capabilities;
|
|
|
|
MSIMessage msg;
|
|
msg_init(&msg, REQU_INIT);
|
|
|
|
msg.capabilities.exists = true;
|
|
msg.capabilities.value = capabilities;
|
|
|
|
send_message(log, temp->session->tox, temp->friend_number, &msg);
|
|
|
|
temp->state = MSI_CALL_REQUESTING;
|
|
|
|
*call = temp;
|
|
|
|
LOGGER_DEBUG(log, "Invite sent");
|
|
pthread_mutex_unlock(session->mutex);
|
|
return 0;
|
|
}
|
|
|
|
int msi_hangup(const Logger *log, MSICall *call)
|
|
{
|
|
if (call == nullptr || call->session == nullptr) {
|
|
return -1;
|
|
}
|
|
|
|
MSISession *session = call->session;
|
|
|
|
LOGGER_DEBUG(log, "Session: %p Hanging up call with friend: %u", (void *)call->session,
|
|
call->friend_number);
|
|
|
|
if (pthread_mutex_trylock(session->mutex) != 0) {
|
|
LOGGER_ERROR(log, "Failed to acquire lock on msi mutex");
|
|
return -1;
|
|
}
|
|
|
|
if (call->state == MSI_CALL_INACTIVE) {
|
|
LOGGER_ERROR(log, "Call is in invalid state!");
|
|
pthread_mutex_unlock(session->mutex);
|
|
return -1;
|
|
}
|
|
|
|
MSIMessage msg;
|
|
msg_init(&msg, REQU_POP);
|
|
|
|
send_message(log, session->tox, call->friend_number, &msg);
|
|
|
|
kill_call(log, call);
|
|
pthread_mutex_unlock(session->mutex);
|
|
return 0;
|
|
}
|
|
|
|
int msi_answer(const Logger *log, MSICall *call, uint8_t capabilities)
|
|
{
|
|
if (call == nullptr || call->session == nullptr) {
|
|
return -1;
|
|
}
|
|
|
|
MSISession *session = call->session;
|
|
|
|
LOGGER_DEBUG(log, "Session: %p Answering call from: %u", (void *)call->session,
|
|
call->friend_number);
|
|
|
|
if (pthread_mutex_trylock(session->mutex) != 0) {
|
|
LOGGER_ERROR(log, "Failed to acquire lock on msi mutex");
|
|
return -1;
|
|
}
|
|
|
|
if (call->state != MSI_CALL_REQUESTED) {
|
|
/* Though sending in invalid state will not cause anything weird
|
|
* Its better to not do it like a maniac */
|
|
LOGGER_ERROR(log, "Call is in invalid state!");
|
|
pthread_mutex_unlock(session->mutex);
|
|
return -1;
|
|
}
|
|
|
|
call->self_capabilities = capabilities;
|
|
|
|
MSIMessage msg;
|
|
msg_init(&msg, REQU_PUSH);
|
|
|
|
msg.capabilities.exists = true;
|
|
msg.capabilities.value = capabilities;
|
|
|
|
send_message(log, session->tox, call->friend_number, &msg);
|
|
|
|
call->state = MSI_CALL_ACTIVE;
|
|
pthread_mutex_unlock(session->mutex);
|
|
|
|
return 0;
|
|
}
|
|
|
|
int msi_change_capabilities(const Logger *log, MSICall *call, uint8_t capabilities)
|
|
{
|
|
if (call == nullptr || call->session == nullptr) {
|
|
return -1;
|
|
}
|
|
|
|
MSISession *session = call->session;
|
|
|
|
LOGGER_DEBUG(log, "Session: %p Trying to change capabilities to friend %u", (void *)call->session,
|
|
call->friend_number);
|
|
|
|
if (pthread_mutex_trylock(session->mutex) != 0) {
|
|
LOGGER_ERROR(log, "Failed to acquire lock on msi mutex");
|
|
return -1;
|
|
}
|
|
|
|
if (call->state != MSI_CALL_ACTIVE) {
|
|
LOGGER_ERROR(log, "Call is in invalid state!");
|
|
pthread_mutex_unlock(session->mutex);
|
|
return -1;
|
|
}
|
|
|
|
call->self_capabilities = capabilities;
|
|
|
|
MSIMessage msg;
|
|
msg_init(&msg, REQU_PUSH);
|
|
|
|
msg.capabilities.exists = true;
|
|
msg.capabilities.value = capabilities;
|
|
|
|
send_message(log, call->session->tox, call->friend_number, &msg);
|
|
|
|
pthread_mutex_unlock(session->mutex);
|
|
return 0;
|
|
}
|
|
|
|
/**
|
|
* Private functions
|
|
*/
|
|
static void msg_init(MSIMessage *dest, MSIRequest request)
|
|
{
|
|
memset(dest, 0, sizeof(*dest));
|
|
dest->request.exists = true;
|
|
dest->request.value = request;
|
|
}
|
|
|
|
static bool check_size(const Logger *log, const uint8_t *bytes, int *constraint, uint8_t size)
|
|
{
|
|
*constraint -= 2 + size;
|
|
|
|
if (*constraint < 1) {
|
|
LOGGER_ERROR(log, "Read over length!");
|
|
return false;
|
|
}
|
|
|
|
if (bytes[1] != size) {
|
|
LOGGER_ERROR(log, "Invalid data size!");
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
/** Assumes size == 1 */
|
|
static bool check_enum_high(const Logger *log, const uint8_t *bytes, uint8_t enum_high)
|
|
{
|
|
if (bytes[2] > enum_high) {
|
|
LOGGER_ERROR(log, "Failed enum high limit!");
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
static const uint8_t *msg_parse_one(const Logger *log, MSIMessage *dest, const uint8_t *it, int *size_constraint)
|
|
{
|
|
switch (*it) {
|
|
case ID_REQUEST: {
|
|
if (!check_size(log, it, size_constraint, 1) ||
|
|
!check_enum_high(log, it, REQU_POP)) {
|
|
return nullptr;
|
|
}
|
|
|
|
dest->request.value = (MSIRequest)it[2];
|
|
dest->request.exists = true;
|
|
return it + 3;
|
|
}
|
|
|
|
case ID_ERROR: {
|
|
if (!check_size(log, it, size_constraint, 1) ||
|
|
!check_enum_high(log, it, MSI_E_UNDISCLOSED)) {
|
|
return nullptr;
|
|
}
|
|
|
|
dest->error.value = (MSIError)it[2];
|
|
dest->error.exists = true;
|
|
return it + 3;
|
|
}
|
|
|
|
case ID_CAPABILITIES: {
|
|
if (!check_size(log, it, size_constraint, 1)) {
|
|
return nullptr;
|
|
}
|
|
|
|
dest->capabilities.value = it[2];
|
|
dest->capabilities.exists = true;
|
|
return it + 3;
|
|
}
|
|
|
|
default: {
|
|
LOGGER_ERROR(log, "Invalid id byte: %d", *it);
|
|
return nullptr;
|
|
}
|
|
}
|
|
}
|
|
|
|
static int msg_parse_in(const Logger *log, MSIMessage *dest, const uint8_t *data, uint16_t length)
|
|
{
|
|
/* Parse raw data received from socket into MSIMessage struct */
|
|
assert(dest != nullptr);
|
|
|
|
if (length == 0 || data[length - 1] != 0) { /* End byte must have value 0 */
|
|
LOGGER_ERROR(log, "Invalid end byte");
|
|
return -1;
|
|
}
|
|
|
|
memset(dest, 0, sizeof(*dest));
|
|
|
|
const uint8_t *it = data;
|
|
int size_constraint = length;
|
|
|
|
while (*it != 0) {/* until end byte is hit */
|
|
it = msg_parse_one(log, dest, it, &size_constraint);
|
|
|
|
if (it == nullptr) {
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
if (!dest->request.exists) {
|
|
LOGGER_ERROR(log, "Invalid request field!");
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static uint8_t *msg_parse_header_out(MSIHeaderID id, uint8_t *dest, const uint8_t *value, uint8_t value_len,
|
|
uint16_t *length)
|
|
{
|
|
/* Parse a single header for sending */
|
|
assert(dest != nullptr);
|
|
assert(value != nullptr);
|
|
assert(value_len != 0);
|
|
|
|
*dest = id;
|
|
++dest;
|
|
*dest = value_len;
|
|
++dest;
|
|
|
|
memcpy(dest, value, value_len);
|
|
|
|
*length += 2 + value_len;
|
|
|
|
return dest + value_len; /* Set to next position ready to be written */
|
|
}
|
|
|
|
/* Send an msi packet.
|
|
*
|
|
* return 1 on success
|
|
* return 0 on failure
|
|
*/
|
|
static int m_msi_packet(Tox *tox, int32_t friendnumber, const uint8_t *data, uint16_t length)
|
|
{
|
|
// TODO(Zoff): make this better later! -------------------
|
|
/* we need to prepend 1 byte (packet id) to data
|
|
* do this without malloc, memcpy and free in the future
|
|
*/
|
|
const size_t length_new = (size_t)length + 1;
|
|
uint8_t *data_new = (uint8_t *)malloc(length_new);
|
|
|
|
if (data_new == nullptr) {
|
|
return 0;
|
|
}
|
|
|
|
data_new[0] = PACKET_ID_MSI;
|
|
|
|
if (length != 0) {
|
|
memcpy(data_new + 1, data, length);
|
|
}
|
|
|
|
Tox_Err_Friend_Custom_Packet error;
|
|
tox_friend_send_lossless_packet(tox, friendnumber, data_new, length_new, &error);
|
|
|
|
free(data_new);
|
|
|
|
if (error == TOX_ERR_FRIEND_CUSTOM_PACKET_OK) {
|
|
return 1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int send_message(const Logger *log, Tox *tox, uint32_t friend_number, const MSIMessage *msg)
|
|
{
|
|
assert(tox != nullptr);
|
|
|
|
/* Parse and send message */
|
|
uint8_t parsed[MSI_MAXMSG_SIZE];
|
|
|
|
uint8_t *it = parsed;
|
|
uint16_t size = 0;
|
|
|
|
if (msg->request.exists) {
|
|
uint8_t cast = msg->request.value;
|
|
it = msg_parse_header_out(ID_REQUEST, it, &cast,
|
|
sizeof(cast), &size);
|
|
} else {
|
|
LOGGER_DEBUG(log, "Must have request field");
|
|
return -1;
|
|
}
|
|
|
|
if (msg->error.exists) {
|
|
uint8_t cast = msg->error.value;
|
|
it = msg_parse_header_out(ID_ERROR, it, &cast,
|
|
sizeof(cast), &size);
|
|
}
|
|
|
|
if (msg->capabilities.exists) {
|
|
it = msg_parse_header_out(ID_CAPABILITIES, it, &msg->capabilities.value,
|
|
sizeof(msg->capabilities.value), &size);
|
|
}
|
|
|
|
if (it == parsed) {
|
|
LOGGER_WARNING(log, "Parsing message failed; empty message");
|
|
return -1;
|
|
}
|
|
|
|
*it = 0;
|
|
++size;
|
|
|
|
if (m_msi_packet(tox, friend_number, parsed, size) == 1) {
|
|
LOGGER_DEBUG(log, "Sent message");
|
|
return 0;
|
|
}
|
|
|
|
return -1;
|
|
}
|
|
|
|
static int send_error(const Logger *log, Tox *tox, uint32_t friend_number, MSIError error)
|
|
{
|
|
assert(tox != nullptr);
|
|
|
|
/* Send error message */
|
|
LOGGER_DEBUG(log, "Sending error: %d to friend: %d", error, friend_number);
|
|
|
|
MSIMessage msg;
|
|
msg_init(&msg, REQU_POP);
|
|
|
|
msg.error.exists = true;
|
|
msg.error.value = error;
|
|
|
|
send_message(log, tox, friend_number, &msg);
|
|
return 0;
|
|
}
|
|
|
|
static int invoke_callback_inner(const Logger *log, MSICall *call, MSICallbackID id)
|
|
{
|
|
MSISession *session = call->session;
|
|
LOGGER_DEBUG(log, "invoking callback function: %d", id);
|
|
|
|
switch (id) {
|
|
case MSI_ON_INVITE:
|
|
return session->invite_callback(session->av, call);
|
|
|
|
case MSI_ON_START:
|
|
return session->start_callback(session->av, call);
|
|
|
|
case MSI_ON_END:
|
|
return session->end_callback(session->av, call);
|
|
|
|
case MSI_ON_ERROR:
|
|
return session->error_callback(session->av, call);
|
|
|
|
case MSI_ON_PEERTIMEOUT:
|
|
return session->peertimeout_callback(session->av, call);
|
|
|
|
case MSI_ON_CAPABILITIES:
|
|
return session->capabilities_callback(session->av, call);
|
|
}
|
|
|
|
LOGGER_FATAL(log, "invalid callback id: %d", id);
|
|
return -1;
|
|
}
|
|
|
|
static bool invoke_callback(const Logger *log, MSICall *call, MSICallbackID cb)
|
|
{
|
|
assert(call != nullptr);
|
|
|
|
if (invoke_callback_inner(log, call, cb) != 0) {
|
|
LOGGER_WARNING(log,
|
|
"Callback state handling failed, sending error");
|
|
|
|
/* If no callback present or error happened while handling,
|
|
* an error message will be sent to friend
|
|
*/
|
|
if (call->error == MSI_E_NONE) {
|
|
call->error = MSI_E_HANDLE;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
static MSICall *get_call(MSISession *session, uint32_t friend_number)
|
|
{
|
|
assert(session != nullptr);
|
|
|
|
if (session->calls == nullptr || session->calls_tail < friend_number) {
|
|
return nullptr;
|
|
}
|
|
|
|
return session->calls[friend_number];
|
|
}
|
|
|
|
static MSICall *new_call(MSISession *session, uint32_t friend_number)
|
|
{
|
|
assert(session != nullptr);
|
|
|
|
MSICall *rc = (MSICall *)calloc(1, sizeof(MSICall));
|
|
|
|
if (rc == nullptr) {
|
|
return nullptr;
|
|
}
|
|
|
|
rc->session = session;
|
|
rc->friend_number = friend_number;
|
|
|
|
if (session->calls == nullptr) { /* Creating */
|
|
session->calls = (MSICall **)calloc(friend_number + 1, sizeof(MSICall *));
|
|
|
|
if (session->calls == nullptr) {
|
|
free(rc);
|
|
return nullptr;
|
|
}
|
|
|
|
session->calls_tail = friend_number;
|
|
session->calls_head = friend_number;
|
|
} else if (session->calls_tail < friend_number) { /* Appending */
|
|
MSICall **tmp = (MSICall **)realloc(session->calls, (friend_number + 1) * sizeof(MSICall *));
|
|
|
|
if (tmp == nullptr) {
|
|
free(rc);
|
|
return nullptr;
|
|
}
|
|
|
|
session->calls = tmp;
|
|
|
|
/* Set fields in between to null */
|
|
for (uint32_t i = session->calls_tail + 1; i < friend_number; ++i) {
|
|
session->calls[i] = nullptr;
|
|
}
|
|
|
|
rc->prev = session->calls[session->calls_tail];
|
|
session->calls[session->calls_tail]->next = rc;
|
|
|
|
session->calls_tail = friend_number;
|
|
} else if (session->calls_head > friend_number) { /* Inserting at front */
|
|
rc->next = session->calls[session->calls_head];
|
|
session->calls[session->calls_head]->prev = rc;
|
|
session->calls_head = friend_number;
|
|
}
|
|
|
|
session->calls[friend_number] = rc;
|
|
return rc;
|
|
}
|
|
|
|
static void kill_call(const Logger *log, MSICall *call)
|
|
{
|
|
/* Assume that session mutex is locked */
|
|
if (call == nullptr) {
|
|
return;
|
|
}
|
|
|
|
MSISession *session = call->session;
|
|
|
|
LOGGER_DEBUG(log, "Killing call: %p", (void *)call);
|
|
|
|
MSICall *prev = call->prev;
|
|
MSICall *next = call->next;
|
|
|
|
if (prev != nullptr) {
|
|
prev->next = next;
|
|
} else if (next != nullptr) {
|
|
session->calls_head = next->friend_number;
|
|
} else {
|
|
goto CLEAR_CONTAINER;
|
|
}
|
|
|
|
if (next != nullptr) {
|
|
next->prev = prev;
|
|
} else if (prev != nullptr) {
|
|
session->calls_tail = prev->friend_number;
|
|
} else {
|
|
goto CLEAR_CONTAINER;
|
|
}
|
|
|
|
session->calls[call->friend_number] = nullptr;
|
|
free(call);
|
|
return;
|
|
|
|
CLEAR_CONTAINER:
|
|
session->calls_head = 0;
|
|
session->calls_tail = 0;
|
|
free(session->calls);
|
|
free(call);
|
|
session->calls = nullptr;
|
|
}
|
|
|
|
|
|
static bool try_handle_init(const Logger *log, MSICall *call, const MSIMessage *msg)
|
|
{
|
|
if (!msg->capabilities.exists) {
|
|
LOGGER_WARNING(log, "Session: %p Invalid capabilities on 'init'", (void *)call->session);
|
|
call->error = MSI_E_INVALID_MESSAGE;
|
|
return false;
|
|
}
|
|
|
|
switch (call->state) {
|
|
case MSI_CALL_INACTIVE: {
|
|
/* Call requested */
|
|
call->peer_capabilities = msg->capabilities.value;
|
|
call->state = MSI_CALL_REQUESTED;
|
|
|
|
if (!invoke_callback(log, call, MSI_ON_INVITE)) {
|
|
return false;
|
|
}
|
|
|
|
break;
|
|
}
|
|
|
|
case MSI_CALL_ACTIVE: {
|
|
/* If peer sent init while the call is already
|
|
* active it's probable that he is trying to
|
|
* re-call us while the call is not terminated
|
|
* on our side. We can assume that in this case
|
|
* we can automatically answer the re-call.
|
|
*/
|
|
|
|
LOGGER_INFO(log, "Friend is recalling us");
|
|
|
|
MSIMessage out_msg;
|
|
msg_init(&out_msg, REQU_PUSH);
|
|
|
|
out_msg.capabilities.exists = true;
|
|
out_msg.capabilities.value = call->self_capabilities;
|
|
|
|
send_message(log, call->session->tox, call->friend_number, &out_msg);
|
|
|
|
/* If peer changed capabilities during re-call they will
|
|
* be handled accordingly during the next step
|
|
*/
|
|
break;
|
|
}
|
|
|
|
case MSI_CALL_REQUESTED: // fall-through
|
|
case MSI_CALL_REQUESTING: {
|
|
LOGGER_WARNING(log, "Session: %p Invalid state on 'init'", (void *)call->session);
|
|
call->error = MSI_E_INVALID_STATE;
|
|
return false;
|
|
}
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
static void handle_init(const Logger *log, MSICall *call, const MSIMessage *msg)
|
|
{
|
|
assert(call != nullptr);
|
|
LOGGER_DEBUG(log,
|
|
"Session: %p Handling 'init' friend: %d", (void *)call->session, call->friend_number);
|
|
|
|
if (!try_handle_init(log, call, msg)) {
|
|
send_error(log, call->session->tox, call->friend_number, call->error);
|
|
kill_call(log, call);
|
|
}
|
|
}
|
|
|
|
static void handle_push(const Logger *log, MSICall *call, const MSIMessage *msg)
|
|
{
|
|
assert(call != nullptr);
|
|
|
|
LOGGER_DEBUG(log, "Session: %p Handling 'push' friend: %d", (void *)call->session,
|
|
call->friend_number);
|
|
|
|
if (!msg->capabilities.exists) {
|
|
LOGGER_WARNING(log, "Session: %p Invalid capabilities on 'push'", (void *)call->session);
|
|
call->error = MSI_E_INVALID_MESSAGE;
|
|
goto FAILURE;
|
|
}
|
|
|
|
switch (call->state) {
|
|
case MSI_CALL_ACTIVE: {
|
|
if (call->peer_capabilities != msg->capabilities.value) {
|
|
LOGGER_INFO(log, "Friend is changing capabilities to: %u", msg->capabilities.value);
|
|
|
|
call->peer_capabilities = msg->capabilities.value;
|
|
|
|
if (!invoke_callback(log, call, MSI_ON_CAPABILITIES)) {
|
|
goto FAILURE;
|
|
}
|
|
}
|
|
|
|
break;
|
|
}
|
|
|
|
case MSI_CALL_REQUESTING: {
|
|
LOGGER_INFO(log, "Friend answered our call");
|
|
|
|
/* Call started */
|
|
call->peer_capabilities = msg->capabilities.value;
|
|
call->state = MSI_CALL_ACTIVE;
|
|
|
|
if (!invoke_callback(log, call, MSI_ON_START)) {
|
|
goto FAILURE;
|
|
}
|
|
|
|
break;
|
|
}
|
|
|
|
case MSI_CALL_INACTIVE: // fall-through
|
|
case MSI_CALL_REQUESTED: {
|
|
LOGGER_WARNING(log, "Ignoring invalid push");
|
|
break;
|
|
}
|
|
}
|
|
|
|
return;
|
|
|
|
FAILURE:
|
|
send_error(log, call->session->tox, call->friend_number, call->error);
|
|
kill_call(log, call);
|
|
}
|
|
|
|
static void handle_pop(const Logger *log, MSICall *call, const MSIMessage *msg)
|
|
{
|
|
assert(call != nullptr);
|
|
|
|
LOGGER_DEBUG(log, "Session: %p Handling 'pop', friend id: %d", (void *)call->session,
|
|
call->friend_number);
|
|
|
|
/* callback errors are ignored */
|
|
|
|
if (msg->error.exists) {
|
|
LOGGER_WARNING(log, "Friend detected an error: %d", msg->error.value);
|
|
call->error = msg->error.value;
|
|
invoke_callback(log, call, MSI_ON_ERROR);
|
|
} else {
|
|
switch (call->state) {
|
|
case MSI_CALL_INACTIVE: {
|
|
LOGGER_FATAL(log, "Handling what should be impossible case");
|
|
break;
|
|
}
|
|
|
|
case MSI_CALL_ACTIVE: {
|
|
/* Hangup */
|
|
LOGGER_INFO(log, "Friend hung up on us");
|
|
invoke_callback(log, call, MSI_ON_END);
|
|
break;
|
|
}
|
|
|
|
case MSI_CALL_REQUESTING: {
|
|
/* Reject */
|
|
LOGGER_INFO(log, "Friend rejected our call");
|
|
invoke_callback(log, call, MSI_ON_END);
|
|
break;
|
|
}
|
|
|
|
case MSI_CALL_REQUESTED: {
|
|
/* Cancel */
|
|
LOGGER_INFO(log, "Friend canceled call invite");
|
|
invoke_callback(log, call, MSI_ON_END);
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
kill_call(log, call);
|
|
}
|
|
|
|
static void handle_msi_packet(Tox *tox, uint32_t friend_number, const uint8_t *data, size_t length,
|
|
void *user_data)
|
|
{
|
|
const ToxAV *toxav = (ToxAV *)tox_get_av_object(tox);
|
|
|
|
if (toxav == nullptr) {
|
|
return;
|
|
}
|
|
|
|
const Logger *log = toxav_get_logger(toxav);
|
|
|
|
if (length < 2) {
|
|
LOGGER_ERROR(log, "MSI packet is less than 2 bytes in size");
|
|
// we need more than the ID byte for MSI messages
|
|
return;
|
|
}
|
|
|
|
const uint16_t payload_length = (uint16_t)(length - 1);
|
|
|
|
// Zoff: do not show the first byte, its always "PACKET_ID_MSI"
|
|
const uint8_t *data_strip_id_byte = data + 1;
|
|
|
|
LOGGER_DEBUG(log, "Got msi message");
|
|
|
|
MSISession *session = tox_av_msi_get(toxav);
|
|
|
|
if (session == nullptr) {
|
|
return;
|
|
}
|
|
|
|
MSIMessage msg;
|
|
|
|
if (msg_parse_in(log, &msg, data_strip_id_byte, payload_length) == -1) {
|
|
LOGGER_WARNING(log, "Error parsing message");
|
|
send_error(log, tox, friend_number, MSI_E_INVALID_MESSAGE);
|
|
return;
|
|
}
|
|
|
|
LOGGER_DEBUG(log, "Successfully parsed message");
|
|
|
|
pthread_mutex_lock(session->mutex);
|
|
MSICall *call = get_call(session, friend_number);
|
|
|
|
if (call == nullptr) {
|
|
if (msg.request.value != REQU_INIT) {
|
|
send_error(log, tox, friend_number, MSI_E_STRAY_MESSAGE);
|
|
pthread_mutex_unlock(session->mutex);
|
|
return;
|
|
}
|
|
|
|
call = new_call(session, friend_number);
|
|
|
|
if (call == nullptr) {
|
|
send_error(log, tox, friend_number, MSI_E_SYSTEM);
|
|
pthread_mutex_unlock(session->mutex);
|
|
return;
|
|
}
|
|
}
|
|
|
|
switch (msg.request.value) {
|
|
case REQU_INIT: {
|
|
handle_init(log, call, &msg);
|
|
break;
|
|
}
|
|
|
|
case REQU_PUSH: {
|
|
handle_push(log, call, &msg);
|
|
break;
|
|
}
|
|
|
|
case REQU_POP: {
|
|
handle_pop(log, call, &msg); /* always kills the call */
|
|
break;
|
|
}
|
|
}
|
|
|
|
pthread_mutex_unlock(session->mutex);
|
|
}
|