forked from Green-Sky/tomato
Green Sky
9ace11a0e2
8f0d505f9a feat: add ngc events 9b8216e70c refactor: Make event dispatch ordered by receive time. 814c12a6f4 cleanup: Add dynamically derived array sizes to the API. 226b23be12 cleanup: Add explicit array sizes to toxencryptsave. ef33cb4de0 cleanup: Add Toxav alias for ToxAV. 1da723b34d cleanup: Make Tox_Options a typedef. b148a2afff chore: Simplify msvc build using vcpkg. 5cac6d7eb1 cleanup: Move `tox_get_system` out of the public API. c9ca4007e3 refactor: Align group message sending with other send functions. 6c6c0b1b1b cleanup: Make setters take non-const `Tox *`. a76f758d70 cleanup: Mark arrays in the tox API as `[]` instead of `*`. baf6d1f6cf cleanup: Make array params in toxav `[]` instead of `*`. 79f55bd06a cleanup: Put the size of fixed arrays into the API types. 1e73698db2 cleanup: Add typedefs for public API int identifiers. cac074c57f chore: Add fetch-sha256 script to update bootstrap node hash. 32576656bb Make the comment capitalization uniform aff4dda17c Spellcheck tox-bootstrapd 40b5fbbe9d chore: Remove settings.yml in favour of hs-github-tools. ebafd51be7 chore: Use GPL license with https. 0e42752f0f cleanup: Move all vptr-to-ptr casts to the beginning of a function. 5407384211 cleanup: Use github actions matrix to simplify CI. 82d8265688 fix: Use QueryPerformanceCounter on windows for monotonic time. 1224e656e3 chore: Add `net_(new|kill)_strerror` to cppcheck's allocators. 6a90ddfe4e cleanup: Run clang-tidy on headers, as well. bd930cc80a cleanup: Make TCP connection failures a warning instead of error. fad6e4e173 cleanup: Make all .c files include the headers they need. ef4897a898 cleanup: Upgrade to clang-tidy-17 and fix some warnings. REVERT: f1df709b87 feat: add ngc events REVERT: 1b6c907235 refactor: Make event dispatch ordered by receive time. git-subtree-dir: external/toxcore/c-toxcore git-subtree-split: 8f0d505f9a598cc41c682178e1589bcc01efe9cb
254 lines
6.8 KiB
C
254 lines
6.8 KiB
C
/* SPDX-License-Identifier: GPL-3.0-or-later
|
|
* Copyright © 2023-2024 The TokTok team.
|
|
*/
|
|
|
|
#include "events_alloc.h"
|
|
|
|
#include <assert.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
|
|
#include "../bin_pack.h"
|
|
#include "../bin_unpack.h"
|
|
#include "../ccompat.h"
|
|
#include "../mem.h"
|
|
#include "../tox.h"
|
|
#include "../tox_events.h"
|
|
|
|
|
|
/*****************************************************
|
|
*
|
|
* :: struct and accessors
|
|
*
|
|
*****************************************************/
|
|
|
|
|
|
struct Tox_Event_Group_Password {
|
|
uint32_t group_number;
|
|
uint8_t *password;
|
|
uint32_t password_length;
|
|
};
|
|
|
|
non_null()
|
|
static void tox_event_group_password_set_group_number(Tox_Event_Group_Password *group_password,
|
|
uint32_t group_number)
|
|
{
|
|
assert(group_password != nullptr);
|
|
group_password->group_number = group_number;
|
|
}
|
|
uint32_t tox_event_group_password_get_group_number(const Tox_Event_Group_Password *group_password)
|
|
{
|
|
assert(group_password != nullptr);
|
|
return group_password->group_number;
|
|
}
|
|
|
|
non_null()
|
|
static bool tox_event_group_password_set_password(Tox_Event_Group_Password *group_password,
|
|
const uint8_t *password, uint32_t password_length)
|
|
{
|
|
assert(group_password != nullptr);
|
|
|
|
if (group_password->password != nullptr) {
|
|
free(group_password->password);
|
|
group_password->password = nullptr;
|
|
group_password->password_length = 0;
|
|
}
|
|
|
|
group_password->password = (uint8_t *)malloc(password_length);
|
|
|
|
if (group_password->password == nullptr) {
|
|
return false;
|
|
}
|
|
|
|
memcpy(group_password->password, password, password_length);
|
|
group_password->password_length = password_length;
|
|
return true;
|
|
}
|
|
uint32_t tox_event_group_password_get_password_length(const Tox_Event_Group_Password *group_password)
|
|
{
|
|
assert(group_password != nullptr);
|
|
return group_password->password_length;
|
|
}
|
|
const uint8_t *tox_event_group_password_get_password(const Tox_Event_Group_Password *group_password)
|
|
{
|
|
assert(group_password != nullptr);
|
|
return group_password->password;
|
|
}
|
|
|
|
non_null()
|
|
static void tox_event_group_password_construct(Tox_Event_Group_Password *group_password)
|
|
{
|
|
*group_password = (Tox_Event_Group_Password) {
|
|
0
|
|
};
|
|
}
|
|
non_null()
|
|
static void tox_event_group_password_destruct(Tox_Event_Group_Password *group_password, const Memory *mem)
|
|
{
|
|
free(group_password->password);
|
|
}
|
|
|
|
bool tox_event_group_password_pack(
|
|
const Tox_Event_Group_Password *event, Bin_Pack *bp)
|
|
{
|
|
assert(event != nullptr);
|
|
return bin_pack_array(bp, 2)
|
|
&& bin_pack_u32(bp, TOX_EVENT_GROUP_PASSWORD)
|
|
&& bin_pack_array(bp, 2)
|
|
&& bin_pack_u32(bp, event->group_number)
|
|
&& bin_pack_bin(bp, event->password, event->password_length);
|
|
}
|
|
|
|
non_null()
|
|
static bool tox_event_group_password_unpack_into(
|
|
Tox_Event_Group_Password *event, Bin_Unpack *bu)
|
|
{
|
|
assert(event != nullptr);
|
|
if (!bin_unpack_array_fixed(bu, 2, nullptr)) {
|
|
return false;
|
|
}
|
|
|
|
return bin_unpack_u32(bu, &event->group_number)
|
|
&& bin_unpack_bin(bu, &event->password, &event->password_length);
|
|
}
|
|
|
|
|
|
/*****************************************************
|
|
*
|
|
* :: new/free/add/get/size/unpack
|
|
*
|
|
*****************************************************/
|
|
|
|
const Tox_Event_Group_Password *tox_event_get_group_password(const Tox_Event *event)
|
|
{
|
|
return event->type == TOX_EVENT_GROUP_PASSWORD ? event->data.group_password : nullptr;
|
|
}
|
|
|
|
Tox_Event_Group_Password *tox_event_group_password_new(const Memory *mem)
|
|
{
|
|
Tox_Event_Group_Password *const group_password =
|
|
(Tox_Event_Group_Password *)mem_alloc(mem, sizeof(Tox_Event_Group_Password));
|
|
|
|
if (group_password == nullptr) {
|
|
return nullptr;
|
|
}
|
|
|
|
tox_event_group_password_construct(group_password);
|
|
return group_password;
|
|
}
|
|
|
|
void tox_event_group_password_free(Tox_Event_Group_Password *group_password, const Memory *mem)
|
|
{
|
|
if (group_password != nullptr) {
|
|
tox_event_group_password_destruct(group_password, mem);
|
|
}
|
|
mem_delete(mem, group_password);
|
|
}
|
|
|
|
non_null()
|
|
static Tox_Event_Group_Password *tox_events_add_group_password(Tox_Events *events, const Memory *mem)
|
|
{
|
|
Tox_Event_Group_Password *const group_password = tox_event_group_password_new(mem);
|
|
|
|
if (group_password == nullptr) {
|
|
return nullptr;
|
|
}
|
|
|
|
Tox_Event event;
|
|
event.type = TOX_EVENT_GROUP_PASSWORD;
|
|
event.data.group_password = group_password;
|
|
|
|
tox_events_add(events, &event);
|
|
return group_password;
|
|
}
|
|
|
|
const Tox_Event_Group_Password *tox_events_get_group_password(const Tox_Events *events, uint32_t index)
|
|
{
|
|
uint32_t group_password_index = 0;
|
|
const uint32_t size = tox_events_get_size(events);
|
|
|
|
for (uint32_t i = 0; i < size; ++i) {
|
|
if (group_password_index > index) {
|
|
return nullptr;
|
|
}
|
|
|
|
if (events->events[i].type == TOX_EVENT_GROUP_PASSWORD) {
|
|
const Tox_Event_Group_Password *group_password = events->events[i].data.group_password;
|
|
if (group_password_index == index) {
|
|
return group_password;
|
|
}
|
|
++group_password_index;
|
|
}
|
|
}
|
|
|
|
return nullptr;
|
|
}
|
|
|
|
uint32_t tox_events_get_group_password_size(const Tox_Events *events)
|
|
{
|
|
uint32_t group_password_size = 0;
|
|
const uint32_t size = tox_events_get_size(events);
|
|
|
|
for (uint32_t i = 0; i < size; ++i) {
|
|
if (events->events[i].type == TOX_EVENT_GROUP_PASSWORD) {
|
|
++group_password_size;
|
|
}
|
|
}
|
|
|
|
return group_password_size;
|
|
}
|
|
|
|
bool tox_event_group_password_unpack(
|
|
Tox_Event_Group_Password **event, Bin_Unpack *bu, const Memory *mem)
|
|
{
|
|
assert(event != nullptr);
|
|
*event = tox_event_group_password_new(mem);
|
|
|
|
if (*event == nullptr) {
|
|
return false;
|
|
}
|
|
|
|
return tox_event_group_password_unpack_into(*event, bu);
|
|
}
|
|
|
|
non_null()
|
|
static Tox_Event_Group_Password *tox_event_group_password_alloc(void *user_data)
|
|
{
|
|
Tox_Events_State *state = tox_events_alloc(user_data);
|
|
assert(state != nullptr);
|
|
|
|
if (state->events == nullptr) {
|
|
return nullptr;
|
|
}
|
|
|
|
Tox_Event_Group_Password *group_password = tox_events_add_group_password(state->events, state->mem);
|
|
|
|
if (group_password == nullptr) {
|
|
state->error = TOX_ERR_EVENTS_ITERATE_MALLOC;
|
|
return nullptr;
|
|
}
|
|
|
|
return group_password;
|
|
}
|
|
|
|
|
|
/*****************************************************
|
|
*
|
|
* :: event handler
|
|
*
|
|
*****************************************************/
|
|
|
|
|
|
void tox_events_handle_group_password(Tox *tox, uint32_t group_number, const uint8_t *password, size_t length,
|
|
void *user_data)
|
|
{
|
|
Tox_Event_Group_Password *group_password = tox_event_group_password_alloc(user_data);
|
|
|
|
if (group_password == nullptr) {
|
|
return;
|
|
}
|
|
|
|
tox_event_group_password_set_group_number(group_password, group_number);
|
|
tox_event_group_password_set_password(group_password, password, length);
|
|
}
|