forked from Green-Sky/tomato
Squashed 'external/toxcore/c-toxcore/' changes from d9b8fa6098d..81b1e4f6348
81b1e4f6348 chore: Release v0.2.21-rc.1 9303e2e49a1 chore: Update the pkgsrc versions in the update-versions tool 71ec4b3b1e9 chore: Update the version-sync script to work in a post-tox.api.h world 66da842f753 chore: Add version update script compatible with ci-tools. 199878f7660 chore: Use new bazel script for circle ci. 8278e9cda46 chore: Add release issue template and workflow. a9bb3a1c4d1 chore: Fix alpine-s390x build. 6e0a641272e chore: Add a source tarball deploy workflow. 4adebe4d8b1 chore: Don't upload ios/macos variants in deploy workflows. 18f1d858ccb chore: Move one of the 3 freebsd builds to post-submit. 432ab60c002 feat: Add a Makefile for the single file deploy build. a86c0011fd5 chore: Add deploy job for single C file library. 2e7495e8f2a docs: Update changelog format to use the new clog-compatible way. a682da99e84 chore: Export wasmExports from the wasm binary. 12f34cdff27 chore: Add wasm to the nightly binary deploys. 1451029613f chore: Add strict-abi support for macOS/iOS. c53c30e09d9 chore: Add time option to manual fuzz trigger. 2ccecdc2a1a chore: Add remaining fuzz tests to cflite. 4626c2e230e test: Add a Net_Crypto fuzz test. b4a0e617c48 refactor: Use IP string length from ip_ntoa instead of strlen. b85b91f22f6 cleanup: rename getnodes/sendnodes to nodes request/response This change alignes the naming to be closer to the spec and make it less ambiguous. This change also changes the naming of some private/experimental marked APIs. - tox_callback_dht_nodes_response() - tox_dht_nodes_request() - Tox_Event_Dht_Get_Nodes_Response f1991aaa029 perf: Use stack allocation for strerror rendering. 3984211ccbf cleanup: remove kicked peers from saved peers list 26a991ed2be fix: ip to string function not accepting tcp families 712861f2e6d cleanup: Make websockify output qtox-compatible logging. 01932ea2f73 chore: Add opus and vpx to the toxcore wasm build. d29c42ef631 refactor: don't fully discard received DHT nodes. This is mostly forward thinking, where we might introduce other ip families, in addition to ipv4, ipv6, tcp_ipv4 etc. 21e2325934f chore: Fix xcframework tarball creation. b10c8b766ba chore: Fix xcframework checksum creation. 93787a9322e chore: Add ios/macos framework build. 9f723f891d3 fix: run do_gca also in bootstrap nodes 496cc703556 chore: Support arm64 iphone simulator. aa0e2a8e928 chore: Add support for more iOS architectures. 13ad8e81cbf chore: Add binary deploy workflows. c8344726378 refactor: Move tox_log_level out into its own file. 8799bea76c3 cleanup: Mark events/dispatch headers as experimental. d4164edb548 refactor: Remove tox_types.h; use `struct` tags instead. d408c982090 refactor: Move `Tox_Options` to `tox_options.h`. 5ab42d41209 chore: Move most cirrus jobs to circleci. 463eeae1144 cleanup: Avoid clashing with global define `DEBUG`. 92cc1e91747 refactor: Make Tox_Options own the passed proxy host and savedata. f276b397226 test: Add some more asserts for I/O and alloc to succeed. edb4dfc4869 fix: Don't crash on malloc failures in bin_unpack. be457d5d0b2 cleanup: Use tox memory for bin_unpack and net_strerror. git-subtree-dir: external/toxcore/c-toxcore git-subtree-split: 81b1e4f6348124784088591c4fe9ab41e273031d
This commit is contained in:
@ -264,9 +264,11 @@ static int make_family(Family tox_family)
|
||||
{
|
||||
switch (tox_family.value) {
|
||||
case TOX_AF_INET:
|
||||
case TCP_INET:
|
||||
return AF_INET;
|
||||
|
||||
case TOX_AF_INET6:
|
||||
case TCP_INET6:
|
||||
return AF_INET6;
|
||||
|
||||
case TOX_AF_UNSPEC:
|
||||
@ -590,7 +592,11 @@ static int sys_getsockopt(void *obj, Socket sock, int level, int optname, void *
|
||||
non_null()
|
||||
static int sys_setsockopt(void *obj, Socket sock, int level, int optname, const void *optval, size_t optlen)
|
||||
{
|
||||
#ifdef EMSCRIPTEN
|
||||
return 0;
|
||||
#else
|
||||
return setsockopt(net_socket_to_native(sock), level, optname, (const char *)optval, optlen);
|
||||
#endif /* EMSCRIPTEN */
|
||||
}
|
||||
|
||||
// sets and fills an array of addrs for address
|
||||
@ -770,11 +776,11 @@ static const char *net_packet_type_name(Net_Packet_Type type)
|
||||
case NET_PACKET_PING_RESPONSE:
|
||||
return "PING_RESPONSE";
|
||||
|
||||
case NET_PACKET_GET_NODES:
|
||||
return "GET_NODES";
|
||||
case NET_PACKET_NODES_REQUEST:
|
||||
return "NODES_REQUEST";
|
||||
|
||||
case NET_PACKET_SEND_NODES_IPV6:
|
||||
return "SEND_NODES_IPV6";
|
||||
case NET_PACKET_NODES_RESPONSE:
|
||||
return "NODES_RESPONSE";
|
||||
|
||||
case NET_PACKET_COOKIE_REQUEST:
|
||||
return "COOKIE_REQUEST";
|
||||
@ -883,13 +889,12 @@ static void loglogdata(const Logger *log, const char *message, const uint8_t *bu
|
||||
if (res < 0) { /* Windows doesn't necessarily know `%zu` */
|
||||
Ip_Ntoa ip_str;
|
||||
const int error = net_error();
|
||||
char *strerror = net_new_strerror(error);
|
||||
Net_Strerror error_str;
|
||||
LOGGER_TRACE(log, "[%02x = %-21s] %s %3u%c %s:%u (%u: %s) | %08x%08x...%02x",
|
||||
buffer[0], net_packet_type_name((Net_Packet_Type)buffer[0]), message,
|
||||
min_u16(buflen, 999), 'E',
|
||||
net_ip_ntoa(&ip_port->ip, &ip_str), net_ntohs(ip_port->port), error,
|
||||
strerror, data_0(buflen, buffer), data_1(buflen, buffer), buffer[buflen - 1]);
|
||||
net_kill_strerror(strerror);
|
||||
net_strerror(error, &error_str), data_0(buflen, buffer), data_1(buflen, buffer), buffer[buflen - 1]);
|
||||
} else if ((res > 0) && ((size_t)res <= buflen)) {
|
||||
Ip_Ntoa ip_str;
|
||||
LOGGER_TRACE(log, "[%02x = %-21s] %s %3u%c %s:%u (%u: %s) | %08x%08x...%02x",
|
||||
@ -1048,7 +1053,7 @@ int send_packet(const Networking_Core *net, const IP_Port *ip_port, Packet packe
|
||||
|
||||
if (net_family_is_unspec(net->family)) { /* Socket not initialized */
|
||||
// TODO(iphydf): Make this an error. Currently, the onion client calls
|
||||
// this via DHT getnodes.
|
||||
// this via DHT nodes requests.
|
||||
LOGGER_WARNING(net->log, "attempted to send message of length %u on uninitialised socket", packet.length);
|
||||
return -1;
|
||||
}
|
||||
@ -1131,7 +1136,7 @@ int sendpacket(const Networking_Core *net, const IP_Port *ip_port, const uint8_t
|
||||
* Packet length is put into length.
|
||||
*/
|
||||
non_null()
|
||||
static int receivepacket(const Network *ns, const Memory *mem, const Logger *log, Socket sock, IP_Port *ip_port, uint8_t *data, uint32_t *length)
|
||||
static int receivepacket(const Network *ns, const Logger *log, Socket sock, IP_Port *ip_port, uint8_t *data, uint32_t *length)
|
||||
{
|
||||
memset(ip_port, 0, sizeof(IP_Port));
|
||||
Network_Addr addr = {{0}};
|
||||
@ -1144,9 +1149,8 @@ static int receivepacket(const Network *ns, const Memory *mem, const Logger *log
|
||||
const int error = net_error();
|
||||
|
||||
if (!should_ignore_recv_error(error)) {
|
||||
char *strerror = net_new_strerror(error);
|
||||
LOGGER_ERROR(log, "unexpected error reading from socket: %u, %s", error, strerror);
|
||||
net_kill_strerror(strerror);
|
||||
Net_Strerror error_str;
|
||||
LOGGER_ERROR(log, "unexpected error reading from socket: %u, %s", error, net_strerror(error, &error_str));
|
||||
}
|
||||
|
||||
return -1; /* Nothing received. */
|
||||
@ -1210,7 +1214,7 @@ void networking_poll(const Networking_Core *net, void *userdata)
|
||||
uint8_t data[MAX_UDP_PACKET_SIZE] = {0};
|
||||
uint32_t length;
|
||||
|
||||
while (receivepacket(net->ns, net->mem, net->log, net->sock, &ip_port, data, &length) != -1) {
|
||||
while (receivepacket(net->ns, net->log, net->sock, &ip_port, data, &length) != -1) {
|
||||
if (length < 1) {
|
||||
continue;
|
||||
}
|
||||
@ -1298,9 +1302,8 @@ Networking_Core *new_networking_ex(
|
||||
/* Check for socket error. */
|
||||
if (!sock_valid(temp->sock)) {
|
||||
const int neterror = net_error();
|
||||
char *strerror = net_new_strerror(neterror);
|
||||
LOGGER_ERROR(log, "failed to get a socket?! %d, %s", neterror, strerror);
|
||||
net_kill_strerror(strerror);
|
||||
Net_Strerror error_str;
|
||||
LOGGER_ERROR(log, "failed to get a socket?! %d, %s", neterror, net_strerror(neterror, &error_str));
|
||||
netprof_kill(mem, temp->udp_net_profile);
|
||||
mem_delete(mem, temp);
|
||||
|
||||
@ -1402,15 +1405,13 @@ Networking_Core *new_networking_ex(
|
||||
const int res = net_setsockopt(ns, temp->sock, IPPROTO_IPV6, IPV6_ADD_MEMBERSHIP, &mreq, sizeof(mreq));
|
||||
|
||||
const int neterror = net_error();
|
||||
char *strerror = net_new_strerror(neterror);
|
||||
Net_Strerror error_str;
|
||||
|
||||
if (res < 0) {
|
||||
LOGGER_INFO(log, "Failed to activate local multicast membership in FF02::1. (%d, %s)", neterror, strerror);
|
||||
LOGGER_INFO(log, "Failed to activate local multicast membership in FF02::1. (%d, %s)", neterror, net_strerror(neterror, &error_str));
|
||||
} else {
|
||||
LOGGER_TRACE(log, "Local multicast group joined successfully. (%d, %s)", neterror, strerror);
|
||||
LOGGER_TRACE(log, "Local multicast group joined successfully. (%d, %s)", neterror, net_strerror(neterror, &error_str));
|
||||
}
|
||||
|
||||
net_kill_strerror(strerror);
|
||||
#endif /* ESP_PLATFORM */
|
||||
}
|
||||
|
||||
@ -1468,10 +1469,9 @@ Networking_Core *new_networking_ex(
|
||||
|
||||
Ip_Ntoa ip_str;
|
||||
const int neterror = net_error();
|
||||
char *strerror = net_new_strerror(neterror);
|
||||
Net_Strerror error_str;
|
||||
LOGGER_ERROR(log, "failed to bind socket: %d, %s IP: %s port_from: %u port_to: %u",
|
||||
neterror, strerror, net_ip_ntoa(ip, &ip_str), port_from, port_to);
|
||||
net_kill_strerror(strerror);
|
||||
neterror, net_strerror(neterror, &error_str), net_ip_ntoa(ip, &ip_str), port_from, port_to);
|
||||
kill_networking(temp);
|
||||
|
||||
if (error != nullptr) {
|
||||
@ -1878,14 +1878,14 @@ bool ip_parse_addr(const IP *ip, char *address, size_t length)
|
||||
return false;
|
||||
}
|
||||
|
||||
if (net_family_is_ipv4(ip->family)) {
|
||||
if (net_family_is_ipv4(ip->family) || net_family_is_tcp_ipv4(ip->family)) {
|
||||
struct in_addr addr;
|
||||
assert(make_family(ip->family) == AF_INET);
|
||||
fill_addr4(&ip->ip.v4, &addr);
|
||||
return inet_ntop4(&addr, address, length) != nullptr;
|
||||
}
|
||||
|
||||
if (net_family_is_ipv6(ip->family)) {
|
||||
if (net_family_is_ipv6(ip->family) || net_family_is_tcp_ipv6(ip->family)) {
|
||||
struct in6_addr addr;
|
||||
assert(make_family(ip->family) == AF_INET6);
|
||||
fill_addr6(&ip->ip.v6, &addr);
|
||||
@ -2097,10 +2097,9 @@ bool net_connect(const Network *ns, const Memory *mem, const Logger *log, Socket
|
||||
|
||||
// Non-blocking socket: "Operation in progress" means it's connecting.
|
||||
if (!should_ignore_connect_error(error)) {
|
||||
char *net_strerror = net_new_strerror(error);
|
||||
Net_Strerror error_str;
|
||||
LOGGER_WARNING(log, "failed to connect to %s:%d: %d (%s)",
|
||||
net_ip_ntoa(&ip_port->ip, &ip_str), net_ntohs(ip_port->port), error, net_strerror);
|
||||
net_kill_strerror(net_strerror);
|
||||
net_ip_ntoa(&ip_port->ip, &ip_str), net_ntohs(ip_port->port), error, net_strerror(error, &error_str));
|
||||
*err = NET_ERR_CONNECT_FAILED;
|
||||
return false;
|
||||
}
|
||||
@ -2367,19 +2366,11 @@ int net_error(void)
|
||||
}
|
||||
|
||||
#ifdef OS_WIN32
|
||||
char *net_new_strerror(int error)
|
||||
char *net_strerror(int error, Net_Strerror *buf)
|
||||
{
|
||||
char *str = nullptr;
|
||||
// Windows API is weird. The 5th function arg is of char* type, but we
|
||||
// have to pass char** so that it could assign new memory block to our
|
||||
// pointer, so we have to cast our char** to char* for the compilation
|
||||
// not to fail (otherwise it would fail to find a variant of this function
|
||||
// accepting char** as the 5th arg) and Windows inside casts it back
|
||||
// to char** to do the assignment. So no, this cast you see here, although
|
||||
// it looks weird, is not a mistake.
|
||||
FormatMessageA(FORMAT_MESSAGE_ALLOCATE_BUFFER | FORMAT_MESSAGE_FROM_SYSTEM | FORMAT_MESSAGE_IGNORE_INSERTS, nullptr,
|
||||
error, 0, (char *)&str, 0, nullptr);
|
||||
return str;
|
||||
FormatMessageA(FORMAT_MESSAGE_FROM_SYSTEM | FORMAT_MESSAGE_IGNORE_INSERTS, nullptr,
|
||||
error, 0, buf->data, NET_STRERROR_SIZE, nullptr);
|
||||
return buf->data;
|
||||
}
|
||||
#else
|
||||
#if defined(_GNU_SOURCE) && defined(__GLIBC__)
|
||||
@ -2407,36 +2398,19 @@ static const char *net_strerror_r(int error, char *tmp, size_t tmp_size)
|
||||
return tmp;
|
||||
}
|
||||
#endif /* GNU */
|
||||
char *net_new_strerror(int error)
|
||||
char *net_strerror(int error, Net_Strerror *buf)
|
||||
{
|
||||
char tmp[256];
|
||||
|
||||
errno = 0;
|
||||
|
||||
const char *retstr = net_strerror_r(error, tmp, sizeof(tmp));
|
||||
const char *retstr = net_strerror_r(error, buf->data, NET_STRERROR_SIZE);
|
||||
const size_t retstr_len = strlen(retstr);
|
||||
assert(retstr_len < NET_STRERROR_SIZE);
|
||||
buf->size = (uint16_t)retstr_len;
|
||||
|
||||
char *str = (char *)malloc(retstr_len + 1);
|
||||
|
||||
if (str == nullptr) {
|
||||
return nullptr;
|
||||
}
|
||||
|
||||
memcpy(str, retstr, retstr_len + 1);
|
||||
|
||||
return str;
|
||||
return buf->data;
|
||||
}
|
||||
#endif /* OS_WIN32 */
|
||||
|
||||
void net_kill_strerror(char *strerror)
|
||||
{
|
||||
#ifdef OS_WIN32
|
||||
LocalFree((char *)strerror);
|
||||
#else
|
||||
free(strerror);
|
||||
#endif /* OS_WIN32 */
|
||||
}
|
||||
|
||||
const Net_Profile *net_get_net_profile(const Networking_Core *net)
|
||||
{
|
||||
if (net == nullptr) {
|
||||
|
Reference in New Issue
Block a user