1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
use super::*;
use crate::onion::*;
use tox_crypto::*;
use crate::ip_port::SIZE_IPPORT;
use crate::toxid::NoSpam;
const ONION_SEND_BASE: usize = PUBLICKEYBYTES + SIZE_IPPORT + MACBYTES;
const ONION_SEND_1: usize = secretbox::NONCEBYTES + ONION_SEND_BASE * 3;
const MAX_ONION_DATA_SIZE: usize = ONION_MAX_PACKET_SIZE - (ONION_SEND_1 + 1);
const MIN_ONION_DATA_REQUEST_SIZE: usize = 1 + PUBLICKEYBYTES + secretbox::NONCEBYTES + PUBLICKEYBYTES + MACBYTES;
pub const MAX_DATA_REQUEST_SIZE: usize = MAX_ONION_DATA_SIZE - MIN_ONION_DATA_REQUEST_SIZE;
pub const MIN_ONION_DATA_RESPONSE_SIZE: usize = PUBLICKEYBYTES + MACBYTES;
pub const MAX_ONION_CLIENT_DATA_SIZE: usize = MAX_DATA_REQUEST_SIZE - MIN_ONION_DATA_RESPONSE_SIZE;
#[derive(Clone, Debug, Eq, PartialEq)]
pub struct FriendRequests {
nospam: NoSpam,
message: Vec<u8>,
}
impl FromBytes for FriendRequests {
named!(from_bytes<FriendRequests>, do_parse!(
tag!("\x12") >>
nospam: call!(NoSpam::from_bytes) >>
message: verify!(rest, |message: &[u8]| message.len() <= MAX_ONION_CLIENT_DATA_SIZE) >>
(FriendRequests { nospam, message: message.to_vec() })
));
}
impl ToBytes for FriendRequests {
fn to_bytes<'a>(&self, buf: (&'a mut [u8], usize)) -> Result<(&'a mut [u8], usize), GenError> {
do_gen!(buf,
gen_be_u8!(0x12) >>
gen_slice!(self.nospam.0) >>
gen_cond!(self.message.len() > MAX_ONION_CLIENT_DATA_SIZE, |buf| gen_error(buf, 0)) >>
gen_slice!(self.message.as_slice())
)
}
}
impl FriendRequests {
pub fn new(nospam: NoSpam, message: Vec<u8>) -> Self {
FriendRequests { nospam, message }
}
}
#[cfg(test)]
mod tests {
use super::*;
encode_decode_test!(
tox_crypto::crypto_init().unwrap(),
friend_requests_encode_decode,
FriendRequests::new(NoSpam::random(), vec![1,2,3,4])
);
}