Skip to content

Commit be457d5

Browse files
committed
cleanup: Use tox memory for bin_unpack and net_strerror.
Some of the last places where we use malloc.
1 parent d9b8fa6 commit be457d5

File tree

15 files changed

+139
-96
lines changed

15 files changed

+139
-96
lines changed

auto_tests/TCP_test.c

Lines changed: 21 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -111,13 +111,13 @@ static void test_basic(void)
111111
free(handshake_plain);
112112

113113
// Sending the handshake
114-
ck_assert_msg(net_send(ns, logger, sock, handshake, TCP_CLIENT_HANDSHAKE_SIZE - 1,
114+
ck_assert_msg(net_send(ns, mem, logger, sock, handshake, TCP_CLIENT_HANDSHAKE_SIZE - 1,
115115
&localhost, nullptr) == TCP_CLIENT_HANDSHAKE_SIZE - 1,
116116
"An attempt to send the initial handshake minus last byte failed.");
117117

118118
do_tcp_server_delay(tcp_s, mono_time, 50);
119119

120-
ck_assert_msg(net_send(ns, logger, sock, handshake + (TCP_CLIENT_HANDSHAKE_SIZE - 1), 1, &localhost, nullptr) == 1,
120+
ck_assert_msg(net_send(ns, mem, logger, sock, handshake + (TCP_CLIENT_HANDSHAKE_SIZE - 1), 1, &localhost, nullptr) == 1,
121121
"The attempt to send the last byte of handshake failed.");
122122

123123
free(handshake);
@@ -127,7 +127,7 @@ static void test_basic(void)
127127
// Receiving server response and decrypting it
128128
uint8_t response[TCP_SERVER_HANDSHAKE_SIZE];
129129
uint8_t response_plain[TCP_HANDSHAKE_PLAIN_SIZE];
130-
ck_assert_msg(net_recv(ns, logger, sock, response, TCP_SERVER_HANDSHAKE_SIZE, &localhost) == TCP_SERVER_HANDSHAKE_SIZE,
130+
ck_assert_msg(net_recv(ns, mem, logger, sock, response, TCP_SERVER_HANDSHAKE_SIZE, &localhost) == TCP_SERVER_HANDSHAKE_SIZE,
131131
"Could/did not receive a server response to the initial handshake.");
132132
ret = decrypt_data(mem, self_public_key, f_secret_key, response, response + CRYPTO_NONCE_SIZE,
133133
TCP_SERVER_HANDSHAKE_SIZE - CRYPTO_NONCE_SIZE, response_plain);
@@ -156,7 +156,7 @@ static void test_basic(void)
156156
msg_length = sizeof(r_req) - i;
157157
}
158158

159-
ck_assert_msg(net_send(ns, logger, sock, r_req + i, msg_length, &localhost, nullptr) == msg_length,
159+
ck_assert_msg(net_send(ns, mem, logger, sock, r_req + i, msg_length, &localhost, nullptr) == msg_length,
160160
"Failed to send request after completing the handshake.");
161161
i += msg_length;
162162

@@ -169,7 +169,7 @@ static void test_basic(void)
169169
const size_t max_packet_size = 4096;
170170
uint8_t *packet_resp = (uint8_t *)malloc(max_packet_size);
171171
ck_assert(packet_resp != nullptr);
172-
int recv_data_len = net_recv(ns, logger, sock, packet_resp, 2 + 2 + CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_MAC_SIZE, &localhost);
172+
int recv_data_len = net_recv(ns, mem, logger, sock, packet_resp, 2 + 2 + CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_MAC_SIZE, &localhost);
173173
ck_assert_msg(recv_data_len == 2 + 2 + CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_MAC_SIZE,
174174
"Failed to receive server response to request. %d", recv_data_len);
175175
memcpy(&size, packet_resp, 2);
@@ -241,20 +241,20 @@ static struct sec_TCP_con *new_tcp_con(const Logger *logger, const Memory *mem,
241241
ck_assert_msg(ret == TCP_CLIENT_HANDSHAKE_SIZE - (CRYPTO_PUBLIC_KEY_SIZE + CRYPTO_NONCE_SIZE),
242242
"Failed to encrypt the outgoing handshake.");
243243

244-
ck_assert_msg(net_send(ns, logger, sock, handshake, TCP_CLIENT_HANDSHAKE_SIZE - 1,
244+
ck_assert_msg(net_send(ns, mem, logger, sock, handshake, TCP_CLIENT_HANDSHAKE_SIZE - 1,
245245
&localhost, nullptr) == TCP_CLIENT_HANDSHAKE_SIZE - 1,
246246
"Failed to send the first portion of the handshake to the TCP relay server.");
247247

248248
do_tcp_server_delay(tcp_s, mono_time, 50);
249249

250-
ck_assert_msg(net_send(ns, logger, sock, handshake + (TCP_CLIENT_HANDSHAKE_SIZE - 1), 1, &localhost, nullptr) == 1,
250+
ck_assert_msg(net_send(ns, mem, logger, sock, handshake + (TCP_CLIENT_HANDSHAKE_SIZE - 1), 1, &localhost, nullptr) == 1,
251251
"Failed to send last byte of handshake.");
252252

253253
do_tcp_server_delay(tcp_s, mono_time, 50);
254254

255255
uint8_t response[TCP_SERVER_HANDSHAKE_SIZE];
256256
uint8_t response_plain[TCP_HANDSHAKE_PLAIN_SIZE];
257-
ck_assert_msg(net_recv(sec_c->ns, logger, sock, response, TCP_SERVER_HANDSHAKE_SIZE, &localhost) == TCP_SERVER_HANDSHAKE_SIZE,
257+
ck_assert_msg(net_recv(sec_c->ns, mem, logger, sock, response, TCP_SERVER_HANDSHAKE_SIZE, &localhost) == TCP_SERVER_HANDSHAKE_SIZE,
258258
"Failed to receive server handshake response.");
259259
ret = decrypt_data(mem, tcp_server_public_key(tcp_s), f_secret_key, response, response + CRYPTO_NONCE_SIZE,
260260
TCP_SERVER_HANDSHAKE_SIZE - CRYPTO_NONCE_SIZE, response_plain);
@@ -271,7 +271,7 @@ static void kill_tcp_con(struct sec_TCP_con *con)
271271
free(con);
272272
}
273273

274-
static int write_packet_tcp_test_connection(const Logger *logger, struct sec_TCP_con *con, const uint8_t *data,
274+
static int write_packet_tcp_test_connection(const Logger *logger, const Memory *mem, struct sec_TCP_con *con, const uint8_t *data,
275275
uint16_t length)
276276
{
277277
const uint16_t packet_size = sizeof(uint16_t) + length + CRYPTO_MAC_SIZE;
@@ -291,7 +291,7 @@ static int write_packet_tcp_test_connection(const Logger *logger, struct sec_TCP
291291
localhost.ip = get_loopback();
292292
localhost.port = 0;
293293

294-
ck_assert_msg(net_send(con->ns, logger, con->sock, packet, packet_size, &localhost, nullptr) == packet_size,
294+
ck_assert_msg(net_send(con->ns, mem, logger, con->sock, packet, packet_size, &localhost, nullptr) == packet_size,
295295
"Failed to send a packet.");
296296
return 0;
297297
}
@@ -302,7 +302,7 @@ static int read_packet_sec_tcp(const Logger *logger, struct sec_TCP_con *con, ui
302302
localhost.ip = get_loopback();
303303
localhost.port = 0;
304304

305-
int rlen = net_recv(con->ns, logger, con->sock, data, length, &localhost);
305+
int rlen = net_recv(con->ns, con->mem, logger, con->sock, data, length, &localhost);
306306
ck_assert_msg(rlen == length, "Did not receive packet of correct length. Wanted %i, instead got %i", length, rlen);
307307
rlen = decrypt_data_symmetric(con->mem, con->shared_key, con->recv_nonce, data + 2, length - 2, data);
308308
ck_assert_msg(rlen != -1, "Failed to decrypt a received packet from the Relay server.");
@@ -338,9 +338,9 @@ static void test_some(void)
338338

339339
// Sending wrong public keys to test server response.
340340
memcpy(requ_p + 1, con3->public_key, CRYPTO_PUBLIC_KEY_SIZE);
341-
write_packet_tcp_test_connection(logger, con1, requ_p, sizeof(requ_p));
341+
write_packet_tcp_test_connection(logger, mem, con1, requ_p, sizeof(requ_p));
342342
memcpy(requ_p + 1, con1->public_key, CRYPTO_PUBLIC_KEY_SIZE);
343-
write_packet_tcp_test_connection(logger, con3, requ_p, sizeof(requ_p));
343+
write_packet_tcp_test_connection(logger, mem, con3, requ_p, sizeof(requ_p));
344344

345345
do_tcp_server_delay(tcp_s, mono_time, 50);
346346

@@ -362,9 +362,9 @@ static void test_some(void)
362362

363363
const uint8_t test_packet[512] = {16, 17, 16, 86, 99, 127, 255, 189, 78}; // What is this packet????
364364

365-
write_packet_tcp_test_connection(logger, con3, test_packet, sizeof(test_packet));
366-
write_packet_tcp_test_connection(logger, con3, test_packet, sizeof(test_packet));
367-
write_packet_tcp_test_connection(logger, con3, test_packet, sizeof(test_packet));
365+
write_packet_tcp_test_connection(logger, mem, con3, test_packet, sizeof(test_packet));
366+
write_packet_tcp_test_connection(logger, mem, con3, test_packet, sizeof(test_packet));
367+
write_packet_tcp_test_connection(logger, mem, con3, test_packet, sizeof(test_packet));
368368

369369
do_tcp_server_delay(tcp_s, mono_time, 50);
370370

@@ -388,9 +388,9 @@ static void test_some(void)
388388
ck_assert_msg(len == sizeof(test_packet), "wrong len %d", len);
389389
ck_assert_msg(memcmp(data, test_packet, sizeof(test_packet)) == 0, "packet is wrong %u %u %u %u", data[0], data[1],
390390
data[sizeof(test_packet) - 2], data[sizeof(test_packet) - 1]);
391-
write_packet_tcp_test_connection(logger, con1, test_packet, sizeof(test_packet));
392-
write_packet_tcp_test_connection(logger, con1, test_packet, sizeof(test_packet));
393-
write_packet_tcp_test_connection(logger, con1, test_packet, sizeof(test_packet));
391+
write_packet_tcp_test_connection(logger, mem, con1, test_packet, sizeof(test_packet));
392+
write_packet_tcp_test_connection(logger, mem, con1, test_packet, sizeof(test_packet));
393+
write_packet_tcp_test_connection(logger, mem, con1, test_packet, sizeof(test_packet));
394394
do_tcp_server_delay(tcp_s, mono_time, 50);
395395
len = read_packet_sec_tcp(logger, con3, data, 2 + sizeof(test_packet) + CRYPTO_MAC_SIZE);
396396
ck_assert_msg(len == sizeof(test_packet), "wrong len %d", len);
@@ -405,8 +405,8 @@ static void test_some(void)
405405
ck_assert_msg(memcmp(data, test_packet, sizeof(test_packet)) == 0, "packet is wrong %u %u %u %u", data[0], data[1],
406406
data[sizeof(test_packet) - 2], data[sizeof(test_packet) - 1]);
407407

408-
uint8_t ping_packet[1 + sizeof(uint64_t)] = {TCP_PACKET_PING, 8, 6, 9, 67};
409-
write_packet_tcp_test_connection(logger, con1, ping_packet, sizeof(ping_packet));
408+
const uint8_t ping_packet[1 + sizeof(uint64_t)] = {TCP_PACKET_PING, 8, 6, 9, 67};
409+
write_packet_tcp_test_connection(logger, mem, con1, ping_packet, sizeof(ping_packet));
410410

411411
do_tcp_server_delay(tcp_s, mono_time, 50);
412412

auto_tests/network_test.c

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,5 @@
1-
#include <stdlib.h>
21
#include <string.h>
32

4-
#include "../testing/misc_tools.h"
53
#include "../toxcore/network.h"
64
#include "check_compat.h"
75

@@ -34,9 +32,10 @@ static void test_addr_resolv_localhost(void)
3432
bool res = addr_resolve_or_parse_ip(ns, mem, localhost, &ip, nullptr, true);
3533

3634
int error = net_error();
37-
char *strerror = net_new_strerror(error);
35+
char *strerror = net_new_strerror(mem, error);
36+
ck_assert(strerror != nullptr);
3837
ck_assert_msg(res, "Resolver failed: %d, %s", error, strerror);
39-
net_kill_strerror(strerror);
38+
net_kill_strerror(mem, strerror);
4039

4140
Ip_Ntoa ip_str;
4241
ck_assert_msg(net_family_is_ipv4(ip.family), "Expected family TOX_AF_INET, got %u.", ip.family.value);
@@ -57,9 +56,10 @@ static void test_addr_resolv_localhost(void)
5756
}
5857

5958
error = net_error();
60-
strerror = net_new_strerror(error);
59+
strerror = net_new_strerror(mem, error);
60+
ck_assert(strerror != nullptr);
6161
ck_assert_msg(res, "Resolver failed: %d, %s", error, strerror);
62-
net_kill_strerror(strerror);
62+
net_kill_strerror(mem, strerror);
6363

6464
ck_assert_msg(net_family_is_ipv6(ip.family), "Expected family TOX_AF_INET6 (%d), got %u.", TOX_AF_INET6,
6565
ip.family.value);
@@ -80,9 +80,10 @@ static void test_addr_resolv_localhost(void)
8080
ip_reset(&extra);
8181
res = addr_resolve_or_parse_ip(ns, mem, localhost, &ip, &extra, true);
8282
error = net_error();
83-
strerror = net_new_strerror(error);
83+
strerror = net_new_strerror(mem, error);
84+
ck_assert(strerror != nullptr);
8485
ck_assert_msg(res, "Resolver failed: %d, %s", error, strerror);
85-
net_kill_strerror(strerror);
86+
net_kill_strerror(mem, strerror);
8687

8788
#if USE_IPV6
8889
ck_assert_msg(net_family_is_ipv6(ip.family), "Expected family TOX_AF_INET6 (%d), got %u.", TOX_AF_INET6,

toxav/rtp.c

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -678,7 +678,7 @@ static uint32_t rtp_random_u32(void)
678678
return randombytes_random();
679679
}
680680

681-
RTPSession *rtp_new(const Logger *log, int payload_type, Tox *tox, ToxAV *toxav, uint32_t friendnumber,
681+
RTPSession *rtp_new(const Logger *log, const Memory *mem, int payload_type, Tox *tox, ToxAV *toxav, uint32_t friendnumber,
682682
BWController *bwc, void *cs, rtp_m_cb *mcb)
683683
{
684684
assert(mcb != nullptr);
@@ -704,6 +704,8 @@ RTPSession *rtp_new(const Logger *log, int payload_type, Tox *tox, ToxAV *toxav,
704704

705705
session->ssrc = payload_type == RTP_TYPE_VIDEO ? 0 : rtp_random_u32(); // Zoff: what is this??
706706
session->payload_type = payload_type;
707+
session->log = log;
708+
session->mem = mem;
707709
session->tox = tox;
708710
session->toxav = toxav;
709711
session->friend_number = friendnumber;
@@ -773,18 +775,18 @@ void rtp_stop_receiving(Tox *tox)
773775
* @param error the error from rtp_send_custom_lossy_packet.
774776
* @param rdata_size The package length to be shown in the log.
775777
*/
776-
static void rtp_report_error_maybe(const Logger *log, Tox_Err_Friend_Custom_Packet error, uint16_t rdata_size)
778+
static void rtp_report_error_maybe(const Logger *log, const Memory *mem, Tox_Err_Friend_Custom_Packet error, uint16_t rdata_size)
777779
{
778780
if (error != TOX_ERR_FRIEND_CUSTOM_PACKET_OK) {
779-
char *netstrerror = net_new_strerror(net_error());
781+
char *netstrerror = net_new_strerror(mem, net_error());
780782
const char *toxerror = tox_err_friend_custom_packet_to_string(error);
781783
LOGGER_WARNING(log, "RTP send failed (len: %u)! tox error: %s net error: %s",
782784
rdata_size, toxerror, netstrerror);
783-
net_kill_strerror(netstrerror);
785+
net_kill_strerror(mem, netstrerror);
784786
}
785787
}
786788

787-
static void rtp_send_piece(const Logger *log, Tox *tox, uint32_t friend_number, const struct RTPHeader *header,
789+
static void rtp_send_piece(const Logger *log, const Memory *mem, Tox *tox, uint32_t friend_number, const struct RTPHeader *header,
788790
const uint8_t *data, uint8_t *rdata, uint16_t length)
789791
{
790792
rtp_header_pack(rdata + 1, header);
@@ -795,7 +797,7 @@ static void rtp_send_piece(const Logger *log, Tox *tox, uint32_t friend_number,
795797
Tox_Err_Friend_Custom_Packet error;
796798
tox_friend_send_lossy_packet(tox, friend_number, rdata, rdata_size, &error);
797799

798-
rtp_report_error_maybe(log, error, rdata_size);
800+
rtp_report_error_maybe(log, mem, error, rdata_size);
799801
}
800802

801803
static struct RTPHeader rtp_default_header(const RTPSession *session, uint32_t length, bool is_keyframe)
@@ -868,7 +870,7 @@ int rtp_send_data(const Logger *log, RTPSession *session, const uint8_t *data, u
868870
* Send the packet in single piece.
869871
*/
870872
assert(length < UINT16_MAX);
871-
rtp_send_piece(log, session->tox, session->friend_number, &header, data, rdata, length);
873+
rtp_send_piece(log, session->mem, session->tox, session->friend_number, &header, data, rdata, length);
872874
} else {
873875
/*
874876
* The length is greater than the maximum allowed length (including header)
@@ -878,7 +880,7 @@ int rtp_send_data(const Logger *log, RTPSession *session, const uint8_t *data, u
878880
uint16_t piece = MAX_CRYPTO_DATA_SIZE - (RTP_HEADER_SIZE + 1);
879881

880882
while ((length - sent) + RTP_HEADER_SIZE + 1 > MAX_CRYPTO_DATA_SIZE) {
881-
rtp_send_piece(log, session->tox, session->friend_number, &header, data + sent, rdata, piece);
883+
rtp_send_piece(log, session->mem, session->tox, session->friend_number, &header, data + sent, rdata, piece);
882884

883885
sent += piece;
884886
header.offset_lower = sent;
@@ -889,7 +891,7 @@ int rtp_send_data(const Logger *log, RTPSession *session, const uint8_t *data, u
889891
piece = length - sent;
890892

891893
if (piece != 0) {
892-
rtp_send_piece(log, session->tox, session->friend_number, &header, data + sent, rdata, piece);
894+
rtp_send_piece(log, session->mem, session->tox, session->friend_number, &header, data + sent, rdata, piece);
893895
}
894896
}
895897

toxav/rtp.h

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -162,6 +162,7 @@ typedef struct RTPSession {
162162
struct RTPWorkBufferList *work_buffer_list;
163163
uint8_t first_packets_counter; /* dismiss first few lost video packets */
164164
const Logger *log;
165+
const Memory *mem;
165166
Tox *tox;
166167
ToxAV *toxav;
167168
uint32_t friend_number;
@@ -192,7 +193,7 @@ size_t rtp_header_pack(uint8_t *rdata, const struct RTPHeader *header);
192193
*/
193194
size_t rtp_header_unpack(const uint8_t *data, struct RTPHeader *header);
194195

195-
RTPSession *rtp_new(const Logger *log, int payload_type, Tox *tox, ToxAV *toxav, uint32_t friendnumber,
196+
RTPSession *rtp_new(const Logger *log, const Memory *mem, int payload_type, Tox *tox, ToxAV *toxav, uint32_t friendnumber,
196197
BWController *bwc, void *cs, rtp_m_cb *mcb);
197198
void rtp_kill(const Logger *log, RTPSession *session);
198199
void rtp_allow_receiving_mark(RTPSession *session);

toxav/toxav.c

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -87,6 +87,7 @@ typedef struct DecodeTimeStats {
8787
} DecodeTimeStats;
8888

8989
struct ToxAV {
90+
const Memory *mem;
9091
Logger *log;
9192
Tox *tox;
9293
MSISession *msi;
@@ -219,6 +220,7 @@ ToxAV *toxav_new(Tox *tox, Toxav_Err_New *error)
219220
goto RETURN;
220221
}
221222

223+
av->mem = tox->sys.mem;
222224
av->log = tox->m->log;
223225
av->tox = tox;
224226
av->msi = msi_new(av->log, av->tox);
@@ -994,9 +996,9 @@ static Toxav_Err_Send_Frame send_frames(const ToxAV *av, ToxAVCall *call)
994996
is_keyframe);
995997

996998
if (res < 0) {
997-
char *netstrerror = net_new_strerror(net_error());
999+
char *netstrerror = net_new_strerror(av->mem, net_error());
9981000
LOGGER_WARNING(av->log, "Could not send video frame: %s", netstrerror);
999-
net_kill_strerror(netstrerror);
1001+
net_kill_strerror(av->mem, netstrerror);
10001002
return TOXAV_ERR_SEND_FRAME_RTP_FAILED;
10011003
}
10021004
}
@@ -1507,7 +1509,7 @@ static bool call_prepare_transmission(ToxAVCall *call)
15071509
goto FAILURE;
15081510
}
15091511

1510-
call->audio_rtp = rtp_new(av->log, RTP_TYPE_AUDIO, av->tox, av, call->friend_number, call->bwc,
1512+
call->audio_rtp = rtp_new(av->log, av->mem, RTP_TYPE_AUDIO, av->tox, av, call->friend_number, call->bwc,
15111513
call->audio, ac_queue_message);
15121514

15131515
if (call->audio_rtp == nullptr) {
@@ -1523,7 +1525,7 @@ static bool call_prepare_transmission(ToxAVCall *call)
15231525
goto FAILURE;
15241526
}
15251527

1526-
call->video_rtp = rtp_new(av->log, RTP_TYPE_VIDEO, av->tox, av, call->friend_number, call->bwc,
1528+
call->video_rtp = rtp_new(av->log, av->mem, RTP_TYPE_VIDEO, av->tox, av, call->friend_number, call->bwc,
15271529
call->video, vc_queue_message);
15281530

15291531
if (call->video_rtp == nullptr) {

toxcore/BUILD.bazel

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -192,6 +192,7 @@ cc_library(
192192
deps = [
193193
":attributes",
194194
":ccompat",
195+
":mem",
195196
"//c-toxcore/third_party:cmp",
196197
],
197198
)
@@ -204,6 +205,7 @@ cc_test(
204205
":bin_pack",
205206
":bin_unpack",
206207
":logger",
208+
":mem",
207209
"@com_google_googletest//:gtest",
208210
"@com_google_googletest//:gtest_main",
209211
],

toxcore/Messenger.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3171,7 +3171,7 @@ static bool handle_groups_load(void *obj, Bin_Unpack *bu)
31713171
non_null()
31723172
static State_Load_Status groups_load(Messenger *m, const uint8_t *data, uint32_t length)
31733173
{
3174-
if (!bin_unpack_obj(handle_groups_load, m, data, length)) {
3174+
if (!bin_unpack_obj(m->mem, handle_groups_load, m, data, length)) {
31753175
LOGGER_ERROR(m->log, "msgpack failed to unpack groupchats array");
31763176
return STATE_LOAD_STATUS_ERROR;
31773177
}

0 commit comments

Comments
 (0)