/work/toxcore/events/group_peer_exit.c
Line | Count | Source (jump to first uncovered line) |
1 | | /* SPDX-License-Identifier: GPL-3.0-or-later |
2 | | * Copyright © 2023-2024 The TokTok team. |
3 | | */ |
4 | | |
5 | | #include "events_alloc.h" |
6 | | |
7 | | #include <assert.h> |
8 | | #include <stdlib.h> |
9 | | #include <string.h> |
10 | | |
11 | | #include "../bin_pack.h" |
12 | | #include "../bin_unpack.h" |
13 | | #include "../ccompat.h" |
14 | | #include "../mem.h" |
15 | | #include "../tox.h" |
16 | | #include "../tox_events.h" |
17 | | #include "../tox_pack.h" |
18 | | #include "../tox_unpack.h" |
19 | | |
20 | | |
21 | | /***************************************************** |
22 | | * |
23 | | * :: struct and accessors |
24 | | * |
25 | | *****************************************************/ |
26 | | |
27 | | |
28 | | struct Tox_Event_Group_Peer_Exit { |
29 | | uint32_t group_number; |
30 | | uint32_t peer_id; |
31 | | Tox_Group_Exit_Type exit_type; |
32 | | uint8_t *name; |
33 | | uint32_t name_length; |
34 | | uint8_t *part_message; |
35 | | uint32_t part_message_length; |
36 | | }; |
37 | | |
38 | | non_null() |
39 | | static void tox_event_group_peer_exit_set_group_number(Tox_Event_Group_Peer_Exit *group_peer_exit, |
40 | | uint32_t group_number) |
41 | 10 | { |
42 | 10 | assert(group_peer_exit != nullptr); |
43 | 10 | group_peer_exit->group_number = group_number; |
44 | 10 | } |
45 | | uint32_t tox_event_group_peer_exit_get_group_number(const Tox_Event_Group_Peer_Exit *group_peer_exit) |
46 | 0 | { |
47 | 0 | assert(group_peer_exit != nullptr); |
48 | 0 | return group_peer_exit->group_number; |
49 | 0 | } |
50 | | |
51 | | non_null() |
52 | | static void tox_event_group_peer_exit_set_peer_id(Tox_Event_Group_Peer_Exit *group_peer_exit, |
53 | | uint32_t peer_id) |
54 | 10 | { |
55 | 10 | assert(group_peer_exit != nullptr); |
56 | 10 | group_peer_exit->peer_id = peer_id; |
57 | 10 | } |
58 | | uint32_t tox_event_group_peer_exit_get_peer_id(const Tox_Event_Group_Peer_Exit *group_peer_exit) |
59 | 0 | { |
60 | 0 | assert(group_peer_exit != nullptr); |
61 | 0 | return group_peer_exit->peer_id; |
62 | 0 | } |
63 | | |
64 | | non_null() |
65 | | static void tox_event_group_peer_exit_set_exit_type(Tox_Event_Group_Peer_Exit *group_peer_exit, |
66 | | Tox_Group_Exit_Type exit_type) |
67 | 10 | { |
68 | 10 | assert(group_peer_exit != nullptr); |
69 | 10 | group_peer_exit->exit_type = exit_type; |
70 | 10 | } |
71 | | Tox_Group_Exit_Type tox_event_group_peer_exit_get_exit_type(const Tox_Event_Group_Peer_Exit *group_peer_exit) |
72 | 0 | { |
73 | 0 | assert(group_peer_exit != nullptr); |
74 | 0 | return group_peer_exit->exit_type; |
75 | 0 | } |
76 | | |
77 | | non_null(1) nullable(2) |
78 | | static bool tox_event_group_peer_exit_set_name(Tox_Event_Group_Peer_Exit *group_peer_exit, |
79 | | const uint8_t *name, uint32_t name_length) |
80 | 10 | { |
81 | 10 | assert(group_peer_exit != nullptr); |
82 | | |
83 | 10 | if (group_peer_exit->name != nullptr) { |
84 | 0 | free(group_peer_exit->name); |
85 | 0 | group_peer_exit->name = nullptr; |
86 | 0 | group_peer_exit->name_length = 0; |
87 | 0 | } |
88 | | |
89 | 10 | if (name == nullptr) { |
90 | 0 | assert(name_length == 0); |
91 | 0 | return true; |
92 | 0 | } |
93 | | |
94 | 10 | uint8_t *name_copy = (uint8_t *)malloc(name_length); |
95 | | |
96 | 10 | if (name_copy == nullptr) { |
97 | 0 | return false; |
98 | 0 | } |
99 | | |
100 | 10 | memcpy(name_copy, name, name_length); |
101 | 10 | group_peer_exit->name = name_copy; |
102 | 10 | group_peer_exit->name_length = name_length; |
103 | 10 | return true; |
104 | 10 | } |
105 | | uint32_t tox_event_group_peer_exit_get_name_length(const Tox_Event_Group_Peer_Exit *group_peer_exit) |
106 | 0 | { |
107 | 0 | assert(group_peer_exit != nullptr); |
108 | 0 | return group_peer_exit->name_length; |
109 | 0 | } |
110 | | const uint8_t *tox_event_group_peer_exit_get_name(const Tox_Event_Group_Peer_Exit *group_peer_exit) |
111 | 0 | { |
112 | 0 | assert(group_peer_exit != nullptr); |
113 | 0 | return group_peer_exit->name; |
114 | 0 | } |
115 | | |
116 | | non_null(1) nullable(2) |
117 | | static bool tox_event_group_peer_exit_set_part_message(Tox_Event_Group_Peer_Exit *group_peer_exit, |
118 | | const uint8_t *part_message, uint32_t part_message_length) |
119 | 10 | { |
120 | 10 | assert(group_peer_exit != nullptr); |
121 | | |
122 | 10 | if (group_peer_exit->part_message != nullptr) { |
123 | 0 | free(group_peer_exit->part_message); |
124 | 0 | group_peer_exit->part_message = nullptr; |
125 | 0 | group_peer_exit->part_message_length = 0; |
126 | 0 | } |
127 | | |
128 | 10 | if (part_message == nullptr) { |
129 | 0 | assert(part_message_length == 0); |
130 | 0 | return true; |
131 | 0 | } |
132 | | |
133 | 10 | uint8_t *part_message_copy = (uint8_t *)malloc(part_message_length); |
134 | | |
135 | 10 | if (part_message_copy == nullptr) { |
136 | 0 | return false; |
137 | 0 | } |
138 | | |
139 | 10 | memcpy(part_message_copy, part_message, part_message_length); |
140 | 10 | group_peer_exit->part_message = part_message_copy; |
141 | 10 | group_peer_exit->part_message_length = part_message_length; |
142 | 10 | return true; |
143 | 10 | } |
144 | | uint32_t tox_event_group_peer_exit_get_part_message_length(const Tox_Event_Group_Peer_Exit *group_peer_exit) |
145 | 2 | { |
146 | 2 | assert(group_peer_exit != nullptr); |
147 | 2 | return group_peer_exit->part_message_length; |
148 | 2 | } |
149 | | const uint8_t *tox_event_group_peer_exit_get_part_message(const Tox_Event_Group_Peer_Exit *group_peer_exit) |
150 | 2 | { |
151 | 2 | assert(group_peer_exit != nullptr); |
152 | 2 | return group_peer_exit->part_message; |
153 | 2 | } |
154 | | |
155 | | non_null() |
156 | | static void tox_event_group_peer_exit_construct(Tox_Event_Group_Peer_Exit *group_peer_exit) |
157 | 74 | { |
158 | 74 | *group_peer_exit = (Tox_Event_Group_Peer_Exit) { |
159 | 74 | 0 |
160 | 74 | }; |
161 | 74 | } |
162 | | non_null() |
163 | | static void tox_event_group_peer_exit_destruct(Tox_Event_Group_Peer_Exit *group_peer_exit, const Memory *mem) |
164 | 74 | { |
165 | 74 | free(group_peer_exit->name); |
166 | 74 | free(group_peer_exit->part_message); |
167 | 74 | } |
168 | | |
169 | | bool tox_event_group_peer_exit_pack( |
170 | | const Tox_Event_Group_Peer_Exit *event, Bin_Pack *bp) |
171 | 20 | { |
172 | 20 | return bin_pack_array(bp, 5) |
173 | 20 | && bin_pack_u32(bp, event->group_number) |
174 | 20 | && bin_pack_u32(bp, event->peer_id) |
175 | 20 | && tox_group_exit_type_pack(event->exit_type, bp) |
176 | 20 | && bin_pack_bin(bp, event->name, event->name_length) |
177 | 20 | && bin_pack_bin(bp, event->part_message, event->part_message_length); |
178 | 20 | } |
179 | | |
180 | | non_null() |
181 | | static bool tox_event_group_peer_exit_unpack_into( |
182 | | Tox_Event_Group_Peer_Exit *event, Bin_Unpack *bu) |
183 | 64 | { |
184 | 64 | assert(event != nullptr); |
185 | 64 | if (!bin_unpack_array_fixed(bu, 5, nullptr)) { |
186 | 2 | return false; |
187 | 2 | } |
188 | | |
189 | 62 | return bin_unpack_u32(bu, &event->group_number) |
190 | 62 | && bin_unpack_u32(bu, &event->peer_id) |
191 | 62 | && tox_group_exit_type_unpack(&event->exit_type, bu) |
192 | 62 | && bin_unpack_bin(bu, &event->name, &event->name_length) |
193 | 62 | && bin_unpack_bin(bu, &event->part_message, &event->part_message_length); |
194 | 64 | } |
195 | | |
196 | | |
197 | | /***************************************************** |
198 | | * |
199 | | * :: new/free/add/get/size/unpack |
200 | | * |
201 | | *****************************************************/ |
202 | | |
203 | | const Tox_Event_Group_Peer_Exit *tox_event_get_group_peer_exit(const Tox_Event *event) |
204 | 0 | { |
205 | 0 | return event->type == TOX_EVENT_GROUP_PEER_EXIT ? event->data.group_peer_exit : nullptr; |
206 | 0 | } |
207 | | |
208 | | Tox_Event_Group_Peer_Exit *tox_event_group_peer_exit_new(const Memory *mem) |
209 | 75 | { |
210 | 75 | Tox_Event_Group_Peer_Exit *const group_peer_exit = |
211 | 75 | (Tox_Event_Group_Peer_Exit *)mem_alloc(mem, sizeof(Tox_Event_Group_Peer_Exit)); |
212 | | |
213 | 75 | if (group_peer_exit == nullptr) { |
214 | 1 | return nullptr; |
215 | 1 | } |
216 | | |
217 | 74 | tox_event_group_peer_exit_construct(group_peer_exit); |
218 | 74 | return group_peer_exit; |
219 | 75 | } |
220 | | |
221 | | void tox_event_group_peer_exit_free(Tox_Event_Group_Peer_Exit *group_peer_exit, const Memory *mem) |
222 | 75 | { |
223 | 75 | if (group_peer_exit != nullptr) { |
224 | 74 | tox_event_group_peer_exit_destruct(group_peer_exit, mem); |
225 | 74 | } |
226 | 75 | mem_delete(mem, group_peer_exit); |
227 | 75 | } |
228 | | |
229 | | non_null() |
230 | | static Tox_Event_Group_Peer_Exit *tox_events_add_group_peer_exit(Tox_Events *events, const Memory *mem) |
231 | 10 | { |
232 | 10 | Tox_Event_Group_Peer_Exit *const group_peer_exit = tox_event_group_peer_exit_new(mem); |
233 | | |
234 | 10 | if (group_peer_exit == nullptr) { |
235 | 0 | return nullptr; |
236 | 0 | } |
237 | | |
238 | 10 | Tox_Event event; |
239 | 10 | event.type = TOX_EVENT_GROUP_PEER_EXIT; |
240 | 10 | event.data.group_peer_exit = group_peer_exit; |
241 | | |
242 | 10 | tox_events_add(events, &event); |
243 | 10 | return group_peer_exit; |
244 | 10 | } |
245 | | |
246 | | bool tox_event_group_peer_exit_unpack( |
247 | | Tox_Event_Group_Peer_Exit **event, Bin_Unpack *bu, const Memory *mem) |
248 | 65 | { |
249 | 65 | assert(event != nullptr); |
250 | 65 | assert(*event == nullptr); |
251 | 65 | *event = tox_event_group_peer_exit_new(mem); |
252 | | |
253 | 65 | if (*event == nullptr) { |
254 | 1 | return false; |
255 | 1 | } |
256 | | |
257 | 64 | return tox_event_group_peer_exit_unpack_into(*event, bu); |
258 | 65 | } |
259 | | |
260 | | non_null() |
261 | | static Tox_Event_Group_Peer_Exit *tox_event_group_peer_exit_alloc(void *user_data) |
262 | 11 | { |
263 | 11 | Tox_Events_State *state = tox_events_alloc(user_data); |
264 | 11 | assert(state != nullptr); |
265 | | |
266 | 11 | if (state->events == nullptr) { |
267 | 1 | return nullptr; |
268 | 1 | } |
269 | | |
270 | 10 | Tox_Event_Group_Peer_Exit *group_peer_exit = tox_events_add_group_peer_exit(state->events, state->mem); |
271 | | |
272 | 10 | if (group_peer_exit == nullptr) { |
273 | 0 | state->error = TOX_ERR_EVENTS_ITERATE_MALLOC; |
274 | 0 | return nullptr; |
275 | 0 | } |
276 | | |
277 | 10 | return group_peer_exit; |
278 | 10 | } |
279 | | |
280 | | |
281 | | /***************************************************** |
282 | | * |
283 | | * :: event handler |
284 | | * |
285 | | *****************************************************/ |
286 | | |
287 | | |
288 | | void tox_events_handle_group_peer_exit(Tox *tox, uint32_t group_number, uint32_t peer_id, Tox_Group_Exit_Type exit_type, const uint8_t *name, size_t name_length, const uint8_t *part_message, size_t part_message_length, |
289 | | void *user_data) |
290 | 11 | { |
291 | 11 | Tox_Event_Group_Peer_Exit *group_peer_exit = tox_event_group_peer_exit_alloc(user_data); |
292 | | |
293 | 11 | if (group_peer_exit == nullptr) { |
294 | 1 | return; |
295 | 1 | } |
296 | | |
297 | 10 | tox_event_group_peer_exit_set_group_number(group_peer_exit, group_number); |
298 | 10 | tox_event_group_peer_exit_set_peer_id(group_peer_exit, peer_id); |
299 | 10 | tox_event_group_peer_exit_set_exit_type(group_peer_exit, exit_type); |
300 | 10 | tox_event_group_peer_exit_set_name(group_peer_exit, name, name_length); |
301 | 10 | tox_event_group_peer_exit_set_part_message(group_peer_exit, part_message, part_message_length); |
302 | 10 | } |