forked from Green-Sky/tomato
Squashed 'external/toxcore/c-toxcore/' changes from e29e185c03..f1df709b87
f1df709b87 feat: add ngc events 1b6c907235 refactor: Make event dispatch ordered by receive time. b7f9367f6f test: Upgrade cppcheck, fix some warnings. 766e62bc89 chore: Use `pkg_search_module` directly in cmake. 00ff078f91 cleanup: Use target_link_libraries directly in cmake. c58928cc89 chore: Add `IMPORTED_TARGET` to pkg-config packages. 895a6af122 cleanup: Remove NaCl support. 41dfb1c1c0 fix: unpack enum function names in event impl generator 447666d1a1 chore: Disable targets for cross-compilation. 572924e924 chore: Build a docker image with coverage info in it. 415cb78f5e cleanup: Some portability/warning fixes for Windows builds. 425216d9ec fix: Correct a use-after-free and fix some memory leaks. 4b1cfa3e08 refactor: Change all enum-like `#define` sequences into enums. d3c2704fa9 chore: Fix make_single_file to support core-only. 0ce46b644e refactor: Change the `TCP_PACKET_*` defines into an enum. 22cd38ad50 adopt event impl generation tool to #2392 f31ea1088a add the event impl generation tool 4e603bb613 refactor: Use `enum-from-int` rule from tokstyle. 19d8f180d6 chore: Update github actions `uses`. 6a895be0c7 test: Make esp32 build actually try to instantiate tox. 65d09c9bfb cleanup: Remove test net support. REVERT: e29e185c03 feat: add ngc events git-subtree-dir: external/toxcore/c-toxcore git-subtree-split: f1df709b8792da4c0e946d826b11df77d565064d
This commit is contained in:
@ -28,19 +28,6 @@ struct Tox_Event_Group_Peer_Limit {
|
||||
uint32_t peer_limit;
|
||||
};
|
||||
|
||||
non_null()
|
||||
static void tox_event_group_peer_limit_construct(Tox_Event_Group_Peer_Limit *group_peer_limit)
|
||||
{
|
||||
*group_peer_limit = (Tox_Event_Group_Peer_Limit) {
|
||||
0
|
||||
};
|
||||
}
|
||||
non_null()
|
||||
static void tox_event_group_peer_limit_destruct(Tox_Event_Group_Peer_Limit *group_peer_limit)
|
||||
{
|
||||
return;
|
||||
}
|
||||
|
||||
non_null()
|
||||
static void tox_event_group_peer_limit_set_group_number(Tox_Event_Group_Peer_Limit *group_peer_limit,
|
||||
uint32_t group_number)
|
||||
@ -68,7 +55,19 @@ uint32_t tox_event_group_peer_limit_get_peer_limit(const Tox_Event_Group_Peer_Li
|
||||
}
|
||||
|
||||
non_null()
|
||||
static bool tox_event_group_peer_limit_pack(
|
||||
static void tox_event_group_peer_limit_construct(Tox_Event_Group_Peer_Limit *group_peer_limit)
|
||||
{
|
||||
*group_peer_limit = (Tox_Event_Group_Peer_Limit) {
|
||||
0
|
||||
};
|
||||
}
|
||||
non_null()
|
||||
static void tox_event_group_peer_limit_destruct(Tox_Event_Group_Peer_Limit *group_peer_limit, const Memory *mem)
|
||||
{
|
||||
return;
|
||||
}
|
||||
|
||||
bool tox_event_group_peer_limit_pack(
|
||||
const Tox_Event_Group_Peer_Limit *event, Bin_Pack *bp)
|
||||
{
|
||||
assert(event != nullptr);
|
||||
@ -80,7 +79,7 @@ static bool tox_event_group_peer_limit_pack(
|
||||
}
|
||||
|
||||
non_null()
|
||||
static bool tox_event_group_peer_limit_unpack(
|
||||
static bool tox_event_group_peer_limit_unpack_into(
|
||||
Tox_Event_Group_Peer_Limit *event, Bin_Unpack *bu)
|
||||
{
|
||||
assert(event != nullptr);
|
||||
@ -95,93 +94,120 @@ static bool tox_event_group_peer_limit_unpack(
|
||||
|
||||
/*****************************************************
|
||||
*
|
||||
* :: add/clear/get
|
||||
* :: new/free/add/get/size/unpack
|
||||
*
|
||||
*****************************************************/
|
||||
|
||||
|
||||
non_null()
|
||||
static Tox_Event_Group_Peer_Limit *tox_events_add_group_peer_limit(Tox_Events *events)
|
||||
const Tox_Event_Group_Peer_Limit *tox_event_get_group_peer_limit(const Tox_Event *event)
|
||||
{
|
||||
if (events->group_peer_limit_size == UINT32_MAX) {
|
||||
return event->type == TOX_EVENT_GROUP_PEER_LIMIT ? event->data.group_peer_limit : nullptr;
|
||||
}
|
||||
|
||||
Tox_Event_Group_Peer_Limit *tox_event_group_peer_limit_new(const Memory *mem)
|
||||
{
|
||||
Tox_Event_Group_Peer_Limit *const group_peer_limit =
|
||||
(Tox_Event_Group_Peer_Limit *)mem_alloc(mem, sizeof(Tox_Event_Group_Peer_Limit));
|
||||
|
||||
if (group_peer_limit == nullptr) {
|
||||
return nullptr;
|
||||
}
|
||||
|
||||
if (events->group_peer_limit_size == events->group_peer_limit_capacity) {
|
||||
const uint32_t new_group_peer_limit_capacity = events->group_peer_limit_capacity * 2 + 1;
|
||||
Tox_Event_Group_Peer_Limit *new_group_peer_limit = (Tox_Event_Group_Peer_Limit *)
|
||||
realloc(
|
||||
events->group_peer_limit,
|
||||
new_group_peer_limit_capacity * sizeof(Tox_Event_Group_Peer_Limit));
|
||||
|
||||
if (new_group_peer_limit == nullptr) {
|
||||
return nullptr;
|
||||
}
|
||||
|
||||
events->group_peer_limit = new_group_peer_limit;
|
||||
events->group_peer_limit_capacity = new_group_peer_limit_capacity;
|
||||
}
|
||||
|
||||
Tox_Event_Group_Peer_Limit *const group_peer_limit =
|
||||
&events->group_peer_limit[events->group_peer_limit_size];
|
||||
tox_event_group_peer_limit_construct(group_peer_limit);
|
||||
++events->group_peer_limit_size;
|
||||
return group_peer_limit;
|
||||
}
|
||||
|
||||
void tox_events_clear_group_peer_limit(Tox_Events *events)
|
||||
void tox_event_group_peer_limit_free(Tox_Event_Group_Peer_Limit *group_peer_limit, const Memory *mem)
|
||||
{
|
||||
if (events == nullptr) {
|
||||
return;
|
||||
if (group_peer_limit != nullptr) {
|
||||
tox_event_group_peer_limit_destruct(group_peer_limit, mem);
|
||||
}
|
||||
|
||||
for (uint32_t i = 0; i < events->group_peer_limit_size; ++i) {
|
||||
tox_event_group_peer_limit_destruct(&events->group_peer_limit[i]);
|
||||
}
|
||||
|
||||
free(events->group_peer_limit);
|
||||
events->group_peer_limit = nullptr;
|
||||
events->group_peer_limit_size = 0;
|
||||
events->group_peer_limit_capacity = 0;
|
||||
mem_delete(mem, group_peer_limit);
|
||||
}
|
||||
|
||||
uint32_t tox_events_get_group_peer_limit_size(const Tox_Events *events)
|
||||
non_null()
|
||||
static Tox_Event_Group_Peer_Limit *tox_events_add_group_peer_limit(Tox_Events *events, const Memory *mem)
|
||||
{
|
||||
if (events == nullptr) {
|
||||
return 0;
|
||||
Tox_Event_Group_Peer_Limit *const group_peer_limit = tox_event_group_peer_limit_new(mem);
|
||||
|
||||
if (group_peer_limit == nullptr) {
|
||||
return nullptr;
|
||||
}
|
||||
|
||||
return events->group_peer_limit_size;
|
||||
Tox_Event event;
|
||||
event.type = TOX_EVENT_GROUP_PEER_LIMIT;
|
||||
event.data.group_peer_limit = group_peer_limit;
|
||||
|
||||
tox_events_add(events, &event);
|
||||
return group_peer_limit;
|
||||
}
|
||||
|
||||
const Tox_Event_Group_Peer_Limit *tox_events_get_group_peer_limit(const Tox_Events *events, uint32_t index)
|
||||
{
|
||||
assert(index < events->group_peer_limit_size);
|
||||
assert(events->group_peer_limit != nullptr);
|
||||
return &events->group_peer_limit[index];
|
||||
}
|
||||
|
||||
bool tox_events_pack_group_peer_limit(const Tox_Events *events, Bin_Pack *bp)
|
||||
{
|
||||
const uint32_t size = tox_events_get_group_peer_limit_size(events);
|
||||
uint32_t group_peer_limit_index = 0;
|
||||
const uint32_t size = tox_events_get_size(events);
|
||||
|
||||
for (uint32_t i = 0; i < size; ++i) {
|
||||
if (!tox_event_group_peer_limit_pack(tox_events_get_group_peer_limit(events, i), bp)) {
|
||||
return false;
|
||||
if (group_peer_limit_index > index) {
|
||||
return nullptr;
|
||||
}
|
||||
|
||||
if (events->events[i].type == TOX_EVENT_GROUP_PEER_LIMIT) {
|
||||
const Tox_Event_Group_Peer_Limit *group_peer_limit = events->events[i].data.group_peer_limit;
|
||||
if (group_peer_limit_index == index) {
|
||||
return group_peer_limit;
|
||||
}
|
||||
++group_peer_limit_index;
|
||||
}
|
||||
}
|
||||
return true;
|
||||
|
||||
return nullptr;
|
||||
}
|
||||
|
||||
bool tox_events_unpack_group_peer_limit(Tox_Events *events, Bin_Unpack *bu)
|
||||
uint32_t tox_events_get_group_peer_limit_size(const Tox_Events *events)
|
||||
{
|
||||
Tox_Event_Group_Peer_Limit *event = tox_events_add_group_peer_limit(events);
|
||||
uint32_t group_peer_limit_size = 0;
|
||||
const uint32_t size = tox_events_get_size(events);
|
||||
|
||||
if (event == nullptr) {
|
||||
for (uint32_t i = 0; i < size; ++i) {
|
||||
if (events->events[i].type == TOX_EVENT_GROUP_PEER_LIMIT) {
|
||||
++group_peer_limit_size;
|
||||
}
|
||||
}
|
||||
|
||||
return group_peer_limit_size;
|
||||
}
|
||||
|
||||
bool tox_event_group_peer_limit_unpack(
|
||||
Tox_Event_Group_Peer_Limit **event, Bin_Unpack *bu, const Memory *mem)
|
||||
{
|
||||
assert(event != nullptr);
|
||||
*event = tox_event_group_peer_limit_new(mem);
|
||||
|
||||
if (*event == nullptr) {
|
||||
return false;
|
||||
}
|
||||
|
||||
return tox_event_group_peer_limit_unpack(event, bu);
|
||||
return tox_event_group_peer_limit_unpack_into(*event, bu);
|
||||
}
|
||||
|
||||
non_null()
|
||||
static Tox_Event_Group_Peer_Limit *tox_event_group_peer_limit_alloc(void *user_data)
|
||||
{
|
||||
Tox_Events_State *state = tox_events_alloc(user_data);
|
||||
assert(state != nullptr);
|
||||
|
||||
if (state->events == nullptr) {
|
||||
return nullptr;
|
||||
}
|
||||
|
||||
Tox_Event_Group_Peer_Limit *group_peer_limit = tox_events_add_group_peer_limit(state->events, state->mem);
|
||||
|
||||
if (group_peer_limit == nullptr) {
|
||||
state->error = TOX_ERR_EVENTS_ITERATE_MALLOC;
|
||||
return nullptr;
|
||||
}
|
||||
|
||||
return group_peer_limit;
|
||||
}
|
||||
|
||||
|
||||
@ -195,17 +221,9 @@ bool tox_events_unpack_group_peer_limit(Tox_Events *events, Bin_Unpack *bu)
|
||||
void tox_events_handle_group_peer_limit(Tox *tox, uint32_t group_number, uint32_t peer_limit,
|
||||
void *user_data)
|
||||
{
|
||||
Tox_Events_State *state = tox_events_alloc(user_data);
|
||||
assert(state != nullptr);
|
||||
|
||||
if (state->events == nullptr) {
|
||||
return;
|
||||
}
|
||||
|
||||
Tox_Event_Group_Peer_Limit *group_peer_limit = tox_events_add_group_peer_limit(state->events);
|
||||
Tox_Event_Group_Peer_Limit *group_peer_limit = tox_event_group_peer_limit_alloc(user_data);
|
||||
|
||||
if (group_peer_limit == nullptr) {
|
||||
state->error = TOX_ERR_EVENTS_ITERATE_MALLOC;
|
||||
return;
|
||||
}
|
||||
|
||||
|
Reference in New Issue
Block a user