mirror of
https://github.com/irungentoo/toxcore.git
synced 2024-03-22 13:30:51 +08:00
Merge branch 'iphydf-new_api' into new_api
This commit is contained in:
commit
2757b254fe
|
@ -615,7 +615,7 @@ loop_top:
|
|||
uint16_t counter = 0;
|
||||
|
||||
for (i = 0; i < NUM_TOXES; ++i) {
|
||||
for (j = 0; j < tox_friend_list_size(toxes[i]); ++j)
|
||||
for (j = 0; j < tox_self_get_friend_list_size(toxes[i]); ++j)
|
||||
if (tox_friend_get_connection_status(toxes[i], j, 0) == TOX_CONNECTION_UDP)
|
||||
++counter;
|
||||
}
|
||||
|
|
|
@ -135,7 +135,7 @@ Tox *tox_new(const struct Tox_Options *options, const uint8_t *data, size_t leng
|
|||
break;
|
||||
|
||||
default:
|
||||
SET_ERROR_PARAMETER(error, TOX_ERR_PROXY_TYPE);
|
||||
SET_ERROR_PARAMETER(error, TOX_ERR_NEW_PROXY_BAD_TYPE);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
|
@ -150,7 +150,7 @@ Tox *tox_new(const struct Tox_Options *options, const uint8_t *data, size_t leng
|
|||
if (m_options.ipv6enabled)
|
||||
m_options.proxy_info.ip_port.ip.family = AF_UNSPEC;
|
||||
|
||||
if (!addr_resolve_or_parse_ip(options->proxy_address, &m_options.proxy_info.ip_port.ip, NULL)) {
|
||||
if (!addr_resolve_or_parse_ip(options->proxy_host, &m_options.proxy_info.ip_port.ip, NULL)) {
|
||||
SET_ERROR_PARAMETER(error, TOX_ERR_NEW_PROXY_BAD_HOST);
|
||||
//TODO: TOX_ERR_NEW_PROXY_NOT_FOUND if domain.
|
||||
return NULL;
|
||||
|
@ -249,7 +249,7 @@ bool tox_bootstrap(Tox *tox, const char *address, uint16_t port, const uint8_t *
|
|||
return ret;
|
||||
} else { /* DHT only works on UDP. */
|
||||
if (DHT_bootstrap_from_address(m->dht, address, m->options.ipv6enabled, htons(port), public_key) == 0) {
|
||||
SET_ERROR_PARAMETER(error, TOX_ERR_BOOTSTRAP_BAD_ADDRESS);
|
||||
SET_ERROR_PARAMETER(error, TOX_ERR_BOOTSTRAP_BAD_HOST);
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
@ -275,7 +275,7 @@ bool tox_add_tcp_relay(Tox *tox, const char *address, uint16_t port, const uint8
|
|||
}
|
||||
|
||||
if (address_to_ip(m, address, &ip_port, &ip_port_v4) == -1) {
|
||||
SET_ERROR_PARAMETER(error, TOX_ERR_BOOTSTRAP_BAD_ADDRESS);
|
||||
SET_ERROR_PARAMETER(error, TOX_ERR_BOOTSTRAP_BAD_HOST);
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
@ -350,12 +350,12 @@ void tox_self_get_public_key(const Tox *tox, uint8_t *public_key)
|
|||
memcpy(public_key, m->net_crypto->self_public_key, crypto_box_PUBLICKEYBYTES);
|
||||
}
|
||||
|
||||
void tox_self_get_private_key(const Tox *tox, uint8_t *private_key)
|
||||
void tox_self_get_secret_key(const Tox *tox, uint8_t *secret_key)
|
||||
{
|
||||
const Messenger *m = tox;
|
||||
|
||||
if (private_key)
|
||||
memcpy(private_key, m->net_crypto->self_secret_key, crypto_box_SECRETKEYBYTES);
|
||||
if (secret_key)
|
||||
memcpy(secret_key, m->net_crypto->self_secret_key, crypto_box_SECRETKEYBYTES);
|
||||
}
|
||||
|
||||
bool tox_self_set_name(Tox *tox, const uint8_t *name, size_t length, TOX_ERR_SET_INFO *error)
|
||||
|
@ -567,18 +567,18 @@ bool tox_friend_exists(const Tox *tox, uint32_t friend_number)
|
|||
return m_friend_exists(m, friend_number);
|
||||
}
|
||||
|
||||
size_t tox_friend_list_size(const Tox *tox)
|
||||
size_t tox_self_get_friend_list_size(const Tox *tox)
|
||||
{
|
||||
const Messenger *m = tox;
|
||||
return count_friendlist(m);
|
||||
}
|
||||
|
||||
void tox_friend_get_list(const Tox *tox, uint32_t *list)
|
||||
void tox_self_get_friend_list(const Tox *tox, uint32_t *list)
|
||||
{
|
||||
if (list) {
|
||||
const Messenger *m = tox;
|
||||
//TODO: size parameter?
|
||||
copy_friendlist(m, list, tox_friend_list_size(tox));
|
||||
copy_friendlist(m, list, tox_self_get_friend_list_size(tox));
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -965,7 +965,7 @@ bool tox_file_send_chunk(Tox *tox, uint32_t friend_number, uint32_t file_number,
|
|||
return 0;
|
||||
|
||||
case -6:
|
||||
SET_ERROR_PARAMETER(error, TOX_ERR_FILE_SEND_CHUNK_QUEUE_FULL);
|
||||
SET_ERROR_PARAMETER(error, TOX_ERR_FILE_SEND_CHUNK_SENDQ);
|
||||
return 0;
|
||||
|
||||
case -7:
|
||||
|
|
|
@ -210,6 +210,11 @@ bool tox_version_is_compatible(uint32_t major, uint32_t minor, uint32_t patch);
|
|||
*/
|
||||
#define TOX_PUBLIC_KEY_SIZE 32
|
||||
|
||||
/**
|
||||
* The size of a Tox Secret Key in bytes.
|
||||
*/
|
||||
#define TOX_SECRET_KEY_SIZE 32
|
||||
|
||||
/**
|
||||
* The size of a Tox address in bytes. Tox addresses are in the format
|
||||
* [Public Key (TOX_PUBLIC_KEY_SIZE bytes)][nospam (4 bytes)][checksum (2 bytes)].
|
||||
|
@ -344,7 +349,7 @@ struct Tox_Options {
|
|||
*
|
||||
* This member is ignored (it can be NULL) if proxy_enabled is false.
|
||||
*/
|
||||
char *proxy_address;
|
||||
const char *proxy_host;
|
||||
|
||||
/**
|
||||
* The port to use to connect to the proxy server.
|
||||
|
@ -443,9 +448,9 @@ typedef enum TOX_ERR_NEW {
|
|||
/**
|
||||
* proxy_type was invalid.
|
||||
*/
|
||||
TOX_ERR_PROXY_TYPE,
|
||||
TOX_ERR_NEW_PROXY_BAD_TYPE,
|
||||
/**
|
||||
* proxy_type was valid but the proxy_address passed had an invalid format
|
||||
* proxy_type was valid but the proxy_host passed had an invalid format
|
||||
* or was NULL.
|
||||
*/
|
||||
TOX_ERR_NEW_PROXY_BAD_HOST,
|
||||
|
@ -454,7 +459,7 @@ typedef enum TOX_ERR_NEW {
|
|||
*/
|
||||
TOX_ERR_NEW_PROXY_BAD_PORT,
|
||||
/**
|
||||
* The proxy address passed could not be resolved.
|
||||
* The proxy host passed could not be resolved.
|
||||
*/
|
||||
TOX_ERR_NEW_PROXY_NOT_FOUND,
|
||||
/**
|
||||
|
@ -542,10 +547,10 @@ typedef enum TOX_ERR_BOOTSTRAP {
|
|||
TOX_ERR_BOOTSTRAP_OK,
|
||||
TOX_ERR_BOOTSTRAP_NULL,
|
||||
/**
|
||||
* The address could not be resolved to an IP address, or the IP address
|
||||
* The host could not be resolved to an IP address, or the IP address
|
||||
* passed was invalid.
|
||||
*/
|
||||
TOX_ERR_BOOTSTRAP_BAD_ADDRESS,
|
||||
TOX_ERR_BOOTSTRAP_BAD_HOST,
|
||||
/**
|
||||
* The port passed was invalid. The valid port range is (1, 65535).
|
||||
*/
|
||||
|
@ -564,14 +569,14 @@ typedef enum TOX_ERR_BOOTSTRAP {
|
|||
* also use the TCP connection when NAT hole punching is slow, and later switch
|
||||
* to UDP if hole punching succeeds.
|
||||
*
|
||||
* @param address The hostname or IP address (IPv4 or IPv6) of the node.
|
||||
* @param host The hostname or IP address (IPv4 or IPv6) of the node.
|
||||
* @param port The port on the host on which the bootstrap Tox instance is
|
||||
* listening.
|
||||
* @param public_key The long term public key of the bootstrap node
|
||||
* (TOX_PUBLIC_KEY_SIZE bytes).
|
||||
* @return true on success.
|
||||
*/
|
||||
bool tox_bootstrap(Tox *tox, const char *address, uint16_t port, const uint8_t *public_key, TOX_ERR_BOOTSTRAP *error);
|
||||
bool tox_bootstrap(Tox *tox, const char *host, uint16_t port, const uint8_t *public_key, TOX_ERR_BOOTSTRAP *error);
|
||||
|
||||
|
||||
/**
|
||||
|
@ -581,13 +586,13 @@ bool tox_bootstrap(Tox *tox, const char *address, uint16_t port, const uint8_t *
|
|||
* the same bootstrap node, or to add TCP relays without using them as
|
||||
* bootstrap nodes.
|
||||
*
|
||||
* @param address The hostname or IP address (IPv4 or IPv6) of the TCP relay.
|
||||
* @param host The hostname or IP address (IPv4 or IPv6) of the TCP relay.
|
||||
* @param port The port on the host on which the TCP relay is listening.
|
||||
* @param public_key The long term public key of the TCP relay
|
||||
* (TOX_PUBLIC_KEY_SIZE bytes).
|
||||
* @return true on success.
|
||||
*/
|
||||
bool tox_add_tcp_relay(Tox *tox, const char *address, uint16_t port, const uint8_t *public_key,
|
||||
bool tox_add_tcp_relay(Tox *tox, const char *host, uint16_t port, const uint8_t *public_key,
|
||||
TOX_ERR_BOOTSTRAP *error);
|
||||
|
||||
|
||||
|
@ -697,7 +702,7 @@ void tox_self_get_public_key(const Tox *tox, uint8_t *public_key);
|
|||
/**
|
||||
* Copy the secret key from the Tox object.
|
||||
*
|
||||
* @param secret_key A memory region of at least TOX_PUBLIC_KEY_SIZE bytes. If
|
||||
* @param secret_key A memory region of at least TOX_SECRET_KEY_SIZE bytes. If
|
||||
* this parameter is NULL, this function has no effect.
|
||||
*/
|
||||
void tox_self_get_secret_key(const Tox *tox, uint8_t *secret_key);
|
||||
|
@ -978,20 +983,20 @@ bool tox_friend_exists(const Tox *tox, uint32_t friend_number);
|
|||
* Return the number of friends on the friend list.
|
||||
*
|
||||
* This function can be used to determine how much memory to allocate for
|
||||
* tox_friend_list.
|
||||
* tox_self_get_friend_list.
|
||||
*/
|
||||
size_t tox_friend_list_size(const Tox *tox);
|
||||
size_t tox_self_get_friend_list_size(const Tox *tox);
|
||||
|
||||
|
||||
/**
|
||||
* Copy a list of valid friend numbers into an array.
|
||||
*
|
||||
* Call tox_friend_list_size to determine the number of elements to allocate.
|
||||
* Call tox_self_get_friend_list_size to determine the number of elements to allocate.
|
||||
*
|
||||
* @param list A memory region with enough space to hold the friend list. If
|
||||
* this parameter is NULL, this function has no effect.
|
||||
*/
|
||||
void tox_friend_get_list(const Tox *tox, uint32_t *list);
|
||||
void tox_self_get_friend_list(const Tox *tox, uint32_t *list);
|
||||
|
||||
|
||||
|
||||
|
@ -1655,7 +1660,7 @@ typedef enum TOX_ERR_FILE_SEND_CHUNK {
|
|||
/**
|
||||
* Packet queue is full.
|
||||
*/
|
||||
TOX_ERR_FILE_SEND_CHUNK_QUEUE_FULL,
|
||||
TOX_ERR_FILE_SEND_CHUNK_SENDQ,
|
||||
/**
|
||||
* Position parameter was wrong.
|
||||
*/
|
||||
|
|
Loading…
Reference in New Issue
Block a user