/work/toxcore/events/friend_request.c
Line | Count | Source (jump to first uncovered line) |
1 | | /* SPDX-License-Identifier: GPL-3.0-or-later |
2 | | * Copyright © 2022 The TokTok team. |
3 | | */ |
4 | | |
5 | | #include "events_alloc.h" |
6 | | |
7 | | #include <assert.h> |
8 | | #include <string.h> |
9 | | |
10 | | #include "../bin_pack.h" |
11 | | #include "../bin_unpack.h" |
12 | | #include "../ccompat.h" |
13 | | #include "../mem.h" |
14 | | #include "../tox.h" |
15 | | #include "../tox_events.h" |
16 | | #include "../tox_private.h" |
17 | | |
18 | | |
19 | | /***************************************************** |
20 | | * |
21 | | * :: struct and accessors |
22 | | * |
23 | | *****************************************************/ |
24 | | |
25 | | |
26 | | struct Tox_Event_Friend_Request { |
27 | | uint8_t public_key[TOX_PUBLIC_KEY_SIZE]; |
28 | | uint8_t *message; |
29 | | uint32_t message_length; |
30 | | }; |
31 | | |
32 | | non_null() |
33 | | static bool tox_event_friend_request_set_public_key(Tox_Event_Friend_Request *friend_request, const uint8_t *public_key) |
34 | 151 | { |
35 | 151 | assert(friend_request != nullptr); |
36 | | |
37 | 151 | memcpy(friend_request->public_key, public_key, TOX_PUBLIC_KEY_SIZE); |
38 | 151 | return true; |
39 | 151 | } |
40 | | const uint8_t *tox_event_friend_request_get_public_key(const Tox_Event_Friend_Request *friend_request) |
41 | 142 | { |
42 | 142 | assert(friend_request != nullptr); |
43 | 142 | return friend_request->public_key; |
44 | 142 | } |
45 | | |
46 | | non_null() |
47 | | static bool tox_event_friend_request_set_message(Tox_Event_Friend_Request *friend_request, |
48 | | const uint8_t *message, uint32_t message_length, const Memory *mem) |
49 | 151 | { |
50 | 151 | assert(friend_request != nullptr); |
51 | | |
52 | 151 | if (friend_request->message != nullptr) { |
53 | 0 | mem_delete(mem, friend_request->message); |
54 | 0 | friend_request->message = nullptr; |
55 | 0 | friend_request->message_length = 0; |
56 | 0 | } |
57 | | |
58 | 151 | uint8_t *message_copy = (uint8_t *)mem_balloc(mem, message_length); |
59 | | |
60 | 151 | if (message_copy == nullptr) { |
61 | 0 | return false; |
62 | 0 | } |
63 | | |
64 | 151 | memcpy(message_copy, message, message_length); |
65 | 151 | friend_request->message = message_copy; |
66 | 151 | friend_request->message_length = message_length; |
67 | 151 | return true; |
68 | 151 | } |
69 | | uint32_t tox_event_friend_request_get_message_length(const Tox_Event_Friend_Request *friend_request) |
70 | 134 | { |
71 | 134 | assert(friend_request != nullptr); |
72 | 134 | return friend_request->message_length; |
73 | 134 | } |
74 | | const uint8_t *tox_event_friend_request_get_message(const Tox_Event_Friend_Request *friend_request) |
75 | 134 | { |
76 | 134 | assert(friend_request != nullptr); |
77 | 134 | return friend_request->message; |
78 | 134 | } |
79 | | |
80 | | non_null() |
81 | | static void tox_event_friend_request_construct(Tox_Event_Friend_Request *friend_request) |
82 | 154 | { |
83 | 154 | *friend_request = (Tox_Event_Friend_Request) { |
84 | 154 | 0 |
85 | 154 | }; |
86 | 154 | } |
87 | | non_null() |
88 | | static void tox_event_friend_request_destruct(Tox_Event_Friend_Request *friend_request, const Memory *mem) |
89 | 154 | { |
90 | 154 | mem_delete(mem, friend_request->message); |
91 | 154 | } |
92 | | |
93 | | bool tox_event_friend_request_pack( |
94 | | const Tox_Event_Friend_Request *event, Bin_Pack *bp) |
95 | 32 | { |
96 | 32 | return bin_pack_array(bp, 2) |
97 | 32 | && bin_pack_bin(bp, event->public_key, TOX_PUBLIC_KEY_SIZE) |
98 | 32 | && bin_pack_bin(bp, event->message, event->message_length); |
99 | 32 | } |
100 | | |
101 | | non_null() |
102 | | static bool tox_event_friend_request_unpack_into( |
103 | | Tox_Event_Friend_Request *event, Bin_Unpack *bu) |
104 | 3 | { |
105 | 3 | assert(event != nullptr); |
106 | 3 | if (!bin_unpack_array_fixed(bu, 2, nullptr)) { |
107 | 1 | return false; |
108 | 1 | } |
109 | | |
110 | 2 | return bin_unpack_bin_fixed(bu, event->public_key, TOX_PUBLIC_KEY_SIZE) |
111 | 2 | && bin_unpack_bin(bu, &event->message, &event->message_length); |
112 | 3 | } |
113 | | |
114 | | const Tox_Event_Friend_Request *tox_event_get_friend_request( |
115 | | const Tox_Event *event) |
116 | 0 | { |
117 | 0 | return event->type == TOX_EVENT_FRIEND_REQUEST ? event->data.friend_request : nullptr; |
118 | 0 | } |
119 | | |
120 | | Tox_Event_Friend_Request *tox_event_friend_request_new(const Memory *mem) |
121 | 155 | { |
122 | 155 | Tox_Event_Friend_Request *const friend_request = |
123 | 155 | (Tox_Event_Friend_Request *)mem_alloc(mem, sizeof(Tox_Event_Friend_Request)); |
124 | | |
125 | 155 | if (friend_request == nullptr) { |
126 | 1 | return nullptr; |
127 | 1 | } |
128 | | |
129 | 154 | tox_event_friend_request_construct(friend_request); |
130 | 154 | return friend_request; |
131 | 155 | } |
132 | | |
133 | | void tox_event_friend_request_free(Tox_Event_Friend_Request *friend_request, const Memory *mem) |
134 | 155 | { |
135 | 155 | if (friend_request != nullptr) { |
136 | 154 | tox_event_friend_request_destruct(friend_request, mem); |
137 | 154 | } |
138 | 155 | mem_delete(mem, friend_request); |
139 | 155 | } |
140 | | |
141 | | non_null() |
142 | | static Tox_Event_Friend_Request *tox_events_add_friend_request(Tox_Events *events, const Memory *mem) |
143 | 151 | { |
144 | 151 | Tox_Event_Friend_Request *const friend_request = tox_event_friend_request_new(mem); |
145 | | |
146 | 151 | if (friend_request == nullptr) { |
147 | 0 | return nullptr; |
148 | 0 | } |
149 | | |
150 | 151 | Tox_Event event; |
151 | 151 | event.type = TOX_EVENT_FRIEND_REQUEST; |
152 | 151 | event.data.friend_request = friend_request; |
153 | | |
154 | 151 | tox_events_add(events, &event); |
155 | 151 | return friend_request; |
156 | 151 | } |
157 | | |
158 | | bool tox_event_friend_request_unpack( |
159 | | Tox_Event_Friend_Request **event, Bin_Unpack *bu, const Memory *mem) |
160 | 4 | { |
161 | 4 | assert(event != nullptr); |
162 | 4 | assert(*event == nullptr); |
163 | 4 | *event = tox_event_friend_request_new(mem); |
164 | | |
165 | 4 | if (*event == nullptr) { |
166 | 1 | return false; |
167 | 1 | } |
168 | | |
169 | 3 | return tox_event_friend_request_unpack_into(*event, bu); |
170 | 4 | } |
171 | | |
172 | | non_null() |
173 | | static Tox_Event_Friend_Request *tox_event_friend_request_alloc(void *user_data) |
174 | 174 | { |
175 | 174 | Tox_Events_State *state = tox_events_alloc(user_data); |
176 | 174 | assert(state != nullptr); |
177 | | |
178 | 174 | if (state->events == nullptr) { |
179 | 23 | return nullptr; |
180 | 23 | } |
181 | | |
182 | 151 | Tox_Event_Friend_Request *friend_request = tox_events_add_friend_request(state->events, state->mem); |
183 | | |
184 | 151 | if (friend_request == nullptr) { |
185 | 0 | state->error = TOX_ERR_EVENTS_ITERATE_MALLOC; |
186 | 0 | return nullptr; |
187 | 0 | } |
188 | | |
189 | 151 | return friend_request; |
190 | 151 | } |
191 | | |
192 | | |
193 | | /***************************************************** |
194 | | * |
195 | | * :: event handler |
196 | | * |
197 | | *****************************************************/ |
198 | | |
199 | | |
200 | | void tox_events_handle_friend_request(Tox *tox, const uint8_t *public_key, const uint8_t *message, size_t length, |
201 | | void *user_data) |
202 | 174 | { |
203 | 174 | Tox_Event_Friend_Request *friend_request = tox_event_friend_request_alloc(user_data); |
204 | | |
205 | 174 | if (friend_request == nullptr) { |
206 | 23 | return; |
207 | 23 | } |
208 | | |
209 | 151 | const Tox_System *sys = tox_get_system(tox); |
210 | | |
211 | 151 | tox_event_friend_request_set_public_key(friend_request, public_key); |
212 | 151 | tox_event_friend_request_set_message(friend_request, message, length, sys->mem); |
213 | 151 | } |